Build

Regressions (compared to v6.13-rc7-149-g9bffa1ad25b8)

dragonboard-410c, boot

qemu-arm64, ltp-fs

qemu-armv7, kselftest-seccomp

qemu-armv7, kselftest-cgroup

qemu-riscv64, ltp-fs

qemu-x86_64-compat, ltp-sched

qemu-x86_64, kunit

x15, kselftest-cgroup

Fixes (compared to v6.13-rc7-149-g9bffa1ad25b8)

qemu-arm64-compat, ltp-fs

qemu-arm64-protected, kvm-unit-tests

qemu-arm64, kselftest-memfd

qemu-armv7, kselftest-timers

qemu-armv7, ltp-fs

qemu-x86_64, kselftest-x86

qemu-x86_64, kselftest-seccomp

qemu-x86_64, kselftest-timers

x15, kselftest-cgroup

x15, ltp-controllers

Build Parser (compared to v6.13-rc7-149-g9bffa1ad25b8)

s390, log-parser-build-gcc

x86_64, log-parser-build-clang

x86_64, log-parser-build-gcc

Boot Parser (compared to v6.13-rc7-149-g9bffa1ad25b8)

qemu-arm64, log-parser-boot

qemu-x86_64, log-parser-boot

x15, log-parser-boot

Test Parser (compared to v6.13-rc7-149-g9bffa1ad25b8)

qemu-arm64, log-parser-test

qemu-riscv64, log-parser-test

qemu-x86_64-compat, log-parser-test

qemu-x86_64, log-parser-test

rk3399-rock-pi-4b, log-parser-test

x15, log-parser-test

x86, log-parser-test

Test log snippets

test log snippet regressions 1

Home

None

test log snippet regressions 2

Home

None

test log snippet regressions 3

Home

fs_fill fs_fill

test log snippet regressions 4

Home

seccomp_seccomp_benchmark_entry_2_bitmapped fail

test log snippet regressions 5

Home

cgroup_test_cpu_test_cpucg_subtree_control pass
cgroup_test_cpu_test_cpucg_stats pass
cgroup_test_cpu_test_cpucg_nice pass
cgroup_test_cpu_test_cpucg_weight_overprovisioned pass
cgroup_test_cpu_test_cpucg_weight_underprovisioned skip
cgroup_test_cpu_test_cpucg_nested_weight_overprovisioned fail
cgroup_test_cpu_test_cpucg_nested_weight_underprovisioned skip
cgroup_test_cpu_test_cpucg_max pass
cgroup_test_cpu_test_cpucg_max_nested pass
cgroup_test_cpu fail
cgroup_test_cpuset skip
cgroup_test_cpuset_prs_sh skip
cgroup_test_cpuset_v1_hp_sh skip

test log snippet regressions 6

Home

cgroup_test_cpu_test_cpucg_nested_weight_overprovisioned fail

test log snippet regressions 7

Home

fs_fill fs_fill
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 36103ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file4
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file4
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file4
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file4
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 39667ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 34930ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 19423ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file3
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file3
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file3
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file3
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 20546ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 19579ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file0
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 23200ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 8226ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file0
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 12174ms

test log snippet regressions 8

Home

starvation starvation
starvation.c:98: TINFO: Setting affinity to CPU 0
starvation.c:52: TINFO: CPU did 120000000 loops in 262258us
starvation.c:148: TFAIL: Scheduller starvation reproduced.

test log snippet regressions 9

Home

starvation starvation
starvation.c:98: TINFO: Setting affinity to CPU 0
starvation.c:52: TINFO: CPU did 120000000 loops in 424466us
starvation.c:148: TFAIL: Scheduller starvation reproduced.

test log snippet regressions 10

Home

_kasan fail

test log snippet regressions 11

Home

cgroup_test_cpu_test_cpucg_stats pass
cgroup_test_cpu_test_cpucg_nice pass
cgroup_test_cpu_test_cpucg_weight_overprovisioned pass
cgroup_test_cpu_test_c[   93.559814] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=mqueue:mq_perf_tests RESULT=skip>
cgroup_test_cpu_test_cpucg_nested_weight_overprovisioned fail
cgroup_test_cpu_test_cpucg_nested_weight_underprovisioned skip
cgroup_test_cpu_test_cpucg_max fail
cgroup_test_cpu_test_cpucg_max_nested pass
cgroup_test_cpuset skip
cgroup_test_cpuset_prs_sh skip
cgroup_test_cpuset_v1_hp_sh skip

test log snippet regressions 12

Home

cgroup_test_cpu_test_cpucg_max fail
cgroup_test_cpu_test_cpucg_max_nested pass

test log snippet regressions 13

Home

cgroup_test_cpu_test_cpucg_nested_weight_overprovisioned fail

test log snippet build parser 1

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc'
s390x-linux-gnu-objcopy: stPGgAam: warning: allocated section `.got.plt' not in segment

test log snippet build parser 2

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc'
s390x-linux-gnu-objcopy: st6leAOQ: warning: allocated section `.got.plt' not in segment

test log snippet build parser 3

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc'
s390x-linux-gnu-objcopy: stlHt02w: warning: allocated section `.got.plt' not in segment

test log snippet build parser 4

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc'
s390x-linux-gnu-objcopy: sttTaCAq: warning: allocated section `.got.plt' not in segment

test log snippet build parser 5

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'HOSTCC=sccache clang' 'CC=sccache clang' LLVM=1 LLVM_IAS=1 kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/x86_64-linux-gnu-ld: warning: /tmp/test_encl_bootstrap-66b0f1.o: missing .note.GNU-stack section implies executable stack
/usr/bin/x86_64-linux-gnu-ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker

test log snippet build parser 6

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1 kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/x86_64-linux-gnu-ld: warning: /tmp/test_encl_bootstrap-d023e3.o: missing .note.GNU-stack section implies executable stack
/usr/bin/x86_64-linux-gnu-ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker

test log snippet build parser 7

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/ld: warning: /tmp/ccL1c3nJ.o: missing .note.GNU-stack section implies executable stack
/usr/bin/ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker

test log snippet build parser 8

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/ld: warning: /tmp/ccuVpgdP.o: missing .note.GNU-stack section implies executable stack
/usr/bin/ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker

test log snippet boot parser 1

Home

[   47.837212] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[   47.838065] Modules linked in:
[   47.841821] CPU: 0 UID: 0 PID: 388 Comm: kunit_try_catch Tainted: G                 N 6.13.0-rc7 #1
[   47.843060] Tainted: [N]=TEST
[   47.843550] Hardware name: linux,dummy-virt (DT)
[   47.844599] pstate: 81400009 (Nzcv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
[   47.845421] pc : kunit_test_null_dereference+0x2c/0x114
[   47.847188] lr : kunit_generic_run_threadfn_adapter+0x84/0x104
[   47.847855] sp : ffff800082eb7dd0
[   47.848394] x29: ffff800082eb7de0 x28: 0000000000000000 x27: 1ffe00001900c4a1
[   47.849720] x26: dfff800000000000 x25: ffff9e3faed08ed4 x24: fff00000c7c532a0
[   47.850869] x23: 1ffe000018f8a641 x22: dfff800000000000 x21: dfff800000000000
[   47.851934] x20: ffff9e3faed1631c x19: fff00000c7c53208 x18: ffff800080097930
[   47.852998] x17: ffff80008009792c x16: 0000000000000000 x15: 0000000000000001
[   47.854051] x14: 1ffe00001900c591 x13: 0000000000000000 x12: 0000000000000000
[   47.855091] x11: fffd80001900c592 x10: dfff800000000000 x9 : 1ffe000018f8a642
[   47.856253] x8 : 13a75d07ebd21e00 x7 : ffff80008009793c x6 : 0000000000000014
[   47.857645] x5 : 00000000b13a34ac x4 : 0000000000000001 x3 : ffff9e3fb0b5afd8
[   47.858619] x2 : 0000000000000001 x1 : 0000000000000001 x0 : ffff800080087af8
[   47.859864] Call trace:
[   47.860542]  kunit_test_null_dereference+0x2c/0x114 (P)
[   47.861652]  kunit_generic_run_threadfn_adapter+0x84/0x104
[   47.862336]  kthread+0x25c/0x35c
[   47.862905]  ret_from_fork+0x10/0x20
[   47.864182] Code: d2d00015 f9426508 f2fbfff5 f90007e8 (39c002a8) 
[   47.865265] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 2

Home

------------[ cut here ]------------
[    4.415092] ### dt-test ### EXPECT \ : WARNING: <<all>>
[    4.415679] ### dt-test ### EXPECT \ : refcount_t: underflow; use-after-free.
[    4.416154] ### dt-test ### EXPECT \ : ---[ end trace <<int>> ]---
[    4.416698] ### dt-test ### pass of_unittest_lifecycle():3507
[    4.417918] ------------[ cut here ]------------
[    4.418622] refcount_t: underflow; use-after-free.
[    4.420043] WARNING: CPU: 1 PID: 1 at lib/refcount.c:28 refcount_warn_saturate+0xf4/0x148
[    4.421547] Modules linked in:
[    4.422979] CPU: 1 UID: 0 PID: 1 Comm: swapper/0 Tainted: G                 N 6.13.0-rc7 #1
[    4.423790] Tainted: [N]=TEST
[    4.424106] Hardware name: linux,dummy-virt (DT)
[    4.424732] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[    4.425448] pc : refcount_warn_saturate+0xf4/0x148
[    4.425931] lr : refcount_warn_saturate+0xf4/0x148
[    4.426443] sp : ffff80008002bbe0
[    4.426758] x29: ffff80008002bbe0 x28: ffffa672000b3fb8 x27: ffffa672002b2e20
[    4.427615] x26: ffffa671ffbc8110 x25: ffffa672000b3fb8 x24: ffffa671ffbc8a70
[    4.428412] x23: ffffa672002b2e20 x22: fff00000c178e2c0 x21: ffffa67200ef1000
[    4.428963] x20: ffffa672002b2e10 x19: fff00000c178e340 x18: 0000000000000006
[    4.429723] x17: 0000000043964ea7 x16: 00000000d6c6f5e7 x15: ffff80008002b600
[    4.430345] x14: ffff80010002b7ba x13: ffff80008002b7c2 x12: 0000000000000000
[    4.431049] x11: fffffffffffe0000 x10: ffffa6720084e080 x9 : ffffa671fe148d60
[    4.431767] x8 : 00000000ffffefff x7 : ffffa6720084e080 x6 : 80000000fffff000
[    4.432417] x5 : 00000000000002a2 x4 : 0000000000000000 x3 : 0000000000000000
[    4.433035] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c02e0000
[    4.433934] Call trace:
[    4.434494]  refcount_warn_saturate+0xf4/0x148 (P)
[    4.435147]  kobject_put+0x16c/0x218
[    4.435523]  of_node_put+0x20/0x38
[    4.435874]  of_unittest+0x1ed0/0x2d28
[    4.436258]  do_one_initcall+0x60/0x298
[    4.436669]  kernel_init_freeable+0x204/0x3d8
[    4.437154]  kernel_init+0x28/0x1f0
[    4.437526]  ret_from_fork+0x10/0x20
[    4.438209] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 3

Home

[   31.142677] ==================================================================
[   31.143486] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   31.144386] Free of addr fff00000c5abd160 by task kunit_try_catch/180
[   31.144868] 
[   31.145252] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   31.146563] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.147142] Hardware name: linux,dummy-virt (DT)
[   31.147752] Call trace:
[   31.148200]  show_stack+0x20/0x38 (C)
[   31.148808]  dump_stack_lvl+0x8c/0xd0
[   31.149440]  print_report+0x118/0x5e0
[   31.150325]  kasan_report_invalid_free+0xb0/0xd8
[   31.150915]  check_slab_allocation+0xd4/0x108
[   31.151577]  __kasan_slab_pre_free+0x2c/0x48
[   31.152251]  kfree+0xe8/0x3c8
[   31.152786]  kfree_sensitive+0x3c/0xb0
[   31.153315]  kmalloc_double_kzfree+0x168/0x308
[   31.154288]  kunit_try_run_case+0x14c/0x3d0
[   31.154854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.155569]  kthread+0x24c/0x2d0
[   31.156100]  ret_from_fork+0x10/0x20
[   31.156615] 
[   31.156958] Allocated by task 180:
[   31.157487]  kasan_save_stack+0x3c/0x68
[   31.158083]  kasan_save_track+0x20/0x40
[   31.158932]  kasan_save_alloc_info+0x40/0x58
[   31.159483]  __kasan_kmalloc+0xd4/0xd8
[   31.160096]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.160679]  kmalloc_double_kzfree+0xb8/0x308
[   31.161290]  kunit_try_run_case+0x14c/0x3d0
[   31.162107]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.162675]  kthread+0x24c/0x2d0
[   31.163211]  ret_from_fork+0x10/0x20
[   31.163730] 
[   31.165025] Freed by task 180:
[   31.165419]  kasan_save_stack+0x3c/0x68
[   31.166333]  kasan_save_track+0x20/0x40
[   31.167063]  kasan_save_free_info+0x4c/0x78
[   31.167630]  __kasan_slab_free+0x6c/0x98
[   31.168451]  kfree+0x114/0x3c8
[   31.168965]  kfree_sensitive+0x80/0xb0
[   31.169602]  kmalloc_double_kzfree+0x11c/0x308
[   31.170547]  kunit_try_run_case+0x14c/0x3d0
[   31.171093]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.171410]  kthread+0x24c/0x2d0
[   31.171632]  ret_from_fork+0x10/0x20
[   31.171866] 
[   31.172065] The buggy address belongs to the object at fff00000c5abd160
[   31.172065]  which belongs to the cache kmalloc-16 of size 16
[   31.172831] The buggy address is located 0 bytes inside of
[   31.172831]  16-byte region [fff00000c5abd160, fff00000c5abd170)
[   31.174920] 
[   31.175283] The buggy address belongs to the physical page:
[   31.175991] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[   31.176814] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.177550] page_type: f5(slab)
[   31.177992] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.179037] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   31.179865] page dumped because: kasan: bad access detected
[   31.180598] 
[   31.180898] Memory state around the buggy address:
[   31.181525]  fff00000c5abd000: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 04 fc fc
[   31.182623]  fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.183911] >fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.184646]                                                        ^
[   31.185439]  fff00000c5abd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.186533]  fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.187168] ==================================================================

test log snippet boot parser 4

Home

[   33.871336] ==================================================================
[   33.872155] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   33.873088] Read of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[   33.873725] 
[   33.875397] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   33.876226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.876778] Hardware name: linux,dummy-virt (DT)
[   33.877413] Call trace:
[   33.877864]  show_stack+0x20/0x38 (C)
[   33.878476]  dump_stack_lvl+0x8c/0xd0
[   33.879240]  print_report+0x118/0x5e0
[   33.879832]  kasan_report+0xc8/0x118
[   33.880406]  __asan_report_load8_noabort+0x20/0x30
[   33.881049]  kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   33.881788]  kasan_bitops_generic+0x110/0x1c8
[   33.882693]  kunit_try_run_case+0x14c/0x3d0
[   33.883291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.883994]  kthread+0x24c/0x2d0
[   33.884509]  ret_from_fork+0x10/0x20
[   33.885074] 
[   33.885409] Allocated by task 249:
[   33.886106]  kasan_save_stack+0x3c/0x68
[   33.886698]  kasan_save_track+0x20/0x40
[   33.887429]  kasan_save_alloc_info+0x40/0x58
[   33.887994]  __kasan_kmalloc+0xd4/0xd8
[   33.888506]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.889413]  kasan_bitops_generic+0xa0/0x1c8
[   33.890323]  kunit_try_run_case+0x14c/0x3d0
[   33.890884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.891478]  kthread+0x24c/0x2d0
[   33.892096]  ret_from_fork+0x10/0x20
[   33.892626] 
[   33.892800] The buggy address belongs to the object at fff00000c5abd180
[   33.892800]  which belongs to the cache kmalloc-16 of size 16
[   33.893777] The buggy address is located 8 bytes inside of
[   33.893777]  allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[   33.895661] 
[   33.895870] The buggy address belongs to the physical page:
[   33.896387] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[   33.897681] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.898923] page_type: f5(slab)
[   33.899428] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.900454] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   33.901212] page dumped because: kasan: bad access detected
[   33.902314] 
[   33.902630] Memory state around the buggy address:
[   33.903268]  fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.904212]  fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.905066] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.905784]                       ^
[   33.906680]  fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.907682]  fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.908651] ==================================================================
---
[   34.179309] ==================================================================
[   34.180126] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   34.180832] Read of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[   34.181551] 
[   34.181933] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   34.182943] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.183548] Hardware name: linux,dummy-virt (DT)
[   34.184224] Call trace:
[   34.184666]  show_stack+0x20/0x38 (C)
[   34.185321]  dump_stack_lvl+0x8c/0xd0
[   34.185963]  print_report+0x118/0x5e0
[   34.186544]  kasan_report+0xc8/0x118
[   34.187185]  __asan_report_load8_noabort+0x20/0x30
[   34.187895]  kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   34.188534]  kasan_bitops_generic+0x110/0x1c8
[   34.189248]  kunit_try_run_case+0x14c/0x3d0
[   34.189896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.190604]  kthread+0x24c/0x2d0
[   34.191227]  ret_from_fork+0x10/0x20
[   34.191763] 
[   34.192169] Allocated by task 249:
[   34.192719]  kasan_save_stack+0x3c/0x68
[   34.193307]  kasan_save_track+0x20/0x40
[   34.193884]  kasan_save_alloc_info+0x40/0x58
[   34.194536]  __kasan_kmalloc+0xd4/0xd8
[   34.195073]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.195833]  kasan_bitops_generic+0xa0/0x1c8
[   34.196469]  kunit_try_run_case+0x14c/0x3d0
[   34.197148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.197788]  kthread+0x24c/0x2d0
[   34.198386]  ret_from_fork+0x10/0x20
[   34.198964] 
[   34.199371] The buggy address belongs to the object at fff00000c5abd180
[   34.199371]  which belongs to the cache kmalloc-16 of size 16
[   34.200617] The buggy address is located 8 bytes inside of
[   34.200617]  allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[   34.201840] 
[   34.202239] The buggy address belongs to the physical page:
[   34.202986] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[   34.203881] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.204767] page_type: f5(slab)
[   34.205334] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.206219] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.207098] page dumped because: kasan: bad access detected
[   34.207766] 
[   34.208128] Memory state around the buggy address:
[   34.208790]  fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.209493]  fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.210323] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.211120]                       ^
[   34.211643]  fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.212401]  fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.213206] ==================================================================
---
[   33.951375] ==================================================================
[   33.952098] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   33.952854] Read of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[   33.953693] 
[   33.955174] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   33.956475] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.957131] Hardware name: linux,dummy-virt (DT)
[   33.957406] Call trace:
[   33.957593]  show_stack+0x20/0x38 (C)
[   33.958268]  dump_stack_lvl+0x8c/0xd0
[   33.958839]  print_report+0x118/0x5e0
[   33.959620]  kasan_report+0xc8/0x118
[   33.960258]  __asan_report_load8_noabort+0x20/0x30
[   33.960946]  kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   33.961602]  kasan_bitops_generic+0x110/0x1c8
[   33.962740]  kunit_try_run_case+0x14c/0x3d0
[   33.963511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.964323]  kthread+0x24c/0x2d0
[   33.964797]  ret_from_fork+0x10/0x20
[   33.965286] 
[   33.965651] Allocated by task 249:
[   33.966656]  kasan_save_stack+0x3c/0x68
[   33.967362]  kasan_save_track+0x20/0x40
[   33.967939]  kasan_save_alloc_info+0x40/0x58
[   33.968519]  __kasan_kmalloc+0xd4/0xd8
[   33.969151]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.969762]  kasan_bitops_generic+0xa0/0x1c8
[   33.970640]  kunit_try_run_case+0x14c/0x3d0
[   33.971314]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.971995]  kthread+0x24c/0x2d0
[   33.972593]  ret_from_fork+0x10/0x20
[   33.973192] 
[   33.973537] The buggy address belongs to the object at fff00000c5abd180
[   33.973537]  which belongs to the cache kmalloc-16 of size 16
[   33.974989] The buggy address is located 8 bytes inside of
[   33.974989]  allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[   33.976147] 
[   33.977057] The buggy address belongs to the physical page:
[   33.978078] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[   33.979105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.980082] page_type: f5(slab)
[   33.980571] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.981364] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   33.982105] page dumped because: kasan: bad access detected
[   33.982812] 
[   33.983156] Memory state around the buggy address:
[   33.983804]  fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.985022]  fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.986131] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.986851]                       ^
[   33.987373]  fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.988251]  fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.989073] ==================================================================
---
[   34.068683] ==================================================================
[   34.070468] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   34.071322] Read of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[   34.072392] 
[   34.073108] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   34.074065] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.074574] Hardware name: linux,dummy-virt (DT)
[   34.075145] Call trace:
[   34.075868]  show_stack+0x20/0x38 (C)
[   34.076624]  dump_stack_lvl+0x8c/0xd0
[   34.077330]  print_report+0x118/0x5e0
[   34.078045]  kasan_report+0xc8/0x118
[   34.078739]  __asan_report_load8_noabort+0x20/0x30
[   34.079546]  kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   34.080371]  kasan_bitops_generic+0x110/0x1c8
[   34.080942]  kunit_try_run_case+0x14c/0x3d0
[   34.081527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.082241]  kthread+0x24c/0x2d0
[   34.082781]  ret_from_fork+0x10/0x20
[   34.083330] 
[   34.083685] Allocated by task 249:
[   34.084223]  kasan_save_stack+0x3c/0x68
[   34.084726]  kasan_save_track+0x20/0x40
[   34.085325]  kasan_save_alloc_info+0x40/0x58
[   34.085900]  __kasan_kmalloc+0xd4/0xd8
[   34.086518]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.087174]  kasan_bitops_generic+0xa0/0x1c8
[   34.087809]  kunit_try_run_case+0x14c/0x3d0
[   34.088368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.089115]  kthread+0x24c/0x2d0
[   34.089637]  ret_from_fork+0x10/0x20
[   34.090172] 
[   34.090536] The buggy address belongs to the object at fff00000c5abd180
[   34.090536]  which belongs to the cache kmalloc-16 of size 16
[   34.091685] The buggy address is located 8 bytes inside of
[   34.091685]  allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[   34.092858] 
[   34.093229] The buggy address belongs to the physical page:
[   34.093743] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[   34.094721] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.095417] page_type: f5(slab)
[   34.095945] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.096667] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.097560] page dumped because: kasan: bad access detected
[   34.098205] 
[   34.098566] Memory state around the buggy address:
[   34.099217]  fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.100019]  fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.100756] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.101472]                       ^
[   34.101989]  fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.102750]  fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.103561] ==================================================================

test log snippet boot parser 5

Home

[   33.830320] ==================================================================
[   33.831523] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8
[   33.832558] Write of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[   33.833871] 
[   33.834551] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   33.835488] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.835972] Hardware name: linux,dummy-virt (DT)
[   33.836949] Call trace:
[   33.837540]  show_stack+0x20/0x38 (C)
[   33.838379]  dump_stack_lvl+0x8c/0xd0
[   33.839136]  print_report+0x118/0x5e0
[   33.839861]  kasan_report+0xc8/0x118
[   33.840599]  kasan_check_range+0x100/0x1a8
[   33.841368]  __kasan_check_write+0x20/0x30
[   33.842340]  kasan_bitops_modify.constprop.0+0x100/0xbc8
[   33.843205]  kasan_bitops_generic+0x110/0x1c8
[   33.843993]  kunit_try_run_case+0x14c/0x3d0
[   33.844783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.845525]  kthread+0x24c/0x2d0
[   33.846468]  ret_from_fork+0x10/0x20
[   33.846997] 
[   33.847451] Allocated by task 249:
[   33.848084]  kasan_save_stack+0x3c/0x68
[   33.848655]  kasan_save_track+0x20/0x40
[   33.849430]  kasan_save_alloc_info+0x40/0x58
[   33.850197]  __kasan_kmalloc+0xd4/0xd8
[   33.850669]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.851125]  kasan_bitops_generic+0xa0/0x1c8
[   33.851886]  kunit_try_run_case+0x14c/0x3d0
[   33.852620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.853382]  kthread+0x24c/0x2d0
[   33.854211]  ret_from_fork+0x10/0x20
[   33.854665] 
[   33.854929] The buggy address belongs to the object at fff00000c5abd180
[   33.854929]  which belongs to the cache kmalloc-16 of size 16
[   33.856670] The buggy address is located 8 bytes inside of
[   33.856670]  allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[   33.857886] 
[   33.858252] The buggy address belongs to the physical page:
[   33.859215] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[   33.860131] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.860810] page_type: f5(slab)
[   33.861363] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.862282] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   33.863153] page dumped because: kasan: bad access detected
[   33.863756] 
[   33.864237] Memory state around the buggy address:
[   33.864771]  fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.865577]  fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.866439] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.867087]                       ^
[   33.867623]  fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.868755]  fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.869478] ==================================================================
---
[   34.030884] ==================================================================
[   34.031587] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8
[   34.032627] Write of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[   34.033308] 
[   34.033685] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   34.035240] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.035716] Hardware name: linux,dummy-virt (DT)
[   34.036292] Call trace:
[   34.036720]  show_stack+0x20/0x38 (C)
[   34.037300]  dump_stack_lvl+0x8c/0xd0
[   34.037877]  print_report+0x118/0x5e0
[   34.038471]  kasan_report+0xc8/0x118
[   34.038953]  kasan_check_range+0x100/0x1a8
[   34.039621]  __kasan_check_write+0x20/0x30
[   34.040184]  kasan_bitops_modify.constprop.0+0x320/0xbc8
[   34.040920]  kasan_bitops_generic+0x110/0x1c8
[   34.041468]  kunit_try_run_case+0x14c/0x3d0
[   34.042303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.043292]  kthread+0x24c/0x2d0
[   34.043789]  ret_from_fork+0x10/0x20
[   34.044336] 
[   34.044639] Allocated by task 249:
[   34.045453]  kasan_save_stack+0x3c/0x68
[   34.045880]  kasan_save_track+0x20/0x40
[   34.046702]  kasan_save_alloc_info+0x40/0x58
[   34.047253]  __kasan_kmalloc+0xd4/0xd8
[   34.047812]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.048422]  kasan_bitops_generic+0xa0/0x1c8
[   34.049053]  kunit_try_run_case+0x14c/0x3d0
[   34.049602]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.050627]  kthread+0x24c/0x2d0
[   34.051126]  ret_from_fork+0x10/0x20
[   34.051658] 
[   34.051988] The buggy address belongs to the object at fff00000c5abd180
[   34.051988]  which belongs to the cache kmalloc-16 of size 16
[   34.053187] The buggy address is located 8 bytes inside of
[   34.053187]  allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[   34.055019] 
[   34.055366] The buggy address belongs to the physical page:
[   34.055991] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[   34.057538] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.058179] page_type: f5(slab)
[   34.058706] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.059899] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.060841] page dumped because: kasan: bad access detected
[   34.061461] 
[   34.061793] Memory state around the buggy address:
[   34.062309]  fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.063180]  fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.063906] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.064729]                       ^
[   34.065242]  fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.065993]  fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.066818] ==================================================================
---
[   34.140973] ==================================================================
[   34.141734] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   34.142698] Write of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[   34.143699] 
[   34.144580] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   34.145513] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.146550] Hardware name: linux,dummy-virt (DT)
[   34.147625] Call trace:
[   34.148098]  show_stack+0x20/0x38 (C)
[   34.148713]  dump_stack_lvl+0x8c/0xd0
[   34.149596]  print_report+0x118/0x5e0
[   34.150364]  kasan_report+0xc8/0x118
[   34.150925]  kasan_check_range+0x100/0x1a8
[   34.151495]  __kasan_check_write+0x20/0x30
[   34.152140]  kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   34.152711]  kasan_bitops_generic+0x110/0x1c8
[   34.153391]  kunit_try_run_case+0x14c/0x3d0
[   34.153964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.154695]  kthread+0x24c/0x2d0
[   34.155237]  ret_from_fork+0x10/0x20
[   34.155786] 
[   34.156162] Allocated by task 249:
[   34.156678]  kasan_save_stack+0x3c/0x68
[   34.157305]  kasan_save_track+0x20/0x40
[   34.157844]  kasan_save_alloc_info+0x40/0x58
[   34.158350]  __kasan_kmalloc+0xd4/0xd8
[   34.158928]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.159586]  kasan_bitops_generic+0xa0/0x1c8
[   34.160181]  kunit_try_run_case+0x14c/0x3d0
[   34.160795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.161526]  kthread+0x24c/0x2d0
[   34.162077]  ret_from_fork+0x10/0x20
[   34.162646] 
[   34.162981] The buggy address belongs to the object at fff00000c5abd180
[   34.162981]  which belongs to the cache kmalloc-16 of size 16
[   34.164078] The buggy address is located 8 bytes inside of
[   34.164078]  allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[   34.165274] 
[   34.165628] The buggy address belongs to the physical page:
[   34.166203] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[   34.167066] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.167881] page_type: f5(slab)
[   34.168390] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.169341] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.170197] page dumped because: kasan: bad access detected
[   34.170798] 
[   34.171163] Memory state around the buggy address:
[   34.171738]  fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.172460]  fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.173256] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.174031]                       ^
[   34.174484]  fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.175249]  fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.175982] ==================================================================
---
[   33.910397] ==================================================================
[   33.911167] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   33.912167] Write of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[   33.913070] 
[   33.913548] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   33.914403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.914984] Hardware name: linux,dummy-virt (DT)
[   33.915486] Call trace:
[   33.915921]  show_stack+0x20/0x38 (C)
[   33.917067]  dump_stack_lvl+0x8c/0xd0
[   33.917642]  print_report+0x118/0x5e0
[   33.918589]  kasan_report+0xc8/0x118
[   33.919311]  kasan_check_range+0x100/0x1a8
[   33.920080]  __kasan_check_write+0x20/0x30
[   33.920860]  kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   33.921708]  kasan_bitops_generic+0x110/0x1c8
[   33.922671]  kunit_try_run_case+0x14c/0x3d0
[   33.923252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.923906]  kthread+0x24c/0x2d0
[   33.924369]  ret_from_fork+0x10/0x20
[   33.924881] 
[   33.925381] Allocated by task 249:
[   33.925806]  kasan_save_stack+0x3c/0x68
[   33.926616]  kasan_save_track+0x20/0x40
[   33.927317]  kasan_save_alloc_info+0x40/0x58
[   33.928045]  __kasan_kmalloc+0xd4/0xd8
[   33.928691]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.929181]  kasan_bitops_generic+0xa0/0x1c8
[   33.930171]  kunit_try_run_case+0x14c/0x3d0
[   33.930732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.931373]  kthread+0x24c/0x2d0
[   33.931815]  ret_from_fork+0x10/0x20
[   33.932923] 
[   33.933438] The buggy address belongs to the object at fff00000c5abd180
[   33.933438]  which belongs to the cache kmalloc-16 of size 16
[   33.935142] The buggy address is located 8 bytes inside of
[   33.935142]  allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[   33.936807] 
[   33.937349] The buggy address belongs to the physical page:
[   33.938276] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[   33.939192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.939913] page_type: f5(slab)
[   33.941044] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.941841] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   33.943093] page dumped because: kasan: bad access detected
[   33.943653] 
[   33.943883] Memory state around the buggy address:
[   33.944365]  fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.945110]  fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.945899] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.946792]                       ^
[   33.947686]  fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.948626]  fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.949549] ==================================================================
---
[   34.105994] ==================================================================
[   34.107225] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8
[   34.107954] Write of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[   34.108608] 
[   34.108904] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   34.109689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.110304] Hardware name: linux,dummy-virt (DT)
[   34.110904] Call trace:
[   34.111312]  show_stack+0x20/0x38 (C)
[   34.111860]  dump_stack_lvl+0x8c/0xd0
[   34.112393]  print_report+0x118/0x5e0
[   34.113001]  kasan_report+0xc8/0x118
[   34.113615]  kasan_check_range+0x100/0x1a8
[   34.114268]  __kasan_check_write+0x20/0x30
[   34.114921]  kasan_bitops_modify.constprop.0+0x344/0xbc8
[   34.115576]  kasan_bitops_generic+0x110/0x1c8
[   34.116263]  kunit_try_run_case+0x14c/0x3d0
[   34.116790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.117570]  kthread+0x24c/0x2d0
[   34.118148]  ret_from_fork+0x10/0x20
[   34.118665] 
[   34.119033] Allocated by task 249:
[   34.119545]  kasan_save_stack+0x3c/0x68
[   34.120142]  kasan_save_track+0x20/0x40
[   34.120685]  kasan_save_alloc_info+0x40/0x58
[   34.121333]  __kasan_kmalloc+0xd4/0xd8
[   34.121914]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.122501]  kasan_bitops_generic+0xa0/0x1c8
[   34.123109]  kunit_try_run_case+0x14c/0x3d0
[   34.123622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.124336]  kthread+0x24c/0x2d0
[   34.124850]  ret_from_fork+0x10/0x20
[   34.125380] 
[   34.125733] The buggy address belongs to the object at fff00000c5abd180
[   34.125733]  which belongs to the cache kmalloc-16 of size 16
[   34.126764] The buggy address is located 8 bytes inside of
[   34.126764]  allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[   34.128089] 
[   34.128450] The buggy address belongs to the physical page:
[   34.129172] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[   34.129961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.130777] page_type: f5(slab)
[   34.131330] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.132058] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.132951] page dumped because: kasan: bad access detected
[   34.133671] 
[   34.134028] Memory state around the buggy address:
[   34.134657]  fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.135437]  fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.136151] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.136958]                       ^
[   34.137506]  fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.138288]  fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.139110] ==================================================================
---
[   33.991324] ==================================================================
[   33.992353] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   33.993208] Write of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[   33.993770] 
[   33.995212] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   33.996164] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.996859] Hardware name: linux,dummy-virt (DT)
[   33.997623] Call trace:
[   33.998255]  show_stack+0x20/0x38 (C)
[   33.998991]  dump_stack_lvl+0x8c/0xd0
[   33.999738]  print_report+0x118/0x5e0
[   34.000474]  kasan_report+0xc8/0x118
[   34.001193]  kasan_check_range+0x100/0x1a8
[   34.001933]  __kasan_check_write+0x20/0x30
[   34.002686]  kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   34.003532]  kasan_bitops_generic+0x110/0x1c8
[   34.004175]  kunit_try_run_case+0x14c/0x3d0
[   34.004748]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.005419]  kthread+0x24c/0x2d0
[   34.005884]  ret_from_fork+0x10/0x20
[   34.006681] 
[   34.006980] Allocated by task 249:
[   34.007553]  kasan_save_stack+0x3c/0x68
[   34.008142]  kasan_save_track+0x20/0x40
[   34.008789]  kasan_save_alloc_info+0x40/0x58
[   34.009455]  __kasan_kmalloc+0xd4/0xd8
[   34.010141]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.010638]  kasan_bitops_generic+0xa0/0x1c8
[   34.011143]  kunit_try_run_case+0x14c/0x3d0
[   34.011618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.012263]  kthread+0x24c/0x2d0
[   34.012681]  ret_from_fork+0x10/0x20
[   34.013157] 
[   34.013473] The buggy address belongs to the object at fff00000c5abd180
[   34.013473]  which belongs to the cache kmalloc-16 of size 16
[   34.015246] The buggy address is located 8 bytes inside of
[   34.015246]  allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[   34.016477] 
[   34.016827] The buggy address belongs to the physical page:
[   34.017477] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[   34.018186] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.018998] page_type: f5(slab)
[   34.019559] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.020444] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.021355] page dumped because: kasan: bad access detected
[   34.021996] 
[   34.022364] Memory state around the buggy address:
[   34.022994]  fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.023780]  fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.024520] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.025322]                       ^
[   34.025754]  fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.026539]  fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.027388] ==================================================================

test log snippet boot parser 6

Home

[   34.292358] ==================================================================
[   34.292945] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   34.293872] Write of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[   34.294833] 
[   34.295233] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   34.296389] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.296897] Hardware name: linux,dummy-virt (DT)
[   34.297539] Call trace:
[   34.297984]  show_stack+0x20/0x38 (C)
[   34.298552]  dump_stack_lvl+0x8c/0xd0
[   34.299101]  print_report+0x118/0x5e0
[   34.299790]  kasan_report+0xc8/0x118
[   34.300356]  kasan_check_range+0x100/0x1a8
[   34.300998]  __kasan_check_write+0x20/0x30
[   34.301668]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   34.302521]  kasan_bitops_generic+0x11c/0x1c8
[   34.303153]  kunit_try_run_case+0x14c/0x3d0
[   34.303740]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.304410]  kthread+0x24c/0x2d0
[   34.304966]  ret_from_fork+0x10/0x20
[   34.305582] 
[   34.305976] Allocated by task 249:
[   34.306479]  kasan_save_stack+0x3c/0x68
[   34.307086]  kasan_save_track+0x20/0x40
[   34.307507]  kasan_save_alloc_info+0x40/0x58
[   34.308138]  __kasan_kmalloc+0xd4/0xd8
[   34.308724]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.309389]  kasan_bitops_generic+0xa0/0x1c8
[   34.310044]  kunit_try_run_case+0x14c/0x3d0
[   34.310667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.311403]  kthread+0x24c/0x2d0
[   34.311909]  ret_from_fork+0x10/0x20
[   34.312507] 
[   34.312866] The buggy address belongs to the object at fff00000c5abd180
[   34.312866]  which belongs to the cache kmalloc-16 of size 16
[   34.314234] The buggy address is located 8 bytes inside of
[   34.314234]  allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[   34.316135] 
[   34.316581] The buggy address belongs to the physical page:
[   34.317230] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[   34.318071] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.318871] page_type: f5(slab)
[   34.319457] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.320431] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.321420] page dumped because: kasan: bad access detected
[   34.322184] 
[   34.322591] Memory state around the buggy address:
[   34.323264]  fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.324223]  fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.325102] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.325994]                       ^
[   34.326568]  fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.327454]  fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.328379] ==================================================================
---
[   34.216285] ==================================================================
[   34.217328] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   34.218516] Write of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[   34.219338] 
[   34.219724] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   34.220666] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.221201] Hardware name: linux,dummy-virt (DT)
[   34.221799] Call trace:
[   34.222252]  show_stack+0x20/0x38 (C)
[   34.222884]  dump_stack_lvl+0x8c/0xd0
[   34.223637]  print_report+0x118/0x5e0
[   34.224713]  kasan_report+0xc8/0x118
[   34.225405]  kasan_check_range+0x100/0x1a8
[   34.226594]  __kasan_check_write+0x20/0x30
[   34.227096]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   34.228214]  kasan_bitops_generic+0x11c/0x1c8
[   34.228893]  kunit_try_run_case+0x14c/0x3d0
[   34.229634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.230388]  kthread+0x24c/0x2d0
[   34.230940]  ret_from_fork+0x10/0x20
[   34.231526] 
[   34.231913] Allocated by task 249:
[   34.232452]  kasan_save_stack+0x3c/0x68
[   34.233093]  kasan_save_track+0x20/0x40
[   34.233732]  kasan_save_alloc_info+0x40/0x58
[   34.234395]  __kasan_kmalloc+0xd4/0xd8
[   34.235022]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.235611]  kasan_bitops_generic+0xa0/0x1c8
[   34.236294]  kunit_try_run_case+0x14c/0x3d0
[   34.236877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.237622]  kthread+0x24c/0x2d0
[   34.238187]  ret_from_fork+0x10/0x20
[   34.238738] 
[   34.239126] The buggy address belongs to the object at fff00000c5abd180
[   34.239126]  which belongs to the cache kmalloc-16 of size 16
[   34.240401] The buggy address is located 8 bytes inside of
[   34.240401]  allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[   34.241644] 
[   34.242026] The buggy address belongs to the physical page:
[   34.242713] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[   34.243579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.244429] page_type: f5(slab)
[   34.244962] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.245856] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.246696] page dumped because: kasan: bad access detected
[   34.247365] 
[   34.247711] Memory state around the buggy address:
[   34.248407]  fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.249141]  fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.250048] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.250796]                       ^
[   34.251310]  fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.252161]  fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.253043] ==================================================================
---
[   34.366388] ==================================================================
[   34.367181] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   34.368064] Write of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[   34.368770] 
[   34.369164] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   34.370218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.370802] Hardware name: linux,dummy-virt (DT)
[   34.371483] Call trace:
[   34.371825]  show_stack+0x20/0x38 (C)
[   34.372446]  dump_stack_lvl+0x8c/0xd0
[   34.373053]  print_report+0x118/0x5e0
[   34.373667]  kasan_report+0xc8/0x118
[   34.374305]  kasan_check_range+0x100/0x1a8
[   34.374846]  __kasan_check_write+0x20/0x30
[   34.375513]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   34.376263]  kasan_bitops_generic+0x11c/0x1c8
[   34.376937]  kunit_try_run_case+0x14c/0x3d0
[   34.377613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.378348]  kthread+0x24c/0x2d0
[   34.378883]  ret_from_fork+0x10/0x20
[   34.379493] 
[   34.379843] Allocated by task 249:
[   34.380391]  kasan_save_stack+0x3c/0x68
[   34.380961]  kasan_save_track+0x20/0x40
[   34.381560]  kasan_save_alloc_info+0x40/0x58
[   34.382204]  __kasan_kmalloc+0xd4/0xd8
[   34.382740]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.383407]  kasan_bitops_generic+0xa0/0x1c8
[   34.383970]  kunit_try_run_case+0x14c/0x3d0
[   34.384560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.385305]  kthread+0x24c/0x2d0
[   34.385738]  ret_from_fork+0x10/0x20
[   34.386321] 
[   34.386660] The buggy address belongs to the object at fff00000c5abd180
[   34.386660]  which belongs to the cache kmalloc-16 of size 16
[   34.387879] The buggy address is located 8 bytes inside of
[   34.387879]  allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[   34.389086] 
[   34.389451] The buggy address belongs to the physical page:
[   34.390105] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[   34.390905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.391675] page_type: f5(slab)
[   34.392172] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.392971] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.394073] page dumped because: kasan: bad access detected
[   34.394718] 
[   34.395508] Memory state around the buggy address:
[   34.396064]  fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.396869]  fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.397652] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.398403]                       ^
[   34.398930]  fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.399691]  fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.400455] ==================================================================
---
[   34.438902] ==================================================================
[   34.439645] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   34.440430] Write of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[   34.441299] 
[   34.441627] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   34.442517] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.443113] Hardware name: linux,dummy-virt (DT)
[   34.443735] Call trace:
[   34.444144]  show_stack+0x20/0x38 (C)
[   34.444798]  dump_stack_lvl+0x8c/0xd0
[   34.445342]  print_report+0x118/0x5e0
[   34.445949]  kasan_report+0xc8/0x118
[   34.446515]  kasan_check_range+0x100/0x1a8
[   34.447164]  __kasan_check_write+0x20/0x30
[   34.447752]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   34.448564]  kasan_bitops_generic+0x11c/0x1c8
[   34.449114]  kunit_try_run_case+0x14c/0x3d0
[   34.449819]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.450539]  kthread+0x24c/0x2d0
[   34.451135]  ret_from_fork+0x10/0x20
[   34.451729] 
[   34.452089] Allocated by task 249:
[   34.452525]  kasan_save_stack+0x3c/0x68
[   34.453129]  kasan_save_track+0x20/0x40
[   34.453602]  kasan_save_alloc_info+0x40/0x58
[   34.454277]  __kasan_kmalloc+0xd4/0xd8
[   34.454773]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.455428]  kasan_bitops_generic+0xa0/0x1c8
[   34.455815]  kunit_try_run_case+0x14c/0x3d0
[   34.456463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.457177]  kthread+0x24c/0x2d0
[   34.457607]  ret_from_fork+0x10/0x20
[   34.458188] 
[   34.458529] The buggy address belongs to the object at fff00000c5abd180
[   34.458529]  which belongs to the cache kmalloc-16 of size 16
[   34.459710] The buggy address is located 8 bytes inside of
[   34.459710]  allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[   34.460937] 
[   34.461312] The buggy address belongs to the physical page:
[   34.461885] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[   34.462774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.463460] page_type: f5(slab)
[   34.463999] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.464828] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.465719] page dumped because: kasan: bad access detected
[   34.466379] 
[   34.466683] Memory state around the buggy address:
[   34.467330]  fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.468017]  fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.468870] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.469506]                       ^
[   34.470053]  fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.470860]  fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.471626] ==================================================================

test log snippet boot parser 7

Home

[   34.508019] ==================================================================
[   34.508842] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   34.509739] Read of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[   34.510670] 
[   34.511067] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   34.511872] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.512480] Hardware name: linux,dummy-virt (DT)
[   34.513116] Call trace:
[   34.513527]  show_stack+0x20/0x38 (C)
[   34.514080]  dump_stack_lvl+0x8c/0xd0
[   34.514725]  print_report+0x118/0x5e0
[   34.515345]  kasan_report+0xc8/0x118
[   34.515853]  __asan_report_load8_noabort+0x20/0x30
[   34.516577]  kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   34.517316]  kasan_bitops_generic+0x11c/0x1c8
[   34.517862]  kunit_try_run_case+0x14c/0x3d0
[   34.518526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.519136]  kthread+0x24c/0x2d0
[   34.519686]  ret_from_fork+0x10/0x20
[   34.520308] 
[   34.520654] Allocated by task 249:
[   34.521197]  kasan_save_stack+0x3c/0x68
[   34.521791]  kasan_save_track+0x20/0x40
[   34.522313]  kasan_save_alloc_info+0x40/0x58
[   34.522926]  __kasan_kmalloc+0xd4/0xd8
[   34.523548]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.524253]  kasan_bitops_generic+0xa0/0x1c8
[   34.524831]  kunit_try_run_case+0x14c/0x3d0
[   34.525380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.526131]  kthread+0x24c/0x2d0
[   34.526614]  ret_from_fork+0x10/0x20
[   34.527110] 
[   34.527466] The buggy address belongs to the object at fff00000c5abd180
[   34.527466]  which belongs to the cache kmalloc-16 of size 16
[   34.528645] The buggy address is located 8 bytes inside of
[   34.528645]  allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[   34.529765] 
[   34.530129] The buggy address belongs to the physical page:
[   34.530790] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[   34.531656] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.532407] page_type: f5(slab)
[   34.532898] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.533668] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.534589] page dumped because: kasan: bad access detected
[   34.535204] 
[   34.535559] Memory state around the buggy address:
[   34.536195]  fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.536951]  fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.537632] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.538472]                       ^
[   34.538954]  fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.539708]  fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.540470] ==================================================================
---
[   34.331330] ==================================================================
[   34.332329] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   34.333232] Read of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[   34.334382] 
[   34.334729] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   34.335744] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.336264] Hardware name: linux,dummy-virt (DT)
[   34.336800] Call trace:
[   34.337242]  show_stack+0x20/0x38 (C)
[   34.337794]  dump_stack_lvl+0x8c/0xd0
[   34.338369]  print_report+0x118/0x5e0
[   34.338923]  kasan_report+0xc8/0x118
[   34.339531]  __asan_report_load8_noabort+0x20/0x30
[   34.340205]  kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   34.340985]  kasan_bitops_generic+0x11c/0x1c8
[   34.341660]  kunit_try_run_case+0x14c/0x3d0
[   34.342225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.342983]  kthread+0x24c/0x2d0
[   34.343525]  ret_from_fork+0x10/0x20
[   34.344064] 
[   34.344454] Allocated by task 249:
[   34.344970]  kasan_save_stack+0x3c/0x68
[   34.345488]  kasan_save_track+0x20/0x40
[   34.346086]  kasan_save_alloc_info+0x40/0x58
[   34.346675]  __kasan_kmalloc+0xd4/0xd8
[   34.347263]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.347778]  kasan_bitops_generic+0xa0/0x1c8
[   34.348432]  kunit_try_run_case+0x14c/0x3d0
[   34.349029]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.349675]  kthread+0x24c/0x2d0
[   34.350232]  ret_from_fork+0x10/0x20
[   34.350779] 
[   34.351129] The buggy address belongs to the object at fff00000c5abd180
[   34.351129]  which belongs to the cache kmalloc-16 of size 16
[   34.352254] The buggy address is located 8 bytes inside of
[   34.352254]  allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[   34.353382] 
[   34.353741] The buggy address belongs to the physical page:
[   34.354398] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[   34.355272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.356055] page_type: f5(slab)
[   34.356552] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.357397] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.358202] page dumped because: kasan: bad access detected
[   34.358814] 
[   34.359182] Memory state around the buggy address:
[   34.359743]  fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.360532]  fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.361330] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.362001]                       ^
[   34.362696]  fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.363494]  fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.364296] ==================================================================
---
[   34.255133] ==================================================================
[   34.255740] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   34.256748] Read of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[   34.258596] 
[   34.258974] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   34.260055] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.260652] Hardware name: linux,dummy-virt (DT)
[   34.261215] Call trace:
[   34.261574]  show_stack+0x20/0x38 (C)
[   34.262087]  dump_stack_lvl+0x8c/0xd0
[   34.262595]  print_report+0x118/0x5e0
[   34.263163]  kasan_report+0xc8/0x118
[   34.263694]  __asan_report_load8_noabort+0x20/0x30
[   34.264447]  kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   34.265241]  kasan_bitops_generic+0x11c/0x1c8
[   34.265965]  kunit_try_run_case+0x14c/0x3d0
[   34.266621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.267369]  kthread+0x24c/0x2d0
[   34.268033]  ret_from_fork+0x10/0x20
[   34.268662] 
[   34.269050] Allocated by task 249:
[   34.269619]  kasan_save_stack+0x3c/0x68
[   34.270236]  kasan_save_track+0x20/0x40
[   34.270890]  kasan_save_alloc_info+0x40/0x58
[   34.271566]  __kasan_kmalloc+0xd4/0xd8
[   34.272187]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.272880]  kasan_bitops_generic+0xa0/0x1c8
[   34.273560]  kunit_try_run_case+0x14c/0x3d0
[   34.274224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.274962]  kthread+0x24c/0x2d0
[   34.275542]  ret_from_fork+0x10/0x20
[   34.276173] 
[   34.276555] The buggy address belongs to the object at fff00000c5abd180
[   34.276555]  which belongs to the cache kmalloc-16 of size 16
[   34.277815] The buggy address is located 8 bytes inside of
[   34.277815]  allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[   34.279126] 
[   34.279548] The buggy address belongs to the physical page:
[   34.280333] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[   34.281245] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.282098] page_type: f5(slab)
[   34.282633] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.283564] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.284456] page dumped because: kasan: bad access detected
[   34.285165] 
[   34.285547] Memory state around the buggy address:
[   34.286199]  fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.287074]  fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.287922] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.288662]                       ^
[   34.289088]  fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.289765]  fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.290338] ==================================================================
---
[   34.403196] ==================================================================
[   34.403834] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   34.404869] Read of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[   34.405619] 
[   34.406058] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   34.407035] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.407572] Hardware name: linux,dummy-virt (DT)
[   34.408213] Call trace:
[   34.408655]  show_stack+0x20/0x38 (C)
[   34.409228]  dump_stack_lvl+0x8c/0xd0
[   34.409842]  print_report+0x118/0x5e0
[   34.410459]  kasan_report+0xc8/0x118
[   34.411023]  __asan_report_load8_noabort+0x20/0x30
[   34.411710]  kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   34.412456]  kasan_bitops_generic+0x11c/0x1c8
[   34.413113]  kunit_try_run_case+0x14c/0x3d0
[   34.413645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.414449]  kthread+0x24c/0x2d0
[   34.414944]  ret_from_fork+0x10/0x20
[   34.415535] 
[   34.415857] Allocated by task 249:
[   34.416326]  kasan_save_stack+0x3c/0x68
[   34.416928]  kasan_save_track+0x20/0x40
[   34.417444]  kasan_save_alloc_info+0x40/0x58
[   34.418090]  __kasan_kmalloc+0xd4/0xd8
[   34.418601]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.419281]  kasan_bitops_generic+0xa0/0x1c8
[   34.419895]  kunit_try_run_case+0x14c/0x3d0
[   34.420497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.421249]  kthread+0x24c/0x2d0
[   34.421770]  ret_from_fork+0x10/0x20
[   34.422357] 
[   34.422702] The buggy address belongs to the object at fff00000c5abd180
[   34.422702]  which belongs to the cache kmalloc-16 of size 16
[   34.423843] The buggy address is located 8 bytes inside of
[   34.423843]  allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[   34.425316] 
[   34.425676] The buggy address belongs to the physical page:
[   34.426333] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[   34.427144] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.427887] page_type: f5(slab)
[   34.428440] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.429282] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.430187] page dumped because: kasan: bad access detected
[   34.430836] 
[   34.431199] Memory state around the buggy address:
[   34.431835]  fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.432717]  fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.433474] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.434167]                       ^
[   34.434736]  fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.435489]  fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.436298] ==================================================================
---
[   34.473464] ==================================================================
[   34.474427] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   34.475360] Read of size 8 at addr fff00000c5abd188 by task kunit_try_catch/249
[   34.476159] 
[   34.476514] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   34.477548] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.478135] Hardware name: linux,dummy-virt (DT)
[   34.478699] Call trace:
[   34.479103]  show_stack+0x20/0x38 (C)
[   34.479655]  dump_stack_lvl+0x8c/0xd0
[   34.480299]  print_report+0x118/0x5e0
[   34.480919]  kasan_report+0xc8/0x118
[   34.481477]  __asan_report_load8_noabort+0x20/0x30
[   34.482140]  kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   34.482875]  kasan_bitops_generic+0x11c/0x1c8
[   34.483542]  kunit_try_run_case+0x14c/0x3d0
[   34.484137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.484904]  kthread+0x24c/0x2d0
[   34.485464]  ret_from_fork+0x10/0x20
[   34.486363] 
[   34.486697] Allocated by task 249:
[   34.487039]  kasan_save_stack+0x3c/0x68
[   34.487636]  kasan_save_track+0x20/0x40
[   34.488253]  kasan_save_alloc_info+0x40/0x58
[   34.488843]  __kasan_kmalloc+0xd4/0xd8
[   34.489319]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.489976]  kasan_bitops_generic+0xa0/0x1c8
[   34.490613]  kunit_try_run_case+0x14c/0x3d0
[   34.491123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.491862]  kthread+0x24c/0x2d0
[   34.492334]  ret_from_fork+0x10/0x20
[   34.492908] 
[   34.493267] The buggy address belongs to the object at fff00000c5abd180
[   34.493267]  which belongs to the cache kmalloc-16 of size 16
[   34.494375] The buggy address is located 8 bytes inside of
[   34.494375]  allocated 9-byte region [fff00000c5abd180, fff00000c5abd189)
[   34.495505] 
[   34.495859] The buggy address belongs to the physical page:
[   34.496568] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[   34.497430] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.498182] page_type: f5(slab)
[   34.498709] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.499586] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.500386] page dumped because: kasan: bad access detected
[   34.501032] 
[   34.501377] Memory state around the buggy address:
[   34.501874]  fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.502719]  fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.503466] >fff00000c5abd180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.504154]                       ^
[   34.504720]  fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.505506]  fff00000c5abd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.506256] ==================================================================

test log snippet boot parser 8

Home

[   30.465041] ==================================================================
[   30.465896] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   30.466695] Write of size 16 at addr fff00000c5abd120 by task kunit_try_catch/154
[   30.467720] 
[   30.468130] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.469579] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.470593] Hardware name: linux,dummy-virt (DT)
[   30.471047] Call trace:
[   30.471482]  show_stack+0x20/0x38 (C)
[   30.472162]  dump_stack_lvl+0x8c/0xd0
[   30.472838]  print_report+0x118/0x5e0
[   30.473527]  kasan_report+0xc8/0x118
[   30.474458]  __asan_report_store16_noabort+0x20/0x30
[   30.475245]  kmalloc_oob_16+0x3a0/0x3f8
[   30.475722]  kunit_try_run_case+0x14c/0x3d0
[   30.476321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.477026]  kthread+0x24c/0x2d0
[   30.477581]  ret_from_fork+0x10/0x20
[   30.478396] 
[   30.478747] Allocated by task 154:
[   30.479150]  kasan_save_stack+0x3c/0x68
[   30.479713]  kasan_save_track+0x20/0x40
[   30.480294]  kasan_save_alloc_info+0x40/0x58
[   30.480885]  __kasan_kmalloc+0xd4/0xd8
[   30.481523]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.482490]  kmalloc_oob_16+0xb4/0x3f8
[   30.483073]  kunit_try_run_case+0x14c/0x3d0
[   30.483731]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.484369]  kthread+0x24c/0x2d0
[   30.484939]  ret_from_fork+0x10/0x20
[   30.485450] 
[   30.485819] The buggy address belongs to the object at fff00000c5abd120
[   30.485819]  which belongs to the cache kmalloc-16 of size 16
[   30.487499] The buggy address is located 0 bytes inside of
[   30.487499]  allocated 13-byte region [fff00000c5abd120, fff00000c5abd12d)
[   30.488685] 
[   30.489184] The buggy address belongs to the physical page:
[   30.490184] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[   30.490607] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.490939] page_type: f5(slab)
[   30.491515] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.492471] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   30.493270] page dumped because: kasan: bad access detected
[   30.494262] 
[   30.494594] Memory state around the buggy address:
[   30.495910]  fff00000c5abd000: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 04 fc fc
[   30.497046]  fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.498048] >fff00000c5abd100: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc
[   30.498992]                                   ^
[   30.499474]  fff00000c5abd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.500274]  fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.500972] ==================================================================

test log snippet boot parser 9

Home

[   30.465041] ==================================================================
[   30.465896] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   30.466695] Write of size 16 at addr fff00000c5abd120 by task kunit_try_catch/154
[   30.467720] 
[   30.468130] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.469579] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.470593] Hardware name: linux,dummy-virt (DT)
[   30.471047] Call trace:
[   30.471482]  show_stack+0x20/0x38 (C)
[   30.472162]  dump_stack_lvl+0x8c/0xd0
[   30.472838]  print_report+0x118/0x5e0
[   30.473527]  kasan_report+0xc8/0x118
[   30.474458]  __asan_report_store16_noabort+0x20/0x30
[   30.475245]  kmalloc_oob_16+0x3a0/0x3f8
[   30.475722]  kunit_try_run_case+0x14c/0x3d0
[   30.476321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.477026]  kthread+0x24c/0x2d0
[   30.477581]  ret_from_fork+0x10/0x20
[   30.478396] 
[   30.478747] Allocated by task 154:
[   30.479150]  kasan_save_stack+0x3c/0x68
[   30.479713]  kasan_save_track+0x20/0x40
[   30.480294]  kasan_save_alloc_info+0x40/0x58
[   30.480885]  __kasan_kmalloc+0xd4/0xd8
[   30.481523]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.482490]  kmalloc_oob_16+0xb4/0x3f8
[   30.483073]  kunit_try_run_case+0x14c/0x3d0
[   30.483731]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.484369]  kthread+0x24c/0x2d0
[   30.484939]  ret_from_fork+0x10/0x20
[   30.485450] 
[   30.485819] The buggy address belongs to the object at fff00000c5abd120
[   30.485819]  which belongs to the cache kmalloc-16 of size 16
[   30.487499] The buggy address is located 0 bytes inside of
[   30.487499]  allocated 13-byte region [fff00000c5abd120, fff00000c5abd12d)
[   30.488685] 
[   30.489184] The buggy address belongs to the physical page:
[   30.490184] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[   30.490607] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.490939] page_type: f5(slab)
[   30.491515] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.492471] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   30.493270] page dumped because: kasan: bad access detected
[   30.494262] 
[   30.494594] Memory state around the buggy address:
[   30.495910]  fff00000c5abd000: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 04 fc fc
[   30.497046]  fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.498048] >fff00000c5abd100: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc
[   30.498992]                                   ^
[   30.499474]  fff00000c5abd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.500274]  fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.500972] ==================================================================

test log snippet boot parser 10

Home

[   29.331899] ==================================================================
[   29.333056] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   29.334443] Read of size 1 at addr fff00000c5abd0ff by task kunit_try_catch/126
[   29.335326] 
[   29.335802] CPU: 1 UID: 0 PID: 126 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.336906] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.337577] Hardware name: linux,dummy-virt (DT)
[   29.338419] Call trace:
[   29.338891]  show_stack+0x20/0x38 (C)
[   29.339535]  dump_stack_lvl+0x8c/0xd0
[   29.340092]  print_report+0x118/0x5e0
[   29.340717]  kasan_report+0xc8/0x118
[   29.341309]  __asan_report_load1_noabort+0x20/0x30
[   29.342001]  kmalloc_oob_left+0x2ec/0x320
[   29.342523]  kunit_try_run_case+0x14c/0x3d0
[   29.343210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.343919]  kthread+0x24c/0x2d0
[   29.344571]  ret_from_fork+0x10/0x20
[   29.345208] 
[   29.345572] Allocated by task 1:
[   29.346387]  kasan_save_stack+0x3c/0x68
[   29.347079]  kasan_save_track+0x20/0x40
[   29.347607]  kasan_save_alloc_info+0x40/0x58
[   29.348325]  __kasan_kmalloc+0xd4/0xd8
[   29.348844]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   29.349370]  kvasprintf+0xcc/0x170
[   29.349930]  kasprintf+0xa8/0xe8
[   29.350362]  input_devnode+0x84/0xb8
[   29.350939]  device_get_devnode+0x114/0x258
[   29.351896]  dev_uevent+0x334/0x5b8
[   29.352438]  kobject_uevent_env+0x424/0xc98
[   29.353065]  kobject_uevent+0x14/0x20
[   29.353609]  device_add+0xc00/0x12b8
[   29.354268]  cdev_device_add+0xdc/0x208
[   29.355563]  evdev_connect+0x2e0/0x410
[   29.356021]  input_attach_handler.isra.0+0xec/0x1d8
[   29.356876]  input_register_device+0x48c/0x9d8
[   29.358284]  gpio_keys_probe+0xabc/0x1ec8
[   29.358853]  platform_probe+0xcc/0x198
[   29.359385]  really_probe+0x188/0x7f0
[   29.359979]  __driver_probe_device+0x164/0x378
[   29.360563]  driver_probe_device+0x64/0x180
[   29.361451]  __driver_attach+0x1cc/0x478
[   29.362074]  bus_for_each_dev+0x104/0x198
[   29.362885]  driver_attach+0x44/0x68
[   29.363389]  bus_add_driver+0x23c/0x4e8
[   29.363904]  driver_register+0xf8/0x3d0
[   29.364420]  __platform_driver_register+0x64/0x98
[   29.364957]  gpio_keys_init+0x24/0x38
[   29.365562]  do_one_initcall+0xcc/0x628
[   29.366658]  kernel_init_freeable+0x3e0/0x8b0
[   29.367268]  kernel_init+0x2c/0x1f8
[   29.367764]  ret_from_fork+0x10/0x20
[   29.368318] 
[   29.368657] Freed by task 1:
[   29.369175]  kasan_save_stack+0x3c/0x68
[   29.369659]  kasan_save_track+0x20/0x40
[   29.370556]  kasan_save_free_info+0x4c/0x78
[   29.371283]  __kasan_slab_free+0x6c/0x98
[   29.372033]  kfree+0x114/0x3c8
[   29.372454]  dev_uevent+0x368/0x5b8
[   29.372898]  kobject_uevent_env+0x424/0xc98
[   29.373420]  kobject_uevent+0x14/0x20
[   29.373888]  device_add+0xc00/0x12b8
[   29.375136]  cdev_device_add+0xdc/0x208
[   29.375719]  evdev_connect+0x2e0/0x410
[   29.376233]  input_attach_handler.isra.0+0xec/0x1d8
[   29.376893]  input_register_device+0x48c/0x9d8
[   29.378292]  gpio_keys_probe+0xabc/0x1ec8
[   29.378994]  platform_probe+0xcc/0x198
[   29.379591]  really_probe+0x188/0x7f0
[   29.380077]  __driver_probe_device+0x164/0x378
[   29.380704]  driver_probe_device+0x64/0x180
[   29.381311]  __driver_attach+0x1cc/0x478
[   29.382111]  bus_for_each_dev+0x104/0x198
[   29.382936]  driver_attach+0x44/0x68
[   29.383416]  bus_add_driver+0x23c/0x4e8
[   29.383866]  driver_register+0xf8/0x3d0
[   29.384763]  __platform_driver_register+0x64/0x98
[   29.385611]  gpio_keys_init+0x24/0x38
[   29.386384]  do_one_initcall+0xcc/0x628
[   29.386901]  kernel_init_freeable+0x3e0/0x8b0
[   29.387539]  kernel_init+0x2c/0x1f8
[   29.388036]  ret_from_fork+0x10/0x20
[   29.388595] 
[   29.388960] The buggy address belongs to the object at fff00000c5abd0e0
[   29.388960]  which belongs to the cache kmalloc-16 of size 16
[   29.390519] The buggy address is located 15 bytes to the right of
[   29.390519]  allocated 16-byte region [fff00000c5abd0e0, fff00000c5abd0f0)
[   29.391740] 
[   29.392252] The buggy address belongs to the physical page:
[   29.392849] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[   29.393642] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.395079] page_type: f5(slab)
[   29.395478] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   29.396081] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   29.396661] page dumped because: kasan: bad access detected
[   29.397389] 
[   29.397737] Memory state around the buggy address:
[   29.398703]  fff00000c5abcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.399428]  fff00000c5abd000: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 04 fc fc
[   29.400365] >fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.401074]                                                                 ^
[   29.402268]  fff00000c5abd100: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.402993]  fff00000c5abd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.403803] ==================================================================

test log snippet boot parser 11

Home

[   33.490877] ==================================================================
[   33.492203] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   33.493212] Read of size 1 at addr fff00000c66d4598 by task kunit_try_catch/245
[   33.493824] 
[   33.494483] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   33.496053] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.496848] Hardware name: linux,dummy-virt (DT)
[   33.497433] Call trace:
[   33.497911]  show_stack+0x20/0x38 (C)
[   33.499312]  dump_stack_lvl+0x8c/0xd0
[   33.499936]  print_report+0x118/0x5e0
[   33.500568]  kasan_report+0xc8/0x118
[   33.501216]  __asan_report_load1_noabort+0x20/0x30
[   33.501875]  memcmp+0x198/0x1d8
[   33.502444]  kasan_memcmp+0x16c/0x300
[   33.502982]  kunit_try_run_case+0x14c/0x3d0
[   33.503560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.504601]  kthread+0x24c/0x2d0
[   33.505123]  ret_from_fork+0x10/0x20
[   33.505715] 
[   33.506605] Allocated by task 245:
[   33.507200]  kasan_save_stack+0x3c/0x68
[   33.507692]  kasan_save_track+0x20/0x40
[   33.508317]  kasan_save_alloc_info+0x40/0x58
[   33.508932]  __kasan_kmalloc+0xd4/0xd8
[   33.509725]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.510707]  kasan_memcmp+0xbc/0x300
[   33.511302]  kunit_try_run_case+0x14c/0x3d0
[   33.511892]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.512645]  kthread+0x24c/0x2d0
[   33.513208]  ret_from_fork+0x10/0x20
[   33.513826] 
[   33.514972] The buggy address belongs to the object at fff00000c66d4580
[   33.514972]  which belongs to the cache kmalloc-32 of size 32
[   33.516197] The buggy address is located 0 bytes to the right of
[   33.516197]  allocated 24-byte region [fff00000c66d4580, fff00000c66d4598)
[   33.517509] 
[   33.517830] The buggy address belongs to the physical page:
[   33.518548] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066d4
[   33.519841] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.520601] page_type: f5(slab)
[   33.521163] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.522164] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   33.522882] page dumped because: kasan: bad access detected
[   33.524191] 
[   33.524449] Memory state around the buggy address:
[   33.525139]  fff00000c66d4480: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.526389]  fff00000c66d4500: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.526996] >fff00000c66d4580: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.527890]                             ^
[   33.528455]  fff00000c66d4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.529319]  fff00000c66d4680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.530170] ==================================================================

test log snippet boot parser 12

Home

[   31.095554] ==================================================================
[   31.096757] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   31.097471] Read of size 1 at addr fff00000c5abd160 by task kunit_try_catch/180
[   31.098386] 
[   31.099322] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   31.100202] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.101177] Hardware name: linux,dummy-virt (DT)
[   31.102160] Call trace:
[   31.102606]  show_stack+0x20/0x38 (C)
[   31.103290]  dump_stack_lvl+0x8c/0xd0
[   31.103816]  print_report+0x118/0x5e0
[   31.104233]  kasan_report+0xc8/0x118
[   31.104502]  __kasan_check_byte+0x54/0x70
[   31.104763]  kfree_sensitive+0x30/0xb0
[   31.105060]  kmalloc_double_kzfree+0x168/0x308
[   31.105817]  kunit_try_run_case+0x14c/0x3d0
[   31.106617]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.107761]  kthread+0x24c/0x2d0
[   31.108321]  ret_from_fork+0x10/0x20
[   31.109032] 
[   31.109464] Allocated by task 180:
[   31.109931]  kasan_save_stack+0x3c/0x68
[   31.110413]  kasan_save_track+0x20/0x40
[   31.110989]  kasan_save_alloc_info+0x40/0x58
[   31.111896]  __kasan_kmalloc+0xd4/0xd8
[   31.112463]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.113047]  kmalloc_double_kzfree+0xb8/0x308
[   31.113674]  kunit_try_run_case+0x14c/0x3d0
[   31.114518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.115213]  kthread+0x24c/0x2d0
[   31.115648]  ret_from_fork+0x10/0x20
[   31.116223] 
[   31.116564] Freed by task 180:
[   31.117071]  kasan_save_stack+0x3c/0x68
[   31.117637]  kasan_save_track+0x20/0x40
[   31.118878]  kasan_save_free_info+0x4c/0x78
[   31.119719]  __kasan_slab_free+0x6c/0x98
[   31.120380]  kfree+0x114/0x3c8
[   31.120889]  kfree_sensitive+0x80/0xb0
[   31.121410]  kmalloc_double_kzfree+0x11c/0x308
[   31.122331]  kunit_try_run_case+0x14c/0x3d0
[   31.122942]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.123709]  kthread+0x24c/0x2d0
[   31.124259]  ret_from_fork+0x10/0x20
[   31.124819] 
[   31.125161] The buggy address belongs to the object at fff00000c5abd160
[   31.125161]  which belongs to the cache kmalloc-16 of size 16
[   31.126659] The buggy address is located 0 bytes inside of
[   31.126659]  freed 16-byte region [fff00000c5abd160, fff00000c5abd170)
[   31.127944] 
[   31.128298] The buggy address belongs to the physical page:
[   31.128927] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abd
[   31.129725] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.130638] page_type: f5(slab)
[   31.131339] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.132167] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   31.132936] page dumped because: kasan: bad access detected
[   31.133680] 
[   31.134396] Memory state around the buggy address:
[   31.134988]  fff00000c5abd000: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 04 fc fc
[   31.135814]  fff00000c5abd080: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.136658] >fff00000c5abd100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.137475]                                                        ^
[   31.138464]  fff00000c5abd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.139037]  fff00000c5abd200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.139834] ==================================================================

test log snippet boot parser 13

Home

[   30.918505] ==================================================================
[   30.919780] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   30.920548] Read of size 1 at addr fff00000c605f948 by task kunit_try_catch/172
[   30.921578] 
[   30.922719] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.923616] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.924247] Hardware name: linux,dummy-virt (DT)
[   30.924728] Call trace:
[   30.925180]  show_stack+0x20/0x38 (C)
[   30.925760]  dump_stack_lvl+0x8c/0xd0
[   30.926375]  print_report+0x118/0x5e0
[   30.926970]  kasan_report+0xc8/0x118
[   30.927569]  __asan_report_load1_noabort+0x20/0x30
[   30.928473]  kmalloc_uaf+0x300/0x338
[   30.929039]  kunit_try_run_case+0x14c/0x3d0
[   30.929618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.930729]  kthread+0x24c/0x2d0
[   30.931236]  ret_from_fork+0x10/0x20
[   30.931804] 
[   30.932530] Allocated by task 172:
[   30.932942]  kasan_save_stack+0x3c/0x68
[   30.933548]  kasan_save_track+0x20/0x40
[   30.934635]  kasan_save_alloc_info+0x40/0x58
[   30.935265]  __kasan_kmalloc+0xd4/0xd8
[   30.935757]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.936400]  kmalloc_uaf+0xb8/0x338
[   30.936941]  kunit_try_run_case+0x14c/0x3d0
[   30.937489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.938587]  kthread+0x24c/0x2d0
[   30.939023]  ret_from_fork+0x10/0x20
[   30.939581] 
[   30.939904] Freed by task 172:
[   30.940419]  kasan_save_stack+0x3c/0x68
[   30.940982]  kasan_save_track+0x20/0x40
[   30.941546]  kasan_save_free_info+0x4c/0x78
[   30.942609]  __kasan_slab_free+0x6c/0x98
[   30.943431]  kfree+0x114/0x3c8
[   30.943921]  kmalloc_uaf+0x11c/0x338
[   30.944480]  kunit_try_run_case+0x14c/0x3d0
[   30.945051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.945694]  kthread+0x24c/0x2d0
[   30.946437]  ret_from_fork+0x10/0x20
[   30.947024] 
[   30.947303] The buggy address belongs to the object at fff00000c605f940
[   30.947303]  which belongs to the cache kmalloc-16 of size 16
[   30.949307] The buggy address is located 8 bytes inside of
[   30.949307]  freed 16-byte region [fff00000c605f940, fff00000c605f950)
[   30.950653] 
[   30.950951] The buggy address belongs to the physical page:
[   30.952106] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10605f
[   30.953028] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.953809] page_type: f5(slab)
[   30.954599] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.955423] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   30.956960] page dumped because: kasan: bad access detected
[   30.957561] 
[   30.958384] Memory state around the buggy address:
[   30.958830]  fff00000c605f800: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc
[   30.959730]  fff00000c605f880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.960492] >fff00000c605f900: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   30.961320]                                               ^
[   30.962131]  fff00000c605f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.963073]  fff00000c605fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.963645] ==================================================================

test log snippet boot parser 14

Home

[   30.512059] ==================================================================
[   30.512861] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   30.513674] Read of size 16 at addr fff00000c605f920 by task kunit_try_catch/156
[   30.514985] 
[   30.515471] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.516702] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.517368] Hardware name: linux,dummy-virt (DT)
[   30.518266] Call trace:
[   30.518799]  show_stack+0x20/0x38 (C)
[   30.519325]  dump_stack_lvl+0x8c/0xd0
[   30.519864]  print_report+0x118/0x5e0
[   30.520630]  kasan_report+0xc8/0x118
[   30.521144]  __asan_report_load16_noabort+0x20/0x30
[   30.522283]  kmalloc_uaf_16+0x3bc/0x438
[   30.522852]  kunit_try_run_case+0x14c/0x3d0
[   30.523577]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.524376]  kthread+0x24c/0x2d0
[   30.525059]  ret_from_fork+0x10/0x20
[   30.525583] 
[   30.526477] Allocated by task 156:
[   30.526911]  kasan_save_stack+0x3c/0x68
[   30.527651]  kasan_save_track+0x20/0x40
[   30.528390]  kasan_save_alloc_info+0x40/0x58
[   30.529143]  __kasan_kmalloc+0xd4/0xd8
[   30.529624]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.530538]  kmalloc_uaf_16+0x140/0x438
[   30.531454]  kunit_try_run_case+0x14c/0x3d0
[   30.532220]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.533067]  kthread+0x24c/0x2d0
[   30.533745]  ret_from_fork+0x10/0x20
[   30.534543] 
[   30.534877] Freed by task 156:
[   30.535251]  kasan_save_stack+0x3c/0x68
[   30.535812]  kasan_save_track+0x20/0x40
[   30.536923]  kasan_save_free_info+0x4c/0x78
[   30.537674]  __kasan_slab_free+0x6c/0x98
[   30.538547]  kfree+0x114/0x3c8
[   30.539216]  kmalloc_uaf_16+0x190/0x438
[   30.539946]  kunit_try_run_case+0x14c/0x3d0
[   30.540490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.541361]  kthread+0x24c/0x2d0
[   30.542293]  ret_from_fork+0x10/0x20
[   30.542896] 
[   30.543383] The buggy address belongs to the object at fff00000c605f920
[   30.543383]  which belongs to the cache kmalloc-16 of size 16
[   30.544467] The buggy address is located 0 bytes inside of
[   30.544467]  freed 16-byte region [fff00000c605f920, fff00000c605f930)
[   30.545800] 
[   30.546665] The buggy address belongs to the physical page:
[   30.547201] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10605f
[   30.547593] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.547922] page_type: f5(slab)
[   30.548388] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.549354] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   30.550715] page dumped because: kasan: bad access detected
[   30.551418] 
[   30.551775] Memory state around the buggy address:
[   30.552525]  fff00000c605f800: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc
[   30.553397]  fff00000c605f880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.554441] >fff00000c605f900: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   30.555661]                                ^
[   30.556179]  fff00000c605f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.557403]  fff00000c605fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.558510] ==================================================================

test log snippet boot parser 15

Home

[   32.050857] ==================================================================
[   32.051964] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x17c/0x2f8
[   32.052762] Read of size 1 at addr fff00000c6002280 by task kunit_try_catch/203
[   32.053590] 
[   32.053955] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   32.055358] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.055853] Hardware name: linux,dummy-virt (DT)
[   32.056435] Call trace:
[   32.056869]  show_stack+0x20/0x38 (C)
[   32.057450]  dump_stack_lvl+0x8c/0xd0
[   32.058038]  print_report+0x118/0x5e0
[   32.058566]  kasan_report+0xc8/0x118
[   32.059124]  __kasan_check_byte+0x54/0x70
[   32.059751]  kmem_cache_destroy+0x34/0x218
[   32.060383]  kmem_cache_double_destroy+0x17c/0x2f8
[   32.061157]  kunit_try_run_case+0x14c/0x3d0
[   32.061870]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.062656]  kthread+0x24c/0x2d0
[   32.063271]  ret_from_fork+0x10/0x20
[   32.063969] 
[   32.064434] Allocated by task 203:
[   32.064693]  kasan_save_stack+0x3c/0x68
[   32.064952]  kasan_save_track+0x20/0x40
[   32.065359]  kasan_save_alloc_info+0x40/0x58
[   32.065971]  __kasan_slab_alloc+0xa8/0xb0
[   32.066577]  kmem_cache_alloc_noprof+0x108/0x398
[   32.067159]  __kmem_cache_create_args+0x18c/0x2b0
[   32.067827]  kmem_cache_double_destroy+0xc8/0x2f8
[   32.068502]  kunit_try_run_case+0x14c/0x3d0
[   32.069000]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.069725]  kthread+0x24c/0x2d0
[   32.070191]  ret_from_fork+0x10/0x20
[   32.070747] 
[   32.071088] Freed by task 203:
[   32.071485]  kasan_save_stack+0x3c/0x68
[   32.072094]  kasan_save_track+0x20/0x40
[   32.072641]  kasan_save_free_info+0x4c/0x78
[   32.073287]  __kasan_slab_free+0x6c/0x98
[   32.073801]  kmem_cache_free+0x118/0x470
[   32.074397]  slab_kmem_cache_release+0x38/0x50
[   32.075043]  kmem_cache_release+0x1c/0x30
[   32.075610]  kobject_put+0x17c/0x430
[   32.076212]  sysfs_slab_release+0x1c/0x30
[   32.076803]  kmem_cache_destroy+0x118/0x218
[   32.077382]  kmem_cache_double_destroy+0x130/0x2f8
[   32.077921]  kunit_try_run_case+0x14c/0x3d0
[   32.078558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.079161]  kthread+0x24c/0x2d0
[   32.079693]  ret_from_fork+0x10/0x20
[   32.080220] 
[   32.080560] The buggy address belongs to the object at fff00000c6002280
[   32.080560]  which belongs to the cache kmem_cache of size 208
[   32.081711] The buggy address is located 0 bytes inside of
[   32.081711]  freed 208-byte region [fff00000c6002280, fff00000c6002350)
[   32.082881] 
[   32.083208] The buggy address belongs to the physical page:
[   32.083886] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106002
[   32.084710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.085554] page_type: f5(slab)
[   32.086098] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   32.086902] raw: 0000000000000000 00000000800c000c 00000001f5000000 0000000000000000
[   32.087724] page dumped because: kasan: bad access detected
[   32.088252] 
[   32.088589] Memory state around the buggy address:
[   32.089237]  fff00000c6002180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.090055]  fff00000c6002200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.090842] >fff00000c6002280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.091524]                    ^
[   32.092053]  fff00000c6002300: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   32.092833]  fff00000c6002380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.093633] ==================================================================

test log snippet boot parser 16

Home

[   31.498546] ==================================================================
[   31.499763] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   31.500660] Read of size 4 at addr fff00000c6668500 by task swapper/1/0
[   31.501404] 
[   31.502167] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N 6.13.0-rc7 #1
[   31.503209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.503852] Hardware name: linux,dummy-virt (DT)
[   31.504521] Call trace:
[   31.504965]  show_stack+0x20/0x38 (C)
[   31.505565]  dump_stack_lvl+0x8c/0xd0
[   31.506222]  print_report+0x118/0x5e0
[   31.506791]  kasan_report+0xc8/0x118
[   31.507634]  __asan_report_load4_noabort+0x20/0x30
[   31.508318]  rcu_uaf_reclaim+0x64/0x70
[   31.508914]  rcu_core+0x9f4/0x1e20
[   31.509539]  rcu_core_si+0x18/0x30
[   31.510111]  handle_softirqs+0x374/0xb20
[   31.510860]  __do_softirq+0x1c/0x28
[   31.511470]  ____do_softirq+0x18/0x30
[   31.512080]  call_on_irq_stack+0x24/0x58
[   31.512717]  do_softirq_own_stack+0x24/0x38
[   31.513357]  __irq_exit_rcu+0x1fc/0x318
[   31.514084]  irq_exit_rcu+0x1c/0x80
[   31.514729]  el1_interrupt+0x38/0x58
[   31.515413]  el1h_64_irq_handler+0x18/0x28
[   31.516064]  el1h_64_irq+0x6c/0x70
[   31.516774]  arch_local_irq_enable+0x4/0x8 (P)
[   31.517448]  do_idle+0x384/0x4e8
[   31.518233]  cpu_startup_entry+0x68/0x80
[   31.518858]  secondary_start_kernel+0x288/0x340
[   31.519515]  __secondary_switched+0xc0/0xc8
[   31.520219] 
[   31.520564] Allocated by task 186:
[   31.521090]  kasan_save_stack+0x3c/0x68
[   31.521723]  kasan_save_track+0x20/0x40
[   31.522748]  kasan_save_alloc_info+0x40/0x58
[   31.523355]  __kasan_kmalloc+0xd4/0xd8
[   31.523922]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.524574]  rcu_uaf+0xb0/0x2d0
[   31.525122]  kunit_try_run_case+0x14c/0x3d0
[   31.525696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.526699]  kthread+0x24c/0x2d0
[   31.527409]  ret_from_fork+0x10/0x20
[   31.528127] 
[   31.528463] Freed by task 0:
[   31.528881]  kasan_save_stack+0x3c/0x68
[   31.529378]  kasan_save_track+0x20/0x40
[   31.529869]  kasan_save_free_info+0x4c/0x78
[   31.531032]  __kasan_slab_free+0x6c/0x98
[   31.531742]  kfree+0x114/0x3c8
[   31.532405]  rcu_uaf_reclaim+0x28/0x70
[   31.533139]  rcu_core+0x9f4/0x1e20
[   31.533797]  rcu_core_si+0x18/0x30
[   31.534600]  handle_softirqs+0x374/0xb20
[   31.535106]  __do_softirq+0x1c/0x28
[   31.535649] 
[   31.536041] Last potentially related work creation:
[   31.536630]  kasan_save_stack+0x3c/0x68
[   31.537326]  __kasan_record_aux_stack+0xbc/0xe8
[   31.538173]  kasan_record_aux_stack_noalloc+0x14/0x20
[   31.538613]  __call_rcu_common.constprop.0+0x74/0xa10
[   31.539322]  call_rcu+0x18/0x30
[   31.539867]  rcu_uaf+0x14c/0x2d0
[   31.540336]  kunit_try_run_case+0x14c/0x3d0
[   31.540934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.541611]  kthread+0x24c/0x2d0
[   31.542587]  ret_from_fork+0x10/0x20
[   31.543030] 
[   31.543309] The buggy address belongs to the object at fff00000c6668500
[   31.543309]  which belongs to the cache kmalloc-32 of size 32
[   31.545263] The buggy address is located 0 bytes inside of
[   31.545263]  freed 32-byte region [fff00000c6668500, fff00000c6668520)
[   31.546713] 
[   31.547058] The buggy address belongs to the physical page:
[   31.547556] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106668
[   31.548520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.549394] page_type: f5(slab)
[   31.549945] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   31.550700] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   31.551579] page dumped because: kasan: bad access detected
[   31.552140] 
[   31.552477] Memory state around the buggy address:
[   31.553367]  fff00000c6668400: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   31.554470]  fff00000c6668480: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   31.555266] >fff00000c6668500: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   31.555999]                    ^
[   31.556517]  fff00000c6668580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.557277]  fff00000c6668600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.558301] ==================================================================

test log snippet boot parser 17

Home

------------[ cut here ]------------
[  238.894557] WARNING: CPU: 1 PID: 2040 at drivers/gpu/drm/drm_framebuffer.c:867 drm_framebuffer_init+0x44/0x300
[  238.896046] Modules linked in:
[  238.896882] CPU: 1 UID: 0 PID: 2040 Comm: kunit_try_catch Tainted: G    B D W        N 6.13.0-rc7 #1
[  238.897861] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  238.898508] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  238.899577] RIP: 0010:drm_framebuffer_init+0x44/0x300
[  238.900057] Code: 56 49 89 d6 48 89 f2 41 55 48 c1 ea 03 41 54 49 89 fc 53 48 89 f3 48 83 ec 18 80 3c 02 00 0f 85 00 02 00 00 4c 39 23 74 20 90 <0f> 0b 90 41 bd ea ff ff ff 48 83 c4 18 44 89 e8 5b 41 5c 41 5d 41
[  238.901923] RSP: 0000:ffff888104057ba0 EFLAGS: 00010246
[  238.902330] RAX: dffffc0000000000 RBX: ffff888104057c98 RCX: 0000000000000000
[  238.903138] RDX: 1ffff1102080af9c RSI: ffff888104057c98 RDI: ffff888104057ce0
[  238.904057] RBP: ffff888104057be0 R08: ffff888103f06000 R09: ffffffffac5b5c20
[  238.904856] R10: 0000000000000003 R11: 0000000045bcb4e2 R12: ffff888103f06000
[  238.905869] R13: ffff888100317b20 R14: ffff888104057c18 R15: ffff888104057e28
[  238.906626] FS:  0000000000000000(0000) GS:ffff88815b100000(0000) knlGS:0000000000000000
[  238.907435] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  238.908066] CR2: 00007ffff7ffe000 CR3: 00000000702b8000 CR4: 00000000000006f0
[  238.909199] DR0: ffffffffae5ea164 DR1: ffffffffae5ea169 DR2: ffffffffae5ea16a
[  238.910329] DR3: ffffffffae5ea16b DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  238.911472] Call Trace:
[  238.911859]  <TASK>
[  238.912339]  ? show_regs+0x68/0x80
[  238.912856]  ? __warn+0xd5/0x260
[  238.913197]  ? drm_framebuffer_init+0x44/0x300
[  238.913759]  ? report_bug+0x278/0x2e0
[  238.914701]  ? handle_bug+0x5c/0xb0
[  238.915076]  ? exc_invalid_op+0x1c/0x50
[  238.915692]  ? asm_exc_invalid_op+0x1f/0x30
[  238.916253]  ? drm_framebuffer_init+0x44/0x300
[  238.917020]  ? add_dr+0xc1/0x1d0
[  238.917717]  drm_test_framebuffer_init_bad_format+0xfd/0x240
[  238.918514]  ? add_dr+0x148/0x1d0
[  238.918865]  ? __pfx_drm_test_framebuffer_init_bad_format+0x10/0x10
[  238.919419]  ? __drmm_add_action+0x1a4/0x280
[  238.919865]  ? __pfx_drm_mode_config_init_release+0x10/0x10
[  238.921159]  ? __pfx_drm_mode_config_init_release+0x10/0x10
[  238.921695]  ? __drmm_add_action_or_reset+0x22/0x50
[  238.922777]  ? __pfx_drm_test_framebuffer_init_bad_format+0x10/0x10
[  238.923357]  ? __pfx_drm_test_framebuffer_init_bad_format+0x10/0x10
[  238.924351]  kunit_try_run_case+0x1b3/0x490
[  238.925157]  ? __pfx_kunit_try_run_case+0x10/0x10
[  238.925921]  ? _raw_spin_lock_irqsave+0xa2/0x110
[  238.926385]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  238.927334]  ? __kthread_parkme+0x82/0x160
[  238.928159]  ? preempt_count_sub+0x50/0x80
[  238.928567]  ? __pfx_kunit_try_run_case+0x10/0x10
[  238.929191]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  238.929759]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  238.930720]  kthread+0x257/0x310
[  238.931409]  ? __pfx_kthread+0x10/0x10
[  238.932165]  ret_from_fork+0x41/0x80
[  238.932839]  ? __pfx_kthread+0x10/0x10
[  238.933237]  ret_from_fork_asm+0x1a/0x30
[  238.933644]  </TASK>
[  238.933850] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 18

Home

[   29.215758] ==================================================================
[   29.216991] BUG: KASAN: double-free in kfree_sensitive+0x2e/0x90
[   29.218168] Free of addr ffff888101bd1140 by task kunit_try_catch/200
[   29.218649] 
[   29.219151] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.220525] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.221184] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.222093] Call Trace:
[   29.222427]  <TASK>
[   29.223240]  dump_stack_lvl+0x73/0xb0
[   29.223945]  print_report+0xd1/0x640
[   29.224505]  ? __virt_addr_valid+0x1db/0x2d0
[   29.225151]  ? kfree_sensitive+0x2e/0x90
[   29.225792]  ? kasan_complete_mode_report_info+0x64/0x200
[   29.226313]  ? kfree_sensitive+0x2e/0x90
[   29.226893]  kasan_report_invalid_free+0xc0/0xf0
[   29.228526]  ? kfree_sensitive+0x2e/0x90
[   29.229037]  ? kfree_sensitive+0x2e/0x90
[   29.230125]  check_slab_allocation+0x101/0x130
[   29.230837]  __kasan_slab_pre_free+0x28/0x40
[   29.231376]  kfree+0xf1/0x3f0
[   29.231874]  ? kfree_sensitive+0x2e/0x90
[   29.232192]  kfree_sensitive+0x2e/0x90
[   29.232804]  kmalloc_double_kzfree+0x19d/0x360
[   29.233277]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   29.234811]  ? __schedule+0xc3e/0x2790
[   29.235248]  ? __pfx_read_tsc+0x10/0x10
[   29.235685]  ? ktime_get_ts64+0x84/0x230
[   29.236102]  kunit_try_run_case+0x1b3/0x490
[   29.237788]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.238887]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.239597]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.240075]  ? __kthread_parkme+0x82/0x160
[   29.240509]  ? preempt_count_sub+0x50/0x80
[   29.240912]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.241915]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.242953]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.244491]  kthread+0x257/0x310
[   29.244952]  ? __pfx_kthread+0x10/0x10
[   29.245278]  ret_from_fork+0x41/0x80
[   29.246409]  ? __pfx_kthread+0x10/0x10
[   29.247150]  ret_from_fork_asm+0x1a/0x30
[   29.247589]  </TASK>
[   29.247829] 
[   29.247981] Allocated by task 200:
[   29.248382]  kasan_save_stack+0x3d/0x60
[   29.249591]  kasan_save_track+0x18/0x40
[   29.250181]  kasan_save_alloc_info+0x3b/0x50
[   29.250896]  __kasan_kmalloc+0xb7/0xc0
[   29.251316]  __kmalloc_cache_noprof+0x184/0x410
[   29.252684]  kmalloc_double_kzfree+0xaa/0x360
[   29.252973]  kunit_try_run_case+0x1b3/0x490
[   29.253234]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.253572]  kthread+0x257/0x310
[   29.254180]  ret_from_fork+0x41/0x80
[   29.254890]  ret_from_fork_asm+0x1a/0x30
[   29.255217] 
[   29.255397] Freed by task 200:
[   29.255837]  kasan_save_stack+0x3d/0x60
[   29.257661]  kasan_save_track+0x18/0x40
[   29.258085]  kasan_save_free_info+0x3f/0x60
[   29.258442]  __kasan_slab_free+0x56/0x70
[   29.259509]  kfree+0x123/0x3f0
[   29.259846]  kfree_sensitive+0x67/0x90
[   29.260249]  kmalloc_double_kzfree+0x12c/0x360
[   29.260910]  kunit_try_run_case+0x1b3/0x490
[   29.261994]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.263369]  kthread+0x257/0x310
[   29.263763]  ret_from_fork+0x41/0x80
[   29.264125]  ret_from_fork_asm+0x1a/0x30
[   29.264519] 
[   29.264748] The buggy address belongs to the object at ffff888101bd1140
[   29.264748]  which belongs to the cache kmalloc-16 of size 16
[   29.265988] The buggy address is located 0 bytes inside of
[   29.265988]  16-byte region [ffff888101bd1140, ffff888101bd1150)
[   29.267036] 
[   29.267252] The buggy address belongs to the physical page:
[   29.268610] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[   29.269343] flags: 0x200000000000000(node=0|zone=2)
[   29.269907] page_type: f5(slab)
[   29.270227] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.271064] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   29.271716] page dumped because: kasan: bad access detected
[   29.272124] 
[   29.272388] Memory state around the buggy address:
[   29.272736]  ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   29.273688]  ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   29.274336] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   29.275736]                                            ^
[   29.276254]  ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.277248]  ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.278542] ==================================================================

test log snippet boot parser 19

Home

[   31.210838] ==================================================================
[   31.212375] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[   31.214077] Free of addr ffff888102b4c000 by task kunit_try_catch/245
[   31.215399] 
[   31.215608] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   31.217002] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.217600] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.220125] Call Trace:
[   31.220674]  <TASK>
[   31.220940]  dump_stack_lvl+0x73/0xb0
[   31.221893]  print_report+0xd1/0x640
[   31.222421]  ? __virt_addr_valid+0x1db/0x2d0
[   31.222791]  ? mempool_double_free_helper+0x185/0x370
[   31.223282]  ? kasan_addr_to_slab+0x11/0xa0
[   31.223803]  ? mempool_double_free_helper+0x185/0x370
[   31.224890]  kasan_report_invalid_free+0xc0/0xf0
[   31.225676]  ? mempool_double_free_helper+0x185/0x370
[   31.226449]  ? mempool_double_free_helper+0x185/0x370
[   31.227621]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   31.228816]  mempool_free+0x2ec/0x380
[   31.229561]  mempool_double_free_helper+0x185/0x370
[   31.230525]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   31.231397]  ? irqentry_exit+0x2a/0x60
[   31.231693]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   31.232488]  mempool_kmalloc_large_double_free+0xb1/0x100
[   31.233388]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   31.234450]  ? __pfx_mempool_kmalloc+0x10/0x10
[   31.234820]  ? __pfx_mempool_kfree+0x10/0x10
[   31.235135]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   31.236329]  kunit_try_run_case+0x1b3/0x490
[   31.237460]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.238653]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.239555]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.240427]  ? __kthread_parkme+0x82/0x160
[   31.241266]  ? preempt_count_sub+0x50/0x80
[   31.242138]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.242663]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.243111]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.243868]  kthread+0x257/0x310
[   31.244758]  ? __pfx_kthread+0x10/0x10
[   31.245779]  ret_from_fork+0x41/0x80
[   31.246789]  ? __pfx_kthread+0x10/0x10
[   31.248020]  ret_from_fork_asm+0x1a/0x30
[   31.248341]  </TASK>
[   31.248771] 
[   31.249250] The buggy address belongs to the physical page:
[   31.249660] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   31.251071] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.252837] flags: 0x200000000000040(head|node=0|zone=2)
[   31.253815] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   31.254444] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.255292] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   31.256615] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.257233] head: 0200000000000002 ffffea00040ad301 ffffffffffffffff 0000000000000000
[   31.258140] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   31.258810] page dumped because: kasan: bad access detected
[   31.259493] 
[   31.259666] Memory state around the buggy address:
[   31.260887]  ffff888102b4bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.261626]  ffff888102b4bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.262489] >ffff888102b4c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.263086]                    ^
[   31.263435]  ffff888102b4c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.263939]  ffff888102b4c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.264925] ==================================================================

test log snippet boot parser 20

Home

[   31.271293] ==================================================================
[   31.272204] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[   31.272966] Free of addr ffff888102b4c000 by task kunit_try_catch/247
[   31.273581] 
[   31.274173] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   31.274969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.275426] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.276263] Call Trace:
[   31.278243]  <TASK>
[   31.278793]  dump_stack_lvl+0x73/0xb0
[   31.279260]  print_report+0xd1/0x640
[   31.280068]  ? __virt_addr_valid+0x1db/0x2d0
[   31.280950]  ? mempool_double_free_helper+0x185/0x370
[   31.281788]  ? kasan_addr_to_slab+0x11/0xa0
[   31.282512]  ? mempool_double_free_helper+0x185/0x370
[   31.282964]  kasan_report_invalid_free+0xc0/0xf0
[   31.283377]  ? mempool_double_free_helper+0x185/0x370
[   31.284275]  ? mempool_double_free_helper+0x185/0x370
[   31.284700]  __kasan_mempool_poison_pages+0x115/0x130
[   31.285698]  mempool_free+0x290/0x380
[   31.286358]  mempool_double_free_helper+0x185/0x370
[   31.287172]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   31.287620]  ? finish_task_switch.isra.0+0x153/0x700
[   31.288218]  mempool_page_alloc_double_free+0xac/0x100
[   31.288789]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   31.289800]  ? __switch_to+0x5d9/0xf60
[   31.290841]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   31.291404]  ? __pfx_mempool_free_pages+0x10/0x10
[   31.292512]  ? __pfx_read_tsc+0x10/0x10
[   31.293130]  ? ktime_get_ts64+0x84/0x230
[   31.293372]  kunit_try_run_case+0x1b3/0x490
[   31.294414]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.295278]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.295729]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.296797]  ? __kthread_parkme+0x82/0x160
[   31.297487]  ? preempt_count_sub+0x50/0x80
[   31.298189]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.298512]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.299328]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.299871]  kthread+0x257/0x310
[   31.300202]  ? __pfx_kthread+0x10/0x10
[   31.301466]  ret_from_fork+0x41/0x80
[   31.302063]  ? __pfx_kthread+0x10/0x10
[   31.302965]  ret_from_fork_asm+0x1a/0x30
[   31.303717]  </TASK>
[   31.303966] 
[   31.304228] The buggy address belongs to the physical page:
[   31.304915] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   31.305686] flags: 0x200000000000000(node=0|zone=2)
[   31.307125] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   31.308056] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.308769] page dumped because: kasan: bad access detected
[   31.309261] 
[   31.309471] Memory state around the buggy address:
[   31.309916]  ffff888102b4bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.311113]  ffff888102b4bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.312533] >ffff888102b4c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.313198]                    ^
[   31.313848]  ffff888102b4c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.315132]  ffff888102b4c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.315718] ==================================================================

test log snippet boot parser 21

Home

[   31.142079] ==================================================================
[   31.143266] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[   31.144439] Free of addr ffff8881029b6c00 by task kunit_try_catch/243
[   31.145607] 
[   31.146362] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   31.147393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.148114] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.149490] Call Trace:
[   31.149784]  <TASK>
[   31.150070]  dump_stack_lvl+0x73/0xb0
[   31.150473]  print_report+0xd1/0x640
[   31.151083]  ? __virt_addr_valid+0x1db/0x2d0
[   31.152212]  ? mempool_double_free_helper+0x185/0x370
[   31.153050]  ? kasan_complete_mode_report_info+0x64/0x200
[   31.153787]  ? mempool_double_free_helper+0x185/0x370
[   31.154294]  kasan_report_invalid_free+0xc0/0xf0
[   31.155271]  ? mempool_double_free_helper+0x185/0x370
[   31.156691]  ? mempool_double_free_helper+0x185/0x370
[   31.157159]  ? mempool_double_free_helper+0x185/0x370
[   31.158197]  check_slab_allocation+0x101/0x130
[   31.158730]  __kasan_mempool_poison_object+0x91/0x1d0
[   31.158966]  mempool_free+0x2ec/0x380
[   31.159170]  mempool_double_free_helper+0x185/0x370
[   31.159535]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   31.160789]  ? finish_task_switch.isra.0+0x153/0x700
[   31.161524]  mempool_kmalloc_double_free+0xb1/0x100
[   31.162357]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   31.163188]  ? __switch_to+0x5d9/0xf60
[   31.163614]  ? __pfx_mempool_kmalloc+0x10/0x10
[   31.164299]  ? __pfx_mempool_kfree+0x10/0x10
[   31.164905]  ? trace_hardirqs_on+0x37/0xe0
[   31.165267]  ? __pfx_read_tsc+0x10/0x10
[   31.165787]  ? ktime_get_ts64+0x84/0x230
[   31.166123]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   31.166888]  kunit_try_run_case+0x1b3/0x490
[   31.167540]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.168041]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.168852]  ? __kthread_parkme+0x82/0x160
[   31.169216]  ? preempt_count_sub+0x50/0x80
[   31.169691]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.170181]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.170855]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.171395]  kthread+0x257/0x310
[   31.171710]  ? __pfx_kthread+0x10/0x10
[   31.172380]  ret_from_fork+0x41/0x80
[   31.172724]  ? __pfx_kthread+0x10/0x10
[   31.173114]  ret_from_fork_asm+0x1a/0x30
[   31.173659]  </TASK>
[   31.173962] 
[   31.174184] Allocated by task 243:
[   31.174581]  kasan_save_stack+0x3d/0x60
[   31.174979]  kasan_save_track+0x18/0x40
[   31.175277]  kasan_save_alloc_info+0x3b/0x50
[   31.176070]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   31.176990]  remove_element+0x11e/0x190
[   31.177505]  mempool_alloc_preallocated+0x4d/0x90
[   31.177922]  mempool_double_free_helper+0x8b/0x370
[   31.178495]  mempool_kmalloc_double_free+0xb1/0x100
[   31.178889]  kunit_try_run_case+0x1b3/0x490
[   31.179528]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.180172]  kthread+0x257/0x310
[   31.180442]  ret_from_fork+0x41/0x80
[   31.181274]  ret_from_fork_asm+0x1a/0x30
[   31.181764] 
[   31.181914] Freed by task 243:
[   31.182137]  kasan_save_stack+0x3d/0x60
[   31.182796]  kasan_save_track+0x18/0x40
[   31.183267]  kasan_save_free_info+0x3f/0x60
[   31.184023]  __kasan_mempool_poison_object+0x131/0x1d0
[   31.184648]  mempool_free+0x2ec/0x380
[   31.184924]  mempool_double_free_helper+0x10a/0x370
[   31.185416]  mempool_kmalloc_double_free+0xb1/0x100
[   31.186023]  kunit_try_run_case+0x1b3/0x490
[   31.186631]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.187003]  kthread+0x257/0x310
[   31.187431]  ret_from_fork+0x41/0x80
[   31.187873]  ret_from_fork_asm+0x1a/0x30
[   31.188558] 
[   31.188805] The buggy address belongs to the object at ffff8881029b6c00
[   31.188805]  which belongs to the cache kmalloc-128 of size 128
[   31.189567] The buggy address is located 0 bytes inside of
[   31.189567]  128-byte region [ffff8881029b6c00, ffff8881029b6c80)
[   31.190898] 
[   31.191937] The buggy address belongs to the physical page:
[   31.193522] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b6
[   31.193867] flags: 0x200000000000000(node=0|zone=2)
[   31.194226] page_type: f5(slab)
[   31.194932] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   31.195884] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.196363] page dumped because: kasan: bad access detected
[   31.197543] 
[   31.197813] Memory state around the buggy address:
[   31.198183]  ffff8881029b6b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.198764]  ffff8881029b6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.199969] >ffff8881029b6c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.201297]                    ^
[   31.201993]  ffff8881029b6c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.203684]  ffff8881029b6d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.204221] ==================================================================

test log snippet boot parser 22

Home

[   27.423690] ==================================================================
[   27.424520] BUG: KASAN: invalid-free in kfree+0x271/0x3f0
[   27.425419] Free of addr ffff888102798001 by task kunit_try_catch/158
[   27.427343] 
[   27.427848] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.428689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.429758] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.430429] Call Trace:
[   27.431003]  <TASK>
[   27.431262]  dump_stack_lvl+0x73/0xb0
[   27.432318]  print_report+0xd1/0x640
[   27.432899]  ? __virt_addr_valid+0x1db/0x2d0
[   27.433338]  ? kfree+0x271/0x3f0
[   27.433923]  ? kasan_addr_to_slab+0x11/0xa0
[   27.434233]  ? kfree+0x271/0x3f0
[   27.434650]  kasan_report_invalid_free+0xc0/0xf0
[   27.435381]  ? kfree+0x271/0x3f0
[   27.435812]  ? kfree+0x271/0x3f0
[   27.436177]  __kasan_kfree_large+0x86/0xd0
[   27.436532]  free_large_kmalloc+0x3b/0xd0
[   27.437217]  kfree+0x271/0x3f0
[   27.437564]  ? kmalloc_large_invalid_free+0x90/0x2b0
[   27.438235]  kmalloc_large_invalid_free+0x121/0x2b0
[   27.438989]  ? __pfx_kmalloc_large_invalid_free+0x10/0x10
[   27.440325]  ? __schedule+0xc3e/0x2790
[   27.440750]  ? __pfx_read_tsc+0x10/0x10
[   27.441670]  ? ktime_get_ts64+0x84/0x230
[   27.442123]  kunit_try_run_case+0x1b3/0x490
[   27.442587]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.443330]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.443790]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.444682]  ? __kthread_parkme+0x82/0x160
[   27.445305]  ? preempt_count_sub+0x50/0x80
[   27.446315]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.446875]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.447557]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.448202]  kthread+0x257/0x310
[   27.449322]  ? __pfx_kthread+0x10/0x10
[   27.450149]  ret_from_fork+0x41/0x80
[   27.450853]  ? __pfx_kthread+0x10/0x10
[   27.451492]  ret_from_fork_asm+0x1a/0x30
[   27.452566]  </TASK>
[   27.453324] 
[   27.453706] The buggy address belongs to the physical page:
[   27.454728] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102798
[   27.455150] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.456137] flags: 0x200000000000040(head|node=0|zone=2)
[   27.456753] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.457457] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.458191] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.459784] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.460736] head: 0200000000000002 ffffea000409e601 ffffffffffffffff 0000000000000000
[   27.461494] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   27.463048] page dumped because: kasan: bad access detected
[   27.463529] 
[   27.464261] Memory state around the buggy address:
[   27.465109]  ffff888102797f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.466175]  ffff888102797f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.467304] >ffff888102798000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.468362]                    ^
[   27.468947]  ffff888102798080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.470135]  ffff888102798100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.471029] ==================================================================

test log snippet boot parser 23

Home

[   31.385212] ==================================================================
[   31.386833] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x133/0x2e0
[   31.387426] Free of addr ffff888102b50001 by task kunit_try_catch/251
[   31.388283] 
[   31.388795] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   31.390651] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.391079] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.391863] Call Trace:
[   31.392141]  <TASK>
[   31.392938]  dump_stack_lvl+0x73/0xb0
[   31.393403]  print_report+0xd1/0x640
[   31.393894]  ? __virt_addr_valid+0x1db/0x2d0
[   31.394427]  ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0
[   31.394761]  ? kasan_addr_to_slab+0x11/0xa0
[   31.395404]  ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0
[   31.396029]  kasan_report_invalid_free+0xc0/0xf0
[   31.396614]  ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0
[   31.397707]  ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0
[   31.398517]  __kasan_mempool_poison_object+0x102/0x1d0
[   31.398889]  mempool_free+0x2ec/0x380
[   31.399448]  mempool_kmalloc_invalid_free_helper+0x133/0x2e0
[   31.399945]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   31.400734]  ? update_curr+0x5c1/0x810
[   31.401067]  mempool_kmalloc_large_invalid_free+0xb1/0x100
[   31.402141]  ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10
[   31.403170]  ? schedule+0x7c/0x310
[   31.403905]  ? __pfx_mempool_kmalloc+0x10/0x10
[   31.404608]  ? __pfx_mempool_kfree+0x10/0x10
[   31.405164]  ? __pfx_read_tsc+0x10/0x10
[   31.405562]  ? ktime_get_ts64+0x84/0x230
[   31.406209]  kunit_try_run_case+0x1b3/0x490
[   31.407136]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.407717]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.408277]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.408985]  ? __kthread_parkme+0x82/0x160
[   31.409758]  ? preempt_count_sub+0x50/0x80
[   31.410188]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.411435]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.412025]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.412588]  kthread+0x257/0x310
[   31.412977]  ? __pfx_kthread+0x10/0x10
[   31.413710]  ret_from_fork+0x41/0x80
[   31.414064]  ? __pfx_kthread+0x10/0x10
[   31.415076]  ret_from_fork_asm+0x1a/0x30
[   31.415774]  </TASK>
[   31.416261] 
[   31.416636] The buggy address belongs to the physical page:
[   31.417395] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b50
[   31.418704] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.419896] flags: 0x200000000000040(head|node=0|zone=2)
[   31.420743] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   31.422211] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.423006] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   31.424075] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.425365] head: 0200000000000002 ffffea00040ad401 ffffffffffffffff 0000000000000000
[   31.426440] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   31.427819] page dumped because: kasan: bad access detected
[   31.428143] 
[   31.429129] Memory state around the buggy address:
[   31.429722]  ffff888102b4ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.430788]  ffff888102b4ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.431767] >ffff888102b50000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.432407]                    ^
[   31.432724]  ffff888102b50080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.433909]  ffff888102b50100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.435050] ==================================================================

test log snippet boot parser 24

Home

[   28.847827] ==================================================================
[   28.848802] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x172/0x330
[   28.849911] Read of size 18446744073709551614 at addr ffff888101ea0104 by task kunit_try_catch/188
[   28.851122] 
[   28.851339] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   28.852703] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.853430] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.854928] Call Trace:
[   28.855949]  <TASK>
[   28.856179]  dump_stack_lvl+0x73/0xb0
[   28.857033]  print_report+0xd1/0x640
[   28.857870]  ? __virt_addr_valid+0x1db/0x2d0
[   28.858795]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.860456]  kasan_report+0x102/0x140
[   28.861242]  ? kmalloc_memmove_negative_size+0x172/0x330
[   28.862156]  ? kmalloc_memmove_negative_size+0x172/0x330
[   28.863042]  kasan_check_range+0x10c/0x1c0
[   28.863488]  __asan_memmove+0x27/0x70
[   28.864194]  kmalloc_memmove_negative_size+0x172/0x330
[   28.865353]  ? __pfx_kmalloc_memmove_negative_size+0x10/0x10
[   28.866171]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.866570]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.867356]  ? __pfx_read_tsc+0x10/0x10
[   28.868310]  ? ktime_get_ts64+0x84/0x230
[   28.869100]  kunit_try_run_case+0x1b3/0x490
[   28.869587]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.870055]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.871051]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.872404]  ? __kthread_parkme+0x82/0x160
[   28.872905]  ? preempt_count_sub+0x50/0x80
[   28.873914]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.874566]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.875316]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.876259]  kthread+0x257/0x310
[   28.876834]  ? __pfx_kthread+0x10/0x10
[   28.877237]  ret_from_fork+0x41/0x80
[   28.877537]  ? __pfx_kthread+0x10/0x10
[   28.877824]  ret_from_fork_asm+0x1a/0x30
[   28.878692]  </TASK>
[   28.879237] 
[   28.879625] Allocated by task 188:
[   28.880335]  kasan_save_stack+0x3d/0x60
[   28.881043]  kasan_save_track+0x18/0x40
[   28.881741]  kasan_save_alloc_info+0x3b/0x50
[   28.882617]  __kasan_kmalloc+0xb7/0xc0
[   28.882991]  __kmalloc_cache_noprof+0x184/0x410
[   28.883812]  kmalloc_memmove_negative_size+0xad/0x330
[   28.884339]  kunit_try_run_case+0x1b3/0x490
[   28.885034]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.886090]  kthread+0x257/0x310
[   28.887344]  ret_from_fork+0x41/0x80
[   28.887826]  ret_from_fork_asm+0x1a/0x30
[   28.888614] 
[   28.888790] The buggy address belongs to the object at ffff888101ea0100
[   28.888790]  which belongs to the cache kmalloc-64 of size 64
[   28.889791] The buggy address is located 4 bytes inside of
[   28.889791]  64-byte region [ffff888101ea0100, ffff888101ea0140)
[   28.891273] 
[   28.891558] The buggy address belongs to the physical page:
[   28.892279] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ea0
[   28.893127] flags: 0x200000000000000(node=0|zone=2)
[   28.893821] page_type: f5(slab)
[   28.894238] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.894731] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.895584] page dumped because: kasan: bad access detected
[   28.896073] 
[   28.896220] Memory state around the buggy address:
[   28.897724]  ffff888101ea0000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.898509]  ffff888101ea0080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.899077] >ffff888101ea0100: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   28.899900]                    ^
[   28.900267]  ffff888101ea0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.901504]  ffff888101ea0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.902314] ==================================================================

test log snippet boot parser 25

Home

[   35.852855] ==================================================================
[   35.854557] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[   35.856399] Read of size 8 at addr ffff888101eb7278 by task kunit_try_catch/289
[   35.857853] 
[   35.858451] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   35.859225] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.859824] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.861242] Call Trace:
[   35.861521]  <TASK>
[   35.862198]  dump_stack_lvl+0x73/0xb0
[   35.863272]  print_report+0xd1/0x640
[   35.863659]  ? __virt_addr_valid+0x1db/0x2d0
[   35.864067]  ? kasan_complete_mode_report_info+0x2a/0x200
[   35.864605]  kasan_report+0x102/0x140
[   35.864972]  ? copy_to_kernel_nofault+0x225/0x260
[   35.866064]  ? copy_to_kernel_nofault+0x225/0x260
[   35.866718]  __asan_report_load8_noabort+0x18/0x20
[   35.867332]  copy_to_kernel_nofault+0x225/0x260
[   35.867943]  copy_to_kernel_nofault_oob+0x179/0x4e0
[   35.868571]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   35.869375]  ? finish_task_switch.isra.0+0x153/0x700
[   35.870031]  ? __schedule+0xc3e/0x2790
[   35.870550]  ? trace_hardirqs_on+0x37/0xe0
[   35.871095]  ? __pfx_read_tsc+0x10/0x10
[   35.871563]  ? ktime_get_ts64+0x84/0x230
[   35.872017]  kunit_try_run_case+0x1b3/0x490
[   35.872791]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.873223]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   35.873907]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   35.874308]  ? __kthread_parkme+0x82/0x160
[   35.874814]  ? preempt_count_sub+0x50/0x80
[   35.875389]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.875904]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.876604]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.877089]  kthread+0x257/0x310
[   35.877739]  ? __pfx_kthread+0x10/0x10
[   35.878261]  ret_from_fork+0x41/0x80
[   35.879508]  ? __pfx_kthread+0x10/0x10
[   35.880420]  ret_from_fork_asm+0x1a/0x30
[   35.881165]  </TASK>
[   35.881462] 
[   35.881611] Allocated by task 289:
[   35.882168]  kasan_save_stack+0x3d/0x60
[   35.882828]  kasan_save_track+0x18/0x40
[   35.883288]  kasan_save_alloc_info+0x3b/0x50
[   35.884480]  __kasan_kmalloc+0xb7/0xc0
[   35.885218]  __kmalloc_cache_noprof+0x184/0x410
[   35.885783]  copy_to_kernel_nofault_oob+0xc5/0x4e0
[   35.886936]  kunit_try_run_case+0x1b3/0x490
[   35.887422]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.888237]  kthread+0x257/0x310
[   35.888974]  ret_from_fork+0x41/0x80
[   35.889592]  ret_from_fork_asm+0x1a/0x30
[   35.890014] 
[   35.890308] The buggy address belongs to the object at ffff888101eb7200
[   35.890308]  which belongs to the cache kmalloc-128 of size 128
[   35.892285] The buggy address is located 0 bytes to the right of
[   35.892285]  allocated 120-byte region [ffff888101eb7200, ffff888101eb7278)
[   35.894535] 
[   35.894865] The buggy address belongs to the physical page:
[   35.895457] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101eb7
[   35.896113] flags: 0x200000000000000(node=0|zone=2)
[   35.897211] page_type: f5(slab)
[   35.898202] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   35.899122] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   35.900079] page dumped because: kasan: bad access detected
[   35.900665] 
[   35.900852] Memory state around the buggy address:
[   35.901341]  ffff888101eb7100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   35.902694]  ffff888101eb7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.903618] >ffff888101eb7200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   35.904206]                                                                 ^
[   35.905125]  ffff888101eb7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.906403]  ffff888101eb7300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.907742] ==================================================================

test log snippet boot parser 26

Home

[   35.909649] ==================================================================
[   35.910829] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[   35.911420] Write of size 8 at addr ffff888101eb7278 by task kunit_try_catch/289
[   35.913410] 
[   35.913759] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   35.915380] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.915791] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.916744] Call Trace:
[   35.917296]  <TASK>
[   35.917804]  dump_stack_lvl+0x73/0xb0
[   35.918269]  print_report+0xd1/0x640
[   35.918660]  ? __virt_addr_valid+0x1db/0x2d0
[   35.918993]  ? kasan_complete_mode_report_info+0x2a/0x200
[   35.919828]  kasan_report+0x102/0x140
[   35.920542]  ? copy_to_kernel_nofault+0x99/0x260
[   35.921266]  ? copy_to_kernel_nofault+0x99/0x260
[   35.921949]  kasan_check_range+0x10c/0x1c0
[   35.922915]  __kasan_check_write+0x18/0x20
[   35.923687]  copy_to_kernel_nofault+0x99/0x260
[   35.924267]  copy_to_kernel_nofault_oob+0x214/0x4e0
[   35.924866]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   35.925320]  ? finish_task_switch.isra.0+0x153/0x700
[   35.925835]  ? __schedule+0xc3e/0x2790
[   35.926234]  ? trace_hardirqs_on+0x37/0xe0
[   35.926759]  ? __pfx_read_tsc+0x10/0x10
[   35.927222]  ? ktime_get_ts64+0x84/0x230
[   35.927689]  kunit_try_run_case+0x1b3/0x490
[   35.928315]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.928848]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   35.929457]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   35.929854]  ? __kthread_parkme+0x82/0x160
[   35.930394]  ? preempt_count_sub+0x50/0x80
[   35.930797]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.931165]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.932002]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.932409]  kthread+0x257/0x310
[   35.932896]  ? __pfx_kthread+0x10/0x10
[   35.933385]  ret_from_fork+0x41/0x80
[   35.933917]  ? __pfx_kthread+0x10/0x10
[   35.934409]  ret_from_fork_asm+0x1a/0x30
[   35.934772]  </TASK>
[   35.934966] 
[   35.935227] Allocated by task 289:
[   35.935897]  kasan_save_stack+0x3d/0x60
[   35.936195]  kasan_save_track+0x18/0x40
[   35.936753]  kasan_save_alloc_info+0x3b/0x50
[   35.937263]  __kasan_kmalloc+0xb7/0xc0
[   35.937737]  __kmalloc_cache_noprof+0x184/0x410
[   35.938166]  copy_to_kernel_nofault_oob+0xc5/0x4e0
[   35.938537]  kunit_try_run_case+0x1b3/0x490
[   35.938987]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.939698]  kthread+0x257/0x310
[   35.940115]  ret_from_fork+0x41/0x80
[   35.940668]  ret_from_fork_asm+0x1a/0x30
[   35.941114] 
[   35.941272] The buggy address belongs to the object at ffff888101eb7200
[   35.941272]  which belongs to the cache kmalloc-128 of size 128
[   35.942520] The buggy address is located 0 bytes to the right of
[   35.942520]  allocated 120-byte region [ffff888101eb7200, ffff888101eb7278)
[   35.943306] 
[   35.943678] The buggy address belongs to the physical page:
[   35.944286] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101eb7
[   35.945261] flags: 0x200000000000000(node=0|zone=2)
[   35.945700] page_type: f5(slab)
[   35.945953] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   35.946713] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   35.947467] page dumped because: kasan: bad access detected
[   35.947922] 
[   35.948079] Memory state around the buggy address:
[   35.948476]  ffff888101eb7100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.949095]  ffff888101eb7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.950250] >ffff888101eb7200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   35.950828]                                                                 ^
[   35.951604]  ffff888101eb7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.952075]  ffff888101eb7300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.952794] ==================================================================

test log snippet boot parser 27

Home

[   32.096782] ==================================================================
[   32.097425] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50
[   32.098531] Write of size 8 at addr ffff888101bd1168 by task kunit_try_catch/269
[   32.099136] 
[   32.099394] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   32.100267] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.101384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.102730] Call Trace:
[   32.102919]  <TASK>
[   32.103118]  dump_stack_lvl+0x73/0xb0
[   32.103353]  print_report+0xd1/0x640
[   32.103927]  ? __virt_addr_valid+0x1db/0x2d0
[   32.104242]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.105122]  kasan_report+0x102/0x140
[   32.105821]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   32.106700]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   32.107846]  kasan_check_range+0x10c/0x1c0
[   32.108603]  __kasan_check_write+0x18/0x20
[   32.109290]  kasan_bitops_modify.constprop.0+0x19d/0xd50
[   32.110175]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   32.111208]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.112188]  ? trace_hardirqs_on+0x37/0xe0
[   32.112890]  ? kasan_bitops_generic+0x93/0x1c0
[   32.113603]  kasan_bitops_generic+0x117/0x1c0
[   32.114508]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   32.114758]  ? __pfx_read_tsc+0x10/0x10
[   32.114943]  ? ktime_get_ts64+0x84/0x230
[   32.115146]  kunit_try_run_case+0x1b3/0x490
[   32.115390]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.115674]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.116054]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.117839]  ? __kthread_parkme+0x82/0x160
[   32.118429]  ? preempt_count_sub+0x50/0x80
[   32.118976]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.119614]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.120278]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.120806]  kthread+0x257/0x310
[   32.121062]  ? __pfx_kthread+0x10/0x10
[   32.122100]  ret_from_fork+0x41/0x80
[   32.122864]  ? __pfx_kthread+0x10/0x10
[   32.123515]  ret_from_fork_asm+0x1a/0x30
[   32.124097]  </TASK>
[   32.124489] 
[   32.124815] Allocated by task 269:
[   32.125386]  kasan_save_stack+0x3d/0x60
[   32.125798]  kasan_save_track+0x18/0x40
[   32.126431]  kasan_save_alloc_info+0x3b/0x50
[   32.126765]  __kasan_kmalloc+0xb7/0xc0
[   32.127280]  __kmalloc_cache_noprof+0x184/0x410
[   32.127632]  kasan_bitops_generic+0x93/0x1c0
[   32.129111]  kunit_try_run_case+0x1b3/0x490
[   32.129486]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.130286]  kthread+0x257/0x310
[   32.130560]  ret_from_fork+0x41/0x80
[   32.130912]  ret_from_fork_asm+0x1a/0x30
[   32.131805] 
[   32.132056] The buggy address belongs to the object at ffff888101bd1160
[   32.132056]  which belongs to the cache kmalloc-16 of size 16
[   32.133392] The buggy address is located 8 bytes inside of
[   32.133392]  allocated 9-byte region [ffff888101bd1160, ffff888101bd1169)
[   32.135659] 
[   32.136006] The buggy address belongs to the physical page:
[   32.136723] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[   32.137799] flags: 0x200000000000000(node=0|zone=2)
[   32.138276] page_type: f5(slab)
[   32.138588] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   32.140221] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   32.141172] page dumped because: kasan: bad access detected
[   32.141823] 
[   32.142074] Memory state around the buggy address:
[   32.143017]  ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   32.143871]  ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   32.145022] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.145881]                                                           ^
[   32.146587]  ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.147210]  ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.148794] ==================================================================
---
[   32.383956] ==================================================================
[   32.385563] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50
[   32.386578] Write of size 8 at addr ffff888101bd1168 by task kunit_try_catch/269
[   32.387250] 
[   32.388291] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   32.389921] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.390297] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.391270] Call Trace:
[   32.391823]  <TASK>
[   32.392278]  dump_stack_lvl+0x73/0xb0
[   32.392866]  print_report+0xd1/0x640
[   32.393228]  ? __virt_addr_valid+0x1db/0x2d0
[   32.394006]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.394680]  kasan_report+0x102/0x140
[   32.395070]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   32.395575]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   32.396086]  kasan_check_range+0x10c/0x1c0
[   32.397019]  __kasan_check_write+0x18/0x20
[   32.397633]  kasan_bitops_modify.constprop.0+0x548/0xd50
[   32.398301]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   32.399025]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.399758]  ? trace_hardirqs_on+0x37/0xe0
[   32.400350]  ? kasan_bitops_generic+0x93/0x1c0
[   32.400944]  kasan_bitops_generic+0x117/0x1c0
[   32.401429]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   32.401902]  ? __pfx_read_tsc+0x10/0x10
[   32.402272]  ? ktime_get_ts64+0x84/0x230
[   32.402748]  kunit_try_run_case+0x1b3/0x490
[   32.403165]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.404345]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.404944]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.405448]  ? __kthread_parkme+0x82/0x160
[   32.405967]  ? preempt_count_sub+0x50/0x80
[   32.406810]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.407438]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.408974]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.409342]  kthread+0x257/0x310
[   32.410068]  ? __pfx_kthread+0x10/0x10
[   32.410526]  ret_from_fork+0x41/0x80
[   32.411006]  ? __pfx_kthread+0x10/0x10
[   32.411441]  ret_from_fork_asm+0x1a/0x30
[   32.411966]  </TASK>
[   32.412265] 
[   32.412567] Allocated by task 269:
[   32.412831]  kasan_save_stack+0x3d/0x60
[   32.413414]  kasan_save_track+0x18/0x40
[   32.413760]  kasan_save_alloc_info+0x3b/0x50
[   32.414790]  __kasan_kmalloc+0xb7/0xc0
[   32.415581]  __kmalloc_cache_noprof+0x184/0x410
[   32.416063]  kasan_bitops_generic+0x93/0x1c0
[   32.416557]  kunit_try_run_case+0x1b3/0x490
[   32.417469]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.417943]  kthread+0x257/0x310
[   32.418297]  ret_from_fork+0x41/0x80
[   32.418685]  ret_from_fork_asm+0x1a/0x30
[   32.419133] 
[   32.420002] The buggy address belongs to the object at ffff888101bd1160
[   32.420002]  which belongs to the cache kmalloc-16 of size 16
[   32.421160] The buggy address is located 8 bytes inside of
[   32.421160]  allocated 9-byte region [ffff888101bd1160, ffff888101bd1169)
[   32.422276] 
[   32.422520] The buggy address belongs to the physical page:
[   32.423144] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[   32.423921] flags: 0x200000000000000(node=0|zone=2)
[   32.424459] page_type: f5(slab)
[   32.424798] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   32.425674] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   32.426355] page dumped because: kasan: bad access detected
[   32.426831] 
[   32.427078] Memory state around the buggy address:
[   32.427655]  ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   32.428309]  ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   32.428951] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.429744]                                                           ^
[   32.430264]  ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.430982]  ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.431611] ==================================================================
---
[   32.242161] ==================================================================
[   32.242669] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50
[   32.243694] Write of size 8 at addr ffff888101bd1168 by task kunit_try_catch/269
[   32.244860] 
[   32.245237] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   32.246164] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.246476] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.247498] Call Trace:
[   32.247735]  <TASK>
[   32.247930]  dump_stack_lvl+0x73/0xb0
[   32.248624]  print_report+0xd1/0x640
[   32.249180]  ? __virt_addr_valid+0x1db/0x2d0
[   32.249722]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.250494]  kasan_report+0x102/0x140
[   32.250921]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   32.251692]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   32.252212]  kasan_check_range+0x10c/0x1c0
[   32.252758]  __kasan_check_write+0x18/0x20
[   32.253245]  kasan_bitops_modify.constprop.0+0x374/0xd50
[   32.253940]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   32.254582]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.255175]  ? trace_hardirqs_on+0x37/0xe0
[   32.255757]  ? kasan_bitops_generic+0x93/0x1c0
[   32.256276]  kasan_bitops_generic+0x117/0x1c0
[   32.256776]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   32.257444]  ? __pfx_read_tsc+0x10/0x10
[   32.258071]  ? ktime_get_ts64+0x84/0x230
[   32.258518]  kunit_try_run_case+0x1b3/0x490
[   32.258968]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.259947]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.260866]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.261350]  ? __kthread_parkme+0x82/0x160
[   32.262048]  ? preempt_count_sub+0x50/0x80
[   32.262491]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.262979]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.264304]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.265380]  kthread+0x257/0x310
[   32.265922]  ? __pfx_kthread+0x10/0x10
[   32.266369]  ret_from_fork+0x41/0x80
[   32.266659]  ? __pfx_kthread+0x10/0x10
[   32.267096]  ret_from_fork_asm+0x1a/0x30
[   32.267711]  </TASK>
[   32.267971] 
[   32.268126] Allocated by task 269:
[   32.268605]  kasan_save_stack+0x3d/0x60
[   32.269442]  kasan_save_track+0x18/0x40
[   32.269847]  kasan_save_alloc_info+0x3b/0x50
[   32.270289]  __kasan_kmalloc+0xb7/0xc0
[   32.270566]  __kmalloc_cache_noprof+0x184/0x410
[   32.270882]  kasan_bitops_generic+0x93/0x1c0
[   32.272188]  kunit_try_run_case+0x1b3/0x490
[   32.272523]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.273463]  kthread+0x257/0x310
[   32.273829]  ret_from_fork+0x41/0x80
[   32.274220]  ret_from_fork_asm+0x1a/0x30
[   32.275223] 
[   32.275762] The buggy address belongs to the object at ffff888101bd1160
[   32.275762]  which belongs to the cache kmalloc-16 of size 16
[   32.277292] The buggy address is located 8 bytes inside of
[   32.277292]  allocated 9-byte region [ffff888101bd1160, ffff888101bd1169)
[   32.279338] 
[   32.279490] The buggy address belongs to the physical page:
[   32.280286] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[   32.281405] flags: 0x200000000000000(node=0|zone=2)
[   32.281902] page_type: f5(slab)
[   32.282257] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   32.283801] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   32.284673] page dumped because: kasan: bad access detected
[   32.285270] 
[   32.285515] Memory state around the buggy address:
[   32.286219]  ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   32.286929]  ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   32.287221] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.287605]                                                           ^
[   32.288701]  ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.289415]  ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.290064] ==================================================================
---
[   32.339425] ==================================================================
[   32.339931] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   32.341068] Write of size 8 at addr ffff888101bd1168 by task kunit_try_catch/269
[   32.341985] 
[   32.342164] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   32.343069] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.343837] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.345143] Call Trace:
[   32.345281]  <TASK>
[   32.345535]  dump_stack_lvl+0x73/0xb0
[   32.346048]  print_report+0xd1/0x640
[   32.346552]  ? __virt_addr_valid+0x1db/0x2d0
[   32.346875]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.347652]  kasan_report+0x102/0x140
[   32.348191]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   32.348840]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   32.349477]  kasan_check_range+0x10c/0x1c0
[   32.350046]  __kasan_check_write+0x18/0x20
[   32.350535]  kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   32.350981]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   32.351743]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.352161]  ? trace_hardirqs_on+0x37/0xe0
[   32.352675]  ? kasan_bitops_generic+0x93/0x1c0
[   32.353160]  kasan_bitops_generic+0x117/0x1c0
[   32.353765]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   32.354236]  ? __pfx_read_tsc+0x10/0x10
[   32.354793]  ? ktime_get_ts64+0x84/0x230
[   32.355188]  kunit_try_run_case+0x1b3/0x490
[   32.355736]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.356177]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.356809]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.357479]  ? __kthread_parkme+0x82/0x160
[   32.357773]  ? preempt_count_sub+0x50/0x80
[   32.358353]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.358899]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.359630]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.360284]  kthread+0x257/0x310
[   32.360662]  ? __pfx_kthread+0x10/0x10
[   32.361137]  ret_from_fork+0x41/0x80
[   32.361718]  ? __pfx_kthread+0x10/0x10
[   32.362220]  ret_from_fork_asm+0x1a/0x30
[   32.362721]  </TASK>
[   32.363046] 
[   32.363348] Allocated by task 269:
[   32.363776]  kasan_save_stack+0x3d/0x60
[   32.364273]  kasan_save_track+0x18/0x40
[   32.364651]  kasan_save_alloc_info+0x3b/0x50
[   32.365231]  __kasan_kmalloc+0xb7/0xc0
[   32.365573]  __kmalloc_cache_noprof+0x184/0x410
[   32.366114]  kasan_bitops_generic+0x93/0x1c0
[   32.366737]  kunit_try_run_case+0x1b3/0x490
[   32.367255]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.367845]  kthread+0x257/0x310
[   32.368349]  ret_from_fork+0x41/0x80
[   32.368760]  ret_from_fork_asm+0x1a/0x30
[   32.369352] 
[   32.369632] The buggy address belongs to the object at ffff888101bd1160
[   32.369632]  which belongs to the cache kmalloc-16 of size 16
[   32.371254] The buggy address is located 8 bytes inside of
[   32.371254]  allocated 9-byte region [ffff888101bd1160, ffff888101bd1169)
[   32.372722] 
[   32.372838] The buggy address belongs to the physical page:
[   32.373061] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[   32.373414] flags: 0x200000000000000(node=0|zone=2)
[   32.373826] page_type: f5(slab)
[   32.374231] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   32.374974] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   32.375721] page dumped because: kasan: bad access detected
[   32.376121] 
[   32.376274] Memory state around the buggy address:
[   32.377234]  ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   32.379000]  ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   32.379710] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.380372]                                                           ^
[   32.380904]  ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.381725]  ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.382711] ==================================================================
---
[   32.039252] ==================================================================
[   32.040218] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50
[   32.041630] Write of size 8 at addr ffff888101bd1168 by task kunit_try_catch/269
[   32.043256] 
[   32.043901] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   32.045783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.047016] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.047896] Call Trace:
[   32.048124]  <TASK>
[   32.048454]  dump_stack_lvl+0x73/0xb0
[   32.048843]  print_report+0xd1/0x640
[   32.049296]  ? __virt_addr_valid+0x1db/0x2d0
[   32.049738]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.050237]  kasan_report+0x102/0x140
[   32.051258]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   32.052388]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   32.052961]  kasan_check_range+0x10c/0x1c0
[   32.053407]  __kasan_check_write+0x18/0x20
[   32.054401]  kasan_bitops_modify.constprop.0+0x102/0xd50
[   32.055365]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   32.056234]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.057018]  ? trace_hardirqs_on+0x37/0xe0
[   32.058140]  ? kasan_bitops_generic+0x93/0x1c0
[   32.058892]  kasan_bitops_generic+0x117/0x1c0
[   32.059362]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   32.060168]  ? __pfx_read_tsc+0x10/0x10
[   32.060875]  ? ktime_get_ts64+0x84/0x230
[   32.061629]  kunit_try_run_case+0x1b3/0x490
[   32.062246]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.063102]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.063891]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.064376]  ? __kthread_parkme+0x82/0x160
[   32.065304]  ? preempt_count_sub+0x50/0x80
[   32.065724]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.066201]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.066789]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.068144]  kthread+0x257/0x310
[   32.068849]  ? __pfx_kthread+0x10/0x10
[   32.069300]  ret_from_fork+0x41/0x80
[   32.069979]  ? __pfx_kthread+0x10/0x10
[   32.070390]  ret_from_fork_asm+0x1a/0x30
[   32.070787]  </TASK>
[   32.071286] 
[   32.071602] Allocated by task 269:
[   32.072587]  kasan_save_stack+0x3d/0x60
[   32.073282]  kasan_save_track+0x18/0x40
[   32.073940]  kasan_save_alloc_info+0x3b/0x50
[   32.074457]  __kasan_kmalloc+0xb7/0xc0
[   32.074836]  __kmalloc_cache_noprof+0x184/0x410
[   32.075227]  kasan_bitops_generic+0x93/0x1c0
[   32.075553]  kunit_try_run_case+0x1b3/0x490
[   32.076229]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.077101]  kthread+0x257/0x310
[   32.077442]  ret_from_fork+0x41/0x80
[   32.078005]  ret_from_fork_asm+0x1a/0x30
[   32.078292] 
[   32.078491] The buggy address belongs to the object at ffff888101bd1160
[   32.078491]  which belongs to the cache kmalloc-16 of size 16
[   32.080845] The buggy address is located 8 bytes inside of
[   32.080845]  allocated 9-byte region [ffff888101bd1160, ffff888101bd1169)
[   32.082128] 
[   32.082365] The buggy address belongs to the physical page:
[   32.082870] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[   32.083722] flags: 0x200000000000000(node=0|zone=2)
[   32.084197] page_type: f5(slab)
[   32.084690] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   32.086237] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   32.086933] page dumped because: kasan: bad access detected
[   32.087766] 
[   32.088074] Memory state around the buggy address:
[   32.088586]  ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   32.089464]  ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   32.090754] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.091276]                                                           ^
[   32.092028]  ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.093081]  ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.094143] ==================================================================
---
[   32.151958] ==================================================================
[   32.152743] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50
[   32.153796] Write of size 8 at addr ffff888101bd1168 by task kunit_try_catch/269
[   32.154343] 
[   32.155143] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   32.155946] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.156886] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.157652] Call Trace:
[   32.157943]  <TASK>
[   32.158177]  dump_stack_lvl+0x73/0xb0
[   32.159116]  print_report+0xd1/0x640
[   32.159355]  ? __virt_addr_valid+0x1db/0x2d0
[   32.159686]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.160277]  kasan_report+0x102/0x140
[   32.160967]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   32.161750]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   32.162252]  kasan_check_range+0x10c/0x1c0
[   32.162775]  __kasan_check_write+0x18/0x20
[   32.163284]  kasan_bitops_modify.constprop.0+0x23b/0xd50
[   32.163849]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   32.164630]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.165243]  ? trace_hardirqs_on+0x37/0xe0
[   32.165742]  ? kasan_bitops_generic+0x93/0x1c0
[   32.166249]  kasan_bitops_generic+0x117/0x1c0
[   32.166850]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   32.167243]  ? __pfx_read_tsc+0x10/0x10
[   32.167762]  ? ktime_get_ts64+0x84/0x230
[   32.168218]  kunit_try_run_case+0x1b3/0x490
[   32.168688]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.169117]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.169769]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.170239]  ? __kthread_parkme+0x82/0x160
[   32.170701]  ? preempt_count_sub+0x50/0x80
[   32.171037]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.171677]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.172261]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.172732]  kthread+0x257/0x310
[   32.173158]  ? __pfx_kthread+0x10/0x10
[   32.173606]  ret_from_fork+0x41/0x80
[   32.174021]  ? __pfx_kthread+0x10/0x10
[   32.174344]  ret_from_fork_asm+0x1a/0x30
[   32.174884]  </TASK>
[   32.175201] 
[   32.175419] Allocated by task 269:
[   32.175815]  kasan_save_stack+0x3d/0x60
[   32.176287]  kasan_save_track+0x18/0x40
[   32.176633]  kasan_save_alloc_info+0x3b/0x50
[   32.177159]  __kasan_kmalloc+0xb7/0xc0
[   32.177701]  __kmalloc_cache_noprof+0x184/0x410
[   32.178090]  kasan_bitops_generic+0x93/0x1c0
[   32.178619]  kunit_try_run_case+0x1b3/0x490
[   32.179055]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.179576]  kthread+0x257/0x310
[   32.179988]  ret_from_fork+0x41/0x80
[   32.180527]  ret_from_fork_asm+0x1a/0x30
[   32.180874] 
[   32.181027] The buggy address belongs to the object at ffff888101bd1160
[   32.181027]  which belongs to the cache kmalloc-16 of size 16
[   32.182090] The buggy address is located 8 bytes inside of
[   32.182090]  allocated 9-byte region [ffff888101bd1160, ffff888101bd1169)
[   32.183188] 
[   32.183443] The buggy address belongs to the physical page:
[   32.183851] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[   32.184688] flags: 0x200000000000000(node=0|zone=2)
[   32.185033] page_type: f5(slab)
[   32.185430] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   32.186118] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   32.186893] page dumped because: kasan: bad access detected
[   32.187424] 
[   32.187655] Memory state around the buggy address:
[   32.188154]  ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   32.188817]  ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   32.189459] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.189987]                                                           ^
[   32.191149]  ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.191811]  ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.193122] ==================================================================
---
[   32.194620] ==================================================================
[   32.196275] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   32.197283] Write of size 8 at addr ffff888101bd1168 by task kunit_try_catch/269
[   32.198943] 
[   32.199365] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   32.200253] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.201049] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.201934] Call Trace:
[   32.202209]  <TASK>
[   32.202997]  dump_stack_lvl+0x73/0xb0
[   32.203555]  print_report+0xd1/0x640
[   32.204006]  ? __virt_addr_valid+0x1db/0x2d0
[   32.204722]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.204969]  kasan_report+0x102/0x140
[   32.205150]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   32.205506]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   32.206050]  kasan_check_range+0x10c/0x1c0
[   32.206625]  __kasan_check_write+0x18/0x20
[   32.207086]  kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   32.207804]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   32.208343]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.209118]  ? trace_hardirqs_on+0x37/0xe0
[   32.209629]  ? kasan_bitops_generic+0x93/0x1c0
[   32.210078]  kasan_bitops_generic+0x117/0x1c0
[   32.210883]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   32.211336]  ? __pfx_read_tsc+0x10/0x10
[   32.211849]  ? ktime_get_ts64+0x84/0x230
[   32.212251]  kunit_try_run_case+0x1b3/0x490
[   32.212865]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.213191]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.213934]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.214587]  ? __kthread_parkme+0x82/0x160
[   32.215026]  ? preempt_count_sub+0x50/0x80
[   32.215704]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.216202]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.216895]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.217600]  kthread+0x257/0x310
[   32.217980]  ? __pfx_kthread+0x10/0x10
[   32.218603]  ret_from_fork+0x41/0x80
[   32.219045]  ? __pfx_kthread+0x10/0x10
[   32.219636]  ret_from_fork_asm+0x1a/0x30
[   32.220252]  </TASK>
[   32.220607] 
[   32.220884] Allocated by task 269:
[   32.221452]  kasan_save_stack+0x3d/0x60
[   32.221900]  kasan_save_track+0x18/0x40
[   32.222599]  kasan_save_alloc_info+0x3b/0x50
[   32.222951]  __kasan_kmalloc+0xb7/0xc0
[   32.223591]  __kmalloc_cache_noprof+0x184/0x410
[   32.224234]  kasan_bitops_generic+0x93/0x1c0
[   32.224784]  kunit_try_run_case+0x1b3/0x490
[   32.225203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.225840]  kthread+0x257/0x310
[   32.226131]  ret_from_fork+0x41/0x80
[   32.226855]  ret_from_fork_asm+0x1a/0x30
[   32.227743] 
[   32.227951] The buggy address belongs to the object at ffff888101bd1160
[   32.227951]  which belongs to the cache kmalloc-16 of size 16
[   32.229428] The buggy address is located 8 bytes inside of
[   32.229428]  allocated 9-byte region [ffff888101bd1160, ffff888101bd1169)
[   32.230984] 
[   32.231197] The buggy address belongs to the physical page:
[   32.232188] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[   32.232890] flags: 0x200000000000000(node=0|zone=2)
[   32.233288] page_type: f5(slab)
[   32.233548] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   32.234025] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   32.234638] page dumped because: kasan: bad access detected
[   32.235051] 
[   32.235276] Memory state around the buggy address:
[   32.235734]  ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   32.236204]  ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   32.237429] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.238061]                                                           ^
[   32.238721]  ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.239304]  ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.239976] ==================================================================
---
[   32.292201] ==================================================================
[   32.294524] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50
[   32.295373] Write of size 8 at addr ffff888101bd1168 by task kunit_try_catch/269
[   32.296054] 
[   32.297099] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   32.297976] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.298422] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.299593] Call Trace:
[   32.299808]  <TASK>
[   32.300127]  dump_stack_lvl+0x73/0xb0
[   32.300622]  print_report+0xd1/0x640
[   32.301252]  ? __virt_addr_valid+0x1db/0x2d0
[   32.301820]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.302292]  kasan_report+0x102/0x140
[   32.302728]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   32.303467]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   32.304440]  kasan_check_range+0x10c/0x1c0
[   32.304917]  __kasan_check_write+0x18/0x20
[   32.305569]  kasan_bitops_modify.constprop.0+0x40f/0xd50
[   32.306239]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   32.306893]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.307365]  ? trace_hardirqs_on+0x37/0xe0
[   32.307900]  ? kasan_bitops_generic+0x93/0x1c0
[   32.308503]  kasan_bitops_generic+0x117/0x1c0
[   32.309137]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   32.309747]  ? __pfx_read_tsc+0x10/0x10
[   32.310127]  ? ktime_get_ts64+0x84/0x230
[   32.310717]  kunit_try_run_case+0x1b3/0x490
[   32.311232]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.311697]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.312221]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.312870]  ? __kthread_parkme+0x82/0x160
[   32.313476]  ? preempt_count_sub+0x50/0x80
[   32.313914]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.314378]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.315149]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.315718]  kthread+0x257/0x310
[   32.316158]  ? __pfx_kthread+0x10/0x10
[   32.316659]  ret_from_fork+0x41/0x80
[   32.317065]  ? __pfx_kthread+0x10/0x10
[   32.317572]  ret_from_fork_asm+0x1a/0x30
[   32.318131]  </TASK>
[   32.318339] 
[   32.318647] Allocated by task 269:
[   32.318903]  kasan_save_stack+0x3d/0x60
[   32.319520]  kasan_save_track+0x18/0x40
[   32.319883]  kasan_save_alloc_info+0x3b/0x50
[   32.320441]  __kasan_kmalloc+0xb7/0xc0
[   32.320858]  __kmalloc_cache_noprof+0x184/0x410
[   32.321297]  kasan_bitops_generic+0x93/0x1c0
[   32.321822]  kunit_try_run_case+0x1b3/0x490
[   32.322146]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.322569]  kthread+0x257/0x310
[   32.323041]  ret_from_fork+0x41/0x80
[   32.323632]  ret_from_fork_asm+0x1a/0x30
[   32.324082] 
[   32.324231] The buggy address belongs to the object at ffff888101bd1160
[   32.324231]  which belongs to the cache kmalloc-16 of size 16
[   32.325430] The buggy address is located 8 bytes inside of
[   32.325430]  allocated 9-byte region [ffff888101bd1160, ffff888101bd1169)
[   32.326608] 
[   32.326857] The buggy address belongs to the physical page:
[   32.327303] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[   32.328083] flags: 0x200000000000000(node=0|zone=2)
[   32.328925] page_type: f5(slab)
[   32.329270] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   32.330242] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   32.331079] page dumped because: kasan: bad access detected
[   32.331773] 
[   32.331974] Memory state around the buggy address:
[   32.332423]  ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   32.332833]  ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   32.333710] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.334112]                                                           ^
[   32.335187]  ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.336357]  ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.337185] ==================================================================

test log snippet boot parser 28

Home

[   32.801575] ==================================================================
[   32.803098] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   32.804098] Read of size 8 at addr ffff888101bd1168 by task kunit_try_catch/269
[   32.805238] 
[   32.805436] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   32.806709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.806889] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.807236] Call Trace:
[   32.807403]  <TASK>
[   32.807775]  dump_stack_lvl+0x73/0xb0
[   32.808274]  print_report+0xd1/0x640
[   32.808747]  ? __virt_addr_valid+0x1db/0x2d0
[   32.809266]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.810653]  kasan_report+0x102/0x140
[   32.811021]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   32.811674]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   32.812232]  __asan_report_load8_noabort+0x18/0x20
[   32.813115]  kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   32.813695]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   32.814356]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.814807]  ? trace_hardirqs_on+0x37/0xe0
[   32.815235]  ? kasan_bitops_generic+0x93/0x1c0
[   32.815808]  kasan_bitops_generic+0x122/0x1c0
[   32.816121]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   32.817001]  ? __pfx_read_tsc+0x10/0x10
[   32.817948]  ? ktime_get_ts64+0x84/0x230
[   32.818562]  kunit_try_run_case+0x1b3/0x490
[   32.819074]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.819603]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.820112]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.821277]  ? __kthread_parkme+0x82/0x160
[   32.821946]  ? preempt_count_sub+0x50/0x80
[   32.822387]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.823221]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.823815]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.824315]  kthread+0x257/0x310
[   32.824792]  ? __pfx_kthread+0x10/0x10
[   32.825071]  ret_from_fork+0x41/0x80
[   32.825750]  ? __pfx_kthread+0x10/0x10
[   32.826300]  ret_from_fork_asm+0x1a/0x30
[   32.826791]  </TASK>
[   32.827035] 
[   32.827378] Allocated by task 269:
[   32.827973]  kasan_save_stack+0x3d/0x60
[   32.828300]  kasan_save_track+0x18/0x40
[   32.828865]  kasan_save_alloc_info+0x3b/0x50
[   32.829240]  __kasan_kmalloc+0xb7/0xc0
[   32.829693]  __kmalloc_cache_noprof+0x184/0x410
[   32.830090]  kasan_bitops_generic+0x93/0x1c0
[   32.830667]  kunit_try_run_case+0x1b3/0x490
[   32.830987]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.831380]  kthread+0x257/0x310
[   32.831886]  ret_from_fork+0x41/0x80
[   32.832618]  ret_from_fork_asm+0x1a/0x30
[   32.833124] 
[   32.833527] The buggy address belongs to the object at ffff888101bd1160
[   32.833527]  which belongs to the cache kmalloc-16 of size 16
[   32.834473] The buggy address is located 8 bytes inside of
[   32.834473]  allocated 9-byte region [ffff888101bd1160, ffff888101bd1169)
[   32.835938] 
[   32.836285] The buggy address belongs to the physical page:
[   32.836994] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[   32.837736] flags: 0x200000000000000(node=0|zone=2)
[   32.838172] page_type: f5(slab)
[   32.838547] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   32.839144] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   32.839940] page dumped because: kasan: bad access detected
[   32.840554] 
[   32.840849] Memory state around the buggy address:
[   32.841265]  ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   32.842058]  ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   32.842639] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.843590]                                                           ^
[   32.844222]  ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.844791]  ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.845520] ==================================================================

test log snippet boot parser 29

Home

[   32.621023] ==================================================================
[   32.622225] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   32.623076] Write of size 8 at addr ffff888101bd1168 by task kunit_try_catch/269
[   32.623576] 
[   32.623976] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   32.625092] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.625578] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.626703] Call Trace:
[   32.626952]  <TASK>
[   32.627283]  dump_stack_lvl+0x73/0xb0
[   32.627854]  print_report+0xd1/0x640
[   32.628245]  ? __virt_addr_valid+0x1db/0x2d0
[   32.628588]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.628954]  kasan_report+0x102/0x140
[   32.629566]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   32.630474]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   32.631155]  kasan_check_range+0x10c/0x1c0
[   32.631608]  __kasan_check_write+0x18/0x20
[   32.632234]  kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   32.633119]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   32.633912]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.634238]  ? trace_hardirqs_on+0x37/0xe0
[   32.634882]  ? kasan_bitops_generic+0x93/0x1c0
[   32.635622]  kasan_bitops_generic+0x122/0x1c0
[   32.636031]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   32.636435]  ? __pfx_read_tsc+0x10/0x10
[   32.637001]  ? ktime_get_ts64+0x84/0x230
[   32.637625]  kunit_try_run_case+0x1b3/0x490
[   32.638156]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.638722]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.639294]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.639888]  ? __kthread_parkme+0x82/0x160
[   32.640446]  ? preempt_count_sub+0x50/0x80
[   32.640922]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.641501]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.642181]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.642893]  kthread+0x257/0x310
[   32.643313]  ? __pfx_kthread+0x10/0x10
[   32.643726]  ret_from_fork+0x41/0x80
[   32.644173]  ? __pfx_kthread+0x10/0x10
[   32.644710]  ret_from_fork_asm+0x1a/0x30
[   32.645269]  </TASK>
[   32.645585] 
[   32.645842] Allocated by task 269:
[   32.646086]  kasan_save_stack+0x3d/0x60
[   32.646619]  kasan_save_track+0x18/0x40
[   32.647060]  kasan_save_alloc_info+0x3b/0x50
[   32.647633]  __kasan_kmalloc+0xb7/0xc0
[   32.648056]  __kmalloc_cache_noprof+0x184/0x410
[   32.648547]  kasan_bitops_generic+0x93/0x1c0
[   32.649143]  kunit_try_run_case+0x1b3/0x490
[   32.649567]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.650193]  kthread+0x257/0x310
[   32.650728]  ret_from_fork+0x41/0x80
[   32.651102]  ret_from_fork_asm+0x1a/0x30
[   32.651659] 
[   32.651887] The buggy address belongs to the object at ffff888101bd1160
[   32.651887]  which belongs to the cache kmalloc-16 of size 16
[   32.652988] The buggy address is located 8 bytes inside of
[   32.652988]  allocated 9-byte region [ffff888101bd1160, ffff888101bd1169)
[   32.654152] 
[   32.654459] The buggy address belongs to the physical page:
[   32.654960] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[   32.656282] flags: 0x200000000000000(node=0|zone=2)
[   32.656616] page_type: f5(slab)
[   32.657048] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   32.658347] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   32.659100] page dumped because: kasan: bad access detected
[   32.659755] 
[   32.659976] Memory state around the buggy address:
[   32.660431]  ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   32.661134]  ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   32.661897] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.662598]                                                           ^
[   32.663162]  ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.663916]  ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.664649] ==================================================================
---
[   32.527922] ==================================================================
[   32.528887] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   32.529767] Write of size 8 at addr ffff888101bd1168 by task kunit_try_catch/269
[   32.530440] 
[   32.530667] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   32.531484] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.532032] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.533696] Call Trace:
[   32.533974]  <TASK>
[   32.534227]  dump_stack_lvl+0x73/0xb0
[   32.534677]  print_report+0xd1/0x640
[   32.535107]  ? __virt_addr_valid+0x1db/0x2d0
[   32.536245]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.536667]  kasan_report+0x102/0x140
[   32.537185]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   32.537891]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   32.538521]  kasan_check_range+0x10c/0x1c0
[   32.539131]  __kasan_check_write+0x18/0x20
[   32.539505]  kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   32.540394]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   32.541083]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.541725]  ? trace_hardirqs_on+0x37/0xe0
[   32.542312]  ? kasan_bitops_generic+0x93/0x1c0
[   32.542770]  kasan_bitops_generic+0x122/0x1c0
[   32.543203]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   32.543984]  ? __pfx_read_tsc+0x10/0x10
[   32.544530]  ? ktime_get_ts64+0x84/0x230
[   32.545082]  kunit_try_run_case+0x1b3/0x490
[   32.545811]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.546352]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.546966]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.547437]  ? __kthread_parkme+0x82/0x160
[   32.547832]  ? preempt_count_sub+0x50/0x80
[   32.548218]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.549440]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.550043]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.551201]  kthread+0x257/0x310
[   32.551497]  ? __pfx_kthread+0x10/0x10
[   32.552343]  ret_from_fork+0x41/0x80
[   32.553064]  ? __pfx_kthread+0x10/0x10
[   32.553575]  ret_from_fork_asm+0x1a/0x30
[   32.553889]  </TASK>
[   32.554386] 
[   32.554709] Allocated by task 269:
[   32.555215]  kasan_save_stack+0x3d/0x60
[   32.556429]  kasan_save_track+0x18/0x40
[   32.557024]  kasan_save_alloc_info+0x3b/0x50
[   32.557535]  __kasan_kmalloc+0xb7/0xc0
[   32.558112]  __kmalloc_cache_noprof+0x184/0x410
[   32.558775]  kasan_bitops_generic+0x93/0x1c0
[   32.559613]  kunit_try_run_case+0x1b3/0x490
[   32.560072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.560610]  kthread+0x257/0x310
[   32.560942]  ret_from_fork+0x41/0x80
[   32.561291]  ret_from_fork_asm+0x1a/0x30
[   32.562008] 
[   32.562159] The buggy address belongs to the object at ffff888101bd1160
[   32.562159]  which belongs to the cache kmalloc-16 of size 16
[   32.563460] The buggy address is located 8 bytes inside of
[   32.563460]  allocated 9-byte region [ffff888101bd1160, ffff888101bd1169)
[   32.565297] 
[   32.565678] The buggy address belongs to the physical page:
[   32.566467] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[   32.567620] flags: 0x200000000000000(node=0|zone=2)
[   32.568006] page_type: f5(slab)
[   32.568244] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   32.570272] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   32.571185] page dumped because: kasan: bad access detected
[   32.571891] 
[   32.572137] Memory state around the buggy address:
[   32.572857]  ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   32.573394]  ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   32.574316] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.574942]                                                           ^
[   32.575720]  ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.576302]  ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.576991] ==================================================================
---
[   32.666183] ==================================================================
[   32.666916] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   32.668010] Write of size 8 at addr ffff888101bd1168 by task kunit_try_catch/269
[   32.668678] 
[   32.668988] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   32.669857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.670281] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.671138] Call Trace:
[   32.671588]  <TASK>
[   32.671885]  dump_stack_lvl+0x73/0xb0
[   32.672297]  print_report+0xd1/0x640
[   32.672896]  ? __virt_addr_valid+0x1db/0x2d0
[   32.673446]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.674085]  kasan_report+0x102/0x140
[   32.674514]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   32.675181]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   32.675781]  kasan_check_range+0x10c/0x1c0
[   32.676354]  __kasan_check_write+0x18/0x20
[   32.676988]  kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   32.677625]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   32.678361]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.678887]  ? trace_hardirqs_on+0x37/0xe0
[   32.679370]  ? kasan_bitops_generic+0x93/0x1c0
[   32.679996]  kasan_bitops_generic+0x122/0x1c0
[   32.680597]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   32.681147]  ? __pfx_read_tsc+0x10/0x10
[   32.681618]  ? ktime_get_ts64+0x84/0x230
[   32.682103]  kunit_try_run_case+0x1b3/0x490
[   32.682774]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.683248]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.683925]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.684497]  ? __kthread_parkme+0x82/0x160
[   32.685054]  ? preempt_count_sub+0x50/0x80
[   32.685379]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.686017]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.686753]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.687294]  kthread+0x257/0x310
[   32.687682]  ? __pfx_kthread+0x10/0x10
[   32.688528]  ret_from_fork+0x41/0x80
[   32.688926]  ? __pfx_kthread+0x10/0x10
[   32.689345]  ret_from_fork_asm+0x1a/0x30
[   32.689695]  </TASK>
[   32.689966] 
[   32.690120] Allocated by task 269:
[   32.690714]  kasan_save_stack+0x3d/0x60
[   32.691138]  kasan_save_track+0x18/0x40
[   32.691614]  kasan_save_alloc_info+0x3b/0x50
[   32.692115]  __kasan_kmalloc+0xb7/0xc0
[   32.692609]  __kmalloc_cache_noprof+0x184/0x410
[   32.693054]  kasan_bitops_generic+0x93/0x1c0
[   32.693640]  kunit_try_run_case+0x1b3/0x490
[   32.694142]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.694783]  kthread+0x257/0x310
[   32.695123]  ret_from_fork+0x41/0x80
[   32.695715]  ret_from_fork_asm+0x1a/0x30
[   32.696098] 
[   32.696433] The buggy address belongs to the object at ffff888101bd1160
[   32.696433]  which belongs to the cache kmalloc-16 of size 16
[   32.697617] The buggy address is located 8 bytes inside of
[   32.697617]  allocated 9-byte region [ffff888101bd1160, ffff888101bd1169)
[   32.698610] 
[   32.698821] The buggy address belongs to the physical page:
[   32.699381] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[   32.700033] flags: 0x200000000000000(node=0|zone=2)
[   32.700641] page_type: f5(slab)
[   32.701076] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   32.701886] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   32.702783] page dumped because: kasan: bad access detected
[   32.703449] 
[   32.703626] Memory state around the buggy address:
[   32.704120]  ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   32.704873]  ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   32.705657] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.706365]                                                           ^
[   32.706916]  ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.707616]  ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.708347] ==================================================================
---
[   32.432965] ==================================================================
[   32.434556] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   32.435445] Write of size 8 at addr ffff888101bd1168 by task kunit_try_catch/269
[   32.436204] 
[   32.436603] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   32.437558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.437988] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.438794] Call Trace:
[   32.439070]  <TASK>
[   32.439578]  dump_stack_lvl+0x73/0xb0
[   32.440345]  print_report+0xd1/0x640
[   32.441010]  ? __virt_addr_valid+0x1db/0x2d0
[   32.441500]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.442043]  kasan_report+0x102/0x140
[   32.442536]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   32.443199]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   32.443880]  kasan_check_range+0x10c/0x1c0
[   32.444200]  __kasan_check_write+0x18/0x20
[   32.444851]  kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   32.445531]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   32.446192]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.446741]  ? trace_hardirqs_on+0x37/0xe0
[   32.447125]  ? kasan_bitops_generic+0x93/0x1c0
[   32.447770]  kasan_bitops_generic+0x122/0x1c0
[   32.448233]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   32.448913]  ? __pfx_read_tsc+0x10/0x10
[   32.449284]  ? ktime_get_ts64+0x84/0x230
[   32.449745]  kunit_try_run_case+0x1b3/0x490
[   32.450245]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.450788]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.451224]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.451920]  ? __kthread_parkme+0x82/0x160
[   32.452352]  ? preempt_count_sub+0x50/0x80
[   32.453166]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.453994]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.454973]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.455585]  kthread+0x257/0x310
[   32.455950]  ? __pfx_kthread+0x10/0x10
[   32.456456]  ret_from_fork+0x41/0x80
[   32.456914]  ? __pfx_kthread+0x10/0x10
[   32.457366]  ret_from_fork_asm+0x1a/0x30
[   32.457815]  </TASK>
[   32.458071] 
[   32.458254] Allocated by task 269:
[   32.458793]  kasan_save_stack+0x3d/0x60
[   32.459107]  kasan_save_track+0x18/0x40
[   32.459642]  kasan_save_alloc_info+0x3b/0x50
[   32.460122]  __kasan_kmalloc+0xb7/0xc0
[   32.460673]  __kmalloc_cache_noprof+0x184/0x410
[   32.461159]  kasan_bitops_generic+0x93/0x1c0
[   32.461539]  kunit_try_run_case+0x1b3/0x490
[   32.462100]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.462764]  kthread+0x257/0x310
[   32.463186]  ret_from_fork+0x41/0x80
[   32.463657]  ret_from_fork_asm+0x1a/0x30
[   32.464095] 
[   32.464342] The buggy address belongs to the object at ffff888101bd1160
[   32.464342]  which belongs to the cache kmalloc-16 of size 16
[   32.465151] The buggy address is located 8 bytes inside of
[   32.465151]  allocated 9-byte region [ffff888101bd1160, ffff888101bd1169)
[   32.466612] 
[   32.466871] The buggy address belongs to the physical page:
[   32.467434] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[   32.468046] flags: 0x200000000000000(node=0|zone=2)
[   32.468617] page_type: f5(slab)
[   32.469077] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   32.469940] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   32.471137] page dumped because: kasan: bad access detected
[   32.472118] 
[   32.472314] Memory state around the buggy address:
[   32.472989]  ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   32.473677]  ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   32.474418] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.475102]                                                           ^
[   32.475680]  ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.476363]  ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.476944] ==================================================================
---
[   32.578544] ==================================================================
[   32.579224] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   32.580438] Write of size 8 at addr ffff888101bd1168 by task kunit_try_catch/269
[   32.581788] 
[   32.581983] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   32.583276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.583818] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.584536] Call Trace:
[   32.584729]  <TASK>
[   32.585114]  dump_stack_lvl+0x73/0xb0
[   32.585685]  print_report+0xd1/0x640
[   32.586114]  ? __virt_addr_valid+0x1db/0x2d0
[   32.586660]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.587185]  kasan_report+0x102/0x140
[   32.587683]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   32.588458]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   32.589128]  kasan_check_range+0x10c/0x1c0
[   32.589731]  __kasan_check_write+0x18/0x20
[   32.590256]  kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   32.590894]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   32.591640]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.592102]  ? trace_hardirqs_on+0x37/0xe0
[   32.592719]  ? kasan_bitops_generic+0x93/0x1c0
[   32.593209]  kasan_bitops_generic+0x122/0x1c0
[   32.593875]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   32.594459]  ? __pfx_read_tsc+0x10/0x10
[   32.595002]  ? ktime_get_ts64+0x84/0x230
[   32.595363]  kunit_try_run_case+0x1b3/0x490
[   32.595917]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.596456]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.596936]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.597606]  ? __kthread_parkme+0x82/0x160
[   32.597993]  ? preempt_count_sub+0x50/0x80
[   32.598488]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.598984]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.599617]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.600309]  kthread+0x257/0x310
[   32.600671]  ? __pfx_kthread+0x10/0x10
[   32.601144]  ret_from_fork+0x41/0x80
[   32.601735]  ? __pfx_kthread+0x10/0x10
[   32.602061]  ret_from_fork_asm+0x1a/0x30
[   32.602636]  </TASK>
[   32.602961] 
[   32.603124] Allocated by task 269:
[   32.603674]  kasan_save_stack+0x3d/0x60
[   32.604163]  kasan_save_track+0x18/0x40
[   32.604702]  kasan_save_alloc_info+0x3b/0x50
[   32.605221]  __kasan_kmalloc+0xb7/0xc0
[   32.605721]  __kmalloc_cache_noprof+0x184/0x410
[   32.606005]  kasan_bitops_generic+0x93/0x1c0
[   32.606280]  kunit_try_run_case+0x1b3/0x490
[   32.606625]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.606952]  kthread+0x257/0x310
[   32.607204]  ret_from_fork+0x41/0x80
[   32.607591]  ret_from_fork_asm+0x1a/0x30
[   32.607872] 
[   32.608084] The buggy address belongs to the object at ffff888101bd1160
[   32.608084]  which belongs to the cache kmalloc-16 of size 16
[   32.609251] The buggy address is located 8 bytes inside of
[   32.609251]  allocated 9-byte region [ffff888101bd1160, ffff888101bd1169)
[   32.610274] 
[   32.610601] The buggy address belongs to the physical page:
[   32.611370] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[   32.611903] flags: 0x200000000000000(node=0|zone=2)
[   32.612226] page_type: f5(slab)
[   32.612617] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   32.613607] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   32.614511] page dumped because: kasan: bad access detected
[   32.615126] 
[   32.615281] Memory state around the buggy address:
[   32.615977]  ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   32.616736]  ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   32.617168] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.617615]                                                           ^
[   32.618063]  ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.618897]  ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.619710] ==================================================================
---
[   32.478201] ==================================================================
[   32.478971] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   32.480278] Write of size 8 at addr ffff888101bd1168 by task kunit_try_catch/269
[   32.481391] 
[   32.481797] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   32.482765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.483397] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.484349] Call Trace:
[   32.484861]  <TASK>
[   32.485157]  dump_stack_lvl+0x73/0xb0
[   32.485591]  print_report+0xd1/0x640
[   32.486075]  ? __virt_addr_valid+0x1db/0x2d0
[   32.486564]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.487406]  kasan_report+0x102/0x140
[   32.487691]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   32.488487]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   32.489255]  kasan_check_range+0x10c/0x1c0
[   32.489620]  __kasan_check_write+0x18/0x20
[   32.490438]  kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   32.491484]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   32.492239]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.492898]  ? trace_hardirqs_on+0x37/0xe0
[   32.493434]  ? kasan_bitops_generic+0x93/0x1c0
[   32.494214]  kasan_bitops_generic+0x122/0x1c0
[   32.494987]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   32.495882]  ? __pfx_read_tsc+0x10/0x10
[   32.496301]  ? ktime_get_ts64+0x84/0x230
[   32.496806]  kunit_try_run_case+0x1b3/0x490
[   32.497253]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.498665]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.499263]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.499996]  ? __kthread_parkme+0x82/0x160
[   32.500449]  ? preempt_count_sub+0x50/0x80
[   32.500652]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.500868]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.501194]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.501700]  kthread+0x257/0x310
[   32.502065]  ? __pfx_kthread+0x10/0x10
[   32.503194]  ret_from_fork+0x41/0x80
[   32.503520]  ? __pfx_kthread+0x10/0x10
[   32.504199]  ret_from_fork_asm+0x1a/0x30
[   32.505122]  </TASK>
[   32.505609] 
[   32.505756] Allocated by task 269:
[   32.506279]  kasan_save_stack+0x3d/0x60
[   32.506628]  kasan_save_track+0x18/0x40
[   32.507120]  kasan_save_alloc_info+0x3b/0x50
[   32.507810]  __kasan_kmalloc+0xb7/0xc0
[   32.508698]  __kmalloc_cache_noprof+0x184/0x410
[   32.509380]  kasan_bitops_generic+0x93/0x1c0
[   32.509836]  kunit_try_run_case+0x1b3/0x490
[   32.510270]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.510711]  kthread+0x257/0x310
[   32.511833]  ret_from_fork+0x41/0x80
[   32.512502]  ret_from_fork_asm+0x1a/0x30
[   32.512953] 
[   32.513208] The buggy address belongs to the object at ffff888101bd1160
[   32.513208]  which belongs to the cache kmalloc-16 of size 16
[   32.514305] The buggy address is located 8 bytes inside of
[   32.514305]  allocated 9-byte region [ffff888101bd1160, ffff888101bd1169)
[   32.515315] 
[   32.515606] The buggy address belongs to the physical page:
[   32.515997] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[   32.516895] flags: 0x200000000000000(node=0|zone=2)
[   32.517449] page_type: f5(slab)
[   32.517917] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   32.518645] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   32.519308] page dumped because: kasan: bad access detected
[   32.519988] 
[   32.520136] Memory state around the buggy address:
[   32.520904]  ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   32.521674]  ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   32.522211] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.523049]                                                           ^
[   32.523712]  ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.524473]  ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.525136] ==================================================================
---
[   32.709784] ==================================================================
[   32.710530] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   32.712100] Write of size 8 at addr ffff888101bd1168 by task kunit_try_catch/269
[   32.712922] 
[   32.713099] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   32.714592] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.715113] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.716196] Call Trace:
[   32.716456]  <TASK>
[   32.717111]  dump_stack_lvl+0x73/0xb0
[   32.717489]  print_report+0xd1/0x640
[   32.718182]  ? __virt_addr_valid+0x1db/0x2d0
[   32.718690]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.719237]  kasan_report+0x102/0x140
[   32.719657]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   32.720276]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   32.720779]  kasan_check_range+0x10c/0x1c0
[   32.721078]  __kasan_check_write+0x18/0x20
[   32.721594]  kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   32.722014]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   32.722720]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.723443]  ? trace_hardirqs_on+0x37/0xe0
[   32.723860]  ? kasan_bitops_generic+0x93/0x1c0
[   32.724532]  kasan_bitops_generic+0x122/0x1c0
[   32.724928]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   32.725526]  ? __pfx_read_tsc+0x10/0x10
[   32.725925]  ? ktime_get_ts64+0x84/0x230
[   32.726611]  kunit_try_run_case+0x1b3/0x490
[   32.726955]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.727694]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.728149]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.728754]  ? __kthread_parkme+0x82/0x160
[   32.729235]  ? preempt_count_sub+0x50/0x80
[   32.729856]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.730181]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.731112]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.731666]  kthread+0x257/0x310
[   32.732153]  ? __pfx_kthread+0x10/0x10
[   32.732616]  ret_from_fork+0x41/0x80
[   32.733203]  ? __pfx_kthread+0x10/0x10
[   32.733757]  ret_from_fork_asm+0x1a/0x30
[   32.734199]  </TASK>
[   32.734548] 
[   32.734824] Allocated by task 269:
[   32.735240]  kasan_save_stack+0x3d/0x60
[   32.735704]  kasan_save_track+0x18/0x40
[   32.735994]  kasan_save_alloc_info+0x3b/0x50
[   32.736658]  __kasan_kmalloc+0xb7/0xc0
[   32.737201]  __kmalloc_cache_noprof+0x184/0x410
[   32.737716]  kasan_bitops_generic+0x93/0x1c0
[   32.738149]  kunit_try_run_case+0x1b3/0x490
[   32.738707]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.739263]  kthread+0x257/0x310
[   32.739647]  ret_from_fork+0x41/0x80
[   32.740060]  ret_from_fork_asm+0x1a/0x30
[   32.740593] 
[   32.740909] The buggy address belongs to the object at ffff888101bd1160
[   32.740909]  which belongs to the cache kmalloc-16 of size 16
[   32.741924] The buggy address is located 8 bytes inside of
[   32.741924]  allocated 9-byte region [ffff888101bd1160, ffff888101bd1169)
[   32.742962] 
[   32.743289] The buggy address belongs to the physical page:
[   32.743879] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[   32.744746] flags: 0x200000000000000(node=0|zone=2)
[   32.745143] page_type: f5(slab)
[   32.745639] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   32.746358] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   32.747116] page dumped because: kasan: bad access detected
[   32.747710] 
[   32.747969] Memory state around the buggy address:
[   32.748383]  ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   32.749133]  ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   32.749810] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.750497]                                                           ^
[   32.750953]  ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.751494]  ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.752842] ==================================================================

test log snippet boot parser 30

Home

[   32.755220] ==================================================================
[   32.756414] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   32.757163] Read of size 8 at addr ffff888101bd1168 by task kunit_try_catch/269
[   32.758033] 
[   32.758783] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   32.759917] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.760633] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.761521] Call Trace:
[   32.761810]  <TASK>
[   32.762075]  dump_stack_lvl+0x73/0xb0
[   32.763415]  print_report+0xd1/0x640
[   32.763971]  ? __virt_addr_valid+0x1db/0x2d0
[   32.764519]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.765163]  kasan_report+0x102/0x140
[   32.765741]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   32.766290]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   32.766891]  kasan_check_range+0x10c/0x1c0
[   32.767306]  __kasan_check_read+0x15/0x20
[   32.768170]  kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   32.769066]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   32.769939]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.770674]  ? trace_hardirqs_on+0x37/0xe0
[   32.771279]  ? kasan_bitops_generic+0x93/0x1c0
[   32.771794]  kasan_bitops_generic+0x122/0x1c0
[   32.772404]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   32.773144]  ? __pfx_read_tsc+0x10/0x10
[   32.773716]  ? ktime_get_ts64+0x84/0x230
[   32.774152]  kunit_try_run_case+0x1b3/0x490
[   32.774784]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.775474]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.775818]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.776054]  ? __kthread_parkme+0x82/0x160
[   32.776243]  ? preempt_count_sub+0x50/0x80
[   32.776550]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.776997]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.778351]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.778835]  kthread+0x257/0x310
[   32.779024]  ? __pfx_kthread+0x10/0x10
[   32.779206]  ret_from_fork+0x41/0x80
[   32.779501]  ? __pfx_kthread+0x10/0x10
[   32.780030]  ret_from_fork_asm+0x1a/0x30
[   32.780708]  </TASK>
[   32.780922] 
[   32.781071] Allocated by task 269:
[   32.781732]  kasan_save_stack+0x3d/0x60
[   32.782472]  kasan_save_track+0x18/0x40
[   32.782920]  kasan_save_alloc_info+0x3b/0x50
[   32.783262]  __kasan_kmalloc+0xb7/0xc0
[   32.784042]  __kmalloc_cache_noprof+0x184/0x410
[   32.784583]  kasan_bitops_generic+0x93/0x1c0
[   32.785265]  kunit_try_run_case+0x1b3/0x490
[   32.785870]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.786373]  kthread+0x257/0x310
[   32.786909]  ret_from_fork+0x41/0x80
[   32.787573]  ret_from_fork_asm+0x1a/0x30
[   32.787885] 
[   32.788246] The buggy address belongs to the object at ffff888101bd1160
[   32.788246]  which belongs to the cache kmalloc-16 of size 16
[   32.789274] The buggy address is located 8 bytes inside of
[   32.789274]  allocated 9-byte region [ffff888101bd1160, ffff888101bd1169)
[   32.790655] 
[   32.790901] The buggy address belongs to the physical page:
[   32.791668] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[   32.792549] flags: 0x200000000000000(node=0|zone=2)
[   32.792978] page_type: f5(slab)
[   32.793356] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   32.794128] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   32.794865] page dumped because: kasan: bad access detected
[   32.795432] 
[   32.795618] Memory state around the buggy address:
[   32.796143]  ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   32.796826]  ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   32.797585] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   32.798268]                                                           ^
[   32.798926]  ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.799620]  ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.800283] ==================================================================

test log snippet boot parser 31

Home

[   28.909610] ==================================================================
[   28.910825] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x170/0x330
[   28.911520] Read of size 64 at addr ffff8881029a7f84 by task kunit_try_catch/190
[   28.912132] 
[   28.913239] CPU: 1 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   28.914816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.915270] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.916171] Call Trace:
[   28.916748]  <TASK>
[   28.917055]  dump_stack_lvl+0x73/0xb0
[   28.917988]  print_report+0xd1/0x640
[   28.918597]  ? __virt_addr_valid+0x1db/0x2d0
[   28.919075]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.919757]  kasan_report+0x102/0x140
[   28.920077]  ? kmalloc_memmove_invalid_size+0x170/0x330
[   28.920927]  ? kmalloc_memmove_invalid_size+0x170/0x330
[   28.921458]  kasan_check_range+0x10c/0x1c0
[   28.922410]  __asan_memmove+0x27/0x70
[   28.922771]  kmalloc_memmove_invalid_size+0x170/0x330
[   28.923440]  ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10
[   28.924068]  ? __schedule+0xc3e/0x2790
[   28.924388]  ? __pfx_read_tsc+0x10/0x10
[   28.924858]  ? ktime_get_ts64+0x84/0x230
[   28.925179]  kunit_try_run_case+0x1b3/0x490
[   28.925730]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.926100]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.927512]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.927989]  ? __kthread_parkme+0x82/0x160
[   28.928648]  ? preempt_count_sub+0x50/0x80
[   28.929016]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.930150]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.930869]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.931457]  kthread+0x257/0x310
[   28.931962]  ? __pfx_kthread+0x10/0x10
[   28.932330]  ret_from_fork+0x41/0x80
[   28.932788]  ? __pfx_kthread+0x10/0x10
[   28.933244]  ret_from_fork_asm+0x1a/0x30
[   28.933795]  </TASK>
[   28.934014] 
[   28.934263] Allocated by task 190:
[   28.934620]  kasan_save_stack+0x3d/0x60
[   28.935060]  kasan_save_track+0x18/0x40
[   28.936256]  kasan_save_alloc_info+0x3b/0x50
[   28.936909]  __kasan_kmalloc+0xb7/0xc0
[   28.937276]  __kmalloc_cache_noprof+0x184/0x410
[   28.937808]  kmalloc_memmove_invalid_size+0xad/0x330
[   28.938510]  kunit_try_run_case+0x1b3/0x490
[   28.938887]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.939831]  kthread+0x257/0x310
[   28.940840]  ret_from_fork+0x41/0x80
[   28.941111]  ret_from_fork_asm+0x1a/0x30
[   28.941520] 
[   28.941679] The buggy address belongs to the object at ffff8881029a7f80
[   28.941679]  which belongs to the cache kmalloc-64 of size 64
[   28.943610] The buggy address is located 4 bytes inside of
[   28.943610]  allocated 64-byte region [ffff8881029a7f80, ffff8881029a7fc0)
[   28.944909] 
[   28.945309] The buggy address belongs to the physical page:
[   28.945715] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a7
[   28.946159] flags: 0x200000000000000(node=0|zone=2)
[   28.946775] page_type: f5(slab)
[   28.947170] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.949016] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.949754] page dumped because: kasan: bad access detected
[   28.950175] 
[   28.950403] Memory state around the buggy address:
[   28.950740]  ffff8881029a7e80: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   28.952095]  ffff8881029a7f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.952788] >ffff8881029a7f80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   28.953331]                                            ^
[   28.953886]  ffff8881029a8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.954460]  ffff8881029a8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.955081] ==================================================================

test log snippet boot parser 32

Home

[   28.440165] ==================================================================
[   28.441182] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x454/0x4a0
[   28.442951] Write of size 16 at addr ffff888101e88200 by task kunit_try_catch/174
[   28.444204] 
[   28.444521] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   28.445282] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.446378] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.446922] Call Trace:
[   28.447272]  <TASK>
[   28.447578]  dump_stack_lvl+0x73/0xb0
[   28.448008]  print_report+0xd1/0x640
[   28.448983]  ? __virt_addr_valid+0x1db/0x2d0
[   28.450003]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.450633]  kasan_report+0x102/0x140
[   28.451057]  ? kmalloc_oob_16+0x454/0x4a0
[   28.451598]  ? kmalloc_oob_16+0x454/0x4a0
[   28.452059]  __asan_report_store16_noabort+0x1b/0x30
[   28.452832]  kmalloc_oob_16+0x454/0x4a0
[   28.453224]  ? __pfx_kmalloc_oob_16+0x10/0x10
[   28.454313]  ? __schedule+0xc3e/0x2790
[   28.454617]  ? __pfx_read_tsc+0x10/0x10
[   28.455242]  ? ktime_get_ts64+0x84/0x230
[   28.455944]  kunit_try_run_case+0x1b3/0x490
[   28.456361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.456914]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.458159]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.458750]  ? __kthread_parkme+0x82/0x160
[   28.459184]  ? preempt_count_sub+0x50/0x80
[   28.459837]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.460185]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.461070]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.462263]  kthread+0x257/0x310
[   28.462655]  ? __pfx_kthread+0x10/0x10
[   28.463101]  ret_from_fork+0x41/0x80
[   28.463546]  ? __pfx_kthread+0x10/0x10
[   28.463991]  ret_from_fork_asm+0x1a/0x30
[   28.464450]  </TASK>
[   28.464686] 
[   28.465098] Allocated by task 174:
[   28.466119]  kasan_save_stack+0x3d/0x60
[   28.466597]  kasan_save_track+0x18/0x40
[   28.467040]  kasan_save_alloc_info+0x3b/0x50
[   28.467611]  __kasan_kmalloc+0xb7/0xc0
[   28.468081]  __kmalloc_cache_noprof+0x184/0x410
[   28.469088]  kmalloc_oob_16+0xa9/0x4a0
[   28.470122]  kunit_try_run_case+0x1b3/0x490
[   28.470831]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.471892]  kthread+0x257/0x310
[   28.472676]  ret_from_fork+0x41/0x80
[   28.472987]  ret_from_fork_asm+0x1a/0x30
[   28.473987] 
[   28.474186] The buggy address belongs to the object at ffff888101e88200
[   28.474186]  which belongs to the cache kmalloc-16 of size 16
[   28.475211] The buggy address is located 0 bytes inside of
[   28.475211]  allocated 13-byte region [ffff888101e88200, ffff888101e8820d)
[   28.476170] 
[   28.476667] The buggy address belongs to the physical page:
[   28.477190] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e88
[   28.478511] flags: 0x200000000000000(node=0|zone=2)
[   28.479031] page_type: f5(slab)
[   28.479551] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.480164] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   28.480969] page dumped because: kasan: bad access detected
[   28.482006] 
[   28.482276] Memory state around the buggy address:
[   28.482740]  ffff888101e88100: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   28.483776]  ffff888101e88180: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   28.484623] >ffff888101e88200: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.485186]                       ^
[   28.486051]  ffff888101e88280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.486817]  ffff888101e88300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.487438] ==================================================================

test log snippet boot parser 33

Home

[   28.790172] ==================================================================
[   28.791200] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x167/0x330
[   28.793241] Write of size 16 at addr ffff8881029ad569 by task kunit_try_catch/186
[   28.794135] 
[   28.794565] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   28.795576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.796566] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.797454] Call Trace:
[   28.798205]  <TASK>
[   28.798613]  dump_stack_lvl+0x73/0xb0
[   28.799063]  print_report+0xd1/0x640
[   28.799483]  ? __virt_addr_valid+0x1db/0x2d0
[   28.800208]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.801235]  kasan_report+0x102/0x140
[   28.801689]  ? kmalloc_oob_memset_16+0x167/0x330
[   28.802024]  ? kmalloc_oob_memset_16+0x167/0x330
[   28.802617]  kasan_check_range+0x10c/0x1c0
[   28.803036]  __asan_memset+0x27/0x50
[   28.803737]  kmalloc_oob_memset_16+0x167/0x330
[   28.804153]  ? __pfx_kmalloc_oob_memset_16+0x10/0x10
[   28.804815]  ? __schedule+0xc3e/0x2790
[   28.805178]  ? __pfx_read_tsc+0x10/0x10
[   28.805795]  ? ktime_get_ts64+0x84/0x230
[   28.806244]  kunit_try_run_case+0x1b3/0x490
[   28.806808]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.807170]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.808352]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.808797]  ? __kthread_parkme+0x82/0x160
[   28.809610]  ? preempt_count_sub+0x50/0x80
[   28.810125]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.810713]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.811274]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.812018]  kthread+0x257/0x310
[   28.812324]  ? __pfx_kthread+0x10/0x10
[   28.813342]  ret_from_fork+0x41/0x80
[   28.813673]  ? __pfx_kthread+0x10/0x10
[   28.814147]  ret_from_fork_asm+0x1a/0x30
[   28.814599]  </TASK>
[   28.814871] 
[   28.815127] Allocated by task 186:
[   28.815769]  kasan_save_stack+0x3d/0x60
[   28.816240]  kasan_save_track+0x18/0x40
[   28.816688]  kasan_save_alloc_info+0x3b/0x50
[   28.817177]  __kasan_kmalloc+0xb7/0xc0
[   28.818183]  __kmalloc_cache_noprof+0x184/0x410
[   28.819146]  kmalloc_oob_memset_16+0xad/0x330
[   28.820255]  kunit_try_run_case+0x1b3/0x490
[   28.821029]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.822082]  kthread+0x257/0x310
[   28.822263]  ret_from_fork+0x41/0x80
[   28.822846]  ret_from_fork_asm+0x1a/0x30
[   28.823169] 
[   28.823270] The buggy address belongs to the object at ffff8881029ad500
[   28.823270]  which belongs to the cache kmalloc-128 of size 128
[   28.824510] The buggy address is located 105 bytes inside of
[   28.824510]  allocated 120-byte region [ffff8881029ad500, ffff8881029ad578)
[   28.825544] 
[   28.825736] The buggy address belongs to the physical page:
[   28.827255] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ad
[   28.828206] flags: 0x200000000000000(node=0|zone=2)
[   28.828733] page_type: f5(slab)
[   28.829070] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   28.829787] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   28.831621] page dumped because: kasan: bad access detected
[   28.832574] 
[   28.832983] Memory state around the buggy address:
[   28.834119]  ffff8881029ad400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.835102]  ffff8881029ad480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.836464] >ffff8881029ad500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.837045]                                                                 ^
[   28.837852]  ffff8881029ad580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.838909]  ffff8881029ad600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.840354] ==================================================================

test log snippet boot parser 34

Home

[   27.177576] ==================================================================
[   27.178808] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4ca/0x530
[   27.179608] Write of size 1 at addr ffff8881029a8178 by task kunit_try_catch/150
[   27.180958] 
[   27.181822] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.183382] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.184109] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.184958] Call Trace:
[   27.185579]  <TASK>
[   27.186177]  dump_stack_lvl+0x73/0xb0
[   27.187031]  print_report+0xd1/0x640
[   27.187721]  ? __virt_addr_valid+0x1db/0x2d0
[   27.188164]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.188898]  kasan_report+0x102/0x140
[   27.189315]  ? kmalloc_track_caller_oob_right+0x4ca/0x530
[   27.190188]  ? kmalloc_track_caller_oob_right+0x4ca/0x530
[   27.191349]  __asan_report_store1_noabort+0x1b/0x30
[   27.191928]  kmalloc_track_caller_oob_right+0x4ca/0x530
[   27.193045]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   27.194098]  ? __schedule+0xc3e/0x2790
[   27.194912]  ? __pfx_read_tsc+0x10/0x10
[   27.195190]  ? ktime_get_ts64+0x84/0x230
[   27.195498]  kunit_try_run_case+0x1b3/0x490
[   27.196118]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.197479]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.198150]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.198868]  ? __kthread_parkme+0x82/0x160
[   27.199249]  ? preempt_count_sub+0x50/0x80
[   27.200098]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.200439]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.201137]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.201916]  kthread+0x257/0x310
[   27.202201]  ? __pfx_kthread+0x10/0x10
[   27.202934]  ret_from_fork+0x41/0x80
[   27.203735]  ? __pfx_kthread+0x10/0x10
[   27.204334]  ret_from_fork_asm+0x1a/0x30
[   27.204614]  </TASK>
[   27.204918] 
[   27.205169] Allocated by task 150:
[   27.205549]  kasan_save_stack+0x3d/0x60
[   27.207029]  kasan_save_track+0x18/0x40
[   27.207746]  kasan_save_alloc_info+0x3b/0x50
[   27.208028]  __kasan_kmalloc+0xb7/0xc0
[   27.208330]  __kmalloc_node_track_caller_noprof+0x1c6/0x500
[   27.209263]  kmalloc_track_caller_oob_right+0x9a/0x530
[   27.210136]  kunit_try_run_case+0x1b3/0x490
[   27.210472]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.211024]  kthread+0x257/0x310
[   27.211385]  ret_from_fork+0x41/0x80
[   27.211814]  ret_from_fork_asm+0x1a/0x30
[   27.212265] 
[   27.213582] The buggy address belongs to the object at ffff8881029a8100
[   27.213582]  which belongs to the cache kmalloc-128 of size 128
[   27.215014] The buggy address is located 0 bytes to the right of
[   27.215014]  allocated 120-byte region [ffff8881029a8100, ffff8881029a8178)
[   27.217040] 
[   27.217256] The buggy address belongs to the physical page:
[   27.217934] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a8
[   27.218971] flags: 0x200000000000000(node=0|zone=2)
[   27.219569] page_type: f5(slab)
[   27.220052] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   27.220720] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   27.221615] page dumped because: kasan: bad access detected
[   27.222839] 
[   27.223111] Memory state around the buggy address:
[   27.223766]  ffff8881029a8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.224708]  ffff8881029a8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.225863] >ffff8881029a8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.226730]                                                                 ^
[   27.227924]  ffff8881029a8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.229146]  ffff8881029a8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.229581] ==================================================================

test log snippet boot parser 35

Home

[   27.776046] ==================================================================
[   27.777056] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec8/0x11d0
[   27.777594] Write of size 1 at addr ffff888100a9b0da by task kunit_try_catch/166
[   27.778848] 
[   27.779395] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.782169] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.782640] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.782996] Call Trace:
[   27.783129]  <TASK>
[   27.783257]  dump_stack_lvl+0x73/0xb0
[   27.783574]  print_report+0xd1/0x640
[   27.783848]  ? __virt_addr_valid+0x1db/0x2d0
[   27.784919]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.786303]  kasan_report+0x102/0x140
[   27.787020]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   27.787831]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   27.788719]  __asan_report_store1_noabort+0x1b/0x30
[   27.789039]  krealloc_less_oob_helper+0xec8/0x11d0
[   27.789714]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   27.790785]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   27.791263]  ? __pfx_krealloc_less_oob+0x10/0x10
[   27.791705]  krealloc_less_oob+0x1c/0x30
[   27.792047]  kunit_try_run_case+0x1b3/0x490
[   27.792741]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.793188]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.794330]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.795689]  ? __kthread_parkme+0x82/0x160
[   27.796195]  ? preempt_count_sub+0x50/0x80
[   27.796909]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.797856]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.798683]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.799123]  kthread+0x257/0x310
[   27.800161]  ? __pfx_kthread+0x10/0x10
[   27.800732]  ret_from_fork+0x41/0x80
[   27.801557]  ? __pfx_kthread+0x10/0x10
[   27.802368]  ret_from_fork_asm+0x1a/0x30
[   27.803439]  </TASK>
[   27.803622] 
[   27.803760] Allocated by task 166:
[   27.804133]  kasan_save_stack+0x3d/0x60
[   27.805093]  kasan_save_track+0x18/0x40
[   27.805885]  kasan_save_alloc_info+0x3b/0x50
[   27.806906]  __kasan_krealloc+0x190/0x1f0
[   27.807478]  krealloc_noprof+0xf3/0x340
[   27.807726]  krealloc_less_oob_helper+0x1ab/0x11d0
[   27.808297]  krealloc_less_oob+0x1c/0x30
[   27.809078]  kunit_try_run_case+0x1b3/0x490
[   27.809755]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.810305]  kthread+0x257/0x310
[   27.811405]  ret_from_fork+0x41/0x80
[   27.811949]  ret_from_fork_asm+0x1a/0x30
[   27.812255] 
[   27.813266] The buggy address belongs to the object at ffff888100a9b000
[   27.813266]  which belongs to the cache kmalloc-256 of size 256
[   27.814158] The buggy address is located 17 bytes to the right of
[   27.814158]  allocated 201-byte region [ffff888100a9b000, ffff888100a9b0c9)
[   27.816337] 
[   27.816879] The buggy address belongs to the physical page:
[   27.817658] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a9a
[   27.818502] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.819549] flags: 0x200000000000040(head|node=0|zone=2)
[   27.819866] page_type: f5(slab)
[   27.820305] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   27.820988] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   27.822227] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   27.823233] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   27.824095] head: 0200000000000001 ffffea000402a681 ffffffffffffffff 0000000000000000
[   27.824950] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   27.826220] page dumped because: kasan: bad access detected
[   27.827032] 
[   27.827305] Memory state around the buggy address:
[   27.827860]  ffff888100a9af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.828966]  ffff888100a9b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.830138] >ffff888100a9b080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   27.830796]                                                     ^
[   27.831786]  ffff888100a9b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.832542]  ffff888100a9b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.833228] ==================================================================

test log snippet boot parser 36

Home

[   27.648939] ==================================================================
[   27.650093] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd72/0x11d0
[   27.650843] Write of size 1 at addr ffff888100a9b0c9 by task kunit_try_catch/166
[   27.652322] 
[   27.652733] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.654179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.654642] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.656048] Call Trace:
[   27.656260]  <TASK>
[   27.656764]  dump_stack_lvl+0x73/0xb0
[   27.657185]  print_report+0xd1/0x640
[   27.657832]  ? __virt_addr_valid+0x1db/0x2d0
[   27.658247]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.659068]  kasan_report+0x102/0x140
[   27.659408]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   27.660651]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   27.661209]  __asan_report_store1_noabort+0x1b/0x30
[   27.661801]  krealloc_less_oob_helper+0xd72/0x11d0
[   27.662201]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   27.662755]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   27.664061]  ? __pfx_krealloc_less_oob+0x10/0x10
[   27.664701]  krealloc_less_oob+0x1c/0x30
[   27.665096]  kunit_try_run_case+0x1b3/0x490
[   27.665635]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.666304]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.667367]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.668178]  ? __kthread_parkme+0x82/0x160
[   27.669378]  ? preempt_count_sub+0x50/0x80
[   27.669898]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.670304]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.671799]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.672332]  kthread+0x257/0x310
[   27.672738]  ? __pfx_kthread+0x10/0x10
[   27.673397]  ret_from_fork+0x41/0x80
[   27.673876]  ? __pfx_kthread+0x10/0x10
[   27.674823]  ret_from_fork_asm+0x1a/0x30
[   27.675902]  </TASK>
[   27.676181] 
[   27.676344] Allocated by task 166:
[   27.677808]  kasan_save_stack+0x3d/0x60
[   27.678269]  kasan_save_track+0x18/0x40
[   27.678758]  kasan_save_alloc_info+0x3b/0x50
[   27.679485]  __kasan_krealloc+0x190/0x1f0
[   27.680184]  krealloc_noprof+0xf3/0x340
[   27.680832]  krealloc_less_oob_helper+0x1ab/0x11d0
[   27.681304]  krealloc_less_oob+0x1c/0x30
[   27.681822]  kunit_try_run_case+0x1b3/0x490
[   27.682199]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.684081]  kthread+0x257/0x310
[   27.684392]  ret_from_fork+0x41/0x80
[   27.684852]  ret_from_fork_asm+0x1a/0x30
[   27.685249] 
[   27.685591] The buggy address belongs to the object at ffff888100a9b000
[   27.685591]  which belongs to the cache kmalloc-256 of size 256
[   27.687529] The buggy address is located 0 bytes to the right of
[   27.687529]  allocated 201-byte region [ffff888100a9b000, ffff888100a9b0c9)
[   27.688841] 
[   27.689141] The buggy address belongs to the physical page:
[   27.689818] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a9a
[   27.690894] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.691720] flags: 0x200000000000040(head|node=0|zone=2)
[   27.692816] page_type: f5(slab)
[   27.693228] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   27.693868] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   27.695636] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   27.697259] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   27.698503] head: 0200000000000001 ffffea000402a681 ffffffffffffffff 0000000000000000
[   27.698899] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   27.699901] page dumped because: kasan: bad access detected
[   27.701352] 
[   27.702020] Memory state around the buggy address:
[   27.703121]  ffff888100a9af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.704632]  ffff888100a9b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.705335] >ffff888100a9b080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   27.706057]                                               ^
[   27.706685]  ffff888100a9b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.707427]  ffff888100a9b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.708103] ==================================================================

test log snippet boot parser 37

Home

[   27.710121] ==================================================================
[   27.711727] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe25/0x11d0
[   27.713300] Write of size 1 at addr ffff888100a9b0d0 by task kunit_try_catch/166
[   27.715473] 
[   27.715773] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.716742] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.717028] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.718312] Call Trace:
[   27.718737]  <TASK>
[   27.719026]  dump_stack_lvl+0x73/0xb0
[   27.719508]  print_report+0xd1/0x640
[   27.719901]  ? __virt_addr_valid+0x1db/0x2d0
[   27.721633]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.722256]  kasan_report+0x102/0x140
[   27.722771]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   27.723814]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   27.724377]  __asan_report_store1_noabort+0x1b/0x30
[   27.724827]  krealloc_less_oob_helper+0xe25/0x11d0
[   27.725261]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   27.726755]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   27.727275]  ? __pfx_krealloc_less_oob+0x10/0x10
[   27.727913]  krealloc_less_oob+0x1c/0x30
[   27.728355]  kunit_try_run_case+0x1b3/0x490
[   27.730378]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.731162]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.731904]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.732734]  ? __kthread_parkme+0x82/0x160
[   27.733413]  ? preempt_count_sub+0x50/0x80
[   27.734051]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.734508]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.735116]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.735674]  kthread+0x257/0x310
[   27.736046]  ? __pfx_kthread+0x10/0x10
[   27.737224]  ret_from_fork+0x41/0x80
[   27.737916]  ? __pfx_kthread+0x10/0x10
[   27.738351]  ret_from_fork_asm+0x1a/0x30
[   27.739219]  </TASK>
[   27.739534] 
[   27.739801] Allocated by task 166:
[   27.740313]  kasan_save_stack+0x3d/0x60
[   27.741567]  kasan_save_track+0x18/0x40
[   27.742304]  kasan_save_alloc_info+0x3b/0x50
[   27.742930]  __kasan_krealloc+0x190/0x1f0
[   27.743389]  krealloc_noprof+0xf3/0x340
[   27.743948]  krealloc_less_oob_helper+0x1ab/0x11d0
[   27.744435]  krealloc_less_oob+0x1c/0x30
[   27.745523]  kunit_try_run_case+0x1b3/0x490
[   27.745974]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.746891]  kthread+0x257/0x310
[   27.747263]  ret_from_fork+0x41/0x80
[   27.747688]  ret_from_fork_asm+0x1a/0x30
[   27.748092] 
[   27.749123] The buggy address belongs to the object at ffff888100a9b000
[   27.749123]  which belongs to the cache kmalloc-256 of size 256
[   27.751102] The buggy address is located 7 bytes to the right of
[   27.751102]  allocated 201-byte region [ffff888100a9b000, ffff888100a9b0c9)
[   27.753676] 
[   27.754557] The buggy address belongs to the physical page:
[   27.755994] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a9a
[   27.757251] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.757821] flags: 0x200000000000040(head|node=0|zone=2)
[   27.758373] page_type: f5(slab)
[   27.758747] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   27.759578] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   27.760249] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   27.761889] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   27.762735] head: 0200000000000001 ffffea000402a681 ffffffffffffffff 0000000000000000
[   27.763777] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   27.765233] page dumped because: kasan: bad access detected
[   27.765574] 
[   27.766178] Memory state around the buggy address:
[   27.766859]  ffff888100a9af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.768005]  ffff888100a9b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.769271] >ffff888100a9b080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   27.770056]                                                  ^
[   27.770635]  ffff888100a9b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.771729]  ffff888100a9b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.772330] ==================================================================

test log snippet boot parser 38

Home

[   27.893957] ==================================================================
[   27.894246] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd49/0x11d0
[   27.896569] Write of size 1 at addr ffff888100a9b0eb by task kunit_try_catch/166
[   27.897886] 
[   27.898323] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.900692] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.901169] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.902159] Call Trace:
[   27.902951]  <TASK>
[   27.903273]  dump_stack_lvl+0x73/0xb0
[   27.903712]  print_report+0xd1/0x640
[   27.904087]  ? __virt_addr_valid+0x1db/0x2d0
[   27.904521]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.906020]  kasan_report+0x102/0x140
[   27.906669]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   27.907071]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   27.907786]  __asan_report_store1_noabort+0x1b/0x30
[   27.908720]  krealloc_less_oob_helper+0xd49/0x11d0
[   27.909102]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   27.909683]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   27.911114]  ? __pfx_krealloc_less_oob+0x10/0x10
[   27.911935]  krealloc_less_oob+0x1c/0x30
[   27.913117]  kunit_try_run_case+0x1b3/0x490
[   27.914166]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.915248]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.915755]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.916263]  ? __kthread_parkme+0x82/0x160
[   27.916684]  ? preempt_count_sub+0x50/0x80
[   27.917090]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.918275]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.919257]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.920156]  kthread+0x257/0x310
[   27.921004]  ? __pfx_kthread+0x10/0x10
[   27.921774]  ret_from_fork+0x41/0x80
[   27.922908]  ? __pfx_kthread+0x10/0x10
[   27.923238]  ret_from_fork_asm+0x1a/0x30
[   27.923945]  </TASK>
[   27.925191] 
[   27.925730] Allocated by task 166:
[   27.926011]  kasan_save_stack+0x3d/0x60
[   27.926977]  kasan_save_track+0x18/0x40
[   27.927412]  kasan_save_alloc_info+0x3b/0x50
[   27.928041]  __kasan_krealloc+0x190/0x1f0
[   27.929332]  krealloc_noprof+0xf3/0x340
[   27.929856]  krealloc_less_oob_helper+0x1ab/0x11d0
[   27.930151]  krealloc_less_oob+0x1c/0x30
[   27.930419]  kunit_try_run_case+0x1b3/0x490
[   27.931722]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.932768]  kthread+0x257/0x310
[   27.933019]  ret_from_fork+0x41/0x80
[   27.933601]  ret_from_fork_asm+0x1a/0x30
[   27.934095] 
[   27.934551] The buggy address belongs to the object at ffff888100a9b000
[   27.934551]  which belongs to the cache kmalloc-256 of size 256
[   27.936510] The buggy address is located 34 bytes to the right of
[   27.936510]  allocated 201-byte region [ffff888100a9b000, ffff888100a9b0c9)
[   27.937844] 
[   27.938174] The buggy address belongs to the physical page:
[   27.938862] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a9a
[   27.940428] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.941117] flags: 0x200000000000040(head|node=0|zone=2)
[   27.941960] page_type: f5(slab)
[   27.942978] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   27.944275] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   27.945387] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   27.946895] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   27.947745] head: 0200000000000001 ffffea000402a681 ffffffffffffffff 0000000000000000
[   27.948370] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   27.949014] page dumped because: kasan: bad access detected
[   27.950207] 
[   27.950392] Memory state around the buggy address:
[   27.951538]  ffff888100a9af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.952840]  ffff888100a9b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.954177] >ffff888100a9b080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   27.954822]                                                           ^
[   27.955552]  ffff888100a9b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.956236]  ffff888100a9b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.957345] ==================================================================
---
[   27.835133] ==================================================================
[   27.836232] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe92/0x11d0
[   27.837220] Write of size 1 at addr ffff888100a9b0ea by task kunit_try_catch/166
[   27.838516] 
[   27.839273] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.840010] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.840445] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.841216] Call Trace:
[   27.842318]  <TASK>
[   27.842652]  dump_stack_lvl+0x73/0xb0
[   27.843354]  print_report+0xd1/0x640
[   27.844043]  ? __virt_addr_valid+0x1db/0x2d0
[   27.844651]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.845271]  kasan_report+0x102/0x140
[   27.846257]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   27.846793]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   27.847509]  __asan_report_store1_noabort+0x1b/0x30
[   27.848101]  krealloc_less_oob_helper+0xe92/0x11d0
[   27.848961]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   27.850032]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   27.850740]  ? __pfx_krealloc_less_oob+0x10/0x10
[   27.851554]  krealloc_less_oob+0x1c/0x30
[   27.852121]  kunit_try_run_case+0x1b3/0x490
[   27.852827]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.853656]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.854614]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.855625]  ? __kthread_parkme+0x82/0x160
[   27.856201]  ? preempt_count_sub+0x50/0x80
[   27.856833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.857187]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.858434]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.858932]  kthread+0x257/0x310
[   27.859224]  ? __pfx_kthread+0x10/0x10
[   27.859668]  ret_from_fork+0x41/0x80
[   27.860002]  ? __pfx_kthread+0x10/0x10
[   27.860796]  ret_from_fork_asm+0x1a/0x30
[   27.861145]  </TASK>
[   27.861454] 
[   27.862231] Allocated by task 166:
[   27.862582]  kasan_save_stack+0x3d/0x60
[   27.863164]  kasan_save_track+0x18/0x40
[   27.863796]  kasan_save_alloc_info+0x3b/0x50
[   27.864236]  __kasan_krealloc+0x190/0x1f0
[   27.864515]  krealloc_noprof+0xf3/0x340
[   27.864876]  krealloc_less_oob_helper+0x1ab/0x11d0
[   27.866321]  krealloc_less_oob+0x1c/0x30
[   27.866928]  kunit_try_run_case+0x1b3/0x490
[   27.867511]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.868164]  kthread+0x257/0x310
[   27.869375]  ret_from_fork+0x41/0x80
[   27.870047]  ret_from_fork_asm+0x1a/0x30
[   27.870334] 
[   27.870627] The buggy address belongs to the object at ffff888100a9b000
[   27.870627]  which belongs to the cache kmalloc-256 of size 256
[   27.872836] The buggy address is located 33 bytes to the right of
[   27.872836]  allocated 201-byte region [ffff888100a9b000, ffff888100a9b0c9)
[   27.875159] 
[   27.875800] The buggy address belongs to the physical page:
[   27.876525] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a9a
[   27.877593] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.878222] flags: 0x200000000000040(head|node=0|zone=2)
[   27.878847] page_type: f5(slab)
[   27.879206] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   27.881355] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   27.882091] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   27.883766] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   27.884677] head: 0200000000000001 ffffea000402a681 ffffffffffffffff 0000000000000000
[   27.885862] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   27.886849] page dumped because: kasan: bad access detected
[   27.887153] 
[   27.887303] Memory state around the buggy address:
[   27.888184]  ffff888100a9af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.889391]  ffff888100a9b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.890051] >ffff888100a9b080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   27.891716]                                                           ^
[   27.892028]  ffff888100a9b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.892330]  ffff888100a9b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.893238] ==================================================================

test log snippet boot parser 39

Home

[   27.533317] ==================================================================
[   27.534245] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x823/0x930
[   27.535184] Write of size 1 at addr ffff88810039d2eb by task kunit_try_catch/164
[   27.536208] 
[   27.536544] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.537273] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.538375] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.539763] Call Trace:
[   27.540246]  <TASK>
[   27.540827]  dump_stack_lvl+0x73/0xb0
[   27.541611]  print_report+0xd1/0x640
[   27.542176]  ? __virt_addr_valid+0x1db/0x2d0
[   27.542610]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.543220]  kasan_report+0x102/0x140
[   27.543967]  ? krealloc_more_oob_helper+0x823/0x930
[   27.544986]  ? krealloc_more_oob_helper+0x823/0x930
[   27.545433]  __asan_report_store1_noabort+0x1b/0x30
[   27.546880]  krealloc_more_oob_helper+0x823/0x930
[   27.548423]  ? __schedule+0xc3e/0x2790
[   27.550248]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   27.551255]  ? finish_task_switch.isra.0+0x153/0x700
[   27.552016]  ? __switch_to+0x5d9/0xf60
[   27.552244]  ? __schedule+0xc3e/0x2790
[   27.552970]  ? __pfx_read_tsc+0x10/0x10
[   27.554025]  krealloc_more_oob+0x1c/0x30
[   27.554928]  kunit_try_run_case+0x1b3/0x490
[   27.555323]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.555642]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.556297]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.557779]  ? __kthread_parkme+0x82/0x160
[   27.558333]  ? preempt_count_sub+0x50/0x80
[   27.559112]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.559927]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.560758]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.561302]  kthread+0x257/0x310
[   27.562074]  ? __pfx_kthread+0x10/0x10
[   27.562869]  ret_from_fork+0x41/0x80
[   27.563322]  ? __pfx_kthread+0x10/0x10
[   27.563955]  ret_from_fork_asm+0x1a/0x30
[   27.564840]  </TASK>
[   27.565160] 
[   27.565326] Allocated by task 164:
[   27.566222]  kasan_save_stack+0x3d/0x60
[   27.566861]  kasan_save_track+0x18/0x40
[   27.567677]  kasan_save_alloc_info+0x3b/0x50
[   27.568577]  __kasan_krealloc+0x190/0x1f0
[   27.569014]  krealloc_noprof+0xf3/0x340
[   27.569452]  krealloc_more_oob_helper+0x1aa/0x930
[   27.569926]  krealloc_more_oob+0x1c/0x30
[   27.570838]  kunit_try_run_case+0x1b3/0x490
[   27.571591]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.572103]  kthread+0x257/0x310
[   27.572704]  ret_from_fork+0x41/0x80
[   27.572967]  ret_from_fork_asm+0x1a/0x30
[   27.573808] 
[   27.574011] The buggy address belongs to the object at ffff88810039d200
[   27.574011]  which belongs to the cache kmalloc-256 of size 256
[   27.575669] The buggy address is located 0 bytes to the right of
[   27.575669]  allocated 235-byte region [ffff88810039d200, ffff88810039d2eb)
[   27.576980] 
[   27.577322] The buggy address belongs to the physical page:
[   27.577744] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10039c
[   27.579134] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.580118] flags: 0x200000000000040(head|node=0|zone=2)
[   27.580852] page_type: f5(slab)
[   27.581324] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   27.582143] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   27.583311] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   27.584551] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   27.584895] head: 0200000000000001 ffffea000400e701 ffffffffffffffff 0000000000000000
[   27.585185] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   27.585629] page dumped because: kasan: bad access detected
[   27.586688] 
[   27.586950] Memory state around the buggy address:
[   27.587585]  ffff88810039d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.588383]  ffff88810039d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.588912] >ffff88810039d280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   27.589984]                                                           ^
[   27.590809]  ffff88810039d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.591587]  ffff88810039d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.591996] ==================================================================

test log snippet boot parser 40

Home

[   27.967660] ==================================================================
[   27.968534] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x823/0x930
[   27.969547] Write of size 1 at addr ffff8881023aa0eb by task kunit_try_catch/168
[   27.970331] 
[   27.970650] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.972433] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.973069] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.973881] Call Trace:
[   27.974332]  <TASK>
[   27.974666]  dump_stack_lvl+0x73/0xb0
[   27.975103]  print_report+0xd1/0x640
[   27.975503]  ? __virt_addr_valid+0x1db/0x2d0
[   27.975907]  ? kasan_addr_to_slab+0x11/0xa0
[   27.976278]  kasan_report+0x102/0x140
[   27.977026]  ? krealloc_more_oob_helper+0x823/0x930
[   27.977679]  ? krealloc_more_oob_helper+0x823/0x930
[   27.978220]  __asan_report_store1_noabort+0x1b/0x30
[   27.978978]  krealloc_more_oob_helper+0x823/0x930
[   27.979382]  ? __schedule+0xc3e/0x2790
[   27.979828]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   27.980659]  ? finish_task_switch.isra.0+0x153/0x700
[   27.981092]  ? __switch_to+0x5d9/0xf60
[   27.981767]  ? __schedule+0xc3e/0x2790
[   27.982559]  ? __pfx_read_tsc+0x10/0x10
[   27.982900]  krealloc_large_more_oob+0x1c/0x30
[   27.983391]  kunit_try_run_case+0x1b3/0x490
[   27.984015]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.984243]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.984767]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.985273]  ? __kthread_parkme+0x82/0x160
[   27.986520]  ? preempt_count_sub+0x50/0x80
[   27.986900]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.987392]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.987994]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.989041]  kthread+0x257/0x310
[   27.990027]  ? __pfx_kthread+0x10/0x10
[   27.990322]  ret_from_fork+0x41/0x80
[   27.990784]  ? __pfx_kthread+0x10/0x10
[   27.991095]  ret_from_fork_asm+0x1a/0x30
[   27.991644]  </TASK>
[   27.991851] 
[   27.992021] The buggy address belongs to the physical page:
[   27.992649] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023a8
[   27.993399] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.993872] flags: 0x200000000000040(head|node=0|zone=2)
[   27.994518] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.995480] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.996080] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.996983] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.998362] head: 0200000000000002 ffffea000408ea01 ffffffffffffffff 0000000000000000
[   27.999105] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   28.000500] page dumped because: kasan: bad access detected
[   28.001052] 
[   28.001275] Memory state around the buggy address:
[   28.002220]  ffff8881023a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.003151]  ffff8881023aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.003669] >ffff8881023aa080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   28.004222]                                                           ^
[   28.005339]  ffff8881023aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   28.006252]  ffff8881023aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   28.007326] ==================================================================

test log snippet boot parser 41

Home

[   28.009118] ==================================================================
[   28.010382] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7ed/0x930
[   28.011326] Write of size 1 at addr ffff8881023aa0f0 by task kunit_try_catch/168
[   28.011651] 
[   28.011765] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   28.012110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.012310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.013805] Call Trace:
[   28.014497]  <TASK>
[   28.014765]  dump_stack_lvl+0x73/0xb0
[   28.015190]  print_report+0xd1/0x640
[   28.016012]  ? __virt_addr_valid+0x1db/0x2d0
[   28.016943]  ? kasan_addr_to_slab+0x11/0xa0
[   28.017387]  kasan_report+0x102/0x140
[   28.018619]  ? krealloc_more_oob_helper+0x7ed/0x930
[   28.019329]  ? krealloc_more_oob_helper+0x7ed/0x930
[   28.019804]  __asan_report_store1_noabort+0x1b/0x30
[   28.020249]  krealloc_more_oob_helper+0x7ed/0x930
[   28.021127]  ? __schedule+0xc3e/0x2790
[   28.021464]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   28.022409]  ? finish_task_switch.isra.0+0x153/0x700
[   28.022934]  ? __switch_to+0x5d9/0xf60
[   28.023409]  ? __schedule+0xc3e/0x2790
[   28.024424]  ? __pfx_read_tsc+0x10/0x10
[   28.024730]  krealloc_large_more_oob+0x1c/0x30
[   28.025452]  kunit_try_run_case+0x1b3/0x490
[   28.026340]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.027169]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.027768]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.028271]  ? __kthread_parkme+0x82/0x160
[   28.028653]  ? preempt_count_sub+0x50/0x80
[   28.028944]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.029266]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.029779]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.030141]  kthread+0x257/0x310
[   28.030618]  ? __pfx_kthread+0x10/0x10
[   28.031226]  ret_from_fork+0x41/0x80
[   28.031944]  ? __pfx_kthread+0x10/0x10
[   28.032580]  ret_from_fork_asm+0x1a/0x30
[   28.032871]  </TASK>
[   28.033154] 
[   28.033472] The buggy address belongs to the physical page:
[   28.033925] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023a8
[   28.034744] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.035334] flags: 0x200000000000040(head|node=0|zone=2)
[   28.035936] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   28.036799] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.037264] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   28.038084] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.038936] head: 0200000000000002 ffffea000408ea01 ffffffffffffffff 0000000000000000
[   28.039478] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   28.040245] page dumped because: kasan: bad access detected
[   28.040858] 
[   28.041021] Memory state around the buggy address:
[   28.041340]  ffff8881023a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.042107]  ffff8881023aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.042875] >ffff8881023aa080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   28.043466]                                                              ^
[   28.044050]  ffff8881023aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   28.044837]  ffff8881023aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   28.045394] ==================================================================

test log snippet boot parser 42

Home

[   27.594602] ==================================================================
[   27.595419] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7ed/0x930
[   27.596227] Write of size 1 at addr ffff88810039d2f0 by task kunit_try_catch/164
[   27.597010] 
[   27.597187] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.598367] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.599370] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.600195] Call Trace:
[   27.600651]  <TASK>
[   27.600975]  dump_stack_lvl+0x73/0xb0
[   27.601451]  print_report+0xd1/0x640
[   27.602041]  ? __virt_addr_valid+0x1db/0x2d0
[   27.602853]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.603301]  kasan_report+0x102/0x140
[   27.603737]  ? krealloc_more_oob_helper+0x7ed/0x930
[   27.605045]  ? krealloc_more_oob_helper+0x7ed/0x930
[   27.605855]  __asan_report_store1_noabort+0x1b/0x30
[   27.606401]  krealloc_more_oob_helper+0x7ed/0x930
[   27.607351]  ? __schedule+0xc3e/0x2790
[   27.607814]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   27.608089]  ? finish_task_switch.isra.0+0x153/0x700
[   27.608340]  ? __switch_to+0x5d9/0xf60
[   27.608858]  ? __schedule+0xc3e/0x2790
[   27.609419]  ? __pfx_read_tsc+0x10/0x10
[   27.609888]  krealloc_more_oob+0x1c/0x30
[   27.610634]  kunit_try_run_case+0x1b3/0x490
[   27.610965]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.611307]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.612095]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.613118]  ? __kthread_parkme+0x82/0x160
[   27.613704]  ? preempt_count_sub+0x50/0x80
[   27.614090]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.614585]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.615208]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.615750]  kthread+0x257/0x310
[   27.616191]  ? __pfx_kthread+0x10/0x10
[   27.616764]  ret_from_fork+0x41/0x80
[   27.617065]  ? __pfx_kthread+0x10/0x10
[   27.617586]  ret_from_fork_asm+0x1a/0x30
[   27.618031]  </TASK>
[   27.618244] 
[   27.618481] Allocated by task 164:
[   27.618938]  kasan_save_stack+0x3d/0x60
[   27.619373]  kasan_save_track+0x18/0x40
[   27.619652]  kasan_save_alloc_info+0x3b/0x50
[   27.620153]  __kasan_krealloc+0x190/0x1f0
[   27.620679]  krealloc_noprof+0xf3/0x340
[   27.621028]  krealloc_more_oob_helper+0x1aa/0x930
[   27.621703]  krealloc_more_oob+0x1c/0x30
[   27.622228]  kunit_try_run_case+0x1b3/0x490
[   27.622842]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.623436]  kthread+0x257/0x310
[   27.623734]  ret_from_fork+0x41/0x80
[   27.624100]  ret_from_fork_asm+0x1a/0x30
[   27.625176] 
[   27.625524] The buggy address belongs to the object at ffff88810039d200
[   27.625524]  which belongs to the cache kmalloc-256 of size 256
[   27.627335] The buggy address is located 5 bytes to the right of
[   27.627335]  allocated 235-byte region [ffff88810039d200, ffff88810039d2eb)
[   27.628326] 
[   27.628627] The buggy address belongs to the physical page:
[   27.629223] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10039c
[   27.629908] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.630791] flags: 0x200000000000040(head|node=0|zone=2)
[   27.631241] page_type: f5(slab)
[   27.631664] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   27.632257] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   27.632923] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   27.633495] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   27.634158] head: 0200000000000001 ffffea000400e701 ffffffffffffffff 0000000000000000
[   27.634871] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   27.635660] page dumped because: kasan: bad access detected
[   27.636093] 
[   27.636242] Memory state around the buggy address:
[   27.636848]  ffff88810039d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.637563]  ffff88810039d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.638188] >ffff88810039d280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   27.638811]                                                              ^
[   27.639521]  ffff88810039d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.640089]  ffff88810039d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.640678] ==================================================================

test log snippet boot parser 43

Home

[   29.335111] ==================================================================
[   29.336604] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7eb/0x9b0
[   29.337462] Read of size 1 at addr ffff8881029ade78 by task kunit_try_catch/202
[   29.338112] 
[   29.338396] CPU: 1 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.339266] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.340030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.340599] Call Trace:
[   29.340868]  <TASK>
[   29.342528]  dump_stack_lvl+0x73/0xb0
[   29.343035]  print_report+0xd1/0x640
[   29.343380]  ? __virt_addr_valid+0x1db/0x2d0
[   29.344036]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.344505]  kasan_report+0x102/0x140
[   29.344897]  ? ksize_unpoisons_memory+0x7eb/0x9b0
[   29.345324]  ? ksize_unpoisons_memory+0x7eb/0x9b0
[   29.345784]  __asan_report_load1_noabort+0x18/0x20
[   29.346340]  ksize_unpoisons_memory+0x7eb/0x9b0
[   29.347026]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   29.347626]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   29.348019]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   29.349540]  kunit_try_run_case+0x1b3/0x490
[   29.350036]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.350771]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.351205]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.351698]  ? __kthread_parkme+0x82/0x160
[   29.352124]  ? preempt_count_sub+0x50/0x80
[   29.353311]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.353778]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.354455]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.354965]  kthread+0x257/0x310
[   29.355247]  ? __pfx_kthread+0x10/0x10
[   29.355720]  ret_from_fork+0x41/0x80
[   29.356014]  ? __pfx_kthread+0x10/0x10
[   29.356620]  ret_from_fork_asm+0x1a/0x30
[   29.357156]  </TASK>
[   29.357370] 
[   29.357702] Allocated by task 202:
[   29.358880]  kasan_save_stack+0x3d/0x60
[   29.359653]  kasan_save_track+0x18/0x40
[   29.360096]  kasan_save_alloc_info+0x3b/0x50
[   29.360424]  __kasan_kmalloc+0xb7/0xc0
[   29.361364]  __kmalloc_cache_noprof+0x184/0x410
[   29.362045]  ksize_unpoisons_memory+0xc8/0x9b0
[   29.362587]  kunit_try_run_case+0x1b3/0x490
[   29.363017]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.364359]  kthread+0x257/0x310
[   29.364824]  ret_from_fork+0x41/0x80
[   29.365635]  ret_from_fork_asm+0x1a/0x30
[   29.366310] 
[   29.366557] The buggy address belongs to the object at ffff8881029ade00
[   29.366557]  which belongs to the cache kmalloc-128 of size 128
[   29.367967] The buggy address is located 5 bytes to the right of
[   29.367967]  allocated 115-byte region [ffff8881029ade00, ffff8881029ade73)
[   29.369026] 
[   29.369264] The buggy address belongs to the physical page:
[   29.370454] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ad
[   29.371052] flags: 0x200000000000000(node=0|zone=2)
[   29.371672] page_type: f5(slab)
[   29.372161] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   29.372999] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   29.373678] page dumped because: kasan: bad access detected
[   29.374107] 
[   29.374563] Memory state around the buggy address:
[   29.375054]  ffff8881029add00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.376005]  ffff8881029add80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.377033] >ffff8881029ade00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.378137]                                                                 ^
[   29.379182]  ffff8881029ade80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.380128]  ffff8881029adf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.380905] ==================================================================
---
[   29.382856] ==================================================================
[   29.383795] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b8/0x9b0
[   29.384819] Read of size 1 at addr ffff8881029ade7f by task kunit_try_catch/202
[   29.385627] 
[   29.386111] CPU: 1 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.387474] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.387869] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.388978] Call Trace:
[   29.389367]  <TASK>
[   29.389742]  dump_stack_lvl+0x73/0xb0
[   29.390156]  print_report+0xd1/0x640
[   29.390588]  ? __virt_addr_valid+0x1db/0x2d0
[   29.391030]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.393258]  kasan_report+0x102/0x140
[   29.393748]  ? ksize_unpoisons_memory+0x7b8/0x9b0
[   29.394568]  ? ksize_unpoisons_memory+0x7b8/0x9b0
[   29.395151]  __asan_report_load1_noabort+0x18/0x20
[   29.395708]  ksize_unpoisons_memory+0x7b8/0x9b0
[   29.396879]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   29.397644]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   29.397890]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   29.398123]  kunit_try_run_case+0x1b3/0x490
[   29.398374]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.398826]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.400032]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.400876]  ? __kthread_parkme+0x82/0x160
[   29.401328]  ? preempt_count_sub+0x50/0x80
[   29.401724]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.402066]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.403127]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.404061]  kthread+0x257/0x310
[   29.404906]  ? __pfx_kthread+0x10/0x10
[   29.405656]  ret_from_fork+0x41/0x80
[   29.406273]  ? __pfx_kthread+0x10/0x10
[   29.406709]  ret_from_fork_asm+0x1a/0x30
[   29.406920]  </TASK>
[   29.407051] 
[   29.407244] Allocated by task 202:
[   29.407525]  kasan_save_stack+0x3d/0x60
[   29.407964]  kasan_save_track+0x18/0x40
[   29.408245]  kasan_save_alloc_info+0x3b/0x50
[   29.409067]  __kasan_kmalloc+0xb7/0xc0
[   29.409764]  __kmalloc_cache_noprof+0x184/0x410
[   29.410247]  ksize_unpoisons_memory+0xc8/0x9b0
[   29.410617]  kunit_try_run_case+0x1b3/0x490
[   29.411541]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.412183]  kthread+0x257/0x310
[   29.412898]  ret_from_fork+0x41/0x80
[   29.413319]  ret_from_fork_asm+0x1a/0x30
[   29.413950] 
[   29.414107] The buggy address belongs to the object at ffff8881029ade00
[   29.414107]  which belongs to the cache kmalloc-128 of size 128
[   29.415897] The buggy address is located 12 bytes to the right of
[   29.415897]  allocated 115-byte region [ffff8881029ade00, ffff8881029ade73)
[   29.417220] 
[   29.417761] The buggy address belongs to the physical page:
[   29.418805] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ad
[   29.419140] flags: 0x200000000000000(node=0|zone=2)
[   29.419494] page_type: f5(slab)
[   29.420162] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   29.421215] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   29.422243] page dumped because: kasan: bad access detected
[   29.422770] 
[   29.422965] Memory state around the buggy address:
[   29.423482]  ffff8881029add00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.424172]  ffff8881029add80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.425007] >ffff8881029ade00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.425760]                                                                 ^
[   29.426715]  ffff8881029ade80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.427548]  ffff8881029adf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.428212] ==================================================================

test log snippet boot parser 44

Home

[   29.285268] ==================================================================
[   29.286888] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81e/0x9b0
[   29.287734] Read of size 1 at addr ffff8881029ade73 by task kunit_try_catch/202
[   29.288466] 
[   29.288738] CPU: 1 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.289281] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.290038] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.291190] Call Trace:
[   29.292027]  <TASK>
[   29.292248]  dump_stack_lvl+0x73/0xb0
[   29.293067]  print_report+0xd1/0x640
[   29.293978]  ? __virt_addr_valid+0x1db/0x2d0
[   29.294557]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.295194]  kasan_report+0x102/0x140
[   29.295671]  ? ksize_unpoisons_memory+0x81e/0x9b0
[   29.296134]  ? ksize_unpoisons_memory+0x81e/0x9b0
[   29.296700]  __asan_report_load1_noabort+0x18/0x20
[   29.297400]  ksize_unpoisons_memory+0x81e/0x9b0
[   29.297749]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   29.298762]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   29.299221]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   29.299667]  kunit_try_run_case+0x1b3/0x490
[   29.300188]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.300957]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.301396]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.302250]  ? __kthread_parkme+0x82/0x160
[   29.302660]  ? preempt_count_sub+0x50/0x80
[   29.303425]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.303904]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.305029]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.305754]  kthread+0x257/0x310
[   29.306119]  ? __pfx_kthread+0x10/0x10
[   29.306934]  ret_from_fork+0x41/0x80
[   29.307368]  ? __pfx_kthread+0x10/0x10
[   29.307863]  ret_from_fork_asm+0x1a/0x30
[   29.308314]  </TASK>
[   29.308492] 
[   29.308630] Allocated by task 202:
[   29.308873]  kasan_save_stack+0x3d/0x60
[   29.309331]  kasan_save_track+0x18/0x40
[   29.309907]  kasan_save_alloc_info+0x3b/0x50
[   29.311196]  __kasan_kmalloc+0xb7/0xc0
[   29.312972]  __kmalloc_cache_noprof+0x184/0x410
[   29.313919]  ksize_unpoisons_memory+0xc8/0x9b0
[   29.314141]  kunit_try_run_case+0x1b3/0x490
[   29.314407]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.315341]  kthread+0x257/0x310
[   29.315928]  ret_from_fork+0x41/0x80
[   29.316256]  ret_from_fork_asm+0x1a/0x30
[   29.316838] 
[   29.316996] The buggy address belongs to the object at ffff8881029ade00
[   29.316996]  which belongs to the cache kmalloc-128 of size 128
[   29.319123] The buggy address is located 0 bytes to the right of
[   29.319123]  allocated 115-byte region [ffff8881029ade00, ffff8881029ade73)
[   29.320737] 
[   29.320893] The buggy address belongs to the physical page:
[   29.322059] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ad
[   29.323089] flags: 0x200000000000000(node=0|zone=2)
[   29.323969] page_type: f5(slab)
[   29.324182] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   29.324761] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   29.325467] page dumped because: kasan: bad access detected
[   29.325986] 
[   29.326173] Memory state around the buggy address:
[   29.327975]  ffff8881029add00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   29.328858]  ffff8881029add80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.329557] >ffff8881029ade00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.330219]                                                              ^
[   29.331043]  ffff8881029ade80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.332277]  ffff8881029adf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.333104] ==================================================================

test log snippet boot parser 45

Home

[   31.623951] ==================================================================
[   31.624778] BUG: KASAN: slab-out-of-bounds in memchr+0x79/0x90
[   31.625239] Read of size 1 at addr ffff8881029be3d8 by task kunit_try_catch/263
[   31.626113] 
[   31.626707] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   31.627947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.628816] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.629808] Call Trace:
[   31.630150]  <TASK>
[   31.630404]  dump_stack_lvl+0x73/0xb0
[   31.631106]  print_report+0xd1/0x640
[   31.631473]  ? __virt_addr_valid+0x1db/0x2d0
[   31.631971]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.632647]  kasan_report+0x102/0x140
[   31.633024]  ? memchr+0x79/0x90
[   31.633274]  ? memchr+0x79/0x90
[   31.633937]  __asan_report_load1_noabort+0x18/0x20
[   31.634294]  memchr+0x79/0x90
[   31.635220]  kasan_memchr+0x163/0x320
[   31.636106]  ? __pfx_kasan_memchr+0x10/0x10
[   31.636523]  ? __schedule+0xc3e/0x2790
[   31.637161]  ? __pfx_read_tsc+0x10/0x10
[   31.637708]  ? ktime_get_ts64+0x84/0x230
[   31.638231]  kunit_try_run_case+0x1b3/0x490
[   31.638671]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.639084]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.640119]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.640905]  ? __kthread_parkme+0x82/0x160
[   31.641359]  ? preempt_count_sub+0x50/0x80
[   31.642632]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.642969]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.643784]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.644414]  kthread+0x257/0x310
[   31.644831]  ? __pfx_kthread+0x10/0x10
[   31.645188]  ret_from_fork+0x41/0x80
[   31.646603]  ? __pfx_kthread+0x10/0x10
[   31.647300]  ret_from_fork_asm+0x1a/0x30
[   31.648055]  </TASK>
[   31.648567] 
[   31.648718] Allocated by task 263:
[   31.649688]  kasan_save_stack+0x3d/0x60
[   31.650200]  kasan_save_track+0x18/0x40
[   31.651115]  kasan_save_alloc_info+0x3b/0x50
[   31.651692]  __kasan_kmalloc+0xb7/0xc0
[   31.652023]  __kmalloc_cache_noprof+0x184/0x410
[   31.652493]  kasan_memchr+0xad/0x320
[   31.652875]  kunit_try_run_case+0x1b3/0x490
[   31.654075]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.655238]  kthread+0x257/0x310
[   31.655824]  ret_from_fork+0x41/0x80
[   31.656247]  ret_from_fork_asm+0x1a/0x30
[   31.656684] 
[   31.657160] The buggy address belongs to the object at ffff8881029be3c0
[   31.657160]  which belongs to the cache kmalloc-32 of size 32
[   31.658812] The buggy address is located 0 bytes to the right of
[   31.658812]  allocated 24-byte region [ffff8881029be3c0, ffff8881029be3d8)
[   31.661291] 
[   31.661525] The buggy address belongs to the physical page:
[   31.661957] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029be
[   31.662590] flags: 0x200000000000000(node=0|zone=2)
[   31.663027] page_type: f5(slab)
[   31.663862] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   31.665083] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   31.665707] page dumped because: kasan: bad access detected
[   31.666139] 
[   31.666337] Memory state around the buggy address:
[   31.666721]  ffff8881029be280: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   31.667275]  ffff8881029be300: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   31.668736] >ffff8881029be380: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   31.669654]                                                     ^
[   31.670793]  ffff8881029be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.671534]  ffff8881029be480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.672097] ==================================================================

test log snippet boot parser 46

Home

[   30.837422] ==================================================================
[   30.838579] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   30.839189] Read of size 1 at addr ffff8881029b82bb by task kunit_try_catch/233
[   30.840021] 
[   30.840300] CPU: 1 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.841301] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.841821] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.842768] Call Trace:
[   30.843023]  <TASK>
[   30.843228]  dump_stack_lvl+0x73/0xb0
[   30.843915]  print_report+0xd1/0x640
[   30.844354]  ? __virt_addr_valid+0x1db/0x2d0
[   30.845088]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.845830]  kasan_report+0x102/0x140
[   30.846298]  ? mempool_oob_right_helper+0x31a/0x380
[   30.846935]  ? mempool_oob_right_helper+0x31a/0x380
[   30.847551]  __asan_report_load1_noabort+0x18/0x20
[   30.847993]  mempool_oob_right_helper+0x31a/0x380
[   30.848761]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   30.849223]  mempool_slab_oob_right+0xb1/0x100
[   30.849798]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   30.850194]  ? __switch_to+0x5d9/0xf60
[   30.850709]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   30.851262]  ? __pfx_mempool_free_slab+0x10/0x10
[   30.851871]  ? __pfx_read_tsc+0x10/0x10
[   30.852348]  ? ktime_get_ts64+0x84/0x230
[   30.853037]  kunit_try_run_case+0x1b3/0x490
[   30.853632]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.854099]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.854700]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.855324]  ? __kthread_parkme+0x82/0x160
[   30.855875]  ? preempt_count_sub+0x50/0x80
[   30.856268]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.856997]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.857783]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.858247]  kthread+0x257/0x310
[   30.858849]  ? __pfx_kthread+0x10/0x10
[   30.859241]  ret_from_fork+0x41/0x80
[   30.859764]  ? __pfx_kthread+0x10/0x10
[   30.860126]  ret_from_fork_asm+0x1a/0x30
[   30.860921]  </TASK>
[   30.861138] 
[   30.861290] Allocated by task 233:
[   30.861910]  kasan_save_stack+0x3d/0x60
[   30.862271]  kasan_save_track+0x18/0x40
[   30.862934]  kasan_save_alloc_info+0x3b/0x50
[   30.863534]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   30.863931]  remove_element+0x11e/0x190
[   30.864703]  mempool_alloc_preallocated+0x4d/0x90
[   30.865045]  mempool_oob_right_helper+0x8b/0x380
[   30.865797]  mempool_slab_oob_right+0xb1/0x100
[   30.866204]  kunit_try_run_case+0x1b3/0x490
[   30.866869]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.867587]  kthread+0x257/0x310
[   30.867878]  ret_from_fork+0x41/0x80
[   30.868140]  ret_from_fork_asm+0x1a/0x30
[   30.868885] 
[   30.869149] The buggy address belongs to the object at ffff8881029b8240
[   30.869149]  which belongs to the cache test_cache of size 123
[   30.870111] The buggy address is located 0 bytes to the right of
[   30.870111]  allocated 123-byte region [ffff8881029b8240, ffff8881029b82bb)
[   30.871267] 
[   30.871587] The buggy address belongs to the physical page:
[   30.871963] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b8
[   30.872748] flags: 0x200000000000000(node=0|zone=2)
[   30.873151] page_type: f5(slab)
[   30.873822] raw: 0200000000000000 ffff888101aa8280 dead000000000122 0000000000000000
[   30.874755] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   30.875353] page dumped because: kasan: bad access detected
[   30.876119] 
[   30.876542] Memory state around the buggy address:
[   30.876980]  ffff8881029b8180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.877854]  ffff8881029b8200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   30.878578] >ffff8881029b8280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   30.879132]                                         ^
[   30.879781]  ffff8881029b8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.880545]  ffff8881029b8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.881157] ==================================================================

test log snippet boot parser 47

Home

[   30.735070] ==================================================================
[   30.735966] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   30.737228] Read of size 1 at addr ffff888101ea4d73 by task kunit_try_catch/229
[   30.737940] 
[   30.738246] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.739379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.739670] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.740720] Call Trace:
[   30.741296]  <TASK>
[   30.741678]  dump_stack_lvl+0x73/0xb0
[   30.741999]  print_report+0xd1/0x640
[   30.742616]  ? __virt_addr_valid+0x1db/0x2d0
[   30.743282]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.744223]  kasan_report+0x102/0x140
[   30.744561]  ? mempool_oob_right_helper+0x31a/0x380
[   30.744914]  ? mempool_oob_right_helper+0x31a/0x380
[   30.745825]  __asan_report_load1_noabort+0x18/0x20
[   30.746286]  mempool_oob_right_helper+0x31a/0x380
[   30.746966]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   30.747653]  mempool_kmalloc_oob_right+0xb6/0x100
[   30.748429]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   30.748988]  ? __switch_to+0x5d9/0xf60
[   30.749439]  ? __pfx_mempool_kmalloc+0x10/0x10
[   30.749914]  ? __pfx_mempool_kfree+0x10/0x10
[   30.751475]  ? __pfx_read_tsc+0x10/0x10
[   30.751962]  ? ktime_get_ts64+0x84/0x230
[   30.752329]  kunit_try_run_case+0x1b3/0x490
[   30.753054]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.753453]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.753960]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.754638]  ? __kthread_parkme+0x82/0x160
[   30.755517]  ? preempt_count_sub+0x50/0x80
[   30.756339]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.756827]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.757358]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.757844]  kthread+0x257/0x310
[   30.758170]  ? __pfx_kthread+0x10/0x10
[   30.758788]  ret_from_fork+0x41/0x80
[   30.759218]  ? __pfx_kthread+0x10/0x10
[   30.759543]  ret_from_fork_asm+0x1a/0x30
[   30.759972]  </TASK>
[   30.760240] 
[   30.760518] Allocated by task 229:
[   30.760903]  kasan_save_stack+0x3d/0x60
[   30.761435]  kasan_save_track+0x18/0x40
[   30.761715]  kasan_save_alloc_info+0x3b/0x50
[   30.762672]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   30.764294]  remove_element+0x11e/0x190
[   30.764925]  mempool_alloc_preallocated+0x4d/0x90
[   30.765410]  mempool_oob_right_helper+0x8b/0x380
[   30.766000]  mempool_kmalloc_oob_right+0xb6/0x100
[   30.766937]  kunit_try_run_case+0x1b3/0x490
[   30.767339]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.768058]  kthread+0x257/0x310
[   30.768488]  ret_from_fork+0x41/0x80
[   30.768870]  ret_from_fork_asm+0x1a/0x30
[   30.769297] 
[   30.769505] The buggy address belongs to the object at ffff888101ea4d00
[   30.769505]  which belongs to the cache kmalloc-128 of size 128
[   30.771175] The buggy address is located 0 bytes to the right of
[   30.771175]  allocated 115-byte region [ffff888101ea4d00, ffff888101ea4d73)
[   30.772954] 
[   30.773232] The buggy address belongs to the physical page:
[   30.774022] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ea4
[   30.775172] flags: 0x200000000000000(node=0|zone=2)
[   30.775873] page_type: f5(slab)
[   30.776248] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   30.777056] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.777914] page dumped because: kasan: bad access detected
[   30.778559] 
[   30.778745] Memory state around the buggy address:
[   30.779247]  ffff888101ea4c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.779917]  ffff888101ea4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.781160] >ffff888101ea4d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.782012]                                                              ^
[   30.782908]  ffff888101ea4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.783838]  ffff888101ea4e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.784904] ==================================================================

test log snippet boot parser 48

Home

[   31.891650] ==================================================================
[   31.892161] BUG: KASAN: slab-use-after-free in kasan_strings+0xa0f/0xb60
[   31.893523] Read of size 1 at addr ffff8881029be550 by task kunit_try_catch/267
[   31.894218] 
[   31.894443] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   31.895280] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.895587] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.896118] Call Trace:
[   31.896684]  <TASK>
[   31.897001]  dump_stack_lvl+0x73/0xb0
[   31.898726]  print_report+0xd1/0x640
[   31.900043]  ? __virt_addr_valid+0x1db/0x2d0
[   31.900801]  ? kasan_complete_mode_report_info+0x64/0x200
[   31.901236]  kasan_report+0x102/0x140
[   31.901766]  ? kasan_strings+0xa0f/0xb60
[   31.902651]  ? kasan_strings+0xa0f/0xb60
[   31.902968]  __asan_report_load1_noabort+0x18/0x20
[   31.903556]  kasan_strings+0xa0f/0xb60
[   31.904462]  ? __pfx_kasan_strings+0x10/0x10
[   31.905232]  ? __pfx_kasan_strings+0x10/0x10
[   31.905921]  kunit_try_run_case+0x1b3/0x490
[   31.906133]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.906448]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.906843]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.907946]  ? __kthread_parkme+0x82/0x160
[   31.908490]  ? preempt_count_sub+0x50/0x80
[   31.908919]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.909754]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.910500]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.911023]  kthread+0x257/0x310
[   31.911535]  ? __pfx_kthread+0x10/0x10
[   31.911912]  ret_from_fork+0x41/0x80
[   31.912671]  ? __pfx_kthread+0x10/0x10
[   31.913149]  ret_from_fork_asm+0x1a/0x30
[   31.913838]  </TASK>
[   31.914194] 
[   31.914685] Allocated by task 267:
[   31.915333]  kasan_save_stack+0x3d/0x60
[   31.915872]  kasan_save_track+0x18/0x40
[   31.916308]  kasan_save_alloc_info+0x3b/0x50
[   31.916907]  __kasan_kmalloc+0xb7/0xc0
[   31.917450]  __kmalloc_cache_noprof+0x184/0x410
[   31.917967]  kasan_strings+0xb3/0xb60
[   31.918432]  kunit_try_run_case+0x1b3/0x490
[   31.919070]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.919752]  kthread+0x257/0x310
[   31.920199]  ret_from_fork+0x41/0x80
[   31.920808]  ret_from_fork_asm+0x1a/0x30
[   31.921151] 
[   31.921561] Freed by task 267:
[   31.921947]  kasan_save_stack+0x3d/0x60
[   31.922647]  kasan_save_track+0x18/0x40
[   31.923030]  kasan_save_free_info+0x3f/0x60
[   31.923808]  __kasan_slab_free+0x56/0x70
[   31.924146]  kfree+0x123/0x3f0
[   31.924850]  kasan_strings+0x13a/0xb60
[   31.925209]  kunit_try_run_case+0x1b3/0x490
[   31.925844]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.926458]  kthread+0x257/0x310
[   31.926873]  ret_from_fork+0x41/0x80
[   31.927217]  ret_from_fork_asm+0x1a/0x30
[   31.927839] 
[   31.928095] The buggy address belongs to the object at ffff8881029be540
[   31.928095]  which belongs to the cache kmalloc-32 of size 32
[   31.929546] The buggy address is located 16 bytes inside of
[   31.929546]  freed 32-byte region [ffff8881029be540, ffff8881029be560)
[   31.930790] 
[   31.930946] The buggy address belongs to the physical page:
[   31.931822] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029be
[   31.932686] flags: 0x200000000000000(node=0|zone=2)
[   31.933187] page_type: f5(slab)
[   31.933753] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   31.934665] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   31.935521] page dumped because: kasan: bad access detected
[   31.936146] 
[   31.936558] Memory state around the buggy address:
[   31.936933]  ffff8881029be400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   31.937978]  ffff8881029be480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   31.938939] >ffff8881029be500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   31.939824]                                                  ^
[   31.940582]  ffff8881029be580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.941186]  ffff8881029be600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.942071] ==================================================================

test log snippet boot parser 49

Home

[   29.149770] ==================================================================
[   29.151955] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x19d/0x360
[   29.152815] Read of size 1 at addr ffff888101bd1140 by task kunit_try_catch/200
[   29.154319] 
[   29.154692] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.155854] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.156234] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.157438] Call Trace:
[   29.157671]  <TASK>
[   29.158455]  dump_stack_lvl+0x73/0xb0
[   29.159163]  print_report+0xd1/0x640
[   29.159534]  ? __virt_addr_valid+0x1db/0x2d0
[   29.160386]  ? kasan_complete_mode_report_info+0x64/0x200
[   29.161232]  kasan_report+0x102/0x140
[   29.161657]  ? kmalloc_double_kzfree+0x19d/0x360
[   29.162131]  ? kmalloc_double_kzfree+0x19d/0x360
[   29.163813]  ? kmalloc_double_kzfree+0x19d/0x360
[   29.164936]  __kasan_check_byte+0x3d/0x50
[   29.165416]  kfree_sensitive+0x22/0x90
[   29.165832]  kmalloc_double_kzfree+0x19d/0x360
[   29.166286]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   29.167639]  ? __schedule+0xc3e/0x2790
[   29.168411]  ? __pfx_read_tsc+0x10/0x10
[   29.169104]  ? ktime_get_ts64+0x84/0x230
[   29.169395]  kunit_try_run_case+0x1b3/0x490
[   29.170441]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.171000]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.171488]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.172104]  ? __kthread_parkme+0x82/0x160
[   29.172558]  ? preempt_count_sub+0x50/0x80
[   29.172971]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.173714]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.174128]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.176012]  kthread+0x257/0x310
[   29.176390]  ? __pfx_kthread+0x10/0x10
[   29.176947]  ret_from_fork+0x41/0x80
[   29.177438]  ? __pfx_kthread+0x10/0x10
[   29.177727]  ret_from_fork_asm+0x1a/0x30
[   29.178335]  </TASK>
[   29.178776] 
[   29.179042] Allocated by task 200:
[   29.180484]  kasan_save_stack+0x3d/0x60
[   29.181265]  kasan_save_track+0x18/0x40
[   29.182220]  kasan_save_alloc_info+0x3b/0x50
[   29.183129]  __kasan_kmalloc+0xb7/0xc0
[   29.183542]  __kmalloc_cache_noprof+0x184/0x410
[   29.183905]  kmalloc_double_kzfree+0xaa/0x360
[   29.184335]  kunit_try_run_case+0x1b3/0x490
[   29.184695]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.185208]  kthread+0x257/0x310
[   29.185714]  ret_from_fork+0x41/0x80
[   29.187231]  ret_from_fork_asm+0x1a/0x30
[   29.187914] 
[   29.188162] Freed by task 200:
[   29.188632]  kasan_save_stack+0x3d/0x60
[   29.189034]  kasan_save_track+0x18/0x40
[   29.189407]  kasan_save_free_info+0x3f/0x60
[   29.190158]  __kasan_slab_free+0x56/0x70
[   29.191228]  kfree+0x123/0x3f0
[   29.191540]  kfree_sensitive+0x67/0x90
[   29.192029]  kmalloc_double_kzfree+0x12c/0x360
[   29.193857]  kunit_try_run_case+0x1b3/0x490
[   29.194587]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.195706]  kthread+0x257/0x310
[   29.196694]  ret_from_fork+0x41/0x80
[   29.197003]  ret_from_fork_asm+0x1a/0x30
[   29.197511] 
[   29.197692] The buggy address belongs to the object at ffff888101bd1140
[   29.197692]  which belongs to the cache kmalloc-16 of size 16
[   29.199620] The buggy address is located 0 bytes inside of
[   29.199620]  freed 16-byte region [ffff888101bd1140, ffff888101bd1150)
[   29.201018] 
[   29.201236] The buggy address belongs to the physical page:
[   29.202153] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[   29.203726] flags: 0x200000000000000(node=0|zone=2)
[   29.204316] page_type: f5(slab)
[   29.205342] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.206316] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   29.207424] page dumped because: kasan: bad access detected
[   29.208131] 
[   29.209435] Memory state around the buggy address:
[   29.210076]  ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   29.210394]  ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   29.211337] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   29.211885]                                            ^
[   29.212559]  ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.213146]  ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.214819] ==================================================================

test log snippet boot parser 50

Home

[   28.962283] ==================================================================
[   28.963812] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x322/0x380
[   28.965134] Read of size 1 at addr ffff888101bd1128 by task kunit_try_catch/192
[   28.966227] 
[   28.966455] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   28.967276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.967553] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.968434] Call Trace:
[   28.968631]  <TASK>
[   28.968827]  dump_stack_lvl+0x73/0xb0
[   28.969348]  print_report+0xd1/0x640
[   28.969916]  ? __virt_addr_valid+0x1db/0x2d0
[   28.970439]  ? kasan_complete_mode_report_info+0x64/0x200
[   28.971206]  kasan_report+0x102/0x140
[   28.971500]  ? kmalloc_uaf+0x322/0x380
[   28.971785]  ? kmalloc_uaf+0x322/0x380
[   28.972077]  __asan_report_load1_noabort+0x18/0x20
[   28.972976]  kmalloc_uaf+0x322/0x380
[   28.974049]  ? __pfx_kmalloc_uaf+0x10/0x10
[   28.974838]  ? __schedule+0xc3e/0x2790
[   28.975529]  ? __pfx_read_tsc+0x10/0x10
[   28.975803]  ? ktime_get_ts64+0x84/0x230
[   28.976263]  kunit_try_run_case+0x1b3/0x490
[   28.976724]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.977319]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.978024]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.979064]  ? __kthread_parkme+0x82/0x160
[   28.979404]  ? preempt_count_sub+0x50/0x80
[   28.980202]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.980904]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.981646]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.982428]  kthread+0x257/0x310
[   28.982803]  ? __pfx_kthread+0x10/0x10
[   28.983209]  ret_from_fork+0x41/0x80
[   28.983480]  ? __pfx_kthread+0x10/0x10
[   28.984358]  ret_from_fork_asm+0x1a/0x30
[   28.985008]  </TASK>
[   28.985268] 
[   28.985424] Allocated by task 192:
[   28.985668]  kasan_save_stack+0x3d/0x60
[   28.986276]  kasan_save_track+0x18/0x40
[   28.987844]  kasan_save_alloc_info+0x3b/0x50
[   28.988326]  __kasan_kmalloc+0xb7/0xc0
[   28.989185]  __kmalloc_cache_noprof+0x184/0x410
[   28.989909]  kmalloc_uaf+0xab/0x380
[   28.990234]  kunit_try_run_case+0x1b3/0x490
[   28.990902]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.991582]  kthread+0x257/0x310
[   28.991960]  ret_from_fork+0x41/0x80
[   28.992706]  ret_from_fork_asm+0x1a/0x30
[   28.993117] 
[   28.993267] Freed by task 192:
[   28.993697]  kasan_save_stack+0x3d/0x60
[   28.994023]  kasan_save_track+0x18/0x40
[   28.994456]  kasan_save_free_info+0x3f/0x60
[   28.995574]  __kasan_slab_free+0x56/0x70
[   28.995917]  kfree+0x123/0x3f0
[   28.996546]  kmalloc_uaf+0x12d/0x380
[   28.997067]  kunit_try_run_case+0x1b3/0x490
[   28.997458]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.998196]  kthread+0x257/0x310
[   28.999126]  ret_from_fork+0x41/0x80
[   28.999410]  ret_from_fork_asm+0x1a/0x30
[   29.000129] 
[   29.000370] The buggy address belongs to the object at ffff888101bd1120
[   29.000370]  which belongs to the cache kmalloc-16 of size 16
[   29.002470] The buggy address is located 8 bytes inside of
[   29.002470]  freed 16-byte region [ffff888101bd1120, ffff888101bd1130)
[   29.003715] 
[   29.003970] The buggy address belongs to the physical page:
[   29.004456] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1
[   29.005119] flags: 0x200000000000000(node=0|zone=2)
[   29.006246] page_type: f5(slab)
[   29.006927] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   29.007921] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   29.008689] page dumped because: kasan: bad access detected
[   29.009443] 
[   29.009912] Memory state around the buggy address:
[   29.010491]  ffff888101bd1000: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   29.011249]  ffff888101bd1080: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   29.012424] >ffff888101bd1100: 00 05 fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   29.013115]                                   ^
[   29.013618]  ffff888101bd1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.014284]  ffff888101bd1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.014765] ==================================================================

test log snippet boot parser 51

Home

[   28.493784] ==================================================================
[   28.495010] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x47d/0x4c0
[   28.495834] Read of size 16 at addr ffff888101e88260 by task kunit_try_catch/176
[   28.496835] 
[   28.497062] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   28.498023] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.499189] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.500237] Call Trace:
[   28.500686]  <TASK>
[   28.501010]  dump_stack_lvl+0x73/0xb0
[   28.501389]  print_report+0xd1/0x640
[   28.501930]  ? __virt_addr_valid+0x1db/0x2d0
[   28.502986]  ? kasan_complete_mode_report_info+0x64/0x200
[   28.503401]  kasan_report+0x102/0x140
[   28.503859]  ? kmalloc_uaf_16+0x47d/0x4c0
[   28.504247]  ? kmalloc_uaf_16+0x47d/0x4c0
[   28.505443]  __asan_report_load16_noabort+0x18/0x20
[   28.506030]  kmalloc_uaf_16+0x47d/0x4c0
[   28.506644]  ? __pfx_kmalloc_uaf_16+0x10/0x10
[   28.507094]  ? __schedule+0xc3e/0x2790
[   28.507461]  ? __pfx_read_tsc+0x10/0x10
[   28.508056]  ? ktime_get_ts64+0x84/0x230
[   28.508585]  kunit_try_run_case+0x1b3/0x490
[   28.509005]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.509369]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.509924]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.511306]  ? __kthread_parkme+0x82/0x160
[   28.511855]  ? preempt_count_sub+0x50/0x80
[   28.512519]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.513138]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.513529]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.513894]  kthread+0x257/0x310
[   28.514980]  ? __pfx_kthread+0x10/0x10
[   28.515581]  ret_from_fork+0x41/0x80
[   28.516034]  ? __pfx_kthread+0x10/0x10
[   28.516499]  ret_from_fork_asm+0x1a/0x30
[   28.517218]  </TASK>
[   28.517440] 
[   28.517835] Allocated by task 176:
[   28.519044]  kasan_save_stack+0x3d/0x60
[   28.519935]  kasan_save_track+0x18/0x40
[   28.520983]  kasan_save_alloc_info+0x3b/0x50
[   28.521664]  __kasan_kmalloc+0xb7/0xc0
[   28.522040]  __kmalloc_cache_noprof+0x184/0x410
[   28.522928]  kmalloc_uaf_16+0x15c/0x4c0
[   28.523209]  kunit_try_run_case+0x1b3/0x490
[   28.524020]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.524783]  kthread+0x257/0x310
[   28.525384]  ret_from_fork+0x41/0x80
[   28.526036]  ret_from_fork_asm+0x1a/0x30
[   28.527511] 
[   28.527752] Freed by task 176:
[   28.528071]  kasan_save_stack+0x3d/0x60
[   28.528559]  kasan_save_track+0x18/0x40
[   28.528960]  kasan_save_free_info+0x3f/0x60
[   28.530171]  __kasan_slab_free+0x56/0x70
[   28.532199]  kfree+0x123/0x3f0
[   28.532769]  kmalloc_uaf_16+0x1d7/0x4c0
[   28.533142]  kunit_try_run_case+0x1b3/0x490
[   28.533855]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.534714]  kthread+0x257/0x310
[   28.535021]  ret_from_fork+0x41/0x80
[   28.536203]  ret_from_fork_asm+0x1a/0x30
[   28.537051] 
[   28.537251] The buggy address belongs to the object at ffff888101e88260
[   28.537251]  which belongs to the cache kmalloc-16 of size 16
[   28.538548] The buggy address is located 0 bytes inside of
[   28.538548]  freed 16-byte region [ffff888101e88260, ffff888101e88270)
[   28.540158] 
[   28.540602] The buggy address belongs to the physical page:
[   28.541543] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e88
[   28.542124] flags: 0x200000000000000(node=0|zone=2)
[   28.542862] page_type: f5(slab)
[   28.543866] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.545517] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   28.546087] page dumped because: kasan: bad access detected
[   28.547028] 
[   28.547178] Memory state around the buggy address:
[   28.548331]  ffff888101e88100: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   28.549036]  ffff888101e88180: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   28.551317] >ffff888101e88200: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   28.552216]                                                        ^
[   28.552860]  ffff888101e88280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.554226]  ffff888101e88300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.555586] ==================================================================

test log snippet boot parser 52

Home

[   30.120919] ==================================================================
[   30.122064] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1bd/0x380
[   30.122850] Read of size 1 at addr ffff888101e18640 by task kunit_try_catch/223
[   30.123654] 
[   30.123995] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.124646] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.125293] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.126143] Call Trace:
[   30.126370]  <TASK>
[   30.126666]  dump_stack_lvl+0x73/0xb0
[   30.127245]  print_report+0xd1/0x640
[   30.128237]  ? __virt_addr_valid+0x1db/0x2d0
[   30.128850]  ? kasan_complete_mode_report_info+0x64/0x200
[   30.129706]  kasan_report+0x102/0x140
[   30.130169]  ? kmem_cache_double_destroy+0x1bd/0x380
[   30.131012]  ? kmem_cache_double_destroy+0x1bd/0x380
[   30.131571]  ? kmem_cache_double_destroy+0x1bd/0x380
[   30.132333]  __kasan_check_byte+0x3d/0x50
[   30.132649]  kmem_cache_destroy+0x25/0x1d0
[   30.133278]  kmem_cache_double_destroy+0x1bd/0x380
[   30.134075]  ? __pfx_kmem_cache_double_destroy+0x10/0x10
[   30.134618]  ? finish_task_switch.isra.0+0x153/0x700
[   30.135144]  ? __switch_to+0x5d9/0xf60
[   30.135707]  ? __pfx_empty_cache_ctor+0x10/0x10
[   30.136214]  ? __pfx_read_tsc+0x10/0x10
[   30.136536]  ? ktime_get_ts64+0x84/0x230
[   30.137127]  kunit_try_run_case+0x1b3/0x490
[   30.137944]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.138397]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.139076]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.139583]  ? __kthread_parkme+0x82/0x160
[   30.139976]  ? preempt_count_sub+0x50/0x80
[   30.140628]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.141092]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.141659]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.142095]  kthread+0x257/0x310
[   30.142671]  ? __pfx_kthread+0x10/0x10
[   30.143160]  ret_from_fork+0x41/0x80
[   30.143752]  ? __pfx_kthread+0x10/0x10
[   30.144034]  ret_from_fork_asm+0x1a/0x30
[   30.144361]  </TASK>
[   30.144730] 
[   30.144979] Allocated by task 223:
[   30.145365]  kasan_save_stack+0x3d/0x60
[   30.145799]  kasan_save_track+0x18/0x40
[   30.146254]  kasan_save_alloc_info+0x3b/0x50
[   30.146718]  __kasan_slab_alloc+0x91/0xa0
[   30.147197]  kmem_cache_alloc_noprof+0x11e/0x3e0
[   30.147750]  __kmem_cache_create_args+0x177/0x250
[   30.148795]  kmem_cache_double_destroy+0xd3/0x380
[   30.149131]  kunit_try_run_case+0x1b3/0x490
[   30.149436]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.150081]  kthread+0x257/0x310
[   30.150529]  ret_from_fork+0x41/0x80
[   30.150984]  ret_from_fork_asm+0x1a/0x30
[   30.151380] 
[   30.151536] Freed by task 223:
[   30.151896]  kasan_save_stack+0x3d/0x60
[   30.152426]  kasan_save_track+0x18/0x40
[   30.152789]  kasan_save_free_info+0x3f/0x60
[   30.153325]  __kasan_slab_free+0x56/0x70
[   30.153797]  kmem_cache_free+0x120/0x420
[   30.154379]  slab_kmem_cache_release+0x2e/0x40
[   30.154899]  kmem_cache_release+0x16/0x20
[   30.155251]  kobject_put+0x181/0x450
[   30.155778]  sysfs_slab_release+0x16/0x20
[   30.156554]  kmem_cache_destroy+0xf0/0x1d0
[   30.157393]  kmem_cache_double_destroy+0x14c/0x380
[   30.158272]  kunit_try_run_case+0x1b3/0x490
[   30.158930]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.159717]  kthread+0x257/0x310
[   30.160097]  ret_from_fork+0x41/0x80
[   30.160419]  ret_from_fork_asm+0x1a/0x30
[   30.161077] 
[   30.161254] The buggy address belongs to the object at ffff888101e18640
[   30.161254]  which belongs to the cache kmem_cache of size 208
[   30.162350] The buggy address is located 0 bytes inside of
[   30.162350]  freed 208-byte region [ffff888101e18640, ffff888101e18710)
[   30.164146] 
[   30.164704] The buggy address belongs to the physical page:
[   30.166025] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e18
[   30.167051] flags: 0x200000000000000(node=0|zone=2)
[   30.168284] page_type: f5(slab)
[   30.168553] raw: 0200000000000000 ffff888100041000 dead000000000122 0000000000000000
[   30.170077] raw: 0000000000000000 00000000800c000c 00000001f5000000 0000000000000000
[   30.171159] page dumped because: kasan: bad access detected
[   30.171515] 
[   30.171732] Memory state around the buggy address:
[   30.172228]  ffff888101e18500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.172622]  ffff888101e18580: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   30.173457] >ffff888101e18600: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   30.174101]                                            ^
[   30.175519]  ffff888101e18680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.176172]  ffff888101e18700: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.176974] ==================================================================

test log snippet boot parser 53

Home

[   30.893759] ==================================================================
[   30.895094] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x394/0x400
[   30.895695] Read of size 1 at addr ffff888101eb0300 by task kunit_try_catch/235
[   30.896354] 
[   30.897129] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.898127] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.898602] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.899524] Call Trace:
[   30.899956]  <TASK>
[   30.900208]  dump_stack_lvl+0x73/0xb0
[   30.901011]  print_report+0xd1/0x640
[   30.901480]  ? __virt_addr_valid+0x1db/0x2d0
[   30.902000]  ? kasan_complete_mode_report_info+0x64/0x200
[   30.903277]  kasan_report+0x102/0x140
[   30.904033]  ? mempool_uaf_helper+0x394/0x400
[   30.904453]  ? mempool_uaf_helper+0x394/0x400
[   30.905437]  __asan_report_load1_noabort+0x18/0x20
[   30.905980]  mempool_uaf_helper+0x394/0x400
[   30.906507]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   30.907032]  ? finish_task_switch.isra.0+0x153/0x700
[   30.907688]  mempool_kmalloc_uaf+0xb3/0x100
[   30.908075]  ? __pfx_mempool_kmalloc_uaf+0x10/0x10
[   30.908706]  ? __switch_to+0x5d9/0xf60
[   30.909090]  ? __pfx_mempool_kmalloc+0x10/0x10
[   30.910071]  ? __pfx_mempool_kfree+0x10/0x10
[   30.910646]  ? __pfx_read_tsc+0x10/0x10
[   30.911095]  ? ktime_get_ts64+0x84/0x230
[   30.911721]  kunit_try_run_case+0x1b3/0x490
[   30.912122]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.912797]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.913300]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.914332]  ? __kthread_parkme+0x82/0x160
[   30.914780]  ? preempt_count_sub+0x50/0x80
[   30.915142]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.915762]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.916607]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.917151]  kthread+0x257/0x310
[   30.917863]  ? __pfx_kthread+0x10/0x10
[   30.918269]  ret_from_fork+0x41/0x80
[   30.918867]  ? __pfx_kthread+0x10/0x10
[   30.919180]  ret_from_fork_asm+0x1a/0x30
[   30.919893]  </TASK>
[   30.920132] 
[   30.920299] Allocated by task 235:
[   30.920883]  kasan_save_stack+0x3d/0x60
[   30.921345]  kasan_save_track+0x18/0x40
[   30.922064]  kasan_save_alloc_info+0x3b/0x50
[   30.922632]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   30.923058]  remove_element+0x11e/0x190
[   30.924100]  mempool_alloc_preallocated+0x4d/0x90
[   30.924849]  mempool_uaf_helper+0x97/0x400
[   30.925432]  mempool_kmalloc_uaf+0xb3/0x100
[   30.926381]  kunit_try_run_case+0x1b3/0x490
[   30.926970]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.928149]  kthread+0x257/0x310
[   30.928599]  ret_from_fork+0x41/0x80
[   30.929399]  ret_from_fork_asm+0x1a/0x30
[   30.929873] 
[   30.930775] Freed by task 235:
[   30.931468]  kasan_save_stack+0x3d/0x60
[   30.932145]  kasan_save_track+0x18/0x40
[   30.932482]  kasan_save_free_info+0x3f/0x60
[   30.933894]  __kasan_mempool_poison_object+0x131/0x1d0
[   30.934666]  mempool_free+0x2ec/0x380
[   30.935127]  mempool_uaf_helper+0x11b/0x400
[   30.936354]  mempool_kmalloc_uaf+0xb3/0x100
[   30.937233]  kunit_try_run_case+0x1b3/0x490
[   30.937803]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.938865]  kthread+0x257/0x310
[   30.939290]  ret_from_fork+0x41/0x80
[   30.939761]  ret_from_fork_asm+0x1a/0x30
[   30.940178] 
[   30.940872] The buggy address belongs to the object at ffff888101eb0300
[   30.940872]  which belongs to the cache kmalloc-128 of size 128
[   30.941885] The buggy address is located 0 bytes inside of
[   30.941885]  freed 128-byte region [ffff888101eb0300, ffff888101eb0380)
[   30.943585] 
[   30.944062] The buggy address belongs to the physical page:
[   30.944600] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101eb0
[   30.945952] flags: 0x200000000000000(node=0|zone=2)
[   30.946644] page_type: f5(slab)
[   30.947057] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   30.948069] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.948647] page dumped because: kasan: bad access detected
[   30.949106] 
[   30.949294] Memory state around the buggy address:
[   30.950090]  ffff888101eb0200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.951131]  ffff888101eb0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.952021] >ffff888101eb0300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.953017]                    ^
[   30.953228]  ffff888101eb0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.954622]  ffff888101eb0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.955442] ==================================================================

test log snippet boot parser 54

Home

[   31.021109] ==================================================================
[   31.022152] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x394/0x400
[   31.022831] Read of size 1 at addr ffff8881029ba240 by task kunit_try_catch/239
[   31.024546] 
[   31.025116] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   31.026142] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.026497] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.028117] Call Trace:
[   31.028521]  <TASK>
[   31.028739]  dump_stack_lvl+0x73/0xb0
[   31.029394]  print_report+0xd1/0x640
[   31.029823]  ? __virt_addr_valid+0x1db/0x2d0
[   31.030944]  ? kasan_complete_mode_report_info+0x64/0x200
[   31.031494]  kasan_report+0x102/0x140
[   31.032016]  ? mempool_uaf_helper+0x394/0x400
[   31.032466]  ? mempool_uaf_helper+0x394/0x400
[   31.033331]  __asan_report_load1_noabort+0x18/0x20
[   31.034289]  mempool_uaf_helper+0x394/0x400
[   31.035080]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   31.035825]  ? finish_task_switch.isra.0+0x153/0x700
[   31.036067]  mempool_slab_uaf+0xae/0x100
[   31.036259]  ? __pfx_mempool_slab_uaf+0x10/0x10
[   31.037204]  ? __switch_to+0x5d9/0xf60
[   31.037937]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   31.038970]  ? __pfx_mempool_free_slab+0x10/0x10
[   31.039475]  ? __pfx_read_tsc+0x10/0x10
[   31.040239]  ? ktime_get_ts64+0x84/0x230
[   31.040974]  kunit_try_run_case+0x1b3/0x490
[   31.041435]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.042151]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.042808]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.043513]  ? __kthread_parkme+0x82/0x160
[   31.044455]  ? preempt_count_sub+0x50/0x80
[   31.045131]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.045748]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.047022]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.047520]  kthread+0x257/0x310
[   31.048202]  ? __pfx_kthread+0x10/0x10
[   31.049047]  ret_from_fork+0x41/0x80
[   31.049666]  ? __pfx_kthread+0x10/0x10
[   31.050411]  ret_from_fork_asm+0x1a/0x30
[   31.050857]  </TASK>
[   31.052275] 
[   31.052869] Allocated by task 239:
[   31.053232]  kasan_save_stack+0x3d/0x60
[   31.054414]  kasan_save_track+0x18/0x40
[   31.054679]  kasan_save_alloc_info+0x3b/0x50
[   31.055240]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   31.055806]  remove_element+0x11e/0x190
[   31.056218]  mempool_alloc_preallocated+0x4d/0x90
[   31.056972]  mempool_uaf_helper+0x97/0x400
[   31.058349]  mempool_slab_uaf+0xae/0x100
[   31.058893]  kunit_try_run_case+0x1b3/0x490
[   31.059805]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.060872]  kthread+0x257/0x310
[   31.061774]  ret_from_fork+0x41/0x80
[   31.062100]  ret_from_fork_asm+0x1a/0x30
[   31.063131] 
[   31.063339] Freed by task 239:
[   31.063565]  kasan_save_stack+0x3d/0x60
[   31.064356]  kasan_save_track+0x18/0x40
[   31.065182]  kasan_save_free_info+0x3f/0x60
[   31.066150]  __kasan_mempool_poison_object+0x131/0x1d0
[   31.066744]  mempool_free+0x2ec/0x380
[   31.067665]  mempool_uaf_helper+0x11b/0x400
[   31.068139]  mempool_slab_uaf+0xae/0x100
[   31.068964]  kunit_try_run_case+0x1b3/0x490
[   31.069470]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.069942]  kthread+0x257/0x310
[   31.070276]  ret_from_fork+0x41/0x80
[   31.070721]  ret_from_fork_asm+0x1a/0x30
[   31.071031] 
[   31.071301] The buggy address belongs to the object at ffff8881029ba240
[   31.071301]  which belongs to the cache test_cache of size 123
[   31.072633] The buggy address is located 0 bytes inside of
[   31.072633]  freed 123-byte region [ffff8881029ba240, ffff8881029ba2bb)
[   31.073856] 
[   31.074173] The buggy address belongs to the physical page:
[   31.074693] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ba
[   31.075162] flags: 0x200000000000000(node=0|zone=2)
[   31.076041] page_type: f5(slab)
[   31.076559] raw: 0200000000000000 ffff888101aa83c0 dead000000000122 0000000000000000
[   31.077736] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   31.079008] page dumped because: kasan: bad access detected
[   31.079637] 
[   31.079855] Memory state around the buggy address:
[   31.080692]  ffff8881029ba100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.081636]  ffff8881029ba180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.082576] >ffff8881029ba200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   31.083268]                                            ^
[   31.084167]  ffff8881029ba280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.084899]  ffff8881029ba300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.085671] ==================================================================

test log snippet boot parser 55

Home

[   31.730883] ==================================================================
[   31.732103] BUG: KASAN: slab-use-after-free in strchr+0x9c/0xc0
[   31.732525] Read of size 1 at addr ffff8881029be550 by task kunit_try_catch/267
[   31.733266] 
[   31.733605] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   31.734347] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.734766] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.735640] Call Trace:
[   31.735922]  <TASK>
[   31.736224]  dump_stack_lvl+0x73/0xb0
[   31.736672]  print_report+0xd1/0x640
[   31.737160]  ? __virt_addr_valid+0x1db/0x2d0
[   31.737585]  ? kasan_complete_mode_report_info+0x64/0x200
[   31.738181]  kasan_report+0x102/0x140
[   31.738725]  ? strchr+0x9c/0xc0
[   31.739024]  ? strchr+0x9c/0xc0
[   31.739513]  __asan_report_load1_noabort+0x18/0x20
[   31.739924]  strchr+0x9c/0xc0
[   31.740171]  kasan_strings+0x1b1/0xb60
[   31.740713]  ? __pfx_kasan_strings+0x10/0x10
[   31.741131]  ? __pfx_kasan_strings+0x10/0x10
[   31.741630]  kunit_try_run_case+0x1b3/0x490
[   31.741954]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.742584]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.743175]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.743670]  ? __kthread_parkme+0x82/0x160
[   31.744190]  ? preempt_count_sub+0x50/0x80
[   31.744675]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.745009]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.745749]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.746370]  kthread+0x257/0x310
[   31.746864]  ? __pfx_kthread+0x10/0x10
[   31.747228]  ret_from_fork+0x41/0x80
[   31.747622]  ? __pfx_kthread+0x10/0x10
[   31.748097]  ret_from_fork_asm+0x1a/0x30
[   31.748606]  </TASK>
[   31.748824] 
[   31.748975] Allocated by task 267:
[   31.749366]  kasan_save_stack+0x3d/0x60
[   31.749889]  kasan_save_track+0x18/0x40
[   31.750341]  kasan_save_alloc_info+0x3b/0x50
[   31.750690]  __kasan_kmalloc+0xb7/0xc0
[   31.751104]  __kmalloc_cache_noprof+0x184/0x410
[   31.751736]  kasan_strings+0xb3/0xb60
[   31.752219]  kunit_try_run_case+0x1b3/0x490
[   31.752751]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.753121]  kthread+0x257/0x310
[   31.753489]  ret_from_fork+0x41/0x80
[   31.753943]  ret_from_fork_asm+0x1a/0x30
[   31.754507] 
[   31.754765] Freed by task 267:
[   31.755131]  kasan_save_stack+0x3d/0x60
[   31.755492]  kasan_save_track+0x18/0x40
[   31.755773]  kasan_save_free_info+0x3f/0x60
[   31.756328]  __kasan_slab_free+0x56/0x70
[   31.756853]  kfree+0x123/0x3f0
[   31.757262]  kasan_strings+0x13a/0xb60
[   31.757674]  kunit_try_run_case+0x1b3/0x490
[   31.758063]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.758673]  kthread+0x257/0x310
[   31.758919]  ret_from_fork+0x41/0x80
[   31.759441]  ret_from_fork_asm+0x1a/0x30
[   31.759929] 
[   31.760172] The buggy address belongs to the object at ffff8881029be540
[   31.760172]  which belongs to the cache kmalloc-32 of size 32
[   31.761950] The buggy address is located 16 bytes inside of
[   31.761950]  freed 32-byte region [ffff8881029be540, ffff8881029be560)
[   31.763669] 
[   31.763923] The buggy address belongs to the physical page:
[   31.764860] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029be
[   31.765369] flags: 0x200000000000000(node=0|zone=2)
[   31.765960] page_type: f5(slab)
[   31.766360] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   31.767504] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   31.767958] page dumped because: kasan: bad access detected
[   31.768838] 
[   31.769088] Memory state around the buggy address:
[   31.769974]  ffff8881029be400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   31.770628]  ffff8881029be480: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   31.771225] >ffff8881029be500: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   31.772225]                                                  ^
[   31.773106]  ffff8881029be580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.773689]  ffff8881029be600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.774585] ==================================================================

test log snippet boot parser 56

Home

[   31.832757] ==================================================================
[   31.833244] BUG: KASAN: slab-use-after-free in strcmp+0xb0/0xc0
[   31.833734] Read of size 1 at addr ffff8881029be550 by task kunit_try_catch/267
[   31.834925] 
[   31.835218] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   31.836558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.836916] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.837987] Call Trace:
[   31.838821]  <TASK>
[   31.839476]  dump_stack_lvl+0x73/0xb0
[   31.840765]  print_report+0xd1/0x640
[   31.841221]  ? __virt_addr_valid+0x1db/0x2d0
[   31.842101]  ? kasan_complete_mode_report_info+0x64/0x200
[   31.842840]  kasan_report+0x102/0x140
[   31.843395]  ? strcmp+0xb0/0xc0
[   31.844039]  ? strcmp+0xb0/0xc0
[   31.844416]  __asan_report_load1_noabort+0x18/0x20
[   31.845374]  strcmp+0xb0/0xc0
[   31.846084]  kasan_strings+0x2e9/0xb60
[   31.846738]  ? __pfx_kasan_strings+0x10/0x10
[   31.847387]  ? __pfx_kasan_strings+0x10/0x10
[   31.848040]  kunit_try_run_case+0x1b3/0x490
[   31.848797]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.849287]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.850301]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.851024]  ? __kthread_parkme+0x82/0x160
[   31.851438]  ? preempt_count_sub+0x50/0x80
[   31.852210]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.852759]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.853881]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.854677]  kthread+0x257/0x310
[   31.855004]  ? __pfx_kthread+0x10/0x10
[   31.855384]  ret_from_fork+0x41/0x80
[   31.856293]  ? __pfx_kthread+0x10/0x10
[   31.856859]  ret_from_fork_asm+0x1a/0x30
[   31.857293]  </TASK>
[   31.857492] 
[   31.858335] Allocated by task 267:
[   31.859166]  kasan_save_stack+0x3d/0x60
[   31.859651]  kasan_save_track+0x18/0x40
[   31.860049]  kasan_save_alloc_info+0x3b/0x50
[   31.861017]  __kasan_kmalloc+0xb7/0xc0
[   31.861394]  __kmalloc_cache_noprof+0x184/0x410
[   31.862253]  kasan_strings+0xb3/0xb60
[   31.863032]  kunit_try_run_case+0x1b3/0x490
[   31.863699]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.864198]  kthread+0x257/0x310
[   31.864588]  ret_from_fork+0x41/0x80
[   31.864947]  ret_from_fork_asm+0x1a/0x30
[   31.865936] 
[   31.866096] Freed by task 267:
[   31.866359]  kasan_save_stack+0x3d/0x60
[   31.867329]  kasan_save_track+0x18/0x40
[   31.867671]  kasan_save_free_info+0x3f/0x60
[   31.868347]  __kasan_slab_free+0x56/0x70
[   31.868955]  kfree+0x123/0x3f0
[   31.869303]  kasan_strings+0x13a/0xb60
[   31.869870]  kunit_try_run_case+0x1b3/0x490
[   31.870310]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.871206]  kthread+0x257/0x310
[   31.871672]  ret_from_fork+0x41/0x80
[   31.872048]  ret_from_fork_asm+0x1a/0x30
[   31.872883] 
[   31.873175] The buggy address belongs to the object at ffff8881029be540
[   31.873175]  which belongs to the cache kmalloc-32 of size 32
[   31.875148] The buggy address is located 16 bytes inside of
[   31.875148]  freed 32-byte region [ffff8881029be540, ffff8881029be560)
[   31.876501] 
[   31.876999] The buggy address belongs to the physical page:
[   31.877665] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029be
[   31.878457] flags: 0x200000000000000(node=0|zone=2)
[   31.879110] page_type: f5(slab)
[   31.879480] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   31.880188] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   31.881599] page dumped because: kasan: bad access detected
[   31.882172] 
[   31.882385] Memory state around the buggy address:
[   31.882872]  ffff8881029be400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   31.884130]  ffff8881029be480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   31.885252] >ffff8881029be500: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   31.886272]                                                  ^
[   31.887092]  ffff8881029be580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.888033]  ffff8881029be600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.889074] ==================================================================

test log snippet boot parser 57

Home

[   31.943724] ==================================================================
[   31.944143] BUG: KASAN: slab-use-after-free in strlen+0x8f/0xb0
[   31.945623] Read of size 1 at addr ffff8881029be550 by task kunit_try_catch/267
[   31.946541] 
[   31.946734] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   31.947723] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.948184] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.948999] Call Trace:
[   31.949356]  <TASK>
[   31.949685]  dump_stack_lvl+0x73/0xb0
[   31.950109]  print_report+0xd1/0x640
[   31.950683]  ? __virt_addr_valid+0x1db/0x2d0
[   31.951230]  ? kasan_complete_mode_report_info+0x64/0x200
[   31.951783]  kasan_report+0x102/0x140
[   31.952330]  ? strlen+0x8f/0xb0
[   31.952780]  ? strlen+0x8f/0xb0
[   31.953180]  __asan_report_load1_noabort+0x18/0x20
[   31.953774]  strlen+0x8f/0xb0
[   31.954055]  kasan_strings+0x432/0xb60
[   31.954682]  ? __pfx_kasan_strings+0x10/0x10
[   31.955273]  ? __pfx_kasan_strings+0x10/0x10
[   31.955740]  kunit_try_run_case+0x1b3/0x490
[   31.956259]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.956785]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.957329]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.957924]  ? __kthread_parkme+0x82/0x160
[   31.958375]  ? preempt_count_sub+0x50/0x80
[   31.958954]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.959569]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.960166]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.960730]  kthread+0x257/0x310
[   31.961179]  ? __pfx_kthread+0x10/0x10
[   31.961694]  ret_from_fork+0x41/0x80
[   31.962054]  ? __pfx_kthread+0x10/0x10
[   31.962630]  ret_from_fork_asm+0x1a/0x30
[   31.963119]  </TASK>
[   31.963510] 
[   31.963712] Allocated by task 267:
[   31.964200]  kasan_save_stack+0x3d/0x60
[   31.964593]  kasan_save_track+0x18/0x40
[   31.965144]  kasan_save_alloc_info+0x3b/0x50
[   31.965663]  __kasan_kmalloc+0xb7/0xc0
[   31.966118]  __kmalloc_cache_noprof+0x184/0x410
[   31.966519]  kasan_strings+0xb3/0xb60
[   31.966846]  kunit_try_run_case+0x1b3/0x490
[   31.967164]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.967820]  kthread+0x257/0x310
[   31.968245]  ret_from_fork+0x41/0x80
[   31.969223]  ret_from_fork_asm+0x1a/0x30
[   31.969882] 
[   31.970281] Freed by task 267:
[   31.970544]  kasan_save_stack+0x3d/0x60
[   31.970959]  kasan_save_track+0x18/0x40
[   31.971384]  kasan_save_free_info+0x3f/0x60
[   31.971892]  __kasan_slab_free+0x56/0x70
[   31.972472]  kfree+0x123/0x3f0
[   31.973345]  kasan_strings+0x13a/0xb60
[   31.973800]  kunit_try_run_case+0x1b3/0x490
[   31.974529]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.975273]  kthread+0x257/0x310
[   31.975817]  ret_from_fork+0x41/0x80
[   31.976189]  ret_from_fork_asm+0x1a/0x30
[   31.976664] 
[   31.976820] The buggy address belongs to the object at ffff8881029be540
[   31.976820]  which belongs to the cache kmalloc-32 of size 32
[   31.978889] The buggy address is located 16 bytes inside of
[   31.978889]  freed 32-byte region [ffff8881029be540, ffff8881029be560)
[   31.980012] 
[   31.980269] The buggy address belongs to the physical page:
[   31.980927] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029be
[   31.981745] flags: 0x200000000000000(node=0|zone=2)
[   31.982245] page_type: f5(slab)
[   31.982694] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   31.983513] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   31.984201] page dumped because: kasan: bad access detected
[   31.984799] 
[   31.984965] Memory state around the buggy address:
[   31.985572]  ffff8881029be400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   31.986306]  ffff8881029be480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   31.987075] >ffff8881029be500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   31.987710]                                                  ^
[   31.988304]  ffff8881029be580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.988955]  ffff8881029be600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.989731] ==================================================================

test log snippet boot parser 58

Home

[   31.991041] ==================================================================
[   31.991622] BUG: KASAN: slab-use-after-free in strnlen+0x73/0x80
[   31.992286] Read of size 1 at addr ffff8881029be550 by task kunit_try_catch/267
[   31.993277] 
[   31.993493] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   31.994077] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.994581] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.995582] Call Trace:
[   31.995912]  <TASK>
[   31.996138]  dump_stack_lvl+0x73/0xb0
[   31.996561]  print_report+0xd1/0x640
[   31.997011]  ? __virt_addr_valid+0x1db/0x2d0
[   31.997624]  ? kasan_complete_mode_report_info+0x64/0x200
[   31.998076]  kasan_report+0x102/0x140
[   31.998607]  ? strnlen+0x73/0x80
[   31.998889]  ? strnlen+0x73/0x80
[   31.999177]  __asan_report_load1_noabort+0x18/0x20
[   31.999836]  strnlen+0x73/0x80
[   32.000279]  kasan_strings+0x4cc/0xb60
[   32.000811]  ? __pfx_kasan_strings+0x10/0x10
[   32.001223]  ? __pfx_kasan_strings+0x10/0x10
[   32.001619]  kunit_try_run_case+0x1b3/0x490
[   32.002166]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.002801]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.003245]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.003766]  ? __kthread_parkme+0x82/0x160
[   32.004249]  ? preempt_count_sub+0x50/0x80
[   32.004627]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.005181]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.005834]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.006521]  kthread+0x257/0x310
[   32.006828]  ? __pfx_kthread+0x10/0x10
[   32.007241]  ret_from_fork+0x41/0x80
[   32.007655]  ? __pfx_kthread+0x10/0x10
[   32.008133]  ret_from_fork_asm+0x1a/0x30
[   32.008537]  </TASK>
[   32.008757] 
[   32.008991] Allocated by task 267:
[   32.009457]  kasan_save_stack+0x3d/0x60
[   32.009950]  kasan_save_track+0x18/0x40
[   32.010245]  kasan_save_alloc_info+0x3b/0x50
[   32.010851]  __kasan_kmalloc+0xb7/0xc0
[   32.011228]  __kmalloc_cache_noprof+0x184/0x410
[   32.011630]  kasan_strings+0xb3/0xb60
[   32.011956]  kunit_try_run_case+0x1b3/0x490
[   32.012528]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.013140]  kthread+0x257/0x310
[   32.013486]  ret_from_fork+0x41/0x80
[   32.013879]  ret_from_fork_asm+0x1a/0x30
[   32.014197] 
[   32.014376] Freed by task 267:
[   32.014804]  kasan_save_stack+0x3d/0x60
[   32.015259]  kasan_save_track+0x18/0x40
[   32.015617]  kasan_save_free_info+0x3f/0x60
[   32.015997]  __kasan_slab_free+0x56/0x70
[   32.016525]  kfree+0x123/0x3f0
[   32.016930]  kasan_strings+0x13a/0xb60
[   32.017254]  kunit_try_run_case+0x1b3/0x490
[   32.017729]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.018081]  kthread+0x257/0x310
[   32.018525]  ret_from_fork+0x41/0x80
[   32.019009]  ret_from_fork_asm+0x1a/0x30
[   32.019499] 
[   32.019728] The buggy address belongs to the object at ffff8881029be540
[   32.019728]  which belongs to the cache kmalloc-32 of size 32
[   32.020530] The buggy address is located 16 bytes inside of
[   32.020530]  freed 32-byte region [ffff8881029be540, ffff8881029be560)
[   32.021628] 
[   32.021783] The buggy address belongs to the physical page:
[   32.022140] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029be
[   32.023094] flags: 0x200000000000000(node=0|zone=2)
[   32.023655] page_type: f5(slab)
[   32.023905] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   32.024517] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   32.025303] page dumped because: kasan: bad access detected
[   32.025955] 
[   32.026200] Memory state around the buggy address:
[   32.026643]  ffff8881029be400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.027288]  ffff8881029be480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.027957] >ffff8881029be500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.028691]                                                  ^
[   32.029140]  ffff8881029be580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.029622]  ffff8881029be600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.030428] ==================================================================

test log snippet boot parser 59

Home

[   31.776669] ==================================================================
[   31.778401] BUG: KASAN: slab-use-after-free in strrchr+0x64/0x70
[   31.778923] Read of size 1 at addr ffff8881029be550 by task kunit_try_catch/267
[   31.779724] 
[   31.779931] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   31.781130] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.782663] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.783728] Call Trace:
[   31.783977]  <TASK>
[   31.784499]  dump_stack_lvl+0x73/0xb0
[   31.785175]  print_report+0xd1/0x640
[   31.785550]  ? __virt_addr_valid+0x1db/0x2d0
[   31.786017]  ? kasan_complete_mode_report_info+0x64/0x200
[   31.786560]  kasan_report+0x102/0x140
[   31.786933]  ? strrchr+0x64/0x70
[   31.787304]  ? strrchr+0x64/0x70
[   31.788346]  __asan_report_load1_noabort+0x18/0x20
[   31.789008]  strrchr+0x64/0x70
[   31.789368]  kasan_strings+0x24c/0xb60
[   31.790046]  ? __pfx_kasan_strings+0x10/0x10
[   31.790837]  ? __pfx_kasan_strings+0x10/0x10
[   31.791156]  kunit_try_run_case+0x1b3/0x490
[   31.792177]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.792868]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.793371]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.794543]  ? __kthread_parkme+0x82/0x160
[   31.795164]  ? preempt_count_sub+0x50/0x80
[   31.795954]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.796423]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.796961]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.798111]  kthread+0x257/0x310
[   31.799261]  ? __pfx_kthread+0x10/0x10
[   31.799891]  ret_from_fork+0x41/0x80
[   31.800290]  ? __pfx_kthread+0x10/0x10
[   31.800906]  ret_from_fork_asm+0x1a/0x30
[   31.801404]  </TASK>
[   31.801681] 
[   31.801882] Allocated by task 267:
[   31.802239]  kasan_save_stack+0x3d/0x60
[   31.803618]  kasan_save_track+0x18/0x40
[   31.804434]  kasan_save_alloc_info+0x3b/0x50
[   31.804888]  __kasan_kmalloc+0xb7/0xc0
[   31.805514]  __kmalloc_cache_noprof+0x184/0x410
[   31.806230]  kasan_strings+0xb3/0xb60
[   31.806935]  kunit_try_run_case+0x1b3/0x490
[   31.807632]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.808023]  kthread+0x257/0x310
[   31.808437]  ret_from_fork+0x41/0x80
[   31.808838]  ret_from_fork_asm+0x1a/0x30
[   31.809484] 
[   31.809970] Freed by task 267:
[   31.810361]  kasan_save_stack+0x3d/0x60
[   31.811028]  kasan_save_track+0x18/0x40
[   31.811431]  kasan_save_free_info+0x3f/0x60
[   31.811878]  __kasan_slab_free+0x56/0x70
[   31.812287]  kfree+0x123/0x3f0
[   31.812562]  kasan_strings+0x13a/0xb60
[   31.812839]  kunit_try_run_case+0x1b3/0x490
[   31.814083]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.814674]  kthread+0x257/0x310
[   31.814981]  ret_from_fork+0x41/0x80
[   31.815390]  ret_from_fork_asm+0x1a/0x30
[   31.816277] 
[   31.816461] The buggy address belongs to the object at ffff8881029be540
[   31.816461]  which belongs to the cache kmalloc-32 of size 32
[   31.817375] The buggy address is located 16 bytes inside of
[   31.817375]  freed 32-byte region [ffff8881029be540, ffff8881029be560)
[   31.819009] 
[   31.819335] The buggy address belongs to the physical page:
[   31.820142] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029be
[   31.821084] flags: 0x200000000000000(node=0|zone=2)
[   31.821788] page_type: f5(slab)
[   31.822120] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   31.823371] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   31.823915] page dumped because: kasan: bad access detected
[   31.824504] 
[   31.824784] Memory state around the buggy address:
[   31.825251]  ffff8881029be400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   31.826495]  ffff8881029be480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   31.827372] >ffff8881029be500: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   31.827996]                                                  ^
[   31.828594]  ffff8881029be580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.829258]  ffff8881029be600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.830084] ==================================================================

test log snippet boot parser 60

Home

[   29.688127] ==================================================================
[   29.689782] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x4d8/0x560
[   29.690858] Read of size 8 at addr ffff888101ea1680 by task kunit_try_catch/208
[   29.691461] 
[   29.692141] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.693372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.693791] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.694658] Call Trace:
[   29.694944]  <TASK>
[   29.695631]  dump_stack_lvl+0x73/0xb0
[   29.696339]  print_report+0xd1/0x640
[   29.697379]  ? __virt_addr_valid+0x1db/0x2d0
[   29.697990]  ? kasan_complete_mode_report_info+0x64/0x200
[   29.698743]  kasan_report+0x102/0x140
[   29.699620]  ? workqueue_uaf+0x4d8/0x560
[   29.700360]  ? workqueue_uaf+0x4d8/0x560
[   29.701121]  __asan_report_load8_noabort+0x18/0x20
[   29.701855]  workqueue_uaf+0x4d8/0x560
[   29.702255]  ? __pfx_workqueue_uaf+0x10/0x10
[   29.702967]  ? __schedule+0xc3e/0x2790
[   29.703695]  ? __pfx_read_tsc+0x10/0x10
[   29.704104]  ? ktime_get_ts64+0x84/0x230
[   29.704842]  kunit_try_run_case+0x1b3/0x490
[   29.705562]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.706130]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.706765]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.707528]  ? __kthread_parkme+0x82/0x160
[   29.708092]  ? preempt_count_sub+0x50/0x80
[   29.708908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.709778]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.710285]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.710893]  kthread+0x257/0x310
[   29.711182]  ? __pfx_kthread+0x10/0x10
[   29.711929]  ret_from_fork+0x41/0x80
[   29.712318]  ? __pfx_kthread+0x10/0x10
[   29.713008]  ret_from_fork_asm+0x1a/0x30
[   29.713698]  </TASK>
[   29.713959] 
[   29.714140] Allocated by task 208:
[   29.714593]  kasan_save_stack+0x3d/0x60
[   29.714989]  kasan_save_track+0x18/0x40
[   29.715697]  kasan_save_alloc_info+0x3b/0x50
[   29.716154]  __kasan_kmalloc+0xb7/0xc0
[   29.716884]  __kmalloc_cache_noprof+0x184/0x410
[   29.717204]  workqueue_uaf+0x153/0x560
[   29.717843]  kunit_try_run_case+0x1b3/0x490
[   29.718520]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.718955]  kthread+0x257/0x310
[   29.719217]  ret_from_fork+0x41/0x80
[   29.719771]  ret_from_fork_asm+0x1a/0x30
[   29.720272] 
[   29.720762] Freed by task 90:
[   29.721157]  kasan_save_stack+0x3d/0x60
[   29.721515]  kasan_save_track+0x18/0x40
[   29.721983]  kasan_save_free_info+0x3f/0x60
[   29.722503]  __kasan_slab_free+0x56/0x70
[   29.722949]  kfree+0x123/0x3f0
[   29.723220]  workqueue_uaf_work+0x12/0x20
[   29.723845]  process_one_work+0x5ee/0xf60
[   29.724332]  worker_thread+0x720/0x1300
[   29.725019]  kthread+0x257/0x310
[   29.725284]  ret_from_fork+0x41/0x80
[   29.725897]  ret_from_fork_asm+0x1a/0x30
[   29.726498] 
[   29.726739] Last potentially related work creation:
[   29.727285]  kasan_save_stack+0x3d/0x60
[   29.727719]  __kasan_record_aux_stack+0xae/0xc0
[   29.728193]  kasan_record_aux_stack_noalloc+0xf/0x20
[   29.729101]  __queue_work+0x67e/0xf70
[   29.729818]  queue_work_on+0x74/0xa0
[   29.730269]  workqueue_uaf+0x26e/0x560
[   29.730687]  kunit_try_run_case+0x1b3/0x490
[   29.731047]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.731804]  kthread+0x257/0x310
[   29.732172]  ret_from_fork+0x41/0x80
[   29.732760]  ret_from_fork_asm+0x1a/0x30
[   29.733148] 
[   29.733579] The buggy address belongs to the object at ffff888101ea1680
[   29.733579]  which belongs to the cache kmalloc-32 of size 32
[   29.734722] The buggy address is located 0 bytes inside of
[   29.734722]  freed 32-byte region [ffff888101ea1680, ffff888101ea16a0)
[   29.735690] 
[   29.735941] The buggy address belongs to the physical page:
[   29.736513] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ea1
[   29.737246] flags: 0x200000000000000(node=0|zone=2)
[   29.737764] page_type: f5(slab)
[   29.738133] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   29.738667] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   29.739737] page dumped because: kasan: bad access detected
[   29.740316] 
[   29.740668] Memory state around the buggy address:
[   29.741109]  ffff888101ea1580: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   29.741917]  ffff888101ea1600: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   29.742660] >ffff888101ea1680: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   29.743442]                    ^
[   29.743946]  ffff888101ea1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.744387]  ffff888101ea1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.745240] ==================================================================

test log snippet boot parser 61

Home

[   30.962890] ==================================================================
[   30.963876] BUG: KASAN: use-after-free in mempool_uaf_helper+0x394/0x400
[   30.965460] Read of size 1 at addr ffff888102b4c000 by task kunit_try_catch/237
[   30.966547] 
[   30.966751] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.967617] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.968034] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.970098] Call Trace:
[   30.970426]  <TASK>
[   30.970661]  dump_stack_lvl+0x73/0xb0
[   30.971139]  print_report+0xd1/0x640
[   30.971725]  ? __virt_addr_valid+0x1db/0x2d0
[   30.972171]  ? kasan_addr_to_slab+0x11/0xa0
[   30.972582]  kasan_report+0x102/0x140
[   30.973555]  ? mempool_uaf_helper+0x394/0x400
[   30.974145]  ? mempool_uaf_helper+0x394/0x400
[   30.974930]  __asan_report_load1_noabort+0x18/0x20
[   30.976144]  mempool_uaf_helper+0x394/0x400
[   30.977081]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   30.978042]  ? irqentry_exit+0x2a/0x60
[   30.978578]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   30.979151]  mempool_kmalloc_large_uaf+0xb3/0x100
[   30.979820]  ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10
[   30.980180]  ? __pfx_mempool_kmalloc+0x10/0x10
[   30.980540]  ? __pfx_mempool_kfree+0x10/0x10
[   30.981095]  ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10
[   30.981586]  kunit_try_run_case+0x1b3/0x490
[   30.981982]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.982946]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.983749]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.985240]  ? __kthread_parkme+0x82/0x160
[   30.986337]  ? preempt_count_sub+0x50/0x80
[   30.987595]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.988738]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.989362]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.990255]  kthread+0x257/0x310
[   30.990974]  ? __pfx_kthread+0x10/0x10
[   30.992211]  ret_from_fork+0x41/0x80
[   30.992823]  ? __pfx_kthread+0x10/0x10
[   30.993104]  ret_from_fork_asm+0x1a/0x30
[   30.994191]  </TASK>
[   30.994541] 
[   30.995106] The buggy address belongs to the physical page:
[   30.995531] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   30.996494] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.997217] flags: 0x200000000000040(head|node=0|zone=2)
[   30.998793] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   30.999723] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.001076] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   31.002190] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.003154] head: 0200000000000002 ffffea00040ad301 ffffffffffffffff 0000000000000000
[   31.004290] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   31.005221] page dumped because: kasan: bad access detected
[   31.006131] 
[   31.006330] Memory state around the buggy address:
[   31.006671]  ffff888102b4bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.008191]  ffff888102b4bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.009221] >ffff888102b4c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.009953]                    ^
[   31.010288]  ffff888102b4c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.012063]  ffff888102b4c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.012957] ==================================================================

test log snippet boot parser 62

Home

[   31.097218] ==================================================================
[   31.098195] BUG: KASAN: use-after-free in mempool_uaf_helper+0x394/0x400
[   31.098928] Read of size 1 at addr ffff888102b4c000 by task kunit_try_catch/241
[   31.099672] 
[   31.100002] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   31.101459] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.102171] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.103802] Call Trace:
[   31.104297]  <TASK>
[   31.104734]  dump_stack_lvl+0x73/0xb0
[   31.105367]  print_report+0xd1/0x640
[   31.106115]  ? __virt_addr_valid+0x1db/0x2d0
[   31.106590]  ? kasan_addr_to_slab+0x11/0xa0
[   31.107019]  kasan_report+0x102/0x140
[   31.107610]  ? mempool_uaf_helper+0x394/0x400
[   31.107955]  ? mempool_uaf_helper+0x394/0x400
[   31.108534]  __asan_report_load1_noabort+0x18/0x20
[   31.109088]  mempool_uaf_helper+0x394/0x400
[   31.110172]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   31.110953]  ? finish_task_switch.isra.0+0x153/0x700
[   31.111705]  mempool_page_alloc_uaf+0xb1/0x100
[   31.112162]  ? __pfx_mempool_page_alloc_uaf+0x10/0x10
[   31.112798]  ? __switch_to+0x5d9/0xf60
[   31.113196]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   31.114150]  ? __pfx_mempool_free_pages+0x10/0x10
[   31.114774]  ? __pfx_read_tsc+0x10/0x10
[   31.115206]  ? ktime_get_ts64+0x84/0x230
[   31.115773]  kunit_try_run_case+0x1b3/0x490
[   31.116195]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.116838]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.117227]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.118180]  ? __kthread_parkme+0x82/0x160
[   31.118835]  ? preempt_count_sub+0x50/0x80
[   31.119205]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.119877]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.120585]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.121066]  kthread+0x257/0x310
[   31.121910]  ? __pfx_kthread+0x10/0x10
[   31.122283]  ret_from_fork+0x41/0x80
[   31.122779]  ? __pfx_kthread+0x10/0x10
[   31.123190]  ret_from_fork_asm+0x1a/0x30
[   31.123747]  </TASK>
[   31.124057] 
[   31.124304] The buggy address belongs to the physical page:
[   31.125065] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   31.126167] flags: 0x200000000000000(node=0|zone=2)
[   31.126847] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   31.127755] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.128327] page dumped because: kasan: bad access detected
[   31.128988] 
[   31.129220] Memory state around the buggy address:
[   31.130128]  ffff888102b4bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.130773]  ffff888102b4bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.131429] >ffff888102b4c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.131964]                    ^
[   31.132547]  ffff888102b4c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.133113]  ffff888102b4c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.134163] ==================================================================

test log snippet boot parser 63

Home

[   27.235898] ==================================================================
[   27.238046] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x289/0x530
[   27.238046] 
[   27.238679] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . ] (in kfence-#55):
[   27.240683]  kmalloc_track_caller_oob_right+0x289/0x530
[   27.241297]  kunit_try_run_case+0x1b3/0x490
[   27.241994]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.242767]  kthread+0x257/0x310
[   27.243138]  ret_from_fork+0x41/0x80
[   27.243540]  ret_from_fork_asm+0x1a/0x30
[   27.243965] 
[   27.244478] kfence-#55: 0x(____ptrval____)-0x(____ptrval____), size=120, cache=kmalloc-128
[   27.244478] 
[   27.246447] allocated by task 150 on cpu 1 at 27.232243s (0.014015s ago):
[   27.247696]  kmalloc_track_caller_oob_right+0x19b/0x530
[   27.248302]  kunit_try_run_case+0x1b3/0x490
[   27.249270]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.250295]  kthread+0x257/0x310
[   27.250578]  ret_from_fork+0x41/0x80
[   27.251397]  ret_from_fork_asm+0x1a/0x30
[   27.252236] 
[   27.252819] freed by task 150 on cpu 1 at 27.235155s (0.017516s ago):
[   27.253657]  kmalloc_track_caller_oob_right+0x289/0x530
[   27.254322]  kunit_try_run_case+0x1b3/0x490
[   27.255018]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.255722]  kthread+0x257/0x310
[   27.255892]  ret_from_fork+0x41/0x80
[   27.256064]  ret_from_fork_asm+0x1a/0x30
[   27.256331] 
[   27.256579] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.257760] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.258483] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.259618] ==================================================================

test log snippet boot parser 64

Home

[   27.235898] ==================================================================
[   27.238046] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x289/0x530
[   27.238046] 
[   27.238679] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . ] (in kfence-#55):
[   27.240683]  kmalloc_track_caller_oob_right+0x289/0x530
[   27.241297]  kunit_try_run_case+0x1b3/0x490
[   27.241994]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.242767]  kthread+0x257/0x310
[   27.243138]  ret_from_fork+0x41/0x80
[   27.243540]  ret_from_fork_asm+0x1a/0x30
[   27.243965] 
[   27.244478] kfence-#55: 0x(____ptrval____)-0x(____ptrval____), size=120, cache=kmalloc-128
[   27.244478] 
[   27.246447] allocated by task 150 on cpu 1 at 27.232243s (0.014015s ago):
[   27.247696]  kmalloc_track_caller_oob_right+0x19b/0x530
[   27.248302]  kunit_try_run_case+0x1b3/0x490
[   27.249270]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.250295]  kthread+0x257/0x310
[   27.250578]  ret_from_fork+0x41/0x80
[   27.251397]  ret_from_fork_asm+0x1a/0x30
[   27.252236] 
[   27.252819] freed by task 150 on cpu 1 at 27.235155s (0.017516s ago):
[   27.253657]  kmalloc_track_caller_oob_right+0x289/0x530
[   27.254322]  kunit_try_run_case+0x1b3/0x490
[   27.255018]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.255722]  kthread+0x257/0x310
[   27.255892]  ret_from_fork+0x41/0x80
[   27.256064]  ret_from_fork_asm+0x1a/0x30
[   27.256331] 
[   27.256579] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.257760] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.258483] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.259618] ==================================================================

test log snippet boot parser 65

Home

------------[ cut here ]------------
[    4.475341] WARNING: CPU: 1 PID: 0 at kernel/smp.c:815 smp_call_function_many_cond+0x49c/0x5cc
[    4.484039] Modules linked in:
[    4.487121] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted 6.13.0-rc7 #1
[    4.494049] Hardware name: Generic DRA74X (Flattened Device Tree)
[    4.500183] Call trace: 
[    4.500183]  unwind_backtrace from show_stack+0x10/0x14
[    4.507995]  show_stack from dump_stack_lvl+0x54/0x68
[    4.513092]  dump_stack_lvl from __warn+0x7c/0x128
[    4.517913]  __warn from warn_slowpath_fmt+0x184/0x18c
[    4.523101]  warn_slowpath_fmt from smp_call_function_many_cond+0x49c/0x5cc
[    4.530120]  smp_call_function_many_cond from smp_call_function+0x2c/0x34
[    4.536926]  smp_call_function from set_memory_valid+0x7c/0xb8
[    4.542816]  set_memory_valid from kfence_guarded_free+0x168/0x300
[    4.549041]  kfence_guarded_free from rcu_core+0x2b8/0x964
[    4.554565]  rcu_core from handle_softirqs+0x108/0x344
[    4.559722]  handle_softirqs from __irq_exit_rcu+0xa0/0x114
[    4.565338]  __irq_exit_rcu from irq_exit+0x8/0x10
[    4.570159]  irq_exit from call_with_stack+0x18/0x20
[    4.575134]  call_with_stack from __irq_svc+0x8c/0xa4
[    4.580230] Exception stack(0xf0059f50 to 0xf0059f98)
[    4.585296] 9f40:                                     000073d4 00000001 00000001 00000000
[    4.593536] 9f60: c2992500 c226fc60 c2004e9c c2004edc 00000000 00000000 00000000 00000000
[    4.601745] 9f80: c226f0a0 f0059fa0 c13f9568 c13fa9e0 600f0113 ffffffff
[    4.608398]  __irq_svc from default_idle_call+0x1c/0xb0
[    4.613647]  default_idle_call from do_idle+0x200/0x288
[    4.618927]  do_idle from cpu_startup_entry+0x28/0x2c
[    4.623992]  cpu_startup_entry from secondary_start_kernel+0x120/0x128
[    4.630554]  secondary_start_kernel from 0x8041b094
[    4.635498] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 66

Home

------------[ cut here ]------------
[    4.475341] WARNING: CPU: 1 PID: 0 at kernel/smp.c:815 smp_call_function_many_cond+0x49c/0x5cc
[    4.484039] Modules linked in:
[    4.487121] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted 6.13.0-rc7 #1
[    4.494049] Hardware name: Generic DRA74X (Flattened Device Tree)
[    4.500183] Call trace: 
[    4.500183]  unwind_backtrace from show_stack+0x10/0x14
[    4.507995]  show_stack from dump_stack_lvl+0x54/0x68
[    4.513092]  dump_stack_lvl from __warn+0x7c/0x128
[    4.517913]  __warn from warn_slowpath_fmt+0x184/0x18c
[    4.523101]  warn_slowpath_fmt from smp_call_function_many_cond+0x49c/0x5cc
[    4.530120]  smp_call_function_many_cond from smp_call_function+0x2c/0x34
[    4.536926]  smp_call_function from set_memory_valid+0x7c/0xb8
[    4.542816]  set_memory_valid from kfence_guarded_free+0x168/0x300
[    4.549041]  kfence_guarded_free from rcu_core+0x2b8/0x964
[    4.554565]  rcu_core from handle_softirqs+0x108/0x344
[    4.559722]  handle_softirqs from __irq_exit_rcu+0xa0/0x114
[    4.565338]  __irq_exit_rcu from irq_exit+0x8/0x10
[    4.570159]  irq_exit from call_with_stack+0x18/0x20
[    4.575134]  call_with_stack from __irq_svc+0x8c/0xa4
[    4.580230] Exception stack(0xf0059f50 to 0xf0059f98)
[    4.585296] 9f40:                                     000073d4 00000001 00000001 00000000
[    4.593536] 9f60: c2992500 c226fc60 c2004e9c c2004edc 00000000 00000000 00000000 00000000
[    4.601745] 9f80: c226f0a0 f0059fa0 c13f9568 c13fa9e0 600f0113 ffffffff
[    4.608398]  __irq_svc from default_idle_call+0x1c/0xb0
[    4.613647]  default_idle_call from do_idle+0x200/0x288
[    4.618927]  do_idle from cpu_startup_entry+0x28/0x2c
[    4.623992]  cpu_startup_entry from secondary_start_kernel+0x120/0x128
[    4.630554]  secondary_start_kernel from 0x8041b094
[    4.635498] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 67

Home

------------[ cut here ]------------
[    5.338684] WARNING: CPU: 1 PID: 24 at kernel/smp.c:815 smp_call_function_many_cond+0x4b0/0x5dc
[    5.347503] Modules linked in:
[    5.350585] CPU: 1 UID: 0 PID: 24 Comm: ksoftirqd/1 Not tainted 6.13.0-rc7 #1
[    5.357757] Hardware name: Generic DRA74X (Flattened Device Tree)
[    5.363891] Call trace: 
[    5.363922]  unwind_backtrace from show_stack+0x18/0x1c
[    5.371734]  show_stack from dump_stack_lvl+0x6c/0x8c
[    5.376831]  dump_stack_lvl from __warn+0x84/0x130
[    5.381652]  __warn from warn_slowpath_fmt+0x18c/0x194
[    5.386840]  warn_slowpath_fmt from smp_call_function_many_cond+0x4b0/0x5dc
[    5.386871]  smp_call_function_many_cond from smp_call_function+0x34/0x3c
[    5.386901]  smp_call_function from set_memory_valid+0x84/0xc4
[    5.386932]  set_memory_valid from kfence_guarded_free+0x170/0x2dc
[    5.386962]  kfence_guarded_free from kmem_cache_free+0x360/0x408
[    5.386993]  kmem_cache_free from rcu_core+0x2cc/0x9dc
[    5.387023]  rcu_core from handle_softirqs+0x14c/0x3d0
[    5.387023]  handle_softirqs from run_ksoftirqd+0x48/0x60
[    5.387054]  run_ksoftirqd from smpboot_thread_fn+0xc0/0x15c
[    5.387084]  smpboot_thread_fn from kthread+0xe8/0x104
[    5.387084]  kthread from ret_from_fork+0x14/0x20
[    5.387115] Exception stack(0xf006dfb0 to 0xf006dff8)
[    5.387115] dfa0:                                     00000000 00000000 00000000 00000000
[    5.387145] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[    5.387145] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[    5.387207] ---[ end trace 0000000000000000 ]---

test log snippet test parser 1

Home

------------[ cut here ]------------
[   50.285720] WARNING: CPU: 0 PID: 467 at mm/util.c:657 __kvmalloc_node_noprof+0x138/0x148
[   50.288546] Modules linked in: crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[   50.291986] CPU: 0 UID: 0 PID: 467 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[   50.292933] Hardware name: linux,dummy-virt (DT)
[   50.294299] pstate: 23402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[   50.294776] pc : __kvmalloc_node_noprof+0x138/0x148
[   50.295902] lr : __kvmalloc_node_noprof+0x64/0x148
[   50.297961] sp : ffff800080a73cd0
[   50.298340] x29: ffff800080a73ce0 x28: fff00000c28c6d80 x27: 0000000000000000
[   50.299571] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c013c840
[   50.300479] x23: fff00000c013c8c0 x22: 4daf912ec973b6f4 x21: 0000000200001e00
[   50.300980] x20: 00000000ffffffff x19: 0000000000400cc0 x18: 0000000000000000
[   50.301525] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   50.302012] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   50.302504] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[   50.305003] x8 : 0000000000000001 x7 : 0000000000000001 x6 : 0000000000000005
[   50.305583] x5 : 0000000000000000 x4 : fff00000c28c6d80 x3 : 0000000000000000
[   50.306072] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[   50.306757] Call trace:
[   50.307560]  __kvmalloc_node_noprof+0x138/0x148 (P)
[   50.308938]  alloc_fdtable+0x84/0x128
[   50.309903]  expand_files+0x78/0x2ec
[   50.310441]  ksys_dup3+0x60/0x120
[   50.311247]  __arm64_sys_dup3+0x20/0x30
[   50.311729]  invoke_syscall+0x48/0x10c
[   50.312003]  el0_svc_common.constprop.0+0x40/0xe0
[   50.312308]  do_el0_svc+0x1c/0x28
[   50.312559]  el0_svc+0x30/0xcc
[   50.312825]  el0t_64_sync_handler+0x10c/0x138
[   50.313115]  el0t_64_sync+0x198/0x19c
[   50.314646] ---[ end trace 0000000000000000 ]---

test log snippet test parser 2

Home

[  116.150089] watchdog: BUG: soft lockup - CPU#0 stuck for 44s! [sh:318]

test log snippet test parser 3

Home

[  116.150089] watchdog: BUG: soft lockup - CPU#0 stuck for 44s! [sh:318]

test log snippet test parser 4

Home

[   52.888286] Oops: int3: 0000 [#1] PREEMPT SMP PTI

test log snippet test parser 5

Home

[   52.888286] Oops: int3: 0000 [#1] PREEMPT SMP PTI

test log snippet test parser 6

Home

[   52.900653] Kernel panic - not syncing: Fatal exception in interrupt
[   52.902860] Kernel Offset: 0x2ae00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)
[   52.924925] ---[ end Kernel panic - not syncing: Fatal exception in interrupt ]---

test log snippet test parser 7

Home

[   52.900653] Kernel panic - not syncing: Fatal exception in interrupt
[   52.902860] Kernel Offset: 0x2ae00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)
[   52.924925] ---[ end Kernel panic - not syncing: Fatal exception in interrupt ]---

test log snippet test parser 8

Home

------------[ cut here ]------------
[   54.494588] WARNING: CPU: 1 PID: 499 at mm/util.c:657 __kvmalloc_node_noprof+0xd7/0xe0
[   54.497170] Modules linked in:
[   54.498051] CPU: 1 UID: 0 PID: 499 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[   54.499553] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   54.500191] RIP: 0010:__kvmalloc_node_noprof+0xd7/0xe0
[   54.500823] Code: 00 48 83 c4 18 48 8d 65 e8 5b 41 5c 41 5d 5d c3 cc cc cc cc 48 b9 00 00 00 00 00 20 00 00 eb bd 80 e7 20 0f 85 52 ff ff ff 90 <0f> 0b 90 e9 49 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90
[   54.502687] RSP: 0018:ffff9ab0008cbdd8 EFLAGS: 00010246
[   54.503302] RAX: 0000000000000000 RBX: 00000000004000c0 RCX: 0000000000000015
[   54.504288] RDX: 0000000000000015 RSI: ffffffff830373cd RDI: 0000000000452cc0
[   54.504918] RBP: ffff9ab0008cbdf0 R08: 0000000000000040 R09: 0000000000000000
[   54.505217] R10: ffff9ab0008cbdd8 R11: 0000000000000000 R12: 0000000200001e00
[   54.506044] R13: 00000000ffffffff R14: ffff9633c02bc8c0 R15: ffff9633c02bc840
[   54.506828] FS:  00007f97ebe52740(0000) GS:ffff96343bd00000(0000) knlGS:0000000000000000
[   54.507676] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   54.508112] CR2: 00007f97ebefb8f0 CR3: 0000000102b3a000 CR4: 00000000000006f0
[   54.508597] Call Trace:
[   54.509008]  <TASK>
[   54.509378]  ? show_regs+0x68/0x80
[   54.509982]  ? __warn+0x91/0x140
[   54.510172]  ? __kvmalloc_node_noprof+0xd7/0xe0
[   54.510746]  ? report_bug+0x175/0x1a0
[   54.511015]  ? handle_bug+0x5c/0xa0
[   54.511576]  ? exc_invalid_op+0x1c/0x80
[   54.511813]  ? asm_exc_invalid_op+0x1f/0x30
[   54.512004]  ? __kmalloc_node_noprof+0x39d/0x4c0
[   54.512512]  ? __kvmalloc_node_noprof+0xd7/0xe0
[   54.513093]  ? __kvmalloc_node_noprof+0x53/0xe0
[   54.513665]  alloc_fdtable+0x78/0x120
[   54.513970]  expand_files+0x68/0x2e0
[   54.514123]  ? do_prlimit+0x134/0x210
[   54.514375]  ? trace_preempt_off+0x1e/0x70
[   54.514764]  ? ksys_dup3+0x61/0x100
[   54.515052]  ksys_dup3+0x6c/0x100
[   54.515521]  __x64_sys_dup2+0x32/0xc0
[   54.515872]  x64_sys_call+0x2082/0x20b0
[   54.516184]  do_syscall_64+0xb2/0x1d0
[   54.516568]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   54.517111] RIP: 0033:0x7f97ebf4ac17
[   54.518019] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[   54.519383] RSP: 002b:00007fffffe997c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000021
[   54.520470] RAX: ffffffffffffffda RBX: 00007fffffe9a028 RCX: 00007f97ebf4ac17
[   54.520762] RDX: 00007fffffe997f0 RSI: 0000000040000038 RDI: 0000000000000002
[   54.520975] RBP: 00007fffffe999f0 R08: 0000000000000064 R09: 0000000000000000
[   54.521184] R10: 00007f97ebe67170 R11: 0000000000000202 R12: 0000000000000000
[   54.521740] R13: 00007fffffe9a038 R14: 00007f97ec086000 R15: 000055b6f7205dd8
[   54.522579]  </TASK>
[   54.523080] ---[ end trace 0000000000000000 ]---

test log snippet test parser 9

Home

------------[ cut here ]------------
[  193.522279] WARNING: CPU: 2 PID: 1469 at mm/util.c:657 __kvmalloc_node_noprof+0x11c/0x124
[  193.523017] Modules linked in: brcmfmac brcmutil cfg80211 snd_soc_hdmi_codec dw_hdmi_cec dw_hdmi_i2s_audio hci_uart btqca btbcm hantro_vpu bluetooth v4l2_h264 v4l2_vp9 v4l2_jpeg crct10dif_ce snd_soc_audio_graph_card snd_soc_simple_card snd_soc_spdif_tx v4l2_mem2mem panfrost snd_soc_simple_card_utils rockchipdrm videobuf2_v4l2 reset_gpio gpu_sched videodev drm_shmem_helper dw_mipi_dsi ecdh_generic analogix_dp ecc rfkill videobuf2_dma_contig dw_hdmi pwrseq_core cec phy_rockchip_pcie videobuf2_memops drm_display_helper videobuf2_common rtc_rk808 snd_soc_rockchip_i2s mc drm_dma_helper drm_client_lib snd_soc_es8316 rockchip_saradc drm_kms_helper rockchip_thermal industrialio_triggered_buffer pcie_rockchip_host kfifo_buf coresight_cpu_debug coresight drm fuse backlight ip_tables x_tables
[  193.529193] CPU: 2 UID: 0 PID: 1469 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[  193.529849] Hardware name: Radxa ROCK Pi 4B (DT)
[  193.530258] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  193.530874] pc : __kvmalloc_node_noprof+0x11c/0x124
[  193.531317] lr : __kvmalloc_node_noprof+0x50/0x124
[  193.531744] sp : ffff800084e13ce0
[  193.532038] x29: ffff800084e13cf0 x28: ffff000001998000 x27: 0000000000000000
[  193.532671] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[  193.533303] x23: 0000000080000000 x22: ffff80008035c9a0 x21: 0000000200001e00
[  193.533935] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[  193.534567] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  193.535200] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[  193.535831] x11: 0000000000000040 x10: 6eecf9c73f643800 x9 : 6eecf9c73f643800
[  193.536462] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000
[  193.537094] x5 : 0000000000000000 x4 : ffff800084e13cb0 x3 : 0000000000000000
[  193.537726] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[  193.538359] Call trace:
[  193.538579]  __kvmalloc_node_noprof+0x11c/0x124 (P)
[  193.539023]  alloc_fdtable+0x74/0x118
[  193.539355]  expand_files+0x114/0x2e0
[  193.539685]  ksys_dup3+0x64/0xe8
[  193.539976]  __arm64_sys_dup3+0x20/0x30
[  193.540320]  invoke_syscall+0x40/0xf8
[  193.540650]  el0_svc_common+0xa8/0xd8
[  193.540978]  do_el0_svc+0x1c/0x28
[  193.541275]  el0_svc+0x38/0x68
[  193.541553]  el0t_64_sync_handler+0x78/0x108
[  193.541933]  el0t_64_sync+0x198/0x19c
[  193.542263] ---[ end trace 0000000000000000 ]---

test log snippet test parser 10

Home

------------[ cut here ]------------
[  193.522279] WARNING: CPU: 2 PID: 1469 at mm/util.c:657 __kvmalloc_node_noprof+0x11c/0x124
[  193.523017] Modules linked in: brcmfmac brcmutil cfg80211 snd_soc_hdmi_codec dw_hdmi_cec dw_hdmi_i2s_audio hci_uart btqca btbcm hantro_vpu bluetooth v4l2_h264 v4l2_vp9 v4l2_jpeg crct10dif_ce snd_soc_audio_graph_card snd_soc_simple_card snd_soc_spdif_tx v4l2_mem2mem panfrost snd_soc_simple_card_utils rockchipdrm videobuf2_v4l2 reset_gpio gpu_sched videodev drm_shmem_helper dw_mipi_dsi ecdh_generic analogix_dp ecc rfkill videobuf2_dma_contig dw_hdmi pwrseq_core cec phy_rockchip_pcie videobuf2_memops drm_display_helper videobuf2_common rtc_rk808 snd_soc_rockchip_i2s mc drm_dma_helper drm_client_lib snd_soc_es8316 rockchip_saradc drm_kms_helper rockchip_thermal industrialio_triggered_buffer pcie_rockchip_host kfifo_buf coresight_cpu_debug coresight drm fuse backlight ip_tables x_tables
[  193.529193] CPU: 2 UID: 0 PID: 1469 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[  193.529849] Hardware name: Radxa ROCK Pi 4B (DT)
[  193.530258] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  193.530874] pc : __kvmalloc_node_noprof+0x11c/0x124
[  193.531317] lr : __kvmalloc_node_noprof+0x50/0x124
[  193.531744] sp : ffff800084e13ce0
[  193.532038] x29: ffff800084e13cf0 x28: ffff000001998000 x27: 0000000000000000
[  193.532671] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[  193.533303] x23: 0000000080000000 x22: ffff80008035c9a0 x21: 0000000200001e00
[  193.533935] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[  193.534567] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  193.535200] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[  193.535831] x11: 0000000000000040 x10: 6eecf9c73f643800 x9 : 6eecf9c73f643800
[  193.536462] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000
[  193.537094] x5 : 0000000000000000 x4 : ffff800084e13cb0 x3 : 0000000000000000
[  193.537726] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[  193.538359] Call trace:
[  193.538579]  __kvmalloc_node_noprof+0x11c/0x124 (P)
[  193.539023]  alloc_fdtable+0x74/0x118
[  193.539355]  expand_files+0x114/0x2e0
[  193.539685]  ksys_dup3+0x64/0xe8
[  193.539976]  __arm64_sys_dup3+0x20/0x30
[  193.540320]  invoke_syscall+0x40/0xf8
[  193.540650]  el0_svc_common+0xa8/0xd8
[  193.540978]  do_el0_svc+0x1c/0x28
[  193.541275]  el0_svc+0x38/0x68
[  193.541553]  el0t_64_sync_handler+0x78/0x108
[  193.541933]  el0t_64_sync+0x198/0x19c
[  193.542263] ---[ end trace 0000000000000000 ]---

test log snippet test parser 11

Home

------------[ cut here ]------------
[  202.133511] WARNING: CPU: 2 PID: 1472 at mm/util.c:657 __kvmalloc_node_noprof+0x138/0x148
[  202.134241] Modules linked in: brcmfmac brcmutil cfg80211 snd_soc_hdmi_codec dw_hdmi_cec dw_hdmi_i2s_audio hci_uart btqca btbcm hantro_vpu bluetooth crct10dif_ce snd_soc_audio_graph_card snd_soc_simple_card v4l2_vp9 ecdh_generic snd_soc_spdif_tx reset_gpio v4l2_h264 ecc rockchipdrm snd_soc_simple_card_utils v4l2_jpeg analogix_dp v4l2_mem2mem dw_mipi_dsi videobuf2_dma_contig panfrost videobuf2_memops rfkill drm_shmem_helper videobuf2_v4l2 dw_hdmi gpu_sched phy_rockchip_pcie snd_soc_rockchip_i2s pwrseq_core rtc_rk808 videodev cec drm_display_helper rockchip_saradc drm_client_lib videobuf2_common drm_dma_helper snd_soc_es8316 mc drm_kms_helper industrialio_triggered_buffer kfifo_buf coresight_cpu_debug rockchip_thermal coresight pcie_rockchip_host drm fuse backlight ip_tables x_tables
[  202.140422] CPU: 2 UID: 0 PID: 1472 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[  202.141080] Hardware name: Radxa ROCK Pi 4B (DT)
[  202.141491] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  202.142104] pc : __kvmalloc_node_noprof+0x138/0x148
[  202.142542] lr : __kvmalloc_node_noprof+0x64/0x148
[  202.142968] sp : ffff800084d3bcd0
[  202.143261] x29: ffff800084d3bce0 x28: ffff000001c06d80 x27: 0000000000000000
[  202.143896] x26: 0000000000000000 x25: 0000000000000000 x24: ffff0000013eb440
[  202.144529] x23: ffff0000013eb4c0 x22: ffff80008033b6f4 x21: 0000000200001e00
[  202.145162] x20: 00000000ffffffff x19: 0000000000400cc0 x18: 0000000000000000
[  202.145796] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  202.146428] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[  202.147061] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[  202.147694] x8 : 0000000000000001 x7 : 0000000000000001 x6 : 0000000000000005
[  202.148327] x5 : 0000000000000000 x4 : ffff000001c06d80 x3 : 0000000000000000
[  202.148960] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[  202.149594] Call trace:
[  202.149816]  __kvmalloc_node_noprof+0x138/0x148 (P)
[  202.150253]  alloc_fdtable+0x84/0x128
[  202.150586]  expand_files+0x78/0x2ec
[  202.150909]  ksys_dup3+0x60/0x120
[  202.151206]  __arm64_sys_dup3+0x20/0x30
[  202.151550]  invoke_syscall+0x48/0x10c
[  202.151890]  el0_svc_common.constprop.0+0x40/0xe0
[  202.152310]  do_el0_svc+0x1c/0x28
[  202.152609]  el0_svc+0x30/0xcc
[  202.152887]  el0t_64_sync_handler+0x10c/0x138
[  202.153275]  el0t_64_sync+0x198/0x19c
[  202.153605] ---[ end trace 0000000000000000 ]---

test log snippet test parser 12

Home

------------[ cut here ]------------
[  202.133511] WARNING: CPU: 2 PID: 1472 at mm/util.c:657 __kvmalloc_node_noprof+0x138/0x148
[  202.134241] Modules linked in: brcmfmac brcmutil cfg80211 snd_soc_hdmi_codec dw_hdmi_cec dw_hdmi_i2s_audio hci_uart btqca btbcm hantro_vpu bluetooth crct10dif_ce snd_soc_audio_graph_card snd_soc_simple_card v4l2_vp9 ecdh_generic snd_soc_spdif_tx reset_gpio v4l2_h264 ecc rockchipdrm snd_soc_simple_card_utils v4l2_jpeg analogix_dp v4l2_mem2mem dw_mipi_dsi videobuf2_dma_contig panfrost videobuf2_memops rfkill drm_shmem_helper videobuf2_v4l2 dw_hdmi gpu_sched phy_rockchip_pcie snd_soc_rockchip_i2s pwrseq_core rtc_rk808 videodev cec drm_display_helper rockchip_saradc drm_client_lib videobuf2_common drm_dma_helper snd_soc_es8316 mc drm_kms_helper industrialio_triggered_buffer kfifo_buf coresight_cpu_debug rockchip_thermal coresight pcie_rockchip_host drm fuse backlight ip_tables x_tables
[  202.140422] CPU: 2 UID: 0 PID: 1472 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[  202.141080] Hardware name: Radxa ROCK Pi 4B (DT)
[  202.141491] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  202.142104] pc : __kvmalloc_node_noprof+0x138/0x148
[  202.142542] lr : __kvmalloc_node_noprof+0x64/0x148
[  202.142968] sp : ffff800084d3bcd0
[  202.143261] x29: ffff800084d3bce0 x28: ffff000001c06d80 x27: 0000000000000000
[  202.143896] x26: 0000000000000000 x25: 0000000000000000 x24: ffff0000013eb440
[  202.144529] x23: ffff0000013eb4c0 x22: ffff80008033b6f4 x21: 0000000200001e00
[  202.145162] x20: 00000000ffffffff x19: 0000000000400cc0 x18: 0000000000000000
[  202.145796] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  202.146428] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[  202.147061] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[  202.147694] x8 : 0000000000000001 x7 : 0000000000000001 x6 : 0000000000000005
[  202.148327] x5 : 0000000000000000 x4 : ffff000001c06d80 x3 : 0000000000000000
[  202.148960] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[  202.149594] Call trace:
[  202.149816]  __kvmalloc_node_noprof+0x138/0x148 (P)
[  202.150253]  alloc_fdtable+0x84/0x128
[  202.150586]  expand_files+0x78/0x2ec
[  202.150909]  ksys_dup3+0x60/0x120
[  202.151206]  __arm64_sys_dup3+0x20/0x30
[  202.151550]  invoke_syscall+0x48/0x10c
[  202.151890]  el0_svc_common.constprop.0+0x40/0xe0
[  202.152310]  do_el0_svc+0x1c/0x28
[  202.152609]  el0_svc+0x30/0xcc
[  202.152887]  el0t_64_sync_handler+0x10c/0x138
[  202.153275]  el0t_64_sync+0x198/0x19c
[  202.153605] ---[ end trace 0000000000000000 ]---

test log snippet test parser 13

Home

[    3.782684] Internal error: Oops - undefined instruction: 0 [#1] SMP ARM
[    3.789459] Modules linked in:
[    3.792510] CPU: 1 UID: 0 PID: 45 Comm: kworker/u10:2 Not tainted 6.13.0-rc7 #1
[    3.799865] Hardware name: Generic DRA74X (Flattened Device Tree)
[    3.805999] Workqueue: events_unbound deferred_probe_work_func
[    3.811889] PC is at edma_probe+0xb34/0xfe4
[    3.816101] LR is at devm_kmalloc+0xf4/0x12c
[    3.820373] pc : [<c0c0bc28>]    lr : [<c0deb730>]    psr: 60000013
[    3.826690] sp : f0105938  ip : 00070007  fp : efcd56f0
[    3.831939] r10: c3cadc10  r9 : c2f53840  r8 : c3cadc00
[    3.837188] r7 : 00000002  r6 : 00000000  r5 : 00000003  r4 : 00000001
[    3.843749] r3 : 00000001  r2 : 00000002  r1 : 00000002  r0 : c3cca1c0
[    3.850311] Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
[    3.857482] Control: 30c5387d  Table: 80203000  DAC: 55555555
[    3.863281] Register r0 information: slab kmalloc-rnd-13-128 start c3cca180 pointer offset 64 size 128
[    3.872650] Register r1 information: non-paged memory
[    3.877746] Register r2 information: non-paged memory
[    3.882812] Register r3 information: non-paged memory
[    3.887908] Register r4 information: non-paged memory
[    3.892974] Register r5 information: non-paged memory
[    3.898071] Register r6 information: NULL pointer
[    3.902801] Register r7 information: non-paged memory
[    3.907867] Register r8 information: slab kmalloc-rnd-15-1k start c3cadc00 pointer offset 0 size 1024
[    3.917175] Register r9 information: slab kmalloc-rnd-08-512 start c2f53800 pointer offset 64 size 512
[    3.926544] Register r10 information: slab kmalloc-rnd-15-1k start c3cadc00 pointer offset 16 size 1024
[    3.936004] Register r11 information: non-slab/vmalloc memory
[    3.941772] Register r12 information: non-paged memory
[    3.946960] Process kworker/u10:2 (pid: 45, stack limit = 0x1b97c4a1)
[    3.953430] Stack: (0xf0105938 to 0xf0106000)
[    3.957824] 5920:                                                       00000001 c13376c8
[    3.966033] 5940: c3cadc10 c23d273c c23d273c efcd56f0 00000001 c3cd1740 c292a93c 00000000
[    3.974243] 5960: 00000001 00000000 c24d3d48 c1334104 c1d8b2c0 c1d27400 efcd56f0 3f45655f
[    3.982482] 5980: c24d3d48 fc8f9ed5 f0105a98 c1334d4c ffffffff c07028f8 00000000 00000000
[    3.990692] 59a0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 f46c0f7c
[    3.998931] 59c0: f46c0f7c c3cadc10 c23d273c c23d273c 3f45655f c24d3d48 fc8f9ed5 f0105a98
[    4.007141] 59e0: 00000001 c0de9334 c3cadc10 c23d273c 00000000 c0de5a70 c3cadc10 c23d273c
[    4.015380] 5a00: c24d3d50 000000ab 00000001 c0de4af4 60000013 efcd56f0 c3cadc10 c3cadc10
[    4.023590] 5a20: c24d3d50 000000ab c24d3d48 fc8f9ed5 00000001 c0de5780 c3cadc10 c23d273c
[    4.031799] 5a40: f0105a98 00000000 c2826900 c0de5638 c0de5504 c0de5504 00000000 f0105a68
[    4.040039] 5a60: 00000001 c0de1b74 c282696c c29eac38 c2826900 f46c0f7c c3cadc10 c3cadc54
[    4.048248] 5a80: 00000000 00000001 00000000 c2826900 00000000 c0de490c c3cadc10 00000001
[    4.056488] 5aa0: 00000100 f46c0f7c c3cadc10 c24d3d3c c2826900 c1a471f0 c3cadc10 c0de1de0
[    4.064697] 5ac0: c3cadc10 c3caec10 00000000 c3caec10 c3cadc10 efcd5754 00000001 c0ddd4d4
[    4.072906] 5ae0: f46c0f7c 00000000 00000000 00000000 c3cadc00 efcd56f0 c3cadc10 efcd5754
[    4.081146] 5b00: 00000000 c1336d00 efcd56f0 c3caec10 c221d2b8 00000000 00000000 efcd5754
[    4.089355] 5b20: c1843978 c1336f98 c29ad410 c3caec10 00000000 00000000 00000000 00000000
[    4.097564] 5b40: 00000000 00000000 00000000 00000000 00000000 00000000 f46c0f7c efcd56f0
[    4.105804] 5b60: c221d2b8 c1843978 efcd539c 00000000 c3caec10 00000001 c24c2728 c1337214
[    4.114013] 5b80: 00000001 c1cfc9ea c3cc6c40 efcd5520 f0105be0 00000001 00000000 c1cfc9ea
[    4.122253] 5ba0: c1e02ae6 c0a36af0 00000000 00000000 c1d8b2c0 c3caec10 c221d524 efcd539c
[    4.130462] 5bc0: 00000000 00000000 43300000 00000000 00100000 00000000 00000200 00000000
[    4.138702] 5be0: 00000002 c1b15cc0 ff9e82f0 ff9e82f0 00000001 00000001 00000001 00000000
[    4.146911] 5c00: f46c0f7c c3caec10 c230f228 c230f228 3f45655f c24d3d48 fc8f9ed5 f0105cd8
[    4.155120] 5c20: 00000001 c0de9334 c3caec10 c230f228 00000000 c0de5a70 c3caec10 c230f228
[    4.163360] 5c40: c24d3d50 000000ab 00000001 c0de4af4 60000013 efcd539c c3caec10 c3caec10
[    4.171569] 5c60: c24d3d50 000000ab c24d3d48 fc8f9ed5 00000001 c0de5780 c3caec10 c230f228
[    4.179779] 5c80: f0105cd8 00000000 c2826900 c0de5638 c0de5504 c0de5504 00000000 f0105ca8
[    4.188018] 5ca0: 00000001 c0de1b74 c282696c c386acb8 c2826900 f46c0f7c c3caec10 c3caec54
[    4.196228] 5cc0: 00000000 00000001 00000000 c2826900 c221d524 c0de490c c3caec10 00000001
[    4.204467] 5ce0: 00000100 f46c0f7c c3caec10 c24d3d3c c2826900 c1a471f0 c3caec10 c0de1de0
[    4.212677] 5d00: c3caec10 c29ad410 00000000 c29ad410 c3caec10 efcd5400 00000001 c0ddd4d4
[    4.220886] 5d20: f46c0f7c 00000000 00000000 00000000 c3caec00 efcd539c c3caec10 efcd5400
[    4.229125] 5d40: c221d524 c1336d00 efcd539c c29ad410 c221d2b8 c221d524 00000000 efcd5400
[    4.237335] 5d60: 00000000 c1336f98 00000000 c29ad410 43300000 00000000 43300003 00000000
[    4.245574] 5d80: ff9e8254 00000200 00000000 00000000 00000000 00000000 f46c0f7c efcd539c
[    4.253784] 5da0: c221d2b8 00000000 efc6946c 00000000 c29ad410 00000001 c291680d c1337214
[    4.261993] 5dc0: 00000001 f0105eb8 c29ad410 efc6946c c3a0fb40 c29ad400 c230f14c c221d2b8
[    4.270233] 5de0: f0105eb8 c0a35db8 c29ad410 c230f14c c230f14c 3f45655f c24d3d48 fc8f9ed5
[    4.278442] 5e00: c291680d c0de9334 c29ad410 c230f14c 00000000 c0de5a70 c29ad410 c230f14c
[    4.286682] 5e20: c24d3d50 00000001 c291680d c0de4af4 60000013 efc6946c c29ad410 c29ad410
[    4.294891] 5e40: c24d3d50 00000001 c24d3d48 fc8f9ed5 c291680d c0de5780 c29ad410 c230f14c
[    4.303100] 5e60: f0105eb8 00000000 c2826900 c0de5638 c0de5504 c0de5504 00000000 f0105e88
[    4.311340] 5e80: c291680d c0de1b74 c282696c c386af38 c2826900 f46c0f7c c29ad410 c29ad454
[    4.319549] 5ea0: 00000000 00000001 00000000 c2826900 c2916800 c0de490c c29ad410 00000001
[    4.327789] 5ec0: c291680d f46c0f7c c29ad410 c24d3d3c c2826900 c1a471f0 00000000 c0de1de0
[    4.335998] 5ee0: c23fe8f4 c29ad410 c2bffa54 c23fe910 00000000 00000004 c291680d c0de5298
[    4.344207] 5f00: c29dab00 c23fe918 c2970c00 c2916880 0000000a c047f7b4 f0105f70 c1805e30
[    4.352447] 5f20: 00000000 00000002 f46c0f7c c3832500 c29dab18 c29dab50 c29dab2c c2970c00
[    4.360656] 5f40: c29dab00 c29dab2c c3832500 c2970c20 c246a65a 00000402 00000000 c0481c7c
[    4.368896] 5f60: c29e3600 c04819cc c29dab00 00000040 c3832be4 c29e3614 c29e3600 c04819cc
[    4.377105] 5f80: c29dab00 c3832500 00000000 c04884f4 c2e81d40 c04883bc 00000000 00000000
[    4.385314] 5fa0: 00000000 00000000 00000000 c040029c 00000000 00000000 00000000 00000000
[    4.393554] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[    4.401763] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 00000000 00000000
[    4.409973] Call trace: 
[    4.410003]  edma_probe from platform_probe+0xac/0xe0
[    4.417633]  platform_probe from really_probe+0x170/0x3cc
[    4.423065]  really_probe from __driver_probe_device+0x90/0x18c
[    4.429016]  __driver_probe_device from driver_probe_device+0x3c/0x1bc
[    4.435577]  driver_probe_device from __device_attach_driver+0x134/0x17c
[    4.442321]  __device_attach_driver from bus_for_each_drv+0x130/0x18c
[    4.448822]  bus_for_each_drv from __device_attach+0xcc/0x184
[    4.454589]  __device_attach from bus_probe_device+0xac/0x128
[    4.460357]  bus_probe_device from device_add+0x2b0/0x4d0
[    4.465820]  device_add from of_platform_device_create_pdata+0xc4/0xf8
[    4.472381]  of_platform_device_create_pdata from of_platform_bus_create+0x170/0x370
[    4.480163]  of_platform_bus_create from of_platform_populate+0x7c/0xc4
[    4.486816]  of_platform_populate from sysc_probe+0xa9c/0xbac
[    4.492614]  sysc_probe from platform_probe+0xac/0xe0
[    4.497680]  platform_probe from really_probe+0x170/0x3cc
[    4.503143]  really_probe from __driver_probe_device+0x90/0x18c
[    4.509094]  __driver_probe_device from driver_probe_device+0x3c/0x1bc
[    4.515655]  driver_probe_device from __device_attach_driver+0x134/0x17c
[    4.522399]  __device_attach_driver from bus_for_each_drv+0x130/0x18c
[    4.528869]  bus_for_each_drv from __device_attach+0xcc/0x184
[    4.534667]  __device_attach from bus_probe_device+0xac/0x128
[    4.540435]  bus_probe_device from device_add+0x2b0/0x4d0
[    4.545867]  device_add from of_platform_device_create_pdata+0xc4/0xf8
[    4.552429]  of_platform_device_create_pdata from of_platform_bus_create+0x170/0x370
[    4.560241]  of_platform_bus_create from of_platform_populate+0x7c/0xc4
[    4.566894]  of_platform_populate from simple_pm_bus_probe+0xa8/0xf4
[    4.573272]  simple_pm_bus_probe from platform_probe+0xac/0xe0
[    4.579162]  platform_probe from really_probe+0x170/0x3cc
[    4.584594]  really_probe from __driver_probe_device+0x90/0x18c
[    4.590545]  __driver_probe_device from driver_probe_device+0x3c/0x1bc
[    4.597106]  driver_probe_device from __device_attach_driver+0x134/0x17c
[    4.603851]  __device_attach_driver from bus_for_each_drv+0x130/0x18c
[    4.610321]  bus_for_each_drv from __device_attach+0xcc/0x184
[    4.616119]  __device_attach from bus_probe_device+0xac/0x128
[    4.621887]  bus_probe_device from deferred_probe_work_func+0x94/0xd4
[    4.628356]  deferred_probe_work_func from process_scheduled_works+0x25c/0x504
[    4.635650]  process_scheduled_works from worker_thread+0x2b0/0x3ac
[    4.641937]  worker_thread from kthread+0x138/0x164
[    4.646850]  kthread from ret_from_fork+0x14/0x38
[    4.651580] Exception stack(0xf0105fb0 to 0xf0105ff8)
[    4.656677] 5fa0:                                     00000000 00000000 00000000 00000000
[    4.664886] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[    4.673126] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[    4.679779] Code: e3a03001 13540001 e5c03002 1a000006 (e7ffdefe) 
[    4.685882] ---[ end trace 0000000000000000 ]---

test log snippet test parser 14

Home

------------[ cut here ]------------
[  213.850572] WARNING: CPU: 2 PID: 1428 at mm/util.c:657 __kvmalloc_node_noprof+0xdf/0xf0
[  213.858597] Modules linked in: x86_pkg_temp_thermal
[  213.863489] CPU: 2 UID: 0 PID: 1428 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[  213.870950] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  213.879415] RIP: 0010:__kvmalloc_node_noprof+0xdf/0xf0
[  213.884598] Code: 89 f0 ff 75 08 53 68 00 04 00 00 e8 db 33 04 00 48 83 c4 18 5b 41 5e 41 5f 5d c3 cc cc cc cc cc 41 f7 c6 00 20 00 00 75 81 90 <0f> 0b 90 31 c0 eb e3 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90
[  213.904688] RSP: 0018:ffffaca341963db8 EFLAGS: 00010246
[  213.909978] RAX: 0000000000000004 RBX: 00000000ffffffff RCX: 0000000400000000
[  213.918424] RDX: 0000000200001e00 RSI: 0000000000000000 RDI: ffffffff83069fe8
[  213.925646] RBP: ffffaca341963dd0 R08: 0000000000412cc0 R09: 00000000ffffffff
[  213.934066] R10: 0000000000000000 R11: 0000000000000000 R12: 00000000400003c0
[  213.941267] R13: 00000000400003c0 R14: 0000000000400cc0 R15: 0000000200001e00
[  213.949709] FS:  00007f71f27ed740(0000) GS:ffff9e0cdfd00000(0000) knlGS:0000000000000000
[  213.957863] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  213.964920] CR2: 00007f71f2991680 CR3: 000000010f0b0001 CR4: 00000000003706f0
[  213.972120] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  213.980574] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  213.987751] Call Trace:
[  213.990494]  <TASK>
[  213.992591]  ? show_regs+0x5d/0x70
[  213.995998]  ? __warn+0xcf/0x1d0
[  213.999257]  ? __kvmalloc_node_noprof+0xdf/0xf0
[  214.003791]  ? report_bug+0x14c/0x1f0
[  214.007454]  ? handle_bug+0x67/0x90
[  214.010973]  ? exc_invalid_op+0x1f/0x50
[  214.014815]  ? asm_exc_invalid_op+0x1f/0x30
[  214.019027]  ? __kvmalloc_node_noprof+0x48/0xf0
[  214.023559]  ? __kvmalloc_node_noprof+0xdf/0xf0
[  214.028090]  ? __kvmalloc_node_noprof+0x48/0xf0
[  214.032615]  alloc_fdtable+0x7b/0x120
[  214.036280]  expand_files+0x118/0x310
[  214.039973]  ? do_prlimit+0x11d/0x160
[  214.043640]  ? __se_sys_prlimit64+0x1ea/0x2a0
[  214.047999]  ksys_dup3+0x71/0xd0
[  214.051229]  __x64_sys_dup2+0x1e/0x80
[  214.054896]  x64_sys_call+0x8cf/0x2f50
[  214.058651]  do_syscall_64+0xd0/0x1a0
[  214.062381]  ? exc_page_fault+0x68/0xc0
[  214.066215]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  214.071269] RIP: 0033:0x7f71f28e5c17
[  214.074846] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[  214.093618] RSP: 002b:00007ffe8e7ae6a8 EFLAGS: 00000202 ORIG_RAX: 0000000000000021
[  214.101184] RAX: ffffffffffffffda RBX: 00007ffe8e7aef08 RCX: 00007f71f28e5c17
[  214.108334] RDX: 00007ffe8e7ae828 RSI: 0000000040000038 RDI: 0000000000000002
[  214.115520] RBP: 00007ffe8e7ae8c0 R08: 0000000000000064 R09: 0000000000000000
[  214.122652] R10: 00007f71f2802170 R11: 0000000000000202 R12: 0000000000000000
[  214.129810] R13: 00007ffe8e7aef18 R14: 00007f71f2a21000 R15: 0000556be3254cf8
[  214.136937]  </TASK>
[  214.139127] ---[ end trace 0000000000000000 ]---

test log snippet test parser 15

Home

------------[ cut here ]------------
[  213.850572] WARNING: CPU: 2 PID: 1428 at mm/util.c:657 __kvmalloc_node_noprof+0xdf/0xf0
[  213.858597] Modules linked in: x86_pkg_temp_thermal
[  213.863489] CPU: 2 UID: 0 PID: 1428 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[  213.870950] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  213.879415] RIP: 0010:__kvmalloc_node_noprof+0xdf/0xf0
[  213.884598] Code: 89 f0 ff 75 08 53 68 00 04 00 00 e8 db 33 04 00 48 83 c4 18 5b 41 5e 41 5f 5d c3 cc cc cc cc cc 41 f7 c6 00 20 00 00 75 81 90 <0f> 0b 90 31 c0 eb e3 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90
[  213.904688] RSP: 0018:ffffaca341963db8 EFLAGS: 00010246
[  213.909978] RAX: 0000000000000004 RBX: 00000000ffffffff RCX: 0000000400000000
[  213.918424] RDX: 0000000200001e00 RSI: 0000000000000000 RDI: ffffffff83069fe8
[  213.925646] RBP: ffffaca341963dd0 R08: 0000000000412cc0 R09: 00000000ffffffff
[  213.934066] R10: 0000000000000000 R11: 0000000000000000 R12: 00000000400003c0
[  213.941267] R13: 00000000400003c0 R14: 0000000000400cc0 R15: 0000000200001e00
[  213.949709] FS:  00007f71f27ed740(0000) GS:ffff9e0cdfd00000(0000) knlGS:0000000000000000
[  213.957863] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  213.964920] CR2: 00007f71f2991680 CR3: 000000010f0b0001 CR4: 00000000003706f0
[  213.972120] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  213.980574] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  213.987751] Call Trace:
[  213.990494]  <TASK>
[  213.992591]  ? show_regs+0x5d/0x70
[  213.995998]  ? __warn+0xcf/0x1d0
[  213.999257]  ? __kvmalloc_node_noprof+0xdf/0xf0
[  214.003791]  ? report_bug+0x14c/0x1f0
[  214.007454]  ? handle_bug+0x67/0x90
[  214.010973]  ? exc_invalid_op+0x1f/0x50
[  214.014815]  ? asm_exc_invalid_op+0x1f/0x30
[  214.019027]  ? __kvmalloc_node_noprof+0x48/0xf0
[  214.023559]  ? __kvmalloc_node_noprof+0xdf/0xf0
[  214.028090]  ? __kvmalloc_node_noprof+0x48/0xf0
[  214.032615]  alloc_fdtable+0x7b/0x120
[  214.036280]  expand_files+0x118/0x310
[  214.039973]  ? do_prlimit+0x11d/0x160
[  214.043640]  ? __se_sys_prlimit64+0x1ea/0x2a0
[  214.047999]  ksys_dup3+0x71/0xd0
[  214.051229]  __x64_sys_dup2+0x1e/0x80
[  214.054896]  x64_sys_call+0x8cf/0x2f50
[  214.058651]  do_syscall_64+0xd0/0x1a0
[  214.062381]  ? exc_page_fault+0x68/0xc0
[  214.066215]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  214.071269] RIP: 0033:0x7f71f28e5c17
[  214.074846] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[  214.093618] RSP: 002b:00007ffe8e7ae6a8 EFLAGS: 00000202 ORIG_RAX: 0000000000000021
[  214.101184] RAX: ffffffffffffffda RBX: 00007ffe8e7aef08 RCX: 00007f71f28e5c17
[  214.108334] RDX: 00007ffe8e7ae828 RSI: 0000000040000038 RDI: 0000000000000002
[  214.115520] RBP: 00007ffe8e7ae8c0 R08: 0000000000000064 R09: 0000000000000000
[  214.122652] R10: 00007f71f2802170 R11: 0000000000000202 R12: 0000000000000000
[  214.129810] R13: 00007ffe8e7aef18 R14: 00007f71f2a21000 R15: 0000556be3254cf8
[  214.136937]  </TASK>
[  214.139127] ---[ end trace 0000000000000000 ]---

test log snippet test parser 16

Home

------------[ cut here ]------------
[  206.006290] WARNING: CPU: 0 PID: 1446 at mm/util.c:657 __kvmalloc_node_noprof+0xd7/0xe0
[  206.015684] Modules linked in: x86_pkg_temp_thermal
[  206.020567] CPU: 0 UID: 0 PID: 1446 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[  206.027961] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  206.035353] RIP: 0010:__kvmalloc_node_noprof+0xd7/0xe0
[  206.040491] Code: 00 48 83 c4 18 48 8d 65 e8 5b 41 5c 41 5d 5d c3 cc cc cc cc 48 b9 00 00 00 00 00 20 00 00 eb bd 80 e7 20 0f 85 52 ff ff ff 90 <0f> 0b 90 e9 49 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90
[  206.059237] RSP: 0018:ffffab0c01a5fdd8 EFLAGS: 00010246
[  206.064464] RAX: 0000000000000000 RBX: 00000000004000c0 RCX: 0000000000000015
[  206.071597] RDX: 0000000000000015 RSI: ffffffff82c373cd RDI: 0000000000452cc0
[  206.078727] RBP: ffffab0c01a5fdf0 R08: 0000000000000040 R09: 0000000000000000
[  206.085862] R10: ffffab0c01a5fdd8 R11: 0000000000000000 R12: 0000000200001e00
[  206.092994] R13: 00000000ffffffff R14: ffffa30980334080 R15: ffffa30980334000
[  206.100128] FS:  00007f4b456f9740(0000) GS:ffffa30aefa00000(0000) knlGS:0000000000000000
[  206.108241] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  206.114011] CR2: 00007f4b457769e0 CR3: 000000010e4bc004 CR4: 00000000003726f0
[  206.121142] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  206.128276] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  206.135408] Call Trace:
[  206.137859]  <TASK>
[  206.139967]  ? show_regs+0x68/0x80
[  206.143399]  ? __warn+0x91/0x140
[  206.146656]  ? __kvmalloc_node_noprof+0xd7/0xe0
[  206.151218]  ? report_bug+0x175/0x1a0
[  206.154910]  ? handle_bug+0x5c/0xa0
[  206.158462]  ? exc_invalid_op+0x1c/0x80
[  206.162327]  ? asm_exc_invalid_op+0x1f/0x30
[  206.166540]  ? __kmalloc_node_noprof+0x39d/0x4c0
[  206.171184]  ? __kvmalloc_node_noprof+0xd7/0xe0
[  206.175743]  ? __kvmalloc_node_noprof+0x53/0xe0
[  206.180336]  alloc_fdtable+0x78/0x120
[  206.184020]  expand_files+0x68/0x2e0
[  206.187624]  ? do_prlimit+0x134/0x210
[  206.191315]  ? trace_preempt_off+0x1e/0x70
[  206.195415]  ? ksys_dup3+0x61/0x100
[  206.198907]  ksys_dup3+0x6c/0x100
[  206.202226]  __x64_sys_dup2+0x32/0xc0
[  206.205945]  x64_sys_call+0x2082/0x20b0
[  206.209810]  do_syscall_64+0xb2/0x1d0
[  206.213476]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  206.218554] RIP: 0033:0x7f4b457f1c17
[  206.222133] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[  206.240907] RSP: 002b:00007ffe34207698 EFLAGS: 00000202 ORIG_RAX: 0000000000000021
[  206.248497] RAX: ffffffffffffffda RBX: 00007ffe34207ef8 RCX: 00007f4b457f1c17
[  206.255632] RDX: 00007ffe342076c0 RSI: 0000000040000038 RDI: 0000000000000002
[  206.262798] RBP: 00007ffe342078c0 R08: 0000000000000064 R09: 0000000000000000
[  206.269949] R10: 00007f4b4570e170 R11: 0000000000000202 R12: 0000000000000000
[  206.277081] R13: 00007ffe34207f08 R14: 00007f4b4592d000 R15: 00005606e27d4dd8
[  206.284213]  </TASK>
[  206.286403] ---[ end trace 0000000000000000 ]---

test log snippet test parser 17

Home

------------[ cut here ]------------
[  206.006290] WARNING: CPU: 0 PID: 1446 at mm/util.c:657 __kvmalloc_node_noprof+0xd7/0xe0
[  206.015684] Modules linked in: x86_pkg_temp_thermal
[  206.020567] CPU: 0 UID: 0 PID: 1446 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[  206.027961] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  206.035353] RIP: 0010:__kvmalloc_node_noprof+0xd7/0xe0
[  206.040491] Code: 00 48 83 c4 18 48 8d 65 e8 5b 41 5c 41 5d 5d c3 cc cc cc cc 48 b9 00 00 00 00 00 20 00 00 eb bd 80 e7 20 0f 85 52 ff ff ff 90 <0f> 0b 90 e9 49 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90
[  206.059237] RSP: 0018:ffffab0c01a5fdd8 EFLAGS: 00010246
[  206.064464] RAX: 0000000000000000 RBX: 00000000004000c0 RCX: 0000000000000015
[  206.071597] RDX: 0000000000000015 RSI: ffffffff82c373cd RDI: 0000000000452cc0
[  206.078727] RBP: ffffab0c01a5fdf0 R08: 0000000000000040 R09: 0000000000000000
[  206.085862] R10: ffffab0c01a5fdd8 R11: 0000000000000000 R12: 0000000200001e00
[  206.092994] R13: 00000000ffffffff R14: ffffa30980334080 R15: ffffa30980334000
[  206.100128] FS:  00007f4b456f9740(0000) GS:ffffa30aefa00000(0000) knlGS:0000000000000000
[  206.108241] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  206.114011] CR2: 00007f4b457769e0 CR3: 000000010e4bc004 CR4: 00000000003726f0
[  206.121142] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  206.128276] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  206.135408] Call Trace:
[  206.137859]  <TASK>
[  206.139967]  ? show_regs+0x68/0x80
[  206.143399]  ? __warn+0x91/0x140
[  206.146656]  ? __kvmalloc_node_noprof+0xd7/0xe0
[  206.151218]  ? report_bug+0x175/0x1a0
[  206.154910]  ? handle_bug+0x5c/0xa0
[  206.158462]  ? exc_invalid_op+0x1c/0x80
[  206.162327]  ? asm_exc_invalid_op+0x1f/0x30
[  206.166540]  ? __kmalloc_node_noprof+0x39d/0x4c0
[  206.171184]  ? __kvmalloc_node_noprof+0xd7/0xe0
[  206.175743]  ? __kvmalloc_node_noprof+0x53/0xe0
[  206.180336]  alloc_fdtable+0x78/0x120
[  206.184020]  expand_files+0x68/0x2e0
[  206.187624]  ? do_prlimit+0x134/0x210
[  206.191315]  ? trace_preempt_off+0x1e/0x70
[  206.195415]  ? ksys_dup3+0x61/0x100
[  206.198907]  ksys_dup3+0x6c/0x100
[  206.202226]  __x64_sys_dup2+0x32/0xc0
[  206.205945]  x64_sys_call+0x2082/0x20b0
[  206.209810]  do_syscall_64+0xb2/0x1d0
[  206.213476]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  206.218554] RIP: 0033:0x7f4b457f1c17
[  206.222133] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[  206.240907] RSP: 002b:00007ffe34207698 EFLAGS: 00000202 ORIG_RAX: 0000000000000021
[  206.248497] RAX: ffffffffffffffda RBX: 00007ffe34207ef8 RCX: 00007f4b457f1c17
[  206.255632] RDX: 00007ffe342076c0 RSI: 0000000040000038 RDI: 0000000000000002
[  206.262798] RBP: 00007ffe342078c0 R08: 0000000000000064 R09: 0000000000000000
[  206.269949] R10: 00007f4b4570e170 R11: 0000000000000202 R12: 0000000000000000
[  206.277081] R13: 00007ffe34207f08 R14: 00007f4b4592d000 R15: 00005606e27d4dd8
[  206.284213]  </TASK>
[  206.286403] ---[ end trace 0000000000000000 ]---

test log snippet test parser 18

Home

------------[ cut here ]------------
[  149.763459] Bad function graph ret_stack pointer: 6
[  149.763463] WARNING: CPU: 1 PID: 86 at kernel/trace/fgraph.c:720 ftrace_return_to_handler+0x1c2/0x1f0
[  149.777601] Modules linked in: x86_pkg_temp_thermal
[  149.782526] CPU: 1 UID: 0 PID: 86 Comm: kworker/u16:7 Tainted: G        W          6.13.0-rc7 #1
[  149.791336] Tainted: [W]=WARN
[  149.794308] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  149.801702] Workqueue:  0x0 (nfsiod)
[  149.805322] RIP: 0010:ftrace_return_to_handler+0x1c2/0x1f0
[  149.810810] Code: ff ff eb ab 90 0f 0b 90 48 c7 c7 90 e2 9c 85 e8 64 61 05 00 90 41 8b b4 24 10 0b 00 00 48 c7 c7 50 34 e2 84 e8 4f 75 e8 ff 90 <0f> 0b 90 90 48 c7 c7 90 e2 9c 85 e8 3e 61 05 00 90 0f 0b 90 49 c7
[  149.829591] RSP: 0018:ffff9a7d4044be30 EFLAGS: 00010282
[  149.834824] RAX: 0000000000000000 RBX: ffff963280160c00 RCX: ffff9635e7a9ca08
[  149.841997] RDX: 0000000000000027 RSI: 0000000000000027 RDI: 0000000000000001
[  149.849145] RBP: ffff9a7d4044be80 R08: 00000000ffffdfff R09: ffff9a7d4044bca8
[  149.856319] R10: 0000000000000001 R11: ffffffff8527bdc0 R12: ffff963281939140
[  149.863461] R13: 61c8864680b583eb R14: ffff963280b03940 R15: ffff963280b03900
[  149.870635] FS:  0000000000000000(0000) GS:ffff9635e7a80000(0000) knlGS:0000000000000000
[  149.878730] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  149.884509] CR2: 00007fff23165108 CR3: 0000000035648004 CR4: 00000000003726f0
[  149.891642] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  149.898810] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  149.905976] Call Trace:
[  149.908431]  <TASK>
[  149.910571]  ? show_regs+0x68/0x80
[  149.914019]  ? __warn+0x91/0x140
[  149.917262]  ? ftrace_return_to_handler+0x1c2/0x1f0
[  149.922174]  ? report_bug+0x175/0x1a0
[  149.925852]  ? handle_bug+0x5c/0xa0
[  149.929386]  ? exc_invalid_op+0x1c/0x80
[  149.933232]  ? asm_exc_invalid_op+0x1f/0x30
[  149.937456]  ? ftrace_return_to_handler+0x1c2/0x1f0
[  149.942355]  return_to_handler+0x1a/0x40
[  149.946321]  ? __pfx_worker_thread+0x10/0x10
[  149.950600]  kthread+0xe8/0x110
[  149.953780]  ? __pfx_kthread+0x10/0x10
[  149.957544]  ret_from_fork+0x3e/0x60
[  149.961165]  ? __pfx_kthread+0x10/0x10
[  149.964929]  ret_from_fork_asm+0x1a/0x30
[  149.968902]  </TASK>
[  149.971104] ---[ end trace 0000000000000000 ]---

test log snippet test parser 19

Home

------------[ cut here ]------------
[  149.763459] Bad function graph ret_stack pointer: 6
[  149.763463] WARNING: CPU: 1 PID: 86 at kernel/trace/fgraph.c:720 ftrace_return_to_handler+0x1c2/0x1f0
[  149.777601] Modules linked in: x86_pkg_temp_thermal
[  149.782526] CPU: 1 UID: 0 PID: 86 Comm: kworker/u16:7 Tainted: G        W          6.13.0-rc7 #1
[  149.791336] Tainted: [W]=WARN
[  149.794308] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  149.801702] Workqueue:  0x0 (nfsiod)
[  149.805322] RIP: 0010:ftrace_return_to_handler+0x1c2/0x1f0
[  149.810810] Code: ff ff eb ab 90 0f 0b 90 48 c7 c7 90 e2 9c 85 e8 64 61 05 00 90 41 8b b4 24 10 0b 00 00 48 c7 c7 50 34 e2 84 e8 4f 75 e8 ff 90 <0f> 0b 90 90 48 c7 c7 90 e2 9c 85 e8 3e 61 05 00 90 0f 0b 90 49 c7
[  149.829591] RSP: 0018:ffff9a7d4044be30 EFLAGS: 00010282
[  149.834824] RAX: 0000000000000000 RBX: ffff963280160c00 RCX: ffff9635e7a9ca08
[  149.841997] RDX: 0000000000000027 RSI: 0000000000000027 RDI: 0000000000000001
[  149.849145] RBP: ffff9a7d4044be80 R08: 00000000ffffdfff R09: ffff9a7d4044bca8
[  149.856319] R10: 0000000000000001 R11: ffffffff8527bdc0 R12: ffff963281939140
[  149.863461] R13: 61c8864680b583eb R14: ffff963280b03940 R15: ffff963280b03900
[  149.870635] FS:  0000000000000000(0000) GS:ffff9635e7a80000(0000) knlGS:0000000000000000
[  149.878730] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  149.884509] CR2: 00007fff23165108 CR3: 0000000035648004 CR4: 00000000003726f0
[  149.891642] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  149.898810] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  149.905976] Call Trace:
[  149.908431]  <TASK>
[  149.910571]  ? show_regs+0x68/0x80
[  149.914019]  ? __warn+0x91/0x140
[  149.917262]  ? ftrace_return_to_handler+0x1c2/0x1f0
[  149.922174]  ? report_bug+0x175/0x1a0
[  149.925852]  ? handle_bug+0x5c/0xa0
[  149.929386]  ? exc_invalid_op+0x1c/0x80
[  149.933232]  ? asm_exc_invalid_op+0x1f/0x30
[  149.937456]  ? ftrace_return_to_handler+0x1c2/0x1f0
[  149.942355]  return_to_handler+0x1a/0x40
[  149.946321]  ? __pfx_worker_thread+0x10/0x10
[  149.950600]  kthread+0xe8/0x110
[  149.953780]  ? __pfx_kthread+0x10/0x10
[  149.957544]  ret_from_fork+0x3e/0x60
[  149.961165]  ? __pfx_kthread+0x10/0x10
[  149.964929]  ret_from_fork_asm+0x1a/0x30
[  149.968902]  </TASK>
[  149.971104] ---[ end trace 0000000000000000 ]---

test log snippet test parser 20

Home

------------[ cut here ]------------
[  150.201010] Please remove unsupported %( in format string
[  150.206416] WARNING: CPU: 0 PID: 86 at lib/vsprintf.c:2704 format_decode+0x47d/0x5c0
[  150.214161] Modules linked in: x86_pkg_temp_thermal
[  150.219039] CPU: 0 UID: 0 PID: 86 Comm: kworker/u16:7 Tainted: G        W          6.13.0-rc7 #1
[  150.227821] Tainted: [W]=WARN
[  150.230792] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  150.238185] Workqueue:  0x0 (nfsiod)
[  150.241765] RIP: 0010:format_decode+0x47d/0x5c0
[  150.246296] Code: ff 41 c6 44 24 05 08 ba 12 00 00 00 e9 6e fc ff ff 48 89 45 e0 c6 05 3d 96 f8 00 01 90 48 c7 c7 70 b1 ef 84 e8 54 76 e8 fe 90 <0f> 0b 90 90 48 8b 45 e0 e9 7c ff ff ff 48 8d 7d e8 e8 bd f0 ff ff
[  150.265040] RSP: 0018:ffff9a7d4044bd88 EFLAGS: 00010082
[  150.270268] RAX: 0000000000000000 RBX: ffffffff833d73c5 RCX: ffff9635e7a1ca08
[  150.277400] RDX: 0000000000000027 RSI: 0000000000000027 RDI: 0000000000000001
[  150.284533] RBP: ffff9a7d4044bda8 R08: 0000000000000433 R09: 0000000000000433
[  150.291664] R10: 0000000000000002 R11: ffffffff8527bdc0 R12: ffff9a7d4044bdd0
[  150.298788] R13: ffffffff8597c060 R14: ffffffff8597bca5 R15: ffffffff833d73c5
[  150.305913] FS:  0000000000000000(0000) GS:ffff9635e7a00000(0000) knlGS:0000000000000000
[  150.314005] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  150.319744] CR2: 00007f3f48caf110 CR3: 0000000035648004 CR4: 00000000003726f0
[  150.326878] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  150.334009] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  150.341142] Call Trace:
[  150.343593]  <TASK>
[  150.345694]  ? show_regs+0x68/0x80
[  150.349099]  ? __warn+0x91/0x140
[  150.352331]  ? format_decode+0x47d/0x5c0
[  150.356257]  ? report_bug+0x175/0x1a0
[  150.359922]  ? preempt_count_sub+0x9/0x80
[  150.363937]  ? handle_bug+0x5c/0xa0
[  150.367453]  ? exc_invalid_op+0x1c/0x80
[  150.371294]  ? asm_exc_invalid_op+0x1f/0x30
[  150.375479]  ? panic+0x45/0x3b0
[  150.378624]  ? panic+0x45/0x3b0
[  150.381774]  ? format_decode+0x47d/0x5c0
[  150.385697]  ? format_decode+0x47c/0x5c0
[  150.389623]  ? panic+0x46/0x3b0
[  150.392768]  ? panic+0x46/0x3b0
[  150.395914]  ? panic+0x45/0x3b0
[  150.399059]  vsnprintf+0x72/0x580
[  150.402380]  ? __pfx_panic+0x10/0x10
[  150.405972]  vscnprintf+0x16/0x40
[  150.409312]  panic+0xe8/0x3b0
[  150.412287]  ? panic+0x9/0x3b0
[  150.415343]  ? cpus_read_unlock+0x35/0x70
[  150.419360]  ? __pfx_worker_thread+0x10/0x10
[  150.423630]  ? kthread+0xe8/0x110
[  150.426972]  ? __pfx_kthread+0x10/0x10
[  150.430754]  ? ret_from_fork+0x3e/0x60
[  150.434507]  ? __pfx_kthread+0x10/0x10
[  150.438260]  ? ret_from_fork_asm+0x1a/0x30
[  150.442361]  </TASK>
[  150.444552] ---[ end trace 0000000000000000 ]---

test log snippet test parser 21

Home

------------[ cut here ]------------
[  150.201010] Please remove unsupported %( in format string
[  150.206416] WARNING: CPU: 0 PID: 86 at lib/vsprintf.c:2704 format_decode+0x47d/0x5c0
[  150.214161] Modules linked in: x86_pkg_temp_thermal
[  150.219039] CPU: 0 UID: 0 PID: 86 Comm: kworker/u16:7 Tainted: G        W          6.13.0-rc7 #1
[  150.227821] Tainted: [W]=WARN
[  150.230792] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  150.238185] Workqueue:  0x0 (nfsiod)
[  150.241765] RIP: 0010:format_decode+0x47d/0x5c0
[  150.246296] Code: ff 41 c6 44 24 05 08 ba 12 00 00 00 e9 6e fc ff ff 48 89 45 e0 c6 05 3d 96 f8 00 01 90 48 c7 c7 70 b1 ef 84 e8 54 76 e8 fe 90 <0f> 0b 90 90 48 8b 45 e0 e9 7c ff ff ff 48 8d 7d e8 e8 bd f0 ff ff
[  150.265040] RSP: 0018:ffff9a7d4044bd88 EFLAGS: 00010082
[  150.270268] RAX: 0000000000000000 RBX: ffffffff833d73c5 RCX: ffff9635e7a1ca08
[  150.277400] RDX: 0000000000000027 RSI: 0000000000000027 RDI: 0000000000000001
[  150.284533] RBP: ffff9a7d4044bda8 R08: 0000000000000433 R09: 0000000000000433
[  150.291664] R10: 0000000000000002 R11: ffffffff8527bdc0 R12: ffff9a7d4044bdd0
[  150.298788] R13: ffffffff8597c060 R14: ffffffff8597bca5 R15: ffffffff833d73c5
[  150.305913] FS:  0000000000000000(0000) GS:ffff9635e7a00000(0000) knlGS:0000000000000000
[  150.314005] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  150.319744] CR2: 00007f3f48caf110 CR3: 0000000035648004 CR4: 00000000003726f0
[  150.326878] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  150.334009] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  150.341142] Call Trace:
[  150.343593]  <TASK>
[  150.345694]  ? show_regs+0x68/0x80
[  150.349099]  ? __warn+0x91/0x140
[  150.352331]  ? format_decode+0x47d/0x5c0
[  150.356257]  ? report_bug+0x175/0x1a0
[  150.359922]  ? preempt_count_sub+0x9/0x80
[  150.363937]  ? handle_bug+0x5c/0xa0
[  150.367453]  ? exc_invalid_op+0x1c/0x80
[  150.371294]  ? asm_exc_invalid_op+0x1f/0x30
[  150.375479]  ? panic+0x45/0x3b0
[  150.378624]  ? panic+0x45/0x3b0
[  150.381774]  ? format_decode+0x47d/0x5c0
[  150.385697]  ? format_decode+0x47c/0x5c0
[  150.389623]  ? panic+0x46/0x3b0
[  150.392768]  ? panic+0x46/0x3b0
[  150.395914]  ? panic+0x45/0x3b0
[  150.399059]  vsnprintf+0x72/0x580
[  150.402380]  ? __pfx_panic+0x10/0x10
[  150.405972]  vscnprintf+0x16/0x40
[  150.409312]  panic+0xe8/0x3b0
[  150.412287]  ? panic+0x9/0x3b0
[  150.415343]  ? cpus_read_unlock+0x35/0x70
[  150.419360]  ? __pfx_worker_thread+0x10/0x10
[  150.423630]  ? kthread+0xe8/0x110
[  150.426972]  ? __pfx_kthread+0x10/0x10
[  150.430754]  ? ret_from_fork+0x3e/0x60
[  150.434507]  ? __pfx_kthread+0x10/0x10
[  150.438260]  ? ret_from_fork_asm+0x1a/0x30
[  150.442361]  </TASK>
[  150.444552] ---[ end trace 0000000000000000 ]---

test log snippet test parser 22

Home

------------[ cut here ]------------
[  148.849710] WARNING: CPU: 3 PID: 86 at kernel/trace/fgraph.c:442 fgraph_retrieve_parent_data+0xb3/0x110
[  148.859127] Modules linked in: x86_pkg_temp_thermal
[  148.864070] CPU: 3 UID: 0 PID: 86 Comm: kworker/u16:7 Not tainted 6.13.0-rc7 #1
[  148.871411] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  148.878842] Workqueue:  0x0 (nfsiod)
[  148.882487] RIP: 0010:fgraph_retrieve_parent_data+0xb3/0x110
[  148.888179] Code: 0c 83 ee 02 83 e0 1f 29 c6 48 63 c6 48 8d 1c c5 00 00 00 00 48 8b 04 c7 48 89 c2 48 c1 ea 0a 83 e2 03 83 fa 02 74 c7 eb b0 90 <0f> 0b 90 eb aa 4d 85 c9 74 2f 48 c1 e8 0c 83 e0 1f 8d 04 c5 08 00
[  148.906986] RSP: 0018:ffff9a7d4044bdb0 EFLAGS: 00010097
[  148.912272] RAX: 0000000000080a06 RBX: 0000000000000005 RCX: 0000000000000006
[  148.919441] RDX: 0000000000000000 RSI: 0000000000000005 RDI: ffff963293d81000
[  148.926605] RBP: ffff9a7d4044bdb8 R08: 0000000000000004 R09: ffff9a7d4044bdd4
[  148.933767] R10: ffff963281939140 R11: 0000000000000206 R12: ffffffff853757e0
[  148.940934] R13: ffff9a7d4044be20 R14: 0000000000000200 R15: ffff963293d81050
[  148.948144] FS:  0000000000000000(0000) GS:ffff9635e7b80000(0000) knlGS:0000000000000000
[  148.956254] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  148.963379] CR2: 00007f3f48f88a3c CR3: 0000000035648005 CR4: 00000000003726f0
[  148.971904] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  148.980445] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  148.988198] Call Trace:
[  148.990679]  <TASK>
[  148.992822]  ? ftrace_stub_direct_tramp+0x20/0x20
[  148.997559]  ? show_regs+0x68/0x80
[  149.001018]  ? ftrace_stub_direct_tramp+0x20/0x20
[  149.005757]  ? __warn+0x91/0x140
[  149.009030]  ? fgraph_retrieve_parent_data+0xb3/0x110
[  149.014135]  ? ftrace_stub_direct_tramp+0x20/0x20
[  149.018877]  ? report_bug+0x175/0x1a0
[  149.022593]  ? handle_bug+0x5c/0xa0
[  149.026132]  ? exc_invalid_op+0x1c/0x80
[  149.031386]  ? asm_exc_invalid_op+0x1f/0x30
[  149.037025]  ? fgraph_retrieve_parent_data+0xb3/0x110
[  149.043445]  profile_graph_return+0x188/0x1d0
[  149.049200]  ? schedule+0x38/0x110
[  149.054028]  ftrace_return_to_handler+0x172/0x1f0
[  149.058775]  ? preempt_count_sub+0x4/0x80
[  149.064202]  return_to_handler+0x1a/0x40
[  149.069517] ------------[ cut here ]------------
[  149.074164] WARNING: CPU: 3 PID: 86 at kernel/trace/fgraph.c:442 ftrace_graph_ret_addr+0x93/0xa0
[  149.084319] Modules linked in: x86_pkg_temp_thermal
[  149.090623] CPU: 3 UID: 0 PID: 86 Comm: kworker/u16:7 Not tainted 6.13.0-rc7 #1
[  149.099341] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  149.108136] Workqueue:  0x0 (nfsiod)
[  149.113110] RIP: 0010:ftrace_graph_ret_addr+0x93/0xa0
[  149.119556] Code: 48 63 d0 48 8d 14 d1 48 85 d2 74 15 48 39 72 10 75 d2 48 81 3a c0 e2 32 83 74 c9 41 89 00 4c 8b 0a 4c 89 c8 c3 cc cc cc cc 90 <0f> 0b 90 4c 89 c8 c3 cc cc cc cc 66 90 90 90 90 90 90 90 90 90 90
[  149.138344] RSP: 0018:ffff9a7d4044bac0 EFLAGS: 00010097
[  149.144970] RAX: 0000000000000005 RBX: ffff9a7d4044be98 RCX: ffff963293d81000
[  149.152152] RDX: 0000000000000206 RSI: ffff9a7d4044bea0 RDI: ffff963281939140
[  149.160660] RBP: ffff9a7d4044bb00 R08: ffff9a7d4044bbb0 R09: ffffffff8332e2c0
[  149.167836] R10: 0000000000000036 R11: ffff963293d810f0 R12: ffff9a7d4044bea8
[  149.176349] R13: ffff9a7d4044be98 R14: ffff9a7d4044bb80 R15: ffff9a7d4044bea0
[  149.183506] FS:  0000000000000000(0000) GS:ffff9635e7b80000(0000) knlGS:0000000000000000
[  149.192977] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  149.198796] CR2: 00007f3f48f88a3c CR3: 0000000035648005 CR4: 00000000003726f0
[  149.207331] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  149.215859] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  149.224390] Call Trace:
[  149.228247]  <TASK>
[  149.231757]  ? ftrace_stub_direct_tramp+0x20/0x20
[  149.237853]  ? show_regs+0x68/0x80
[  149.242659]  ? ftrace_stub_direct_tramp+0x20/0x20
[  149.248756]  ? __warn+0x91/0x140
[  149.252029]  ? ftrace_graph_ret_addr+0x93/0xa0
[  149.257860]  ? ftrace_stub_direct_tramp+0x20/0x20
[  149.262607]  ? report_bug+0x175/0x1a0
[  149.267673]  ? handle_bug+0x5c/0xa0
[  149.271426]  ? exc_invalid_op+0x1c/0x80
[  149.275309]  ? asm_exc_invalid_op+0x1f/0x30
[  149.279556]  ? ftrace_stub_direct_tramp+0x20/0x20
[  149.284317]  ? ftrace_graph_ret_addr+0x93/0xa0
[  149.288797]  ? update_stack_state+0x10e/0x190
[  149.293202]  ? return_to_handler+0x1a/0x40
[  149.297349]  ? ftrace_stub_direct_tramp+0x20/0x20
[  149.302089]  unwind_next_frame+0x82/0x1e0
[  149.306148]  ? ftrace_stub_direct_tramp+0x20/0x20
[  149.310886]  show_trace_log_lvl+0x25b/0x400
[  149.315125]  ? report_bug+0x175/0x1a0
[  149.318870]  ? return_to_handler+0x1a/0x40
[  149.323031]  ? fgraph_retrieve_parent_data+0xb3/0x110
[  149.328127]  ? ftrace_stub_direct_tramp+0x20/0x20
[  149.332865]  show_regs+0x68/0x80
[  149.336140]  ? ftrace_stub_direct_tramp+0x20/0x20
[  149.340879]  __warn+0x91/0x140
[  149.343991]  ? fgraph_retrieve_parent_data+0xb3/0x110
[  149.349096]  ? ftrace_stub_direct_tramp+0x20/0x20
[  149.353836]  report_bug+0x175/0x1a0
[  149.357390]  handle_bug+0x5c/0xa0
[  149.360743]  exc_invalid_op+0x1c/0x80
[  149.364471]  asm_exc_invalid_op+0x1f/0x30
[  149.368519] RIP: 0010:fgraph_retrieve_parent_data+0xb3/0x110
[  149.374214] Code: 0c 83 ee 02 83 e0 1f 29 c6 48 63 c6 48 8d 1c c5 00 00 00 00 48 8b 04 c7 48 89 c2 48 c1 ea 0a 83 e2 03 83 fa 02 74 c7 eb b0 90 <0f> 0b 90 eb aa 4d 85 c9 74 2f 48 c1 e8 0c 83 e0 1f 8d 04 c5 08 00
[  149.393032] RSP: 0018:ffff9a7d4044bdb0 EFLAGS: 00010097
[  149.398306] RAX: 0000000000080a06 RBX: 0000000000000005 RCX: 0000000000000006
[  149.405472] RDX: 0000000000000000 RSI: 0000000000000005 RDI: ffff963293d81000
[  149.412639] RBP: ffff9a7d4044bdb8 R08: 0000000000000004 R09: ffff9a7d4044bdd4
[  149.419807] R10: ffff963281939140 R11: 0000000000000206 R12: ffffffff853757e0
[  149.426994] R13: ffff9a7d4044be20 R14: 0000000000000200 R15: ffff963293d81050
[  149.434228]  profile_graph_return+0x188/0x1d0
[  149.438635]  ? schedule+0x38/0x110
[  149.442088]  ftrace_return_to_handler+0x172/0x1f0
[  149.446831]  ? preempt_count_sub+0x4/0x80
[  149.450899]  return_to_handler+0x1a/0x40
[  149.454881]  ftrace_stub_direct_tramp+0x20/0x20
[  149.459461]  ? __pfx_worker_thread+0x10/0x10
[  149.463778]  kthread+0xe8/0x110
[  149.466992]  ? __pfx_kthread+0x10/0x10
[  149.470804]  ret_from_fork+0x3e/0x60
[  149.474413]  ? __pfx_kthread+0x10/0x10
[  149.478210]  ret_from_fork_asm+0x1a/0x30
[  149.482227]  </TASK>
[  149.484449] ---[ end trace 0000000000000000 ]---

test log snippet test parser 23

Home

------------[ cut here ]------------
[  148.849710] WARNING: CPU: 3 PID: 86 at kernel/trace/fgraph.c:442 fgraph_retrieve_parent_data+0xb3/0x110
[  148.859127] Modules linked in: x86_pkg_temp_thermal
[  148.864070] CPU: 3 UID: 0 PID: 86 Comm: kworker/u16:7 Not tainted 6.13.0-rc7 #1
[  148.871411] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  148.878842] Workqueue:  0x0 (nfsiod)
[  148.882487] RIP: 0010:fgraph_retrieve_parent_data+0xb3/0x110
[  148.888179] Code: 0c 83 ee 02 83 e0 1f 29 c6 48 63 c6 48 8d 1c c5 00 00 00 00 48 8b 04 c7 48 89 c2 48 c1 ea 0a 83 e2 03 83 fa 02 74 c7 eb b0 90 <0f> 0b 90 eb aa 4d 85 c9 74 2f 48 c1 e8 0c 83 e0 1f 8d 04 c5 08 00
[  148.906986] RSP: 0018:ffff9a7d4044bdb0 EFLAGS: 00010097
[  148.912272] RAX: 0000000000080a06 RBX: 0000000000000005 RCX: 0000000000000006
[  148.919441] RDX: 0000000000000000 RSI: 0000000000000005 RDI: ffff963293d81000
[  148.926605] RBP: ffff9a7d4044bdb8 R08: 0000000000000004 R09: ffff9a7d4044bdd4
[  148.933767] R10: ffff963281939140 R11: 0000000000000206 R12: ffffffff853757e0
[  148.940934] R13: ffff9a7d4044be20 R14: 0000000000000200 R15: ffff963293d81050
[  148.948144] FS:  0000000000000000(0000) GS:ffff9635e7b80000(0000) knlGS:0000000000000000
[  148.956254] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  148.963379] CR2: 00007f3f48f88a3c CR3: 0000000035648005 CR4: 00000000003726f0
[  148.971904] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  148.980445] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  148.988198] Call Trace:
[  148.990679]  <TASK>
[  148.992822]  ? ftrace_stub_direct_tramp+0x20/0x20
[  148.997559]  ? show_regs+0x68/0x80
[  149.001018]  ? ftrace_stub_direct_tramp+0x20/0x20
[  149.005757]  ? __warn+0x91/0x140
[  149.009030]  ? fgraph_retrieve_parent_data+0xb3/0x110
[  149.014135]  ? ftrace_stub_direct_tramp+0x20/0x20
[  149.018877]  ? report_bug+0x175/0x1a0
[  149.022593]  ? handle_bug+0x5c/0xa0
[  149.026132]  ? exc_invalid_op+0x1c/0x80
[  149.031386]  ? asm_exc_invalid_op+0x1f/0x30
[  149.037025]  ? fgraph_retrieve_parent_data+0xb3/0x110
[  149.043445]  profile_graph_return+0x188/0x1d0
[  149.049200]  ? schedule+0x38/0x110
[  149.054028]  ftrace_return_to_handler+0x172/0x1f0
[  149.058775]  ? preempt_count_sub+0x4/0x80
[  149.064202]  return_to_handler+0x1a/0x40
[  149.069517] ------------[ cut here ]------------
[  149.074164] WARNING: CPU: 3 PID: 86 at kernel/trace/fgraph.c:442 ftrace_graph_ret_addr+0x93/0xa0
[  149.084319] Modules linked in: x86_pkg_temp_thermal
[  149.090623] CPU: 3 UID: 0 PID: 86 Comm: kworker/u16:7 Not tainted 6.13.0-rc7 #1
[  149.099341] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  149.108136] Workqueue:  0x0 (nfsiod)
[  149.113110] RIP: 0010:ftrace_graph_ret_addr+0x93/0xa0
[  149.119556] Code: 48 63 d0 48 8d 14 d1 48 85 d2 74 15 48 39 72 10 75 d2 48 81 3a c0 e2 32 83 74 c9 41 89 00 4c 8b 0a 4c 89 c8 c3 cc cc cc cc 90 <0f> 0b 90 4c 89 c8 c3 cc cc cc cc 66 90 90 90 90 90 90 90 90 90 90
[  149.138344] RSP: 0018:ffff9a7d4044bac0 EFLAGS: 00010097
[  149.144970] RAX: 0000000000000005 RBX: ffff9a7d4044be98 RCX: ffff963293d81000
[  149.152152] RDX: 0000000000000206 RSI: ffff9a7d4044bea0 RDI: ffff963281939140
[  149.160660] RBP: ffff9a7d4044bb00 R08: ffff9a7d4044bbb0 R09: ffffffff8332e2c0
[  149.167836] R10: 0000000000000036 R11: ffff963293d810f0 R12: ffff9a7d4044bea8
[  149.176349] R13: ffff9a7d4044be98 R14: ffff9a7d4044bb80 R15: ffff9a7d4044bea0
[  149.183506] FS:  0000000000000000(0000) GS:ffff9635e7b80000(0000) knlGS:0000000000000000
[  149.192977] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  149.198796] CR2: 00007f3f48f88a3c CR3: 0000000035648005 CR4: 00000000003726f0
[  149.207331] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  149.215859] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  149.224390] Call Trace:
[  149.228247]  <TASK>
[  149.231757]  ? ftrace_stub_direct_tramp+0x20/0x20
[  149.237853]  ? show_regs+0x68/0x80
[  149.242659]  ? ftrace_stub_direct_tramp+0x20/0x20
[  149.248756]  ? __warn+0x91/0x140
[  149.252029]  ? ftrace_graph_ret_addr+0x93/0xa0
[  149.257860]  ? ftrace_stub_direct_tramp+0x20/0x20
[  149.262607]  ? report_bug+0x175/0x1a0
[  149.267673]  ? handle_bug+0x5c/0xa0
[  149.271426]  ? exc_invalid_op+0x1c/0x80
[  149.275309]  ? asm_exc_invalid_op+0x1f/0x30
[  149.279556]  ? ftrace_stub_direct_tramp+0x20/0x20
[  149.284317]  ? ftrace_graph_ret_addr+0x93/0xa0
[  149.288797]  ? update_stack_state+0x10e/0x190
[  149.293202]  ? return_to_handler+0x1a/0x40
[  149.297349]  ? ftrace_stub_direct_tramp+0x20/0x20
[  149.302089]  unwind_next_frame+0x82/0x1e0
[  149.306148]  ? ftrace_stub_direct_tramp+0x20/0x20
[  149.310886]  show_trace_log_lvl+0x25b/0x400
[  149.315125]  ? report_bug+0x175/0x1a0
[  149.318870]  ? return_to_handler+0x1a/0x40
[  149.323031]  ? fgraph_retrieve_parent_data+0xb3/0x110
[  149.328127]  ? ftrace_stub_direct_tramp+0x20/0x20
[  149.332865]  show_regs+0x68/0x80
[  149.336140]  ? ftrace_stub_direct_tramp+0x20/0x20
[  149.340879]  __warn+0x91/0x140
[  149.343991]  ? fgraph_retrieve_parent_data+0xb3/0x110
[  149.349096]  ? ftrace_stub_direct_tramp+0x20/0x20
[  149.353836]  report_bug+0x175/0x1a0
[  149.357390]  handle_bug+0x5c/0xa0
[  149.360743]  exc_invalid_op+0x1c/0x80
[  149.364471]  asm_exc_invalid_op+0x1f/0x30
[  149.368519] RIP: 0010:fgraph_retrieve_parent_data+0xb3/0x110
[  149.374214] Code: 0c 83 ee 02 83 e0 1f 29 c6 48 63 c6 48 8d 1c c5 00 00 00 00 48 8b 04 c7 48 89 c2 48 c1 ea 0a 83 e2 03 83 fa 02 74 c7 eb b0 90 <0f> 0b 90 eb aa 4d 85 c9 74 2f 48 c1 e8 0c 83 e0 1f 8d 04 c5 08 00
[  149.393032] RSP: 0018:ffff9a7d4044bdb0 EFLAGS: 00010097
[  149.398306] RAX: 0000000000080a06 RBX: 0000000000000005 RCX: 0000000000000006
[  149.405472] RDX: 0000000000000000 RSI: 0000000000000005 RDI: ffff963293d81000
[  149.412639] RBP: ffff9a7d4044bdb8 R08: 0000000000000004 R09: ffff9a7d4044bdd4
[  149.419807] R10: ffff963281939140 R11: 0000000000000206 R12: ffffffff853757e0
[  149.426994] R13: ffff9a7d4044be20 R14: 0000000000000200 R15: ffff963293d81050
[  149.434228]  profile_graph_return+0x188/0x1d0
[  149.438635]  ? schedule+0x38/0x110
[  149.442088]  ftrace_return_to_handler+0x172/0x1f0
[  149.446831]  ? preempt_count_sub+0x4/0x80
[  149.450899]  return_to_handler+0x1a/0x40
[  149.454881]  ftrace_stub_direct_tramp+0x20/0x20
[  149.459461]  ? __pfx_worker_thread+0x10/0x10
[  149.463778]  kthread+0xe8/0x110
[  149.466992]  ? __pfx_kthread+0x10/0x10
[  149.470804]  ret_from_fork+0x3e/0x60
[  149.474413]  ? __pfx_kthread+0x10/0x10
[  149.478210]  ret_from_fork_asm+0x1a/0x30
[  149.482227]  </TASK>
[  149.484449] ---[ end trace 0000000000000000 ]---

test log snippet test parser 24

Home

------------[ cut here ]------------
[  149.980450] WARNING: CPU: 0 PID: 86 at kernel/trace/fgraph.c:816 ftrace_return_to_handler+0x1d3/0x1f0
[  149.989685] Modules linked in: x86_pkg_temp_thermal
[  149.994610] CPU: 0 UID: 0 PID: 86 Comm: kworker/u16:7 Tainted: G        W          6.13.0-rc7 #1
[  150.003409] Tainted: [W]=WARN
[  150.006423] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  150.013825] Workqueue:  0x0 (nfsiod)
[  150.017448] RIP: 0010:ftrace_return_to_handler+0x1d3/0x1f0
[  150.022978] Code: 61 05 00 90 41 8b b4 24 10 0b 00 00 48 c7 c7 50 34 e2 84 e8 4f 75 e8 ff 90 0f 0b 90 90 48 c7 c7 90 e2 9c 85 e8 3e 61 05 00 90 <0f> 0b 90 49 c7 c5 80 73 3d 83 e9 27 ff ff ff e8 19 2c 01 01 66 0f
[  150.041769] RSP: 0018:ffff9a7d4044be30 EFLAGS: 00010286
[  150.047038] RAX: 0000000080000000 RBX: ffff963280160c00 RCX: 0000000000000000
[  150.054214] RDX: ffff9635e7a00000 RSI: ffffffff833d8ef5 RDI: ffffffff833d8ef5
[  150.061386] RBP: ffff9a7d4044be80 R08: 0000000000000000 R09: 0000000000000001
[  150.068563] R10: 0000000000000018 R11: 0000000000000000 R12: ffff963281939140
[  150.075717] R13: 61c8864680b583eb R14: ffff963280b03940 R15: ffff963280b03900
[  150.082890] FS:  0000000000000000(0000) GS:ffff9635e7a00000(0000) knlGS:0000000000000000
[  150.091019] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  150.096806] CR2: 00007f3f48caf110 CR3: 0000000035648004 CR4: 00000000003726f0
[  150.103996] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  150.111141] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  150.118318] Call Trace:
[  150.120804]  <TASK>
[  150.122946]  ? show_regs+0x68/0x80
[  150.126396]  ? __warn+0x91/0x140
[  150.129671]  ? ftrace_return_to_handler+0x1d3/0x1f0
[  150.134568]  ? report_bug+0x175/0x1a0
[  150.138277]  ? handle_bug+0x5c/0xa0
[  150.141788]  ? exc_invalid_op+0x1c/0x80
[  150.145671]  ? asm_exc_invalid_op+0x1f/0x30
[  150.149877]  ? cpus_read_unlock+0x35/0x70
[  150.153930]  ? cpus_read_unlock+0x35/0x70
[  150.157996]  ? ftrace_return_to_handler+0x1d3/0x1f0
[  150.162919]  return_to_handler+0x1a/0x40
[  150.166861]  ? __pfx_worker_thread+0x10/0x10
[  150.171172]  kthread+0xe8/0x110
[  150.174339]  ? __pfx_kthread+0x10/0x10
[  150.178136]  ret_from_fork+0x3e/0x60
[  150.181729]  ? __pfx_kthread+0x10/0x10
[  150.185528]  ret_from_fork_asm+0x1a/0x30
[  150.189475]  </TASK>
[  150.191701] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[  149.528357] WARNING: CPU: 1 PID: 86 at kernel/trace/fgraph.c:442 ftrace_return_to_handler+0x19d/0x1f0
[  149.537669] Modules linked in: x86_pkg_temp_thermal
[  149.542682] CPU: 1 UID: 0 PID: 86 Comm: kworker/u16:7 Tainted: G        W          6.13.0-rc7 #1
[  149.551573] Tainted: [W]=WARN
[  149.554645] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  149.562148] Workqueue:  0x0 (nfsiod)
[  149.565858] RIP: 0010:ftrace_return_to_handler+0x19d/0x1f0
[  149.571444] Code: 1f 00 41 83 c6 01 49 63 c6 48 83 f8 3f 0f 87 72 ff ff ff 48 83 c8 ff 44 89 f1 48 d3 e0 48 23 45 b0 0f 84 5e ff ff ff eb ab 90 <0f> 0b 90 48 c7 c7 90 e2 9c 85 e8 64 61 05 00 90 41 8b b4 24 10 0b
[  149.590338] RSP: 0018:ffff9a7d4044be30 EFLAGS: 00010297
[  149.595675] RAX: 0000000000000005 RBX: ffff963280160c00 RCX: ffff963293d81000
[  149.602951] RDX: 0000000000000206 RSI: ffffffff8354f862 RDI: ffff9a7d4044be90
[  149.610165] RBP: ffff9a7d4044be80 R08: 0000000000000004 R09: ffff9a7d4044bdd4
[  149.617381] R10: ffff963281939140 R11: 0000000000000206 R12: ffff963281939140
[  149.624593] R13: 61c8864680b583eb R14: ffff963280b03940 R15: ffff963280b03900
[  149.631832] FS:  0000000000000000(0000) GS:ffff9635e7a80000(0000) knlGS:0000000000000000
[  149.640016] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  149.645874] CR2: 00007fff23165108 CR3: 0000000035648004 CR4: 00000000003726f0
[  149.653091] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  149.660327] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  149.667561] Call Trace:
[  149.670120]  <TASK>
[  149.672332]  ? ftrace_stub_direct_tramp+0x20/0x20
[  149.677153]  ? show_regs+0x68/0x80
[  149.680676]  ? ftrace_stub_direct_tramp+0x20/0x20
[  149.685520]  ? __warn+0x91/0x140
[  149.688867]  ? ftrace_return_to_handler+0x19d/0x1f0
[  149.693833]  ? ftrace_stub_direct_tramp+0x20/0x20
[  149.698626]  ? report_bug+0x175/0x1a0
[  149.702430]  ? handle_bug+0x5c/0xa0
[  149.706028]  ? exc_invalid_op+0x1c/0x80
[  149.709994]  ? asm_exc_invalid_op+0x1f/0x30
[  149.714350]  ? ftrace_return_to_handler+0x172/0x1f0
[  149.719337]  ? ftrace_return_to_handler+0x19d/0x1f0
[  149.724381]  return_to_handler+0x1a/0x40
[  149.728398]  ? __pfx_worker_thread+0x10/0x10
[  149.732767]  kthread+0xe8/0x110
[  149.736119]  ? __pfx_kthread+0x10/0x10
[  149.739991]  ret_from_fork+0x3e/0x60
[  149.743674]  ? __pfx_kthread+0x10/0x10
[  149.747548]  ret_from_fork_asm+0x1a/0x30
[  149.751692]  </TASK>
[  149.753981] ---[ end trace 0000000000000000 ]---

test log snippet test parser 25

Home

------------[ cut here ]------------
[  149.528357] WARNING: CPU: 1 PID: 86 at kernel/trace/fgraph.c:442 ftrace_return_to_handler+0x19d/0x1f0
[  149.537669] Modules linked in: x86_pkg_temp_thermal
[  149.542682] CPU: 1 UID: 0 PID: 86 Comm: kworker/u16:7 Tainted: G        W          6.13.0-rc7 #1
[  149.551573] Tainted: [W]=WARN
[  149.554645] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  149.562148] Workqueue:  0x0 (nfsiod)
[  149.565858] RIP: 0010:ftrace_return_to_handler+0x19d/0x1f0
[  149.571444] Code: 1f 00 41 83 c6 01 49 63 c6 48 83 f8 3f 0f 87 72 ff ff ff 48 83 c8 ff 44 89 f1 48 d3 e0 48 23 45 b0 0f 84 5e ff ff ff eb ab 90 <0f> 0b 90 48 c7 c7 90 e2 9c 85 e8 64 61 05 00 90 41 8b b4 24 10 0b
[  149.590338] RSP: 0018:ffff9a7d4044be30 EFLAGS: 00010297
[  149.595675] RAX: 0000000000000005 RBX: ffff963280160c00 RCX: ffff963293d81000
[  149.602951] RDX: 0000000000000206 RSI: ffffffff8354f862 RDI: ffff9a7d4044be90
[  149.610165] RBP: ffff9a7d4044be80 R08: 0000000000000004 R09: ffff9a7d4044bdd4
[  149.617381] R10: ffff963281939140 R11: 0000000000000206 R12: ffff963281939140
[  149.624593] R13: 61c8864680b583eb R14: ffff963280b03940 R15: ffff963280b03900
[  149.631832] FS:  0000000000000000(0000) GS:ffff9635e7a80000(0000) knlGS:0000000000000000
[  149.640016] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  149.645874] CR2: 00007fff23165108 CR3: 0000000035648004 CR4: 00000000003726f0
[  149.653091] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  149.660327] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  149.667561] Call Trace:
[  149.670120]  <TASK>
[  149.672332]  ? ftrace_stub_direct_tramp+0x20/0x20
[  149.677153]  ? show_regs+0x68/0x80
[  149.680676]  ? ftrace_stub_direct_tramp+0x20/0x20
[  149.685520]  ? __warn+0x91/0x140
[  149.688867]  ? ftrace_return_to_handler+0x19d/0x1f0
[  149.693833]  ? ftrace_stub_direct_tramp+0x20/0x20
[  149.698626]  ? report_bug+0x175/0x1a0
[  149.702430]  ? handle_bug+0x5c/0xa0
[  149.706028]  ? exc_invalid_op+0x1c/0x80
[  149.709994]  ? asm_exc_invalid_op+0x1f/0x30
[  149.714350]  ? ftrace_return_to_handler+0x172/0x1f0
[  149.719337]  ? ftrace_return_to_handler+0x19d/0x1f0
[  149.724381]  return_to_handler+0x1a/0x40
[  149.728398]  ? __pfx_worker_thread+0x10/0x10
[  149.732767]  kthread+0xe8/0x110
[  149.736119]  ? __pfx_kthread+0x10/0x10
[  149.739991]  ret_from_fork+0x3e/0x60
[  149.743674]  ? __pfx_kthread+0x10/0x10
[  149.747548]  ret_from_fork_asm+0x1a/0x30
[  149.751692]  </TASK>
[  149.753981] ---[ end trace 0000000000000000 ]---

test log snippet test parser 26

Home

------------[ cut here ]------------
[  149.980450] WARNING: CPU: 0 PID: 86 at kernel/trace/fgraph.c:816 ftrace_return_to_handler+0x1d3/0x1f0
[  149.989685] Modules linked in: x86_pkg_temp_thermal
[  149.994610] CPU: 0 UID: 0 PID: 86 Comm: kworker/u16:7 Tainted: G        W          6.13.0-rc7 #1
[  150.003409] Tainted: [W]=WARN
[  150.006423] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  150.013825] Workqueue:  0x0 (nfsiod)
[  150.017448] RIP: 0010:ftrace_return_to_handler+0x1d3/0x1f0
[  150.022978] Code: 61 05 00 90 41 8b b4 24 10 0b 00 00 48 c7 c7 50 34 e2 84 e8 4f 75 e8 ff 90 0f 0b 90 90 48 c7 c7 90 e2 9c 85 e8 3e 61 05 00 90 <0f> 0b 90 49 c7 c5 80 73 3d 83 e9 27 ff ff ff e8 19 2c 01 01 66 0f
[  150.041769] RSP: 0018:ffff9a7d4044be30 EFLAGS: 00010286
[  150.047038] RAX: 0000000080000000 RBX: ffff963280160c00 RCX: 0000000000000000
[  150.054214] RDX: ffff9635e7a00000 RSI: ffffffff833d8ef5 RDI: ffffffff833d8ef5
[  150.061386] RBP: ffff9a7d4044be80 R08: 0000000000000000 R09: 0000000000000001
[  150.068563] R10: 0000000000000018 R11: 0000000000000000 R12: ffff963281939140
[  150.075717] R13: 61c8864680b583eb R14: ffff963280b03940 R15: ffff963280b03900
[  150.082890] FS:  0000000000000000(0000) GS:ffff9635e7a00000(0000) knlGS:0000000000000000
[  150.091019] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  150.096806] CR2: 00007f3f48caf110 CR3: 0000000035648004 CR4: 00000000003726f0
[  150.103996] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  150.111141] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  150.118318] Call Trace:
[  150.120804]  <TASK>
[  150.122946]  ? show_regs+0x68/0x80
[  150.126396]  ? __warn+0x91/0x140
[  150.129671]  ? ftrace_return_to_handler+0x1d3/0x1f0
[  150.134568]  ? report_bug+0x175/0x1a0
[  150.138277]  ? handle_bug+0x5c/0xa0
[  150.141788]  ? exc_invalid_op+0x1c/0x80
[  150.145671]  ? asm_exc_invalid_op+0x1f/0x30
[  150.149877]  ? cpus_read_unlock+0x35/0x70
[  150.153930]  ? cpus_read_unlock+0x35/0x70
[  150.157996]  ? ftrace_return_to_handler+0x1d3/0x1f0
[  150.162919]  return_to_handler+0x1a/0x40
[  150.166861]  ? __pfx_worker_thread+0x10/0x10
[  150.171172]  kthread+0xe8/0x110
[  150.174339]  ? __pfx_kthread+0x10/0x10
[  150.178136]  ret_from_fork+0x3e/0x60
[  150.181729]  ? __pfx_kthread+0x10/0x10
[  150.185528]  ret_from_fork_asm+0x1a/0x30
[  150.189475]  </TASK>
[  150.191701] ---[ end trace 0000000000000000 ]---

test log snippet test parser 27

Home

[  150.449170] Kernel panic - not syncing: ���w\=UH��AVAUATI��SH��P�VGZHL$8
DHt$(HT$0LD$@LL$HeH�
[  150.459077] CPU: 0 UID: 0 PID: 86 Comm: kworker/u16:7 Tainted: G        W          6.13.0-rc7 #1
[  150.467856] Tainted: [W]=WARN
[  150.470826] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  150.478210] Workqueue:  0x0 (nfsiod)
[  150.481790] Call Trace:
[  150.484233]  <TASK>
[  150.486331]  dump_stack_lvl+0x29/0xb0
[  150.490012]  dump_stack+0x14/0x20
[  150.493334]  panic+0x349/0x3b0
[  150.496395]  ? panic+0x9/0x3b0
[  150.499454]  ? cpus_read_unlock+0x35/0x70
[  150.503469]  ? __pfx_worker_thread+0x10/0x10
[  150.507746]  ? kthread+0xe8/0x110
[  150.511066]  ? __pfx_kthread+0x10/0x10
[  150.514820]  ? ret_from_fork+0x3e/0x60
[  150.518571]  ? __pfx_kthread+0x10/0x10
[  150.522325]  ? ret_from_fork_asm+0x1a/0x30
[  150.526427]  </TASK>
[  150.528657] Kernel Offset: 0x2200000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)
[  150.539355] ---[ end Kernel panic - not syncing: ���w\=UH��AVAUATI��SH��P�VGZH�L$8�
�DH�t$(H�T$0L�D$@L�L$HeH� ]---

test log snippet test parser 28

Home

[  150.449170] Kernel panic - not syncing: ���w\=UH��AVAUATI��SH��P�VGZHL$8
DHt$(HT$0LD$@LL$HeH�
[  150.459077] CPU: 0 UID: 0 PID: 86 Comm: kworker/u16:7 Tainted: G        W          6.13.0-rc7 #1
[  150.467856] Tainted: [W]=WARN
[  150.470826] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  150.478210] Workqueue:  0x0 (nfsiod)
[  150.481790] Call Trace:
[  150.484233]  <TASK>
[  150.486331]  dump_stack_lvl+0x29/0xb0
[  150.490012]  dump_stack+0x14/0x20
[  150.493334]  panic+0x349/0x3b0
[  150.496395]  ? panic+0x9/0x3b0
[  150.499454]  ? cpus_read_unlock+0x35/0x70
[  150.503469]  ? __pfx_worker_thread+0x10/0x10
[  150.507746]  ? kthread+0xe8/0x110
[  150.511066]  ? __pfx_kthread+0x10/0x10
[  150.514820]  ? ret_from_fork+0x3e/0x60
[  150.518571]  ? __pfx_kthread+0x10/0x10
[  150.522325]  ? ret_from_fork_asm+0x1a/0x30
[  150.526427]  </TASK>
[  150.528657] Kernel Offset: 0x2200000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)
[  150.539355] ---[ end Kernel panic - not syncing: ���w\=UH��AVAUATI��SH��P�VGZH�L$8�
�DH�t$(H�T$0L�D$@L�L$HeH� ]---