Home
Home
Home
fs_fill fs_fill
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 30914ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file0
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 34709ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 14362ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file0
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 18306ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 9978ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file0
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 13232ms
Home
epoll_wait04 epoll_wait04
epoll_wait04.c:37: TFAIL: epoll_wait() waited for 1002us with a timeout equal to zero
Home
Home
starvation starvation
starvation.c:98: TINFO: Setting affinity to CPU 0
starvation.c:52: TINFO: CPU did 120000000 loops in 263316us
starvation.c:148: TFAIL: Scheduller starvation reproduced.
Home
seccomp_seccomp_benchmark_native_1_bitmap pass
seccomp_seccomp_benchmark_native_1_filter pass
seccomp_seccomp_benchmark_per-filter_last_2_diff_per-filter_filters_4 fail
seccomp_seccomp_benchmark_1_bitmapped_2_bitmapped pass
seccomp_seccomp_benchmark_entry_1_bitmapped pass
seccomp_seccomp_benchmark_entry_2_bitmapped fail
seccomp_seccomp_benchmark_native_entry_per_filter_4_4_filters_total fail
seccomp_seccomp_benchmark fail
Home
Home
timers_posix_timers_ITIMER_VIRTUAL pass
timers_posix_timers_ITIMER_PROF pass
timers_posix_timers_ITIMER_REAL pass
timers_posix_timers_timer_create_per_CLOCK_THREAD_CPUTIME_ID pass
timers_posix_timers_timer_create_per_CLOCK_PROCESS_CPUTIME_ID pass
timers_posix_timers_check_signal_distribution fail
timers_posix_timers_check_sig_ign_SIGEV_SIGNAL pass
timers_posix_timers_check_sig_ign_SIGEV_THREAD_ID pass
timers_posix_timers_check_rearm pass
timers_posix_timers_check_delete pass
timers_posix_timers_check_sigev_none_CLOCK_MONOTONIC pass
timers_posix_timers_check_sigev_none_CLOCK_PROCESS_CPUTIME_ID pass
timers_posix_timers_check_gettime_CLOCK_MONOTONIC pass
timers_posix_timers_check_gettime_CLOCK_PROCESS_CPUTIME_ID pass
timers_posix_timers_check_gettime_CLOCK_THREAD_CPUTIME_ID pass
timers_posix_timers_check_overrun_CLOCK_MONOTONIC pass
timers_posix_timers_check_overrun_CLOCK_PROCESS_CPUTIME_ID pass
timers_posix_timers_check_overrun_CLOCK_THREAD_CPUTIME_ID pass
timers_posix_timers fail
Home
timers_posix_timers_check_signal_distribution fail
Home
Home
cgroup_test_freezer_test_cgfreezer_simple pass
cgroup_test_freezer_test_cgfreezer_tree pass
cgroup_test_freezer_test_cgfreezer_forkbomb pass
cgroup_test_freezer_test_cgfreezer_mkdir pass
cgroup_test_freezer_test_cgfreezer_rm[ 100.216278] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=net:msg_zerocopy.sh RESULT=skip>
cgroup_test_freezer_test_cgfreezer_migrate pass
cgroup_test_freezer_test_cgfreezer_ptrace fail
cgroup_test_freezer_test_cgfreezer_stopped pass
cgroup_test_freezer_test_cgfreezer_ptraced pass
cgroup_test_freezer_test_cgfreezer_vfork pass
Home
cgroup_test_freezer_test_cgfreezer_ptrace fail
cgroup_test_freezer_test_cgfreezer_ptraced pass
Home
cgroup_test_memcontrol_test_memcg_min fail
Home
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc'
s390x-linux-gnu-objcopy: stSOg5th: warning: allocated section `.got.plt' not in segment
Home
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc'
s390x-linux-gnu-objcopy: stbjlYmK: warning: allocated section `.got.plt' not in segment
Home
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc'
s390x-linux-gnu-objcopy: st6dG2T0: warning: allocated section `.got.plt' not in segment
Home
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc'
s390x-linux-gnu-objcopy: stOMG84U: warning: allocated section `.got.plt' not in segment
Home
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'HOSTCC=sccache clang' 'CC=sccache clang' LLVM=1 LLVM_IAS=1 kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/x86_64-linux-gnu-ld: warning: /tmp/test_encl_bootstrap-2d5cb0.o: missing .note.GNU-stack section implies executable stack
/usr/bin/x86_64-linux-gnu-ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker
Home
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1 kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/x86_64-linux-gnu-ld: warning: /tmp/test_encl_bootstrap-f354b8.o: missing .note.GNU-stack section implies executable stack
/usr/bin/x86_64-linux-gnu-ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker
Home
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/ld: warning: /tmp/cceEq0R8.o: missing .note.GNU-stack section implies executable stack
/usr/bin/ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker
Home
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/ld: warning: /tmp/ccKMDOYT.o: missing .note.GNU-stack section implies executable stack
/usr/bin/ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker
Home
[ 53.700260] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[ 53.701203] Modules linked in:
[ 53.704941] CPU: 1 UID: 0 PID: 388 Comm: kunit_try_catch Tainted: G N 6.13.0-rc7 #1
[ 53.706248] Tainted: [N]=TEST
[ 53.706723] Hardware name: linux,dummy-virt (DT)
[ 53.707949] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[ 53.708786] pc : kunit_test_null_dereference+0x68/0x160
[ 53.711563] lr : kunit_generic_run_threadfn_adapter+0x80/0xec
[ 53.712182] sp : ffff800080f27db0
[ 53.712715] x29: ffff800080f27e10 x28: 0000000000000000 x27: 0000000000000000
[ 53.714122] x26: 0000000000000000 x25: fff00000c804a500 x24: fff00000c7f77700
[ 53.715136] x23: fff00000c7f73900 x22: ffff946e9a7cc2c4 x21: fff00000c7f73908
[ 53.716380] x20: 1ffff000101e4fb6 x19: ffff800080087a10 x18: 00000000defbfbf9
[ 53.717370] x17: 000000002b845636 x16: 0000000000000100 x15: fff00000ff80ce40
[ 53.718846] x14: 1ffe00001b5300c3 x13: 00000000f1f1f1f1 x12: fffd800019009592
[ 53.719865] x11: 1ffe000019009591 x10: fffd800019009591 x9 : dfff800000000000
[ 53.720967] x8 : fff00000c804ac8c x7 : 0000000000000001 x6 : 0000000041b58ab3
[ 53.722190] x5 : ffff7000101e4fb6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[ 53.723144] x2 : dfff800000000000 x1 : fff00000c804a500 x0 : ffff800080087a10
[ 53.724394] Call trace:
[ 53.725112] kunit_test_null_dereference+0x68/0x160 (P)
[ 53.726547] kunit_generic_run_threadfn_adapter+0x80/0xec
[ 53.727158] kthread+0x2b4/0x338
[ 53.727689] ret_from_fork+0x10/0x20
[ 53.729028] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042)
[ 53.730470] ---[ end trace 0000000000000000 ]---
Home
[ 139.935399] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[ 139.936393] Modules linked in:
[ 139.937232] CPU: 0 UID: 0 PID: 621 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 139.938174] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 139.938741] Hardware name: linux,dummy-virt (DT)
[ 139.939518] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[ 139.940422] pc : kunit_test_null_dereference+0x70/0x170
[ 139.941120] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[ 139.941723] sp : ffff8000832b7dc0
[ 139.942293] x29: ffff8000832b7e20 x28: 0000000000000000 x27: 0000000000000000
[ 139.943416] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c5d4c300
[ 139.944372] x23: ffff93ead3fc71b0 x22: ffff93ead3fcfd70 x21: fff00000c5d4c308
[ 139.945376] x20: 1ffff00010656fb8 x19: ffff8000800879f0 x18: 00000000fa01d7a2
[ 139.946345] x17: 0000000000000001 x16: fff00000da4e3ca0 x15: fff00000ff615b48
[ 139.947341] x14: 1ffe00001b49c778 x13: fff00000da4e3c98 x12: fffd8000191948b2
[ 139.948356] x11: 1ffe0000191948b1 x10: fffd8000191948b1 x9 : ffff93ead3fc7238
[ 139.949430] x8 : ffff8000832b7cb8 x7 : 0000000000000001 x6 : 0000000041b58ab3
[ 139.950494] x5 : ffff700010656fb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[ 139.951489] x2 : dfff800000000000 x1 : fff00000c8ca3cc0 x0 : ffff8000800879f0
[ 139.952558] Call trace:
[ 139.952980] kunit_test_null_dereference+0x70/0x170 (P)
[ 139.953665] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 139.954364] kthread+0x24c/0x2d0
[ 139.954918] ret_from_fork+0x10/0x20
[ 139.956042] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042)
[ 139.957157] ---[ end trace 0000000000000000 ]---
Home
[ 139.935399] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[ 139.936393] Modules linked in:
[ 139.937232] CPU: 0 UID: 0 PID: 621 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 139.938174] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 139.938741] Hardware name: linux,dummy-virt (DT)
[ 139.939518] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[ 139.940422] pc : kunit_test_null_dereference+0x70/0x170
[ 139.941120] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[ 139.941723] sp : ffff8000832b7dc0
[ 139.942293] x29: ffff8000832b7e20 x28: 0000000000000000 x27: 0000000000000000
[ 139.943416] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c5d4c300
[ 139.944372] x23: ffff93ead3fc71b0 x22: ffff93ead3fcfd70 x21: fff00000c5d4c308
[ 139.945376] x20: 1ffff00010656fb8 x19: ffff8000800879f0 x18: 00000000fa01d7a2
[ 139.946345] x17: 0000000000000001 x16: fff00000da4e3ca0 x15: fff00000ff615b48
[ 139.947341] x14: 1ffe00001b49c778 x13: fff00000da4e3c98 x12: fffd8000191948b2
[ 139.948356] x11: 1ffe0000191948b1 x10: fffd8000191948b1 x9 : ffff93ead3fc7238
[ 139.949430] x8 : ffff8000832b7cb8 x7 : 0000000000000001 x6 : 0000000041b58ab3
[ 139.950494] x5 : ffff700010656fb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[ 139.951489] x2 : dfff800000000000 x1 : fff00000c8ca3cc0 x0 : ffff8000800879f0
[ 139.952558] Call trace:
[ 139.952980] kunit_test_null_dereference+0x70/0x170 (P)
[ 139.953665] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 139.954364] kthread+0x24c/0x2d0
[ 139.954918] ret_from_fork+0x10/0x20
[ 139.956042] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042)
[ 139.957157] ---[ end trace 0000000000000000 ]---
Home
[ 30.846063] ==================================================================
[ 30.846626] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[ 30.847403] Free of addr fff00000c5b12ba0 by task kunit_try_catch/181
[ 30.848092]
[ 30.848536] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.850115] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.850696] Hardware name: linux,dummy-virt (DT)
[ 30.851206] Call trace:
[ 30.851629] show_stack+0x20/0x38 (C)
[ 30.852273] dump_stack_lvl+0x8c/0xd0
[ 30.852784] print_report+0x118/0x5e0
[ 30.853397] kasan_report_invalid_free+0xb0/0xd8
[ 30.854395] check_slab_allocation+0xd4/0x108
[ 30.854902] __kasan_slab_pre_free+0x2c/0x48
[ 30.855508] kfree+0xe8/0x3c8
[ 30.856131] kfree_sensitive+0x3c/0xb0
[ 30.857272] kmalloc_double_kzfree+0x168/0x308
[ 30.857924] kunit_try_run_case+0x14c/0x3d0
[ 30.858590] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.858997] kthread+0x24c/0x2d0
[ 30.859717] ret_from_fork+0x10/0x20
[ 30.860382]
[ 30.860686] Allocated by task 181:
[ 30.861212] kasan_save_stack+0x3c/0x68
[ 30.861698] kasan_save_track+0x20/0x40
[ 30.862577] kasan_save_alloc_info+0x40/0x58
[ 30.863218] __kasan_kmalloc+0xd4/0xd8
[ 30.864016] __kmalloc_cache_noprof+0x15c/0x3c0
[ 30.864956] kmalloc_double_kzfree+0xb8/0x308
[ 30.865831] kunit_try_run_case+0x14c/0x3d0
[ 30.866455] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.867119] kthread+0x24c/0x2d0
[ 30.867593] ret_from_fork+0x10/0x20
[ 30.868124]
[ 30.868913] Freed by task 181:
[ 30.869412] kasan_save_stack+0x3c/0x68
[ 30.869960] kasan_save_track+0x20/0x40
[ 30.870538] kasan_save_free_info+0x4c/0x78
[ 30.871169] __kasan_slab_free+0x6c/0x98
[ 30.871750] kfree+0x114/0x3c8
[ 30.872947] kfree_sensitive+0x80/0xb0
[ 30.873379] kmalloc_double_kzfree+0x11c/0x308
[ 30.874146] kunit_try_run_case+0x14c/0x3d0
[ 30.874825] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.875554] kthread+0x24c/0x2d0
[ 30.876131] ret_from_fork+0x10/0x20
[ 30.877067]
[ 30.877388] The buggy address belongs to the object at fff00000c5b12ba0
[ 30.877388] which belongs to the cache kmalloc-16 of size 16
[ 30.878442] The buggy address is located 0 bytes inside of
[ 30.878442] 16-byte region [fff00000c5b12ba0, fff00000c5b12bb0)
[ 30.879802]
[ 30.880191] The buggy address belongs to the physical page:
[ 30.881318] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b12
[ 30.882244] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 30.883086] page_type: f5(slab)
[ 30.883684] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 30.885028] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 30.885913] page dumped because: kasan: bad access detected
[ 30.886513]
[ 30.886887] Memory state around the buggy address:
[ 30.887488] fff00000c5b12a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 30.888298] fff00000c5b12b00: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 30.889232] >fff00000c5b12b80: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[ 30.890574] ^
[ 30.891341] fff00000c5b12c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.892344] fff00000c5b12c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.893451] ==================================================================
Home
[ 29.146351] ==================================================================
[ 29.147606] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[ 29.148767] Read of size 1 at addr fff00000c5e9df7f by task kunit_try_catch/127
[ 29.149763]
[ 29.150187] CPU: 0 UID: 0 PID: 127 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.151267] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.151765] Hardware name: linux,dummy-virt (DT)
[ 29.152369] Call trace:
[ 29.152786] show_stack+0x20/0x38 (C)
[ 29.153381] dump_stack_lvl+0x8c/0xd0
[ 29.154234] print_report+0x118/0x5e0
[ 29.154734] kasan_report+0xc8/0x118
[ 29.155298] __asan_report_load1_noabort+0x20/0x30
[ 29.155913] kmalloc_oob_left+0x2ec/0x320
[ 29.156816] kunit_try_run_case+0x14c/0x3d0
[ 29.157418] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.158040] kthread+0x24c/0x2d0
[ 29.158588] ret_from_fork+0x10/0x20
[ 29.159166]
[ 29.159509] Allocated by task 28:
[ 29.160036] kasan_save_stack+0x3c/0x68
[ 29.160937] kasan_save_track+0x20/0x40
[ 29.161470] kasan_save_alloc_info+0x40/0x58
[ 29.162074] __kasan_kmalloc+0xd4/0xd8
[ 29.162566] __kmalloc_node_track_caller_noprof+0x184/0x4b8
[ 29.163274] kstrdup+0x54/0xc8
[ 29.163728] devtmpfs_work_loop+0x384/0x590
[ 29.164695] devtmpfsd+0x50/0x58
[ 29.165552] kthread+0x24c/0x2d0
[ 29.166315] ret_from_fork+0x10/0x20
[ 29.166934]
[ 29.167338] Freed by task 28:
[ 29.167998] kasan_save_stack+0x3c/0x68
[ 29.168807] kasan_save_track+0x20/0x40
[ 29.169525] kasan_save_free_info+0x4c/0x78
[ 29.169923] __kasan_slab_free+0x6c/0x98
[ 29.170509] kfree+0x114/0x3c8
[ 29.171041] devtmpfs_work_loop+0x498/0x590
[ 29.171652] devtmpfsd+0x50/0x58
[ 29.172216] kthread+0x24c/0x2d0
[ 29.172751] ret_from_fork+0x10/0x20
[ 29.173704]
[ 29.174070] The buggy address belongs to the object at fff00000c5e9df60
[ 29.174070] which belongs to the cache kmalloc-16 of size 16
[ 29.175300] The buggy address is located 15 bytes to the right of
[ 29.175300] allocated 16-byte region [fff00000c5e9df60, fff00000c5e9df70)
[ 29.176796]
[ 29.177163] The buggy address belongs to the physical page:
[ 29.177800] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9d
[ 29.178654] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 29.179391] page_type: f5(slab)
[ 29.179933] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 29.181125] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 29.181921] page dumped because: kasan: bad access detected
[ 29.182463]
[ 29.182802] Memory state around the buggy address:
[ 29.183425] fff00000c5e9de00: 00 01 fc fc fa fb fc fc 00 04 fc fc 00 04 fc fc
[ 29.184153] fff00000c5e9de80: fa fb fc fc 00 02 fc fc 00 02 fc fc 00 00 fc fc
[ 29.185342] >fff00000c5e9df00: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc
[ 29.186071] ^
[ 29.186825] fff00000c5e9df80: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.188026] fff00000c5e9e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 29.188869] ==================================================================
Home
[ 33.189681] ==================================================================
[ 33.190845] BUG: KASAN: slab-out-of-bounds in memchr+0x78/0x88
[ 33.191454] Read of size 1 at addr fff00000c5ced818 by task kunit_try_catch/244
[ 33.192616]
[ 33.192961] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 33.194169] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 33.194896] Hardware name: linux,dummy-virt (DT)
[ 33.195615] Call trace:
[ 33.196208] show_stack+0x20/0x38 (C)
[ 33.197146] dump_stack_lvl+0x8c/0xd0
[ 33.198198] print_report+0x118/0x5e0
[ 33.199079] kasan_report+0xc8/0x118
[ 33.199761] __asan_report_load1_noabort+0x20/0x30
[ 33.200506] memchr+0x78/0x88
[ 33.201066] kasan_memchr+0x148/0x2d8
[ 33.201598] kunit_try_run_case+0x14c/0x3d0
[ 33.202340] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 33.203171] kthread+0x24c/0x2d0
[ 33.203799] ret_from_fork+0x10/0x20
[ 33.204556]
[ 33.204824] Allocated by task 244:
[ 33.205330] kasan_save_stack+0x3c/0x68
[ 33.205960] kasan_save_track+0x20/0x40
[ 33.207102] kasan_save_alloc_info+0x40/0x58
[ 33.207849] __kasan_kmalloc+0xd4/0xd8
[ 33.208918] __kmalloc_cache_noprof+0x15c/0x3c0
[ 33.209645] kasan_memchr+0xb0/0x2d8
[ 33.210352] kunit_try_run_case+0x14c/0x3d0
[ 33.210945] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 33.211869] kthread+0x24c/0x2d0
[ 33.212562] ret_from_fork+0x10/0x20
[ 33.213071]
[ 33.213388] The buggy address belongs to the object at fff00000c5ced800
[ 33.213388] which belongs to the cache kmalloc-32 of size 32
[ 33.215476] The buggy address is located 0 bytes to the right of
[ 33.215476] allocated 24-byte region [fff00000c5ced800, fff00000c5ced818)
[ 33.216726]
[ 33.217095] The buggy address belongs to the physical page:
[ 33.217756] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ced
[ 33.219300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 33.220029] page_type: f5(slab)
[ 33.220939] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[ 33.221754] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 33.222350] page dumped because: kasan: bad access detected
[ 33.223364]
[ 33.223966] Memory state around the buggy address:
[ 33.224857] fff00000c5ced700: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[ 33.225449] fff00000c5ced780: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[ 33.226364] >fff00000c5ced800: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 33.227159] ^
[ 33.227738] fff00000c5ced880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 33.228692] fff00000c5ced900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 33.229797] ==================================================================
Home
[ 33.240126] ==================================================================
[ 33.241122] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[ 33.241789] Read of size 1 at addr fff00000c5ced8d8 by task kunit_try_catch/246
[ 33.242502]
[ 33.242899] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 33.243915] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 33.244527] Hardware name: linux,dummy-virt (DT)
[ 33.245484] Call trace:
[ 33.245920] show_stack+0x20/0x38 (C)
[ 33.246453] dump_stack_lvl+0x8c/0xd0
[ 33.247073] print_report+0x118/0x5e0
[ 33.247633] kasan_report+0xc8/0x118
[ 33.248932] __asan_report_load1_noabort+0x20/0x30
[ 33.249576] memcmp+0x198/0x1d8
[ 33.250340] kasan_memcmp+0x16c/0x300
[ 33.251062] kunit_try_run_case+0x14c/0x3d0
[ 33.251646] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 33.252292] kthread+0x24c/0x2d0
[ 33.252863] ret_from_fork+0x10/0x20
[ 33.253492]
[ 33.253844] Allocated by task 246:
[ 33.254759] kasan_save_stack+0x3c/0x68
[ 33.255381] kasan_save_track+0x20/0x40
[ 33.255955] kasan_save_alloc_info+0x40/0x58
[ 33.256947] __kasan_kmalloc+0xd4/0xd8
[ 33.257497] __kmalloc_cache_noprof+0x15c/0x3c0
[ 33.258366] kasan_memcmp+0xbc/0x300
[ 33.258928] kunit_try_run_case+0x14c/0x3d0
[ 33.259455] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 33.260081] kthread+0x24c/0x2d0
[ 33.260580] ret_from_fork+0x10/0x20
[ 33.261766]
[ 33.262128] The buggy address belongs to the object at fff00000c5ced8c0
[ 33.262128] which belongs to the cache kmalloc-32 of size 32
[ 33.263623] The buggy address is located 0 bytes to the right of
[ 33.263623] allocated 24-byte region [fff00000c5ced8c0, fff00000c5ced8d8)
[ 33.265094]
[ 33.265739] The buggy address belongs to the physical page:
[ 33.266436] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ced
[ 33.267578] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 33.268503] page_type: f5(slab)
[ 33.269318] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[ 33.270274] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 33.271166] page dumped because: kasan: bad access detected
[ 33.271830]
[ 33.272200] Memory state around the buggy address:
[ 33.272929] fff00000c5ced780: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[ 33.273826] fff00000c5ced800: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[ 33.274475] >fff00000c5ced880: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[ 33.275129] ^
[ 33.275965] fff00000c5ced900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 33.276822] fff00000c5ced980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 33.277760] ==================================================================
Home
[ 30.797039] ==================================================================
[ 30.798375] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[ 30.799202] Read of size 1 at addr fff00000c5b12ba0 by task kunit_try_catch/181
[ 30.799959]
[ 30.800383] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.801368] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.801851] Hardware name: linux,dummy-virt (DT)
[ 30.802449] Call trace:
[ 30.803013] show_stack+0x20/0x38 (C)
[ 30.803624] dump_stack_lvl+0x8c/0xd0
[ 30.804988] print_report+0x118/0x5e0
[ 30.805469] kasan_report+0xc8/0x118
[ 30.806246] __kasan_check_byte+0x54/0x70
[ 30.806718] kfree_sensitive+0x30/0xb0
[ 30.807253] kmalloc_double_kzfree+0x168/0x308
[ 30.808804] kunit_try_run_case+0x14c/0x3d0
[ 30.809345] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.810187] kthread+0x24c/0x2d0
[ 30.810868] ret_from_fork+0x10/0x20
[ 30.811648]
[ 30.812155] Allocated by task 181:
[ 30.813108] kasan_save_stack+0x3c/0x68
[ 30.814046] kasan_save_track+0x20/0x40
[ 30.814562] kasan_save_alloc_info+0x40/0x58
[ 30.814971] __kasan_kmalloc+0xd4/0xd8
[ 30.815854] __kmalloc_cache_noprof+0x15c/0x3c0
[ 30.816600] kmalloc_double_kzfree+0xb8/0x308
[ 30.817259] kunit_try_run_case+0x14c/0x3d0
[ 30.817937] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.818651] kthread+0x24c/0x2d0
[ 30.818940] ret_from_fork+0x10/0x20
[ 30.819368]
[ 30.819692] Freed by task 181:
[ 30.820236] kasan_save_stack+0x3c/0x68
[ 30.821312] kasan_save_track+0x20/0x40
[ 30.821724] kasan_save_free_info+0x4c/0x78
[ 30.822193] __kasan_slab_free+0x6c/0x98
[ 30.822816] kfree+0x114/0x3c8
[ 30.823378] kfree_sensitive+0x80/0xb0
[ 30.824003] kmalloc_double_kzfree+0x11c/0x308
[ 30.825098] kunit_try_run_case+0x14c/0x3d0
[ 30.825690] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.826350] kthread+0x24c/0x2d0
[ 30.826845] ret_from_fork+0x10/0x20
[ 30.827362]
[ 30.827658] The buggy address belongs to the object at fff00000c5b12ba0
[ 30.827658] which belongs to the cache kmalloc-16 of size 16
[ 30.829313] The buggy address is located 0 bytes inside of
[ 30.829313] freed 16-byte region [fff00000c5b12ba0, fff00000c5b12bb0)
[ 30.830565]
[ 30.830981] The buggy address belongs to the physical page:
[ 30.831702] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b12
[ 30.833132] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 30.833902] page_type: f5(slab)
[ 30.834496] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 30.835413] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 30.836315] page dumped because: kasan: bad access detected
[ 30.837383]
[ 30.837654] Memory state around the buggy address:
[ 30.838472] fff00000c5b12a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 30.839488] fff00000c5b12b00: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 30.840486] >fff00000c5b12b80: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[ 30.841393] ^
[ 30.842055] fff00000c5b12c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.843044] fff00000c5b12c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.843922] ==================================================================
Home
[ 30.621750] ==================================================================
[ 30.622893] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[ 30.623597] Read of size 1 at addr fff00000c5b12b88 by task kunit_try_catch/173
[ 30.624226]
[ 30.624643] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.626004] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.626470] Hardware name: linux,dummy-virt (DT)
[ 30.627695] Call trace:
[ 30.628104] show_stack+0x20/0x38 (C)
[ 30.629141] dump_stack_lvl+0x8c/0xd0
[ 30.629696] print_report+0x118/0x5e0
[ 30.630257] kasan_report+0xc8/0x118
[ 30.630840] __asan_report_load1_noabort+0x20/0x30
[ 30.631477] kmalloc_uaf+0x300/0x338
[ 30.632005] kunit_try_run_case+0x14c/0x3d0
[ 30.633044] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.633660] kthread+0x24c/0x2d0
[ 30.634238] ret_from_fork+0x10/0x20
[ 30.634870]
[ 30.635206] Allocated by task 173:
[ 30.635623] kasan_save_stack+0x3c/0x68
[ 30.636492] kasan_save_track+0x20/0x40
[ 30.637023] kasan_save_alloc_info+0x40/0x58
[ 30.637634] __kasan_kmalloc+0xd4/0xd8
[ 30.638191] __kmalloc_cache_noprof+0x15c/0x3c0
[ 30.638763] kmalloc_uaf+0xb8/0x338
[ 30.639518] kunit_try_run_case+0x14c/0x3d0
[ 30.640051] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.641147] kthread+0x24c/0x2d0
[ 30.641595] ret_from_fork+0x10/0x20
[ 30.642159]
[ 30.642468] Freed by task 173:
[ 30.642945] kasan_save_stack+0x3c/0x68
[ 30.643483] kasan_save_track+0x20/0x40
[ 30.644057] kasan_save_free_info+0x4c/0x78
[ 30.645181] __kasan_slab_free+0x6c/0x98
[ 30.645752] kfree+0x114/0x3c8
[ 30.646228] kmalloc_uaf+0x11c/0x338
[ 30.646727] kunit_try_run_case+0x14c/0x3d0
[ 30.647263] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.647948] kthread+0x24c/0x2d0
[ 30.648838] ret_from_fork+0x10/0x20
[ 30.649316]
[ 30.649663] The buggy address belongs to the object at fff00000c5b12b80
[ 30.649663] which belongs to the cache kmalloc-16 of size 16
[ 30.650838] The buggy address is located 8 bytes inside of
[ 30.650838] freed 16-byte region [fff00000c5b12b80, fff00000c5b12b90)
[ 30.651979]
[ 30.652773] The buggy address belongs to the physical page:
[ 30.653426] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b12
[ 30.654249] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 30.655100] page_type: f5(slab)
[ 30.655565] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 30.656788] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 30.657720] page dumped because: kasan: bad access detected
[ 30.658310]
[ 30.658652] Memory state around the buggy address:
[ 30.659240] fff00000c5b12a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 30.659981] fff00000c5b12b00: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 30.660971] >fff00000c5b12b80: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.661814] ^
[ 30.662430] fff00000c5b12c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.663376] fff00000c5b12c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.664179] ==================================================================
Home
[ 31.200798] ==================================================================
[ 31.201547] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[ 31.201922] Read of size 4 at addr fff00000c5cfc580 by task swapper/0/0
[ 31.202399]
[ 31.202703] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B N 6.13.0-rc7 #1
[ 31.203699] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 31.204338] Hardware name: linux,dummy-virt (DT)
[ 31.205055] Call trace:
[ 31.205405] show_stack+0x20/0x38 (C)
[ 31.206043] dump_stack_lvl+0x8c/0xd0
[ 31.206756] print_report+0x118/0x5e0
[ 31.208029] kasan_report+0xc8/0x118
[ 31.209068] __asan_report_load4_noabort+0x20/0x30
[ 31.209696] rcu_uaf_reclaim+0x64/0x70
[ 31.210349] rcu_core+0x9f4/0x1e20
[ 31.211011] rcu_core_si+0x18/0x30
[ 31.211668] handle_softirqs+0x374/0xb20
[ 31.212219] __do_softirq+0x1c/0x28
[ 31.213214] ____do_softirq+0x18/0x30
[ 31.213720] call_on_irq_stack+0x24/0x58
[ 31.214263] do_softirq_own_stack+0x24/0x38
[ 31.214752] __irq_exit_rcu+0x1fc/0x318
[ 31.215387] irq_exit_rcu+0x1c/0x80
[ 31.215972] el1_interrupt+0x38/0x58
[ 31.216568] el1h_64_irq_handler+0x18/0x28
[ 31.217555] el1h_64_irq+0x6c/0x70
[ 31.218076] arch_local_irq_enable+0x4/0x8 (P)
[ 31.218746] do_idle+0x384/0x4e8
[ 31.219296] cpu_startup_entry+0x64/0x80
[ 31.219834] rest_init+0x160/0x188
[ 31.220367] start_kernel+0x308/0x3d0
[ 31.220955] __primary_switched+0x8c/0xa0
[ 31.221786]
[ 31.222132] Allocated by task 187:
[ 31.222694] kasan_save_stack+0x3c/0x68
[ 31.223236] kasan_save_track+0x20/0x40
[ 31.223727] kasan_save_alloc_info+0x40/0x58
[ 31.224461] __kasan_kmalloc+0xd4/0xd8
[ 31.224961] __kmalloc_cache_noprof+0x15c/0x3c0
[ 31.226016] rcu_uaf+0xb0/0x2d0
[ 31.226472] kunit_try_run_case+0x14c/0x3d0
[ 31.227144] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 31.227830] kthread+0x24c/0x2d0
[ 31.228417] ret_from_fork+0x10/0x20
[ 31.228898]
[ 31.229240] Freed by task 0:
[ 31.229713] kasan_save_stack+0x3c/0x68
[ 31.230741] kasan_save_track+0x20/0x40
[ 31.231462] kasan_save_free_info+0x4c/0x78
[ 31.231980] __kasan_slab_free+0x6c/0x98
[ 31.232643] kfree+0x114/0x3c8
[ 31.232952] rcu_uaf_reclaim+0x28/0x70
[ 31.233424] rcu_core+0x9f4/0x1e20
[ 31.234007] rcu_core_si+0x18/0x30
[ 31.234528] handle_softirqs+0x374/0xb20
[ 31.235144] __do_softirq+0x1c/0x28
[ 31.235696]
[ 31.236110] Last potentially related work creation:
[ 31.237227] kasan_save_stack+0x3c/0x68
[ 31.237824] __kasan_record_aux_stack+0xbc/0xe8
[ 31.238566] kasan_record_aux_stack_noalloc+0x14/0x20
[ 31.239261] __call_rcu_common.constprop.0+0x74/0xa10
[ 31.239789] call_rcu+0x18/0x30
[ 31.240368] rcu_uaf+0x14c/0x2d0
[ 31.240906] kunit_try_run_case+0x14c/0x3d0
[ 31.241484] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 31.242054] kthread+0x24c/0x2d0
[ 31.242991] ret_from_fork+0x10/0x20
[ 31.243681]
[ 31.244814] The buggy address belongs to the object at fff00000c5cfc580
[ 31.244814] which belongs to the cache kmalloc-32 of size 32
[ 31.246084] The buggy address is located 0 bytes inside of
[ 31.246084] freed 32-byte region [fff00000c5cfc580, fff00000c5cfc5a0)
[ 31.247680]
[ 31.248354] The buggy address belongs to the physical page:
[ 31.249017] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cfc
[ 31.250121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 31.250993] page_type: f5(slab)
[ 31.251429] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[ 31.252664] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 31.253528] page dumped because: kasan: bad access detected
[ 31.254324]
[ 31.254855] Memory state around the buggy address:
[ 31.255626] fff00000c5cfc480: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[ 31.256960] fff00000c5cfc500: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[ 31.257953] >fff00000c5cfc580: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[ 31.258651] ^
[ 31.259194] fff00000c5cfc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 31.259989] fff00000c5cfc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 31.261165] ==================================================================
Home
[ 38.965728] ==================================================================
[ 38.966534] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[ 38.966534]
[ 38.967458] Invalid free of 0x00000000d00fb05d (in kfence-#147):
[ 38.968773] test_double_free+0x1bc/0x238
[ 38.969418] kunit_try_run_case+0x14c/0x3d0
[ 38.970174] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.970859] kthread+0x24c/0x2d0
[ 38.971412] ret_from_fork+0x10/0x20
[ 38.971937]
[ 38.972266] kfence-#147: 0x00000000d00fb05d-0x0000000002a2c999, size=32, cache=kmalloc-32
[ 38.972266]
[ 38.973664] allocated by task 292 on cpu 1 at 38.965297s (0.008355s ago):
[ 38.974796] test_alloc+0x298/0x620
[ 38.975457] test_double_free+0xd4/0x238
[ 38.976170] kunit_try_run_case+0x14c/0x3d0
[ 38.976900] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.977714] kthread+0x24c/0x2d0
[ 38.978381] ret_from_fork+0x10/0x20
[ 38.979073]
[ 38.979544] freed by task 292 on cpu 1 at 38.965417s (0.014120s ago):
[ 38.980504] test_double_free+0x1ac/0x238
[ 38.981066] kunit_try_run_case+0x14c/0x3d0
[ 38.981610] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.982504] kthread+0x24c/0x2d0
[ 38.982761] ret_from_fork+0x10/0x20
[ 38.983125]
[ 38.983533] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 38.984652] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 38.985304] Hardware name: linux,dummy-virt (DT)
[ 38.985992] ==================================================================
Home
[ 39.069495] ==================================================================
[ 39.070206] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[ 39.070206]
[ 39.072116] Invalid free of 0x00000000e846ef3b (in kfence-#148):
[ 39.072856] test_double_free+0x100/0x238
[ 39.073615] kunit_try_run_case+0x14c/0x3d0
[ 39.074362] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.075043] kthread+0x24c/0x2d0
[ 39.075510] ret_from_fork+0x10/0x20
[ 39.076005]
[ 39.076317] kfence-#148: 0x00000000e846ef3b-0x00000000bc54309f, size=32, cache=test
[ 39.076317]
[ 39.077745] allocated by task 294 on cpu 0 at 39.069118s (0.008615s ago):
[ 39.078600] test_alloc+0x22c/0x620
[ 39.079202] test_double_free+0xd4/0x238
[ 39.079770] kunit_try_run_case+0x14c/0x3d0
[ 39.080392] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.081118] kthread+0x24c/0x2d0
[ 39.081611] ret_from_fork+0x10/0x20
[ 39.082216]
[ 39.082590] freed by task 294 on cpu 0 at 39.069220s (0.013359s ago):
[ 39.083575] test_double_free+0xf0/0x238
[ 39.084175] kunit_try_run_case+0x14c/0x3d0
[ 39.084870] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.085601] kthread+0x24c/0x2d0
[ 39.086160] ret_from_fork+0x10/0x20
[ 39.086670]
[ 39.087119] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 39.088218] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 39.088781] Hardware name: linux,dummy-virt (DT)
[ 39.089379] ==================================================================
Home
[ 39.173484] ==================================================================
[ 39.174376] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[ 39.174376]
[ 39.175376] Invalid free of 0x00000000ed3175fe (in kfence-#149):
[ 39.176611] test_invalid_addr_free+0x1ac/0x238
[ 39.177245] kunit_try_run_case+0x14c/0x3d0
[ 39.177887] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.178490] kthread+0x24c/0x2d0
[ 39.179062] ret_from_fork+0x10/0x20
[ 39.179569]
[ 39.179940] kfence-#149: 0x000000002a713913-0x00000000597adfdb, size=32, cache=kmalloc-32
[ 39.179940]
[ 39.180897] allocated by task 296 on cpu 1 at 39.173141s (0.007725s ago):
[ 39.181765] test_alloc+0x298/0x620
[ 39.182353] test_invalid_addr_free+0xd4/0x238
[ 39.182896] kunit_try_run_case+0x14c/0x3d0
[ 39.183531] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.184254] kthread+0x24c/0x2d0
[ 39.184836] ret_from_fork+0x10/0x20
[ 39.185412]
[ 39.185754] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 39.186686] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 39.187290] Hardware name: linux,dummy-virt (DT)
[ 39.187870] ==================================================================
Home
[ 39.277354] ==================================================================
[ 39.278150] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[ 39.278150]
[ 39.279216] Invalid free of 0x00000000ed11a38a (in kfence-#150):
[ 39.280095] test_invalid_addr_free+0xec/0x238
[ 39.280731] kunit_try_run_case+0x14c/0x3d0
[ 39.281191] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.281962] kthread+0x24c/0x2d0
[ 39.282500] ret_from_fork+0x10/0x20
[ 39.283040]
[ 39.283438] kfence-#150: 0x00000000cdf67ac5-0x0000000002ccbfcd, size=32, cache=test
[ 39.283438]
[ 39.284470] allocated by task 298 on cpu 1 at 39.277152s (0.007306s ago):
[ 39.285437] test_alloc+0x22c/0x620
[ 39.286041] test_invalid_addr_free+0xd4/0x238
[ 39.286651] kunit_try_run_case+0x14c/0x3d0
[ 39.287237] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.287856] kthread+0x24c/0x2d0
[ 39.288337] ret_from_fork+0x10/0x20
[ 39.288852]
[ 39.289325] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 39.290403] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 39.291026] Hardware name: linux,dummy-virt (DT)
[ 39.291640] ==================================================================
Home
[ 45.858158] ==================================================================
[ 45.859246] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[ 45.859246]
[ 45.860356] Invalid read at 0x00000000f84bf4de:
[ 45.861545] test_invalid_access+0xdc/0x1f0
[ 45.862250] kunit_try_run_case+0x14c/0x3d0
[ 45.862803] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 45.863625] kthread+0x24c/0x2d0
[ 45.865787] ret_from_fork+0x10/0x20
[ 45.866427]
[ 45.866799] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 45.867599] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 45.868602] Hardware name: linux,dummy-virt (DT)
[ 45.869342] ==================================================================
Home
[ 30.197817] ==================================================================
[ 30.199888] BUG: KFENCE: memory corruption in kmalloc_oob_16+0x1f0/0x3f8
[ 30.199888]
[ 30.200983] Corrupted memory at 0x00000000e8783f90 [ ! ! ! . . . . . . . . . . . . . ] (in kfence-#97):
[ 30.205497] kmalloc_oob_16+0x1f0/0x3f8
[ 30.206044] kunit_try_run_case+0x14c/0x3d0
[ 30.206559] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.207283] kthread+0x24c/0x2d0
[ 30.207812] ret_from_fork+0x10/0x20
[ 30.208527]
[ 30.209430] kfence-#97: 0x00000000ebf9ed67-0x00000000ed9eee02, size=13, cache=kmalloc-16
[ 30.209430]
[ 30.210688] allocated by task 155 on cpu 1 at 30.194405s (0.016140s ago):
[ 30.211706] kmalloc_oob_16+0xb4/0x3f8
[ 30.212604] kunit_try_run_case+0x14c/0x3d0
[ 30.213260] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.213780] kthread+0x24c/0x2d0
[ 30.214609] ret_from_fork+0x10/0x20
[ 30.215425]
[ 30.216024] freed by task 155 on cpu 1 at 30.196929s (0.018893s ago):
[ 30.217313] kmalloc_oob_16+0x1f0/0x3f8
[ 30.217824] kunit_try_run_case+0x14c/0x3d0
[ 30.218580] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.219420] kthread+0x24c/0x2d0
[ 30.219661] ret_from_fork+0x10/0x20
[ 30.219975]
[ 30.220906] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.221689] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.222141] Hardware name: linux,dummy-virt (DT)
[ 30.222761] ==================================================================
Home
[ 30.197817] ==================================================================
[ 30.199888] BUG: KFENCE: memory corruption in kmalloc_oob_16+0x1f0/0x3f8
[ 30.199888]
[ 30.200983] Corrupted memory at 0x00000000e8783f90 [ ! ! ! . . . . . . . . . . . . . ] (in kfence-#97):
[ 30.205497] kmalloc_oob_16+0x1f0/0x3f8
[ 30.206044] kunit_try_run_case+0x14c/0x3d0
[ 30.206559] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.207283] kthread+0x24c/0x2d0
[ 30.207812] ret_from_fork+0x10/0x20
[ 30.208527]
[ 30.209430] kfence-#97: 0x00000000ebf9ed67-0x00000000ed9eee02, size=13, cache=kmalloc-16
[ 30.209430]
[ 30.210688] allocated by task 155 on cpu 1 at 30.194405s (0.016140s ago):
[ 30.211706] kmalloc_oob_16+0xb4/0x3f8
[ 30.212604] kunit_try_run_case+0x14c/0x3d0
[ 30.213260] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.213780] kthread+0x24c/0x2d0
[ 30.214609] ret_from_fork+0x10/0x20
[ 30.215425]
[ 30.216024] freed by task 155 on cpu 1 at 30.196929s (0.018893s ago):
[ 30.217313] kmalloc_oob_16+0x1f0/0x3f8
[ 30.217824] kunit_try_run_case+0x14c/0x3d0
[ 30.218580] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.219420] kthread+0x24c/0x2d0
[ 30.219661] ret_from_fork+0x10/0x20
[ 30.219975]
[ 30.220906] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.221689] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.222141] Hardware name: linux,dummy-virt (DT)
[ 30.222761] ==================================================================
Home
[ 39.901411] ==================================================================
[ 39.902227] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[ 39.902227]
[ 39.903032] Corrupted memory at 0x000000002c213188 [ ! . . . . . . . . . . . . . . . ] (in kfence-#156):
[ 39.905460] test_corruption+0x120/0x378
[ 39.906013] kunit_try_run_case+0x14c/0x3d0
[ 39.906681] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.907372] kthread+0x24c/0x2d0
[ 39.907945] ret_from_fork+0x10/0x20
[ 39.908512]
[ 39.908885] kfence-#156: 0x00000000147e4f6f-0x00000000dfeae84b, size=32, cache=test
[ 39.908885]
[ 39.909837] allocated by task 302 on cpu 0 at 39.901147s (0.008679s ago):
[ 39.910698] test_alloc+0x22c/0x620
[ 39.911295] test_corruption+0xdc/0x378
[ 39.911865] kunit_try_run_case+0x14c/0x3d0
[ 39.912540] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.913215] kthread+0x24c/0x2d0
[ 39.913764] ret_from_fork+0x10/0x20
[ 39.914263]
[ 39.914649] freed by task 302 on cpu 0 at 39.901237s (0.013401s ago):
[ 39.915431] test_corruption+0x120/0x378
[ 39.916078] kunit_try_run_case+0x14c/0x3d0
[ 39.916707] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.917430] kthread+0x24c/0x2d0
[ 39.917975] ret_from_fork+0x10/0x20
[ 39.918505]
[ 39.918953] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 39.919979] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 39.920546] Hardware name: linux,dummy-virt (DT)
[ 39.921149] ==================================================================
Home
[ 39.693626] ==================================================================
[ 39.694414] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[ 39.694414]
[ 39.695171] Corrupted memory at 0x0000000037b50268 [ ! ] (in kfence-#154):
[ 39.696410] test_corruption+0x284/0x378
[ 39.696975] kunit_try_run_case+0x14c/0x3d0
[ 39.697597] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.698281] kthread+0x24c/0x2d0
[ 39.698835] ret_from_fork+0x10/0x20
[ 39.699421]
[ 39.699785] kfence-#154: 0x000000000eda7964-0x00000000b55ace2d, size=32, cache=kmalloc-32
[ 39.699785]
[ 39.700720] allocated by task 300 on cpu 1 at 39.693132s (0.007577s ago):
[ 39.701612] test_alloc+0x298/0x620
[ 39.702094] test_corruption+0x198/0x378
[ 39.702685] kunit_try_run_case+0x14c/0x3d0
[ 39.703207] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.703949] kthread+0x24c/0x2d0
[ 39.704423] ret_from_fork+0x10/0x20
[ 39.705054]
[ 39.705370] freed by task 300 on cpu 1 at 39.693294s (0.012065s ago):
[ 39.706151] test_corruption+0x284/0x378
[ 39.706684] kunit_try_run_case+0x14c/0x3d0
[ 39.707327] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.708068] kthread+0x24c/0x2d0
[ 39.708501] ret_from_fork+0x10/0x20
[ 39.709098]
[ 39.709494] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 39.710414] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 39.711000] Hardware name: linux,dummy-virt (DT)
[ 39.711627] ==================================================================
Home
[ 40.109371] ==================================================================
[ 40.110157] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[ 40.110157]
[ 40.111011] Corrupted memory at 0x0000000049227a95 [ ! ] (in kfence-#158):
[ 40.112197] test_corruption+0x1d8/0x378
[ 40.112742] kunit_try_run_case+0x14c/0x3d0
[ 40.113508] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.114149] kthread+0x24c/0x2d0
[ 40.114803] ret_from_fork+0x10/0x20
[ 40.115306]
[ 40.115748] kfence-#158: 0x000000000306921e-0x000000004beef461, size=32, cache=test
[ 40.115748]
[ 40.116840] allocated by task 302 on cpu 0 at 40.109107s (0.007722s ago):
[ 40.117790] test_alloc+0x22c/0x620
[ 40.118428] test_corruption+0x198/0x378
[ 40.119116] kunit_try_run_case+0x14c/0x3d0
[ 40.119686] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.120491] kthread+0x24c/0x2d0
[ 40.121061] ret_from_fork+0x10/0x20
[ 40.121728]
[ 40.122092] freed by task 302 on cpu 0 at 40.109200s (0.012880s ago):
[ 40.122908] test_corruption+0x1d8/0x378
[ 40.123553] kunit_try_run_case+0x14c/0x3d0
[ 40.124211] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.124966] kthread+0x24c/0x2d0
[ 40.125498] ret_from_fork+0x10/0x20
[ 40.126005]
[ 40.126427] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 40.127471] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 40.128054] Hardware name: linux,dummy-virt (DT)
[ 40.128628] ==================================================================
Home
[ 39.381706] ==================================================================
[ 39.382268] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[ 39.382268]
[ 39.382680] Corrupted memory at 0x0000000000309ec9 [ ! . . . . . . . . . . . . . . . ] (in kfence-#151):
[ 39.384841] test_corruption+0x278/0x378
[ 39.385408] kunit_try_run_case+0x14c/0x3d0
[ 39.386064] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.386838] kthread+0x24c/0x2d0
[ 39.387438] ret_from_fork+0x10/0x20
[ 39.388029]
[ 39.388391] kfence-#151: 0x000000001cbfa227-0x00000000c1f233f8, size=32, cache=kmalloc-32
[ 39.388391]
[ 39.389455] allocated by task 300 on cpu 1 at 39.381224s (0.008219s ago):
[ 39.390296] test_alloc+0x298/0x620
[ 39.390869] test_corruption+0xdc/0x378
[ 39.391371] kunit_try_run_case+0x14c/0x3d0
[ 39.392017] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.392612] kthread+0x24c/0x2d0
[ 39.393174] ret_from_fork+0x10/0x20
[ 39.393744]
[ 39.394076] freed by task 300 on cpu 1 at 39.381414s (0.012651s ago):
[ 39.394760] test_corruption+0x278/0x378
[ 39.395368] kunit_try_run_case+0x14c/0x3d0
[ 39.396002] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.396663] kthread+0x24c/0x2d0
[ 39.397130] ret_from_fork+0x10/0x20
[ 39.397695]
[ 39.398109] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 39.399110] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 39.399691] Hardware name: linux,dummy-virt (DT)
[ 39.400316] ==================================================================
Home
[ 45.621514] ==================================================================
[ 45.622367] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[ 45.622367]
[ 45.623270] Corrupted memory at 0x00000000db9b0df8 [ ! . . . . . . . . . . . . . . . ] (in kfence-#211):
[ 45.625800] test_kmalloc_aligned_oob_write+0x214/0x2c0
[ 45.626583] kunit_try_run_case+0x14c/0x3d0
[ 45.627183] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 45.627960] kthread+0x24c/0x2d0
[ 45.628484] ret_from_fork+0x10/0x20
[ 45.629103]
[ 45.629474] kfence-#211: 0x00000000c5b013fe-0x00000000f96cc8c3, size=73, cache=kmalloc-96
[ 45.629474]
[ 45.630440] allocated by task 314 on cpu 0 at 45.621086s (0.009342s ago):
[ 45.631278] test_alloc+0x298/0x620
[ 45.631864] test_kmalloc_aligned_oob_write+0xbc/0x2c0
[ 45.632533] kunit_try_run_case+0x14c/0x3d0
[ 45.633197] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 45.633911] kthread+0x24c/0x2d0
[ 45.634455] ret_from_fork+0x10/0x20
[ 45.635019]
[ 45.635396] freed by task 314 on cpu 0 at 45.621324s (0.014060s ago):
[ 45.636190] test_kmalloc_aligned_oob_write+0x214/0x2c0
[ 45.636932] kunit_try_run_case+0x14c/0x3d0
[ 45.637519] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 45.638248] kthread+0x24c/0x2d0
[ 45.638817] ret_from_fork+0x10/0x20
[ 45.639338]
[ 45.639692] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 45.640692] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 45.641151] Hardware name: linux,dummy-virt (DT)
[ 45.641768] ==================================================================
Home
[ 44.997633] ==================================================================
[ 44.998324] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[ 44.998324]
[ 44.999345] Out-of-bounds read at 0x000000007a9ef518 (105B right of kfence-#205):
[ 45.000022] test_kmalloc_aligned_oob_read+0x238/0x468
[ 45.000895] kunit_try_run_case+0x14c/0x3d0
[ 45.001542] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 45.002469] kthread+0x24c/0x2d0
[ 45.003055] ret_from_fork+0x10/0x20
[ 45.003578]
[ 45.003918] kfence-#205: 0x0000000062633de3-0x00000000c6c2332b, size=73, cache=kmalloc-96
[ 45.003918]
[ 45.004910] allocated by task 312 on cpu 1 at 44.997165s (0.007733s ago):
[ 45.005736] test_alloc+0x298/0x620
[ 45.006308] test_kmalloc_aligned_oob_read+0x100/0x468
[ 45.007028] kunit_try_run_case+0x14c/0x3d0
[ 45.007594] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 45.008237] kthread+0x24c/0x2d0
[ 45.008761] ret_from_fork+0x10/0x20
[ 45.009309]
[ 45.009660] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 45.010644] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 45.011239] Hardware name: linux,dummy-virt (DT)
[ 45.011796] ==================================================================
Home
[ 37.406634] ==================================================================
[ 37.407492] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[ 37.407492]
[ 37.408555] Out-of-bounds read at 0x00000000df1c23eb (1B left of kfence-#132):
[ 37.409687] test_out_of_bounds_read+0x114/0x3e0
[ 37.410380] kunit_try_run_case+0x14c/0x3d0
[ 37.411130] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 37.411735] kthread+0x24c/0x2d0
[ 37.412227] ret_from_fork+0x10/0x20
[ 37.412757]
[ 37.413142] kfence-#132: 0x0000000068a537a8-0x000000003193dcb6, size=32, cache=kmalloc-32
[ 37.413142]
[ 37.414079] allocated by task 276 on cpu 0 at 37.405248s (0.008820s ago):
[ 37.414932] test_alloc+0x298/0x620
[ 37.415499] test_out_of_bounds_read+0xdc/0x3e0
[ 37.416147] kunit_try_run_case+0x14c/0x3d0
[ 37.416693] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 37.417388] kthread+0x24c/0x2d0
[ 37.417904] ret_from_fork+0x10/0x20
[ 37.418498]
[ 37.418903] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 37.419974] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 37.420503] Hardware name: linux,dummy-virt (DT)
[ 37.421065] ==================================================================
Home
[ 38.445287] ==================================================================
[ 38.446214] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[ 38.446214]
[ 38.447021] Out-of-bounds write at 0x00000000492055f9 (1B left of kfence-#142):
[ 38.447698] test_out_of_bounds_write+0x100/0x240
[ 38.448800] kunit_try_run_case+0x14c/0x3d0
[ 38.449434] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.450127] kthread+0x24c/0x2d0
[ 38.450668] ret_from_fork+0x10/0x20
[ 38.451201]
[ 38.451557] kfence-#142: 0x00000000b6faead9-0x000000007467b642, size=32, cache=test
[ 38.451557]
[ 38.452407] allocated by task 282 on cpu 0 at 38.445122s (0.007274s ago):
[ 38.453284] test_alloc+0x22c/0x620
[ 38.453813] test_out_of_bounds_write+0xc8/0x240
[ 38.454426] kunit_try_run_case+0x14c/0x3d0
[ 38.455082] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.455810] kthread+0x24c/0x2d0
[ 38.456336] ret_from_fork+0x10/0x20
[ 38.456921]
[ 38.457319] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 38.458346] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 38.458926] Hardware name: linux,dummy-virt (DT)
[ 38.459545] ==================================================================
Home
[ 38.029393] ==================================================================
[ 38.030251] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[ 38.030251]
[ 38.030981] Out-of-bounds write at 0x00000000cde40e29 (1B left of kfence-#138):
[ 38.031827] test_out_of_bounds_write+0x100/0x240
[ 38.032445] kunit_try_run_case+0x14c/0x3d0
[ 38.033102] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.033830] kthread+0x24c/0x2d0
[ 38.034402] ret_from_fork+0x10/0x20
[ 38.034933]
[ 38.035279] kfence-#138: 0x00000000d445f7a6-0x000000005675d3b8, size=32, cache=kmalloc-32
[ 38.035279]
[ 38.036265] allocated by task 280 on cpu 0 at 38.029128s (0.007126s ago):
[ 38.037093] test_alloc+0x298/0x620
[ 38.037560] test_out_of_bounds_write+0xc8/0x240
[ 38.038173] kunit_try_run_case+0x14c/0x3d0
[ 38.038789] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.039526] kthread+0x24c/0x2d0
[ 38.040098] ret_from_fork+0x10/0x20
[ 38.040654]
[ 38.041061] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 38.041978] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 38.042503] Hardware name: linux,dummy-virt (DT)
[ 38.043132] ==================================================================
Home
[ 64.966396] ==================================================================
[ 64.967136] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[ 64.967136]
[ 64.967981] Use-after-free read at 0x0000000053fca0f5 (in kfence-#217):
[ 64.968754] test_krealloc+0x51c/0x830
[ 64.969320] kunit_try_run_case+0x14c/0x3d0
[ 64.969950] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 64.970629] kthread+0x24c/0x2d0
[ 64.971200] ret_from_fork+0x10/0x20
[ 64.971729]
[ 64.972072] kfence-#217: 0x0000000053fca0f5-0x0000000002f04d63, size=32, cache=kmalloc-32
[ 64.972072]
[ 64.973061] allocated by task 326 on cpu 1 at 64.965170s (0.007881s ago):
[ 64.973736] test_alloc+0x298/0x620
[ 64.974310] test_krealloc+0xc0/0x830
[ 64.974941] kunit_try_run_case+0x14c/0x3d0
[ 64.975521] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 64.976275] kthread+0x24c/0x2d0
[ 64.976820] ret_from_fork+0x10/0x20
[ 64.977333]
[ 64.977688] freed by task 326 on cpu 1 at 64.965630s (0.012047s ago):
[ 64.978561] krealloc_noprof+0x148/0x360
[ 64.979060] test_krealloc+0x1dc/0x830
[ 64.979641] kunit_try_run_case+0x14c/0x3d0
[ 64.980290] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 64.980964] kthread+0x24c/0x2d0
[ 64.981522] ret_from_fork+0x10/0x20
[ 64.982048]
[ 64.982440] CPU: 1 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 64.983427] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 64.983925] Hardware name: linux,dummy-virt (DT)
[ 64.984532] ==================================================================
Home
[ 64.775817] ==================================================================
[ 64.776504] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[ 64.776504]
[ 64.777762] Use-after-free read at 0x00000000efb81b2f (in kfence-#215):
[ 64.778570] test_memcache_typesafe_by_rcu+0x280/0x560
[ 64.779152] kunit_try_run_case+0x14c/0x3d0
[ 64.779788] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 64.780520] kthread+0x24c/0x2d0
[ 64.781098] ret_from_fork+0x10/0x20
[ 64.781603]
[ 64.781984] kfence-#215: 0x00000000efb81b2f-0x000000000d36ed58, size=32, cache=test
[ 64.781984]
[ 64.782989] allocated by task 324 on cpu 1 at 64.761483s (0.021493s ago):
[ 64.783865] test_alloc+0x22c/0x620
[ 64.784350] test_memcache_typesafe_by_rcu+0x15c/0x560
[ 64.785101] kunit_try_run_case+0x14c/0x3d0
[ 64.785657] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 64.786382] kthread+0x24c/0x2d0
[ 64.786917] ret_from_fork+0x10/0x20
[ 64.787485]
[ 64.787851] freed by task 324 on cpu 1 at 64.761608s (0.026233s ago):
[ 64.788580] test_memcache_typesafe_by_rcu+0x1a8/0x560
[ 64.789290] kunit_try_run_case+0x14c/0x3d0
[ 64.789929] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 64.790486] kthread+0x24c/0x2d0
[ 64.791045] ret_from_fork+0x10/0x20
[ 64.791616]
[ 64.792035] CPU: 1 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 64.792966] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 64.793539] Hardware name: linux,dummy-virt (DT)
[ 64.794126] ==================================================================
Home
[ 38.653483] ==================================================================
[ 38.654287] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[ 38.654287]
[ 38.655012] Use-after-free read at 0x0000000017c3716e (in kfence-#144):
[ 38.655794] test_use_after_free_read+0x114/0x248
[ 38.656589] kunit_try_run_case+0x14c/0x3d0
[ 38.657290] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.658097] kthread+0x24c/0x2d0
[ 38.658694] ret_from_fork+0x10/0x20
[ 38.659329]
[ 38.659723] kfence-#144: 0x0000000017c3716e-0x0000000050811063, size=32, cache=test
[ 38.659723]
[ 38.660973] allocated by task 286 on cpu 1 at 38.653123s (0.007839s ago):
[ 38.661979] test_alloc+0x22c/0x620
[ 38.662538] test_use_after_free_read+0xd0/0x248
[ 38.663084] kunit_try_run_case+0x14c/0x3d0
[ 38.663707] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.664413] kthread+0x24c/0x2d0
[ 38.664972] ret_from_fork+0x10/0x20
[ 38.665499]
[ 38.665838] freed by task 286 on cpu 1 at 38.653226s (0.012600s ago):
[ 38.666687] test_use_after_free_read+0xf0/0x248
[ 38.667372] kunit_try_run_case+0x14c/0x3d0
[ 38.668015] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.668669] kthread+0x24c/0x2d0
[ 38.669232] ret_from_fork+0x10/0x20
[ 38.669736]
[ 38.670148] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 38.671080] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 38.671668] Hardware name: linux,dummy-virt (DT)
[ 38.672237] ==================================================================
Home
[ 38.549515] ==================================================================
[ 38.550282] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[ 38.550282]
[ 38.551053] Use-after-free read at 0x000000008389d0bc (in kfence-#143):
[ 38.551856] test_use_after_free_read+0x114/0x248
[ 38.552706] kunit_try_run_case+0x14c/0x3d0
[ 38.553301] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.554062] kthread+0x24c/0x2d0
[ 38.554665] ret_from_fork+0x10/0x20
[ 38.555186]
[ 38.555539] kfence-#143: 0x000000008389d0bc-0x0000000006581508, size=32, cache=kmalloc-32
[ 38.555539]
[ 38.556584] allocated by task 284 on cpu 0 at 38.549071s (0.007502s ago):
[ 38.557328] test_alloc+0x298/0x620
[ 38.557907] test_use_after_free_read+0xd0/0x248
[ 38.558559] kunit_try_run_case+0x14c/0x3d0
[ 38.559068] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.559817] kthread+0x24c/0x2d0
[ 38.560310] ret_from_fork+0x10/0x20
[ 38.560897]
[ 38.561255] freed by task 284 on cpu 0 at 38.549197s (0.012046s ago):
[ 38.562088] test_use_after_free_read+0x1c0/0x248
[ 38.562741] kunit_try_run_case+0x14c/0x3d0
[ 38.563306] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.563992] kthread+0x24c/0x2d0
[ 38.564468] ret_from_fork+0x10/0x20
[ 38.565067]
[ 38.565459] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 38.566446] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 38.567016] Hardware name: linux,dummy-virt (DT)
[ 38.567572] ==================================================================
Home
[ 23.329030] ==================================================================
[ 23.329934] BUG: KASAN: invalid-free in kfree+0x271/0x3f0
[ 23.330431] Free of addr ffff8881023e8001 by task kunit_try_catch/158
[ 23.330785]
[ 23.330967] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 23.331851] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.332187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 23.334256] Call Trace:
[ 23.334508] <TASK>
[ 23.334831] dump_stack_lvl+0x73/0xb0
[ 23.335728] print_report+0xd1/0x640
[ 23.336041] ? __virt_addr_valid+0x1db/0x2d0
[ 23.336976] ? kfree+0x271/0x3f0
[ 23.337496] ? kasan_addr_to_slab+0x11/0xa0
[ 23.337905] ? kfree+0x271/0x3f0
[ 23.338280] kasan_report_invalid_free+0xc0/0xf0
[ 23.338587] ? kfree+0x271/0x3f0
[ 23.339405] ? kfree+0x271/0x3f0
[ 23.339940] __kasan_kfree_large+0x86/0xd0
[ 23.340432] free_large_kmalloc+0x3b/0xd0
[ 23.341053] kfree+0x271/0x3f0
[ 23.341460] kmalloc_large_invalid_free+0x121/0x2b0
[ 23.342118] ? __pfx_kmalloc_large_invalid_free+0x10/0x10
[ 23.342772] ? __schedule+0xc3e/0x2790
[ 23.343290] ? __pfx_read_tsc+0x10/0x10
[ 23.343941] ? ktime_get_ts64+0x84/0x230
[ 23.344474] kunit_try_run_case+0x1b3/0x490
[ 23.345175] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.345563] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 23.346429] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 23.347208] ? __kthread_parkme+0x82/0x160
[ 23.347810] ? preempt_count_sub+0x50/0x80
[ 23.348432] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.348892] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 23.349396] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.349750] kthread+0x257/0x310
[ 23.349997] ? __pfx_kthread+0x10/0x10
[ 23.350509] ret_from_fork+0x41/0x80
[ 23.350924] ? __pfx_kthread+0x10/0x10
[ 23.352050] ret_from_fork_asm+0x1a/0x30
[ 23.352623] </TASK>
[ 23.353054]
[ 23.353287] The buggy address belongs to the physical page:
[ 23.353597] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e8
[ 23.354756] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 23.355433] flags: 0x200000000000040(head|node=0|zone=2)
[ 23.356168] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 23.356817] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 23.357281] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 23.357978] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 23.358511] head: 0200000000000002 ffffea000408fa01 ffffffffffffffff 0000000000000000
[ 23.359727] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 23.360199] page dumped because: kasan: bad access detected
[ 23.360838]
[ 23.361080] Memory state around the buggy address:
[ 23.361435] ffff8881023e7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.362065] ffff8881023e7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.362528] >ffff8881023e8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.363032] ^
[ 23.363788] ffff8881023e8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.364399] ffff8881023e8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.365085] ==================================================================
Home
[ 30.906336] ==================================================================
[ 30.906830] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[ 30.907902] Write of size 8 at addr ffff888101aaa378 by task kunit_try_catch/289
[ 30.908698]
[ 30.908983] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.909947] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.910394] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 30.911316] Call Trace:
[ 30.911558] <TASK>
[ 30.911830] dump_stack_lvl+0x73/0xb0
[ 30.912263] print_report+0xd1/0x640
[ 30.912645] ? __virt_addr_valid+0x1db/0x2d0
[ 30.912967] ? kasan_complete_mode_report_info+0x2a/0x200
[ 30.914013] kasan_report+0x102/0x140
[ 30.914462] ? copy_to_kernel_nofault+0x99/0x260
[ 30.915199] ? copy_to_kernel_nofault+0x99/0x260
[ 30.915869] kasan_check_range+0x10c/0x1c0
[ 30.916235] __kasan_check_write+0x18/0x20
[ 30.916899] copy_to_kernel_nofault+0x99/0x260
[ 30.917342] copy_to_kernel_nofault_oob+0x214/0x4e0
[ 30.918173] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[ 30.918979] ? finish_task_switch.isra.0+0x153/0x700
[ 30.919485] ? __schedule+0xc3e/0x2790
[ 30.920114] ? trace_hardirqs_on+0x37/0xe0
[ 30.920675] ? irqentry_exit+0x2a/0x60
[ 30.921090] ? __pfx_read_tsc+0x10/0x10
[ 30.921428] ? ktime_get_ts64+0x84/0x230
[ 30.922265] kunit_try_run_case+0x1b3/0x490
[ 30.922971] ? sysvec_apic_timer_interrupt+0x50/0x90
[ 30.923453] ? __pfx_kunit_try_run_case+0x10/0x10
[ 30.923864] ? __pfx_kunit_try_run_case+0x10/0x10
[ 30.924351] ? __pfx_kunit_try_run_case+0x10/0x10
[ 30.925683] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 30.926507] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 30.927278] kthread+0x257/0x310
[ 30.927681] ? __pfx_kthread+0x10/0x10
[ 30.928155] ret_from_fork+0x41/0x80
[ 30.928693] ? __pfx_kthread+0x10/0x10
[ 30.928975] ret_from_fork_asm+0x1a/0x30
[ 30.929873] </TASK>
[ 30.930153]
[ 30.930486] Allocated by task 289:
[ 30.930971] kasan_save_stack+0x3d/0x60
[ 30.931596] kasan_save_track+0x18/0x40
[ 30.932595] kasan_save_alloc_info+0x3b/0x50
[ 30.933157] __kasan_kmalloc+0xb7/0xc0
[ 30.933668] __kmalloc_cache_noprof+0x184/0x410
[ 30.934486] copy_to_kernel_nofault_oob+0xc5/0x4e0
[ 30.934996] kunit_try_run_case+0x1b3/0x490
[ 30.935692] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 30.936264] kthread+0x257/0x310
[ 30.936893] ret_from_fork+0x41/0x80
[ 30.937420] ret_from_fork_asm+0x1a/0x30
[ 30.937716]
[ 30.937868] The buggy address belongs to the object at ffff888101aaa300
[ 30.937868] which belongs to the cache kmalloc-128 of size 128
[ 30.939364] The buggy address is located 0 bytes to the right of
[ 30.939364] allocated 120-byte region [ffff888101aaa300, ffff888101aaa378)
[ 30.940507]
[ 30.940664] The buggy address belongs to the physical page:
[ 30.941371] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aaa
[ 30.941927] flags: 0x200000000000000(node=0|zone=2)
[ 30.942305] page_type: f5(slab)
[ 30.942747] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[ 30.943638] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 30.944420] page dumped because: kasan: bad access detected
[ 30.944956]
[ 30.945453] Memory state around the buggy address:
[ 30.945811] ffff888101aaa200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 30.946173] ffff888101aaa280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.947305] >ffff888101aaa300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 30.947896] ^
[ 30.948352] ffff888101aaa380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.949175] ffff888101aaa400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.950201] ==================================================================
Home
[ 30.862021] ==================================================================
[ 30.863162] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[ 30.864215] Read of size 8 at addr ffff888101aaa378 by task kunit_try_catch/289
[ 30.864911]
[ 30.865091] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.865772] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.867046] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 30.867582] Call Trace:
[ 30.867879] <TASK>
[ 30.868830] dump_stack_lvl+0x73/0xb0
[ 30.869315] print_report+0xd1/0x640
[ 30.869900] ? __virt_addr_valid+0x1db/0x2d0
[ 30.870392] ? kasan_complete_mode_report_info+0x2a/0x200
[ 30.871092] kasan_report+0x102/0x140
[ 30.871423] ? copy_to_kernel_nofault+0x225/0x260
[ 30.871773] ? copy_to_kernel_nofault+0x225/0x260
[ 30.872761] __asan_report_load8_noabort+0x18/0x20
[ 30.873330] copy_to_kernel_nofault+0x225/0x260
[ 30.873944] copy_to_kernel_nofault_oob+0x179/0x4e0
[ 30.874338] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[ 30.875112] ? finish_task_switch.isra.0+0x153/0x700
[ 30.875707] ? __schedule+0xc3e/0x2790
[ 30.876184] ? trace_hardirqs_on+0x37/0xe0
[ 30.877115] ? irqentry_exit+0x2a/0x60
[ 30.877425] ? __pfx_read_tsc+0x10/0x10
[ 30.877986] ? ktime_get_ts64+0x84/0x230
[ 30.878400] kunit_try_run_case+0x1b3/0x490
[ 30.879127] ? sysvec_apic_timer_interrupt+0x50/0x90
[ 30.879646] ? __pfx_kunit_try_run_case+0x10/0x10
[ 30.880007] ? __pfx_kunit_try_run_case+0x10/0x10
[ 30.880515] ? __pfx_kunit_try_run_case+0x10/0x10
[ 30.880904] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 30.881775] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 30.882375] kthread+0x257/0x310
[ 30.883016] ? __pfx_kthread+0x10/0x10
[ 30.883324] ret_from_fork+0x41/0x80
[ 30.883941] ? __pfx_kthread+0x10/0x10
[ 30.884355] ret_from_fork_asm+0x1a/0x30
[ 30.885001] </TASK>
[ 30.885304]
[ 30.885475] Allocated by task 289:
[ 30.886224] kasan_save_stack+0x3d/0x60
[ 30.886708] kasan_save_track+0x18/0x40
[ 30.887366] kasan_save_alloc_info+0x3b/0x50
[ 30.888022] __kasan_kmalloc+0xb7/0xc0
[ 30.888371] __kmalloc_cache_noprof+0x184/0x410
[ 30.888854] copy_to_kernel_nofault_oob+0xc5/0x4e0
[ 30.889406] kunit_try_run_case+0x1b3/0x490
[ 30.890084] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 30.890951] kthread+0x257/0x310
[ 30.891311] ret_from_fork+0x41/0x80
[ 30.891834] ret_from_fork_asm+0x1a/0x30
[ 30.892335]
[ 30.892563] The buggy address belongs to the object at ffff888101aaa300
[ 30.892563] which belongs to the cache kmalloc-128 of size 128
[ 30.893385] The buggy address is located 0 bytes to the right of
[ 30.893385] allocated 120-byte region [ffff888101aaa300, ffff888101aaa378)
[ 30.894548]
[ 30.895058] The buggy address belongs to the physical page:
[ 30.895607] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aaa
[ 30.896385] flags: 0x200000000000000(node=0|zone=2)
[ 30.897068] page_type: f5(slab)
[ 30.897438] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[ 30.898339] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 30.899261] page dumped because: kasan: bad access detected
[ 30.899693]
[ 30.900103] Memory state around the buggy address:
[ 30.900686] ffff888101aaa200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 30.901154] ffff888101aaa280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.902123] >ffff888101aaa300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 30.902979] ^
[ 30.903742] ffff888101aaa380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.904189] ffff888101aaa400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.904989] ==================================================================
Home
[ 27.364382] ==================================================================
[ 27.365154] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50
[ 27.366109] Write of size 8 at addr ffff888101e49d08 by task kunit_try_catch/269
[ 27.367493]
[ 27.368132] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.369391] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.369714] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.370847] Call Trace:
[ 27.371470] <TASK>
[ 27.371673] dump_stack_lvl+0x73/0xb0
[ 27.371989] print_report+0xd1/0x640
[ 27.372348] ? __virt_addr_valid+0x1db/0x2d0
[ 27.372805] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.373275] kasan_report+0x102/0x140
[ 27.374513] ? kasan_bitops_modify.constprop.0+0x102/0xd50
[ 27.375224] ? kasan_bitops_modify.constprop.0+0x102/0xd50
[ 27.376075] kasan_check_range+0x10c/0x1c0
[ 27.376648] __kasan_check_write+0x18/0x20
[ 27.377225] kasan_bitops_modify.constprop.0+0x102/0xd50
[ 27.377934] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 27.378832] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.379511] ? trace_hardirqs_on+0x37/0xe0
[ 27.380145] ? kasan_bitops_generic+0x93/0x1c0
[ 27.380680] kasan_bitops_generic+0x117/0x1c0
[ 27.381093] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 27.381711] ? __pfx_read_tsc+0x10/0x10
[ 27.382432] ? ktime_get_ts64+0x84/0x230
[ 27.383020] kunit_try_run_case+0x1b3/0x490
[ 27.383740] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.384270] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.384855] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.385287] ? __kthread_parkme+0x82/0x160
[ 27.385624] ? preempt_count_sub+0x50/0x80
[ 27.386752] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.387330] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.387783] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.388808] kthread+0x257/0x310
[ 27.389146] ? __pfx_kthread+0x10/0x10
[ 27.389487] ret_from_fork+0x41/0x80
[ 27.389917] ? __pfx_kthread+0x10/0x10
[ 27.390626] ret_from_fork_asm+0x1a/0x30
[ 27.391266] </TASK>
[ 27.391798]
[ 27.392113] Allocated by task 269:
[ 27.392371] kasan_save_stack+0x3d/0x60
[ 27.392899] kasan_save_track+0x18/0x40
[ 27.393336] kasan_save_alloc_info+0x3b/0x50
[ 27.394238] __kasan_kmalloc+0xb7/0xc0
[ 27.394811] __kmalloc_cache_noprof+0x184/0x410
[ 27.395486] kasan_bitops_generic+0x93/0x1c0
[ 27.396148] kunit_try_run_case+0x1b3/0x490
[ 27.396480] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.397409] kthread+0x257/0x310
[ 27.397892] ret_from_fork+0x41/0x80
[ 27.398336] ret_from_fork_asm+0x1a/0x30
[ 27.398701]
[ 27.398867] The buggy address belongs to the object at ffff888101e49d00
[ 27.398867] which belongs to the cache kmalloc-16 of size 16
[ 27.400340] The buggy address is located 8 bytes inside of
[ 27.400340] allocated 9-byte region [ffff888101e49d00, ffff888101e49d09)
[ 27.401409]
[ 27.401670] The buggy address belongs to the physical page:
[ 27.402123] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[ 27.402800] flags: 0x200000000000000(node=0|zone=2)
[ 27.403189] page_type: f5(slab)
[ 27.403542] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 27.404170] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 27.405277] page dumped because: kasan: bad access detected
[ 27.406280]
[ 27.406632] Memory state around the buggy address:
[ 27.406917] ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[ 27.407753] ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 27.408876] >ffff888101e49d00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.409727] ^
[ 27.410434] ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.411163] ffff888101e49e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.411501] ==================================================================
---
[ 27.643142] ==================================================================
[ 27.643671] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50
[ 27.644421] Write of size 8 at addr ffff888101e49d08 by task kunit_try_catch/269
[ 27.645149]
[ 27.645788] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.646618] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.647022] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.647674] Call Trace:
[ 27.647933] <TASK>
[ 27.648171] dump_stack_lvl+0x73/0xb0
[ 27.649220] print_report+0xd1/0x640
[ 27.649727] ? __virt_addr_valid+0x1db/0x2d0
[ 27.650184] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.650625] kasan_report+0x102/0x140
[ 27.650862] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[ 27.651409] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[ 27.651884] kasan_check_range+0x10c/0x1c0
[ 27.652175] __kasan_check_write+0x18/0x20
[ 27.652983] kasan_bitops_modify.constprop.0+0x4ad/0xd50
[ 27.653720] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 27.654352] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.655008] ? trace_hardirqs_on+0x37/0xe0
[ 27.655406] ? kasan_bitops_generic+0x93/0x1c0
[ 27.656363] kasan_bitops_generic+0x117/0x1c0
[ 27.656927] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 27.657435] ? __pfx_read_tsc+0x10/0x10
[ 27.657991] ? ktime_get_ts64+0x84/0x230
[ 27.658646] kunit_try_run_case+0x1b3/0x490
[ 27.659179] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.659520] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.660178] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.661060] ? __kthread_parkme+0x82/0x160
[ 27.661521] ? preempt_count_sub+0x50/0x80
[ 27.662154] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.662736] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.663374] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.664080] kthread+0x257/0x310
[ 27.664465] ? __pfx_kthread+0x10/0x10
[ 27.664892] ret_from_fork+0x41/0x80
[ 27.665472] ? __pfx_kthread+0x10/0x10
[ 27.666379] ret_from_fork_asm+0x1a/0x30
[ 27.666958] </TASK>
[ 27.667129]
[ 27.667526] Allocated by task 269:
[ 27.668229] kasan_save_stack+0x3d/0x60
[ 27.668690] kasan_save_track+0x18/0x40
[ 27.669494] kasan_save_alloc_info+0x3b/0x50
[ 27.670154] __kasan_kmalloc+0xb7/0xc0
[ 27.670424] __kmalloc_cache_noprof+0x184/0x410
[ 27.671013] kasan_bitops_generic+0x93/0x1c0
[ 27.671659] kunit_try_run_case+0x1b3/0x490
[ 27.672531] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.673112] kthread+0x257/0x310
[ 27.673824] ret_from_fork+0x41/0x80
[ 27.674200] ret_from_fork_asm+0x1a/0x30
[ 27.675051]
[ 27.675276] The buggy address belongs to the object at ffff888101e49d00
[ 27.675276] which belongs to the cache kmalloc-16 of size 16
[ 27.676418] The buggy address is located 8 bytes inside of
[ 27.676418] allocated 9-byte region [ffff888101e49d00, ffff888101e49d09)
[ 27.677468]
[ 27.678179] The buggy address belongs to the physical page:
[ 27.679065] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[ 27.679928] flags: 0x200000000000000(node=0|zone=2)
[ 27.680403] page_type: f5(slab)
[ 27.680740] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 27.681463] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 27.682221] page dumped because: kasan: bad access detected
[ 27.682445]
[ 27.682525] Memory state around the buggy address:
[ 27.682824] ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[ 27.683587] ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 27.684311] >ffff888101e49d00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.684776] ^
[ 27.685096] ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.686224] ffff888101e49e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.686682] ==================================================================
---
[ 27.458554] ==================================================================
[ 27.459690] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50
[ 27.461254] Write of size 8 at addr ffff888101e49d08 by task kunit_try_catch/269
[ 27.462337]
[ 27.462553] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.463443] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.463751] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.465138] Call Trace:
[ 27.465448] <TASK>
[ 27.465684] dump_stack_lvl+0x73/0xb0
[ 27.466189] print_report+0xd1/0x640
[ 27.466781] ? __virt_addr_valid+0x1db/0x2d0
[ 27.467443] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.468114] kasan_report+0x102/0x140
[ 27.468769] ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[ 27.469136] ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[ 27.469866] kasan_check_range+0x10c/0x1c0
[ 27.470845] __kasan_check_write+0x18/0x20
[ 27.471725] kasan_bitops_modify.constprop.0+0x23b/0xd50
[ 27.472221] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 27.472577] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.473539] ? trace_hardirqs_on+0x37/0xe0
[ 27.474142] ? kasan_bitops_generic+0x93/0x1c0
[ 27.474911] kasan_bitops_generic+0x117/0x1c0
[ 27.475491] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 27.476353] ? __pfx_read_tsc+0x10/0x10
[ 27.477083] ? ktime_get_ts64+0x84/0x230
[ 27.477392] kunit_try_run_case+0x1b3/0x490
[ 27.477847] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.478220] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.478838] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.479219] ? __kthread_parkme+0x82/0x160
[ 27.479689] ? preempt_count_sub+0x50/0x80
[ 27.480195] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.480849] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.481391] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.482369] kthread+0x257/0x310
[ 27.482737] ? __pfx_kthread+0x10/0x10
[ 27.483422] ret_from_fork+0x41/0x80
[ 27.484145] ? __pfx_kthread+0x10/0x10
[ 27.484763] ret_from_fork_asm+0x1a/0x30
[ 27.485357] </TASK>
[ 27.485701]
[ 27.485945] Allocated by task 269:
[ 27.486309] kasan_save_stack+0x3d/0x60
[ 27.486891] kasan_save_track+0x18/0x40
[ 27.487385] kasan_save_alloc_info+0x3b/0x50
[ 27.488317] __kasan_kmalloc+0xb7/0xc0
[ 27.488991] __kmalloc_cache_noprof+0x184/0x410
[ 27.489266] kasan_bitops_generic+0x93/0x1c0
[ 27.490116] kunit_try_run_case+0x1b3/0x490
[ 27.490624] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.491330] kthread+0x257/0x310
[ 27.491898] ret_from_fork+0x41/0x80
[ 27.492368] ret_from_fork_asm+0x1a/0x30
[ 27.492955]
[ 27.493182] The buggy address belongs to the object at ffff888101e49d00
[ 27.493182] which belongs to the cache kmalloc-16 of size 16
[ 27.494350] The buggy address is located 8 bytes inside of
[ 27.494350] allocated 9-byte region [ffff888101e49d00, ffff888101e49d09)
[ 27.495664]
[ 27.495945] The buggy address belongs to the physical page:
[ 27.496755] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[ 27.497587] flags: 0x200000000000000(node=0|zone=2)
[ 27.498111] page_type: f5(slab)
[ 27.498310] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 27.498949] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 27.500186] page dumped because: kasan: bad access detected
[ 27.500636]
[ 27.500856] Memory state around the buggy address:
[ 27.501288] ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[ 27.501808] ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 27.502547] >ffff888101e49d00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.503034] ^
[ 27.503444] ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.503838] ffff888101e49e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.504511] ==================================================================
---
[ 27.596493] ==================================================================
[ 27.597098] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50
[ 27.597923] Write of size 8 at addr ffff888101e49d08 by task kunit_try_catch/269
[ 27.598730]
[ 27.598953] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.599919] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.600328] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.601233] Call Trace:
[ 27.601509] <TASK>
[ 27.602131] dump_stack_lvl+0x73/0xb0
[ 27.602850] print_report+0xd1/0x640
[ 27.603276] ? __virt_addr_valid+0x1db/0x2d0
[ 27.604045] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.604609] kasan_report+0x102/0x140
[ 27.604884] ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[ 27.605754] ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[ 27.606384] kasan_check_range+0x10c/0x1c0
[ 27.607060] __kasan_check_write+0x18/0x20
[ 27.607431] kasan_bitops_modify.constprop.0+0x40f/0xd50
[ 27.607955] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 27.608364] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.608839] ? trace_hardirqs_on+0x37/0xe0
[ 27.609296] ? kasan_bitops_generic+0x93/0x1c0
[ 27.609660] kasan_bitops_generic+0x117/0x1c0
[ 27.610182] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 27.610600] ? __pfx_read_tsc+0x10/0x10
[ 27.610889] ? ktime_get_ts64+0x84/0x230
[ 27.611165] kunit_try_run_case+0x1b3/0x490
[ 27.611811] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.612453] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.613179] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.614538] ? __kthread_parkme+0x82/0x160
[ 27.615271] ? preempt_count_sub+0x50/0x80
[ 27.615777] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.616438] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.617558] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.618225] kthread+0x257/0x310
[ 27.618628] ? __pfx_kthread+0x10/0x10
[ 27.618965] ret_from_fork+0x41/0x80
[ 27.619620] ? __pfx_kthread+0x10/0x10
[ 27.620011] ret_from_fork_asm+0x1a/0x30
[ 27.620572] </TASK>
[ 27.620771]
[ 27.620953] Allocated by task 269:
[ 27.621452] kasan_save_stack+0x3d/0x60
[ 27.621892] kasan_save_track+0x18/0x40
[ 27.622907] kasan_save_alloc_info+0x3b/0x50
[ 27.623584] __kasan_kmalloc+0xb7/0xc0
[ 27.624043] __kmalloc_cache_noprof+0x184/0x410
[ 27.624363] kasan_bitops_generic+0x93/0x1c0
[ 27.625084] kunit_try_run_case+0x1b3/0x490
[ 27.625458] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.626408] kthread+0x257/0x310
[ 27.626712] ret_from_fork+0x41/0x80
[ 27.627654] ret_from_fork_asm+0x1a/0x30
[ 27.628057]
[ 27.628473] The buggy address belongs to the object at ffff888101e49d00
[ 27.628473] which belongs to the cache kmalloc-16 of size 16
[ 27.629520] The buggy address is located 8 bytes inside of
[ 27.629520] allocated 9-byte region [ffff888101e49d00, ffff888101e49d09)
[ 27.630433]
[ 27.630766] The buggy address belongs to the physical page:
[ 27.631412] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[ 27.631944] flags: 0x200000000000000(node=0|zone=2)
[ 27.632521] page_type: f5(slab)
[ 27.633326] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 27.633848] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 27.634594] page dumped because: kasan: bad access detected
[ 27.634988]
[ 27.635235] Memory state around the buggy address:
[ 27.636070] ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[ 27.637392] ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 27.638162] >ffff888101e49d00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.638744] ^
[ 27.639045] ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.640162] ffff888101e49e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.640784] ==================================================================
---
[ 27.552414] ==================================================================
[ 27.553430] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50
[ 27.554195] Write of size 8 at addr ffff888101e49d08 by task kunit_try_catch/269
[ 27.554928]
[ 27.555158] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.556038] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.556340] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.557269] Call Trace:
[ 27.557987] <TASK>
[ 27.558321] dump_stack_lvl+0x73/0xb0
[ 27.558805] print_report+0xd1/0x640
[ 27.559193] ? __virt_addr_valid+0x1db/0x2d0
[ 27.559823] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.560367] kasan_report+0x102/0x140
[ 27.560767] ? kasan_bitops_modify.constprop.0+0x374/0xd50
[ 27.561175] ? kasan_bitops_modify.constprop.0+0x374/0xd50
[ 27.562117] kasan_check_range+0x10c/0x1c0
[ 27.562728] __kasan_check_write+0x18/0x20
[ 27.563063] kasan_bitops_modify.constprop.0+0x374/0xd50
[ 27.564104] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 27.564567] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.565218] ? trace_hardirqs_on+0x37/0xe0
[ 27.565817] ? kasan_bitops_generic+0x93/0x1c0
[ 27.566266] kasan_bitops_generic+0x117/0x1c0
[ 27.566941] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 27.567492] ? __pfx_read_tsc+0x10/0x10
[ 27.567975] ? ktime_get_ts64+0x84/0x230
[ 27.568284] kunit_try_run_case+0x1b3/0x490
[ 27.568725] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.569886] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.570400] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.571061] ? __kthread_parkme+0x82/0x160
[ 27.571508] ? preempt_count_sub+0x50/0x80
[ 27.572092] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.572725] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.573370] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.574426] kthread+0x257/0x310
[ 27.574982] ? __pfx_kthread+0x10/0x10
[ 27.575353] ret_from_fork+0x41/0x80
[ 27.575912] ? __pfx_kthread+0x10/0x10
[ 27.576281] ret_from_fork_asm+0x1a/0x30
[ 27.576919] </TASK>
[ 27.577149]
[ 27.577350] Allocated by task 269:
[ 27.577691] kasan_save_stack+0x3d/0x60
[ 27.578095] kasan_save_track+0x18/0x40
[ 27.579028] kasan_save_alloc_info+0x3b/0x50
[ 27.579380] __kasan_kmalloc+0xb7/0xc0
[ 27.579712] __kmalloc_cache_noprof+0x184/0x410
[ 27.580156] kasan_bitops_generic+0x93/0x1c0
[ 27.580608] kunit_try_run_case+0x1b3/0x490
[ 27.581013] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.581806] kthread+0x257/0x310
[ 27.582079] ret_from_fork+0x41/0x80
[ 27.582351] ret_from_fork_asm+0x1a/0x30
[ 27.582926]
[ 27.583167] The buggy address belongs to the object at ffff888101e49d00
[ 27.583167] which belongs to the cache kmalloc-16 of size 16
[ 27.584340] The buggy address is located 8 bytes inside of
[ 27.584340] allocated 9-byte region [ffff888101e49d00, ffff888101e49d09)
[ 27.585848]
[ 27.586096] The buggy address belongs to the physical page:
[ 27.586711] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[ 27.587187] flags: 0x200000000000000(node=0|zone=2)
[ 27.587838] page_type: f5(slab)
[ 27.588261] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 27.589104] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 27.590007] page dumped because: kasan: bad access detected
[ 27.590644]
[ 27.590905] Memory state around the buggy address:
[ 27.591345] ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[ 27.592117] ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 27.592725] >ffff888101e49d00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.593355] ^
[ 27.593882] ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.594377] ffff888101e49e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.595378] ==================================================================
---
[ 27.687945] ==================================================================
[ 27.688528] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50
[ 27.689310] Write of size 8 at addr ffff888101e49d08 by task kunit_try_catch/269
[ 27.690204]
[ 27.690405] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.691676] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.692394] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.693279] Call Trace:
[ 27.693558] <TASK>
[ 27.693952] dump_stack_lvl+0x73/0xb0
[ 27.695281] print_report+0xd1/0x640
[ 27.696439] ? __virt_addr_valid+0x1db/0x2d0
[ 27.697137] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.697769] kasan_report+0x102/0x140
[ 27.698614] ? kasan_bitops_modify.constprop.0+0x548/0xd50
[ 27.699611] ? kasan_bitops_modify.constprop.0+0x548/0xd50
[ 27.700407] kasan_check_range+0x10c/0x1c0
[ 27.700846] __kasan_check_write+0x18/0x20
[ 27.701332] kasan_bitops_modify.constprop.0+0x548/0xd50
[ 27.701800] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 27.702343] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.702942] ? trace_hardirqs_on+0x37/0xe0
[ 27.703408] ? kasan_bitops_generic+0x93/0x1c0
[ 27.704063] kasan_bitops_generic+0x117/0x1c0
[ 27.704684] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 27.705183] ? __pfx_read_tsc+0x10/0x10
[ 27.705995] ? ktime_get_ts64+0x84/0x230
[ 27.706470] kunit_try_run_case+0x1b3/0x490
[ 27.707081] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.707505] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.708202] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.708808] ? __kthread_parkme+0x82/0x160
[ 27.709156] ? preempt_count_sub+0x50/0x80
[ 27.709788] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.710309] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.711390] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.711787] kthread+0x257/0x310
[ 27.712154] ? __pfx_kthread+0x10/0x10
[ 27.712831] ret_from_fork+0x41/0x80
[ 27.713222] ? __pfx_kthread+0x10/0x10
[ 27.713777] ret_from_fork_asm+0x1a/0x30
[ 27.714298] </TASK>
[ 27.714679]
[ 27.714974] Allocated by task 269:
[ 27.715315] kasan_save_stack+0x3d/0x60
[ 27.716228] kasan_save_track+0x18/0x40
[ 27.716699] kasan_save_alloc_info+0x3b/0x50
[ 27.717167] __kasan_kmalloc+0xb7/0xc0
[ 27.717652] __kmalloc_cache_noprof+0x184/0x410
[ 27.718176] kasan_bitops_generic+0x93/0x1c0
[ 27.718826] kunit_try_run_case+0x1b3/0x490
[ 27.719308] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.719834] kthread+0x257/0x310
[ 27.720268] ret_from_fork+0x41/0x80
[ 27.721044] ret_from_fork_asm+0x1a/0x30
[ 27.721332]
[ 27.721555] The buggy address belongs to the object at ffff888101e49d00
[ 27.721555] which belongs to the cache kmalloc-16 of size 16
[ 27.722523] The buggy address is located 8 bytes inside of
[ 27.722523] allocated 9-byte region [ffff888101e49d00, ffff888101e49d09)
[ 27.723464]
[ 27.723727] The buggy address belongs to the physical page:
[ 27.724228] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[ 27.724772] flags: 0x200000000000000(node=0|zone=2)
[ 27.725173] page_type: f5(slab)
[ 27.725697] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 27.726453] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 27.727929] page dumped because: kasan: bad access detected
[ 27.728459]
[ 27.728804] Memory state around the buggy address:
[ 27.729225] ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[ 27.729884] ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 27.730445] >ffff888101e49d00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.731190] ^
[ 27.731504] ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.732749] ffff888101e49e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.733361] ==================================================================
---
[ 27.414815] ==================================================================
[ 27.415349] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50
[ 27.416112] Write of size 8 at addr ffff888101e49d08 by task kunit_try_catch/269
[ 27.416553]
[ 27.416790] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.417388] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.417775] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.418958] Call Trace:
[ 27.419215] <TASK>
[ 27.419401] dump_stack_lvl+0x73/0xb0
[ 27.419845] print_report+0xd1/0x640
[ 27.420480] ? __virt_addr_valid+0x1db/0x2d0
[ 27.421179] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.421543] kasan_report+0x102/0x140
[ 27.422544] ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[ 27.423238] ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[ 27.423881] kasan_check_range+0x10c/0x1c0
[ 27.424305] __kasan_check_write+0x18/0x20
[ 27.424793] kasan_bitops_modify.constprop.0+0x19d/0xd50
[ 27.425466] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 27.426514] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.426878] ? trace_hardirqs_on+0x37/0xe0
[ 27.427452] ? kasan_bitops_generic+0x93/0x1c0
[ 27.427933] kasan_bitops_generic+0x117/0x1c0
[ 27.428423] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 27.429053] ? __pfx_read_tsc+0x10/0x10
[ 27.429478] ? ktime_get_ts64+0x84/0x230
[ 27.429869] kunit_try_run_case+0x1b3/0x490
[ 27.430378] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.431084] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.431433] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.431952] ? __kthread_parkme+0x82/0x160
[ 27.432995] ? preempt_count_sub+0x50/0x80
[ 27.433408] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.433720] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.434419] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.435114] kthread+0x257/0x310
[ 27.435642] ? __pfx_kthread+0x10/0x10
[ 27.436132] ret_from_fork+0x41/0x80
[ 27.436422] ? __pfx_kthread+0x10/0x10
[ 27.436818] ret_from_fork_asm+0x1a/0x30
[ 27.437428] </TASK>
[ 27.437692]
[ 27.437894] Allocated by task 269:
[ 27.438380] kasan_save_stack+0x3d/0x60
[ 27.438650] kasan_save_track+0x18/0x40
[ 27.439055] kasan_save_alloc_info+0x3b/0x50
[ 27.439653] __kasan_kmalloc+0xb7/0xc0
[ 27.440598] __kmalloc_cache_noprof+0x184/0x410
[ 27.441340] kasan_bitops_generic+0x93/0x1c0
[ 27.441658] kunit_try_run_case+0x1b3/0x490
[ 27.442204] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.442899] kthread+0x257/0x310
[ 27.443150] ret_from_fork+0x41/0x80
[ 27.443681] ret_from_fork_asm+0x1a/0x30
[ 27.444370]
[ 27.444629] The buggy address belongs to the object at ffff888101e49d00
[ 27.444629] which belongs to the cache kmalloc-16 of size 16
[ 27.445464] The buggy address is located 8 bytes inside of
[ 27.445464] allocated 9-byte region [ffff888101e49d00, ffff888101e49d09)
[ 27.445998]
[ 27.446144] The buggy address belongs to the physical page:
[ 27.447307] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[ 27.448220] flags: 0x200000000000000(node=0|zone=2)
[ 27.449057] page_type: f5(slab)
[ 27.449686] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 27.451148] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 27.451861] page dumped because: kasan: bad access detected
[ 27.453503]
[ 27.453701] Memory state around the buggy address:
[ 27.454078] ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[ 27.454529] ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 27.455488] >ffff888101e49d00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.456045] ^
[ 27.456289] ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.456641] ffff888101e49e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.457231] ==================================================================
---
[ 27.505920] ==================================================================
[ 27.507156] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50
[ 27.508105] Write of size 8 at addr ffff888101e49d08 by task kunit_try_catch/269
[ 27.509059]
[ 27.509327] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.510371] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.510779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.512188] Call Trace:
[ 27.512409] <TASK>
[ 27.512676] dump_stack_lvl+0x73/0xb0
[ 27.513094] print_report+0xd1/0x640
[ 27.513508] ? __virt_addr_valid+0x1db/0x2d0
[ 27.514208] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.514940] kasan_report+0x102/0x140
[ 27.515212] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[ 27.516214] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[ 27.516690] kasan_check_range+0x10c/0x1c0
[ 27.517044] __kasan_check_write+0x18/0x20
[ 27.517887] kasan_bitops_modify.constprop.0+0x2d6/0xd50
[ 27.518307] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 27.519216] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.520278] ? trace_hardirqs_on+0x37/0xe0
[ 27.520700] ? kasan_bitops_generic+0x93/0x1c0
[ 27.521616] kasan_bitops_generic+0x117/0x1c0
[ 27.522177] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 27.522614] ? __pfx_read_tsc+0x10/0x10
[ 27.523163] ? ktime_get_ts64+0x84/0x230
[ 27.523760] kunit_try_run_case+0x1b3/0x490
[ 27.524592] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.525110] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.525623] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.526330] ? __kthread_parkme+0x82/0x160
[ 27.526900] ? preempt_count_sub+0x50/0x80
[ 27.527472] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.528252] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.528781] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.529320] kthread+0x257/0x310
[ 27.529721] ? __pfx_kthread+0x10/0x10
[ 27.530141] ret_from_fork+0x41/0x80
[ 27.531262] ? __pfx_kthread+0x10/0x10
[ 27.531675] ret_from_fork_asm+0x1a/0x30
[ 27.532034] </TASK>
[ 27.532275]
[ 27.532472] Allocated by task 269:
[ 27.532792] kasan_save_stack+0x3d/0x60
[ 27.533221] kasan_save_track+0x18/0x40
[ 27.534228] kasan_save_alloc_info+0x3b/0x50
[ 27.534579] __kasan_kmalloc+0xb7/0xc0
[ 27.535120] __kmalloc_cache_noprof+0x184/0x410
[ 27.535526] kasan_bitops_generic+0x93/0x1c0
[ 27.536415] kunit_try_run_case+0x1b3/0x490
[ 27.536793] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.537342] kthread+0x257/0x310
[ 27.537692] ret_from_fork+0x41/0x80
[ 27.538398] ret_from_fork_asm+0x1a/0x30
[ 27.539095]
[ 27.539318] The buggy address belongs to the object at ffff888101e49d00
[ 27.539318] which belongs to the cache kmalloc-16 of size 16
[ 27.540089] The buggy address is located 8 bytes inside of
[ 27.540089] allocated 9-byte region [ffff888101e49d00, ffff888101e49d09)
[ 27.541560]
[ 27.542455] The buggy address belongs to the physical page:
[ 27.542726] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[ 27.543849] flags: 0x200000000000000(node=0|zone=2)
[ 27.544365] page_type: f5(slab)
[ 27.545143] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 27.545857] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 27.546394] page dumped because: kasan: bad access detected
[ 27.547162]
[ 27.547321] Memory state around the buggy address:
[ 27.547950] ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[ 27.548645] ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 27.549225] >ffff888101e49d00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.549700] ^
[ 27.550070] ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.550438] ffff888101e49e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.551198] ==================================================================
Home
[ 28.061989] ==================================================================
[ 28.062914] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[ 28.063856] Read of size 8 at addr ffff888101e49d08 by task kunit_try_catch/269
[ 28.064625]
[ 28.064797] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 28.065234] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.065508] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 28.066270] Call Trace:
[ 28.066507] <TASK>
[ 28.066707] dump_stack_lvl+0x73/0xb0
[ 28.067088] print_report+0xd1/0x640
[ 28.067470] ? __virt_addr_valid+0x1db/0x2d0
[ 28.068490] ? kasan_complete_mode_report_info+0x2a/0x200
[ 28.069418] kasan_report+0x102/0x140
[ 28.069697] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[ 28.070385] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[ 28.070904] kasan_check_range+0x10c/0x1c0
[ 28.071304] __kasan_check_read+0x15/0x20
[ 28.071629] kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[ 28.072299] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 28.072967] ? __kmalloc_cache_noprof+0x184/0x410
[ 28.073439] ? trace_hardirqs_on+0x37/0xe0
[ 28.073729] ? kasan_bitops_generic+0x93/0x1c0
[ 28.074581] kasan_bitops_generic+0x122/0x1c0
[ 28.075345] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 28.075843] ? __pfx_read_tsc+0x10/0x10
[ 28.076421] ? ktime_get_ts64+0x84/0x230
[ 28.076744] kunit_try_run_case+0x1b3/0x490
[ 28.077176] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.077783] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 28.078469] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 28.078813] ? __kthread_parkme+0x82/0x160
[ 28.079517] ? preempt_count_sub+0x50/0x80
[ 28.079959] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.080392] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.080981] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.081652] kthread+0x257/0x310
[ 28.081968] ? __pfx_kthread+0x10/0x10
[ 28.082475] ret_from_fork+0x41/0x80
[ 28.082817] ? __pfx_kthread+0x10/0x10
[ 28.083091] ret_from_fork_asm+0x1a/0x30
[ 28.083590] </TASK>
[ 28.083853]
[ 28.084086] Allocated by task 269:
[ 28.084475] kasan_save_stack+0x3d/0x60
[ 28.084859] kasan_save_track+0x18/0x40
[ 28.085221] kasan_save_alloc_info+0x3b/0x50
[ 28.085673] __kasan_kmalloc+0xb7/0xc0
[ 28.086061] __kmalloc_cache_noprof+0x184/0x410
[ 28.087466] kasan_bitops_generic+0x93/0x1c0
[ 28.088040] kunit_try_run_case+0x1b3/0x490
[ 28.088577] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.089232] kthread+0x257/0x310
[ 28.089771] ret_from_fork+0x41/0x80
[ 28.090297] ret_from_fork_asm+0x1a/0x30
[ 28.090815]
[ 28.091099] The buggy address belongs to the object at ffff888101e49d00
[ 28.091099] which belongs to the cache kmalloc-16 of size 16
[ 28.092100] The buggy address is located 8 bytes inside of
[ 28.092100] allocated 9-byte region [ffff888101e49d00, ffff888101e49d09)
[ 28.093072]
[ 28.093322] The buggy address belongs to the physical page:
[ 28.093909] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[ 28.094671] flags: 0x200000000000000(node=0|zone=2)
[ 28.095354] page_type: f5(slab)
[ 28.095670] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 28.096329] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 28.096841] page dumped because: kasan: bad access detected
[ 28.097343]
[ 28.097492] Memory state around the buggy address:
[ 28.097940] ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[ 28.098503] ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 28.098901] >ffff888101e49d00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.099521] ^
[ 28.099916] ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.100347] ffff888101e49e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.100951] ==================================================================
Home
[ 27.830136] ==================================================================
[ 27.831174] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[ 27.833087] Write of size 8 at addr ffff888101e49d08 by task kunit_try_catch/269
[ 27.834614]
[ 27.834785] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.835462] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.835961] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.836937] Call Trace:
[ 27.837136] <TASK>
[ 27.837863] dump_stack_lvl+0x73/0xb0
[ 27.838292] print_report+0xd1/0x640
[ 27.839202] ? __virt_addr_valid+0x1db/0x2d0
[ 27.839790] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.840443] kasan_report+0x102/0x140
[ 27.840864] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[ 27.841556] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[ 27.842423] kasan_check_range+0x10c/0x1c0
[ 27.842979] __kasan_check_write+0x18/0x20
[ 27.843764] kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[ 27.844430] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 27.845050] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.845427] ? trace_hardirqs_on+0x37/0xe0
[ 27.845755] ? kasan_bitops_generic+0x93/0x1c0
[ 27.846175] kasan_bitops_generic+0x122/0x1c0
[ 27.847280] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 27.847785] ? __pfx_read_tsc+0x10/0x10
[ 27.848432] ? ktime_get_ts64+0x84/0x230
[ 27.849080] kunit_try_run_case+0x1b3/0x490
[ 27.849568] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.850017] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.850826] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.851924] ? __kthread_parkme+0x82/0x160
[ 27.852710] ? preempt_count_sub+0x50/0x80
[ 27.852910] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.853212] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.854168] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.854607] kthread+0x257/0x310
[ 27.854998] ? __pfx_kthread+0x10/0x10
[ 27.855519] ret_from_fork+0x41/0x80
[ 27.855788] ? __pfx_kthread+0x10/0x10
[ 27.856188] ret_from_fork_asm+0x1a/0x30
[ 27.856647] </TASK>
[ 27.856915]
[ 27.857118] Allocated by task 269:
[ 27.857717] kasan_save_stack+0x3d/0x60
[ 27.858208] kasan_save_track+0x18/0x40
[ 27.858729] kasan_save_alloc_info+0x3b/0x50
[ 27.859059] __kasan_kmalloc+0xb7/0xc0
[ 27.859515] __kmalloc_cache_noprof+0x184/0x410
[ 27.860082] kasan_bitops_generic+0x93/0x1c0
[ 27.860741] kunit_try_run_case+0x1b3/0x490
[ 27.861439] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.862201] kthread+0x257/0x310
[ 27.862467] ret_from_fork+0x41/0x80
[ 27.862723] ret_from_fork_asm+0x1a/0x30
[ 27.863171]
[ 27.863424] The buggy address belongs to the object at ffff888101e49d00
[ 27.863424] which belongs to the cache kmalloc-16 of size 16
[ 27.864405] The buggy address is located 8 bytes inside of
[ 27.864405] allocated 9-byte region [ffff888101e49d00, ffff888101e49d09)
[ 27.865342]
[ 27.865678] The buggy address belongs to the physical page:
[ 27.866103] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[ 27.866978] flags: 0x200000000000000(node=0|zone=2)
[ 27.867379] page_type: f5(slab)
[ 27.867650] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 27.868081] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 27.868633] page dumped because: kasan: bad access detected
[ 27.869149]
[ 27.869386] Memory state around the buggy address:
[ 27.870172] ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[ 27.871030] ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 27.872253] >ffff888101e49d00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.873122] ^
[ 27.873494] ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.874320] ffff888101e49e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.875051] ==================================================================
---
[ 27.876221] ==================================================================
[ 27.877269] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[ 27.878165] Write of size 8 at addr ffff888101e49d08 by task kunit_try_catch/269
[ 27.879110]
[ 27.879382] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.880637] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.881167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.881811] Call Trace:
[ 27.882412] <TASK>
[ 27.882971] dump_stack_lvl+0x73/0xb0
[ 27.883460] print_report+0xd1/0x640
[ 27.884040] ? __virt_addr_valid+0x1db/0x2d0
[ 27.884648] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.885213] kasan_report+0x102/0x140
[ 27.885580] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[ 27.886141] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[ 27.886741] kasan_check_range+0x10c/0x1c0
[ 27.887330] __kasan_check_write+0x18/0x20
[ 27.887983] kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[ 27.888800] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 27.889590] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.890335] ? trace_hardirqs_on+0x37/0xe0
[ 27.890887] ? kasan_bitops_generic+0x93/0x1c0
[ 27.891235] kasan_bitops_generic+0x122/0x1c0
[ 27.891672] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 27.892220] ? __pfx_read_tsc+0x10/0x10
[ 27.892939] ? ktime_get_ts64+0x84/0x230
[ 27.893228] kunit_try_run_case+0x1b3/0x490
[ 27.893546] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.894003] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.894572] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.895292] ? __kthread_parkme+0x82/0x160
[ 27.895700] ? preempt_count_sub+0x50/0x80
[ 27.896511] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.897114] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.898005] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.898440] kthread+0x257/0x310
[ 27.898821] ? __pfx_kthread+0x10/0x10
[ 27.899523] ret_from_fork+0x41/0x80
[ 27.900089] ? __pfx_kthread+0x10/0x10
[ 27.900573] ret_from_fork_asm+0x1a/0x30
[ 27.901187] </TASK>
[ 27.901456]
[ 27.901600] Allocated by task 269:
[ 27.902013] kasan_save_stack+0x3d/0x60
[ 27.902341] kasan_save_track+0x18/0x40
[ 27.903757] kasan_save_alloc_info+0x3b/0x50
[ 27.904062] __kasan_kmalloc+0xb7/0xc0
[ 27.904775] __kmalloc_cache_noprof+0x184/0x410
[ 27.905469] kasan_bitops_generic+0x93/0x1c0
[ 27.906321] kunit_try_run_case+0x1b3/0x490
[ 27.906708] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.907061] kthread+0x257/0x310
[ 27.907532] ret_from_fork+0x41/0x80
[ 27.908366] ret_from_fork_asm+0x1a/0x30
[ 27.908763]
[ 27.908943] The buggy address belongs to the object at ffff888101e49d00
[ 27.908943] which belongs to the cache kmalloc-16 of size 16
[ 27.910716] The buggy address is located 8 bytes inside of
[ 27.910716] allocated 9-byte region [ffff888101e49d00, ffff888101e49d09)
[ 27.911425]
[ 27.911675] The buggy address belongs to the physical page:
[ 27.912112] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[ 27.913087] flags: 0x200000000000000(node=0|zone=2)
[ 27.914038] page_type: f5(slab)
[ 27.914362] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 27.915534] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 27.916096] page dumped because: kasan: bad access detected
[ 27.916502]
[ 27.916667] Memory state around the buggy address:
[ 27.917052] ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[ 27.917920] ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 27.918629] >ffff888101e49d00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.919583] ^
[ 27.920356] ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.921048] ffff888101e49e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.921456] ==================================================================
---
[ 27.735372] ==================================================================
[ 27.736155] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[ 27.737034] Write of size 8 at addr ffff888101e49d08 by task kunit_try_catch/269
[ 27.737765]
[ 27.738039] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.738986] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.739302] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.740639] Call Trace:
[ 27.741159] <TASK>
[ 27.741460] dump_stack_lvl+0x73/0xb0
[ 27.742293] print_report+0xd1/0x640
[ 27.743201] ? __virt_addr_valid+0x1db/0x2d0
[ 27.743657] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.744443] kasan_report+0x102/0x140
[ 27.744816] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[ 27.745508] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[ 27.745912] kasan_check_range+0x10c/0x1c0
[ 27.746482] __kasan_check_write+0x18/0x20
[ 27.747398] kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[ 27.748262] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 27.749278] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.749891] ? trace_hardirqs_on+0x37/0xe0
[ 27.750610] ? kasan_bitops_generic+0x93/0x1c0
[ 27.751026] kasan_bitops_generic+0x122/0x1c0
[ 27.751493] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 27.751987] ? __pfx_read_tsc+0x10/0x10
[ 27.752461] ? ktime_get_ts64+0x84/0x230
[ 27.752805] kunit_try_run_case+0x1b3/0x490
[ 27.753480] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.754128] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.754819] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.755220] ? __kthread_parkme+0x82/0x160
[ 27.756155] ? preempt_count_sub+0x50/0x80
[ 27.756669] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.757136] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.757915] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.758403] kthread+0x257/0x310
[ 27.758992] ? __pfx_kthread+0x10/0x10
[ 27.759416] ret_from_fork+0x41/0x80
[ 27.759932] ? __pfx_kthread+0x10/0x10
[ 27.760355] ret_from_fork_asm+0x1a/0x30
[ 27.761238] </TASK>
[ 27.761521]
[ 27.761892] Allocated by task 269:
[ 27.762230] kasan_save_stack+0x3d/0x60
[ 27.762788] kasan_save_track+0x18/0x40
[ 27.763214] kasan_save_alloc_info+0x3b/0x50
[ 27.763799] __kasan_kmalloc+0xb7/0xc0
[ 27.764237] __kmalloc_cache_noprof+0x184/0x410
[ 27.764709] kasan_bitops_generic+0x93/0x1c0
[ 27.765373] kunit_try_run_case+0x1b3/0x490
[ 27.766006] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.766469] kthread+0x257/0x310
[ 27.766780] ret_from_fork+0x41/0x80
[ 27.767754] ret_from_fork_asm+0x1a/0x30
[ 27.768227]
[ 27.768427] The buggy address belongs to the object at ffff888101e49d00
[ 27.768427] which belongs to the cache kmalloc-16 of size 16
[ 27.769333] The buggy address is located 8 bytes inside of
[ 27.769333] allocated 9-byte region [ffff888101e49d00, ffff888101e49d09)
[ 27.770497]
[ 27.771150] The buggy address belongs to the physical page:
[ 27.771826] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[ 27.772570] flags: 0x200000000000000(node=0|zone=2)
[ 27.773182] page_type: f5(slab)
[ 27.773518] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 27.774066] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 27.775043] page dumped because: kasan: bad access detected
[ 27.775453]
[ 27.776184] Memory state around the buggy address:
[ 27.776666] ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[ 27.777290] ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 27.778115] >ffff888101e49d00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.778775] ^
[ 27.779194] ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.779845] ffff888101e49e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.780498] ==================================================================
---
[ 27.968639] ==================================================================
[ 27.969590] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[ 27.970735] Write of size 8 at addr ffff888101e49d08 by task kunit_try_catch/269
[ 27.971828]
[ 27.972121] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.973230] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.973499] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.974018] Call Trace:
[ 27.974328] <TASK>
[ 27.974605] dump_stack_lvl+0x73/0xb0
[ 27.975114] print_report+0xd1/0x640
[ 27.975428] ? __virt_addr_valid+0x1db/0x2d0
[ 27.976088] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.977056] kasan_report+0x102/0x140
[ 27.977521] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[ 27.978281] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[ 27.979032] kasan_check_range+0x10c/0x1c0
[ 27.979492] __kasan_check_write+0x18/0x20
[ 27.980152] kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[ 27.980787] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 27.981412] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.982382] ? trace_hardirqs_on+0x37/0xe0
[ 27.982963] ? kasan_bitops_generic+0x93/0x1c0
[ 27.983258] kasan_bitops_generic+0x122/0x1c0
[ 27.983909] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 27.984387] ? __pfx_read_tsc+0x10/0x10
[ 27.985000] ? ktime_get_ts64+0x84/0x230
[ 27.985392] kunit_try_run_case+0x1b3/0x490
[ 27.986033] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.986999] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.987458] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.987884] ? __kthread_parkme+0x82/0x160
[ 27.988332] ? preempt_count_sub+0x50/0x80
[ 27.988742] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.989061] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.989982] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.990489] kthread+0x257/0x310
[ 27.991075] ? __pfx_kthread+0x10/0x10
[ 27.991486] ret_from_fork+0x41/0x80
[ 27.992094] ? __pfx_kthread+0x10/0x10
[ 27.993011] ret_from_fork_asm+0x1a/0x30
[ 27.993415] </TASK>
[ 27.993852]
[ 27.994088] Allocated by task 269:
[ 27.994459] kasan_save_stack+0x3d/0x60
[ 27.995011] kasan_save_track+0x18/0x40
[ 27.995336] kasan_save_alloc_info+0x3b/0x50
[ 27.996029] __kasan_kmalloc+0xb7/0xc0
[ 27.996658] __kmalloc_cache_noprof+0x184/0x410
[ 27.997160] kasan_bitops_generic+0x93/0x1c0
[ 27.998008] kunit_try_run_case+0x1b3/0x490
[ 27.998639] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.999154] kthread+0x257/0x310
[ 27.999672] ret_from_fork+0x41/0x80
[ 28.000036] ret_from_fork_asm+0x1a/0x30
[ 28.000498]
[ 28.000846] The buggy address belongs to the object at ffff888101e49d00
[ 28.000846] which belongs to the cache kmalloc-16 of size 16
[ 28.001889] The buggy address is located 8 bytes inside of
[ 28.001889] allocated 9-byte region [ffff888101e49d00, ffff888101e49d09)
[ 28.002775]
[ 28.003014] The buggy address belongs to the physical page:
[ 28.004073] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[ 28.004966] flags: 0x200000000000000(node=0|zone=2)
[ 28.005316] page_type: f5(slab)
[ 28.005837] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 28.006355] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 28.007203] page dumped because: kasan: bad access detected
[ 28.007851]
[ 28.008384] Memory state around the buggy address:
[ 28.008779] ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[ 28.009385] ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 28.009830] >ffff888101e49d00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.010816] ^
[ 28.011213] ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.011825] ffff888101e49e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.012487] ==================================================================
---
[ 27.922666] ==================================================================
[ 27.923388] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[ 27.924213] Write of size 8 at addr ffff888101e49d08 by task kunit_try_catch/269
[ 27.925084]
[ 27.925347] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.926222] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.926518] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.927037] Call Trace:
[ 27.927685] <TASK>
[ 27.928010] dump_stack_lvl+0x73/0xb0
[ 27.928447] print_report+0xd1/0x640
[ 27.929664] ? __virt_addr_valid+0x1db/0x2d0
[ 27.930222] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.930999] kasan_report+0x102/0x140
[ 27.931430] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[ 27.932205] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[ 27.932956] kasan_check_range+0x10c/0x1c0
[ 27.933503] __kasan_check_write+0x18/0x20
[ 27.934591] kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[ 27.935171] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 27.935787] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.936150] ? trace_hardirqs_on+0x37/0xe0
[ 27.937203] ? kasan_bitops_generic+0x93/0x1c0
[ 27.937843] kasan_bitops_generic+0x122/0x1c0
[ 27.938551] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 27.938926] ? __pfx_read_tsc+0x10/0x10
[ 27.939286] ? ktime_get_ts64+0x84/0x230
[ 27.939705] kunit_try_run_case+0x1b3/0x490
[ 27.940223] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.940682] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.941050] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.942144] ? __kthread_parkme+0x82/0x160
[ 27.942428] ? preempt_count_sub+0x50/0x80
[ 27.942918] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.943971] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.944760] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.945411] kthread+0x257/0x310
[ 27.946026] ? __pfx_kthread+0x10/0x10
[ 27.946472] ret_from_fork+0x41/0x80
[ 27.947226] ? __pfx_kthread+0x10/0x10
[ 27.947636] ret_from_fork_asm+0x1a/0x30
[ 27.948377] </TASK>
[ 27.948852]
[ 27.949147] Allocated by task 269:
[ 27.949598] kasan_save_stack+0x3d/0x60
[ 27.950222] kasan_save_track+0x18/0x40
[ 27.950774] kasan_save_alloc_info+0x3b/0x50
[ 27.951140] __kasan_kmalloc+0xb7/0xc0
[ 27.951555] __kmalloc_cache_noprof+0x184/0x410
[ 27.952528] kasan_bitops_generic+0x93/0x1c0
[ 27.953170] kunit_try_run_case+0x1b3/0x490
[ 27.953705] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.954231] kthread+0x257/0x310
[ 27.954780] ret_from_fork+0x41/0x80
[ 27.955094] ret_from_fork_asm+0x1a/0x30
[ 27.955696]
[ 27.955973] The buggy address belongs to the object at ffff888101e49d00
[ 27.955973] which belongs to the cache kmalloc-16 of size 16
[ 27.957289] The buggy address is located 8 bytes inside of
[ 27.957289] allocated 9-byte region [ffff888101e49d00, ffff888101e49d09)
[ 27.958438]
[ 27.958807] The buggy address belongs to the physical page:
[ 27.959277] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[ 27.960057] flags: 0x200000000000000(node=0|zone=2)
[ 27.960683] page_type: f5(slab)
[ 27.961001] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 27.962194] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 27.962773] page dumped because: kasan: bad access detected
[ 27.963220]
[ 27.963490] Memory state around the buggy address:
[ 27.964159] ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[ 27.964962] ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 27.965392] >ffff888101e49d00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.966288] ^
[ 27.966519] ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.967484] ffff888101e49e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.968098] ==================================================================
---
[ 28.015076] ==================================================================
[ 28.015973] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[ 28.016639] Write of size 8 at addr ffff888101e49d08 by task kunit_try_catch/269
[ 28.017274]
[ 28.017650] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 28.018433] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.018993] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 28.019723] Call Trace:
[ 28.020078] <TASK>
[ 28.020386] dump_stack_lvl+0x73/0xb0
[ 28.021370] print_report+0xd1/0x640
[ 28.021722] ? __virt_addr_valid+0x1db/0x2d0
[ 28.022398] ? kasan_complete_mode_report_info+0x2a/0x200
[ 28.022983] kasan_report+0x102/0x140
[ 28.023428] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[ 28.024070] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[ 28.024845] kasan_check_range+0x10c/0x1c0
[ 28.025325] __kasan_check_write+0x18/0x20
[ 28.026164] kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[ 28.026820] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 28.027507] ? __kmalloc_cache_noprof+0x184/0x410
[ 28.028135] ? trace_hardirqs_on+0x37/0xe0
[ 28.028670] ? kasan_bitops_generic+0x93/0x1c0
[ 28.029120] kasan_bitops_generic+0x122/0x1c0
[ 28.029716] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 28.030359] ? __pfx_read_tsc+0x10/0x10
[ 28.030743] ? ktime_get_ts64+0x84/0x230
[ 28.031264] kunit_try_run_case+0x1b3/0x490
[ 28.031569] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.032080] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 28.033041] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 28.033512] ? __kthread_parkme+0x82/0x160
[ 28.034447] ? preempt_count_sub+0x50/0x80
[ 28.035018] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.035788] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.036510] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.037301] kthread+0x257/0x310
[ 28.037628] ? __pfx_kthread+0x10/0x10
[ 28.038558] ret_from_fork+0x41/0x80
[ 28.039216] ? __pfx_kthread+0x10/0x10
[ 28.040123] ret_from_fork_asm+0x1a/0x30
[ 28.040542] </TASK>
[ 28.040920]
[ 28.041140] Allocated by task 269:
[ 28.041646] kasan_save_stack+0x3d/0x60
[ 28.042295] kasan_save_track+0x18/0x40
[ 28.042723] kasan_save_alloc_info+0x3b/0x50
[ 28.043313] __kasan_kmalloc+0xb7/0xc0
[ 28.043596] __kmalloc_cache_noprof+0x184/0x410
[ 28.044098] kasan_bitops_generic+0x93/0x1c0
[ 28.045129] kunit_try_run_case+0x1b3/0x490
[ 28.045557] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.046314] kthread+0x257/0x310
[ 28.046792] ret_from_fork+0x41/0x80
[ 28.047067] ret_from_fork_asm+0x1a/0x30
[ 28.047656]
[ 28.047880] The buggy address belongs to the object at ffff888101e49d00
[ 28.047880] which belongs to the cache kmalloc-16 of size 16
[ 28.048974] The buggy address is located 8 bytes inside of
[ 28.048974] allocated 9-byte region [ffff888101e49d00, ffff888101e49d09)
[ 28.049603]
[ 28.049821] The buggy address belongs to the physical page:
[ 28.050378] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[ 28.051702] flags: 0x200000000000000(node=0|zone=2)
[ 28.052155] page_type: f5(slab)
[ 28.052416] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 28.053006] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 28.053808] page dumped because: kasan: bad access detected
[ 28.054301]
[ 28.054490] Memory state around the buggy address:
[ 28.054910] ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[ 28.055449] ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 28.056346] >ffff888101e49d00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.056970] ^
[ 28.057312] ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.058324] ffff888101e49e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.058682] ==================================================================
---
[ 27.782090] ==================================================================
[ 27.782678] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[ 27.783495] Write of size 8 at addr ffff888101e49d08 by task kunit_try_catch/269
[ 27.784324]
[ 27.784714] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.785665] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.786106] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.786997] Call Trace:
[ 27.787307] <TASK>
[ 27.788076] dump_stack_lvl+0x73/0xb0
[ 27.788654] print_report+0xd1/0x640
[ 27.789217] ? __virt_addr_valid+0x1db/0x2d0
[ 27.789805] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.790383] kasan_report+0x102/0x140
[ 27.791026] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[ 27.791678] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[ 27.792347] kasan_check_range+0x10c/0x1c0
[ 27.793316] __kasan_check_write+0x18/0x20
[ 27.793656] kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[ 27.794255] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 27.794783] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.795383] ? trace_hardirqs_on+0x37/0xe0
[ 27.796050] ? kasan_bitops_generic+0x93/0x1c0
[ 27.796639] kasan_bitops_generic+0x122/0x1c0
[ 27.797082] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 27.797500] ? __pfx_read_tsc+0x10/0x10
[ 27.798317] ? ktime_get_ts64+0x84/0x230
[ 27.798813] kunit_try_run_case+0x1b3/0x490
[ 27.799488] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.800166] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.800627] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.801931] ? __kthread_parkme+0x82/0x160
[ 27.802448] ? preempt_count_sub+0x50/0x80
[ 27.803237] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.803850] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.804492] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.805155] kthread+0x257/0x310
[ 27.805459] ? __pfx_kthread+0x10/0x10
[ 27.805827] ret_from_fork+0x41/0x80
[ 27.807092] ? __pfx_kthread+0x10/0x10
[ 27.807505] ret_from_fork_asm+0x1a/0x30
[ 27.808393] </TASK>
[ 27.808607]
[ 27.808778] Allocated by task 269:
[ 27.809070] kasan_save_stack+0x3d/0x60
[ 27.809466] kasan_save_track+0x18/0x40
[ 27.809784] kasan_save_alloc_info+0x3b/0x50
[ 27.810422] __kasan_kmalloc+0xb7/0xc0
[ 27.810878] __kmalloc_cache_noprof+0x184/0x410
[ 27.811479] kasan_bitops_generic+0x93/0x1c0
[ 27.812115] kunit_try_run_case+0x1b3/0x490
[ 27.812586] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.813235] kthread+0x257/0x310
[ 27.814038] ret_from_fork+0x41/0x80
[ 27.814430] ret_from_fork_asm+0x1a/0x30
[ 27.815222]
[ 27.815459] The buggy address belongs to the object at ffff888101e49d00
[ 27.815459] which belongs to the cache kmalloc-16 of size 16
[ 27.816663] The buggy address is located 8 bytes inside of
[ 27.816663] allocated 9-byte region [ffff888101e49d00, ffff888101e49d09)
[ 27.818150]
[ 27.818317] The buggy address belongs to the physical page:
[ 27.819144] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[ 27.820010] flags: 0x200000000000000(node=0|zone=2)
[ 27.820290] page_type: f5(slab)
[ 27.820544] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 27.821666] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 27.822713] page dumped because: kasan: bad access detected
[ 27.823527]
[ 27.823799] Memory state around the buggy address:
[ 27.824428] ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[ 27.825110] ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 27.825615] >ffff888101e49d00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.826910] ^
[ 27.827154] ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.828514] ffff888101e49e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.829182] ==================================================================
Home
[ 28.102012] ==================================================================
[ 28.102930] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[ 28.103584] Read of size 8 at addr ffff888101e49d08 by task kunit_try_catch/269
[ 28.104148]
[ 28.104399] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 28.105159] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.105558] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 28.106218] Call Trace:
[ 28.106561] <TASK>
[ 28.106809] dump_stack_lvl+0x73/0xb0
[ 28.107324] print_report+0xd1/0x640
[ 28.107647] ? __virt_addr_valid+0x1db/0x2d0
[ 28.108192] ? kasan_complete_mode_report_info+0x2a/0x200
[ 28.108598] kasan_report+0x102/0x140
[ 28.108993] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[ 28.109607] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[ 28.110288] __asan_report_load8_noabort+0x18/0x20
[ 28.110720] kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[ 28.111377] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 28.111823] ? __kmalloc_cache_noprof+0x184/0x410
[ 28.112386] ? trace_hardirqs_on+0x37/0xe0
[ 28.112851] ? kasan_bitops_generic+0x93/0x1c0
[ 28.113254] kasan_bitops_generic+0x122/0x1c0
[ 28.113566] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 28.113926] ? __pfx_read_tsc+0x10/0x10
[ 28.114214] ? ktime_get_ts64+0x84/0x230
[ 28.114708] kunit_try_run_case+0x1b3/0x490
[ 28.115203] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.115727] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 28.116275] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 28.116830] ? __kthread_parkme+0x82/0x160
[ 28.117318] ? preempt_count_sub+0x50/0x80
[ 28.117806] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.118349] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.118994] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.119447] kthread+0x257/0x310
[ 28.119710] ? __pfx_kthread+0x10/0x10
[ 28.120046] ret_from_fork+0x41/0x80
[ 28.120493] ? __pfx_kthread+0x10/0x10
[ 28.120939] ret_from_fork_asm+0x1a/0x30
[ 28.121401] </TASK>
[ 28.122266]
[ 28.122809] Allocated by task 269:
[ 28.123547] kasan_save_stack+0x3d/0x60
[ 28.124235] kasan_save_track+0x18/0x40
[ 28.124526] kasan_save_alloc_info+0x3b/0x50
[ 28.124805] __kasan_kmalloc+0xb7/0xc0
[ 28.125258] __kmalloc_cache_noprof+0x184/0x410
[ 28.125800] kasan_bitops_generic+0x93/0x1c0
[ 28.126385] kunit_try_run_case+0x1b3/0x490
[ 28.126916] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.127601] kthread+0x257/0x310
[ 28.127869] ret_from_fork+0x41/0x80
[ 28.128717] ret_from_fork_asm+0x1a/0x30
[ 28.129237]
[ 28.129401] The buggy address belongs to the object at ffff888101e49d00
[ 28.129401] which belongs to the cache kmalloc-16 of size 16
[ 28.130466] The buggy address is located 8 bytes inside of
[ 28.130466] allocated 9-byte region [ffff888101e49d00, ffff888101e49d09)
[ 28.131798]
[ 28.132034] The buggy address belongs to the physical page:
[ 28.132515] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[ 28.133027] flags: 0x200000000000000(node=0|zone=2)
[ 28.133481] page_type: f5(slab)
[ 28.133720] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 28.134357] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 28.135152] page dumped because: kasan: bad access detected
[ 28.135713]
[ 28.135970] Memory state around the buggy address:
[ 28.136421] ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[ 28.137088] ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[ 28.137646] >ffff888101e49d00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.138275] ^
[ 28.138608] ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.139271] ffff888101e49e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.139839] ==================================================================
Home
[ 24.504939] ==================================================================
[ 24.506200] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x170/0x330
[ 24.506786] Read of size 64 at addr ffff888101a8e504 by task kunit_try_catch/190
[ 24.507698]
[ 24.508015] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 24.508711] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.509305] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 24.509982] Call Trace:
[ 24.510311] <TASK>
[ 24.510723] dump_stack_lvl+0x73/0xb0
[ 24.511208] print_report+0xd1/0x640
[ 24.512280] ? __virt_addr_valid+0x1db/0x2d0
[ 24.512822] ? kasan_complete_mode_report_info+0x2a/0x200
[ 24.513401] kasan_report+0x102/0x140
[ 24.513917] ? kmalloc_memmove_invalid_size+0x170/0x330
[ 24.514377] ? kmalloc_memmove_invalid_size+0x170/0x330
[ 24.515121] kasan_check_range+0x10c/0x1c0
[ 24.515459] __asan_memmove+0x27/0x70
[ 24.516061] kmalloc_memmove_invalid_size+0x170/0x330
[ 24.516517] ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10
[ 24.517636] ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10
[ 24.518078] kunit_try_run_case+0x1b3/0x490
[ 24.518575] ? __pfx_kunit_try_run_case+0x10/0x10
[ 24.519125] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 24.519626] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 24.520280] ? __kthread_parkme+0x82/0x160
[ 24.520677] ? preempt_count_sub+0x50/0x80
[ 24.521298] ? __pfx_kunit_try_run_case+0x10/0x10
[ 24.522211] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 24.522657] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 24.523184] kthread+0x257/0x310
[ 24.523565] ? __pfx_kthread+0x10/0x10
[ 24.523887] ret_from_fork+0x41/0x80
[ 24.524214] ? __pfx_kthread+0x10/0x10
[ 24.525100] ret_from_fork_asm+0x1a/0x30
[ 24.525702] </TASK>
[ 24.526007]
[ 24.526203] Allocated by task 190:
[ 24.526442] kasan_save_stack+0x3d/0x60
[ 24.527038] kasan_save_track+0x18/0x40
[ 24.527476] kasan_save_alloc_info+0x3b/0x50
[ 24.528436] __kasan_kmalloc+0xb7/0xc0
[ 24.528992] __kmalloc_cache_noprof+0x184/0x410
[ 24.529410] kmalloc_memmove_invalid_size+0xad/0x330
[ 24.530060] kunit_try_run_case+0x1b3/0x490
[ 24.530505] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 24.531089] kthread+0x257/0x310
[ 24.531521] ret_from_fork+0x41/0x80
[ 24.531908] ret_from_fork_asm+0x1a/0x30
[ 24.532507]
[ 24.533195] The buggy address belongs to the object at ffff888101a8e500
[ 24.533195] which belongs to the cache kmalloc-64 of size 64
[ 24.534195] The buggy address is located 4 bytes inside of
[ 24.534195] allocated 64-byte region [ffff888101a8e500, ffff888101a8e540)
[ 24.535160]
[ 24.535436] The buggy address belongs to the physical page:
[ 24.536058] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a8e
[ 24.536910] flags: 0x200000000000000(node=0|zone=2)
[ 24.537415] page_type: f5(slab)
[ 24.538017] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 24.538736] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 24.539403] page dumped because: kasan: bad access detected
[ 24.540005]
[ 24.540153] Memory state around the buggy address:
[ 24.540785] ffff888101a8e400: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[ 24.541675] ffff888101a8e480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 24.542381] >ffff888101a8e500: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 24.543423] ^
[ 24.543803] ffff888101a8e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.544347] ffff888101a8e600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.544907] ==================================================================
Home
[ 23.027324] ==================================================================
[ 23.028296] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x363/0x3c0
[ 23.028631] Read of size 1 at addr ffff888101e49cdf by task kunit_try_catch/146
[ 23.029320]
[ 23.029512] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 23.030173] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.030689] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 23.031174] Call Trace:
[ 23.031816] <TASK>
[ 23.032104] dump_stack_lvl+0x73/0xb0
[ 23.032544] print_report+0xd1/0x640
[ 23.032892] ? __virt_addr_valid+0x1db/0x2d0
[ 23.033357] ? kasan_complete_mode_report_info+0x2a/0x200
[ 23.033839] kasan_report+0x102/0x140
[ 23.034379] ? kmalloc_oob_left+0x363/0x3c0
[ 23.034667] ? kmalloc_oob_left+0x363/0x3c0
[ 23.035292] __asan_report_load1_noabort+0x18/0x20
[ 23.035804] kmalloc_oob_left+0x363/0x3c0
[ 23.036098] ? __pfx_kmalloc_oob_left+0x10/0x10
[ 23.036600] ? __schedule+0xc3e/0x2790
[ 23.037199] ? __pfx_read_tsc+0x10/0x10
[ 23.037497] ? ktime_get_ts64+0x84/0x230
[ 23.037951] kunit_try_run_case+0x1b3/0x490
[ 23.038408] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.038844] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 23.039152] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 23.039490] ? __kthread_parkme+0x82/0x160
[ 23.039971] ? preempt_count_sub+0x50/0x80
[ 23.040437] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.040901] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 23.041525] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.041911] kthread+0x257/0x310
[ 23.042323] ? __pfx_kthread+0x10/0x10
[ 23.042711] ret_from_fork+0x41/0x80
[ 23.043325] ? __pfx_kthread+0x10/0x10
[ 23.043598] ret_from_fork_asm+0x1a/0x30
[ 23.044049] </TASK>
[ 23.044367]
[ 23.044610] Allocated by task 26:
[ 23.044861] kasan_save_stack+0x3d/0x60
[ 23.045390] kasan_save_track+0x18/0x40
[ 23.045679] kasan_save_alloc_info+0x3b/0x50
[ 23.045961] __kasan_kmalloc+0xb7/0xc0
[ 23.046386] __kmalloc_node_track_caller_noprof+0x1c6/0x500
[ 23.047115] kvasprintf+0xc6/0x150
[ 23.047453] __kthread_create_on_node+0x18c/0x3a0
[ 23.047857] kthread_create_on_node+0xa8/0xe0
[ 23.048330] create_worker+0x3c8/0x7a0
[ 23.048657] worker_thread+0x97d/0x1300
[ 23.049170] kthread+0x257/0x310
[ 23.050102] ret_from_fork+0x41/0x80
[ 23.050385] ret_from_fork_asm+0x1a/0x30
[ 23.050654]
[ 23.050881] The buggy address belongs to the object at ffff888101e49cc0
[ 23.050881] which belongs to the cache kmalloc-16 of size 16
[ 23.052483] The buggy address is located 19 bytes to the right of
[ 23.052483] allocated 12-byte region [ffff888101e49cc0, ffff888101e49ccc)
[ 23.053588]
[ 23.053851] The buggy address belongs to the physical page:
[ 23.054449] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[ 23.055283] flags: 0x200000000000000(node=0|zone=2)
[ 23.055746] page_type: f5(slab)
[ 23.056098] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 23.056670] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 23.057398] page dumped because: kasan: bad access detected
[ 23.057984]
[ 23.058179] Memory state around the buggy address:
[ 23.058623] ffff888101e49b80: fa fb fc fc 00 02 fc fc 00 05 fc fc 00 02 fc fc
[ 23.059235] ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[ 23.059901] >ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc 00 07 fc fc
[ 23.060551] ^
[ 23.061005] ffff888101e49d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.061704] ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.062270] ==================================================================
Home
[ 24.411855] ==================================================================
[ 24.413003] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x167/0x330
[ 24.413656] Write of size 16 at addr ffff888102a2aa69 by task kunit_try_catch/186
[ 24.414624]
[ 24.415482] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 24.416237] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.416723] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 24.417583] Call Trace:
[ 24.418007] <TASK>
[ 24.418602] dump_stack_lvl+0x73/0xb0
[ 24.419120] print_report+0xd1/0x640
[ 24.419488] ? __virt_addr_valid+0x1db/0x2d0
[ 24.420015] ? kasan_complete_mode_report_info+0x2a/0x200
[ 24.421258] kasan_report+0x102/0x140
[ 24.421553] ? kmalloc_oob_memset_16+0x167/0x330
[ 24.421887] ? kmalloc_oob_memset_16+0x167/0x330
[ 24.422500] kasan_check_range+0x10c/0x1c0
[ 24.422877] __asan_memset+0x27/0x50
[ 24.423712] kmalloc_oob_memset_16+0x167/0x330
[ 24.424078] ? __pfx_kmalloc_oob_memset_16+0x10/0x10
[ 24.424735] ? __pfx_kmalloc_oob_memset_16+0x10/0x10
[ 24.425276] kunit_try_run_case+0x1b3/0x490
[ 24.425817] ? __pfx_kunit_try_run_case+0x10/0x10
[ 24.426335] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 24.427147] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 24.427603] ? __kthread_parkme+0x82/0x160
[ 24.427910] ? preempt_count_sub+0x50/0x80
[ 24.428340] ? __pfx_kunit_try_run_case+0x10/0x10
[ 24.428679] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 24.429233] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 24.430130] kthread+0x257/0x310
[ 24.430514] ? __pfx_kthread+0x10/0x10
[ 24.431286] ret_from_fork+0x41/0x80
[ 24.431742] ? __pfx_kthread+0x10/0x10
[ 24.432173] ret_from_fork_asm+0x1a/0x30
[ 24.432757] </TASK>
[ 24.433047]
[ 24.433268] Allocated by task 186:
[ 24.433748] kasan_save_stack+0x3d/0x60
[ 24.434172] kasan_save_track+0x18/0x40
[ 24.434924] kasan_save_alloc_info+0x3b/0x50
[ 24.435311] __kasan_kmalloc+0xb7/0xc0
[ 24.435612] __kmalloc_cache_noprof+0x184/0x410
[ 24.435892] kmalloc_oob_memset_16+0xad/0x330
[ 24.436346] kunit_try_run_case+0x1b3/0x490
[ 24.436759] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 24.437172] kthread+0x257/0x310
[ 24.437436] ret_from_fork+0x41/0x80
[ 24.438011] ret_from_fork_asm+0x1a/0x30
[ 24.438427]
[ 24.438982] The buggy address belongs to the object at ffff888102a2aa00
[ 24.438982] which belongs to the cache kmalloc-128 of size 128
[ 24.440091] The buggy address is located 105 bytes inside of
[ 24.440091] allocated 120-byte region [ffff888102a2aa00, ffff888102a2aa78)
[ 24.441065]
[ 24.441283] The buggy address belongs to the physical page:
[ 24.441707] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2a
[ 24.442095] flags: 0x200000000000000(node=0|zone=2)
[ 24.443054] page_type: f5(slab)
[ 24.443417] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[ 24.444196] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 24.444760] page dumped because: kasan: bad access detected
[ 24.445044]
[ 24.445223] Memory state around the buggy address:
[ 24.446020] ffff888102a2a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 24.446985] ffff888102a2a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.447721] >ffff888102a2aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 24.448165] ^
[ 24.448800] ffff888102a2aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.449426] ffff888102a2ab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.449883] ==================================================================
Home
[ 23.118930] ==================================================================
[ 23.120033] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4ca/0x530
[ 23.120764] Write of size 1 at addr ffff888101a8a278 by task kunit_try_catch/150
[ 23.121104]
[ 23.121350] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 23.121979] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.122375] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 23.122867] Call Trace:
[ 23.123135] <TASK>
[ 23.123445] dump_stack_lvl+0x73/0xb0
[ 23.123889] print_report+0xd1/0x640
[ 23.124296] ? __virt_addr_valid+0x1db/0x2d0
[ 23.124599] ? kasan_complete_mode_report_info+0x2a/0x200
[ 23.125150] kasan_report+0x102/0x140
[ 23.125474] ? kmalloc_track_caller_oob_right+0x4ca/0x530
[ 23.125900] ? kmalloc_track_caller_oob_right+0x4ca/0x530
[ 23.126380] __asan_report_store1_noabort+0x1b/0x30
[ 23.126701] kmalloc_track_caller_oob_right+0x4ca/0x530
[ 23.127267] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[ 23.127910] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[ 23.128538] kunit_try_run_case+0x1b3/0x490
[ 23.129051] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.129567] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 23.130107] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 23.130730] ? __kthread_parkme+0x82/0x160
[ 23.131229] ? preempt_count_sub+0x50/0x80
[ 23.131741] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.132285] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 23.132639] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.133090] kthread+0x257/0x310
[ 23.133513] ? __pfx_kthread+0x10/0x10
[ 23.133986] ret_from_fork+0x41/0x80
[ 23.134429] ? __pfx_kthread+0x10/0x10
[ 23.134895] ret_from_fork_asm+0x1a/0x30
[ 23.135396] </TASK>
[ 23.135681]
[ 23.135942] Allocated by task 150:
[ 23.136337] kasan_save_stack+0x3d/0x60
[ 23.136767] kasan_save_track+0x18/0x40
[ 23.137256] kasan_save_alloc_info+0x3b/0x50
[ 23.137721] __kasan_kmalloc+0xb7/0xc0
[ 23.138182] __kmalloc_node_track_caller_noprof+0x1c6/0x500
[ 23.138775] kmalloc_track_caller_oob_right+0x9a/0x530
[ 23.139354] kunit_try_run_case+0x1b3/0x490
[ 23.139830] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.140223] kthread+0x257/0x310
[ 23.140475] ret_from_fork+0x41/0x80
[ 23.140842] ret_from_fork_asm+0x1a/0x30
[ 23.141232]
[ 23.141454] The buggy address belongs to the object at ffff888101a8a200
[ 23.141454] which belongs to the cache kmalloc-128 of size 128
[ 23.142272] The buggy address is located 0 bytes to the right of
[ 23.142272] allocated 120-byte region [ffff888101a8a200, ffff888101a8a278)
[ 23.143025]
[ 23.143223] The buggy address belongs to the physical page:
[ 23.143693] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a8a
[ 23.144132] flags: 0x200000000000000(node=0|zone=2)
[ 23.144587] page_type: f5(slab)
[ 23.144977] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[ 23.145624] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 23.146079] page dumped because: kasan: bad access detected
[ 23.146423]
[ 23.146628] Memory state around the buggy address:
[ 23.147083] ffff888101a8a100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 23.147691] ffff888101a8a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.149327] >ffff888101a8a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 23.150175] ^
[ 23.150947] ffff888101a8a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.151510] ffff888101a8a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.152238] ==================================================================
---
[ 23.154386] ==================================================================
[ 23.155410] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b3/0x530
[ 23.156127] Write of size 1 at addr ffff888101a8a378 by task kunit_try_catch/150
[ 23.156781]
[ 23.157028] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 23.158600] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.158989] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 23.159643] Call Trace:
[ 23.159898] <TASK>
[ 23.160548] dump_stack_lvl+0x73/0xb0
[ 23.160726] print_report+0xd1/0x640
[ 23.160898] ? __virt_addr_valid+0x1db/0x2d0
[ 23.161181] ? kasan_complete_mode_report_info+0x2a/0x200
[ 23.161647] kasan_report+0x102/0x140
[ 23.161917] ? kmalloc_track_caller_oob_right+0x4b3/0x530
[ 23.162879] ? kmalloc_track_caller_oob_right+0x4b3/0x530
[ 23.163499] __asan_report_store1_noabort+0x1b/0x30
[ 23.164117] kmalloc_track_caller_oob_right+0x4b3/0x530
[ 23.164573] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[ 23.164929] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[ 23.165440] kunit_try_run_case+0x1b3/0x490
[ 23.165847] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.166269] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 23.166652] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 23.167266] ? __kthread_parkme+0x82/0x160
[ 23.167565] ? preempt_count_sub+0x50/0x80
[ 23.167966] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.168284] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 23.168967] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.169689] kthread+0x257/0x310
[ 23.169941] ? __pfx_kthread+0x10/0x10
[ 23.170207] ret_from_fork+0x41/0x80
[ 23.170650] ? __pfx_kthread+0x10/0x10
[ 23.171059] ret_from_fork_asm+0x1a/0x30
[ 23.171463] </TASK>
[ 23.171706]
[ 23.171899] Allocated by task 150:
[ 23.172224] kasan_save_stack+0x3d/0x60
[ 23.172619] kasan_save_track+0x18/0x40
[ 23.172909] kasan_save_alloc_info+0x3b/0x50
[ 23.173292] __kasan_kmalloc+0xb7/0xc0
[ 23.173604] __kmalloc_node_track_caller_noprof+0x1c6/0x500
[ 23.174032] kmalloc_track_caller_oob_right+0x19b/0x530
[ 23.174508] kunit_try_run_case+0x1b3/0x490
[ 23.174909] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.175360] kthread+0x257/0x310
[ 23.175886] ret_from_fork+0x41/0x80
[ 23.176832] ret_from_fork_asm+0x1a/0x30
[ 23.177827]
[ 23.178367] The buggy address belongs to the object at ffff888101a8a300
[ 23.178367] which belongs to the cache kmalloc-128 of size 128
[ 23.179279] The buggy address is located 0 bytes to the right of
[ 23.179279] allocated 120-byte region [ffff888101a8a300, ffff888101a8a378)
[ 23.180503]
[ 23.180842] The buggy address belongs to the physical page:
[ 23.181441] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a8a
[ 23.182333] flags: 0x200000000000000(node=0|zone=2)
[ 23.182922] page_type: f5(slab)
[ 23.183374] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[ 23.184009] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 23.184501] page dumped because: kasan: bad access detected
[ 23.184784]
[ 23.184974] Memory state around the buggy address:
[ 23.185448] ffff888101a8a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 23.185961] ffff888101a8a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.186444] >ffff888101a8a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 23.186983] ^
[ 23.187454] ffff888101a8a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.187935] ffff888101a8a400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.188507] ==================================================================
Home
[ 25.259500] ==================================================================
[ 25.260160] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x404/0x530
[ 25.260569] Read of size 1 at addr ffff888101a950c8 by task kunit_try_catch/215
[ 25.261178]
[ 25.262165] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 25.263189] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.263862] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.264422] Call Trace:
[ 25.264695] <TASK>
[ 25.265465] dump_stack_lvl+0x73/0xb0
[ 25.266066] print_report+0xd1/0x640
[ 25.266394] ? __virt_addr_valid+0x1db/0x2d0
[ 25.266946] ? kasan_complete_mode_report_info+0x2a/0x200
[ 25.267655] kasan_report+0x102/0x140
[ 25.268192] ? kmem_cache_oob+0x404/0x530
[ 25.268939] ? kmem_cache_oob+0x404/0x530
[ 25.269559] __asan_report_load1_noabort+0x18/0x20
[ 25.270008] kmem_cache_oob+0x404/0x530
[ 25.270574] ? trace_hardirqs_on+0x37/0xe0
[ 25.271285] ? __pfx_kmem_cache_oob+0x10/0x10
[ 25.271724] ? finish_task_switch.isra.0+0x153/0x700
[ 25.272267] ? __switch_to+0x5d9/0xf60
[ 25.272669] ? __pfx_read_tsc+0x10/0x10
[ 25.273119] ? ktime_get_ts64+0x84/0x230
[ 25.273444] kunit_try_run_case+0x1b3/0x490
[ 25.274186] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.274654] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 25.275028] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.275604] ? __kthread_parkme+0x82/0x160
[ 25.276125] ? preempt_count_sub+0x50/0x80
[ 25.276803] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.277581] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.278029] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.278565] kthread+0x257/0x310
[ 25.278946] ? __pfx_kthread+0x10/0x10
[ 25.279413] ret_from_fork+0x41/0x80
[ 25.280030] ? __pfx_kthread+0x10/0x10
[ 25.280442] ret_from_fork_asm+0x1a/0x30
[ 25.281067] </TASK>
[ 25.281270]
[ 25.281552] Allocated by task 215:
[ 25.282049] kasan_save_stack+0x3d/0x60
[ 25.282707] kasan_save_track+0x18/0x40
[ 25.283024] kasan_save_alloc_info+0x3b/0x50
[ 25.283532] __kasan_slab_alloc+0x91/0xa0
[ 25.284371] kmem_cache_alloc_noprof+0x11e/0x3e0
[ 25.285123] kmem_cache_oob+0x158/0x530
[ 25.286067] kunit_try_run_case+0x1b3/0x490
[ 25.286554] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.287422] kthread+0x257/0x310
[ 25.287804] ret_from_fork+0x41/0x80
[ 25.288447] ret_from_fork_asm+0x1a/0x30
[ 25.289257]
[ 25.289522] The buggy address belongs to the object at ffff888101a95000
[ 25.289522] which belongs to the cache test_cache of size 200
[ 25.290436] The buggy address is located 0 bytes to the right of
[ 25.290436] allocated 200-byte region [ffff888101a95000, ffff888101a950c8)
[ 25.291539]
[ 25.291697] The buggy address belongs to the physical page:
[ 25.292124] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a95
[ 25.292799] flags: 0x200000000000000(node=0|zone=2)
[ 25.293672] page_type: f5(slab)
[ 25.294232] raw: 0200000000000000 ffff888101a4cdc0 dead000000000122 0000000000000000
[ 25.294901] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[ 25.295560] page dumped because: kasan: bad access detected
[ 25.296428]
[ 25.296799] Memory state around the buggy address:
[ 25.297412] ffff888101a94f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.297791] ffff888101a95000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 25.299171] >ffff888101a95080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[ 25.300128] ^
[ 25.300523] ffff888101a95100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.301086] ffff888101a95180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.301565] ==================================================================
Home
[ 23.608459] ==================================================================
[ 23.609831] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec8/0x11d0
[ 23.610389] Write of size 1 at addr ffff888100393cda by task kunit_try_catch/166
[ 23.610930]
[ 23.611134] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 23.612411] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.612881] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 23.613438] Call Trace:
[ 23.613998] <TASK>
[ 23.614317] dump_stack_lvl+0x73/0xb0
[ 23.615272] print_report+0xd1/0x640
[ 23.615681] ? __virt_addr_valid+0x1db/0x2d0
[ 23.616594] ? kasan_complete_mode_report_info+0x2a/0x200
[ 23.617134] kasan_report+0x102/0x140
[ 23.617431] ? krealloc_less_oob_helper+0xec8/0x11d0
[ 23.617913] ? krealloc_less_oob_helper+0xec8/0x11d0
[ 23.618294] __asan_report_store1_noabort+0x1b/0x30
[ 23.618769] krealloc_less_oob_helper+0xec8/0x11d0
[ 23.619171] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 23.620260] ? irqentry_exit+0x2a/0x60
[ 23.620764] ? sysvec_apic_timer_interrupt+0x50/0x90
[ 23.621309] krealloc_less_oob+0x1c/0x30
[ 23.621793] kunit_try_run_case+0x1b3/0x490
[ 23.622256] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.622907] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 23.623418] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 23.624153] ? __kthread_parkme+0x82/0x160
[ 23.624581] ? preempt_count_sub+0x50/0x80
[ 23.625010] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.625411] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 23.625951] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.626815] kthread+0x257/0x310
[ 23.627223] ? __pfx_kthread+0x10/0x10
[ 23.627976] ret_from_fork+0x41/0x80
[ 23.628364] ? __pfx_kthread+0x10/0x10
[ 23.628915] ret_from_fork_asm+0x1a/0x30
[ 23.629384] </TASK>
[ 23.629748]
[ 23.629983] Allocated by task 166:
[ 23.630338] kasan_save_stack+0x3d/0x60
[ 23.630873] kasan_save_track+0x18/0x40
[ 23.631303] kasan_save_alloc_info+0x3b/0x50
[ 23.632027] __kasan_krealloc+0x190/0x1f0
[ 23.632371] krealloc_noprof+0xf3/0x340
[ 23.632705] krealloc_less_oob_helper+0x1ab/0x11d0
[ 23.633129] krealloc_less_oob+0x1c/0x30
[ 23.633732] kunit_try_run_case+0x1b3/0x490
[ 23.634181] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.634718] kthread+0x257/0x310
[ 23.635112] ret_from_fork+0x41/0x80
[ 23.635508] ret_from_fork_asm+0x1a/0x30
[ 23.636279]
[ 23.636488] The buggy address belongs to the object at ffff888100393c00
[ 23.636488] which belongs to the cache kmalloc-256 of size 256
[ 23.637446] The buggy address is located 17 bytes to the right of
[ 23.637446] allocated 201-byte region [ffff888100393c00, ffff888100393cc9)
[ 23.638347]
[ 23.638725] The buggy address belongs to the physical page:
[ 23.639260] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100392
[ 23.640053] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 23.640863] flags: 0x200000000000040(head|node=0|zone=2)
[ 23.641406] page_type: f5(slab)
[ 23.641874] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 23.642740] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 23.643326] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 23.644229] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 23.645019] head: 0200000000000001 ffffea000400e481 ffffffffffffffff 0000000000000000
[ 23.645701] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 23.646303] page dumped because: kasan: bad access detected
[ 23.646829]
[ 23.647046] Memory state around the buggy address:
[ 23.647891] ffff888100393b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.648500] ffff888100393c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.649288] >ffff888100393c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 23.649817] ^
[ 23.650373] ffff888100393d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.651184] ffff888100393d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.652055] ==================================================================
Home
[ 23.698907] ==================================================================
[ 23.699660] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd49/0x11d0
[ 23.700149] Write of size 1 at addr ffff888100393ceb by task kunit_try_catch/166
[ 23.700788]
[ 23.701019] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 23.701617] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.702007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 23.702764] Call Trace:
[ 23.703003] <TASK>
[ 23.703185] dump_stack_lvl+0x73/0xb0
[ 23.703480] print_report+0xd1/0x640
[ 23.703897] ? __virt_addr_valid+0x1db/0x2d0
[ 23.704364] ? kasan_complete_mode_report_info+0x2a/0x200
[ 23.704973] kasan_report+0x102/0x140
[ 23.705399] ? krealloc_less_oob_helper+0xd49/0x11d0
[ 23.705926] ? krealloc_less_oob_helper+0xd49/0x11d0
[ 23.706354] __asan_report_store1_noabort+0x1b/0x30
[ 23.706929] krealloc_less_oob_helper+0xd49/0x11d0
[ 23.707270] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 23.707828] ? irqentry_exit+0x2a/0x60
[ 23.708348] ? sysvec_apic_timer_interrupt+0x50/0x90
[ 23.708938] krealloc_less_oob+0x1c/0x30
[ 23.709493] kunit_try_run_case+0x1b3/0x490
[ 23.709995] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.710323] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 23.710786] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 23.711595] ? __kthread_parkme+0x82/0x160
[ 23.712027] ? preempt_count_sub+0x50/0x80
[ 23.712404] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.712834] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 23.713359] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.714104] kthread+0x257/0x310
[ 23.714472] ? __pfx_kthread+0x10/0x10
[ 23.714948] ret_from_fork+0x41/0x80
[ 23.715557] ? __pfx_kthread+0x10/0x10
[ 23.715974] ret_from_fork_asm+0x1a/0x30
[ 23.716419] </TASK>
[ 23.716722]
[ 23.716960] Allocated by task 166:
[ 23.717331] kasan_save_stack+0x3d/0x60
[ 23.717777] kasan_save_track+0x18/0x40
[ 23.718160] kasan_save_alloc_info+0x3b/0x50
[ 23.718535] __kasan_krealloc+0x190/0x1f0
[ 23.718977] krealloc_noprof+0xf3/0x340
[ 23.719577] krealloc_less_oob_helper+0x1ab/0x11d0
[ 23.720081] krealloc_less_oob+0x1c/0x30
[ 23.720571] kunit_try_run_case+0x1b3/0x490
[ 23.721195] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.721536] kthread+0x257/0x310
[ 23.721764] ret_from_fork+0x41/0x80
[ 23.722059] ret_from_fork_asm+0x1a/0x30
[ 23.722534]
[ 23.722744] The buggy address belongs to the object at ffff888100393c00
[ 23.722744] which belongs to the cache kmalloc-256 of size 256
[ 23.723798] The buggy address is located 34 bytes to the right of
[ 23.723798] allocated 201-byte region [ffff888100393c00, ffff888100393cc9)
[ 23.725296]
[ 23.725499] The buggy address belongs to the physical page:
[ 23.725826] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100392
[ 23.726414] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 23.727103] flags: 0x200000000000040(head|node=0|zone=2)
[ 23.727604] page_type: f5(slab)
[ 23.727938] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 23.729612] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 23.731978] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 23.732723] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 23.733320] head: 0200000000000001 ffffea000400e481 ffffffffffffffff 0000000000000000
[ 23.733950] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 23.734370] page dumped because: kasan: bad access detected
[ 23.734989]
[ 23.735229] Memory state around the buggy address:
[ 23.735666] ffff888100393b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.736184] ffff888100393c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.737211] >ffff888100393c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 23.737818] ^
[ 23.738415] ffff888100393d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.739139] ffff888100393d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.739504] ==================================================================
---
[ 23.652966] ==================================================================
[ 23.653574] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe92/0x11d0
[ 23.654173] Write of size 1 at addr ffff888100393cea by task kunit_try_catch/166
[ 23.654885]
[ 23.655130] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 23.656236] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.656767] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 23.657669] Call Trace:
[ 23.657994] <TASK>
[ 23.658286] dump_stack_lvl+0x73/0xb0
[ 23.658866] print_report+0xd1/0x640
[ 23.659266] ? __virt_addr_valid+0x1db/0x2d0
[ 23.660064] ? kasan_complete_mode_report_info+0x2a/0x200
[ 23.660473] kasan_report+0x102/0x140
[ 23.660885] ? krealloc_less_oob_helper+0xe92/0x11d0
[ 23.661886] ? krealloc_less_oob_helper+0xe92/0x11d0
[ 23.662377] __asan_report_store1_noabort+0x1b/0x30
[ 23.662926] krealloc_less_oob_helper+0xe92/0x11d0
[ 23.663415] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 23.664292] ? irqentry_exit+0x2a/0x60
[ 23.664845] ? sysvec_apic_timer_interrupt+0x50/0x90
[ 23.665320] krealloc_less_oob+0x1c/0x30
[ 23.665833] kunit_try_run_case+0x1b3/0x490
[ 23.666640] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.667108] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 23.667516] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 23.667929] ? __kthread_parkme+0x82/0x160
[ 23.668566] ? preempt_count_sub+0x50/0x80
[ 23.669768] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.670212] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 23.670848] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.671465] kthread+0x257/0x310
[ 23.671944] ? __pfx_kthread+0x10/0x10
[ 23.672391] ret_from_fork+0x41/0x80
[ 23.673165] ? __pfx_kthread+0x10/0x10
[ 23.673692] ret_from_fork_asm+0x1a/0x30
[ 23.674051] </TASK>
[ 23.674331]
[ 23.674684] Allocated by task 166:
[ 23.675042] kasan_save_stack+0x3d/0x60
[ 23.675455] kasan_save_track+0x18/0x40
[ 23.675887] kasan_save_alloc_info+0x3b/0x50
[ 23.676319] __kasan_krealloc+0x190/0x1f0
[ 23.676651] krealloc_noprof+0xf3/0x340
[ 23.676910] krealloc_less_oob_helper+0x1ab/0x11d0
[ 23.677401] krealloc_less_oob+0x1c/0x30
[ 23.678168] kunit_try_run_case+0x1b3/0x490
[ 23.678737] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.679227] kthread+0x257/0x310
[ 23.679729] ret_from_fork+0x41/0x80
[ 23.680136] ret_from_fork_asm+0x1a/0x30
[ 23.680473]
[ 23.680816] The buggy address belongs to the object at ffff888100393c00
[ 23.680816] which belongs to the cache kmalloc-256 of size 256
[ 23.681514] The buggy address is located 33 bytes to the right of
[ 23.681514] allocated 201-byte region [ffff888100393c00, ffff888100393cc9)
[ 23.683081]
[ 23.683308] The buggy address belongs to the physical page:
[ 23.683876] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100392
[ 23.684489] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 23.685163] flags: 0x200000000000040(head|node=0|zone=2)
[ 23.686045] page_type: f5(slab)
[ 23.686422] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 23.686989] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 23.687384] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 23.688009] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 23.688958] head: 0200000000000001 ffffea000400e481 ffffffffffffffff 0000000000000000
[ 23.689984] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 23.690714] page dumped because: kasan: bad access detected
[ 23.691210]
[ 23.691402] Memory state around the buggy address:
[ 23.691813] ffff888100393b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.692416] ffff888100393c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.693181] >ffff888100393c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 23.694130] ^
[ 23.694766] ffff888100393d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.695357] ffff888100393d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.695948] ==================================================================
Home
[ 23.559095] ==================================================================
[ 23.560048] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe25/0x11d0
[ 23.560527] Write of size 1 at addr ffff888100393cd0 by task kunit_try_catch/166
[ 23.561405]
[ 23.561581] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 23.562479] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.562880] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 23.564062] Call Trace:
[ 23.564368] <TASK>
[ 23.564861] dump_stack_lvl+0x73/0xb0
[ 23.565393] print_report+0xd1/0x640
[ 23.565803] ? __virt_addr_valid+0x1db/0x2d0
[ 23.566100] ? kasan_complete_mode_report_info+0x2a/0x200
[ 23.566866] kasan_report+0x102/0x140
[ 23.567599] ? krealloc_less_oob_helper+0xe25/0x11d0
[ 23.568474] ? krealloc_less_oob_helper+0xe25/0x11d0
[ 23.569210] __asan_report_store1_noabort+0x1b/0x30
[ 23.569874] krealloc_less_oob_helper+0xe25/0x11d0
[ 23.570341] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 23.570933] ? irqentry_exit+0x2a/0x60
[ 23.571404] ? sysvec_apic_timer_interrupt+0x50/0x90
[ 23.572005] krealloc_less_oob+0x1c/0x30
[ 23.572523] kunit_try_run_case+0x1b3/0x490
[ 23.573166] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.573698] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 23.574203] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 23.574591] ? __kthread_parkme+0x82/0x160
[ 23.575281] ? preempt_count_sub+0x50/0x80
[ 23.575644] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.576408] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 23.577052] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.577821] kthread+0x257/0x310
[ 23.578568] ? __pfx_kthread+0x10/0x10
[ 23.579083] ret_from_fork+0x41/0x80
[ 23.579922] ? __pfx_kthread+0x10/0x10
[ 23.580474] ret_from_fork_asm+0x1a/0x30
[ 23.580900] </TASK>
[ 23.581126]
[ 23.582028] Allocated by task 166:
[ 23.582386] kasan_save_stack+0x3d/0x60
[ 23.583055] kasan_save_track+0x18/0x40
[ 23.583562] kasan_save_alloc_info+0x3b/0x50
[ 23.584103] __kasan_krealloc+0x190/0x1f0
[ 23.584523] krealloc_noprof+0xf3/0x340
[ 23.585024] krealloc_less_oob_helper+0x1ab/0x11d0
[ 23.585431] krealloc_less_oob+0x1c/0x30
[ 23.585727] kunit_try_run_case+0x1b3/0x490
[ 23.586232] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.587504] kthread+0x257/0x310
[ 23.588062] ret_from_fork+0x41/0x80
[ 23.588459] ret_from_fork_asm+0x1a/0x30
[ 23.588978]
[ 23.589193] The buggy address belongs to the object at ffff888100393c00
[ 23.589193] which belongs to the cache kmalloc-256 of size 256
[ 23.590215] The buggy address is located 7 bytes to the right of
[ 23.590215] allocated 201-byte region [ffff888100393c00, ffff888100393cc9)
[ 23.591707]
[ 23.592011] The buggy address belongs to the physical page:
[ 23.592501] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100392
[ 23.593542] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 23.594272] flags: 0x200000000000040(head|node=0|zone=2)
[ 23.594874] page_type: f5(slab)
[ 23.595590] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 23.596349] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 23.596942] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 23.597763] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 23.598455] head: 0200000000000001 ffffea000400e481 ffffffffffffffff 0000000000000000
[ 23.599744] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 23.600284] page dumped because: kasan: bad access detected
[ 23.600794]
[ 23.601130] Memory state around the buggy address:
[ 23.601708] ffff888100393b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.602335] ffff888100393c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.602946] >ffff888100393c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 23.603707] ^
[ 23.604968] ffff888100393d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.605827] ffff888100393d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.606666] ==================================================================
Home
[ 23.512255] ==================================================================
[ 23.512832] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd72/0x11d0
[ 23.513888] Write of size 1 at addr ffff888100393cc9 by task kunit_try_catch/166
[ 23.514331]
[ 23.514566] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 23.515140] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.516084] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 23.517164] Call Trace:
[ 23.517467] <TASK>
[ 23.518164] dump_stack_lvl+0x73/0xb0
[ 23.518542] print_report+0xd1/0x640
[ 23.518961] ? __virt_addr_valid+0x1db/0x2d0
[ 23.519427] ? kasan_complete_mode_report_info+0x2a/0x200
[ 23.519946] kasan_report+0x102/0x140
[ 23.520796] ? krealloc_less_oob_helper+0xd72/0x11d0
[ 23.521521] ? krealloc_less_oob_helper+0xd72/0x11d0
[ 23.521897] __asan_report_store1_noabort+0x1b/0x30
[ 23.522369] krealloc_less_oob_helper+0xd72/0x11d0
[ 23.522799] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 23.523230] ? irqentry_exit+0x2a/0x60
[ 23.524237] ? sysvec_apic_timer_interrupt+0x50/0x90
[ 23.524787] krealloc_less_oob+0x1c/0x30
[ 23.525459] kunit_try_run_case+0x1b3/0x490
[ 23.525997] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.526790] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 23.527182] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 23.527530] ? __kthread_parkme+0x82/0x160
[ 23.528583] ? preempt_count_sub+0x50/0x80
[ 23.529368] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.529872] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 23.530268] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.530765] kthread+0x257/0x310
[ 23.531194] ? __pfx_kthread+0x10/0x10
[ 23.531816] ret_from_fork+0x41/0x80
[ 23.532128] ? __pfx_kthread+0x10/0x10
[ 23.532874] ret_from_fork_asm+0x1a/0x30
[ 23.533359] </TASK>
[ 23.533644]
[ 23.533868] Allocated by task 166:
[ 23.534237] kasan_save_stack+0x3d/0x60
[ 23.534778] kasan_save_track+0x18/0x40
[ 23.535059] kasan_save_alloc_info+0x3b/0x50
[ 23.535359] __kasan_krealloc+0x190/0x1f0
[ 23.536059] krealloc_noprof+0xf3/0x340
[ 23.536435] krealloc_less_oob_helper+0x1ab/0x11d0
[ 23.536880] krealloc_less_oob+0x1c/0x30
[ 23.537189] kunit_try_run_case+0x1b3/0x490
[ 23.538211] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.538706] kthread+0x257/0x310
[ 23.538975] ret_from_fork+0x41/0x80
[ 23.539278] ret_from_fork_asm+0x1a/0x30
[ 23.539584]
[ 23.539730] The buggy address belongs to the object at ffff888100393c00
[ 23.539730] which belongs to the cache kmalloc-256 of size 256
[ 23.541792] The buggy address is located 0 bytes to the right of
[ 23.541792] allocated 201-byte region [ffff888100393c00, ffff888100393cc9)
[ 23.543175]
[ 23.543844] The buggy address belongs to the physical page:
[ 23.544190] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100392
[ 23.544752] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 23.545680] flags: 0x200000000000040(head|node=0|zone=2)
[ 23.546552] page_type: f5(slab)
[ 23.546951] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 23.547839] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 23.548544] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 23.548961] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 23.549612] head: 0200000000000001 ffffea000400e481 ffffffffffffffff 0000000000000000
[ 23.550142] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 23.551068] page dumped because: kasan: bad access detected
[ 23.551608]
[ 23.552002] Memory state around the buggy address:
[ 23.552924] ffff888100393b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.553744] ffff888100393c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.554156] >ffff888100393c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 23.554744] ^
[ 23.555600] ffff888100393d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.555943] ffff888100393d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.556555] ==================================================================
Home
[ 23.746957] ==================================================================
[ 23.747955] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x823/0x930
[ 23.748848] Write of size 1 at addr ffff8881026b20eb by task kunit_try_catch/168
[ 23.749468]
[ 23.749896] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 23.751140] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.751883] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 23.752584] Call Trace:
[ 23.753315] <TASK>
[ 23.753510] dump_stack_lvl+0x73/0xb0
[ 23.754190] print_report+0xd1/0x640
[ 23.754969] ? __virt_addr_valid+0x1db/0x2d0
[ 23.755461] ? kasan_addr_to_slab+0x11/0xa0
[ 23.756142] kasan_report+0x102/0x140
[ 23.756404] ? krealloc_more_oob_helper+0x823/0x930
[ 23.757073] ? krealloc_more_oob_helper+0x823/0x930
[ 23.757423] __asan_report_store1_noabort+0x1b/0x30
[ 23.757929] krealloc_more_oob_helper+0x823/0x930
[ 23.758327] ? __pfx_krealloc_more_oob_helper+0x10/0x10
[ 23.758808] ? irqentry_exit+0x2a/0x60
[ 23.759113] ? sysvec_apic_timer_interrupt+0x50/0x90
[ 23.759569] ? __pfx_krealloc_large_more_oob+0x10/0x10
[ 23.760076] krealloc_large_more_oob+0x1c/0x30
[ 23.760798] kunit_try_run_case+0x1b3/0x490
[ 23.761125] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.763290] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 23.763829] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 23.764512] ? __kthread_parkme+0x82/0x160
[ 23.764955] ? preempt_count_sub+0x50/0x80
[ 23.765325] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.765851] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 23.767285] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.768216] kthread+0x257/0x310
[ 23.768625] ? __pfx_kthread+0x10/0x10
[ 23.769050] ret_from_fork+0x41/0x80
[ 23.769545] ? __pfx_kthread+0x10/0x10
[ 23.769852] ret_from_fork_asm+0x1a/0x30
[ 23.770610] </TASK>
[ 23.770925]
[ 23.771084] The buggy address belongs to the physical page:
[ 23.771892] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026b0
[ 23.772426] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 23.773142] flags: 0x200000000000040(head|node=0|zone=2)
[ 23.773890] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 23.774522] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 23.776842] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 23.777359] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 23.777995] head: 0200000000000002 ffffea000409ac01 ffffffffffffffff 0000000000000000
[ 23.779052] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 23.779529] page dumped because: kasan: bad access detected
[ 23.780525]
[ 23.780921] Memory state around the buggy address:
[ 23.781575] ffff8881026b1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.782186] ffff8881026b2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.783383] >ffff8881026b2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[ 23.783979] ^
[ 23.784629] ffff8881026b2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 23.785255] ffff8881026b2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 23.785952] ==================================================================
Home
[ 23.789637] ==================================================================
[ 23.790136] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7ed/0x930
[ 23.791294] Write of size 1 at addr ffff8881026b20f0 by task kunit_try_catch/168
[ 23.791674]
[ 23.791909] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 23.792666] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.793282] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 23.794133] Call Trace:
[ 23.794488] <TASK>
[ 23.794971] dump_stack_lvl+0x73/0xb0
[ 23.795354] print_report+0xd1/0x640
[ 23.796208] ? __virt_addr_valid+0x1db/0x2d0
[ 23.796644] ? kasan_addr_to_slab+0x11/0xa0
[ 23.797349] kasan_report+0x102/0x140
[ 23.797900] ? krealloc_more_oob_helper+0x7ed/0x930
[ 23.798341] ? krealloc_more_oob_helper+0x7ed/0x930
[ 23.799018] __asan_report_store1_noabort+0x1b/0x30
[ 23.799509] krealloc_more_oob_helper+0x7ed/0x930
[ 23.800142] ? __pfx_krealloc_more_oob_helper+0x10/0x10
[ 23.801103] ? irqentry_exit+0x2a/0x60
[ 23.801360] ? sysvec_apic_timer_interrupt+0x50/0x90
[ 23.802062] ? __pfx_krealloc_large_more_oob+0x10/0x10
[ 23.802708] krealloc_large_more_oob+0x1c/0x30
[ 23.803219] kunit_try_run_case+0x1b3/0x490
[ 23.803774] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.804255] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 23.804774] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 23.805198] ? __kthread_parkme+0x82/0x160
[ 23.806255] ? preempt_count_sub+0x50/0x80
[ 23.806740] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.807259] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 23.807888] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.808459] kthread+0x257/0x310
[ 23.809014] ? __pfx_kthread+0x10/0x10
[ 23.809343] ret_from_fork+0x41/0x80
[ 23.809925] ? __pfx_kthread+0x10/0x10
[ 23.810384] ret_from_fork_asm+0x1a/0x30
[ 23.810725] </TASK>
[ 23.811370]
[ 23.811621] The buggy address belongs to the physical page:
[ 23.811997] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026b0
[ 23.813010] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 23.813681] flags: 0x200000000000040(head|node=0|zone=2)
[ 23.814274] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 23.814888] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 23.815941] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 23.816477] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 23.817220] head: 0200000000000002 ffffea000409ac01 ffffffffffffffff 0000000000000000
[ 23.817881] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 23.818489] page dumped because: kasan: bad access detected
[ 23.819158]
[ 23.819384] Memory state around the buggy address:
[ 23.819899] ffff8881026b1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.820430] ffff8881026b2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.821345] >ffff8881026b2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[ 23.822107] ^
[ 23.822704] ffff8881026b2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 23.823337] ffff8881026b2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 23.824000] ==================================================================
Home
[ 23.461337] ==================================================================
[ 23.462088] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7ed/0x930
[ 23.462780] Write of size 1 at addr ffff888100a288f0 by task kunit_try_catch/164
[ 23.463448]
[ 23.463683] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 23.464444] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.465009] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 23.465737] Call Trace:
[ 23.466048] <TASK>
[ 23.466333] dump_stack_lvl+0x73/0xb0
[ 23.466904] print_report+0xd1/0x640
[ 23.467359] ? __virt_addr_valid+0x1db/0x2d0
[ 23.468231] ? kasan_complete_mode_report_info+0x2a/0x200
[ 23.468794] kasan_report+0x102/0x140
[ 23.469195] ? krealloc_more_oob_helper+0x7ed/0x930
[ 23.469897] ? krealloc_more_oob_helper+0x7ed/0x930
[ 23.470415] __asan_report_store1_noabort+0x1b/0x30
[ 23.471156] krealloc_more_oob_helper+0x7ed/0x930
[ 23.471800] ? trace_hardirqs_on+0x37/0xe0
[ 23.472213] ? __pfx_krealloc_more_oob_helper+0x10/0x10
[ 23.473125] ? sysvec_apic_timer_interrupt+0x50/0x90
[ 23.474109] ? __pfx_krealloc_more_oob+0x10/0x10
[ 23.474685] krealloc_more_oob+0x1c/0x30
[ 23.475086] kunit_try_run_case+0x1b3/0x490
[ 23.475437] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.476238] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 23.476889] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 23.477397] ? __kthread_parkme+0x82/0x160
[ 23.477741] ? preempt_count_sub+0x50/0x80
[ 23.478672] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.479342] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 23.479969] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.480390] kthread+0x257/0x310
[ 23.480941] ? __pfx_kthread+0x10/0x10
[ 23.481316] ret_from_fork+0x41/0x80
[ 23.481847] ? __pfx_kthread+0x10/0x10
[ 23.482277] ret_from_fork_asm+0x1a/0x30
[ 23.483450] </TASK>
[ 23.483929]
[ 23.484086] Allocated by task 164:
[ 23.484407] kasan_save_stack+0x3d/0x60
[ 23.485050] kasan_save_track+0x18/0x40
[ 23.485459] kasan_save_alloc_info+0x3b/0x50
[ 23.485881] __kasan_krealloc+0x190/0x1f0
[ 23.486178] krealloc_noprof+0xf3/0x340
[ 23.486589] krealloc_more_oob_helper+0x1aa/0x930
[ 23.487289] krealloc_more_oob+0x1c/0x30
[ 23.487597] kunit_try_run_case+0x1b3/0x490
[ 23.488261] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.488904] kthread+0x257/0x310
[ 23.489194] ret_from_fork+0x41/0x80
[ 23.489911] ret_from_fork_asm+0x1a/0x30
[ 23.490421]
[ 23.490618] The buggy address belongs to the object at ffff888100a28800
[ 23.490618] which belongs to the cache kmalloc-256 of size 256
[ 23.491365] The buggy address is located 5 bytes to the right of
[ 23.491365] allocated 235-byte region [ffff888100a28800, ffff888100a288eb)
[ 23.492142]
[ 23.492655] The buggy address belongs to the physical page:
[ 23.493205] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a28
[ 23.493953] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 23.494740] flags: 0x200000000000040(head|node=0|zone=2)
[ 23.495295] page_type: f5(slab)
[ 23.495969] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 23.496785] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 23.497379] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 23.498114] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 23.498833] head: 0200000000000001 ffffea0004028a01 ffffffffffffffff 0000000000000000
[ 23.499416] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 23.500187] page dumped because: kasan: bad access detected
[ 23.500958]
[ 23.501194] Memory state around the buggy address:
[ 23.501735] ffff888100a28780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.502232] ffff888100a28800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.503015] >ffff888100a28880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[ 23.503428] ^
[ 23.504193] ffff888100a28900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.504737] ffff888100a28980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.505393] ==================================================================
Home
[ 23.415339] ==================================================================
[ 23.416062] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x823/0x930
[ 23.416713] Write of size 1 at addr ffff888100a288eb by task kunit_try_catch/164
[ 23.417353]
[ 23.417684] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 23.418494] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.419144] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 23.420000] Call Trace:
[ 23.420283] <TASK>
[ 23.420480] dump_stack_lvl+0x73/0xb0
[ 23.421287] print_report+0xd1/0x640
[ 23.421687] ? __virt_addr_valid+0x1db/0x2d0
[ 23.421980] ? kasan_complete_mode_report_info+0x2a/0x200
[ 23.422523] kasan_report+0x102/0x140
[ 23.422927] ? krealloc_more_oob_helper+0x823/0x930
[ 23.423769] ? krealloc_more_oob_helper+0x823/0x930
[ 23.424136] __asan_report_store1_noabort+0x1b/0x30
[ 23.424801] krealloc_more_oob_helper+0x823/0x930
[ 23.425380] ? trace_hardirqs_on+0x37/0xe0
[ 23.426000] ? __pfx_krealloc_more_oob_helper+0x10/0x10
[ 23.426960] ? sysvec_apic_timer_interrupt+0x50/0x90
[ 23.427436] ? __pfx_krealloc_more_oob+0x10/0x10
[ 23.428127] krealloc_more_oob+0x1c/0x30
[ 23.428684] kunit_try_run_case+0x1b3/0x490
[ 23.429090] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.429780] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 23.430174] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 23.430889] ? __kthread_parkme+0x82/0x160
[ 23.431330] ? preempt_count_sub+0x50/0x80
[ 23.432108] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.433041] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 23.433670] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.434388] kthread+0x257/0x310
[ 23.434926] ? __pfx_kthread+0x10/0x10
[ 23.435290] ret_from_fork+0x41/0x80
[ 23.435846] ? __pfx_kthread+0x10/0x10
[ 23.436193] ret_from_fork_asm+0x1a/0x30
[ 23.437070] </TASK>
[ 23.437354]
[ 23.437625] Allocated by task 164:
[ 23.438149] kasan_save_stack+0x3d/0x60
[ 23.438645] kasan_save_track+0x18/0x40
[ 23.439027] kasan_save_alloc_info+0x3b/0x50
[ 23.439664] __kasan_krealloc+0x190/0x1f0
[ 23.440024] krealloc_noprof+0xf3/0x340
[ 23.440424] krealloc_more_oob_helper+0x1aa/0x930
[ 23.441059] krealloc_more_oob+0x1c/0x30
[ 23.441394] kunit_try_run_case+0x1b3/0x490
[ 23.441939] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.442460] kthread+0x257/0x310
[ 23.443235] ret_from_fork+0x41/0x80
[ 23.443717] ret_from_fork_asm+0x1a/0x30
[ 23.444120]
[ 23.444350] The buggy address belongs to the object at ffff888100a28800
[ 23.444350] which belongs to the cache kmalloc-256 of size 256
[ 23.445201] The buggy address is located 0 bytes to the right of
[ 23.445201] allocated 235-byte region [ffff888100a28800, ffff888100a288eb)
[ 23.446361]
[ 23.446703] The buggy address belongs to the physical page:
[ 23.447220] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a28
[ 23.448337] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 23.449102] flags: 0x200000000000040(head|node=0|zone=2)
[ 23.449699] page_type: f5(slab)
[ 23.450098] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 23.450654] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 23.451390] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 23.452112] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 23.453181] head: 0200000000000001 ffffea0004028a01 ffffffffffffffff 0000000000000000
[ 23.454047] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 23.454747] page dumped because: kasan: bad access detected
[ 23.455218]
[ 23.455476] Memory state around the buggy address:
[ 23.456018] ffff888100a28780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.456698] ffff888100a28800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.457334] >ffff888100a28880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[ 23.458220] ^
[ 23.458746] ffff888100a28900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.459696] ffff888100a28980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.460112] ==================================================================
Home
[ 26.956959] ==================================================================
[ 26.957778] BUG: KASAN: slab-out-of-bounds in memchr+0x79/0x90
[ 26.958497] Read of size 1 at addr ffff888101aa33d8 by task kunit_try_catch/263
[ 26.959207]
[ 26.959468] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 26.960086] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.960377] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.961089] Call Trace:
[ 26.961302] <TASK>
[ 26.962151] dump_stack_lvl+0x73/0xb0
[ 26.962843] print_report+0xd1/0x640
[ 26.963400] ? __virt_addr_valid+0x1db/0x2d0
[ 26.964263] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.964966] kasan_report+0x102/0x140
[ 26.965511] ? memchr+0x79/0x90
[ 26.966086] ? memchr+0x79/0x90
[ 26.966711] __asan_report_load1_noabort+0x18/0x20
[ 26.967323] memchr+0x79/0x90
[ 26.967662] kasan_memchr+0x163/0x320
[ 26.968066] ? __pfx_kasan_memchr+0x10/0x10
[ 26.968447] ? __pfx_read_tsc+0x10/0x10
[ 26.968858] ? ktime_get_ts64+0x84/0x230
[ 26.969167] kunit_try_run_case+0x1b3/0x490
[ 26.970408] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.971052] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 26.971490] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.972167] ? __kthread_parkme+0x82/0x160
[ 26.972517] ? preempt_count_sub+0x50/0x80
[ 26.973162] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.973751] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.974383] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.975355] kthread+0x257/0x310
[ 26.975826] ? __pfx_kthread+0x10/0x10
[ 26.976301] ret_from_fork+0x41/0x80
[ 26.976822] ? __pfx_kthread+0x10/0x10
[ 26.977273] ret_from_fork_asm+0x1a/0x30
[ 26.977838] </TASK>
[ 26.978107]
[ 26.978271] Allocated by task 263:
[ 26.978777] kasan_save_stack+0x3d/0x60
[ 26.979279] kasan_save_track+0x18/0x40
[ 26.979999] kasan_save_alloc_info+0x3b/0x50
[ 26.980462] __kasan_kmalloc+0xb7/0xc0
[ 26.980725] __kmalloc_cache_noprof+0x184/0x410
[ 26.981521] kasan_memchr+0xad/0x320
[ 26.982046] kunit_try_run_case+0x1b3/0x490
[ 26.982638] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.983044] kthread+0x257/0x310
[ 26.983451] ret_from_fork+0x41/0x80
[ 26.984010] ret_from_fork_asm+0x1a/0x30
[ 26.984392]
[ 26.984936] The buggy address belongs to the object at ffff888101aa33c0
[ 26.984936] which belongs to the cache kmalloc-32 of size 32
[ 26.986093] The buggy address is located 0 bytes to the right of
[ 26.986093] allocated 24-byte region [ffff888101aa33c0, ffff888101aa33d8)
[ 26.987200]
[ 26.987454] The buggy address belongs to the physical page:
[ 26.987927] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aa3
[ 26.988808] flags: 0x200000000000000(node=0|zone=2)
[ 26.989253] page_type: f5(slab)
[ 26.990082] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[ 26.990660] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 26.991265] page dumped because: kasan: bad access detected
[ 26.991650]
[ 26.992066] Memory state around the buggy address:
[ 26.992637] ffff888101aa3280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 26.993295] ffff888101aa3300: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[ 26.994045] >ffff888101aa3380: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[ 26.994745] ^
[ 26.995319] ffff888101aa3400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.996356] ffff888101aa3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.997016] ==================================================================
Home
[ 27.004145] ==================================================================
[ 27.004943] BUG: KASAN: slab-out-of-bounds in memcmp+0x1b4/0x1d0
[ 27.005794] Read of size 1 at addr ffff888102a38d18 by task kunit_try_catch/265
[ 27.006302]
[ 27.006538] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.007619] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.007916] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.009325] Call Trace:
[ 27.009759] <TASK>
[ 27.010004] dump_stack_lvl+0x73/0xb0
[ 27.010634] print_report+0xd1/0x640
[ 27.011029] ? __virt_addr_valid+0x1db/0x2d0
[ 27.011503] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.011944] kasan_report+0x102/0x140
[ 27.012769] ? memcmp+0x1b4/0x1d0
[ 27.013213] ? memcmp+0x1b4/0x1d0
[ 27.013682] __asan_report_load1_noabort+0x18/0x20
[ 27.014223] memcmp+0x1b4/0x1d0
[ 27.014775] kasan_memcmp+0x190/0x390
[ 27.015226] ? trace_hardirqs_on+0x37/0xe0
[ 27.015744] ? __pfx_kasan_memcmp+0x10/0x10
[ 27.016195] ? finish_task_switch.isra.0+0x153/0x700
[ 27.016913] ? __switch_to+0x5d9/0xf60
[ 27.017234] ? __pfx_read_tsc+0x10/0x10
[ 27.017841] ? ktime_get_ts64+0x84/0x230
[ 27.018355] kunit_try_run_case+0x1b3/0x490
[ 27.019002] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.019436] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.020141] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.020728] ? __kthread_parkme+0x82/0x160
[ 27.021293] ? preempt_count_sub+0x50/0x80
[ 27.021902] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.022434] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.023222] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.024020] kthread+0x257/0x310
[ 27.024291] ? __pfx_kthread+0x10/0x10
[ 27.024740] ret_from_fork+0x41/0x80
[ 27.025169] ? __pfx_kthread+0x10/0x10
[ 27.026152] ret_from_fork_asm+0x1a/0x30
[ 27.026749] </TASK>
[ 27.027212]
[ 27.027454] Allocated by task 265:
[ 27.027946] kasan_save_stack+0x3d/0x60
[ 27.028307] kasan_save_track+0x18/0x40
[ 27.028885] kasan_save_alloc_info+0x3b/0x50
[ 27.029416] __kasan_kmalloc+0xb7/0xc0
[ 27.029964] __kmalloc_cache_noprof+0x184/0x410
[ 27.030231] kasan_memcmp+0xb8/0x390
[ 27.030698] kunit_try_run_case+0x1b3/0x490
[ 27.031574] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.032159] kthread+0x257/0x310
[ 27.032750] ret_from_fork+0x41/0x80
[ 27.033093] ret_from_fork_asm+0x1a/0x30
[ 27.033542]
[ 27.033802] The buggy address belongs to the object at ffff888102a38d00
[ 27.033802] which belongs to the cache kmalloc-32 of size 32
[ 27.034910] The buggy address is located 0 bytes to the right of
[ 27.034910] allocated 24-byte region [ffff888102a38d00, ffff888102a38d18)
[ 27.036818]
[ 27.037234] The buggy address belongs to the physical page:
[ 27.038008] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a38
[ 27.038852] flags: 0x200000000000000(node=0|zone=2)
[ 27.039476] page_type: f5(slab)
[ 27.040079] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[ 27.041080] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 27.041772] page dumped because: kasan: bad access detected
[ 27.042209]
[ 27.042382] Memory state around the buggy address:
[ 27.042795] ffff888102a38c00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[ 27.043660] ffff888102a38c80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[ 27.044588] >ffff888102a38d00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.045266] ^
[ 27.045469] ffff888102a38d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.045986] ffff888102a38e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.046774] ==================================================================
Home
[ 26.256297] ==================================================================
[ 26.257361] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[ 26.258967] Read of size 1 at addr ffff888101aa02bb by task kunit_try_catch/233
[ 26.259763]
[ 26.259954] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 26.260379] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.260875] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.262418] Call Trace:
[ 26.262905] <TASK>
[ 26.263091] dump_stack_lvl+0x73/0xb0
[ 26.263607] print_report+0xd1/0x640
[ 26.264196] ? __virt_addr_valid+0x1db/0x2d0
[ 26.265034] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.265436] kasan_report+0x102/0x140
[ 26.266085] ? mempool_oob_right_helper+0x31a/0x380
[ 26.266500] ? mempool_oob_right_helper+0x31a/0x380
[ 26.267221] __asan_report_load1_noabort+0x18/0x20
[ 26.267612] mempool_oob_right_helper+0x31a/0x380
[ 26.268221] ? __pfx_mempool_oob_right_helper+0x10/0x10
[ 26.268606] ? finish_task_switch.isra.0+0x153/0x700
[ 26.269166] mempool_slab_oob_right+0xb1/0x100
[ 26.269568] ? __pfx_mempool_slab_oob_right+0x10/0x10
[ 26.270190] ? __switch_to+0x5d9/0xf60
[ 26.270678] ? __pfx_mempool_alloc_slab+0x10/0x10
[ 26.271188] ? __pfx_mempool_free_slab+0x10/0x10
[ 26.272131] ? __pfx_read_tsc+0x10/0x10
[ 26.272431] ? ktime_get_ts64+0x84/0x230
[ 26.272734] kunit_try_run_case+0x1b3/0x490
[ 26.273235] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.274270] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 26.274762] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.275198] ? __kthread_parkme+0x82/0x160
[ 26.275796] ? preempt_count_sub+0x50/0x80
[ 26.276157] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.276785] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.277702] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.278599] kthread+0x257/0x310
[ 26.279217] ? __pfx_kthread+0x10/0x10
[ 26.279783] ret_from_fork+0x41/0x80
[ 26.280309] ? __pfx_kthread+0x10/0x10
[ 26.280674] ret_from_fork_asm+0x1a/0x30
[ 26.281662] </TASK>
[ 26.281903]
[ 26.282061] Allocated by task 233:
[ 26.282410] kasan_save_stack+0x3d/0x60
[ 26.282840] kasan_save_track+0x18/0x40
[ 26.283612] kasan_save_alloc_info+0x3b/0x50
[ 26.284132] __kasan_mempool_unpoison_object+0x1bb/0x200
[ 26.284969] remove_element+0x11e/0x190
[ 26.285378] mempool_alloc_preallocated+0x4d/0x90
[ 26.286331] mempool_oob_right_helper+0x8b/0x380
[ 26.287058] mempool_slab_oob_right+0xb1/0x100
[ 26.287413] kunit_try_run_case+0x1b3/0x490
[ 26.287963] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.288563] kthread+0x257/0x310
[ 26.289197] ret_from_fork+0x41/0x80
[ 26.289513] ret_from_fork_asm+0x1a/0x30
[ 26.289839]
[ 26.290055] The buggy address belongs to the object at ffff888101aa0240
[ 26.290055] which belongs to the cache test_cache of size 123
[ 26.290879] The buggy address is located 0 bytes to the right of
[ 26.290879] allocated 123-byte region [ffff888101aa0240, ffff888101aa02bb)
[ 26.292045]
[ 26.292274] The buggy address belongs to the physical page:
[ 26.292940] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aa0
[ 26.293773] flags: 0x200000000000000(node=0|zone=2)
[ 26.294277] page_type: f5(slab)
[ 26.294792] raw: 0200000000000000 ffff888101a95500 dead000000000122 0000000000000000
[ 26.295347] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[ 26.296107] page dumped because: kasan: bad access detected
[ 26.296965]
[ 26.297197] Memory state around the buggy address:
[ 26.297811] ffff888101aa0180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 26.298338] ffff888101aa0200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[ 26.299051] >ffff888101aa0280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[ 26.299509] ^
[ 26.299877] ffff888101aa0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.301022] ffff888101aa0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.301679] ==================================================================
Home
[ 26.210169] ==================================================================
[ 26.211023] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[ 26.211518] Read of size 1 at addr ffff888102caa001 by task kunit_try_catch/231
[ 26.212074]
[ 26.212505] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 26.213512] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.214158] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.215031] Call Trace:
[ 26.215269] <TASK>
[ 26.215489] dump_stack_lvl+0x73/0xb0
[ 26.216103] print_report+0xd1/0x640
[ 26.216502] ? __virt_addr_valid+0x1db/0x2d0
[ 26.217070] ? kasan_addr_to_slab+0x11/0xa0
[ 26.217414] kasan_report+0x102/0x140
[ 26.218013] ? mempool_oob_right_helper+0x31a/0x380
[ 26.218437] ? mempool_oob_right_helper+0x31a/0x380
[ 26.219120] __asan_report_load1_noabort+0x18/0x20
[ 26.219749] mempool_oob_right_helper+0x31a/0x380
[ 26.220273] ? __pfx_mempool_oob_right_helper+0x10/0x10
[ 26.221792] ? finish_task_switch.isra.0+0x153/0x700
[ 26.222253] mempool_kmalloc_large_oob_right+0xb6/0x100
[ 26.222921] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[ 26.223412] ? __switch_to+0x5d9/0xf60
[ 26.224004] ? __pfx_mempool_kmalloc+0x10/0x10
[ 26.224460] ? __pfx_mempool_kfree+0x10/0x10
[ 26.224926] ? __pfx_read_tsc+0x10/0x10
[ 26.225369] ? ktime_get_ts64+0x84/0x230
[ 26.225922] kunit_try_run_case+0x1b3/0x490
[ 26.226384] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.226962] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 26.227360] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.228022] ? __kthread_parkme+0x82/0x160
[ 26.228376] ? preempt_count_sub+0x50/0x80
[ 26.228976] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.229470] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.230204] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.230763] kthread+0x257/0x310
[ 26.231027] ? __pfx_kthread+0x10/0x10
[ 26.231703] ret_from_fork+0x41/0x80
[ 26.232150] ? __pfx_kthread+0x10/0x10
[ 26.232513] ret_from_fork_asm+0x1a/0x30
[ 26.233129] </TASK>
[ 26.233409]
[ 26.233826] The buggy address belongs to the physical page:
[ 26.234192] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ca8
[ 26.235054] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 26.235689] flags: 0x200000000000040(head|node=0|zone=2)
[ 26.236275] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 26.237506] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 26.238478] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 26.239033] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 26.239655] head: 0200000000000002 ffffea00040b2a01 ffffffffffffffff 0000000000000000
[ 26.240120] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 26.241420] page dumped because: kasan: bad access detected
[ 26.242289]
[ 26.242499] Memory state around the buggy address:
[ 26.243073] ffff888102ca9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 26.243489] ffff888102ca9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 26.244261] >ffff888102caa000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 26.244980] ^
[ 26.245340] ffff888102caa080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 26.246159] ffff888102caa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 26.246879] ==================================================================
Home
[ 25.547769] ==================================================================
[ 25.548405] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1bd/0x380
[ 25.549410] Read of size 1 at addr ffff888101a95280 by task kunit_try_catch/223
[ 25.550182]
[ 25.550436] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 25.551464] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.551703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.552139] Call Trace:
[ 25.552344] <TASK>
[ 25.552527] dump_stack_lvl+0x73/0xb0
[ 25.552796] print_report+0xd1/0x640
[ 25.554219] ? __virt_addr_valid+0x1db/0x2d0
[ 25.554779] ? kasan_complete_mode_report_info+0x64/0x200
[ 25.555696] kasan_report+0x102/0x140
[ 25.556441] ? kmem_cache_double_destroy+0x1bd/0x380
[ 25.557329] ? kmem_cache_double_destroy+0x1bd/0x380
[ 25.557853] ? kmem_cache_double_destroy+0x1bd/0x380
[ 25.558671] __kasan_check_byte+0x3d/0x50
[ 25.559239] kmem_cache_destroy+0x25/0x1d0
[ 25.559553] kmem_cache_double_destroy+0x1bd/0x380
[ 25.560044] ? __pfx_kmem_cache_double_destroy+0x10/0x10
[ 25.560600] ? finish_task_switch.isra.0+0x153/0x700
[ 25.561005] ? __switch_to+0x5d9/0xf60
[ 25.561367] ? __pfx_empty_cache_ctor+0x10/0x10
[ 25.561922] ? __pfx_read_tsc+0x10/0x10
[ 25.562401] ? ktime_get_ts64+0x84/0x230
[ 25.563120] kunit_try_run_case+0x1b3/0x490
[ 25.563448] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.563978] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 25.564323] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.565281] ? __kthread_parkme+0x82/0x160
[ 25.565755] ? preempt_count_sub+0x50/0x80
[ 25.566375] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.567060] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.567796] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.568354] kthread+0x257/0x310
[ 25.569332] ? __pfx_kthread+0x10/0x10
[ 25.569773] ret_from_fork+0x41/0x80
[ 25.570307] ? __pfx_kthread+0x10/0x10
[ 25.570827] ret_from_fork_asm+0x1a/0x30
[ 25.571215] </TASK>
[ 25.571507]
[ 25.571891] Allocated by task 223:
[ 25.572183] kasan_save_stack+0x3d/0x60
[ 25.573134] kasan_save_track+0x18/0x40
[ 25.573723] kasan_save_alloc_info+0x3b/0x50
[ 25.574133] __kasan_slab_alloc+0x91/0xa0
[ 25.574702] kmem_cache_alloc_noprof+0x11e/0x3e0
[ 25.575218] __kmem_cache_create_args+0x177/0x250
[ 25.575599] kmem_cache_double_destroy+0xd3/0x380
[ 25.576234] kunit_try_run_case+0x1b3/0x490
[ 25.577110] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.577420] kthread+0x257/0x310
[ 25.577841] ret_from_fork+0x41/0x80
[ 25.578219] ret_from_fork_asm+0x1a/0x30
[ 25.578618]
[ 25.578776] Freed by task 223:
[ 25.579165] kasan_save_stack+0x3d/0x60
[ 25.579709] kasan_save_track+0x18/0x40
[ 25.580068] kasan_save_free_info+0x3f/0x60
[ 25.580446] __kasan_slab_free+0x56/0x70
[ 25.580980] kmem_cache_free+0x120/0x420
[ 25.581323] slab_kmem_cache_release+0x2e/0x40
[ 25.581609] kmem_cache_release+0x16/0x20
[ 25.582102] kobject_put+0x181/0x450
[ 25.582714] sysfs_slab_release+0x16/0x20
[ 25.583140] kmem_cache_destroy+0xf0/0x1d0
[ 25.583594] kmem_cache_double_destroy+0x14c/0x380
[ 25.583938] kunit_try_run_case+0x1b3/0x490
[ 25.584291] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.585202] kthread+0x257/0x310
[ 25.585651] ret_from_fork+0x41/0x80
[ 25.586032] ret_from_fork_asm+0x1a/0x30
[ 25.586355]
[ 25.586566] The buggy address belongs to the object at ffff888101a95280
[ 25.586566] which belongs to the cache kmem_cache of size 208
[ 25.588559] The buggy address is located 0 bytes inside of
[ 25.588559] freed 208-byte region [ffff888101a95280, ffff888101a95350)
[ 25.589481]
[ 25.589701] The buggy address belongs to the physical page:
[ 25.590157] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a95
[ 25.590942] flags: 0x200000000000000(node=0|zone=2)
[ 25.591378] page_type: f5(slab)
[ 25.592400] raw: 0200000000000000 ffff888100041000 dead000000000122 0000000000000000
[ 25.592862] raw: 0000000000000000 00000000800c000c 00000001f5000000 0000000000000000
[ 25.593444] page dumped because: kasan: bad access detected
[ 25.593749]
[ 25.593957] Memory state around the buggy address:
[ 25.594397] ffff888101a95180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 25.594860] ffff888101a95200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.595331] >ffff888101a95280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 25.595807] ^
[ 25.596134] ffff888101a95300: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[ 25.597200] ffff888101a95380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.597843] ==================================================================
Home
[ 24.075518] ==================================================================
[ 24.076145] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53e/0x5e0
[ 24.077193] Read of size 1 at addr ffff888100a28a00 by task kunit_try_catch/172
[ 24.077621]
[ 24.078049] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 24.078936] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.079252] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 24.080530] Call Trace:
[ 24.080834] <TASK>
[ 24.081094] dump_stack_lvl+0x73/0xb0
[ 24.081520] print_report+0xd1/0x640
[ 24.081890] ? __virt_addr_valid+0x1db/0x2d0
[ 24.082957] ? kasan_complete_mode_report_info+0x64/0x200
[ 24.083831] kasan_report+0x102/0x140
[ 24.084272] ? krealloc_uaf+0x53e/0x5e0
[ 24.084691] ? krealloc_uaf+0x53e/0x5e0
[ 24.085338] __asan_report_load1_noabort+0x18/0x20
[ 24.086048] krealloc_uaf+0x53e/0x5e0
[ 24.086598] ? __pfx_krealloc_uaf+0x10/0x10
[ 24.087496] ? sysvec_apic_timer_interrupt+0x50/0x90
[ 24.088360] ? __pfx_krealloc_uaf+0x10/0x10
[ 24.088964] kunit_try_run_case+0x1b3/0x490
[ 24.089377] ? __pfx_kunit_try_run_case+0x10/0x10
[ 24.089726] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 24.090312] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 24.090675] ? __kthread_parkme+0x82/0x160
[ 24.091122] ? preempt_count_sub+0x50/0x80
[ 24.091615] ? __pfx_kunit_try_run_case+0x10/0x10
[ 24.092064] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 24.093357] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 24.093752] kthread+0x257/0x310
[ 24.094188] ? __pfx_kthread+0x10/0x10
[ 24.094467] ret_from_fork+0x41/0x80
[ 24.094916] ? __pfx_kthread+0x10/0x10
[ 24.095176] ret_from_fork_asm+0x1a/0x30
[ 24.095773] </TASK>
[ 24.096111]
[ 24.096327] Allocated by task 172:
[ 24.096670] kasan_save_stack+0x3d/0x60
[ 24.096937] kasan_save_track+0x18/0x40
[ 24.097197] kasan_save_alloc_info+0x3b/0x50
[ 24.097719] __kasan_kmalloc+0xb7/0xc0
[ 24.098139] __kmalloc_cache_noprof+0x184/0x410
[ 24.099157] krealloc_uaf+0xbc/0x5e0
[ 24.099633] kunit_try_run_case+0x1b3/0x490
[ 24.100257] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 24.100996] kthread+0x257/0x310
[ 24.101388] ret_from_fork+0x41/0x80
[ 24.101982] ret_from_fork_asm+0x1a/0x30
[ 24.102435]
[ 24.102798] Freed by task 172:
[ 24.103089] kasan_save_stack+0x3d/0x60
[ 24.103368] kasan_save_track+0x18/0x40
[ 24.104185] kasan_save_free_info+0x3f/0x60
[ 24.104586] __kasan_slab_free+0x56/0x70
[ 24.105182] kfree+0x123/0x3f0
[ 24.105718] krealloc_uaf+0x13e/0x5e0
[ 24.106180] kunit_try_run_case+0x1b3/0x490
[ 24.106482] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 24.107200] kthread+0x257/0x310
[ 24.107713] ret_from_fork+0x41/0x80
[ 24.108146] ret_from_fork_asm+0x1a/0x30
[ 24.108664]
[ 24.109072] The buggy address belongs to the object at ffff888100a28a00
[ 24.109072] which belongs to the cache kmalloc-256 of size 256
[ 24.109849] The buggy address is located 0 bytes inside of
[ 24.109849] freed 256-byte region [ffff888100a28a00, ffff888100a28b00)
[ 24.111054]
[ 24.111293] The buggy address belongs to the physical page:
[ 24.111996] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a28
[ 24.112441] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 24.113064] flags: 0x200000000000040(head|node=0|zone=2)
[ 24.113957] page_type: f5(slab)
[ 24.114311] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 24.114999] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 24.115705] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 24.116220] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 24.117008] head: 0200000000000001 ffffea0004028a01 ffffffffffffffff 0000000000000000
[ 24.117599] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 24.118373] page dumped because: kasan: bad access detected
[ 24.119192]
[ 24.119407] Memory state around the buggy address:
[ 24.119672] ffff888100a28900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.120213] ffff888100a28980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.120754] >ffff888100a28a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 24.121225] ^
[ 24.121920] ffff888100a28a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 24.122503] ffff888100a28b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.123230] ==================================================================
Home
[ 24.023023] ==================================================================
[ 24.024330] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b9/0x5e0
[ 24.024903] Read of size 1 at addr ffff888100a28a00 by task kunit_try_catch/172
[ 24.026064]
[ 24.026324] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 24.027325] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.027571] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 24.028503] Call Trace:
[ 24.028696] <TASK>
[ 24.029034] dump_stack_lvl+0x73/0xb0
[ 24.029473] print_report+0xd1/0x640
[ 24.029807] ? __virt_addr_valid+0x1db/0x2d0
[ 24.030918] ? kasan_complete_mode_report_info+0x64/0x200
[ 24.031336] kasan_report+0x102/0x140
[ 24.032015] ? krealloc_uaf+0x1b9/0x5e0
[ 24.032500] ? krealloc_uaf+0x1b9/0x5e0
[ 24.033138] ? krealloc_uaf+0x1b9/0x5e0
[ 24.033571] __kasan_check_byte+0x3d/0x50
[ 24.034127] krealloc_noprof+0x3f/0x340
[ 24.034681] krealloc_uaf+0x1b9/0x5e0
[ 24.035536] ? __pfx_krealloc_uaf+0x10/0x10
[ 24.036140] ? sysvec_apic_timer_interrupt+0x50/0x90
[ 24.036586] ? __pfx_krealloc_uaf+0x10/0x10
[ 24.037051] kunit_try_run_case+0x1b3/0x490
[ 24.037655] ? __pfx_kunit_try_run_case+0x10/0x10
[ 24.038304] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 24.038798] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 24.039265] ? __kthread_parkme+0x82/0x160
[ 24.040027] ? preempt_count_sub+0x50/0x80
[ 24.040348] ? __pfx_kunit_try_run_case+0x10/0x10
[ 24.040860] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 24.041369] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 24.041875] kthread+0x257/0x310
[ 24.042252] ? __pfx_kthread+0x10/0x10
[ 24.042656] ret_from_fork+0x41/0x80
[ 24.043312] ? __pfx_kthread+0x10/0x10
[ 24.044285] ret_from_fork_asm+0x1a/0x30
[ 24.045143] </TASK>
[ 24.045517]
[ 24.045851] Allocated by task 172:
[ 24.046274] kasan_save_stack+0x3d/0x60
[ 24.047075] kasan_save_track+0x18/0x40
[ 24.047436] kasan_save_alloc_info+0x3b/0x50
[ 24.048026] __kasan_kmalloc+0xb7/0xc0
[ 24.048500] __kmalloc_cache_noprof+0x184/0x410
[ 24.049002] krealloc_uaf+0xbc/0x5e0
[ 24.049286] kunit_try_run_case+0x1b3/0x490
[ 24.050034] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 24.050501] kthread+0x257/0x310
[ 24.051010] ret_from_fork+0x41/0x80
[ 24.051424] ret_from_fork_asm+0x1a/0x30
[ 24.051970]
[ 24.052157] Freed by task 172:
[ 24.053397] kasan_save_stack+0x3d/0x60
[ 24.053633] kasan_save_track+0x18/0x40
[ 24.054070] kasan_save_free_info+0x3f/0x60
[ 24.054461] __kasan_slab_free+0x56/0x70
[ 24.054816] kfree+0x123/0x3f0
[ 24.055836] krealloc_uaf+0x13e/0x5e0
[ 24.056224] kunit_try_run_case+0x1b3/0x490
[ 24.056593] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 24.057262] kthread+0x257/0x310
[ 24.057508] ret_from_fork+0x41/0x80
[ 24.057933] ret_from_fork_asm+0x1a/0x30
[ 24.058900]
[ 24.059146] The buggy address belongs to the object at ffff888100a28a00
[ 24.059146] which belongs to the cache kmalloc-256 of size 256
[ 24.060661] The buggy address is located 0 bytes inside of
[ 24.060661] freed 256-byte region [ffff888100a28a00, ffff888100a28b00)
[ 24.061469]
[ 24.061680] The buggy address belongs to the physical page:
[ 24.062072] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a28
[ 24.062808] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 24.063398] flags: 0x200000000000040(head|node=0|zone=2)
[ 24.064095] page_type: f5(slab)
[ 24.064401] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 24.065343] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 24.065983] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 24.067082] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 24.067513] head: 0200000000000001 ffffea0004028a01 ffffffffffffffff 0000000000000000
[ 24.067897] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 24.068472] page dumped because: kasan: bad access detected
[ 24.069223]
[ 24.069464] Memory state around the buggy address:
[ 24.069991] ffff888100a28900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.070650] ffff888100a28980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.071552] >ffff888100a28a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 24.072362] ^
[ 24.072583] ffff888100a28a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 24.073084] ffff888100a28b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.073855] ==================================================================
Home
[ 26.421779] ==================================================================
[ 26.422638] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x394/0x400
[ 26.423328] Read of size 1 at addr ffff888102a3a240 by task kunit_try_catch/239
[ 26.423870]
[ 26.424052] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 26.425800] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.426351] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.427134] Call Trace:
[ 26.427444] <TASK>
[ 26.427722] dump_stack_lvl+0x73/0xb0
[ 26.428073] print_report+0xd1/0x640
[ 26.428459] ? __virt_addr_valid+0x1db/0x2d0
[ 26.428845] ? kasan_complete_mode_report_info+0x64/0x200
[ 26.429559] kasan_report+0x102/0x140
[ 26.430135] ? mempool_uaf_helper+0x394/0x400
[ 26.430568] ? mempool_uaf_helper+0x394/0x400
[ 26.431057] __asan_report_load1_noabort+0x18/0x20
[ 26.431453] mempool_uaf_helper+0x394/0x400
[ 26.431858] ? __pfx_mempool_uaf_helper+0x10/0x10
[ 26.432569] mempool_slab_uaf+0xae/0x100
[ 26.433027] ? __pfx_mempool_slab_uaf+0x10/0x10
[ 26.433352] ? __switch_to+0x5d9/0xf60
[ 26.433768] ? __pfx_mempool_alloc_slab+0x10/0x10
[ 26.434367] ? __pfx_mempool_free_slab+0x10/0x10
[ 26.435115] ? __pfx_read_tsc+0x10/0x10
[ 26.435582] ? ktime_get_ts64+0x84/0x230
[ 26.436413] kunit_try_run_case+0x1b3/0x490
[ 26.437015] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.437516] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 26.438121] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.438880] ? __kthread_parkme+0x82/0x160
[ 26.439359] ? preempt_count_sub+0x50/0x80
[ 26.440116] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.440585] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.441416] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.442064] kthread+0x257/0x310
[ 26.442613] ? __pfx_kthread+0x10/0x10
[ 26.443186] ret_from_fork+0x41/0x80
[ 26.443527] ? __pfx_kthread+0x10/0x10
[ 26.444086] ret_from_fork_asm+0x1a/0x30
[ 26.444425] </TASK>
[ 26.444683]
[ 26.444879] Allocated by task 239:
[ 26.445736] kasan_save_stack+0x3d/0x60
[ 26.446110] kasan_save_track+0x18/0x40
[ 26.446400] kasan_save_alloc_info+0x3b/0x50
[ 26.446980] __kasan_mempool_unpoison_object+0x1bb/0x200
[ 26.448009] remove_element+0x11e/0x190
[ 26.448443] mempool_alloc_preallocated+0x4d/0x90
[ 26.449016] mempool_uaf_helper+0x97/0x400
[ 26.449586] mempool_slab_uaf+0xae/0x100
[ 26.449862] kunit_try_run_case+0x1b3/0x490
[ 26.450302] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.450830] kthread+0x257/0x310
[ 26.451185] ret_from_fork+0x41/0x80
[ 26.451781] ret_from_fork_asm+0x1a/0x30
[ 26.452055]
[ 26.452266] Freed by task 239:
[ 26.452633] kasan_save_stack+0x3d/0x60
[ 26.453067] kasan_save_track+0x18/0x40
[ 26.453726] kasan_save_free_info+0x3f/0x60
[ 26.454388] __kasan_mempool_poison_object+0x131/0x1d0
[ 26.454959] mempool_free+0x2ec/0x380
[ 26.455448] mempool_uaf_helper+0x11b/0x400
[ 26.456268] mempool_slab_uaf+0xae/0x100
[ 26.456970] kunit_try_run_case+0x1b3/0x490
[ 26.457278] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.458090] kthread+0x257/0x310
[ 26.458393] ret_from_fork+0x41/0x80
[ 26.458646] ret_from_fork_asm+0x1a/0x30
[ 26.459064]
[ 26.459214] The buggy address belongs to the object at ffff888102a3a240
[ 26.459214] which belongs to the cache test_cache of size 123
[ 26.460643] The buggy address is located 0 bytes inside of
[ 26.460643] freed 123-byte region [ffff888102a3a240, ffff888102a3a2bb)
[ 26.461383]
[ 26.461516] The buggy address belongs to the physical page:
[ 26.462072] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a3a
[ 26.463006] flags: 0x200000000000000(node=0|zone=2)
[ 26.463584] page_type: f5(slab)
[ 26.464576] raw: 0200000000000000 ffff888101d51780 dead000000000122 0000000000000000
[ 26.465339] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[ 26.465839] page dumped because: kasan: bad access detected
[ 26.466176]
[ 26.466336] Memory state around the buggy address:
[ 26.466602] ffff888102a3a100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.467337] ffff888102a3a180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 26.468343] >ffff888102a3a200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[ 26.469331] ^
[ 26.469976] ffff888102a3a280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.470572] ffff888102a3a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.471113] ==================================================================
Home
[ 26.313057] ==================================================================
[ 26.313781] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x394/0x400
[ 26.314395] Read of size 1 at addr ffff888102a33d00 by task kunit_try_catch/235
[ 26.315018]
[ 26.315195] CPU: 1 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 26.317210] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.317463] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.318389] Call Trace:
[ 26.318941] <TASK>
[ 26.319256] dump_stack_lvl+0x73/0xb0
[ 26.319991] print_report+0xd1/0x640
[ 26.320658] ? __virt_addr_valid+0x1db/0x2d0
[ 26.321228] ? kasan_complete_mode_report_info+0x64/0x200
[ 26.321934] kasan_report+0x102/0x140
[ 26.322424] ? mempool_uaf_helper+0x394/0x400
[ 26.322789] ? mempool_uaf_helper+0x394/0x400
[ 26.323286] __asan_report_load1_noabort+0x18/0x20
[ 26.323766] mempool_uaf_helper+0x394/0x400
[ 26.324095] ? __pfx_mempool_uaf_helper+0x10/0x10
[ 26.325182] ? ret_from_fork+0x41/0x80
[ 26.325817] ? kthread+0x257/0x310
[ 26.326235] ? ret_from_fork_asm+0x1a/0x30
[ 26.326770] ? ret_from_fork_asm+0x1a/0x30
[ 26.327212] mempool_kmalloc_uaf+0xb3/0x100
[ 26.327890] ? __pfx_mempool_kmalloc_uaf+0x10/0x10
[ 26.328357] ? __switch_to+0x5d9/0xf60
[ 26.329195] ? __pfx_mempool_kmalloc+0x10/0x10
[ 26.329663] ? __pfx_mempool_kfree+0x10/0x10
[ 26.330115] ? __pfx_read_tsc+0x10/0x10
[ 26.330912] ? ktime_get_ts64+0x84/0x230
[ 26.331278] kunit_try_run_case+0x1b3/0x490
[ 26.331900] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.332379] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 26.333288] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.333951] ? __kthread_parkme+0x82/0x160
[ 26.334387] ? preempt_count_sub+0x50/0x80
[ 26.335046] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.335667] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.336256] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.337222] kthread+0x257/0x310
[ 26.337715] ? __pfx_kthread+0x10/0x10
[ 26.338173] ret_from_fork+0x41/0x80
[ 26.338685] ? __pfx_kthread+0x10/0x10
[ 26.339130] ret_from_fork_asm+0x1a/0x30
[ 26.339729] </TASK>
[ 26.340023]
[ 26.340304] Allocated by task 235:
[ 26.340868] kasan_save_stack+0x3d/0x60
[ 26.341709] kasan_save_track+0x18/0x40
[ 26.342103] kasan_save_alloc_info+0x3b/0x50
[ 26.342714] __kasan_mempool_unpoison_object+0x1a9/0x200
[ 26.343296] remove_element+0x11e/0x190
[ 26.343902] mempool_alloc_preallocated+0x4d/0x90
[ 26.344315] mempool_uaf_helper+0x97/0x400
[ 26.345203] mempool_kmalloc_uaf+0xb3/0x100
[ 26.345824] kunit_try_run_case+0x1b3/0x490
[ 26.346329] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.346890] kthread+0x257/0x310
[ 26.347261] ret_from_fork+0x41/0x80
[ 26.347924] ret_from_fork_asm+0x1a/0x30
[ 26.348335]
[ 26.348918] Freed by task 235:
[ 26.349313] kasan_save_stack+0x3d/0x60
[ 26.349802] kasan_save_track+0x18/0x40
[ 26.350296] kasan_save_free_info+0x3f/0x60
[ 26.350903] __kasan_mempool_poison_object+0x131/0x1d0
[ 26.351368] mempool_free+0x2ec/0x380
[ 26.351934] mempool_uaf_helper+0x11b/0x400
[ 26.352387] mempool_kmalloc_uaf+0xb3/0x100
[ 26.353190] kunit_try_run_case+0x1b3/0x490
[ 26.353627] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.354138] kthread+0x257/0x310
[ 26.354433] ret_from_fork+0x41/0x80
[ 26.354833] ret_from_fork_asm+0x1a/0x30
[ 26.355207]
[ 26.355845] The buggy address belongs to the object at ffff888102a33d00
[ 26.355845] which belongs to the cache kmalloc-128 of size 128
[ 26.357288] The buggy address is located 0 bytes inside of
[ 26.357288] freed 128-byte region [ffff888102a33d00, ffff888102a33d80)
[ 26.358316]
[ 26.358715] The buggy address belongs to the physical page:
[ 26.359276] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a33
[ 26.360050] flags: 0x200000000000000(node=0|zone=2)
[ 26.360476] page_type: f5(slab)
[ 26.361212] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[ 26.362042] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 26.362833] page dumped because: kasan: bad access detected
[ 26.363215]
[ 26.363478] Memory state around the buggy address:
[ 26.364094] ffff888102a33c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 26.365075] ffff888102a33c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.365858] >ffff888102a33d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 26.366477] ^
[ 26.366765] ffff888102a33d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.367670] ffff888102a33e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 26.368125] ==================================================================
Home
[ 25.185633] ==================================================================
[ 25.186737] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x4d8/0x560
[ 25.187959] Read of size 8 at addr ffff888101a930c0 by task kunit_try_catch/208
[ 25.189309]
[ 25.189584] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 25.190084] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.190483] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.192051] Call Trace:
[ 25.192276] <TASK>
[ 25.192450] dump_stack_lvl+0x73/0xb0
[ 25.193456] print_report+0xd1/0x640
[ 25.194068] ? __virt_addr_valid+0x1db/0x2d0
[ 25.194345] ? kasan_complete_mode_report_info+0x64/0x200
[ 25.194921] kasan_report+0x102/0x140
[ 25.195814] ? workqueue_uaf+0x4d8/0x560
[ 25.196141] ? workqueue_uaf+0x4d8/0x560
[ 25.196872] __asan_report_load8_noabort+0x18/0x20
[ 25.197659] workqueue_uaf+0x4d8/0x560
[ 25.198193] ? __pfx_workqueue_uaf+0x10/0x10
[ 25.198729] ? __schedule+0xc3e/0x2790
[ 25.199314] ? __pfx_read_tsc+0x10/0x10
[ 25.199852] ? ktime_get_ts64+0x84/0x230
[ 25.200410] kunit_try_run_case+0x1b3/0x490
[ 25.201137] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.201557] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 25.202335] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.202800] ? __kthread_parkme+0x82/0x160
[ 25.203481] ? preempt_count_sub+0x50/0x80
[ 25.204102] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.204408] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.205164] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.206221] kthread+0x257/0x310
[ 25.207235] ? __pfx_kthread+0x10/0x10
[ 25.207521] ret_from_fork+0x41/0x80
[ 25.207852] ? __pfx_kthread+0x10/0x10
[ 25.208395] ret_from_fork_asm+0x1a/0x30
[ 25.208754] </TASK>
[ 25.209074]
[ 25.209290] Allocated by task 208:
[ 25.209690] kasan_save_stack+0x3d/0x60
[ 25.210282] kasan_save_track+0x18/0x40
[ 25.210540] kasan_save_alloc_info+0x3b/0x50
[ 25.211103] __kasan_kmalloc+0xb7/0xc0
[ 25.211541] __kmalloc_cache_noprof+0x184/0x410
[ 25.212129] workqueue_uaf+0x153/0x560
[ 25.212617] kunit_try_run_case+0x1b3/0x490
[ 25.213158] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.213601] kthread+0x257/0x310
[ 25.215309] ret_from_fork+0x41/0x80
[ 25.215827] ret_from_fork_asm+0x1a/0x30
[ 25.216154]
[ 25.216521] Freed by task 8:
[ 25.216843] kasan_save_stack+0x3d/0x60
[ 25.217461] kasan_save_track+0x18/0x40
[ 25.218124] kasan_save_free_info+0x3f/0x60
[ 25.218528] __kasan_slab_free+0x56/0x70
[ 25.219062] kfree+0x123/0x3f0
[ 25.219309] workqueue_uaf_work+0x12/0x20
[ 25.219574] process_one_work+0x5ee/0xf60
[ 25.219889] worker_thread+0x720/0x1300
[ 25.220500] kthread+0x257/0x310
[ 25.220863] ret_from_fork+0x41/0x80
[ 25.221388] ret_from_fork_asm+0x1a/0x30
[ 25.222286]
[ 25.222497] Last potentially related work creation:
[ 25.223062] kasan_save_stack+0x3d/0x60
[ 25.223390] __kasan_record_aux_stack+0xae/0xc0
[ 25.223685] kasan_record_aux_stack_noalloc+0xf/0x20
[ 25.224343] __queue_work+0x67e/0xf70
[ 25.224955] queue_work_on+0x74/0xa0
[ 25.225389] workqueue_uaf+0x26e/0x560
[ 25.225843] kunit_try_run_case+0x1b3/0x490
[ 25.226788] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.227211] kthread+0x257/0x310
[ 25.227473] ret_from_fork+0x41/0x80
[ 25.227792] ret_from_fork_asm+0x1a/0x30
[ 25.228935]
[ 25.229151] The buggy address belongs to the object at ffff888101a930c0
[ 25.229151] which belongs to the cache kmalloc-32 of size 32
[ 25.230349] The buggy address is located 0 bytes inside of
[ 25.230349] freed 32-byte region [ffff888101a930c0, ffff888101a930e0)
[ 25.231058]
[ 25.231427] The buggy address belongs to the physical page:
[ 25.231948] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a93
[ 25.232634] flags: 0x200000000000000(node=0|zone=2)
[ 25.233165] page_type: f5(slab)
[ 25.234081] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[ 25.234586] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 25.235362] page dumped because: kasan: bad access detected
[ 25.236108]
[ 25.236275] Memory state around the buggy address:
[ 25.236546] ffff888101a92f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.236899] ffff888101a93000: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[ 25.237744] >ffff888101a93080: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc
[ 25.238765] ^
[ 25.239441] ffff888101a93100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.240078] ffff888101a93180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.241133] ==================================================================
Home
[ 26.484485] ==================================================================
[ 26.485149] BUG: KASAN: use-after-free in mempool_uaf_helper+0x394/0x400
[ 26.485989] Read of size 1 at addr ffff888102ca8000 by task kunit_try_catch/241
[ 26.486361]
[ 26.486539] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 26.487819] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.488148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.488882] Call Trace:
[ 26.489181] <TASK>
[ 26.489424] dump_stack_lvl+0x73/0xb0
[ 26.490145] print_report+0xd1/0x640
[ 26.490500] ? __virt_addr_valid+0x1db/0x2d0
[ 26.491066] ? kasan_addr_to_slab+0x11/0xa0
[ 26.491467] kasan_report+0x102/0x140
[ 26.492222] ? mempool_uaf_helper+0x394/0x400
[ 26.492613] ? mempool_uaf_helper+0x394/0x400
[ 26.493042] __asan_report_load1_noabort+0x18/0x20
[ 26.493861] mempool_uaf_helper+0x394/0x400
[ 26.495076] ? __pfx_mempool_uaf_helper+0x10/0x10
[ 26.495851] mempool_page_alloc_uaf+0xb1/0x100
[ 26.496254] ? __pfx_mempool_page_alloc_uaf+0x10/0x10
[ 26.497099] ? __switch_to+0x5d9/0xf60
[ 26.497541] ? __pfx_mempool_alloc_pages+0x10/0x10
[ 26.498172] ? __pfx_mempool_free_pages+0x10/0x10
[ 26.498912] ? __pfx_read_tsc+0x10/0x10
[ 26.499263] ? ktime_get_ts64+0x84/0x230
[ 26.499977] kunit_try_run_case+0x1b3/0x490
[ 26.500499] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.501269] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 26.501693] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.502646] ? __kthread_parkme+0x82/0x160
[ 26.503287] ? preempt_count_sub+0x50/0x80
[ 26.503747] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.504479] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.505280] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.506048] kthread+0x257/0x310
[ 26.506410] ? __pfx_kthread+0x10/0x10
[ 26.506787] ret_from_fork+0x41/0x80
[ 26.507129] ? __pfx_kthread+0x10/0x10
[ 26.507506] ret_from_fork_asm+0x1a/0x30
[ 26.507880] </TASK>
[ 26.508137]
[ 26.508499] The buggy address belongs to the physical page:
[ 26.508937] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ca8
[ 26.509358] flags: 0x200000000000000(node=0|zone=2)
[ 26.509668] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[ 26.510412] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 26.511116] page dumped because: kasan: bad access detected
[ 26.511952]
[ 26.512160] Memory state around the buggy address:
[ 26.512502] ffff888102ca7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 26.513490] ffff888102ca7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 26.514346] >ffff888102ca8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 26.515049] ^
[ 26.515375] ffff888102ca8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 26.516257] ffff888102ca8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 26.516851] ==================================================================
Home
------------[ cut here ]------------
[ 6.373199] systemd[1]: Starting modprobe@fuse.service - Load Kernel Module fuse...
[ 6.375640] WARNING: CPU: 1 PID: 135 at kernel/smp.c:815 smp_call_function_many_cond+0x49c/0x5cc
[ 6.392211] Modules linked in:
[ 6.392211] CPU: 1 UID: 0 PID: 135 Comm: 9 Not tainted 6.13.0-rc7 #1
[ 6.401672] Hardware name: Generic DRA74X (Flattened Device Tree)
[ 6.407806] Call trace:
[ 6.407806] unwind_backtrace from show_stack+0x10/0x14
[ 6.422943] show_stack from dump_stack_lvl+0x54/0x68
[ 6.423278] systemd[1]: systemd-hibernate-clear.service - Clear Stale Hibernate Storage Info was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/HibernateLocation-8cf2644b-4b0b-428f-9387-6d876050dc67).
[ 6.428039] dump_stack_lvl from __warn+0x7c/0x128
[ 6.450775] systemd[1]: systemd-journald.service: unit configures an IP firewall, but the local system does not support BPF/cgroup firewalling.
[ 6.454589] __warn from warn_slowpath_fmt+0x184/0x18c
[ 6.454589] warn_slowpath_fmt from smp_call_function_many_cond+0x49c/0x5cc
[ 6.467590] systemd[1]: systemd-journald.service: (This warning is only shown for the first unit using IP firewalling.)
[ 6.472686] smp_call_function_many_cond from smp_call_function+0x2c/0x34
[ 6.472686] smp_call_function from set_memory_valid+0x7c/0xb8
[ 6.481689] systemd[1]: Starting systemd-journald.service - Journal Service...
[ 6.490509] set_memory_valid from kfence_guarded_free+0x168/0x300
[ 6.516662] kfence_guarded_free from rcu_core+0x2b8/0x964
[ 6.522216] rcu_core from handle_softirqs+0x108/0x344
[ 6.522247] handle_softirqs from __irq_exit_rcu+0xa0/0x114
[ 6.533020] __irq_exit_rcu from irq_exit+0x8/0x10
[ 6.537841] irq_exit from call_with_stack+0x18/0x20
[ 6.537872] call_with_stack from __irq_usr+0x80/0xa0
[ 6.547912] Exception stack(0xf1eb1fb0 to 0xf1eb1ff8)
[ 6.547943] 1fa0: b6597494 00000000 00000f20 00000065
[ 6.547943] 1fc0: be90aaa4 00000000 b6594c40 00000009 e75a8874 b64763b0 b6597482 b690aeb8
[ 6.569458] 1fe0: 00000441 be90a9b8 b6f44b69 b6f42290 600d0030 ffffffff
[ 6.569488] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 6.373199] systemd[1]: Starting modprobe@fuse.service - Load Kernel Module fuse...
[ 6.375640] WARNING: CPU: 1 PID: 135 at kernel/smp.c:815 smp_call_function_many_cond+0x49c/0x5cc
[ 6.392211] Modules linked in:
[ 6.392211] CPU: 1 UID: 0 PID: 135 Comm: 9 Not tainted 6.13.0-rc7 #1
[ 6.401672] Hardware name: Generic DRA74X (Flattened Device Tree)
[ 6.407806] Call trace:
[ 6.407806] unwind_backtrace from show_stack+0x10/0x14
[ 6.422943] show_stack from dump_stack_lvl+0x54/0x68
[ 6.423278] systemd[1]: systemd-hibernate-clear.service - Clear Stale Hibernate Storage Info was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/HibernateLocation-8cf2644b-4b0b-428f-9387-6d876050dc67).
[ 6.428039] dump_stack_lvl from __warn+0x7c/0x128
[ 6.450775] systemd[1]: systemd-journald.service: unit configures an IP firewall, but the local system does not support BPF/cgroup firewalling.
[ 6.454589] __warn from warn_slowpath_fmt+0x184/0x18c
[ 6.454589] warn_slowpath_fmt from smp_call_function_many_cond+0x49c/0x5cc
[ 6.467590] systemd[1]: systemd-journald.service: (This warning is only shown for the first unit using IP firewalling.)
[ 6.472686] smp_call_function_many_cond from smp_call_function+0x2c/0x34
[ 6.472686] smp_call_function from set_memory_valid+0x7c/0xb8
[ 6.481689] systemd[1]: Starting systemd-journald.service - Journal Service...
[ 6.490509] set_memory_valid from kfence_guarded_free+0x168/0x300
[ 6.516662] kfence_guarded_free from rcu_core+0x2b8/0x964
[ 6.522216] rcu_core from handle_softirqs+0x108/0x344
[ 6.522247] handle_softirqs from __irq_exit_rcu+0xa0/0x114
[ 6.533020] __irq_exit_rcu from irq_exit+0x8/0x10
[ 6.537841] irq_exit from call_with_stack+0x18/0x20
[ 6.537872] call_with_stack from __irq_usr+0x80/0xa0
[ 6.547912] Exception stack(0xf1eb1fb0 to 0xf1eb1ff8)
[ 6.547943] 1fa0: b6597494 00000000 00000f20 00000065
[ 6.547943] 1fc0: be90aaa4 00000000 b6594c40 00000009 e75a8874 b64763b0 b6597482 b690aeb8
[ 6.569458] 1fe0: 00000441 be90a9b8 b6f44b69 b6f42290 600d0030 ffffffff
[ 6.569488] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 5.278625] WARNING: CPU: 0 PID: 0 at kernel/smp.c:815 smp_call_function_many_cond+0x4b0/0x5dc
[ 5.287353] Modules linked in:
[ 5.290435] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.13.0-rc7 #1
[ 5.297332] Hardware name: Generic DRA74X (Flattened Device Tree)
[ 5.303466] Call trace:
[ 5.303466] unwind_backtrace from show_stack+0x18/0x1c
[ 5.311279] show_stack from dump_stack_lvl+0x6c/0x8c
[ 5.316375] dump_stack_lvl from __warn+0x84/0x130
[ 5.321197] __warn from warn_slowpath_fmt+0x18c/0x194
[ 5.326354] warn_slowpath_fmt from smp_call_function_many_cond+0x4b0/0x5dc
[ 5.333374] smp_call_function_many_cond from smp_call_function+0x34/0x3c
[ 5.340209] smp_call_function from set_memory_valid+0x84/0xc4
[ 5.346099] set_memory_valid from kfence_guarded_free+0x170/0x2dc
[ 5.352325] kfence_guarded_free from rcu_core+0x2cc/0x9dc
[ 5.357849] rcu_core from handle_softirqs+0x14c/0x3d0
[ 5.363037] handle_softirqs from __irq_exit_rcu+0xa0/0x114
[ 5.368652] __irq_exit_rcu from irq_exit+0x10/0x30
[ 5.373565] irq_exit from __irq_svc+0x80/0xac
[ 5.378051] Exception stack(0xc2401f20 to 0xc2401f68)
[ 5.383117] 1f20: 00002bac 00000001 2d88d000 00000000 c240ff40 c269d300 c240a0dc c240a11c
[ 5.391357] 1f40: 00000000 00000000 c240a080 ffffffff c269c700 c2401f70 c15b5060 c15b5064
[ 5.399566] 1f60: 60000013 ffffffff
[ 5.403076] __irq_svc from default_idle_call+0x20/0xc0
[ 5.408325] default_idle_call from do_idle+0x22c/0x2bc
[ 5.413604] do_idle from cpu_startup_entry+0x30/0x34
[ 5.418701] cpu_startup_entry from kernel_init+0x0/0x13c
[ 5.424133] kernel_init from start_kernel+0x704/0x720
[ 5.429321] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 44.487978] WARNING: CPU: 1 PID: 468 at mm/util.c:657 __kvmalloc_node_noprof+0x138/0x148
[ 44.490955] Modules linked in: crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 drm fuse backlight ip_tables x_tables
[ 44.496541] CPU: 1 UID: 0 PID: 468 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[ 44.497964] Hardware name: linux,dummy-virt (DT)
[ 44.499764] pstate: 23402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[ 44.500958] pc : __kvmalloc_node_noprof+0x138/0x148
[ 44.501490] lr : __kvmalloc_node_noprof+0x64/0x148
[ 44.503132] sp : ffff800080a9bcd0
[ 44.503636] x29: ffff800080a9bce0 x28: fff00000c1268000 x27: 0000000000000000
[ 44.505745] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c19c0000
[ 44.506841] x23: fff00000c19c0080 x22: 9acfa7ce99d3b6bc x21: 0000000200001e00
[ 44.507539] x20: 00000000ffffffff x19: 0000000000400cc0 x18: 0000000000000000
[ 44.509073] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 44.509571] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 44.510080] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[ 44.511711] x8 : 0000000000000001 x7 : 0000000000000001 x6 : 0000000000000005
[ 44.513471] x5 : 0000000000000000 x4 : fff00000c1268000 x3 : 0000000000000000
[ 44.515089] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[ 44.516933] Call trace:
[ 44.517927] __kvmalloc_node_noprof+0x138/0x148 (P)
[ 44.518447] alloc_fdtable+0x84/0x128
[ 44.518786] expand_files+0x78/0x2ec
[ 44.519076] ksys_dup3+0x60/0x120
[ 44.521489] __arm64_sys_dup3+0x20/0x30
[ 44.522316] invoke_syscall+0x48/0x10c
[ 44.523692] el0_svc_common.constprop.0+0x40/0xe0
[ 44.525315] do_el0_svc+0x1c/0x28
[ 44.525856] el0_svc+0x30/0xcc
[ 44.526918] el0t_64_sync_handler+0x10c/0x138
[ 44.527979] el0t_64_sync+0x198/0x19c
[ 44.528537] ---[ end trace 0000000000000000 ]---
Home
[ 108.153005] watchdog: BUG: soft lockup - CPU#0 stuck for 21s! [sh:320]
Home
[ 108.153005] watchdog: BUG: soft lockup - CPU#0 stuck for 21s! [sh:320]
Home
------------[ cut here ]------------
[ 41.966759] WARNING: CPU: 0 PID: 480 at mm/util.c:657 __kvmalloc_node_noprof+0xdf/0xf0
[ 41.967926] Modules linked in:
[ 41.969339] CPU: 0 UID: 0 PID: 480 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[ 41.969996] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 41.971058] RIP: 0010:__kvmalloc_node_noprof+0xdf/0xf0
[ 41.971857] Code: 89 f0 ff 75 08 53 68 00 04 00 00 e8 db 33 04 00 48 83 c4 18 5b 41 5e 41 5f 5d c3 cc cc cc cc cc 41 f7 c6 00 20 00 00 75 81 90 <0f> 0b 90 31 c0 eb e3 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90
[ 41.973351] RSP: 0018:ffffaf06405ffdb8 EFLAGS: 00010246
[ 41.973664] RAX: 0000000000000004 RBX: 00000000ffffffff RCX: 0000000400000000
[ 41.973906] RDX: 0000000200001e00 RSI: 0000000000000000 RDI: ffffffffba269fe8
[ 41.974173] RBP: ffffaf06405ffdd0 R08: 0000000000412cc0 R09: 00000000ffffffff
[ 41.974824] R10: 0000000000000000 R11: 0000000000000000 R12: 00000000400003c0
[ 41.975447] R13: 00000000400003c0 R14: 0000000000400cc0 R15: 0000000200001e00
[ 41.976071] FS: 00007f85ff4a0740(0000) GS:ffffa154fbc00000(0000) knlGS:0000000000000000
[ 41.976834] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 41.979275] CR2: 00007f85ff644680 CR3: 0000000101748000 CR4: 00000000000006f0
[ 41.980629] Call Trace:
[ 41.982058] <TASK>
[ 41.982927] ? show_regs+0x5d/0x70
[ 41.983324] ? __warn+0xcf/0x1d0
[ 41.983628] ? __kvmalloc_node_noprof+0xdf/0xf0
[ 41.984126] ? report_bug+0x14c/0x1f0
[ 41.984860] ? handle_bug+0x67/0x90
[ 41.985161] ? exc_invalid_op+0x1f/0x50
[ 41.985334] ? asm_exc_invalid_op+0x1f/0x30
[ 41.985873] ? __kvmalloc_node_noprof+0x48/0xf0
[ 41.986364] ? __kvmalloc_node_noprof+0xdf/0xf0
[ 41.987571] ? __kvmalloc_node_noprof+0x48/0xf0
[ 41.988187] alloc_fdtable+0x7b/0x120
[ 41.988693] expand_files+0x118/0x310
[ 41.988866] ? do_prlimit+0x11d/0x160
[ 41.989034] ? __se_sys_prlimit64+0x1ea/0x2a0
[ 41.989207] ksys_dup3+0x71/0xd0
[ 41.989438] __x64_sys_dup2+0x1e/0x80
[ 41.989722] x64_sys_call+0x8cf/0x2f50
[ 41.990151] do_syscall_64+0xd0/0x1a0
[ 41.991678] ? exc_page_fault+0x68/0xc0
[ 41.992069] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 41.992769] RIP: 0033:0x7f85ff598c17
[ 41.993589] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[ 41.994486] RSP: 002b:00007fffb8abea38 EFLAGS: 00000202 ORIG_RAX: 0000000000000021
[ 41.995038] RAX: ffffffffffffffda RBX: 00007fffb8abf298 RCX: 00007f85ff598c17
[ 41.995693] RDX: 00007fffb8abebb8 RSI: 0000000040000038 RDI: 0000000000000002
[ 41.995919] RBP: 00007fffb8abec50 R08: 0000000000000064 R09: 0000000000000000
[ 41.996159] R10: 00007f85ff4b5170 R11: 0000000000000202 R12: 0000000000000000
[ 41.996572] R13: 00007fffb8abf2a8 R14: 00007f85ff6d4000 R15: 000055c3e9fcacf8
[ 41.997155] </TASK>
[ 41.997623] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 41.966759] WARNING: CPU: 0 PID: 480 at mm/util.c:657 __kvmalloc_node_noprof+0xdf/0xf0
[ 41.967926] Modules linked in:
[ 41.969339] CPU: 0 UID: 0 PID: 480 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[ 41.969996] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 41.971058] RIP: 0010:__kvmalloc_node_noprof+0xdf/0xf0
[ 41.971857] Code: 89 f0 ff 75 08 53 68 00 04 00 00 e8 db 33 04 00 48 83 c4 18 5b 41 5e 41 5f 5d c3 cc cc cc cc cc 41 f7 c6 00 20 00 00 75 81 90 <0f> 0b 90 31 c0 eb e3 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90
[ 41.973351] RSP: 0018:ffffaf06405ffdb8 EFLAGS: 00010246
[ 41.973664] RAX: 0000000000000004 RBX: 00000000ffffffff RCX: 0000000400000000
[ 41.973906] RDX: 0000000200001e00 RSI: 0000000000000000 RDI: ffffffffba269fe8
[ 41.974173] RBP: ffffaf06405ffdd0 R08: 0000000000412cc0 R09: 00000000ffffffff
[ 41.974824] R10: 0000000000000000 R11: 0000000000000000 R12: 00000000400003c0
[ 41.975447] R13: 00000000400003c0 R14: 0000000000400cc0 R15: 0000000200001e00
[ 41.976071] FS: 00007f85ff4a0740(0000) GS:ffffa154fbc00000(0000) knlGS:0000000000000000
[ 41.976834] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 41.979275] CR2: 00007f85ff644680 CR3: 0000000101748000 CR4: 00000000000006f0
[ 41.980629] Call Trace:
[ 41.982058] <TASK>
[ 41.982927] ? show_regs+0x5d/0x70
[ 41.983324] ? __warn+0xcf/0x1d0
[ 41.983628] ? __kvmalloc_node_noprof+0xdf/0xf0
[ 41.984126] ? report_bug+0x14c/0x1f0
[ 41.984860] ? handle_bug+0x67/0x90
[ 41.985161] ? exc_invalid_op+0x1f/0x50
[ 41.985334] ? asm_exc_invalid_op+0x1f/0x30
[ 41.985873] ? __kvmalloc_node_noprof+0x48/0xf0
[ 41.986364] ? __kvmalloc_node_noprof+0xdf/0xf0
[ 41.987571] ? __kvmalloc_node_noprof+0x48/0xf0
[ 41.988187] alloc_fdtable+0x7b/0x120
[ 41.988693] expand_files+0x118/0x310
[ 41.988866] ? do_prlimit+0x11d/0x160
[ 41.989034] ? __se_sys_prlimit64+0x1ea/0x2a0
[ 41.989207] ksys_dup3+0x71/0xd0
[ 41.989438] __x64_sys_dup2+0x1e/0x80
[ 41.989722] x64_sys_call+0x8cf/0x2f50
[ 41.990151] do_syscall_64+0xd0/0x1a0
[ 41.991678] ? exc_page_fault+0x68/0xc0
[ 41.992069] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 41.992769] RIP: 0033:0x7f85ff598c17
[ 41.993589] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[ 41.994486] RSP: 002b:00007fffb8abea38 EFLAGS: 00000202 ORIG_RAX: 0000000000000021
[ 41.995038] RAX: ffffffffffffffda RBX: 00007fffb8abf298 RCX: 00007f85ff598c17
[ 41.995693] RDX: 00007fffb8abebb8 RSI: 0000000040000038 RDI: 0000000000000002
[ 41.995919] RBP: 00007fffb8abec50 R08: 0000000000000064 R09: 0000000000000000
[ 41.996159] R10: 00007f85ff4b5170 R11: 0000000000000202 R12: 0000000000000000
[ 41.996572] R13: 00007fffb8abf2a8 R14: 00007f85ff6d4000 R15: 000055c3e9fcacf8
[ 41.997155] </TASK>
[ 41.997623] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 48.354352] WARNING: CPU: 0 PID: 500 at mm/util.c:657 __kvmalloc_node_noprof+0xd7/0xe0
[ 48.355207] Modules linked in:
[ 48.356078] CPU: 0 UID: 0 PID: 500 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[ 48.358830] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 48.360592] RIP: 0010:__kvmalloc_node_noprof+0xd7/0xe0
[ 48.361158] Code: 00 48 83 c4 18 48 8d 65 e8 5b 41 5c 41 5d 5d c3 cc cc cc cc 48 b9 00 00 00 00 00 20 00 00 eb bd 80 e7 20 0f 85 52 ff ff ff 90 <0f> 0b 90 e9 49 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90
[ 48.364511] RSP: 0018:ffffa2bb0097bdd8 EFLAGS: 00010246
[ 48.365126] RAX: 0000000000000000 RBX: 00000000004000c0 RCX: 0000000000000015
[ 48.366031] RDX: 0000000000000015 RSI: ffffffffad8373cd RDI: 0000000000452cc0
[ 48.367119] RBP: ffffa2bb0097bdf0 R08: 0000000000000040 R09: 0000000000000000
[ 48.368234] R10: ffffa2bb0097bdd8 R11: 0000000000000000 R12: 0000000200001e00
[ 48.368915] R13: 00000000ffffffff R14: ffff9b97802bf200 R15: ffff9b97802bf180
[ 48.369408] FS: 00007f1d62bd7740(0000) GS:ffff9b97fbc00000(0000) knlGS:0000000000000000
[ 48.370850] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 48.372707] CR2: 00007f1d62d6ffa4 CR3: 00000001008f2000 CR4: 00000000000006f0
[ 48.374538] Call Trace:
[ 48.375480] <TASK>
[ 48.376018] ? show_regs+0x68/0x80
[ 48.377178] ? __warn+0x91/0x140
[ 48.378229] ? __kvmalloc_node_noprof+0xd7/0xe0
[ 48.379127] ? report_bug+0x175/0x1a0
[ 48.380026] ? handle_bug+0x5c/0xa0
[ 48.380729] ? exc_invalid_op+0x1c/0x80
[ 48.381258] ? asm_exc_invalid_op+0x1f/0x30
[ 48.381986] ? __kmalloc_node_noprof+0x39d/0x4c0
[ 48.382808] ? __kvmalloc_node_noprof+0xd7/0xe0
[ 48.383652] ? __kvmalloc_node_noprof+0x53/0xe0
[ 48.383899] alloc_fdtable+0x78/0x120
[ 48.384132] expand_files+0x68/0x2e0
[ 48.384324] ? do_prlimit+0x134/0x210
[ 48.384886] ? __pfx_read_tsc+0x10/0x10
[ 48.385439] ? trace_preempt_off+0x1e/0x70
[ 48.386230] ? ksys_dup3+0x61/0x100
[ 48.386704] ksys_dup3+0x6c/0x100
[ 48.387144] __x64_sys_dup2+0x32/0xc0
[ 48.387689] x64_sys_call+0x2082/0x20b0
[ 48.388447] do_syscall_64+0xb2/0x1d0
[ 48.389171] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 48.390196] RIP: 0033:0x7f1d62ccfc17
[ 48.390900] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[ 48.393150] RSP: 002b:00007ffc084c5da8 EFLAGS: 00000202 ORIG_RAX: 0000000000000021
[ 48.394460] RAX: ffffffffffffffda RBX: 00007ffc084c6608 RCX: 00007f1d62ccfc17
[ 48.394762] RDX: 00007ffc084c5dd0 RSI: 0000000040000038 RDI: 0000000000000002
[ 48.395035] RBP: 00007ffc084c5fd0 R08: 0000000000000064 R09: 0000000000000000
[ 48.396247] R10: 00007f1d62bec170 R11: 0000000000000202 R12: 0000000000000000
[ 48.398627] R13: 00007ffc084c6618 R14: 00007f1d62e0b000 R15: 00005569f2282dd8
[ 48.399561] </TASK>
[ 48.400473] ---[ end trace 0000000000000000 ]---