Build

Regressions (compared to v6.13-rc7-102-gce69b4019001)

qemu-arm64, kselftest-memfd

qemu-armv7, kselftest-timers

qemu-armv7, ltp-fs

qemu-x86_64-compat, ltp-syscalls

qemu-x86_64, kselftest-x86

qemu-x86_64, ltp-sched

qemu-x86_64, kselftest-seccomp

qemu-x86_64, kselftest-tc-testing

qemu-x86_64, kselftest-timers

qemu-x86_64, kselftest-x86

x15, kselftest-cgroup

Fixes (compared to v6.13-rc7-102-gce69b4019001)

e850-96, boot

qemu-arm64, ltp-fs

qemu-armv7, kselftest-seccomp

qemu-armv7, ltp-fs

qemu-armv7, kselftest-futex

qemu-x86_64-compat, ltp-sched

x15, kselftest-cgroup

Build Parser (compared to v6.13-rc7-102-gce69b4019001)

s390, log-parser-build-gcc

x86_64, log-parser-build-clang

x86_64, log-parser-build-gcc

Boot Parser (compared to v6.13-rc7-102-gce69b4019001)

qemu-arm64, log-parser-boot

qemu-x86_64, log-parser-boot

x15, log-parser-boot

Test Parser (compared to v6.13-rc7-102-gce69b4019001)

qemu-arm64, log-parser-test

qemu-riscv64, log-parser-test

qemu-x86_64, log-parser-test

Test log snippets

test log snippet regressions 1

Home

memfd_memfd_test fail

test log snippet regressions 2

Home

timers_raw_skew fail

test log snippet regressions 3

Home

fs_fill fs_fill
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 30914ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file0
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 34709ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 14362ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file0
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 18306ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 9978ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file0
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 13232ms

test log snippet regressions 4

Home

epoll_wait04 epoll_wait04
epoll_wait04.c:37: TFAIL: epoll_wait() waited for 1002us with a timeout equal to zero

test log snippet regressions 5

Home

x86_sigreturn_64 fail

test log snippet regressions 6

Home

starvation starvation
starvation.c:98: TINFO: Setting affinity to CPU 0
starvation.c:52: TINFO: CPU did 120000000 loops in 263316us
starvation.c:148: TFAIL: Scheduller starvation reproduced.

test log snippet regressions 7

Home

seccomp_seccomp_benchmark_native_1_bitmap pass
seccomp_seccomp_benchmark_native_1_filter pass
seccomp_seccomp_benchmark_per-filter_last_2_diff_per-filter_filters_4 fail
seccomp_seccomp_benchmark_1_bitmapped_2_bitmapped pass
seccomp_seccomp_benchmark_entry_1_bitmapped pass
seccomp_seccomp_benchmark_entry_2_bitmapped fail
seccomp_seccomp_benchmark_native_entry_per_filter_4_4_filters_total fail
seccomp_seccomp_benchmark fail

test log snippet regressions 8

Home

tc-testing_tdc_sh fail

test log snippet regressions 9

Home

timers_posix_timers_ITIMER_VIRTUAL pass
timers_posix_timers_ITIMER_PROF pass
timers_posix_timers_ITIMER_REAL pass
timers_posix_timers_timer_create_per_CLOCK_THREAD_CPUTIME_ID pass
timers_posix_timers_timer_create_per_CLOCK_PROCESS_CPUTIME_ID pass
timers_posix_timers_check_signal_distribution fail
timers_posix_timers_check_sig_ign_SIGEV_SIGNAL pass
timers_posix_timers_check_sig_ign_SIGEV_THREAD_ID pass
timers_posix_timers_check_rearm pass
timers_posix_timers_check_delete pass
timers_posix_timers_check_sigev_none_CLOCK_MONOTONIC pass
timers_posix_timers_check_sigev_none_CLOCK_PROCESS_CPUTIME_ID pass
timers_posix_timers_check_gettime_CLOCK_MONOTONIC pass
timers_posix_timers_check_gettime_CLOCK_PROCESS_CPUTIME_ID pass
timers_posix_timers_check_gettime_CLOCK_THREAD_CPUTIME_ID pass
timers_posix_timers_check_overrun_CLOCK_MONOTONIC pass
timers_posix_timers_check_overrun_CLOCK_PROCESS_CPUTIME_ID pass
timers_posix_timers_check_overrun_CLOCK_THREAD_CPUTIME_ID pass
timers_posix_timers fail

test log snippet regressions 10

Home

timers_posix_timers_check_signal_distribution fail

test log snippet regressions 11

Home

x86_sigreturn_64 fail

test log snippet regressions 12

Home

cgroup_test_freezer_test_cgfreezer_simple pass
cgroup_test_freezer_test_cgfreezer_tree pass
cgroup_test_freezer_test_cgfreezer_forkbomb pass
cgroup_test_freezer_test_cgfreezer_mkdir pass
cgroup_test_freezer_test_cgfreezer_rm[  100.216278] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=net:msg_zerocopy.sh RESULT=skip>
cgroup_test_freezer_test_cgfreezer_migrate pass
cgroup_test_freezer_test_cgfreezer_ptrace fail
cgroup_test_freezer_test_cgfreezer_stopped pass
cgroup_test_freezer_test_cgfreezer_ptraced pass
cgroup_test_freezer_test_cgfreezer_vfork pass

test log snippet regressions 13

Home

cgroup_test_freezer_test_cgfreezer_ptrace fail
cgroup_test_freezer_test_cgfreezer_ptraced pass

test log snippet regressions 14

Home

cgroup_test_memcontrol_test_memcg_min fail

test log snippet build parser 1

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc'
s390x-linux-gnu-objcopy: stSOg5th: warning: allocated section `.got.plt' not in segment

test log snippet build parser 2

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc'
s390x-linux-gnu-objcopy: stbjlYmK: warning: allocated section `.got.plt' not in segment

test log snippet build parser 3

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc'
s390x-linux-gnu-objcopy: st6dG2T0: warning: allocated section `.got.plt' not in segment

test log snippet build parser 4

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc'
s390x-linux-gnu-objcopy: stOMG84U: warning: allocated section `.got.plt' not in segment

test log snippet build parser 5

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'HOSTCC=sccache clang' 'CC=sccache clang' LLVM=1 LLVM_IAS=1 kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/x86_64-linux-gnu-ld: warning: /tmp/test_encl_bootstrap-2d5cb0.o: missing .note.GNU-stack section implies executable stack
/usr/bin/x86_64-linux-gnu-ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker

test log snippet build parser 6

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1 kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/x86_64-linux-gnu-ld: warning: /tmp/test_encl_bootstrap-f354b8.o: missing .note.GNU-stack section implies executable stack
/usr/bin/x86_64-linux-gnu-ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker

test log snippet build parser 7

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/ld: warning: /tmp/cceEq0R8.o: missing .note.GNU-stack section implies executable stack
/usr/bin/ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker

test log snippet build parser 8

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/ld: warning: /tmp/ccKMDOYT.o: missing .note.GNU-stack section implies executable stack
/usr/bin/ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker

test log snippet boot parser 1

Home

[   53.700260] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[   53.701203] Modules linked in:
[   53.704941] CPU: 1 UID: 0 PID: 388 Comm: kunit_try_catch Tainted: G                 N 6.13.0-rc7 #1
[   53.706248] Tainted: [N]=TEST
[   53.706723] Hardware name: linux,dummy-virt (DT)
[   53.707949] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   53.708786] pc : kunit_test_null_dereference+0x68/0x160
[   53.711563] lr : kunit_generic_run_threadfn_adapter+0x80/0xec
[   53.712182] sp : ffff800080f27db0
[   53.712715] x29: ffff800080f27e10 x28: 0000000000000000 x27: 0000000000000000
[   53.714122] x26: 0000000000000000 x25: fff00000c804a500 x24: fff00000c7f77700
[   53.715136] x23: fff00000c7f73900 x22: ffff946e9a7cc2c4 x21: fff00000c7f73908
[   53.716380] x20: 1ffff000101e4fb6 x19: ffff800080087a10 x18: 00000000defbfbf9
[   53.717370] x17: 000000002b845636 x16: 0000000000000100 x15: fff00000ff80ce40
[   53.718846] x14: 1ffe00001b5300c3 x13: 00000000f1f1f1f1 x12: fffd800019009592
[   53.719865] x11: 1ffe000019009591 x10: fffd800019009591 x9 : dfff800000000000
[   53.720967] x8 : fff00000c804ac8c x7 : 0000000000000001 x6 : 0000000041b58ab3
[   53.722190] x5 : ffff7000101e4fb6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[   53.723144] x2 : dfff800000000000 x1 : fff00000c804a500 x0 : ffff800080087a10
[   53.724394] Call trace:
[   53.725112]  kunit_test_null_dereference+0x68/0x160 (P)
[   53.726547]  kunit_generic_run_threadfn_adapter+0x80/0xec
[   53.727158]  kthread+0x2b4/0x338
[   53.727689]  ret_from_fork+0x10/0x20
[   53.729028] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[   53.730470] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 2

Home

[  139.935399] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[  139.936393] Modules linked in:
[  139.937232] CPU: 0 UID: 0 PID: 621 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[  139.938174] Tainted: [B]=BAD_PAGE, [N]=TEST
[  139.938741] Hardware name: linux,dummy-virt (DT)
[  139.939518] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  139.940422] pc : kunit_test_null_dereference+0x70/0x170
[  139.941120] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  139.941723] sp : ffff8000832b7dc0
[  139.942293] x29: ffff8000832b7e20 x28: 0000000000000000 x27: 0000000000000000
[  139.943416] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c5d4c300
[  139.944372] x23: ffff93ead3fc71b0 x22: ffff93ead3fcfd70 x21: fff00000c5d4c308
[  139.945376] x20: 1ffff00010656fb8 x19: ffff8000800879f0 x18: 00000000fa01d7a2
[  139.946345] x17: 0000000000000001 x16: fff00000da4e3ca0 x15: fff00000ff615b48
[  139.947341] x14: 1ffe00001b49c778 x13: fff00000da4e3c98 x12: fffd8000191948b2
[  139.948356] x11: 1ffe0000191948b1 x10: fffd8000191948b1 x9 : ffff93ead3fc7238
[  139.949430] x8 : ffff8000832b7cb8 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  139.950494] x5 : ffff700010656fb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  139.951489] x2 : dfff800000000000 x1 : fff00000c8ca3cc0 x0 : ffff8000800879f0
[  139.952558] Call trace:
[  139.952980]  kunit_test_null_dereference+0x70/0x170 (P)
[  139.953665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  139.954364]  kthread+0x24c/0x2d0
[  139.954918]  ret_from_fork+0x10/0x20
[  139.956042] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  139.957157] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 3

Home

[  139.935399] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[  139.936393] Modules linked in:
[  139.937232] CPU: 0 UID: 0 PID: 621 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[  139.938174] Tainted: [B]=BAD_PAGE, [N]=TEST
[  139.938741] Hardware name: linux,dummy-virt (DT)
[  139.939518] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  139.940422] pc : kunit_test_null_dereference+0x70/0x170
[  139.941120] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  139.941723] sp : ffff8000832b7dc0
[  139.942293] x29: ffff8000832b7e20 x28: 0000000000000000 x27: 0000000000000000
[  139.943416] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c5d4c300
[  139.944372] x23: ffff93ead3fc71b0 x22: ffff93ead3fcfd70 x21: fff00000c5d4c308
[  139.945376] x20: 1ffff00010656fb8 x19: ffff8000800879f0 x18: 00000000fa01d7a2
[  139.946345] x17: 0000000000000001 x16: fff00000da4e3ca0 x15: fff00000ff615b48
[  139.947341] x14: 1ffe00001b49c778 x13: fff00000da4e3c98 x12: fffd8000191948b2
[  139.948356] x11: 1ffe0000191948b1 x10: fffd8000191948b1 x9 : ffff93ead3fc7238
[  139.949430] x8 : ffff8000832b7cb8 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  139.950494] x5 : ffff700010656fb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  139.951489] x2 : dfff800000000000 x1 : fff00000c8ca3cc0 x0 : ffff8000800879f0
[  139.952558] Call trace:
[  139.952980]  kunit_test_null_dereference+0x70/0x170 (P)
[  139.953665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  139.954364]  kthread+0x24c/0x2d0
[  139.954918]  ret_from_fork+0x10/0x20
[  139.956042] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  139.957157] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 4

Home

[   30.846063] ==================================================================
[   30.846626] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   30.847403] Free of addr fff00000c5b12ba0 by task kunit_try_catch/181
[   30.848092] 
[   30.848536] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.850115] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.850696] Hardware name: linux,dummy-virt (DT)
[   30.851206] Call trace:
[   30.851629]  show_stack+0x20/0x38 (C)
[   30.852273]  dump_stack_lvl+0x8c/0xd0
[   30.852784]  print_report+0x118/0x5e0
[   30.853397]  kasan_report_invalid_free+0xb0/0xd8
[   30.854395]  check_slab_allocation+0xd4/0x108
[   30.854902]  __kasan_slab_pre_free+0x2c/0x48
[   30.855508]  kfree+0xe8/0x3c8
[   30.856131]  kfree_sensitive+0x3c/0xb0
[   30.857272]  kmalloc_double_kzfree+0x168/0x308
[   30.857924]  kunit_try_run_case+0x14c/0x3d0
[   30.858590]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.858997]  kthread+0x24c/0x2d0
[   30.859717]  ret_from_fork+0x10/0x20
[   30.860382] 
[   30.860686] Allocated by task 181:
[   30.861212]  kasan_save_stack+0x3c/0x68
[   30.861698]  kasan_save_track+0x20/0x40
[   30.862577]  kasan_save_alloc_info+0x40/0x58
[   30.863218]  __kasan_kmalloc+0xd4/0xd8
[   30.864016]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.864956]  kmalloc_double_kzfree+0xb8/0x308
[   30.865831]  kunit_try_run_case+0x14c/0x3d0
[   30.866455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.867119]  kthread+0x24c/0x2d0
[   30.867593]  ret_from_fork+0x10/0x20
[   30.868124] 
[   30.868913] Freed by task 181:
[   30.869412]  kasan_save_stack+0x3c/0x68
[   30.869960]  kasan_save_track+0x20/0x40
[   30.870538]  kasan_save_free_info+0x4c/0x78
[   30.871169]  __kasan_slab_free+0x6c/0x98
[   30.871750]  kfree+0x114/0x3c8
[   30.872947]  kfree_sensitive+0x80/0xb0
[   30.873379]  kmalloc_double_kzfree+0x11c/0x308
[   30.874146]  kunit_try_run_case+0x14c/0x3d0
[   30.874825]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.875554]  kthread+0x24c/0x2d0
[   30.876131]  ret_from_fork+0x10/0x20
[   30.877067] 
[   30.877388] The buggy address belongs to the object at fff00000c5b12ba0
[   30.877388]  which belongs to the cache kmalloc-16 of size 16
[   30.878442] The buggy address is located 0 bytes inside of
[   30.878442]  16-byte region [fff00000c5b12ba0, fff00000c5b12bb0)
[   30.879802] 
[   30.880191] The buggy address belongs to the physical page:
[   30.881318] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b12
[   30.882244] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.883086] page_type: f5(slab)
[   30.883684] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.885028] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   30.885913] page dumped because: kasan: bad access detected
[   30.886513] 
[   30.886887] Memory state around the buggy address:
[   30.887488]  fff00000c5b12a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.888298]  fff00000c5b12b00: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.889232] >fff00000c5b12b80: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   30.890574]                                ^
[   30.891341]  fff00000c5b12c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.892344]  fff00000c5b12c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.893451] ==================================================================

test log snippet boot parser 5

Home

[   29.146351] ==================================================================
[   29.147606] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   29.148767] Read of size 1 at addr fff00000c5e9df7f by task kunit_try_catch/127
[   29.149763] 
[   29.150187] CPU: 0 UID: 0 PID: 127 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.151267] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.151765] Hardware name: linux,dummy-virt (DT)
[   29.152369] Call trace:
[   29.152786]  show_stack+0x20/0x38 (C)
[   29.153381]  dump_stack_lvl+0x8c/0xd0
[   29.154234]  print_report+0x118/0x5e0
[   29.154734]  kasan_report+0xc8/0x118
[   29.155298]  __asan_report_load1_noabort+0x20/0x30
[   29.155913]  kmalloc_oob_left+0x2ec/0x320
[   29.156816]  kunit_try_run_case+0x14c/0x3d0
[   29.157418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.158040]  kthread+0x24c/0x2d0
[   29.158588]  ret_from_fork+0x10/0x20
[   29.159166] 
[   29.159509] Allocated by task 28:
[   29.160036]  kasan_save_stack+0x3c/0x68
[   29.160937]  kasan_save_track+0x20/0x40
[   29.161470]  kasan_save_alloc_info+0x40/0x58
[   29.162074]  __kasan_kmalloc+0xd4/0xd8
[   29.162566]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   29.163274]  kstrdup+0x54/0xc8
[   29.163728]  devtmpfs_work_loop+0x384/0x590
[   29.164695]  devtmpfsd+0x50/0x58
[   29.165552]  kthread+0x24c/0x2d0
[   29.166315]  ret_from_fork+0x10/0x20
[   29.166934] 
[   29.167338] Freed by task 28:
[   29.167998]  kasan_save_stack+0x3c/0x68
[   29.168807]  kasan_save_track+0x20/0x40
[   29.169525]  kasan_save_free_info+0x4c/0x78
[   29.169923]  __kasan_slab_free+0x6c/0x98
[   29.170509]  kfree+0x114/0x3c8
[   29.171041]  devtmpfs_work_loop+0x498/0x590
[   29.171652]  devtmpfsd+0x50/0x58
[   29.172216]  kthread+0x24c/0x2d0
[   29.172751]  ret_from_fork+0x10/0x20
[   29.173704] 
[   29.174070] The buggy address belongs to the object at fff00000c5e9df60
[   29.174070]  which belongs to the cache kmalloc-16 of size 16
[   29.175300] The buggy address is located 15 bytes to the right of
[   29.175300]  allocated 16-byte region [fff00000c5e9df60, fff00000c5e9df70)
[   29.176796] 
[   29.177163] The buggy address belongs to the physical page:
[   29.177800] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9d
[   29.178654] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.179391] page_type: f5(slab)
[   29.179933] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   29.181125] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   29.181921] page dumped because: kasan: bad access detected
[   29.182463] 
[   29.182802] Memory state around the buggy address:
[   29.183425]  fff00000c5e9de00: 00 01 fc fc fa fb fc fc 00 04 fc fc 00 04 fc fc
[   29.184153]  fff00000c5e9de80: fa fb fc fc 00 02 fc fc 00 02 fc fc 00 00 fc fc
[   29.185342] >fff00000c5e9df00: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc
[   29.186071]                                                                 ^
[   29.186825]  fff00000c5e9df80: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.188026]  fff00000c5e9e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.188869] ==================================================================

test log snippet boot parser 6

Home

[   33.189681] ==================================================================
[   33.190845] BUG: KASAN: slab-out-of-bounds in memchr+0x78/0x88
[   33.191454] Read of size 1 at addr fff00000c5ced818 by task kunit_try_catch/244
[   33.192616] 
[   33.192961] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   33.194169] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.194896] Hardware name: linux,dummy-virt (DT)
[   33.195615] Call trace:
[   33.196208]  show_stack+0x20/0x38 (C)
[   33.197146]  dump_stack_lvl+0x8c/0xd0
[   33.198198]  print_report+0x118/0x5e0
[   33.199079]  kasan_report+0xc8/0x118
[   33.199761]  __asan_report_load1_noabort+0x20/0x30
[   33.200506]  memchr+0x78/0x88
[   33.201066]  kasan_memchr+0x148/0x2d8
[   33.201598]  kunit_try_run_case+0x14c/0x3d0
[   33.202340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.203171]  kthread+0x24c/0x2d0
[   33.203799]  ret_from_fork+0x10/0x20
[   33.204556] 
[   33.204824] Allocated by task 244:
[   33.205330]  kasan_save_stack+0x3c/0x68
[   33.205960]  kasan_save_track+0x20/0x40
[   33.207102]  kasan_save_alloc_info+0x40/0x58
[   33.207849]  __kasan_kmalloc+0xd4/0xd8
[   33.208918]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.209645]  kasan_memchr+0xb0/0x2d8
[   33.210352]  kunit_try_run_case+0x14c/0x3d0
[   33.210945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.211869]  kthread+0x24c/0x2d0
[   33.212562]  ret_from_fork+0x10/0x20
[   33.213071] 
[   33.213388] The buggy address belongs to the object at fff00000c5ced800
[   33.213388]  which belongs to the cache kmalloc-32 of size 32
[   33.215476] The buggy address is located 0 bytes to the right of
[   33.215476]  allocated 24-byte region [fff00000c5ced800, fff00000c5ced818)
[   33.216726] 
[   33.217095] The buggy address belongs to the physical page:
[   33.217756] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ced
[   33.219300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.220029] page_type: f5(slab)
[   33.220939] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.221754] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   33.222350] page dumped because: kasan: bad access detected
[   33.223364] 
[   33.223966] Memory state around the buggy address:
[   33.224857]  fff00000c5ced700: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   33.225449]  fff00000c5ced780: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.226364] >fff00000c5ced800: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.227159]                             ^
[   33.227738]  fff00000c5ced880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.228692]  fff00000c5ced900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.229797] ==================================================================

test log snippet boot parser 7

Home

[   33.240126] ==================================================================
[   33.241122] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   33.241789] Read of size 1 at addr fff00000c5ced8d8 by task kunit_try_catch/246
[   33.242502] 
[   33.242899] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   33.243915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.244527] Hardware name: linux,dummy-virt (DT)
[   33.245484] Call trace:
[   33.245920]  show_stack+0x20/0x38 (C)
[   33.246453]  dump_stack_lvl+0x8c/0xd0
[   33.247073]  print_report+0x118/0x5e0
[   33.247633]  kasan_report+0xc8/0x118
[   33.248932]  __asan_report_load1_noabort+0x20/0x30
[   33.249576]  memcmp+0x198/0x1d8
[   33.250340]  kasan_memcmp+0x16c/0x300
[   33.251062]  kunit_try_run_case+0x14c/0x3d0
[   33.251646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.252292]  kthread+0x24c/0x2d0
[   33.252863]  ret_from_fork+0x10/0x20
[   33.253492] 
[   33.253844] Allocated by task 246:
[   33.254759]  kasan_save_stack+0x3c/0x68
[   33.255381]  kasan_save_track+0x20/0x40
[   33.255955]  kasan_save_alloc_info+0x40/0x58
[   33.256947]  __kasan_kmalloc+0xd4/0xd8
[   33.257497]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.258366]  kasan_memcmp+0xbc/0x300
[   33.258928]  kunit_try_run_case+0x14c/0x3d0
[   33.259455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.260081]  kthread+0x24c/0x2d0
[   33.260580]  ret_from_fork+0x10/0x20
[   33.261766] 
[   33.262128] The buggy address belongs to the object at fff00000c5ced8c0
[   33.262128]  which belongs to the cache kmalloc-32 of size 32
[   33.263623] The buggy address is located 0 bytes to the right of
[   33.263623]  allocated 24-byte region [fff00000c5ced8c0, fff00000c5ced8d8)
[   33.265094] 
[   33.265739] The buggy address belongs to the physical page:
[   33.266436] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ced
[   33.267578] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.268503] page_type: f5(slab)
[   33.269318] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.270274] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   33.271166] page dumped because: kasan: bad access detected
[   33.271830] 
[   33.272200] Memory state around the buggy address:
[   33.272929]  fff00000c5ced780: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.273826]  fff00000c5ced800: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.274475] >fff00000c5ced880: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.275129]                                                     ^
[   33.275965]  fff00000c5ced900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.276822]  fff00000c5ced980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.277760] ==================================================================

test log snippet boot parser 8

Home

[   30.797039] ==================================================================
[   30.798375] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   30.799202] Read of size 1 at addr fff00000c5b12ba0 by task kunit_try_catch/181
[   30.799959] 
[   30.800383] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.801368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.801851] Hardware name: linux,dummy-virt (DT)
[   30.802449] Call trace:
[   30.803013]  show_stack+0x20/0x38 (C)
[   30.803624]  dump_stack_lvl+0x8c/0xd0
[   30.804988]  print_report+0x118/0x5e0
[   30.805469]  kasan_report+0xc8/0x118
[   30.806246]  __kasan_check_byte+0x54/0x70
[   30.806718]  kfree_sensitive+0x30/0xb0
[   30.807253]  kmalloc_double_kzfree+0x168/0x308
[   30.808804]  kunit_try_run_case+0x14c/0x3d0
[   30.809345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.810187]  kthread+0x24c/0x2d0
[   30.810868]  ret_from_fork+0x10/0x20
[   30.811648] 
[   30.812155] Allocated by task 181:
[   30.813108]  kasan_save_stack+0x3c/0x68
[   30.814046]  kasan_save_track+0x20/0x40
[   30.814562]  kasan_save_alloc_info+0x40/0x58
[   30.814971]  __kasan_kmalloc+0xd4/0xd8
[   30.815854]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.816600]  kmalloc_double_kzfree+0xb8/0x308
[   30.817259]  kunit_try_run_case+0x14c/0x3d0
[   30.817937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.818651]  kthread+0x24c/0x2d0
[   30.818940]  ret_from_fork+0x10/0x20
[   30.819368] 
[   30.819692] Freed by task 181:
[   30.820236]  kasan_save_stack+0x3c/0x68
[   30.821312]  kasan_save_track+0x20/0x40
[   30.821724]  kasan_save_free_info+0x4c/0x78
[   30.822193]  __kasan_slab_free+0x6c/0x98
[   30.822816]  kfree+0x114/0x3c8
[   30.823378]  kfree_sensitive+0x80/0xb0
[   30.824003]  kmalloc_double_kzfree+0x11c/0x308
[   30.825098]  kunit_try_run_case+0x14c/0x3d0
[   30.825690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.826350]  kthread+0x24c/0x2d0
[   30.826845]  ret_from_fork+0x10/0x20
[   30.827362] 
[   30.827658] The buggy address belongs to the object at fff00000c5b12ba0
[   30.827658]  which belongs to the cache kmalloc-16 of size 16
[   30.829313] The buggy address is located 0 bytes inside of
[   30.829313]  freed 16-byte region [fff00000c5b12ba0, fff00000c5b12bb0)
[   30.830565] 
[   30.830981] The buggy address belongs to the physical page:
[   30.831702] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b12
[   30.833132] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.833902] page_type: f5(slab)
[   30.834496] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.835413] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   30.836315] page dumped because: kasan: bad access detected
[   30.837383] 
[   30.837654] Memory state around the buggy address:
[   30.838472]  fff00000c5b12a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.839488]  fff00000c5b12b00: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.840486] >fff00000c5b12b80: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   30.841393]                                ^
[   30.842055]  fff00000c5b12c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.843044]  fff00000c5b12c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.843922] ==================================================================

test log snippet boot parser 9

Home

[   30.621750] ==================================================================
[   30.622893] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   30.623597] Read of size 1 at addr fff00000c5b12b88 by task kunit_try_catch/173
[   30.624226] 
[   30.624643] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.626004] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.626470] Hardware name: linux,dummy-virt (DT)
[   30.627695] Call trace:
[   30.628104]  show_stack+0x20/0x38 (C)
[   30.629141]  dump_stack_lvl+0x8c/0xd0
[   30.629696]  print_report+0x118/0x5e0
[   30.630257]  kasan_report+0xc8/0x118
[   30.630840]  __asan_report_load1_noabort+0x20/0x30
[   30.631477]  kmalloc_uaf+0x300/0x338
[   30.632005]  kunit_try_run_case+0x14c/0x3d0
[   30.633044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.633660]  kthread+0x24c/0x2d0
[   30.634238]  ret_from_fork+0x10/0x20
[   30.634870] 
[   30.635206] Allocated by task 173:
[   30.635623]  kasan_save_stack+0x3c/0x68
[   30.636492]  kasan_save_track+0x20/0x40
[   30.637023]  kasan_save_alloc_info+0x40/0x58
[   30.637634]  __kasan_kmalloc+0xd4/0xd8
[   30.638191]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.638763]  kmalloc_uaf+0xb8/0x338
[   30.639518]  kunit_try_run_case+0x14c/0x3d0
[   30.640051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.641147]  kthread+0x24c/0x2d0
[   30.641595]  ret_from_fork+0x10/0x20
[   30.642159] 
[   30.642468] Freed by task 173:
[   30.642945]  kasan_save_stack+0x3c/0x68
[   30.643483]  kasan_save_track+0x20/0x40
[   30.644057]  kasan_save_free_info+0x4c/0x78
[   30.645181]  __kasan_slab_free+0x6c/0x98
[   30.645752]  kfree+0x114/0x3c8
[   30.646228]  kmalloc_uaf+0x11c/0x338
[   30.646727]  kunit_try_run_case+0x14c/0x3d0
[   30.647263]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.647948]  kthread+0x24c/0x2d0
[   30.648838]  ret_from_fork+0x10/0x20
[   30.649316] 
[   30.649663] The buggy address belongs to the object at fff00000c5b12b80
[   30.649663]  which belongs to the cache kmalloc-16 of size 16
[   30.650838] The buggy address is located 8 bytes inside of
[   30.650838]  freed 16-byte region [fff00000c5b12b80, fff00000c5b12b90)
[   30.651979] 
[   30.652773] The buggy address belongs to the physical page:
[   30.653426] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b12
[   30.654249] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.655100] page_type: f5(slab)
[   30.655565] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.656788] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   30.657720] page dumped because: kasan: bad access detected
[   30.658310] 
[   30.658652] Memory state around the buggy address:
[   30.659240]  fff00000c5b12a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.659981]  fff00000c5b12b00: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.660971] >fff00000c5b12b80: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.661814]                       ^
[   30.662430]  fff00000c5b12c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.663376]  fff00000c5b12c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.664179] ==================================================================

test log snippet boot parser 10

Home

[   31.200798] ==================================================================
[   31.201547] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   31.201922] Read of size 4 at addr fff00000c5cfc580 by task swapper/0/0
[   31.202399] 
[   31.202703] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N 6.13.0-rc7 #1
[   31.203699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.204338] Hardware name: linux,dummy-virt (DT)
[   31.205055] Call trace:
[   31.205405]  show_stack+0x20/0x38 (C)
[   31.206043]  dump_stack_lvl+0x8c/0xd0
[   31.206756]  print_report+0x118/0x5e0
[   31.208029]  kasan_report+0xc8/0x118
[   31.209068]  __asan_report_load4_noabort+0x20/0x30
[   31.209696]  rcu_uaf_reclaim+0x64/0x70
[   31.210349]  rcu_core+0x9f4/0x1e20
[   31.211011]  rcu_core_si+0x18/0x30
[   31.211668]  handle_softirqs+0x374/0xb20
[   31.212219]  __do_softirq+0x1c/0x28
[   31.213214]  ____do_softirq+0x18/0x30
[   31.213720]  call_on_irq_stack+0x24/0x58
[   31.214263]  do_softirq_own_stack+0x24/0x38
[   31.214752]  __irq_exit_rcu+0x1fc/0x318
[   31.215387]  irq_exit_rcu+0x1c/0x80
[   31.215972]  el1_interrupt+0x38/0x58
[   31.216568]  el1h_64_irq_handler+0x18/0x28
[   31.217555]  el1h_64_irq+0x6c/0x70
[   31.218076]  arch_local_irq_enable+0x4/0x8 (P)
[   31.218746]  do_idle+0x384/0x4e8
[   31.219296]  cpu_startup_entry+0x64/0x80
[   31.219834]  rest_init+0x160/0x188
[   31.220367]  start_kernel+0x308/0x3d0
[   31.220955]  __primary_switched+0x8c/0xa0
[   31.221786] 
[   31.222132] Allocated by task 187:
[   31.222694]  kasan_save_stack+0x3c/0x68
[   31.223236]  kasan_save_track+0x20/0x40
[   31.223727]  kasan_save_alloc_info+0x40/0x58
[   31.224461]  __kasan_kmalloc+0xd4/0xd8
[   31.224961]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.226016]  rcu_uaf+0xb0/0x2d0
[   31.226472]  kunit_try_run_case+0x14c/0x3d0
[   31.227144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.227830]  kthread+0x24c/0x2d0
[   31.228417]  ret_from_fork+0x10/0x20
[   31.228898] 
[   31.229240] Freed by task 0:
[   31.229713]  kasan_save_stack+0x3c/0x68
[   31.230741]  kasan_save_track+0x20/0x40
[   31.231462]  kasan_save_free_info+0x4c/0x78
[   31.231980]  __kasan_slab_free+0x6c/0x98
[   31.232643]  kfree+0x114/0x3c8
[   31.232952]  rcu_uaf_reclaim+0x28/0x70
[   31.233424]  rcu_core+0x9f4/0x1e20
[   31.234007]  rcu_core_si+0x18/0x30
[   31.234528]  handle_softirqs+0x374/0xb20
[   31.235144]  __do_softirq+0x1c/0x28
[   31.235696] 
[   31.236110] Last potentially related work creation:
[   31.237227]  kasan_save_stack+0x3c/0x68
[   31.237824]  __kasan_record_aux_stack+0xbc/0xe8
[   31.238566]  kasan_record_aux_stack_noalloc+0x14/0x20
[   31.239261]  __call_rcu_common.constprop.0+0x74/0xa10
[   31.239789]  call_rcu+0x18/0x30
[   31.240368]  rcu_uaf+0x14c/0x2d0
[   31.240906]  kunit_try_run_case+0x14c/0x3d0
[   31.241484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.242054]  kthread+0x24c/0x2d0
[   31.242991]  ret_from_fork+0x10/0x20
[   31.243681] 
[   31.244814] The buggy address belongs to the object at fff00000c5cfc580
[   31.244814]  which belongs to the cache kmalloc-32 of size 32
[   31.246084] The buggy address is located 0 bytes inside of
[   31.246084]  freed 32-byte region [fff00000c5cfc580, fff00000c5cfc5a0)
[   31.247680] 
[   31.248354] The buggy address belongs to the physical page:
[   31.249017] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cfc
[   31.250121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.250993] page_type: f5(slab)
[   31.251429] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   31.252664] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   31.253528] page dumped because: kasan: bad access detected
[   31.254324] 
[   31.254855] Memory state around the buggy address:
[   31.255626]  fff00000c5cfc480: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   31.256960]  fff00000c5cfc500: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   31.257953] >fff00000c5cfc580: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   31.258651]                    ^
[   31.259194]  fff00000c5cfc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.259989]  fff00000c5cfc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.261165] ==================================================================

test log snippet boot parser 11

Home

[   38.965728] ==================================================================
[   38.966534] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   38.966534] 
[   38.967458] Invalid free of 0x00000000d00fb05d (in kfence-#147):
[   38.968773]  test_double_free+0x1bc/0x238
[   38.969418]  kunit_try_run_case+0x14c/0x3d0
[   38.970174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.970859]  kthread+0x24c/0x2d0
[   38.971412]  ret_from_fork+0x10/0x20
[   38.971937] 
[   38.972266] kfence-#147: 0x00000000d00fb05d-0x0000000002a2c999, size=32, cache=kmalloc-32
[   38.972266] 
[   38.973664] allocated by task 292 on cpu 1 at 38.965297s (0.008355s ago):
[   38.974796]  test_alloc+0x298/0x620
[   38.975457]  test_double_free+0xd4/0x238
[   38.976170]  kunit_try_run_case+0x14c/0x3d0
[   38.976900]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.977714]  kthread+0x24c/0x2d0
[   38.978381]  ret_from_fork+0x10/0x20
[   38.979073] 
[   38.979544] freed by task 292 on cpu 1 at 38.965417s (0.014120s ago):
[   38.980504]  test_double_free+0x1ac/0x238
[   38.981066]  kunit_try_run_case+0x14c/0x3d0
[   38.981610]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.982504]  kthread+0x24c/0x2d0
[   38.982761]  ret_from_fork+0x10/0x20
[   38.983125] 
[   38.983533] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   38.984652] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.985304] Hardware name: linux,dummy-virt (DT)
[   38.985992] ==================================================================

test log snippet boot parser 12

Home

[   39.069495] ==================================================================
[   39.070206] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   39.070206] 
[   39.072116] Invalid free of 0x00000000e846ef3b (in kfence-#148):
[   39.072856]  test_double_free+0x100/0x238
[   39.073615]  kunit_try_run_case+0x14c/0x3d0
[   39.074362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.075043]  kthread+0x24c/0x2d0
[   39.075510]  ret_from_fork+0x10/0x20
[   39.076005] 
[   39.076317] kfence-#148: 0x00000000e846ef3b-0x00000000bc54309f, size=32, cache=test
[   39.076317] 
[   39.077745] allocated by task 294 on cpu 0 at 39.069118s (0.008615s ago):
[   39.078600]  test_alloc+0x22c/0x620
[   39.079202]  test_double_free+0xd4/0x238
[   39.079770]  kunit_try_run_case+0x14c/0x3d0
[   39.080392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.081118]  kthread+0x24c/0x2d0
[   39.081611]  ret_from_fork+0x10/0x20
[   39.082216] 
[   39.082590] freed by task 294 on cpu 0 at 39.069220s (0.013359s ago):
[   39.083575]  test_double_free+0xf0/0x238
[   39.084175]  kunit_try_run_case+0x14c/0x3d0
[   39.084870]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.085601]  kthread+0x24c/0x2d0
[   39.086160]  ret_from_fork+0x10/0x20
[   39.086670] 
[   39.087119] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   39.088218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.088781] Hardware name: linux,dummy-virt (DT)
[   39.089379] ==================================================================

test log snippet boot parser 13

Home

[   39.173484] ==================================================================
[   39.174376] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   39.174376] 
[   39.175376] Invalid free of 0x00000000ed3175fe (in kfence-#149):
[   39.176611]  test_invalid_addr_free+0x1ac/0x238
[   39.177245]  kunit_try_run_case+0x14c/0x3d0
[   39.177887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.178490]  kthread+0x24c/0x2d0
[   39.179062]  ret_from_fork+0x10/0x20
[   39.179569] 
[   39.179940] kfence-#149: 0x000000002a713913-0x00000000597adfdb, size=32, cache=kmalloc-32
[   39.179940] 
[   39.180897] allocated by task 296 on cpu 1 at 39.173141s (0.007725s ago):
[   39.181765]  test_alloc+0x298/0x620
[   39.182353]  test_invalid_addr_free+0xd4/0x238
[   39.182896]  kunit_try_run_case+0x14c/0x3d0
[   39.183531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.184254]  kthread+0x24c/0x2d0
[   39.184836]  ret_from_fork+0x10/0x20
[   39.185412] 
[   39.185754] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   39.186686] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.187290] Hardware name: linux,dummy-virt (DT)
[   39.187870] ==================================================================

test log snippet boot parser 14

Home

[   39.277354] ==================================================================
[   39.278150] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   39.278150] 
[   39.279216] Invalid free of 0x00000000ed11a38a (in kfence-#150):
[   39.280095]  test_invalid_addr_free+0xec/0x238
[   39.280731]  kunit_try_run_case+0x14c/0x3d0
[   39.281191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.281962]  kthread+0x24c/0x2d0
[   39.282500]  ret_from_fork+0x10/0x20
[   39.283040] 
[   39.283438] kfence-#150: 0x00000000cdf67ac5-0x0000000002ccbfcd, size=32, cache=test
[   39.283438] 
[   39.284470] allocated by task 298 on cpu 1 at 39.277152s (0.007306s ago):
[   39.285437]  test_alloc+0x22c/0x620
[   39.286041]  test_invalid_addr_free+0xd4/0x238
[   39.286651]  kunit_try_run_case+0x14c/0x3d0
[   39.287237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.287856]  kthread+0x24c/0x2d0
[   39.288337]  ret_from_fork+0x10/0x20
[   39.288852] 
[   39.289325] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   39.290403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.291026] Hardware name: linux,dummy-virt (DT)
[   39.291640] ==================================================================

test log snippet boot parser 15

Home

[   45.858158] ==================================================================
[   45.859246] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   45.859246] 
[   45.860356] Invalid read at 0x00000000f84bf4de:
[   45.861545]  test_invalid_access+0xdc/0x1f0
[   45.862250]  kunit_try_run_case+0x14c/0x3d0
[   45.862803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.863625]  kthread+0x24c/0x2d0
[   45.865787]  ret_from_fork+0x10/0x20
[   45.866427] 
[   45.866799] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   45.867599] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.868602] Hardware name: linux,dummy-virt (DT)
[   45.869342] ==================================================================

test log snippet boot parser 16

Home

[   30.197817] ==================================================================
[   30.199888] BUG: KFENCE: memory corruption in kmalloc_oob_16+0x1f0/0x3f8
[   30.199888] 
[   30.200983] Corrupted memory at 0x00000000e8783f90 [ ! ! ! . . . . . . . . . . . . . ] (in kfence-#97):
[   30.205497]  kmalloc_oob_16+0x1f0/0x3f8
[   30.206044]  kunit_try_run_case+0x14c/0x3d0
[   30.206559]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.207283]  kthread+0x24c/0x2d0
[   30.207812]  ret_from_fork+0x10/0x20
[   30.208527] 
[   30.209430] kfence-#97: 0x00000000ebf9ed67-0x00000000ed9eee02, size=13, cache=kmalloc-16
[   30.209430] 
[   30.210688] allocated by task 155 on cpu 1 at 30.194405s (0.016140s ago):
[   30.211706]  kmalloc_oob_16+0xb4/0x3f8
[   30.212604]  kunit_try_run_case+0x14c/0x3d0
[   30.213260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.213780]  kthread+0x24c/0x2d0
[   30.214609]  ret_from_fork+0x10/0x20
[   30.215425] 
[   30.216024] freed by task 155 on cpu 1 at 30.196929s (0.018893s ago):
[   30.217313]  kmalloc_oob_16+0x1f0/0x3f8
[   30.217824]  kunit_try_run_case+0x14c/0x3d0
[   30.218580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.219420]  kthread+0x24c/0x2d0
[   30.219661]  ret_from_fork+0x10/0x20
[   30.219975] 
[   30.220906] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.221689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.222141] Hardware name: linux,dummy-virt (DT)
[   30.222761] ==================================================================

test log snippet boot parser 17

Home

[   30.197817] ==================================================================
[   30.199888] BUG: KFENCE: memory corruption in kmalloc_oob_16+0x1f0/0x3f8
[   30.199888] 
[   30.200983] Corrupted memory at 0x00000000e8783f90 [ ! ! ! . . . . . . . . . . . . . ] (in kfence-#97):
[   30.205497]  kmalloc_oob_16+0x1f0/0x3f8
[   30.206044]  kunit_try_run_case+0x14c/0x3d0
[   30.206559]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.207283]  kthread+0x24c/0x2d0
[   30.207812]  ret_from_fork+0x10/0x20
[   30.208527] 
[   30.209430] kfence-#97: 0x00000000ebf9ed67-0x00000000ed9eee02, size=13, cache=kmalloc-16
[   30.209430] 
[   30.210688] allocated by task 155 on cpu 1 at 30.194405s (0.016140s ago):
[   30.211706]  kmalloc_oob_16+0xb4/0x3f8
[   30.212604]  kunit_try_run_case+0x14c/0x3d0
[   30.213260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.213780]  kthread+0x24c/0x2d0
[   30.214609]  ret_from_fork+0x10/0x20
[   30.215425] 
[   30.216024] freed by task 155 on cpu 1 at 30.196929s (0.018893s ago):
[   30.217313]  kmalloc_oob_16+0x1f0/0x3f8
[   30.217824]  kunit_try_run_case+0x14c/0x3d0
[   30.218580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.219420]  kthread+0x24c/0x2d0
[   30.219661]  ret_from_fork+0x10/0x20
[   30.219975] 
[   30.220906] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.221689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.222141] Hardware name: linux,dummy-virt (DT)
[   30.222761] ==================================================================

test log snippet boot parser 18

Home

[   39.901411] ==================================================================
[   39.902227] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   39.902227] 
[   39.903032] Corrupted memory at 0x000000002c213188 [ ! . . . . . . . . . . . . . . . ] (in kfence-#156):
[   39.905460]  test_corruption+0x120/0x378
[   39.906013]  kunit_try_run_case+0x14c/0x3d0
[   39.906681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.907372]  kthread+0x24c/0x2d0
[   39.907945]  ret_from_fork+0x10/0x20
[   39.908512] 
[   39.908885] kfence-#156: 0x00000000147e4f6f-0x00000000dfeae84b, size=32, cache=test
[   39.908885] 
[   39.909837] allocated by task 302 on cpu 0 at 39.901147s (0.008679s ago):
[   39.910698]  test_alloc+0x22c/0x620
[   39.911295]  test_corruption+0xdc/0x378
[   39.911865]  kunit_try_run_case+0x14c/0x3d0
[   39.912540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.913215]  kthread+0x24c/0x2d0
[   39.913764]  ret_from_fork+0x10/0x20
[   39.914263] 
[   39.914649] freed by task 302 on cpu 0 at 39.901237s (0.013401s ago):
[   39.915431]  test_corruption+0x120/0x378
[   39.916078]  kunit_try_run_case+0x14c/0x3d0
[   39.916707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.917430]  kthread+0x24c/0x2d0
[   39.917975]  ret_from_fork+0x10/0x20
[   39.918505] 
[   39.918953] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   39.919979] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.920546] Hardware name: linux,dummy-virt (DT)
[   39.921149] ==================================================================

test log snippet boot parser 19

Home

[   39.693626] ==================================================================
[   39.694414] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   39.694414] 
[   39.695171] Corrupted memory at 0x0000000037b50268 [ ! ] (in kfence-#154):
[   39.696410]  test_corruption+0x284/0x378
[   39.696975]  kunit_try_run_case+0x14c/0x3d0
[   39.697597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.698281]  kthread+0x24c/0x2d0
[   39.698835]  ret_from_fork+0x10/0x20
[   39.699421] 
[   39.699785] kfence-#154: 0x000000000eda7964-0x00000000b55ace2d, size=32, cache=kmalloc-32
[   39.699785] 
[   39.700720] allocated by task 300 on cpu 1 at 39.693132s (0.007577s ago):
[   39.701612]  test_alloc+0x298/0x620
[   39.702094]  test_corruption+0x198/0x378
[   39.702685]  kunit_try_run_case+0x14c/0x3d0
[   39.703207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.703949]  kthread+0x24c/0x2d0
[   39.704423]  ret_from_fork+0x10/0x20
[   39.705054] 
[   39.705370] freed by task 300 on cpu 1 at 39.693294s (0.012065s ago):
[   39.706151]  test_corruption+0x284/0x378
[   39.706684]  kunit_try_run_case+0x14c/0x3d0
[   39.707327]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.708068]  kthread+0x24c/0x2d0
[   39.708501]  ret_from_fork+0x10/0x20
[   39.709098] 
[   39.709494] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   39.710414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.711000] Hardware name: linux,dummy-virt (DT)
[   39.711627] ==================================================================

test log snippet boot parser 20

Home

[   40.109371] ==================================================================
[   40.110157] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   40.110157] 
[   40.111011] Corrupted memory at 0x0000000049227a95 [ ! ] (in kfence-#158):
[   40.112197]  test_corruption+0x1d8/0x378
[   40.112742]  kunit_try_run_case+0x14c/0x3d0
[   40.113508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.114149]  kthread+0x24c/0x2d0
[   40.114803]  ret_from_fork+0x10/0x20
[   40.115306] 
[   40.115748] kfence-#158: 0x000000000306921e-0x000000004beef461, size=32, cache=test
[   40.115748] 
[   40.116840] allocated by task 302 on cpu 0 at 40.109107s (0.007722s ago):
[   40.117790]  test_alloc+0x22c/0x620
[   40.118428]  test_corruption+0x198/0x378
[   40.119116]  kunit_try_run_case+0x14c/0x3d0
[   40.119686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.120491]  kthread+0x24c/0x2d0
[   40.121061]  ret_from_fork+0x10/0x20
[   40.121728] 
[   40.122092] freed by task 302 on cpu 0 at 40.109200s (0.012880s ago):
[   40.122908]  test_corruption+0x1d8/0x378
[   40.123553]  kunit_try_run_case+0x14c/0x3d0
[   40.124211]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.124966]  kthread+0x24c/0x2d0
[   40.125498]  ret_from_fork+0x10/0x20
[   40.126005] 
[   40.126427] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   40.127471] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.128054] Hardware name: linux,dummy-virt (DT)
[   40.128628] ==================================================================

test log snippet boot parser 21

Home

[   39.381706] ==================================================================
[   39.382268] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   39.382268] 
[   39.382680] Corrupted memory at 0x0000000000309ec9 [ ! . . . . . . . . . . . . . . . ] (in kfence-#151):
[   39.384841]  test_corruption+0x278/0x378
[   39.385408]  kunit_try_run_case+0x14c/0x3d0
[   39.386064]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.386838]  kthread+0x24c/0x2d0
[   39.387438]  ret_from_fork+0x10/0x20
[   39.388029] 
[   39.388391] kfence-#151: 0x000000001cbfa227-0x00000000c1f233f8, size=32, cache=kmalloc-32
[   39.388391] 
[   39.389455] allocated by task 300 on cpu 1 at 39.381224s (0.008219s ago):
[   39.390296]  test_alloc+0x298/0x620
[   39.390869]  test_corruption+0xdc/0x378
[   39.391371]  kunit_try_run_case+0x14c/0x3d0
[   39.392017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.392612]  kthread+0x24c/0x2d0
[   39.393174]  ret_from_fork+0x10/0x20
[   39.393744] 
[   39.394076] freed by task 300 on cpu 1 at 39.381414s (0.012651s ago):
[   39.394760]  test_corruption+0x278/0x378
[   39.395368]  kunit_try_run_case+0x14c/0x3d0
[   39.396002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.396663]  kthread+0x24c/0x2d0
[   39.397130]  ret_from_fork+0x10/0x20
[   39.397695] 
[   39.398109] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   39.399110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.399691] Hardware name: linux,dummy-virt (DT)
[   39.400316] ==================================================================

test log snippet boot parser 22

Home

[   45.621514] ==================================================================
[   45.622367] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   45.622367] 
[   45.623270] Corrupted memory at 0x00000000db9b0df8 [ ! . . . . . . . . . . . . . . . ] (in kfence-#211):
[   45.625800]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   45.626583]  kunit_try_run_case+0x14c/0x3d0
[   45.627183]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.627960]  kthread+0x24c/0x2d0
[   45.628484]  ret_from_fork+0x10/0x20
[   45.629103] 
[   45.629474] kfence-#211: 0x00000000c5b013fe-0x00000000f96cc8c3, size=73, cache=kmalloc-96
[   45.629474] 
[   45.630440] allocated by task 314 on cpu 0 at 45.621086s (0.009342s ago):
[   45.631278]  test_alloc+0x298/0x620
[   45.631864]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   45.632533]  kunit_try_run_case+0x14c/0x3d0
[   45.633197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.633911]  kthread+0x24c/0x2d0
[   45.634455]  ret_from_fork+0x10/0x20
[   45.635019] 
[   45.635396] freed by task 314 on cpu 0 at 45.621324s (0.014060s ago):
[   45.636190]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   45.636932]  kunit_try_run_case+0x14c/0x3d0
[   45.637519]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.638248]  kthread+0x24c/0x2d0
[   45.638817]  ret_from_fork+0x10/0x20
[   45.639338] 
[   45.639692] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   45.640692] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.641151] Hardware name: linux,dummy-virt (DT)
[   45.641768] ==================================================================

test log snippet boot parser 23

Home

[   44.997633] ==================================================================
[   44.998324] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   44.998324] 
[   44.999345] Out-of-bounds read at 0x000000007a9ef518 (105B right of kfence-#205):
[   45.000022]  test_kmalloc_aligned_oob_read+0x238/0x468
[   45.000895]  kunit_try_run_case+0x14c/0x3d0
[   45.001542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.002469]  kthread+0x24c/0x2d0
[   45.003055]  ret_from_fork+0x10/0x20
[   45.003578] 
[   45.003918] kfence-#205: 0x0000000062633de3-0x00000000c6c2332b, size=73, cache=kmalloc-96
[   45.003918] 
[   45.004910] allocated by task 312 on cpu 1 at 44.997165s (0.007733s ago):
[   45.005736]  test_alloc+0x298/0x620
[   45.006308]  test_kmalloc_aligned_oob_read+0x100/0x468
[   45.007028]  kunit_try_run_case+0x14c/0x3d0
[   45.007594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.008237]  kthread+0x24c/0x2d0
[   45.008761]  ret_from_fork+0x10/0x20
[   45.009309] 
[   45.009660] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   45.010644] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.011239] Hardware name: linux,dummy-virt (DT)
[   45.011796] ==================================================================

test log snippet boot parser 24

Home

[   37.406634] ==================================================================
[   37.407492] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   37.407492] 
[   37.408555] Out-of-bounds read at 0x00000000df1c23eb (1B left of kfence-#132):
[   37.409687]  test_out_of_bounds_read+0x114/0x3e0
[   37.410380]  kunit_try_run_case+0x14c/0x3d0
[   37.411130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.411735]  kthread+0x24c/0x2d0
[   37.412227]  ret_from_fork+0x10/0x20
[   37.412757] 
[   37.413142] kfence-#132: 0x0000000068a537a8-0x000000003193dcb6, size=32, cache=kmalloc-32
[   37.413142] 
[   37.414079] allocated by task 276 on cpu 0 at 37.405248s (0.008820s ago):
[   37.414932]  test_alloc+0x298/0x620
[   37.415499]  test_out_of_bounds_read+0xdc/0x3e0
[   37.416147]  kunit_try_run_case+0x14c/0x3d0
[   37.416693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.417388]  kthread+0x24c/0x2d0
[   37.417904]  ret_from_fork+0x10/0x20
[   37.418498] 
[   37.418903] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   37.419974] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.420503] Hardware name: linux,dummy-virt (DT)
[   37.421065] ==================================================================

test log snippet boot parser 25

Home

[   38.445287] ==================================================================
[   38.446214] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   38.446214] 
[   38.447021] Out-of-bounds write at 0x00000000492055f9 (1B left of kfence-#142):
[   38.447698]  test_out_of_bounds_write+0x100/0x240
[   38.448800]  kunit_try_run_case+0x14c/0x3d0
[   38.449434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.450127]  kthread+0x24c/0x2d0
[   38.450668]  ret_from_fork+0x10/0x20
[   38.451201] 
[   38.451557] kfence-#142: 0x00000000b6faead9-0x000000007467b642, size=32, cache=test
[   38.451557] 
[   38.452407] allocated by task 282 on cpu 0 at 38.445122s (0.007274s ago):
[   38.453284]  test_alloc+0x22c/0x620
[   38.453813]  test_out_of_bounds_write+0xc8/0x240
[   38.454426]  kunit_try_run_case+0x14c/0x3d0
[   38.455082]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.455810]  kthread+0x24c/0x2d0
[   38.456336]  ret_from_fork+0x10/0x20
[   38.456921] 
[   38.457319] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   38.458346] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.458926] Hardware name: linux,dummy-virt (DT)
[   38.459545] ==================================================================

test log snippet boot parser 26

Home

[   38.029393] ==================================================================
[   38.030251] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   38.030251] 
[   38.030981] Out-of-bounds write at 0x00000000cde40e29 (1B left of kfence-#138):
[   38.031827]  test_out_of_bounds_write+0x100/0x240
[   38.032445]  kunit_try_run_case+0x14c/0x3d0
[   38.033102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.033830]  kthread+0x24c/0x2d0
[   38.034402]  ret_from_fork+0x10/0x20
[   38.034933] 
[   38.035279] kfence-#138: 0x00000000d445f7a6-0x000000005675d3b8, size=32, cache=kmalloc-32
[   38.035279] 
[   38.036265] allocated by task 280 on cpu 0 at 38.029128s (0.007126s ago):
[   38.037093]  test_alloc+0x298/0x620
[   38.037560]  test_out_of_bounds_write+0xc8/0x240
[   38.038173]  kunit_try_run_case+0x14c/0x3d0
[   38.038789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.039526]  kthread+0x24c/0x2d0
[   38.040098]  ret_from_fork+0x10/0x20
[   38.040654] 
[   38.041061] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   38.041978] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.042503] Hardware name: linux,dummy-virt (DT)
[   38.043132] ==================================================================

test log snippet boot parser 27

Home

[   64.966396] ==================================================================
[   64.967136] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   64.967136] 
[   64.967981] Use-after-free read at 0x0000000053fca0f5 (in kfence-#217):
[   64.968754]  test_krealloc+0x51c/0x830
[   64.969320]  kunit_try_run_case+0x14c/0x3d0
[   64.969950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.970629]  kthread+0x24c/0x2d0
[   64.971200]  ret_from_fork+0x10/0x20
[   64.971729] 
[   64.972072] kfence-#217: 0x0000000053fca0f5-0x0000000002f04d63, size=32, cache=kmalloc-32
[   64.972072] 
[   64.973061] allocated by task 326 on cpu 1 at 64.965170s (0.007881s ago):
[   64.973736]  test_alloc+0x298/0x620
[   64.974310]  test_krealloc+0xc0/0x830
[   64.974941]  kunit_try_run_case+0x14c/0x3d0
[   64.975521]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.976275]  kthread+0x24c/0x2d0
[   64.976820]  ret_from_fork+0x10/0x20
[   64.977333] 
[   64.977688] freed by task 326 on cpu 1 at 64.965630s (0.012047s ago):
[   64.978561]  krealloc_noprof+0x148/0x360
[   64.979060]  test_krealloc+0x1dc/0x830
[   64.979641]  kunit_try_run_case+0x14c/0x3d0
[   64.980290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.980964]  kthread+0x24c/0x2d0
[   64.981522]  ret_from_fork+0x10/0x20
[   64.982048] 
[   64.982440] CPU: 1 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   64.983427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.983925] Hardware name: linux,dummy-virt (DT)
[   64.984532] ==================================================================

test log snippet boot parser 28

Home

[   64.775817] ==================================================================
[   64.776504] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   64.776504] 
[   64.777762] Use-after-free read at 0x00000000efb81b2f (in kfence-#215):
[   64.778570]  test_memcache_typesafe_by_rcu+0x280/0x560
[   64.779152]  kunit_try_run_case+0x14c/0x3d0
[   64.779788]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.780520]  kthread+0x24c/0x2d0
[   64.781098]  ret_from_fork+0x10/0x20
[   64.781603] 
[   64.781984] kfence-#215: 0x00000000efb81b2f-0x000000000d36ed58, size=32, cache=test
[   64.781984] 
[   64.782989] allocated by task 324 on cpu 1 at 64.761483s (0.021493s ago):
[   64.783865]  test_alloc+0x22c/0x620
[   64.784350]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   64.785101]  kunit_try_run_case+0x14c/0x3d0
[   64.785657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.786382]  kthread+0x24c/0x2d0
[   64.786917]  ret_from_fork+0x10/0x20
[   64.787485] 
[   64.787851] freed by task 324 on cpu 1 at 64.761608s (0.026233s ago):
[   64.788580]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   64.789290]  kunit_try_run_case+0x14c/0x3d0
[   64.789929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.790486]  kthread+0x24c/0x2d0
[   64.791045]  ret_from_fork+0x10/0x20
[   64.791616] 
[   64.792035] CPU: 1 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   64.792966] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.793539] Hardware name: linux,dummy-virt (DT)
[   64.794126] ==================================================================

test log snippet boot parser 29

Home

[   38.653483] ==================================================================
[   38.654287] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   38.654287] 
[   38.655012] Use-after-free read at 0x0000000017c3716e (in kfence-#144):
[   38.655794]  test_use_after_free_read+0x114/0x248
[   38.656589]  kunit_try_run_case+0x14c/0x3d0
[   38.657290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.658097]  kthread+0x24c/0x2d0
[   38.658694]  ret_from_fork+0x10/0x20
[   38.659329] 
[   38.659723] kfence-#144: 0x0000000017c3716e-0x0000000050811063, size=32, cache=test
[   38.659723] 
[   38.660973] allocated by task 286 on cpu 1 at 38.653123s (0.007839s ago):
[   38.661979]  test_alloc+0x22c/0x620
[   38.662538]  test_use_after_free_read+0xd0/0x248
[   38.663084]  kunit_try_run_case+0x14c/0x3d0
[   38.663707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.664413]  kthread+0x24c/0x2d0
[   38.664972]  ret_from_fork+0x10/0x20
[   38.665499] 
[   38.665838] freed by task 286 on cpu 1 at 38.653226s (0.012600s ago):
[   38.666687]  test_use_after_free_read+0xf0/0x248
[   38.667372]  kunit_try_run_case+0x14c/0x3d0
[   38.668015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.668669]  kthread+0x24c/0x2d0
[   38.669232]  ret_from_fork+0x10/0x20
[   38.669736] 
[   38.670148] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   38.671080] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.671668] Hardware name: linux,dummy-virt (DT)
[   38.672237] ==================================================================

test log snippet boot parser 30

Home

[   38.549515] ==================================================================
[   38.550282] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   38.550282] 
[   38.551053] Use-after-free read at 0x000000008389d0bc (in kfence-#143):
[   38.551856]  test_use_after_free_read+0x114/0x248
[   38.552706]  kunit_try_run_case+0x14c/0x3d0
[   38.553301]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.554062]  kthread+0x24c/0x2d0
[   38.554665]  ret_from_fork+0x10/0x20
[   38.555186] 
[   38.555539] kfence-#143: 0x000000008389d0bc-0x0000000006581508, size=32, cache=kmalloc-32
[   38.555539] 
[   38.556584] allocated by task 284 on cpu 0 at 38.549071s (0.007502s ago):
[   38.557328]  test_alloc+0x298/0x620
[   38.557907]  test_use_after_free_read+0xd0/0x248
[   38.558559]  kunit_try_run_case+0x14c/0x3d0
[   38.559068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.559817]  kthread+0x24c/0x2d0
[   38.560310]  ret_from_fork+0x10/0x20
[   38.560897] 
[   38.561255] freed by task 284 on cpu 0 at 38.549197s (0.012046s ago):
[   38.562088]  test_use_after_free_read+0x1c0/0x248
[   38.562741]  kunit_try_run_case+0x14c/0x3d0
[   38.563306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.563992]  kthread+0x24c/0x2d0
[   38.564468]  ret_from_fork+0x10/0x20
[   38.565067] 
[   38.565459] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   38.566446] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.567016] Hardware name: linux,dummy-virt (DT)
[   38.567572] ==================================================================

test log snippet boot parser 31

Home

[   23.329030] ==================================================================
[   23.329934] BUG: KASAN: invalid-free in kfree+0x271/0x3f0
[   23.330431] Free of addr ffff8881023e8001 by task kunit_try_catch/158
[   23.330785] 
[   23.330967] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   23.331851] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.332187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.334256] Call Trace:
[   23.334508]  <TASK>
[   23.334831]  dump_stack_lvl+0x73/0xb0
[   23.335728]  print_report+0xd1/0x640
[   23.336041]  ? __virt_addr_valid+0x1db/0x2d0
[   23.336976]  ? kfree+0x271/0x3f0
[   23.337496]  ? kasan_addr_to_slab+0x11/0xa0
[   23.337905]  ? kfree+0x271/0x3f0
[   23.338280]  kasan_report_invalid_free+0xc0/0xf0
[   23.338587]  ? kfree+0x271/0x3f0
[   23.339405]  ? kfree+0x271/0x3f0
[   23.339940]  __kasan_kfree_large+0x86/0xd0
[   23.340432]  free_large_kmalloc+0x3b/0xd0
[   23.341053]  kfree+0x271/0x3f0
[   23.341460]  kmalloc_large_invalid_free+0x121/0x2b0
[   23.342118]  ? __pfx_kmalloc_large_invalid_free+0x10/0x10
[   23.342772]  ? __schedule+0xc3e/0x2790
[   23.343290]  ? __pfx_read_tsc+0x10/0x10
[   23.343941]  ? ktime_get_ts64+0x84/0x230
[   23.344474]  kunit_try_run_case+0x1b3/0x490
[   23.345175]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.345563]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.346429]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.347208]  ? __kthread_parkme+0x82/0x160
[   23.347810]  ? preempt_count_sub+0x50/0x80
[   23.348432]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.348892]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.349396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.349750]  kthread+0x257/0x310
[   23.349997]  ? __pfx_kthread+0x10/0x10
[   23.350509]  ret_from_fork+0x41/0x80
[   23.350924]  ? __pfx_kthread+0x10/0x10
[   23.352050]  ret_from_fork_asm+0x1a/0x30
[   23.352623]  </TASK>
[   23.353054] 
[   23.353287] The buggy address belongs to the physical page:
[   23.353597] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e8
[   23.354756] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.355433] flags: 0x200000000000040(head|node=0|zone=2)
[   23.356168] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.356817] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.357281] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.357978] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.358511] head: 0200000000000002 ffffea000408fa01 ffffffffffffffff 0000000000000000
[   23.359727] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.360199] page dumped because: kasan: bad access detected
[   23.360838] 
[   23.361080] Memory state around the buggy address:
[   23.361435]  ffff8881023e7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.362065]  ffff8881023e7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.362528] >ffff8881023e8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.363032]                    ^
[   23.363788]  ffff8881023e8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.364399]  ffff8881023e8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.365085] ==================================================================

test log snippet boot parser 32

Home

[   30.906336] ==================================================================
[   30.906830] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[   30.907902] Write of size 8 at addr ffff888101aaa378 by task kunit_try_catch/289
[   30.908698] 
[   30.908983] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.909947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.910394] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.911316] Call Trace:
[   30.911558]  <TASK>
[   30.911830]  dump_stack_lvl+0x73/0xb0
[   30.912263]  print_report+0xd1/0x640
[   30.912645]  ? __virt_addr_valid+0x1db/0x2d0
[   30.912967]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.914013]  kasan_report+0x102/0x140
[   30.914462]  ? copy_to_kernel_nofault+0x99/0x260
[   30.915199]  ? copy_to_kernel_nofault+0x99/0x260
[   30.915869]  kasan_check_range+0x10c/0x1c0
[   30.916235]  __kasan_check_write+0x18/0x20
[   30.916899]  copy_to_kernel_nofault+0x99/0x260
[   30.917342]  copy_to_kernel_nofault_oob+0x214/0x4e0
[   30.918173]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   30.918979]  ? finish_task_switch.isra.0+0x153/0x700
[   30.919485]  ? __schedule+0xc3e/0x2790
[   30.920114]  ? trace_hardirqs_on+0x37/0xe0
[   30.920675]  ? irqentry_exit+0x2a/0x60
[   30.921090]  ? __pfx_read_tsc+0x10/0x10
[   30.921428]  ? ktime_get_ts64+0x84/0x230
[   30.922265]  kunit_try_run_case+0x1b3/0x490
[   30.922971]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   30.923453]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.923864]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.924351]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.925683]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.926507]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.927278]  kthread+0x257/0x310
[   30.927681]  ? __pfx_kthread+0x10/0x10
[   30.928155]  ret_from_fork+0x41/0x80
[   30.928693]  ? __pfx_kthread+0x10/0x10
[   30.928975]  ret_from_fork_asm+0x1a/0x30
[   30.929873]  </TASK>
[   30.930153] 
[   30.930486] Allocated by task 289:
[   30.930971]  kasan_save_stack+0x3d/0x60
[   30.931596]  kasan_save_track+0x18/0x40
[   30.932595]  kasan_save_alloc_info+0x3b/0x50
[   30.933157]  __kasan_kmalloc+0xb7/0xc0
[   30.933668]  __kmalloc_cache_noprof+0x184/0x410
[   30.934486]  copy_to_kernel_nofault_oob+0xc5/0x4e0
[   30.934996]  kunit_try_run_case+0x1b3/0x490
[   30.935692]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.936264]  kthread+0x257/0x310
[   30.936893]  ret_from_fork+0x41/0x80
[   30.937420]  ret_from_fork_asm+0x1a/0x30
[   30.937716] 
[   30.937868] The buggy address belongs to the object at ffff888101aaa300
[   30.937868]  which belongs to the cache kmalloc-128 of size 128
[   30.939364] The buggy address is located 0 bytes to the right of
[   30.939364]  allocated 120-byte region [ffff888101aaa300, ffff888101aaa378)
[   30.940507] 
[   30.940664] The buggy address belongs to the physical page:
[   30.941371] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aaa
[   30.941927] flags: 0x200000000000000(node=0|zone=2)
[   30.942305] page_type: f5(slab)
[   30.942747] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   30.943638] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.944420] page dumped because: kasan: bad access detected
[   30.944956] 
[   30.945453] Memory state around the buggy address:
[   30.945811]  ffff888101aaa200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   30.946173]  ffff888101aaa280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.947305] >ffff888101aaa300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.947896]                                                                 ^
[   30.948352]  ffff888101aaa380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.949175]  ffff888101aaa400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.950201] ==================================================================

test log snippet boot parser 33

Home

[   30.862021] ==================================================================
[   30.863162] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[   30.864215] Read of size 8 at addr ffff888101aaa378 by task kunit_try_catch/289
[   30.864911] 
[   30.865091] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.865772] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.867046] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.867582] Call Trace:
[   30.867879]  <TASK>
[   30.868830]  dump_stack_lvl+0x73/0xb0
[   30.869315]  print_report+0xd1/0x640
[   30.869900]  ? __virt_addr_valid+0x1db/0x2d0
[   30.870392]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.871092]  kasan_report+0x102/0x140
[   30.871423]  ? copy_to_kernel_nofault+0x225/0x260
[   30.871773]  ? copy_to_kernel_nofault+0x225/0x260
[   30.872761]  __asan_report_load8_noabort+0x18/0x20
[   30.873330]  copy_to_kernel_nofault+0x225/0x260
[   30.873944]  copy_to_kernel_nofault_oob+0x179/0x4e0
[   30.874338]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   30.875112]  ? finish_task_switch.isra.0+0x153/0x700
[   30.875707]  ? __schedule+0xc3e/0x2790
[   30.876184]  ? trace_hardirqs_on+0x37/0xe0
[   30.877115]  ? irqentry_exit+0x2a/0x60
[   30.877425]  ? __pfx_read_tsc+0x10/0x10
[   30.877986]  ? ktime_get_ts64+0x84/0x230
[   30.878400]  kunit_try_run_case+0x1b3/0x490
[   30.879127]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   30.879646]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.880007]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.880515]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.880904]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.881775]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.882375]  kthread+0x257/0x310
[   30.883016]  ? __pfx_kthread+0x10/0x10
[   30.883324]  ret_from_fork+0x41/0x80
[   30.883941]  ? __pfx_kthread+0x10/0x10
[   30.884355]  ret_from_fork_asm+0x1a/0x30
[   30.885001]  </TASK>
[   30.885304] 
[   30.885475] Allocated by task 289:
[   30.886224]  kasan_save_stack+0x3d/0x60
[   30.886708]  kasan_save_track+0x18/0x40
[   30.887366]  kasan_save_alloc_info+0x3b/0x50
[   30.888022]  __kasan_kmalloc+0xb7/0xc0
[   30.888371]  __kmalloc_cache_noprof+0x184/0x410
[   30.888854]  copy_to_kernel_nofault_oob+0xc5/0x4e0
[   30.889406]  kunit_try_run_case+0x1b3/0x490
[   30.890084]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.890951]  kthread+0x257/0x310
[   30.891311]  ret_from_fork+0x41/0x80
[   30.891834]  ret_from_fork_asm+0x1a/0x30
[   30.892335] 
[   30.892563] The buggy address belongs to the object at ffff888101aaa300
[   30.892563]  which belongs to the cache kmalloc-128 of size 128
[   30.893385] The buggy address is located 0 bytes to the right of
[   30.893385]  allocated 120-byte region [ffff888101aaa300, ffff888101aaa378)
[   30.894548] 
[   30.895058] The buggy address belongs to the physical page:
[   30.895607] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aaa
[   30.896385] flags: 0x200000000000000(node=0|zone=2)
[   30.897068] page_type: f5(slab)
[   30.897438] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   30.898339] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.899261] page dumped because: kasan: bad access detected
[   30.899693] 
[   30.900103] Memory state around the buggy address:
[   30.900686]  ffff888101aaa200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   30.901154]  ffff888101aaa280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.902123] >ffff888101aaa300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.902979]                                                                 ^
[   30.903742]  ffff888101aaa380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.904189]  ffff888101aaa400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.904989] ==================================================================

test log snippet boot parser 34

Home

[   27.364382] ==================================================================
[   27.365154] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50
[   27.366109] Write of size 8 at addr ffff888101e49d08 by task kunit_try_catch/269
[   27.367493] 
[   27.368132] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.369391] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.369714] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.370847] Call Trace:
[   27.371470]  <TASK>
[   27.371673]  dump_stack_lvl+0x73/0xb0
[   27.371989]  print_report+0xd1/0x640
[   27.372348]  ? __virt_addr_valid+0x1db/0x2d0
[   27.372805]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.373275]  kasan_report+0x102/0x140
[   27.374513]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   27.375224]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   27.376075]  kasan_check_range+0x10c/0x1c0
[   27.376648]  __kasan_check_write+0x18/0x20
[   27.377225]  kasan_bitops_modify.constprop.0+0x102/0xd50
[   27.377934]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.378832]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.379511]  ? trace_hardirqs_on+0x37/0xe0
[   27.380145]  ? kasan_bitops_generic+0x93/0x1c0
[   27.380680]  kasan_bitops_generic+0x117/0x1c0
[   27.381093]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.381711]  ? __pfx_read_tsc+0x10/0x10
[   27.382432]  ? ktime_get_ts64+0x84/0x230
[   27.383020]  kunit_try_run_case+0x1b3/0x490
[   27.383740]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.384270]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.384855]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.385287]  ? __kthread_parkme+0x82/0x160
[   27.385624]  ? preempt_count_sub+0x50/0x80
[   27.386752]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.387330]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.387783]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.388808]  kthread+0x257/0x310
[   27.389146]  ? __pfx_kthread+0x10/0x10
[   27.389487]  ret_from_fork+0x41/0x80
[   27.389917]  ? __pfx_kthread+0x10/0x10
[   27.390626]  ret_from_fork_asm+0x1a/0x30
[   27.391266]  </TASK>
[   27.391798] 
[   27.392113] Allocated by task 269:
[   27.392371]  kasan_save_stack+0x3d/0x60
[   27.392899]  kasan_save_track+0x18/0x40
[   27.393336]  kasan_save_alloc_info+0x3b/0x50
[   27.394238]  __kasan_kmalloc+0xb7/0xc0
[   27.394811]  __kmalloc_cache_noprof+0x184/0x410
[   27.395486]  kasan_bitops_generic+0x93/0x1c0
[   27.396148]  kunit_try_run_case+0x1b3/0x490
[   27.396480]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.397409]  kthread+0x257/0x310
[   27.397892]  ret_from_fork+0x41/0x80
[   27.398336]  ret_from_fork_asm+0x1a/0x30
[   27.398701] 
[   27.398867] The buggy address belongs to the object at ffff888101e49d00
[   27.398867]  which belongs to the cache kmalloc-16 of size 16
[   27.400340] The buggy address is located 8 bytes inside of
[   27.400340]  allocated 9-byte region [ffff888101e49d00, ffff888101e49d09)
[   27.401409] 
[   27.401670] The buggy address belongs to the physical page:
[   27.402123] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   27.402800] flags: 0x200000000000000(node=0|zone=2)
[   27.403189] page_type: f5(slab)
[   27.403542] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.404170] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   27.405277] page dumped because: kasan: bad access detected
[   27.406280] 
[   27.406632] Memory state around the buggy address:
[   27.406917]  ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   27.407753]  ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   27.408876] >ffff888101e49d00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.409727]                       ^
[   27.410434]  ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.411163]  ffff888101e49e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.411501] ==================================================================
---
[   27.643142] ==================================================================
[   27.643671] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   27.644421] Write of size 8 at addr ffff888101e49d08 by task kunit_try_catch/269
[   27.645149] 
[   27.645788] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.646618] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.647022] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.647674] Call Trace:
[   27.647933]  <TASK>
[   27.648171]  dump_stack_lvl+0x73/0xb0
[   27.649220]  print_report+0xd1/0x640
[   27.649727]  ? __virt_addr_valid+0x1db/0x2d0
[   27.650184]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.650625]  kasan_report+0x102/0x140
[   27.650862]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   27.651409]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   27.651884]  kasan_check_range+0x10c/0x1c0
[   27.652175]  __kasan_check_write+0x18/0x20
[   27.652983]  kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   27.653720]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.654352]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.655008]  ? trace_hardirqs_on+0x37/0xe0
[   27.655406]  ? kasan_bitops_generic+0x93/0x1c0
[   27.656363]  kasan_bitops_generic+0x117/0x1c0
[   27.656927]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.657435]  ? __pfx_read_tsc+0x10/0x10
[   27.657991]  ? ktime_get_ts64+0x84/0x230
[   27.658646]  kunit_try_run_case+0x1b3/0x490
[   27.659179]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.659520]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.660178]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.661060]  ? __kthread_parkme+0x82/0x160
[   27.661521]  ? preempt_count_sub+0x50/0x80
[   27.662154]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.662736]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.663374]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.664080]  kthread+0x257/0x310
[   27.664465]  ? __pfx_kthread+0x10/0x10
[   27.664892]  ret_from_fork+0x41/0x80
[   27.665472]  ? __pfx_kthread+0x10/0x10
[   27.666379]  ret_from_fork_asm+0x1a/0x30
[   27.666958]  </TASK>
[   27.667129] 
[   27.667526] Allocated by task 269:
[   27.668229]  kasan_save_stack+0x3d/0x60
[   27.668690]  kasan_save_track+0x18/0x40
[   27.669494]  kasan_save_alloc_info+0x3b/0x50
[   27.670154]  __kasan_kmalloc+0xb7/0xc0
[   27.670424]  __kmalloc_cache_noprof+0x184/0x410
[   27.671013]  kasan_bitops_generic+0x93/0x1c0
[   27.671659]  kunit_try_run_case+0x1b3/0x490
[   27.672531]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.673112]  kthread+0x257/0x310
[   27.673824]  ret_from_fork+0x41/0x80
[   27.674200]  ret_from_fork_asm+0x1a/0x30
[   27.675051] 
[   27.675276] The buggy address belongs to the object at ffff888101e49d00
[   27.675276]  which belongs to the cache kmalloc-16 of size 16
[   27.676418] The buggy address is located 8 bytes inside of
[   27.676418]  allocated 9-byte region [ffff888101e49d00, ffff888101e49d09)
[   27.677468] 
[   27.678179] The buggy address belongs to the physical page:
[   27.679065] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   27.679928] flags: 0x200000000000000(node=0|zone=2)
[   27.680403] page_type: f5(slab)
[   27.680740] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.681463] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   27.682221] page dumped because: kasan: bad access detected
[   27.682445] 
[   27.682525] Memory state around the buggy address:
[   27.682824]  ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   27.683587]  ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   27.684311] >ffff888101e49d00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.684776]                       ^
[   27.685096]  ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.686224]  ffff888101e49e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.686682] ==================================================================
---
[   27.458554] ==================================================================
[   27.459690] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50
[   27.461254] Write of size 8 at addr ffff888101e49d08 by task kunit_try_catch/269
[   27.462337] 
[   27.462553] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.463443] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.463751] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.465138] Call Trace:
[   27.465448]  <TASK>
[   27.465684]  dump_stack_lvl+0x73/0xb0
[   27.466189]  print_report+0xd1/0x640
[   27.466781]  ? __virt_addr_valid+0x1db/0x2d0
[   27.467443]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.468114]  kasan_report+0x102/0x140
[   27.468769]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   27.469136]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   27.469866]  kasan_check_range+0x10c/0x1c0
[   27.470845]  __kasan_check_write+0x18/0x20
[   27.471725]  kasan_bitops_modify.constprop.0+0x23b/0xd50
[   27.472221]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.472577]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.473539]  ? trace_hardirqs_on+0x37/0xe0
[   27.474142]  ? kasan_bitops_generic+0x93/0x1c0
[   27.474911]  kasan_bitops_generic+0x117/0x1c0
[   27.475491]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.476353]  ? __pfx_read_tsc+0x10/0x10
[   27.477083]  ? ktime_get_ts64+0x84/0x230
[   27.477392]  kunit_try_run_case+0x1b3/0x490
[   27.477847]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.478220]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.478838]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.479219]  ? __kthread_parkme+0x82/0x160
[   27.479689]  ? preempt_count_sub+0x50/0x80
[   27.480195]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.480849]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.481391]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.482369]  kthread+0x257/0x310
[   27.482737]  ? __pfx_kthread+0x10/0x10
[   27.483422]  ret_from_fork+0x41/0x80
[   27.484145]  ? __pfx_kthread+0x10/0x10
[   27.484763]  ret_from_fork_asm+0x1a/0x30
[   27.485357]  </TASK>
[   27.485701] 
[   27.485945] Allocated by task 269:
[   27.486309]  kasan_save_stack+0x3d/0x60
[   27.486891]  kasan_save_track+0x18/0x40
[   27.487385]  kasan_save_alloc_info+0x3b/0x50
[   27.488317]  __kasan_kmalloc+0xb7/0xc0
[   27.488991]  __kmalloc_cache_noprof+0x184/0x410
[   27.489266]  kasan_bitops_generic+0x93/0x1c0
[   27.490116]  kunit_try_run_case+0x1b3/0x490
[   27.490624]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.491330]  kthread+0x257/0x310
[   27.491898]  ret_from_fork+0x41/0x80
[   27.492368]  ret_from_fork_asm+0x1a/0x30
[   27.492955] 
[   27.493182] The buggy address belongs to the object at ffff888101e49d00
[   27.493182]  which belongs to the cache kmalloc-16 of size 16
[   27.494350] The buggy address is located 8 bytes inside of
[   27.494350]  allocated 9-byte region [ffff888101e49d00, ffff888101e49d09)
[   27.495664] 
[   27.495945] The buggy address belongs to the physical page:
[   27.496755] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   27.497587] flags: 0x200000000000000(node=0|zone=2)
[   27.498111] page_type: f5(slab)
[   27.498310] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.498949] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   27.500186] page dumped because: kasan: bad access detected
[   27.500636] 
[   27.500856] Memory state around the buggy address:
[   27.501288]  ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   27.501808]  ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   27.502547] >ffff888101e49d00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.503034]                       ^
[   27.503444]  ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.503838]  ffff888101e49e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.504511] ==================================================================
---
[   27.596493] ==================================================================
[   27.597098] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50
[   27.597923] Write of size 8 at addr ffff888101e49d08 by task kunit_try_catch/269
[   27.598730] 
[   27.598953] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.599919] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.600328] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.601233] Call Trace:
[   27.601509]  <TASK>
[   27.602131]  dump_stack_lvl+0x73/0xb0
[   27.602850]  print_report+0xd1/0x640
[   27.603276]  ? __virt_addr_valid+0x1db/0x2d0
[   27.604045]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.604609]  kasan_report+0x102/0x140
[   27.604884]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   27.605754]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   27.606384]  kasan_check_range+0x10c/0x1c0
[   27.607060]  __kasan_check_write+0x18/0x20
[   27.607431]  kasan_bitops_modify.constprop.0+0x40f/0xd50
[   27.607955]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.608364]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.608839]  ? trace_hardirqs_on+0x37/0xe0
[   27.609296]  ? kasan_bitops_generic+0x93/0x1c0
[   27.609660]  kasan_bitops_generic+0x117/0x1c0
[   27.610182]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.610600]  ? __pfx_read_tsc+0x10/0x10
[   27.610889]  ? ktime_get_ts64+0x84/0x230
[   27.611165]  kunit_try_run_case+0x1b3/0x490
[   27.611811]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.612453]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.613179]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.614538]  ? __kthread_parkme+0x82/0x160
[   27.615271]  ? preempt_count_sub+0x50/0x80
[   27.615777]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.616438]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.617558]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.618225]  kthread+0x257/0x310
[   27.618628]  ? __pfx_kthread+0x10/0x10
[   27.618965]  ret_from_fork+0x41/0x80
[   27.619620]  ? __pfx_kthread+0x10/0x10
[   27.620011]  ret_from_fork_asm+0x1a/0x30
[   27.620572]  </TASK>
[   27.620771] 
[   27.620953] Allocated by task 269:
[   27.621452]  kasan_save_stack+0x3d/0x60
[   27.621892]  kasan_save_track+0x18/0x40
[   27.622907]  kasan_save_alloc_info+0x3b/0x50
[   27.623584]  __kasan_kmalloc+0xb7/0xc0
[   27.624043]  __kmalloc_cache_noprof+0x184/0x410
[   27.624363]  kasan_bitops_generic+0x93/0x1c0
[   27.625084]  kunit_try_run_case+0x1b3/0x490
[   27.625458]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.626408]  kthread+0x257/0x310
[   27.626712]  ret_from_fork+0x41/0x80
[   27.627654]  ret_from_fork_asm+0x1a/0x30
[   27.628057] 
[   27.628473] The buggy address belongs to the object at ffff888101e49d00
[   27.628473]  which belongs to the cache kmalloc-16 of size 16
[   27.629520] The buggy address is located 8 bytes inside of
[   27.629520]  allocated 9-byte region [ffff888101e49d00, ffff888101e49d09)
[   27.630433] 
[   27.630766] The buggy address belongs to the physical page:
[   27.631412] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   27.631944] flags: 0x200000000000000(node=0|zone=2)
[   27.632521] page_type: f5(slab)
[   27.633326] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.633848] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   27.634594] page dumped because: kasan: bad access detected
[   27.634988] 
[   27.635235] Memory state around the buggy address:
[   27.636070]  ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   27.637392]  ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   27.638162] >ffff888101e49d00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.638744]                       ^
[   27.639045]  ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.640162]  ffff888101e49e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.640784] ==================================================================
---
[   27.552414] ==================================================================
[   27.553430] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50
[   27.554195] Write of size 8 at addr ffff888101e49d08 by task kunit_try_catch/269
[   27.554928] 
[   27.555158] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.556038] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.556340] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.557269] Call Trace:
[   27.557987]  <TASK>
[   27.558321]  dump_stack_lvl+0x73/0xb0
[   27.558805]  print_report+0xd1/0x640
[   27.559193]  ? __virt_addr_valid+0x1db/0x2d0
[   27.559823]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.560367]  kasan_report+0x102/0x140
[   27.560767]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   27.561175]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   27.562117]  kasan_check_range+0x10c/0x1c0
[   27.562728]  __kasan_check_write+0x18/0x20
[   27.563063]  kasan_bitops_modify.constprop.0+0x374/0xd50
[   27.564104]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.564567]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.565218]  ? trace_hardirqs_on+0x37/0xe0
[   27.565817]  ? kasan_bitops_generic+0x93/0x1c0
[   27.566266]  kasan_bitops_generic+0x117/0x1c0
[   27.566941]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.567492]  ? __pfx_read_tsc+0x10/0x10
[   27.567975]  ? ktime_get_ts64+0x84/0x230
[   27.568284]  kunit_try_run_case+0x1b3/0x490
[   27.568725]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.569886]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.570400]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.571061]  ? __kthread_parkme+0x82/0x160
[   27.571508]  ? preempt_count_sub+0x50/0x80
[   27.572092]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.572725]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.573370]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.574426]  kthread+0x257/0x310
[   27.574982]  ? __pfx_kthread+0x10/0x10
[   27.575353]  ret_from_fork+0x41/0x80
[   27.575912]  ? __pfx_kthread+0x10/0x10
[   27.576281]  ret_from_fork_asm+0x1a/0x30
[   27.576919]  </TASK>
[   27.577149] 
[   27.577350] Allocated by task 269:
[   27.577691]  kasan_save_stack+0x3d/0x60
[   27.578095]  kasan_save_track+0x18/0x40
[   27.579028]  kasan_save_alloc_info+0x3b/0x50
[   27.579380]  __kasan_kmalloc+0xb7/0xc0
[   27.579712]  __kmalloc_cache_noprof+0x184/0x410
[   27.580156]  kasan_bitops_generic+0x93/0x1c0
[   27.580608]  kunit_try_run_case+0x1b3/0x490
[   27.581013]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.581806]  kthread+0x257/0x310
[   27.582079]  ret_from_fork+0x41/0x80
[   27.582351]  ret_from_fork_asm+0x1a/0x30
[   27.582926] 
[   27.583167] The buggy address belongs to the object at ffff888101e49d00
[   27.583167]  which belongs to the cache kmalloc-16 of size 16
[   27.584340] The buggy address is located 8 bytes inside of
[   27.584340]  allocated 9-byte region [ffff888101e49d00, ffff888101e49d09)
[   27.585848] 
[   27.586096] The buggy address belongs to the physical page:
[   27.586711] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   27.587187] flags: 0x200000000000000(node=0|zone=2)
[   27.587838] page_type: f5(slab)
[   27.588261] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.589104] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   27.590007] page dumped because: kasan: bad access detected
[   27.590644] 
[   27.590905] Memory state around the buggy address:
[   27.591345]  ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   27.592117]  ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   27.592725] >ffff888101e49d00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.593355]                       ^
[   27.593882]  ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.594377]  ffff888101e49e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.595378] ==================================================================
---
[   27.687945] ==================================================================
[   27.688528] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50
[   27.689310] Write of size 8 at addr ffff888101e49d08 by task kunit_try_catch/269
[   27.690204] 
[   27.690405] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.691676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.692394] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.693279] Call Trace:
[   27.693558]  <TASK>
[   27.693952]  dump_stack_lvl+0x73/0xb0
[   27.695281]  print_report+0xd1/0x640
[   27.696439]  ? __virt_addr_valid+0x1db/0x2d0
[   27.697137]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.697769]  kasan_report+0x102/0x140
[   27.698614]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   27.699611]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   27.700407]  kasan_check_range+0x10c/0x1c0
[   27.700846]  __kasan_check_write+0x18/0x20
[   27.701332]  kasan_bitops_modify.constprop.0+0x548/0xd50
[   27.701800]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.702343]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.702942]  ? trace_hardirqs_on+0x37/0xe0
[   27.703408]  ? kasan_bitops_generic+0x93/0x1c0
[   27.704063]  kasan_bitops_generic+0x117/0x1c0
[   27.704684]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.705183]  ? __pfx_read_tsc+0x10/0x10
[   27.705995]  ? ktime_get_ts64+0x84/0x230
[   27.706470]  kunit_try_run_case+0x1b3/0x490
[   27.707081]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.707505]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.708202]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.708808]  ? __kthread_parkme+0x82/0x160
[   27.709156]  ? preempt_count_sub+0x50/0x80
[   27.709788]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.710309]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.711390]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.711787]  kthread+0x257/0x310
[   27.712154]  ? __pfx_kthread+0x10/0x10
[   27.712831]  ret_from_fork+0x41/0x80
[   27.713222]  ? __pfx_kthread+0x10/0x10
[   27.713777]  ret_from_fork_asm+0x1a/0x30
[   27.714298]  </TASK>
[   27.714679] 
[   27.714974] Allocated by task 269:
[   27.715315]  kasan_save_stack+0x3d/0x60
[   27.716228]  kasan_save_track+0x18/0x40
[   27.716699]  kasan_save_alloc_info+0x3b/0x50
[   27.717167]  __kasan_kmalloc+0xb7/0xc0
[   27.717652]  __kmalloc_cache_noprof+0x184/0x410
[   27.718176]  kasan_bitops_generic+0x93/0x1c0
[   27.718826]  kunit_try_run_case+0x1b3/0x490
[   27.719308]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.719834]  kthread+0x257/0x310
[   27.720268]  ret_from_fork+0x41/0x80
[   27.721044]  ret_from_fork_asm+0x1a/0x30
[   27.721332] 
[   27.721555] The buggy address belongs to the object at ffff888101e49d00
[   27.721555]  which belongs to the cache kmalloc-16 of size 16
[   27.722523] The buggy address is located 8 bytes inside of
[   27.722523]  allocated 9-byte region [ffff888101e49d00, ffff888101e49d09)
[   27.723464] 
[   27.723727] The buggy address belongs to the physical page:
[   27.724228] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   27.724772] flags: 0x200000000000000(node=0|zone=2)
[   27.725173] page_type: f5(slab)
[   27.725697] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.726453] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   27.727929] page dumped because: kasan: bad access detected
[   27.728459] 
[   27.728804] Memory state around the buggy address:
[   27.729225]  ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   27.729884]  ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   27.730445] >ffff888101e49d00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.731190]                       ^
[   27.731504]  ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.732749]  ffff888101e49e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.733361] ==================================================================
---
[   27.414815] ==================================================================
[   27.415349] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50
[   27.416112] Write of size 8 at addr ffff888101e49d08 by task kunit_try_catch/269
[   27.416553] 
[   27.416790] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.417388] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.417775] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.418958] Call Trace:
[   27.419215]  <TASK>
[   27.419401]  dump_stack_lvl+0x73/0xb0
[   27.419845]  print_report+0xd1/0x640
[   27.420480]  ? __virt_addr_valid+0x1db/0x2d0
[   27.421179]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.421543]  kasan_report+0x102/0x140
[   27.422544]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   27.423238]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   27.423881]  kasan_check_range+0x10c/0x1c0
[   27.424305]  __kasan_check_write+0x18/0x20
[   27.424793]  kasan_bitops_modify.constprop.0+0x19d/0xd50
[   27.425466]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.426514]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.426878]  ? trace_hardirqs_on+0x37/0xe0
[   27.427452]  ? kasan_bitops_generic+0x93/0x1c0
[   27.427933]  kasan_bitops_generic+0x117/0x1c0
[   27.428423]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.429053]  ? __pfx_read_tsc+0x10/0x10
[   27.429478]  ? ktime_get_ts64+0x84/0x230
[   27.429869]  kunit_try_run_case+0x1b3/0x490
[   27.430378]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.431084]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.431433]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.431952]  ? __kthread_parkme+0x82/0x160
[   27.432995]  ? preempt_count_sub+0x50/0x80
[   27.433408]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.433720]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.434419]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.435114]  kthread+0x257/0x310
[   27.435642]  ? __pfx_kthread+0x10/0x10
[   27.436132]  ret_from_fork+0x41/0x80
[   27.436422]  ? __pfx_kthread+0x10/0x10
[   27.436818]  ret_from_fork_asm+0x1a/0x30
[   27.437428]  </TASK>
[   27.437692] 
[   27.437894] Allocated by task 269:
[   27.438380]  kasan_save_stack+0x3d/0x60
[   27.438650]  kasan_save_track+0x18/0x40
[   27.439055]  kasan_save_alloc_info+0x3b/0x50
[   27.439653]  __kasan_kmalloc+0xb7/0xc0
[   27.440598]  __kmalloc_cache_noprof+0x184/0x410
[   27.441340]  kasan_bitops_generic+0x93/0x1c0
[   27.441658]  kunit_try_run_case+0x1b3/0x490
[   27.442204]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.442899]  kthread+0x257/0x310
[   27.443150]  ret_from_fork+0x41/0x80
[   27.443681]  ret_from_fork_asm+0x1a/0x30
[   27.444370] 
[   27.444629] The buggy address belongs to the object at ffff888101e49d00
[   27.444629]  which belongs to the cache kmalloc-16 of size 16
[   27.445464] The buggy address is located 8 bytes inside of
[   27.445464]  allocated 9-byte region [ffff888101e49d00, ffff888101e49d09)
[   27.445998] 
[   27.446144] The buggy address belongs to the physical page:
[   27.447307] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   27.448220] flags: 0x200000000000000(node=0|zone=2)
[   27.449057] page_type: f5(slab)
[   27.449686] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.451148] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   27.451861] page dumped because: kasan: bad access detected
[   27.453503] 
[   27.453701] Memory state around the buggy address:
[   27.454078]  ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   27.454529]  ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   27.455488] >ffff888101e49d00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.456045]                       ^
[   27.456289]  ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.456641]  ffff888101e49e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.457231] ==================================================================
---
[   27.505920] ==================================================================
[   27.507156] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   27.508105] Write of size 8 at addr ffff888101e49d08 by task kunit_try_catch/269
[   27.509059] 
[   27.509327] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.510371] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.510779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.512188] Call Trace:
[   27.512409]  <TASK>
[   27.512676]  dump_stack_lvl+0x73/0xb0
[   27.513094]  print_report+0xd1/0x640
[   27.513508]  ? __virt_addr_valid+0x1db/0x2d0
[   27.514208]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.514940]  kasan_report+0x102/0x140
[   27.515212]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   27.516214]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   27.516690]  kasan_check_range+0x10c/0x1c0
[   27.517044]  __kasan_check_write+0x18/0x20
[   27.517887]  kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   27.518307]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   27.519216]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.520278]  ? trace_hardirqs_on+0x37/0xe0
[   27.520700]  ? kasan_bitops_generic+0x93/0x1c0
[   27.521616]  kasan_bitops_generic+0x117/0x1c0
[   27.522177]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.522614]  ? __pfx_read_tsc+0x10/0x10
[   27.523163]  ? ktime_get_ts64+0x84/0x230
[   27.523760]  kunit_try_run_case+0x1b3/0x490
[   27.524592]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.525110]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.525623]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.526330]  ? __kthread_parkme+0x82/0x160
[   27.526900]  ? preempt_count_sub+0x50/0x80
[   27.527472]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.528252]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.528781]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.529320]  kthread+0x257/0x310
[   27.529721]  ? __pfx_kthread+0x10/0x10
[   27.530141]  ret_from_fork+0x41/0x80
[   27.531262]  ? __pfx_kthread+0x10/0x10
[   27.531675]  ret_from_fork_asm+0x1a/0x30
[   27.532034]  </TASK>
[   27.532275] 
[   27.532472] Allocated by task 269:
[   27.532792]  kasan_save_stack+0x3d/0x60
[   27.533221]  kasan_save_track+0x18/0x40
[   27.534228]  kasan_save_alloc_info+0x3b/0x50
[   27.534579]  __kasan_kmalloc+0xb7/0xc0
[   27.535120]  __kmalloc_cache_noprof+0x184/0x410
[   27.535526]  kasan_bitops_generic+0x93/0x1c0
[   27.536415]  kunit_try_run_case+0x1b3/0x490
[   27.536793]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.537342]  kthread+0x257/0x310
[   27.537692]  ret_from_fork+0x41/0x80
[   27.538398]  ret_from_fork_asm+0x1a/0x30
[   27.539095] 
[   27.539318] The buggy address belongs to the object at ffff888101e49d00
[   27.539318]  which belongs to the cache kmalloc-16 of size 16
[   27.540089] The buggy address is located 8 bytes inside of
[   27.540089]  allocated 9-byte region [ffff888101e49d00, ffff888101e49d09)
[   27.541560] 
[   27.542455] The buggy address belongs to the physical page:
[   27.542726] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   27.543849] flags: 0x200000000000000(node=0|zone=2)
[   27.544365] page_type: f5(slab)
[   27.545143] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.545857] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   27.546394] page dumped because: kasan: bad access detected
[   27.547162] 
[   27.547321] Memory state around the buggy address:
[   27.547950]  ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   27.548645]  ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   27.549225] >ffff888101e49d00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.549700]                       ^
[   27.550070]  ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.550438]  ffff888101e49e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.551198] ==================================================================

test log snippet boot parser 35

Home

[   28.061989] ==================================================================
[   28.062914] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   28.063856] Read of size 8 at addr ffff888101e49d08 by task kunit_try_catch/269
[   28.064625] 
[   28.064797] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   28.065234] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.065508] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.066270] Call Trace:
[   28.066507]  <TASK>
[   28.066707]  dump_stack_lvl+0x73/0xb0
[   28.067088]  print_report+0xd1/0x640
[   28.067470]  ? __virt_addr_valid+0x1db/0x2d0
[   28.068490]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.069418]  kasan_report+0x102/0x140
[   28.069697]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   28.070385]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   28.070904]  kasan_check_range+0x10c/0x1c0
[   28.071304]  __kasan_check_read+0x15/0x20
[   28.071629]  kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   28.072299]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.072967]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.073439]  ? trace_hardirqs_on+0x37/0xe0
[   28.073729]  ? kasan_bitops_generic+0x93/0x1c0
[   28.074581]  kasan_bitops_generic+0x122/0x1c0
[   28.075345]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.075843]  ? __pfx_read_tsc+0x10/0x10
[   28.076421]  ? ktime_get_ts64+0x84/0x230
[   28.076744]  kunit_try_run_case+0x1b3/0x490
[   28.077176]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.077783]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.078469]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.078813]  ? __kthread_parkme+0x82/0x160
[   28.079517]  ? preempt_count_sub+0x50/0x80
[   28.079959]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.080392]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.080981]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.081652]  kthread+0x257/0x310
[   28.081968]  ? __pfx_kthread+0x10/0x10
[   28.082475]  ret_from_fork+0x41/0x80
[   28.082817]  ? __pfx_kthread+0x10/0x10
[   28.083091]  ret_from_fork_asm+0x1a/0x30
[   28.083590]  </TASK>
[   28.083853] 
[   28.084086] Allocated by task 269:
[   28.084475]  kasan_save_stack+0x3d/0x60
[   28.084859]  kasan_save_track+0x18/0x40
[   28.085221]  kasan_save_alloc_info+0x3b/0x50
[   28.085673]  __kasan_kmalloc+0xb7/0xc0
[   28.086061]  __kmalloc_cache_noprof+0x184/0x410
[   28.087466]  kasan_bitops_generic+0x93/0x1c0
[   28.088040]  kunit_try_run_case+0x1b3/0x490
[   28.088577]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.089232]  kthread+0x257/0x310
[   28.089771]  ret_from_fork+0x41/0x80
[   28.090297]  ret_from_fork_asm+0x1a/0x30
[   28.090815] 
[   28.091099] The buggy address belongs to the object at ffff888101e49d00
[   28.091099]  which belongs to the cache kmalloc-16 of size 16
[   28.092100] The buggy address is located 8 bytes inside of
[   28.092100]  allocated 9-byte region [ffff888101e49d00, ffff888101e49d09)
[   28.093072] 
[   28.093322] The buggy address belongs to the physical page:
[   28.093909] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   28.094671] flags: 0x200000000000000(node=0|zone=2)
[   28.095354] page_type: f5(slab)
[   28.095670] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.096329] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   28.096841] page dumped because: kasan: bad access detected
[   28.097343] 
[   28.097492] Memory state around the buggy address:
[   28.097940]  ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   28.098503]  ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   28.098901] >ffff888101e49d00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.099521]                       ^
[   28.099916]  ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.100347]  ffff888101e49e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.100951] ==================================================================

test log snippet boot parser 36

Home

[   27.830136] ==================================================================
[   27.831174] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   27.833087] Write of size 8 at addr ffff888101e49d08 by task kunit_try_catch/269
[   27.834614] 
[   27.834785] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.835462] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.835961] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.836937] Call Trace:
[   27.837136]  <TASK>
[   27.837863]  dump_stack_lvl+0x73/0xb0
[   27.838292]  print_report+0xd1/0x640
[   27.839202]  ? __virt_addr_valid+0x1db/0x2d0
[   27.839790]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.840443]  kasan_report+0x102/0x140
[   27.840864]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   27.841556]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   27.842423]  kasan_check_range+0x10c/0x1c0
[   27.842979]  __kasan_check_write+0x18/0x20
[   27.843764]  kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   27.844430]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.845050]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.845427]  ? trace_hardirqs_on+0x37/0xe0
[   27.845755]  ? kasan_bitops_generic+0x93/0x1c0
[   27.846175]  kasan_bitops_generic+0x122/0x1c0
[   27.847280]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.847785]  ? __pfx_read_tsc+0x10/0x10
[   27.848432]  ? ktime_get_ts64+0x84/0x230
[   27.849080]  kunit_try_run_case+0x1b3/0x490
[   27.849568]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.850017]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.850826]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.851924]  ? __kthread_parkme+0x82/0x160
[   27.852710]  ? preempt_count_sub+0x50/0x80
[   27.852910]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.853212]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.854168]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.854607]  kthread+0x257/0x310
[   27.854998]  ? __pfx_kthread+0x10/0x10
[   27.855519]  ret_from_fork+0x41/0x80
[   27.855788]  ? __pfx_kthread+0x10/0x10
[   27.856188]  ret_from_fork_asm+0x1a/0x30
[   27.856647]  </TASK>
[   27.856915] 
[   27.857118] Allocated by task 269:
[   27.857717]  kasan_save_stack+0x3d/0x60
[   27.858208]  kasan_save_track+0x18/0x40
[   27.858729]  kasan_save_alloc_info+0x3b/0x50
[   27.859059]  __kasan_kmalloc+0xb7/0xc0
[   27.859515]  __kmalloc_cache_noprof+0x184/0x410
[   27.860082]  kasan_bitops_generic+0x93/0x1c0
[   27.860741]  kunit_try_run_case+0x1b3/0x490
[   27.861439]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.862201]  kthread+0x257/0x310
[   27.862467]  ret_from_fork+0x41/0x80
[   27.862723]  ret_from_fork_asm+0x1a/0x30
[   27.863171] 
[   27.863424] The buggy address belongs to the object at ffff888101e49d00
[   27.863424]  which belongs to the cache kmalloc-16 of size 16
[   27.864405] The buggy address is located 8 bytes inside of
[   27.864405]  allocated 9-byte region [ffff888101e49d00, ffff888101e49d09)
[   27.865342] 
[   27.865678] The buggy address belongs to the physical page:
[   27.866103] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   27.866978] flags: 0x200000000000000(node=0|zone=2)
[   27.867379] page_type: f5(slab)
[   27.867650] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.868081] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   27.868633] page dumped because: kasan: bad access detected
[   27.869149] 
[   27.869386] Memory state around the buggy address:
[   27.870172]  ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   27.871030]  ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   27.872253] >ffff888101e49d00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.873122]                       ^
[   27.873494]  ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.874320]  ffff888101e49e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.875051] ==================================================================
---
[   27.876221] ==================================================================
[   27.877269] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   27.878165] Write of size 8 at addr ffff888101e49d08 by task kunit_try_catch/269
[   27.879110] 
[   27.879382] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.880637] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.881167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.881811] Call Trace:
[   27.882412]  <TASK>
[   27.882971]  dump_stack_lvl+0x73/0xb0
[   27.883460]  print_report+0xd1/0x640
[   27.884040]  ? __virt_addr_valid+0x1db/0x2d0
[   27.884648]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.885213]  kasan_report+0x102/0x140
[   27.885580]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   27.886141]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   27.886741]  kasan_check_range+0x10c/0x1c0
[   27.887330]  __kasan_check_write+0x18/0x20
[   27.887983]  kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   27.888800]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.889590]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.890335]  ? trace_hardirqs_on+0x37/0xe0
[   27.890887]  ? kasan_bitops_generic+0x93/0x1c0
[   27.891235]  kasan_bitops_generic+0x122/0x1c0
[   27.891672]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.892220]  ? __pfx_read_tsc+0x10/0x10
[   27.892939]  ? ktime_get_ts64+0x84/0x230
[   27.893228]  kunit_try_run_case+0x1b3/0x490
[   27.893546]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.894003]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.894572]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.895292]  ? __kthread_parkme+0x82/0x160
[   27.895700]  ? preempt_count_sub+0x50/0x80
[   27.896511]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.897114]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.898005]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.898440]  kthread+0x257/0x310
[   27.898821]  ? __pfx_kthread+0x10/0x10
[   27.899523]  ret_from_fork+0x41/0x80
[   27.900089]  ? __pfx_kthread+0x10/0x10
[   27.900573]  ret_from_fork_asm+0x1a/0x30
[   27.901187]  </TASK>
[   27.901456] 
[   27.901600] Allocated by task 269:
[   27.902013]  kasan_save_stack+0x3d/0x60
[   27.902341]  kasan_save_track+0x18/0x40
[   27.903757]  kasan_save_alloc_info+0x3b/0x50
[   27.904062]  __kasan_kmalloc+0xb7/0xc0
[   27.904775]  __kmalloc_cache_noprof+0x184/0x410
[   27.905469]  kasan_bitops_generic+0x93/0x1c0
[   27.906321]  kunit_try_run_case+0x1b3/0x490
[   27.906708]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.907061]  kthread+0x257/0x310
[   27.907532]  ret_from_fork+0x41/0x80
[   27.908366]  ret_from_fork_asm+0x1a/0x30
[   27.908763] 
[   27.908943] The buggy address belongs to the object at ffff888101e49d00
[   27.908943]  which belongs to the cache kmalloc-16 of size 16
[   27.910716] The buggy address is located 8 bytes inside of
[   27.910716]  allocated 9-byte region [ffff888101e49d00, ffff888101e49d09)
[   27.911425] 
[   27.911675] The buggy address belongs to the physical page:
[   27.912112] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   27.913087] flags: 0x200000000000000(node=0|zone=2)
[   27.914038] page_type: f5(slab)
[   27.914362] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.915534] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   27.916096] page dumped because: kasan: bad access detected
[   27.916502] 
[   27.916667] Memory state around the buggy address:
[   27.917052]  ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   27.917920]  ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   27.918629] >ffff888101e49d00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.919583]                       ^
[   27.920356]  ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.921048]  ffff888101e49e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.921456] ==================================================================
---
[   27.735372] ==================================================================
[   27.736155] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   27.737034] Write of size 8 at addr ffff888101e49d08 by task kunit_try_catch/269
[   27.737765] 
[   27.738039] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.738986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.739302] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.740639] Call Trace:
[   27.741159]  <TASK>
[   27.741460]  dump_stack_lvl+0x73/0xb0
[   27.742293]  print_report+0xd1/0x640
[   27.743201]  ? __virt_addr_valid+0x1db/0x2d0
[   27.743657]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.744443]  kasan_report+0x102/0x140
[   27.744816]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   27.745508]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   27.745912]  kasan_check_range+0x10c/0x1c0
[   27.746482]  __kasan_check_write+0x18/0x20
[   27.747398]  kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   27.748262]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.749278]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.749891]  ? trace_hardirqs_on+0x37/0xe0
[   27.750610]  ? kasan_bitops_generic+0x93/0x1c0
[   27.751026]  kasan_bitops_generic+0x122/0x1c0
[   27.751493]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.751987]  ? __pfx_read_tsc+0x10/0x10
[   27.752461]  ? ktime_get_ts64+0x84/0x230
[   27.752805]  kunit_try_run_case+0x1b3/0x490
[   27.753480]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.754128]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.754819]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.755220]  ? __kthread_parkme+0x82/0x160
[   27.756155]  ? preempt_count_sub+0x50/0x80
[   27.756669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.757136]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.757915]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.758403]  kthread+0x257/0x310
[   27.758992]  ? __pfx_kthread+0x10/0x10
[   27.759416]  ret_from_fork+0x41/0x80
[   27.759932]  ? __pfx_kthread+0x10/0x10
[   27.760355]  ret_from_fork_asm+0x1a/0x30
[   27.761238]  </TASK>
[   27.761521] 
[   27.761892] Allocated by task 269:
[   27.762230]  kasan_save_stack+0x3d/0x60
[   27.762788]  kasan_save_track+0x18/0x40
[   27.763214]  kasan_save_alloc_info+0x3b/0x50
[   27.763799]  __kasan_kmalloc+0xb7/0xc0
[   27.764237]  __kmalloc_cache_noprof+0x184/0x410
[   27.764709]  kasan_bitops_generic+0x93/0x1c0
[   27.765373]  kunit_try_run_case+0x1b3/0x490
[   27.766006]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.766469]  kthread+0x257/0x310
[   27.766780]  ret_from_fork+0x41/0x80
[   27.767754]  ret_from_fork_asm+0x1a/0x30
[   27.768227] 
[   27.768427] The buggy address belongs to the object at ffff888101e49d00
[   27.768427]  which belongs to the cache kmalloc-16 of size 16
[   27.769333] The buggy address is located 8 bytes inside of
[   27.769333]  allocated 9-byte region [ffff888101e49d00, ffff888101e49d09)
[   27.770497] 
[   27.771150] The buggy address belongs to the physical page:
[   27.771826] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   27.772570] flags: 0x200000000000000(node=0|zone=2)
[   27.773182] page_type: f5(slab)
[   27.773518] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.774066] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   27.775043] page dumped because: kasan: bad access detected
[   27.775453] 
[   27.776184] Memory state around the buggy address:
[   27.776666]  ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   27.777290]  ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   27.778115] >ffff888101e49d00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.778775]                       ^
[   27.779194]  ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.779845]  ffff888101e49e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.780498] ==================================================================
---
[   27.968639] ==================================================================
[   27.969590] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   27.970735] Write of size 8 at addr ffff888101e49d08 by task kunit_try_catch/269
[   27.971828] 
[   27.972121] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.973230] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.973499] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.974018] Call Trace:
[   27.974328]  <TASK>
[   27.974605]  dump_stack_lvl+0x73/0xb0
[   27.975114]  print_report+0xd1/0x640
[   27.975428]  ? __virt_addr_valid+0x1db/0x2d0
[   27.976088]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.977056]  kasan_report+0x102/0x140
[   27.977521]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   27.978281]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   27.979032]  kasan_check_range+0x10c/0x1c0
[   27.979492]  __kasan_check_write+0x18/0x20
[   27.980152]  kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   27.980787]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.981412]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.982382]  ? trace_hardirqs_on+0x37/0xe0
[   27.982963]  ? kasan_bitops_generic+0x93/0x1c0
[   27.983258]  kasan_bitops_generic+0x122/0x1c0
[   27.983909]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.984387]  ? __pfx_read_tsc+0x10/0x10
[   27.985000]  ? ktime_get_ts64+0x84/0x230
[   27.985392]  kunit_try_run_case+0x1b3/0x490
[   27.986033]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.986999]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.987458]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.987884]  ? __kthread_parkme+0x82/0x160
[   27.988332]  ? preempt_count_sub+0x50/0x80
[   27.988742]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.989061]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.989982]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.990489]  kthread+0x257/0x310
[   27.991075]  ? __pfx_kthread+0x10/0x10
[   27.991486]  ret_from_fork+0x41/0x80
[   27.992094]  ? __pfx_kthread+0x10/0x10
[   27.993011]  ret_from_fork_asm+0x1a/0x30
[   27.993415]  </TASK>
[   27.993852] 
[   27.994088] Allocated by task 269:
[   27.994459]  kasan_save_stack+0x3d/0x60
[   27.995011]  kasan_save_track+0x18/0x40
[   27.995336]  kasan_save_alloc_info+0x3b/0x50
[   27.996029]  __kasan_kmalloc+0xb7/0xc0
[   27.996658]  __kmalloc_cache_noprof+0x184/0x410
[   27.997160]  kasan_bitops_generic+0x93/0x1c0
[   27.998008]  kunit_try_run_case+0x1b3/0x490
[   27.998639]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.999154]  kthread+0x257/0x310
[   27.999672]  ret_from_fork+0x41/0x80
[   28.000036]  ret_from_fork_asm+0x1a/0x30
[   28.000498] 
[   28.000846] The buggy address belongs to the object at ffff888101e49d00
[   28.000846]  which belongs to the cache kmalloc-16 of size 16
[   28.001889] The buggy address is located 8 bytes inside of
[   28.001889]  allocated 9-byte region [ffff888101e49d00, ffff888101e49d09)
[   28.002775] 
[   28.003014] The buggy address belongs to the physical page:
[   28.004073] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   28.004966] flags: 0x200000000000000(node=0|zone=2)
[   28.005316] page_type: f5(slab)
[   28.005837] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.006355] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   28.007203] page dumped because: kasan: bad access detected
[   28.007851] 
[   28.008384] Memory state around the buggy address:
[   28.008779]  ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   28.009385]  ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   28.009830] >ffff888101e49d00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.010816]                       ^
[   28.011213]  ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.011825]  ffff888101e49e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.012487] ==================================================================
---
[   27.922666] ==================================================================
[   27.923388] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   27.924213] Write of size 8 at addr ffff888101e49d08 by task kunit_try_catch/269
[   27.925084] 
[   27.925347] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.926222] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.926518] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.927037] Call Trace:
[   27.927685]  <TASK>
[   27.928010]  dump_stack_lvl+0x73/0xb0
[   27.928447]  print_report+0xd1/0x640
[   27.929664]  ? __virt_addr_valid+0x1db/0x2d0
[   27.930222]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.930999]  kasan_report+0x102/0x140
[   27.931430]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   27.932205]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   27.932956]  kasan_check_range+0x10c/0x1c0
[   27.933503]  __kasan_check_write+0x18/0x20
[   27.934591]  kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   27.935171]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.935787]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.936150]  ? trace_hardirqs_on+0x37/0xe0
[   27.937203]  ? kasan_bitops_generic+0x93/0x1c0
[   27.937843]  kasan_bitops_generic+0x122/0x1c0
[   27.938551]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.938926]  ? __pfx_read_tsc+0x10/0x10
[   27.939286]  ? ktime_get_ts64+0x84/0x230
[   27.939705]  kunit_try_run_case+0x1b3/0x490
[   27.940223]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.940682]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.941050]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.942144]  ? __kthread_parkme+0x82/0x160
[   27.942428]  ? preempt_count_sub+0x50/0x80
[   27.942918]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.943971]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.944760]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.945411]  kthread+0x257/0x310
[   27.946026]  ? __pfx_kthread+0x10/0x10
[   27.946472]  ret_from_fork+0x41/0x80
[   27.947226]  ? __pfx_kthread+0x10/0x10
[   27.947636]  ret_from_fork_asm+0x1a/0x30
[   27.948377]  </TASK>
[   27.948852] 
[   27.949147] Allocated by task 269:
[   27.949598]  kasan_save_stack+0x3d/0x60
[   27.950222]  kasan_save_track+0x18/0x40
[   27.950774]  kasan_save_alloc_info+0x3b/0x50
[   27.951140]  __kasan_kmalloc+0xb7/0xc0
[   27.951555]  __kmalloc_cache_noprof+0x184/0x410
[   27.952528]  kasan_bitops_generic+0x93/0x1c0
[   27.953170]  kunit_try_run_case+0x1b3/0x490
[   27.953705]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.954231]  kthread+0x257/0x310
[   27.954780]  ret_from_fork+0x41/0x80
[   27.955094]  ret_from_fork_asm+0x1a/0x30
[   27.955696] 
[   27.955973] The buggy address belongs to the object at ffff888101e49d00
[   27.955973]  which belongs to the cache kmalloc-16 of size 16
[   27.957289] The buggy address is located 8 bytes inside of
[   27.957289]  allocated 9-byte region [ffff888101e49d00, ffff888101e49d09)
[   27.958438] 
[   27.958807] The buggy address belongs to the physical page:
[   27.959277] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   27.960057] flags: 0x200000000000000(node=0|zone=2)
[   27.960683] page_type: f5(slab)
[   27.961001] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.962194] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   27.962773] page dumped because: kasan: bad access detected
[   27.963220] 
[   27.963490] Memory state around the buggy address:
[   27.964159]  ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   27.964962]  ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   27.965392] >ffff888101e49d00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.966288]                       ^
[   27.966519]  ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.967484]  ffff888101e49e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.968098] ==================================================================
---
[   28.015076] ==================================================================
[   28.015973] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   28.016639] Write of size 8 at addr ffff888101e49d08 by task kunit_try_catch/269
[   28.017274] 
[   28.017650] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   28.018433] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.018993] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.019723] Call Trace:
[   28.020078]  <TASK>
[   28.020386]  dump_stack_lvl+0x73/0xb0
[   28.021370]  print_report+0xd1/0x640
[   28.021722]  ? __virt_addr_valid+0x1db/0x2d0
[   28.022398]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.022983]  kasan_report+0x102/0x140
[   28.023428]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   28.024070]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   28.024845]  kasan_check_range+0x10c/0x1c0
[   28.025325]  __kasan_check_write+0x18/0x20
[   28.026164]  kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   28.026820]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.027507]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.028135]  ? trace_hardirqs_on+0x37/0xe0
[   28.028670]  ? kasan_bitops_generic+0x93/0x1c0
[   28.029120]  kasan_bitops_generic+0x122/0x1c0
[   28.029716]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.030359]  ? __pfx_read_tsc+0x10/0x10
[   28.030743]  ? ktime_get_ts64+0x84/0x230
[   28.031264]  kunit_try_run_case+0x1b3/0x490
[   28.031569]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.032080]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.033041]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.033512]  ? __kthread_parkme+0x82/0x160
[   28.034447]  ? preempt_count_sub+0x50/0x80
[   28.035018]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.035788]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.036510]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.037301]  kthread+0x257/0x310
[   28.037628]  ? __pfx_kthread+0x10/0x10
[   28.038558]  ret_from_fork+0x41/0x80
[   28.039216]  ? __pfx_kthread+0x10/0x10
[   28.040123]  ret_from_fork_asm+0x1a/0x30
[   28.040542]  </TASK>
[   28.040920] 
[   28.041140] Allocated by task 269:
[   28.041646]  kasan_save_stack+0x3d/0x60
[   28.042295]  kasan_save_track+0x18/0x40
[   28.042723]  kasan_save_alloc_info+0x3b/0x50
[   28.043313]  __kasan_kmalloc+0xb7/0xc0
[   28.043596]  __kmalloc_cache_noprof+0x184/0x410
[   28.044098]  kasan_bitops_generic+0x93/0x1c0
[   28.045129]  kunit_try_run_case+0x1b3/0x490
[   28.045557]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.046314]  kthread+0x257/0x310
[   28.046792]  ret_from_fork+0x41/0x80
[   28.047067]  ret_from_fork_asm+0x1a/0x30
[   28.047656] 
[   28.047880] The buggy address belongs to the object at ffff888101e49d00
[   28.047880]  which belongs to the cache kmalloc-16 of size 16
[   28.048974] The buggy address is located 8 bytes inside of
[   28.048974]  allocated 9-byte region [ffff888101e49d00, ffff888101e49d09)
[   28.049603] 
[   28.049821] The buggy address belongs to the physical page:
[   28.050378] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   28.051702] flags: 0x200000000000000(node=0|zone=2)
[   28.052155] page_type: f5(slab)
[   28.052416] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.053006] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   28.053808] page dumped because: kasan: bad access detected
[   28.054301] 
[   28.054490] Memory state around the buggy address:
[   28.054910]  ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   28.055449]  ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   28.056346] >ffff888101e49d00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.056970]                       ^
[   28.057312]  ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.058324]  ffff888101e49e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.058682] ==================================================================
---
[   27.782090] ==================================================================
[   27.782678] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   27.783495] Write of size 8 at addr ffff888101e49d08 by task kunit_try_catch/269
[   27.784324] 
[   27.784714] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.785665] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.786106] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.786997] Call Trace:
[   27.787307]  <TASK>
[   27.788076]  dump_stack_lvl+0x73/0xb0
[   27.788654]  print_report+0xd1/0x640
[   27.789217]  ? __virt_addr_valid+0x1db/0x2d0
[   27.789805]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.790383]  kasan_report+0x102/0x140
[   27.791026]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   27.791678]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   27.792347]  kasan_check_range+0x10c/0x1c0
[   27.793316]  __kasan_check_write+0x18/0x20
[   27.793656]  kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   27.794255]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   27.794783]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.795383]  ? trace_hardirqs_on+0x37/0xe0
[   27.796050]  ? kasan_bitops_generic+0x93/0x1c0
[   27.796639]  kasan_bitops_generic+0x122/0x1c0
[   27.797082]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   27.797500]  ? __pfx_read_tsc+0x10/0x10
[   27.798317]  ? ktime_get_ts64+0x84/0x230
[   27.798813]  kunit_try_run_case+0x1b3/0x490
[   27.799488]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.800166]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.800627]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.801931]  ? __kthread_parkme+0x82/0x160
[   27.802448]  ? preempt_count_sub+0x50/0x80
[   27.803237]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.803850]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.804492]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.805155]  kthread+0x257/0x310
[   27.805459]  ? __pfx_kthread+0x10/0x10
[   27.805827]  ret_from_fork+0x41/0x80
[   27.807092]  ? __pfx_kthread+0x10/0x10
[   27.807505]  ret_from_fork_asm+0x1a/0x30
[   27.808393]  </TASK>
[   27.808607] 
[   27.808778] Allocated by task 269:
[   27.809070]  kasan_save_stack+0x3d/0x60
[   27.809466]  kasan_save_track+0x18/0x40
[   27.809784]  kasan_save_alloc_info+0x3b/0x50
[   27.810422]  __kasan_kmalloc+0xb7/0xc0
[   27.810878]  __kmalloc_cache_noprof+0x184/0x410
[   27.811479]  kasan_bitops_generic+0x93/0x1c0
[   27.812115]  kunit_try_run_case+0x1b3/0x490
[   27.812586]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.813235]  kthread+0x257/0x310
[   27.814038]  ret_from_fork+0x41/0x80
[   27.814430]  ret_from_fork_asm+0x1a/0x30
[   27.815222] 
[   27.815459] The buggy address belongs to the object at ffff888101e49d00
[   27.815459]  which belongs to the cache kmalloc-16 of size 16
[   27.816663] The buggy address is located 8 bytes inside of
[   27.816663]  allocated 9-byte region [ffff888101e49d00, ffff888101e49d09)
[   27.818150] 
[   27.818317] The buggy address belongs to the physical page:
[   27.819144] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   27.820010] flags: 0x200000000000000(node=0|zone=2)
[   27.820290] page_type: f5(slab)
[   27.820544] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   27.821666] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   27.822713] page dumped because: kasan: bad access detected
[   27.823527] 
[   27.823799] Memory state around the buggy address:
[   27.824428]  ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   27.825110]  ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   27.825615] >ffff888101e49d00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.826910]                       ^
[   27.827154]  ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.828514]  ffff888101e49e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.829182] ==================================================================

test log snippet boot parser 37

Home

[   28.102012] ==================================================================
[   28.102930] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   28.103584] Read of size 8 at addr ffff888101e49d08 by task kunit_try_catch/269
[   28.104148] 
[   28.104399] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   28.105159] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.105558] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.106218] Call Trace:
[   28.106561]  <TASK>
[   28.106809]  dump_stack_lvl+0x73/0xb0
[   28.107324]  print_report+0xd1/0x640
[   28.107647]  ? __virt_addr_valid+0x1db/0x2d0
[   28.108192]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.108598]  kasan_report+0x102/0x140
[   28.108993]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   28.109607]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   28.110288]  __asan_report_load8_noabort+0x18/0x20
[   28.110720]  kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   28.111377]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   28.111823]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.112386]  ? trace_hardirqs_on+0x37/0xe0
[   28.112851]  ? kasan_bitops_generic+0x93/0x1c0
[   28.113254]  kasan_bitops_generic+0x122/0x1c0
[   28.113566]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   28.113926]  ? __pfx_read_tsc+0x10/0x10
[   28.114214]  ? ktime_get_ts64+0x84/0x230
[   28.114708]  kunit_try_run_case+0x1b3/0x490
[   28.115203]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.115727]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.116275]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.116830]  ? __kthread_parkme+0x82/0x160
[   28.117318]  ? preempt_count_sub+0x50/0x80
[   28.117806]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.118349]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.118994]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.119447]  kthread+0x257/0x310
[   28.119710]  ? __pfx_kthread+0x10/0x10
[   28.120046]  ret_from_fork+0x41/0x80
[   28.120493]  ? __pfx_kthread+0x10/0x10
[   28.120939]  ret_from_fork_asm+0x1a/0x30
[   28.121401]  </TASK>
[   28.122266] 
[   28.122809] Allocated by task 269:
[   28.123547]  kasan_save_stack+0x3d/0x60
[   28.124235]  kasan_save_track+0x18/0x40
[   28.124526]  kasan_save_alloc_info+0x3b/0x50
[   28.124805]  __kasan_kmalloc+0xb7/0xc0
[   28.125258]  __kmalloc_cache_noprof+0x184/0x410
[   28.125800]  kasan_bitops_generic+0x93/0x1c0
[   28.126385]  kunit_try_run_case+0x1b3/0x490
[   28.126916]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.127601]  kthread+0x257/0x310
[   28.127869]  ret_from_fork+0x41/0x80
[   28.128717]  ret_from_fork_asm+0x1a/0x30
[   28.129237] 
[   28.129401] The buggy address belongs to the object at ffff888101e49d00
[   28.129401]  which belongs to the cache kmalloc-16 of size 16
[   28.130466] The buggy address is located 8 bytes inside of
[   28.130466]  allocated 9-byte region [ffff888101e49d00, ffff888101e49d09)
[   28.131798] 
[   28.132034] The buggy address belongs to the physical page:
[   28.132515] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   28.133027] flags: 0x200000000000000(node=0|zone=2)
[   28.133481] page_type: f5(slab)
[   28.133720] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   28.134357] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   28.135152] page dumped because: kasan: bad access detected
[   28.135713] 
[   28.135970] Memory state around the buggy address:
[   28.136421]  ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   28.137088]  ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   28.137646] >ffff888101e49d00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.138275]                       ^
[   28.138608]  ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.139271]  ffff888101e49e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.139839] ==================================================================

test log snippet boot parser 38

Home

[   24.504939] ==================================================================
[   24.506200] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x170/0x330
[   24.506786] Read of size 64 at addr ffff888101a8e504 by task kunit_try_catch/190
[   24.507698] 
[   24.508015] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   24.508711] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.509305] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.509982] Call Trace:
[   24.510311]  <TASK>
[   24.510723]  dump_stack_lvl+0x73/0xb0
[   24.511208]  print_report+0xd1/0x640
[   24.512280]  ? __virt_addr_valid+0x1db/0x2d0
[   24.512822]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.513401]  kasan_report+0x102/0x140
[   24.513917]  ? kmalloc_memmove_invalid_size+0x170/0x330
[   24.514377]  ? kmalloc_memmove_invalid_size+0x170/0x330
[   24.515121]  kasan_check_range+0x10c/0x1c0
[   24.515459]  __asan_memmove+0x27/0x70
[   24.516061]  kmalloc_memmove_invalid_size+0x170/0x330
[   24.516517]  ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10
[   24.517636]  ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10
[   24.518078]  kunit_try_run_case+0x1b3/0x490
[   24.518575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.519125]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.519626]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.520280]  ? __kthread_parkme+0x82/0x160
[   24.520677]  ? preempt_count_sub+0x50/0x80
[   24.521298]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.522211]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.522657]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.523184]  kthread+0x257/0x310
[   24.523565]  ? __pfx_kthread+0x10/0x10
[   24.523887]  ret_from_fork+0x41/0x80
[   24.524214]  ? __pfx_kthread+0x10/0x10
[   24.525100]  ret_from_fork_asm+0x1a/0x30
[   24.525702]  </TASK>
[   24.526007] 
[   24.526203] Allocated by task 190:
[   24.526442]  kasan_save_stack+0x3d/0x60
[   24.527038]  kasan_save_track+0x18/0x40
[   24.527476]  kasan_save_alloc_info+0x3b/0x50
[   24.528436]  __kasan_kmalloc+0xb7/0xc0
[   24.528992]  __kmalloc_cache_noprof+0x184/0x410
[   24.529410]  kmalloc_memmove_invalid_size+0xad/0x330
[   24.530060]  kunit_try_run_case+0x1b3/0x490
[   24.530505]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.531089]  kthread+0x257/0x310
[   24.531521]  ret_from_fork+0x41/0x80
[   24.531908]  ret_from_fork_asm+0x1a/0x30
[   24.532507] 
[   24.533195] The buggy address belongs to the object at ffff888101a8e500
[   24.533195]  which belongs to the cache kmalloc-64 of size 64
[   24.534195] The buggy address is located 4 bytes inside of
[   24.534195]  allocated 64-byte region [ffff888101a8e500, ffff888101a8e540)
[   24.535160] 
[   24.535436] The buggy address belongs to the physical page:
[   24.536058] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a8e
[   24.536910] flags: 0x200000000000000(node=0|zone=2)
[   24.537415] page_type: f5(slab)
[   24.538017] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.538736] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.539403] page dumped because: kasan: bad access detected
[   24.540005] 
[   24.540153] Memory state around the buggy address:
[   24.540785]  ffff888101a8e400: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.541675]  ffff888101a8e480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.542381] >ffff888101a8e500: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   24.543423]                                            ^
[   24.543803]  ffff888101a8e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.544347]  ffff888101a8e600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.544907] ==================================================================

test log snippet boot parser 39

Home

[   23.027324] ==================================================================
[   23.028296] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x363/0x3c0
[   23.028631] Read of size 1 at addr ffff888101e49cdf by task kunit_try_catch/146
[   23.029320] 
[   23.029512] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   23.030173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.030689] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.031174] Call Trace:
[   23.031816]  <TASK>
[   23.032104]  dump_stack_lvl+0x73/0xb0
[   23.032544]  print_report+0xd1/0x640
[   23.032892]  ? __virt_addr_valid+0x1db/0x2d0
[   23.033357]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.033839]  kasan_report+0x102/0x140
[   23.034379]  ? kmalloc_oob_left+0x363/0x3c0
[   23.034667]  ? kmalloc_oob_left+0x363/0x3c0
[   23.035292]  __asan_report_load1_noabort+0x18/0x20
[   23.035804]  kmalloc_oob_left+0x363/0x3c0
[   23.036098]  ? __pfx_kmalloc_oob_left+0x10/0x10
[   23.036600]  ? __schedule+0xc3e/0x2790
[   23.037199]  ? __pfx_read_tsc+0x10/0x10
[   23.037497]  ? ktime_get_ts64+0x84/0x230
[   23.037951]  kunit_try_run_case+0x1b3/0x490
[   23.038408]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.038844]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.039152]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.039490]  ? __kthread_parkme+0x82/0x160
[   23.039971]  ? preempt_count_sub+0x50/0x80
[   23.040437]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.040901]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.041525]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.041911]  kthread+0x257/0x310
[   23.042323]  ? __pfx_kthread+0x10/0x10
[   23.042711]  ret_from_fork+0x41/0x80
[   23.043325]  ? __pfx_kthread+0x10/0x10
[   23.043598]  ret_from_fork_asm+0x1a/0x30
[   23.044049]  </TASK>
[   23.044367] 
[   23.044610] Allocated by task 26:
[   23.044861]  kasan_save_stack+0x3d/0x60
[   23.045390]  kasan_save_track+0x18/0x40
[   23.045679]  kasan_save_alloc_info+0x3b/0x50
[   23.045961]  __kasan_kmalloc+0xb7/0xc0
[   23.046386]  __kmalloc_node_track_caller_noprof+0x1c6/0x500
[   23.047115]  kvasprintf+0xc6/0x150
[   23.047453]  __kthread_create_on_node+0x18c/0x3a0
[   23.047857]  kthread_create_on_node+0xa8/0xe0
[   23.048330]  create_worker+0x3c8/0x7a0
[   23.048657]  worker_thread+0x97d/0x1300
[   23.049170]  kthread+0x257/0x310
[   23.050102]  ret_from_fork+0x41/0x80
[   23.050385]  ret_from_fork_asm+0x1a/0x30
[   23.050654] 
[   23.050881] The buggy address belongs to the object at ffff888101e49cc0
[   23.050881]  which belongs to the cache kmalloc-16 of size 16
[   23.052483] The buggy address is located 19 bytes to the right of
[   23.052483]  allocated 12-byte region [ffff888101e49cc0, ffff888101e49ccc)
[   23.053588] 
[   23.053851] The buggy address belongs to the physical page:
[   23.054449] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   23.055283] flags: 0x200000000000000(node=0|zone=2)
[   23.055746] page_type: f5(slab)
[   23.056098] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   23.056670] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   23.057398] page dumped because: kasan: bad access detected
[   23.057984] 
[   23.058179] Memory state around the buggy address:
[   23.058623]  ffff888101e49b80: fa fb fc fc 00 02 fc fc 00 05 fc fc 00 02 fc fc
[   23.059235]  ffff888101e49c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   23.059901] >ffff888101e49c80: fa fb fc fc fa fb fc fc 00 04 fc fc 00 07 fc fc
[   23.060551]                                                     ^
[   23.061005]  ffff888101e49d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.061704]  ffff888101e49d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.062270] ==================================================================

test log snippet boot parser 40

Home

[   24.411855] ==================================================================
[   24.413003] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x167/0x330
[   24.413656] Write of size 16 at addr ffff888102a2aa69 by task kunit_try_catch/186
[   24.414624] 
[   24.415482] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   24.416237] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.416723] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.417583] Call Trace:
[   24.418007]  <TASK>
[   24.418602]  dump_stack_lvl+0x73/0xb0
[   24.419120]  print_report+0xd1/0x640
[   24.419488]  ? __virt_addr_valid+0x1db/0x2d0
[   24.420015]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.421258]  kasan_report+0x102/0x140
[   24.421553]  ? kmalloc_oob_memset_16+0x167/0x330
[   24.421887]  ? kmalloc_oob_memset_16+0x167/0x330
[   24.422500]  kasan_check_range+0x10c/0x1c0
[   24.422877]  __asan_memset+0x27/0x50
[   24.423712]  kmalloc_oob_memset_16+0x167/0x330
[   24.424078]  ? __pfx_kmalloc_oob_memset_16+0x10/0x10
[   24.424735]  ? __pfx_kmalloc_oob_memset_16+0x10/0x10
[   24.425276]  kunit_try_run_case+0x1b3/0x490
[   24.425817]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.426335]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.427147]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.427603]  ? __kthread_parkme+0x82/0x160
[   24.427910]  ? preempt_count_sub+0x50/0x80
[   24.428340]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.428679]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.429233]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.430130]  kthread+0x257/0x310
[   24.430514]  ? __pfx_kthread+0x10/0x10
[   24.431286]  ret_from_fork+0x41/0x80
[   24.431742]  ? __pfx_kthread+0x10/0x10
[   24.432173]  ret_from_fork_asm+0x1a/0x30
[   24.432757]  </TASK>
[   24.433047] 
[   24.433268] Allocated by task 186:
[   24.433748]  kasan_save_stack+0x3d/0x60
[   24.434172]  kasan_save_track+0x18/0x40
[   24.434924]  kasan_save_alloc_info+0x3b/0x50
[   24.435311]  __kasan_kmalloc+0xb7/0xc0
[   24.435612]  __kmalloc_cache_noprof+0x184/0x410
[   24.435892]  kmalloc_oob_memset_16+0xad/0x330
[   24.436346]  kunit_try_run_case+0x1b3/0x490
[   24.436759]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.437172]  kthread+0x257/0x310
[   24.437436]  ret_from_fork+0x41/0x80
[   24.438011]  ret_from_fork_asm+0x1a/0x30
[   24.438427] 
[   24.438982] The buggy address belongs to the object at ffff888102a2aa00
[   24.438982]  which belongs to the cache kmalloc-128 of size 128
[   24.440091] The buggy address is located 105 bytes inside of
[   24.440091]  allocated 120-byte region [ffff888102a2aa00, ffff888102a2aa78)
[   24.441065] 
[   24.441283] The buggy address belongs to the physical page:
[   24.441707] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2a
[   24.442095] flags: 0x200000000000000(node=0|zone=2)
[   24.443054] page_type: f5(slab)
[   24.443417] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.444196] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   24.444760] page dumped because: kasan: bad access detected
[   24.445044] 
[   24.445223] Memory state around the buggy address:
[   24.446020]  ffff888102a2a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   24.446985]  ffff888102a2a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.447721] >ffff888102a2aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.448165]                                                                 ^
[   24.448800]  ffff888102a2aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.449426]  ffff888102a2ab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.449883] ==================================================================

test log snippet boot parser 41

Home

[   23.118930] ==================================================================
[   23.120033] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4ca/0x530
[   23.120764] Write of size 1 at addr ffff888101a8a278 by task kunit_try_catch/150
[   23.121104] 
[   23.121350] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   23.121979] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.122375] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.122867] Call Trace:
[   23.123135]  <TASK>
[   23.123445]  dump_stack_lvl+0x73/0xb0
[   23.123889]  print_report+0xd1/0x640
[   23.124296]  ? __virt_addr_valid+0x1db/0x2d0
[   23.124599]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.125150]  kasan_report+0x102/0x140
[   23.125474]  ? kmalloc_track_caller_oob_right+0x4ca/0x530
[   23.125900]  ? kmalloc_track_caller_oob_right+0x4ca/0x530
[   23.126380]  __asan_report_store1_noabort+0x1b/0x30
[   23.126701]  kmalloc_track_caller_oob_right+0x4ca/0x530
[   23.127267]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   23.127910]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   23.128538]  kunit_try_run_case+0x1b3/0x490
[   23.129051]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.129567]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.130107]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.130730]  ? __kthread_parkme+0x82/0x160
[   23.131229]  ? preempt_count_sub+0x50/0x80
[   23.131741]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.132285]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.132639]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.133090]  kthread+0x257/0x310
[   23.133513]  ? __pfx_kthread+0x10/0x10
[   23.133986]  ret_from_fork+0x41/0x80
[   23.134429]  ? __pfx_kthread+0x10/0x10
[   23.134895]  ret_from_fork_asm+0x1a/0x30
[   23.135396]  </TASK>
[   23.135681] 
[   23.135942] Allocated by task 150:
[   23.136337]  kasan_save_stack+0x3d/0x60
[   23.136767]  kasan_save_track+0x18/0x40
[   23.137256]  kasan_save_alloc_info+0x3b/0x50
[   23.137721]  __kasan_kmalloc+0xb7/0xc0
[   23.138182]  __kmalloc_node_track_caller_noprof+0x1c6/0x500
[   23.138775]  kmalloc_track_caller_oob_right+0x9a/0x530
[   23.139354]  kunit_try_run_case+0x1b3/0x490
[   23.139830]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.140223]  kthread+0x257/0x310
[   23.140475]  ret_from_fork+0x41/0x80
[   23.140842]  ret_from_fork_asm+0x1a/0x30
[   23.141232] 
[   23.141454] The buggy address belongs to the object at ffff888101a8a200
[   23.141454]  which belongs to the cache kmalloc-128 of size 128
[   23.142272] The buggy address is located 0 bytes to the right of
[   23.142272]  allocated 120-byte region [ffff888101a8a200, ffff888101a8a278)
[   23.143025] 
[   23.143223] The buggy address belongs to the physical page:
[   23.143693] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a8a
[   23.144132] flags: 0x200000000000000(node=0|zone=2)
[   23.144587] page_type: f5(slab)
[   23.144977] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.145624] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.146079] page dumped because: kasan: bad access detected
[   23.146423] 
[   23.146628] Memory state around the buggy address:
[   23.147083]  ffff888101a8a100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.147691]  ffff888101a8a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.149327] >ffff888101a8a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.150175]                                                                 ^
[   23.150947]  ffff888101a8a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.151510]  ffff888101a8a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.152238] ==================================================================
---
[   23.154386] ==================================================================
[   23.155410] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b3/0x530
[   23.156127] Write of size 1 at addr ffff888101a8a378 by task kunit_try_catch/150
[   23.156781] 
[   23.157028] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   23.158600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.158989] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.159643] Call Trace:
[   23.159898]  <TASK>
[   23.160548]  dump_stack_lvl+0x73/0xb0
[   23.160726]  print_report+0xd1/0x640
[   23.160898]  ? __virt_addr_valid+0x1db/0x2d0
[   23.161181]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.161647]  kasan_report+0x102/0x140
[   23.161917]  ? kmalloc_track_caller_oob_right+0x4b3/0x530
[   23.162879]  ? kmalloc_track_caller_oob_right+0x4b3/0x530
[   23.163499]  __asan_report_store1_noabort+0x1b/0x30
[   23.164117]  kmalloc_track_caller_oob_right+0x4b3/0x530
[   23.164573]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   23.164929]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   23.165440]  kunit_try_run_case+0x1b3/0x490
[   23.165847]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.166269]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.166652]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.167266]  ? __kthread_parkme+0x82/0x160
[   23.167565]  ? preempt_count_sub+0x50/0x80
[   23.167966]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.168284]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.168967]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.169689]  kthread+0x257/0x310
[   23.169941]  ? __pfx_kthread+0x10/0x10
[   23.170207]  ret_from_fork+0x41/0x80
[   23.170650]  ? __pfx_kthread+0x10/0x10
[   23.171059]  ret_from_fork_asm+0x1a/0x30
[   23.171463]  </TASK>
[   23.171706] 
[   23.171899] Allocated by task 150:
[   23.172224]  kasan_save_stack+0x3d/0x60
[   23.172619]  kasan_save_track+0x18/0x40
[   23.172909]  kasan_save_alloc_info+0x3b/0x50
[   23.173292]  __kasan_kmalloc+0xb7/0xc0
[   23.173604]  __kmalloc_node_track_caller_noprof+0x1c6/0x500
[   23.174032]  kmalloc_track_caller_oob_right+0x19b/0x530
[   23.174508]  kunit_try_run_case+0x1b3/0x490
[   23.174909]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.175360]  kthread+0x257/0x310
[   23.175886]  ret_from_fork+0x41/0x80
[   23.176832]  ret_from_fork_asm+0x1a/0x30
[   23.177827] 
[   23.178367] The buggy address belongs to the object at ffff888101a8a300
[   23.178367]  which belongs to the cache kmalloc-128 of size 128
[   23.179279] The buggy address is located 0 bytes to the right of
[   23.179279]  allocated 120-byte region [ffff888101a8a300, ffff888101a8a378)
[   23.180503] 
[   23.180842] The buggy address belongs to the physical page:
[   23.181441] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a8a
[   23.182333] flags: 0x200000000000000(node=0|zone=2)
[   23.182922] page_type: f5(slab)
[   23.183374] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.184009] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.184501] page dumped because: kasan: bad access detected
[   23.184784] 
[   23.184974] Memory state around the buggy address:
[   23.185448]  ffff888101a8a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.185961]  ffff888101a8a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.186444] >ffff888101a8a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.186983]                                                                 ^
[   23.187454]  ffff888101a8a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.187935]  ffff888101a8a400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.188507] ==================================================================

test log snippet boot parser 42

Home

[   25.259500] ==================================================================
[   25.260160] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x404/0x530
[   25.260569] Read of size 1 at addr ffff888101a950c8 by task kunit_try_catch/215
[   25.261178] 
[   25.262165] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   25.263189] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.263862] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.264422] Call Trace:
[   25.264695]  <TASK>
[   25.265465]  dump_stack_lvl+0x73/0xb0
[   25.266066]  print_report+0xd1/0x640
[   25.266394]  ? __virt_addr_valid+0x1db/0x2d0
[   25.266946]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.267655]  kasan_report+0x102/0x140
[   25.268192]  ? kmem_cache_oob+0x404/0x530
[   25.268939]  ? kmem_cache_oob+0x404/0x530
[   25.269559]  __asan_report_load1_noabort+0x18/0x20
[   25.270008]  kmem_cache_oob+0x404/0x530
[   25.270574]  ? trace_hardirqs_on+0x37/0xe0
[   25.271285]  ? __pfx_kmem_cache_oob+0x10/0x10
[   25.271724]  ? finish_task_switch.isra.0+0x153/0x700
[   25.272267]  ? __switch_to+0x5d9/0xf60
[   25.272669]  ? __pfx_read_tsc+0x10/0x10
[   25.273119]  ? ktime_get_ts64+0x84/0x230
[   25.273444]  kunit_try_run_case+0x1b3/0x490
[   25.274186]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.274654]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.275028]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.275604]  ? __kthread_parkme+0x82/0x160
[   25.276125]  ? preempt_count_sub+0x50/0x80
[   25.276803]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.277581]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.278029]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.278565]  kthread+0x257/0x310
[   25.278946]  ? __pfx_kthread+0x10/0x10
[   25.279413]  ret_from_fork+0x41/0x80
[   25.280030]  ? __pfx_kthread+0x10/0x10
[   25.280442]  ret_from_fork_asm+0x1a/0x30
[   25.281067]  </TASK>
[   25.281270] 
[   25.281552] Allocated by task 215:
[   25.282049]  kasan_save_stack+0x3d/0x60
[   25.282707]  kasan_save_track+0x18/0x40
[   25.283024]  kasan_save_alloc_info+0x3b/0x50
[   25.283532]  __kasan_slab_alloc+0x91/0xa0
[   25.284371]  kmem_cache_alloc_noprof+0x11e/0x3e0
[   25.285123]  kmem_cache_oob+0x158/0x530
[   25.286067]  kunit_try_run_case+0x1b3/0x490
[   25.286554]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.287422]  kthread+0x257/0x310
[   25.287804]  ret_from_fork+0x41/0x80
[   25.288447]  ret_from_fork_asm+0x1a/0x30
[   25.289257] 
[   25.289522] The buggy address belongs to the object at ffff888101a95000
[   25.289522]  which belongs to the cache test_cache of size 200
[   25.290436] The buggy address is located 0 bytes to the right of
[   25.290436]  allocated 200-byte region [ffff888101a95000, ffff888101a950c8)
[   25.291539] 
[   25.291697] The buggy address belongs to the physical page:
[   25.292124] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a95
[   25.292799] flags: 0x200000000000000(node=0|zone=2)
[   25.293672] page_type: f5(slab)
[   25.294232] raw: 0200000000000000 ffff888101a4cdc0 dead000000000122 0000000000000000
[   25.294901] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   25.295560] page dumped because: kasan: bad access detected
[   25.296428] 
[   25.296799] Memory state around the buggy address:
[   25.297412]  ffff888101a94f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.297791]  ffff888101a95000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.299171] >ffff888101a95080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   25.300128]                                               ^
[   25.300523]  ffff888101a95100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.301086]  ffff888101a95180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.301565] ==================================================================

test log snippet boot parser 43

Home

[   23.608459] ==================================================================
[   23.609831] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec8/0x11d0
[   23.610389] Write of size 1 at addr ffff888100393cda by task kunit_try_catch/166
[   23.610930] 
[   23.611134] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   23.612411] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.612881] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.613438] Call Trace:
[   23.613998]  <TASK>
[   23.614317]  dump_stack_lvl+0x73/0xb0
[   23.615272]  print_report+0xd1/0x640
[   23.615681]  ? __virt_addr_valid+0x1db/0x2d0
[   23.616594]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.617134]  kasan_report+0x102/0x140
[   23.617431]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   23.617913]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   23.618294]  __asan_report_store1_noabort+0x1b/0x30
[   23.618769]  krealloc_less_oob_helper+0xec8/0x11d0
[   23.619171]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   23.620260]  ? irqentry_exit+0x2a/0x60
[   23.620764]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   23.621309]  krealloc_less_oob+0x1c/0x30
[   23.621793]  kunit_try_run_case+0x1b3/0x490
[   23.622256]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.622907]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.623418]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.624153]  ? __kthread_parkme+0x82/0x160
[   23.624581]  ? preempt_count_sub+0x50/0x80
[   23.625010]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.625411]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.625951]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.626815]  kthread+0x257/0x310
[   23.627223]  ? __pfx_kthread+0x10/0x10
[   23.627976]  ret_from_fork+0x41/0x80
[   23.628364]  ? __pfx_kthread+0x10/0x10
[   23.628915]  ret_from_fork_asm+0x1a/0x30
[   23.629384]  </TASK>
[   23.629748] 
[   23.629983] Allocated by task 166:
[   23.630338]  kasan_save_stack+0x3d/0x60
[   23.630873]  kasan_save_track+0x18/0x40
[   23.631303]  kasan_save_alloc_info+0x3b/0x50
[   23.632027]  __kasan_krealloc+0x190/0x1f0
[   23.632371]  krealloc_noprof+0xf3/0x340
[   23.632705]  krealloc_less_oob_helper+0x1ab/0x11d0
[   23.633129]  krealloc_less_oob+0x1c/0x30
[   23.633732]  kunit_try_run_case+0x1b3/0x490
[   23.634181]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.634718]  kthread+0x257/0x310
[   23.635112]  ret_from_fork+0x41/0x80
[   23.635508]  ret_from_fork_asm+0x1a/0x30
[   23.636279] 
[   23.636488] The buggy address belongs to the object at ffff888100393c00
[   23.636488]  which belongs to the cache kmalloc-256 of size 256
[   23.637446] The buggy address is located 17 bytes to the right of
[   23.637446]  allocated 201-byte region [ffff888100393c00, ffff888100393cc9)
[   23.638347] 
[   23.638725] The buggy address belongs to the physical page:
[   23.639260] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100392
[   23.640053] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.640863] flags: 0x200000000000040(head|node=0|zone=2)
[   23.641406] page_type: f5(slab)
[   23.641874] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   23.642740] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.643326] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   23.644229] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.645019] head: 0200000000000001 ffffea000400e481 ffffffffffffffff 0000000000000000
[   23.645701] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   23.646303] page dumped because: kasan: bad access detected
[   23.646829] 
[   23.647046] Memory state around the buggy address:
[   23.647891]  ffff888100393b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.648500]  ffff888100393c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.649288] >ffff888100393c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.649817]                                                     ^
[   23.650373]  ffff888100393d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.651184]  ffff888100393d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.652055] ==================================================================

test log snippet boot parser 44

Home

[   23.698907] ==================================================================
[   23.699660] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd49/0x11d0
[   23.700149] Write of size 1 at addr ffff888100393ceb by task kunit_try_catch/166
[   23.700788] 
[   23.701019] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   23.701617] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.702007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.702764] Call Trace:
[   23.703003]  <TASK>
[   23.703185]  dump_stack_lvl+0x73/0xb0
[   23.703480]  print_report+0xd1/0x640
[   23.703897]  ? __virt_addr_valid+0x1db/0x2d0
[   23.704364]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.704973]  kasan_report+0x102/0x140
[   23.705399]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   23.705926]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   23.706354]  __asan_report_store1_noabort+0x1b/0x30
[   23.706929]  krealloc_less_oob_helper+0xd49/0x11d0
[   23.707270]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   23.707828]  ? irqentry_exit+0x2a/0x60
[   23.708348]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   23.708938]  krealloc_less_oob+0x1c/0x30
[   23.709493]  kunit_try_run_case+0x1b3/0x490
[   23.709995]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.710323]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.710786]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.711595]  ? __kthread_parkme+0x82/0x160
[   23.712027]  ? preempt_count_sub+0x50/0x80
[   23.712404]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.712834]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.713359]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.714104]  kthread+0x257/0x310
[   23.714472]  ? __pfx_kthread+0x10/0x10
[   23.714948]  ret_from_fork+0x41/0x80
[   23.715557]  ? __pfx_kthread+0x10/0x10
[   23.715974]  ret_from_fork_asm+0x1a/0x30
[   23.716419]  </TASK>
[   23.716722] 
[   23.716960] Allocated by task 166:
[   23.717331]  kasan_save_stack+0x3d/0x60
[   23.717777]  kasan_save_track+0x18/0x40
[   23.718160]  kasan_save_alloc_info+0x3b/0x50
[   23.718535]  __kasan_krealloc+0x190/0x1f0
[   23.718977]  krealloc_noprof+0xf3/0x340
[   23.719577]  krealloc_less_oob_helper+0x1ab/0x11d0
[   23.720081]  krealloc_less_oob+0x1c/0x30
[   23.720571]  kunit_try_run_case+0x1b3/0x490
[   23.721195]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.721536]  kthread+0x257/0x310
[   23.721764]  ret_from_fork+0x41/0x80
[   23.722059]  ret_from_fork_asm+0x1a/0x30
[   23.722534] 
[   23.722744] The buggy address belongs to the object at ffff888100393c00
[   23.722744]  which belongs to the cache kmalloc-256 of size 256
[   23.723798] The buggy address is located 34 bytes to the right of
[   23.723798]  allocated 201-byte region [ffff888100393c00, ffff888100393cc9)
[   23.725296] 
[   23.725499] The buggy address belongs to the physical page:
[   23.725826] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100392
[   23.726414] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.727103] flags: 0x200000000000040(head|node=0|zone=2)
[   23.727604] page_type: f5(slab)
[   23.727938] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   23.729612] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.731978] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   23.732723] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.733320] head: 0200000000000001 ffffea000400e481 ffffffffffffffff 0000000000000000
[   23.733950] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   23.734370] page dumped because: kasan: bad access detected
[   23.734989] 
[   23.735229] Memory state around the buggy address:
[   23.735666]  ffff888100393b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.736184]  ffff888100393c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.737211] >ffff888100393c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.737818]                                                           ^
[   23.738415]  ffff888100393d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.739139]  ffff888100393d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.739504] ==================================================================
---
[   23.652966] ==================================================================
[   23.653574] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe92/0x11d0
[   23.654173] Write of size 1 at addr ffff888100393cea by task kunit_try_catch/166
[   23.654885] 
[   23.655130] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   23.656236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.656767] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.657669] Call Trace:
[   23.657994]  <TASK>
[   23.658286]  dump_stack_lvl+0x73/0xb0
[   23.658866]  print_report+0xd1/0x640
[   23.659266]  ? __virt_addr_valid+0x1db/0x2d0
[   23.660064]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.660473]  kasan_report+0x102/0x140
[   23.660885]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   23.661886]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   23.662377]  __asan_report_store1_noabort+0x1b/0x30
[   23.662926]  krealloc_less_oob_helper+0xe92/0x11d0
[   23.663415]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   23.664292]  ? irqentry_exit+0x2a/0x60
[   23.664845]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   23.665320]  krealloc_less_oob+0x1c/0x30
[   23.665833]  kunit_try_run_case+0x1b3/0x490
[   23.666640]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.667108]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.667516]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.667929]  ? __kthread_parkme+0x82/0x160
[   23.668566]  ? preempt_count_sub+0x50/0x80
[   23.669768]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.670212]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.670848]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.671465]  kthread+0x257/0x310
[   23.671944]  ? __pfx_kthread+0x10/0x10
[   23.672391]  ret_from_fork+0x41/0x80
[   23.673165]  ? __pfx_kthread+0x10/0x10
[   23.673692]  ret_from_fork_asm+0x1a/0x30
[   23.674051]  </TASK>
[   23.674331] 
[   23.674684] Allocated by task 166:
[   23.675042]  kasan_save_stack+0x3d/0x60
[   23.675455]  kasan_save_track+0x18/0x40
[   23.675887]  kasan_save_alloc_info+0x3b/0x50
[   23.676319]  __kasan_krealloc+0x190/0x1f0
[   23.676651]  krealloc_noprof+0xf3/0x340
[   23.676910]  krealloc_less_oob_helper+0x1ab/0x11d0
[   23.677401]  krealloc_less_oob+0x1c/0x30
[   23.678168]  kunit_try_run_case+0x1b3/0x490
[   23.678737]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.679227]  kthread+0x257/0x310
[   23.679729]  ret_from_fork+0x41/0x80
[   23.680136]  ret_from_fork_asm+0x1a/0x30
[   23.680473] 
[   23.680816] The buggy address belongs to the object at ffff888100393c00
[   23.680816]  which belongs to the cache kmalloc-256 of size 256
[   23.681514] The buggy address is located 33 bytes to the right of
[   23.681514]  allocated 201-byte region [ffff888100393c00, ffff888100393cc9)
[   23.683081] 
[   23.683308] The buggy address belongs to the physical page:
[   23.683876] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100392
[   23.684489] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.685163] flags: 0x200000000000040(head|node=0|zone=2)
[   23.686045] page_type: f5(slab)
[   23.686422] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   23.686989] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.687384] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   23.688009] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.688958] head: 0200000000000001 ffffea000400e481 ffffffffffffffff 0000000000000000
[   23.689984] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   23.690714] page dumped because: kasan: bad access detected
[   23.691210] 
[   23.691402] Memory state around the buggy address:
[   23.691813]  ffff888100393b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.692416]  ffff888100393c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.693181] >ffff888100393c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.694130]                                                           ^
[   23.694766]  ffff888100393d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.695357]  ffff888100393d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.695948] ==================================================================

test log snippet boot parser 45

Home

[   23.559095] ==================================================================
[   23.560048] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe25/0x11d0
[   23.560527] Write of size 1 at addr ffff888100393cd0 by task kunit_try_catch/166
[   23.561405] 
[   23.561581] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   23.562479] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.562880] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.564062] Call Trace:
[   23.564368]  <TASK>
[   23.564861]  dump_stack_lvl+0x73/0xb0
[   23.565393]  print_report+0xd1/0x640
[   23.565803]  ? __virt_addr_valid+0x1db/0x2d0
[   23.566100]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.566866]  kasan_report+0x102/0x140
[   23.567599]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   23.568474]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   23.569210]  __asan_report_store1_noabort+0x1b/0x30
[   23.569874]  krealloc_less_oob_helper+0xe25/0x11d0
[   23.570341]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   23.570933]  ? irqentry_exit+0x2a/0x60
[   23.571404]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   23.572005]  krealloc_less_oob+0x1c/0x30
[   23.572523]  kunit_try_run_case+0x1b3/0x490
[   23.573166]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.573698]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.574203]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.574591]  ? __kthread_parkme+0x82/0x160
[   23.575281]  ? preempt_count_sub+0x50/0x80
[   23.575644]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.576408]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.577052]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.577821]  kthread+0x257/0x310
[   23.578568]  ? __pfx_kthread+0x10/0x10
[   23.579083]  ret_from_fork+0x41/0x80
[   23.579922]  ? __pfx_kthread+0x10/0x10
[   23.580474]  ret_from_fork_asm+0x1a/0x30
[   23.580900]  </TASK>
[   23.581126] 
[   23.582028] Allocated by task 166:
[   23.582386]  kasan_save_stack+0x3d/0x60
[   23.583055]  kasan_save_track+0x18/0x40
[   23.583562]  kasan_save_alloc_info+0x3b/0x50
[   23.584103]  __kasan_krealloc+0x190/0x1f0
[   23.584523]  krealloc_noprof+0xf3/0x340
[   23.585024]  krealloc_less_oob_helper+0x1ab/0x11d0
[   23.585431]  krealloc_less_oob+0x1c/0x30
[   23.585727]  kunit_try_run_case+0x1b3/0x490
[   23.586232]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.587504]  kthread+0x257/0x310
[   23.588062]  ret_from_fork+0x41/0x80
[   23.588459]  ret_from_fork_asm+0x1a/0x30
[   23.588978] 
[   23.589193] The buggy address belongs to the object at ffff888100393c00
[   23.589193]  which belongs to the cache kmalloc-256 of size 256
[   23.590215] The buggy address is located 7 bytes to the right of
[   23.590215]  allocated 201-byte region [ffff888100393c00, ffff888100393cc9)
[   23.591707] 
[   23.592011] The buggy address belongs to the physical page:
[   23.592501] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100392
[   23.593542] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.594272] flags: 0x200000000000040(head|node=0|zone=2)
[   23.594874] page_type: f5(slab)
[   23.595590] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   23.596349] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.596942] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   23.597763] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.598455] head: 0200000000000001 ffffea000400e481 ffffffffffffffff 0000000000000000
[   23.599744] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   23.600284] page dumped because: kasan: bad access detected
[   23.600794] 
[   23.601130] Memory state around the buggy address:
[   23.601708]  ffff888100393b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.602335]  ffff888100393c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.602946] >ffff888100393c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.603707]                                                  ^
[   23.604968]  ffff888100393d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.605827]  ffff888100393d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.606666] ==================================================================

test log snippet boot parser 46

Home

[   23.512255] ==================================================================
[   23.512832] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd72/0x11d0
[   23.513888] Write of size 1 at addr ffff888100393cc9 by task kunit_try_catch/166
[   23.514331] 
[   23.514566] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   23.515140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.516084] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.517164] Call Trace:
[   23.517467]  <TASK>
[   23.518164]  dump_stack_lvl+0x73/0xb0
[   23.518542]  print_report+0xd1/0x640
[   23.518961]  ? __virt_addr_valid+0x1db/0x2d0
[   23.519427]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.519946]  kasan_report+0x102/0x140
[   23.520796]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   23.521521]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   23.521897]  __asan_report_store1_noabort+0x1b/0x30
[   23.522369]  krealloc_less_oob_helper+0xd72/0x11d0
[   23.522799]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   23.523230]  ? irqentry_exit+0x2a/0x60
[   23.524237]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   23.524787]  krealloc_less_oob+0x1c/0x30
[   23.525459]  kunit_try_run_case+0x1b3/0x490
[   23.525997]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.526790]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.527182]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.527530]  ? __kthread_parkme+0x82/0x160
[   23.528583]  ? preempt_count_sub+0x50/0x80
[   23.529368]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.529872]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.530268]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.530765]  kthread+0x257/0x310
[   23.531194]  ? __pfx_kthread+0x10/0x10
[   23.531816]  ret_from_fork+0x41/0x80
[   23.532128]  ? __pfx_kthread+0x10/0x10
[   23.532874]  ret_from_fork_asm+0x1a/0x30
[   23.533359]  </TASK>
[   23.533644] 
[   23.533868] Allocated by task 166:
[   23.534237]  kasan_save_stack+0x3d/0x60
[   23.534778]  kasan_save_track+0x18/0x40
[   23.535059]  kasan_save_alloc_info+0x3b/0x50
[   23.535359]  __kasan_krealloc+0x190/0x1f0
[   23.536059]  krealloc_noprof+0xf3/0x340
[   23.536435]  krealloc_less_oob_helper+0x1ab/0x11d0
[   23.536880]  krealloc_less_oob+0x1c/0x30
[   23.537189]  kunit_try_run_case+0x1b3/0x490
[   23.538211]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.538706]  kthread+0x257/0x310
[   23.538975]  ret_from_fork+0x41/0x80
[   23.539278]  ret_from_fork_asm+0x1a/0x30
[   23.539584] 
[   23.539730] The buggy address belongs to the object at ffff888100393c00
[   23.539730]  which belongs to the cache kmalloc-256 of size 256
[   23.541792] The buggy address is located 0 bytes to the right of
[   23.541792]  allocated 201-byte region [ffff888100393c00, ffff888100393cc9)
[   23.543175] 
[   23.543844] The buggy address belongs to the physical page:
[   23.544190] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100392
[   23.544752] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.545680] flags: 0x200000000000040(head|node=0|zone=2)
[   23.546552] page_type: f5(slab)
[   23.546951] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   23.547839] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.548544] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   23.548961] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.549612] head: 0200000000000001 ffffea000400e481 ffffffffffffffff 0000000000000000
[   23.550142] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   23.551068] page dumped because: kasan: bad access detected
[   23.551608] 
[   23.552002] Memory state around the buggy address:
[   23.552924]  ffff888100393b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.553744]  ffff888100393c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.554156] >ffff888100393c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.554744]                                               ^
[   23.555600]  ffff888100393d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.555943]  ffff888100393d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.556555] ==================================================================

test log snippet boot parser 47

Home

[   23.746957] ==================================================================
[   23.747955] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x823/0x930
[   23.748848] Write of size 1 at addr ffff8881026b20eb by task kunit_try_catch/168
[   23.749468] 
[   23.749896] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   23.751140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.751883] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.752584] Call Trace:
[   23.753315]  <TASK>
[   23.753510]  dump_stack_lvl+0x73/0xb0
[   23.754190]  print_report+0xd1/0x640
[   23.754969]  ? __virt_addr_valid+0x1db/0x2d0
[   23.755461]  ? kasan_addr_to_slab+0x11/0xa0
[   23.756142]  kasan_report+0x102/0x140
[   23.756404]  ? krealloc_more_oob_helper+0x823/0x930
[   23.757073]  ? krealloc_more_oob_helper+0x823/0x930
[   23.757423]  __asan_report_store1_noabort+0x1b/0x30
[   23.757929]  krealloc_more_oob_helper+0x823/0x930
[   23.758327]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   23.758808]  ? irqentry_exit+0x2a/0x60
[   23.759113]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   23.759569]  ? __pfx_krealloc_large_more_oob+0x10/0x10
[   23.760076]  krealloc_large_more_oob+0x1c/0x30
[   23.760798]  kunit_try_run_case+0x1b3/0x490
[   23.761125]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.763290]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.763829]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.764512]  ? __kthread_parkme+0x82/0x160
[   23.764955]  ? preempt_count_sub+0x50/0x80
[   23.765325]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.765851]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.767285]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.768216]  kthread+0x257/0x310
[   23.768625]  ? __pfx_kthread+0x10/0x10
[   23.769050]  ret_from_fork+0x41/0x80
[   23.769545]  ? __pfx_kthread+0x10/0x10
[   23.769852]  ret_from_fork_asm+0x1a/0x30
[   23.770610]  </TASK>
[   23.770925] 
[   23.771084] The buggy address belongs to the physical page:
[   23.771892] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026b0
[   23.772426] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.773142] flags: 0x200000000000040(head|node=0|zone=2)
[   23.773890] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.774522] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.776842] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.777359] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.777995] head: 0200000000000002 ffffea000409ac01 ffffffffffffffff 0000000000000000
[   23.779052] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.779529] page dumped because: kasan: bad access detected
[   23.780525] 
[   23.780921] Memory state around the buggy address:
[   23.781575]  ffff8881026b1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.782186]  ffff8881026b2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.783383] >ffff8881026b2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   23.783979]                                                           ^
[   23.784629]  ffff8881026b2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.785255]  ffff8881026b2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.785952] ==================================================================

test log snippet boot parser 48

Home

[   23.789637] ==================================================================
[   23.790136] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7ed/0x930
[   23.791294] Write of size 1 at addr ffff8881026b20f0 by task kunit_try_catch/168
[   23.791674] 
[   23.791909] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   23.792666] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.793282] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.794133] Call Trace:
[   23.794488]  <TASK>
[   23.794971]  dump_stack_lvl+0x73/0xb0
[   23.795354]  print_report+0xd1/0x640
[   23.796208]  ? __virt_addr_valid+0x1db/0x2d0
[   23.796644]  ? kasan_addr_to_slab+0x11/0xa0
[   23.797349]  kasan_report+0x102/0x140
[   23.797900]  ? krealloc_more_oob_helper+0x7ed/0x930
[   23.798341]  ? krealloc_more_oob_helper+0x7ed/0x930
[   23.799018]  __asan_report_store1_noabort+0x1b/0x30
[   23.799509]  krealloc_more_oob_helper+0x7ed/0x930
[   23.800142]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   23.801103]  ? irqentry_exit+0x2a/0x60
[   23.801360]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   23.802062]  ? __pfx_krealloc_large_more_oob+0x10/0x10
[   23.802708]  krealloc_large_more_oob+0x1c/0x30
[   23.803219]  kunit_try_run_case+0x1b3/0x490
[   23.803774]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.804255]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.804774]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.805198]  ? __kthread_parkme+0x82/0x160
[   23.806255]  ? preempt_count_sub+0x50/0x80
[   23.806740]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.807259]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.807888]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.808459]  kthread+0x257/0x310
[   23.809014]  ? __pfx_kthread+0x10/0x10
[   23.809343]  ret_from_fork+0x41/0x80
[   23.809925]  ? __pfx_kthread+0x10/0x10
[   23.810384]  ret_from_fork_asm+0x1a/0x30
[   23.810725]  </TASK>
[   23.811370] 
[   23.811621] The buggy address belongs to the physical page:
[   23.811997] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026b0
[   23.813010] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.813681] flags: 0x200000000000040(head|node=0|zone=2)
[   23.814274] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.814888] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.815941] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.816477] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.817220] head: 0200000000000002 ffffea000409ac01 ffffffffffffffff 0000000000000000
[   23.817881] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.818489] page dumped because: kasan: bad access detected
[   23.819158] 
[   23.819384] Memory state around the buggy address:
[   23.819899]  ffff8881026b1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.820430]  ffff8881026b2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.821345] >ffff8881026b2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   23.822107]                                                              ^
[   23.822704]  ffff8881026b2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.823337]  ffff8881026b2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.824000] ==================================================================

test log snippet boot parser 49

Home

[   23.461337] ==================================================================
[   23.462088] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7ed/0x930
[   23.462780] Write of size 1 at addr ffff888100a288f0 by task kunit_try_catch/164
[   23.463448] 
[   23.463683] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   23.464444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.465009] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.465737] Call Trace:
[   23.466048]  <TASK>
[   23.466333]  dump_stack_lvl+0x73/0xb0
[   23.466904]  print_report+0xd1/0x640
[   23.467359]  ? __virt_addr_valid+0x1db/0x2d0
[   23.468231]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.468794]  kasan_report+0x102/0x140
[   23.469195]  ? krealloc_more_oob_helper+0x7ed/0x930
[   23.469897]  ? krealloc_more_oob_helper+0x7ed/0x930
[   23.470415]  __asan_report_store1_noabort+0x1b/0x30
[   23.471156]  krealloc_more_oob_helper+0x7ed/0x930
[   23.471800]  ? trace_hardirqs_on+0x37/0xe0
[   23.472213]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   23.473125]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   23.474109]  ? __pfx_krealloc_more_oob+0x10/0x10
[   23.474685]  krealloc_more_oob+0x1c/0x30
[   23.475086]  kunit_try_run_case+0x1b3/0x490
[   23.475437]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.476238]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.476889]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.477397]  ? __kthread_parkme+0x82/0x160
[   23.477741]  ? preempt_count_sub+0x50/0x80
[   23.478672]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.479342]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.479969]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.480390]  kthread+0x257/0x310
[   23.480941]  ? __pfx_kthread+0x10/0x10
[   23.481316]  ret_from_fork+0x41/0x80
[   23.481847]  ? __pfx_kthread+0x10/0x10
[   23.482277]  ret_from_fork_asm+0x1a/0x30
[   23.483450]  </TASK>
[   23.483929] 
[   23.484086] Allocated by task 164:
[   23.484407]  kasan_save_stack+0x3d/0x60
[   23.485050]  kasan_save_track+0x18/0x40
[   23.485459]  kasan_save_alloc_info+0x3b/0x50
[   23.485881]  __kasan_krealloc+0x190/0x1f0
[   23.486178]  krealloc_noprof+0xf3/0x340
[   23.486589]  krealloc_more_oob_helper+0x1aa/0x930
[   23.487289]  krealloc_more_oob+0x1c/0x30
[   23.487597]  kunit_try_run_case+0x1b3/0x490
[   23.488261]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.488904]  kthread+0x257/0x310
[   23.489194]  ret_from_fork+0x41/0x80
[   23.489911]  ret_from_fork_asm+0x1a/0x30
[   23.490421] 
[   23.490618] The buggy address belongs to the object at ffff888100a28800
[   23.490618]  which belongs to the cache kmalloc-256 of size 256
[   23.491365] The buggy address is located 5 bytes to the right of
[   23.491365]  allocated 235-byte region [ffff888100a28800, ffff888100a288eb)
[   23.492142] 
[   23.492655] The buggy address belongs to the physical page:
[   23.493205] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a28
[   23.493953] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.494740] flags: 0x200000000000040(head|node=0|zone=2)
[   23.495295] page_type: f5(slab)
[   23.495969] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   23.496785] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.497379] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   23.498114] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.498833] head: 0200000000000001 ffffea0004028a01 ffffffffffffffff 0000000000000000
[   23.499416] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   23.500187] page dumped because: kasan: bad access detected
[   23.500958] 
[   23.501194] Memory state around the buggy address:
[   23.501735]  ffff888100a28780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.502232]  ffff888100a28800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.503015] >ffff888100a28880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   23.503428]                                                              ^
[   23.504193]  ffff888100a28900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.504737]  ffff888100a28980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.505393] ==================================================================

test log snippet boot parser 50

Home

[   23.415339] ==================================================================
[   23.416062] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x823/0x930
[   23.416713] Write of size 1 at addr ffff888100a288eb by task kunit_try_catch/164
[   23.417353] 
[   23.417684] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   23.418494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.419144] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.420000] Call Trace:
[   23.420283]  <TASK>
[   23.420480]  dump_stack_lvl+0x73/0xb0
[   23.421287]  print_report+0xd1/0x640
[   23.421687]  ? __virt_addr_valid+0x1db/0x2d0
[   23.421980]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.422523]  kasan_report+0x102/0x140
[   23.422927]  ? krealloc_more_oob_helper+0x823/0x930
[   23.423769]  ? krealloc_more_oob_helper+0x823/0x930
[   23.424136]  __asan_report_store1_noabort+0x1b/0x30
[   23.424801]  krealloc_more_oob_helper+0x823/0x930
[   23.425380]  ? trace_hardirqs_on+0x37/0xe0
[   23.426000]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   23.426960]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   23.427436]  ? __pfx_krealloc_more_oob+0x10/0x10
[   23.428127]  krealloc_more_oob+0x1c/0x30
[   23.428684]  kunit_try_run_case+0x1b3/0x490
[   23.429090]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.429780]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.430174]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.430889]  ? __kthread_parkme+0x82/0x160
[   23.431330]  ? preempt_count_sub+0x50/0x80
[   23.432108]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.433041]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.433670]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.434388]  kthread+0x257/0x310
[   23.434926]  ? __pfx_kthread+0x10/0x10
[   23.435290]  ret_from_fork+0x41/0x80
[   23.435846]  ? __pfx_kthread+0x10/0x10
[   23.436193]  ret_from_fork_asm+0x1a/0x30
[   23.437070]  </TASK>
[   23.437354] 
[   23.437625] Allocated by task 164:
[   23.438149]  kasan_save_stack+0x3d/0x60
[   23.438645]  kasan_save_track+0x18/0x40
[   23.439027]  kasan_save_alloc_info+0x3b/0x50
[   23.439664]  __kasan_krealloc+0x190/0x1f0
[   23.440024]  krealloc_noprof+0xf3/0x340
[   23.440424]  krealloc_more_oob_helper+0x1aa/0x930
[   23.441059]  krealloc_more_oob+0x1c/0x30
[   23.441394]  kunit_try_run_case+0x1b3/0x490
[   23.441939]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.442460]  kthread+0x257/0x310
[   23.443235]  ret_from_fork+0x41/0x80
[   23.443717]  ret_from_fork_asm+0x1a/0x30
[   23.444120] 
[   23.444350] The buggy address belongs to the object at ffff888100a28800
[   23.444350]  which belongs to the cache kmalloc-256 of size 256
[   23.445201] The buggy address is located 0 bytes to the right of
[   23.445201]  allocated 235-byte region [ffff888100a28800, ffff888100a288eb)
[   23.446361] 
[   23.446703] The buggy address belongs to the physical page:
[   23.447220] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a28
[   23.448337] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.449102] flags: 0x200000000000040(head|node=0|zone=2)
[   23.449699] page_type: f5(slab)
[   23.450098] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   23.450654] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.451390] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   23.452112] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.453181] head: 0200000000000001 ffffea0004028a01 ffffffffffffffff 0000000000000000
[   23.454047] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   23.454747] page dumped because: kasan: bad access detected
[   23.455218] 
[   23.455476] Memory state around the buggy address:
[   23.456018]  ffff888100a28780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.456698]  ffff888100a28800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.457334] >ffff888100a28880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   23.458220]                                                           ^
[   23.458746]  ffff888100a28900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.459696]  ffff888100a28980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.460112] ==================================================================

test log snippet boot parser 51

Home

[   26.956959] ==================================================================
[   26.957778] BUG: KASAN: slab-out-of-bounds in memchr+0x79/0x90
[   26.958497] Read of size 1 at addr ffff888101aa33d8 by task kunit_try_catch/263
[   26.959207] 
[   26.959468] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   26.960086] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.960377] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.961089] Call Trace:
[   26.961302]  <TASK>
[   26.962151]  dump_stack_lvl+0x73/0xb0
[   26.962843]  print_report+0xd1/0x640
[   26.963400]  ? __virt_addr_valid+0x1db/0x2d0
[   26.964263]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.964966]  kasan_report+0x102/0x140
[   26.965511]  ? memchr+0x79/0x90
[   26.966086]  ? memchr+0x79/0x90
[   26.966711]  __asan_report_load1_noabort+0x18/0x20
[   26.967323]  memchr+0x79/0x90
[   26.967662]  kasan_memchr+0x163/0x320
[   26.968066]  ? __pfx_kasan_memchr+0x10/0x10
[   26.968447]  ? __pfx_read_tsc+0x10/0x10
[   26.968858]  ? ktime_get_ts64+0x84/0x230
[   26.969167]  kunit_try_run_case+0x1b3/0x490
[   26.970408]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.971052]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.971490]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.972167]  ? __kthread_parkme+0x82/0x160
[   26.972517]  ? preempt_count_sub+0x50/0x80
[   26.973162]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.973751]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.974383]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.975355]  kthread+0x257/0x310
[   26.975826]  ? __pfx_kthread+0x10/0x10
[   26.976301]  ret_from_fork+0x41/0x80
[   26.976822]  ? __pfx_kthread+0x10/0x10
[   26.977273]  ret_from_fork_asm+0x1a/0x30
[   26.977838]  </TASK>
[   26.978107] 
[   26.978271] Allocated by task 263:
[   26.978777]  kasan_save_stack+0x3d/0x60
[   26.979279]  kasan_save_track+0x18/0x40
[   26.979999]  kasan_save_alloc_info+0x3b/0x50
[   26.980462]  __kasan_kmalloc+0xb7/0xc0
[   26.980725]  __kmalloc_cache_noprof+0x184/0x410
[   26.981521]  kasan_memchr+0xad/0x320
[   26.982046]  kunit_try_run_case+0x1b3/0x490
[   26.982638]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.983044]  kthread+0x257/0x310
[   26.983451]  ret_from_fork+0x41/0x80
[   26.984010]  ret_from_fork_asm+0x1a/0x30
[   26.984392] 
[   26.984936] The buggy address belongs to the object at ffff888101aa33c0
[   26.984936]  which belongs to the cache kmalloc-32 of size 32
[   26.986093] The buggy address is located 0 bytes to the right of
[   26.986093]  allocated 24-byte region [ffff888101aa33c0, ffff888101aa33d8)
[   26.987200] 
[   26.987454] The buggy address belongs to the physical page:
[   26.987927] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aa3
[   26.988808] flags: 0x200000000000000(node=0|zone=2)
[   26.989253] page_type: f5(slab)
[   26.990082] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   26.990660] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   26.991265] page dumped because: kasan: bad access detected
[   26.991650] 
[   26.992066] Memory state around the buggy address:
[   26.992637]  ffff888101aa3280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   26.993295]  ffff888101aa3300: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   26.994045] >ffff888101aa3380: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   26.994745]                                                     ^
[   26.995319]  ffff888101aa3400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.996356]  ffff888101aa3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.997016] ==================================================================

test log snippet boot parser 52

Home

[   27.004145] ==================================================================
[   27.004943] BUG: KASAN: slab-out-of-bounds in memcmp+0x1b4/0x1d0
[   27.005794] Read of size 1 at addr ffff888102a38d18 by task kunit_try_catch/265
[   27.006302] 
[   27.006538] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.007619] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.007916] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.009325] Call Trace:
[   27.009759]  <TASK>
[   27.010004]  dump_stack_lvl+0x73/0xb0
[   27.010634]  print_report+0xd1/0x640
[   27.011029]  ? __virt_addr_valid+0x1db/0x2d0
[   27.011503]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.011944]  kasan_report+0x102/0x140
[   27.012769]  ? memcmp+0x1b4/0x1d0
[   27.013213]  ? memcmp+0x1b4/0x1d0
[   27.013682]  __asan_report_load1_noabort+0x18/0x20
[   27.014223]  memcmp+0x1b4/0x1d0
[   27.014775]  kasan_memcmp+0x190/0x390
[   27.015226]  ? trace_hardirqs_on+0x37/0xe0
[   27.015744]  ? __pfx_kasan_memcmp+0x10/0x10
[   27.016195]  ? finish_task_switch.isra.0+0x153/0x700
[   27.016913]  ? __switch_to+0x5d9/0xf60
[   27.017234]  ? __pfx_read_tsc+0x10/0x10
[   27.017841]  ? ktime_get_ts64+0x84/0x230
[   27.018355]  kunit_try_run_case+0x1b3/0x490
[   27.019002]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.019436]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.020141]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.020728]  ? __kthread_parkme+0x82/0x160
[   27.021293]  ? preempt_count_sub+0x50/0x80
[   27.021902]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.022434]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.023222]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.024020]  kthread+0x257/0x310
[   27.024291]  ? __pfx_kthread+0x10/0x10
[   27.024740]  ret_from_fork+0x41/0x80
[   27.025169]  ? __pfx_kthread+0x10/0x10
[   27.026152]  ret_from_fork_asm+0x1a/0x30
[   27.026749]  </TASK>
[   27.027212] 
[   27.027454] Allocated by task 265:
[   27.027946]  kasan_save_stack+0x3d/0x60
[   27.028307]  kasan_save_track+0x18/0x40
[   27.028885]  kasan_save_alloc_info+0x3b/0x50
[   27.029416]  __kasan_kmalloc+0xb7/0xc0
[   27.029964]  __kmalloc_cache_noprof+0x184/0x410
[   27.030231]  kasan_memcmp+0xb8/0x390
[   27.030698]  kunit_try_run_case+0x1b3/0x490
[   27.031574]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.032159]  kthread+0x257/0x310
[   27.032750]  ret_from_fork+0x41/0x80
[   27.033093]  ret_from_fork_asm+0x1a/0x30
[   27.033542] 
[   27.033802] The buggy address belongs to the object at ffff888102a38d00
[   27.033802]  which belongs to the cache kmalloc-32 of size 32
[   27.034910] The buggy address is located 0 bytes to the right of
[   27.034910]  allocated 24-byte region [ffff888102a38d00, ffff888102a38d18)
[   27.036818] 
[   27.037234] The buggy address belongs to the physical page:
[   27.038008] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a38
[   27.038852] flags: 0x200000000000000(node=0|zone=2)
[   27.039476] page_type: f5(slab)
[   27.040079] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   27.041080] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   27.041772] page dumped because: kasan: bad access detected
[   27.042209] 
[   27.042382] Memory state around the buggy address:
[   27.042795]  ffff888102a38c00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   27.043660]  ffff888102a38c80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   27.044588] >ffff888102a38d00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.045266]                             ^
[   27.045469]  ffff888102a38d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.045986]  ffff888102a38e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.046774] ==================================================================

test log snippet boot parser 53

Home

[   26.256297] ==================================================================
[   26.257361] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   26.258967] Read of size 1 at addr ffff888101aa02bb by task kunit_try_catch/233
[   26.259763] 
[   26.259954] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   26.260379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.260875] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.262418] Call Trace:
[   26.262905]  <TASK>
[   26.263091]  dump_stack_lvl+0x73/0xb0
[   26.263607]  print_report+0xd1/0x640
[   26.264196]  ? __virt_addr_valid+0x1db/0x2d0
[   26.265034]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.265436]  kasan_report+0x102/0x140
[   26.266085]  ? mempool_oob_right_helper+0x31a/0x380
[   26.266500]  ? mempool_oob_right_helper+0x31a/0x380
[   26.267221]  __asan_report_load1_noabort+0x18/0x20
[   26.267612]  mempool_oob_right_helper+0x31a/0x380
[   26.268221]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   26.268606]  ? finish_task_switch.isra.0+0x153/0x700
[   26.269166]  mempool_slab_oob_right+0xb1/0x100
[   26.269568]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   26.270190]  ? __switch_to+0x5d9/0xf60
[   26.270678]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   26.271188]  ? __pfx_mempool_free_slab+0x10/0x10
[   26.272131]  ? __pfx_read_tsc+0x10/0x10
[   26.272431]  ? ktime_get_ts64+0x84/0x230
[   26.272734]  kunit_try_run_case+0x1b3/0x490
[   26.273235]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.274270]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.274762]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.275198]  ? __kthread_parkme+0x82/0x160
[   26.275796]  ? preempt_count_sub+0x50/0x80
[   26.276157]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.276785]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.277702]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.278599]  kthread+0x257/0x310
[   26.279217]  ? __pfx_kthread+0x10/0x10
[   26.279783]  ret_from_fork+0x41/0x80
[   26.280309]  ? __pfx_kthread+0x10/0x10
[   26.280674]  ret_from_fork_asm+0x1a/0x30
[   26.281662]  </TASK>
[   26.281903] 
[   26.282061] Allocated by task 233:
[   26.282410]  kasan_save_stack+0x3d/0x60
[   26.282840]  kasan_save_track+0x18/0x40
[   26.283612]  kasan_save_alloc_info+0x3b/0x50
[   26.284132]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   26.284969]  remove_element+0x11e/0x190
[   26.285378]  mempool_alloc_preallocated+0x4d/0x90
[   26.286331]  mempool_oob_right_helper+0x8b/0x380
[   26.287058]  mempool_slab_oob_right+0xb1/0x100
[   26.287413]  kunit_try_run_case+0x1b3/0x490
[   26.287963]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.288563]  kthread+0x257/0x310
[   26.289197]  ret_from_fork+0x41/0x80
[   26.289513]  ret_from_fork_asm+0x1a/0x30
[   26.289839] 
[   26.290055] The buggy address belongs to the object at ffff888101aa0240
[   26.290055]  which belongs to the cache test_cache of size 123
[   26.290879] The buggy address is located 0 bytes to the right of
[   26.290879]  allocated 123-byte region [ffff888101aa0240, ffff888101aa02bb)
[   26.292045] 
[   26.292274] The buggy address belongs to the physical page:
[   26.292940] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aa0
[   26.293773] flags: 0x200000000000000(node=0|zone=2)
[   26.294277] page_type: f5(slab)
[   26.294792] raw: 0200000000000000 ffff888101a95500 dead000000000122 0000000000000000
[   26.295347] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   26.296107] page dumped because: kasan: bad access detected
[   26.296965] 
[   26.297197] Memory state around the buggy address:
[   26.297811]  ffff888101aa0180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.298338]  ffff888101aa0200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   26.299051] >ffff888101aa0280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   26.299509]                                         ^
[   26.299877]  ffff888101aa0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.301022]  ffff888101aa0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.301679] ==================================================================

test log snippet boot parser 54

Home

[   26.210169] ==================================================================
[   26.211023] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   26.211518] Read of size 1 at addr ffff888102caa001 by task kunit_try_catch/231
[   26.212074] 
[   26.212505] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   26.213512] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.214158] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.215031] Call Trace:
[   26.215269]  <TASK>
[   26.215489]  dump_stack_lvl+0x73/0xb0
[   26.216103]  print_report+0xd1/0x640
[   26.216502]  ? __virt_addr_valid+0x1db/0x2d0
[   26.217070]  ? kasan_addr_to_slab+0x11/0xa0
[   26.217414]  kasan_report+0x102/0x140
[   26.218013]  ? mempool_oob_right_helper+0x31a/0x380
[   26.218437]  ? mempool_oob_right_helper+0x31a/0x380
[   26.219120]  __asan_report_load1_noabort+0x18/0x20
[   26.219749]  mempool_oob_right_helper+0x31a/0x380
[   26.220273]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   26.221792]  ? finish_task_switch.isra.0+0x153/0x700
[   26.222253]  mempool_kmalloc_large_oob_right+0xb6/0x100
[   26.222921]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   26.223412]  ? __switch_to+0x5d9/0xf60
[   26.224004]  ? __pfx_mempool_kmalloc+0x10/0x10
[   26.224460]  ? __pfx_mempool_kfree+0x10/0x10
[   26.224926]  ? __pfx_read_tsc+0x10/0x10
[   26.225369]  ? ktime_get_ts64+0x84/0x230
[   26.225922]  kunit_try_run_case+0x1b3/0x490
[   26.226384]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.226962]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.227360]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.228022]  ? __kthread_parkme+0x82/0x160
[   26.228376]  ? preempt_count_sub+0x50/0x80
[   26.228976]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.229470]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.230204]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.230763]  kthread+0x257/0x310
[   26.231027]  ? __pfx_kthread+0x10/0x10
[   26.231703]  ret_from_fork+0x41/0x80
[   26.232150]  ? __pfx_kthread+0x10/0x10
[   26.232513]  ret_from_fork_asm+0x1a/0x30
[   26.233129]  </TASK>
[   26.233409] 
[   26.233826] The buggy address belongs to the physical page:
[   26.234192] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ca8
[   26.235054] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.235689] flags: 0x200000000000040(head|node=0|zone=2)
[   26.236275] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   26.237506] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.238478] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   26.239033] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.239655] head: 0200000000000002 ffffea00040b2a01 ffffffffffffffff 0000000000000000
[   26.240120] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   26.241420] page dumped because: kasan: bad access detected
[   26.242289] 
[   26.242499] Memory state around the buggy address:
[   26.243073]  ffff888102ca9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.243489]  ffff888102ca9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.244261] >ffff888102caa000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.244980]                    ^
[   26.245340]  ffff888102caa080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.246159]  ffff888102caa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.246879] ==================================================================

test log snippet boot parser 55

Home

[   25.547769] ==================================================================
[   25.548405] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1bd/0x380
[   25.549410] Read of size 1 at addr ffff888101a95280 by task kunit_try_catch/223
[   25.550182] 
[   25.550436] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   25.551464] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.551703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.552139] Call Trace:
[   25.552344]  <TASK>
[   25.552527]  dump_stack_lvl+0x73/0xb0
[   25.552796]  print_report+0xd1/0x640
[   25.554219]  ? __virt_addr_valid+0x1db/0x2d0
[   25.554779]  ? kasan_complete_mode_report_info+0x64/0x200
[   25.555696]  kasan_report+0x102/0x140
[   25.556441]  ? kmem_cache_double_destroy+0x1bd/0x380
[   25.557329]  ? kmem_cache_double_destroy+0x1bd/0x380
[   25.557853]  ? kmem_cache_double_destroy+0x1bd/0x380
[   25.558671]  __kasan_check_byte+0x3d/0x50
[   25.559239]  kmem_cache_destroy+0x25/0x1d0
[   25.559553]  kmem_cache_double_destroy+0x1bd/0x380
[   25.560044]  ? __pfx_kmem_cache_double_destroy+0x10/0x10
[   25.560600]  ? finish_task_switch.isra.0+0x153/0x700
[   25.561005]  ? __switch_to+0x5d9/0xf60
[   25.561367]  ? __pfx_empty_cache_ctor+0x10/0x10
[   25.561922]  ? __pfx_read_tsc+0x10/0x10
[   25.562401]  ? ktime_get_ts64+0x84/0x230
[   25.563120]  kunit_try_run_case+0x1b3/0x490
[   25.563448]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.563978]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.564323]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.565281]  ? __kthread_parkme+0x82/0x160
[   25.565755]  ? preempt_count_sub+0x50/0x80
[   25.566375]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.567060]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.567796]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.568354]  kthread+0x257/0x310
[   25.569332]  ? __pfx_kthread+0x10/0x10
[   25.569773]  ret_from_fork+0x41/0x80
[   25.570307]  ? __pfx_kthread+0x10/0x10
[   25.570827]  ret_from_fork_asm+0x1a/0x30
[   25.571215]  </TASK>
[   25.571507] 
[   25.571891] Allocated by task 223:
[   25.572183]  kasan_save_stack+0x3d/0x60
[   25.573134]  kasan_save_track+0x18/0x40
[   25.573723]  kasan_save_alloc_info+0x3b/0x50
[   25.574133]  __kasan_slab_alloc+0x91/0xa0
[   25.574702]  kmem_cache_alloc_noprof+0x11e/0x3e0
[   25.575218]  __kmem_cache_create_args+0x177/0x250
[   25.575599]  kmem_cache_double_destroy+0xd3/0x380
[   25.576234]  kunit_try_run_case+0x1b3/0x490
[   25.577110]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.577420]  kthread+0x257/0x310
[   25.577841]  ret_from_fork+0x41/0x80
[   25.578219]  ret_from_fork_asm+0x1a/0x30
[   25.578618] 
[   25.578776] Freed by task 223:
[   25.579165]  kasan_save_stack+0x3d/0x60
[   25.579709]  kasan_save_track+0x18/0x40
[   25.580068]  kasan_save_free_info+0x3f/0x60
[   25.580446]  __kasan_slab_free+0x56/0x70
[   25.580980]  kmem_cache_free+0x120/0x420
[   25.581323]  slab_kmem_cache_release+0x2e/0x40
[   25.581609]  kmem_cache_release+0x16/0x20
[   25.582102]  kobject_put+0x181/0x450
[   25.582714]  sysfs_slab_release+0x16/0x20
[   25.583140]  kmem_cache_destroy+0xf0/0x1d0
[   25.583594]  kmem_cache_double_destroy+0x14c/0x380
[   25.583938]  kunit_try_run_case+0x1b3/0x490
[   25.584291]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.585202]  kthread+0x257/0x310
[   25.585651]  ret_from_fork+0x41/0x80
[   25.586032]  ret_from_fork_asm+0x1a/0x30
[   25.586355] 
[   25.586566] The buggy address belongs to the object at ffff888101a95280
[   25.586566]  which belongs to the cache kmem_cache of size 208
[   25.588559] The buggy address is located 0 bytes inside of
[   25.588559]  freed 208-byte region [ffff888101a95280, ffff888101a95350)
[   25.589481] 
[   25.589701] The buggy address belongs to the physical page:
[   25.590157] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a95
[   25.590942] flags: 0x200000000000000(node=0|zone=2)
[   25.591378] page_type: f5(slab)
[   25.592400] raw: 0200000000000000 ffff888100041000 dead000000000122 0000000000000000
[   25.592862] raw: 0000000000000000 00000000800c000c 00000001f5000000 0000000000000000
[   25.593444] page dumped because: kasan: bad access detected
[   25.593749] 
[   25.593957] Memory state around the buggy address:
[   25.594397]  ffff888101a95180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.594860]  ffff888101a95200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.595331] >ffff888101a95280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.595807]                    ^
[   25.596134]  ffff888101a95300: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   25.597200]  ffff888101a95380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.597843] ==================================================================

test log snippet boot parser 56

Home

[   24.075518] ==================================================================
[   24.076145] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53e/0x5e0
[   24.077193] Read of size 1 at addr ffff888100a28a00 by task kunit_try_catch/172
[   24.077621] 
[   24.078049] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   24.078936] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.079252] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.080530] Call Trace:
[   24.080834]  <TASK>
[   24.081094]  dump_stack_lvl+0x73/0xb0
[   24.081520]  print_report+0xd1/0x640
[   24.081890]  ? __virt_addr_valid+0x1db/0x2d0
[   24.082957]  ? kasan_complete_mode_report_info+0x64/0x200
[   24.083831]  kasan_report+0x102/0x140
[   24.084272]  ? krealloc_uaf+0x53e/0x5e0
[   24.084691]  ? krealloc_uaf+0x53e/0x5e0
[   24.085338]  __asan_report_load1_noabort+0x18/0x20
[   24.086048]  krealloc_uaf+0x53e/0x5e0
[   24.086598]  ? __pfx_krealloc_uaf+0x10/0x10
[   24.087496]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   24.088360]  ? __pfx_krealloc_uaf+0x10/0x10
[   24.088964]  kunit_try_run_case+0x1b3/0x490
[   24.089377]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.089726]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.090312]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.090675]  ? __kthread_parkme+0x82/0x160
[   24.091122]  ? preempt_count_sub+0x50/0x80
[   24.091615]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.092064]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.093357]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.093752]  kthread+0x257/0x310
[   24.094188]  ? __pfx_kthread+0x10/0x10
[   24.094467]  ret_from_fork+0x41/0x80
[   24.094916]  ? __pfx_kthread+0x10/0x10
[   24.095176]  ret_from_fork_asm+0x1a/0x30
[   24.095773]  </TASK>
[   24.096111] 
[   24.096327] Allocated by task 172:
[   24.096670]  kasan_save_stack+0x3d/0x60
[   24.096937]  kasan_save_track+0x18/0x40
[   24.097197]  kasan_save_alloc_info+0x3b/0x50
[   24.097719]  __kasan_kmalloc+0xb7/0xc0
[   24.098139]  __kmalloc_cache_noprof+0x184/0x410
[   24.099157]  krealloc_uaf+0xbc/0x5e0
[   24.099633]  kunit_try_run_case+0x1b3/0x490
[   24.100257]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.100996]  kthread+0x257/0x310
[   24.101388]  ret_from_fork+0x41/0x80
[   24.101982]  ret_from_fork_asm+0x1a/0x30
[   24.102435] 
[   24.102798] Freed by task 172:
[   24.103089]  kasan_save_stack+0x3d/0x60
[   24.103368]  kasan_save_track+0x18/0x40
[   24.104185]  kasan_save_free_info+0x3f/0x60
[   24.104586]  __kasan_slab_free+0x56/0x70
[   24.105182]  kfree+0x123/0x3f0
[   24.105718]  krealloc_uaf+0x13e/0x5e0
[   24.106180]  kunit_try_run_case+0x1b3/0x490
[   24.106482]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.107200]  kthread+0x257/0x310
[   24.107713]  ret_from_fork+0x41/0x80
[   24.108146]  ret_from_fork_asm+0x1a/0x30
[   24.108664] 
[   24.109072] The buggy address belongs to the object at ffff888100a28a00
[   24.109072]  which belongs to the cache kmalloc-256 of size 256
[   24.109849] The buggy address is located 0 bytes inside of
[   24.109849]  freed 256-byte region [ffff888100a28a00, ffff888100a28b00)
[   24.111054] 
[   24.111293] The buggy address belongs to the physical page:
[   24.111996] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a28
[   24.112441] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.113064] flags: 0x200000000000040(head|node=0|zone=2)
[   24.113957] page_type: f5(slab)
[   24.114311] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   24.114999] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   24.115705] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   24.116220] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   24.117008] head: 0200000000000001 ffffea0004028a01 ffffffffffffffff 0000000000000000
[   24.117599] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   24.118373] page dumped because: kasan: bad access detected
[   24.119192] 
[   24.119407] Memory state around the buggy address:
[   24.119672]  ffff888100a28900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.120213]  ffff888100a28980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.120754] >ffff888100a28a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.121225]                    ^
[   24.121920]  ffff888100a28a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.122503]  ffff888100a28b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.123230] ==================================================================

test log snippet boot parser 57

Home

[   24.023023] ==================================================================
[   24.024330] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b9/0x5e0
[   24.024903] Read of size 1 at addr ffff888100a28a00 by task kunit_try_catch/172
[   24.026064] 
[   24.026324] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   24.027325] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.027571] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.028503] Call Trace:
[   24.028696]  <TASK>
[   24.029034]  dump_stack_lvl+0x73/0xb0
[   24.029473]  print_report+0xd1/0x640
[   24.029807]  ? __virt_addr_valid+0x1db/0x2d0
[   24.030918]  ? kasan_complete_mode_report_info+0x64/0x200
[   24.031336]  kasan_report+0x102/0x140
[   24.032015]  ? krealloc_uaf+0x1b9/0x5e0
[   24.032500]  ? krealloc_uaf+0x1b9/0x5e0
[   24.033138]  ? krealloc_uaf+0x1b9/0x5e0
[   24.033571]  __kasan_check_byte+0x3d/0x50
[   24.034127]  krealloc_noprof+0x3f/0x340
[   24.034681]  krealloc_uaf+0x1b9/0x5e0
[   24.035536]  ? __pfx_krealloc_uaf+0x10/0x10
[   24.036140]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   24.036586]  ? __pfx_krealloc_uaf+0x10/0x10
[   24.037051]  kunit_try_run_case+0x1b3/0x490
[   24.037655]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.038304]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.038798]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.039265]  ? __kthread_parkme+0x82/0x160
[   24.040027]  ? preempt_count_sub+0x50/0x80
[   24.040348]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.040860]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.041369]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.041875]  kthread+0x257/0x310
[   24.042252]  ? __pfx_kthread+0x10/0x10
[   24.042656]  ret_from_fork+0x41/0x80
[   24.043312]  ? __pfx_kthread+0x10/0x10
[   24.044285]  ret_from_fork_asm+0x1a/0x30
[   24.045143]  </TASK>
[   24.045517] 
[   24.045851] Allocated by task 172:
[   24.046274]  kasan_save_stack+0x3d/0x60
[   24.047075]  kasan_save_track+0x18/0x40
[   24.047436]  kasan_save_alloc_info+0x3b/0x50
[   24.048026]  __kasan_kmalloc+0xb7/0xc0
[   24.048500]  __kmalloc_cache_noprof+0x184/0x410
[   24.049002]  krealloc_uaf+0xbc/0x5e0
[   24.049286]  kunit_try_run_case+0x1b3/0x490
[   24.050034]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.050501]  kthread+0x257/0x310
[   24.051010]  ret_from_fork+0x41/0x80
[   24.051424]  ret_from_fork_asm+0x1a/0x30
[   24.051970] 
[   24.052157] Freed by task 172:
[   24.053397]  kasan_save_stack+0x3d/0x60
[   24.053633]  kasan_save_track+0x18/0x40
[   24.054070]  kasan_save_free_info+0x3f/0x60
[   24.054461]  __kasan_slab_free+0x56/0x70
[   24.054816]  kfree+0x123/0x3f0
[   24.055836]  krealloc_uaf+0x13e/0x5e0
[   24.056224]  kunit_try_run_case+0x1b3/0x490
[   24.056593]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.057262]  kthread+0x257/0x310
[   24.057508]  ret_from_fork+0x41/0x80
[   24.057933]  ret_from_fork_asm+0x1a/0x30
[   24.058900] 
[   24.059146] The buggy address belongs to the object at ffff888100a28a00
[   24.059146]  which belongs to the cache kmalloc-256 of size 256
[   24.060661] The buggy address is located 0 bytes inside of
[   24.060661]  freed 256-byte region [ffff888100a28a00, ffff888100a28b00)
[   24.061469] 
[   24.061680] The buggy address belongs to the physical page:
[   24.062072] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a28
[   24.062808] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.063398] flags: 0x200000000000040(head|node=0|zone=2)
[   24.064095] page_type: f5(slab)
[   24.064401] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   24.065343] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   24.065983] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   24.067082] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   24.067513] head: 0200000000000001 ffffea0004028a01 ffffffffffffffff 0000000000000000
[   24.067897] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   24.068472] page dumped because: kasan: bad access detected
[   24.069223] 
[   24.069464] Memory state around the buggy address:
[   24.069991]  ffff888100a28900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.070650]  ffff888100a28980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.071552] >ffff888100a28a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.072362]                    ^
[   24.072583]  ffff888100a28a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.073084]  ffff888100a28b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.073855] ==================================================================

test log snippet boot parser 58

Home

[   26.421779] ==================================================================
[   26.422638] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x394/0x400
[   26.423328] Read of size 1 at addr ffff888102a3a240 by task kunit_try_catch/239
[   26.423870] 
[   26.424052] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   26.425800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.426351] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.427134] Call Trace:
[   26.427444]  <TASK>
[   26.427722]  dump_stack_lvl+0x73/0xb0
[   26.428073]  print_report+0xd1/0x640
[   26.428459]  ? __virt_addr_valid+0x1db/0x2d0
[   26.428845]  ? kasan_complete_mode_report_info+0x64/0x200
[   26.429559]  kasan_report+0x102/0x140
[   26.430135]  ? mempool_uaf_helper+0x394/0x400
[   26.430568]  ? mempool_uaf_helper+0x394/0x400
[   26.431057]  __asan_report_load1_noabort+0x18/0x20
[   26.431453]  mempool_uaf_helper+0x394/0x400
[   26.431858]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   26.432569]  mempool_slab_uaf+0xae/0x100
[   26.433027]  ? __pfx_mempool_slab_uaf+0x10/0x10
[   26.433352]  ? __switch_to+0x5d9/0xf60
[   26.433768]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   26.434367]  ? __pfx_mempool_free_slab+0x10/0x10
[   26.435115]  ? __pfx_read_tsc+0x10/0x10
[   26.435582]  ? ktime_get_ts64+0x84/0x230
[   26.436413]  kunit_try_run_case+0x1b3/0x490
[   26.437015]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.437516]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.438121]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.438880]  ? __kthread_parkme+0x82/0x160
[   26.439359]  ? preempt_count_sub+0x50/0x80
[   26.440116]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.440585]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.441416]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.442064]  kthread+0x257/0x310
[   26.442613]  ? __pfx_kthread+0x10/0x10
[   26.443186]  ret_from_fork+0x41/0x80
[   26.443527]  ? __pfx_kthread+0x10/0x10
[   26.444086]  ret_from_fork_asm+0x1a/0x30
[   26.444425]  </TASK>
[   26.444683] 
[   26.444879] Allocated by task 239:
[   26.445736]  kasan_save_stack+0x3d/0x60
[   26.446110]  kasan_save_track+0x18/0x40
[   26.446400]  kasan_save_alloc_info+0x3b/0x50
[   26.446980]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   26.448009]  remove_element+0x11e/0x190
[   26.448443]  mempool_alloc_preallocated+0x4d/0x90
[   26.449016]  mempool_uaf_helper+0x97/0x400
[   26.449586]  mempool_slab_uaf+0xae/0x100
[   26.449862]  kunit_try_run_case+0x1b3/0x490
[   26.450302]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.450830]  kthread+0x257/0x310
[   26.451185]  ret_from_fork+0x41/0x80
[   26.451781]  ret_from_fork_asm+0x1a/0x30
[   26.452055] 
[   26.452266] Freed by task 239:
[   26.452633]  kasan_save_stack+0x3d/0x60
[   26.453067]  kasan_save_track+0x18/0x40
[   26.453726]  kasan_save_free_info+0x3f/0x60
[   26.454388]  __kasan_mempool_poison_object+0x131/0x1d0
[   26.454959]  mempool_free+0x2ec/0x380
[   26.455448]  mempool_uaf_helper+0x11b/0x400
[   26.456268]  mempool_slab_uaf+0xae/0x100
[   26.456970]  kunit_try_run_case+0x1b3/0x490
[   26.457278]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.458090]  kthread+0x257/0x310
[   26.458393]  ret_from_fork+0x41/0x80
[   26.458646]  ret_from_fork_asm+0x1a/0x30
[   26.459064] 
[   26.459214] The buggy address belongs to the object at ffff888102a3a240
[   26.459214]  which belongs to the cache test_cache of size 123
[   26.460643] The buggy address is located 0 bytes inside of
[   26.460643]  freed 123-byte region [ffff888102a3a240, ffff888102a3a2bb)
[   26.461383] 
[   26.461516] The buggy address belongs to the physical page:
[   26.462072] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a3a
[   26.463006] flags: 0x200000000000000(node=0|zone=2)
[   26.463584] page_type: f5(slab)
[   26.464576] raw: 0200000000000000 ffff888101d51780 dead000000000122 0000000000000000
[   26.465339] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   26.465839] page dumped because: kasan: bad access detected
[   26.466176] 
[   26.466336] Memory state around the buggy address:
[   26.466602]  ffff888102a3a100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.467337]  ffff888102a3a180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.468343] >ffff888102a3a200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   26.469331]                                            ^
[   26.469976]  ffff888102a3a280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.470572]  ffff888102a3a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.471113] ==================================================================

test log snippet boot parser 59

Home

[   26.313057] ==================================================================
[   26.313781] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x394/0x400
[   26.314395] Read of size 1 at addr ffff888102a33d00 by task kunit_try_catch/235
[   26.315018] 
[   26.315195] CPU: 1 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   26.317210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.317463] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.318389] Call Trace:
[   26.318941]  <TASK>
[   26.319256]  dump_stack_lvl+0x73/0xb0
[   26.319991]  print_report+0xd1/0x640
[   26.320658]  ? __virt_addr_valid+0x1db/0x2d0
[   26.321228]  ? kasan_complete_mode_report_info+0x64/0x200
[   26.321934]  kasan_report+0x102/0x140
[   26.322424]  ? mempool_uaf_helper+0x394/0x400
[   26.322789]  ? mempool_uaf_helper+0x394/0x400
[   26.323286]  __asan_report_load1_noabort+0x18/0x20
[   26.323766]  mempool_uaf_helper+0x394/0x400
[   26.324095]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   26.325182]  ? ret_from_fork+0x41/0x80
[   26.325817]  ? kthread+0x257/0x310
[   26.326235]  ? ret_from_fork_asm+0x1a/0x30
[   26.326770]  ? ret_from_fork_asm+0x1a/0x30
[   26.327212]  mempool_kmalloc_uaf+0xb3/0x100
[   26.327890]  ? __pfx_mempool_kmalloc_uaf+0x10/0x10
[   26.328357]  ? __switch_to+0x5d9/0xf60
[   26.329195]  ? __pfx_mempool_kmalloc+0x10/0x10
[   26.329663]  ? __pfx_mempool_kfree+0x10/0x10
[   26.330115]  ? __pfx_read_tsc+0x10/0x10
[   26.330912]  ? ktime_get_ts64+0x84/0x230
[   26.331278]  kunit_try_run_case+0x1b3/0x490
[   26.331900]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.332379]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.333288]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.333951]  ? __kthread_parkme+0x82/0x160
[   26.334387]  ? preempt_count_sub+0x50/0x80
[   26.335046]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.335667]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.336256]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.337222]  kthread+0x257/0x310
[   26.337715]  ? __pfx_kthread+0x10/0x10
[   26.338173]  ret_from_fork+0x41/0x80
[   26.338685]  ? __pfx_kthread+0x10/0x10
[   26.339130]  ret_from_fork_asm+0x1a/0x30
[   26.339729]  </TASK>
[   26.340023] 
[   26.340304] Allocated by task 235:
[   26.340868]  kasan_save_stack+0x3d/0x60
[   26.341709]  kasan_save_track+0x18/0x40
[   26.342103]  kasan_save_alloc_info+0x3b/0x50
[   26.342714]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   26.343296]  remove_element+0x11e/0x190
[   26.343902]  mempool_alloc_preallocated+0x4d/0x90
[   26.344315]  mempool_uaf_helper+0x97/0x400
[   26.345203]  mempool_kmalloc_uaf+0xb3/0x100
[   26.345824]  kunit_try_run_case+0x1b3/0x490
[   26.346329]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.346890]  kthread+0x257/0x310
[   26.347261]  ret_from_fork+0x41/0x80
[   26.347924]  ret_from_fork_asm+0x1a/0x30
[   26.348335] 
[   26.348918] Freed by task 235:
[   26.349313]  kasan_save_stack+0x3d/0x60
[   26.349802]  kasan_save_track+0x18/0x40
[   26.350296]  kasan_save_free_info+0x3f/0x60
[   26.350903]  __kasan_mempool_poison_object+0x131/0x1d0
[   26.351368]  mempool_free+0x2ec/0x380
[   26.351934]  mempool_uaf_helper+0x11b/0x400
[   26.352387]  mempool_kmalloc_uaf+0xb3/0x100
[   26.353190]  kunit_try_run_case+0x1b3/0x490
[   26.353627]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.354138]  kthread+0x257/0x310
[   26.354433]  ret_from_fork+0x41/0x80
[   26.354833]  ret_from_fork_asm+0x1a/0x30
[   26.355207] 
[   26.355845] The buggy address belongs to the object at ffff888102a33d00
[   26.355845]  which belongs to the cache kmalloc-128 of size 128
[   26.357288] The buggy address is located 0 bytes inside of
[   26.357288]  freed 128-byte region [ffff888102a33d00, ffff888102a33d80)
[   26.358316] 
[   26.358715] The buggy address belongs to the physical page:
[   26.359276] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a33
[   26.360050] flags: 0x200000000000000(node=0|zone=2)
[   26.360476] page_type: f5(slab)
[   26.361212] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.362042] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   26.362833] page dumped because: kasan: bad access detected
[   26.363215] 
[   26.363478] Memory state around the buggy address:
[   26.364094]  ffff888102a33c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.365075]  ffff888102a33c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.365858] >ffff888102a33d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.366477]                    ^
[   26.366765]  ffff888102a33d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.367670]  ffff888102a33e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.368125] ==================================================================

test log snippet boot parser 60

Home

[   25.185633] ==================================================================
[   25.186737] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x4d8/0x560
[   25.187959] Read of size 8 at addr ffff888101a930c0 by task kunit_try_catch/208
[   25.189309] 
[   25.189584] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   25.190084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.190483] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.192051] Call Trace:
[   25.192276]  <TASK>
[   25.192450]  dump_stack_lvl+0x73/0xb0
[   25.193456]  print_report+0xd1/0x640
[   25.194068]  ? __virt_addr_valid+0x1db/0x2d0
[   25.194345]  ? kasan_complete_mode_report_info+0x64/0x200
[   25.194921]  kasan_report+0x102/0x140
[   25.195814]  ? workqueue_uaf+0x4d8/0x560
[   25.196141]  ? workqueue_uaf+0x4d8/0x560
[   25.196872]  __asan_report_load8_noabort+0x18/0x20
[   25.197659]  workqueue_uaf+0x4d8/0x560
[   25.198193]  ? __pfx_workqueue_uaf+0x10/0x10
[   25.198729]  ? __schedule+0xc3e/0x2790
[   25.199314]  ? __pfx_read_tsc+0x10/0x10
[   25.199852]  ? ktime_get_ts64+0x84/0x230
[   25.200410]  kunit_try_run_case+0x1b3/0x490
[   25.201137]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.201557]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.202335]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.202800]  ? __kthread_parkme+0x82/0x160
[   25.203481]  ? preempt_count_sub+0x50/0x80
[   25.204102]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.204408]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.205164]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.206221]  kthread+0x257/0x310
[   25.207235]  ? __pfx_kthread+0x10/0x10
[   25.207521]  ret_from_fork+0x41/0x80
[   25.207852]  ? __pfx_kthread+0x10/0x10
[   25.208395]  ret_from_fork_asm+0x1a/0x30
[   25.208754]  </TASK>
[   25.209074] 
[   25.209290] Allocated by task 208:
[   25.209690]  kasan_save_stack+0x3d/0x60
[   25.210282]  kasan_save_track+0x18/0x40
[   25.210540]  kasan_save_alloc_info+0x3b/0x50
[   25.211103]  __kasan_kmalloc+0xb7/0xc0
[   25.211541]  __kmalloc_cache_noprof+0x184/0x410
[   25.212129]  workqueue_uaf+0x153/0x560
[   25.212617]  kunit_try_run_case+0x1b3/0x490
[   25.213158]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.213601]  kthread+0x257/0x310
[   25.215309]  ret_from_fork+0x41/0x80
[   25.215827]  ret_from_fork_asm+0x1a/0x30
[   25.216154] 
[   25.216521] Freed by task 8:
[   25.216843]  kasan_save_stack+0x3d/0x60
[   25.217461]  kasan_save_track+0x18/0x40
[   25.218124]  kasan_save_free_info+0x3f/0x60
[   25.218528]  __kasan_slab_free+0x56/0x70
[   25.219062]  kfree+0x123/0x3f0
[   25.219309]  workqueue_uaf_work+0x12/0x20
[   25.219574]  process_one_work+0x5ee/0xf60
[   25.219889]  worker_thread+0x720/0x1300
[   25.220500]  kthread+0x257/0x310
[   25.220863]  ret_from_fork+0x41/0x80
[   25.221388]  ret_from_fork_asm+0x1a/0x30
[   25.222286] 
[   25.222497] Last potentially related work creation:
[   25.223062]  kasan_save_stack+0x3d/0x60
[   25.223390]  __kasan_record_aux_stack+0xae/0xc0
[   25.223685]  kasan_record_aux_stack_noalloc+0xf/0x20
[   25.224343]  __queue_work+0x67e/0xf70
[   25.224955]  queue_work_on+0x74/0xa0
[   25.225389]  workqueue_uaf+0x26e/0x560
[   25.225843]  kunit_try_run_case+0x1b3/0x490
[   25.226788]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.227211]  kthread+0x257/0x310
[   25.227473]  ret_from_fork+0x41/0x80
[   25.227792]  ret_from_fork_asm+0x1a/0x30
[   25.228935] 
[   25.229151] The buggy address belongs to the object at ffff888101a930c0
[   25.229151]  which belongs to the cache kmalloc-32 of size 32
[   25.230349] The buggy address is located 0 bytes inside of
[   25.230349]  freed 32-byte region [ffff888101a930c0, ffff888101a930e0)
[   25.231058] 
[   25.231427] The buggy address belongs to the physical page:
[   25.231948] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a93
[   25.232634] flags: 0x200000000000000(node=0|zone=2)
[   25.233165] page_type: f5(slab)
[   25.234081] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   25.234586] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   25.235362] page dumped because: kasan: bad access detected
[   25.236108] 
[   25.236275] Memory state around the buggy address:
[   25.236546]  ffff888101a92f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.236899]  ffff888101a93000: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   25.237744] >ffff888101a93080: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc
[   25.238765]                                            ^
[   25.239441]  ffff888101a93100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.240078]  ffff888101a93180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.241133] ==================================================================

test log snippet boot parser 61

Home

[   26.484485] ==================================================================
[   26.485149] BUG: KASAN: use-after-free in mempool_uaf_helper+0x394/0x400
[   26.485989] Read of size 1 at addr ffff888102ca8000 by task kunit_try_catch/241
[   26.486361] 
[   26.486539] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   26.487819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.488148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.488882] Call Trace:
[   26.489181]  <TASK>
[   26.489424]  dump_stack_lvl+0x73/0xb0
[   26.490145]  print_report+0xd1/0x640
[   26.490500]  ? __virt_addr_valid+0x1db/0x2d0
[   26.491066]  ? kasan_addr_to_slab+0x11/0xa0
[   26.491467]  kasan_report+0x102/0x140
[   26.492222]  ? mempool_uaf_helper+0x394/0x400
[   26.492613]  ? mempool_uaf_helper+0x394/0x400
[   26.493042]  __asan_report_load1_noabort+0x18/0x20
[   26.493861]  mempool_uaf_helper+0x394/0x400
[   26.495076]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   26.495851]  mempool_page_alloc_uaf+0xb1/0x100
[   26.496254]  ? __pfx_mempool_page_alloc_uaf+0x10/0x10
[   26.497099]  ? __switch_to+0x5d9/0xf60
[   26.497541]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   26.498172]  ? __pfx_mempool_free_pages+0x10/0x10
[   26.498912]  ? __pfx_read_tsc+0x10/0x10
[   26.499263]  ? ktime_get_ts64+0x84/0x230
[   26.499977]  kunit_try_run_case+0x1b3/0x490
[   26.500499]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.501269]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.501693]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.502646]  ? __kthread_parkme+0x82/0x160
[   26.503287]  ? preempt_count_sub+0x50/0x80
[   26.503747]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.504479]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.505280]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.506048]  kthread+0x257/0x310
[   26.506410]  ? __pfx_kthread+0x10/0x10
[   26.506787]  ret_from_fork+0x41/0x80
[   26.507129]  ? __pfx_kthread+0x10/0x10
[   26.507506]  ret_from_fork_asm+0x1a/0x30
[   26.507880]  </TASK>
[   26.508137] 
[   26.508499] The buggy address belongs to the physical page:
[   26.508937] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ca8
[   26.509358] flags: 0x200000000000000(node=0|zone=2)
[   26.509668] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   26.510412] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.511116] page dumped because: kasan: bad access detected
[   26.511952] 
[   26.512160] Memory state around the buggy address:
[   26.512502]  ffff888102ca7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.513490]  ffff888102ca7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.514346] >ffff888102ca8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.515049]                    ^
[   26.515375]  ffff888102ca8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.516257]  ffff888102ca8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.516851] ==================================================================

test log snippet boot parser 62

Home

------------[ cut here ]------------
[    6.373199] systemd[1]: Starting modprobe@fuse.service - Load Kernel Module fuse...
[    6.375640] WARNING: CPU: 1 PID: 135 at kernel/smp.c:815 smp_call_function_many_cond+0x49c/0x5cc
[    6.392211] Modules linked in:
[    6.392211] CPU: 1 UID: 0 PID: 135 Comm: 9 Not tainted 6.13.0-rc7 #1
[    6.401672] Hardware name: Generic DRA74X (Flattened Device Tree)
[    6.407806] Call trace: 
[    6.407806]  unwind_backtrace from show_stack+0x10/0x14
[    6.422943]  show_stack from dump_stack_lvl+0x54/0x68
[    6.423278] systemd[1]: systemd-hibernate-clear.service - Clear Stale Hibernate Storage Info was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/HibernateLocation-8cf2644b-4b0b-428f-9387-6d876050dc67).
[    6.428039]  dump_stack_lvl from __warn+0x7c/0x128
[    6.450775] systemd[1]: systemd-journald.service: unit configures an IP firewall, but the local system does not support BPF/cgroup firewalling.
[    6.454589]  __warn from warn_slowpath_fmt+0x184/0x18c
[    6.454589]  warn_slowpath_fmt from smp_call_function_many_cond+0x49c/0x5cc
[    6.467590] systemd[1]: systemd-journald.service: (This warning is only shown for the first unit using IP firewalling.)
[    6.472686]  smp_call_function_many_cond from smp_call_function+0x2c/0x34
[    6.472686]  smp_call_function from set_memory_valid+0x7c/0xb8
[    6.481689] systemd[1]: Starting systemd-journald.service - Journal Service...
[    6.490509]  set_memory_valid from kfence_guarded_free+0x168/0x300
[    6.516662]  kfence_guarded_free from rcu_core+0x2b8/0x964
[    6.522216]  rcu_core from handle_softirqs+0x108/0x344
[    6.522247]  handle_softirqs from __irq_exit_rcu+0xa0/0x114
[    6.533020]  __irq_exit_rcu from irq_exit+0x8/0x10
[    6.537841]  irq_exit from call_with_stack+0x18/0x20
[    6.537872]  call_with_stack from __irq_usr+0x80/0xa0
[    6.547912] Exception stack(0xf1eb1fb0 to 0xf1eb1ff8)
[    6.547943] 1fa0:                                     b6597494 00000000 00000f20 00000065
[    6.547943] 1fc0: be90aaa4 00000000 b6594c40 00000009 e75a8874 b64763b0 b6597482 b690aeb8
[    6.569458] 1fe0: 00000441 be90a9b8 b6f44b69 b6f42290 600d0030 ffffffff
[    6.569488] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 63

Home

------------[ cut here ]------------
[    6.373199] systemd[1]: Starting modprobe@fuse.service - Load Kernel Module fuse...
[    6.375640] WARNING: CPU: 1 PID: 135 at kernel/smp.c:815 smp_call_function_many_cond+0x49c/0x5cc
[    6.392211] Modules linked in:
[    6.392211] CPU: 1 UID: 0 PID: 135 Comm: 9 Not tainted 6.13.0-rc7 #1
[    6.401672] Hardware name: Generic DRA74X (Flattened Device Tree)
[    6.407806] Call trace: 
[    6.407806]  unwind_backtrace from show_stack+0x10/0x14
[    6.422943]  show_stack from dump_stack_lvl+0x54/0x68
[    6.423278] systemd[1]: systemd-hibernate-clear.service - Clear Stale Hibernate Storage Info was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/HibernateLocation-8cf2644b-4b0b-428f-9387-6d876050dc67).
[    6.428039]  dump_stack_lvl from __warn+0x7c/0x128
[    6.450775] systemd[1]: systemd-journald.service: unit configures an IP firewall, but the local system does not support BPF/cgroup firewalling.
[    6.454589]  __warn from warn_slowpath_fmt+0x184/0x18c
[    6.454589]  warn_slowpath_fmt from smp_call_function_many_cond+0x49c/0x5cc
[    6.467590] systemd[1]: systemd-journald.service: (This warning is only shown for the first unit using IP firewalling.)
[    6.472686]  smp_call_function_many_cond from smp_call_function+0x2c/0x34
[    6.472686]  smp_call_function from set_memory_valid+0x7c/0xb8
[    6.481689] systemd[1]: Starting systemd-journald.service - Journal Service...
[    6.490509]  set_memory_valid from kfence_guarded_free+0x168/0x300
[    6.516662]  kfence_guarded_free from rcu_core+0x2b8/0x964
[    6.522216]  rcu_core from handle_softirqs+0x108/0x344
[    6.522247]  handle_softirqs from __irq_exit_rcu+0xa0/0x114
[    6.533020]  __irq_exit_rcu from irq_exit+0x8/0x10
[    6.537841]  irq_exit from call_with_stack+0x18/0x20
[    6.537872]  call_with_stack from __irq_usr+0x80/0xa0
[    6.547912] Exception stack(0xf1eb1fb0 to 0xf1eb1ff8)
[    6.547943] 1fa0:                                     b6597494 00000000 00000f20 00000065
[    6.547943] 1fc0: be90aaa4 00000000 b6594c40 00000009 e75a8874 b64763b0 b6597482 b690aeb8
[    6.569458] 1fe0: 00000441 be90a9b8 b6f44b69 b6f42290 600d0030 ffffffff
[    6.569488] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 64

Home

------------[ cut here ]------------
[    5.278625] WARNING: CPU: 0 PID: 0 at kernel/smp.c:815 smp_call_function_many_cond+0x4b0/0x5dc
[    5.287353] Modules linked in:
[    5.290435] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.13.0-rc7 #1
[    5.297332] Hardware name: Generic DRA74X (Flattened Device Tree)
[    5.303466] Call trace: 
[    5.303466]  unwind_backtrace from show_stack+0x18/0x1c
[    5.311279]  show_stack from dump_stack_lvl+0x6c/0x8c
[    5.316375]  dump_stack_lvl from __warn+0x84/0x130
[    5.321197]  __warn from warn_slowpath_fmt+0x18c/0x194
[    5.326354]  warn_slowpath_fmt from smp_call_function_many_cond+0x4b0/0x5dc
[    5.333374]  smp_call_function_many_cond from smp_call_function+0x34/0x3c
[    5.340209]  smp_call_function from set_memory_valid+0x84/0xc4
[    5.346099]  set_memory_valid from kfence_guarded_free+0x170/0x2dc
[    5.352325]  kfence_guarded_free from rcu_core+0x2cc/0x9dc
[    5.357849]  rcu_core from handle_softirqs+0x14c/0x3d0
[    5.363037]  handle_softirqs from __irq_exit_rcu+0xa0/0x114
[    5.368652]  __irq_exit_rcu from irq_exit+0x10/0x30
[    5.373565]  irq_exit from __irq_svc+0x80/0xac
[    5.378051] Exception stack(0xc2401f20 to 0xc2401f68)
[    5.383117] 1f20: 00002bac 00000001 2d88d000 00000000 c240ff40 c269d300 c240a0dc c240a11c
[    5.391357] 1f40: 00000000 00000000 c240a080 ffffffff c269c700 c2401f70 c15b5060 c15b5064
[    5.399566] 1f60: 60000013 ffffffff
[    5.403076]  __irq_svc from default_idle_call+0x20/0xc0
[    5.408325]  default_idle_call from do_idle+0x22c/0x2bc
[    5.413604]  do_idle from cpu_startup_entry+0x30/0x34
[    5.418701]  cpu_startup_entry from kernel_init+0x0/0x13c
[    5.424133]  kernel_init from start_kernel+0x704/0x720
[    5.429321] ---[ end trace 0000000000000000 ]---

test log snippet test parser 1

Home

------------[ cut here ]------------
[   44.487978] WARNING: CPU: 1 PID: 468 at mm/util.c:657 __kvmalloc_node_noprof+0x138/0x148
[   44.490955] Modules linked in: crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 drm fuse backlight ip_tables x_tables
[   44.496541] CPU: 1 UID: 0 PID: 468 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[   44.497964] Hardware name: linux,dummy-virt (DT)
[   44.499764] pstate: 23402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[   44.500958] pc : __kvmalloc_node_noprof+0x138/0x148
[   44.501490] lr : __kvmalloc_node_noprof+0x64/0x148
[   44.503132] sp : ffff800080a9bcd0
[   44.503636] x29: ffff800080a9bce0 x28: fff00000c1268000 x27: 0000000000000000
[   44.505745] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c19c0000
[   44.506841] x23: fff00000c19c0080 x22: 9acfa7ce99d3b6bc x21: 0000000200001e00
[   44.507539] x20: 00000000ffffffff x19: 0000000000400cc0 x18: 0000000000000000
[   44.509073] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   44.509571] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   44.510080] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[   44.511711] x8 : 0000000000000001 x7 : 0000000000000001 x6 : 0000000000000005
[   44.513471] x5 : 0000000000000000 x4 : fff00000c1268000 x3 : 0000000000000000
[   44.515089] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[   44.516933] Call trace:
[   44.517927]  __kvmalloc_node_noprof+0x138/0x148 (P)
[   44.518447]  alloc_fdtable+0x84/0x128
[   44.518786]  expand_files+0x78/0x2ec
[   44.519076]  ksys_dup3+0x60/0x120
[   44.521489]  __arm64_sys_dup3+0x20/0x30
[   44.522316]  invoke_syscall+0x48/0x10c
[   44.523692]  el0_svc_common.constprop.0+0x40/0xe0
[   44.525315]  do_el0_svc+0x1c/0x28
[   44.525856]  el0_svc+0x30/0xcc
[   44.526918]  el0t_64_sync_handler+0x10c/0x138
[   44.527979]  el0t_64_sync+0x198/0x19c
[   44.528537] ---[ end trace 0000000000000000 ]---

test log snippet test parser 2

Home

[  108.153005] watchdog: BUG: soft lockup - CPU#0 stuck for 21s! [sh:320]

test log snippet test parser 3

Home

[  108.153005] watchdog: BUG: soft lockup - CPU#0 stuck for 21s! [sh:320]

test log snippet test parser 4

Home

------------[ cut here ]------------
[   41.966759] WARNING: CPU: 0 PID: 480 at mm/util.c:657 __kvmalloc_node_noprof+0xdf/0xf0
[   41.967926] Modules linked in:
[   41.969339] CPU: 0 UID: 0 PID: 480 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[   41.969996] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   41.971058] RIP: 0010:__kvmalloc_node_noprof+0xdf/0xf0
[   41.971857] Code: 89 f0 ff 75 08 53 68 00 04 00 00 e8 db 33 04 00 48 83 c4 18 5b 41 5e 41 5f 5d c3 cc cc cc cc cc 41 f7 c6 00 20 00 00 75 81 90 <0f> 0b 90 31 c0 eb e3 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90
[   41.973351] RSP: 0018:ffffaf06405ffdb8 EFLAGS: 00010246
[   41.973664] RAX: 0000000000000004 RBX: 00000000ffffffff RCX: 0000000400000000
[   41.973906] RDX: 0000000200001e00 RSI: 0000000000000000 RDI: ffffffffba269fe8
[   41.974173] RBP: ffffaf06405ffdd0 R08: 0000000000412cc0 R09: 00000000ffffffff
[   41.974824] R10: 0000000000000000 R11: 0000000000000000 R12: 00000000400003c0
[   41.975447] R13: 00000000400003c0 R14: 0000000000400cc0 R15: 0000000200001e00
[   41.976071] FS:  00007f85ff4a0740(0000) GS:ffffa154fbc00000(0000) knlGS:0000000000000000
[   41.976834] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   41.979275] CR2: 00007f85ff644680 CR3: 0000000101748000 CR4: 00000000000006f0
[   41.980629] Call Trace:
[   41.982058]  <TASK>
[   41.982927]  ? show_regs+0x5d/0x70
[   41.983324]  ? __warn+0xcf/0x1d0
[   41.983628]  ? __kvmalloc_node_noprof+0xdf/0xf0
[   41.984126]  ? report_bug+0x14c/0x1f0
[   41.984860]  ? handle_bug+0x67/0x90
[   41.985161]  ? exc_invalid_op+0x1f/0x50
[   41.985334]  ? asm_exc_invalid_op+0x1f/0x30
[   41.985873]  ? __kvmalloc_node_noprof+0x48/0xf0
[   41.986364]  ? __kvmalloc_node_noprof+0xdf/0xf0
[   41.987571]  ? __kvmalloc_node_noprof+0x48/0xf0
[   41.988187]  alloc_fdtable+0x7b/0x120
[   41.988693]  expand_files+0x118/0x310
[   41.988866]  ? do_prlimit+0x11d/0x160
[   41.989034]  ? __se_sys_prlimit64+0x1ea/0x2a0
[   41.989207]  ksys_dup3+0x71/0xd0
[   41.989438]  __x64_sys_dup2+0x1e/0x80
[   41.989722]  x64_sys_call+0x8cf/0x2f50
[   41.990151]  do_syscall_64+0xd0/0x1a0
[   41.991678]  ? exc_page_fault+0x68/0xc0
[   41.992069]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   41.992769] RIP: 0033:0x7f85ff598c17
[   41.993589] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[   41.994486] RSP: 002b:00007fffb8abea38 EFLAGS: 00000202 ORIG_RAX: 0000000000000021
[   41.995038] RAX: ffffffffffffffda RBX: 00007fffb8abf298 RCX: 00007f85ff598c17
[   41.995693] RDX: 00007fffb8abebb8 RSI: 0000000040000038 RDI: 0000000000000002
[   41.995919] RBP: 00007fffb8abec50 R08: 0000000000000064 R09: 0000000000000000
[   41.996159] R10: 00007f85ff4b5170 R11: 0000000000000202 R12: 0000000000000000
[   41.996572] R13: 00007fffb8abf2a8 R14: 00007f85ff6d4000 R15: 000055c3e9fcacf8
[   41.997155]  </TASK>
[   41.997623] ---[ end trace 0000000000000000 ]---

test log snippet test parser 5

Home

------------[ cut here ]------------
[   41.966759] WARNING: CPU: 0 PID: 480 at mm/util.c:657 __kvmalloc_node_noprof+0xdf/0xf0
[   41.967926] Modules linked in:
[   41.969339] CPU: 0 UID: 0 PID: 480 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[   41.969996] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   41.971058] RIP: 0010:__kvmalloc_node_noprof+0xdf/0xf0
[   41.971857] Code: 89 f0 ff 75 08 53 68 00 04 00 00 e8 db 33 04 00 48 83 c4 18 5b 41 5e 41 5f 5d c3 cc cc cc cc cc 41 f7 c6 00 20 00 00 75 81 90 <0f> 0b 90 31 c0 eb e3 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90
[   41.973351] RSP: 0018:ffffaf06405ffdb8 EFLAGS: 00010246
[   41.973664] RAX: 0000000000000004 RBX: 00000000ffffffff RCX: 0000000400000000
[   41.973906] RDX: 0000000200001e00 RSI: 0000000000000000 RDI: ffffffffba269fe8
[   41.974173] RBP: ffffaf06405ffdd0 R08: 0000000000412cc0 R09: 00000000ffffffff
[   41.974824] R10: 0000000000000000 R11: 0000000000000000 R12: 00000000400003c0
[   41.975447] R13: 00000000400003c0 R14: 0000000000400cc0 R15: 0000000200001e00
[   41.976071] FS:  00007f85ff4a0740(0000) GS:ffffa154fbc00000(0000) knlGS:0000000000000000
[   41.976834] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   41.979275] CR2: 00007f85ff644680 CR3: 0000000101748000 CR4: 00000000000006f0
[   41.980629] Call Trace:
[   41.982058]  <TASK>
[   41.982927]  ? show_regs+0x5d/0x70
[   41.983324]  ? __warn+0xcf/0x1d0
[   41.983628]  ? __kvmalloc_node_noprof+0xdf/0xf0
[   41.984126]  ? report_bug+0x14c/0x1f0
[   41.984860]  ? handle_bug+0x67/0x90
[   41.985161]  ? exc_invalid_op+0x1f/0x50
[   41.985334]  ? asm_exc_invalid_op+0x1f/0x30
[   41.985873]  ? __kvmalloc_node_noprof+0x48/0xf0
[   41.986364]  ? __kvmalloc_node_noprof+0xdf/0xf0
[   41.987571]  ? __kvmalloc_node_noprof+0x48/0xf0
[   41.988187]  alloc_fdtable+0x7b/0x120
[   41.988693]  expand_files+0x118/0x310
[   41.988866]  ? do_prlimit+0x11d/0x160
[   41.989034]  ? __se_sys_prlimit64+0x1ea/0x2a0
[   41.989207]  ksys_dup3+0x71/0xd0
[   41.989438]  __x64_sys_dup2+0x1e/0x80
[   41.989722]  x64_sys_call+0x8cf/0x2f50
[   41.990151]  do_syscall_64+0xd0/0x1a0
[   41.991678]  ? exc_page_fault+0x68/0xc0
[   41.992069]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   41.992769] RIP: 0033:0x7f85ff598c17
[   41.993589] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[   41.994486] RSP: 002b:00007fffb8abea38 EFLAGS: 00000202 ORIG_RAX: 0000000000000021
[   41.995038] RAX: ffffffffffffffda RBX: 00007fffb8abf298 RCX: 00007f85ff598c17
[   41.995693] RDX: 00007fffb8abebb8 RSI: 0000000040000038 RDI: 0000000000000002
[   41.995919] RBP: 00007fffb8abec50 R08: 0000000000000064 R09: 0000000000000000
[   41.996159] R10: 00007f85ff4b5170 R11: 0000000000000202 R12: 0000000000000000
[   41.996572] R13: 00007fffb8abf2a8 R14: 00007f85ff6d4000 R15: 000055c3e9fcacf8
[   41.997155]  </TASK>
[   41.997623] ---[ end trace 0000000000000000 ]---

test log snippet test parser 6

Home

------------[ cut here ]------------
[   48.354352] WARNING: CPU: 0 PID: 500 at mm/util.c:657 __kvmalloc_node_noprof+0xd7/0xe0
[   48.355207] Modules linked in:
[   48.356078] CPU: 0 UID: 0 PID: 500 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[   48.358830] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.360592] RIP: 0010:__kvmalloc_node_noprof+0xd7/0xe0
[   48.361158] Code: 00 48 83 c4 18 48 8d 65 e8 5b 41 5c 41 5d 5d c3 cc cc cc cc 48 b9 00 00 00 00 00 20 00 00 eb bd 80 e7 20 0f 85 52 ff ff ff 90 <0f> 0b 90 e9 49 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90
[   48.364511] RSP: 0018:ffffa2bb0097bdd8 EFLAGS: 00010246
[   48.365126] RAX: 0000000000000000 RBX: 00000000004000c0 RCX: 0000000000000015
[   48.366031] RDX: 0000000000000015 RSI: ffffffffad8373cd RDI: 0000000000452cc0
[   48.367119] RBP: ffffa2bb0097bdf0 R08: 0000000000000040 R09: 0000000000000000
[   48.368234] R10: ffffa2bb0097bdd8 R11: 0000000000000000 R12: 0000000200001e00
[   48.368915] R13: 00000000ffffffff R14: ffff9b97802bf200 R15: ffff9b97802bf180
[   48.369408] FS:  00007f1d62bd7740(0000) GS:ffff9b97fbc00000(0000) knlGS:0000000000000000
[   48.370850] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   48.372707] CR2: 00007f1d62d6ffa4 CR3: 00000001008f2000 CR4: 00000000000006f0
[   48.374538] Call Trace:
[   48.375480]  <TASK>
[   48.376018]  ? show_regs+0x68/0x80
[   48.377178]  ? __warn+0x91/0x140
[   48.378229]  ? __kvmalloc_node_noprof+0xd7/0xe0
[   48.379127]  ? report_bug+0x175/0x1a0
[   48.380026]  ? handle_bug+0x5c/0xa0
[   48.380729]  ? exc_invalid_op+0x1c/0x80
[   48.381258]  ? asm_exc_invalid_op+0x1f/0x30
[   48.381986]  ? __kmalloc_node_noprof+0x39d/0x4c0
[   48.382808]  ? __kvmalloc_node_noprof+0xd7/0xe0
[   48.383652]  ? __kvmalloc_node_noprof+0x53/0xe0
[   48.383899]  alloc_fdtable+0x78/0x120
[   48.384132]  expand_files+0x68/0x2e0
[   48.384324]  ? do_prlimit+0x134/0x210
[   48.384886]  ? __pfx_read_tsc+0x10/0x10
[   48.385439]  ? trace_preempt_off+0x1e/0x70
[   48.386230]  ? ksys_dup3+0x61/0x100
[   48.386704]  ksys_dup3+0x6c/0x100
[   48.387144]  __x64_sys_dup2+0x32/0xc0
[   48.387689]  x64_sys_call+0x2082/0x20b0
[   48.388447]  do_syscall_64+0xb2/0x1d0
[   48.389171]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   48.390196] RIP: 0033:0x7f1d62ccfc17
[   48.390900] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[   48.393150] RSP: 002b:00007ffc084c5da8 EFLAGS: 00000202 ORIG_RAX: 0000000000000021
[   48.394460] RAX: ffffffffffffffda RBX: 00007ffc084c6608 RCX: 00007f1d62ccfc17
[   48.394762] RDX: 00007ffc084c5dd0 RSI: 0000000040000038 RDI: 0000000000000002
[   48.395035] RBP: 00007ffc084c5fd0 R08: 0000000000000064 R09: 0000000000000000
[   48.396247] R10: 00007f1d62bec170 R11: 0000000000000202 R12: 0000000000000000
[   48.398627] R13: 00007ffc084c6618 R14: 00007f1d62e0b000 R15: 00005569f2282dd8
[   48.399561]  </TASK>
[   48.400473] ---[ end trace 0000000000000000 ]---