{home}

Build

Regressions (compared to v6.13-rc7-41-g7f5b6a8ec18e)

qemu-arm64, kselftest-net-mptcp

qemu-arm64, kselftest-seccomp

qemu-arm64, ltp-controllers

Fixes (compared to v6.13-rc7-41-g7f5b6a8ec18e)

qemu-arm64, ltp-fs

Boot Parser (compared to v6.13-rc7-41-g7f5b6a8ec18e)

qemu-arm64, log-parser-boot

Test Parser (compared to v6.13-rc7-41-g7f5b6a8ec18e)

qemu-arm64, log-parser-test

Test log snippets

test log snippet regressions 2

Home

net_mptcp_mptcp_connect_sh_-_mptcp_connect_New_MPTCP_socket_can_be_blocked_via_sysctl pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_ping_tests pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_loopback_v4_ns1_MPTCP__ns1_10_0_1_1_10000_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_loopback_v4_ns1_MPTCP__ns1_10_0_1_1_10001_TCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_loopback_v4_ns1_TCP__ns1_10_0_1_1_10002_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_loopback_v6_ns1_MPTCP__ns1_dead_beef_1_1_10003_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_loopback_v6_ns1_MPTCP__ns1_dead_beef_1_1_10004_TCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_loopback_v6_ns1_TCP__ns1_dead_beef_1_1_10005_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns1_MPTCP__ns2_10_0_1_2_10006_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns1_MPTCP__ns2_dead_beef_1_2_10007_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns1_MPTCP__ns2_10_0_2_1_10008_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns1_MPTCP__ns2_dead_beef_2_1_10009_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns1_MPTCP__ns3_10_0_2_2_10010_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns1_MPTCP__ns3_dead_beef_2_2_10011_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns1_MPTCP__ns3_10_0_3_2_10012_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns1_MPTCP__ns3_dead_beef_3_2_10013_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns1_MPTCP__ns4_10_0_3_1_10014_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns1_MPTCP__ns4_dead_beef_3_1_10015_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns2_MPTCP__ns1_10_0_1_1_10016_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns2_MPTCP__ns1_dead_beef_1_1_10017_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns2_MPTCP__ns3_10_0_2_2_10018_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns2_MPTCP__ns3_dead_beef_2_2_10019_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns2_MPTCP__ns3_10_0_3_2_10020_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns2_MPTCP__ns3_dead_beef_3_2_10021_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns2_MPTCP__ns4_10_0_3_1_10022_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns2_MPTCP__ns4_dead_beef_3_1_10023_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns3_MPTCP__ns1_10_0_1_1_10024_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns3_MPTCP__ns1_dead_beef_1_1_10025_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns3_MPTCP__ns2_10_0_1_2_10026_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns3_MPTCP__ns2_dead_beef_1_2_10027_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns3_MPTCP__ns2_10_0_2_1_10028_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns3_MPTCP__ns2_dead_beef_2_1_10029_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns3_MPTCP__ns4_10_0_3_1_10030_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns3_MPTCP__ns4_dead_beef_3_1_10031_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns4_MPTCP__ns1_10_0_1_1_10032_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns4_MPTCP__ns1_dead_beef_1_1_10033_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns4_MPTCP__ns2_10_0_1_2_10034_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns4_MPTCP__ns2_dead_beef_1_2_10035_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns4_MPTCP__ns2_10_0_2_1_10036_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns4_MPTCP__ns2_dead_beef_2_1_10037_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns4_MPTCP__ns3_10_0_2_2_10038_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns4_MPTCP__ns3_dead_beef_2_2_10039_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns4_MPTCP__ns3_10_0_3_2_10040_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns4_MPTCP__ns3_dead_beef_3_2_10041_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveWithPeek_ns1_MPTCP__ns1_10_0_1_1_10042_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveWithPeek_ns1_MPTCP__ns1_10_0_1_1_10043_TCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveWithPeek_ns1_TCP__ns1_10_0_1_1_10044_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveWithPeek_ns1_MPTCP__ns1_dead_beef_1_1_10045_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveWithPeek_ns1_MPTCP__ns1_dead_beef_1_1_10046_TCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveWithPeek_ns1_TCP__ns1_dead_beef_1_1_10047_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveAfterPeek_ns1_MPTCP__ns1_10_0_1_1_10048_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveAfterPeek_ns1_MPTCP__ns1_10_0_1_1_10049_TCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveAfterPeek_ns1_TCP__ns1_10_0_1_1_10050_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveAfterPeek_ns1_MPTCP__ns1_dead_beef_1_1_10051_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveAfterPeek_ns1_MPTCP__ns1_dead_beef_1_1_10052_TCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveAfterPeek_ns1_TCP__ns1_dead_beef_1_1_10053_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_MPTFO_ns2_MPTCP__ns1_10_0_1_1_10054_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_MPTFO_ns2_MPTCP__ns1_10_0_1_1_10055_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_MPTFO_ns2_MPTCP__ns1_dead_beef_1_1_10056_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_MPTFO_ns2_MPTCP__ns1_dead_beef_1_1_10057_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_tproxy_ipv4_ns1_MPTCP__ns2_10_0_3_1_20000_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_tproxy_ipv6_ns1_MPTCP__ns2_dead_beef_3_1_20000_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_full_disconnect_ns1_MPTCP__ns1_10_0_1_1_20001_MPTCP fail
net_mptcp_mptcp_connect_sh_-_mptcp_connect_full_disconnect_ns1_MPTCP__ns1_dead_beef_1_1_20002_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_full_disconnect_ns1_MPTCP__ns1_dead_beef_1_1_20003_TCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_full_disconnect_ns1_TCP__ns1_dead_beef_1_1_20004_MPTCP pass
net_mptcp_mptcp_connect_sh fail

test log snippet regressions 3

Home

net_mptcp_mptcp_connect_sh_-_mptcp_connect_full_disconnect_ns1_MPTCP__ns1_10_0_1_1_20001_MPTCP fail

test log snippet regressions 4

Home

seccomp_seccomp_benchmark_native_1_bitmap pass
seccomp_seccomp_benchmark_native_1_filter pass
seccomp_seccomp_benchmark_per-filter_last_2_diff_per-filter_filters_4 fail
seccomp_seccomp_benchmark_1_bitmapped_2_bitmapped pass
seccomp_seccomp_benchmark_entry_1_bitmapped pass
seccomp_seccomp_benchmark_entry_2_bitmapped fail
seccomp_seccomp_benchmark_native_entry_per_filter_4_4_filters_total pass
seccomp_seccomp_benchmark fail

test log snippet regressions 5

Home

seccomp_seccomp_benchmark_entry_2_bitmapped fail

test log snippet regressions 6

Home

seccomp_seccomp_benchmark_per-filter_last_2_diff_per-filter_filters_4 fail

test log snippet regressions 7

Home

cgroup_core01   cgroup_core01
cgroup_core02   cgroup_core02
cgroup_core03   cgroup_core03
cgroup      cgroup_regression_test.sh
cgroup_fj_function_debug cgroup_fj_function.sh debug
cgroup_fj_function_cpuset cgroup_fj_function.sh cpuset
cgroup_fj_function_cpu cgroup_fj_function.sh cpu
cgroup_fj_function_cpuacct cgroup_fj_function.sh cpuacct
cgroup_fj_function_memory cgroup_fj_function.sh memory
cgroup_fj_function_freezer cgroup_fj_function.sh freezer
cgroup_fj_function_devices cgroup_fj_function.sh devices
cgroup_fj_function_blkio cgroup_fj_function.sh blkio
cgroup_fj_function_net_cls cgroup_fj_function.sh net_cls
cgroup_fj_function_perf_event cgroup_fj_function.sh perf_event
cgroup_core01.c:63: TPASS: test_lesser_euid_open passed: EACCES (13)
cgroup_core02.c:84: TPASS: test_lesser_ns_open passed: ENOENT (2)
cgroup_core03.c:99: TPASS: cg_count_procs(cg_child_test_simple) passed
cgroup_core03.c:105: TPASS: cg_count_procs(cg_child_test_simple) passed
cgroup_regression_test 1 TINFO: Running: cgroup_regression_test.sh 
cgroup_regression_test 1 TINFO: Tested kernel: Linux runner-vwmj3eza-project-40964107-concurrent-2 6.13.0-rc7 #1 SMP PREEMPT @1736943140 aarch64 GNU/Linux
cgroup_regression_test 1 TINFO: Using /tmp/LTP_cgroup_regression_test.XyrmNrDYYE as tmpdir (tmpfs filesystem)
cgroup_regression_test 1 TINFO: ceiling LTP_TIMEOUT_MUL to 11
cgroup_regression_test 1 TINFO: timeout per run is 0h 55m 0s
cgroup_regression_test 1 TPASS: no kernel bug was found
cgroup_regression_test 2 TFAIL: Failed to mount cgroup filesystem
cgroup_regression_test 3 TCONF: CONFIG_SCHED_DEBUG is not enabled
cgroup_regression_test 4 TCONF: CONFIG_LOCKDEP is not enabled
cgroup_regression_test 5 TINFO: The '/tmp/LTP_cgroup_regression_test.XyrmNrDYYE/cgroup' is not mounted, skipping umount
cgroup_regression_test 5 TPASS: no kernel bug was found
cgroup_regression_test 6 TPASS: no kernel bug was found
cgroup_regression_test 7 TPASS: no kernel bug was found for test 1
cgroup_regression_test 7 TCONF: skip rest of testing due possible oops triggered by reading /proc/sched_debug
cgroup_regression_test 7 TPASS: no kernel bug was found for test 2
cgroup_regression_test 8 TPASS: no kernel bug was found
cgroup_fj_function 1 TINFO: Running: cgroup_fj_function.sh debug
cgroup_fj_function 1 TINFO: Tested kernel: Linux runner-vwmj3eza-project-40964107-concurrent-2 6.13.0-rc7 #1 SMP PREEMPT @1736943140 aarch64 GNU/Linux
cgroup_fj_function 1 TINFO: Using /tmp/LTP_cgroup_fj_function.Ai3FoHfCCs as tmpdir (tmpfs filesystem)
cgroup_fj_function 1 TINFO: ceiling LTP_TIMEOUT_MUL to 11
cgroup_fj_function 1 TINFO: timeout per run is 0h 55m 0s
cgroup_fj_function 1 TCONF: 'tst_cgctl require' exited. Controller is probably not available?
cgroup_fj_function 1 TINFO: Removing all ltp subgroups...
cgroup_fj_function 1 TINFO: Running: cgroup_fj_function.sh cpuset
cgroup_fj_function 1 TINFO: Tested kernel: Linux runner-vwmj3eza-project-40964107-concurrent-2 6.13.0-rc7 #1 SMP PREEMPT @1736943140 aarch64 GNU/Linux
cgroup_fj_function 1 TINFO: Using /tmp/LTP_cgroup_fj_function.NcH7giA3ze as tmpdir (tmpfs filesystem)
cgroup_fj_function 1 TINFO: ceiling LTP_TIMEOUT_MUL to 11
cgroup_fj_function 1 TINFO: timeout per run is 0h 55m 0s
cgroup_fj_function 1 TINFO: test starts with cgroup version 2
cgroup_fj_function 1 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 2 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 3 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 4 TINFO: Attaching task 4356 to /sys/fs/cgroup/ltp/test-4305/ltp_1
cgroup_fj_function 4 TPASS: Group /sys/fs/cgroup/ltp/test-4305/ltp_1 with task 4356 cannot be removed
cgroup_fj_function 5 TPASS: Dir /sys/fs/cgroup/ltp/test-4305/ltp_1 with subdir 'a' cannot be removed
cgroup_fj_function 6 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 7 TPASS: Tasks file /sys/fs/cgroup/ltp/test-4305/ltp_1/tasks cannot be removed
cgroup_fj_function 8 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 9 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 10 TINFO: Removing all ltp subgroups...
cgroup_fj_function 1 TINFO: Running: cgroup_fj_function.sh cpu
cgroup_fj_function 1 TINFO: Tested kernel: Linux runner-vwmj3eza-project-40964107-concurrent-2 6.13.0-rc7 #1 SMP PREEMPT @1736943140 aarch64 GNU/Linux
cgroup_fj_function 1 TINFO: Using /tmp/LTP_cgroup_fj_function.adkEqWVgGU as tmpdir (tmpfs filesystem)
cgroup_fj_function 1 TINFO: ceiling LTP_TIMEOUT_MUL to 11
cgroup_fj_function 1 TINFO: timeout per run is 0h 55m 0s
cgroup_fj_function 1 TINFO: test starts with cgroup version 2
cgroup_fj_function 1 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 2 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 3 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 4 TINFO: Attaching task 4455 to /sys/fs/cgroup/ltp/test-4404/ltp_1
cgroup_fj_function 4 TPASS: Group /sys/fs/cgroup/ltp/test-4404/ltp_1 with task 4455 cannot be removed
cgroup_fj_function 5 TPASS: Dir /sys/fs/cgroup/ltp/test-4404/ltp_1 with subdir 'a' cannot be removed
cgroup_fj_function 6 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 7 TPASS: Tasks file /sys/fs/cgroup/ltp/test-4404/ltp_1/tasks cannot be removed
cgroup_fj_function 8 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 9 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 10 TINFO: Removing all ltp subgroups...
cgroup_fj_function 1 TINFO: Running: cgroup_fj_function.sh cpuacct
cgroup_fj_function 1 TINFO: Tested kernel: Linux runner-vwmj3eza-project-40964107-concurrent-2 6.13.0-rc7 #1 SMP PREEMPT @1736943140 aarch64 GNU/Linux
cgroup_fj_function 1 TINFO: Using /tmp/LTP_cgroup_fj_function.VBQet9beRc as tmpdir (tmpfs filesystem)
cgroup_fj_function 1 TINFO: ceiling LTP_TIMEOUT_MUL to 11
cgroup_fj_function 1 TINFO: timeout per run is 0h 55m 0s
cgroup_fj_function 1 TINFO: test starts with cgroup version 1
cgroup_fj_function 1 TINFO: Attaching task 4552 to /tmp/cgroup_cpuacct/ltp/test-4502/ltp_1
cgroup_fj_function 1 TINFO: Attaching task 4552 to /tmp/cgroup_cpuacct/ltp/test-4502
cgroup_fj_function 1 TPASS: Task attached successfully
cgroup_fj_function 2 TPASS: Successfully moved /tmp/cgroup_cpuacct/ltp/test-4502/ltp_2 to /tmp/cgroup_cpuacct/ltp/test-4502/ltp_3
cgroup_fj_function 3 TPASS: Failed to move /tmp/cgroup_cpuacct/ltp/test-4502/ltp_2 over existing /tmp/cgroup_cpuacct/ltp/test-4502/ltp_1
cgroup_fj_function 4 TINFO: Attaching task 4552 to /tmp/cgroup_cpuacct/ltp/test-4502/ltp_1
cgroup_fj_function 4 TPASS: Group /tmp/cgroup_cpuacct/ltp/test-4502/ltp_1 with task 4552 cannot be removed
cgroup_fj_function 5 TPASS: Dir /tmp/cgroup_cpuacct/ltp/test-4502/ltp_1 with subdir 'a' cannot be removed
cgroup_fj_function 6 TPASS: Subgroup /tmp/cgroup_cpuacct/ltp/test-4502/ltp_1 cannot be moved to /tmp/LTP_cgroup_fj_function.VBQet9beRc/ltp
cgroup_fj_function 7 TPASS: Tasks file /tmp/cgroup_cpuacct/ltp/test-4502/ltp_1/tasks cannot be removed
cgroup_fj_function 8 TPASS: Cannot write invalid values to /tmp/cgroup_cpuacct/ltp/test-4502/ltp_1/notify_on_release
cgroup_fj_function 9 TPASS: Set /tmp/cgroup_cpuacct/ltp/test-4502/ltp_1/notify_on_release to 1
cgroup_fj_function 10 TINFO: Removing all ltp subgroups...
cgroup_fj_function 1 TINFO: Running: cgroup_fj_function.sh memory
cgroup_fj_function 1 TINFO: Tested kernel: Linux runner-vwmj3eza-project-40964107-concurrent-2 6.13.0-rc7 #1 SMP PREEMPT @1736943140 aarch64 GNU/Linux
cgroup_fj_function 1 TINFO: Using /tmp/LTP_cgroup_fj_function.mfXC1eFSDk as tmpdir (tmpfs filesystem)
cgroup_fj_function 1 TINFO: ceiling LTP_TIMEOUT_MUL to 11
cgroup_fj_function 1 TINFO: timeout per run is 0h 55m 0s
cgroup_fj_function 1 TINFO: test starts with cgroup version 2
cgroup_fj_function 1 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 2 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 3 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 4 TINFO: Attaching task 4661 to /sys/fs/cgroup/ltp/test-4610/ltp_1
cgroup_fj_function 4 TPASS: Group /sys/fs/cgroup/ltp/test-4610/ltp_1 with task 4661 cannot be removed
cgroup_fj_function 5 TPASS: Dir /sys/fs/cgroup/ltp/test-4610/ltp_1 with subdir 'a' cannot be removed
cgroup_fj_function 6 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 7 TPASS: Tasks file /sys/fs/cgroup/ltp/test-4610/ltp_1/tasks cannot be removed
cgroup_fj_function 8 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 9 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 10 TINFO: Removing all ltp subgroups...
cgroup_fj_function 1 TINFO: Running: cgroup_fj_function.sh freezer
cgroup_fj_function 1 TINFO: Tested kernel: Linux runner-vwmj3eza-project-40964107-concurrent-2 6.13.0-rc7 #1 SMP PREEMPT @1736943140 aarch64 GNU/Linux
cgroup_fj_function 1 TINFO: Using /tmp/LTP_cgroup_fj_function.C6QTH29MF6 as tmpdir (tmpfs filesystem)
cgroup_fj_function 1 TINFO: ceiling LTP_TIMEOUT_MUL to 11
cgroup_fj_function 1 TINFO: timeout per run is 0h 55m 0s
cgroup_fj_function 1 TINFO: test starts with cgroup version 1
cgroup_fj_function 1 TINFO: Attaching task 4758 to /tmp/cgroup_freezer/ltp/test-4708/ltp_1
cgroup_fj_function 1 TINFO: Attaching task 4758 to /tmp/cgroup_freezer/ltp/test-4708
cgroup_fj_function 1 TPASS: Task attached successfully
cgroup_fj_function 2 TPASS: Successfully moved /tmp/cgroup_freezer/ltp/test-4708/ltp_2 to /tmp/cgroup_freezer/ltp/test-4708/ltp_3
cgroup_fj_function 3 TPASS: Failed to move /tmp/cgroup_freezer/ltp/test-4708/ltp_2 over existing /tmp/cgroup_freezer/ltp/test-4708/ltp_1
cgroup_fj_function 4 TINFO: Attaching task 4758 to /tmp/cgroup_freezer/ltp/test-4708/ltp_1
cgroup_fj_function 4 TPASS: Group /tmp/cgroup_freezer/ltp/test-4708/ltp_1 with task 4758 cannot be removed
cgroup_fj_function 5 TPASS: Dir /tmp/cgroup_freezer/ltp/test-4708/ltp_1 with subdir 'a' cannot be removed
cgroup_fj_function 6 TPASS: Subgroup /tmp/cgroup_freezer/ltp/test-4708/ltp_1 cannot be moved to /tmp/LTP_cgroup_fj_function.C6QTH29MF6/ltp
cgroup_fj_function 7 TPASS: Tasks file /tmp/cgroup_freezer/ltp/test-4708/ltp_1/tasks cannot be removed
cgroup_fj_function 8 TPASS: Cannot write invalid values to /tmp/cgroup_freezer/ltp/test-4708/ltp_1/notify_on_release
cgroup_fj_function 9 TPASS: Set /tmp/cgroup_freezer/ltp/test-4708/ltp_1/notify_on_release to 1
cgroup_fj_function 10 TINFO: Removing all ltp subgroups...
cgroup_fj_function 1 TINFO: Running: cgroup_fj_function.sh devices
cgroup_fj_function 1 TINFO: Tested kernel: Linux runner-vwmj3eza-project-40964107-concurrent-2 6.13.0-rc7 #1 SMP PREEMPT @1736943140 aarch64 GNU/Linux
cgroup_fj_function 1 TINFO: Using /tmp/LTP_cgroup_fj_function.SANoxaY4Qg as tmpdir (tmpfs filesystem)
cgroup_fj_function 1 TINFO: ceiling LTP_TIMEOUT_MUL to 11
cgroup_fj_function 1 TINFO: timeout per run is 0h 55m 0s
cgroup_fj_function 1 TINFO: test starts with cgroup version 1
cgroup_fj_function 1 TINFO: Attaching task 4867 to /tmp/cgroup_devices/ltp/test-4817/ltp_1
cgroup_fj_function 1 TINFO: Attaching task 4867 to /tmp/cgroup_devices/ltp/test-4817
cgroup_fj_function 1 TPASS: Task attached successfully
cgroup_fj_function 2 TPASS: Successfully moved /tmp/cgroup_devices/ltp/test-4817/ltp_2 to /tmp/cgroup_devices/ltp/test-4817/ltp_3
cgroup_fj_function 3 TPASS: Failed to move /tmp/cgroup_devices/ltp/test-4817/ltp_2 over existing /tmp/cgroup_devices/ltp/test-4817/ltp_1
cgroup_fj_function 4 TINFO: Attaching task 4867 to /tmp/cgroup_devices/ltp/test-4817/ltp_1
cgroup_fj_function 4 TPASS: Group /tmp/cgroup_devices/ltp/test-4817/ltp_1 with task 4867 cannot be removed
cgroup_fj_function 5 TPASS: Dir /tmp/cgroup_devices/ltp/test-4817/ltp_1 with subdir 'a' cannot be removed
cgroup_fj_function 6 TPASS: Subgroup /tmp/cgroup_devices/ltp/test-4817/ltp_1 cannot be moved to /tmp/LTP_cgroup_fj_function.SANoxaY4Qg/ltp
cgroup_fj_function 7 TPASS: Tasks file /tmp/cgroup_devices/ltp/test-4817/ltp_1/tasks cannot be removed
cgroup_fj_function 8 TPASS: Cannot write invalid values to /tmp/cgroup_devices/ltp/test-4817/ltp_1/notify_on_release
cgroup_fj_function 9 TPASS: Set /tmp/cgroup_devices/ltp/test-4817/ltp_1/notify_on_release to 1
cgroup_fj_function 10 TINFO: Removing all ltp subgroups...
cgroup_fj_function 1 TINFO: Running: cgroup_fj_function.sh blkio
cgroup_fj_function 1 TINFO: Tested kernel: Linux runner-vwmj3eza-project-40964107-concurrent-2 6.13.0-rc7 #1 SMP PREEMPT @1736943140 aarch64 GNU/Linux
cgroup_fj_function 1 TINFO: Using /tmp/LTP_cgroup_fj_function.3pwiwmqkld as tmpdir (tmpfs filesystem)
cgroup_fj_function 1 TINFO: ceiling LTP_TIMEOUT_MUL to 11
cgroup_fj_function 1 TINFO: timeout per run is 0h 55m 0s
cgroup_fj_function 1 TCONF: 'tst_cgctl require' exited. Controller is probably not available?
cgroup_fj_function 1 TINFO: Removing all ltp subgroups...
cgroup_fj_function 1 TINFO: Running: cgroup_fj_function.sh net_cls
cgroup_fj_function 1 TINFO: Tested kernel: Linux runner-vwmj3eza-project-40964107-concurrent-2 6.13.0-rc7 #1 SMP PREEMPT @1736943140 aarch64 GNU/Linux
cgroup_fj_function 1 TINFO: Using /tmp/LTP_cgroup_fj_function.Su7tilugAk as tmpdir (tmpfs filesystem)
cgroup_fj_function 1 TINFO: ceiling LTP_TIMEOUT_MUL to 11
cgroup_fj_function 1 TINFO: timeout per run is 0h 55m 0s
cgroup_fj_function 1 TINFO: test starts with cgroup version 1
cgroup_fj_function 1 TINFO: Attaching task 5015 to /tmp/cgroup_net_cls/ltp/test-4965/ltp_1
cgroup_fj_function 1 TINFO: Attaching task 5015 to /tmp/cgroup_net_cls/ltp/test-4965
cgroup_fj_function 1 TPASS: Task attached successfully
cgroup_fj_function 2 TPASS: Successfully moved /tmp/cgroup_net_cls/ltp/test-4965/ltp_2 to /tmp/cgroup_net_cls/ltp/test-4965/ltp_3
cgroup_fj_function 3 TPASS: Failed to move /tmp/cgroup_net_cls/ltp/test-4965/ltp_2 over existing /tmp/cgroup_net_cls/ltp/test-4965/ltp_1
cgroup_fj_function 4 TINFO: Attaching task 5015 to /tmp/cgroup_net_cls/ltp/test-4965/ltp_1
cgroup_fj_function 4 TPASS: Group /tmp/cgroup_net_cls/ltp/test-4965/ltp_1 with task 5015 cannot be removed
cgroup_fj_function 5 TPASS: Dir /tmp/cgroup_net_cls/ltp/test-4965/ltp_1 with subdir 'a' cannot be removed
cgroup_fj_function 6 TPASS: Subgroup /tmp/cgroup_net_cls/ltp/test-4965/ltp_1 cannot be moved to /tmp/LTP_cgroup_fj_function.Su7tilugAk/ltp
cgroup_fj_function 7 TPASS: Tasks file /tmp/cgroup_net_cls/ltp/test-4965/ltp_1/tasks cannot be removed
cgroup_fj_function 8 TPASS: Cannot write invalid values to /tmp/cgroup_net_cls/ltp/test-4965/ltp_1/notify_on_release
cgroup_fj_function 9 TPASS: Set /tmp/cgroup_net_cls/ltp/test-4965/ltp_1/notify_on_release to 1
cgroup_fj_function 10 TINFO: Removing all ltp subgroups...
cgroup_fj_function 1 TINFO: Running: cgroup_fj_function.sh perf_event
cgroup_fj_function 1 TINFO: Tested kernel: Linux runner-vwmj3eza-project-40964107-concurrent-2 6.13.0-rc7 #1 SMP PREEMPT @1736943140 aarch64 GNU/Linux
cgroup_fj_function 1 TINFO: Using /tmp/LTP_cgroup_fj_function.ocuGzCLPfJ as tmpdir (tmpfs filesystem)
cgroup_fj_function 1 TINFO: ceiling LTP_TIMEOUT_MUL to 11
cgroup_fj_function 1 TINFO: timeout per run is 0h 55m 0s
cgroup_fj_function 1 TINFO: test starts with cgroup version 1
cgroup_fj_function 1 TINFO: Attaching task 5123 to /tmp/cgroup_perf_event/ltp/test-5073/ltp_1
cgroup_fj_function 1 TINFO: Attaching task 5123 to /tmp/cgroup_perf_event/ltp/test-5073
cgroup_fj_function 1 TPASS: Task attached successfully
cgroup_fj_function 2 TPASS: Successfully moved /tmp/cgroup_perf_event/ltp/test-5073/ltp_2 to /tmp/cgroup_perf_event/ltp/test-5073/ltp_3
cgroup_fj_function 3 TPASS: Failed to move /tmp/cgroup_perf_event/ltp/test-5073/ltp_2 over existing /tmp/cgroup_perf_event/ltp/test-5073/ltp_1
cgroup_fj_function 4 TINFO: Attaching task 5123 to /tmp/cgroup_perf_event/ltp/test-5073/ltp_1
cgroup_fj_function 4 TPASS: Group /tmp/cgroup_perf_event/ltp/test-5073/ltp_1 with task 5123 cannot be removed
cgroup_fj_function 5 TPASS: Dir /tmp/cgroup_perf_event/ltp/test-5073/ltp_1 with subdir 'a' cannot be removed
cgroup_fj_function 6 TPASS: Subgroup /tmp/cgroup_perf_event/ltp/test-5073/ltp_1 cannot be moved to /tmp/LTP_cgroup_fj_function.ocuGzCLPfJ/ltp
cgroup_fj_function 7 TPASS: Tasks file /tmp/cgroup_perf_event/ltp/test-5073/ltp_1/tasks cannot be removed
cgroup_fj_function 8 TPASS: Cannot write invalid values to /tmp/cgroup_perf_event/ltp/test-5073/ltp_1/notify_on_release
cgroup_fj_function 9 TPASS: Set /tmp/cgroup_perf_event/ltp/test-5073/ltp_1/notify_on_release to 1
cgroup_fj_function 10 TINFO: Removing all ltp subgroups...

test log snippet boot parser 2

Home

[   35.322718] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[   35.324056] Modules linked in:
[   35.327012] CPU: 0 UID: 0 PID: 387 Comm: kunit_try_catch Tainted: G                 N 6.13.0-rc7 #1
[   35.328123] Tainted: [N]=TEST
[   35.328601] Hardware name: linux,dummy-virt (DT)
[   35.329443] pstate: 82402009 (Nzcv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   35.330166] pc : kunit_test_null_dereference+0x2c/0x114
[   35.331947] lr : kunit_generic_run_threadfn_adapter+0x84/0x104
[   35.332493] sp : ffff800080fb7dd0
[   35.332970] x29: ffff800080fb7de0 x28: 0000000000000000 x27: 1ffe000018fe9001
[   35.334165] x26: dfff800000000000 x25: ffffa69205309214 x24: fff00000c5a4d020
[   35.334914] x23: 1ffe000018f811f1 x22: dfff800000000000 x21: dfff800000000000
[   35.336371] x20: ffffa6920531665c x19: fff00000c7c08f88 x18: 00000000b1c019b3
[   35.337239] x17: 000000002ef4bae1 x16: 0000000000000000 x15: 0000000000000001
[   35.338195] x14: 1ffe000018fe90f1 x13: 0000000000000000 x12: 0000000000000000
[   35.339310] x11: fffd800018fe90f2 x10: dfff800000000000 x9 : 1ffe000018f811f2
[   35.340388] x8 : 8523d9b505a84100 x7 : ffffa692072cf9c0 x6 : 0000000000000003
[   35.341227] x5 : fff00000daa5e260 x4 : 0000000000000000 x3 : ffffa6920715b838
[   35.341881] x2 : 0000000000000001 x1 : 0000000000000001 x0 : ffff800080087af8
[   35.343157] Call trace:
[   35.343687]  kunit_test_null_dereference+0x2c/0x114 (P)
[   35.344714]  kunit_generic_run_threadfn_adapter+0x84/0x104
[   35.345356]  kthread+0x25c/0x35c
[   35.345862]  ret_from_fork+0x10/0x20
[   35.347073] Code: d2d00015 f9426508 f2fbfff5 f90007e8 (39c002a8) 
[   35.348104] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 3

Home

[   54.337879] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[   54.339067] Modules linked in:
[   54.342825] CPU: 1 UID: 0 PID: 389 Comm: kunit_try_catch Tainted: G                 N 6.13.0-rc7 #1
[   54.344296] Tainted: [N]=TEST
[   54.344782] Hardware name: linux,dummy-virt (DT)
[   54.345825] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   54.346652] pc : kunit_test_null_dereference+0x68/0x160
[   54.348845] lr : kunit_generic_run_threadfn_adapter+0x80/0xec
[   54.349520] sp : ffff800080fb7db0
[   54.350105] x29: ffff800080fb7e10 x28: 0000000000000000 x27: 0000000000000000
[   54.351590] x26: 0000000000000000 x25: fff00000c7fda500 x24: fff00000c5e62200
[   54.352647] x23: fff00000c7ca4b80 x22: ffffae27595cc304 x21: fff00000c7ca4b88
[   54.354056] x20: 1ffff000101f6fb6 x19: ffff800080087a10 x18: 00000000352a4afa
[   54.355056] x17: 000000000a1bd9c2 x16: 0000000000000100 x15: fff00000ff80ce40
[   54.356253] x14: 1ffe00001b5300c3 x13: 00000000f1f1f1f1 x12: fffd800018ffb592
[   54.357031] x11: 1ffe000018ffb591 x10: fffd800018ffb591 x9 : dfff800000000000
[   54.357578] x8 : fff00000c7fdac8c x7 : 0000000000000001 x6 : 0000000041b58ab3
[   54.358209] x5 : ffff7000101f6fb6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[   54.359611] x2 : dfff800000000000 x1 : fff00000c7fda500 x0 : ffff800080087a10
[   54.361006] Call trace:
[   54.361806]  kunit_test_null_dereference+0x68/0x160 (P)
[   54.362796]  kunit_generic_run_threadfn_adapter+0x80/0xec
[   54.363528]  kthread+0x2b4/0x338
[   54.364066]  ret_from_fork+0x10/0x20
[   54.365657] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[   54.366941] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 4

Home

[  112.633643] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[  112.635528] Modules linked in:
[  112.636558] CPU: 0 UID: 0 PID: 621 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[  112.637505] Tainted: [B]=BAD_PAGE, [N]=TEST
[  112.638145] Hardware name: linux,dummy-virt (DT)
[  112.638662] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  112.639813] pc : kunit_test_null_dereference+0x70/0x170
[  112.640694] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  112.641563] sp : ffff800083177dc0
[  112.641998] x29: ffff800083177e20 x28: 0000000000000000 x27: 0000000000000000
[  112.643470] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c9daff00
[  112.644889] x23: ffff9b153cfc6f90 x22: ffff9b153cfcfb50 x21: fff00000c9daff08
[  112.645963] x20: 1ffff0001062efb8 x19: ffff8000800879f0 x18: 00000000a76e9934
[  112.646909] x17: 000000008055b2b1 x16: 0000000000000100 x15: 0000000000000000
[  112.648068] x14: 1ffe00001b49c778 x13: fff00000da4e3c98 x12: fffd8000191643a2
[  112.649116] x11: 1ffe0000191643a1 x10: fffd8000191643a1 x9 : ffff9b153cfc7018
[  112.650156] x8 : ffff800083177cb8 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  112.651201] x5 : ffff70001062efb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  112.652392] x2 : dfff800000000000 x1 : fff00000c8b21440 x0 : ffff8000800879f0
[  112.653691] Call trace:
[  112.654100]  kunit_test_null_dereference+0x70/0x170 (P)
[  112.654712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  112.655400]  kthread+0x24c/0x2d0
[  112.655931]  ret_from_fork+0x10/0x20
[  112.657443] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  112.658772] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 5

Home

[   26.862356] ==================================================================
[   26.863623] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   26.865011] Read of size 1 at addr ffff800080977bdf by task kunit_try_catch/240
[   26.865896] 
[   26.866273] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   26.868523] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.868996] Hardware name: linux,dummy-virt (DT)
[   26.869450] Call trace:
[   26.869756]  show_stack+0x20/0x38 (C)
[   26.870285]  dump_stack_lvl+0x8c/0xd0
[   26.870780]  print_report+0x2fc/0x5e0
[   26.871574]  kasan_report+0xc8/0x118
[   26.872243]  __asan_report_load1_noabort+0x20/0x30
[   26.872792]  kasan_alloca_oob_left+0x2b8/0x310
[   26.873386]  kunit_try_run_case+0x14c/0x3d0
[   26.873960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.874776]  kthread+0x24c/0x2d0
[   26.875906]  ret_from_fork+0x10/0x20
[   26.876429] 
[   26.876866] The buggy address belongs to stack of task kunit_try_catch/240
[   26.877675] 
[   26.877968] The buggy address belongs to the virtual mapping at
[   26.877968]  [ffff800080970000, ffff800080979000) created by:
[   26.877968]  kernel_clone+0x140/0x788
[   26.879975] 
[   26.880846] The buggy address belongs to the physical page:
[   26.881637] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c83
[   26.882412] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.883321] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   26.884396] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.885281] page dumped because: kasan: bad access detected
[   26.885972] 
[   26.886310] Memory state around the buggy address:
[   26.886958]  ffff800080977a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.888048]  ffff800080977b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.888990] >ffff800080977b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   26.889720]                                                     ^
[   26.890571]  ffff800080977c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[   26.891659]  ffff800080977c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   26.892660] ==================================================================

test log snippet boot parser 6

Home

[   26.900905] ==================================================================
[   26.901978] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2e4/0x348
[   26.903227] Read of size 1 at addr ffff8000809f7bea by task kunit_try_catch/242
[   26.904499] 
[   26.904762] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   26.906294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.906729] Hardware name: linux,dummy-virt (DT)
[   26.907499] Call trace:
[   26.908181]  show_stack+0x20/0x38 (C)
[   26.908891]  dump_stack_lvl+0x8c/0xd0
[   26.909450]  print_report+0x2fc/0x5e0
[   26.910232]  kasan_report+0xc8/0x118
[   26.910922]  __asan_report_load1_noabort+0x20/0x30
[   26.911787]  kasan_alloca_oob_right+0x2e4/0x348
[   26.912459]  kunit_try_run_case+0x14c/0x3d0
[   26.913129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.913912]  kthread+0x24c/0x2d0
[   26.914476]  ret_from_fork+0x10/0x20
[   26.915199] 
[   26.915474] The buggy address belongs to stack of task kunit_try_catch/242
[   26.916137] 
[   26.916373] The buggy address belongs to the virtual mapping at
[   26.916373]  [ffff8000809f0000, ffff8000809f9000) created by:
[   26.916373]  kernel_clone+0x140/0x788
[   26.918977] 
[   26.919561] The buggy address belongs to the physical page:
[   26.920202] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d18
[   26.921102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.921914] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   26.922787] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.923872] page dumped because: kasan: bad access detected
[   26.924359] 
[   26.924585] Memory state around the buggy address:
[   26.925003]  ffff8000809f7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.925721]  ffff8000809f7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.926353] >ffff8000809f7b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   26.927043]                                                           ^
[   26.928162]  ffff8000809f7c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[   26.929217]  ffff8000809f7c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   26.929887] ==================================================================

test log snippet boot parser 7

Home

[   24.691618] ==================================================================
[   24.692389] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   24.693271] Free of addr fff00000c63157c0 by task kunit_try_catch/181
[   24.694361] 
[   24.694936] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   24.696830] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.697764] Hardware name: linux,dummy-virt (DT)
[   24.698260] Call trace:
[   24.698537]  show_stack+0x20/0x38 (C)
[   24.699298]  dump_stack_lvl+0x8c/0xd0
[   24.700133]  print_report+0x118/0x5e0
[   24.701062]  kasan_report_invalid_free+0xb0/0xd8
[   24.701953]  check_slab_allocation+0xd4/0x108
[   24.702304]  __kasan_slab_pre_free+0x2c/0x48
[   24.702569]  kfree+0xe8/0x3c8
[   24.702805]  kfree_sensitive+0x3c/0xb0
[   24.703387]  kmalloc_double_kzfree+0x168/0x308
[   24.704253]  kunit_try_run_case+0x14c/0x3d0
[   24.704944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.705976]  kthread+0x24c/0x2d0
[   24.706656]  ret_from_fork+0x10/0x20
[   24.707780] 
[   24.708494] Allocated by task 181:
[   24.708947]  kasan_save_stack+0x3c/0x68
[   24.709460]  kasan_save_track+0x20/0x40
[   24.709948]  kasan_save_alloc_info+0x40/0x58
[   24.710456]  __kasan_kmalloc+0xd4/0xd8
[   24.711936]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.712408]  kmalloc_double_kzfree+0xb8/0x308
[   24.713165]  kunit_try_run_case+0x14c/0x3d0
[   24.713790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.714532]  kthread+0x24c/0x2d0
[   24.715098]  ret_from_fork+0x10/0x20
[   24.715733] 
[   24.716155] Freed by task 181:
[   24.716697]  kasan_save_stack+0x3c/0x68
[   24.717313]  kasan_save_track+0x20/0x40
[   24.717774]  kasan_save_free_info+0x4c/0x78
[   24.718472]  __kasan_slab_free+0x6c/0x98
[   24.719442]  kfree+0x114/0x3c8
[   24.719988]  kfree_sensitive+0x80/0xb0
[   24.720492]  kmalloc_double_kzfree+0x11c/0x308
[   24.721064]  kunit_try_run_case+0x14c/0x3d0
[   24.721603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.722270]  kthread+0x24c/0x2d0
[   24.722824]  ret_from_fork+0x10/0x20
[   24.723630] 
[   24.723956] The buggy address belongs to the object at fff00000c63157c0
[   24.723956]  which belongs to the cache kmalloc-16 of size 16
[   24.725172] The buggy address is located 0 bytes inside of
[   24.725172]  16-byte region [fff00000c63157c0, fff00000c63157d0)
[   24.726397] 
[   24.726730] The buggy address belongs to the physical page:
[   24.727814] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106315
[   24.728709] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.729451] page_type: f5(slab)
[   24.729950] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.730777] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.732485] page dumped because: kasan: bad access detected
[   24.733046] 
[   24.733353] Memory state around the buggy address:
[   24.734286]  fff00000c6315680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.735039]  fff00000c6315700: fa fb fc fc fa fb fc fc 00 05 fc fc 00 05 fc fc
[   24.736273] >fff00000c6315780: 00 00 fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   24.737208]                                            ^
[   24.737852]  fff00000c6315800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.738609]  fff00000c6315880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.739878] ==================================================================

test log snippet boot parser 8

Home

[   25.297835] ==================================================================
[   25.298718] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   25.299558] Free of addr fff00000c5ce6000 by task kunit_try_catch/198
[   25.300178] 
[   25.300452] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   25.303230] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.303816] Hardware name: linux,dummy-virt (DT)
[   25.304311] Call trace:
[   25.304651]  show_stack+0x20/0x38 (C)
[   25.305275]  dump_stack_lvl+0x8c/0xd0
[   25.305826]  print_report+0x118/0x5e0
[   25.306375]  kasan_report_invalid_free+0xb0/0xd8
[   25.307015]  check_slab_allocation+0xd4/0x108
[   25.307826]  __kasan_slab_pre_free+0x2c/0x48
[   25.308391]  kmem_cache_free+0xf0/0x470
[   25.308999]  kmem_cache_double_free+0x190/0x3c8
[   25.309590]  kunit_try_run_case+0x14c/0x3d0
[   25.310353]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.311348]  kthread+0x24c/0x2d0
[   25.311811]  ret_from_fork+0x10/0x20
[   25.312312] 
[   25.312616] Allocated by task 198:
[   25.313052]  kasan_save_stack+0x3c/0x68
[   25.313617]  kasan_save_track+0x20/0x40
[   25.314220]  kasan_save_alloc_info+0x40/0x58
[   25.314841]  __kasan_slab_alloc+0xa8/0xb0
[   25.315470]  kmem_cache_alloc_noprof+0x108/0x398
[   25.316890]  kmem_cache_double_free+0x12c/0x3c8
[   25.317447]  kunit_try_run_case+0x14c/0x3d0
[   25.318045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.318722]  kthread+0x24c/0x2d0
[   25.319957]  ret_from_fork+0x10/0x20
[   25.320454] 
[   25.320725] Freed by task 198:
[   25.321220]  kasan_save_stack+0x3c/0x68
[   25.321835]  kasan_save_track+0x20/0x40
[   25.322407]  kasan_save_free_info+0x4c/0x78
[   25.323337]  __kasan_slab_free+0x6c/0x98
[   25.323850]  kmem_cache_free+0x118/0x470
[   25.324424]  kmem_cache_double_free+0x140/0x3c8
[   25.325020]  kunit_try_run_case+0x14c/0x3d0
[   25.325637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.326302]  kthread+0x24c/0x2d0
[   25.326784]  ret_from_fork+0x10/0x20
[   25.327637] 
[   25.327977] The buggy address belongs to the object at fff00000c5ce6000
[   25.327977]  which belongs to the cache test_cache of size 200
[   25.329346] The buggy address is located 0 bytes inside of
[   25.329346]  200-byte region [fff00000c5ce6000, fff00000c5ce60c8)
[   25.330519] 
[   25.330886] The buggy address belongs to the physical page:
[   25.331920] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6
[   25.332851] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.333626] page_type: f5(slab)
[   25.334123] raw: 0bfffe0000000000 fff00000c565a780 dead000000000122 0000000000000000
[   25.334881] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   25.336704] page dumped because: kasan: bad access detected
[   25.337360] 
[   25.337620] Memory state around the buggy address:
[   25.338271]  fff00000c5ce5f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.339049]  fff00000c5ce5f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.339931] >fff00000c5ce6000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.340700]                    ^
[   25.341591]  fff00000c5ce6080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   25.342368]  fff00000c5ce6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.343443] ==================================================================

test log snippet boot parser 9

Home

[   26.639230] ==================================================================
[   26.640979] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   26.641783] Free of addr fff00000c66dc000 by task kunit_try_catch/228
[   26.642429] 
[   26.642981] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   26.644316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.645304] Hardware name: linux,dummy-virt (DT)
[   26.646060] Call trace:
[   26.646581]  show_stack+0x20/0x38 (C)
[   26.647684]  dump_stack_lvl+0x8c/0xd0
[   26.648381]  print_report+0x118/0x5e0
[   26.648881]  kasan_report_invalid_free+0xb0/0xd8
[   26.649547]  __kasan_mempool_poison_pages+0xe0/0xe8
[   26.650292]  mempool_free+0x24c/0x328
[   26.651093]  mempool_double_free_helper+0x150/0x2e0
[   26.651860]  mempool_page_alloc_double_free+0xb4/0x110
[   26.652450]  kunit_try_run_case+0x14c/0x3d0
[   26.652984]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.653716]  kthread+0x24c/0x2d0
[   26.654231]  ret_from_fork+0x10/0x20
[   26.654736] 
[   26.655499] The buggy address belongs to the physical page:
[   26.656293] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066dc
[   26.657186] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.658165] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   26.659131] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.660518] page dumped because: kasan: bad access detected
[   26.661359] 
[   26.661816] Memory state around the buggy address:
[   26.662424]  fff00000c66dbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.663860]  fff00000c66dbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.664671] >fff00000c66dc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.665443]                    ^
[   26.666167]  fff00000c66dc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.667102]  fff00000c66dc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.667852] ==================================================================

test log snippet boot parser 10

Home

[   26.599893] ==================================================================
[   26.601218] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   26.602149] Free of addr fff00000c66dc000 by task kunit_try_catch/226
[   26.602964] 
[   26.603322] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   26.604580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.605348] Hardware name: linux,dummy-virt (DT)
[   26.605965] Call trace:
[   26.606379]  show_stack+0x20/0x38 (C)
[   26.607145]  dump_stack_lvl+0x8c/0xd0
[   26.608077]  print_report+0x118/0x5e0
[   26.608678]  kasan_report_invalid_free+0xb0/0xd8
[   26.609361]  __kasan_mempool_poison_object+0x14c/0x150
[   26.610074]  mempool_free+0x28c/0x328
[   26.610691]  mempool_double_free_helper+0x150/0x2e0
[   26.611513]  mempool_kmalloc_large_double_free+0xb8/0x110
[   26.612613]  kunit_try_run_case+0x14c/0x3d0
[   26.613251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.614018]  kthread+0x24c/0x2d0
[   26.614584]  ret_from_fork+0x10/0x20
[   26.615238] 
[   26.615484] The buggy address belongs to the physical page:
[   26.616680] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066dc
[   26.617507] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.618334] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.619781] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.620526] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.621457] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.622431] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.623590] head: 0bfffe0000000002 ffffc1ffc319b701 ffffffffffffffff 0000000000000000
[   26.624282] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   26.624958] page dumped because: kasan: bad access detected
[   26.625474] 
[   26.625685] Memory state around the buggy address:
[   26.626131]  fff00000c66dbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.626974]  fff00000c66dbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.627612] >fff00000c66dc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.628265]                    ^
[   26.628614]  fff00000c66dc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.629258]  fff00000c66dc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.630860] ==================================================================

test log snippet boot parser 11

Home

[   26.541772] ==================================================================
[   26.542713] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   26.543439] Free of addr fff00000c5d0cf00 by task kunit_try_catch/224
[   26.544262] 
[   26.544595] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   26.545892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.546482] Hardware name: linux,dummy-virt (DT)
[   26.548202] Call trace:
[   26.548571]  show_stack+0x20/0x38 (C)
[   26.549110]  dump_stack_lvl+0x8c/0xd0
[   26.549676]  print_report+0x118/0x5e0
[   26.550335]  kasan_report_invalid_free+0xb0/0xd8
[   26.551018]  check_slab_allocation+0xd4/0x108
[   26.551938]  __kasan_mempool_poison_object+0x78/0x150
[   26.552570]  mempool_free+0x28c/0x328
[   26.553305]  mempool_double_free_helper+0x150/0x2e0
[   26.553988]  mempool_kmalloc_double_free+0xb8/0x110
[   26.554643]  kunit_try_run_case+0x14c/0x3d0
[   26.555512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.556233]  kthread+0x24c/0x2d0
[   26.556763]  ret_from_fork+0x10/0x20
[   26.557300] 
[   26.557574] Allocated by task 224:
[   26.558104]  kasan_save_stack+0x3c/0x68
[   26.558672]  kasan_save_track+0x20/0x40
[   26.559232]  kasan_save_alloc_info+0x40/0x58
[   26.560018]  __kasan_mempool_unpoison_object+0x11c/0x180
[   26.560658]  remove_element+0x130/0x1f8
[   26.561154]  mempool_alloc_preallocated+0x58/0xc0
[   26.561858]  mempool_double_free_helper+0x94/0x2e0
[   26.562440]  mempool_kmalloc_double_free+0xb8/0x110
[   26.563332]  kunit_try_run_case+0x14c/0x3d0
[   26.563727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.564392]  kthread+0x24c/0x2d0
[   26.565684]  ret_from_fork+0x10/0x20
[   26.566184] 
[   26.566497] Freed by task 224:
[   26.566987]  kasan_save_stack+0x3c/0x68
[   26.567701]  kasan_save_track+0x20/0x40
[   26.568194]  kasan_save_free_info+0x4c/0x78
[   26.568716]  __kasan_mempool_poison_object+0xc0/0x150
[   26.569306]  mempool_free+0x28c/0x328
[   26.569800]  mempool_double_free_helper+0x100/0x2e0
[   26.570394]  mempool_kmalloc_double_free+0xb8/0x110
[   26.571156]  kunit_try_run_case+0x14c/0x3d0
[   26.571590]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.572140]  kthread+0x24c/0x2d0
[   26.572498]  ret_from_fork+0x10/0x20
[   26.573580] 
[   26.573871] The buggy address belongs to the object at fff00000c5d0cf00
[   26.573871]  which belongs to the cache kmalloc-128 of size 128
[   26.575682] The buggy address is located 0 bytes inside of
[   26.575682]  128-byte region [fff00000c5d0cf00, fff00000c5d0cf80)
[   26.576828] 
[   26.577181] The buggy address belongs to the physical page:
[   26.578021] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d0c
[   26.578939] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.580079] page_type: f5(slab)
[   26.580480] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.581292] raw: 0000000000000000 0000000000100010 00000001f5000000 0000000000000000
[   26.582445] page dumped because: kasan: bad access detected
[   26.583951] 
[   26.584396] Memory state around the buggy address:
[   26.585108]  fff00000c5d0ce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.586134]  fff00000c5d0ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.587430] >fff00000c5d0cf00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.588097]                    ^
[   26.588551]  fff00000c5d0cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.589311]  fff00000c5d0d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.590399] ==================================================================

test log snippet boot parser 12

Home

[   26.769155] ==================================================================
[   26.770408] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   26.771325] Read of size 1 at addr ffff9b15434b202d by task kunit_try_catch/234
[   26.772341] 
[   26.772849] CPU: 0 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   26.773930] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.774480] Hardware name: linux,dummy-virt (DT)
[   26.775394] Call trace:
[   26.775670]  show_stack+0x20/0x38 (C)
[   26.776189]  dump_stack_lvl+0x8c/0xd0
[   26.776607]  print_report+0x2fc/0x5e0
[   26.778505]  kasan_report+0xc8/0x118
[   26.779058]  __asan_report_load1_noabort+0x20/0x30
[   26.779774]  kasan_global_oob_right+0x230/0x270
[   26.780617]  kunit_try_run_case+0x14c/0x3d0
[   26.781343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.782171]  kthread+0x24c/0x2d0
[   26.782670]  ret_from_fork+0x10/0x20
[   26.783576] 
[   26.784136] The buggy address belongs to the variable:
[   26.784940]  global_array+0xd/0x40
[   26.785401] 
[   26.786173] The buggy address belongs to the virtual mapping at
[   26.786173]  [ffff9b1541810000, ffff9b1543571000) created by:
[   26.786173]  paging_init+0x668/0x7c8
[   26.788153] 
[   26.788973] The buggy address belongs to the physical page:
[   26.789491] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x478b2
[   26.790308] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   26.792107] raw: 03fffe0000002000 ffffc1ffc01e2c88 ffffc1ffc01e2c88 0000000000000000
[   26.792863] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.793783] page dumped because: kasan: bad access detected
[   26.794538] 
[   26.795011] Memory state around the buggy address:
[   26.796163]  ffff9b15434b1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.797076]  ffff9b15434b1f80: 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9 f9
[   26.798046] >ffff9b15434b2000: f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9
[   26.798801]                                   ^
[   26.799523]  ffff9b15434b2080: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9
[   26.800821]  ffff9b15434b2100: f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00
[   26.801725] ==================================================================

test log snippet boot parser 13

Home

[   23.209704] ==================================================================
[   23.210791] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   23.211568] Free of addr fff00000c65fc001 by task kunit_try_catch/139
[   23.212254] 
[   23.212640] CPU: 0 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   23.213670] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.214138] Hardware name: linux,dummy-virt (DT)
[   23.214685] Call trace:
[   23.215180]  show_stack+0x20/0x38 (C)
[   23.215712]  dump_stack_lvl+0x8c/0xd0
[   23.216399]  print_report+0x118/0x5e0
[   23.216937]  kasan_report_invalid_free+0xb0/0xd8
[   23.217559]  __kasan_kfree_large+0x5c/0xa8
[   23.218080]  free_large_kmalloc+0x58/0x140
[   23.218724]  kfree+0x270/0x3c8
[   23.219189]  kmalloc_large_invalid_free+0x108/0x270
[   23.219932]  kunit_try_run_case+0x14c/0x3d0
[   23.220443]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.221137]  kthread+0x24c/0x2d0
[   23.221735]  ret_from_fork+0x10/0x20
[   23.222286] 
[   23.222622] The buggy address belongs to the physical page:
[   23.223285] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065fc
[   23.224272] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.225092] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.225909] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.226815] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.227651] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.228476] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.229324] head: 0bfffe0000000002 ffffc1ffc3197f01 ffffffffffffffff 0000000000000000
[   23.230183] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.230990] page dumped because: kasan: bad access detected
[   23.231656] 
[   23.232002] Memory state around the buggy address:
[   23.232598]  fff00000c65fbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.233401]  fff00000c65fbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.234143] >fff00000c65fc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.234912]                    ^
[   23.235426]  fff00000c65fc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.236159]  fff00000c65fc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.237040] ==================================================================

test log snippet boot parser 14

Home

[   25.362638] ==================================================================
[   25.364358] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3b8
[   25.365896] Free of addr fff00000c5d06001 by task kunit_try_catch/200
[   25.366618] 
[   25.366986] CPU: 0 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   25.368289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.369074] Hardware name: linux,dummy-virt (DT)
[   25.369522] Call trace:
[   25.369832]  show_stack+0x20/0x38 (C)
[   25.370256]  dump_stack_lvl+0x8c/0xd0
[   25.370675]  print_report+0x118/0x5e0
[   25.371633]  kasan_report_invalid_free+0xb0/0xd8
[   25.372344]  check_slab_allocation+0xfc/0x108
[   25.372919]  __kasan_slab_pre_free+0x2c/0x48
[   25.373410]  kmem_cache_free+0xf0/0x470
[   25.374172]  kmem_cache_invalid_free+0x184/0x3b8
[   25.375249]  kunit_try_run_case+0x14c/0x3d0
[   25.375867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.376965]  kthread+0x24c/0x2d0
[   25.377609]  ret_from_fork+0x10/0x20
[   25.378311] 
[   25.378785] Allocated by task 200:
[   25.379652]  kasan_save_stack+0x3c/0x68
[   25.380167]  kasan_save_track+0x20/0x40
[   25.380574]  kasan_save_alloc_info+0x40/0x58
[   25.381040]  __kasan_slab_alloc+0xa8/0xb0
[   25.381453]  kmem_cache_alloc_noprof+0x108/0x398
[   25.382996]  kmem_cache_invalid_free+0x12c/0x3b8
[   25.383919]  kunit_try_run_case+0x14c/0x3d0
[   25.384427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.385025]  kthread+0x24c/0x2d0
[   25.385509]  ret_from_fork+0x10/0x20
[   25.386326] 
[   25.386879] The buggy address belongs to the object at fff00000c5d06000
[   25.386879]  which belongs to the cache test_cache of size 200
[   25.388709] The buggy address is located 1 bytes inside of
[   25.388709]  200-byte region [fff00000c5d06000, fff00000c5d060c8)
[   25.390226] 
[   25.390703] The buggy address belongs to the physical page:
[   25.391544] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d06
[   25.392644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.393479] page_type: f5(slab)
[   25.394205] raw: 0bfffe0000000000 fff00000c10d0dc0 dead000000000122 0000000000000000
[   25.395253] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   25.396439] page dumped because: kasan: bad access detected
[   25.397224] 
[   25.397703] Memory state around the buggy address:
[   25.398346]  fff00000c5d05f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.399668]  fff00000c5d05f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.400840] >fff00000c5d06000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.401759]                    ^
[   25.402224]  fff00000c5d06080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   25.403400]  fff00000c5d06100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.404234] ==================================================================

test log snippet boot parser 15

Home

[   26.677599] ==================================================================
[   26.678870] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   26.680076] Free of addr fff00000c5cff701 by task kunit_try_catch/230
[   26.680971] 
[   26.681286] CPU: 1 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   26.682284] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.682784] Hardware name: linux,dummy-virt (DT)
[   26.683506] Call trace:
[   26.683856]  show_stack+0x20/0x38 (C)
[   26.684594]  dump_stack_lvl+0x8c/0xd0
[   26.685355]  print_report+0x118/0x5e0
[   26.685992]  kasan_report_invalid_free+0xb0/0xd8
[   26.686643]  check_slab_allocation+0xfc/0x108
[   26.687382]  __kasan_mempool_poison_object+0x78/0x150
[   26.688314]  mempool_free+0x28c/0x328
[   26.688949]  mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   26.689674]  mempool_kmalloc_invalid_free+0xb8/0x110
[   26.690329]  kunit_try_run_case+0x14c/0x3d0
[   26.691028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.691963]  kthread+0x24c/0x2d0
[   26.692484]  ret_from_fork+0x10/0x20
[   26.693132] 
[   26.693508] Allocated by task 230:
[   26.693968]  kasan_save_stack+0x3c/0x68
[   26.694644]  kasan_save_track+0x20/0x40
[   26.695464]  kasan_save_alloc_info+0x40/0x58
[   26.695929]  __kasan_mempool_unpoison_object+0x11c/0x180
[   26.696445]  remove_element+0x130/0x1f8
[   26.697452]  mempool_alloc_preallocated+0x58/0xc0
[   26.698193]  mempool_kmalloc_invalid_free_helper+0x94/0x2a0
[   26.698857]  mempool_kmalloc_invalid_free+0xb8/0x110
[   26.699958]  kunit_try_run_case+0x14c/0x3d0
[   26.700660]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.701203]  kthread+0x24c/0x2d0
[   26.702161]  ret_from_fork+0x10/0x20
[   26.702958] 
[   26.703760] The buggy address belongs to the object at fff00000c5cff700
[   26.703760]  which belongs to the cache kmalloc-128 of size 128
[   26.706247] The buggy address is located 1 bytes inside of
[   26.706247]  128-byte region [fff00000c5cff700, fff00000c5cff780)
[   26.707903] 
[   26.708134] The buggy address belongs to the physical page:
[   26.709082] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cff
[   26.710071] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.711382] page_type: f5(slab)
[   26.711800] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.712838] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   26.713811] page dumped because: kasan: bad access detected
[   26.714601] 
[   26.715212] Memory state around the buggy address:
[   26.715650]  fff00000c5cff600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.716314]  fff00000c5cff680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.717648] >fff00000c5cff700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.718582]                    ^
[   26.719969]  fff00000c5cff780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.720894]  fff00000c5cff800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.721697] ==================================================================

test log snippet boot parser 16

Home

[   26.730170] ==================================================================
[   26.731317] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   26.732489] Free of addr fff00000c66dc001 by task kunit_try_catch/232
[   26.733034] 
[   26.733291] CPU: 0 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   26.734786] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.735840] Hardware name: linux,dummy-virt (DT)
[   26.736393] Call trace:
[   26.736728]  show_stack+0x20/0x38 (C)
[   26.737335]  dump_stack_lvl+0x8c/0xd0
[   26.737843]  print_report+0x118/0x5e0
[   26.738433]  kasan_report_invalid_free+0xb0/0xd8
[   26.739092]  __kasan_mempool_poison_object+0xfc/0x150
[   26.739806]  mempool_free+0x28c/0x328
[   26.740471]  mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   26.741804]  mempool_kmalloc_large_invalid_free+0xb8/0x110
[   26.742813]  kunit_try_run_case+0x14c/0x3d0
[   26.743408]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.744016]  kthread+0x24c/0x2d0
[   26.744389]  ret_from_fork+0x10/0x20
[   26.745103] 
[   26.745374] The buggy address belongs to the physical page:
[   26.745884] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066dc
[   26.746685] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.748497] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.749488] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.750329] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.751139] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.752038] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.753008] head: 0bfffe0000000002 ffffc1ffc319b701 ffffffffffffffff 0000000000000000
[   26.753638] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   26.754105] page dumped because: kasan: bad access detected
[   26.754371] 
[   26.754499] Memory state around the buggy address:
[   26.755050]  fff00000c66dbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.755699]  fff00000c66dbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.756442] >fff00000c66dc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.757143]                    ^
[   26.757892]  fff00000c66dc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.758439]  fff00000c66dc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.759927] ==================================================================

test log snippet boot parser 17

Home

[   24.373458] ==================================================================
[   24.374911] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   24.375833] Read of size 18446744073709551614 at addr fff00000c5ca6b04 by task kunit_try_catch/169
[   24.376646] 
[   24.376892] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   24.377718] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.379468] Hardware name: linux,dummy-virt (DT)
[   24.380342] Call trace:
[   24.380908]  show_stack+0x20/0x38 (C)
[   24.381585]  dump_stack_lvl+0x8c/0xd0
[   24.382289]  print_report+0x118/0x5e0
[   24.382986]  kasan_report+0xc8/0x118
[   24.383835]  kasan_check_range+0x100/0x1a8
[   24.384508]  __asan_memmove+0x3c/0x98
[   24.385032]  kmalloc_memmove_negative_size+0x154/0x2e0
[   24.385637]  kunit_try_run_case+0x14c/0x3d0
[   24.386417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.387427]  kthread+0x24c/0x2d0
[   24.387961]  ret_from_fork+0x10/0x20
[   24.388472] 
[   24.389258] Allocated by task 169:
[   24.389659]  kasan_save_stack+0x3c/0x68
[   24.390359]  kasan_save_track+0x20/0x40
[   24.391061]  kasan_save_alloc_info+0x40/0x58
[   24.391925]  __kasan_kmalloc+0xd4/0xd8
[   24.392589]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.393162]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   24.394207]  kunit_try_run_case+0x14c/0x3d0
[   24.394702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.396346]  kthread+0x24c/0x2d0
[   24.397003]  ret_from_fork+0x10/0x20
[   24.397664] 
[   24.398182] The buggy address belongs to the object at fff00000c5ca6b00
[   24.398182]  which belongs to the cache kmalloc-64 of size 64
[   24.400105] The buggy address is located 4 bytes inside of
[   24.400105]  64-byte region [fff00000c5ca6b00, fff00000c5ca6b40)
[   24.401315] 
[   24.401687] The buggy address belongs to the physical page:
[   24.402431] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ca6
[   24.403373] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.404538] page_type: f5(slab)
[   24.405047] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.406255] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.406990] page dumped because: kasan: bad access detected
[   24.408021] 
[   24.408464] Memory state around the buggy address:
[   24.409095]  fff00000c5ca6a00: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   24.410028]  fff00000c5ca6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.411106] >fff00000c5ca6b00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   24.412151]                    ^
[   24.412799]  fff00000c5ca6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.413784]  fff00000c5ca6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.414504] ==================================================================

test log snippet boot parser 18

Home

[   30.717766] ==================================================================
[   30.718734] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   30.719584] Write of size 8 at addr fff00000c5d52778 by task kunit_try_catch/270
[   30.720709] 
[   30.721135] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.722168] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.723034] Hardware name: linux,dummy-virt (DT)
[   30.724088] Call trace:
[   30.724396]  show_stack+0x20/0x38 (C)
[   30.724837]  dump_stack_lvl+0x8c/0xd0
[   30.726417]  print_report+0x118/0x5e0
[   30.727235]  kasan_report+0xc8/0x118
[   30.727962]  kasan_check_range+0x100/0x1a8
[   30.728402]  __kasan_check_write+0x20/0x30
[   30.728861]  copy_to_kernel_nofault+0x8c/0x250
[   30.729337]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   30.730527]  kunit_try_run_case+0x14c/0x3d0
[   30.731534]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.733138]  kthread+0x24c/0x2d0
[   30.733688]  ret_from_fork+0x10/0x20
[   30.734335] 
[   30.734721] Allocated by task 270:
[   30.735494]  kasan_save_stack+0x3c/0x68
[   30.736022]  kasan_save_track+0x20/0x40
[   30.736429]  kasan_save_alloc_info+0x40/0x58
[   30.736887]  __kasan_kmalloc+0xd4/0xd8
[   30.737293]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.738379]  copy_to_kernel_nofault_oob+0xc8/0x418
[   30.739025]  kunit_try_run_case+0x14c/0x3d0
[   30.740139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.741088]  kthread+0x24c/0x2d0
[   30.741699]  ret_from_fork+0x10/0x20
[   30.742372] 
[   30.742827] The buggy address belongs to the object at fff00000c5d52700
[   30.742827]  which belongs to the cache kmalloc-128 of size 128
[   30.744433] The buggy address is located 0 bytes to the right of
[   30.744433]  allocated 120-byte region [fff00000c5d52700, fff00000c5d52778)
[   30.745665] 
[   30.746217] The buggy address belongs to the physical page:
[   30.746584] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d52
[   30.748315] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.749097] page_type: f5(slab)
[   30.749553] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.750436] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.751363] page dumped because: kasan: bad access detected
[   30.752219] 
[   30.752530] Memory state around the buggy address:
[   30.753104]  fff00000c5d52600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.754274]  fff00000c5d52680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.755052] >fff00000c5d52700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.756364]                                                                 ^
[   30.757099]  fff00000c5d52780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.757793]  fff00000c5d52800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.759254] ==================================================================

test log snippet boot parser 19

Home

[   30.672990] ==================================================================
[   30.674373] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   30.675172] Read of size 8 at addr fff00000c5d52778 by task kunit_try_catch/270
[   30.675794] 
[   30.676169] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.678292] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.678986] Hardware name: linux,dummy-virt (DT)
[   30.679817] Call trace:
[   30.680478]  show_stack+0x20/0x38 (C)
[   30.680989]  dump_stack_lvl+0x8c/0xd0
[   30.681903]  print_report+0x118/0x5e0
[   30.682612]  kasan_report+0xc8/0x118
[   30.683387]  __asan_report_load8_noabort+0x20/0x30
[   30.684328]  copy_to_kernel_nofault+0x204/0x250
[   30.684957]  copy_to_kernel_nofault_oob+0x158/0x418
[   30.685525]  kunit_try_run_case+0x14c/0x3d0
[   30.685979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.687184]  kthread+0x24c/0x2d0
[   30.687948]  ret_from_fork+0x10/0x20
[   30.688533] 
[   30.688958] Allocated by task 270:
[   30.689410]  kasan_save_stack+0x3c/0x68
[   30.689986]  kasan_save_track+0x20/0x40
[   30.690511]  kasan_save_alloc_info+0x40/0x58
[   30.691107]  __kasan_kmalloc+0xd4/0xd8
[   30.692038]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.693249]  copy_to_kernel_nofault_oob+0xc8/0x418
[   30.694058]  kunit_try_run_case+0x14c/0x3d0
[   30.694800]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.695793]  kthread+0x24c/0x2d0
[   30.696316]  ret_from_fork+0x10/0x20
[   30.697066] 
[   30.697324] The buggy address belongs to the object at fff00000c5d52700
[   30.697324]  which belongs to the cache kmalloc-128 of size 128
[   30.699844] The buggy address is located 0 bytes to the right of
[   30.699844]  allocated 120-byte region [fff00000c5d52700, fff00000c5d52778)
[   30.701324] 
[   30.701657] The buggy address belongs to the physical page:
[   30.702454] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d52
[   30.703330] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.704173] page_type: f5(slab)
[   30.704673] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.706127] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.707917] page dumped because: kasan: bad access detected
[   30.708476] 
[   30.708796] Memory state around the buggy address:
[   30.709346]  fff00000c5d52600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.710129]  fff00000c5d52680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.711547] >fff00000c5d52700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.712250]                                                                 ^
[   30.713075]  fff00000c5d52780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.713930]  fff00000c5d52800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.714757] ==================================================================

test log snippet boot parser 20

Home

[   31.001392] ==================================================================
[   31.002316] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0
[   31.003933] Read of size 121 at addr fff00000c5d54b00 by task kunit_try_catch/274
[   31.005116] 
[   31.005630] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   31.006792] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.007536] Hardware name: linux,dummy-virt (DT)
[   31.008343] Call trace:
[   31.008735]  show_stack+0x20/0x38 (C)
[   31.009312]  dump_stack_lvl+0x8c/0xd0
[   31.010175]  print_report+0x118/0x5e0
[   31.010600]  kasan_report+0xc8/0x118
[   31.011276]  kasan_check_range+0x100/0x1a8
[   31.011992]  __kasan_check_read+0x20/0x30
[   31.012621]  copy_user_test_oob+0x4a0/0xec0
[   31.013273]  kunit_try_run_case+0x14c/0x3d0
[   31.013981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.014823]  kthread+0x24c/0x2d0
[   31.015416]  ret_from_fork+0x10/0x20
[   31.016034] 
[   31.016363] Allocated by task 274:
[   31.016895]  kasan_save_stack+0x3c/0x68
[   31.017565]  kasan_save_track+0x20/0x40
[   31.018168]  kasan_save_alloc_info+0x40/0x58
[   31.018845]  __kasan_kmalloc+0xd4/0xd8
[   31.019482]  __kmalloc_noprof+0x188/0x4c8
[   31.020076]  kunit_kmalloc_array+0x34/0x88
[   31.020684]  copy_user_test_oob+0xac/0xec0
[   31.021338]  kunit_try_run_case+0x14c/0x3d0
[   31.022018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.022797]  kthread+0x24c/0x2d0
[   31.023387]  ret_from_fork+0x10/0x20
[   31.023967] 
[   31.024365] The buggy address belongs to the object at fff00000c5d54b00
[   31.024365]  which belongs to the cache kmalloc-128 of size 128
[   31.025679] The buggy address is located 0 bytes inside of
[   31.025679]  allocated 120-byte region [fff00000c5d54b00, fff00000c5d54b78)
[   31.027007] 
[   31.027378] The buggy address belongs to the physical page:
[   31.028078] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d54
[   31.029098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.029942] page_type: f5(slab)
[   31.030474] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.031385] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.032257] page dumped because: kasan: bad access detected
[   31.032954] 
[   31.033177] Memory state around the buggy address:
[   31.033646]  fff00000c5d54a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.034903]  fff00000c5d54a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.035639] >fff00000c5d54b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.036287]                                                                 ^
[   31.037598]  fff00000c5d54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.038491]  fff00000c5d54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.039348] ==================================================================
---
[   30.918083] ==================================================================
[   30.919245] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0
[   30.919977] Read of size 121 at addr fff00000c5d54b00 by task kunit_try_catch/274
[   30.921395] 
[   30.921898] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.922819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.923348] Hardware name: linux,dummy-virt (DT)
[   30.923920] Call trace:
[   30.924286]  show_stack+0x20/0x38 (C)
[   30.925394]  dump_stack_lvl+0x8c/0xd0
[   30.925818]  print_report+0x118/0x5e0
[   30.926500]  kasan_report+0xc8/0x118
[   30.927207]  kasan_check_range+0x100/0x1a8
[   30.927952]  __kasan_check_read+0x20/0x30
[   30.928653]  copy_user_test_oob+0x3c8/0xec0
[   30.929399]  kunit_try_run_case+0x14c/0x3d0
[   30.930128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.930972]  kthread+0x24c/0x2d0
[   30.931618]  ret_from_fork+0x10/0x20
[   30.932350] 
[   30.932805] Allocated by task 274:
[   30.933366]  kasan_save_stack+0x3c/0x68
[   30.934040]  kasan_save_track+0x20/0x40
[   30.934605]  kasan_save_alloc_info+0x40/0x58
[   30.935260]  __kasan_kmalloc+0xd4/0xd8
[   30.935819]  __kmalloc_noprof+0x188/0x4c8
[   30.936409]  kunit_kmalloc_array+0x34/0x88
[   30.936950]  copy_user_test_oob+0xac/0xec0
[   30.937634]  kunit_try_run_case+0x14c/0x3d0
[   30.938189]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.939023]  kthread+0x24c/0x2d0
[   30.939579]  ret_from_fork+0x10/0x20
[   30.940220] 
[   30.940625] The buggy address belongs to the object at fff00000c5d54b00
[   30.940625]  which belongs to the cache kmalloc-128 of size 128
[   30.942181] The buggy address is located 0 bytes inside of
[   30.942181]  allocated 120-byte region [fff00000c5d54b00, fff00000c5d54b78)
[   30.943621] 
[   30.944081] The buggy address belongs to the physical page:
[   30.944873] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d54
[   30.945878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.946838] page_type: f5(slab)
[   30.947327] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.948407] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.949384] page dumped because: kasan: bad access detected
[   30.950229] 
[   30.950716] Memory state around the buggy address:
[   30.951299]  fff00000c5d54a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.952068]  fff00000c5d54a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.953337] >fff00000c5d54b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.954043]                                                                 ^
[   30.954978]  fff00000c5d54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.955930]  fff00000c5d54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.956912] ==================================================================
---
[   30.833952] ==================================================================
[   30.834645] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0
[   30.835354] Read of size 121 at addr fff00000c5d54b00 by task kunit_try_catch/274
[   30.836903] 
[   30.837395] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.838498] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.839058] Hardware name: linux,dummy-virt (DT)
[   30.839798] Call trace:
[   30.840515]  show_stack+0x20/0x38 (C)
[   30.841252]  dump_stack_lvl+0x8c/0xd0
[   30.841932]  print_report+0x118/0x5e0
[   30.842618]  kasan_report+0xc8/0x118
[   30.843372]  kasan_check_range+0x100/0x1a8
[   30.844204]  __kasan_check_read+0x20/0x30
[   30.844781]  copy_user_test_oob+0x728/0xec0
[   30.845324]  kunit_try_run_case+0x14c/0x3d0
[   30.846195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.846996]  kthread+0x24c/0x2d0
[   30.847820]  ret_from_fork+0x10/0x20
[   30.848527] 
[   30.848987] Allocated by task 274:
[   30.849430]  kasan_save_stack+0x3c/0x68
[   30.850139]  kasan_save_track+0x20/0x40
[   30.850820]  kasan_save_alloc_info+0x40/0x58
[   30.851599]  __kasan_kmalloc+0xd4/0xd8
[   30.852018]  __kmalloc_noprof+0x188/0x4c8
[   30.853114]  kunit_kmalloc_array+0x34/0x88
[   30.853435]  copy_user_test_oob+0xac/0xec0
[   30.853670]  kunit_try_run_case+0x14c/0x3d0
[   30.854070]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.854891]  kthread+0x24c/0x2d0
[   30.855337]  ret_from_fork+0x10/0x20
[   30.856145] 
[   30.856842] The buggy address belongs to the object at fff00000c5d54b00
[   30.856842]  which belongs to the cache kmalloc-128 of size 128
[   30.857933] The buggy address is located 0 bytes inside of
[   30.857933]  allocated 120-byte region [fff00000c5d54b00, fff00000c5d54b78)
[   30.859885] 
[   30.860337] The buggy address belongs to the physical page:
[   30.861177] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d54
[   30.862163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.863129] page_type: f5(slab)
[   30.863556] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.864493] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.865269] page dumped because: kasan: bad access detected
[   30.865941] 
[   30.866271] Memory state around the buggy address:
[   30.866922]  fff00000c5d54a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.867922]  fff00000c5d54a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.868653] >fff00000c5d54b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.869485]                                                                 ^
[   30.870541]  fff00000c5d54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.871562]  fff00000c5d54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.872539] ==================================================================

test log snippet boot parser 21

Home

[   30.958697] ==================================================================
[   30.960012] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0
[   30.960799] Write of size 121 at addr fff00000c5d54b00 by task kunit_try_catch/274
[   30.961463] 
[   30.962517] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.963430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.964126] Hardware name: linux,dummy-virt (DT)
[   30.964895] Call trace:
[   30.965443]  show_stack+0x20/0x38 (C)
[   30.966188]  dump_stack_lvl+0x8c/0xd0
[   30.966895]  print_report+0x118/0x5e0
[   30.967589]  kasan_report+0xc8/0x118
[   30.968290]  kasan_check_range+0x100/0x1a8
[   30.968854]  __kasan_check_write+0x20/0x30
[   30.969396]  copy_user_test_oob+0x434/0xec0
[   30.969959]  kunit_try_run_case+0x14c/0x3d0
[   30.970504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.971642]  kthread+0x24c/0x2d0
[   30.972298]  ret_from_fork+0x10/0x20
[   30.973003] 
[   30.973497] Allocated by task 274:
[   30.974078]  kasan_save_stack+0x3c/0x68
[   30.974730]  kasan_save_track+0x20/0x40
[   30.975450]  kasan_save_alloc_info+0x40/0x58
[   30.976196]  __kasan_kmalloc+0xd4/0xd8
[   30.976889]  __kmalloc_noprof+0x188/0x4c8
[   30.977555]  kunit_kmalloc_array+0x34/0x88
[   30.978261]  copy_user_test_oob+0xac/0xec0
[   30.978999]  kunit_try_run_case+0x14c/0x3d0
[   30.979738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.980578]  kthread+0x24c/0x2d0
[   30.981094]  ret_from_fork+0x10/0x20
[   30.981576] 
[   30.982262] The buggy address belongs to the object at fff00000c5d54b00
[   30.982262]  which belongs to the cache kmalloc-128 of size 128
[   30.983767] The buggy address is located 0 bytes inside of
[   30.983767]  allocated 120-byte region [fff00000c5d54b00, fff00000c5d54b78)
[   30.985239] 
[   30.985551] The buggy address belongs to the physical page:
[   30.986230] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d54
[   30.987372] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.988271] page_type: f5(slab)
[   30.988974] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.990009] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.990991] page dumped because: kasan: bad access detected
[   30.991800] 
[   30.992291] Memory state around the buggy address:
[   30.992846]  fff00000c5d54a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.993599]  fff00000c5d54a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.994666] >fff00000c5d54b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.995564]                                                                 ^
[   30.996515]  fff00000c5d54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.997502]  fff00000c5d54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.998455] ==================================================================
---
[   30.784487] ==================================================================
[   30.786190] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0
[   30.786914] Write of size 121 at addr fff00000c5d54b00 by task kunit_try_catch/274
[   30.788680] 
[   30.789257] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.790350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.791031] Hardware name: linux,dummy-virt (DT)
[   30.791986] Call trace:
[   30.792406]  show_stack+0x20/0x38 (C)
[   30.793111]  dump_stack_lvl+0x8c/0xd0
[   30.793803]  print_report+0x118/0x5e0
[   30.794482]  kasan_report+0xc8/0x118
[   30.795352]  kasan_check_range+0x100/0x1a8
[   30.795927]  __kasan_check_write+0x20/0x30
[   30.796467]  copy_user_test_oob+0x234/0xec0
[   30.797022]  kunit_try_run_case+0x14c/0x3d0
[   30.797563]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.798643]  kthread+0x24c/0x2d0
[   30.799772]  ret_from_fork+0x10/0x20
[   30.800173] 
[   30.800613] Allocated by task 274:
[   30.801197]  kasan_save_stack+0x3c/0x68
[   30.801707]  kasan_save_track+0x20/0x40
[   30.802468]  kasan_save_alloc_info+0x40/0x58
[   30.803386]  __kasan_kmalloc+0xd4/0xd8
[   30.804082]  __kmalloc_noprof+0x188/0x4c8
[   30.805255]  kunit_kmalloc_array+0x34/0x88
[   30.805965]  copy_user_test_oob+0xac/0xec0
[   30.806652]  kunit_try_run_case+0x14c/0x3d0
[   30.807498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.808439]  kthread+0x24c/0x2d0
[   30.809141]  ret_from_fork+0x10/0x20
[   30.809631] 
[   30.809954] The buggy address belongs to the object at fff00000c5d54b00
[   30.809954]  which belongs to the cache kmalloc-128 of size 128
[   30.811820] The buggy address is located 0 bytes inside of
[   30.811820]  allocated 120-byte region [fff00000c5d54b00, fff00000c5d54b78)
[   30.813260] 
[   30.813717] The buggy address belongs to the physical page:
[   30.814467] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d54
[   30.815689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.816593] page_type: f5(slab)
[   30.817226] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.818223] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.819032] page dumped because: kasan: bad access detected
[   30.820024] 
[   30.820470] Memory state around the buggy address:
[   30.821174]  fff00000c5d54a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.822038]  fff00000c5d54a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.823818] >fff00000c5d54b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.824550]                                                                 ^
[   30.825489]  fff00000c5d54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.826300]  fff00000c5d54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.827257] ==================================================================
---
[   30.880906] ==================================================================
[   30.881729] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0
[   30.882484] Write of size 121 at addr fff00000c5d54b00 by task kunit_try_catch/274
[   30.883189] 
[   30.883600] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.884670] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.885291] Hardware name: linux,dummy-virt (DT)
[   30.885842] Call trace:
[   30.886373]  show_stack+0x20/0x38 (C)
[   30.887108]  dump_stack_lvl+0x8c/0xd0
[   30.887778]  print_report+0x118/0x5e0
[   30.888480]  kasan_report+0xc8/0x118
[   30.889048]  kasan_check_range+0x100/0x1a8
[   30.889720]  __kasan_check_write+0x20/0x30
[   30.890384]  copy_user_test_oob+0x35c/0xec0
[   30.891060]  kunit_try_run_case+0x14c/0x3d0
[   30.891705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.892444]  kthread+0x24c/0x2d0
[   30.892971]  ret_from_fork+0x10/0x20
[   30.893529] 
[   30.893834] Allocated by task 274:
[   30.894355]  kasan_save_stack+0x3c/0x68
[   30.894960]  kasan_save_track+0x20/0x40
[   30.895561]  kasan_save_alloc_info+0x40/0x58
[   30.896185]  __kasan_kmalloc+0xd4/0xd8
[   30.896795]  __kmalloc_noprof+0x188/0x4c8
[   30.897399]  kunit_kmalloc_array+0x34/0x88
[   30.898025]  copy_user_test_oob+0xac/0xec0
[   30.898654]  kunit_try_run_case+0x14c/0x3d0
[   30.899286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.900015]  kthread+0x24c/0x2d0
[   30.900546]  ret_from_fork+0x10/0x20
[   30.901121] 
[   30.901468] The buggy address belongs to the object at fff00000c5d54b00
[   30.901468]  which belongs to the cache kmalloc-128 of size 128
[   30.902831] The buggy address is located 0 bytes inside of
[   30.902831]  allocated 120-byte region [fff00000c5d54b00, fff00000c5d54b78)
[   30.904156] 
[   30.904527] The buggy address belongs to the physical page:
[   30.905303] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d54
[   30.906205] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.907087] page_type: f5(slab)
[   30.907678] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.908595] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.909427] page dumped because: kasan: bad access detected
[   30.910162] 
[   30.910513] Memory state around the buggy address:
[   30.911174]  fff00000c5d54a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.912008]  fff00000c5d54a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.912870] >fff00000c5d54b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.913683]                                                                 ^
[   30.914510]  fff00000c5d54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.915358]  fff00000c5d54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.916171] ==================================================================

test log snippet boot parser 22

Home

[   29.442210] ==================================================================
[   29.443300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   29.444231] Read of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   29.445237] 
[   29.445691] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.446856] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.447475] Hardware name: linux,dummy-virt (DT)
[   29.448149] Call trace:
[   29.448626]  show_stack+0x20/0x38 (C)
[   29.449279]  dump_stack_lvl+0x8c/0xd0
[   29.449946]  print_report+0x118/0x5e0
[   29.450595]  kasan_report+0xc8/0x118
[   29.451249]  kasan_check_range+0x100/0x1a8
[   29.451908]  __kasan_check_read+0x20/0x30
[   29.452580]  kasan_atomics_helper+0xdd4/0x4858
[   29.453288]  kasan_atomics+0x198/0x2e8
[   29.453803]  kunit_try_run_case+0x14c/0x3d0
[   29.454326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.454973]  kthread+0x24c/0x2d0
[   29.455597]  ret_from_fork+0x10/0x20
[   29.456229] 
[   29.456588] Allocated by task 254:
[   29.457187]  kasan_save_stack+0x3c/0x68
[   29.457858]  kasan_save_track+0x20/0x40
[   29.458407]  kasan_save_alloc_info+0x40/0x58
[   29.459128]  __kasan_kmalloc+0xd4/0xd8
[   29.459649]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.460362]  kasan_atomics+0xb8/0x2e8
[   29.460960]  kunit_try_run_case+0x14c/0x3d0
[   29.461571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.462278]  kthread+0x24c/0x2d0
[   29.462837]  ret_from_fork+0x10/0x20
[   29.463377] 
[   29.463798] The buggy address belongs to the object at fff00000c5d53180
[   29.463798]  which belongs to the cache kmalloc-64 of size 64
[   29.465146] The buggy address is located 0 bytes to the right of
[   29.465146]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   29.466506] 
[   29.466836] The buggy address belongs to the physical page:
[   29.467579] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   29.468519] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.469321] page_type: f5(slab)
[   29.469865] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.470764] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.471609] page dumped because: kasan: bad access detected
[   29.472275] 
[   29.472605] Memory state around the buggy address:
[   29.473247]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.474138]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.475018] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.475831]                                      ^
[   29.476467]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.477312]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.478126] ==================================================================
---
[   28.252662] ==================================================================
[   28.253419] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   28.254298] Read of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   28.255506] 
[   28.255891] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   28.256821] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.257300] Hardware name: linux,dummy-virt (DT)
[   28.258887] Call trace:
[   28.259205]  show_stack+0x20/0x38 (C)
[   28.260197]  dump_stack_lvl+0x8c/0xd0
[   28.260983]  print_report+0x118/0x5e0
[   28.261551]  kasan_report+0xc8/0x118
[   28.262001]  kasan_check_range+0x100/0x1a8
[   28.262696]  __kasan_check_read+0x20/0x30
[   28.263727]  kasan_atomics_helper+0x2b0/0x4858
[   28.264346]  kasan_atomics+0x198/0x2e8
[   28.264994]  kunit_try_run_case+0x14c/0x3d0
[   28.265663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.266437]  kthread+0x24c/0x2d0
[   28.267112]  ret_from_fork+0x10/0x20
[   28.267669] 
[   28.268027] Allocated by task 254:
[   28.268609]  kasan_save_stack+0x3c/0x68
[   28.269283]  kasan_save_track+0x20/0x40
[   28.269868]  kasan_save_alloc_info+0x40/0x58
[   28.270509]  __kasan_kmalloc+0xd4/0xd8
[   28.271198]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.271858]  kasan_atomics+0xb8/0x2e8
[   28.272379]  kunit_try_run_case+0x14c/0x3d0
[   28.273094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.273887]  kthread+0x24c/0x2d0
[   28.274408]  ret_from_fork+0x10/0x20
[   28.274969] 
[   28.275319] The buggy address belongs to the object at fff00000c5d53180
[   28.275319]  which belongs to the cache kmalloc-64 of size 64
[   28.276759] The buggy address is located 0 bytes to the right of
[   28.276759]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   28.278024] 
[   28.278356] The buggy address belongs to the physical page:
[   28.279042] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   28.280655] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.281410] page_type: f5(slab)
[   28.282150] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.283321] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.284386] page dumped because: kasan: bad access detected
[   28.285295] 
[   28.285610] Memory state around the buggy address:
[   28.286390]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.287391]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.288555] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.289277]                                      ^
[   28.289954]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.290934]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.292059] ==================================================================
---
[   28.168361] ==================================================================
[   28.169061] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   28.170922] Read of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   28.171342] 
[   28.171600] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   28.172985] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.173786] Hardware name: linux,dummy-virt (DT)
[   28.174359] Call trace:
[   28.174877]  show_stack+0x20/0x38 (C)
[   28.175732]  dump_stack_lvl+0x8c/0xd0
[   28.176446]  print_report+0x118/0x5e0
[   28.177158]  kasan_report+0xc8/0x118
[   28.177789]  kasan_check_range+0x100/0x1a8
[   28.178495]  __kasan_check_read+0x20/0x30
[   28.179430]  kasan_atomics_helper+0x1ec/0x4858
[   28.180172]  kasan_atomics+0x198/0x2e8
[   28.180882]  kunit_try_run_case+0x14c/0x3d0
[   28.181418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.182153]  kthread+0x24c/0x2d0
[   28.182819]  ret_from_fork+0x10/0x20
[   28.183402] 
[   28.184145] Allocated by task 254:
[   28.184914]  kasan_save_stack+0x3c/0x68
[   28.185490]  kasan_save_track+0x20/0x40
[   28.186000]  kasan_save_alloc_info+0x40/0x58
[   28.186499]  __kasan_kmalloc+0xd4/0xd8
[   28.187234]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.188031]  kasan_atomics+0xb8/0x2e8
[   28.188673]  kunit_try_run_case+0x14c/0x3d0
[   28.189573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.190263]  kthread+0x24c/0x2d0
[   28.191913]  ret_from_fork+0x10/0x20
[   28.192869] 
[   28.193416] The buggy address belongs to the object at fff00000c5d53180
[   28.193416]  which belongs to the cache kmalloc-64 of size 64
[   28.194627] The buggy address is located 0 bytes to the right of
[   28.194627]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   28.196511] 
[   28.196996] The buggy address belongs to the physical page:
[   28.197755] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   28.198615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.199807] page_type: f5(slab)
[   28.200331] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.201269] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.202146] page dumped because: kasan: bad access detected
[   28.202841] 
[   28.203233] Memory state around the buggy address:
[   28.203673]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.205555]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.206310] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.207352]                                      ^
[   28.208164]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.208782]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.210320] ==================================================================

test log snippet boot parser 23

Home

[   28.669299] ==================================================================
[   28.670464] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   28.671549] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   28.672608] 
[   28.673056] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   28.674226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.674822] Hardware name: linux,dummy-virt (DT)
[   28.675505] Call trace:
[   28.675964]  show_stack+0x20/0x38 (C)
[   28.676632]  dump_stack_lvl+0x8c/0xd0
[   28.677239]  print_report+0x118/0x5e0
[   28.677757]  kasan_report+0xc8/0x118
[   28.678241]  kasan_check_range+0x100/0x1a8
[   28.678826]  __kasan_check_write+0x20/0x30
[   28.679535]  kasan_atomics_helper+0x61c/0x4858
[   28.680286]  kasan_atomics+0x198/0x2e8
[   28.680885]  kunit_try_run_case+0x14c/0x3d0
[   28.681504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.682061]  kthread+0x24c/0x2d0
[   28.682430]  ret_from_fork+0x10/0x20
[   28.683365] 
[   28.683633] Allocated by task 254:
[   28.684598]  kasan_save_stack+0x3c/0x68
[   28.685134]  kasan_save_track+0x20/0x40
[   28.685680]  kasan_save_alloc_info+0x40/0x58
[   28.686309]  __kasan_kmalloc+0xd4/0xd8
[   28.686848]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.687395]  kasan_atomics+0xb8/0x2e8
[   28.687911]  kunit_try_run_case+0x14c/0x3d0
[   28.688413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.689116]  kthread+0x24c/0x2d0
[   28.689580]  ret_from_fork+0x10/0x20
[   28.690147] 
[   28.690507] The buggy address belongs to the object at fff00000c5d53180
[   28.690507]  which belongs to the cache kmalloc-64 of size 64
[   28.691805] The buggy address is located 0 bytes to the right of
[   28.691805]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   28.693057] 
[   28.693430] The buggy address belongs to the physical page:
[   28.694044] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   28.694964] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.695731] page_type: f5(slab)
[   28.696210] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.697043] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.697830] page dumped because: kasan: bad access detected
[   28.698466] 
[   28.698823] Memory state around the buggy address:
[   28.699424]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.700198]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.700972] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.701831]                                      ^
[   28.702465]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.703233]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.704039] ==================================================================
---
[   28.817251] ==================================================================
[   28.817986] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   28.819046] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   28.819954] 
[   28.820326] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   28.821529] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.822113] Hardware name: linux,dummy-virt (DT)
[   28.822708] Call trace:
[   28.823162]  show_stack+0x20/0x38 (C)
[   28.823776]  dump_stack_lvl+0x8c/0xd0
[   28.824501]  print_report+0x118/0x5e0
[   28.825102]  kasan_report+0xc8/0x118
[   28.825796]  kasan_check_range+0x100/0x1a8
[   28.826488]  __kasan_check_write+0x20/0x30
[   28.827160]  kasan_atomics_helper+0x7cc/0x4858
[   28.827810]  kasan_atomics+0x198/0x2e8
[   28.828451]  kunit_try_run_case+0x14c/0x3d0
[   28.829113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.829869]  kthread+0x24c/0x2d0
[   28.830431]  ret_from_fork+0x10/0x20
[   28.831055] 
[   28.831400] Allocated by task 254:
[   28.831935]  kasan_save_stack+0x3c/0x68
[   28.832569]  kasan_save_track+0x20/0x40
[   28.833148]  kasan_save_alloc_info+0x40/0x58
[   28.833771]  __kasan_kmalloc+0xd4/0xd8
[   28.834341]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.835001]  kasan_atomics+0xb8/0x2e8
[   28.835565]  kunit_try_run_case+0x14c/0x3d0
[   28.836192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.836890]  kthread+0x24c/0x2d0
[   28.837353]  ret_from_fork+0x10/0x20
[   28.837909] 
[   28.838244] The buggy address belongs to the object at fff00000c5d53180
[   28.838244]  which belongs to the cache kmalloc-64 of size 64
[   28.839564] The buggy address is located 0 bytes to the right of
[   28.839564]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   28.840911] 
[   28.841312] The buggy address belongs to the physical page:
[   28.841975] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   28.843047] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.843885] page_type: f5(slab)
[   28.844351] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.845347] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.846217] page dumped because: kasan: bad access detected
[   28.846925] 
[   28.847254] Memory state around the buggy address:
[   28.847952]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.848789]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.849690] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.850502]                                      ^
[   28.851159]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.852015]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.852821] ==================================================================
---
[   29.369036] ==================================================================
[   29.369999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   29.370761] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   29.371576] 
[   29.371839] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.372633] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.373028] Hardware name: linux,dummy-virt (DT)
[   29.373608] Call trace:
[   29.373966]  show_stack+0x20/0x38 (C)
[   29.374440]  dump_stack_lvl+0x8c/0xd0
[   29.375065]  print_report+0x118/0x5e0
[   29.375640]  kasan_report+0xc8/0x118
[   29.376230]  kasan_check_range+0x100/0x1a8
[   29.376965]  __kasan_check_write+0x20/0x30
[   29.377588]  kasan_atomics_helper+0xd3c/0x4858
[   29.378185]  kasan_atomics+0x198/0x2e8
[   29.378701]  kunit_try_run_case+0x14c/0x3d0
[   29.379361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.380045]  kthread+0x24c/0x2d0
[   29.380484]  ret_from_fork+0x10/0x20
[   29.381149] 
[   29.381473] Allocated by task 254:
[   29.382013]  kasan_save_stack+0x3c/0x68
[   29.382584]  kasan_save_track+0x20/0x40
[   29.383166]  kasan_save_alloc_info+0x40/0x58
[   29.383759]  __kasan_kmalloc+0xd4/0xd8
[   29.384271]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.384823]  kasan_atomics+0xb8/0x2e8
[   29.385409]  kunit_try_run_case+0x14c/0x3d0
[   29.385979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.386648]  kthread+0x24c/0x2d0
[   29.387162]  ret_from_fork+0x10/0x20
[   29.387733] 
[   29.388077] The buggy address belongs to the object at fff00000c5d53180
[   29.388077]  which belongs to the cache kmalloc-64 of size 64
[   29.389267] The buggy address is located 0 bytes to the right of
[   29.389267]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   29.390512] 
[   29.390910] The buggy address belongs to the physical page:
[   29.391533] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   29.392382] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.393146] page_type: f5(slab)
[   29.393647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.394486] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.395341] page dumped because: kasan: bad access detected
[   29.395948] 
[   29.396275] Memory state around the buggy address:
[   29.396872]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.397631]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.398455] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.399241]                                      ^
[   29.399886]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.400624]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.401409] ==================================================================
---
[   29.900908] ==================================================================
[   29.901642] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   29.903085] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   29.904218] 
[   29.904782] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.905736] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.906459] Hardware name: linux,dummy-virt (DT)
[   29.907192] Call trace:
[   29.907692]  show_stack+0x20/0x38 (C)
[   29.908413]  dump_stack_lvl+0x8c/0xd0
[   29.909072]  print_report+0x118/0x5e0
[   29.909756]  kasan_report+0xc8/0x118
[   29.910280]  kasan_check_range+0x100/0x1a8
[   29.910857]  __kasan_check_write+0x20/0x30
[   29.911429]  kasan_atomics_helper+0x11f8/0x4858
[   29.912384]  kasan_atomics+0x198/0x2e8
[   29.913099]  kunit_try_run_case+0x14c/0x3d0
[   29.913819]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.914646]  kthread+0x24c/0x2d0
[   29.915301]  ret_from_fork+0x10/0x20
[   29.915975] 
[   29.916448] Allocated by task 254:
[   29.917062]  kasan_save_stack+0x3c/0x68
[   29.917722]  kasan_save_track+0x20/0x40
[   29.918405]  kasan_save_alloc_info+0x40/0x58
[   29.919123]  __kasan_kmalloc+0xd4/0xd8
[   29.919779]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.920502]  kasan_atomics+0xb8/0x2e8
[   29.921148]  kunit_try_run_case+0x14c/0x3d0
[   29.921690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.922350]  kthread+0x24c/0x2d0
[   29.923123]  ret_from_fork+0x10/0x20
[   29.923763] 
[   29.924208] The buggy address belongs to the object at fff00000c5d53180
[   29.924208]  which belongs to the cache kmalloc-64 of size 64
[   29.925776] The buggy address is located 0 bytes to the right of
[   29.925776]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   29.927093] 
[   29.927567] The buggy address belongs to the physical page:
[   29.928336] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   29.929314] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.930064] page_type: f5(slab)
[   29.930518] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.931324] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.932402] page dumped because: kasan: bad access detected
[   29.933170] 
[   29.933657] Memory state around the buggy address:
[   29.934375]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.935301]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.936220] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.937128]                                      ^
[   29.937860]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.938814]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.939699] ==================================================================
---
[   30.447263] ==================================================================
[   30.447920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   30.448686] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   30.450096] 
[   30.450405] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.451492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.452024] Hardware name: linux,dummy-virt (DT)
[   30.452589] Call trace:
[   30.452976]  show_stack+0x20/0x38 (C)
[   30.453508]  dump_stack_lvl+0x8c/0xd0
[   30.454192]  print_report+0x118/0x5e0
[   30.454733]  kasan_report+0xc8/0x118
[   30.455254]  kasan_check_range+0x100/0x1a8
[   30.455899]  __kasan_check_write+0x20/0x30
[   30.456444]  kasan_atomics_helper+0x175c/0x4858
[   30.457062]  kasan_atomics+0x198/0x2e8
[   30.457597]  kunit_try_run_case+0x14c/0x3d0
[   30.458588]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.459441]  kthread+0x24c/0x2d0
[   30.460095]  ret_from_fork+0x10/0x20
[   30.460631] 
[   30.460954] Allocated by task 254:
[   30.461489]  kasan_save_stack+0x3c/0x68
[   30.461961]  kasan_save_track+0x20/0x40
[   30.462518]  kasan_save_alloc_info+0x40/0x58
[   30.463127]  __kasan_kmalloc+0xd4/0xd8
[   30.463720]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.464307]  kasan_atomics+0xb8/0x2e8
[   30.464856]  kunit_try_run_case+0x14c/0x3d0
[   30.465448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.466144]  kthread+0x24c/0x2d0
[   30.466609]  ret_from_fork+0x10/0x20
[   30.467262] 
[   30.467554] The buggy address belongs to the object at fff00000c5d53180
[   30.467554]  which belongs to the cache kmalloc-64 of size 64
[   30.468760] The buggy address is located 0 bytes to the right of
[   30.468760]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   30.470022] 
[   30.470352] The buggy address belongs to the physical page:
[   30.471047] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   30.472042] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.472790] page_type: f5(slab)
[   30.473287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.474099] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.474947] page dumped because: kasan: bad access detected
[   30.475551] 
[   30.475927] Memory state around the buggy address:
[   30.476475]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.477227]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.477986] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.478859]                                      ^
[   30.479414]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.480242]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.481034] ==================================================================
---
[   29.143326] ==================================================================
[   29.144135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   29.144896] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   29.145554] 
[   29.145958] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.146921] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.147439] Hardware name: linux,dummy-virt (DT)
[   29.148032] Call trace:
[   29.148456]  show_stack+0x20/0x38 (C)
[   29.149080]  dump_stack_lvl+0x8c/0xd0
[   29.149676]  print_report+0x118/0x5e0
[   29.150264]  kasan_report+0xc8/0x118
[   29.150875]  kasan_check_range+0x100/0x1a8
[   29.151443]  __kasan_check_write+0x20/0x30
[   29.152091]  kasan_atomics_helper+0xb70/0x4858
[   29.152692]  kasan_atomics+0x198/0x2e8
[   29.153258]  kunit_try_run_case+0x14c/0x3d0
[   29.153886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.154616]  kthread+0x24c/0x2d0
[   29.155196]  ret_from_fork+0x10/0x20
[   29.155704] 
[   29.156048] Allocated by task 254:
[   29.156503]  kasan_save_stack+0x3c/0x68
[   29.157123]  kasan_save_track+0x20/0x40
[   29.157621]  kasan_save_alloc_info+0x40/0x58
[   29.158180]  __kasan_kmalloc+0xd4/0xd8
[   29.158697]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.159418]  kasan_atomics+0xb8/0x2e8
[   29.159911]  kunit_try_run_case+0x14c/0x3d0
[   29.160505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.161141]  kthread+0x24c/0x2d0
[   29.161711]  ret_from_fork+0x10/0x20
[   29.162225] 
[   29.162508] The buggy address belongs to the object at fff00000c5d53180
[   29.162508]  which belongs to the cache kmalloc-64 of size 64
[   29.163686] The buggy address is located 0 bytes to the right of
[   29.163686]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   29.165038] 
[   29.165377] The buggy address belongs to the physical page:
[   29.166071] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   29.166888] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.167688] page_type: f5(slab)
[   29.168153] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.169103] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.169899] page dumped because: kasan: bad access detected
[   29.170578] 
[   29.170899] Memory state around the buggy address:
[   29.171469]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.172243]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.173016] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.173833]                                      ^
[   29.174463]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.175200]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.176045] ==================================================================
---
[   28.999916] ==================================================================
[   29.000671] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   29.001459] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   29.002225] 
[   29.002575] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.003524] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.004252] Hardware name: linux,dummy-virt (DT)
[   29.004776] Call trace:
[   29.005144]  show_stack+0x20/0x38 (C)
[   29.005637]  dump_stack_lvl+0x8c/0xd0
[   29.006208]  print_report+0x118/0x5e0
[   29.006673]  kasan_report+0xc8/0x118
[   29.007221]  kasan_check_range+0x100/0x1a8
[   29.007793]  __kasan_check_write+0x20/0x30
[   29.008454]  kasan_atomics_helper+0xa04/0x4858
[   29.009046]  kasan_atomics+0x198/0x2e8
[   29.009779]  kunit_try_run_case+0x14c/0x3d0
[   29.010472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.011183]  kthread+0x24c/0x2d0
[   29.011822]  ret_from_fork+0x10/0x20
[   29.012457] 
[   29.012841] Allocated by task 254:
[   29.013355]  kasan_save_stack+0x3c/0x68
[   29.013961]  kasan_save_track+0x20/0x40
[   29.014524]  kasan_save_alloc_info+0x40/0x58
[   29.015152]  __kasan_kmalloc+0xd4/0xd8
[   29.015699]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.016385]  kasan_atomics+0xb8/0x2e8
[   29.016860]  kunit_try_run_case+0x14c/0x3d0
[   29.017541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.018299]  kthread+0x24c/0x2d0
[   29.018850]  ret_from_fork+0x10/0x20
[   29.019369] 
[   29.019728] The buggy address belongs to the object at fff00000c5d53180
[   29.019728]  which belongs to the cache kmalloc-64 of size 64
[   29.021242] The buggy address is located 0 bytes to the right of
[   29.021242]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   29.023051] 
[   29.023494] The buggy address belongs to the physical page:
[   29.024128] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   29.024951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.025795] page_type: f5(slab)
[   29.026258] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.027139] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.027999] page dumped because: kasan: bad access detected
[   29.028651] 
[   29.028953] Memory state around the buggy address:
[   29.029486]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.030323]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.031102] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.031919]                                      ^
[   29.032499]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.033346]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.034118] ==================================================================
---
[   28.420504] ==================================================================
[   28.421335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   28.422121] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   28.422996] 
[   28.423389] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   28.424710] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.425422] Hardware name: linux,dummy-virt (DT)
[   28.426412] Call trace:
[   28.426921]  show_stack+0x20/0x38 (C)
[   28.428024]  dump_stack_lvl+0x8c/0xd0
[   28.428844]  print_report+0x118/0x5e0
[   28.429625]  kasan_report+0xc8/0x118
[   28.430296]  kasan_check_range+0x100/0x1a8
[   28.430791]  __kasan_check_write+0x20/0x30
[   28.431892]  kasan_atomics_helper+0x3ac/0x4858
[   28.432803]  kasan_atomics+0x198/0x2e8
[   28.433309]  kunit_try_run_case+0x14c/0x3d0
[   28.433854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.434506]  kthread+0x24c/0x2d0
[   28.435431]  ret_from_fork+0x10/0x20
[   28.435928] 
[   28.436194] Allocated by task 254:
[   28.437253]  kasan_save_stack+0x3c/0x68
[   28.437933]  kasan_save_track+0x20/0x40
[   28.438518]  kasan_save_alloc_info+0x40/0x58
[   28.439335]  __kasan_kmalloc+0xd4/0xd8
[   28.440085]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.440727]  kasan_atomics+0xb8/0x2e8
[   28.441340]  kunit_try_run_case+0x14c/0x3d0
[   28.441968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.442735]  kthread+0x24c/0x2d0
[   28.444578]  ret_from_fork+0x10/0x20
[   28.444975] 
[   28.445340] The buggy address belongs to the object at fff00000c5d53180
[   28.445340]  which belongs to the cache kmalloc-64 of size 64
[   28.446641] The buggy address is located 0 bytes to the right of
[   28.446641]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   28.448530] 
[   28.449313] The buggy address belongs to the physical page:
[   28.449870] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   28.450989] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.452103] page_type: f5(slab)
[   28.452608] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.453493] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.454390] page dumped because: kasan: bad access detected
[   28.455304] 
[   28.455631] Memory state around the buggy address:
[   28.456137]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.456831]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.457385] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.458821]                                      ^
[   28.459607]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.460378]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.461420] ==================================================================
---
[   29.290796] ==================================================================
[   29.291627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   29.293150] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   29.293919] 
[   29.294160] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.295693] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.296499] Hardware name: linux,dummy-virt (DT)
[   29.297172] Call trace:
[   29.297556]  show_stack+0x20/0x38 (C)
[   29.298327]  dump_stack_lvl+0x8c/0xd0
[   29.299017]  print_report+0x118/0x5e0
[   29.299671]  kasan_report+0xc8/0x118
[   29.300366]  kasan_check_range+0x100/0x1a8
[   29.301107]  __kasan_check_write+0x20/0x30
[   29.301828]  kasan_atomics_helper+0xca0/0x4858
[   29.302391]  kasan_atomics+0x198/0x2e8
[   29.303129]  kunit_try_run_case+0x14c/0x3d0
[   29.303775]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.304586]  kthread+0x24c/0x2d0
[   29.305242]  ret_from_fork+0x10/0x20
[   29.305964] 
[   29.306405] Allocated by task 254:
[   29.306960]  kasan_save_stack+0x3c/0x68
[   29.307421]  kasan_save_track+0x20/0x40
[   29.308698]  kasan_save_alloc_info+0x40/0x58
[   29.309135]  __kasan_kmalloc+0xd4/0xd8
[   29.309595]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.311229]  kasan_atomics+0xb8/0x2e8
[   29.311987]  kunit_try_run_case+0x14c/0x3d0
[   29.313085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.314115]  kthread+0x24c/0x2d0
[   29.314495]  ret_from_fork+0x10/0x20
[   29.314930] 
[   29.315192] The buggy address belongs to the object at fff00000c5d53180
[   29.315192]  which belongs to the cache kmalloc-64 of size 64
[   29.316913] The buggy address is located 0 bytes to the right of
[   29.316913]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   29.318471] 
[   29.318795] The buggy address belongs to the physical page:
[   29.319430] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   29.320606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.321473] page_type: f5(slab)
[   29.322104] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.323121] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.324106] page dumped because: kasan: bad access detected
[   29.324718] 
[   29.325033] Memory state around the buggy address:
[   29.325595]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.326798]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.327736] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.328710]                                      ^
[   29.329524]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.330407]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.331263] ==================================================================
---
[   28.705600] ==================================================================
[   28.706376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   28.707285] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   28.708579] 
[   28.708943] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   28.710027] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.710737] Hardware name: linux,dummy-virt (DT)
[   28.711393] Call trace:
[   28.711841]  show_stack+0x20/0x38 (C)
[   28.712415]  dump_stack_lvl+0x8c/0xd0
[   28.712975]  print_report+0x118/0x5e0
[   28.713517]  kasan_report+0xc8/0x118
[   28.714044]  kasan_check_range+0x100/0x1a8
[   28.714700]  __kasan_check_write+0x20/0x30
[   28.715246]  kasan_atomics_helper+0x684/0x4858
[   28.715991]  kasan_atomics+0x198/0x2e8
[   28.716551]  kunit_try_run_case+0x14c/0x3d0
[   28.717176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.717808]  kthread+0x24c/0x2d0
[   28.718378]  ret_from_fork+0x10/0x20
[   28.718944] 
[   28.719280] Allocated by task 254:
[   28.719779]  kasan_save_stack+0x3c/0x68
[   28.720290]  kasan_save_track+0x20/0x40
[   28.720927]  kasan_save_alloc_info+0x40/0x58
[   28.721506]  __kasan_kmalloc+0xd4/0xd8
[   28.722058]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.722688]  kasan_atomics+0xb8/0x2e8
[   28.723313]  kunit_try_run_case+0x14c/0x3d0
[   28.723888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.724698]  kthread+0x24c/0x2d0
[   28.725194]  ret_from_fork+0x10/0x20
[   28.725833] 
[   28.726164] The buggy address belongs to the object at fff00000c5d53180
[   28.726164]  which belongs to the cache kmalloc-64 of size 64
[   28.727462] The buggy address is located 0 bytes to the right of
[   28.727462]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   28.728773] 
[   28.729139] The buggy address belongs to the physical page:
[   28.729839] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   28.730663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.731517] page_type: f5(slab)
[   28.732009] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.732914] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.733664] page dumped because: kasan: bad access detected
[   28.734323] 
[   28.734668] Memory state around the buggy address:
[   28.735295]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.736032]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.736910] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.737656]                                      ^
[   28.738567]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.739514]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.740424] ==================================================================
---
[   28.963435] ==================================================================
[   28.964151] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   28.966261] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   28.967290] 
[   28.967649] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   28.968514] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.969094] Hardware name: linux,dummy-virt (DT)
[   28.969669] Call trace:
[   28.970069]  show_stack+0x20/0x38 (C)
[   28.970623]  dump_stack_lvl+0x8c/0xd0
[   28.971205]  print_report+0x118/0x5e0
[   28.971822]  kasan_report+0xc8/0x118
[   28.972417]  kasan_check_range+0x100/0x1a8
[   28.972997]  __kasan_check_write+0x20/0x30
[   28.973558]  kasan_atomics_helper+0x99c/0x4858
[   28.974141]  kasan_atomics+0x198/0x2e8
[   28.974773]  kunit_try_run_case+0x14c/0x3d0
[   28.975331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.976046]  kthread+0x24c/0x2d0
[   28.976612]  ret_from_fork+0x10/0x20
[   28.977149] 
[   28.977526] Allocated by task 254:
[   28.978005]  kasan_save_stack+0x3c/0x68
[   28.978511]  kasan_save_track+0x20/0x40
[   28.979127]  kasan_save_alloc_info+0x40/0x58
[   28.979724]  __kasan_kmalloc+0xd4/0xd8
[   28.980275]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.980932]  kasan_atomics+0xb8/0x2e8
[   28.981446]  kunit_try_run_case+0x14c/0x3d0
[   28.981992]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.982816]  kthread+0x24c/0x2d0
[   28.983247]  ret_from_fork+0x10/0x20
[   28.983794] 
[   28.984138] The buggy address belongs to the object at fff00000c5d53180
[   28.984138]  which belongs to the cache kmalloc-64 of size 64
[   28.985250] The buggy address is located 0 bytes to the right of
[   28.985250]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   28.986564] 
[   28.986907] The buggy address belongs to the physical page:
[   28.987639] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   28.988444] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.989299] page_type: f5(slab)
[   28.989735] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.990695] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.991560] page dumped because: kasan: bad access detected
[   28.992152] 
[   28.992489] Memory state around the buggy address:
[   28.993060]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.993879]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.994688] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.995536]                                      ^
[   28.996128]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.996942]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.997762] ==================================================================
---
[   29.517398] ==================================================================
[   29.518727] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   29.519540] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   29.520584] 
[   29.520906] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.522063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.522840] Hardware name: linux,dummy-virt (DT)
[   29.523461] Call trace:
[   29.524011]  show_stack+0x20/0x38 (C)
[   29.524672]  dump_stack_lvl+0x8c/0xd0
[   29.525384]  print_report+0x118/0x5e0
[   29.526041]  kasan_report+0xc8/0x118
[   29.526696]  kasan_check_range+0x100/0x1a8
[   29.527419]  __kasan_check_write+0x20/0x30
[   29.528122]  kasan_atomics_helper+0xe44/0x4858
[   29.528852]  kasan_atomics+0x198/0x2e8
[   29.529527]  kunit_try_run_case+0x14c/0x3d0
[   29.530250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.531046]  kthread+0x24c/0x2d0
[   29.531647]  ret_from_fork+0x10/0x20
[   29.532326] 
[   29.532821] Allocated by task 254:
[   29.533395]  kasan_save_stack+0x3c/0x68
[   29.534046]  kasan_save_track+0x20/0x40
[   29.534695]  kasan_save_alloc_info+0x40/0x58
[   29.535297]  __kasan_kmalloc+0xd4/0xd8
[   29.536072]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.536805]  kasan_atomics+0xb8/0x2e8
[   29.537309]  kunit_try_run_case+0x14c/0x3d0
[   29.538093]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.538870]  kthread+0x24c/0x2d0
[   29.539466]  ret_from_fork+0x10/0x20
[   29.540170] 
[   29.540482] The buggy address belongs to the object at fff00000c5d53180
[   29.540482]  which belongs to the cache kmalloc-64 of size 64
[   29.541707] The buggy address is located 0 bytes to the right of
[   29.541707]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   29.543641] 
[   29.544153] The buggy address belongs to the physical page:
[   29.544923] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   29.545906] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.546703] page_type: f5(slab)
[   29.547244] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.548209] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.549091] page dumped because: kasan: bad access detected
[   29.549759] 
[   29.550098] Memory state around the buggy address:
[   29.550760]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.551509]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.552414] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.553221]                                      ^
[   29.553854]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.554707]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.555527] ==================================================================
---
[   29.214098] ==================================================================
[   29.214762] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   29.215684] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   29.216802] 
[   29.217539] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.218529] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.219327] Hardware name: linux,dummy-virt (DT)
[   29.220055] Call trace:
[   29.220503]  show_stack+0x20/0x38 (C)
[   29.221058]  dump_stack_lvl+0x8c/0xd0
[   29.221649]  print_report+0x118/0x5e0
[   29.222192]  kasan_report+0xc8/0x118
[   29.222786]  kasan_check_range+0x100/0x1a8
[   29.223424]  __kasan_check_write+0x20/0x30
[   29.224001]  kasan_atomics_helper+0xc08/0x4858
[   29.224606]  kasan_atomics+0x198/0x2e8
[   29.225185]  kunit_try_run_case+0x14c/0x3d0
[   29.225717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.226446]  kthread+0x24c/0x2d0
[   29.226987]  ret_from_fork+0x10/0x20
[   29.227554] 
[   29.227906] Allocated by task 254:
[   29.228380]  kasan_save_stack+0x3c/0x68
[   29.228919]  kasan_save_track+0x20/0x40
[   29.229368]  kasan_save_alloc_info+0x40/0x58
[   29.230003]  __kasan_kmalloc+0xd4/0xd8
[   29.230514]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.231124]  kasan_atomics+0xb8/0x2e8
[   29.231668]  kunit_try_run_case+0x14c/0x3d0
[   29.232264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.233196]  kthread+0x24c/0x2d0
[   29.233607]  ret_from_fork+0x10/0x20
[   29.234372] 
[   29.234876] The buggy address belongs to the object at fff00000c5d53180
[   29.234876]  which belongs to the cache kmalloc-64 of size 64
[   29.236047] The buggy address is located 0 bytes to the right of
[   29.236047]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   29.237309] 
[   29.237618] The buggy address belongs to the physical page:
[   29.238295] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   29.239185] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.239936] page_type: f5(slab)
[   29.240459] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.241342] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.242144] page dumped because: kasan: bad access detected
[   29.242805] 
[   29.243114] Memory state around the buggy address:
[   29.243693]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.244423]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.245253] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.246074]                                      ^
[   29.246657]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.247494]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.248252] ==================================================================
---
[   29.036397] ==================================================================
[   29.037058] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   29.037673] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   29.039462] 
[   29.039726] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.040659] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.041249] Hardware name: linux,dummy-virt (DT)
[   29.041841] Call trace:
[   29.042238]  show_stack+0x20/0x38 (C)
[   29.042902]  dump_stack_lvl+0x8c/0xd0
[   29.043511]  print_report+0x118/0x5e0
[   29.044115]  kasan_report+0xc8/0x118
[   29.044642]  kasan_check_range+0x100/0x1a8
[   29.045242]  __kasan_check_write+0x20/0x30
[   29.045839]  kasan_atomics_helper+0xa6c/0x4858
[   29.046382]  kasan_atomics+0x198/0x2e8
[   29.047025]  kunit_try_run_case+0x14c/0x3d0
[   29.047651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.048422]  kthread+0x24c/0x2d0
[   29.049016]  ret_from_fork+0x10/0x20
[   29.049567] 
[   29.049889] Allocated by task 254:
[   29.050368]  kasan_save_stack+0x3c/0x68
[   29.050953]  kasan_save_track+0x20/0x40
[   29.051445]  kasan_save_alloc_info+0x40/0x58
[   29.052115]  __kasan_kmalloc+0xd4/0xd8
[   29.052639]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.053358]  kasan_atomics+0xb8/0x2e8
[   29.053912]  kunit_try_run_case+0x14c/0x3d0
[   29.054468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.055037]  kthread+0x24c/0x2d0
[   29.055528]  ret_from_fork+0x10/0x20
[   29.056084] 
[   29.056385] The buggy address belongs to the object at fff00000c5d53180
[   29.056385]  which belongs to the cache kmalloc-64 of size 64
[   29.057663] The buggy address is located 0 bytes to the right of
[   29.057663]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   29.058893] 
[   29.059235] The buggy address belongs to the physical page:
[   29.059957] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   29.060779] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.061516] page_type: f5(slab)
[   29.061992] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.062828] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.063562] page dumped because: kasan: bad access detected
[   29.064309] 
[   29.064680] Memory state around the buggy address:
[   29.065280]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.066132]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.066897] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.067687]                                      ^
[   29.068315]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.069069]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.069816] ==================================================================
---
[   29.860321] ==================================================================
[   29.861563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   29.862525] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   29.863729] 
[   29.864019] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.864972] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.865504] Hardware name: linux,dummy-virt (DT)
[   29.866403] Call trace:
[   29.866957]  show_stack+0x20/0x38 (C)
[   29.867632]  dump_stack_lvl+0x8c/0xd0
[   29.868364]  print_report+0x118/0x5e0
[   29.869030]  kasan_report+0xc8/0x118
[   29.869700]  kasan_check_range+0x100/0x1a8
[   29.870415]  __kasan_check_write+0x20/0x30
[   29.871120]  kasan_atomics_helper+0x1190/0x4858
[   29.871869]  kasan_atomics+0x198/0x2e8
[   29.872407]  kunit_try_run_case+0x14c/0x3d0
[   29.873198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.873982]  kthread+0x24c/0x2d0
[   29.874648]  ret_from_fork+0x10/0x20
[   29.875335] 
[   29.875802] Allocated by task 254:
[   29.876264]  kasan_save_stack+0x3c/0x68
[   29.877156]  kasan_save_track+0x20/0x40
[   29.877612]  kasan_save_alloc_info+0x40/0x58
[   29.878334]  __kasan_kmalloc+0xd4/0xd8
[   29.878866]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.879446]  kasan_atomics+0xb8/0x2e8
[   29.880199]  kunit_try_run_case+0x14c/0x3d0
[   29.881066]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.881653]  kthread+0x24c/0x2d0
[   29.882292]  ret_from_fork+0x10/0x20
[   29.882957] 
[   29.883404] The buggy address belongs to the object at fff00000c5d53180
[   29.883404]  which belongs to the cache kmalloc-64 of size 64
[   29.884894] The buggy address is located 0 bytes to the right of
[   29.884894]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   29.886072] 
[   29.886383] The buggy address belongs to the physical page:
[   29.887397] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   29.888424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.889303] page_type: f5(slab)
[   29.889968] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.890970] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.891931] page dumped because: kasan: bad access detected
[   29.892686] 
[   29.893194] Memory state around the buggy address:
[   29.893941]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.894838]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.895769] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.896662]                                      ^
[   29.897253]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.898187]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.899118] ==================================================================
---
[   28.628440] ==================================================================
[   28.629565] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   28.630485] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   28.631732] 
[   28.632134] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   28.633664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.634213] Hardware name: linux,dummy-virt (DT)
[   28.634797] Call trace:
[   28.635473]  show_stack+0x20/0x38 (C)
[   28.636244]  dump_stack_lvl+0x8c/0xd0
[   28.636863]  print_report+0x118/0x5e0
[   28.637581]  kasan_report+0xc8/0x118
[   28.638269]  kasan_check_range+0x100/0x1a8
[   28.639005]  __kasan_check_write+0x20/0x30
[   28.639700]  kasan_atomics_helper+0x5b4/0x4858
[   28.640324]  kasan_atomics+0x198/0x2e8
[   28.640854]  kunit_try_run_case+0x14c/0x3d0
[   28.641412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.642405]  kthread+0x24c/0x2d0
[   28.643082]  ret_from_fork+0x10/0x20
[   28.643775] 
[   28.644248] Allocated by task 254:
[   28.644680]  kasan_save_stack+0x3c/0x68
[   28.645440]  kasan_save_track+0x20/0x40
[   28.646125]  kasan_save_alloc_info+0x40/0x58
[   28.646860]  __kasan_kmalloc+0xd4/0xd8
[   28.647541]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.648272]  kasan_atomics+0xb8/0x2e8
[   28.648940]  kunit_try_run_case+0x14c/0x3d0
[   28.649624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.650419]  kthread+0x24c/0x2d0
[   28.650908]  ret_from_fork+0x10/0x20
[   28.651402] 
[   28.651702] The buggy address belongs to the object at fff00000c5d53180
[   28.651702]  which belongs to the cache kmalloc-64 of size 64
[   28.653296] The buggy address is located 0 bytes to the right of
[   28.653296]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   28.654792] 
[   28.655224] The buggy address belongs to the physical page:
[   28.655966] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   28.656979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.657852] page_type: f5(slab)
[   28.658479] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.659421] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.660333] page dumped because: kasan: bad access detected
[   28.661100] 
[   28.661545] Memory state around the buggy address:
[   28.662282]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.663219]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.664072] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.665029]                                      ^
[   28.665703]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.666483]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.667245] ==================================================================
---
[   28.503770] ==================================================================
[   28.505137] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   28.506024] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   28.507232] 
[   28.507481] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   28.508332] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.509976] Hardware name: linux,dummy-virt (DT)
[   28.510474] Call trace:
[   28.511054]  show_stack+0x20/0x38 (C)
[   28.511770]  dump_stack_lvl+0x8c/0xd0
[   28.512427]  print_report+0x118/0x5e0
[   28.513113]  kasan_report+0xc8/0x118
[   28.513626]  kasan_check_range+0x100/0x1a8
[   28.514451]  __kasan_check_write+0x20/0x30
[   28.515232]  kasan_atomics_helper+0x47c/0x4858
[   28.515974]  kasan_atomics+0x198/0x2e8
[   28.516675]  kunit_try_run_case+0x14c/0x3d0
[   28.517406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.518198]  kthread+0x24c/0x2d0
[   28.518816]  ret_from_fork+0x10/0x20
[   28.519376] 
[   28.519673] Allocated by task 254:
[   28.520454]  kasan_save_stack+0x3c/0x68
[   28.521117]  kasan_save_track+0x20/0x40
[   28.521787]  kasan_save_alloc_info+0x40/0x58
[   28.522466]  __kasan_kmalloc+0xd4/0xd8
[   28.523150]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.524018]  kasan_atomics+0xb8/0x2e8
[   28.524449]  kunit_try_run_case+0x14c/0x3d0
[   28.525178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.526011]  kthread+0x24c/0x2d0
[   28.526690]  ret_from_fork+0x10/0x20
[   28.527339] 
[   28.527663] The buggy address belongs to the object at fff00000c5d53180
[   28.527663]  which belongs to the cache kmalloc-64 of size 64
[   28.529087] The buggy address is located 0 bytes to the right of
[   28.529087]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   28.530659] 
[   28.531177] The buggy address belongs to the physical page:
[   28.531824] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   28.532659] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.533647] page_type: f5(slab)
[   28.534329] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.535279] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.536285] page dumped because: kasan: bad access detected
[   28.537127] 
[   28.537586] Memory state around the buggy address:
[   28.538333]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.539259]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.540182] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.540945]                                      ^
[   28.541529]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.542642]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.543568] ==================================================================
---
[   28.587689] ==================================================================
[   28.588387] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   28.589294] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   28.590391] 
[   28.590900] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   28.592039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.592700] Hardware name: linux,dummy-virt (DT)
[   28.593440] Call trace:
[   28.593969]  show_stack+0x20/0x38 (C)
[   28.594506]  dump_stack_lvl+0x8c/0xd0
[   28.595061]  print_report+0x118/0x5e0
[   28.595585]  kasan_report+0xc8/0x118
[   28.596427]  kasan_check_range+0x100/0x1a8
[   28.597147]  __kasan_check_write+0x20/0x30
[   28.597860]  kasan_atomics_helper+0x54c/0x4858
[   28.598600]  kasan_atomics+0x198/0x2e8
[   28.599293]  kunit_try_run_case+0x14c/0x3d0
[   28.600010]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.600827]  kthread+0x24c/0x2d0
[   28.601460]  ret_from_fork+0x10/0x20
[   28.602199] 
[   28.602692] Allocated by task 254:
[   28.603185]  kasan_save_stack+0x3c/0x68
[   28.603696]  kasan_save_track+0x20/0x40
[   28.604251]  kasan_save_alloc_info+0x40/0x58
[   28.605291]  __kasan_kmalloc+0xd4/0xd8
[   28.605767]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.606491]  kasan_atomics+0xb8/0x2e8
[   28.607167]  kunit_try_run_case+0x14c/0x3d0
[   28.607855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.608647]  kthread+0x24c/0x2d0
[   28.609275]  ret_from_fork+0x10/0x20
[   28.609945] 
[   28.610479] The buggy address belongs to the object at fff00000c5d53180
[   28.610479]  which belongs to the cache kmalloc-64 of size 64
[   28.611808] The buggy address is located 0 bytes to the right of
[   28.611808]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   28.613226] 
[   28.613549] The buggy address belongs to the physical page:
[   28.614514] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   28.615573] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.616340] page_type: f5(slab)
[   28.616818] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.617610] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.618771] page dumped because: kasan: bad access detected
[   28.619529] 
[   28.619993] Memory state around the buggy address:
[   28.620683]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.621634]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.622598] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.623510]                                      ^
[   28.624231]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.625215]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.626129] ==================================================================
---
[   29.629583] ==================================================================
[   29.630214] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   29.630996] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   29.631816] 
[   29.632120] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.633186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.634206] Hardware name: linux,dummy-virt (DT)
[   29.635254] Call trace:
[   29.635940]  show_stack+0x20/0x38 (C)
[   29.636776]  dump_stack_lvl+0x8c/0xd0
[   29.637368]  print_report+0x118/0x5e0
[   29.637918]  kasan_report+0xc8/0x118
[   29.638505]  kasan_check_range+0x100/0x1a8
[   29.639104]  __kasan_check_write+0x20/0x30
[   29.639642]  kasan_atomics_helper+0xf20/0x4858
[   29.640336]  kasan_atomics+0x198/0x2e8
[   29.640941]  kunit_try_run_case+0x14c/0x3d0
[   29.641569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.642255]  kthread+0x24c/0x2d0
[   29.642772]  ret_from_fork+0x10/0x20
[   29.643313] 
[   29.643618] Allocated by task 254:
[   29.644050]  kasan_save_stack+0x3c/0x68
[   29.644641]  kasan_save_track+0x20/0x40
[   29.645248]  kasan_save_alloc_info+0x40/0x58
[   29.645833]  __kasan_kmalloc+0xd4/0xd8
[   29.646376]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.647016]  kasan_atomics+0xb8/0x2e8
[   29.647481]  kunit_try_run_case+0x14c/0x3d0
[   29.648145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.648791]  kthread+0x24c/0x2d0
[   29.649375]  ret_from_fork+0x10/0x20
[   29.649883] 
[   29.650249] The buggy address belongs to the object at fff00000c5d53180
[   29.650249]  which belongs to the cache kmalloc-64 of size 64
[   29.651477] The buggy address is located 0 bytes to the right of
[   29.651477]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   29.652811] 
[   29.653133] The buggy address belongs to the physical page:
[   29.653789] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   29.654683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.655462] page_type: f5(slab)
[   29.655994] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.656874] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.657683] page dumped because: kasan: bad access detected
[   29.658299] 
[   29.658635] Memory state around the buggy address:
[   29.659197]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.659994]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.660870] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.661714]                                      ^
[   29.662423]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.663148]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.663985] ==================================================================
---
[   28.855290] ==================================================================
[   28.856112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   28.856878] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   28.857759] 
[   28.858170] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   28.859330] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.859984] Hardware name: linux,dummy-virt (DT)
[   28.860580] Call trace:
[   28.861067]  show_stack+0x20/0x38 (C)
[   28.861833]  dump_stack_lvl+0x8c/0xd0
[   28.862372]  print_report+0x118/0x5e0
[   28.862823]  kasan_report+0xc8/0x118
[   28.863228]  kasan_check_range+0x100/0x1a8
[   28.863661]  __kasan_check_write+0x20/0x30
[   28.864115]  kasan_atomics_helper+0x894/0x4858
[   28.864550]  kasan_atomics+0x198/0x2e8
[   28.864869]  kunit_try_run_case+0x14c/0x3d0
[   28.865564]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.867169]  kthread+0x24c/0x2d0
[   28.867533]  ret_from_fork+0x10/0x20
[   28.867839] 
[   28.867986] Allocated by task 254:
[   28.868191]  kasan_save_stack+0x3c/0x68
[   28.868419]  kasan_save_track+0x20/0x40
[   28.868639]  kasan_save_alloc_info+0x40/0x58
[   28.869490]  __kasan_kmalloc+0xd4/0xd8
[   28.870468]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.871517]  kasan_atomics+0xb8/0x2e8
[   28.872114]  kunit_try_run_case+0x14c/0x3d0
[   28.872772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.873575]  kthread+0x24c/0x2d0
[   28.874174]  ret_from_fork+0x10/0x20
[   28.874727] 
[   28.875145] The buggy address belongs to the object at fff00000c5d53180
[   28.875145]  which belongs to the cache kmalloc-64 of size 64
[   28.876455] The buggy address is located 0 bytes to the right of
[   28.876455]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   28.877661] 
[   28.877987] The buggy address belongs to the physical page:
[   28.878605] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   28.879594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.880277] page_type: f5(slab)
[   28.880827] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.881769] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.882604] page dumped because: kasan: bad access detected
[   28.883267] 
[   28.883556] Memory state around the buggy address:
[   28.884120]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.884927]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.885712] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.886460]                                      ^
[   28.887174]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.888016]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.888695] ==================================================================
---
[   28.926393] ==================================================================
[   28.927096] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   28.927811] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   28.928466] 
[   28.928803] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   28.930710] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.932038] Hardware name: linux,dummy-virt (DT)
[   28.932507] Call trace:
[   28.932707]  show_stack+0x20/0x38 (C)
[   28.933279]  dump_stack_lvl+0x8c/0xd0
[   28.933807]  print_report+0x118/0x5e0
[   28.934416]  kasan_report+0xc8/0x118
[   28.934966]  kasan_check_range+0x100/0x1a8
[   28.935600]  __kasan_check_write+0x20/0x30
[   28.936235]  kasan_atomics_helper+0x934/0x4858
[   28.936823]  kasan_atomics+0x198/0x2e8
[   28.937374]  kunit_try_run_case+0x14c/0x3d0
[   28.937999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.938737]  kthread+0x24c/0x2d0
[   28.939277]  ret_from_fork+0x10/0x20
[   28.939863] 
[   28.940239] Allocated by task 254:
[   28.940729]  kasan_save_stack+0x3c/0x68
[   28.941330]  kasan_save_track+0x20/0x40
[   28.941939]  kasan_save_alloc_info+0x40/0x58
[   28.942498]  __kasan_kmalloc+0xd4/0xd8
[   28.943079]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.943662]  kasan_atomics+0xb8/0x2e8
[   28.944224]  kunit_try_run_case+0x14c/0x3d0
[   28.944831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.945576]  kthread+0x24c/0x2d0
[   28.946162]  ret_from_fork+0x10/0x20
[   28.946684] 
[   28.947061] The buggy address belongs to the object at fff00000c5d53180
[   28.947061]  which belongs to the cache kmalloc-64 of size 64
[   28.948326] The buggy address is located 0 bytes to the right of
[   28.948326]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   28.949621] 
[   28.949954] The buggy address belongs to the physical page:
[   28.950618] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   28.951547] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.952341] page_type: f5(slab)
[   28.952825] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.953643] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.954473] page dumped because: kasan: bad access detected
[   28.955187] 
[   28.955549] Memory state around the buggy address:
[   28.956185]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.956970]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.957817] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.958650]                                      ^
[   28.959260]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.959992]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.960779] ==================================================================
---
[   30.370198] ==================================================================
[   30.370929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   30.371860] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   30.372875] 
[   30.373336] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.374561] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.375166] Hardware name: linux,dummy-virt (DT)
[   30.375824] Call trace:
[   30.376317]  show_stack+0x20/0x38 (C)
[   30.376979]  dump_stack_lvl+0x8c/0xd0
[   30.377617]  print_report+0x118/0x5e0
[   30.378255]  kasan_report+0xc8/0x118
[   30.378917]  kasan_check_range+0x100/0x1a8
[   30.379593]  __kasan_check_write+0x20/0x30
[   30.380290]  kasan_atomics_helper+0x16d0/0x4858
[   30.381008]  kasan_atomics+0x198/0x2e8
[   30.381648]  kunit_try_run_case+0x14c/0x3d0
[   30.382377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.383096]  kthread+0x24c/0x2d0
[   30.383667]  ret_from_fork+0x10/0x20
[   30.384237] 
[   30.384512] Allocated by task 254:
[   30.385467]  kasan_save_stack+0x3c/0x68
[   30.386206]  kasan_save_track+0x20/0x40
[   30.386872]  kasan_save_alloc_info+0x40/0x58
[   30.387568]  __kasan_kmalloc+0xd4/0xd8
[   30.388263]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.389025]  kasan_atomics+0xb8/0x2e8
[   30.389523]  kunit_try_run_case+0x14c/0x3d0
[   30.390285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.391098]  kthread+0x24c/0x2d0
[   30.391567]  ret_from_fork+0x10/0x20
[   30.392285] 
[   30.392764] The buggy address belongs to the object at fff00000c5d53180
[   30.392764]  which belongs to the cache kmalloc-64 of size 64
[   30.394254] The buggy address is located 0 bytes to the right of
[   30.394254]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   30.395935] 
[   30.396247] The buggy address belongs to the physical page:
[   30.397116] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   30.398085] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.398964] page_type: f5(slab)
[   30.399589] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.400568] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.401530] page dumped because: kasan: bad access detected
[   30.402165] 
[   30.402698] Memory state around the buggy address:
[   30.403409]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.404365]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.405230] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.406040]                                      ^
[   30.406617]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.407511]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.408326] ==================================================================
---
[   30.017883] ==================================================================
[   30.018671] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   30.019969] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   30.020705] 
[   30.021120] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.022040] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.022591] Hardware name: linux,dummy-virt (DT)
[   30.023314] Call trace:
[   30.023682]  show_stack+0x20/0x38 (C)
[   30.024293]  dump_stack_lvl+0x8c/0xd0
[   30.024878]  print_report+0x118/0x5e0
[   30.025480]  kasan_report+0xc8/0x118
[   30.026164]  kasan_check_range+0x100/0x1a8
[   30.026738]  __kasan_check_write+0x20/0x30
[   30.027465]  kasan_atomics_helper+0x1384/0x4858
[   30.028042]  kasan_atomics+0x198/0x2e8
[   30.028722]  kunit_try_run_case+0x14c/0x3d0
[   30.029291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.029987]  kthread+0x24c/0x2d0
[   30.030581]  ret_from_fork+0x10/0x20
[   30.031234] 
[   30.031543] Allocated by task 254:
[   30.032016]  kasan_save_stack+0x3c/0x68
[   30.032564]  kasan_save_track+0x20/0x40
[   30.033098]  kasan_save_alloc_info+0x40/0x58
[   30.033767]  __kasan_kmalloc+0xd4/0xd8
[   30.034338]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.034985]  kasan_atomics+0xb8/0x2e8
[   30.035507]  kunit_try_run_case+0x14c/0x3d0
[   30.036156]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.036839]  kthread+0x24c/0x2d0
[   30.037327]  ret_from_fork+0x10/0x20
[   30.037975] 
[   30.038303] The buggy address belongs to the object at fff00000c5d53180
[   30.038303]  which belongs to the cache kmalloc-64 of size 64
[   30.039493] The buggy address is located 0 bytes to the right of
[   30.039493]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   30.040764] 
[   30.041142] The buggy address belongs to the physical page:
[   30.041680] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   30.042610] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.043330] page_type: f5(slab)
[   30.043895] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.044723] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.045536] page dumped because: kasan: bad access detected
[   30.046197] 
[   30.046514] Memory state around the buggy address:
[   30.047099]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.047885]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.048672] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.049480]                                      ^
[   30.050124]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.050906]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.051660] ==================================================================
---
[   30.121878] ==================================================================
[   30.122561] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   30.123310] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   30.124126] 
[   30.124498] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.125499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.126047] Hardware name: linux,dummy-virt (DT)
[   30.126625] Call trace:
[   30.127002]  show_stack+0x20/0x38 (C)
[   30.127540]  dump_stack_lvl+0x8c/0xd0
[   30.128109]  print_report+0x118/0x5e0
[   30.128703]  kasan_report+0xc8/0x118
[   30.129244]  kasan_check_range+0x100/0x1a8
[   30.129907]  __kasan_check_write+0x20/0x30
[   30.130451]  kasan_atomics_helper+0x147c/0x4858
[   30.131155]  kasan_atomics+0x198/0x2e8
[   30.131692]  kunit_try_run_case+0x14c/0x3d0
[   30.132303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.133042]  kthread+0x24c/0x2d0
[   30.133577]  ret_from_fork+0x10/0x20
[   30.134137] 
[   30.134466] Allocated by task 254:
[   30.134916]  kasan_save_stack+0x3c/0x68
[   30.135522]  kasan_save_track+0x20/0x40
[   30.136023]  kasan_save_alloc_info+0x40/0x58
[   30.136637]  __kasan_kmalloc+0xd4/0xd8
[   30.137280]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.137931]  kasan_atomics+0xb8/0x2e8
[   30.138468]  kunit_try_run_case+0x14c/0x3d0
[   30.139056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.139594]  kthread+0x24c/0x2d0
[   30.139971]  ret_from_fork+0x10/0x20
[   30.140345] 
[   30.140569] The buggy address belongs to the object at fff00000c5d53180
[   30.140569]  which belongs to the cache kmalloc-64 of size 64
[   30.141568] The buggy address is located 0 bytes to the right of
[   30.141568]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   30.143031] 
[   30.143302] The buggy address belongs to the physical page:
[   30.144100] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   30.145043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.145899] page_type: f5(slab)
[   30.146399] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.147272] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.148126] page dumped because: kasan: bad access detected
[   30.148697] 
[   30.149070] Memory state around the buggy address:
[   30.149732]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.150603]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.151371] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.152109]                                      ^
[   30.152758]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.153476]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.154333] ==================================================================
---
[   28.464617] ==================================================================
[   28.465394] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   28.466349] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   28.467460] 
[   28.468302] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   28.469146] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.469559] Hardware name: linux,dummy-virt (DT)
[   28.470589] Call trace:
[   28.471291]  show_stack+0x20/0x38 (C)
[   28.472133]  dump_stack_lvl+0x8c/0xd0
[   28.472689]  print_report+0x118/0x5e0
[   28.473210]  kasan_report+0xc8/0x118
[   28.473701]  kasan_check_range+0x100/0x1a8
[   28.474303]  __kasan_check_write+0x20/0x30
[   28.474922]  kasan_atomics_helper+0x414/0x4858
[   28.475705]  kasan_atomics+0x198/0x2e8
[   28.476237]  kunit_try_run_case+0x14c/0x3d0
[   28.476684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.477604]  kthread+0x24c/0x2d0
[   28.478075]  ret_from_fork+0x10/0x20
[   28.478476] 
[   28.478704] Allocated by task 254:
[   28.479944]  kasan_save_stack+0x3c/0x68
[   28.480375]  kasan_save_track+0x20/0x40
[   28.480790]  kasan_save_alloc_info+0x40/0x58
[   28.481229]  __kasan_kmalloc+0xd4/0xd8
[   28.481623]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.483205]  kasan_atomics+0xb8/0x2e8
[   28.484274]  kunit_try_run_case+0x14c/0x3d0
[   28.484677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.485074]  kthread+0x24c/0x2d0
[   28.485287]  ret_from_fork+0x10/0x20
[   28.485499] 
[   28.485635] The buggy address belongs to the object at fff00000c5d53180
[   28.485635]  which belongs to the cache kmalloc-64 of size 64
[   28.487497] The buggy address is located 0 bytes to the right of
[   28.487497]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   28.489409] 
[   28.489780] The buggy address belongs to the physical page:
[   28.490402] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   28.491173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.491923] page_type: f5(slab)
[   28.492381] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.493203] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.493940] page dumped because: kasan: bad access detected
[   28.494662] 
[   28.495009] Memory state around the buggy address:
[   28.495536]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.496870]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.497686] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.498653]                                      ^
[   28.499363]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.500620]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.501551] ==================================================================
---
[   29.748340] ==================================================================
[   29.749293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   29.749648] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   29.751002] 
[   29.751561] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.752587] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.753359] Hardware name: linux,dummy-virt (DT)
[   29.754096] Call trace:
[   29.754640]  show_stack+0x20/0x38 (C)
[   29.755345]  dump_stack_lvl+0x8c/0xd0
[   29.756022]  print_report+0x118/0x5e0
[   29.756576]  kasan_report+0xc8/0x118
[   29.757077]  kasan_check_range+0x100/0x1a8
[   29.757598]  __kasan_check_write+0x20/0x30
[   29.758217]  kasan_atomics_helper+0x1058/0x4858
[   29.758830]  kasan_atomics+0x198/0x2e8
[   29.759373]  kunit_try_run_case+0x14c/0x3d0
[   29.760038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.760792]  kthread+0x24c/0x2d0
[   29.761347]  ret_from_fork+0x10/0x20
[   29.761852] 
[   29.762174] Allocated by task 254:
[   29.762737]  kasan_save_stack+0x3c/0x68
[   29.763429]  kasan_save_track+0x20/0x40
[   29.763997]  kasan_save_alloc_info+0x40/0x58
[   29.764594]  __kasan_kmalloc+0xd4/0xd8
[   29.765150]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.765772]  kasan_atomics+0xb8/0x2e8
[   29.766258]  kunit_try_run_case+0x14c/0x3d0
[   29.766836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.767546]  kthread+0x24c/0x2d0
[   29.768083]  ret_from_fork+0x10/0x20
[   29.768620] 
[   29.768954] The buggy address belongs to the object at fff00000c5d53180
[   29.768954]  which belongs to the cache kmalloc-64 of size 64
[   29.770484] The buggy address is located 0 bytes to the right of
[   29.770484]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   29.772252] 
[   29.772479] The buggy address belongs to the physical page:
[   29.773194] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   29.774181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.775094] page_type: f5(slab)
[   29.775703] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.776777] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.777765] page dumped because: kasan: bad access detected
[   29.778573] 
[   29.779104] Memory state around the buggy address:
[   29.779651]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.780401]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.781192] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.782257]                                      ^
[   29.783026]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.783972]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.784810] ==================================================================
---
[   29.786605] ==================================================================
[   29.787569] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   29.788217] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   29.789617] 
[   29.790246] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.791100] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.791501] Hardware name: linux,dummy-virt (DT)
[   29.792380] Call trace:
[   29.793115]  show_stack+0x20/0x38 (C)
[   29.793637]  dump_stack_lvl+0x8c/0xd0
[   29.794283]  print_report+0x118/0x5e0
[   29.794580]  kasan_report+0xc8/0x118
[   29.794913]  kasan_check_range+0x100/0x1a8
[   29.795571]  __kasan_check_write+0x20/0x30
[   29.796262]  kasan_atomics_helper+0x10c0/0x4858
[   29.797053]  kasan_atomics+0x198/0x2e8
[   29.797621]  kunit_try_run_case+0x14c/0x3d0
[   29.798289]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.799167]  kthread+0x24c/0x2d0
[   29.799660]  ret_from_fork+0x10/0x20
[   29.800253] 
[   29.800582] Allocated by task 254:
[   29.801102]  kasan_save_stack+0x3c/0x68
[   29.801676]  kasan_save_track+0x20/0x40
[   29.802232]  kasan_save_alloc_info+0x40/0x58
[   29.802798]  __kasan_kmalloc+0xd4/0xd8
[   29.803367]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.804018]  kasan_atomics+0xb8/0x2e8
[   29.804525]  kunit_try_run_case+0x14c/0x3d0
[   29.805062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.805780]  kthread+0x24c/0x2d0
[   29.806226]  ret_from_fork+0x10/0x20
[   29.806736] 
[   29.807124] The buggy address belongs to the object at fff00000c5d53180
[   29.807124]  which belongs to the cache kmalloc-64 of size 64
[   29.808301] The buggy address is located 0 bytes to the right of
[   29.808301]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   29.809580] 
[   29.809933] The buggy address belongs to the physical page:
[   29.810608] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   29.811482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.812232] page_type: f5(slab)
[   29.812774] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.813590] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.814384] page dumped because: kasan: bad access detected
[   29.815087] 
[   29.815391] Memory state around the buggy address:
[   29.815965]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.816789]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.817777] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.818509]                                      ^
[   29.819147]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.819933]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.820773] ==================================================================
---
[   30.086811] ==================================================================
[   30.087479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   30.088385] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   30.089258] 
[   30.089614] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.090596] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.091191] Hardware name: linux,dummy-virt (DT)
[   30.091733] Call trace:
[   30.092118]  show_stack+0x20/0x38 (C)
[   30.092806]  dump_stack_lvl+0x8c/0xd0
[   30.093331]  print_report+0x118/0x5e0
[   30.093812]  kasan_report+0xc8/0x118
[   30.094444]  kasan_check_range+0x100/0x1a8
[   30.095138]  __kasan_check_write+0x20/0x30
[   30.095834]  kasan_atomics_helper+0x1414/0x4858
[   30.096450]  kasan_atomics+0x198/0x2e8
[   30.097077]  kunit_try_run_case+0x14c/0x3d0
[   30.097863]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.098444]  kthread+0x24c/0x2d0
[   30.098982]  ret_from_fork+0x10/0x20
[   30.099478] 
[   30.099864] Allocated by task 254:
[   30.100330]  kasan_save_stack+0x3c/0x68
[   30.100896]  kasan_save_track+0x20/0x40
[   30.101422]  kasan_save_alloc_info+0x40/0x58
[   30.101959]  __kasan_kmalloc+0xd4/0xd8
[   30.102522]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.103211]  kasan_atomics+0xb8/0x2e8
[   30.103793]  kunit_try_run_case+0x14c/0x3d0
[   30.104392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.105048]  kthread+0x24c/0x2d0
[   30.105523]  ret_from_fork+0x10/0x20
[   30.106116] 
[   30.106457] The buggy address belongs to the object at fff00000c5d53180
[   30.106457]  which belongs to the cache kmalloc-64 of size 64
[   30.107592] The buggy address is located 0 bytes to the right of
[   30.107592]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   30.108939] 
[   30.109260] The buggy address belongs to the physical page:
[   30.109872] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   30.110835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.111555] page_type: f5(slab)
[   30.112041] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.112824] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.113702] page dumped because: kasan: bad access detected
[   30.114342] 
[   30.114666] Memory state around the buggy address:
[   30.115234]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.116000]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.116785] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.117580]                                      ^
[   30.118186]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.119028]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.119824] ==================================================================
---
[   29.822280] ==================================================================
[   29.822956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   29.824244] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   29.824935] 
[   29.825332] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.826376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.826938] Hardware name: linux,dummy-virt (DT)
[   29.827487] Call trace:
[   29.827973]  show_stack+0x20/0x38 (C)
[   29.828550]  dump_stack_lvl+0x8c/0xd0
[   29.829191]  print_report+0x118/0x5e0
[   29.829800]  kasan_report+0xc8/0x118
[   29.830456]  kasan_check_range+0x100/0x1a8
[   29.831084]  __kasan_check_write+0x20/0x30
[   29.831704]  kasan_atomics_helper+0x1128/0x4858
[   29.832356]  kasan_atomics+0x198/0x2e8
[   29.832941]  kunit_try_run_case+0x14c/0x3d0
[   29.833626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.834380]  kthread+0x24c/0x2d0
[   29.834959]  ret_from_fork+0x10/0x20
[   29.835571] 
[   29.835907] Allocated by task 254:
[   29.836431]  kasan_save_stack+0x3c/0x68
[   29.837023]  kasan_save_track+0x20/0x40
[   29.837583]  kasan_save_alloc_info+0x40/0x58
[   29.838224]  __kasan_kmalloc+0xd4/0xd8
[   29.838801]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.839400]  kasan_atomics+0xb8/0x2e8
[   29.840020]  kunit_try_run_case+0x14c/0x3d0
[   29.840601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.841334]  kthread+0x24c/0x2d0
[   29.841791]  ret_from_fork+0x10/0x20
[   29.842274] 
[   29.842621] The buggy address belongs to the object at fff00000c5d53180
[   29.842621]  which belongs to the cache kmalloc-64 of size 64
[   29.843885] The buggy address is located 0 bytes to the right of
[   29.843885]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   29.845220] 
[   29.845545] The buggy address belongs to the physical page:
[   29.846331] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   29.847080] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.847692] page_type: f5(slab)
[   29.848646] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.849622] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.850582] page dumped because: kasan: bad access detected
[   29.851368] 
[   29.851842] Memory state around the buggy address:
[   29.852433]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.853411]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.854357] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.855263]                                      ^
[   29.856016]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.856777]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.857498] ==================================================================
---
[   29.593208] ==================================================================
[   29.593924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   29.594964] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   29.595901] 
[   29.596301] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.597497] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.598118] Hardware name: linux,dummy-virt (DT)
[   29.598585] Call trace:
[   29.599838]  show_stack+0x20/0x38 (C)
[   29.600635]  dump_stack_lvl+0x8c/0xd0
[   29.601081]  print_report+0x118/0x5e0
[   29.601495]  kasan_report+0xc8/0x118
[   29.601914]  kasan_check_range+0x100/0x1a8
[   29.602355]  __kasan_check_write+0x20/0x30
[   29.603728]  kasan_atomics_helper+0xeb8/0x4858
[   29.604380]  kasan_atomics+0x198/0x2e8
[   29.605097]  kunit_try_run_case+0x14c/0x3d0
[   29.605714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.606432]  kthread+0x24c/0x2d0
[   29.606989]  ret_from_fork+0x10/0x20
[   29.607498] 
[   29.607832] Allocated by task 254:
[   29.608274]  kasan_save_stack+0x3c/0x68
[   29.608880]  kasan_save_track+0x20/0x40
[   29.609416]  kasan_save_alloc_info+0x40/0x58
[   29.610040]  __kasan_kmalloc+0xd4/0xd8
[   29.610570]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.611179]  kasan_atomics+0xb8/0x2e8
[   29.611668]  kunit_try_run_case+0x14c/0x3d0
[   29.612233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.612912]  kthread+0x24c/0x2d0
[   29.613367]  ret_from_fork+0x10/0x20
[   29.613877] 
[   29.614188] The buggy address belongs to the object at fff00000c5d53180
[   29.614188]  which belongs to the cache kmalloc-64 of size 64
[   29.615436] The buggy address is located 0 bytes to the right of
[   29.615436]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   29.616715] 
[   29.617089] The buggy address belongs to the physical page:
[   29.617651] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   29.618604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.619347] page_type: f5(slab)
[   29.619822] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.620672] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.621520] page dumped because: kasan: bad access detected
[   29.622171] 
[   29.622488] Memory state around the buggy address:
[   29.623112]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.623918]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.624772] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.625531]                                      ^
[   29.626136]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.626929]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.627685] ==================================================================
---
[   28.546380] ==================================================================
[   28.547306] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   28.548149] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   28.549426] 
[   28.549841] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   28.551318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.552227] Hardware name: linux,dummy-virt (DT)
[   28.552954] Call trace:
[   28.553524]  show_stack+0x20/0x38 (C)
[   28.554204]  dump_stack_lvl+0x8c/0xd0
[   28.554901]  print_report+0x118/0x5e0
[   28.555423]  kasan_report+0xc8/0x118
[   28.556169]  kasan_check_range+0x100/0x1a8
[   28.556866]  __kasan_check_write+0x20/0x30
[   28.557561]  kasan_atomics_helper+0x4e4/0x4858
[   28.558295]  kasan_atomics+0x198/0x2e8
[   28.559006]  kunit_try_run_case+0x14c/0x3d0
[   28.559572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.560257]  kthread+0x24c/0x2d0
[   28.561167]  ret_from_fork+0x10/0x20
[   28.561592] 
[   28.562108] Allocated by task 254:
[   28.562763]  kasan_save_stack+0x3c/0x68
[   28.563444]  kasan_save_track+0x20/0x40
[   28.564119]  kasan_save_alloc_info+0x40/0x58
[   28.564820]  __kasan_kmalloc+0xd4/0xd8
[   28.565479]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.566190]  kasan_atomics+0xb8/0x2e8
[   28.566880]  kunit_try_run_case+0x14c/0x3d0
[   28.567546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.568199]  kthread+0x24c/0x2d0
[   28.568657]  ret_from_fork+0x10/0x20
[   28.569172] 
[   28.569469] The buggy address belongs to the object at fff00000c5d53180
[   28.569469]  which belongs to the cache kmalloc-64 of size 64
[   28.571079] The buggy address is located 0 bytes to the right of
[   28.571079]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   28.572634] 
[   28.573096] The buggy address belongs to the physical page:
[   28.573617] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   28.574690] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.575618] page_type: f5(slab)
[   28.576255] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.577232] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.578175] page dumped because: kasan: bad access detected
[   28.579073] 
[   28.579520] Memory state around the buggy address:
[   28.580102]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.581107]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.582063] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.582701]                                      ^
[   28.583491]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.584433]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.585332] ==================================================================
---
[   28.338788] ==================================================================
[   28.339343] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   28.340881] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   28.342125] 
[   28.342480] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   28.343977] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.344709] Hardware name: linux,dummy-virt (DT)
[   28.345457] Call trace:
[   28.345865]  show_stack+0x20/0x38 (C)
[   28.346647]  dump_stack_lvl+0x8c/0xd0
[   28.347542]  print_report+0x118/0x5e0
[   28.348281]  kasan_report+0xc8/0x118
[   28.348828]  kasan_check_range+0x100/0x1a8
[   28.349617]  __kasan_check_write+0x20/0x30
[   28.350321]  kasan_atomics_helper+0x32c/0x4858
[   28.350928]  kasan_atomics+0x198/0x2e8
[   28.351440]  kunit_try_run_case+0x14c/0x3d0
[   28.352153]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.352835]  kthread+0x24c/0x2d0
[   28.353322]  ret_from_fork+0x10/0x20
[   28.354016] 
[   28.354404] Allocated by task 254:
[   28.354994]  kasan_save_stack+0x3c/0x68
[   28.355629]  kasan_save_track+0x20/0x40
[   28.356259]  kasan_save_alloc_info+0x40/0x58
[   28.356807]  __kasan_kmalloc+0xd4/0xd8
[   28.357302]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.357898]  kasan_atomics+0xb8/0x2e8
[   28.358498]  kunit_try_run_case+0x14c/0x3d0
[   28.359126]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.359697]  kthread+0x24c/0x2d0
[   28.360197]  ret_from_fork+0x10/0x20
[   28.360845] 
[   28.361298] The buggy address belongs to the object at fff00000c5d53180
[   28.361298]  which belongs to the cache kmalloc-64 of size 64
[   28.362578] The buggy address is located 0 bytes to the right of
[   28.362578]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   28.364361] 
[   28.364690] The buggy address belongs to the physical page:
[   28.365504] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   28.366566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.367470] page_type: f5(slab)
[   28.367999] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.369005] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.370011] page dumped because: kasan: bad access detected
[   28.370542] 
[   28.371046] Memory state around the buggy address:
[   28.371781]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.372733]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.373919] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.374692]                                      ^
[   28.375346]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.376251]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.376985] ==================================================================
---
[   29.707298] ==================================================================
[   29.707982] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   29.708656] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   29.709547] 
[   29.710316] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.711247] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.712140] Hardware name: linux,dummy-virt (DT)
[   29.712859] Call trace:
[   29.713401]  show_stack+0x20/0x38 (C)
[   29.713973]  dump_stack_lvl+0x8c/0xd0
[   29.714680]  print_report+0x118/0x5e0
[   29.715393]  kasan_report+0xc8/0x118
[   29.716086]  kasan_check_range+0x100/0x1a8
[   29.716806]  __kasan_check_write+0x20/0x30
[   29.717399]  kasan_atomics_helper+0xff0/0x4858
[   29.718164]  kasan_atomics+0x198/0x2e8
[   29.718832]  kunit_try_run_case+0x14c/0x3d0
[   29.719548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.720277]  kthread+0x24c/0x2d0
[   29.720765]  ret_from_fork+0x10/0x20
[   29.721278] 
[   29.721557] Allocated by task 254:
[   29.722596]  kasan_save_stack+0x3c/0x68
[   29.723308]  kasan_save_track+0x20/0x40
[   29.724005]  kasan_save_alloc_info+0x40/0x58
[   29.724684]  __kasan_kmalloc+0xd4/0xd8
[   29.725373]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.726122]  kasan_atomics+0xb8/0x2e8
[   29.726794]  kunit_try_run_case+0x14c/0x3d0
[   29.727481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.728150]  kthread+0x24c/0x2d0
[   29.728831]  ret_from_fork+0x10/0x20
[   29.729504] 
[   29.729985] The buggy address belongs to the object at fff00000c5d53180
[   29.729985]  which belongs to the cache kmalloc-64 of size 64
[   29.731361] The buggy address is located 0 bytes to the right of
[   29.731361]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   29.732887] 
[   29.733186] The buggy address belongs to the physical page:
[   29.734095] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   29.735079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.735929] page_type: f5(slab)
[   29.736560] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.737566] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.738399] page dumped because: kasan: bad access detected
[   29.739256] 
[   29.739706] Memory state around the buggy address:
[   29.740460]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.741383]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.742316] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.743094]                                      ^
[   29.743889]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.744829]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.745733] ==================================================================
---
[   29.981976] ==================================================================
[   29.982599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   29.983661] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   29.984923] 
[   29.985313] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.986892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.987557] Hardware name: linux,dummy-virt (DT)
[   29.988167] Call trace:
[   29.988586]  show_stack+0x20/0x38 (C)
[   29.989176]  dump_stack_lvl+0x8c/0xd0
[   29.989726]  print_report+0x118/0x5e0
[   29.990331]  kasan_report+0xc8/0x118
[   29.990966]  kasan_check_range+0x100/0x1a8
[   29.991513]  __kasan_check_write+0x20/0x30
[   29.992160]  kasan_atomics_helper+0x12d8/0x4858
[   29.992733]  kasan_atomics+0x198/0x2e8
[   29.993358]  kunit_try_run_case+0x14c/0x3d0
[   29.993965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.994651]  kthread+0x24c/0x2d0
[   29.995211]  ret_from_fork+0x10/0x20
[   29.995794] 
[   29.996092] Allocated by task 254:
[   29.996575]  kasan_save_stack+0x3c/0x68
[   29.997185]  kasan_save_track+0x20/0x40
[   29.997729]  kasan_save_alloc_info+0x40/0x58
[   29.998328]  __kasan_kmalloc+0xd4/0xd8
[   29.998858]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.999527]  kasan_atomics+0xb8/0x2e8
[   30.000090]  kunit_try_run_case+0x14c/0x3d0
[   30.000666]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.001336]  kthread+0x24c/0x2d0
[   30.001815]  ret_from_fork+0x10/0x20
[   30.002289] 
[   30.002663] The buggy address belongs to the object at fff00000c5d53180
[   30.002663]  which belongs to the cache kmalloc-64 of size 64
[   30.003955] The buggy address is located 0 bytes to the right of
[   30.003955]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   30.005205] 
[   30.005528] The buggy address belongs to the physical page:
[   30.006259] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   30.007113] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.007865] page_type: f5(slab)
[   30.008329] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.009089] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.009981] page dumped because: kasan: bad access detected
[   30.010659] 
[   30.010990] Memory state around the buggy address:
[   30.011820]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.012620]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.013422] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.014213]                                      ^
[   30.014785]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.015627]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.016430] ==================================================================
---
[   29.072736] ==================================================================
[   29.073414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   29.074186] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   29.074853] 
[   29.075208] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.076596] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.077214] Hardware name: linux,dummy-virt (DT)
[   29.077820] Call trace:
[   29.078183]  show_stack+0x20/0x38 (C)
[   29.078787]  dump_stack_lvl+0x8c/0xd0
[   29.079391]  print_report+0x118/0x5e0
[   29.079966]  kasan_report+0xc8/0x118
[   29.080578]  kasan_check_range+0x100/0x1a8
[   29.081187]  __kasan_check_write+0x20/0x30
[   29.081870]  kasan_atomics_helper+0xad4/0x4858
[   29.082496]  kasan_atomics+0x198/0x2e8
[   29.083084]  kunit_try_run_case+0x14c/0x3d0
[   29.083665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.084343]  kthread+0x24c/0x2d0
[   29.084924]  ret_from_fork+0x10/0x20
[   29.085479] 
[   29.085830] Allocated by task 254:
[   29.086299]  kasan_save_stack+0x3c/0x68
[   29.086919]  kasan_save_track+0x20/0x40
[   29.087394]  kasan_save_alloc_info+0x40/0x58
[   29.088055]  __kasan_kmalloc+0xd4/0xd8
[   29.088593]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.089262]  kasan_atomics+0xb8/0x2e8
[   29.089809]  kunit_try_run_case+0x14c/0x3d0
[   29.090435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.091129]  kthread+0x24c/0x2d0
[   29.091585]  ret_from_fork+0x10/0x20
[   29.092171] 
[   29.092479] The buggy address belongs to the object at fff00000c5d53180
[   29.092479]  which belongs to the cache kmalloc-64 of size 64
[   29.093812] The buggy address is located 0 bytes to the right of
[   29.093812]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   29.095058] 
[   29.095417] The buggy address belongs to the physical page:
[   29.096033] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   29.096916] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.097591] page_type: f5(slab)
[   29.098172] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.099027] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.099923] page dumped because: kasan: bad access detected
[   29.100428] 
[   29.100769] Memory state around the buggy address:
[   29.101368]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.102247]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.103086] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.103848]                                      ^
[   29.104470]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.105254]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.106040] ==================================================================
---
[   30.156108] ==================================================================
[   30.156674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   30.157621] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   30.158290] 
[   30.158638] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.159832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.160381] Hardware name: linux,dummy-virt (DT)
[   30.160944] Call trace:
[   30.161325]  show_stack+0x20/0x38 (C)
[   30.161915]  dump_stack_lvl+0x8c/0xd0
[   30.162445]  print_report+0x118/0x5e0
[   30.163122]  kasan_report+0xc8/0x118
[   30.163682]  kasan_check_range+0x100/0x1a8
[   30.164258]  __kasan_check_write+0x20/0x30
[   30.164861]  kasan_atomics_helper+0x14e4/0x4858
[   30.165458]  kasan_atomics+0x198/0x2e8
[   30.166034]  kunit_try_run_case+0x14c/0x3d0
[   30.166696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.167336]  kthread+0x24c/0x2d0
[   30.167957]  ret_from_fork+0x10/0x20
[   30.168489] 
[   30.168796] Allocated by task 254:
[   30.169360]  kasan_save_stack+0x3c/0x68
[   30.169932]  kasan_save_track+0x20/0x40
[   30.170360]  kasan_save_alloc_info+0x40/0x58
[   30.170924]  __kasan_kmalloc+0xd4/0xd8
[   30.171462]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.172184]  kasan_atomics+0xb8/0x2e8
[   30.172684]  kunit_try_run_case+0x14c/0x3d0
[   30.173227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.174072]  kthread+0x24c/0x2d0
[   30.174585]  ret_from_fork+0x10/0x20
[   30.175139] 
[   30.175455] The buggy address belongs to the object at fff00000c5d53180
[   30.175455]  which belongs to the cache kmalloc-64 of size 64
[   30.176579] The buggy address is located 0 bytes to the right of
[   30.176579]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   30.177805] 
[   30.178139] The buggy address belongs to the physical page:
[   30.178775] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   30.179572] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.180433] page_type: f5(slab)
[   30.180918] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.181821] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.182604] page dumped because: kasan: bad access detected
[   30.183255] 
[   30.183573] Memory state around the buggy address:
[   30.184075]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.184851]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.185611] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.186458]                                      ^
[   30.187088]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.187854]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.188644] ==================================================================
---
[   30.519366] ==================================================================
[   30.520031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   30.520898] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   30.521734] 
[   30.522116] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.523336] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.524000] Hardware name: linux,dummy-virt (DT)
[   30.524606] Call trace:
[   30.525107]  show_stack+0x20/0x38 (C)
[   30.525770]  dump_stack_lvl+0x8c/0xd0
[   30.526312]  print_report+0x118/0x5e0
[   30.526856]  kasan_report+0xc8/0x118
[   30.527421]  kasan_check_range+0x100/0x1a8
[   30.528004]  __kasan_check_write+0x20/0x30
[   30.528687]  kasan_atomics_helper+0x17ec/0x4858
[   30.529360]  kasan_atomics+0x198/0x2e8
[   30.529990]  kunit_try_run_case+0x14c/0x3d0
[   30.530621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.531406]  kthread+0x24c/0x2d0
[   30.531968]  ret_from_fork+0x10/0x20
[   30.532511] 
[   30.532920] Allocated by task 254:
[   30.533468]  kasan_save_stack+0x3c/0x68
[   30.534046]  kasan_save_track+0x20/0x40
[   30.534639]  kasan_save_alloc_info+0x40/0x58
[   30.535303]  __kasan_kmalloc+0xd4/0xd8
[   30.535964]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.536559]  kasan_atomics+0xb8/0x2e8
[   30.537268]  kunit_try_run_case+0x14c/0x3d0
[   30.537832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.538620]  kthread+0x24c/0x2d0
[   30.539201]  ret_from_fork+0x10/0x20
[   30.539738] 
[   30.540111] The buggy address belongs to the object at fff00000c5d53180
[   30.540111]  which belongs to the cache kmalloc-64 of size 64
[   30.541362] The buggy address is located 0 bytes to the right of
[   30.541362]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   30.542717] 
[   30.543146] The buggy address belongs to the physical page:
[   30.543908] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   30.544916] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.545678] page_type: f5(slab)
[   30.546117] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.546931] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.547793] page dumped because: kasan: bad access detected
[   30.548430] 
[   30.548817] Memory state around the buggy address:
[   30.549515]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.550503]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.551348] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.552203]                                      ^
[   30.552844]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.553693]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.554512] ==================================================================
---
[   28.779540] ==================================================================
[   28.780653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   28.781533] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   28.782344] 
[   28.782727] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   28.783935] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.784494] Hardware name: linux,dummy-virt (DT)
[   28.785120] Call trace:
[   28.785511]  show_stack+0x20/0x38 (C)
[   28.786174]  dump_stack_lvl+0x8c/0xd0
[   28.786926]  print_report+0x118/0x5e0
[   28.787503]  kasan_report+0xc8/0x118
[   28.788214]  kasan_check_range+0x100/0x1a8
[   28.788913]  __kasan_check_write+0x20/0x30
[   28.789515]  kasan_atomics_helper+0x760/0x4858
[   28.790212]  kasan_atomics+0x198/0x2e8
[   28.790834]  kunit_try_run_case+0x14c/0x3d0
[   28.791464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.792221]  kthread+0x24c/0x2d0
[   28.792807]  ret_from_fork+0x10/0x20
[   28.793422] 
[   28.793776] Allocated by task 254:
[   28.794384]  kasan_save_stack+0x3c/0x68
[   28.795061]  kasan_save_track+0x20/0x40
[   28.795584]  kasan_save_alloc_info+0x40/0x58
[   28.796262]  __kasan_kmalloc+0xd4/0xd8
[   28.796867]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.797498]  kasan_atomics+0xb8/0x2e8
[   28.798082]  kunit_try_run_case+0x14c/0x3d0
[   28.798684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.799429]  kthread+0x24c/0x2d0
[   28.799965]  ret_from_fork+0x10/0x20
[   28.800510] 
[   28.800870] The buggy address belongs to the object at fff00000c5d53180
[   28.800870]  which belongs to the cache kmalloc-64 of size 64
[   28.802213] The buggy address is located 0 bytes to the right of
[   28.802213]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   28.803534] 
[   28.803918] The buggy address belongs to the physical page:
[   28.804681] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   28.805615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.806456] page_type: f5(slab)
[   28.807034] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.807930] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.808796] page dumped because: kasan: bad access detected
[   28.809481] 
[   28.809817] Memory state around the buggy address:
[   28.810488]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.811290]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.812245] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.813069]                                      ^
[   28.813680]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.814558]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.815389] ==================================================================
---
[   30.224308] ==================================================================
[   30.225012] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   30.226092] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   30.226816] 
[   30.227271] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.228294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.228939] Hardware name: linux,dummy-virt (DT)
[   30.229476] Call trace:
[   30.229908]  show_stack+0x20/0x38 (C)
[   30.230593]  dump_stack_lvl+0x8c/0xd0
[   30.231323]  print_report+0x118/0x5e0
[   30.231879]  kasan_report+0xc8/0x118
[   30.232864]  kasan_check_range+0x100/0x1a8
[   30.233340]  __kasan_check_write+0x20/0x30
[   30.233787]  kasan_atomics_helper+0x15b4/0x4858
[   30.234812]  kasan_atomics+0x198/0x2e8
[   30.235504]  kunit_try_run_case+0x14c/0x3d0
[   30.236162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.236996]  kthread+0x24c/0x2d0
[   30.237456]  ret_from_fork+0x10/0x20
[   30.237967] 
[   30.238252] Allocated by task 254:
[   30.238706]  kasan_save_stack+0x3c/0x68
[   30.239251]  kasan_save_track+0x20/0x40
[   30.239849]  kasan_save_alloc_info+0x40/0x58
[   30.240660]  __kasan_kmalloc+0xd4/0xd8
[   30.241275]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.242014]  kasan_atomics+0xb8/0x2e8
[   30.242619]  kunit_try_run_case+0x14c/0x3d0
[   30.243325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.244054]  kthread+0x24c/0x2d0
[   30.244625]  ret_from_fork+0x10/0x20
[   30.245292] 
[   30.245511] The buggy address belongs to the object at fff00000c5d53180
[   30.245511]  which belongs to the cache kmalloc-64 of size 64
[   30.246998] The buggy address is located 0 bytes to the right of
[   30.246998]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   30.248522] 
[   30.248964] The buggy address belongs to the physical page:
[   30.249630] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   30.250620] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.251424] page_type: f5(slab)
[   30.251961] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.252851] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.253698] page dumped because: kasan: bad access detected
[   30.254352] 
[   30.254722] Memory state around the buggy address:
[   30.255355]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.256162]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.256912] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.257635]                                      ^
[   30.258341]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.259188]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.260003] ==================================================================
---
[   28.212292] ==================================================================
[   28.212939] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   28.213566] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   28.215854] 
[   28.216148] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   28.216984] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.217407] Hardware name: linux,dummy-virt (DT)
[   28.217891] Call trace:
[   28.218601]  show_stack+0x20/0x38 (C)
[   28.219842]  dump_stack_lvl+0x8c/0xd0
[   28.220108]  print_report+0x118/0x5e0
[   28.220342]  kasan_report+0xc8/0x118
[   28.220570]  kasan_check_range+0x100/0x1a8
[   28.220853]  __kasan_check_write+0x20/0x30
[   28.221106]  kasan_atomics_helper+0x24c/0x4858
[   28.221359]  kasan_atomics+0x198/0x2e8
[   28.221588]  kunit_try_run_case+0x14c/0x3d0
[   28.222002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.222533]  kthread+0x24c/0x2d0
[   28.222941]  ret_from_fork+0x10/0x20
[   28.225237] 
[   28.226163] Allocated by task 254:
[   28.226802]  kasan_save_stack+0x3c/0x68
[   28.227493]  kasan_save_track+0x20/0x40
[   28.228386]  kasan_save_alloc_info+0x40/0x58
[   28.228942]  __kasan_kmalloc+0xd4/0xd8
[   28.229411]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.230009]  kasan_atomics+0xb8/0x2e8
[   28.230561]  kunit_try_run_case+0x14c/0x3d0
[   28.231417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.232069]  kthread+0x24c/0x2d0
[   28.232434]  ret_from_fork+0x10/0x20
[   28.232836] 
[   28.233062] The buggy address belongs to the object at fff00000c5d53180
[   28.233062]  which belongs to the cache kmalloc-64 of size 64
[   28.235999] The buggy address is located 0 bytes to the right of
[   28.235999]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   28.237691] 
[   28.237988] The buggy address belongs to the physical page:
[   28.238492] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   28.239865] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.240772] page_type: f5(slab)
[   28.241404] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.242283] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.243514] page dumped because: kasan: bad access detected
[   28.244170] 
[   28.244570] Memory state around the buggy address:
[   28.245337]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.246119]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.246955] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.248127]                                      ^
[   28.248802]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.249725]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.250638] ==================================================================
---
[   30.189930] ==================================================================
[   30.190651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   30.191585] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   30.192315] 
[   30.192653] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.193808] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.194381] Hardware name: linux,dummy-virt (DT)
[   30.194945] Call trace:
[   30.195352]  show_stack+0x20/0x38 (C)
[   30.195942]  dump_stack_lvl+0x8c/0xd0
[   30.196506]  print_report+0x118/0x5e0
[   30.197012]  kasan_report+0xc8/0x118
[   30.197571]  kasan_check_range+0x100/0x1a8
[   30.198183]  __kasan_check_write+0x20/0x30
[   30.198785]  kasan_atomics_helper+0x154c/0x4858
[   30.199383]  kasan_atomics+0x198/0x2e8
[   30.199976]  kunit_try_run_case+0x14c/0x3d0
[   30.200613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.201365]  kthread+0x24c/0x2d0
[   30.201911]  ret_from_fork+0x10/0x20
[   30.202468] 
[   30.202783] Allocated by task 254:
[   30.203313]  kasan_save_stack+0x3c/0x68
[   30.203793]  kasan_save_track+0x20/0x40
[   30.204424]  kasan_save_alloc_info+0x40/0x58
[   30.204998]  __kasan_kmalloc+0xd4/0xd8
[   30.205530]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.206157]  kasan_atomics+0xb8/0x2e8
[   30.206679]  kunit_try_run_case+0x14c/0x3d0
[   30.207243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.207864]  kthread+0x24c/0x2d0
[   30.208414]  ret_from_fork+0x10/0x20
[   30.208942] 
[   30.209246] The buggy address belongs to the object at fff00000c5d53180
[   30.209246]  which belongs to the cache kmalloc-64 of size 64
[   30.210347] The buggy address is located 0 bytes to the right of
[   30.210347]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   30.211670] 
[   30.212004] The buggy address belongs to the physical page:
[   30.212599] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   30.213492] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.214304] page_type: f5(slab)
[   30.214796] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.215645] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.216470] page dumped because: kasan: bad access detected
[   30.217140] 
[   30.217437] Memory state around the buggy address:
[   30.218068]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.218861]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.219643] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.220419]                                      ^
[   30.221026]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.221842]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.222591] ==================================================================
---
[   29.941339] ==================================================================
[   29.942388] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   29.943679] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   29.944633] 
[   29.945171] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.946283] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.946810] Hardware name: linux,dummy-virt (DT)
[   29.947361] Call trace:
[   29.948157]  show_stack+0x20/0x38 (C)
[   29.948614]  dump_stack_lvl+0x8c/0xd0
[   29.949316]  print_report+0x118/0x5e0
[   29.950003]  kasan_report+0xc8/0x118
[   29.950651]  kasan_check_range+0x100/0x1a8
[   29.951360]  __kasan_check_write+0x20/0x30
[   29.952066]  kasan_atomics_helper+0x126c/0x4858
[   29.952803]  kasan_atomics+0x198/0x2e8
[   29.953478]  kunit_try_run_case+0x14c/0x3d0
[   29.954232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.954917]  kthread+0x24c/0x2d0
[   29.955408]  ret_from_fork+0x10/0x20
[   29.955925] 
[   29.956216] Allocated by task 254:
[   29.956632]  kasan_save_stack+0x3c/0x68
[   29.957602]  kasan_save_track+0x20/0x40
[   29.958293]  kasan_save_alloc_info+0x40/0x58
[   29.959003]  __kasan_kmalloc+0xd4/0xd8
[   29.959652]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.960409]  kasan_atomics+0xb8/0x2e8
[   29.961082]  kunit_try_run_case+0x14c/0x3d0
[   29.961778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.962577]  kthread+0x24c/0x2d0
[   29.963213]  ret_from_fork+0x10/0x20
[   29.963895] 
[   29.964378] The buggy address belongs to the object at fff00000c5d53180
[   29.964378]  which belongs to the cache kmalloc-64 of size 64
[   29.965836] The buggy address is located 0 bytes to the right of
[   29.965836]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   29.967257] 
[   29.967567] The buggy address belongs to the physical page:
[   29.968452] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   29.969434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.970248] page_type: f5(slab)
[   29.970718] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.971548] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.972685] page dumped because: kasan: bad access detected
[   29.973410] 
[   29.973911] Memory state around the buggy address:
[   29.974443]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.975466]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.976215] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.977180]                                      ^
[   29.977911]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.978889]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.979730] ==================================================================
---
[   30.294709] ==================================================================
[   30.295379] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   30.296520] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   30.297346] 
[   30.297719] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.298693] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.299339] Hardware name: linux,dummy-virt (DT)
[   30.299908] Call trace:
[   30.300379]  show_stack+0x20/0x38 (C)
[   30.300944]  dump_stack_lvl+0x8c/0xd0
[   30.301527]  print_report+0x118/0x5e0
[   30.302178]  kasan_report+0xc8/0x118
[   30.302732]  kasan_check_range+0x100/0x1a8
[   30.303426]  __kasan_check_write+0x20/0x30
[   30.304368]  kasan_atomics_helper+0x1644/0x4858
[   30.304976]  kasan_atomics+0x198/0x2e8
[   30.305510]  kunit_try_run_case+0x14c/0x3d0
[   30.306166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.306871]  kthread+0x24c/0x2d0
[   30.307446]  ret_from_fork+0x10/0x20
[   30.307940] 
[   30.308256] Allocated by task 254:
[   30.308768]  kasan_save_stack+0x3c/0x68
[   30.309261]  kasan_save_track+0x20/0x40
[   30.309881]  kasan_save_alloc_info+0x40/0x58
[   30.310465]  __kasan_kmalloc+0xd4/0xd8
[   30.311134]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.311662]  kasan_atomics+0xb8/0x2e8
[   30.312234]  kunit_try_run_case+0x14c/0x3d0
[   30.312870]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.313589]  kthread+0x24c/0x2d0
[   30.314115]  ret_from_fork+0x10/0x20
[   30.314624] 
[   30.314954] The buggy address belongs to the object at fff00000c5d53180
[   30.314954]  which belongs to the cache kmalloc-64 of size 64
[   30.316124] The buggy address is located 0 bytes to the right of
[   30.316124]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   30.317404] 
[   30.317731] The buggy address belongs to the physical page:
[   30.318378] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   30.319636] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.320446] page_type: f5(slab)
[   30.320953] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.321807] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.322596] page dumped because: kasan: bad access detected
[   30.323276] 
[   30.323560] Memory state around the buggy address:
[   30.324132]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.324933]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.325708] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.326541]                                      ^
[   30.327128]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.327911]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.328724] ==================================================================
---
[   28.743446] ==================================================================
[   28.744308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   28.744691] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   28.745630] 
[   28.746319] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   28.747602] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.748134] Hardware name: linux,dummy-virt (DT)
[   28.748663] Call trace:
[   28.749079]  show_stack+0x20/0x38 (C)
[   28.749756]  dump_stack_lvl+0x8c/0xd0
[   28.750323]  print_report+0x118/0x5e0
[   28.750861]  kasan_report+0xc8/0x118
[   28.751450]  kasan_check_range+0x100/0x1a8
[   28.752087]  __kasan_check_write+0x20/0x30
[   28.752827]  kasan_atomics_helper+0x6ec/0x4858
[   28.753417]  kasan_atomics+0x198/0x2e8
[   28.753957]  kunit_try_run_case+0x14c/0x3d0
[   28.754621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.755317]  kthread+0x24c/0x2d0
[   28.755908]  ret_from_fork+0x10/0x20
[   28.756438] 
[   28.756758] Allocated by task 254:
[   28.757196]  kasan_save_stack+0x3c/0x68
[   28.757806]  kasan_save_track+0x20/0x40
[   28.758433]  kasan_save_alloc_info+0x40/0x58
[   28.759036]  __kasan_kmalloc+0xd4/0xd8
[   28.759538]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.760129]  kasan_atomics+0xb8/0x2e8
[   28.760695]  kunit_try_run_case+0x14c/0x3d0
[   28.761351]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.761949]  kthread+0x24c/0x2d0
[   28.762529]  ret_from_fork+0x10/0x20
[   28.763089] 
[   28.763438] The buggy address belongs to the object at fff00000c5d53180
[   28.763438]  which belongs to the cache kmalloc-64 of size 64
[   28.764709] The buggy address is located 0 bytes to the right of
[   28.764709]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   28.766058] 
[   28.766401] The buggy address belongs to the physical page:
[   28.767034] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   28.768066] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.768874] page_type: f5(slab)
[   28.769300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.770232] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.771160] page dumped because: kasan: bad access detected
[   28.771861] 
[   28.772188] Memory state around the buggy address:
[   28.772903]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.773689]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.774589] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.775489]                                      ^
[   28.776127]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.776929]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.777707] ==================================================================
---
[   29.665503] ==================================================================
[   29.666313] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   29.667924] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   29.668610] 
[   29.668874] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.669679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.671044] Hardware name: linux,dummy-virt (DT)
[   29.671581] Call trace:
[   29.671974]  show_stack+0x20/0x38 (C)
[   29.672486]  dump_stack_lvl+0x8c/0xd0
[   29.673388]  print_report+0x118/0x5e0
[   29.674114]  kasan_report+0xc8/0x118
[   29.674791]  kasan_check_range+0x100/0x1a8
[   29.675518]  __kasan_check_write+0x20/0x30
[   29.676262]  kasan_atomics_helper+0xf88/0x4858
[   29.676905]  kasan_atomics+0x198/0x2e8
[   29.677639]  kunit_try_run_case+0x14c/0x3d0
[   29.678367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.679193]  kthread+0x24c/0x2d0
[   29.679879]  ret_from_fork+0x10/0x20
[   29.680558] 
[   29.681037] Allocated by task 254:
[   29.681598]  kasan_save_stack+0x3c/0x68
[   29.682278]  kasan_save_track+0x20/0x40
[   29.682960]  kasan_save_alloc_info+0x40/0x58
[   29.683673]  __kasan_kmalloc+0xd4/0xd8
[   29.684380]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.685223]  kasan_atomics+0xb8/0x2e8
[   29.685903]  kunit_try_run_case+0x14c/0x3d0
[   29.686613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.687354]  kthread+0x24c/0x2d0
[   29.687780]  ret_from_fork+0x10/0x20
[   29.688247] 
[   29.688538] The buggy address belongs to the object at fff00000c5d53180
[   29.688538]  which belongs to the cache kmalloc-64 of size 64
[   29.690433] The buggy address is located 0 bytes to the right of
[   29.690433]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   29.692095] 
[   29.692561] The buggy address belongs to the physical page:
[   29.693323] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   29.694343] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.695244] page_type: f5(slab)
[   29.695719] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.696800] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.697814] page dumped because: kasan: bad access detected
[   29.698458] 
[   29.699026] Memory state around the buggy address:
[   29.699697]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.700576]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.701376] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.702344]                                      ^
[   29.703089]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.704027]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.704985] ==================================================================

test log snippet boot parser 24

Home

[   28.890342] ==================================================================
[   28.891387] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   28.893202] Read of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   28.894106] 
[   28.894356] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   28.895812] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.896376] Hardware name: linux,dummy-virt (DT)
[   28.897007] Call trace:
[   28.897363]  show_stack+0x20/0x38 (C)
[   28.897965]  dump_stack_lvl+0x8c/0xd0
[   28.898537]  print_report+0x118/0x5e0
[   28.899102]  kasan_report+0xc8/0x118
[   28.899690]  __asan_report_load4_noabort+0x20/0x30
[   28.900331]  kasan_atomics_helper+0x42d8/0x4858
[   28.900898]  kasan_atomics+0x198/0x2e8
[   28.901536]  kunit_try_run_case+0x14c/0x3d0
[   28.902101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.902862]  kthread+0x24c/0x2d0
[   28.903382]  ret_from_fork+0x10/0x20
[   28.903996] 
[   28.904363] Allocated by task 254:
[   28.904812]  kasan_save_stack+0x3c/0x68
[   28.905371]  kasan_save_track+0x20/0x40
[   28.906026]  kasan_save_alloc_info+0x40/0x58
[   28.906597]  __kasan_kmalloc+0xd4/0xd8
[   28.907150]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.907655]  kasan_atomics+0xb8/0x2e8
[   28.908235]  kunit_try_run_case+0x14c/0x3d0
[   28.908885]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.909602]  kthread+0x24c/0x2d0
[   28.910221]  ret_from_fork+0x10/0x20
[   28.910731] 
[   28.911086] The buggy address belongs to the object at fff00000c5d53180
[   28.911086]  which belongs to the cache kmalloc-64 of size 64
[   28.912260] The buggy address is located 0 bytes to the right of
[   28.912260]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   28.913557] 
[   28.913894] The buggy address belongs to the physical page:
[   28.914500] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   28.915454] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.916257] page_type: f5(slab)
[   28.916723] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.917663] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.918419] page dumped because: kasan: bad access detected
[   28.919116] 
[   28.919425] Memory state around the buggy address:
[   28.919995]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.920840]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.921628] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.922456]                                      ^
[   28.923102]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.923911]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.924790] ==================================================================
---
[   29.107779] ==================================================================
[   29.108512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   29.109220] Read of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   29.110075] 
[   29.110416] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.111925] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.112437] Hardware name: linux,dummy-virt (DT)
[   29.113367] Call trace:
[   29.113921]  show_stack+0x20/0x38 (C)
[   29.114501]  dump_stack_lvl+0x8c/0xd0
[   29.115066]  print_report+0x118/0x5e0
[   29.115592]  kasan_report+0xc8/0x118
[   29.116213]  __asan_report_load4_noabort+0x20/0x30
[   29.116886]  kasan_atomics_helper+0x3dcc/0x4858
[   29.117483]  kasan_atomics+0x198/0x2e8
[   29.118056]  kunit_try_run_case+0x14c/0x3d0
[   29.118703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.119404]  kthread+0x24c/0x2d0
[   29.119921]  ret_from_fork+0x10/0x20
[   29.120495] 
[   29.120827] Allocated by task 254:
[   29.121251]  kasan_save_stack+0x3c/0x68
[   29.121849]  kasan_save_track+0x20/0x40
[   29.122358]  kasan_save_alloc_info+0x40/0x58
[   29.123011]  __kasan_kmalloc+0xd4/0xd8
[   29.123491]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.124201]  kasan_atomics+0xb8/0x2e8
[   29.124700]  kunit_try_run_case+0x14c/0x3d0
[   29.125289]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.125944]  kthread+0x24c/0x2d0
[   29.126476]  ret_from_fork+0x10/0x20
[   29.127064] 
[   29.127379] The buggy address belongs to the object at fff00000c5d53180
[   29.127379]  which belongs to the cache kmalloc-64 of size 64
[   29.128526] The buggy address is located 0 bytes to the right of
[   29.128526]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   29.129714] 
[   29.130059] The buggy address belongs to the physical page:
[   29.130722] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   29.131661] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.132389] page_type: f5(slab)
[   29.132890] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.133799] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.134563] page dumped because: kasan: bad access detected
[   29.135224] 
[   29.135525] Memory state around the buggy address:
[   29.136055]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.136940]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.137728] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.138498]                                      ^
[   29.139194]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.139976]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.140809] ==================================================================
---
[   29.250041] ==================================================================
[   29.250651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   29.251797] Read of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   29.252728] 
[   29.253101] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.254733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.255458] Hardware name: linux,dummy-virt (DT)
[   29.256239] Call trace:
[   29.256803]  show_stack+0x20/0x38 (C)
[   29.257474]  dump_stack_lvl+0x8c/0xd0
[   29.258170]  print_report+0x118/0x5e0
[   29.258884]  kasan_report+0xc8/0x118
[   29.259515]  __asan_report_load4_noabort+0x20/0x30
[   29.260102]  kasan_atomics_helper+0x3de4/0x4858
[   29.260680]  kasan_atomics+0x198/0x2e8
[   29.261604]  kunit_try_run_case+0x14c/0x3d0
[   29.262339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.263195]  kthread+0x24c/0x2d0
[   29.263854]  ret_from_fork+0x10/0x20
[   29.264514] 
[   29.264820] Allocated by task 254:
[   29.265307]  kasan_save_stack+0x3c/0x68
[   29.266137]  kasan_save_track+0x20/0x40
[   29.266782]  kasan_save_alloc_info+0x40/0x58
[   29.267327]  __kasan_kmalloc+0xd4/0xd8
[   29.267977]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.268676]  kasan_atomics+0xb8/0x2e8
[   29.269337]  kunit_try_run_case+0x14c/0x3d0
[   29.270056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.270877]  kthread+0x24c/0x2d0
[   29.271480]  ret_from_fork+0x10/0x20
[   29.271993] 
[   29.272306] The buggy address belongs to the object at fff00000c5d53180
[   29.272306]  which belongs to the cache kmalloc-64 of size 64
[   29.273847] The buggy address is located 0 bytes to the right of
[   29.273847]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   29.275282] 
[   29.275796] The buggy address belongs to the physical page:
[   29.276534] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   29.277535] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.278373] page_type: f5(slab)
[   29.279043] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.280046] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.281010] page dumped because: kasan: bad access detected
[   29.281648] 
[   29.282210] Memory state around the buggy address:
[   29.282929]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.283823]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.284768] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.285506]                                      ^
[   29.286304]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.287244]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.288145] ==================================================================
---
[   30.052844] ==================================================================
[   30.053534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   30.054356] Read of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   30.055278] 
[   30.055647] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.056694] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.057171] Hardware name: linux,dummy-virt (DT)
[   30.057783] Call trace:
[   30.058180]  show_stack+0x20/0x38 (C)
[   30.058704]  dump_stack_lvl+0x8c/0xd0
[   30.059297]  print_report+0x118/0x5e0
[   30.059835]  kasan_report+0xc8/0x118
[   30.060351]  __asan_report_load8_noabort+0x20/0x30
[   30.060992]  kasan_atomics_helper+0x3f04/0x4858
[   30.061658]  kasan_atomics+0x198/0x2e8
[   30.062254]  kunit_try_run_case+0x14c/0x3d0
[   30.062882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.063595]  kthread+0x24c/0x2d0
[   30.064187]  ret_from_fork+0x10/0x20
[   30.064726] 
[   30.065077] Allocated by task 254:
[   30.065539]  kasan_save_stack+0x3c/0x68
[   30.066134]  kasan_save_track+0x20/0x40
[   30.066666]  kasan_save_alloc_info+0x40/0x58
[   30.067250]  __kasan_kmalloc+0xd4/0xd8
[   30.067837]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.068421]  kasan_atomics+0xb8/0x2e8
[   30.068982]  kunit_try_run_case+0x14c/0x3d0
[   30.069623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.070237]  kthread+0x24c/0x2d0
[   30.070820]  ret_from_fork+0x10/0x20
[   30.071376] 
[   30.071661] The buggy address belongs to the object at fff00000c5d53180
[   30.071661]  which belongs to the cache kmalloc-64 of size 64
[   30.072919] The buggy address is located 0 bytes to the right of
[   30.072919]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   30.074131] 
[   30.074446] The buggy address belongs to the physical page:
[   30.075013] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   30.076042] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.076734] page_type: f5(slab)
[   30.077249] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.078074] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.078913] page dumped because: kasan: bad access detected
[   30.079612] 
[   30.079956] Memory state around the buggy address:
[   30.080525]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.081321]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.082084] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.082844]                                      ^
[   30.083479]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.084240]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.085003] ==================================================================
---
[   30.261554] ==================================================================
[   30.262506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   30.263557] Read of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   30.264557] 
[   30.265012] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.265479] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.265694] Hardware name: linux,dummy-virt (DT)
[   30.265955] Call trace:
[   30.266117]  show_stack+0x20/0x38 (C)
[   30.266350]  dump_stack_lvl+0x8c/0xd0
[   30.266597]  print_report+0x118/0x5e0
[   30.267180]  kasan_report+0xc8/0x118
[   30.268109]  __asan_report_load8_noabort+0x20/0x30
[   30.269074]  kasan_atomics_helper+0x3db0/0x4858
[   30.269936]  kasan_atomics+0x198/0x2e8
[   30.270588]  kunit_try_run_case+0x14c/0x3d0
[   30.271246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.271936]  kthread+0x24c/0x2d0
[   30.272428]  ret_from_fork+0x10/0x20
[   30.272972] 
[   30.273293] Allocated by task 254:
[   30.273771]  kasan_save_stack+0x3c/0x68
[   30.274295]  kasan_save_track+0x20/0x40
[   30.274884]  kasan_save_alloc_info+0x40/0x58
[   30.275394]  __kasan_kmalloc+0xd4/0xd8
[   30.275988]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.276576]  kasan_atomics+0xb8/0x2e8
[   30.277114]  kunit_try_run_case+0x14c/0x3d0
[   30.277659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.278301]  kthread+0x24c/0x2d0
[   30.278808]  ret_from_fork+0x10/0x20
[   30.279322] 
[   30.279625] The buggy address belongs to the object at fff00000c5d53180
[   30.279625]  which belongs to the cache kmalloc-64 of size 64
[   30.280844] The buggy address is located 0 bytes to the right of
[   30.280844]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   30.282125] 
[   30.282468] The buggy address belongs to the physical page:
[   30.283125] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   30.284063] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.284926] page_type: f5(slab)
[   30.285388] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.286324] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.287156] page dumped because: kasan: bad access detected
[   30.287790] 
[   30.288104] Memory state around the buggy address:
[   30.288629]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.289507]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.290280] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.291090]                                      ^
[   30.291719]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.292511]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.293247] ==================================================================
---
[   28.084279] ==================================================================
[   28.085889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   28.086670] Read of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   28.087289] 
[   28.088483] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   28.089645] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.090301] Hardware name: linux,dummy-virt (DT)
[   28.091138] Call trace:
[   28.091648]  show_stack+0x20/0x38 (C)
[   28.092078]  dump_stack_lvl+0x8c/0xd0
[   28.092483]  print_report+0x118/0x5e0
[   28.092913]  kasan_report+0xc8/0x118
[   28.093720]  __asan_report_load4_noabort+0x20/0x30
[   28.094374]  kasan_atomics_helper+0x40a8/0x4858
[   28.094914]  kasan_atomics+0x198/0x2e8
[   28.095627]  kunit_try_run_case+0x14c/0x3d0
[   28.096298]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.097398]  kthread+0x24c/0x2d0
[   28.098019]  ret_from_fork+0x10/0x20
[   28.098767] 
[   28.099398] Allocated by task 254:
[   28.099943]  kasan_save_stack+0x3c/0x68
[   28.100583]  kasan_save_track+0x20/0x40
[   28.101314]  kasan_save_alloc_info+0x40/0x58
[   28.102022]  __kasan_kmalloc+0xd4/0xd8
[   28.102705]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.103592]  kasan_atomics+0xb8/0x2e8
[   28.104274]  kunit_try_run_case+0x14c/0x3d0
[   28.104932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.105766]  kthread+0x24c/0x2d0
[   28.106244]  ret_from_fork+0x10/0x20
[   28.106963] 
[   28.108389] The buggy address belongs to the object at fff00000c5d53180
[   28.108389]  which belongs to the cache kmalloc-64 of size 64
[   28.109833] The buggy address is located 0 bytes to the right of
[   28.109833]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   28.111428] 
[   28.111736] The buggy address belongs to the physical page:
[   28.112717] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   28.113596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.114394] page_type: f5(slab)
[   28.114918] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.116105] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.116968] page dumped because: kasan: bad access detected
[   28.117551] 
[   28.117921] Memory state around the buggy address:
[   28.118472]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.119609]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.120427] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.121246]                                      ^
[   28.121825]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.122612]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.123813] ==================================================================
---
[   29.179945] ==================================================================
[   29.180641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   29.181415] Read of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   29.182190] 
[   29.182576] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.183814] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.184229] Hardware name: linux,dummy-virt (DT)
[   29.184663] Call trace:
[   29.184987]  show_stack+0x20/0x38 (C)
[   29.185398]  dump_stack_lvl+0x8c/0xd0
[   29.185865]  print_report+0x118/0x5e0
[   29.187195]  kasan_report+0xc8/0x118
[   29.187798]  __asan_report_load4_noabort+0x20/0x30
[   29.188237]  kasan_atomics_helper+0x3dbc/0x4858
[   29.188701]  kasan_atomics+0x198/0x2e8
[   29.189137]  kunit_try_run_case+0x14c/0x3d0
[   29.189849]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.190525]  kthread+0x24c/0x2d0
[   29.191044]  ret_from_fork+0x10/0x20
[   29.191612] 
[   29.191947] Allocated by task 254:
[   29.192400]  kasan_save_stack+0x3c/0x68
[   29.193004]  kasan_save_track+0x20/0x40
[   29.193493]  kasan_save_alloc_info+0x40/0x58
[   29.194177]  __kasan_kmalloc+0xd4/0xd8
[   29.194712]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.195262]  kasan_atomics+0xb8/0x2e8
[   29.195833]  kunit_try_run_case+0x14c/0x3d0
[   29.196481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.197220]  kthread+0x24c/0x2d0
[   29.197695]  ret_from_fork+0x10/0x20
[   29.198300] 
[   29.198666] The buggy address belongs to the object at fff00000c5d53180
[   29.198666]  which belongs to the cache kmalloc-64 of size 64
[   29.199820] The buggy address is located 0 bytes to the right of
[   29.199820]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   29.201207] 
[   29.201553] The buggy address belongs to the physical page:
[   29.202602] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   29.203473] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.204276] page_type: f5(slab)
[   29.204713] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.205622] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.206490] page dumped because: kasan: bad access detected
[   29.207174] 
[   29.207482] Memory state around the buggy address:
[   29.208055]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.208849]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.209568] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.210418]                                      ^
[   29.211032]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.211791]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.212587] ==================================================================
---
[   30.409722] ==================================================================
[   30.410760] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   30.411763] Read of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   30.412641] 
[   30.413090] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.414125] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.414602] Hardware name: linux,dummy-virt (DT)
[   30.415168] Call trace:
[   30.415577]  show_stack+0x20/0x38 (C)
[   30.416229]  dump_stack_lvl+0x8c/0xd0
[   30.416738]  print_report+0x118/0x5e0
[   30.417442]  kasan_report+0xc8/0x118
[   30.418097]  __asan_report_load8_noabort+0x20/0x30
[   30.418958]  kasan_atomics_helper+0x3e10/0x4858
[   30.419643]  kasan_atomics+0x198/0x2e8
[   30.420204]  kunit_try_run_case+0x14c/0x3d0
[   30.420906]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.421540]  kthread+0x24c/0x2d0
[   30.422183]  ret_from_fork+0x10/0x20
[   30.422858] 
[   30.423218] Allocated by task 254:
[   30.423688]  kasan_save_stack+0x3c/0x68
[   30.424362]  kasan_save_track+0x20/0x40
[   30.424992]  kasan_save_alloc_info+0x40/0x58
[   30.425647]  __kasan_kmalloc+0xd4/0xd8
[   30.426229]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.426867]  kasan_atomics+0xb8/0x2e8
[   30.427425]  kunit_try_run_case+0x14c/0x3d0
[   30.427980]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.428723]  kthread+0x24c/0x2d0
[   30.429352]  ret_from_fork+0x10/0x20
[   30.429943] 
[   30.430288] The buggy address belongs to the object at fff00000c5d53180
[   30.430288]  which belongs to the cache kmalloc-64 of size 64
[   30.431637] The buggy address is located 0 bytes to the right of
[   30.431637]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   30.432992] 
[   30.433364] The buggy address belongs to the physical page:
[   30.434114] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   30.435027] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.435945] page_type: f5(slab)
[   30.436452] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.437387] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.438256] page dumped because: kasan: bad access detected
[   30.438981] 
[   30.439302] Memory state around the buggy address:
[   30.439933]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.440799]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.441661] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.442398]                                      ^
[   30.443020]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.443814]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.444607] ==================================================================
---
[   29.333593] ==================================================================
[   29.334205] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   29.334868] Read of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   29.336773] 
[   29.337110] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.338207] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.338819] Hardware name: linux,dummy-virt (DT)
[   29.339418] Call trace:
[   29.339886]  show_stack+0x20/0x38 (C)
[   29.340508]  dump_stack_lvl+0x8c/0xd0
[   29.341130]  print_report+0x118/0x5e0
[   29.341791]  kasan_report+0xc8/0x118
[   29.342394]  __asan_report_load4_noabort+0x20/0x30
[   29.343125]  kasan_atomics_helper+0x3dd8/0x4858
[   29.343825]  kasan_atomics+0x198/0x2e8
[   29.344434]  kunit_try_run_case+0x14c/0x3d0
[   29.345101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.345845]  kthread+0x24c/0x2d0
[   29.346363]  ret_from_fork+0x10/0x20
[   29.346974] 
[   29.347200] Allocated by task 254:
[   29.347822]  kasan_save_stack+0x3c/0x68
[   29.348407]  kasan_save_track+0x20/0x40
[   29.349052]  kasan_save_alloc_info+0x40/0x58
[   29.349715]  __kasan_kmalloc+0xd4/0xd8
[   29.350289]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.350931]  kasan_atomics+0xb8/0x2e8
[   29.351483]  kunit_try_run_case+0x14c/0x3d0
[   29.351915]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.352393]  kthread+0x24c/0x2d0
[   29.352776]  ret_from_fork+0x10/0x20
[   29.353207] 
[   29.353484] The buggy address belongs to the object at fff00000c5d53180
[   29.353484]  which belongs to the cache kmalloc-64 of size 64
[   29.355064] The buggy address is located 0 bytes to the right of
[   29.355064]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   29.356029] 
[   29.356284] The buggy address belongs to the physical page:
[   29.357390] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   29.358528] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.359326] page_type: f5(slab)
[   29.359686] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.360450] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.361205] page dumped because: kasan: bad access detected
[   29.361700] 
[   29.362044] Memory state around the buggy address:
[   29.363260]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.364075]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.364790] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.365362]                                      ^
[   29.365926]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.366826]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.367616] ==================================================================
---
[   28.293551] ==================================================================
[   28.294338] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   28.295586] Read of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   28.296643] 
[   28.298093] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   28.299180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.299816] Hardware name: linux,dummy-virt (DT)
[   28.300389] Call trace:
[   28.300769]  show_stack+0x20/0x38 (C)
[   28.301297]  dump_stack_lvl+0x8c/0xd0
[   28.302444]  print_report+0x118/0x5e0
[   28.302884]  kasan_report+0xc8/0x118
[   28.303654]  __asan_report_load4_noabort+0x20/0x30
[   28.304438]  kasan_atomics_helper+0x40fc/0x4858
[   28.305209]  kasan_atomics+0x198/0x2e8
[   28.305909]  kunit_try_run_case+0x14c/0x3d0
[   28.306622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.307629]  kthread+0x24c/0x2d0
[   28.308318]  ret_from_fork+0x10/0x20
[   28.309212] 
[   28.309658] Allocated by task 254:
[   28.310330]  kasan_save_stack+0x3c/0x68
[   28.310799]  kasan_save_track+0x20/0x40
[   28.311454]  kasan_save_alloc_info+0x40/0x58
[   28.312366]  __kasan_kmalloc+0xd4/0xd8
[   28.313007]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.313762]  kasan_atomics+0xb8/0x2e8
[   28.314429]  kunit_try_run_case+0x14c/0x3d0
[   28.316070]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.316421]  kthread+0x24c/0x2d0
[   28.316633]  ret_from_fork+0x10/0x20
[   28.317766] 
[   28.318230] The buggy address belongs to the object at fff00000c5d53180
[   28.318230]  which belongs to the cache kmalloc-64 of size 64
[   28.320046] The buggy address is located 0 bytes to the right of
[   28.320046]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   28.321335] 
[   28.321625] The buggy address belongs to the physical page:
[   28.322726] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   28.323985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.324928] page_type: f5(slab)
[   28.325573] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.326587] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.327871] page dumped because: kasan: bad access detected
[   28.328717] 
[   28.329204] Memory state around the buggy address:
[   28.329833]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.330867]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.331812] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.332967]                                      ^
[   28.333554]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.334610]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.336526] ==================================================================
---
[   30.330377] ==================================================================
[   30.332270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   30.333032] Read of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   30.334073] 
[   30.334709] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.335909] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.336478] Hardware name: linux,dummy-virt (DT)
[   30.337136] Call trace:
[   30.337678]  show_stack+0x20/0x38 (C)
[   30.338337]  dump_stack_lvl+0x8c/0xd0
[   30.339035]  print_report+0x118/0x5e0
[   30.339660]  kasan_report+0xc8/0x118
[   30.340296]  __asan_report_load8_noabort+0x20/0x30
[   30.341047]  kasan_atomics_helper+0x3df4/0x4858
[   30.341730]  kasan_atomics+0x198/0x2e8
[   30.342394]  kunit_try_run_case+0x14c/0x3d0
[   30.343093]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.343849]  kthread+0x24c/0x2d0
[   30.344461]  ret_from_fork+0x10/0x20
[   30.345094] 
[   30.345465] Allocated by task 254:
[   30.346094]  kasan_save_stack+0x3c/0x68
[   30.346785]  kasan_save_track+0x20/0x40
[   30.347420]  kasan_save_alloc_info+0x40/0x58
[   30.348132]  __kasan_kmalloc+0xd4/0xd8
[   30.348769]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.349315]  kasan_atomics+0xb8/0x2e8
[   30.349794]  kunit_try_run_case+0x14c/0x3d0
[   30.350302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.350976]  kthread+0x24c/0x2d0
[   30.351390]  ret_from_fork+0x10/0x20
[   30.352123] 
[   30.352468] The buggy address belongs to the object at fff00000c5d53180
[   30.352468]  which belongs to the cache kmalloc-64 of size 64
[   30.354041] The buggy address is located 0 bytes to the right of
[   30.354041]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   30.355547] 
[   30.356046] The buggy address belongs to the physical page:
[   30.356824] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   30.357830] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.358662] page_type: f5(slab)
[   30.359258] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.360196] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.361098] page dumped because: kasan: bad access detected
[   30.361821] 
[   30.362045] Memory state around the buggy address:
[   30.362859]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.363820]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.364760] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.365596]                                      ^
[   30.366256]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.367138]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.367978] ==================================================================
---
[   30.482315] ==================================================================
[   30.483093] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   30.483933] Read of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   30.484901] 
[   30.485306] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   30.486272] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.486884] Hardware name: linux,dummy-virt (DT)
[   30.487332] Call trace:
[   30.487801]  show_stack+0x20/0x38 (C)
[   30.488328]  dump_stack_lvl+0x8c/0xd0
[   30.489462]  print_report+0x118/0x5e0
[   30.489992]  kasan_report+0xc8/0x118
[   30.490594]  __asan_report_load8_noabort+0x20/0x30
[   30.491286]  kasan_atomics_helper+0x3e20/0x4858
[   30.491932]  kasan_atomics+0x198/0x2e8
[   30.492515]  kunit_try_run_case+0x14c/0x3d0
[   30.493152]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.493810]  kthread+0x24c/0x2d0
[   30.494418]  ret_from_fork+0x10/0x20
[   30.494993] 
[   30.495366] Allocated by task 254:
[   30.495913]  kasan_save_stack+0x3c/0x68
[   30.496560]  kasan_save_track+0x20/0x40
[   30.497220]  kasan_save_alloc_info+0x40/0x58
[   30.497852]  __kasan_kmalloc+0xd4/0xd8
[   30.498423]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.498997]  kasan_atomics+0xb8/0x2e8
[   30.499638]  kunit_try_run_case+0x14c/0x3d0
[   30.500219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.500962]  kthread+0x24c/0x2d0
[   30.501573]  ret_from_fork+0x10/0x20
[   30.502191] 
[   30.502514] The buggy address belongs to the object at fff00000c5d53180
[   30.502514]  which belongs to the cache kmalloc-64 of size 64
[   30.503906] The buggy address is located 0 bytes to the right of
[   30.503906]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   30.505261] 
[   30.505587] The buggy address belongs to the physical page:
[   30.506324] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   30.507176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.508012] page_type: f5(slab)
[   30.508545] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.509410] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.510277] page dumped because: kasan: bad access detected
[   30.511029] 
[   30.511390] Memory state around the buggy address:
[   30.512003]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.512891]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.513628] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.514513]                                      ^
[   30.515054]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.515993]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.516842] ==================================================================
---
[   29.403330] ==================================================================
[   29.404720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   29.405121] Read of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   29.405455] 
[   29.405605] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.407784] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.408692] Hardware name: linux,dummy-virt (DT)
[   29.409151] Call trace:
[   29.409341]  show_stack+0x20/0x38 (C)
[   29.409584]  dump_stack_lvl+0x8c/0xd0
[   29.409926]  print_report+0x118/0x5e0
[   29.410604]  kasan_report+0xc8/0x118
[   29.411627]  __asan_report_load4_noabort+0x20/0x30
[   29.412595]  kasan_atomics_helper+0x3e04/0x4858
[   29.413361]  kasan_atomics+0x198/0x2e8
[   29.413975]  kunit_try_run_case+0x14c/0x3d0
[   29.414502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.415238]  kthread+0x24c/0x2d0
[   29.415927]  ret_from_fork+0x10/0x20
[   29.416618] 
[   29.417040] Allocated by task 254:
[   29.417658]  kasan_save_stack+0x3c/0x68
[   29.418414]  kasan_save_track+0x20/0x40
[   29.419117]  kasan_save_alloc_info+0x40/0x58
[   29.419815]  __kasan_kmalloc+0xd4/0xd8
[   29.420434]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.421163]  kasan_atomics+0xb8/0x2e8
[   29.421772]  kunit_try_run_case+0x14c/0x3d0
[   29.422489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.423273]  kthread+0x24c/0x2d0
[   29.423868]  ret_from_fork+0x10/0x20
[   29.424510] 
[   29.424960] The buggy address belongs to the object at fff00000c5d53180
[   29.424960]  which belongs to the cache kmalloc-64 of size 64
[   29.426339] The buggy address is located 0 bytes to the right of
[   29.426339]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   29.427823] 
[   29.428285] The buggy address belongs to the physical page:
[   29.429092] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   29.430094] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.430958] page_type: f5(slab)
[   29.431517] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.432486] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.433431] page dumped because: kasan: bad access detected
[   29.434165] 
[   29.434614] Memory state around the buggy address:
[   29.435278]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.436008]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.436716] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.437501]                                      ^
[   29.438279]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.439192]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.440074] ==================================================================
---
[   29.479760] ==================================================================
[   29.480401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   29.481333] Read of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   29.482493] 
[   29.482925] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.484061] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.484672] Hardware name: linux,dummy-virt (DT)
[   29.485334] Call trace:
[   29.485775]  show_stack+0x20/0x38 (C)
[   29.486442]  dump_stack_lvl+0x8c/0xd0
[   29.487062]  print_report+0x118/0x5e0
[   29.487681]  kasan_report+0xc8/0x118
[   29.488334]  __asan_report_load8_noabort+0x20/0x30
[   29.489022]  kasan_atomics_helper+0x3f58/0x4858
[   29.489688]  kasan_atomics+0x198/0x2e8
[   29.490318]  kunit_try_run_case+0x14c/0x3d0
[   29.490993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.491720]  kthread+0x24c/0x2d0
[   29.492311]  ret_from_fork+0x10/0x20
[   29.492912] 
[   29.493237] Allocated by task 254:
[   29.493789]  kasan_save_stack+0x3c/0x68
[   29.494438]  kasan_save_track+0x20/0x40
[   29.495036]  kasan_save_alloc_info+0x40/0x58
[   29.495704]  __kasan_kmalloc+0xd4/0xd8
[   29.496306]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.496963]  kasan_atomics+0xb8/0x2e8
[   29.497486]  kunit_try_run_case+0x14c/0x3d0
[   29.498155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.498908]  kthread+0x24c/0x2d0
[   29.499420]  ret_from_fork+0x10/0x20
[   29.500011] 
[   29.500402] The buggy address belongs to the object at fff00000c5d53180
[   29.500402]  which belongs to the cache kmalloc-64 of size 64
[   29.501707] The buggy address is located 0 bytes to the right of
[   29.501707]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   29.503105] 
[   29.503481] The buggy address belongs to the physical page:
[   29.504192] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   29.504985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.505865] page_type: f5(slab)
[   29.506414] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.507378] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.508249] page dumped because: kasan: bad access detected
[   29.508934] 
[   29.509258] Memory state around the buggy address:
[   29.509897]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.510829]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.511683] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.512471]                                      ^
[   29.513151]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.514001]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.514816] ==================================================================

test log snippet boot parser 25

Home

[   29.557197] ==================================================================
[   29.557896] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   29.559080] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   29.559694] 
[   29.560047] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   29.560989] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.561550] Hardware name: linux,dummy-virt (DT)
[   29.562175] Call trace:
[   29.562672]  show_stack+0x20/0x38 (C)
[   29.563202]  dump_stack_lvl+0x8c/0xd0
[   29.563661]  print_report+0x118/0x5e0
[   29.564354]  kasan_report+0xc8/0x118
[   29.565020]  __asan_report_store8_noabort+0x20/0x30
[   29.565796]  kasan_atomics_helper+0x3e5c/0x4858
[   29.566409]  kasan_atomics+0x198/0x2e8
[   29.567101]  kunit_try_run_case+0x14c/0x3d0
[   29.567889]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.568599]  kthread+0x24c/0x2d0
[   29.569218]  ret_from_fork+0x10/0x20
[   29.569844] 
[   29.570179] Allocated by task 254:
[   29.570709]  kasan_save_stack+0x3c/0x68
[   29.571374]  kasan_save_track+0x20/0x40
[   29.572015]  kasan_save_alloc_info+0x40/0x58
[   29.572629]  __kasan_kmalloc+0xd4/0xd8
[   29.573204]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.573872]  kasan_atomics+0xb8/0x2e8
[   29.574408]  kunit_try_run_case+0x14c/0x3d0
[   29.575061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.575813]  kthread+0x24c/0x2d0
[   29.576324]  ret_from_fork+0x10/0x20
[   29.576962] 
[   29.577355] The buggy address belongs to the object at fff00000c5d53180
[   29.577355]  which belongs to the cache kmalloc-64 of size 64
[   29.578595] The buggy address is located 0 bytes to the right of
[   29.578595]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   29.580031] 
[   29.580403] The buggy address belongs to the physical page:
[   29.581059] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   29.582022] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.582869] page_type: f5(slab)
[   29.583408] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.584326] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.585176] page dumped because: kasan: bad access detected
[   29.585852] 
[   29.586195] Memory state around the buggy address:
[   29.586836]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.587644]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.588549] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.589363]                                      ^
[   29.589988]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.590853]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.591655] ==================================================================
---
[   28.126159] ==================================================================
[   28.126871] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   28.128593] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   28.129298] 
[   28.129613] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   28.131524] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.132009] Hardware name: linux,dummy-virt (DT)
[   28.132580] Call trace:
[   28.132951]  show_stack+0x20/0x38 (C)
[   28.133465]  dump_stack_lvl+0x8c/0xd0
[   28.134508]  print_report+0x118/0x5e0
[   28.135220]  kasan_report+0xc8/0x118
[   28.136135]  __asan_report_store4_noabort+0x20/0x30
[   28.136905]  kasan_atomics_helper+0x3f7c/0x4858
[   28.137826]  kasan_atomics+0x198/0x2e8
[   28.138497]  kunit_try_run_case+0x14c/0x3d0
[   28.139509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.140317]  kthread+0x24c/0x2d0
[   28.140974]  ret_from_fork+0x10/0x20
[   28.141659] 
[   28.142143] Allocated by task 254:
[   28.142775]  kasan_save_stack+0x3c/0x68
[   28.143478]  kasan_save_track+0x20/0x40
[   28.144416]  kasan_save_alloc_info+0x40/0x58
[   28.145152]  __kasan_kmalloc+0xd4/0xd8
[   28.145823]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.146393]  kasan_atomics+0xb8/0x2e8
[   28.146920]  kunit_try_run_case+0x14c/0x3d0
[   28.148519]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.149210]  kthread+0x24c/0x2d0
[   28.149698]  ret_from_fork+0x10/0x20
[   28.150269] 
[   28.150605] The buggy address belongs to the object at fff00000c5d53180
[   28.150605]  which belongs to the cache kmalloc-64 of size 64
[   28.152227] The buggy address is located 0 bytes to the right of
[   28.152227]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   28.153504] 
[   28.153890] The buggy address belongs to the physical page:
[   28.154540] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   28.155848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.156621] page_type: f5(slab)
[   28.157113] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.157998] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.158820] page dumped because: kasan: bad access detected
[   28.159713] 
[   28.160025] Memory state around the buggy address:
[   28.160554]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.161398]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.162262] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.163113]                                      ^
[   28.164016]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.164820]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.165574] ==================================================================
---
[   28.378410] ==================================================================
[   28.379143] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   28.379880] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[   28.380673] 
[   28.381472] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   28.382559] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.383760] Hardware name: linux,dummy-virt (DT)
[   28.384757] Call trace:
[   28.385221]  show_stack+0x20/0x38 (C)
[   28.385528]  dump_stack_lvl+0x8c/0xd0
[   28.385821]  print_report+0x118/0x5e0
[   28.386424]  kasan_report+0xc8/0x118
[   28.387489]  __asan_report_store4_noabort+0x20/0x30
[   28.388770]  kasan_atomics_helper+0x3f94/0x4858
[   28.389292]  kasan_atomics+0x198/0x2e8
[   28.389704]  kunit_try_run_case+0x14c/0x3d0
[   28.390604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.391924]  kthread+0x24c/0x2d0
[   28.392652]  ret_from_fork+0x10/0x20
[   28.393180] 
[   28.393489] Allocated by task 254:
[   28.393990]  kasan_save_stack+0x3c/0x68
[   28.394481]  kasan_save_track+0x20/0x40
[   28.396904]  kasan_save_alloc_info+0x40/0x58
[   28.397679]  __kasan_kmalloc+0xd4/0xd8
[   28.398350]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.398975]  kasan_atomics+0xb8/0x2e8
[   28.399440]  kunit_try_run_case+0x14c/0x3d0
[   28.400055]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.400793]  kthread+0x24c/0x2d0
[   28.401350]  ret_from_fork+0x10/0x20
[   28.401987] 
[   28.402392] The buggy address belongs to the object at fff00000c5d53180
[   28.402392]  which belongs to the cache kmalloc-64 of size 64
[   28.404163] The buggy address is located 0 bytes to the right of
[   28.404163]  allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[   28.405808] 
[   28.406187] The buggy address belongs to the physical page:
[   28.406928] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[   28.408120] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.409133] page_type: f5(slab)
[   28.409676] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.410597] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.411857] page dumped because: kasan: bad access detected
[   28.412664] 
[   28.413028] Memory state around the buggy address:
[   28.413554]  fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.414449]  fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.415788] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.416466]                                      ^
[   28.417156]  fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.417696]  fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.419124] ==================================================================

test log snippet boot parser 26

Home

[   27.398146] ==================================================================
[   27.398780] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   27.400533] Write of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[   27.401461] 
[   27.401813] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.402934] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.404358] Hardware name: linux,dummy-virt (DT)
[   27.404919] Call trace:
[   27.405359]  show_stack+0x20/0x38 (C)
[   27.405931]  dump_stack_lvl+0x8c/0xd0
[   27.406576]  print_report+0x118/0x5e0
[   27.407299]  kasan_report+0xc8/0x118
[   27.407935]  kasan_check_range+0x100/0x1a8
[   27.408475]  __kasan_check_write+0x20/0x30
[   27.409011]  kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   27.409618]  kasan_bitops_generic+0x110/0x1c8
[   27.411856]  kunit_try_run_case+0x14c/0x3d0
[   27.412323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.413283]  kthread+0x24c/0x2d0
[   27.413929]  ret_from_fork+0x10/0x20
[   27.414635] 
[   27.415574] Allocated by task 250:
[   27.415982]  kasan_save_stack+0x3c/0x68
[   27.416505]  kasan_save_track+0x20/0x40
[   27.417047]  kasan_save_alloc_info+0x40/0x58
[   27.417577]  __kasan_kmalloc+0xd4/0xd8
[   27.418204]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.418704]  kasan_bitops_generic+0xa0/0x1c8
[   27.419476]  kunit_try_run_case+0x14c/0x3d0
[   27.420308]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.420781]  kthread+0x24c/0x2d0
[   27.422028]  ret_from_fork+0x10/0x20
[   27.422426] 
[   27.422649] The buggy address belongs to the object at fff00000c5b73360
[   27.422649]  which belongs to the cache kmalloc-16 of size 16
[   27.424523] The buggy address is located 8 bytes inside of
[   27.424523]  allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[   27.425920] 
[   27.426218] The buggy address belongs to the physical page:
[   27.426861] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[   27.428267] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.428599] page_type: f5(slab)
[   27.428838] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.429186] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   27.429513] page dumped because: kasan: bad access detected
[   27.429837] 
[   27.430209] Memory state around the buggy address:
[   27.432078]  fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.432985]  fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.434005] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.434970]                                                           ^
[   27.435662]  fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.437260]  fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.438164] ==================================================================
---
[   27.481475] ==================================================================
[   27.482203] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   27.483163] Write of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[   27.485168] 
[   27.485509] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.486669] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.487632] Hardware name: linux,dummy-virt (DT)
[   27.488174] Call trace:
[   27.488642]  show_stack+0x20/0x38 (C)
[   27.489290]  dump_stack_lvl+0x8c/0xd0
[   27.490001]  print_report+0x118/0x5e0
[   27.490525]  kasan_report+0xc8/0x118
[   27.491215]  kasan_check_range+0x100/0x1a8
[   27.492045]  __kasan_check_write+0x20/0x30
[   27.493050]  kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   27.494138]  kasan_bitops_generic+0x110/0x1c8
[   27.495043]  kunit_try_run_case+0x14c/0x3d0
[   27.495726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.496404]  kthread+0x24c/0x2d0
[   27.496870]  ret_from_fork+0x10/0x20
[   27.497364] 
[   27.497642] Allocated by task 250:
[   27.498636]  kasan_save_stack+0x3c/0x68
[   27.499458]  kasan_save_track+0x20/0x40
[   27.500219]  kasan_save_alloc_info+0x40/0x58
[   27.501319]  __kasan_kmalloc+0xd4/0xd8
[   27.501859]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.502619]  kasan_bitops_generic+0xa0/0x1c8
[   27.503368]  kunit_try_run_case+0x14c/0x3d0
[   27.503954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.505466]  kthread+0x24c/0x2d0
[   27.505852]  ret_from_fork+0x10/0x20
[   27.506236] 
[   27.506459] The buggy address belongs to the object at fff00000c5b73360
[   27.506459]  which belongs to the cache kmalloc-16 of size 16
[   27.507553] The buggy address is located 8 bytes inside of
[   27.507553]  allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[   27.509334] 
[   27.509703] The buggy address belongs to the physical page:
[   27.510238] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[   27.512396] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.513986] page_type: f5(slab)
[   27.514918] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.516148] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   27.516673] page dumped because: kasan: bad access detected
[   27.517186] 
[   27.517597] Memory state around the buggy address:
[   27.518529]  fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.519577]  fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.520421] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.521726]                                                           ^
[   27.522606]  fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.523541]  fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.524349] ==================================================================
---
[   27.658141] ==================================================================
[   27.658880] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   27.659945] Write of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[   27.661046] 
[   27.661397] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.662404] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.663161] Hardware name: linux,dummy-virt (DT)
[   27.663622] Call trace:
[   27.664255]  show_stack+0x20/0x38 (C)
[   27.664950]  dump_stack_lvl+0x8c/0xd0
[   27.665635]  print_report+0x118/0x5e0
[   27.666334]  kasan_report+0xc8/0x118
[   27.667015]  kasan_check_range+0x100/0x1a8
[   27.667717]  __kasan_check_write+0x20/0x30
[   27.668426]  kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   27.669231]  kasan_bitops_generic+0x110/0x1c8
[   27.669953]  kunit_try_run_case+0x14c/0x3d0
[   27.670528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.671247]  kthread+0x24c/0x2d0
[   27.672228]  ret_from_fork+0x10/0x20
[   27.672665] 
[   27.673144] Allocated by task 250:
[   27.673773]  kasan_save_stack+0x3c/0x68
[   27.674431]  kasan_save_track+0x20/0x40
[   27.675136]  kasan_save_alloc_info+0x40/0x58
[   27.675848]  __kasan_kmalloc+0xd4/0xd8
[   27.676491]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.677224]  kasan_bitops_generic+0xa0/0x1c8
[   27.677944]  kunit_try_run_case+0x14c/0x3d0
[   27.678680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.679347]  kthread+0x24c/0x2d0
[   27.679822]  ret_from_fork+0x10/0x20
[   27.680327] 
[   27.680630] The buggy address belongs to the object at fff00000c5b73360
[   27.680630]  which belongs to the cache kmalloc-16 of size 16
[   27.682478] The buggy address is located 8 bytes inside of
[   27.682478]  allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[   27.683829] 
[   27.684312] The buggy address belongs to the physical page:
[   27.685060] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[   27.686025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.686912] page_type: f5(slab)
[   27.687545] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.688500] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   27.689445] page dumped because: kasan: bad access detected
[   27.690072] 
[   27.690377] Memory state around the buggy address:
[   27.691003]  fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.692272]  fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.692996] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.693902]                                                           ^
[   27.694786]  fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.695729]  fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.696639] ==================================================================
---
[   27.616110] ==================================================================
[   27.617282] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8
[   27.618299] Write of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[   27.618941] 
[   27.620268] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.621419] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.622068] Hardware name: linux,dummy-virt (DT)
[   27.622827] Call trace:
[   27.623377]  show_stack+0x20/0x38 (C)
[   27.624072]  dump_stack_lvl+0x8c/0xd0
[   27.624710]  print_report+0x118/0x5e0
[   27.625366]  kasan_report+0xc8/0x118
[   27.625944]  kasan_check_range+0x100/0x1a8
[   27.626769]  __kasan_check_write+0x20/0x30
[   27.627472]  kasan_bitops_modify.constprop.0+0x344/0xbc8
[   27.628371]  kasan_bitops_generic+0x110/0x1c8
[   27.629014]  kunit_try_run_case+0x14c/0x3d0
[   27.629539]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.630521]  kthread+0x24c/0x2d0
[   27.631158]  ret_from_fork+0x10/0x20
[   27.631848] 
[   27.632312] Allocated by task 250:
[   27.632920]  kasan_save_stack+0x3c/0x68
[   27.633577]  kasan_save_track+0x20/0x40
[   27.634236]  kasan_save_alloc_info+0x40/0x58
[   27.634965]  __kasan_kmalloc+0xd4/0xd8
[   27.635475]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.636068]  kasan_bitops_generic+0xa0/0x1c8
[   27.636621]  kunit_try_run_case+0x14c/0x3d0
[   27.637517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.638353]  kthread+0x24c/0x2d0
[   27.639019]  ret_from_fork+0x10/0x20
[   27.639686] 
[   27.640157] The buggy address belongs to the object at fff00000c5b73360
[   27.640157]  which belongs to the cache kmalloc-16 of size 16
[   27.641468] The buggy address is located 8 bytes inside of
[   27.641468]  allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[   27.643094] 
[   27.643482] The buggy address belongs to the physical page:
[   27.644266] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[   27.645119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.646128] page_type: f5(slab)
[   27.646843] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.647820] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   27.648779] page dumped because: kasan: bad access detected
[   27.649554] 
[   27.649995] Memory state around the buggy address:
[   27.650772]  fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.651632]  fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.652529] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.653283]                                                           ^
[   27.654000]  fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.655217]  fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.655928] ==================================================================
---
[   27.527724] ==================================================================
[   27.528434] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8
[   27.529419] Write of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[   27.530294] 
[   27.530663] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.531759] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.532497] Hardware name: linux,dummy-virt (DT)
[   27.534039] Call trace:
[   27.534826]  show_stack+0x20/0x38 (C)
[   27.536413]  dump_stack_lvl+0x8c/0xd0
[   27.537613]  print_report+0x118/0x5e0
[   27.538423]  kasan_report+0xc8/0x118
[   27.539204]  kasan_check_range+0x100/0x1a8
[   27.539786]  __kasan_check_write+0x20/0x30
[   27.540625]  kasan_bitops_modify.constprop.0+0x320/0xbc8
[   27.541334]  kasan_bitops_generic+0x110/0x1c8
[   27.542160]  kunit_try_run_case+0x14c/0x3d0
[   27.542902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.543803]  kthread+0x24c/0x2d0
[   27.544483]  ret_from_fork+0x10/0x20
[   27.545097] 
[   27.545736] Allocated by task 250:
[   27.546206]  kasan_save_stack+0x3c/0x68
[   27.546779]  kasan_save_track+0x20/0x40
[   27.547932]  kasan_save_alloc_info+0x40/0x58
[   27.548580]  __kasan_kmalloc+0xd4/0xd8
[   27.549203]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.549956]  kasan_bitops_generic+0xa0/0x1c8
[   27.550484]  kunit_try_run_case+0x14c/0x3d0
[   27.551385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.552669]  kthread+0x24c/0x2d0
[   27.553278]  ret_from_fork+0x10/0x20
[   27.553907] 
[   27.554322] The buggy address belongs to the object at fff00000c5b73360
[   27.554322]  which belongs to the cache kmalloc-16 of size 16
[   27.556090] The buggy address is located 8 bytes inside of
[   27.556090]  allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[   27.557518] 
[   27.558012] The buggy address belongs to the physical page:
[   27.558646] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[   27.559614] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.561237] page_type: f5(slab)
[   27.561898] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.562890] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   27.563885] page dumped because: kasan: bad access detected
[   27.564507] 
[   27.565370] Memory state around the buggy address:
[   27.566177]  fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.567098]  fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.568419] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.569443]                                                           ^
[   27.570310]  fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.571715]  fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.572687] ==================================================================
---
[   27.317309] ==================================================================
[   27.318162] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8
[   27.319067] Write of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[   27.320996] 
[   27.321454] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.322441] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.322996] Hardware name: linux,dummy-virt (DT)
[   27.323827] Call trace:
[   27.324166]  show_stack+0x20/0x38 (C)
[   27.324840]  dump_stack_lvl+0x8c/0xd0
[   27.325569]  print_report+0x118/0x5e0
[   27.326250]  kasan_report+0xc8/0x118
[   27.326805]  kasan_check_range+0x100/0x1a8
[   27.327724]  __kasan_check_write+0x20/0x30
[   27.328361]  kasan_bitops_modify.constprop.0+0x100/0xbc8
[   27.329156]  kasan_bitops_generic+0x110/0x1c8
[   27.329811]  kunit_try_run_case+0x14c/0x3d0
[   27.330536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.331562]  kthread+0x24c/0x2d0
[   27.332102]  ret_from_fork+0x10/0x20
[   27.332516] 
[   27.332734] Allocated by task 250:
[   27.333211]  kasan_save_stack+0x3c/0x68
[   27.334162]  kasan_save_track+0x20/0x40
[   27.334724]  kasan_save_alloc_info+0x40/0x58
[   27.335676]  __kasan_kmalloc+0xd4/0xd8
[   27.336159]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.336756]  kasan_bitops_generic+0xa0/0x1c8
[   27.337361]  kunit_try_run_case+0x14c/0x3d0
[   27.337967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.338634]  kthread+0x24c/0x2d0
[   27.339380]  ret_from_fork+0x10/0x20
[   27.339863] 
[   27.340199] The buggy address belongs to the object at fff00000c5b73360
[   27.340199]  which belongs to the cache kmalloc-16 of size 16
[   27.341485] The buggy address is located 8 bytes inside of
[   27.341485]  allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[   27.342912] 
[   27.343603] The buggy address belongs to the physical page:
[   27.344191] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[   27.345194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.345978] page_type: f5(slab)
[   27.346443] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.347601] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   27.348443] page dumped because: kasan: bad access detected
[   27.349043] 
[   27.349372] Memory state around the buggy address:
[   27.350312]  fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.351064]  fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.352188] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.352902]                                                           ^
[   27.353573]  fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.354246]  fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.355213] ==================================================================

test log snippet boot parser 27

Home

[   27.358213] ==================================================================
[   27.359471] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   27.360092] Read of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[   27.360437] 
[   27.360589] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.361380] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.362084] Hardware name: linux,dummy-virt (DT)
[   27.362858] Call trace:
[   27.363275]  show_stack+0x20/0x38 (C)
[   27.364546]  dump_stack_lvl+0x8c/0xd0
[   27.365817]  print_report+0x118/0x5e0
[   27.366409]  kasan_report+0xc8/0x118
[   27.367188]  __asan_report_load8_noabort+0x20/0x30
[   27.367962]  kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   27.368591]  kasan_bitops_generic+0x110/0x1c8
[   27.369256]  kunit_try_run_case+0x14c/0x3d0
[   27.369814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.370471]  kthread+0x24c/0x2d0
[   27.371837]  ret_from_fork+0x10/0x20
[   27.372404] 
[   27.372704] Allocated by task 250:
[   27.373197]  kasan_save_stack+0x3c/0x68
[   27.373734]  kasan_save_track+0x20/0x40
[   27.374303]  kasan_save_alloc_info+0x40/0x58
[   27.374902]  __kasan_kmalloc+0xd4/0xd8
[   27.375403]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.376347]  kasan_bitops_generic+0xa0/0x1c8
[   27.376949]  kunit_try_run_case+0x14c/0x3d0
[   27.377535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.378421]  kthread+0x24c/0x2d0
[   27.379764]  ret_from_fork+0x10/0x20
[   27.380369] 
[   27.380679] The buggy address belongs to the object at fff00000c5b73360
[   27.380679]  which belongs to the cache kmalloc-16 of size 16
[   27.381885] The buggy address is located 8 bytes inside of
[   27.381885]  allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[   27.383197] 
[   27.383979] The buggy address belongs to the physical page:
[   27.384568] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[   27.385515] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.386302] page_type: f5(slab)
[   27.386804] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.388420] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   27.389320] page dumped because: kasan: bad access detected
[   27.389916] 
[   27.390249] Memory state around the buggy address:
[   27.390845]  fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.391601]  fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.392858] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.393621]                                                           ^
[   27.394423]  fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.395898]  fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.396587] ==================================================================
---
[   27.574496] ==================================================================
[   27.575943] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   27.577233] Read of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[   27.577991] 
[   27.578153] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.578586] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.578921] Hardware name: linux,dummy-virt (DT)
[   27.580134] Call trace:
[   27.580722]  show_stack+0x20/0x38 (C)
[   27.581519]  dump_stack_lvl+0x8c/0xd0
[   27.582308]  print_report+0x118/0x5e0
[   27.582889]  kasan_report+0xc8/0x118
[   27.583763]  __asan_report_load8_noabort+0x20/0x30
[   27.584409]  kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   27.585081]  kasan_bitops_generic+0x110/0x1c8
[   27.585665]  kunit_try_run_case+0x14c/0x3d0
[   27.586322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.587113]  kthread+0x24c/0x2d0
[   27.587761]  ret_from_fork+0x10/0x20
[   27.588305] 
[   27.588601] Allocated by task 250:
[   27.589098]  kasan_save_stack+0x3c/0x68
[   27.590058]  kasan_save_track+0x20/0x40
[   27.590731]  kasan_save_alloc_info+0x40/0x58
[   27.591849]  __kasan_kmalloc+0xd4/0xd8
[   27.592695]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.593767]  kasan_bitops_generic+0xa0/0x1c8
[   27.594464]  kunit_try_run_case+0x14c/0x3d0
[   27.595471]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.596276]  kthread+0x24c/0x2d0
[   27.596905]  ret_from_fork+0x10/0x20
[   27.597300] 
[   27.597522] The buggy address belongs to the object at fff00000c5b73360
[   27.597522]  which belongs to the cache kmalloc-16 of size 16
[   27.598580] The buggy address is located 8 bytes inside of
[   27.598580]  allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[   27.600716] 
[   27.601057] The buggy address belongs to the physical page:
[   27.601660] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[   27.603843] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.604662] page_type: f5(slab)
[   27.605111] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.606152] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   27.607113] page dumped because: kasan: bad access detected
[   27.608418] 
[   27.608646] Memory state around the buggy address:
[   27.609059]  fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.609847]  fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.610721] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.611686]                                                           ^
[   27.612524]  fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.613411]  fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.614280] ==================================================================
---
[   27.439872] ==================================================================
[   27.440620] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   27.442126] Read of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[   27.444506] 
[   27.445046] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.446237] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.446467] Hardware name: linux,dummy-virt (DT)
[   27.446725] Call trace:
[   27.447243]  show_stack+0x20/0x38 (C)
[   27.448495]  dump_stack_lvl+0x8c/0xd0
[   27.449274]  print_report+0x118/0x5e0
[   27.449835]  kasan_report+0xc8/0x118
[   27.450482]  __asan_report_load8_noabort+0x20/0x30
[   27.451181]  kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   27.451973]  kasan_bitops_generic+0x110/0x1c8
[   27.452590]  kunit_try_run_case+0x14c/0x3d0
[   27.453368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.454145]  kthread+0x24c/0x2d0
[   27.454768]  ret_from_fork+0x10/0x20
[   27.455428] 
[   27.456238] Allocated by task 250:
[   27.456813]  kasan_save_stack+0x3c/0x68
[   27.457468]  kasan_save_track+0x20/0x40
[   27.458154]  kasan_save_alloc_info+0x40/0x58
[   27.458793]  __kasan_kmalloc+0xd4/0xd8
[   27.459872]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.460438]  kasan_bitops_generic+0xa0/0x1c8
[   27.461054]  kunit_try_run_case+0x14c/0x3d0
[   27.461629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.462521]  kthread+0x24c/0x2d0
[   27.463017]  ret_from_fork+0x10/0x20
[   27.463518] 
[   27.463878] The buggy address belongs to the object at fff00000c5b73360
[   27.463878]  which belongs to the cache kmalloc-16 of size 16
[   27.465098] The buggy address is located 8 bytes inside of
[   27.465098]  allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[   27.466262] 
[   27.466619] The buggy address belongs to the physical page:
[   27.468169] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[   27.469085] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.469886] page_type: f5(slab)
[   27.470501] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.471496] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   27.472645] page dumped because: kasan: bad access detected
[   27.473468] 
[   27.473803] Memory state around the buggy address:
[   27.474475]  fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.475430]  fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.476513] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.477416]                                                           ^
[   27.478132]  fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.478936]  fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.480067] ==================================================================
---
[   27.699017] ==================================================================
[   27.699730] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   27.700606] Read of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[   27.701713] 
[   27.702175] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.703395] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.703984] Hardware name: linux,dummy-virt (DT)
[   27.704514] Call trace:
[   27.704925]  show_stack+0x20/0x38 (C)
[   27.705486]  dump_stack_lvl+0x8c/0xd0
[   27.706151]  print_report+0x118/0x5e0
[   27.706814]  kasan_report+0xc8/0x118
[   27.707352]  __asan_report_load8_noabort+0x20/0x30
[   27.708099]  kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   27.708785]  kasan_bitops_generic+0x110/0x1c8
[   27.709425]  kunit_try_run_case+0x14c/0x3d0
[   27.710108]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.710842]  kthread+0x24c/0x2d0
[   27.711363]  ret_from_fork+0x10/0x20
[   27.711900] 
[   27.712184] Allocated by task 250:
[   27.712646]  kasan_save_stack+0x3c/0x68
[   27.713553]  kasan_save_track+0x20/0x40
[   27.714166]  kasan_save_alloc_info+0x40/0x58
[   27.714720]  __kasan_kmalloc+0xd4/0xd8
[   27.715591]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.716345]  kasan_bitops_generic+0xa0/0x1c8
[   27.717078]  kunit_try_run_case+0x14c/0x3d0
[   27.717796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.718622]  kthread+0x24c/0x2d0
[   27.719118]  ret_from_fork+0x10/0x20
[   27.719617] 
[   27.720199] The buggy address belongs to the object at fff00000c5b73360
[   27.720199]  which belongs to the cache kmalloc-16 of size 16
[   27.721803] The buggy address is located 8 bytes inside of
[   27.721803]  allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[   27.723055] 
[   27.723486] The buggy address belongs to the physical page:
[   27.724017] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[   27.725143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.726034] page_type: f5(slab)
[   27.726679] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.727649] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   27.728440] page dumped because: kasan: bad access detected
[   27.729263] 
[   27.729705] Memory state around the buggy address:
[   27.730418]  fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.731427]  fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.732343] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.733234]                                                           ^
[   27.734119]  fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.734883]  fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.735625] ==================================================================

test log snippet boot parser 28

Home

[   27.815848] ==================================================================
[   27.816542] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   27.817969] Write of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[   27.818608] 
[   27.819027] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.819905] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.820408] Hardware name: linux,dummy-virt (DT)
[   27.820983] Call trace:
[   27.821423]  show_stack+0x20/0x38 (C)
[   27.822007]  dump_stack_lvl+0x8c/0xd0
[   27.822592]  print_report+0x118/0x5e0
[   27.823118]  kasan_report+0xc8/0x118
[   27.823697]  kasan_check_range+0x100/0x1a8
[   27.824317]  __kasan_check_write+0x20/0x30
[   27.824908]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   27.825641]  kasan_bitops_generic+0x11c/0x1c8
[   27.826301]  kunit_try_run_case+0x14c/0x3d0
[   27.826959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.827672]  kthread+0x24c/0x2d0
[   27.828223]  ret_from_fork+0x10/0x20
[   27.828788] 
[   27.829116] Allocated by task 250:
[   27.829638]  kasan_save_stack+0x3c/0x68
[   27.830123]  kasan_save_track+0x20/0x40
[   27.830783]  kasan_save_alloc_info+0x40/0x58
[   27.831360]  __kasan_kmalloc+0xd4/0xd8
[   27.831852]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.832451]  kasan_bitops_generic+0xa0/0x1c8
[   27.832992]  kunit_try_run_case+0x14c/0x3d0
[   27.833640]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.834329]  kthread+0x24c/0x2d0
[   27.834811]  ret_from_fork+0x10/0x20
[   27.835308] 
[   27.835588] The buggy address belongs to the object at fff00000c5b73360
[   27.835588]  which belongs to the cache kmalloc-16 of size 16
[   27.836853] The buggy address is located 8 bytes inside of
[   27.836853]  allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[   27.838036] 
[   27.838392] The buggy address belongs to the physical page:
[   27.838976] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[   27.839957] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.840677] page_type: f5(slab)
[   27.841188] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.842022] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   27.842819] page dumped because: kasan: bad access detected
[   27.843403] 
[   27.843761] Memory state around the buggy address:
[   27.844350]  fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.845207]  fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.846033] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.846844]                                                           ^
[   27.847612]  fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.848430]  fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.849280] ==================================================================
---
[   27.885664] ==================================================================
[   27.886601] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   27.887928] Write of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[   27.888684] 
[   27.889134] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.890155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.890842] Hardware name: linux,dummy-virt (DT)
[   27.891414] Call trace:
[   27.891824]  show_stack+0x20/0x38 (C)
[   27.892382]  dump_stack_lvl+0x8c/0xd0
[   27.892931]  print_report+0x118/0x5e0
[   27.893562]  kasan_report+0xc8/0x118
[   27.894117]  kasan_check_range+0x100/0x1a8
[   27.894773]  __kasan_check_write+0x20/0x30
[   27.895376]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   27.896080]  kasan_bitops_generic+0x11c/0x1c8
[   27.896737]  kunit_try_run_case+0x14c/0x3d0
[   27.897347]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.898067]  kthread+0x24c/0x2d0
[   27.898587]  ret_from_fork+0x10/0x20
[   27.899196] 
[   27.899529] Allocated by task 250:
[   27.900022]  kasan_save_stack+0x3c/0x68
[   27.900525]  kasan_save_track+0x20/0x40
[   27.901130]  kasan_save_alloc_info+0x40/0x58
[   27.901651]  __kasan_kmalloc+0xd4/0xd8
[   27.902229]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.902780]  kasan_bitops_generic+0xa0/0x1c8
[   27.903432]  kunit_try_run_case+0x14c/0x3d0
[   27.904007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.904702]  kthread+0x24c/0x2d0
[   27.905248]  ret_from_fork+0x10/0x20
[   27.905735] 
[   27.906097] The buggy address belongs to the object at fff00000c5b73360
[   27.906097]  which belongs to the cache kmalloc-16 of size 16
[   27.907379] The buggy address is located 8 bytes inside of
[   27.907379]  allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[   27.908580] 
[   27.908954] The buggy address belongs to the physical page:
[   27.909603] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[   27.910504] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.911314] page_type: f5(slab)
[   27.911883] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.912693] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   27.913489] page dumped because: kasan: bad access detected
[   27.914185] 
[   27.914567] Memory state around the buggy address:
[   27.915192]  fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.916006]  fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.916759] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.917557]                                                           ^
[   27.918369]  fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.919181]  fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.919981] ==================================================================
---
[   27.738593] ==================================================================
[   27.739374] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   27.740551] Write of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[   27.741502] 
[   27.742146] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.743264] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.743955] Hardware name: linux,dummy-virt (DT)
[   27.744640] Call trace:
[   27.745033]  show_stack+0x20/0x38 (C)
[   27.745568]  dump_stack_lvl+0x8c/0xd0
[   27.746329]  print_report+0x118/0x5e0
[   27.746999]  kasan_report+0xc8/0x118
[   27.747649]  kasan_check_range+0x100/0x1a8
[   27.748338]  __kasan_check_write+0x20/0x30
[   27.749049]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   27.749909]  kasan_bitops_generic+0x11c/0x1c8
[   27.750480]  kunit_try_run_case+0x14c/0x3d0
[   27.751078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.751728]  kthread+0x24c/0x2d0
[   27.752589]  ret_from_fork+0x10/0x20
[   27.753254] 
[   27.753780] Allocated by task 250:
[   27.754390]  kasan_save_stack+0x3c/0x68
[   27.755033]  kasan_save_track+0x20/0x40
[   27.755671]  kasan_save_alloc_info+0x40/0x58
[   27.756399]  __kasan_kmalloc+0xd4/0xd8
[   27.757080]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.757784]  kasan_bitops_generic+0xa0/0x1c8
[   27.758503]  kunit_try_run_case+0x14c/0x3d0
[   27.759083]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.759724]  kthread+0x24c/0x2d0
[   27.760214]  ret_from_fork+0x10/0x20
[   27.760713] 
[   27.761473] The buggy address belongs to the object at fff00000c5b73360
[   27.761473]  which belongs to the cache kmalloc-16 of size 16
[   27.762772] The buggy address is located 8 bytes inside of
[   27.762772]  allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[   27.764458] 
[   27.764690] The buggy address belongs to the physical page:
[   27.765395] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[   27.766468] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.767327] page_type: f5(slab)
[   27.767970] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.768948] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   27.769893] page dumped because: kasan: bad access detected
[   27.770667] 
[   27.770986] Memory state around the buggy address:
[   27.771558]  fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.772311]  fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.773428] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.774388]                                                           ^
[   27.775301]  fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.776212]  fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.777094] ==================================================================
---
[   27.957579] ==================================================================
[   27.958249] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   27.959385] Write of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[   27.960217] 
[   27.960622] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.961596] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.962171] Hardware name: linux,dummy-virt (DT)
[   27.962888] Call trace:
[   27.963333]  show_stack+0x20/0x38 (C)
[   27.963970]  dump_stack_lvl+0x8c/0xd0
[   27.964578]  print_report+0x118/0x5e0
[   27.965112]  kasan_report+0xc8/0x118
[   27.965757]  kasan_check_range+0x100/0x1a8
[   27.966321]  __kasan_check_write+0x20/0x30
[   27.966909]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   27.967722]  kasan_bitops_generic+0x11c/0x1c8
[   27.968355]  kunit_try_run_case+0x14c/0x3d0
[   27.969004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.969680]  kthread+0x24c/0x2d0
[   27.970201]  ret_from_fork+0x10/0x20
[   27.970765] 
[   27.971080] Allocated by task 250:
[   27.971573]  kasan_save_stack+0x3c/0x68
[   27.972190]  kasan_save_track+0x20/0x40
[   27.972710]  kasan_save_alloc_info+0x40/0x58
[   27.973301]  __kasan_kmalloc+0xd4/0xd8
[   27.973930]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.974511]  kasan_bitops_generic+0xa0/0x1c8
[   27.975184]  kunit_try_run_case+0x14c/0x3d0
[   27.975713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.976361]  kthread+0x24c/0x2d0
[   27.976841]  ret_from_fork+0x10/0x20
[   27.977475] 
[   27.977860] The buggy address belongs to the object at fff00000c5b73360
[   27.977860]  which belongs to the cache kmalloc-16 of size 16
[   27.979110] The buggy address is located 8 bytes inside of
[   27.979110]  allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[   27.980298] 
[   27.980655] The buggy address belongs to the physical page:
[   27.981302] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[   27.982198] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.982981] page_type: f5(slab)
[   27.983545] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.984347] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   27.985259] page dumped because: kasan: bad access detected
[   27.985874] 
[   27.986195] Memory state around the buggy address:
[   27.986762]  fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.987553]  fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.988395] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.989158]                                                           ^
[   27.989904]  fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.990729]  fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.991547] ==================================================================

test log snippet boot parser 29

Home

[   27.993686] ==================================================================
[   27.994363] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   27.995284] Read of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[   27.996023] 
[   27.996405] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.997420] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.998038] Hardware name: linux,dummy-virt (DT)
[   27.998589] Call trace:
[   27.999094]  show_stack+0x20/0x38 (C)
[   27.999689]  dump_stack_lvl+0x8c/0xd0
[   28.000244]  print_report+0x118/0x5e0
[   28.000766]  kasan_report+0xc8/0x118
[   28.001339]  __asan_report_load8_noabort+0x20/0x30
[   28.002088]  kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   28.002863]  kasan_bitops_generic+0x11c/0x1c8
[   28.003490]  kunit_try_run_case+0x14c/0x3d0
[   28.004040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.004957]  kthread+0x24c/0x2d0
[   28.005969]  ret_from_fork+0x10/0x20
[   28.006405] 
[   28.006664] Allocated by task 250:
[   28.007052]  kasan_save_stack+0x3c/0x68
[   28.007471]  kasan_save_track+0x20/0x40
[   28.008547]  kasan_save_alloc_info+0x40/0x58
[   28.009071]  __kasan_kmalloc+0xd4/0xd8
[   28.009546]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.010240]  kasan_bitops_generic+0xa0/0x1c8
[   28.010913]  kunit_try_run_case+0x14c/0x3d0
[   28.011513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.012177]  kthread+0x24c/0x2d0
[   28.012791]  ret_from_fork+0x10/0x20
[   28.013276] 
[   28.013661] The buggy address belongs to the object at fff00000c5b73360
[   28.013661]  which belongs to the cache kmalloc-16 of size 16
[   28.015037] The buggy address is located 8 bytes inside of
[   28.015037]  allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[   28.016310] 
[   28.016699] The buggy address belongs to the physical page:
[   28.017319] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[   28.017989] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.018855] page_type: f5(slab)
[   28.019443] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   28.020516] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   28.021373] page dumped because: kasan: bad access detected
[   28.022165] 
[   28.022495] Memory state around the buggy address:
[   28.023101]  fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.024005]  fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.024849] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   28.025710]                                                           ^
[   28.026498]  fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.027253]  fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.027964] ==================================================================
---
[   28.030361] ==================================================================
[   28.031170] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   28.032103] Read of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[   28.032728] 
[   28.034263] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   28.035732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.036411] Hardware name: linux,dummy-virt (DT)
[   28.037141] Call trace:
[   28.037508]  show_stack+0x20/0x38 (C)
[   28.038046]  dump_stack_lvl+0x8c/0xd0
[   28.038559]  print_report+0x118/0x5e0
[   28.039495]  kasan_report+0xc8/0x118
[   28.040176]  __asan_report_load8_noabort+0x20/0x30
[   28.040971]  kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   28.041817]  kasan_bitops_generic+0x11c/0x1c8
[   28.042491]  kunit_try_run_case+0x14c/0x3d0
[   28.043225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.044108]  kthread+0x24c/0x2d0
[   28.044780]  ret_from_fork+0x10/0x20
[   28.045433] 
[   28.046080] Allocated by task 250:
[   28.046509]  kasan_save_stack+0x3c/0x68
[   28.047203]  kasan_save_track+0x20/0x40
[   28.047864]  kasan_save_alloc_info+0x40/0x58
[   28.048557]  __kasan_kmalloc+0xd4/0xd8
[   28.049239]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.050005]  kasan_bitops_generic+0xa0/0x1c8
[   28.050701]  kunit_try_run_case+0x14c/0x3d0
[   28.051278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.051937]  kthread+0x24c/0x2d0
[   28.052387]  ret_from_fork+0x10/0x20
[   28.053319] 
[   28.053597] The buggy address belongs to the object at fff00000c5b73360
[   28.053597]  which belongs to the cache kmalloc-16 of size 16
[   28.055220] The buggy address is located 8 bytes inside of
[   28.055220]  allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[   28.056517] 
[   28.056869] The buggy address belongs to the physical page:
[   28.057527] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[   28.058599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.059404] page_type: f5(slab)
[   28.059845] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   28.060617] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   28.061334] page dumped because: kasan: bad access detected
[   28.061981] 
[   28.062273] Memory state around the buggy address:
[   28.062971]  fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.063713]  fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.064793] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   28.065527]                                                           ^
[   28.066470]  fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.067311]  fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.068335] ==================================================================
---
[   27.850688] ==================================================================
[   27.852112] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   27.852790] Read of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[   27.853523] 
[   27.853951] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.855687] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.856360] Hardware name: linux,dummy-virt (DT)
[   27.857096] Call trace:
[   27.857480]  show_stack+0x20/0x38 (C)
[   27.858157]  dump_stack_lvl+0x8c/0xd0
[   27.858686]  print_report+0x118/0x5e0
[   27.859335]  kasan_report+0xc8/0x118
[   27.859879]  __asan_report_load8_noabort+0x20/0x30
[   27.860850]  kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   27.861652]  kasan_bitops_generic+0x11c/0x1c8
[   27.862325]  kunit_try_run_case+0x14c/0x3d0
[   27.862608]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.862922]  kthread+0x24c/0x2d0
[   27.863143]  ret_from_fork+0x10/0x20
[   27.863366] 
[   27.863498] Allocated by task 250:
[   27.863694]  kasan_save_stack+0x3c/0x68
[   27.864120]  kasan_save_track+0x20/0x40
[   27.864570]  kasan_save_alloc_info+0x40/0x58
[   27.865112]  __kasan_kmalloc+0xd4/0xd8
[   27.865551]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.866054]  kasan_bitops_generic+0xa0/0x1c8
[   27.866834]  kunit_try_run_case+0x14c/0x3d0
[   27.867426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.868291]  kthread+0x24c/0x2d0
[   27.868829]  ret_from_fork+0x10/0x20
[   27.869339] 
[   27.869735] The buggy address belongs to the object at fff00000c5b73360
[   27.869735]  which belongs to the cache kmalloc-16 of size 16
[   27.871095] The buggy address is located 8 bytes inside of
[   27.871095]  allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[   27.872504] 
[   27.872871] The buggy address belongs to the physical page:
[   27.873547] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[   27.874478] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.875275] page_type: f5(slab)
[   27.875815] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.876716] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   27.877568] page dumped because: kasan: bad access detected
[   27.878217] 
[   27.878604] Memory state around the buggy address:
[   27.879282]  fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.880077]  fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.880780] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.881557]                                                           ^
[   27.882362]  fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.883477]  fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.884223] ==================================================================
---
[   27.779427] ==================================================================
[   27.780223] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   27.781118] Read of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[   27.781835] 
[   27.782339] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.783505] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.784218] Hardware name: linux,dummy-virt (DT)
[   27.784865] Call trace:
[   27.785385]  show_stack+0x20/0x38 (C)
[   27.785982]  dump_stack_lvl+0x8c/0xd0
[   27.786721]  print_report+0x118/0x5e0
[   27.787354]  kasan_report+0xc8/0x118
[   27.787938]  __asan_report_load8_noabort+0x20/0x30
[   27.788598]  kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   27.789455]  kasan_bitops_generic+0x11c/0x1c8
[   27.790097]  kunit_try_run_case+0x14c/0x3d0
[   27.790730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.791543]  kthread+0x24c/0x2d0
[   27.792095]  ret_from_fork+0x10/0x20
[   27.792659] 
[   27.792984] Allocated by task 250:
[   27.793446]  kasan_save_stack+0x3c/0x68
[   27.794017]  kasan_save_track+0x20/0x40
[   27.794538]  kasan_save_alloc_info+0x40/0x58
[   27.795349]  __kasan_kmalloc+0xd4/0xd8
[   27.796042]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.796687]  kasan_bitops_generic+0xa0/0x1c8
[   27.797358]  kunit_try_run_case+0x14c/0x3d0
[   27.798058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.798854]  kthread+0x24c/0x2d0
[   27.799413]  ret_from_fork+0x10/0x20
[   27.799845] 
[   27.800257] The buggy address belongs to the object at fff00000c5b73360
[   27.800257]  which belongs to the cache kmalloc-16 of size 16
[   27.801664] The buggy address is located 8 bytes inside of
[   27.801664]  allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[   27.803129] 
[   27.803503] The buggy address belongs to the physical page:
[   27.804161] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[   27.805136] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.805859] page_type: f5(slab)
[   27.806367] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.807205] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   27.808087] page dumped because: kasan: bad access detected
[   27.808702] 
[   27.809022] Memory state around the buggy address:
[   27.809590]  fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.810377]  fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.811216] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.811990]                                                           ^
[   27.812721]  fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.813539]  fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.814331] ==================================================================
---
[   27.921723] ==================================================================
[   27.922356] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   27.923472] Read of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[   27.924255] 
[   27.924627] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.925675] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.926221] Hardware name: linux,dummy-virt (DT)
[   27.926830] Call trace:
[   27.927262]  show_stack+0x20/0x38 (C)
[   27.927865]  dump_stack_lvl+0x8c/0xd0
[   27.928466]  print_report+0x118/0x5e0
[   27.929096]  kasan_report+0xc8/0x118
[   27.929681]  __asan_report_load8_noabort+0x20/0x30
[   27.930312]  kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   27.931082]  kasan_bitops_generic+0x11c/0x1c8
[   27.931655]  kunit_try_run_case+0x14c/0x3d0
[   27.932225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.932953]  kthread+0x24c/0x2d0
[   27.933429]  ret_from_fork+0x10/0x20
[   27.934047] 
[   27.934362] Allocated by task 250:
[   27.934921]  kasan_save_stack+0x3c/0x68
[   27.935545]  kasan_save_track+0x20/0x40
[   27.936051]  kasan_save_alloc_info+0x40/0x58
[   27.936685]  __kasan_kmalloc+0xd4/0xd8
[   27.937356]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.937924]  kasan_bitops_generic+0xa0/0x1c8
[   27.938647]  kunit_try_run_case+0x14c/0x3d0
[   27.939186]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.939987]  kthread+0x24c/0x2d0
[   27.940480]  ret_from_fork+0x10/0x20
[   27.940984] 
[   27.941341] The buggy address belongs to the object at fff00000c5b73360
[   27.941341]  which belongs to the cache kmalloc-16 of size 16
[   27.942604] The buggy address is located 8 bytes inside of
[   27.942604]  allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[   27.943859] 
[   27.944216] The buggy address belongs to the physical page:
[   27.944886] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[   27.945701] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.946414] page_type: f5(slab)
[   27.946968] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   27.947771] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   27.948610] page dumped because: kasan: bad access detected
[   27.949370] 
[   27.949666] Memory state around the buggy address:
[   27.950254]  fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.951139]  fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.951944] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   27.952700]                                                           ^
[   27.953468]  fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.954224]  fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.955027] ==================================================================

test log snippet boot parser 30

Home

[   23.075618] ==================================================================
[   23.077098] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   23.077774] Write of size 1 at addr fff00000c6025f00 by task kunit_try_catch/133
[   23.078971] 
[   23.079398] CPU: 1 UID: 0 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   23.080784] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.081312] Hardware name: linux,dummy-virt (DT)
[   23.082104] Call trace:
[   23.082647]  show_stack+0x20/0x38 (C)
[   23.083520]  dump_stack_lvl+0x8c/0xd0
[   23.084237]  print_report+0x118/0x5e0
[   23.084790]  kasan_report+0xc8/0x118
[   23.085502]  __asan_report_store1_noabort+0x20/0x30
[   23.086256]  kmalloc_big_oob_right+0x2a4/0x2f0
[   23.087202]  kunit_try_run_case+0x14c/0x3d0
[   23.087726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.088377]  kthread+0x24c/0x2d0
[   23.089248]  ret_from_fork+0x10/0x20
[   23.089935] 
[   23.090376] Allocated by task 133:
[   23.091353]  kasan_save_stack+0x3c/0x68
[   23.091805]  kasan_save_track+0x20/0x40
[   23.092217]  kasan_save_alloc_info+0x40/0x58
[   23.092655]  __kasan_kmalloc+0xd4/0xd8
[   23.093067]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.093510]  kmalloc_big_oob_right+0xb8/0x2f0
[   23.094963]  kunit_try_run_case+0x14c/0x3d0
[   23.095799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.096517]  kthread+0x24c/0x2d0
[   23.097409]  ret_from_fork+0x10/0x20
[   23.098050] 
[   23.098387] The buggy address belongs to the object at fff00000c6024000
[   23.098387]  which belongs to the cache kmalloc-8k of size 8192
[   23.100600] The buggy address is located 0 bytes to the right of
[   23.100600]  allocated 7936-byte region [fff00000c6024000, fff00000c6025f00)
[   23.101957] 
[   23.102275] The buggy address belongs to the physical page:
[   23.103028] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106020
[   23.104338] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.105131] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.106232] page_type: f5(slab)
[   23.106928] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   23.108105] raw: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000
[   23.109109] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   23.110092] head: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000
[   23.111066] head: 0bfffe0000000003 ffffc1ffc3180801 ffffffffffffffff 0000000000000000
[   23.112209] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   23.113177] page dumped because: kasan: bad access detected
[   23.113800] 
[   23.114352] Memory state around the buggy address:
[   23.115166]  fff00000c6025e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.115810]  fff00000c6025e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.117477] >fff00000c6025f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.118221]                    ^
[   23.118921]  fff00000c6025f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.119731]  fff00000c6026000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.120487] ==================================================================

test log snippet boot parser 31

Home

[   23.130398] ==================================================================
[   23.131835] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   23.133911] Write of size 1 at addr fff00000c65fe00a by task kunit_try_catch/135
[   23.134586] 
[   23.134847] CPU: 0 UID: 0 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   23.137071] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.137490] Hardware name: linux,dummy-virt (DT)
[   23.137939] Call trace:
[   23.138232]  show_stack+0x20/0x38 (C)
[   23.138662]  dump_stack_lvl+0x8c/0xd0
[   23.140361]  print_report+0x118/0x5e0
[   23.141181]  kasan_report+0xc8/0x118
[   23.141682]  __asan_report_store1_noabort+0x20/0x30
[   23.142275]  kmalloc_large_oob_right+0x278/0x2b8
[   23.143016]  kunit_try_run_case+0x14c/0x3d0
[   23.143759]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.144968]  kthread+0x24c/0x2d0
[   23.145562]  ret_from_fork+0x10/0x20
[   23.146146] 
[   23.146592] The buggy address belongs to the physical page:
[   23.147858] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065fc
[   23.148302] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.148634] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.149190] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.150787] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.152228] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.152948] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.153929] head: 0bfffe0000000002 ffffc1ffc3197f01 ffffffffffffffff 0000000000000000
[   23.154869] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.156000] page dumped because: kasan: bad access detected
[   23.156576] 
[   23.156814] Memory state around the buggy address:
[   23.157203]  fff00000c65fdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.158850]  fff00000c65fdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.159967] >fff00000c65fe000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.161047]                       ^
[   23.161680]  fff00000c65fe080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.162634]  fff00000c65fe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.163799] ==================================================================

test log snippet boot parser 32

Home

[   24.424155] ==================================================================
[   24.425358] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e8
[   24.426465] Read of size 64 at addr fff00000c5c98984 by task kunit_try_catch/171
[   24.427491] 
[   24.428339] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   24.429234] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.429645] Hardware name: linux,dummy-virt (DT)
[   24.430226] Call trace:
[   24.430587]  show_stack+0x20/0x38 (C)
[   24.431691]  dump_stack_lvl+0x8c/0xd0
[   24.432224]  print_report+0x118/0x5e0
[   24.432761]  kasan_report+0xc8/0x118
[   24.433304]  kasan_check_range+0x100/0x1a8
[   24.433833]  __asan_memmove+0x3c/0x98
[   24.434425]  kmalloc_memmove_invalid_size+0x154/0x2e8
[   24.435158]  kunit_try_run_case+0x14c/0x3d0
[   24.435772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.436565]  kthread+0x24c/0x2d0
[   24.437849]  ret_from_fork+0x10/0x20
[   24.438365] 
[   24.438689] Allocated by task 171:
[   24.439677]  kasan_save_stack+0x3c/0x68
[   24.440255]  kasan_save_track+0x20/0x40
[   24.440779]  kasan_save_alloc_info+0x40/0x58
[   24.441392]  __kasan_kmalloc+0xd4/0xd8
[   24.441936]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.442572]  kmalloc_memmove_invalid_size+0xb0/0x2e8
[   24.444121]  kunit_try_run_case+0x14c/0x3d0
[   24.444670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.445353]  kthread+0x24c/0x2d0
[   24.445864]  ret_from_fork+0x10/0x20
[   24.446448] 
[   24.446847] The buggy address belongs to the object at fff00000c5c98980
[   24.446847]  which belongs to the cache kmalloc-64 of size 64
[   24.448358] The buggy address is located 4 bytes inside of
[   24.448358]  allocated 64-byte region [fff00000c5c98980, fff00000c5c989c0)
[   24.449398] 
[   24.449616] The buggy address belongs to the physical page:
[   24.450615] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c98
[   24.452402] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.453296] page_type: f5(slab)
[   24.454030] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.455387] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.456838] page dumped because: kasan: bad access detected
[   24.457828] 
[   24.457973] Memory state around the buggy address:
[   24.458229]  fff00000c5c98880: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.458566]  fff00000c5c98900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.459839] >fff00000c5c98980: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   24.461360]                                            ^
[   24.462216]  fff00000c5c98a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.463302]  fff00000c5c98a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.464151] ==================================================================

test log snippet boot parser 33

Home

[   22.931824] ==================================================================
[   22.932714] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   22.933857] Read of size 1 at addr fff00000c6619000 by task kunit_try_catch/129
[   22.935265] 
[   22.935649] CPU: 1 UID: 0 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   22.936972] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.937608] Hardware name: linux,dummy-virt (DT)
[   22.938293] Call trace:
[   22.938812]  show_stack+0x20/0x38 (C)
[   22.939334]  dump_stack_lvl+0x8c/0xd0
[   22.939839]  print_report+0x118/0x5e0
[   22.940339]  kasan_report+0xc8/0x118
[   22.941133]  __asan_report_load1_noabort+0x20/0x30
[   22.942115]  kmalloc_node_oob_right+0x2f4/0x330
[   22.942862]  kunit_try_run_case+0x14c/0x3d0
[   22.943589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.944139]  kthread+0x24c/0x2d0
[   22.944824]  ret_from_fork+0x10/0x20
[   22.945540] 
[   22.945964] Allocated by task 129:
[   22.946631]  kasan_save_stack+0x3c/0x68
[   22.947431]  kasan_save_track+0x20/0x40
[   22.947838]  kasan_save_alloc_info+0x40/0x58
[   22.948642]  __kasan_kmalloc+0xd4/0xd8
[   22.949374]  __kmalloc_cache_node_noprof+0x168/0x3d0
[   22.950091]  kmalloc_node_oob_right+0xbc/0x330
[   22.950821]  kunit_try_run_case+0x14c/0x3d0
[   22.951689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.952430]  kthread+0x24c/0x2d0
[   22.952962]  ret_from_fork+0x10/0x20
[   22.953602] 
[   22.954038] The buggy address belongs to the object at fff00000c6618000
[   22.954038]  which belongs to the cache kmalloc-4k of size 4096
[   22.955561] The buggy address is located 0 bytes to the right of
[   22.955561]  allocated 4096-byte region [fff00000c6618000, fff00000c6619000)
[   22.956672] 
[   22.957799] The buggy address belongs to the physical page:
[   22.958550] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106618
[   22.959931] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.960845] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.961699] page_type: f5(slab)
[   22.962262] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   22.963636] raw: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000
[   22.964455] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   22.965345] head: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000
[   22.966244] head: 0bfffe0000000003 ffffc1ffc3198601 ffffffffffffffff 0000000000000000
[   22.967169] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   22.968278] page dumped because: kasan: bad access detected
[   22.968964] 
[   22.969290] Memory state around the buggy address:
[   22.969949]  fff00000c6618f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.970817]  fff00000c6618f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.971873] >fff00000c6619000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.972758]                    ^
[   22.973275]  fff00000c6619080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.974102]  fff00000c6619100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.974949] ==================================================================

test log snippet boot parser 34

Home

[   24.024487] ==================================================================
[   24.025374] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   24.026043] Write of size 16 at addr fff00000c5b732c0 by task kunit_try_catch/155
[   24.026973] 
[   24.027341] CPU: 0 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   24.029661] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.030203] Hardware name: linux,dummy-virt (DT)
[   24.030980] Call trace:
[   24.031517]  show_stack+0x20/0x38 (C)
[   24.032778]  dump_stack_lvl+0x8c/0xd0
[   24.033313]  print_report+0x118/0x5e0
[   24.033915]  kasan_report+0xc8/0x118
[   24.034446]  __asan_report_store16_noabort+0x20/0x30
[   24.035848]  kmalloc_oob_16+0x3a0/0x3f8
[   24.036248]  kunit_try_run_case+0x14c/0x3d0
[   24.037190]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.038000]  kthread+0x24c/0x2d0
[   24.038477]  ret_from_fork+0x10/0x20
[   24.039302] 
[   24.039944] Allocated by task 155:
[   24.040384]  kasan_save_stack+0x3c/0x68
[   24.040902]  kasan_save_track+0x20/0x40
[   24.041366]  kasan_save_alloc_info+0x40/0x58
[   24.042267]  __kasan_kmalloc+0xd4/0xd8
[   24.042851]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.044281]  kmalloc_oob_16+0xb4/0x3f8
[   24.044987]  kunit_try_run_case+0x14c/0x3d0
[   24.045708]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.046349]  kthread+0x24c/0x2d0
[   24.047396]  ret_from_fork+0x10/0x20
[   24.047800] 
[   24.048383] The buggy address belongs to the object at fff00000c5b732c0
[   24.048383]  which belongs to the cache kmalloc-16 of size 16
[   24.050018] The buggy address is located 0 bytes inside of
[   24.050018]  allocated 13-byte region [fff00000c5b732c0, fff00000c5b732cd)
[   24.052287] 
[   24.052518] The buggy address belongs to the physical page:
[   24.053426] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[   24.054226] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.055244] page_type: f5(slab)
[   24.056128] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.057049] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.057914] page dumped because: kasan: bad access detected
[   24.058644] 
[   24.059024] Memory state around the buggy address:
[   24.060356]  fff00000c5b73180: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   24.061344]  fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.062149] >fff00000c5b73280: 00 04 fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc
[   24.063230]                                               ^
[   24.063779]  fff00000c5b73300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.064680]  fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.065460] ==================================================================

test log snippet boot parser 35

Home

[   24.132150] ==================================================================
[   24.133023] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   24.133849] Write of size 128 at addr fff00000c5ca2b00 by task kunit_try_catch/159
[   24.134779] 
[   24.135111] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   24.136619] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.137123] Hardware name: linux,dummy-virt (DT)
[   24.137837] Call trace:
[   24.138316]  show_stack+0x20/0x38 (C)
[   24.138996]  dump_stack_lvl+0x8c/0xd0
[   24.139937]  print_report+0x118/0x5e0
[   24.140454]  kasan_report+0xc8/0x118
[   24.140990]  kasan_check_range+0x100/0x1a8
[   24.141675]  __asan_memset+0x34/0x78
[   24.142291]  kmalloc_oob_in_memset+0x144/0x2d0
[   24.143301]  kunit_try_run_case+0x14c/0x3d0
[   24.143808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.144540]  kthread+0x24c/0x2d0
[   24.145114]  ret_from_fork+0x10/0x20
[   24.145721] 
[   24.146077] Allocated by task 159:
[   24.146682]  kasan_save_stack+0x3c/0x68
[   24.147565]  kasan_save_track+0x20/0x40
[   24.148120]  kasan_save_alloc_info+0x40/0x58
[   24.148781]  __kasan_kmalloc+0xd4/0xd8
[   24.149372]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.150074]  kmalloc_oob_in_memset+0xb0/0x2d0
[   24.150659]  kunit_try_run_case+0x14c/0x3d0
[   24.151261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.152220]  kthread+0x24c/0x2d0
[   24.152771]  ret_from_fork+0x10/0x20
[   24.153294] 
[   24.153687] The buggy address belongs to the object at fff00000c5ca2b00
[   24.153687]  which belongs to the cache kmalloc-128 of size 128
[   24.155025] The buggy address is located 0 bytes inside of
[   24.155025]  allocated 120-byte region [fff00000c5ca2b00, fff00000c5ca2b78)
[   24.156720] 
[   24.157067] The buggy address belongs to the physical page:
[   24.157692] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ca2
[   24.158727] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.159698] page_type: f5(slab)
[   24.160711] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.161614] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   24.162417] page dumped because: kasan: bad access detected
[   24.163106] 
[   24.163726] Memory state around the buggy address:
[   24.164316]  fff00000c5ca2a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   24.165025]  fff00000c5ca2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.165722] >fff00000c5ca2b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.166653]                                                                 ^
[   24.167834]  fff00000c5ca2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.168539]  fff00000c5ca2c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.169191] ==================================================================

test log snippet boot parser 36

Home

[   24.326101] ==================================================================
[   24.327315] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   24.328594] Write of size 16 at addr fff00000c5ca3969 by task kunit_try_catch/167
[   24.330166] 
[   24.330472] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   24.331775] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.332390] Hardware name: linux,dummy-virt (DT)
[   24.332985] Call trace:
[   24.333377]  show_stack+0x20/0x38 (C)
[   24.333940]  dump_stack_lvl+0x8c/0xd0
[   24.334511]  print_report+0x118/0x5e0
[   24.335346]  kasan_report+0xc8/0x118
[   24.335840]  kasan_check_range+0x100/0x1a8
[   24.336263]  __asan_memset+0x34/0x78
[   24.336658]  kmalloc_oob_memset_16+0x150/0x2f8
[   24.337092]  kunit_try_run_case+0x14c/0x3d0
[   24.337536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.338830]  kthread+0x24c/0x2d0
[   24.339964]  ret_from_fork+0x10/0x20
[   24.340663] 
[   24.340970] Allocated by task 167:
[   24.341417]  kasan_save_stack+0x3c/0x68
[   24.342014]  kasan_save_track+0x20/0x40
[   24.342495]  kasan_save_alloc_info+0x40/0x58
[   24.343399]  __kasan_kmalloc+0xd4/0xd8
[   24.343854]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.344425]  kmalloc_oob_memset_16+0xb0/0x2f8
[   24.344986]  kunit_try_run_case+0x14c/0x3d0
[   24.345532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.346675]  kthread+0x24c/0x2d0
[   24.347573]  ret_from_fork+0x10/0x20
[   24.347882] 
[   24.348367] The buggy address belongs to the object at fff00000c5ca3900
[   24.348367]  which belongs to the cache kmalloc-128 of size 128
[   24.349584] The buggy address is located 105 bytes inside of
[   24.349584]  allocated 120-byte region [fff00000c5ca3900, fff00000c5ca3978)
[   24.350774] 
[   24.351110] The buggy address belongs to the physical page:
[   24.351697] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ca3
[   24.352809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.353511] page_type: f5(slab)
[   24.354401] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.355387] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   24.356499] page dumped because: kasan: bad access detected
[   24.357280] 
[   24.357730] Memory state around the buggy address:
[   24.358407]  fff00000c5ca3800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   24.359399]  fff00000c5ca3880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.360398] >fff00000c5ca3900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.361090]                                                                 ^
[   24.362413]  fff00000c5ca3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.363156]  fff00000c5ca3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.364321] ==================================================================

test log snippet boot parser 37

Home

[   24.178839] ==================================================================
[   24.180707] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   24.181616] Write of size 2 at addr fff00000c5ca2c77 by task kunit_try_catch/161
[   24.182423] 
[   24.182782] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   24.183833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.184733] Hardware name: linux,dummy-virt (DT)
[   24.185357] Call trace:
[   24.186530]  show_stack+0x20/0x38 (C)
[   24.187248]  dump_stack_lvl+0x8c/0xd0
[   24.187825]  print_report+0x118/0x5e0
[   24.188417]  kasan_report+0xc8/0x118
[   24.188969]  kasan_check_range+0x100/0x1a8
[   24.189514]  __asan_memset+0x34/0x78
[   24.190108]  kmalloc_oob_memset_2+0x150/0x2f8
[   24.190782]  kunit_try_run_case+0x14c/0x3d0
[   24.191385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.192542]  kthread+0x24c/0x2d0
[   24.193058]  ret_from_fork+0x10/0x20
[   24.193572] 
[   24.194170] Allocated by task 161:
[   24.194514]  kasan_save_stack+0x3c/0x68
[   24.195558]  kasan_save_track+0x20/0x40
[   24.196849]  kasan_save_alloc_info+0x40/0x58
[   24.197539]  __kasan_kmalloc+0xd4/0xd8
[   24.198212]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.198810]  kmalloc_oob_memset_2+0xb0/0x2f8
[   24.199735]  kunit_try_run_case+0x14c/0x3d0
[   24.200432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.201229]  kthread+0x24c/0x2d0
[   24.201683]  ret_from_fork+0x10/0x20
[   24.202184] 
[   24.202478] The buggy address belongs to the object at fff00000c5ca2c00
[   24.202478]  which belongs to the cache kmalloc-128 of size 128
[   24.204083] The buggy address is located 119 bytes inside of
[   24.204083]  allocated 120-byte region [fff00000c5ca2c00, fff00000c5ca2c78)
[   24.205492] 
[   24.206122] The buggy address belongs to the physical page:
[   24.206816] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ca2
[   24.208026] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.208907] page_type: f5(slab)
[   24.209352] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.210164] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   24.211389] page dumped because: kasan: bad access detected
[   24.211877] 
[   24.212441] Memory state around the buggy address:
[   24.213254]  fff00000c5ca2b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.214140]  fff00000c5ca2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.215386] >fff00000c5ca2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.216093]                                                                 ^
[   24.216869]  fff00000c5ca2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.217624]  fff00000c5ca2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.219531] ==================================================================

test log snippet boot parser 38

Home

[   24.228263] ==================================================================
[   24.229276] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   24.229943] Write of size 4 at addr fff00000c5ca2d75 by task kunit_try_catch/163
[   24.230853] 
[   24.231257] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   24.232544] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.233022] Hardware name: linux,dummy-virt (DT)
[   24.233690] Call trace:
[   24.235218]  show_stack+0x20/0x38 (C)
[   24.235865]  dump_stack_lvl+0x8c/0xd0
[   24.236249]  print_report+0x118/0x5e0
[   24.236863]  kasan_report+0xc8/0x118
[   24.237408]  kasan_check_range+0x100/0x1a8
[   24.238048]  __asan_memset+0x34/0x78
[   24.238558]  kmalloc_oob_memset_4+0x150/0x300
[   24.239219]  kunit_try_run_case+0x14c/0x3d0
[   24.239807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.240783]  kthread+0x24c/0x2d0
[   24.241281]  ret_from_fork+0x10/0x20
[   24.241905] 
[   24.242181] Allocated by task 163:
[   24.242675]  kasan_save_stack+0x3c/0x68
[   24.243314]  kasan_save_track+0x20/0x40
[   24.243939]  kasan_save_alloc_info+0x40/0x58
[   24.244849]  __kasan_kmalloc+0xd4/0xd8
[   24.245571]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.246115]  kmalloc_oob_memset_4+0xb0/0x300
[   24.246629]  kunit_try_run_case+0x14c/0x3d0
[   24.248192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.248861]  kthread+0x24c/0x2d0
[   24.249574]  ret_from_fork+0x10/0x20
[   24.250240] 
[   24.250566] The buggy address belongs to the object at fff00000c5ca2d00
[   24.250566]  which belongs to the cache kmalloc-128 of size 128
[   24.251687] The buggy address is located 117 bytes inside of
[   24.251687]  allocated 120-byte region [fff00000c5ca2d00, fff00000c5ca2d78)
[   24.252547] 
[   24.252991] The buggy address belongs to the physical page:
[   24.254951] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ca2
[   24.257384] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.258351] page_type: f5(slab)
[   24.258776] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.260016] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   24.260919] page dumped because: kasan: bad access detected
[   24.261687] 
[   24.262146] Memory state around the buggy address:
[   24.262785]  fff00000c5ca2c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.264109]  fff00000c5ca2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.264782] >fff00000c5ca2d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.265884]                                                                 ^
[   24.266660]  fff00000c5ca2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.267482]  fff00000c5ca2e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.268238] ==================================================================

test log snippet boot parser 39

Home

[   24.278185] ==================================================================
[   24.279925] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   24.280847] Write of size 8 at addr fff00000c5ca2e71 by task kunit_try_catch/165
[   24.281773] 
[   24.282177] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   24.283310] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.283854] Hardware name: linux,dummy-virt (DT)
[   24.284498] Call trace:
[   24.285015]  show_stack+0x20/0x38 (C)
[   24.285620]  dump_stack_lvl+0x8c/0xd0
[   24.286275]  print_report+0x118/0x5e0
[   24.286923]  kasan_report+0xc8/0x118
[   24.287570]  kasan_check_range+0x100/0x1a8
[   24.288174]  __asan_memset+0x34/0x78
[   24.288825]  kmalloc_oob_memset_8+0x150/0x2f8
[   24.289511]  kunit_try_run_case+0x14c/0x3d0
[   24.290228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.290980]  kthread+0x24c/0x2d0
[   24.291574]  ret_from_fork+0x10/0x20
[   24.292231] 
[   24.292545] Allocated by task 165:
[   24.294378]  kasan_save_stack+0x3c/0x68
[   24.295786]  kasan_save_track+0x20/0x40
[   24.296323]  kasan_save_alloc_info+0x40/0x58
[   24.296905]  __kasan_kmalloc+0xd4/0xd8
[   24.297399]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.297996]  kmalloc_oob_memset_8+0xb0/0x2f8
[   24.298530]  kunit_try_run_case+0x14c/0x3d0
[   24.299255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.299804]  kthread+0x24c/0x2d0
[   24.300343]  ret_from_fork+0x10/0x20
[   24.300898] 
[   24.301207] The buggy address belongs to the object at fff00000c5ca2e00
[   24.301207]  which belongs to the cache kmalloc-128 of size 128
[   24.303046] The buggy address is located 113 bytes inside of
[   24.303046]  allocated 120-byte region [fff00000c5ca2e00, fff00000c5ca2e78)
[   24.304230] 
[   24.304598] The buggy address belongs to the physical page:
[   24.305238] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ca2
[   24.306351] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.307250] page_type: f5(slab)
[   24.307711] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.308633] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   24.309437] page dumped because: kasan: bad access detected
[   24.310111] 
[   24.310387] Memory state around the buggy address:
[   24.310993]  fff00000c5ca2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.311785]  fff00000c5ca2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.312500] >fff00000c5ca2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.313311]                                                                 ^
[   24.314081]  fff00000c5ca2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.314966]  fff00000c5ca2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.315772] ==================================================================

test log snippet boot parser 40

Home

[   22.746188] ==================================================================
[   22.747310] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   22.749280] Write of size 1 at addr fff00000c6352873 by task kunit_try_catch/125
[   22.749898] 
[   22.751649] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G                 N 6.13.0-rc7 #1
[   22.753082] Tainted: [N]=TEST
[   22.753661] Hardware name: linux,dummy-virt (DT)
[   22.754655] Call trace:
[   22.755509]  show_stack+0x20/0x38 (C)
[   22.756078]  dump_stack_lvl+0x8c/0xd0
[   22.756524]  print_report+0x118/0x5e0
[   22.757452]  kasan_report+0xc8/0x118
[   22.758098]  __asan_report_store1_noabort+0x20/0x30
[   22.758758]  kmalloc_oob_right+0x5a4/0x660
[   22.759563]  kunit_try_run_case+0x14c/0x3d0
[   22.760243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.760953]  kthread+0x24c/0x2d0
[   22.761417]  ret_from_fork+0x10/0x20
[   22.762306] 
[   22.762756] Allocated by task 125:
[   22.763664]  kasan_save_stack+0x3c/0x68
[   22.764243]  kasan_save_track+0x20/0x40
[   22.764756]  kasan_save_alloc_info+0x40/0x58
[   22.765318]  __kasan_kmalloc+0xd4/0xd8
[   22.766208]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.766899]  kmalloc_oob_right+0xb0/0x660
[   22.767405]  kunit_try_run_case+0x14c/0x3d0
[   22.768255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.768903]  kthread+0x24c/0x2d0
[   22.769340]  ret_from_fork+0x10/0x20
[   22.770256] 
[   22.771208] The buggy address belongs to the object at fff00000c6352800
[   22.771208]  which belongs to the cache kmalloc-128 of size 128
[   22.772569] The buggy address is located 0 bytes to the right of
[   22.772569]  allocated 115-byte region [fff00000c6352800, fff00000c6352873)
[   22.773685] 
[   22.774619] The buggy address belongs to the physical page:
[   22.776119] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106352
[   22.777296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.778443] page_type: f5(slab)
[   22.779496] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.780271] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   22.781420] page dumped because: kasan: bad access detected
[   22.782093] 
[   22.782406] Memory state around the buggy address:
[   22.783519]  fff00000c6352700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   22.784471]  fff00000c6352780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.785352] >fff00000c6352800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.786047]                                                              ^
[   22.786788]  fff00000c6352880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.788549]  fff00000c6352900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.789269] ==================================================================

test log snippet boot parser 41

Home

[   22.792408] ==================================================================
[   22.793645] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   22.794309] Write of size 1 at addr fff00000c6352878 by task kunit_try_catch/125
[   22.795763] 
[   22.796797] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   22.797964] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.798609] Hardware name: linux,dummy-virt (DT)
[   22.799551] Call trace:
[   22.800094]  show_stack+0x20/0x38 (C)
[   22.800804]  dump_stack_lvl+0x8c/0xd0
[   22.801450]  print_report+0x118/0x5e0
[   22.802136]  kasan_report+0xc8/0x118
[   22.802689]  __asan_report_store1_noabort+0x20/0x30
[   22.803906]  kmalloc_oob_right+0x538/0x660
[   22.804372]  kunit_try_run_case+0x14c/0x3d0
[   22.805115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.805920]  kthread+0x24c/0x2d0
[   22.806570]  ret_from_fork+0x10/0x20
[   22.807542] 
[   22.807826] Allocated by task 125:
[   22.808267]  kasan_save_stack+0x3c/0x68
[   22.808767]  kasan_save_track+0x20/0x40
[   22.809270]  kasan_save_alloc_info+0x40/0x58
[   22.810346]  __kasan_kmalloc+0xd4/0xd8
[   22.810807]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.811663]  kmalloc_oob_right+0xb0/0x660
[   22.812358]  kunit_try_run_case+0x14c/0x3d0
[   22.813117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.814066]  kthread+0x24c/0x2d0
[   22.814689]  ret_from_fork+0x10/0x20
[   22.815402] 
[   22.815985] The buggy address belongs to the object at fff00000c6352800
[   22.815985]  which belongs to the cache kmalloc-128 of size 128
[   22.817441] The buggy address is located 5 bytes to the right of
[   22.817441]  allocated 115-byte region [fff00000c6352800, fff00000c6352873)
[   22.818921] 
[   22.819252] The buggy address belongs to the physical page:
[   22.820255] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106352
[   22.821236] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.822117] page_type: f5(slab)
[   22.822778] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.823972] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   22.824946] page dumped because: kasan: bad access detected
[   22.825722] 
[   22.826168] Memory state around the buggy address:
[   22.826821]  fff00000c6352700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.827973]  fff00000c6352780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.828954] >fff00000c6352800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.829874]                                                                 ^
[   22.830808]  fff00000c6352880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.831817]  fff00000c6352900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.832646] ==================================================================

test log snippet boot parser 42

Home

[   22.835760] ==================================================================
[   22.836535] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   22.837471] Read of size 1 at addr fff00000c6352880 by task kunit_try_catch/125
[   22.838887] 
[   22.839535] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   22.840617] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.841342] Hardware name: linux,dummy-virt (DT)
[   22.842052] Call trace:
[   22.842582]  show_stack+0x20/0x38 (C)
[   22.843506]  dump_stack_lvl+0x8c/0xd0
[   22.844066]  print_report+0x118/0x5e0
[   22.844573]  kasan_report+0xc8/0x118
[   22.845100]  __asan_report_load1_noabort+0x20/0x30
[   22.845697]  kmalloc_oob_right+0x5d0/0x660
[   22.846696]  kunit_try_run_case+0x14c/0x3d0
[   22.847414]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.848364]  kthread+0x24c/0x2d0
[   22.848836]  ret_from_fork+0x10/0x20
[   22.849318] 
[   22.849596] Allocated by task 125:
[   22.850046]  kasan_save_stack+0x3c/0x68
[   22.850598]  kasan_save_track+0x20/0x40
[   22.851809]  kasan_save_alloc_info+0x40/0x58
[   22.852445]  __kasan_kmalloc+0xd4/0xd8
[   22.853067]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.853735]  kmalloc_oob_right+0xb0/0x660
[   22.854353]  kunit_try_run_case+0x14c/0x3d0
[   22.855134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.855891]  kthread+0x24c/0x2d0
[   22.856453]  ret_from_fork+0x10/0x20
[   22.857076] 
[   22.857478] The buggy address belongs to the object at fff00000c6352800
[   22.857478]  which belongs to the cache kmalloc-128 of size 128
[   22.858903] The buggy address is located 13 bytes to the right of
[   22.858903]  allocated 115-byte region [fff00000c6352800, fff00000c6352873)
[   22.860469] 
[   22.860612] The buggy address belongs to the physical page:
[   22.860931] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106352
[   22.861290] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.861595] page_type: f5(slab)
[   22.861933] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.863353] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   22.864827] page dumped because: kasan: bad access detected
[   22.865635] 
[   22.865873] Memory state around the buggy address:
[   22.866814]  fff00000c6352780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.868021]  fff00000c6352800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.868657] >fff00000c6352880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.869254]                    ^
[   22.869980]  fff00000c6352900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.870863]  fff00000c6352980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.871874] ==================================================================

test log snippet boot parser 43

Home

[   23.025461] ==================================================================
[   23.026319] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x420/0x490
[   23.027703] Write of size 1 at addr fff00000c5cac578 by task kunit_try_catch/131
[   23.028898] 
[   23.029152] CPU: 0 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   23.030108] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.030792] Hardware name: linux,dummy-virt (DT)
[   23.032102] Call trace:
[   23.032526]  show_stack+0x20/0x38 (C)
[   23.033131]  dump_stack_lvl+0x8c/0xd0
[   23.034019]  print_report+0x118/0x5e0
[   23.034702]  kasan_report+0xc8/0x118
[   23.035474]  __asan_report_store1_noabort+0x20/0x30
[   23.036153]  kmalloc_track_caller_oob_right+0x420/0x490
[   23.036999]  kunit_try_run_case+0x14c/0x3d0
[   23.037569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.038386]  kthread+0x24c/0x2d0
[   23.039064]  ret_from_fork+0x10/0x20
[   23.039916] 
[   23.040199] Allocated by task 131:
[   23.040636]  kasan_save_stack+0x3c/0x68
[   23.041144]  kasan_save_track+0x20/0x40
[   23.041604]  kasan_save_alloc_info+0x40/0x58
[   23.042566]  __kasan_kmalloc+0xd4/0xd8
[   23.043875]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   23.044551]  kmalloc_track_caller_oob_right+0x184/0x490
[   23.045431]  kunit_try_run_case+0x14c/0x3d0
[   23.046109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.046945]  kthread+0x24c/0x2d0
[   23.048102]  ret_from_fork+0x10/0x20
[   23.048766] 
[   23.049090] The buggy address belongs to the object at fff00000c5cac500
[   23.049090]  which belongs to the cache kmalloc-128 of size 128
[   23.050570] The buggy address is located 0 bytes to the right of
[   23.050570]  allocated 120-byte region [fff00000c5cac500, fff00000c5cac578)
[   23.052454] 
[   23.052924] The buggy address belongs to the physical page:
[   23.053659] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cac
[   23.054552] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.056179] page_type: f5(slab)
[   23.056935] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.057915] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.058917] page dumped because: kasan: bad access detected
[   23.059732] 
[   23.060402] Memory state around the buggy address:
[   23.060911]  fff00000c5cac400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.061905]  fff00000c5cac480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.062680] >fff00000c5cac500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.064167]                                                                 ^
[   23.065131]  fff00000c5cac580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.066037]  fff00000c5cac600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.066804] ==================================================================

test log snippet boot parser 44

Home

[   22.984827] ==================================================================
[   22.985882] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x414/0x490
[   22.986703] Write of size 1 at addr fff00000c5cac478 by task kunit_try_catch/131
[   22.987332] 
[   22.987707] CPU: 0 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   22.988578] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.988968] Hardware name: linux,dummy-virt (DT)
[   22.989371] Call trace:
[   22.989661]  show_stack+0x20/0x38 (C)
[   22.990269]  dump_stack_lvl+0x8c/0xd0
[   22.991055]  print_report+0x118/0x5e0
[   22.991665]  kasan_report+0xc8/0x118
[   22.992285]  __asan_report_store1_noabort+0x20/0x30
[   22.993098]  kmalloc_track_caller_oob_right+0x414/0x490
[   22.993918]  kunit_try_run_case+0x14c/0x3d0
[   22.995680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.996443]  kthread+0x24c/0x2d0
[   22.997002]  ret_from_fork+0x10/0x20
[   22.997454] 
[   22.997833] Allocated by task 131:
[   22.998445]  kasan_save_stack+0x3c/0x68
[   22.999177]  kasan_save_track+0x20/0x40
[   22.999938]  kasan_save_alloc_info+0x40/0x58
[   23.001003]  __kasan_kmalloc+0xd4/0xd8
[   23.001545]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   23.002258]  kmalloc_track_caller_oob_right+0xa8/0x490
[   23.002960]  kunit_try_run_case+0x14c/0x3d0
[   23.003466]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.004526]  kthread+0x24c/0x2d0
[   23.004914]  ret_from_fork+0x10/0x20
[   23.005319] 
[   23.005728] The buggy address belongs to the object at fff00000c5cac400
[   23.005728]  which belongs to the cache kmalloc-128 of size 128
[   23.007834] The buggy address is located 0 bytes to the right of
[   23.007834]  allocated 120-byte region [fff00000c5cac400, fff00000c5cac478)
[   23.009661] 
[   23.010051] The buggy address belongs to the physical page:
[   23.010715] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cac
[   23.012050] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.012714] page_type: f5(slab)
[   23.013155] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.014236] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.014992] page dumped because: kasan: bad access detected
[   23.015890] 
[   23.016253] Memory state around the buggy address:
[   23.017410]  fff00000c5cac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   23.018227]  fff00000c5cac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.019525] >fff00000c5cac400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.020390]                                                                 ^
[   23.020735]  fff00000c5cac480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.021859]  fff00000c5cac500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.022787] ==================================================================

test log snippet boot parser 45

Home

[   25.221635] ==================================================================
[   25.222639] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x33c/0x428
[   25.223298] Read of size 1 at addr fff00000c5ce80c8 by task kunit_try_catch/196
[   25.225353] 
[   25.225610] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   25.226441] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.228116] Hardware name: linux,dummy-virt (DT)
[   25.228612] Call trace:
[   25.228975]  show_stack+0x20/0x38 (C)
[   25.229630]  dump_stack_lvl+0x8c/0xd0
[   25.230249]  print_report+0x118/0x5e0
[   25.230839]  kasan_report+0xc8/0x118
[   25.231374]  __asan_report_load1_noabort+0x20/0x30
[   25.232115]  kmem_cache_oob+0x33c/0x428
[   25.232652]  kunit_try_run_case+0x14c/0x3d0
[   25.233539]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.234271]  kthread+0x24c/0x2d0
[   25.234801]  ret_from_fork+0x10/0x20
[   25.235618] 
[   25.235913] Allocated by task 196:
[   25.236374]  kasan_save_stack+0x3c/0x68
[   25.236948]  kasan_save_track+0x20/0x40
[   25.237457]  kasan_save_alloc_info+0x40/0x58
[   25.238048]  __kasan_slab_alloc+0xa8/0xb0
[   25.238600]  kmem_cache_alloc_noprof+0x108/0x398
[   25.239526]  kmem_cache_oob+0x12c/0x428
[   25.240021]  kunit_try_run_case+0x14c/0x3d0
[   25.240642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.241276]  kthread+0x24c/0x2d0
[   25.241799]  ret_from_fork+0x10/0x20
[   25.242321] 
[   25.242662] The buggy address belongs to the object at fff00000c5ce8000
[   25.242662]  which belongs to the cache test_cache of size 200
[   25.244684] The buggy address is located 0 bytes to the right of
[   25.244684]  allocated 200-byte region [fff00000c5ce8000, fff00000c5ce80c8)
[   25.246535] 
[   25.246819] The buggy address belongs to the physical page:
[   25.247834] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce8
[   25.248714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.249435] page_type: f5(slab)
[   25.249994] raw: 0bfffe0000000000 fff00000c565a640 dead000000000122 0000000000000000
[   25.250825] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   25.251900] page dumped because: kasan: bad access detected
[   25.252535] 
[   25.252848] Memory state around the buggy address:
[   25.253369]  fff00000c5ce7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.254205]  fff00000c5ce8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.255284] >fff00000c5ce8080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   25.256082]                                               ^
[   25.256758]  fff00000c5ce8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.257549]  fff00000c5ce8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.258353] ==================================================================

test log snippet boot parser 46

Home

[   23.593897] ==================================================================
[   23.594802] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   23.596043] Write of size 1 at addr fff00000c6364aeb by task kunit_try_catch/147
[   23.596668] 
[   23.597021] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   23.599462] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.600515] Hardware name: linux,dummy-virt (DT)
[   23.601865] Call trace:
[   23.602254]  show_stack+0x20/0x38 (C)
[   23.602892]  dump_stack_lvl+0x8c/0xd0
[   23.603619]  print_report+0x118/0x5e0
[   23.604543]  kasan_report+0xc8/0x118
[   23.605391]  __asan_report_store1_noabort+0x20/0x30
[   23.606110]  krealloc_less_oob_helper+0xa58/0xc50
[   23.606806]  krealloc_less_oob+0x20/0x38
[   23.607536]  kunit_try_run_case+0x14c/0x3d0
[   23.608443]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.609805]  kthread+0x24c/0x2d0
[   23.610481]  ret_from_fork+0x10/0x20
[   23.611569] 
[   23.611806] Allocated by task 147:
[   23.612672]  kasan_save_stack+0x3c/0x68
[   23.613322]  kasan_save_track+0x20/0x40
[   23.613993]  kasan_save_alloc_info+0x40/0x58
[   23.614727]  __kasan_krealloc+0x118/0x178
[   23.615448]  krealloc_noprof+0x128/0x360
[   23.616237]  krealloc_less_oob_helper+0x168/0xc50
[   23.616644]  krealloc_less_oob+0x20/0x38
[   23.617050]  kunit_try_run_case+0x14c/0x3d0
[   23.617625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.618385]  kthread+0x24c/0x2d0
[   23.618864]  ret_from_fork+0x10/0x20
[   23.619484] 
[   23.619817] The buggy address belongs to the object at fff00000c6364a00
[   23.619817]  which belongs to the cache kmalloc-256 of size 256
[   23.621367] The buggy address is located 34 bytes to the right of
[   23.621367]  allocated 201-byte region [fff00000c6364a00, fff00000c6364ac9)
[   23.622643] 
[   23.623521] The buggy address belongs to the physical page:
[   23.624276] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106364
[   23.625096] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.626209] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.627488] page_type: f5(slab)
[   23.627715] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.628088] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.628424] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.628839] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.630074] head: 0bfffe0000000001 ffffc1ffc318d901 ffffffffffffffff 0000000000000000
[   23.631177] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   23.632989] page dumped because: kasan: bad access detected
[   23.633605] 
[   23.633950] Memory state around the buggy address:
[   23.634609]  fff00000c6364980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.635713]  fff00000c6364a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.636661] >fff00000c6364a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.637574]                                                           ^
[   23.638369]  fff00000c6364b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.639285]  fff00000c6364b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.640342] ==================================================================

test log snippet boot parser 47

Home

[   23.438823] ==================================================================
[   23.439844] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   23.440431] Write of size 1 at addr fff00000c6364ad0 by task kunit_try_catch/147
[   23.440979] 
[   23.441394] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   23.442523] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.443599] Hardware name: linux,dummy-virt (DT)
[   23.444432] Call trace:
[   23.444737]  show_stack+0x20/0x38 (C)
[   23.445265]  dump_stack_lvl+0x8c/0xd0
[   23.445693]  print_report+0x118/0x5e0
[   23.446681]  kasan_report+0xc8/0x118
[   23.447354]  __asan_report_store1_noabort+0x20/0x30
[   23.448813]  krealloc_less_oob_helper+0xb9c/0xc50
[   23.450038]  krealloc_less_oob+0x20/0x38
[   23.450732]  kunit_try_run_case+0x14c/0x3d0
[   23.451419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.452579]  kthread+0x24c/0x2d0
[   23.453361]  ret_from_fork+0x10/0x20
[   23.453960] 
[   23.454304] Allocated by task 147:
[   23.454855]  kasan_save_stack+0x3c/0x68
[   23.455605]  kasan_save_track+0x20/0x40
[   23.456145]  kasan_save_alloc_info+0x40/0x58
[   23.456662]  __kasan_krealloc+0x118/0x178
[   23.457241]  krealloc_noprof+0x128/0x360
[   23.458362]  krealloc_less_oob_helper+0x168/0xc50
[   23.459178]  krealloc_less_oob+0x20/0x38
[   23.460097]  kunit_try_run_case+0x14c/0x3d0
[   23.460823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.461431]  kthread+0x24c/0x2d0
[   23.462096]  ret_from_fork+0x10/0x20
[   23.462574] 
[   23.463020] The buggy address belongs to the object at fff00000c6364a00
[   23.463020]  which belongs to the cache kmalloc-256 of size 256
[   23.465349] The buggy address is located 7 bytes to the right of
[   23.465349]  allocated 201-byte region [fff00000c6364a00, fff00000c6364ac9)
[   23.466845] 
[   23.467374] The buggy address belongs to the physical page:
[   23.468238] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106364
[   23.469416] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.470342] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.472112] page_type: f5(slab)
[   23.472710] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.473785] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.474789] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.476135] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.476979] head: 0bfffe0000000001 ffffc1ffc318d901 ffffffffffffffff 0000000000000000
[   23.478302] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   23.480060] page dumped because: kasan: bad access detected
[   23.480794] 
[   23.481090] Memory state around the buggy address:
[   23.481674]  fff00000c6364980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.482427]  fff00000c6364a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.484112] >fff00000c6364a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.485081]                                                  ^
[   23.485910]  fff00000c6364b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.486887]  fff00000c6364b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.487686] ==================================================================

test log snippet boot parser 48

Home

[   23.793187] ==================================================================
[   23.793888] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   23.794585] Write of size 1 at addr fff00000c66060da by task kunit_try_catch/151
[   23.795607] 
[   23.797134] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   23.798255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.798783] Hardware name: linux,dummy-virt (DT)
[   23.799331] Call trace:
[   23.799731]  show_stack+0x20/0x38 (C)
[   23.800842]  dump_stack_lvl+0x8c/0xd0
[   23.801371]  print_report+0x118/0x5e0
[   23.801912]  kasan_report+0xc8/0x118
[   23.802454]  __asan_report_store1_noabort+0x20/0x30
[   23.804092]  krealloc_less_oob_helper+0xa80/0xc50
[   23.804580]  krealloc_large_less_oob+0x20/0x38
[   23.805309]  kunit_try_run_case+0x14c/0x3d0
[   23.806009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.806737]  kthread+0x24c/0x2d0
[   23.807787]  ret_from_fork+0x10/0x20
[   23.808316] 
[   23.808626] The buggy address belongs to the physical page:
[   23.809245] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106604
[   23.810863] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.811979] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.813536] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.814332] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.816056] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.817124] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.818130] head: 0bfffe0000000002 ffffc1ffc3198101 ffffffffffffffff 0000000000000000
[   23.819095] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.820250] page dumped because: kasan: bad access detected
[   23.821186] 
[   23.821427] Memory state around the buggy address:
[   23.822146]  fff00000c6605f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.822925]  fff00000c6606000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.823895] >fff00000c6606080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   23.825001]                                                     ^
[   23.825891]  fff00000c6606100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.826704]  fff00000c6606180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.827829] ==================================================================

test log snippet boot parser 49

Home

[   23.864868] ==================================================================
[   23.865561] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   23.866498] Write of size 1 at addr fff00000c66060eb by task kunit_try_catch/151
[   23.867396] 
[   23.867981] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   23.869046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.869538] Hardware name: linux,dummy-virt (DT)
[   23.870309] Call trace:
[   23.870766]  show_stack+0x20/0x38 (C)
[   23.872187]  dump_stack_lvl+0x8c/0xd0
[   23.872857]  print_report+0x118/0x5e0
[   23.873452]  kasan_report+0xc8/0x118
[   23.874045]  __asan_report_store1_noabort+0x20/0x30
[   23.874918]  krealloc_less_oob_helper+0xa58/0xc50
[   23.875981]  krealloc_large_less_oob+0x20/0x38
[   23.876706]  kunit_try_run_case+0x14c/0x3d0
[   23.877431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.878256]  kthread+0x24c/0x2d0
[   23.878925]  ret_from_fork+0x10/0x20
[   23.879645] 
[   23.879950] The buggy address belongs to the physical page:
[   23.880556] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106604
[   23.882115] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.883533] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.885040] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.886164] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.886895] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.888499] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.889511] head: 0bfffe0000000002 ffffc1ffc3198101 ffffffffffffffff 0000000000000000
[   23.890553] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.891712] page dumped because: kasan: bad access detected
[   23.892332] 
[   23.892621] Memory state around the buggy address:
[   23.894041]  fff00000c6605f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.894983]  fff00000c6606000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.895965] >fff00000c6606080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   23.896709]                                                           ^
[   23.897417]  fff00000c6606100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.898842]  fff00000c6606180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.899857] ==================================================================

test log snippet boot parser 50

Home

[   23.828918] ==================================================================
[   23.829570] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   23.830968] Write of size 1 at addr fff00000c66060ea by task kunit_try_catch/151
[   23.832405] 
[   23.832623] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   23.833310] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.833712] Hardware name: linux,dummy-virt (DT)
[   23.835998] Call trace:
[   23.836492]  show_stack+0x20/0x38 (C)
[   23.837204]  dump_stack_lvl+0x8c/0xd0
[   23.837875]  print_report+0x118/0x5e0
[   23.838492]  kasan_report+0xc8/0x118
[   23.839367]  __asan_report_store1_noabort+0x20/0x30
[   23.839958]  krealloc_less_oob_helper+0xae4/0xc50
[   23.840528]  krealloc_large_less_oob+0x20/0x38
[   23.841829]  kunit_try_run_case+0x14c/0x3d0
[   23.842104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.842383]  kthread+0x24c/0x2d0
[   23.842610]  ret_from_fork+0x10/0x20
[   23.843543] 
[   23.844102] The buggy address belongs to the physical page:
[   23.845015] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106604
[   23.846187] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.847284] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.848247] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.849697] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.850694] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.851679] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.852780] head: 0bfffe0000000002 ffffc1ffc3198101 ffffffffffffffff 0000000000000000
[   23.853816] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.854793] page dumped because: kasan: bad access detected
[   23.855616] 
[   23.856554] Memory state around the buggy address:
[   23.857099]  fff00000c6605f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.857978]  fff00000c6606000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.858923] >fff00000c6606080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   23.860192]                                                           ^
[   23.860930]  fff00000c6606100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.861776]  fff00000c6606180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.862535] ==================================================================

test log snippet boot parser 51

Home

[   23.490520] ==================================================================
[   23.491247] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   23.492348] Write of size 1 at addr fff00000c6364ada by task kunit_try_catch/147
[   23.493612] 
[   23.494099] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   23.495287] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.495938] Hardware name: linux,dummy-virt (DT)
[   23.496825] Call trace:
[   23.497599]  show_stack+0x20/0x38 (C)
[   23.498461]  dump_stack_lvl+0x8c/0xd0
[   23.499070]  print_report+0x118/0x5e0
[   23.500039]  kasan_report+0xc8/0x118
[   23.500561]  __asan_report_store1_noabort+0x20/0x30
[   23.501169]  krealloc_less_oob_helper+0xa80/0xc50
[   23.501733]  krealloc_less_oob+0x20/0x38
[   23.502761]  kunit_try_run_case+0x14c/0x3d0
[   23.503519]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.504407]  kthread+0x24c/0x2d0
[   23.505679]  ret_from_fork+0x10/0x20
[   23.506408] 
[   23.506881] Allocated by task 147:
[   23.507517]  kasan_save_stack+0x3c/0x68
[   23.508043]  kasan_save_track+0x20/0x40
[   23.508519]  kasan_save_alloc_info+0x40/0x58
[   23.509664]  __kasan_krealloc+0x118/0x178
[   23.510268]  krealloc_noprof+0x128/0x360
[   23.510885]  krealloc_less_oob_helper+0x168/0xc50
[   23.512420]  krealloc_less_oob+0x20/0x38
[   23.512980]  kunit_try_run_case+0x14c/0x3d0
[   23.513229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.513499]  kthread+0x24c/0x2d0
[   23.513697]  ret_from_fork+0x10/0x20
[   23.514439] 
[   23.515525] The buggy address belongs to the object at fff00000c6364a00
[   23.515525]  which belongs to the cache kmalloc-256 of size 256
[   23.516865] The buggy address is located 17 bytes to the right of
[   23.516865]  allocated 201-byte region [fff00000c6364a00, fff00000c6364ac9)
[   23.518410] 
[   23.518712] The buggy address belongs to the physical page:
[   23.519344] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106364
[   23.521167] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.522563] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.523732] page_type: f5(slab)
[   23.524366] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.525148] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.526324] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.527208] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.528247] head: 0bfffe0000000001 ffffc1ffc318d901 ffffffffffffffff 0000000000000000
[   23.530306] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   23.531352] page dumped because: kasan: bad access detected
[   23.531830] 
[   23.532125] Memory state around the buggy address:
[   23.533574]  fff00000c6364980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.534310]  fff00000c6364a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.536037] >fff00000c6364a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.537005]                                                     ^
[   23.537879]  fff00000c6364b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.538833]  fff00000c6364b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.539767] ==================================================================

test log snippet boot parser 52

Home

[   23.390653] ==================================================================
[   23.391570] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   23.393162] Write of size 1 at addr fff00000c6364ac9 by task kunit_try_catch/147
[   23.393733] 
[   23.394034] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   23.395693] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.396300] Hardware name: linux,dummy-virt (DT)
[   23.397274] Call trace:
[   23.397600]  show_stack+0x20/0x38 (C)
[   23.398249]  dump_stack_lvl+0x8c/0xd0
[   23.399074]  print_report+0x118/0x5e0
[   23.399728]  kasan_report+0xc8/0x118
[   23.400135]  __asan_report_store1_noabort+0x20/0x30
[   23.400590]  krealloc_less_oob_helper+0xa48/0xc50
[   23.401618]  krealloc_less_oob+0x20/0x38
[   23.402180]  kunit_try_run_case+0x14c/0x3d0
[   23.402794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.403349]  kthread+0x24c/0x2d0
[   23.404477]  ret_from_fork+0x10/0x20
[   23.405024] 
[   23.405340] Allocated by task 147:
[   23.405854]  kasan_save_stack+0x3c/0x68
[   23.406354]  kasan_save_track+0x20/0x40
[   23.407809]  kasan_save_alloc_info+0x40/0x58
[   23.408594]  __kasan_krealloc+0x118/0x178
[   23.409099]  krealloc_noprof+0x128/0x360
[   23.409620]  krealloc_less_oob_helper+0x168/0xc50
[   23.410214]  krealloc_less_oob+0x20/0x38
[   23.410779]  kunit_try_run_case+0x14c/0x3d0
[   23.411797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.412485]  kthread+0x24c/0x2d0
[   23.412954]  ret_from_fork+0x10/0x20
[   23.413488] 
[   23.414243] The buggy address belongs to the object at fff00000c6364a00
[   23.414243]  which belongs to the cache kmalloc-256 of size 256
[   23.415968] The buggy address is located 0 bytes to the right of
[   23.415968]  allocated 201-byte region [fff00000c6364a00, fff00000c6364ac9)
[   23.417145] 
[   23.417427] The buggy address belongs to the physical page:
[   23.419284] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106364
[   23.420480] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.421559] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.422420] page_type: f5(slab)
[   23.422922] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.424820] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.425531] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.426408] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.427546] head: 0bfffe0000000001 ffffc1ffc318d901 ffffffffffffffff 0000000000000000
[   23.428345] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   23.429028] page dumped because: kasan: bad access detected
[   23.429528] 
[   23.429776] Memory state around the buggy address:
[   23.430606]  fff00000c6364980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.432447]  fff00000c6364a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.433224] >fff00000c6364a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.434015]                                               ^
[   23.434608]  fff00000c6364b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.435290]  fff00000c6364b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.436294] ==================================================================

test log snippet boot parser 53

Home

[   23.723495] ==================================================================
[   23.724550] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   23.725338] Write of size 1 at addr fff00000c66060c9 by task kunit_try_catch/151
[   23.726714] 
[   23.727142] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   23.728232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.729609] Hardware name: linux,dummy-virt (DT)
[   23.730239] Call trace:
[   23.730790]  show_stack+0x20/0x38 (C)
[   23.731561]  dump_stack_lvl+0x8c/0xd0
[   23.732457]  print_report+0x118/0x5e0
[   23.733010]  kasan_report+0xc8/0x118
[   23.733500]  __asan_report_store1_noabort+0x20/0x30
[   23.734271]  krealloc_less_oob_helper+0xa48/0xc50
[   23.735011]  krealloc_large_less_oob+0x20/0x38
[   23.736594]  kunit_try_run_case+0x14c/0x3d0
[   23.737281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.738070]  kthread+0x24c/0x2d0
[   23.738667]  ret_from_fork+0x10/0x20
[   23.739839] 
[   23.740212] The buggy address belongs to the physical page:
[   23.741028] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106604
[   23.741995] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.743198] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.743888] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.744563] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.746647] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.747805] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.748562] head: 0bfffe0000000002 ffffc1ffc3198101 ffffffffffffffff 0000000000000000
[   23.749826] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.750693] page dumped because: kasan: bad access detected
[   23.751471] 
[   23.752708] Memory state around the buggy address:
[   23.753317]  fff00000c6605f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.754135]  fff00000c6606000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.755031] >fff00000c6606080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   23.755931]                                               ^
[   23.756545]  fff00000c6606100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.757854]  fff00000c6606180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.758674] ==================================================================

test log snippet boot parser 54

Home

[   23.542292] ==================================================================
[   23.543021] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   23.544105] Write of size 1 at addr fff00000c6364aea by task kunit_try_catch/147
[   23.545863] 
[   23.546332] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   23.547517] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.548408] Hardware name: linux,dummy-virt (DT)
[   23.549320] Call trace:
[   23.549855]  show_stack+0x20/0x38 (C)
[   23.550596]  dump_stack_lvl+0x8c/0xd0
[   23.551481]  print_report+0x118/0x5e0
[   23.551995]  kasan_report+0xc8/0x118
[   23.552474]  __asan_report_store1_noabort+0x20/0x30
[   23.553956]  krealloc_less_oob_helper+0xae4/0xc50
[   23.554240]  krealloc_less_oob+0x20/0x38
[   23.554472]  kunit_try_run_case+0x14c/0x3d0
[   23.554737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.556344]  kthread+0x24c/0x2d0
[   23.556837]  ret_from_fork+0x10/0x20
[   23.557626] 
[   23.558126] Allocated by task 147:
[   23.558688]  kasan_save_stack+0x3c/0x68
[   23.559373]  kasan_save_track+0x20/0x40
[   23.560222]  kasan_save_alloc_info+0x40/0x58
[   23.560852]  __kasan_krealloc+0x118/0x178
[   23.561859]  krealloc_noprof+0x128/0x360
[   23.562366]  krealloc_less_oob_helper+0x168/0xc50
[   23.563591]  krealloc_less_oob+0x20/0x38
[   23.564111]  kunit_try_run_case+0x14c/0x3d0
[   23.564882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.565558]  kthread+0x24c/0x2d0
[   23.565830]  ret_from_fork+0x10/0x20
[   23.566517] 
[   23.566847] The buggy address belongs to the object at fff00000c6364a00
[   23.566847]  which belongs to the cache kmalloc-256 of size 256
[   23.568378] The buggy address is located 33 bytes to the right of
[   23.568378]  allocated 201-byte region [fff00000c6364a00, fff00000c6364ac9)
[   23.569587] 
[   23.570513] The buggy address belongs to the physical page:
[   23.571278] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106364
[   23.572559] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.574453] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.575675] page_type: f5(slab)
[   23.576493] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.577500] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.578505] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.580281] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.581137] head: 0bfffe0000000001 ffffc1ffc318d901 ffffffffffffffff 0000000000000000
[   23.582027] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   23.582898] page dumped because: kasan: bad access detected
[   23.583854] 
[   23.584123] Memory state around the buggy address:
[   23.584861]  fff00000c6364980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.585724]  fff00000c6364a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.586595] >fff00000c6364a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.587891]                                                           ^
[   23.588437]  fff00000c6364b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.590201]  fff00000c6364b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.591085] ==================================================================

test log snippet boot parser 55

Home

[   23.760427] ==================================================================
[   23.761173] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   23.762189] Write of size 1 at addr fff00000c66060d0 by task kunit_try_catch/151
[   23.763045] 
[   23.763460] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   23.764352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.765619] Hardware name: linux,dummy-virt (DT)
[   23.766367] Call trace:
[   23.766841]  show_stack+0x20/0x38 (C)
[   23.767569]  dump_stack_lvl+0x8c/0xd0
[   23.768474]  print_report+0x118/0x5e0
[   23.768871]  kasan_report+0xc8/0x118
[   23.769279]  __asan_report_store1_noabort+0x20/0x30
[   23.770038]  krealloc_less_oob_helper+0xb9c/0xc50
[   23.770792]  krealloc_large_less_oob+0x20/0x38
[   23.771995]  kunit_try_run_case+0x14c/0x3d0
[   23.772540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.773124]  kthread+0x24c/0x2d0
[   23.773662]  ret_from_fork+0x10/0x20
[   23.774157] 
[   23.774495] The buggy address belongs to the physical page:
[   23.776226] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106604
[   23.776990] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.777904] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.778779] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.779993] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.780961] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.781809] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.782582] head: 0bfffe0000000002 ffffc1ffc3198101 ffffffffffffffff 0000000000000000
[   23.783650] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.784523] page dumped because: kasan: bad access detected
[   23.785052] 
[   23.785263] Memory state around the buggy address:
[   23.785719]  fff00000c6605f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.786836]  fff00000c6606000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.787571] >fff00000c6606080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   23.788219]                                                  ^
[   23.790203]  fff00000c6606100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.790932]  fff00000c6606180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.792034] ==================================================================

test log snippet boot parser 56

Home

[   23.685568] ==================================================================
[   23.686377] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[   23.687279] Write of size 1 at addr fff00000c66020f0 by task kunit_try_catch/149
[   23.688343] 
[   23.688837] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   23.689964] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.690581] Hardware name: linux,dummy-virt (DT)
[   23.691229] Call trace:
[   23.691714]  show_stack+0x20/0x38 (C)
[   23.692366]  dump_stack_lvl+0x8c/0xd0
[   23.693015]  print_report+0x118/0x5e0
[   23.693576]  kasan_report+0xc8/0x118
[   23.694328]  __asan_report_store1_noabort+0x20/0x30
[   23.695131]  krealloc_more_oob_helper+0x5c8/0x680
[   23.695891]  krealloc_large_more_oob+0x20/0x38
[   23.696536]  kunit_try_run_case+0x14c/0x3d0
[   23.697169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.697899]  kthread+0x24c/0x2d0
[   23.698407]  ret_from_fork+0x10/0x20
[   23.699057] 
[   23.699404] The buggy address belongs to the physical page:
[   23.700088] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106600
[   23.701066] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.701939] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.702823] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.703685] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.704541] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.705409] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.706348] head: 0bfffe0000000002 ffffc1ffc3198001 ffffffffffffffff 0000000000000000
[   23.707311] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.708086] page dumped because: kasan: bad access detected
[   23.708673] 
[   23.708958] Memory state around the buggy address:
[   23.709456]  fff00000c6601f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.710361]  fff00000c6602000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.711110] >fff00000c6602080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   23.711929]                                                              ^
[   23.712616]  fff00000c6602100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.713446]  fff00000c6602180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.714273] ==================================================================

test log snippet boot parser 57

Home

[   23.649316] ==================================================================
[   23.650361] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[   23.652588] Write of size 1 at addr fff00000c66020eb by task kunit_try_catch/149
[   23.653422] 
[   23.653778] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   23.654880] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.655765] Hardware name: linux,dummy-virt (DT)
[   23.656317] Call trace:
[   23.656666]  show_stack+0x20/0x38 (C)
[   23.657408]  dump_stack_lvl+0x8c/0xd0
[   23.658069]  print_report+0x118/0x5e0
[   23.658932]  kasan_report+0xc8/0x118
[   23.659439]  __asan_report_store1_noabort+0x20/0x30
[   23.660307]  krealloc_more_oob_helper+0x614/0x680
[   23.661088]  krealloc_large_more_oob+0x20/0x38
[   23.661689]  kunit_try_run_case+0x14c/0x3d0
[   23.662334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.663061]  kthread+0x24c/0x2d0
[   23.663697]  ret_from_fork+0x10/0x20
[   23.664225] 
[   23.664523] The buggy address belongs to the physical page:
[   23.665669] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106600
[   23.666339] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.667836] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.668674] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.669649] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.670559] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.671686] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.672775] head: 0bfffe0000000002 ffffc1ffc3198001 ffffffffffffffff 0000000000000000
[   23.673766] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.674719] page dumped because: kasan: bad access detected
[   23.675789] 
[   23.676243] Memory state around the buggy address:
[   23.677049]  fff00000c6601f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.677775]  fff00000c6602000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.678724] >fff00000c6602080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   23.679673]                                                           ^
[   23.680388]  fff00000c6602100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.681510]  fff00000c6602180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.682651] ==================================================================

test log snippet boot parser 58

Home

[   23.288500] ==================================================================
[   23.289455] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[   23.290162] Write of size 1 at addr fff00000c096ceeb by task kunit_try_catch/145
[   23.290924] 
[   23.291610] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   23.292645] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.293220] Hardware name: linux,dummy-virt (DT)
[   23.293721] Call trace:
[   23.294199]  show_stack+0x20/0x38 (C)
[   23.294792]  dump_stack_lvl+0x8c/0xd0
[   23.295331]  print_report+0x118/0x5e0
[   23.295918]  kasan_report+0xc8/0x118
[   23.296509]  __asan_report_store1_noabort+0x20/0x30
[   23.297270]  krealloc_more_oob_helper+0x614/0x680
[   23.298038]  krealloc_more_oob+0x20/0x38
[   23.298585]  kunit_try_run_case+0x14c/0x3d0
[   23.299529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.300376]  kthread+0x24c/0x2d0
[   23.301145]  ret_from_fork+0x10/0x20
[   23.301663] 
[   23.301981] Allocated by task 145:
[   23.302457]  kasan_save_stack+0x3c/0x68
[   23.303371]  kasan_save_track+0x20/0x40
[   23.304487]  kasan_save_alloc_info+0x40/0x58
[   23.305088]  __kasan_krealloc+0x118/0x178
[   23.305649]  krealloc_noprof+0x128/0x360
[   23.306215]  krealloc_more_oob_helper+0x168/0x680
[   23.306892]  krealloc_more_oob+0x20/0x38
[   23.307563]  kunit_try_run_case+0x14c/0x3d0
[   23.308265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.309000]  kthread+0x24c/0x2d0
[   23.309534]  ret_from_fork+0x10/0x20
[   23.310109] 
[   23.310486] The buggy address belongs to the object at fff00000c096ce00
[   23.310486]  which belongs to the cache kmalloc-256 of size 256
[   23.311918] The buggy address is located 0 bytes to the right of
[   23.311918]  allocated 235-byte region [fff00000c096ce00, fff00000c096ceeb)
[   23.313387] 
[   23.313980] The buggy address belongs to the physical page:
[   23.315304] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10096c
[   23.316408] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.317554] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.318445] page_type: f5(slab)
[   23.319234] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.320134] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.320985] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.321856] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.322786] head: 0bfffe0000000001 ffffc1ffc3025b01 ffffffffffffffff 0000000000000000
[   23.324017] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   23.324929] page dumped because: kasan: bad access detected
[   23.325627] 
[   23.325977] Memory state around the buggy address:
[   23.326556]  fff00000c096cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.327531]  fff00000c096ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.328660] >fff00000c096ce80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   23.329578]                                                           ^
[   23.330155]  fff00000c096cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.330478]  fff00000c096cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.330900] ==================================================================

test log snippet boot parser 59

Home

[   23.334731] ==================================================================
[   23.335660] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[   23.337187] Write of size 1 at addr fff00000c096cef0 by task kunit_try_catch/145
[   23.337833] 
[   23.338204] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   23.340404] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.340923] Hardware name: linux,dummy-virt (DT)
[   23.341472] Call trace:
[   23.342141]  show_stack+0x20/0x38 (C)
[   23.342760]  dump_stack_lvl+0x8c/0xd0
[   23.343602]  print_report+0x118/0x5e0
[   23.344293]  kasan_report+0xc8/0x118
[   23.344824]  __asan_report_store1_noabort+0x20/0x30
[   23.345415]  krealloc_more_oob_helper+0x5c8/0x680
[   23.346243]  krealloc_more_oob+0x20/0x38
[   23.346945]  kunit_try_run_case+0x14c/0x3d0
[   23.347733]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.348583]  kthread+0x24c/0x2d0
[   23.348989]  ret_from_fork+0x10/0x20
[   23.349385] 
[   23.349602] Allocated by task 145:
[   23.349971]  kasan_save_stack+0x3c/0x68
[   23.350380]  kasan_save_track+0x20/0x40
[   23.352024]  kasan_save_alloc_info+0x40/0x58
[   23.352658]  __kasan_krealloc+0x118/0x178
[   23.353686]  krealloc_noprof+0x128/0x360
[   23.354081]  krealloc_more_oob_helper+0x168/0x680
[   23.355322]  krealloc_more_oob+0x20/0x38
[   23.356027]  kunit_try_run_case+0x14c/0x3d0
[   23.356276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.356546]  kthread+0x24c/0x2d0
[   23.356790]  ret_from_fork+0x10/0x20
[   23.357656] 
[   23.358093] The buggy address belongs to the object at fff00000c096ce00
[   23.358093]  which belongs to the cache kmalloc-256 of size 256
[   23.359554] The buggy address is located 5 bytes to the right of
[   23.359554]  allocated 235-byte region [fff00000c096ce00, fff00000c096ceeb)
[   23.361166] 
[   23.361515] The buggy address belongs to the physical page:
[   23.362277] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10096c
[   23.363248] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.364195] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.365022] page_type: f5(slab)
[   23.365463] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.366824] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.367963] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.368868] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.369857] head: 0bfffe0000000001 ffffc1ffc3025b01 ffffffffffffffff 0000000000000000
[   23.370863] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   23.371693] page dumped because: kasan: bad access detected
[   23.372658] 
[   23.373755] Memory state around the buggy address:
[   23.374510]  fff00000c096cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.375926]  fff00000c096ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.376792] >fff00000c096ce80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   23.377518]                                                              ^
[   23.378586]  fff00000c096cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.379512]  fff00000c096cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.380534] ==================================================================

test log snippet boot parser 60

Home

[   24.835570] ==================================================================
[   24.836164] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750
[   24.837353] Read of size 1 at addr fff00000c5cd657f by task kunit_try_catch/183
[   24.838178] 
[   24.838593] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   24.839574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.840383] Hardware name: linux,dummy-virt (DT)
[   24.841549] Call trace:
[   24.841985]  show_stack+0x20/0x38 (C)
[   24.842611]  dump_stack_lvl+0x8c/0xd0
[   24.843236]  print_report+0x118/0x5e0
[   24.844361]  kasan_report+0xc8/0x118
[   24.844903]  __asan_report_load1_noabort+0x20/0x30
[   24.845556]  ksize_unpoisons_memory+0x6a0/0x750
[   24.846276]  kunit_try_run_case+0x14c/0x3d0
[   24.846977]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.847714]  kthread+0x24c/0x2d0
[   24.848968]  ret_from_fork+0x10/0x20
[   24.849519] 
[   24.849879] Allocated by task 183:
[   24.850380]  kasan_save_stack+0x3c/0x68
[   24.851435]  kasan_save_track+0x20/0x40
[   24.851937]  kasan_save_alloc_info+0x40/0x58
[   24.852469]  __kasan_kmalloc+0xd4/0xd8
[   24.852961]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.853495]  ksize_unpoisons_memory+0xc0/0x750
[   24.854873]  kunit_try_run_case+0x14c/0x3d0
[   24.856356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.857109]  kthread+0x24c/0x2d0
[   24.857632]  ret_from_fork+0x10/0x20
[   24.858173] 
[   24.858551] The buggy address belongs to the object at fff00000c5cd6500
[   24.858551]  which belongs to the cache kmalloc-128 of size 128
[   24.860096] The buggy address is located 12 bytes to the right of
[   24.860096]  allocated 115-byte region [fff00000c5cd6500, fff00000c5cd6573)
[   24.861320] 
[   24.861604] The buggy address belongs to the physical page:
[   24.862619] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cd6
[   24.863506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.864554] page_type: f5(slab)
[   24.864923] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.865356] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   24.865693] page dumped because: kasan: bad access detected
[   24.866993] 
[   24.867263] Memory state around the buggy address:
[   24.867816]  fff00000c5cd6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   24.868619]  fff00000c5cd6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.869876] >fff00000c5cd6500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.870642]                                                                 ^
[   24.872185]  fff00000c5cd6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.872840]  fff00000c5cd6600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.873555] ==================================================================

test log snippet boot parser 61

Home

[   24.749796] ==================================================================
[   24.750660] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750
[   24.751441] Read of size 1 at addr fff00000c5cd6573 by task kunit_try_catch/183
[   24.752971] 
[   24.753448] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   24.754241] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.755456] Hardware name: linux,dummy-virt (DT)
[   24.756157] Call trace:
[   24.756850]  show_stack+0x20/0x38 (C)
[   24.757531]  dump_stack_lvl+0x8c/0xd0
[   24.758247]  print_report+0x118/0x5e0
[   24.758802]  kasan_report+0xc8/0x118
[   24.759431]  __asan_report_load1_noabort+0x20/0x30
[   24.760447]  ksize_unpoisons_memory+0x638/0x750
[   24.761309]  kunit_try_run_case+0x14c/0x3d0
[   24.761993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.762805]  kthread+0x24c/0x2d0
[   24.763673]  ret_from_fork+0x10/0x20
[   24.764291] 
[   24.764625] Allocated by task 183:
[   24.765176]  kasan_save_stack+0x3c/0x68
[   24.765807]  kasan_save_track+0x20/0x40
[   24.766450]  kasan_save_alloc_info+0x40/0x58
[   24.767032]  __kasan_kmalloc+0xd4/0xd8
[   24.767866]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.768393]  ksize_unpoisons_memory+0xc0/0x750
[   24.768947]  kunit_try_run_case+0x14c/0x3d0
[   24.769455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.770951]  kthread+0x24c/0x2d0
[   24.771827]  ret_from_fork+0x10/0x20
[   24.772381] 
[   24.772732] The buggy address belongs to the object at fff00000c5cd6500
[   24.772732]  which belongs to the cache kmalloc-128 of size 128
[   24.774119] The buggy address is located 0 bytes to the right of
[   24.774119]  allocated 115-byte region [fff00000c5cd6500, fff00000c5cd6573)
[   24.775817] 
[   24.776050] The buggy address belongs to the physical page:
[   24.777153] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cd6
[   24.778319] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.779628] page_type: f5(slab)
[   24.780012] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.781019] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   24.781775] page dumped because: kasan: bad access detected
[   24.782370] 
[   24.782669] Memory state around the buggy address:
[   24.783225]  fff00000c5cd6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   24.785024]  fff00000c5cd6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.785950] >fff00000c5cd6500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.786611]                                                              ^
[   24.788067]  fff00000c5cd6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.788892]  fff00000c5cd6600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.789688] ==================================================================

test log snippet boot parser 62

Home

[   24.791133] ==================================================================
[   24.792135] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750
[   24.792827] Read of size 1 at addr fff00000c5cd6578 by task kunit_try_catch/183
[   24.793469] 
[   24.793705] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   24.796147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.796569] Hardware name: linux,dummy-virt (DT)
[   24.797032] Call trace:
[   24.797313]  show_stack+0x20/0x38 (C)
[   24.797738]  dump_stack_lvl+0x8c/0xd0
[   24.799576]  print_report+0x118/0x5e0
[   24.800592]  kasan_report+0xc8/0x118
[   24.801216]  __asan_report_load1_noabort+0x20/0x30
[   24.802007]  ksize_unpoisons_memory+0x628/0x750
[   24.802735]  kunit_try_run_case+0x14c/0x3d0
[   24.803530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.804224]  kthread+0x24c/0x2d0
[   24.804713]  ret_from_fork+0x10/0x20
[   24.805253] 
[   24.805539] Allocated by task 183:
[   24.806792]  kasan_save_stack+0x3c/0x68
[   24.807520]  kasan_save_track+0x20/0x40
[   24.808782]  kasan_save_alloc_info+0x40/0x58
[   24.809516]  __kasan_kmalloc+0xd4/0xd8
[   24.810195]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.810966]  ksize_unpoisons_memory+0xc0/0x750
[   24.811722]  kunit_try_run_case+0x14c/0x3d0
[   24.812292]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.812946]  kthread+0x24c/0x2d0
[   24.813404]  ret_from_fork+0x10/0x20
[   24.814302] 
[   24.814587] The buggy address belongs to the object at fff00000c5cd6500
[   24.814587]  which belongs to the cache kmalloc-128 of size 128
[   24.816866] The buggy address is located 5 bytes to the right of
[   24.816866]  allocated 115-byte region [fff00000c5cd6500, fff00000c5cd6573)
[   24.817636] 
[   24.818330] The buggy address belongs to the physical page:
[   24.819305] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cd6
[   24.820566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.821374] page_type: f5(slab)
[   24.821814] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.822560] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   24.823985] page dumped because: kasan: bad access detected
[   24.824876] 
[   24.825887] Memory state around the buggy address:
[   24.826516]  fff00000c5cd6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   24.827694]  fff00000c5cd6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.828755] >fff00000c5cd6500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.829680]                                                                 ^
[   24.830641]  fff00000c5cd6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.831605]  fff00000c5cd6600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.833672] ==================================================================

test log snippet boot parser 63

Home

[   26.938896] ==================================================================
[   26.939926] BUG: KASAN: slab-out-of-bounds in memchr+0x78/0x88
[   26.940525] Read of size 1 at addr fff00000c5d0e118 by task kunit_try_catch/244
[   26.941330] 
[   26.941645] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   26.942541] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.943368] Hardware name: linux,dummy-virt (DT)
[   26.944315] Call trace:
[   26.945178]  show_stack+0x20/0x38 (C)
[   26.945882]  dump_stack_lvl+0x8c/0xd0
[   26.946390]  print_report+0x118/0x5e0
[   26.946921]  kasan_report+0xc8/0x118
[   26.947419]  __asan_report_load1_noabort+0x20/0x30
[   26.948644]  memchr+0x78/0x88
[   26.949268]  kasan_memchr+0x148/0x2d8
[   26.949971]  kunit_try_run_case+0x14c/0x3d0
[   26.950696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.951700]  kthread+0x24c/0x2d0
[   26.952365]  ret_from_fork+0x10/0x20
[   26.953083] 
[   26.953384] Allocated by task 244:
[   26.954097]  kasan_save_stack+0x3c/0x68
[   26.954773]  kasan_save_track+0x20/0x40
[   26.955500]  kasan_save_alloc_info+0x40/0x58
[   26.956314]  __kasan_kmalloc+0xd4/0xd8
[   26.956866]  __kmalloc_cache_noprof+0x15c/0x3c0
[   26.957660]  kasan_memchr+0xb0/0x2d8
[   26.958332]  kunit_try_run_case+0x14c/0x3d0
[   26.959248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.959878]  kthread+0x24c/0x2d0
[   26.960795]  ret_from_fork+0x10/0x20
[   26.961475] 
[   26.961960] The buggy address belongs to the object at fff00000c5d0e100
[   26.961960]  which belongs to the cache kmalloc-32 of size 32
[   26.963555] The buggy address is located 0 bytes to the right of
[   26.963555]  allocated 24-byte region [fff00000c5d0e100, fff00000c5d0e118)
[   26.964771] 
[   26.965068] The buggy address belongs to the physical page:
[   26.965681] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d0e
[   26.966663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.967878] page_type: f5(slab)
[   26.968391] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   26.969327] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   26.970203] page dumped because: kasan: bad access detected
[   26.970962] 
[   26.971345] Memory state around the buggy address:
[   26.972001]  fff00000c5d0e000: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   26.972801]  fff00000c5d0e080: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   26.973737] >fff00000c5d0e100: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.974652]                             ^
[   26.975395]  fff00000c5d0e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.976052]  fff00000c5d0e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.976693] ==================================================================

test log snippet boot parser 64

Home

[   26.985881] ==================================================================
[   26.986881] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   26.988445] Read of size 1 at addr fff00000c5d0e1d8 by task kunit_try_catch/246
[   26.989454] 
[   26.989843] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   26.990883] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.992112] Hardware name: linux,dummy-virt (DT)
[   26.992773] Call trace:
[   26.993222]  show_stack+0x20/0x38 (C)
[   26.993884]  dump_stack_lvl+0x8c/0xd0
[   26.994429]  print_report+0x118/0x5e0
[   26.995734]  kasan_report+0xc8/0x118
[   26.996311]  __asan_report_load1_noabort+0x20/0x30
[   26.996981]  memcmp+0x198/0x1d8
[   26.997505]  kasan_memcmp+0x16c/0x300
[   26.998079]  kunit_try_run_case+0x14c/0x3d0
[   26.998711]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.999834]  kthread+0x24c/0x2d0
[   27.000324]  ret_from_fork+0x10/0x20
[   27.001001] 
[   27.001339] Allocated by task 246:
[   27.001889]  kasan_save_stack+0x3c/0x68
[   27.002458]  kasan_save_track+0x20/0x40
[   27.003985]  kasan_save_alloc_info+0x40/0x58
[   27.004551]  __kasan_kmalloc+0xd4/0xd8
[   27.004820]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.005085]  kasan_memcmp+0xbc/0x300
[   27.005299]  kunit_try_run_case+0x14c/0x3d0
[   27.005535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.005916]  kthread+0x24c/0x2d0
[   27.006318]  ret_from_fork+0x10/0x20
[   27.006726] 
[   27.008229] The buggy address belongs to the object at fff00000c5d0e1c0
[   27.008229]  which belongs to the cache kmalloc-32 of size 32
[   27.009344] The buggy address is located 0 bytes to the right of
[   27.009344]  allocated 24-byte region [fff00000c5d0e1c0, fff00000c5d0e1d8)
[   27.010717] 
[   27.011156] The buggy address belongs to the physical page:
[   27.012373] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d0e
[   27.013261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.014109] page_type: f5(slab)
[   27.014668] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   27.015763] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   27.016737] page dumped because: kasan: bad access detected
[   27.017533] 
[   27.017865] Memory state around the buggy address:
[   27.018500]  fff00000c5d0e080: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   27.019645]  fff00000c5d0e100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   27.020765] >fff00000c5d0e180: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   27.021512]                                                     ^
[   27.021901]  fff00000c5d0e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.022887]  fff00000c5d0e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.024041] ==================================================================

test log snippet boot parser 65

Home

[   26.270466] ==================================================================
[   26.271633] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   26.273073] Read of size 1 at addr fff00000c5c7b2bb by task kunit_try_catch/214
[   26.274530] 
[   26.275379] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   26.276403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.277131] Hardware name: linux,dummy-virt (DT)
[   26.277712] Call trace:
[   26.278075]  show_stack+0x20/0x38 (C)
[   26.278650]  dump_stack_lvl+0x8c/0xd0
[   26.279586]  print_report+0x118/0x5e0
[   26.280368]  kasan_report+0xc8/0x118
[   26.280849]  __asan_report_load1_noabort+0x20/0x30
[   26.281412]  mempool_oob_right_helper+0x2ac/0x2f0
[   26.282179]  mempool_slab_oob_right+0xb8/0x110
[   26.282998]  kunit_try_run_case+0x14c/0x3d0
[   26.283877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.284639]  kthread+0x24c/0x2d0
[   26.285256]  ret_from_fork+0x10/0x20
[   26.285938] 
[   26.286161] Allocated by task 214:
[   26.286918]  kasan_save_stack+0x3c/0x68
[   26.287543]  kasan_save_track+0x20/0x40
[   26.288882]  kasan_save_alloc_info+0x40/0x58
[   26.289566]  __kasan_mempool_unpoison_object+0xbc/0x180
[   26.290340]  remove_element+0x16c/0x1f8
[   26.290986]  mempool_alloc_preallocated+0x58/0xc0
[   26.291811]  mempool_oob_right_helper+0x98/0x2f0
[   26.292679]  mempool_slab_oob_right+0xb8/0x110
[   26.293388]  kunit_try_run_case+0x14c/0x3d0
[   26.294060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.294817]  kthread+0x24c/0x2d0
[   26.295523]  ret_from_fork+0x10/0x20
[   26.296041] 
[   26.296457] The buggy address belongs to the object at fff00000c5c7b240
[   26.296457]  which belongs to the cache test_cache of size 123
[   26.297878] The buggy address is located 0 bytes to the right of
[   26.297878]  allocated 123-byte region [fff00000c5c7b240, fff00000c5c7b2bb)
[   26.299619] 
[   26.299983] The buggy address belongs to the physical page:
[   26.300616] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c7b
[   26.301462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.302471] page_type: f5(slab)
[   26.302941] raw: 0bfffe0000000000 fff00000c565aa00 dead000000000122 0000000000000000
[   26.303965] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   26.304727] page dumped because: kasan: bad access detected
[   26.305424] 
[   26.305759] Memory state around the buggy address:
[   26.306332]  fff00000c5c7b180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.307877]  fff00000c5c7b200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   26.308737] >fff00000c5c7b280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   26.309690]                                         ^
[   26.310300]  fff00000c5c7b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.311210]  fff00000c5c7b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.311988] ==================================================================

test log snippet boot parser 66

Home

[   26.228227] ==================================================================
[   26.229554] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   26.230422] Read of size 1 at addr fff00000c66de001 by task kunit_try_catch/212
[   26.232712] 
[   26.233112] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   26.233612] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.234036] Hardware name: linux,dummy-virt (DT)
[   26.234527] Call trace:
[   26.235053]  show_stack+0x20/0x38 (C)
[   26.235648]  dump_stack_lvl+0x8c/0xd0
[   26.236514]  print_report+0x118/0x5e0
[   26.237516]  kasan_report+0xc8/0x118
[   26.238157]  __asan_report_load1_noabort+0x20/0x30
[   26.238768]  mempool_oob_right_helper+0x2ac/0x2f0
[   26.239712]  mempool_kmalloc_large_oob_right+0xbc/0x118
[   26.240246]  kunit_try_run_case+0x14c/0x3d0
[   26.240935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.242474]  kthread+0x24c/0x2d0
[   26.243487]  ret_from_fork+0x10/0x20
[   26.244501] 
[   26.244817] The buggy address belongs to the physical page:
[   26.245428] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066dc
[   26.246184] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.247258] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.248018] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.248691] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.249956] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.250860] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.251644] head: 0bfffe0000000002 ffffc1ffc319b701 ffffffffffffffff 0000000000000000
[   26.252763] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   26.253620] page dumped because: kasan: bad access detected
[   26.254264] 
[   26.254623] Memory state around the buggy address:
[   26.255533]  fff00000c66ddf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.256183]  fff00000c66ddf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.256852] >fff00000c66de000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.257485]                    ^
[   26.258333]  fff00000c66de080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.260044]  fff00000c66de100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.260764] ==================================================================

test log snippet boot parser 67

Home

[   26.179022] ==================================================================
[   26.180544] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   26.181394] Read of size 1 at addr fff00000c5d0c473 by task kunit_try_catch/210
[   26.182178] 
[   26.182511] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   26.183615] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.184186] Hardware name: linux,dummy-virt (DT)
[   26.184863] Call trace:
[   26.185266]  show_stack+0x20/0x38 (C)
[   26.185806]  dump_stack_lvl+0x8c/0xd0
[   26.186404]  print_report+0x118/0x5e0
[   26.187253]  kasan_report+0xc8/0x118
[   26.187996]  __asan_report_load1_noabort+0x20/0x30
[   26.188572]  mempool_oob_right_helper+0x2ac/0x2f0
[   26.189242]  mempool_kmalloc_oob_right+0xbc/0x118
[   26.189821]  kunit_try_run_case+0x14c/0x3d0
[   26.190438]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.191472]  kthread+0x24c/0x2d0
[   26.192031]  ret_from_fork+0x10/0x20
[   26.192607] 
[   26.192963] Allocated by task 210:
[   26.193419]  kasan_save_stack+0x3c/0x68
[   26.194017]  kasan_save_track+0x20/0x40
[   26.194500]  kasan_save_alloc_info+0x40/0x58
[   26.195246]  __kasan_mempool_unpoison_object+0x11c/0x180
[   26.196263]  remove_element+0x130/0x1f8
[   26.196841]  mempool_alloc_preallocated+0x58/0xc0
[   26.197642]  mempool_oob_right_helper+0x98/0x2f0
[   26.198245]  mempool_kmalloc_oob_right+0xbc/0x118
[   26.198710]  kunit_try_run_case+0x14c/0x3d0
[   26.199320]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.200275]  kthread+0x24c/0x2d0
[   26.200824]  ret_from_fork+0x10/0x20
[   26.201275] 
[   26.201639] The buggy address belongs to the object at fff00000c5d0c400
[   26.201639]  which belongs to the cache kmalloc-128 of size 128
[   26.203414] The buggy address is located 0 bytes to the right of
[   26.203414]  allocated 115-byte region [fff00000c5d0c400, fff00000c5d0c473)
[   26.204727] 
[   26.205046] The buggy address belongs to the physical page:
[   26.205707] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d0c
[   26.206694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.207832] page_type: f5(slab)
[   26.208287] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.209223] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   26.209992] page dumped because: kasan: bad access detected
[   26.210622] 
[   26.211395] Memory state around the buggy address:
[   26.211974]  fff00000c5d0c300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.212719]  fff00000c5d0c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.213451] >fff00000c5d0c400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.214304]                                                              ^
[   26.215633]  fff00000c5d0c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.216514]  fff00000c5d0c500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.217379] ==================================================================

test log snippet boot parser 68

Home

[   31.041330] ==================================================================
[   31.042426] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   31.043657] Write of size 121 at addr fff00000c5d54b00 by task kunit_try_catch/274
[   31.044950] 
[   31.045458] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   31.046601] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.047319] Hardware name: linux,dummy-virt (DT)
[   31.048095] Call trace:
[   31.048639]  show_stack+0x20/0x38 (C)
[   31.049237]  dump_stack_lvl+0x8c/0xd0
[   31.050138]  print_report+0x118/0x5e0
[   31.050584]  kasan_report+0xc8/0x118
[   31.051265]  kasan_check_range+0x100/0x1a8
[   31.051992]  __kasan_check_write+0x20/0x30
[   31.052642]  strncpy_from_user+0x3c/0x2a0
[   31.053371]  copy_user_test_oob+0x5c0/0xec0
[   31.053963]  kunit_try_run_case+0x14c/0x3d0
[   31.054517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.055512]  kthread+0x24c/0x2d0
[   31.056102]  ret_from_fork+0x10/0x20
[   31.056819] 
[   31.057311] Allocated by task 274:
[   31.057773]  kasan_save_stack+0x3c/0x68
[   31.058536]  kasan_save_track+0x20/0x40
[   31.059205]  kasan_save_alloc_info+0x40/0x58
[   31.059782]  __kasan_kmalloc+0xd4/0xd8
[   31.060294]  __kmalloc_noprof+0x188/0x4c8
[   31.060835]  kunit_kmalloc_array+0x34/0x88
[   31.061375]  copy_user_test_oob+0xac/0xec0
[   31.062306]  kunit_try_run_case+0x14c/0x3d0
[   31.062979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.063665]  kthread+0x24c/0x2d0
[   31.064344]  ret_from_fork+0x10/0x20
[   31.064984] 
[   31.065430] The buggy address belongs to the object at fff00000c5d54b00
[   31.065430]  which belongs to the cache kmalloc-128 of size 128
[   31.066785] The buggy address is located 0 bytes inside of
[   31.066785]  allocated 120-byte region [fff00000c5d54b00, fff00000c5d54b78)
[   31.068369] 
[   31.068681] The buggy address belongs to the physical page:
[   31.069600] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d54
[   31.070607] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.071495] page_type: f5(slab)
[   31.072146] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.073063] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.074033] page dumped because: kasan: bad access detected
[   31.074815] 
[   31.075305] Memory state around the buggy address:
[   31.075886]  fff00000c5d54a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.076624]  fff00000c5d54a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.077735] >fff00000c5d54b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.078639]                                                                 ^
[   31.079560]  fff00000c5d54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.080499]  fff00000c5d54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.081411] ==================================================================

test log snippet boot parser 69

Home

[   31.083895] ==================================================================
[   31.084646] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   31.085453] Write of size 1 at addr fff00000c5d54b78 by task kunit_try_catch/274
[   31.086379] 
[   31.086787] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   31.087788] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.088492] Hardware name: linux,dummy-virt (DT)
[   31.089153] Call trace:
[   31.089674]  show_stack+0x20/0x38 (C)
[   31.090426]  dump_stack_lvl+0x8c/0xd0
[   31.090966]  print_report+0x118/0x5e0
[   31.091491]  kasan_report+0xc8/0x118
[   31.092133]  __asan_report_store1_noabort+0x20/0x30
[   31.092811]  strncpy_from_user+0x270/0x2a0
[   31.093472]  copy_user_test_oob+0x5c0/0xec0
[   31.094146]  kunit_try_run_case+0x14c/0x3d0
[   31.094818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.095566]  kthread+0x24c/0x2d0
[   31.096157]  ret_from_fork+0x10/0x20
[   31.096713] 
[   31.097075] Allocated by task 274:
[   31.097536]  kasan_save_stack+0x3c/0x68
[   31.098024]  kasan_save_track+0x20/0x40
[   31.098592]  kasan_save_alloc_info+0x40/0x58
[   31.099138]  __kasan_kmalloc+0xd4/0xd8
[   31.099702]  __kmalloc_noprof+0x188/0x4c8
[   31.100289]  kunit_kmalloc_array+0x34/0x88
[   31.100866]  copy_user_test_oob+0xac/0xec0
[   31.101358]  kunit_try_run_case+0x14c/0x3d0
[   31.101949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.102617]  kthread+0x24c/0x2d0
[   31.103134]  ret_from_fork+0x10/0x20
[   31.103607] 
[   31.103961] The buggy address belongs to the object at fff00000c5d54b00
[   31.103961]  which belongs to the cache kmalloc-128 of size 128
[   31.105126] The buggy address is located 0 bytes to the right of
[   31.105126]  allocated 120-byte region [fff00000c5d54b00, fff00000c5d54b78)
[   31.106415] 
[   31.106776] The buggy address belongs to the physical page:
[   31.107396] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d54
[   31.108298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.109100] page_type: f5(slab)
[   31.109588] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.110401] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.111202] page dumped because: kasan: bad access detected
[   31.111908] 
[   31.112249] Memory state around the buggy address:
[   31.112867]  fff00000c5d54a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.113736]  fff00000c5d54a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.114480] >fff00000c5d54b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.115363]                                                                 ^
[   31.116320]  fff00000c5d54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.117183]  fff00000c5d54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.117949] ==================================================================

test log snippet boot parser 70

Home

[   27.174205] ==================================================================
[   27.174928] BUG: KASAN: slab-use-after-free in kasan_strings+0x858/0x8f8
[   27.176602] Read of size 1 at addr fff00000c5d0e250 by task kunit_try_catch/248
[   27.177603] 
[   27.177946] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.179288] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.180029] Hardware name: linux,dummy-virt (DT)
[   27.180606] Call trace:
[   27.181047]  show_stack+0x20/0x38 (C)
[   27.181597]  dump_stack_lvl+0x8c/0xd0
[   27.182238]  print_report+0x118/0x5e0
[   27.182833]  kasan_report+0xc8/0x118
[   27.183533]  __asan_report_load1_noabort+0x20/0x30
[   27.184271]  kasan_strings+0x858/0x8f8
[   27.184893]  kunit_try_run_case+0x14c/0x3d0
[   27.185340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.186006]  kthread+0x24c/0x2d0
[   27.186474]  ret_from_fork+0x10/0x20
[   27.187029] 
[   27.187301] Allocated by task 248:
[   27.187879]  kasan_save_stack+0x3c/0x68
[   27.188558]  kasan_save_track+0x20/0x40
[   27.189114]  kasan_save_alloc_info+0x40/0x58
[   27.189722]  __kasan_kmalloc+0xd4/0xd8
[   27.190393]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.191091]  kasan_strings+0xb4/0x8f8
[   27.191566]  kunit_try_run_case+0x14c/0x3d0
[   27.192282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.193020]  kthread+0x24c/0x2d0
[   27.193539]  ret_from_fork+0x10/0x20
[   27.194059] 
[   27.194433] Freed by task 248:
[   27.194954]  kasan_save_stack+0x3c/0x68
[   27.195478]  kasan_save_track+0x20/0x40
[   27.196112]  kasan_save_free_info+0x4c/0x78
[   27.196734]  __kasan_slab_free+0x6c/0x98
[   27.197345]  kfree+0x114/0x3c8
[   27.197913]  kasan_strings+0x128/0x8f8
[   27.198474]  kunit_try_run_case+0x14c/0x3d0
[   27.199006]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.199828]  kthread+0x24c/0x2d0
[   27.200405]  ret_from_fork+0x10/0x20
[   27.200977] 
[   27.201324] The buggy address belongs to the object at fff00000c5d0e240
[   27.201324]  which belongs to the cache kmalloc-32 of size 32
[   27.202756] The buggy address is located 16 bytes inside of
[   27.202756]  freed 32-byte region [fff00000c5d0e240, fff00000c5d0e260)
[   27.204050] 
[   27.204409] The buggy address belongs to the physical page:
[   27.205089] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d0e
[   27.206014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.206815] page_type: f5(slab)
[   27.207348] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   27.208269] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   27.209104] page dumped because: kasan: bad access detected
[   27.209777] 
[   27.210107] Memory state around the buggy address:
[   27.210765]  fff00000c5d0e100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   27.211645]  fff00000c5d0e180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   27.212564] >fff00000c5d0e200: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   27.213394]                                                  ^
[   27.214053]  fff00000c5d0e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.215236]  fff00000c5d0e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.215935] ==================================================================

test log snippet boot parser 71

Home

[   24.643144] ==================================================================
[   24.644515] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   24.645474] Read of size 1 at addr fff00000c63157c0 by task kunit_try_catch/181
[   24.646382] 
[   24.646771] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   24.648137] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.648566] Hardware name: linux,dummy-virt (DT)
[   24.649050] Call trace:
[   24.649343]  show_stack+0x20/0x38 (C)
[   24.649815]  dump_stack_lvl+0x8c/0xd0
[   24.650868]  print_report+0x118/0x5e0
[   24.651583]  kasan_report+0xc8/0x118
[   24.652449]  __kasan_check_byte+0x54/0x70
[   24.653163]  kfree_sensitive+0x30/0xb0
[   24.653675]  kmalloc_double_kzfree+0x168/0x308
[   24.654235]  kunit_try_run_case+0x14c/0x3d0
[   24.654828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.656121]  kthread+0x24c/0x2d0
[   24.656763]  ret_from_fork+0x10/0x20
[   24.657256] 
[   24.657541] Allocated by task 181:
[   24.658014]  kasan_save_stack+0x3c/0x68
[   24.658502]  kasan_save_track+0x20/0x40
[   24.659068]  kasan_save_alloc_info+0x40/0x58
[   24.659592]  __kasan_kmalloc+0xd4/0xd8
[   24.660344]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.661280]  kmalloc_double_kzfree+0xb8/0x308
[   24.661982]  kunit_try_run_case+0x14c/0x3d0
[   24.662651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.663659]  kthread+0x24c/0x2d0
[   24.664444]  ret_from_fork+0x10/0x20
[   24.665247] 
[   24.665555] Freed by task 181:
[   24.666004]  kasan_save_stack+0x3c/0x68
[   24.666494]  kasan_save_track+0x20/0x40
[   24.667331]  kasan_save_free_info+0x4c/0x78
[   24.668120]  __kasan_slab_free+0x6c/0x98
[   24.668866]  kfree+0x114/0x3c8
[   24.669442]  kfree_sensitive+0x80/0xb0
[   24.670119]  kmalloc_double_kzfree+0x11c/0x308
[   24.670819]  kunit_try_run_case+0x14c/0x3d0
[   24.671469]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.672269]  kthread+0x24c/0x2d0
[   24.672910]  ret_from_fork+0x10/0x20
[   24.673503] 
[   24.673944] The buggy address belongs to the object at fff00000c63157c0
[   24.673944]  which belongs to the cache kmalloc-16 of size 16
[   24.675421] The buggy address is located 0 bytes inside of
[   24.675421]  freed 16-byte region [fff00000c63157c0, fff00000c63157d0)
[   24.676958] 
[   24.677346] The buggy address belongs to the physical page:
[   24.678155] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106315
[   24.679294] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.680007] page_type: f5(slab)
[   24.680432] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.681268] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.682275] page dumped because: kasan: bad access detected
[   24.683000] 
[   24.683682] Memory state around the buggy address:
[   24.684248]  fff00000c6315680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.685016]  fff00000c6315700: fa fb fc fc fa fb fc fc 00 05 fc fc 00 05 fc fc
[   24.685713] >fff00000c6315780: 00 00 fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   24.686401]                                            ^
[   24.687091]  fff00000c6315800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.688061]  fff00000c6315880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.689004] ==================================================================

test log snippet boot parser 72

Home

[   24.075771] ==================================================================
[   24.076980] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   24.077809] Read of size 16 at addr fff00000c5b73320 by task kunit_try_catch/157
[   24.078658] 
[   24.079146] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   24.080216] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.080897] Hardware name: linux,dummy-virt (DT)
[   24.081605] Call trace:
[   24.081941]  show_stack+0x20/0x38 (C)
[   24.082599]  dump_stack_lvl+0x8c/0xd0
[   24.083466]  print_report+0x118/0x5e0
[   24.083932]  kasan_report+0xc8/0x118
[   24.085207]  __asan_report_load16_noabort+0x20/0x30
[   24.086085]  kmalloc_uaf_16+0x3bc/0x438
[   24.086651]  kunit_try_run_case+0x14c/0x3d0
[   24.087647]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.088398]  kthread+0x24c/0x2d0
[   24.088927]  ret_from_fork+0x10/0x20
[   24.089502] 
[   24.089841] Allocated by task 157:
[   24.090314]  kasan_save_stack+0x3c/0x68
[   24.091797]  kasan_save_track+0x20/0x40
[   24.092198]  kasan_save_alloc_info+0x40/0x58
[   24.092923]  __kasan_kmalloc+0xd4/0xd8
[   24.093476]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.094114]  kmalloc_uaf_16+0x140/0x438
[   24.094679]  kunit_try_run_case+0x14c/0x3d0
[   24.096053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.096798]  kthread+0x24c/0x2d0
[   24.097273]  ret_from_fork+0x10/0x20
[   24.097887] 
[   24.098234] Freed by task 157:
[   24.098654]  kasan_save_stack+0x3c/0x68
[   24.100060]  kasan_save_track+0x20/0x40
[   24.100637]  kasan_save_free_info+0x4c/0x78
[   24.101268]  __kasan_slab_free+0x6c/0x98
[   24.101908]  kfree+0x114/0x3c8
[   24.102397]  kmalloc_uaf_16+0x190/0x438
[   24.103377]  kunit_try_run_case+0x14c/0x3d0
[   24.103952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.104687]  kthread+0x24c/0x2d0
[   24.105253]  ret_from_fork+0x10/0x20
[   24.105874] 
[   24.106208] The buggy address belongs to the object at fff00000c5b73320
[   24.106208]  which belongs to the cache kmalloc-16 of size 16
[   24.108219] The buggy address is located 0 bytes inside of
[   24.108219]  freed 16-byte region [fff00000c5b73320, fff00000c5b73330)
[   24.109556] 
[   24.109946] The buggy address belongs to the physical page:
[   24.110610] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[   24.111729] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.112831] page_type: f5(slab)
[   24.113334] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.114196] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.115217] page dumped because: kasan: bad access detected
[   24.116168] 
[   24.116415] Memory state around the buggy address:
[   24.117071]  fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.118041]  fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.118840] >fff00000c5b73300: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   24.119980]                                ^
[   24.120661]  fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.121641]  fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.122510] ==================================================================

test log snippet boot parser 73

Home

[   24.473275] ==================================================================
[   24.474279] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   24.475582] Read of size 1 at addr fff00000c5b73348 by task kunit_try_catch/173
[   24.476261] 
[   24.476629] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   24.477775] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.478296] Hardware name: linux,dummy-virt (DT)
[   24.478838] Call trace:
[   24.479291]  show_stack+0x20/0x38 (C)
[   24.480090]  dump_stack_lvl+0x8c/0xd0
[   24.480736]  print_report+0x118/0x5e0
[   24.481365]  kasan_report+0xc8/0x118
[   24.481938]  __asan_report_load1_noabort+0x20/0x30
[   24.482570]  kmalloc_uaf+0x300/0x338
[   24.483354]  kunit_try_run_case+0x14c/0x3d0
[   24.483956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.484677]  kthread+0x24c/0x2d0
[   24.485362]  ret_from_fork+0x10/0x20
[   24.485944] 
[   24.486247] Allocated by task 173:
[   24.486723]  kasan_save_stack+0x3c/0x68
[   24.487803]  kasan_save_track+0x20/0x40
[   24.488304]  kasan_save_alloc_info+0x40/0x58
[   24.488785]  __kasan_kmalloc+0xd4/0xd8
[   24.489256]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.489835]  kmalloc_uaf+0xb8/0x338
[   24.490321]  kunit_try_run_case+0x14c/0x3d0
[   24.490997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.492123]  kthread+0x24c/0x2d0
[   24.492572]  ret_from_fork+0x10/0x20
[   24.493075] 
[   24.493377] Freed by task 173:
[   24.493868]  kasan_save_stack+0x3c/0x68
[   24.494464]  kasan_save_track+0x20/0x40
[   24.495309]  kasan_save_free_info+0x4c/0x78
[   24.495887]  __kasan_slab_free+0x6c/0x98
[   24.496305]  kfree+0x114/0x3c8
[   24.496652]  kmalloc_uaf+0x11c/0x338
[   24.497679]  kunit_try_run_case+0x14c/0x3d0
[   24.498610]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.499439]  kthread+0x24c/0x2d0
[   24.500127]  ret_from_fork+0x10/0x20
[   24.500678] 
[   24.501034] The buggy address belongs to the object at fff00000c5b73340
[   24.501034]  which belongs to the cache kmalloc-16 of size 16
[   24.502276] The buggy address is located 8 bytes inside of
[   24.502276]  freed 16-byte region [fff00000c5b73340, fff00000c5b73350)
[   24.503598] 
[   24.503862] The buggy address belongs to the physical page:
[   24.505067] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[   24.505879] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.506695] page_type: f5(slab)
[   24.507351] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.508293] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.508630] page dumped because: kasan: bad access detected
[   24.508914] 
[   24.509044] Memory state around the buggy address:
[   24.509283]  fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.509597]  fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.510287] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   24.510954]                                               ^
[   24.511683]  fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.513083]  fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.514078] ==================================================================

test log snippet boot parser 74

Home

[   24.581253] ==================================================================
[   24.582224] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   24.583185] Read of size 1 at addr fff00000c5ca6e28 by task kunit_try_catch/177
[   24.584325] 
[   24.584649] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   24.585622] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.587546] Hardware name: linux,dummy-virt (DT)
[   24.588069] Call trace:
[   24.588594]  show_stack+0x20/0x38 (C)
[   24.589301]  dump_stack_lvl+0x8c/0xd0
[   24.589998]  print_report+0x118/0x5e0
[   24.590664]  kasan_report+0xc8/0x118
[   24.591646]  __asan_report_load1_noabort+0x20/0x30
[   24.592184]  kmalloc_uaf2+0x3f4/0x468
[   24.592850]  kunit_try_run_case+0x14c/0x3d0
[   24.593437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.594320]  kthread+0x24c/0x2d0
[   24.594986]  ret_from_fork+0x10/0x20
[   24.595698] 
[   24.596280] Allocated by task 177:
[   24.596724]  kasan_save_stack+0x3c/0x68
[   24.597527]  kasan_save_track+0x20/0x40
[   24.598077]  kasan_save_alloc_info+0x40/0x58
[   24.598861]  __kasan_kmalloc+0xd4/0xd8
[   24.599559]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.600849]  kmalloc_uaf2+0xc4/0x468
[   24.601490]  kunit_try_run_case+0x14c/0x3d0
[   24.602214]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.602889]  kthread+0x24c/0x2d0
[   24.603781]  ret_from_fork+0x10/0x20
[   24.604455] 
[   24.604930] Freed by task 177:
[   24.605448]  kasan_save_stack+0x3c/0x68
[   24.606013]  kasan_save_track+0x20/0x40
[   24.606755]  kasan_save_free_info+0x4c/0x78
[   24.607478]  __kasan_slab_free+0x6c/0x98
[   24.608288]  kfree+0x114/0x3c8
[   24.608919]  kmalloc_uaf2+0x134/0x468
[   24.609572]  kunit_try_run_case+0x14c/0x3d0
[   24.610150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.611003]  kthread+0x24c/0x2d0
[   24.611758]  ret_from_fork+0x10/0x20
[   24.612429] 
[   24.612959] The buggy address belongs to the object at fff00000c5ca6e00
[   24.612959]  which belongs to the cache kmalloc-64 of size 64
[   24.614391] The buggy address is located 40 bytes inside of
[   24.614391]  freed 64-byte region [fff00000c5ca6e00, fff00000c5ca6e40)
[   24.615901] 
[   24.616045] The buggy address belongs to the physical page:
[   24.616306] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ca6
[   24.616663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.617006] page_type: f5(slab)
[   24.617213] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.617555] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.619142] page dumped because: kasan: bad access detected
[   24.619736] 
[   24.620497] Memory state around the buggy address:
[   24.621483]  fff00000c5ca6d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.622387]  fff00000c5ca6d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.623735] >fff00000c5ca6e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.624508]                                   ^
[   24.625134]  fff00000c5ca6e80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   24.625998]  fff00000c5ca6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.626856] ==================================================================

test log snippet boot parser 75

Home

[   24.524416] ==================================================================
[   24.525443] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   24.526186] Write of size 33 at addr fff00000c5ca6d00 by task kunit_try_catch/175
[   24.526826] 
[   24.528163] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   24.529533] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.529993] Hardware name: linux,dummy-virt (DT)
[   24.530830] Call trace:
[   24.531399]  show_stack+0x20/0x38 (C)
[   24.532175]  dump_stack_lvl+0x8c/0xd0
[   24.532842]  print_report+0x118/0x5e0
[   24.533500]  kasan_report+0xc8/0x118
[   24.534144]  kasan_check_range+0x100/0x1a8
[   24.534735]  __asan_memset+0x34/0x78
[   24.535632]  kmalloc_uaf_memset+0x170/0x310
[   24.536353]  kunit_try_run_case+0x14c/0x3d0
[   24.537082]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.537760]  kthread+0x24c/0x2d0
[   24.538441]  ret_from_fork+0x10/0x20
[   24.539432] 
[   24.539658] Allocated by task 175:
[   24.540081]  kasan_save_stack+0x3c/0x68
[   24.540619]  kasan_save_track+0x20/0x40
[   24.541154]  kasan_save_alloc_info+0x40/0x58
[   24.541703]  __kasan_kmalloc+0xd4/0xd8
[   24.542794]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.543649]  kmalloc_uaf_memset+0xb8/0x310
[   24.544331]  kunit_try_run_case+0x14c/0x3d0
[   24.545019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.545821]  kthread+0x24c/0x2d0
[   24.546425]  ret_from_fork+0x10/0x20
[   24.547287] 
[   24.547493] Freed by task 175:
[   24.547810]  kasan_save_stack+0x3c/0x68
[   24.548210]  kasan_save_track+0x20/0x40
[   24.548610]  kasan_save_free_info+0x4c/0x78
[   24.550343]  __kasan_slab_free+0x6c/0x98
[   24.551224]  kfree+0x114/0x3c8
[   24.551581]  kmalloc_uaf_memset+0x11c/0x310
[   24.552030]  kunit_try_run_case+0x14c/0x3d0
[   24.552473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.553818]  kthread+0x24c/0x2d0
[   24.554474]  ret_from_fork+0x10/0x20
[   24.555481] 
[   24.555825] The buggy address belongs to the object at fff00000c5ca6d00
[   24.555825]  which belongs to the cache kmalloc-64 of size 64
[   24.556967] The buggy address is located 0 bytes inside of
[   24.556967]  freed 64-byte region [fff00000c5ca6d00, fff00000c5ca6d40)
[   24.558632] 
[   24.559290] The buggy address belongs to the physical page:
[   24.559843] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ca6
[   24.560562] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.561200] page_type: f5(slab)
[   24.561562] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.563534] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.564352] page dumped because: kasan: bad access detected
[   24.565208] 
[   24.565436] Memory state around the buggy address:
[   24.566357]  fff00000c5ca6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.567992]  fff00000c5ca6c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.568639] >fff00000c5ca6d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.569877]                    ^
[   24.570489]  fff00000c5ca6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.571628]  fff00000c5ca6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.572537] ==================================================================

test log snippet boot parser 76

Home

[   25.569579] ==================================================================
[   25.570170] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x17c/0x2f8
[   25.570526] Read of size 1 at addr fff00000c565a8c0 by task kunit_try_catch/204
[   25.571361] 
[   25.571718] CPU: 1 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   25.572635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.573114] Hardware name: linux,dummy-virt (DT)
[   25.574046] Call trace:
[   25.574643]  show_stack+0x20/0x38 (C)
[   25.575885]  dump_stack_lvl+0x8c/0xd0
[   25.576467]  print_report+0x118/0x5e0
[   25.577178]  kasan_report+0xc8/0x118
[   25.577926]  __kasan_check_byte+0x54/0x70
[   25.578587]  kmem_cache_destroy+0x34/0x218
[   25.578975]  kmem_cache_double_destroy+0x17c/0x2f8
[   25.579948]  kunit_try_run_case+0x14c/0x3d0
[   25.580668]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.581489]  kthread+0x24c/0x2d0
[   25.582163]  ret_from_fork+0x10/0x20
[   25.582854] 
[   25.583384] Allocated by task 204:
[   25.583938]  kasan_save_stack+0x3c/0x68
[   25.584178]  kasan_save_track+0x20/0x40
[   25.584400]  kasan_save_alloc_info+0x40/0x58
[   25.584631]  __kasan_slab_alloc+0xa8/0xb0
[   25.584878]  kmem_cache_alloc_noprof+0x108/0x398
[   25.585130]  __kmem_cache_create_args+0x18c/0x2b0
[   25.585373]  kmem_cache_double_destroy+0xc8/0x2f8
[   25.585612]  kunit_try_run_case+0x14c/0x3d0
[   25.586293]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.587329]  kthread+0x24c/0x2d0
[   25.588387]  ret_from_fork+0x10/0x20
[   25.588970] 
[   25.589356] Freed by task 204:
[   25.589951]  kasan_save_stack+0x3c/0x68
[   25.590714]  kasan_save_track+0x20/0x40
[   25.591789]  kasan_save_free_info+0x4c/0x78
[   25.592374]  __kasan_slab_free+0x6c/0x98
[   25.593001]  kmem_cache_free+0x118/0x470
[   25.593594]  slab_kmem_cache_release+0x38/0x50
[   25.594271]  kmem_cache_release+0x1c/0x30
[   25.594870]  kobject_put+0x17c/0x430
[   25.595562]  sysfs_slab_release+0x1c/0x30
[   25.596129]  kmem_cache_destroy+0x118/0x218
[   25.596644]  kmem_cache_double_destroy+0x130/0x2f8
[   25.597300]  kunit_try_run_case+0x14c/0x3d0
[   25.597898]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.598600]  kthread+0x24c/0x2d0
[   25.599219]  ret_from_fork+0x10/0x20
[   25.599987] 
[   25.600410] The buggy address belongs to the object at fff00000c565a8c0
[   25.600410]  which belongs to the cache kmem_cache of size 208
[   25.601720] The buggy address is located 0 bytes inside of
[   25.601720]  freed 208-byte region [fff00000c565a8c0, fff00000c565a990)
[   25.603064] 
[   25.603677] The buggy address belongs to the physical page:
[   25.604341] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10565a
[   25.605299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.606117] page_type: f5(slab)
[   25.606641] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   25.607832] raw: 0000000000000000 00000000800c000c 00000001f5000000 0000000000000000
[   25.608521] page dumped because: kasan: bad access detected
[   25.609017] 
[   25.609234] Memory state around the buggy address:
[   25.609705]  fff00000c565a780: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.610992]  fff00000c565a800: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   25.611832] >fff00000c565a880: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   25.613202]                                            ^
[   25.614090]  fff00000c565a900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.614998]  fff00000c565a980: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.616136] ==================================================================

test log snippet boot parser 77

Home

[   25.475931] ==================================================================
[   25.476854] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x390/0x468
[   25.477688] Read of size 1 at addr fff00000c5d09000 by task kunit_try_catch/202
[   25.478418] 
[   25.478805] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   25.480327] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.481278] Hardware name: linux,dummy-virt (DT)
[   25.481888] Call trace:
[   25.482262]  show_stack+0x20/0x38 (C)
[   25.482807]  dump_stack_lvl+0x8c/0xd0
[   25.483528]  print_report+0x118/0x5e0
[   25.484102]  kasan_report+0xc8/0x118
[   25.484674]  __asan_report_load1_noabort+0x20/0x30
[   25.485513]  kmem_cache_rcu_uaf+0x390/0x468
[   25.486133]  kunit_try_run_case+0x14c/0x3d0
[   25.486774]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.487666]  kthread+0x24c/0x2d0
[   25.488086]  ret_from_fork+0x10/0x20
[   25.488902] 
[   25.489316] Allocated by task 202:
[   25.489831]  kasan_save_stack+0x3c/0x68
[   25.490421]  kasan_save_track+0x20/0x40
[   25.491106]  kasan_save_alloc_info+0x40/0x58
[   25.491666]  __kasan_slab_alloc+0xa8/0xb0
[   25.492551]  kmem_cache_alloc_noprof+0x108/0x398
[   25.493112]  kmem_cache_rcu_uaf+0x12c/0x468
[   25.493621]  kunit_try_run_case+0x14c/0x3d0
[   25.494144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.495480]  kthread+0x24c/0x2d0
[   25.496063]  ret_from_fork+0x10/0x20
[   25.496357] 
[   25.496492] Freed by task 0:
[   25.496681]  kasan_save_stack+0x3c/0x68
[   25.497074]  kasan_save_track+0x20/0x40
[   25.497470]  kasan_save_free_info+0x4c/0x78
[   25.499099]  __kasan_slab_free+0x6c/0x98
[   25.499862]  slab_free_after_rcu_debug+0xd4/0x2f8
[   25.500692]  rcu_core+0x9f4/0x1e20
[   25.501401]  rcu_core_si+0x18/0x30
[   25.502050]  handle_softirqs+0x374/0xb20
[   25.502772]  __do_softirq+0x1c/0x28
[   25.504099] 
[   25.504607] Last potentially related work creation:
[   25.505307]  kasan_save_stack+0x3c/0x68
[   25.505972]  __kasan_record_aux_stack+0xbc/0xe8
[   25.506692]  kasan_record_aux_stack_noalloc+0x14/0x20
[   25.507698]  kmem_cache_free+0x28c/0x470
[   25.509046]  kmem_cache_rcu_uaf+0x16c/0x468
[   25.509528]  kunit_try_run_case+0x14c/0x3d0
[   25.509977]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.510491]  kthread+0x24c/0x2d0
[   25.512214]  ret_from_fork+0x10/0x20
[   25.512589] 
[   25.513093] The buggy address belongs to the object at fff00000c5d09000
[   25.513093]  which belongs to the cache test_cache of size 200
[   25.513898] The buggy address is located 0 bytes inside of
[   25.513898]  freed 200-byte region [fff00000c5d09000, fff00000c5d090c8)
[   25.514389] 
[   25.514525] The buggy address belongs to the physical page:
[   25.516034] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d09
[   25.517042] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.517902] page_type: f5(slab)
[   25.518529] raw: 0bfffe0000000000 fff00000c5d07000 dead000000000122 0000000000000000
[   25.520365] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   25.521066] page dumped because: kasan: bad access detected
[   25.521887] 
[   25.522362] Memory state around the buggy address:
[   25.523078]  fff00000c5d08f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.524013]  fff00000c5d08f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.524769] >fff00000c5d09000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.525464]                    ^
[   25.526626]  fff00000c5d09080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   25.528381]  fff00000c5d09100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.529079] ==================================================================

test log snippet boot parser 78

Home

[   23.965007] ==================================================================
[   23.965810] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   23.966695] Read of size 1 at addr fff00000c6364c00 by task kunit_try_catch/153
[   23.967724] 
[   23.968144] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   23.969479] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.970159] Hardware name: linux,dummy-virt (DT)
[   23.970887] Call trace:
[   23.971537]  show_stack+0x20/0x38 (C)
[   23.972236]  dump_stack_lvl+0x8c/0xd0
[   23.972936]  print_report+0x118/0x5e0
[   23.973480]  kasan_report+0xc8/0x118
[   23.974191]  __asan_report_load1_noabort+0x20/0x30
[   23.975044]  krealloc_uaf+0x4c8/0x520
[   23.975809]  kunit_try_run_case+0x14c/0x3d0
[   23.976415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.977077]  kthread+0x24c/0x2d0
[   23.977536]  ret_from_fork+0x10/0x20
[   23.978442] 
[   23.978993] Allocated by task 153:
[   23.979829]  kasan_save_stack+0x3c/0x68
[   23.980507]  kasan_save_track+0x20/0x40
[   23.981159]  kasan_save_alloc_info+0x40/0x58
[   23.981876]  __kasan_kmalloc+0xd4/0xd8
[   23.982520]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.983585]  krealloc_uaf+0xc8/0x520
[   23.984282]  kunit_try_run_case+0x14c/0x3d0
[   23.984895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.985569]  kthread+0x24c/0x2d0
[   23.986036]  ret_from_fork+0x10/0x20
[   23.986594] 
[   23.986985] Freed by task 153:
[   23.987406]  kasan_save_stack+0x3c/0x68
[   23.988623]  kasan_save_track+0x20/0x40
[   23.989336]  kasan_save_free_info+0x4c/0x78
[   23.989799]  __kasan_slab_free+0x6c/0x98
[   23.990700]  kfree+0x114/0x3c8
[   23.991435]  krealloc_uaf+0x12c/0x520
[   23.992426]  kunit_try_run_case+0x14c/0x3d0
[   23.992954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.993616]  kthread+0x24c/0x2d0
[   23.994100]  ret_from_fork+0x10/0x20
[   23.994563] 
[   23.994913] The buggy address belongs to the object at fff00000c6364c00
[   23.994913]  which belongs to the cache kmalloc-256 of size 256
[   23.996268] The buggy address is located 0 bytes inside of
[   23.996268]  freed 256-byte region [fff00000c6364c00, fff00000c6364d00)
[   23.997476] 
[   23.997915] The buggy address belongs to the physical page:
[   23.998598] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106364
[   23.999935] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.000872] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.001737] page_type: f5(slab)
[   24.002255] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.003325] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   24.004240] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   24.005103] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   24.005984] head: 0bfffe0000000001 ffffc1ffc318d901 ffffffffffffffff 0000000000000000
[   24.006877] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   24.008700] page dumped because: kasan: bad access detected
[   24.009507] 
[   24.009726] Memory state around the buggy address:
[   24.010495]  fff00000c6364b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.011525]  fff00000c6364b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.012190] >fff00000c6364c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.013334]                    ^
[   24.014157]  fff00000c6364c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.014974]  fff00000c6364d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.015998] ==================================================================

test log snippet boot parser 79

Home

[   23.910637] ==================================================================
[   23.911904] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   23.912639] Read of size 1 at addr fff00000c6364c00 by task kunit_try_catch/153
[   23.913982] 
[   23.914457] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   23.916186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.916838] Hardware name: linux,dummy-virt (DT)
[   23.917523] Call trace:
[   23.917986]  show_stack+0x20/0x38 (C)
[   23.918630]  dump_stack_lvl+0x8c/0xd0
[   23.919458]  print_report+0x118/0x5e0
[   23.920226]  kasan_report+0xc8/0x118
[   23.920778]  __kasan_check_byte+0x54/0x70
[   23.921318]  krealloc_noprof+0x44/0x360
[   23.922182]  krealloc_uaf+0x180/0x520
[   23.922942]  kunit_try_run_case+0x14c/0x3d0
[   23.923445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.924125]  kthread+0x24c/0x2d0
[   23.924583]  ret_from_fork+0x10/0x20
[   23.925672] 
[   23.925997] Allocated by task 153:
[   23.926465]  kasan_save_stack+0x3c/0x68
[   23.926996]  kasan_save_track+0x20/0x40
[   23.927506]  kasan_save_alloc_info+0x40/0x58
[   23.929050]  __kasan_kmalloc+0xd4/0xd8
[   23.929585]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.930191]  krealloc_uaf+0xc8/0x520
[   23.930637]  kunit_try_run_case+0x14c/0x3d0
[   23.931311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.932612]  kthread+0x24c/0x2d0
[   23.933007]  ret_from_fork+0x10/0x20
[   23.933465] 
[   23.933821] Freed by task 153:
[   23.934239]  kasan_save_stack+0x3c/0x68
[   23.934713]  kasan_save_track+0x20/0x40
[   23.935797]  kasan_save_free_info+0x4c/0x78
[   23.936406]  __kasan_slab_free+0x6c/0x98
[   23.937117]  kfree+0x114/0x3c8
[   23.937724]  krealloc_uaf+0x12c/0x520
[   23.938397]  kunit_try_run_case+0x14c/0x3d0
[   23.939339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.940113]  kthread+0x24c/0x2d0
[   23.940691]  ret_from_fork+0x10/0x20
[   23.941379] 
[   23.941792] The buggy address belongs to the object at fff00000c6364c00
[   23.941792]  which belongs to the cache kmalloc-256 of size 256
[   23.943503] The buggy address is located 0 bytes inside of
[   23.943503]  freed 256-byte region [fff00000c6364c00, fff00000c6364d00)
[   23.944957] 
[   23.945393] The buggy address belongs to the physical page:
[   23.946169] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106364
[   23.947381] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.948196] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.949280] page_type: f5(slab)
[   23.949622] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.950049] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.950463] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.952219] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.953337] head: 0bfffe0000000001 ffffc1ffc318d901 ffffffffffffffff 0000000000000000
[   23.954293] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   23.955085] page dumped because: kasan: bad access detected
[   23.955669] 
[   23.956352] Memory state around the buggy address:
[   23.957027]  fff00000c6364b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.958119]  fff00000c6364b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.959210] >fff00000c6364c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.960146]                    ^
[   23.960352]  fff00000c6364c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.960668]  fff00000c6364d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.961684] ==================================================================

test log snippet boot parser 80

Home

[   24.988172] ==================================================================
[   24.988905] BUG: KASAN: slab-use-after-free in ksize_uaf+0x548/0x600
[   24.989713] Read of size 1 at addr fff00000c5cd6678 by task kunit_try_catch/185
[   24.990781] 
[   24.991636] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   24.993275] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.993817] Hardware name: linux,dummy-virt (DT)
[   24.994430] Call trace:
[   24.994911]  show_stack+0x20/0x38 (C)
[   24.995490]  dump_stack_lvl+0x8c/0xd0
[   24.996485]  print_report+0x118/0x5e0
[   24.997084]  kasan_report+0xc8/0x118
[   24.997644]  __asan_report_load1_noabort+0x20/0x30
[   24.998265]  ksize_uaf+0x548/0x600
[   24.998846]  kunit_try_run_case+0x14c/0x3d0
[   24.999699]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.000409]  kthread+0x24c/0x2d0
[   25.001382]  ret_from_fork+0x10/0x20
[   25.001975] 
[   25.002274] Allocated by task 185:
[   25.002692]  kasan_save_stack+0x3c/0x68
[   25.003725]  kasan_save_track+0x20/0x40
[   25.004325]  kasan_save_alloc_info+0x40/0x58
[   25.004873]  __kasan_kmalloc+0xd4/0xd8
[   25.005374]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.006029]  ksize_uaf+0xb8/0x600
[   25.006621]  kunit_try_run_case+0x14c/0x3d0
[   25.008157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.008909]  kthread+0x24c/0x2d0
[   25.009331]  ret_from_fork+0x10/0x20
[   25.010283] 
[   25.010500] Freed by task 185:
[   25.011140]  kasan_save_stack+0x3c/0x68
[   25.012148]  kasan_save_track+0x20/0x40
[   25.012876]  kasan_save_free_info+0x4c/0x78
[   25.013604]  __kasan_slab_free+0x6c/0x98
[   25.014279]  kfree+0x114/0x3c8
[   25.014944]  ksize_uaf+0x11c/0x600
[   25.016035]  kunit_try_run_case+0x14c/0x3d0
[   25.016537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.017501]  kthread+0x24c/0x2d0
[   25.018322]  ret_from_fork+0x10/0x20
[   25.019565] 
[   25.019920] The buggy address belongs to the object at fff00000c5cd6600
[   25.019920]  which belongs to the cache kmalloc-128 of size 128
[   25.021041] The buggy address is located 120 bytes inside of
[   25.021041]  freed 128-byte region [fff00000c5cd6600, fff00000c5cd6680)
[   25.022700] 
[   25.023777] The buggy address belongs to the physical page:
[   25.024397] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cd6
[   25.025240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.026578] page_type: f5(slab)
[   25.027625] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.028372] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   25.029346] page dumped because: kasan: bad access detected
[   25.030140] 
[   25.030599] Memory state around the buggy address:
[   25.032036]  fff00000c5cd6500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.032916]  fff00000c5cd6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.033674] >fff00000c5cd6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.034422]                                                                 ^
[   25.035615]  fff00000c5cd6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.036295]  fff00000c5cd6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.037117] ==================================================================

test log snippet boot parser 81

Home

[   24.937564] ==================================================================
[   24.938240] BUG: KASAN: slab-use-after-free in ksize_uaf+0x59c/0x600
[   24.939229] Read of size 1 at addr fff00000c5cd6600 by task kunit_try_catch/185
[   24.940581] 
[   24.940924] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   24.942052] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.942883] Hardware name: linux,dummy-virt (DT)
[   24.944284] Call trace:
[   24.944572]  show_stack+0x20/0x38 (C)
[   24.945261]  dump_stack_lvl+0x8c/0xd0
[   24.945996]  print_report+0x118/0x5e0
[   24.946665]  kasan_report+0xc8/0x118
[   24.947353]  __asan_report_load1_noabort+0x20/0x30
[   24.947993]  ksize_uaf+0x59c/0x600
[   24.948500]  kunit_try_run_case+0x14c/0x3d0
[   24.949206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.950332]  kthread+0x24c/0x2d0
[   24.951067]  ret_from_fork+0x10/0x20
[   24.951564] 
[   24.952203] Allocated by task 185:
[   24.953717]  kasan_save_stack+0x3c/0x68
[   24.954231]  kasan_save_track+0x20/0x40
[   24.954658]  kasan_save_alloc_info+0x40/0x58
[   24.955053]  __kasan_kmalloc+0xd4/0xd8
[   24.955991]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.956654]  ksize_uaf+0xb8/0x600
[   24.957123]  kunit_try_run_case+0x14c/0x3d0
[   24.957635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.958396]  kthread+0x24c/0x2d0
[   24.959078]  ret_from_fork+0x10/0x20
[   24.959830] 
[   24.960152] Freed by task 185:
[   24.960909]  kasan_save_stack+0x3c/0x68
[   24.961830]  kasan_save_track+0x20/0x40
[   24.962252]  kasan_save_free_info+0x4c/0x78
[   24.962691]  __kasan_slab_free+0x6c/0x98
[   24.963402]  kfree+0x114/0x3c8
[   24.964512]  ksize_uaf+0x11c/0x600
[   24.965210]  kunit_try_run_case+0x14c/0x3d0
[   24.965644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.966176]  kthread+0x24c/0x2d0
[   24.966549]  ret_from_fork+0x10/0x20
[   24.968440] 
[   24.968758] The buggy address belongs to the object at fff00000c5cd6600
[   24.968758]  which belongs to the cache kmalloc-128 of size 128
[   24.970001] The buggy address is located 0 bytes inside of
[   24.970001]  freed 128-byte region [fff00000c5cd6600, fff00000c5cd6680)
[   24.971640] 
[   24.972343] The buggy address belongs to the physical page:
[   24.973249] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cd6
[   24.974278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.975411] page_type: f5(slab)
[   24.975832] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.976407] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   24.977494] page dumped because: kasan: bad access detected
[   24.978355] 
[   24.978624] Memory state around the buggy address:
[   24.979296]  fff00000c5cd6500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.981003]  fff00000c5cd6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.981927] >fff00000c5cd6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.982838]                    ^
[   24.983461]  fff00000c5cd6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.984896]  fff00000c5cd6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.985811] ==================================================================

test log snippet boot parser 82

Home

[   24.882566] ==================================================================
[   24.883875] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x600
[   24.884491] Read of size 1 at addr fff00000c5cd6600 by task kunit_try_catch/185
[   24.886228] 
[   24.886580] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   24.888201] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.889252] Hardware name: linux,dummy-virt (DT)
[   24.889689] Call trace:
[   24.890314]  show_stack+0x20/0x38 (C)
[   24.891374]  dump_stack_lvl+0x8c/0xd0
[   24.892084]  print_report+0x118/0x5e0
[   24.892726]  kasan_report+0xc8/0x118
[   24.893435]  __kasan_check_byte+0x54/0x70
[   24.893997]  ksize+0x30/0x88
[   24.894438]  ksize_uaf+0x168/0x600
[   24.894968]  kunit_try_run_case+0x14c/0x3d0
[   24.896334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.897190]  kthread+0x24c/0x2d0
[   24.897708]  ret_from_fork+0x10/0x20
[   24.898254] 
[   24.898550] Allocated by task 185:
[   24.899685]  kasan_save_stack+0x3c/0x68
[   24.900366]  kasan_save_track+0x20/0x40
[   24.901028]  kasan_save_alloc_info+0x40/0x58
[   24.901768]  __kasan_kmalloc+0xd4/0xd8
[   24.902302]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.902858]  ksize_uaf+0xb8/0x600
[   24.903337]  kunit_try_run_case+0x14c/0x3d0
[   24.904894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.905443]  kthread+0x24c/0x2d0
[   24.906003]  ret_from_fork+0x10/0x20
[   24.906663] 
[   24.907216] Freed by task 185:
[   24.908013]  kasan_save_stack+0x3c/0x68
[   24.908504]  kasan_save_track+0x20/0x40
[   24.909187]  kasan_save_free_info+0x4c/0x78
[   24.909820]  __kasan_slab_free+0x6c/0x98
[   24.910419]  kfree+0x114/0x3c8
[   24.910969]  ksize_uaf+0x11c/0x600
[   24.911578]  kunit_try_run_case+0x14c/0x3d0
[   24.912496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.913151]  kthread+0x24c/0x2d0
[   24.913596]  ret_from_fork+0x10/0x20
[   24.914116] 
[   24.914428] The buggy address belongs to the object at fff00000c5cd6600
[   24.914428]  which belongs to the cache kmalloc-128 of size 128
[   24.916760] The buggy address is located 0 bytes inside of
[   24.916760]  freed 128-byte region [fff00000c5cd6600, fff00000c5cd6680)
[   24.918316] 
[   24.918623] The buggy address belongs to the physical page:
[   24.919303] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cd6
[   24.920557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.921329] page_type: f5(slab)
[   24.922294] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.923340] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   24.924627] page dumped because: kasan: bad access detected
[   24.925460] 
[   24.925944] Memory state around the buggy address:
[   24.926427]  fff00000c5cd6500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.927959]  fff00000c5cd6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.928711] >fff00000c5cd6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.930049]                    ^
[   24.930675]  fff00000c5cd6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.931882]  fff00000c5cd6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.933101] ==================================================================

test log snippet boot parser 83

Home

[   26.436441] ==================================================================
[   26.437874] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   26.438529] Read of size 1 at addr fff00000c5d27240 by task kunit_try_catch/220
[   26.439170] 
[   26.440100] CPU: 0 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   26.441465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.442127] Hardware name: linux,dummy-virt (DT)
[   26.442835] Call trace:
[   26.443818]  show_stack+0x20/0x38 (C)
[   26.444244]  dump_stack_lvl+0x8c/0xd0
[   26.444729]  print_report+0x118/0x5e0
[   26.445235]  kasan_report+0xc8/0x118
[   26.446113]  __asan_report_load1_noabort+0x20/0x30
[   26.446589]  mempool_uaf_helper+0x314/0x340
[   26.447377]  mempool_slab_uaf+0xb8/0x110
[   26.447954]  kunit_try_run_case+0x14c/0x3d0
[   26.448495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.450119]  kthread+0x24c/0x2d0
[   26.450790]  ret_from_fork+0x10/0x20
[   26.451968] 
[   26.452407] Allocated by task 220:
[   26.453007]  kasan_save_stack+0x3c/0x68
[   26.453544]  kasan_save_track+0x20/0x40
[   26.454141]  kasan_save_alloc_info+0x40/0x58
[   26.454828]  __kasan_mempool_unpoison_object+0xbc/0x180
[   26.456056]  remove_element+0x16c/0x1f8
[   26.456504]  mempool_alloc_preallocated+0x58/0xc0
[   26.457092]  mempool_uaf_helper+0xa4/0x340
[   26.457591]  mempool_slab_uaf+0xb8/0x110
[   26.458477]  kunit_try_run_case+0x14c/0x3d0
[   26.459391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.460693]  kthread+0x24c/0x2d0
[   26.461330]  ret_from_fork+0x10/0x20
[   26.462004] 
[   26.462444] Freed by task 220:
[   26.463361]  kasan_save_stack+0x3c/0x68
[   26.463880]  kasan_save_track+0x20/0x40
[   26.464993]  kasan_save_free_info+0x4c/0x78
[   26.465723]  __kasan_mempool_poison_object+0xc0/0x150
[   26.466486]  mempool_free+0x28c/0x328
[   26.467789]  mempool_uaf_helper+0x104/0x340
[   26.468396]  mempool_slab_uaf+0xb8/0x110
[   26.468871]  kunit_try_run_case+0x14c/0x3d0
[   26.469661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.470341]  kthread+0x24c/0x2d0
[   26.470782]  ret_from_fork+0x10/0x20
[   26.471899] 
[   26.472366] The buggy address belongs to the object at fff00000c5d27240
[   26.472366]  which belongs to the cache test_cache of size 123
[   26.473788] The buggy address is located 0 bytes inside of
[   26.473788]  freed 123-byte region [fff00000c5d27240, fff00000c5d272bb)
[   26.475896] 
[   26.476231] The buggy address belongs to the physical page:
[   26.477004] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d27
[   26.477956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.478789] page_type: f5(slab)
[   26.479484] raw: 0bfffe0000000000 fff00000c5d073c0 dead000000000122 0000000000000000
[   26.480589] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   26.481552] page dumped because: kasan: bad access detected
[   26.482209] 
[   26.482735] Memory state around the buggy address:
[   26.483586]  fff00000c5d27100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.484559]  fff00000c5d27180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.485265] >fff00000c5d27200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   26.486834]                                            ^
[   26.487664]  fff00000c5d27280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.488719]  fff00000c5d27300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.489707] ==================================================================

test log snippet boot parser 84

Home

[   26.328831] ==================================================================
[   26.330047] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   26.330804] Read of size 1 at addr fff00000c5d02a00 by task kunit_try_catch/216
[   26.332808] 
[   26.333292] CPU: 0 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   26.334428] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.334947] Hardware name: linux,dummy-virt (DT)
[   26.335503] Call trace:
[   26.335868]  show_stack+0x20/0x38 (C)
[   26.336352]  dump_stack_lvl+0x8c/0xd0
[   26.337329]  print_report+0x118/0x5e0
[   26.338127]  kasan_report+0xc8/0x118
[   26.338828]  __asan_report_load1_noabort+0x20/0x30
[   26.340118]  mempool_uaf_helper+0x314/0x340
[   26.340876]  mempool_kmalloc_uaf+0xbc/0x118
[   26.341603]  kunit_try_run_case+0x14c/0x3d0
[   26.342340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.343001]  kthread+0x24c/0x2d0
[   26.343486]  ret_from_fork+0x10/0x20
[   26.344974] 
[   26.345407] Allocated by task 216:
[   26.345900]  kasan_save_stack+0x3c/0x68
[   26.346575]  kasan_save_track+0x20/0x40
[   26.347119]  kasan_save_alloc_info+0x40/0x58
[   26.348047]  __kasan_mempool_unpoison_object+0x11c/0x180
[   26.349185]  remove_element+0x130/0x1f8
[   26.349574]  mempool_alloc_preallocated+0x58/0xc0
[   26.350116]  mempool_uaf_helper+0xa4/0x340
[   26.350787]  mempool_kmalloc_uaf+0xbc/0x118
[   26.352096]  kunit_try_run_case+0x14c/0x3d0
[   26.352586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.353122]  kthread+0x24c/0x2d0
[   26.353485]  ret_from_fork+0x10/0x20
[   26.354732] 
[   26.355228] Freed by task 216:
[   26.355806]  kasan_save_stack+0x3c/0x68
[   26.356201]  kasan_save_track+0x20/0x40
[   26.356800]  kasan_save_free_info+0x4c/0x78
[   26.357903]  __kasan_mempool_poison_object+0xc0/0x150
[   26.358680]  mempool_free+0x28c/0x328
[   26.359517]  mempool_uaf_helper+0x104/0x340
[   26.360206]  mempool_kmalloc_uaf+0xbc/0x118
[   26.360637]  kunit_try_run_case+0x14c/0x3d0
[   26.361092]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.361620]  kthread+0x24c/0x2d0
[   26.362828]  ret_from_fork+0x10/0x20
[   26.363511] 
[   26.364873] The buggy address belongs to the object at fff00000c5d02a00
[   26.364873]  which belongs to the cache kmalloc-128 of size 128
[   26.366376] The buggy address is located 0 bytes inside of
[   26.366376]  freed 128-byte region [fff00000c5d02a00, fff00000c5d02a80)
[   26.367998] 
[   26.368298] The buggy address belongs to the physical page:
[   26.369373] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d02
[   26.370195] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.370835] page_type: f5(slab)
[   26.372664] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.373535] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   26.374495] page dumped because: kasan: bad access detected
[   26.375571] 
[   26.375821] Memory state around the buggy address:
[   26.376831]  fff00000c5d02900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.377756]  fff00000c5d02980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.378664] >fff00000c5d02a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.379634]                    ^
[   26.380999]  fff00000c5d02a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.382025]  fff00000c5d02b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.382943] ==================================================================

test log snippet boot parser 85

Home

[   25.067602] ==================================================================
[   25.068539] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   25.069636] Read of size 4 at addr fff00000c634edc0 by task swapper/1/0
[   25.070272] 
[   25.070712] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N 6.13.0-rc7 #1
[   25.071632] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.072190] Hardware name: linux,dummy-virt (DT)
[   25.073246] Call trace:
[   25.073826]  show_stack+0x20/0x38 (C)
[   25.074433]  dump_stack_lvl+0x8c/0xd0
[   25.075114]  print_report+0x118/0x5e0
[   25.075959]  kasan_report+0xc8/0x118
[   25.076552]  __asan_report_load4_noabort+0x20/0x30
[   25.077227]  rcu_uaf_reclaim+0x64/0x70
[   25.077840]  rcu_core+0x9f4/0x1e20
[   25.078393]  rcu_core_si+0x18/0x30
[   25.079324]  handle_softirqs+0x374/0xb20
[   25.079834]  __do_softirq+0x1c/0x28
[   25.080419]  ____do_softirq+0x18/0x30
[   25.081068]  call_on_irq_stack+0x24/0x58
[   25.081692]  do_softirq_own_stack+0x24/0x38
[   25.082319]  __irq_exit_rcu+0x1fc/0x318
[   25.083270]  irq_exit_rcu+0x1c/0x80
[   25.083738]  el1_interrupt+0x38/0x58
[   25.084287]  el1h_64_irq_handler+0x18/0x28
[   25.084885]  el1h_64_irq+0x6c/0x70
[   25.085563]  arch_local_irq_enable+0x4/0x8 (P)
[   25.086229]  do_idle+0x384/0x4e8
[   25.086710]  cpu_startup_entry+0x68/0x80
[   25.087730]  secondary_start_kernel+0x288/0x340
[   25.088375]  __secondary_switched+0xc0/0xc8
[   25.089020] 
[   25.089326] Allocated by task 187:
[   25.089876]  kasan_save_stack+0x3c/0x68
[   25.090367]  kasan_save_track+0x20/0x40
[   25.091811]  kasan_save_alloc_info+0x40/0x58
[   25.092277]  __kasan_kmalloc+0xd4/0xd8
[   25.092736]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.093388]  rcu_uaf+0xb0/0x2d0
[   25.093931]  kunit_try_run_case+0x14c/0x3d0
[   25.094486]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.095526]  kthread+0x24c/0x2d0
[   25.096002]  ret_from_fork+0x10/0x20
[   25.096523] 
[   25.096867] Freed by task 0:
[   25.097286]  kasan_save_stack+0x3c/0x68
[   25.097899]  kasan_save_track+0x20/0x40
[   25.098465]  kasan_save_free_info+0x4c/0x78
[   25.099419]  __kasan_slab_free+0x6c/0x98
[   25.100001]  kfree+0x114/0x3c8
[   25.100455]  rcu_uaf_reclaim+0x28/0x70
[   25.100975]  rcu_core+0x9f4/0x1e20
[   25.101429]  rcu_core_si+0x18/0x30
[   25.101910]  handle_softirqs+0x374/0xb20
[   25.102516]  __do_softirq+0x1c/0x28
[   25.103429] 
[   25.103804] Last potentially related work creation:
[   25.104368]  kasan_save_stack+0x3c/0x68
[   25.104997]  __kasan_record_aux_stack+0xbc/0xe8
[   25.105519]  kasan_record_aux_stack_noalloc+0x14/0x20
[   25.106365]  __call_rcu_common.constprop.0+0x74/0xa10
[   25.107338]  call_rcu+0x18/0x30
[   25.107788]  rcu_uaf+0x14c/0x2d0
[   25.108262]  kunit_try_run_case+0x14c/0x3d0
[   25.108843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.109462]  kthread+0x24c/0x2d0
[   25.110008]  ret_from_fork+0x10/0x20
[   25.110514] 
[   25.110916] The buggy address belongs to the object at fff00000c634edc0
[   25.110916]  which belongs to the cache kmalloc-32 of size 32
[   25.113250] The buggy address is located 0 bytes inside of
[   25.113250]  freed 32-byte region [fff00000c634edc0, fff00000c634ede0)
[   25.114380] 
[   25.114783] The buggy address belongs to the physical page:
[   25.115426] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10634e
[   25.116720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.117595] page_type: f5(slab)
[   25.118088] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   25.118440] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   25.118892] page dumped because: kasan: bad access detected
[   25.120052] 
[   25.120405] Memory state around the buggy address:
[   25.120942]  fff00000c634ec80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   25.121779]  fff00000c634ed00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   25.122600] >fff00000c634ed80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   25.123464]                                            ^
[   25.124105]  fff00000c634ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.125063]  fff00000c634ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.125783] ==================================================================

test log snippet boot parser 86

Home

[   27.033764] ==================================================================
[   27.034786] BUG: KASAN: slab-use-after-free in strchr+0xcc/0xd8
[   27.035687] Read of size 1 at addr fff00000c5d0e250 by task kunit_try_catch/248
[   27.036288] 
[   27.036630] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.037587] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.038002] Hardware name: linux,dummy-virt (DT)
[   27.038462] Call trace:
[   27.039627]  show_stack+0x20/0x38 (C)
[   27.040367]  dump_stack_lvl+0x8c/0xd0
[   27.041069]  print_report+0x118/0x5e0
[   27.041799]  kasan_report+0xc8/0x118
[   27.042426]  __asan_report_load1_noabort+0x20/0x30
[   27.043197]  strchr+0xcc/0xd8
[   27.043995]  kasan_strings+0x180/0x8f8
[   27.044610]  kunit_try_run_case+0x14c/0x3d0
[   27.045188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.045963]  kthread+0x24c/0x2d0
[   27.046522]  ret_from_fork+0x10/0x20
[   27.047317] 
[   27.047539] Allocated by task 248:
[   27.047919]  kasan_save_stack+0x3c/0x68
[   27.048641]  kasan_save_track+0x20/0x40
[   27.049164]  kasan_save_alloc_info+0x40/0x58
[   27.049838]  __kasan_kmalloc+0xd4/0xd8
[   27.050507]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.051381]  kasan_strings+0xb4/0x8f8
[   27.051820]  kunit_try_run_case+0x14c/0x3d0
[   27.052428]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.053354]  kthread+0x24c/0x2d0
[   27.053965]  ret_from_fork+0x10/0x20
[   27.054575] 
[   27.054978] Freed by task 248:
[   27.056051]  kasan_save_stack+0x3c/0x68
[   27.056547]  kasan_save_track+0x20/0x40
[   27.057051]  kasan_save_free_info+0x4c/0x78
[   27.057554]  __kasan_slab_free+0x6c/0x98
[   27.059033]  kfree+0x114/0x3c8
[   27.059615]  kasan_strings+0x128/0x8f8
[   27.060181]  kunit_try_run_case+0x14c/0x3d0
[   27.060896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.061612]  kthread+0x24c/0x2d0
[   27.062181]  ret_from_fork+0x10/0x20
[   27.062802] 
[   27.063215] The buggy address belongs to the object at fff00000c5d0e240
[   27.063215]  which belongs to the cache kmalloc-32 of size 32
[   27.064621] The buggy address is located 16 bytes inside of
[   27.064621]  freed 32-byte region [fff00000c5d0e240, fff00000c5d0e260)
[   27.066130] 
[   27.066480] The buggy address belongs to the physical page:
[   27.067284] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d0e
[   27.068168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.069006] page_type: f5(slab)
[   27.069441] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   27.070237] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   27.071019] page dumped because: kasan: bad access detected
[   27.071702] 
[   27.072111] Memory state around the buggy address:
[   27.072775]  fff00000c5d0e100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   27.073699]  fff00000c5d0e180: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   27.074566] >fff00000c5d0e200: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   27.075555]                                                  ^
[   27.076231]  fff00000c5d0e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.077169]  fff00000c5d0e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.078018] ==================================================================

test log snippet boot parser 87

Home

[   27.127433] ==================================================================
[   27.128069] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   27.128391] Read of size 1 at addr fff00000c5d0e250 by task kunit_try_catch/248
[   27.128721] 
[   27.129018] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.130779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.132054] Hardware name: linux,dummy-virt (DT)
[   27.132730] Call trace:
[   27.133161]  show_stack+0x20/0x38 (C)
[   27.133872]  dump_stack_lvl+0x8c/0xd0
[   27.134483]  print_report+0x118/0x5e0
[   27.135096]  kasan_report+0xc8/0x118
[   27.135953]  __asan_report_load1_noabort+0x20/0x30
[   27.136653]  strcmp+0xc0/0xc8
[   27.137254]  kasan_strings+0x248/0x8f8
[   27.137880]  kunit_try_run_case+0x14c/0x3d0
[   27.138510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.139406]  kthread+0x24c/0x2d0
[   27.140224]  ret_from_fork+0x10/0x20
[   27.140847] 
[   27.141204] Allocated by task 248:
[   27.141774]  kasan_save_stack+0x3c/0x68
[   27.142378]  kasan_save_track+0x20/0x40
[   27.143004]  kasan_save_alloc_info+0x40/0x58
[   27.143772]  __kasan_kmalloc+0xd4/0xd8
[   27.144264]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.144814]  kasan_strings+0xb4/0x8f8
[   27.145286]  kunit_try_run_case+0x14c/0x3d0
[   27.145849]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.146626]  kthread+0x24c/0x2d0
[   27.147356]  ret_from_fork+0x10/0x20
[   27.147836] 
[   27.148057] Freed by task 248:
[   27.148404]  kasan_save_stack+0x3c/0x68
[   27.149608]  kasan_save_track+0x20/0x40
[   27.150326]  kasan_save_free_info+0x4c/0x78
[   27.151199]  __kasan_slab_free+0x6c/0x98
[   27.151576]  kfree+0x114/0x3c8
[   27.152589]  kasan_strings+0x128/0x8f8
[   27.154037]  kunit_try_run_case+0x14c/0x3d0
[   27.154683]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.155517]  kthread+0x24c/0x2d0
[   27.156154]  ret_from_fork+0x10/0x20
[   27.156719] 
[   27.157085] The buggy address belongs to the object at fff00000c5d0e240
[   27.157085]  which belongs to the cache kmalloc-32 of size 32
[   27.158425] The buggy address is located 16 bytes inside of
[   27.158425]  freed 32-byte region [fff00000c5d0e240, fff00000c5d0e260)
[   27.159756] 
[   27.160108] The buggy address belongs to the physical page:
[   27.160897] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d0e
[   27.161857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.162675] page_type: f5(slab)
[   27.163300] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   27.164189] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   27.165046] page dumped because: kasan: bad access detected
[   27.165719] 
[   27.166102] Memory state around the buggy address:
[   27.166768]  fff00000c5d0e100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   27.167577]  fff00000c5d0e180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   27.168405] >fff00000c5d0e200: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   27.169274]                                                  ^
[   27.170045]  fff00000c5d0e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.170901]  fff00000c5d0e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.171734] ==================================================================

test log snippet boot parser 88

Home

[   27.220382] ==================================================================
[   27.221147] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   27.222048] Read of size 1 at addr fff00000c5d0e250 by task kunit_try_catch/248
[   27.223393] 
[   27.223558] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.223997] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.224223] Hardware name: linux,dummy-virt (DT)
[   27.224458] Call trace:
[   27.224621]  show_stack+0x20/0x38 (C)
[   27.226234]  dump_stack_lvl+0x8c/0xd0
[   27.227422]  print_report+0x118/0x5e0
[   27.228170]  kasan_report+0xc8/0x118
[   27.228664]  __asan_report_load1_noabort+0x20/0x30
[   27.229738]  strlen+0xa8/0xb0
[   27.230227]  kasan_strings+0x320/0x8f8
[   27.230758]  kunit_try_run_case+0x14c/0x3d0
[   27.231684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.232643]  kthread+0x24c/0x2d0
[   27.233228]  ret_from_fork+0x10/0x20
[   27.234033] 
[   27.234271] Allocated by task 248:
[   27.234829]  kasan_save_stack+0x3c/0x68
[   27.235387]  kasan_save_track+0x20/0x40
[   27.236392]  kasan_save_alloc_info+0x40/0x58
[   27.237344]  __kasan_kmalloc+0xd4/0xd8
[   27.237996]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.238737]  kasan_strings+0xb4/0x8f8
[   27.239411]  kunit_try_run_case+0x14c/0x3d0
[   27.239977]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.240617]  kthread+0x24c/0x2d0
[   27.241546]  ret_from_fork+0x10/0x20
[   27.242256] 
[   27.242692] Freed by task 248:
[   27.244052]  kasan_save_stack+0x3c/0x68
[   27.244757]  kasan_save_track+0x20/0x40
[   27.245257]  kasan_save_free_info+0x4c/0x78
[   27.245837]  __kasan_slab_free+0x6c/0x98
[   27.246408]  kfree+0x114/0x3c8
[   27.246902]  kasan_strings+0x128/0x8f8
[   27.247430]  kunit_try_run_case+0x14c/0x3d0
[   27.248005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.248647]  kthread+0x24c/0x2d0
[   27.249155]  ret_from_fork+0x10/0x20
[   27.249641] 
[   27.249989] The buggy address belongs to the object at fff00000c5d0e240
[   27.249989]  which belongs to the cache kmalloc-32 of size 32
[   27.251247] The buggy address is located 16 bytes inside of
[   27.251247]  freed 32-byte region [fff00000c5d0e240, fff00000c5d0e260)
[   27.252454] 
[   27.252824] The buggy address belongs to the physical page:
[   27.253445] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d0e
[   27.254428] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.255210] page_type: f5(slab)
[   27.255768] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   27.256571] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   27.257449] page dumped because: kasan: bad access detected
[   27.258073] 
[   27.258405] Memory state around the buggy address:
[   27.259059]  fff00000c5d0e100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   27.259832]  fff00000c5d0e180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   27.260578] >fff00000c5d0e200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   27.261460]                                                  ^
[   27.262136]  fff00000c5d0e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.262979]  fff00000c5d0e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.263771] ==================================================================

test log snippet boot parser 89

Home

[   27.266492] ==================================================================
[   27.267382] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   27.268116] Read of size 1 at addr fff00000c5d0e250 by task kunit_try_catch/248
[   27.269411] 
[   27.269847] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.271328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.271888] Hardware name: linux,dummy-virt (DT)
[   27.272432] Call trace:
[   27.272871]  show_stack+0x20/0x38 (C)
[   27.273814]  dump_stack_lvl+0x8c/0xd0
[   27.274538]  print_report+0x118/0x5e0
[   27.275288]  kasan_report+0xc8/0x118
[   27.275851]  __asan_report_load1_noabort+0x20/0x30
[   27.276392]  strnlen+0x80/0x88
[   27.276970]  kasan_strings+0x380/0x8f8
[   27.277515]  kunit_try_run_case+0x14c/0x3d0
[   27.278065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.278830]  kthread+0x24c/0x2d0
[   27.279387]  ret_from_fork+0x10/0x20
[   27.279998] 
[   27.280324] Allocated by task 248:
[   27.280788]  kasan_save_stack+0x3c/0x68
[   27.281396]  kasan_save_track+0x20/0x40
[   27.282034]  kasan_save_alloc_info+0x40/0x58
[   27.282676]  __kasan_kmalloc+0xd4/0xd8
[   27.283206]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.283870]  kasan_strings+0xb4/0x8f8
[   27.284420]  kunit_try_run_case+0x14c/0x3d0
[   27.285065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.285674]  kthread+0x24c/0x2d0
[   27.286228]  ret_from_fork+0x10/0x20
[   27.286724] 
[   27.287070] Freed by task 248:
[   27.287594]  kasan_save_stack+0x3c/0x68
[   27.288149]  kasan_save_track+0x20/0x40
[   27.288691]  kasan_save_free_info+0x4c/0x78
[   27.289230]  __kasan_slab_free+0x6c/0x98
[   27.289853]  kfree+0x114/0x3c8
[   27.290305]  kasan_strings+0x128/0x8f8
[   27.290839]  kunit_try_run_case+0x14c/0x3d0
[   27.291429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.292209]  kthread+0x24c/0x2d0
[   27.292701]  ret_from_fork+0x10/0x20
[   27.293203] 
[   27.293568] The buggy address belongs to the object at fff00000c5d0e240
[   27.293568]  which belongs to the cache kmalloc-32 of size 32
[   27.294789] The buggy address is located 16 bytes inside of
[   27.294789]  freed 32-byte region [fff00000c5d0e240, fff00000c5d0e260)
[   27.296005] 
[   27.296323] The buggy address belongs to the physical page:
[   27.297021] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d0e
[   27.297889] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.298783] page_type: f5(slab)
[   27.299242] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   27.300200] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   27.301016] page dumped because: kasan: bad access detected
[   27.301663] 
[   27.301962] Memory state around the buggy address:
[   27.302527]  fff00000c5d0e100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   27.303410]  fff00000c5d0e180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   27.304216] >fff00000c5d0e200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   27.305044]                                                  ^
[   27.305735]  fff00000c5d0e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.306578]  fff00000c5d0e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.307380] ==================================================================

test log snippet boot parser 90

Home

[   27.080661] ==================================================================
[   27.081408] BUG: KASAN: slab-use-after-free in strrchr+0x6c/0x78
[   27.082920] Read of size 1 at addr fff00000c5d0e250 by task kunit_try_catch/248
[   27.084093] 
[   27.084344] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   27.085176] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.085588] Hardware name: linux,dummy-virt (DT)
[   27.087239] Call trace:
[   27.087709]  show_stack+0x20/0x38 (C)
[   27.088314]  dump_stack_lvl+0x8c/0xd0
[   27.088950]  print_report+0x118/0x5e0
[   27.089459]  kasan_report+0xc8/0x118
[   27.090131]  __asan_report_load1_noabort+0x20/0x30
[   27.090788]  strrchr+0x6c/0x78
[   27.091367]  kasan_strings+0x1e0/0x8f8
[   27.091971]  kunit_try_run_case+0x14c/0x3d0
[   27.092624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.093359]  kthread+0x24c/0x2d0
[   27.093931]  ret_from_fork+0x10/0x20
[   27.094564] 
[   27.095024] Allocated by task 248:
[   27.095535]  kasan_save_stack+0x3c/0x68
[   27.096208]  kasan_save_track+0x20/0x40
[   27.096716]  kasan_save_alloc_info+0x40/0x58
[   27.097476]  __kasan_kmalloc+0xd4/0xd8
[   27.098097]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.098785]  kasan_strings+0xb4/0x8f8
[   27.099368]  kunit_try_run_case+0x14c/0x3d0
[   27.100043]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.100804]  kthread+0x24c/0x2d0
[   27.101364]  ret_from_fork+0x10/0x20
[   27.101900] 
[   27.102288] Freed by task 248:
[   27.102834]  kasan_save_stack+0x3c/0x68
[   27.103398]  kasan_save_track+0x20/0x40
[   27.104060]  kasan_save_free_info+0x4c/0x78
[   27.104675]  __kasan_slab_free+0x6c/0x98
[   27.105329]  kfree+0x114/0x3c8
[   27.105862]  kasan_strings+0x128/0x8f8
[   27.106466]  kunit_try_run_case+0x14c/0x3d0
[   27.107130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.107885]  kthread+0x24c/0x2d0
[   27.108463]  ret_from_fork+0x10/0x20
[   27.109069] 
[   27.109423] The buggy address belongs to the object at fff00000c5d0e240
[   27.109423]  which belongs to the cache kmalloc-32 of size 32
[   27.110765] The buggy address is located 16 bytes inside of
[   27.110765]  freed 32-byte region [fff00000c5d0e240, fff00000c5d0e260)
[   27.112094] 
[   27.112422] The buggy address belongs to the physical page:
[   27.113081] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d0e
[   27.114075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.114911] page_type: f5(slab)
[   27.115516] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   27.116454] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   27.117313] page dumped because: kasan: bad access detected
[   27.118023] 
[   27.118350] Memory state around the buggy address:
[   27.118981]  fff00000c5d0e100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   27.119923]  fff00000c5d0e180: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   27.120781] >fff00000c5d0e200: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   27.121569]                                                  ^
[   27.122272]  fff00000c5d0e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.123152]  fff00000c5d0e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.124022] ==================================================================

test log snippet boot parser 91

Home

[   25.140583] ==================================================================
[   25.142505] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   25.143953] Read of size 8 at addr fff00000c634ee80 by task kunit_try_catch/189
[   25.144897] 
[   25.145219] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   25.146916] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.147466] Hardware name: linux,dummy-virt (DT)
[   25.147983] Call trace:
[   25.148396]  show_stack+0x20/0x38 (C)
[   25.149370]  dump_stack_lvl+0x8c/0xd0
[   25.149929]  print_report+0x118/0x5e0
[   25.150497]  kasan_report+0xc8/0x118
[   25.151394]  __asan_report_load8_noabort+0x20/0x30
[   25.151951]  workqueue_uaf+0x480/0x4a8
[   25.152568]  kunit_try_run_case+0x14c/0x3d0
[   25.153241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.153922]  kthread+0x24c/0x2d0
[   25.154443]  ret_from_fork+0x10/0x20
[   25.155333] 
[   25.155551] Allocated by task 189:
[   25.155933]  kasan_save_stack+0x3c/0x68
[   25.156356]  kasan_save_track+0x20/0x40
[   25.156801]  kasan_save_alloc_info+0x40/0x58
[   25.157285]  __kasan_kmalloc+0xd4/0xd8
[   25.157833]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.158410]  workqueue_uaf+0x13c/0x4a8
[   25.158890]  kunit_try_run_case+0x14c/0x3d0
[   25.159883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.160426]  kthread+0x24c/0x2d0
[   25.160804]  ret_from_fork+0x10/0x20
[   25.161190] 
[   25.161406] Freed by task 31:
[   25.161776]  kasan_save_stack+0x3c/0x68
[   25.162645]  kasan_save_track+0x20/0x40
[   25.163364]  kasan_save_free_info+0x4c/0x78
[   25.165104]  __kasan_slab_free+0x6c/0x98
[   25.165929]  kfree+0x114/0x3c8
[   25.166577]  workqueue_uaf_work+0x18/0x30
[   25.167763]  process_one_work+0x530/0xf98
[   25.168286]  worker_thread+0x614/0xf28
[   25.168762]  kthread+0x24c/0x2d0
[   25.169175]  ret_from_fork+0x10/0x20
[   25.169625] 
[   25.169955] Last potentially related work creation:
[   25.171226]  kasan_save_stack+0x3c/0x68
[   25.171712]  __kasan_record_aux_stack+0xbc/0xe8
[   25.172607]  kasan_record_aux_stack_noalloc+0x14/0x20
[   25.173390]  __queue_work+0x65c/0xfd8
[   25.173902]  queue_work_on+0xbc/0xf8
[   25.174625]  workqueue_uaf+0x210/0x4a8
[   25.175479]  kunit_try_run_case+0x14c/0x3d0
[   25.175935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.176457]  kthread+0x24c/0x2d0
[   25.177551]  ret_from_fork+0x10/0x20
[   25.177943] 
[   25.178534] The buggy address belongs to the object at fff00000c634ee80
[   25.178534]  which belongs to the cache kmalloc-32 of size 32
[   25.180149] The buggy address is located 0 bytes inside of
[   25.180149]  freed 32-byte region [fff00000c634ee80, fff00000c634eea0)
[   25.181307] 
[   25.181608] The buggy address belongs to the physical page:
[   25.182710] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10634e
[   25.184642] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.185971] page_type: f5(slab)
[   25.186369] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   25.187703] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   25.188711] page dumped because: kasan: bad access detected
[   25.189509] 
[   25.190013] Memory state around the buggy address:
[   25.190726]  fff00000c634ed80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   25.191734]  fff00000c634ee00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   25.192497] >fff00000c634ee80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   25.193634]                    ^
[   25.194307]  fff00000c634ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.195427]  fff00000c634ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.196101] ==================================================================

test log snippet boot parser 92

Home

[   26.816963] ==================================================================
[   26.818334] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x230/0x268
[   26.819277] Read of size 1 at addr ffff800080a07cba by task kunit_try_catch/238
[   26.820419] 
[   26.820718] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   26.821807] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.822346] Hardware name: linux,dummy-virt (DT)
[   26.823052] Call trace:
[   26.823724]  show_stack+0x20/0x38 (C)
[   26.824266]  dump_stack_lvl+0x8c/0xd0
[   26.824890]  print_report+0x2fc/0x5e0
[   26.825447]  kasan_report+0xc8/0x118
[   26.826062]  __asan_report_load1_noabort+0x20/0x30
[   26.826760]  kasan_stack_oob+0x230/0x268
[   26.827582]  kunit_try_run_case+0x14c/0x3d0
[   26.828315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.829047]  kthread+0x24c/0x2d0
[   26.829550]  ret_from_fork+0x10/0x20
[   26.830180] 
[   26.830596] The buggy address belongs to stack of task kunit_try_catch/238
[   26.832039]  and is located at offset 138 in frame:
[   26.832564]  kasan_stack_oob+0x0/0x268
[   26.833379] 
[   26.833635] This frame has 4 objects:
[   26.834630]  [48, 49) '__assertion'
[   26.834712]  [64, 72) 'array'
[   26.835296]  [96, 112) '__assertion'
[   26.835970]  [128, 138) 'stack_array'
[   26.836630] 
[   26.837918] The buggy address belongs to the virtual mapping at
[   26.837918]  [ffff800080a00000, ffff800080a09000) created by:
[   26.837918]  kernel_clone+0x140/0x788
[   26.839711] 
[   26.840078] The buggy address belongs to the physical page:
[   26.841300] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d22
[   26.842099] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.843055] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   26.844190] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.845166] page dumped because: kasan: bad access detected
[   26.846006] 
[   26.846454] Memory state around the buggy address:
[   26.847203]  ffff800080a07b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.848342]  ffff800080a07c00: 00 00 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2
[   26.849249] >ffff800080a07c80: f2 f2 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00
[   26.849998]                                         ^
[   26.850578]  ffff800080a07d00: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00
[   26.851853]  ffff800080a07d80: f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   26.852721] ==================================================================

test log snippet boot parser 93

Home

[   23.173386] ==================================================================
[   23.174467] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   23.175690] Read of size 1 at addr fff00000c65fc000 by task kunit_try_catch/137
[   23.177095] 
[   23.177359] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   23.178167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.178574] Hardware name: linux,dummy-virt (DT)
[   23.180310] Call trace:
[   23.180836]  show_stack+0x20/0x38 (C)
[   23.181537]  dump_stack_lvl+0x8c/0xd0
[   23.182288]  print_report+0x118/0x5e0
[   23.182990]  kasan_report+0xc8/0x118
[   23.183524]  __asan_report_load1_noabort+0x20/0x30
[   23.184124]  kmalloc_large_uaf+0x2cc/0x2f8
[   23.184652]  kunit_try_run_case+0x14c/0x3d0
[   23.186175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.186972]  kthread+0x24c/0x2d0
[   23.187788]  ret_from_fork+0x10/0x20
[   23.188484] 
[   23.188961] The buggy address belongs to the physical page:
[   23.189674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065fc
[   23.190483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.191638] raw: 0bfffe0000000000 ffffc1ffc3198008 fff00000da4e7f80 0000000000000000
[   23.192569] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   23.193604] page dumped because: kasan: bad access detected
[   23.194406] 
[   23.194915] Memory state around the buggy address:
[   23.195927]  fff00000c65fbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.196577]  fff00000c65fbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.197223] >fff00000c65fc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.198613]                    ^
[   23.198988]  fff00000c65fc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.200268]  fff00000c65fc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.201348] ==================================================================

test log snippet boot parser 94

Home

[   26.392273] ==================================================================
[   26.393291] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   26.394041] Read of size 1 at addr fff00000c66f0000 by task kunit_try_catch/218
[   26.394651] 
[   26.395844] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   26.396997] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.397675] Hardware name: linux,dummy-virt (DT)
[   26.398403] Call trace:
[   26.399172]  show_stack+0x20/0x38 (C)
[   26.399866]  dump_stack_lvl+0x8c/0xd0
[   26.400610]  print_report+0x118/0x5e0
[   26.401270]  kasan_report+0xc8/0x118
[   26.401948]  __asan_report_load1_noabort+0x20/0x30
[   26.402716]  mempool_uaf_helper+0x314/0x340
[   26.403483]  mempool_kmalloc_large_uaf+0xbc/0x118
[   26.404386]  kunit_try_run_case+0x14c/0x3d0
[   26.405112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.405956]  kthread+0x24c/0x2d0
[   26.406605]  ret_from_fork+0x10/0x20
[   26.407381] 
[   26.407610] The buggy address belongs to the physical page:
[   26.408138] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f0
[   26.409482] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.410319] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.411485] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.412185] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.412891] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.413586] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.415216] head: 0bfffe0000000002 ffffc1ffc319bc01 ffffffffffffffff 0000000000000000
[   26.416431] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   26.417569] page dumped because: kasan: bad access detected
[   26.418414] 
[   26.418880] Memory state around the buggy address:
[   26.419684]  fff00000c66eff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.420633]  fff00000c66eff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.421502] >fff00000c66f0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.422234]                    ^
[   26.422661]  fff00000c66f0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.423848]  fff00000c66f0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.424761] ==================================================================

test log snippet boot parser 95

Home

[   26.504301] ==================================================================
[   26.505546] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   26.506412] Read of size 1 at addr fff00000c66dc000 by task kunit_try_catch/222
[   26.507085] 
[   26.507603] CPU: 0 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   26.509142] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.509808] Hardware name: linux,dummy-virt (DT)
[   26.511261] Call trace:
[   26.511921]  show_stack+0x20/0x38 (C)
[   26.512486]  dump_stack_lvl+0x8c/0xd0
[   26.513091]  print_report+0x118/0x5e0
[   26.513674]  kasan_report+0xc8/0x118
[   26.514223]  __asan_report_load1_noabort+0x20/0x30
[   26.514895]  mempool_uaf_helper+0x314/0x340
[   26.515542]  mempool_page_alloc_uaf+0xb8/0x118
[   26.516704]  kunit_try_run_case+0x14c/0x3d0
[   26.517337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.518045]  kthread+0x24c/0x2d0
[   26.518525]  ret_from_fork+0x10/0x20
[   26.519172] 
[   26.519506] The buggy address belongs to the physical page:
[   26.520151] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066dc
[   26.521152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.521973] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   26.523316] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.524315] page dumped because: kasan: bad access detected
[   26.524918] 
[   26.525221] Memory state around the buggy address:
[   26.526222]  fff00000c66dbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.527094]  fff00000c66dbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.527956] >fff00000c66dc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.528787]                    ^
[   26.529386]  fff00000c66dc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.530341]  fff00000c66dc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.531486] ==================================================================

test log snippet test parser 2

Home

------------[ cut here ]------------
[   45.539347] WARNING: CPU: 0 PID: 466 at mm/util.c:657 __kvmalloc_node_noprof+0x11c/0x124
[   45.543061] Modules linked in: crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[   45.547182] CPU: 0 UID: 0 PID: 466 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[   45.548455] Hardware name: linux,dummy-virt (DT)
[   45.549602] pstate: 23402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[   45.550644] pc : __kvmalloc_node_noprof+0x11c/0x124
[   45.550982] lr : __kvmalloc_node_noprof+0x50/0x124
[   45.551279] sp : ffff800080a53ce0
[   45.551517] x29: ffff800080a53cf0 x28: fff00000c0e35b40 x27: 0000000000000000
[   45.552279] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[   45.553197] x23: 0000000080001000 x22: 31bfa36ae295c980 x21: 0000000200001e00
[   45.553748] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[   45.554407] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   45.555313] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   45.556174] x11: 0000000000000040 x10: 34a6fab19f720800 x9 : 34a6fab19f720800
[   45.557097] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000
[   45.557830] x5 : 0000000000000000 x4 : ffff800080a53cb0 x3 : 0000000000000000
[   45.558588] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[   45.559550] Call trace:
[   45.560255]  __kvmalloc_node_noprof+0x11c/0x124 (P)
[   45.561206]  alloc_fdtable+0x74/0x118
[   45.561692]  expand_files+0x114/0x2e0
[   45.562112]  ksys_dup3+0x64/0xe8
[   45.562502]  __arm64_sys_dup3+0x20/0x30
[   45.563010]  invoke_syscall+0x40/0xf8
[   45.563434]  el0_svc_common+0xa8/0xd8
[   45.563845]  do_el0_svc+0x1c/0x28
[   45.564214]  el0_svc+0x38/0x68
[   45.564458]  el0t_64_sync_handler+0x78/0x108
[   45.564969]  el0t_64_sync+0x198/0x19c
[   45.565702] ---[ end trace 0000000000000000 ]---

test log snippet test parser 3

Home

------------[ cut here ]------------
[   41.899753] WARNING: CPU: 1 PID: 467 at mm/util.c:657 __kvmalloc_node_noprof+0x138/0x148
[   41.900944] Modules linked in: crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[   41.904817] CPU: 1 UID: 0 PID: 467 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[   41.906345] Hardware name: linux,dummy-virt (DT)
[   41.907415] pstate: 23402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[   41.908448] pc : __kvmalloc_node_noprof+0x138/0x148
[   41.909212] lr : __kvmalloc_node_noprof+0x64/0x148
[   41.909704] sp : ffff800080aebcd0
[   41.910387] x29: ffff800080aebce0 x28: fff00000c62ca480 x27: 0000000000000000
[   41.911637] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c013ec00
[   41.912933] x23: fff00000c013ec80 x22: d68fa1093c13b6bc x21: 0000000200001e00
[   41.913779] x20: 00000000ffffffff x19: 0000000000400cc0 x18: 0000000000000000
[   41.915021] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   41.916238] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   41.917295] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[   41.918609] x8 : 0000000000000001 x7 : 0000000000000001 x6 : 0000000000000005
[   41.919199] x5 : 0000000000000000 x4 : fff00000c62ca480 x3 : 0000000000000000
[   41.919993] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[   41.921287] Call trace:
[   41.922062]  __kvmalloc_node_noprof+0x138/0x148 (P)
[   41.923227]  alloc_fdtable+0x84/0x128
[   41.924119]  expand_files+0x78/0x2ec
[   41.924589]  ksys_dup3+0x60/0x120
[   41.924809]  __arm64_sys_dup3+0x20/0x30
[   41.925059]  invoke_syscall+0x48/0x10c
[   41.925298]  el0_svc_common.constprop.0+0x40/0xe0
[   41.925861]  do_el0_svc+0x1c/0x28
[   41.926721]  el0_svc+0x30/0xcc
[   41.927272]  el0t_64_sync_handler+0x10c/0x138
[   41.927949]  el0t_64_sync+0x198/0x19c
[   41.929054] ---[ end trace 0000000000000000 ]---