Build

Regressions (compared to v6.13-rc7-102-gce69b4019001)

qemu-arm64-protected, kvm-unit-tests

qemu-arm64, ltp-fs

qemu-arm64, kselftest-cgroup

Fixes (compared to v6.13-rc7-102-gce69b4019001)

qemu-arm64, kselftest-cgroup

qemu-arm64, ltp-syscalls

Boot Parser (compared to v6.13-rc7-102-gce69b4019001)

qemu-arm64, log-parser-boot

Test Parser (compared to v6.13-rc7-102-gce69b4019001)

qemu-arm64, log-parser-test

Test log snippets

test log snippet regressions 2

Home

timer-ptimer-busy-loop-interrupt-signal-pending fail

test log snippet regressions 3

Home

fs_fill fs_fill
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 35518ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 25611ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file4
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file4
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file4
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file4
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 34694ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 10324ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file2
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 16590ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 6960ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file0
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 29942ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 2492ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file0
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 8068ms

test log snippet regressions 4

Home

cgroup_test_freezer_test_cgfreezer_ptrace fail
cgroup_test_freezer_test_cgfreezer_ptraced pass

test log snippet boot parser 2

Home

[   49.905138] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[   49.906032] Modules linked in:
[   49.909913] CPU: 1 UID: 0 PID: 388 Comm: kunit_try_catch Tainted: G                 N 6.13.0-rc7 #1
[   49.911115] Tainted: [N]=TEST
[   49.911527] Hardware name: linux,dummy-virt (DT)
[   49.912348] pstate: 82402009 (Nzcv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   49.912941] pc : kunit_test_null_dereference+0x2c/0x114
[   49.915141] lr : kunit_generic_run_threadfn_adapter+0x84/0x104
[   49.915915] sp : ffff800080997dd0
[   49.916493] x29: ffff800080997de0 x28: 0000000000000000 x27: 1ffe000018ffc001
[   49.917910] x26: dfff800000000000 x25: ffffa01835508e14 x24: fff00000c7dcdca0
[   49.919204] x23: 1ffe000018fb9b81 x22: dfff800000000000 x21: dfff800000000000
[   49.919911] x20: ffffa0183551625c x19: fff00000c7dcdc08 x18: ffff800080097930
[   49.921079] x17: ffff80008009792c x16: 0000000000000000 x15: 0000000000000001
[   49.922221] x14: 1ffe000018ffc0f1 x13: 0000000000000000 x12: 0000000000000000
[   49.923625] x11: fffd800018ffc0f2 x10: dfff800000000000 x9 : 1ffe000018fb9b82
[   49.924704] x8 : 613d14029cd75600 x7 : ffffa018374cf9c0 x6 : 0000000000000003
[   49.925802] x5 : ffffa018374d35a0 x4 : 0000000000000001 x3 : ffffa0183735ad58
[   49.927124] x2 : 0000000000000001 x1 : 0000000000000001 x0 : ffff800080087af8
[   49.928458] Call trace:
[   49.929197]  kunit_test_null_dereference+0x2c/0x114 (P)
[   49.930200]  kunit_generic_run_threadfn_adapter+0x84/0x104
[   49.931324]  kthread+0x25c/0x35c
[   49.931868]  ret_from_fork+0x10/0x20
[   49.933319] Code: d2d00015 f9426508 f2fbfff5 f90007e8 (39c002a8) 
[   49.934406] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 3

Home

[   53.609672] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[   53.610700] Modules linked in:
[   53.614494] CPU: 0 UID: 0 PID: 387 Comm: kunit_try_catch Tainted: G                 N 6.13.0-rc7 #1
[   53.615687] Tainted: [N]=TEST
[   53.616147] Hardware name: linux,dummy-virt (DT)
[   53.617558] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   53.618436] pc : kunit_test_null_dereference+0x68/0x160
[   53.620376] lr : kunit_generic_run_threadfn_adapter+0x80/0xec
[   53.620967] sp : ffff800080fd7db0
[   53.621542] x29: ffff800080fd7e10 x28: 0000000000000000 x27: 0000000000000000
[   53.623094] x26: 0000000000000000 x25: fff00000c7f33780 x24: fff00000c7ca0000
[   53.624075] x23: fff00000c7cca700 x22: ffffa9f8489cc2c4 x21: fff00000c7cca708
[   53.625124] x20: 1ffff000101fafb6 x19: ffff800080087a10 x18: 0000000000000000
[   53.626153] x17: 1ffe00001b533168 x16: 0000000000000003 x15: ffffa9f84c5f1978
[   53.627161] x14: 0000000000000416 x13: 00000000f1f1f1f1 x12: fffd800018fe67e2
[   53.628559] x11: 1ffe000018fe67e1 x10: fffd800018fe67e1 x9 : dfff800000000000
[   53.629648] x8 : fff00000c7f33f0c x7 : 0000000000000001 x6 : 0000000041b58ab3
[   53.630734] x5 : ffff7000101fafb6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[   53.631741] x2 : dfff800000000000 x1 : fff00000c7f33780 x0 : ffff800080087a10
[   53.633384] Call trace:
[   53.634092]  kunit_test_null_dereference+0x68/0x160 (P)
[   53.634999]  kunit_generic_run_threadfn_adapter+0x80/0xec
[   53.635941]  kthread+0x2b4/0x338
[   53.636592]  ret_from_fork+0x10/0x20
[   53.638234] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[   53.639456] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 4

Home

[  151.302698] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[  151.304340] Modules linked in:
[  151.305399] CPU: 1 UID: 0 PID: 620 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[  151.308118] Tainted: [B]=BAD_PAGE, [N]=TEST
[  151.308749] Hardware name: linux,dummy-virt (DT)
[  151.309782] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  151.310722] pc : kunit_test_null_dereference+0x70/0x170
[  151.311992] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  151.313151] sp : ffff8000832b7dc0
[  151.313865] x29: ffff8000832b7e20 x28: 0000000000000000 x27: 0000000000000000
[  151.315450] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c6935480
[  151.316923] x23: ffffb13a575c71b0 x22: ffffb13a575cfd70 x21: fff00000c6935488
[  151.318279] x20: 1ffff00010656fb8 x19: ffff8000800879f0 x18: 000000008f91b15b
[  151.319787] x17: 0000000000000001 x16: 0000000000000100 x15: 0000000077bc7169
[  151.320863] x14: 1ffe00001b4a0d78 x13: fff00000da506c98 x12: fffd800019958b3a
[  151.322043] x11: 1ffe000019958b39 x10: fffd800019958b39 x9 : ffffb13a575c7238
[  151.323128] x8 : ffff8000832b7cb8 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  151.324146] x5 : ffff700010656fb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  151.325311] x2 : dfff800000000000 x1 : fff00000ccac5100 x0 : ffff8000800879f0
[  151.327628] Call trace:
[  151.328134]  kunit_test_null_dereference+0x70/0x170 (P)
[  151.328805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  151.329477]  kthread+0x24c/0x2d0
[  151.330181]  ret_from_fork+0x10/0x20
[  151.331628] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  151.332879] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 5

Home

[   39.193956] ==================================================================
[   39.195695] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   39.196944] Read of size 1 at addr ffff800080b37bdf by task kunit_try_catch/239
[   39.197719] 
[   39.198384] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   39.200333] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.201437] Hardware name: linux,dummy-virt (DT)
[   39.202451] Call trace:
[   39.203628]  show_stack+0x20/0x38 (C)
[   39.204449]  dump_stack_lvl+0x8c/0xd0
[   39.205243]  print_report+0x2fc/0x5e0
[   39.206170]  kasan_report+0xc8/0x118
[   39.207487]  __asan_report_load1_noabort+0x20/0x30
[   39.208241]  kasan_alloca_oob_left+0x2b8/0x310
[   39.208905]  kunit_try_run_case+0x14c/0x3d0
[   39.210176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.210993]  kthread+0x24c/0x2d0
[   39.212164]  ret_from_fork+0x10/0x20
[   39.212698] 
[   39.212969] The buggy address belongs to stack of task kunit_try_catch/239
[   39.213889] 
[   39.214272] The buggy address belongs to the virtual mapping at
[   39.214272]  [ffff800080b30000, ffff800080b39000) created by:
[   39.214272]  kernel_clone+0x140/0x788
[   39.217541] 
[   39.218134] The buggy address belongs to the physical page:
[   39.219161] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a44
[   39.220565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.221635] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   39.222706] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.223804] page dumped because: kasan: bad access detected
[   39.224991] 
[   39.225400] Memory state around the buggy address:
[   39.226370]  ffff800080b37a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.227862]  ffff800080b37b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.229069] >ffff800080b37b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   39.230090]                                                     ^
[   39.231212]  ffff800080b37c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[   39.232635]  ffff800080b37c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   39.233553] ==================================================================

test log snippet boot parser 6

Home

[   39.244820] ==================================================================
[   39.246080] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2e4/0x348
[   39.247271] Read of size 1 at addr ffff800080b77bea by task kunit_try_catch/241
[   39.249407] 
[   39.250261] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   39.252076] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.252759] Hardware name: linux,dummy-virt (DT)
[   39.253295] Call trace:
[   39.253804]  show_stack+0x20/0x38 (C)
[   39.254508]  dump_stack_lvl+0x8c/0xd0
[   39.255154]  print_report+0x2fc/0x5e0
[   39.255754]  kasan_report+0xc8/0x118
[   39.256362]  __asan_report_load1_noabort+0x20/0x30
[   39.257058]  kasan_alloca_oob_right+0x2e4/0x348
[   39.258456]  kunit_try_run_case+0x14c/0x3d0
[   39.259146]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.260235]  kthread+0x24c/0x2d0
[   39.260817]  ret_from_fork+0x10/0x20
[   39.261560] 
[   39.261878] The buggy address belongs to stack of task kunit_try_catch/241
[   39.263345] 
[   39.263907] The buggy address belongs to the virtual mapping at
[   39.263907]  [ffff800080b70000, ffff800080b79000) created by:
[   39.263907]  kernel_clone+0x140/0x788
[   39.265877] 
[   39.266388] The buggy address belongs to the physical page:
[   39.267824] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106aa2
[   39.268744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.269214] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   39.269837] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.270454] page dumped because: kasan: bad access detected
[   39.271859] 
[   39.272179] Memory state around the buggy address:
[   39.272672]  ffff800080b77a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.273409]  ffff800080b77b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.274912] >ffff800080b77b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   39.276421]                                                           ^
[   39.277719]  ffff800080b77c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[   39.278806]  ffff800080b77c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   39.279867] ==================================================================

test log snippet boot parser 7

Home

[   36.626087] ==================================================================
[   36.627885] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   36.629081] Free of addr fff00000c5a8fc00 by task kunit_try_catch/180
[   36.629817] 
[   36.631408] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   36.633082] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.633987] Hardware name: linux,dummy-virt (DT)
[   36.634645] Call trace:
[   36.635230]  show_stack+0x20/0x38 (C)
[   36.636226]  dump_stack_lvl+0x8c/0xd0
[   36.636942]  print_report+0x118/0x5e0
[   36.637841]  kasan_report_invalid_free+0xb0/0xd8
[   36.638722]  check_slab_allocation+0xd4/0x108
[   36.640048]  __kasan_slab_pre_free+0x2c/0x48
[   36.641578]  kfree+0xe8/0x3c8
[   36.642563]  kfree_sensitive+0x3c/0xb0
[   36.643844]  kmalloc_double_kzfree+0x168/0x308
[   36.645138]  kunit_try_run_case+0x14c/0x3d0
[   36.646201]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.647563]  kthread+0x24c/0x2d0
[   36.648148]  ret_from_fork+0x10/0x20
[   36.649168] 
[   36.649634] Allocated by task 180:
[   36.650485]  kasan_save_stack+0x3c/0x68
[   36.651620]  kasan_save_track+0x20/0x40
[   36.652312]  kasan_save_alloc_info+0x40/0x58
[   36.652963]  __kasan_kmalloc+0xd4/0xd8
[   36.653549]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.654179]  kmalloc_double_kzfree+0xb8/0x308
[   36.654813]  kunit_try_run_case+0x14c/0x3d0
[   36.656200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.657230]  kthread+0x24c/0x2d0
[   36.657831]  ret_from_fork+0x10/0x20
[   36.658908] 
[   36.659725] Freed by task 180:
[   36.660159]  kasan_save_stack+0x3c/0x68
[   36.660494]  kasan_save_track+0x20/0x40
[   36.660892]  kasan_save_free_info+0x4c/0x78
[   36.661203]  __kasan_slab_free+0x6c/0x98
[   36.661571]  kfree+0x114/0x3c8
[   36.662885]  kfree_sensitive+0x80/0xb0
[   36.663759]  kmalloc_double_kzfree+0x11c/0x308
[   36.664398]  kunit_try_run_case+0x14c/0x3d0
[   36.665565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.666418]  kthread+0x24c/0x2d0
[   36.667355]  ret_from_fork+0x10/0x20
[   36.668464] 
[   36.669078] The buggy address belongs to the object at fff00000c5a8fc00
[   36.669078]  which belongs to the cache kmalloc-16 of size 16
[   36.670846] The buggy address is located 0 bytes inside of
[   36.670846]  16-byte region [fff00000c5a8fc00, fff00000c5a8fc10)
[   36.672845] 
[   36.673502] The buggy address belongs to the physical page:
[   36.674466] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8f
[   36.676030] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.677730] page_type: f5(slab)
[   36.678215] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   36.679875] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   36.681099] page dumped because: kasan: bad access detected
[   36.682018] 
[   36.682353] Memory state around the buggy address:
[   36.683007]  fff00000c5a8fb00: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   36.684700]  fff00000c5a8fb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   36.685503] >fff00000c5a8fc00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.686399]                    ^
[   36.687144]  fff00000c5a8fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.688585]  fff00000c5a8fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.689724] ==================================================================

test log snippet boot parser 8

Home

[   37.316701] ==================================================================
[   37.318489] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   37.319333] Free of addr fff00000c61c5000 by task kunit_try_catch/197
[   37.320324] 
[   37.320721] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   37.323017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.323698] Hardware name: linux,dummy-virt (DT)
[   37.324387] Call trace:
[   37.324862]  show_stack+0x20/0x38 (C)
[   37.325468]  dump_stack_lvl+0x8c/0xd0
[   37.326538]  print_report+0x118/0x5e0
[   37.327046]  kasan_report_invalid_free+0xb0/0xd8
[   37.328153]  check_slab_allocation+0xd4/0x108
[   37.329102]  __kasan_slab_pre_free+0x2c/0x48
[   37.330189]  kmem_cache_free+0xf0/0x470
[   37.330700]  kmem_cache_double_free+0x190/0x3c8
[   37.332285]  kunit_try_run_case+0x14c/0x3d0
[   37.333220]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.334238]  kthread+0x24c/0x2d0
[   37.334988]  ret_from_fork+0x10/0x20
[   37.335490] 
[   37.335978] Allocated by task 197:
[   37.336352]  kasan_save_stack+0x3c/0x68
[   37.336811]  kasan_save_track+0x20/0x40
[   37.337573]  kasan_save_alloc_info+0x40/0x58
[   37.338459]  __kasan_slab_alloc+0xa8/0xb0
[   37.339119]  kmem_cache_alloc_noprof+0x108/0x398
[   37.339753]  kmem_cache_double_free+0x12c/0x3c8
[   37.340353]  kunit_try_run_case+0x14c/0x3d0
[   37.341022]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.341639]  kthread+0x24c/0x2d0
[   37.342198]  ret_from_fork+0x10/0x20
[   37.344323] 
[   37.344803] Freed by task 197:
[   37.345263]  kasan_save_stack+0x3c/0x68
[   37.345881]  kasan_save_track+0x20/0x40
[   37.346586]  kasan_save_free_info+0x4c/0x78
[   37.347719]  __kasan_slab_free+0x6c/0x98
[   37.348404]  kmem_cache_free+0x118/0x470
[   37.349112]  kmem_cache_double_free+0x140/0x3c8
[   37.349929]  kunit_try_run_case+0x14c/0x3d0
[   37.351202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.352302]  kthread+0x24c/0x2d0
[   37.352742]  ret_from_fork+0x10/0x20
[   37.353636] 
[   37.354075] The buggy address belongs to the object at fff00000c61c5000
[   37.354075]  which belongs to the cache test_cache of size 200
[   37.356334] The buggy address is located 0 bytes inside of
[   37.356334]  200-byte region [fff00000c61c5000, fff00000c61c50c8)
[   37.357848] 
[   37.358240] The buggy address belongs to the physical page:
[   37.359159] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061c5
[   37.360235] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.361481] page_type: f5(slab)
[   37.362122] raw: 0bfffe0000000000 fff00000c5a86140 dead000000000122 0000000000000000
[   37.363939] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   37.365507] page dumped because: kasan: bad access detected
[   37.366136] 
[   37.366558] Memory state around the buggy address:
[   37.368290]  fff00000c61c4f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.369182]  fff00000c61c4f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.371122] >fff00000c61c5000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.372492]                    ^
[   37.373077]  fff00000c61c5080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   37.373962]  fff00000c61c5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.375143] ==================================================================

test log snippet boot parser 9

Home

[   38.797512] ==================================================================
[   38.799742] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   38.801440] Free of addr fff00000c69d9800 by task kunit_try_catch/223
[   38.802652] 
[   38.803154] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   38.804340] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.805546] Hardware name: linux,dummy-virt (DT)
[   38.806145] Call trace:
[   38.806500]  show_stack+0x20/0x38 (C)
[   38.807210]  dump_stack_lvl+0x8c/0xd0
[   38.808416]  print_report+0x118/0x5e0
[   38.809080]  kasan_report_invalid_free+0xb0/0xd8
[   38.809857]  check_slab_allocation+0xd4/0x108
[   38.810595]  __kasan_mempool_poison_object+0x78/0x150
[   38.811665]  mempool_free+0x28c/0x328
[   38.812232]  mempool_double_free_helper+0x150/0x2e0
[   38.812981]  mempool_kmalloc_double_free+0xb8/0x110
[   38.813811]  kunit_try_run_case+0x14c/0x3d0
[   38.814579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.815375]  kthread+0x24c/0x2d0
[   38.816003]  ret_from_fork+0x10/0x20
[   38.816689] 
[   38.816999] Allocated by task 223:
[   38.818217]  kasan_save_stack+0x3c/0x68
[   38.819354]  kasan_save_track+0x20/0x40
[   38.820200]  kasan_save_alloc_info+0x40/0x58
[   38.820715]  __kasan_mempool_unpoison_object+0x11c/0x180
[   38.821900]  remove_element+0x130/0x1f8
[   38.822471]  mempool_alloc_preallocated+0x58/0xc0
[   38.823542]  mempool_double_free_helper+0x94/0x2e0
[   38.824289]  mempool_kmalloc_double_free+0xb8/0x110
[   38.825149]  kunit_try_run_case+0x14c/0x3d0
[   38.825813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.826564]  kthread+0x24c/0x2d0
[   38.827395]  ret_from_fork+0x10/0x20
[   38.828086] 
[   38.828505] Freed by task 223:
[   38.829251]  kasan_save_stack+0x3c/0x68
[   38.829911]  kasan_save_track+0x20/0x40
[   38.830600]  kasan_save_free_info+0x4c/0x78
[   38.831445]  __kasan_mempool_poison_object+0xc0/0x150
[   38.832185]  mempool_free+0x28c/0x328
[   38.832724]  mempool_double_free_helper+0x100/0x2e0
[   38.834045]  mempool_kmalloc_double_free+0xb8/0x110
[   38.835162]  kunit_try_run_case+0x14c/0x3d0
[   38.835784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.836472]  kthread+0x24c/0x2d0
[   38.837071]  ret_from_fork+0x10/0x20
[   38.837697] 
[   38.838007] The buggy address belongs to the object at fff00000c69d9800
[   38.838007]  which belongs to the cache kmalloc-128 of size 128
[   38.840676] The buggy address is located 0 bytes inside of
[   38.840676]  128-byte region [fff00000c69d9800, fff00000c69d9880)
[   38.842006] 
[   38.842494] The buggy address belongs to the physical page:
[   38.843353] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069d9
[   38.844437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.845728] page_type: f5(slab)
[   38.846247] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   38.847654] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   38.848362] page dumped because: kasan: bad access detected
[   38.849098] 
[   38.849387] Memory state around the buggy address:
[   38.850793]  fff00000c69d9700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.852498]  fff00000c69d9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.853402] >fff00000c69d9800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.854188]                    ^
[   38.854798]  fff00000c69d9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.856676]  fff00000c69d9900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.857460] ==================================================================

test log snippet boot parser 10

Home

[   38.918633] ==================================================================
[   38.921066] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   38.921799] Free of addr fff00000c6a28000 by task kunit_try_catch/227
[   38.922565] 
[   38.923039] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   38.925730] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.926990] Hardware name: linux,dummy-virt (DT)
[   38.927676] Call trace:
[   38.928046]  show_stack+0x20/0x38 (C)
[   38.928759]  dump_stack_lvl+0x8c/0xd0
[   38.929679]  print_report+0x118/0x5e0
[   38.930212]  kasan_report_invalid_free+0xb0/0xd8
[   38.931228]  __kasan_mempool_poison_pages+0xe0/0xe8
[   38.931925]  mempool_free+0x24c/0x328
[   38.932812]  mempool_double_free_helper+0x150/0x2e0
[   38.934041]  mempool_page_alloc_double_free+0xb4/0x110
[   38.935122]  kunit_try_run_case+0x14c/0x3d0
[   38.935658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.936217]  kthread+0x24c/0x2d0
[   38.937177]  ret_from_fork+0x10/0x20
[   38.938018] 
[   38.938549] The buggy address belongs to the physical page:
[   38.939243] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a28
[   38.940798] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.942163] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   38.943994] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   38.945122] page dumped because: kasan: bad access detected
[   38.945756] 
[   38.946172] Memory state around the buggy address:
[   38.947369]  fff00000c6a27f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.948791]  fff00000c6a27f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.950699] >fff00000c6a28000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.951875]                    ^
[   38.952264]  fff00000c6a28080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.952874]  fff00000c6a28100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.954377] ==================================================================

test log snippet boot parser 11

Home

[   38.868645] ==================================================================
[   38.869958] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   38.870884] Free of addr fff00000c6a5c000 by task kunit_try_catch/225
[   38.871670] 
[   38.872085] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   38.873169] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.874489] Hardware name: linux,dummy-virt (DT)
[   38.876097] Call trace:
[   38.876901]  show_stack+0x20/0x38 (C)
[   38.877961]  dump_stack_lvl+0x8c/0xd0
[   38.878558]  print_report+0x118/0x5e0
[   38.879231]  kasan_report_invalid_free+0xb0/0xd8
[   38.880407]  __kasan_mempool_poison_object+0x14c/0x150
[   38.881238]  mempool_free+0x28c/0x328
[   38.881873]  mempool_double_free_helper+0x150/0x2e0
[   38.882592]  mempool_kmalloc_large_double_free+0xb8/0x110
[   38.883736]  kunit_try_run_case+0x14c/0x3d0
[   38.884679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.885493]  kthread+0x24c/0x2d0
[   38.886092]  ret_from_fork+0x10/0x20
[   38.886757] 
[   38.887147] The buggy address belongs to the physical page:
[   38.888355] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a5c
[   38.889842] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   38.891310] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   38.892244] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.893308] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   38.894298] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.895319] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   38.896633] head: 0bfffe0000000002 ffffc1ffc31a9701 ffffffffffffffff 0000000000000000
[   38.897747] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   38.899147] page dumped because: kasan: bad access detected
[   38.899971] 
[   38.900504] Memory state around the buggy address:
[   38.901297]  fff00000c6a5bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.902267]  fff00000c6a5bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.903757] >fff00000c6a5c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.904921]                    ^
[   38.905454]  fff00000c6a5c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.906489]  fff00000c6a5c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.907876] ==================================================================

test log snippet boot parser 12

Home

[   39.084585] ==================================================================
[   39.086087] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   39.087153] Read of size 1 at addr ffffb13a5dab202d by task kunit_try_catch/233
[   39.087948] 
[   39.088508] CPU: 1 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   39.089816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.090314] Hardware name: linux,dummy-virt (DT)
[   39.090988] Call trace:
[   39.091474]  show_stack+0x20/0x38 (C)
[   39.092068]  dump_stack_lvl+0x8c/0xd0
[   39.092667]  print_report+0x2fc/0x5e0
[   39.093197]  kasan_report+0xc8/0x118
[   39.093928]  __asan_report_load1_noabort+0x20/0x30
[   39.094475]  kasan_global_oob_right+0x230/0x270
[   39.095285]  kunit_try_run_case+0x14c/0x3d0
[   39.095979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.096806]  kthread+0x24c/0x2d0
[   39.097436]  ret_from_fork+0x10/0x20
[   39.098037] 
[   39.098456] The buggy address belongs to the variable:
[   39.099235]  global_array+0xd/0x40
[   39.099879] 
[   39.100325] The buggy address belongs to the virtual mapping at
[   39.100325]  [ffffb13a5be10000, ffffb13a5db71000) created by:
[   39.100325]  paging_init+0x668/0x7c8
[   39.102477] 
[   39.103246] The buggy address belongs to the physical page:
[   39.104086] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x478b2
[   39.105058] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   39.106012] raw: 03fffe0000002000 ffffc1ffc01e2c88 ffffc1ffc01e2c88 0000000000000000
[   39.107046] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.107983] page dumped because: kasan: bad access detected
[   39.108769] 
[   39.109171] Memory state around the buggy address:
[   39.109721]  ffffb13a5dab1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.110719]  ffffb13a5dab1f80: 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9 f9
[   39.111575] >ffffb13a5dab2000: f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9
[   39.112424]                                   ^
[   39.113098]  ffffb13a5dab2080: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9
[   39.114027]  ffffb13a5dab2100: f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00
[   39.114901] ==================================================================

test log snippet boot parser 13

Home

[   34.772690] ==================================================================
[   34.774407] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   34.776854] Free of addr fff00000c6814001 by task kunit_try_catch/138
[   34.777755] 
[   34.778252] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   34.779452] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.780845] Hardware name: linux,dummy-virt (DT)
[   34.781507] Call trace:
[   34.782262]  show_stack+0x20/0x38 (C)
[   34.783177]  dump_stack_lvl+0x8c/0xd0
[   34.784300]  print_report+0x118/0x5e0
[   34.784940]  kasan_report_invalid_free+0xb0/0xd8
[   34.785645]  __kasan_kfree_large+0x5c/0xa8
[   34.786275]  free_large_kmalloc+0x58/0x140
[   34.787258]  kfree+0x270/0x3c8
[   34.787920]  kmalloc_large_invalid_free+0x108/0x270
[   34.788594]  kunit_try_run_case+0x14c/0x3d0
[   34.789343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.790239]  kthread+0x24c/0x2d0
[   34.790906]  ret_from_fork+0x10/0x20
[   34.792090] 
[   34.792693] The buggy address belongs to the physical page:
[   34.793610] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106814
[   34.794637] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.796128] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.797054] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.798362] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.799167] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.800906] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.801753] head: 0bfffe0000000002 ffffc1ffc31a0501 ffffffffffffffff 0000000000000000
[   34.802252] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   34.803129] page dumped because: kasan: bad access detected
[   34.804313] 
[   34.804821] Memory state around the buggy address:
[   34.805933]  fff00000c6813f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.807730]  fff00000c6813f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.809286] >fff00000c6814000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.810611]                    ^
[   34.811146]  fff00000c6814080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.812226]  fff00000c6814100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.813086] ==================================================================

test log snippet boot parser 14

Home

[   37.400708] ==================================================================
[   37.401938] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3b8
[   37.402996] Free of addr fff00000c61c2001 by task kunit_try_catch/199
[   37.403798] 
[   37.404137] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   37.406102] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.406711] Hardware name: linux,dummy-virt (DT)
[   37.408604] Call trace:
[   37.409011]  show_stack+0x20/0x38 (C)
[   37.409782]  dump_stack_lvl+0x8c/0xd0
[   37.410410]  print_report+0x118/0x5e0
[   37.411595]  kasan_report_invalid_free+0xb0/0xd8
[   37.412260]  check_slab_allocation+0xfc/0x108
[   37.413113]  __kasan_slab_pre_free+0x2c/0x48
[   37.413714]  kmem_cache_free+0xf0/0x470
[   37.414403]  kmem_cache_invalid_free+0x184/0x3b8
[   37.415612]  kunit_try_run_case+0x14c/0x3d0
[   37.416194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.417374]  kthread+0x24c/0x2d0
[   37.418574]  ret_from_fork+0x10/0x20
[   37.419584] 
[   37.420333] Allocated by task 199:
[   37.420808]  kasan_save_stack+0x3c/0x68
[   37.421646]  kasan_save_track+0x20/0x40
[   37.422193]  kasan_save_alloc_info+0x40/0x58
[   37.423391]  __kasan_slab_alloc+0xa8/0xb0
[   37.423942]  kmem_cache_alloc_noprof+0x108/0x398
[   37.424683]  kmem_cache_invalid_free+0x12c/0x3b8
[   37.425455]  kunit_try_run_case+0x14c/0x3d0
[   37.426989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.427843]  kthread+0x24c/0x2d0
[   37.428667]  ret_from_fork+0x10/0x20
[   37.429389] 
[   37.429756] The buggy address belongs to the object at fff00000c61c2000
[   37.429756]  which belongs to the cache test_cache of size 200
[   37.431816] The buggy address is located 1 bytes inside of
[   37.431816]  200-byte region [fff00000c61c2000, fff00000c61c20c8)
[   37.434845] 
[   37.435739] The buggy address belongs to the physical page:
[   37.436972] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061c2
[   37.438146] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.439255] page_type: f5(slab)
[   37.440143] raw: 0bfffe0000000000 fff00000c5a86280 dead000000000122 0000000000000000
[   37.442328] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   37.444307] page dumped because: kasan: bad access detected
[   37.445157] 
[   37.445756] Memory state around the buggy address:
[   37.446909]  fff00000c61c1f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.448770]  fff00000c61c1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.451000] >fff00000c61c2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.452577]                    ^
[   37.453657]  fff00000c61c2080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   37.455462]  fff00000c61c2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.457436] ==================================================================

test log snippet boot parser 15

Home

[   38.974681] ==================================================================
[   38.976821] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   38.978080] Free of addr fff00000c69d9e01 by task kunit_try_catch/229
[   38.979916] 
[   38.980427] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   38.982287] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.983550] Hardware name: linux,dummy-virt (DT)
[   38.984252] Call trace:
[   38.984789]  show_stack+0x20/0x38 (C)
[   38.985547]  dump_stack_lvl+0x8c/0xd0
[   38.986572]  print_report+0x118/0x5e0
[   38.987626]  kasan_report_invalid_free+0xb0/0xd8
[   38.988775]  check_slab_allocation+0xfc/0x108
[   38.989844]  __kasan_mempool_poison_object+0x78/0x150
[   38.990621]  mempool_free+0x28c/0x328
[   38.992016]  mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   38.992660]  mempool_kmalloc_invalid_free+0xb8/0x110
[   38.993618]  kunit_try_run_case+0x14c/0x3d0
[   38.994442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.995646]  kthread+0x24c/0x2d0
[   38.996301]  ret_from_fork+0x10/0x20
[   38.996947] 
[   38.997399] Allocated by task 229:
[   38.997884]  kasan_save_stack+0x3c/0x68
[   38.998458]  kasan_save_track+0x20/0x40
[   38.998984]  kasan_save_alloc_info+0x40/0x58
[   38.999731]  __kasan_mempool_unpoison_object+0x11c/0x180
[   39.000932]  remove_element+0x130/0x1f8
[   39.001553]  mempool_alloc_preallocated+0x58/0xc0
[   39.002432]  mempool_kmalloc_invalid_free_helper+0x94/0x2a0
[   39.003836]  mempool_kmalloc_invalid_free+0xb8/0x110
[   39.004748]  kunit_try_run_case+0x14c/0x3d0
[   39.005578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.006460]  kthread+0x24c/0x2d0
[   39.007719]  ret_from_fork+0x10/0x20
[   39.008215] 
[   39.008574] The buggy address belongs to the object at fff00000c69d9e00
[   39.008574]  which belongs to the cache kmalloc-128 of size 128
[   39.009820] The buggy address is located 1 bytes inside of
[   39.009820]  128-byte region [fff00000c69d9e00, fff00000c69d9e80)
[   39.011112] 
[   39.011602] The buggy address belongs to the physical page:
[   39.012277] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069d9
[   39.013969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.015190] page_type: f5(slab)
[   39.015912] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   39.016929] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   39.017925] page dumped because: kasan: bad access detected
[   39.018730] 
[   39.019725] Memory state around the buggy address:
[   39.020488]  fff00000c69d9d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   39.021479]  fff00000c69d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.022468] >fff00000c69d9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.023701]                    ^
[   39.023988]  fff00000c69d9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.024412]  fff00000c69d9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.024851] ==================================================================

test log snippet boot parser 16

Home

[   39.038605] ==================================================================
[   39.039971] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   39.041179] Free of addr fff00000c6a28001 by task kunit_try_catch/231
[   39.042710] 
[   39.043097] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   39.044299] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.045016] Hardware name: linux,dummy-virt (DT)
[   39.045883] Call trace:
[   39.046329]  show_stack+0x20/0x38 (C)
[   39.047126]  dump_stack_lvl+0x8c/0xd0
[   39.047884]  print_report+0x118/0x5e0
[   39.048697]  kasan_report_invalid_free+0xb0/0xd8
[   39.049568]  __kasan_mempool_poison_object+0xfc/0x150
[   39.050250]  mempool_free+0x28c/0x328
[   39.050904]  mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   39.051709]  mempool_kmalloc_large_invalid_free+0xb8/0x110
[   39.052104]  kunit_try_run_case+0x14c/0x3d0
[   39.052465]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.053422]  kthread+0x24c/0x2d0
[   39.054011]  ret_from_fork+0x10/0x20
[   39.054995] 
[   39.055429] The buggy address belongs to the physical page:
[   39.056150] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a28
[   39.057645] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   39.058686] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   39.059693] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   39.060539] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.061557] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   39.062456] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.063492] head: 0bfffe0000000002 ffffc1ffc31a8a01 ffffffffffffffff 0000000000000000
[   39.064447] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   39.065337] page dumped because: kasan: bad access detected
[   39.066037] 
[   39.066405] Memory state around the buggy address:
[   39.067138]  fff00000c6a27f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.068190]  fff00000c6a27f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.069087] >fff00000c6a28000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.070090]                    ^
[   39.070563]  fff00000c6a28080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.071336]  fff00000c6a28100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.072196] ==================================================================

test log snippet boot parser 17

Home

[   36.231855] ==================================================================
[   36.233467] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   36.234416] Read of size 18446744073709551614 at addr fff00000c618f984 by task kunit_try_catch/168
[   36.235941] 
[   36.236389] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   36.237615] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.238169] Hardware name: linux,dummy-virt (DT)
[   36.238693] Call trace:
[   36.239218]  show_stack+0x20/0x38 (C)
[   36.239880]  dump_stack_lvl+0x8c/0xd0
[   36.240460]  print_report+0x118/0x5e0
[   36.241291]  kasan_report+0xc8/0x118
[   36.242060]  kasan_check_range+0x100/0x1a8
[   36.242783]  __asan_memmove+0x3c/0x98
[   36.243362]  kmalloc_memmove_negative_size+0x154/0x2e0
[   36.244093]  kunit_try_run_case+0x14c/0x3d0
[   36.244836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.245582]  kthread+0x24c/0x2d0
[   36.246286]  ret_from_fork+0x10/0x20
[   36.246908] 
[   36.247211] Allocated by task 168:
[   36.247820]  kasan_save_stack+0x3c/0x68
[   36.248490]  kasan_save_track+0x20/0x40
[   36.249304]  kasan_save_alloc_info+0x40/0x58
[   36.249892]  __kasan_kmalloc+0xd4/0xd8
[   36.250628]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.251360]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   36.252175]  kunit_try_run_case+0x14c/0x3d0
[   36.252844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.253683]  kthread+0x24c/0x2d0
[   36.254161]  ret_from_fork+0x10/0x20
[   36.254847] 
[   36.255259] The buggy address belongs to the object at fff00000c618f980
[   36.255259]  which belongs to the cache kmalloc-64 of size 64
[   36.256706] The buggy address is located 4 bytes inside of
[   36.256706]  64-byte region [fff00000c618f980, fff00000c618f9c0)
[   36.258151] 
[   36.258565] The buggy address belongs to the physical page:
[   36.259238] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10618f
[   36.260332] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.261162] page_type: f5(slab)
[   36.261698] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.262874] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.263785] page dumped because: kasan: bad access detected
[   36.264569] 
[   36.264847] Memory state around the buggy address:
[   36.265563]  fff00000c618f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.266595]  fff00000c618f900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.267487] >fff00000c618f980: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.268367]                    ^
[   36.268917]  fff00000c618fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.269862]  fff00000c618fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.270693] ==================================================================

test log snippet boot parser 18

Home

[   43.593741] ==================================================================
[   43.596736] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   43.597840] Read of size 8 at addr fff00000c69d2a78 by task kunit_try_catch/269
[   43.598831] 
[   43.599355] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   43.600634] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.601441] Hardware name: linux,dummy-virt (DT)
[   43.601974] Call trace:
[   43.602428]  show_stack+0x20/0x38 (C)
[   43.602943]  dump_stack_lvl+0x8c/0xd0
[   43.603776]  print_report+0x118/0x5e0
[   43.604937]  kasan_report+0xc8/0x118
[   43.605583]  __asan_report_load8_noabort+0x20/0x30
[   43.606246]  copy_to_kernel_nofault+0x204/0x250
[   43.607784]  copy_to_kernel_nofault_oob+0x158/0x418
[   43.608594]  kunit_try_run_case+0x14c/0x3d0
[   43.609160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.610086]  kthread+0x24c/0x2d0
[   43.610639]  ret_from_fork+0x10/0x20
[   43.611312] 
[   43.611723] Allocated by task 269:
[   43.612500]  kasan_save_stack+0x3c/0x68
[   43.613597]  kasan_save_track+0x20/0x40
[   43.614480]  kasan_save_alloc_info+0x40/0x58
[   43.615233]  __kasan_kmalloc+0xd4/0xd8
[   43.616304]  __kmalloc_cache_noprof+0x15c/0x3c0
[   43.616862]  copy_to_kernel_nofault_oob+0xc8/0x418
[   43.617885]  kunit_try_run_case+0x14c/0x3d0
[   43.619438]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.620724]  kthread+0x24c/0x2d0
[   43.621385]  ret_from_fork+0x10/0x20
[   43.622031] 
[   43.622345] The buggy address belongs to the object at fff00000c69d2a00
[   43.622345]  which belongs to the cache kmalloc-128 of size 128
[   43.623919] The buggy address is located 0 bytes to the right of
[   43.623919]  allocated 120-byte region [fff00000c69d2a00, fff00000c69d2a78)
[   43.625512] 
[   43.626240] The buggy address belongs to the physical page:
[   43.627090] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069d2
[   43.628460] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.629507] page_type: f5(slab)
[   43.630068] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   43.631754] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   43.632468] page dumped because: kasan: bad access detected
[   43.633613] 
[   43.634037] Memory state around the buggy address:
[   43.634770]  fff00000c69d2900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.636400]  fff00000c69d2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.637366] >fff00000c69d2a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   43.638045]                                                                 ^
[   43.639986]  fff00000c69d2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.641328]  fff00000c69d2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.642285] ==================================================================

test log snippet boot parser 19

Home

[   43.646087] ==================================================================
[   43.647461] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   43.649255] Write of size 8 at addr fff00000c69d2a78 by task kunit_try_catch/269
[   43.650474] 
[   43.651205] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   43.652629] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.653218] Hardware name: linux,dummy-virt (DT)
[   43.653973] Call trace:
[   43.654359]  show_stack+0x20/0x38 (C)
[   43.655177]  dump_stack_lvl+0x8c/0xd0
[   43.656374]  print_report+0x118/0x5e0
[   43.657070]  kasan_report+0xc8/0x118
[   43.657827]  kasan_check_range+0x100/0x1a8
[   43.658591]  __kasan_check_write+0x20/0x30
[   43.659186]  copy_to_kernel_nofault+0x8c/0x250
[   43.660309]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   43.660998]  kunit_try_run_case+0x14c/0x3d0
[   43.661799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.662580]  kthread+0x24c/0x2d0
[   43.663474]  ret_from_fork+0x10/0x20
[   43.664005] 
[   43.664470] Allocated by task 269:
[   43.665186]  kasan_save_stack+0x3c/0x68
[   43.665902]  kasan_save_track+0x20/0x40
[   43.666463]  kasan_save_alloc_info+0x40/0x58
[   43.667437]  __kasan_kmalloc+0xd4/0xd8
[   43.667910]  __kmalloc_cache_noprof+0x15c/0x3c0
[   43.669566]  copy_to_kernel_nofault_oob+0xc8/0x418
[   43.671162]  kunit_try_run_case+0x14c/0x3d0
[   43.671571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.671965]  kthread+0x24c/0x2d0
[   43.672234]  ret_from_fork+0x10/0x20
[   43.672629] 
[   43.673471] The buggy address belongs to the object at fff00000c69d2a00
[   43.673471]  which belongs to the cache kmalloc-128 of size 128
[   43.676251] The buggy address is located 0 bytes to the right of
[   43.676251]  allocated 120-byte region [fff00000c69d2a00, fff00000c69d2a78)
[   43.678013] 
[   43.678417] The buggy address belongs to the physical page:
[   43.679189] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069d2
[   43.681170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.681778] page_type: f5(slab)
[   43.682747] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   43.684242] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   43.685205] page dumped because: kasan: bad access detected
[   43.686112] 
[   43.686449] Memory state around the buggy address:
[   43.687244]  fff00000c69d2900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.689011]  fff00000c69d2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.690632] >fff00000c69d2a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   43.691912]                                                                 ^
[   43.692852]  fff00000c69d2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.693831]  fff00000c69d2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.694858] ==================================================================

test log snippet boot parser 20

Home

[   43.883824] ==================================================================
[   43.884899] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0
[   43.885388] Read of size 121 at addr fff00000c69d2d00 by task kunit_try_catch/273
[   43.885848] 
[   43.886041] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   43.886633] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.887758] Hardware name: linux,dummy-virt (DT)
[   43.888832] Call trace:
[   43.889467]  show_stack+0x20/0x38 (C)
[   43.890480]  dump_stack_lvl+0x8c/0xd0
[   43.891344]  print_report+0x118/0x5e0
[   43.891924]  kasan_report+0xc8/0x118
[   43.892241]  kasan_check_range+0x100/0x1a8
[   43.892620]  __kasan_check_read+0x20/0x30
[   43.893361]  copy_user_test_oob+0x3c8/0xec0
[   43.894126]  kunit_try_run_case+0x14c/0x3d0
[   43.894944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.895914]  kthread+0x24c/0x2d0
[   43.896705]  ret_from_fork+0x10/0x20
[   43.897580] 
[   43.898129] Allocated by task 273:
[   43.898645]  kasan_save_stack+0x3c/0x68
[   43.899239]  kasan_save_track+0x20/0x40
[   43.899896]  kasan_save_alloc_info+0x40/0x58
[   43.900412]  __kasan_kmalloc+0xd4/0xd8
[   43.901110]  __kmalloc_noprof+0x188/0x4c8
[   43.901816]  kunit_kmalloc_array+0x34/0x88
[   43.902407]  copy_user_test_oob+0xac/0xec0
[   43.903125]  kunit_try_run_case+0x14c/0x3d0
[   43.903901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.904643]  kthread+0x24c/0x2d0
[   43.905153]  ret_from_fork+0x10/0x20
[   43.905679] 
[   43.906101] The buggy address belongs to the object at fff00000c69d2d00
[   43.906101]  which belongs to the cache kmalloc-128 of size 128
[   43.907466] The buggy address is located 0 bytes inside of
[   43.907466]  allocated 120-byte region [fff00000c69d2d00, fff00000c69d2d78)
[   43.908878] 
[   43.909211] The buggy address belongs to the physical page:
[   43.910130] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069d2
[   43.911058] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.912075] page_type: f5(slab)
[   43.912637] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   43.913839] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   43.914859] page dumped because: kasan: bad access detected
[   43.915552] 
[   43.915929] Memory state around the buggy address:
[   43.916553]  fff00000c69d2c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.917479]  fff00000c69d2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.918342] >fff00000c69d2d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   43.919285]                                                                 ^
[   43.920089]  fff00000c69d2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.920990]  fff00000c69d2e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.921915] ==================================================================
---
[   43.784611] ==================================================================
[   43.785436] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0
[   43.786412] Read of size 121 at addr fff00000c69d2d00 by task kunit_try_catch/273
[   43.787717] 
[   43.788191] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   43.789423] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.790150] Hardware name: linux,dummy-virt (DT)
[   43.791558] Call trace:
[   43.792155]  show_stack+0x20/0x38 (C)
[   43.792786]  dump_stack_lvl+0x8c/0xd0
[   43.793334]  print_report+0x118/0x5e0
[   43.794017]  kasan_report+0xc8/0x118
[   43.794721]  kasan_check_range+0x100/0x1a8
[   43.795427]  __kasan_check_read+0x20/0x30
[   43.796433]  copy_user_test_oob+0x728/0xec0
[   43.797046]  kunit_try_run_case+0x14c/0x3d0
[   43.797708]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.798396]  kthread+0x24c/0x2d0
[   43.799581]  ret_from_fork+0x10/0x20
[   43.800137] 
[   43.800502] Allocated by task 273:
[   43.801187]  kasan_save_stack+0x3c/0x68
[   43.801978]  kasan_save_track+0x20/0x40
[   43.802736]  kasan_save_alloc_info+0x40/0x58
[   43.804306]  __kasan_kmalloc+0xd4/0xd8
[   43.804845]  __kmalloc_noprof+0x188/0x4c8
[   43.805326]  kunit_kmalloc_array+0x34/0x88
[   43.806480]  copy_user_test_oob+0xac/0xec0
[   43.807678]  kunit_try_run_case+0x14c/0x3d0
[   43.808308]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.809117]  kthread+0x24c/0x2d0
[   43.809953]  ret_from_fork+0x10/0x20
[   43.810751] 
[   43.811346] The buggy address belongs to the object at fff00000c69d2d00
[   43.811346]  which belongs to the cache kmalloc-128 of size 128
[   43.812829] The buggy address is located 0 bytes inside of
[   43.812829]  allocated 120-byte region [fff00000c69d2d00, fff00000c69d2d78)
[   43.814684] 
[   43.815596] The buggy address belongs to the physical page:
[   43.816467] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069d2
[   43.817820] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.819245] page_type: f5(slab)
[   43.819778] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   43.821113] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   43.822029] page dumped because: kasan: bad access detected
[   43.822738] 
[   43.823470] Memory state around the buggy address:
[   43.824126]  fff00000c69d2c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.825097]  fff00000c69d2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.826647] >fff00000c69d2d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   43.828316]                                                                 ^
[   43.829546]  fff00000c69d2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.830724]  fff00000c69d2e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.832013] ==================================================================
---
[   43.970054] ==================================================================
[   43.971266] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0
[   43.972293] Read of size 121 at addr fff00000c69d2d00 by task kunit_try_catch/273
[   43.973291] 
[   43.973842] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   43.975047] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.975760] Hardware name: linux,dummy-virt (DT)
[   43.976487] Call trace:
[   43.977012]  show_stack+0x20/0x38 (C)
[   43.977882]  dump_stack_lvl+0x8c/0xd0
[   43.978583]  print_report+0x118/0x5e0
[   43.979263]  kasan_report+0xc8/0x118
[   43.979942]  kasan_check_range+0x100/0x1a8
[   43.980677]  __kasan_check_read+0x20/0x30
[   43.981391]  copy_user_test_oob+0x4a0/0xec0
[   43.982125]  kunit_try_run_case+0x14c/0x3d0
[   43.982976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.983842]  kthread+0x24c/0x2d0
[   43.984457]  ret_from_fork+0x10/0x20
[   43.985099] 
[   43.985422] Allocated by task 273:
[   43.986137]  kasan_save_stack+0x3c/0x68
[   43.986856]  kasan_save_track+0x20/0x40
[   43.987564]  kasan_save_alloc_info+0x40/0x58
[   43.988306]  __kasan_kmalloc+0xd4/0xd8
[   43.988936]  __kmalloc_noprof+0x188/0x4c8
[   43.989651]  kunit_kmalloc_array+0x34/0x88
[   43.990303]  copy_user_test_oob+0xac/0xec0
[   43.990963]  kunit_try_run_case+0x14c/0x3d0
[   43.991717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.992573]  kthread+0x24c/0x2d0
[   43.993144]  ret_from_fork+0x10/0x20
[   43.993863] 
[   43.994220] The buggy address belongs to the object at fff00000c69d2d00
[   43.994220]  which belongs to the cache kmalloc-128 of size 128
[   43.995855] The buggy address is located 0 bytes inside of
[   43.995855]  allocated 120-byte region [fff00000c69d2d00, fff00000c69d2d78)
[   43.997386] 
[   43.997939] The buggy address belongs to the physical page:
[   43.998730] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069d2
[   43.999870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.000797] page_type: f5(slab)
[   44.001362] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   44.002437] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   44.003487] page dumped because: kasan: bad access detected
[   44.004391] 
[   44.004771] Memory state around the buggy address:
[   44.005610]  fff00000c69d2c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   44.006650]  fff00000c69d2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.007749] >fff00000c69d2d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   44.008667]                                                                 ^
[   44.009652]  fff00000c69d2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.010738]  fff00000c69d2e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.011682] ==================================================================

test log snippet boot parser 21

Home

[   43.840727] ==================================================================
[   43.841604] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0
[   43.842626] Write of size 121 at addr fff00000c69d2d00 by task kunit_try_catch/273
[   43.843621] 
[   43.844015] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   43.845237] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.846084] Hardware name: linux,dummy-virt (DT)
[   43.846981] Call trace:
[   43.847545]  show_stack+0x20/0x38 (C)
[   43.848184]  dump_stack_lvl+0x8c/0xd0
[   43.848883]  print_report+0x118/0x5e0
[   43.849653]  kasan_report+0xc8/0x118
[   43.850345]  kasan_check_range+0x100/0x1a8
[   43.851132]  __kasan_check_write+0x20/0x30
[   43.851927]  copy_user_test_oob+0x35c/0xec0
[   43.852701]  kunit_try_run_case+0x14c/0x3d0
[   43.853478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.854290]  kthread+0x24c/0x2d0
[   43.854886]  ret_from_fork+0x10/0x20
[   43.855673] 
[   43.856067] Allocated by task 273:
[   43.856808]  kasan_save_stack+0x3c/0x68
[   43.857419]  kasan_save_track+0x20/0x40
[   43.858225]  kasan_save_alloc_info+0x40/0x58
[   43.858901]  __kasan_kmalloc+0xd4/0xd8
[   43.859575]  __kmalloc_noprof+0x188/0x4c8
[   43.860169]  kunit_kmalloc_array+0x34/0x88
[   43.860727]  copy_user_test_oob+0xac/0xec0
[   43.861556]  kunit_try_run_case+0x14c/0x3d0
[   43.862214]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.862896]  kthread+0x24c/0x2d0
[   43.863574]  ret_from_fork+0x10/0x20
[   43.864086] 
[   43.864449] The buggy address belongs to the object at fff00000c69d2d00
[   43.864449]  which belongs to the cache kmalloc-128 of size 128
[   43.865804] The buggy address is located 0 bytes inside of
[   43.865804]  allocated 120-byte region [fff00000c69d2d00, fff00000c69d2d78)
[   43.867398] 
[   43.867804] The buggy address belongs to the physical page:
[   43.868652] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069d2
[   43.869592] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.870573] page_type: f5(slab)
[   43.871065] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   43.872414] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   43.873596] page dumped because: kasan: bad access detected
[   43.874566] 
[   43.874950] Memory state around the buggy address:
[   43.875579]  fff00000c69d2c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.876428]  fff00000c69d2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.877742] >fff00000c69d2d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   43.878688]                                                                 ^
[   43.879663]  fff00000c69d2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.880889]  fff00000c69d2e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.881886] ==================================================================
---
[   43.729360] ==================================================================
[   43.731745] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0
[   43.732893] Write of size 121 at addr fff00000c69d2d00 by task kunit_try_catch/273
[   43.733769] 
[   43.734211] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   43.735736] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.736463] Hardware name: linux,dummy-virt (DT)
[   43.737754] Call trace:
[   43.738173]  show_stack+0x20/0x38 (C)
[   43.738831]  dump_stack_lvl+0x8c/0xd0
[   43.739555]  print_report+0x118/0x5e0
[   43.740170]  kasan_report+0xc8/0x118
[   43.740956]  kasan_check_range+0x100/0x1a8
[   43.741548]  __kasan_check_write+0x20/0x30
[   43.742298]  copy_user_test_oob+0x234/0xec0
[   43.743229]  kunit_try_run_case+0x14c/0x3d0
[   43.744282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.745110]  kthread+0x24c/0x2d0
[   43.745705]  ret_from_fork+0x10/0x20
[   43.746206] 
[   43.746501] Allocated by task 273:
[   43.747273]  kasan_save_stack+0x3c/0x68
[   43.748127]  kasan_save_track+0x20/0x40
[   43.748951]  kasan_save_alloc_info+0x40/0x58
[   43.749564]  __kasan_kmalloc+0xd4/0xd8
[   43.750177]  __kmalloc_noprof+0x188/0x4c8
[   43.750916]  kunit_kmalloc_array+0x34/0x88
[   43.751857]  copy_user_test_oob+0xac/0xec0
[   43.752559]  kunit_try_run_case+0x14c/0x3d0
[   43.753056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.754384]  kthread+0x24c/0x2d0
[   43.754880]  ret_from_fork+0x10/0x20
[   43.755765] 
[   43.756087] The buggy address belongs to the object at fff00000c69d2d00
[   43.756087]  which belongs to the cache kmalloc-128 of size 128
[   43.757833] The buggy address is located 0 bytes inside of
[   43.757833]  allocated 120-byte region [fff00000c69d2d00, fff00000c69d2d78)
[   43.759412] 
[   43.759905] The buggy address belongs to the physical page:
[   43.761458] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069d2
[   43.763145] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.764026] page_type: f5(slab)
[   43.764513] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   43.765073] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   43.765612] page dumped because: kasan: bad access detected
[   43.766627] 
[   43.767207] Memory state around the buggy address:
[   43.768228]  fff00000c69d2c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.769654]  fff00000c69d2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.770386] >fff00000c69d2d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   43.772014]                                                                 ^
[   43.773130]  fff00000c69d2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.774148]  fff00000c69d2e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.775970] ==================================================================
---
[   43.924588] ==================================================================
[   43.925603] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0
[   43.927805] Write of size 121 at addr fff00000c69d2d00 by task kunit_try_catch/273
[   43.928562] 
[   43.929053] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   43.930706] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.931374] Hardware name: linux,dummy-virt (DT)
[   43.932154] Call trace:
[   43.932679]  show_stack+0x20/0x38 (C)
[   43.933468]  dump_stack_lvl+0x8c/0xd0
[   43.934372]  print_report+0x118/0x5e0
[   43.935012]  kasan_report+0xc8/0x118
[   43.935820]  kasan_check_range+0x100/0x1a8
[   43.936467]  __kasan_check_write+0x20/0x30
[   43.937194]  copy_user_test_oob+0x434/0xec0
[   43.937906]  kunit_try_run_case+0x14c/0x3d0
[   43.938645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.939467]  kthread+0x24c/0x2d0
[   43.940120]  ret_from_fork+0x10/0x20
[   43.940783] 
[   43.941137] Allocated by task 273:
[   43.941825]  kasan_save_stack+0x3c/0x68
[   43.942542]  kasan_save_track+0x20/0x40
[   43.943257]  kasan_save_alloc_info+0x40/0x58
[   43.943899]  __kasan_kmalloc+0xd4/0xd8
[   43.944610]  __kmalloc_noprof+0x188/0x4c8
[   43.945326]  kunit_kmalloc_array+0x34/0x88
[   43.946007]  copy_user_test_oob+0xac/0xec0
[   43.946764]  kunit_try_run_case+0x14c/0x3d0
[   43.947486]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.948360]  kthread+0x24c/0x2d0
[   43.948933]  ret_from_fork+0x10/0x20
[   43.949658] 
[   43.950078] The buggy address belongs to the object at fff00000c69d2d00
[   43.950078]  which belongs to the cache kmalloc-128 of size 128
[   43.951654] The buggy address is located 0 bytes inside of
[   43.951654]  allocated 120-byte region [fff00000c69d2d00, fff00000c69d2d78)
[   43.953181] 
[   43.953665] The buggy address belongs to the physical page:
[   43.955049] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069d2
[   43.955988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.956957] page_type: f5(slab)
[   43.957738] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   43.958808] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   43.959809] page dumped because: kasan: bad access detected
[   43.960590] 
[   43.960969] Memory state around the buggy address:
[   43.961787]  fff00000c69d2c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.962799]  fff00000c69d2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.963872] >fff00000c69d2d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   43.964893]                                                                 ^
[   43.965872]  fff00000c69d2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.966844]  fff00000c69d2e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.967825] ==================================================================

test log snippet boot parser 22

Home

[   42.305696] ==================================================================
[   42.306563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   42.308217] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[   42.309122] 
[   42.309439] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   42.312095] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.312745] Hardware name: linux,dummy-virt (DT)
[   42.313483] Call trace:
[   42.313890]  show_stack+0x20/0x38 (C)
[   42.314481]  dump_stack_lvl+0x8c/0xd0
[   42.315196]  print_report+0x118/0x5e0
[   42.315903]  kasan_report+0xc8/0x118
[   42.316590]  __asan_report_store8_noabort+0x20/0x30
[   42.317223]  kasan_atomics_helper+0x3e5c/0x4858
[   42.318051]  kasan_atomics+0x198/0x2e8
[   42.319019]  kunit_try_run_case+0x14c/0x3d0
[   42.319707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.320508]  kthread+0x24c/0x2d0
[   42.321075]  ret_from_fork+0x10/0x20
[   42.321633] 
[   42.322048] Allocated by task 253:
[   42.322618]  kasan_save_stack+0x3c/0x68
[   42.323202]  kasan_save_track+0x20/0x40
[   42.323979]  kasan_save_alloc_info+0x40/0x58
[   42.324684]  __kasan_kmalloc+0xd4/0xd8
[   42.325382]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.326144]  kasan_atomics+0xb8/0x2e8
[   42.326677]  kunit_try_run_case+0x14c/0x3d0
[   42.327464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.328160]  kthread+0x24c/0x2d0
[   42.328817]  ret_from_fork+0x10/0x20
[   42.329503] 
[   42.329824] The buggy address belongs to the object at fff00000c6998980
[   42.329824]  which belongs to the cache kmalloc-64 of size 64
[   42.331355] The buggy address is located 0 bytes to the right of
[   42.331355]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   42.332953] 
[   42.333359] The buggy address belongs to the physical page:
[   42.334277] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   42.335123] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.336163] page_type: f5(slab)
[   42.336715] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.337657] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.338684] page dumped because: kasan: bad access detected
[   42.339436] 
[   42.339774] Memory state around the buggy address:
[   42.340342]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.341380]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.342373] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.343301]                                      ^
[   42.343904]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.344883]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.345685] ==================================================================
---
[   40.675850] ==================================================================
[   40.676988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   40.677978] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   40.679397] 
[   40.679969] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   40.683150] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.684664] Hardware name: linux,dummy-virt (DT)
[   40.685481] Call trace:
[   40.686154]  show_stack+0x20/0x38 (C)
[   40.687171]  dump_stack_lvl+0x8c/0xd0
[   40.687946]  print_report+0x118/0x5e0
[   40.688578]  kasan_report+0xc8/0x118
[   40.689119]  __asan_report_store4_noabort+0x20/0x30
[   40.690000]  kasan_atomics_helper+0x3f7c/0x4858
[   40.690698]  kasan_atomics+0x198/0x2e8
[   40.691830]  kunit_try_run_case+0x14c/0x3d0
[   40.692535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.693346]  kthread+0x24c/0x2d0
[   40.693868]  ret_from_fork+0x10/0x20
[   40.694482] 
[   40.694845] Allocated by task 253:
[   40.696102]  kasan_save_stack+0x3c/0x68
[   40.697560]  kasan_save_track+0x20/0x40
[   40.698276]  kasan_save_alloc_info+0x40/0x58
[   40.699016]  __kasan_kmalloc+0xd4/0xd8
[   40.699845]  __kmalloc_cache_noprof+0x15c/0x3c0
[   40.700698]  kasan_atomics+0xb8/0x2e8
[   40.701117]  kunit_try_run_case+0x14c/0x3d0
[   40.701851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.703246]  kthread+0x24c/0x2d0
[   40.703800]  ret_from_fork+0x10/0x20
[   40.704327] 
[   40.704704] The buggy address belongs to the object at fff00000c6998980
[   40.704704]  which belongs to the cache kmalloc-64 of size 64
[   40.706120] The buggy address is located 0 bytes to the right of
[   40.706120]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   40.708590] 
[   40.708982] The buggy address belongs to the physical page:
[   40.709674] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   40.710434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.711189] page_type: f5(slab)
[   40.712355] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   40.713791] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   40.715090] page dumped because: kasan: bad access detected
[   40.715849] 
[   40.716316] Memory state around the buggy address:
[   40.716956]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.717943]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.718820] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   40.720131]                                      ^
[   40.721126]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.722098]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.724044] ==================================================================
---
[   40.978113] ==================================================================
[   40.978970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   40.981497] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   40.982406] 
[   40.982745] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   40.984363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.985138] Hardware name: linux,dummy-virt (DT)
[   40.986008] Call trace:
[   40.986589]  show_stack+0x20/0x38 (C)
[   40.987559]  dump_stack_lvl+0x8c/0xd0
[   40.988421]  print_report+0x118/0x5e0
[   40.988970]  kasan_report+0xc8/0x118
[   40.989595]  __asan_report_store4_noabort+0x20/0x30
[   40.990462]  kasan_atomics_helper+0x3f94/0x4858
[   40.991087]  kasan_atomics+0x198/0x2e8
[   40.991999]  kunit_try_run_case+0x14c/0x3d0
[   40.992908]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.993657]  kthread+0x24c/0x2d0
[   40.994280]  ret_from_fork+0x10/0x20
[   40.994908] 
[   40.995306] Allocated by task 253:
[   40.995880]  kasan_save_stack+0x3c/0x68
[   40.996688]  kasan_save_track+0x20/0x40
[   40.997336]  kasan_save_alloc_info+0x40/0x58
[   40.998255]  __kasan_kmalloc+0xd4/0xd8
[   40.999004]  __kmalloc_cache_noprof+0x15c/0x3c0
[   40.999677]  kasan_atomics+0xb8/0x2e8
[   41.000580]  kunit_try_run_case+0x14c/0x3d0
[   41.001480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.002030]  kthread+0x24c/0x2d0
[   41.002561]  ret_from_fork+0x10/0x20
[   41.003993] 
[   41.004695] The buggy address belongs to the object at fff00000c6998980
[   41.004695]  which belongs to the cache kmalloc-64 of size 64
[   41.006436] The buggy address is located 0 bytes to the right of
[   41.006436]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   41.008471] 
[   41.008790] The buggy address belongs to the physical page:
[   41.010071] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   41.011612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.012803] page_type: f5(slab)
[   41.013344] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.014227] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.015679] page dumped because: kasan: bad access detected
[   41.016942] 
[   41.017639] Memory state around the buggy address:
[   41.018464]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.019755]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.021164] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.022397]                                      ^
[   41.023092]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.024812]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.025825] ==================================================================

test log snippet boot parser 23

Home

[   43.361173] ==================================================================
[   43.362187] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   43.363259] Read of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[   43.364173] 
[   43.364735] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   43.365997] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.366945] Hardware name: linux,dummy-virt (DT)
[   43.367716] Call trace:
[   43.368306]  show_stack+0x20/0x38 (C)
[   43.369035]  dump_stack_lvl+0x8c/0xd0
[   43.369803]  print_report+0x118/0x5e0
[   43.370465]  kasan_report+0xc8/0x118
[   43.371129]  __asan_report_load8_noabort+0x20/0x30
[   43.371889]  kasan_atomics_helper+0x3e20/0x4858
[   43.372627]  kasan_atomics+0x198/0x2e8
[   43.373379]  kunit_try_run_case+0x14c/0x3d0
[   43.374087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.374987]  kthread+0x24c/0x2d0
[   43.375607]  ret_from_fork+0x10/0x20
[   43.376269] 
[   43.376651] Allocated by task 253:
[   43.377371]  kasan_save_stack+0x3c/0x68
[   43.378025]  kasan_save_track+0x20/0x40
[   43.378634]  kasan_save_alloc_info+0x40/0x58
[   43.379396]  __kasan_kmalloc+0xd4/0xd8
[   43.380267]  __kmalloc_cache_noprof+0x15c/0x3c0
[   43.380930]  kasan_atomics+0xb8/0x2e8
[   43.381467]  kunit_try_run_case+0x14c/0x3d0
[   43.382003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.383040]  kthread+0x24c/0x2d0
[   43.383497]  ret_from_fork+0x10/0x20
[   43.384257] 
[   43.384703] The buggy address belongs to the object at fff00000c6998980
[   43.384703]  which belongs to the cache kmalloc-64 of size 64
[   43.386090] The buggy address is located 0 bytes to the right of
[   43.386090]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   43.387712] 
[   43.388088] The buggy address belongs to the physical page:
[   43.388699] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   43.389841] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.390758] page_type: f5(slab)
[   43.391364] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   43.392315] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   43.393284] page dumped because: kasan: bad access detected
[   43.394089] 
[   43.394415] Memory state around the buggy address:
[   43.395087]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.395943]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.396824] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   43.397768]                                      ^
[   43.398463]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.399439]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.400391] ==================================================================
---
[   42.221391] ==================================================================
[   42.222220] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   42.223851] Read of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[   42.224873] 
[   42.225327] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   42.226405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.227194] Hardware name: linux,dummy-virt (DT)
[   42.227891] Call trace:
[   42.228247]  show_stack+0x20/0x38 (C)
[   42.228934]  dump_stack_lvl+0x8c/0xd0
[   42.229660]  print_report+0x118/0x5e0
[   42.230214]  kasan_report+0xc8/0x118
[   42.230753]  __asan_report_load8_noabort+0x20/0x30
[   42.231432]  kasan_atomics_helper+0x3f58/0x4858
[   42.232257]  kasan_atomics+0x198/0x2e8
[   42.232823]  kunit_try_run_case+0x14c/0x3d0
[   42.233679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.234386]  kthread+0x24c/0x2d0
[   42.235027]  ret_from_fork+0x10/0x20
[   42.235738] 
[   42.236051] Allocated by task 253:
[   42.236509]  kasan_save_stack+0x3c/0x68
[   42.237247]  kasan_save_track+0x20/0x40
[   42.237860]  kasan_save_alloc_info+0x40/0x58
[   42.238749]  __kasan_kmalloc+0xd4/0xd8
[   42.239374]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.239919]  kasan_atomics+0xb8/0x2e8
[   42.240624]  kunit_try_run_case+0x14c/0x3d0
[   42.241563]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.242319]  kthread+0x24c/0x2d0
[   42.242780]  ret_from_fork+0x10/0x20
[   42.243454] 
[   42.244099] The buggy address belongs to the object at fff00000c6998980
[   42.244099]  which belongs to the cache kmalloc-64 of size 64
[   42.245565] The buggy address is located 0 bytes to the right of
[   42.245565]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   42.247032] 
[   42.247348] The buggy address belongs to the physical page:
[   42.248059] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   42.249300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.250179] page_type: f5(slab)
[   42.250876] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.251879] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.252986] page dumped because: kasan: bad access detected
[   42.253675] 
[   42.254055] Memory state around the buggy address:
[   42.254733]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.255665]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.256612] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.257593]                                      ^
[   42.258170]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.259057]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.260053] ==================================================================
---
[   43.271674] ==================================================================
[   43.272619] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   43.274812] Read of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[   43.276066] 
[   43.276457] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   43.278233] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.279027] Hardware name: linux,dummy-virt (DT)
[   43.279922] Call trace:
[   43.280563]  show_stack+0x20/0x38 (C)
[   43.281384]  dump_stack_lvl+0x8c/0xd0
[   43.282235]  print_report+0x118/0x5e0
[   43.283042]  kasan_report+0xc8/0x118
[   43.283623]  __asan_report_load8_noabort+0x20/0x30
[   43.284290]  kasan_atomics_helper+0x3e10/0x4858
[   43.284961]  kasan_atomics+0x198/0x2e8
[   43.285815]  kunit_try_run_case+0x14c/0x3d0
[   43.286433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.287159]  kthread+0x24c/0x2d0
[   43.287697]  ret_from_fork+0x10/0x20
[   43.288468] 
[   43.288828] Allocated by task 253:
[   43.289453]  kasan_save_stack+0x3c/0x68
[   43.290188]  kasan_save_track+0x20/0x40
[   43.290838]  kasan_save_alloc_info+0x40/0x58
[   43.291644]  __kasan_kmalloc+0xd4/0xd8
[   43.292355]  __kmalloc_cache_noprof+0x15c/0x3c0
[   43.293117]  kasan_atomics+0xb8/0x2e8
[   43.293816]  kunit_try_run_case+0x14c/0x3d0
[   43.294496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.295294]  kthread+0x24c/0x2d0
[   43.295849]  ret_from_fork+0x10/0x20
[   43.296559] 
[   43.296931] The buggy address belongs to the object at fff00000c6998980
[   43.296931]  which belongs to the cache kmalloc-64 of size 64
[   43.298583] The buggy address is located 0 bytes to the right of
[   43.298583]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   43.300178] 
[   43.300697] The buggy address belongs to the physical page:
[   43.301470] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   43.302655] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.303577] page_type: f5(slab)
[   43.304097] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   43.305189] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   43.306211] page dumped because: kasan: bad access detected
[   43.307053] 
[   43.307386] Memory state around the buggy address:
[   43.308202]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.309314]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.310417] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   43.311423]                                      ^
[   43.312138]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.313156]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.314129] ==================================================================
---
[   40.873039] ==================================================================
[   40.873992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   40.875550] Read of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   40.878254] 
[   40.878709] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   40.880387] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.880985] Hardware name: linux,dummy-virt (DT)
[   40.881994] Call trace:
[   40.882321]  show_stack+0x20/0x38 (C)
[   40.883547]  dump_stack_lvl+0x8c/0xd0
[   40.884159]  print_report+0x118/0x5e0
[   40.884774]  kasan_report+0xc8/0x118
[   40.886039]  __asan_report_load4_noabort+0x20/0x30
[   40.886758]  kasan_atomics_helper+0x40fc/0x4858
[   40.887539]  kasan_atomics+0x198/0x2e8
[   40.888489]  kunit_try_run_case+0x14c/0x3d0
[   40.889264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.890042]  kthread+0x24c/0x2d0
[   40.890678]  ret_from_fork+0x10/0x20
[   40.891391] 
[   40.892390] Allocated by task 253:
[   40.892839]  kasan_save_stack+0x3c/0x68
[   40.893676]  kasan_save_track+0x20/0x40
[   40.894451]  kasan_save_alloc_info+0x40/0x58
[   40.895486]  __kasan_kmalloc+0xd4/0xd8
[   40.896266]  __kmalloc_cache_noprof+0x15c/0x3c0
[   40.897244]  kasan_atomics+0xb8/0x2e8
[   40.898620]  kunit_try_run_case+0x14c/0x3d0
[   40.899992]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.901120]  kthread+0x24c/0x2d0
[   40.902004]  ret_from_fork+0x10/0x20
[   40.902854] 
[   40.903466] The buggy address belongs to the object at fff00000c6998980
[   40.903466]  which belongs to the cache kmalloc-64 of size 64
[   40.905928] The buggy address is located 0 bytes to the right of
[   40.905928]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   40.908245] 
[   40.908934] The buggy address belongs to the physical page:
[   40.909844] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   40.910849] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.911699] page_type: f5(slab)
[   40.912192] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   40.913105] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   40.914269] page dumped because: kasan: bad access detected
[   40.915364] 
[   40.915687] Memory state around the buggy address:
[   40.916499]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.917731]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.918832] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   40.920012]                                      ^
[   40.921446]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.922685]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.923932] ==================================================================
---
[   43.105812] ==================================================================
[   43.107549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   43.108635] Read of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[   43.109805] 
[   43.110413] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   43.111892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.112672] Hardware name: linux,dummy-virt (DT)
[   43.113417] Call trace:
[   43.113881]  show_stack+0x20/0x38 (C)
[   43.114458]  dump_stack_lvl+0x8c/0xd0
[   43.115047]  print_report+0x118/0x5e0
[   43.115902]  kasan_report+0xc8/0x118
[   43.116688]  __asan_report_load8_noabort+0x20/0x30
[   43.117360]  kasan_atomics_helper+0x3db0/0x4858
[   43.118238]  kasan_atomics+0x198/0x2e8
[   43.118974]  kunit_try_run_case+0x14c/0x3d0
[   43.119651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.120587]  kthread+0x24c/0x2d0
[   43.121251]  ret_from_fork+0x10/0x20
[   43.121825] 
[   43.122315] Allocated by task 253:
[   43.123069]  kasan_save_stack+0x3c/0x68
[   43.123747]  kasan_save_track+0x20/0x40
[   43.124361]  kasan_save_alloc_info+0x40/0x58
[   43.125150]  __kasan_kmalloc+0xd4/0xd8
[   43.125901]  __kmalloc_cache_noprof+0x15c/0x3c0
[   43.126480]  kasan_atomics+0xb8/0x2e8
[   43.127232]  kunit_try_run_case+0x14c/0x3d0
[   43.128013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.128914]  kthread+0x24c/0x2d0
[   43.129480]  ret_from_fork+0x10/0x20
[   43.130472] 
[   43.130879] The buggy address belongs to the object at fff00000c6998980
[   43.130879]  which belongs to the cache kmalloc-64 of size 64
[   43.132680] The buggy address is located 0 bytes to the right of
[   43.132680]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   43.134272] 
[   43.134676] The buggy address belongs to the physical page:
[   43.135432] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   43.136203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.137231] page_type: f5(slab)
[   43.137909] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   43.139029] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   43.139968] page dumped because: kasan: bad access detected
[   43.140776] 
[   43.141151] Memory state around the buggy address:
[   43.141876]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.142853]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.143658] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   43.144630]                                      ^
[   43.145376]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.146219]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.147032] ==================================================================
---
[   41.964893] ==================================================================
[   41.965654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   41.966694] Read of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   41.968318] 
[   41.968935] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   41.970161] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.970828] Hardware name: linux,dummy-virt (DT)
[   41.971536] Call trace:
[   41.971993]  show_stack+0x20/0x38 (C)
[   41.972704]  dump_stack_lvl+0x8c/0xd0
[   41.973281]  print_report+0x118/0x5e0
[   41.974115]  kasan_report+0xc8/0x118
[   41.974846]  __asan_report_load4_noabort+0x20/0x30
[   41.975669]  kasan_atomics_helper+0x3de4/0x4858
[   41.976408]  kasan_atomics+0x198/0x2e8
[   41.977094]  kunit_try_run_case+0x14c/0x3d0
[   41.977819]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.978649]  kthread+0x24c/0x2d0
[   41.979258]  ret_from_fork+0x10/0x20
[   41.979938] 
[   41.980304] Allocated by task 253:
[   41.980919]  kasan_save_stack+0x3c/0x68
[   41.981712]  kasan_save_track+0x20/0x40
[   41.982352]  kasan_save_alloc_info+0x40/0x58
[   41.983032]  __kasan_kmalloc+0xd4/0xd8
[   41.983704]  __kmalloc_cache_noprof+0x15c/0x3c0
[   41.984335]  kasan_atomics+0xb8/0x2e8
[   41.985108]  kunit_try_run_case+0x14c/0x3d0
[   41.985744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.986497]  kthread+0x24c/0x2d0
[   41.987485]  ret_from_fork+0x10/0x20
[   41.988224] 
[   41.988630] The buggy address belongs to the object at fff00000c6998980
[   41.988630]  which belongs to the cache kmalloc-64 of size 64
[   41.990401] The buggy address is located 0 bytes to the right of
[   41.990401]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   41.992016] 
[   41.992697] The buggy address belongs to the physical page:
[   41.993415] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   41.994763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.995848] page_type: f5(slab)
[   41.996378] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.997339] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.998211] page dumped because: kasan: bad access detected
[   41.999062] 
[   41.999491] Memory state around the buggy address:
[   42.000237]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.001181]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.002270] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.003185]                                      ^
[   42.003924]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.004881]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.005840] ==================================================================
---
[   41.803462] ==================================================================
[   41.804393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   41.805422] Read of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   41.806199] 
[   41.806606] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   41.807871] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.808425] Hardware name: linux,dummy-virt (DT)
[   41.809152] Call trace:
[   41.809676]  show_stack+0x20/0x38 (C)
[   41.810421]  dump_stack_lvl+0x8c/0xd0
[   41.811596]  print_report+0x118/0x5e0
[   41.812842]  kasan_report+0xc8/0x118
[   41.813417]  __asan_report_load4_noabort+0x20/0x30
[   41.814200]  kasan_atomics_helper+0x3dcc/0x4858
[   41.814848]  kasan_atomics+0x198/0x2e8
[   41.815439]  kunit_try_run_case+0x14c/0x3d0
[   41.816070]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.816844]  kthread+0x24c/0x2d0
[   41.817312]  ret_from_fork+0x10/0x20
[   41.818001] 
[   41.818358] Allocated by task 253:
[   41.818830]  kasan_save_stack+0x3c/0x68
[   41.819566]  kasan_save_track+0x20/0x40
[   41.820224]  kasan_save_alloc_info+0x40/0x58
[   41.820910]  __kasan_kmalloc+0xd4/0xd8
[   41.821470]  __kmalloc_cache_noprof+0x15c/0x3c0
[   41.822092]  kasan_atomics+0xb8/0x2e8
[   41.822788]  kunit_try_run_case+0x14c/0x3d0
[   41.823387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.824253]  kthread+0x24c/0x2d0
[   41.824808]  ret_from_fork+0x10/0x20
[   41.825403] 
[   41.825872] The buggy address belongs to the object at fff00000c6998980
[   41.825872]  which belongs to the cache kmalloc-64 of size 64
[   41.827349] The buggy address is located 0 bytes to the right of
[   41.827349]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   41.828843] 
[   41.829198] The buggy address belongs to the physical page:
[   41.829919] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   41.830901] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.831902] page_type: f5(slab)
[   41.832428] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.833417] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.834389] page dumped because: kasan: bad access detected
[   41.835048] 
[   41.835444] Memory state around the buggy address:
[   41.836101]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.836892]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.837841] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.838837]                                      ^
[   41.839421]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.840373]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.841244] ==================================================================
---
[   42.858689] ==================================================================
[   42.859543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   42.860677] Read of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[   42.862325] 
[   42.862813] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   42.863886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.864695] Hardware name: linux,dummy-virt (DT)
[   42.865454] Call trace:
[   42.866067]  show_stack+0x20/0x38 (C)
[   42.866867]  dump_stack_lvl+0x8c/0xd0
[   42.867617]  print_report+0x118/0x5e0
[   42.868254]  kasan_report+0xc8/0x118
[   42.869011]  __asan_report_load8_noabort+0x20/0x30
[   42.869900]  kasan_atomics_helper+0x3f04/0x4858
[   42.870623]  kasan_atomics+0x198/0x2e8
[   42.871295]  kunit_try_run_case+0x14c/0x3d0
[   42.872026]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.872907]  kthread+0x24c/0x2d0
[   42.873408]  ret_from_fork+0x10/0x20
[   42.874018] 
[   42.874340] Allocated by task 253:
[   42.874855]  kasan_save_stack+0x3c/0x68
[   42.875503]  kasan_save_track+0x20/0x40
[   42.876244]  kasan_save_alloc_info+0x40/0x58
[   42.876971]  __kasan_kmalloc+0xd4/0xd8
[   42.877576]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.878247]  kasan_atomics+0xb8/0x2e8
[   42.878982]  kunit_try_run_case+0x14c/0x3d0
[   42.879558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.880383]  kthread+0x24c/0x2d0
[   42.881012]  ret_from_fork+0x10/0x20
[   42.881703] 
[   42.882022] The buggy address belongs to the object at fff00000c6998980
[   42.882022]  which belongs to the cache kmalloc-64 of size 64
[   42.883545] The buggy address is located 0 bytes to the right of
[   42.883545]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   42.885002] 
[   42.885369] The buggy address belongs to the physical page:
[   42.886001] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   42.886986] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.887938] page_type: f5(slab)
[   42.888546] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.889443] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.890418] page dumped because: kasan: bad access detected
[   42.891222] 
[   42.891596] Memory state around the buggy address:
[   42.892243]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.893150]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.893976] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.894953]                                      ^
[   42.895555]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.896558]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.897473] ==================================================================
---
[   42.135608] ==================================================================
[   42.136444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   42.137336] Read of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   42.138188] 
[   42.138682] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   42.139762] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.140462] Hardware name: linux,dummy-virt (DT)
[   42.141371] Call trace:
[   42.141825]  show_stack+0x20/0x38 (C)
[   42.142366]  dump_stack_lvl+0x8c/0xd0
[   42.143194]  print_report+0x118/0x5e0
[   42.143697]  kasan_report+0xc8/0x118
[   42.144395]  __asan_report_load4_noabort+0x20/0x30
[   42.145115]  kasan_atomics_helper+0x3e04/0x4858
[   42.145723]  kasan_atomics+0x198/0x2e8
[   42.146592]  kunit_try_run_case+0x14c/0x3d0
[   42.147323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.147965]  kthread+0x24c/0x2d0
[   42.148587]  ret_from_fork+0x10/0x20
[   42.149506] 
[   42.150021] Allocated by task 253:
[   42.150620]  kasan_save_stack+0x3c/0x68
[   42.151340]  kasan_save_track+0x20/0x40
[   42.151972]  kasan_save_alloc_info+0x40/0x58
[   42.152808]  __kasan_kmalloc+0xd4/0xd8
[   42.153366]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.154165]  kasan_atomics+0xb8/0x2e8
[   42.154978]  kunit_try_run_case+0x14c/0x3d0
[   42.155586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.156444]  kthread+0x24c/0x2d0
[   42.157071]  ret_from_fork+0x10/0x20
[   42.157914] 
[   42.158329] The buggy address belongs to the object at fff00000c6998980
[   42.158329]  which belongs to the cache kmalloc-64 of size 64
[   42.159903] The buggy address is located 0 bytes to the right of
[   42.159903]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   42.161423] 
[   42.161781] The buggy address belongs to the physical page:
[   42.162488] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   42.163484] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.164318] page_type: f5(slab)
[   42.164855] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.165900] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.166854] page dumped because: kasan: bad access detected
[   42.167642] 
[   42.168011] Memory state around the buggy address:
[   42.168815]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.169776]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.170874] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.171926]                                      ^
[   42.172875]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.173871]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.175135] ==================================================================
---
[   42.052791] ==================================================================
[   42.054077] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   42.055799] Read of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   42.056738] 
[   42.057158] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   42.058386] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.059118] Hardware name: linux,dummy-virt (DT)
[   42.059786] Call trace:
[   42.060307]  show_stack+0x20/0x38 (C)
[   42.060937]  dump_stack_lvl+0x8c/0xd0
[   42.061613]  print_report+0x118/0x5e0
[   42.062087]  kasan_report+0xc8/0x118
[   42.062804]  __asan_report_load4_noabort+0x20/0x30
[   42.063512]  kasan_atomics_helper+0x3dd8/0x4858
[   42.064315]  kasan_atomics+0x198/0x2e8
[   42.064919]  kunit_try_run_case+0x14c/0x3d0
[   42.065829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.066689]  kthread+0x24c/0x2d0
[   42.067385]  ret_from_fork+0x10/0x20
[   42.068049] 
[   42.068388] Allocated by task 253:
[   42.069043]  kasan_save_stack+0x3c/0x68
[   42.069714]  kasan_save_track+0x20/0x40
[   42.070400]  kasan_save_alloc_info+0x40/0x58
[   42.071087]  __kasan_kmalloc+0xd4/0xd8
[   42.071877]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.072630]  kasan_atomics+0xb8/0x2e8
[   42.073246]  kunit_try_run_case+0x14c/0x3d0
[   42.074115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.074870]  kthread+0x24c/0x2d0
[   42.075540]  ret_from_fork+0x10/0x20
[   42.076059] 
[   42.076386] The buggy address belongs to the object at fff00000c6998980
[   42.076386]  which belongs to the cache kmalloc-64 of size 64
[   42.077916] The buggy address is located 0 bytes to the right of
[   42.077916]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   42.079426] 
[   42.079907] The buggy address belongs to the physical page:
[   42.080580] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   42.081657] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.082594] page_type: f5(slab)
[   42.083168] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.084063] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.085088] page dumped because: kasan: bad access detected
[   42.085913] 
[   42.086350] Memory state around the buggy address:
[   42.087109]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.087611]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.088386] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.089558]                                      ^
[   42.090213]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.091134]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.091939] ==================================================================
---
[   41.559576] ==================================================================
[   41.560447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   41.561789] Read of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   41.563006] 
[   41.564039] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   41.565237] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.566028] Hardware name: linux,dummy-virt (DT)
[   41.567182] Call trace:
[   41.567708]  show_stack+0x20/0x38 (C)
[   41.568349]  dump_stack_lvl+0x8c/0xd0
[   41.569486]  print_report+0x118/0x5e0
[   41.570192]  kasan_report+0xc8/0x118
[   41.570882]  __asan_report_load4_noabort+0x20/0x30
[   41.571593]  kasan_atomics_helper+0x42d8/0x4858
[   41.572239]  kasan_atomics+0x198/0x2e8
[   41.573010]  kunit_try_run_case+0x14c/0x3d0
[   41.573643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.574492]  kthread+0x24c/0x2d0
[   41.575035]  ret_from_fork+0x10/0x20
[   41.575728] 
[   41.576125] Allocated by task 253:
[   41.576690]  kasan_save_stack+0x3c/0x68
[   41.577305]  kasan_save_track+0x20/0x40
[   41.577871]  kasan_save_alloc_info+0x40/0x58
[   41.578694]  __kasan_kmalloc+0xd4/0xd8
[   41.579258]  __kmalloc_cache_noprof+0x15c/0x3c0
[   41.579859]  kasan_atomics+0xb8/0x2e8
[   41.580651]  kunit_try_run_case+0x14c/0x3d0
[   41.581242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.582230]  kthread+0x24c/0x2d0
[   41.582865]  ret_from_fork+0x10/0x20
[   41.583570] 
[   41.583912] The buggy address belongs to the object at fff00000c6998980
[   41.583912]  which belongs to the cache kmalloc-64 of size 64
[   41.585260] The buggy address is located 0 bytes to the right of
[   41.585260]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   41.586836] 
[   41.587175] The buggy address belongs to the physical page:
[   41.587964] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   41.588905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.589878] page_type: f5(slab)
[   41.590351] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.591430] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.592191] page dumped because: kasan: bad access detected
[   41.593084] 
[   41.593426] Memory state around the buggy address:
[   41.594126]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.595154]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.596109] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.597005]                                      ^
[   41.597773]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.598696]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.599629] ==================================================================
---
[   43.190729] ==================================================================
[   43.191923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   43.193404] Read of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[   43.194347] 
[   43.194609] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   43.195692] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.196264] Hardware name: linux,dummy-virt (DT)
[   43.196833] Call trace:
[   43.197352]  show_stack+0x20/0x38 (C)
[   43.197949]  dump_stack_lvl+0x8c/0xd0
[   43.198750]  print_report+0x118/0x5e0
[   43.199391]  kasan_report+0xc8/0x118
[   43.199921]  __asan_report_load8_noabort+0x20/0x30
[   43.200706]  kasan_atomics_helper+0x3df4/0x4858
[   43.201334]  kasan_atomics+0x198/0x2e8
[   43.201969]  kunit_try_run_case+0x14c/0x3d0
[   43.202778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.203500]  kthread+0x24c/0x2d0
[   43.204130]  ret_from_fork+0x10/0x20
[   43.204700] 
[   43.205156] Allocated by task 253:
[   43.205743]  kasan_save_stack+0x3c/0x68
[   43.206421]  kasan_save_track+0x20/0x40
[   43.207121]  kasan_save_alloc_info+0x40/0x58
[   43.207825]  __kasan_kmalloc+0xd4/0xd8
[   43.208452]  __kmalloc_cache_noprof+0x15c/0x3c0
[   43.209136]  kasan_atomics+0xb8/0x2e8
[   43.209684]  kunit_try_run_case+0x14c/0x3d0
[   43.210471]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.211158]  kthread+0x24c/0x2d0
[   43.211794]  ret_from_fork+0x10/0x20
[   43.212327] 
[   43.212771] The buggy address belongs to the object at fff00000c6998980
[   43.212771]  which belongs to the cache kmalloc-64 of size 64
[   43.214193] The buggy address is located 0 bytes to the right of
[   43.214193]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   43.215734] 
[   43.216248] The buggy address belongs to the physical page:
[   43.216980] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   43.217967] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.218805] page_type: f5(slab)
[   43.219382] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   43.220460] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   43.221415] page dumped because: kasan: bad access detected
[   43.222120] 
[   43.222414] Memory state around the buggy address:
[   43.223222]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.223910]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.224945] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   43.225907]                                      ^
[   43.226691]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.227587]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.228455] ==================================================================
---
[   40.629473] ==================================================================
[   40.631073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   40.631928] Read of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   40.632999] 
[   40.633589] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   40.634820] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.635394] Hardware name: linux,dummy-virt (DT)
[   40.636021] Call trace:
[   40.636625]  show_stack+0x20/0x38 (C)
[   40.637191]  dump_stack_lvl+0x8c/0xd0
[   40.638050]  print_report+0x118/0x5e0
[   40.638885]  kasan_report+0xc8/0x118
[   40.639806]  __asan_report_load4_noabort+0x20/0x30
[   40.640839]  kasan_atomics_helper+0x40a8/0x4858
[   40.642296]  kasan_atomics+0x198/0x2e8
[   40.643059]  kunit_try_run_case+0x14c/0x3d0
[   40.643776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.644564]  kthread+0x24c/0x2d0
[   40.645164]  ret_from_fork+0x10/0x20
[   40.645889] 
[   40.646201] Allocated by task 253:
[   40.646827]  kasan_save_stack+0x3c/0x68
[   40.647476]  kasan_save_track+0x20/0x40
[   40.648727]  kasan_save_alloc_info+0x40/0x58
[   40.649558]  __kasan_kmalloc+0xd4/0xd8
[   40.650235]  __kmalloc_cache_noprof+0x15c/0x3c0
[   40.650985]  kasan_atomics+0xb8/0x2e8
[   40.652021]  kunit_try_run_case+0x14c/0x3d0
[   40.652581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.653332]  kthread+0x24c/0x2d0
[   40.654133]  ret_from_fork+0x10/0x20
[   40.654881] 
[   40.655379] The buggy address belongs to the object at fff00000c6998980
[   40.655379]  which belongs to the cache kmalloc-64 of size 64
[   40.657597] The buggy address is located 0 bytes to the right of
[   40.657597]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   40.659180] 
[   40.660333] The buggy address belongs to the physical page:
[   40.661341] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   40.662333] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.663584] page_type: f5(slab)
[   40.664096] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   40.665174] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   40.666051] page dumped because: kasan: bad access detected
[   40.666881] 
[   40.667241] Memory state around the buggy address:
[   40.667994]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.669442]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.670281] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   40.671656]                                      ^
[   40.672300]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.673202]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.674430] ==================================================================
---
[   41.883552] ==================================================================
[   41.884387] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   41.885488] Read of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   41.886632] 
[   41.887094] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   41.888213] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.888779] Hardware name: linux,dummy-virt (DT)
[   41.889597] Call trace:
[   41.890080]  show_stack+0x20/0x38 (C)
[   41.890727]  dump_stack_lvl+0x8c/0xd0
[   41.891347]  print_report+0x118/0x5e0
[   41.892098]  kasan_report+0xc8/0x118
[   41.892475]  __asan_report_load4_noabort+0x20/0x30
[   41.892863]  kasan_atomics_helper+0x3dbc/0x4858
[   41.893198]  kasan_atomics+0x198/0x2e8
[   41.893608]  kunit_try_run_case+0x14c/0x3d0
[   41.894831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.895998]  kthread+0x24c/0x2d0
[   41.896787]  ret_from_fork+0x10/0x20
[   41.897408] 
[   41.897879] Allocated by task 253:
[   41.898475]  kasan_save_stack+0x3c/0x68
[   41.899060]  kasan_save_track+0x20/0x40
[   41.899846]  kasan_save_alloc_info+0x40/0x58
[   41.900413]  __kasan_kmalloc+0xd4/0xd8
[   41.901143]  __kmalloc_cache_noprof+0x15c/0x3c0
[   41.901864]  kasan_atomics+0xb8/0x2e8
[   41.902381]  kunit_try_run_case+0x14c/0x3d0
[   41.903176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.903809]  kthread+0x24c/0x2d0
[   41.904459]  ret_from_fork+0x10/0x20
[   41.905061] 
[   41.905548] The buggy address belongs to the object at fff00000c6998980
[   41.905548]  which belongs to the cache kmalloc-64 of size 64
[   41.906925] The buggy address is located 0 bytes to the right of
[   41.906925]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   41.908552] 
[   41.908885] The buggy address belongs to the physical page:
[   41.909846] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   41.910813] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.911687] page_type: f5(slab)
[   41.912302] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.913314] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.914306] page dumped because: kasan: bad access detected
[   41.915143] 
[   41.915476] Memory state around the buggy address:
[   41.916148]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.917042]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.917959] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.918816]                                      ^
[   41.919569]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.920565]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.921583] ==================================================================

test log snippet boot parser 24

Home

[   42.513202] ==================================================================
[   42.514223] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   42.515752] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[   42.516905] 
[   42.517331] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   42.518360] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.519007] Hardware name: linux,dummy-virt (DT)
[   42.519922] Call trace:
[   42.520283]  show_stack+0x20/0x38 (C)
[   42.520990]  dump_stack_lvl+0x8c/0xd0
[   42.521570]  print_report+0x118/0x5e0
[   42.522365]  kasan_report+0xc8/0x118
[   42.522968]  kasan_check_range+0x100/0x1a8
[   42.523717]  __kasan_check_write+0x20/0x30
[   42.524283]  kasan_atomics_helper+0x1058/0x4858
[   42.524971]  kasan_atomics+0x198/0x2e8
[   42.525612]  kunit_try_run_case+0x14c/0x3d0
[   42.526209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.527636]  kthread+0x24c/0x2d0
[   42.528422]  ret_from_fork+0x10/0x20
[   42.529179] 
[   42.529800] Allocated by task 253:
[   42.530592]  kasan_save_stack+0x3c/0x68
[   42.531375]  kasan_save_track+0x20/0x40
[   42.532224]  kasan_save_alloc_info+0x40/0x58
[   42.533092]  __kasan_kmalloc+0xd4/0xd8
[   42.533998]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.534760]  kasan_atomics+0xb8/0x2e8
[   42.535688]  kunit_try_run_case+0x14c/0x3d0
[   42.536566]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.537566]  kthread+0x24c/0x2d0
[   42.538132]  ret_from_fork+0x10/0x20
[   42.539079] 
[   42.539502] The buggy address belongs to the object at fff00000c6998980
[   42.539502]  which belongs to the cache kmalloc-64 of size 64
[   42.540791] The buggy address is located 0 bytes to the right of
[   42.540791]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   42.542174] 
[   42.542622] The buggy address belongs to the physical page:
[   42.543292] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   42.544323] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.545200] page_type: f5(slab)
[   42.545696] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.546715] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.547779] page dumped because: kasan: bad access detected
[   42.548438] 
[   42.548871] Memory state around the buggy address:
[   42.549484]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.550490]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.551347] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.552240]                                      ^
[   42.552995]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.553844]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.554766] ==================================================================
---
[   42.939770] ==================================================================
[   42.940712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   42.941623] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[   42.942844] 
[   42.943206] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   42.945020] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.946309] Hardware name: linux,dummy-virt (DT)
[   42.947144] Call trace:
[   42.947626]  show_stack+0x20/0x38 (C)
[   42.948320]  dump_stack_lvl+0x8c/0xd0
[   42.949007]  print_report+0x118/0x5e0
[   42.949708]  kasan_report+0xc8/0x118
[   42.950030]  kasan_check_range+0x100/0x1a8
[   42.950354]  __kasan_check_write+0x20/0x30
[   42.951099]  kasan_atomics_helper+0x147c/0x4858
[   42.951764]  kasan_atomics+0x198/0x2e8
[   42.952364]  kunit_try_run_case+0x14c/0x3d0
[   42.952967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.953979]  kthread+0x24c/0x2d0
[   42.954672]  ret_from_fork+0x10/0x20
[   42.955318] 
[   42.955643] Allocated by task 253:
[   42.956246]  kasan_save_stack+0x3c/0x68
[   42.956865]  kasan_save_track+0x20/0x40
[   42.957429]  kasan_save_alloc_info+0x40/0x58
[   42.958304]  __kasan_kmalloc+0xd4/0xd8
[   42.959017]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.959707]  kasan_atomics+0xb8/0x2e8
[   42.960337]  kunit_try_run_case+0x14c/0x3d0
[   42.961033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.961679]  kthread+0x24c/0x2d0
[   42.962425]  ret_from_fork+0x10/0x20
[   42.963111] 
[   42.963487] The buggy address belongs to the object at fff00000c6998980
[   42.963487]  which belongs to the cache kmalloc-64 of size 64
[   42.965096] The buggy address is located 0 bytes to the right of
[   42.965096]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   42.966763] 
[   42.967181] The buggy address belongs to the physical page:
[   42.967914] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   42.968988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.969877] page_type: f5(slab)
[   42.970375] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.971339] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.972309] page dumped because: kasan: bad access detected
[   42.973028] 
[   42.973375] Memory state around the buggy address:
[   42.974065]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.974808]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.975869] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.976793]                                      ^
[   42.977574]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.978475]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.979333] ==================================================================
---
[   41.601598] ==================================================================
[   41.602565] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   41.603443] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   41.604339] 
[   41.604776] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   41.605949] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.606481] Hardware name: linux,dummy-virt (DT)
[   41.607254] Call trace:
[   41.607646]  show_stack+0x20/0x38 (C)
[   41.608383]  dump_stack_lvl+0x8c/0xd0
[   41.608978]  print_report+0x118/0x5e0
[   41.609660]  kasan_report+0xc8/0x118
[   41.610240]  kasan_check_range+0x100/0x1a8
[   41.611039]  __kasan_check_write+0x20/0x30
[   41.611775]  kasan_atomics_helper+0x934/0x4858
[   41.612366]  kasan_atomics+0x198/0x2e8
[   41.612986]  kunit_try_run_case+0x14c/0x3d0
[   41.613720]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.614448]  kthread+0x24c/0x2d0
[   41.615024]  ret_from_fork+0x10/0x20
[   41.615611] 
[   41.616017] Allocated by task 253:
[   41.616511]  kasan_save_stack+0x3c/0x68
[   41.617451]  kasan_save_track+0x20/0x40
[   41.618127]  kasan_save_alloc_info+0x40/0x58
[   41.618869]  __kasan_kmalloc+0xd4/0xd8
[   41.619681]  __kmalloc_cache_noprof+0x15c/0x3c0
[   41.620433]  kasan_atomics+0xb8/0x2e8
[   41.620977]  kunit_try_run_case+0x14c/0x3d0
[   41.621588]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.622320]  kthread+0x24c/0x2d0
[   41.622997]  ret_from_fork+0x10/0x20
[   41.623629] 
[   41.623956] The buggy address belongs to the object at fff00000c6998980
[   41.623956]  which belongs to the cache kmalloc-64 of size 64
[   41.625328] The buggy address is located 0 bytes to the right of
[   41.625328]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   41.626838] 
[   41.627177] The buggy address belongs to the physical page:
[   41.627839] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   41.628817] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.629675] page_type: f5(slab)
[   41.630273] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.631233] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.632150] page dumped because: kasan: bad access detected
[   41.632932] 
[   41.633261] Memory state around the buggy address:
[   41.633974]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.634816]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.635870] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.636760]                                      ^
[   41.637360]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.638226]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.639217] ==================================================================
---
[   41.519706] ==================================================================
[   41.520775] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   41.521321] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   41.521951] 
[   41.522413] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   41.523771] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.524577] Hardware name: linux,dummy-virt (DT)
[   41.525409] Call trace:
[   41.526073]  show_stack+0x20/0x38 (C)
[   41.526838]  dump_stack_lvl+0x8c/0xd0
[   41.527446]  print_report+0x118/0x5e0
[   41.528148]  kasan_report+0xc8/0x118
[   41.528763]  kasan_check_range+0x100/0x1a8
[   41.529398]  __kasan_check_write+0x20/0x30
[   41.530070]  kasan_atomics_helper+0x894/0x4858
[   41.530789]  kasan_atomics+0x198/0x2e8
[   41.531281]  kunit_try_run_case+0x14c/0x3d0
[   41.532014]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.532731]  kthread+0x24c/0x2d0
[   41.533351]  ret_from_fork+0x10/0x20
[   41.534043] 
[   41.534442] Allocated by task 253:
[   41.535014]  kasan_save_stack+0x3c/0x68
[   41.535662]  kasan_save_track+0x20/0x40
[   41.536175]  kasan_save_alloc_info+0x40/0x58
[   41.536918]  __kasan_kmalloc+0xd4/0xd8
[   41.537532]  __kmalloc_cache_noprof+0x15c/0x3c0
[   41.538164]  kasan_atomics+0xb8/0x2e8
[   41.538722]  kunit_try_run_case+0x14c/0x3d0
[   41.539372]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.540097]  kthread+0x24c/0x2d0
[   41.540695]  ret_from_fork+0x10/0x20
[   41.541237] 
[   41.541632] The buggy address belongs to the object at fff00000c6998980
[   41.541632]  which belongs to the cache kmalloc-64 of size 64
[   41.543110] The buggy address is located 0 bytes to the right of
[   41.543110]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   41.544499] 
[   41.544893] The buggy address belongs to the physical page:
[   41.545673] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   41.546586] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.547406] page_type: f5(slab)
[   41.548114] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.549087] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.550151] page dumped because: kasan: bad access detected
[   41.550958] 
[   41.551293] Memory state around the buggy address:
[   41.551917]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.552813]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.553754] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.554816]                                      ^
[   41.555399]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.556262]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.557192] ==================================================================
---
[   41.431810] ==================================================================
[   41.432889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   41.433740] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   41.434717] 
[   41.435105] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   41.436845] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.437484] Hardware name: linux,dummy-virt (DT)
[   41.438258] Call trace:
[   41.438683]  show_stack+0x20/0x38 (C)
[   41.439505]  dump_stack_lvl+0x8c/0xd0
[   41.440191]  print_report+0x118/0x5e0
[   41.441060]  kasan_report+0xc8/0x118
[   41.441802]  kasan_check_range+0x100/0x1a8
[   41.442605]  __kasan_check_write+0x20/0x30
[   41.443288]  kasan_atomics_helper+0x760/0x4858
[   41.445301]  kasan_atomics+0x198/0x2e8
[   41.446027]  kunit_try_run_case+0x14c/0x3d0
[   41.446859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.447432]  kthread+0x24c/0x2d0
[   41.447909]  ret_from_fork+0x10/0x20
[   41.449775] 
[   41.450180] Allocated by task 253:
[   41.451205]  kasan_save_stack+0x3c/0x68
[   41.452034]  kasan_save_track+0x20/0x40
[   41.452791]  kasan_save_alloc_info+0x40/0x58
[   41.453634]  __kasan_kmalloc+0xd4/0xd8
[   41.453940]  __kmalloc_cache_noprof+0x15c/0x3c0
[   41.454270]  kasan_atomics+0xb8/0x2e8
[   41.454595]  kunit_try_run_case+0x14c/0x3d0
[   41.455074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.456050]  kthread+0x24c/0x2d0
[   41.456747]  ret_from_fork+0x10/0x20
[   41.457407] 
[   41.457838] The buggy address belongs to the object at fff00000c6998980
[   41.457838]  which belongs to the cache kmalloc-64 of size 64
[   41.459096] The buggy address is located 0 bytes to the right of
[   41.459096]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   41.460415] 
[   41.460760] The buggy address belongs to the physical page:
[   41.461693] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   41.462594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.463567] page_type: f5(slab)
[   41.464201] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.465101] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.465946] page dumped because: kasan: bad access detected
[   41.466793] 
[   41.467245] Memory state around the buggy address:
[   41.467985]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.468847]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.469771] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.470665]                                      ^
[   41.471419]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.472278]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.473218] ==================================================================
---
[   41.346730] ==================================================================
[   41.347459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   41.348857] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   41.349863] 
[   41.350433] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   41.351710] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.352409] Hardware name: linux,dummy-virt (DT)
[   41.353154] Call trace:
[   41.353671]  show_stack+0x20/0x38 (C)
[   41.354408]  dump_stack_lvl+0x8c/0xd0
[   41.355131]  print_report+0x118/0x5e0
[   41.355803]  kasan_report+0xc8/0x118
[   41.356440]  kasan_check_range+0x100/0x1a8
[   41.357174]  __kasan_check_write+0x20/0x30
[   41.357915]  kasan_atomics_helper+0x684/0x4858
[   41.358618]  kasan_atomics+0x198/0x2e8
[   41.359282]  kunit_try_run_case+0x14c/0x3d0
[   41.360010]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.360850]  kthread+0x24c/0x2d0
[   41.361470]  ret_from_fork+0x10/0x20
[   41.362132] 
[   41.362578] Allocated by task 253:
[   41.363231]  kasan_save_stack+0x3c/0x68
[   41.363781]  kasan_save_track+0x20/0x40
[   41.364573]  kasan_save_alloc_info+0x40/0x58
[   41.365336]  __kasan_kmalloc+0xd4/0xd8
[   41.366075]  __kmalloc_cache_noprof+0x15c/0x3c0
[   41.366808]  kasan_atomics+0xb8/0x2e8
[   41.367470]  kunit_try_run_case+0x14c/0x3d0
[   41.368257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.368961]  kthread+0x24c/0x2d0
[   41.369477]  ret_from_fork+0x10/0x20
[   41.370035] 
[   41.370368] The buggy address belongs to the object at fff00000c6998980
[   41.370368]  which belongs to the cache kmalloc-64 of size 64
[   41.371686] The buggy address is located 0 bytes to the right of
[   41.371686]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   41.373144] 
[   41.373569] The buggy address belongs to the physical page:
[   41.374415] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   41.375538] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.376497] page_type: f5(slab)
[   41.377061] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.378190] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.379201] page dumped because: kasan: bad access detected
[   41.380035] 
[   41.380387] Memory state around the buggy address:
[   41.381138]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.382129]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.383111] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.384089]                                      ^
[   41.384786]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.385752]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.386674] ==================================================================
---
[   41.079212] ==================================================================
[   41.080565] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   41.081233] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   41.082402] 
[   41.083001] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   41.084352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.085241] Hardware name: linux,dummy-virt (DT)
[   41.086370] Call trace:
[   41.086905]  show_stack+0x20/0x38 (C)
[   41.087609]  dump_stack_lvl+0x8c/0xd0
[   41.088441]  print_report+0x118/0x5e0
[   41.089165]  kasan_report+0xc8/0x118
[   41.089792]  kasan_check_range+0x100/0x1a8
[   41.090511]  __kasan_check_write+0x20/0x30
[   41.091285]  kasan_atomics_helper+0x414/0x4858
[   41.092185]  kasan_atomics+0x198/0x2e8
[   41.093044]  kunit_try_run_case+0x14c/0x3d0
[   41.094169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.094746]  kthread+0x24c/0x2d0
[   41.096000]  ret_from_fork+0x10/0x20
[   41.096686] 
[   41.097131] Allocated by task 253:
[   41.097786]  kasan_save_stack+0x3c/0x68
[   41.098345]  kasan_save_track+0x20/0x40
[   41.099677]  kasan_save_alloc_info+0x40/0x58
[   41.100174]  __kasan_kmalloc+0xd4/0xd8
[   41.101173]  __kmalloc_cache_noprof+0x15c/0x3c0
[   41.102202]  kasan_atomics+0xb8/0x2e8
[   41.102881]  kunit_try_run_case+0x14c/0x3d0
[   41.103862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.105162]  kthread+0x24c/0x2d0
[   41.106450]  ret_from_fork+0x10/0x20
[   41.107504] 
[   41.107907] The buggy address belongs to the object at fff00000c6998980
[   41.107907]  which belongs to the cache kmalloc-64 of size 64
[   41.109503] The buggy address is located 0 bytes to the right of
[   41.109503]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   41.111297] 
[   41.112188] The buggy address belongs to the physical page:
[   41.112969] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   41.113791] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.114932] page_type: f5(slab)
[   41.116072] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.116991] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.118048] page dumped because: kasan: bad access detected
[   41.119337] 
[   41.119696] Memory state around the buggy address:
[   41.120761]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.121835]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.123297] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.124672]                                      ^
[   41.126154]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.127379]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.128305] ==================================================================
---
[   42.473906] ==================================================================
[   42.474885] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   42.475828] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[   42.476938] 
[   42.477511] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   42.478871] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.479721] Hardware name: linux,dummy-virt (DT)
[   42.480412] Call trace:
[   42.480883]  show_stack+0x20/0x38 (C)
[   42.481566]  dump_stack_lvl+0x8c/0xd0
[   42.482165]  print_report+0x118/0x5e0
[   42.482824]  kasan_report+0xc8/0x118
[   42.483398]  kasan_check_range+0x100/0x1a8
[   42.484033]  __kasan_check_write+0x20/0x30
[   42.484708]  kasan_atomics_helper+0xff0/0x4858
[   42.485372]  kasan_atomics+0x198/0x2e8
[   42.486059]  kunit_try_run_case+0x14c/0x3d0
[   42.486710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.487543]  kthread+0x24c/0x2d0
[   42.488065]  ret_from_fork+0x10/0x20
[   42.488722] 
[   42.489122] Allocated by task 253:
[   42.489707]  kasan_save_stack+0x3c/0x68
[   42.490283]  kasan_save_track+0x20/0x40
[   42.490962]  kasan_save_alloc_info+0x40/0x58
[   42.491626]  __kasan_kmalloc+0xd4/0xd8
[   42.492128]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.492869]  kasan_atomics+0xb8/0x2e8
[   42.493445]  kunit_try_run_case+0x14c/0x3d0
[   42.493971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.494834]  kthread+0x24c/0x2d0
[   42.495356]  ret_from_fork+0x10/0x20
[   42.495937] 
[   42.496280] The buggy address belongs to the object at fff00000c6998980
[   42.496280]  which belongs to the cache kmalloc-64 of size 64
[   42.497802] The buggy address is located 0 bytes to the right of
[   42.497802]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   42.499256] 
[   42.499780] The buggy address belongs to the physical page:
[   42.500360] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   42.501451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.502170] page_type: f5(slab)
[   42.502781] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.503694] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.504725] page dumped because: kasan: bad access detected
[   42.505490] 
[   42.505877] Memory state around the buggy address:
[   42.506495]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.507381]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.508231] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.509172]                                      ^
[   42.509877]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.510834]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.511670] ==================================================================
---
[   42.431108] ==================================================================
[   42.432183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   42.433120] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[   42.434339] 
[   42.434713] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   42.435846] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.436550] Hardware name: linux,dummy-virt (DT)
[   42.437175] Call trace:
[   42.437751]  show_stack+0x20/0x38 (C)
[   42.438443]  dump_stack_lvl+0x8c/0xd0
[   42.438998]  print_report+0x118/0x5e0
[   42.439705]  kasan_report+0xc8/0x118
[   42.440231]  kasan_check_range+0x100/0x1a8
[   42.441125]  __kasan_check_write+0x20/0x30
[   42.441971]  kasan_atomics_helper+0xf88/0x4858
[   42.442679]  kasan_atomics+0x198/0x2e8
[   42.443221]  kunit_try_run_case+0x14c/0x3d0
[   42.443993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.444768]  kthread+0x24c/0x2d0
[   42.445468]  ret_from_fork+0x10/0x20
[   42.446190] 
[   42.446496] Allocated by task 253:
[   42.447173]  kasan_save_stack+0x3c/0x68
[   42.447871]  kasan_save_track+0x20/0x40
[   42.448560]  kasan_save_alloc_info+0x40/0x58
[   42.449153]  __kasan_kmalloc+0xd4/0xd8
[   42.449734]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.450359]  kasan_atomics+0xb8/0x2e8
[   42.451043]  kunit_try_run_case+0x14c/0x3d0
[   42.451618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.452577]  kthread+0x24c/0x2d0
[   42.453210]  ret_from_fork+0x10/0x20
[   42.453782] 
[   42.454183] The buggy address belongs to the object at fff00000c6998980
[   42.454183]  which belongs to the cache kmalloc-64 of size 64
[   42.455668] The buggy address is located 0 bytes to the right of
[   42.455668]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   42.457099] 
[   42.457466] The buggy address belongs to the physical page:
[   42.458410] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   42.459297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.460228] page_type: f5(slab)
[   42.461172] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.462268] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.463174] page dumped because: kasan: bad access detected
[   42.463947] 
[   42.464319] Memory state around the buggy address:
[   42.465354]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.466399]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.467435] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.468491]                                      ^
[   42.469328]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.470567]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.471507] ==================================================================
---
[   41.301000] ==================================================================
[   41.302426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   41.304274] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   41.306465] 
[   41.307005] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   41.308257] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.309010] Hardware name: linux,dummy-virt (DT)
[   41.309730] Call trace:
[   41.310227]  show_stack+0x20/0x38 (C)
[   41.310881]  dump_stack_lvl+0x8c/0xd0
[   41.311671]  print_report+0x118/0x5e0
[   41.312312]  kasan_report+0xc8/0x118
[   41.312965]  kasan_check_range+0x100/0x1a8
[   41.313712]  __kasan_check_write+0x20/0x30
[   41.314430]  kasan_atomics_helper+0x61c/0x4858
[   41.315190]  kasan_atomics+0x198/0x2e8
[   41.315903]  kunit_try_run_case+0x14c/0x3d0
[   41.316607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.317568]  kthread+0x24c/0x2d0
[   41.318255]  ret_from_fork+0x10/0x20
[   41.318974] 
[   41.319563] Allocated by task 253:
[   41.320250]  kasan_save_stack+0x3c/0x68
[   41.320947]  kasan_save_track+0x20/0x40
[   41.321635]  kasan_save_alloc_info+0x40/0x58
[   41.322350]  __kasan_kmalloc+0xd4/0xd8
[   41.322971]  __kmalloc_cache_noprof+0x15c/0x3c0
[   41.323732]  kasan_atomics+0xb8/0x2e8
[   41.324418]  kunit_try_run_case+0x14c/0x3d0
[   41.325191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.326101]  kthread+0x24c/0x2d0
[   41.326689]  ret_from_fork+0x10/0x20
[   41.327342] 
[   41.327802] The buggy address belongs to the object at fff00000c6998980
[   41.327802]  which belongs to the cache kmalloc-64 of size 64
[   41.329323] The buggy address is located 0 bytes to the right of
[   41.329323]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   41.330907] 
[   41.331428] The buggy address belongs to the physical page:
[   41.332296] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   41.333389] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.334346] page_type: f5(slab)
[   41.335045] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.336194] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.337207] page dumped because: kasan: bad access detected
[   41.338032] 
[   41.338574] Memory state around the buggy address:
[   41.339298]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.340361]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.341329] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.342280]                                      ^
[   41.343126]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.344099]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.345105] ==================================================================
---
[   42.981631] ==================================================================
[   42.982542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   42.983494] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[   42.984380] 
[   42.984716] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   42.986198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.986698] Hardware name: linux,dummy-virt (DT)
[   42.987331] Call trace:
[   42.987929]  show_stack+0x20/0x38 (C)
[   42.988779]  dump_stack_lvl+0x8c/0xd0
[   42.989463]  print_report+0x118/0x5e0
[   42.990182]  kasan_report+0xc8/0x118
[   42.990746]  kasan_check_range+0x100/0x1a8
[   42.991469]  __kasan_check_write+0x20/0x30
[   42.992170]  kasan_atomics_helper+0x14e4/0x4858
[   42.993081]  kasan_atomics+0x198/0x2e8
[   42.993767]  kunit_try_run_case+0x14c/0x3d0
[   42.994572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.995239]  kthread+0x24c/0x2d0
[   42.995860]  ret_from_fork+0x10/0x20
[   42.996441] 
[   42.996797] Allocated by task 253:
[   42.997396]  kasan_save_stack+0x3c/0x68
[   42.998055]  kasan_save_track+0x20/0x40
[   42.998607]  kasan_save_alloc_info+0x40/0x58
[   42.999289]  __kasan_kmalloc+0xd4/0xd8
[   42.999847]  __kmalloc_cache_noprof+0x15c/0x3c0
[   43.000630]  kasan_atomics+0xb8/0x2e8
[   43.001199]  kunit_try_run_case+0x14c/0x3d0
[   43.001969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.002762]  kthread+0x24c/0x2d0
[   43.003367]  ret_from_fork+0x10/0x20
[   43.003910] 
[   43.004268] The buggy address belongs to the object at fff00000c6998980
[   43.004268]  which belongs to the cache kmalloc-64 of size 64
[   43.005716] The buggy address is located 0 bytes to the right of
[   43.005716]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   43.007169] 
[   43.007553] The buggy address belongs to the physical page:
[   43.008175] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   43.009209] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.010074] page_type: f5(slab)
[   43.010744] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   43.011671] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   43.012634] page dumped because: kasan: bad access detected
[   43.013462] 
[   43.013782] Memory state around the buggy address:
[   43.014419]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.015455]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.016347] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   43.017325]                                      ^
[   43.018124]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.019115]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.019893] ==================================================================
---
[   41.475403] ==================================================================
[   41.476759] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   41.477833] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   41.478650] 
[   41.479193] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   41.480496] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.481162] Hardware name: linux,dummy-virt (DT)
[   41.481923] Call trace:
[   41.482551]  show_stack+0x20/0x38 (C)
[   41.483277]  dump_stack_lvl+0x8c/0xd0
[   41.483938]  print_report+0x118/0x5e0
[   41.484613]  kasan_report+0xc8/0x118
[   41.485223]  kasan_check_range+0x100/0x1a8
[   41.486176]  __kasan_check_write+0x20/0x30
[   41.486694]  kasan_atomics_helper+0x7cc/0x4858
[   41.487189]  kasan_atomics+0x198/0x2e8
[   41.488744]  kunit_try_run_case+0x14c/0x3d0
[   41.489646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.490560]  kthread+0x24c/0x2d0
[   41.491352]  ret_from_fork+0x10/0x20
[   41.492081] 
[   41.492561] Allocated by task 253:
[   41.493184]  kasan_save_stack+0x3c/0x68
[   41.493930]  kasan_save_track+0x20/0x40
[   41.494816]  kasan_save_alloc_info+0x40/0x58
[   41.495613]  __kasan_kmalloc+0xd4/0xd8
[   41.496315]  __kmalloc_cache_noprof+0x15c/0x3c0
[   41.497097]  kasan_atomics+0xb8/0x2e8
[   41.497717]  kunit_try_run_case+0x14c/0x3d0
[   41.498303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.499028]  kthread+0x24c/0x2d0
[   41.499610]  ret_from_fork+0x10/0x20
[   41.500179] 
[   41.500475] The buggy address belongs to the object at fff00000c6998980
[   41.500475]  which belongs to the cache kmalloc-64 of size 64
[   41.502249] The buggy address is located 0 bytes to the right of
[   41.502249]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   41.504273] 
[   41.504751] The buggy address belongs to the physical page:
[   41.505376] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   41.506646] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.507626] page_type: f5(slab)
[   41.508299] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.509216] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.510186] page dumped because: kasan: bad access detected
[   41.511045] 
[   41.511481] Memory state around the buggy address:
[   41.512202]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.513224]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.514168] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.515083]                                      ^
[   41.515837]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.516781]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.517768] ==================================================================
---
[   42.813391] ==================================================================
[   42.814368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   42.816289] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[   42.817486] 
[   42.818035] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   42.820268] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.820974] Hardware name: linux,dummy-virt (DT)
[   42.821824] Call trace:
[   42.822242]  show_stack+0x20/0x38 (C)
[   42.823070]  dump_stack_lvl+0x8c/0xd0
[   42.823742]  print_report+0x118/0x5e0
[   42.824374]  kasan_report+0xc8/0x118
[   42.824995]  kasan_check_range+0x100/0x1a8
[   42.825655]  __kasan_check_write+0x20/0x30
[   42.826321]  kasan_atomics_helper+0x1384/0x4858
[   42.827141]  kasan_atomics+0x198/0x2e8
[   42.827827]  kunit_try_run_case+0x14c/0x3d0
[   42.828559]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.829334]  kthread+0x24c/0x2d0
[   42.829880]  ret_from_fork+0x10/0x20
[   42.830596] 
[   42.830991] Allocated by task 253:
[   42.831697]  kasan_save_stack+0x3c/0x68
[   42.832428]  kasan_save_track+0x20/0x40
[   42.833139]  kasan_save_alloc_info+0x40/0x58
[   42.833923]  __kasan_kmalloc+0xd4/0xd8
[   42.834587]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.835380]  kasan_atomics+0xb8/0x2e8
[   42.836194]  kunit_try_run_case+0x14c/0x3d0
[   42.836918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.837783]  kthread+0x24c/0x2d0
[   42.838328]  ret_from_fork+0x10/0x20
[   42.839004] 
[   42.839432] The buggy address belongs to the object at fff00000c6998980
[   42.839432]  which belongs to the cache kmalloc-64 of size 64
[   42.841052] The buggy address is located 0 bytes to the right of
[   42.841052]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   42.842757] 
[   42.843269] The buggy address belongs to the physical page:
[   42.844011] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   42.845118] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.846026] page_type: f5(slab)
[   42.846586] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.847756] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.848826] page dumped because: kasan: bad access detected
[   42.849644] 
[   42.850075] Memory state around the buggy address:
[   42.851010]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.852020]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.852985] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.853988]                                      ^
[   42.854732]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.855677]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.856600] ==================================================================
---
[   41.842831] ==================================================================
[   41.844156] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   41.845560] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   41.846442] 
[   41.846790] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   41.847900] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.848497] Hardware name: linux,dummy-virt (DT)
[   41.849326] Call trace:
[   41.849832]  show_stack+0x20/0x38 (C)
[   41.850356]  dump_stack_lvl+0x8c/0xd0
[   41.851056]  print_report+0x118/0x5e0
[   41.851706]  kasan_report+0xc8/0x118
[   41.852237]  kasan_check_range+0x100/0x1a8
[   41.853045]  __kasan_check_write+0x20/0x30
[   41.853798]  kasan_atomics_helper+0xb70/0x4858
[   41.854631]  kasan_atomics+0x198/0x2e8
[   41.855381]  kunit_try_run_case+0x14c/0x3d0
[   41.856055]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.856833]  kthread+0x24c/0x2d0
[   41.857431]  ret_from_fork+0x10/0x20
[   41.858036] 
[   41.858368] Allocated by task 253:
[   41.859023]  kasan_save_stack+0x3c/0x68
[   41.859697]  kasan_save_track+0x20/0x40
[   41.860354]  kasan_save_alloc_info+0x40/0x58
[   41.861029]  __kasan_kmalloc+0xd4/0xd8
[   41.861616]  __kmalloc_cache_noprof+0x15c/0x3c0
[   41.862281]  kasan_atomics+0xb8/0x2e8
[   41.862852]  kunit_try_run_case+0x14c/0x3d0
[   41.863449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.864234]  kthread+0x24c/0x2d0
[   41.864769]  ret_from_fork+0x10/0x20
[   41.865306] 
[   41.865629] The buggy address belongs to the object at fff00000c6998980
[   41.865629]  which belongs to the cache kmalloc-64 of size 64
[   41.867152] The buggy address is located 0 bytes to the right of
[   41.867152]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   41.868668] 
[   41.869035] The buggy address belongs to the physical page:
[   41.869834] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   41.870749] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.871818] page_type: f5(slab)
[   41.872433] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.873400] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.874432] page dumped because: kasan: bad access detected
[   41.875220] 
[   41.875631] Memory state around the buggy address:
[   41.876249]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.877140]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.878155] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.879147]                                      ^
[   41.879926]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.880927]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.881883] ==================================================================
---
[   42.093480] ==================================================================
[   42.094582] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   42.096844] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   42.098278] 
[   42.098877] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   42.100163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.100677] Hardware name: linux,dummy-virt (DT)
[   42.101451] Call trace:
[   42.101906]  show_stack+0x20/0x38 (C)
[   42.102759]  dump_stack_lvl+0x8c/0xd0
[   42.103373]  print_report+0x118/0x5e0
[   42.104203]  kasan_report+0xc8/0x118
[   42.104866]  kasan_check_range+0x100/0x1a8
[   42.105503]  __kasan_check_write+0x20/0x30
[   42.106148]  kasan_atomics_helper+0xd3c/0x4858
[   42.106894]  kasan_atomics+0x198/0x2e8
[   42.107351]  kunit_try_run_case+0x14c/0x3d0
[   42.107851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.108405]  kthread+0x24c/0x2d0
[   42.108848]  ret_from_fork+0x10/0x20
[   42.109421] 
[   42.109884] Allocated by task 253:
[   42.110655]  kasan_save_stack+0x3c/0x68
[   42.111193]  kasan_save_track+0x20/0x40
[   42.111890]  kasan_save_alloc_info+0x40/0x58
[   42.112437]  __kasan_kmalloc+0xd4/0xd8
[   42.113145]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.113816]  kasan_atomics+0xb8/0x2e8
[   42.114287]  kunit_try_run_case+0x14c/0x3d0
[   42.115333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.116283]  kthread+0x24c/0x2d0
[   42.116799]  ret_from_fork+0x10/0x20
[   42.117232] 
[   42.117555] The buggy address belongs to the object at fff00000c6998980
[   42.117555]  which belongs to the cache kmalloc-64 of size 64
[   42.118927] The buggy address is located 0 bytes to the right of
[   42.118927]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   42.120396] 
[   42.120949] The buggy address belongs to the physical page:
[   42.121792] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   42.123000] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.123913] page_type: f5(slab)
[   42.124628] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.125540] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.126656] page dumped because: kasan: bad access detected
[   42.127398] 
[   42.127700] Memory state around the buggy address:
[   42.128166]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.129248]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.130117] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.131126]                                      ^
[   42.131830]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.132924]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.133804] ==================================================================
---
[   41.388506] ==================================================================
[   41.389861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   41.390847] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   41.391791] 
[   41.392352] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   41.393566] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.394194] Hardware name: linux,dummy-virt (DT)
[   41.394939] Call trace:
[   41.395435]  show_stack+0x20/0x38 (C)
[   41.396157]  dump_stack_lvl+0x8c/0xd0
[   41.396830]  print_report+0x118/0x5e0
[   41.397513]  kasan_report+0xc8/0x118
[   41.398238]  kasan_check_range+0x100/0x1a8
[   41.398966]  __kasan_check_write+0x20/0x30
[   41.399673]  kasan_atomics_helper+0x6ec/0x4858
[   41.400344]  kasan_atomics+0x198/0x2e8
[   41.400975]  kunit_try_run_case+0x14c/0x3d0
[   41.401837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.402807]  kthread+0x24c/0x2d0
[   41.403361]  ret_from_fork+0x10/0x20
[   41.404125] 
[   41.404490] Allocated by task 253:
[   41.405112]  kasan_save_stack+0x3c/0x68
[   41.405878]  kasan_save_track+0x20/0x40
[   41.406559]  kasan_save_alloc_info+0x40/0x58
[   41.407274]  __kasan_kmalloc+0xd4/0xd8
[   41.407863]  __kmalloc_cache_noprof+0x15c/0x3c0
[   41.408586]  kasan_atomics+0xb8/0x2e8
[   41.409349]  kunit_try_run_case+0x14c/0x3d0
[   41.410004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.410888]  kthread+0x24c/0x2d0
[   41.411569]  ret_from_fork+0x10/0x20
[   41.412300] 
[   41.412659] The buggy address belongs to the object at fff00000c6998980
[   41.412659]  which belongs to the cache kmalloc-64 of size 64
[   41.414322] The buggy address is located 0 bytes to the right of
[   41.414322]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   41.415959] 
[   41.416423] The buggy address belongs to the physical page:
[   41.417207] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   41.418302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.419199] page_type: f5(slab)
[   41.419787] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.420823] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.421927] page dumped because: kasan: bad access detected
[   41.422751] 
[   41.423242] Memory state around the buggy address:
[   41.423891]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.424993]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.426070] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.427007]                                      ^
[   41.427758]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.428754]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.429727] ==================================================================
---
[   41.218146] ==================================================================
[   41.219058] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   41.220076] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   41.221077] 
[   41.221624] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   41.222837] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.223611] Hardware name: linux,dummy-virt (DT)
[   41.224252] Call trace:
[   41.224692]  show_stack+0x20/0x38 (C)
[   41.225447]  dump_stack_lvl+0x8c/0xd0
[   41.226297]  print_report+0x118/0x5e0
[   41.227008]  kasan_report+0xc8/0x118
[   41.227639]  kasan_check_range+0x100/0x1a8
[   41.228279]  __kasan_check_write+0x20/0x30
[   41.228902]  kasan_atomics_helper+0x54c/0x4858
[   41.229547]  kasan_atomics+0x198/0x2e8
[   41.230165]  kunit_try_run_case+0x14c/0x3d0
[   41.230879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.231875]  kthread+0x24c/0x2d0
[   41.232564]  ret_from_fork+0x10/0x20
[   41.233247] 
[   41.233642] Allocated by task 253:
[   41.234299]  kasan_save_stack+0x3c/0x68
[   41.234983]  kasan_save_track+0x20/0x40
[   41.235495]  kasan_save_alloc_info+0x40/0x58
[   41.236194]  __kasan_kmalloc+0xd4/0xd8
[   41.236842]  __kmalloc_cache_noprof+0x15c/0x3c0
[   41.237613]  kasan_atomics+0xb8/0x2e8
[   41.238225]  kunit_try_run_case+0x14c/0x3d0
[   41.238946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.239724]  kthread+0x24c/0x2d0
[   41.240262]  ret_from_fork+0x10/0x20
[   41.240823] 
[   41.241129] The buggy address belongs to the object at fff00000c6998980
[   41.241129]  which belongs to the cache kmalloc-64 of size 64
[   41.242775] The buggy address is located 0 bytes to the right of
[   41.242775]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   41.244330] 
[   41.244723] The buggy address belongs to the physical page:
[   41.245558] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   41.246504] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.247470] page_type: f5(slab)
[   41.248138] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.249042] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.250010] page dumped because: kasan: bad access detected
[   41.250616] 
[   41.251011] Memory state around the buggy address:
[   41.251612]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.252678]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.253577] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.254415]                                      ^
[   41.255229]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.256109]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.257010] ==================================================================
---
[   42.557569] ==================================================================
[   42.558696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   42.560610] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[   42.561469] 
[   42.561894] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   42.563092] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.563661] Hardware name: linux,dummy-virt (DT)
[   42.564377] Call trace:
[   42.564910]  show_stack+0x20/0x38 (C)
[   42.565480]  dump_stack_lvl+0x8c/0xd0
[   42.566241]  print_report+0x118/0x5e0
[   42.566897]  kasan_report+0xc8/0x118
[   42.567465]  kasan_check_range+0x100/0x1a8
[   42.568144]  __kasan_check_write+0x20/0x30
[   42.568677]  kasan_atomics_helper+0x10c0/0x4858
[   42.569483]  kasan_atomics+0x198/0x2e8
[   42.570205]  kunit_try_run_case+0x14c/0x3d0
[   42.570795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.571499]  kthread+0x24c/0x2d0
[   42.572173]  ret_from_fork+0x10/0x20
[   42.572976] 
[   42.573310] Allocated by task 253:
[   42.573975]  kasan_save_stack+0x3c/0x68
[   42.574598]  kasan_save_track+0x20/0x40
[   42.575139]  kasan_save_alloc_info+0x40/0x58
[   42.575835]  __kasan_kmalloc+0xd4/0xd8
[   42.576364]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.577134]  kasan_atomics+0xb8/0x2e8
[   42.577728]  kunit_try_run_case+0x14c/0x3d0
[   42.578335]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.579109]  kthread+0x24c/0x2d0
[   42.579687]  ret_from_fork+0x10/0x20
[   42.580275] 
[   42.580596] The buggy address belongs to the object at fff00000c6998980
[   42.580596]  which belongs to the cache kmalloc-64 of size 64
[   42.581882] The buggy address is located 0 bytes to the right of
[   42.581882]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   42.583378] 
[   42.583720] The buggy address belongs to the physical page:
[   42.584585] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   42.585542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.586348] page_type: f5(slab)
[   42.586968] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.587880] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.588883] page dumped because: kasan: bad access detected
[   42.589638] 
[   42.590010] Memory state around the buggy address:
[   42.590660]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.591783]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.592641] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.593723]                                      ^
[   42.594339]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.595172]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.596285] ==================================================================
---
[   41.130456] ==================================================================
[   41.131780] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   41.133011] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   41.134007] 
[   41.134585] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   41.135897] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.136795] Hardware name: linux,dummy-virt (DT)
[   41.137371] Call trace:
[   41.137876]  show_stack+0x20/0x38 (C)
[   41.138778]  dump_stack_lvl+0x8c/0xd0
[   41.139312]  print_report+0x118/0x5e0
[   41.140181]  kasan_report+0xc8/0x118
[   41.141060]  kasan_check_range+0x100/0x1a8
[   41.141737]  __kasan_check_write+0x20/0x30
[   41.142605]  kasan_atomics_helper+0x47c/0x4858
[   41.143578]  kasan_atomics+0x198/0x2e8
[   41.144462]  kunit_try_run_case+0x14c/0x3d0
[   41.145204]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.146082]  kthread+0x24c/0x2d0
[   41.146728]  ret_from_fork+0x10/0x20
[   41.147405] 
[   41.147886] Allocated by task 253:
[   41.148428]  kasan_save_stack+0x3c/0x68
[   41.149223]  kasan_save_track+0x20/0x40
[   41.149925]  kasan_save_alloc_info+0x40/0x58
[   41.150618]  __kasan_kmalloc+0xd4/0xd8
[   41.151331]  __kmalloc_cache_noprof+0x15c/0x3c0
[   41.152018]  kasan_atomics+0xb8/0x2e8
[   41.152729]  kunit_try_run_case+0x14c/0x3d0
[   41.153447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.154335]  kthread+0x24c/0x2d0
[   41.154918]  ret_from_fork+0x10/0x20
[   41.155550] 
[   41.156005] The buggy address belongs to the object at fff00000c6998980
[   41.156005]  which belongs to the cache kmalloc-64 of size 64
[   41.157557] The buggy address is located 0 bytes to the right of
[   41.157557]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   41.159134] 
[   41.159673] The buggy address belongs to the physical page:
[   41.160541] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   41.161631] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.162570] page_type: f5(slab)
[   41.163095] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.164229] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.165101] page dumped because: kasan: bad access detected
[   41.165858] 
[   41.166225] Memory state around the buggy address:
[   41.166921]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.167863]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.168664] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.169687]                                      ^
[   41.170295]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.171386]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.172273] ==================================================================
---
[   43.021604] ==================================================================
[   43.022424] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   43.023840] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[   43.024941] 
[   43.025396] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   43.026671] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.027208] Hardware name: linux,dummy-virt (DT)
[   43.028002] Call trace:
[   43.028389]  show_stack+0x20/0x38 (C)
[   43.029088]  dump_stack_lvl+0x8c/0xd0
[   43.029780]  print_report+0x118/0x5e0
[   43.030364]  kasan_report+0xc8/0x118
[   43.030949]  kasan_check_range+0x100/0x1a8
[   43.031563]  __kasan_check_write+0x20/0x30
[   43.032304]  kasan_atomics_helper+0x154c/0x4858
[   43.032942]  kasan_atomics+0x198/0x2e8
[   43.033698]  kunit_try_run_case+0x14c/0x3d0
[   43.034313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.035230]  kthread+0x24c/0x2d0
[   43.035808]  ret_from_fork+0x10/0x20
[   43.036483] 
[   43.036883] Allocated by task 253:
[   43.037408]  kasan_save_stack+0x3c/0x68
[   43.038028]  kasan_save_track+0x20/0x40
[   43.038679]  kasan_save_alloc_info+0x40/0x58
[   43.039354]  __kasan_kmalloc+0xd4/0xd8
[   43.039930]  __kmalloc_cache_noprof+0x15c/0x3c0
[   43.040617]  kasan_atomics+0xb8/0x2e8
[   43.041199]  kunit_try_run_case+0x14c/0x3d0
[   43.041871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.042647]  kthread+0x24c/0x2d0
[   43.043182]  ret_from_fork+0x10/0x20
[   43.043700] 
[   43.044152] The buggy address belongs to the object at fff00000c6998980
[   43.044152]  which belongs to the cache kmalloc-64 of size 64
[   43.045588] The buggy address is located 0 bytes to the right of
[   43.045588]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   43.047069] 
[   43.047429] The buggy address belongs to the physical page:
[   43.048335] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   43.049312] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.050263] page_type: f5(slab)
[   43.050724] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   43.051797] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   43.052738] page dumped because: kasan: bad access detected
[   43.053468] 
[   43.053845] Memory state around the buggy address:
[   43.054487]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.055563]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.056442] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   43.057395]                                      ^
[   43.058138]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.059077]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.059962] ==================================================================
---
[   40.777771] ==================================================================
[   40.778807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   40.780437] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   40.781809] 
[   40.782220] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   40.783830] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.784448] Hardware name: linux,dummy-virt (DT)
[   40.785078] Call trace:
[   40.785438]  show_stack+0x20/0x38 (C)
[   40.785953]  dump_stack_lvl+0x8c/0xd0
[   40.786585]  print_report+0x118/0x5e0
[   40.787432]  kasan_report+0xc8/0x118
[   40.787961]  kasan_check_range+0x100/0x1a8
[   40.789101]  __kasan_check_write+0x20/0x30
[   40.790012]  kasan_atomics_helper+0x24c/0x4858
[   40.790754]  kasan_atomics+0x198/0x2e8
[   40.792005]  kunit_try_run_case+0x14c/0x3d0
[   40.792776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.793571]  kthread+0x24c/0x2d0
[   40.794176]  ret_from_fork+0x10/0x20
[   40.794952] 
[   40.795510] Allocated by task 253:
[   40.796278]  kasan_save_stack+0x3c/0x68
[   40.796788]  kasan_save_track+0x20/0x40
[   40.797762]  kasan_save_alloc_info+0x40/0x58
[   40.799428]  __kasan_kmalloc+0xd4/0xd8
[   40.800091]  __kmalloc_cache_noprof+0x15c/0x3c0
[   40.800729]  kasan_atomics+0xb8/0x2e8
[   40.802101]  kunit_try_run_case+0x14c/0x3d0
[   40.802757]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.803834]  kthread+0x24c/0x2d0
[   40.804738]  ret_from_fork+0x10/0x20
[   40.806060] 
[   40.806487] The buggy address belongs to the object at fff00000c6998980
[   40.806487]  which belongs to the cache kmalloc-64 of size 64
[   40.808436] The buggy address is located 0 bytes to the right of
[   40.808436]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   40.810419] 
[   40.811178] The buggy address belongs to the physical page:
[   40.811940] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   40.812737] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.813735] page_type: f5(slab)
[   40.814247] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   40.815214] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   40.816415] page dumped because: kasan: bad access detected
[   40.817050] 
[   40.817480] Memory state around the buggy address:
[   40.819241]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.820049]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.820622] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   40.821572]                                      ^
[   40.822198]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.823050]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.824257] ==================================================================
---
[   41.681386] ==================================================================
[   41.684126] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   41.685181] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   41.686185] 
[   41.686597] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   41.687731] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.688345] Hardware name: linux,dummy-virt (DT)
[   41.689111] Call trace:
[   41.689694]  show_stack+0x20/0x38 (C)
[   41.690378]  dump_stack_lvl+0x8c/0xd0
[   41.691009]  print_report+0x118/0x5e0
[   41.691748]  kasan_report+0xc8/0x118
[   41.692262]  kasan_check_range+0x100/0x1a8
[   41.693029]  __kasan_check_write+0x20/0x30
[   41.693741]  kasan_atomics_helper+0xa04/0x4858
[   41.694618]  kasan_atomics+0x198/0x2e8
[   41.695207]  kunit_try_run_case+0x14c/0x3d0
[   41.695957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.696677]  kthread+0x24c/0x2d0
[   41.697353]  ret_from_fork+0x10/0x20
[   41.697950] 
[   41.698333] Allocated by task 253:
[   41.698862]  kasan_save_stack+0x3c/0x68
[   41.699391]  kasan_save_track+0x20/0x40
[   41.700115]  kasan_save_alloc_info+0x40/0x58
[   41.700788]  __kasan_kmalloc+0xd4/0xd8
[   41.701493]  __kmalloc_cache_noprof+0x15c/0x3c0
[   41.702140]  kasan_atomics+0xb8/0x2e8
[   41.702620]  kunit_try_run_case+0x14c/0x3d0
[   41.703345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.704077]  kthread+0x24c/0x2d0
[   41.704729]  ret_from_fork+0x10/0x20
[   41.705394] 
[   41.705760] The buggy address belongs to the object at fff00000c6998980
[   41.705760]  which belongs to the cache kmalloc-64 of size 64
[   41.707190] The buggy address is located 0 bytes to the right of
[   41.707190]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   41.708747] 
[   41.709116] The buggy address belongs to the physical page:
[   41.709888] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   41.710902] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.711785] page_type: f5(slab)
[   41.712313] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.713214] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.714197] page dumped because: kasan: bad access detected
[   41.714993] 
[   41.715371] Memory state around the buggy address:
[   41.715979]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.716887]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.717755] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.718613]                                      ^
[   41.719345]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.720311]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.721311] ==================================================================
---
[   42.685942] ==================================================================
[   42.687342] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   42.688861] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[   42.690150] 
[   42.690468] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   42.691275] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.692347] Hardware name: linux,dummy-virt (DT)
[   42.693171] Call trace:
[   42.693703]  show_stack+0x20/0x38 (C)
[   42.694550]  dump_stack_lvl+0x8c/0xd0
[   42.695378]  print_report+0x118/0x5e0
[   42.696162]  kasan_report+0xc8/0x118
[   42.696930]  kasan_check_range+0x100/0x1a8
[   42.697724]  __kasan_check_write+0x20/0x30
[   42.698442]  kasan_atomics_helper+0x11f8/0x4858
[   42.699266]  kasan_atomics+0x198/0x2e8
[   42.699900]  kunit_try_run_case+0x14c/0x3d0
[   42.700557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.701454]  kthread+0x24c/0x2d0
[   42.702000]  ret_from_fork+0x10/0x20
[   42.702569] 
[   42.702850] Allocated by task 253:
[   42.703480]  kasan_save_stack+0x3c/0x68
[   42.704215]  kasan_save_track+0x20/0x40
[   42.705055]  kasan_save_alloc_info+0x40/0x58
[   42.705862]  __kasan_kmalloc+0xd4/0xd8
[   42.706420]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.707155]  kasan_atomics+0xb8/0x2e8
[   42.707730]  kunit_try_run_case+0x14c/0x3d0
[   42.708329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.709138]  kthread+0x24c/0x2d0
[   42.709699]  ret_from_fork+0x10/0x20
[   42.710340] 
[   42.710678] The buggy address belongs to the object at fff00000c6998980
[   42.710678]  which belongs to the cache kmalloc-64 of size 64
[   42.712061] The buggy address is located 0 bytes to the right of
[   42.712061]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   42.713651] 
[   42.714084] The buggy address belongs to the physical page:
[   42.714862] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   42.715883] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.716907] page_type: f5(slab)
[   42.717541] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.718466] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.719340] page dumped because: kasan: bad access detected
[   42.720088] 
[   42.720435] Memory state around the buggy address:
[   42.721080]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.722119]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.723183] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.723944]                                      ^
[   42.724756]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.725714]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.726565] ==================================================================
---
[   40.926024] ==================================================================
[   40.927375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   40.929162] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   40.930161] 
[   40.930905] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   40.934183] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.934999] Hardware name: linux,dummy-virt (DT)
[   40.936119] Call trace:
[   40.936573]  show_stack+0x20/0x38 (C)
[   40.937326]  dump_stack_lvl+0x8c/0xd0
[   40.937951]  print_report+0x118/0x5e0
[   40.938591]  kasan_report+0xc8/0x118
[   40.939555]  kasan_check_range+0x100/0x1a8
[   40.940265]  __kasan_check_write+0x20/0x30
[   40.940991]  kasan_atomics_helper+0x32c/0x4858
[   40.941734]  kasan_atomics+0x198/0x2e8
[   40.942407]  kunit_try_run_case+0x14c/0x3d0
[   40.943327]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.944257]  kthread+0x24c/0x2d0
[   40.944806]  ret_from_fork+0x10/0x20
[   40.945703] 
[   40.946082] Allocated by task 253:
[   40.946644]  kasan_save_stack+0x3c/0x68
[   40.947471]  kasan_save_track+0x20/0x40
[   40.948113]  kasan_save_alloc_info+0x40/0x58
[   40.948747]  __kasan_kmalloc+0xd4/0xd8
[   40.949620]  __kmalloc_cache_noprof+0x15c/0x3c0
[   40.950170]  kasan_atomics+0xb8/0x2e8
[   40.951078]  kunit_try_run_case+0x14c/0x3d0
[   40.952152]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.952979]  kthread+0x24c/0x2d0
[   40.953729]  ret_from_fork+0x10/0x20
[   40.954271] 
[   40.954585] The buggy address belongs to the object at fff00000c6998980
[   40.954585]  which belongs to the cache kmalloc-64 of size 64
[   40.956709] The buggy address is located 0 bytes to the right of
[   40.956709]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   40.958183] 
[   40.958593] The buggy address belongs to the physical page:
[   40.959577] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   40.960985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.962390] page_type: f5(slab)
[   40.963229] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   40.964567] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   40.966010] page dumped because: kasan: bad access detected
[   40.967101] 
[   40.967606] Memory state around the buggy address:
[   40.968938]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.970912]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.972185] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   40.973253]                                      ^
[   40.974018]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.975511]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.976308] ==================================================================
---
[   41.027984] ==================================================================
[   41.028838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   41.030127] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   41.031482] 
[   41.032441] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   41.033103] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.033420] Hardware name: linux,dummy-virt (DT)
[   41.034927] Call trace:
[   41.035636]  show_stack+0x20/0x38 (C)
[   41.036730]  dump_stack_lvl+0x8c/0xd0
[   41.037746]  print_report+0x118/0x5e0
[   41.038645]  kasan_report+0xc8/0x118
[   41.039705]  kasan_check_range+0x100/0x1a8
[   41.040486]  __kasan_check_write+0x20/0x30
[   41.041272]  kasan_atomics_helper+0x3ac/0x4858
[   41.042178]  kasan_atomics+0x198/0x2e8
[   41.042932]  kunit_try_run_case+0x14c/0x3d0
[   41.043632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.044405]  kthread+0x24c/0x2d0
[   41.045037]  ret_from_fork+0x10/0x20
[   41.045722] 
[   41.046155] Allocated by task 253:
[   41.047119]  kasan_save_stack+0x3c/0x68
[   41.048069]  kasan_save_track+0x20/0x40
[   41.048578]  kasan_save_alloc_info+0x40/0x58
[   41.049344]  __kasan_kmalloc+0xd4/0xd8
[   41.050002]  __kmalloc_cache_noprof+0x15c/0x3c0
[   41.050593]  kasan_atomics+0xb8/0x2e8
[   41.052230]  kunit_try_run_case+0x14c/0x3d0
[   41.053934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.054772]  kthread+0x24c/0x2d0
[   41.055560]  ret_from_fork+0x10/0x20
[   41.056446] 
[   41.056803] The buggy address belongs to the object at fff00000c6998980
[   41.056803]  which belongs to the cache kmalloc-64 of size 64
[   41.058338] The buggy address is located 0 bytes to the right of
[   41.058338]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   41.060992] 
[   41.061604] The buggy address belongs to the physical page:
[   41.062325] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   41.064318] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.064992] page_type: f5(slab)
[   41.065592] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.066638] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.068178] page dumped because: kasan: bad access detected
[   41.068814] 
[   41.069189] Memory state around the buggy address:
[   41.069890]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.071908]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.072716] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.073472]                                      ^
[   41.074225]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.075118]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.077149] ==================================================================
---
[   41.761803] ==================================================================
[   41.762764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   41.764057] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   41.765052] 
[   41.765409] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   41.768285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.768982] Hardware name: linux,dummy-virt (DT)
[   41.769869] Call trace:
[   41.770265]  show_stack+0x20/0x38 (C)
[   41.770905]  dump_stack_lvl+0x8c/0xd0
[   41.771468]  print_report+0x118/0x5e0
[   41.772051]  kasan_report+0xc8/0x118
[   41.772793]  kasan_check_range+0x100/0x1a8
[   41.773628]  __kasan_check_write+0x20/0x30
[   41.774245]  kasan_atomics_helper+0xad4/0x4858
[   41.774895]  kasan_atomics+0x198/0x2e8
[   41.775566]  kunit_try_run_case+0x14c/0x3d0
[   41.776252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.776996]  kthread+0x24c/0x2d0
[   41.777641]  ret_from_fork+0x10/0x20
[   41.778264] 
[   41.778646] Allocated by task 253:
[   41.779178]  kasan_save_stack+0x3c/0x68
[   41.779735]  kasan_save_track+0x20/0x40
[   41.780400]  kasan_save_alloc_info+0x40/0x58
[   41.781019]  __kasan_kmalloc+0xd4/0xd8
[   41.781652]  __kmalloc_cache_noprof+0x15c/0x3c0
[   41.782315]  kasan_atomics+0xb8/0x2e8
[   41.783080]  kunit_try_run_case+0x14c/0x3d0
[   41.783606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.784427]  kthread+0x24c/0x2d0
[   41.785046]  ret_from_fork+0x10/0x20
[   41.785791] 
[   41.786131] The buggy address belongs to the object at fff00000c6998980
[   41.786131]  which belongs to the cache kmalloc-64 of size 64
[   41.787474] The buggy address is located 0 bytes to the right of
[   41.787474]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   41.789062] 
[   41.789424] The buggy address belongs to the physical page:
[   41.790237] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   41.791182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.792087] page_type: f5(slab)
[   41.792600] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.793678] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.794462] page dumped because: kasan: bad access detected
[   41.795249] 
[   41.795671] Memory state around the buggy address:
[   41.796292]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.797067]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.798118] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.798852]                                      ^
[   41.799667]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.800597]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.801458] ==================================================================
---
[   42.261662] ==================================================================
[   42.263242] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   42.264697] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[   42.265387] 
[   42.265875] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   42.266928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.267709] Hardware name: linux,dummy-virt (DT)
[   42.268426] Call trace:
[   42.268954]  show_stack+0x20/0x38 (C)
[   42.269486]  dump_stack_lvl+0x8c/0xd0
[   42.270213]  print_report+0x118/0x5e0
[   42.270756]  kasan_report+0xc8/0x118
[   42.271593]  kasan_check_range+0x100/0x1a8
[   42.272329]  __kasan_check_write+0x20/0x30
[   42.272972]  kasan_atomics_helper+0xe44/0x4858
[   42.273847]  kasan_atomics+0x198/0x2e8
[   42.274591]  kunit_try_run_case+0x14c/0x3d0
[   42.275355]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.276182]  kthread+0x24c/0x2d0
[   42.276832]  ret_from_fork+0x10/0x20
[   42.277499] 
[   42.277861] Allocated by task 253:
[   42.278509]  kasan_save_stack+0x3c/0x68
[   42.279217]  kasan_save_track+0x20/0x40
[   42.279859]  kasan_save_alloc_info+0x40/0x58
[   42.280679]  __kasan_kmalloc+0xd4/0xd8
[   42.281320]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.281951]  kasan_atomics+0xb8/0x2e8
[   42.282557]  kunit_try_run_case+0x14c/0x3d0
[   42.283289]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.284161]  kthread+0x24c/0x2d0
[   42.284792]  ret_from_fork+0x10/0x20
[   42.285445] 
[   42.285836] The buggy address belongs to the object at fff00000c6998980
[   42.285836]  which belongs to the cache kmalloc-64 of size 64
[   42.287303] The buggy address is located 0 bytes to the right of
[   42.287303]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   42.288941] 
[   42.289480] The buggy address belongs to the physical page:
[   42.290250] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   42.291362] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.292273] page_type: f5(slab)
[   42.292913] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.294029] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.295050] page dumped because: kasan: bad access detected
[   42.295713] 
[   42.296109] Memory state around the buggy address:
[   42.296998]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.298023]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.298981] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.300030]                                      ^
[   42.300788]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.301895]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.302927] ==================================================================
---
[   42.642277] ==================================================================
[   42.643338] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   42.644312] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[   42.645179] 
[   42.645805] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   42.647039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.647719] Hardware name: linux,dummy-virt (DT)
[   42.648415] Call trace:
[   42.648789]  show_stack+0x20/0x38 (C)
[   42.649706]  dump_stack_lvl+0x8c/0xd0
[   42.650590]  print_report+0x118/0x5e0
[   42.651383]  kasan_report+0xc8/0x118
[   42.651976]  kasan_check_range+0x100/0x1a8
[   42.652861]  __kasan_check_write+0x20/0x30
[   42.653470]  kasan_atomics_helper+0x1190/0x4858
[   42.654376]  kasan_atomics+0x198/0x2e8
[   42.655085]  kunit_try_run_case+0x14c/0x3d0
[   42.655957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.656752]  kthread+0x24c/0x2d0
[   42.657247]  ret_from_fork+0x10/0x20
[   42.658125] 
[   42.658653] Allocated by task 253:
[   42.659381]  kasan_save_stack+0x3c/0x68
[   42.660160]  kasan_save_track+0x20/0x40
[   42.660813]  kasan_save_alloc_info+0x40/0x58
[   42.661603]  __kasan_kmalloc+0xd4/0xd8
[   42.662292]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.663034]  kasan_atomics+0xb8/0x2e8
[   42.663648]  kunit_try_run_case+0x14c/0x3d0
[   42.664397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.665284]  kthread+0x24c/0x2d0
[   42.665898]  ret_from_fork+0x10/0x20
[   42.666574] 
[   42.667019] The buggy address belongs to the object at fff00000c6998980
[   42.667019]  which belongs to the cache kmalloc-64 of size 64
[   42.668474] The buggy address is located 0 bytes to the right of
[   42.668474]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   42.670183] 
[   42.670640] The buggy address belongs to the physical page:
[   42.671692] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   42.672774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.673821] page_type: f5(slab)
[   42.674330] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.675424] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.676275] page dumped because: kasan: bad access detected
[   42.676992] 
[   42.677374] Memory state around the buggy address:
[   42.678192]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.679139]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.680213] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.681177]                                      ^
[   42.681974]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.682895]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.683943] ==================================================================
---
[   42.768655] ==================================================================
[   42.770175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   42.772060] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[   42.773092] 
[   42.773494] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   42.775125] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.775803] Hardware name: linux,dummy-virt (DT)
[   42.776693] Call trace:
[   42.777166]  show_stack+0x20/0x38 (C)
[   42.777819]  dump_stack_lvl+0x8c/0xd0
[   42.778353]  print_report+0x118/0x5e0
[   42.778945]  kasan_report+0xc8/0x118
[   42.779596]  kasan_check_range+0x100/0x1a8
[   42.780451]  __kasan_check_write+0x20/0x30
[   42.781311]  kasan_atomics_helper+0x12d8/0x4858
[   42.782157]  kasan_atomics+0x198/0x2e8
[   42.782841]  kunit_try_run_case+0x14c/0x3d0
[   42.783641]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.784451]  kthread+0x24c/0x2d0
[   42.785076]  ret_from_fork+0x10/0x20
[   42.785763] 
[   42.786128] Allocated by task 253:
[   42.786757]  kasan_save_stack+0x3c/0x68
[   42.787485]  kasan_save_track+0x20/0x40
[   42.788145]  kasan_save_alloc_info+0x40/0x58
[   42.788781]  __kasan_kmalloc+0xd4/0xd8
[   42.789488]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.790133]  kasan_atomics+0xb8/0x2e8
[   42.790806]  kunit_try_run_case+0x14c/0x3d0
[   42.791513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.792457]  kthread+0x24c/0x2d0
[   42.793021]  ret_from_fork+0x10/0x20
[   42.793745] 
[   42.794165] The buggy address belongs to the object at fff00000c6998980
[   42.794165]  which belongs to the cache kmalloc-64 of size 64
[   42.795733] The buggy address is located 0 bytes to the right of
[   42.795733]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   42.797291] 
[   42.797830] The buggy address belongs to the physical page:
[   42.798715] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   42.799915] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.800823] page_type: f5(slab)
[   42.801377] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.802491] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.803473] page dumped because: kasan: bad access detected
[   42.804172] 
[   42.804474] Memory state around the buggy address:
[   42.805292]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.806321]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.807288] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.808249]                                      ^
[   42.808988]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.810060]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.811081] ==================================================================
---
[   43.230411] ==================================================================
[   43.231273] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   43.232339] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[   43.233501] 
[   43.233930] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   43.235255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.235977] Hardware name: linux,dummy-virt (DT)
[   43.236740] Call trace:
[   43.237240]  show_stack+0x20/0x38 (C)
[   43.237905]  dump_stack_lvl+0x8c/0xd0
[   43.238551]  print_report+0x118/0x5e0
[   43.239315]  kasan_report+0xc8/0x118
[   43.239917]  kasan_check_range+0x100/0x1a8
[   43.240660]  __kasan_check_write+0x20/0x30
[   43.241326]  kasan_atomics_helper+0x16d0/0x4858
[   43.242011]  kasan_atomics+0x198/0x2e8
[   43.242603]  kunit_try_run_case+0x14c/0x3d0
[   43.243396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.244112]  kthread+0x24c/0x2d0
[   43.244851]  ret_from_fork+0x10/0x20
[   43.245494] 
[   43.245825] Allocated by task 253:
[   43.246427]  kasan_save_stack+0x3c/0x68
[   43.246994]  kasan_save_track+0x20/0x40
[   43.247627]  kasan_save_alloc_info+0x40/0x58
[   43.248346]  __kasan_kmalloc+0xd4/0xd8
[   43.248920]  __kmalloc_cache_noprof+0x15c/0x3c0
[   43.249823]  kasan_atomics+0xb8/0x2e8
[   43.250484]  kunit_try_run_case+0x14c/0x3d0
[   43.251237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.252049]  kthread+0x24c/0x2d0
[   43.252651]  ret_from_fork+0x10/0x20
[   43.253186] 
[   43.253612] The buggy address belongs to the object at fff00000c6998980
[   43.253612]  which belongs to the cache kmalloc-64 of size 64
[   43.255369] The buggy address is located 0 bytes to the right of
[   43.255369]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   43.257081] 
[   43.257499] The buggy address belongs to the physical page:
[   43.258410] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   43.259413] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.260292] page_type: f5(slab)
[   43.260826] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   43.261941] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   43.262951] page dumped because: kasan: bad access detected
[   43.263643] 
[   43.264031] Memory state around the buggy address:
[   43.264622]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.265670]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.266617] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   43.267498]                                      ^
[   43.268273]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.269154]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.270133] ==================================================================
---
[   42.389434] ==================================================================
[   42.390216] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   42.391430] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[   42.392280] 
[   42.392792] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   42.393760] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.394439] Hardware name: linux,dummy-virt (DT)
[   42.395064] Call trace:
[   42.395543]  show_stack+0x20/0x38 (C)
[   42.396309]  dump_stack_lvl+0x8c/0xd0
[   42.396963]  print_report+0x118/0x5e0
[   42.397698]  kasan_report+0xc8/0x118
[   42.398388]  kasan_check_range+0x100/0x1a8
[   42.399149]  __kasan_check_write+0x20/0x30
[   42.399912]  kasan_atomics_helper+0xf20/0x4858
[   42.400668]  kasan_atomics+0x198/0x2e8
[   42.401557]  kunit_try_run_case+0x14c/0x3d0
[   42.402136]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.403112]  kthread+0x24c/0x2d0
[   42.403830]  ret_from_fork+0x10/0x20
[   42.404425] 
[   42.404839] Allocated by task 253:
[   42.405412]  kasan_save_stack+0x3c/0x68
[   42.406136]  kasan_save_track+0x20/0x40
[   42.406710]  kasan_save_alloc_info+0x40/0x58
[   42.407454]  __kasan_kmalloc+0xd4/0xd8
[   42.408212]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.408833]  kasan_atomics+0xb8/0x2e8
[   42.409624]  kunit_try_run_case+0x14c/0x3d0
[   42.410232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.410904]  kthread+0x24c/0x2d0
[   42.411581]  ret_from_fork+0x10/0x20
[   42.412207] 
[   42.412630] The buggy address belongs to the object at fff00000c6998980
[   42.412630]  which belongs to the cache kmalloc-64 of size 64
[   42.414106] The buggy address is located 0 bytes to the right of
[   42.414106]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   42.415625] 
[   42.416043] The buggy address belongs to the physical page:
[   42.416686] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   42.417760] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.418612] page_type: f5(slab)
[   42.419219] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.420155] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.421106] page dumped because: kasan: bad access detected
[   42.421889] 
[   42.422200] Memory state around the buggy address:
[   42.422918]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.423781]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.424586] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.425611]                                      ^
[   42.426322]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.427292]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.428057] ==================================================================
---
[   41.923462] ==================================================================
[   41.925542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   41.926781] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   41.927857] 
[   41.928302] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   41.929453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.930040] Hardware name: linux,dummy-virt (DT)
[   41.930653] Call trace:
[   41.931111]  show_stack+0x20/0x38 (C)
[   41.931741]  dump_stack_lvl+0x8c/0xd0
[   41.932450]  print_report+0x118/0x5e0
[   41.933036]  kasan_report+0xc8/0x118
[   41.933573]  kasan_check_range+0x100/0x1a8
[   41.934308]  __kasan_check_write+0x20/0x30
[   41.935053]  kasan_atomics_helper+0xc08/0x4858
[   41.935732]  kasan_atomics+0x198/0x2e8
[   41.936343]  kunit_try_run_case+0x14c/0x3d0
[   41.936922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.937774]  kthread+0x24c/0x2d0
[   41.938441]  ret_from_fork+0x10/0x20
[   41.939031] 
[   41.939371] Allocated by task 253:
[   41.939957]  kasan_save_stack+0x3c/0x68
[   41.940591]  kasan_save_track+0x20/0x40
[   41.941154]  kasan_save_alloc_info+0x40/0x58
[   41.941770]  __kasan_kmalloc+0xd4/0xd8
[   41.942410]  __kmalloc_cache_noprof+0x15c/0x3c0
[   41.943062]  kasan_atomics+0xb8/0x2e8
[   41.943613]  kunit_try_run_case+0x14c/0x3d0
[   41.944193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.945158]  kthread+0x24c/0x2d0
[   41.945766]  ret_from_fork+0x10/0x20
[   41.946349] 
[   41.946725] The buggy address belongs to the object at fff00000c6998980
[   41.946725]  which belongs to the cache kmalloc-64 of size 64
[   41.948147] The buggy address is located 0 bytes to the right of
[   41.948147]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   41.949647] 
[   41.949999] The buggy address belongs to the physical page:
[   41.950954] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   41.951901] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.952852] page_type: f5(slab)
[   41.953334] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.954392] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.955394] page dumped because: kasan: bad access detected
[   41.956207] 
[   41.956478] Memory state around the buggy address:
[   41.957647]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.958700]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.959700] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.960651]                                      ^
[   41.961017]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.961462]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.962720] ==================================================================
---
[   42.728304] ==================================================================
[   42.729200] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   42.730266] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[   42.731308] 
[   42.731681] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   42.732997] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.733587] Hardware name: linux,dummy-virt (DT)
[   42.734367] Call trace:
[   42.734764]  show_stack+0x20/0x38 (C)
[   42.735507]  dump_stack_lvl+0x8c/0xd0
[   42.736094]  print_report+0x118/0x5e0
[   42.736949]  kasan_report+0xc8/0x118
[   42.737535]  kasan_check_range+0x100/0x1a8
[   42.738392]  __kasan_check_write+0x20/0x30
[   42.739067]  kasan_atomics_helper+0x126c/0x4858
[   42.739771]  kasan_atomics+0x198/0x2e8
[   42.740342]  kunit_try_run_case+0x14c/0x3d0
[   42.741095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.741871]  kthread+0x24c/0x2d0
[   42.742511]  ret_from_fork+0x10/0x20
[   42.743097] 
[   42.743444] Allocated by task 253:
[   42.744061]  kasan_save_stack+0x3c/0x68
[   42.744779]  kasan_save_track+0x20/0x40
[   42.745570]  kasan_save_alloc_info+0x40/0x58
[   42.746214]  __kasan_kmalloc+0xd4/0xd8
[   42.746777]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.747567]  kasan_atomics+0xb8/0x2e8
[   42.748104]  kunit_try_run_case+0x14c/0x3d0
[   42.748977]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.749687]  kthread+0x24c/0x2d0
[   42.750253]  ret_from_fork+0x10/0x20
[   42.751002] 
[   42.751381] The buggy address belongs to the object at fff00000c6998980
[   42.751381]  which belongs to the cache kmalloc-64 of size 64
[   42.752764] The buggy address is located 0 bytes to the right of
[   42.752764]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   42.754150] 
[   42.754587] The buggy address belongs to the physical page:
[   42.755173] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   42.756365] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.757150] page_type: f5(slab)
[   42.757899] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.758904] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.759922] page dumped because: kasan: bad access detected
[   42.760718] 
[   42.761039] Memory state around the buggy address:
[   42.761665]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.762688]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.763500] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.764441]                                      ^
[   42.765178]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.766155]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.767019] ==================================================================
---
[   42.899327] ==================================================================
[   42.900600] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   42.901499] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[   42.902568] 
[   42.903171] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   42.904351] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.904977] Hardware name: linux,dummy-virt (DT)
[   42.905509] Call trace:
[   42.905976]  show_stack+0x20/0x38 (C)
[   42.906688]  dump_stack_lvl+0x8c/0xd0
[   42.907430]  print_report+0x118/0x5e0
[   42.907999]  kasan_report+0xc8/0x118
[   42.908836]  kasan_check_range+0x100/0x1a8
[   42.909603]  __kasan_check_write+0x20/0x30
[   42.910223]  kasan_atomics_helper+0x1414/0x4858
[   42.911036]  kasan_atomics+0x198/0x2e8
[   42.911622]  kunit_try_run_case+0x14c/0x3d0
[   42.912284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.913154]  kthread+0x24c/0x2d0
[   42.913684]  ret_from_fork+0x10/0x20
[   42.914339] 
[   42.914722] Allocated by task 253:
[   42.915346]  kasan_save_stack+0x3c/0x68
[   42.915937]  kasan_save_track+0x20/0x40
[   42.916588]  kasan_save_alloc_info+0x40/0x58
[   42.917154]  __kasan_kmalloc+0xd4/0xd8
[   42.917794]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.918606]  kasan_atomics+0xb8/0x2e8
[   42.919160]  kunit_try_run_case+0x14c/0x3d0
[   42.919945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.920736]  kthread+0x24c/0x2d0
[   42.921365]  ret_from_fork+0x10/0x20
[   42.921840] 
[   42.922324] The buggy address belongs to the object at fff00000c6998980
[   42.922324]  which belongs to the cache kmalloc-64 of size 64
[   42.923760] The buggy address is located 0 bytes to the right of
[   42.923760]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   42.925201] 
[   42.925591] The buggy address belongs to the physical page:
[   42.926308] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   42.927201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.928200] page_type: f5(slab)
[   42.928731] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.929685] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.930695] page dumped because: kasan: bad access detected
[   42.931394] 
[   42.931731] Memory state around the buggy address:
[   42.932450]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.933445]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.934462] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.935418]                                      ^
[   42.936086]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.936982]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.937943] ==================================================================
---
[   41.258545] ==================================================================
[   41.259362] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   41.260393] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   41.261774] 
[   41.262217] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   41.263378] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.263858] Hardware name: linux,dummy-virt (DT)
[   41.264638] Call trace:
[   41.265010]  show_stack+0x20/0x38 (C)
[   41.265853]  dump_stack_lvl+0x8c/0xd0
[   41.266483]  print_report+0x118/0x5e0
[   41.267053]  kasan_report+0xc8/0x118
[   41.267785]  kasan_check_range+0x100/0x1a8
[   41.268372]  __kasan_check_write+0x20/0x30
[   41.269112]  kasan_atomics_helper+0x5b4/0x4858
[   41.270029]  kasan_atomics+0x198/0x2e8
[   41.270691]  kunit_try_run_case+0x14c/0x3d0
[   41.271223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.272135]  kthread+0x24c/0x2d0
[   41.272725]  ret_from_fork+0x10/0x20
[   41.273279] 
[   41.273773] Allocated by task 253:
[   41.274372]  kasan_save_stack+0x3c/0x68
[   41.274927]  kasan_save_track+0x20/0x40
[   41.275636]  kasan_save_alloc_info+0x40/0x58
[   41.276160]  __kasan_kmalloc+0xd4/0xd8
[   41.276615]  __kmalloc_cache_noprof+0x15c/0x3c0
[   41.277083]  kasan_atomics+0xb8/0x2e8
[   41.277417]  kunit_try_run_case+0x14c/0x3d0
[   41.278916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.279699]  kthread+0x24c/0x2d0
[   41.280197]  ret_from_fork+0x10/0x20
[   41.280711] 
[   41.281113] The buggy address belongs to the object at fff00000c6998980
[   41.281113]  which belongs to the cache kmalloc-64 of size 64
[   41.282817] The buggy address is located 0 bytes to the right of
[   41.282817]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   41.284360] 
[   41.284896] The buggy address belongs to the physical page:
[   41.285632] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   41.286793] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.287735] page_type: f5(slab)
[   41.288388] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.289475] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.290469] page dumped because: kasan: bad access detected
[   41.291275] 
[   41.291781] Memory state around the buggy address:
[   41.292459]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.293476]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.294453] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.295410]                                      ^
[   41.296268]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.297255]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.298291] ==================================================================
---
[   41.722984] ==================================================================
[   41.723782] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   41.724962] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   41.726261] 
[   41.726609] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   41.727293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.727686] Hardware name: linux,dummy-virt (DT)
[   41.728134] Call trace:
[   41.728467]  show_stack+0x20/0x38 (C)
[   41.729052]  dump_stack_lvl+0x8c/0xd0
[   41.729765]  print_report+0x118/0x5e0
[   41.730385]  kasan_report+0xc8/0x118
[   41.731084]  kasan_check_range+0x100/0x1a8
[   41.731834]  __kasan_check_write+0x20/0x30
[   41.732512]  kasan_atomics_helper+0xa6c/0x4858
[   41.733194]  kasan_atomics+0x198/0x2e8
[   41.733837]  kunit_try_run_case+0x14c/0x3d0
[   41.734411]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.735460]  kthread+0x24c/0x2d0
[   41.736182]  ret_from_fork+0x10/0x20
[   41.736877] 
[   41.737177] Allocated by task 253:
[   41.737779]  kasan_save_stack+0x3c/0x68
[   41.738326]  kasan_save_track+0x20/0x40
[   41.738987]  kasan_save_alloc_info+0x40/0x58
[   41.739658]  __kasan_kmalloc+0xd4/0xd8
[   41.740236]  __kmalloc_cache_noprof+0x15c/0x3c0
[   41.740896]  kasan_atomics+0xb8/0x2e8
[   41.741443]  kunit_try_run_case+0x14c/0x3d0
[   41.742202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.742924]  kthread+0x24c/0x2d0
[   41.743512]  ret_from_fork+0x10/0x20
[   41.744118] 
[   41.744492] The buggy address belongs to the object at fff00000c6998980
[   41.744492]  which belongs to the cache kmalloc-64 of size 64
[   41.746013] The buggy address is located 0 bytes to the right of
[   41.746013]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   41.747495] 
[   41.747830] The buggy address belongs to the physical page:
[   41.748572] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   41.749549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.750395] page_type: f5(slab)
[   41.751060] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.752012] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.753034] page dumped because: kasan: bad access detected
[   41.753734] 
[   41.754048] Memory state around the buggy address:
[   41.754764]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.755636]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.756499] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.757474]                                      ^
[   41.758177]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.759156]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.760084] ==================================================================
---
[   41.174267] ==================================================================
[   41.175217] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   41.176891] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   41.178007] 
[   41.178348] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   41.179700] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.180239] Hardware name: linux,dummy-virt (DT)
[   41.181280] Call trace:
[   41.181912]  show_stack+0x20/0x38 (C)
[   41.182572]  dump_stack_lvl+0x8c/0xd0
[   41.184084]  print_report+0x118/0x5e0
[   41.185247]  kasan_report+0xc8/0x118
[   41.185964]  kasan_check_range+0x100/0x1a8
[   41.186874]  __kasan_check_write+0x20/0x30
[   41.187562]  kasan_atomics_helper+0x4e4/0x4858
[   41.188236]  kasan_atomics+0x198/0x2e8
[   41.188869]  kunit_try_run_case+0x14c/0x3d0
[   41.189580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.190417]  kthread+0x24c/0x2d0
[   41.191057]  ret_from_fork+0x10/0x20
[   41.191748] 
[   41.192086] Allocated by task 253:
[   41.192784]  kasan_save_stack+0x3c/0x68
[   41.193396]  kasan_save_track+0x20/0x40
[   41.194147]  kasan_save_alloc_info+0x40/0x58
[   41.194935]  __kasan_kmalloc+0xd4/0xd8
[   41.195663]  __kmalloc_cache_noprof+0x15c/0x3c0
[   41.196332]  kasan_atomics+0xb8/0x2e8
[   41.196977]  kunit_try_run_case+0x14c/0x3d0
[   41.197666]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.198441]  kthread+0x24c/0x2d0
[   41.199106]  ret_from_fork+0x10/0x20
[   41.199665] 
[   41.200086] The buggy address belongs to the object at fff00000c6998980
[   41.200086]  which belongs to the cache kmalloc-64 of size 64
[   41.201560] The buggy address is located 0 bytes to the right of
[   41.201560]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   41.203208] 
[   41.203652] The buggy address belongs to the physical page:
[   41.204360] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   41.205411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.206222] page_type: f5(slab)
[   41.206832] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.207863] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.208731] page dumped because: kasan: bad access detected
[   41.209499] 
[   41.209965] Memory state around the buggy address:
[   41.210659]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.211566]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.212457] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.213512]                                      ^
[   41.214190]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.214962]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.216007] ==================================================================
---
[   41.641358] ==================================================================
[   41.642404] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   41.643401] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   41.644239] 
[   41.644633] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   41.645942] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.646572] Hardware name: linux,dummy-virt (DT)
[   41.647214] Call trace:
[   41.647845]  show_stack+0x20/0x38 (C)
[   41.648460]  dump_stack_lvl+0x8c/0xd0
[   41.649155]  print_report+0x118/0x5e0
[   41.649788]  kasan_report+0xc8/0x118
[   41.650329]  kasan_check_range+0x100/0x1a8
[   41.651011]  __kasan_check_write+0x20/0x30
[   41.651840]  kasan_atomics_helper+0x99c/0x4858
[   41.652502]  kasan_atomics+0x198/0x2e8
[   41.653105]  kunit_try_run_case+0x14c/0x3d0
[   41.653784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.654612]  kthread+0x24c/0x2d0
[   41.655153]  ret_from_fork+0x10/0x20
[   41.655831] 
[   41.656285] Allocated by task 253:
[   41.656851]  kasan_save_stack+0x3c/0x68
[   41.657427]  kasan_save_track+0x20/0x40
[   41.658192]  kasan_save_alloc_info+0x40/0x58
[   41.658866]  __kasan_kmalloc+0xd4/0xd8
[   41.659352]  __kmalloc_cache_noprof+0x15c/0x3c0
[   41.660144]  kasan_atomics+0xb8/0x2e8
[   41.660713]  kunit_try_run_case+0x14c/0x3d0
[   41.661237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.662129]  kthread+0x24c/0x2d0
[   41.662638]  ret_from_fork+0x10/0x20
[   41.663356] 
[   41.663775] The buggy address belongs to the object at fff00000c6998980
[   41.663775]  which belongs to the cache kmalloc-64 of size 64
[   41.665170] The buggy address is located 0 bytes to the right of
[   41.665170]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   41.666740] 
[   41.667114] The buggy address belongs to the physical page:
[   41.667882] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   41.668841] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.669801] page_type: f5(slab)
[   41.670258] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.671216] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.672293] page dumped because: kasan: bad access detected
[   41.673222] 
[   41.673645] Memory state around the buggy address:
[   41.674307]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.675107]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.676091] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.677016]                                      ^
[   41.677787]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.678701]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.679577] ==================================================================
---
[   43.063301] ==================================================================
[   43.064211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   43.064933] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[   43.065907] 
[   43.066356] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   43.067447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.068032] Hardware name: linux,dummy-virt (DT)
[   43.069246] Call trace:
[   43.069793]  show_stack+0x20/0x38 (C)
[   43.070403]  dump_stack_lvl+0x8c/0xd0
[   43.071051]  print_report+0x118/0x5e0
[   43.071612]  kasan_report+0xc8/0x118
[   43.072217]  kasan_check_range+0x100/0x1a8
[   43.072865]  __kasan_check_write+0x20/0x30
[   43.073564]  kasan_atomics_helper+0x15b4/0x4858
[   43.074249]  kasan_atomics+0x198/0x2e8
[   43.074903]  kunit_try_run_case+0x14c/0x3d0
[   43.075556]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.076272]  kthread+0x24c/0x2d0
[   43.076851]  ret_from_fork+0x10/0x20
[   43.077431] 
[   43.077846] Allocated by task 253:
[   43.078415]  kasan_save_stack+0x3c/0x68
[   43.079004]  kasan_save_track+0x20/0x40
[   43.079864]  kasan_save_alloc_info+0x40/0x58
[   43.080442]  __kasan_kmalloc+0xd4/0xd8
[   43.081115]  __kmalloc_cache_noprof+0x15c/0x3c0
[   43.081834]  kasan_atomics+0xb8/0x2e8
[   43.082369]  kunit_try_run_case+0x14c/0x3d0
[   43.083311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.084116]  kthread+0x24c/0x2d0
[   43.084781]  ret_from_fork+0x10/0x20
[   43.085691] 
[   43.086285] The buggy address belongs to the object at fff00000c6998980
[   43.086285]  which belongs to the cache kmalloc-64 of size 64
[   43.087718] The buggy address is located 0 bytes to the right of
[   43.087718]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   43.089811] 
[   43.090362] The buggy address belongs to the physical page:
[   43.091217] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   43.092345] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.093356] page_type: f5(slab)
[   43.094029] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   43.095153] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   43.096225] page dumped because: kasan: bad access detected
[   43.097124] 
[   43.097561] Memory state around the buggy address:
[   43.098335]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.099389]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.100422] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   43.101419]                                      ^
[   43.102032]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.102956]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.104067] ==================================================================
---
[   43.148902] ==================================================================
[   43.149728] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   43.151307] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[   43.152285] 
[   43.152746] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   43.153914] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.154489] Hardware name: linux,dummy-virt (DT)
[   43.155103] Call trace:
[   43.155642]  show_stack+0x20/0x38 (C)
[   43.156259]  dump_stack_lvl+0x8c/0xd0
[   43.156971]  print_report+0x118/0x5e0
[   43.157572]  kasan_report+0xc8/0x118
[   43.158247]  kasan_check_range+0x100/0x1a8
[   43.158906]  __kasan_check_write+0x20/0x30
[   43.159502]  kasan_atomics_helper+0x1644/0x4858
[   43.160308]  kasan_atomics+0x198/0x2e8
[   43.160995]  kunit_try_run_case+0x14c/0x3d0
[   43.161797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.162568]  kthread+0x24c/0x2d0
[   43.163218]  ret_from_fork+0x10/0x20
[   43.163879] 
[   43.164246] Allocated by task 253:
[   43.164764]  kasan_save_stack+0x3c/0x68
[   43.165391]  kasan_save_track+0x20/0x40
[   43.166046]  kasan_save_alloc_info+0x40/0x58
[   43.166751]  __kasan_kmalloc+0xd4/0xd8
[   43.167314]  __kmalloc_cache_noprof+0x15c/0x3c0
[   43.167980]  kasan_atomics+0xb8/0x2e8
[   43.168506]  kunit_try_run_case+0x14c/0x3d0
[   43.169143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.170108]  kthread+0x24c/0x2d0
[   43.170676]  ret_from_fork+0x10/0x20
[   43.171367] 
[   43.171724] The buggy address belongs to the object at fff00000c6998980
[   43.171724]  which belongs to the cache kmalloc-64 of size 64
[   43.173070] The buggy address is located 0 bytes to the right of
[   43.173070]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   43.174740] 
[   43.175121] The buggy address belongs to the physical page:
[   43.175850] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   43.176873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.177727] page_type: f5(slab)
[   43.178403] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   43.179421] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   43.180302] page dumped because: kasan: bad access detected
[   43.181036] 
[   43.181376] Memory state around the buggy address:
[   43.182045]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.182938]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.183870] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   43.184742]                                      ^
[   43.185389]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.186478]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.187399] ==================================================================
---
[   43.317810] ==================================================================
[   43.318713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   43.319411] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[   43.320484] 
[   43.321219] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   43.322809] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.323600] Hardware name: linux,dummy-virt (DT)
[   43.324331] Call trace:
[   43.324840]  show_stack+0x20/0x38 (C)
[   43.325616]  dump_stack_lvl+0x8c/0xd0
[   43.326307]  print_report+0x118/0x5e0
[   43.326983]  kasan_report+0xc8/0x118
[   43.327643]  kasan_check_range+0x100/0x1a8
[   43.328343]  __kasan_check_write+0x20/0x30
[   43.329058]  kasan_atomics_helper+0x175c/0x4858
[   43.329822]  kasan_atomics+0x198/0x2e8
[   43.330460]  kunit_try_run_case+0x14c/0x3d0
[   43.331224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.332066]  kthread+0x24c/0x2d0
[   43.332749]  ret_from_fork+0x10/0x20
[   43.333373] 
[   43.333841] Allocated by task 253:
[   43.334551]  kasan_save_stack+0x3c/0x68
[   43.335173]  kasan_save_track+0x20/0x40
[   43.335908]  kasan_save_alloc_info+0x40/0x58
[   43.336719]  __kasan_kmalloc+0xd4/0xd8
[   43.337398]  __kmalloc_cache_noprof+0x15c/0x3c0
[   43.338164]  kasan_atomics+0xb8/0x2e8
[   43.338844]  kunit_try_run_case+0x14c/0x3d0
[   43.339556]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.340372]  kthread+0x24c/0x2d0
[   43.340916]  ret_from_fork+0x10/0x20
[   43.341626] 
[   43.342083] The buggy address belongs to the object at fff00000c6998980
[   43.342083]  which belongs to the cache kmalloc-64 of size 64
[   43.343644] The buggy address is located 0 bytes to the right of
[   43.343644]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   43.345361] 
[   43.345971] The buggy address belongs to the physical page:
[   43.346799] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   43.347888] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.348826] page_type: f5(slab)
[   43.349336] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   43.350068] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   43.351154] page dumped because: kasan: bad access detected
[   43.352043] 
[   43.352343] Memory state around the buggy address:
[   43.353353]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.354334]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.355388] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   43.356344]                                      ^
[   43.357072]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.358179]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.359114] ==================================================================
---
[   43.402549] ==================================================================
[   43.403510] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   43.404243] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[   43.405980] 
[   43.406355] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   43.407809] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.408539] Hardware name: linux,dummy-virt (DT)
[   43.409155] Call trace:
[   43.409699]  show_stack+0x20/0x38 (C)
[   43.410346]  dump_stack_lvl+0x8c/0xd0
[   43.411003]  print_report+0x118/0x5e0
[   43.411691]  kasan_report+0xc8/0x118
[   43.412356]  kasan_check_range+0x100/0x1a8
[   43.413112]  __kasan_check_write+0x20/0x30
[   43.413912]  kasan_atomics_helper+0x17ec/0x4858
[   43.414557]  kasan_atomics+0x198/0x2e8
[   43.415117]  kunit_try_run_case+0x14c/0x3d0
[   43.415697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.416643]  kthread+0x24c/0x2d0
[   43.417228]  ret_from_fork+0x10/0x20
[   43.418004] 
[   43.418305] Allocated by task 253:
[   43.418919]  kasan_save_stack+0x3c/0x68
[   43.419416]  kasan_save_track+0x20/0x40
[   43.420073]  kasan_save_alloc_info+0x40/0x58
[   43.420743]  __kasan_kmalloc+0xd4/0xd8
[   43.421294]  __kmalloc_cache_noprof+0x15c/0x3c0
[   43.422084]  kasan_atomics+0xb8/0x2e8
[   43.422817]  kunit_try_run_case+0x14c/0x3d0
[   43.423391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.424401]  kthread+0x24c/0x2d0
[   43.424949]  ret_from_fork+0x10/0x20
[   43.425463] 
[   43.425934] The buggy address belongs to the object at fff00000c6998980
[   43.425934]  which belongs to the cache kmalloc-64 of size 64
[   43.427346] The buggy address is located 0 bytes to the right of
[   43.427346]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   43.428801] 
[   43.429196] The buggy address belongs to the physical page:
[   43.429909] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   43.431059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.431953] page_type: f5(slab)
[   43.432479] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   43.433462] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   43.434406] page dumped because: kasan: bad access detected
[   43.435170] 
[   43.435573] Memory state around the buggy address:
[   43.436281]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.437203]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.438086] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   43.439019]                                      ^
[   43.439706]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.440675]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.441597] ==================================================================
---
[   42.598013] ==================================================================
[   42.599034] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   42.600258] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[   42.600961] 
[   42.601344] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   42.602884] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.603397] Hardware name: linux,dummy-virt (DT)
[   42.604069] Call trace:
[   42.604791]  show_stack+0x20/0x38 (C)
[   42.605688]  dump_stack_lvl+0x8c/0xd0
[   42.606388]  print_report+0x118/0x5e0
[   42.607061]  kasan_report+0xc8/0x118
[   42.607727]  kasan_check_range+0x100/0x1a8
[   42.608440]  __kasan_check_write+0x20/0x30
[   42.609248]  kasan_atomics_helper+0x1128/0x4858
[   42.609944]  kasan_atomics+0x198/0x2e8
[   42.610738]  kunit_try_run_case+0x14c/0x3d0
[   42.611468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.612307]  kthread+0x24c/0x2d0
[   42.612934]  ret_from_fork+0x10/0x20
[   42.613651] 
[   42.614007] Allocated by task 253:
[   42.614666]  kasan_save_stack+0x3c/0x68
[   42.615257]  kasan_save_track+0x20/0x40
[   42.616023]  kasan_save_alloc_info+0x40/0x58
[   42.616771]  __kasan_kmalloc+0xd4/0xd8
[   42.617380]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.618165]  kasan_atomics+0xb8/0x2e8
[   42.618866]  kunit_try_run_case+0x14c/0x3d0
[   42.619573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.620326]  kthread+0x24c/0x2d0
[   42.621164]  ret_from_fork+0x10/0x20
[   42.621844] 
[   42.622140] The buggy address belongs to the object at fff00000c6998980
[   42.622140]  which belongs to the cache kmalloc-64 of size 64
[   42.624145] The buggy address is located 0 bytes to the right of
[   42.624145]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   42.625671] 
[   42.626008] The buggy address belongs to the physical page:
[   42.626729] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   42.627983] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.628900] page_type: f5(slab)
[   42.629712] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.630794] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.631760] page dumped because: kasan: bad access detected
[   42.632680] 
[   42.633074] Memory state around the buggy address:
[   42.633851]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.635463]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.636413] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.637351]                                      ^
[   42.638415]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.639271]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.639871] ==================================================================
---
[   42.347226] ==================================================================
[   42.348588] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   42.350494] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[   42.352097] 
[   42.352436] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   42.353497] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.354104] Hardware name: linux,dummy-virt (DT)
[   42.354796] Call trace:
[   42.355305]  show_stack+0x20/0x38 (C)
[   42.355945]  dump_stack_lvl+0x8c/0xd0
[   42.356661]  print_report+0x118/0x5e0
[   42.357298]  kasan_report+0xc8/0x118
[   42.358023]  kasan_check_range+0x100/0x1a8
[   42.358646]  __kasan_check_write+0x20/0x30
[   42.359368]  kasan_atomics_helper+0xeb8/0x4858
[   42.360026]  kasan_atomics+0x198/0x2e8
[   42.360595]  kunit_try_run_case+0x14c/0x3d0
[   42.361284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.362216]  kthread+0x24c/0x2d0
[   42.362768]  ret_from_fork+0x10/0x20
[   42.363397] 
[   42.363814] Allocated by task 253:
[   42.364355]  kasan_save_stack+0x3c/0x68
[   42.365327]  kasan_save_track+0x20/0x40
[   42.365886]  kasan_save_alloc_info+0x40/0x58
[   42.366553]  __kasan_kmalloc+0xd4/0xd8
[   42.367148]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.367773]  kasan_atomics+0xb8/0x2e8
[   42.368472]  kunit_try_run_case+0x14c/0x3d0
[   42.369075]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.369837]  kthread+0x24c/0x2d0
[   42.370362]  ret_from_fork+0x10/0x20
[   42.371041] 
[   42.371352] The buggy address belongs to the object at fff00000c6998980
[   42.371352]  which belongs to the cache kmalloc-64 of size 64
[   42.372749] The buggy address is located 0 bytes to the right of
[   42.372749]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   42.374462] 
[   42.374824] The buggy address belongs to the physical page:
[   42.375426] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   42.376724] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.377686] page_type: f5(slab)
[   42.378300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.379387] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.380426] page dumped because: kasan: bad access detected
[   42.381170] 
[   42.381636] Memory state around the buggy address:
[   42.382360]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.383332]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.384243] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.385161]                                      ^
[   42.385832]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.386833]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.387724] ==================================================================
---
[   42.007461] ==================================================================
[   42.008621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   42.009742] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   42.010932] 
[   42.011357] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   42.012645] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.013537] Hardware name: linux,dummy-virt (DT)
[   42.014148] Call trace:
[   42.014847]  show_stack+0x20/0x38 (C)
[   42.015610]  dump_stack_lvl+0x8c/0xd0
[   42.016331]  print_report+0x118/0x5e0
[   42.017116]  kasan_report+0xc8/0x118
[   42.017851]  kasan_check_range+0x100/0x1a8
[   42.018606]  __kasan_check_write+0x20/0x30
[   42.019229]  kasan_atomics_helper+0xca0/0x4858
[   42.020000]  kasan_atomics+0x198/0x2e8
[   42.020683]  kunit_try_run_case+0x14c/0x3d0
[   42.021390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.022283]  kthread+0x24c/0x2d0
[   42.022985]  ret_from_fork+0x10/0x20
[   42.023680] 
[   42.024240] Allocated by task 253:
[   42.025069]  kasan_save_stack+0x3c/0x68
[   42.025640]  kasan_save_track+0x20/0x40
[   42.026217]  kasan_save_alloc_info+0x40/0x58
[   42.026850]  __kasan_kmalloc+0xd4/0xd8
[   42.027443]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.028607]  kasan_atomics+0xb8/0x2e8
[   42.029408]  kunit_try_run_case+0x14c/0x3d0
[   42.030182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.031103]  kthread+0x24c/0x2d0
[   42.031800]  ret_from_fork+0x10/0x20
[   42.032565] 
[   42.033088] The buggy address belongs to the object at fff00000c6998980
[   42.033088]  which belongs to the cache kmalloc-64 of size 64
[   42.034459] The buggy address is located 0 bytes to the right of
[   42.034459]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   42.036574] 
[   42.037074] The buggy address belongs to the physical page:
[   42.037991] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   42.039075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.040045] page_type: f5(slab)
[   42.040481] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.041651] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.042698] page dumped because: kasan: bad access detected
[   42.043468] 
[   42.043846] Memory state around the buggy address:
[   42.044637]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.045764]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.046947] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.048112]                                      ^
[   42.048788]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.049850]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.050640] ==================================================================

test log snippet boot parser 25

Home

[   40.727659] ==================================================================
[   40.729401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   40.730224] Read of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   40.730987] 
[   40.731963] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   40.733440] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.734593] Hardware name: linux,dummy-virt (DT)
[   40.735247] Call trace:
[   40.735730]  show_stack+0x20/0x38 (C)
[   40.737057]  dump_stack_lvl+0x8c/0xd0
[   40.737767]  print_report+0x118/0x5e0
[   40.738091]  kasan_report+0xc8/0x118
[   40.738387]  kasan_check_range+0x100/0x1a8
[   40.739027]  __kasan_check_read+0x20/0x30
[   40.740187]  kasan_atomics_helper+0x1ec/0x4858
[   40.741437]  kasan_atomics+0x198/0x2e8
[   40.742257]  kunit_try_run_case+0x14c/0x3d0
[   40.743048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.744254]  kthread+0x24c/0x2d0
[   40.744885]  ret_from_fork+0x10/0x20
[   40.745666] 
[   40.746017] Allocated by task 253:
[   40.747009]  kasan_save_stack+0x3c/0x68
[   40.747845]  kasan_save_track+0x20/0x40
[   40.748314]  kasan_save_alloc_info+0x40/0x58
[   40.748816]  __kasan_kmalloc+0xd4/0xd8
[   40.749438]  __kmalloc_cache_noprof+0x15c/0x3c0
[   40.750386]  kasan_atomics+0xb8/0x2e8
[   40.752072]  kunit_try_run_case+0x14c/0x3d0
[   40.753008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.753803]  kthread+0x24c/0x2d0
[   40.754284]  ret_from_fork+0x10/0x20
[   40.755057] 
[   40.755616] The buggy address belongs to the object at fff00000c6998980
[   40.755616]  which belongs to the cache kmalloc-64 of size 64
[   40.757106] The buggy address is located 0 bytes to the right of
[   40.757106]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   40.758823] 
[   40.759239] The buggy address belongs to the physical page:
[   40.760341] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   40.761641] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.762999] page_type: f5(slab)
[   40.763745] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   40.764691] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   40.765752] page dumped because: kasan: bad access detected
[   40.766401] 
[   40.766804] Memory state around the buggy address:
[   40.767984]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.768864]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.771268] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   40.772297]                                      ^
[   40.772912]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.773963]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.775061] ==================================================================
---
[   42.177780] ==================================================================
[   42.179797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   42.181415] Read of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[   42.182632] 
[   42.183245] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   42.184602] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.185364] Hardware name: linux,dummy-virt (DT)
[   42.186225] Call trace:
[   42.186681]  show_stack+0x20/0x38 (C)
[   42.187688]  dump_stack_lvl+0x8c/0xd0
[   42.188421]  print_report+0x118/0x5e0
[   42.189185]  kasan_report+0xc8/0x118
[   42.189860]  kasan_check_range+0x100/0x1a8
[   42.190467]  __kasan_check_read+0x20/0x30
[   42.191088]  kasan_atomics_helper+0xdd4/0x4858
[   42.192120]  kasan_atomics+0x198/0x2e8
[   42.192737]  kunit_try_run_case+0x14c/0x3d0
[   42.193373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.194366]  kthread+0x24c/0x2d0
[   42.195025]  ret_from_fork+0x10/0x20
[   42.195597] 
[   42.195989] Allocated by task 253:
[   42.196582]  kasan_save_stack+0x3c/0x68
[   42.197109]  kasan_save_track+0x20/0x40
[   42.197873]  kasan_save_alloc_info+0x40/0x58
[   42.198478]  __kasan_kmalloc+0xd4/0xd8
[   42.199007]  __kmalloc_cache_noprof+0x15c/0x3c0
[   42.199813]  kasan_atomics+0xb8/0x2e8
[   42.200293]  kunit_try_run_case+0x14c/0x3d0
[   42.201019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.201767]  kthread+0x24c/0x2d0
[   42.202402]  ret_from_fork+0x10/0x20
[   42.202971] 
[   42.203434] The buggy address belongs to the object at fff00000c6998980
[   42.203434]  which belongs to the cache kmalloc-64 of size 64
[   42.204931] The buggy address is located 0 bytes to the right of
[   42.204931]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   42.206434] 
[   42.206782] The buggy address belongs to the physical page:
[   42.207780] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   42.208684] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.209750] page_type: f5(slab)
[   42.210242] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.211301] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.212301] page dumped because: kasan: bad access detected
[   42.213130] 
[   42.213495] Memory state around the buggy address:
[   42.214281]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.215137]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.216088] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.216960]                                      ^
[   42.217830]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.218620]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.219675] ==================================================================
---
[   40.826180] ==================================================================
[   40.827690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   40.828935] Read of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[   40.829721] 
[   40.830430] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   40.832473] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.833105] Hardware name: linux,dummy-virt (DT)
[   40.833788] Call trace:
[   40.834205]  show_stack+0x20/0x38 (C)
[   40.834929]  dump_stack_lvl+0x8c/0xd0
[   40.835506]  print_report+0x118/0x5e0
[   40.836664]  kasan_report+0xc8/0x118
[   40.837383]  kasan_check_range+0x100/0x1a8
[   40.838071]  __kasan_check_read+0x20/0x30
[   40.838506]  kasan_atomics_helper+0x2b0/0x4858
[   40.839688]  kasan_atomics+0x198/0x2e8
[   40.840277]  kunit_try_run_case+0x14c/0x3d0
[   40.840923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.841988]  kthread+0x24c/0x2d0
[   40.842650]  ret_from_fork+0x10/0x20
[   40.843654] 
[   40.844033] Allocated by task 253:
[   40.844455]  kasan_save_stack+0x3c/0x68
[   40.845128]  kasan_save_track+0x20/0x40
[   40.845696]  kasan_save_alloc_info+0x40/0x58
[   40.846430]  __kasan_kmalloc+0xd4/0xd8
[   40.847418]  __kmalloc_cache_noprof+0x15c/0x3c0
[   40.848067]  kasan_atomics+0xb8/0x2e8
[   40.848683]  kunit_try_run_case+0x14c/0x3d0
[   40.849173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.850955]  kthread+0x24c/0x2d0
[   40.851790]  ret_from_fork+0x10/0x20
[   40.852089] 
[   40.852267] The buggy address belongs to the object at fff00000c6998980
[   40.852267]  which belongs to the cache kmalloc-64 of size 64
[   40.852948] The buggy address is located 0 bytes to the right of
[   40.852948]  allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[   40.853775] 
[   40.854078] The buggy address belongs to the physical page:
[   40.854921] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[   40.856792] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.857752] page_type: f5(slab)
[   40.858343] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   40.859793] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   40.860977] page dumped because: kasan: bad access detected
[   40.861838] 
[   40.862177] Memory state around the buggy address:
[   40.862912]  fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.864231]  fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.865241] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   40.866368]                                      ^
[   40.868286]  fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.869705]  fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.870830] ==================================================================

test log snippet boot parser 26

Home

[   40.003559] ==================================================================
[   40.004482] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8
[   40.006559] Write of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[   40.007620] 
[   40.008122] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   40.009399] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.010186] Hardware name: linux,dummy-virt (DT)
[   40.010906] Call trace:
[   40.011345]  show_stack+0x20/0x38 (C)
[   40.012145]  dump_stack_lvl+0x8c/0xd0
[   40.012838]  print_report+0x118/0x5e0
[   40.013489]  kasan_report+0xc8/0x118
[   40.014153]  kasan_check_range+0x100/0x1a8
[   40.014854]  __kasan_check_write+0x20/0x30
[   40.015591]  kasan_bitops_modify.constprop.0+0x320/0xbc8
[   40.016507]  kasan_bitops_generic+0x110/0x1c8
[   40.017243]  kunit_try_run_case+0x14c/0x3d0
[   40.018024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.018977]  kthread+0x24c/0x2d0
[   40.019710]  ret_from_fork+0x10/0x20
[   40.020394] 
[   40.020828] Allocated by task 249:
[   40.021569]  kasan_save_stack+0x3c/0x68
[   40.022240]  kasan_save_track+0x20/0x40
[   40.022994]  kasan_save_alloc_info+0x40/0x58
[   40.023727]  __kasan_kmalloc+0xd4/0xd8
[   40.024466]  __kmalloc_cache_noprof+0x15c/0x3c0
[   40.025223]  kasan_bitops_generic+0xa0/0x1c8
[   40.025982]  kunit_try_run_case+0x14c/0x3d0
[   40.026675]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.027463]  kthread+0x24c/0x2d0
[   40.028050]  ret_from_fork+0x10/0x20
[   40.028623] 
[   40.029090] The buggy address belongs to the object at fff00000c6114ee0
[   40.029090]  which belongs to the cache kmalloc-16 of size 16
[   40.030702] The buggy address is located 8 bytes inside of
[   40.030702]  allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[   40.032234] 
[   40.032798] The buggy address belongs to the physical page:
[   40.033635] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[   40.034668] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.035579] page_type: f5(slab)
[   40.036102] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.037220] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.038342] page dumped because: kasan: bad access detected
[   40.039260] 
[   40.039789] Memory state around the buggy address:
[   40.040545]  fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   40.041486]  fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.042472] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   40.043458]                                                           ^
[   40.044392]  fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.045359]  fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.046305] ==================================================================
---
[   39.956006] ==================================================================
[   39.956915] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   39.958309] Write of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[   39.959123] 
[   39.959468] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   39.960807] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.962589] Hardware name: linux,dummy-virt (DT)
[   39.963322] Call trace:
[   39.963976]  show_stack+0x20/0x38 (C)
[   39.965011]  dump_stack_lvl+0x8c/0xd0
[   39.965809]  print_report+0x118/0x5e0
[   39.966504]  kasan_report+0xc8/0x118
[   39.967189]  kasan_check_range+0x100/0x1a8
[   39.967987]  __kasan_check_write+0x20/0x30
[   39.968716]  kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   39.969483]  kasan_bitops_generic+0x110/0x1c8
[   39.970231]  kunit_try_run_case+0x14c/0x3d0
[   39.970978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.971844]  kthread+0x24c/0x2d0
[   39.972541]  ret_from_fork+0x10/0x20
[   39.973211] 
[   39.973702] Allocated by task 249:
[   39.974305]  kasan_save_stack+0x3c/0x68
[   39.975062]  kasan_save_track+0x20/0x40
[   39.975943]  kasan_save_alloc_info+0x40/0x58
[   39.976711]  __kasan_kmalloc+0xd4/0xd8
[   39.977359]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.978091]  kasan_bitops_generic+0xa0/0x1c8
[   39.978827]  kunit_try_run_case+0x14c/0x3d0
[   39.979532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.980353]  kthread+0x24c/0x2d0
[   39.980947]  ret_from_fork+0x10/0x20
[   39.981579] 
[   39.982014] The buggy address belongs to the object at fff00000c6114ee0
[   39.982014]  which belongs to the cache kmalloc-16 of size 16
[   39.983570] The buggy address is located 8 bytes inside of
[   39.983570]  allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[   39.985044] 
[   39.985556] The buggy address belongs to the physical page:
[   39.986404] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[   39.987563] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.988448] page_type: f5(slab)
[   39.989202] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   39.990331] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   39.991319] page dumped because: kasan: bad access detected
[   39.992161] 
[   39.992668] Memory state around the buggy address:
[   39.993347]  fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   39.994383]  fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   39.995320] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   39.996292]                                                           ^
[   39.997212]  fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.998351]  fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.999273] ==================================================================
---
[   39.862151] ==================================================================
[   39.863384] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   39.864277] Write of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[   39.866546] 
[   39.866869] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   39.868051] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.868843] Hardware name: linux,dummy-virt (DT)
[   39.869647] Call trace:
[   39.870225]  show_stack+0x20/0x38 (C)
[   39.870926]  dump_stack_lvl+0x8c/0xd0
[   39.871487]  print_report+0x118/0x5e0
[   39.872176]  kasan_report+0xc8/0x118
[   39.872786]  kasan_check_range+0x100/0x1a8
[   39.873716]  __kasan_check_write+0x20/0x30
[   39.874354]  kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   39.875287]  kasan_bitops_generic+0x110/0x1c8
[   39.876041]  kunit_try_run_case+0x14c/0x3d0
[   39.876721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.877548]  kthread+0x24c/0x2d0
[   39.878175]  ret_from_fork+0x10/0x20
[   39.878743] 
[   39.879158] Allocated by task 249:
[   39.879710]  kasan_save_stack+0x3c/0x68
[   39.880389]  kasan_save_track+0x20/0x40
[   39.881051]  kasan_save_alloc_info+0x40/0x58
[   39.881768]  __kasan_kmalloc+0xd4/0xd8
[   39.882323]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.883034]  kasan_bitops_generic+0xa0/0x1c8
[   39.883783]  kunit_try_run_case+0x14c/0x3d0
[   39.884348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.885277]  kthread+0x24c/0x2d0
[   39.885913]  ret_from_fork+0x10/0x20
[   39.886695] 
[   39.887078] The buggy address belongs to the object at fff00000c6114ee0
[   39.887078]  which belongs to the cache kmalloc-16 of size 16
[   39.888597] The buggy address is located 8 bytes inside of
[   39.888597]  allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[   39.890018] 
[   39.890396] The buggy address belongs to the physical page:
[   39.891162] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[   39.892434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.893357] page_type: f5(slab)
[   39.894071] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   39.894994] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   39.895941] page dumped because: kasan: bad access detected
[   39.896725] 
[   39.897113] Memory state around the buggy address:
[   39.897729]  fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   39.898920]  fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   39.900035] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   39.900936]                                                           ^
[   39.902125]  fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.903095]  fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.903982] ==================================================================
---
[   40.142005] ==================================================================
[   40.143005] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   40.145939] Write of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[   40.147885] 
[   40.148773] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   40.150084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.150729] Hardware name: linux,dummy-virt (DT)
[   40.151466] Call trace:
[   40.151909]  show_stack+0x20/0x38 (C)
[   40.152474]  dump_stack_lvl+0x8c/0xd0
[   40.153208]  print_report+0x118/0x5e0
[   40.153949]  kasan_report+0xc8/0x118
[   40.154578]  kasan_check_range+0x100/0x1a8
[   40.155155]  __kasan_check_write+0x20/0x30
[   40.155881]  kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   40.156788]  kasan_bitops_generic+0x110/0x1c8
[   40.157445]  kunit_try_run_case+0x14c/0x3d0
[   40.158134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.158914]  kthread+0x24c/0x2d0
[   40.159430]  ret_from_fork+0x10/0x20
[   40.160095] 
[   40.160428] Allocated by task 249:
[   40.160871]  kasan_save_stack+0x3c/0x68
[   40.161653]  kasan_save_track+0x20/0x40
[   40.162188]  kasan_save_alloc_info+0x40/0x58
[   40.162878]  __kasan_kmalloc+0xd4/0xd8
[   40.163632]  __kmalloc_cache_noprof+0x15c/0x3c0
[   40.164282]  kasan_bitops_generic+0xa0/0x1c8
[   40.164896]  kunit_try_run_case+0x14c/0x3d0
[   40.165464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.166147]  kthread+0x24c/0x2d0
[   40.166769]  ret_from_fork+0x10/0x20
[   40.167371] 
[   40.167804] The buggy address belongs to the object at fff00000c6114ee0
[   40.167804]  which belongs to the cache kmalloc-16 of size 16
[   40.169416] The buggy address is located 8 bytes inside of
[   40.169416]  allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[   40.170960] 
[   40.171308] The buggy address belongs to the physical page:
[   40.172177] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[   40.173092] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.174020] page_type: f5(slab)
[   40.174576] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.175578] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.176541] page dumped because: kasan: bad access detected
[   40.177171] 
[   40.177564] Memory state around the buggy address:
[   40.178218]  fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   40.178953]  fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.179895] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   40.180903]                                                           ^
[   40.181739]  fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.182671]  fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.183533] ==================================================================
---
[   39.777025] ==================================================================
[   39.778366] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8
[   39.779372] Write of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[   39.780418] 
[   39.781621] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   39.783171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.783922] Hardware name: linux,dummy-virt (DT)
[   39.784762] Call trace:
[   39.785272]  show_stack+0x20/0x38 (C)
[   39.785987]  dump_stack_lvl+0x8c/0xd0
[   39.786683]  print_report+0x118/0x5e0
[   39.787326]  kasan_report+0xc8/0x118
[   39.787935]  kasan_check_range+0x100/0x1a8
[   39.788591]  __kasan_check_write+0x20/0x30
[   39.789363]  kasan_bitops_modify.constprop.0+0x100/0xbc8
[   39.790001]  kasan_bitops_generic+0x110/0x1c8
[   39.790615]  kunit_try_run_case+0x14c/0x3d0
[   39.791369]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.792123]  kthread+0x24c/0x2d0
[   39.792823]  ret_from_fork+0x10/0x20
[   39.793407] 
[   39.793816] Allocated by task 249:
[   39.794317]  kasan_save_stack+0x3c/0x68
[   39.795126]  kasan_save_track+0x20/0x40
[   39.795735]  kasan_save_alloc_info+0x40/0x58
[   39.796597]  __kasan_kmalloc+0xd4/0xd8
[   39.797225]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.797798]  kasan_bitops_generic+0xa0/0x1c8
[   39.798468]  kunit_try_run_case+0x14c/0x3d0
[   39.799051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.799772]  kthread+0x24c/0x2d0
[   39.800353]  ret_from_fork+0x10/0x20
[   39.800983] 
[   39.801287] The buggy address belongs to the object at fff00000c6114ee0
[   39.801287]  which belongs to the cache kmalloc-16 of size 16
[   39.802853] The buggy address is located 8 bytes inside of
[   39.802853]  allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[   39.804268] 
[   39.804714] The buggy address belongs to the physical page:
[   39.805578] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[   39.806645] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.807478] page_type: f5(slab)
[   39.808148] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   39.809050] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   39.810021] page dumped because: kasan: bad access detected
[   39.810816] 
[   39.811191] Memory state around the buggy address:
[   39.811729]  fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   39.812854]  fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   39.813838] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   39.814712]                                                           ^
[   39.815707]  fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.816591]  fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.817589] ==================================================================
---
[   40.092199] ==================================================================
[   40.093192] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8
[   40.094809] Write of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[   40.096175] 
[   40.097062] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   40.098180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.099730] Hardware name: linux,dummy-virt (DT)
[   40.100619] Call trace:
[   40.101068]  show_stack+0x20/0x38 (C)
[   40.101434]  dump_stack_lvl+0x8c/0xd0
[   40.101782]  print_report+0x118/0x5e0
[   40.102083]  kasan_report+0xc8/0x118
[   40.102381]  kasan_check_range+0x100/0x1a8
[   40.103170]  __kasan_check_write+0x20/0x30
[   40.104142]  kasan_bitops_modify.constprop.0+0x344/0xbc8
[   40.105235]  kasan_bitops_generic+0x110/0x1c8
[   40.106008]  kunit_try_run_case+0x14c/0x3d0
[   40.106354]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.106860]  kthread+0x24c/0x2d0
[   40.107492]  ret_from_fork+0x10/0x20
[   40.108104] 
[   40.108394] Allocated by task 249:
[   40.110158]  kasan_save_stack+0x3c/0x68
[   40.110809]  kasan_save_track+0x20/0x40
[   40.111381]  kasan_save_alloc_info+0x40/0x58
[   40.112223]  __kasan_kmalloc+0xd4/0xd8
[   40.113015]  __kmalloc_cache_noprof+0x15c/0x3c0
[   40.114033]  kasan_bitops_generic+0xa0/0x1c8
[   40.115057]  kunit_try_run_case+0x14c/0x3d0
[   40.116297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.117138]  kthread+0x24c/0x2d0
[   40.117762]  ret_from_fork+0x10/0x20
[   40.118598] 
[   40.119133] The buggy address belongs to the object at fff00000c6114ee0
[   40.119133]  which belongs to the cache kmalloc-16 of size 16
[   40.121137] The buggy address is located 8 bytes inside of
[   40.121137]  allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[   40.123116] 
[   40.123760] The buggy address belongs to the physical page:
[   40.124715] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[   40.125756] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.126852] page_type: f5(slab)
[   40.127793] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.128843] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.129906] page dumped because: kasan: bad access detected
[   40.130858] 
[   40.131417] Memory state around the buggy address:
[   40.132230]  fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   40.133885]  fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.135913] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   40.137462]                                                           ^
[   40.138417]  fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.139268]  fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.140224] ==================================================================

test log snippet boot parser 27

Home

[   39.820851] ==================================================================
[   39.821739] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   39.822565] Read of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[   39.823545] 
[   39.823951] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   39.825300] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.825885] Hardware name: linux,dummy-virt (DT)
[   39.826490] Call trace:
[   39.827064]  show_stack+0x20/0x38 (C)
[   39.827871]  dump_stack_lvl+0x8c/0xd0
[   39.828566]  print_report+0x118/0x5e0
[   39.829212]  kasan_report+0xc8/0x118
[   39.829914]  __asan_report_load8_noabort+0x20/0x30
[   39.830569]  kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   39.831346]  kasan_bitops_generic+0x110/0x1c8
[   39.832135]  kunit_try_run_case+0x14c/0x3d0
[   39.832838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.833656]  kthread+0x24c/0x2d0
[   39.834232]  ret_from_fork+0x10/0x20
[   39.834926] 
[   39.835286] Allocated by task 249:
[   39.836004]  kasan_save_stack+0x3c/0x68
[   39.836694]  kasan_save_track+0x20/0x40
[   39.837277]  kasan_save_alloc_info+0x40/0x58
[   39.838034]  __kasan_kmalloc+0xd4/0xd8
[   39.838631]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.839255]  kasan_bitops_generic+0xa0/0x1c8
[   39.839928]  kunit_try_run_case+0x14c/0x3d0
[   39.840499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.841379]  kthread+0x24c/0x2d0
[   39.841851]  ret_from_fork+0x10/0x20
[   39.842544] 
[   39.843022] The buggy address belongs to the object at fff00000c6114ee0
[   39.843022]  which belongs to the cache kmalloc-16 of size 16
[   39.844596] The buggy address is located 8 bytes inside of
[   39.844596]  allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[   39.846002] 
[   39.846458] The buggy address belongs to the physical page:
[   39.847325] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[   39.848334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.849230] page_type: f5(slab)
[   39.849882] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   39.850794] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   39.851697] page dumped because: kasan: bad access detected
[   39.852493] 
[   39.852820] Memory state around the buggy address:
[   39.853646]  fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   39.854577]  fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   39.855461] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   39.856322]                                                           ^
[   39.857278]  fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.858225]  fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.859142] ==================================================================
---
[   40.185562] ==================================================================
[   40.186409] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   40.188486] Read of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[   40.190393] 
[   40.190921] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   40.192271] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.192972] Hardware name: linux,dummy-virt (DT)
[   40.193707] Call trace:
[   40.194130]  show_stack+0x20/0x38 (C)
[   40.194770]  dump_stack_lvl+0x8c/0xd0
[   40.195371]  print_report+0x118/0x5e0
[   40.195881]  kasan_report+0xc8/0x118
[   40.196625]  __asan_report_load8_noabort+0x20/0x30
[   40.197686]  kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   40.198504]  kasan_bitops_generic+0x110/0x1c8
[   40.199311]  kunit_try_run_case+0x14c/0x3d0
[   40.200017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.200898]  kthread+0x24c/0x2d0
[   40.201503]  ret_from_fork+0x10/0x20
[   40.202205] 
[   40.202626] Allocated by task 249:
[   40.203232]  kasan_save_stack+0x3c/0x68
[   40.203963]  kasan_save_track+0x20/0x40
[   40.204702]  kasan_save_alloc_info+0x40/0x58
[   40.205352]  __kasan_kmalloc+0xd4/0xd8
[   40.205970]  __kmalloc_cache_noprof+0x15c/0x3c0
[   40.206720]  kasan_bitops_generic+0xa0/0x1c8
[   40.207396]  kunit_try_run_case+0x14c/0x3d0
[   40.208128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.208931]  kthread+0x24c/0x2d0
[   40.209554]  ret_from_fork+0x10/0x20
[   40.210202] 
[   40.210618] The buggy address belongs to the object at fff00000c6114ee0
[   40.210618]  which belongs to the cache kmalloc-16 of size 16
[   40.212165] The buggy address is located 8 bytes inside of
[   40.212165]  allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[   40.213712] 
[   40.214176] The buggy address belongs to the physical page:
[   40.214998] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[   40.216216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.217148] page_type: f5(slab)
[   40.217722] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.218881] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.219910] page dumped because: kasan: bad access detected
[   40.220785] 
[   40.221162] Memory state around the buggy address:
[   40.221967]  fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   40.222984]  fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.223956] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   40.224868]                                                           ^
[   40.225781]  fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.226745]  fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.227683] ==================================================================
---
[   40.048371] ==================================================================
[   40.049390] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   40.050558] Read of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[   40.051806] 
[   40.052140] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   40.053631] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.054386] Hardware name: linux,dummy-virt (DT)
[   40.055105] Call trace:
[   40.055659]  show_stack+0x20/0x38 (C)
[   40.056385]  dump_stack_lvl+0x8c/0xd0
[   40.057138]  print_report+0x118/0x5e0
[   40.057902]  kasan_report+0xc8/0x118
[   40.058690]  __asan_report_load8_noabort+0x20/0x30
[   40.059557]  kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   40.060375]  kasan_bitops_generic+0x110/0x1c8
[   40.061059]  kunit_try_run_case+0x14c/0x3d0
[   40.061912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.062751]  kthread+0x24c/0x2d0
[   40.063358]  ret_from_fork+0x10/0x20
[   40.064011] 
[   40.064410] Allocated by task 249:
[   40.065076]  kasan_save_stack+0x3c/0x68
[   40.065832]  kasan_save_track+0x20/0x40
[   40.066500]  kasan_save_alloc_info+0x40/0x58
[   40.067207]  __kasan_kmalloc+0xd4/0xd8
[   40.067937]  __kmalloc_cache_noprof+0x15c/0x3c0
[   40.068687]  kasan_bitops_generic+0xa0/0x1c8
[   40.069440]  kunit_try_run_case+0x14c/0x3d0
[   40.070287]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.071136]  kthread+0x24c/0x2d0
[   40.071780]  ret_from_fork+0x10/0x20
[   40.072463] 
[   40.072837] The buggy address belongs to the object at fff00000c6114ee0
[   40.072837]  which belongs to the cache kmalloc-16 of size 16
[   40.074482] The buggy address is located 8 bytes inside of
[   40.074482]  allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[   40.076108] 
[   40.076657] The buggy address belongs to the physical page:
[   40.077494] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[   40.078564] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.079578] page_type: f5(slab)
[   40.080173] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.081235] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.082218] page dumped because: kasan: bad access detected
[   40.083139] 
[   40.083606] Memory state around the buggy address:
[   40.084274]  fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   40.085356]  fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.086319] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   40.087226]                                                           ^
[   40.088219]  fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.089171]  fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.090135] ==================================================================
---
[   39.907468] ==================================================================
[   39.908446] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   39.909945] Read of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[   39.910814] 
[   39.911441] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   39.913404] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.914041] Hardware name: linux,dummy-virt (DT)
[   39.914402] Call trace:
[   39.914648]  show_stack+0x20/0x38 (C)
[   39.915936]  dump_stack_lvl+0x8c/0xd0
[   39.916772]  print_report+0x118/0x5e0
[   39.917389]  kasan_report+0xc8/0x118
[   39.917940]  __asan_report_load8_noabort+0x20/0x30
[   39.918563]  kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   39.919548]  kasan_bitops_generic+0x110/0x1c8
[   39.920679]  kunit_try_run_case+0x14c/0x3d0
[   39.921499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.922319]  kthread+0x24c/0x2d0
[   39.923622]  ret_from_fork+0x10/0x20
[   39.924254] 
[   39.924668] Allocated by task 249:
[   39.925132]  kasan_save_stack+0x3c/0x68
[   39.925824]  kasan_save_track+0x20/0x40
[   39.926608]  kasan_save_alloc_info+0x40/0x58
[   39.927871]  __kasan_kmalloc+0xd4/0xd8
[   39.928458]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.929143]  kasan_bitops_generic+0xa0/0x1c8
[   39.930963]  kunit_try_run_case+0x14c/0x3d0
[   39.931788]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.932902]  kthread+0x24c/0x2d0
[   39.933761]  ret_from_fork+0x10/0x20
[   39.934454] 
[   39.935057] The buggy address belongs to the object at fff00000c6114ee0
[   39.935057]  which belongs to the cache kmalloc-16 of size 16
[   39.936794] The buggy address is located 8 bytes inside of
[   39.936794]  allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[   39.938629] 
[   39.939068] The buggy address belongs to the physical page:
[   39.940105] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[   39.941172] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.942324] page_type: f5(slab)
[   39.942859] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   39.944159] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   39.945393] page dumped because: kasan: bad access detected
[   39.946364] 
[   39.946926] Memory state around the buggy address:
[   39.947781]  fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   39.948930]  fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   39.950120] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   39.951070]                                                           ^
[   39.952343]  fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.953041]  fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.953823] ==================================================================

test log snippet boot parser 28

Home

[   40.529174] ==================================================================
[   40.530450] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   40.531835] Read of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[   40.532842] 
[   40.533211] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   40.534305] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.534889] Hardware name: linux,dummy-virt (DT)
[   40.535597] Call trace:
[   40.536022]  show_stack+0x20/0x38 (C)
[   40.536755]  dump_stack_lvl+0x8c/0xd0
[   40.537335]  print_report+0x118/0x5e0
[   40.537916]  kasan_report+0xc8/0x118
[   40.538766]  __asan_report_load8_noabort+0x20/0x30
[   40.539412]  kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   40.540328]  kasan_bitops_generic+0x11c/0x1c8
[   40.540903]  kunit_try_run_case+0x14c/0x3d0
[   40.541667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.542395]  kthread+0x24c/0x2d0
[   40.542972]  ret_from_fork+0x10/0x20
[   40.543662] 
[   40.543999] Allocated by task 249:
[   40.544441]  kasan_save_stack+0x3c/0x68
[   40.545227]  kasan_save_track+0x20/0x40
[   40.545885]  kasan_save_alloc_info+0x40/0x58
[   40.546482]  __kasan_kmalloc+0xd4/0xd8
[   40.547242]  __kmalloc_cache_noprof+0x15c/0x3c0
[   40.547978]  kasan_bitops_generic+0xa0/0x1c8
[   40.548577]  kunit_try_run_case+0x14c/0x3d0
[   40.549280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.550061]  kthread+0x24c/0x2d0
[   40.550594]  ret_from_fork+0x10/0x20
[   40.551101] 
[   40.551581] The buggy address belongs to the object at fff00000c6114ee0
[   40.551581]  which belongs to the cache kmalloc-16 of size 16
[   40.553061] The buggy address is located 8 bytes inside of
[   40.553061]  allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[   40.554804] 
[   40.555248] The buggy address belongs to the physical page:
[   40.555972] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[   40.556806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.557809] page_type: f5(slab)
[   40.558370] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.559313] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.560343] page dumped because: kasan: bad access detected
[   40.561017] 
[   40.561427] Memory state around the buggy address:
[   40.562072]  fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   40.562991]  fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.563892] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   40.564852]                                                           ^
[   40.565731]  fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.566601]  fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.567628] ==================================================================
---
[   40.277026] ==================================================================
[   40.277915] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   40.278860] Read of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[   40.279807] 
[   40.280292] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   40.281615] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.282415] Hardware name: linux,dummy-virt (DT)
[   40.283087] Call trace:
[   40.283540]  show_stack+0x20/0x38 (C)
[   40.284292]  dump_stack_lvl+0x8c/0xd0
[   40.284848]  print_report+0x118/0x5e0
[   40.285492]  kasan_report+0xc8/0x118
[   40.286199]  __asan_report_load8_noabort+0x20/0x30
[   40.287020]  kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   40.287876]  kasan_bitops_generic+0x11c/0x1c8
[   40.289100]  kunit_try_run_case+0x14c/0x3d0
[   40.289712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.290723]  kthread+0x24c/0x2d0
[   40.291560]  ret_from_fork+0x10/0x20
[   40.292359] 
[   40.292896] Allocated by task 249:
[   40.293590]  kasan_save_stack+0x3c/0x68
[   40.294294]  kasan_save_track+0x20/0x40
[   40.295127]  kasan_save_alloc_info+0x40/0x58
[   40.295941]  __kasan_kmalloc+0xd4/0xd8
[   40.296749]  __kmalloc_cache_noprof+0x15c/0x3c0
[   40.297409]  kasan_bitops_generic+0xa0/0x1c8
[   40.298439]  kunit_try_run_case+0x14c/0x3d0
[   40.299310]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.300073]  kthread+0x24c/0x2d0
[   40.300908]  ret_from_fork+0x10/0x20
[   40.301683] 
[   40.302051] The buggy address belongs to the object at fff00000c6114ee0
[   40.302051]  which belongs to the cache kmalloc-16 of size 16
[   40.303696] The buggy address is located 8 bytes inside of
[   40.303696]  allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[   40.304396] 
[   40.304691] The buggy address belongs to the physical page:
[   40.306360] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[   40.307615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.308655] page_type: f5(slab)
[   40.309430] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.310579] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.311666] page dumped because: kasan: bad access detected
[   40.312654] 
[   40.313032] Memory state around the buggy address:
[   40.313725]  fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   40.314625]  fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.315487] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   40.317052]                                                           ^
[   40.317838]  fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.318781]  fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.319777] ==================================================================
---
[   40.569389] ==================================================================
[   40.570704] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   40.571894] Read of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[   40.572774] 
[   40.573248] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   40.574402] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.574996] Hardware name: linux,dummy-virt (DT)
[   40.575620] Call trace:
[   40.575964]  show_stack+0x20/0x38 (C)
[   40.576750]  dump_stack_lvl+0x8c/0xd0
[   40.577301]  print_report+0x118/0x5e0
[   40.578155]  kasan_report+0xc8/0x118
[   40.578891]  __asan_report_load8_noabort+0x20/0x30
[   40.579771]  kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   40.580433]  kasan_bitops_generic+0x11c/0x1c8
[   40.581214]  kunit_try_run_case+0x14c/0x3d0
[   40.581822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.582711]  kthread+0x24c/0x2d0
[   40.583248]  ret_from_fork+0x10/0x20
[   40.583852] 
[   40.584174] Allocated by task 249:
[   40.584738]  kasan_save_stack+0x3c/0x68
[   40.585373]  kasan_save_track+0x20/0x40
[   40.586381]  kasan_save_alloc_info+0x40/0x58
[   40.586910]  __kasan_kmalloc+0xd4/0xd8
[   40.587538]  __kmalloc_cache_noprof+0x15c/0x3c0
[   40.588241]  kasan_bitops_generic+0xa0/0x1c8
[   40.588955]  kunit_try_run_case+0x14c/0x3d0
[   40.589622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.590373]  kthread+0x24c/0x2d0
[   40.590985]  ret_from_fork+0x10/0x20
[   40.591545] 
[   40.592013] The buggy address belongs to the object at fff00000c6114ee0
[   40.592013]  which belongs to the cache kmalloc-16 of size 16
[   40.593492] The buggy address is located 8 bytes inside of
[   40.593492]  allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[   40.594944] 
[   40.595319] The buggy address belongs to the physical page:
[   40.596024] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[   40.597086] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.598065] page_type: f5(slab)
[   40.598624] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.599749] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.600646] page dumped because: kasan: bad access detected
[   40.601318] 
[   40.601737] Memory state around the buggy address:
[   40.602331]  fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   40.603271]  fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.604197] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   40.605113]                                                           ^
[   40.606071]  fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.607075]  fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.607969] ==================================================================
---
[   40.362597] ==================================================================
[   40.365031] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   40.366175] Read of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[   40.367196] 
[   40.367566] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   40.368554] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.369221] Hardware name: linux,dummy-virt (DT)
[   40.369873] Call trace:
[   40.370297]  show_stack+0x20/0x38 (C)
[   40.371011]  dump_stack_lvl+0x8c/0xd0
[   40.371575]  print_report+0x118/0x5e0
[   40.372272]  kasan_report+0xc8/0x118
[   40.372871]  __asan_report_load8_noabort+0x20/0x30
[   40.373738]  kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   40.374609]  kasan_bitops_generic+0x11c/0x1c8
[   40.375263]  kunit_try_run_case+0x14c/0x3d0
[   40.375971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.376692]  kthread+0x24c/0x2d0
[   40.377297]  ret_from_fork+0x10/0x20
[   40.377868] 
[   40.378271] Allocated by task 249:
[   40.378842]  kasan_save_stack+0x3c/0x68
[   40.379407]  kasan_save_track+0x20/0x40
[   40.380093]  kasan_save_alloc_info+0x40/0x58
[   40.380781]  __kasan_kmalloc+0xd4/0xd8
[   40.381357]  __kmalloc_cache_noprof+0x15c/0x3c0
[   40.382050]  kasan_bitops_generic+0xa0/0x1c8
[   40.382759]  kunit_try_run_case+0x14c/0x3d0
[   40.383593]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.384362]  kthread+0x24c/0x2d0
[   40.384847]  ret_from_fork+0x10/0x20
[   40.385559] 
[   40.385890] The buggy address belongs to the object at fff00000c6114ee0
[   40.385890]  which belongs to the cache kmalloc-16 of size 16
[   40.387261] The buggy address is located 8 bytes inside of
[   40.387261]  allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[   40.388763] 
[   40.389121] The buggy address belongs to the physical page:
[   40.389802] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[   40.390739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.391683] page_type: f5(slab)
[   40.392301] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.393243] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.394110] page dumped because: kasan: bad access detected
[   40.394853] 
[   40.395237] Memory state around the buggy address:
[   40.395940]  fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   40.396871]  fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.397733] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   40.398682]                                                           ^
[   40.399535]  fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.400413]  fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.401397] ==================================================================
---
[   40.442886] ==================================================================
[   40.443713] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   40.445144] Read of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[   40.446231] 
[   40.446790] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   40.447957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.448539] Hardware name: linux,dummy-virt (DT)
[   40.449155] Call trace:
[   40.449560]  show_stack+0x20/0x38 (C)
[   40.450227]  dump_stack_lvl+0x8c/0xd0
[   40.450835]  print_report+0x118/0x5e0
[   40.451468]  kasan_report+0xc8/0x118
[   40.451983]  __asan_report_load8_noabort+0x20/0x30
[   40.452864]  kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   40.453585]  kasan_bitops_generic+0x11c/0x1c8
[   40.454336]  kunit_try_run_case+0x14c/0x3d0
[   40.454967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.455857]  kthread+0x24c/0x2d0
[   40.456463]  ret_from_fork+0x10/0x20
[   40.457136] 
[   40.457504] Allocated by task 249:
[   40.457959]  kasan_save_stack+0x3c/0x68
[   40.458818]  kasan_save_track+0x20/0x40
[   40.459444]  kasan_save_alloc_info+0x40/0x58
[   40.460064]  __kasan_kmalloc+0xd4/0xd8
[   40.460622]  __kmalloc_cache_noprof+0x15c/0x3c0
[   40.461185]  kasan_bitops_generic+0xa0/0x1c8
[   40.461835]  kunit_try_run_case+0x14c/0x3d0
[   40.462406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.463236]  kthread+0x24c/0x2d0
[   40.463763]  ret_from_fork+0x10/0x20
[   40.464370] 
[   40.464724] The buggy address belongs to the object at fff00000c6114ee0
[   40.464724]  which belongs to the cache kmalloc-16 of size 16
[   40.466190] The buggy address is located 8 bytes inside of
[   40.466190]  allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[   40.467623] 
[   40.468108] The buggy address belongs to the physical page:
[   40.468838] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[   40.469782] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.470877] page_type: f5(slab)
[   40.471428] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.472294] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.473255] page dumped because: kasan: bad access detected
[   40.474083] 
[   40.474419] Memory state around the buggy address:
[   40.475044]  fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   40.475881]  fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.476850] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   40.477815]                                                           ^
[   40.478755]  fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.479572]  fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.480579] ==================================================================

test log snippet boot parser 29

Home

[   40.231027] ==================================================================
[   40.231987] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   40.233090] Write of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[   40.233814] 
[   40.234255] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   40.235727] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.236397] Hardware name: linux,dummy-virt (DT)
[   40.237573] Call trace:
[   40.238127]  show_stack+0x20/0x38 (C)
[   40.239123]  dump_stack_lvl+0x8c/0xd0
[   40.239964]  print_report+0x118/0x5e0
[   40.240717]  kasan_report+0xc8/0x118
[   40.241456]  kasan_check_range+0x100/0x1a8
[   40.242291]  __kasan_check_write+0x20/0x30
[   40.243082]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   40.244026]  kasan_bitops_generic+0x11c/0x1c8
[   40.244837]  kunit_try_run_case+0x14c/0x3d0
[   40.245654]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.246506]  kthread+0x24c/0x2d0
[   40.247204]  ret_from_fork+0x10/0x20
[   40.247941] 
[   40.248301] Allocated by task 249:
[   40.249026]  kasan_save_stack+0x3c/0x68
[   40.249882]  kasan_save_track+0x20/0x40
[   40.250645]  kasan_save_alloc_info+0x40/0x58
[   40.251378]  __kasan_kmalloc+0xd4/0xd8
[   40.252072]  __kmalloc_cache_noprof+0x15c/0x3c0
[   40.252816]  kasan_bitops_generic+0xa0/0x1c8
[   40.253662]  kunit_try_run_case+0x14c/0x3d0
[   40.254538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.255369]  kthread+0x24c/0x2d0
[   40.255897]  ret_from_fork+0x10/0x20
[   40.256429] 
[   40.256817] The buggy address belongs to the object at fff00000c6114ee0
[   40.256817]  which belongs to the cache kmalloc-16 of size 16
[   40.258631] The buggy address is located 8 bytes inside of
[   40.258631]  allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[   40.260138] 
[   40.260504] The buggy address belongs to the physical page:
[   40.261582] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[   40.262638] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.263691] page_type: f5(slab)
[   40.264295] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.265152] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.266285] page dumped because: kasan: bad access detected
[   40.267188] 
[   40.267655] Memory state around the buggy address:
[   40.268452]  fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   40.269353]  fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.270387] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   40.271411]                                                           ^
[   40.272368]  fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.273364]  fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.274306] ==================================================================
---
[   40.483672] ==================================================================
[   40.484738] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   40.485677] Write of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[   40.486626] 
[   40.487625] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   40.489002] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.489819] Hardware name: linux,dummy-virt (DT)
[   40.490441] Call trace:
[   40.490747]  show_stack+0x20/0x38 (C)
[   40.491657]  dump_stack_lvl+0x8c/0xd0
[   40.492574]  print_report+0x118/0x5e0
[   40.493267]  kasan_report+0xc8/0x118
[   40.494040]  kasan_check_range+0x100/0x1a8
[   40.494806]  __kasan_check_write+0x20/0x30
[   40.495581]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   40.496591]  kasan_bitops_generic+0x11c/0x1c8
[   40.497413]  kunit_try_run_case+0x14c/0x3d0
[   40.498254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.499144]  kthread+0x24c/0x2d0
[   40.499874]  ret_from_fork+0x10/0x20
[   40.500603] 
[   40.500986] Allocated by task 249:
[   40.501710]  kasan_save_stack+0x3c/0x68
[   40.502452]  kasan_save_track+0x20/0x40
[   40.503171]  kasan_save_alloc_info+0x40/0x58
[   40.504001]  __kasan_kmalloc+0xd4/0xd8
[   40.504614]  __kmalloc_cache_noprof+0x15c/0x3c0
[   40.505282]  kasan_bitops_generic+0xa0/0x1c8
[   40.506070]  kunit_try_run_case+0x14c/0x3d0
[   40.506842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.507703]  kthread+0x24c/0x2d0
[   40.508355]  ret_from_fork+0x10/0x20
[   40.509034] 
[   40.509488] The buggy address belongs to the object at fff00000c6114ee0
[   40.509488]  which belongs to the cache kmalloc-16 of size 16
[   40.511230] The buggy address is located 8 bytes inside of
[   40.511230]  allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[   40.512802] 
[   40.513158] The buggy address belongs to the physical page:
[   40.514309] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[   40.515581] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.516637] page_type: f5(slab)
[   40.517257] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.518401] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.519405] page dumped because: kasan: bad access detected
[   40.520281] 
[   40.520633] Memory state around the buggy address:
[   40.521265]  fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   40.522664]  fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.523679] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   40.524768]                                                           ^
[   40.525195]  fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.525749]  fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.527359] ==================================================================
---
[   40.403637] ==================================================================
[   40.404458] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   40.405307] Write of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[   40.406263] 
[   40.406601] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   40.407579] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.408358] Hardware name: linux,dummy-virt (DT)
[   40.409114] Call trace:
[   40.409601]  show_stack+0x20/0x38 (C)
[   40.410176]  dump_stack_lvl+0x8c/0xd0
[   40.410940]  print_report+0x118/0x5e0
[   40.411439]  kasan_report+0xc8/0x118
[   40.412206]  kasan_check_range+0x100/0x1a8
[   40.412812]  __kasan_check_write+0x20/0x30
[   40.413641]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   40.414437]  kasan_bitops_generic+0x11c/0x1c8
[   40.415209]  kunit_try_run_case+0x14c/0x3d0
[   40.415772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.416562]  kthread+0x24c/0x2d0
[   40.417192]  ret_from_fork+0x10/0x20
[   40.417814] 
[   40.418104] Allocated by task 249:
[   40.418761]  kasan_save_stack+0x3c/0x68
[   40.419273]  kasan_save_track+0x20/0x40
[   40.419956]  kasan_save_alloc_info+0x40/0x58
[   40.420739]  __kasan_kmalloc+0xd4/0xd8
[   40.421297]  __kmalloc_cache_noprof+0x15c/0x3c0
[   40.422006]  kasan_bitops_generic+0xa0/0x1c8
[   40.422608]  kunit_try_run_case+0x14c/0x3d0
[   40.423357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.424000]  kthread+0x24c/0x2d0
[   40.424637]  ret_from_fork+0x10/0x20
[   40.425232] 
[   40.425650] The buggy address belongs to the object at fff00000c6114ee0
[   40.425650]  which belongs to the cache kmalloc-16 of size 16
[   40.427041] The buggy address is located 8 bytes inside of
[   40.427041]  allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[   40.428412] 
[   40.428803] The buggy address belongs to the physical page:
[   40.429602] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[   40.430606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.431443] page_type: f5(slab)
[   40.432055] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.432937] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.433927] page dumped because: kasan: bad access detected
[   40.434544] 
[   40.434931] Memory state around the buggy address:
[   40.435494]  fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   40.436605]  fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.437427] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   40.438323]                                                           ^
[   40.439143]  fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.440184]  fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.441136] ==================================================================
---
[   40.321940] ==================================================================
[   40.323060] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   40.324083] Write of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[   40.325035] 
[   40.325430] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   40.326574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.327214] Hardware name: linux,dummy-virt (DT)
[   40.327896] Call trace:
[   40.328385]  show_stack+0x20/0x38 (C)
[   40.328983]  dump_stack_lvl+0x8c/0xd0
[   40.329857]  print_report+0x118/0x5e0
[   40.330480]  kasan_report+0xc8/0x118
[   40.331270]  kasan_check_range+0x100/0x1a8
[   40.331976]  __kasan_check_write+0x20/0x30
[   40.332609]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   40.333343]  kasan_bitops_generic+0x11c/0x1c8
[   40.334210]  kunit_try_run_case+0x14c/0x3d0
[   40.335063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.335653]  kthread+0x24c/0x2d0
[   40.336323]  ret_from_fork+0x10/0x20
[   40.336898] 
[   40.337292] Allocated by task 249:
[   40.337811]  kasan_save_stack+0x3c/0x68
[   40.338389]  kasan_save_track+0x20/0x40
[   40.339189]  kasan_save_alloc_info+0x40/0x58
[   40.339815]  __kasan_kmalloc+0xd4/0xd8
[   40.340273]  __kmalloc_cache_noprof+0x15c/0x3c0
[   40.341196]  kasan_bitops_generic+0xa0/0x1c8
[   40.341968]  kunit_try_run_case+0x14c/0x3d0
[   40.342493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.343281]  kthread+0x24c/0x2d0
[   40.343960]  ret_from_fork+0x10/0x20
[   40.344510] 
[   40.344833] The buggy address belongs to the object at fff00000c6114ee0
[   40.344833]  which belongs to the cache kmalloc-16 of size 16
[   40.346217] The buggy address is located 8 bytes inside of
[   40.346217]  allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[   40.347661] 
[   40.348133] The buggy address belongs to the physical page:
[   40.348940] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[   40.350134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.350875] page_type: f5(slab)
[   40.351487] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.352419] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.353438] page dumped because: kasan: bad access detected
[   40.354265] 
[   40.354663] Memory state around the buggy address:
[   40.355382]  fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   40.356262]  fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.357229] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   40.358117]                                                           ^
[   40.358928]  fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.359975]  fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.360783] ==================================================================

test log snippet boot parser 30

Home

[   34.608921] ==================================================================
[   34.610357] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   34.612488] Write of size 1 at addr fff00000c68d1f00 by task kunit_try_catch/132
[   34.613499] 
[   34.613910] CPU: 0 UID: 0 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   34.614969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.615557] Hardware name: linux,dummy-virt (DT)
[   34.616123] Call trace:
[   34.616825]  show_stack+0x20/0x38 (C)
[   34.617393]  dump_stack_lvl+0x8c/0xd0
[   34.618621]  print_report+0x118/0x5e0
[   34.619859]  kasan_report+0xc8/0x118
[   34.620686]  __asan_report_store1_noabort+0x20/0x30
[   34.621383]  kmalloc_big_oob_right+0x2a4/0x2f0
[   34.622156]  kunit_try_run_case+0x14c/0x3d0
[   34.622893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.623904]  kthread+0x24c/0x2d0
[   34.624819]  ret_from_fork+0x10/0x20
[   34.625599] 
[   34.625904] Allocated by task 132:
[   34.626416]  kasan_save_stack+0x3c/0x68
[   34.626891]  kasan_save_track+0x20/0x40
[   34.627570]  kasan_save_alloc_info+0x40/0x58
[   34.628438]  __kasan_kmalloc+0xd4/0xd8
[   34.629094]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.629582]  kmalloc_big_oob_right+0xb8/0x2f0
[   34.630432]  kunit_try_run_case+0x14c/0x3d0
[   34.631635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.633189]  kthread+0x24c/0x2d0
[   34.634465]  ret_from_fork+0x10/0x20
[   34.635798] 
[   34.636435] The buggy address belongs to the object at fff00000c68d0000
[   34.636435]  which belongs to the cache kmalloc-8k of size 8192
[   34.638267] The buggy address is located 0 bytes to the right of
[   34.638267]  allocated 7936-byte region [fff00000c68d0000, fff00000c68d1f00)
[   34.640157] 
[   34.640712] The buggy address belongs to the physical page:
[   34.641686] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068d0
[   34.642974] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.643829] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.645303] page_type: f5(slab)
[   34.645771] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   34.646869] raw: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000
[   34.647792] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   34.649183] head: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000
[   34.651102] head: 0bfffe0000000003 ffffc1ffc31a3401 ffffffffffffffff 0000000000000000
[   34.652806] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   34.654105] page dumped because: kasan: bad access detected
[   34.654967] 
[   34.655353] Memory state around the buggy address:
[   34.656016]  fff00000c68d1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.657127]  fff00000c68d1e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.658572] >fff00000c68d1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.660082]                    ^
[   34.660387]  fff00000c68d1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.660964]  fff00000c68d2000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.662233] ==================================================================

test log snippet boot parser 31

Home

[   34.675674] ==================================================================
[   34.677134] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   34.677988] Write of size 1 at addr fff00000c681600a by task kunit_try_catch/134
[   34.679245] 
[   34.679658] CPU: 0 UID: 0 PID: 134 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   34.681831] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.682706] Hardware name: linux,dummy-virt (DT)
[   34.683452] Call trace:
[   34.684690]  show_stack+0x20/0x38 (C)
[   34.685359]  dump_stack_lvl+0x8c/0xd0
[   34.686022]  print_report+0x118/0x5e0
[   34.686633]  kasan_report+0xc8/0x118
[   34.687209]  __asan_report_store1_noabort+0x20/0x30
[   34.688268]  kmalloc_large_oob_right+0x278/0x2b8
[   34.689448]  kunit_try_run_case+0x14c/0x3d0
[   34.690129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.690951]  kthread+0x24c/0x2d0
[   34.691699]  ret_from_fork+0x10/0x20
[   34.692300] 
[   34.692787] The buggy address belongs to the physical page:
[   34.693890] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106814
[   34.695448] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.696743] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.697485] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.698675] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.699901] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.701171] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.703135] head: 0bfffe0000000002 ffffc1ffc31a0501 ffffffffffffffff 0000000000000000
[   34.704461] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   34.705587] page dumped because: kasan: bad access detected
[   34.706404] 
[   34.707023] Memory state around the buggy address:
[   34.707961]  fff00000c6815f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.708900]  fff00000c6815f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.709905] >fff00000c6816000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.710921]                       ^
[   34.711428]  fff00000c6816080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.712834]  fff00000c6816100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.713844] ==================================================================

test log snippet boot parser 32

Home

[   36.282690] ==================================================================
[   36.284489] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e8
[   36.285356] Read of size 64 at addr fff00000c618fb04 by task kunit_try_catch/170
[   36.286394] 
[   36.287350] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   36.288567] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.289059] Hardware name: linux,dummy-virt (DT)
[   36.289827] Call trace:
[   36.290258]  show_stack+0x20/0x38 (C)
[   36.290899]  dump_stack_lvl+0x8c/0xd0
[   36.291750]  print_report+0x118/0x5e0
[   36.292266]  kasan_report+0xc8/0x118
[   36.293079]  kasan_check_range+0x100/0x1a8
[   36.293662]  __asan_memmove+0x3c/0x98
[   36.294314]  kmalloc_memmove_invalid_size+0x154/0x2e8
[   36.295470]  kunit_try_run_case+0x14c/0x3d0
[   36.296093]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.297352]  kthread+0x24c/0x2d0
[   36.297928]  ret_from_fork+0x10/0x20
[   36.298600] 
[   36.299006] Allocated by task 170:
[   36.299420]  kasan_save_stack+0x3c/0x68
[   36.300226]  kasan_save_track+0x20/0x40
[   36.301106]  kasan_save_alloc_info+0x40/0x58
[   36.301602]  __kasan_kmalloc+0xd4/0xd8
[   36.302247]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.303500]  kmalloc_memmove_invalid_size+0xb0/0x2e8
[   36.304215]  kunit_try_run_case+0x14c/0x3d0
[   36.304896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.305798]  kthread+0x24c/0x2d0
[   36.306324]  ret_from_fork+0x10/0x20
[   36.306894] 
[   36.307277] The buggy address belongs to the object at fff00000c618fb00
[   36.307277]  which belongs to the cache kmalloc-64 of size 64
[   36.308827] The buggy address is located 4 bytes inside of
[   36.308827]  allocated 64-byte region [fff00000c618fb00, fff00000c618fb40)
[   36.310913] 
[   36.311465] The buggy address belongs to the physical page:
[   36.312137] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10618f
[   36.314018] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.315338] page_type: f5(slab)
[   36.316080] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.316987] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.317945] page dumped because: kasan: bad access detected
[   36.318566] 
[   36.318948] Memory state around the buggy address:
[   36.320117]  fff00000c618fa00: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   36.321194]  fff00000c618fa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.322234] >fff00000c618fb00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.323123]                                            ^
[   36.324151]  fff00000c618fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.326140]  fff00000c618fc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.327067] ==================================================================

test log snippet boot parser 33

Home

[   34.448290] ==================================================================
[   34.449827] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   34.450659] Read of size 1 at addr fff00000c64fb000 by task kunit_try_catch/128
[   34.451735] 
[   34.452157] CPU: 1 UID: 0 PID: 128 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   34.454363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.455431] Hardware name: linux,dummy-virt (DT)
[   34.456410] Call trace:
[   34.456856]  show_stack+0x20/0x38 (C)
[   34.457602]  dump_stack_lvl+0x8c/0xd0
[   34.458186]  print_report+0x118/0x5e0
[   34.459099]  kasan_report+0xc8/0x118
[   34.459806]  __asan_report_load1_noabort+0x20/0x30
[   34.460447]  kmalloc_node_oob_right+0x2f4/0x330
[   34.461114]  kunit_try_run_case+0x14c/0x3d0
[   34.462155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.463672]  kthread+0x24c/0x2d0
[   34.464823]  ret_from_fork+0x10/0x20
[   34.465738] 
[   34.466126] Allocated by task 128:
[   34.466638]  kasan_save_stack+0x3c/0x68
[   34.468132]  kasan_save_track+0x20/0x40
[   34.468477]  kasan_save_alloc_info+0x40/0x58
[   34.468928]  __kasan_kmalloc+0xd4/0xd8
[   34.469614]  __kmalloc_cache_node_noprof+0x168/0x3d0
[   34.470601]  kmalloc_node_oob_right+0xbc/0x330
[   34.471202]  kunit_try_run_case+0x14c/0x3d0
[   34.472576]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.473404]  kthread+0x24c/0x2d0
[   34.473935]  ret_from_fork+0x10/0x20
[   34.474568] 
[   34.475295] The buggy address belongs to the object at fff00000c64fa000
[   34.475295]  which belongs to the cache kmalloc-4k of size 4096
[   34.476599] The buggy address is located 0 bytes to the right of
[   34.476599]  allocated 4096-byte region [fff00000c64fa000, fff00000c64fb000)
[   34.478089] 
[   34.478511] The buggy address belongs to the physical page:
[   34.479920] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f8
[   34.481266] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.482151] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.483434] page_type: f5(slab)
[   34.483939] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   34.485377] raw: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000
[   34.486467] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   34.487540] head: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000
[   34.488920] head: 0bfffe0000000003 ffffc1ffc3193e01 ffffffffffffffff 0000000000000000
[   34.490018] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   34.491853] page dumped because: kasan: bad access detected
[   34.492817] 
[   34.493212] Memory state around the buggy address:
[   34.493858]  fff00000c64faf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.495042]  fff00000c64faf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.496695] >fff00000c64fb000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.497147]                    ^
[   34.497399]  fff00000c64fb080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.498513]  fff00000c64fb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.499583] ==================================================================

test log snippet boot parser 34

Home

[   35.807884] ==================================================================
[   35.808985] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   35.810095] Write of size 16 at addr fff00000c6114e40 by task kunit_try_catch/154
[   35.811429] 
[   35.811997] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   35.813841] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.815301] Hardware name: linux,dummy-virt (DT)
[   35.815908] Call trace:
[   35.816642]  show_stack+0x20/0x38 (C)
[   35.817696]  dump_stack_lvl+0x8c/0xd0
[   35.818229]  print_report+0x118/0x5e0
[   35.818827]  kasan_report+0xc8/0x118
[   35.819402]  __asan_report_store16_noabort+0x20/0x30
[   35.820109]  kmalloc_oob_16+0x3a0/0x3f8
[   35.820590]  kunit_try_run_case+0x14c/0x3d0
[   35.821265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.822215]  kthread+0x24c/0x2d0
[   35.822793]  ret_from_fork+0x10/0x20
[   35.823274] 
[   35.823661] Allocated by task 154:
[   35.824218]  kasan_save_stack+0x3c/0x68
[   35.825059]  kasan_save_track+0x20/0x40
[   35.825838]  kasan_save_alloc_info+0x40/0x58
[   35.826686]  __kasan_kmalloc+0xd4/0xd8
[   35.827205]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.828054]  kmalloc_oob_16+0xb4/0x3f8
[   35.828616]  kunit_try_run_case+0x14c/0x3d0
[   35.829282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.830080]  kthread+0x24c/0x2d0
[   35.830603]  ret_from_fork+0x10/0x20
[   35.831091] 
[   35.831594] The buggy address belongs to the object at fff00000c6114e40
[   35.831594]  which belongs to the cache kmalloc-16 of size 16
[   35.833041] The buggy address is located 0 bytes inside of
[   35.833041]  allocated 13-byte region [fff00000c6114e40, fff00000c6114e4d)
[   35.834550] 
[   35.834959] The buggy address belongs to the physical page:
[   35.835869] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[   35.837123] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.838151] page_type: f5(slab)
[   35.838716] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.840161] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.841334] page dumped because: kasan: bad access detected
[   35.842172] 
[   35.842603] Memory state around the buggy address:
[   35.843331]  fff00000c6114d00: 00 00 fc fc 00 06 fc fc 00 06 fc fc 00 00 fc fc
[   35.844406]  fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   35.845378] >fff00000c6114e00: fa fb fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc
[   35.846305]                                               ^
[   35.847128]  fff00000c6114e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.848081]  fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.848978] ==================================================================

test log snippet boot parser 35

Home

[   35.928844] ==================================================================
[   35.929917] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   35.930838] Write of size 128 at addr fff00000c6158600 by task kunit_try_catch/158
[   35.932234] 
[   35.932737] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   35.934472] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.935983] Hardware name: linux,dummy-virt (DT)
[   35.937262] Call trace:
[   35.937725]  show_stack+0x20/0x38 (C)
[   35.938498]  dump_stack_lvl+0x8c/0xd0
[   35.940267]  print_report+0x118/0x5e0
[   35.940969]  kasan_report+0xc8/0x118
[   35.941724]  kasan_check_range+0x100/0x1a8
[   35.942313]  __asan_memset+0x34/0x78
[   35.942905]  kmalloc_oob_in_memset+0x144/0x2d0
[   35.943772]  kunit_try_run_case+0x14c/0x3d0
[   35.944413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.945676]  kthread+0x24c/0x2d0
[   35.946325]  ret_from_fork+0x10/0x20
[   35.947665] 
[   35.948031] Allocated by task 158:
[   35.948603]  kasan_save_stack+0x3c/0x68
[   35.949379]  kasan_save_track+0x20/0x40
[   35.950107]  kasan_save_alloc_info+0x40/0x58
[   35.950906]  __kasan_kmalloc+0xd4/0xd8
[   35.951774]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.952299]  kmalloc_oob_in_memset+0xb0/0x2d0
[   35.953266]  kunit_try_run_case+0x14c/0x3d0
[   35.954015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.954866]  kthread+0x24c/0x2d0
[   35.955699]  ret_from_fork+0x10/0x20
[   35.956171] 
[   35.956599] The buggy address belongs to the object at fff00000c6158600
[   35.956599]  which belongs to the cache kmalloc-128 of size 128
[   35.958104] The buggy address is located 0 bytes inside of
[   35.958104]  allocated 120-byte region [fff00000c6158600, fff00000c6158678)
[   35.959851] 
[   35.960191] The buggy address belongs to the physical page:
[   35.961382] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106158
[   35.962670] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.963841] page_type: f5(slab)
[   35.964502] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.965333] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   35.966646] page dumped because: kasan: bad access detected
[   35.967934] 
[   35.968414] Memory state around the buggy address:
[   35.969073]  fff00000c6158500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   35.970100]  fff00000c6158580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.971393] >fff00000c6158600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   35.972805]                                                                 ^
[   35.974169]  fff00000c6158680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.975446]  fff00000c6158700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.977485] ==================================================================

test log snippet boot parser 36

Home

[   34.372968] ==================================================================
[   34.374425] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   34.376771] Read of size 1 at addr fff00000c6114e1f by task kunit_try_catch/126
[   34.378257] 
[   34.379300] CPU: 1 UID: 0 PID: 126 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   34.380344] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.380926] Hardware name: linux,dummy-virt (DT)
[   34.381488] Call trace:
[   34.382092]  show_stack+0x20/0x38 (C)
[   34.382832]  dump_stack_lvl+0x8c/0xd0
[   34.383435]  print_report+0x118/0x5e0
[   34.384574]  kasan_report+0xc8/0x118
[   34.385175]  __asan_report_load1_noabort+0x20/0x30
[   34.385736]  kmalloc_oob_left+0x2ec/0x320
[   34.386163]  kunit_try_run_case+0x14c/0x3d0
[   34.386655]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.387847]  kthread+0x24c/0x2d0
[   34.388384]  ret_from_fork+0x10/0x20
[   34.389251] 
[   34.389570] Allocated by task 28:
[   34.390186]  kasan_save_stack+0x3c/0x68
[   34.390883]  kasan_save_track+0x20/0x40
[   34.391683]  kasan_save_alloc_info+0x40/0x58
[   34.392137]  __kasan_kmalloc+0xd4/0xd8
[   34.393484]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   34.394647]  kstrdup+0x54/0xc8
[   34.395408]  devtmpfs_work_loop+0x384/0x590
[   34.396835]  devtmpfsd+0x50/0x58
[   34.398071]  kthread+0x24c/0x2d0
[   34.398812]  ret_from_fork+0x10/0x20
[   34.400646] 
[   34.401179] Freed by task 28:
[   34.401760]  kasan_save_stack+0x3c/0x68
[   34.402631]  kasan_save_track+0x20/0x40
[   34.403444]  kasan_save_free_info+0x4c/0x78
[   34.404418]  __kasan_slab_free+0x6c/0x98
[   34.405491]  kfree+0x114/0x3c8
[   34.406199]  devtmpfs_work_loop+0x498/0x590
[   34.407160]  devtmpfsd+0x50/0x58
[   34.407598]  kthread+0x24c/0x2d0
[   34.407970]  ret_from_fork+0x10/0x20
[   34.408398] 
[   34.408873] The buggy address belongs to the object at fff00000c6114e00
[   34.408873]  which belongs to the cache kmalloc-16 of size 16
[   34.411006] The buggy address is located 15 bytes to the right of
[   34.411006]  allocated 16-byte region [fff00000c6114e00, fff00000c6114e10)
[   34.413614] 
[   34.414179] The buggy address belongs to the physical page:
[   34.415582] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[   34.417781] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.419038] page_type: f5(slab)
[   34.419796] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.421572] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.423198] page dumped because: kasan: bad access detected
[   34.425008] 
[   34.425325] Memory state around the buggy address:
[   34.426099]  fff00000c6114d00: 00 00 fc fc 00 06 fc fc 00 06 fc fc 00 00 fc fc
[   34.427627]  fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   34.429502] >fff00000c6114e00: fa fb fc fc 00 07 fc fc fc fc fc fc fc fc fc fc
[   34.430226]                             ^
[   34.431151]  fff00000c6114e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.432681]  fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.434201] ==================================================================

test log snippet boot parser 37

Home

[   36.170704] ==================================================================
[   36.172482] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   36.173947] Write of size 16 at addr fff00000c6158c69 by task kunit_try_catch/166
[   36.174885] 
[   36.175315] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   36.176652] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.177148] Hardware name: linux,dummy-virt (DT)
[   36.177791] Call trace:
[   36.178276]  show_stack+0x20/0x38 (C)
[   36.179046]  dump_stack_lvl+0x8c/0xd0
[   36.180249]  print_report+0x118/0x5e0
[   36.180932]  kasan_report+0xc8/0x118
[   36.181631]  kasan_check_range+0x100/0x1a8
[   36.182329]  __asan_memset+0x34/0x78
[   36.183047]  kmalloc_oob_memset_16+0x150/0x2f8
[   36.183787]  kunit_try_run_case+0x14c/0x3d0
[   36.184435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.185313]  kthread+0x24c/0x2d0
[   36.185957]  ret_from_fork+0x10/0x20
[   36.186657] 
[   36.187350] Allocated by task 166:
[   36.187831]  kasan_save_stack+0x3c/0x68
[   36.189431]  kasan_save_track+0x20/0x40
[   36.190181]  kasan_save_alloc_info+0x40/0x58
[   36.190942]  __kasan_kmalloc+0xd4/0xd8
[   36.191884]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.192750]  kmalloc_oob_memset_16+0xb0/0x2f8
[   36.193328]  kunit_try_run_case+0x14c/0x3d0
[   36.194049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.194983]  kthread+0x24c/0x2d0
[   36.195422]  ret_from_fork+0x10/0x20
[   36.196076] 
[   36.196455] The buggy address belongs to the object at fff00000c6158c00
[   36.196455]  which belongs to the cache kmalloc-128 of size 128
[   36.198079] The buggy address is located 105 bytes inside of
[   36.198079]  allocated 120-byte region [fff00000c6158c00, fff00000c6158c78)
[   36.200784] 
[   36.201308] The buggy address belongs to the physical page:
[   36.202107] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106158
[   36.203540] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.204637] page_type: f5(slab)
[   36.205106] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.206225] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.206977] page dumped because: kasan: bad access detected
[   36.207668] 
[   36.207919] Memory state around the buggy address:
[   36.208351]  fff00000c6158b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   36.210463]  fff00000c6158b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.211848] >fff00000c6158c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.212473]                                                                 ^
[   36.213995]  fff00000c6158c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.215950]  fff00000c6158d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.217647] ==================================================================

test log snippet boot parser 38

Home

[   35.989027] ==================================================================
[   35.990347] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   35.991924] Write of size 2 at addr fff00000c6158777 by task kunit_try_catch/160
[   35.993733] 
[   35.994104] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   35.996441] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.997498] Hardware name: linux,dummy-virt (DT)
[   35.998417] Call trace:
[   35.998887]  show_stack+0x20/0x38 (C)
[   35.999591]  dump_stack_lvl+0x8c/0xd0
[   36.000092]  print_report+0x118/0x5e0
[   36.001176]  kasan_report+0xc8/0x118
[   36.002154]  kasan_check_range+0x100/0x1a8
[   36.002625]  __asan_memset+0x34/0x78
[   36.003302]  kmalloc_oob_memset_2+0x150/0x2f8
[   36.004513]  kunit_try_run_case+0x14c/0x3d0
[   36.005242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.006164]  kthread+0x24c/0x2d0
[   36.007285]  ret_from_fork+0x10/0x20
[   36.007915] 
[   36.008166] Allocated by task 160:
[   36.008643]  kasan_save_stack+0x3c/0x68
[   36.010030]  kasan_save_track+0x20/0x40
[   36.010746]  kasan_save_alloc_info+0x40/0x58
[   36.011933]  __kasan_kmalloc+0xd4/0xd8
[   36.012863]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.013544]  kmalloc_oob_memset_2+0xb0/0x2f8
[   36.014104]  kunit_try_run_case+0x14c/0x3d0
[   36.014839]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.015781]  kthread+0x24c/0x2d0
[   36.016558]  ret_from_fork+0x10/0x20
[   36.017099] 
[   36.017436] The buggy address belongs to the object at fff00000c6158700
[   36.017436]  which belongs to the cache kmalloc-128 of size 128
[   36.019019] The buggy address is located 119 bytes inside of
[   36.019019]  allocated 120-byte region [fff00000c6158700, fff00000c6158778)
[   36.020066] 
[   36.020592] The buggy address belongs to the physical page:
[   36.021294] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106158
[   36.022315] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.023924] page_type: f5(slab)
[   36.024407] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.025181] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.026176] page dumped because: kasan: bad access detected
[   36.027119] 
[   36.027705] Memory state around the buggy address:
[   36.028768]  fff00000c6158600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.030576]  fff00000c6158680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.031357] >fff00000c6158700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.033209]                                                                 ^
[   36.034175]  fff00000c6158780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.036136]  fff00000c6158800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.036952] ==================================================================
---
[   36.049733] ==================================================================
[   36.051603] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   36.052502] Write of size 4 at addr fff00000c6158875 by task kunit_try_catch/162
[   36.053558] 
[   36.053900] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   36.055081] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.055894] Hardware name: linux,dummy-virt (DT)
[   36.056554] Call trace:
[   36.057076]  show_stack+0x20/0x38 (C)
[   36.057653]  dump_stack_lvl+0x8c/0xd0
[   36.058314]  print_report+0x118/0x5e0
[   36.058980]  kasan_report+0xc8/0x118
[   36.059799]  kasan_check_range+0x100/0x1a8
[   36.060507]  __asan_memset+0x34/0x78
[   36.061294]  kmalloc_oob_memset_4+0x150/0x300
[   36.062085]  kunit_try_run_case+0x14c/0x3d0
[   36.062740]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.063461]  kthread+0x24c/0x2d0
[   36.064029]  ret_from_fork+0x10/0x20
[   36.064598] 
[   36.065032] Allocated by task 162:
[   36.065511]  kasan_save_stack+0x3c/0x68
[   36.066030]  kasan_save_track+0x20/0x40
[   36.066725]  kasan_save_alloc_info+0x40/0x58
[   36.067249]  __kasan_kmalloc+0xd4/0xd8
[   36.067956]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.068601]  kmalloc_oob_memset_4+0xb0/0x300
[   36.069129]  kunit_try_run_case+0x14c/0x3d0
[   36.069911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.070632]  kthread+0x24c/0x2d0
[   36.071136]  ret_from_fork+0x10/0x20
[   36.071792] 
[   36.072127] The buggy address belongs to the object at fff00000c6158800
[   36.072127]  which belongs to the cache kmalloc-128 of size 128
[   36.073425] The buggy address is located 117 bytes inside of
[   36.073425]  allocated 120-byte region [fff00000c6158800, fff00000c6158878)
[   36.074835] 
[   36.075269] The buggy address belongs to the physical page:
[   36.076027] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106158
[   36.077041] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.078063] page_type: f5(slab)
[   36.078597] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.079627] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.080506] page dumped because: kasan: bad access detected
[   36.081228] 
[   36.081646] Memory state around the buggy address:
[   36.082283]  fff00000c6158700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.083106]  fff00000c6158780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.084050] >fff00000c6158800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.084928]                                                                 ^
[   36.085842]  fff00000c6158880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.086898]  fff00000c6158900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.087766] ==================================================================

test log snippet boot parser 39

Home

[   36.099489] ==================================================================
[   36.100868] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   36.101559] Write of size 8 at addr fff00000c6192a71 by task kunit_try_catch/164
[   36.102253] 
[   36.102594] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   36.104908] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.105985] Hardware name: linux,dummy-virt (DT)
[   36.107677] Call trace:
[   36.108351]  show_stack+0x20/0x38 (C)
[   36.108870]  dump_stack_lvl+0x8c/0xd0
[   36.109716]  print_report+0x118/0x5e0
[   36.110389]  kasan_report+0xc8/0x118
[   36.111945]  kasan_check_range+0x100/0x1a8
[   36.112724]  __asan_memset+0x34/0x78
[   36.113512]  kmalloc_oob_memset_8+0x150/0x2f8
[   36.114230]  kunit_try_run_case+0x14c/0x3d0
[   36.115465]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.116480]  kthread+0x24c/0x2d0
[   36.117285]  ret_from_fork+0x10/0x20
[   36.118076] 
[   36.118657] Allocated by task 164:
[   36.119735]  kasan_save_stack+0x3c/0x68
[   36.120674]  kasan_save_track+0x20/0x40
[   36.121576]  kasan_save_alloc_info+0x40/0x58
[   36.122380]  __kasan_kmalloc+0xd4/0xd8
[   36.123001]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.123823]  kmalloc_oob_memset_8+0xb0/0x2f8
[   36.124587]  kunit_try_run_case+0x14c/0x3d0
[   36.125175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.126089]  kthread+0x24c/0x2d0
[   36.126776]  ret_from_fork+0x10/0x20
[   36.127585] 
[   36.128006] The buggy address belongs to the object at fff00000c6192a00
[   36.128006]  which belongs to the cache kmalloc-128 of size 128
[   36.129870] The buggy address is located 113 bytes inside of
[   36.129870]  allocated 120-byte region [fff00000c6192a00, fff00000c6192a78)
[   36.131651] 
[   36.131949] The buggy address belongs to the physical page:
[   36.133121] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106192
[   36.134081] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.135617] page_type: f5(slab)
[   36.136131] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.137474] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.138455] page dumped because: kasan: bad access detected
[   36.139011] 
[   36.139322] Memory state around the buggy address:
[   36.140329]  fff00000c6192900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   36.141261]  fff00000c6192980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.142730] >fff00000c6192a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.143693]                                                                 ^
[   36.144389]  fff00000c6192a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.145822]  fff00000c6192b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.147066] ==================================================================

test log snippet boot parser 40

Home

[   34.210693] ==================================================================
[   34.212734] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   34.215629] Write of size 1 at addr fff00000c6166573 by task kunit_try_catch/124
[   34.216968] 
[   34.218577] CPU: 0 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G                 N 6.13.0-rc7 #1
[   34.220204] Tainted: [N]=TEST
[   34.220780] Hardware name: linux,dummy-virt (DT)
[   34.222041] Call trace:
[   34.222809]  show_stack+0x20/0x38 (C)
[   34.223910]  dump_stack_lvl+0x8c/0xd0
[   34.224549]  print_report+0x118/0x5e0
[   34.225151]  kasan_report+0xc8/0x118
[   34.225705]  __asan_report_store1_noabort+0x20/0x30
[   34.226534]  kmalloc_oob_right+0x5a4/0x660
[   34.227665]  kunit_try_run_case+0x14c/0x3d0
[   34.228320]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.229093]  kthread+0x24c/0x2d0
[   34.229577]  ret_from_fork+0x10/0x20
[   34.230407] 
[   34.231510] Allocated by task 124:
[   34.232383]  kasan_save_stack+0x3c/0x68
[   34.233096]  kasan_save_track+0x20/0x40
[   34.233582]  kasan_save_alloc_info+0x40/0x58
[   34.234613]  __kasan_kmalloc+0xd4/0xd8
[   34.235619]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.236740]  kmalloc_oob_right+0xb0/0x660
[   34.237471]  kunit_try_run_case+0x14c/0x3d0
[   34.237849]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.238200]  kthread+0x24c/0x2d0
[   34.238461]  ret_from_fork+0x10/0x20
[   34.239879] 
[   34.240330] The buggy address belongs to the object at fff00000c6166500
[   34.240330]  which belongs to the cache kmalloc-128 of size 128
[   34.241928] The buggy address is located 0 bytes to the right of
[   34.241928]  allocated 115-byte region [fff00000c6166500, fff00000c6166573)
[   34.244564] 
[   34.245158] The buggy address belongs to the physical page:
[   34.246538] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106166
[   34.248248] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.249871] page_type: f5(slab)
[   34.251274] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.252409] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   34.253272] page dumped because: kasan: bad access detected
[   34.253915] 
[   34.254348] Memory state around the buggy address:
[   34.255902]  fff00000c6166400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   34.257160]  fff00000c6166480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.258616] >fff00000c6166500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   34.260593]                                                              ^
[   34.261577]  fff00000c6166580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.262387]  fff00000c6166600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.263818] ==================================================================

test log snippet boot parser 41

Home

[   34.268198] ==================================================================
[   34.269904] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   34.270769] Write of size 1 at addr fff00000c6166578 by task kunit_try_catch/124
[   34.272438] 
[   34.272836] CPU: 0 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   34.274513] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.276229] Hardware name: linux,dummy-virt (DT)
[   34.276828] Call trace:
[   34.277282]  show_stack+0x20/0x38 (C)
[   34.278011]  dump_stack_lvl+0x8c/0xd0
[   34.278541]  print_report+0x118/0x5e0
[   34.279329]  kasan_report+0xc8/0x118
[   34.280445]  __asan_report_store1_noabort+0x20/0x30
[   34.281211]  kmalloc_oob_right+0x538/0x660
[   34.281864]  kunit_try_run_case+0x14c/0x3d0
[   34.282443]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.283734]  kthread+0x24c/0x2d0
[   34.284297]  ret_from_fork+0x10/0x20
[   34.284889] 
[   34.285253] Allocated by task 124:
[   34.286266]  kasan_save_stack+0x3c/0x68
[   34.286844]  kasan_save_track+0x20/0x40
[   34.287538]  kasan_save_alloc_info+0x40/0x58
[   34.288148]  __kasan_kmalloc+0xd4/0xd8
[   34.288805]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.289817]  kmalloc_oob_right+0xb0/0x660
[   34.290573]  kunit_try_run_case+0x14c/0x3d0
[   34.291831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.292546]  kthread+0x24c/0x2d0
[   34.292943]  ret_from_fork+0x10/0x20
[   34.293350] 
[   34.293745] The buggy address belongs to the object at fff00000c6166500
[   34.293745]  which belongs to the cache kmalloc-128 of size 128
[   34.296062] The buggy address is located 5 bytes to the right of
[   34.296062]  allocated 115-byte region [fff00000c6166500, fff00000c6166573)
[   34.297827] 
[   34.298256] The buggy address belongs to the physical page:
[   34.299070] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106166
[   34.300601] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.301433] page_type: f5(slab)
[   34.302089] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.303279] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   34.304216] page dumped because: kasan: bad access detected
[   34.304926] 
[   34.305318] Memory state around the buggy address:
[   34.306124]  fff00000c6166400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.307237]  fff00000c6166480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.307976] >fff00000c6166500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   34.308813]                                                                 ^
[   34.309984]  fff00000c6166580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.310734]  fff00000c6166600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.312269] ==================================================================

test log snippet boot parser 42

Home

[   34.316273] ==================================================================
[   34.317195] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   34.318497] Read of size 1 at addr fff00000c6166580 by task kunit_try_catch/124
[   34.320153] 
[   34.320758] CPU: 0 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   34.321908] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.322467] Hardware name: linux,dummy-virt (DT)
[   34.323866] Call trace:
[   34.324322]  show_stack+0x20/0x38 (C)
[   34.324964]  dump_stack_lvl+0x8c/0xd0
[   34.325658]  print_report+0x118/0x5e0
[   34.326273]  kasan_report+0xc8/0x118
[   34.327395]  __asan_report_load1_noabort+0x20/0x30
[   34.328150]  kmalloc_oob_right+0x5d0/0x660
[   34.328802]  kunit_try_run_case+0x14c/0x3d0
[   34.329402]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.330375]  kthread+0x24c/0x2d0
[   34.331346]  ret_from_fork+0x10/0x20
[   34.332073] 
[   34.332538] Allocated by task 124:
[   34.333190]  kasan_save_stack+0x3c/0x68
[   34.333920]  kasan_save_track+0x20/0x40
[   34.334598]  kasan_save_alloc_info+0x40/0x58
[   34.335314]  __kasan_kmalloc+0xd4/0xd8
[   34.337135]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.338736]  kmalloc_oob_right+0xb0/0x660
[   34.339808]  kunit_try_run_case+0x14c/0x3d0
[   34.340704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.341503]  kthread+0x24c/0x2d0
[   34.342072]  ret_from_fork+0x10/0x20
[   34.342572] 
[   34.342980] The buggy address belongs to the object at fff00000c6166500
[   34.342980]  which belongs to the cache kmalloc-128 of size 128
[   34.344915] The buggy address is located 13 bytes to the right of
[   34.344915]  allocated 115-byte region [fff00000c6166500, fff00000c6166573)
[   34.346360] 
[   34.347300] The buggy address belongs to the physical page:
[   34.348150] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106166
[   34.349129] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.350053] page_type: f5(slab)
[   34.350698] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.352128] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   34.352954] page dumped because: kasan: bad access detected
[   34.353311] 
[   34.353505] Memory state around the buggy address:
[   34.354317]  fff00000c6166480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.355605]  fff00000c6166500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   34.356667] >fff00000c6166580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.357664]                    ^
[   34.358300]  fff00000c6166600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.359838]  fff00000c6166680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.360813] ==================================================================

test log snippet boot parser 43

Home

[   34.512385] ==================================================================
[   34.513944] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x414/0x490
[   34.515327] Write of size 1 at addr fff00000c61c1678 by task kunit_try_catch/130
[   34.517639] 
[   34.518361] CPU: 1 UID: 0 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   34.520238] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.521598] Hardware name: linux,dummy-virt (DT)
[   34.522348] Call trace:
[   34.522757]  show_stack+0x20/0x38 (C)
[   34.523695]  dump_stack_lvl+0x8c/0xd0
[   34.524277]  print_report+0x118/0x5e0
[   34.525660]  kasan_report+0xc8/0x118
[   34.526413]  __asan_report_store1_noabort+0x20/0x30
[   34.527749]  kmalloc_track_caller_oob_right+0x414/0x490
[   34.529001]  kunit_try_run_case+0x14c/0x3d0
[   34.529970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.530817]  kthread+0x24c/0x2d0
[   34.532141]  ret_from_fork+0x10/0x20
[   34.533106] 
[   34.533447] Allocated by task 130:
[   34.533890]  kasan_save_stack+0x3c/0x68
[   34.534395]  kasan_save_track+0x20/0x40
[   34.535087]  kasan_save_alloc_info+0x40/0x58
[   34.535939]  __kasan_kmalloc+0xd4/0xd8
[   34.536493]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   34.538048]  kmalloc_track_caller_oob_right+0xa8/0x490
[   34.538676]  kunit_try_run_case+0x14c/0x3d0
[   34.539996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.540622]  kthread+0x24c/0x2d0
[   34.541224]  ret_from_fork+0x10/0x20
[   34.542273] 
[   34.542616] The buggy address belongs to the object at fff00000c61c1600
[   34.542616]  which belongs to the cache kmalloc-128 of size 128
[   34.543950] The buggy address is located 0 bytes to the right of
[   34.543950]  allocated 120-byte region [fff00000c61c1600, fff00000c61c1678)
[   34.545873] 
[   34.546358] The buggy address belongs to the physical page:
[   34.547711] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061c1
[   34.548743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.549694] page_type: f5(slab)
[   34.550285] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.551177] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   34.552575] page dumped because: kasan: bad access detected
[   34.553620] 
[   34.553992] Memory state around the buggy address:
[   34.554667]  fff00000c61c1500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   34.556549]  fff00000c61c1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.557609] >fff00000c61c1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.558556]                                                                 ^
[   34.560056]  fff00000c61c1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.561020]  fff00000c61c1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.562038] ==================================================================

test log snippet boot parser 44

Home

[   37.213303] ==================================================================
[   37.214671] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x33c/0x428
[   37.215960] Read of size 1 at addr fff00000c61c80c8 by task kunit_try_catch/195
[   37.216826] 
[   37.218553] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   37.221232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.221775] Hardware name: linux,dummy-virt (DT)
[   37.222428] Call trace:
[   37.222737]  show_stack+0x20/0x38 (C)
[   37.223716]  dump_stack_lvl+0x8c/0xd0
[   37.224584]  print_report+0x118/0x5e0
[   37.225615]  kasan_report+0xc8/0x118
[   37.226380]  __asan_report_load1_noabort+0x20/0x30
[   37.227217]  kmem_cache_oob+0x33c/0x428
[   37.228256]  kunit_try_run_case+0x14c/0x3d0
[   37.229626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.230215]  kthread+0x24c/0x2d0
[   37.230644]  ret_from_fork+0x10/0x20
[   37.231830] 
[   37.232222] Allocated by task 195:
[   37.232674]  kasan_save_stack+0x3c/0x68
[   37.233262]  kasan_save_track+0x20/0x40
[   37.234110]  kasan_save_alloc_info+0x40/0x58
[   37.234959]  __kasan_slab_alloc+0xa8/0xb0
[   37.236736]  kmem_cache_alloc_noprof+0x108/0x398
[   37.237253]  kmem_cache_oob+0x12c/0x428
[   37.237622]  kunit_try_run_case+0x14c/0x3d0
[   37.237950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.238305]  kthread+0x24c/0x2d0
[   37.238685]  ret_from_fork+0x10/0x20
[   37.241065] 
[   37.241651] The buggy address belongs to the object at fff00000c61c8000
[   37.241651]  which belongs to the cache test_cache of size 200
[   37.243212] The buggy address is located 0 bytes to the right of
[   37.243212]  allocated 200-byte region [fff00000c61c8000, fff00000c61c80c8)
[   37.244981] 
[   37.245342] The buggy address belongs to the physical page:
[   37.246372] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061c8
[   37.247654] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.248664] page_type: f5(slab)
[   37.249163] raw: 0bfffe0000000000 fff00000c1763500 dead000000000122 0000000000000000
[   37.250199] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   37.251167] page dumped because: kasan: bad access detected
[   37.252169] 
[   37.252678] Memory state around the buggy address:
[   37.253570]  fff00000c61c7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.254697]  fff00000c61c8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.256880] >fff00000c61c8080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   37.258003]                                               ^
[   37.259032]  fff00000c61c8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.260004]  fff00000c61c8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.260629] ==================================================================

test log snippet boot parser 45

Home

[   35.464340] ==================================================================
[   35.465554] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   35.466274] Write of size 1 at addr fff00000c69120d0 by task kunit_try_catch/150
[   35.468390] 
[   35.468776] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   35.470348] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.470895] Hardware name: linux,dummy-virt (DT)
[   35.472642] Call trace:
[   35.473156]  show_stack+0x20/0x38 (C)
[   35.473792]  dump_stack_lvl+0x8c/0xd0
[   35.474282]  print_report+0x118/0x5e0
[   35.475157]  kasan_report+0xc8/0x118
[   35.475693]  __asan_report_store1_noabort+0x20/0x30
[   35.476439]  krealloc_less_oob_helper+0xb9c/0xc50
[   35.477793]  krealloc_large_less_oob+0x20/0x38
[   35.478391]  kunit_try_run_case+0x14c/0x3d0
[   35.480434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.481643]  kthread+0x24c/0x2d0
[   35.482234]  ret_from_fork+0x10/0x20
[   35.483123] 
[   35.483872] The buggy address belongs to the physical page:
[   35.484986] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106910
[   35.486270] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.487315] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.488553] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.489261] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.490259] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.491312] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.492830] head: 0bfffe0000000002 ffffc1ffc31a4401 ffffffffffffffff 0000000000000000
[   35.494107] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   35.496264] page dumped because: kasan: bad access detected
[   35.497359] 
[   35.497865] Memory state around the buggy address:
[   35.498998]  fff00000c6911f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.499933]  fff00000c6912000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.500791] >fff00000c6912080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   35.501896]                                                  ^
[   35.502635]  fff00000c6912100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.503855]  fff00000c6912180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.505703] ==================================================================

test log snippet boot parser 46

Home

[   35.062252] ==================================================================
[   35.063326] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   35.064509] Write of size 1 at addr fff00000c1dfd8d0 by task kunit_try_catch/146
[   35.066975] 
[   35.067377] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   35.069096] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.069644] Hardware name: linux,dummy-virt (DT)
[   35.070356] Call trace:
[   35.070743]  show_stack+0x20/0x38 (C)
[   35.072595]  dump_stack_lvl+0x8c/0xd0
[   35.073176]  print_report+0x118/0x5e0
[   35.073660]  kasan_report+0xc8/0x118
[   35.074401]  __asan_report_store1_noabort+0x20/0x30
[   35.075265]  krealloc_less_oob_helper+0xb9c/0xc50
[   35.076117]  krealloc_less_oob+0x20/0x38
[   35.077562]  kunit_try_run_case+0x14c/0x3d0
[   35.078492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.079688]  kthread+0x24c/0x2d0
[   35.080703]  ret_from_fork+0x10/0x20
[   35.081108] 
[   35.081284] Allocated by task 146:
[   35.081700]  kasan_save_stack+0x3c/0x68
[   35.083132]  kasan_save_track+0x20/0x40
[   35.084183]  kasan_save_alloc_info+0x40/0x58
[   35.084955]  __kasan_krealloc+0x118/0x178
[   35.085693]  krealloc_noprof+0x128/0x360
[   35.086457]  krealloc_less_oob_helper+0x168/0xc50
[   35.087443]  krealloc_less_oob+0x20/0x38
[   35.088000]  kunit_try_run_case+0x14c/0x3d0
[   35.089250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.090492]  kthread+0x24c/0x2d0
[   35.090972]  ret_from_fork+0x10/0x20
[   35.091907] 
[   35.092219] The buggy address belongs to the object at fff00000c1dfd800
[   35.092219]  which belongs to the cache kmalloc-256 of size 256
[   35.094478] The buggy address is located 7 bytes to the right of
[   35.094478]  allocated 201-byte region [fff00000c1dfd800, fff00000c1dfd8c9)
[   35.096703] 
[   35.097243] The buggy address belongs to the physical page:
[   35.098184] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101dfc
[   35.099986] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.100969] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.101856] page_type: f5(slab)
[   35.102420] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   35.104097] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   35.106211] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   35.107112] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   35.108317] head: 0bfffe0000000001 ffffc1ffc3077f01 ffffffffffffffff 0000000000000000
[   35.110058] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   35.111418] page dumped because: kasan: bad access detected
[   35.112039] 
[   35.113671] Memory state around the buggy address:
[   35.114235]  fff00000c1dfd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.115725]  fff00000c1dfd800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.116845] >fff00000c1dfd880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   35.118079]                                                  ^
[   35.119239]  fff00000c1dfd900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.121308]  fff00000c1dfd980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.122212] ==================================================================

test log snippet boot parser 47

Home

[   35.423955] ==================================================================
[   35.425180] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   35.426018] Write of size 1 at addr fff00000c69120c9 by task kunit_try_catch/150
[   35.426956] 
[   35.427361] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   35.430065] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.430999] Hardware name: linux,dummy-virt (DT)
[   35.431961] Call trace:
[   35.432388]  show_stack+0x20/0x38 (C)
[   35.432965]  dump_stack_lvl+0x8c/0xd0
[   35.433799]  print_report+0x118/0x5e0
[   35.434334]  kasan_report+0xc8/0x118
[   35.434815]  __asan_report_store1_noabort+0x20/0x30
[   35.436107]  krealloc_less_oob_helper+0xa48/0xc50
[   35.436972]  krealloc_large_less_oob+0x20/0x38
[   35.437447]  kunit_try_run_case+0x14c/0x3d0
[   35.438386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.439311]  kthread+0x24c/0x2d0
[   35.440435]  ret_from_fork+0x10/0x20
[   35.441140] 
[   35.441402] The buggy address belongs to the physical page:
[   35.442109] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106910
[   35.443616] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.444861] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.445505] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.446658] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.447688] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.448656] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.450634] head: 0bfffe0000000002 ffffc1ffc31a4401 ffffffffffffffff 0000000000000000
[   35.451749] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   35.453096] page dumped because: kasan: bad access detected
[   35.453919] 
[   35.454270] Memory state around the buggy address:
[   35.454932]  fff00000c6911f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.456416]  fff00000c6912000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.457143] >fff00000c6912080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   35.458252]                                               ^
[   35.459296]  fff00000c6912100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.460208]  fff00000c6912180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.461087] ==================================================================

test log snippet boot parser 48

Home

[   35.183782] ==================================================================
[   35.184875] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   35.185586] Write of size 1 at addr fff00000c1dfd8ea by task kunit_try_catch/146
[   35.186612] 
[   35.187053] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   35.187939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.189326] Hardware name: linux,dummy-virt (DT)
[   35.190643] Call trace:
[   35.192042]  show_stack+0x20/0x38 (C)
[   35.192588]  dump_stack_lvl+0x8c/0xd0
[   35.193023]  print_report+0x118/0x5e0
[   35.194106]  kasan_report+0xc8/0x118
[   35.195095]  __asan_report_store1_noabort+0x20/0x30
[   35.196271]  krealloc_less_oob_helper+0xae4/0xc50
[   35.197615]  krealloc_less_oob+0x20/0x38
[   35.198512]  kunit_try_run_case+0x14c/0x3d0
[   35.199140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.200235]  kthread+0x24c/0x2d0
[   35.201095]  ret_from_fork+0x10/0x20
[   35.202063] 
[   35.203039] Allocated by task 146:
[   35.204433]  kasan_save_stack+0x3c/0x68
[   35.205077]  kasan_save_track+0x20/0x40
[   35.205749]  kasan_save_alloc_info+0x40/0x58
[   35.206355]  __kasan_krealloc+0x118/0x178
[   35.207099]  krealloc_noprof+0x128/0x360
[   35.207817]  krealloc_less_oob_helper+0x168/0xc50
[   35.208847]  krealloc_less_oob+0x20/0x38
[   35.209655]  kunit_try_run_case+0x14c/0x3d0
[   35.210510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.211898]  kthread+0x24c/0x2d0
[   35.212684]  ret_from_fork+0x10/0x20
[   35.213957] 
[   35.214399] The buggy address belongs to the object at fff00000c1dfd800
[   35.214399]  which belongs to the cache kmalloc-256 of size 256
[   35.216441] The buggy address is located 33 bytes to the right of
[   35.216441]  allocated 201-byte region [fff00000c1dfd800, fff00000c1dfd8c9)
[   35.219323] 
[   35.219698] The buggy address belongs to the physical page:
[   35.220840] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101dfc
[   35.222620] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.223299] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.224445] page_type: f5(slab)
[   35.225285] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   35.226126] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   35.227340] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   35.229022] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   35.230219] head: 0bfffe0000000001 ffffc1ffc3077f01 ffffffffffffffff 0000000000000000
[   35.232188] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   35.233970] page dumped because: kasan: bad access detected
[   35.235969] 
[   35.237106] Memory state around the buggy address:
[   35.238099]  fff00000c1dfd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.239745]  fff00000c1dfd800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.241082] >fff00000c1dfd880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   35.242015]                                                           ^
[   35.243883]  fff00000c1dfd900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.245054]  fff00000c1dfd980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.246057] ==================================================================

test log snippet boot parser 49

Home

[   35.508531] ==================================================================
[   35.509473] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   35.510462] Write of size 1 at addr fff00000c69120da by task kunit_try_catch/150
[   35.511899] 
[   35.513336] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   35.514553] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.515540] Hardware name: linux,dummy-virt (DT)
[   35.516769] Call trace:
[   35.517167]  show_stack+0x20/0x38 (C)
[   35.517792]  dump_stack_lvl+0x8c/0xd0
[   35.518459]  print_report+0x118/0x5e0
[   35.519539]  kasan_report+0xc8/0x118
[   35.520688]  __asan_report_store1_noabort+0x20/0x30
[   35.521959]  krealloc_less_oob_helper+0xa80/0xc50
[   35.522675]  krealloc_large_less_oob+0x20/0x38
[   35.523628]  kunit_try_run_case+0x14c/0x3d0
[   35.524204]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.525674]  kthread+0x24c/0x2d0
[   35.526469]  ret_from_fork+0x10/0x20
[   35.527074] 
[   35.528544] The buggy address belongs to the physical page:
[   35.529341] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106910
[   35.530624] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.532351] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.533608] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.534661] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.536444] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.537970] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.539538] head: 0bfffe0000000002 ffffc1ffc31a4401 ffffffffffffffff 0000000000000000
[   35.540856] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   35.542054] page dumped because: kasan: bad access detected
[   35.543568] 
[   35.544097] Memory state around the buggy address:
[   35.544629]  fff00000c6911f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.545245]  fff00000c6912000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.546552] >fff00000c6912080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   35.547696]                                                     ^
[   35.548769]  fff00000c6912100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.550180]  fff00000c6912180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.551611] ==================================================================

test log snippet boot parser 50

Home

[   35.248884] ==================================================================
[   35.249705] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   35.250638] Write of size 1 at addr fff00000c1dfd8eb by task kunit_try_catch/146
[   35.253229] 
[   35.253984] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   35.255188] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.256203] Hardware name: linux,dummy-virt (DT)
[   35.257229] Call trace:
[   35.257678]  show_stack+0x20/0x38 (C)
[   35.258467]  dump_stack_lvl+0x8c/0xd0
[   35.259738]  print_report+0x118/0x5e0
[   35.260464]  kasan_report+0xc8/0x118
[   35.261251]  __asan_report_store1_noabort+0x20/0x30
[   35.262152]  krealloc_less_oob_helper+0xa58/0xc50
[   35.262864]  krealloc_less_oob+0x20/0x38
[   35.263443]  kunit_try_run_case+0x14c/0x3d0
[   35.264703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.265255]  kthread+0x24c/0x2d0
[   35.265941]  ret_from_fork+0x10/0x20
[   35.266818] 
[   35.267172] Allocated by task 146:
[   35.268319]  kasan_save_stack+0x3c/0x68
[   35.268892]  kasan_save_track+0x20/0x40
[   35.269714]  kasan_save_alloc_info+0x40/0x58
[   35.270316]  __kasan_krealloc+0x118/0x178
[   35.271554]  krealloc_noprof+0x128/0x360
[   35.272937]  krealloc_less_oob_helper+0x168/0xc50
[   35.273346]  krealloc_less_oob+0x20/0x38
[   35.274266]  kunit_try_run_case+0x14c/0x3d0
[   35.275653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.277635]  kthread+0x24c/0x2d0
[   35.278284]  ret_from_fork+0x10/0x20
[   35.278925] 
[   35.280013] The buggy address belongs to the object at fff00000c1dfd800
[   35.280013]  which belongs to the cache kmalloc-256 of size 256
[   35.283280] The buggy address is located 34 bytes to the right of
[   35.283280]  allocated 201-byte region [fff00000c1dfd800, fff00000c1dfd8c9)
[   35.284862] 
[   35.285269] The buggy address belongs to the physical page:
[   35.286239] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101dfc
[   35.287128] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.288567] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.289873] page_type: f5(slab)
[   35.290591] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   35.291997] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   35.292683] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   35.293139] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   35.293680] head: 0bfffe0000000001 ffffc1ffc3077f01 ffffffffffffffff 0000000000000000
[   35.295292] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   35.296376] page dumped because: kasan: bad access detected
[   35.297571] 
[   35.297880] Memory state around the buggy address:
[   35.298792]  fff00000c1dfd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.300832]  fff00000c1dfd800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.301830] >fff00000c1dfd880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   35.303424]                                                           ^
[   35.304301]  fff00000c1dfd900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.305137]  fff00000c1dfd980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.306061] ==================================================================

test log snippet boot parser 51

Home

[   35.602325] ==================================================================
[   35.603221] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   35.605169] Write of size 1 at addr fff00000c69120eb by task kunit_try_catch/150
[   35.607031] 
[   35.607381] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   35.608230] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.608601] Hardware name: linux,dummy-virt (DT)
[   35.609763] Call trace:
[   35.610448]  show_stack+0x20/0x38 (C)
[   35.611763]  dump_stack_lvl+0x8c/0xd0
[   35.612426]  print_report+0x118/0x5e0
[   35.612914]  kasan_report+0xc8/0x118
[   35.613572]  __asan_report_store1_noabort+0x20/0x30
[   35.614481]  krealloc_less_oob_helper+0xa58/0xc50
[   35.615149]  krealloc_large_less_oob+0x20/0x38
[   35.616576]  kunit_try_run_case+0x14c/0x3d0
[   35.617454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.618263]  kthread+0x24c/0x2d0
[   35.618935]  ret_from_fork+0x10/0x20
[   35.619506] 
[   35.620020] The buggy address belongs to the physical page:
[   35.620487] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106910
[   35.621741] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.622558] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.623807] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.625182] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.626210] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.627472] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.628403] head: 0bfffe0000000002 ffffc1ffc31a4401 ffffffffffffffff 0000000000000000
[   35.629752] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   35.630772] page dumped because: kasan: bad access detected
[   35.631308] 
[   35.631777] Memory state around the buggy address:
[   35.633314]  fff00000c6911f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.634131]  fff00000c6912000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.636209] >fff00000c6912080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   35.637149]                                                           ^
[   35.638326]  fff00000c6912100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.639707]  fff00000c6912180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.640539] ==================================================================

test log snippet boot parser 52

Home

[   35.554758] ==================================================================
[   35.555565] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   35.556395] Write of size 1 at addr fff00000c69120ea by task kunit_try_catch/150
[   35.559663] 
[   35.560091] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   35.561243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.562045] Hardware name: linux,dummy-virt (DT)
[   35.562725] Call trace:
[   35.563646]  show_stack+0x20/0x38 (C)
[   35.565015]  dump_stack_lvl+0x8c/0xd0
[   35.565590]  print_report+0x118/0x5e0
[   35.566424]  kasan_report+0xc8/0x118
[   35.567647]  __asan_report_store1_noabort+0x20/0x30
[   35.569221]  krealloc_less_oob_helper+0xae4/0xc50
[   35.569986]  krealloc_large_less_oob+0x20/0x38
[   35.570716]  kunit_try_run_case+0x14c/0x3d0
[   35.571704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.573046]  kthread+0x24c/0x2d0
[   35.573623]  ret_from_fork+0x10/0x20
[   35.574333] 
[   35.574710] The buggy address belongs to the physical page:
[   35.575882] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106910
[   35.578263] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.579420] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.580970] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.582120] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.583199] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.584922] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.586344] head: 0bfffe0000000002 ffffc1ffc31a4401 ffffffffffffffff 0000000000000000
[   35.588129] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   35.588969] page dumped because: kasan: bad access detected
[   35.589775] 
[   35.590226] Memory state around the buggy address:
[   35.591250]  fff00000c6911f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.592930]  fff00000c6912000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.593973] >fff00000c6912080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   35.595159]                                                           ^
[   35.596761]  fff00000c6912100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.597881]  fff00000c6912180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.599580] ==================================================================

test log snippet boot parser 53

Home

[   35.004261] ==================================================================
[   35.005845] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   35.007050] Write of size 1 at addr fff00000c1dfd8c9 by task kunit_try_catch/146
[   35.008745] 
[   35.009313] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   35.011226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.011947] Hardware name: linux,dummy-virt (DT)
[   35.012615] Call trace:
[   35.012967]  show_stack+0x20/0x38 (C)
[   35.013820]  dump_stack_lvl+0x8c/0xd0
[   35.014398]  print_report+0x118/0x5e0
[   35.015501]  kasan_report+0xc8/0x118
[   35.016255]  __asan_report_store1_noabort+0x20/0x30
[   35.016842]  krealloc_less_oob_helper+0xa48/0xc50
[   35.017452]  krealloc_less_oob+0x20/0x38
[   35.018310]  kunit_try_run_case+0x14c/0x3d0
[   35.019818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.020762]  kthread+0x24c/0x2d0
[   35.021283]  ret_from_fork+0x10/0x20
[   35.021725] 
[   35.022261] Allocated by task 146:
[   35.023166]  kasan_save_stack+0x3c/0x68
[   35.024149]  kasan_save_track+0x20/0x40
[   35.024634]  kasan_save_alloc_info+0x40/0x58
[   35.026108]  __kasan_krealloc+0x118/0x178
[   35.026926]  krealloc_noprof+0x128/0x360
[   35.027871]  krealloc_less_oob_helper+0x168/0xc50
[   35.028912]  krealloc_less_oob+0x20/0x38
[   35.030213]  kunit_try_run_case+0x14c/0x3d0
[   35.031061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.032237]  kthread+0x24c/0x2d0
[   35.032783]  ret_from_fork+0x10/0x20
[   35.033847] 
[   35.034098] The buggy address belongs to the object at fff00000c1dfd800
[   35.034098]  which belongs to the cache kmalloc-256 of size 256
[   35.036286] The buggy address is located 0 bytes to the right of
[   35.036286]  allocated 201-byte region [fff00000c1dfd800, fff00000c1dfd8c9)
[   35.037776] 
[   35.038269] The buggy address belongs to the physical page:
[   35.038893] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101dfc
[   35.040074] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.041387] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.042097] page_type: f5(slab)
[   35.042491] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   35.044080] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   35.045093] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   35.046942] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   35.048397] head: 0bfffe0000000001 ffffc1ffc3077f01 ffffffffffffffff 0000000000000000
[   35.049699] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   35.050581] page dumped because: kasan: bad access detected
[   35.051247] 
[   35.051788] Memory state around the buggy address:
[   35.052450]  fff00000c1dfd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.053588]  fff00000c1dfd800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.055449] >fff00000c1dfd880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   35.056945]                                               ^
[   35.058059]  fff00000c1dfd900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.058922]  fff00000c1dfd980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.060596] ==================================================================

test log snippet boot parser 54

Home

[   35.125191] ==================================================================
[   35.126164] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   35.127404] Write of size 1 at addr fff00000c1dfd8da by task kunit_try_catch/146
[   35.128077] 
[   35.128551] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   35.130069] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.132014] Hardware name: linux,dummy-virt (DT)
[   35.132732] Call trace:
[   35.133157]  show_stack+0x20/0x38 (C)
[   35.133809]  dump_stack_lvl+0x8c/0xd0
[   35.134567]  print_report+0x118/0x5e0
[   35.135191]  kasan_report+0xc8/0x118
[   35.135798]  __asan_report_store1_noabort+0x20/0x30
[   35.137811]  krealloc_less_oob_helper+0xa80/0xc50
[   35.138425]  krealloc_less_oob+0x20/0x38
[   35.139280]  kunit_try_run_case+0x14c/0x3d0
[   35.140822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.141843]  kthread+0x24c/0x2d0
[   35.142347]  ret_from_fork+0x10/0x20
[   35.143951] 
[   35.144569] Allocated by task 146:
[   35.145028]  kasan_save_stack+0x3c/0x68
[   35.145899]  kasan_save_track+0x20/0x40
[   35.146399]  kasan_save_alloc_info+0x40/0x58
[   35.147332]  __kasan_krealloc+0x118/0x178
[   35.148339]  krealloc_noprof+0x128/0x360
[   35.149061]  krealloc_less_oob_helper+0x168/0xc50
[   35.149810]  krealloc_less_oob+0x20/0x38
[   35.150664]  kunit_try_run_case+0x14c/0x3d0
[   35.151436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.152932]  kthread+0x24c/0x2d0
[   35.153618]  ret_from_fork+0x10/0x20
[   35.154667] 
[   35.155078] The buggy address belongs to the object at fff00000c1dfd800
[   35.155078]  which belongs to the cache kmalloc-256 of size 256
[   35.157169] The buggy address is located 17 bytes to the right of
[   35.157169]  allocated 201-byte region [fff00000c1dfd800, fff00000c1dfd8c9)
[   35.159190] 
[   35.159969] The buggy address belongs to the physical page:
[   35.160687] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101dfc
[   35.161825] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.162697] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.164154] page_type: f5(slab)
[   35.164786] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   35.165776] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   35.166733] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   35.167812] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   35.169590] head: 0bfffe0000000001 ffffc1ffc3077f01 ffffffffffffffff 0000000000000000
[   35.170271] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   35.171509] page dumped because: kasan: bad access detected
[   35.172356] 
[   35.172854] Memory state around the buggy address:
[   35.173495]  fff00000c1dfd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.174742]  fff00000c1dfd800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.176396] >fff00000c1dfd880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   35.177768]                                                     ^
[   35.178538]  fff00000c1dfd900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.180313]  fff00000c1dfd980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.181340] ==================================================================

test log snippet boot parser 55

Home

[   35.362935] ==================================================================
[   35.364693] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[   35.365970] Write of size 1 at addr fff00000c68a60f0 by task kunit_try_catch/148
[   35.368345] 
[   35.368749] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   35.370247] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.371588] Hardware name: linux,dummy-virt (DT)
[   35.372309] Call trace:
[   35.372844]  show_stack+0x20/0x38 (C)
[   35.373459]  dump_stack_lvl+0x8c/0xd0
[   35.374186]  print_report+0x118/0x5e0
[   35.374789]  kasan_report+0xc8/0x118
[   35.375643]  __asan_report_store1_noabort+0x20/0x30
[   35.376845]  krealloc_more_oob_helper+0x5c8/0x680
[   35.377590]  krealloc_large_more_oob+0x20/0x38
[   35.378241]  kunit_try_run_case+0x14c/0x3d0
[   35.379403]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.380211]  kthread+0x24c/0x2d0
[   35.380726]  ret_from_fork+0x10/0x20
[   35.381946] 
[   35.382553] The buggy address belongs to the physical page:
[   35.384080] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068a4
[   35.386200] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.388149] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.389900] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.390975] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.393078] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.394440] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.396767] head: 0bfffe0000000002 ffffc1ffc31a2901 ffffffffffffffff 0000000000000000
[   35.398244] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   35.400085] page dumped because: kasan: bad access detected
[   35.400830] 
[   35.402300] Memory state around the buggy address:
[   35.403471]  fff00000c68a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.404764]  fff00000c68a6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.405936] >fff00000c68a6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   35.407233]                                                              ^
[   35.409038]  fff00000c68a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.410680]  fff00000c68a6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.412103] ==================================================================

test log snippet boot parser 56

Home

[   34.936288] ==================================================================
[   34.937834] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[   34.939741] Write of size 1 at addr fff00000c47c84f0 by task kunit_try_catch/144
[   34.940627] 
[   34.941026] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   34.942185] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.942841] Hardware name: linux,dummy-virt (DT)
[   34.943891] Call trace:
[   34.944471]  show_stack+0x20/0x38 (C)
[   34.945118]  dump_stack_lvl+0x8c/0xd0
[   34.945725]  print_report+0x118/0x5e0
[   34.946295]  kasan_report+0xc8/0x118
[   34.947362]  __asan_report_store1_noabort+0x20/0x30
[   34.948076]  krealloc_more_oob_helper+0x5c8/0x680
[   34.948879]  krealloc_more_oob+0x20/0x38
[   34.949397]  kunit_try_run_case+0x14c/0x3d0
[   34.950210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.951002]  kthread+0x24c/0x2d0
[   34.951727]  ret_from_fork+0x10/0x20
[   34.952799] 
[   34.953180] Allocated by task 144:
[   34.953700]  kasan_save_stack+0x3c/0x68
[   34.954543]  kasan_save_track+0x20/0x40
[   34.955231]  kasan_save_alloc_info+0x40/0x58
[   34.956313]  __kasan_krealloc+0x118/0x178
[   34.957254]  krealloc_noprof+0x128/0x360
[   34.957794]  krealloc_more_oob_helper+0x168/0x680
[   34.959110]  krealloc_more_oob+0x20/0x38
[   34.959633]  kunit_try_run_case+0x14c/0x3d0
[   34.960619]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.961591]  kthread+0x24c/0x2d0
[   34.962388]  ret_from_fork+0x10/0x20
[   34.962998] 
[   34.963354] The buggy address belongs to the object at fff00000c47c8400
[   34.963354]  which belongs to the cache kmalloc-256 of size 256
[   34.965240] The buggy address is located 5 bytes to the right of
[   34.965240]  allocated 235-byte region [fff00000c47c8400, fff00000c47c84eb)
[   34.967381] 
[   34.967678] The buggy address belongs to the physical page:
[   34.968887] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047c8
[   34.970144] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.971327] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.972734] page_type: f5(slab)
[   34.973212] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   34.974576] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   34.976866] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   34.977855] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   34.979582] head: 0bfffe0000000001 ffffc1ffc311f201 ffffffffffffffff 0000000000000000
[   34.981032] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   34.982156] page dumped because: kasan: bad access detected
[   34.983006] 
[   34.983381] Memory state around the buggy address:
[   34.984570]  fff00000c47c8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.985509]  fff00000c47c8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.986898] >fff00000c47c8480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   34.988239]                                                              ^
[   34.989345]  fff00000c47c8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.990545]  fff00000c47c8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.991823] ==================================================================

test log snippet boot parser 57

Home

[   34.880876] ==================================================================
[   34.882040] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[   34.883357] Write of size 1 at addr fff00000c47c84eb by task kunit_try_catch/144
[   34.884604] 
[   34.885375] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   34.886680] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.887883] Hardware name: linux,dummy-virt (DT)
[   34.888444] Call trace:
[   34.889183]  show_stack+0x20/0x38 (C)
[   34.890051]  dump_stack_lvl+0x8c/0xd0
[   34.890981]  print_report+0x118/0x5e0
[   34.891456]  kasan_report+0xc8/0x118
[   34.892309]  __asan_report_store1_noabort+0x20/0x30
[   34.893010]  krealloc_more_oob_helper+0x614/0x680
[   34.893979]  krealloc_more_oob+0x20/0x38
[   34.894583]  kunit_try_run_case+0x14c/0x3d0
[   34.895303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.896124]  kthread+0x24c/0x2d0
[   34.897007]  ret_from_fork+0x10/0x20
[   34.897730] 
[   34.898028] Allocated by task 144:
[   34.899160]  kasan_save_stack+0x3c/0x68
[   34.899875]  kasan_save_track+0x20/0x40
[   34.900392]  kasan_save_alloc_info+0x40/0x58
[   34.901059]  __kasan_krealloc+0x118/0x178
[   34.901633]  krealloc_noprof+0x128/0x360
[   34.902288]  krealloc_more_oob_helper+0x168/0x680
[   34.903167]  krealloc_more_oob+0x20/0x38
[   34.903825]  kunit_try_run_case+0x14c/0x3d0
[   34.904422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.906553]  kthread+0x24c/0x2d0
[   34.907082]  ret_from_fork+0x10/0x20
[   34.907798] 
[   34.908143] The buggy address belongs to the object at fff00000c47c8400
[   34.908143]  which belongs to the cache kmalloc-256 of size 256
[   34.910398] The buggy address is located 0 bytes to the right of
[   34.910398]  allocated 235-byte region [fff00000c47c8400, fff00000c47c84eb)
[   34.912463] 
[   34.912931] The buggy address belongs to the physical page:
[   34.914095] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047c8
[   34.915673] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.916450] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.917209] page_type: f5(slab)
[   34.917721] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   34.918872] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   34.920232] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   34.921154] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   34.922121] head: 0bfffe0000000001 ffffc1ffc311f201 ffffffffffffffff 0000000000000000
[   34.923786] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   34.925142] page dumped because: kasan: bad access detected
[   34.926277] 
[   34.926586] Memory state around the buggy address:
[   34.928503]  fff00000c47c8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.929693]  fff00000c47c8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.930548] >fff00000c47c8480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   34.932080]                                                           ^
[   34.932665]  fff00000c47c8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.933293]  fff00000c47c8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.934189] ==================================================================

test log snippet boot parser 58

Home

[   35.318369] ==================================================================
[   35.320385] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[   35.321111] Write of size 1 at addr fff00000c68a60eb by task kunit_try_catch/148
[   35.321772] 
[   35.322158] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   35.324861] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.325663] Hardware name: linux,dummy-virt (DT)
[   35.326538] Call trace:
[   35.327373]  show_stack+0x20/0x38 (C)
[   35.328077]  dump_stack_lvl+0x8c/0xd0
[   35.328835]  print_report+0x118/0x5e0
[   35.330055]  kasan_report+0xc8/0x118
[   35.331621]  __asan_report_store1_noabort+0x20/0x30
[   35.332543]  krealloc_more_oob_helper+0x614/0x680
[   35.333352]  krealloc_large_more_oob+0x20/0x38
[   35.334287]  kunit_try_run_case+0x14c/0x3d0
[   35.335336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.337349]  kthread+0x24c/0x2d0
[   35.338699]  ret_from_fork+0x10/0x20
[   35.339669] 
[   35.340378] The buggy address belongs to the physical page:
[   35.341717] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068a4
[   35.342760] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.343831] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.344557] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.345598] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.346350] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.348281] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.349047] head: 0bfffe0000000002 ffffc1ffc31a2901 ffffffffffffffff 0000000000000000
[   35.349591] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   35.350760] page dumped because: kasan: bad access detected
[   35.351856] 
[   35.352301] Memory state around the buggy address:
[   35.353175]  fff00000c68a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.355439]  fff00000c68a6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.356124] >fff00000c68a6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   35.356991]                                                           ^
[   35.358310]  fff00000c68a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.359768]  fff00000c68a6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.360561] ==================================================================

test log snippet boot parser 59

Home

[   36.704725] ==================================================================
[   36.706221] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750
[   36.707756] Read of size 1 at addr fff00000c61bc473 by task kunit_try_catch/182
[   36.708980] 
[   36.709464] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   36.710865] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.711429] Hardware name: linux,dummy-virt (DT)
[   36.712392] Call trace:
[   36.712896]  show_stack+0x20/0x38 (C)
[   36.713832]  dump_stack_lvl+0x8c/0xd0
[   36.714418]  print_report+0x118/0x5e0
[   36.714991]  kasan_report+0xc8/0x118
[   36.715662]  __asan_report_load1_noabort+0x20/0x30
[   36.716572]  ksize_unpoisons_memory+0x638/0x750
[   36.717042]  kunit_try_run_case+0x14c/0x3d0
[   36.717375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.718165]  kthread+0x24c/0x2d0
[   36.719697]  ret_from_fork+0x10/0x20
[   36.720468] 
[   36.720804] Allocated by task 182:
[   36.721538]  kasan_save_stack+0x3c/0x68
[   36.722025]  kasan_save_track+0x20/0x40
[   36.723231]  kasan_save_alloc_info+0x40/0x58
[   36.723885]  __kasan_kmalloc+0xd4/0xd8
[   36.724597]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.725139]  ksize_unpoisons_memory+0xc0/0x750
[   36.725888]  kunit_try_run_case+0x14c/0x3d0
[   36.726548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.728310]  kthread+0x24c/0x2d0
[   36.729369]  ret_from_fork+0x10/0x20
[   36.730386] 
[   36.730828] The buggy address belongs to the object at fff00000c61bc400
[   36.730828]  which belongs to the cache kmalloc-128 of size 128
[   36.733463] The buggy address is located 0 bytes to the right of
[   36.733463]  allocated 115-byte region [fff00000c61bc400, fff00000c61bc473)
[   36.734988] 
[   36.735349] The buggy address belongs to the physical page:
[   36.735964] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061bc
[   36.737095] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.738045] page_type: f5(slab)
[   36.738512] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.739496] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.740557] page dumped because: kasan: bad access detected
[   36.741254] 
[   36.741651] Memory state around the buggy address:
[   36.742288]  fff00000c61bc300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   36.743191]  fff00000c61bc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.744114] >fff00000c61bc400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   36.744956]                                                              ^
[   36.745841]  fff00000c61bc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.746847]  fff00000c61bc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.747763] ==================================================================

test log snippet boot parser 60

Home

[   36.796616] ==================================================================
[   36.797475] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750
[   36.799022] Read of size 1 at addr fff00000c61bc47f by task kunit_try_catch/182
[   36.800091] 
[   36.800488] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   36.801885] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.802685] Hardware name: linux,dummy-virt (DT)
[   36.803364] Call trace:
[   36.803947]  show_stack+0x20/0x38 (C)
[   36.804702]  dump_stack_lvl+0x8c/0xd0
[   36.805470]  print_report+0x118/0x5e0
[   36.806255]  kasan_report+0xc8/0x118
[   36.806927]  __asan_report_load1_noabort+0x20/0x30
[   36.807630]  ksize_unpoisons_memory+0x6a0/0x750
[   36.808454]  kunit_try_run_case+0x14c/0x3d0
[   36.809270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.810203]  kthread+0x24c/0x2d0
[   36.810972]  ret_from_fork+0x10/0x20
[   36.811792] 
[   36.812147] Allocated by task 182:
[   36.812633]  kasan_save_stack+0x3c/0x68
[   36.813226]  kasan_save_track+0x20/0x40
[   36.814327]  kasan_save_alloc_info+0x40/0x58
[   36.815030]  __kasan_kmalloc+0xd4/0xd8
[   36.815686]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.816182]  ksize_unpoisons_memory+0xc0/0x750
[   36.816916]  kunit_try_run_case+0x14c/0x3d0
[   36.817814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.818404]  kthread+0x24c/0x2d0
[   36.819078]  ret_from_fork+0x10/0x20
[   36.819645] 
[   36.819941] The buggy address belongs to the object at fff00000c61bc400
[   36.819941]  which belongs to the cache kmalloc-128 of size 128
[   36.821399] The buggy address is located 12 bytes to the right of
[   36.821399]  allocated 115-byte region [fff00000c61bc400, fff00000c61bc473)
[   36.823064] 
[   36.823390] The buggy address belongs to the physical page:
[   36.824032] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061bc
[   36.825139] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.826097] page_type: f5(slab)
[   36.826712] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.827620] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.828487] page dumped because: kasan: bad access detected
[   36.829614] 
[   36.829904] Memory state around the buggy address:
[   36.830470]  fff00000c61bc300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.832508]  fff00000c61bc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.833240] >fff00000c61bc400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   36.834428]                                                                 ^
[   36.835358]  fff00000c61bc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.836440]  fff00000c61bc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.837267] ==================================================================

test log snippet boot parser 61

Home

[   36.750031] ==================================================================
[   36.750820] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750
[   36.753400] Read of size 1 at addr fff00000c61bc478 by task kunit_try_catch/182
[   36.755649] 
[   36.756452] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   36.757481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.757817] Hardware name: linux,dummy-virt (DT)
[   36.758125] Call trace:
[   36.758336]  show_stack+0x20/0x38 (C)
[   36.758783]  dump_stack_lvl+0x8c/0xd0
[   36.759337]  print_report+0x118/0x5e0
[   36.760039]  kasan_report+0xc8/0x118
[   36.761078]  __asan_report_load1_noabort+0x20/0x30
[   36.762061]  ksize_unpoisons_memory+0x628/0x750
[   36.762761]  kunit_try_run_case+0x14c/0x3d0
[   36.763585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.764439]  kthread+0x24c/0x2d0
[   36.765157]  ret_from_fork+0x10/0x20
[   36.765828] 
[   36.766195] Allocated by task 182:
[   36.766817]  kasan_save_stack+0x3c/0x68
[   36.767632]  kasan_save_track+0x20/0x40
[   36.768311]  kasan_save_alloc_info+0x40/0x58
[   36.769004]  __kasan_kmalloc+0xd4/0xd8
[   36.769656]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.770282]  ksize_unpoisons_memory+0xc0/0x750
[   36.771094]  kunit_try_run_case+0x14c/0x3d0
[   36.771819]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.772793]  kthread+0x24c/0x2d0
[   36.773296]  ret_from_fork+0x10/0x20
[   36.774016] 
[   36.774498] The buggy address belongs to the object at fff00000c61bc400
[   36.774498]  which belongs to the cache kmalloc-128 of size 128
[   36.776175] The buggy address is located 5 bytes to the right of
[   36.776175]  allocated 115-byte region [fff00000c61bc400, fff00000c61bc473)
[   36.777939] 
[   36.778400] The buggy address belongs to the physical page:
[   36.779227] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061bc
[   36.780303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.781228] page_type: f5(slab)
[   36.781747] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.782841] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.783851] page dumped because: kasan: bad access detected
[   36.784679] 
[   36.785126] Memory state around the buggy address:
[   36.785903]  fff00000c61bc300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   36.786916]  fff00000c61bc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.787909] >fff00000c61bc400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   36.788867]                                                                 ^
[   36.789887]  fff00000c61bc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.790821]  fff00000c61bc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.791843] ==================================================================

test log snippet boot parser 62

Home

[   39.292342] ==================================================================
[   39.294076] BUG: KASAN: slab-out-of-bounds in memchr+0x78/0x88
[   39.295105] Read of size 1 at addr fff00000c69eb218 by task kunit_try_catch/243
[   39.296131] 
[   39.297621] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   39.299903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.300448] Hardware name: linux,dummy-virt (DT)
[   39.301059] Call trace:
[   39.301298]  show_stack+0x20/0x38 (C)
[   39.301947]  dump_stack_lvl+0x8c/0xd0
[   39.303174]  print_report+0x118/0x5e0
[   39.304030]  kasan_report+0xc8/0x118
[   39.304898]  __asan_report_load1_noabort+0x20/0x30
[   39.305728]  memchr+0x78/0x88
[   39.306680]  kasan_memchr+0x148/0x2d8
[   39.307425]  kunit_try_run_case+0x14c/0x3d0
[   39.308100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.309624]  kthread+0x24c/0x2d0
[   39.310800]  ret_from_fork+0x10/0x20
[   39.311634] 
[   39.312066] Allocated by task 243:
[   39.312980]  kasan_save_stack+0x3c/0x68
[   39.313813]  kasan_save_track+0x20/0x40
[   39.314405]  kasan_save_alloc_info+0x40/0x58
[   39.315652]  __kasan_kmalloc+0xd4/0xd8
[   39.317110]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.318023]  kasan_memchr+0xb0/0x2d8
[   39.318551]  kunit_try_run_case+0x14c/0x3d0
[   39.319625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.320736]  kthread+0x24c/0x2d0
[   39.321504]  ret_from_fork+0x10/0x20
[   39.322079] 
[   39.322386] The buggy address belongs to the object at fff00000c69eb200
[   39.322386]  which belongs to the cache kmalloc-32 of size 32
[   39.324228] The buggy address is located 0 bytes to the right of
[   39.324228]  allocated 24-byte region [fff00000c69eb200, fff00000c69eb218)
[   39.326502] 
[   39.327357] The buggy address belongs to the physical page:
[   39.328140] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069eb
[   39.329036] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.329502] page_type: f5(slab)
[   39.330323] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   39.332097] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   39.333546] page dumped because: kasan: bad access detected
[   39.334291] 
[   39.334659] Memory state around the buggy address:
[   39.335463]  fff00000c69eb100: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   39.337286]  fff00000c69eb180: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   39.338397] >fff00000c69eb200: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.339732]                             ^
[   39.340636]  fff00000c69eb280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.341616]  fff00000c69eb300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.342711] ==================================================================

test log snippet boot parser 63

Home

[   39.353259] ==================================================================
[   39.355641] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   39.357110] Read of size 1 at addr fff00000c69eb358 by task kunit_try_catch/245
[   39.358832] 
[   39.360192] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   39.361277] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.362001] Hardware name: linux,dummy-virt (DT)
[   39.362589] Call trace:
[   39.363074]  show_stack+0x20/0x38 (C)
[   39.363940]  dump_stack_lvl+0x8c/0xd0
[   39.364722]  print_report+0x118/0x5e0
[   39.365220]  kasan_report+0xc8/0x118
[   39.366087]  __asan_report_load1_noabort+0x20/0x30
[   39.367160]  memcmp+0x198/0x1d8
[   39.367682]  kasan_memcmp+0x16c/0x300
[   39.368256]  kunit_try_run_case+0x14c/0x3d0
[   39.368892]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.369694]  kthread+0x24c/0x2d0
[   39.370311]  ret_from_fork+0x10/0x20
[   39.371406] 
[   39.371774] Allocated by task 245:
[   39.372249]  kasan_save_stack+0x3c/0x68
[   39.372984]  kasan_save_track+0x20/0x40
[   39.373614]  kasan_save_alloc_info+0x40/0x58
[   39.374333]  __kasan_kmalloc+0xd4/0xd8
[   39.375931]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.376713]  kasan_memcmp+0xbc/0x300
[   39.377227]  kunit_try_run_case+0x14c/0x3d0
[   39.378063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.379239]  kthread+0x24c/0x2d0
[   39.380154]  ret_from_fork+0x10/0x20
[   39.380892] 
[   39.381196] The buggy address belongs to the object at fff00000c69eb340
[   39.381196]  which belongs to the cache kmalloc-32 of size 32
[   39.382818] The buggy address is located 0 bytes to the right of
[   39.382818]  allocated 24-byte region [fff00000c69eb340, fff00000c69eb358)
[   39.384905] 
[   39.385432] The buggy address belongs to the physical page:
[   39.386560] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069eb
[   39.388039] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.389020] page_type: f5(slab)
[   39.389572] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   39.390506] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   39.391977] page dumped because: kasan: bad access detected
[   39.392915] 
[   39.393247] Memory state around the buggy address:
[   39.393992]  fff00000c69eb200: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   39.395071]  fff00000c69eb280: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   39.396022] >fff00000c69eb300: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   39.397275]                                                     ^
[   39.398170]  fff00000c69eb380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.398906]  fff00000c69eb400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.400359] ==================================================================

test log snippet boot parser 64

Home

[   38.460038] ==================================================================
[   38.461733] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   38.462785] Read of size 1 at addr fff00000c699f2bb by task kunit_try_catch/213
[   38.465438] 
[   38.465777] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   38.467369] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.468268] Hardware name: linux,dummy-virt (DT)
[   38.469133] Call trace:
[   38.469651]  show_stack+0x20/0x38 (C)
[   38.470141]  dump_stack_lvl+0x8c/0xd0
[   38.472411]  print_report+0x118/0x5e0
[   38.473339]  kasan_report+0xc8/0x118
[   38.473829]  __asan_report_load1_noabort+0x20/0x30
[   38.474897]  mempool_oob_right_helper+0x2ac/0x2f0
[   38.476082]  mempool_slab_oob_right+0xb8/0x110
[   38.477513]  kunit_try_run_case+0x14c/0x3d0
[   38.478584]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.479682]  kthread+0x24c/0x2d0
[   38.480245]  ret_from_fork+0x10/0x20
[   38.481555] 
[   38.481883] Allocated by task 213:
[   38.482267]  kasan_save_stack+0x3c/0x68
[   38.482739]  kasan_save_track+0x20/0x40
[   38.484442]  kasan_save_alloc_info+0x40/0x58
[   38.485210]  __kasan_mempool_unpoison_object+0xbc/0x180
[   38.486130]  remove_element+0x16c/0x1f8
[   38.486939]  mempool_alloc_preallocated+0x58/0xc0
[   38.487946]  mempool_oob_right_helper+0x98/0x2f0
[   38.488912]  mempool_slab_oob_right+0xb8/0x110
[   38.489901]  kunit_try_run_case+0x14c/0x3d0
[   38.490650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.492340]  kthread+0x24c/0x2d0
[   38.492970]  ret_from_fork+0x10/0x20
[   38.494230] 
[   38.495172] The buggy address belongs to the object at fff00000c699f240
[   38.495172]  which belongs to the cache test_cache of size 123
[   38.497161] The buggy address is located 0 bytes to the right of
[   38.497161]  allocated 123-byte region [fff00000c699f240, fff00000c699f2bb)
[   38.498927] 
[   38.499705] The buggy address belongs to the physical page:
[   38.500398] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10699f
[   38.501976] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.503190] page_type: f5(slab)
[   38.503741] raw: 0bfffe0000000000 fff00000c17638c0 dead000000000122 0000000000000000
[   38.505560] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   38.506709] page dumped because: kasan: bad access detected
[   38.507612] 
[   38.508546] Memory state around the buggy address:
[   38.509088]  fff00000c699f180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.510161]  fff00000c699f200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   38.511563] >fff00000c699f280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   38.512444]                                         ^
[   38.513316]  fff00000c699f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.514199]  fff00000c699f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.515352] ==================================================================

test log snippet boot parser 65

Home

[   38.404422] ==================================================================
[   38.406066] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   38.407661] Read of size 1 at addr fff00000c6a26001 by task kunit_try_catch/211
[   38.408354] 
[   38.408801] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   38.409794] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.410284] Hardware name: linux,dummy-virt (DT)
[   38.411077] Call trace:
[   38.411578]  show_stack+0x20/0x38 (C)
[   38.412284]  dump_stack_lvl+0x8c/0xd0
[   38.413011]  print_report+0x118/0x5e0
[   38.413648]  kasan_report+0xc8/0x118
[   38.414254]  __asan_report_load1_noabort+0x20/0x30
[   38.416329]  mempool_oob_right_helper+0x2ac/0x2f0
[   38.417070]  mempool_kmalloc_large_oob_right+0xbc/0x118
[   38.417949]  kunit_try_run_case+0x14c/0x3d0
[   38.418968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.420405]  kthread+0x24c/0x2d0
[   38.421252]  ret_from_fork+0x10/0x20
[   38.421906] 
[   38.422587] The buggy address belongs to the physical page:
[   38.424944] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a24
[   38.426011] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   38.427085] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   38.428676] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.429843] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   38.431945] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.433091] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   38.434009] head: 0bfffe0000000002 ffffc1ffc31a8901 ffffffffffffffff 0000000000000000
[   38.435257] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   38.436131] page dumped because: kasan: bad access detected
[   38.436935] 
[   38.437262] Memory state around the buggy address:
[   38.437859]  fff00000c6a25f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.439622]  fff00000c6a25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.440721] >fff00000c6a26000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   38.442055]                    ^
[   38.442436]  fff00000c6a26080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   38.444136]  fff00000c6a26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   38.445127] ==================================================================

test log snippet boot parser 66

Home

[   38.343431] ==================================================================
[   38.344882] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   38.345915] Read of size 1 at addr fff00000c6196673 by task kunit_try_catch/209
[   38.346660] 
[   38.347188] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   38.348367] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.349476] Hardware name: linux,dummy-virt (DT)
[   38.350175] Call trace:
[   38.350656]  show_stack+0x20/0x38 (C)
[   38.351672]  dump_stack_lvl+0x8c/0xd0
[   38.352181]  print_report+0x118/0x5e0
[   38.352923]  kasan_report+0xc8/0x118
[   38.353487]  __asan_report_load1_noabort+0x20/0x30
[   38.354146]  mempool_oob_right_helper+0x2ac/0x2f0
[   38.355308]  mempool_kmalloc_oob_right+0xbc/0x118
[   38.355979]  kunit_try_run_case+0x14c/0x3d0
[   38.356635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.357476]  kthread+0x24c/0x2d0
[   38.358152]  ret_from_fork+0x10/0x20
[   38.358705] 
[   38.359562] Allocated by task 209:
[   38.360117]  kasan_save_stack+0x3c/0x68
[   38.360809]  kasan_save_track+0x20/0x40
[   38.361890]  kasan_save_alloc_info+0x40/0x58
[   38.362683]  __kasan_mempool_unpoison_object+0x11c/0x180
[   38.364291]  remove_element+0x130/0x1f8
[   38.364927]  mempool_alloc_preallocated+0x58/0xc0
[   38.365682]  mempool_oob_right_helper+0x98/0x2f0
[   38.366330]  mempool_kmalloc_oob_right+0xbc/0x118
[   38.367452]  kunit_try_run_case+0x14c/0x3d0
[   38.368294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.369092]  kthread+0x24c/0x2d0
[   38.369766]  ret_from_fork+0x10/0x20
[   38.370609] 
[   38.371166] The buggy address belongs to the object at fff00000c6196600
[   38.371166]  which belongs to the cache kmalloc-128 of size 128
[   38.372659] The buggy address is located 0 bytes to the right of
[   38.372659]  allocated 115-byte region [fff00000c6196600, fff00000c6196673)
[   38.373732] 
[   38.374219] The buggy address belongs to the physical page:
[   38.375391] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106196
[   38.376154] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.376798] page_type: f5(slab)
[   38.377538] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   38.378567] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   38.380059] page dumped because: kasan: bad access detected
[   38.380963] 
[   38.381220] Memory state around the buggy address:
[   38.382071]  fff00000c6196500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.382802]  fff00000c6196580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.384447] >fff00000c6196600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   38.385491]                                                              ^
[   38.387546]  fff00000c6196680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.388591]  fff00000c6196700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   38.389433] ==================================================================

test log snippet boot parser 67

Home

[   44.060138] ==================================================================
[   44.061030] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   44.061976] Write of size 1 at addr fff00000c69d2d78 by task kunit_try_catch/273
[   44.063224] 
[   44.063667] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   44.065069] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.065956] Hardware name: linux,dummy-virt (DT)
[   44.066812] Call trace:
[   44.067320]  show_stack+0x20/0x38 (C)
[   44.068109]  dump_stack_lvl+0x8c/0xd0
[   44.068828]  print_report+0x118/0x5e0
[   44.069581]  kasan_report+0xc8/0x118
[   44.070283]  __asan_report_store1_noabort+0x20/0x30
[   44.071137]  strncpy_from_user+0x270/0x2a0
[   44.071908]  copy_user_test_oob+0x5c0/0xec0
[   44.072695]  kunit_try_run_case+0x14c/0x3d0
[   44.073315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.074185]  kthread+0x24c/0x2d0
[   44.074858]  ret_from_fork+0x10/0x20
[   44.075775] 
[   44.076258] Allocated by task 273:
[   44.076829]  kasan_save_stack+0x3c/0x68
[   44.077595]  kasan_save_track+0x20/0x40
[   44.078306]  kasan_save_alloc_info+0x40/0x58
[   44.079020]  __kasan_kmalloc+0xd4/0xd8
[   44.079902]  __kmalloc_noprof+0x188/0x4c8
[   44.080720]  kunit_kmalloc_array+0x34/0x88
[   44.081433]  copy_user_test_oob+0xac/0xec0
[   44.082150]  kunit_try_run_case+0x14c/0x3d0
[   44.083013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.083797]  kthread+0x24c/0x2d0
[   44.084430]  ret_from_fork+0x10/0x20
[   44.085100] 
[   44.085500] The buggy address belongs to the object at fff00000c69d2d00
[   44.085500]  which belongs to the cache kmalloc-128 of size 128
[   44.087105] The buggy address is located 0 bytes to the right of
[   44.087105]  allocated 120-byte region [fff00000c69d2d00, fff00000c69d2d78)
[   44.088877] 
[   44.089345] The buggy address belongs to the physical page:
[   44.090199] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069d2
[   44.091238] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.092113] page_type: f5(slab)
[   44.092779] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   44.093829] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   44.094876] page dumped because: kasan: bad access detected
[   44.095736] 
[   44.096236] Memory state around the buggy address:
[   44.097029]  fff00000c69d2c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   44.098126]  fff00000c69d2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.099116] >fff00000c69d2d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   44.100114]                                                                 ^
[   44.101063]  fff00000c69d2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.102066]  fff00000c69d2e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.103024] ==================================================================

test log snippet boot parser 68

Home

[   44.013872] ==================================================================
[   44.015055] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   44.015504] Write of size 121 at addr fff00000c69d2d00 by task kunit_try_catch/273
[   44.016325] 
[   44.016921] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   44.018399] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.019147] Hardware name: linux,dummy-virt (DT)
[   44.020063] Call trace:
[   44.020712]  show_stack+0x20/0x38 (C)
[   44.021439]  dump_stack_lvl+0x8c/0xd0
[   44.022206]  print_report+0x118/0x5e0
[   44.022995]  kasan_report+0xc8/0x118
[   44.023571]  kasan_check_range+0x100/0x1a8
[   44.024236]  __kasan_check_write+0x20/0x30
[   44.024957]  strncpy_from_user+0x3c/0x2a0
[   44.025727]  copy_user_test_oob+0x5c0/0xec0
[   44.026437]  kunit_try_run_case+0x14c/0x3d0
[   44.027189]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.028008]  kthread+0x24c/0x2d0
[   44.028628]  ret_from_fork+0x10/0x20
[   44.029395] 
[   44.029755] Allocated by task 273:
[   44.030431]  kasan_save_stack+0x3c/0x68
[   44.031156]  kasan_save_track+0x20/0x40
[   44.031951]  kasan_save_alloc_info+0x40/0x58
[   44.032654]  __kasan_kmalloc+0xd4/0xd8
[   44.033307]  __kmalloc_noprof+0x188/0x4c8
[   44.033981]  kunit_kmalloc_array+0x34/0x88
[   44.034792]  copy_user_test_oob+0xac/0xec0
[   44.035470]  kunit_try_run_case+0x14c/0x3d0
[   44.036310]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.037161]  kthread+0x24c/0x2d0
[   44.037847]  ret_from_fork+0x10/0x20
[   44.038470] 
[   44.038908] The buggy address belongs to the object at fff00000c69d2d00
[   44.038908]  which belongs to the cache kmalloc-128 of size 128
[   44.040543] The buggy address is located 0 bytes inside of
[   44.040543]  allocated 120-byte region [fff00000c69d2d00, fff00000c69d2d78)
[   44.042266] 
[   44.042760] The buggy address belongs to the physical page:
[   44.043534] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069d2
[   44.044709] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.045666] page_type: f5(slab)
[   44.046202] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   44.047325] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   44.048387] page dumped because: kasan: bad access detected
[   44.049237] 
[   44.049683] Memory state around the buggy address:
[   44.050544]  fff00000c69d2c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   44.051703]  fff00000c69d2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.052774] >fff00000c69d2d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   44.053847]                                                                 ^
[   44.054739]  fff00000c69d2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.055692]  fff00000c69d2e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.056468] ==================================================================

test log snippet boot parser 69

Home

[   39.588179] ==================================================================
[   39.589160] BUG: KASAN: slab-use-after-free in kasan_strings+0x858/0x8f8
[   39.590019] Read of size 1 at addr fff00000c69eb490 by task kunit_try_catch/247
[   39.592588] 
[   39.593266] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   39.594640] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.595442] Hardware name: linux,dummy-virt (DT)
[   39.596691] Call trace:
[   39.597503]  show_stack+0x20/0x38 (C)
[   39.598354]  dump_stack_lvl+0x8c/0xd0
[   39.599112]  print_report+0x118/0x5e0
[   39.600043]  kasan_report+0xc8/0x118
[   39.601453]  __asan_report_load1_noabort+0x20/0x30
[   39.602262]  kasan_strings+0x858/0x8f8
[   39.603059]  kunit_try_run_case+0x14c/0x3d0
[   39.603802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.604940]  kthread+0x24c/0x2d0
[   39.605589]  ret_from_fork+0x10/0x20
[   39.606316] 
[   39.607380] Allocated by task 247:
[   39.608183]  kasan_save_stack+0x3c/0x68
[   39.608694]  kasan_save_track+0x20/0x40
[   39.609787]  kasan_save_alloc_info+0x40/0x58
[   39.610761]  __kasan_kmalloc+0xd4/0xd8
[   39.611405]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.612606]  kasan_strings+0xb4/0x8f8
[   39.613027]  kunit_try_run_case+0x14c/0x3d0
[   39.613579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.614300]  kthread+0x24c/0x2d0
[   39.615855]  ret_from_fork+0x10/0x20
[   39.616671] 
[   39.617057] Freed by task 247:
[   39.617684]  kasan_save_stack+0x3c/0x68
[   39.618346]  kasan_save_track+0x20/0x40
[   39.619250]  kasan_save_free_info+0x4c/0x78
[   39.620402]  __kasan_slab_free+0x6c/0x98
[   39.621258]  kfree+0x114/0x3c8
[   39.622082]  kasan_strings+0x128/0x8f8
[   39.623269]  kunit_try_run_case+0x14c/0x3d0
[   39.624213]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.625214]  kthread+0x24c/0x2d0
[   39.625710]  ret_from_fork+0x10/0x20
[   39.626331] 
[   39.626694] The buggy address belongs to the object at fff00000c69eb480
[   39.626694]  which belongs to the cache kmalloc-32 of size 32
[   39.628066] The buggy address is located 16 bytes inside of
[   39.628066]  freed 32-byte region [fff00000c69eb480, fff00000c69eb4a0)
[   39.630180] 
[   39.630617] The buggy address belongs to the physical page:
[   39.632878] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069eb
[   39.634124] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.635202] page_type: f5(slab)
[   39.636105] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   39.636918] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   39.638107] page dumped because: kasan: bad access detected
[   39.638940] 
[   39.639794] Memory state around the buggy address:
[   39.640545]  fff00000c69eb380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   39.641502]  fff00000c69eb400: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   39.642636] >fff00000c69eb480: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   39.644005]                          ^
[   39.644858]  fff00000c69eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.645319]  fff00000c69eb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.645869] ==================================================================

test log snippet boot parser 70

Home

[   36.566071] ==================================================================
[   36.568509] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   36.569925] Read of size 1 at addr fff00000c5a8fc00 by task kunit_try_catch/180
[   36.571794] 
[   36.572220] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   36.573352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.574059] Hardware name: linux,dummy-virt (DT)
[   36.574661] Call trace:
[   36.575246]  show_stack+0x20/0x38 (C)
[   36.575832]  dump_stack_lvl+0x8c/0xd0
[   36.576706]  print_report+0x118/0x5e0
[   36.577297]  kasan_report+0xc8/0x118
[   36.577987]  __kasan_check_byte+0x54/0x70
[   36.578645]  kfree_sensitive+0x30/0xb0
[   36.579504]  kmalloc_double_kzfree+0x168/0x308
[   36.580396]  kunit_try_run_case+0x14c/0x3d0
[   36.581270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.582032]  kthread+0x24c/0x2d0
[   36.582688]  ret_from_fork+0x10/0x20
[   36.583324] 
[   36.584252] Allocated by task 180:
[   36.584714]  kasan_save_stack+0x3c/0x68
[   36.585177]  kasan_save_track+0x20/0x40
[   36.586001]  kasan_save_alloc_info+0x40/0x58
[   36.587738]  __kasan_kmalloc+0xd4/0xd8
[   36.588654]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.589572]  kmalloc_double_kzfree+0xb8/0x308
[   36.590488]  kunit_try_run_case+0x14c/0x3d0
[   36.591495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.592401]  kthread+0x24c/0x2d0
[   36.593376]  ret_from_fork+0x10/0x20
[   36.594188] 
[   36.594598] Freed by task 180:
[   36.595461]  kasan_save_stack+0x3c/0x68
[   36.596276]  kasan_save_track+0x20/0x40
[   36.596999]  kasan_save_free_info+0x4c/0x78
[   36.597642]  __kasan_slab_free+0x6c/0x98
[   36.598244]  kfree+0x114/0x3c8
[   36.598722]  kfree_sensitive+0x80/0xb0
[   36.600153]  kmalloc_double_kzfree+0x11c/0x308
[   36.601181]  kunit_try_run_case+0x14c/0x3d0
[   36.601746]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.602850]  kthread+0x24c/0x2d0
[   36.603366]  ret_from_fork+0x10/0x20
[   36.604095] 
[   36.604457] The buggy address belongs to the object at fff00000c5a8fc00
[   36.604457]  which belongs to the cache kmalloc-16 of size 16
[   36.606475] The buggy address is located 0 bytes inside of
[   36.606475]  freed 16-byte region [fff00000c5a8fc00, fff00000c5a8fc10)
[   36.608372] 
[   36.609553] The buggy address belongs to the physical page:
[   36.610453] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8f
[   36.612093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.612925] page_type: f5(slab)
[   36.613387] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   36.614767] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   36.616631] page dumped because: kasan: bad access detected
[   36.617380] 
[   36.617778] Memory state around the buggy address:
[   36.618438]  fff00000c5a8fb00: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   36.619596]  fff00000c5a8fb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   36.620111] >fff00000c5a8fc00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.620554]                    ^
[   36.621035]  fff00000c5a8fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.622128]  fff00000c5a8fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.623595] ==================================================================

test log snippet boot parser 71

Home

[   35.861122] ==================================================================
[   35.862752] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   35.864546] Read of size 16 at addr fff00000c6114ea0 by task kunit_try_catch/156
[   35.865386] 
[   35.865812] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   35.867404] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.868284] Hardware name: linux,dummy-virt (DT)
[   35.868952] Call trace:
[   35.869466]  show_stack+0x20/0x38 (C)
[   35.870033]  dump_stack_lvl+0x8c/0xd0
[   35.870650]  print_report+0x118/0x5e0
[   35.871378]  kasan_report+0xc8/0x118
[   35.871867]  __asan_report_load16_noabort+0x20/0x30
[   35.872635]  kmalloc_uaf_16+0x3bc/0x438
[   35.873447]  kunit_try_run_case+0x14c/0x3d0
[   35.873957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.875000]  kthread+0x24c/0x2d0
[   35.875541]  ret_from_fork+0x10/0x20
[   35.876211] 
[   35.876713] Allocated by task 156:
[   35.877435]  kasan_save_stack+0x3c/0x68
[   35.878386]  kasan_save_track+0x20/0x40
[   35.878977]  kasan_save_alloc_info+0x40/0x58
[   35.879505]  __kasan_kmalloc+0xd4/0xd8
[   35.880043]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.881390]  kmalloc_uaf_16+0x140/0x438
[   35.882383]  kunit_try_run_case+0x14c/0x3d0
[   35.883876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.884884]  kthread+0x24c/0x2d0
[   35.885381]  ret_from_fork+0x10/0x20
[   35.885963] 
[   35.886277] Freed by task 156:
[   35.887643]  kasan_save_stack+0x3c/0x68
[   35.888593]  kasan_save_track+0x20/0x40
[   35.889126]  kasan_save_free_info+0x4c/0x78
[   35.889808]  __kasan_slab_free+0x6c/0x98
[   35.890326]  kfree+0x114/0x3c8
[   35.891218]  kmalloc_uaf_16+0x190/0x438
[   35.892346]  kunit_try_run_case+0x14c/0x3d0
[   35.892941]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.893818]  kthread+0x24c/0x2d0
[   35.894450]  ret_from_fork+0x10/0x20
[   35.894953] 
[   35.895566] The buggy address belongs to the object at fff00000c6114ea0
[   35.895566]  which belongs to the cache kmalloc-16 of size 16
[   35.896978] The buggy address is located 0 bytes inside of
[   35.896978]  freed 16-byte region [fff00000c6114ea0, fff00000c6114eb0)
[   35.899387] 
[   35.900141] The buggy address belongs to the physical page:
[   35.901537] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[   35.903012] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.904852] page_type: f5(slab)
[   35.905821] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.906696] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.908264] page dumped because: kasan: bad access detected
[   35.908812] 
[   35.909245] Memory state around the buggy address:
[   35.909979]  fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   35.911238]  fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.912173] >fff00000c6114e80: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   35.913512]                                ^
[   35.914106]  fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.915133]  fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.916476] ==================================================================

test log snippet boot parser 72

Home

[   36.481808] ==================================================================
[   36.484439] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   36.485452] Read of size 1 at addr fff00000c682b728 by task kunit_try_catch/176
[   36.486509] 
[   36.486976] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   36.488282] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.489194] Hardware name: linux,dummy-virt (DT)
[   36.491395] Call trace:
[   36.492296]  show_stack+0x20/0x38 (C)
[   36.493441]  dump_stack_lvl+0x8c/0xd0
[   36.494223]  print_report+0x118/0x5e0
[   36.495326]  kasan_report+0xc8/0x118
[   36.496356]  __asan_report_load1_noabort+0x20/0x30
[   36.497136]  kmalloc_uaf2+0x3f4/0x468
[   36.497476]  kunit_try_run_case+0x14c/0x3d0
[   36.497993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.499468]  kthread+0x24c/0x2d0
[   36.500021]  ret_from_fork+0x10/0x20
[   36.500440] 
[   36.500721] Allocated by task 176:
[   36.501134]  kasan_save_stack+0x3c/0x68
[   36.501657]  kasan_save_track+0x20/0x40
[   36.502109]  kasan_save_alloc_info+0x40/0x58
[   36.504092]  __kasan_kmalloc+0xd4/0xd8
[   36.504726]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.505487]  kmalloc_uaf2+0xc4/0x468
[   36.506207]  kunit_try_run_case+0x14c/0x3d0
[   36.506661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.508263]  kthread+0x24c/0x2d0
[   36.509252]  ret_from_fork+0x10/0x20
[   36.510374] 
[   36.511701] Freed by task 176:
[   36.512900]  kasan_save_stack+0x3c/0x68
[   36.513770]  kasan_save_track+0x20/0x40
[   36.514351]  kasan_save_free_info+0x4c/0x78
[   36.515286]  __kasan_slab_free+0x6c/0x98
[   36.516002]  kfree+0x114/0x3c8
[   36.516854]  kmalloc_uaf2+0x134/0x468
[   36.517698]  kunit_try_run_case+0x14c/0x3d0
[   36.518494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.519790]  kthread+0x24c/0x2d0
[   36.520230]  ret_from_fork+0x10/0x20
[   36.520647] 
[   36.520896] The buggy address belongs to the object at fff00000c682b700
[   36.520896]  which belongs to the cache kmalloc-64 of size 64
[   36.521702] The buggy address is located 40 bytes inside of
[   36.521702]  freed 64-byte region [fff00000c682b700, fff00000c682b740)
[   36.522959] 
[   36.523268] The buggy address belongs to the physical page:
[   36.524416] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10682b
[   36.527050] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.528774] page_type: f5(slab)
[   36.530048] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.531309] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.532550] page dumped because: kasan: bad access detected
[   36.533543] 
[   36.534118] Memory state around the buggy address:
[   36.535007]  fff00000c682b600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.536823]  fff00000c682b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.538309] >fff00000c682b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.540365]                                   ^
[   36.541074]  fff00000c682b780: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   36.542440]  fff00000c682b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.543828] ==================================================================

test log snippet boot parser 73

Home

[   36.339480] ==================================================================
[   36.340817] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   36.341600] Read of size 1 at addr fff00000c6114ec8 by task kunit_try_catch/172
[   36.342398] 
[   36.342917] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   36.345602] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.346211] Hardware name: linux,dummy-virt (DT)
[   36.346781] Call trace:
[   36.347947]  show_stack+0x20/0x38 (C)
[   36.348602]  dump_stack_lvl+0x8c/0xd0
[   36.349278]  print_report+0x118/0x5e0
[   36.349982]  kasan_report+0xc8/0x118
[   36.351494]  __asan_report_load1_noabort+0x20/0x30
[   36.352184]  kmalloc_uaf+0x300/0x338
[   36.352891]  kunit_try_run_case+0x14c/0x3d0
[   36.353677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.354615]  kthread+0x24c/0x2d0
[   36.355370]  ret_from_fork+0x10/0x20
[   36.356240] 
[   36.356638] Allocated by task 172:
[   36.357250]  kasan_save_stack+0x3c/0x68
[   36.357929]  kasan_save_track+0x20/0x40
[   36.358665]  kasan_save_alloc_info+0x40/0x58
[   36.359723]  __kasan_kmalloc+0xd4/0xd8
[   36.361096]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.362056]  kmalloc_uaf+0xb8/0x338
[   36.362536]  kunit_try_run_case+0x14c/0x3d0
[   36.364320]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.365636]  kthread+0x24c/0x2d0
[   36.365933]  ret_from_fork+0x10/0x20
[   36.366208] 
[   36.366378] Freed by task 172:
[   36.366696]  kasan_save_stack+0x3c/0x68
[   36.367564]  kasan_save_track+0x20/0x40
[   36.368237]  kasan_save_free_info+0x4c/0x78
[   36.368890]  __kasan_slab_free+0x6c/0x98
[   36.369948]  kfree+0x114/0x3c8
[   36.371553]  kmalloc_uaf+0x11c/0x338
[   36.372489]  kunit_try_run_case+0x14c/0x3d0
[   36.373706]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.374360]  kthread+0x24c/0x2d0
[   36.375111]  ret_from_fork+0x10/0x20
[   36.375997] 
[   36.376390] The buggy address belongs to the object at fff00000c6114ec0
[   36.376390]  which belongs to the cache kmalloc-16 of size 16
[   36.377736] The buggy address is located 8 bytes inside of
[   36.377736]  freed 16-byte region [fff00000c6114ec0, fff00000c6114ed0)
[   36.379923] 
[   36.380483] The buggy address belongs to the physical page:
[   36.381355] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[   36.382043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.382664] page_type: f5(slab)
[   36.383056] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   36.384885] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   36.386340] page dumped because: kasan: bad access detected
[   36.386931] 
[   36.387218] Memory state around the buggy address:
[   36.389464]  fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   36.391278]  fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   36.393177] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   36.393893]                                               ^
[   36.394598]  fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.396687]  fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.398160] ==================================================================

test log snippet boot parser 74

Home

[   36.408982] ==================================================================
[   36.409998] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   36.411444] Write of size 33 at addr fff00000c682b580 by task kunit_try_catch/174
[   36.412180] 
[   36.412474] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   36.413834] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.414675] Hardware name: linux,dummy-virt (DT)
[   36.415377] Call trace:
[   36.416105]  show_stack+0x20/0x38 (C)
[   36.416978]  dump_stack_lvl+0x8c/0xd0
[   36.417873]  print_report+0x118/0x5e0
[   36.418744]  kasan_report+0xc8/0x118
[   36.419805]  kasan_check_range+0x100/0x1a8
[   36.420696]  __asan_memset+0x34/0x78
[   36.421498]  kmalloc_uaf_memset+0x170/0x310
[   36.422475]  kunit_try_run_case+0x14c/0x3d0
[   36.423648]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.424969]  kthread+0x24c/0x2d0
[   36.425450]  ret_from_fork+0x10/0x20
[   36.426369] 
[   36.426672] Allocated by task 174:
[   36.427570]  kasan_save_stack+0x3c/0x68
[   36.428874]  kasan_save_track+0x20/0x40
[   36.429374]  kasan_save_alloc_info+0x40/0x58
[   36.431330]  __kasan_kmalloc+0xd4/0xd8
[   36.432550]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.433582]  kmalloc_uaf_memset+0xb8/0x310
[   36.434637]  kunit_try_run_case+0x14c/0x3d0
[   36.435932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.437144]  kthread+0x24c/0x2d0
[   36.437881]  ret_from_fork+0x10/0x20
[   36.438621] 
[   36.440371] Freed by task 174:
[   36.440870]  kasan_save_stack+0x3c/0x68
[   36.441432]  kasan_save_track+0x20/0x40
[   36.442167]  kasan_save_free_info+0x4c/0x78
[   36.442885]  __kasan_slab_free+0x6c/0x98
[   36.443580]  kfree+0x114/0x3c8
[   36.444194]  kmalloc_uaf_memset+0x11c/0x310
[   36.445647]  kunit_try_run_case+0x14c/0x3d0
[   36.446284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.446997]  kthread+0x24c/0x2d0
[   36.447652]  ret_from_fork+0x10/0x20
[   36.448200] 
[   36.448577] The buggy address belongs to the object at fff00000c682b580
[   36.448577]  which belongs to the cache kmalloc-64 of size 64
[   36.451095] The buggy address is located 0 bytes inside of
[   36.451095]  freed 64-byte region [fff00000c682b580, fff00000c682b5c0)
[   36.452992] 
[   36.453337] The buggy address belongs to the physical page:
[   36.453886] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10682b
[   36.455374] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.456939] page_type: f5(slab)
[   36.457353] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.459336] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.461581] page dumped because: kasan: bad access detected
[   36.463335] 
[   36.463835] Memory state around the buggy address:
[   36.464300]  fff00000c682b480: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc
[   36.465999]  fff00000c682b500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.467077] >fff00000c682b580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.468224]                    ^
[   36.468599]  fff00000c682b600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.469024]  fff00000c682b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.469467] ==================================================================

test log snippet boot parser 75

Home

[   37.697245] ==================================================================
[   37.698581] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x17c/0x2f8
[   37.699477] Read of size 1 at addr fff00000c5a863c0 by task kunit_try_catch/203
[   37.700436] 
[   37.701193] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   37.702293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.703071] Hardware name: linux,dummy-virt (DT)
[   37.703701] Call trace:
[   37.704044]  show_stack+0x20/0x38 (C)
[   37.705774]  dump_stack_lvl+0x8c/0xd0
[   37.706441]  print_report+0x118/0x5e0
[   37.706956]  kasan_report+0xc8/0x118
[   37.708158]  __kasan_check_byte+0x54/0x70
[   37.708998]  kmem_cache_destroy+0x34/0x218
[   37.709712]  kmem_cache_double_destroy+0x17c/0x2f8
[   37.710654]  kunit_try_run_case+0x14c/0x3d0
[   37.711732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.712350]  kthread+0x24c/0x2d0
[   37.713066]  ret_from_fork+0x10/0x20
[   37.714221] 
[   37.714806] Allocated by task 203:
[   37.716114]  kasan_save_stack+0x3c/0x68
[   37.716807]  kasan_save_track+0x20/0x40
[   37.717463]  kasan_save_alloc_info+0x40/0x58
[   37.718119]  __kasan_slab_alloc+0xa8/0xb0
[   37.718684]  kmem_cache_alloc_noprof+0x108/0x398
[   37.719813]  __kmem_cache_create_args+0x18c/0x2b0
[   37.721103]  kmem_cache_double_destroy+0xc8/0x2f8
[   37.722002]  kunit_try_run_case+0x14c/0x3d0
[   37.722767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.723974]  kthread+0x24c/0x2d0
[   37.724364]  ret_from_fork+0x10/0x20
[   37.725355] 
[   37.725947] Freed by task 203:
[   37.726477]  kasan_save_stack+0x3c/0x68
[   37.727950]  kasan_save_track+0x20/0x40
[   37.728409]  kasan_save_free_info+0x4c/0x78
[   37.729166]  __kasan_slab_free+0x6c/0x98
[   37.730191]  kmem_cache_free+0x118/0x470
[   37.730681]  slab_kmem_cache_release+0x38/0x50
[   37.731168]  kmem_cache_release+0x1c/0x30
[   37.732849]  kobject_put+0x17c/0x430
[   37.733774]  sysfs_slab_release+0x1c/0x30
[   37.734728]  kmem_cache_destroy+0x118/0x218
[   37.735678]  kmem_cache_double_destroy+0x130/0x2f8
[   37.737044]  kunit_try_run_case+0x14c/0x3d0
[   37.738245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.739970]  kthread+0x24c/0x2d0
[   37.741192]  ret_from_fork+0x10/0x20
[   37.742465] 
[   37.743311] The buggy address belongs to the object at fff00000c5a863c0
[   37.743311]  which belongs to the cache kmem_cache of size 208
[   37.745431] The buggy address is located 0 bytes inside of
[   37.745431]  freed 208-byte region [fff00000c5a863c0, fff00000c5a86490)
[   37.747977] 
[   37.748389] The buggy address belongs to the physical page:
[   37.749684] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a86
[   37.751998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.752865] page_type: f5(slab)
[   37.753363] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   37.754418] raw: 0000000000000000 00000000800c000c 00000001f5000000 0000000000000000
[   37.756032] page dumped because: kasan: bad access detected
[   37.757351] 
[   37.758136] Memory state around the buggy address:
[   37.758915]  fff00000c5a86280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.760452]  fff00000c5a86300: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   37.761548] >fff00000c5a86380: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   37.762506]                                            ^
[   37.763972]  fff00000c5a86400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.765001]  fff00000c5a86480: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.765952] ==================================================================

test log snippet boot parser 76

Home

[   37.560682] ==================================================================
[   37.562249] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x390/0x468
[   37.563298] Read of size 1 at addr fff00000c698a000 by task kunit_try_catch/201
[   37.564253] 
[   37.564653] CPU: 1 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   37.565980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.566799] Hardware name: linux,dummy-virt (DT)
[   37.567385] Call trace:
[   37.567796]  show_stack+0x20/0x38 (C)
[   37.568570]  dump_stack_lvl+0x8c/0xd0
[   37.569123]  print_report+0x118/0x5e0
[   37.569762]  kasan_report+0xc8/0x118
[   37.570364]  __asan_report_load1_noabort+0x20/0x30
[   37.570995]  kmem_cache_rcu_uaf+0x390/0x468
[   37.571578]  kunit_try_run_case+0x14c/0x3d0
[   37.572333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.573112]  kthread+0x24c/0x2d0
[   37.573790]  ret_from_fork+0x10/0x20
[   37.574356] 
[   37.574747] Allocated by task 201:
[   37.575321]  kasan_save_stack+0x3c/0x68
[   37.575897]  kasan_save_track+0x20/0x40
[   37.576447]  kasan_save_alloc_info+0x40/0x58
[   37.577016]  __kasan_slab_alloc+0xa8/0xb0
[   37.577836]  kmem_cache_alloc_noprof+0x108/0x398
[   37.578598]  kmem_cache_rcu_uaf+0x12c/0x468
[   37.579109]  kunit_try_run_case+0x14c/0x3d0
[   37.579802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.580558]  kthread+0x24c/0x2d0
[   37.581074]  ret_from_fork+0x10/0x20
[   37.581719] 
[   37.582041] Freed by task 0:
[   37.582612]  kasan_save_stack+0x3c/0x68
[   37.583160]  kasan_save_track+0x20/0x40
[   37.583736]  kasan_save_free_info+0x4c/0x78
[   37.584473]  __kasan_slab_free+0x6c/0x98
[   37.585023]  slab_free_after_rcu_debug+0xd4/0x2f8
[   37.585705]  rcu_core+0x9f4/0x1e20
[   37.586331]  rcu_core_si+0x18/0x30
[   37.586839]  handle_softirqs+0x374/0xb20
[   37.587606]  __do_softirq+0x1c/0x28
[   37.588210] 
[   37.588583] Last potentially related work creation:
[   37.589077]  kasan_save_stack+0x3c/0x68
[   37.589903]  __kasan_record_aux_stack+0xbc/0xe8
[   37.590430]  kasan_record_aux_stack_noalloc+0x14/0x20
[   37.591330]  kmem_cache_free+0x28c/0x470
[   37.591953]  kmem_cache_rcu_uaf+0x16c/0x468
[   37.592481]  kunit_try_run_case+0x14c/0x3d0
[   37.593224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.593913]  kthread+0x24c/0x2d0
[   37.594510]  ret_from_fork+0x10/0x20
[   37.594984] 
[   37.595450] The buggy address belongs to the object at fff00000c698a000
[   37.595450]  which belongs to the cache test_cache of size 200
[   37.597055] The buggy address is located 0 bytes inside of
[   37.597055]  freed 200-byte region [fff00000c698a000, fff00000c698a0c8)
[   37.598471] 
[   37.598847] The buggy address belongs to the physical page:
[   37.599702] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10698a
[   37.600559] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.601468] page_type: f5(slab)
[   37.601972] raw: 0bfffe0000000000 fff00000ffee0f00 dead000000000122 0000000000000000
[   37.602870] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   37.603755] page dumped because: kasan: bad access detected
[   37.604387] 
[   37.604766] Memory state around the buggy address:
[   37.605457]  fff00000c6989f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.606427]  fff00000c6989f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.607320] >fff00000c698a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.608276]                    ^
[   37.608795]  fff00000c698a080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   37.609725]  fff00000c698a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.610640] ==================================================================

test log snippet boot parser 77

Home

[   35.725759] ==================================================================
[   35.727582] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   35.729579] Read of size 1 at addr fff00000c1dfda00 by task kunit_try_catch/152
[   35.731400] 
[   35.732159] CPU: 1 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   35.734717] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.735956] Hardware name: linux,dummy-virt (DT)
[   35.736610] Call trace:
[   35.737177]  show_stack+0x20/0x38 (C)
[   35.737872]  dump_stack_lvl+0x8c/0xd0
[   35.738480]  print_report+0x118/0x5e0
[   35.740078]  kasan_report+0xc8/0x118
[   35.740867]  __asan_report_load1_noabort+0x20/0x30
[   35.741463]  krealloc_uaf+0x4c8/0x520
[   35.742316]  kunit_try_run_case+0x14c/0x3d0
[   35.743367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.744681]  kthread+0x24c/0x2d0
[   35.745253]  ret_from_fork+0x10/0x20
[   35.745942] 
[   35.746256] Allocated by task 152:
[   35.746690]  kasan_save_stack+0x3c/0x68
[   35.748586]  kasan_save_track+0x20/0x40
[   35.749300]  kasan_save_alloc_info+0x40/0x58
[   35.749926]  __kasan_kmalloc+0xd4/0xd8
[   35.750701]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.751272]  krealloc_uaf+0xc8/0x520
[   35.751916]  kunit_try_run_case+0x14c/0x3d0
[   35.753033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.754202]  kthread+0x24c/0x2d0
[   35.754725]  ret_from_fork+0x10/0x20
[   35.756182] 
[   35.756446] Freed by task 152:
[   35.757007]  kasan_save_stack+0x3c/0x68
[   35.757659]  kasan_save_track+0x20/0x40
[   35.758327]  kasan_save_free_info+0x4c/0x78
[   35.759137]  __kasan_slab_free+0x6c/0x98
[   35.759866]  kfree+0x114/0x3c8
[   35.760358]  krealloc_uaf+0x12c/0x520
[   35.760928]  kunit_try_run_case+0x14c/0x3d0
[   35.761962]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.762766]  kthread+0x24c/0x2d0
[   35.763784]  ret_from_fork+0x10/0x20
[   35.764648] 
[   35.764913] The buggy address belongs to the object at fff00000c1dfda00
[   35.764913]  which belongs to the cache kmalloc-256 of size 256
[   35.767566] The buggy address is located 0 bytes inside of
[   35.767566]  freed 256-byte region [fff00000c1dfda00, fff00000c1dfdb00)
[   35.769387] 
[   35.769856] The buggy address belongs to the physical page:
[   35.770613] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101dfc
[   35.772186] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.773856] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.775578] page_type: f5(slab)
[   35.775907] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   35.776350] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   35.777501] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   35.778747] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   35.780589] head: 0bfffe0000000001 ffffc1ffc3077f01 ffffffffffffffff 0000000000000000
[   35.781341] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   35.782286] page dumped because: kasan: bad access detected
[   35.782970] 
[   35.783420] Memory state around the buggy address:
[   35.785010]  fff00000c1dfd900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.786247]  fff00000c1dfd980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.788562] >fff00000c1dfda00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.790272]                    ^
[   35.790801]  fff00000c1dfda80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.792576]  fff00000c1dfdb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.794152] ==================================================================

test log snippet boot parser 78

Home

[   35.652567] ==================================================================
[   35.654188] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   35.655991] Read of size 1 at addr fff00000c1dfda00 by task kunit_try_catch/152
[   35.657056] 
[   35.657382] CPU: 1 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   35.658630] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.659852] Hardware name: linux,dummy-virt (DT)
[   35.661138] Call trace:
[   35.661776]  show_stack+0x20/0x38 (C)
[   35.662572]  dump_stack_lvl+0x8c/0xd0
[   35.663811]  print_report+0x118/0x5e0
[   35.664339]  kasan_report+0xc8/0x118
[   35.664991]  __kasan_check_byte+0x54/0x70
[   35.665796]  krealloc_noprof+0x44/0x360
[   35.666349]  krealloc_uaf+0x180/0x520
[   35.667604]  kunit_try_run_case+0x14c/0x3d0
[   35.668611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.669833]  kthread+0x24c/0x2d0
[   35.671121]  ret_from_fork+0x10/0x20
[   35.671851] 
[   35.672036] Allocated by task 152:
[   35.672295]  kasan_save_stack+0x3c/0x68
[   35.673618]  kasan_save_track+0x20/0x40
[   35.674462]  kasan_save_alloc_info+0x40/0x58
[   35.675871]  __kasan_kmalloc+0xd4/0xd8
[   35.676499]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.676924]  krealloc_uaf+0xc8/0x520
[   35.677200]  kunit_try_run_case+0x14c/0x3d0
[   35.678068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.679620]  kthread+0x24c/0x2d0
[   35.680736]  ret_from_fork+0x10/0x20
[   35.681730] 
[   35.682202] Freed by task 152:
[   35.682751]  kasan_save_stack+0x3c/0x68
[   35.683802]  kasan_save_track+0x20/0x40
[   35.684635]  kasan_save_free_info+0x4c/0x78
[   35.685081]  __kasan_slab_free+0x6c/0x98
[   35.685761]  kfree+0x114/0x3c8
[   35.686139]  krealloc_uaf+0x12c/0x520
[   35.686674]  kunit_try_run_case+0x14c/0x3d0
[   35.688213]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.689019]  kthread+0x24c/0x2d0
[   35.689851]  ret_from_fork+0x10/0x20
[   35.690681] 
[   35.691240] The buggy address belongs to the object at fff00000c1dfda00
[   35.691240]  which belongs to the cache kmalloc-256 of size 256
[   35.694616] The buggy address is located 0 bytes inside of
[   35.694616]  freed 256-byte region [fff00000c1dfda00, fff00000c1dfdb00)
[   35.695735] 
[   35.696688] The buggy address belongs to the physical page:
[   35.697447] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101dfc
[   35.698885] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.700317] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.701074] page_type: f5(slab)
[   35.702007] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   35.703567] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   35.704684] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   35.706679] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   35.708730] head: 0bfffe0000000001 ffffc1ffc3077f01 ffffffffffffffff 0000000000000000
[   35.709731] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   35.711600] page dumped because: kasan: bad access detected
[   35.713377] 
[   35.714051] Memory state around the buggy address:
[   35.714687]  fff00000c1dfd900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.716395]  fff00000c1dfd980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.717709] >fff00000c1dfda00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.719842]                    ^
[   35.720602]  fff00000c1dfda80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.721471]  fff00000c1dfdb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.722286] ==================================================================

test log snippet boot parser 79

Home

[   36.850149] ==================================================================
[   36.852590] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x600
[   36.853550] Read of size 1 at addr fff00000c61bc500 by task kunit_try_catch/184
[   36.854560] 
[   36.855325] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   36.856650] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.857402] Hardware name: linux,dummy-virt (DT)
[   36.858104] Call trace:
[   36.858572]  show_stack+0x20/0x38 (C)
[   36.859991]  dump_stack_lvl+0x8c/0xd0
[   36.860796]  print_report+0x118/0x5e0
[   36.861633]  kasan_report+0xc8/0x118
[   36.862349]  __kasan_check_byte+0x54/0x70
[   36.863603]  ksize+0x30/0x88
[   36.864629]  ksize_uaf+0x168/0x600
[   36.865295]  kunit_try_run_case+0x14c/0x3d0
[   36.866105]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.867389]  kthread+0x24c/0x2d0
[   36.868668]  ret_from_fork+0x10/0x20
[   36.869361] 
[   36.869693] Allocated by task 184:
[   36.870500]  kasan_save_stack+0x3c/0x68
[   36.871264]  kasan_save_track+0x20/0x40
[   36.871967]  kasan_save_alloc_info+0x40/0x58
[   36.873122]  __kasan_kmalloc+0xd4/0xd8
[   36.873849]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.874697]  ksize_uaf+0xb8/0x600
[   36.875209]  kunit_try_run_case+0x14c/0x3d0
[   36.875987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.877983]  kthread+0x24c/0x2d0
[   36.878548]  ret_from_fork+0x10/0x20
[   36.879173] 
[   36.879617] Freed by task 184:
[   36.880045]  kasan_save_stack+0x3c/0x68
[   36.880603]  kasan_save_track+0x20/0x40
[   36.881326]  kasan_save_free_info+0x4c/0x78
[   36.881910]  __kasan_slab_free+0x6c/0x98
[   36.882585]  kfree+0x114/0x3c8
[   36.883162]  ksize_uaf+0x11c/0x600
[   36.883683]  kunit_try_run_case+0x14c/0x3d0
[   36.884510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.885242]  kthread+0x24c/0x2d0
[   36.885722]  ret_from_fork+0x10/0x20
[   36.886178] 
[   36.886634] The buggy address belongs to the object at fff00000c61bc500
[   36.886634]  which belongs to the cache kmalloc-128 of size 128
[   36.887952] The buggy address is located 0 bytes inside of
[   36.887952]  freed 128-byte region [fff00000c61bc500, fff00000c61bc580)
[   36.889475] 
[   36.889916] The buggy address belongs to the physical page:
[   36.890795] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061bc
[   36.891789] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.892650] page_type: f5(slab)
[   36.893094] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.894053] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.895150] page dumped because: kasan: bad access detected
[   36.895849] 
[   36.896210] Memory state around the buggy address:
[   36.896916]  fff00000c61bc400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.897823]  fff00000c61bc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.898736] >fff00000c61bc500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.899662]                    ^
[   36.900274]  fff00000c61bc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.901120]  fff00000c61bc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.902056] ==================================================================

test log snippet boot parser 80

Home

[   36.904315] ==================================================================
[   36.905072] BUG: KASAN: slab-use-after-free in ksize_uaf+0x59c/0x600
[   36.906032] Read of size 1 at addr fff00000c61bc500 by task kunit_try_catch/184
[   36.907218] 
[   36.907608] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   36.908846] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.909445] Hardware name: linux,dummy-virt (DT)
[   36.910610] Call trace:
[   36.911418]  show_stack+0x20/0x38 (C)
[   36.912834]  dump_stack_lvl+0x8c/0xd0
[   36.914192]  print_report+0x118/0x5e0
[   36.914915]  kasan_report+0xc8/0x118
[   36.915465]  __asan_report_load1_noabort+0x20/0x30
[   36.916148]  ksize_uaf+0x59c/0x600
[   36.917209]  kunit_try_run_case+0x14c/0x3d0
[   36.917924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.918864]  kthread+0x24c/0x2d0
[   36.919405]  ret_from_fork+0x10/0x20
[   36.920063] 
[   36.920421] Allocated by task 184:
[   36.920986]  kasan_save_stack+0x3c/0x68
[   36.921596]  kasan_save_track+0x20/0x40
[   36.922176]  kasan_save_alloc_info+0x40/0x58
[   36.922817]  __kasan_kmalloc+0xd4/0xd8
[   36.923360]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.924090]  ksize_uaf+0xb8/0x600
[   36.924604]  kunit_try_run_case+0x14c/0x3d0
[   36.925292]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.926174]  kthread+0x24c/0x2d0
[   36.926656]  ret_from_fork+0x10/0x20
[   36.927307] 
[   36.927666] Freed by task 184:
[   36.928052]  kasan_save_stack+0x3c/0x68
[   36.928781]  kasan_save_track+0x20/0x40
[   36.929379]  kasan_save_free_info+0x4c/0x78
[   36.930080]  __kasan_slab_free+0x6c/0x98
[   36.930754]  kfree+0x114/0x3c8
[   36.931218]  ksize_uaf+0x11c/0x600
[   36.931903]  kunit_try_run_case+0x14c/0x3d0
[   36.932557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.933325]  kthread+0x24c/0x2d0
[   36.933829]  ret_from_fork+0x10/0x20
[   36.934513] 
[   36.934860] The buggy address belongs to the object at fff00000c61bc500
[   36.934860]  which belongs to the cache kmalloc-128 of size 128
[   36.936421] The buggy address is located 0 bytes inside of
[   36.936421]  freed 128-byte region [fff00000c61bc500, fff00000c61bc580)
[   36.937838] 
[   36.938188] The buggy address belongs to the physical page:
[   36.938921] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061bc
[   36.939950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.940749] page_type: f5(slab)
[   36.941441] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.942392] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.943244] page dumped because: kasan: bad access detected
[   36.943923] 
[   36.944305] Memory state around the buggy address:
[   36.944985]  fff00000c61bc400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.945922]  fff00000c61bc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.946873] >fff00000c61bc500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.947748]                    ^
[   36.948349]  fff00000c61bc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.949175]  fff00000c61bc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.950121] ==================================================================

test log snippet boot parser 81

Home

[   36.954080] ==================================================================
[   36.955048] BUG: KASAN: slab-use-after-free in ksize_uaf+0x548/0x600
[   36.955740] Read of size 1 at addr fff00000c61bc578 by task kunit_try_catch/184
[   36.956451] 
[   36.956881] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   36.958127] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.958728] Hardware name: linux,dummy-virt (DT)
[   36.959310] Call trace:
[   36.959901]  show_stack+0x20/0x38 (C)
[   36.960499]  dump_stack_lvl+0x8c/0xd0
[   36.961218]  print_report+0x118/0x5e0
[   36.961886]  kasan_report+0xc8/0x118
[   36.962420]  __asan_report_load1_noabort+0x20/0x30
[   36.963190]  ksize_uaf+0x548/0x600
[   36.963822]  kunit_try_run_case+0x14c/0x3d0
[   36.964561]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.965222]  kthread+0x24c/0x2d0
[   36.965953]  ret_from_fork+0x10/0x20
[   36.966712] 
[   36.966981] Allocated by task 184:
[   36.967567]  kasan_save_stack+0x3c/0x68
[   36.968114]  kasan_save_track+0x20/0x40
[   36.968720]  kasan_save_alloc_info+0x40/0x58
[   36.969336]  __kasan_kmalloc+0xd4/0xd8
[   36.969959]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.970709]  ksize_uaf+0xb8/0x600
[   36.971301]  kunit_try_run_case+0x14c/0x3d0
[   36.971843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.972734]  kthread+0x24c/0x2d0
[   36.973216]  ret_from_fork+0x10/0x20
[   36.973842] 
[   36.974147] Freed by task 184:
[   36.974784]  kasan_save_stack+0x3c/0x68
[   36.975302]  kasan_save_track+0x20/0x40
[   36.976049]  kasan_save_free_info+0x4c/0x78
[   36.976570]  __kasan_slab_free+0x6c/0x98
[   36.977229]  kfree+0x114/0x3c8
[   36.977780]  ksize_uaf+0x11c/0x600
[   36.978363]  kunit_try_run_case+0x14c/0x3d0
[   36.979078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.979846]  kthread+0x24c/0x2d0
[   36.980314]  ret_from_fork+0x10/0x20
[   36.980784] 
[   36.981217] The buggy address belongs to the object at fff00000c61bc500
[   36.981217]  which belongs to the cache kmalloc-128 of size 128
[   36.982783] The buggy address is located 120 bytes inside of
[   36.982783]  freed 128-byte region [fff00000c61bc500, fff00000c61bc580)
[   36.984191] 
[   36.984627] The buggy address belongs to the physical page:
[   36.985270] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061bc
[   36.986370] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.987307] page_type: f5(slab)
[   36.987863] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.988808] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.989727] page dumped because: kasan: bad access detected
[   36.990497] 
[   36.990901] Memory state around the buggy address:
[   36.991498]  fff00000c61bc400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.992389]  fff00000c61bc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.993304] >fff00000c61bc500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.994269]                                                                 ^
[   36.995165]  fff00000c61bc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.996194]  fff00000c61bc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.997168] ==================================================================

test log snippet boot parser 82

Home

[   38.537321] ==================================================================
[   38.538973] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   38.540541] Read of size 1 at addr fff00000c6196e00 by task kunit_try_catch/215
[   38.542006] 
[   38.542261] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   38.543795] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.544789] Hardware name: linux,dummy-virt (DT)
[   38.545609] Call trace:
[   38.546180]  show_stack+0x20/0x38 (C)
[   38.547425]  dump_stack_lvl+0x8c/0xd0
[   38.548036]  print_report+0x118/0x5e0
[   38.548447]  kasan_report+0xc8/0x118
[   38.549585]  __asan_report_load1_noabort+0x20/0x30
[   38.550549]  mempool_uaf_helper+0x314/0x340
[   38.551275]  mempool_kmalloc_uaf+0xbc/0x118
[   38.552427]  kunit_try_run_case+0x14c/0x3d0
[   38.553220]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.554171]  kthread+0x24c/0x2d0
[   38.555228]  ret_from_fork+0x10/0x20
[   38.556005] 
[   38.556321] Allocated by task 215:
[   38.556833]  kasan_save_stack+0x3c/0x68
[   38.557402]  kasan_save_track+0x20/0x40
[   38.557969]  kasan_save_alloc_info+0x40/0x58
[   38.558648]  __kasan_mempool_unpoison_object+0x11c/0x180
[   38.559670]  remove_element+0x130/0x1f8
[   38.560401]  mempool_alloc_preallocated+0x58/0xc0
[   38.561646]  mempool_uaf_helper+0xa4/0x340
[   38.562756]  mempool_kmalloc_uaf+0xbc/0x118
[   38.563453]  kunit_try_run_case+0x14c/0x3d0
[   38.564887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.565835]  kthread+0x24c/0x2d0
[   38.566595]  ret_from_fork+0x10/0x20
[   38.567586] 
[   38.567982] Freed by task 215:
[   38.568809]  kasan_save_stack+0x3c/0x68
[   38.569507]  kasan_save_track+0x20/0x40
[   38.570237]  kasan_save_free_info+0x4c/0x78
[   38.571048]  __kasan_mempool_poison_object+0xc0/0x150
[   38.572181]  mempool_free+0x28c/0x328
[   38.573060]  mempool_uaf_helper+0x104/0x340
[   38.573897]  mempool_kmalloc_uaf+0xbc/0x118
[   38.574657]  kunit_try_run_case+0x14c/0x3d0
[   38.575832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.576729]  kthread+0x24c/0x2d0
[   38.577237]  ret_from_fork+0x10/0x20
[   38.578021] 
[   38.578450] The buggy address belongs to the object at fff00000c6196e00
[   38.578450]  which belongs to the cache kmalloc-128 of size 128
[   38.580989] The buggy address is located 0 bytes inside of
[   38.580989]  freed 128-byte region [fff00000c6196e00, fff00000c6196e80)
[   38.582938] 
[   38.583509] The buggy address belongs to the physical page:
[   38.584184] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106196
[   38.586178] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.587133] page_type: f5(slab)
[   38.587698] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   38.589295] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   38.590381] page dumped because: kasan: bad access detected
[   38.591220] 
[   38.591969] Memory state around the buggy address:
[   38.592560]  fff00000c6196d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.593438]  fff00000c6196d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.594346] >fff00000c6196e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.595346]                    ^
[   38.596355]  fff00000c6196e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.597603]  fff00000c6196f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.598552] ==================================================================

test log snippet boot parser 83

Home

[   38.669230] ==================================================================
[   38.670472] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   38.671431] Read of size 1 at addr fff00000c6996240 by task kunit_try_catch/219
[   38.672317] 
[   38.673455] CPU: 1 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   38.674543] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.675809] Hardware name: linux,dummy-virt (DT)
[   38.676329] Call trace:
[   38.676971]  show_stack+0x20/0x38 (C)
[   38.677687]  dump_stack_lvl+0x8c/0xd0
[   38.678395]  print_report+0x118/0x5e0
[   38.679687]  kasan_report+0xc8/0x118
[   38.680418]  __asan_report_load1_noabort+0x20/0x30
[   38.681161]  mempool_uaf_helper+0x314/0x340
[   38.681785]  mempool_slab_uaf+0xb8/0x110
[   38.682442]  kunit_try_run_case+0x14c/0x3d0
[   38.683273]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.684298]  kthread+0x24c/0x2d0
[   38.684843]  ret_from_fork+0x10/0x20
[   38.685579] 
[   38.685885] Allocated by task 219:
[   38.686343]  kasan_save_stack+0x3c/0x68
[   38.687574]  kasan_save_track+0x20/0x40
[   38.688727]  kasan_save_alloc_info+0x40/0x58
[   38.689574]  __kasan_mempool_unpoison_object+0xbc/0x180
[   38.690466]  remove_element+0x16c/0x1f8
[   38.691994]  mempool_alloc_preallocated+0x58/0xc0
[   38.692675]  mempool_uaf_helper+0xa4/0x340
[   38.693173]  mempool_slab_uaf+0xb8/0x110
[   38.693884]  kunit_try_run_case+0x14c/0x3d0
[   38.694416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.695290]  kthread+0x24c/0x2d0
[   38.695897]  ret_from_fork+0x10/0x20
[   38.696871] 
[   38.697185] Freed by task 219:
[   38.698571]  kasan_save_stack+0x3c/0x68
[   38.699470]  kasan_save_track+0x20/0x40
[   38.700341]  kasan_save_free_info+0x4c/0x78
[   38.701192]  __kasan_mempool_poison_object+0xc0/0x150
[   38.702052]  mempool_free+0x28c/0x328
[   38.702647]  mempool_uaf_helper+0x104/0x340
[   38.703384]  mempool_slab_uaf+0xb8/0x110
[   38.704352]  kunit_try_run_case+0x14c/0x3d0
[   38.705454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.706272]  kthread+0x24c/0x2d0
[   38.707226]  ret_from_fork+0x10/0x20
[   38.707763] 
[   38.708242] The buggy address belongs to the object at fff00000c6996240
[   38.708242]  which belongs to the cache test_cache of size 123
[   38.709863] The buggy address is located 0 bytes inside of
[   38.709863]  freed 123-byte region [fff00000c6996240, fff00000c69962bb)
[   38.711868] 
[   38.712618] The buggy address belongs to the physical page:
[   38.713561] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106996
[   38.714482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.715667] page_type: f5(slab)
[   38.716484] raw: 0bfffe0000000000 fff00000c1763a00 dead000000000122 0000000000000000
[   38.717915] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   38.719224] page dumped because: kasan: bad access detected
[   38.720488] 
[   38.720871] Memory state around the buggy address:
[   38.721506]  fff00000c6996100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.723075]  fff00000c6996180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.724280] >fff00000c6996200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   38.725106]                                            ^
[   38.726050]  fff00000c6996280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.728145]  fff00000c6996300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.729187] ==================================================================

test log snippet boot parser 84

Home

[   37.027477] ==================================================================
[   37.028717] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   37.029865] Read of size 4 at addr fff00000c61a5d00 by task swapper/1/0
[   37.030566] 
[   37.030916] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N 6.13.0-rc7 #1
[   37.031808] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.032367] Hardware name: linux,dummy-virt (DT)
[   37.032980] Call trace:
[   37.033463]  show_stack+0x20/0x38 (C)
[   37.034067]  dump_stack_lvl+0x8c/0xd0
[   37.034700]  print_report+0x118/0x5e0
[   37.035383]  kasan_report+0xc8/0x118
[   37.035948]  __asan_report_load4_noabort+0x20/0x30
[   37.036705]  rcu_uaf_reclaim+0x64/0x70
[   37.037292]  rcu_core+0x9f4/0x1e20
[   37.037852]  rcu_core_si+0x18/0x30
[   37.038474]  handle_softirqs+0x374/0xb20
[   37.039012]  __do_softirq+0x1c/0x28
[   37.039720]  ____do_softirq+0x18/0x30
[   37.040444]  call_on_irq_stack+0x24/0x58
[   37.041300]  do_softirq_own_stack+0x24/0x38
[   37.041992]  __irq_exit_rcu+0x1fc/0x318
[   37.042614]  irq_exit_rcu+0x1c/0x80
[   37.043109]  el1_interrupt+0x38/0x58
[   37.043783]  el1h_64_irq_handler+0x18/0x28
[   37.044415]  el1h_64_irq+0x6c/0x70
[   37.045088]  arch_local_irq_enable+0x4/0x8 (P)
[   37.045764]  do_idle+0x384/0x4e8
[   37.046569]  cpu_startup_entry+0x64/0x80
[   37.047326]  secondary_start_kernel+0x288/0x340
[   37.047962]  __secondary_switched+0xc0/0xc8
[   37.048667] 
[   37.048979] Allocated by task 186:
[   37.049472]  kasan_save_stack+0x3c/0x68
[   37.050093]  kasan_save_track+0x20/0x40
[   37.050754]  kasan_save_alloc_info+0x40/0x58
[   37.051345]  __kasan_kmalloc+0xd4/0xd8
[   37.051975]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.052589]  rcu_uaf+0xb0/0x2d0
[   37.053146]  kunit_try_run_case+0x14c/0x3d0
[   37.053827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.054594]  kthread+0x24c/0x2d0
[   37.055123]  ret_from_fork+0x10/0x20
[   37.055760] 
[   37.056076] Freed by task 0:
[   37.056635]  kasan_save_stack+0x3c/0x68
[   37.057211]  kasan_save_track+0x20/0x40
[   37.058025]  kasan_save_free_info+0x4c/0x78
[   37.058592]  __kasan_slab_free+0x6c/0x98
[   37.059216]  kfree+0x114/0x3c8
[   37.059891]  rcu_uaf_reclaim+0x28/0x70
[   37.060587]  rcu_core+0x9f4/0x1e20
[   37.061116]  rcu_core_si+0x18/0x30
[   37.061689]  handle_softirqs+0x374/0xb20
[   37.062253]  __do_softirq+0x1c/0x28
[   37.062927] 
[   37.063293] Last potentially related work creation:
[   37.063992]  kasan_save_stack+0x3c/0x68
[   37.064635]  __kasan_record_aux_stack+0xbc/0xe8
[   37.065293]  kasan_record_aux_stack_noalloc+0x14/0x20
[   37.066090]  __call_rcu_common.constprop.0+0x74/0xa10
[   37.066779]  call_rcu+0x18/0x30
[   37.067243]  rcu_uaf+0x14c/0x2d0
[   37.067927]  kunit_try_run_case+0x14c/0x3d0
[   37.068507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.069467]  kthread+0x24c/0x2d0
[   37.070065]  ret_from_fork+0x10/0x20
[   37.070841] 
[   37.071239] The buggy address belongs to the object at fff00000c61a5d00
[   37.071239]  which belongs to the cache kmalloc-32 of size 32
[   37.072654] The buggy address is located 0 bytes inside of
[   37.072654]  freed 32-byte region [fff00000c61a5d00, fff00000c61a5d20)
[   37.073784] 
[   37.074212] The buggy address belongs to the physical page:
[   37.075083] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a5
[   37.076065] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.077139] page_type: f5(slab)
[   37.077795] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   37.078651] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   37.079775] page dumped because: kasan: bad access detected
[   37.080489] 
[   37.080913] Memory state around the buggy address:
[   37.081662]  fff00000c61a5c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   37.082541]  fff00000c61a5c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   37.083362] >fff00000c61a5d00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   37.084276]                    ^
[   37.084810]  fff00000c61a5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.085681]  fff00000c61a5e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.086642] ==================================================================

test log snippet boot parser 85

Home

[   39.412963] ==================================================================
[   39.414060] BUG: KASAN: slab-use-after-free in strchr+0xcc/0xd8
[   39.414930] Read of size 1 at addr fff00000c69eb490 by task kunit_try_catch/247
[   39.415980] 
[   39.416444] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   39.418331] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.419457] Hardware name: linux,dummy-virt (DT)
[   39.420128] Call trace:
[   39.420558]  show_stack+0x20/0x38 (C)
[   39.421162]  dump_stack_lvl+0x8c/0xd0
[   39.421808]  print_report+0x118/0x5e0
[   39.422476]  kasan_report+0xc8/0x118
[   39.423044]  __asan_report_load1_noabort+0x20/0x30
[   39.423883]  strchr+0xcc/0xd8
[   39.424427]  kasan_strings+0x180/0x8f8
[   39.425679]  kunit_try_run_case+0x14c/0x3d0
[   39.426286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.427611]  kthread+0x24c/0x2d0
[   39.428149]  ret_from_fork+0x10/0x20
[   39.428835] 
[   39.429303] Allocated by task 247:
[   39.429938]  kasan_save_stack+0x3c/0x68
[   39.430463]  kasan_save_track+0x20/0x40
[   39.432583]  kasan_save_alloc_info+0x40/0x58
[   39.433402]  __kasan_kmalloc+0xd4/0xd8
[   39.433933]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.434778]  kasan_strings+0xb4/0x8f8
[   39.435835]  kunit_try_run_case+0x14c/0x3d0
[   39.436387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.437291]  kthread+0x24c/0x2d0
[   39.438043]  ret_from_fork+0x10/0x20
[   39.438648] 
[   39.439449] Freed by task 247:
[   39.440300]  kasan_save_stack+0x3c/0x68
[   39.440970]  kasan_save_track+0x20/0x40
[   39.442036]  kasan_save_free_info+0x4c/0x78
[   39.442756]  __kasan_slab_free+0x6c/0x98
[   39.443672]  kfree+0x114/0x3c8
[   39.444177]  kasan_strings+0x128/0x8f8
[   39.444869]  kunit_try_run_case+0x14c/0x3d0
[   39.445447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.446364]  kthread+0x24c/0x2d0
[   39.447001]  ret_from_fork+0x10/0x20
[   39.448060] 
[   39.448412] The buggy address belongs to the object at fff00000c69eb480
[   39.448412]  which belongs to the cache kmalloc-32 of size 32
[   39.449860] The buggy address is located 16 bytes inside of
[   39.449860]  freed 32-byte region [fff00000c69eb480, fff00000c69eb4a0)
[   39.451876] 
[   39.452712] The buggy address belongs to the physical page:
[   39.453340] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069eb
[   39.455052] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.456473] page_type: f5(slab)
[   39.457182] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   39.458190] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   39.459362] page dumped because: kasan: bad access detected
[   39.460085] 
[   39.460939] Memory state around the buggy address:
[   39.461694]  fff00000c69eb380: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   39.462626]  fff00000c69eb400: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   39.463960] >fff00000c69eb480: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   39.464890]                          ^
[   39.465609]  fff00000c69eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.466502]  fff00000c69eb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.467959] ==================================================================

test log snippet boot parser 86

Home

[   39.525779] ==================================================================
[   39.526652] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   39.529785] Read of size 1 at addr fff00000c69eb490 by task kunit_try_catch/247
[   39.531114] 
[   39.531552] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   39.532678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.533167] Hardware name: linux,dummy-virt (DT)
[   39.534239] Call trace:
[   39.534800]  show_stack+0x20/0x38 (C)
[   39.535398]  dump_stack_lvl+0x8c/0xd0
[   39.536106]  print_report+0x118/0x5e0
[   39.536765]  kasan_report+0xc8/0x118
[   39.538158]  __asan_report_load1_noabort+0x20/0x30
[   39.539006]  strcmp+0xc0/0xc8
[   39.539410]  kasan_strings+0x248/0x8f8
[   39.540001]  kunit_try_run_case+0x14c/0x3d0
[   39.540436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.541383]  kthread+0x24c/0x2d0
[   39.542124]  ret_from_fork+0x10/0x20
[   39.542860] 
[   39.543165] Allocated by task 247:
[   39.544222]  kasan_save_stack+0x3c/0x68
[   39.544957]  kasan_save_track+0x20/0x40
[   39.545562]  kasan_save_alloc_info+0x40/0x58
[   39.546107]  __kasan_kmalloc+0xd4/0xd8
[   39.547462]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.548659]  kasan_strings+0xb4/0x8f8
[   39.550183]  kunit_try_run_case+0x14c/0x3d0
[   39.551365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.552730]  kthread+0x24c/0x2d0
[   39.553310]  ret_from_fork+0x10/0x20
[   39.554263] 
[   39.554580] Freed by task 247:
[   39.555048]  kasan_save_stack+0x3c/0x68
[   39.555629]  kasan_save_track+0x20/0x40
[   39.557758]  kasan_save_free_info+0x4c/0x78
[   39.558443]  __kasan_slab_free+0x6c/0x98
[   39.559444]  kfree+0x114/0x3c8
[   39.560132]  kasan_strings+0x128/0x8f8
[   39.560882]  kunit_try_run_case+0x14c/0x3d0
[   39.561661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.562488]  kthread+0x24c/0x2d0
[   39.563100]  ret_from_fork+0x10/0x20
[   39.564109] 
[   39.564610] The buggy address belongs to the object at fff00000c69eb480
[   39.564610]  which belongs to the cache kmalloc-32 of size 32
[   39.566223] The buggy address is located 16 bytes inside of
[   39.566223]  freed 32-byte region [fff00000c69eb480, fff00000c69eb4a0)
[   39.568489] 
[   39.569023] The buggy address belongs to the physical page:
[   39.570593] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069eb
[   39.571916] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.573141] page_type: f5(slab)
[   39.573903] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   39.575221] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   39.576494] page dumped because: kasan: bad access detected
[   39.577423] 
[   39.577907] Memory state around the buggy address:
[   39.578545]  fff00000c69eb380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   39.580296]  fff00000c69eb400: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   39.581398] >fff00000c69eb480: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   39.582239]                          ^
[   39.583589]  fff00000c69eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.584640]  fff00000c69eb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.585767] ==================================================================

test log snippet boot parser 87

Home

[   39.647114] ==================================================================
[   39.648671] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   39.650182] Read of size 1 at addr fff00000c69eb490 by task kunit_try_catch/247
[   39.652680] 
[   39.653042] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   39.654682] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.656416] Hardware name: linux,dummy-virt (DT)
[   39.657216] Call trace:
[   39.657577]  show_stack+0x20/0x38 (C)
[   39.658413]  dump_stack_lvl+0x8c/0xd0
[   39.659576]  print_report+0x118/0x5e0
[   39.660335]  kasan_report+0xc8/0x118
[   39.660919]  __asan_report_load1_noabort+0x20/0x30
[   39.661754]  strlen+0xa8/0xb0
[   39.662241]  kasan_strings+0x320/0x8f8
[   39.663394]  kunit_try_run_case+0x14c/0x3d0
[   39.664481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.665319]  kthread+0x24c/0x2d0
[   39.665964]  ret_from_fork+0x10/0x20
[   39.666709] 
[   39.667391] Allocated by task 247:
[   39.668399]  kasan_save_stack+0x3c/0x68
[   39.668909]  kasan_save_track+0x20/0x40
[   39.669217]  kasan_save_alloc_info+0x40/0x58
[   39.669594]  __kasan_kmalloc+0xd4/0xd8
[   39.669991]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.671280]  kasan_strings+0xb4/0x8f8
[   39.672674]  kunit_try_run_case+0x14c/0x3d0
[   39.673664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.674689]  kthread+0x24c/0x2d0
[   39.675564]  ret_from_fork+0x10/0x20
[   39.676108] 
[   39.676448] Freed by task 247:
[   39.677735]  kasan_save_stack+0x3c/0x68
[   39.678671]  kasan_save_track+0x20/0x40
[   39.679842]  kasan_save_free_info+0x4c/0x78
[   39.680850]  __kasan_slab_free+0x6c/0x98
[   39.681773]  kfree+0x114/0x3c8
[   39.682565]  kasan_strings+0x128/0x8f8
[   39.683712]  kunit_try_run_case+0x14c/0x3d0
[   39.684083]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.684440]  kthread+0x24c/0x2d0
[   39.684814]  ret_from_fork+0x10/0x20
[   39.685791] 
[   39.686157] The buggy address belongs to the object at fff00000c69eb480
[   39.686157]  which belongs to the cache kmalloc-32 of size 32
[   39.688014] The buggy address is located 16 bytes inside of
[   39.688014]  freed 32-byte region [fff00000c69eb480, fff00000c69eb4a0)
[   39.689796] 
[   39.690387] The buggy address belongs to the physical page:
[   39.691701] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069eb
[   39.692854] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.694092] page_type: f5(slab)
[   39.694630] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   39.695962] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   39.696898] page dumped because: kasan: bad access detected
[   39.697800] 
[   39.698182] Memory state around the buggy address:
[   39.698806]  fff00000c69eb380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   39.700179]  fff00000c69eb400: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   39.701219] >fff00000c69eb480: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   39.702181]                          ^
[   39.702762]  fff00000c69eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.704054]  fff00000c69eb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.705638] ==================================================================

test log snippet boot parser 88

Home

[   39.707691] ==================================================================
[   39.708582] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   39.710532] Read of size 1 at addr fff00000c69eb490 by task kunit_try_catch/247
[   39.711785] 
[   39.712217] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   39.713442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.714211] Hardware name: linux,dummy-virt (DT)
[   39.715464] Call trace:
[   39.716239]  show_stack+0x20/0x38 (C)
[   39.716698]  dump_stack_lvl+0x8c/0xd0
[   39.717470]  print_report+0x118/0x5e0
[   39.718257]  kasan_report+0xc8/0x118
[   39.719300]  __asan_report_load1_noabort+0x20/0x30
[   39.720338]  strnlen+0x80/0x88
[   39.721052]  kasan_strings+0x380/0x8f8
[   39.721737]  kunit_try_run_case+0x14c/0x3d0
[   39.722490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.723599]  kthread+0x24c/0x2d0
[   39.724130]  ret_from_fork+0x10/0x20
[   39.724741] 
[   39.725166] Allocated by task 247:
[   39.726035]  kasan_save_stack+0x3c/0x68
[   39.726918]  kasan_save_track+0x20/0x40
[   39.728079]  kasan_save_alloc_info+0x40/0x58
[   39.729659]  __kasan_kmalloc+0xd4/0xd8
[   39.730309]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.731168]  kasan_strings+0xb4/0x8f8
[   39.732083]  kunit_try_run_case+0x14c/0x3d0
[   39.732971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.733845]  kthread+0x24c/0x2d0
[   39.734467]  ret_from_fork+0x10/0x20
[   39.735508] 
[   39.735902] Freed by task 247:
[   39.736627]  kasan_save_stack+0x3c/0x68
[   39.737271]  kasan_save_track+0x20/0x40
[   39.737964]  kasan_save_free_info+0x4c/0x78
[   39.738741]  __kasan_slab_free+0x6c/0x98
[   39.739612]  kfree+0x114/0x3c8
[   39.740449]  kasan_strings+0x128/0x8f8
[   39.741085]  kunit_try_run_case+0x14c/0x3d0
[   39.741866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.742745]  kthread+0x24c/0x2d0
[   39.743734]  ret_from_fork+0x10/0x20
[   39.744469] 
[   39.744888] The buggy address belongs to the object at fff00000c69eb480
[   39.744888]  which belongs to the cache kmalloc-32 of size 32
[   39.746511] The buggy address is located 16 bytes inside of
[   39.746511]  freed 32-byte region [fff00000c69eb480, fff00000c69eb4a0)
[   39.748306] 
[   39.748663] The buggy address belongs to the physical page:
[   39.749420] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069eb
[   39.752264] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.753655] page_type: f5(slab)
[   39.754408] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   39.755942] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   39.756847] page dumped because: kasan: bad access detected
[   39.757785] 
[   39.758168] Memory state around the buggy address:
[   39.759390]  fff00000c69eb380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   39.760538]  fff00000c69eb400: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   39.761443] >fff00000c69eb480: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   39.762464]                          ^
[   39.763017]  fff00000c69eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.763897]  fff00000c69eb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.764790] ==================================================================

test log snippet boot parser 89

Home

[   39.470207] ==================================================================
[   39.471549] BUG: KASAN: slab-use-after-free in strrchr+0x6c/0x78
[   39.472199] Read of size 1 at addr fff00000c69eb490 by task kunit_try_catch/247
[   39.473314] 
[   39.474779] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   39.476433] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.477161] Hardware name: linux,dummy-virt (DT)
[   39.478219] Call trace:
[   39.478745]  show_stack+0x20/0x38 (C)
[   39.479311]  dump_stack_lvl+0x8c/0xd0
[   39.479979]  print_report+0x118/0x5e0
[   39.481073]  kasan_report+0xc8/0x118
[   39.481957]  __asan_report_load1_noabort+0x20/0x30
[   39.482963]  strrchr+0x6c/0x78
[   39.483593]  kasan_strings+0x1e0/0x8f8
[   39.484573]  kunit_try_run_case+0x14c/0x3d0
[   39.485406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.486403]  kthread+0x24c/0x2d0
[   39.487791]  ret_from_fork+0x10/0x20
[   39.488357] 
[   39.488736] Allocated by task 247:
[   39.489249]  kasan_save_stack+0x3c/0x68
[   39.489992]  kasan_save_track+0x20/0x40
[   39.490468]  kasan_save_alloc_info+0x40/0x58
[   39.491460]  __kasan_kmalloc+0xd4/0xd8
[   39.492987]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.493565]  kasan_strings+0xb4/0x8f8
[   39.493989]  kunit_try_run_case+0x14c/0x3d0
[   39.494764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.495443]  kthread+0x24c/0x2d0
[   39.496136]  ret_from_fork+0x10/0x20
[   39.496816] 
[   39.497214] Freed by task 247:
[   39.498307]  kasan_save_stack+0x3c/0x68
[   39.499382]  kasan_save_track+0x20/0x40
[   39.499951]  kasan_save_free_info+0x4c/0x78
[   39.500640]  __kasan_slab_free+0x6c/0x98
[   39.501135]  kfree+0x114/0x3c8
[   39.501946]  kasan_strings+0x128/0x8f8
[   39.502692]  kunit_try_run_case+0x14c/0x3d0
[   39.503343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.504547]  kthread+0x24c/0x2d0
[   39.505054]  ret_from_fork+0x10/0x20
[   39.505677] 
[   39.506006] The buggy address belongs to the object at fff00000c69eb480
[   39.506006]  which belongs to the cache kmalloc-32 of size 32
[   39.507736] The buggy address is located 16 bytes inside of
[   39.507736]  freed 32-byte region [fff00000c69eb480, fff00000c69eb4a0)
[   39.509361] 
[   39.509838] The buggy address belongs to the physical page:
[   39.510691] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069eb
[   39.512419] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.513086] page_type: f5(slab)
[   39.513584] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   39.515001] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   39.516143] page dumped because: kasan: bad access detected
[   39.516825] 
[   39.517174] Memory state around the buggy address:
[   39.517924]  fff00000c69eb380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   39.519256]  fff00000c69eb400: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   39.520240] >fff00000c69eb480: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   39.520995]                          ^
[   39.521733]  fff00000c69eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.523224]  fff00000c69eb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.524136] ==================================================================

test log snippet boot parser 90

Home

[   37.108010] ==================================================================
[   37.108957] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   37.109914] Read of size 8 at addr fff00000c61a5e40 by task kunit_try_catch/188
[   37.110869] 
[   37.111193] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   37.113869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.114372] Hardware name: linux,dummy-virt (DT)
[   37.115744] Call trace:
[   37.116919]  show_stack+0x20/0x38 (C)
[   37.117580]  dump_stack_lvl+0x8c/0xd0
[   37.118200]  print_report+0x118/0x5e0
[   37.119283]  kasan_report+0xc8/0x118
[   37.119952]  __asan_report_load8_noabort+0x20/0x30
[   37.121545]  workqueue_uaf+0x480/0x4a8
[   37.122231]  kunit_try_run_case+0x14c/0x3d0
[   37.122916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.124422]  kthread+0x24c/0x2d0
[   37.125054]  ret_from_fork+0x10/0x20
[   37.125778] 
[   37.126204] Allocated by task 188:
[   37.127191]  kasan_save_stack+0x3c/0x68
[   37.128285]  kasan_save_track+0x20/0x40
[   37.129138]  kasan_save_alloc_info+0x40/0x58
[   37.130091]  __kasan_kmalloc+0xd4/0xd8
[   37.130674]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.131415]  workqueue_uaf+0x13c/0x4a8
[   37.131906]  kunit_try_run_case+0x14c/0x3d0
[   37.133197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.134267]  kthread+0x24c/0x2d0
[   37.135187]  ret_from_fork+0x10/0x20
[   37.135920] 
[   37.136476] Freed by task 31:
[   37.136852]  kasan_save_stack+0x3c/0x68
[   37.137400]  kasan_save_track+0x20/0x40
[   37.138118]  kasan_save_free_info+0x4c/0x78
[   37.139697]  __kasan_slab_free+0x6c/0x98
[   37.140671]  kfree+0x114/0x3c8
[   37.141132]  workqueue_uaf_work+0x18/0x30
[   37.141842]  process_one_work+0x530/0xf98
[   37.142356]  worker_thread+0x614/0xf28
[   37.143600]  kthread+0x24c/0x2d0
[   37.144751]  ret_from_fork+0x10/0x20
[   37.146114] 
[   37.147014] Last potentially related work creation:
[   37.148588]  kasan_save_stack+0x3c/0x68
[   37.149432]  __kasan_record_aux_stack+0xbc/0xe8
[   37.150127]  kasan_record_aux_stack_noalloc+0x14/0x20
[   37.151373]  __queue_work+0x65c/0xfd8
[   37.152018]  queue_work_on+0xbc/0xf8
[   37.152425]  workqueue_uaf+0x210/0x4a8
[   37.152888]  kunit_try_run_case+0x14c/0x3d0
[   37.153735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.154727]  kthread+0x24c/0x2d0
[   37.155668]  ret_from_fork+0x10/0x20
[   37.156405] 
[   37.157145] The buggy address belongs to the object at fff00000c61a5e40
[   37.157145]  which belongs to the cache kmalloc-32 of size 32
[   37.158953] The buggy address is located 0 bytes inside of
[   37.158953]  freed 32-byte region [fff00000c61a5e40, fff00000c61a5e60)
[   37.160480] 
[   37.160926] The buggy address belongs to the physical page:
[   37.162118] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a5
[   37.163861] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.165548] page_type: f5(slab)
[   37.166256] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   37.167292] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   37.168493] page dumped because: kasan: bad access detected
[   37.169749] 
[   37.170336] Memory state around the buggy address:
[   37.171137]  fff00000c61a5d00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   37.171898]  fff00000c61a5d80: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc
[   37.172959] >fff00000c61a5e00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   37.174540]                                            ^
[   37.175474]  fff00000c61a5e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.177028]  fff00000c61a5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.178812] ==================================================================

test log snippet boot parser 91

Home

[   39.135639] ==================================================================
[   39.137226] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x230/0x268
[   39.138471] Read of size 1 at addr ffff800080b67cba by task kunit_try_catch/237
[   39.140070] 
[   39.140910] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   39.142438] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.143416] Hardware name: linux,dummy-virt (DT)
[   39.144100] Call trace:
[   39.144718]  show_stack+0x20/0x38 (C)
[   39.145559]  dump_stack_lvl+0x8c/0xd0
[   39.146347]  print_report+0x2fc/0x5e0
[   39.147214]  kasan_report+0xc8/0x118
[   39.147847]  __asan_report_load1_noabort+0x20/0x30
[   39.148551]  kasan_stack_oob+0x230/0x268
[   39.149718]  kunit_try_run_case+0x14c/0x3d0
[   39.150565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.151881]  kthread+0x24c/0x2d0
[   39.152741]  ret_from_fork+0x10/0x20
[   39.154332] 
[   39.154852] The buggy address belongs to stack of task kunit_try_catch/237
[   39.156137]  and is located at offset 138 in frame:
[   39.156803]  kasan_stack_oob+0x0/0x268
[   39.157782] 
[   39.158163] This frame has 4 objects:
[   39.159051]  [48, 49) '__assertion'
[   39.159231]  [64, 72) 'array'
[   39.159800]  [96, 112) '__assertion'
[   39.160884]  [128, 138) 'stack_array'
[   39.161863] 
[   39.163203] The buggy address belongs to the virtual mapping at
[   39.163203]  [ffff800080b60000, ffff800080b69000) created by:
[   39.163203]  kernel_clone+0x140/0x788
[   39.165155] 
[   39.165693] The buggy address belongs to the physical page:
[   39.166383] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a98
[   39.167975] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.170045] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   39.171128] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.171847] page dumped because: kasan: bad access detected
[   39.173472] 
[   39.173741] Memory state around the buggy address:
[   39.174063]  ffff800080b67b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.174487]  ffff800080b67c00: 00 00 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2
[   39.175918] >ffff800080b67c80: f2 f2 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00
[   39.177139]                                         ^
[   39.178012]  ffff800080b67d00: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00
[   39.179131]  ffff800080b67d80: f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   39.180718] ==================================================================

test log snippet boot parser 92

Home

[   34.726203] ==================================================================
[   34.727654] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   34.729001] Read of size 1 at addr fff00000c68a0000 by task kunit_try_catch/136
[   34.731086] 
[   34.731956] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   34.733396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.734301] Hardware name: linux,dummy-virt (DT)
[   34.735883] Call trace:
[   34.736797]  show_stack+0x20/0x38 (C)
[   34.737355]  dump_stack_lvl+0x8c/0xd0
[   34.738275]  print_report+0x118/0x5e0
[   34.739091]  kasan_report+0xc8/0x118
[   34.739547]  __asan_report_load1_noabort+0x20/0x30
[   34.740114]  kmalloc_large_uaf+0x2cc/0x2f8
[   34.740875]  kunit_try_run_case+0x14c/0x3d0
[   34.741614]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.742546]  kthread+0x24c/0x2d0
[   34.743146]  ret_from_fork+0x10/0x20
[   34.743870] 
[   34.744715] The buggy address belongs to the physical page:
[   34.745202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068a0
[   34.745912] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.747428] raw: 0bfffe0000000000 ffffc1ffc31a2908 fff00000da50af80 0000000000000000
[   34.749233] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   34.750207] page dumped because: kasan: bad access detected
[   34.751417] 
[   34.751878] Memory state around the buggy address:
[   34.752958]  fff00000c689ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.754484]  fff00000c689ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.756187] >fff00000c68a0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.757497]                    ^
[   34.758106]  fff00000c68a0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.760295]  fff00000c68a0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.761275] ==================================================================

test log snippet boot parser 93

Home

[   38.750061] ==================================================================
[   38.751714] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   38.753024] Read of size 1 at addr fff00000c6a24000 by task kunit_try_catch/221
[   38.754143] 
[   38.754589] CPU: 1 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   38.756793] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.757428] Hardware name: linux,dummy-virt (DT)
[   38.758079] Call trace:
[   38.758658]  show_stack+0x20/0x38 (C)
[   38.759233]  dump_stack_lvl+0x8c/0xd0
[   38.759843]  print_report+0x118/0x5e0
[   38.761124]  kasan_report+0xc8/0x118
[   38.761949]  __asan_report_load1_noabort+0x20/0x30
[   38.762549]  mempool_uaf_helper+0x314/0x340
[   38.763422]  mempool_page_alloc_uaf+0xb8/0x118
[   38.764740]  kunit_try_run_case+0x14c/0x3d0
[   38.765630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.766323]  kthread+0x24c/0x2d0
[   38.767272]  ret_from_fork+0x10/0x20
[   38.768082] 
[   38.768710] The buggy address belongs to the physical page:
[   38.769422] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a24
[   38.770511] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.772111] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   38.773056] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   38.773906] page dumped because: kasan: bad access detected
[   38.774667] 
[   38.774967] Memory state around the buggy address:
[   38.776670]  fff00000c6a23f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.777437]  fff00000c6a23f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.778609] >fff00000c6a24000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.779674]                    ^
[   38.780235]  fff00000c6a24080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.781835]  fff00000c6a24100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.782658] ==================================================================

test log snippet boot parser 94

Home

[   38.613101] ==================================================================
[   38.614436] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   38.615385] Read of size 1 at addr fff00000c6a24000 by task kunit_try_catch/217
[   38.616938] 
[   38.617482] CPU: 1 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   38.619283] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.620258] Hardware name: linux,dummy-virt (DT)
[   38.620809] Call trace:
[   38.621632]  show_stack+0x20/0x38 (C)
[   38.622676]  dump_stack_lvl+0x8c/0xd0
[   38.623811]  print_report+0x118/0x5e0
[   38.625015]  kasan_report+0xc8/0x118
[   38.625630]  __asan_report_load1_noabort+0x20/0x30
[   38.626099]  mempool_uaf_helper+0x314/0x340
[   38.627254]  mempool_kmalloc_large_uaf+0xbc/0x118
[   38.628797]  kunit_try_run_case+0x14c/0x3d0
[   38.629397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.630377]  kthread+0x24c/0x2d0
[   38.631455]  ret_from_fork+0x10/0x20
[   38.632382] 
[   38.632754] The buggy address belongs to the physical page:
[   38.633595] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a24
[   38.634672] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   38.636399] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   38.637442] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.639499] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   38.640384] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.641708] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   38.643287] head: 0bfffe0000000002 ffffc1ffc31a8901 ffffffffffffffff 0000000000000000
[   38.644467] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   38.645765] page dumped because: kasan: bad access detected
[   38.646496] 
[   38.646851] Memory state around the buggy address:
[   38.648010]  fff00000c6a23f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.648904]  fff00000c6a23f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.649988] >fff00000c6a24000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.650909]                    ^
[   38.651468]  fff00000c6a24080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.653567]  fff00000c6a24100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.654375] ==================================================================

test log snippet boot parser 95

Home

[   34.834373] ==================================================================
[   34.836026] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   34.836763] Read of size 1 at addr fff00000c68e0000 by task kunit_try_catch/142
[   34.838597] 
[   34.839301] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   34.840728] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.841686] Hardware name: linux,dummy-virt (DT)
[   34.842539] Call trace:
[   34.843767]  show_stack+0x20/0x38 (C)
[   34.844408]  dump_stack_lvl+0x8c/0xd0
[   34.844968]  print_report+0x118/0x5e0
[   34.845662]  kasan_report+0xc8/0x118
[   34.846274]  __asan_report_load1_noabort+0x20/0x30
[   34.847054]  page_alloc_uaf+0x328/0x350
[   34.847637]  kunit_try_run_case+0x14c/0x3d0
[   34.848393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.849197]  kthread+0x24c/0x2d0
[   34.850407]  ret_from_fork+0x10/0x20
[   34.850971] 
[   34.851767] The buggy address belongs to the physical page:
[   34.852490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068e0
[   34.854246] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.855168] page_type: f0(buddy)
[   34.855780] raw: 0bfffe0000000000 fff00000ff615148 fff00000ff615148 0000000000000000
[   34.856803] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000
[   34.858116] page dumped because: kasan: bad access detected
[   34.859685] 
[   34.860096] Memory state around the buggy address:
[   34.860616]  fff00000c68dff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.861655]  fff00000c68dff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.862691] >fff00000c68e0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.864684]                    ^
[   34.865473]  fff00000c68e0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.866423]  fff00000c68e0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.868325] ==================================================================

test log snippet boot parser 96

Home

[   34.567585] ==================================================================
[   34.570182] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x224/0x490
[   34.570182] 
[   34.571407] Corrupted memory at 0x00000000a008934d [ ! . . . . . . . ] (in kfence-#88):
[   34.576225]  kmalloc_track_caller_oob_right+0x224/0x490
[   34.576965]  kunit_try_run_case+0x14c/0x3d0
[   34.577741]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.578428]  kthread+0x24c/0x2d0
[   34.579023]  ret_from_fork+0x10/0x20
[   34.580376] 
[   34.581008] kfence-#88: 0x00000000e9d55bfd-0x000000007bf3ead3, size=120, cache=kmalloc-128
[   34.581008] 
[   34.582592] allocated by task 130 on cpu 1 at 34.564881s (0.017557s ago):
[   34.584320]  kmalloc_track_caller_oob_right+0x184/0x490
[   34.585164]  kunit_try_run_case+0x14c/0x3d0
[   34.585884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.586827]  kthread+0x24c/0x2d0
[   34.587317]  ret_from_fork+0x10/0x20
[   34.588216] 
[   34.589398] freed by task 130 on cpu 1 at 34.566485s (0.022737s ago):
[   34.590186]  kmalloc_track_caller_oob_right+0x224/0x490
[   34.590838]  kunit_try_run_case+0x14c/0x3d0
[   34.591734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.593199]  kthread+0x24c/0x2d0
[   34.593892]  ret_from_fork+0x10/0x20
[   34.594630] 
[   34.595478] CPU: 1 UID: 0 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc7 #1
[   34.596822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.597182] Hardware name: linux,dummy-virt (DT)
[   34.597606] ==================================================================

test log snippet test parser 2

Home

------------[ cut here ]------------
[   44.412856] WARNING: CPU: 1 PID: 466 at mm/util.c:657 __kvmalloc_node_noprof+0x11c/0x124
[   44.414288] Modules linked in: crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[   44.418181] CPU: 1 UID: 0 PID: 466 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[   44.419431] Hardware name: linux,dummy-virt (DT)
[   44.420853] pstate: 23402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[   44.421978] pc : __kvmalloc_node_noprof+0x11c/0x124
[   44.422822] lr : __kvmalloc_node_noprof+0x50/0x124
[   44.423505] sp : ffff800080a7bce0
[   44.423768] x29: ffff800080a7bcf0 x28: fff00000c1109240 x27: 0000000000000000
[   44.424770] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[   44.425530] x23: 0000000080001000 x22: 5dcfa7005e55c980 x21: 0000000200001e00
[   44.426999] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[   44.428889] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   44.429709] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   44.430441] x11: 0000000000000040 x10: 246ea02de0832500 x9 : 246ea02de0832500
[   44.431913] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000
[   44.432412] x5 : 0000000000000000 x4 : ffff800080a7bcb0 x3 : 0000000000000000
[   44.432892] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[   44.435230] Call trace:
[   44.435903]  __kvmalloc_node_noprof+0x11c/0x124 (P)
[   44.437390]  alloc_fdtable+0x74/0x118
[   44.438335]  expand_files+0x114/0x2e0
[   44.439299]  ksys_dup3+0x64/0xe8
[   44.440416]  __arm64_sys_dup3+0x20/0x30
[   44.441070]  invoke_syscall+0x40/0xf8
[   44.441337]  el0_svc_common+0xa8/0xd8
[   44.441593]  do_el0_svc+0x1c/0x28
[   44.441833]  el0_svc+0x38/0x68
[   44.442092]  el0t_64_sync_handler+0x78/0x108
[   44.442371]  el0t_64_sync+0x198/0x19c
[   44.443754] ---[ end trace 0000000000000000 ]---

test log snippet test parser 3

Home

------------[ cut here ]------------
[   46.916909] WARNING: CPU: 0 PID: 468 at mm/util.c:657 __kvmalloc_node_noprof+0x138/0x148
[   46.919230] Modules linked in: crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[   46.923201] CPU: 0 UID: 0 PID: 468 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[   46.924209] Hardware name: linux,dummy-virt (DT)
[   46.924871] pstate: 23402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[   46.925336] pc : __kvmalloc_node_noprof+0x138/0x148
[   46.925940] lr : __kvmalloc_node_noprof+0x64/0x148
[   46.926668] sp : ffff800080ab3cd0
[   46.927131] x29: ffff800080ab3ce0 x28: fff00000c6ab0000 x27: 0000000000000000
[   46.928130] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c28b2680
[   46.928907] x23: fff00000c28b2700 x22: f1cf98940293b6bc x21: 0000000200001e00
[   46.929824] x20: 00000000ffffffff x19: 0000000000400cc0 x18: 0000000000000000
[   46.930780] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   46.931794] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   46.932611] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[   46.933448] x8 : 0000000000000001 x7 : 0000000000000001 x6 : 0000000000000005
[   46.934514] x5 : 0000000000000000 x4 : fff00000c6ab0000 x3 : 0000000000000000
[   46.935228] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[   46.936246] Call trace:
[   46.936978]  __kvmalloc_node_noprof+0x138/0x148 (P)
[   46.938012]  alloc_fdtable+0x84/0x128
[   46.938977]  expand_files+0x78/0x2ec
[   46.939776]  ksys_dup3+0x60/0x120
[   46.940550]  __arm64_sys_dup3+0x20/0x30
[   46.940822]  invoke_syscall+0x48/0x10c
[   46.941090]  el0_svc_common.constprop.0+0x40/0xe0
[   46.941388]  do_el0_svc+0x1c/0x28
[   46.941662]  el0_svc+0x30/0xcc
[   46.942042]  el0t_64_sync_handler+0x10c/0x138
[   46.942539]  el0t_64_sync+0x198/0x19c
[   46.943313] ---[ end trace 0000000000000000 ]---