- kasan-bug-kasan-double-free-in-kfree_sensitive (gcc-13-lkftconfig-kunit:1) log snippet-1
(artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop (gcc-13-lkftconfig-kunit:2) log snippet-2
(artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop (gcc-13-lkftconfig-kunit:2) log snippet-3
(artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16 (gcc-13-lkftconfig-kunit:1) log snippet-4
(artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left (gcc-13-lkftconfig-kunit:1) log snippet-5
(artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- kasan-bug-kasan-slab-use-after-free-in-kasan_strings (gcc-13-lkftconfig-kunit:1) log snippet-6
(artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree (gcc-13-lkftconfig-kunit:1) log snippet-7
(artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf (gcc-13-lkftconfig-kunit:1) log snippet-8
(artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16 (gcc-13-lkftconfig-kunit:1) log snippet-9
(artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy (gcc-13-lkftconfig-kunit:1) log snippet-10
(artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim (gcc-13-lkftconfig-kunit:1) log snippet-11
(artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- kasan-bug-kasan-slab-use-after-free-in-strcmp (gcc-13-lkftconfig-kunit:1) log snippet-12
(artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- kasan-bug-kasan-slab-use-after-free-in-strlen (gcc-13-lkftconfig-kunit:1) log snippet-13
(artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
- kasan-bug-kasan-slab-use-after-free-in-strnlen (gcc-13-lkftconfig-kunit:1) log snippet-14
(artefacts: Kernel Config, Build Reproducer, Test Reproducer, Test Log)
timer-ptimer-busy-loop-interrupt-signal-pending fail
seccomp_seccomp_benchmark_native_1_bitmap pass
seccomp_seccomp_benchmark_native_1_filter pass
seccomp_seccomp_benchmark_per-filter_last_2_diff_per-filter_filters_4 fail
seccomp_seccomp_benchmark_1_bitmapped_2_bitmapped pass
seccomp_seccomp_benchmark_entry_1_bitmapped pass
seccomp_seccomp_benchmark_entry_2_bitmapped pass
seccomp_seccomp_benchmark_native_entry_per_filter_4_4_filters_total pass
seccomp_seccomp_benchmark fail
seccomp_seccomp_benchmark_per-filter_last_2_diff_per-filter_filters_4 fail
fs_fill fs_fill
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 30670ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 22020ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file2
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 32291ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 8007ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file3
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file3
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file3
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file3
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 14914ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 12929ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file0
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 27748ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:93: TPASS: Got 8 ENOSPC runtime 1000ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file6
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file6
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file4
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file3
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 6325ms
cgroup_test_freezer_test_cgfreezer_ptrace fail
cgroup_test_freezer_test_cgfreezer_ptraced pass
[ 24.104330] ==================================================================
[ 24.105043] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[ 24.105910] Free of addr fffb4e7bc5a9dc60 by task kunit_try_catch/180
[ 24.107033]
[ 24.108201] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc3 #1
[ 24.108411] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.108670] Hardware name: linux,dummy-virt (DT)
[ 24.108771] Call trace:
[ 24.108825] show_stack+0x20/0x38 (C)
[ 24.108941] dump_stack_lvl+0x8c/0xd0
[ 24.109052] print_report+0x118/0x5e0
[ 24.109172] kasan_report_invalid_free+0xb0/0xd8
[ 24.109292] check_slab_allocation+0xd4/0x108
[ 24.109403] __kasan_slab_pre_free+0x2c/0x48
[ 24.109524] kfree+0xe8/0x3c8
[ 24.109628] kfree_sensitive+0x3c/0xb0
[ 24.109756] kmalloc_double_kzfree+0x168/0x308
[ 24.109871] kunit_try_run_case+0x14c/0x3d0
[ 24.109979] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.110102] kthread+0x318/0x618
[ 24.110212] ret_from_fork+0x10/0x20
[ 24.110340]
[ 24.119001] Allocated by task 180:
[ 24.119611] kasan_save_stack+0x3c/0x68
[ 24.120307] kasan_save_track+0x20/0x40
[ 24.120952] kasan_save_alloc_info+0x40/0x58
[ 24.121614] __kasan_kmalloc+0xd4/0xd8
[ 24.122268] __kmalloc_cache_noprof+0x15c/0x3c0
[ 24.123005] kmalloc_double_kzfree+0xb8/0x308
[ 24.123684] kunit_try_run_case+0x14c/0x3d0
[ 24.124311] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.125120] kthread+0x318/0x618
[ 24.125714] ret_from_fork+0x10/0x20
[ 24.126300]
[ 24.126899] Freed by task 180:
[ 24.127529] kasan_save_stack+0x3c/0x68
[ 24.128140] kasan_save_track+0x20/0x40
[ 24.128695] kasan_save_free_info+0x4c/0x78
[ 24.129512] __kasan_slab_free+0x6c/0x98
[ 24.130670] kfree+0x214/0x3c8
[ 24.131217] kfree_sensitive+0x80/0xb0
[ 24.131855] kmalloc_double_kzfree+0x11c/0x308
[ 24.132557] kunit_try_run_case+0x14c/0x3d0
[ 24.133224] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.133959] kthread+0x318/0x618
[ 24.134754] ret_from_fork+0x10/0x20
[ 24.135272]
[ 24.135607] The buggy address belongs to the object at fffb4e7bc5a9dc60
[ 24.135607] which belongs to the cache kmalloc-16 of size 16
[ 24.136988] The buggy address is located 0 bytes inside of
[ 24.136988] 16-byte region [fffb4e7bc5a9dc60, fffb4e7bc5a9dc70)
[ 24.138190]
[ 24.138957] The buggy address belongs to the physical page:
[ 24.139604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a9d
[ 24.140477] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 24.141268] page_type: f5(slab)
[ 24.141745] raw: 0bfffe0000000000 fffb4e7bc0001640 dead000000000122 0000000000000000
[ 24.142756] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 24.143853] page dumped because: kasan: bad access detected
[ 24.144501]
[ 24.144838] Memory state around the buggy address:
[ 24.145472] fffb4e7bc5a9db00: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 06 fc fc
[ 24.146297] fffb4e7bc5a9db80: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[ 24.147557] >fffb4e7bc5a9dc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 24.148256] ^
[ 24.149011] fffb4e7bc5a9dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.149823] fffb4e7bc5a9dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.150902] ==================================================================
[ 26.827605] ==================================================================
[ 26.828332] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8
[ 26.829229] Read of size 8 at addr fffb4e7bc5a9dc88 by task kunit_try_catch/249
[ 26.830066]
[ 26.830485] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc3 #1
[ 26.830917] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.831202] Hardware name: linux,dummy-virt (DT)
[ 26.831396] Call trace:
[ 26.831479] show_stack+0x20/0x38 (C)
[ 26.831620] dump_stack_lvl+0x8c/0xd0
[ 26.831789] print_report+0x118/0x5e0
[ 26.831918] kasan_report+0xc8/0x118
[ 26.832037] __asan_report_load8_noabort+0x20/0x30
[ 26.832173] kasan_bitops_modify.constprop.0+0xa28/0xbc8
[ 26.832373] kasan_bitops_generic+0x110/0x1c8
[ 26.832495] kunit_try_run_case+0x14c/0x3d0
[ 26.832560] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.832627] kthread+0x318/0x618
[ 26.832682] ret_from_fork+0x10/0x20
[ 26.832772]
[ 26.840648] Allocated by task 249:
[ 26.841093] kasan_save_stack+0x3c/0x68
[ 26.841815] kasan_save_track+0x20/0x40
[ 26.842386] kasan_save_alloc_info+0x40/0x58
[ 26.843072] __kasan_kmalloc+0xd4/0xd8
[ 26.844113] __kmalloc_cache_noprof+0x15c/0x3c0
[ 26.844793] kasan_bitops_generic+0xa0/0x1c8
[ 26.845485] kunit_try_run_case+0x14c/0x3d0
[ 26.846192] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.847243] kthread+0x318/0x618
[ 26.847739] ret_from_fork+0x10/0x20
[ 26.848205]
[ 26.848482] The buggy address belongs to the object at fffb4e7bc5a9dc80
[ 26.848482] which belongs to the cache kmalloc-16 of size 16
[ 26.849900] The buggy address is located 8 bytes inside of
[ 26.849900] allocated 9-byte region [fffb4e7bc5a9dc80, fffb4e7bc5a9dc89)
[ 26.851271]
[ 26.852058] The buggy address belongs to the physical page:
[ 26.853329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a9d
[ 26.854341] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 26.855326] page_type: f5(slab)
[ 26.855823] raw: 0bfffe0000000000 fffb4e7bc0001640 dead000000000122 0000000000000000
[ 26.856600] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 26.857495] page dumped because: kasan: bad access detected
[ 26.858143]
[ 26.858629] Memory state around the buggy address:
[ 26.859253] fffb4e7bc5a9db80: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[ 26.860021] fffb4e7bc5a9dc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 26.860987] >fffb4e7bc5a9dc80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.861671] ^
[ 26.862170] fffb4e7bc5a9dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.863191] fffb4e7bc5a9dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.863960] ==================================================================
---
[ 26.528082] ==================================================================
[ 26.528770] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[ 26.529599] Read of size 8 at addr fffb4e7bc5a9dc88 by task kunit_try_catch/249
[ 26.530604]
[ 26.530929] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc3 #1
[ 26.531577] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.531617] Hardware name: linux,dummy-virt (DT)
[ 26.531657] Call trace:
[ 26.531686] show_stack+0x20/0x38 (C)
[ 26.531781] dump_stack_lvl+0x8c/0xd0
[ 26.531846] print_report+0x118/0x5e0
[ 26.531903] kasan_report+0xc8/0x118
[ 26.531957] __asan_report_load8_noabort+0x20/0x30
[ 26.532022] kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[ 26.532085] kasan_bitops_generic+0x110/0x1c8
[ 26.532144] kunit_try_run_case+0x14c/0x3d0
[ 26.532205] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.532270] kthread+0x318/0x618
[ 26.532327] ret_from_fork+0x10/0x20
[ 26.532389]
[ 26.540225] Allocated by task 249:
[ 26.540873] kasan_save_stack+0x3c/0x68
[ 26.541484] kasan_save_track+0x20/0x40
[ 26.542269] kasan_save_alloc_info+0x40/0x58
[ 26.543128] __kasan_kmalloc+0xd4/0xd8
[ 26.543802] __kmalloc_cache_noprof+0x15c/0x3c0
[ 26.544497] kasan_bitops_generic+0xa0/0x1c8
[ 26.545143] kunit_try_run_case+0x14c/0x3d0
[ 26.545846] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.546645] kthread+0x318/0x618
[ 26.547176] ret_from_fork+0x10/0x20
[ 26.547748]
[ 26.548097] The buggy address belongs to the object at fffb4e7bc5a9dc80
[ 26.548097] which belongs to the cache kmalloc-16 of size 16
[ 26.549657] The buggy address is located 8 bytes inside of
[ 26.549657] allocated 9-byte region [fffb4e7bc5a9dc80, fffb4e7bc5a9dc89)
[ 26.551051]
[ 26.551644] The buggy address belongs to the physical page:
[ 26.552276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a9d
[ 26.553181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 26.554143] page_type: f5(slab)
[ 26.554683] raw: 0bfffe0000000000 fffb4e7bc0001640 dead000000000122 0000000000000000
[ 26.555665] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 26.556637] page dumped because: kasan: bad access detected
[ 26.557270]
[ 26.557541] Memory state around the buggy address:
[ 26.558325] fffb4e7bc5a9db80: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[ 26.559546] fffb4e7bc5a9dc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 26.560440] >fffb4e7bc5a9dc80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.561259] ^
[ 26.561727] fffb4e7bc5a9dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.562796] fffb4e7bc5a9dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.563759] ==================================================================
---
[ 26.715840] ==================================================================
[ 26.716590] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[ 26.717497] Read of size 8 at addr fffb4e7bc5a9dc88 by task kunit_try_catch/249
[ 26.719507]
[ 26.719868] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc3 #1
[ 26.720085] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.720169] Hardware name: linux,dummy-virt (DT)
[ 26.720263] Call trace:
[ 26.720328] show_stack+0x20/0x38 (C)
[ 26.720471] dump_stack_lvl+0x8c/0xd0
[ 26.720618] print_report+0x118/0x5e0
[ 26.720754] kasan_report+0xc8/0x118
[ 26.720820] __asan_report_load8_noabort+0x20/0x30
[ 26.720887] kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[ 26.720953] kasan_bitops_generic+0x110/0x1c8
[ 26.721013] kunit_try_run_case+0x14c/0x3d0
[ 26.721074] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.721140] kthread+0x318/0x618
[ 26.721197] ret_from_fork+0x10/0x20
[ 26.721259]
[ 26.728248] Allocated by task 249:
[ 26.728852] kasan_save_stack+0x3c/0x68
[ 26.729368] kasan_save_track+0x20/0x40
[ 26.729907] kasan_save_alloc_info+0x40/0x58
[ 26.730869] __kasan_kmalloc+0xd4/0xd8
[ 26.731466] __kmalloc_cache_noprof+0x15c/0x3c0
[ 26.732007] kasan_bitops_generic+0xa0/0x1c8
[ 26.732644] kunit_try_run_case+0x14c/0x3d0
[ 26.733314] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.734056] kthread+0x318/0x618
[ 26.734869] ret_from_fork+0x10/0x20
[ 26.735434]
[ 26.735737] The buggy address belongs to the object at fffb4e7bc5a9dc80
[ 26.735737] which belongs to the cache kmalloc-16 of size 16
[ 26.736995] The buggy address is located 8 bytes inside of
[ 26.736995] allocated 9-byte region [fffb4e7bc5a9dc80, fffb4e7bc5a9dc89)
[ 26.738287]
[ 26.739267] The buggy address belongs to the physical page:
[ 26.739873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a9d
[ 26.740731] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 26.741411] page_type: f5(slab)
[ 26.741937] raw: 0bfffe0000000000 fffb4e7bc0001640 dead000000000122 0000000000000000
[ 26.742897] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 26.743765] page dumped because: kasan: bad access detected
[ 26.744437]
[ 26.745220] Memory state around the buggy address:
[ 26.745719] fffb4e7bc5a9db80: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[ 26.746992] fffb4e7bc5a9dc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 26.747671] >fffb4e7bc5a9dc80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.748449] ^
[ 26.748981] fffb4e7bc5a9dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.749670] fffb4e7bc5a9dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.750536] ==================================================================
---
[ 26.601261] ==================================================================
[ 26.601909] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8
[ 26.603255] Read of size 8 at addr fffb4e7bc5a9dc88 by task kunit_try_catch/249
[ 26.604038]
[ 26.604418] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc3 #1
[ 26.604633] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.604733] Hardware name: linux,dummy-virt (DT)
[ 26.604821] Call trace:
[ 26.604895] show_stack+0x20/0x38 (C)
[ 26.605039] dump_stack_lvl+0x8c/0xd0
[ 26.605179] print_report+0x118/0x5e0
[ 26.605324] kasan_report+0xc8/0x118
[ 26.605425] __asan_report_load8_noabort+0x20/0x30
[ 26.605537] kasan_bitops_modify.constprop.0+0xa88/0xbc8
[ 26.605605] kasan_bitops_generic+0x110/0x1c8
[ 26.605668] kunit_try_run_case+0x14c/0x3d0
[ 26.605754] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.605821] kthread+0x318/0x618
[ 26.605881] ret_from_fork+0x10/0x20
[ 26.605942]
[ 26.614040] Allocated by task 249:
[ 26.615195] kasan_save_stack+0x3c/0x68
[ 26.615628] kasan_save_track+0x20/0x40
[ 26.616187] kasan_save_alloc_info+0x40/0x58
[ 26.617093] __kasan_kmalloc+0xd4/0xd8
[ 26.617598] __kmalloc_cache_noprof+0x15c/0x3c0
[ 26.618181] kasan_bitops_generic+0xa0/0x1c8
[ 26.619073] kunit_try_run_case+0x14c/0x3d0
[ 26.619784] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.620555] kthread+0x318/0x618
[ 26.621186] ret_from_fork+0x10/0x20
[ 26.621828]
[ 26.622283] The buggy address belongs to the object at fffb4e7bc5a9dc80
[ 26.622283] which belongs to the cache kmalloc-16 of size 16
[ 26.623581] The buggy address is located 8 bytes inside of
[ 26.623581] allocated 9-byte region [fffb4e7bc5a9dc80, fffb4e7bc5a9dc89)
[ 26.625424]
[ 26.625736] The buggy address belongs to the physical page:
[ 26.626865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a9d
[ 26.627766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 26.628607] page_type: f5(slab)
[ 26.629095] raw: 0bfffe0000000000 fffb4e7bc0001640 dead000000000122 0000000000000000
[ 26.630172] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 26.631273] page dumped because: kasan: bad access detected
[ 26.632044]
[ 26.632346] Memory state around the buggy address:
[ 26.633151] fffb4e7bc5a9db80: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[ 26.634113] fffb4e7bc5a9dc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 26.635293] >fffb4e7bc5a9dc80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.636094] ^
[ 26.636521] fffb4e7bc5a9dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.637517] fffb4e7bc5a9dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.638312] ==================================================================
[ 26.939564] ==================================================================
[ 26.940364] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[ 26.941239] Write of size 8 at addr fffb4e7bc5a9dc88 by task kunit_try_catch/249
[ 26.941970]
[ 26.942309] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc3 #1
[ 26.942738] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.942820] Hardware name: linux,dummy-virt (DT)
[ 26.942913] Call trace:
[ 26.942977] show_stack+0x20/0x38 (C)
[ 26.943119] dump_stack_lvl+0x8c/0xd0
[ 26.943264] print_report+0x118/0x5e0
[ 26.943383] kasan_report+0xc8/0x118
[ 26.943460] kasan_check_range+0x100/0x1a8
[ 26.943520] __kasan_check_write+0x20/0x30
[ 26.943582] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[ 26.943651] kasan_bitops_generic+0x11c/0x1c8
[ 26.943738] kunit_try_run_case+0x14c/0x3d0
[ 26.943804] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.943870] kthread+0x318/0x618
[ 26.943926] ret_from_fork+0x10/0x20
[ 26.943987]
[ 26.952046] Allocated by task 249:
[ 26.952543] kasan_save_stack+0x3c/0x68
[ 26.953215] kasan_save_track+0x20/0x40
[ 26.953738] kasan_save_alloc_info+0x40/0x58
[ 26.954293] __kasan_kmalloc+0xd4/0xd8
[ 26.955146] __kmalloc_cache_noprof+0x15c/0x3c0
[ 26.955783] kasan_bitops_generic+0xa0/0x1c8
[ 26.956461] kunit_try_run_case+0x14c/0x3d0
[ 26.957180] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.957874] kthread+0x318/0x618
[ 26.958218] ret_from_fork+0x10/0x20
[ 26.959196]
[ 26.959919] The buggy address belongs to the object at fffb4e7bc5a9dc80
[ 26.959919] which belongs to the cache kmalloc-16 of size 16
[ 26.961039] The buggy address is located 8 bytes inside of
[ 26.961039] allocated 9-byte region [fffb4e7bc5a9dc80, fffb4e7bc5a9dc89)
[ 26.962352]
[ 26.962973] The buggy address belongs to the physical page:
[ 26.963635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a9d
[ 26.964594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 26.965394] page_type: f5(slab)
[ 26.965938] raw: 0bfffe0000000000 fffb4e7bc0001640 dead000000000122 0000000000000000
[ 26.967268] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 26.968109] page dumped because: kasan: bad access detected
[ 26.968690]
[ 26.969144] Memory state around the buggy address:
[ 26.969781] fffb4e7bc5a9db80: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[ 26.970688] fffb4e7bc5a9dc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 26.971489] >fffb4e7bc5a9dc80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.972191] ^
[ 26.972601] fffb4e7bc5a9dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.974013] fffb4e7bc5a9dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.975111] ==================================================================
---
[ 27.016911] ==================================================================
[ 27.017777] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[ 27.018989] Write of size 8 at addr fffb4e7bc5a9dc88 by task kunit_try_catch/249
[ 27.019961]
[ 27.020328] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc3 #1
[ 27.020671] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.020762] Hardware name: linux,dummy-virt (DT)
[ 27.020842] Call trace:
[ 27.020900] show_stack+0x20/0x38 (C)
[ 27.021054] dump_stack_lvl+0x8c/0xd0
[ 27.021224] print_report+0x118/0x5e0
[ 27.021365] kasan_report+0xc8/0x118
[ 27.021459] kasan_check_range+0x100/0x1a8
[ 27.021526] __kasan_check_write+0x20/0x30
[ 27.021587] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[ 27.021654] kasan_bitops_generic+0x11c/0x1c8
[ 27.021737] kunit_try_run_case+0x14c/0x3d0
[ 27.021804] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.021868] kthread+0x318/0x618
[ 27.021924] ret_from_fork+0x10/0x20
[ 27.021984]
[ 27.030971] Allocated by task 249:
[ 27.031591] kasan_save_stack+0x3c/0x68
[ 27.032267] kasan_save_track+0x20/0x40
[ 27.032910] kasan_save_alloc_info+0x40/0x58
[ 27.033578] __kasan_kmalloc+0xd4/0xd8
[ 27.034190] __kmalloc_cache_noprof+0x15c/0x3c0
[ 27.035020] kasan_bitops_generic+0xa0/0x1c8
[ 27.035696] kunit_try_run_case+0x14c/0x3d0
[ 27.036391] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.037146] kthread+0x318/0x618
[ 27.037747] ret_from_fork+0x10/0x20
[ 27.038343]
[ 27.038961] The buggy address belongs to the object at fffb4e7bc5a9dc80
[ 27.038961] which belongs to the cache kmalloc-16 of size 16
[ 27.040070] The buggy address is located 8 bytes inside of
[ 27.040070] allocated 9-byte region [fffb4e7bc5a9dc80, fffb4e7bc5a9dc89)
[ 27.041545]
[ 27.041895] The buggy address belongs to the physical page:
[ 27.042649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a9d
[ 27.043575] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 27.044475] page_type: f5(slab)
[ 27.044958] raw: 0bfffe0000000000 fffb4e7bc0001640 dead000000000122 0000000000000000
[ 27.045316] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 27.045652] page dumped because: kasan: bad access detected
[ 27.046120]
[ 27.046493] Memory state around the buggy address:
[ 27.047555] fffb4e7bc5a9db80: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[ 27.048361] fffb4e7bc5a9dc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.049189] >fffb4e7bc5a9dc80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.049928] ^
[ 27.050480] fffb4e7bc5a9dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.051536] fffb4e7bc5a9dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.052386] ==================================================================
---
[ 27.090624] ==================================================================
[ 27.091579] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[ 27.092650] Write of size 8 at addr fffb4e7bc5a9dc88 by task kunit_try_catch/249
[ 27.093413]
[ 27.093782] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc3 #1
[ 27.093999] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.094080] Hardware name: linux,dummy-virt (DT)
[ 27.094177] Call trace:
[ 27.094249] show_stack+0x20/0x38 (C)
[ 27.094394] dump_stack_lvl+0x8c/0xd0
[ 27.094542] print_report+0x118/0x5e0
[ 27.094685] kasan_report+0xc8/0x118
[ 27.094785] kasan_check_range+0x100/0x1a8
[ 27.094850] __kasan_check_write+0x20/0x30
[ 27.094912] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[ 27.094982] kasan_bitops_generic+0x11c/0x1c8
[ 27.095043] kunit_try_run_case+0x14c/0x3d0
[ 27.095102] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.095166] kthread+0x318/0x618
[ 27.095222] ret_from_fork+0x10/0x20
[ 27.095281]
[ 27.102508] Allocated by task 249:
[ 27.102979] kasan_save_stack+0x3c/0x68
[ 27.103671] kasan_save_track+0x20/0x40
[ 27.104345] kasan_save_alloc_info+0x40/0x58
[ 27.105000] __kasan_kmalloc+0xd4/0xd8
[ 27.105480] __kmalloc_cache_noprof+0x15c/0x3c0
[ 27.106245] kasan_bitops_generic+0xa0/0x1c8
[ 27.106954] kunit_try_run_case+0x14c/0x3d0
[ 27.107612] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.108372] kthread+0x318/0x618
[ 27.108967] ret_from_fork+0x10/0x20
[ 27.109495]
[ 27.109909] The buggy address belongs to the object at fffb4e7bc5a9dc80
[ 27.109909] which belongs to the cache kmalloc-16 of size 16
[ 27.111207] The buggy address is located 8 bytes inside of
[ 27.111207] allocated 9-byte region [fffb4e7bc5a9dc80, fffb4e7bc5a9dc89)
[ 27.112404]
[ 27.112826] The buggy address belongs to the physical page:
[ 27.113574] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a9d
[ 27.114506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 27.115308] page_type: f5(slab)
[ 27.115834] raw: 0bfffe0000000000 fffb4e7bc0001640 dead000000000122 0000000000000000
[ 27.116744] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 27.117592] page dumped because: kasan: bad access detected
[ 27.118275]
[ 27.118565] Memory state around the buggy address:
[ 27.119139] fffb4e7bc5a9db80: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[ 27.119944] fffb4e7bc5a9dc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.120726] >fffb4e7bc5a9dc80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.121683] ^
[ 27.122291] fffb4e7bc5a9dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.123146] fffb4e7bc5a9dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.124034] ==================================================================
---
[ 26.865468] ==================================================================
[ 26.866214] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[ 26.867613] Write of size 8 at addr fffb4e7bc5a9dc88 by task kunit_try_catch/249
[ 26.868414]
[ 26.869612] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc3 #1
[ 26.869836] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.869921] Hardware name: linux,dummy-virt (DT)
[ 26.869993] Call trace:
[ 26.870026] show_stack+0x20/0x38 (C)
[ 26.870090] dump_stack_lvl+0x8c/0xd0
[ 26.870150] print_report+0x118/0x5e0
[ 26.870209] kasan_report+0xc8/0x118
[ 26.870268] kasan_check_range+0x100/0x1a8
[ 26.870330] __kasan_check_write+0x20/0x30
[ 26.870446] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[ 26.870596] kasan_bitops_generic+0x11c/0x1c8
[ 26.870744] kunit_try_run_case+0x14c/0x3d0
[ 26.870812] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.870879] kthread+0x318/0x618
[ 26.870937] ret_from_fork+0x10/0x20
[ 26.870995]
[ 26.879006] Allocated by task 249:
[ 26.879440] kasan_save_stack+0x3c/0x68
[ 26.880102] kasan_save_track+0x20/0x40
[ 26.880597] kasan_save_alloc_info+0x40/0x58
[ 26.881566] __kasan_kmalloc+0xd4/0xd8
[ 26.882137] __kmalloc_cache_noprof+0x15c/0x3c0
[ 26.883072] kasan_bitops_generic+0xa0/0x1c8
[ 26.883593] kunit_try_run_case+0x14c/0x3d0
[ 26.884277] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.885087] kthread+0x318/0x618
[ 26.885564] ret_from_fork+0x10/0x20
[ 26.886197]
[ 26.887012] The buggy address belongs to the object at fffb4e7bc5a9dc80
[ 26.887012] which belongs to the cache kmalloc-16 of size 16
[ 26.888437] The buggy address is located 8 bytes inside of
[ 26.888437] allocated 9-byte region [fffb4e7bc5a9dc80, fffb4e7bc5a9dc89)
[ 26.889652]
[ 26.890013] The buggy address belongs to the physical page:
[ 26.890748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a9d
[ 26.891626] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 26.892370] page_type: f5(slab)
[ 26.893185] raw: 0bfffe0000000000 fffb4e7bc0001640 dead000000000122 0000000000000000
[ 26.894067] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 26.895144] page dumped because: kasan: bad access detected
[ 26.895753]
[ 26.896055] Memory state around the buggy address:
[ 26.896603] fffb4e7bc5a9db80: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[ 26.897425] fffb4e7bc5a9dc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 26.898270] >fffb4e7bc5a9dc80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.899156] ^
[ 26.899603] fffb4e7bc5a9dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.900417] fffb4e7bc5a9dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.901370] ==================================================================
[ 23.493092] ==================================================================
[ 23.494128] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[ 23.494879] Write of size 16 at addr fffb4e7bc5a9dbe0 by task kunit_try_catch/154
[ 23.496028]
[ 23.496400] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc3 #1
[ 23.496501] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.496531] Hardware name: linux,dummy-virt (DT)
[ 23.496571] Call trace:
[ 23.496598] show_stack+0x20/0x38 (C)
[ 23.496664] dump_stack_lvl+0x8c/0xd0
[ 23.496779] print_report+0x118/0x5e0
[ 23.496914] kasan_report+0xc8/0x118
[ 23.497024] __asan_report_store16_noabort+0x20/0x30
[ 23.497092] kmalloc_oob_16+0x3a0/0x3f8
[ 23.497162] kunit_try_run_case+0x14c/0x3d0
[ 23.497342] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.497488] kthread+0x318/0x618
[ 23.497586] ret_from_fork+0x10/0x20
[ 23.497646]
[ 23.505015] Allocated by task 154:
[ 23.505583] kasan_save_stack+0x3c/0x68
[ 23.506230] kasan_save_track+0x20/0x40
[ 23.506956] kasan_save_alloc_info+0x40/0x58
[ 23.507825] __kasan_kmalloc+0xd4/0xd8
[ 23.508344] __kmalloc_cache_noprof+0x15c/0x3c0
[ 23.509009] kmalloc_oob_16+0xb4/0x3f8
[ 23.509582] kunit_try_run_case+0x14c/0x3d0
[ 23.510171] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.511152] kthread+0x318/0x618
[ 23.511722] ret_from_fork+0x10/0x20
[ 23.512192]
[ 23.512482] The buggy address belongs to the object at fffb4e7bc5a9dbe0
[ 23.512482] which belongs to the cache kmalloc-16 of size 16
[ 23.513746] The buggy address is located 0 bytes inside of
[ 23.513746] allocated 13-byte region [fffb4e7bc5a9dbe0, fffb4e7bc5a9dbed)
[ 23.515248]
[ 23.515600] The buggy address belongs to the physical page:
[ 23.516217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a9d
[ 23.517139] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 23.517930] page_type: f5(slab)
[ 23.518422] raw: 0bfffe0000000000 fffb4e7bc0001640 dead000000000122 0000000000000000
[ 23.519752] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 23.520563] page dumped because: kasan: bad access detected
[ 23.521160]
[ 23.521459] Memory state around the buggy address:
[ 23.522482] fffb4e7bc5a9da80: fa fb fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[ 23.523350] fffb4e7bc5a9db00: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 06 fc fc
[ 23.524099] >fffb4e7bc5a9db80: 00 06 fc fc 00 00 fc fc fa fb fc fc 00 05 fc fc
[ 23.525101] ^
[ 23.525635] fffb4e7bc5a9dc00: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.526397] fffb4e7bc5a9dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.527298] ==================================================================
[ 22.420852] ==================================================================
[ 22.421974] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[ 22.423020] Read of size 1 at addr fffb4e7bc6224e3f by task kunit_try_catch/126
[ 22.424309]
[ 22.424741] CPU: 0 UID: 0 PID: 126 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc3 #1
[ 22.424985] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 22.425059] Hardware name: linux,dummy-virt (DT)
[ 22.425144] Call trace:
[ 22.425206] show_stack+0x20/0x38 (C)
[ 22.425294] dump_stack_lvl+0x8c/0xd0
[ 22.425357] print_report+0x118/0x5e0
[ 22.425414] kasan_report+0xc8/0x118
[ 22.425467] __asan_report_load1_noabort+0x20/0x30
[ 22.425527] kmalloc_oob_left+0x2ec/0x320
[ 22.425580] kunit_try_run_case+0x14c/0x3d0
[ 22.425639] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 22.425719] kthread+0x318/0x618
[ 22.425786] ret_from_fork+0x10/0x20
[ 22.425845]
[ 22.433141] Allocated by task 1:
[ 22.433686] kasan_save_stack+0x3c/0x68
[ 22.434260] kasan_save_track+0x20/0x40
[ 22.435214] kasan_save_alloc_info+0x40/0x58
[ 22.436130] __kasan_kmalloc+0xd4/0xd8
[ 22.436820] __kmalloc_node_track_caller_noprof+0x184/0x4b8
[ 22.437532] kvasprintf+0xcc/0x170
[ 22.438061] kasprintf+0xa8/0xe8
[ 22.438683] input_devnode+0x84/0xb8
[ 22.439522] device_get_devnode+0x114/0x258
[ 22.440157] dev_uevent+0x334/0x5b8
[ 22.440724] kobject_uevent_env+0x424/0xc98
[ 22.441387] kobject_uevent+0x14/0x20
[ 22.441965] device_add+0xc00/0x12b8
[ 22.442565] cdev_device_add+0xdc/0x208
[ 22.443503] evdev_connect+0x2e0/0x410
[ 22.443971] input_attach_handler.isra.0+0xec/0x1d8
[ 22.444851] input_register_device+0x48c/0x9e0
[ 22.445436] gpio_keys_probe+0xabc/0x1ec8
[ 22.445968] platform_probe+0xcc/0x198
[ 22.446540] really_probe+0x188/0x7f0
[ 22.447081] __driver_probe_device+0x164/0x378
[ 22.447608] driver_probe_device+0x64/0x180
[ 22.448560] __driver_attach+0x1cc/0x478
[ 22.449097] bus_for_each_dev+0x104/0x198
[ 22.449633] driver_attach+0x44/0x68
[ 22.450143] bus_add_driver+0x23c/0x4e8
[ 22.450654] driver_register+0xf8/0x3d0
[ 22.451955] __platform_driver_register+0x64/0x98
[ 22.452569] gpio_keys_init+0x24/0x38
[ 22.453169] do_one_initcall+0xcc/0x628
[ 22.453730] kernel_init_freeable+0x3e0/0x8b0
[ 22.454340] kernel_init+0x2c/0x1f8
[ 22.454995] ret_from_fork+0x10/0x20
[ 22.455948]
[ 22.456371] Freed by task 1:
[ 22.456840] kasan_save_stack+0x3c/0x68
[ 22.457329] kasan_save_track+0x20/0x40
[ 22.457878] kasan_save_free_info+0x4c/0x78
[ 22.458431] __kasan_slab_free+0x6c/0x98
[ 22.459135] kfree+0x214/0x3c8
[ 22.459635] dev_uevent+0x368/0x5b8
[ 22.460736] kobject_uevent_env+0x424/0xc98
[ 22.461455] kobject_uevent+0x14/0x20
[ 22.461988] device_add+0xc00/0x12b8
[ 22.462839] cdev_device_add+0xdc/0x208
[ 22.463272] evdev_connect+0x2e0/0x410
[ 22.463893] input_attach_handler.isra.0+0xec/0x1d8
[ 22.464442] input_register_device+0x48c/0x9e0
[ 22.465168] gpio_keys_probe+0xabc/0x1ec8
[ 22.465680] platform_probe+0xcc/0x198
[ 22.466289] really_probe+0x188/0x7f0
[ 22.466932] __driver_probe_device+0x164/0x378
[ 22.467431] driver_probe_device+0x64/0x180
[ 22.468502] __driver_attach+0x1cc/0x478
[ 22.469088] bus_for_each_dev+0x104/0x198
[ 22.469645] driver_attach+0x44/0x68
[ 22.470140] bus_add_driver+0x23c/0x4e8
[ 22.470629] driver_register+0xf8/0x3d0
[ 22.471224] __platform_driver_register+0x64/0x98
[ 22.471860] gpio_keys_init+0x24/0x38
[ 22.472418] do_one_initcall+0xcc/0x628
[ 22.473306] kernel_init_freeable+0x3e0/0x8b0
[ 22.473848] kernel_init+0x2c/0x1f8
[ 22.474424] ret_from_fork+0x10/0x20
[ 22.475389]
[ 22.475822] The buggy address belongs to the object at fffb4e7bc6224e20
[ 22.475822] which belongs to the cache kmalloc-16 of size 16
[ 22.476959] The buggy address is located 15 bytes to the right of
[ 22.476959] allocated 16-byte region [fffb4e7bc6224e20, fffb4e7bc6224e30)
[ 22.478174]
[ 22.478538] The buggy address belongs to the physical page:
[ 22.479278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106224
[ 22.480575] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 22.481319] page_type: f5(slab)
[ 22.481920] raw: 0bfffe0000000000 fffb4e7bc0001640 dead000000000122 0000000000000000
[ 22.482938] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 22.484169] page dumped because: kasan: bad access detected
[ 22.484905]
[ 22.485183] Memory state around the buggy address:
[ 22.485772] fffb4e7bc6224d00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[ 22.486821] fffb4e7bc6224d80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 22.487439] >fffb4e7bc6224e00: fa fb fc fc fa fb fc fc 00 07 fc fc fc fc fc fc
[ 22.488277] ^
[ 22.488912] fffb4e7bc6224e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.489712] fffb4e7bc6224f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.490915] ==================================================================
[ 26.344193] ==================================================================
[ 26.345115] BUG: KASAN: slab-use-after-free in kasan_strings+0x838/0x8d8
[ 26.345982] Read of size 1 at addr fffb4e7bc6467f10 by task kunit_try_catch/247
[ 26.347436]
[ 26.347814] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc3 #1
[ 26.348035] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.348156] Hardware name: linux,dummy-virt (DT)
[ 26.348250] Call trace:
[ 26.348306] show_stack+0x20/0x38 (C)
[ 26.348376] dump_stack_lvl+0x8c/0xd0
[ 26.348438] print_report+0x118/0x5e0
[ 26.348500] kasan_report+0xc8/0x118
[ 26.348558] __asan_report_load1_noabort+0x20/0x30
[ 26.348621] kasan_strings+0x838/0x8d8
[ 26.348677] kunit_try_run_case+0x14c/0x3d0
[ 26.348767] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.348836] kthread+0x318/0x618
[ 26.348894] ret_from_fork+0x10/0x20
[ 26.348954]
[ 26.357531] Allocated by task 247:
[ 26.358062] kasan_save_stack+0x3c/0x68
[ 26.358649] kasan_save_track+0x20/0x40
[ 26.359212] kasan_save_alloc_info+0x40/0x58
[ 26.360031] __kasan_kmalloc+0xd4/0xd8
[ 26.360500] __kmalloc_cache_noprof+0x15c/0x3c0
[ 26.361176] kasan_strings+0xb0/0x8d8
[ 26.362203] kunit_try_run_case+0x14c/0x3d0
[ 26.363125] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.363850] kthread+0x318/0x618
[ 26.364238] ret_from_fork+0x10/0x20
[ 26.364756]
[ 26.365111] Freed by task 247:
[ 26.365593] kasan_save_stack+0x3c/0x68
[ 26.366089] kasan_save_track+0x20/0x40
[ 26.366731] kasan_save_free_info+0x4c/0x78
[ 26.367344] __kasan_slab_free+0x6c/0x98
[ 26.367874] kfree+0x214/0x3c8
[ 26.368343] kasan_strings+0x124/0x8d8
[ 26.368886] kunit_try_run_case+0x14c/0x3d0
[ 26.369527] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.370270] kthread+0x318/0x618
[ 26.370878] ret_from_fork+0x10/0x20
[ 26.371440]
[ 26.372550] The buggy address belongs to the object at fffb4e7bc6467f00
[ 26.372550] which belongs to the cache kmalloc-32 of size 32
[ 26.373779] The buggy address is located 16 bytes inside of
[ 26.373779] freed 32-byte region [fffb4e7bc6467f00, fffb4e7bc6467f20)
[ 26.375194]
[ 26.375498] The buggy address belongs to the physical page:
[ 26.376140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106467
[ 26.377093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 26.378013] page_type: f5(slab)
[ 26.378652] raw: 0bfffe0000000000 fffb4e7bc0001780 dead000000000122 0000000000000000
[ 26.379496] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000
[ 26.380809] page dumped because: kasan: bad access detected
[ 26.381324]
[ 26.381718] Memory state around the buggy address:
[ 26.382325] fffb4e7bc6467e00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[ 26.383889] fffb4e7bc6467e80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[ 26.384739] >fffb4e7bc6467f00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 26.385468] ^
[ 26.385958] fffb4e7bc6467f80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[ 26.386675] fffb4e7bc6468000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 26.387822] ==================================================================
[ 24.058236] ==================================================================
[ 24.060092] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[ 24.061043] Read of size 1 at addr fffb4e7bc5a9dc60 by task kunit_try_catch/180
[ 24.061745]
[ 24.062054] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc3 #1
[ 24.062266] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.062341] Hardware name: linux,dummy-virt (DT)
[ 24.062609] Call trace:
[ 24.062679] show_stack+0x20/0x38 (C)
[ 24.062840] dump_stack_lvl+0x8c/0xd0
[ 24.062937] print_report+0x118/0x5e0
[ 24.062997] kasan_report+0xc8/0x118
[ 24.063055] __kasan_check_byte+0x54/0x70
[ 24.063109] kfree_sensitive+0x30/0xb0
[ 24.063169] kmalloc_double_kzfree+0x168/0x308
[ 24.063227] kunit_try_run_case+0x14c/0x3d0
[ 24.063287] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.063346] kthread+0x318/0x618
[ 24.063402] ret_from_fork+0x10/0x20
[ 24.063476]
[ 24.070550] Allocated by task 180:
[ 24.071353] kasan_save_stack+0x3c/0x68
[ 24.071979] kasan_save_track+0x20/0x40
[ 24.072527] kasan_save_alloc_info+0x40/0x58
[ 24.073204] __kasan_kmalloc+0xd4/0xd8
[ 24.073768] __kmalloc_cache_noprof+0x15c/0x3c0
[ 24.074459] kmalloc_double_kzfree+0xb8/0x308
[ 24.075253] kunit_try_run_case+0x14c/0x3d0
[ 24.076064] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.076779] kthread+0x318/0x618
[ 24.077288] ret_from_fork+0x10/0x20
[ 24.077841]
[ 24.078168] Freed by task 180:
[ 24.079060] kasan_save_stack+0x3c/0x68
[ 24.079610] kasan_save_track+0x20/0x40
[ 24.080193] kasan_save_free_info+0x4c/0x78
[ 24.080852] __kasan_slab_free+0x6c/0x98
[ 24.081417] kfree+0x214/0x3c8
[ 24.081919] kfree_sensitive+0x80/0xb0
[ 24.082725] kmalloc_double_kzfree+0x11c/0x308
[ 24.083310] kunit_try_run_case+0x14c/0x3d0
[ 24.084114] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.084829] kthread+0x318/0x618
[ 24.085359] ret_from_fork+0x10/0x20
[ 24.085913]
[ 24.086215] The buggy address belongs to the object at fffb4e7bc5a9dc60
[ 24.086215] which belongs to the cache kmalloc-16 of size 16
[ 24.087766] The buggy address is located 0 bytes inside of
[ 24.087766] freed 16-byte region [fffb4e7bc5a9dc60, fffb4e7bc5a9dc70)
[ 24.089097]
[ 24.089485] The buggy address belongs to the physical page:
[ 24.090173] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a9d
[ 24.091248] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 24.092025] page_type: f5(slab)
[ 24.092471] raw: 0bfffe0000000000 fffb4e7bc0001640 dead000000000122 0000000000000000
[ 24.093368] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 24.094168] page dumped because: kasan: bad access detected
[ 24.095235]
[ 24.095659] Memory state around the buggy address:
[ 24.096307] fffb4e7bc5a9db00: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 06 fc fc
[ 24.097084] fffb4e7bc5a9db80: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[ 24.097922] >fffb4e7bc5a9dc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 24.098912] ^
[ 24.099445] fffb4e7bc5a9dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.100298] fffb4e7bc5a9dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.101492] ==================================================================
[ 23.898287] ==================================================================
[ 23.899537] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[ 23.900359] Read of size 1 at addr fffb4e7bc5a9dc48 by task kunit_try_catch/172
[ 23.902655]
[ 23.903460] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc3 #1
[ 23.903742] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.903830] Hardware name: linux,dummy-virt (DT)
[ 23.903922] Call trace:
[ 23.903955] show_stack+0x20/0x38 (C)
[ 23.904021] dump_stack_lvl+0x8c/0xd0
[ 23.904082] print_report+0x118/0x5e0
[ 23.904139] kasan_report+0xc8/0x118
[ 23.904193] __asan_report_load1_noabort+0x20/0x30
[ 23.904255] kmalloc_uaf+0x300/0x338
[ 23.904304] kunit_try_run_case+0x14c/0x3d0
[ 23.904361] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.904422] kthread+0x318/0x618
[ 23.904477] ret_from_fork+0x10/0x20
[ 23.904539]
[ 23.912195] Allocated by task 172:
[ 23.912807] kasan_save_stack+0x3c/0x68
[ 23.913479] kasan_save_track+0x20/0x40
[ 23.914062] kasan_save_alloc_info+0x40/0x58
[ 23.914975] __kasan_kmalloc+0xd4/0xd8
[ 23.915652] __kmalloc_cache_noprof+0x15c/0x3c0
[ 23.916230] kmalloc_uaf+0xb8/0x338
[ 23.916862] kunit_try_run_case+0x14c/0x3d0
[ 23.917484] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.918131] kthread+0x318/0x618
[ 23.918768] ret_from_fork+0x10/0x20
[ 23.919263]
[ 23.919631] Freed by task 172:
[ 23.920465] kasan_save_stack+0x3c/0x68
[ 23.920986] kasan_save_track+0x20/0x40
[ 23.921524] kasan_save_free_info+0x4c/0x78
[ 23.922056] __kasan_slab_free+0x6c/0x98
[ 23.922929] kfree+0x214/0x3c8
[ 23.923365] kmalloc_uaf+0x11c/0x338
[ 23.923936] kunit_try_run_case+0x14c/0x3d0
[ 23.924512] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.925216] kthread+0x318/0x618
[ 23.925726] ret_from_fork+0x10/0x20
[ 23.926238]
[ 23.926602] The buggy address belongs to the object at fffb4e7bc5a9dc40
[ 23.926602] which belongs to the cache kmalloc-16 of size 16
[ 23.928235] The buggy address is located 8 bytes inside of
[ 23.928235] freed 16-byte region [fffb4e7bc5a9dc40, fffb4e7bc5a9dc50)
[ 23.929398]
[ 23.929789] The buggy address belongs to the physical page:
[ 23.930547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a9d
[ 23.931627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 23.932398] page_type: f5(slab)
[ 23.932938] raw: 0bfffe0000000000 fffb4e7bc0001640 dead000000000122 0000000000000000
[ 23.933730] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 23.934562] page dumped because: kasan: bad access detected
[ 23.935174]
[ 23.935493] Memory state around the buggy address:
[ 23.936084] fffb4e7bc5a9db00: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 06 fc fc
[ 23.936885] fffb4e7bc5a9db80: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[ 23.937676] >fffb4e7bc5a9dc00: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[ 23.938916] ^
[ 23.939582] fffb4e7bc5a9dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.940410] fffb4e7bc5a9dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.941284] ==================================================================
[ 23.536287] ==================================================================
[ 23.537509] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[ 23.538299] Read of size 16 at addr fffb4e7bc5a9dc20 by task kunit_try_catch/156
[ 23.539187]
[ 23.539528] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc3 #1
[ 23.539736] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.539798] Hardware name: linux,dummy-virt (DT)
[ 23.539867] Call trace:
[ 23.539917] show_stack+0x20/0x38 (C)
[ 23.540041] dump_stack_lvl+0x8c/0xd0
[ 23.540173] print_report+0x118/0x5e0
[ 23.540306] kasan_report+0xc8/0x118
[ 23.540439] __asan_report_load16_noabort+0x20/0x30
[ 23.540583] kmalloc_uaf_16+0x3bc/0x438
[ 23.540728] kunit_try_run_case+0x14c/0x3d0
[ 23.540803] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.540863] kthread+0x318/0x618
[ 23.540919] ret_from_fork+0x10/0x20
[ 23.540975]
[ 23.548027] Allocated by task 156:
[ 23.548595] kasan_save_stack+0x3c/0x68
[ 23.549160] kasan_save_track+0x20/0x40
[ 23.549719] kasan_save_alloc_info+0x40/0x58
[ 23.550281] __kasan_kmalloc+0xd4/0xd8
[ 23.550935] __kmalloc_cache_noprof+0x15c/0x3c0
[ 23.551538] kmalloc_uaf_16+0x140/0x438
[ 23.552474] kunit_try_run_case+0x14c/0x3d0
[ 23.553065] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.553753] kthread+0x318/0x618
[ 23.554201] ret_from_fork+0x10/0x20
[ 23.555552]
[ 23.555983] Freed by task 156:
[ 23.556366] kasan_save_stack+0x3c/0x68
[ 23.556748] kasan_save_track+0x20/0x40
[ 23.557297] kasan_save_free_info+0x4c/0x78
[ 23.557873] __kasan_slab_free+0x6c/0x98
[ 23.558403] kfree+0x214/0x3c8
[ 23.559218] kmalloc_uaf_16+0x190/0x438
[ 23.559758] kunit_try_run_case+0x14c/0x3d0
[ 23.560425] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.561057] kthread+0x318/0x618
[ 23.561551] ret_from_fork+0x10/0x20
[ 23.562050]
[ 23.562370] The buggy address belongs to the object at fffb4e7bc5a9dc20
[ 23.562370] which belongs to the cache kmalloc-16 of size 16
[ 23.563724] The buggy address is located 0 bytes inside of
[ 23.563724] freed 16-byte region [fffb4e7bc5a9dc20, fffb4e7bc5a9dc30)
[ 23.565113]
[ 23.565408] The buggy address belongs to the physical page:
[ 23.566047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a9d
[ 23.567426] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 23.568216] page_type: f5(slab)
[ 23.568790] raw: 0bfffe0000000000 fffb4e7bc0001640 dead000000000122 0000000000000000
[ 23.569667] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 23.570746] page dumped because: kasan: bad access detected
[ 23.571455]
[ 23.571843] Memory state around the buggy address:
[ 23.572479] fffb4e7bc5a9db00: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 06 fc fc
[ 23.573453] fffb4e7bc5a9db80: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[ 23.574296] >fffb4e7bc5a9dc00: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[ 23.575364] ^
[ 23.575891] fffb4e7bc5a9dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.577013] fffb4e7bc5a9dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.577897] ==================================================================
[ 24.936203] ==================================================================
[ 24.937246] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x17c/0x2f8
[ 24.937961] Read of size 1 at addr fffb4e7bc1863c80 by task kunit_try_catch/203
[ 24.939379]
[ 24.940082] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc3 #1
[ 24.940410] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.940455] Hardware name: linux,dummy-virt (DT)
[ 24.940496] Call trace:
[ 24.940525] show_stack+0x20/0x38 (C)
[ 24.940592] dump_stack_lvl+0x8c/0xd0
[ 24.940653] print_report+0x118/0x5e0
[ 24.940737] kasan_report+0xc8/0x118
[ 24.940799] __kasan_check_byte+0x54/0x70
[ 24.940857] kmem_cache_destroy+0x34/0x218
[ 24.940918] kmem_cache_double_destroy+0x17c/0x2f8
[ 24.940978] kunit_try_run_case+0x14c/0x3d0
[ 24.941036] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.941099] kthread+0x318/0x618
[ 24.941155] ret_from_fork+0x10/0x20
[ 24.941214]
[ 24.949997] Allocated by task 203:
[ 24.950417] kasan_save_stack+0x3c/0x68
[ 24.951488] kasan_save_track+0x20/0x40
[ 24.952213] kasan_save_alloc_info+0x40/0x58
[ 24.952898] __kasan_slab_alloc+0xa8/0xb0
[ 24.953563] kmem_cache_alloc_noprof+0x108/0x398
[ 24.954246] __kmem_cache_create_args+0x18c/0x2b0
[ 24.954949] kmem_cache_double_destroy+0xc8/0x2f8
[ 24.955856] kunit_try_run_case+0x14c/0x3d0
[ 24.956364] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.957130] kthread+0x318/0x618
[ 24.957664] ret_from_fork+0x10/0x20
[ 24.958230]
[ 24.958614] Freed by task 203:
[ 24.959338] kasan_save_stack+0x3c/0x68
[ 24.959940] kasan_save_track+0x20/0x40
[ 24.960440] kasan_save_free_info+0x4c/0x78
[ 24.961070] __kasan_slab_free+0x6c/0x98
[ 24.961750] kmem_cache_free+0x260/0x470
[ 24.962271] slab_kmem_cache_release+0x38/0x50
[ 24.963112] kmem_cache_release+0x1c/0x30
[ 24.963869] kobject_put+0x17c/0x430
[ 24.964219] sysfs_slab_release+0x1c/0x30
[ 24.964866] kmem_cache_destroy+0x118/0x218
[ 24.965463] kmem_cache_double_destroy+0x130/0x2f8
[ 24.966073] kunit_try_run_case+0x14c/0x3d0
[ 24.967045] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.967679] kthread+0x318/0x618
[ 24.968213] ret_from_fork+0x10/0x20
[ 24.968715]
[ 24.969008] The buggy address belongs to the object at fffb4e7bc1863c80
[ 24.969008] which belongs to the cache kmem_cache of size 208
[ 24.970343] The buggy address is located 0 bytes inside of
[ 24.970343] freed 208-byte region [fffb4e7bc1863c80, fffb4e7bc1863d50)
[ 24.971890]
[ 24.972187] The buggy address belongs to the physical page:
[ 24.973125] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101863
[ 24.973878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 24.974950] page_type: f5(slab)
[ 24.975600] raw: 0bfffe0000000000 fffb4e7bc0001000 dead000000000122 0000000000000000
[ 24.976543] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[ 24.977476] page dumped because: kasan: bad access detected
[ 24.978188]
[ 24.978661] Memory state around the buggy address:
[ 24.979204] fffb4e7bc1863b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 24.980317] fffb4e7bc1863c00: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.981163] >fffb4e7bc1863c80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 24.982012] ^
[ 24.982439] fffb4e7bc1863d00: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[ 24.983237] fffb4e7bc1863d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.984002] ==================================================================
[ 24.435215] ==================================================================
[ 24.436001] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[ 24.436669] Read of size 4 at addr fffb4e7bc6402440 by task swapper/1/0
[ 24.437357]
[ 24.437742] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.14.0-rc3 #1
[ 24.437933] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.438007] Hardware name: linux,dummy-virt (DT)
[ 24.438099] Call trace:
[ 24.438162] show_stack+0x20/0x38 (C)
[ 24.438308] dump_stack_lvl+0x8c/0xd0
[ 24.438441] print_report+0x118/0x5e0
[ 24.438596] kasan_report+0xc8/0x118
[ 24.438746] __asan_report_load4_noabort+0x20/0x30
[ 24.438887] rcu_uaf_reclaim+0x64/0x70
[ 24.439010] rcu_core+0x9f4/0x1e20
[ 24.439105] rcu_core_si+0x18/0x30
[ 24.439163] handle_softirqs+0x374/0xb20
[ 24.439220] __do_softirq+0x1c/0x28
[ 24.439271] ____do_softirq+0x18/0x30
[ 24.439323] call_on_irq_stack+0x24/0x58
[ 24.439377] do_softirq_own_stack+0x24/0x38
[ 24.439440] __irq_exit_rcu+0x1fc/0x318
[ 24.439496] irq_exit_rcu+0x1c/0x80
[ 24.439546] el1_interrupt+0x38/0x58
[ 24.439603] el1h_64_irq_handler+0x18/0x28
[ 24.439663] el1h_64_irq+0x6c/0x70
[ 24.439802] arch_local_irq_enable+0x4/0x8 (P)
[ 24.439878] do_idle+0x384/0x4e8
[ 24.439930] cpu_startup_entry+0x68/0x80
[ 24.439986] secondary_start_kernel+0x288/0x340
[ 24.440048] __secondary_switched+0xc0/0xc8
[ 24.440113]
[ 24.454050] Allocated by task 186:
[ 24.455489] kasan_save_stack+0x3c/0x68
[ 24.455786] kasan_save_track+0x20/0x40
[ 24.456666] kasan_save_alloc_info+0x40/0x58
[ 24.457341] __kasan_kmalloc+0xd4/0xd8
[ 24.457853] __kmalloc_cache_noprof+0x15c/0x3c0
[ 24.458606] rcu_uaf+0xb0/0x2d0
[ 24.459084] kunit_try_run_case+0x14c/0x3d0
[ 24.459627] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.460313] kthread+0x318/0x618
[ 24.460837] ret_from_fork+0x10/0x20
[ 24.461340]
[ 24.461696] Freed by task 0:
[ 24.462103] kasan_save_stack+0x3c/0x68
[ 24.463165] kasan_save_track+0x20/0x40
[ 24.463658] kasan_save_free_info+0x4c/0x78
[ 24.464242] __kasan_slab_free+0x6c/0x98
[ 24.464823] kfree+0x214/0x3c8
[ 24.465285] rcu_uaf_reclaim+0x28/0x70
[ 24.465780] rcu_core+0x9f4/0x1e20
[ 24.466263] rcu_core_si+0x18/0x30
[ 24.466984] handle_softirqs+0x374/0xb20
[ 24.467462] __do_softirq+0x1c/0x28
[ 24.468031]
[ 24.468349] Last potentially related work creation:
[ 24.468886] kasan_save_stack+0x3c/0x68
[ 24.469473] kasan_record_aux_stack+0xb4/0xc8
[ 24.470106] __call_rcu_common.constprop.0+0x74/0xa10
[ 24.471123] call_rcu+0x18/0x30
[ 24.471563] rcu_uaf+0x14c/0x2d0
[ 24.472101] kunit_try_run_case+0x14c/0x3d0
[ 24.472688] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.473339] kthread+0x318/0x618
[ 24.473933] ret_from_fork+0x10/0x20
[ 24.474864]
[ 24.475132] The buggy address belongs to the object at fffb4e7bc6402440
[ 24.475132] which belongs to the cache kmalloc-32 of size 32
[ 24.477039] The buggy address is located 0 bytes inside of
[ 24.477039] freed 32-byte region [fffb4e7bc6402440, fffb4e7bc6402460)
[ 24.478242]
[ 24.478585] The buggy address belongs to the physical page:
[ 24.479155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106402
[ 24.480187] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 24.481068] page_type: f5(slab)
[ 24.481554] raw: 0bfffe0000000000 fffb4e7bc0001780 dead000000000122 0000000000000000
[ 24.482663] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[ 24.483519] page dumped because: kasan: bad access detected
[ 24.484145]
[ 24.484457] Memory state around the buggy address:
[ 24.485040] fffb4e7bc6402300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 24.485846] fffb4e7bc6402380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 24.486898] >fffb4e7bc6402400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 24.487718] ^
[ 24.488330] fffb4e7bc6402480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.489121] fffb4e7bc6402500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.489889] ==================================================================
[ 26.297354] ==================================================================
[ 26.300074] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[ 26.300822] Read of size 1 at addr fffb4e7bc6467f10 by task kunit_try_catch/247
[ 26.301638]
[ 26.301984] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc3 #1
[ 26.302196] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.302274] Hardware name: linux,dummy-virt (DT)
[ 26.302409] Call trace:
[ 26.302487] show_stack+0x20/0x38 (C)
[ 26.302632] dump_stack_lvl+0x8c/0xd0
[ 26.302797] print_report+0x118/0x5e0
[ 26.302922] kasan_report+0xc8/0x118
[ 26.302986] __asan_report_load1_noabort+0x20/0x30
[ 26.303050] strcmp+0xc0/0xc8
[ 26.303104] kasan_strings+0x228/0x8d8
[ 26.303162] kunit_try_run_case+0x14c/0x3d0
[ 26.303225] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.303288] kthread+0x318/0x618
[ 26.303345] ret_from_fork+0x10/0x20
[ 26.303408]
[ 26.310556] Allocated by task 247:
[ 26.311670] kasan_save_stack+0x3c/0x68
[ 26.312288] kasan_save_track+0x20/0x40
[ 26.312880] kasan_save_alloc_info+0x40/0x58
[ 26.313551] __kasan_kmalloc+0xd4/0xd8
[ 26.314096] __kmalloc_cache_noprof+0x15c/0x3c0
[ 26.315043] kasan_strings+0xb0/0x8d8
[ 26.315549] kunit_try_run_case+0x14c/0x3d0
[ 26.316217] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.316943] kthread+0x318/0x618
[ 26.317494] ret_from_fork+0x10/0x20
[ 26.318039]
[ 26.318342] Freed by task 247:
[ 26.319593] kasan_save_stack+0x3c/0x68
[ 26.320204] kasan_save_track+0x20/0x40
[ 26.320814] kasan_save_free_info+0x4c/0x78
[ 26.321425] __kasan_slab_free+0x6c/0x98
[ 26.322091] kfree+0x214/0x3c8
[ 26.322915] kasan_strings+0x124/0x8d8
[ 26.323514] kunit_try_run_case+0x14c/0x3d0
[ 26.324062] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.324684] kthread+0x318/0x618
[ 26.325252] ret_from_fork+0x10/0x20
[ 26.325805]
[ 26.326157] The buggy address belongs to the object at fffb4e7bc6467f00
[ 26.326157] which belongs to the cache kmalloc-32 of size 32
[ 26.328161] The buggy address is located 16 bytes inside of
[ 26.328161] freed 32-byte region [fffb4e7bc6467f00, fffb4e7bc6467f20)
[ 26.329432]
[ 26.329753] The buggy address belongs to the physical page:
[ 26.330961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106467
[ 26.331923] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 26.332737] page_type: f5(slab)
[ 26.333253] raw: 0bfffe0000000000 fffb4e7bc0001780 dead000000000122 0000000000000000
[ 26.334191] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000
[ 26.335248] page dumped because: kasan: bad access detected
[ 26.336109]
[ 26.336480] Memory state around the buggy address:
[ 26.337143] fffb4e7bc6467e00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[ 26.337937] fffb4e7bc6467e80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[ 26.338883] >fffb4e7bc6467f00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 26.339810] ^
[ 26.340680] fffb4e7bc6467f80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[ 26.341651] fffb4e7bc6468000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 26.342540] ==================================================================
[ 26.390342] ==================================================================
[ 26.391618] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[ 26.392136] Read of size 1 at addr fffb4e7bc6467f10 by task kunit_try_catch/247
[ 26.392478]
[ 26.392623] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc3 #1
[ 26.392779] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.392863] Hardware name: linux,dummy-virt (DT)
[ 26.392955] Call trace:
[ 26.393022] show_stack+0x20/0x38 (C)
[ 26.393210] dump_stack_lvl+0x8c/0xd0
[ 26.393355] print_report+0x118/0x5e0
[ 26.393494] kasan_report+0xc8/0x118
[ 26.393634] __asan_report_load1_noabort+0x20/0x30
[ 26.393805] strlen+0xa8/0xb0
[ 26.393938] kasan_strings+0x304/0x8d8
[ 26.394076] kunit_try_run_case+0x14c/0x3d0
[ 26.394219] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.394341] kthread+0x318/0x618
[ 26.394460] ret_from_fork+0x10/0x20
[ 26.394593]
[ 26.403382] Allocated by task 247:
[ 26.404194] kasan_save_stack+0x3c/0x68
[ 26.404867] kasan_save_track+0x20/0x40
[ 26.405385] kasan_save_alloc_info+0x40/0x58
[ 26.406062] __kasan_kmalloc+0xd4/0xd8
[ 26.406938] __kmalloc_cache_noprof+0x15c/0x3c0
[ 26.407618] kasan_strings+0xb0/0x8d8
[ 26.408197] kunit_try_run_case+0x14c/0x3d0
[ 26.408789] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.409546] kthread+0x318/0x618
[ 26.410108] ret_from_fork+0x10/0x20
[ 26.410966]
[ 26.411554] Freed by task 247:
[ 26.412267] kasan_save_stack+0x3c/0x68
[ 26.412982] kasan_save_track+0x20/0x40
[ 26.413436] kasan_save_free_info+0x4c/0x78
[ 26.414015] __kasan_slab_free+0x6c/0x98
[ 26.414907] kfree+0x214/0x3c8
[ 26.415323] kasan_strings+0x124/0x8d8
[ 26.415910] kunit_try_run_case+0x14c/0x3d0
[ 26.416494] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.417352] kthread+0x318/0x618
[ 26.417857] ret_from_fork+0x10/0x20
[ 26.418382]
[ 26.419621] The buggy address belongs to the object at fffb4e7bc6467f00
[ 26.419621] which belongs to the cache kmalloc-32 of size 32
[ 26.420733] The buggy address is located 16 bytes inside of
[ 26.420733] freed 32-byte region [fffb4e7bc6467f00, fffb4e7bc6467f20)
[ 26.421913]
[ 26.422223] The buggy address belongs to the physical page:
[ 26.422941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106467
[ 26.423946] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 26.424653] page_type: f5(slab)
[ 26.425235] raw: 0bfffe0000000000 fffb4e7bc0001780 dead000000000122 0000000000000000
[ 26.426022] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000
[ 26.427168] page dumped because: kasan: bad access detected
[ 26.427840]
[ 26.428118] Memory state around the buggy address:
[ 26.429387] fffb4e7bc6467e00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[ 26.430104] fffb4e7bc6467e80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[ 26.431076] >fffb4e7bc6467f00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 26.431861] ^
[ 26.432327] fffb4e7bc6467f80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[ 26.433622] fffb4e7bc6468000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 26.435068] ==================================================================
[ 26.436287] ==================================================================
[ 26.437020] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[ 26.437754] Read of size 1 at addr fffb4e7bc6467f10 by task kunit_try_catch/247
[ 26.438579]
[ 26.438970] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc3 #1
[ 26.439193] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.439276] Hardware name: linux,dummy-virt (DT)
[ 26.439370] Call trace:
[ 26.439448] show_stack+0x20/0x38 (C)
[ 26.439590] dump_stack_lvl+0x8c/0xd0
[ 26.439754] print_report+0x118/0x5e0
[ 26.439897] kasan_report+0xc8/0x118
[ 26.440040] __asan_report_load1_noabort+0x20/0x30
[ 26.440192] strnlen+0x80/0x88
[ 26.440321] kasan_strings+0x364/0x8d8
[ 26.440438] kunit_try_run_case+0x14c/0x3d0
[ 26.440507] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.440573] kthread+0x318/0x618
[ 26.440628] ret_from_fork+0x10/0x20
[ 26.440690]
[ 26.449665] Allocated by task 247:
[ 26.450342] kasan_save_stack+0x3c/0x68
[ 26.451219] kasan_save_track+0x20/0x40
[ 26.451974] kasan_save_alloc_info+0x40/0x58
[ 26.452626] __kasan_kmalloc+0xd4/0xd8
[ 26.453340] __kmalloc_cache_noprof+0x15c/0x3c0
[ 26.454013] kasan_strings+0xb0/0x8d8
[ 26.454686] kunit_try_run_case+0x14c/0x3d0
[ 26.455406] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.456204] kthread+0x318/0x618
[ 26.456565] ret_from_fork+0x10/0x20
[ 26.456932]
[ 26.457302] Freed by task 247:
[ 26.457864] kasan_save_stack+0x3c/0x68
[ 26.458547] kasan_save_track+0x20/0x40
[ 26.459869] kasan_save_free_info+0x4c/0x78
[ 26.460664] __kasan_slab_free+0x6c/0x98
[ 26.461213] kfree+0x214/0x3c8
[ 26.461745] kasan_strings+0x124/0x8d8
[ 26.462350] kunit_try_run_case+0x14c/0x3d0
[ 26.463141] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.463975] kthread+0x318/0x618
[ 26.464510] ret_from_fork+0x10/0x20
[ 26.465050]
[ 26.465421] The buggy address belongs to the object at fffb4e7bc6467f00
[ 26.465421] which belongs to the cache kmalloc-32 of size 32
[ 26.467348] The buggy address is located 16 bytes inside of
[ 26.467348] freed 32-byte region [fffb4e7bc6467f00, fffb4e7bc6467f20)
[ 26.468692]
[ 26.469113] The buggy address belongs to the physical page:
[ 26.469784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106467
[ 26.470792] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 26.472009] page_type: f5(slab)
[ 26.472638] raw: 0bfffe0000000000 fffb4e7bc0001780 dead000000000122 0000000000000000
[ 26.473511] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000
[ 26.474612] page dumped because: kasan: bad access detected
[ 26.475546]
[ 26.476172] Memory state around the buggy address:
[ 26.476755] fffb4e7bc6467e00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[ 26.477641] fffb4e7bc6467e80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[ 26.478814] >fffb4e7bc6467f00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 26.479539] ^
[ 26.479950] fffb4e7bc6467f80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[ 26.480581] fffb4e7bc6468000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 26.481646] ==================================================================
------------[ cut here ]------------
[ 41.938179] WARNING: CPU: 1 PID: 472 at mm/util.c:674 __kvmalloc_node_noprof+0x11c/0x124
[ 41.939575] Modules linked in: sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[ 41.943644] CPU: 1 UID: 0 PID: 472 Comm: unshare_test Not tainted 6.14.0-rc3 #1
[ 41.944439] Hardware name: linux,dummy-virt (DT)
[ 41.945100] pstate: 23402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[ 41.946071] pc : __kvmalloc_node_noprof+0x11c/0x124
[ 41.946560] lr : __kvmalloc_node_noprof+0x50/0x124
[ 41.947179] sp : ffff800080a23ce0
[ 41.947562] x29: ffff800080a23cf0 x28: fff474e2c1ada500 x27: 0000000000000000
[ 41.948415] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 41.949276] x23: 0000000080001000 x22: 0f9f9fb4b2f61ca4 x21: 0000000200001e00
[ 41.950341] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[ 41.951240] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 41.952194] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 41.953342] x11: 0000000000000040 x10: 7c209abaae743b00 x9 : 7c209abaae743b00
[ 41.954698] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000
[ 41.955435] x5 : 0000000000000000 x4 : ffff800080a23cb0 x3 : 0000000000000000
[ 41.956097] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[ 41.956718] Call trace:
[ 41.957209] __kvmalloc_node_noprof+0x11c/0x124 (P)
[ 41.958103] alloc_fdtable+0x74/0x118
[ 41.958567] expand_files+0x114/0x2e0
[ 41.958943] ksys_dup3+0x64/0xe8
[ 41.959294] __arm64_sys_dup3+0x20/0x30
[ 41.959658] invoke_syscall+0x40/0xf8
[ 41.960022] el0_svc_common+0xa8/0xd8
[ 41.960426] do_el0_svc+0x1c/0x28
[ 41.960815] el0_svc+0x38/0x68
[ 41.961123] el0t_64_sync_handler+0x78/0x108
[ 41.961527] el0t_64_sync+0x198/0x19c
[ 41.962165] ---[ end trace 0000000000000000 ]---