Build

Regressions (compared to v6.6.71-130-g6a7137c98fe3)

fvp-aemva, kselftest-exec

qemu-arm64-compat, ltp-fs

qemu-arm64, boot

qemu-i386, ltp-sched

qemu-i386, kselftest-net-mptcp

qemu-i386, perf

qemu-i386, ltp-hugetlb

qemu-x86_64, kselftest-timers

qemu-x86_64, ltp-sched

Fixes (compared to v6.6.71-130-g6a7137c98fe3)

e850-96, boot

e850-96, kselftest-ftrace

qemu-arm64, boot

qemu-armv7, kselftest-seccomp

qemu-i386, kselftest-seccomp

qemu-x86_64-compat, ltp-syscalls

qemu-x86_64, kselftest-x86

Build Parser (compared to v6.6.71-130-g6a7137c98fe3)

i386, log-parser-build-clang

i386, log-parser-build-gcc

x86_64, log-parser-build-gcc

Boot Parser (compared to v6.6.71-130-g6a7137c98fe3)

dragonboard-845c, log-parser-boot

qemu-arm64, log-parser-boot

qemu-i386, log-parser-boot

x15, log-parser-boot

Test Parser (compared to v6.6.71-130-g6a7137c98fe3)

dragonboard-410c, log-parser-test

dragonboard-845c, log-parser-test

e850-96, log-parser-test

fvp-aemva, log-parser-test

juno-r2, log-parser-test

qemu-arm64, log-parser-test

qemu-armv7, log-parser-test

qemu-i386, log-parser-test

qemu-riscv64, log-parser-test

qemu-x86_64, log-parser-test

rk3399-rock-pi-4b, log-parser-test

x86, log-parser-test

Test log snippets

test log snippet regressions 1

Home

exec_load_address_static_0x1000000_Unwanted_INTERP_program_header_missing pass
exec_load_address_static_0x1000000_Alignment_found pass
exec_load_address_static_0x1000000_Alignment_is_a_power_of_2_0x1000000 pass
exec_load_address_static_0x1000000_Load_Address_is_MISaligned_0xe00000 fail
exec_load_address_static_0x1000000 fail

test log snippet regressions 2

Home

fs_fill fs_fill
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 38775ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file0
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 49248ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file1
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file1
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file1
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file1
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 68915ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 28519ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file3
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file3
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file3
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file3
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 44187ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 21161ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file0
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 50753ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 11822ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file0
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 29324ms

test log snippet regressions 3

Home

None

test log snippet regressions 4

Home

None

test log snippet regressions 5

Home

None

test log snippet regressions 6

Home

starvation starvation
starvation.c:98: TINFO: Setting affinity to CPU 0
starvation.c:52: TINFO: CPU did 120000000 loops in 251277us
starvation.c:148: TFAIL: Scheduller starvation reproduced.

test log snippet regressions 7

Home

net_mptcp_simult_flows_sh_-_simult_flows_balanced_bwidth_with_unbalanced_delay fail
net_mptcp_simult_flows_sh_-_simult_flows_balanced_bwidth_with_unbalanced_delay__reverse_direction pass

test log snippet regressions 8

Home

_19_Breakpoint_overflow_sampling fail

test log snippet regressions 9

Home

hugemmap15 hugemmap15
hugemmap15.c:190: TFAIL: icache unclean

test log snippet regressions 10

Home

timers_posix_timers_check_signal_distribution fail

test log snippet regressions 11

Home

starvation starvation
starvation.c:98: TINFO: Setting affinity to CPU 0
starvation.c:52: TINFO: CPU did 120000000 loops in 280883us
starvation.c:148: TFAIL: Scheduller starvation reproduced.

test log snippet regressions 12

Home

starvation starvation
starvation.c:98: TINFO: Setting affinity to CPU 0
starvation.c:52: TINFO: CPU did 120000000 loops in 261638us
starvation.c:148: TFAIL: Scheduller starvation reproduced.

test log snippet regressions 13

Home

starvation starvation
starvation.c:98: TINFO: Setting affinity to CPU 0
starvation.c:52: TINFO: CPU did 120000000 loops in 282036us
starvation.c:148: TFAIL: Scheduller starvation reproduced.

test log snippet build parser 1

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
In file included from basic_percpu_ops_test.c:12:
/usr/bin/i686-linux-gnu-ld: /tmp/basic_percpu_ops_test-dd3d36.o: warning: relocation in read-only section `.text'

test log snippet build parser 2

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build DESTDIR=/home/tuxbuild/.cache/tuxmake/builds/1/build/cpupower-install ARCH=i386 SRCARCH=x86 CROSS_COMPILE=i686-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1 -C tools/power/cpupower
utils/cpupower-info.c:60:utils/cpupower-set.c:77:21: warning: implicit truncation from 'int' to a one-bit wide bit-field changes value from 1 to -1 [-Wsingle-bit-bitfield-constant-conversion]
   77 |                         params.perf_bias = 1;
      |                                          ^ ~

test log snippet build parser 3

Home

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build DESTDIR=/home/tuxbuild/.cache/tuxmake/builds/1/build/cpupower-install ARCH=i386 SRCARCH=x86 CROSS_COMPILE=i686-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1 -C tools/power/cpupower
21: warning: utils/cpupower-set.c:86:15: warning: implicit truncation from 'int' to a one-bit wide bit-field changes value from 1 to -1 [-Wsingle-bit-bitfield-constant-conversion]
   86 |                         params.epp = 1;
      |                                    ^ ~

test log snippet build parser 4

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
In file included from basic_percpu_ops_test.c:12:
/usr/bin/i686-linux-gnu-ld: /tmp/basic_percpu_ops_test-a8861f.o: warning: relocation in read-only section `.text'

test log snippet build parser 5

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
In file included from basic_percpu_ops_test.c:12:
/usr/bin/i686-linux-gnu-ld: /tmp/basic_percpu_ops_test-dd9f8c.o: warning: relocation in read-only section `.text'

test log snippet build parser 6

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccejdjhZ.o: warning: relocation in read-only section `.text'

test log snippet build parser 7

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/cc23jt5X.o: warning: relocation in read-only section `.text'

test log snippet build parser 8

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccK6XrA1.o: warning: relocation in read-only section `.text'

test log snippet build parser 9

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccLL8OeR.o: warning: relocation in read-only section `.text'

test log snippet build parser 10

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccNXPB2m.o: warning: relocation in read-only section `.text'

test log snippet build parser 11

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccRfwTHV.o: warning: relocation in read-only section `.text'

test log snippet build parser 12

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccw62RHr.o: warning: relocation in read-only section `.text'

test log snippet build parser 13

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccX4j0ah.o: warning: relocation in read-only section `.text'

test log snippet build parser 14

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/3/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/cccG2bRm.o: warning: relocation in read-only section `.text'

test log snippet build parser 15

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/3/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccgaGw5z.o: warning: relocation in read-only section `.text'

test log snippet build parser 16

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/3/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccHpqXh7.o: warning: relocation in read-only section `.text'

test log snippet build parser 17

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/3/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccJGoW4m.o: warning: relocation in read-only section `.text'

test log snippet build parser 18

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/3/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/cc1kj1DT.o: warning: relocation in read-only section `.text'

test log snippet build parser 19

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/3/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccL366DZ.o: warning: relocation in read-only section `.text'

test log snippet build parser 20

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/3/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccrN1iF9.o: warning: relocation in read-only section `.text'

test log snippet build parser 21

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/3/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccvyLu0o.o: warning: relocation in read-only section `.text'

test log snippet build parser 22

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/ld: warning: /tmp/cc07amWm.o: missing .note.GNU-stack section implies executable stack
/usr/bin/ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker

test log snippet build parser 23

Home

make  -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest/net/tools/build/libbpf/     \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/ld: warning: /tmp/ccUpdRKj.o: missing .note.GNU-stack section implies executable stack
/usr/bin/ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker

test log snippet boot parser 1

Home

------------[ cut here ]------------
[    4.309775] sd 0:0:0:2: [sdc] Write Protect is off
[    4.313328]  sda: sda1
[    4.313599] sd 0:0:0:0: [sda] Attached SCSI disk
[    4.314377] WARNING: CPU: 3 PID: 11 at block/blk-mq.c:264 blk_mq_unquiesce_queue+0x98/0xa0
[    4.321594] Modules linked in:
[    4.326601] sd 0:0:0:2: [sdc] Write cache: enabled, read cache: enabled, supports DPO and FUA
[    4.334562]  ecc typec spi_geni_qcom qcom_rng phy_qcom_qusb2 phy_qcom_qmp_usb
[    4.334585] sd 0:0:0:2: [sdc] Preferred minimum I/O size 786432 bytes
[    4.337655]  gpi
[    4.346252] sd 0:0:0:2: [sdc] Optimal transfer size 786432 bytes
[    4.353428]  libdes coresight_stm cfg80211 coresight_tmc qrtr
[    4.362904]  sdc: sdc1 sdc2
[    4.367827]  coresight_funnel coresight_replicator stm_core ufs_qcom phy_qcom_qmp_ufs icc_osm_l3 qcom_q6v5_mss qcom_q6v5_pas
[    4.373888] sd 0:0:0:2: [sdc] Attached SCSI disk
[    4.376445]  phy_qcom_qmp_pcie rfkill qcom_wdt lmh coresight slim_qcom_ngd_ctrl(+) slimbus pdr_interface qcom_pil_info qcom_q6v5 qcom_sysmon llcc_qcom icc_bwmon qcom_common qcom_glink_smem mdt_loader qmi_helpers display_connector drm_kms_helper drm socinfo backlight rmtfs_mem
[    4.417098] CPU: 3 PID: 11 Comm: kworker/u16:0 Not tainted 6.6.74-rc1 #1
[    4.423856] Hardware name: Thundercomm Dragonboard 845c (DT)
[    4.429564] Workqueue: devfreq_wq devfreq_monitor
[    4.434321] pstate: 604000c5 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    4.441338] pc : blk_mq_unquiesce_queue+0x98/0xa0
[    4.446090] lr : blk_mq_unquiesce_queue+0x24/0xa0
[    4.450840] sp : ffff8000800abbb0
[    4.454181] x29: ffff8000800abbb0 x28: 0000000000000000 x27: ffff33870775b468
[    4.461383] x26: ffff338700018028 x25: 0000000000000000 x24: 00000000000f4240
[    4.468584] x23: 00000000edf396dd x22: 0000000000000000 x21: ffff3387076f1628
[    4.475785] x20: 0000000000000000 x19: ffff3387076f1590 x18: ffff33877d78e07c
[    4.482987] x17: 0000000000048ab0 x16: 0000000000000000 x15: 0000000000000000
[    4.490181] x14: 0000000000000040 x13: 00000000000000a6 x12: 0000000000000002
[    4.497382] x11: fffffffff7a6c7a6 x10: 0000000000000001 x9 : ffffffffffffffff
[    4.504584] x8 : ffff8000800abb00 x7 : ffff338707d00090 x6 : ffff8000800abb00
[    4.511786] x5 : fffffffff7a6c7a6 x4 : ffff33870012a000 x3 : 0000000000000001
[    4.518986] x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
[    4.526180] Call trace:
[    4.528648]  blk_mq_unquiesce_queue+0x98/0xa0
[    4.533045]  blk_mq_unquiesce_tagset+0x58/0x84
[    4.537529]  ufshcd_devfreq_scale+0x210/0x350
[    4.541928]  ufshcd_devfreq_target+0xf0/0x1a4
[    4.546325]  devfreq_set_target+0x90/0x194
[    4.550463]  devfreq_update_target+0xc0/0xd8
[    4.554768]  devfreq_monitor+0x34/0x9c
[    4.558552]  process_one_work+0x144/0x29c
[    4.562607]  worker_thread+0x324/0x43c
[    4.566390]  kthread+0x110/0x114
[    4.569648]  ret_from_fork+0x10/0x20
[    4.573261] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 2

Home

------------[ cut here ]------------
[    4.309775] sd 0:0:0:2: [sdc] Write Protect is off
[    4.313328]  sda: sda1
[    4.313599] sd 0:0:0:0: [sda] Attached SCSI disk
[    4.314377] WARNING: CPU: 3 PID: 11 at block/blk-mq.c:264 blk_mq_unquiesce_queue+0x98/0xa0
[    4.321594] Modules linked in:
[    4.326601] sd 0:0:0:2: [sdc] Write cache: enabled, read cache: enabled, supports DPO and FUA
[    4.334562]  ecc typec spi_geni_qcom qcom_rng phy_qcom_qusb2 phy_qcom_qmp_usb
[    4.334585] sd 0:0:0:2: [sdc] Preferred minimum I/O size 786432 bytes
[    4.337655]  gpi
[    4.346252] sd 0:0:0:2: [sdc] Optimal transfer size 786432 bytes
[    4.353428]  libdes coresight_stm cfg80211 coresight_tmc qrtr
[    4.362904]  sdc: sdc1 sdc2
[    4.367827]  coresight_funnel coresight_replicator stm_core ufs_qcom phy_qcom_qmp_ufs icc_osm_l3 qcom_q6v5_mss qcom_q6v5_pas
[    4.373888] sd 0:0:0:2: [sdc] Attached SCSI disk
[    4.376445]  phy_qcom_qmp_pcie rfkill qcom_wdt lmh coresight slim_qcom_ngd_ctrl(+) slimbus pdr_interface qcom_pil_info qcom_q6v5 qcom_sysmon llcc_qcom icc_bwmon qcom_common qcom_glink_smem mdt_loader qmi_helpers display_connector drm_kms_helper drm socinfo backlight rmtfs_mem
[    4.417098] CPU: 3 PID: 11 Comm: kworker/u16:0 Not tainted 6.6.74-rc1 #1
[    4.423856] Hardware name: Thundercomm Dragonboard 845c (DT)
[    4.429564] Workqueue: devfreq_wq devfreq_monitor
[    4.434321] pstate: 604000c5 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    4.441338] pc : blk_mq_unquiesce_queue+0x98/0xa0
[    4.446090] lr : blk_mq_unquiesce_queue+0x24/0xa0
[    4.450840] sp : ffff8000800abbb0
[    4.454181] x29: ffff8000800abbb0 x28: 0000000000000000 x27: ffff33870775b468
[    4.461383] x26: ffff338700018028 x25: 0000000000000000 x24: 00000000000f4240
[    4.468584] x23: 00000000edf396dd x22: 0000000000000000 x21: ffff3387076f1628
[    4.475785] x20: 0000000000000000 x19: ffff3387076f1590 x18: ffff33877d78e07c
[    4.482987] x17: 0000000000048ab0 x16: 0000000000000000 x15: 0000000000000000
[    4.490181] x14: 0000000000000040 x13: 00000000000000a6 x12: 0000000000000002
[    4.497382] x11: fffffffff7a6c7a6 x10: 0000000000000001 x9 : ffffffffffffffff
[    4.504584] x8 : ffff8000800abb00 x7 : ffff338707d00090 x6 : ffff8000800abb00
[    4.511786] x5 : fffffffff7a6c7a6 x4 : ffff33870012a000 x3 : 0000000000000001
[    4.518986] x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
[    4.526180] Call trace:
[    4.528648]  blk_mq_unquiesce_queue+0x98/0xa0
[    4.533045]  blk_mq_unquiesce_tagset+0x58/0x84
[    4.537529]  ufshcd_devfreq_scale+0x210/0x350
[    4.541928]  ufshcd_devfreq_target+0xf0/0x1a4
[    4.546325]  devfreq_set_target+0x90/0x194
[    4.550463]  devfreq_update_target+0xc0/0xd8
[    4.554768]  devfreq_monitor+0x34/0x9c
[    4.558552]  process_one_work+0x144/0x29c
[    4.562607]  worker_thread+0x324/0x43c
[    4.566390]  kthread+0x110/0x114
[    4.569648]  ret_from_fork+0x10/0x20
[    4.573261] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 3

Home

[  191.499833] ==================================================================
[  191.502488] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x108/0x1f0
[  191.503975] Read of size 1 at addr ffff800080757c1f by task kunit_try_catch/187
[  191.505717] 
[  191.506389] CPU: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  191.508128] Hardware name: linux,dummy-virt (DT)
[  191.509282] Call trace:
[  191.510062]  dump_backtrace+0x9c/0x128
[  191.511189]  show_stack+0x20/0x38
[  191.512199]  dump_stack_lvl+0x60/0xb0
[  191.513396]  print_report+0x314/0x5d8
[  191.514573]  kasan_report+0xc8/0x118
[  191.515720]  __asan_load1+0x60/0x70
[  191.516831]  kasan_alloca_oob_left+0x108/0x1f0
[  191.518124]  kunit_try_run_case+0xf8/0x260
[  191.519320]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  191.520847]  kthread+0x18c/0x1a8
[  191.521787]  ret_from_fork+0x10/0x20
[  191.522926] 
[  191.523533] The buggy address belongs to stack of task kunit_try_catch/187
[  191.525026] 
[  191.525651] The buggy address belongs to the virtual mapping at
[  191.525651]  [ffff800080750000, ffff800080759000) created by:
[  191.525651]  kernel_clone+0xf8/0x540
[  191.528470] 
[  191.529115] The buggy address belongs to the physical page:
[  191.530401] page:00000000597d4963 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fc7
[  191.532312] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  191.533809] page_type: 0xffffffff()
[  191.534856] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[  191.536567] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  191.538171] page dumped because: kasan: bad access detected
[  191.539412] 
[  191.540027] Memory state around the buggy address:
[  191.541228]  ffff800080757b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  191.542830]  ffff800080757b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  191.544422] >ffff800080757c00: ca ca ca ca 00 02 cb cb cb cb cb cb 00 00 f1 f1
[  191.545906]                             ^
[  191.547020]  ffff800080757c80: f1 f1 01 f2 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00
[  191.548612]  ffff800080757d00: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1
[  191.550152] ==================================================================

test log snippet boot parser 4

Home

[  191.577498] ==================================================================
[  191.579822] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x114/0x200
[  191.582008] Read of size 1 at addr ffff800080877c2a by task kunit_try_catch/189
[  191.583533] 
[  191.584355] CPU: 1 PID: 189 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  191.586851] Hardware name: linux,dummy-virt (DT)
[  191.588340] Call trace:
[  191.589486]  dump_backtrace+0x9c/0x128
[  191.590694]  show_stack+0x20/0x38
[  191.591783]  dump_stack_lvl+0x60/0xb0
[  191.592910]  print_report+0x314/0x5d8
[  191.594176]  kasan_report+0xc8/0x118
[  191.595714]  __asan_load1+0x60/0x70
[  191.597096]  kasan_alloca_oob_right+0x114/0x200
[  191.598572]  kunit_try_run_case+0xf8/0x260
[  191.599882]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  191.601580]  kthread+0x18c/0x1a8
[  191.602654]  ret_from_fork+0x10/0x20
[  191.603945] 
[  191.605004] The buggy address belongs to stack of task kunit_try_catch/189
[  191.606500] 
[  191.607193] The buggy address belongs to the virtual mapping at
[  191.607193]  [ffff800080870000, ffff800080879000) created by:
[  191.607193]  kernel_clone+0xf8/0x540
[  191.610544] 
[  191.611153] The buggy address belongs to the physical page:
[  191.612824] page:00000000077af11d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060a5
[  191.614795] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  191.616546] page_type: 0xffffffff()
[  191.617697] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[  191.619453] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  191.621188] page dumped because: kasan: bad access detected
[  191.623327] 
[  191.623865] Memory state around the buggy address:
[  191.625520]  ffff800080877b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  191.627226]  ffff800080877b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  191.629053] >ffff800080877c00: ca ca ca ca 00 02 cb cb cb cb cb cb f1 f1 f1 f1
[  191.630579]                                   ^
[  191.631828]  ffff800080877c80: 01 f2 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00
[  191.633549]  ffff800080877d00: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1
[  191.635178] ==================================================================

test log snippet boot parser 5

Home

[  194.918408] ==================================================================
[  194.920718] BUG: KASAN: double-free in kfree+0x74/0x138
[  194.922959] Free of addr ffff0000c5e64a60 by task kunit_try_catch/211
[  194.925971] 
[  194.926833] CPU: 1 PID: 211 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  194.929394] Hardware name: linux,dummy-virt (DT)
[  194.930466] Call trace:
[  194.931901]  dump_backtrace+0x9c/0x128
[  194.933465]  show_stack+0x20/0x38
[  194.934864]  dump_stack_lvl+0x60/0xb0
[  194.936336]  print_report+0xf8/0x5d8
[  194.937455]  kasan_report_invalid_free+0xb0/0xd8
[  194.939520]  __kasan_slab_free+0x134/0x170
[  194.941189]  __kmem_cache_free+0x170/0x2e0
[  194.942417]  kfree+0x74/0x138
[  194.943393]  kfree_sensitive+0x3c/0xb0
[  194.944617]  kmalloc_double_kzfree+0xc8/0x1d8
[  194.946150]  kunit_try_run_case+0xf8/0x260
[  194.947690]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  194.949443]  kthread+0x18c/0x1a8
[  194.950550]  ret_from_fork+0x10/0x20
[  194.951834] 
[  194.952399] Allocated by task 211:
[  194.954205]  kasan_save_stack+0x3c/0x68
[  194.955265]  kasan_set_track+0x2c/0x40
[  194.956561]  kasan_save_alloc_info+0x24/0x38
[  194.958282]  __kasan_kmalloc+0xd4/0xd8
[  194.959491]  kmalloc_trace+0x68/0x130
[  194.960721]  kmalloc_double_kzfree+0x9c/0x1d8
[  194.962149]  kunit_try_run_case+0xf8/0x260
[  194.963362]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  194.965272]  kthread+0x18c/0x1a8
[  194.967095]  ret_from_fork+0x10/0x20
[  194.968642] 
[  194.969291] Freed by task 211:
[  194.970184]  kasan_save_stack+0x3c/0x68
[  194.971391]  kasan_set_track+0x2c/0x40
[  194.972719]  kasan_save_free_info+0x38/0x60
[  194.974895]  __kasan_slab_free+0x100/0x170
[  194.976200]  __kmem_cache_free+0x170/0x2e0
[  194.977544]  kfree+0x74/0x138
[  194.978578]  kfree_sensitive+0x80/0xb0
[  194.979702]  kmalloc_double_kzfree+0xb8/0x1d8
[  194.981118]  kunit_try_run_case+0xf8/0x260
[  194.982431]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  194.984055]  kthread+0x18c/0x1a8
[  194.985106]  ret_from_fork+0x10/0x20
[  194.986412] 
[  194.986997] The buggy address belongs to the object at ffff0000c5e64a60
[  194.986997]  which belongs to the cache kmalloc-16 of size 16
[  194.989837] The buggy address is located 0 bytes inside of
[  194.989837]  16-byte region [ffff0000c5e64a60, ffff0000c5e64a70)
[  194.992847] 
[  194.993486] The buggy address belongs to the physical page:
[  194.995273] page:000000004e539889 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e64
[  194.997127] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  194.998940] page_type: 0xffffffff()
[  195.000153] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  195.002205] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  195.003462] page dumped because: kasan: bad access detected
[  195.004858] 
[  195.005803] Memory state around the buggy address:
[  195.007380]  ffff0000c5e64900: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[  195.009431]  ffff0000c5e64980: 00 00 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[  195.011090] >ffff0000c5e64a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  195.012813]                                                        ^
[  195.014294]  ffff0000c5e64a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  195.015721]  ffff0000c5e64b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  195.017832] ==================================================================

test log snippet boot parser 6

Home

[  192.229996] ==================================================================
[  192.231845] BUG: KASAN: double-free in kmem_cache_double_free+0xe8/0x240
[  192.233493] Free of addr ffff0000c5f13000 by task kunit_try_catch/195
[  192.234896] 
[  192.235701] CPU: 1 PID: 195 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  192.237850] Hardware name: linux,dummy-virt (DT)
[  192.239142] Call trace:
[  192.239998]  dump_backtrace+0x9c/0x128
[  192.241303]  show_stack+0x20/0x38
[  192.242488]  dump_stack_lvl+0x60/0xb0
[  192.243995]  print_report+0xf8/0x5d8
[  192.245415]  kasan_report_invalid_free+0xb0/0xd8
[  192.247072]  __kasan_slab_free+0x134/0x170
[  192.248414]  kmem_cache_free+0x18c/0x3f8
[  192.249724]  kmem_cache_double_free+0xe8/0x240
[  192.250965]  kunit_try_run_case+0xf8/0x260
[  192.252288]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  192.253936]  kthread+0x18c/0x1a8
[  192.254944]  ret_from_fork+0x10/0x20
[  192.256413] 
[  192.257428] Allocated by task 195:
[  192.258389]  kasan_save_stack+0x3c/0x68
[  192.259525]  kasan_set_track+0x2c/0x40
[  192.260761]  kasan_save_alloc_info+0x24/0x38
[  192.262204]  __kasan_slab_alloc+0xa8/0xb0
[  192.263500]  kmem_cache_alloc+0x134/0x330
[  192.265085]  kmem_cache_double_free+0xb8/0x240
[  192.266455]  kunit_try_run_case+0xf8/0x260
[  192.267749]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  192.269429]  kthread+0x18c/0x1a8
[  192.270521]  ret_from_fork+0x10/0x20
[  192.271785] 
[  192.273129] Freed by task 195:
[  192.274024]  kasan_save_stack+0x3c/0x68
[  192.275181]  kasan_set_track+0x2c/0x40
[  192.276696]  kasan_save_free_info+0x38/0x60
[  192.278693]  __kasan_slab_free+0x100/0x170
[  192.280219]  kmem_cache_free+0x18c/0x3f8
[  192.281600]  kmem_cache_double_free+0xd4/0x240
[  192.282929]  kunit_try_run_case+0xf8/0x260
[  192.284207]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  192.286557]  kthread+0x18c/0x1a8
[  192.287677]  ret_from_fork+0x10/0x20
[  192.289298] 
[  192.289948] The buggy address belongs to the object at ffff0000c5f13000
[  192.289948]  which belongs to the cache test_cache of size 200
[  192.292451] The buggy address is located 0 bytes inside of
[  192.292451]  200-byte region [ffff0000c5f13000, ffff0000c5f130c8)
[  192.295163] 
[  192.295802] The buggy address belongs to the physical page:
[  192.297310] page:00000000daf056e8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f13
[  192.299303] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  192.301038] page_type: 0xffffffff()
[  192.302081] raw: 0bfffc0000000800 ffff0000c60bf280 dead000000000122 0000000000000000
[  192.304165] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[  192.306031] page dumped because: kasan: bad access detected
[  192.307177] 
[  192.307786] Memory state around the buggy address:
[  192.309196]  ffff0000c5f12f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  192.310975]  ffff0000c5f12f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  192.312815] >ffff0000c5f13000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  192.314543]                    ^
[  192.315469]  ffff0000c5f13080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[  192.317408]  ffff0000c5f13100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  192.319217] ==================================================================

test log snippet boot parser 7

Home

[  191.311520] ==================================================================
[  191.313639] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0xa8/0x168
[  191.315339] Read of size 1 at addr ffffd84b69c75d0d by task kunit_try_catch/181
[  191.317843] 
[  191.318499] CPU: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  191.320716] Hardware name: linux,dummy-virt (DT)
[  191.322547] Call trace:
[  191.323209]  dump_backtrace+0x9c/0x128
[  191.324408]  show_stack+0x20/0x38
[  191.325430]  dump_stack_lvl+0x60/0xb0
[  191.326577]  print_report+0x314/0x5d8
[  191.327816]  kasan_report+0xc8/0x118
[  191.329238]  __asan_load1+0x60/0x70
[  191.330420]  kasan_global_oob_right+0xa8/0x168
[  191.331653]  kunit_try_run_case+0xf8/0x260
[  191.332922]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  191.334503]  kthread+0x18c/0x1a8
[  191.335786]  ret_from_fork+0x10/0x20
[  191.337120] 
[  191.337969] The buggy address belongs to the variable:
[  191.339171]  global_array+0xd/0x40
[  191.340577] 
[  191.341378] The buggy address belongs to the virtual mapping at
[  191.341378]  [ffffd84b68370000, ffffd84b69d01000) created by:
[  191.341378]  paging_init+0x26c/0x968
[  191.343688] 
[  191.345043] The buggy address belongs to the physical page:
[  191.346231] page:00000000386be299 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x45675
[  191.348328] flags: 0x3fffc0000004000(reserved|node=0|zone=0|lastcpupid=0xffff)
[  191.349580] page_type: 0xffffffff()
[  191.350713] raw: 03fffc0000004000 fffffc0000159d48 fffffc0000159d48 0000000000000000
[  191.352336] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  191.354026] page dumped because: kasan: bad access detected
[  191.355281] 
[  191.355925] Memory state around the buggy address:
[  191.357213]  ffffd84b69c75c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  191.358931]  ffffd84b69c75c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  191.360686] >ffffd84b69c75d00: 00 02 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9
[  191.362415]                       ^
[  191.363396]  ffffd84b69c75d80: 00 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[  191.365132]  ffffd84b69c75e00: 04 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[  191.366658] ==================================================================

test log snippet boot parser 8

Home

[  188.094594] ==================================================================
[  188.096896] BUG: KASAN: invalid-free in kfree+0x12c/0x138
[  188.098240] Free of addr ffff0000c5ec8001 by task kunit_try_catch/127
[  188.099678] 
[  188.100372] CPU: 1 PID: 127 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  188.102053] Hardware name: linux,dummy-virt (DT)
[  188.103158] Call trace:
[  188.103873]  dump_backtrace+0x9c/0x128
[  188.104965]  show_stack+0x20/0x38
[  188.105979]  dump_stack_lvl+0x60/0xb0
[  188.107201]  print_report+0xf8/0x5d8
[  188.108383]  kasan_report_invalid_free+0xb0/0xd8
[  188.109688]  __kasan_kfree_large+0x54/0xa0
[  188.110948]  free_large_kmalloc+0x5c/0x100
[  188.112115]  kfree+0x12c/0x138
[  188.113067]  kmalloc_pagealloc_invalid_free+0xa8/0x1a8
[  188.114515]  kunit_try_run_case+0xf8/0x260
[  188.115702]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  188.117191]  kthread+0x18c/0x1a8
[  188.118190]  ret_from_fork+0x10/0x20
[  188.119366] 
[  188.119959] The buggy address belongs to the physical page:
[  188.121180] page:00000000361d544d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ec8
[  188.123098] head:00000000361d544d order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  188.124742] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[  188.126309] page_type: 0xffffffff()
[  188.127357] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[  188.129105] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  188.130660] page dumped because: kasan: bad access detected
[  188.131918] 
[  188.132458] Memory state around the buggy address:
[  188.133633]  ffff0000c5ec7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.135258]  ffff0000c5ec7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.136902] >ffff0000c5ec8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  188.138415]                    ^
[  188.139306]  ffff0000c5ec8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  188.140874]  ffff0000c5ec8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  188.142437] ==================================================================

test log snippet boot parser 9

Home

[  192.378315] ==================================================================
[  192.380354] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xdc/0x230
[  192.381964] Free of addr ffff0000c5f7c001 by task kunit_try_catch/197
[  192.383616] 
[  192.384310] CPU: 1 PID: 197 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  192.386032] Hardware name: linux,dummy-virt (DT)
[  192.387148] Call trace:
[  192.387918]  dump_backtrace+0x9c/0x128
[  192.389194]  show_stack+0x20/0x38
[  192.390238]  dump_stack_lvl+0x60/0xb0
[  192.391420]  print_report+0xf8/0x5d8
[  192.392733]  kasan_report_invalid_free+0xb0/0xd8
[  192.394149]  __kasan_slab_free+0x164/0x170
[  192.395405]  kmem_cache_free+0x18c/0x3f8
[  192.396736]  kmem_cache_invalid_free+0xdc/0x230
[  192.398249]  kunit_try_run_case+0xf8/0x260
[  192.399681]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  192.401527]  kthread+0x18c/0x1a8
[  192.402625]  ret_from_fork+0x10/0x20
[  192.403791] 
[  192.404748] Allocated by task 197:
[  192.405660]  kasan_save_stack+0x3c/0x68
[  192.406834]  kasan_set_track+0x2c/0x40
[  192.408142]  kasan_save_alloc_info+0x24/0x38
[  192.409600]  __kasan_slab_alloc+0xa8/0xb0
[  192.410929]  kmem_cache_alloc+0x134/0x330
[  192.412220]  kmem_cache_invalid_free+0xb8/0x230
[  192.413699]  kunit_try_run_case+0xf8/0x260
[  192.415037]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  192.416607]  kthread+0x18c/0x1a8
[  192.417578]  ret_from_fork+0x10/0x20
[  192.419983] 
[  192.420933] The buggy address belongs to the object at ffff0000c5f7c000
[  192.420933]  which belongs to the cache test_cache of size 200
[  192.423008] The buggy address is located 1 bytes inside of
[  192.423008]  200-byte region [ffff0000c5f7c000, ffff0000c5f7c0c8)
[  192.425933] 
[  192.426616] The buggy address belongs to the physical page:
[  192.428066] page:00000000aa834a49 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f7c
[  192.430233] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  192.431740] page_type: 0xffffffff()
[  192.433241] raw: 0bfffc0000000800 ffff0000c5760a00 dead000000000122 0000000000000000
[  192.434846] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[  192.436521] page dumped because: kasan: bad access detected
[  192.437709] 
[  192.438362] Memory state around the buggy address:
[  192.439621]  ffff0000c5f7bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  192.441502]  ffff0000c5f7bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  192.443417] >ffff0000c5f7c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  192.445092]                    ^
[  192.446067]  ffff0000c5f7c080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[  192.447753]  ffff0000c5f7c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  192.449246] ==================================================================

test log snippet boot parser 10

Home

[  189.971653] ==================================================================
[  189.973700] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0xe0/0x1f0
[  189.975598] Read of size 18446744073709551614 at addr ffff0000c5fdcd84 by task kunit_try_catch/159
[  189.978101] 
[  189.978790] CPU: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  189.980989] Hardware name: linux,dummy-virt (DT)
[  189.982014] Call trace:
[  189.982849]  dump_backtrace+0x9c/0x128
[  189.984358]  show_stack+0x20/0x38
[  189.985500]  dump_stack_lvl+0x60/0xb0
[  189.986683]  print_report+0xf8/0x5d8
[  189.987873]  kasan_report+0xc8/0x118
[  189.989273]  kasan_check_range+0xe8/0x190
[  189.990584]  __asan_memmove+0x3c/0x98
[  189.991712]  kmalloc_memmove_negative_size+0xe0/0x1f0
[  189.993184]  kunit_try_run_case+0xf8/0x260
[  189.994463]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.996278]  kthread+0x18c/0x1a8
[  189.997227]  ret_from_fork+0x10/0x20
[  189.998438] 
[  189.999110] Allocated by task 159:
[  190.000122]  kasan_save_stack+0x3c/0x68
[  190.001487]  kasan_set_track+0x2c/0x40
[  190.002689]  kasan_save_alloc_info+0x24/0x38
[  190.004143]  __kasan_kmalloc+0xd4/0xd8
[  190.005524]  kmalloc_trace+0x68/0x130
[  190.006584]  kmalloc_memmove_negative_size+0xa0/0x1f0
[  190.008118]  kunit_try_run_case+0xf8/0x260
[  190.009505]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  190.011105]  kthread+0x18c/0x1a8
[  190.012136]  ret_from_fork+0x10/0x20
[  190.013466] 
[  190.014150] The buggy address belongs to the object at ffff0000c5fdcd80
[  190.014150]  which belongs to the cache kmalloc-64 of size 64
[  190.016961] The buggy address is located 4 bytes inside of
[  190.016961]  64-byte region [ffff0000c5fdcd80, ffff0000c5fdcdc0)
[  190.019429] 
[  190.020050] The buggy address belongs to the physical page:
[  190.021280] page:00000000f84ce13e refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fdc
[  190.023240] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  190.025178] page_type: 0xffffffff()
[  190.026225] raw: 0bfffc0000000800 ffff0000c0001640 dead000000000122 0000000000000000
[  190.027947] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[  190.029794] page dumped because: kasan: bad access detected
[  190.031012] 
[  190.031619] Memory state around the buggy address:
[  190.033397]  ffff0000c5fdcc80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[  190.034922]  ffff0000c5fdcd00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[  190.036932] >ffff0000c5fdcd80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[  190.038455]                    ^
[  190.039404]  ffff0000c5fdce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  190.041135]  ffff0000c5fdce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  190.042288] ==================================================================

test log snippet boot parser 11

Home

[  193.754818] ==================================================================
[  193.756937] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x194/0x6d8
[  193.758821] Write of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[  193.760550] 
[  193.761177] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  193.762968] Hardware name: linux,dummy-virt (DT)
[  193.763954] Call trace:
[  193.764689]  dump_backtrace+0x9c/0x128
[  193.765792]  show_stack+0x20/0x38
[  193.766754]  dump_stack_lvl+0x60/0xb0
[  193.767994]  print_report+0xf8/0x5d8
[  193.769213]  kasan_report+0xc8/0x118
[  193.770351]  kasan_check_range+0xe8/0x190
[  193.771579]  __kasan_check_write+0x20/0x30
[  193.772731]  kasan_bitops_modify.constprop.0+0x194/0x6d8
[  193.774178]  kasan_bitops_generic+0xb4/0x148
[  193.775371]  kunit_try_run_case+0xf8/0x260
[  193.776627]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  193.778094]  kthread+0x18c/0x1a8
[  193.779058]  ret_from_fork+0x10/0x20
[  193.780142] 
[  193.780678] Allocated by task 207:
[  193.781645]  kasan_save_stack+0x3c/0x68
[  193.782843]  kasan_set_track+0x2c/0x40
[  193.783951]  kasan_save_alloc_info+0x24/0x38
[  193.785314]  __kasan_kmalloc+0xd4/0xd8
[  193.786488]  kmalloc_trace+0x68/0x130
[  193.787624]  kasan_bitops_generic+0x98/0x148
[  193.788870]  kunit_try_run_case+0xf8/0x260
[  193.790317]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  193.791946]  kthread+0x18c/0x1a8
[  193.793027]  ret_from_fork+0x10/0x20
[  193.794113] 
[  193.794708] The buggy address belongs to the object at ffff0000c5bd5800
[  193.794708]  which belongs to the cache kmalloc-16 of size 16
[  193.796943] The buggy address is located 8 bytes inside of
[  193.796943]  allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[  193.798487] 
[  193.799063] The buggy address belongs to the physical page:
[  193.800406] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[  193.802317] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  193.803857] page_type: 0xffffffff()
[  193.804943] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  193.806615] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  193.808196] page dumped because: kasan: bad access detected
[  193.809465] 
[  193.810037] Memory state around the buggy address:
[  193.811286]  ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[  193.812893]  ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  193.814486] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  193.815980]                       ^
[  193.816995]  ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  193.818551]  ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  193.820213] ==================================================================
---
[  193.961428] ==================================================================
[  193.962897] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0x6d8
[  193.964573] Write of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[  193.966309] 
[  193.966934] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  193.968727] Hardware name: linux,dummy-virt (DT)
[  193.969866] Call trace:
[  193.970572]  dump_backtrace+0x9c/0x128
[  193.971674]  show_stack+0x20/0x38
[  193.972750]  dump_stack_lvl+0x60/0xb0
[  193.973945]  print_report+0xf8/0x5d8
[  193.975062]  kasan_report+0xc8/0x118
[  193.976282]  kasan_check_range+0xe8/0x190
[  193.977513]  __kasan_check_write+0x20/0x30
[  193.978650]  kasan_bitops_modify.constprop.0+0x1dc/0x6d8
[  193.980074]  kasan_bitops_generic+0xb4/0x148
[  193.981357]  kunit_try_run_case+0xf8/0x260
[  193.982586]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  193.984036]  kthread+0x18c/0x1a8
[  193.984988]  ret_from_fork+0x10/0x20
[  193.986188] 
[  193.986805] Allocated by task 207:
[  193.987721]  kasan_save_stack+0x3c/0x68
[  193.988908]  kasan_set_track+0x2c/0x40
[  193.990027]  kasan_save_alloc_info+0x24/0x38
[  193.991389]  __kasan_kmalloc+0xd4/0xd8
[  193.992530]  kmalloc_trace+0x68/0x130
[  193.993558]  kasan_bitops_generic+0x98/0x148
[  193.994874]  kunit_try_run_case+0xf8/0x260
[  193.996136]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  193.998736]  kthread+0x18c/0x1a8
[  193.999866]  ret_from_fork+0x10/0x20
[  194.001036] 
[  194.001591] The buggy address belongs to the object at ffff0000c5bd5800
[  194.001591]  which belongs to the cache kmalloc-16 of size 16
[  194.004048] The buggy address is located 8 bytes inside of
[  194.004048]  allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[  194.006348] 
[  194.006986] The buggy address belongs to the physical page:
[  194.008272] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[  194.010136] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  194.011681] page_type: 0xffffffff()
[  194.012815] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  194.014497] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  194.016022] page dumped because: kasan: bad access detected
[  194.017252] 
[  194.017882] Memory state around the buggy address:
[  194.019068]  ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[  194.020789]  ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  194.022340] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.023792]                       ^
[  194.024684]  ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.026318]  ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.027884] ==================================================================
---
[  193.685450] ==================================================================
[  193.687019] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x160/0x6d8
[  193.688694] Write of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[  193.690413] 
[  193.691044] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  193.692802] Hardware name: linux,dummy-virt (DT)
[  193.693909] Call trace:
[  193.694641]  dump_backtrace+0x9c/0x128
[  193.695742]  show_stack+0x20/0x38
[  193.696783]  dump_stack_lvl+0x60/0xb0
[  193.697939]  print_report+0xf8/0x5d8
[  193.699093]  kasan_report+0xc8/0x118
[  193.700279]  kasan_check_range+0xe8/0x190
[  193.701448]  __kasan_check_write+0x20/0x30
[  193.702674]  kasan_bitops_modify.constprop.0+0x160/0x6d8
[  193.704102]  kasan_bitops_generic+0xb4/0x148
[  193.705277]  kunit_try_run_case+0xf8/0x260
[  193.706571]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  193.708061]  kthread+0x18c/0x1a8
[  193.709001]  ret_from_fork+0x10/0x20
[  193.710153] 
[  193.710725] Allocated by task 207:
[  193.711607]  kasan_save_stack+0x3c/0x68
[  193.712719]  kasan_set_track+0x2c/0x40
[  193.713976]  kasan_save_alloc_info+0x24/0x38
[  193.715266]  __kasan_kmalloc+0xd4/0xd8
[  193.716437]  kmalloc_trace+0x68/0x130
[  193.717488]  kasan_bitops_generic+0x98/0x148
[  193.718783]  kunit_try_run_case+0xf8/0x260
[  193.720042]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  193.721512]  kthread+0x18c/0x1a8
[  193.722526]  ret_from_fork+0x10/0x20
[  193.723573] 
[  193.724136] The buggy address belongs to the object at ffff0000c5bd5800
[  193.724136]  which belongs to the cache kmalloc-16 of size 16
[  193.726407] The buggy address is located 8 bytes inside of
[  193.726407]  allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[  193.728699] 
[  193.729327] The buggy address belongs to the physical page:
[  193.730560] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[  193.732557] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  193.734070] page_type: 0xffffffff()
[  193.735151] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  193.736742] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  193.738477] page dumped because: kasan: bad access detected
[  193.739729] 
[  193.740349] Memory state around the buggy address:
[  193.741598]  ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[  193.743203]  ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  193.744833] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  193.746377]                       ^
[  193.747339]  ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  193.748931]  ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  193.750435] ==================================================================
---
[  193.526588] ==================================================================
[  193.528236] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0x6d8
[  193.530497] Write of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[  193.532874] 
[  193.533537] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  193.535442] Hardware name: linux,dummy-virt (DT)
[  193.536638] Call trace:
[  193.537354]  dump_backtrace+0x9c/0x128
[  193.538654]  show_stack+0x20/0x38
[  193.539872]  dump_stack_lvl+0x60/0xb0
[  193.541335]  print_report+0xf8/0x5d8
[  193.542684]  kasan_report+0xc8/0x118
[  193.544160]  kasan_check_range+0xe8/0x190
[  193.545522]  __kasan_check_write+0x20/0x30
[  193.546731]  kasan_bitops_modify.constprop.0+0x100/0x6d8
[  193.548483]  kasan_bitops_generic+0xb4/0x148
[  193.549805]  kunit_try_run_case+0xf8/0x260
[  193.550568]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  193.552526]  kthread+0x18c/0x1a8
[  193.554003]  ret_from_fork+0x10/0x20
[  193.555330] 
[  193.555993] Allocated by task 207:
[  193.557275]  kasan_save_stack+0x3c/0x68
[  193.558945]  kasan_set_track+0x2c/0x40
[  193.560734]  kasan_save_alloc_info+0x24/0x38
[  193.562323]  __kasan_kmalloc+0xd4/0xd8
[  193.563528]  kmalloc_trace+0x68/0x130
[  193.564858]  kasan_bitops_generic+0x98/0x148
[  193.566143]  kunit_try_run_case+0xf8/0x260
[  193.567553]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  193.569717]  kthread+0x18c/0x1a8
[  193.571091]  ret_from_fork+0x10/0x20
[  193.572631] 
[  193.573202] The buggy address belongs to the object at ffff0000c5bd5800
[  193.573202]  which belongs to the cache kmalloc-16 of size 16
[  193.575662] The buggy address is located 8 bytes inside of
[  193.575662]  allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[  193.578940] 
[  193.579553] The buggy address belongs to the physical page:
[  193.581010] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[  193.582974] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  193.584627] page_type: 0xffffffff()
[  193.585823] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  193.587847] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  193.589506] page dumped because: kasan: bad access detected
[  193.590892] 
[  193.591437] Memory state around the buggy address:
[  193.592640]  ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[  193.594511]  ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  193.597130] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  193.599275]                       ^
[  193.600793]  ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  193.602465]  ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  193.604002] ==================================================================
---
[  193.366345] ==================================================================
[  193.368534] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4/0x6d8
[  193.371557] Write of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[  193.373576] 
[  193.374331] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  193.376436] Hardware name: linux,dummy-virt (DT)
[  193.377696] Call trace:
[  193.378406]  dump_backtrace+0x9c/0x128
[  193.379970]  show_stack+0x20/0x38
[  193.381352]  dump_stack_lvl+0x60/0xb0
[  193.382661]  print_report+0xf8/0x5d8
[  193.383661]  kasan_report+0xc8/0x118
[  193.386036]  kasan_check_range+0xe8/0x190
[  193.387272]  __kasan_check_write+0x20/0x30
[  193.388400]  kasan_bitops_modify.constprop.0+0xa4/0x6d8
[  193.390006]  kasan_bitops_generic+0xb4/0x148
[  193.391251]  kunit_try_run_case+0xf8/0x260
[  193.392853]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  193.394477]  kthread+0x18c/0x1a8
[  193.395605]  ret_from_fork+0x10/0x20
[  193.396748] 
[  193.397410] Allocated by task 207:
[  193.398534]  kasan_save_stack+0x3c/0x68
[  193.399735]  kasan_set_track+0x2c/0x40
[  193.401025]  kasan_save_alloc_info+0x24/0x38
[  193.402474]  __kasan_kmalloc+0xd4/0xd8
[  193.403742]  kmalloc_trace+0x68/0x130
[  193.405068]  kasan_bitops_generic+0x98/0x148
[  193.406743]  kunit_try_run_case+0xf8/0x260
[  193.408105]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  193.409707]  kthread+0x18c/0x1a8
[  193.411155]  ret_from_fork+0x10/0x20
[  193.412353] 
[  193.412939] The buggy address belongs to the object at ffff0000c5bd5800
[  193.412939]  which belongs to the cache kmalloc-16 of size 16
[  193.415384] The buggy address is located 8 bytes inside of
[  193.415384]  allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[  193.417859] 
[  193.418463] The buggy address belongs to the physical page:
[  193.419826] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[  193.422115] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  193.424096] page_type: 0xffffffff()
[  193.425148] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  193.427494] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  193.429711] page dumped because: kasan: bad access detected
[  193.430952] 
[  193.431608] Memory state around the buggy address:
[  193.433667]  ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[  193.435346]  ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  193.437129] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  193.438710]                       ^
[  193.439699]  ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  193.441589]  ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  193.443243] ==================================================================
---
[  193.890188] ==================================================================
[  193.892355] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1ac/0x6d8
[  193.895160] Write of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[  193.896821] 
[  193.897434] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  193.899269] Hardware name: linux,dummy-virt (DT)
[  193.900321] Call trace:
[  193.901016]  dump_backtrace+0x9c/0x128
[  193.902173]  show_stack+0x20/0x38
[  193.903178]  dump_stack_lvl+0x60/0xb0
[  193.904359]  print_report+0xf8/0x5d8
[  193.905456]  kasan_report+0xc8/0x118
[  193.906667]  kasan_check_range+0xe8/0x190
[  193.907931]  __kasan_check_write+0x20/0x30
[  193.909105]  kasan_bitops_modify.constprop.0+0x1ac/0x6d8
[  193.910513]  kasan_bitops_generic+0xb4/0x148
[  193.911739]  kunit_try_run_case+0xf8/0x260
[  193.912971]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  193.914407]  kthread+0x18c/0x1a8
[  193.915398]  ret_from_fork+0x10/0x20
[  193.916514] 
[  193.917138] Allocated by task 207:
[  193.918033]  kasan_save_stack+0x3c/0x68
[  193.919304]  kasan_set_track+0x2c/0x40
[  193.920461]  kasan_save_alloc_info+0x24/0x38
[  193.921761]  __kasan_kmalloc+0xd4/0xd8
[  193.922952]  kmalloc_trace+0x68/0x130
[  193.924046]  kasan_bitops_generic+0x98/0x148
[  193.925248]  kunit_try_run_case+0xf8/0x260
[  193.926486]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  193.927981]  kthread+0x18c/0x1a8
[  193.928985]  ret_from_fork+0x10/0x20
[  193.930085] 
[  193.930646] The buggy address belongs to the object at ffff0000c5bd5800
[  193.930646]  which belongs to the cache kmalloc-16 of size 16
[  193.932893] The buggy address is located 8 bytes inside of
[  193.932893]  allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[  193.935202] 
[  193.935825] The buggy address belongs to the physical page:
[  193.937132] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[  193.939012] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  193.940550] page_type: 0xffffffff()
[  193.941617] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  193.943301] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  193.944902] page dumped because: kasan: bad access detected
[  193.946195] 
[  193.946811] Memory state around the buggy address:
[  193.948043]  ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[  193.949643]  ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  193.951270] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  193.952743]                       ^
[  193.953808]  ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  193.955384]  ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  193.957006] ==================================================================

test log snippet boot parser 12

Home

[  193.611507] ==================================================================
[  193.613342] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x130/0x6d8
[  193.615040] Read of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[  193.616632] 
[  193.617119] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  193.618587] Hardware name: linux,dummy-virt (DT)
[  193.619729] Call trace:
[  193.620519]  dump_backtrace+0x9c/0x128
[  193.621609]  show_stack+0x20/0x38
[  193.622846]  dump_stack_lvl+0x60/0xb0
[  193.624403]  print_report+0xf8/0x5d8
[  193.625552]  kasan_report+0xc8/0x118
[  193.626716]  __asan_load8+0x9c/0xc0
[  193.627942]  kasan_bitops_modify.constprop.0+0x130/0x6d8
[  193.629524]  kasan_bitops_generic+0xb4/0x148
[  193.630877]  kunit_try_run_case+0xf8/0x260
[  193.632431]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  193.634078]  kthread+0x18c/0x1a8
[  193.634866]  ret_from_fork+0x10/0x20
[  193.636334] 
[  193.636826] Allocated by task 207:
[  193.637616]  kasan_save_stack+0x3c/0x68
[  193.638893]  kasan_set_track+0x2c/0x40
[  193.640304]  kasan_save_alloc_info+0x24/0x38
[  193.641798]  __kasan_kmalloc+0xd4/0xd8
[  193.642924]  kmalloc_trace+0x68/0x130
[  193.644278]  kasan_bitops_generic+0x98/0x148
[  193.645639]  kunit_try_run_case+0xf8/0x260
[  193.646859]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  193.648432]  kthread+0x18c/0x1a8
[  193.649287]  ret_from_fork+0x10/0x20
[  193.650516] 
[  193.651209] The buggy address belongs to the object at ffff0000c5bd5800
[  193.651209]  which belongs to the cache kmalloc-16 of size 16
[  193.653498] The buggy address is located 8 bytes inside of
[  193.653498]  allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[  193.656230] 
[  193.656899] The buggy address belongs to the physical page:
[  193.658470] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[  193.660444] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  193.662143] page_type: 0xffffffff()
[  193.663269] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  193.665203] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  193.666734] page dumped because: kasan: bad access detected
[  193.668326] 
[  193.668894] Memory state around the buggy address:
[  193.670105]  ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[  193.671686]  ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  193.673400] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  193.674705]                       ^
[  193.675744]  ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  193.677737]  ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  193.679091] ==================================================================
---
[  193.447718] ==================================================================
[  193.449340] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xd0/0x6d8
[  193.450954] Read of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[  193.453866] 
[  193.454654] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  193.456428] Hardware name: linux,dummy-virt (DT)
[  193.457528] Call trace:
[  193.459334]  dump_backtrace+0x9c/0x128
[  193.460582]  show_stack+0x20/0x38
[  193.461792]  dump_stack_lvl+0x60/0xb0
[  193.463059]  print_report+0xf8/0x5d8
[  193.464346]  kasan_report+0xc8/0x118
[  193.466411]  __asan_load8+0x9c/0xc0
[  193.467660]  kasan_bitops_modify.constprop.0+0xd0/0x6d8
[  193.469584]  kasan_bitops_generic+0xb4/0x148
[  193.470829]  kunit_try_run_case+0xf8/0x260
[  193.472017]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  193.473561]  kthread+0x18c/0x1a8
[  193.474698]  ret_from_fork+0x10/0x20
[  193.476093] 
[  193.476710] Allocated by task 207:
[  193.477814]  kasan_save_stack+0x3c/0x68
[  193.479102]  kasan_set_track+0x2c/0x40
[  193.480805]  kasan_save_alloc_info+0x24/0x38
[  193.482107]  __kasan_kmalloc+0xd4/0xd8
[  193.482795]  kmalloc_trace+0x68/0x130
[  193.483985]  kasan_bitops_generic+0x98/0x148
[  193.485964]  kunit_try_run_case+0xf8/0x260
[  193.487256]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  193.489018]  kthread+0x18c/0x1a8
[  193.490174]  ret_from_fork+0x10/0x20
[  193.491536] 
[  193.492701] The buggy address belongs to the object at ffff0000c5bd5800
[  193.492701]  which belongs to the cache kmalloc-16 of size 16
[  193.495291] The buggy address is located 8 bytes inside of
[  193.495291]  allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[  193.497644] 
[  193.498247] The buggy address belongs to the physical page:
[  193.499538] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[  193.502062] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  193.503714] page_type: 0xffffffff()
[  193.506113] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  193.507633] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  193.509863] page dumped because: kasan: bad access detected
[  193.511204] 
[  193.511806] Memory state around the buggy address:
[  193.513867]  ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[  193.515852]  ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  193.517879] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  193.519261]                       ^
[  193.520670]  ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  193.522276]  ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  193.523472] ==================================================================
---
[  193.823049] ==================================================================
[  193.824420] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0x6d8
[  193.826640] Read of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[  193.828301] 
[  193.829003] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  193.830825] Hardware name: linux,dummy-virt (DT)
[  193.831978] Call trace:
[  193.832617]  dump_backtrace+0x9c/0x128
[  193.833717]  show_stack+0x20/0x38
[  193.834811]  dump_stack_lvl+0x60/0xb0
[  193.835965]  print_report+0xf8/0x5d8
[  193.837241]  kasan_report+0xc8/0x118
[  193.838414]  __asan_load8+0x9c/0xc0
[  193.839580]  kasan_bitops_modify.constprop.0+0x19c/0x6d8
[  193.841015]  kasan_bitops_generic+0xb4/0x148
[  193.842222]  kunit_try_run_case+0xf8/0x260
[  193.843540]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  193.844980]  kthread+0x18c/0x1a8
[  193.845932]  ret_from_fork+0x10/0x20
[  193.847055] 
[  193.847630] Allocated by task 207:
[  193.848581]  kasan_save_stack+0x3c/0x68
[  193.849789]  kasan_set_track+0x2c/0x40
[  193.850955]  kasan_save_alloc_info+0x24/0x38
[  193.852226]  __kasan_kmalloc+0xd4/0xd8
[  193.853372]  kmalloc_trace+0x68/0x130
[  193.854446]  kasan_bitops_generic+0x98/0x148
[  193.855702]  kunit_try_run_case+0xf8/0x260
[  193.856943]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  193.858499]  kthread+0x18c/0x1a8
[  193.859497]  ret_from_fork+0x10/0x20
[  193.860621] 
[  193.861194] The buggy address belongs to the object at ffff0000c5bd5800
[  193.861194]  which belongs to the cache kmalloc-16 of size 16
[  193.863473] The buggy address is located 8 bytes inside of
[  193.863473]  allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[  193.865800] 
[  193.866405] The buggy address belongs to the physical page:
[  193.867740] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[  193.869666] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  193.871211] page_type: 0xffffffff()
[  193.872340] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  193.873935] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  193.875549] page dumped because: kasan: bad access detected
[  193.876860] 
[  193.877435] Memory state around the buggy address:
[  193.878710]  ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[  193.880267]  ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  193.881875] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  193.883373]                       ^
[  193.884307]  ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  193.885964]  ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  193.887459] ==================================================================
---
[  194.030960] ==================================================================
[  194.032235] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x20c/0x6d8
[  194.033992] Read of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[  194.035728] 
[  194.036330] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  194.038102] Hardware name: linux,dummy-virt (DT)
[  194.039249] Call trace:
[  194.039965]  dump_backtrace+0x9c/0x128
[  194.041075]  show_stack+0x20/0x38
[  194.042124]  dump_stack_lvl+0x60/0xb0
[  194.043399]  print_report+0xf8/0x5d8
[  194.044526]  kasan_report+0xc8/0x118
[  194.045621]  __asan_load8+0x9c/0xc0
[  194.046804]  kasan_bitops_modify.constprop.0+0x20c/0x6d8
[  194.048270]  kasan_bitops_generic+0xb4/0x148
[  194.049510]  kunit_try_run_case+0xf8/0x260
[  194.050716]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  194.052202]  kthread+0x18c/0x1a8
[  194.053208]  ret_from_fork+0x10/0x20
[  194.054290] 
[  194.054854] Allocated by task 207:
[  194.055748]  kasan_save_stack+0x3c/0x68
[  194.056951]  kasan_set_track+0x2c/0x40
[  194.058082]  kasan_save_alloc_info+0x24/0x38
[  194.059420]  __kasan_kmalloc+0xd4/0xd8
[  194.060561]  kmalloc_trace+0x68/0x130
[  194.061721]  kasan_bitops_generic+0x98/0x148
[  194.063007]  kunit_try_run_case+0xf8/0x260
[  194.064262]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  194.065684]  kthread+0x18c/0x1a8
[  194.066644]  ret_from_fork+0x10/0x20
[  194.067642] 
[  194.068265] The buggy address belongs to the object at ffff0000c5bd5800
[  194.068265]  which belongs to the cache kmalloc-16 of size 16
[  194.070630] The buggy address is located 8 bytes inside of
[  194.070630]  allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[  194.072933] 
[  194.073544] The buggy address belongs to the physical page:
[  194.074893] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[  194.076760] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  194.078372] page_type: 0xffffffff()
[  194.079479] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  194.081065] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  194.082747] page dumped because: kasan: bad access detected
[  194.084038] 
[  194.084626] Memory state around the buggy address:
[  194.085789]  ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[  194.087485]  ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  194.089055] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.090583]                       ^
[  194.091547]  ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.093150]  ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.094649] ==================================================================

test log snippet boot parser 13

Home

[  194.373422] ==================================================================
[  194.374694] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x144/0x7b8
[  194.376517] Write of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[  194.378322] 
[  194.378935] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  194.380617] Hardware name: linux,dummy-virt (DT)
[  194.381705] Call trace:
[  194.382429]  dump_backtrace+0x9c/0x128
[  194.383577]  show_stack+0x20/0x38
[  194.384625]  dump_stack_lvl+0x60/0xb0
[  194.385819]  print_report+0xf8/0x5d8
[  194.387002]  kasan_report+0xc8/0x118
[  194.388173]  kasan_check_range+0xe8/0x190
[  194.389372]  __kasan_check_write+0x20/0x30
[  194.390530]  kasan_bitops_test_and_modify.constprop.0+0x144/0x7b8
[  194.392140]  kasan_bitops_generic+0xc0/0x148
[  194.393355]  kunit_try_run_case+0xf8/0x260
[  194.394584]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  194.396045]  kthread+0x18c/0x1a8
[  194.396980]  ret_from_fork+0x10/0x20
[  194.398181] 
[  194.398758] Allocated by task 207:
[  194.399676]  kasan_save_stack+0x3c/0x68
[  194.400858]  kasan_set_track+0x2c/0x40
[  194.402019]  kasan_save_alloc_info+0x24/0x38
[  194.403318]  __kasan_kmalloc+0xd4/0xd8
[  194.404468]  kmalloc_trace+0x68/0x130
[  194.405550]  kasan_bitops_generic+0x98/0x148
[  194.406753]  kunit_try_run_case+0xf8/0x260
[  194.408043]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  194.409502]  kthread+0x18c/0x1a8
[  194.410535]  ret_from_fork+0x10/0x20
[  194.411631] 
[  194.412166] The buggy address belongs to the object at ffff0000c5bd5800
[  194.412166]  which belongs to the cache kmalloc-16 of size 16
[  194.414558] The buggy address is located 8 bytes inside of
[  194.414558]  allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[  194.417865] 
[  194.418619] The buggy address belongs to the physical page:
[  194.419884] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[  194.421944] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  194.423468] page_type: 0xffffffff()
[  194.424597] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  194.426281] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  194.427922] page dumped because: kasan: bad access detected
[  194.429141] 
[  194.429716] Memory state around the buggy address:
[  194.431010]  ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[  194.432580]  ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  194.434161] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.435668]                       ^
[  194.436640]  ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.438284]  ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.439741] ==================================================================
---
[  194.235192] ==================================================================
[  194.236813] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x100/0x7b8
[  194.238558] Write of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[  194.240272] 
[  194.240968] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  194.242695] Hardware name: linux,dummy-virt (DT)
[  194.243863] Call trace:
[  194.244641]  dump_backtrace+0x9c/0x128
[  194.245740]  show_stack+0x20/0x38
[  194.246788]  dump_stack_lvl+0x60/0xb0
[  194.247989]  print_report+0xf8/0x5d8
[  194.249149]  kasan_report+0xc8/0x118
[  194.250280]  kasan_check_range+0xe8/0x190
[  194.251600]  __kasan_check_write+0x20/0x30
[  194.252743]  kasan_bitops_test_and_modify.constprop.0+0x100/0x7b8
[  194.254414]  kasan_bitops_generic+0xc0/0x148
[  194.255668]  kunit_try_run_case+0xf8/0x260
[  194.256898]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  194.258374]  kthread+0x18c/0x1a8
[  194.259376]  ret_from_fork+0x10/0x20
[  194.260493] 
[  194.261090] Allocated by task 207:
[  194.262011]  kasan_save_stack+0x3c/0x68
[  194.263133]  kasan_set_track+0x2c/0x40
[  194.264336]  kasan_save_alloc_info+0x24/0x38
[  194.265702]  __kasan_kmalloc+0xd4/0xd8
[  194.266889]  kmalloc_trace+0x68/0x130
[  194.267922]  kasan_bitops_generic+0x98/0x148
[  194.269206]  kunit_try_run_case+0xf8/0x260
[  194.270449]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  194.271888]  kthread+0x18c/0x1a8
[  194.272874]  ret_from_fork+0x10/0x20
[  194.273844] 
[  194.274379] The buggy address belongs to the object at ffff0000c5bd5800
[  194.274379]  which belongs to the cache kmalloc-16 of size 16
[  194.277315] The buggy address is located 8 bytes inside of
[  194.277315]  allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[  194.279638] 
[  194.280333] The buggy address belongs to the physical page:
[  194.281603] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[  194.283459] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  194.285117] page_type: 0xffffffff()
[  194.286308] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  194.287999] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  194.289470] page dumped because: kasan: bad access detected
[  194.290832] 
[  194.291480] Memory state around the buggy address:
[  194.292689]  ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[  194.294308]  ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  194.295977] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.297461]                       ^
[  194.298429]  ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.300027]  ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.301445] ==================================================================
---
[  194.719296] ==================================================================
[  194.720865] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x230/0x7b8
[  194.722693] Write of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[  194.724478] 
[  194.725215] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  194.726956] Hardware name: linux,dummy-virt (DT)
[  194.728353] Call trace:
[  194.729050]  dump_backtrace+0x9c/0x128
[  194.730852]  show_stack+0x20/0x38
[  194.731883]  dump_stack_lvl+0x60/0xb0
[  194.733038]  print_report+0xf8/0x5d8
[  194.734279]  kasan_report+0xc8/0x118
[  194.735384]  kasan_check_range+0xe8/0x190
[  194.736685]  __kasan_check_write+0x20/0x30
[  194.737904]  kasan_bitops_test_and_modify.constprop.0+0x230/0x7b8
[  194.739475]  kasan_bitops_generic+0xc0/0x148
[  194.740686]  kunit_try_run_case+0xf8/0x260
[  194.741947]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  194.743399]  kthread+0x18c/0x1a8
[  194.744399]  ret_from_fork+0x10/0x20
[  194.745477] 
[  194.746045] Allocated by task 207:
[  194.747028]  kasan_save_stack+0x3c/0x68
[  194.748204]  kasan_set_track+0x2c/0x40
[  194.749462]  kasan_save_alloc_info+0x24/0x38
[  194.750801]  __kasan_kmalloc+0xd4/0xd8
[  194.751977]  kmalloc_trace+0x68/0x130
[  194.753053]  kasan_bitops_generic+0x98/0x148
[  194.754343]  kunit_try_run_case+0xf8/0x260
[  194.755541]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  194.757090]  kthread+0x18c/0x1a8
[  194.758193]  ret_from_fork+0x10/0x20
[  194.759279] 
[  194.759890] The buggy address belongs to the object at ffff0000c5bd5800
[  194.759890]  which belongs to the cache kmalloc-16 of size 16
[  194.762237] The buggy address is located 8 bytes inside of
[  194.762237]  allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[  194.764571] 
[  194.765204] The buggy address belongs to the physical page:
[  194.766473] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[  194.768453] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  194.769997] page_type: 0xffffffff()
[  194.771105] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  194.772813] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  194.774386] page dumped because: kasan: bad access detected
[  194.775622] 
[  194.776269] Memory state around the buggy address:
[  194.777514]  ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[  194.779143]  ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  194.780719] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.782262]                       ^
[  194.783228]  ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.785164]  ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.786512] ==================================================================
---
[  194.510347] ==================================================================
[  194.511644] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a4/0x7b8
[  194.513389] Write of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[  194.515207] 
[  194.515876] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  194.517639] Hardware name: linux,dummy-virt (DT)
[  194.518729] Call trace:
[  194.519432]  dump_backtrace+0x9c/0x128
[  194.520498]  show_stack+0x20/0x38
[  194.521566]  dump_stack_lvl+0x60/0xb0
[  194.522821]  print_report+0xf8/0x5d8
[  194.524030]  kasan_report+0xc8/0x118
[  194.526091]  kasan_check_range+0xe8/0x190
[  194.527226]  __kasan_check_write+0x20/0x30
[  194.528434]  kasan_bitops_test_and_modify.constprop.0+0x1a4/0x7b8
[  194.530061]  kasan_bitops_generic+0xc0/0x148
[  194.531338]  kunit_try_run_case+0xf8/0x260
[  194.532589]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  194.534039]  kthread+0x18c/0x1a8
[  194.535006]  ret_from_fork+0x10/0x20
[  194.536134] 
[  194.536668] Allocated by task 207:
[  194.537626]  kasan_save_stack+0x3c/0x68
[  194.538844]  kasan_set_track+0x2c/0x40
[  194.539974]  kasan_save_alloc_info+0x24/0x38
[  194.541273]  __kasan_kmalloc+0xd4/0xd8
[  194.542530]  kmalloc_trace+0x68/0x130
[  194.543551]  kasan_bitops_generic+0x98/0x148
[  194.544859]  kunit_try_run_case+0xf8/0x260
[  194.546072]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  194.547519]  kthread+0x18c/0x1a8
[  194.548672]  ret_from_fork+0x10/0x20
[  194.549823] 
[  194.550464] The buggy address belongs to the object at ffff0000c5bd5800
[  194.550464]  which belongs to the cache kmalloc-16 of size 16
[  194.552788] The buggy address is located 8 bytes inside of
[  194.552788]  allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[  194.555129] 
[  194.555754] The buggy address belongs to the physical page:
[  194.557036] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[  194.559004] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  194.560587] page_type: 0xffffffff()
[  194.561639] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  194.563352] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  194.564952] page dumped because: kasan: bad access detected
[  194.566232] 
[  194.566829] Memory state around the buggy address:
[  194.568058]  ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[  194.569693]  ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  194.571405] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.572928]                       ^
[  194.573938]  ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.575507]  ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.577056] ==================================================================
---
[  194.097444] ==================================================================
[  194.099337] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa4/0x7b8
[  194.101140] Write of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[  194.103700] 
[  194.104366] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  194.106220] Hardware name: linux,dummy-virt (DT)
[  194.107283] Call trace:
[  194.107944]  dump_backtrace+0x9c/0x128
[  194.109074]  show_stack+0x20/0x38
[  194.110088]  dump_stack_lvl+0x60/0xb0
[  194.111221]  print_report+0xf8/0x5d8
[  194.112419]  kasan_report+0xc8/0x118
[  194.113570]  kasan_check_range+0xe8/0x190
[  194.114830]  __kasan_check_write+0x20/0x30
[  194.115963]  kasan_bitops_test_and_modify.constprop.0+0xa4/0x7b8
[  194.117493]  kasan_bitops_generic+0xc0/0x148
[  194.118709]  kunit_try_run_case+0xf8/0x260
[  194.119934]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  194.121402]  kthread+0x18c/0x1a8
[  194.122429]  ret_from_fork+0x10/0x20
[  194.123504] 
[  194.124094] Allocated by task 207:
[  194.124994]  kasan_save_stack+0x3c/0x68
[  194.126189]  kasan_set_track+0x2c/0x40
[  194.127399]  kasan_save_alloc_info+0x24/0x38
[  194.128645]  __kasan_kmalloc+0xd4/0xd8
[  194.129859]  kmalloc_trace+0x68/0x130
[  194.131002]  kasan_bitops_generic+0x98/0x148
[  194.132275]  kunit_try_run_case+0xf8/0x260
[  194.133498]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  194.134972]  kthread+0x18c/0x1a8
[  194.135976]  ret_from_fork+0x10/0x20
[  194.137070] 
[  194.137660] The buggy address belongs to the object at ffff0000c5bd5800
[  194.137660]  which belongs to the cache kmalloc-16 of size 16
[  194.139982] The buggy address is located 8 bytes inside of
[  194.139982]  allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[  194.142326] 
[  194.142919] The buggy address belongs to the physical page:
[  194.144237] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[  194.146136] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  194.147720] page_type: 0xffffffff()
[  194.148828] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  194.150510] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  194.152087] page dumped because: kasan: bad access detected
[  194.153349] 
[  194.153921] Memory state around the buggy address:
[  194.155189]  ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[  194.156708]  ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  194.158433] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.159901]                       ^
[  194.160818]  ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.162438]  ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.163977] ==================================================================

test log snippet boot parser 14

Home

[  194.305511] ==================================================================
[  194.306852] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x108/0x7b8
[  194.308512] Read of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[  194.310318] 
[  194.310970] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  194.312594] Hardware name: linux,dummy-virt (DT)
[  194.313699] Call trace:
[  194.314855]  dump_backtrace+0x9c/0x128
[  194.316187]  show_stack+0x20/0x38
[  194.317227]  dump_stack_lvl+0x60/0xb0
[  194.318387]  print_report+0xf8/0x5d8
[  194.319506]  kasan_report+0xc8/0x118
[  194.320746]  __asan_load8+0x9c/0xc0
[  194.321864]  kasan_bitops_test_and_modify.constprop.0+0x108/0x7b8
[  194.323433]  kasan_bitops_generic+0xc0/0x148
[  194.324701]  kunit_try_run_case+0xf8/0x260
[  194.325907]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  194.327417]  kthread+0x18c/0x1a8
[  194.328364]  ret_from_fork+0x10/0x20
[  194.329544] 
[  194.330183] Allocated by task 207:
[  194.331071]  kasan_save_stack+0x3c/0x68
[  194.332337]  kasan_set_track+0x2c/0x40
[  194.333489]  kasan_save_alloc_info+0x24/0x38
[  194.334753]  __kasan_kmalloc+0xd4/0xd8
[  194.336009]  kmalloc_trace+0x68/0x130
[  194.337129]  kasan_bitops_generic+0x98/0x148
[  194.338366]  kunit_try_run_case+0xf8/0x260
[  194.339581]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  194.341061]  kthread+0x18c/0x1a8
[  194.342069]  ret_from_fork+0x10/0x20
[  194.343194] 
[  194.343741] The buggy address belongs to the object at ffff0000c5bd5800
[  194.343741]  which belongs to the cache kmalloc-16 of size 16
[  194.345971] The buggy address is located 8 bytes inside of
[  194.345971]  allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[  194.348306] 
[  194.348927] The buggy address belongs to the physical page:
[  194.350231] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[  194.352084] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  194.353701] page_type: 0xffffffff()
[  194.354756] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  194.356535] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  194.358131] page dumped because: kasan: bad access detected
[  194.359411] 
[  194.360012] Memory state around the buggy address:
[  194.361208]  ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[  194.362855]  ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  194.364332] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.366013]                       ^
[  194.366999]  ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.368585]  ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.370075] ==================================================================
---
[  194.651624] ==================================================================
[  194.653072] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x200/0x7b8
[  194.654927] Read of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[  194.656642] 
[  194.657322] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  194.659060] Hardware name: linux,dummy-virt (DT)
[  194.660182] Call trace:
[  194.660919]  dump_backtrace+0x9c/0x128
[  194.662003]  show_stack+0x20/0x38
[  194.663110]  dump_stack_lvl+0x60/0xb0
[  194.664294]  print_report+0xf8/0x5d8
[  194.665456]  kasan_report+0xc8/0x118
[  194.666622]  __asan_load8+0x9c/0xc0
[  194.667798]  kasan_bitops_test_and_modify.constprop.0+0x200/0x7b8
[  194.669360]  kasan_bitops_generic+0xc0/0x148
[  194.670656]  kunit_try_run_case+0xf8/0x260
[  194.671899]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  194.673387]  kthread+0x18c/0x1a8
[  194.674354]  ret_from_fork+0x10/0x20
[  194.675549] 
[  194.676114] Allocated by task 207:
[  194.676974]  kasan_save_stack+0x3c/0x68
[  194.678205]  kasan_set_track+0x2c/0x40
[  194.679360]  kasan_save_alloc_info+0x24/0x38
[  194.680647]  __kasan_kmalloc+0xd4/0xd8
[  194.681846]  kmalloc_trace+0x68/0x130
[  194.682944]  kasan_bitops_generic+0x98/0x148
[  194.684192]  kunit_try_run_case+0xf8/0x260
[  194.685357]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  194.686948]  kthread+0x18c/0x1a8
[  194.687910]  ret_from_fork+0x10/0x20
[  194.689039] 
[  194.689625] The buggy address belongs to the object at ffff0000c5bd5800
[  194.689625]  which belongs to the cache kmalloc-16 of size 16
[  194.691987] The buggy address is located 8 bytes inside of
[  194.691987]  allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[  194.694328] 
[  194.694983] The buggy address belongs to the physical page:
[  194.696284] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[  194.698261] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  194.699857] page_type: 0xffffffff()
[  194.700986] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  194.702675] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  194.704300] page dumped because: kasan: bad access detected
[  194.705548] 
[  194.706197] Memory state around the buggy address:
[  194.707414]  ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[  194.709057]  ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  194.710578] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.712219]                       ^
[  194.713208]  ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.714841]  ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.716328] ==================================================================
---
[  194.582162] ==================================================================
[  194.583512] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d4/0x7b8
[  194.585274] Read of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[  194.586952] 
[  194.587669] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  194.589375] Hardware name: linux,dummy-virt (DT)
[  194.590584] Call trace:
[  194.591378]  dump_backtrace+0x9c/0x128
[  194.592447]  show_stack+0x20/0x38
[  194.593491]  dump_stack_lvl+0x60/0xb0
[  194.594809]  print_report+0xf8/0x5d8
[  194.595932]  kasan_report+0xc8/0x118
[  194.597207]  __asan_load8+0x9c/0xc0
[  194.598365]  kasan_bitops_test_and_modify.constprop.0+0x1d4/0x7b8
[  194.599991]  kasan_bitops_generic+0xc0/0x148
[  194.601257]  kunit_try_run_case+0xf8/0x260
[  194.602525]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  194.604000]  kthread+0x18c/0x1a8
[  194.604963]  ret_from_fork+0x10/0x20
[  194.606163] 
[  194.606714] Allocated by task 207:
[  194.607664]  kasan_save_stack+0x3c/0x68
[  194.608864]  kasan_set_track+0x2c/0x40
[  194.610037]  kasan_save_alloc_info+0x24/0x38
[  194.611348]  __kasan_kmalloc+0xd4/0xd8
[  194.612540]  kmalloc_trace+0x68/0x130
[  194.613647]  kasan_bitops_generic+0x98/0x148
[  194.614902]  kunit_try_run_case+0xf8/0x260
[  194.616142]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  194.617614]  kthread+0x18c/0x1a8
[  194.618642]  ret_from_fork+0x10/0x20
[  194.619736] 
[  194.620361] The buggy address belongs to the object at ffff0000c5bd5800
[  194.620361]  which belongs to the cache kmalloc-16 of size 16
[  194.622689] The buggy address is located 8 bytes inside of
[  194.622689]  allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[  194.625061] 
[  194.625704] The buggy address belongs to the physical page:
[  194.628750] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[  194.630850] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  194.632390] page_type: 0xffffffff()
[  194.633537] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  194.635245] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  194.636832] page dumped because: kasan: bad access detected
[  194.638133] 
[  194.638793] Memory state around the buggy address:
[  194.640033]  ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[  194.641558]  ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  194.643268] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.644702]                       ^
[  194.645634]  ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.647399]  ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.648971] ==================================================================
---
[  194.167507] ==================================================================
[  194.168880] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd0/0x7b8
[  194.170539] Read of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[  194.172186] 
[  194.172795] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  194.174582] Hardware name: linux,dummy-virt (DT)
[  194.175691] Call trace:
[  194.176436]  dump_backtrace+0x9c/0x128
[  194.177607]  show_stack+0x20/0x38
[  194.178646]  dump_stack_lvl+0x60/0xb0
[  194.179839]  print_report+0xf8/0x5d8
[  194.181002]  kasan_report+0xc8/0x118
[  194.182113]  __asan_load8+0x9c/0xc0
[  194.183315]  kasan_bitops_test_and_modify.constprop.0+0xd0/0x7b8
[  194.184868]  kasan_bitops_generic+0xc0/0x148
[  194.186065]  kunit_try_run_case+0xf8/0x260
[  194.187395]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  194.188866]  kthread+0x18c/0x1a8
[  194.189816]  ret_from_fork+0x10/0x20
[  194.190990] 
[  194.191601] Allocated by task 207:
[  194.192546]  kasan_save_stack+0x3c/0x68
[  194.193695]  kasan_set_track+0x2c/0x40
[  194.194848]  kasan_save_alloc_info+0x24/0x38
[  194.196211]  __kasan_kmalloc+0xd4/0xd8
[  194.197404]  kmalloc_trace+0x68/0x130
[  194.198516]  kasan_bitops_generic+0x98/0x148
[  194.199716]  kunit_try_run_case+0xf8/0x260
[  194.201020]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  194.202518]  kthread+0x18c/0x1a8
[  194.203455]  ret_from_fork+0x10/0x20
[  194.204606] 
[  194.205176] The buggy address belongs to the object at ffff0000c5bd5800
[  194.205176]  which belongs to the cache kmalloc-16 of size 16
[  194.207300] The buggy address is located 8 bytes inside of
[  194.207300]  allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[  194.210551] 
[  194.211216] The buggy address belongs to the physical page:
[  194.212668] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[  194.214716] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  194.216265] page_type: 0xffffffff()
[  194.217292] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  194.219015] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  194.220521] page dumped because: kasan: bad access detected
[  194.221730] 
[  194.222382] Memory state around the buggy address:
[  194.223624]  ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[  194.225251]  ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  194.226813] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.228328]                       ^
[  194.229324]  ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.230977]  ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.232519] ==================================================================
---
[  194.443022] ==================================================================
[  194.444381] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x174/0x7b8
[  194.446218] Read of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[  194.447909] 
[  194.448539] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  194.450368] Hardware name: linux,dummy-virt (DT)
[  194.451460] Call trace:
[  194.452215]  dump_backtrace+0x9c/0x128
[  194.453277]  show_stack+0x20/0x38
[  194.454368]  dump_stack_lvl+0x60/0xb0
[  194.455520]  print_report+0xf8/0x5d8
[  194.456699]  kasan_report+0xc8/0x118
[  194.457886]  __asan_load8+0x9c/0xc0
[  194.459050]  kasan_bitops_test_and_modify.constprop.0+0x174/0x7b8
[  194.460603]  kasan_bitops_generic+0xc0/0x148
[  194.461843]  kunit_try_run_case+0xf8/0x260
[  194.463080]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  194.464546]  kthread+0x18c/0x1a8
[  194.465552]  ret_from_fork+0x10/0x20
[  194.466654] 
[  194.467324] Allocated by task 207:
[  194.468262]  kasan_save_stack+0x3c/0x68
[  194.469455]  kasan_set_track+0x2c/0x40
[  194.470577]  kasan_save_alloc_info+0x24/0x38
[  194.471968]  __kasan_kmalloc+0xd4/0xd8
[  194.473139]  kmalloc_trace+0x68/0x130
[  194.474160]  kasan_bitops_generic+0x98/0x148
[  194.475490]  kunit_try_run_case+0xf8/0x260
[  194.476687]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  194.478215]  kthread+0x18c/0x1a8
[  194.479265]  ret_from_fork+0x10/0x20
[  194.480387] 
[  194.480990] The buggy address belongs to the object at ffff0000c5bd5800
[  194.480990]  which belongs to the cache kmalloc-16 of size 16
[  194.483217] The buggy address is located 8 bytes inside of
[  194.483217]  allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[  194.485490] 
[  194.486119] The buggy address belongs to the physical page:
[  194.487390] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[  194.489258] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  194.490792] page_type: 0xffffffff()
[  194.491846] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  194.493537] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  194.495153] page dumped because: kasan: bad access detected
[  194.496443] 
[  194.497029] Memory state around the buggy address:
[  194.498164]  ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[  194.499869]  ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  194.501464] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.503008]                       ^
[  194.504006]  ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.505572]  ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.507086] ==================================================================

test log snippet boot parser 15

Home

[  188.261895] ==================================================================
[  188.264012] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xc8/0x1e0
[  188.265691] Write of size 1 at addr ffff0000c6061f00 by task kunit_try_catch/133
[  188.267553] 
[  188.268229] CPU: 1 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  188.270076] Hardware name: linux,dummy-virt (DT)
[  188.271437] Call trace:
[  188.273098]  dump_backtrace+0x9c/0x128
[  188.274231]  show_stack+0x20/0x38
[  188.275371]  dump_stack_lvl+0x60/0xb0
[  188.276826]  print_report+0xf8/0x5d8
[  188.278333]  kasan_report+0xc8/0x118
[  188.279538]  __asan_store1+0x60/0x70
[  188.281049]  kmalloc_large_oob_right+0xc8/0x1e0
[  188.283291]  kunit_try_run_case+0xf8/0x260
[  188.284916]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  188.286636]  kthread+0x18c/0x1a8
[  188.287644]  ret_from_fork+0x10/0x20
[  188.288885] 
[  188.289450] Allocated by task 133:
[  188.290316]  kasan_save_stack+0x3c/0x68
[  188.291616]  kasan_set_track+0x2c/0x40
[  188.293084]  kasan_save_alloc_info+0x24/0x38
[  188.294619]  __kasan_kmalloc+0xd4/0xd8
[  188.295687]  kmalloc_trace+0x68/0x130
[  188.296866]  kmalloc_large_oob_right+0x9c/0x1e0
[  188.298300]  kunit_try_run_case+0xf8/0x260
[  188.299613]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  188.301469]  kthread+0x18c/0x1a8
[  188.302631]  ret_from_fork+0x10/0x20
[  188.303875] 
[  188.304545] The buggy address belongs to the object at ffff0000c6060000
[  188.304545]  which belongs to the cache kmalloc-8k of size 8192
[  188.306983] The buggy address is located 0 bytes to the right of
[  188.306983]  allocated 7936-byte region [ffff0000c6060000, ffff0000c6061f00)
[  188.309965] 
[  188.310662] The buggy address belongs to the physical page:
[  188.312135] page:00000000594cb34f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106060
[  188.314413] head:00000000594cb34f order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  188.316703] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  188.318351] page_type: 0xffffffff()
[  188.320024] raw: 0bfffc0000000840 ffff0000c0002280 dead000000000122 0000000000000000
[  188.321526] raw: 0000000000000000 0000000080020002 00000001ffffffff 0000000000000000
[  188.322978] page dumped because: kasan: bad access detected
[  188.324228] 
[  188.324863] Memory state around the buggy address:
[  188.326112]  ffff0000c6061e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  188.328017]  ffff0000c6061e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  188.329925] >ffff0000c6061f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.331660]                    ^
[  188.333008]  ffff0000c6061f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.334467]  ffff0000c6062000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.336023] ==================================================================

test log snippet boot parser 16

Home

[  187.838752] ==================================================================
[  187.841151] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0xd0/0x1f0
[  187.842733] Read of size 1 at addr ffff0000c57bf000 by task kunit_try_catch/121
[  187.845374] 
[  187.846041] CPU: 1 PID: 121 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  187.848014] Hardware name: linux,dummy-virt (DT)
[  187.849136] Call trace:
[  187.849894]  dump_backtrace+0x9c/0x128
[  187.851114]  show_stack+0x20/0x38
[  187.852265]  dump_stack_lvl+0x60/0xb0
[  187.853690]  print_report+0xf8/0x5d8
[  187.855020]  kasan_report+0xc8/0x118
[  187.856347]  __asan_load1+0x60/0x70
[  187.858280]  kmalloc_node_oob_right+0xd0/0x1f0
[  187.859429]  kunit_try_run_case+0xf8/0x260
[  187.860943]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  187.862652]  kthread+0x18c/0x1a8
[  187.863649]  ret_from_fork+0x10/0x20
[  187.864891] 
[  187.865798] Allocated by task 121:
[  187.866671]  kasan_save_stack+0x3c/0x68
[  187.868513]  kasan_set_track+0x2c/0x40
[  187.870137]  kasan_save_alloc_info+0x24/0x38
[  187.871306]  __kasan_kmalloc+0xd4/0xd8
[  187.872549]  kmalloc_node_trace+0x64/0x130
[  187.874220]  kmalloc_node_oob_right+0xa4/0x1f0
[  187.875713]  kunit_try_run_case+0xf8/0x260
[  187.877127]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  187.878620]  kthread+0x18c/0x1a8
[  187.879595]  ret_from_fork+0x10/0x20
[  187.880750] 
[  187.881356] The buggy address belongs to the object at ffff0000c57be000
[  187.881356]  which belongs to the cache kmalloc-4k of size 4096
[  187.884474] The buggy address is located 0 bytes to the right of
[  187.884474]  allocated 4096-byte region [ffff0000c57be000, ffff0000c57bf000)
[  187.887675] 
[  187.888304] The buggy address belongs to the physical page:
[  187.890333] page:000000005e803cb8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057b8
[  187.893028] head:000000005e803cb8 order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  187.894955] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  187.896562] page_type: 0xffffffff()
[  187.897965] raw: 0bfffc0000000840 ffff0000c0002140 dead000000000122 0000000000000000
[  187.899728] raw: 0000000000000000 0000000080040004 00000001ffffffff 0000000000000000
[  187.901556] page dumped because: kasan: bad access detected
[  187.902976] 
[  187.903625] Memory state around the buggy address:
[  187.904994]  ffff0000c57bef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  187.907491]  ffff0000c57bef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  187.909584] >ffff0000c57bf000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.911416]                    ^
[  187.912817]  ffff0000c57bf080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.914608]  ffff0000c57bf100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.916168] ==================================================================

test log snippet boot parser 17

Home

[  189.294960] ==================================================================
[  189.297214] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xf8/0x268
[  189.298814] Write of size 16 at addr ffff0000c5bd57c0 by task kunit_try_catch/145
[  189.300801] 
[  189.301654] CPU: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  189.303444] Hardware name: linux,dummy-virt (DT)
[  189.304582] Call trace:
[  189.305447]  dump_backtrace+0x9c/0x128
[  189.306595]  show_stack+0x20/0x38
[  189.307644]  dump_stack_lvl+0x60/0xb0
[  189.309305]  print_report+0xf8/0x5d8
[  189.310457]  kasan_report+0xc8/0x118
[  189.311597]  __asan_store16+0xa4/0xa8
[  189.313250]  kmalloc_oob_16+0xf8/0x268
[  189.314336]  kunit_try_run_case+0xf8/0x260
[  189.315600]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.316974]  kthread+0x18c/0x1a8
[  189.318054]  ret_from_fork+0x10/0x20
[  189.319266] 
[  189.319854] Allocated by task 145:
[  189.320859]  kasan_save_stack+0x3c/0x68
[  189.321987]  kasan_set_track+0x2c/0x40
[  189.323279]  kasan_save_alloc_info+0x24/0x38
[  189.324637]  __kasan_kmalloc+0xd4/0xd8
[  189.325897]  kmalloc_trace+0x68/0x130
[  189.327121]  kmalloc_oob_16+0xa4/0x268
[  189.328590]  kunit_try_run_case+0xf8/0x260
[  189.329717]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.331299]  kthread+0x18c/0x1a8
[  189.332569]  ret_from_fork+0x10/0x20
[  189.333853] 
[  189.334409] The buggy address belongs to the object at ffff0000c5bd57c0
[  189.334409]  which belongs to the cache kmalloc-16 of size 16
[  189.337230] The buggy address is located 0 bytes inside of
[  189.337230]  allocated 13-byte region [ffff0000c5bd57c0, ffff0000c5bd57cd)
[  189.339546] 
[  189.340377] The buggy address belongs to the physical page:
[  189.341619] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[  189.343548] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  189.345374] page_type: 0xffffffff()
[  189.346468] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  189.348258] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  189.349720] page dumped because: kasan: bad access detected
[  189.351035] 
[  189.351641] Memory state around the buggy address:
[  189.353183]  ffff0000c5bd5680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  189.355540]  ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[  189.357131] >ffff0000c5bd5780: 00 05 fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc
[  189.358693]                                               ^
[  189.360047]  ffff0000c5bd5800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.362091]  ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.363574] ==================================================================

test log snippet boot parser 18

Home

[  189.294960] ==================================================================
[  189.297214] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xf8/0x268
[  189.298814] Write of size 16 at addr ffff0000c5bd57c0 by task kunit_try_catch/145
[  189.300801] 
[  189.301654] CPU: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  189.303444] Hardware name: linux,dummy-virt (DT)
[  189.304582] Call trace:
[  189.305447]  dump_backtrace+0x9c/0x128
[  189.306595]  show_stack+0x20/0x38
[  189.307644]  dump_stack_lvl+0x60/0xb0
[  189.309305]  print_report+0xf8/0x5d8
[  189.310457]  kasan_report+0xc8/0x118
[  189.311597]  __asan_store16+0xa4/0xa8
[  189.313250]  kmalloc_oob_16+0xf8/0x268
[  189.314336]  kunit_try_run_case+0xf8/0x260
[  189.315600]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.316974]  kthread+0x18c/0x1a8
[  189.318054]  ret_from_fork+0x10/0x20
[  189.319266] 
[  189.319854] Allocated by task 145:
[  189.320859]  kasan_save_stack+0x3c/0x68
[  189.321987]  kasan_set_track+0x2c/0x40
[  189.323279]  kasan_save_alloc_info+0x24/0x38
[  189.324637]  __kasan_kmalloc+0xd4/0xd8
[  189.325897]  kmalloc_trace+0x68/0x130
[  189.327121]  kmalloc_oob_16+0xa4/0x268
[  189.328590]  kunit_try_run_case+0xf8/0x260
[  189.329717]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.331299]  kthread+0x18c/0x1a8
[  189.332569]  ret_from_fork+0x10/0x20
[  189.333853] 
[  189.334409] The buggy address belongs to the object at ffff0000c5bd57c0
[  189.334409]  which belongs to the cache kmalloc-16 of size 16
[  189.337230] The buggy address is located 0 bytes inside of
[  189.337230]  allocated 13-byte region [ffff0000c5bd57c0, ffff0000c5bd57cd)
[  189.339546] 
[  189.340377] The buggy address belongs to the physical page:
[  189.341619] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[  189.343548] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  189.345374] page_type: 0xffffffff()
[  189.346468] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  189.348258] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  189.349720] page dumped because: kasan: bad access detected
[  189.351035] 
[  189.351641] Memory state around the buggy address:
[  189.353183]  ffff0000c5bd5680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  189.355540]  ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[  189.357131] >ffff0000c5bd5780: 00 05 fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc
[  189.358693]                                               ^
[  189.360047]  ffff0000c5bd5800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.362091]  ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.363574] ==================================================================

test log snippet boot parser 19

Home

[  189.502232] ==================================================================
[  189.504248] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0xd4/0x1e8
[  189.507330] Write of size 128 at addr ffff0000c5fdba00 by task kunit_try_catch/149
[  189.509976] 
[  189.510668] CPU: 1 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  189.512452] Hardware name: linux,dummy-virt (DT)
[  189.513719] Call trace:
[  189.514582]  dump_backtrace+0x9c/0x128
[  189.515894]  show_stack+0x20/0x38
[  189.517146]  dump_stack_lvl+0x60/0xb0
[  189.518327]  print_report+0xf8/0x5d8
[  189.519536]  kasan_report+0xc8/0x118
[  189.520849]  kasan_check_range+0xe8/0x190
[  189.522175]  __asan_memset+0x34/0x78
[  189.523409]  kmalloc_oob_in_memset+0xd4/0x1e8
[  189.524642]  kunit_try_run_case+0xf8/0x260
[  189.525818]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.527346]  kthread+0x18c/0x1a8
[  189.528448]  ret_from_fork+0x10/0x20
[  189.529610] 
[  189.530253] Allocated by task 149:
[  189.531283]  kasan_save_stack+0x3c/0x68
[  189.532536]  kasan_set_track+0x2c/0x40
[  189.533788]  kasan_save_alloc_info+0x24/0x38
[  189.535077]  __kasan_kmalloc+0xd4/0xd8
[  189.536574]  kmalloc_trace+0x68/0x130
[  189.537652]  kmalloc_oob_in_memset+0xa0/0x1e8
[  189.538898]  kunit_try_run_case+0xf8/0x260
[  189.540267]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.542263]  kthread+0x18c/0x1a8
[  189.543234]  ret_from_fork+0x10/0x20
[  189.544329] 
[  189.544912] The buggy address belongs to the object at ffff0000c5fdba00
[  189.544912]  which belongs to the cache kmalloc-128 of size 128
[  189.547295] The buggy address is located 0 bytes inside of
[  189.547295]  allocated 120-byte region [ffff0000c5fdba00, ffff0000c5fdba78)
[  189.549808] 
[  189.550435] The buggy address belongs to the physical page:
[  189.551718] page:00000000bce0b260 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fdb
[  189.553869] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  189.555435] page_type: 0xffffffff()
[  189.556593] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[  189.558029] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  189.559575] page dumped because: kasan: bad access detected
[  189.560726] 
[  189.561396] Memory state around the buggy address:
[  189.563354]  ffff0000c5fdb900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  189.565170]  ffff0000c5fdb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.566872] >ffff0000c5fdba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  189.568611]                                                                 ^
[  189.570179]  ffff0000c5fdba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.571700]  ffff0000c5fdbb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.573345] ==================================================================

test log snippet boot parser 20

Home

[  187.737561] ==================================================================
[  187.739715] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0xc8/0x1f0
[  187.741214] Read of size 1 at addr ffff0000c5bd579f by task kunit_try_catch/119
[  187.742964] 
[  187.743651] CPU: 0 PID: 119 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  187.745876] Hardware name: linux,dummy-virt (DT)
[  187.747049] Call trace:
[  187.747803]  dump_backtrace+0x9c/0x128
[  187.748995]  show_stack+0x20/0x38
[  187.749991]  dump_stack_lvl+0x60/0xb0
[  187.751186]  print_report+0xf8/0x5d8
[  187.752529]  kasan_report+0xc8/0x118
[  187.753650]  __asan_load1+0x60/0x70
[  187.754824]  kmalloc_oob_left+0xc8/0x1f0
[  187.755993]  kunit_try_run_case+0xf8/0x260
[  187.757415]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  187.759397]  kthread+0x18c/0x1a8
[  187.760545]  ret_from_fork+0x10/0x20
[  187.761675] 
[  187.762237] Allocated by task 1:
[  187.763129]  kasan_save_stack+0x3c/0x68
[  187.764658]  kasan_set_track+0x2c/0x40
[  187.765839]  kasan_save_alloc_info+0x24/0x38
[  187.767115]  __kasan_kmalloc+0xd4/0xd8
[  187.768360]  __kmalloc_node_track_caller+0x74/0x1d0
[  187.769845]  kvasprintf+0xcc/0x170
[  187.770920]  __kthread_create_on_node+0x11c/0x250
[  187.772576]  kthread_create_on_node+0xac/0xf0
[  187.773880]  create_worker+0x160/0x3b8
[  187.775000]  alloc_unbound_pwq+0x418/0x428
[  187.776222]  apply_wqattrs_prepare+0x1b8/0x3c8
[  187.778400]  apply_workqueue_attrs_locked+0x6c/0xc0
[  187.779991]  alloc_workqueue+0x6cc/0x870
[  187.781375]  latency_fsnotify_init+0x28/0x60
[  187.782667]  do_one_initcall+0xb0/0x3f0
[  187.783744]  kernel_init_freeable+0x2b4/0x550
[  187.785352]  kernel_init+0x2c/0x1f8
[  187.786415]  ret_from_fork+0x10/0x20
[  187.787594] 
[  187.788202] The buggy address belongs to the object at ffff0000c5bd5780
[  187.788202]  which belongs to the cache kmalloc-16 of size 16
[  187.790692] The buggy address is located 18 bytes to the right of
[  187.790692]  allocated 13-byte region [ffff0000c5bd5780, ffff0000c5bd578d)
[  187.793427] 
[  187.794052] The buggy address belongs to the physical page:
[  187.795306] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[  187.797136] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  187.798582] page_type: 0xffffffff()
[  187.799741] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  187.801880] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  187.803696] page dumped because: kasan: bad access detected
[  187.805262] 
[  187.805981] Memory state around the buggy address:
[  187.807317]  ffff0000c5bd5680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  187.809117]  ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[  187.810725] >ffff0000c5bd5780: 00 05 fc fc 00 07 fc fc fc fc fc fc fc fc fc fc
[  187.812316]                             ^
[  187.813185]  ffff0000c5bd5800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.814792]  ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.816302] ==================================================================

test log snippet boot parser 21

Home

[  189.871068] ==================================================================
[  189.873463] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xd8/0x1e8
[  189.875430] Write of size 16 at addr ffff0000c5fdbd69 by task kunit_try_catch/157
[  189.877668] 
[  189.878389] CPU: 1 PID: 157 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  189.880222] Hardware name: linux,dummy-virt (DT)
[  189.881245] Call trace:
[  189.881977]  dump_backtrace+0x9c/0x128
[  189.883229]  show_stack+0x20/0x38
[  189.884383]  dump_stack_lvl+0x60/0xb0
[  189.885932]  print_report+0xf8/0x5d8
[  189.887145]  kasan_report+0xc8/0x118
[  189.888363]  kasan_check_range+0xe8/0x190
[  189.889729]  __asan_memset+0x34/0x78
[  189.891309]  kmalloc_oob_memset_16+0xd8/0x1e8
[  189.892685]  kunit_try_run_case+0xf8/0x260
[  189.894193]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.895714]  kthread+0x18c/0x1a8
[  189.896697]  ret_from_fork+0x10/0x20
[  189.898783] 
[  189.899383] Allocated by task 157:
[  189.900338]  kasan_save_stack+0x3c/0x68
[  189.901716]  kasan_set_track+0x2c/0x40
[  189.902928]  kasan_save_alloc_info+0x24/0x38
[  189.904323]  __kasan_kmalloc+0xd4/0xd8
[  189.905680]  kmalloc_trace+0x68/0x130
[  189.907285]  kmalloc_oob_memset_16+0xa0/0x1e8
[  189.908595]  kunit_try_run_case+0xf8/0x260
[  189.910018]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.911415]  kthread+0x18c/0x1a8
[  189.912462]  ret_from_fork+0x10/0x20
[  189.913849] 
[  189.914504] The buggy address belongs to the object at ffff0000c5fdbd00
[  189.914504]  which belongs to the cache kmalloc-128 of size 128
[  189.918083] The buggy address is located 105 bytes inside of
[  189.918083]  allocated 120-byte region [ffff0000c5fdbd00, ffff0000c5fdbd78)
[  189.920897] 
[  189.922122] The buggy address belongs to the physical page:
[  189.923479] page:00000000bce0b260 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fdb
[  189.925604] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  189.927233] page_type: 0xffffffff()
[  189.928730] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[  189.930788] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  189.932507] page dumped because: kasan: bad access detected
[  189.933931] 
[  189.934588] Memory state around the buggy address:
[  189.935914]  ffff0000c5fdbc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  189.938252]  ffff0000c5fdbc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.940369] >ffff0000c5fdbd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  189.942257]                                                                 ^
[  189.944008]  ffff0000c5fdbd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.945674]  ffff0000c5fdbe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.947415] ==================================================================

test log snippet boot parser 22

Home

[  189.871068] ==================================================================
[  189.873463] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xd8/0x1e8
[  189.875430] Write of size 16 at addr ffff0000c5fdbd69 by task kunit_try_catch/157
[  189.877668] 
[  189.878389] CPU: 1 PID: 157 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  189.880222] Hardware name: linux,dummy-virt (DT)
[  189.881245] Call trace:
[  189.881977]  dump_backtrace+0x9c/0x128
[  189.883229]  show_stack+0x20/0x38
[  189.884383]  dump_stack_lvl+0x60/0xb0
[  189.885932]  print_report+0xf8/0x5d8
[  189.887145]  kasan_report+0xc8/0x118
[  189.888363]  kasan_check_range+0xe8/0x190
[  189.889729]  __asan_memset+0x34/0x78
[  189.891309]  kmalloc_oob_memset_16+0xd8/0x1e8
[  189.892685]  kunit_try_run_case+0xf8/0x260
[  189.894193]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.895714]  kthread+0x18c/0x1a8
[  189.896697]  ret_from_fork+0x10/0x20
[  189.898783] 
[  189.899383] Allocated by task 157:
[  189.900338]  kasan_save_stack+0x3c/0x68
[  189.901716]  kasan_set_track+0x2c/0x40
[  189.902928]  kasan_save_alloc_info+0x24/0x38
[  189.904323]  __kasan_kmalloc+0xd4/0xd8
[  189.905680]  kmalloc_trace+0x68/0x130
[  189.907285]  kmalloc_oob_memset_16+0xa0/0x1e8
[  189.908595]  kunit_try_run_case+0xf8/0x260
[  189.910018]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.911415]  kthread+0x18c/0x1a8
[  189.912462]  ret_from_fork+0x10/0x20
[  189.913849] 
[  189.914504] The buggy address belongs to the object at ffff0000c5fdbd00
[  189.914504]  which belongs to the cache kmalloc-128 of size 128
[  189.918083] The buggy address is located 105 bytes inside of
[  189.918083]  allocated 120-byte region [ffff0000c5fdbd00, ffff0000c5fdbd78)
[  189.920897] 
[  189.922122] The buggy address belongs to the physical page:
[  189.923479] page:00000000bce0b260 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fdb
[  189.925604] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  189.927233] page_type: 0xffffffff()
[  189.928730] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[  189.930788] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  189.932507] page dumped because: kasan: bad access detected
[  189.933931] 
[  189.934588] Memory state around the buggy address:
[  189.935914]  ffff0000c5fdbc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  189.938252]  ffff0000c5fdbc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.940369] >ffff0000c5fdbd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  189.942257]                                                                 ^
[  189.944008]  ffff0000c5fdbd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.945674]  ffff0000c5fdbe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.947415] ==================================================================

test log snippet boot parser 23

Home

[  189.673207] ==================================================================
[  189.675234] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xd8/0x1e8
[  189.676841] Write of size 4 at addr ffff0000c5f8ba75 by task kunit_try_catch/153
[  189.680682] 
[  189.681371] CPU: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  189.683134] Hardware name: linux,dummy-virt (DT)
[  189.684272] Call trace:
[  189.685365]  dump_backtrace+0x9c/0x128
[  189.686839]  show_stack+0x20/0x38
[  189.688119]  dump_stack_lvl+0x60/0xb0
[  189.689786]  print_report+0xf8/0x5d8
[  189.691000]  kasan_report+0xc8/0x118
[  189.692118]  kasan_check_range+0xe8/0x190
[  189.693423]  __asan_memset+0x34/0x78
[  189.694504]  kmalloc_oob_memset_4+0xd8/0x1e8
[  189.696294]  kunit_try_run_case+0xf8/0x260
[  189.697411]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.698755]  kthread+0x18c/0x1a8
[  189.699719]  ret_from_fork+0x10/0x20
[  189.701067] 
[  189.701669] Allocated by task 153:
[  189.702537]  kasan_save_stack+0x3c/0x68
[  189.704011]  kasan_set_track+0x2c/0x40
[  189.705421]  kasan_save_alloc_info+0x24/0x38
[  189.706918]  __kasan_kmalloc+0xd4/0xd8
[  189.708060]  kmalloc_trace+0x68/0x130
[  189.709578]  kmalloc_oob_memset_4+0xa0/0x1e8
[  189.711117]  kunit_try_run_case+0xf8/0x260
[  189.712335]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.713956]  kthread+0x18c/0x1a8
[  189.714993]  ret_from_fork+0x10/0x20
[  189.716166] 
[  189.716810] The buggy address belongs to the object at ffff0000c5f8ba00
[  189.716810]  which belongs to the cache kmalloc-128 of size 128
[  189.720752] The buggy address is located 117 bytes inside of
[  189.720752]  allocated 120-byte region [ffff0000c5f8ba00, ffff0000c5f8ba78)
[  189.723241] 
[  189.723928] The buggy address belongs to the physical page:
[  189.725330] page:00000000720dd2a1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f8b
[  189.727450] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  189.729191] page_type: 0xffffffff()
[  189.730463] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[  189.732379] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  189.734143] page dumped because: kasan: bad access detected
[  189.735523] 
[  189.736269] Memory state around the buggy address:
[  189.737542]  ffff0000c5f8b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  189.739130]  ffff0000c5f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.740697] >ffff0000c5f8ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  189.742484]                                                                 ^
[  189.744181]  ffff0000c5f8ba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.745818]  ffff0000c5f8bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.747559] ==================================================================

test log snippet boot parser 24

Home

[  189.673207] ==================================================================
[  189.675234] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xd8/0x1e8
[  189.676841] Write of size 4 at addr ffff0000c5f8ba75 by task kunit_try_catch/153
[  189.680682] 
[  189.681371] CPU: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  189.683134] Hardware name: linux,dummy-virt (DT)
[  189.684272] Call trace:
[  189.685365]  dump_backtrace+0x9c/0x128
[  189.686839]  show_stack+0x20/0x38
[  189.688119]  dump_stack_lvl+0x60/0xb0
[  189.689786]  print_report+0xf8/0x5d8
[  189.691000]  kasan_report+0xc8/0x118
[  189.692118]  kasan_check_range+0xe8/0x190
[  189.693423]  __asan_memset+0x34/0x78
[  189.694504]  kmalloc_oob_memset_4+0xd8/0x1e8
[  189.696294]  kunit_try_run_case+0xf8/0x260
[  189.697411]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.698755]  kthread+0x18c/0x1a8
[  189.699719]  ret_from_fork+0x10/0x20
[  189.701067] 
[  189.701669] Allocated by task 153:
[  189.702537]  kasan_save_stack+0x3c/0x68
[  189.704011]  kasan_set_track+0x2c/0x40
[  189.705421]  kasan_save_alloc_info+0x24/0x38
[  189.706918]  __kasan_kmalloc+0xd4/0xd8
[  189.708060]  kmalloc_trace+0x68/0x130
[  189.709578]  kmalloc_oob_memset_4+0xa0/0x1e8
[  189.711117]  kunit_try_run_case+0xf8/0x260
[  189.712335]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.713956]  kthread+0x18c/0x1a8
[  189.714993]  ret_from_fork+0x10/0x20
[  189.716166] 
[  189.716810] The buggy address belongs to the object at ffff0000c5f8ba00
[  189.716810]  which belongs to the cache kmalloc-128 of size 128
[  189.720752] The buggy address is located 117 bytes inside of
[  189.720752]  allocated 120-byte region [ffff0000c5f8ba00, ffff0000c5f8ba78)
[  189.723241] 
[  189.723928] The buggy address belongs to the physical page:
[  189.725330] page:00000000720dd2a1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f8b
[  189.727450] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  189.729191] page_type: 0xffffffff()
[  189.730463] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[  189.732379] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  189.734143] page dumped because: kasan: bad access detected
[  189.735523] 
[  189.736269] Memory state around the buggy address:
[  189.737542]  ffff0000c5f8b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  189.739130]  ffff0000c5f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.740697] >ffff0000c5f8ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  189.742484]                                                                 ^
[  189.744181]  ffff0000c5f8ba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.745818]  ffff0000c5f8bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.747559] ==================================================================

test log snippet boot parser 25

Home

[  189.773039] ==================================================================
[  189.775855] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xd8/0x1e8
[  189.777729] Write of size 8 at addr ffff0000c5f8bd71 by task kunit_try_catch/155
[  189.779745] 
[  189.780461] CPU: 0 PID: 155 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  189.782358] Hardware name: linux,dummy-virt (DT)
[  189.783388] Call trace:
[  189.784720]  dump_backtrace+0x9c/0x128
[  189.785758]  show_stack+0x20/0x38
[  189.786919]  dump_stack_lvl+0x60/0xb0
[  189.788126]  print_report+0xf8/0x5d8
[  189.789924]  kasan_report+0xc8/0x118
[  189.791301]  kasan_check_range+0xe8/0x190
[  189.792764]  __asan_memset+0x34/0x78
[  189.793857]  kmalloc_oob_memset_8+0xd8/0x1e8
[  189.795111]  kunit_try_run_case+0xf8/0x260
[  189.796449]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.798462]  kthread+0x18c/0x1a8
[  189.799713]  ret_from_fork+0x10/0x20
[  189.801112] 
[  189.801806] Allocated by task 155:
[  189.802789]  kasan_save_stack+0x3c/0x68
[  189.803946]  kasan_set_track+0x2c/0x40
[  189.805331]  kasan_save_alloc_info+0x24/0x38
[  189.807237]  __kasan_kmalloc+0xd4/0xd8
[  189.808693]  kmalloc_trace+0x68/0x130
[  189.809892]  kmalloc_oob_memset_8+0xa0/0x1e8
[  189.811059]  kunit_try_run_case+0xf8/0x260
[  189.812347]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.814008]  kthread+0x18c/0x1a8
[  189.815531]  ret_from_fork+0x10/0x20
[  189.816618] 
[  189.817250] The buggy address belongs to the object at ffff0000c5f8bd00
[  189.817250]  which belongs to the cache kmalloc-128 of size 128
[  189.819530] The buggy address is located 113 bytes inside of
[  189.819530]  allocated 120-byte region [ffff0000c5f8bd00, ffff0000c5f8bd78)
[  189.822140] 
[  189.822811] The buggy address belongs to the physical page:
[  189.824200] page:00000000720dd2a1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f8b
[  189.826328] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  189.827953] page_type: 0xffffffff()
[  189.829016] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[  189.830592] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  189.832547] page dumped because: kasan: bad access detected
[  189.834669] 
[  189.835351] Memory state around the buggy address:
[  189.836604]  ffff0000c5f8bc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  189.838328]  ffff0000c5f8bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.840275] >ffff0000c5f8bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  189.841760]                                                                 ^
[  189.843440]  ffff0000c5f8bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.845235]  ffff0000c5f8be00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.847148] ==================================================================

test log snippet boot parser 26

Home

[  189.773039] ==================================================================
[  189.775855] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xd8/0x1e8
[  189.777729] Write of size 8 at addr ffff0000c5f8bd71 by task kunit_try_catch/155
[  189.779745] 
[  189.780461] CPU: 0 PID: 155 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  189.782358] Hardware name: linux,dummy-virt (DT)
[  189.783388] Call trace:
[  189.784720]  dump_backtrace+0x9c/0x128
[  189.785758]  show_stack+0x20/0x38
[  189.786919]  dump_stack_lvl+0x60/0xb0
[  189.788126]  print_report+0xf8/0x5d8
[  189.789924]  kasan_report+0xc8/0x118
[  189.791301]  kasan_check_range+0xe8/0x190
[  189.792764]  __asan_memset+0x34/0x78
[  189.793857]  kmalloc_oob_memset_8+0xd8/0x1e8
[  189.795111]  kunit_try_run_case+0xf8/0x260
[  189.796449]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.798462]  kthread+0x18c/0x1a8
[  189.799713]  ret_from_fork+0x10/0x20
[  189.801112] 
[  189.801806] Allocated by task 155:
[  189.802789]  kasan_save_stack+0x3c/0x68
[  189.803946]  kasan_set_track+0x2c/0x40
[  189.805331]  kasan_save_alloc_info+0x24/0x38
[  189.807237]  __kasan_kmalloc+0xd4/0xd8
[  189.808693]  kmalloc_trace+0x68/0x130
[  189.809892]  kmalloc_oob_memset_8+0xa0/0x1e8
[  189.811059]  kunit_try_run_case+0xf8/0x260
[  189.812347]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.814008]  kthread+0x18c/0x1a8
[  189.815531]  ret_from_fork+0x10/0x20
[  189.816618] 
[  189.817250] The buggy address belongs to the object at ffff0000c5f8bd00
[  189.817250]  which belongs to the cache kmalloc-128 of size 128
[  189.819530] The buggy address is located 113 bytes inside of
[  189.819530]  allocated 120-byte region [ffff0000c5f8bd00, ffff0000c5f8bd78)
[  189.822140] 
[  189.822811] The buggy address belongs to the physical page:
[  189.824200] page:00000000720dd2a1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f8b
[  189.826328] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  189.827953] page_type: 0xffffffff()
[  189.829016] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[  189.830592] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  189.832547] page dumped because: kasan: bad access detected
[  189.834669] 
[  189.835351] Memory state around the buggy address:
[  189.836604]  ffff0000c5f8bc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  189.838328]  ffff0000c5f8bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.840275] >ffff0000c5f8bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  189.841760]                                                                 ^
[  189.843440]  ffff0000c5f8bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.845235]  ffff0000c5f8be00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.847148] ==================================================================

test log snippet boot parser 27

Home

[  187.497358] ==================================================================
[  187.499869] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xc8/0x308
[  187.502251] Write of size 1 at addr ffff0000c5f2d673 by task kunit_try_catch/117
[  187.504388] 
[  187.505570] CPU: 1 PID: 117 Comm: kunit_try_catch Tainted: G                 N 6.6.74-rc1 #1
[  187.508152] Hardware name: linux,dummy-virt (DT)
[  187.509875] Call trace:
[  187.510520]  dump_backtrace+0x9c/0x128
[  187.511648]  show_stack+0x20/0x38
[  187.513137]  dump_stack_lvl+0x60/0xb0
[  187.514422]  print_report+0xf8/0x5d8
[  187.515948]  kasan_report+0xc8/0x118
[  187.517222]  __asan_store1+0x60/0x70
[  187.518467]  kmalloc_oob_right+0xc8/0x308
[  187.519608]  kunit_try_run_case+0xf8/0x260
[  187.521668]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  187.523925]  kthread+0x18c/0x1a8
[  187.524922]  ret_from_fork+0x10/0x20
[  187.526408] 
[  187.526960] Allocated by task 117:
[  187.528138]  kasan_save_stack+0x3c/0x68
[  187.530010]  kasan_set_track+0x2c/0x40
[  187.531477]  kasan_save_alloc_info+0x24/0x38
[  187.532965]  __kasan_kmalloc+0xd4/0xd8
[  187.534123]  kmalloc_trace+0x68/0x130
[  187.535235]  kmalloc_oob_right+0xa0/0x308
[  187.536802]  kunit_try_run_case+0xf8/0x260
[  187.538154]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  187.540243]  kthread+0x18c/0x1a8
[  187.541213]  ret_from_fork+0x10/0x20
[  187.542504] 
[  187.543290] The buggy address belongs to the object at ffff0000c5f2d600
[  187.543290]  which belongs to the cache kmalloc-128 of size 128
[  187.545688] The buggy address is located 0 bytes to the right of
[  187.545688]  allocated 115-byte region [ffff0000c5f2d600, ffff0000c5f2d673)
[  187.549116] 
[  187.550137] The buggy address belongs to the physical page:
[  187.551762] page:0000000066b8e3d8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f2d
[  187.554526] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  187.556520] page_type: 0xffffffff()
[  187.558274] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[  187.559923] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  187.561701] page dumped because: kasan: bad access detected
[  187.563147] 
[  187.563798] Memory state around the buggy address:
[  187.565875]  ffff0000c5f2d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  187.567792]  ffff0000c5f2d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.569640] >ffff0000c5f2d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  187.571553]                                                              ^
[  187.573160]  ffff0000c5f2d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.574682]  ffff0000c5f2d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.576403] ==================================================================

test log snippet boot parser 28

Home

[  187.582992] ==================================================================
[  187.585115] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xf0/0x308
[  187.587058] Write of size 1 at addr ffff0000c5f2d678 by task kunit_try_catch/117
[  187.588858] 
[  187.589471] CPU: 0 PID: 117 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  187.591567] Hardware name: linux,dummy-virt (DT)
[  187.592666] Call trace:
[  187.593456]  dump_backtrace+0x9c/0x128
[  187.594572]  show_stack+0x20/0x38
[  187.595598]  dump_stack_lvl+0x60/0xb0
[  187.596737]  print_report+0xf8/0x5d8
[  187.597960]  kasan_report+0xc8/0x118
[  187.599122]  __asan_store1+0x60/0x70
[  187.600240]  kmalloc_oob_right+0xf0/0x308
[  187.601413]  kunit_try_run_case+0xf8/0x260
[  187.602713]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  187.604152]  kthread+0x18c/0x1a8
[  187.605103]  ret_from_fork+0x10/0x20
[  187.606275] 
[  187.606803] Allocated by task 117:
[  187.607739]  kasan_save_stack+0x3c/0x68
[  187.608968]  kasan_set_track+0x2c/0x40
[  187.610093]  kasan_save_alloc_info+0x24/0x38
[  187.611458]  __kasan_kmalloc+0xd4/0xd8
[  187.612607]  kmalloc_trace+0x68/0x130
[  187.613645]  kmalloc_oob_right+0xa0/0x308
[  187.614875]  kunit_try_run_case+0xf8/0x260
[  187.616044]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  187.617578]  kthread+0x18c/0x1a8
[  187.618543]  ret_from_fork+0x10/0x20
[  187.619674] 
[  187.620304] The buggy address belongs to the object at ffff0000c5f2d600
[  187.620304]  which belongs to the cache kmalloc-128 of size 128
[  187.622563] The buggy address is located 5 bytes to the right of
[  187.622563]  allocated 115-byte region [ffff0000c5f2d600, ffff0000c5f2d673)
[  187.625012] 
[  187.625628] The buggy address belongs to the physical page:
[  187.626889] page:0000000066b8e3d8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f2d
[  187.628800] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  187.630334] page_type: 0xffffffff()
[  187.631397] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[  187.633056] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  187.634590] page dumped because: kasan: bad access detected
[  187.635842] 
[  187.636413] Memory state around the buggy address:
[  187.637588]  ffff0000c5f2d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  187.639291]  ffff0000c5f2d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.640901] >ffff0000c5f2d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  187.642420]                                                                 ^
[  187.643989]  ffff0000c5f2d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.645512]  ffff0000c5f2d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.647130] ==================================================================

test log snippet boot parser 29

Home

[  187.652205] ==================================================================
[  187.653718] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x118/0x308
[  187.655247] Read of size 1 at addr ffff0000c5f2d680 by task kunit_try_catch/117
[  187.656905] 
[  187.657548] CPU: 0 PID: 117 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  187.659347] Hardware name: linux,dummy-virt (DT)
[  187.660453] Call trace:
[  187.661234]  dump_backtrace+0x9c/0x128
[  187.662341]  show_stack+0x20/0x38
[  187.663313]  dump_stack_lvl+0x60/0xb0
[  187.664508]  print_report+0xf8/0x5d8
[  187.665619]  kasan_report+0xc8/0x118
[  187.666847]  __asan_load1+0x60/0x70
[  187.668000]  kmalloc_oob_right+0x118/0x308
[  187.669172]  kunit_try_run_case+0xf8/0x260
[  187.670367]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  187.671832]  kthread+0x18c/0x1a8
[  187.672833]  ret_from_fork+0x10/0x20
[  187.673943] 
[  187.674526] Allocated by task 117:
[  187.675446]  kasan_save_stack+0x3c/0x68
[  187.676632]  kasan_set_track+0x2c/0x40
[  187.677823]  kasan_save_alloc_info+0x24/0x38
[  187.679107]  __kasan_kmalloc+0xd4/0xd8
[  187.680257]  kmalloc_trace+0x68/0x130
[  187.681313]  kmalloc_oob_right+0xa0/0x308
[  187.682497]  kunit_try_run_case+0xf8/0x260
[  187.683763]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  187.685194]  kthread+0x18c/0x1a8
[  187.686233]  ret_from_fork+0x10/0x20
[  187.687341] 
[  187.687893] The buggy address belongs to the object at ffff0000c5f2d600
[  187.687893]  which belongs to the cache kmalloc-128 of size 128
[  187.690166] The buggy address is located 13 bytes to the right of
[  187.690166]  allocated 115-byte region [ffff0000c5f2d600, ffff0000c5f2d673)
[  187.693266] 
[  187.693949] The buggy address belongs to the physical page:
[  187.695934] page:0000000066b8e3d8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f2d
[  187.697872] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  187.699418] page_type: 0xffffffff()
[  187.700599] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[  187.702207] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  187.703796] page dumped because: kasan: bad access detected
[  187.705170] 
[  187.705835] Memory state around the buggy address:
[  187.707087]  ffff0000c5f2d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.708647]  ffff0000c5f2d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  187.710338] >ffff0000c5f2d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.711786]                    ^
[  187.712686]  ffff0000c5f2d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.714267]  ffff0000c5f2d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  187.715706] ==================================================================

test log snippet boot parser 30

Home

[  187.944979] ==================================================================
[  187.947628] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0xac/0x1c0
[  187.950578] Write of size 1 at addr ffff0000c5eca00a by task kunit_try_catch/123
[  187.952330] 
[  187.953135] CPU: 1 PID: 123 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  187.955197] Hardware name: linux,dummy-virt (DT)
[  187.956438] Call trace:
[  187.957133]  dump_backtrace+0x9c/0x128
[  187.958821]  show_stack+0x20/0x38
[  187.959981]  dump_stack_lvl+0x60/0xb0
[  187.961572]  print_report+0xf8/0x5d8
[  187.963305]  kasan_report+0xc8/0x118
[  187.964340]  __asan_store1+0x60/0x70
[  187.965608]  kmalloc_pagealloc_oob_right+0xac/0x1c0
[  187.966934]  kunit_try_run_case+0xf8/0x260
[  187.968213]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  187.970177]  kthread+0x18c/0x1a8
[  187.971306]  ret_from_fork+0x10/0x20
[  187.972611] 
[  187.973469] The buggy address belongs to the physical page:
[  187.974922] page:00000000361d544d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ec8
[  187.977036] head:00000000361d544d order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  187.978946] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[  187.980378] page_type: 0xffffffff()
[  187.981603] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[  187.983412] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  187.985218] page dumped because: kasan: bad access detected
[  187.987223] 
[  187.987890] Memory state around the buggy address:
[  187.989402]  ffff0000c5ec9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  187.991144]  ffff0000c5ec9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  187.992753] >ffff0000c5eca000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  187.994574]                       ^
[  187.995681]  ffff0000c5eca080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  187.997638]  ffff0000c5eca100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  187.999180] ==================================================================

test log snippet boot parser 31

Home

[  190.551817] ==================================================================
[  190.553971] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xd8/0x268
[  190.555408] Read of size 1 at addr ffff0000c60aa0c8 by task kunit_try_catch/175
[  190.557197] 
[  190.558411] CPU: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  190.560357] Hardware name: linux,dummy-virt (DT)
[  190.561402] Call trace:
[  190.562214]  dump_backtrace+0x9c/0x128
[  190.563533]  show_stack+0x20/0x38
[  190.564715]  dump_stack_lvl+0x60/0xb0
[  190.566226]  print_report+0xf8/0x5d8
[  190.568220]  kasan_report+0xc8/0x118
[  190.569793]  __asan_load1+0x60/0x70
[  190.571293]  kmem_cache_oob+0xd8/0x268
[  190.572550]  kunit_try_run_case+0xf8/0x260
[  190.574523]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  190.575872]  kthread+0x18c/0x1a8
[  190.576848]  ret_from_fork+0x10/0x20
[  190.577960] 
[  190.578574] Allocated by task 175:
[  190.579520]  kasan_save_stack+0x3c/0x68
[  190.580798]  kasan_set_track+0x2c/0x40
[  190.582836]  kasan_save_alloc_info+0x24/0x38
[  190.584348]  __kasan_slab_alloc+0xa8/0xb0
[  190.585681]  kmem_cache_alloc+0x134/0x330
[  190.586951]  kmem_cache_oob+0xb8/0x268
[  190.588206]  kunit_try_run_case+0xf8/0x260
[  190.590482]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  190.592029]  kthread+0x18c/0x1a8
[  190.593126]  ret_from_fork+0x10/0x20
[  190.594271] 
[  190.594932] The buggy address belongs to the object at ffff0000c60aa000
[  190.594932]  which belongs to the cache test_cache of size 200
[  190.597175] The buggy address is located 0 bytes to the right of
[  190.597175]  allocated 200-byte region [ffff0000c60aa000, ffff0000c60aa0c8)
[  190.600870] 
[  190.601474] The buggy address belongs to the physical page:
[  190.602754] page:000000000157b634 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060aa
[  190.604649] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  190.607257] page_type: 0xffffffff()
[  190.608494] raw: 0bfffc0000000800 ffff0000c57608c0 dead000000000122 0000000000000000
[  190.610175] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[  190.611666] page dumped because: kasan: bad access detected
[  190.613057] 
[  190.613608] Memory state around the buggy address:
[  190.614926]  ffff0000c60a9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  190.616704]  ffff0000c60aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  190.618490] >ffff0000c60aa080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[  190.620471]                                               ^
[  190.621933]  ffff0000c60aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  190.624048]  ffff0000c60aa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  190.625860] ==================================================================

test log snippet boot parser 32

Home

[  188.834345] ==================================================================
[  188.835637] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x140/0x590
[  188.837519] Write of size 1 at addr ffff0000c5eea0d0 by task kunit_try_catch/141
[  188.839323] 
[  188.840083] CPU: 0 PID: 141 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  188.842235] Hardware name: linux,dummy-virt (DT)
[  188.843411] Call trace:
[  188.844433]  dump_backtrace+0x9c/0x128
[  188.845580]  show_stack+0x20/0x38
[  188.846620]  dump_stack_lvl+0x60/0xb0
[  188.847796]  print_report+0xf8/0x5d8
[  188.849126]  kasan_report+0xc8/0x118
[  188.850318]  __asan_store1+0x60/0x70
[  188.851473]  krealloc_less_oob_helper+0x140/0x590
[  188.853000]  krealloc_pagealloc_less_oob+0x20/0x38
[  188.854375]  kunit_try_run_case+0xf8/0x260
[  188.855553]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  188.857446]  kthread+0x18c/0x1a8
[  188.858416]  ret_from_fork+0x10/0x20
[  188.859739] 
[  188.860414] The buggy address belongs to the physical page:
[  188.862042] page:00000000afef2623 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ee8
[  188.864207] head:00000000afef2623 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  188.865803] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[  188.867415] page_type: 0xffffffff()
[  188.868852] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[  188.870592] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  188.872195] page dumped because: kasan: bad access detected
[  188.873556] 
[  188.874151] Memory state around the buggy address:
[  188.875359]  ffff0000c5ee9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  188.877022]  ffff0000c5eea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  188.878869] >ffff0000c5eea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  188.880556]                                                  ^
[  188.881999]  ffff0000c5eea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  188.883758]  ffff0000c5eea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  188.885488] ==================================================================

test log snippet boot parser 33

Home

[  188.945523] ==================================================================
[  188.946746] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1b8/0x590
[  188.948651] Write of size 1 at addr ffff0000c5eea0ea by task kunit_try_catch/141
[  188.950679] 
[  188.951423] CPU: 0 PID: 141 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  188.953318] Hardware name: linux,dummy-virt (DT)
[  188.954397] Call trace:
[  188.955138]  dump_backtrace+0x9c/0x128
[  188.956582]  show_stack+0x20/0x38
[  188.957687]  dump_stack_lvl+0x60/0xb0
[  188.958881]  print_report+0xf8/0x5d8
[  188.960485]  kasan_report+0xc8/0x118
[  188.961528]  __asan_store1+0x60/0x70
[  188.962678]  krealloc_less_oob_helper+0x1b8/0x590
[  188.963962]  krealloc_pagealloc_less_oob+0x20/0x38
[  188.965273]  kunit_try_run_case+0xf8/0x260
[  188.966634]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  188.969255]  kthread+0x18c/0x1a8
[  188.970260]  ret_from_fork+0x10/0x20
[  188.971337] 
[  188.971897] The buggy address belongs to the physical page:
[  188.973302] page:00000000afef2623 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ee8
[  188.975207] head:00000000afef2623 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  188.977005] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[  188.978748] page_type: 0xffffffff()
[  188.979942] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[  188.981482] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  188.983017] page dumped because: kasan: bad access detected
[  188.984684] 
[  188.985254] Memory state around the buggy address:
[  188.986832]  ffff0000c5ee9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  188.988807]  ffff0000c5eea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  188.990406] >ffff0000c5eea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  188.991911]                                                           ^
[  188.993539]  ffff0000c5eea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  188.995137]  ffff0000c5eea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  188.996931] ==================================================================
---
[  188.999531] ==================================================================
[  189.001336] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1e0/0x590
[  189.004145] Write of size 1 at addr ffff0000c5eea0eb by task kunit_try_catch/141
[  189.006437] 
[  189.007117] CPU: 0 PID: 141 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  189.009053] Hardware name: linux,dummy-virt (DT)
[  189.010186] Call trace:
[  189.010930]  dump_backtrace+0x9c/0x128
[  189.012431]  show_stack+0x20/0x38
[  189.013362]  dump_stack_lvl+0x60/0xb0
[  189.014491]  print_report+0xf8/0x5d8
[  189.015687]  kasan_report+0xc8/0x118
[  189.016898]  __asan_store1+0x60/0x70
[  189.018182]  krealloc_less_oob_helper+0x1e0/0x590
[  189.019536]  krealloc_pagealloc_less_oob+0x20/0x38
[  189.021295]  kunit_try_run_case+0xf8/0x260
[  189.022458]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.023929]  kthread+0x18c/0x1a8
[  189.025101]  ret_from_fork+0x10/0x20
[  189.026350] 
[  189.026881] The buggy address belongs to the physical page:
[  189.028200] page:00000000afef2623 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ee8
[  189.030359] head:00000000afef2623 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  189.032075] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[  189.033657] page_type: 0xffffffff()
[  189.034741] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[  189.036857] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  189.038437] page dumped because: kasan: bad access detected
[  189.039695] 
[  189.040346] Memory state around the buggy address:
[  189.041563]  ffff0000c5ee9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  189.043992]  ffff0000c5eea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  189.045739] >ffff0000c5eea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  189.047293]                                                           ^
[  189.049097]  ffff0000c5eea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  189.050661]  ffff0000c5eea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  189.052453] ==================================================================

test log snippet boot parser 34

Home

[  188.779385] ==================================================================
[  188.781608] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x110/0x590
[  188.783303] Write of size 1 at addr ffff0000c5eea0c9 by task kunit_try_catch/141
[  188.785305] 
[  188.786040] CPU: 0 PID: 141 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  188.787821] Hardware name: linux,dummy-virt (DT)
[  188.789076] Call trace:
[  188.789890]  dump_backtrace+0x9c/0x128
[  188.790965]  show_stack+0x20/0x38
[  188.792104]  dump_stack_lvl+0x60/0xb0
[  188.793174]  print_report+0xf8/0x5d8
[  188.794377]  kasan_report+0xc8/0x118
[  188.795521]  __asan_store1+0x60/0x70
[  188.796885]  krealloc_less_oob_helper+0x110/0x590
[  188.798221]  krealloc_pagealloc_less_oob+0x20/0x38
[  188.799466]  kunit_try_run_case+0xf8/0x260
[  188.800926]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  188.802663]  kthread+0x18c/0x1a8
[  188.803798]  ret_from_fork+0x10/0x20
[  188.805151] 
[  188.805758] The buggy address belongs to the physical page:
[  188.807096] page:00000000afef2623 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ee8
[  188.809127] head:00000000afef2623 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  188.810780] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[  188.812429] page_type: 0xffffffff()
[  188.813550] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[  188.815200] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  188.817012] page dumped because: kasan: bad access detected
[  188.818302] 
[  188.818873] Memory state around the buggy address:
[  188.820079]  ffff0000c5ee9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  188.821681]  ffff0000c5eea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  188.823458] >ffff0000c5eea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  188.825222]                                               ^
[  188.826509]  ffff0000c5eea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  188.828433]  ffff0000c5eea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  188.829759] ==================================================================

test log snippet boot parser 35

Home

[  188.889841] ==================================================================
[  188.891231] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x18c/0x590
[  188.893224] Write of size 1 at addr ffff0000c5eea0da by task kunit_try_catch/141
[  188.895498] 
[  188.896188] CPU: 0 PID: 141 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  188.898610] Hardware name: linux,dummy-virt (DT)
[  188.899803] Call trace:
[  188.900520]  dump_backtrace+0x9c/0x128
[  188.901955]  show_stack+0x20/0x38
[  188.902984]  dump_stack_lvl+0x60/0xb0
[  188.904290]  print_report+0xf8/0x5d8
[  188.905570]  kasan_report+0xc8/0x118
[  188.906735]  __asan_store1+0x60/0x70
[  188.907933]  krealloc_less_oob_helper+0x18c/0x590
[  188.909347]  krealloc_pagealloc_less_oob+0x20/0x38
[  188.910931]  kunit_try_run_case+0xf8/0x260
[  188.912512]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  188.914265]  kthread+0x18c/0x1a8
[  188.915326]  ret_from_fork+0x10/0x20
[  188.916687] 
[  188.917321] The buggy address belongs to the physical page:
[  188.918624] page:00000000afef2623 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ee8
[  188.920845] head:00000000afef2623 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  188.922575] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[  188.924452] page_type: 0xffffffff()
[  188.925703] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[  188.927200] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  188.929056] page dumped because: kasan: bad access detected
[  188.930187] 
[  188.930745] Memory state around the buggy address:
[  188.932185]  ffff0000c5ee9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  188.934128]  ffff0000c5eea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  188.935714] >ffff0000c5eea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  188.937519]                                                     ^
[  188.938980]  ffff0000c5eea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  188.940886]  ffff0000c5eea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  188.942335] ==================================================================

test log snippet boot parser 36

Home

[  188.359271] ==================================================================
[  188.361179] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x138/0x380
[  188.364393] Write of size 1 at addr ffff0000c5a806eb by task kunit_try_catch/135
[  188.366037] 
[  188.366847] CPU: 0 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  188.369644] Hardware name: linux,dummy-virt (DT)
[  188.370889] Call trace:
[  188.371669]  dump_backtrace+0x9c/0x128
[  188.373503]  show_stack+0x20/0x38
[  188.374471]  dump_stack_lvl+0x60/0xb0
[  188.375714]  print_report+0xf8/0x5d8
[  188.377149]  kasan_report+0xc8/0x118
[  188.378355]  __asan_store1+0x60/0x70
[  188.379501]  krealloc_more_oob_helper+0x138/0x380
[  188.380857]  krealloc_more_oob+0x20/0x38
[  188.382115]  kunit_try_run_case+0xf8/0x260
[  188.383544]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  188.385297]  kthread+0x18c/0x1a8
[  188.386296]  ret_from_fork+0x10/0x20
[  188.387615] 
[  188.388585] Allocated by task 135:
[  188.389524]  kasan_save_stack+0x3c/0x68
[  188.390805]  kasan_set_track+0x2c/0x40
[  188.391976]  kasan_save_alloc_info+0x24/0x38
[  188.393261]  __kasan_krealloc+0x10c/0x140
[  188.394587]  krealloc+0x10c/0x1a0
[  188.395631]  krealloc_more_oob_helper+0xd4/0x380
[  188.396930]  krealloc_more_oob+0x20/0x38
[  188.398151]  kunit_try_run_case+0xf8/0x260
[  188.399443]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  188.401944]  kthread+0x18c/0x1a8
[  188.403028]  ret_from_fork+0x10/0x20
[  188.404238] 
[  188.405112] The buggy address belongs to the object at ffff0000c5a80600
[  188.405112]  which belongs to the cache kmalloc-256 of size 256
[  188.407354] The buggy address is located 0 bytes to the right of
[  188.407354]  allocated 235-byte region [ffff0000c5a80600, ffff0000c5a806eb)
[  188.409933] 
[  188.410556] The buggy address belongs to the physical page:
[  188.411912] page:00000000c3cb256b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[  188.413811] head:00000000c3cb256b order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  188.415426] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  188.417343] page_type: 0xffffffff()
[  188.418389] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000
[  188.420115] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  188.421595] page dumped because: kasan: bad access detected
[  188.422719] 
[  188.423346] Memory state around the buggy address:
[  188.425138]  ffff0000c5a80580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.427344]  ffff0000c5a80600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  188.429175] >ffff0000c5a80680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[  188.430842]                                                           ^
[  188.432505]  ffff0000c5a80700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.434255]  ffff0000c5a80780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.435714] ==================================================================

test log snippet boot parser 37

Home

[  188.651534] ==================================================================
[  188.653479] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x138/0x380
[  188.655005] Write of size 1 at addr ffff0000c5eea0eb by task kunit_try_catch/139
[  188.656793] 
[  188.657480] CPU: 0 PID: 139 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  188.659290] Hardware name: linux,dummy-virt (DT)
[  188.660405] Call trace:
[  188.661129]  dump_backtrace+0x9c/0x128
[  188.662253]  show_stack+0x20/0x38
[  188.663296]  dump_stack_lvl+0x60/0xb0
[  188.664474]  print_report+0xf8/0x5d8
[  188.665630]  kasan_report+0xc8/0x118
[  188.666740]  __asan_store1+0x60/0x70
[  188.667945]  krealloc_more_oob_helper+0x138/0x380
[  188.669305]  krealloc_pagealloc_more_oob+0x20/0x38
[  188.670635]  kunit_try_run_case+0xf8/0x260
[  188.671878]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  188.673311]  kthread+0x18c/0x1a8
[  188.674220]  ret_from_fork+0x10/0x20
[  188.675346] 
[  188.675962] The buggy address belongs to the physical page:
[  188.677213] page:00000000afef2623 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ee8
[  188.679068] head:00000000afef2623 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  188.680719] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[  188.682306] page_type: 0xffffffff()
[  188.683332] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[  188.685083] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  188.686579] page dumped because: kasan: bad access detected
[  188.687873] 
[  188.688420] Memory state around the buggy address:
[  188.689629]  ffff0000c5ee9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  188.691260]  ffff0000c5eea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  188.692856] >ffff0000c5eea080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[  188.694352]                                                           ^
[  188.695763]  ffff0000c5eea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  188.697390]  ffff0000c5eea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  188.698979] ==================================================================

test log snippet boot parser 38

Home

[  188.701648] ==================================================================
[  188.703166] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x168/0x380
[  188.704673] Write of size 1 at addr ffff0000c5eea0f0 by task kunit_try_catch/139
[  188.706681] 
[  188.707319] CPU: 0 PID: 139 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  188.709251] Hardware name: linux,dummy-virt (DT)
[  188.710462] Call trace:
[  188.711245]  dump_backtrace+0x9c/0x128
[  188.712445]  show_stack+0x20/0x38
[  188.713752]  dump_stack_lvl+0x60/0xb0
[  188.715138]  print_report+0xf8/0x5d8
[  188.716295]  kasan_report+0xc8/0x118
[  188.717440]  __asan_store1+0x60/0x70
[  188.718641]  krealloc_more_oob_helper+0x168/0x380
[  188.719911]  krealloc_pagealloc_more_oob+0x20/0x38
[  188.721281]  kunit_try_run_case+0xf8/0x260
[  188.722510]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  188.723984]  kthread+0x18c/0x1a8
[  188.724985]  ret_from_fork+0x10/0x20
[  188.726112] 
[  188.726758] The buggy address belongs to the physical page:
[  188.728044] page:00000000afef2623 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ee8
[  188.729917] head:00000000afef2623 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  188.731596] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[  188.733157] page_type: 0xffffffff()
[  188.734337] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[  188.735977] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  188.737487] page dumped because: kasan: bad access detected
[  188.738786] 
[  188.739422] Memory state around the buggy address:
[  188.740624]  ffff0000c5ee9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  188.742228]  ffff0000c5eea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  188.743815] >ffff0000c5eea080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[  188.745292]                                                              ^
[  188.746831]  ffff0000c5eea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  188.748408]  ffff0000c5eea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  188.749903] ==================================================================

test log snippet boot parser 39

Home

[  188.442366] ==================================================================
[  188.443799] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x168/0x380
[  188.445634] Write of size 1 at addr ffff0000c5a806f0 by task kunit_try_catch/135
[  188.447464] 
[  188.448664] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  188.450453] Hardware name: linux,dummy-virt (DT)
[  188.452485] Call trace:
[  188.453598]  dump_backtrace+0x9c/0x128
[  188.454785]  show_stack+0x20/0x38
[  188.455730]  dump_stack_lvl+0x60/0xb0
[  188.457192]  print_report+0xf8/0x5d8
[  188.458686]  kasan_report+0xc8/0x118
[  188.460296]  __asan_store1+0x60/0x70
[  188.461764]  krealloc_more_oob_helper+0x168/0x380
[  188.463160]  krealloc_more_oob+0x20/0x38
[  188.464426]  kunit_try_run_case+0xf8/0x260
[  188.466112]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  188.468619]  kthread+0x18c/0x1a8
[  188.469465]  ret_from_fork+0x10/0x20
[  188.470616] 
[  188.471174] Allocated by task 135:
[  188.472115]  kasan_save_stack+0x3c/0x68
[  188.473383]  kasan_set_track+0x2c/0x40
[  188.474615]  kasan_save_alloc_info+0x24/0x38
[  188.476188]  __kasan_krealloc+0x10c/0x140
[  188.477569]  krealloc+0x10c/0x1a0
[  188.478717]  krealloc_more_oob_helper+0xd4/0x380
[  188.480175]  krealloc_more_oob+0x20/0x38
[  188.481535]  kunit_try_run_case+0xf8/0x260
[  188.482864]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  188.484422]  kthread+0x18c/0x1a8
[  188.485422]  ret_from_fork+0x10/0x20
[  188.487002] 
[  188.487561] The buggy address belongs to the object at ffff0000c5a80600
[  188.487561]  which belongs to the cache kmalloc-256 of size 256
[  188.490690] The buggy address is located 5 bytes to the right of
[  188.490690]  allocated 235-byte region [ffff0000c5a80600, ffff0000c5a806eb)
[  188.493129] 
[  188.493788] The buggy address belongs to the physical page:
[  188.495176] page:00000000c3cb256b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[  188.497843] head:00000000c3cb256b order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  188.499535] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  188.501717] page_type: 0xffffffff()
[  188.503046] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000
[  188.505193] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  188.506442] page dumped because: kasan: bad access detected
[  188.507152] 
[  188.507451] Memory state around the buggy address:
[  188.508711]  ffff0000c5a80580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.510582]  ffff0000c5a80600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  188.513116] >ffff0000c5a80680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[  188.514689]                                                              ^
[  188.516250]  ffff0000c5a80700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.519000]  ffff0000c5a80780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.520915] ==================================================================

test log snippet boot parser 40

Home

[  191.817253] ==================================================================
[  191.819207] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x150/0x378
[  191.821061] Read of size 1 at addr ffff0000c60c537f by task kunit_try_catch/191
[  191.822887] 
[  191.823670] CPU: 1 PID: 191 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  191.825467] Hardware name: linux,dummy-virt (DT)
[  191.826534] Call trace:
[  191.827695]  dump_backtrace+0x9c/0x128
[  191.829020]  show_stack+0x20/0x38
[  191.830064]  dump_stack_lvl+0x60/0xb0
[  191.831482]  print_report+0xf8/0x5d8
[  191.832810]  kasan_report+0xc8/0x118
[  191.834042]  __asan_load1+0x60/0x70
[  191.835237]  ksize_unpoisons_memory+0x150/0x378
[  191.836745]  kunit_try_run_case+0xf8/0x260
[  191.837908]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  191.839441]  kthread+0x18c/0x1a8
[  191.840540]  ret_from_fork+0x10/0x20
[  191.842440] 
[  191.843055] Allocated by task 191:
[  191.843966]  kasan_save_stack+0x3c/0x68
[  191.845294]  kasan_set_track+0x2c/0x40
[  191.846523]  kasan_save_alloc_info+0x24/0x38
[  191.847915]  __kasan_kmalloc+0xd4/0xd8
[  191.849342]  kmalloc_trace+0x68/0x130
[  191.850573]  ksize_unpoisons_memory+0xb0/0x378
[  191.852679]  kunit_try_run_case+0xf8/0x260
[  191.853923]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  191.855428]  kthread+0x18c/0x1a8
[  191.856503]  ret_from_fork+0x10/0x20
[  191.858048] 
[  191.858997] The buggy address belongs to the object at ffff0000c60c5300
[  191.858997]  which belongs to the cache kmalloc-128 of size 128
[  191.861895] The buggy address is located 12 bytes to the right of
[  191.861895]  allocated 115-byte region [ffff0000c60c5300, ffff0000c60c5373)
[  191.864417] 
[  191.864998] The buggy address belongs to the physical page:
[  191.866705] page:000000005f243d63 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060c5
[  191.868356] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  191.869640] page_type: 0xffffffff()
[  191.871267] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[  191.873338] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  191.875189] page dumped because: kasan: bad access detected
[  191.876616] 
[  191.877525] Memory state around the buggy address:
[  191.878806]  ffff0000c60c5200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  191.881008]  ffff0000c60c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  191.882687] >ffff0000c60c5300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  191.884363]                                                                 ^
[  191.885953]  ffff0000c60c5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  191.887908]  ffff0000c60c5400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  191.889519] ==================================================================
---
[  191.739262] ==================================================================
[  191.741052] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x128/0x378
[  191.743139] Read of size 1 at addr ffff0000c60c5378 by task kunit_try_catch/191
[  191.745574] 
[  191.746187] CPU: 1 PID: 191 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  191.748242] Hardware name: linux,dummy-virt (DT)
[  191.749357] Call trace:
[  191.750516]  dump_backtrace+0x9c/0x128
[  191.751793]  show_stack+0x20/0x38
[  191.753091]  dump_stack_lvl+0x60/0xb0
[  191.755067]  print_report+0xf8/0x5d8
[  191.756429]  kasan_report+0xc8/0x118
[  191.757811]  __asan_load1+0x60/0x70
[  191.758968]  ksize_unpoisons_memory+0x128/0x378
[  191.760289]  kunit_try_run_case+0xf8/0x260
[  191.761628]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  191.763501]  kthread+0x18c/0x1a8
[  191.764984]  ret_from_fork+0x10/0x20
[  191.766122] 
[  191.766709] Allocated by task 191:
[  191.767678]  kasan_save_stack+0x3c/0x68
[  191.769092]  kasan_set_track+0x2c/0x40
[  191.770501]  kasan_save_alloc_info+0x24/0x38
[  191.772118]  __kasan_kmalloc+0xd4/0xd8
[  191.773513]  kmalloc_trace+0x68/0x130
[  191.774635]  ksize_unpoisons_memory+0xb0/0x378
[  191.775956]  kunit_try_run_case+0xf8/0x260
[  191.777353]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  191.779107]  kthread+0x18c/0x1a8
[  191.780298]  ret_from_fork+0x10/0x20
[  191.781846] 
[  191.782585] The buggy address belongs to the object at ffff0000c60c5300
[  191.782585]  which belongs to the cache kmalloc-128 of size 128
[  191.785342] The buggy address is located 5 bytes to the right of
[  191.785342]  allocated 115-byte region [ffff0000c60c5300, ffff0000c60c5373)
[  191.787820] 
[  191.788517] The buggy address belongs to the physical page:
[  191.790306] page:000000005f243d63 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060c5
[  191.792290] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  191.793870] page_type: 0xffffffff()
[  191.795360] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[  191.797432] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  191.799272] page dumped because: kasan: bad access detected
[  191.800432] 
[  191.801006] Memory state around the buggy address:
[  191.803069]  ffff0000c60c5200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  191.805108]  ffff0000c60c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  191.806995] >ffff0000c60c5300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  191.808351]                                                                 ^
[  191.810311]  ffff0000c60c5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  191.811876]  ffff0000c60c5400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  191.813705] ==================================================================

test log snippet boot parser 41

Home

[  191.661872] ==================================================================
[  191.663821] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x104/0x378
[  191.666395] Read of size 1 at addr ffff0000c60c5373 by task kunit_try_catch/191
[  191.669301] 
[  191.669901] CPU: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  191.672029] Hardware name: linux,dummy-virt (DT)
[  191.673240] Call trace:
[  191.674113]  dump_backtrace+0x9c/0x128
[  191.675221]  show_stack+0x20/0x38
[  191.676339]  dump_stack_lvl+0x60/0xb0
[  191.677364]  print_report+0xf8/0x5d8
[  191.678576]  kasan_report+0xc8/0x118
[  191.679701]  __asan_load1+0x60/0x70
[  191.681185]  ksize_unpoisons_memory+0x104/0x378
[  191.683348]  kunit_try_run_case+0xf8/0x260
[  191.684806]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  191.686264]  kthread+0x18c/0x1a8
[  191.687263]  ret_from_fork+0x10/0x20
[  191.688520] 
[  191.689216] Allocated by task 191:
[  191.690019]  kasan_save_stack+0x3c/0x68
[  191.691212]  kasan_set_track+0x2c/0x40
[  191.692511]  kasan_save_alloc_info+0x24/0x38
[  191.693872]  __kasan_kmalloc+0xd4/0xd8
[  191.694996]  kmalloc_trace+0x68/0x130
[  191.696172]  ksize_unpoisons_memory+0xb0/0x378
[  191.697299]  kunit_try_run_case+0xf8/0x260
[  191.698545]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  191.700795]  kthread+0x18c/0x1a8
[  191.701973]  ret_from_fork+0x10/0x20
[  191.702942] 
[  191.703548] The buggy address belongs to the object at ffff0000c60c5300
[  191.703548]  which belongs to the cache kmalloc-128 of size 128
[  191.706095] The buggy address is located 0 bytes to the right of
[  191.706095]  allocated 115-byte region [ffff0000c60c5300, ffff0000c60c5373)
[  191.708720] 
[  191.709256] The buggy address belongs to the physical page:
[  191.710584] page:000000005f243d63 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060c5
[  191.712697] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  191.714122] page_type: 0xffffffff()
[  191.715148] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[  191.716908] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  191.718416] page dumped because: kasan: bad access detected
[  191.719647] 
[  191.720276] Memory state around the buggy address:
[  191.721372]  ffff0000c60c5200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  191.723228]  ffff0000c60c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  191.725540] >ffff0000c60c5300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  191.727145]                                                              ^
[  191.728892]  ffff0000c60c5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  191.730555]  ffff0000c60c5400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  191.732043] ==================================================================

test log snippet boot parser 42

Home

[  192.643579] ==================================================================
[  192.646214] BUG: KASAN: slab-out-of-bounds in memchr+0x28/0x78
[  192.647595] Read of size 1 at addr ffff0000c5f2cb18 by task kunit_try_catch/201
[  192.649786] 
[  192.650362] CPU: 1 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  192.652218] Hardware name: linux,dummy-virt (DT)
[  192.652937] Call trace:
[  192.653453]  dump_backtrace+0x9c/0x128
[  192.654722]  show_stack+0x20/0x38
[  192.655848]  dump_stack_lvl+0x60/0xb0
[  192.657330]  print_report+0xf8/0x5d8
[  192.658573]  kasan_report+0xc8/0x118
[  192.659990]  __asan_load1+0x60/0x70
[  192.661383]  memchr+0x28/0x78
[  192.662410]  kasan_memchr+0xd4/0x1f0
[  192.663525]  kunit_try_run_case+0xf8/0x260
[  192.665166]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  192.667040]  kthread+0x18c/0x1a8
[  192.668182]  ret_from_fork+0x10/0x20
[  192.669660] 
[  192.670246] Allocated by task 201:
[  192.671180]  kasan_save_stack+0x3c/0x68
[  192.672332]  kasan_set_track+0x2c/0x40
[  192.673629]  kasan_save_alloc_info+0x24/0x38
[  192.674945]  __kasan_kmalloc+0xd4/0xd8
[  192.676071]  kmalloc_trace+0x68/0x130
[  192.677264]  kasan_memchr+0xa0/0x1f0
[  192.678423]  kunit_try_run_case+0xf8/0x260
[  192.679666]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  192.681360]  kthread+0x18c/0x1a8
[  192.682376]  ret_from_fork+0x10/0x20
[  192.683485] 
[  192.684198] The buggy address belongs to the object at ffff0000c5f2cb00
[  192.684198]  which belongs to the cache kmalloc-32 of size 32
[  192.687039] The buggy address is located 0 bytes to the right of
[  192.687039]  allocated 24-byte region [ffff0000c5f2cb00, ffff0000c5f2cb18)
[  192.690380] 
[  192.691062] The buggy address belongs to the physical page:
[  192.692653] page:00000000e427c865 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f2c
[  192.694555] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  192.696366] page_type: 0xffffffff()
[  192.697631] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[  192.699462] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[  192.701099] page dumped because: kasan: bad access detected
[  192.702389] 
[  192.702992] Memory state around the buggy address:
[  192.704654]  ffff0000c5f2ca00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  192.706344]  ffff0000c5f2ca80: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[  192.708458] >ffff0000c5f2cb00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  192.710104]                             ^
[  192.711144]  ffff0000c5f2cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  192.712950]  ffff0000c5f2cc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  192.714502] ==================================================================

test log snippet boot parser 43

Home

[  192.739868] ==================================================================
[  192.741951] BUG: KASAN: slab-out-of-bounds in memcmp+0x44/0xd0
[  192.743308] Read of size 1 at addr ffff0000c5f2cb58 by task kunit_try_catch/203
[  192.745006] 
[  192.745665] CPU: 1 PID: 203 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  192.747438] Hardware name: linux,dummy-virt (DT)
[  192.748488] Call trace:
[  192.749177]  dump_backtrace+0x9c/0x128
[  192.750319]  show_stack+0x20/0x38
[  192.751357]  dump_stack_lvl+0x60/0xb0
[  192.752471]  print_report+0xf8/0x5d8
[  192.753663]  kasan_report+0xc8/0x118
[  192.754915]  __asan_load1+0x60/0x70
[  192.756085]  memcmp+0x44/0xd0
[  192.757169]  kasan_memcmp+0xf0/0x208
[  192.758269]  kunit_try_run_case+0xf8/0x260
[  192.759607]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  192.760930]  kthread+0x18c/0x1a8
[  192.761882]  ret_from_fork+0x10/0x20
[  192.763054] 
[  192.763617] Allocated by task 203:
[  192.764564]  kasan_save_stack+0x3c/0x68
[  192.765751]  kasan_set_track+0x2c/0x40
[  192.766945]  kasan_save_alloc_info+0x24/0x38
[  192.768272]  __kasan_kmalloc+0xd4/0xd8
[  192.769404]  kmalloc_trace+0x68/0x130
[  192.770550]  kasan_memcmp+0xac/0x208
[  192.771639]  kunit_try_run_case+0xf8/0x260
[  192.772842]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  192.774371]  kthread+0x18c/0x1a8
[  192.775354]  ret_from_fork+0x10/0x20
[  192.776463] 
[  192.777080] The buggy address belongs to the object at ffff0000c5f2cb40
[  192.777080]  which belongs to the cache kmalloc-32 of size 32
[  192.779378] The buggy address is located 0 bytes to the right of
[  192.779378]  allocated 24-byte region [ffff0000c5f2cb40, ffff0000c5f2cb58)
[  192.781758] 
[  192.782422] The buggy address belongs to the physical page:
[  192.783683] page:00000000e427c865 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f2c
[  192.785638] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  192.787163] page_type: 0xffffffff()
[  192.788131] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[  192.789937] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[  192.791506] page dumped because: kasan: bad access detected
[  192.792796] 
[  192.793393] Memory state around the buggy address:
[  192.794619]  ffff0000c5f2ca00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  192.796247]  ffff0000c5f2ca80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  192.797845] >ffff0000c5f2cb00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[  192.799336]                                                     ^
[  192.800816]  ffff0000c5f2cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  192.802433]  ffff0000c5f2cc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  192.803963] ==================================================================

test log snippet boot parser 44

Home

[  193.101622] ==================================================================
[  193.103288] BUG: KASAN: slab-use-after-free in kasan_strings+0x150/0x478
[  193.105606] Read of size 1 at addr ffff0000c5f2cb90 by task kunit_try_catch/205
[  193.107151] 
[  193.107743] CPU: 1 PID: 205 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  193.109509] Hardware name: linux,dummy-virt (DT)
[  193.110631] Call trace:
[  193.111355]  dump_backtrace+0x9c/0x128
[  193.112449]  show_stack+0x20/0x38
[  193.113462]  dump_stack_lvl+0x60/0xb0
[  193.114602]  print_report+0xf8/0x5d8
[  193.115834]  kasan_report+0xc8/0x118
[  193.116974]  __asan_load1+0x60/0x70
[  193.118131]  kasan_strings+0x150/0x478
[  193.119248]  kunit_try_run_case+0xf8/0x260
[  193.120475]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  193.121925]  kthread+0x18c/0x1a8
[  193.122943]  ret_from_fork+0x10/0x20
[  193.124020] 
[  193.124601] Allocated by task 205:
[  193.125496]  kasan_save_stack+0x3c/0x68
[  193.126652]  kasan_set_track+0x2c/0x40
[  193.127898]  kasan_save_alloc_info+0x24/0x38
[  193.129189]  __kasan_kmalloc+0xd4/0xd8
[  193.130354]  kmalloc_trace+0x68/0x130
[  193.131431]  kasan_strings+0xa0/0x478
[  193.132473]  kunit_try_run_case+0xf8/0x260
[  193.133722]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  193.135293]  kthread+0x18c/0x1a8
[  193.136276]  ret_from_fork+0x10/0x20
[  193.137421] 
[  193.138004] Freed by task 205:
[  193.138904]  kasan_save_stack+0x3c/0x68
[  193.140080]  kasan_set_track+0x2c/0x40
[  193.141196]  kasan_save_free_info+0x38/0x60
[  193.142558]  __kasan_slab_free+0x100/0x170
[  193.143752]  __kmem_cache_free+0x170/0x2e0
[  193.145036]  kfree+0x74/0x138
[  193.145994]  kasan_strings+0xbc/0x478
[  193.147068]  kunit_try_run_case+0xf8/0x260
[  193.148348]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  193.149885]  kthread+0x18c/0x1a8
[  193.150861]  ret_from_fork+0x10/0x20
[  193.151916] 
[  193.152476] The buggy address belongs to the object at ffff0000c5f2cb80
[  193.152476]  which belongs to the cache kmalloc-32 of size 32
[  193.154840] The buggy address is located 16 bytes inside of
[  193.154840]  freed 32-byte region [ffff0000c5f2cb80, ffff0000c5f2cba0)
[  193.158195] 
[  193.159136] The buggy address belongs to the physical page:
[  193.160324] page:00000000e427c865 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f2c
[  193.162253] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  193.163872] page_type: 0xffffffff()
[  193.165041] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[  193.166705] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[  193.168279] page dumped because: kasan: bad access detected
[  193.169513] 
[  193.170113] Memory state around the buggy address:
[  193.171327]  ffff0000c5f2ca80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  193.172744]  ffff0000c5f2cb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  193.174313] >ffff0000c5f2cb80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[  193.175793]                          ^
[  193.176748]  ffff0000c5f2cc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  193.178493]  ffff0000c5f2cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  193.180069] ==================================================================

test log snippet boot parser 45

Home

[  194.825807] ==================================================================
[  194.828154] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0xc8/0x1d8
[  194.829809] Read of size 1 at addr ffff0000c5e64a60 by task kunit_try_catch/211
[  194.831512] 
[  194.832708] CPU: 1 PID: 211 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  194.834459] Hardware name: linux,dummy-virt (DT)
[  194.835444] Call trace:
[  194.836282]  dump_backtrace+0x9c/0x128
[  194.837572]  show_stack+0x20/0x38
[  194.838671]  dump_stack_lvl+0x60/0xb0
[  194.839880]  print_report+0xf8/0x5d8
[  194.841330]  kasan_report+0xc8/0x118
[  194.842553]  __kasan_check_byte+0x54/0x70
[  194.843849]  kfree_sensitive+0x30/0xb0
[  194.844968]  kmalloc_double_kzfree+0xc8/0x1d8
[  194.846470]  kunit_try_run_case+0xf8/0x260
[  194.847842]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  194.849386]  kthread+0x18c/0x1a8
[  194.850074]  ret_from_fork+0x10/0x20
[  194.851349] 
[  194.852502] Allocated by task 211:
[  194.853468]  kasan_save_stack+0x3c/0x68
[  194.854648]  kasan_set_track+0x2c/0x40
[  194.855887]  kasan_save_alloc_info+0x24/0x38
[  194.857278]  __kasan_kmalloc+0xd4/0xd8
[  194.858642]  kmalloc_trace+0x68/0x130
[  194.859686]  kmalloc_double_kzfree+0x9c/0x1d8
[  194.860950]  kunit_try_run_case+0xf8/0x260
[  194.862477]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  194.864187]  kthread+0x18c/0x1a8
[  194.865516]  ret_from_fork+0x10/0x20
[  194.866698] 
[  194.867343] Freed by task 211:
[  194.868593]  kasan_save_stack+0x3c/0x68
[  194.869999]  kasan_set_track+0x2c/0x40
[  194.871204]  kasan_save_free_info+0x38/0x60
[  194.872611]  __kasan_slab_free+0x100/0x170
[  194.874075]  __kmem_cache_free+0x170/0x2e0
[  194.875348]  kfree+0x74/0x138
[  194.876416]  kfree_sensitive+0x80/0xb0
[  194.877721]  kmalloc_double_kzfree+0xb8/0x1d8
[  194.878989]  kunit_try_run_case+0xf8/0x260
[  194.880693]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  194.882313]  kthread+0x18c/0x1a8
[  194.883366]  ret_from_fork+0x10/0x20
[  194.884487] 
[  194.885164] The buggy address belongs to the object at ffff0000c5e64a60
[  194.885164]  which belongs to the cache kmalloc-16 of size 16
[  194.887719] The buggy address is located 0 bytes inside of
[  194.887719]  freed 16-byte region [ffff0000c5e64a60, ffff0000c5e64a70)
[  194.890844] 
[  194.891625] The buggy address belongs to the physical page:
[  194.893185] page:000000004e539889 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e64
[  194.895027] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  194.896544] page_type: 0xffffffff()
[  194.897994] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  194.899661] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  194.901824] page dumped because: kasan: bad access detected
[  194.903072] 
[  194.903691] Memory state around the buggy address:
[  194.905023]  ffff0000c5e64900: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[  194.906702]  ffff0000c5e64980: 00 00 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[  194.908320] >ffff0000c5e64a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[  194.909992]                                                        ^
[  194.911450]  ffff0000c5e64a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.913288]  ffff0000c5e64b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  194.914892] ==================================================================

test log snippet boot parser 46

Home

[  190.135474] ==================================================================
[  190.137846] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0xc8/0x1d0
[  190.139324] Read of size 1 at addr ffff0000c5e64a48 by task kunit_try_catch/163
[  190.141020] 
[  190.141719] CPU: 1 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  190.143719] Hardware name: linux,dummy-virt (DT)
[  190.144987] Call trace:
[  190.145899]  dump_backtrace+0x9c/0x128
[  190.147140]  show_stack+0x20/0x38
[  190.148293]  dump_stack_lvl+0x60/0xb0
[  190.149889]  print_report+0xf8/0x5d8
[  190.151050]  kasan_report+0xc8/0x118
[  190.152281]  __asan_load1+0x60/0x70
[  190.153542]  kmalloc_uaf+0xc8/0x1d0
[  190.154707]  kunit_try_run_case+0xf8/0x260
[  190.155994]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  190.157649]  kthread+0x18c/0x1a8
[  190.158738]  ret_from_fork+0x10/0x20
[  190.159812] 
[  190.160605] Allocated by task 163:
[  190.161616]  kasan_save_stack+0x3c/0x68
[  190.163010]  kasan_set_track+0x2c/0x40
[  190.164228]  kasan_save_alloc_info+0x24/0x38
[  190.165714]  __kasan_kmalloc+0xd4/0xd8
[  190.167026]  kmalloc_trace+0x68/0x130
[  190.168233]  kmalloc_uaf+0x9c/0x1d0
[  190.169373]  kunit_try_run_case+0xf8/0x260
[  190.170754]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  190.172478]  kthread+0x18c/0x1a8
[  190.173540]  ret_from_fork+0x10/0x20
[  190.174473] 
[  190.175102] Freed by task 163:
[  190.176056]  kasan_save_stack+0x3c/0x68
[  190.177380]  kasan_set_track+0x2c/0x40
[  190.178724]  kasan_save_free_info+0x38/0x60
[  190.180287]  __kasan_slab_free+0x100/0x170
[  190.181839]  __kmem_cache_free+0x170/0x2e0
[  190.183123]  kfree+0x74/0x138
[  190.184051]  kmalloc_uaf+0xb8/0x1d0
[  190.185471]  kunit_try_run_case+0xf8/0x260
[  190.186865]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  190.188356]  kthread+0x18c/0x1a8
[  190.189358]  ret_from_fork+0x10/0x20
[  190.190190] 
[  190.190824] The buggy address belongs to the object at ffff0000c5e64a40
[  190.190824]  which belongs to the cache kmalloc-16 of size 16
[  190.193798] The buggy address is located 8 bytes inside of
[  190.193798]  freed 16-byte region [ffff0000c5e64a40, ffff0000c5e64a50)
[  190.196317] 
[  190.196981] The buggy address belongs to the physical page:
[  190.198251] page:000000004e539889 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e64
[  190.200222] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  190.201351] page_type: 0xffffffff()
[  190.202323] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  190.204107] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  190.205904] page dumped because: kasan: bad access detected
[  190.207164] 
[  190.207795] Memory state around the buggy address:
[  190.209346]  ffff0000c5e64900: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[  190.210905]  ffff0000c5e64980: 00 00 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[  190.212817] >ffff0000c5e64a00: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[  190.214398]                                               ^
[  190.215696]  ffff0000c5e64a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  190.217445]  ffff0000c5e64b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  190.218984] ==================================================================

test log snippet boot parser 47

Home

[  190.357649] ==================================================================
[  190.359519] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x108/0x290
[  190.361652] Read of size 1 at addr ffff0000c60461a8 by task kunit_try_catch/167
[  190.363418] 
[  190.364021] CPU: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  190.366128] Hardware name: linux,dummy-virt (DT)
[  190.367420] Call trace:
[  190.368210]  dump_backtrace+0x9c/0x128
[  190.369543]  show_stack+0x20/0x38
[  190.370569]  dump_stack_lvl+0x60/0xb0
[  190.371932]  print_report+0xf8/0x5d8
[  190.373203]  kasan_report+0xc8/0x118
[  190.374452]  __asan_load1+0x60/0x70
[  190.375594]  kmalloc_uaf2+0x108/0x290
[  190.377148]  kunit_try_run_case+0xf8/0x260
[  190.378636]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  190.380288]  kthread+0x18c/0x1a8
[  190.381631]  ret_from_fork+0x10/0x20
[  190.382756] 
[  190.383294] Allocated by task 167:
[  190.384595]  kasan_save_stack+0x3c/0x68
[  190.385878]  kasan_set_track+0x2c/0x40
[  190.386653]  kasan_save_alloc_info+0x24/0x38
[  190.388373]  __kasan_kmalloc+0xd4/0xd8
[  190.389626]  kmalloc_trace+0x68/0x130
[  190.390893]  kmalloc_uaf2+0xb4/0x290
[  190.392403]  kunit_try_run_case+0xf8/0x260
[  190.393676]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  190.395551]  kthread+0x18c/0x1a8
[  190.396697]  ret_from_fork+0x10/0x20
[  190.398022] 
[  190.398653] Freed by task 167:
[  190.399567]  kasan_save_stack+0x3c/0x68
[  190.400989]  kasan_set_track+0x2c/0x40
[  190.403011]  kasan_save_free_info+0x38/0x60
[  190.404394]  __kasan_slab_free+0x100/0x170
[  190.405916]  __kmem_cache_free+0x170/0x2e0
[  190.407161]  kfree+0x74/0x138
[  190.408174]  kmalloc_uaf2+0xc8/0x290
[  190.409268]  kunit_try_run_case+0xf8/0x260
[  190.410977]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  190.412796]  kthread+0x18c/0x1a8
[  190.413887]  ret_from_fork+0x10/0x20
[  190.415212] 
[  190.415846] The buggy address belongs to the object at ffff0000c6046180
[  190.415846]  which belongs to the cache kmalloc-64 of size 64
[  190.418955] The buggy address is located 40 bytes inside of
[  190.418955]  freed 64-byte region [ffff0000c6046180, ffff0000c60461c0)
[  190.421936] 
[  190.422608] The buggy address belongs to the physical page:
[  190.423861] page:00000000dbdec0ab refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106046
[  190.425866] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  190.427637] page_type: 0xffffffff()
[  190.429488] raw: 0bfffc0000000800 ffff0000c0001640 dead000000000122 0000000000000000
[  190.431020] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[  190.432923] page dumped because: kasan: bad access detected
[  190.434078] 
[  190.434931] Memory state around the buggy address:
[  190.436280]  ffff0000c6046080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[  190.438353]  ffff0000c6046100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  190.439835] >ffff0000c6046180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  190.442468]                                   ^
[  190.443612]  ffff0000c6046200: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[  190.445345]  ffff0000c6046280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  190.447133] ==================================================================

test log snippet boot parser 48

Home

[  190.357649] ==================================================================
[  190.359519] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x108/0x290
[  190.361652] Read of size 1 at addr ffff0000c60461a8 by task kunit_try_catch/167
[  190.363418] 
[  190.364021] CPU: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  190.366128] Hardware name: linux,dummy-virt (DT)
[  190.367420] Call trace:
[  190.368210]  dump_backtrace+0x9c/0x128
[  190.369543]  show_stack+0x20/0x38
[  190.370569]  dump_stack_lvl+0x60/0xb0
[  190.371932]  print_report+0xf8/0x5d8
[  190.373203]  kasan_report+0xc8/0x118
[  190.374452]  __asan_load1+0x60/0x70
[  190.375594]  kmalloc_uaf2+0x108/0x290
[  190.377148]  kunit_try_run_case+0xf8/0x260
[  190.378636]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  190.380288]  kthread+0x18c/0x1a8
[  190.381631]  ret_from_fork+0x10/0x20
[  190.382756] 
[  190.383294] Allocated by task 167:
[  190.384595]  kasan_save_stack+0x3c/0x68
[  190.385878]  kasan_set_track+0x2c/0x40
[  190.386653]  kasan_save_alloc_info+0x24/0x38
[  190.388373]  __kasan_kmalloc+0xd4/0xd8
[  190.389626]  kmalloc_trace+0x68/0x130
[  190.390893]  kmalloc_uaf2+0xb4/0x290
[  190.392403]  kunit_try_run_case+0xf8/0x260
[  190.393676]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  190.395551]  kthread+0x18c/0x1a8
[  190.396697]  ret_from_fork+0x10/0x20
[  190.398022] 
[  190.398653] Freed by task 167:
[  190.399567]  kasan_save_stack+0x3c/0x68
[  190.400989]  kasan_set_track+0x2c/0x40
[  190.403011]  kasan_save_free_info+0x38/0x60
[  190.404394]  __kasan_slab_free+0x100/0x170
[  190.405916]  __kmem_cache_free+0x170/0x2e0
[  190.407161]  kfree+0x74/0x138
[  190.408174]  kmalloc_uaf2+0xc8/0x290
[  190.409268]  kunit_try_run_case+0xf8/0x260
[  190.410977]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  190.412796]  kthread+0x18c/0x1a8
[  190.413887]  ret_from_fork+0x10/0x20
[  190.415212] 
[  190.415846] The buggy address belongs to the object at ffff0000c6046180
[  190.415846]  which belongs to the cache kmalloc-64 of size 64
[  190.418955] The buggy address is located 40 bytes inside of
[  190.418955]  freed 64-byte region [ffff0000c6046180, ffff0000c60461c0)
[  190.421936] 
[  190.422608] The buggy address belongs to the physical page:
[  190.423861] page:00000000dbdec0ab refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106046
[  190.425866] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  190.427637] page_type: 0xffffffff()
[  190.429488] raw: 0bfffc0000000800 ffff0000c0001640 dead000000000122 0000000000000000
[  190.431020] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[  190.432923] page dumped because: kasan: bad access detected
[  190.434078] 
[  190.434931] Memory state around the buggy address:
[  190.436280]  ffff0000c6046080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[  190.438353]  ffff0000c6046100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  190.439835] >ffff0000c6046180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  190.442468]                                   ^
[  190.443612]  ffff0000c6046200: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[  190.445345]  ffff0000c6046280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  190.447133] ==================================================================

test log snippet boot parser 49

Home

[  189.389809] ==================================================================
[  189.391839] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x100/0x258
[  189.393817] Read of size 16 at addr ffff0000c5e64a20 by task kunit_try_catch/147
[  189.395575] 
[  189.396922] CPU: 1 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  189.398927] Hardware name: linux,dummy-virt (DT)
[  189.400045] Call trace:
[  189.401173]  dump_backtrace+0x9c/0x128
[  189.402331]  show_stack+0x20/0x38
[  189.403410]  dump_stack_lvl+0x60/0xb0
[  189.404733]  print_report+0xf8/0x5d8
[  189.405851]  kasan_report+0xc8/0x118
[  189.407090]  __asan_load16+0xa4/0xa8
[  189.408354]  kmalloc_uaf_16+0x100/0x258
[  189.409575]  kunit_try_run_case+0xf8/0x260
[  189.410857]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.412392]  kthread+0x18c/0x1a8
[  189.413399]  ret_from_fork+0x10/0x20
[  189.415298] 
[  189.415910] Allocated by task 147:
[  189.417098]  kasan_save_stack+0x3c/0x68
[  189.418361]  kasan_set_track+0x2c/0x40
[  189.419505]  kasan_save_alloc_info+0x24/0x38
[  189.421019]  __kasan_kmalloc+0xd4/0xd8
[  189.422170]  kmalloc_trace+0x68/0x130
[  189.423399]  kmalloc_uaf_16+0xcc/0x258
[  189.424626]  kunit_try_run_case+0xf8/0x260
[  189.425942]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.427402]  kthread+0x18c/0x1a8
[  189.428551]  ret_from_fork+0x10/0x20
[  189.429805] 
[  189.430389] Freed by task 147:
[  189.431247]  kasan_save_stack+0x3c/0x68
[  189.433088]  kasan_set_track+0x2c/0x40
[  189.434605]  kasan_save_free_info+0x38/0x60
[  189.435921]  __kasan_slab_free+0x100/0x170
[  189.437283]  __kmem_cache_free+0x170/0x2e0
[  189.438522]  kfree+0x74/0x138
[  189.439472]  kmalloc_uaf_16+0xe8/0x258
[  189.440678]  kunit_try_run_case+0xf8/0x260
[  189.442044]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.443629]  kthread+0x18c/0x1a8
[  189.444636]  ret_from_fork+0x10/0x20
[  189.445871] 
[  189.446494] The buggy address belongs to the object at ffff0000c5e64a20
[  189.446494]  which belongs to the cache kmalloc-16 of size 16
[  189.449067] The buggy address is located 0 bytes inside of
[  189.449067]  freed 16-byte region [ffff0000c5e64a20, ffff0000c5e64a30)
[  189.451516] 
[  189.452072] The buggy address belongs to the physical page:
[  189.453306] page:000000004e539889 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e64
[  189.455280] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  189.457023] page_type: 0xffffffff()
[  189.458635] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  189.460140] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  189.462061] page dumped because: kasan: bad access detected
[  189.463332] 
[  189.463998] Memory state around the buggy address:
[  189.465469]  ffff0000c5e64900: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[  189.467131]  ffff0000c5e64980: 00 00 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[  189.469011] >ffff0000c5e64a00: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[  189.470492]                                ^
[  189.471662]  ffff0000c5e64a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.473398]  ffff0000c5e64b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.475057] ==================================================================

test log snippet boot parser 50

Home

[  189.389809] ==================================================================
[  189.391839] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x100/0x258
[  189.393817] Read of size 16 at addr ffff0000c5e64a20 by task kunit_try_catch/147
[  189.395575] 
[  189.396922] CPU: 1 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  189.398927] Hardware name: linux,dummy-virt (DT)
[  189.400045] Call trace:
[  189.401173]  dump_backtrace+0x9c/0x128
[  189.402331]  show_stack+0x20/0x38
[  189.403410]  dump_stack_lvl+0x60/0xb0
[  189.404733]  print_report+0xf8/0x5d8
[  189.405851]  kasan_report+0xc8/0x118
[  189.407090]  __asan_load16+0xa4/0xa8
[  189.408354]  kmalloc_uaf_16+0x100/0x258
[  189.409575]  kunit_try_run_case+0xf8/0x260
[  189.410857]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.412392]  kthread+0x18c/0x1a8
[  189.413399]  ret_from_fork+0x10/0x20
[  189.415298] 
[  189.415910] Allocated by task 147:
[  189.417098]  kasan_save_stack+0x3c/0x68
[  189.418361]  kasan_set_track+0x2c/0x40
[  189.419505]  kasan_save_alloc_info+0x24/0x38
[  189.421019]  __kasan_kmalloc+0xd4/0xd8
[  189.422170]  kmalloc_trace+0x68/0x130
[  189.423399]  kmalloc_uaf_16+0xcc/0x258
[  189.424626]  kunit_try_run_case+0xf8/0x260
[  189.425942]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.427402]  kthread+0x18c/0x1a8
[  189.428551]  ret_from_fork+0x10/0x20
[  189.429805] 
[  189.430389] Freed by task 147:
[  189.431247]  kasan_save_stack+0x3c/0x68
[  189.433088]  kasan_set_track+0x2c/0x40
[  189.434605]  kasan_save_free_info+0x38/0x60
[  189.435921]  __kasan_slab_free+0x100/0x170
[  189.437283]  __kmem_cache_free+0x170/0x2e0
[  189.438522]  kfree+0x74/0x138
[  189.439472]  kmalloc_uaf_16+0xe8/0x258
[  189.440678]  kunit_try_run_case+0xf8/0x260
[  189.442044]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.443629]  kthread+0x18c/0x1a8
[  189.444636]  ret_from_fork+0x10/0x20
[  189.445871] 
[  189.446494] The buggy address belongs to the object at ffff0000c5e64a20
[  189.446494]  which belongs to the cache kmalloc-16 of size 16
[  189.449067] The buggy address is located 0 bytes inside of
[  189.449067]  freed 16-byte region [ffff0000c5e64a20, ffff0000c5e64a30)
[  189.451516] 
[  189.452072] The buggy address belongs to the physical page:
[  189.453306] page:000000004e539889 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e64
[  189.455280] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  189.457023] page_type: 0xffffffff()
[  189.458635] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[  189.460140] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[  189.462061] page dumped because: kasan: bad access detected
[  189.463332] 
[  189.463998] Memory state around the buggy address:
[  189.465469]  ffff0000c5e64900: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[  189.467131]  ffff0000c5e64980: 00 00 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[  189.469011] >ffff0000c5e64a00: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[  189.470492]                                ^
[  189.471662]  ffff0000c5e64a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.473398]  ffff0000c5e64b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.475057] ==================================================================

test log snippet boot parser 51

Home

[  190.246334] ==================================================================
[  190.248497] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0xd0/0x1d8
[  190.250271] Write of size 33 at addr ffff0000c6046000 by task kunit_try_catch/165
[  190.252181] 
[  190.253314] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  190.255081] Hardware name: linux,dummy-virt (DT)
[  190.256315] Call trace:
[  190.256940]  dump_backtrace+0x9c/0x128
[  190.257561]  show_stack+0x20/0x38
[  190.258569]  dump_stack_lvl+0x60/0xb0
[  190.260424]  print_report+0xf8/0x5d8
[  190.261570]  kasan_report+0xc8/0x118
[  190.262681]  kasan_check_range+0xe8/0x190
[  190.264690]  __asan_memset+0x34/0x78
[  190.265573]  kmalloc_uaf_memset+0xd0/0x1d8
[  190.266602]  kunit_try_run_case+0xf8/0x260
[  190.267901]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  190.269375]  kthread+0x18c/0x1a8
[  190.270513]  ret_from_fork+0x10/0x20
[  190.271816] 
[  190.272389] Allocated by task 165:
[  190.273591]  kasan_save_stack+0x3c/0x68
[  190.274906]  kasan_set_track+0x2c/0x40
[  190.276073]  kasan_save_alloc_info+0x24/0x38
[  190.277831]  __kasan_kmalloc+0xd4/0xd8
[  190.279027]  kmalloc_trace+0x68/0x130
[  190.280173]  kmalloc_uaf_memset+0x9c/0x1d8
[  190.281554]  kunit_try_run_case+0xf8/0x260
[  190.282986]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  190.284875]  kthread+0x18c/0x1a8
[  190.285936]  ret_from_fork+0x10/0x20
[  190.287158] 
[  190.287789] Freed by task 165:
[  190.288630]  kasan_save_stack+0x3c/0x68
[  190.290256]  kasan_set_track+0x2c/0x40
[  190.290915]  kasan_save_free_info+0x38/0x60
[  190.291613]  __kasan_slab_free+0x100/0x170
[  190.293169]  __kmem_cache_free+0x170/0x2e0
[  190.294655]  kfree+0x74/0x138
[  190.295681]  kmalloc_uaf_memset+0xb8/0x1d8
[  190.296965]  kunit_try_run_case+0xf8/0x260
[  190.298285]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  190.299133]  kthread+0x18c/0x1a8
[  190.299634]  ret_from_fork+0x10/0x20
[  190.301486] 
[  190.302194] The buggy address belongs to the object at ffff0000c6046000
[  190.302194]  which belongs to the cache kmalloc-64 of size 64
[  190.304467] The buggy address is located 0 bytes inside of
[  190.304467]  freed 64-byte region [ffff0000c6046000, ffff0000c6046040)
[  190.307140] 
[  190.307817] The buggy address belongs to the physical page:
[  190.309264] page:00000000dbdec0ab refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106046
[  190.311374] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  190.313267] page_type: 0xffffffff()
[  190.314481] raw: 0bfffc0000000800 ffff0000c0001640 dead000000000122 0000000000000000
[  190.316123] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[  190.317954] page dumped because: kasan: bad access detected
[  190.319539] 
[  190.320688] Memory state around the buggy address:
[  190.322001]  ffff0000c6045f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  190.323632]  ffff0000c6045f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  190.325379] >ffff0000c6046000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  190.327048]                    ^
[  190.328103]  ffff0000c6046080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  190.329956]  ffff0000c6046100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  190.331468] ==================================================================

test log snippet boot parser 52

Home

[  192.508884] ==================================================================
[  192.511401] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0xd0/0x1b8
[  192.513996] Read of size 1 at addr ffff0000c60bf3c0 by task kunit_try_catch/199
[  192.516296] 
[  192.517572] CPU: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  192.519567] Hardware name: linux,dummy-virt (DT)
[  192.520810] Call trace:
[  192.521747]  dump_backtrace+0x9c/0x128
[  192.523030]  show_stack+0x20/0x38
[  192.524096]  dump_stack_lvl+0x60/0xb0
[  192.525544]  print_report+0xf8/0x5d8
[  192.526988]  kasan_report+0xc8/0x118
[  192.528449]  __kasan_check_byte+0x54/0x70
[  192.529841]  kmem_cache_destroy+0x30/0x178
[  192.530707]  kmem_cache_double_destroy+0xd0/0x1b8
[  192.532126]  kunit_try_run_case+0xf8/0x260
[  192.533456]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  192.535044]  kthread+0x18c/0x1a8
[  192.536079]  ret_from_fork+0x10/0x20
[  192.537234] 
[  192.537811] Allocated by task 199:
[  192.539245]  kasan_save_stack+0x3c/0x68
[  192.540611]  kasan_set_track+0x2c/0x40
[  192.541955]  kasan_save_alloc_info+0x24/0x38
[  192.543336]  __kasan_slab_alloc+0xa8/0xb0
[  192.544887]  kmem_cache_alloc+0x134/0x330
[  192.547577]  kmem_cache_create_usercopy+0x170/0x260
[  192.549011]  kmem_cache_create+0x24/0x38
[  192.550283]  kmem_cache_double_destroy+0xa4/0x1b8
[  192.551561]  kunit_try_run_case+0xf8/0x260
[  192.552944]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  192.554643]  kthread+0x18c/0x1a8
[  192.555686]  ret_from_fork+0x10/0x20
[  192.556971] 
[  192.557598] Freed by task 199:
[  192.558415]  kasan_save_stack+0x3c/0x68
[  192.560274]  kasan_set_track+0x2c/0x40
[  192.561523]  kasan_save_free_info+0x38/0x60
[  192.563336]  __kasan_slab_free+0x100/0x170
[  192.564578]  kmem_cache_free+0x18c/0x3f8
[  192.566006]  slab_kmem_cache_release+0x38/0x50
[  192.567331]  kmem_cache_release+0x1c/0x30
[  192.568521]  kobject_put+0x104/0x2d0
[  192.569706]  sysfs_slab_release+0x30/0x48
[  192.571130]  kmem_cache_destroy+0xd8/0x178
[  192.572456]  kmem_cache_double_destroy+0xc0/0x1b8
[  192.574045]  kunit_try_run_case+0xf8/0x260
[  192.575289]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  192.577040]  kthread+0x18c/0x1a8
[  192.578674]  ret_from_fork+0x10/0x20
[  192.579940] 
[  192.580565] The buggy address belongs to the object at ffff0000c60bf3c0
[  192.580565]  which belongs to the cache kmem_cache of size 208
[  192.583111] The buggy address is located 0 bytes inside of
[  192.583111]  freed 208-byte region [ffff0000c60bf3c0, ffff0000c60bf490)
[  192.585415] 
[  192.586006] The buggy address belongs to the physical page:
[  192.587248] page:00000000e4daeeb8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060bf
[  192.589446] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  192.591072] page_type: 0xffffffff()
[  192.592492] raw: 0bfffc0000000800 ffff0000c0001000 dead000000000122 0000000000000000
[  192.594798] raw: 0000000000000000 00000000800c000c 00000001ffffffff 0000000000000000
[  192.597231] page dumped because: kasan: bad access detected
[  192.598529] 
[  192.599204] Memory state around the buggy address:
[  192.600414]  ffff0000c60bf280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  192.602868]  ffff0000c60bf300: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[  192.604826] >ffff0000c60bf380: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[  192.606419]                                            ^
[  192.607829]  ffff0000c60bf400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  192.609928]  ffff0000c60bf480: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  192.611498] ==================================================================

test log snippet boot parser 53

Home

[  189.174448] ==================================================================
[  189.176144] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x10c/0x2c0
[  189.178425] Read of size 1 at addr ffff0000c3fdfa00 by task kunit_try_catch/143
[  189.180228] 
[  189.180862] CPU: 1 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  189.183376] Hardware name: linux,dummy-virt (DT)
[  189.184640] Call trace:
[  189.185604]  dump_backtrace+0x9c/0x128
[  189.186719]  show_stack+0x20/0x38
[  189.187751]  dump_stack_lvl+0x60/0xb0
[  189.189111]  print_report+0xf8/0x5d8
[  189.190251]  kasan_report+0xc8/0x118
[  189.191484]  __asan_load1+0x60/0x70
[  189.192911]  krealloc_uaf+0x10c/0x2c0
[  189.194067]  kunit_try_run_case+0xf8/0x260
[  189.195280]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.196963]  kthread+0x18c/0x1a8
[  189.197984]  ret_from_fork+0x10/0x20
[  189.199269] 
[  189.199885] Allocated by task 143:
[  189.201175]  kasan_save_stack+0x3c/0x68
[  189.202521]  kasan_set_track+0x2c/0x40
[  189.203896]  kasan_save_alloc_info+0x24/0x38
[  189.205899]  __kasan_kmalloc+0xd4/0xd8
[  189.207279]  kmalloc_trace+0x68/0x130
[  189.209013]  krealloc_uaf+0xb0/0x2c0
[  189.210037]  kunit_try_run_case+0xf8/0x260
[  189.211271]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.212752]  kthread+0x18c/0x1a8
[  189.213934]  ret_from_fork+0x10/0x20
[  189.215209] 
[  189.215841] Freed by task 143:
[  189.216840]  kasan_save_stack+0x3c/0x68
[  189.218182]  kasan_set_track+0x2c/0x40
[  189.219458]  kasan_save_free_info+0x38/0x60
[  189.220876]  __kasan_slab_free+0x100/0x170
[  189.222339]  __kmem_cache_free+0x170/0x2e0
[  189.223727]  kfree+0x74/0x138
[  189.224828]  krealloc_uaf+0xcc/0x2c0
[  189.225908]  kunit_try_run_case+0xf8/0x260
[  189.227357]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.229246]  kthread+0x18c/0x1a8
[  189.230236]  ret_from_fork+0x10/0x20
[  189.231474] 
[  189.232145] The buggy address belongs to the object at ffff0000c3fdfa00
[  189.232145]  which belongs to the cache kmalloc-256 of size 256
[  189.235559] The buggy address is located 0 bytes inside of
[  189.235559]  freed 256-byte region [ffff0000c3fdfa00, ffff0000c3fdfb00)
[  189.238896] 
[  189.239582] The buggy address belongs to the physical page:
[  189.241253] page:00000000b639ff95 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fde
[  189.243205] head:00000000b639ff95 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  189.244909] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  189.246918] page_type: 0xffffffff()
[  189.248699] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000
[  189.250596] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  189.252251] page dumped because: kasan: bad access detected
[  189.253929] 
[  189.254546] Memory state around the buggy address:
[  189.255742]  ffff0000c3fdf900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.257279]  ffff0000c3fdf980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.259170] >ffff0000c3fdfa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  189.261083]                    ^
[  189.261918]  ffff0000c3fdfa80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  189.263605]  ffff0000c3fdfb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.265078] ==================================================================

test log snippet boot parser 54

Home

[  189.075495] ==================================================================
[  189.078222] BUG: KASAN: slab-use-after-free in krealloc_uaf+0xe4/0x2c0
[  189.079740] Read of size 1 at addr ffff0000c3fdfa00 by task kunit_try_catch/143
[  189.081398] 
[  189.082373] CPU: 1 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  189.084909] Hardware name: linux,dummy-virt (DT)
[  189.086294] Call trace:
[  189.087034]  dump_backtrace+0x9c/0x128
[  189.088337]  show_stack+0x20/0x38
[  189.089357]  dump_stack_lvl+0x60/0xb0
[  189.091369]  print_report+0xf8/0x5d8
[  189.092816]  kasan_report+0xc8/0x118
[  189.094141]  __kasan_check_byte+0x54/0x70
[  189.095374]  krealloc+0x48/0x1a0
[  189.096425]  krealloc_uaf+0xe4/0x2c0
[  189.097635]  kunit_try_run_case+0xf8/0x260
[  189.099451]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.101118]  kthread+0x18c/0x1a8
[  189.102199]  ret_from_fork+0x10/0x20
[  189.103271] 
[  189.103865] Allocated by task 143:
[  189.104913]  kasan_save_stack+0x3c/0x68
[  189.106275]  kasan_set_track+0x2c/0x40
[  189.107693]  kasan_save_alloc_info+0x24/0x38
[  189.109252]  __kasan_kmalloc+0xd4/0xd8
[  189.110615]  kmalloc_trace+0x68/0x130
[  189.111760]  krealloc_uaf+0xb0/0x2c0
[  189.113106]  kunit_try_run_case+0xf8/0x260
[  189.114407]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.115869]  kthread+0x18c/0x1a8
[  189.116846]  ret_from_fork+0x10/0x20
[  189.118182] 
[  189.118841] Freed by task 143:
[  189.119697]  kasan_save_stack+0x3c/0x68
[  189.121006]  kasan_set_track+0x2c/0x40
[  189.122496]  kasan_save_free_info+0x38/0x60
[  189.124423]  __kasan_slab_free+0x100/0x170
[  189.126001]  __kmem_cache_free+0x170/0x2e0
[  189.127327]  kfree+0x74/0x138
[  189.128381]  krealloc_uaf+0xcc/0x2c0
[  189.129528]  kunit_try_run_case+0xf8/0x260
[  189.131303]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.133314]  kthread+0x18c/0x1a8
[  189.134335]  ret_from_fork+0x10/0x20
[  189.135436] 
[  189.136024] The buggy address belongs to the object at ffff0000c3fdfa00
[  189.136024]  which belongs to the cache kmalloc-256 of size 256
[  189.138789] The buggy address is located 0 bytes inside of
[  189.138789]  freed 256-byte region [ffff0000c3fdfa00, ffff0000c3fdfb00)
[  189.142287] 
[  189.142888] The buggy address belongs to the physical page:
[  189.144141] page:00000000b639ff95 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fde
[  189.146076] head:00000000b639ff95 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  189.147618] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  189.149439] page_type: 0xffffffff()
[  189.150631] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000
[  189.153313] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  189.155346] page dumped because: kasan: bad access detected
[  189.156764] 
[  189.157480] Memory state around the buggy address:
[  189.158700]  ffff0000c3fdf900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.160458]  ffff0000c3fdf980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.162081] >ffff0000c3fdfa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  189.163888]                    ^
[  189.164945]  ffff0000c3fdfa80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  189.166692]  ffff0000c3fdfb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  189.168306] ==================================================================

test log snippet boot parser 55

Home

[  191.915341] ==================================================================
[  191.917295] BUG: KASAN: slab-use-after-free in ksize_uaf+0xc8/0x2f0
[  191.920008] Read of size 1 at addr ffff0000c6049000 by task kunit_try_catch/193
[  191.922195] 
[  191.923613] CPU: 1 PID: 193 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  191.925868] Hardware name: linux,dummy-virt (DT)
[  191.927031] Call trace:
[  191.927903]  dump_backtrace+0x9c/0x128
[  191.928989]  show_stack+0x20/0x38
[  191.930136]  dump_stack_lvl+0x60/0xb0
[  191.931312]  print_report+0xf8/0x5d8
[  191.932653]  kasan_report+0xc8/0x118
[  191.934082]  __kasan_check_byte+0x54/0x70
[  191.935650]  ksize+0x30/0x88
[  191.936637]  ksize_uaf+0xc8/0x2f0
[  191.937890]  kunit_try_run_case+0xf8/0x260
[  191.939112]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  191.940931]  kthread+0x18c/0x1a8
[  191.942151]  ret_from_fork+0x10/0x20
[  191.943795] 
[  191.944495] Allocated by task 193:
[  191.945482]  kasan_save_stack+0x3c/0x68
[  191.946787]  kasan_set_track+0x2c/0x40
[  191.948856]  kasan_save_alloc_info+0x24/0x38
[  191.950355]  __kasan_kmalloc+0xd4/0xd8
[  191.951572]  kmalloc_trace+0x68/0x130
[  191.952873]  ksize_uaf+0x9c/0x2f0
[  191.953998]  kunit_try_run_case+0xf8/0x260
[  191.955238]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  191.957210]  kthread+0x18c/0x1a8
[  191.958530]  ret_from_fork+0x10/0x20
[  191.959686] 
[  191.960319] Freed by task 193:
[  191.961188]  kasan_save_stack+0x3c/0x68
[  191.962527]  kasan_set_track+0x2c/0x40
[  191.963654]  kasan_save_free_info+0x38/0x60
[  191.965055]  __kasan_slab_free+0x100/0x170
[  191.966933]  __kmem_cache_free+0x170/0x2e0
[  191.968275]  kfree+0x74/0x138
[  191.969724]  ksize_uaf+0xb8/0x2f0
[  191.970739]  kunit_try_run_case+0xf8/0x260
[  191.972019]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  191.973791]  kthread+0x18c/0x1a8
[  191.974793]  ret_from_fork+0x10/0x20
[  191.976435] 
[  191.977309] The buggy address belongs to the object at ffff0000c6049000
[  191.977309]  which belongs to the cache kmalloc-128 of size 128
[  191.979699] The buggy address is located 0 bytes inside of
[  191.979699]  freed 128-byte region [ffff0000c6049000, ffff0000c6049080)
[  191.982017] 
[  191.982592] The buggy address belongs to the physical page:
[  191.983830] page:00000000d79d6910 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106049
[  191.986089] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  191.987591] page_type: 0xffffffff()
[  191.989255] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[  191.991228] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  191.992916] page dumped because: kasan: bad access detected
[  191.994188] 
[  191.994798] Memory state around the buggy address:
[  191.996529]  ffff0000c6048f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  191.998288]  ffff0000c6048f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  192.000035] >ffff0000c6049000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  192.001898]                    ^
[  192.002941]  ffff0000c6049080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  192.004887]  ffff0000c6049100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  192.006352] ==================================================================

test log snippet boot parser 56

Home

[  192.009244] ==================================================================
[  192.010642] BUG: KASAN: slab-use-after-free in ksize_uaf+0xe8/0x2f0
[  192.012085] Read of size 1 at addr ffff0000c6049000 by task kunit_try_catch/193
[  192.015198] 
[  192.015793] CPU: 1 PID: 193 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  192.017827] Hardware name: linux,dummy-virt (DT)
[  192.018973] Call trace:
[  192.019645]  dump_backtrace+0x9c/0x128
[  192.020837]  show_stack+0x20/0x38
[  192.022216]  dump_stack_lvl+0x60/0xb0
[  192.023554]  print_report+0xf8/0x5d8
[  192.024889]  kasan_report+0xc8/0x118
[  192.026144]  __asan_load1+0x60/0x70
[  192.027388]  ksize_uaf+0xe8/0x2f0
[  192.028613]  kunit_try_run_case+0xf8/0x260
[  192.030112]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  192.031921]  kthread+0x18c/0x1a8
[  192.033141]  ret_from_fork+0x10/0x20
[  192.034382] 
[  192.034993] Allocated by task 193:
[  192.035968]  kasan_save_stack+0x3c/0x68
[  192.037392]  kasan_set_track+0x2c/0x40
[  192.038638]  kasan_save_alloc_info+0x24/0x38
[  192.040378]  __kasan_kmalloc+0xd4/0xd8
[  192.041886]  kmalloc_trace+0x68/0x130
[  192.043070]  ksize_uaf+0x9c/0x2f0
[  192.044205]  kunit_try_run_case+0xf8/0x260
[  192.046172]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  192.048182]  kthread+0x18c/0x1a8
[  192.049357]  ret_from_fork+0x10/0x20
[  192.050528] 
[  192.051126] Freed by task 193:
[  192.052701]  kasan_save_stack+0x3c/0x68
[  192.054225]  kasan_set_track+0x2c/0x40
[  192.055433]  kasan_save_free_info+0x38/0x60
[  192.056799]  __kasan_slab_free+0x100/0x170
[  192.058249]  __kmem_cache_free+0x170/0x2e0
[  192.059194]  kfree+0x74/0x138
[  192.060267]  ksize_uaf+0xb8/0x2f0
[  192.061515]  kunit_try_run_case+0xf8/0x260
[  192.063017]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  192.064803]  kthread+0x18c/0x1a8
[  192.065889]  ret_from_fork+0x10/0x20
[  192.067088] 
[  192.067705] The buggy address belongs to the object at ffff0000c6049000
[  192.067705]  which belongs to the cache kmalloc-128 of size 128
[  192.070068] The buggy address is located 0 bytes inside of
[  192.070068]  freed 128-byte region [ffff0000c6049000, ffff0000c6049080)
[  192.072831] 
[  192.073370] The buggy address belongs to the physical page:
[  192.074735] page:00000000d79d6910 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106049
[  192.077269] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  192.078812] page_type: 0xffffffff()
[  192.080021] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[  192.081861] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  192.083453] page dumped because: kasan: bad access detected
[  192.085809] 
[  192.086395] Memory state around the buggy address:
[  192.087708]  ffff0000c6048f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  192.089578]  ffff0000c6048f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  192.091333] >ffff0000c6049000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  192.093150]                    ^
[  192.094054]  ffff0000c6049080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  192.095858]  ffff0000c6049100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  192.097543] ==================================================================

test log snippet boot parser 57

Home

[  192.100885] ==================================================================
[  192.102306] BUG: KASAN: slab-use-after-free in ksize_uaf+0x10c/0x2f0
[  192.103674] Read of size 1 at addr ffff0000c6049078 by task kunit_try_catch/193
[  192.106855] 
[  192.107440] CPU: 1 PID: 193 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  192.110318] Hardware name: linux,dummy-virt (DT)
[  192.111516] Call trace:
[  192.112501]  dump_backtrace+0x9c/0x128
[  192.113878]  show_stack+0x20/0x38
[  192.114957]  dump_stack_lvl+0x60/0xb0
[  192.116208]  print_report+0xf8/0x5d8
[  192.117346]  kasan_report+0xc8/0x118
[  192.118610]  __asan_load1+0x60/0x70
[  192.120555]  ksize_uaf+0x10c/0x2f0
[  192.121599]  kunit_try_run_case+0xf8/0x260
[  192.122877]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  192.124485]  kthread+0x18c/0x1a8
[  192.126232]  ret_from_fork+0x10/0x20
[  192.127440] 
[  192.127750] Allocated by task 193:
[  192.128752]  kasan_save_stack+0x3c/0x68
[  192.130176]  kasan_set_track+0x2c/0x40
[  192.131484]  kasan_save_alloc_info+0x24/0x38
[  192.132854]  __kasan_kmalloc+0xd4/0xd8
[  192.134093]  kmalloc_trace+0x68/0x130
[  192.135646]  ksize_uaf+0x9c/0x2f0
[  192.136875]  kunit_try_run_case+0xf8/0x260
[  192.138332]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  192.139908]  kthread+0x18c/0x1a8
[  192.140982]  ret_from_fork+0x10/0x20
[  192.142266] 
[  192.142930] Freed by task 193:
[  192.143812]  kasan_save_stack+0x3c/0x68
[  192.145480]  kasan_set_track+0x2c/0x40
[  192.146759]  kasan_save_free_info+0x38/0x60
[  192.148158]  __kasan_slab_free+0x100/0x170
[  192.150071]  __kmem_cache_free+0x170/0x2e0
[  192.151624]  kfree+0x74/0x138
[  192.153080]  ksize_uaf+0xb8/0x2f0
[  192.154243]  kunit_try_run_case+0xf8/0x260
[  192.155472]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  192.157209]  kthread+0x18c/0x1a8
[  192.158342]  ret_from_fork+0x10/0x20
[  192.159730] 
[  192.160364] The buggy address belongs to the object at ffff0000c6049000
[  192.160364]  which belongs to the cache kmalloc-128 of size 128
[  192.163108] The buggy address is located 120 bytes inside of
[  192.163108]  freed 128-byte region [ffff0000c6049000, ffff0000c6049080)
[  192.166650] 
[  192.167287] The buggy address belongs to the physical page:
[  192.168718] page:00000000d79d6910 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106049
[  192.170883] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  192.172497] page_type: 0xffffffff()
[  192.173712] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[  192.176443] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  192.178097] page dumped because: kasan: bad access detected
[  192.179102] 
[  192.179716] Memory state around the buggy address:
[  192.181293]  ffff0000c6048f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  192.183034]  ffff0000c6048f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  192.184808] >ffff0000c6049000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  192.186911]                                                                 ^
[  192.188501]  ffff0000c6049080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  192.190598]  ffff0000c6049100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  192.192376] ==================================================================

test log snippet boot parser 58

Home

[  195.064579] ==================================================================
[  195.065754] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x30/0x50
[  195.067231] Read of size 4 at addr ffff0000c5fddc80 by task swapper/0/0
[  195.068706] 
[  195.069384] CPU: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N 6.6.74-rc1 #1
[  195.071094] Hardware name: linux,dummy-virt (DT)
[  195.072279] Call trace:
[  195.072952]  dump_backtrace+0x9c/0x128
[  195.074139]  show_stack+0x20/0x38
[  195.075179]  dump_stack_lvl+0x60/0xb0
[  195.076372]  print_report+0xf8/0x5d8
[  195.077565]  kasan_report+0xc8/0x118
[  195.078738]  __asan_load4+0x9c/0xc0
[  195.079905]  rcu_uaf_reclaim+0x30/0x50
[  195.080984]  rcu_core+0x448/0xf40
[  195.082116]  rcu_core_si+0x18/0x30
[  195.083268]  handle_softirqs+0x240/0x678
[  195.084507]  __do_softirq+0x1c/0x28
[  195.085511]  ____do_softirq+0x18/0x30
[  195.086673]  call_on_irq_stack+0x24/0x58
[  195.087847]  do_softirq_own_stack+0x24/0x38
[  195.089155]  irq_exit_rcu+0x110/0x160
[  195.090294]  el1_interrupt+0x38/0x58
[  195.091343]  el1h_64_irq_handler+0x18/0x28
[  195.092555]  el1h_64_irq+0x64/0x68
[  195.093546]  arch_local_irq_enable+0x4/0x8
[  195.094823]  do_idle+0x304/0x388
[  195.095879]  cpu_startup_entry+0x48/0x58
[  195.096998]  rest_init+0x11c/0x128
[  195.098186]  arch_call_rest_init+0x1c/0x28
[  195.099405]  start_kernel+0x2cc/0x390
[  195.100560]  __primary_switched+0xc0/0xd0
[  195.101751] 
[  195.102319] Allocated by task 213:
[  195.103248]  kasan_save_stack+0x3c/0x68
[  195.104499]  kasan_set_track+0x2c/0x40
[  195.105680]  kasan_save_alloc_info+0x24/0x38
[  195.106941]  __kasan_kmalloc+0xd4/0xd8
[  195.108180]  kmalloc_trace+0x68/0x130
[  195.109305]  rcu_uaf+0x9c/0x1e0
[  195.110386]  kunit_try_run_case+0xf8/0x260
[  195.111600]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  195.113035]  kthread+0x18c/0x1a8
[  195.114006]  ret_from_fork+0x10/0x20
[  195.115170] 
[  195.115798] Freed by task 0:
[  195.116553]  kasan_save_stack+0x3c/0x68
[  195.117817]  kasan_set_track+0x2c/0x40
[  195.119005]  kasan_save_free_info+0x38/0x60
[  195.120403]  __kasan_slab_free+0x100/0x170
[  195.121645]  __kmem_cache_free+0x170/0x2e0
[  195.122930]  kfree+0x74/0x138
[  195.123930]  rcu_uaf_reclaim+0x28/0x50
[  195.125019]  rcu_core+0x448/0xf40
[  195.126246]  rcu_core_si+0x18/0x30
[  195.127400]  handle_softirqs+0x240/0x678
[  195.128568]  __do_softirq+0x1c/0x28
[  195.129645] 
[  195.130308] Last potentially related work creation:
[  195.131478]  kasan_save_stack+0x3c/0x68
[  195.132614]  __kasan_record_aux_stack+0xb8/0xe8
[  195.134068]  kasan_record_aux_stack_noalloc+0x14/0x20
[  195.135521]  __call_rcu_common.constprop.0+0x58/0x598
[  195.136989]  call_rcu+0x18/0x30
[  195.138075]  rcu_uaf+0xd4/0x1e0
[  195.139101]  kunit_try_run_case+0xf8/0x260
[  195.140329]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  195.141897]  kthread+0x18c/0x1a8
[  195.142939]  ret_from_fork+0x10/0x20
[  195.144078] 
[  195.144713] The buggy address belongs to the object at ffff0000c5fddc80
[  195.144713]  which belongs to the cache kmalloc-32 of size 32
[  195.147170] The buggy address is located 0 bytes inside of
[  195.147170]  freed 32-byte region [ffff0000c5fddc80, ffff0000c5fddca0)
[  195.148705] 
[  195.149196] The buggy address belongs to the physical page:
[  195.150860] page:00000000e655aac2 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fdd
[  195.152862] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  195.154399] page_type: 0xffffffff()
[  195.155531] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[  195.157389] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[  195.158960] page dumped because: kasan: bad access detected
[  195.160258] 
[  195.160859] Memory state around the buggy address:
[  195.162107]  ffff0000c5fddb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  195.163788]  ffff0000c5fddc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  195.165347] >ffff0000c5fddc80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[  195.166984]                    ^
[  195.167948]  ffff0000c5fddd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  195.169492]  ffff0000c5fddd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  195.171130] ==================================================================

test log snippet boot parser 59

Home

[  192.833558] ==================================================================
[  192.835639] BUG: KASAN: slab-use-after-free in strchr+0x20/0x80
[  192.837091] Read of size 1 at addr ffff0000c5f2cb90 by task kunit_try_catch/205
[  192.838646] 
[  192.839319] CPU: 1 PID: 205 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  192.841441] Hardware name: linux,dummy-virt (DT)
[  192.842498] Call trace:
[  192.843690]  dump_backtrace+0x9c/0x128
[  192.844963]  show_stack+0x20/0x38
[  192.845994]  dump_stack_lvl+0x60/0xb0
[  192.847449]  print_report+0xf8/0x5d8
[  192.848939]  kasan_report+0xc8/0x118
[  192.850140]  __asan_load1+0x60/0x70
[  192.851310]  strchr+0x20/0x80
[  192.852327]  kasan_strings+0xdc/0x478
[  192.853546]  kunit_try_run_case+0xf8/0x260
[  192.854762]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  192.857068]  kthread+0x18c/0x1a8
[  192.858500]  ret_from_fork+0x10/0x20
[  192.859619] 
[  192.860265] Allocated by task 205:
[  192.861454]  kasan_save_stack+0x3c/0x68
[  192.862619]  kasan_set_track+0x2c/0x40
[  192.863817]  kasan_save_alloc_info+0x24/0x38
[  192.865329]  __kasan_kmalloc+0xd4/0xd8
[  192.866523]  kmalloc_trace+0x68/0x130
[  192.867608]  kasan_strings+0xa0/0x478
[  192.868921]  kunit_try_run_case+0xf8/0x260
[  192.870207]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  192.871636]  kthread+0x18c/0x1a8
[  192.872939]  ret_from_fork+0x10/0x20
[  192.874042] 
[  192.874579] Freed by task 205:
[  192.875443]  kasan_save_stack+0x3c/0x68
[  192.876877]  kasan_set_track+0x2c/0x40
[  192.878142]  kasan_save_free_info+0x38/0x60
[  192.879581]  __kasan_slab_free+0x100/0x170
[  192.881024]  __kmem_cache_free+0x170/0x2e0
[  192.882293]  kfree+0x74/0x138
[  192.883293]  kasan_strings+0xbc/0x478
[  192.884369]  kunit_try_run_case+0xf8/0x260
[  192.885343]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  192.886908]  kthread+0x18c/0x1a8
[  192.887950]  ret_from_fork+0x10/0x20
[  192.889043] 
[  192.889595] The buggy address belongs to the object at ffff0000c5f2cb80
[  192.889595]  which belongs to the cache kmalloc-32 of size 32
[  192.891970] The buggy address is located 16 bytes inside of
[  192.891970]  freed 32-byte region [ffff0000c5f2cb80, ffff0000c5f2cba0)
[  192.894500] 
[  192.895135] The buggy address belongs to the physical page:
[  192.896389] page:00000000e427c865 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f2c
[  192.899079] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  192.900736] page_type: 0xffffffff()
[  192.902124] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[  192.903695] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[  192.905459] page dumped because: kasan: bad access detected
[  192.906662] 
[  192.907323] Memory state around the buggy address:
[  192.908717]  ffff0000c5f2ca80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  192.910374]  ffff0000c5f2cb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  192.911974] >ffff0000c5f2cb80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[  192.913734]                          ^
[  192.914840]  ffff0000c5f2cc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  192.916470]  ffff0000c5f2cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  192.919146] ==================================================================

test log snippet boot parser 60

Home

[  193.011940] ==================================================================
[  193.013532] BUG: KASAN: slab-use-after-free in strcmp+0x2c/0x78
[  193.015015] Read of size 1 at addr ffff0000c5f2cb90 by task kunit_try_catch/205
[  193.016476] 
[  193.017629] CPU: 1 PID: 205 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  193.019409] Hardware name: linux,dummy-virt (DT)
[  193.020735] Call trace:
[  193.021457]  dump_backtrace+0x9c/0x128
[  193.022590]  show_stack+0x20/0x38
[  193.023614]  dump_stack_lvl+0x60/0xb0
[  193.024851]  print_report+0xf8/0x5d8
[  193.026118]  kasan_report+0xc8/0x118
[  193.027426]  __asan_load1+0x60/0x70
[  193.028829]  strcmp+0x2c/0x78
[  193.029795]  kasan_strings+0x12c/0x478
[  193.030982]  kunit_try_run_case+0xf8/0x260
[  193.032231]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  193.034737]  kthread+0x18c/0x1a8
[  193.035574]  ret_from_fork+0x10/0x20
[  193.037000] 
[  193.037590] Allocated by task 205:
[  193.038494]  kasan_save_stack+0x3c/0x68
[  193.039755]  kasan_set_track+0x2c/0x40
[  193.041232]  kasan_save_alloc_info+0x24/0x38
[  193.042551]  __kasan_kmalloc+0xd4/0xd8
[  193.043657]  kmalloc_trace+0x68/0x130
[  193.044849]  kasan_strings+0xa0/0x478
[  193.046067]  kunit_try_run_case+0xf8/0x260
[  193.047326]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  193.048952]  kthread+0x18c/0x1a8
[  193.049974]  ret_from_fork+0x10/0x20
[  193.051112] 
[  193.051696] Freed by task 205:
[  193.052594]  kasan_save_stack+0x3c/0x68
[  193.053937]  kasan_set_track+0x2c/0x40
[  193.055750]  kasan_save_free_info+0x38/0x60
[  193.057788]  __kasan_slab_free+0x100/0x170
[  193.059277]  __kmem_cache_free+0x170/0x2e0
[  193.060752]  kfree+0x74/0x138
[  193.061715]  kasan_strings+0xbc/0x478
[  193.062841]  kunit_try_run_case+0xf8/0x260
[  193.064509]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  193.066023]  kthread+0x18c/0x1a8
[  193.066991]  ret_from_fork+0x10/0x20
[  193.068123] 
[  193.068710] The buggy address belongs to the object at ffff0000c5f2cb80
[  193.068710]  which belongs to the cache kmalloc-32 of size 32
[  193.070955] The buggy address is located 16 bytes inside of
[  193.070955]  freed 32-byte region [ffff0000c5f2cb80, ffff0000c5f2cba0)
[  193.073271] 
[  193.074083] The buggy address belongs to the physical page:
[  193.075395] page:00000000e427c865 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f2c
[  193.078357] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  193.080069] page_type: 0xffffffff()
[  193.081021] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[  193.082443] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[  193.084208] page dumped because: kasan: bad access detected
[  193.085310] 
[  193.085939] Memory state around the buggy address:
[  193.087189]  ffff0000c5f2ca80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  193.089337]  ffff0000c5f2cb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  193.090893] >ffff0000c5f2cb80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[  193.092252]                          ^
[  193.093209]  ffff0000c5f2cc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  193.095587]  ffff0000c5f2cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  193.097360] ==================================================================

test log snippet boot parser 61

Home

[  193.183473] ==================================================================
[  193.184850] BUG: KASAN: slab-use-after-free in strlen+0x18/0x68
[  193.186213] Read of size 1 at addr ffff0000c5f2cb90 by task kunit_try_catch/205
[  193.188148] 
[  193.188815] CPU: 1 PID: 205 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  193.190516] Hardware name: linux,dummy-virt (DT)
[  193.191665] Call trace:
[  193.192372]  dump_backtrace+0x9c/0x128
[  193.193516]  show_stack+0x20/0x38
[  193.194490]  dump_stack_lvl+0x60/0xb0
[  193.195729]  print_report+0xf8/0x5d8
[  193.196905]  kasan_report+0xc8/0x118
[  193.198028]  __asan_load1+0x60/0x70
[  193.199211]  strlen+0x18/0x68
[  193.200215]  kasan_strings+0x17c/0x478
[  193.201290]  kunit_try_run_case+0xf8/0x260
[  193.202505]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  193.204015]  kthread+0x18c/0x1a8
[  193.205027]  ret_from_fork+0x10/0x20
[  193.206141] 
[  193.206734] Allocated by task 205:
[  193.207640]  kasan_save_stack+0x3c/0x68
[  193.208893]  kasan_set_track+0x2c/0x40
[  193.210016]  kasan_save_alloc_info+0x24/0x38
[  193.211386]  __kasan_kmalloc+0xd4/0xd8
[  193.212479]  kmalloc_trace+0x68/0x130
[  193.213634]  kasan_strings+0xa0/0x478
[  193.214720]  kunit_try_run_case+0xf8/0x260
[  193.215957]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  193.218104]  kthread+0x18c/0x1a8
[  193.219066]  ret_from_fork+0x10/0x20
[  193.220275] 
[  193.220914] Freed by task 205:
[  193.221701]  kasan_save_stack+0x3c/0x68
[  193.222996]  kasan_set_track+0x2c/0x40
[  193.224115]  kasan_save_free_info+0x38/0x60
[  193.225445]  __kasan_slab_free+0x100/0x170
[  193.226726]  __kmem_cache_free+0x170/0x2e0
[  193.227964]  kfree+0x74/0x138
[  193.228949]  kasan_strings+0xbc/0x478
[  193.230052]  kunit_try_run_case+0xf8/0x260
[  193.231241]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  193.232814]  kthread+0x18c/0x1a8
[  193.233814]  ret_from_fork+0x10/0x20
[  193.234876] 
[  193.235440] The buggy address belongs to the object at ffff0000c5f2cb80
[  193.235440]  which belongs to the cache kmalloc-32 of size 32
[  193.237811] The buggy address is located 16 bytes inside of
[  193.237811]  freed 32-byte region [ffff0000c5f2cb80, ffff0000c5f2cba0)
[  193.240098] 
[  193.240719] The buggy address belongs to the physical page:
[  193.242025] page:00000000e427c865 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f2c
[  193.243923] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  193.245447] page_type: 0xffffffff()
[  193.246609] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[  193.248347] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[  193.249925] page dumped because: kasan: bad access detected
[  193.251192] 
[  193.251745] Memory state around the buggy address:
[  193.253029]  ffff0000c5f2ca80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  193.254640]  ffff0000c5f2cb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  193.256212] >ffff0000c5f2cb80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[  193.257710]                          ^
[  193.258730]  ffff0000c5f2cc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  193.260921]  ffff0000c5f2cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  193.263098] ==================================================================

test log snippet boot parser 62

Home

[  193.265869] ==================================================================
[  193.267455] BUG: KASAN: slab-use-after-free in strnlen+0x3c/0x68
[  193.269078] Read of size 1 at addr ffff0000c5f2cb90 by task kunit_try_catch/205
[  193.270889] 
[  193.271464] CPU: 1 PID: 205 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  193.273315] Hardware name: linux,dummy-virt (DT)
[  193.274457] Call trace:
[  193.275271]  dump_backtrace+0x9c/0x128
[  193.276393]  show_stack+0x20/0x38
[  193.277439]  dump_stack_lvl+0x60/0xb0
[  193.278619]  print_report+0xf8/0x5d8
[  193.279782]  kasan_report+0xc8/0x118
[  193.281005]  __asan_load1+0x60/0x70
[  193.282169]  strnlen+0x3c/0x68
[  193.283162]  kasan_strings+0x1a4/0x478
[  193.284349]  kunit_try_run_case+0xf8/0x260
[  193.285577]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  193.287048]  kthread+0x18c/0x1a8
[  193.288071]  ret_from_fork+0x10/0x20
[  193.289212] 
[  193.289748] Allocated by task 205:
[  193.290755]  kasan_save_stack+0x3c/0x68
[  193.291957]  kasan_set_track+0x2c/0x40
[  193.293122]  kasan_save_alloc_info+0x24/0x38
[  193.294401]  __kasan_kmalloc+0xd4/0xd8
[  193.295581]  kmalloc_trace+0x68/0x130
[  193.296676]  kasan_strings+0xa0/0x478
[  193.297831]  kunit_try_run_case+0xf8/0x260
[  193.299079]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  193.300501]  kthread+0x18c/0x1a8
[  193.301542]  ret_from_fork+0x10/0x20
[  193.302709] 
[  193.303312] Freed by task 205:
[  193.304238]  kasan_save_stack+0x3c/0x68
[  193.305441]  kasan_set_track+0x2c/0x40
[  193.306675]  kasan_save_free_info+0x38/0x60
[  193.307866]  __kasan_slab_free+0x100/0x170
[  193.309174]  __kmem_cache_free+0x170/0x2e0
[  193.310387]  kfree+0x74/0x138
[  193.311350]  kasan_strings+0xbc/0x478
[  193.312473]  kunit_try_run_case+0xf8/0x260
[  193.313748]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  193.315271]  kthread+0x18c/0x1a8
[  193.316308]  ret_from_fork+0x10/0x20
[  193.317371] 
[  193.317953] The buggy address belongs to the object at ffff0000c5f2cb80
[  193.317953]  which belongs to the cache kmalloc-32 of size 32
[  193.320378] The buggy address is located 16 bytes inside of
[  193.320378]  freed 32-byte region [ffff0000c5f2cb80, ffff0000c5f2cba0)
[  193.322692] 
[  193.323347] The buggy address belongs to the physical page:
[  193.324627] page:00000000e427c865 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f2c
[  193.326525] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  193.328251] page_type: 0xffffffff()
[  193.329357] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[  193.331041] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[  193.332542] page dumped because: kasan: bad access detected
[  193.333838] 
[  193.334410] Memory state around the buggy address:
[  193.335633]  ffff0000c5f2ca80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  193.337330]  ffff0000c5f2cb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  193.338925] >ffff0000c5f2cb80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[  193.340455]                          ^
[  193.341490]  ffff0000c5f2cc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  193.343112]  ffff0000c5f2cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  193.344594] ==================================================================

test log snippet boot parser 63

Home

[  192.922728] ==================================================================
[  192.924180] BUG: KASAN: slab-use-after-free in strrchr+0x28/0x58
[  192.925744] Read of size 1 at addr ffff0000c5f2cb90 by task kunit_try_catch/205
[  192.927650] 
[  192.928321] CPU: 1 PID: 205 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  192.930736] Hardware name: linux,dummy-virt (DT)
[  192.931851] Call trace:
[  192.932937]  dump_backtrace+0x9c/0x128
[  192.934009]  show_stack+0x20/0x38
[  192.935096]  dump_stack_lvl+0x60/0xb0
[  192.936545]  print_report+0xf8/0x5d8
[  192.937719]  kasan_report+0xc8/0x118
[  192.938843]  __asan_load1+0x60/0x70
[  192.940457]  strrchr+0x28/0x58
[  192.941296]  kasan_strings+0x104/0x478
[  192.942428]  kunit_try_run_case+0xf8/0x260
[  192.943627]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  192.945160]  kthread+0x18c/0x1a8
[  192.946151]  ret_from_fork+0x10/0x20
[  192.947307] 
[  192.947897] Allocated by task 205:
[  192.948859]  kasan_save_stack+0x3c/0x68
[  192.950173]  kasan_set_track+0x2c/0x40
[  192.951526]  kasan_save_alloc_info+0x24/0x38
[  192.953001]  __kasan_kmalloc+0xd4/0xd8
[  192.954321]  kmalloc_trace+0x68/0x130
[  192.955528]  kasan_strings+0xa0/0x478
[  192.956791]  kunit_try_run_case+0xf8/0x260
[  192.958952]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  192.960787]  kthread+0x18c/0x1a8
[  192.961748]  ret_from_fork+0x10/0x20
[  192.962831] 
[  192.963399] Freed by task 205:
[  192.964302]  kasan_save_stack+0x3c/0x68
[  192.965806]  kasan_set_track+0x2c/0x40
[  192.967317]  kasan_save_free_info+0x38/0x60
[  192.969087]  __kasan_slab_free+0x100/0x170
[  192.970274]  __kmem_cache_free+0x170/0x2e0
[  192.971457]  kfree+0x74/0x138
[  192.972495]  kasan_strings+0xbc/0x478
[  192.973754]  kunit_try_run_case+0xf8/0x260
[  192.975111]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  192.976646]  kthread+0x18c/0x1a8
[  192.977620]  ret_from_fork+0x10/0x20
[  192.978807] 
[  192.979386] The buggy address belongs to the object at ffff0000c5f2cb80
[  192.979386]  which belongs to the cache kmalloc-32 of size 32
[  192.981968] The buggy address is located 16 bytes inside of
[  192.981968]  freed 32-byte region [ffff0000c5f2cb80, ffff0000c5f2cba0)
[  192.984836] 
[  192.985649] The buggy address belongs to the physical page:
[  192.986873] page:00000000e427c865 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f2c
[  192.989421] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  192.990984] page_type: 0xffffffff()
[  192.992108] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[  192.993954] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[  192.995520] page dumped because: kasan: bad access detected
[  192.996904] 
[  192.997433] Memory state around the buggy address:
[  192.999095]  ffff0000c5f2ca80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  193.000630]  ffff0000c5f2cb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  193.002520] >ffff0000c5f2cb80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[  193.003959]                          ^
[  193.005249]  ffff0000c5f2cc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  193.007205]  ffff0000c5f2cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  193.009221] ==================================================================

test log snippet boot parser 64

Home

[  195.214906] ==================================================================
[  195.217672] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x14c/0x270
[  195.220728] Read of size 8 at addr ffff0000c5f2ce00 by task kunit_try_catch/215
[  195.222439] 
[  195.223064] CPU: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  195.225398] Hardware name: linux,dummy-virt (DT)
[  195.226603] Call trace:
[  195.227448]  dump_backtrace+0x9c/0x128
[  195.228453]  show_stack+0x20/0x38
[  195.229673]  dump_stack_lvl+0x60/0xb0
[  195.230913]  print_report+0xf8/0x5d8
[  195.232089]  kasan_report+0xc8/0x118
[  195.233343]  __asan_load8+0x9c/0xc0
[  195.234593]  workqueue_uaf+0x14c/0x270
[  195.235734]  kunit_try_run_case+0xf8/0x260
[  195.237192]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  195.239146]  kthread+0x18c/0x1a8
[  195.240442]  ret_from_fork+0x10/0x20
[  195.241539] 
[  195.242137] Allocated by task 215:
[  195.243045]  kasan_save_stack+0x3c/0x68
[  195.244601]  kasan_set_track+0x2c/0x40
[  195.245850]  kasan_save_alloc_info+0x24/0x38
[  195.247149]  __kasan_kmalloc+0xd4/0xd8
[  195.248545]  kmalloc_trace+0x68/0x130
[  195.249654]  workqueue_uaf+0xd0/0x270
[  195.250871]  kunit_try_run_case+0xf8/0x260
[  195.252146]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  195.253814]  kthread+0x18c/0x1a8
[  195.254760]  ret_from_fork+0x10/0x20
[  195.255990] 
[  195.256600] Freed by task 28:
[  195.257496]  kasan_save_stack+0x3c/0x68
[  195.258891]  kasan_set_track+0x2c/0x40
[  195.260139]  kasan_save_free_info+0x38/0x60
[  195.261722]  __kasan_slab_free+0x100/0x170
[  195.263182]  __kmem_cache_free+0x170/0x2e0
[  195.264632]  kfree+0x74/0x138
[  195.265705]  workqueue_uaf_work+0x18/0x30
[  195.266901]  process_one_work+0x2a8/0x6d0
[  195.268456]  worker_thread+0x53c/0x708
[  195.269693]  kthread+0x18c/0x1a8
[  195.270891]  ret_from_fork+0x10/0x20
[  195.272012] 
[  195.272589] Last potentially related work creation:
[  195.273716]  kasan_save_stack+0x3c/0x68
[  195.275059]  __kasan_record_aux_stack+0xb8/0xe8
[  195.276493]  kasan_record_aux_stack_noalloc+0x14/0x20
[  195.278038]  __queue_work+0x260/0x800
[  195.279315]  queue_work_on+0xb4/0xf0
[  195.280620]  workqueue_uaf+0x12c/0x270
[  195.281864]  kunit_try_run_case+0xf8/0x260
[  195.283513]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  195.285261]  kthread+0x18c/0x1a8
[  195.286283]  ret_from_fork+0x10/0x20
[  195.287377] 
[  195.288022] The buggy address belongs to the object at ffff0000c5f2ce00
[  195.288022]  which belongs to the cache kmalloc-32 of size 32
[  195.290547] The buggy address is located 0 bytes inside of
[  195.290547]  freed 32-byte region [ffff0000c5f2ce00, ffff0000c5f2ce20)
[  195.293168] 
[  195.293621] The buggy address belongs to the physical page:
[  195.295045] page:00000000e427c865 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f2c
[  195.297031] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  195.300381] page_type: 0xffffffff()
[  195.301374] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[  195.303003] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[  195.304763] page dumped because: kasan: bad access detected
[  195.306039] 
[  195.306671] Memory state around the buggy address:
[  195.307901]  ffff0000c5f2cd00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[  195.309641]  ffff0000c5f2cd80: 00 00 07 fc fc fc fc fc 00 00 00 07 fc fc fc fc
[  195.311334] >ffff0000c5f2ce00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[  195.312907]                    ^
[  195.314277]  ffff0000c5f2ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  195.315817]  ffff0000c5f2cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  195.318802] ==================================================================

test log snippet boot parser 65

Home

[  191.410903] ==================================================================
[  191.414019] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0xbc/0x180
[  191.415521] Read of size 1 at addr ffff800080877cfa by task kunit_try_catch/185
[  191.417583] 
[  191.418219] CPU: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  191.420438] Hardware name: linux,dummy-virt (DT)
[  191.421370] Call trace:
[  191.422096]  dump_backtrace+0x9c/0x128
[  191.423255]  show_stack+0x20/0x38
[  191.424423]  dump_stack_lvl+0x60/0xb0
[  191.425632]  print_report+0x314/0x5d8
[  191.426811]  kasan_report+0xc8/0x118
[  191.428243]  __asan_load1+0x60/0x70
[  191.429412]  kasan_stack_oob+0xbc/0x180
[  191.430557]  kunit_try_run_case+0xf8/0x260
[  191.431793]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  191.433375]  kthread+0x18c/0x1a8
[  191.434469]  ret_from_fork+0x10/0x20
[  191.435761] 
[  191.436602] The buggy address belongs to stack of task kunit_try_catch/185
[  191.438732]  and is located at offset 138 in frame:
[  191.439792]  kasan_stack_oob+0x0/0x180
[  191.441189] 
[  191.441847] This frame has 4 objects:
[  191.442903]  [48, 49) '__assertion'
[  191.443275]  [64, 72) 'array'
[  191.444206]  [96, 112) '__assertion'
[  191.445302]  [128, 138) 'stack_array'
[  191.446392] 
[  191.447726] The buggy address belongs to the virtual mapping at
[  191.447726]  [ffff800080870000, ffff800080879000) created by:
[  191.447726]  kernel_clone+0xf8/0x540
[  191.450732] 
[  191.451380] The buggy address belongs to the physical page:
[  191.452827] page:00000000077af11d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060a5
[  191.454763] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  191.456359] page_type: 0xffffffff()
[  191.457755] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[  191.460733] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  191.462548] page dumped because: kasan: bad access detected
[  191.463815] 
[  191.464646] Memory state around the buggy address:
[  191.465850]  ffff800080877b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  191.467542]  ffff800080877c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1
[  191.469355] >ffff800080877c80: f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00 02
[  191.470806]                                                                 ^
[  191.472886]  ffff800080877d00: f3 f3 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1
[  191.474493]  ffff800080877d80: 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00
[  191.476243] ==================================================================

test log snippet boot parser 66

Home

[  188.022616] ==================================================================
[  188.024802] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0xac/0x1b0
[  188.026472] Read of size 1 at addr ffff0000c5ee0000 by task kunit_try_catch/125
[  188.029365] 
[  188.030059] CPU: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  188.032103] Hardware name: linux,dummy-virt (DT)
[  188.033327] Call trace:
[  188.034576]  dump_backtrace+0x9c/0x128
[  188.035617]  show_stack+0x20/0x38
[  188.036707]  dump_stack_lvl+0x60/0xb0
[  188.038169]  print_report+0xf8/0x5d8
[  188.039335]  kasan_report+0xc8/0x118
[  188.040708]  __asan_load1+0x60/0x70
[  188.041829]  kmalloc_pagealloc_uaf+0xac/0x1b0
[  188.043043]  kunit_try_run_case+0xf8/0x260
[  188.044326]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  188.046083]  kthread+0x18c/0x1a8
[  188.047080]  ret_from_fork+0x10/0x20
[  188.048568] 
[  188.049466] The buggy address belongs to the physical page:
[  188.050897] page:0000000082de2537 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ee0
[  188.052808] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  188.054319] page_type: 0xffffffff()
[  188.055444] raw: 0bfffc0000000000 fffffc000317b908 ffff0000daa134f8 0000000000000000
[  188.057173] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[  188.058762] page dumped because: kasan: bad access detected
[  188.060001] 
[  188.060900] Memory state around the buggy address:
[  188.062105]  ffff0000c5edff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.063656]  ffff0000c5edff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  188.065379] >ffff0000c5ee0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  188.066728]                    ^
[  188.067652]  ffff0000c5ee0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  188.069426]  ffff0000c5ee0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  188.071320] ==================================================================

test log snippet boot parser 67

Home

[  188.190545] ==================================================================
[  188.192971] BUG: KASAN: use-after-free in pagealloc_uaf+0xd4/0x1e8
[  188.194319] Read of size 1 at addr ffff0000c6070000 by task kunit_try_catch/131
[  188.195941] 
[  188.196836] CPU: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  188.198947] Hardware name: linux,dummy-virt (DT)
[  188.200179] Call trace:
[  188.201415]  dump_backtrace+0x9c/0x128
[  188.202630]  show_stack+0x20/0x38
[  188.203663]  dump_stack_lvl+0x60/0xb0
[  188.205263]  print_report+0xf8/0x5d8
[  188.206489]  kasan_report+0xc8/0x118
[  188.207668]  __asan_load1+0x60/0x70
[  188.208831]  pagealloc_uaf+0xd4/0x1e8
[  188.210101]  kunit_try_run_case+0xf8/0x260
[  188.211363]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  188.213257]  kthread+0x18c/0x1a8
[  188.214220]  ret_from_fork+0x10/0x20
[  188.215331] 
[  188.215905] The buggy address belongs to the physical page:
[  188.217172] page:0000000011234266 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106070
[  188.219304] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  188.220921] page_type: 0xffffff7f(buddy)
[  188.222232] raw: 0bfffc0000000000 ffff0000ff5fc960 ffff0000ff5fc960 0000000000000000
[  188.223893] raw: 0000000000000000 0000000000000004 00000000ffffff7f 0000000000000000
[  188.225357] page dumped because: kasan: bad access detected
[  188.226557] 
[  188.227118] Memory state around the buggy address:
[  188.228384]  ffff0000c606ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  188.230110]  ffff0000c606ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  188.231719] >ffff0000c6070000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  188.233473]                    ^
[  188.234413]  ffff0000c6070080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  188.236714]  ffff0000c6070100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  188.238080] ==================================================================

test log snippet boot parser 68

Home

[  195.420509] ==================================================================
[  195.422202] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xec/0x320
[  195.424140] Read of size 1 at addr ffff8000800fd7f8 by task kunit_try_catch/220
[  195.425746] 
[  195.426465] CPU: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  195.428695] Hardware name: linux,dummy-virt (DT)
[  195.430271] Call trace:
[  195.431658]  dump_backtrace+0x9c/0x128
[  195.432850]  show_stack+0x20/0x38
[  195.434092]  dump_stack_lvl+0x60/0xb0
[  195.435515]  print_report+0x314/0x5d8
[  195.436918]  kasan_report+0xc8/0x118
[  195.438081]  __asan_load1+0x60/0x70
[  195.439170]  vmalloc_oob+0xec/0x320
[  195.440286]  kunit_try_run_case+0xf8/0x260
[  195.441852]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  195.443522]  kthread+0x18c/0x1a8
[  195.444998]  ret_from_fork+0x10/0x20
[  195.446300] 
[  195.447013] The buggy address belongs to the virtual mapping at
[  195.447013]  [ffff8000800fd000, ffff8000800ff000) created by:
[  195.447013]  vmalloc_oob+0x88/0x320
[  195.450670] 
[  195.451364] The buggy address belongs to the physical page:
[  195.452689] page:00000000a572b734 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10604d
[  195.454587] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  195.456265] page_type: 0xffffffff()
[  195.457733] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[  195.459452] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  195.462133] page dumped because: kasan: bad access detected
[  195.463457] 
[  195.464117] Memory state around the buggy address:
[  195.465965]  ffff8000800fd680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  195.467555]  ffff8000800fd700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  195.469829] >ffff8000800fd780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[  195.471557]                                                                 ^
[  195.473128]  ffff8000800fd800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  195.475253]  ffff8000800fd880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  195.476827] ==================================================================

test log snippet boot parser 69

Home

[  195.363246] ==================================================================
[  195.365803] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xc8/0x320
[  195.367480] Read of size 1 at addr ffff8000800fd7f3 by task kunit_try_catch/220
[  195.369155] 
[  195.369847] CPU: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  195.371912] Hardware name: linux,dummy-virt (DT)
[  195.373183] Call trace:
[  195.374054]  dump_backtrace+0x9c/0x128
[  195.375321]  show_stack+0x20/0x38
[  195.376501]  dump_stack_lvl+0x60/0xb0
[  195.377891]  print_report+0x314/0x5d8
[  195.379037]  kasan_report+0xc8/0x118
[  195.380334]  __asan_load1+0x60/0x70
[  195.381317]  vmalloc_oob+0xc8/0x320
[  195.382525]  kunit_try_run_case+0xf8/0x260
[  195.383823]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  195.385625]  kthread+0x18c/0x1a8
[  195.386670]  ret_from_fork+0x10/0x20
[  195.387830] 
[  195.388586] The buggy address belongs to the virtual mapping at
[  195.388586]  [ffff8000800fd000, ffff8000800ff000) created by:
[  195.388586]  vmalloc_oob+0x88/0x320
[  195.391542] 
[  195.392391] The buggy address belongs to the physical page:
[  195.393886] page:00000000a572b734 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10604d
[  195.395749] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  195.397562] page_type: 0xffffffff()
[  195.398639] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[  195.400591] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  195.402279] page dumped because: kasan: bad access detected
[  195.403522] 
[  195.404288] Memory state around the buggy address:
[  195.405501]  ffff8000800fd680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  195.407637]  ffff8000800fd700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  195.409356] >ffff8000800fd780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[  195.410971]                                                              ^
[  195.412486]  ffff8000800fd800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  195.413529]  ffff8000800fd880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  195.415260] ==================================================================

test log snippet boot parser 70

Home

[  196.886906] ==================================================================
[  196.888295] BUG: KFENCE: invalid free in test_double_free+0x15c/0x1d0
[  196.888295] 
[  196.889993] Invalid free of 0x0000000043718bc4 (in kfence-#36):
[  196.891461]  test_double_free+0x15c/0x1d0
[  196.892857]  kunit_try_run_case+0xf8/0x260
[  196.894051]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  196.895488]  kthread+0x18c/0x1a8
[  196.896440]  ret_from_fork+0x10/0x20
[  196.897631] 
[  196.898210] kfence-#36: 0x0000000043718bc4-0x00000000ba784fdd, size=32, cache=kmalloc-32
[  196.898210] 
[  196.900090] allocated by task 244 on cpu 0 at 196.885813s:
[  196.901819]  test_alloc+0x224/0x3d8
[  196.902750]  test_double_free+0xcc/0x1d0
[  196.903961]  kunit_try_run_case+0xf8/0x260
[  196.905175]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  196.906600]  kthread+0x18c/0x1a8
[  196.907684]  ret_from_fork+0x10/0x20
[  196.908806] 
[  196.909405] freed by task 244 on cpu 0 at 196.886223s:
[  196.911196]  test_double_free+0x14c/0x1d0
[  196.912183]  kunit_try_run_case+0xf8/0x260
[  196.913427]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  196.914841]  kthread+0x18c/0x1a8
[  196.915870]  ret_from_fork+0x10/0x20
[  196.916983] 
[  196.917627] CPU: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  196.919404] Hardware name: linux,dummy-virt (DT)
[  196.920526] ==================================================================

test log snippet boot parser 71

Home

[  196.990653] ==================================================================
[  196.991950] BUG: KFENCE: invalid free in test_double_free+0xf8/0x1d0
[  196.991950] 
[  196.993362] Invalid free of 0x00000000135b9330 (in kfence-#26):
[  196.994811]  test_double_free+0xf8/0x1d0
[  196.996187]  kunit_try_run_case+0xf8/0x260
[  196.997425]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  196.998890]  kthread+0x18c/0x1a8
[  196.999827]  ret_from_fork+0x10/0x20
[  197.000972] 
[  197.001560] kfence-#26: 0x00000000135b9330-0x00000000a01968e3, size=32, cache=test
[  197.001560] 
[  197.003341] allocated by task 246 on cpu 0 at 196.989709s:
[  197.004919]  test_alloc+0x1b8/0x3d8
[  197.005914]  test_double_free+0xcc/0x1d0
[  197.007127]  kunit_try_run_case+0xf8/0x260
[  197.008347]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  197.009845]  kthread+0x18c/0x1a8
[  197.010847]  ret_from_fork+0x10/0x20
[  197.011954] 
[  197.012536] freed by task 246 on cpu 0 at 196.990099s:
[  197.014283]  test_double_free+0xe8/0x1d0
[  197.015276]  kunit_try_run_case+0xf8/0x260
[  197.016482]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  197.017939]  kthread+0x18c/0x1a8
[  197.018961]  ret_from_fork+0x10/0x20
[  197.020005] 
[  197.020602] CPU: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  197.022324] Hardware name: linux,dummy-virt (DT)
[  197.023439] ==================================================================

test log snippet boot parser 72

Home

[  197.094500] ==================================================================
[  197.095737] BUG: KFENCE: invalid free in test_invalid_addr_free+0x14c/0x1d0
[  197.095737] 
[  197.097636] Invalid free of 0x0000000075270e42 (in kfence-#37):
[  197.099073]  test_invalid_addr_free+0x14c/0x1d0
[  197.100497]  kunit_try_run_case+0xf8/0x260
[  197.101654]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  197.103167]  kthread+0x18c/0x1a8
[  197.104127]  ret_from_fork+0x10/0x20
[  197.105301] 
[  197.105906] kfence-#37: 0x00000000c8a38ac4-0x00000000acd4689c, size=32, cache=kmalloc-32
[  197.105906] 
[  197.107708] allocated by task 248 on cpu 1 at 197.093686s:
[  197.109422]  test_alloc+0x224/0x3d8
[  197.110342]  test_invalid_addr_free+0xcc/0x1d0
[  197.111674]  kunit_try_run_case+0xf8/0x260
[  197.112861]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  197.114372]  kthread+0x18c/0x1a8
[  197.115362]  ret_from_fork+0x10/0x20
[  197.116399] 
[  197.117055] CPU: 1 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  197.118803] Hardware name: linux,dummy-virt (DT)
[  197.119870] ==================================================================

test log snippet boot parser 73

Home

[  197.198558] ==================================================================
[  197.199833] BUG: KFENCE: invalid free in test_invalid_addr_free+0xe4/0x1d0
[  197.199833] 
[  197.201541] Invalid free of 0x00000000cb7257db (in kfence-#41):
[  197.202943]  test_invalid_addr_free+0xe4/0x1d0
[  197.204273]  kunit_try_run_case+0xf8/0x260
[  197.205553]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  197.207020]  kthread+0x18c/0x1a8
[  197.207981]  ret_from_fork+0x10/0x20
[  197.209129] 
[  197.209709] kfence-#41: 0x0000000092ebfe73-0x000000000b9bd06a, size=32, cache=test
[  197.209709] 
[  197.211452] allocated by task 250 on cpu 1 at 197.197846s:
[  197.213121]  test_alloc+0x1b8/0x3d8
[  197.214040]  test_invalid_addr_free+0xcc/0x1d0
[  197.215388]  kunit_try_run_case+0xf8/0x260
[  197.216590]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  197.218070]  kthread+0x18c/0x1a8
[  197.219074]  ret_from_fork+0x10/0x20
[  197.220138] 
[  197.220798] CPU: 1 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  197.222576] Hardware name: linux,dummy-virt (DT)
[  197.223645] ==================================================================

test log snippet boot parser 74

Home

[  226.043457] ==================================================================
[  226.053581] BUG: KFENCE: invalid read in test_invalid_access+0xb4/0x158
[  226.053581] 
[  226.059378] Invalid read at 0x00000000345b590a:
[  226.066085]  test_invalid_access+0xb4/0x158
[  226.069444]  kunit_try_run_case+0xf8/0x260
[  226.072852]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  226.075702]  kthread+0x18c/0x1a8
[  226.078638]  ret_from_fork+0x10/0x20
[  226.081836] 
[  226.083231] CPU: 1 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  226.086643] Hardware name: linux,dummy-virt (DT)
[  226.088890] ==================================================================

test log snippet boot parser 75

Home

[  189.606868] ==================================================================
[  189.610572] BUG: KFENCE: memory corruption in kmalloc_oob_memset_2+0xf0/0x1f0
[  189.610572] 
[  189.612373] Corrupted memory at 0x00000000132ae698 [ ! . . . . . . . . . . . . . . . ] (in kfence-#41):
[  189.616670]  kmalloc_oob_memset_2+0xf0/0x1f0
[  189.618020]  kunit_try_run_case+0xf8/0x260
[  189.619211]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.620850]  kthread+0x18c/0x1a8
[  189.621380]  ret_from_fork+0x10/0x20
[  189.622149] 
[  189.622723] kfence-#41: 0x0000000070e32e42-0x0000000049c622ba, size=120, cache=kmalloc-128
[  189.622723] 
[  189.625020] allocated by task 151 on cpu 1 at 189.599023s:
[  189.627214]  __kmem_cache_alloc_node+0x288/0x2d0
[  189.628360]  kmalloc_trace+0x48/0x130
[  189.629477]  kmalloc_oob_memset_2+0xa0/0x1f0
[  189.631302]  kunit_try_run_case+0xf8/0x260
[  189.632743]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.634214]  kthread+0x18c/0x1a8
[  189.635241]  ret_from_fork+0x10/0x20
[  189.636619] 
[  189.637251] freed by task 151 on cpu 1 at 189.606280s:
[  189.639091]  kmalloc_oob_memset_2+0xf0/0x1f0
[  189.640169]  kunit_try_run_case+0xf8/0x260
[  189.641278]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.642741]  kthread+0x18c/0x1a8
[  189.643721]  ret_from_fork+0x10/0x20
[  189.645019] 
[  189.645624] CPU: 1 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  189.647512] Hardware name: linux,dummy-virt (DT)
[  189.648859] ==================================================================

test log snippet boot parser 76

Home

[  189.606868] ==================================================================
[  189.610572] BUG: KFENCE: memory corruption in kmalloc_oob_memset_2+0xf0/0x1f0
[  189.610572] 
[  189.612373] Corrupted memory at 0x00000000132ae698 [ ! . . . . . . . . . . . . . . . ] (in kfence-#41):
[  189.616670]  kmalloc_oob_memset_2+0xf0/0x1f0
[  189.618020]  kunit_try_run_case+0xf8/0x260
[  189.619211]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.620850]  kthread+0x18c/0x1a8
[  189.621380]  ret_from_fork+0x10/0x20
[  189.622149] 
[  189.622723] kfence-#41: 0x0000000070e32e42-0x0000000049c622ba, size=120, cache=kmalloc-128
[  189.622723] 
[  189.625020] allocated by task 151 on cpu 1 at 189.599023s:
[  189.627214]  __kmem_cache_alloc_node+0x288/0x2d0
[  189.628360]  kmalloc_trace+0x48/0x130
[  189.629477]  kmalloc_oob_memset_2+0xa0/0x1f0
[  189.631302]  kunit_try_run_case+0xf8/0x260
[  189.632743]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.634214]  kthread+0x18c/0x1a8
[  189.635241]  ret_from_fork+0x10/0x20
[  189.636619] 
[  189.637251] freed by task 151 on cpu 1 at 189.606280s:
[  189.639091]  kmalloc_oob_memset_2+0xf0/0x1f0
[  189.640169]  kunit_try_run_case+0xf8/0x260
[  189.641278]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  189.642741]  kthread+0x18c/0x1a8
[  189.643721]  ret_from_fork+0x10/0x20
[  189.645019] 
[  189.645624] CPU: 1 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  189.647512] Hardware name: linux,dummy-virt (DT)
[  189.648859] ==================================================================

test log snippet boot parser 77

Home

[  188.588609] ==================================================================
[  188.592263] BUG: KFENCE: memory corruption in krealloc_less_oob_helper+0x200/0x590
[  188.592263] 
[  188.594150] Corrupted memory at 0x00000000ac902a13 [ ! . . . . . . . . . . . . . . . ] (in kfence-#11):
[  188.598921]  krealloc_less_oob_helper+0x200/0x590
[  188.600270]  krealloc_less_oob+0x20/0x38
[  188.601396]  kunit_try_run_case+0xf8/0x260
[  188.602585]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  188.603862]  kthread+0x18c/0x1a8
[  188.604712]  ret_from_fork+0x10/0x20
[  188.605350] 
[  188.605899] kfence-#11: 0x000000000d4641e7-0x000000006f6cd587, size=235, cache=kmalloc-256
[  188.605899] 
[  188.608158] allocated by task 137 on cpu 0 at 188.547631s:
[  188.609724]  krealloc_less_oob_helper+0xb8/0x590
[  188.610629]  krealloc_less_oob+0x20/0x38
[  188.611724]  kunit_try_run_case+0xf8/0x260
[  188.612737]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  188.613982]  kthread+0x18c/0x1a8
[  188.614503]  ret_from_fork+0x10/0x20
[  188.615421] 
[  188.616082] freed by task 137 on cpu 0 at 188.586962s:
[  188.617862]  krealloc_less_oob_helper+0x200/0x590
[  188.618933]  krealloc_less_oob+0x20/0x38
[  188.619951]  kunit_try_run_case+0xf8/0x260
[  188.620609]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  188.621975]  kthread+0x18c/0x1a8
[  188.622928]  ret_from_fork+0x10/0x20
[  188.623996] 
[  188.624653] CPU: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  188.625999] Hardware name: linux,dummy-virt (DT)
[  188.627123] ==================================================================

test log snippet boot parser 78

Home

[  188.588609] ==================================================================
[  188.592263] BUG: KFENCE: memory corruption in krealloc_less_oob_helper+0x200/0x590
[  188.592263] 
[  188.594150] Corrupted memory at 0x00000000ac902a13 [ ! . . . . . . . . . . . . . . . ] (in kfence-#11):
[  188.598921]  krealloc_less_oob_helper+0x200/0x590
[  188.600270]  krealloc_less_oob+0x20/0x38
[  188.601396]  kunit_try_run_case+0xf8/0x260
[  188.602585]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  188.603862]  kthread+0x18c/0x1a8
[  188.604712]  ret_from_fork+0x10/0x20
[  188.605350] 
[  188.605899] kfence-#11: 0x000000000d4641e7-0x000000006f6cd587, size=235, cache=kmalloc-256
[  188.605899] 
[  188.608158] allocated by task 137 on cpu 0 at 188.547631s:
[  188.609724]  krealloc_less_oob_helper+0xb8/0x590
[  188.610629]  krealloc_less_oob+0x20/0x38
[  188.611724]  kunit_try_run_case+0xf8/0x260
[  188.612737]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  188.613982]  kthread+0x18c/0x1a8
[  188.614503]  ret_from_fork+0x10/0x20
[  188.615421] 
[  188.616082] freed by task 137 on cpu 0 at 188.586962s:
[  188.617862]  krealloc_less_oob_helper+0x200/0x590
[  188.618933]  krealloc_less_oob+0x20/0x38
[  188.619951]  kunit_try_run_case+0xf8/0x260
[  188.620609]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  188.621975]  kthread+0x18c/0x1a8
[  188.622928]  ret_from_fork+0x10/0x20
[  188.623996] 
[  188.624653] CPU: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  188.625999] Hardware name: linux,dummy-virt (DT)
[  188.627123] ==================================================================

test log snippet boot parser 79

Home

[  197.926747] ==================================================================
[  197.928015] BUG: KFENCE: memory corruption in test_corruption+0xf4/0x258
[  197.928015] 
[  197.929637] Corrupted memory at 0x00000000bbf2668c [ ! . . . . . . . . . . . . . . . ] (in kfence-#108):
[  197.933625]  test_corruption+0xf4/0x258
[  197.934875]  kunit_try_run_case+0xf8/0x260
[  197.936110]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  197.937624]  kthread+0x18c/0x1a8
[  197.938640]  ret_from_fork+0x10/0x20
[  197.939705] 
[  197.940309] kfence-#108: 0x0000000099c34203-0x000000004ebba905, size=32, cache=test
[  197.940309] 
[  197.942074] allocated by task 254 on cpu 0 at 197.925921s:
[  197.943683]  test_alloc+0x1b8/0x3d8
[  197.944702]  test_corruption+0xc8/0x258
[  197.945859]  kunit_try_run_case+0xf8/0x260
[  197.947128]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  197.948583]  kthread+0x18c/0x1a8
[  197.949586]  ret_from_fork+0x10/0x20
[  197.950655] 
[  197.951235] freed by task 254 on cpu 0 at 197.926293s:
[  197.952963]  test_corruption+0xf4/0x258
[  197.953950]  kunit_try_run_case+0xf8/0x260
[  197.955170]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  197.956614]  kthread+0x18c/0x1a8
[  197.957606]  ret_from_fork+0x10/0x20
[  197.958721] 
[  197.959387] CPU: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  197.961162] Hardware name: linux,dummy-virt (DT)
[  197.962287] ==================================================================

test log snippet boot parser 80

Home

[  197.302616] ==================================================================
[  197.304031] BUG: KFENCE: memory corruption in test_corruption+0x194/0x258
[  197.304031] 
[  197.305714] Corrupted memory at 0x0000000002aaea0a [ ! . . . . . . . . . . . . . . . ] (in kfence-#48):
[  197.309888]  test_corruption+0x194/0x258
[  197.311079]  kunit_try_run_case+0xf8/0x260
[  197.312273]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  197.313690]  kthread+0x18c/0x1a8
[  197.314697]  ret_from_fork+0x10/0x20
[  197.315742] 
[  197.316377] kfence-#48: 0x00000000fa28bb67-0x00000000d862c4c7, size=32, cache=kmalloc-32
[  197.316377] 
[  197.318227] allocated by task 252 on cpu 1 at 197.301698s:
[  197.319963]  test_alloc+0x224/0x3d8
[  197.320979]  test_corruption+0xc8/0x258
[  197.322161]  kunit_try_run_case+0xf8/0x260
[  197.323350]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  197.324800]  kthread+0x18c/0x1a8
[  197.325813]  ret_from_fork+0x10/0x20
[  197.326896] 
[  197.327450] freed by task 252 on cpu 1 at 197.302125s:
[  197.329205]  test_corruption+0x194/0x258
[  197.330218]  kunit_try_run_case+0xf8/0x260
[  197.331433]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  197.332815]  kthread+0x18c/0x1a8
[  197.333888]  ret_from_fork+0x10/0x20
[  197.334958] 
[  197.335576] CPU: 1 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  197.337313] Hardware name: linux,dummy-virt (DT)
[  197.338493] ==================================================================

test log snippet boot parser 81

Home

[  197.617061] ==================================================================
[  197.618334] BUG: KFENCE: memory corruption in test_corruption+0x1e8/0x258
[  197.618334] 
[  197.620432] Corrupted memory at 0x00000000027a4ba0 [ ! ] (in kfence-#70):
[  197.622413]  test_corruption+0x1e8/0x258
[  197.623811]  kunit_try_run_case+0xf8/0x260
[  197.625114]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  197.626626]  kthread+0x18c/0x1a8
[  197.627631]  ret_from_fork+0x10/0x20
[  197.628721] 
[  197.629367] kfence-#70: 0x00000000515ea46b-0x00000000901c5a4c, size=32, cache=kmalloc-32
[  197.629367] 
[  197.631163] allocated by task 252 on cpu 1 at 197.615477s:
[  197.632948]  test_alloc+0x224/0x3d8
[  197.633885]  test_corruption+0x114/0x258
[  197.635086]  kunit_try_run_case+0xf8/0x260
[  197.636318]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  197.637735]  kthread+0x18c/0x1a8
[  197.638736]  ret_from_fork+0x10/0x20
[  197.639814] 
[  197.640373] freed by task 252 on cpu 1 at 197.615962s:
[  197.642134]  test_corruption+0x1e8/0x258
[  197.643152]  kunit_try_run_case+0xf8/0x260
[  197.644379]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  197.645816]  kthread+0x18c/0x1a8
[  197.646764]  ret_from_fork+0x10/0x20
[  197.647985] 
[  197.648568] CPU: 1 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  197.650313] Hardware name: linux,dummy-virt (DT)
[  197.651401] ==================================================================

test log snippet boot parser 82

Home

[  215.194934] ==================================================================
[  215.196295] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x150/0x1d8
[  215.196295] 
[  215.198267] Corrupted memory at 0x0000000062cc45f6 [ ! . . . . . . ] (in kfence-#8):
[  215.201292]  test_kmalloc_aligned_oob_write+0x150/0x1d8
[  215.202681]  kunit_try_run_case+0xf8/0x260
[  215.203926]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  215.205361]  kthread+0x18c/0x1a8
[  215.206358]  ret_from_fork+0x10/0x20
[  215.207492] 
[  215.208171] kfence-#8: 0x00000000181e00c9-0x0000000084542278, size=73, cache=kmalloc-96
[  215.208171] 
[  215.209946] allocated by task 266 on cpu 0 at 215.193869s:
[  215.211697]  test_alloc+0x224/0x3d8
[  215.212603]  test_kmalloc_aligned_oob_write+0xb4/0x1d8
[  215.214044]  kunit_try_run_case+0xf8/0x260
[  215.215237]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  215.216675]  kthread+0x18c/0x1a8
[  215.217693]  ret_from_fork+0x10/0x20
[  215.218843] 
[  215.219408] freed by task 266 on cpu 0 at 215.194314s:
[  215.221215]  test_kmalloc_aligned_oob_write+0x150/0x1d8
[  215.222436]  kunit_try_run_case+0xf8/0x260
[  215.223636]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  215.225067]  kthread+0x18c/0x1a8
[  215.226066]  ret_from_fork+0x10/0x20
[  215.227208] 
[  215.227897] CPU: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  215.229583] Hardware name: linux,dummy-virt (DT)
[  215.230688] ==================================================================

test log snippet boot parser 83

Home

[  190.069967] ==================================================================
[  190.072185] BUG: KFENCE: out-of-bounds read in __memcpy+0x9c/0x240
[  190.072185] 
[  190.074020] Out-of-bounds read at 0x00000000958e71ef (64B right of kfence-#70):
[  190.075703]  __memcpy+0x9c/0x240
[  190.077038]  kmalloc_memmove_invalid_size+0xe0/0x1f8
[  190.078480]  kunit_try_run_case+0xf8/0x260
[  190.079686]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  190.081387]  kthread+0x18c/0x1a8
[  190.082370]  ret_from_fork+0x10/0x20
[  190.083399] 
[  190.084036] kfence-#70: 0x00000000d170b24b-0x00000000901c5a4c, size=64, cache=kmalloc-64
[  190.084036] 
[  190.086014] allocated by task 161 on cpu 0 at 190.067158s:
[  190.088433]  __kmem_cache_alloc_node+0x288/0x2d0
[  190.089550]  kmalloc_trace+0x48/0x130
[  190.090578]  kmalloc_memmove_invalid_size+0xa0/0x1f8
[  190.091997]  kunit_try_run_case+0xf8/0x260
[  190.093135]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  190.094697]  kthread+0x18c/0x1a8
[  190.095758]  ret_from_fork+0x10/0x20
[  190.097172] 
[  190.097856] CPU: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  190.099709] Hardware name: linux,dummy-virt (DT)
[  190.100978] ==================================================================

test log snippet boot parser 84

Home

[  190.069967] ==================================================================
[  190.072185] BUG: KFENCE: out-of-bounds read in __memcpy+0x9c/0x240
[  190.072185] 
[  190.074020] Out-of-bounds read at 0x00000000958e71ef (64B right of kfence-#70):
[  190.075703]  __memcpy+0x9c/0x240
[  190.077038]  kmalloc_memmove_invalid_size+0xe0/0x1f8
[  190.078480]  kunit_try_run_case+0xf8/0x260
[  190.079686]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  190.081387]  kthread+0x18c/0x1a8
[  190.082370]  ret_from_fork+0x10/0x20
[  190.083399] 
[  190.084036] kfence-#70: 0x00000000d170b24b-0x00000000901c5a4c, size=64, cache=kmalloc-64
[  190.084036] 
[  190.086014] allocated by task 161 on cpu 0 at 190.067158s:
[  190.088433]  __kmem_cache_alloc_node+0x288/0x2d0
[  190.089550]  kmalloc_trace+0x48/0x130
[  190.090578]  kmalloc_memmove_invalid_size+0xa0/0x1f8
[  190.091997]  kunit_try_run_case+0xf8/0x260
[  190.093135]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  190.094697]  kthread+0x18c/0x1a8
[  190.095758]  ret_from_fork+0x10/0x20
[  190.097172] 
[  190.097856] CPU: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  190.099709] Hardware name: linux,dummy-virt (DT)
[  190.100978] ==================================================================

test log snippet boot parser 85

Home

[  214.993877] ==================================================================
[  214.995085] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x118/0x270
[  214.995085] 
[  214.997299] Out-of-bounds read at 0x00000000e011ed37 (81B right of kfence-#233):
[  214.999463]  test_kmalloc_aligned_oob_read+0x118/0x270
[  215.001459]  kunit_try_run_case+0xf8/0x260
[  215.002561]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  215.004578]  kthread+0x18c/0x1a8
[  215.005691]  ret_from_fork+0x10/0x20
[  215.006948] 
[  215.007277] kfence-#233: 0x0000000082f3cf9b-0x0000000098a640d9, size=73, cache=kmalloc-96
[  215.007277] 
[  215.008690] allocated by task 264 on cpu 1 at 214.991971s:
[  215.010490]  test_alloc+0x224/0x3d8
[  215.011412]  test_kmalloc_aligned_oob_read+0xd4/0x270
[  215.013069]  kunit_try_run_case+0xf8/0x260
[  215.014863]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  215.016513]  kthread+0x18c/0x1a8
[  215.017540]  ret_from_fork+0x10/0x20
[  215.018707] 
[  215.019353] CPU: 1 PID: 264 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  215.021271] Hardware name: linux,dummy-virt (DT)
[  215.022385] ==================================================================

test log snippet boot parser 86

Home

[  196.366694] ==================================================================
[  196.368105] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x120/0x278
[  196.368105] 
[  196.369980] Out-of-bounds read at 0x0000000026a73450 (32B right of kfence-#2):
[  196.371436]  test_out_of_bounds_read+0x120/0x278
[  196.372964]  kunit_try_run_case+0xf8/0x260
[  196.374201]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  196.375687]  kthread+0x18c/0x1a8
[  196.376649]  ret_from_fork+0x10/0x20
[  196.377853] 
[  196.378499] kfence-#2: 0x0000000000aeda7b-0x00000000bd33e17b, size=32, cache=test
[  196.378499] 
[  196.380269] allocated by task 234 on cpu 1 at 196.366261s:
[  196.382006]  test_alloc+0x1b8/0x3d8
[  196.383013]  test_out_of_bounds_read+0x110/0x278
[  196.384319]  kunit_try_run_case+0xf8/0x260
[  196.385537]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  196.387005]  kthread+0x18c/0x1a8
[  196.388011]  ret_from_fork+0x10/0x20
[  196.389120] 
[  196.389803] CPU: 1 PID: 234 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  196.391534] Hardware name: linux,dummy-virt (DT)
[  196.392662] ==================================================================

test log snippet boot parser 87

Home

[  195.743438] ==================================================================
[  195.744793] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0xdc/0x278
[  195.744793] 
[  195.746860] Out-of-bounds read at 0x0000000020c64231 (1B left of kfence-#249):
[  195.748913]  test_out_of_bounds_read+0xdc/0x278
[  195.750259]  kunit_try_run_case+0xf8/0x260
[  195.751511]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  195.752973]  kthread+0x18c/0x1a8
[  195.754002]  ret_from_fork+0x10/0x20
[  195.755158] 
[  195.755840] kfence-#249: 0x0000000020cc24eb-0x00000000d4115433, size=32, cache=kmalloc-32
[  195.755840] 
[  195.757700] allocated by task 232 on cpu 1 at 195.742850s:
[  195.759461]  test_alloc+0x224/0x3d8
[  195.760385]  test_out_of_bounds_read+0xcc/0x278
[  195.761729]  kunit_try_run_case+0xf8/0x260
[  195.762986]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  195.764420]  kthread+0x18c/0x1a8
[  195.765438]  ret_from_fork+0x10/0x20
[  195.766522] 
[  195.767221] CPU: 1 PID: 232 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  195.768983] Hardware name: linux,dummy-virt (DT)
[  195.770145] ==================================================================

test log snippet boot parser 88

Home

[  195.950229] ==================================================================
[  195.951503] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x120/0x278
[  195.951503] 
[  195.953398] Out-of-bounds read at 0x00000000ecf09eee (32B right of kfence-#251):
[  195.955293]  test_out_of_bounds_read+0x120/0x278
[  195.956601]  kunit_try_run_case+0xf8/0x260
[  195.957974]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  195.959453]  kthread+0x18c/0x1a8
[  195.960448]  ret_from_fork+0x10/0x20
[  195.961563] 
[  195.962137] kfence-#251: 0x000000006b4a421c-0x000000004070fa1a, size=32, cache=kmalloc-32
[  195.962137] 
[  195.964035] allocated by task 232 on cpu 1 at 195.949733s:
[  195.965763]  test_alloc+0x224/0x3d8
[  195.966701]  test_out_of_bounds_read+0x110/0x278
[  195.968106]  kunit_try_run_case+0xf8/0x260
[  195.969300]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  195.970827]  kthread+0x18c/0x1a8
[  195.971820]  ret_from_fork+0x10/0x20
[  195.972932] 
[  195.973586] CPU: 1 PID: 232 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  195.975314] Hardware name: linux,dummy-virt (DT)
[  195.976443] ==================================================================

test log snippet boot parser 89

Home

[  196.159217] ==================================================================
[  196.160591] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0xdc/0x278
[  196.160591] 
[  196.162510] Out-of-bounds read at 0x000000008266e0bc (1B left of kfence-#253):
[  196.164218]  test_out_of_bounds_read+0xdc/0x278
[  196.165661]  kunit_try_run_case+0xf8/0x260
[  196.166895]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  196.168299]  kthread+0x18c/0x1a8
[  196.169353]  ret_from_fork+0x10/0x20
[  196.170434] 
[  196.171035] kfence-#253: 0x00000000fe214acf-0x00000000ada6f791, size=32, cache=test
[  196.171035] 
[  196.172865] allocated by task 234 on cpu 1 at 196.158730s:
[  196.174609]  test_alloc+0x1b8/0x3d8
[  196.175583]  test_out_of_bounds_read+0xcc/0x278
[  196.176887]  kunit_try_run_case+0xf8/0x260
[  196.178109]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  196.179514]  kthread+0x18c/0x1a8
[  196.180488]  ret_from_fork+0x10/0x20
[  196.181600] 
[  196.182275] CPU: 1 PID: 234 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  196.184003] Hardware name: linux,dummy-virt (DT)
[  196.185103] ==================================================================

test log snippet boot parser 90

Home

[  196.471392] ==================================================================
[  196.472749] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0xd8/0x1b0
[  196.472749] 
[  196.474690] Out-of-bounds write at 0x000000003af33f21 (1B left of kfence-#11):
[  196.476384]  test_out_of_bounds_write+0xd8/0x1b0
[  196.477852]  kunit_try_run_case+0xf8/0x260
[  196.479090]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  196.480511]  kthread+0x18c/0x1a8
[  196.481456]  ret_from_fork+0x10/0x20
[  196.482645] 
[  196.483286] kfence-#11: 0x00000000a0feb797-0x000000009942cf45, size=32, cache=kmalloc-32
[  196.483286] 
[  196.485090] allocated by task 236 on cpu 1 at 196.470844s:
[  196.486847]  test_alloc+0x224/0x3d8
[  196.487754]  test_out_of_bounds_write+0xc0/0x1b0
[  196.489151]  kunit_try_run_case+0xf8/0x260
[  196.490376]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  196.491837]  kthread+0x18c/0x1a8
[  196.492888]  ret_from_fork+0x10/0x20
[  196.493999] 
[  196.494646] CPU: 1 PID: 236 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  196.496314] Hardware name: linux,dummy-virt (DT)
[  196.497433] ==================================================================

test log snippet boot parser 91

Home

[  196.575329] ==================================================================
[  196.576662] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0xd8/0x1b0
[  196.576662] 
[  196.578607] Out-of-bounds write at 0x000000009b3d5ad9 (1B left of kfence-#15):
[  196.580221]  test_out_of_bounds_write+0xd8/0x1b0
[  196.581751]  kunit_try_run_case+0xf8/0x260
[  196.582991]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  196.584417]  kthread+0x18c/0x1a8
[  196.585424]  ret_from_fork+0x10/0x20
[  196.586482] 
[  196.587082] kfence-#15: 0x00000000605cb1f4-0x0000000055d01fc7, size=32, cache=test
[  196.587082] 
[  196.588916] allocated by task 238 on cpu 1 at 196.574844s:
[  196.590567]  test_alloc+0x1b8/0x3d8
[  196.591549]  test_out_of_bounds_write+0xc0/0x1b0
[  196.592856]  kunit_try_run_case+0xf8/0x260
[  196.594085]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  196.595526]  kthread+0x18c/0x1a8
[  196.596522]  ret_from_fork+0x10/0x20
[  196.597614] 
[  196.598267] CPU: 1 PID: 238 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  196.599979] Hardware name: linux,dummy-virt (DT)
[  196.601040] ==================================================================

test log snippet boot parser 92

Home

[  231.590527] ==================================================================
[  231.593145] BUG: KFENCE: use-after-free read in test_krealloc+0x2b8/0x4e8
[  231.593145] 
[  231.595199] Use-after-free read at 0x00000000b5e97b6f (in kfence-#250):
[  231.599220]  test_krealloc+0x2b8/0x4e8
[  231.603614]  kunit_try_run_case+0xf8/0x260
[  231.605186]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  231.610440]  kthread+0x18c/0x1a8
[  231.611464]  ret_from_fork+0x10/0x20
[  231.612600] 
[  231.613189] kfence-#250: 0x00000000b5e97b6f-0x000000002f976c78, size=32, cache=kmalloc-32
[  231.613189] 
[  231.615144] allocated by task 278 on cpu 0 at 231.582283s:
[  231.616990]  test_alloc+0x224/0x3d8
[  231.618164]  test_krealloc+0xc0/0x4e8
[  231.619377]  kunit_try_run_case+0xf8/0x260
[  231.620631]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  231.622175]  kthread+0x18c/0x1a8
[  231.623149]  ret_from_fork+0x10/0x20
[  231.625113] 
[  231.625692] freed by task 278 on cpu 0 at 231.582967s:
[  231.628235]  krealloc+0xa8/0x1a0
[  231.629425]  test_krealloc+0x128/0x4e8
[  231.630641]  kunit_try_run_case+0xf8/0x260
[  231.631926]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  231.633440]  kthread+0x18c/0x1a8
[  231.634402]  ret_from_fork+0x10/0x20
[  231.635535] 
[  231.636142] CPU: 1 PID: 278 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  231.638092] Hardware name: linux,dummy-virt (DT)
[  231.639279] ==================================================================

test log snippet boot parser 93

Home

[  231.386214] ==================================================================
[  231.387571] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x148/0x368
[  231.387571] 
[  231.389692] Use-after-free read at 0x00000000d9714e1f (in kfence-#248):
[  231.391092]  test_memcache_typesafe_by_rcu+0x148/0x368
[  231.394694]  kunit_try_run_case+0xf8/0x260
[  231.397234]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  231.399281]  kthread+0x18c/0x1a8
[  231.400409]  ret_from_fork+0x10/0x20
[  231.401672] 
[  231.402292] kfence-#248: 0x00000000d9714e1f-0x00000000a76db64f, size=32, cache=test
[  231.402292] 
[  231.403971] allocated by task 276 on cpu 1 at 231.369547s:
[  231.405438]  test_alloc+0x1b8/0x3d8
[  231.407650]  test_memcache_typesafe_by_rcu+0xe8/0x368
[  231.409190]  kunit_try_run_case+0xf8/0x260
[  231.410481]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  231.412064]  kthread+0x18c/0x1a8
[  231.413023]  ret_from_fork+0x10/0x20
[  231.416110] 
[  231.416803] freed by task 0 on cpu 1 at 231.384925s:
[  231.421987]  rcu_guarded_free+0x34/0x50
[  231.423246]  rcu_core+0x448/0xf40
[  231.424393]  rcu_core_si+0x18/0x30
[  231.425571]  handle_softirqs+0x240/0x678
[  231.427393]  __do_softirq+0x1c/0x28
[  231.428501]  ____do_softirq+0x18/0x30
[  231.429646]  call_on_irq_stack+0x24/0x58
[  231.432090]  do_softirq_own_stack+0x24/0x38
[  231.433366]  irq_exit_rcu+0x110/0x160
[  231.434550]  el1_interrupt+0x38/0x58
[  231.436324]  el1h_64_irq_handler+0x18/0x28
[  231.437497]  el1h_64_irq+0x64/0x68
[  231.438541]  arch_local_irq_enable+0x4/0x8
[  231.439674]  do_idle+0x304/0x388
[  231.441457]  cpu_startup_entry+0x44/0x58
[  231.442917]  secondary_start_kernel+0x1e8/0x228
[  231.444558]  __secondary_switched+0xb8/0xc0
[  231.446105] 
[  231.446854] CPU: 1 PID: 276 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  231.448881] Hardware name: linux,dummy-virt (DT)
[  231.449911] ==================================================================

test log snippet boot parser 94

Home

[  196.782434] ==================================================================
[  196.783682] BUG: KFENCE: use-after-free read in test_use_after_free_read+0xf0/0x1c8
[  196.783682] 
[  196.785546] Use-after-free read at 0x00000000976b97ed (in kfence-#28):
[  196.787182]  test_use_after_free_read+0xf0/0x1c8
[  196.788479]  kunit_try_run_case+0xf8/0x260
[  196.789795]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  196.791237]  kthread+0x18c/0x1a8
[  196.792245]  ret_from_fork+0x10/0x20
[  196.793286] 
[  196.793886] kfence-#28: 0x00000000976b97ed-0x00000000a736476b, size=32, cache=test
[  196.793886] 
[  196.795629] allocated by task 242 on cpu 1 at 196.781702s:
[  196.797178]  test_alloc+0x1b8/0x3d8
[  196.798308]  test_use_after_free_read+0xc8/0x1c8
[  196.799560]  kunit_try_run_case+0xf8/0x260
[  196.800807]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  196.802327]  kthread+0x18c/0x1a8
[  196.803325]  ret_from_fork+0x10/0x20
[  196.804416] 
[  196.805030] freed by task 242 on cpu 1 at 196.782093s:
[  196.806817]  test_use_after_free_read+0xe8/0x1c8
[  196.807952]  kunit_try_run_case+0xf8/0x260
[  196.809110]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  196.810582]  kthread+0x18c/0x1a8
[  196.811510]  ret_from_fork+0x10/0x20
[  196.812697] 
[  196.813311] CPU: 1 PID: 242 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  196.815095] Hardware name: linux,dummy-virt (DT)
[  196.816158] ==================================================================

test log snippet boot parser 95

Home

[  196.678675] ==================================================================
[  196.680109] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x150/0x1c8
[  196.680109] 
[  196.682004] Use-after-free read at 0x00000000fb4d104d (in kfence-#25):
[  196.683533]  test_use_after_free_read+0x150/0x1c8
[  196.685083]  kunit_try_run_case+0xf8/0x260
[  196.686318]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  196.687758]  kthread+0x18c/0x1a8
[  196.688762]  ret_from_fork+0x10/0x20
[  196.689854] 
[  196.690495] kfence-#25: 0x00000000fb4d104d-0x0000000038882d26, size=32, cache=kmalloc-32
[  196.690495] 
[  196.692354] allocated by task 240 on cpu 0 at 196.677834s:
[  196.694057]  test_alloc+0x224/0x3d8
[  196.695061]  test_use_after_free_read+0xc8/0x1c8
[  196.696402]  kunit_try_run_case+0xf8/0x260
[  196.697673]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  196.699116]  kthread+0x18c/0x1a8
[  196.700110]  ret_from_fork+0x10/0x20
[  196.701170] 
[  196.701752] freed by task 240 on cpu 0 at 196.678294s:
[  196.703588]  test_use_after_free_read+0x148/0x1c8
[  196.704718]  kunit_try_run_case+0xf8/0x260
[  196.705957]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  196.707399]  kthread+0x18c/0x1a8
[  196.708414]  ret_from_fork+0x10/0x20
[  196.709510] 
[  196.710108] CPU: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  196.711916] Hardware name: linux,dummy-virt (DT)
[  196.713038] ==================================================================

test log snippet boot parser 96

Home

------------[ cut here ]------------
[  298.064568] WARNING: CPU: 0 PID: 1425 at drivers/gpu/drm/drm_rect.c:138 drm_rect_calc_hscale+0x54/0x68
[  298.065815] Modules linked in:
[  298.066281] CPU: 0 PID: 1425 Comm: kunit_try_catch Tainted: G    B   W        N 6.6.74-rc1 #1
[  298.066739] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  298.067884] EIP: drm_rect_calc_hscale+0x54/0x68
[  298.068447] Code: 99 f7 f9 89 c1 39 cb 7f 2d 39 4d 08 7c 28 5b 89 c8 5d c3 8d b4 26 00 00 00 00 8d 44 08 ff 99 f7 f9 85 c0 89 c1 79 de eb e5 90 <0f> 0b 5b b9 ea ff ff ff 89 c8 5d c3 b9 de ff ff ff eb d1 90 3e 8d
[  298.069955] EAX: 00010000 EBX: 00000000 ECX: ffff0000 EDX: ffff0000
[  298.070435] ESI: c1179d38 EDI: 7fffffff EBP: c30b1ebc ESP: c30b1eb8
[  298.070909] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00010286
[  298.071788] CR0: 80050033 CR2: f59c8000 CR3: 19a35000 CR4: 000006d0
[  298.072094] DR0: d9a94800 DR1: d9a94801 DR2: d9a94803 DR3: d9a94805
[  298.072331] DR6: ffff0ff0 DR7: 00000600
[  298.072843] Call Trace:
[  298.073562]  ? show_regs+0x52/0x5c
[  298.073889]  ? drm_rect_calc_hscale+0x54/0x68
[  298.074278]  ? __warn+0x89/0x15c
[  298.074518]  ? drm_rect_calc_hscale+0x54/0x68
[  298.074953]  ? drm_rect_calc_hscale+0x54/0x68
[  298.075572]  ? report_bug+0x189/0x1b0
[  298.075772]  ? drm_rect_calc_hscale+0x55/0x68
[  298.075964]  ? exc_overflow+0x50/0x50
[  298.076476]  ? handle_bug+0x56/0x90
[  298.077004]  ? exc_invalid_op+0x1b/0x70
[  298.077338]  ? handle_exception+0x133/0x133
[  298.077599]  ? exc_overflow+0x50/0x50
[  298.077823]  ? drm_rect_calc_hscale+0x54/0x68
[  298.077914]  ? exc_overflow+0x50/0x50
[  298.077914]  ? drm_rect_calc_hscale+0x54/0x68
[  298.077914]  drm_test_rect_calc_hscale+0x38/0xa8
[  298.079605]  ? ktime_get_ts64+0x4f/0x178
[  298.079963]  kunit_try_run_case+0x8a/0x1c4
[  298.080536]  ? _raw_spin_lock_irqsave+0x28/0x6c
[  298.081259]  ? _raw_spin_unlock_irqrestore+0x1a/0x40
[  298.081686]  ? preempt_count_sub+0x54/0x78
[  298.081981]  kunit_generic_run_threadfn_adapter+0x16/0x20
[  298.082166]  kthread+0xe0/0x108
[  298.082166]  ? kunit_try_catch_throw+0x1c/0x1c
[  298.082166]  ? kthread_complete_and_exit+0x1c/0x1c
[  298.082166]  ret_from_fork+0x40/0x4c
[  298.083760]  ? kthread_complete_and_exit+0x1c/0x1c
[  298.085447]  ret_from_fork_asm+0x12/0x18
[  298.086140]  entry_INT80_32+0xf0/0xf0
[  298.087230] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[  298.034129] WARNING: CPU: 0 PID: 1423 at drivers/gpu/drm/drm_rect.c:138 drm_rect_calc_hscale+0x54/0x68
[  298.034129] Modules linked in:
[  298.036123] CPU: 0 PID: 1423 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  298.036846] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  298.037635] EIP: drm_rect_calc_hscale+0x54/0x68
[  298.038397] Code: 99 f7 f9 89 c1 39 cb 7f 2d 39 4d 08 7c 28 5b 89 c8 5d c3 8d b4 26 00 00 00 00 8d 44 08 ff 99 f7 f9 85 c0 89 c1 79 de eb e5 90 <0f> 0b 5b b9 ea ff ff ff 89 c8 5d c3 b9 de ff ff ff eb d1 90 3e 8d
[  298.039800] EAX: ffff0000 EBX: 00000000 ECX: 00010000 EDX: ffff0000
[  298.040478] ESI: c1179d38 EDI: 7fffffff EBP: c30bbebc ESP: c30bbeb8
[  298.040972] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00010286
[  298.041318] CR0: 80050033 CR2: f59c8000 CR3: 19a35000 CR4: 000006d0
[  298.041318] DR0: d9a94800 DR1: d9a94801 DR2: d9a94803 DR3: d9a94805
[  298.041318] DR6: ffff0ff0 DR7: 00000600
[  298.041318] Call Trace:
[  298.044461]  ? show_regs+0x52/0x5c
[  298.044870]  ? drm_rect_calc_hscale+0x54/0x68
[  298.045500]  ? __warn+0x89/0x15c
[  298.045807]  ? drm_rect_calc_hscale+0x54/0x68
[  298.046613]  ? drm_rect_calc_hscale+0x54/0x68
[  298.047235]  ? report_bug+0x189/0x1b0
[  298.047666]  ? drm_rect_calc_hscale+0x55/0x68
[  298.048267]  ? exc_overflow+0x50/0x50
[  298.048732]  ? handle_bug+0x56/0x90
[  298.048928]  ? exc_invalid_op+0x1b/0x70
[  298.049587]  ? dequeue_entity+0x172/0x570
[  298.050227]  ? sched_clock_cpu+0x75/0x3b4
[  298.050650]  ? handle_exception+0x133/0x133
[  298.051291]  ? exc_overflow+0x50/0x50
[  298.051756]  ? drm_rect_calc_hscale+0x54/0x68
[  298.052160]  ? exc_overflow+0x50/0x50
[  298.052690]  ? drm_rect_calc_hscale+0x54/0x68
[  298.053267]  drm_test_rect_calc_hscale+0x38/0xa8
[  298.053832]  ? ktime_get_ts64+0x4f/0x178
[  298.054270]  kunit_try_run_case+0x8a/0x1c4
[  298.054704]  ? ttwu_queue_wakelist+0xe3/0xe8
[  298.055484]  ? _raw_spin_lock_irqsave+0x28/0x6c
[  298.055936]  ? _raw_spin_unlock_irqrestore+0x1a/0x40
[  298.056621]  ? preempt_count_sub+0x54/0x78
[  298.056914]  kunit_generic_run_threadfn_adapter+0x16/0x20
[  298.057556]  kthread+0xe0/0x108
[  298.057958]  ? kunit_try_catch_throw+0x1c/0x1c
[  298.058190]  ? kthread_complete_and_exit+0x1c/0x1c
[  298.058443]  ret_from_fork+0x40/0x4c
[  298.058489]  ? kthread_complete_and_exit+0x1c/0x1c
[  298.059254]  ret_from_fork_asm+0x12/0x18
[  298.059633]  entry_INT80_32+0xf0/0xf0
[  298.060486] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 97

Home

------------[ cut here ]------------
[  298.034129] WARNING: CPU: 0 PID: 1423 at drivers/gpu/drm/drm_rect.c:138 drm_rect_calc_hscale+0x54/0x68
[  298.034129] Modules linked in:
[  298.036123] CPU: 0 PID: 1423 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  298.036846] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  298.037635] EIP: drm_rect_calc_hscale+0x54/0x68
[  298.038397] Code: 99 f7 f9 89 c1 39 cb 7f 2d 39 4d 08 7c 28 5b 89 c8 5d c3 8d b4 26 00 00 00 00 8d 44 08 ff 99 f7 f9 85 c0 89 c1 79 de eb e5 90 <0f> 0b 5b b9 ea ff ff ff 89 c8 5d c3 b9 de ff ff ff eb d1 90 3e 8d
[  298.039800] EAX: ffff0000 EBX: 00000000 ECX: 00010000 EDX: ffff0000
[  298.040478] ESI: c1179d38 EDI: 7fffffff EBP: c30bbebc ESP: c30bbeb8
[  298.040972] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00010286
[  298.041318] CR0: 80050033 CR2: f59c8000 CR3: 19a35000 CR4: 000006d0
[  298.041318] DR0: d9a94800 DR1: d9a94801 DR2: d9a94803 DR3: d9a94805
[  298.041318] DR6: ffff0ff0 DR7: 00000600
[  298.041318] Call Trace:
[  298.044461]  ? show_regs+0x52/0x5c
[  298.044870]  ? drm_rect_calc_hscale+0x54/0x68
[  298.045500]  ? __warn+0x89/0x15c
[  298.045807]  ? drm_rect_calc_hscale+0x54/0x68
[  298.046613]  ? drm_rect_calc_hscale+0x54/0x68
[  298.047235]  ? report_bug+0x189/0x1b0
[  298.047666]  ? drm_rect_calc_hscale+0x55/0x68
[  298.048267]  ? exc_overflow+0x50/0x50
[  298.048732]  ? handle_bug+0x56/0x90
[  298.048928]  ? exc_invalid_op+0x1b/0x70
[  298.049587]  ? dequeue_entity+0x172/0x570
[  298.050227]  ? sched_clock_cpu+0x75/0x3b4
[  298.050650]  ? handle_exception+0x133/0x133
[  298.051291]  ? exc_overflow+0x50/0x50
[  298.051756]  ? drm_rect_calc_hscale+0x54/0x68
[  298.052160]  ? exc_overflow+0x50/0x50
[  298.052690]  ? drm_rect_calc_hscale+0x54/0x68
[  298.053267]  drm_test_rect_calc_hscale+0x38/0xa8
[  298.053832]  ? ktime_get_ts64+0x4f/0x178
[  298.054270]  kunit_try_run_case+0x8a/0x1c4
[  298.054704]  ? ttwu_queue_wakelist+0xe3/0xe8
[  298.055484]  ? _raw_spin_lock_irqsave+0x28/0x6c
[  298.055936]  ? _raw_spin_unlock_irqrestore+0x1a/0x40
[  298.056621]  ? preempt_count_sub+0x54/0x78
[  298.056914]  kunit_generic_run_threadfn_adapter+0x16/0x20
[  298.057556]  kthread+0xe0/0x108
[  298.057958]  ? kunit_try_catch_throw+0x1c/0x1c
[  298.058190]  ? kthread_complete_and_exit+0x1c/0x1c
[  298.058443]  ret_from_fork+0x40/0x4c
[  298.058489]  ? kthread_complete_and_exit+0x1c/0x1c
[  298.059254]  ret_from_fork_asm+0x12/0x18
[  298.059633]  entry_INT80_32+0xf0/0xf0
[  298.060486] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 98

Home

------------[ cut here ]------------
[  298.064568] WARNING: CPU: 0 PID: 1425 at drivers/gpu/drm/drm_rect.c:138 drm_rect_calc_hscale+0x54/0x68
[  298.065815] Modules linked in:
[  298.066281] CPU: 0 PID: 1425 Comm: kunit_try_catch Tainted: G    B   W        N 6.6.74-rc1 #1
[  298.066739] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  298.067884] EIP: drm_rect_calc_hscale+0x54/0x68
[  298.068447] Code: 99 f7 f9 89 c1 39 cb 7f 2d 39 4d 08 7c 28 5b 89 c8 5d c3 8d b4 26 00 00 00 00 8d 44 08 ff 99 f7 f9 85 c0 89 c1 79 de eb e5 90 <0f> 0b 5b b9 ea ff ff ff 89 c8 5d c3 b9 de ff ff ff eb d1 90 3e 8d
[  298.069955] EAX: 00010000 EBX: 00000000 ECX: ffff0000 EDX: ffff0000
[  298.070435] ESI: c1179d38 EDI: 7fffffff EBP: c30b1ebc ESP: c30b1eb8
[  298.070909] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00010286
[  298.071788] CR0: 80050033 CR2: f59c8000 CR3: 19a35000 CR4: 000006d0
[  298.072094] DR0: d9a94800 DR1: d9a94801 DR2: d9a94803 DR3: d9a94805
[  298.072331] DR6: ffff0ff0 DR7: 00000600
[  298.072843] Call Trace:
[  298.073562]  ? show_regs+0x52/0x5c
[  298.073889]  ? drm_rect_calc_hscale+0x54/0x68
[  298.074278]  ? __warn+0x89/0x15c
[  298.074518]  ? drm_rect_calc_hscale+0x54/0x68
[  298.074953]  ? drm_rect_calc_hscale+0x54/0x68
[  298.075572]  ? report_bug+0x189/0x1b0
[  298.075772]  ? drm_rect_calc_hscale+0x55/0x68
[  298.075964]  ? exc_overflow+0x50/0x50
[  298.076476]  ? handle_bug+0x56/0x90
[  298.077004]  ? exc_invalid_op+0x1b/0x70
[  298.077338]  ? handle_exception+0x133/0x133
[  298.077599]  ? exc_overflow+0x50/0x50
[  298.077823]  ? drm_rect_calc_hscale+0x54/0x68
[  298.077914]  ? exc_overflow+0x50/0x50
[  298.077914]  ? drm_rect_calc_hscale+0x54/0x68
[  298.077914]  drm_test_rect_calc_hscale+0x38/0xa8
[  298.079605]  ? ktime_get_ts64+0x4f/0x178
[  298.079963]  kunit_try_run_case+0x8a/0x1c4
[  298.080536]  ? _raw_spin_lock_irqsave+0x28/0x6c
[  298.081259]  ? _raw_spin_unlock_irqrestore+0x1a/0x40
[  298.081686]  ? preempt_count_sub+0x54/0x78
[  298.081981]  kunit_generic_run_threadfn_adapter+0x16/0x20
[  298.082166]  kthread+0xe0/0x108
[  298.082166]  ? kunit_try_catch_throw+0x1c/0x1c
[  298.082166]  ? kthread_complete_and_exit+0x1c/0x1c
[  298.082166]  ret_from_fork+0x40/0x4c
[  298.083760]  ? kthread_complete_and_exit+0x1c/0x1c
[  298.085447]  ret_from_fork_asm+0x12/0x18
[  298.086140]  entry_INT80_32+0xf0/0xf0
[  298.087230] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 99

Home

------------[ cut here ]------------
[  298.101269] WARNING: CPU: 1 PID: 1435 at drivers/gpu/drm/drm_rect.c:138 drm_rect_calc_vscale+0x50/0x70
[  298.102837] Modules linked in:
[  298.104029] CPU: 1 PID: 1435 Comm: kunit_try_catch Tainted: G    B   W        N 6.6.74-rc1 #1
[  298.104788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  298.105268] EIP: drm_rect_calc_vscale+0x50/0x70
[  298.105557] Code: e2 10 39 d0 7f 14 99 f7 f9 89 c1 39 cb 7f 27 39 4d 08 7c 22 5b 89 c8 5d c3 90 8d 44 08 ff 99 f7 f9 85 c0 89 c1 79 e4 eb eb 90 <0f> 0b 5b b9 ea ff ff ff 89 c8 5d c3 b9 de ff ff ff eb d7 cc cc cc
[  298.107266] EAX: ffff0000 EBX: 00000000 ECX: 00010000 EDX: ffff0000
[  298.107843] ESI: c1179d38 EDI: 7fffffff EBP: c30c1ebc ESP: c30c1eb8
[  298.108617] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00010286
[  298.109498] CR0: 80050033 CR2: f59c6fe0 CR3: 19a35000 CR4: 000006d0
[  298.110183] DR0: d9a94804 DR1: d9a94809 DR2: d9a9480a DR3: d9a9480b
[  298.110794] DR6: ffff0ff0 DR7: 00000600
[  298.111379] Call Trace:
[  298.111681]  ? show_regs+0x52/0x5c
[  298.112242]  ? drm_rect_calc_vscale+0x50/0x70
[  298.112678]  ? __warn+0x89/0x15c
[  298.113277]  ? drm_rect_calc_vscale+0x50/0x70
[  298.113709]  ? drm_rect_calc_vscale+0x50/0x70
[  298.114415]  ? report_bug+0x189/0x1b0
[  298.114787]  ? drm_rect_calc_vscale+0x51/0x70
[  298.115511]  ? exc_overflow+0x50/0x50
[  298.115892]  ? handle_bug+0x56/0x90
[  298.116478]  ? exc_invalid_op+0x1b/0x70
[  298.116933]  ? dequeue_entity+0x172/0x570
[  298.117477]  ? sched_clock_cpu+0x75/0x3b4
[  298.117920]  ? handle_exception+0x133/0x133
[  298.118624]  ? exc_overflow+0x50/0x50
[  298.119018]  ? drm_rect_calc_vscale+0x50/0x70
[  298.119686]  ? exc_overflow+0x50/0x50
[  298.120238]  ? drm_rect_calc_vscale+0x50/0x70
[  298.120645]  drm_test_rect_calc_vscale+0x38/0xac
[  298.121305]  ? ktime_get_ts64+0x4f/0x178
[  298.121891]  kunit_try_run_case+0x8a/0x1c4
[  298.122478]  ? ttwu_queue_wakelist+0xe3/0xe8
[  298.123151]  ? _raw_spin_lock_irqsave+0x28/0x6c
[  298.123638]  ? _raw_spin_unlock_irqrestore+0x1a/0x40
[  298.124018]  ? preempt_count_sub+0x54/0x78
[  298.124550]  kunit_generic_run_threadfn_adapter+0x16/0x20
[  298.125237]  kthread+0xe0/0x108
[  298.125591]  ? kunit_try_catch_throw+0x1c/0x1c
[  298.126218]  ? kthread_complete_and_exit+0x1c/0x1c
[  298.126574]  ret_from_fork+0x40/0x4c
[  298.126754]  ? kthread_complete_and_exit+0x1c/0x1c
[  298.126964]  ret_from_fork_asm+0x12/0x18
[  298.127437]  entry_INT80_32+0xf0/0xf0
[  298.127863] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[  298.131974] WARNING: CPU: 0 PID: 1437 at drivers/gpu/drm/drm_rect.c:138 drm_rect_calc_vscale+0x50/0x70
[  298.132475] Modules linked in:
[  298.132475] CPU: 0 PID: 1437 Comm: kunit_try_catch Tainted: G    B   W        N 6.6.74-rc1 #1
[  298.133619] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  298.134022] EIP: drm_rect_calc_vscale+0x50/0x70
[  298.134723] Code: e2 10 39 d0 7f 14 99 f7 f9 89 c1 39 cb 7f 27 39 4d 08 7c 22 5b 89 c8 5d c3 90 8d 44 08 ff 99 f7 f9 85 c0 89 c1 79 e4 eb eb 90 <0f> 0b 5b b9 ea ff ff ff 89 c8 5d c3 b9 de ff ff ff eb d7 cc cc cc
[  298.135782] EAX: 00010000 EBX: 00000000 ECX: ffff0000 EDX: ffff0000
[  298.136280] ESI: c1179d38 EDI: 7fffffff EBP: c30b9ebc ESP: c30b9eb8
[  298.136649] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00010286
[  298.136651] CR0: 80050033 CR2: f59c8000 CR3: 19a35000 CR4: 000006d0
[  298.136651] DR0: d9a94800 DR1: d9a94801 DR2: d9a94803 DR3: d9a94805
[  298.136651] DR6: ffff0ff0 DR7: 00000600
[  298.138362] Call Trace:
[  298.138633]  ? show_regs+0x52/0x5c
[  298.139633]  ? drm_rect_calc_vscale+0x50/0x70
[  298.140805]  ? __warn+0x89/0x15c
[  298.141883]  ? drm_rect_calc_vscale+0x50/0x70
[  298.142613]  ? drm_rect_calc_vscale+0x50/0x70
[  298.143489]  ? report_bug+0x189/0x1b0
[  298.143865]  ? drm_rect_calc_vscale+0x51/0x70
[  298.144429]  ? exc_overflow+0x50/0x50
[  298.144783]  ? handle_bug+0x56/0x90
[  298.144959]  ? exc_invalid_op+0x1b/0x70
[  298.145400]  ? dequeue_entity+0x172/0x570
[  298.145796]  ? sched_clock_cpu+0x75/0x3b4
[  298.146362]  ? handle_exception+0x133/0x133
[  298.146755]  ? exc_overflow+0x50/0x50
[  298.147630]  ? drm_rect_calc_vscale+0x50/0x70
[  298.148002]  ? exc_overflow+0x50/0x50
[  298.149255]  ? drm_rect_calc_vscale+0x50/0x70
[  298.149653]  drm_test_rect_calc_vscale+0x38/0xac
[  298.149860]  ? ktime_get_ts64+0x4f/0x178
[  298.150174]  kunit_try_run_case+0x8a/0x1c4
[  298.150174]  ? ttwu_queue_wakelist+0xe3/0xe8
[  298.150174]  ? _raw_spin_lock_irqsave+0x28/0x6c
[  298.151418]  ? _raw_spin_unlock_irqrestore+0x1a/0x40
[  298.151735]  ? preempt_count_sub+0x54/0x78
[  298.151948]  kunit_generic_run_threadfn_adapter+0x16/0x20
[  298.152579]  kthread+0xe0/0x108
[  298.152749]  ? kunit_try_catch_throw+0x1c/0x1c
[  298.153317]  ? kthread_complete_and_exit+0x1c/0x1c
[  298.153710]  ret_from_fork+0x40/0x4c
[  298.154008]  ? kthread_complete_and_exit+0x1c/0x1c
[  298.154486]  ret_from_fork_asm+0x12/0x18
[  298.154774]  entry_INT80_32+0xf0/0xf0
[  298.155443] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 100

Home

------------[ cut here ]------------
[  298.101269] WARNING: CPU: 1 PID: 1435 at drivers/gpu/drm/drm_rect.c:138 drm_rect_calc_vscale+0x50/0x70
[  298.102837] Modules linked in:
[  298.104029] CPU: 1 PID: 1435 Comm: kunit_try_catch Tainted: G    B   W        N 6.6.74-rc1 #1
[  298.104788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  298.105268] EIP: drm_rect_calc_vscale+0x50/0x70
[  298.105557] Code: e2 10 39 d0 7f 14 99 f7 f9 89 c1 39 cb 7f 27 39 4d 08 7c 22 5b 89 c8 5d c3 90 8d 44 08 ff 99 f7 f9 85 c0 89 c1 79 e4 eb eb 90 <0f> 0b 5b b9 ea ff ff ff 89 c8 5d c3 b9 de ff ff ff eb d7 cc cc cc
[  298.107266] EAX: ffff0000 EBX: 00000000 ECX: 00010000 EDX: ffff0000
[  298.107843] ESI: c1179d38 EDI: 7fffffff EBP: c30c1ebc ESP: c30c1eb8
[  298.108617] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00010286
[  298.109498] CR0: 80050033 CR2: f59c6fe0 CR3: 19a35000 CR4: 000006d0
[  298.110183] DR0: d9a94804 DR1: d9a94809 DR2: d9a9480a DR3: d9a9480b
[  298.110794] DR6: ffff0ff0 DR7: 00000600
[  298.111379] Call Trace:
[  298.111681]  ? show_regs+0x52/0x5c
[  298.112242]  ? drm_rect_calc_vscale+0x50/0x70
[  298.112678]  ? __warn+0x89/0x15c
[  298.113277]  ? drm_rect_calc_vscale+0x50/0x70
[  298.113709]  ? drm_rect_calc_vscale+0x50/0x70
[  298.114415]  ? report_bug+0x189/0x1b0
[  298.114787]  ? drm_rect_calc_vscale+0x51/0x70
[  298.115511]  ? exc_overflow+0x50/0x50
[  298.115892]  ? handle_bug+0x56/0x90
[  298.116478]  ? exc_invalid_op+0x1b/0x70
[  298.116933]  ? dequeue_entity+0x172/0x570
[  298.117477]  ? sched_clock_cpu+0x75/0x3b4
[  298.117920]  ? handle_exception+0x133/0x133
[  298.118624]  ? exc_overflow+0x50/0x50
[  298.119018]  ? drm_rect_calc_vscale+0x50/0x70
[  298.119686]  ? exc_overflow+0x50/0x50
[  298.120238]  ? drm_rect_calc_vscale+0x50/0x70
[  298.120645]  drm_test_rect_calc_vscale+0x38/0xac
[  298.121305]  ? ktime_get_ts64+0x4f/0x178
[  298.121891]  kunit_try_run_case+0x8a/0x1c4
[  298.122478]  ? ttwu_queue_wakelist+0xe3/0xe8
[  298.123151]  ? _raw_spin_lock_irqsave+0x28/0x6c
[  298.123638]  ? _raw_spin_unlock_irqrestore+0x1a/0x40
[  298.124018]  ? preempt_count_sub+0x54/0x78
[  298.124550]  kunit_generic_run_threadfn_adapter+0x16/0x20
[  298.125237]  kthread+0xe0/0x108
[  298.125591]  ? kunit_try_catch_throw+0x1c/0x1c
[  298.126218]  ? kthread_complete_and_exit+0x1c/0x1c
[  298.126574]  ret_from_fork+0x40/0x4c
[  298.126754]  ? kthread_complete_and_exit+0x1c/0x1c
[  298.126964]  ret_from_fork_asm+0x12/0x18
[  298.127437]  entry_INT80_32+0xf0/0xf0
[  298.127863] ---[ end trace 0000000000000000 ]---
---
------------[ cut here ]------------
[  298.131974] WARNING: CPU: 0 PID: 1437 at drivers/gpu/drm/drm_rect.c:138 drm_rect_calc_vscale+0x50/0x70
[  298.132475] Modules linked in:
[  298.132475] CPU: 0 PID: 1437 Comm: kunit_try_catch Tainted: G    B   W        N 6.6.74-rc1 #1
[  298.133619] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  298.134022] EIP: drm_rect_calc_vscale+0x50/0x70
[  298.134723] Code: e2 10 39 d0 7f 14 99 f7 f9 89 c1 39 cb 7f 27 39 4d 08 7c 22 5b 89 c8 5d c3 90 8d 44 08 ff 99 f7 f9 85 c0 89 c1 79 e4 eb eb 90 <0f> 0b 5b b9 ea ff ff ff 89 c8 5d c3 b9 de ff ff ff eb d7 cc cc cc
[  298.135782] EAX: 00010000 EBX: 00000000 ECX: ffff0000 EDX: ffff0000
[  298.136280] ESI: c1179d38 EDI: 7fffffff EBP: c30b9ebc ESP: c30b9eb8
[  298.136649] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00010286
[  298.136651] CR0: 80050033 CR2: f59c8000 CR3: 19a35000 CR4: 000006d0
[  298.136651] DR0: d9a94800 DR1: d9a94801 DR2: d9a94803 DR3: d9a94805
[  298.136651] DR6: ffff0ff0 DR7: 00000600
[  298.138362] Call Trace:
[  298.138633]  ? show_regs+0x52/0x5c
[  298.139633]  ? drm_rect_calc_vscale+0x50/0x70
[  298.140805]  ? __warn+0x89/0x15c
[  298.141883]  ? drm_rect_calc_vscale+0x50/0x70
[  298.142613]  ? drm_rect_calc_vscale+0x50/0x70
[  298.143489]  ? report_bug+0x189/0x1b0
[  298.143865]  ? drm_rect_calc_vscale+0x51/0x70
[  298.144429]  ? exc_overflow+0x50/0x50
[  298.144783]  ? handle_bug+0x56/0x90
[  298.144959]  ? exc_invalid_op+0x1b/0x70
[  298.145400]  ? dequeue_entity+0x172/0x570
[  298.145796]  ? sched_clock_cpu+0x75/0x3b4
[  298.146362]  ? handle_exception+0x133/0x133
[  298.146755]  ? exc_overflow+0x50/0x50
[  298.147630]  ? drm_rect_calc_vscale+0x50/0x70
[  298.148002]  ? exc_overflow+0x50/0x50
[  298.149255]  ? drm_rect_calc_vscale+0x50/0x70
[  298.149653]  drm_test_rect_calc_vscale+0x38/0xac
[  298.149860]  ? ktime_get_ts64+0x4f/0x178
[  298.150174]  kunit_try_run_case+0x8a/0x1c4
[  298.150174]  ? ttwu_queue_wakelist+0xe3/0xe8
[  298.150174]  ? _raw_spin_lock_irqsave+0x28/0x6c
[  298.151418]  ? _raw_spin_unlock_irqrestore+0x1a/0x40
[  298.151735]  ? preempt_count_sub+0x54/0x78
[  298.151948]  kunit_generic_run_threadfn_adapter+0x16/0x20
[  298.152579]  kthread+0xe0/0x108
[  298.152749]  ? kunit_try_catch_throw+0x1c/0x1c
[  298.153317]  ? kthread_complete_and_exit+0x1c/0x1c
[  298.153710]  ret_from_fork+0x40/0x4c
[  298.154008]  ? kthread_complete_and_exit+0x1c/0x1c
[  298.154486]  ret_from_fork_asm+0x12/0x18
[  298.154774]  entry_INT80_32+0xf0/0xf0
[  298.155443] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 101

Home

[   26.251677] ==================================================================
[   26.252085] BUG: KFENCE: invalid free in test_double_free+0x75/0x130
[   26.252085] 
[   26.252125] Invalid free of 0x(ptrval) (in kfence-#38):
[   26.252125]  test_double_free+0x75/0x130
[   26.252125]  kunit_try_run_case+0x8a/0x1c4
[   26.252125]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   26.252125]  kthread+0xe0/0x108
[   26.252125]  ret_from_fork+0x40/0x4c
[   26.252125]  ret_from_fork_asm+0x12/0x18
[   26.252125]  restore_all_switch_stack+0x0/0xc3
[   26.252125] 
[   26.252125] kfence-#38: 0x(ptrval)-0x(ptrval), size=32, cache=test
[   26.252125] 
[   26.252125] allocated by task 149 on cpu 1 at 26.251515s:
[   26.252125]  test_alloc+0xed/0x2d4
[   26.252125]  test_double_free+0x50/0x130
[   26.252125]  kunit_try_run_case+0x8a/0x1c4
[   26.252125]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   26.252125]  kthread+0xe0/0x108
[   26.252125]  ret_from_fork+0x40/0x4c
[   26.252125]  ret_from_fork_asm+0x12/0x18
[   26.252125]  restore_all_switch_stack+0x0/0xc3
[   26.252125] 
[   26.252125] freed by task 149 on cpu 1 at 26.251573s:
[   26.252125]  test_double_free+0x65/0x130
[   26.252125]  kunit_try_run_case+0x8a/0x1c4
[   26.252125]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   26.252125]  kthread+0xe0/0x108
[   26.252125]  ret_from_fork+0x40/0x4c
[   26.252125]  ret_from_fork_asm+0x12/0x18
[   26.252125]  restore_all_switch_stack+0x0/0xc3
[   26.252125] 
[   26.252125] CPU: 1 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   26.252125] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.252125] ==================================================================

test log snippet boot parser 102

Home

[   26.147737] ==================================================================
[   26.148089] BUG: KFENCE: invalid free in test_double_free+0xb7/0x130
[   26.148089] 
[   26.148089] Invalid free of 0x(ptrval) (in kfence-#37):
[   26.148089]  test_double_free+0xb7/0x130
[   26.148089]  kunit_try_run_case+0x8a/0x1c4
[   26.148089]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   26.148089]  kthread+0xe0/0x108
[   26.148089]  ret_from_fork+0x40/0x4c
[   26.148089]  ret_from_fork_asm+0x12/0x18
[   26.148089]  restore_all_switch_stack+0x0/0xc3
[   26.148089] 
[   26.148089] kfence-#37: 0x(ptrval)-0x(ptrval), size=32, cache=kmalloc-32
[   26.148089] 
[   26.148089] allocated by task 147 on cpu 0 at 26.147487s:
[   26.148089]  test_alloc+0x153/0x2d4
[   26.148089]  test_double_free+0x50/0x130
[   26.148089]  kunit_try_run_case+0x8a/0x1c4
[   26.148089]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   26.148089]  kthread+0xe0/0x108
[   26.148089]  ret_from_fork+0x40/0x4c
[   26.148089]  ret_from_fork_asm+0x12/0x18
[   26.148089]  restore_all_switch_stack+0x0/0xc3
[   26.148089] 
[   26.148089] freed by task 147 on cpu 0 at 26.147558s:
[   26.148089]  test_double_free+0xa7/0x130
[   26.148089]  kunit_try_run_case+0x8a/0x1c4
[   26.148089]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   26.148089]  kthread+0xe0/0x108
[   26.148089]  ret_from_fork+0x40/0x4c
[   26.148089]  ret_from_fork_asm+0x12/0x18
[   26.148089]  restore_all_switch_stack+0x0/0xc3
[   26.148089] 
[   26.148089] CPU: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   26.148089] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.148089] ==================================================================

test log snippet boot parser 103

Home

[   26.459719] ==================================================================
[   26.460115] BUG: KFENCE: invalid free in test_invalid_addr_free+0x66/0x130
[   26.460115] 
[   26.460115] Invalid free of 0x(ptrval) (in kfence-#40):
[   26.460115]  test_invalid_addr_free+0x66/0x130
[   26.460115]  kunit_try_run_case+0x8a/0x1c4
[   26.460115]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   26.460115]  kthread+0xe0/0x108
[   26.460115]  ret_from_fork+0x40/0x4c
[   26.460115]  ret_from_fork_asm+0x12/0x18
[   26.460115]  restore_all_switch_stack+0x0/0xc3
[   26.460115] 
[   26.460115] kfence-#40: 0x(ptrval)-0x(ptrval), size=32, cache=test
[   26.460115] 
[   26.460115] allocated by task 153 on cpu 1 at 26.459583s:
[   26.460115]  test_alloc+0xed/0x2d4
[   26.460115]  test_invalid_addr_free+0x50/0x130
[   26.460115]  kunit_try_run_case+0x8a/0x1c4
[   26.460115]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   26.460115]  kthread+0xe0/0x108
[   26.460115]  ret_from_fork+0x40/0x4c
[   26.460115]  ret_from_fork_asm+0x12/0x18
[   26.460115]  restore_all_switch_stack+0x0/0xc3
[   26.460115] 
[   26.460115] CPU: 1 PID: 153 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   26.460115] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.460115] ==================================================================

test log snippet boot parser 104

Home

[   26.355625] ==================================================================
[   26.356101] BUG: KFENCE: invalid free in test_invalid_addr_free+0xa7/0x130
[   26.356101] 
[   26.356101] Invalid free of 0x(ptrval) (in kfence-#39):
[   26.356101]  test_invalid_addr_free+0xa7/0x130
[   26.356101]  kunit_try_run_case+0x8a/0x1c4
[   26.356101]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   26.356101]  kthread+0xe0/0x108
[   26.356101]  ret_from_fork+0x40/0x4c
[   26.356101]  ret_from_fork_asm+0x12/0x18
[   26.356101]  restore_all_switch_stack+0x0/0xc3
[   26.356101] 
[   26.356101] kfence-#39: 0x(ptrval)-0x(ptrval), size=32, cache=kmalloc-32
[   26.356101] 
[   26.356101] allocated by task 151 on cpu 1 at 26.355497s:
[   26.356101]  test_alloc+0x153/0x2d4
[   26.356101]  test_invalid_addr_free+0x50/0x130
[   26.356101]  kunit_try_run_case+0x8a/0x1c4
[   26.356101]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   26.356101]  kthread+0xe0/0x108
[   26.356101]  ret_from_fork+0x40/0x4c
[   26.356101]  ret_from_fork_asm+0x12/0x18
[   26.356101]  restore_all_switch_stack+0x0/0xc3
[   26.356101] 
[   26.356101] CPU: 1 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   26.356101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.356101] ==================================================================

test log snippet boot parser 105

Home

[   32.493754] ==================================================================
[   32.494578] BUG: KFENCE: invalid read in test_invalid_access+0x3b/0xac
[   32.494578] 
[   32.494578] Invalid read at 0x(ptrval):
[   32.494578]  test_invalid_access+0x3b/0xac
[   32.494578]  kunit_try_run_case+0x8a/0x1c4
[   32.494578]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   32.494578]  kthread+0xe0/0x108
[   32.494578]  ret_from_fork+0x40/0x4c
[   32.494578]  ret_from_fork_asm+0x12/0x18
[   32.494578]  restore_all_switch_stack+0x0/0xc3
[   32.494578] 
[   32.494578] CPU: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   32.494578] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.494578] ==================================================================

test log snippet boot parser 106

Home

[   26.979597] ==================================================================
[   26.980113] BUG: KFENCE: memory corruption in test_corruption+0xad/0x1b0
[   26.980113] 
[   26.980113] Corrupted memory at 0x(ptrval) [ ! ] (in kfence-#45):
[   26.980113]  test_corruption+0xad/0x1b0
[   26.980113]  kunit_try_run_case+0x8a/0x1c4
[   26.980113]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   26.980113]  kthread+0xe0/0x108
[   26.980113]  ret_from_fork+0x40/0x4c
[   26.980113]  ret_from_fork_asm+0x12/0x18
[   26.980113]  restore_all_switch_stack+0x0/0xc3
[   26.980113] 
[   26.980113] kfence-#45: 0x(ptrval)-0x(ptrval), size=32, cache=test
[   26.980113] 
[   26.980113] allocated by task 157 on cpu 1 at 26.979481s:
[   26.980113]  test_alloc+0xed/0x2d4
[   26.980113]  test_corruption+0x8f/0x1b0
[   26.980113]  kunit_try_run_case+0x8a/0x1c4
[   26.980113]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   26.980113]  kthread+0xe0/0x108
[   26.980113]  ret_from_fork+0x40/0x4c
[   26.980113]  ret_from_fork_asm+0x12/0x18
[   26.980113]  restore_all_switch_stack+0x0/0xc3
[   26.980113] 
[   26.980113] freed by task 157 on cpu 1 at 26.979536s:
[   26.980113]  test_corruption+0xad/0x1b0
[   26.980113]  kunit_try_run_case+0x8a/0x1c4
[   26.980113]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   26.980113]  kthread+0xe0/0x108
[   26.980113]  ret_from_fork+0x40/0x4c
[   26.980113]  ret_from_fork_asm+0x12/0x18
[   26.980113]  restore_all_switch_stack+0x0/0xc3
[   26.980113] 
[   26.980113] CPU: 1 PID: 157 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   26.980113] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.980113] ==================================================================

test log snippet boot parser 107

Home

[   26.875611] ==================================================================
[   26.876002] BUG: KFENCE: memory corruption in test_corruption+0x6b/0x1b0
[   26.876002] 
[   26.876089] Corrupted memory at 0x(ptrval) [ ! . . . . . . . . . . . . . . . ] (in kfence-#44):
[   26.876089]  test_corruption+0x6b/0x1b0
[   26.876089]  kunit_try_run_case+0x8a/0x1c4
[   26.876089]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   26.876089]  kthread+0xe0/0x108
[   26.876089]  ret_from_fork+0x40/0x4c
[   26.876089]  ret_from_fork_asm+0x12/0x18
[   26.876089]  restore_all_switch_stack+0x0/0xc3
[   26.876089] 
[   26.876089] kfence-#44: 0x(ptrval)-0x(ptrval), size=32, cache=test
[   26.876089] 
[   26.876089] allocated by task 157 on cpu 1 at 26.875488s:
[   26.876089]  test_alloc+0xed/0x2d4
[   26.876089]  test_corruption+0x51/0x1b0
[   26.876089]  kunit_try_run_case+0x8a/0x1c4
[   26.876089]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   26.876089]  kthread+0xe0/0x108
[   26.876089]  ret_from_fork+0x40/0x4c
[   26.876089]  ret_from_fork_asm+0x12/0x18
[   26.876089]  restore_all_switch_stack+0x0/0xc3
[   26.876089] 
[   26.876089] freed by task 157 on cpu 1 at 26.875551s:
[   26.876089]  test_corruption+0x6b/0x1b0
[   26.876089]  kunit_try_run_case+0x8a/0x1c4
[   26.876089]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   26.876089]  kthread+0xe0/0x108
[   26.876089]  ret_from_fork+0x40/0x4c
[   26.876089]  ret_from_fork_asm+0x12/0x18
[   26.876089]  restore_all_switch_stack+0x0/0xc3
[   26.876089] 
[   26.876089] CPU: 1 PID: 157 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   26.876089] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.876089] ==================================================================

test log snippet boot parser 108

Home

[   26.563719] ==================================================================
[   26.564091] BUG: KFENCE: memory corruption in test_corruption+0xdf/0x1b0
[   26.564091] 
[   26.564091] Corrupted memory at 0x(ptrval) [ ! . . . . . . . . . . . . . . . ] (in kfence-#41):
[   26.564091]  test_corruption+0xdf/0x1b0
[   26.564091]  kunit_try_run_case+0x8a/0x1c4
[   26.564091]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   26.564091]  kthread+0xe0/0x108
[   26.564091]  ret_from_fork+0x40/0x4c
[   26.564091]  ret_from_fork_asm+0x12/0x18
[   26.564091]  restore_all_switch_stack+0x0/0xc3
[   26.564091] 
[   26.564091] kfence-#41: 0x(ptrval)-0x(ptrval), size=32, cache=kmalloc-32
[   26.564091] 
[   26.564091] allocated by task 155 on cpu 0 at 26.563478s:
[   26.564091]  test_alloc+0x153/0x2d4
[   26.564091]  test_corruption+0x51/0x1b0
[   26.564091]  kunit_try_run_case+0x8a/0x1c4
[   26.564091]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   26.564091]  kthread+0xe0/0x108
[   26.564091]  ret_from_fork+0x40/0x4c
[   26.564091]  ret_from_fork_asm+0x12/0x18
[   26.564091]  restore_all_switch_stack+0x0/0xc3
[   26.564091] 
[   26.564091] freed by task 155 on cpu 0 at 26.563558s:
[   26.564091]  test_corruption+0xdf/0x1b0
[   26.564091]  kunit_try_run_case+0x8a/0x1c4
[   26.564091]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   26.564091]  kthread+0xe0/0x108
[   26.564091]  ret_from_fork+0x40/0x4c
[   26.564091]  ret_from_fork_asm+0x12/0x18
[   26.564091]  restore_all_switch_stack+0x0/0xc3
[   26.564091] 
[   26.564091] CPU: 0 PID: 155 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   26.564091] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.564091] ==================================================================

test log snippet boot parser 109

Home

[   26.771791] ==================================================================
[   26.772131] BUG: KFENCE: memory corruption in test_corruption+0x137/0x1b0
[   26.772131] 
[   26.772131] Corrupted memory at 0x(ptrval) [ ! ] (in kfence-#43):
[   26.772131]  test_corruption+0x137/0x1b0
[   26.772131]  kunit_try_run_case+0x8a/0x1c4
[   26.772131]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   26.772131]  kthread+0xe0/0x108
[   26.772131]  ret_from_fork+0x40/0x4c
[   26.772131]  ret_from_fork_asm+0x12/0x18
[   26.772131]  restore_all_switch_stack+0x0/0xc3
[   26.772131] 
[   26.772131] kfence-#43: 0x(ptrval)-0x(ptrval), size=32, cache=kmalloc-32
[   26.772131] 
[   26.772131] allocated by task 155 on cpu 0 at 26.771539s:
[   26.772131]  test_alloc+0x153/0x2d4
[   26.772131]  test_corruption+0x8f/0x1b0
[   26.772131]  kunit_try_run_case+0x8a/0x1c4
[   26.772131]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   26.772131]  kthread+0xe0/0x108
[   26.772131]  ret_from_fork+0x40/0x4c
[   26.772131]  ret_from_fork_asm+0x12/0x18
[   26.772131]  restore_all_switch_stack+0x0/0xc3
[   26.772131] 
[   26.772131] freed by task 155 on cpu 0 at 26.771621s:
[   26.772131]  test_corruption+0x137/0x1b0
[   26.772131]  kunit_try_run_case+0x8a/0x1c4
[   26.772131]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   26.772131]  kthread+0xe0/0x108
[   26.772131]  ret_from_fork+0x40/0x4c
[   26.772131]  ret_from_fork_asm+0x12/0x18
[   26.772131]  restore_all_switch_stack+0x0/0xc3
[   26.772131] 
[   26.772131] CPU: 0 PID: 155 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   26.772131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.772131] ==================================================================

test log snippet boot parser 110

Home

[   32.283687] ==================================================================
[   32.284107] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x9f/0x140
[   32.284107] 
[   32.284107] Corrupted memory at 0x(ptrval) [ ! . . . . . . ] (in kfence-#96):
[   32.284107]  test_kmalloc_aligned_oob_write+0x9f/0x140
[   32.284107]  kunit_try_run_case+0x8a/0x1c4
[   32.284107]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   32.284107]  kthread+0xe0/0x108
[   32.284107]  ret_from_fork+0x40/0x4c
[   32.284107]  ret_from_fork_asm+0x12/0x18
[   32.284107]  restore_all_switch_stack+0x0/0xc3
[   32.284107] 
[   32.284107] kfence-#96: 0x(ptrval)-0x(ptrval), size=73, cache=kmalloc-96
[   32.284107] 
[   32.284107] allocated by task 169 on cpu 0 at 32.283477s:
[   32.284107]  test_alloc+0x153/0x2d4
[   32.284107]  test_kmalloc_aligned_oob_write+0x48/0x140
[   32.284107]  kunit_try_run_case+0x8a/0x1c4
[   32.284107]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   32.284107]  kthread+0xe0/0x108
[   32.284107]  ret_from_fork+0x40/0x4c
[   32.284107]  ret_from_fork_asm+0x12/0x18
[   32.284107]  restore_all_switch_stack+0x0/0xc3
[   32.284107] 
[   32.284107] freed by task 169 on cpu 0 at 32.283571s:
[   32.284107]  test_kmalloc_aligned_oob_write+0x9f/0x140
[   32.284107]  kunit_try_run_case+0x8a/0x1c4
[   32.284107]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   32.284107]  kthread+0xe0/0x108
[   32.284107]  ret_from_fork+0x40/0x4c
[   32.284107]  ret_from_fork_asm+0x12/0x18
[   32.284107]  restore_all_switch_stack+0x0/0xc3
[   32.284107] 
[   32.284107] CPU: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   32.284107] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.284107] ==================================================================

test log snippet boot parser 111

Home

[   32.179505] ==================================================================
[   32.179930] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x82/0x1b0
[   32.179930] 
[   32.180089] Out-of-bounds read at 0x(ptrval) (81B right of kfence-#95):
[   32.180089]  test_kmalloc_aligned_oob_read+0x82/0x1b0
[   32.180089]  kunit_try_run_case+0x8a/0x1c4
[   32.180089]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   32.180089]  kthread+0xe0/0x108
[   32.180089]  ret_from_fork+0x40/0x4c
[   32.180089]  ret_from_fork_asm+0x12/0x18
[   32.180089]  restore_all_switch_stack+0x0/0xc3
[   32.180089] 
[   32.180089] kfence-#95: 0x(ptrval)-0x(ptrval), size=73, cache=kmalloc-96
[   32.180089] 
[   32.180089] allocated by task 167 on cpu 0 at 32.179402s:
[   32.180089]  test_alloc+0x153/0x2d4
[   32.180089]  test_kmalloc_aligned_oob_read+0x55/0x1b0
[   32.180089]  kunit_try_run_case+0x8a/0x1c4
[   32.180089]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   32.180089]  kthread+0xe0/0x108
[   32.180089]  ret_from_fork+0x40/0x4c
[   32.180089]  ret_from_fork_asm+0x12/0x18
[   32.180089]  restore_all_switch_stack+0x0/0xc3
[   32.180089] 
[   32.180089] CPU: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   32.180089] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.180089] ==================================================================

test log snippet boot parser 112

Home

[   24.900101] ==================================================================
[   24.900101] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x6f/0x1d8
[   24.900101] 
[   24.900101] Out-of-bounds read at 0x(ptrval) (1B left of kfence-#25):
[   24.900101]  test_out_of_bounds_read+0x6f/0x1d8
[   24.900101]  kunit_try_run_case+0x8a/0x1c4
[   24.900101]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   24.900101]  kthread+0xe0/0x108
[   24.900101]  ret_from_fork+0x40/0x4c
[   24.900101]  ret_from_fork_asm+0x12/0x18
[   24.900101]  restore_all_switch_stack+0x0/0xc3
[   24.900101] 
[   24.900101] kfence-#25: 0x(ptrval)-0x(ptrval), size=32, cache=kmalloc-32
[   24.900101] 
[   24.900101] allocated by task 135 on cpu 1 at 24.899503s:
[   24.900101]  test_alloc+0x153/0x2d4
[   24.900101]  test_out_of_bounds_read+0x67/0x1d8
[   24.900101]  kunit_try_run_case+0x8a/0x1c4
[   24.900101]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   24.900101]  kthread+0xe0/0x108
[   24.900101]  ret_from_fork+0x40/0x4c
[   24.900101]  ret_from_fork_asm+0x12/0x18
[   24.900101]  restore_all_switch_stack+0x0/0xc3
[   24.900101] 
[   24.900101] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G                 N 6.6.74-rc1 #1
[   24.900101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.900101] ==================================================================

test log snippet boot parser 113

Home

[   25.211753] ==================================================================
[   25.212132] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0xaf/0x1d8
[   25.212132] 
[   25.212132] Out-of-bounds read at 0x(ptrval) (32B right of kfence-#28):
[   25.212132]  test_out_of_bounds_read+0xaf/0x1d8
[   25.212132]  kunit_try_run_case+0x8a/0x1c4
[   25.212132]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   25.212132]  kthread+0xe0/0x108
[   25.212132]  ret_from_fork+0x40/0x4c
[   25.212132]  ret_from_fork_asm+0x12/0x18
[   25.212132]  restore_all_switch_stack+0x0/0xc3
[   25.212132] 
[   25.212132] kfence-#28: 0x(ptrval)-0x(ptrval), size=32, cache=kmalloc-32
[   25.212132] 
[   25.212132] allocated by task 135 on cpu 1 at 25.211585s:
[   25.212132]  test_alloc+0x153/0x2d4
[   25.212132]  test_out_of_bounds_read+0xa8/0x1d8
[   25.212132]  kunit_try_run_case+0x8a/0x1c4
[   25.212132]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   25.212132]  kthread+0xe0/0x108
[   25.212132]  ret_from_fork+0x40/0x4c
[   25.212132]  ret_from_fork_asm+0x12/0x18
[   25.212132]  restore_all_switch_stack+0x0/0xc3
[   25.212132] 
[   25.212132] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   25.212132] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.212132] ==================================================================

test log snippet boot parser 114

Home

[   25.315521] ==================================================================
[   25.315806] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x6f/0x1d8
[   25.315806] 
[   25.316090] Out-of-bounds read at 0x(ptrval) (1B left of kfence-#29):
[   25.316090]  test_out_of_bounds_read+0x6f/0x1d8
[   25.316090]  kunit_try_run_case+0x8a/0x1c4
[   25.316090]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   25.316090]  kthread+0xe0/0x108
[   25.316090]  ret_from_fork+0x40/0x4c
[   25.316090]  ret_from_fork_asm+0x12/0x18
[   25.316090]  restore_all_switch_stack+0x0/0xc3
[   25.316090] 
[   25.316090] kfence-#29: 0x(ptrval)-0x(ptrval), size=32, cache=test
[   25.316090] 
[   25.316090] allocated by task 137 on cpu 0 at 25.315477s:
[   25.316090]  test_alloc+0xed/0x2d4
[   25.316090]  test_out_of_bounds_read+0x67/0x1d8
[   25.316090]  kunit_try_run_case+0x8a/0x1c4
[   25.316090]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   25.316090]  kthread+0xe0/0x108
[   25.316090]  ret_from_fork+0x40/0x4c
[   25.316090]  ret_from_fork_asm+0x12/0x18
[   25.316090]  restore_all_switch_stack+0x0/0xc3
[   25.316090] 
[   25.316090] CPU: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   25.316090] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.316090] ==================================================================

test log snippet boot parser 115

Home

[   25.523702] ==================================================================
[   25.524116] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0xaf/0x1d8
[   25.524116] 
[   25.524116] Out-of-bounds read at 0x(ptrval) (32B right of kfence-#31):
[   25.524116]  test_out_of_bounds_read+0xaf/0x1d8
[   25.524116]  kunit_try_run_case+0x8a/0x1c4
[   25.524116]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   25.524116]  kthread+0xe0/0x108
[   25.524116]  ret_from_fork+0x40/0x4c
[   25.524116]  ret_from_fork_asm+0x12/0x18
[   25.524116]  restore_all_switch_stack+0x0/0xc3
[   25.524116] 
[   25.524116] kfence-#31: 0x(ptrval)-0x(ptrval), size=32, cache=test
[   25.524116] 
[   25.524116] allocated by task 137 on cpu 0 at 25.523657s:
[   25.524116]  test_alloc+0xed/0x2d4
[   25.524116]  test_out_of_bounds_read+0xa8/0x1d8
[   25.524116]  kunit_try_run_case+0x8a/0x1c4
[   25.524116]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   25.524116]  kthread+0xe0/0x108
[   25.524116]  ret_from_fork+0x40/0x4c
[   25.524116]  ret_from_fork_asm+0x12/0x18
[   25.524116]  restore_all_switch_stack+0x0/0xc3
[   25.524116] 
[   25.524116] CPU: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   25.524116] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.524116] ==================================================================

test log snippet boot parser 116

Home

[   25.627576] ==================================================================
[   25.627978] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x59/0x108
[   25.627978] 
[   25.628091] Out-of-bounds write at 0x(ptrval) (1B left of kfence-#32):
[   25.628091]  test_out_of_bounds_write+0x59/0x108
[   25.628091]  kunit_try_run_case+0x8a/0x1c4
[   25.628091]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   25.628091]  kthread+0xe0/0x108
[   25.628091]  ret_from_fork+0x40/0x4c
[   25.628091]  ret_from_fork_asm+0x12/0x18
[   25.628091]  restore_all_switch_stack+0x0/0xc3
[   25.628091] 
[   25.628091] kfence-#32: 0x(ptrval)-0x(ptrval), size=32, cache=kmalloc-32
[   25.628091] 
[   25.628091] allocated by task 139 on cpu 1 at 25.627485s:
[   25.628091]  test_alloc+0x153/0x2d4
[   25.628091]  test_out_of_bounds_write+0x57/0x108
[   25.628091]  kunit_try_run_case+0x8a/0x1c4
[   25.628091]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   25.628091]  kthread+0xe0/0x108
[   25.628091]  ret_from_fork+0x40/0x4c
[   25.628091]  ret_from_fork_asm+0x12/0x18
[   25.628091]  restore_all_switch_stack+0x0/0xc3
[   25.628091] 
[   25.628091] CPU: 1 PID: 139 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   25.628091] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.628091] ==================================================================

test log snippet boot parser 117

Home

[   25.835586] ==================================================================
[   25.836006] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x59/0x108
[   25.836006] 
[   25.836102] Out-of-bounds write at 0x(ptrval) (1B left of kfence-#34):
[   25.836102]  test_out_of_bounds_write+0x59/0x108
[   25.836102]  kunit_try_run_case+0x8a/0x1c4
[   25.836102]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   25.836102]  kthread+0xe0/0x108
[   25.836102]  ret_from_fork+0x40/0x4c
[   25.836102]  ret_from_fork_asm+0x12/0x18
[   25.836102]  restore_all_switch_stack+0x0/0xc3
[   25.836102] 
[   25.836102] kfence-#34: 0x(ptrval)-0x(ptrval), size=32, cache=test
[   25.836102] 
[   25.836102] allocated by task 141 on cpu 0 at 25.835540s:
[   25.836102]  test_alloc+0xed/0x2d4
[   25.836102]  test_out_of_bounds_write+0x57/0x108
[   25.836102]  kunit_try_run_case+0x8a/0x1c4
[   25.836102]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   25.836102]  kthread+0xe0/0x108
[   25.836102]  ret_from_fork+0x40/0x4c
[   25.836102]  ret_from_fork_asm+0x12/0x18
[   25.836102]  restore_all_switch_stack+0x0/0xc3
[   25.836102] 
[   25.836102] CPU: 0 PID: 141 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   25.836102] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.836102] ==================================================================

test log snippet boot parser 118

Home

[   58.179738] ==================================================================
[   58.180088] BUG: KFENCE: use-after-free read in test_krealloc+0x250/0x4b0
[   58.180088] 
[   58.180088] Use-after-free read at 0x(ptrval) (in kfence-#101):
[   58.180088]  test_krealloc+0x250/0x4b0
[   58.180088]  kunit_try_run_case+0x8a/0x1c4
[   58.180088]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   58.180088]  kthread+0xe0/0x108
[   58.180088]  ret_from_fork+0x40/0x4c
[   58.180088]  ret_from_fork_asm+0x12/0x18
[   58.180088]  restore_all_switch_stack+0x0/0xc3
[   58.180088] 
[   58.180088] kfence-#101: 0x(ptrval)-0x(ptrval), size=32, cache=kmalloc-32
[   58.180088] 
[   58.180088] allocated by task 181 on cpu 0 at 58.179324s:
[   58.180088]  test_alloc+0x153/0x2d4
[   58.180088]  test_krealloc+0x44/0x4b0
[   58.180088]  kunit_try_run_case+0x8a/0x1c4
[   58.180088]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   58.180088]  kthread+0xe0/0x108
[   58.180088]  ret_from_fork+0x40/0x4c
[   58.180088]  ret_from_fork_asm+0x12/0x18
[   58.180088]  restore_all_switch_stack+0x0/0xc3
[   58.180088] 
[   58.180088] freed by task 181 on cpu 0 at 58.179514s:
[   58.180088]  krealloc+0x6c/0x1d4
[   58.180088]  test_krealloc+0x9c/0x4b0
[   58.180088]  kunit_try_run_case+0x8a/0x1c4
[   58.180088]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   58.180088]  kthread+0xe0/0x108
[   58.180088]  ret_from_fork+0x40/0x4c
[   58.180088]  ret_from_fork_asm+0x12/0x18
[   58.180088]  restore_all_switch_stack+0x0/0xc3
[   58.180088] 
[   58.180088] CPU: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   58.180088] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   58.180088] ==================================================================

test log snippet boot parser 119

Home

[   58.081436] ==================================================================
[   58.081868] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0xa0/0x2b8
[   58.081868] 
[   58.082104] Use-after-free read at 0x(ptrval) (in kfence-#100):
[   58.082104]  test_memcache_typesafe_by_rcu+0xa0/0x2b8
[   58.082104]  kunit_try_run_case+0x8a/0x1c4
[   58.082104]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   58.082104]  kthread+0xe0/0x108
[   58.082104]  ret_from_fork+0x40/0x4c
[   58.082104]  ret_from_fork_asm+0x12/0x18
[   58.082104]  restore_all_switch_stack+0x0/0xc3
[   58.082104] 
[   58.082104] kfence-#100: 0x(ptrval)-0x(ptrval), size=32, cache=test
[   58.082104] 
[   58.082104] allocated by task 179 on cpu 1 at 58.075420s:
[   58.082104]  test_alloc+0xed/0x2d4
[   58.082104]  test_memcache_typesafe_by_rcu+0x64/0x2b8
[   58.082104]  kunit_try_run_case+0x8a/0x1c4
[   58.082104]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   58.082104]  kthread+0xe0/0x108
[   58.082104]  ret_from_fork+0x40/0x4c
[   58.082104]  ret_from_fork_asm+0x12/0x18
[   58.082104]  restore_all_switch_stack+0x0/0xc3
[   58.082104] 
[   58.082104] freed by task 0 on cpu 1 at 58.081171s:
[   58.082104]  rcu_guarded_free+0x15/0x18
[   58.082104]  rcu_core+0x277/0xa24
[   58.082104]  rcu_core_si+0xd/0x10
[   58.082104]  handle_softirqs+0xe0/0x36c
[   58.082104]  __do_softirq+0xf/0x11
[   58.082104]  call_on_stack+0x4c/0x58
[   58.082104]  do_softirq_own_stack+0x21/0x24
[   58.082104]  irq_exit_rcu+0x86/0xb0
[   58.082104]  sysvec_apic_timer_interrupt+0x2c/0x40
[   58.082104]  handle_exception_return+0x0/0xad
[   58.082104]  default_idle+0xb/0x10
[   58.082104]  default_idle_call+0x34/0xe8
[   58.082104]  do_idle+0x1f9/0x23c
[   58.082104]  cpu_startup_entry+0x29/0x2c
[   58.082104]  start_secondary+0x113/0x134
[   58.082104]  startup_32_smp+0x156/0x158
[   58.082104] 
[   58.082104] CPU: 1 PID: 179 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   58.082104] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   58.082104] ==================================================================

test log snippet boot parser 120

Home

[   26.043608] ==================================================================
[   26.043959] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x65/0x110
[   26.043959] 
[   26.044091] Use-after-free read at 0x(ptrval) (in kfence-#36):
[   26.044091]  test_use_after_free_read+0x65/0x110
[   26.044091]  kunit_try_run_case+0x8a/0x1c4
[   26.044091]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   26.044091]  kthread+0xe0/0x108
[   26.044091]  ret_from_fork+0x40/0x4c
[   26.044091]  ret_from_fork_asm+0x12/0x18
[   26.044091]  restore_all_switch_stack+0x0/0xc3
[   26.044091] 
[   26.044091] kfence-#36: 0x(ptrval)-0x(ptrval), size=32, cache=test
[   26.044091] 
[   26.044091] allocated by task 145 on cpu 1 at 26.043484s:
[   26.044091]  test_alloc+0xed/0x2d4
[   26.044091]  test_use_after_free_read+0x50/0x110
[   26.044091]  kunit_try_run_case+0x8a/0x1c4
[   26.044091]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   26.044091]  kthread+0xe0/0x108
[   26.044091]  ret_from_fork+0x40/0x4c
[   26.044091]  ret_from_fork_asm+0x12/0x18
[   26.044091]  restore_all_switch_stack+0x0/0xc3
[   26.044091] 
[   26.044091] freed by task 145 on cpu 1 at 26.043543s:
[   26.044091]  test_use_after_free_read+0x65/0x110
[   26.044091]  kunit_try_run_case+0x8a/0x1c4
[   26.044091]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   26.044091]  kthread+0xe0/0x108
[   26.044091]  ret_from_fork+0x40/0x4c
[   26.044091]  ret_from_fork_asm+0x12/0x18
[   26.044091]  restore_all_switch_stack+0x0/0xc3
[   26.044091] 
[   26.044091] CPU: 1 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   26.044091] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.044091] ==================================================================

test log snippet boot parser 121

Home

[   25.939755] ==================================================================
[   25.940109] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x97/0x110
[   25.940109] 
[   25.940109] Use-after-free read at 0x(ptrval) (in kfence-#35):
[   25.940109]  test_use_after_free_read+0x97/0x110
[   25.940109]  kunit_try_run_case+0x8a/0x1c4
[   25.940109]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   25.940109]  kthread+0xe0/0x108
[   25.940109]  ret_from_fork+0x40/0x4c
[   25.940109]  ret_from_fork_asm+0x12/0x18
[   25.940109]  restore_all_switch_stack+0x0/0xc3
[   25.940109] 
[   25.940109] kfence-#35: 0x(ptrval)-0x(ptrval), size=32, cache=kmalloc-32
[   25.940109] 
[   25.940109] allocated by task 143 on cpu 0 at 25.939529s:
[   25.940109]  test_alloc+0x153/0x2d4
[   25.940109]  test_use_after_free_read+0x50/0x110
[   25.940109]  kunit_try_run_case+0x8a/0x1c4
[   25.940109]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   25.940109]  kthread+0xe0/0x108
[   25.940109]  ret_from_fork+0x40/0x4c
[   25.940109]  ret_from_fork_asm+0x12/0x18
[   25.940109]  restore_all_switch_stack+0x0/0xc3
[   25.940109] 
[   25.940109] freed by task 143 on cpu 0 at 25.939613s:
[   25.940109]  test_use_after_free_read+0x97/0x110
[   25.940109]  kunit_try_run_case+0x8a/0x1c4
[   25.940109]  kunit_generic_run_threadfn_adapter+0x16/0x20
[   25.940109]  kthread+0xe0/0x108
[   25.940109]  ret_from_fork+0x40/0x4c
[   25.940109]  ret_from_fork_asm+0x12/0x18
[   25.940109]  restore_all_switch_stack+0x0/0xc3
[   25.940109] 
[   25.940109] CPU: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   25.940109] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.940109] ==================================================================

test log snippet boot parser 122

Home

------------[ cut here ]------------
[    4.813354] systemd[1]: systemd 256.5-1 running in system mode (+PAM +AUDIT +SELINUX +APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBCRYPTSETUP_PLUGINS +LIBFDISK +PCRE2 +PWQUALITY +P11KIT +QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT +LIBARCHIVE)
[    4.817932] WARNING: CPU: 0 PID: 0 at kernel/smp.c:786 smp_call_function_many_cond+0x4b0/0x5dc
[    4.850799] systemd[1]: Detected architecture arm.
[    4.859436] Modules linked in:
[    4.859466] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.6.74-rc1 #1
[    4.859466] Hardware name: Generic DRA74X (Flattened Device Tree)
[    4.859466]  unwind_backtrace from show_stack+0x18/0x1c
[    4.885009]  show_stack from dump_stack_lvl+0x58/0x70
[    4.890075]  dump_stack_lvl from __warn+0x80/0x12c
[    4.894927]  __warn from warn_slowpath_fmt+0x18c/0x194
[    4.900115]  warn_slowpath_fmt from smp_call_function_many_cond+0x4b0/0x5dc
[    4.907135]  smp_call_function_many_cond from smp_call_function+0x34/0x3c
[    4.913940]  smp_call_function from set_memory_valid+0x84/0xc0
[    4.919830]  set_memory_valid from kfence_guarded_free+0x16c/0x2e0
[    4.926055]  kfence_guarded_free from rcu_core+0x2cc/0x998
[    4.931579]  rcu_core from handle_softirqs+0x15c/0x3dc
[    4.936767]  handle_softirqs from irq_exit+0xac/0xd4
[    4.941772]  irq_exit from __irq_svc+0x78/0x9c
[    4.946228] Exception stack(0xc2201f18 to 0xc2201f60)
[    4.951324] 1f00:                                                       0005272c 00000001
[    4.959533] 1f20: 2da61000 00000000 c2210040 c248d7bc c2209f60 c2209fbc 00000000 00000000
[    4.967773] 1f40: 00000000 c20dea70 c248d048 c2201f68 c14bd210 c14bd214 600f0013 ffffffff
[    4.975982]  __irq_svc from default_idle_call+0x20/0xc0
[    4.981231]  default_idle_call from do_idle+0x234/0x2c4
[    4.986480]  do_idle from cpu_startup_entry+0x30/0x34
[    4.991577]  cpu_startup_entry from rest_init+0xb4/0xb8
[    4.996826]  rest_init from arch_post_acpi_subsys_init+0x0/0x18
[    5.002838] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 123

Home

------------[ cut here ]------------
[    4.813354] systemd[1]: systemd 256.5-1 running in system mode (+PAM +AUDIT +SELINUX +APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBCRYPTSETUP_PLUGINS +LIBFDISK +PCRE2 +PWQUALITY +P11KIT +QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT +LIBARCHIVE)
[    4.817932] WARNING: CPU: 0 PID: 0 at kernel/smp.c:786 smp_call_function_many_cond+0x4b0/0x5dc
[    4.850799] systemd[1]: Detected architecture arm.
[    4.859436] Modules linked in:
[    4.859466] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.6.74-rc1 #1
[    4.859466] Hardware name: Generic DRA74X (Flattened Device Tree)
[    4.859466]  unwind_backtrace from show_stack+0x18/0x1c
[    4.885009]  show_stack from dump_stack_lvl+0x58/0x70
[    4.890075]  dump_stack_lvl from __warn+0x80/0x12c
[    4.894927]  __warn from warn_slowpath_fmt+0x18c/0x194
[    4.900115]  warn_slowpath_fmt from smp_call_function_many_cond+0x4b0/0x5dc
[    4.907135]  smp_call_function_many_cond from smp_call_function+0x34/0x3c
[    4.913940]  smp_call_function from set_memory_valid+0x84/0xc0
[    4.919830]  set_memory_valid from kfence_guarded_free+0x16c/0x2e0
[    4.926055]  kfence_guarded_free from rcu_core+0x2cc/0x998
[    4.931579]  rcu_core from handle_softirqs+0x15c/0x3dc
[    4.936767]  handle_softirqs from irq_exit+0xac/0xd4
[    4.941772]  irq_exit from __irq_svc+0x78/0x9c
[    4.946228] Exception stack(0xc2201f18 to 0xc2201f60)
[    4.951324] 1f00:                                                       0005272c 00000001
[    4.959533] 1f20: 2da61000 00000000 c2210040 c248d7bc c2209f60 c2209fbc 00000000 00000000
[    4.967773] 1f40: 00000000 c20dea70 c248d048 c2201f68 c14bd210 c14bd214 600f0013 ffffffff
[    4.975982]  __irq_svc from default_idle_call+0x20/0xc0
[    4.981231]  default_idle_call from do_idle+0x234/0x2c4
[    4.986480]  do_idle from cpu_startup_entry+0x30/0x34
[    4.991577]  cpu_startup_entry from rest_init+0xb4/0xb8
[    4.996826]  rest_init from arch_post_acpi_subsys_init+0x0/0x18
[    5.002838] ---[ end trace 0000000000000000 ]---

test log snippet test parser 1

Home

------------[ cut here ]------------
[   60.534683] Modules linked in: snd_soc_hdmi_codec venus_dec venus_enc videobuf2_dma_contig pm8916_wdt crct10dif_ce qcom_wcnss_pil coresight_stm coresight_cpu_debug coresight_cti stm_core qcom_camss coresight_tmc coresight_tpiu coresight_funnel coresight_replicator snd_soc_lpass_apq8016 coresight adv7511 snd_soc_lpass_cpu venus_core qrtr videobuf2_dma_sg cec msm snd_soc_lpass_platform v4l2_fwnode snd_soc_msm8916_digital snd_soc_msm8916_analog snd_soc_apq8016_sbc snd_soc_qcom_common qcom_q6v5_mss v4l2_mem2mem v4l2_async qcom_pil_info qcom_q6v5 qcom_sysmon videobuf2_v4l2 qcom_spmi_temp_alarm llcc_qcom qcom_spmi_vadc rtc_pm8xxx qcom_common qcom_pon qcom_vadc_common ocmem qcom_glink_smem videodev qcom_stats mdt_loader qnoc_msm8916 qmi_helpers videobuf2_memops gpu_sched videobuf2_common drm_dp_aux_bus qcom_rng mc drm_display_helper rpmsg_ctrl icc_smd_rpm rpmsg_char phy_qcom_usb_hs display_connector drm_kms_helper socinfo rmtfs_mem fuse drm backlight ip_tables x_tables
[   60.662949] CPU: 2 PID: 1450 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[   60.983948] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   61.035373] lr : kvmalloc_node+0x50/0xe8
[   61.345493] sp : ffff800085ecbce0
[   61.351010] x29: ffff800085ecbcf0 x28: ffff00000f230000 x27: 0000000000000000
[   61.369269] x23: 0000000080000000 x22: ffff800080386d68 x21: 0000000200002000
[   61.413431] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   61.731882] x11: 0000000000000040 x10: b7b7fcdb7d76d400 x9 : b7b7fcdb7d76d400
[   61.783700] x5 : 0000000000000000 x4 : ffff800085ecbca0 x3 : 0000000000000000
[   62.102293] Call trace:
[   62.107691]  kvmalloc_node+0xe0/0xe8
[   62.147935]  alloc_fdtable+0x7c/0x108
[   62.463135]  expand_files+0x114/0x2f0
[   62.468451]  ksys_dup3+0x60/0xf4
[   62.514977]  __arm64_sys_dup3+0x20/0x30
[   62.829902]  invoke_syscall+0x40/0x100
[   62.838474]  el0_svc_common+0xa8/0xd8
[   62.882238]  do_el0_svc+0x1c/0x28
[   62.915638]  el0_svc+0x38/0x64
[   62.920796]  el0t_64_sync_handler+0x90/0xfc
[   62.925994]  el0t_64_sync+0x190/0x194
[   62.931185] ---[ end trace 0000000000000000 ]---

test log snippet test parser 2

Home

------------[ cut here ]------------
[   60.534683] Modules linked in: snd_soc_hdmi_codec venus_dec venus_enc videobuf2_dma_contig pm8916_wdt crct10dif_ce qcom_wcnss_pil coresight_stm coresight_cpu_debug coresight_cti stm_core qcom_camss coresight_tmc coresight_tpiu coresight_funnel coresight_replicator snd_soc_lpass_apq8016 coresight adv7511 snd_soc_lpass_cpu venus_core qrtr videobuf2_dma_sg cec msm snd_soc_lpass_platform v4l2_fwnode snd_soc_msm8916_digital snd_soc_msm8916_analog snd_soc_apq8016_sbc snd_soc_qcom_common qcom_q6v5_mss v4l2_mem2mem v4l2_async qcom_pil_info qcom_q6v5 qcom_sysmon videobuf2_v4l2 qcom_spmi_temp_alarm llcc_qcom qcom_spmi_vadc rtc_pm8xxx qcom_common qcom_pon qcom_vadc_common ocmem qcom_glink_smem videodev qcom_stats mdt_loader qnoc_msm8916 qmi_helpers videobuf2_memops gpu_sched videobuf2_common drm_dp_aux_bus qcom_rng mc drm_display_helper rpmsg_ctrl icc_smd_rpm rpmsg_char phy_qcom_usb_hs display_connector drm_kms_helper socinfo rmtfs_mem fuse drm backlight ip_tables x_tables
[   60.662949] CPU: 2 PID: 1450 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[   60.983948] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   61.035373] lr : kvmalloc_node+0x50/0xe8
[   61.345493] sp : ffff800085ecbce0
[   61.351010] x29: ffff800085ecbcf0 x28: ffff00000f230000 x27: 0000000000000000
[   61.369269] x23: 0000000080000000 x22: ffff800080386d68 x21: 0000000200002000
[   61.413431] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   61.731882] x11: 0000000000000040 x10: b7b7fcdb7d76d400 x9 : b7b7fcdb7d76d400
[   61.783700] x5 : 0000000000000000 x4 : ffff800085ecbca0 x3 : 0000000000000000
[   62.102293] Call trace:
[   62.107691]  kvmalloc_node+0xe0/0xe8
[   62.147935]  alloc_fdtable+0x7c/0x108
[   62.463135]  expand_files+0x114/0x2f0
[   62.468451]  ksys_dup3+0x60/0xf4
[   62.514977]  __arm64_sys_dup3+0x20/0x30
[   62.829902]  invoke_syscall+0x40/0x100
[   62.838474]  el0_svc_common+0xa8/0xd8
[   62.882238]  do_el0_svc+0x1c/0x28
[   62.915638]  el0_svc+0x38/0x64
[   62.920796]  el0t_64_sync_handler+0x90/0xfc
[   62.925994]  el0t_64_sync+0x190/0x194
[   62.931185] ---[ end trace 0000000000000000 ]---

test log snippet test parser 3

Home

------------[ cut here ]------------
[  155.201545] WARNING: CPU: 0 PID: 1859 at mm/util.c:632 kvmalloc_node+0xfc/0x10c
[  155.208980] Modules linked in: ax88179_178a usbnet fuse ip_tables x_tables snd_soc_hdmi_codec venus_enc venus_dec videobuf2_dma_contig lontium_lt9611 qcom_camss videobuf2_dma_sg mcp251xfd v4l2_fwnode v4l2_async venus_core xhci_pci v4l2_mem2mem videobuf2_memops xhci_pci_renesas videobuf2_v4l2 can_dev qcom_spmi_temp_alarm rtc_pm8xxx leds_qcom_lpg led_class_multicolor qcom_pon qcom_spmi_adc5 qcom_vadc_common ath10k_snoc hci_uart videodev btqca msm snd_soc_sdm845 snd_soc_rt5663 snd_soc_qcom_common snd_soc_rl6231 btbcm ocmem reset_qcom_pdc ath10k_core soundwire_bus videobuf2_common ath gpu_sched i2c_qcom_geni qcom_stats mac80211 mc drm_dp_aux_bus drm_display_helper crct10dif_ce camcc_sdm845 qcrypto authenc bluetooth libarc4 ecdh_generic phy_qcom_qmp_combo ecc typec spi_geni_qcom qcom_rng phy_qcom_qusb2 phy_qcom_qmp_usb gpi libdes coresight_stm cfg80211 coresight_tmc qrtr coresight_funnel coresight_replicator stm_core ufs_qcom phy_qcom_qmp_ufs icc_osm_l3 qcom_q6v5_mss qcom_q6v5_pas phy_qcom_qmp_pcie rfkill qcom_wdt lmh
[  155.209218]  coresight slim_qcom_ngd_ctrl slimbus pdr_interface qcom_pil_info qcom_q6v5 qcom_sysmon llcc_qcom icc_bwmon qcom_common qcom_glink_smem mdt_loader qmi_helpers display_connector drm_kms_helper drm socinfo backlight rmtfs_mem
[  155.321185] CPU: 0 PID: 1859 Comm: unshare_test Tainted: G        W          6.6.74-rc1 #1
[  155.329570] Hardware name: Thundercomm Dragonboard 845c (DT)
[  155.335317] pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  155.342377] pc : kvmalloc_node+0xfc/0x10c
[  155.346453] lr : kvmalloc_node+0x64/0x10c
[  155.350528] sp : ffff800088a13ce0
[  155.353898] x29: ffff800088a13cf0 x28: ffff33870980d000 x27: 0000000000000000
[  155.361138] x26: 0000000000000000 x25: 0000000000000000 x24: ffff338700eb6f40
[  155.368379] x23: ffff338700eb6ec0 x22: ffffa2f6af6eece4 x21: 00000000ffffffff
[  155.375621] x20: 0000000200002000 x19: 0000000000400cc0 x18: 0000000000000000
[  155.382865] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  155.390109] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[  155.397347] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[  155.404587] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000001
[  155.411825] x5 : 0000000000000000 x4 : ffff33870980d000 x3 : 0000000000000000
[  155.419071] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[  155.426316] Call trace:
[  155.428810]  kvmalloc_node+0xfc/0x10c
[  155.432529]  alloc_fdtable+0x94/0x114
[  155.436250]  expand_files+0x78/0x318
[  155.439884]  ksys_dup3+0x60/0x128
[  155.443260]  __arm64_sys_dup3+0x20/0x30
[  155.447163]  invoke_syscall+0x48/0x114
[  155.450972]  el0_svc_common.constprop.0+0x40/0xe0
[  155.455748]  do_el0_svc+0x1c/0x28
[  155.459116]  el0_svc+0x38/0xc8
[  155.462222]  el0t_64_sync_handler+0x120/0x12c
[  155.466653]  el0t_64_sync+0x190/0x194
[  155.470375] ---[ end trace 0000000000000000 ]---

test log snippet test parser 4

Home

------------[ cut here ]------------
[  155.201545] WARNING: CPU: 0 PID: 1859 at mm/util.c:632 kvmalloc_node+0xfc/0x10c
[  155.208980] Modules linked in: ax88179_178a usbnet fuse ip_tables x_tables snd_soc_hdmi_codec venus_enc venus_dec videobuf2_dma_contig lontium_lt9611 qcom_camss videobuf2_dma_sg mcp251xfd v4l2_fwnode v4l2_async venus_core xhci_pci v4l2_mem2mem videobuf2_memops xhci_pci_renesas videobuf2_v4l2 can_dev qcom_spmi_temp_alarm rtc_pm8xxx leds_qcom_lpg led_class_multicolor qcom_pon qcom_spmi_adc5 qcom_vadc_common ath10k_snoc hci_uart videodev btqca msm snd_soc_sdm845 snd_soc_rt5663 snd_soc_qcom_common snd_soc_rl6231 btbcm ocmem reset_qcom_pdc ath10k_core soundwire_bus videobuf2_common ath gpu_sched i2c_qcom_geni qcom_stats mac80211 mc drm_dp_aux_bus drm_display_helper crct10dif_ce camcc_sdm845 qcrypto authenc bluetooth libarc4 ecdh_generic phy_qcom_qmp_combo ecc typec spi_geni_qcom qcom_rng phy_qcom_qusb2 phy_qcom_qmp_usb gpi libdes coresight_stm cfg80211 coresight_tmc qrtr coresight_funnel coresight_replicator stm_core ufs_qcom phy_qcom_qmp_ufs icc_osm_l3 qcom_q6v5_mss qcom_q6v5_pas phy_qcom_qmp_pcie rfkill qcom_wdt lmh
[  155.209218]  coresight slim_qcom_ngd_ctrl slimbus pdr_interface qcom_pil_info qcom_q6v5 qcom_sysmon llcc_qcom icc_bwmon qcom_common qcom_glink_smem mdt_loader qmi_helpers display_connector drm_kms_helper drm socinfo backlight rmtfs_mem
[  155.321185] CPU: 0 PID: 1859 Comm: unshare_test Tainted: G        W          6.6.74-rc1 #1
[  155.329570] Hardware name: Thundercomm Dragonboard 845c (DT)
[  155.335317] pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  155.342377] pc : kvmalloc_node+0xfc/0x10c
[  155.346453] lr : kvmalloc_node+0x64/0x10c
[  155.350528] sp : ffff800088a13ce0
[  155.353898] x29: ffff800088a13cf0 x28: ffff33870980d000 x27: 0000000000000000
[  155.361138] x26: 0000000000000000 x25: 0000000000000000 x24: ffff338700eb6f40
[  155.368379] x23: ffff338700eb6ec0 x22: ffffa2f6af6eece4 x21: 00000000ffffffff
[  155.375621] x20: 0000000200002000 x19: 0000000000400cc0 x18: 0000000000000000
[  155.382865] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  155.390109] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[  155.397347] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[  155.404587] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000001
[  155.411825] x5 : 0000000000000000 x4 : ffff33870980d000 x3 : 0000000000000000
[  155.419071] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[  155.426316] Call trace:
[  155.428810]  kvmalloc_node+0xfc/0x10c
[  155.432529]  alloc_fdtable+0x94/0x114
[  155.436250]  expand_files+0x78/0x318
[  155.439884]  ksys_dup3+0x60/0x128
[  155.443260]  __arm64_sys_dup3+0x20/0x30
[  155.447163]  invoke_syscall+0x48/0x114
[  155.450972]  el0_svc_common.constprop.0+0x40/0xe0
[  155.455748]  do_el0_svc+0x1c/0x28
[  155.459116]  el0_svc+0x38/0xc8
[  155.462222]  el0t_64_sync_handler+0x120/0x12c
[  155.466653]  el0t_64_sync+0x190/0x194
[  155.470375] ---[ end trace 0000000000000000 ]---

test log snippet test parser 5

Home

------------[ cut here ]------------
[   51.726600] WARNING: CPU: 7 PID: 1420 at mm/util.c:632 kvmalloc_node+0xe0/0xe8
[   51.726693] Modules linked in: crct10dif_ce fuse drm backlight ip_tables x_tables
[   51.728322] CPU: 7 PID: 1420 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[   51.735087] Hardware name: WinLink E850-96 board (DT)
[   51.740125] pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   51.747066] pc : kvmalloc_node+0xe0/0xe8
[   51.750972] lr : kvmalloc_node+0x50/0xe8
[   51.754878] sp : ffff80008410bce0
[   51.758176] x29: ffff80008410bcf0 x28: ffff000801c1f000 x27: 0000000000000000
[   51.765294] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[   51.772412] x23: 0000000080000000 x22: ffff800080306d68 x21: 0000000200002000
[   51.779532] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[   51.786648] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   51.793768] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   51.800884] x11: 0000000000000040 x10: 1601a0ad9893a300 x9 : 1601a0ad9893a300
[   51.808002] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000038
[   51.815120] x5 : 0000000000000000 x4 : ffff80008410bca0 x3 : 0000000000000000
[   51.822238] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[   51.829360] Call trace:
[   51.831790]  kvmalloc_node+0xe0/0xe8
[   51.835347]  alloc_fdtable+0x7c/0x108
[   51.838991]  expand_files+0x114/0x2f0
[   51.842637]  ksys_dup3+0x60/0xf4
[   51.845849]  __arm64_sys_dup3+0x20/0x30
[   51.849668]  invoke_syscall+0x40/0x100
[   51.853401]  el0_svc_common+0xa8/0xd8
[   51.857048]  do_el0_svc+0x1c/0x28
[   51.860345]  el0_svc+0x38/0x64
[   51.863383]  el0t_64_sync_handler+0x90/0xfc
[   51.867551]  el0t_64_sync+0x190/0x194
[   51.871200] ---[ end trace 0000000000000000 ]---

test log snippet test parser 6

Home

------------[ cut here ]------------
[   51.726600] WARNING: CPU: 7 PID: 1420 at mm/util.c:632 kvmalloc_node+0xe0/0xe8
[   51.726693] Modules linked in: crct10dif_ce fuse drm backlight ip_tables x_tables
[   51.728322] CPU: 7 PID: 1420 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[   51.735087] Hardware name: WinLink E850-96 board (DT)
[   51.740125] pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   51.747066] pc : kvmalloc_node+0xe0/0xe8
[   51.750972] lr : kvmalloc_node+0x50/0xe8
[   51.754878] sp : ffff80008410bce0
[   51.758176] x29: ffff80008410bcf0 x28: ffff000801c1f000 x27: 0000000000000000
[   51.765294] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[   51.772412] x23: 0000000080000000 x22: ffff800080306d68 x21: 0000000200002000
[   51.779532] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[   51.786648] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   51.793768] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   51.800884] x11: 0000000000000040 x10: 1601a0ad9893a300 x9 : 1601a0ad9893a300
[   51.808002] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000038
[   51.815120] x5 : 0000000000000000 x4 : ffff80008410bca0 x3 : 0000000000000000
[   51.822238] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[   51.829360] Call trace:
[   51.831790]  kvmalloc_node+0xe0/0xe8
[   51.835347]  alloc_fdtable+0x7c/0x108
[   51.838991]  expand_files+0x114/0x2f0
[   51.842637]  ksys_dup3+0x60/0xf4
[   51.845849]  __arm64_sys_dup3+0x20/0x30
[   51.849668]  invoke_syscall+0x40/0x100
[   51.853401]  el0_svc_common+0xa8/0xd8
[   51.857048]  do_el0_svc+0x1c/0x28
[   51.860345]  el0_svc+0x38/0x64
[   51.863383]  el0t_64_sync_handler+0x90/0xfc
[   51.867551]  el0t_64_sync+0x190/0x194
[   51.871200] ---[ end trace 0000000000000000 ]---

test log snippet test parser 7

Home

[    1.844944] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0)
[    1.844950] CPU: 6 PID: 1 Comm: swapper/0 Not tainted 6.6.74-rc1 #1
[    1.844959] Hardware name: WinLink E850-96 board (DT)
[    1.844966] Call trace:
[    1.844970]  dump_backtrace+0x90/0xe8
[    1.844988]  show_stack+0x18/0x24
[    1.844999]  dump_stack_lvl+0x48/0x60
[    1.845012]  dump_stack+0x18/0x24
[    1.845019]  panic+0x324/0x380
[    1.845031]  mount_root_generic+0x260/0x330
[    1.845043]  mount_root+0x170/0x334
[    1.845051]  prepare_namespace+0x6c/0x2a4
[    1.845058]  kernel_init_freeable+0x244/0x284
[    1.845067]  kernel_init+0x24/0x1dc
[    1.845081]  ret_from_fork+0x10/0x20
[    1.845093] SMP: stopping secondary CPUs
[    1.846840] Kernel Offset: disabled
[    1.846842] CPU features: 0x0,c0000000,00020143,0000721b
[    1.846848] Memory Limit: none
[    1.934510] ---[ end Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) ]---

test log snippet test parser 8

Home

------------[ cut here ]------------
[  328.055838] WARNING: CPU: 1 PID: 534 at mm/util.c:632 kvmalloc_node+0xe0/0xe8
[  328.055975] Modules linked in: pl111_drm arm_spe_pmu panel_simple crct10dif_ce drm_dma_helper drm_kms_helper fuse drm backlight ip_tables x_tables
[  328.056375] CPU: 1 PID: 534 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[  328.056491] Hardware name: FVP Base RevC (DT)
[  328.056558] pstate: 123402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[  328.056686] pc : kvmalloc_node+0xe0/0xe8
[  328.056782] lr : kvmalloc_node+0x50/0xe8
[  328.056878] sp : ffff8000818e3ce0
[  328.056940] x29: ffff8000818e3cf0 x28: ffff0008044b3000 x27: 0000000000000000
[  328.057110] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[  328.057274] x23: 0000000080000000 x22: ecc8d7c64b706d68 x21: 0000000200002000
[  328.057442] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[  328.057611] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  328.057775] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[  328.057940] x11: 0000000000000040 x10: 384389d8c64dff00 x9 : 384389d8c64dff00
[  328.058109] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000038
[  328.058268] x5 : 0000000000000000 x4 : ffff8000818e3ca0 x3 : 0000000000000000
[  328.058436] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[  328.058600] Call trace:
[  328.058652]  kvmalloc_node+0xe0/0xe8
[  328.058750]  alloc_fdtable+0x7c/0x108
[  328.058885]  expand_files+0x114/0x2f0
[  328.058983]  ksys_dup3+0x60/0xf4
[  328.059081]  __arm64_sys_dup3+0x20/0x30
[  328.059182]  invoke_syscall+0x40/0x100
[  328.059308]  el0_svc_common+0xa8/0xd8
[  328.059434]  do_el0_svc+0x1c/0x28
[  328.059556]  el0_svc+0x38/0x64
[  328.059657]  el0t_64_sync_handler+0x90/0xfc
[  328.059775]  el0t_64_sync+0x190/0x194
[  328.059875] ---[ end trace 0000000000000000 ]---

test log snippet test parser 9

Home

------------[ cut here ]------------
[  328.055838] WARNING: CPU: 1 PID: 534 at mm/util.c:632 kvmalloc_node+0xe0/0xe8
[  328.055975] Modules linked in: pl111_drm arm_spe_pmu panel_simple crct10dif_ce drm_dma_helper drm_kms_helper fuse drm backlight ip_tables x_tables
[  328.056375] CPU: 1 PID: 534 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[  328.056491] Hardware name: FVP Base RevC (DT)
[  328.056558] pstate: 123402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[  328.056686] pc : kvmalloc_node+0xe0/0xe8
[  328.056782] lr : kvmalloc_node+0x50/0xe8
[  328.056878] sp : ffff8000818e3ce0
[  328.056940] x29: ffff8000818e3cf0 x28: ffff0008044b3000 x27: 0000000000000000
[  328.057110] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[  328.057274] x23: 0000000080000000 x22: ecc8d7c64b706d68 x21: 0000000200002000
[  328.057442] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[  328.057611] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  328.057775] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[  328.057940] x11: 0000000000000040 x10: 384389d8c64dff00 x9 : 384389d8c64dff00
[  328.058109] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000038
[  328.058268] x5 : 0000000000000000 x4 : ffff8000818e3ca0 x3 : 0000000000000000
[  328.058436] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[  328.058600] Call trace:
[  328.058652]  kvmalloc_node+0xe0/0xe8
[  328.058750]  alloc_fdtable+0x7c/0x108
[  328.058885]  expand_files+0x114/0x2f0
[  328.058983]  ksys_dup3+0x60/0xf4
[  328.059081]  __arm64_sys_dup3+0x20/0x30
[  328.059182]  invoke_syscall+0x40/0x100
[  328.059308]  el0_svc_common+0xa8/0xd8
[  328.059434]  do_el0_svc+0x1c/0x28
[  328.059556]  el0_svc+0x38/0x64
[  328.059657]  el0t_64_sync_handler+0x90/0xfc
[  328.059775]  el0t_64_sync+0x190/0x194
[  328.059875] ---[ end trace 0000000000000000 ]---

test log snippet test parser 10

Home

------------[ cut here ]------------
[  329.497787] WARNING: CPU: 1 PID: 535 at mm/util.c:632 kvmalloc_node+0xfc/0x10c
[  329.497928] Modules linked in: arm_spe_pmu crct10dif_ce panel_simple pl111_drm drm_dma_helper drm_kms_helper fuse drm backlight ip_tables x_tables
[  329.498352] CPU: 1 PID: 535 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[  329.498473] Hardware name: FVP Base RevC (DT)
[  329.498542] pstate: 123402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[  329.498677] pc : kvmalloc_node+0xfc/0x10c
[  329.498775] lr : kvmalloc_node+0x64/0x10c
[  329.498871] sp : ffff8000819c3ce0
[  329.498940] x29: ffff8000819c3cf0 x28: ffff00080708f000 x27: 0000000000000000
[  329.499122] x26: 0000000000000000 x25: 0000000000000000 x24: ffff00080140af40
[  329.499300] x23: ffff00080140aec0 x22: a0bed7c64b6eece4 x21: 00000000ffffffff
[  329.499484] x20: 0000000200002000 x19: 0000000000400cc0 x18: 0000000000000000
[  329.499663] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  329.499838] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[  329.500012] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[  329.500187] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000001
[  329.500360] x5 : 0000000000000000 x4 : ffff00080708f000 x3 : 0000000000000000
[  329.500537] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[  329.500713] Call trace:
[  329.500768]  kvmalloc_node+0xfc/0x10c
[  329.500867]  alloc_fdtable+0x94/0x114
[  329.500974]  expand_files+0x78/0x318
[  329.501082]  ksys_dup3+0x60/0x128
[  329.501190]  __arm64_sys_dup3+0x20/0x30
[  329.501306]  invoke_syscall+0x48/0x114
[  329.501438]  el0_svc_common.constprop.0+0x40/0xe0
[  329.501580]  do_el0_svc+0x1c/0x28
[  329.501710]  el0_svc+0x38/0xc8
[  329.501821]  el0t_64_sync_handler+0x120/0x12c
[  329.501947]  el0t_64_sync+0x190/0x194
[  329.502051] ---[ end trace 0000000000000000 ]---

test log snippet test parser 11

Home

------------[ cut here ]------------
[  329.497787] WARNING: CPU: 1 PID: 535 at mm/util.c:632 kvmalloc_node+0xfc/0x10c
[  329.497928] Modules linked in: arm_spe_pmu crct10dif_ce panel_simple pl111_drm drm_dma_helper drm_kms_helper fuse drm backlight ip_tables x_tables
[  329.498352] CPU: 1 PID: 535 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[  329.498473] Hardware name: FVP Base RevC (DT)
[  329.498542] pstate: 123402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[  329.498677] pc : kvmalloc_node+0xfc/0x10c
[  329.498775] lr : kvmalloc_node+0x64/0x10c
[  329.498871] sp : ffff8000819c3ce0
[  329.498940] x29: ffff8000819c3cf0 x28: ffff00080708f000 x27: 0000000000000000
[  329.499122] x26: 0000000000000000 x25: 0000000000000000 x24: ffff00080140af40
[  329.499300] x23: ffff00080140aec0 x22: a0bed7c64b6eece4 x21: 00000000ffffffff
[  329.499484] x20: 0000000200002000 x19: 0000000000400cc0 x18: 0000000000000000
[  329.499663] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  329.499838] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[  329.500012] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[  329.500187] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000001
[  329.500360] x5 : 0000000000000000 x4 : ffff00080708f000 x3 : 0000000000000000
[  329.500537] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[  329.500713] Call trace:
[  329.500768]  kvmalloc_node+0xfc/0x10c
[  329.500867]  alloc_fdtable+0x94/0x114
[  329.500974]  expand_files+0x78/0x318
[  329.501082]  ksys_dup3+0x60/0x128
[  329.501190]  __arm64_sys_dup3+0x20/0x30
[  329.501306]  invoke_syscall+0x48/0x114
[  329.501438]  el0_svc_common.constprop.0+0x40/0xe0
[  329.501580]  do_el0_svc+0x1c/0x28
[  329.501710]  el0_svc+0x38/0xc8
[  329.501821]  el0t_64_sync_handler+0x120/0x12c
[  329.501947]  el0t_64_sync+0x190/0x194
[  329.502051] ---[ end trace 0000000000000000 ]---

test log snippet test parser 12

Home

------------[ cut here ]------------
[  214.429124] WARNING: CPU: 4 PID: 1452 at mm/util.c:632 kvmalloc_node+0xe0/0xe8
[  214.439129] Modules linked in: hdlcd tda998x onboard_usb_hub cec drm_dma_helper crct10dif_ce drm_kms_helper fuse drm backlight ip_tables x_tables
[  214.454972] CPU: 4 PID: 1452 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[  214.464544] Hardware name: ARM Juno development board (r2) (DT)
[  214.473250] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  214.482999] pc : kvmalloc_node+0xe0/0xe8
[  214.489702] lr : kvmalloc_node+0x50/0xe8
[  214.496405] sp : ffff8000835cbce0
[  214.502498] x29: ffff8000835cbcf0 x28: ffff000822e1e000 x27: 0000000000000000
[  214.512421] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[  214.522343] x23: 0000000080000000 x22: ffff800080306d68 x21: 0000000200002000
[  214.532265] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[  214.542187] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  214.552109] x14: 0000000000000000 x13: 0000000000000000 x12: ffffffffffffe5ec
[  214.562032] x11: 0000000000000040 x10: 6cdf6537adc69200 x9 : 6cdf6537adc69200
[  214.571954] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000038
[  214.581876] x5 : 0000000000000000 x4 : ffff8000835cbca0 x3 : 0000000000000000
[  214.591798] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[  214.601723] Call trace:
[  214.606946]  kvmalloc_node+0xe0/0xe8
[  214.613299]  alloc_fdtable+0x7c/0x108
[  214.619740]  expand_files+0x114/0x2f0
[  214.626182]  ksys_dup3+0x60/0xf4
[  214.632188]  __arm64_sys_dup3+0x20/0x30
[  214.638803]  invoke_syscall+0x40/0x100
[  214.645332]  el0_svc_common+0xa8/0xd8
[  214.651773]  do_el0_svc+0x1c/0x28
[  214.657866]  el0_svc+0x38/0x64
[  214.663699]  el0t_64_sync_handler+0x90/0xfc
[  214.670663]  el0t_64_sync+0x190/0x194
[  214.677105] ---[ end trace 0000000000000000 ]---

test log snippet test parser 13

Home

------------[ cut here ]------------
[  214.429124] WARNING: CPU: 4 PID: 1452 at mm/util.c:632 kvmalloc_node+0xe0/0xe8
[  214.439129] Modules linked in: hdlcd tda998x onboard_usb_hub cec drm_dma_helper crct10dif_ce drm_kms_helper fuse drm backlight ip_tables x_tables
[  214.454972] CPU: 4 PID: 1452 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[  214.464544] Hardware name: ARM Juno development board (r2) (DT)
[  214.473250] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  214.482999] pc : kvmalloc_node+0xe0/0xe8
[  214.489702] lr : kvmalloc_node+0x50/0xe8
[  214.496405] sp : ffff8000835cbce0
[  214.502498] x29: ffff8000835cbcf0 x28: ffff000822e1e000 x27: 0000000000000000
[  214.512421] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[  214.522343] x23: 0000000080000000 x22: ffff800080306d68 x21: 0000000200002000
[  214.532265] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[  214.542187] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  214.552109] x14: 0000000000000000 x13: 0000000000000000 x12: ffffffffffffe5ec
[  214.562032] x11: 0000000000000040 x10: 6cdf6537adc69200 x9 : 6cdf6537adc69200
[  214.571954] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000038
[  214.581876] x5 : 0000000000000000 x4 : ffff8000835cbca0 x3 : 0000000000000000
[  214.591798] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[  214.601723] Call trace:
[  214.606946]  kvmalloc_node+0xe0/0xe8
[  214.613299]  alloc_fdtable+0x7c/0x108
[  214.619740]  expand_files+0x114/0x2f0
[  214.626182]  ksys_dup3+0x60/0xf4
[  214.632188]  __arm64_sys_dup3+0x20/0x30
[  214.638803]  invoke_syscall+0x40/0x100
[  214.645332]  el0_svc_common+0xa8/0xd8
[  214.651773]  do_el0_svc+0x1c/0x28
[  214.657866]  el0_svc+0x38/0x64
[  214.663699]  el0t_64_sync_handler+0x90/0xfc
[  214.670663]  el0t_64_sync+0x190/0x194
[  214.677105] ---[ end trace 0000000000000000 ]---

test log snippet test parser 14

Home

------------[ cut here ]------------
[  217.246981] WARNING: CPU: 0 PID: 1452 at mm/util.c:632 kvmalloc_node+0xfc/0x10c
[  217.254320] Modules linked in: tda998x hdlcd onboard_usb_hub cec drm_dma_helper crct10dif_ce drm_kms_helper fuse drm backlight ip_tables x_tables
[  217.267445] CPU: 0 PID: 1452 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[  217.274249] Hardware name: ARM Juno development board (r2) (DT)
[  217.280178] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  217.287157] pc : kvmalloc_node+0xfc/0x10c
[  217.291176] lr : kvmalloc_node+0x64/0x10c
[  217.295193] sp : ffff800083ed3ce0
[  217.298510] x29: ffff800083ed3cf0 x28: ffff00082d5e9000 x27: 0000000000000000
[  217.305670] x26: 0000000000000000 x25: 0000000000000000 x24: ffff000821b5c600
[  217.312830] x23: ffff000821b5c580 x22: ffff8000802eece4 x21: 00000000ffffffff
[  217.319990] x20: 0000000200002000 x19: 0000000000400cc0 x18: 0000000000000000
[  217.327150] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  217.334309] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[  217.341468] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[  217.348627] x8 : 0000000000000000 x7 : 0000000000000000 x6 : fffffffffffffd1c
[  217.355786] x5 : 0000000000000000 x4 : ffff00082d5e9000 x3 : 0000000000000000
[  217.362945] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[  217.370104] Call trace:
[  217.372552]  kvmalloc_node+0xfc/0x10c
[  217.376222]  alloc_fdtable+0x94/0x114
[  217.379895]  expand_files+0x78/0x318
[  217.383479]  ksys_dup3+0x60/0x128
[  217.386802]  __arm64_sys_dup3+0x20/0x30
[  217.390648]  invoke_syscall+0x48/0x114
[  217.394410]  el0_svc_common.constprop.0+0x40/0xe0
[  217.399129]  do_el0_svc+0x1c/0x28
[  217.402455]  el0_svc+0x38/0xc8
[  217.405519]  el0t_64_sync_handler+0x120/0x12c
[  217.409888]  el0t_64_sync+0x190/0x194
[  217.413559] ---[ end trace 0000000000000000 ]---

test log snippet test parser 15

Home

------------[ cut here ]------------
[  217.246981] WARNING: CPU: 0 PID: 1452 at mm/util.c:632 kvmalloc_node+0xfc/0x10c
[  217.254320] Modules linked in: tda998x hdlcd onboard_usb_hub cec drm_dma_helper crct10dif_ce drm_kms_helper fuse drm backlight ip_tables x_tables
[  217.267445] CPU: 0 PID: 1452 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[  217.274249] Hardware name: ARM Juno development board (r2) (DT)
[  217.280178] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  217.287157] pc : kvmalloc_node+0xfc/0x10c
[  217.291176] lr : kvmalloc_node+0x64/0x10c
[  217.295193] sp : ffff800083ed3ce0
[  217.298510] x29: ffff800083ed3cf0 x28: ffff00082d5e9000 x27: 0000000000000000
[  217.305670] x26: 0000000000000000 x25: 0000000000000000 x24: ffff000821b5c600
[  217.312830] x23: ffff000821b5c580 x22: ffff8000802eece4 x21: 00000000ffffffff
[  217.319990] x20: 0000000200002000 x19: 0000000000400cc0 x18: 0000000000000000
[  217.327150] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  217.334309] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[  217.341468] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[  217.348627] x8 : 0000000000000000 x7 : 0000000000000000 x6 : fffffffffffffd1c
[  217.355786] x5 : 0000000000000000 x4 : ffff00082d5e9000 x3 : 0000000000000000
[  217.362945] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[  217.370104] Call trace:
[  217.372552]  kvmalloc_node+0xfc/0x10c
[  217.376222]  alloc_fdtable+0x94/0x114
[  217.379895]  expand_files+0x78/0x318
[  217.383479]  ksys_dup3+0x60/0x128
[  217.386802]  __arm64_sys_dup3+0x20/0x30
[  217.390648]  invoke_syscall+0x48/0x114
[  217.394410]  el0_svc_common.constprop.0+0x40/0xe0
[  217.399129]  do_el0_svc+0x1c/0x28
[  217.402455]  el0_svc+0x38/0xc8
[  217.405519]  el0t_64_sync_handler+0x120/0x12c
[  217.409888]  el0t_64_sync+0x190/0x194
[  217.413559] ---[ end trace 0000000000000000 ]---

test log snippet test parser 16

Home

------------[ cut here ]------------
[   53.808384] WARNING: CPU: 1 PID: 465 at mm/util.c:632 kvmalloc_node+0xe0/0xe8
[   53.809928] Modules linked in: crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[   53.814330] CPU: 1 PID: 465 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[   53.814883] Hardware name: linux,dummy-virt (DT)
[   53.816379] pstate: 23402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[   53.817631] pc : kvmalloc_node+0xe0/0xe8
[   53.817898] lr : kvmalloc_node+0x50/0xe8
[   53.818142] sp : ffff80008080bce0
[   53.818361] x29: ffff80008080bcf0 x28: ffff0000c740d000 x27: 0000000000000000
[   53.820331] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[   53.821585] x23: 0000000080001000 x22: 39d0acce39706d68 x21: 0000000200002000
[   53.822091] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[   53.822766] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   53.823392] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   53.824049] x11: 0000000000000040 x10: cdcba7fd1a130900 x9 : cdcba7fd1a130900
[   53.824607] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000038
[   53.825138] x5 : 0000000000000000 x4 : ffff80008080bca0 x3 : 0000000000000000
[   53.825743] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[   53.826719] Call trace:
[   53.827332]  kvmalloc_node+0xe0/0xe8
[   53.827954]  alloc_fdtable+0x7c/0x108
[   53.828320]  expand_files+0x114/0x2f0
[   53.828713]  ksys_dup3+0x60/0xf4
[   53.829074]  __arm64_sys_dup3+0x20/0x30
[   53.829496]  invoke_syscall+0x40/0x100
[   53.830018]  el0_svc_common+0xa8/0xd8
[   53.830359]  do_el0_svc+0x1c/0x28
[   53.830607]  el0_svc+0x38/0x64
[   53.830984]  el0t_64_sync_handler+0x90/0xfc
[   53.831379]  el0t_64_sync+0x190/0x194
[   53.832089] ---[ end trace 0000000000000000 ]---

test log snippet test parser 17

Home

------------[ cut here ]------------
[   53.808384] WARNING: CPU: 1 PID: 465 at mm/util.c:632 kvmalloc_node+0xe0/0xe8
[   53.809928] Modules linked in: crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[   53.814330] CPU: 1 PID: 465 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[   53.814883] Hardware name: linux,dummy-virt (DT)
[   53.816379] pstate: 23402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[   53.817631] pc : kvmalloc_node+0xe0/0xe8
[   53.817898] lr : kvmalloc_node+0x50/0xe8
[   53.818142] sp : ffff80008080bce0
[   53.818361] x29: ffff80008080bcf0 x28: ffff0000c740d000 x27: 0000000000000000
[   53.820331] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[   53.821585] x23: 0000000080001000 x22: 39d0acce39706d68 x21: 0000000200002000
[   53.822091] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[   53.822766] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   53.823392] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   53.824049] x11: 0000000000000040 x10: cdcba7fd1a130900 x9 : cdcba7fd1a130900
[   53.824607] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000038
[   53.825138] x5 : 0000000000000000 x4 : ffff80008080bca0 x3 : 0000000000000000
[   53.825743] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[   53.826719] Call trace:
[   53.827332]  kvmalloc_node+0xe0/0xe8
[   53.827954]  alloc_fdtable+0x7c/0x108
[   53.828320]  expand_files+0x114/0x2f0
[   53.828713]  ksys_dup3+0x60/0xf4
[   53.829074]  __arm64_sys_dup3+0x20/0x30
[   53.829496]  invoke_syscall+0x40/0x100
[   53.830018]  el0_svc_common+0xa8/0xd8
[   53.830359]  do_el0_svc+0x1c/0x28
[   53.830607]  el0_svc+0x38/0x64
[   53.830984]  el0t_64_sync_handler+0x90/0xfc
[   53.831379]  el0t_64_sync+0x190/0x194
[   53.832089] ---[ end trace 0000000000000000 ]---

test log snippet test parser 18

Home

------------[ cut here ]------------
[   51.310404] WARNING: CPU: 1 PID: 464 at mm/util.c:632 kvmalloc_node+0xfc/0x10c
[   51.313315] Modules linked in: crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[   51.316142] CPU: 1 PID: 464 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[   51.316759] Hardware name: linux,dummy-virt (DT)
[   51.317342] pstate: 23402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[   51.317954] pc : kvmalloc_node+0xfc/0x10c
[   51.319178] lr : kvmalloc_node+0x64/0x10c
[   51.319891] sp : ffff80008084bce0
[   51.320583] x29: ffff80008084bcf0 x28: ffff0000c27f7000 x27: 0000000000000000
[   51.321371] x26: 0000000000000000 x25: 0000000000000000 x24: ffff0000c0861c00
[   51.322469] x23: ffff0000c0861b80 x22: 90aba64c6b6eece4 x21: 00000000ffffffff
[   51.323525] x20: 0000000200002000 x19: 0000000000400cc0 x18: 0000000000000000
[   51.323990] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   51.325237] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   51.326248] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[   51.327327] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000001
[   51.328142] x5 : 0000000000000000 x4 : ffff0000c27f7000 x3 : 0000000000000000
[   51.329794] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[   51.331286] Call trace:
[   51.331989]  kvmalloc_node+0xfc/0x10c
[   51.332504]  alloc_fdtable+0x94/0x114
[   51.333478]  expand_files+0x78/0x318
[   51.333886]  ksys_dup3+0x60/0x128
[   51.334241]  __arm64_sys_dup3+0x20/0x30
[   51.334631]  invoke_syscall+0x48/0x114
[   51.335721]  el0_svc_common.constprop.0+0x40/0xe0
[   51.337361]  do_el0_svc+0x1c/0x28
[   51.337764]  el0_svc+0x38/0xc8
[   51.338118]  el0t_64_sync_handler+0x120/0x12c
[   51.339579]  el0t_64_sync+0x190/0x194
[   51.340188] ---[ end trace 0000000000000000 ]---

test log snippet test parser 19

Home

------------[ cut here ]------------
[   51.310404] WARNING: CPU: 1 PID: 464 at mm/util.c:632 kvmalloc_node+0xfc/0x10c
[   51.313315] Modules linked in: crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[   51.316142] CPU: 1 PID: 464 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[   51.316759] Hardware name: linux,dummy-virt (DT)
[   51.317342] pstate: 23402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[   51.317954] pc : kvmalloc_node+0xfc/0x10c
[   51.319178] lr : kvmalloc_node+0x64/0x10c
[   51.319891] sp : ffff80008084bce0
[   51.320583] x29: ffff80008084bcf0 x28: ffff0000c27f7000 x27: 0000000000000000
[   51.321371] x26: 0000000000000000 x25: 0000000000000000 x24: ffff0000c0861c00
[   51.322469] x23: ffff0000c0861b80 x22: 90aba64c6b6eece4 x21: 00000000ffffffff
[   51.323525] x20: 0000000200002000 x19: 0000000000400cc0 x18: 0000000000000000
[   51.323990] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   51.325237] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   51.326248] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[   51.327327] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000001
[   51.328142] x5 : 0000000000000000 x4 : ffff0000c27f7000 x3 : 0000000000000000
[   51.329794] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[   51.331286] Call trace:
[   51.331989]  kvmalloc_node+0xfc/0x10c
[   51.332504]  alloc_fdtable+0x94/0x114
[   51.333478]  expand_files+0x78/0x318
[   51.333886]  ksys_dup3+0x60/0x128
[   51.334241]  __arm64_sys_dup3+0x20/0x30
[   51.334631]  invoke_syscall+0x48/0x114
[   51.335721]  el0_svc_common.constprop.0+0x40/0xe0
[   51.337361]  do_el0_svc+0x1c/0x28
[   51.337764]  el0_svc+0x38/0xc8
[   51.338118]  el0t_64_sync_handler+0x120/0x12c
[   51.339579]  el0t_64_sync+0x190/0x194
[   51.340188] ---[ end trace 0000000000000000 ]---

test log snippet test parser 20

Home

------------[ cut here ]------------
[   48.356714] WARNING: CPU: 0 PID: 471 at mm/util.c:632 kvmalloc_node+0xfc/0x108
[   48.358680] Modules linked in:
[   48.360839] CPU: 0 PID: 471 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[   48.361836] Hardware name: Generic DT based system
[   48.363328]  unwind_backtrace from show_stack+0x10/0x14
[   48.364842]  show_stack from dump_stack_lvl+0x48/0x54
[   48.365680]  dump_stack_lvl from __warn+0xd4/0x200
[   48.366542]  __warn from warn_slowpath_fmt+0x11c/0x168
[   48.367094]  warn_slowpath_fmt from kvmalloc_node+0xfc/0x108
[   48.368083]  kvmalloc_node from alloc_fdtable+0x78/0x104
[   48.368781]  alloc_fdtable from expand_files+0x134/0x304
[   48.369658]  expand_files from ksys_dup3+0x58/0xd0
[   48.370077]  ksys_dup3 from ret_fast_syscall+0x0/0x4c
[   48.371376] Exception stack(0xfa21dfa8 to 0xfa21dff0)
[   48.372052] dfa0:                   004f6bcd 00000001 00000002 2000003c 00000000 00000000
[   48.372446] dfc0: 004f6bcd 00000001 004f8e6c 0000003f 004f4920 b6f47ce0 00000000 bea813e0
[   48.373413] dfe0: 0000003f bea811b4 b6ea6f43 b6e24786
[   48.375663] ---[ end trace 0000000000000000 ]---

test log snippet test parser 21

Home

------------[ cut here ]------------
[   48.356714] WARNING: CPU: 0 PID: 471 at mm/util.c:632 kvmalloc_node+0xfc/0x108
[   48.358680] Modules linked in:
[   48.360839] CPU: 0 PID: 471 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[   48.361836] Hardware name: Generic DT based system
[   48.363328]  unwind_backtrace from show_stack+0x10/0x14
[   48.364842]  show_stack from dump_stack_lvl+0x48/0x54
[   48.365680]  dump_stack_lvl from __warn+0xd4/0x200
[   48.366542]  __warn from warn_slowpath_fmt+0x11c/0x168
[   48.367094]  warn_slowpath_fmt from kvmalloc_node+0xfc/0x108
[   48.368083]  kvmalloc_node from alloc_fdtable+0x78/0x104
[   48.368781]  alloc_fdtable from expand_files+0x134/0x304
[   48.369658]  expand_files from ksys_dup3+0x58/0xd0
[   48.370077]  ksys_dup3 from ret_fast_syscall+0x0/0x4c
[   48.371376] Exception stack(0xfa21dfa8 to 0xfa21dff0)
[   48.372052] dfa0:                   004f6bcd 00000001 00000002 2000003c 00000000 00000000
[   48.372446] dfc0: 004f6bcd 00000001 004f8e6c 0000003f 004f4920 b6f47ce0 00000000 bea813e0
[   48.373413] dfe0: 0000003f bea811b4 b6ea6f43 b6e24786
[   48.375663] ---[ end trace 0000000000000000 ]---

test log snippet test parser 22

Home

[  124.845724] ==================================================================
[  124.846701] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0xf4/0x1d0
[  124.847438] Read of size 1 at addr fa0abd3f by task kunit_try_catch/182
[  124.848191] 
[  124.848459] CPU: 1 PID: 182 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  124.849465] Hardware name: Generic DT based system
[  124.850694]  unwind_backtrace from show_stack+0x18/0x1c
[  124.851580]  show_stack from dump_stack_lvl+0x58/0x70
[  124.852398]  dump_stack_lvl from print_report+0x164/0x51c
[  124.853228]  print_report from kasan_report+0xc8/0x104
[  124.854065]  kasan_report from kasan_alloca_oob_left+0xf4/0x1d0
[  124.854933]  kasan_alloca_oob_left from kunit_try_run_case+0x11c/0x2e4
[  124.855810]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  124.856726]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  124.857535]  kthread from ret_from_fork+0x14/0x30
[  124.858151] Exception stack(0xfa0abfb0 to 0xfa0abff8)
[  124.858856] bfa0:                                     00000000 00000000 00000000 00000000
[  124.859638] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  124.860852] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  124.861924] 
[  124.862227] The buggy address belongs to stack of task kunit_try_catch/182
[  124.862960] 
[  124.863230] The buggy address belongs to the virtual mapping at
[  124.863230]  [fa0a8000, fa0ad000) created by:
[  124.863230]  kernel_clone+0xcc/0x4b0
[  124.865262] 
[  124.865599] The buggy address belongs to the physical page:
[  124.866238] page:e3007dee refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fc9e
[  124.867429] flags: 0x80000000(zone=2)
[  124.867914] page_type: 0xffffffff()
[  124.868764] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  124.870086] raw: 00000000
[  124.870769] page dumped because: kasan: bad access detected
[  124.871383] 
[  124.871968] Memory state around the buggy address:
[  124.872781]  fa0abc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  124.873396]  fa0abc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  124.874134] >fa0abd00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[  124.875157]                                 ^
[  124.875927]  fa0abd80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 04 f2 04 f2
[  124.876861]  fa0abe00: 00 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
[  124.877511] ==================================================================

test log snippet test parser 23

Home

[  124.887645] ==================================================================
[  124.888708] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0xfc/0x1dc
[  124.889939] Read of size 1 at addr fa0bbd4a by task kunit_try_catch/184
[  124.890517] 
[  124.891366] CPU: 1 PID: 184 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  124.892228] Hardware name: Generic DT based system
[  124.893407]  unwind_backtrace from show_stack+0x18/0x1c
[  124.894428]  show_stack from dump_stack_lvl+0x58/0x70
[  124.895363]  dump_stack_lvl from print_report+0x164/0x51c
[  124.896263]  print_report from kasan_report+0xc8/0x104
[  124.897088]  kasan_report from kasan_alloca_oob_right+0xfc/0x1dc
[  124.897873]  kasan_alloca_oob_right from kunit_try_run_case+0x11c/0x2e4
[  124.898678]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  124.900270]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  124.901803]  kthread from ret_from_fork+0x14/0x30
[  124.902643] Exception stack(0xfa0bbfb0 to 0xfa0bbff8)
[  124.903230] bfa0:                                     00000000 00000000 00000000 00000000
[  124.904443] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  124.905476] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  124.906338] 
[  124.906798] The buggy address belongs to stack of task kunit_try_catch/184
[  124.907541] 
[  124.907839] The buggy address belongs to the virtual mapping at
[  124.907839]  [fa0b8000, fa0bd000) created by:
[  124.907839]  kernel_clone+0xcc/0x4b0
[  124.909545] 
[  124.910285] The buggy address belongs to the physical page:
[  124.911309] page:deea74ee refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fca6
[  124.912345] flags: 0x80000000(zone=2)
[  124.913037] page_type: 0xffffffff()
[  124.913831] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  124.914632] raw: 00000000
[  124.914992] page dumped because: kasan: bad access detected
[  124.915575] 
[  124.916346] Memory state around the buggy address:
[  124.916735]  fa0bbc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  124.917734]  fa0bbc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  124.918656] >fa0bbd00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[  124.919499]                                       ^
[  124.920730]  fa0bbd80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 04 f2 04 f2
[  124.921395]  fa0bbe00: 00 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
[  124.922424] ==================================================================

test log snippet test parser 24

Home

[  126.268069] ==================================================================
[  126.268783] BUG: KASAN: double-free in kmalloc_double_kzfree+0xd0/0x1cc
[  126.269968] Free of addr c8fcbe00 by task kunit_try_catch/207
[  126.271053] 
[  126.271344] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  126.272162] Hardware name: Generic DT based system
[  126.274150]  unwind_backtrace from show_stack+0x18/0x1c
[  126.275073]  show_stack from dump_stack_lvl+0x58/0x70
[  126.275949]  dump_stack_lvl from print_report+0x164/0x51c
[  126.276870]  print_report from kasan_report_invalid_free+0xb4/0xe8
[  126.277728]  kasan_report_invalid_free from __kasan_slab_free+0xfc/0x124
[  126.278862]  __kasan_slab_free from __kmem_cache_free+0x140/0x2a8
[  126.279913]  __kmem_cache_free from kmalloc_double_kzfree+0xd0/0x1cc
[  126.282317]  kmalloc_double_kzfree from kunit_try_run_case+0x11c/0x2e4
[  126.282980]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  126.283915]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  126.284801]  kthread from ret_from_fork+0x14/0x30
[  126.285439] Exception stack(0xf9d63fb0 to 0xf9d63ff8)
[  126.286209] 3fa0:                                     00000000 00000000 00000000 00000000
[  126.287239] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  126.288264] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  126.288918] 
[  126.289178] Allocated by task 207:
[  126.289960]  kasan_set_track+0x3c/0x5c
[  126.290490]  __kasan_kmalloc+0x8c/0x94
[  126.291719]  kmalloc_double_kzfree+0xa0/0x1cc
[  126.292349]  kunit_try_run_case+0x11c/0x2e4
[  126.292947]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  126.293439]  kthread+0x184/0x1a8
[  126.293962]  ret_from_fork+0x14/0x30
[  126.294496] 
[  126.294757] Freed by task 207:
[  126.295189]  kasan_set_track+0x3c/0x5c
[  126.295675]  kasan_save_free_info+0x30/0x3c
[  126.296268]  __kasan_slab_free+0xdc/0x124
[  126.296759]  __kmem_cache_free+0x140/0x2a8
[  126.297360]  kmalloc_double_kzfree+0xbc/0x1cc
[  126.297918]  kunit_try_run_case+0x11c/0x2e4
[  126.298556]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  126.299284]  kthread+0x184/0x1a8
[  126.300562]  ret_from_fork+0x14/0x30
[  126.301128] 
[  126.301404] The buggy address belongs to the object at c8fcbe00
[  126.301404]  which belongs to the cache kmalloc-64 of size 64
[  126.302539] The buggy address is located 0 bytes inside of
[  126.302539]  64-byte region [c8fcbe00, c8fcbe40)
[  126.303729] 
[  126.304007] The buggy address belongs to the physical page:
[  126.304677] page:69fea40a refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fcb
[  126.305312] flags: 0x800(slab|zone=0)
[  126.305874] page_type: 0xffffffff()
[  126.306419] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  126.307317] raw: 00000000
[  126.307728] page dumped because: kasan: bad access detected
[  126.308247] 
[  126.308532] Memory state around the buggy address:
[  126.309145]  c8fcbd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  126.310294]  c8fcbd80: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.310921] >c8fcbe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  126.311596]            ^
[  126.312883]  c8fcbe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.313729]  c8fcbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.314274] ==================================================================

test log snippet test parser 25

Home

[  125.213600] ==================================================================
[  125.214834] BUG: KASAN: double-free in kmem_cache_double_free+0xe4/0x23c
[  125.215731] Free of addr c4ce3000 by task kunit_try_catch/190
[  125.216399] 
[  125.216711] CPU: 1 PID: 190 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  125.217518] Hardware name: Generic DT based system
[  125.218090]  unwind_backtrace from show_stack+0x18/0x1c
[  125.218886]  show_stack from dump_stack_lvl+0x58/0x70
[  125.219487]  dump_stack_lvl from print_report+0x164/0x51c
[  125.220294]  print_report from kasan_report_invalid_free+0xb4/0xe8
[  125.221496]  kasan_report_invalid_free from __kasan_slab_free+0xfc/0x124
[  125.222457]  __kasan_slab_free from kmem_cache_free+0x170/0x41c
[  125.223374]  kmem_cache_free from kmem_cache_double_free+0xe4/0x23c
[  125.224286]  kmem_cache_double_free from kunit_try_run_case+0x11c/0x2e4
[  125.225103]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.226140]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  125.226997]  kthread from ret_from_fork+0x14/0x30
[  125.227602] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[  125.228193] 3fa0:                                     00000000 00000000 00000000 00000000
[  125.229002] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  125.229815] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  125.230845] 
[  125.231131] Allocated by task 190:
[  125.231813]  kasan_set_track+0x3c/0x5c
[  125.232401]  __kasan_slab_alloc+0x60/0x68
[  125.232979]  kmem_cache_alloc+0x1dc/0x574
[  125.233580]  kmem_cache_double_free+0xb0/0x23c
[  125.234197]  kunit_try_run_case+0x11c/0x2e4
[  125.234825]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.235461]  kthread+0x184/0x1a8
[  125.235989]  ret_from_fork+0x14/0x30
[  125.236490] 
[  125.236804] Freed by task 190:
[  125.237212]  kasan_set_track+0x3c/0x5c
[  125.237744]  kasan_save_free_info+0x30/0x3c
[  125.238360]  __kasan_slab_free+0xdc/0x124
[  125.238927]  kmem_cache_free+0x170/0x41c
[  125.239600]  kmem_cache_double_free+0xcc/0x23c
[  125.240252]  kunit_try_run_case+0x11c/0x2e4
[  125.240894]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.241942]  kthread+0x184/0x1a8
[  125.242395]  ret_from_fork+0x14/0x30
[  125.242890] 
[  125.243180] The buggy address belongs to the object at c4ce3000
[  125.243180]  which belongs to the cache test_cache of size 200
[  125.244348] The buggy address is located 0 bytes inside of
[  125.244348]  200-byte region [c4ce3000, c4ce30c8)
[  125.245399] 
[  125.245684] The buggy address belongs to the physical page:
[  125.246349] page:7f63fee1 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce3
[  125.247167] flags: 0x800(slab|zone=0)
[  125.247734] page_type: 0xffffffff()
[  125.248292] raw: 00000800 c4cde200 00000122 00000000 00000000 800f000f ffffffff 00000001
[  125.249156] raw: 00000000
[  125.249903] page dumped because: kasan: bad access detected
[  125.250568] 
[  125.250877] Memory state around the buggy address:
[  125.251478]  c4ce2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.252277]  c4ce2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.252905] >c4ce3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  125.253651]            ^
[  125.254044]  c4ce3080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[  125.254829]  c4ce3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.255431] ==================================================================

test log snippet test parser 26

Home

[  124.752068] ==================================================================
[  124.753058] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0xa0/0x150
[  124.753885] Read of size 1 at addr c418502d by task kunit_try_catch/176
[  124.754630] 
[  124.754941] CPU: 1 PID: 176 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  124.755837] Hardware name: Generic DT based system
[  124.756269]  unwind_backtrace from show_stack+0x18/0x1c
[  124.757076]  show_stack from dump_stack_lvl+0x58/0x70
[  124.757862]  dump_stack_lvl from print_report+0x164/0x51c
[  124.758459]  print_report from kasan_report+0xc8/0x104
[  124.759250]  kasan_report from kasan_global_oob_right+0xa0/0x150
[  124.760492]  kasan_global_oob_right from kunit_try_run_case+0x11c/0x2e4
[  124.761370]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  124.762215]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  124.762964]  kthread from ret_from_fork+0x14/0x30
[  124.764067] Exception stack(0xfa083fb0 to 0xfa083ff8)
[  124.764661] 3fa0:                                     00000000 00000000 00000000 00000000
[  124.765481] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  124.766893] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  124.767827] 
[  124.768372] The buggy address belongs to the variable:
[  124.769116]  global_array+0xd/0x40
[  124.769880] 
[  124.770822] The buggy address belongs to the physical page:
[  124.771241] page:796266e7 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44185
[  124.772144] flags: 0x4000(reserved|zone=0)
[  124.772863] page_type: 0xffffffff()
[  124.773561] raw: 00004000 edc8c6b8 edc8c6b8 00000000 00000000 00000000 ffffffff 00000001
[  124.774588] raw: 00000000
[  124.774923] page dumped because: kasan: bad access detected
[  124.775734] 
[  124.776025] Memory state around the buggy address:
[  124.776590]  c4184f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  124.777416]  c4184f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  124.778204] >c4185000: 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 02 f9 f9 f9
[  124.779012]                           ^
[  124.779551]  c4185080: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9
[  124.780237]  c4185100: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[  124.780823] ==================================================================

test log snippet test parser 27

Home

[  122.701685] ==================================================================
[  122.702991] BUG: KASAN: invalid-free in kmalloc_pagealloc_invalid_free+0xb0/0x1b0
[  122.703831] Free of addr c4dd8001 by task kunit_try_catch/122
[  122.704414] 
[  122.704741] CPU: 1 PID: 122 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  122.705413] Hardware name: Generic DT based system
[  122.706163]  unwind_backtrace from show_stack+0x18/0x1c
[  122.707046]  show_stack from dump_stack_lvl+0x58/0x70
[  122.707882]  dump_stack_lvl from print_report+0x164/0x51c
[  122.708709]  print_report from kasan_report_invalid_free+0xb4/0xe8
[  122.709707]  kasan_report_invalid_free from free_large_kmalloc+0x48/0x104
[  122.710555]  free_large_kmalloc from kmalloc_pagealloc_invalid_free+0xb0/0x1b0
[  122.711264]  kmalloc_pagealloc_invalid_free from kunit_try_run_case+0x11c/0x2e4
[  122.712274]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  122.713252]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  122.714055]  kthread from ret_from_fork+0x14/0x30
[  122.714721] Exception stack(0xf9edbfb0 to 0xf9edbff8)
[  122.715354] bfa0:                                     00000000 00000000 00000000 00000000
[  122.716162] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  122.717032] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  122.717799] 
[  122.718053] The buggy address belongs to the physical page:
[  122.718746] page:50be9d29 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44dd8
[  122.719532] head:50be9d29 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  122.720317] flags: 0x40(head|zone=0)
[  122.720855] page_type: 0xffffffff()
[  122.721409] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  122.722198] raw: 00000000
[  122.722537] page dumped because: kasan: bad access detected
[  122.723216] 
[  122.723510] Memory state around the buggy address:
[  122.724104]  c4dd7f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  122.724744]  c4dd7f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  122.725500] >c4dd8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  122.726281]            ^
[  122.726748]  c4dd8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  122.727318]  c4dd8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  122.728498] ==================================================================

test log snippet test parser 28

Home

[  125.274833] ==================================================================
[  125.275683] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xd8/0x23c
[  125.276725] Free of addr c4ce4001 by task kunit_try_catch/192
[  125.277369] 
[  125.277758] CPU: 1 PID: 192 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  125.278602] Hardware name: Generic DT based system
[  125.279191]  unwind_backtrace from show_stack+0x18/0x1c
[  125.280013]  show_stack from dump_stack_lvl+0x58/0x70
[  125.281867]  dump_stack_lvl from print_report+0x164/0x51c
[  125.282639]  print_report from kasan_report_invalid_free+0xb4/0xe8
[  125.283589]  kasan_report_invalid_free from __kasan_slab_free+0x114/0x124
[  125.284527]  __kasan_slab_free from kmem_cache_free+0x170/0x41c
[  125.285517]  kmem_cache_free from kmem_cache_invalid_free+0xd8/0x23c
[  125.286534]  kmem_cache_invalid_free from kunit_try_run_case+0x11c/0x2e4
[  125.287583]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.288713]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  125.289839]  kthread from ret_from_fork+0x14/0x30
[  125.290808] Exception stack(0xfa0f3fb0 to 0xfa0f3ff8)
[  125.291680] 3fa0:                                     00000000 00000000 00000000 00000000
[  125.292762] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  125.293802] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  125.294764] 
[  125.295265] Allocated by task 192:
[  125.295837]  kasan_set_track+0x3c/0x5c
[  125.296328]  __kasan_slab_alloc+0x60/0x68
[  125.296846]  kmem_cache_alloc+0x1dc/0x574
[  125.297339]  kmem_cache_invalid_free+0xb0/0x23c
[  125.298416]  kunit_try_run_case+0x11c/0x2e4
[  125.299254]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.300000]  kthread+0x184/0x1a8
[  125.300957]  ret_from_fork+0x14/0x30
[  125.301716] 
[  125.302215] The buggy address belongs to the object at c4ce4000
[  125.302215]  which belongs to the cache test_cache of size 200
[  125.303444] The buggy address is located 1 bytes inside of
[  125.303444]  200-byte region [c4ce4000, c4ce40c8)
[  125.304598] 
[  125.305338] The buggy address belongs to the physical page:
[  125.306071] page:192b438f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce4
[  125.306942] flags: 0x800(slab|zone=0)
[  125.307398] page_type: 0xffffffff()
[  125.308262] raw: 00000800 c4cde300 00000122 00000000 00000000 800f000f ffffffff 00000001
[  125.309108] raw: 00000000
[  125.310229] page dumped because: kasan: bad access detected
[  125.310774] 
[  125.311061] Memory state around the buggy address:
[  125.311903]  c4ce3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.312566]  c4ce3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.313257] >c4ce4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  125.314355]            ^
[  125.314789]  c4ce4080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[  125.315814]  c4ce4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.316679] ==================================================================

test log snippet test parser 29

Home

[  123.783068] ==================================================================
[  123.784191] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0xe4/0x1f0
[  123.785182] Read of size 4294967294 at addr c4cdd484 by task kunit_try_catch/154
[  123.786142] 
[  123.786466] CPU: 1 PID: 154 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  123.787524] Hardware name: Generic DT based system
[  123.788053]  unwind_backtrace from show_stack+0x18/0x1c
[  123.788816]  show_stack from dump_stack_lvl+0x58/0x70
[  123.789572]  dump_stack_lvl from print_report+0x164/0x51c
[  123.790238]  print_report from kasan_report+0xc8/0x104
[  123.790963]  kasan_report from kasan_check_range+0x14c/0x198
[  123.791753]  kasan_check_range from __asan_memmove+0x28/0x68
[  123.792531]  __asan_memmove from kmalloc_memmove_negative_size+0xe4/0x1f0
[  123.793403]  kmalloc_memmove_negative_size from kunit_try_run_case+0x11c/0x2e4
[  123.794381]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.795337]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  123.796184]  kthread from ret_from_fork+0x14/0x30
[  123.796723] Exception stack(0xf9fdbfb0 to 0xf9fdbff8)
[  123.797386] bfa0:                                     00000000 00000000 00000000 00000000
[  123.798220] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  123.799025] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  123.799840] 
[  123.800128] Allocated by task 154:
[  123.800547]  kasan_set_track+0x3c/0x5c
[  123.801166]  __kasan_kmalloc+0x8c/0x94
[  123.802830]  kmalloc_memmove_negative_size+0xa0/0x1f0
[  123.803754]  kunit_try_run_case+0x11c/0x2e4
[  123.804358]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.805110]  kthread+0x184/0x1a8
[  123.805500]  ret_from_fork+0x14/0x30
[  123.806057] 
[  123.806335] The buggy address belongs to the object at c4cdd480
[  123.806335]  which belongs to the cache kmalloc-64 of size 64
[  123.807350] The buggy address is located 4 bytes inside of
[  123.807350]  64-byte region [c4cdd480, c4cdd4c0)
[  123.808396] 
[  123.808726] The buggy address belongs to the physical page:
[  123.809385] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[  123.810077] flags: 0x800(slab|zone=0)
[  123.810647] page_type: 0xffffffff()
[  123.811230] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  123.811965] raw: 00000000
[  123.812369] page dumped because: kasan: bad access detected
[  123.812912] 
[  123.813198] Memory state around the buggy address:
[  123.813864]  c4cdd380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  123.814538]  c4cdd400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  123.815353] >c4cdd480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[  123.816068]            ^
[  123.816490]  c4cdd500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.817223]  c4cdd580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.817915] ==================================================================

test log snippet test parser 30

Home

[  125.882949] ==================================================================
[  125.884640] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x26c/0xc30
[  125.885434] Read of size 4 at addr c4cddf84 by task kunit_try_catch/203
[  125.886115] 
[  125.886424] CPU: 1 PID: 203 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  125.887703] Hardware name: Generic DT based system
[  125.888300]  unwind_backtrace from show_stack+0x18/0x1c
[  125.889094]  show_stack from dump_stack_lvl+0x58/0x70
[  125.890353]  dump_stack_lvl from print_report+0x164/0x51c
[  125.891063]  print_report from kasan_report+0xc8/0x104
[  125.891892]  kasan_report from kasan_bitops_generic+0x26c/0xc30
[  125.892914]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  125.893884]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.894836]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  125.895727]  kthread from ret_from_fork+0x14/0x30
[  125.896368] Exception stack(0xfa133fb0 to 0xfa133ff8)
[  125.896972] 3fa0:                                     00000000 00000000 00000000 00000000
[  125.897775] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  125.898512] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  125.899291] 
[  125.899680] Allocated by task 203:
[  125.900128]  kasan_set_track+0x3c/0x5c
[  125.901025]  __kasan_kmalloc+0x8c/0x94
[  125.901867]  kasan_bitops_generic+0xa0/0xc30
[  125.902335]  kunit_try_run_case+0x11c/0x2e4
[  125.902976]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.903758]  kthread+0x184/0x1a8
[  125.904284]  ret_from_fork+0x14/0x30
[  125.904729] 
[  125.905028] The buggy address belongs to the object at c4cddf80
[  125.905028]  which belongs to the cache kmalloc-64 of size 64
[  125.906050] The buggy address is located 4 bytes inside of
[  125.906050]  allocated 5-byte region [c4cddf80, c4cddf85)
[  125.907143] 
[  125.907441] The buggy address belongs to the physical page:
[  125.908092] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[  125.909034] flags: 0x800(slab|zone=0)
[  125.909563] page_type: 0xffffffff()
[  125.910487] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  125.911420] raw: 00000000
[  125.911827] page dumped because: kasan: bad access detected
[  125.912416] 
[  125.912883] Memory state around the buggy address:
[  125.913675]  c4cdde80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  125.914286]  c4cddf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  125.914963] >c4cddf80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.915487]            ^
[  125.915914]  c4cde000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  125.916708]  c4cde080: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.917294] ==================================================================
---
[  125.998515] ==================================================================
[  125.999337] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x318/0xc30
[  126.001383] Read of size 4 at addr c4cddf84 by task kunit_try_catch/203
[  126.002192] 
[  126.002461] CPU: 1 PID: 203 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  126.003450] Hardware name: Generic DT based system
[  126.004061]  unwind_backtrace from show_stack+0x18/0x1c
[  126.004974]  show_stack from dump_stack_lvl+0x58/0x70
[  126.005661]  dump_stack_lvl from print_report+0x164/0x51c
[  126.006512]  print_report from kasan_report+0xc8/0x104
[  126.007320]  kasan_report from kasan_bitops_generic+0x318/0xc30
[  126.008111]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  126.009003]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  126.010313]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  126.011247]  kthread from ret_from_fork+0x14/0x30
[  126.011914] Exception stack(0xfa133fb0 to 0xfa133ff8)
[  126.012486] 3fa0:                                     00000000 00000000 00000000 00000000
[  126.013428] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  126.014370] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  126.015112] 
[  126.015409] Allocated by task 203:
[  126.015919]  kasan_set_track+0x3c/0x5c
[  126.016518]  __kasan_kmalloc+0x8c/0x94
[  126.017139]  kasan_bitops_generic+0xa0/0xc30
[  126.017752]  kunit_try_run_case+0x11c/0x2e4
[  126.018426]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  126.019151]  kthread+0x184/0x1a8
[  126.020079]  ret_from_fork+0x14/0x30
[  126.020566] 
[  126.020790] The buggy address belongs to the object at c4cddf80
[  126.020790]  which belongs to the cache kmalloc-64 of size 64
[  126.021984] The buggy address is located 4 bytes inside of
[  126.021984]  allocated 5-byte region [c4cddf80, c4cddf85)
[  126.023079] 
[  126.023462] The buggy address belongs to the physical page:
[  126.024037] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[  126.025003] flags: 0x800(slab|zone=0)
[  126.025458] page_type: 0xffffffff()
[  126.026041] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  126.026943] raw: 00000000
[  126.027276] page dumped because: kasan: bad access detected
[  126.027865] 
[  126.028142] Memory state around the buggy address:
[  126.028812]  c4cdde80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  126.029525]  c4cddf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  126.030454] >c4cddf80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.031378]            ^
[  126.031811]  c4cde000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  126.032489]  c4cde080: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.033245] ==================================================================
---
[  125.662062] ==================================================================
[  125.663606] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x100/0xc30
[  125.664319] Read of size 4 at addr c4cddf84 by task kunit_try_catch/203
[  125.664980] 
[  125.665283] CPU: 1 PID: 203 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  125.666235] Hardware name: Generic DT based system
[  125.666772]  unwind_backtrace from show_stack+0x18/0x1c
[  125.667387]  show_stack from dump_stack_lvl+0x58/0x70
[  125.668304]  dump_stack_lvl from print_report+0x164/0x51c
[  125.669131]  print_report from kasan_report+0xc8/0x104
[  125.670067]  kasan_report from kasan_bitops_generic+0x100/0xc30
[  125.670757]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  125.672092]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.672987]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  125.674662]  kthread from ret_from_fork+0x14/0x30
[  125.675266] Exception stack(0xfa133fb0 to 0xfa133ff8)
[  125.675947] 3fa0:                                     00000000 00000000 00000000 00000000
[  125.676723] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  125.677600] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  125.678308] 
[  125.678659] Allocated by task 203:
[  125.679104]  kasan_set_track+0x3c/0x5c
[  125.679982]  __kasan_kmalloc+0x8c/0x94
[  125.680908]  kasan_bitops_generic+0xa0/0xc30
[  125.681313]  kunit_try_run_case+0x11c/0x2e4
[  125.681768]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.682375]  kthread+0x184/0x1a8
[  125.683415]  ret_from_fork+0x14/0x30
[  125.684049] 
[  125.684679] The buggy address belongs to the object at c4cddf80
[  125.684679]  which belongs to the cache kmalloc-64 of size 64
[  125.685700] The buggy address is located 4 bytes inside of
[  125.685700]  allocated 5-byte region [c4cddf80, c4cddf85)
[  125.686631] 
[  125.686931] The buggy address belongs to the physical page:
[  125.687556] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[  125.688235] flags: 0x800(slab|zone=0)
[  125.688789] page_type: 0xffffffff()
[  125.689323] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  125.690466] raw: 00000000
[  125.691172] page dumped because: kasan: bad access detected
[  125.691850] 
[  125.692070] Memory state around the buggy address:
[  125.692577]  c4cdde80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  125.693724]  c4cddf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  125.694554] >c4cddf80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.695337]            ^
[  125.695750]  c4cde000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  125.696530]  c4cde080: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.697218] ==================================================================
---
[  125.702044] ==================================================================
[  125.703680] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x168/0xc30
[  125.704488] Read of size 4 at addr c4cddf84 by task kunit_try_catch/203
[  125.705226] 
[  125.705532] CPU: 1 PID: 203 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  125.706333] Hardware name: Generic DT based system
[  125.706931]  unwind_backtrace from show_stack+0x18/0x1c
[  125.707674]  show_stack from dump_stack_lvl+0x58/0x70
[  125.708432]  dump_stack_lvl from print_report+0x164/0x51c
[  125.709104]  print_report from kasan_report+0xc8/0x104
[  125.710012]  kasan_report from kasan_bitops_generic+0x168/0xc30
[  125.710964]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  125.711745]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.713162]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  125.714114]  kthread from ret_from_fork+0x14/0x30
[  125.714688] Exception stack(0xfa133fb0 to 0xfa133ff8)
[  125.715356] 3fa0:                                     00000000 00000000 00000000 00000000
[  125.716194] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  125.716966] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  125.717689] 
[  125.717910] Allocated by task 203:
[  125.718373]  kasan_set_track+0x3c/0x5c
[  125.719022]  __kasan_kmalloc+0x8c/0x94
[  125.719606]  kasan_bitops_generic+0xa0/0xc30
[  125.720169]  kunit_try_run_case+0x11c/0x2e4
[  125.720701]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.721898]  kthread+0x184/0x1a8
[  125.722416]  ret_from_fork+0x14/0x30
[  125.722967] 
[  125.723191] The buggy address belongs to the object at c4cddf80
[  125.723191]  which belongs to the cache kmalloc-64 of size 64
[  125.724421] The buggy address is located 4 bytes inside of
[  125.724421]  allocated 5-byte region [c4cddf80, c4cddf85)
[  125.725348] 
[  125.725667] The buggy address belongs to the physical page:
[  125.726311] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[  125.727243] flags: 0x800(slab|zone=0)
[  125.727791] page_type: 0xffffffff()
[  125.728283] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  125.729195] raw: 00000000
[  125.730011] page dumped because: kasan: bad access detected
[  125.730666] 
[  125.730962] Memory state around the buggy address:
[  125.731435]  c4cdde80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  125.732247]  c4cddf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  125.733030] >c4cddf80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.733697]            ^
[  125.734110]  c4cde000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  125.734765]  c4cde080: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.735509] ==================================================================
---
[  126.081633] ==================================================================
[  126.083875] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x404/0xc30
[  126.084887] Read of size 4 at addr c4cddf84 by task kunit_try_catch/203
[  126.086261] 
[  126.086564] CPU: 1 PID: 203 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  126.087385] Hardware name: Generic DT based system
[  126.087935]  unwind_backtrace from show_stack+0x18/0x1c
[  126.088555]  show_stack from dump_stack_lvl+0x58/0x70
[  126.089963]  dump_stack_lvl from print_report+0x164/0x51c
[  126.090717]  print_report from kasan_report+0xc8/0x104
[  126.091334]  kasan_report from kasan_bitops_generic+0x404/0xc30
[  126.092805]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  126.093794]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  126.094874]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  126.095892]  kthread from ret_from_fork+0x14/0x30
[  126.096702] Exception stack(0xfa133fb0 to 0xfa133ff8)
[  126.097515] 3fa0:                                     00000000 00000000 00000000 00000000
[  126.098349] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  126.099726] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  126.100677] 
[  126.100903] Allocated by task 203:
[  126.101293]  kasan_set_track+0x3c/0x5c
[  126.102533]  __kasan_kmalloc+0x8c/0x94
[  126.103221]  kasan_bitops_generic+0xa0/0xc30
[  126.103976]  kunit_try_run_case+0x11c/0x2e4
[  126.104745]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  126.105585]  kthread+0x184/0x1a8
[  126.106045]  ret_from_fork+0x14/0x30
[  126.106508] 
[  126.107164] The buggy address belongs to the object at c4cddf80
[  126.107164]  which belongs to the cache kmalloc-64 of size 64
[  126.108338] The buggy address is located 4 bytes inside of
[  126.108338]  allocated 5-byte region [c4cddf80, c4cddf85)
[  126.109664] 
[  126.110015] The buggy address belongs to the physical page:
[  126.110924] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[  126.112220] flags: 0x800(slab|zone=0)
[  126.112978] page_type: 0xffffffff()
[  126.113681] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  126.114426] raw: 00000000
[  126.114799] page dumped because: kasan: bad access detected
[  126.115372] 
[  126.116169] Memory state around the buggy address:
[  126.116864]  c4cdde80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  126.117685]  c4cddf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  126.118371] >c4cddf80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.119366]            ^
[  126.119985]  c4cde000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  126.120673]  c4cde080: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.121318] ==================================================================
---
[  126.123870] ==================================================================
[  126.124966] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x43c/0xc30
[  126.125917] Read of size 4 at addr c4cddf84 by task kunit_try_catch/203
[  126.126797] 
[  126.127098] CPU: 1 PID: 203 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  126.128392] Hardware name: Generic DT based system
[  126.129138]  unwind_backtrace from show_stack+0x18/0x1c
[  126.130146]  show_stack from dump_stack_lvl+0x58/0x70
[  126.131107]  dump_stack_lvl from print_report+0x164/0x51c
[  126.132021]  print_report from kasan_report+0xc8/0x104
[  126.132925]  kasan_report from kasan_bitops_generic+0x43c/0xc30
[  126.133939]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  126.135051]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  126.136181]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  126.137078]  kthread from ret_from_fork+0x14/0x30
[  126.137678] Exception stack(0xfa133fb0 to 0xfa133ff8)
[  126.138269] 3fa0:                                     00000000 00000000 00000000 00000000
[  126.139845] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  126.140789] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  126.141331] 
[  126.141657] Allocated by task 203:
[  126.142296]  kasan_set_track+0x3c/0x5c
[  126.143121]  __kasan_kmalloc+0x8c/0x94
[  126.143916]  kasan_bitops_generic+0xa0/0xc30
[  126.144445]  kunit_try_run_case+0x11c/0x2e4
[  126.145138]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  126.145901]  kthread+0x184/0x1a8
[  126.146369]  ret_from_fork+0x14/0x30
[  126.146876] 
[  126.147191] The buggy address belongs to the object at c4cddf80
[  126.147191]  which belongs to the cache kmalloc-64 of size 64
[  126.148402] The buggy address is located 4 bytes inside of
[  126.148402]  allocated 5-byte region [c4cddf80, c4cddf85)
[  126.149500] 
[  126.149960] The buggy address belongs to the physical page:
[  126.150545] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[  126.151317] flags: 0x800(slab|zone=0)
[  126.152307] page_type: 0xffffffff()
[  126.152844] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  126.153851] raw: 00000000
[  126.154249] page dumped because: kasan: bad access detected
[  126.154885] 
[  126.155215] Memory state around the buggy address:
[  126.155793]  c4cdde80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  126.156506]  c4cddf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  126.157325] >c4cddf80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.158098]            ^
[  126.158560]  c4cde000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  126.159197]  c4cde080: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.160078] ==================================================================
---
[  125.922137] ==================================================================
[  125.923776] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x2d4/0xc30
[  125.924590] Read of size 4 at addr c4cddf84 by task kunit_try_catch/203
[  125.925177] 
[  125.925475] CPU: 1 PID: 203 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  125.926358] Hardware name: Generic DT based system
[  125.926987]  unwind_backtrace from show_stack+0x18/0x1c
[  125.927692]  show_stack from dump_stack_lvl+0x58/0x70
[  125.928457]  dump_stack_lvl from print_report+0x164/0x51c
[  125.929243]  print_report from kasan_report+0xc8/0x104
[  125.931025]  kasan_report from kasan_bitops_generic+0x2d4/0xc30
[  125.931749]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  125.932481]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.933572]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  125.934377]  kthread from ret_from_fork+0x14/0x30
[  125.934947] Exception stack(0xfa133fb0 to 0xfa133ff8)
[  125.935490] 3fa0:                                     00000000 00000000 00000000 00000000
[  125.936688] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  125.937427] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  125.937983] 
[  125.938348] Allocated by task 203:
[  125.938887]  kasan_set_track+0x3c/0x5c
[  125.940065]  __kasan_kmalloc+0x8c/0x94
[  125.940628]  kasan_bitops_generic+0xa0/0xc30
[  125.941379]  kunit_try_run_case+0x11c/0x2e4
[  125.941792]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.942636]  kthread+0x184/0x1a8
[  125.943220]  ret_from_fork+0x14/0x30
[  125.943857] 
[  125.944163] The buggy address belongs to the object at c4cddf80
[  125.944163]  which belongs to the cache kmalloc-64 of size 64
[  125.945217] The buggy address is located 4 bytes inside of
[  125.945217]  allocated 5-byte region [c4cddf80, c4cddf85)
[  125.946420] 
[  125.946741] The buggy address belongs to the physical page:
[  125.947213] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[  125.948175] flags: 0x800(slab|zone=0)
[  125.948756] page_type: 0xffffffff()
[  125.949338] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  125.950811] raw: 00000000
[  125.951436] page dumped because: kasan: bad access detected
[  125.952082] 
[  125.952375] Memory state around the buggy address:
[  125.953347]  c4cdde80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  125.954317]  c4cddf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  125.955258] >c4cddf80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.956163]            ^
[  125.956837]  c4cde000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  125.957554]  c4cde080: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.958561] ==================================================================
---
[  125.810705] ==================================================================
[  125.811366] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1f8/0xc30
[  125.812218] Read of size 4 at addr c4cddf84 by task kunit_try_catch/203
[  125.812762] 
[  125.813069] CPU: 1 PID: 203 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  125.813989] Hardware name: Generic DT based system
[  125.814595]  unwind_backtrace from show_stack+0x18/0x1c
[  125.815353]  show_stack from dump_stack_lvl+0x58/0x70
[  125.816117]  dump_stack_lvl from print_report+0x164/0x51c
[  125.816867]  print_report from kasan_report+0xc8/0x104
[  125.817584]  kasan_report from kasan_bitops_generic+0x1f8/0xc30
[  125.818447]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  125.819169]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.820233]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  125.821153]  kthread from ret_from_fork+0x14/0x30
[  125.822432] Exception stack(0xfa133fb0 to 0xfa133ff8)
[  125.823111] 3fa0:                                     00000000 00000000 00000000 00000000
[  125.824116] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  125.825048] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  125.825818] 
[  125.826104] Allocated by task 203:
[  125.826554]  kasan_set_track+0x3c/0x5c
[  125.827625]  __kasan_kmalloc+0x8c/0x94
[  125.828359]  kasan_bitops_generic+0xa0/0xc30
[  125.829144]  kunit_try_run_case+0x11c/0x2e4
[  125.829968]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.830872]  kthread+0x184/0x1a8
[  125.831410]  ret_from_fork+0x14/0x30
[  125.831998] 
[  125.832293] The buggy address belongs to the object at c4cddf80
[  125.832293]  which belongs to the cache kmalloc-64 of size 64
[  125.833384] The buggy address is located 4 bytes inside of
[  125.833384]  allocated 5-byte region [c4cddf80, c4cddf85)
[  125.834272] 
[  125.834587] The buggy address belongs to the physical page:
[  125.835264] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[  125.836080] flags: 0x800(slab|zone=0)
[  125.836474] page_type: 0xffffffff()
[  125.837039] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  125.837951] raw: 00000000
[  125.838280] page dumped because: kasan: bad access detected
[  125.838948] 
[  125.839171] Memory state around the buggy address:
[  125.840128]  c4cdde80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  125.840921]  c4cddf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  125.841561] >c4cddf80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.842338]            ^
[  125.842680]  c4cde000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  125.843465]  c4cde080: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.844207] ==================================================================
---
[  126.037242] ==================================================================
[  126.038876] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x39c/0xc30
[  126.039953] Read of size 4 at addr c4cddf84 by task kunit_try_catch/203
[  126.040602] 
[  126.040945] CPU: 1 PID: 203 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  126.043224] Hardware name: Generic DT based system
[  126.043739]  unwind_backtrace from show_stack+0x18/0x1c
[  126.044386]  show_stack from dump_stack_lvl+0x58/0x70
[  126.045780]  dump_stack_lvl from print_report+0x164/0x51c
[  126.046682]  print_report from kasan_report+0xc8/0x104
[  126.047600]  kasan_report from kasan_bitops_generic+0x39c/0xc30
[  126.048564]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  126.049918]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  126.050825]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  126.051587]  kthread from ret_from_fork+0x14/0x30
[  126.052647] Exception stack(0xfa133fb0 to 0xfa133ff8)
[  126.053449] 3fa0:                                     00000000 00000000 00000000 00000000
[  126.054534] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  126.055625] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  126.056554] 
[  126.057023] Allocated by task 203:
[  126.057707]  kasan_set_track+0x3c/0x5c
[  126.058472]  __kasan_kmalloc+0x8c/0x94
[  126.059234]  kasan_bitops_generic+0xa0/0xc30
[  126.060078]  kunit_try_run_case+0x11c/0x2e4
[  126.060690]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  126.061749]  kthread+0x184/0x1a8
[  126.062444]  ret_from_fork+0x14/0x30
[  126.063200] 
[  126.063480] The buggy address belongs to the object at c4cddf80
[  126.063480]  which belongs to the cache kmalloc-64 of size 64
[  126.065032] The buggy address is located 4 bytes inside of
[  126.065032]  allocated 5-byte region [c4cddf80, c4cddf85)
[  126.066057] 
[  126.066673] The buggy address belongs to the physical page:
[  126.067374] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[  126.068271] flags: 0x800(slab|zone=0)
[  126.068819] page_type: 0xffffffff()
[  126.069421] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  126.070737] raw: 00000000
[  126.071075] page dumped because: kasan: bad access detected
[  126.071719] 
[  126.071983] Memory state around the buggy address:
[  126.072533]  c4cdde80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  126.073528]  c4cddf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  126.074229] >c4cddf80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.075113]            ^
[  126.075522]  c4cde000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  126.076263]  c4cde080: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.077107] ==================================================================

test log snippet test parser 31

Home

[  125.845356] ==================================================================
[  125.846192] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x20c/0xc30
[  125.846962] Write of size 4 at addr c4cddf84 by task kunit_try_catch/203
[  125.847482] 
[  125.847801] CPU: 1 PID: 203 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  125.848771] Hardware name: Generic DT based system
[  125.849374]  unwind_backtrace from show_stack+0x18/0x1c
[  125.851757]  show_stack from dump_stack_lvl+0x58/0x70
[  125.852426]  dump_stack_lvl from print_report+0x164/0x51c
[  125.853207]  print_report from kasan_report+0xc8/0x104
[  125.853927]  kasan_report from kasan_bitops_generic+0x20c/0xc30
[  125.854829]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  125.855757]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.856763]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  125.857594]  kthread from ret_from_fork+0x14/0x30
[  125.858167] Exception stack(0xfa133fb0 to 0xfa133ff8)
[  125.858844] 3fa0:                                     00000000 00000000 00000000 00000000
[  125.859690] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  125.860504] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  125.861207] 
[  125.861499] Allocated by task 203:
[  125.862407]  kasan_set_track+0x3c/0x5c
[  125.862955]  __kasan_kmalloc+0x8c/0x94
[  125.863584]  kasan_bitops_generic+0xa0/0xc30
[  125.864140]  kunit_try_run_case+0x11c/0x2e4
[  125.864697]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.865382]  kthread+0x184/0x1a8
[  125.865869]  ret_from_fork+0x14/0x30
[  125.866410] 
[  125.866734] The buggy address belongs to the object at c4cddf80
[  125.866734]  which belongs to the cache kmalloc-64 of size 64
[  125.867747] The buggy address is located 4 bytes inside of
[  125.867747]  allocated 5-byte region [c4cddf80, c4cddf85)
[  125.868780] 
[  125.869059] The buggy address belongs to the physical page:
[  125.870031] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[  125.870960] flags: 0x800(slab|zone=0)
[  125.871490] page_type: 0xffffffff()
[  125.871961] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  125.872761] raw: 00000000
[  125.873111] page dumped because: kasan: bad access detected
[  125.873836] 
[  125.874125] Memory state around the buggy address:
[  125.874701]  c4cdde80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  125.875490]  c4cddf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  125.876188] >c4cddf80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.876941]            ^
[  125.877355]  c4cde000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  125.877981]  c4cde080: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.878670] ==================================================================

test log snippet test parser 32

Home

[  125.960133] ==================================================================
[  125.960899] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x310/0xc30
[  125.963456] Write of size 4 at addr c4cddf84 by task kunit_try_catch/203
[  125.964240] 
[  125.964491] CPU: 1 PID: 203 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  125.965347] Hardware name: Generic DT based system
[  125.965981]  unwind_backtrace from show_stack+0x18/0x1c
[  125.966719]  show_stack from dump_stack_lvl+0x58/0x70
[  125.967475]  dump_stack_lvl from print_report+0x164/0x51c
[  125.968188]  print_report from kasan_report+0xc8/0x104
[  125.968954]  kasan_report from kasan_check_range+0x14c/0x198
[  125.970306]  kasan_check_range from kasan_bitops_generic+0x310/0xc30
[  125.971450]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  125.972301]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.973263]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  125.974127]  kthread from ret_from_fork+0x14/0x30
[  125.974835] Exception stack(0xfa133fb0 to 0xfa133ff8)
[  125.975401] 3fa0:                                     00000000 00000000 00000000 00000000
[  125.976334] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  125.977478] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  125.978399] 
[  125.978726] Allocated by task 203:
[  125.979724]  kasan_set_track+0x3c/0x5c
[  125.980568]  __kasan_kmalloc+0x8c/0x94
[  125.981065]  kasan_bitops_generic+0xa0/0xc30
[  125.981562]  kunit_try_run_case+0x11c/0x2e4
[  125.982245]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.982956]  kthread+0x184/0x1a8
[  125.983441]  ret_from_fork+0x14/0x30
[  125.983949] 
[  125.984289] The buggy address belongs to the object at c4cddf80
[  125.984289]  which belongs to the cache kmalloc-64 of size 64
[  125.985419] The buggy address is located 4 bytes inside of
[  125.985419]  allocated 5-byte region [c4cddf80, c4cddf85)
[  125.986692] 
[  125.987008] The buggy address belongs to the physical page:
[  125.987722] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[  125.988802] flags: 0x800(slab|zone=0)
[  125.989277] page_type: 0xffffffff()
[  125.989946] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  125.991108] raw: 00000000
[  125.991595] page dumped because: kasan: bad access detected
[  125.992170] 
[  125.992463] Memory state around the buggy address:
[  125.993049]  c4cdde80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  125.993815]  c4cddf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  125.994604] >c4cddf80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.995287]            ^
[  125.995757]  c4cde000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  125.996441]  c4cde080: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.997188] ==================================================================
---
[  125.736944] ==================================================================
[  125.737662] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1a4/0xc30
[  125.738515] Write of size 4 at addr c4cddf84 by task kunit_try_catch/203
[  125.739192] 
[  125.740596] CPU: 1 PID: 203 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  125.741441] Hardware name: Generic DT based system
[  125.742077]  unwind_backtrace from show_stack+0x18/0x1c
[  125.742896]  show_stack from dump_stack_lvl+0x58/0x70
[  125.743677]  dump_stack_lvl from print_report+0x164/0x51c
[  125.744472]  print_report from kasan_report+0xc8/0x104
[  125.745266]  kasan_report from kasan_check_range+0x14c/0x198
[  125.745965]  kasan_check_range from kasan_bitops_generic+0x1a4/0xc30
[  125.746884]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  125.747820]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.748724]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  125.749678]  kthread from ret_from_fork+0x14/0x30
[  125.750225] Exception stack(0xfa133fb0 to 0xfa133ff8)
[  125.750904] 3fa0:                                     00000000 00000000 00000000 00000000
[  125.752146] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  125.753028] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  125.753666] 
[  125.753956] Allocated by task 203:
[  125.754418]  kasan_set_track+0x3c/0x5c
[  125.755020]  __kasan_kmalloc+0x8c/0x94
[  125.755628]  kasan_bitops_generic+0xa0/0xc30
[  125.756103]  kunit_try_run_case+0x11c/0x2e4
[  125.756741]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.757477]  kthread+0x184/0x1a8
[  125.757877]  ret_from_fork+0x14/0x30
[  125.758427] 
[  125.758741] The buggy address belongs to the object at c4cddf80
[  125.758741]  which belongs to the cache kmalloc-64 of size 64
[  125.760299] The buggy address is located 4 bytes inside of
[  125.760299]  allocated 5-byte region [c4cddf80, c4cddf85)
[  125.761344] 
[  125.761646] The buggy address belongs to the physical page:
[  125.762206] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[  125.763207] flags: 0x800(slab|zone=0)
[  125.763794] page_type: 0xffffffff()
[  125.764398] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  125.765354] raw: 00000000
[  125.765713] page dumped because: kasan: bad access detected
[  125.766404] 
[  125.766749] Memory state around the buggy address:
[  125.767363]  c4cdde80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  125.768136]  c4cddf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  125.768983] >c4cddf80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.769723]            ^
[  125.770169]  c4cde000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  125.770972]  c4cde080: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.771766] ==================================================================
---
[  125.773196] ==================================================================
[  125.774169] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1f0/0xc30
[  125.775102] Write of size 4 at addr c4cddf84 by task kunit_try_catch/203
[  125.775840] 
[  125.776148] CPU: 1 PID: 203 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  125.777109] Hardware name: Generic DT based system
[  125.777788]  unwind_backtrace from show_stack+0x18/0x1c
[  125.778671]  show_stack from dump_stack_lvl+0x58/0x70
[  125.780888]  dump_stack_lvl from print_report+0x164/0x51c
[  125.781822]  print_report from kasan_report+0xc8/0x104
[  125.782464]  kasan_report from kasan_check_range+0x14c/0x198
[  125.783495]  kasan_check_range from kasan_bitops_generic+0x1f0/0xc30
[  125.784255]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  125.785178]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.785980]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  125.786806]  kthread from ret_from_fork+0x14/0x30
[  125.787407] Exception stack(0xfa133fb0 to 0xfa133ff8)
[  125.787980] 3fa0:                                     00000000 00000000 00000000 00000000
[  125.788777] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  125.789745] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  125.790505] 
[  125.791165] Allocated by task 203:
[  125.791639]  kasan_set_track+0x3c/0x5c
[  125.792158]  __kasan_kmalloc+0x8c/0x94
[  125.792655]  kasan_bitops_generic+0xa0/0xc30
[  125.793292]  kunit_try_run_case+0x11c/0x2e4
[  125.794054]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.794834]  kthread+0x184/0x1a8
[  125.795302]  ret_from_fork+0x14/0x30
[  125.795869] 
[  125.796165] The buggy address belongs to the object at c4cddf80
[  125.796165]  which belongs to the cache kmalloc-64 of size 64
[  125.797062] The buggy address is located 4 bytes inside of
[  125.797062]  allocated 5-byte region [c4cddf80, c4cddf85)
[  125.798177] 
[  125.798475] The buggy address belongs to the physical page:
[  125.799059] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[  125.800340] flags: 0x800(slab|zone=0)
[  125.800888] page_type: 0xffffffff()
[  125.801436] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  125.802338] raw: 00000000
[  125.802753] page dumped because: kasan: bad access detected
[  125.803254] 
[  125.803638] Memory state around the buggy address:
[  125.804247]  c4cdde80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  125.804927]  c4cddf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  125.805718] >c4cddf80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.806274]            ^
[  125.806700]  c4cde000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  125.807455]  c4cde080: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.808101] ==================================================================
---
[  126.161737] ==================================================================
[  126.162305] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x478/0xc30
[  126.163233] Write of size 4 at addr c4cddf84 by task kunit_try_catch/203
[  126.164089] 
[  126.164427] CPU: 1 PID: 203 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  126.165285] Hardware name: Generic DT based system
[  126.165947]  unwind_backtrace from show_stack+0x18/0x1c
[  126.166677]  show_stack from dump_stack_lvl+0x58/0x70
[  126.167495]  dump_stack_lvl from print_report+0x164/0x51c
[  126.168198]  print_report from kasan_report+0xc8/0x104
[  126.169028]  kasan_report from kasan_check_range+0x14c/0x198
[  126.170023]  kasan_check_range from kasan_bitops_generic+0x478/0xc30
[  126.171804]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  126.172579]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  126.173458]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  126.174729]  kthread from ret_from_fork+0x14/0x30
[  126.175542] Exception stack(0xfa133fb0 to 0xfa133ff8)
[  126.176324] 3fa0:                                     00000000 00000000 00000000 00000000
[  126.177169] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  126.178338] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  126.179261] 
[  126.179816] Allocated by task 203:
[  126.180288]  kasan_set_track+0x3c/0x5c
[  126.181157]  __kasan_kmalloc+0x8c/0x94
[  126.181684]  kasan_bitops_generic+0xa0/0xc30
[  126.182296]  kunit_try_run_case+0x11c/0x2e4
[  126.183222]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  126.184135]  kthread+0x184/0x1a8
[  126.184835]  ret_from_fork+0x14/0x30
[  126.185513] 
[  126.185831] The buggy address belongs to the object at c4cddf80
[  126.185831]  which belongs to the cache kmalloc-64 of size 64
[  126.187123] The buggy address is located 4 bytes inside of
[  126.187123]  allocated 5-byte region [c4cddf80, c4cddf85)
[  126.188079] 
[  126.188383] The buggy address belongs to the physical page:
[  126.189041] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[  126.190466] flags: 0x800(slab|zone=0)
[  126.190978] page_type: 0xffffffff()
[  126.192060] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  126.193137] raw: 00000000
[  126.193791] page dumped because: kasan: bad access detected
[  126.194383] 
[  126.194690] Memory state around the buggy address:
[  126.195292]  c4cdde80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  126.196525]  c4cddf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  126.197269] >c4cddf80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.198236]            ^
[  126.198655]  c4cde000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  126.199319]  c4cde080: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.200437] ==================================================================

test log snippet test parser 33

Home

[  122.780995] ==================================================================
[  122.782463] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xcc/0x1dc
[  122.783286] Write of size 1 at addr c5c7df00 by task kunit_try_catch/128
[  122.783847] 
[  122.784150] CPU: 1 PID: 128 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  122.785134] Hardware name: Generic DT based system
[  122.785818]  unwind_backtrace from show_stack+0x18/0x1c
[  122.786663]  show_stack from dump_stack_lvl+0x58/0x70
[  122.787482]  dump_stack_lvl from print_report+0x164/0x51c
[  122.788331]  print_report from kasan_report+0xc8/0x104
[  122.789050]  kasan_report from kmalloc_large_oob_right+0xcc/0x1dc
[  122.789951]  kmalloc_large_oob_right from kunit_try_run_case+0x11c/0x2e4
[  122.790892]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  122.791903]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  122.792821]  kthread from ret_from_fork+0x14/0x30
[  122.793440] Exception stack(0xf9f0bfb0 to 0xf9f0bff8)
[  122.793989] bfa0:                                     00000000 00000000 00000000 00000000
[  122.795002] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  122.795369] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  122.795728] 
[  122.796066] Allocated by task 128:
[  122.796599]  kasan_set_track+0x3c/0x5c
[  122.797261]  __kasan_kmalloc+0x8c/0x94
[  122.797914]  kmalloc_large_oob_right+0xa0/0x1dc
[  122.798429]  kunit_try_run_case+0x11c/0x2e4
[  122.798934]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  122.799501]  kthread+0x184/0x1a8
[  122.800148]  ret_from_fork+0x14/0x30
[  122.801100] 
[  122.801673] The buggy address belongs to the object at c5c7c000
[  122.801673]  which belongs to the cache kmalloc-8k of size 8192
[  122.802948] The buggy address is located 0 bytes to the right of
[  122.802948]  allocated 7936-byte region [c5c7c000, c5c7df00)
[  122.804061] 
[  122.804347] The buggy address belongs to the physical page:
[  122.805046] page:04f3da84 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45c78
[  122.805785] head:04f3da84 order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  122.806672] flags: 0x840(slab|head|zone=0)
[  122.807200] page_type: 0xffffffff()
[  122.807650] raw: 00000840 c4801a00 00000122 00000000 00000000 80020002 ffffffff 00000001
[  122.808596] raw: 00000000
[  122.809007] page dumped because: kasan: bad access detected
[  122.809529] 
[  122.809769] Memory state around the buggy address:
[  122.810219]  c5c7de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  122.811084]  c5c7de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  122.811754] >c5c7df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  122.812436]            ^
[  122.812869]  c5c7df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  122.813681]  c5c7e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  122.814291] ==================================================================

test log snippet test parser 34

Home

[  123.829413] ==================================================================
[  123.830677] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0xe4/0x1e8
[  123.831586] Read of size 64 at addr c4cdd504 by task kunit_try_catch/156
[  123.833230] 
[  123.834037] CPU: 1 PID: 156 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  123.834852] Hardware name: Generic DT based system
[  123.835445]  unwind_backtrace from show_stack+0x18/0x1c
[  123.836440]  show_stack from dump_stack_lvl+0x58/0x70
[  123.837305]  dump_stack_lvl from print_report+0x164/0x51c
[  123.837979]  print_report from kasan_report+0xc8/0x104
[  123.838705]  kasan_report from kasan_check_range+0x14c/0x198
[  123.839519]  kasan_check_range from __asan_memmove+0x28/0x68
[  123.840245]  __asan_memmove from kmalloc_memmove_invalid_size+0xe4/0x1e8
[  123.841299]  kmalloc_memmove_invalid_size from kunit_try_run_case+0x11c/0x2e4
[  123.842817]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.843643]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  123.844908]  kthread from ret_from_fork+0x14/0x30
[  123.845569] Exception stack(0xf9febfb0 to 0xf9febff8)
[  123.846177] bfa0:                                     00000000 00000000 00000000 00000000
[  123.847397] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  123.848458] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  123.849370] 
[  123.849879] Allocated by task 156:
[  123.850253]  kasan_set_track+0x3c/0x5c
[  123.851114]  __kasan_kmalloc+0x8c/0x94
[  123.851896]  kmalloc_memmove_invalid_size+0xa0/0x1e8
[  123.852799]  kunit_try_run_case+0x11c/0x2e4
[  123.853541]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.854256]  kthread+0x184/0x1a8
[  123.855024]  ret_from_fork+0x14/0x30
[  123.855526] 
[  123.855811] The buggy address belongs to the object at c4cdd500
[  123.855811]  which belongs to the cache kmalloc-64 of size 64
[  123.856681] The buggy address is located 4 bytes inside of
[  123.856681]  allocated 64-byte region [c4cdd500, c4cdd540)
[  123.857988] 
[  123.858294] The buggy address belongs to the physical page:
[  123.859070] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[  123.860672] flags: 0x800(slab|zone=0)
[  123.861650] page_type: 0xffffffff()
[  123.862578] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  123.863349] raw: 00000000
[  123.863536] page dumped because: kasan: bad access detected
[  123.863807] 
[  123.863922] Memory state around the buggy address:
[  123.864158]  c4cdd400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  123.864444]  c4cdd480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  123.865001] >c4cdd500: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[  123.865812]                                    ^
[  123.866452]  c4cdd580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.867335]  c4cdd600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.868128] ==================================================================

test log snippet test parser 35

Home

[  122.584365] ==================================================================
[  122.585158] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0xd4/0x1e8
[  122.586047] Read of size 1 at addr c4ded000 by task kunit_try_catch/116
[  122.586727] 
[  122.586982] CPU: 1 PID: 116 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  122.587719] Hardware name: Generic DT based system
[  122.588318]  unwind_backtrace from show_stack+0x18/0x1c
[  122.589076]  show_stack from dump_stack_lvl+0x58/0x70
[  122.589788]  dump_stack_lvl from print_report+0x164/0x51c
[  122.590594]  print_report from kasan_report+0xc8/0x104
[  122.591355]  kasan_report from kmalloc_node_oob_right+0xd4/0x1e8
[  122.592597]  kmalloc_node_oob_right from kunit_try_run_case+0x11c/0x2e4
[  122.593390]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  122.594268]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  122.595986]  kthread from ret_from_fork+0x14/0x30
[  122.596515] Exception stack(0xf9eabfb0 to 0xf9eabff8)
[  122.597096] bfa0:                                     00000000 00000000 00000000 00000000
[  122.597909] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  122.598715] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  122.599519] 
[  122.600138] Allocated by task 116:
[  122.600635]  kasan_set_track+0x3c/0x5c
[  122.601126]  __kasan_kmalloc+0x8c/0x94
[  122.601820]  kmalloc_node_oob_right+0xa4/0x1e8
[  122.602476]  kunit_try_run_case+0x11c/0x2e4
[  122.603132]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  122.603790]  kthread+0x184/0x1a8
[  122.604311]  ret_from_fork+0x14/0x30
[  122.604801] 
[  122.605102] The buggy address belongs to the object at c4dec000
[  122.605102]  which belongs to the cache kmalloc-4k of size 4096
[  122.606086] The buggy address is located 0 bytes to the right of
[  122.606086]  allocated 4096-byte region [c4dec000, c4ded000)
[  122.607344] 
[  122.607584] The buggy address belongs to the physical page:
[  122.608255] page:1cce8090 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44de8
[  122.609133] head:1cce8090 order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  122.610452] flags: 0x840(slab|head|zone=0)
[  122.611151] page_type: 0xffffffff()
[  122.611591] raw: 00000840 c4801900 00000122 00000000 00000000 80040004 ffffffff 00000001
[  122.612467] raw: 00000000
[  122.612908] page dumped because: kasan: bad access detected
[  122.613488] 
[  122.613795] Memory state around the buggy address:
[  122.614373]  c4decf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  122.615227]  c4decf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  122.615855] >c4ded000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  122.616593]            ^
[  122.617030]  c4ded080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  122.617688]  c4ded100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  122.618250] ==================================================================

test log snippet test parser 36

Home

[  123.432189] ==================================================================
[  123.433242] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xf8/0x24c
[  123.434129] Write of size 16 at addr c4cdd280 by task kunit_try_catch/140
[  123.435465] 
[  123.435797] CPU: 1 PID: 140 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  123.437419] Hardware name: Generic DT based system
[  123.437933]  unwind_backtrace from show_stack+0x18/0x1c
[  123.438691]  show_stack from dump_stack_lvl+0x58/0x70
[  123.439759]  dump_stack_lvl from print_report+0x164/0x51c
[  123.440681]  print_report from kasan_report+0xc8/0x104
[  123.441551]  kasan_report from kasan_check_range+0x14c/0x198
[  123.442353]  kasan_check_range from kmalloc_oob_16+0xf8/0x24c
[  123.443378]  kmalloc_oob_16 from kunit_try_run_case+0x11c/0x2e4
[  123.444373]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.445464]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  123.446325]  kthread from ret_from_fork+0x14/0x30
[  123.447318] Exception stack(0xf9f6bfb0 to 0xf9f6bff8)
[  123.448163] bfa0:                                     00000000 00000000 00000000 00000000
[  123.449222] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  123.450283] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  123.451852] 
[  123.452133] Allocated by task 140:
[  123.452529]  kasan_set_track+0x3c/0x5c
[  123.453003]  __kasan_kmalloc+0x8c/0x94
[  123.453424]  kmalloc_oob_16+0xa0/0x24c
[  123.454504]  kunit_try_run_case+0x11c/0x2e4
[  123.455494]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.456120]  kthread+0x184/0x1a8
[  123.456641]  ret_from_fork+0x14/0x30
[  123.457169] 
[  123.457491] The buggy address belongs to the object at c4cdd280
[  123.457491]  which belongs to the cache kmalloc-64 of size 64
[  123.458406] The buggy address is located 0 bytes inside of
[  123.458406]  allocated 13-byte region [c4cdd280, c4cdd28d)
[  123.459678] 
[  123.459983] The buggy address belongs to the physical page:
[  123.460567] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[  123.462005] flags: 0x800(slab|zone=0)
[  123.462734] page_type: 0xffffffff()
[  123.463413] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  123.464445] raw: 00000000
[  123.465045] page dumped because: kasan: bad access detected
[  123.465805] 
[  123.466131] Memory state around the buggy address:
[  123.466645]  c4cdd180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  123.467704]  c4cdd200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  123.468388] >c4cdd280: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.469022]               ^
[  123.469413]  c4cdd300: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.470713]  c4cdd380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.471695] ==================================================================

test log snippet test parser 37

Home

[  123.432189] ==================================================================
[  123.433242] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xf8/0x24c
[  123.434129] Write of size 16 at addr c4cdd280 by task kunit_try_catch/140
[  123.435465] 
[  123.435797] CPU: 1 PID: 140 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  123.437419] Hardware name: Generic DT based system
[  123.437933]  unwind_backtrace from show_stack+0x18/0x1c
[  123.438691]  show_stack from dump_stack_lvl+0x58/0x70
[  123.439759]  dump_stack_lvl from print_report+0x164/0x51c
[  123.440681]  print_report from kasan_report+0xc8/0x104
[  123.441551]  kasan_report from kasan_check_range+0x14c/0x198
[  123.442353]  kasan_check_range from kmalloc_oob_16+0xf8/0x24c
[  123.443378]  kmalloc_oob_16 from kunit_try_run_case+0x11c/0x2e4
[  123.444373]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.445464]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  123.446325]  kthread from ret_from_fork+0x14/0x30
[  123.447318] Exception stack(0xf9f6bfb0 to 0xf9f6bff8)
[  123.448163] bfa0:                                     00000000 00000000 00000000 00000000
[  123.449222] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  123.450283] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  123.451852] 
[  123.452133] Allocated by task 140:
[  123.452529]  kasan_set_track+0x3c/0x5c
[  123.453003]  __kasan_kmalloc+0x8c/0x94
[  123.453424]  kmalloc_oob_16+0xa0/0x24c
[  123.454504]  kunit_try_run_case+0x11c/0x2e4
[  123.455494]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.456120]  kthread+0x184/0x1a8
[  123.456641]  ret_from_fork+0x14/0x30
[  123.457169] 
[  123.457491] The buggy address belongs to the object at c4cdd280
[  123.457491]  which belongs to the cache kmalloc-64 of size 64
[  123.458406] The buggy address is located 0 bytes inside of
[  123.458406]  allocated 13-byte region [c4cdd280, c4cdd28d)
[  123.459678] 
[  123.459983] The buggy address belongs to the physical page:
[  123.460567] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[  123.462005] flags: 0x800(slab|zone=0)
[  123.462734] page_type: 0xffffffff()
[  123.463413] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  123.464445] raw: 00000000
[  123.465045] page dumped because: kasan: bad access detected
[  123.465805] 
[  123.466131] Memory state around the buggy address:
[  123.466645]  c4cdd180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  123.467704]  c4cdd200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  123.468388] >c4cdd280: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.469022]               ^
[  123.469413]  c4cdd300: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.470713]  c4cdd380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.471695] ==================================================================

test log snippet test parser 38

Home

[  123.534702] ==================================================================
[  123.535488] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0xd8/0x1dc
[  123.536436] Write of size 128 at addr c4cdc200 by task kunit_try_catch/144
[  123.537202] 
[  123.537501] CPU: 1 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  123.538327] Hardware name: Generic DT based system
[  123.538965]  unwind_backtrace from show_stack+0x18/0x1c
[  123.539745]  show_stack from dump_stack_lvl+0x58/0x70
[  123.540238]  dump_stack_lvl from print_report+0x164/0x51c
[  123.541066]  print_report from kasan_report+0xc8/0x104
[  123.541754]  kasan_report from kasan_check_range+0x14c/0x198
[  123.542412]  kasan_check_range from __asan_memset+0x20/0x3c
[  123.543312]  __asan_memset from kmalloc_oob_in_memset+0xd8/0x1dc
[  123.544205]  kmalloc_oob_in_memset from kunit_try_run_case+0x11c/0x2e4
[  123.545170]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.546200]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  123.547092]  kthread from ret_from_fork+0x14/0x30
[  123.547759] Exception stack(0xf9f8bfb0 to 0xf9f8bff8)
[  123.548366] bfa0:                                     00000000 00000000 00000000 00000000
[  123.549235] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  123.550554] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  123.551333] 
[  123.552003] Allocated by task 144:
[  123.552430]  kasan_set_track+0x3c/0x5c
[  123.553106]  __kasan_kmalloc+0x8c/0x94
[  123.554247]  kmalloc_oob_in_memset+0xa0/0x1dc
[  123.555013]  kunit_try_run_case+0x11c/0x2e4
[  123.555663]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.556299]  kthread+0x184/0x1a8
[  123.557184]  ret_from_fork+0x14/0x30
[  123.557962] 
[  123.558295] The buggy address belongs to the object at c4cdc200
[  123.558295]  which belongs to the cache kmalloc-128 of size 128
[  123.559693] The buggy address is located 0 bytes inside of
[  123.559693]  allocated 120-byte region [c4cdc200, c4cdc278)
[  123.561053] 
[  123.561555] The buggy address belongs to the physical page:
[  123.562402] page:4ad3b9de refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdc
[  123.563306] flags: 0x800(slab|zone=0)
[  123.564140] page_type: 0xffffffff()
[  123.564874] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  123.565847] raw: 00000000
[  123.566446] page dumped because: kasan: bad access detected
[  123.567103] 
[  123.567748] Memory state around the buggy address:
[  123.568369]  c4cdc100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  123.569100]  c4cdc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.570462] >c4cdc200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  123.571682]                                                         ^
[  123.572553]  c4cdc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.573411]  c4cdc300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.574288] ==================================================================

test log snippet test parser 39

Home

[  122.532533] ==================================================================
[  122.534052] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0xcc/0x1e0
[  122.534811] Read of size 1 at addr c4cdd1ff by task kunit_try_catch/114
[  122.535506] 
[  122.535773] CPU: 1 PID: 114 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  122.536825] Hardware name: Generic DT based system
[  122.537333]  unwind_backtrace from show_stack+0x18/0x1c
[  122.538190]  show_stack from dump_stack_lvl+0x58/0x70
[  122.539012]  dump_stack_lvl from print_report+0x164/0x51c
[  122.539891]  print_report from kasan_report+0xc8/0x104
[  122.541168]  kasan_report from kmalloc_oob_left+0xcc/0x1e0
[  122.541800]  kmalloc_oob_left from kunit_try_run_case+0x11c/0x2e4
[  122.542745]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  122.543838]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  122.544673]  kthread from ret_from_fork+0x14/0x30
[  122.545280] Exception stack(0xf9e9bfb0 to 0xf9e9bff8)
[  122.545867] bfa0:                                     00000000 00000000 00000000 00000000
[  122.546586] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  122.547540] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  122.548193] 
[  122.548488] Allocated by task 110:
[  122.548969]  kasan_set_track+0x3c/0x5c
[  122.550115]  __kasan_kmalloc+0x8c/0x94
[  122.550696]  kunit_add_action+0xa0/0x1e8
[  122.551242]  kunit_add_action_or_reset+0x18/0x30
[  122.551890]  kunit_kmalloc_array+0x44/0x60
[  122.552490]  sysctl_test_api_dointvec_write_single_greater_int_max+0x134/0x2b8
[  122.553446]  kunit_try_run_case+0x11c/0x2e4
[  122.554059]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  122.555012]  kthread+0x184/0x1a8
[  122.555671]  ret_from_fork+0x14/0x30
[  122.556174] 
[  122.556554] Freed by task 111:
[  122.557086]  kasan_set_track+0x3c/0x5c
[  122.557772]  kasan_save_free_info+0x30/0x3c
[  122.558471]  __kasan_slab_free+0xdc/0x124
[  122.559197]  __kmem_cache_free+0x140/0x2a8
[  122.560400]  kunit_cleanup+0x44/0x90
[  122.561022]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  122.561681]  kthread+0x184/0x1a8
[  122.562121]  ret_from_fork+0x14/0x30
[  122.562635] 
[  122.562875] The buggy address belongs to the object at c4cdd180
[  122.562875]  which belongs to the cache kmalloc-64 of size 64
[  122.563909] The buggy address is located 63 bytes to the right of
[  122.563909]  allocated 64-byte region [c4cdd180, c4cdd1c0)
[  122.564916] 
[  122.565197] The buggy address belongs to the physical page:
[  122.565824] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[  122.566550] flags: 0x800(slab|zone=0)
[  122.567105] page_type: 0xffffffff()
[  122.567678] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  122.568411] raw: 00000000
[  122.568831] page dumped because: kasan: bad access detected
[  122.569327] 
[  122.570066] Memory state around the buggy address:
[  122.570678]  c4cdd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  122.571297]  c4cdd100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  122.572079] >c4cdd180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  122.572839]                                                         ^
[  122.573396]  c4cdd200: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  122.574181]  c4cdd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  122.574802] ==================================================================

test log snippet test parser 40

Home

[  123.733746] ==================================================================
[  123.734540] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xdc/0x1e0
[  123.735858] Write of size 16 at addr c4cdc669 by task kunit_try_catch/152
[  123.737017] 
[  123.737240] CPU: 1 PID: 152 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  123.738185] Hardware name: Generic DT based system
[  123.739135]  unwind_backtrace from show_stack+0x18/0x1c
[  123.740067]  show_stack from dump_stack_lvl+0x58/0x70
[  123.740970]  dump_stack_lvl from print_report+0x164/0x51c
[  123.741884]  print_report from kasan_report+0xc8/0x104
[  123.742802]  kasan_report from kasan_check_range+0x14c/0x198
[  123.743731]  kasan_check_range from __asan_memset+0x20/0x3c
[  123.744498]  __asan_memset from kmalloc_oob_memset_16+0xdc/0x1e0
[  123.745526]  kmalloc_oob_memset_16 from kunit_try_run_case+0x11c/0x2e4
[  123.746545]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.747654]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  123.748673]  kthread from ret_from_fork+0x14/0x30
[  123.749292] Exception stack(0xf9fcbfb0 to 0xf9fcbff8)
[  123.750944] bfa0:                                     00000000 00000000 00000000 00000000
[  123.752259] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  123.753140] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  123.754216] 
[  123.754482] Allocated by task 152:
[  123.754901]  kasan_set_track+0x3c/0x5c
[  123.755524]  __kasan_kmalloc+0x8c/0x94
[  123.756218]  kmalloc_oob_memset_16+0xa0/0x1e0
[  123.756841]  kunit_try_run_case+0x11c/0x2e4
[  123.757509]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.758298]  kthread+0x184/0x1a8
[  123.758940]  ret_from_fork+0x14/0x30
[  123.759407] 
[  123.759735] The buggy address belongs to the object at c4cdc600
[  123.759735]  which belongs to the cache kmalloc-128 of size 128
[  123.760866] The buggy address is located 105 bytes inside of
[  123.760866]  allocated 120-byte region [c4cdc600, c4cdc678)
[  123.761996] 
[  123.762308] The buggy address belongs to the physical page:
[  123.762910] page:4ad3b9de refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdc
[  123.763907] flags: 0x800(slab|zone=0)
[  123.764476] page_type: 0xffffffff()
[  123.764959] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  123.765809] raw: 00000000
[  123.766249] page dumped because: kasan: bad access detected
[  123.766915] 
[  123.767212] Memory state around the buggy address:
[  123.767823]  c4cdc500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  123.768550]  c4cdc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.769294] >c4cdc600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  123.770187]                                                         ^
[  123.770732]  c4cdc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.771545]  c4cdc700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.772228] ==================================================================

test log snippet test parser 41

Home

[  123.733746] ==================================================================
[  123.734540] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xdc/0x1e0
[  123.735858] Write of size 16 at addr c4cdc669 by task kunit_try_catch/152
[  123.737017] 
[  123.737240] CPU: 1 PID: 152 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  123.738185] Hardware name: Generic DT based system
[  123.739135]  unwind_backtrace from show_stack+0x18/0x1c
[  123.740067]  show_stack from dump_stack_lvl+0x58/0x70
[  123.740970]  dump_stack_lvl from print_report+0x164/0x51c
[  123.741884]  print_report from kasan_report+0xc8/0x104
[  123.742802]  kasan_report from kasan_check_range+0x14c/0x198
[  123.743731]  kasan_check_range from __asan_memset+0x20/0x3c
[  123.744498]  __asan_memset from kmalloc_oob_memset_16+0xdc/0x1e0
[  123.745526]  kmalloc_oob_memset_16 from kunit_try_run_case+0x11c/0x2e4
[  123.746545]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.747654]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  123.748673]  kthread from ret_from_fork+0x14/0x30
[  123.749292] Exception stack(0xf9fcbfb0 to 0xf9fcbff8)
[  123.750944] bfa0:                                     00000000 00000000 00000000 00000000
[  123.752259] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  123.753140] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  123.754216] 
[  123.754482] Allocated by task 152:
[  123.754901]  kasan_set_track+0x3c/0x5c
[  123.755524]  __kasan_kmalloc+0x8c/0x94
[  123.756218]  kmalloc_oob_memset_16+0xa0/0x1e0
[  123.756841]  kunit_try_run_case+0x11c/0x2e4
[  123.757509]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.758298]  kthread+0x184/0x1a8
[  123.758940]  ret_from_fork+0x14/0x30
[  123.759407] 
[  123.759735] The buggy address belongs to the object at c4cdc600
[  123.759735]  which belongs to the cache kmalloc-128 of size 128
[  123.760866] The buggy address is located 105 bytes inside of
[  123.760866]  allocated 120-byte region [c4cdc600, c4cdc678)
[  123.761996] 
[  123.762308] The buggy address belongs to the physical page:
[  123.762910] page:4ad3b9de refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdc
[  123.763907] flags: 0x800(slab|zone=0)
[  123.764476] page_type: 0xffffffff()
[  123.764959] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  123.765809] raw: 00000000
[  123.766249] page dumped because: kasan: bad access detected
[  123.766915] 
[  123.767212] Memory state around the buggy address:
[  123.767823]  c4cdc500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  123.768550]  c4cdc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.769294] >c4cdc600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  123.770187]                                                         ^
[  123.770732]  c4cdc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.771545]  c4cdc700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.772228] ==================================================================

test log snippet test parser 42

Home

[  123.584763] ==================================================================
[  123.585548] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xdc/0x1e4
[  123.586311] Write of size 2 at addr c4cdc377 by task kunit_try_catch/146
[  123.587118] 
[  123.587360] CPU: 1 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  123.588292] Hardware name: Generic DT based system
[  123.588904]  unwind_backtrace from show_stack+0x18/0x1c
[  123.589634]  show_stack from dump_stack_lvl+0x58/0x70
[  123.590300]  dump_stack_lvl from print_report+0x164/0x51c
[  123.591170]  print_report from kasan_report+0xc8/0x104
[  123.591927]  kasan_report from kasan_check_range+0x14c/0x198
[  123.592591]  kasan_check_range from __asan_memset+0x20/0x3c
[  123.593484]  __asan_memset from kmalloc_oob_memset_2+0xdc/0x1e4
[  123.594285]  kmalloc_oob_memset_2 from kunit_try_run_case+0x11c/0x2e4
[  123.595057]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.596014]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  123.596877]  kthread from ret_from_fork+0x14/0x30
[  123.597535] Exception stack(0xf9f9bfb0 to 0xf9f9bff8)
[  123.598036] bfa0:                                     00000000 00000000 00000000 00000000
[  123.598924] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  123.600152] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  123.601139] 
[  123.601425] Allocated by task 146:
[  123.602110]  kasan_set_track+0x3c/0x5c
[  123.602668]  __kasan_kmalloc+0x8c/0x94
[  123.603188]  kmalloc_oob_memset_2+0xa0/0x1e4
[  123.603600]  kunit_try_run_case+0x11c/0x2e4
[  123.604245]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.605668]  kthread+0x184/0x1a8
[  123.606313]  ret_from_fork+0x14/0x30
[  123.607048] 
[  123.607339] The buggy address belongs to the object at c4cdc300
[  123.607339]  which belongs to the cache kmalloc-128 of size 128
[  123.608326] The buggy address is located 119 bytes inside of
[  123.608326]  allocated 120-byte region [c4cdc300, c4cdc378)
[  123.609316] 
[  123.610405] The buggy address belongs to the physical page:
[  123.610973] page:4ad3b9de refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdc
[  123.612013] flags: 0x800(slab|zone=0)
[  123.612696] page_type: 0xffffffff()
[  123.613420] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  123.614464] raw: 00000000
[  123.615077] page dumped because: kasan: bad access detected
[  123.615773] 
[  123.616060] Memory state around the buggy address:
[  123.616875]  c4cdc200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  123.617535]  c4cdc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.618216] >c4cdc300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  123.619227]                                                         ^
[  123.620014]  c4cdc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.620928]  c4cdc400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.621529] ==================================================================

test log snippet test parser 43

Home

[  123.584763] ==================================================================
[  123.585548] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xdc/0x1e4
[  123.586311] Write of size 2 at addr c4cdc377 by task kunit_try_catch/146
[  123.587118] 
[  123.587360] CPU: 1 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  123.588292] Hardware name: Generic DT based system
[  123.588904]  unwind_backtrace from show_stack+0x18/0x1c
[  123.589634]  show_stack from dump_stack_lvl+0x58/0x70
[  123.590300]  dump_stack_lvl from print_report+0x164/0x51c
[  123.591170]  print_report from kasan_report+0xc8/0x104
[  123.591927]  kasan_report from kasan_check_range+0x14c/0x198
[  123.592591]  kasan_check_range from __asan_memset+0x20/0x3c
[  123.593484]  __asan_memset from kmalloc_oob_memset_2+0xdc/0x1e4
[  123.594285]  kmalloc_oob_memset_2 from kunit_try_run_case+0x11c/0x2e4
[  123.595057]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.596014]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  123.596877]  kthread from ret_from_fork+0x14/0x30
[  123.597535] Exception stack(0xf9f9bfb0 to 0xf9f9bff8)
[  123.598036] bfa0:                                     00000000 00000000 00000000 00000000
[  123.598924] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  123.600152] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  123.601139] 
[  123.601425] Allocated by task 146:
[  123.602110]  kasan_set_track+0x3c/0x5c
[  123.602668]  __kasan_kmalloc+0x8c/0x94
[  123.603188]  kmalloc_oob_memset_2+0xa0/0x1e4
[  123.603600]  kunit_try_run_case+0x11c/0x2e4
[  123.604245]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.605668]  kthread+0x184/0x1a8
[  123.606313]  ret_from_fork+0x14/0x30
[  123.607048] 
[  123.607339] The buggy address belongs to the object at c4cdc300
[  123.607339]  which belongs to the cache kmalloc-128 of size 128
[  123.608326] The buggy address is located 119 bytes inside of
[  123.608326]  allocated 120-byte region [c4cdc300, c4cdc378)
[  123.609316] 
[  123.610405] The buggy address belongs to the physical page:
[  123.610973] page:4ad3b9de refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdc
[  123.612013] flags: 0x800(slab|zone=0)
[  123.612696] page_type: 0xffffffff()
[  123.613420] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  123.614464] raw: 00000000
[  123.615077] page dumped because: kasan: bad access detected
[  123.615773] 
[  123.616060] Memory state around the buggy address:
[  123.616875]  c4cdc200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  123.617535]  c4cdc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.618216] >c4cdc300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  123.619227]                                                         ^
[  123.620014]  c4cdc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.620928]  c4cdc400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.621529] ==================================================================

test log snippet test parser 44

Home

[  123.632738] ==================================================================
[  123.633536] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xdc/0x1e8
[  123.634765] Write of size 4 at addr c4cdc475 by task kunit_try_catch/148
[  123.635514] 
[  123.635832] CPU: 1 PID: 148 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  123.637964] Hardware name: Generic DT based system
[  123.638504]  unwind_backtrace from show_stack+0x18/0x1c
[  123.639183]  show_stack from dump_stack_lvl+0x58/0x70
[  123.640081]  dump_stack_lvl from print_report+0x164/0x51c
[  123.641014]  print_report from kasan_report+0xc8/0x104
[  123.641914]  kasan_report from kasan_check_range+0x14c/0x198
[  123.642857]  kasan_check_range from __asan_memset+0x20/0x3c
[  123.643771]  __asan_memset from kmalloc_oob_memset_4+0xdc/0x1e8
[  123.644480]  kmalloc_oob_memset_4 from kunit_try_run_case+0x11c/0x2e4
[  123.645305]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.646521]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  123.647571]  kthread from ret_from_fork+0x14/0x30
[  123.648383] Exception stack(0xf9fabfb0 to 0xf9fabff8)
[  123.649209] bfa0:                                     00000000 00000000 00000000 00000000
[  123.650336] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  123.651526] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  123.652666] 
[  123.653083] Allocated by task 148:
[  123.653699]  kasan_set_track+0x3c/0x5c
[  123.654221]  __kasan_kmalloc+0x8c/0x94
[  123.654741]  kmalloc_oob_memset_4+0xa0/0x1e8
[  123.655264]  kunit_try_run_case+0x11c/0x2e4
[  123.656183]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.657063]  kthread+0x184/0x1a8
[  123.657735]  ret_from_fork+0x14/0x30
[  123.658407] 
[  123.658737] The buggy address belongs to the object at c4cdc400
[  123.658737]  which belongs to the cache kmalloc-128 of size 128
[  123.660053] The buggy address is located 117 bytes inside of
[  123.660053]  allocated 120-byte region [c4cdc400, c4cdc478)
[  123.661307] 
[  123.661975] The buggy address belongs to the physical page:
[  123.662461] page:4ad3b9de refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdc
[  123.663338] flags: 0x800(slab|zone=0)
[  123.663877] page_type: 0xffffffff()
[  123.664347] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  123.665748] raw: 00000000
[  123.666478] page dumped because: kasan: bad access detected
[  123.667062] 
[  123.667542] Memory state around the buggy address:
[  123.668252]  c4cdc300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  123.669160]  c4cdc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.670571] >c4cdc400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  123.671456]                                                         ^
[  123.672242]  c4cdc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.672929]  c4cdc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.674038] ==================================================================

test log snippet test parser 45

Home

[  123.632738] ==================================================================
[  123.633536] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xdc/0x1e8
[  123.634765] Write of size 4 at addr c4cdc475 by task kunit_try_catch/148
[  123.635514] 
[  123.635832] CPU: 1 PID: 148 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  123.637964] Hardware name: Generic DT based system
[  123.638504]  unwind_backtrace from show_stack+0x18/0x1c
[  123.639183]  show_stack from dump_stack_lvl+0x58/0x70
[  123.640081]  dump_stack_lvl from print_report+0x164/0x51c
[  123.641014]  print_report from kasan_report+0xc8/0x104
[  123.641914]  kasan_report from kasan_check_range+0x14c/0x198
[  123.642857]  kasan_check_range from __asan_memset+0x20/0x3c
[  123.643771]  __asan_memset from kmalloc_oob_memset_4+0xdc/0x1e8
[  123.644480]  kmalloc_oob_memset_4 from kunit_try_run_case+0x11c/0x2e4
[  123.645305]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.646521]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  123.647571]  kthread from ret_from_fork+0x14/0x30
[  123.648383] Exception stack(0xf9fabfb0 to 0xf9fabff8)
[  123.649209] bfa0:                                     00000000 00000000 00000000 00000000
[  123.650336] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  123.651526] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  123.652666] 
[  123.653083] Allocated by task 148:
[  123.653699]  kasan_set_track+0x3c/0x5c
[  123.654221]  __kasan_kmalloc+0x8c/0x94
[  123.654741]  kmalloc_oob_memset_4+0xa0/0x1e8
[  123.655264]  kunit_try_run_case+0x11c/0x2e4
[  123.656183]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.657063]  kthread+0x184/0x1a8
[  123.657735]  ret_from_fork+0x14/0x30
[  123.658407] 
[  123.658737] The buggy address belongs to the object at c4cdc400
[  123.658737]  which belongs to the cache kmalloc-128 of size 128
[  123.660053] The buggy address is located 117 bytes inside of
[  123.660053]  allocated 120-byte region [c4cdc400, c4cdc478)
[  123.661307] 
[  123.661975] The buggy address belongs to the physical page:
[  123.662461] page:4ad3b9de refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdc
[  123.663338] flags: 0x800(slab|zone=0)
[  123.663877] page_type: 0xffffffff()
[  123.664347] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  123.665748] raw: 00000000
[  123.666478] page dumped because: kasan: bad access detected
[  123.667062] 
[  123.667542] Memory state around the buggy address:
[  123.668252]  c4cdc300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  123.669160]  c4cdc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.670571] >c4cdc400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  123.671456]                                                         ^
[  123.672242]  c4cdc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.672929]  c4cdc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.674038] ==================================================================

test log snippet test parser 46

Home

[  123.683839] ==================================================================
[  123.684673] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xdc/0x1e8
[  123.685507] Write of size 8 at addr c4cdc571 by task kunit_try_catch/150
[  123.686167] 
[  123.686433] CPU: 1 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  123.687332] Hardware name: Generic DT based system
[  123.687832]  unwind_backtrace from show_stack+0x18/0x1c
[  123.688630]  show_stack from dump_stack_lvl+0x58/0x70
[  123.689234]  dump_stack_lvl from print_report+0x164/0x51c
[  123.690089]  print_report from kasan_report+0xc8/0x104
[  123.690897]  kasan_report from kasan_check_range+0x14c/0x198
[  123.691749]  kasan_check_range from __asan_memset+0x20/0x3c
[  123.692464]  __asan_memset from kmalloc_oob_memset_8+0xdc/0x1e8
[  123.693145]  kmalloc_oob_memset_8 from kunit_try_run_case+0x11c/0x2e4
[  123.694079]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.694941]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  123.695888]  kthread from ret_from_fork+0x14/0x30
[  123.696558] Exception stack(0xf9fbbfb0 to 0xf9fbbff8)
[  123.697067] bfa0:                                     00000000 00000000 00000000 00000000
[  123.697949] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  123.698745] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  123.699377] 
[  123.699696] Allocated by task 150:
[  123.700095]  kasan_set_track+0x3c/0x5c
[  123.700696]  __kasan_kmalloc+0x8c/0x94
[  123.701241]  kmalloc_oob_memset_8+0xa0/0x1e8
[  123.701957]  kunit_try_run_case+0x11c/0x2e4
[  123.702983]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.703525]  kthread+0x184/0x1a8
[  123.704040]  ret_from_fork+0x14/0x30
[  123.705186] 
[  123.705805] The buggy address belongs to the object at c4cdc500
[  123.705805]  which belongs to the cache kmalloc-128 of size 128
[  123.707283] The buggy address is located 113 bytes inside of
[  123.707283]  allocated 120-byte region [c4cdc500, c4cdc578)
[  123.708543] 
[  123.708764] The buggy address belongs to the physical page:
[  123.709751] page:4ad3b9de refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdc
[  123.710643] flags: 0x800(slab|zone=0)
[  123.711440] page_type: 0xffffffff()
[  123.712130] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  123.713146] raw: 00000000
[  123.713758] page dumped because: kasan: bad access detected
[  123.714562] 
[  123.714894] Memory state around the buggy address:
[  123.715784]  c4cdc400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  123.716690]  c4cdc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.717367] >c4cdc500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  123.718011]                                                         ^
[  123.719219]  c4cdc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.720038]  c4cdc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.721339] ==================================================================

test log snippet test parser 47

Home

[  123.683839] ==================================================================
[  123.684673] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xdc/0x1e8
[  123.685507] Write of size 8 at addr c4cdc571 by task kunit_try_catch/150
[  123.686167] 
[  123.686433] CPU: 1 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  123.687332] Hardware name: Generic DT based system
[  123.687832]  unwind_backtrace from show_stack+0x18/0x1c
[  123.688630]  show_stack from dump_stack_lvl+0x58/0x70
[  123.689234]  dump_stack_lvl from print_report+0x164/0x51c
[  123.690089]  print_report from kasan_report+0xc8/0x104
[  123.690897]  kasan_report from kasan_check_range+0x14c/0x198
[  123.691749]  kasan_check_range from __asan_memset+0x20/0x3c
[  123.692464]  __asan_memset from kmalloc_oob_memset_8+0xdc/0x1e8
[  123.693145]  kmalloc_oob_memset_8 from kunit_try_run_case+0x11c/0x2e4
[  123.694079]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.694941]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  123.695888]  kthread from ret_from_fork+0x14/0x30
[  123.696558] Exception stack(0xf9fbbfb0 to 0xf9fbbff8)
[  123.697067] bfa0:                                     00000000 00000000 00000000 00000000
[  123.697949] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  123.698745] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  123.699377] 
[  123.699696] Allocated by task 150:
[  123.700095]  kasan_set_track+0x3c/0x5c
[  123.700696]  __kasan_kmalloc+0x8c/0x94
[  123.701241]  kmalloc_oob_memset_8+0xa0/0x1e8
[  123.701957]  kunit_try_run_case+0x11c/0x2e4
[  123.702983]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.703525]  kthread+0x184/0x1a8
[  123.704040]  ret_from_fork+0x14/0x30
[  123.705186] 
[  123.705805] The buggy address belongs to the object at c4cdc500
[  123.705805]  which belongs to the cache kmalloc-128 of size 128
[  123.707283] The buggy address is located 113 bytes inside of
[  123.707283]  allocated 120-byte region [c4cdc500, c4cdc578)
[  123.708543] 
[  123.708764] The buggy address belongs to the physical page:
[  123.709751] page:4ad3b9de refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdc
[  123.710643] flags: 0x800(slab|zone=0)
[  123.711440] page_type: 0xffffffff()
[  123.712130] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  123.713146] raw: 00000000
[  123.713758] page dumped because: kasan: bad access detected
[  123.714562] 
[  123.714894] Memory state around the buggy address:
[  123.715784]  c4cdc400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  123.716690]  c4cdc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.717367] >c4cdc500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  123.718011]                                                         ^
[  123.719219]  c4cdc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.720038]  c4cdc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.721339] ==================================================================

test log snippet test parser 48

Home

[  122.451356] ==================================================================
[  122.452873] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x100/0x320
[  122.453452] Write of size 1 at addr c8e25878 by task kunit_try_catch/112
[  122.453993] 
[  122.454211] CPU: 0 PID: 112 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  122.456381] Hardware name: Generic DT based system
[  122.457467]  unwind_backtrace from show_stack+0x18/0x1c
[  122.458432]  show_stack from dump_stack_lvl+0x58/0x70
[  122.459659]  dump_stack_lvl from print_report+0x164/0x51c
[  122.460759]  print_report from kasan_report+0xc8/0x104
[  122.461849]  kasan_report from kmalloc_oob_right+0x100/0x320
[  122.463393]  kmalloc_oob_right from kunit_try_run_case+0x11c/0x2e4
[  122.464348]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  122.465393]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  122.466327]  kthread from ret_from_fork+0x14/0x30
[  122.466998] Exception stack(0xf9e93fb0 to 0xf9e93ff8)
[  122.467582] 3fa0:                                     00000000 00000000 00000000 00000000
[  122.468488] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  122.469339] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  122.470053] 
[  122.470246] Allocated by task 112:
[  122.470746]  kasan_set_track+0x3c/0x5c
[  122.471383]  __kasan_kmalloc+0x8c/0x94
[  122.471837]  kmalloc_oob_right+0xa0/0x320
[  122.472389]  kunit_try_run_case+0x11c/0x2e4
[  122.473262]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  122.474538]  kthread+0x184/0x1a8
[  122.475034]  ret_from_fork+0x14/0x30
[  122.475545] 
[  122.475870] The buggy address belongs to the object at c8e25800
[  122.475870]  which belongs to the cache kmalloc-128 of size 128
[  122.476996] The buggy address is located 5 bytes to the right of
[  122.476996]  allocated 115-byte region [c8e25800, c8e25873)
[  122.478126] 
[  122.478456] The buggy address belongs to the physical page:
[  122.479006] page:b090acfa refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e25
[  122.480410] flags: 0x800(slab|zone=0)
[  122.481148] page_type: 0xffffffff()
[  122.482028] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  122.482745] raw: 00000000
[  122.483141] page dumped because: kasan: bad access detected
[  122.484040] 
[  122.484431] Memory state around the buggy address:
[  122.485070]  c8e25700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  122.485854]  c8e25780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  122.486386] >c8e25800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  122.486998]                                                         ^
[  122.487779]  c8e25880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  122.488342]  c8e25900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  122.489094] ==================================================================

test log snippet test parser 49

Home

[  122.491033] ==================================================================
[  122.491651] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x134/0x320
[  122.492206] Read of size 1 at addr c8e25880 by task kunit_try_catch/112
[  122.492824] 
[  122.493141] CPU: 0 PID: 112 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  122.494234] Hardware name: Generic DT based system
[  122.494894]  unwind_backtrace from show_stack+0x18/0x1c
[  122.495743]  show_stack from dump_stack_lvl+0x58/0x70
[  122.496521]  dump_stack_lvl from print_report+0x164/0x51c
[  122.497374]  print_report from kasan_report+0xc8/0x104
[  122.498111]  kasan_report from kmalloc_oob_right+0x134/0x320
[  122.498462]  kmalloc_oob_right from kunit_try_run_case+0x11c/0x2e4
[  122.499059]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  122.500182]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  122.501554]  kthread from ret_from_fork+0x14/0x30
[  122.502016] Exception stack(0xf9e93fb0 to 0xf9e93ff8)
[  122.502458] 3fa0:                                     00000000 00000000 00000000 00000000
[  122.503447] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  122.504350] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  122.505140] 
[  122.505392] Allocated by task 112:
[  122.505926]  kasan_set_track+0x3c/0x5c
[  122.506463]  __kasan_kmalloc+0x8c/0x94
[  122.507117]  kmalloc_oob_right+0xa0/0x320
[  122.507707]  kunit_try_run_case+0x11c/0x2e4
[  122.508339]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  122.509059]  kthread+0x184/0x1a8
[  122.509706]  ret_from_fork+0x14/0x30
[  122.510635] 
[  122.510854] The buggy address belongs to the object at c8e25800
[  122.510854]  which belongs to the cache kmalloc-128 of size 128
[  122.512338] The buggy address is located 13 bytes to the right of
[  122.512338]  allocated 115-byte region [c8e25800, c8e25873)
[  122.513738] 
[  122.513979] The buggy address belongs to the physical page:
[  122.514672] page:b090acfa refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e25
[  122.515527] flags: 0x800(slab|zone=0)
[  122.516117] page_type: 0xffffffff()
[  122.516694] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  122.517573] raw: 00000000
[  122.517990] page dumped because: kasan: bad access detected
[  122.518677] 
[  122.518904] Memory state around the buggy address:
[  122.519315]  c8e25780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  122.520764]  c8e25800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  122.521501] >c8e25880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  122.522432]            ^
[  122.522779]  c8e25900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  122.523416]  c8e25980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  122.524104] ==================================================================

test log snippet test parser 50

Home

[  122.401778] ==================================================================
[  122.403990] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xcc/0x320
[  122.407192] Write of size 1 at addr c8e25873 by task kunit_try_catch/112
[  122.407957] 
[  122.408767] CPU: 0 PID: 112 Comm: kunit_try_catch Tainted: G                 N 6.6.74-rc1 #1
[  122.410441] Hardware name: Generic DT based system
[  122.411970]  unwind_backtrace from show_stack+0x18/0x1c
[  122.412936]  show_stack from dump_stack_lvl+0x58/0x70
[  122.413788]  dump_stack_lvl from print_report+0x164/0x51c
[  122.414572]  print_report from kasan_report+0xc8/0x104
[  122.415271]  kasan_report from kmalloc_oob_right+0xcc/0x320
[  122.416000]  kmalloc_oob_right from kunit_try_run_case+0x11c/0x2e4
[  122.416677]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  122.417399]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  122.417941]  kthread from ret_from_fork+0x14/0x30
[  122.418640] Exception stack(0xf9e93fb0 to 0xf9e93ff8)
[  122.419957] 3fa0:                                     00000000 00000000 00000000 00000000
[  122.420902] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  122.421912] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  122.422963] 
[  122.423345] Allocated by task 112:
[  122.423996]  kasan_set_track+0x3c/0x5c
[  122.424649]  __kasan_kmalloc+0x8c/0x94
[  122.425097]  kmalloc_oob_right+0xa0/0x320
[  122.425546]  kunit_try_run_case+0x11c/0x2e4
[  122.426177]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  122.426864]  kthread+0x184/0x1a8
[  122.427264]  ret_from_fork+0x14/0x30
[  122.427841] 
[  122.428265] The buggy address belongs to the object at c8e25800
[  122.428265]  which belongs to the cache kmalloc-128 of size 128
[  122.429476] The buggy address is located 0 bytes to the right of
[  122.429476]  allocated 115-byte region [c8e25800, c8e25873)
[  122.431163] 
[  122.432047] The buggy address belongs to the physical page:
[  122.433341] page:b090acfa refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e25
[  122.435080] flags: 0x800(slab|zone=0)
[  122.436186] page_type: 0xffffffff()
[  122.437325] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  122.438148] raw: 00000000
[  122.438643] page dumped because: kasan: bad access detected
[  122.439201] 
[  122.439493] Memory state around the buggy address:
[  122.441080]  c8e25700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  122.441971]  c8e25780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  122.442660] >c8e25800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  122.443328]                                                      ^
[  122.444208]  c8e25880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  122.444913]  c8e25900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  122.445692] ==================================================================

test log snippet test parser 51

Home

[  122.628633] ==================================================================
[  122.629515] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0xb4/0x1bc
[  122.630729] Write of size 1 at addr c4dda00a by task kunit_try_catch/118
[  122.631327] 
[  122.631653] CPU: 1 PID: 118 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  122.632548] Hardware name: Generic DT based system
[  122.634084]  unwind_backtrace from show_stack+0x18/0x1c
[  122.634848]  show_stack from dump_stack_lvl+0x58/0x70
[  122.635641]  dump_stack_lvl from print_report+0x164/0x51c
[  122.636378]  print_report from kasan_report+0xc8/0x104
[  122.636981]  kasan_report from kmalloc_pagealloc_oob_right+0xb4/0x1bc
[  122.637896]  kmalloc_pagealloc_oob_right from kunit_try_run_case+0x11c/0x2e4
[  122.638723]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  122.639888]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  122.640904]  kthread from ret_from_fork+0x14/0x30
[  122.641690] Exception stack(0xf9ebbfb0 to 0xf9ebbff8)
[  122.642255] bfa0:                                     00000000 00000000 00000000 00000000
[  122.642991] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  122.643783] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  122.644378] 
[  122.644704] The buggy address belongs to the physical page:
[  122.645504] page:50be9d29 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44dd8
[  122.646425] head:50be9d29 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  122.647131] flags: 0x40(head|zone=0)
[  122.647654] page_type: 0xffffffff()
[  122.648196] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  122.648942] raw: 00000000
[  122.649325] page dumped because: kasan: bad access detected
[  122.649880] 
[  122.650478] Memory state around the buggy address:
[  122.651121]  c4dd9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  122.651796]  c4dd9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  122.652466] >c4dda000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  122.653226]               ^
[  122.653645]  c4dda080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  122.654493]  c4dda100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  122.655133] ==================================================================

test log snippet test parser 52

Home

[  124.066658] ==================================================================
[  124.067440] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xd4/0x248
[  124.068181] Read of size 1 at addr c8fa90c8 by task kunit_try_catch/170
[  124.068736] 
[  124.069022] CPU: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  124.070926] Hardware name: Generic DT based system
[  124.071550]  unwind_backtrace from show_stack+0x18/0x1c
[  124.072285]  show_stack from dump_stack_lvl+0x58/0x70
[  124.073547]  dump_stack_lvl from print_report+0x164/0x51c
[  124.074381]  print_report from kasan_report+0xc8/0x104
[  124.075657]  kasan_report from kmem_cache_oob+0xd4/0x248
[  124.076407]  kmem_cache_oob from kunit_try_run_case+0x11c/0x2e4
[  124.077490]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  124.078591]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  124.079684]  kthread from ret_from_fork+0x14/0x30
[  124.080831] Exception stack(0xfa05bfb0 to 0xfa05bff8)
[  124.081304] bfa0:                                     00000000 00000000 00000000 00000000
[  124.082810] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  124.083690] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  124.084363] 
[  124.085135] Allocated by task 170:
[  124.085549]  kasan_set_track+0x3c/0x5c
[  124.086282]  __kasan_slab_alloc+0x60/0x68
[  124.087043]  kmem_cache_alloc+0x1dc/0x574
[  124.087792]  kmem_cache_oob+0xb0/0x248
[  124.088493]  kunit_try_run_case+0x11c/0x2e4
[  124.089271]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  124.090126]  kthread+0x184/0x1a8
[  124.090452]  ret_from_fork+0x14/0x30
[  124.090963] 
[  124.091187] The buggy address belongs to the object at c8fa9000
[  124.091187]  which belongs to the cache test_cache of size 200
[  124.093085] The buggy address is located 0 bytes to the right of
[  124.093085]  allocated 200-byte region [c8fa9000, c8fa90c8)
[  124.094456] 
[  124.094795] The buggy address belongs to the physical page:
[  124.095390] page:8017358a refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fa9
[  124.096184] flags: 0x800(slab|zone=0)
[  124.097263] page_type: 0xffffffff()
[  124.097749] raw: 00000800 c8901e00 00000122 00000000 00000000 800f000f ffffffff 00000001
[  124.098789] raw: 00000000
[  124.099363] page dumped because: kasan: bad access detected
[  124.100302] 
[  124.100494] Memory state around the buggy address:
[  124.101559]  c8fa8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  124.102639]  c8fa9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  124.103256] >c8fa9080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[  124.104116]                                       ^
[  124.104637]  c8fa9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  124.105288]  c8fa9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  124.106288] ==================================================================

test log snippet test parser 53

Home

[  122.948662] ==================================================================
[  122.949339] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x150/0x5f0
[  122.950685] Write of size 1 at addr c4d424d0 by task kunit_try_catch/132
[  122.951468] 
[  122.951794] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  122.952578] Hardware name: Generic DT based system
[  122.953101]  unwind_backtrace from show_stack+0x18/0x1c
[  122.953971]  show_stack from dump_stack_lvl+0x58/0x70
[  122.954734]  dump_stack_lvl from print_report+0x164/0x51c
[  122.955348]  print_report from kasan_report+0xc8/0x104
[  122.956138]  kasan_report from krealloc_less_oob_helper+0x150/0x5f0
[  122.956869]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  122.957717]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  122.958753]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  122.959526]  kthread from ret_from_fork+0x14/0x30
[  122.960223] Exception stack(0xf9f2bfb0 to 0xf9f2bff8)
[  122.960812] bfa0:                                     00000000 00000000 00000000 00000000
[  122.961565] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  122.962417] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  122.963139] 
[  122.963490] Allocated by task 132:
[  122.963972]  kasan_set_track+0x3c/0x5c
[  122.964567]  __kasan_krealloc+0xe0/0x104
[  122.965189]  krealloc+0xd4/0x134
[  122.965657]  krealloc_less_oob_helper+0xd4/0x5f0
[  122.966304]  kunit_try_run_case+0x11c/0x2e4
[  122.966952]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  122.967523]  kthread+0x184/0x1a8
[  122.968054]  ret_from_fork+0x14/0x30
[  122.968582] 
[  122.968864] The buggy address belongs to the object at c4d42400
[  122.968864]  which belongs to the cache kmalloc-256 of size 256
[  122.969911] The buggy address is located 7 bytes to the right of
[  122.969911]  allocated 201-byte region [c4d42400, c4d424c9)
[  122.971068] 
[  122.971378] The buggy address belongs to the physical page:
[  122.973702] page:c6df89a3 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d42
[  122.974493] head:c6df89a3 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  122.975250] flags: 0x840(slab|head|zone=0)
[  122.975888] page_type: 0xffffffff()
[  122.976324] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[  122.977195] raw: 00000000
[  122.977492] page dumped because: kasan: bad access detected
[  122.978155] 
[  122.978393] Memory state around the buggy address:
[  122.979023]  c4d42380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  122.979732]  c4d42400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  122.980260] >c4d42480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  122.981016]                                          ^
[  122.981676]  c4d42500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  122.982245]  c4d42580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  122.983006] ==================================================================

test log snippet test parser 54

Home

[  122.911531] ==================================================================
[  122.912337] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x114/0x5f0
[  122.913220] Write of size 1 at addr c4d424c9 by task kunit_try_catch/132
[  122.913968] 
[  122.914267] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  122.914960] Hardware name: Generic DT based system
[  122.915557]  unwind_backtrace from show_stack+0x18/0x1c
[  122.916305]  show_stack from dump_stack_lvl+0x58/0x70
[  122.917081]  dump_stack_lvl from print_report+0x164/0x51c
[  122.917789]  print_report from kasan_report+0xc8/0x104
[  122.918389]  kasan_report from krealloc_less_oob_helper+0x114/0x5f0
[  122.919257]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  122.920127]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  122.921130]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  122.921919]  kthread from ret_from_fork+0x14/0x30
[  122.922632] Exception stack(0xf9f2bfb0 to 0xf9f2bff8)
[  122.923354] bfa0:                                     00000000 00000000 00000000 00000000
[  122.924152] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  122.924916] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  122.925693] 
[  122.925982] Allocated by task 132:
[  122.926439]  kasan_set_track+0x3c/0x5c
[  122.926980]  __kasan_krealloc+0xe0/0x104
[  122.927568]  krealloc+0xd4/0x134
[  122.928013]  krealloc_less_oob_helper+0xd4/0x5f0
[  122.928676]  kunit_try_run_case+0x11c/0x2e4
[  122.929241]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  122.930045]  kthread+0x184/0x1a8
[  122.930509]  ret_from_fork+0x14/0x30
[  122.931058] 
[  122.931309] The buggy address belongs to the object at c4d42400
[  122.931309]  which belongs to the cache kmalloc-256 of size 256
[  122.933056] The buggy address is located 0 bytes to the right of
[  122.933056]  allocated 201-byte region [c4d42400, c4d424c9)
[  122.933988] 
[  122.934822] The buggy address belongs to the physical page:
[  122.935901] page:c6df89a3 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d42
[  122.936824] head:c6df89a3 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  122.937581] flags: 0x840(slab|head|zone=0)
[  122.938144] page_type: 0xffffffff()
[  122.938718] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[  122.939449] raw: 00000000
[  122.939855] page dumped because: kasan: bad access detected
[  122.940418] 
[  122.940719] Memory state around the buggy address:
[  122.941186]  c4d42380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  122.941967]  c4d42400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  122.942700] >c4d42480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  122.943364]                                       ^
[  122.943895]  c4d42500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  122.944678]  c4d42580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  122.945254] ==================================================================

test log snippet test parser 55

Home

[  123.294325] ==================================================================
[  123.295131] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x214/0x5f0
[  123.296003] Write of size 1 at addr c4dda0eb by task kunit_try_catch/136
[  123.296683] 
[  123.296989] CPU: 1 PID: 136 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  123.297904] Hardware name: Generic DT based system
[  123.298578]  unwind_backtrace from show_stack+0x18/0x1c
[  123.299262]  show_stack from dump_stack_lvl+0x58/0x70
[  123.300136]  dump_stack_lvl from print_report+0x164/0x51c
[  123.300962]  print_report from kasan_report+0xc8/0x104
[  123.301702]  kasan_report from krealloc_less_oob_helper+0x214/0x5f0
[  123.302715]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  123.304951]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.305836]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  123.306808]  kthread from ret_from_fork+0x14/0x30
[  123.307511] Exception stack(0xf9f4bfb0 to 0xf9f4bff8)
[  123.308166] bfa0:                                     00000000 00000000 00000000 00000000
[  123.309128] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  123.309942] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  123.310679] 
[  123.311050] The buggy address belongs to the physical page:
[  123.311627] page:50be9d29 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44dd8
[  123.312706] head:50be9d29 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  123.313484] flags: 0x40(head|zone=0)
[  123.314011] page_type: 0xffffffff()
[  123.314562] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  123.315346] raw: 00000000
[  123.315765] page dumped because: kasan: bad access detected
[  123.316579] 
[  123.316893] Memory state around the buggy address:
[  123.317419]  c4dd9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  123.318252]  c4dda000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  123.319083] >c4dda080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  123.320251]                                                   ^
[  123.320929]  c4dda100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  123.322056]  c4dda180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  123.323239] ==================================================================
---
[  123.264761] ==================================================================
[  123.265589] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1e0/0x5f0
[  123.266383] Write of size 1 at addr c4dda0ea by task kunit_try_catch/136
[  123.266970] 
[  123.267278] CPU: 1 PID: 136 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  123.268413] Hardware name: Generic DT based system
[  123.269125]  unwind_backtrace from show_stack+0x18/0x1c
[  123.270039]  show_stack from dump_stack_lvl+0x58/0x70
[  123.270889]  dump_stack_lvl from print_report+0x164/0x51c
[  123.271774]  print_report from kasan_report+0xc8/0x104
[  123.272798]  kasan_report from krealloc_less_oob_helper+0x1e0/0x5f0
[  123.273748]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  123.274773]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.275828]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  123.276738]  kthread from ret_from_fork+0x14/0x30
[  123.277329] Exception stack(0xf9f4bfb0 to 0xf9f4bff8)
[  123.277945] bfa0:                                     00000000 00000000 00000000 00000000
[  123.278863] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  123.279735] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  123.280475] 
[  123.281199] The buggy address belongs to the physical page:
[  123.281753] page:50be9d29 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44dd8
[  123.282560] head:50be9d29 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  123.284250] flags: 0x40(head|zone=0)
[  123.284860] page_type: 0xffffffff()
[  123.285465] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  123.286320] raw: 00000000
[  123.286782] page dumped because: kasan: bad access detected
[  123.287367] 
[  123.287744] Memory state around the buggy address:
[  123.288326]  c4dd9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  123.289240]  c4dda000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  123.290111] >c4dda080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  123.290858]                                                   ^
[  123.291516]  c4dda100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  123.292426]  c4dda180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  123.292993] ==================================================================

test log snippet test parser 56

Home

[  123.174781] ==================================================================
[  123.175809] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x114/0x5f0
[  123.177289] Write of size 1 at addr c4dda0c9 by task kunit_try_catch/136
[  123.178101] 
[  123.178644] CPU: 1 PID: 136 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  123.179670] Hardware name: Generic DT based system
[  123.180236]  unwind_backtrace from show_stack+0x18/0x1c
[  123.180908]  show_stack from dump_stack_lvl+0x58/0x70
[  123.181519]  dump_stack_lvl from print_report+0x164/0x51c
[  123.182546]  print_report from kasan_report+0xc8/0x104
[  123.183310]  kasan_report from krealloc_less_oob_helper+0x114/0x5f0
[  123.184073]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  123.185358]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.186481]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  123.187292]  kthread from ret_from_fork+0x14/0x30
[  123.188373] Exception stack(0xf9f4bfb0 to 0xf9f4bff8)
[  123.189167] bfa0:                                     00000000 00000000 00000000 00000000
[  123.189986] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  123.190790] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  123.191458] 
[  123.191782] The buggy address belongs to the physical page:
[  123.192357] page:50be9d29 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44dd8
[  123.193189] head:50be9d29 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  123.193881] flags: 0x40(head|zone=0)
[  123.194407] page_type: 0xffffffff()
[  123.194905] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  123.195806] raw: 00000000
[  123.196132] page dumped because: kasan: bad access detected
[  123.196742] 
[  123.197025] Memory state around the buggy address:
[  123.197590]  c4dd9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  123.198388]  c4dda000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  123.199126] >c4dda080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  123.199674]                                       ^
[  123.200289]  c4dda100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  123.201032]  c4dda180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  123.201803] ==================================================================

test log snippet test parser 57

Home

[  123.233230] ==================================================================
[  123.234042] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a8/0x5f0
[  123.234803] Write of size 1 at addr c4dda0da by task kunit_try_catch/136
[  123.235492] 
[  123.235797] CPU: 1 PID: 136 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  123.236466] Hardware name: Generic DT based system
[  123.237079]  unwind_backtrace from show_stack+0x18/0x1c
[  123.237874]  show_stack from dump_stack_lvl+0x58/0x70
[  123.238482]  dump_stack_lvl from print_report+0x164/0x51c
[  123.239300]  print_report from kasan_report+0xc8/0x104
[  123.241908]  kasan_report from krealloc_less_oob_helper+0x1a8/0x5f0
[  123.242745]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  123.243500]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.244529]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  123.245332]  kthread from ret_from_fork+0x14/0x30
[  123.245981] Exception stack(0xf9f4bfb0 to 0xf9f4bff8)
[  123.246678] bfa0:                                     00000000 00000000 00000000 00000000
[  123.247370] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  123.248333] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  123.248922] 
[  123.249231] The buggy address belongs to the physical page:
[  123.249906] page:50be9d29 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44dd8
[  123.250564] head:50be9d29 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  123.251415] flags: 0x40(head|zone=0)
[  123.251962] page_type: 0xffffffff()
[  123.252417] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  123.253261] raw: 00000000
[  123.253677] page dumped because: kasan: bad access detected
[  123.254180] 
[  123.254471] Memory state around the buggy address:
[  123.255061]  c4dd9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  123.255863]  c4dda000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  123.256553] >c4dda080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  123.257097]                                             ^
[  123.257892]  c4dda100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  123.258675]  c4dda180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  123.259332] ==================================================================

test log snippet test parser 58

Home

[  123.205593] ==================================================================
[  123.206301] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x150/0x5f0
[  123.207099] Write of size 1 at addr c4dda0d0 by task kunit_try_catch/136
[  123.207684] 
[  123.207996] CPU: 1 PID: 136 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  123.208811] Hardware name: Generic DT based system
[  123.209383]  unwind_backtrace from show_stack+0x18/0x1c
[  123.210252]  show_stack from dump_stack_lvl+0x58/0x70
[  123.210977]  dump_stack_lvl from print_report+0x164/0x51c
[  123.211792]  print_report from kasan_report+0xc8/0x104
[  123.212481]  kasan_report from krealloc_less_oob_helper+0x150/0x5f0
[  123.213375]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  123.214316]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.215177]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  123.216103]  kthread from ret_from_fork+0x14/0x30
[  123.216683] Exception stack(0xf9f4bfb0 to 0xf9f4bff8)
[  123.217320] bfa0:                                     00000000 00000000 00000000 00000000
[  123.218210] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  123.219110] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  123.221053] 
[  123.221432] The buggy address belongs to the physical page:
[  123.222042] page:50be9d29 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44dd8
[  123.222797] head:50be9d29 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  123.223556] flags: 0x40(head|zone=0)
[  123.224257] page_type: 0xffffffff()
[  123.224765] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  123.225543] raw: 00000000
[  123.225954] page dumped because: kasan: bad access detected
[  123.226520] 
[  123.226838] Memory state around the buggy address:
[  123.227338]  c4dd9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  123.228128]  c4dda000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  123.228763] >c4dda080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  123.229418]                                          ^
[  123.229985]  c4dda100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  123.230700]  c4dda180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  123.231444] ==================================================================

test log snippet test parser 59

Home

[  122.984994] ==================================================================
[  122.985848] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a8/0x5f0
[  122.986716] Write of size 1 at addr c4d424da by task kunit_try_catch/132
[  122.987474] 
[  122.987782] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  122.988598] Hardware name: Generic DT based system
[  122.989090]  unwind_backtrace from show_stack+0x18/0x1c
[  122.991416]  show_stack from dump_stack_lvl+0x58/0x70
[  122.992202]  dump_stack_lvl from print_report+0x164/0x51c
[  122.992940]  print_report from kasan_report+0xc8/0x104
[  122.993803]  kasan_report from krealloc_less_oob_helper+0x1a8/0x5f0
[  122.994675]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  122.995569]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  122.996506]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  122.997383]  kthread from ret_from_fork+0x14/0x30
[  122.997994] Exception stack(0xf9f2bfb0 to 0xf9f2bff8)
[  122.998685] bfa0:                                     00000000 00000000 00000000 00000000
[  122.999464] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  123.000342] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  123.001014] 
[  123.001244] Allocated by task 132:
[  123.001730]  kasan_set_track+0x3c/0x5c
[  123.002284]  __kasan_krealloc+0xe0/0x104
[  123.002896]  krealloc+0xd4/0x134
[  123.003496]  krealloc_less_oob_helper+0xd4/0x5f0
[  123.004084]  kunit_try_run_case+0x11c/0x2e4
[  123.004739]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.005397]  kthread+0x184/0x1a8
[  123.005825]  ret_from_fork+0x14/0x30
[  123.006360] 
[  123.006686] The buggy address belongs to the object at c4d42400
[  123.006686]  which belongs to the cache kmalloc-256 of size 256
[  123.007770] The buggy address is located 17 bytes to the right of
[  123.007770]  allocated 201-byte region [c4d42400, c4d424c9)
[  123.008706] 
[  123.009006] The buggy address belongs to the physical page:
[  123.009750] page:c6df89a3 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d42
[  123.010389] head:c6df89a3 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  123.012318] flags: 0x840(slab|head|zone=0)
[  123.012874] page_type: 0xffffffff()
[  123.013341] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[  123.014890] raw: 00000000
[  123.015485] page dumped because: kasan: bad access detected
[  123.016236] 
[  123.016756] Memory state around the buggy address:
[  123.017481]  c4d42380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.018245]  c4d42400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  123.018965] >c4d42480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  123.019598]                                             ^
[  123.020189]  c4d42500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.021338]  c4d42580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.022215] ==================================================================

test log snippet test parser 60

Home

[  123.063270] ==================================================================
[  123.064185] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x214/0x5f0
[  123.064993] Write of size 1 at addr c4d424eb by task kunit_try_catch/132
[  123.065650] 
[  123.065918] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  123.066625] Hardware name: Generic DT based system
[  123.067216]  unwind_backtrace from show_stack+0x18/0x1c
[  123.067976]  show_stack from dump_stack_lvl+0x58/0x70
[  123.068648]  dump_stack_lvl from print_report+0x164/0x51c
[  123.069296]  print_report from kasan_report+0xc8/0x104
[  123.070173]  kasan_report from krealloc_less_oob_helper+0x214/0x5f0
[  123.072163]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  123.073365]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.074340]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  123.075129]  kthread from ret_from_fork+0x14/0x30
[  123.076111] Exception stack(0xf9f2bfb0 to 0xf9f2bff8)
[  123.076525] bfa0:                                     00000000 00000000 00000000 00000000
[  123.077791] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  123.078857] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  123.079767] 
[  123.080250] Allocated by task 132:
[  123.080857]  kasan_set_track+0x3c/0x5c
[  123.081659]  __kasan_krealloc+0xe0/0x104
[  123.082193]  krealloc+0xd4/0x134
[  123.083025]  krealloc_less_oob_helper+0xd4/0x5f0
[  123.083678]  kunit_try_run_case+0x11c/0x2e4
[  123.084140]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.084854]  kthread+0x184/0x1a8
[  123.085422]  ret_from_fork+0x14/0x30
[  123.085844] 
[  123.086183] The buggy address belongs to the object at c4d42400
[  123.086183]  which belongs to the cache kmalloc-256 of size 256
[  123.087283] The buggy address is located 34 bytes to the right of
[  123.087283]  allocated 201-byte region [c4d42400, c4d424c9)
[  123.088369] 
[  123.088692] The buggy address belongs to the physical page:
[  123.089386] page:c6df89a3 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d42
[  123.090350] head:c6df89a3 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  123.092202] flags: 0x840(slab|head|zone=0)
[  123.092741] page_type: 0xffffffff()
[  123.093168] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[  123.094022] raw: 00000000
[  123.094449] page dumped because: kasan: bad access detected
[  123.094946] 
[  123.095235] Memory state around the buggy address:
[  123.095845]  c4d42380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.096375]  c4d42400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  123.097160] >c4d42480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  123.097861]                                                   ^
[  123.098468]  c4d42500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.099250]  c4d42580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.099865] ==================================================================
---
[  123.023936] ==================================================================
[  123.024678] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1e0/0x5f0
[  123.025708] Write of size 1 at addr c4d424ea by task kunit_try_catch/132
[  123.026163] 
[  123.026997] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  123.027979] Hardware name: Generic DT based system
[  123.028687]  unwind_backtrace from show_stack+0x18/0x1c
[  123.029735]  show_stack from dump_stack_lvl+0x58/0x70
[  123.030335]  dump_stack_lvl from print_report+0x164/0x51c
[  123.031575]  print_report from kasan_report+0xc8/0x104
[  123.032641]  kasan_report from krealloc_less_oob_helper+0x1e0/0x5f0
[  123.033494]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  123.034398]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.035325]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  123.036469]  kthread from ret_from_fork+0x14/0x30
[  123.037281] Exception stack(0xf9f2bfb0 to 0xf9f2bff8)
[  123.038102] bfa0:                                     00000000 00000000 00000000 00000000
[  123.039148] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  123.040177] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  123.040794] 
[  123.041079] Allocated by task 132:
[  123.041452]  kasan_set_track+0x3c/0x5c
[  123.042073]  __kasan_krealloc+0xe0/0x104
[  123.042654]  krealloc+0xd4/0x134
[  123.043105]  krealloc_less_oob_helper+0xd4/0x5f0
[  123.043765]  kunit_try_run_case+0x11c/0x2e4
[  123.044328]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.045011]  kthread+0x184/0x1a8
[  123.045406]  ret_from_fork+0x14/0x30
[  123.045949] 
[  123.046245] The buggy address belongs to the object at c4d42400
[  123.046245]  which belongs to the cache kmalloc-256 of size 256
[  123.047233] The buggy address is located 33 bytes to the right of
[  123.047233]  allocated 201-byte region [c4d42400, c4d424c9)
[  123.048238] 
[  123.048535] The buggy address belongs to the physical page:
[  123.049206] page:c6df89a3 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d42
[  123.051170] head:c6df89a3 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  123.052026] flags: 0x840(slab|head|zone=0)
[  123.052578] page_type: 0xffffffff()
[  123.053034] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[  123.054539] raw: 00000000
[  123.055108] page dumped because: kasan: bad access detected
[  123.055726] 
[  123.056000] Memory state around the buggy address:
[  123.056437]  c4d42380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.057569]  c4d42400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  123.058489] >c4d42480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  123.059195]                                                   ^
[  123.059820]  c4d42500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.060469]  c4d42580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.061296] ==================================================================

test log snippet test parser 61

Home

[  122.864987] ==================================================================
[  122.865690] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x180/0x384
[  122.866475] Write of size 1 at addr c4d422f0 by task kunit_try_catch/130
[  122.867065] 
[  122.867304] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  122.868277] Hardware name: Generic DT based system
[  122.868844]  unwind_backtrace from show_stack+0x18/0x1c
[  122.869504]  show_stack from dump_stack_lvl+0x58/0x70
[  122.870848]  dump_stack_lvl from print_report+0x164/0x51c
[  122.871593]  print_report from kasan_report+0xc8/0x104
[  122.872275]  kasan_report from krealloc_more_oob_helper+0x180/0x384
[  122.873043]  krealloc_more_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  122.874008]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  122.874949]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  122.875794]  kthread from ret_from_fork+0x14/0x30
[  122.876400] Exception stack(0xf9f1bfb0 to 0xf9f1bff8)
[  122.877119] bfa0:                                     00000000 00000000 00000000 00000000
[  122.877926] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  122.878686] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  122.879391] 
[  122.880151] Allocated by task 130:
[  122.881140]  kasan_set_track+0x3c/0x5c
[  122.881604]  __kasan_krealloc+0xe0/0x104
[  122.882360]  krealloc+0xd4/0x134
[  122.882957]  krealloc_more_oob_helper+0xd4/0x384
[  122.883823]  kunit_try_run_case+0x11c/0x2e4
[  122.884380]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  122.885226]  kthread+0x184/0x1a8
[  122.885700]  ret_from_fork+0x14/0x30
[  122.886377] 
[  122.886703] The buggy address belongs to the object at c4d42200
[  122.886703]  which belongs to the cache kmalloc-256 of size 256
[  122.888070] The buggy address is located 5 bytes to the right of
[  122.888070]  allocated 235-byte region [c4d42200, c4d422eb)
[  122.889586] 
[  122.889944] The buggy address belongs to the physical page:
[  122.890504] page:c6df89a3 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d42
[  122.891518] head:c6df89a3 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  122.892248] flags: 0x840(slab|head|zone=0)
[  122.892917] page_type: 0xffffffff()
[  122.893452] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[  122.894287] raw: 00000000
[  122.894776] page dumped because: kasan: bad access detected
[  122.895368] 
[  122.895715] Memory state around the buggy address:
[  122.896201]  c4d42180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  122.896988]  c4d42200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  122.897775] >c4d42280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[  122.898441]                                                      ^
[  122.899165]  c4d42300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  122.900701]  c4d42380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  122.901274] ==================================================================

test log snippet test parser 62

Home

[  123.109053] ==================================================================
[  123.110166] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x144/0x384
[  123.111231] Write of size 1 at addr c4dda0eb by task kunit_try_catch/134
[  123.112002] 
[  123.112347] CPU: 1 PID: 134 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  123.113183] Hardware name: Generic DT based system
[  123.113806]  unwind_backtrace from show_stack+0x18/0x1c
[  123.114685]  show_stack from dump_stack_lvl+0x58/0x70
[  123.115334]  dump_stack_lvl from print_report+0x164/0x51c
[  123.116224]  print_report from kasan_report+0xc8/0x104
[  123.116932]  kasan_report from krealloc_more_oob_helper+0x144/0x384
[  123.117773]  krealloc_more_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  123.118776]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.119859]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  123.120721]  kthread from ret_from_fork+0x14/0x30
[  123.121450] Exception stack(0xf9f3bfb0 to 0xf9f3bff8)
[  123.121981] bfa0:                                     00000000 00000000 00000000 00000000
[  123.122892] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  123.123272] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  123.123601] 
[  123.123751] The buggy address belongs to the physical page:
[  123.124005] page:50be9d29 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44dd8
[  123.124349] head:50be9d29 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  123.124738] flags: 0x40(head|zone=0)
[  123.125433] page_type: 0xffffffff()
[  123.126087] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  123.127181] raw: 00000000
[  123.127689] page dumped because: kasan: bad access detected
[  123.128513] 
[  123.128975] Memory state around the buggy address:
[  123.129541]  c4dd9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  123.130730]  c4dda000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  123.131638] >c4dda080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[  123.132199]                                                   ^
[  123.132871]  c4dda100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  123.133592]  c4dda180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  123.134188] ==================================================================

test log snippet test parser 63

Home

[  122.824295] ==================================================================
[  122.825082] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x144/0x384
[  122.825456] Write of size 1 at addr c4d422eb by task kunit_try_catch/130
[  122.825866] 
[  122.827194] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  122.828291] Hardware name: Generic DT based system
[  122.828914]  unwind_backtrace from show_stack+0x18/0x1c
[  122.829515]  show_stack from dump_stack_lvl+0x58/0x70
[  122.830401]  dump_stack_lvl from print_report+0x164/0x51c
[  122.831081]  print_report from kasan_report+0xc8/0x104
[  122.831709]  kasan_report from krealloc_more_oob_helper+0x144/0x384
[  122.832592]  krealloc_more_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  122.833439]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  122.834368]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  122.835236]  kthread from ret_from_fork+0x14/0x30
[  122.835811] Exception stack(0xf9f1bfb0 to 0xf9f1bff8)
[  122.836436] bfa0:                                     00000000 00000000 00000000 00000000
[  122.837255] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  122.838129] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  122.838787] 
[  122.839064] Allocated by task 130:
[  122.840469]  kasan_set_track+0x3c/0x5c
[  122.841502]  __kasan_krealloc+0xe0/0x104
[  122.842248]  krealloc+0xd4/0x134
[  122.843006]  krealloc_more_oob_helper+0xd4/0x384
[  122.843695]  kunit_try_run_case+0x11c/0x2e4
[  122.843981]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  122.844276]  kthread+0x184/0x1a8
[  122.844474]  ret_from_fork+0x14/0x30
[  122.844774] 
[  122.844996] The buggy address belongs to the object at c4d42200
[  122.844996]  which belongs to the cache kmalloc-256 of size 256
[  122.846858] The buggy address is located 0 bytes to the right of
[  122.846858]  allocated 235-byte region [c4d42200, c4d422eb)
[  122.847746] 
[  122.848049] The buggy address belongs to the physical page:
[  122.848770] page:c6df89a3 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d42
[  122.849461] head:c6df89a3 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  122.850380] flags: 0x840(slab|head|zone=0)
[  122.851097] page_type: 0xffffffff()
[  122.851582] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[  122.852431] raw: 00000000
[  122.852834] page dumped because: kasan: bad access detected
[  122.853491] 
[  122.853792] Memory state around the buggy address:
[  122.854448]  c4d42180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  122.855340]  c4d42200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  122.856298] >c4d42280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[  122.856947]                                                   ^
[  122.857556]  c4d42300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  122.858220]  c4d42380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  122.858938] ==================================================================

test log snippet test parser 64

Home

[  123.135838] ==================================================================
[  123.136931] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x180/0x384
[  123.137837] Write of size 1 at addr c4dda0f0 by task kunit_try_catch/134
[  123.139258] 
[  123.139711] CPU: 1 PID: 134 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  123.140495] Hardware name: Generic DT based system
[  123.141137]  unwind_backtrace from show_stack+0x18/0x1c
[  123.141820]  show_stack from dump_stack_lvl+0x58/0x70
[  123.142603]  dump_stack_lvl from print_report+0x164/0x51c
[  123.143269]  print_report from kasan_report+0xc8/0x104
[  123.144124]  kasan_report from krealloc_more_oob_helper+0x180/0x384
[  123.144910]  krealloc_more_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  123.145801]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.146707]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  123.147514]  kthread from ret_from_fork+0x14/0x30
[  123.148068] Exception stack(0xf9f3bfb0 to 0xf9f3bff8)
[  123.148741] bfa0:                                     00000000 00000000 00000000 00000000
[  123.149491] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  123.150950] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  123.151557] 
[  123.151874] The buggy address belongs to the physical page:
[  123.152408] page:50be9d29 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44dd8
[  123.153343] head:50be9d29 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  123.154064] flags: 0x40(head|zone=0)
[  123.154681] page_type: 0xffffffff()
[  123.155229] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  123.156045] raw: 00000000
[  123.156512] page dumped because: kasan: bad access detected
[  123.157161] 
[  123.157467] Memory state around the buggy address:
[  123.158290]  c4dd9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  123.159095]  c4dda000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  123.160032] >c4dda080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[  123.160918]                                                      ^
[  123.161535]  c4dda100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  123.162269]  c4dda180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  123.162858] ==================================================================

test log snippet test parser 65

Home

[  124.934040] ==================================================================
[  124.934879] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x10c/0x3b4
[  124.935880] Read of size 1 at addr c4cdc773 by task kunit_try_catch/186
[  124.936430] 
[  124.936731] CPU: 1 PID: 186 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  124.937589] Hardware name: Generic DT based system
[  124.939089]  unwind_backtrace from show_stack+0x18/0x1c
[  124.940464]  show_stack from dump_stack_lvl+0x58/0x70
[  124.941390]  dump_stack_lvl from print_report+0x164/0x51c
[  124.942303]  print_report from kasan_report+0xc8/0x104
[  124.943265]  kasan_report from ksize_unpoisons_memory+0x10c/0x3b4
[  124.944100]  ksize_unpoisons_memory from kunit_try_run_case+0x11c/0x2e4
[  124.945191]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  124.946291]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  124.947327]  kthread from ret_from_fork+0x14/0x30
[  124.948154] Exception stack(0xfa0cbfb0 to 0xfa0cbff8)
[  124.948794] bfa0:                                     00000000 00000000 00000000 00000000
[  124.949940] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  124.951186] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  124.952166] 
[  124.952669] Allocated by task 186:
[  124.953337]  kasan_set_track+0x3c/0x5c
[  124.953892]  __kasan_kmalloc+0x8c/0x94
[  124.954758]  ksize_unpoisons_memory+0xb4/0x3b4
[  124.955562]  kunit_try_run_case+0x11c/0x2e4
[  124.956378]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  124.957273]  kthread+0x184/0x1a8
[  124.957740]  ret_from_fork+0x14/0x30
[  124.958546] 
[  124.958869] The buggy address belongs to the object at c4cdc700
[  124.958869]  which belongs to the cache kmalloc-128 of size 128
[  124.960501] The buggy address is located 0 bytes to the right of
[  124.960501]  allocated 115-byte region [c4cdc700, c4cdc773)
[  124.961899] 
[  124.962099] The buggy address belongs to the physical page:
[  124.963184] page:4ad3b9de refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdc
[  124.964149] flags: 0x800(slab|zone=0)
[  124.964966] page_type: 0xffffffff()
[  124.965729] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  124.966746] raw: 00000000
[  124.967346] page dumped because: kasan: bad access detected
[  124.967959] 
[  124.968526] Memory state around the buggy address:
[  124.968980]  c4cdc600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  124.970203]  c4cdc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  124.971229] >c4cdc700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  124.971909]                                                      ^
[  124.972866]  c4cdc780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  124.973691]  c4cdc800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  124.974564] ==================================================================

test log snippet test parser 66

Home

[  125.017559] ==================================================================
[  125.018813] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x170/0x3b4
[  125.019560] Read of size 1 at addr c4cdc77f by task kunit_try_catch/186
[  125.020485] 
[  125.020816] CPU: 1 PID: 186 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  125.022410] Hardware name: Generic DT based system
[  125.022905]  unwind_backtrace from show_stack+0x18/0x1c
[  125.024023]  show_stack from dump_stack_lvl+0x58/0x70
[  125.024860]  dump_stack_lvl from print_report+0x164/0x51c
[  125.025760]  print_report from kasan_report+0xc8/0x104
[  125.026424]  kasan_report from ksize_unpoisons_memory+0x170/0x3b4
[  125.027186]  ksize_unpoisons_memory from kunit_try_run_case+0x11c/0x2e4
[  125.028129]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.029041]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  125.030286]  kthread from ret_from_fork+0x14/0x30
[  125.030827] Exception stack(0xfa0cbfb0 to 0xfa0cbff8)
[  125.031477] bfa0:                                     00000000 00000000 00000000 00000000
[  125.032226] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  125.033185] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  125.033982] 
[  125.034220] Allocated by task 186:
[  125.034725]  kasan_set_track+0x3c/0x5c
[  125.035218]  __kasan_kmalloc+0x8c/0x94
[  125.035835]  ksize_unpoisons_memory+0xb4/0x3b4
[  125.036484]  kunit_try_run_case+0x11c/0x2e4
[  125.036987]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.037749]  kthread+0x184/0x1a8
[  125.038142]  ret_from_fork+0x14/0x30
[  125.038709] 
[  125.038973] The buggy address belongs to the object at c4cdc700
[  125.038973]  which belongs to the cache kmalloc-128 of size 128
[  125.040426] The buggy address is located 12 bytes to the right of
[  125.040426]  allocated 115-byte region [c4cdc700, c4cdc773)
[  125.041501] 
[  125.041798] The buggy address belongs to the physical page:
[  125.042424] page:4ad3b9de refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdc
[  125.043429] flags: 0x800(slab|zone=0)
[  125.043993] page_type: 0xffffffff()
[  125.044505] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  125.045428] raw: 00000000
[  125.045835] page dumped because: kasan: bad access detected
[  125.046402] 
[  125.046678] Memory state around the buggy address:
[  125.047273]  c4cdc600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  125.047926]  c4cdc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.048593] >c4cdc700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  125.049269]                                                         ^
[  125.050396]  c4cdc780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.051197]  c4cdc800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.052703] ==================================================================
---
[  124.977649] ==================================================================
[  124.978355] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x13c/0x3b4
[  124.979244] Read of size 1 at addr c4cdc778 by task kunit_try_catch/186
[  124.979877] 
[  124.980185] CPU: 1 PID: 186 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  124.981203] Hardware name: Generic DT based system
[  124.982535]  unwind_backtrace from show_stack+0x18/0x1c
[  124.983514]  show_stack from dump_stack_lvl+0x58/0x70
[  124.984289]  dump_stack_lvl from print_report+0x164/0x51c
[  124.984961]  print_report from kasan_report+0xc8/0x104
[  124.985644]  kasan_report from ksize_unpoisons_memory+0x13c/0x3b4
[  124.986415]  ksize_unpoisons_memory from kunit_try_run_case+0x11c/0x2e4
[  124.987319]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  124.988292]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  124.989226]  kthread from ret_from_fork+0x14/0x30
[  124.989890] Exception stack(0xfa0cbfb0 to 0xfa0cbff8)
[  124.990408] bfa0:                                     00000000 00000000 00000000 00000000
[  124.991243] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  124.992470] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  124.993226] 
[  124.994010] Allocated by task 186:
[  124.994349]  kasan_set_track+0x3c/0x5c
[  124.995293]  __kasan_kmalloc+0x8c/0x94
[  124.996036]  ksize_unpoisons_memory+0xb4/0x3b4
[  124.996849]  kunit_try_run_case+0x11c/0x2e4
[  124.997668]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  124.998386]  kthread+0x184/0x1a8
[  124.999192]  ret_from_fork+0x14/0x30
[  125.000209] 
[  125.000533] The buggy address belongs to the object at c4cdc700
[  125.000533]  which belongs to the cache kmalloc-128 of size 128
[  125.001895] The buggy address is located 5 bytes to the right of
[  125.001895]  allocated 115-byte region [c4cdc700, c4cdc773)
[  125.003568] 
[  125.003811] The buggy address belongs to the physical page:
[  125.004523] page:4ad3b9de refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdc
[  125.005289] flags: 0x800(slab|zone=0)
[  125.006087] page_type: 0xffffffff()
[  125.006893] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  125.007735] raw: 00000000
[  125.008450] page dumped because: kasan: bad access detected
[  125.009257] 
[  125.009876] Memory state around the buggy address:
[  125.010923]  c4cdc600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  125.011580]  c4cdc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.012272] >c4cdc700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  125.013280]                                                         ^
[  125.014066]  c4cdc780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.014967]  c4cdc800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.015836] ==================================================================

test log snippet test parser 67

Home

[  125.412226] ==================================================================
[  125.413197] BUG: KASAN: slab-out-of-bounds in memcmp+0x30/0xa0
[  125.413950] Read of size 1 at addr c4cddf18 by task kunit_try_catch/199
[  125.414637] 
[  125.414942] CPU: 1 PID: 199 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  125.415803] Hardware name: Generic DT based system
[  125.416340]  unwind_backtrace from show_stack+0x18/0x1c
[  125.417136]  show_stack from dump_stack_lvl+0x58/0x70
[  125.417780]  dump_stack_lvl from print_report+0x164/0x51c
[  125.418571]  print_report from kasan_report+0xc8/0x104
[  125.419182]  kasan_report from memcmp+0x30/0xa0
[  125.420399]  memcmp from kasan_memcmp+0x100/0x210
[  125.421489]  kasan_memcmp from kunit_try_run_case+0x11c/0x2e4
[  125.422456]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.423278]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  125.424553]  kthread from ret_from_fork+0x14/0x30
[  125.425273] Exception stack(0xfa123fb0 to 0xfa123ff8)
[  125.426104] 3fa0:                                     00000000 00000000 00000000 00000000
[  125.426937] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  125.427794] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  125.428400] 
[  125.428706] Allocated by task 199:
[  125.429233]  kasan_set_track+0x3c/0x5c
[  125.429975]  __kasan_kmalloc+0x8c/0x94
[  125.430968]  kasan_memcmp+0xb4/0x210
[  125.431568]  kunit_try_run_case+0x11c/0x2e4
[  125.432235]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.432976]  kthread+0x184/0x1a8
[  125.433427]  ret_from_fork+0x14/0x30
[  125.434016] 
[  125.434256] The buggy address belongs to the object at c4cddf00
[  125.434256]  which belongs to the cache kmalloc-64 of size 64
[  125.435553] The buggy address is located 0 bytes to the right of
[  125.435553]  allocated 24-byte region [c4cddf00, c4cddf18)
[  125.436784] 
[  125.437096] The buggy address belongs to the physical page:
[  125.437641] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[  125.438592] flags: 0x800(slab|zone=0)
[  125.439084] page_type: 0xffffffff()
[  125.440164] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  125.440887] raw: 00000000
[  125.441316] page dumped because: kasan: bad access detected
[  125.441997] 
[  125.442332] Memory state around the buggy address:
[  125.442875]  c4cdde00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  125.443699]  c4cdde80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  125.444375] >c4cddf00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.445105]                     ^
[  125.445642]  c4cddf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.446369]  c4cde000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  125.447154] ==================================================================

test log snippet test parser 68

Home

[  125.514197] ==================================================================
[  125.515021] BUG: KASAN: slab-use-after-free in kasan_strings+0x170/0x4ec
[  125.515966] Read of size 1 at addr c8fc7890 by task kunit_try_catch/201
[  125.516757] 
[  125.517145] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  125.517918] Hardware name: Generic DT based system
[  125.518667]  unwind_backtrace from show_stack+0x18/0x1c
[  125.519473]  show_stack from dump_stack_lvl+0x58/0x70
[  125.520596]  dump_stack_lvl from print_report+0x164/0x51c
[  125.521673]  print_report from kasan_report+0xc8/0x104
[  125.522290]  kasan_report from kasan_strings+0x170/0x4ec
[  125.522679]  kasan_strings from kunit_try_run_case+0x11c/0x2e4
[  125.523026]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.523487]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  125.524384]  kthread from ret_from_fork+0x14/0x30
[  125.525170] Exception stack(0xfa12bfb0 to 0xfa12bff8)
[  125.525948] bfa0:                                     00000000 00000000 00000000 00000000
[  125.526880] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  125.527716] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  125.528383] 
[  125.528594] Allocated by task 201:
[  125.528960]  kasan_set_track+0x3c/0x5c
[  125.529652]  __kasan_kmalloc+0x8c/0x94
[  125.530761]  kasan_strings+0xa0/0x4ec
[  125.531572]  kunit_try_run_case+0x11c/0x2e4
[  125.532130]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.533382]  kthread+0x184/0x1a8
[  125.534108]  ret_from_fork+0x14/0x30
[  125.534908] 
[  125.535418] Freed by task 201:
[  125.536063]  kasan_set_track+0x3c/0x5c
[  125.536640]  kasan_save_free_info+0x30/0x3c
[  125.537182]  __kasan_slab_free+0xdc/0x124
[  125.537733]  __kmem_cache_free+0x140/0x2a8
[  125.538364]  kasan_strings+0xbc/0x4ec
[  125.538960]  kunit_try_run_case+0x11c/0x2e4
[  125.539676]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.540707]  kthread+0x184/0x1a8
[  125.541600]  ret_from_fork+0x14/0x30
[  125.542342] 
[  125.542664] The buggy address belongs to the object at c8fc7880
[  125.542664]  which belongs to the cache kmalloc-64 of size 64
[  125.544296] The buggy address is located 16 bytes inside of
[  125.544296]  freed 64-byte region [c8fc7880, c8fc78c0)
[  125.545588] 
[  125.545872] The buggy address belongs to the physical page:
[  125.546511] page:c8c1e52b refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fc7
[  125.547581] flags: 0x800(slab|zone=0)
[  125.548316] page_type: 0xffffffff()
[  125.549019] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  125.550102] raw: 00000000
[  125.550556] page dumped because: kasan: bad access detected
[  125.551403] 
[  125.551719] Memory state around the buggy address:
[  125.552319]  c8fc7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.552974]  c8fc7800: 00 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc
[  125.553543] >c8fc7880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  125.554878]                  ^
[  125.555423]  c8fc7900: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.556321]  c8fc7980: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  125.557195] ==================================================================

test log snippet test parser 69

Home

[  126.215819] ==================================================================
[  126.216964] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0xd0/0x1cc
[  126.217919] Read of size 1 at addr c8fcbe00 by task kunit_try_catch/207
[  126.218893] 
[  126.219294] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  126.221089] Hardware name: Generic DT based system
[  126.221876]  unwind_backtrace from show_stack+0x18/0x1c
[  126.222776]  show_stack from dump_stack_lvl+0x58/0x70
[  126.223600]  dump_stack_lvl from print_report+0x164/0x51c
[  126.224465]  print_report from kasan_report+0xc8/0x104
[  126.225282]  kasan_report from __kasan_check_byte+0x34/0x3c
[  126.226202]  __kasan_check_byte from kfree_sensitive+0x20/0x6c
[  126.226931]  kfree_sensitive from kmalloc_double_kzfree+0xd0/0x1cc
[  126.227736]  kmalloc_double_kzfree from kunit_try_run_case+0x11c/0x2e4
[  126.228646]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  126.230218]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  126.231119]  kthread from ret_from_fork+0x14/0x30
[  126.231855] Exception stack(0xf9d63fb0 to 0xf9d63ff8)
[  126.232473] 3fa0:                                     00000000 00000000 00000000 00000000
[  126.233406] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  126.234333] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  126.235057] 
[  126.235418] Allocated by task 207:
[  126.235858]  kasan_set_track+0x3c/0x5c
[  126.236598]  __kasan_kmalloc+0x8c/0x94
[  126.237108]  kmalloc_double_kzfree+0xa0/0x1cc
[  126.237666]  kunit_try_run_case+0x11c/0x2e4
[  126.238176]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  126.238850]  kthread+0x184/0x1a8
[  126.239244]  ret_from_fork+0x14/0x30
[  126.240097] 
[  126.240899] Freed by task 207:
[  126.241768]  kasan_set_track+0x3c/0x5c
[  126.242656]  kasan_save_free_info+0x30/0x3c
[  126.243424]  __kasan_slab_free+0xdc/0x124
[  126.243996]  __kmem_cache_free+0x140/0x2a8
[  126.244858]  kmalloc_double_kzfree+0xbc/0x1cc
[  126.245705]  kunit_try_run_case+0x11c/0x2e4
[  126.246254]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  126.247288]  kthread+0x184/0x1a8
[  126.247740]  ret_from_fork+0x14/0x30
[  126.248540] 
[  126.249072] The buggy address belongs to the object at c8fcbe00
[  126.249072]  which belongs to the cache kmalloc-64 of size 64
[  126.250738] The buggy address is located 0 bytes inside of
[  126.250738]  freed 64-byte region [c8fcbe00, c8fcbe40)
[  126.252073] 
[  126.252682] The buggy address belongs to the physical page:
[  126.253337] page:69fea40a refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fcb
[  126.254581] flags: 0x800(slab|zone=0)
[  126.255323] page_type: 0xffffffff()
[  126.256011] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  126.257053] raw: 00000000
[  126.257408] page dumped because: kasan: bad access detected
[  126.258324] 
[  126.258877] Memory state around the buggy address:
[  126.259391]  c8fcbd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  126.260387]  c8fcbd80: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.262134] >c8fcbe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  126.262812]            ^
[  126.263460]  c8fcbe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.264275]  c8fcbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.265151] ==================================================================

test log snippet test parser 70

Home

[  123.878773] ==================================================================
[  123.879938] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0xd0/0x1d0
[  123.880650] Read of size 1 at addr c4cdd588 by task kunit_try_catch/158
[  123.881418] 
[  123.881738] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  123.882506] Hardware name: Generic DT based system
[  123.883197]  unwind_backtrace from show_stack+0x18/0x1c
[  123.884053]  show_stack from dump_stack_lvl+0x58/0x70
[  123.884855]  dump_stack_lvl from print_report+0x164/0x51c
[  123.885711]  print_report from kasan_report+0xc8/0x104
[  123.886480]  kasan_report from kmalloc_uaf+0xd0/0x1d0
[  123.887329]  kmalloc_uaf from kunit_try_run_case+0x11c/0x2e4
[  123.888069]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.889156]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  123.890034]  kthread from ret_from_fork+0x14/0x30
[  123.890625] Exception stack(0xf9ffbfb0 to 0xf9ffbff8)
[  123.891216] bfa0:                                     00000000 00000000 00000000 00000000
[  123.892025] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  123.892693] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  123.893863] 
[  123.894144] Allocated by task 158:
[  123.894550]  kasan_set_track+0x3c/0x5c
[  123.895114]  __kasan_kmalloc+0x8c/0x94
[  123.895816]  kmalloc_uaf+0xa0/0x1d0
[  123.896440]  kunit_try_run_case+0x11c/0x2e4
[  123.897145]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.897975]  kthread+0x184/0x1a8
[  123.898486]  ret_from_fork+0x14/0x30
[  123.899144] 
[  123.899826] Freed by task 158:
[  123.900520]  kasan_set_track+0x3c/0x5c
[  123.901018]  kasan_save_free_info+0x30/0x3c
[  123.901677]  __kasan_slab_free+0xdc/0x124
[  123.902173]  __kmem_cache_free+0x140/0x2a8
[  123.902874]  kmalloc_uaf+0xbc/0x1d0
[  123.903384]  kunit_try_run_case+0x11c/0x2e4
[  123.904066]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.904806]  kthread+0x184/0x1a8
[  123.905364]  ret_from_fork+0x14/0x30
[  123.905839] 
[  123.906179] The buggy address belongs to the object at c4cdd580
[  123.906179]  which belongs to the cache kmalloc-64 of size 64
[  123.907254] The buggy address is located 8 bytes inside of
[  123.907254]  freed 64-byte region [c4cdd580, c4cdd5c0)
[  123.908374] 
[  123.908737] The buggy address belongs to the physical page:
[  123.909345] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[  123.910534] flags: 0x800(slab|zone=0)
[  123.911471] page_type: 0xffffffff()
[  123.912066] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  123.913038] raw: 00000000
[  123.913368] page dumped because: kasan: bad access detected
[  123.914064] 
[  123.914395] Memory state around the buggy address:
[  123.914952]  c4cdd480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  123.915772]  c4cdd500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  123.916529] >c4cdd580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  123.917283]               ^
[  123.917776]  c4cdd600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.918428]  c4cdd680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.919154] ==================================================================

test log snippet test parser 71

Home

[  123.985987] ==================================================================
[  123.986991] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x104/0x274
[  123.987591] Read of size 1 at addr c4cdd6a8 by task kunit_try_catch/162
[  123.988478] 
[  123.988821] CPU: 1 PID: 162 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  123.989879] Hardware name: Generic DT based system
[  123.990726]  unwind_backtrace from show_stack+0x18/0x1c
[  123.992705]  show_stack from dump_stack_lvl+0x58/0x70
[  123.993456]  dump_stack_lvl from print_report+0x164/0x51c
[  123.994071]  print_report from kasan_report+0xc8/0x104
[  123.994659]  kasan_report from kmalloc_uaf2+0x104/0x274
[  123.995222]  kmalloc_uaf2 from kunit_try_run_case+0x11c/0x2e4
[  123.995838]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.996911]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  123.997768]  kthread from ret_from_fork+0x14/0x30
[  123.998250] Exception stack(0xfa01bfb0 to 0xfa01bff8)
[  123.998761] bfa0:                                     00000000 00000000 00000000 00000000
[  123.999722] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  124.000672] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  124.001441] 
[  124.001766] Allocated by task 162:
[  124.002256]  kasan_set_track+0x3c/0x5c
[  124.002916]  __kasan_kmalloc+0x8c/0x94
[  124.003602]  kmalloc_uaf2+0xac/0x274
[  124.004219]  kunit_try_run_case+0x11c/0x2e4
[  124.004907]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  124.005707]  kthread+0x184/0x1a8
[  124.006246]  ret_from_fork+0x14/0x30
[  124.006843] 
[  124.007148] Freed by task 162:
[  124.007604]  kasan_set_track+0x3c/0x5c
[  124.008246]  kasan_save_free_info+0x30/0x3c
[  124.008901]  __kasan_slab_free+0xdc/0x124
[  124.009540]  __kmem_cache_free+0x140/0x2a8
[  124.010230]  kmalloc_uaf2+0xc0/0x274
[  124.010933]  kunit_try_run_case+0x11c/0x2e4
[  124.011493]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  124.012247]  kthread+0x184/0x1a8
[  124.012784]  ret_from_fork+0x14/0x30
[  124.013268] 
[  124.013654] The buggy address belongs to the object at c4cdd680
[  124.013654]  which belongs to the cache kmalloc-64 of size 64
[  124.014708] The buggy address is located 40 bytes inside of
[  124.014708]  freed 64-byte region [c4cdd680, c4cdd6c0)
[  124.015704] 
[  124.016008] The buggy address belongs to the physical page:
[  124.016498] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[  124.017343] flags: 0x800(slab|zone=0)
[  124.017887] page_type: 0xffffffff()
[  124.018425] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  124.019194] raw: 00000000
[  124.019578] page dumped because: kasan: bad access detected
[  124.020244] 
[  124.020529] Memory state around the buggy address:
[  124.021058]  c4cdd580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  124.021787]  c4cdd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  124.022453] >c4cdd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  124.023121]                           ^
[  124.024105]  c4cdd700: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[  124.025239]  c4cdd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  124.025728] ==================================================================

test log snippet test parser 72

Home

[  123.985987] ==================================================================
[  123.986991] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x104/0x274
[  123.987591] Read of size 1 at addr c4cdd6a8 by task kunit_try_catch/162
[  123.988478] 
[  123.988821] CPU: 1 PID: 162 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  123.989879] Hardware name: Generic DT based system
[  123.990726]  unwind_backtrace from show_stack+0x18/0x1c
[  123.992705]  show_stack from dump_stack_lvl+0x58/0x70
[  123.993456]  dump_stack_lvl from print_report+0x164/0x51c
[  123.994071]  print_report from kasan_report+0xc8/0x104
[  123.994659]  kasan_report from kmalloc_uaf2+0x104/0x274
[  123.995222]  kmalloc_uaf2 from kunit_try_run_case+0x11c/0x2e4
[  123.995838]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.996911]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  123.997768]  kthread from ret_from_fork+0x14/0x30
[  123.998250] Exception stack(0xfa01bfb0 to 0xfa01bff8)
[  123.998761] bfa0:                                     00000000 00000000 00000000 00000000
[  123.999722] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  124.000672] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  124.001441] 
[  124.001766] Allocated by task 162:
[  124.002256]  kasan_set_track+0x3c/0x5c
[  124.002916]  __kasan_kmalloc+0x8c/0x94
[  124.003602]  kmalloc_uaf2+0xac/0x274
[  124.004219]  kunit_try_run_case+0x11c/0x2e4
[  124.004907]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  124.005707]  kthread+0x184/0x1a8
[  124.006246]  ret_from_fork+0x14/0x30
[  124.006843] 
[  124.007148] Freed by task 162:
[  124.007604]  kasan_set_track+0x3c/0x5c
[  124.008246]  kasan_save_free_info+0x30/0x3c
[  124.008901]  __kasan_slab_free+0xdc/0x124
[  124.009540]  __kmem_cache_free+0x140/0x2a8
[  124.010230]  kmalloc_uaf2+0xc0/0x274
[  124.010933]  kunit_try_run_case+0x11c/0x2e4
[  124.011493]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  124.012247]  kthread+0x184/0x1a8
[  124.012784]  ret_from_fork+0x14/0x30
[  124.013268] 
[  124.013654] The buggy address belongs to the object at c4cdd680
[  124.013654]  which belongs to the cache kmalloc-64 of size 64
[  124.014708] The buggy address is located 40 bytes inside of
[  124.014708]  freed 64-byte region [c4cdd680, c4cdd6c0)
[  124.015704] 
[  124.016008] The buggy address belongs to the physical page:
[  124.016498] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[  124.017343] flags: 0x800(slab|zone=0)
[  124.017887] page_type: 0xffffffff()
[  124.018425] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  124.019194] raw: 00000000
[  124.019578] page dumped because: kasan: bad access detected
[  124.020244] 
[  124.020529] Memory state around the buggy address:
[  124.021058]  c4cdd580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  124.021787]  c4cdd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  124.022453] >c4cdd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  124.023121]                           ^
[  124.024105]  c4cdd700: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[  124.025239]  c4cdd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  124.025728] ==================================================================

test log snippet test parser 73

Home

[  123.482732] ==================================================================
[  123.483558] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x100/0x240
[  123.484912] Read of size 16 at addr c4cdd400 by task kunit_try_catch/142
[  123.485544] 
[  123.485918] CPU: 1 PID: 142 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  123.486856] Hardware name: Generic DT based system
[  123.487498]  unwind_backtrace from show_stack+0x18/0x1c
[  123.488203]  show_stack from dump_stack_lvl+0x58/0x70
[  123.488881]  dump_stack_lvl from print_report+0x164/0x51c
[  123.489602]  print_report from kasan_report+0xc8/0x104
[  123.490460]  kasan_report from kmalloc_uaf_16+0x100/0x240
[  123.491225]  kmalloc_uaf_16 from kunit_try_run_case+0x11c/0x2e4
[  123.491821]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.492853]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  123.493689]  kthread from ret_from_fork+0x14/0x30
[  123.494325] Exception stack(0xf9f7bfb0 to 0xf9f7bff8)
[  123.494958] bfa0:                                     00000000 00000000 00000000 00000000
[  123.495774] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  123.496652] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  123.497378] 
[  123.497684] Allocated by task 142:
[  123.498078]  kasan_set_track+0x3c/0x5c
[  123.498713]  __kasan_kmalloc+0x8c/0x94
[  123.499291]  kmalloc_uaf_16+0xc8/0x240
[  123.500133]  kunit_try_run_case+0x11c/0x2e4
[  123.500599]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.501870]  kthread+0x184/0x1a8
[  123.502375]  ret_from_fork+0x14/0x30
[  123.502840] 
[  123.503062] Freed by task 142:
[  123.503476]  kasan_set_track+0x3c/0x5c
[  123.505410]  kasan_save_free_info+0x30/0x3c
[  123.506030]  __kasan_slab_free+0xdc/0x124
[  123.506577]  __kmem_cache_free+0x140/0x2a8
[  123.507147]  kmalloc_uaf_16+0xe4/0x240
[  123.507660]  kunit_try_run_case+0x11c/0x2e4
[  123.508249]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.508998]  kthread+0x184/0x1a8
[  123.509510]  ret_from_fork+0x14/0x30
[  123.509950] 
[  123.510238] The buggy address belongs to the object at c4cdd400
[  123.510238]  which belongs to the cache kmalloc-64 of size 64
[  123.511341] The buggy address is located 0 bytes inside of
[  123.511341]  freed 64-byte region [c4cdd400, c4cdd440)
[  123.512341] 
[  123.512578] The buggy address belongs to the physical page:
[  123.513261] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[  123.514190] flags: 0x800(slab|zone=0)
[  123.514595] page_type: 0xffffffff()
[  123.515157] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  123.515848] raw: 00000000
[  123.516241] page dumped because: kasan: bad access detected
[  123.516899] 
[  123.517122] Memory state around the buggy address:
[  123.517733]  c4cdd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  123.518495]  c4cdd380: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.519200] >c4cdd400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  123.519892]            ^
[  123.521662]  c4cdd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.522433]  c4cdd500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.523185] ==================================================================

test log snippet test parser 74

Home

[  123.482732] ==================================================================
[  123.483558] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x100/0x240
[  123.484912] Read of size 16 at addr c4cdd400 by task kunit_try_catch/142
[  123.485544] 
[  123.485918] CPU: 1 PID: 142 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  123.486856] Hardware name: Generic DT based system
[  123.487498]  unwind_backtrace from show_stack+0x18/0x1c
[  123.488203]  show_stack from dump_stack_lvl+0x58/0x70
[  123.488881]  dump_stack_lvl from print_report+0x164/0x51c
[  123.489602]  print_report from kasan_report+0xc8/0x104
[  123.490460]  kasan_report from kmalloc_uaf_16+0x100/0x240
[  123.491225]  kmalloc_uaf_16 from kunit_try_run_case+0x11c/0x2e4
[  123.491821]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.492853]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  123.493689]  kthread from ret_from_fork+0x14/0x30
[  123.494325] Exception stack(0xf9f7bfb0 to 0xf9f7bff8)
[  123.494958] bfa0:                                     00000000 00000000 00000000 00000000
[  123.495774] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  123.496652] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  123.497378] 
[  123.497684] Allocated by task 142:
[  123.498078]  kasan_set_track+0x3c/0x5c
[  123.498713]  __kasan_kmalloc+0x8c/0x94
[  123.499291]  kmalloc_uaf_16+0xc8/0x240
[  123.500133]  kunit_try_run_case+0x11c/0x2e4
[  123.500599]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.501870]  kthread+0x184/0x1a8
[  123.502375]  ret_from_fork+0x14/0x30
[  123.502840] 
[  123.503062] Freed by task 142:
[  123.503476]  kasan_set_track+0x3c/0x5c
[  123.505410]  kasan_save_free_info+0x30/0x3c
[  123.506030]  __kasan_slab_free+0xdc/0x124
[  123.506577]  __kmem_cache_free+0x140/0x2a8
[  123.507147]  kmalloc_uaf_16+0xe4/0x240
[  123.507660]  kunit_try_run_case+0x11c/0x2e4
[  123.508249]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.508998]  kthread+0x184/0x1a8
[  123.509510]  ret_from_fork+0x14/0x30
[  123.509950] 
[  123.510238] The buggy address belongs to the object at c4cdd400
[  123.510238]  which belongs to the cache kmalloc-64 of size 64
[  123.511341] The buggy address is located 0 bytes inside of
[  123.511341]  freed 64-byte region [c4cdd400, c4cdd440)
[  123.512341] 
[  123.512578] The buggy address belongs to the physical page:
[  123.513261] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[  123.514190] flags: 0x800(slab|zone=0)
[  123.514595] page_type: 0xffffffff()
[  123.515157] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  123.515848] raw: 00000000
[  123.516241] page dumped because: kasan: bad access detected
[  123.516899] 
[  123.517122] Memory state around the buggy address:
[  123.517733]  c4cdd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  123.518495]  c4cdd380: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.519200] >c4cdd400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  123.519892]            ^
[  123.521662]  c4cdd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.522433]  c4cdd500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.523185] ==================================================================

test log snippet test parser 75

Home

[  123.928380] ==================================================================
[  123.929282] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0xd8/0x1d4
[  123.930339] Write of size 33 at addr c4cdd600 by task kunit_try_catch/160
[  123.930916] 
[  123.931237] CPU: 1 PID: 160 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  123.932961] Hardware name: Generic DT based system
[  123.933829]  unwind_backtrace from show_stack+0x18/0x1c
[  123.934744]  show_stack from dump_stack_lvl+0x58/0x70
[  123.935698]  dump_stack_lvl from print_report+0x164/0x51c
[  123.936431]  print_report from kasan_report+0xc8/0x104
[  123.937422]  kasan_report from kasan_check_range+0x14c/0x198
[  123.938357]  kasan_check_range from __asan_memset+0x20/0x3c
[  123.939325]  __asan_memset from kmalloc_uaf_memset+0xd8/0x1d4
[  123.940378]  kmalloc_uaf_memset from kunit_try_run_case+0x11c/0x2e4
[  123.941491]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.942248]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  123.943511]  kthread from ret_from_fork+0x14/0x30
[  123.944335] Exception stack(0xfa00bfb0 to 0xfa00bff8)
[  123.944982] bfa0:                                     00000000 00000000 00000000 00000000
[  123.946128] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  123.947163] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  123.947876] 
[  123.948165] Allocated by task 160:
[  123.948582]  kasan_set_track+0x3c/0x5c
[  123.949665]  __kasan_kmalloc+0x8c/0x94
[  123.950436]  kmalloc_uaf_memset+0xa0/0x1d4
[  123.951245]  kunit_try_run_case+0x11c/0x2e4
[  123.952054]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.952941]  kthread+0x184/0x1a8
[  123.953368]  ret_from_fork+0x14/0x30
[  123.954255] 
[  123.954577] Freed by task 160:
[  123.955337]  kasan_set_track+0x3c/0x5c
[  123.955899]  kasan_save_free_info+0x30/0x3c
[  123.956760]  __kasan_slab_free+0xdc/0x124
[  123.957542]  __kmem_cache_free+0x140/0x2a8
[  123.958117]  kmalloc_uaf_memset+0xbc/0x1d4
[  123.958967]  kunit_try_run_case+0x11c/0x2e4
[  123.960850]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.961562]  kthread+0x184/0x1a8
[  123.962222]  ret_from_fork+0x14/0x30
[  123.962500] 
[  123.962670] The buggy address belongs to the object at c4cdd600
[  123.962670]  which belongs to the cache kmalloc-64 of size 64
[  123.964151] The buggy address is located 0 bytes inside of
[  123.964151]  freed 64-byte region [c4cdd600, c4cdd640)
[  123.965389] 
[  123.965723] The buggy address belongs to the physical page:
[  123.966328] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[  123.967127] flags: 0x800(slab|zone=0)
[  123.967531] page_type: 0xffffffff()
[  123.968160] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  123.968979] raw: 00000000
[  123.969403] page dumped because: kasan: bad access detected
[  123.969868] 
[  123.970157] Memory state around the buggy address:
[  123.970820]  c4cdd500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  123.971536]  c4cdd580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  123.972220] >c4cdd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  123.972899]            ^
[  123.973390]  c4cdd680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.974023]  c4cdd700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.974822] ==================================================================

test log snippet test parser 76

Home

[  125.344139] ==================================================================
[  125.345264] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0xd0/0x1cc
[  125.346202] Read of size 1 at addr c4cde400 by task kunit_try_catch/194
[  125.346878] 
[  125.347195] CPU: 1 PID: 194 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  125.348044] Hardware name: Generic DT based system
[  125.348481]  unwind_backtrace from show_stack+0x18/0x1c
[  125.349298]  show_stack from dump_stack_lvl+0x58/0x70
[  125.350495]  dump_stack_lvl from print_report+0x164/0x51c
[  125.351193]  print_report from kasan_report+0xc8/0x104
[  125.351893]  kasan_report from __kasan_check_byte+0x34/0x3c
[  125.352802]  __kasan_check_byte from kmem_cache_destroy+0x24/0x150
[  125.353736]  kmem_cache_destroy from kmem_cache_double_destroy+0xd0/0x1cc
[  125.354755]  kmem_cache_double_destroy from kunit_try_run_case+0x11c/0x2e4
[  125.355700]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.356705]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  125.357635]  kthread from ret_from_fork+0x14/0x30
[  125.358293] Exception stack(0xfa103fb0 to 0xfa103ff8)
[  125.358856] 3fa0:                                     00000000 00000000 00000000 00000000
[  125.360170] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  125.361039] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  125.361752] 
[  125.362045] Allocated by task 194:
[  125.362538]  kasan_set_track+0x3c/0x5c
[  125.363171]  __kasan_slab_alloc+0x60/0x68
[  125.363922]  kmem_cache_alloc+0x1dc/0x574
[  125.364501]  kmem_cache_create_usercopy+0x160/0x2a8
[  125.365197]  kmem_cache_create+0x28/0x30
[  125.365845]  kmem_cache_double_destroy+0xa0/0x1cc
[  125.366646]  kunit_try_run_case+0x11c/0x2e4
[  125.367401]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.368053]  kthread+0x184/0x1a8
[  125.368627]  ret_from_fork+0x14/0x30
[  125.369163] 
[  125.369494] Freed by task 194:
[  125.370420]  kasan_set_track+0x3c/0x5c
[  125.371067]  kasan_save_free_info+0x30/0x3c
[  125.371653]  __kasan_slab_free+0xdc/0x124
[  125.372204]  kmem_cache_free+0x170/0x41c
[  125.372846]  kobject_put+0xfc/0x320
[  125.373486]  kmem_cache_double_destroy+0xbc/0x1cc
[  125.374193]  kunit_try_run_case+0x11c/0x2e4
[  125.374747]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.375566]  kthread+0x184/0x1a8
[  125.376079]  ret_from_fork+0x14/0x30
[  125.376685] 
[  125.376975] The buggy address belongs to the object at c4cde400
[  125.376975]  which belongs to the cache kmem_cache of size 132
[  125.378081] The buggy address is located 0 bytes inside of
[  125.378081]  freed 132-byte region [c4cde400, c4cde484)
[  125.379268] 
[  125.379686] The buggy address belongs to the physical page:
[  125.380686] page:6d15f967 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cde
[  125.381565] flags: 0x800(slab|zone=0)
[  125.382159] page_type: 0xffffffff()
[  125.382700] raw: 00000800 c4801000 00000122 00000000 00000000 80100010 ffffffff 00000001
[  125.383606] raw: 00000000
[  125.384068] page dumped because: kasan: bad access detected
[  125.384678] 
[  125.384971] Memory state around the buggy address:
[  125.385632]  c4cde300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  125.386161]  c4cde380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.386984] >c4cde400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  125.387704]            ^
[  125.388121]  c4cde480: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.388868]  c4cde500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.389741] ==================================================================

test log snippet test parser 77

Home

[  123.381543] ==================================================================
[  123.382250] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x11c/0x2b8
[  123.382961] Read of size 1 at addr c4d42600 by task kunit_try_catch/138
[  123.383658] 
[  123.383983] CPU: 1 PID: 138 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  123.384817] Hardware name: Generic DT based system
[  123.385437]  unwind_backtrace from show_stack+0x18/0x1c
[  123.386250]  show_stack from dump_stack_lvl+0x58/0x70
[  123.386945]  dump_stack_lvl from print_report+0x164/0x51c
[  123.387704]  print_report from kasan_report+0xc8/0x104
[  123.388479]  kasan_report from krealloc_uaf+0x11c/0x2b8
[  123.389154]  krealloc_uaf from kunit_try_run_case+0x11c/0x2e4
[  123.390042]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.391135]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  123.392708]  kthread from ret_from_fork+0x14/0x30
[  123.393115] Exception stack(0xf9f5bfb0 to 0xf9f5bff8)
[  123.393427] bfa0:                                     00000000 00000000 00000000 00000000
[  123.394152] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  123.395789] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  123.396677] 
[  123.396950] Allocated by task 138:
[  123.397324]  kasan_set_track+0x3c/0x5c
[  123.397968]  __kasan_kmalloc+0x8c/0x94
[  123.398587]  krealloc_uaf+0xac/0x2b8
[  123.399065]  kunit_try_run_case+0x11c/0x2e4
[  123.399743]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.400441]  kthread+0x184/0x1a8
[  123.401005]  ret_from_fork+0x14/0x30
[  123.401551] 
[  123.401879] Freed by task 138:
[  123.402297]  kasan_set_track+0x3c/0x5c
[  123.402805]  kasan_save_free_info+0x30/0x3c
[  123.403493]  __kasan_slab_free+0xdc/0x124
[  123.404158]  __kmem_cache_free+0x140/0x2a8
[  123.404778]  krealloc_uaf+0xc8/0x2b8
[  123.405355]  kunit_try_run_case+0x11c/0x2e4
[  123.405998]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.406792]  kthread+0x184/0x1a8
[  123.407331]  ret_from_fork+0x14/0x30
[  123.407803] 
[  123.408112] The buggy address belongs to the object at c4d42600
[  123.408112]  which belongs to the cache kmalloc-256 of size 256
[  123.409254] The buggy address is located 0 bytes inside of
[  123.409254]  freed 256-byte region [c4d42600, c4d42700)
[  123.410271] 
[  123.410537] The buggy address belongs to the physical page:
[  123.411233] page:c6df89a3 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d42
[  123.413743] head:c6df89a3 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  123.414470] flags: 0x840(slab|head|zone=0)
[  123.414943] page_type: 0xffffffff()
[  123.415519] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[  123.416332] raw: 00000000
[  123.416709] page dumped because: kasan: bad access detected
[  123.417371] 
[  123.417694] Memory state around the buggy address:
[  123.418276]  c4d42500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.419096]  c4d42580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.419749] >c4d42600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  123.420422]            ^
[  123.420849]  c4d42680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  123.421571]  c4d42700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.422352] ==================================================================

test log snippet test parser 78

Home

[  123.333539] ==================================================================
[  123.334665] BUG: KASAN: slab-use-after-free in krealloc_uaf+0xe4/0x2b8
[  123.335414] Read of size 1 at addr c4d42600 by task kunit_try_catch/138
[  123.335959] 
[  123.336287] CPU: 1 PID: 138 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  123.337212] Hardware name: Generic DT based system
[  123.338080]  unwind_backtrace from show_stack+0x18/0x1c
[  123.338735]  show_stack from dump_stack_lvl+0x58/0x70
[  123.339520]  dump_stack_lvl from print_report+0x164/0x51c
[  123.340464]  print_report from kasan_report+0xc8/0x104
[  123.341374]  kasan_report from __kasan_check_byte+0x34/0x3c
[  123.342357]  __kasan_check_byte from krealloc+0x30/0x134
[  123.343029]  krealloc from krealloc_uaf+0xe4/0x2b8
[  123.343938]  krealloc_uaf from kunit_try_run_case+0x11c/0x2e4
[  123.344895]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.345970]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  123.346926]  kthread from ret_from_fork+0x14/0x30
[  123.347559] Exception stack(0xf9f5bfb0 to 0xf9f5bff8)
[  123.348118] bfa0:                                     00000000 00000000 00000000 00000000
[  123.349028] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  123.350029] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  123.351163] 
[  123.351472] Allocated by task 138:
[  123.352102]  kasan_set_track+0x3c/0x5c
[  123.352758]  __kasan_kmalloc+0x8c/0x94
[  123.353446]  krealloc_uaf+0xac/0x2b8
[  123.354043]  kunit_try_run_case+0x11c/0x2e4
[  123.354600]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.355389]  kthread+0x184/0x1a8
[  123.355903]  ret_from_fork+0x14/0x30
[  123.356349] 
[  123.356692] Freed by task 138:
[  123.357158]  kasan_set_track+0x3c/0x5c
[  123.357794]  kasan_save_free_info+0x30/0x3c
[  123.358510]  __kasan_slab_free+0xdc/0x124
[  123.359187]  __kmem_cache_free+0x140/0x2a8
[  123.359887]  krealloc_uaf+0xc8/0x2b8
[  123.360450]  kunit_try_run_case+0x11c/0x2e4
[  123.361094]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  123.361920]  kthread+0x184/0x1a8
[  123.362502]  ret_from_fork+0x14/0x30
[  123.363108] 
[  123.363493] The buggy address belongs to the object at c4d42600
[  123.363493]  which belongs to the cache kmalloc-256 of size 256
[  123.364762] The buggy address is located 0 bytes inside of
[  123.364762]  freed 256-byte region [c4d42600, c4d42700)
[  123.365810] 
[  123.366172] The buggy address belongs to the physical page:
[  123.366798] page:c6df89a3 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d42
[  123.367585] head:c6df89a3 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  123.368404] flags: 0x840(slab|head|zone=0)
[  123.369037] page_type: 0xffffffff()
[  123.369872] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[  123.371458] raw: 00000000
[  123.371889] page dumped because: kasan: bad access detected
[  123.372771] 
[  123.373075] Memory state around the buggy address:
[  123.373682]  c4d42500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.374375]  c4d42580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.375198] >c4d42600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  123.376398]            ^
[  123.376819]  c4d42680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  123.377493]  c4d42700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  123.378177] ==================================================================

test log snippet test parser 79

Home

[  125.061998] ==================================================================
[  125.062840] BUG: KASAN: slab-use-after-free in ksize_uaf+0xd0/0x308
[  125.063576] Read of size 1 at addr c4cdc800 by task kunit_try_catch/188
[  125.065148] 
[  125.065433] CPU: 1 PID: 188 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  125.066259] Hardware name: Generic DT based system
[  125.067214]  unwind_backtrace from show_stack+0x18/0x1c
[  125.068133]  show_stack from dump_stack_lvl+0x58/0x70
[  125.069001]  dump_stack_lvl from print_report+0x164/0x51c
[  125.069964]  print_report from kasan_report+0xc8/0x104
[  125.070668]  kasan_report from __kasan_check_byte+0x34/0x3c
[  125.071435]  __kasan_check_byte from ksize+0x20/0x3c
[  125.072405]  ksize from ksize_uaf+0xd0/0x308
[  125.072913]  ksize_uaf from kunit_try_run_case+0x11c/0x2e4
[  125.073692]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.075137]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  125.075886]  kthread from ret_from_fork+0x14/0x30
[  125.076474] Exception stack(0xfa0dbfb0 to 0xfa0dbff8)
[  125.077368] bfa0:                                     00000000 00000000 00000000 00000000
[  125.078416] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  125.079429] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  125.080138] 
[  125.080390] Allocated by task 188:
[  125.080802]  kasan_set_track+0x3c/0x5c
[  125.081333]  __kasan_kmalloc+0x8c/0x94
[  125.082414]  ksize_uaf+0xa0/0x308
[  125.083117]  kunit_try_run_case+0x11c/0x2e4
[  125.083934]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.084804]  kthread+0x184/0x1a8
[  125.085490]  ret_from_fork+0x14/0x30
[  125.086177] 
[  125.086722] Freed by task 188:
[  125.087175]  kasan_set_track+0x3c/0x5c
[  125.087736]  kasan_save_free_info+0x30/0x3c
[  125.088636]  __kasan_slab_free+0xdc/0x124
[  125.089426]  __kmem_cache_free+0x140/0x2a8
[  125.090228]  ksize_uaf+0xbc/0x308
[  125.090977]  kunit_try_run_case+0x11c/0x2e4
[  125.091780]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.092660]  kthread+0x184/0x1a8
[  125.093350]  ret_from_fork+0x14/0x30
[  125.094011] 
[  125.094351] The buggy address belongs to the object at c4cdc800
[  125.094351]  which belongs to the cache kmalloc-128 of size 128
[  125.095554] The buggy address is located 0 bytes inside of
[  125.095554]  freed 128-byte region [c4cdc800, c4cdc880)
[  125.096814] 
[  125.097120] The buggy address belongs to the physical page:
[  125.097701] page:4ad3b9de refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdc
[  125.098468] flags: 0x800(slab|zone=0)
[  125.099498] page_type: 0xffffffff()
[  125.100213] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  125.101250] raw: 00000000
[  125.101883] page dumped because: kasan: bad access detected
[  125.102686] 
[  125.103202] Memory state around the buggy address:
[  125.103969]  c4cdc700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  125.104835]  c4cdc780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.105489] >c4cdc800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  125.106200]            ^
[  125.106602]  c4cdc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.107738]  c4cdc900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.108597] ==================================================================

test log snippet test parser 80

Home

[  125.157915] ==================================================================
[  125.158772] BUG: KASAN: slab-use-after-free in ksize_uaf+0x12c/0x308
[  125.159508] Read of size 1 at addr c4cdc878 by task kunit_try_catch/188
[  125.160479] 
[  125.161485] CPU: 1 PID: 188 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  125.163155] Hardware name: Generic DT based system
[  125.163909]  unwind_backtrace from show_stack+0x18/0x1c
[  125.164632]  show_stack from dump_stack_lvl+0x58/0x70
[  125.165309]  dump_stack_lvl from print_report+0x164/0x51c
[  125.166286]  print_report from kasan_report+0xc8/0x104
[  125.167141]  kasan_report from ksize_uaf+0x12c/0x308
[  125.167978]  ksize_uaf from kunit_try_run_case+0x11c/0x2e4
[  125.168792]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.169788]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  125.170689]  kthread from ret_from_fork+0x14/0x30
[  125.171355] Exception stack(0xfa0dbfb0 to 0xfa0dbff8)
[  125.171950] bfa0:                                     00000000 00000000 00000000 00000000
[  125.172856] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  125.173695] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  125.174466] 
[  125.174787] Allocated by task 188:
[  125.175207]  kasan_set_track+0x3c/0x5c
[  125.175891]  __kasan_kmalloc+0x8c/0x94
[  125.176384]  ksize_uaf+0xa0/0x308
[  125.176985]  kunit_try_run_case+0x11c/0x2e4
[  125.177553]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.178387]  kthread+0x184/0x1a8
[  125.178932]  ret_from_fork+0x14/0x30
[  125.179476] 
[  125.179828] Freed by task 188:
[  125.180304]  kasan_set_track+0x3c/0x5c
[  125.180896]  kasan_save_free_info+0x30/0x3c
[  125.181381]  __kasan_slab_free+0xdc/0x124
[  125.182065]  __kmem_cache_free+0x140/0x2a8
[  125.182644]  ksize_uaf+0xbc/0x308
[  125.183237]  kunit_try_run_case+0x11c/0x2e4
[  125.183827]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.184776]  kthread+0x184/0x1a8
[  125.185545]  ret_from_fork+0x14/0x30
[  125.186261] 
[  125.186803] The buggy address belongs to the object at c4cdc800
[  125.186803]  which belongs to the cache kmalloc-128 of size 128
[  125.188528] The buggy address is located 120 bytes inside of
[  125.188528]  freed 128-byte region [c4cdc800, c4cdc880)
[  125.189637] 
[  125.189914] The buggy address belongs to the physical page:
[  125.190565] page:4ad3b9de refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdc
[  125.191385] flags: 0x800(slab|zone=0)
[  125.191847] page_type: 0xffffffff()
[  125.192268] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  125.193258] raw: 00000000
[  125.193695] page dumped because: kasan: bad access detected
[  125.194373] 
[  125.194691] Memory state around the buggy address:
[  125.195247]  c4cdc700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  125.195902]  c4cdc780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.196755] >c4cdc800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  125.197415]                                                         ^
[  125.198218]  c4cdc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.198867]  c4cdc900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.199559] ==================================================================

test log snippet test parser 81

Home

[  125.112853] ==================================================================
[  125.113505] BUG: KASAN: slab-use-after-free in ksize_uaf+0xfc/0x308
[  125.114456] Read of size 1 at addr c4cdc800 by task kunit_try_catch/188
[  125.115552] 
[  125.115879] CPU: 1 PID: 188 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  125.117120] Hardware name: Generic DT based system
[  125.117790]  unwind_backtrace from show_stack+0x18/0x1c
[  125.118693]  show_stack from dump_stack_lvl+0x58/0x70
[  125.119630]  dump_stack_lvl from print_report+0x164/0x51c
[  125.120582]  print_report from kasan_report+0xc8/0x104
[  125.121488]  kasan_report from ksize_uaf+0xfc/0x308
[  125.122393]  ksize_uaf from kunit_try_run_case+0x11c/0x2e4
[  125.123344]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.124440]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  125.125464]  kthread from ret_from_fork+0x14/0x30
[  125.126117] Exception stack(0xfa0dbfb0 to 0xfa0dbff8)
[  125.126740] bfa0:                                     00000000 00000000 00000000 00000000
[  125.127563] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  125.128940] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  125.129786] 
[  125.130272] Allocated by task 188:
[  125.130898]  kasan_set_track+0x3c/0x5c
[  125.131686]  __kasan_kmalloc+0x8c/0x94
[  125.132438]  ksize_uaf+0xa0/0x308
[  125.133180]  kunit_try_run_case+0x11c/0x2e4
[  125.133766]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.134400]  kthread+0x184/0x1a8
[  125.135293]  ret_from_fork+0x14/0x30
[  125.136044] 
[  125.136733] Freed by task 188:
[  125.137113]  kasan_set_track+0x3c/0x5c
[  125.137884]  kasan_save_free_info+0x30/0x3c
[  125.138688]  __kasan_slab_free+0xdc/0x124
[  125.139208]  __kmem_cache_free+0x140/0x2a8
[  125.140017]  ksize_uaf+0xbc/0x308
[  125.140638]  kunit_try_run_case+0x11c/0x2e4
[  125.141243]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.142013]  kthread+0x184/0x1a8
[  125.142458]  ret_from_fork+0x14/0x30
[  125.143050] 
[  125.143336] The buggy address belongs to the object at c4cdc800
[  125.143336]  which belongs to the cache kmalloc-128 of size 128
[  125.144518] The buggy address is located 0 bytes inside of
[  125.144518]  freed 128-byte region [c4cdc800, c4cdc880)
[  125.145446] 
[  125.145807] The buggy address belongs to the physical page:
[  125.146502] page:4ad3b9de refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdc
[  125.147355] flags: 0x800(slab|zone=0)
[  125.147948] page_type: 0xffffffff()
[  125.148591] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  125.149347] raw: 00000000
[  125.149762] page dumped because: kasan: bad access detected
[  125.150408] 
[  125.150672] Memory state around the buggy address:
[  125.151246]  c4cdc700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  125.152049]  c4cdc780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.152842] >c4cdc800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  125.153518]            ^
[  125.153985]  c4cdc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.154672]  c4cdc900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.155289] ==================================================================

test log snippet test parser 82

Home

[  126.380189] ==================================================================
[  126.381176] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x24/0x2c
[  126.382065] Read of size 4 at addr c8fcf080 by task swapper/0/0
[  126.382629] 
[  126.382935] CPU: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N 6.6.74-rc1 #1
[  126.384178] Hardware name: Generic DT based system
[  126.384830]  unwind_backtrace from show_stack+0x18/0x1c
[  126.385679]  show_stack from dump_stack_lvl+0x58/0x70
[  126.386536]  dump_stack_lvl from print_report+0x164/0x51c
[  126.387428]  print_report from kasan_report+0xc8/0x104
[  126.388329]  kasan_report from rcu_uaf_reclaim+0x24/0x2c
[  126.389199]  rcu_uaf_reclaim from rcu_core+0x418/0xc84
[  126.389930]  rcu_core from handle_softirqs+0x23c/0x5fc
[  126.390565]  handle_softirqs from irq_exit+0xec/0x138
[  126.391244]  irq_exit from __irq_svc+0x78/0x9c
[  126.391768] Exception stack(0xc3603ec0 to 0xc3603f08)
[  126.392461] 3ec0: e7b62fd0 00000000 e7b62fd0 00000000 c3614a00 c360bf60 00000000 c360bfbc
[  126.393420] 3ee0: b76c07e4 00000000 00000000 c3603f80 00000000 c3603f10 c04dc054 c04d3684
[  126.394148] 3f00: 60000013 ffffffff
[  126.394655]  __irq_svc from arch_local_irq_enable+0x4/0x8
[  126.395326]  arch_local_irq_enable from do_idle+0x2d8/0x380
[  126.395948]  do_idle from cpu_startup_entry+0x38/0x3c
[  126.396679]  cpu_startup_entry from rest_init+0xdc/0xe0
[  126.397500]  rest_init from arch_post_acpi_subsys_init+0x0/0x18
[  126.398329] 
[  126.398578] Allocated by task 209:
[  126.399060]  kasan_set_track+0x3c/0x5c
[  126.399656]  __kasan_kmalloc+0x8c/0x94
[  126.400595]  rcu_uaf+0xa0/0x1dc
[  126.401230]  kunit_try_run_case+0x11c/0x2e4
[  126.402196]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  126.402939]  kthread+0x184/0x1a8
[  126.403347]  ret_from_fork+0x14/0x30
[  126.404032] 
[  126.404265] Freed by task 0:
[  126.404695]  kasan_set_track+0x3c/0x5c
[  126.405445]  kasan_save_free_info+0x30/0x3c
[  126.406060]  __kasan_slab_free+0xdc/0x124
[  126.406763]  __kmem_cache_free+0x140/0x2a8
[  126.407365]  rcu_uaf_reclaim+0x1c/0x2c
[  126.407947]  rcu_core+0x418/0xc84
[  126.408566]  handle_softirqs+0x23c/0x5fc
[  126.409245]  irq_exit+0xec/0x138
[  126.409859]  __irq_svc+0x78/0x9c
[  126.410433]  arch_local_irq_enable+0x4/0x8
[  126.410987]  do_idle+0x2d8/0x380
[  126.411497]  cpu_startup_entry+0x38/0x3c
[  126.412128]  rest_init+0xdc/0xe0
[  126.412522]  arch_post_acpi_subsys_init+0x0/0x18
[  126.413245] 
[  126.413668] Last potentially related work creation:
[  126.414268]  kasan_save_stack+0x30/0x4c
[  126.414946]  __kasan_record_aux_stack+0x84/0x8c
[  126.415501]  __call_rcu_common.constprop.0+0x44/0x59c
[  126.416243]  rcu_uaf+0xdc/0x1dc
[  126.416798]  kunit_try_run_case+0x11c/0x2e4
[  126.417377]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  126.418254]  kthread+0x184/0x1a8
[  126.418841]  ret_from_fork+0x14/0x30
[  126.419391] 
[  126.419753] The buggy address belongs to the object at c8fcf080
[  126.419753]  which belongs to the cache kmalloc-64 of size 64
[  126.421250] The buggy address is located 0 bytes inside of
[  126.421250]  freed 64-byte region [c8fcf080, c8fcf0c0)
[  126.423109] 
[  126.423408] The buggy address belongs to the physical page:
[  126.423980] page:6cc93337 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fcf
[  126.424936] flags: 0x800(slab|zone=0)
[  126.425400] page_type: 0xffffffff()
[  126.426008] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  126.426828] raw: 00000000
[  126.427261] page dumped because: kasan: bad access detected
[  126.427848] 
[  126.428139] Memory state around the buggy address:
[  126.428808]  c8fcef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.429190]  c8fcf000: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.429489] >c8fcf080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  126.430117]            ^
[  126.430863]  c8fcf100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.431747]  c8fcf180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.432579] ==================================================================

test log snippet test parser 83

Home

[  125.465477] ==================================================================
[  125.467227] BUG: KASAN: slab-use-after-free in strcmp+0x20/0x54
[  125.467936] Read of size 1 at addr c8fc7890 by task kunit_try_catch/201
[  125.468557] 
[  125.468930] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  125.469830] Hardware name: Generic DT based system
[  125.470741]  unwind_backtrace from show_stack+0x18/0x1c
[  125.471901]  show_stack from dump_stack_lvl+0x58/0x70
[  125.473118]  dump_stack_lvl from print_report+0x164/0x51c
[  125.474401]  print_report from kasan_report+0xc8/0x104
[  125.475214]  kasan_report from strcmp+0x20/0x54
[  125.475834]  strcmp from kasan_strings+0x140/0x4ec
[  125.476449]  kasan_strings from kunit_try_run_case+0x11c/0x2e4
[  125.477141]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.478106]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  125.478962]  kthread from ret_from_fork+0x14/0x30
[  125.480651] Exception stack(0xfa12bfb0 to 0xfa12bff8)
[  125.481460] bfa0:                                     00000000 00000000 00000000 00000000
[  125.482521] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  125.483537] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  125.484516] 
[  125.484902] Allocated by task 201:
[  125.485448]  kasan_set_track+0x3c/0x5c
[  125.486042]  __kasan_kmalloc+0x8c/0x94
[  125.486703]  kasan_strings+0xa0/0x4ec
[  125.487238]  kunit_try_run_case+0x11c/0x2e4
[  125.487570]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.488194]  kthread+0x184/0x1a8
[  125.488799]  ret_from_fork+0x14/0x30
[  125.489235] 
[  125.489423] Freed by task 201:
[  125.489750]  kasan_set_track+0x3c/0x5c
[  125.490136]  kasan_save_free_info+0x30/0x3c
[  125.490540]  __kasan_slab_free+0xdc/0x124
[  125.491672]  __kmem_cache_free+0x140/0x2a8
[  125.493002]  kasan_strings+0xbc/0x4ec
[  125.493555]  kunit_try_run_case+0x11c/0x2e4
[  125.494038]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.494812]  kthread+0x184/0x1a8
[  125.495284]  ret_from_fork+0x14/0x30
[  125.495906] 
[  125.496342] The buggy address belongs to the object at c8fc7880
[  125.496342]  which belongs to the cache kmalloc-64 of size 64
[  125.497562] The buggy address is located 16 bytes inside of
[  125.497562]  freed 64-byte region [c8fc7880, c8fc78c0)
[  125.498780] 
[  125.499015] The buggy address belongs to the physical page:
[  125.500474] page:c8c1e52b refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fc7
[  125.502350] flags: 0x800(slab|zone=0)
[  125.502811] page_type: 0xffffffff()
[  125.503274] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  125.504275] raw: 00000000
[  125.504537] page dumped because: kasan: bad access detected
[  125.505780] 
[  125.505983] Memory state around the buggy address:
[  125.506680]  c8fc7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.507478]  c8fc7800: 00 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc
[  125.508354] >c8fc7880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  125.509090]                  ^
[  125.509649]  c8fc7900: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.511543]  c8fc7980: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  125.512189] ==================================================================

test log snippet test parser 84

Home

[  125.558579] ==================================================================
[  125.560362] BUG: KASAN: slab-use-after-free in strlen+0xc/0x44
[  125.561082] Read of size 1 at addr c8fc7890 by task kunit_try_catch/201
[  125.561784] 
[  125.562017] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  125.564277] Hardware name: Generic DT based system
[  125.565121]  unwind_backtrace from show_stack+0x18/0x1c
[  125.566044]  show_stack from dump_stack_lvl+0x58/0x70
[  125.566948]  dump_stack_lvl from print_report+0x164/0x51c
[  125.567862]  print_report from kasan_report+0xc8/0x104
[  125.568641]  kasan_report from strlen+0xc/0x44
[  125.569304]  strlen from kasan_strings+0x1a8/0x4ec
[  125.570263]  kasan_strings from kunit_try_run_case+0x11c/0x2e4
[  125.571216]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.572142]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  125.573265]  kthread from ret_from_fork+0x14/0x30
[  125.574122] Exception stack(0xfa12bfb0 to 0xfa12bff8)
[  125.574911] bfa0:                                     00000000 00000000 00000000 00000000
[  125.575970] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  125.576948] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  125.577638] 
[  125.577907] Allocated by task 201:
[  125.578313]  kasan_set_track+0x3c/0x5c
[  125.579296]  __kasan_kmalloc+0x8c/0x94
[  125.580123]  kasan_strings+0xa0/0x4ec
[  125.581089]  kunit_try_run_case+0x11c/0x2e4
[  125.581868]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.582760]  kthread+0x184/0x1a8
[  125.583431]  ret_from_fork+0x14/0x30
[  125.584143] 
[  125.584432] Freed by task 201:
[  125.585225]  kasan_set_track+0x3c/0x5c
[  125.586005]  kasan_save_free_info+0x30/0x3c
[  125.586782]  __kasan_slab_free+0xdc/0x124
[  125.587378]  __kmem_cache_free+0x140/0x2a8
[  125.587897]  kasan_strings+0xbc/0x4ec
[  125.588341]  kunit_try_run_case+0x11c/0x2e4
[  125.589430]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.590315]  kthread+0x184/0x1a8
[  125.591709]  ret_from_fork+0x14/0x30
[  125.592412] 
[  125.592720] The buggy address belongs to the object at c8fc7880
[  125.592720]  which belongs to the cache kmalloc-64 of size 64
[  125.594160] The buggy address is located 16 bytes inside of
[  125.594160]  freed 64-byte region [c8fc7880, c8fc78c0)
[  125.595803] 
[  125.596101] The buggy address belongs to the physical page:
[  125.596683] page:c8c1e52b refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fc7
[  125.597466] flags: 0x800(slab|zone=0)
[  125.597922] page_type: 0xffffffff()
[  125.598340] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  125.599314] raw: 00000000
[  125.599802] page dumped because: kasan: bad access detected
[  125.601212] 
[  125.601483] Memory state around the buggy address:
[  125.601987]  c8fc7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.602561]  c8fc7800: 00 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc
[  125.603371] >c8fc7880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  125.604142]                  ^
[  125.604839]  c8fc7900: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.605711]  c8fc7980: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  125.606375] ==================================================================

test log snippet test parser 85

Home

[  125.607943] ==================================================================
[  125.609094] BUG: KASAN: slab-use-after-free in strnlen+0x30/0x58
[  125.609412] Read of size 1 at addr c8fc7890 by task kunit_try_catch/201
[  125.611215] 
[  125.611509] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  125.612502] Hardware name: Generic DT based system
[  125.613200]  unwind_backtrace from show_stack+0x18/0x1c
[  125.614046]  show_stack from dump_stack_lvl+0x58/0x70
[  125.614910]  dump_stack_lvl from print_report+0x164/0x51c
[  125.615716]  print_report from kasan_report+0xc8/0x104
[  125.616568]  kasan_report from strnlen+0x30/0x58
[  125.617372]  strnlen from kasan_strings+0x1dc/0x4ec
[  125.618077]  kasan_strings from kunit_try_run_case+0x11c/0x2e4
[  125.618905]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.619929]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  125.621182]  kthread from ret_from_fork+0x14/0x30
[  125.621898] Exception stack(0xfa12bfb0 to 0xfa12bff8)
[  125.622488] bfa0:                                     00000000 00000000 00000000 00000000
[  125.623336] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  125.624523] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  125.625463] 
[  125.625752] Allocated by task 201:
[  125.626121]  kasan_set_track+0x3c/0x5c
[  125.626751]  __kasan_kmalloc+0x8c/0x94
[  125.627260]  kasan_strings+0xa0/0x4ec
[  125.627824]  kunit_try_run_case+0x11c/0x2e4
[  125.628393]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.629112]  kthread+0x184/0x1a8
[  125.629557]  ret_from_fork+0x14/0x30
[  125.630996] 
[  125.631272] Freed by task 201:
[  125.632147]  kasan_set_track+0x3c/0x5c
[  125.632511]  kasan_save_free_info+0x30/0x3c
[  125.633264]  __kasan_slab_free+0xdc/0x124
[  125.633978]  __kmem_cache_free+0x140/0x2a8
[  125.634816]  kasan_strings+0xbc/0x4ec
[  125.635066]  kunit_try_run_case+0x11c/0x2e4
[  125.635319]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  125.635631]  kthread+0x184/0x1a8
[  125.635838]  ret_from_fork+0x14/0x30
[  125.636045] 
[  125.636160] The buggy address belongs to the object at c8fc7880
[  125.636160]  which belongs to the cache kmalloc-64 of size 64
[  125.636656] The buggy address is located 16 bytes inside of
[  125.636656]  freed 64-byte region [c8fc7880, c8fc78c0)
[  125.637394] 
[  125.637656] The buggy address belongs to the physical page:
[  125.639032] page:c8c1e52b refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fc7
[  125.640009] flags: 0x800(slab|zone=0)
[  125.640556] page_type: 0xffffffff()
[  125.641983] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  125.643210] raw: 00000000
[  125.643757] page dumped because: kasan: bad access detected
[  125.644546] 
[  125.644798] Memory state around the buggy address:
[  125.645746]  c8fc7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.646713]  c8fc7800: 00 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc
[  125.647397] >c8fc7880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  125.648195]                  ^
[  125.648633]  c8fc7900: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  125.649520]  c8fc7980: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  125.651207] ==================================================================

test log snippet test parser 86

Home

[  126.445963] ==================================================================
[  126.447045] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x14c/0x264
[  126.448071] Read of size 4 at addr c8fcf400 by task kunit_try_catch/211
[  126.448889] 
[  126.449137] CPU: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  126.450705] Hardware name: Generic DT based system
[  126.451324]  unwind_backtrace from show_stack+0x18/0x1c
[  126.452141]  show_stack from dump_stack_lvl+0x58/0x70
[  126.452991]  dump_stack_lvl from print_report+0x164/0x51c
[  126.453884]  print_report from kasan_report+0xc8/0x104
[  126.454693]  kasan_report from workqueue_uaf+0x14c/0x264
[  126.455531]  workqueue_uaf from kunit_try_run_case+0x11c/0x2e4
[  126.456374]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  126.457387]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  126.458284]  kthread from ret_from_fork+0x14/0x30
[  126.459036] Exception stack(0xfa14bfb0 to 0xfa14bff8)
[  126.459696] bfa0:                                     00000000 00000000 00000000 00000000
[  126.460945] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  126.461731] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  126.462454] 
[  126.462811] Allocated by task 211:
[  126.463587]  kasan_set_track+0x3c/0x5c
[  126.464214]  __kasan_kmalloc+0x8c/0x94
[  126.464952]  workqueue_uaf+0xcc/0x264
[  126.465458]  kunit_try_run_case+0x11c/0x2e4
[  126.466152]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  126.466796]  kthread+0x184/0x1a8
[  126.467346]  ret_from_fork+0x14/0x30
[  126.467926] 
[  126.468191] Freed by task 8:
[  126.468678]  kasan_set_track+0x3c/0x5c
[  126.469230]  kasan_save_free_info+0x30/0x3c
[  126.469904]  __kasan_slab_free+0xdc/0x124
[  126.470376]  __kmem_cache_free+0x140/0x2a8
[  126.471473]  process_one_work+0x2e4/0x678
[  126.471884]  worker_thread+0x4d8/0x828
[  126.472448]  kthread+0x184/0x1a8
[  126.473101]  ret_from_fork+0x14/0x30
[  126.473700] 
[  126.473965] Last potentially related work creation:
[  126.474434]  kasan_save_stack+0x30/0x4c
[  126.475048]  __kasan_record_aux_stack+0x84/0x8c
[  126.475649]  __queue_work+0x2a8/0x9b8
[  126.476208]  queue_work_on+0x98/0x9c
[  126.476739]  workqueue_uaf+0x128/0x264
[  126.477324]  kunit_try_run_case+0x11c/0x2e4
[  126.477959]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  126.478573]  kthread+0x184/0x1a8
[  126.479115]  ret_from_fork+0x14/0x30
[  126.480138] 
[  126.480420] The buggy address belongs to the object at c8fcf400
[  126.480420]  which belongs to the cache kmalloc-64 of size 64
[  126.481393] The buggy address is located 0 bytes inside of
[  126.481393]  freed 64-byte region [c8fcf400, c8fcf440)
[  126.482519] 
[  126.482819] The buggy address belongs to the physical page:
[  126.483538] page:6cc93337 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fcf
[  126.484385] flags: 0x800(slab|zone=0)
[  126.484908] page_type: 0xffffffff()
[  126.485469] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[  126.486262] raw: 00000000
[  126.486689] page dumped because: kasan: bad access detected
[  126.487216] 
[  126.487509] Memory state around the buggy address:
[  126.488065]  c8fcf300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  126.488769]  c8fcf380: 00 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc
[  126.489915] >c8fcf400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  126.490640]            ^
[  126.490961]  c8fcf480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.491764]  c8fcf500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  126.492497] ==================================================================

test log snippet test parser 87

Home

[  124.799348] ==================================================================
[  124.800697] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0xc0/0x174
[  124.801474] Read of size 1 at addr fa09be0a by task kunit_try_catch/180
[  124.802017] 
[  124.802357] CPU: 1 PID: 180 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  124.803522] Hardware name: Generic DT based system
[  124.804228]  unwind_backtrace from show_stack+0x18/0x1c
[  124.804942]  show_stack from dump_stack_lvl+0x58/0x70
[  124.805518]  dump_stack_lvl from print_report+0x164/0x51c
[  124.806194]  print_report from kasan_report+0xc8/0x104
[  124.806983]  kasan_report from kasan_stack_oob+0xc0/0x174
[  124.807718]  kasan_stack_oob from kunit_try_run_case+0x11c/0x2e4
[  124.808581]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  124.809969]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  124.810764]  kthread from ret_from_fork+0x14/0x30
[  124.811342] Exception stack(0xfa09bfb0 to 0xfa09bff8)
[  124.812003] bfa0:                                     00000000 00000000 00000000 00000000
[  124.812814] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  124.813685] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  124.814437] 
[  124.814900] The buggy address belongs to stack of task kunit_try_catch/180
[  124.815770]  and is located at offset 106 in frame:
[  124.816315]  kasan_stack_oob+0x0/0x174
[  124.817519] 
[  124.817878] This frame has 4 objects:
[  124.818446]  [32, 33) '__assertion'
[  124.818602]  [48, 52) 'array'
[  124.819097]  [64, 72) '__assertion'
[  124.819964]  [96, 106) 'stack_array'
[  124.820498] 
[  124.821235] The buggy address belongs to the virtual mapping at
[  124.821235]  [fa098000, fa09d000) created by:
[  124.821235]  kernel_clone+0xcc/0x4b0
[  124.822522] 
[  124.823102] The buggy address belongs to the physical page:
[  124.823783] page:100fd0ab refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fc96
[  124.824687] flags: 0x80000000(zone=2)
[  124.825201] page_type: 0xffffffff()
[  124.825684] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  124.826519] raw: 00000000
[  124.826871] page dumped because: kasan: bad access detected
[  124.827509] 
[  124.827813] Memory state around the buggy address:
[  124.828282]  fa09bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  124.829072]  fa09bd80: 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2
[  124.830231] >fa09be00: 00 02 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
[  124.830913]               ^
[  124.831340]  fa09be80: 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 00 00 f2 f2
[  124.832119]  fa09bf00: 00 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
[  124.832728] ==================================================================

test log snippet test parser 88

Home

[  122.665338] ==================================================================
[  122.666409] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0xb4/0x1ac
[  122.667011] Read of size 1 at addr c4dd8000 by task kunit_try_catch/120
[  122.667495] 
[  122.667757] CPU: 1 PID: 120 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  122.668572] Hardware name: Generic DT based system
[  122.669123]  unwind_backtrace from show_stack+0x18/0x1c
[  122.669898]  show_stack from dump_stack_lvl+0x58/0x70
[  122.671881]  dump_stack_lvl from print_report+0x164/0x51c
[  122.672748]  print_report from kasan_report+0xc8/0x104
[  122.673423]  kasan_report from kmalloc_pagealloc_uaf+0xb4/0x1ac
[  122.674198]  kmalloc_pagealloc_uaf from kunit_try_run_case+0x11c/0x2e4
[  122.675165]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  122.676163]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  122.677057]  kthread from ret_from_fork+0x14/0x30
[  122.677675] Exception stack(0xf9ecbfb0 to 0xf9ecbff8)
[  122.678373] bfa0:                                     00000000 00000000 00000000 00000000
[  122.679304] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  122.680070] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  122.680793] 
[  122.681098] The buggy address belongs to the physical page:
[  122.681753] page:50be9d29 refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x44dd8
[  122.682469] flags: 0x0(zone=0)
[  122.682910] page_type: 0xffffffff()
[  122.683330] raw: 00000000 e7b79e84 e7b79e84 00000000 00000000 00000000 ffffffff 00000000
[  122.684241] raw: 00000000
[  122.684650] page dumped because: kasan: bad access detected
[  122.685289] 
[  122.685576] Memory state around the buggy address:
[  122.686037]  c4dd7f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  122.686824]  c4dd7f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  122.687388] >c4dd8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  122.688148]            ^
[  122.688560]  c4dd8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  122.689166]  c4dd8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  122.689915] ==================================================================

test log snippet test parser 89

Home

[  122.745656] ==================================================================
[  122.746889] BUG: KASAN: use-after-free in pagealloc_uaf+0xc8/0x1cc
[  122.747712] Read of size 1 at addr c8f60000 by task kunit_try_catch/126
[  122.748509] 
[  122.748843] CPU: 1 PID: 126 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  122.749917] Hardware name: Generic DT based system
[  122.750590]  unwind_backtrace from show_stack+0x18/0x1c
[  122.751461]  show_stack from dump_stack_lvl+0x58/0x70
[  122.752274]  dump_stack_lvl from print_report+0x164/0x51c
[  122.752992]  print_report from kasan_report+0xc8/0x104
[  122.753711]  kasan_report from pagealloc_uaf+0xc8/0x1cc
[  122.754366]  pagealloc_uaf from kunit_try_run_case+0x11c/0x2e4
[  122.755241]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  122.756156]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  122.757030]  kthread from ret_from_fork+0x14/0x30
[  122.757554] Exception stack(0xf9efbfb0 to 0xf9efbff8)
[  122.758229] bfa0:                                     00000000 00000000 00000000 00000000
[  122.759219] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  122.761221] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  122.761994] 
[  122.762187] The buggy address belongs to the physical page:
[  122.763179] page:c0c5e598 refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f60
[  122.764224] flags: 0x0(zone=0)
[  122.764674] page_type: 0xffffff7f(buddy)
[  122.765266] raw: 00000000 c40f8d44 c40f8d44 00000000 00000000 00000005 ffffff7f 00000000
[  122.765913] raw: 00000000
[  122.766083] page dumped because: kasan: bad access detected
[  122.766325] 
[  122.766438] Memory state around the buggy address:
[  122.766767]  c8f5ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  122.767275]  c8f5ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  122.767943] >c8f60000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  122.768739]            ^
[  122.769166]  c8f60080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  122.770003]  c8f60100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  122.770813] ==================================================================

test log snippet test parser 90

Home

[  126.540768] ==================================================================
[  126.541460] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x10c/0x300
[  126.542244] Read of size 1 at addr f18f57f8 by task kunit_try_catch/216
[  126.542858] 
[  126.543160] CPU: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  126.543973] Hardware name: Generic DT based system
[  126.544407]  unwind_backtrace from show_stack+0x18/0x1c
[  126.545271]  show_stack from dump_stack_lvl+0x58/0x70
[  126.546079]  dump_stack_lvl from print_report+0x164/0x51c
[  126.546887]  print_report from kasan_report+0xc8/0x104
[  126.547558]  kasan_report from vmalloc_oob+0x10c/0x300
[  126.548297]  vmalloc_oob from kunit_try_run_case+0x11c/0x2e4
[  126.549297]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  126.550745]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  126.551886]  kthread from ret_from_fork+0x14/0x30
[  126.552573] Exception stack(0xfa173fb0 to 0xfa173ff8)
[  126.553262] 3fa0:                                     00000000 00000000 00000000 00000000
[  126.554096] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  126.555056] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  126.555594] 
[  126.555940] The buggy address belongs to the virtual mapping at
[  126.555940]  [f18f5000, f18f7000) created by:
[  126.555940]  vmalloc_oob+0x88/0x300
[  126.557281] 
[  126.557595] The buggy address belongs to the physical page:
[  126.558099] page:3e55a4b0 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fcde
[  126.559024] flags: 0x80000000(zone=2)
[  126.559815] page_type: 0xffffffff()
[  126.560675] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  126.561459] raw: 00000000
[  126.561869] page dumped because: kasan: bad access detected
[  126.562404] 
[  126.562675] Memory state around the buggy address:
[  126.563402]  f18f5680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.564250]  f18f5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.565044] >f18f5780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[  126.565835]                                                         ^
[  126.566634]  f18f5800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  126.567415]  f18f5880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  126.568173] ==================================================================

test log snippet test parser 91

Home

[  126.508297] ==================================================================
[  126.509646] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xd8/0x300
[  126.510323] Read of size 1 at addr f18f57f3 by task kunit_try_catch/216
[  126.511671] 
[  126.512015] CPU: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[  126.513067] Hardware name: Generic DT based system
[  126.513846]  unwind_backtrace from show_stack+0x18/0x1c
[  126.514696]  show_stack from dump_stack_lvl+0x58/0x70
[  126.515415]  dump_stack_lvl from print_report+0x164/0x51c
[  126.516154]  print_report from kasan_report+0xc8/0x104
[  126.516876]  kasan_report from vmalloc_oob+0xd8/0x300
[  126.517564]  vmalloc_oob from kunit_try_run_case+0x11c/0x2e4
[  126.518303]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  126.519269]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  126.520514]  kthread from ret_from_fork+0x14/0x30
[  126.521087] Exception stack(0xfa173fb0 to 0xfa173ff8)
[  126.521716] 3fa0:                                     00000000 00000000 00000000 00000000
[  126.522666] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  126.523533] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  126.524311] 
[  126.524659] The buggy address belongs to the virtual mapping at
[  126.524659]  [f18f5000, f18f7000) created by:
[  126.524659]  vmalloc_oob+0x88/0x300
[  126.525928] 
[  126.526243] The buggy address belongs to the physical page:
[  126.526855] page:3e55a4b0 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fcde
[  126.527707] flags: 0x80000000(zone=2)
[  126.528191] page_type: 0xffffffff()
[  126.528652] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  126.529948] raw: 00000000
[  126.530365] page dumped because: kasan: bad access detected
[  126.531035] 
[  126.531329] Memory state around the buggy address:
[  126.531912]  f18f5680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.532702]  f18f5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  126.533439] >f18f5780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[  126.533969]                                                      ^
[  126.534739]  f18f5800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  126.535407]  f18f5880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  126.536045] ==================================================================

test log snippet test parser 92

Home

------------[ cut here ]------------
[   50.113326] WARNING: CPU: 1 PID: 470 at mm/util.c:632 kvmalloc_node+0xf4/0xf8
[   50.115451] Modules linked in:
[   50.117494] CPU: 1 PID: 470 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[   50.118510] Hardware name: Generic DT based system
[   50.120849]  unwind_backtrace from show_stack+0x10/0x14
[   50.121694]  show_stack from dump_stack_lvl+0x40/0x4c
[   50.122877]  dump_stack_lvl from __warn+0x78/0x124
[   50.124296]  __warn from warn_slowpath_fmt+0x184/0x18c
[   50.124960]  warn_slowpath_fmt from kvmalloc_node+0xf4/0xf8
[   50.125255]  kvmalloc_node from alloc_fdtable+0x88/0x104
[   50.125522]  alloc_fdtable from expand_files+0x78/0x2f4
[   50.126989]  expand_files from ksys_dup3+0x58/0xe0
[   50.127903]  ksys_dup3 from ret_fast_syscall+0x0/0x4c
[   50.129495] Exception stack(0xfa1d9fa8 to 0xfa1d9ff0)
[   50.129978] 9fa0:                   beb7f2bc 004b0000 00000002 2000003c 00000000 2000003c
[   50.130372] 9fc0: beb7f2bc 004b0000 004aff0c 0000003f 00492edd b6f53ce0 00000000 004aff0c
[   50.130723] 9fe0: 0000003f beb7f0e4 b6eb2f43 b6e30786
[   50.134221] ---[ end trace 0000000000000000 ]---

test log snippet test parser 93

Home

------------[ cut here ]------------
[   50.113326] WARNING: CPU: 1 PID: 470 at mm/util.c:632 kvmalloc_node+0xf4/0xf8
[   50.115451] Modules linked in:
[   50.117494] CPU: 1 PID: 470 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[   50.118510] Hardware name: Generic DT based system
[   50.120849]  unwind_backtrace from show_stack+0x10/0x14
[   50.121694]  show_stack from dump_stack_lvl+0x40/0x4c
[   50.122877]  dump_stack_lvl from __warn+0x78/0x124
[   50.124296]  __warn from warn_slowpath_fmt+0x184/0x18c
[   50.124960]  warn_slowpath_fmt from kvmalloc_node+0xf4/0xf8
[   50.125255]  kvmalloc_node from alloc_fdtable+0x88/0x104
[   50.125522]  alloc_fdtable from expand_files+0x78/0x2f4
[   50.126989]  expand_files from ksys_dup3+0x58/0xe0
[   50.127903]  ksys_dup3 from ret_fast_syscall+0x0/0x4c
[   50.129495] Exception stack(0xfa1d9fa8 to 0xfa1d9ff0)
[   50.129978] 9fa0:                   beb7f2bc 004b0000 00000002 2000003c 00000000 2000003c
[   50.130372] 9fc0: beb7f2bc 004b0000 004aff0c 0000003f 00492edd b6f53ce0 00000000 004aff0c
[   50.130723] 9fe0: 0000003f beb7f0e4 b6eb2f43 b6e30786
[   50.134221] ---[ end trace 0000000000000000 ]---

test log snippet test parser 94

Home

------------[ cut here ]------------
[   32.751016] WARNING: CPU: 0 PID: 476 at mm/util.c:632 kvmalloc_node+0xd1/0xe0
[   32.752711] Modules linked in:
[   32.754328] CPU: 0 PID: 476 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[   32.754616] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.757383] EIP: kvmalloc_node+0xd1/0xe0
[   32.757714] Code: 00 00 ff 75 04 ff 75 ec 68 00 04 00 00 ff 75 f0 56 57 e8 b2 de 02 00 83 c4 18 83 c4 08 5e 5f 5b 5d c3 f7 c6 00 20 00 00 75 f0 <0f> 0b eb ec 90 90 90 90 90 90 90 90 90 90 90 83 f8 11 72 2c 55 89
[   32.759953] EAX: 00000000 EBX: 80001000 ECX: ca9bd4ed EDX: 00000000
[   32.760614] ESI: 00400cc0 EDI: ffffffff EBP: c20e1eb8 ESP: c20e1ea4
[   32.761773] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010246
[   32.762519] CR0: 80050033 CR2: b7d69e40 CR3: 02397000 CR4: 000006d0
[   32.762929] Call Trace:
[   32.766057]  ? show_regs+0x4e/0x60
[   32.767210]  ? kvmalloc_node+0xd1/0xe0
[   32.767576]  ? __warn+0xa5/0x180
[   32.767921]  ? kvmalloc_node+0xd1/0xe0
[   32.768433]  ? kvmalloc_node+0xd1/0xe0
[   32.768813]  ? report_bug+0x11e/0x1b0
[   32.769462]  ? exc_overflow+0x38/0x38
[   32.769758]  ? handle_bug+0x48/0x68
[   32.770370]  ? exc_invalid_op+0x17/0x3c
[   32.771185]  ? handle_exception+0x133/0x133
[   32.772163]  ? kvmalloc_node+0x3d/0xe0
[   32.772702]  ? exc_overflow+0x38/0x38
[   32.773021]  ? kvmalloc_node+0xd1/0xe0
[   32.773476]  ? exc_overflow+0x38/0x38
[   32.774040]  ? kvmalloc_node+0xd1/0xe0
[   32.774326]  ? security_task_setrlimit+0x36/0x50
[   32.774839]  alloc_fdtable+0x70/0xf0
[   32.775594]  ? do_prlimit+0x11f/0x170
[   32.775751]  expand_files+0x101/0x2b0
[   32.775880]  ? __ia32_sys_prlimit64+0x20e/0x2c0
[   32.776029]  ksys_dup3+0x5b/0xb0
[   32.776508]  __ia32_sys_dup2+0x16/0x70
[   32.777204]  ia32_sys_call+0x273a/0x27d0
[   32.777605]  __do_fast_syscall_32+0x6c/0xb4
[   32.777915]  ? hrtimer_interrupt+0x137/0x420
[   32.778582]  ? exit_to_user_mode_prepare+0x29/0xc0
[   32.779235]  do_fast_syscall_32+0x29/0x5c
[   32.779691]  do_SYSENTER_32+0x12/0x14
[   32.780007]  entry_SYSENTER_32+0x98/0xf9
[   32.780653] EIP: 0xb7f0b539
[   32.781437] Code: 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 90 90 90 58 b8 77 00 00 00 cd 80 90 90 90
[   32.782885] EAX: ffffffda EBX: 00000002 ECX: 2000003c EDX: b7ef0e14
[   32.783095] ESI: 004d9124 EDI: bfcb0960 EBP: bfcb0978 ESP: bfcb06f8
[   32.783734] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b EFLAGS: 00000296
[   32.784585] ---[ end trace 0000000000000000 ]---

test log snippet test parser 95

Home

------------[ cut here ]------------
[   32.751016] WARNING: CPU: 0 PID: 476 at mm/util.c:632 kvmalloc_node+0xd1/0xe0
[   32.752711] Modules linked in:
[   32.754328] CPU: 0 PID: 476 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[   32.754616] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.757383] EIP: kvmalloc_node+0xd1/0xe0
[   32.757714] Code: 00 00 ff 75 04 ff 75 ec 68 00 04 00 00 ff 75 f0 56 57 e8 b2 de 02 00 83 c4 18 83 c4 08 5e 5f 5b 5d c3 f7 c6 00 20 00 00 75 f0 <0f> 0b eb ec 90 90 90 90 90 90 90 90 90 90 90 83 f8 11 72 2c 55 89
[   32.759953] EAX: 00000000 EBX: 80001000 ECX: ca9bd4ed EDX: 00000000
[   32.760614] ESI: 00400cc0 EDI: ffffffff EBP: c20e1eb8 ESP: c20e1ea4
[   32.761773] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010246
[   32.762519] CR0: 80050033 CR2: b7d69e40 CR3: 02397000 CR4: 000006d0
[   32.762929] Call Trace:
[   32.766057]  ? show_regs+0x4e/0x60
[   32.767210]  ? kvmalloc_node+0xd1/0xe0
[   32.767576]  ? __warn+0xa5/0x180
[   32.767921]  ? kvmalloc_node+0xd1/0xe0
[   32.768433]  ? kvmalloc_node+0xd1/0xe0
[   32.768813]  ? report_bug+0x11e/0x1b0
[   32.769462]  ? exc_overflow+0x38/0x38
[   32.769758]  ? handle_bug+0x48/0x68
[   32.770370]  ? exc_invalid_op+0x17/0x3c
[   32.771185]  ? handle_exception+0x133/0x133
[   32.772163]  ? kvmalloc_node+0x3d/0xe0
[   32.772702]  ? exc_overflow+0x38/0x38
[   32.773021]  ? kvmalloc_node+0xd1/0xe0
[   32.773476]  ? exc_overflow+0x38/0x38
[   32.774040]  ? kvmalloc_node+0xd1/0xe0
[   32.774326]  ? security_task_setrlimit+0x36/0x50
[   32.774839]  alloc_fdtable+0x70/0xf0
[   32.775594]  ? do_prlimit+0x11f/0x170
[   32.775751]  expand_files+0x101/0x2b0
[   32.775880]  ? __ia32_sys_prlimit64+0x20e/0x2c0
[   32.776029]  ksys_dup3+0x5b/0xb0
[   32.776508]  __ia32_sys_dup2+0x16/0x70
[   32.777204]  ia32_sys_call+0x273a/0x27d0
[   32.777605]  __do_fast_syscall_32+0x6c/0xb4
[   32.777915]  ? hrtimer_interrupt+0x137/0x420
[   32.778582]  ? exit_to_user_mode_prepare+0x29/0xc0
[   32.779235]  do_fast_syscall_32+0x29/0x5c
[   32.779691]  do_SYSENTER_32+0x12/0x14
[   32.780007]  entry_SYSENTER_32+0x98/0xf9
[   32.780653] EIP: 0xb7f0b539
[   32.781437] Code: 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 90 90 90 58 b8 77 00 00 00 cd 80 90 90 90
[   32.782885] EAX: ffffffda EBX: 00000002 ECX: 2000003c EDX: b7ef0e14
[   32.783095] ESI: 004d9124 EDI: bfcb0960 EBP: bfcb0978 ESP: bfcb06f8
[   32.783734] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b EFLAGS: 00000296
[   32.784585] ---[ end trace 0000000000000000 ]---

test log snippet test parser 96

Home

------------[ cut here ]------------
[   31.026812] WARNING: CPU: 0 PID: 476 at mm/util.c:632 kvmalloc_node+0xd8/0xe0
[   31.028229] Modules linked in:
[   31.028832] CPU: 0 PID: 476 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[   31.029801] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.031058] EIP: kvmalloc_node+0xd8/0xe0
[   31.031524] Code: ff 2d 00 20 80 00 89 04 24 89 d8 e8 fe 22 03 00 8b 5d f4 8b 75 f8 8b 7d fc 89 ec 5d c3 90 81 e6 00 20 00 00 0f 85 49 ff ff ff <0f> 0b e9 42 ff ff ff 90 55 89 e5 83 ec 0c 89 5d f4 89 d3 89 ca 89
[   31.032807] EAX: 00000000 EBX: 80001000 ECX: 00000013 EDX: ffffffff
[   31.033200] ESI: 00000000 EDI: ffffffff EBP: c1de5ef0 ESP: c1de5ecc
[   31.033638] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010246
[   31.033998] CR0: 80050033 CR2: b7d5be40 CR3: 0214e000 CR4: 000006d0
[   31.034663] Call Trace:
[   31.036252]  ? show_regs+0x4d/0x54
[   31.036641]  ? kvmalloc_node+0xd8/0xe0
[   31.037077]  ? __warn+0x84/0x150
[   31.037427]  ? kvmalloc_node+0xd8/0xe0
[   31.037611]  ? kvmalloc_node+0xd8/0xe0
[   31.037998]  ? report_bug+0x189/0x1b0
[   31.038653]  ? kvmalloc_node+0xd9/0xe0
[   31.039017]  ? exc_overflow+0x50/0x50
[   31.039444]  ? handle_bug+0x56/0x90
[   31.039615]  ? exc_invalid_op+0x1b/0x70
[   31.039792]  ? kvmalloc_node+0x59/0xe0
[   31.041075]  ? handle_exception+0x133/0x133
[   31.041453]  ? exc_overflow+0x50/0x50
[   31.041760]  ? kvmalloc_node+0xd8/0xe0
[   31.042513]  ? exc_overflow+0x50/0x50
[   31.042757]  ? kvmalloc_node+0xd8/0xe0
[   31.043776]  ? kmalloc_trace+0x2b/0xa0
[   31.044768]  ? alloc_fdtable+0x42/0xd8
[   31.045159]  ? selinux_task_setrlimit+0x7b/0x84
[   31.045679]  alloc_fdtable+0x67/0xd8
[   31.046238]  expand_files+0x55/0x81c
[   31.046718]  ? do_prlimit+0xfc/0x1c8
[   31.047120]  ? __ia32_sys_prlimit64+0x293/0x340
[   31.047835]  ksys_dup3+0x5a/0xe4
[   31.048465]  __ia32_sys_dup2+0x19/0x70
[   31.049096]  ia32_sys_call+0x1d96/0x2738
[   31.049594]  __do_fast_syscall_32+0x45/0xac
[   31.049794]  do_fast_syscall_32+0x32/0x74
[   31.050063]  do_SYSENTER_32+0x15/0x24
[   31.050306]  entry_SYSENTER_32+0x98/0xf9
[   31.050743] EIP: 0xb7efd579
[   31.051180] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d 76 00 58 b8 77 00 00 00 cd 80 90 8d 76
[   31.052175] EAX: ffffffda EBX: 00000002 ECX: 2000003c EDX: b7ee2e14
[   31.052639] ESI: 0040b5cc EDI: bf8a1bb0 EBP: bf8a1d28 ESP: bf8a1b18
[   31.053198] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b EFLAGS: 00000296
[   31.053768] ---[ end trace 0000000000000000 ]---

test log snippet test parser 97

Home

------------[ cut here ]------------
[   31.026812] WARNING: CPU: 0 PID: 476 at mm/util.c:632 kvmalloc_node+0xd8/0xe0
[   31.028229] Modules linked in:
[   31.028832] CPU: 0 PID: 476 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[   31.029801] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.031058] EIP: kvmalloc_node+0xd8/0xe0
[   31.031524] Code: ff 2d 00 20 80 00 89 04 24 89 d8 e8 fe 22 03 00 8b 5d f4 8b 75 f8 8b 7d fc 89 ec 5d c3 90 81 e6 00 20 00 00 0f 85 49 ff ff ff <0f> 0b e9 42 ff ff ff 90 55 89 e5 83 ec 0c 89 5d f4 89 d3 89 ca 89
[   31.032807] EAX: 00000000 EBX: 80001000 ECX: 00000013 EDX: ffffffff
[   31.033200] ESI: 00000000 EDI: ffffffff EBP: c1de5ef0 ESP: c1de5ecc
[   31.033638] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010246
[   31.033998] CR0: 80050033 CR2: b7d5be40 CR3: 0214e000 CR4: 000006d0
[   31.034663] Call Trace:
[   31.036252]  ? show_regs+0x4d/0x54
[   31.036641]  ? kvmalloc_node+0xd8/0xe0
[   31.037077]  ? __warn+0x84/0x150
[   31.037427]  ? kvmalloc_node+0xd8/0xe0
[   31.037611]  ? kvmalloc_node+0xd8/0xe0
[   31.037998]  ? report_bug+0x189/0x1b0
[   31.038653]  ? kvmalloc_node+0xd9/0xe0
[   31.039017]  ? exc_overflow+0x50/0x50
[   31.039444]  ? handle_bug+0x56/0x90
[   31.039615]  ? exc_invalid_op+0x1b/0x70
[   31.039792]  ? kvmalloc_node+0x59/0xe0
[   31.041075]  ? handle_exception+0x133/0x133
[   31.041453]  ? exc_overflow+0x50/0x50
[   31.041760]  ? kvmalloc_node+0xd8/0xe0
[   31.042513]  ? exc_overflow+0x50/0x50
[   31.042757]  ? kvmalloc_node+0xd8/0xe0
[   31.043776]  ? kmalloc_trace+0x2b/0xa0
[   31.044768]  ? alloc_fdtable+0x42/0xd8
[   31.045159]  ? selinux_task_setrlimit+0x7b/0x84
[   31.045679]  alloc_fdtable+0x67/0xd8
[   31.046238]  expand_files+0x55/0x81c
[   31.046718]  ? do_prlimit+0xfc/0x1c8
[   31.047120]  ? __ia32_sys_prlimit64+0x293/0x340
[   31.047835]  ksys_dup3+0x5a/0xe4
[   31.048465]  __ia32_sys_dup2+0x19/0x70
[   31.049096]  ia32_sys_call+0x1d96/0x2738
[   31.049594]  __do_fast_syscall_32+0x45/0xac
[   31.049794]  do_fast_syscall_32+0x32/0x74
[   31.050063]  do_SYSENTER_32+0x15/0x24
[   31.050306]  entry_SYSENTER_32+0x98/0xf9
[   31.050743] EIP: 0xb7efd579
[   31.051180] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d 76 00 58 b8 77 00 00 00 cd 80 90 8d 76
[   31.052175] EAX: ffffffda EBX: 00000002 ECX: 2000003c EDX: b7ee2e14
[   31.052639] ESI: 0040b5cc EDI: bf8a1bb0 EBP: bf8a1d28 ESP: bf8a1b18
[   31.053198] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b EFLAGS: 00000296
[   31.053768] ---[ end trace 0000000000000000 ]---

test log snippet test parser 98

Home

------------[ cut here ]------------
[  104.688855] event 'ma_read' has unsafe pointer field 'fn'
[  104.689941] WARNING: CPU: 1 PID: 309 at kernel/trace/trace.c:3881 ignore_event+0x1f8/0x214
[  104.690095] Modules linked in: drm i2c_core drm_panel_orientation_quirks backlight dm_mod ip_tables x_tables
[  104.691421] CPU: 1 PID: 309 Comm: cat Not tainted 6.6.74-rc1 #1
[  104.691483] Hardware name: riscv-virtio,qemu (DT)
[  104.691654] epc : ignore_event+0x1f8/0x214
[  104.691760]  ra : ignore_event+0x1f8/0x214
[  104.691840] epc : ffffffff8012b980 ra : ffffffff8012b980 sp : ff2000000064bc00
[  104.691885]  gp : ffffffff81a32398 tp : ff60000083e58000 t0 : ffffffff80098da4
[  104.691928]  t1 : 00000000ffffffff t2 : 205b2d2d2d2d2d2d s0 : ff2000000064bc70
[  104.691971]  s1 : ff6000008014f150 a0 : 000000000000002d a1 : 0000000000000001
[  104.692015]  a2 : 0000000000000000 a3 : 0000000000000008 a4 : 0000000000000000
[  104.692058]  a5 : 0000000000000000 a6 : 0000000000000001 a7 : 0000000000000ad9
[  104.692129]  s2 : ffffffff81600c80 s3 : ff600000867400a0 s4 : ffffffff819bfae0
[  104.692181]  s5 : ff600000867410d8 s6 : ff60000086773198 s7 : ff600000867410a0
[  104.692233]  s8 : ffffffff81000000 s9 : ffffffff81600000 s10: ffffffff819cc138
[  104.692283]  s11: ff60000086742000 t3 : 0000000000100000 t4 : 0000000000000064
[  104.692333]  t5 : ffffffff81a48748 t6 : ff2000000064ba18
[  104.692381] status: 0000000200000120 badaddr: ffffffff8012b980 cause: 0000000000000003
[  104.692501] [<ffffffff8012b980>] ignore_event+0x1f8/0x214
[  104.692637] [<ffffffff80130baa>] trace_event_printf+0x36/0x80
[  104.692691] [<ffffffff80ba4c6c>] trace_raw_output_ma_read+0x5e/0x7a
[  104.692743] [<ffffffff8012cf9c>] print_trace_line+0x1d8/0x4a8
[  104.692793] [<ffffffff8012d860>] tracing_read_pipe+0x168/0x302
[  104.692844] [<ffffffff802aa73e>] vfs_read+0xac/0x27c
[  104.692899] [<ffffffff802ab11a>] ksys_read+0x68/0xec
[  104.692951] [<ffffffff802ab1be>] __riscv_sys_read+0x20/0x28
[  104.693002] [<ffffffff80bcfe64>] do_trap_ecall_u+0x12a/0x13c
[  104.693057] [<ffffffff80bdbb10>] ret_from_exception+0x0/0x64
[  104.693262] ---[ end trace 0000000000000000 ]---

test log snippet test parser 99

Home

------------[ cut here ]------------
[   54.079215] WARNING: CPU: 1 PID: 477 at mm/util.c:632 kvmalloc_node+0xde/0xf0
[   54.081249] Modules linked in:
[   54.082158] CPU: 1 PID: 477 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[   54.083066] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   54.084213] RIP: 0010:kvmalloc_node+0xde/0xf0
[   54.084956] Code: 45 89 f0 ff 75 08 53 68 00 04 00 00 e8 9b 16 04 00 48 83 c4 18 5b 41 5e 41 5f 5d c3 cc cc cc cc cc 41 f7 c6 00 20 00 00 75 81 <0f> 0b 31 c0 eb e5 66 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90
[   54.086433] RSP: 0018:ffffba06c0603db0 EFLAGS: 00010246
[   54.086807] RAX: 0000000000000004 RBX: 00000000ffffffff RCX: 0000000400000000
[   54.087080] RDX: 0000000200002000 RSI: 0000000000000000 RDI: ffffffffa5e457f8
[   54.087339] RBP: ffffba06c0603dc8 R08: 0000000000412cc0 R09: 00000000ffffffff
[   54.087627] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000040000400
[   54.087881] R13: 0000000040000038 R14: 0000000000400cc0 R15: 0000000200002000
[   54.088188] FS:  00007f7cd10ea740(0000) GS:ffffa2597bd00000(0000) knlGS:0000000000000000
[   54.089627] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   54.090249] CR2: 00007f7cd11679e0 CR3: 00000001018c0000 CR4: 00000000000006e0
[   54.091892] Call Trace:
[   54.094029]  <TASK>
[   54.095384]  ? show_regs+0x5c/0x70
[   54.096272]  ? __warn+0xc9/0x1d0
[   54.097230]  ? kvmalloc_node+0xde/0xf0
[   54.097828]  ? report_bug+0x152/0x200
[   54.098834]  ? handle_bug+0x68/0x90
[   54.099087]  ? exc_invalid_op+0x1f/0x50
[   54.099281]  ? asm_exc_invalid_op+0x1f/0x30
[   54.100461]  ? kvmalloc_node+0x48/0xf0
[   54.101311]  ? kvmalloc_node+0xde/0xf0
[   54.101604]  alloc_fdtable+0x7a/0x120
[   54.102907]  expand_files+0x11a/0x310
[   54.103094]  ? do_prlimit+0x120/0x160
[   54.103252]  ksys_dup3+0x75/0xe0
[   54.103536]  __x64_sys_dup2+0x25/0x90
[   54.103829]  x64_sys_call+0x256b/0x2d20
[   54.104346]  do_syscall_64+0x55/0xb0
[   54.105631]  ? exc_page_fault+0x65/0xc0
[   54.106884]  entry_SYSCALL_64_after_hwframe+0x78/0xe2
[   54.107416] RIP: 0033:0x7f7cd11e2c17
[   54.108838] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[   54.109875] RSP: 002b:00007ffeb04e7f08 EFLAGS: 00000202 ORIG_RAX: 0000000000000021
[   54.110179] RAX: ffffffffffffffda RBX: 00007ffeb04e8768 RCX: 00007f7cd11e2c17
[   54.110416] RDX: 00007ffeb04e8088 RSI: 0000000040000038 RDI: 0000000000000002
[   54.111839] RBP: 00007ffeb04e8120 R08: 0000000000000064 R09: 0000000000000000
[   54.112813] R10: 00007f7cd10ff170 R11: 0000000000000202 R12: 0000000000000000
[   54.113580] R13: 00007ffeb04e8778 R14: 00007f7cd1318000 R15: 0000557aacc46cf8
[   54.114931]  </TASK>
[   54.115742] ---[ end trace 0000000000000000 ]---

test log snippet test parser 100

Home

------------[ cut here ]------------
[   54.079215] WARNING: CPU: 1 PID: 477 at mm/util.c:632 kvmalloc_node+0xde/0xf0
[   54.081249] Modules linked in:
[   54.082158] CPU: 1 PID: 477 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[   54.083066] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   54.084213] RIP: 0010:kvmalloc_node+0xde/0xf0
[   54.084956] Code: 45 89 f0 ff 75 08 53 68 00 04 00 00 e8 9b 16 04 00 48 83 c4 18 5b 41 5e 41 5f 5d c3 cc cc cc cc cc 41 f7 c6 00 20 00 00 75 81 <0f> 0b 31 c0 eb e5 66 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90
[   54.086433] RSP: 0018:ffffba06c0603db0 EFLAGS: 00010246
[   54.086807] RAX: 0000000000000004 RBX: 00000000ffffffff RCX: 0000000400000000
[   54.087080] RDX: 0000000200002000 RSI: 0000000000000000 RDI: ffffffffa5e457f8
[   54.087339] RBP: ffffba06c0603dc8 R08: 0000000000412cc0 R09: 00000000ffffffff
[   54.087627] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000040000400
[   54.087881] R13: 0000000040000038 R14: 0000000000400cc0 R15: 0000000200002000
[   54.088188] FS:  00007f7cd10ea740(0000) GS:ffffa2597bd00000(0000) knlGS:0000000000000000
[   54.089627] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   54.090249] CR2: 00007f7cd11679e0 CR3: 00000001018c0000 CR4: 00000000000006e0
[   54.091892] Call Trace:
[   54.094029]  <TASK>
[   54.095384]  ? show_regs+0x5c/0x70
[   54.096272]  ? __warn+0xc9/0x1d0
[   54.097230]  ? kvmalloc_node+0xde/0xf0
[   54.097828]  ? report_bug+0x152/0x200
[   54.098834]  ? handle_bug+0x68/0x90
[   54.099087]  ? exc_invalid_op+0x1f/0x50
[   54.099281]  ? asm_exc_invalid_op+0x1f/0x30
[   54.100461]  ? kvmalloc_node+0x48/0xf0
[   54.101311]  ? kvmalloc_node+0xde/0xf0
[   54.101604]  alloc_fdtable+0x7a/0x120
[   54.102907]  expand_files+0x11a/0x310
[   54.103094]  ? do_prlimit+0x120/0x160
[   54.103252]  ksys_dup3+0x75/0xe0
[   54.103536]  __x64_sys_dup2+0x25/0x90
[   54.103829]  x64_sys_call+0x256b/0x2d20
[   54.104346]  do_syscall_64+0x55/0xb0
[   54.105631]  ? exc_page_fault+0x65/0xc0
[   54.106884]  entry_SYSCALL_64_after_hwframe+0x78/0xe2
[   54.107416] RIP: 0033:0x7f7cd11e2c17
[   54.108838] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[   54.109875] RSP: 002b:00007ffeb04e7f08 EFLAGS: 00000202 ORIG_RAX: 0000000000000021
[   54.110179] RAX: ffffffffffffffda RBX: 00007ffeb04e8768 RCX: 00007f7cd11e2c17
[   54.110416] RDX: 00007ffeb04e8088 RSI: 0000000040000038 RDI: 0000000000000002
[   54.111839] RBP: 00007ffeb04e8120 R08: 0000000000000064 R09: 0000000000000000
[   54.112813] R10: 00007f7cd10ff170 R11: 0000000000000202 R12: 0000000000000000
[   54.113580] R13: 00007ffeb04e8778 R14: 00007f7cd1318000 R15: 0000557aacc46cf8
[   54.114931]  </TASK>
[   54.115742] ---[ end trace 0000000000000000 ]---

test log snippet test parser 101

Home

[   46.648369] ==================================================================
[   46.650458] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0xfe/0x1f0
[   46.651302] Read of size 1 at addr ffff888102967cbf by task kunit_try_catch/204
[   46.651841] 
[   46.652185] CPU: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   46.654132] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   46.655274] Call Trace:
[   46.655648]  <TASK>
[   46.656056]  dump_stack_lvl+0x4e/0x90
[   46.656664]  print_report+0xd2/0x660
[   46.657159]  ? __virt_addr_valid+0x156/0x1e0
[   46.658201]  ? kasan_addr_to_slab+0x11/0xb0
[   46.659206]  kasan_report+0xff/0x140
[   46.659768]  ? kasan_alloca_oob_left+0xfe/0x1f0
[   46.660362]  ? kasan_alloca_oob_left+0xfe/0x1f0
[   46.661457]  __asan_load1+0x66/0x70
[   46.662264]  kasan_alloca_oob_left+0xfe/0x1f0
[   46.663065]  ? __pfx_rcu_cpu_stall_reset+0x1/0x10
[   46.663927]  ? trace_event_raw_event_ipi_handler+0xf0/0x130
[   46.664625]  ? __schedule+0x70b/0x1190
[   46.665502]  ? trace_hardirqs_on+0x37/0xd0
[   46.666397]  ? __pfx_kasan_alloca_oob_left+0x10/0x10
[   46.667470]  ? __schedule+0x70b/0x1190
[   46.668058]  ? ktime_get_ts64+0x118/0x140
[   46.668698]  kunit_try_run_case+0x126/0x290
[   46.669331]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.670157]  ? __kasan_check_write+0x18/0x20
[   46.671070]  ? trace_preempt_on+0x20/0xa0
[   46.671974]  ? __kthread_parkme+0x4f/0xd0
[   46.672609]  ? preempt_count_sub+0x50/0x80
[   46.673476]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.674123]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   46.675366]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   46.676003]  kthread+0x19e/0x1e0
[   46.676386]  ? __pfx_kthread+0x10/0x10
[   46.676821]  ret_from_fork+0x41/0x70
[   46.677239]  ? __pfx_kthread+0x10/0x10
[   46.678075]  ret_from_fork_asm+0x1b/0x30
[   46.679979]  </TASK>
[   46.680324] 
[   46.680657] The buggy address belongs to stack of task kunit_try_catch/204
[   46.681667] 
[   46.681816] The buggy address belongs to the physical page:
[   46.682691] page:(____ptrval____) refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102967
[   46.683713] flags: 0x200000000000000(node=0|zone=2)
[   46.684479] page_type: 0xffffffff()
[   46.685405] raw: 0200000000000000 ffffea00040a59c8 ffffea00040a59c8 0000000000000000
[   46.686489] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   46.687622] page dumped because: kasan: bad access detected
[   46.688390] 
[   46.688716] Memory state around the buggy address:
[   46.690723]  ffff888102967b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.691239]  ffff888102967c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.692324] >ffff888102967c80: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   46.693291]                                         ^
[   46.694422]  ffff888102967d00: 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2
[   46.696271]  ffff888102967d80: 00 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 f1
[   46.697536] ==================================================================

test log snippet test parser 102

Home

[   46.707111] ==================================================================
[   46.708810] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x107/0x1f0
[   46.709860] Read of size 1 at addr ffff888102947cca by task kunit_try_catch/206
[   46.710497] 
[   46.711466] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   46.712780] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   46.713899] Call Trace:
[   46.714275]  <TASK>
[   46.714742]  dump_stack_lvl+0x4e/0x90
[   46.715341]  print_report+0xd2/0x660
[   46.715867]  ? __virt_addr_valid+0x156/0x1e0
[   46.716459]  ? kasan_addr_to_slab+0x11/0xb0
[   46.717217]  kasan_report+0xff/0x140
[   46.718068]  ? kasan_alloca_oob_right+0x107/0x1f0
[   46.719150]  ? kasan_alloca_oob_right+0x107/0x1f0
[   46.719995]  __asan_load1+0x66/0x70
[   46.720495]  kasan_alloca_oob_right+0x107/0x1f0
[   46.722090]  ? __pfx_rcu_cpu_stall_reset+0x1/0x10
[   46.722421]  ? trace_event_raw_event_ipi_handler+0xf0/0x130
[   46.723410]  ? __schedule+0x70b/0x1190
[   46.724325]  ? trace_hardirqs_on+0x37/0xd0
[   46.725564]  ? __pfx_kasan_alloca_oob_right+0x10/0x10
[   46.726437]  ? __schedule+0x70b/0x1190
[   46.727157]  ? ktime_get_ts64+0x118/0x140
[   46.727763]  kunit_try_run_case+0x126/0x290
[   46.728595]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.729730]  ? __kasan_check_write+0x18/0x20
[   46.730452]  ? trace_preempt_on+0x20/0xa0
[   46.731333]  ? __kthread_parkme+0x4f/0xd0
[   46.732087]  ? preempt_count_sub+0x50/0x80
[   46.732704]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.733879]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   46.734693]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   46.735487]  kthread+0x19e/0x1e0
[   46.736028]  ? __pfx_kthread+0x10/0x10
[   46.737462]  ret_from_fork+0x41/0x70
[   46.738294]  ? __pfx_kthread+0x10/0x10
[   46.738918]  ret_from_fork_asm+0x1b/0x30
[   46.739382]  </TASK>
[   46.739728] 
[   46.740227] The buggy address belongs to stack of task kunit_try_catch/206
[   46.741503] 
[   46.741735] The buggy address belongs to the physical page:
[   46.742837] page:(____ptrval____) refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102947
[   46.744153] flags: 0x200000000000000(node=0|zone=2)
[   46.744809] page_type: 0xffffffff()
[   46.745491] raw: 0200000000000000 ffffea00040a51c8 ffffea00040a51c8 0000000000000000
[   46.747100] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   46.748101] page dumped because: kasan: bad access detected
[   46.749196] 
[   46.749659] Memory state around the buggy address:
[   46.750772]  ffff888102947b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.751619]  ffff888102947c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.752889] >ffff888102947c80: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   46.754443]                                               ^
[   46.755334]  ffff888102947d00: 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2
[   46.756449]  ffff888102947d80: 00 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 f1
[   46.757294] ==================================================================

test log snippet test parser 103

Home

[   49.223463] ==================================================================
[   49.224412] BUG: KASAN: double-free in kfree+0x7c/0x120
[   49.225147] Free of addr ffff8881025b8a80 by task kunit_try_catch/228
[   49.226342] 
[   49.226611] CPU: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   49.227757] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   49.228746] Call Trace:
[   49.229212]  <TASK>
[   49.229751]  dump_stack_lvl+0x4e/0x90
[   49.230587]  print_report+0xd2/0x660
[   49.231213]  ? __virt_addr_valid+0x156/0x1e0
[   49.231938]  ? kfree+0x7c/0x120
[   49.232829]  ? kasan_complete_mode_report_info+0x64/0x200
[   49.233652]  ? kfree+0x7c/0x120
[   49.234281]  kasan_report_invalid_free+0xcf/0x100
[   49.235111]  ? kfree+0x7c/0x120
[   49.235706]  ? kfree+0x7c/0x120
[   49.236118]  ____kasan_slab_free+0x19c/0x1d0
[   49.236558]  ? kfree_sensitive+0x2e/0x90
[   49.237368]  __kasan_slab_free+0x16/0x20
[   49.238172]  __kmem_cache_free+0x190/0x310
[   49.239086]  kfree+0x7c/0x120
[   49.239502]  kfree_sensitive+0x2e/0x90
[   49.240308]  kmalloc_double_kzfree+0xd4/0x1d0
[   49.241781]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   49.243082]  ? __schedule+0x70b/0x1190
[   49.243928]  ? ktime_get_ts64+0x118/0x140
[   49.244792]  kunit_try_run_case+0x126/0x290
[   49.245692]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.247064]  ? __kasan_check_write+0x18/0x20
[   49.248240]  ? trace_preempt_on+0x20/0xa0
[   49.249307]  ? __kthread_parkme+0x4f/0xd0
[   49.249682]  ? preempt_count_sub+0x50/0x80
[   49.250097]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.251555]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.252683]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.254334]  kthread+0x19e/0x1e0
[   49.255253]  ? __pfx_kthread+0x10/0x10
[   49.256131]  ret_from_fork+0x41/0x70
[   49.256685]  ? __pfx_kthread+0x10/0x10
[   49.257891]  ret_from_fork_asm+0x1b/0x30
[   49.258606]  </TASK>
[   49.259174] 
[   49.259501] Allocated by task 228:
[   49.260465]  kasan_save_stack+0x3c/0x60
[   49.261348]  kasan_set_track+0x29/0x40
[   49.262276]  kasan_save_alloc_info+0x22/0x30
[   49.263486]  __kasan_kmalloc+0xb7/0xc0
[   49.264563]  kmalloc_trace+0x4c/0xb0
[   49.265512]  kmalloc_double_kzfree+0x9d/0x1d0
[   49.266619]  kunit_try_run_case+0x126/0x290
[   49.267421]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.268333]  kthread+0x19e/0x1e0
[   49.269083]  ret_from_fork+0x41/0x70
[   49.269881]  ret_from_fork_asm+0x1b/0x30
[   49.270820] 
[   49.271083] Freed by task 228:
[   49.272079]  kasan_save_stack+0x3c/0x60
[   49.272621]  kasan_set_track+0x29/0x40
[   49.273241]  kasan_save_free_info+0x2f/0x50
[   49.274032]  ____kasan_slab_free+0x172/0x1d0
[   49.274730]  __kasan_slab_free+0x16/0x20
[   49.275449]  __kmem_cache_free+0x190/0x310
[   49.276214]  kfree+0x7c/0x120
[   49.276739]  kfree_sensitive+0x67/0x90
[   49.277280]  kmalloc_double_kzfree+0xbd/0x1d0
[   49.278557]  kunit_try_run_case+0x126/0x290
[   49.279423]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.280798]  kthread+0x19e/0x1e0
[   49.281597]  ret_from_fork+0x41/0x70
[   49.282355]  ret_from_fork_asm+0x1b/0x30
[   49.283599] 
[   49.284233] The buggy address belongs to the object at ffff8881025b8a80
[   49.284233]  which belongs to the cache kmalloc-16 of size 16
[   49.286472] The buggy address is located 0 bytes inside of
[   49.286472]  16-byte region [ffff8881025b8a80, ffff8881025b8a90)
[   49.287598] 
[   49.288432] The buggy address belongs to the physical page:
[   49.289647] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025b8
[   49.290929] flags: 0x200000000000800(slab|node=0|zone=2)
[   49.291588] page_type: 0xffffffff()
[   49.292049] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   49.294373] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   49.295597] page dumped because: kasan: bad access detected
[   49.296478] 
[   49.297002] Memory state around the buggy address:
[   49.297555]  ffff8881025b8980: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   49.299009]  ffff8881025b8a00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   49.300310] >ffff8881025b8a80: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.301768]                    ^
[   49.302473]  ffff8881025b8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.303640]  ffff8881025b8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.304709] ==================================================================

test log snippet test parser 104

Home

[   47.164025] ==================================================================
[   47.165620] BUG: KASAN: double-free in kmem_cache_double_free+0xeb/0x250
[   47.166624] Free of addr ffff8881029e8000 by task kunit_try_catch/212
[   47.167510] 
[   47.167929] CPU: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   47.169006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.170224] Call Trace:
[   47.170712]  <TASK>
[   47.171144]  dump_stack_lvl+0x4e/0x90
[   47.171902]  print_report+0xd2/0x660
[   47.172479]  ? __virt_addr_valid+0x156/0x1e0
[   47.173315]  ? kmem_cache_double_free+0xeb/0x250
[   47.174052]  ? kasan_complete_mode_report_info+0x64/0x200
[   47.174932]  ? kmem_cache_double_free+0xeb/0x250
[   47.175639]  kasan_report_invalid_free+0xcf/0x100
[   47.176397]  ? kmem_cache_double_free+0xeb/0x250
[   47.177178]  ? kmem_cache_double_free+0xeb/0x250
[   47.177830]  ____kasan_slab_free+0x19c/0x1d0
[   47.178382]  ? kmem_cache_double_free+0xeb/0x250
[   47.179051]  __kasan_slab_free+0x16/0x20
[   47.179746]  kmem_cache_free+0x1a7/0x4b0
[   47.180547]  kmem_cache_double_free+0xeb/0x250
[   47.181363]  ? __pfx_kmem_cache_double_free+0x10/0x10
[   47.182131]  ? __schedule+0x70b/0x1190
[   47.182695]  ? ktime_get_ts64+0x118/0x140
[   47.183415]  kunit_try_run_case+0x126/0x290
[   47.184094]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.184748]  ? __kasan_check_write+0x18/0x20
[   47.185420]  ? trace_preempt_on+0x20/0xa0
[   47.186093]  ? __kthread_parkme+0x4f/0xd0
[   47.186655]  ? preempt_count_sub+0x50/0x80
[   47.187274]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.188106]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.189064]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.189969]  kthread+0x19e/0x1e0
[   47.190516]  ? __pfx_kthread+0x10/0x10
[   47.191240]  ret_from_fork+0x41/0x70
[   47.191957]  ? __pfx_kthread+0x10/0x10
[   47.192575]  ret_from_fork_asm+0x1b/0x30
[   47.193318]  </TASK>
[   47.193918] 
[   47.194247] Allocated by task 212:
[   47.194796]  kasan_save_stack+0x3c/0x60
[   47.195573]  kasan_set_track+0x29/0x40
[   47.196224]  kasan_save_alloc_info+0x22/0x30
[   47.196914]  __kasan_slab_alloc+0x91/0xa0
[   47.197660]  kmem_cache_alloc+0x180/0x3b0
[   47.198349]  kmem_cache_double_free+0xba/0x250
[   47.199051]  kunit_try_run_case+0x126/0x290
[   47.199756]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.200495]  kthread+0x19e/0x1e0
[   47.201224]  ret_from_fork+0x41/0x70
[   47.201761]  ret_from_fork_asm+0x1b/0x30
[   47.202790] 
[   47.203014] Freed by task 212:
[   47.203775]  kasan_save_stack+0x3c/0x60
[   47.204469]  kasan_set_track+0x29/0x40
[   47.204941]  kasan_save_free_info+0x2f/0x50
[   47.205601]  ____kasan_slab_free+0x172/0x1d0
[   47.206484]  __kasan_slab_free+0x16/0x20
[   47.207325]  kmem_cache_free+0x1a7/0x4b0
[   47.208239]  kmem_cache_double_free+0xd1/0x250
[   47.209069]  kunit_try_run_case+0x126/0x290
[   47.209726]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.210491]  kthread+0x19e/0x1e0
[   47.210969]  ret_from_fork+0x41/0x70
[   47.211625]  ret_from_fork_asm+0x1b/0x30
[   47.212256] 
[   47.212818] The buggy address belongs to the object at ffff8881029e8000
[   47.212818]  which belongs to the cache test_cache of size 200
[   47.214653] The buggy address is located 0 bytes inside of
[   47.214653]  200-byte region [ffff8881029e8000, ffff8881029e80c8)
[   47.216131] 
[   47.216415] The buggy address belongs to the physical page:
[   47.217159] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e8
[   47.218378] flags: 0x200000000000800(slab|node=0|zone=2)
[   47.219099] page_type: 0xffffffff()
[   47.219658] raw: 0200000000000800 ffff88810199d500 dead000000000122 0000000000000000
[   47.220665] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   47.221627] page dumped because: kasan: bad access detected
[   47.222327] 
[   47.222725] Memory state around the buggy address:
[   47.223330]  ffff8881029e7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.224368]  ffff8881029e7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.225278] >ffff8881029e8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.226231]                    ^
[   47.226749]  ffff8881029e8080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   47.227588]  ffff8881029e8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.228451] ==================================================================

test log snippet test parser 105

Home

[   46.515126] ==================================================================
[   46.516964] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0xa3/0x170
[   46.519490] Read of size 1 at addr ffffffff945a96ed by task kunit_try_catch/198
[   46.520329] 
[   46.520725] CPU: 1 PID: 198 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   46.522210] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   46.523333] Call Trace:
[   46.523731]  <TASK>
[   46.524059]  dump_stack_lvl+0x4e/0x90
[   46.525305]  print_report+0xd2/0x660
[   46.526084]  ? __virt_addr_valid+0x156/0x1e0
[   46.527136]  ? kasan_addr_to_slab+0x11/0xb0
[   46.527937]  kasan_report+0xff/0x140
[   46.528655]  ? kasan_global_oob_right+0xa3/0x170
[   46.530348]  ? kasan_global_oob_right+0xa3/0x170
[   46.531012]  __asan_load1+0x66/0x70
[   46.531481]  kasan_global_oob_right+0xa3/0x170
[   46.532818]  ? __pfx_kasan_global_oob_right+0x10/0x10
[   46.533725]  ? ktime_get_ts64+0x118/0x140
[   46.534851]  kunit_try_run_case+0x126/0x290
[   46.535424]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.536028]  ? __kasan_check_write+0x18/0x20
[   46.536634]  ? trace_preempt_on+0x20/0xa0
[   46.537211]  ? __kthread_parkme+0x4f/0xd0
[   46.538246]  ? preempt_count_sub+0x50/0x80
[   46.539420]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.540202]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   46.541234]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   46.542153]  kthread+0x19e/0x1e0
[   46.543363]  ? __pfx_kthread+0x10/0x10
[   46.544594]  ret_from_fork+0x41/0x70
[   46.546067]  ? __pfx_kthread+0x10/0x10
[   46.547193]  ret_from_fork_asm+0x1b/0x30
[   46.548152]  </TASK>
[   46.548468] 
[   46.548848] The buggy address belongs to the variable:
[   46.550042]  global_array+0xd/0x40
[   46.550569] 
[   46.551271] The buggy address belongs to the physical page:
[   46.552350] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1441a9
[   46.553579] flags: 0x200000000004000(reserved|node=0|zone=2)
[   46.555013] page_type: 0xffffffff()
[   46.555740] raw: 0200000000004000 ffffea0005106a48 ffffea0005106a48 0000000000000000
[   46.556930] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   46.558470] page dumped because: kasan: bad access detected
[   46.559437] 
[   46.559819] Memory state around the buggy address:
[   46.560793]  ffffffff945a9580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.561845]  ffffffff945a9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.562662] >ffffffff945a9680: 00 00 00 00 00 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9
[   46.563983]                                                           ^
[   46.565041]  ffffffff945a9700: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9
[   46.566066]  ffffffff945a9780: f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[   46.567118] ==================================================================

test log snippet test parser 106

Home

[   43.819833] ==================================================================
[   43.821795] BUG: KASAN: invalid-free in kfree+0xfb/0x120
[   43.822718] Free of addr ffff8881026b8001 by task kunit_try_catch/144
[   43.823401] 
[   43.823809] CPU: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   43.825011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   43.826135] Call Trace:
[   43.826553]  <TASK>
[   43.827066]  dump_stack_lvl+0x4e/0x90
[   43.827663]  print_report+0xd2/0x660
[   43.828399]  ? __virt_addr_valid+0x156/0x1e0
[   43.829145]  ? kfree+0xfb/0x120
[   43.829736]  ? kasan_addr_to_slab+0x11/0xb0
[   43.830437]  ? kfree+0xfb/0x120
[   43.831056]  kasan_report_invalid_free+0xcf/0x100
[   43.831697]  ? kfree+0xfb/0x120
[   43.832378]  ? kfree+0xfb/0x120
[   43.832972]  __kasan_kfree_large+0x86/0xd0
[   43.833516]  free_large_kmalloc+0x46/0xd0
[   43.834298]  kfree+0xfb/0x120
[   43.834950]  kmalloc_pagealloc_invalid_free+0xa9/0x1a0
[   43.835658]  ? __pfx_kmalloc_pagealloc_invalid_free+0x10/0x10
[   43.836451]  ? __schedule+0x70b/0x1190
[   43.837108]  ? ktime_get_ts64+0x118/0x140
[   43.837799]  kunit_try_run_case+0x126/0x290
[   43.838501]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.839294]  ? __kasan_check_write+0x18/0x20
[   43.839994]  ? trace_preempt_on+0x20/0xa0
[   43.840598]  ? __kthread_parkme+0x4f/0xd0
[   43.841198]  ? preempt_count_sub+0x50/0x80
[   43.841955]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.842667]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   43.843503]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   43.844351]  kthread+0x19e/0x1e0
[   43.844952]  ? __pfx_kthread+0x10/0x10
[   43.845560]  ret_from_fork+0x41/0x70
[   43.846236]  ? __pfx_kthread+0x10/0x10
[   43.846911]  ret_from_fork_asm+0x1b/0x30
[   43.847553]  </TASK>
[   43.847956] 
[   43.848297] The buggy address belongs to the physical page:
[   43.849130] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026b8
[   43.850336] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   43.851317] flags: 0x200000000000040(head|node=0|zone=2)
[   43.852037] page_type: 0xffffffff()
[   43.852469] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   43.853495] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   43.854327] page dumped because: kasan: bad access detected
[   43.854976] 
[   43.855232] Memory state around the buggy address:
[   43.855838]  ffff8881026b7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.856933]  ffff8881026b7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.857791] >ffff8881026b8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   43.858709]                    ^
[   43.859203]  ffff8881026b8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   43.860163]  ffff8881026b8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   43.861160] ==================================================================

test log snippet test parser 107

Home

[   47.247046] ==================================================================
[   47.249496] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xe4/0x260
[   47.250510] Free of addr ffff888102a1d001 by task kunit_try_catch/214
[   47.252022] 
[   47.252552] CPU: 1 PID: 214 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   47.254165] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.255030] Call Trace:
[   47.255547]  <TASK>
[   47.256302]  dump_stack_lvl+0x4e/0x90
[   47.257026]  print_report+0xd2/0x660
[   47.258037]  ? __virt_addr_valid+0x156/0x1e0
[   47.258640]  ? kmem_cache_invalid_free+0xe4/0x260
[   47.259238]  ? kasan_complete_mode_report_info+0x2a/0x200
[   47.259974]  ? kmem_cache_invalid_free+0xe4/0x260
[   47.261121]  kasan_report_invalid_free+0xcf/0x100
[   47.261884]  ? kmem_cache_invalid_free+0xe4/0x260
[   47.263064]  ? kmem_cache_invalid_free+0xe4/0x260
[   47.263737]  ____kasan_slab_free+0x1c0/0x1d0
[   47.265085]  ? kmem_cache_invalid_free+0xe4/0x260
[   47.265687]  __kasan_slab_free+0x16/0x20
[   47.266870]  kmem_cache_free+0x1a7/0x4b0
[   47.267602]  kmem_cache_invalid_free+0xe4/0x260
[   47.268413]  ? __pfx_kmem_cache_invalid_free+0x10/0x10
[   47.269216]  ? __schedule+0x70b/0x1190
[   47.269835]  ? ktime_get_ts64+0x118/0x140
[   47.270909]  kunit_try_run_case+0x126/0x290
[   47.271680]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.272254]  ? __kasan_check_write+0x18/0x20
[   47.272831]  ? trace_preempt_on+0x20/0xa0
[   47.273356]  ? __kthread_parkme+0x4f/0xd0
[   47.274516]  ? preempt_count_sub+0x50/0x80
[   47.275429]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.276319]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.277352]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.278227]  kthread+0x19e/0x1e0
[   47.279172]  ? __pfx_kthread+0x10/0x10
[   47.280209]  ret_from_fork+0x41/0x70
[   47.280835]  ? __pfx_kthread+0x10/0x10
[   47.281391]  ret_from_fork_asm+0x1b/0x30
[   47.282402]  </TASK>
[   47.283116] 
[   47.283599] Allocated by task 214:
[   47.284069]  kasan_save_stack+0x3c/0x60
[   47.284942]  kasan_set_track+0x29/0x40
[   47.285472]  kasan_save_alloc_info+0x22/0x30
[   47.286584]  __kasan_slab_alloc+0x91/0xa0
[   47.287432]  kmem_cache_alloc+0x180/0x3b0
[   47.288311]  kmem_cache_invalid_free+0xbd/0x260
[   47.289249]  kunit_try_run_case+0x126/0x290
[   47.290160]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.291005]  kthread+0x19e/0x1e0
[   47.292171]  ret_from_fork+0x41/0x70
[   47.292873]  ret_from_fork_asm+0x1b/0x30
[   47.293831] 
[   47.294129] The buggy address belongs to the object at ffff888102a1d000
[   47.294129]  which belongs to the cache test_cache of size 200
[   47.295901] The buggy address is located 1 bytes inside of
[   47.295901]  200-byte region [ffff888102a1d000, ffff888102a1d0c8)
[   47.297450] 
[   47.297858] The buggy address belongs to the physical page:
[   47.298797] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1d
[   47.300212] flags: 0x200000000000800(slab|node=0|zone=2)
[   47.301061] page_type: 0xffffffff()
[   47.301569] raw: 0200000000000800 ffff88815af08000 dead000000000122 0000000000000000
[   47.302829] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   47.304323] page dumped because: kasan: bad access detected
[   47.305457] 
[   47.305912] Memory state around the buggy address:
[   47.306474]  ffff888102a1cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.307632]  ffff888102a1cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.309291] >ffff888102a1d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.310034]                    ^
[   47.310482]  ffff888102a1d080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   47.311247]  ffff888102a1d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.312254] ==================================================================

test log snippet test parser 108

Home

[   45.494467] ==================================================================
[   45.496017] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0xeb/0x1f0
[   45.496847] Read of size 18446744073709551614 at addr ffff888102422c04 by task kunit_try_catch/176
[   45.498549] 
[   45.499048] CPU: 1 PID: 176 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   45.499961] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.501150] Call Trace:
[   45.501918]  <TASK>
[   45.502282]  dump_stack_lvl+0x4e/0x90
[   45.502848]  print_report+0xd2/0x660
[   45.503352]  ? __virt_addr_valid+0x156/0x1e0
[   45.504028]  ? kasan_complete_mode_report_info+0x2a/0x200
[   45.504754]  kasan_report+0xff/0x140
[   45.505348]  ? kmalloc_memmove_negative_size+0xeb/0x1f0
[   45.506094]  ? kmalloc_memmove_negative_size+0xeb/0x1f0
[   45.506939]  kasan_check_range+0x10c/0x1c0
[   45.507538]  __asan_memmove+0x27/0x70
[   45.508232]  kmalloc_memmove_negative_size+0xeb/0x1f0
[   45.508933]  ? __pfx_kmalloc_memmove_negative_size+0x10/0x10
[   45.509637]  ? __schedule+0x70b/0x1190
[   45.510272]  ? ktime_get_ts64+0x118/0x140
[   45.511031]  kunit_try_run_case+0x126/0x290
[   45.511576]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.512279]  ? __kasan_check_write+0x18/0x20
[   45.512964]  ? trace_preempt_on+0x20/0xa0
[   45.513678]  ? __kthread_parkme+0x4f/0xd0
[   45.514228]  ? preempt_count_sub+0x50/0x80
[   45.514929]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.515660]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   45.516425]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.517238]  kthread+0x19e/0x1e0
[   45.517738]  ? __pfx_kthread+0x10/0x10
[   45.518373]  ret_from_fork+0x41/0x70
[   45.518985]  ? __pfx_kthread+0x10/0x10
[   45.519607]  ret_from_fork_asm+0x1b/0x30
[   45.520279]  </TASK>
[   45.521457] 
[   45.521947] Allocated by task 176:
[   45.522394]  kasan_save_stack+0x3c/0x60
[   45.522926]  kasan_set_track+0x29/0x40
[   45.523414]  kasan_save_alloc_info+0x22/0x30
[   45.524169]  __kasan_kmalloc+0xb7/0xc0
[   45.524650]  kmalloc_trace+0x4c/0xb0
[   45.525322]  kmalloc_memmove_negative_size+0x9f/0x1f0
[   45.526073]  kunit_try_run_case+0x126/0x290
[   45.526675]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.527418]  kthread+0x19e/0x1e0
[   45.528050]  ret_from_fork+0x41/0x70
[   45.528548]  ret_from_fork_asm+0x1b/0x30
[   45.529239] 
[   45.529477] The buggy address belongs to the object at ffff888102422c00
[   45.529477]  which belongs to the cache kmalloc-64 of size 64
[   45.530829] The buggy address is located 4 bytes inside of
[   45.530829]  64-byte region [ffff888102422c00, ffff888102422c40)
[   45.532070] 
[   45.532405] The buggy address belongs to the physical page:
[   45.533107] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102422
[   45.534178] flags: 0x200000000000800(slab|node=0|zone=2)
[   45.535018] page_type: 0xffffffff()
[   45.535558] raw: 0200000000000800 ffff888100041640 dead000000000122 0000000000000000
[   45.536332] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[   45.537297] page dumped because: kasan: bad access detected
[   45.537893] 
[   45.538199] Memory state around the buggy address:
[   45.538705]  ffff888102422b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.539602]  ffff888102422b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.540361] >ffff888102422c00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   45.541119]                    ^
[   45.541591]  ffff888102422c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.542432]  ffff888102422d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.543285] ==================================================================

test log snippet test parser 109

Home

[   48.109894] ==================================================================
[   48.110849] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x11c/0x5e0
[   48.112041] Write of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[   48.112832] 
[   48.113262] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   48.114559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.116305] Call Trace:
[   48.116705]  <TASK>
[   48.117172]  dump_stack_lvl+0x4e/0x90
[   48.118489]  print_report+0xd2/0x660
[   48.119154]  ? __virt_addr_valid+0x156/0x1e0
[   48.119875]  ? kasan_complete_mode_report_info+0x2a/0x200
[   48.120656]  kasan_report+0xff/0x140
[   48.121393]  ? kasan_bitops_modify.constprop.0+0x11c/0x5e0
[   48.122211]  ? kasan_bitops_modify.constprop.0+0x11c/0x5e0
[   48.123336]  kasan_check_range+0x10c/0x1c0
[   48.124063]  __kasan_check_write+0x18/0x20
[   48.124558]  kasan_bitops_modify.constprop.0+0x11c/0x5e0
[   48.125265]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   48.126433]  ? kasan_save_alloc_info+0x22/0x30
[   48.127081]  ? kasan_set_track+0x29/0x40
[   48.127864]  ? kasan_set_track+0x29/0x40
[   48.128569]  kasan_bitops_generic+0xa9/0x130
[   48.129313]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   48.130142]  ? ktime_get_ts64+0x118/0x140
[   48.131015]  kunit_try_run_case+0x126/0x290
[   48.132267]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.133378]  ? __kasan_check_write+0x18/0x20
[   48.134464]  ? trace_preempt_on+0x20/0xa0
[   48.135646]  ? __kthread_parkme+0x4f/0xd0
[   48.136815]  ? preempt_count_sub+0x50/0x80
[   48.137880]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.138979]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.139799]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.140451]  kthread+0x19e/0x1e0
[   48.141448]  ? __pfx_kthread+0x10/0x10
[   48.142428]  ret_from_fork+0x41/0x70
[   48.143355]  ? __pfx_kthread+0x10/0x10
[   48.143937]  ret_from_fork_asm+0x1b/0x30
[   48.145019]  </TASK>
[   48.145487] 
[   48.145955] Allocated by task 224:
[   48.147206]  kasan_save_stack+0x3c/0x60
[   48.148143]  kasan_set_track+0x29/0x40
[   48.148913]  kasan_save_alloc_info+0x22/0x30
[   48.149505]  __kasan_kmalloc+0xb7/0xc0
[   48.150064]  kmalloc_trace+0x4c/0xb0
[   48.150909]  kasan_bitops_generic+0x8e/0x130
[   48.151589]  kunit_try_run_case+0x126/0x290
[   48.152820]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.153487]  kthread+0x19e/0x1e0
[   48.153992]  ret_from_fork+0x41/0x70
[   48.154564]  ret_from_fork_asm+0x1b/0x30
[   48.155322] 
[   48.155633] The buggy address belongs to the object at ffff8881023f99a0
[   48.155633]  which belongs to the cache kmalloc-16 of size 16
[   48.157653] The buggy address is located 8 bytes inside of
[   48.157653]  allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[   48.159026] 
[   48.159432] The buggy address belongs to the physical page:
[   48.161668] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[   48.162895] flags: 0x200000000000800(slab|node=0|zone=2)
[   48.163380] page_type: 0xffffffff()
[   48.163806] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   48.164415] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.165033] page dumped because: kasan: bad access detected
[   48.166647] 
[   48.167029] Memory state around the buggy address:
[   48.168410]  ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.169730]  ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.171092] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   48.172264]                                   ^
[   48.172827]  ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.174055]  ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.175467] ==================================================================
---
[   48.177414] ==================================================================
[   48.179339] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x15a/0x5e0
[   48.181424] Write of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[   48.183368] 
[   48.183937] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   48.185031] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.185930] Call Trace:
[   48.186413]  <TASK>
[   48.187280]  dump_stack_lvl+0x4e/0x90
[   48.188021]  print_report+0xd2/0x660
[   48.188540]  ? __virt_addr_valid+0x156/0x1e0
[   48.189400]  ? kasan_complete_mode_report_info+0x2a/0x200
[   48.190182]  kasan_report+0xff/0x140
[   48.190704]  ? kasan_bitops_modify.constprop.0+0x15a/0x5e0
[   48.191438]  ? kasan_bitops_modify.constprop.0+0x15a/0x5e0
[   48.192495]  kasan_check_range+0x10c/0x1c0
[   48.193359]  __kasan_check_write+0x18/0x20
[   48.194210]  kasan_bitops_modify.constprop.0+0x15a/0x5e0
[   48.195144]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   48.196111]  ? kasan_save_alloc_info+0x22/0x30
[   48.196909]  ? kasan_set_track+0x29/0x40
[   48.197458]  ? kasan_set_track+0x29/0x40
[   48.198099]  kasan_bitops_generic+0xa9/0x130
[   48.199065]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   48.199826]  ? ktime_get_ts64+0x118/0x140
[   48.200674]  kunit_try_run_case+0x126/0x290
[   48.201693]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.202463]  ? __kasan_check_write+0x18/0x20
[   48.202936]  ? trace_preempt_on+0x20/0xa0
[   48.203346]  ? __kthread_parkme+0x4f/0xd0
[   48.203786]  ? preempt_count_sub+0x50/0x80
[   48.204222]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.205003]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.206226]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.207344]  kthread+0x19e/0x1e0
[   48.208729]  ? __pfx_kthread+0x10/0x10
[   48.209637]  ret_from_fork+0x41/0x70
[   48.210266]  ? __pfx_kthread+0x10/0x10
[   48.210902]  ret_from_fork_asm+0x1b/0x30
[   48.211571]  </TASK>
[   48.211906] 
[   48.212321] Allocated by task 224:
[   48.214169]  kasan_save_stack+0x3c/0x60
[   48.214780]  kasan_set_track+0x29/0x40
[   48.215678]  kasan_save_alloc_info+0x22/0x30
[   48.216479]  __kasan_kmalloc+0xb7/0xc0
[   48.217274]  kmalloc_trace+0x4c/0xb0
[   48.217724]  kasan_bitops_generic+0x8e/0x130
[   48.218987]  kunit_try_run_case+0x126/0x290
[   48.219513]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.220171]  kthread+0x19e/0x1e0
[   48.220640]  ret_from_fork+0x41/0x70
[   48.221109]  ret_from_fork_asm+0x1b/0x30
[   48.222320] 
[   48.222705] The buggy address belongs to the object at ffff8881023f99a0
[   48.222705]  which belongs to the cache kmalloc-16 of size 16
[   48.224724] The buggy address is located 8 bytes inside of
[   48.224724]  allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[   48.226112] 
[   48.226340] The buggy address belongs to the physical page:
[   48.228117] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[   48.229264] flags: 0x200000000000800(slab|node=0|zone=2)
[   48.229839] page_type: 0xffffffff()
[   48.230180] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   48.231403] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.232625] page dumped because: kasan: bad access detected
[   48.233089] 
[   48.233417] Memory state around the buggy address:
[   48.234429]  ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.235633]  ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.237153] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   48.238428]                                   ^
[   48.239488]  ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.240130]  ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.242351] ==================================================================
---
[   47.990841] ==================================================================
[   47.992189] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x9c/0x5e0
[   47.993364] Write of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[   47.994102] 
[   47.994688] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   47.995831] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.996857] Call Trace:
[   47.997377]  <TASK>
[   47.997833]  dump_stack_lvl+0x4e/0x90
[   47.998488]  print_report+0xd2/0x660
[   47.999622]  ? __virt_addr_valid+0x156/0x1e0
[   48.000344]  ? kasan_complete_mode_report_info+0x2a/0x200
[   48.001185]  kasan_report+0xff/0x140
[   48.001732]  ? kasan_bitops_modify.constprop.0+0x9c/0x5e0
[   48.002489]  ? kasan_bitops_modify.constprop.0+0x9c/0x5e0
[   48.003135]  kasan_check_range+0x10c/0x1c0
[   48.003846]  __kasan_check_write+0x18/0x20
[   48.004506]  kasan_bitops_modify.constprop.0+0x9c/0x5e0
[   48.005392]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   48.006210]  ? kasan_save_alloc_info+0x22/0x30
[   48.006955]  ? kasan_set_track+0x29/0x40
[   48.007740]  ? kasan_set_track+0x29/0x40
[   48.008402]  kasan_bitops_generic+0xa9/0x130
[   48.008859]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   48.009649]  ? ktime_get_ts64+0x118/0x140
[   48.010279]  kunit_try_run_case+0x126/0x290
[   48.010859]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.011714]  ? __kasan_check_write+0x18/0x20
[   48.012509]  ? trace_preempt_on+0x20/0xa0
[   48.013032]  ? __kthread_parkme+0x4f/0xd0
[   48.013801]  ? preempt_count_sub+0x50/0x80
[   48.014442]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.015171]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.015987]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.017028]  kthread+0x19e/0x1e0
[   48.017614]  ? __pfx_kthread+0x10/0x10
[   48.018176]  ret_from_fork+0x41/0x70
[   48.019212]  ? __pfx_kthread+0x10/0x10
[   48.020315]  ret_from_fork_asm+0x1b/0x30
[   48.020807]  </TASK>
[   48.021225] 
[   48.021483] Allocated by task 224:
[   48.022121]  kasan_save_stack+0x3c/0x60
[   48.022686]  kasan_set_track+0x29/0x40
[   48.023232]  kasan_save_alloc_info+0x22/0x30
[   48.023958]  __kasan_kmalloc+0xb7/0xc0
[   48.024645]  kmalloc_trace+0x4c/0xb0
[   48.025306]  kasan_bitops_generic+0x8e/0x130
[   48.026102]  kunit_try_run_case+0x126/0x290
[   48.026812]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.027591]  kthread+0x19e/0x1e0
[   48.028212]  ret_from_fork+0x41/0x70
[   48.028792]  ret_from_fork_asm+0x1b/0x30
[   48.029362] 
[   48.029745] The buggy address belongs to the object at ffff8881023f99a0
[   48.029745]  which belongs to the cache kmalloc-16 of size 16
[   48.031281] The buggy address is located 8 bytes inside of
[   48.031281]  allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[   48.032919] 
[   48.033261] The buggy address belongs to the physical page:
[   48.033990] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[   48.035165] flags: 0x200000000000800(slab|node=0|zone=2)
[   48.035924] page_type: 0xffffffff()
[   48.036407] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   48.037447] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.038341] page dumped because: kasan: bad access detected
[   48.039005] 
[   48.039195] Memory state around the buggy address:
[   48.039989]  ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.041029]  ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.041901] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   48.042786]                                   ^
[   48.043403]  ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.044301]  ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.045187] ==================================================================
---
[   48.243589] ==================================================================
[   48.244377] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0x5e0
[   48.246686] Write of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[   48.248053] 
[   48.249044] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   48.250514] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.251333] Call Trace:
[   48.251790]  <TASK>
[   48.252120]  dump_stack_lvl+0x4e/0x90
[   48.252738]  print_report+0xd2/0x660
[   48.253340]  ? __virt_addr_valid+0x156/0x1e0
[   48.254670]  ? kasan_complete_mode_report_info+0x2a/0x200
[   48.255377]  kasan_report+0xff/0x140
[   48.256044]  ? kasan_bitops_modify.constprop.0+0x19c/0x5e0
[   48.256737]  ? kasan_bitops_modify.constprop.0+0x19c/0x5e0
[   48.257455]  kasan_check_range+0x10c/0x1c0
[   48.258211]  __kasan_check_write+0x18/0x20
[   48.258804]  kasan_bitops_modify.constprop.0+0x19c/0x5e0
[   48.259560]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   48.260418]  ? kasan_save_alloc_info+0x22/0x30
[   48.261205]  ? kasan_set_track+0x29/0x40
[   48.261922]  ? kasan_set_track+0x29/0x40
[   48.262598]  kasan_bitops_generic+0xa9/0x130
[   48.263424]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   48.264377]  ? ktime_get_ts64+0x118/0x140
[   48.264955]  kunit_try_run_case+0x126/0x290
[   48.265724]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.266332]  ? __kasan_check_write+0x18/0x20
[   48.267086]  ? trace_preempt_on+0x20/0xa0
[   48.267630]  ? __kthread_parkme+0x4f/0xd0
[   48.268249]  ? preempt_count_sub+0x50/0x80
[   48.269040]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.269757]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.270736]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.271546]  kthread+0x19e/0x1e0
[   48.272238]  ? __pfx_kthread+0x10/0x10
[   48.272907]  ret_from_fork+0x41/0x70
[   48.273403]  ? __pfx_kthread+0x10/0x10
[   48.274120]  ret_from_fork_asm+0x1b/0x30
[   48.274778]  </TASK>
[   48.275128] 
[   48.275395] Allocated by task 224:
[   48.275962]  kasan_save_stack+0x3c/0x60
[   48.276632]  kasan_set_track+0x29/0x40
[   48.277089]  kasan_save_alloc_info+0x22/0x30
[   48.277840]  __kasan_kmalloc+0xb7/0xc0
[   48.278360]  kmalloc_trace+0x4c/0xb0
[   48.279166]  kasan_bitops_generic+0x8e/0x130
[   48.279759]  kunit_try_run_case+0x126/0x290
[   48.280424]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.281947]  kthread+0x19e/0x1e0
[   48.282478]  ret_from_fork+0x41/0x70
[   48.283368]  ret_from_fork_asm+0x1b/0x30
[   48.283998] 
[   48.284199] The buggy address belongs to the object at ffff8881023f99a0
[   48.284199]  which belongs to the cache kmalloc-16 of size 16
[   48.285557] The buggy address is located 8 bytes inside of
[   48.285557]  allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[   48.287466] 
[   48.287803] The buggy address belongs to the physical page:
[   48.288462] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[   48.290155] flags: 0x200000000000800(slab|node=0|zone=2)
[   48.290800] page_type: 0xffffffff()
[   48.291366] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   48.292318] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.293152] page dumped because: kasan: bad access detected
[   48.294336] 
[   48.294568] Memory state around the buggy address:
[   48.295224]  ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.296236]  ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.297283] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   48.298071]                                   ^
[   48.299319]  ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.300181]  ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.300922] ==================================================================
---
[   48.301909] ==================================================================
[   48.302597] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1da/0x5e0
[   48.304273] Write of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[   48.305470] 
[   48.305967] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   48.307170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.307956] Call Trace:
[   48.308433]  <TASK>
[   48.309018]  dump_stack_lvl+0x4e/0x90
[   48.309597]  print_report+0xd2/0x660
[   48.310190]  ? __virt_addr_valid+0x156/0x1e0
[   48.310813]  ? kasan_complete_mode_report_info+0x2a/0x200
[   48.311391]  kasan_report+0xff/0x140
[   48.312287]  ? kasan_bitops_modify.constprop.0+0x1da/0x5e0
[   48.313988]  ? kasan_bitops_modify.constprop.0+0x1da/0x5e0
[   48.314863]  kasan_check_range+0x10c/0x1c0
[   48.315575]  __kasan_check_write+0x18/0x20
[   48.316289]  kasan_bitops_modify.constprop.0+0x1da/0x5e0
[   48.317661]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   48.318488]  ? kasan_save_alloc_info+0x22/0x30
[   48.319129]  ? kasan_set_track+0x29/0x40
[   48.319667]  ? kasan_set_track+0x29/0x40
[   48.320355]  kasan_bitops_generic+0xa9/0x130
[   48.320978]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   48.321773]  ? ktime_get_ts64+0x118/0x140
[   48.322435]  kunit_try_run_case+0x126/0x290
[   48.323828]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.324709]  ? __kasan_check_write+0x18/0x20
[   48.325378]  ? trace_preempt_on+0x20/0xa0
[   48.325948]  ? __kthread_parkme+0x4f/0xd0
[   48.327113]  ? preempt_count_sub+0x50/0x80
[   48.327963]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.328982]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.330014]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.330973]  kthread+0x19e/0x1e0
[   48.331681]  ? __pfx_kthread+0x10/0x10
[   48.332643]  ret_from_fork+0x41/0x70
[   48.333866]  ? __pfx_kthread+0x10/0x10
[   48.334429]  ret_from_fork_asm+0x1b/0x30
[   48.335466]  </TASK>
[   48.335829] 
[   48.336045] Allocated by task 224:
[   48.336841]  kasan_save_stack+0x3c/0x60
[   48.337768]  kasan_set_track+0x29/0x40
[   48.338513]  kasan_save_alloc_info+0x22/0x30
[   48.339606]  __kasan_kmalloc+0xb7/0xc0
[   48.340261]  kmalloc_trace+0x4c/0xb0
[   48.341665]  kasan_bitops_generic+0x8e/0x130
[   48.342323]  kunit_try_run_case+0x126/0x290
[   48.342941]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.343780]  kthread+0x19e/0x1e0
[   48.344449]  ret_from_fork+0x41/0x70
[   48.345445]  ret_from_fork_asm+0x1b/0x30
[   48.346721] 
[   48.347113] The buggy address belongs to the object at ffff8881023f99a0
[   48.347113]  which belongs to the cache kmalloc-16 of size 16
[   48.348642] The buggy address is located 8 bytes inside of
[   48.348642]  allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[   48.350066] 
[   48.350339] The buggy address belongs to the physical page:
[   48.350991] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[   48.352330] flags: 0x200000000000800(slab|node=0|zone=2)
[   48.353142] page_type: 0xffffffff()
[   48.353839] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   48.354830] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.355706] page dumped because: kasan: bad access detected
[   48.356283] 
[   48.356650] Memory state around the buggy address:
[   48.357247]  ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.358653]  ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.359625] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   48.360656]                                   ^
[   48.361426]  ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.363079]  ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.363781] ==================================================================
---
[   48.046930] ==================================================================
[   48.047544] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xda/0x5e0
[   48.049042] Write of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[   48.050056] 
[   48.050309] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   48.051842] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.053371] Call Trace:
[   48.053756]  <TASK>
[   48.054047]  dump_stack_lvl+0x4e/0x90
[   48.054983]  print_report+0xd2/0x660
[   48.055830]  ? __virt_addr_valid+0x156/0x1e0
[   48.056692]  ? kasan_complete_mode_report_info+0x2a/0x200
[   48.057655]  kasan_report+0xff/0x140
[   48.058455]  ? kasan_bitops_modify.constprop.0+0xda/0x5e0
[   48.059209]  ? kasan_bitops_modify.constprop.0+0xda/0x5e0
[   48.060567]  kasan_check_range+0x10c/0x1c0
[   48.061199]  __kasan_check_write+0x18/0x20
[   48.062439]  kasan_bitops_modify.constprop.0+0xda/0x5e0
[   48.063305]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   48.064055]  ? kasan_save_alloc_info+0x22/0x30
[   48.065306]  ? kasan_set_track+0x29/0x40
[   48.065811]  ? kasan_set_track+0x29/0x40
[   48.066363]  kasan_bitops_generic+0xa9/0x130
[   48.067015]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   48.067708]  ? ktime_get_ts64+0x118/0x140
[   48.068282]  kunit_try_run_case+0x126/0x290
[   48.069385]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.070111]  ? __kasan_check_write+0x18/0x20
[   48.070773]  ? trace_preempt_on+0x20/0xa0
[   48.071396]  ? __kthread_parkme+0x4f/0xd0
[   48.072007]  ? preempt_count_sub+0x50/0x80
[   48.072496]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.073885]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.074709]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.075464]  kthread+0x19e/0x1e0
[   48.075975]  ? __pfx_kthread+0x10/0x10
[   48.076601]  ret_from_fork+0x41/0x70
[   48.077814]  ? __pfx_kthread+0x10/0x10
[   48.078393]  ret_from_fork_asm+0x1b/0x30
[   48.079015]  </TASK>
[   48.079305] 
[   48.079637] Allocated by task 224:
[   48.080000]  kasan_save_stack+0x3c/0x60
[   48.081178]  kasan_set_track+0x29/0x40
[   48.081666]  kasan_save_alloc_info+0x22/0x30
[   48.082666]  __kasan_kmalloc+0xb7/0xc0
[   48.083223]  kmalloc_trace+0x4c/0xb0
[   48.083949]  kasan_bitops_generic+0x8e/0x130
[   48.084510]  kunit_try_run_case+0x126/0x290
[   48.085686]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.086634]  kthread+0x19e/0x1e0
[   48.087007]  ret_from_fork+0x41/0x70
[   48.087707]  ret_from_fork_asm+0x1b/0x30
[   48.088252] 
[   48.088617] The buggy address belongs to the object at ffff8881023f99a0
[   48.088617]  which belongs to the cache kmalloc-16 of size 16
[   48.091236] The buggy address is located 8 bytes inside of
[   48.091236]  allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[   48.092892] 
[   48.093116] The buggy address belongs to the physical page:
[   48.094309] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[   48.095424] flags: 0x200000000000800(slab|node=0|zone=2)
[   48.096073] page_type: 0xffffffff()
[   48.096552] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   48.097392] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.098738] page dumped because: kasan: bad access detected
[   48.099671] 
[   48.100175] Memory state around the buggy address:
[   48.100749]  ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.101552]  ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.102948] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   48.103878]                                   ^
[   48.104664]  ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.105582]  ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.107064] ==================================================================
---
[   48.366205] ==================================================================
[   48.367358] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x21c/0x5e0
[   48.368468] Write of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[   48.369440] 
[   48.370429] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   48.371515] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.372882] Call Trace:
[   48.373731]  <TASK>
[   48.374348]  dump_stack_lvl+0x4e/0x90
[   48.375477]  print_report+0xd2/0x660
[   48.376140]  ? __virt_addr_valid+0x156/0x1e0
[   48.376487]  ? kasan_complete_mode_report_info+0x2a/0x200
[   48.377494]  kasan_report+0xff/0x140
[   48.378161]  ? kasan_bitops_modify.constprop.0+0x21c/0x5e0
[   48.379003]  ? kasan_bitops_modify.constprop.0+0x21c/0x5e0
[   48.380032]  kasan_check_range+0x10c/0x1c0
[   48.380612]  __kasan_check_write+0x18/0x20
[   48.381338]  kasan_bitops_modify.constprop.0+0x21c/0x5e0
[   48.382449]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   48.383413]  ? kasan_save_alloc_info+0x22/0x30
[   48.384386]  ? kasan_set_track+0x29/0x40
[   48.384998]  ? kasan_set_track+0x29/0x40
[   48.385639]  kasan_bitops_generic+0xa9/0x130
[   48.386260]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   48.387592]  ? ktime_get_ts64+0x118/0x140
[   48.388412]  kunit_try_run_case+0x126/0x290
[   48.389242]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.389895]  ? __kasan_check_write+0x18/0x20
[   48.390584]  ? trace_preempt_on+0x20/0xa0
[   48.391229]  ? __kthread_parkme+0x4f/0xd0
[   48.392073]  ? preempt_count_sub+0x50/0x80
[   48.392797]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.393513]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.394642]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.395575]  kthread+0x19e/0x1e0
[   48.396058]  ? __pfx_kthread+0x10/0x10
[   48.396585]  ret_from_fork+0x41/0x70
[   48.397466]  ? __pfx_kthread+0x10/0x10
[   48.398295]  ret_from_fork_asm+0x1b/0x30
[   48.399369]  </TASK>
[   48.399817] 
[   48.400324] Allocated by task 224:
[   48.400806]  kasan_save_stack+0x3c/0x60
[   48.401610]  kasan_set_track+0x29/0x40
[   48.402312]  kasan_save_alloc_info+0x22/0x30
[   48.403169]  __kasan_kmalloc+0xb7/0xc0
[   48.404385]  kmalloc_trace+0x4c/0xb0
[   48.405115]  kasan_bitops_generic+0x8e/0x130
[   48.405902]  kunit_try_run_case+0x126/0x290
[   48.406488]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.407944]  kthread+0x19e/0x1e0
[   48.408692]  ret_from_fork+0x41/0x70
[   48.409263]  ret_from_fork_asm+0x1b/0x30
[   48.409863] 
[   48.410206] The buggy address belongs to the object at ffff8881023f99a0
[   48.410206]  which belongs to the cache kmalloc-16 of size 16
[   48.412030] The buggy address is located 8 bytes inside of
[   48.412030]  allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[   48.414126] 
[   48.414494] The buggy address belongs to the physical page:
[   48.415117] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[   48.416431] flags: 0x200000000000800(slab|node=0|zone=2)
[   48.417181] page_type: 0xffffffff()
[   48.418226] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   48.419678] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.420545] page dumped because: kasan: bad access detected
[   48.421463] 
[   48.421755] Memory state around the buggy address:
[   48.422421]  ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.423426]  ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.424948] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   48.425750]                                   ^
[   48.426484]  ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.427580]  ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.428420] ==================================================================
---
[   48.430170] ==================================================================
[   48.431083] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x25a/0x5e0
[   48.431951] Write of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[   48.433424] 
[   48.433712] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   48.434756] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.436121] Call Trace:
[   48.436459]  <TASK>
[   48.436733]  dump_stack_lvl+0x4e/0x90
[   48.437378]  print_report+0xd2/0x660
[   48.437935]  ? __virt_addr_valid+0x156/0x1e0
[   48.438659]  ? kasan_complete_mode_report_info+0x2a/0x200
[   48.439999]  kasan_report+0xff/0x140
[   48.440502]  ? kasan_bitops_modify.constprop.0+0x25a/0x5e0
[   48.441237]  ? kasan_bitops_modify.constprop.0+0x25a/0x5e0
[   48.441968]  kasan_check_range+0x10c/0x1c0
[   48.442652]  __kasan_check_write+0x18/0x20
[   48.443434]  kasan_bitops_modify.constprop.0+0x25a/0x5e0
[   48.444691]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   48.445442]  ? kasan_save_alloc_info+0x22/0x30
[   48.446020]  ? kasan_set_track+0x29/0x40
[   48.446883]  ? kasan_set_track+0x29/0x40
[   48.447557]  kasan_bitops_generic+0xa9/0x130
[   48.448796]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   48.449406]  ? ktime_get_ts64+0x118/0x140
[   48.450077]  kunit_try_run_case+0x126/0x290
[   48.450678]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.451286]  ? __kasan_check_write+0x18/0x20
[   48.452682]  ? trace_preempt_on+0x20/0xa0
[   48.453233]  ? __kthread_parkme+0x4f/0xd0
[   48.453861]  ? preempt_count_sub+0x50/0x80
[   48.454588]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.455292]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.456037]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.457959]  kthread+0x19e/0x1e0
[   48.458500]  ? __pfx_kthread+0x10/0x10
[   48.459016]  ret_from_fork+0x41/0x70
[   48.459653]  ? __pfx_kthread+0x10/0x10
[   48.460216]  ret_from_fork_asm+0x1b/0x30
[   48.461398]  </TASK>
[   48.461665] 
[   48.462055] Allocated by task 224:
[   48.462620]  kasan_save_stack+0x3c/0x60
[   48.463205]  kasan_set_track+0x29/0x40
[   48.463683]  kasan_save_alloc_info+0x22/0x30
[   48.464568]  __kasan_kmalloc+0xb7/0xc0
[   48.465855]  kmalloc_trace+0x4c/0xb0
[   48.466428]  kasan_bitops_generic+0x8e/0x130
[   48.466982]  kunit_try_run_case+0x126/0x290
[   48.467799]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.468474]  kthread+0x19e/0x1e0
[   48.469785]  ret_from_fork+0x41/0x70
[   48.470406]  ret_from_fork_asm+0x1b/0x30
[   48.470862] 
[   48.471259] The buggy address belongs to the object at ffff8881023f99a0
[   48.471259]  which belongs to the cache kmalloc-16 of size 16
[   48.472565] The buggy address is located 8 bytes inside of
[   48.472565]  allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[   48.474726] 
[   48.475234] The buggy address belongs to the physical page:
[   48.475942] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[   48.476876] flags: 0x200000000000800(slab|node=0|zone=2)
[   48.477456] page_type: 0xffffffff()
[   48.478691] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   48.479613] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.480278] page dumped because: kasan: bad access detected
[   48.480691] 
[   48.480833] Memory state around the buggy address:
[   48.481433]  ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.482673]  ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.484001] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   48.484879]                                   ^
[   48.485546]  ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.486578]  ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.487790] ==================================================================

test log snippet test parser 110

Home

[   49.007333] ==================================================================
[   49.009053] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0
[   49.010380] Read of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[   49.011658] 
[   49.012374] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   49.013440] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   49.014441] Call Trace:
[   49.015174]  <TASK>
[   49.015640]  dump_stack_lvl+0x4e/0x90
[   49.016308]  print_report+0xd2/0x660
[   49.016825]  ? __virt_addr_valid+0x156/0x1e0
[   49.017703]  ? kasan_complete_mode_report_info+0x2a/0x200
[   49.019460]  kasan_report+0xff/0x140
[   49.020271]  ? kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0
[   49.021073]  ? kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0
[   49.022561]  __asan_load8+0x82/0xb0
[   49.023097]  kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0
[   49.023822]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   49.025105]  ? kasan_save_alloc_info+0x22/0x30
[   49.025788]  ? kasan_set_track+0x29/0x40
[   49.026513]  ? kasan_set_track+0x29/0x40
[   49.027557]  kasan_bitops_generic+0xb4/0x130
[   49.028312]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   49.029179]  ? ktime_get_ts64+0x118/0x140
[   49.030261]  kunit_try_run_case+0x126/0x290
[   49.031328]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.032558]  ? __kasan_check_write+0x18/0x20
[   49.033228]  ? trace_preempt_on+0x20/0xa0
[   49.034123]  ? __kthread_parkme+0x4f/0xd0
[   49.034650]  ? preempt_count_sub+0x50/0x80
[   49.035285]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.035801]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.037208]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.038665]  kthread+0x19e/0x1e0
[   49.039423]  ? __pfx_kthread+0x10/0x10
[   49.040107]  ret_from_fork+0x41/0x70
[   49.040700]  ? __pfx_kthread+0x10/0x10
[   49.041283]  ret_from_fork_asm+0x1b/0x30
[   49.041897]  </TASK>
[   49.042259] 
[   49.042510] Allocated by task 224:
[   49.043684]  kasan_save_stack+0x3c/0x60
[   49.044229]  kasan_set_track+0x29/0x40
[   49.044708]  kasan_save_alloc_info+0x22/0x30
[   49.045704]  __kasan_kmalloc+0xb7/0xc0
[   49.046379]  kmalloc_trace+0x4c/0xb0
[   49.047644]  kasan_bitops_generic+0x8e/0x130
[   49.048398]  kunit_try_run_case+0x126/0x290
[   49.049284]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.050420]  kthread+0x19e/0x1e0
[   49.050818]  ret_from_fork+0x41/0x70
[   49.051206]  ret_from_fork_asm+0x1b/0x30
[   49.051493] 
[   49.052646] The buggy address belongs to the object at ffff8881023f99a0
[   49.052646]  which belongs to the cache kmalloc-16 of size 16
[   49.054404] The buggy address is located 8 bytes inside of
[   49.054404]  allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[   49.056125] 
[   49.056360] The buggy address belongs to the physical page:
[   49.056902] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[   49.058622] flags: 0x200000000000800(slab|node=0|zone=2)
[   49.059265] page_type: 0xffffffff()
[   49.059968] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   49.060950] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   49.061978] page dumped because: kasan: bad access detected
[   49.062566] 
[   49.062927] Memory state around the buggy address:
[   49.063356]  ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   49.064333]  ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   49.066012] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   49.067772]                                   ^
[   49.068536]  ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.069589]  ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.070332] ==================================================================

test log snippet test parser 111

Home

[   48.680267] ==================================================================
[   48.681064] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0
[   48.682125] Write of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[   48.683133] 
[   48.683469] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   48.685914] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.686957] Call Trace:
[   48.687378]  <TASK>
[   48.688421]  dump_stack_lvl+0x4e/0x90
[   48.689478]  print_report+0xd2/0x660
[   48.690163]  ? __virt_addr_valid+0x156/0x1e0
[   48.690900]  ? kasan_complete_mode_report_info+0x2a/0x200
[   48.691831]  kasan_report+0xff/0x140
[   48.692835]  ? kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0
[   48.693785]  ? kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0
[   48.694956]  kasan_check_range+0x10c/0x1c0
[   48.695790]  __kasan_check_write+0x18/0x20
[   48.696545]  kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0
[   48.697539]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   48.698472]  ? kasan_save_alloc_info+0x22/0x30
[   48.699495]  ? kasan_set_track+0x29/0x40
[   48.700441]  ? kasan_set_track+0x29/0x40
[   48.700997]  kasan_bitops_generic+0xb4/0x130
[   48.701810]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   48.702746]  ? ktime_get_ts64+0x118/0x140
[   48.703894]  kunit_try_run_case+0x126/0x290
[   48.704438]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.705339]  ? __kasan_check_write+0x18/0x20
[   48.706166]  ? trace_preempt_on+0x20/0xa0
[   48.707650]  ? __kthread_parkme+0x4f/0xd0
[   48.708495]  ? preempt_count_sub+0x50/0x80
[   48.709361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.710302]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.711676]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.712539]  kthread+0x19e/0x1e0
[   48.712997]  ? __pfx_kthread+0x10/0x10
[   48.713666]  ret_from_fork+0x41/0x70
[   48.714508]  ? __pfx_kthread+0x10/0x10
[   48.715604]  ret_from_fork_asm+0x1b/0x30
[   48.716690]  </TASK>
[   48.717477] 
[   48.718175] Allocated by task 224:
[   48.718781]  kasan_save_stack+0x3c/0x60
[   48.719361]  kasan_set_track+0x29/0x40
[   48.720038]  kasan_save_alloc_info+0x22/0x30
[   48.720488]  __kasan_kmalloc+0xb7/0xc0
[   48.721150]  kmalloc_trace+0x4c/0xb0
[   48.721808]  kasan_bitops_generic+0x8e/0x130
[   48.722953]  kunit_try_run_case+0x126/0x290
[   48.723403]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.724302]  kthread+0x19e/0x1e0
[   48.724891]  ret_from_fork+0x41/0x70
[   48.725354]  ret_from_fork_asm+0x1b/0x30
[   48.726107] 
[   48.726474] The buggy address belongs to the object at ffff8881023f99a0
[   48.726474]  which belongs to the cache kmalloc-16 of size 16
[   48.728026] The buggy address is located 8 bytes inside of
[   48.728026]  allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[   48.729387] 
[   48.729732] The buggy address belongs to the physical page:
[   48.730605] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[   48.731709] flags: 0x200000000000800(slab|node=0|zone=2)
[   48.732475] page_type: 0xffffffff()
[   48.733099] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   48.734175] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.735293] page dumped because: kasan: bad access detected
[   48.736079] 
[   48.736442] Memory state around the buggy address:
[   48.737201]  ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.738187]  ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.739201] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   48.740130]                                   ^
[   48.740789]  ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.741785]  ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.742762] ==================================================================
---
[   48.810299] ==================================================================
[   48.811722] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0
[   48.813945] Write of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[   48.814671] 
[   48.815053] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   48.816022] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.817370] Call Trace:
[   48.817778]  <TASK>
[   48.818549]  dump_stack_lvl+0x4e/0x90
[   48.819147]  print_report+0xd2/0x660
[   48.819667]  ? __virt_addr_valid+0x156/0x1e0
[   48.820403]  ? kasan_complete_mode_report_info+0x2a/0x200
[   48.821760]  kasan_report+0xff/0x140
[   48.822212]  ? kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0
[   48.823279]  ? kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0
[   48.824198]  kasan_check_range+0x10c/0x1c0
[   48.825599]  __kasan_check_write+0x18/0x20
[   48.826208]  kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0
[   48.827137]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   48.828141]  ? kasan_save_alloc_info+0x22/0x30
[   48.828888]  ? kasan_set_track+0x29/0x40
[   48.830104]  ? kasan_set_track+0x29/0x40
[   48.830641]  kasan_bitops_generic+0xb4/0x130
[   48.831361]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   48.832072]  ? ktime_get_ts64+0x118/0x140
[   48.832746]  kunit_try_run_case+0x126/0x290
[   48.833901]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.834905]  ? __kasan_check_write+0x18/0x20
[   48.835694]  ? trace_preempt_on+0x20/0xa0
[   48.836544]  ? __kthread_parkme+0x4f/0xd0
[   48.837096]  ? preempt_count_sub+0x50/0x80
[   48.838031]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.839222]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.840366]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.841178]  kthread+0x19e/0x1e0
[   48.842421]  ? __pfx_kthread+0x10/0x10
[   48.842998]  ret_from_fork+0x41/0x70
[   48.843876]  ? __pfx_kthread+0x10/0x10
[   48.844414]  ret_from_fork_asm+0x1b/0x30
[   48.845044]  </TASK>
[   48.845464] 
[   48.845783] Allocated by task 224:
[   48.846786]  kasan_save_stack+0x3c/0x60
[   48.847375]  kasan_set_track+0x29/0x40
[   48.847990]  kasan_save_alloc_info+0x22/0x30
[   48.848658]  __kasan_kmalloc+0xb7/0xc0
[   48.849161]  kmalloc_trace+0x4c/0xb0
[   48.850931]  kasan_bitops_generic+0x8e/0x130
[   48.851595]  kunit_try_run_case+0x126/0x290
[   48.852211]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.852971]  kthread+0x19e/0x1e0
[   48.853453]  ret_from_fork+0x41/0x70
[   48.854636]  ret_from_fork_asm+0x1b/0x30
[   48.855405] 
[   48.855645] The buggy address belongs to the object at ffff8881023f99a0
[   48.855645]  which belongs to the cache kmalloc-16 of size 16
[   48.856994] The buggy address is located 8 bytes inside of
[   48.856994]  allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[   48.859012] 
[   48.859270] The buggy address belongs to the physical page:
[   48.859786] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[   48.860881] flags: 0x200000000000800(slab|node=0|zone=2)
[   48.861817] page_type: 0xffffffff()
[   48.862342] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   48.864243] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.865124] page dumped because: kasan: bad access detected
[   48.865689] 
[   48.866020] Memory state around the buggy address:
[   48.866646]  ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.867876]  ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.869462] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   48.870281]                                   ^
[   48.870920]  ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.871741]  ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.872566] ==================================================================
---
[   48.743890] ==================================================================
[   48.744721] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0
[   48.746502] Write of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[   48.747446] 
[   48.748065] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   48.750156] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.751473] Call Trace:
[   48.752498]  <TASK>
[   48.753112]  dump_stack_lvl+0x4e/0x90
[   48.753755]  print_report+0xd2/0x660
[   48.754414]  ? __virt_addr_valid+0x156/0x1e0
[   48.755246]  ? kasan_complete_mode_report_info+0x2a/0x200
[   48.755900]  kasan_report+0xff/0x140
[   48.756991]  ? kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0
[   48.758295]  ? kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0
[   48.758831]  kasan_check_range+0x10c/0x1c0
[   48.759795]  __kasan_check_write+0x18/0x20
[   48.760410]  kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0
[   48.761576]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   48.763211]  ? kasan_save_alloc_info+0x22/0x30
[   48.763975]  ? kasan_set_track+0x29/0x40
[   48.764674]  ? kasan_set_track+0x29/0x40
[   48.765725]  kasan_bitops_generic+0xb4/0x130
[   48.766372]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   48.767826]  ? ktime_get_ts64+0x118/0x140
[   48.768425]  kunit_try_run_case+0x126/0x290
[   48.769364]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.770340]  ? __kasan_check_write+0x18/0x20
[   48.771563]  ? trace_preempt_on+0x20/0xa0
[   48.772319]  ? __kthread_parkme+0x4f/0xd0
[   48.773450]  ? preempt_count_sub+0x50/0x80
[   48.774705]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.775430]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.777053]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.777840]  kthread+0x19e/0x1e0
[   48.778954]  ? __pfx_kthread+0x10/0x10
[   48.779623]  ret_from_fork+0x41/0x70
[   48.780625]  ? __pfx_kthread+0x10/0x10
[   48.781306]  ret_from_fork_asm+0x1b/0x30
[   48.781919]  </TASK>
[   48.782275] 
[   48.782565] Allocated by task 224:
[   48.783146]  kasan_save_stack+0x3c/0x60
[   48.784292]  kasan_set_track+0x29/0x40
[   48.784946]  kasan_save_alloc_info+0x22/0x30
[   48.785609]  __kasan_kmalloc+0xb7/0xc0
[   48.787273]  kmalloc_trace+0x4c/0xb0
[   48.788177]  kasan_bitops_generic+0x8e/0x130
[   48.788788]  kunit_try_run_case+0x126/0x290
[   48.789331]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.790664]  kthread+0x19e/0x1e0
[   48.791326]  ret_from_fork+0x41/0x70
[   48.791774]  ret_from_fork_asm+0x1b/0x30
[   48.792287] 
[   48.792594] The buggy address belongs to the object at ffff8881023f99a0
[   48.792594]  which belongs to the cache kmalloc-16 of size 16
[   48.793945] The buggy address is located 8 bytes inside of
[   48.793945]  allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[   48.795255] 
[   48.795700] The buggy address belongs to the physical page:
[   48.796252] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[   48.797297] flags: 0x200000000000800(slab|node=0|zone=2)
[   48.798075] page_type: 0xffffffff()
[   48.798707] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   48.799913] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.800747] page dumped because: kasan: bad access detected
[   48.801275] 
[   48.801421] Memory state around the buggy address:
[   48.802068]  ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.803448]  ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.804992] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   48.805813]                                   ^
[   48.806429]  ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.807413]  ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.808534] ==================================================================
---
[   48.554936] ==================================================================
[   48.555792] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0
[   48.557202] Write of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[   48.558936] 
[   48.559317] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   48.560667] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.562504] Call Trace:
[   48.562987]  <TASK>
[   48.563464]  dump_stack_lvl+0x4e/0x90
[   48.564317]  print_report+0xd2/0x660
[   48.564901]  ? __virt_addr_valid+0x156/0x1e0
[   48.566077]  ? kasan_complete_mode_report_info+0x2a/0x200
[   48.567120]  kasan_report+0xff/0x140
[   48.567402]  ? kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0
[   48.568483]  ? kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0
[   48.569434]  kasan_check_range+0x10c/0x1c0
[   48.570780]  __kasan_check_write+0x18/0x20
[   48.571590]  kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0
[   48.572569]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   48.573574]  ? kasan_save_alloc_info+0x22/0x30
[   48.574340]  ? kasan_set_track+0x29/0x40
[   48.575086]  ? kasan_set_track+0x29/0x40
[   48.576212]  kasan_bitops_generic+0xb4/0x130
[   48.577000]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   48.577752]  ? ktime_get_ts64+0x118/0x140
[   48.578592]  kunit_try_run_case+0x126/0x290
[   48.579484]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.580386]  ? __kasan_check_write+0x18/0x20
[   48.581043]  ? trace_preempt_on+0x20/0xa0
[   48.581598]  ? __kthread_parkme+0x4f/0xd0
[   48.582559]  ? preempt_count_sub+0x50/0x80
[   48.583089]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.584311]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.585384]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.586733]  kthread+0x19e/0x1e0
[   48.587349]  ? __pfx_kthread+0x10/0x10
[   48.588094]  ret_from_fork+0x41/0x70
[   48.588777]  ? __pfx_kthread+0x10/0x10
[   48.589440]  ret_from_fork_asm+0x1b/0x30
[   48.590347]  </TASK>
[   48.590942] 
[   48.591660] Allocated by task 224:
[   48.592955]  kasan_save_stack+0x3c/0x60
[   48.593625]  kasan_set_track+0x29/0x40
[   48.594312]  kasan_save_alloc_info+0x22/0x30
[   48.594832]  __kasan_kmalloc+0xb7/0xc0
[   48.595436]  kmalloc_trace+0x4c/0xb0
[   48.596429]  kasan_bitops_generic+0x8e/0x130
[   48.597165]  kunit_try_run_case+0x126/0x290
[   48.598130]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.599627]  kthread+0x19e/0x1e0
[   48.600198]  ret_from_fork+0x41/0x70
[   48.600698]  ret_from_fork_asm+0x1b/0x30
[   48.601413] 
[   48.602269] The buggy address belongs to the object at ffff8881023f99a0
[   48.602269]  which belongs to the cache kmalloc-16 of size 16
[   48.604357] The buggy address is located 8 bytes inside of
[   48.604357]  allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[   48.605556] 
[   48.605859] The buggy address belongs to the physical page:
[   48.607185] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[   48.608473] flags: 0x200000000000800(slab|node=0|zone=2)
[   48.609377] page_type: 0xffffffff()
[   48.610194] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   48.611465] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.612561] page dumped because: kasan: bad access detected
[   48.613145] 
[   48.613480] Memory state around the buggy address:
[   48.614623]  ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.615835]  ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.617203] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   48.617879]                                   ^
[   48.618885]  ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.619685]  ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.620409] ==================================================================
---
[   49.071450] ==================================================================
[   49.073581] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0
[   49.074760] Write of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[   49.076336] 
[   49.076637] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   49.078056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   49.079276] Call Trace:
[   49.079876]  <TASK>
[   49.080221]  dump_stack_lvl+0x4e/0x90
[   49.080789]  print_report+0xd2/0x660
[   49.081684]  ? __virt_addr_valid+0x156/0x1e0
[   49.082373]  ? kasan_complete_mode_report_info+0x2a/0x200
[   49.083556]  kasan_report+0xff/0x140
[   49.084660]  ? kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0
[   49.085409]  ? kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0
[   49.086252]  kasan_check_range+0x10c/0x1c0
[   49.086929]  __kasan_check_write+0x18/0x20
[   49.087471]  kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0
[   49.088674]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   49.089445]  ? kasan_save_alloc_info+0x22/0x30
[   49.090208]  ? kasan_set_track+0x29/0x40
[   49.090729]  ? kasan_set_track+0x29/0x40
[   49.091395]  kasan_bitops_generic+0xb4/0x130
[   49.092160]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   49.092891]  ? ktime_get_ts64+0x118/0x140
[   49.093686]  kunit_try_run_case+0x126/0x290
[   49.094377]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.095117]  ? __kasan_check_write+0x18/0x20
[   49.095937]  ? trace_preempt_on+0x20/0xa0
[   49.096434]  ? __kthread_parkme+0x4f/0xd0
[   49.097428]  ? preempt_count_sub+0x50/0x80
[   49.098238]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.099107]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.100140]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.101081]  kthread+0x19e/0x1e0
[   49.101594]  ? __pfx_kthread+0x10/0x10
[   49.102172]  ret_from_fork+0x41/0x70
[   49.103197]  ? __pfx_kthread+0x10/0x10
[   49.103776]  ret_from_fork_asm+0x1b/0x30
[   49.104311]  </TASK>
[   49.104721] 
[   49.105010] Allocated by task 224:
[   49.105496]  kasan_save_stack+0x3c/0x60
[   49.106022]  kasan_set_track+0x29/0x40
[   49.106479]  kasan_save_alloc_info+0x22/0x30
[   49.107462]  __kasan_kmalloc+0xb7/0xc0
[   49.108140]  kmalloc_trace+0x4c/0xb0
[   49.109465]  kasan_bitops_generic+0x8e/0x130
[   49.110286]  kunit_try_run_case+0x126/0x290
[   49.111279]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.112120]  kthread+0x19e/0x1e0
[   49.112631]  ret_from_fork+0x41/0x70
[   49.113619]  ret_from_fork_asm+0x1b/0x30
[   49.114512] 
[   49.114894] The buggy address belongs to the object at ffff8881023f99a0
[   49.114894]  which belongs to the cache kmalloc-16 of size 16
[   49.116475] The buggy address is located 8 bytes inside of
[   49.116475]  allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[   49.117754] 
[   49.118337] The buggy address belongs to the physical page:
[   49.119769] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[   49.120944] flags: 0x200000000000800(slab|node=0|zone=2)
[   49.121719] page_type: 0xffffffff()
[   49.122315] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   49.123854] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   49.125134] page dumped because: kasan: bad access detected
[   49.125982] 
[   49.126229] Memory state around the buggy address:
[   49.127003]  ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   49.128317]  ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   49.129432] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   49.130367]                                   ^
[   49.132011]  ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.132811]  ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.133572] ==================================================================
---
[   48.622347] ==================================================================
[   48.623012] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0
[   48.624441] Write of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[   48.625887] 
[   48.626125] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   48.627436] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.628629] Call Trace:
[   48.629173]  <TASK>
[   48.629582]  dump_stack_lvl+0x4e/0x90
[   48.630170]  print_report+0xd2/0x660
[   48.630672]  ? __virt_addr_valid+0x156/0x1e0
[   48.631304]  ? kasan_complete_mode_report_info+0x2a/0x200
[   48.632560]  kasan_report+0xff/0x140
[   48.633139]  ? kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0
[   48.633988]  ? kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0
[   48.634732]  kasan_check_range+0x10c/0x1c0
[   48.635391]  __kasan_check_write+0x18/0x20
[   48.636117]  kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0
[   48.637278]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   48.638713]  ? kasan_save_alloc_info+0x22/0x30
[   48.639443]  ? kasan_set_track+0x29/0x40
[   48.640135]  ? kasan_set_track+0x29/0x40
[   48.640664]  kasan_bitops_generic+0xb4/0x130
[   48.641193]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   48.642616]  ? ktime_get_ts64+0x118/0x140
[   48.643656]  kunit_try_run_case+0x126/0x290
[   48.644340]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.645171]  ? __kasan_check_write+0x18/0x20
[   48.645963]  ? trace_preempt_on+0x20/0xa0
[   48.646963]  ? __kthread_parkme+0x4f/0xd0
[   48.647538]  ? preempt_count_sub+0x50/0x80
[   48.648578]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.649100]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.650021]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.651559]  kthread+0x19e/0x1e0
[   48.652262]  ? __pfx_kthread+0x10/0x10
[   48.652829]  ret_from_fork+0x41/0x70
[   48.653355]  ? __pfx_kthread+0x10/0x10
[   48.653959]  ret_from_fork_asm+0x1b/0x30
[   48.654543]  </TASK>
[   48.654941] 
[   48.655265] Allocated by task 224:
[   48.655707]  kasan_save_stack+0x3c/0x60
[   48.656486]  kasan_set_track+0x29/0x40
[   48.657339]  kasan_save_alloc_info+0x22/0x30
[   48.658678]  __kasan_kmalloc+0xb7/0xc0
[   48.659268]  kmalloc_trace+0x4c/0xb0
[   48.659833]  kasan_bitops_generic+0x8e/0x130
[   48.660469]  kunit_try_run_case+0x126/0x290
[   48.661367]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.662091]  kthread+0x19e/0x1e0
[   48.662504]  ret_from_fork+0x41/0x70
[   48.663183]  ret_from_fork_asm+0x1b/0x30
[   48.663753] 
[   48.664117] The buggy address belongs to the object at ffff8881023f99a0
[   48.664117]  which belongs to the cache kmalloc-16 of size 16
[   48.665404] The buggy address is located 8 bytes inside of
[   48.665404]  allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[   48.666925] 
[   48.667228] The buggy address belongs to the physical page:
[   48.667758] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[   48.669037] flags: 0x200000000000800(slab|node=0|zone=2)
[   48.669824] page_type: 0xffffffff()
[   48.670439] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   48.671383] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.672261] page dumped because: kasan: bad access detected
[   48.673006] 
[   48.673332] Memory state around the buggy address:
[   48.673926]  ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.674624]  ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.675652] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   48.676551]                                   ^
[   48.677024]  ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.678145]  ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.679039] ==================================================================
---
[   48.489405] ==================================================================
[   48.491270] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0
[   48.492697] Write of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[   48.494200] 
[   48.494620] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   48.495937] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.497026] Call Trace:
[   48.497393]  <TASK>
[   48.498063]  dump_stack_lvl+0x4e/0x90
[   48.499276]  print_report+0xd2/0x660
[   48.499932]  ? __virt_addr_valid+0x156/0x1e0
[   48.500668]  ? kasan_complete_mode_report_info+0x2a/0x200
[   48.501534]  kasan_report+0xff/0x140
[   48.502164]  ? kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0
[   48.504042]  ? kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0
[   48.504819]  kasan_check_range+0x10c/0x1c0
[   48.505384]  __kasan_check_write+0x18/0x20
[   48.506182]  kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0
[   48.506601]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   48.507781]  ? kasan_save_alloc_info+0x22/0x30
[   48.508703]  ? kasan_set_track+0x29/0x40
[   48.509405]  ? kasan_set_track+0x29/0x40
[   48.510074]  kasan_bitops_generic+0xb4/0x130
[   48.510675]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   48.511471]  ? ktime_get_ts64+0x118/0x140
[   48.512481]  kunit_try_run_case+0x126/0x290
[   48.513473]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.514254]  ? __kasan_check_write+0x18/0x20
[   48.515110]  ? trace_preempt_on+0x20/0xa0
[   48.515689]  ? __kthread_parkme+0x4f/0xd0
[   48.516844]  ? preempt_count_sub+0x50/0x80
[   48.517396]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.518242]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.519324]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.520097]  kthread+0x19e/0x1e0
[   48.520872]  ? __pfx_kthread+0x10/0x10
[   48.522005]  ret_from_fork+0x41/0x70
[   48.522841]  ? __pfx_kthread+0x10/0x10
[   48.523627]  ret_from_fork_asm+0x1b/0x30
[   48.524276]  </TASK>
[   48.525487] 
[   48.526073] Allocated by task 224:
[   48.526609]  kasan_save_stack+0x3c/0x60
[   48.527260]  kasan_set_track+0x29/0x40
[   48.527944]  kasan_save_alloc_info+0x22/0x30
[   48.528628]  __kasan_kmalloc+0xb7/0xc0
[   48.529185]  kmalloc_trace+0x4c/0xb0
[   48.530171]  kasan_bitops_generic+0x8e/0x130
[   48.531084]  kunit_try_run_case+0x126/0x290
[   48.531680]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.532797]  kthread+0x19e/0x1e0
[   48.533549]  ret_from_fork+0x41/0x70
[   48.534574]  ret_from_fork_asm+0x1b/0x30
[   48.535704] 
[   48.535969] The buggy address belongs to the object at ffff8881023f99a0
[   48.535969]  which belongs to the cache kmalloc-16 of size 16
[   48.537539] The buggy address is located 8 bytes inside of
[   48.537539]  allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[   48.539594] 
[   48.540220] The buggy address belongs to the physical page:
[   48.541038] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[   48.542388] flags: 0x200000000000800(slab|node=0|zone=2)
[   48.543126] page_type: 0xffffffff()
[   48.543992] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   48.544857] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.545786] page dumped because: kasan: bad access detected
[   48.546649] 
[   48.547133] Memory state around the buggy address:
[   48.547738]  ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.548919]  ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.549757] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   48.550818]                                   ^
[   48.551961]  ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.552877]  ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.553708] ==================================================================
---
[   48.874887] ==================================================================
[   48.875645] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0
[   48.877329] Write of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[   48.878294] 
[   48.878681] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   48.879593] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.880721] Call Trace:
[   48.882223]  <TASK>
[   48.882570]  dump_stack_lvl+0x4e/0x90
[   48.883127]  print_report+0xd2/0x660
[   48.883734]  ? __virt_addr_valid+0x156/0x1e0
[   48.884389]  ? kasan_complete_mode_report_info+0x2a/0x200
[   48.885938]  kasan_report+0xff/0x140
[   48.886455]  ? kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0
[   48.887397]  ? kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0
[   48.888188]  kasan_check_range+0x10c/0x1c0
[   48.888862]  __kasan_check_write+0x18/0x20
[   48.890507]  kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0
[   48.891226]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   48.892006]  ? kasan_save_alloc_info+0x22/0x30
[   48.892855]  ? kasan_set_track+0x29/0x40
[   48.893378]  ? kasan_set_track+0x29/0x40
[   48.894537]  kasan_bitops_generic+0xb4/0x130
[   48.895354]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   48.896137]  ? ktime_get_ts64+0x118/0x140
[   48.896959]  kunit_try_run_case+0x126/0x290
[   48.897935]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.898618]  ? __kasan_check_write+0x18/0x20
[   48.899913]  ? trace_preempt_on+0x20/0xa0
[   48.900457]  ? __kthread_parkme+0x4f/0xd0
[   48.900995]  ? preempt_count_sub+0x50/0x80
[   48.901920]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.902708]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.903496]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.904296]  kthread+0x19e/0x1e0
[   48.905040]  ? __pfx_kthread+0x10/0x10
[   48.905616]  ret_from_fork+0x41/0x70
[   48.906108]  ? __pfx_kthread+0x10/0x10
[   48.906814]  ret_from_fork_asm+0x1b/0x30
[   48.907570]  </TASK>
[   48.908055] 
[   48.908416] Allocated by task 224:
[   48.908899]  kasan_save_stack+0x3c/0x60
[   48.909596]  kasan_set_track+0x29/0x40
[   48.910304]  kasan_save_alloc_info+0x22/0x30
[   48.910815]  __kasan_kmalloc+0xb7/0xc0
[   48.911547]  kmalloc_trace+0x4c/0xb0
[   48.912136]  kasan_bitops_generic+0x8e/0x130
[   48.912933]  kunit_try_run_case+0x126/0x290
[   48.913782]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.914420]  kthread+0x19e/0x1e0
[   48.915127]  ret_from_fork+0x41/0x70
[   48.915961]  ret_from_fork_asm+0x1b/0x30
[   48.916392] 
[   48.916744] The buggy address belongs to the object at ffff8881023f99a0
[   48.916744]  which belongs to the cache kmalloc-16 of size 16
[   48.918233] The buggy address is located 8 bytes inside of
[   48.918233]  allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[   48.920023] 
[   48.920435] The buggy address belongs to the physical page:
[   48.921140] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[   48.922348] flags: 0x200000000000800(slab|node=0|zone=2)
[   48.923311] page_type: 0xffffffff()
[   48.923936] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   48.924964] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.926051] page dumped because: kasan: bad access detected
[   48.926967] 
[   48.927277] Memory state around the buggy address:
[   48.928067]  ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.928901]  ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.929772] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   48.931852]                                   ^
[   48.933071]  ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.933823]  ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.935302] ==================================================================

test log snippet test parser 112

Home

[   48.938360] ==================================================================
[   48.939050] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0
[   48.940047] Read of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[   48.940804] 
[   48.941135] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   48.943607] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   48.944707] Call Trace:
[   48.945403]  <TASK>
[   48.945751]  dump_stack_lvl+0x4e/0x90
[   48.946408]  print_report+0xd2/0x660
[   48.948225]  ? __virt_addr_valid+0x156/0x1e0
[   48.949260]  ? kasan_complete_mode_report_info+0x2a/0x200
[   48.950579]  kasan_report+0xff/0x140
[   48.951123]  ? kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0
[   48.951901]  ? kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0
[   48.952611]  kasan_check_range+0x10c/0x1c0
[   48.953218]  __kasan_check_read+0x15/0x20
[   48.954238]  kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0
[   48.955549]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   48.957203]  ? kasan_save_alloc_info+0x22/0x30
[   48.958138]  ? kasan_set_track+0x29/0x40
[   48.958906]  ? kasan_set_track+0x29/0x40
[   48.959917]  kasan_bitops_generic+0xb4/0x130
[   48.960643]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   48.961286]  ? ktime_get_ts64+0x118/0x140
[   48.963029]  kunit_try_run_case+0x126/0x290
[   48.963978]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.964695]  ? __kasan_check_write+0x18/0x20
[   48.965381]  ? trace_preempt_on+0x20/0xa0
[   48.965852]  ? __kthread_parkme+0x4f/0xd0
[   48.967297]  ? preempt_count_sub+0x50/0x80
[   48.968374]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.969138]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.970619]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.971367]  kthread+0x19e/0x1e0
[   48.971794]  ? __pfx_kthread+0x10/0x10
[   48.972471]  ret_from_fork+0x41/0x70
[   48.973435]  ? __pfx_kthread+0x10/0x10
[   48.974232]  ret_from_fork_asm+0x1b/0x30
[   48.974809]  </TASK>
[   48.975361] 
[   48.975762] Allocated by task 224:
[   48.976363]  kasan_save_stack+0x3c/0x60
[   48.977104]  kasan_set_track+0x29/0x40
[   48.978436]  kasan_save_alloc_info+0x22/0x30
[   48.979202]  __kasan_kmalloc+0xb7/0xc0
[   48.979775]  kmalloc_trace+0x4c/0xb0
[   48.980400]  kasan_bitops_generic+0x8e/0x130
[   48.981107]  kunit_try_run_case+0x126/0x290
[   48.981910]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.983008]  kthread+0x19e/0x1e0
[   48.984327]  ret_from_fork+0x41/0x70
[   48.985154]  ret_from_fork_asm+0x1b/0x30
[   48.985876] 
[   48.986555] The buggy address belongs to the object at ffff8881023f99a0
[   48.986555]  which belongs to the cache kmalloc-16 of size 16
[   48.988414] The buggy address is located 8 bytes inside of
[   48.988414]  allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[   48.990557] 
[   48.990937] The buggy address belongs to the physical page:
[   48.991805] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[   48.993642] flags: 0x200000000000800(slab|node=0|zone=2)
[   48.994293] page_type: 0xffffffff()
[   48.994761] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   48.995705] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   48.997006] page dumped because: kasan: bad access detected
[   48.998137] 
[   48.998337] Memory state around the buggy address:
[   48.999443]  ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   49.000694]  ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   49.001629] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   49.002679]                                   ^
[   49.003452]  ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.005043]  ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.005787] ==================================================================

test log snippet test parser 113

Home

[   43.936481] ==================================================================
[   43.937610] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xd0/0x1e0
[   43.939271] Write of size 1 at addr ffff8881024bdf00 by task kunit_try_catch/150
[   43.940689] 
[   43.941222] CPU: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   43.942401] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   43.944220] Call Trace:
[   43.944629]  <TASK>
[   43.945083]  dump_stack_lvl+0x4e/0x90
[   43.945928]  print_report+0xd2/0x660
[   43.946548]  ? __virt_addr_valid+0x156/0x1e0
[   43.947400]  ? kasan_complete_mode_report_info+0x2a/0x200
[   43.948142]  kasan_report+0xff/0x140
[   43.948706]  ? kmalloc_large_oob_right+0xd0/0x1e0
[   43.949424]  ? kmalloc_large_oob_right+0xd0/0x1e0
[   43.950152]  __asan_store1+0x69/0x70
[   43.951017]  kmalloc_large_oob_right+0xd0/0x1e0
[   43.951341]  ? __pfx_kmalloc_large_oob_right+0x10/0x10
[   43.952213]  ? __schedule+0x70b/0x1190
[   43.953507]  ? ktime_get_ts64+0x118/0x140
[   43.954397]  kunit_try_run_case+0x126/0x290
[   43.955327]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.956147]  ? __kasan_check_write+0x18/0x20
[   43.956961]  ? trace_preempt_on+0x20/0xa0
[   43.957495]  ? __kthread_parkme+0x4f/0xd0
[   43.958074]  ? preempt_count_sub+0x50/0x80
[   43.958970]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.959914]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   43.961007]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   43.961974]  kthread+0x19e/0x1e0
[   43.962566]  ? __pfx_kthread+0x10/0x10
[   43.963401]  ret_from_fork+0x41/0x70
[   43.964572]  ? __pfx_kthread+0x10/0x10
[   43.965542]  ret_from_fork_asm+0x1b/0x30
[   43.966730]  </TASK>
[   43.967176] 
[   43.967582] Allocated by task 150:
[   43.968212]  kasan_save_stack+0x3c/0x60
[   43.969338]  kasan_set_track+0x29/0x40
[   43.969925]  kasan_save_alloc_info+0x22/0x30
[   43.971344]  __kasan_kmalloc+0xb7/0xc0
[   43.972197]  kmalloc_trace+0x4c/0xb0
[   43.972933]  kmalloc_large_oob_right+0x9d/0x1e0
[   43.973481]  kunit_try_run_case+0x126/0x290
[   43.974046]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   43.974826]  kthread+0x19e/0x1e0
[   43.975330]  ret_from_fork+0x41/0x70
[   43.976283]  ret_from_fork_asm+0x1b/0x30
[   43.977081] 
[   43.977360] The buggy address belongs to the object at ffff8881024bc000
[   43.977360]  which belongs to the cache kmalloc-8k of size 8192
[   43.979089] The buggy address is located 0 bytes to the right of
[   43.979089]  allocated 7936-byte region [ffff8881024bc000, ffff8881024bdf00)
[   43.980596] 
[   43.981040] The buggy address belongs to the physical page:
[   43.981557] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024b8
[   43.982745] head:(____ptrval____) order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   43.983942] flags: 0x200000000000840(slab|head|node=0|zone=2)
[   43.984736] page_type: 0xffffffff()
[   43.985305] raw: 0200000000000840 ffff888100042280 dead000000000122 0000000000000000
[   43.986319] raw: 0000000000000000 0000000080020002 00000001ffffffff 0000000000000000
[   43.987382] page dumped because: kasan: bad access detected
[   43.988083] 
[   43.988415] Memory state around the buggy address:
[   43.989277]  ffff8881024bde00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   43.990495]  ffff8881024bde80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   43.991582] >ffff8881024bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.992783]                    ^
[   43.993660]  ffff8881024bdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.994449]  ffff8881024be000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.995468] ==================================================================

test log snippet test parser 114

Home

[   45.552483] ==================================================================
[   45.554220] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0xea/0x1f0
[   45.555359] Read of size 64 at addr ffff888102851d04 by task kunit_try_catch/178
[   45.556423] 
[   45.556781] CPU: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   45.558144] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.559188] Call Trace:
[   45.559620]  <TASK>
[   45.560061]  dump_stack_lvl+0x4e/0x90
[   45.560772]  print_report+0xd2/0x660
[   45.561505]  ? __virt_addr_valid+0x156/0x1e0
[   45.563062]  ? kasan_complete_mode_report_info+0x2a/0x200
[   45.563918]  kasan_report+0xff/0x140
[   45.564451]  ? kmalloc_memmove_invalid_size+0xea/0x1f0
[   45.565353]  ? kmalloc_memmove_invalid_size+0xea/0x1f0
[   45.566544]  kasan_check_range+0x10c/0x1c0
[   45.567398]  __asan_memmove+0x27/0x70
[   45.568242]  kmalloc_memmove_invalid_size+0xea/0x1f0
[   45.569426]  ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10
[   45.570337]  ? __schedule+0x70b/0x1190
[   45.571186]  ? ktime_get_ts64+0x118/0x140
[   45.572116]  kunit_try_run_case+0x126/0x290
[   45.573273]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.574781]  ? __kasan_check_write+0x18/0x20
[   45.576026]  ? trace_preempt_on+0x20/0xa0
[   45.576345]  ? __kthread_parkme+0x4f/0xd0
[   45.576784]  ? preempt_count_sub+0x50/0x80
[   45.577922]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.579278]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   45.580377]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.581283]  kthread+0x19e/0x1e0
[   45.581942]  ? __pfx_kthread+0x10/0x10
[   45.583087]  ret_from_fork+0x41/0x70
[   45.583676]  ? __pfx_kthread+0x10/0x10
[   45.584264]  ret_from_fork_asm+0x1b/0x30
[   45.584840]  </TASK>
[   45.585203] 
[   45.585470] Allocated by task 178:
[   45.586512]  kasan_save_stack+0x3c/0x60
[   45.587462]  kasan_set_track+0x29/0x40
[   45.588187]  kasan_save_alloc_info+0x22/0x30
[   45.588978]  __kasan_kmalloc+0xb7/0xc0
[   45.589619]  kmalloc_trace+0x4c/0xb0
[   45.590433]  kmalloc_memmove_invalid_size+0x9f/0x1f0
[   45.591360]  kunit_try_run_case+0x126/0x290
[   45.591862]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.593134]  kthread+0x19e/0x1e0
[   45.593929]  ret_from_fork+0x41/0x70
[   45.594445]  ret_from_fork_asm+0x1b/0x30
[   45.595245] 
[   45.595509] The buggy address belongs to the object at ffff888102851d00
[   45.595509]  which belongs to the cache kmalloc-64 of size 64
[   45.597191] The buggy address is located 4 bytes inside of
[   45.597191]  allocated 64-byte region [ffff888102851d00, ffff888102851d40)
[   45.598368] 
[   45.599241] The buggy address belongs to the physical page:
[   45.600226] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102851
[   45.601572] flags: 0x200000000000800(slab|node=0|zone=2)
[   45.602434] page_type: 0xffffffff()
[   45.603594] raw: 0200000000000800 ffff888100041640 dead000000000122 0000000000000000
[   45.604868] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[   45.606120] page dumped because: kasan: bad access detected
[   45.607259] 
[   45.607506] Memory state around the buggy address:
[   45.609174]  ffff888102851c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.610141]  ffff888102851c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.611198] >ffff888102851d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   45.612193]                                            ^
[   45.613260]  ffff888102851d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.614192]  ffff888102851e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.615401] ==================================================================

test log snippet test parser 115

Home

[   43.646210] ==================================================================
[   43.647670] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0xd4/0x1f0
[   43.648638] Read of size 1 at addr ffff8881028a5000 by task kunit_try_catch/138
[   43.649454] 
[   43.651011] CPU: 1 PID: 138 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   43.651835] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   43.652824] Call Trace:
[   43.653212]  <TASK>
[   43.653676]  dump_stack_lvl+0x4e/0x90
[   43.654295]  print_report+0xd2/0x660
[   43.654947]  ? __virt_addr_valid+0x156/0x1e0
[   43.655514]  ? kasan_complete_mode_report_info+0x2a/0x200
[   43.656302]  kasan_report+0xff/0x140
[   43.656826]  ? kmalloc_node_oob_right+0xd4/0x1f0
[   43.657465]  ? kmalloc_node_oob_right+0xd4/0x1f0
[   43.658125]  __asan_load1+0x66/0x70
[   43.658719]  kmalloc_node_oob_right+0xd4/0x1f0
[   43.659363]  ? __pfx_kmalloc_node_oob_right+0x10/0x10
[   43.660103]  ? __schedule+0x70b/0x1190
[   43.660648]  ? ktime_get_ts64+0x118/0x140
[   43.661377]  kunit_try_run_case+0x126/0x290
[   43.662130]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.662723]  ? __kasan_check_write+0x18/0x20
[   43.663388]  ? trace_preempt_on+0x20/0xa0
[   43.663924]  ? __kthread_parkme+0x4f/0xd0
[   43.664664]  ? preempt_count_sub+0x50/0x80
[   43.665481]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.666085]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   43.667853]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   43.669105]  kthread+0x19e/0x1e0
[   43.669816]  ? __pfx_kthread+0x10/0x10
[   43.670647]  ret_from_fork+0x41/0x70
[   43.671194]  ? __pfx_kthread+0x10/0x10
[   43.672199]  ret_from_fork_asm+0x1b/0x30
[   43.672845]  </TASK>
[   43.673600] 
[   43.673925] Allocated by task 138:
[   43.674420]  kasan_save_stack+0x3c/0x60
[   43.674942]  kasan_set_track+0x29/0x40
[   43.675596]  kasan_save_alloc_info+0x22/0x30
[   43.676310]  __kasan_kmalloc+0xb7/0xc0
[   43.676917]  kmalloc_node_trace+0x49/0xb0
[   43.677652]  kmalloc_node_oob_right+0xa1/0x1f0
[   43.678831]  kunit_try_run_case+0x126/0x290
[   43.679505]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   43.680318]  kthread+0x19e/0x1e0
[   43.680916]  ret_from_fork+0x41/0x70
[   43.681571]  ret_from_fork_asm+0x1b/0x30
[   43.682275] 
[   43.682637] The buggy address belongs to the object at ffff8881028a4000
[   43.682637]  which belongs to the cache kmalloc-4k of size 4096
[   43.684155] The buggy address is located 0 bytes to the right of
[   43.684155]  allocated 4096-byte region [ffff8881028a4000, ffff8881028a5000)
[   43.685627] 
[   43.685879] The buggy address belongs to the physical page:
[   43.686790] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a0
[   43.688092] head:(____ptrval____) order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   43.689323] flags: 0x200000000000840(slab|head|node=0|zone=2)
[   43.690223] page_type: 0xffffffff()
[   43.690669] raw: 0200000000000840 ffff888100042140 dead000000000122 0000000000000000
[   43.691623] raw: 0000000000000000 0000000080040004 00000001ffffffff 0000000000000000
[   43.692760] page dumped because: kasan: bad access detected
[   43.693581] 
[   43.693856] Memory state around the buggy address:
[   43.694679]  ffff8881028a4f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   43.695796]  ffff8881028a4f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   43.696756] >ffff8881028a5000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.697572]                    ^
[   43.698037]  ffff8881028a5080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.698969]  ffff8881028a5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.699685] ==================================================================

test log snippet test parser 116

Home

[   45.018558] ==================================================================
[   45.020211] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xf3/0x250
[   45.021389] Write of size 16 at addr ffff8881023f9920 by task kunit_try_catch/162
[   45.023320] 
[   45.023590] CPU: 1 PID: 162 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   45.025334] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.026330] Call Trace:
[   45.026704]  <TASK>
[   45.027243]  dump_stack_lvl+0x4e/0x90
[   45.028080]  print_report+0xd2/0x660
[   45.028579]  ? __virt_addr_valid+0x156/0x1e0
[   45.029226]  ? kasan_complete_mode_report_info+0x2a/0x200
[   45.030601]  kasan_report+0xff/0x140
[   45.031411]  ? kmalloc_oob_16+0xf3/0x250
[   45.032390]  ? kmalloc_oob_16+0xf3/0x250
[   45.033245]  __asan_store16+0x6c/0xa0
[   45.034125]  kmalloc_oob_16+0xf3/0x250
[   45.035360]  ? __pfx_kmalloc_oob_16+0x10/0x10
[   45.036087]  ? __schedule+0x70b/0x1190
[   45.036758]  ? ktime_get_ts64+0x118/0x140
[   45.037505]  kunit_try_run_case+0x126/0x290
[   45.038148]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.039297]  ? __kasan_check_write+0x18/0x20
[   45.040265]  ? trace_preempt_on+0x20/0xa0
[   45.041203]  ? __kthread_parkme+0x4f/0xd0
[   45.041983]  ? preempt_count_sub+0x50/0x80
[   45.042869]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.044059]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   45.044937]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.045838]  kthread+0x19e/0x1e0
[   45.046368]  ? __pfx_kthread+0x10/0x10
[   45.046888]  ret_from_fork+0x41/0x70
[   45.047543]  ? __pfx_kthread+0x10/0x10
[   45.048199]  ret_from_fork_asm+0x1b/0x30
[   45.048769]  </TASK>
[   45.049354] 
[   45.049802] Allocated by task 162:
[   45.050306]  kasan_save_stack+0x3c/0x60
[   45.051090]  kasan_set_track+0x29/0x40
[   45.051668]  kasan_save_alloc_info+0x22/0x30
[   45.052220]  __kasan_kmalloc+0xb7/0xc0
[   45.052800]  kmalloc_trace+0x4c/0xb0
[   45.053262]  kmalloc_oob_16+0x8f/0x250
[   45.054236]  kunit_try_run_case+0x126/0x290
[   45.054728]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.055588]  kthread+0x19e/0x1e0
[   45.056175]  ret_from_fork+0x41/0x70
[   45.056879]  ret_from_fork_asm+0x1b/0x30
[   45.057514] 
[   45.058123] The buggy address belongs to the object at ffff8881023f9920
[   45.058123]  which belongs to the cache kmalloc-16 of size 16
[   45.059933] The buggy address is located 0 bytes inside of
[   45.059933]  allocated 13-byte region [ffff8881023f9920, ffff8881023f992d)
[   45.061247] 
[   45.061612] The buggy address belongs to the physical page:
[   45.062367] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[   45.063409] flags: 0x200000000000800(slab|node=0|zone=2)
[   45.064413] page_type: 0xffffffff()
[   45.065130] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   45.066056] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   45.067246] page dumped because: kasan: bad access detected
[   45.067810] 
[   45.068347] Memory state around the buggy address:
[   45.069071]  ffff8881023f9800: 00 00 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   45.070126]  ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   45.071033] >ffff8881023f9900: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc
[   45.072147]                                   ^
[   45.072686]  ffff8881023f9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.073976]  ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.074690] ==================================================================

test log snippet test parser 117

Home

[   45.018558] ==================================================================
[   45.020211] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xf3/0x250
[   45.021389] Write of size 16 at addr ffff8881023f9920 by task kunit_try_catch/162
[   45.023320] 
[   45.023590] CPU: 1 PID: 162 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   45.025334] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.026330] Call Trace:
[   45.026704]  <TASK>
[   45.027243]  dump_stack_lvl+0x4e/0x90
[   45.028080]  print_report+0xd2/0x660
[   45.028579]  ? __virt_addr_valid+0x156/0x1e0
[   45.029226]  ? kasan_complete_mode_report_info+0x2a/0x200
[   45.030601]  kasan_report+0xff/0x140
[   45.031411]  ? kmalloc_oob_16+0xf3/0x250
[   45.032390]  ? kmalloc_oob_16+0xf3/0x250
[   45.033245]  __asan_store16+0x6c/0xa0
[   45.034125]  kmalloc_oob_16+0xf3/0x250
[   45.035360]  ? __pfx_kmalloc_oob_16+0x10/0x10
[   45.036087]  ? __schedule+0x70b/0x1190
[   45.036758]  ? ktime_get_ts64+0x118/0x140
[   45.037505]  kunit_try_run_case+0x126/0x290
[   45.038148]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.039297]  ? __kasan_check_write+0x18/0x20
[   45.040265]  ? trace_preempt_on+0x20/0xa0
[   45.041203]  ? __kthread_parkme+0x4f/0xd0
[   45.041983]  ? preempt_count_sub+0x50/0x80
[   45.042869]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.044059]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   45.044937]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.045838]  kthread+0x19e/0x1e0
[   45.046368]  ? __pfx_kthread+0x10/0x10
[   45.046888]  ret_from_fork+0x41/0x70
[   45.047543]  ? __pfx_kthread+0x10/0x10
[   45.048199]  ret_from_fork_asm+0x1b/0x30
[   45.048769]  </TASK>
[   45.049354] 
[   45.049802] Allocated by task 162:
[   45.050306]  kasan_save_stack+0x3c/0x60
[   45.051090]  kasan_set_track+0x29/0x40
[   45.051668]  kasan_save_alloc_info+0x22/0x30
[   45.052220]  __kasan_kmalloc+0xb7/0xc0
[   45.052800]  kmalloc_trace+0x4c/0xb0
[   45.053262]  kmalloc_oob_16+0x8f/0x250
[   45.054236]  kunit_try_run_case+0x126/0x290
[   45.054728]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.055588]  kthread+0x19e/0x1e0
[   45.056175]  ret_from_fork+0x41/0x70
[   45.056879]  ret_from_fork_asm+0x1b/0x30
[   45.057514] 
[   45.058123] The buggy address belongs to the object at ffff8881023f9920
[   45.058123]  which belongs to the cache kmalloc-16 of size 16
[   45.059933] The buggy address is located 0 bytes inside of
[   45.059933]  allocated 13-byte region [ffff8881023f9920, ffff8881023f992d)
[   45.061247] 
[   45.061612] The buggy address belongs to the physical page:
[   45.062367] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[   45.063409] flags: 0x200000000000800(slab|node=0|zone=2)
[   45.064413] page_type: 0xffffffff()
[   45.065130] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   45.066056] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   45.067246] page dumped because: kasan: bad access detected
[   45.067810] 
[   45.068347] Memory state around the buggy address:
[   45.069071]  ffff8881023f9800: 00 00 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   45.070126]  ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   45.071033] >ffff8881023f9900: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc
[   45.072147]                                   ^
[   45.072686]  ffff8881023f9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.073976]  ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.074690] ==================================================================

test log snippet test parser 118

Home

[   45.163174] ==================================================================
[   45.164586] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0xda/0x1e0
[   45.165489] Write of size 128 at addr ffff888102425c00 by task kunit_try_catch/166
[   45.166516] 
[   45.166845] CPU: 1 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   45.168453] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.169569] Call Trace:
[   45.170299]  <TASK>
[   45.170909]  dump_stack_lvl+0x4e/0x90
[   45.171660]  print_report+0xd2/0x660
[   45.172413]  ? __virt_addr_valid+0x156/0x1e0
[   45.173300]  ? kasan_complete_mode_report_info+0x2a/0x200
[   45.174276]  kasan_report+0xff/0x140
[   45.174824]  ? kmalloc_oob_in_memset+0xda/0x1e0
[   45.175768]  ? kmalloc_oob_in_memset+0xda/0x1e0
[   45.176629]  kasan_check_range+0x10c/0x1c0
[   45.177364]  __asan_memset+0x27/0x50
[   45.178311]  kmalloc_oob_in_memset+0xda/0x1e0
[   45.178888]  ? __pfx_kmalloc_oob_in_memset+0x10/0x10
[   45.179754]  ? __schedule+0x70b/0x1190
[   45.180329]  ? ktime_get_ts64+0x118/0x140
[   45.181202]  kunit_try_run_case+0x126/0x290
[   45.181514]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.182271]  ? __kasan_check_write+0x18/0x20
[   45.182913]  ? trace_preempt_on+0x20/0xa0
[   45.183416]  ? __kthread_parkme+0x4f/0xd0
[   45.184028]  ? preempt_count_sub+0x50/0x80
[   45.184739]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.185442]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   45.186391]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.187139]  kthread+0x19e/0x1e0
[   45.187582]  ? __pfx_kthread+0x10/0x10
[   45.188252]  ret_from_fork+0x41/0x70
[   45.188903]  ? __pfx_kthread+0x10/0x10
[   45.189441]  ret_from_fork_asm+0x1b/0x30
[   45.190074]  </TASK>
[   45.190468] 
[   45.190762] Allocated by task 166:
[   45.191328]  kasan_save_stack+0x3c/0x60
[   45.191919]  kasan_set_track+0x29/0x40
[   45.192330]  kasan_save_alloc_info+0x22/0x30
[   45.193089]  __kasan_kmalloc+0xb7/0xc0
[   45.193606]  kmalloc_trace+0x4c/0xb0
[   45.194282]  kmalloc_oob_in_memset+0x9f/0x1e0
[   45.194952]  kunit_try_run_case+0x126/0x290
[   45.195651]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.196412]  kthread+0x19e/0x1e0
[   45.197022]  ret_from_fork+0x41/0x70
[   45.197603]  ret_from_fork_asm+0x1b/0x30
[   45.198288] 
[   45.198625] The buggy address belongs to the object at ffff888102425c00
[   45.198625]  which belongs to the cache kmalloc-128 of size 128
[   45.199993] The buggy address is located 0 bytes inside of
[   45.199993]  allocated 120-byte region [ffff888102425c00, ffff888102425c78)
[   45.201314] 
[   45.201575] The buggy address belongs to the physical page:
[   45.202244] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102425
[   45.203368] flags: 0x200000000000800(slab|node=0|zone=2)
[   45.204062] page_type: 0xffffffff()
[   45.204542] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   45.205440] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   45.206228] page dumped because: kasan: bad access detected
[   45.206909] 
[   45.207237] Memory state around the buggy address:
[   45.207793]  ffff888102425b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   45.209168]  ffff888102425b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.210547] >ffff888102425c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   45.211511]                                                                 ^
[   45.212314]  ffff888102425c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.213151]  ffff888102425d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.213977] ==================================================================

test log snippet test parser 119

Home

[   43.572848] ==================================================================
[   43.574513] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0xcf/0x1f0
[   43.575381] Read of size 1 at addr ffff8881023f98ff by task kunit_try_catch/136
[   43.576676] 
[   43.576975] CPU: 1 PID: 136 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   43.578323] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   43.579381] Call Trace:
[   43.580143]  <TASK>
[   43.580434]  dump_stack_lvl+0x4e/0x90
[   43.581298]  print_report+0xd2/0x660
[   43.581830]  ? __virt_addr_valid+0x156/0x1e0
[   43.582404]  ? kasan_complete_mode_report_info+0x64/0x200
[   43.583207]  kasan_report+0xff/0x140
[   43.583496]  ? kmalloc_oob_left+0xcf/0x1f0
[   43.584381]  ? kmalloc_oob_left+0xcf/0x1f0
[   43.584975]  __asan_load1+0x66/0x70
[   43.585460]  kmalloc_oob_left+0xcf/0x1f0
[   43.586159]  ? __pfx_kmalloc_oob_left+0x10/0x10
[   43.586737]  ? __schedule+0x70b/0x1190
[   43.587347]  ? ktime_get_ts64+0x118/0x140
[   43.588122]  kunit_try_run_case+0x126/0x290
[   43.588859]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.589485]  ? __kasan_check_write+0x18/0x20
[   43.590650]  ? trace_preempt_on+0x20/0xa0
[   43.591468]  ? __kthread_parkme+0x4f/0xd0
[   43.592076]  ? preempt_count_sub+0x50/0x80
[   43.593097]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.593879]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   43.594692]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   43.595518]  kthread+0x19e/0x1e0
[   43.596269]  ? __pfx_kthread+0x10/0x10
[   43.596812]  ret_from_fork+0x41/0x70
[   43.597326]  ? __pfx_kthread+0x10/0x10
[   43.597875]  ret_from_fork_asm+0x1b/0x30
[   43.598905]  </TASK>
[   43.599431] 
[   43.599771] Allocated by task 1:
[   43.600639]  kasan_save_stack+0x3c/0x60
[   43.601482]  kasan_set_track+0x29/0x40
[   43.602300]  kasan_save_alloc_info+0x22/0x30
[   43.603243]  __kasan_kmalloc+0xb7/0xc0
[   43.603793]  __kmalloc+0x65/0x170
[   43.604542]  kobject_get_path+0x81/0x130
[   43.605022]  kobject_uevent_env+0x13e/0x890
[   43.606012]  kobject_uevent+0xf/0x20
[   43.606508]  param_sysfs_builtin_init+0x1e4/0x280
[   43.607559]  do_one_initcall+0xb3/0x340
[   43.608170]  kernel_init_freeable+0x2ae/0x470
[   43.608773]  kernel_init+0x23/0x1e0
[   43.609510]  ret_from_fork+0x41/0x70
[   43.610058]  ret_from_fork_asm+0x1b/0x30
[   43.610576] 
[   43.610897] Freed by task 1:
[   43.611561]  kasan_save_stack+0x3c/0x60
[   43.612415]  kasan_set_track+0x29/0x40
[   43.613184]  kasan_save_free_info+0x2f/0x50
[   43.613916]  ____kasan_slab_free+0x172/0x1d0
[   43.614733]  __kasan_slab_free+0x16/0x20
[   43.615317]  __kmem_cache_free+0x190/0x310
[   43.615812]  kfree+0x7c/0x120
[   43.616415]  kobject_uevent_env+0x16e/0x890
[   43.617015]  kobject_uevent+0xf/0x20
[   43.617504]  param_sysfs_builtin_init+0x1e4/0x280
[   43.618148]  do_one_initcall+0xb3/0x340
[   43.618783]  kernel_init_freeable+0x2ae/0x470
[   43.619344]  kernel_init+0x23/0x1e0
[   43.619937]  ret_from_fork+0x41/0x70
[   43.620510]  ret_from_fork_asm+0x1b/0x30
[   43.621174] 
[   43.621547] The buggy address belongs to the object at ffff8881023f98e0
[   43.621547]  which belongs to the cache kmalloc-16 of size 16
[   43.622939] The buggy address is located 15 bytes to the right of
[   43.622939]  allocated 16-byte region [ffff8881023f98e0, ffff8881023f98f0)
[   43.624298] 
[   43.624580] The buggy address belongs to the physical page:
[   43.625312] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[   43.626306] flags: 0x200000000000800(slab|node=0|zone=2)
[   43.627071] page_type: 0xffffffff()
[   43.627574] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   43.628446] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   43.629322] page dumped because: kasan: bad access detected
[   43.630124] 
[   43.630810] Memory state around the buggy address:
[   43.631547]  ffff8881023f9780: 00 00 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   43.632410]  ffff8881023f9800: 00 00 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   43.633190] >ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   43.633850]                                                                 ^
[   43.634928]  ffff8881023f9900: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.635747]  ffff8881023f9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.637314] ==================================================================

test log snippet test parser 120

Home

[   45.424133] ==================================================================
[   45.426080] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xdd/0x1e0
[   45.427054] Write of size 16 at addr ffff888102427069 by task kunit_try_catch/174
[   45.428380] 
[   45.429174] CPU: 1 PID: 174 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   45.430562] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.431855] Call Trace:
[   45.432207]  <TASK>
[   45.432546]  dump_stack_lvl+0x4e/0x90
[   45.433880]  print_report+0xd2/0x660
[   45.434594]  ? __virt_addr_valid+0x156/0x1e0
[   45.435480]  ? kasan_complete_mode_report_info+0x2a/0x200
[   45.436300]  kasan_report+0xff/0x140
[   45.437054]  ? kmalloc_oob_memset_16+0xdd/0x1e0
[   45.437867]  ? kmalloc_oob_memset_16+0xdd/0x1e0
[   45.438478]  kasan_check_range+0x10c/0x1c0
[   45.439466]  __asan_memset+0x27/0x50
[   45.440172]  kmalloc_oob_memset_16+0xdd/0x1e0
[   45.441048]  ? __pfx_kmalloc_oob_memset_16+0x10/0x10
[   45.442043]  ? __schedule+0x70b/0x1190
[   45.443212]  ? ktime_get_ts64+0x118/0x140
[   45.444452]  kunit_try_run_case+0x126/0x290
[   45.445250]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.445844]  ? __kasan_check_write+0x18/0x20
[   45.446556]  ? trace_preempt_on+0x20/0xa0
[   45.447301]  ? __kthread_parkme+0x4f/0xd0
[   45.448313]  ? preempt_count_sub+0x50/0x80
[   45.449030]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.449627]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   45.450352]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.451270]  kthread+0x19e/0x1e0
[   45.451782]  ? __pfx_kthread+0x10/0x10
[   45.452287]  ret_from_fork+0x41/0x70
[   45.453114]  ? __pfx_kthread+0x10/0x10
[   45.453984]  ret_from_fork_asm+0x1b/0x30
[   45.454928]  </TASK>
[   45.455341] 
[   45.456162] Allocated by task 174:
[   45.456765]  kasan_save_stack+0x3c/0x60
[   45.457439]  kasan_set_track+0x29/0x40
[   45.458286]  kasan_save_alloc_info+0x22/0x30
[   45.458906]  __kasan_kmalloc+0xb7/0xc0
[   45.459620]  kmalloc_trace+0x4c/0xb0
[   45.460548]  kmalloc_oob_memset_16+0x9f/0x1e0
[   45.461684]  kunit_try_run_case+0x126/0x290
[   45.462503]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.463447]  kthread+0x19e/0x1e0
[   45.463901]  ret_from_fork+0x41/0x70
[   45.464340]  ret_from_fork_asm+0x1b/0x30
[   45.465328] 
[   45.466072] The buggy address belongs to the object at ffff888102427000
[   45.466072]  which belongs to the cache kmalloc-128 of size 128
[   45.467561] The buggy address is located 105 bytes inside of
[   45.467561]  allocated 120-byte region [ffff888102427000, ffff888102427078)
[   45.469228] 
[   45.469543] The buggy address belongs to the physical page:
[   45.470257] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102427
[   45.471467] flags: 0x200000000000800(slab|node=0|zone=2)
[   45.472358] page_type: 0xffffffff()
[   45.472959] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   45.474637] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   45.475958] page dumped because: kasan: bad access detected
[   45.476602] 
[   45.477512] Memory state around the buggy address:
[   45.478141]  ffff888102426f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.478927]  ffff888102426f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.480222] >ffff888102427000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   45.481474]                                                                 ^
[   45.482669]  ffff888102427080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.483515]  ffff888102427100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.484520] ==================================================================

test log snippet test parser 121

Home

[   45.424133] ==================================================================
[   45.426080] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xdd/0x1e0
[   45.427054] Write of size 16 at addr ffff888102427069 by task kunit_try_catch/174
[   45.428380] 
[   45.429174] CPU: 1 PID: 174 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   45.430562] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.431855] Call Trace:
[   45.432207]  <TASK>
[   45.432546]  dump_stack_lvl+0x4e/0x90
[   45.433880]  print_report+0xd2/0x660
[   45.434594]  ? __virt_addr_valid+0x156/0x1e0
[   45.435480]  ? kasan_complete_mode_report_info+0x2a/0x200
[   45.436300]  kasan_report+0xff/0x140
[   45.437054]  ? kmalloc_oob_memset_16+0xdd/0x1e0
[   45.437867]  ? kmalloc_oob_memset_16+0xdd/0x1e0
[   45.438478]  kasan_check_range+0x10c/0x1c0
[   45.439466]  __asan_memset+0x27/0x50
[   45.440172]  kmalloc_oob_memset_16+0xdd/0x1e0
[   45.441048]  ? __pfx_kmalloc_oob_memset_16+0x10/0x10
[   45.442043]  ? __schedule+0x70b/0x1190
[   45.443212]  ? ktime_get_ts64+0x118/0x140
[   45.444452]  kunit_try_run_case+0x126/0x290
[   45.445250]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.445844]  ? __kasan_check_write+0x18/0x20
[   45.446556]  ? trace_preempt_on+0x20/0xa0
[   45.447301]  ? __kthread_parkme+0x4f/0xd0
[   45.448313]  ? preempt_count_sub+0x50/0x80
[   45.449030]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.449627]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   45.450352]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.451270]  kthread+0x19e/0x1e0
[   45.451782]  ? __pfx_kthread+0x10/0x10
[   45.452287]  ret_from_fork+0x41/0x70
[   45.453114]  ? __pfx_kthread+0x10/0x10
[   45.453984]  ret_from_fork_asm+0x1b/0x30
[   45.454928]  </TASK>
[   45.455341] 
[   45.456162] Allocated by task 174:
[   45.456765]  kasan_save_stack+0x3c/0x60
[   45.457439]  kasan_set_track+0x29/0x40
[   45.458286]  kasan_save_alloc_info+0x22/0x30
[   45.458906]  __kasan_kmalloc+0xb7/0xc0
[   45.459620]  kmalloc_trace+0x4c/0xb0
[   45.460548]  kmalloc_oob_memset_16+0x9f/0x1e0
[   45.461684]  kunit_try_run_case+0x126/0x290
[   45.462503]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.463447]  kthread+0x19e/0x1e0
[   45.463901]  ret_from_fork+0x41/0x70
[   45.464340]  ret_from_fork_asm+0x1b/0x30
[   45.465328] 
[   45.466072] The buggy address belongs to the object at ffff888102427000
[   45.466072]  which belongs to the cache kmalloc-128 of size 128
[   45.467561] The buggy address is located 105 bytes inside of
[   45.467561]  allocated 120-byte region [ffff888102427000, ffff888102427078)
[   45.469228] 
[   45.469543] The buggy address belongs to the physical page:
[   45.470257] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102427
[   45.471467] flags: 0x200000000000800(slab|node=0|zone=2)
[   45.472358] page_type: 0xffffffff()
[   45.472959] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   45.474637] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   45.475958] page dumped because: kasan: bad access detected
[   45.476602] 
[   45.477512] Memory state around the buggy address:
[   45.478141]  ffff888102426f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.478927]  ffff888102426f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.480222] >ffff888102427000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   45.481474]                                                                 ^
[   45.482669]  ffff888102427080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.483515]  ffff888102427100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.484520] ==================================================================

test log snippet test parser 122

Home

[   45.222465] ==================================================================
[   45.223808] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xdd/0x1e0
[   45.224714] Write of size 2 at addr ffff888102425d77 by task kunit_try_catch/168
[   45.225334] 
[   45.225777] CPU: 1 PID: 168 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   45.227518] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.228735] Call Trace:
[   45.229054]  <TASK>
[   45.229737]  dump_stack_lvl+0x4e/0x90
[   45.230256]  print_report+0xd2/0x660
[   45.230859]  ? __virt_addr_valid+0x156/0x1e0
[   45.231684]  ? kasan_complete_mode_report_info+0x2a/0x200
[   45.232859]  kasan_report+0xff/0x140
[   45.233513]  ? kmalloc_oob_memset_2+0xdd/0x1e0
[   45.234396]  ? kmalloc_oob_memset_2+0xdd/0x1e0
[   45.235269]  kasan_check_range+0x10c/0x1c0
[   45.235978]  __asan_memset+0x27/0x50
[   45.236708]  kmalloc_oob_memset_2+0xdd/0x1e0
[   45.237606]  ? __pfx_kmalloc_oob_memset_2+0x10/0x10
[   45.238478]  ? __schedule+0x70b/0x1190
[   45.239153]  ? ktime_get_ts64+0x118/0x140
[   45.240118]  kunit_try_run_case+0x126/0x290
[   45.240802]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.242185]  ? __kasan_check_write+0x18/0x20
[   45.242901]  ? trace_preempt_on+0x20/0xa0
[   45.243559]  ? __kthread_parkme+0x4f/0xd0
[   45.244399]  ? preempt_count_sub+0x50/0x80
[   45.245226]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.245954]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   45.246788]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.247457]  kthread+0x19e/0x1e0
[   45.248364]  ? __pfx_kthread+0x10/0x10
[   45.248931]  ret_from_fork+0x41/0x70
[   45.249663]  ? __pfx_kthread+0x10/0x10
[   45.250845]  ret_from_fork_asm+0x1b/0x30
[   45.251542]  </TASK>
[   45.252347] 
[   45.252856] Allocated by task 168:
[   45.253396]  kasan_save_stack+0x3c/0x60
[   45.254414]  kasan_set_track+0x29/0x40
[   45.255063]  kasan_save_alloc_info+0x22/0x30
[   45.255642]  __kasan_kmalloc+0xb7/0xc0
[   45.256097]  kmalloc_trace+0x4c/0xb0
[   45.256755]  kmalloc_oob_memset_2+0x9f/0x1e0
[   45.257410]  kunit_try_run_case+0x126/0x290
[   45.258362]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.259369]  kthread+0x19e/0x1e0
[   45.260120]  ret_from_fork+0x41/0x70
[   45.260974]  ret_from_fork_asm+0x1b/0x30
[   45.261785] 
[   45.262195] The buggy address belongs to the object at ffff888102425d00
[   45.262195]  which belongs to the cache kmalloc-128 of size 128
[   45.264043] The buggy address is located 119 bytes inside of
[   45.264043]  allocated 120-byte region [ffff888102425d00, ffff888102425d78)
[   45.265966] 
[   45.266282] The buggy address belongs to the physical page:
[   45.267132] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102425
[   45.268441] flags: 0x200000000000800(slab|node=0|zone=2)
[   45.269277] page_type: 0xffffffff()
[   45.269843] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   45.270891] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   45.272012] page dumped because: kasan: bad access detected
[   45.272739] 
[   45.273047] Memory state around the buggy address:
[   45.273937]  ffff888102425c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   45.274952]  ffff888102425c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.276209] >ffff888102425d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   45.277198]                                                                 ^
[   45.277631]  ffff888102425d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.278577]  ffff888102425e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.279651] ==================================================================

test log snippet test parser 123

Home

[   45.222465] ==================================================================
[   45.223808] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xdd/0x1e0
[   45.224714] Write of size 2 at addr ffff888102425d77 by task kunit_try_catch/168
[   45.225334] 
[   45.225777] CPU: 1 PID: 168 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   45.227518] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.228735] Call Trace:
[   45.229054]  <TASK>
[   45.229737]  dump_stack_lvl+0x4e/0x90
[   45.230256]  print_report+0xd2/0x660
[   45.230859]  ? __virt_addr_valid+0x156/0x1e0
[   45.231684]  ? kasan_complete_mode_report_info+0x2a/0x200
[   45.232859]  kasan_report+0xff/0x140
[   45.233513]  ? kmalloc_oob_memset_2+0xdd/0x1e0
[   45.234396]  ? kmalloc_oob_memset_2+0xdd/0x1e0
[   45.235269]  kasan_check_range+0x10c/0x1c0
[   45.235978]  __asan_memset+0x27/0x50
[   45.236708]  kmalloc_oob_memset_2+0xdd/0x1e0
[   45.237606]  ? __pfx_kmalloc_oob_memset_2+0x10/0x10
[   45.238478]  ? __schedule+0x70b/0x1190
[   45.239153]  ? ktime_get_ts64+0x118/0x140
[   45.240118]  kunit_try_run_case+0x126/0x290
[   45.240802]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.242185]  ? __kasan_check_write+0x18/0x20
[   45.242901]  ? trace_preempt_on+0x20/0xa0
[   45.243559]  ? __kthread_parkme+0x4f/0xd0
[   45.244399]  ? preempt_count_sub+0x50/0x80
[   45.245226]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.245954]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   45.246788]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.247457]  kthread+0x19e/0x1e0
[   45.248364]  ? __pfx_kthread+0x10/0x10
[   45.248931]  ret_from_fork+0x41/0x70
[   45.249663]  ? __pfx_kthread+0x10/0x10
[   45.250845]  ret_from_fork_asm+0x1b/0x30
[   45.251542]  </TASK>
[   45.252347] 
[   45.252856] Allocated by task 168:
[   45.253396]  kasan_save_stack+0x3c/0x60
[   45.254414]  kasan_set_track+0x29/0x40
[   45.255063]  kasan_save_alloc_info+0x22/0x30
[   45.255642]  __kasan_kmalloc+0xb7/0xc0
[   45.256097]  kmalloc_trace+0x4c/0xb0
[   45.256755]  kmalloc_oob_memset_2+0x9f/0x1e0
[   45.257410]  kunit_try_run_case+0x126/0x290
[   45.258362]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.259369]  kthread+0x19e/0x1e0
[   45.260120]  ret_from_fork+0x41/0x70
[   45.260974]  ret_from_fork_asm+0x1b/0x30
[   45.261785] 
[   45.262195] The buggy address belongs to the object at ffff888102425d00
[   45.262195]  which belongs to the cache kmalloc-128 of size 128
[   45.264043] The buggy address is located 119 bytes inside of
[   45.264043]  allocated 120-byte region [ffff888102425d00, ffff888102425d78)
[   45.265966] 
[   45.266282] The buggy address belongs to the physical page:
[   45.267132] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102425
[   45.268441] flags: 0x200000000000800(slab|node=0|zone=2)
[   45.269277] page_type: 0xffffffff()
[   45.269843] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   45.270891] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   45.272012] page dumped because: kasan: bad access detected
[   45.272739] 
[   45.273047] Memory state around the buggy address:
[   45.273937]  ffff888102425c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   45.274952]  ffff888102425c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.276209] >ffff888102425d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   45.277198]                                                                 ^
[   45.277631]  ffff888102425d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.278577]  ffff888102425e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.279651] ==================================================================

test log snippet test parser 124

Home

[   45.289080] ==================================================================
[   45.290570] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xdd/0x1e0
[   45.291755] Write of size 4 at addr ffff888102425e75 by task kunit_try_catch/170
[   45.293571] 
[   45.294230] CPU: 1 PID: 170 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   45.295496] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.296387] Call Trace:
[   45.297127]  <TASK>
[   45.298082]  dump_stack_lvl+0x4e/0x90
[   45.298812]  print_report+0xd2/0x660
[   45.299591]  ? __virt_addr_valid+0x156/0x1e0
[   45.300351]  ? kasan_complete_mode_report_info+0x2a/0x200
[   45.301431]  kasan_report+0xff/0x140
[   45.302178]  ? kmalloc_oob_memset_4+0xdd/0x1e0
[   45.303216]  ? kmalloc_oob_memset_4+0xdd/0x1e0
[   45.304823]  kasan_check_range+0x10c/0x1c0
[   45.305434]  __asan_memset+0x27/0x50
[   45.306096]  kmalloc_oob_memset_4+0xdd/0x1e0
[   45.306423]  ? __pfx_kmalloc_oob_memset_4+0x10/0x10
[   45.307269]  ? ret_from_fork+0x41/0x70
[   45.308147]  ? __pfx_kmalloc_oob_memset_4+0x10/0x10
[   45.309352]  ? kunit_try_run_case+0x11b/0x290
[   45.310274]  kunit_try_run_case+0x126/0x290
[   45.311618]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.312414]  ? __kasan_check_write+0x18/0x20
[   45.313354]  ? trace_preempt_on+0x20/0xa0
[   45.314995]  ? __kthread_parkme+0x4f/0xd0
[   45.315646]  ? preempt_count_sub+0x50/0x80
[   45.316607]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.317386]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   45.318508]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.319301]  kthread+0x19e/0x1e0
[   45.319999]  ? __pfx_kthread+0x10/0x10
[   45.320648]  ret_from_fork+0x41/0x70
[   45.321387]  ? __pfx_kthread+0x10/0x10
[   45.322923]  ret_from_fork_asm+0x1b/0x30
[   45.323734]  </TASK>
[   45.324109] 
[   45.324592] Allocated by task 170:
[   45.325628]  kasan_save_stack+0x3c/0x60
[   45.326331]  kasan_set_track+0x29/0x40
[   45.326772]  kasan_save_alloc_info+0x22/0x30
[   45.328104]  __kasan_kmalloc+0xb7/0xc0
[   45.328980]  kmalloc_trace+0x4c/0xb0
[   45.329656]  kmalloc_oob_memset_4+0x9f/0x1e0
[   45.330282]  kunit_try_run_case+0x126/0x290
[   45.330827]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.331436]  kthread+0x19e/0x1e0
[   45.332508]  ret_from_fork+0x41/0x70
[   45.333394]  ret_from_fork_asm+0x1b/0x30
[   45.334329] 
[   45.334682] The buggy address belongs to the object at ffff888102425e00
[   45.334682]  which belongs to the cache kmalloc-128 of size 128
[   45.336077] The buggy address is located 117 bytes inside of
[   45.336077]  allocated 120-byte region [ffff888102425e00, ffff888102425e78)
[   45.337129] 
[   45.337541] The buggy address belongs to the physical page:
[   45.338687] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102425
[   45.340503] flags: 0x200000000000800(slab|node=0|zone=2)
[   45.341684] page_type: 0xffffffff()
[   45.342555] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   45.343493] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   45.344683] page dumped because: kasan: bad access detected
[   45.345577] 
[   45.346155] Memory state around the buggy address:
[   45.346725]  ffff888102425d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   45.348423]  ffff888102425d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.349789] >ffff888102425e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   45.351039]                                                                 ^
[   45.352253]  ffff888102425e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.353304]  ffff888102425f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.354433] ==================================================================

test log snippet test parser 125

Home

[   45.289080] ==================================================================
[   45.290570] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xdd/0x1e0
[   45.291755] Write of size 4 at addr ffff888102425e75 by task kunit_try_catch/170
[   45.293571] 
[   45.294230] CPU: 1 PID: 170 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   45.295496] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.296387] Call Trace:
[   45.297127]  <TASK>
[   45.298082]  dump_stack_lvl+0x4e/0x90
[   45.298812]  print_report+0xd2/0x660
[   45.299591]  ? __virt_addr_valid+0x156/0x1e0
[   45.300351]  ? kasan_complete_mode_report_info+0x2a/0x200
[   45.301431]  kasan_report+0xff/0x140
[   45.302178]  ? kmalloc_oob_memset_4+0xdd/0x1e0
[   45.303216]  ? kmalloc_oob_memset_4+0xdd/0x1e0
[   45.304823]  kasan_check_range+0x10c/0x1c0
[   45.305434]  __asan_memset+0x27/0x50
[   45.306096]  kmalloc_oob_memset_4+0xdd/0x1e0
[   45.306423]  ? __pfx_kmalloc_oob_memset_4+0x10/0x10
[   45.307269]  ? ret_from_fork+0x41/0x70
[   45.308147]  ? __pfx_kmalloc_oob_memset_4+0x10/0x10
[   45.309352]  ? kunit_try_run_case+0x11b/0x290
[   45.310274]  kunit_try_run_case+0x126/0x290
[   45.311618]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.312414]  ? __kasan_check_write+0x18/0x20
[   45.313354]  ? trace_preempt_on+0x20/0xa0
[   45.314995]  ? __kthread_parkme+0x4f/0xd0
[   45.315646]  ? preempt_count_sub+0x50/0x80
[   45.316607]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.317386]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   45.318508]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.319301]  kthread+0x19e/0x1e0
[   45.319999]  ? __pfx_kthread+0x10/0x10
[   45.320648]  ret_from_fork+0x41/0x70
[   45.321387]  ? __pfx_kthread+0x10/0x10
[   45.322923]  ret_from_fork_asm+0x1b/0x30
[   45.323734]  </TASK>
[   45.324109] 
[   45.324592] Allocated by task 170:
[   45.325628]  kasan_save_stack+0x3c/0x60
[   45.326331]  kasan_set_track+0x29/0x40
[   45.326772]  kasan_save_alloc_info+0x22/0x30
[   45.328104]  __kasan_kmalloc+0xb7/0xc0
[   45.328980]  kmalloc_trace+0x4c/0xb0
[   45.329656]  kmalloc_oob_memset_4+0x9f/0x1e0
[   45.330282]  kunit_try_run_case+0x126/0x290
[   45.330827]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.331436]  kthread+0x19e/0x1e0
[   45.332508]  ret_from_fork+0x41/0x70
[   45.333394]  ret_from_fork_asm+0x1b/0x30
[   45.334329] 
[   45.334682] The buggy address belongs to the object at ffff888102425e00
[   45.334682]  which belongs to the cache kmalloc-128 of size 128
[   45.336077] The buggy address is located 117 bytes inside of
[   45.336077]  allocated 120-byte region [ffff888102425e00, ffff888102425e78)
[   45.337129] 
[   45.337541] The buggy address belongs to the physical page:
[   45.338687] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102425
[   45.340503] flags: 0x200000000000800(slab|node=0|zone=2)
[   45.341684] page_type: 0xffffffff()
[   45.342555] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   45.343493] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   45.344683] page dumped because: kasan: bad access detected
[   45.345577] 
[   45.346155] Memory state around the buggy address:
[   45.346725]  ffff888102425d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   45.348423]  ffff888102425d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.349789] >ffff888102425e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   45.351039]                                                                 ^
[   45.352253]  ffff888102425e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.353304]  ffff888102425f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.354433] ==================================================================

test log snippet test parser 126

Home

[   45.363863] ==================================================================
[   45.365084] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xdd/0x1e0
[   45.365952] Write of size 8 at addr ffff888102425f71 by task kunit_try_catch/172
[   45.367562] 
[   45.367987] CPU: 1 PID: 172 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   45.369100] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.370254] Call Trace:
[   45.370641]  <TASK>
[   45.371258]  dump_stack_lvl+0x4e/0x90
[   45.371844]  print_report+0xd2/0x660
[   45.372409]  ? __virt_addr_valid+0x156/0x1e0
[   45.373095]  ? kasan_complete_mode_report_info+0x2a/0x200
[   45.373768]  kasan_report+0xff/0x140
[   45.374445]  ? kmalloc_oob_memset_8+0xdd/0x1e0
[   45.375284]  ? kmalloc_oob_memset_8+0xdd/0x1e0
[   45.376075]  kasan_check_range+0x10c/0x1c0
[   45.376765]  __asan_memset+0x27/0x50
[   45.377343]  kmalloc_oob_memset_8+0xdd/0x1e0
[   45.378058]  ? __pfx_kmalloc_oob_memset_8+0x10/0x10
[   45.378901]  ? ret_from_fork+0x41/0x70
[   45.379589]  ? __pfx_kmalloc_oob_memset_8+0x10/0x10
[   45.380353]  ? kunit_try_run_case+0x11b/0x290
[   45.381021]  kunit_try_run_case+0x126/0x290
[   45.381596]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.382411]  ? __kasan_check_write+0x18/0x20
[   45.383161]  ? trace_preempt_on+0x20/0xa0
[   45.383847]  ? __kthread_parkme+0x4f/0xd0
[   45.384543]  ? preempt_count_sub+0x50/0x80
[   45.385251]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.385987]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   45.386821]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.387705]  kthread+0x19e/0x1e0
[   45.388288]  ? __pfx_kthread+0x10/0x10
[   45.388965]  ret_from_fork+0x41/0x70
[   45.389559]  ? __pfx_kthread+0x10/0x10
[   45.390257]  ret_from_fork_asm+0x1b/0x30
[   45.390968]  </TASK>
[   45.391332] 
[   45.391687] Allocated by task 172:
[   45.392250]  kasan_save_stack+0x3c/0x60
[   45.392938]  kasan_set_track+0x29/0x40
[   45.393570]  kasan_save_alloc_info+0x22/0x30
[   45.394150]  __kasan_kmalloc+0xb7/0xc0
[   45.394634]  kmalloc_trace+0x4c/0xb0
[   45.395338]  kmalloc_oob_memset_8+0x9f/0x1e0
[   45.396014]  kunit_try_run_case+0x126/0x290
[   45.396703]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.397483]  kthread+0x19e/0x1e0
[   45.398097]  ret_from_fork+0x41/0x70
[   45.398684]  ret_from_fork_asm+0x1b/0x30
[   45.399329] 
[   45.399671] The buggy address belongs to the object at ffff888102425f00
[   45.399671]  which belongs to the cache kmalloc-128 of size 128
[   45.401134] The buggy address is located 113 bytes inside of
[   45.401134]  allocated 120-byte region [ffff888102425f00, ffff888102425f78)
[   45.402599] 
[   45.402983] The buggy address belongs to the physical page:
[   45.403667] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102425
[   45.404781] flags: 0x200000000000800(slab|node=0|zone=2)
[   45.405501] page_type: 0xffffffff()
[   45.406210] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   45.407198] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   45.408163] page dumped because: kasan: bad access detected
[   45.408893] 
[   45.409234] Memory state around the buggy address:
[   45.410057]  ffff888102425e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   45.410993]  ffff888102425e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.411764] >ffff888102425f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   45.412711]                                                                 ^
[   45.413652]  ffff888102425f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.414545]  ffff888102426000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   45.415428] ==================================================================

test log snippet test parser 127

Home

[   45.363863] ==================================================================
[   45.365084] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xdd/0x1e0
[   45.365952] Write of size 8 at addr ffff888102425f71 by task kunit_try_catch/172
[   45.367562] 
[   45.367987] CPU: 1 PID: 172 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   45.369100] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.370254] Call Trace:
[   45.370641]  <TASK>
[   45.371258]  dump_stack_lvl+0x4e/0x90
[   45.371844]  print_report+0xd2/0x660
[   45.372409]  ? __virt_addr_valid+0x156/0x1e0
[   45.373095]  ? kasan_complete_mode_report_info+0x2a/0x200
[   45.373768]  kasan_report+0xff/0x140
[   45.374445]  ? kmalloc_oob_memset_8+0xdd/0x1e0
[   45.375284]  ? kmalloc_oob_memset_8+0xdd/0x1e0
[   45.376075]  kasan_check_range+0x10c/0x1c0
[   45.376765]  __asan_memset+0x27/0x50
[   45.377343]  kmalloc_oob_memset_8+0xdd/0x1e0
[   45.378058]  ? __pfx_kmalloc_oob_memset_8+0x10/0x10
[   45.378901]  ? ret_from_fork+0x41/0x70
[   45.379589]  ? __pfx_kmalloc_oob_memset_8+0x10/0x10
[   45.380353]  ? kunit_try_run_case+0x11b/0x290
[   45.381021]  kunit_try_run_case+0x126/0x290
[   45.381596]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.382411]  ? __kasan_check_write+0x18/0x20
[   45.383161]  ? trace_preempt_on+0x20/0xa0
[   45.383847]  ? __kthread_parkme+0x4f/0xd0
[   45.384543]  ? preempt_count_sub+0x50/0x80
[   45.385251]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.385987]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   45.386821]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.387705]  kthread+0x19e/0x1e0
[   45.388288]  ? __pfx_kthread+0x10/0x10
[   45.388965]  ret_from_fork+0x41/0x70
[   45.389559]  ? __pfx_kthread+0x10/0x10
[   45.390257]  ret_from_fork_asm+0x1b/0x30
[   45.390968]  </TASK>
[   45.391332] 
[   45.391687] Allocated by task 172:
[   45.392250]  kasan_save_stack+0x3c/0x60
[   45.392938]  kasan_set_track+0x29/0x40
[   45.393570]  kasan_save_alloc_info+0x22/0x30
[   45.394150]  __kasan_kmalloc+0xb7/0xc0
[   45.394634]  kmalloc_trace+0x4c/0xb0
[   45.395338]  kmalloc_oob_memset_8+0x9f/0x1e0
[   45.396014]  kunit_try_run_case+0x126/0x290
[   45.396703]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.397483]  kthread+0x19e/0x1e0
[   45.398097]  ret_from_fork+0x41/0x70
[   45.398684]  ret_from_fork_asm+0x1b/0x30
[   45.399329] 
[   45.399671] The buggy address belongs to the object at ffff888102425f00
[   45.399671]  which belongs to the cache kmalloc-128 of size 128
[   45.401134] The buggy address is located 113 bytes inside of
[   45.401134]  allocated 120-byte region [ffff888102425f00, ffff888102425f78)
[   45.402599] 
[   45.402983] The buggy address belongs to the physical page:
[   45.403667] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102425
[   45.404781] flags: 0x200000000000800(slab|node=0|zone=2)
[   45.405501] page_type: 0xffffffff()
[   45.406210] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   45.407198] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   45.408163] page dumped because: kasan: bad access detected
[   45.408893] 
[   45.409234] Memory state around the buggy address:
[   45.410057]  ffff888102425e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   45.410993]  ffff888102425e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.411764] >ffff888102425f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   45.412711]                                                                 ^
[   45.413652]  ffff888102425f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.414545]  ffff888102426000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   45.415428] ==================================================================

test log snippet test parser 128

Home

[   43.459463] ==================================================================
[   43.460090] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x108/0x330
[   43.461172] Write of size 1 at addr ffff888102420b78 by task kunit_try_catch/134
[   43.462596] 
[   43.462853] CPU: 1 PID: 134 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   43.463976] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   43.464994] Call Trace:
[   43.465367]  <TASK>
[   43.465742]  dump_stack_lvl+0x4e/0x90
[   43.466453]  print_report+0xd2/0x660
[   43.467238]  ? __virt_addr_valid+0x156/0x1e0
[   43.467813]  ? kasan_complete_mode_report_info+0x2a/0x200
[   43.469122]  kasan_report+0xff/0x140
[   43.469805]  ? kmalloc_oob_right+0x108/0x330
[   43.470381]  ? kmalloc_oob_right+0x108/0x330
[   43.470970]  __asan_store1+0x69/0x70
[   43.471501]  kmalloc_oob_right+0x108/0x330
[   43.472248]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   43.473196]  ? __schedule+0x70b/0x1190
[   43.473722]  ? ktime_get_ts64+0x118/0x140
[   43.474523]  kunit_try_run_case+0x126/0x290
[   43.475338]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.476254]  ? __kasan_check_write+0x18/0x20
[   43.476801]  ? trace_preempt_on+0x20/0xa0
[   43.477855]  ? __kthread_parkme+0x4f/0xd0
[   43.478646]  ? preempt_count_sub+0x50/0x80
[   43.479412]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.480623]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   43.481457]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   43.482452]  kthread+0x19e/0x1e0
[   43.483368]  ? __pfx_kthread+0x10/0x10
[   43.483923]  ret_from_fork+0x41/0x70
[   43.484615]  ? __pfx_kthread+0x10/0x10
[   43.485574]  ret_from_fork_asm+0x1b/0x30
[   43.486116]  </TASK>
[   43.486685] 
[   43.487030] Allocated by task 134:
[   43.487584]  kasan_save_stack+0x3c/0x60
[   43.488201]  kasan_set_track+0x29/0x40
[   43.488921]  kasan_save_alloc_info+0x22/0x30
[   43.489633]  __kasan_kmalloc+0xb7/0xc0
[   43.490209]  kmalloc_trace+0x4c/0xb0
[   43.490848]  kmalloc_oob_right+0x9f/0x330
[   43.491513]  kunit_try_run_case+0x126/0x290
[   43.492248]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   43.492975]  kthread+0x19e/0x1e0
[   43.493566]  ret_from_fork+0x41/0x70
[   43.494330]  ret_from_fork_asm+0x1b/0x30
[   43.494951] 
[   43.495376] The buggy address belongs to the object at ffff888102420b00
[   43.495376]  which belongs to the cache kmalloc-128 of size 128
[   43.496788] The buggy address is located 5 bytes to the right of
[   43.496788]  allocated 115-byte region [ffff888102420b00, ffff888102420b73)
[   43.498600] 
[   43.498853] The buggy address belongs to the physical page:
[   43.499677] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102420
[   43.500586] flags: 0x200000000000800(slab|node=0|zone=2)
[   43.501511] page_type: 0xffffffff()
[   43.502359] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   43.503473] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   43.504474] page dumped because: kasan: bad access detected
[   43.505253] 
[   43.505593] Memory state around the buggy address:
[   43.506329]  ffff888102420a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.507349]  ffff888102420a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.508164] >ffff888102420b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   43.508938]                                                                 ^
[   43.509795]  ffff888102420b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.510727]  ffff888102420c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.511795] ==================================================================

test log snippet test parser 129

Home

[   43.403809] ==================================================================
[   43.405131] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xcf/0x330
[   43.406666] Write of size 1 at addr ffff888102420b73 by task kunit_try_catch/134
[   43.407404] 
[   43.408465] CPU: 1 PID: 134 Comm: kunit_try_catch Tainted: G                 N 6.6.74-rc1 #1
[   43.409626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   43.411267] Call Trace:
[   43.411740]  <TASK>
[   43.412360]  dump_stack_lvl+0x4e/0x90
[   43.413126]  print_report+0xd2/0x660
[   43.413646]  ? __virt_addr_valid+0x156/0x1e0
[   43.414372]  ? kasan_complete_mode_report_info+0x2a/0x200
[   43.415199]  kasan_report+0xff/0x140
[   43.415681]  ? kmalloc_oob_right+0xcf/0x330
[   43.416415]  ? kmalloc_oob_right+0xcf/0x330
[   43.416997]  __asan_store1+0x69/0x70
[   43.417622]  kmalloc_oob_right+0xcf/0x330
[   43.418185]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   43.418842]  ? __schedule+0x70b/0x1190
[   43.419427]  ? ktime_get_ts64+0x118/0x140
[   43.420122]  kunit_try_run_case+0x126/0x290
[   43.420742]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.421367]  ? __kasan_check_write+0x18/0x20
[   43.422137]  ? trace_preempt_on+0x20/0xa0
[   43.422804]  ? __kthread_parkme+0x4f/0xd0
[   43.423328]  ? preempt_count_sub+0x50/0x80
[   43.424044]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.424795]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   43.425600]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   43.426409]  kthread+0x19e/0x1e0
[   43.426991]  ? __pfx_kthread+0x10/0x10
[   43.427560]  ret_from_fork+0x41/0x70
[   43.428150]  ? __pfx_kthread+0x10/0x10
[   43.428740]  ret_from_fork_asm+0x1b/0x30
[   43.429371]  </TASK>
[   43.429975] 
[   43.430355] Allocated by task 134:
[   43.431080]  kasan_save_stack+0x3c/0x60
[   43.431670]  kasan_set_track+0x29/0x40
[   43.432221]  kasan_save_alloc_info+0x22/0x30
[   43.432839]  __kasan_kmalloc+0xb7/0xc0
[   43.433421]  kmalloc_trace+0x4c/0xb0
[   43.433940]  kmalloc_oob_right+0x9f/0x330
[   43.434553]  kunit_try_run_case+0x126/0x290
[   43.435262]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   43.436021]  kthread+0x19e/0x1e0
[   43.436580]  ret_from_fork+0x41/0x70
[   43.437170]  ret_from_fork_asm+0x1b/0x30
[   43.437850] 
[   43.438275] The buggy address belongs to the object at ffff888102420b00
[   43.438275]  which belongs to the cache kmalloc-128 of size 128
[   43.439823] The buggy address is located 0 bytes to the right of
[   43.439823]  allocated 115-byte region [ffff888102420b00, ffff888102420b73)
[   43.441310] 
[   43.441735] The buggy address belongs to the physical page:
[   43.443050] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102420
[   43.444427] flags: 0x200000000000800(slab|node=0|zone=2)
[   43.445685] page_type: 0xffffffff()
[   43.447048] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   43.447926] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   43.448878] page dumped because: kasan: bad access detected
[   43.449595] 
[   43.449949] Memory state around the buggy address:
[   43.451157]  ffff888102420a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.452035]  ffff888102420a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.452820] >ffff888102420b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   43.453669]                                                              ^
[   43.454718]  ffff888102420b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.455602]  ffff888102420c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.456500] ==================================================================

test log snippet test parser 130

Home

[   43.512989] ==================================================================
[   43.514170] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x144/0x330
[   43.514880] Read of size 1 at addr ffff888102420b80 by task kunit_try_catch/134
[   43.516338] 
[   43.516607] CPU: 1 PID: 134 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   43.517969] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   43.519201] Call Trace:
[   43.519556]  <TASK>
[   43.519945]  dump_stack_lvl+0x4e/0x90
[   43.520514]  print_report+0xd2/0x660
[   43.521278]  ? __virt_addr_valid+0x156/0x1e0
[   43.521985]  ? kasan_complete_mode_report_info+0x2a/0x200
[   43.523007]  kasan_report+0xff/0x140
[   43.523616]  ? kmalloc_oob_right+0x144/0x330
[   43.524428]  ? kmalloc_oob_right+0x144/0x330
[   43.525209]  __asan_load1+0x66/0x70
[   43.525781]  kmalloc_oob_right+0x144/0x330
[   43.526322]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   43.526909]  ? __schedule+0x70b/0x1190
[   43.527458]  ? ktime_get_ts64+0x118/0x140
[   43.528226]  kunit_try_run_case+0x126/0x290
[   43.528889]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.529660]  ? __kasan_check_write+0x18/0x20
[   43.530367]  ? trace_preempt_on+0x20/0xa0
[   43.531003]  ? __kthread_parkme+0x4f/0xd0
[   43.531711]  ? preempt_count_sub+0x50/0x80
[   43.532359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.533045]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   43.533927]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   43.534867]  kthread+0x19e/0x1e0
[   43.535476]  ? __pfx_kthread+0x10/0x10
[   43.536170]  ret_from_fork+0x41/0x70
[   43.536747]  ? __pfx_kthread+0x10/0x10
[   43.537404]  ret_from_fork_asm+0x1b/0x30
[   43.538065]  </TASK>
[   43.538520] 
[   43.538869] Allocated by task 134:
[   43.539566]  kasan_save_stack+0x3c/0x60
[   43.540203]  kasan_set_track+0x29/0x40
[   43.540737]  kasan_save_alloc_info+0x22/0x30
[   43.541409]  __kasan_kmalloc+0xb7/0xc0
[   43.542038]  kmalloc_trace+0x4c/0xb0
[   43.542779]  kmalloc_oob_right+0x9f/0x330
[   43.543398]  kunit_try_run_case+0x126/0x290
[   43.544157]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   43.544875]  kthread+0x19e/0x1e0
[   43.545510]  ret_from_fork+0x41/0x70
[   43.546170]  ret_from_fork_asm+0x1b/0x30
[   43.546860] 
[   43.547268] The buggy address belongs to the object at ffff888102420b00
[   43.547268]  which belongs to the cache kmalloc-128 of size 128
[   43.548716] The buggy address is located 13 bytes to the right of
[   43.548716]  allocated 115-byte region [ffff888102420b00, ffff888102420b73)
[   43.550135] 
[   43.550477] The buggy address belongs to the physical page:
[   43.551204] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102420
[   43.552554] flags: 0x200000000000800(slab|node=0|zone=2)
[   43.553357] page_type: 0xffffffff()
[   43.553900] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   43.554836] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   43.555666] page dumped because: kasan: bad access detected
[   43.556259] 
[   43.556569] Memory state around the buggy address:
[   43.557379]  ffff888102420a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.558384]  ffff888102420b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   43.559635] >ffff888102420b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.560203]                    ^
[   43.560666]  ffff888102420c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.562265]  ffff888102420c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.563749] ==================================================================

test log snippet test parser 131

Home

[   43.709160] ==================================================================
[   43.710486] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0xab/0x1c0
[   43.711509] Write of size 1 at addr ffff8881020b600a by task kunit_try_catch/140
[   43.712676] 
[   43.713013] CPU: 1 PID: 140 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   43.714113] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   43.715375] Call Trace:
[   43.715852]  <TASK>
[   43.716410]  dump_stack_lvl+0x4e/0x90
[   43.717185]  print_report+0xd2/0x660
[   43.717869]  ? __virt_addr_valid+0x156/0x1e0
[   43.718436]  ? kasan_addr_to_slab+0x11/0xb0
[   43.719130]  kasan_report+0xff/0x140
[   43.719662]  ? kmalloc_pagealloc_oob_right+0xab/0x1c0
[   43.720375]  ? kmalloc_pagealloc_oob_right+0xab/0x1c0
[   43.721026]  __asan_store1+0x69/0x70
[   43.721700]  kmalloc_pagealloc_oob_right+0xab/0x1c0
[   43.722332]  ? __pfx_kmalloc_pagealloc_oob_right+0x10/0x10
[   43.723423]  ? __schedule+0x70b/0x1190
[   43.724055]  ? ktime_get_ts64+0x118/0x140
[   43.724603]  kunit_try_run_case+0x126/0x290
[   43.725170]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.725814]  ? __kasan_check_write+0x18/0x20
[   43.726516]  ? trace_preempt_on+0x20/0xa0
[   43.727213]  ? __kthread_parkme+0x4f/0xd0
[   43.727764]  ? preempt_count_sub+0x50/0x80
[   43.728301]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.729426]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   43.730434]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   43.731417]  kthread+0x19e/0x1e0
[   43.732461]  ? __pfx_kthread+0x10/0x10
[   43.733179]  ret_from_fork+0x41/0x70
[   43.733678]  ? __pfx_kthread+0x10/0x10
[   43.734430]  ret_from_fork_asm+0x1b/0x30
[   43.735550]  </TASK>
[   43.735853] 
[   43.736548] The buggy address belongs to the physical page:
[   43.737497] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1020b4
[   43.738444] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   43.739415] flags: 0x200000000000040(head|node=0|zone=2)
[   43.740103] page_type: 0xffffffff()
[   43.740649] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   43.741376] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   43.742455] page dumped because: kasan: bad access detected
[   43.743598] 
[   43.743843] Memory state around the buggy address:
[   43.744398]  ffff8881020b5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   43.745559]  ffff8881020b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   43.746599] >ffff8881020b6000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   43.748059]                       ^
[   43.748478]  ffff8881020b6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   43.749612]  ffff8881020b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   43.750673] ==================================================================

test log snippet test parser 132

Home

[   45.874513] ==================================================================
[   45.876816] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xdd/0x260
[   45.877695] Read of size 1 at addr ffff88810242c0c8 by task kunit_try_catch/192
[   45.878364] 
[   45.879255] CPU: 1 PID: 192 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   45.880834] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.882078] Call Trace:
[   45.882440]  <TASK>
[   45.883288]  dump_stack_lvl+0x4e/0x90
[   45.884328]  print_report+0xd2/0x660
[   45.885403]  ? __virt_addr_valid+0x156/0x1e0
[   45.886200]  ? kasan_complete_mode_report_info+0x2a/0x200
[   45.886928]  kasan_report+0xff/0x140
[   45.887486]  ? kmem_cache_oob+0xdd/0x260
[   45.888094]  ? kmem_cache_oob+0xdd/0x260
[   45.888761]  __asan_load1+0x66/0x70
[   45.889203]  kmem_cache_oob+0xdd/0x260
[   45.890966]  ? __pfx_kmem_cache_oob+0x10/0x10
[   45.891549]  ? __schedule+0x70b/0x1190
[   45.892558]  ? ktime_get_ts64+0x118/0x140
[   45.893301]  kunit_try_run_case+0x126/0x290
[   45.894548]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.895642]  ? __kasan_check_write+0x18/0x20
[   45.896356]  ? trace_preempt_on+0x20/0xa0
[   45.897038]  ? __kthread_parkme+0x4f/0xd0
[   45.897605]  ? preempt_count_sub+0x50/0x80
[   45.898781]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.899397]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   45.900252]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.900708]  kthread+0x19e/0x1e0
[   45.901408]  ? __pfx_kthread+0x10/0x10
[   45.902950]  ret_from_fork+0x41/0x70
[   45.903505]  ? __pfx_kthread+0x10/0x10
[   45.904316]  ret_from_fork_asm+0x1b/0x30
[   45.905370]  </TASK>
[   45.906183] 
[   45.906448] Allocated by task 192:
[   45.907074]  kasan_save_stack+0x3c/0x60
[   45.907576]  kasan_set_track+0x29/0x40
[   45.908446]  kasan_save_alloc_info+0x22/0x30
[   45.909279]  __kasan_slab_alloc+0x91/0xa0
[   45.910653]  kmem_cache_alloc+0x180/0x3b0
[   45.911309]  kmem_cache_oob+0xb6/0x260
[   45.912052]  kunit_try_run_case+0x126/0x290
[   45.912798]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.913658]  kthread+0x19e/0x1e0
[   45.914093]  ret_from_fork+0x41/0x70
[   45.914755]  ret_from_fork_asm+0x1b/0x30
[   45.915970] 
[   45.916430] The buggy address belongs to the object at ffff88810242c000
[   45.916430]  which belongs to the cache test_cache of size 200
[   45.918140] The buggy address is located 0 bytes to the right of
[   45.918140]  allocated 200-byte region [ffff88810242c000, ffff88810242c0c8)
[   45.919593] 
[   45.919920] The buggy address belongs to the physical page:
[   45.920398] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10242c
[   45.921767] flags: 0x200000000000800(slab|node=0|zone=2)
[   45.923787] page_type: 0xffffffff()
[   45.924792] raw: 0200000000000800 ffff888101d1f780 dead000000000122 0000000000000000
[   45.925925] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   45.927710] page dumped because: kasan: bad access detected
[   45.928313] 
[   45.928514] Memory state around the buggy address:
[   45.929127]  ffff88810242bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.930669]  ffff88810242c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.931907] >ffff88810242c080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   45.933737]                                               ^
[   45.934583]  ffff88810242c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.935668]  ffff88810242c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.936730] ==================================================================

test log snippet test parser 133

Home

[   44.417369] ==================================================================
[   44.418189] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x294/0x660
[   44.419386] Write of size 1 at addr ffff888100365eeb by task kunit_try_catch/154
[   44.421329] 
[   44.421690] CPU: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   44.422916] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   44.423886] Call Trace:
[   44.424506]  <TASK>
[   44.424891]  dump_stack_lvl+0x4e/0x90
[   44.425590]  print_report+0xd2/0x660
[   44.427373]  ? __virt_addr_valid+0x156/0x1e0
[   44.428146]  ? kasan_complete_mode_report_info+0x2a/0x200
[   44.429228]  kasan_report+0xff/0x140
[   44.429844]  ? krealloc_less_oob_helper+0x294/0x660
[   44.430816]  ? krealloc_less_oob_helper+0x294/0x660
[   44.431692]  __asan_store1+0x69/0x70
[   44.432452]  krealloc_less_oob_helper+0x294/0x660
[   44.433453]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   44.434505]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   44.435574]  ? __schedule+0x70b/0x1190
[   44.436108]  ? ktime_get_ts64+0x118/0x140
[   44.436827]  krealloc_less_oob+0x1c/0x30
[   44.437461]  kunit_try_run_case+0x126/0x290
[   44.438615]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.439252]  ? __kasan_check_write+0x18/0x20
[   44.440048]  ? trace_preempt_on+0x20/0xa0
[   44.441179]  ? __kthread_parkme+0x4f/0xd0
[   44.441750]  ? preempt_count_sub+0x50/0x80
[   44.442602]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.443480]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   44.444616]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   44.445519]  kthread+0x19e/0x1e0
[   44.446316]  ? __pfx_kthread+0x10/0x10
[   44.447513]  ret_from_fork+0x41/0x70
[   44.448211]  ? __pfx_kthread+0x10/0x10
[   44.448843]  ret_from_fork_asm+0x1b/0x30
[   44.449424]  </TASK>
[   44.449883] 
[   44.450214] Allocated by task 154:
[   44.451334]  kasan_save_stack+0x3c/0x60
[   44.451776]  kasan_set_track+0x29/0x40
[   44.452748]  kasan_save_alloc_info+0x22/0x30
[   44.453451]  __kasan_krealloc+0x12f/0x180
[   44.454117]  krealloc+0xc1/0x140
[   44.454361]  krealloc_less_oob_helper+0xe5/0x660
[   44.454884]  krealloc_less_oob+0x1c/0x30
[   44.455804]  kunit_try_run_case+0x126/0x290
[   44.457036]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   44.458131]  kthread+0x19e/0x1e0
[   44.458658]  ret_from_fork+0x41/0x70
[   44.459649]  ret_from_fork_asm+0x1b/0x30
[   44.460515] 
[   44.461087] The buggy address belongs to the object at ffff888100365e00
[   44.461087]  which belongs to the cache kmalloc-256 of size 256
[   44.463003] The buggy address is located 34 bytes to the right of
[   44.463003]  allocated 201-byte region [ffff888100365e00, ffff888100365ec9)
[   44.464797] 
[   44.465744] The buggy address belongs to the physical page:
[   44.466774] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100364
[   44.468441] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   44.469446] flags: 0x200000000000840(slab|head|node=0|zone=2)
[   44.470313] page_type: 0xffffffff()
[   44.470901] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[   44.471807] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   44.473056] page dumped because: kasan: bad access detected
[   44.473941] 
[   44.474444] Memory state around the buggy address:
[   44.475346]  ffff888100365d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.476486]  ffff888100365e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.477641] >ffff888100365e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   44.478607]                                                           ^
[   44.479382]  ffff888100365f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.480642]  ffff888100365f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.481668] ==================================================================
---
[   44.355664] ==================================================================
[   44.356222] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x258/0x660
[   44.358952] Write of size 1 at addr ffff888100365eea by task kunit_try_catch/154
[   44.360258] 
[   44.360575] CPU: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   44.361685] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   44.363163] Call Trace:
[   44.364022]  <TASK>
[   44.364568]  dump_stack_lvl+0x4e/0x90
[   44.365249]  print_report+0xd2/0x660
[   44.365780]  ? __virt_addr_valid+0x156/0x1e0
[   44.366358]  ? kasan_complete_mode_report_info+0x2a/0x200
[   44.367605]  kasan_report+0xff/0x140
[   44.368051]  ? krealloc_less_oob_helper+0x258/0x660
[   44.368746]  ? krealloc_less_oob_helper+0x258/0x660
[   44.369434]  __asan_store1+0x69/0x70
[   44.370819]  krealloc_less_oob_helper+0x258/0x660
[   44.371760]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   44.372491]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   44.373167]  ? __schedule+0x70b/0x1190
[   44.373806]  ? ktime_get_ts64+0x118/0x140
[   44.374407]  krealloc_less_oob+0x1c/0x30
[   44.374988]  kunit_try_run_case+0x126/0x290
[   44.375815]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.376381]  ? __kasan_check_write+0x18/0x20
[   44.377257]  ? trace_preempt_on+0x20/0xa0
[   44.377761]  ? __kthread_parkme+0x4f/0xd0
[   44.379021]  ? preempt_count_sub+0x50/0x80
[   44.379608]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.380317]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   44.381071]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   44.381797]  kthread+0x19e/0x1e0
[   44.382837]  ? __pfx_kthread+0x10/0x10
[   44.383379]  ret_from_fork+0x41/0x70
[   44.384007]  ? __pfx_kthread+0x10/0x10
[   44.384495]  ret_from_fork_asm+0x1b/0x30
[   44.385243]  </TASK>
[   44.385640] 
[   44.385867] Allocated by task 154:
[   44.386432]  kasan_save_stack+0x3c/0x60
[   44.386953]  kasan_set_track+0x29/0x40
[   44.387494]  kasan_save_alloc_info+0x22/0x30
[   44.388879]  __kasan_krealloc+0x12f/0x180
[   44.389796]  krealloc+0xc1/0x140
[   44.390317]  krealloc_less_oob_helper+0xe5/0x660
[   44.390855]  krealloc_less_oob+0x1c/0x30
[   44.391444]  kunit_try_run_case+0x126/0x290
[   44.392594]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   44.393339]  kthread+0x19e/0x1e0
[   44.393876]  ret_from_fork+0x41/0x70
[   44.394500]  ret_from_fork_asm+0x1b/0x30
[   44.395211] 
[   44.395462] The buggy address belongs to the object at ffff888100365e00
[   44.395462]  which belongs to the cache kmalloc-256 of size 256
[   44.397593] The buggy address is located 33 bytes to the right of
[   44.397593]  allocated 201-byte region [ffff888100365e00, ffff888100365ec9)
[   44.399279] 
[   44.399572] The buggy address belongs to the physical page:
[   44.400202] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100364
[   44.401663] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   44.403274] flags: 0x200000000000840(slab|head|node=0|zone=2)
[   44.403914] page_type: 0xffffffff()
[   44.404565] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[   44.405511] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   44.406554] page dumped because: kasan: bad access detected
[   44.407748] 
[   44.408600] Memory state around the buggy address:
[   44.409196]  ffff888100365d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.410079]  ffff888100365e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.411224] >ffff888100365e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   44.412149]                                                           ^
[   44.412955]  ffff888100365f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.413891]  ffff888100365f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.415496] ==================================================================

test log snippet test parser 134

Home

[   44.199590] ==================================================================
[   44.200507] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a6/0x660
[   44.201802] Write of size 1 at addr ffff888100365ed0 by task kunit_try_catch/154
[   44.203058] 
[   44.203351] CPU: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   44.204689] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   44.205976] Call Trace:
[   44.206317]  <TASK>
[   44.206739]  dump_stack_lvl+0x4e/0x90
[   44.207352]  print_report+0xd2/0x660
[   44.207980]  ? __virt_addr_valid+0x156/0x1e0
[   44.208540]  ? kasan_complete_mode_report_info+0x2a/0x200
[   44.209286]  kasan_report+0xff/0x140
[   44.209902]  ? krealloc_less_oob_helper+0x1a6/0x660
[   44.210819]  ? krealloc_less_oob_helper+0x1a6/0x660
[   44.211562]  __asan_store1+0x69/0x70
[   44.212124]  krealloc_less_oob_helper+0x1a6/0x660
[   44.213260]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   44.214089]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   44.214440]  ? __schedule+0x70b/0x1190
[   44.215021]  ? ktime_get_ts64+0x118/0x140
[   44.215908]  krealloc_less_oob+0x1c/0x30
[   44.216665]  kunit_try_run_case+0x126/0x290
[   44.217789]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.218543]  ? __kasan_check_write+0x18/0x20
[   44.219160]  ? trace_preempt_on+0x20/0xa0
[   44.219985]  ? __kthread_parkme+0x4f/0xd0
[   44.221100]  ? preempt_count_sub+0x50/0x80
[   44.221727]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.222513]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   44.223479]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   44.224664]  kthread+0x19e/0x1e0
[   44.225295]  ? __pfx_kthread+0x10/0x10
[   44.226396]  ret_from_fork+0x41/0x70
[   44.227323]  ? __pfx_kthread+0x10/0x10
[   44.228243]  ret_from_fork_asm+0x1b/0x30
[   44.228818]  </TASK>
[   44.229352] 
[   44.229610] Allocated by task 154:
[   44.230225]  kasan_save_stack+0x3c/0x60
[   44.231326]  kasan_set_track+0x29/0x40
[   44.231739]  kasan_save_alloc_info+0x22/0x30
[   44.233178]  __kasan_krealloc+0x12f/0x180
[   44.234687]  krealloc+0xc1/0x140
[   44.235373]  krealloc_less_oob_helper+0xe5/0x660
[   44.236542]  krealloc_less_oob+0x1c/0x30
[   44.237034]  kunit_try_run_case+0x126/0x290
[   44.238572]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   44.239687]  kthread+0x19e/0x1e0
[   44.240572]  ret_from_fork+0x41/0x70
[   44.241182]  ret_from_fork_asm+0x1b/0x30
[   44.241757] 
[   44.242069] The buggy address belongs to the object at ffff888100365e00
[   44.242069]  which belongs to the cache kmalloc-256 of size 256
[   44.246080] The buggy address is located 7 bytes to the right of
[   44.246080]  allocated 201-byte region [ffff888100365e00, ffff888100365ec9)
[   44.249063] 
[   44.249298] The buggy address belongs to the physical page:
[   44.250142] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100364
[   44.251791] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   44.253495] flags: 0x200000000000840(slab|head|node=0|zone=2)
[   44.254426] page_type: 0xffffffff()
[   44.255313] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[   44.257433] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   44.259706] page dumped because: kasan: bad access detected
[   44.260925] 
[   44.261281] Memory state around the buggy address:
[   44.263114]  ffff888100365d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.265158]  ffff888100365e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.267090] >ffff888100365e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   44.268456]                                                  ^
[   44.270047]  ffff888100365f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.271315]  ffff888100365f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.272963] ==================================================================

test log snippet test parser 135

Home

[   44.135215] ==================================================================
[   44.136281] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x146/0x660
[   44.137256] Write of size 1 at addr ffff888100365ec9 by task kunit_try_catch/154
[   44.138217] 
[   44.138563] CPU: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   44.139955] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   44.141037] Call Trace:
[   44.141374]  <TASK>
[   44.142117]  dump_stack_lvl+0x4e/0x90
[   44.143208]  print_report+0xd2/0x660
[   44.143731]  ? __virt_addr_valid+0x156/0x1e0
[   44.144355]  ? kasan_complete_mode_report_info+0x2a/0x200
[   44.145158]  kasan_report+0xff/0x140
[   44.145659]  ? krealloc_less_oob_helper+0x146/0x660
[   44.146384]  ? krealloc_less_oob_helper+0x146/0x660
[   44.147500]  __asan_store1+0x69/0x70
[   44.148037]  krealloc_less_oob_helper+0x146/0x660
[   44.149035]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   44.149671]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   44.150520]  ? __schedule+0x70b/0x1190
[   44.151283]  ? ktime_get_ts64+0x118/0x140
[   44.151935]  krealloc_less_oob+0x1c/0x30
[   44.152520]  kunit_try_run_case+0x126/0x290
[   44.153353]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.154403]  ? __kasan_check_write+0x18/0x20
[   44.155423]  ? trace_preempt_on+0x20/0xa0
[   44.155905]  ? __kthread_parkme+0x4f/0xd0
[   44.156434]  ? preempt_count_sub+0x50/0x80
[   44.157511]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.158229]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   44.159243]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   44.160483]  kthread+0x19e/0x1e0
[   44.161034]  ? __pfx_kthread+0x10/0x10
[   44.161845]  ret_from_fork+0x41/0x70
[   44.162776]  ? __pfx_kthread+0x10/0x10
[   44.163774]  ret_from_fork_asm+0x1b/0x30
[   44.164486]  </TASK>
[   44.165016] 
[   44.165298] Allocated by task 154:
[   44.165708]  kasan_save_stack+0x3c/0x60
[   44.166367]  kasan_set_track+0x29/0x40
[   44.166963]  kasan_save_alloc_info+0x22/0x30
[   44.168063]  __kasan_krealloc+0x12f/0x180
[   44.168477]  krealloc+0xc1/0x140
[   44.169128]  krealloc_less_oob_helper+0xe5/0x660
[   44.170090]  krealloc_less_oob+0x1c/0x30
[   44.170797]  kunit_try_run_case+0x126/0x290
[   44.171681]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   44.173050]  kthread+0x19e/0x1e0
[   44.173548]  ret_from_fork+0x41/0x70
[   44.174119]  ret_from_fork_asm+0x1b/0x30
[   44.174774] 
[   44.175136] The buggy address belongs to the object at ffff888100365e00
[   44.175136]  which belongs to the cache kmalloc-256 of size 256
[   44.177025] The buggy address is located 0 bytes to the right of
[   44.177025]  allocated 201-byte region [ffff888100365e00, ffff888100365ec9)
[   44.179476] 
[   44.179696] The buggy address belongs to the physical page:
[   44.180995] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100364
[   44.182478] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   44.183442] flags: 0x200000000000840(slab|head|node=0|zone=2)
[   44.184347] page_type: 0xffffffff()
[   44.185487] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[   44.186795] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   44.187802] page dumped because: kasan: bad access detected
[   44.188358] 
[   44.188675] Memory state around the buggy address:
[   44.189273]  ffff888100365d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.190666]  ffff888100365e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.192117] >ffff888100365e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   44.192887]                                               ^
[   44.193839]  ffff888100365f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.194888]  ffff888100365f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.196543] ==================================================================

test log snippet test parser 136

Home

[   44.274862] ==================================================================
[   44.276431] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x21a/0x660
[   44.277467] Write of size 1 at addr ffff888100365eda by task kunit_try_catch/154
[   44.279242] 
[   44.279611] CPU: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   44.280684] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   44.282636] Call Trace:
[   44.283086]  <TASK>
[   44.283493]  dump_stack_lvl+0x4e/0x90
[   44.284169]  print_report+0xd2/0x660
[   44.285671]  ? __virt_addr_valid+0x156/0x1e0
[   44.286289]  ? kasan_complete_mode_report_info+0x2a/0x200
[   44.287374]  kasan_report+0xff/0x140
[   44.287897]  ? krealloc_less_oob_helper+0x21a/0x660
[   44.288500]  ? krealloc_less_oob_helper+0x21a/0x660
[   44.289849]  __asan_store1+0x69/0x70
[   44.290827]  krealloc_less_oob_helper+0x21a/0x660
[   44.292321]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   44.293731]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   44.295115]  ? __schedule+0x70b/0x1190
[   44.296005]  ? ktime_get_ts64+0x118/0x140
[   44.297918]  krealloc_less_oob+0x1c/0x30
[   44.298709]  kunit_try_run_case+0x126/0x290
[   44.299469]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.301076]  ? __kasan_check_write+0x18/0x20
[   44.302117]  ? trace_preempt_on+0x20/0xa0
[   44.303663]  ? __kthread_parkme+0x4f/0xd0
[   44.304353]  ? preempt_count_sub+0x50/0x80
[   44.305481]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.306822]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   44.308366]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   44.310326]  kthread+0x19e/0x1e0
[   44.311237]  ? __pfx_kthread+0x10/0x10
[   44.312398]  ret_from_fork+0x41/0x70
[   44.313135]  ? __pfx_kthread+0x10/0x10
[   44.314811]  ret_from_fork_asm+0x1b/0x30
[   44.315958]  </TASK>
[   44.316684] 
[   44.316920] Allocated by task 154:
[   44.317499]  kasan_save_stack+0x3c/0x60
[   44.318659]  kasan_set_track+0x29/0x40
[   44.319331]  kasan_save_alloc_info+0x22/0x30
[   44.320441]  __kasan_krealloc+0x12f/0x180
[   44.321513]  krealloc+0xc1/0x140
[   44.322323]  krealloc_less_oob_helper+0xe5/0x660
[   44.323287]  krealloc_less_oob+0x1c/0x30
[   44.324137]  kunit_try_run_case+0x126/0x290
[   44.325059]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   44.326081]  kthread+0x19e/0x1e0
[   44.326707]  ret_from_fork+0x41/0x70
[   44.327290]  ret_from_fork_asm+0x1b/0x30
[   44.328792] 
[   44.329106] The buggy address belongs to the object at ffff888100365e00
[   44.329106]  which belongs to the cache kmalloc-256 of size 256
[   44.331579] The buggy address is located 17 bytes to the right of
[   44.331579]  allocated 201-byte region [ffff888100365e00, ffff888100365ec9)
[   44.333213] 
[   44.334251] The buggy address belongs to the physical page:
[   44.335542] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100364
[   44.336695] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   44.338764] flags: 0x200000000000840(slab|head|node=0|zone=2)
[   44.339772] page_type: 0xffffffff()
[   44.340564] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[   44.343055] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   44.344002] page dumped because: kasan: bad access detected
[   44.344776] 
[   44.345139] Memory state around the buggy address:
[   44.346299]  ffff888100365d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.348259]  ffff888100365e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.349405] >ffff888100365e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   44.350757]                                                     ^
[   44.351637]  ffff888100365f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.352392]  ffff888100365f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.353694] ==================================================================

test log snippet test parser 137

Home

[   44.636864] ==================================================================
[   44.638067] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a6/0x660
[   44.640017] Write of size 1 at addr ffff8881020be0d0 by task kunit_try_catch/158
[   44.641647] 
[   44.641932] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   44.642880] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   44.644655] Call Trace:
[   44.645275]  <TASK>
[   44.645957]  dump_stack_lvl+0x4e/0x90
[   44.647074]  print_report+0xd2/0x660
[   44.648149]  ? __virt_addr_valid+0x156/0x1e0
[   44.648913]  ? kasan_addr_to_slab+0x11/0xb0
[   44.650086]  kasan_report+0xff/0x140
[   44.650572]  ? krealloc_less_oob_helper+0x1a6/0x660
[   44.651468]  ? krealloc_less_oob_helper+0x1a6/0x660
[   44.652404]  __asan_store1+0x69/0x70
[   44.653233]  krealloc_less_oob_helper+0x1a6/0x660
[   44.654243]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   44.655066]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   44.655656]  ? __schedule+0x70b/0x1190
[   44.656308]  ? ktime_get_ts64+0x118/0x140
[   44.657264]  krealloc_pagealloc_less_oob+0x1c/0x30
[   44.658301]  kunit_try_run_case+0x126/0x290
[   44.658739]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.659972]  ? __kasan_check_write+0x18/0x20
[   44.660743]  ? trace_preempt_on+0x20/0xa0
[   44.661648]  ? __kthread_parkme+0x4f/0xd0
[   44.662360]  ? preempt_count_sub+0x50/0x80
[   44.663428]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.664421]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   44.665671]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   44.666816]  kthread+0x19e/0x1e0
[   44.667571]  ? __pfx_kthread+0x10/0x10
[   44.668184]  ret_from_fork+0x41/0x70
[   44.669626]  ? __pfx_kthread+0x10/0x10
[   44.670094]  ret_from_fork_asm+0x1b/0x30
[   44.670834]  </TASK>
[   44.671544] 
[   44.672037] The buggy address belongs to the physical page:
[   44.672856] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1020bc
[   44.674951] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   44.676104] flags: 0x200000000000040(head|node=0|zone=2)
[   44.677326] page_type: 0xffffffff()
[   44.678122] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   44.679341] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   44.680479] page dumped because: kasan: bad access detected
[   44.681086] 
[   44.681367] Memory state around the buggy address:
[   44.682147]  ffff8881020bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.683189]  ffff8881020be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.684650] >ffff8881020be080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   44.685701]                                                  ^
[   44.686485]  ffff8881020be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   44.687696]  ffff8881020be180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   44.689058] ==================================================================

test log snippet test parser 138

Home

[   44.790844] ==================================================================
[   44.792428] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x294/0x660
[   44.793789] Write of size 1 at addr ffff8881020be0eb by task kunit_try_catch/158
[   44.794697] 
[   44.795033] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   44.796785] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   44.798468] Call Trace:
[   44.798760]  <TASK>
[   44.799462]  dump_stack_lvl+0x4e/0x90
[   44.800011]  print_report+0xd2/0x660
[   44.800854]  ? __virt_addr_valid+0x156/0x1e0
[   44.801933]  ? kasan_addr_to_slab+0x11/0xb0
[   44.802659]  kasan_report+0xff/0x140
[   44.803544]  ? krealloc_less_oob_helper+0x294/0x660
[   44.804687]  ? krealloc_less_oob_helper+0x294/0x660
[   44.805708]  __asan_store1+0x69/0x70
[   44.806615]  krealloc_less_oob_helper+0x294/0x660
[   44.807476]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   44.808924]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   44.809747]  ? __schedule+0x70b/0x1190
[   44.810548]  ? ktime_get_ts64+0x118/0x140
[   44.811282]  krealloc_pagealloc_less_oob+0x1c/0x30
[   44.811896]  kunit_try_run_case+0x126/0x290
[   44.812771]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.813808]  ? __kasan_check_write+0x18/0x20
[   44.814432]  ? trace_preempt_on+0x20/0xa0
[   44.815358]  ? __kthread_parkme+0x4f/0xd0
[   44.816197]  ? preempt_count_sub+0x50/0x80
[   44.816843]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.817578]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   44.818632]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   44.819923]  kthread+0x19e/0x1e0
[   44.820396]  ? __pfx_kthread+0x10/0x10
[   44.820965]  ret_from_fork+0x41/0x70
[   44.821747]  ? __pfx_kthread+0x10/0x10
[   44.822574]  ret_from_fork_asm+0x1b/0x30
[   44.823698]  </TASK>
[   44.824167] 
[   44.824452] The buggy address belongs to the physical page:
[   44.825103] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1020bc
[   44.826911] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   44.828870] flags: 0x200000000000040(head|node=0|zone=2)
[   44.829494] page_type: 0xffffffff()
[   44.829977] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   44.831830] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   44.833188] page dumped because: kasan: bad access detected
[   44.833820] 
[   44.834116] Memory state around the buggy address:
[   44.834731]  ffff8881020bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.835895]  ffff8881020be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.837548] >ffff8881020be080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   44.838447]                                                           ^
[   44.839182]  ffff8881020be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   44.839929]  ffff8881020be180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   44.840772] ==================================================================
---
[   44.741753] ==================================================================
[   44.743019] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x258/0x660
[   44.743793] Write of size 1 at addr ffff8881020be0ea by task kunit_try_catch/158
[   44.744738] 
[   44.745576] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   44.746803] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   44.748018] Call Trace:
[   44.748661]  <TASK>
[   44.749000]  dump_stack_lvl+0x4e/0x90
[   44.749660]  print_report+0xd2/0x660
[   44.750406]  ? __virt_addr_valid+0x156/0x1e0
[   44.751148]  ? kasan_addr_to_slab+0x11/0xb0
[   44.751664]  kasan_report+0xff/0x140
[   44.753017]  ? krealloc_less_oob_helper+0x258/0x660
[   44.753829]  ? krealloc_less_oob_helper+0x258/0x660
[   44.754596]  __asan_store1+0x69/0x70
[   44.755035]  krealloc_less_oob_helper+0x258/0x660
[   44.756150]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   44.756799]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   44.757812]  ? __schedule+0x70b/0x1190
[   44.758408]  ? ktime_get_ts64+0x118/0x140
[   44.759208]  krealloc_pagealloc_less_oob+0x1c/0x30
[   44.759872]  kunit_try_run_case+0x126/0x290
[   44.761027]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.761352]  ? __kasan_check_write+0x18/0x20
[   44.762313]  ? trace_preempt_on+0x20/0xa0
[   44.763251]  ? __kthread_parkme+0x4f/0xd0
[   44.763801]  ? preempt_count_sub+0x50/0x80
[   44.764405]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.765176]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   44.765922]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   44.766969]  kthread+0x19e/0x1e0
[   44.767694]  ? __pfx_kthread+0x10/0x10
[   44.768466]  ret_from_fork+0x41/0x70
[   44.769203]  ? __pfx_kthread+0x10/0x10
[   44.769921]  ret_from_fork_asm+0x1b/0x30
[   44.771170]  </TASK>
[   44.771605] 
[   44.772107] The buggy address belongs to the physical page:
[   44.772787] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1020bc
[   44.774069] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   44.775585] flags: 0x200000000000040(head|node=0|zone=2)
[   44.776381] page_type: 0xffffffff()
[   44.777027] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   44.778245] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   44.779845] page dumped because: kasan: bad access detected
[   44.781221] 
[   44.782060] Memory state around the buggy address:
[   44.782604]  ffff8881020bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.783463]  ffff8881020be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.784234] >ffff8881020be080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   44.785760]                                                           ^
[   44.787348]  ffff8881020be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   44.788833]  ffff8881020be180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   44.789570] ==================================================================

test log snippet test parser 139

Home

[   44.583889] ==================================================================
[   44.585819] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x146/0x660
[   44.586907] Write of size 1 at addr ffff8881020be0c9 by task kunit_try_catch/158
[   44.588774] 
[   44.589303] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   44.590548] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   44.591826] Call Trace:
[   44.592367]  <TASK>
[   44.592921]  dump_stack_lvl+0x4e/0x90
[   44.593509]  print_report+0xd2/0x660
[   44.594408]  ? __virt_addr_valid+0x156/0x1e0
[   44.595439]  ? kasan_addr_to_slab+0x11/0xb0
[   44.596313]  kasan_report+0xff/0x140
[   44.597230]  ? krealloc_less_oob_helper+0x146/0x660
[   44.598485]  ? krealloc_less_oob_helper+0x146/0x660
[   44.599639]  __asan_store1+0x69/0x70
[   44.600553]  krealloc_less_oob_helper+0x146/0x660
[   44.601170]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   44.602899]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   44.603726]  ? __schedule+0x70b/0x1190
[   44.604749]  ? ktime_get_ts64+0x118/0x140
[   44.606181]  krealloc_pagealloc_less_oob+0x1c/0x30
[   44.607379]  kunit_try_run_case+0x126/0x290
[   44.608625]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.609762]  ? __kasan_check_write+0x18/0x20
[   44.610159]  ? trace_preempt_on+0x20/0xa0
[   44.610448]  ? __kthread_parkme+0x4f/0xd0
[   44.610872]  ? preempt_count_sub+0x50/0x80
[   44.612509]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.613454]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   44.614552]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   44.615435]  kthread+0x19e/0x1e0
[   44.616358]  ? __pfx_kthread+0x10/0x10
[   44.617440]  ret_from_fork+0x41/0x70
[   44.618044]  ? __pfx_kthread+0x10/0x10
[   44.618337]  ret_from_fork_asm+0x1b/0x30
[   44.619135]  </TASK>
[   44.619387] 
[   44.619634] The buggy address belongs to the physical page:
[   44.621127] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1020bc
[   44.622048] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   44.622989] flags: 0x200000000000040(head|node=0|zone=2)
[   44.623644] page_type: 0xffffffff()
[   44.624091] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   44.624961] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   44.626296] page dumped because: kasan: bad access detected
[   44.626888] 
[   44.627109] Memory state around the buggy address:
[   44.628323]  ffff8881020bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.629191]  ffff8881020be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.630341] >ffff8881020be080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   44.631409]                                               ^
[   44.632464]  ffff8881020be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   44.634292]  ffff8881020be180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   44.635504] ==================================================================

test log snippet test parser 140

Home

[   44.690740] ==================================================================
[   44.691628] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x21a/0x660
[   44.693290] Write of size 1 at addr ffff8881020be0da by task kunit_try_catch/158
[   44.694864] 
[   44.695256] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   44.696965] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   44.698499] Call Trace:
[   44.699135]  <TASK>
[   44.699459]  dump_stack_lvl+0x4e/0x90
[   44.700146]  print_report+0xd2/0x660
[   44.700690]  ? __virt_addr_valid+0x156/0x1e0
[   44.702125]  ? kasan_addr_to_slab+0x11/0xb0
[   44.702944]  kasan_report+0xff/0x140
[   44.703482]  ? krealloc_less_oob_helper+0x21a/0x660
[   44.704134]  ? krealloc_less_oob_helper+0x21a/0x660
[   44.705498]  __asan_store1+0x69/0x70
[   44.706363]  krealloc_less_oob_helper+0x21a/0x660
[   44.707009]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   44.708133]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   44.708809]  ? __schedule+0x70b/0x1190
[   44.709976]  ? ktime_get_ts64+0x118/0x140
[   44.710591]  krealloc_pagealloc_less_oob+0x1c/0x30
[   44.711482]  kunit_try_run_case+0x126/0x290
[   44.712306]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.713430]  ? __kasan_check_write+0x18/0x20
[   44.714365]  ? trace_preempt_on+0x20/0xa0
[   44.715191]  ? __kthread_parkme+0x4f/0xd0
[   44.716000]  ? preempt_count_sub+0x50/0x80
[   44.716597]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.717623]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   44.718625]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   44.719596]  kthread+0x19e/0x1e0
[   44.720191]  ? __pfx_kthread+0x10/0x10
[   44.721233]  ret_from_fork+0x41/0x70
[   44.721830]  ? __pfx_kthread+0x10/0x10
[   44.722447]  ret_from_fork_asm+0x1b/0x30
[   44.723039]  </TASK>
[   44.723843] 
[   44.724465] The buggy address belongs to the physical page:
[   44.725339] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1020bc
[   44.726634] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   44.727822] flags: 0x200000000000040(head|node=0|zone=2)
[   44.728837] page_type: 0xffffffff()
[   44.729803] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   44.731354] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   44.732729] page dumped because: kasan: bad access detected
[   44.734128] 
[   44.734349] Memory state around the buggy address:
[   44.735164]  ffff8881020bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.735735]  ffff8881020be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.737258] >ffff8881020be080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   44.738181]                                                     ^
[   44.738825]  ffff8881020be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   44.739695]  ffff8881020be180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   44.740493] ==================================================================

test log snippet test parser 141

Home

[   44.491291] ==================================================================
[   44.493125] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x179/0x3b0
[   44.494477] Write of size 1 at addr ffff8881026be0eb by task kunit_try_catch/156
[   44.495287] 
[   44.495658] CPU: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   44.496891] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   44.497930] Call Trace:
[   44.498588]  <TASK>
[   44.499020]  dump_stack_lvl+0x4e/0x90
[   44.499554]  print_report+0xd2/0x660
[   44.500075]  ? __virt_addr_valid+0x156/0x1e0
[   44.500964]  ? kasan_addr_to_slab+0x11/0xb0
[   44.501745]  kasan_report+0xff/0x140
[   44.502317]  ? krealloc_more_oob_helper+0x179/0x3b0
[   44.502800]  ? krealloc_more_oob_helper+0x179/0x3b0
[   44.503616]  __asan_store1+0x69/0x70
[   44.504353]  krealloc_more_oob_helper+0x179/0x3b0
[   44.505035]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   44.505814]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   44.506597]  ? __schedule+0x70b/0x1190
[   44.507262]  ? ktime_get_ts64+0x118/0x140
[   44.508048]  krealloc_pagealloc_more_oob+0x1c/0x30
[   44.508720]  kunit_try_run_case+0x126/0x290
[   44.509277]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.510020]  ? __kasan_check_write+0x18/0x20
[   44.510759]  ? trace_preempt_on+0x20/0xa0
[   44.511330]  ? __kthread_parkme+0x4f/0xd0
[   44.512024]  ? preempt_count_sub+0x50/0x80
[   44.512635]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.513381]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   44.514204]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   44.515021]  kthread+0x19e/0x1e0
[   44.515807]  ? __pfx_kthread+0x10/0x10
[   44.516364]  ret_from_fork+0x41/0x70
[   44.516920]  ? __pfx_kthread+0x10/0x10
[   44.517477]  ret_from_fork_asm+0x1b/0x30
[   44.518173]  </TASK>
[   44.518451] 
[   44.518798] The buggy address belongs to the physical page:
[   44.519515] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026bc
[   44.520588] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   44.521564] flags: 0x200000000000040(head|node=0|zone=2)
[   44.522254] page_type: 0xffffffff()
[   44.522760] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   44.523719] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   44.524661] page dumped because: kasan: bad access detected
[   44.525259] 
[   44.525575] Memory state around the buggy address:
[   44.526174]  ffff8881026bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.526905]  ffff8881026be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.527792] >ffff8881026be080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   44.528626]                                                           ^
[   44.529432]  ffff8881026be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   44.530368]  ffff8881026be180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   44.531242] ==================================================================

test log snippet test parser 142

Home

[   44.067393] ==================================================================
[   44.069636] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x1bb/0x3b0
[   44.070473] Write of size 1 at addr ffff888100365cf0 by task kunit_try_catch/152
[   44.071838] 
[   44.072269] CPU: 0 PID: 152 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   44.073732] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   44.074907] Call Trace:
[   44.075375]  <TASK>
[   44.075812]  dump_stack_lvl+0x4e/0x90
[   44.076332]  print_report+0xd2/0x660
[   44.077322]  ? __virt_addr_valid+0x156/0x1e0
[   44.077945]  ? kasan_complete_mode_report_info+0x2a/0x200
[   44.078919]  kasan_report+0xff/0x140
[   44.079473]  ? krealloc_more_oob_helper+0x1bb/0x3b0
[   44.080912]  ? krealloc_more_oob_helper+0x1bb/0x3b0
[   44.081658]  __asan_store1+0x69/0x70
[   44.082404]  krealloc_more_oob_helper+0x1bb/0x3b0
[   44.083335]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   44.084382]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   44.085682]  ? __schedule+0x70b/0x1190
[   44.086417]  ? ktime_get_ts64+0x118/0x140
[   44.087247]  krealloc_more_oob+0x1c/0x30
[   44.087842]  kunit_try_run_case+0x126/0x290
[   44.088487]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.089044]  ? __kasan_check_write+0x18/0x20
[   44.090179]  ? trace_preempt_on+0x20/0xa0
[   44.090782]  ? __kthread_parkme+0x4f/0xd0
[   44.091282]  ? preempt_count_sub+0x50/0x80
[   44.091958]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.092557]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   44.093864]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   44.094547]  kthread+0x19e/0x1e0
[   44.095026]  ? __pfx_kthread+0x10/0x10
[   44.095653]  ret_from_fork+0x41/0x70
[   44.096096]  ? __pfx_kthread+0x10/0x10
[   44.097276]  ret_from_fork_asm+0x1b/0x30
[   44.098062]  </TASK>
[   44.098325] 
[   44.098621] Allocated by task 152:
[   44.099157]  kasan_save_stack+0x3c/0x60
[   44.099687]  kasan_set_track+0x29/0x40
[   44.100178]  kasan_save_alloc_info+0x22/0x30
[   44.100976]  __kasan_krealloc+0x12f/0x180
[   44.101471]  krealloc+0xc1/0x140
[   44.102052]  krealloc_more_oob_helper+0xe2/0x3b0
[   44.102753]  krealloc_more_oob+0x1c/0x30
[   44.103370]  kunit_try_run_case+0x126/0x290
[   44.104010]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   44.104688]  kthread+0x19e/0x1e0
[   44.105727]  ret_from_fork+0x41/0x70
[   44.106376]  ret_from_fork_asm+0x1b/0x30
[   44.107060] 
[   44.107314] The buggy address belongs to the object at ffff888100365c00
[   44.107314]  which belongs to the cache kmalloc-256 of size 256
[   44.109002] The buggy address is located 5 bytes to the right of
[   44.109002]  allocated 235-byte region [ffff888100365c00, ffff888100365ceb)
[   44.110296] 
[   44.110548] The buggy address belongs to the physical page:
[   44.111266] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100364
[   44.112332] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   44.113163] flags: 0x200000000000840(slab|head|node=0|zone=2)
[   44.113972] page_type: 0xffffffff()
[   44.115579] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[   44.116552] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   44.117380] page dumped because: kasan: bad access detected
[   44.117954] 
[   44.118425] Memory state around the buggy address:
[   44.119411]  ffff888100365b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.120411]  ffff888100365c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.121186] >ffff888100365c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   44.121945]                                                              ^
[   44.123252]  ffff888100365d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.124122]  ffff888100365d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.124894] ==================================================================

test log snippet test parser 143

Home

[   44.534847] ==================================================================
[   44.535691] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x1bb/0x3b0
[   44.536419] Write of size 1 at addr ffff8881026be0f0 by task kunit_try_catch/156
[   44.537336] 
[   44.537619] CPU: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   44.539759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   44.540709] Call Trace:
[   44.540979]  <TASK>
[   44.541444]  dump_stack_lvl+0x4e/0x90
[   44.542355]  print_report+0xd2/0x660
[   44.543102]  ? __virt_addr_valid+0x156/0x1e0
[   44.543672]  ? kasan_addr_to_slab+0x11/0xb0
[   44.544252]  kasan_report+0xff/0x140
[   44.544760]  ? krealloc_more_oob_helper+0x1bb/0x3b0
[   44.545375]  ? krealloc_more_oob_helper+0x1bb/0x3b0
[   44.546300]  __asan_store1+0x69/0x70
[   44.546793]  krealloc_more_oob_helper+0x1bb/0x3b0
[   44.547479]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   44.548261]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   44.549005]  ? __schedule+0x70b/0x1190
[   44.549633]  ? ktime_get_ts64+0x118/0x140
[   44.550224]  krealloc_pagealloc_more_oob+0x1c/0x30
[   44.550966]  kunit_try_run_case+0x126/0x290
[   44.551642]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.552308]  ? __kasan_check_write+0x18/0x20
[   44.552950]  ? trace_preempt_on+0x20/0xa0
[   44.553506]  ? __kthread_parkme+0x4f/0xd0
[   44.554148]  ? preempt_count_sub+0x50/0x80
[   44.554814]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.555469]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   44.556290]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   44.557100]  kthread+0x19e/0x1e0
[   44.557503]  ? __pfx_kthread+0x10/0x10
[   44.558203]  ret_from_fork+0x41/0x70
[   44.558813]  ? __pfx_kthread+0x10/0x10
[   44.559325]  ret_from_fork_asm+0x1b/0x30
[   44.560052]  </TASK>
[   44.560492] 
[   44.560758] The buggy address belongs to the physical page:
[   44.561398] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026bc
[   44.562505] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   44.563485] flags: 0x200000000000040(head|node=0|zone=2)
[   44.564148] page_type: 0xffffffff()
[   44.564671] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   44.565418] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   44.566437] page dumped because: kasan: bad access detected
[   44.567369] 
[   44.567803] Memory state around the buggy address:
[   44.568708]  ffff8881026bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.569727]  ffff8881026be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.570971] >ffff8881026be080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   44.571648]                                                              ^
[   44.572795]  ffff8881026be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   44.573850]  ffff8881026be180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   44.574820] ==================================================================

test log snippet test parser 144

Home

[   44.004509] ==================================================================
[   44.005783] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x179/0x3b0
[   44.006857] Write of size 1 at addr ffff888100365ceb by task kunit_try_catch/152
[   44.008197] 
[   44.008598] CPU: 0 PID: 152 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   44.009665] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   44.010634] Call Trace:
[   44.011240]  <TASK>
[   44.011673]  dump_stack_lvl+0x4e/0x90
[   44.012267]  print_report+0xd2/0x660
[   44.012825]  ? __virt_addr_valid+0x156/0x1e0
[   44.013621]  ? kasan_complete_mode_report_info+0x2a/0x200
[   44.014671]  kasan_report+0xff/0x140
[   44.015265]  ? krealloc_more_oob_helper+0x179/0x3b0
[   44.016060]  ? krealloc_more_oob_helper+0x179/0x3b0
[   44.016778]  __asan_store1+0x69/0x70
[   44.017966]  krealloc_more_oob_helper+0x179/0x3b0
[   44.018846]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   44.019721]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   44.020371]  ? __schedule+0x70b/0x1190
[   44.020892]  ? ktime_get_ts64+0x118/0x140
[   44.021409]  krealloc_more_oob+0x1c/0x30
[   44.023010]  kunit_try_run_case+0x126/0x290
[   44.024072]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.025287]  ? __kasan_check_write+0x18/0x20
[   44.026157]  ? trace_preempt_on+0x20/0xa0
[   44.027037]  ? __kthread_parkme+0x4f/0xd0
[   44.027875]  ? preempt_count_sub+0x50/0x80
[   44.029155]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.029898]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   44.031054]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   44.031784]  kthread+0x19e/0x1e0
[   44.032239]  ? __pfx_kthread+0x10/0x10
[   44.033355]  ret_from_fork+0x41/0x70
[   44.034020]  ? __pfx_kthread+0x10/0x10
[   44.034662]  ret_from_fork_asm+0x1b/0x30
[   44.035584]  </TASK>
[   44.036127] 
[   44.036400] Allocated by task 152:
[   44.037234]  kasan_save_stack+0x3c/0x60
[   44.038268]  kasan_set_track+0x29/0x40
[   44.039091]  kasan_save_alloc_info+0x22/0x30
[   44.039665]  __kasan_krealloc+0x12f/0x180
[   44.040208]  krealloc+0xc1/0x140
[   44.041138]  krealloc_more_oob_helper+0xe2/0x3b0
[   44.041731]  krealloc_more_oob+0x1c/0x30
[   44.042688]  kunit_try_run_case+0x126/0x290
[   44.043449]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   44.044556]  kthread+0x19e/0x1e0
[   44.045265]  ret_from_fork+0x41/0x70
[   44.046071]  ret_from_fork_asm+0x1b/0x30
[   44.046771] 
[   44.047089] The buggy address belongs to the object at ffff888100365c00
[   44.047089]  which belongs to the cache kmalloc-256 of size 256
[   44.048329] The buggy address is located 0 bytes to the right of
[   44.048329]  allocated 235-byte region [ffff888100365c00, ffff888100365ceb)
[   44.050633] 
[   44.050958] The buggy address belongs to the physical page:
[   44.051650] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100364
[   44.052738] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   44.053694] flags: 0x200000000000840(slab|head|node=0|zone=2)
[   44.054436] page_type: 0xffffffff()
[   44.055038] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[   44.055973] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   44.056822] page dumped because: kasan: bad access detected
[   44.057764] 
[   44.058032] Memory state around the buggy address:
[   44.058805]  ffff888100365b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.059785]  ffff888100365c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   44.060701] >ffff888100365c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   44.062269]                                                           ^
[   44.063455]  ffff888100365d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.064158]  ffff888100365d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.065273] ==================================================================

test log snippet test parser 145

Home

[   46.822915] ==================================================================
[   46.823718] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x146/0x3b0
[   46.824338] Read of size 1 at addr ffff8881029e1b78 by task kunit_try_catch/208
[   46.824762] 
[   46.824974] CPU: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   46.826361] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   46.828062] Call Trace:
[   46.828450]  <TASK>
[   46.828840]  dump_stack_lvl+0x4e/0x90
[   46.829402]  print_report+0xd2/0x660
[   46.830092]  ? __virt_addr_valid+0x156/0x1e0
[   46.831342]  ? kasan_complete_mode_report_info+0x2a/0x200
[   46.832337]  kasan_report+0xff/0x140
[   46.832855]  ? ksize_unpoisons_memory+0x146/0x3b0
[   46.833679]  ? ksize_unpoisons_memory+0x146/0x3b0
[   46.834318]  __asan_load1+0x66/0x70
[   46.835149]  ksize_unpoisons_memory+0x146/0x3b0
[   46.835730]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   46.836337]  ? sysvec_apic_timer_interrupt+0x94/0xa0
[   46.837176]  ? asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   46.837742]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   46.838254]  ? kunit_try_run_case+0x11b/0x290
[   46.839060]  kunit_try_run_case+0x126/0x290
[   46.839583]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.840246]  ? __kasan_check_write+0x18/0x20
[   46.840917]  ? trace_preempt_on+0x20/0xa0
[   46.841483]  ? __kthread_parkme+0x4f/0xd0
[   46.842088]  ? preempt_count_sub+0x50/0x80
[   46.843086]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.843988]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   46.844808]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   46.845509]  kthread+0x19e/0x1e0
[   46.846110]  ? __pfx_kthread+0x10/0x10
[   46.846952]  ret_from_fork+0x41/0x70
[   46.847500]  ? __pfx_kthread+0x10/0x10
[   46.848236]  ret_from_fork_asm+0x1b/0x30
[   46.849092]  </TASK>
[   46.849473] 
[   46.850021] Allocated by task 208:
[   46.850488]  kasan_save_stack+0x3c/0x60
[   46.851813]  kasan_set_track+0x29/0x40
[   46.852328]  kasan_save_alloc_info+0x22/0x30
[   46.853044]  __kasan_kmalloc+0xb7/0xc0
[   46.853563]  kmalloc_trace+0x4c/0xb0
[   46.854118]  ksize_unpoisons_memory+0xb0/0x3b0
[   46.854959]  kunit_try_run_case+0x126/0x290
[   46.855677]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   46.856435]  kthread+0x19e/0x1e0
[   46.857571]  ret_from_fork+0x41/0x70
[   46.858313]  ret_from_fork_asm+0x1b/0x30
[   46.858947] 
[   46.859666] The buggy address belongs to the object at ffff8881029e1b00
[   46.859666]  which belongs to the cache kmalloc-128 of size 128
[   46.861837] The buggy address is located 5 bytes to the right of
[   46.861837]  allocated 115-byte region [ffff8881029e1b00, ffff8881029e1b73)
[   46.863335] 
[   46.863482] The buggy address belongs to the physical page:
[   46.863823] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e1
[   46.865286] flags: 0x200000000000800(slab|node=0|zone=2)
[   46.866396] page_type: 0xffffffff()
[   46.867203] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   46.868394] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   46.869693] page dumped because: kasan: bad access detected
[   46.870504] 
[   46.871151] Memory state around the buggy address:
[   46.871919]  ffff8881029e1a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   46.872897]  ffff8881029e1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.874289] >ffff8881029e1b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   46.875015]                                                                 ^
[   46.875769]  ffff8881029e1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.877130]  ffff8881029e1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.879215] ==================================================================
---
[   46.880911] ==================================================================
[   46.881638] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x183/0x3b0
[   46.882941] Read of size 1 at addr ffff8881029e1b7f by task kunit_try_catch/208
[   46.884285] 
[   46.884634] CPU: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   46.885768] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   46.886618] Call Trace:
[   46.887747]  <TASK>
[   46.888162]  dump_stack_lvl+0x4e/0x90
[   46.888863]  print_report+0xd2/0x660
[   46.889391]  ? __virt_addr_valid+0x156/0x1e0
[   46.890071]  ? kasan_complete_mode_report_info+0x2a/0x200
[   46.891024]  kasan_report+0xff/0x140
[   46.891978]  ? ksize_unpoisons_memory+0x183/0x3b0
[   46.892716]  ? ksize_unpoisons_memory+0x183/0x3b0
[   46.893904]  __asan_load1+0x66/0x70
[   46.894350]  ksize_unpoisons_memory+0x183/0x3b0
[   46.894865]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   46.895617]  ? sysvec_apic_timer_interrupt+0x94/0xa0
[   46.896368]  ? asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   46.897084]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   46.897739]  ? kunit_try_run_case+0x11b/0x290
[   46.898381]  kunit_try_run_case+0x126/0x290
[   46.899941]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.900506]  ? __kasan_check_write+0x18/0x20
[   46.901182]  ? trace_preempt_on+0x20/0xa0
[   46.901759]  ? __kthread_parkme+0x4f/0xd0
[   46.902269]  ? preempt_count_sub+0x50/0x80
[   46.902983]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.903697]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   46.905592]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   46.906574]  kthread+0x19e/0x1e0
[   46.907333]  ? __pfx_kthread+0x10/0x10
[   46.908267]  ret_from_fork+0x41/0x70
[   46.909574]  ? __pfx_kthread+0x10/0x10
[   46.910418]  ret_from_fork_asm+0x1b/0x30
[   46.911195]  </TASK>
[   46.911590] 
[   46.911908] Allocated by task 208:
[   46.912672]  kasan_save_stack+0x3c/0x60
[   46.913494]  kasan_set_track+0x29/0x40
[   46.914494]  kasan_save_alloc_info+0x22/0x30
[   46.914975]  __kasan_kmalloc+0xb7/0xc0
[   46.915555]  kmalloc_trace+0x4c/0xb0
[   46.916200]  ksize_unpoisons_memory+0xb0/0x3b0
[   46.916959]  kunit_try_run_case+0x126/0x290
[   46.917457]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   46.918697]  kthread+0x19e/0x1e0
[   46.919223]  ret_from_fork+0x41/0x70
[   46.919817]  ret_from_fork_asm+0x1b/0x30
[   46.920661] 
[   46.921078] The buggy address belongs to the object at ffff8881029e1b00
[   46.921078]  which belongs to the cache kmalloc-128 of size 128
[   46.923420] The buggy address is located 12 bytes to the right of
[   46.923420]  allocated 115-byte region [ffff8881029e1b00, ffff8881029e1b73)
[   46.925122] 
[   46.925543] The buggy address belongs to the physical page:
[   46.926841] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e1
[   46.927877] flags: 0x200000000000800(slab|node=0|zone=2)
[   46.928627] page_type: 0xffffffff()
[   46.929444] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   46.930946] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   46.931699] page dumped because: kasan: bad access detected
[   46.932632] 
[   46.932846] Memory state around the buggy address:
[   46.933577]  ffff8881029e1a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   46.934499]  ffff8881029e1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.936146] >ffff8881029e1b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   46.936914]                                                                 ^
[   46.937878]  ffff8881029e1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.939670]  ffff8881029e1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.940434] ==================================================================

test log snippet test parser 146

Home

[   46.766246] ==================================================================
[   46.767715] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x10d/0x3b0
[   46.768505] Read of size 1 at addr ffff8881029e1b73 by task kunit_try_catch/208
[   46.770318] 
[   46.770610] CPU: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   46.771966] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   46.773144] Call Trace:
[   46.773750]  <TASK>
[   46.774191]  dump_stack_lvl+0x4e/0x90
[   46.774500]  print_report+0xd2/0x660
[   46.774796]  ? __virt_addr_valid+0x156/0x1e0
[   46.775702]  ? kasan_complete_mode_report_info+0x2a/0x200
[   46.776676]  kasan_report+0xff/0x140
[   46.777386]  ? ksize_unpoisons_memory+0x10d/0x3b0
[   46.778361]  ? ksize_unpoisons_memory+0x10d/0x3b0
[   46.779016]  __asan_load1+0x66/0x70
[   46.779504]  ksize_unpoisons_memory+0x10d/0x3b0
[   46.780121]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   46.780849]  ? sysvec_apic_timer_interrupt+0x94/0xa0
[   46.781751]  ? asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   46.782703]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   46.783486]  ? kunit_try_run_case+0x11b/0x290
[   46.784167]  kunit_try_run_case+0x126/0x290
[   46.784900]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.786150]  ? __kasan_check_write+0x18/0x20
[   46.786755]  ? trace_preempt_on+0x20/0xa0
[   46.787561]  ? __kthread_parkme+0x4f/0xd0
[   46.788343]  ? preempt_count_sub+0x50/0x80
[   46.789208]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.790121]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   46.791177]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   46.792134]  kthread+0x19e/0x1e0
[   46.792862]  ? __pfx_kthread+0x10/0x10
[   46.793454]  ret_from_fork+0x41/0x70
[   46.794008]  ? __pfx_kthread+0x10/0x10
[   46.794569]  ret_from_fork_asm+0x1b/0x30
[   46.795279]  </TASK>
[   46.795706] 
[   46.796278] Allocated by task 208:
[   46.796694]  kasan_save_stack+0x3c/0x60
[   46.797517]  kasan_set_track+0x29/0x40
[   46.798199]  kasan_save_alloc_info+0x22/0x30
[   46.798505]  __kasan_kmalloc+0xb7/0xc0
[   46.799001]  kmalloc_trace+0x4c/0xb0
[   46.799539]  ksize_unpoisons_memory+0xb0/0x3b0
[   46.800042]  kunit_try_run_case+0x126/0x290
[   46.800695]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   46.802278]  kthread+0x19e/0x1e0
[   46.802660]  ret_from_fork+0x41/0x70
[   46.802936]  ret_from_fork_asm+0x1b/0x30
[   46.803237] 
[   46.803373] The buggy address belongs to the object at ffff8881029e1b00
[   46.803373]  which belongs to the cache kmalloc-128 of size 128
[   46.805182] The buggy address is located 0 bytes to the right of
[   46.805182]  allocated 115-byte region [ffff8881029e1b00, ffff8881029e1b73)
[   46.806747] 
[   46.807056] The buggy address belongs to the physical page:
[   46.807715] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e1
[   46.809020] flags: 0x200000000000800(slab|node=0|zone=2)
[   46.809709] page_type: 0xffffffff()
[   46.810289] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   46.811303] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   46.812211] page dumped because: kasan: bad access detected
[   46.813207] 
[   46.813474] Memory state around the buggy address:
[   46.813990]  ffff8881029e1a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   46.814776]  ffff8881029e1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.816022] >ffff8881029e1b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   46.816982]                                                              ^
[   46.818140]  ffff8881029e1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.819085]  ffff8881029e1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.819842] ==================================================================

test log snippet test parser 147

Home

[   47.422621] ==================================================================
[   47.424251] BUG: KASAN: slab-out-of-bounds in memchr+0x27/0x60
[   47.425395] Read of size 1 at addr ffff88810241dfd8 by task kunit_try_catch/218
[   47.426589] 
[   47.427018] CPU: 1 PID: 218 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   47.428448] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.429651] Call Trace:
[   47.430016]  <TASK>
[   47.430428]  dump_stack_lvl+0x4e/0x90
[   47.430973]  print_report+0xd2/0x660
[   47.431945]  ? __virt_addr_valid+0x156/0x1e0
[   47.432753]  ? kasan_complete_mode_report_info+0x2a/0x200
[   47.433465]  kasan_report+0xff/0x140
[   47.433986]  ? memchr+0x27/0x60
[   47.434506]  ? memchr+0x27/0x60
[   47.435207]  __asan_load1+0x66/0x70
[   47.436219]  memchr+0x27/0x60
[   47.436655]  kasan_memchr+0xdd/0x1f0
[   47.437413]  ? __pfx_kasan_memchr+0x10/0x10
[   47.438263]  ? __schedule+0x70b/0x1190
[   47.438832]  ? ktime_get_ts64+0x118/0x140
[   47.439747]  kunit_try_run_case+0x126/0x290
[   47.440418]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.441036]  ? __kasan_check_write+0x18/0x20
[   47.442021]  ? trace_preempt_on+0x20/0xa0
[   47.442710]  ? __kthread_parkme+0x4f/0xd0
[   47.444074]  ? preempt_count_sub+0x50/0x80
[   47.445120]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.445735]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.447110]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.448201]  kthread+0x19e/0x1e0
[   47.448891]  ? __pfx_kthread+0x10/0x10
[   47.450262]  ret_from_fork+0x41/0x70
[   47.450722]  ? __pfx_kthread+0x10/0x10
[   47.451980]  ret_from_fork_asm+0x1b/0x30
[   47.452547]  </TASK>
[   47.453496] 
[   47.453736] Allocated by task 218:
[   47.455185]  kasan_save_stack+0x3c/0x60
[   47.456295]  kasan_set_track+0x29/0x40
[   47.457330]  kasan_save_alloc_info+0x22/0x30
[   47.457752]  __kasan_kmalloc+0xb7/0xc0
[   47.458818]  kmalloc_trace+0x4c/0xb0
[   47.459265]  kasan_memchr+0x9f/0x1f0
[   47.460213]  kunit_try_run_case+0x126/0x290
[   47.461290]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.462075]  kthread+0x19e/0x1e0
[   47.462993]  ret_from_fork+0x41/0x70
[   47.463884]  ret_from_fork_asm+0x1b/0x30
[   47.465047] 
[   47.465556] The buggy address belongs to the object at ffff88810241dfc0
[   47.465556]  which belongs to the cache kmalloc-32 of size 32
[   47.467448] The buggy address is located 0 bytes to the right of
[   47.467448]  allocated 24-byte region [ffff88810241dfc0, ffff88810241dfd8)
[   47.469941] 
[   47.470582] The buggy address belongs to the physical page:
[   47.471459] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10241d
[   47.473324] flags: 0x200000000000800(slab|node=0|zone=2)
[   47.473961] page_type: 0xffffffff()
[   47.474571] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[   47.475634] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   47.476888] page dumped because: kasan: bad access detected
[   47.477655] 
[   47.478247] Memory state around the buggy address:
[   47.479278]  ffff88810241de80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   47.480377]  ffff88810241df00: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[   47.481255] >ffff88810241df80: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   47.482388]                                                     ^
[   47.483642]  ffff88810241e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.484753]  ffff88810241e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.486113] ==================================================================

test log snippet test parser 148

Home

[   47.493831] ==================================================================
[   47.495591] BUG: KASAN: slab-out-of-bounds in memcmp+0x3d/0xb0
[   47.496460] Read of size 1 at addr ffff888102a1d018 by task kunit_try_catch/220
[   47.497265] 
[   47.497776] CPU: 1 PID: 220 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   47.499401] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.501105] Call Trace:
[   47.501446]  <TASK>
[   47.501779]  dump_stack_lvl+0x4e/0x90
[   47.502727]  print_report+0xd2/0x660
[   47.503340]  ? __virt_addr_valid+0x156/0x1e0
[   47.504535]  ? kasan_complete_mode_report_info+0x2a/0x200
[   47.505377]  kasan_report+0xff/0x140
[   47.506136]  ? memcmp+0x3d/0xb0
[   47.506828]  ? memcmp+0x3d/0xb0
[   47.507297]  __asan_load1+0x66/0x70
[   47.508165]  memcmp+0x3d/0xb0
[   47.508669]  kasan_memcmp+0x100/0x230
[   47.509417]  ? __pfx_kasan_memcmp+0x10/0x10
[   47.510243]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   47.511350]  ? ktime_get_ts64+0x118/0x140
[   47.512290]  kunit_try_run_case+0x126/0x290
[   47.513255]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.513843]  ? __kasan_check_write+0x18/0x20
[   47.514472]  ? trace_preempt_on+0x20/0xa0
[   47.515028]  ? __kthread_parkme+0x4f/0xd0
[   47.515659]  ? preempt_count_sub+0x50/0x80
[   47.516351]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.517764]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.518495]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.519457]  kthread+0x19e/0x1e0
[   47.520061]  ? __pfx_kthread+0x10/0x10
[   47.520383]  ret_from_fork+0x41/0x70
[   47.521380]  ? __pfx_kthread+0x10/0x10
[   47.521875]  ret_from_fork_asm+0x1b/0x30
[   47.522767]  </TASK>
[   47.523187] 
[   47.523429] Allocated by task 220:
[   47.524012]  kasan_save_stack+0x3c/0x60
[   47.524956]  kasan_set_track+0x29/0x40
[   47.525675]  kasan_save_alloc_info+0x22/0x30
[   47.526419]  __kasan_kmalloc+0xb7/0xc0
[   47.527013]  kmalloc_trace+0x4c/0xb0
[   47.527661]  kasan_memcmp+0xb0/0x230
[   47.528267]  kunit_try_run_case+0x126/0x290
[   47.529048]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.530271]  kthread+0x19e/0x1e0
[   47.530718]  ret_from_fork+0x41/0x70
[   47.531318]  ret_from_fork_asm+0x1b/0x30
[   47.531820] 
[   47.532173] The buggy address belongs to the object at ffff888102a1d000
[   47.532173]  which belongs to the cache kmalloc-32 of size 32
[   47.534254] The buggy address is located 0 bytes to the right of
[   47.534254]  allocated 24-byte region [ffff888102a1d000, ffff888102a1d018)
[   47.535936] 
[   47.536159] The buggy address belongs to the physical page:
[   47.536812] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1d
[   47.538310] flags: 0x200000000000800(slab|node=0|zone=2)
[   47.538663] page_type: 0xffffffff()
[   47.538967] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[   47.540265] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   47.541140] page dumped because: kasan: bad access detected
[   47.542343] 
[   47.542794] Memory state around the buggy address:
[   47.543646]  ffff888102a1cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.544623]  ffff888102a1cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.545622] >ffff888102a1d000: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.546843]                             ^
[   47.547635]  ffff888102a1d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.548613]  ffff888102a1d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.549411] ==================================================================

test log snippet test parser 149

Home

[   47.769493] ==================================================================
[   47.770371] BUG: KASAN: slab-use-after-free in kasan_strings+0x19b/0x510
[   47.771507] Read of size 1 at addr ffff888102a1d050 by task kunit_try_catch/222
[   47.772513] 
[   47.772702] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   47.773677] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.774785] Call Trace:
[   47.775593]  <TASK>
[   47.776267]  dump_stack_lvl+0x4e/0x90
[   47.776922]  print_report+0xd2/0x660
[   47.777426]  ? __virt_addr_valid+0x156/0x1e0
[   47.778161]  ? kasan_complete_mode_report_info+0x64/0x200
[   47.778979]  kasan_report+0xff/0x140
[   47.779606]  ? kasan_strings+0x19b/0x510
[   47.780487]  ? kasan_strings+0x19b/0x510
[   47.780982]  __asan_load1+0x66/0x70
[   47.781471]  kasan_strings+0x19b/0x510
[   47.781971]  ? __pfx_kasan_strings+0x10/0x10
[   47.782693]  ? __pfx_kasan_strings+0x10/0x10
[   47.783360]  ? kunit_try_run_case+0x11b/0x290
[   47.784683]  kunit_try_run_case+0x126/0x290
[   47.785284]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.785836]  ? __kasan_check_write+0x18/0x20
[   47.786579]  ? trace_preempt_on+0x20/0xa0
[   47.787216]  ? __kthread_parkme+0x4f/0xd0
[   47.788065]  ? preempt_count_sub+0x50/0x80
[   47.788807]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.789418]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.790083]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.790968]  kthread+0x19e/0x1e0
[   47.791384]  ? __pfx_kthread+0x10/0x10
[   47.792435]  ret_from_fork+0x41/0x70
[   47.793023]  ? __pfx_kthread+0x10/0x10
[   47.793804]  ret_from_fork_asm+0x1b/0x30
[   47.794417]  </TASK>
[   47.794855] 
[   47.795166] Allocated by task 222:
[   47.795679]  kasan_save_stack+0x3c/0x60
[   47.796941]  kasan_set_track+0x29/0x40
[   47.797512]  kasan_save_alloc_info+0x22/0x30
[   47.798303]  __kasan_kmalloc+0xb7/0xc0
[   47.798843]  kmalloc_trace+0x4c/0xb0
[   47.799419]  kasan_strings+0x9f/0x510
[   47.800048]  kunit_try_run_case+0x126/0x290
[   47.801101]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.801920]  kthread+0x19e/0x1e0
[   47.802404]  ret_from_fork+0x41/0x70
[   47.803043]  ret_from_fork_asm+0x1b/0x30
[   47.803635] 
[   47.804116] Freed by task 222:
[   47.804887]  kasan_save_stack+0x3c/0x60
[   47.805572]  kasan_set_track+0x29/0x40
[   47.806096]  kasan_save_free_info+0x2f/0x50
[   47.806829]  ____kasan_slab_free+0x172/0x1d0
[   47.807726]  __kasan_slab_free+0x16/0x20
[   47.808427]  __kmem_cache_free+0x190/0x310
[   47.809441]  kfree+0x7c/0x120
[   47.810047]  kasan_strings+0xc3/0x510
[   47.810989]  kunit_try_run_case+0x126/0x290
[   47.811283]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.811655]  kthread+0x19e/0x1e0
[   47.811998]  ret_from_fork+0x41/0x70
[   47.813025]  ret_from_fork_asm+0x1b/0x30
[   47.813645] 
[   47.813967] The buggy address belongs to the object at ffff888102a1d040
[   47.813967]  which belongs to the cache kmalloc-32 of size 32
[   47.816232] The buggy address is located 16 bytes inside of
[   47.816232]  freed 32-byte region [ffff888102a1d040, ffff888102a1d060)
[   47.817362] 
[   47.817750] The buggy address belongs to the physical page:
[   47.818761] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1d
[   47.819982] flags: 0x200000000000800(slab|node=0|zone=2)
[   47.821189] page_type: 0xffffffff()
[   47.821939] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[   47.822772] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   47.823867] page dumped because: kasan: bad access detected
[   47.824792] 
[   47.825181] Memory state around the buggy address:
[   47.825648]  ffff888102a1cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.826726]  ffff888102a1cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.827896] >ffff888102a1d000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   47.829190]                                                  ^
[   47.830189]  ffff888102a1d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.831358]  ffff888102a1d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.832297] ==================================================================

test log snippet test parser 150

Home

[   49.150217] ==================================================================
[   49.151707] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0xd4/0x1d0
[   49.152433] Read of size 1 at addr ffff8881025b8a80 by task kunit_try_catch/228
[   49.154034] 
[   49.154281] CPU: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   49.155490] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   49.156655] Call Trace:
[   49.157424]  <TASK>
[   49.158151]  dump_stack_lvl+0x4e/0x90
[   49.158800]  print_report+0xd2/0x660
[   49.159609]  ? __virt_addr_valid+0x156/0x1e0
[   49.160333]  ? kasan_complete_mode_report_info+0x64/0x200
[   49.161535]  kasan_report+0xff/0x140
[   49.162220]  ? kmalloc_double_kzfree+0xd4/0x1d0
[   49.163044]  ? kmalloc_double_kzfree+0xd4/0x1d0
[   49.163940]  ? kmalloc_double_kzfree+0xd4/0x1d0
[   49.164692]  __kasan_check_byte+0x3d/0x50
[   49.165260]  kfree_sensitive+0x22/0x90
[   49.165801]  kmalloc_double_kzfree+0xd4/0x1d0
[   49.166391]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   49.167099]  ? __schedule+0x70b/0x1190
[   49.168219]  ? ktime_get_ts64+0x118/0x140
[   49.168768]  kunit_try_run_case+0x126/0x290
[   49.169361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.170218]  ? __kasan_check_write+0x18/0x20
[   49.171376]  ? trace_preempt_on+0x20/0xa0
[   49.171953]  ? __kthread_parkme+0x4f/0xd0
[   49.172686]  ? preempt_count_sub+0x50/0x80
[   49.173476]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.174333]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.175912]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.176631]  kthread+0x19e/0x1e0
[   49.177301]  ? __pfx_kthread+0x10/0x10
[   49.178107]  ret_from_fork+0x41/0x70
[   49.178963]  ? __pfx_kthread+0x10/0x10
[   49.179343]  ret_from_fork_asm+0x1b/0x30
[   49.180020]  </TASK>
[   49.180496] 
[   49.180972] Allocated by task 228:
[   49.181593]  kasan_save_stack+0x3c/0x60
[   49.182228]  kasan_set_track+0x29/0x40
[   49.183384]  kasan_save_alloc_info+0x22/0x30
[   49.184271]  __kasan_kmalloc+0xb7/0xc0
[   49.184770]  kmalloc_trace+0x4c/0xb0
[   49.185416]  kmalloc_double_kzfree+0x9d/0x1d0
[   49.186320]  kunit_try_run_case+0x126/0x290
[   49.187835]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.188749]  kthread+0x19e/0x1e0
[   49.189284]  ret_from_fork+0x41/0x70
[   49.189961]  ret_from_fork_asm+0x1b/0x30
[   49.190486] 
[   49.191370] Freed by task 228:
[   49.191920]  kasan_save_stack+0x3c/0x60
[   49.192462]  kasan_set_track+0x29/0x40
[   49.193147]  kasan_save_free_info+0x2f/0x50
[   49.193961]  ____kasan_slab_free+0x172/0x1d0
[   49.194502]  __kasan_slab_free+0x16/0x20
[   49.195756]  __kmem_cache_free+0x190/0x310
[   49.196431]  kfree+0x7c/0x120
[   49.197150]  kfree_sensitive+0x67/0x90
[   49.197778]  kmalloc_double_kzfree+0xbd/0x1d0
[   49.198448]  kunit_try_run_case+0x126/0x290
[   49.199614]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.200331]  kthread+0x19e/0x1e0
[   49.201059]  ret_from_fork+0x41/0x70
[   49.201758]  ret_from_fork_asm+0x1b/0x30
[   49.202352] 
[   49.203101] The buggy address belongs to the object at ffff8881025b8a80
[   49.203101]  which belongs to the cache kmalloc-16 of size 16
[   49.204557] The buggy address is located 0 bytes inside of
[   49.204557]  freed 16-byte region [ffff8881025b8a80, ffff8881025b8a90)
[   49.206136] 
[   49.206478] The buggy address belongs to the physical page:
[   49.207724] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025b8
[   49.208810] flags: 0x200000000000800(slab|node=0|zone=2)
[   49.209443] page_type: 0xffffffff()
[   49.210623] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   49.211848] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   49.212512] page dumped because: kasan: bad access detected
[   49.213117] 
[   49.213394] Memory state around the buggy address:
[   49.214365]  ffff8881025b8980: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   49.215180]  ffff8881025b8a00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   49.217091] >ffff8881025b8a80: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.218129]                    ^
[   49.219219]  ffff8881025b8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.220662]  ffff8881025b8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.221944] ==================================================================

test log snippet test parser 151

Home

[   45.623861] ==================================================================
[   45.626039] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0xd5/0x1d0
[   45.627275] Read of size 1 at addr ffff8881025b8a68 by task kunit_try_catch/180
[   45.628342] 
[   45.628593] CPU: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   45.630431] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.631821] Call Trace:
[   45.632592]  <TASK>
[   45.633423]  dump_stack_lvl+0x4e/0x90
[   45.634392]  print_report+0xd2/0x660
[   45.635111]  ? __virt_addr_valid+0x156/0x1e0
[   45.635912]  ? kasan_complete_mode_report_info+0x64/0x200
[   45.637172]  kasan_report+0xff/0x140
[   45.637860]  ? kmalloc_uaf+0xd5/0x1d0
[   45.639048]  ? kmalloc_uaf+0xd5/0x1d0
[   45.639582]  __asan_load1+0x66/0x70
[   45.640346]  kmalloc_uaf+0xd5/0x1d0
[   45.641292]  ? __pfx_kmalloc_uaf+0x10/0x10
[   45.642149]  ? __schedule+0x70b/0x1190
[   45.642728]  ? ktime_get_ts64+0x118/0x140
[   45.643396]  kunit_try_run_case+0x126/0x290
[   45.644502]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.645605]  ? __kasan_check_write+0x18/0x20
[   45.646185]  ? trace_preempt_on+0x20/0xa0
[   45.647004]  ? __kthread_parkme+0x4f/0xd0
[   45.648041]  ? preempt_count_sub+0x50/0x80
[   45.649140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.649632]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   45.650801]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.651943]  kthread+0x19e/0x1e0
[   45.652412]  ? __pfx_kthread+0x10/0x10
[   45.653256]  ret_from_fork+0x41/0x70
[   45.653835]  ? __pfx_kthread+0x10/0x10
[   45.655317]  ret_from_fork_asm+0x1b/0x30
[   45.656018]  </TASK>
[   45.656226] 
[   45.656364] Allocated by task 180:
[   45.656629]  kasan_save_stack+0x3c/0x60
[   45.658140]  kasan_set_track+0x29/0x40
[   45.658672]  kasan_save_alloc_info+0x22/0x30
[   45.659215]  __kasan_kmalloc+0xb7/0xc0
[   45.660384]  kmalloc_trace+0x4c/0xb0
[   45.661492]  kmalloc_uaf+0x9d/0x1d0
[   45.662777]  kunit_try_run_case+0x126/0x290
[   45.663350]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.664454]  kthread+0x19e/0x1e0
[   45.665236]  ret_from_fork+0x41/0x70
[   45.666450]  ret_from_fork_asm+0x1b/0x30
[   45.667302] 
[   45.668169] Freed by task 180:
[   45.668571]  kasan_save_stack+0x3c/0x60
[   45.669806]  kasan_set_track+0x29/0x40
[   45.670388]  kasan_save_free_info+0x2f/0x50
[   45.671024]  ____kasan_slab_free+0x172/0x1d0
[   45.671752]  __kasan_slab_free+0x16/0x20
[   45.672795]  __kmem_cache_free+0x190/0x310
[   45.673353]  kfree+0x7c/0x120
[   45.674254]  kmalloc_uaf+0xbd/0x1d0
[   45.674955]  kunit_try_run_case+0x126/0x290
[   45.676273]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.677379]  kthread+0x19e/0x1e0
[   45.678406]  ret_from_fork+0x41/0x70
[   45.679395]  ret_from_fork_asm+0x1b/0x30
[   45.680022] 
[   45.680417] The buggy address belongs to the object at ffff8881025b8a60
[   45.680417]  which belongs to the cache kmalloc-16 of size 16
[   45.682384] The buggy address is located 8 bytes inside of
[   45.682384]  freed 16-byte region [ffff8881025b8a60, ffff8881025b8a70)
[   45.684141] 
[   45.684515] The buggy address belongs to the physical page:
[   45.685591] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025b8
[   45.686572] flags: 0x200000000000800(slab|node=0|zone=2)
[   45.687002] page_type: 0xffffffff()
[   45.688413] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   45.689610] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   45.690719] page dumped because: kasan: bad access detected
[   45.691518] 
[   45.691877] Memory state around the buggy address:
[   45.692484]  ffff8881025b8900: 00 03 fc fc 00 02 fc fc 00 05 fc fc 00 02 fc fc
[   45.693559]  ffff8881025b8980: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   45.694683] >ffff8881025b8a00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   45.695974]                                                           ^
[   45.697093]  ffff8881025b8a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.698626]  ffff8881025b8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.699612] ==================================================================

test log snippet test parser 152

Home

[   45.775292] ==================================================================
[   45.776749] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x122/0x2b0
[   45.777655] Read of size 1 at addr ffff888102851e28 by task kunit_try_catch/184
[   45.778559] 
[   45.779188] CPU: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   45.780217] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.781276] Call Trace:
[   45.781752]  <TASK>
[   45.782368]  dump_stack_lvl+0x4e/0x90
[   45.783345]  print_report+0xd2/0x660
[   45.784105]  ? __virt_addr_valid+0x156/0x1e0
[   45.784984]  ? kasan_complete_mode_report_info+0x64/0x200
[   45.785670]  kasan_report+0xff/0x140
[   45.786292]  ? kmalloc_uaf2+0x122/0x2b0
[   45.786871]  ? kmalloc_uaf2+0x122/0x2b0
[   45.787389]  __asan_load1+0x66/0x70
[   45.788015]  kmalloc_uaf2+0x122/0x2b0
[   45.788596]  ? __pfx_kmalloc_uaf2+0x10/0x10
[   45.789730]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   45.790558]  ? __schedule+0x70b/0x1190
[   45.791103]  ? ktime_get_ts64+0x118/0x140
[   45.791695]  kunit_try_run_case+0x126/0x290
[   45.792612]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.793643]  ? __kasan_check_write+0x18/0x20
[   45.794359]  ? trace_preempt_on+0x20/0xa0
[   45.795033]  ? __kthread_parkme+0x4f/0xd0
[   45.795606]  ? preempt_count_sub+0x50/0x80
[   45.796083]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.797041]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   45.797746]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.798637]  kthread+0x19e/0x1e0
[   45.799175]  ? __pfx_kthread+0x10/0x10
[   45.799802]  ret_from_fork+0x41/0x70
[   45.800483]  ? __pfx_kthread+0x10/0x10
[   45.801304]  ret_from_fork_asm+0x1b/0x30
[   45.802135]  </TASK>
[   45.802677] 
[   45.803252] Allocated by task 184:
[   45.803712]  kasan_save_stack+0x3c/0x60
[   45.804591]  kasan_set_track+0x29/0x40
[   45.805406]  kasan_save_alloc_info+0x22/0x30
[   45.805988]  __kasan_kmalloc+0xb7/0xc0
[   45.806586]  kmalloc_trace+0x4c/0xb0
[   45.807275]  kmalloc_uaf2+0xb0/0x2b0
[   45.808125]  kunit_try_run_case+0x126/0x290
[   45.808421]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.809078]  kthread+0x19e/0x1e0
[   45.809697]  ret_from_fork+0x41/0x70
[   45.810129]  ret_from_fork_asm+0x1b/0x30
[   45.811459] 
[   45.812248] Freed by task 184:
[   45.813137]  kasan_save_stack+0x3c/0x60
[   45.813681]  kasan_set_track+0x29/0x40
[   45.814508]  kasan_save_free_info+0x2f/0x50
[   45.815703]  ____kasan_slab_free+0x172/0x1d0
[   45.816258]  __kasan_slab_free+0x16/0x20
[   45.817087]  __kmem_cache_free+0x190/0x310
[   45.817793]  kfree+0x7c/0x120
[   45.818441]  kmalloc_uaf2+0xd0/0x2b0
[   45.819194]  kunit_try_run_case+0x126/0x290
[   45.820022]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.820804]  kthread+0x19e/0x1e0
[   45.821696]  ret_from_fork+0x41/0x70
[   45.822316]  ret_from_fork_asm+0x1b/0x30
[   45.823001] 
[   45.823279] The buggy address belongs to the object at ffff888102851e00
[   45.823279]  which belongs to the cache kmalloc-64 of size 64
[   45.824590] The buggy address is located 40 bytes inside of
[   45.824590]  freed 64-byte region [ffff888102851e00, ffff888102851e40)
[   45.826399] 
[   45.826751] The buggy address belongs to the physical page:
[   45.827339] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102851
[   45.828450] flags: 0x200000000000800(slab|node=0|zone=2)
[   45.829076] page_type: 0xffffffff()
[   45.829631] raw: 0200000000000800 ffff888100041640 dead000000000122 0000000000000000
[   45.830624] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[   45.831546] page dumped because: kasan: bad access detected
[   45.832257] 
[   45.832567] Memory state around the buggy address:
[   45.833261]  ffff888102851d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.834258]  ffff888102851d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.835151] >ffff888102851e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.836097]                                   ^
[   45.836834]  ffff888102851e80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   45.838151]  ffff888102851f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.839097] ==================================================================

test log snippet test parser 153

Home

[   45.775292] ==================================================================
[   45.776749] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x122/0x2b0
[   45.777655] Read of size 1 at addr ffff888102851e28 by task kunit_try_catch/184
[   45.778559] 
[   45.779188] CPU: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   45.780217] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.781276] Call Trace:
[   45.781752]  <TASK>
[   45.782368]  dump_stack_lvl+0x4e/0x90
[   45.783345]  print_report+0xd2/0x660
[   45.784105]  ? __virt_addr_valid+0x156/0x1e0
[   45.784984]  ? kasan_complete_mode_report_info+0x64/0x200
[   45.785670]  kasan_report+0xff/0x140
[   45.786292]  ? kmalloc_uaf2+0x122/0x2b0
[   45.786871]  ? kmalloc_uaf2+0x122/0x2b0
[   45.787389]  __asan_load1+0x66/0x70
[   45.788015]  kmalloc_uaf2+0x122/0x2b0
[   45.788596]  ? __pfx_kmalloc_uaf2+0x10/0x10
[   45.789730]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   45.790558]  ? __schedule+0x70b/0x1190
[   45.791103]  ? ktime_get_ts64+0x118/0x140
[   45.791695]  kunit_try_run_case+0x126/0x290
[   45.792612]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.793643]  ? __kasan_check_write+0x18/0x20
[   45.794359]  ? trace_preempt_on+0x20/0xa0
[   45.795033]  ? __kthread_parkme+0x4f/0xd0
[   45.795606]  ? preempt_count_sub+0x50/0x80
[   45.796083]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.797041]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   45.797746]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.798637]  kthread+0x19e/0x1e0
[   45.799175]  ? __pfx_kthread+0x10/0x10
[   45.799802]  ret_from_fork+0x41/0x70
[   45.800483]  ? __pfx_kthread+0x10/0x10
[   45.801304]  ret_from_fork_asm+0x1b/0x30
[   45.802135]  </TASK>
[   45.802677] 
[   45.803252] Allocated by task 184:
[   45.803712]  kasan_save_stack+0x3c/0x60
[   45.804591]  kasan_set_track+0x29/0x40
[   45.805406]  kasan_save_alloc_info+0x22/0x30
[   45.805988]  __kasan_kmalloc+0xb7/0xc0
[   45.806586]  kmalloc_trace+0x4c/0xb0
[   45.807275]  kmalloc_uaf2+0xb0/0x2b0
[   45.808125]  kunit_try_run_case+0x126/0x290
[   45.808421]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.809078]  kthread+0x19e/0x1e0
[   45.809697]  ret_from_fork+0x41/0x70
[   45.810129]  ret_from_fork_asm+0x1b/0x30
[   45.811459] 
[   45.812248] Freed by task 184:
[   45.813137]  kasan_save_stack+0x3c/0x60
[   45.813681]  kasan_set_track+0x29/0x40
[   45.814508]  kasan_save_free_info+0x2f/0x50
[   45.815703]  ____kasan_slab_free+0x172/0x1d0
[   45.816258]  __kasan_slab_free+0x16/0x20
[   45.817087]  __kmem_cache_free+0x190/0x310
[   45.817793]  kfree+0x7c/0x120
[   45.818441]  kmalloc_uaf2+0xd0/0x2b0
[   45.819194]  kunit_try_run_case+0x126/0x290
[   45.820022]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.820804]  kthread+0x19e/0x1e0
[   45.821696]  ret_from_fork+0x41/0x70
[   45.822316]  ret_from_fork_asm+0x1b/0x30
[   45.823001] 
[   45.823279] The buggy address belongs to the object at ffff888102851e00
[   45.823279]  which belongs to the cache kmalloc-64 of size 64
[   45.824590] The buggy address is located 40 bytes inside of
[   45.824590]  freed 64-byte region [ffff888102851e00, ffff888102851e40)
[   45.826399] 
[   45.826751] The buggy address belongs to the physical page:
[   45.827339] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102851
[   45.828450] flags: 0x200000000000800(slab|node=0|zone=2)
[   45.829076] page_type: 0xffffffff()
[   45.829631] raw: 0200000000000800 ffff888100041640 dead000000000122 0000000000000000
[   45.830624] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[   45.831546] page dumped because: kasan: bad access detected
[   45.832257] 
[   45.832567] Memory state around the buggy address:
[   45.833261]  ffff888102851d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.834258]  ffff888102851d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.835151] >ffff888102851e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.836097]                                   ^
[   45.836834]  ffff888102851e80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   45.838151]  ffff888102851f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.839097] ==================================================================

test log snippet test parser 154

Home

[   45.083351] ==================================================================
[   45.084786] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x108/0x250
[   45.085601] Read of size 16 at addr ffff8881023f9980 by task kunit_try_catch/164
[   45.087245] 
[   45.087489] CPU: 1 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   45.088728] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.090413] Call Trace:
[   45.090795]  <TASK>
[   45.091139]  dump_stack_lvl+0x4e/0x90
[   45.091879]  print_report+0xd2/0x660
[   45.092185]  ? __virt_addr_valid+0x156/0x1e0
[   45.092497]  ? kasan_complete_mode_report_info+0x64/0x200
[   45.093825]  kasan_report+0xff/0x140
[   45.094392]  ? kmalloc_uaf_16+0x108/0x250
[   45.095143]  ? kmalloc_uaf_16+0x108/0x250
[   45.095906]  __asan_load16+0x69/0x90
[   45.096493]  kmalloc_uaf_16+0x108/0x250
[   45.097364]  ? __pfx_kmalloc_uaf_16+0x10/0x10
[   45.098224]  ? __schedule+0x70b/0x1190
[   45.098962]  ? ktime_get_ts64+0x118/0x140
[   45.099748]  kunit_try_run_case+0x126/0x290
[   45.100409]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.101341]  ? __kasan_check_write+0x18/0x20
[   45.102186]  ? trace_preempt_on+0x20/0xa0
[   45.103155]  ? __kthread_parkme+0x4f/0xd0
[   45.104017]  ? preempt_count_sub+0x50/0x80
[   45.104833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.105417]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   45.106479]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.107294]  kthread+0x19e/0x1e0
[   45.108087]  ? __pfx_kthread+0x10/0x10
[   45.108737]  ret_from_fork+0x41/0x70
[   45.109353]  ? __pfx_kthread+0x10/0x10
[   45.110313]  ret_from_fork_asm+0x1b/0x30
[   45.111371]  </TASK>
[   45.111776] 
[   45.112407] Allocated by task 164:
[   45.113286]  kasan_save_stack+0x3c/0x60
[   45.114352]  kasan_set_track+0x29/0x40
[   45.115001]  kasan_save_alloc_info+0x22/0x30
[   45.115941]  __kasan_kmalloc+0xb7/0xc0
[   45.116420]  kmalloc_trace+0x4c/0xb0
[   45.117297]  kmalloc_uaf_16+0xc9/0x250
[   45.118285]  kunit_try_run_case+0x126/0x290
[   45.119144]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.120075]  kthread+0x19e/0x1e0
[   45.120619]  ret_from_fork+0x41/0x70
[   45.121541]  ret_from_fork_asm+0x1b/0x30
[   45.122395] 
[   45.122741] Freed by task 164:
[   45.123730]  kasan_save_stack+0x3c/0x60
[   45.124590]  kasan_set_track+0x29/0x40
[   45.126036]  kasan_save_free_info+0x2f/0x50
[   45.126701]  ____kasan_slab_free+0x172/0x1d0
[   45.127228]  __kasan_slab_free+0x16/0x20
[   45.127967]  __kmem_cache_free+0x190/0x310
[   45.129312]  kfree+0x7c/0x120
[   45.129754]  kmalloc_uaf_16+0xe9/0x250
[   45.130736]  kunit_try_run_case+0x126/0x290
[   45.131383]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.132462]  kthread+0x19e/0x1e0
[   45.133090]  ret_from_fork+0x41/0x70
[   45.133948]  ret_from_fork_asm+0x1b/0x30
[   45.134402] 
[   45.134856] The buggy address belongs to the object at ffff8881023f9980
[   45.134856]  which belongs to the cache kmalloc-16 of size 16
[   45.136462] The buggy address is located 0 bytes inside of
[   45.136462]  freed 16-byte region [ffff8881023f9980, ffff8881023f9990)
[   45.137907] 
[   45.138344] The buggy address belongs to the physical page:
[   45.138956] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[   45.140382] flags: 0x200000000000800(slab|node=0|zone=2)
[   45.141010] page_type: 0xffffffff()
[   45.141628] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   45.142758] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   45.143588] page dumped because: kasan: bad access detected
[   45.144624] 
[   45.145110] Memory state around the buggy address:
[   45.146146]  ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   45.147466]  ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc
[   45.148708] >ffff8881023f9980: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.149905]                    ^
[   45.150504]  ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.151790]  ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.153089] ==================================================================

test log snippet test parser 155

Home

[   45.083351] ==================================================================
[   45.084786] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x108/0x250
[   45.085601] Read of size 16 at addr ffff8881023f9980 by task kunit_try_catch/164
[   45.087245] 
[   45.087489] CPU: 1 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   45.088728] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.090413] Call Trace:
[   45.090795]  <TASK>
[   45.091139]  dump_stack_lvl+0x4e/0x90
[   45.091879]  print_report+0xd2/0x660
[   45.092185]  ? __virt_addr_valid+0x156/0x1e0
[   45.092497]  ? kasan_complete_mode_report_info+0x64/0x200
[   45.093825]  kasan_report+0xff/0x140
[   45.094392]  ? kmalloc_uaf_16+0x108/0x250
[   45.095143]  ? kmalloc_uaf_16+0x108/0x250
[   45.095906]  __asan_load16+0x69/0x90
[   45.096493]  kmalloc_uaf_16+0x108/0x250
[   45.097364]  ? __pfx_kmalloc_uaf_16+0x10/0x10
[   45.098224]  ? __schedule+0x70b/0x1190
[   45.098962]  ? ktime_get_ts64+0x118/0x140
[   45.099748]  kunit_try_run_case+0x126/0x290
[   45.100409]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.101341]  ? __kasan_check_write+0x18/0x20
[   45.102186]  ? trace_preempt_on+0x20/0xa0
[   45.103155]  ? __kthread_parkme+0x4f/0xd0
[   45.104017]  ? preempt_count_sub+0x50/0x80
[   45.104833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.105417]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   45.106479]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.107294]  kthread+0x19e/0x1e0
[   45.108087]  ? __pfx_kthread+0x10/0x10
[   45.108737]  ret_from_fork+0x41/0x70
[   45.109353]  ? __pfx_kthread+0x10/0x10
[   45.110313]  ret_from_fork_asm+0x1b/0x30
[   45.111371]  </TASK>
[   45.111776] 
[   45.112407] Allocated by task 164:
[   45.113286]  kasan_save_stack+0x3c/0x60
[   45.114352]  kasan_set_track+0x29/0x40
[   45.115001]  kasan_save_alloc_info+0x22/0x30
[   45.115941]  __kasan_kmalloc+0xb7/0xc0
[   45.116420]  kmalloc_trace+0x4c/0xb0
[   45.117297]  kmalloc_uaf_16+0xc9/0x250
[   45.118285]  kunit_try_run_case+0x126/0x290
[   45.119144]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.120075]  kthread+0x19e/0x1e0
[   45.120619]  ret_from_fork+0x41/0x70
[   45.121541]  ret_from_fork_asm+0x1b/0x30
[   45.122395] 
[   45.122741] Freed by task 164:
[   45.123730]  kasan_save_stack+0x3c/0x60
[   45.124590]  kasan_set_track+0x29/0x40
[   45.126036]  kasan_save_free_info+0x2f/0x50
[   45.126701]  ____kasan_slab_free+0x172/0x1d0
[   45.127228]  __kasan_slab_free+0x16/0x20
[   45.127967]  __kmem_cache_free+0x190/0x310
[   45.129312]  kfree+0x7c/0x120
[   45.129754]  kmalloc_uaf_16+0xe9/0x250
[   45.130736]  kunit_try_run_case+0x126/0x290
[   45.131383]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.132462]  kthread+0x19e/0x1e0
[   45.133090]  ret_from_fork+0x41/0x70
[   45.133948]  ret_from_fork_asm+0x1b/0x30
[   45.134402] 
[   45.134856] The buggy address belongs to the object at ffff8881023f9980
[   45.134856]  which belongs to the cache kmalloc-16 of size 16
[   45.136462] The buggy address is located 0 bytes inside of
[   45.136462]  freed 16-byte region [ffff8881023f9980, ffff8881023f9990)
[   45.137907] 
[   45.138344] The buggy address belongs to the physical page:
[   45.138956] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[   45.140382] flags: 0x200000000000800(slab|node=0|zone=2)
[   45.141010] page_type: 0xffffffff()
[   45.141628] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[   45.142758] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   45.143588] page dumped because: kasan: bad access detected
[   45.144624] 
[   45.145110] Memory state around the buggy address:
[   45.146146]  ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   45.147466]  ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc
[   45.148708] >ffff8881023f9980: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.149905]                    ^
[   45.150504]  ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.151790]  ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.153089] ==================================================================

test log snippet test parser 156

Home

[   45.710465] ==================================================================
[   45.712047] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0xdb/0x1d0
[   45.712992] Write of size 33 at addr ffff888102851d80 by task kunit_try_catch/182
[   45.714023] 
[   45.714345] CPU: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   45.715668] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.716722] Call Trace:
[   45.717202]  <TASK>
[   45.717648]  dump_stack_lvl+0x4e/0x90
[   45.718319]  print_report+0xd2/0x660
[   45.718912]  ? __virt_addr_valid+0x156/0x1e0
[   45.719634]  ? kasan_complete_mode_report_info+0x64/0x200
[   45.720411]  kasan_report+0xff/0x140
[   45.721007]  ? kmalloc_uaf_memset+0xdb/0x1d0
[   45.721595]  ? kmalloc_uaf_memset+0xdb/0x1d0
[   45.722404]  kasan_check_range+0x10c/0x1c0
[   45.723093]  __asan_memset+0x27/0x50
[   45.723691]  kmalloc_uaf_memset+0xdb/0x1d0
[   45.724334]  ? __pfx_kmalloc_uaf_memset+0x10/0x10
[   45.725040]  ? __pfx_kmalloc_uaf_memset+0x10/0x10
[   45.725667]  ? kunit_try_run_case+0x11b/0x290
[   45.726423]  kunit_try_run_case+0x126/0x290
[   45.727125]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.727818]  ? __kasan_check_write+0x18/0x20
[   45.728513]  ? trace_preempt_on+0x20/0xa0
[   45.729174]  ? __kthread_parkme+0x4f/0xd0
[   45.729933]  ? preempt_count_sub+0x50/0x80
[   45.730594]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.731322]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   45.732172]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.733045]  kthread+0x19e/0x1e0
[   45.733630]  ? __pfx_kthread+0x10/0x10
[   45.734363]  ret_from_fork+0x41/0x70
[   45.734979]  ? __pfx_kthread+0x10/0x10
[   45.735582]  ret_from_fork_asm+0x1b/0x30
[   45.736371]  </TASK>
[   45.736777] 
[   45.737185] Allocated by task 182:
[   45.737637]  kasan_save_stack+0x3c/0x60
[   45.738388]  kasan_set_track+0x29/0x40
[   45.739106]  kasan_save_alloc_info+0x22/0x30
[   45.739917]  __kasan_kmalloc+0xb7/0xc0
[   45.740662]  kmalloc_trace+0x4c/0xb0
[   45.741300]  kmalloc_uaf_memset+0x9d/0x1d0
[   45.741924]  kunit_try_run_case+0x126/0x290
[   45.742506]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.743322]  kthread+0x19e/0x1e0
[   45.743906]  ret_from_fork+0x41/0x70
[   45.744406]  ret_from_fork_asm+0x1b/0x30
[   45.745022] 
[   45.745301] Freed by task 182:
[   45.745718]  kasan_save_stack+0x3c/0x60
[   45.746281]  kasan_set_track+0x29/0x40
[   45.746939]  kasan_save_free_info+0x2f/0x50
[   45.747572]  ____kasan_slab_free+0x172/0x1d0
[   45.748159]  __kasan_slab_free+0x16/0x20
[   45.748805]  __kmem_cache_free+0x190/0x310
[   45.749337]  kfree+0x7c/0x120
[   45.749994]  kmalloc_uaf_memset+0xbd/0x1d0
[   45.750517]  kunit_try_run_case+0x126/0x290
[   45.751219]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   45.751959]  kthread+0x19e/0x1e0
[   45.752490]  ret_from_fork+0x41/0x70
[   45.753016]  ret_from_fork_asm+0x1b/0x30
[   45.753661] 
[   45.753990] The buggy address belongs to the object at ffff888102851d80
[   45.753990]  which belongs to the cache kmalloc-64 of size 64
[   45.755359] The buggy address is located 0 bytes inside of
[   45.755359]  freed 64-byte region [ffff888102851d80, ffff888102851dc0)
[   45.756792] 
[   45.757081] The buggy address belongs to the physical page:
[   45.757772] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102851
[   45.758792] flags: 0x200000000000800(slab|node=0|zone=2)
[   45.759470] page_type: 0xffffffff()
[   45.759993] raw: 0200000000000800 ffff888100041640 dead000000000122 0000000000000000
[   45.760809] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[   45.761654] page dumped because: kasan: bad access detected
[   45.762289] 
[   45.762608] Memory state around the buggy address:
[   45.763294]  ffff888102851c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.764171]  ffff888102851d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.765000] >ffff888102851d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.765745]                    ^
[   45.766289]  ffff888102851e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.767096]  ffff888102851e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.767766] ==================================================================

test log snippet test parser 157

Home

[   47.336051] ==================================================================
[   47.337368] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0xce/0x1d0
[   47.339515] Read of size 1 at addr ffff88810199d640 by task kunit_try_catch/216
[   47.340447] 
[   47.340728] CPU: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   47.341868] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.343283] Call Trace:
[   47.343791]  <TASK>
[   47.344449]  dump_stack_lvl+0x4e/0x90
[   47.345167]  print_report+0xd2/0x660
[   47.345720]  ? __virt_addr_valid+0x156/0x1e0
[   47.346693]  ? kasan_complete_mode_report_info+0x64/0x200
[   47.348146]  kasan_report+0xff/0x140
[   47.348576]  ? kmem_cache_double_destroy+0xce/0x1d0
[   47.349208]  ? kmem_cache_double_destroy+0xce/0x1d0
[   47.349577]  ? kmem_cache_double_destroy+0xce/0x1d0
[   47.349949]  __kasan_check_byte+0x3d/0x50
[   47.350763]  kmem_cache_destroy+0x25/0x170
[   47.352077]  kmem_cache_double_destroy+0xce/0x1d0
[   47.353217]  ? __pfx_kmem_cache_double_destroy+0x10/0x10
[   47.354096]  ? __schedule+0x70b/0x1190
[   47.354544]  ? ktime_get_ts64+0x118/0x140
[   47.355055]  kunit_try_run_case+0x126/0x290
[   47.356077]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.357138]  ? __kasan_check_write+0x18/0x20
[   47.357807]  ? trace_preempt_on+0x20/0xa0
[   47.358364]  ? __kthread_parkme+0x4f/0xd0
[   47.358942]  ? preempt_count_sub+0x50/0x80
[   47.359807]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.360392]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.361434]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.362466]  kthread+0x19e/0x1e0
[   47.363139]  ? __pfx_kthread+0x10/0x10
[   47.364064]  ret_from_fork+0x41/0x70
[   47.364736]  ? __pfx_kthread+0x10/0x10
[   47.365312]  ret_from_fork_asm+0x1b/0x30
[   47.365899]  </TASK>
[   47.366312] 
[   47.366619] Allocated by task 216:
[   47.367208]  kasan_save_stack+0x3c/0x60
[   47.368038]  kasan_set_track+0x29/0x40
[   47.368804]  kasan_save_alloc_info+0x22/0x30
[   47.369581]  __kasan_slab_alloc+0x91/0xa0
[   47.370140]  kmem_cache_alloc+0x180/0x3b0
[   47.370749]  kmem_cache_create_usercopy+0x13e/0x230
[   47.371502]  kmem_cache_create+0x1a/0x20
[   47.372479]  kmem_cache_double_destroy+0x97/0x1d0
[   47.373402]  kunit_try_run_case+0x126/0x290
[   47.374110]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.374750]  kthread+0x19e/0x1e0
[   47.375186]  ret_from_fork+0x41/0x70
[   47.375772]  ret_from_fork_asm+0x1b/0x30
[   47.376382] 
[   47.377303] Freed by task 216:
[   47.378033]  kasan_save_stack+0x3c/0x60
[   47.378619]  kasan_set_track+0x29/0x40
[   47.379506]  kasan_save_free_info+0x2f/0x50
[   47.380211]  ____kasan_slab_free+0x172/0x1d0
[   47.381376]  __kasan_slab_free+0x16/0x20
[   47.381958]  kmem_cache_free+0x1a7/0x4b0
[   47.382461]  slab_kmem_cache_release+0x2e/0x40
[   47.383078]  kmem_cache_release+0x16/0x20
[   47.383968]  kobject_put+0xf6/0x250
[   47.384391]  sysfs_slab_release+0x24/0x30
[   47.385683]  kmem_cache_destroy+0xd2/0x170
[   47.386357]  kmem_cache_double_destroy+0xb7/0x1d0
[   47.387109]  kunit_try_run_case+0x126/0x290
[   47.387681]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.388497]  kthread+0x19e/0x1e0
[   47.389128]  ret_from_fork+0x41/0x70
[   47.389668]  ret_from_fork_asm+0x1b/0x30
[   47.390253] 
[   47.390703] The buggy address belongs to the object at ffff88810199d640
[   47.390703]  which belongs to the cache kmem_cache of size 208
[   47.392332] The buggy address is located 0 bytes inside of
[   47.392332]  freed 208-byte region [ffff88810199d640, ffff88810199d710)
[   47.394506] 
[   47.395103] The buggy address belongs to the physical page:
[   47.396344] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10199d
[   47.397690] flags: 0x200000000000800(slab|node=0|zone=2)
[   47.398513] page_type: 0xffffffff()
[   47.399305] raw: 0200000000000800 ffff888100041000 dead000000000122 0000000000000000
[   47.400423] raw: 0000000000000000 00000000800c000c 00000001ffffffff 0000000000000000
[   47.401967] page dumped because: kasan: bad access detected
[   47.403061] 
[   47.403274] Memory state around the buggy address:
[   47.404071]  ffff88810199d500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.404957]  ffff88810199d580: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   47.406480] >ffff88810199d600: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   47.407873]                                            ^
[   47.408452]  ffff88810199d680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.410160]  ffff88810199d700: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.411243] ==================================================================

test log snippet test parser 158

Home

[   44.928948] ==================================================================
[   44.929573] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x131/0x2e0
[   44.930854] Read of size 1 at addr ffff888100982800 by task kunit_try_catch/160
[   44.932015] 
[   44.932438] CPU: 1 PID: 160 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   44.933635] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   44.935502] Call Trace:
[   44.936122]  <TASK>
[   44.936504]  dump_stack_lvl+0x4e/0x90
[   44.937397]  print_report+0xd2/0x660
[   44.938513]  ? __virt_addr_valid+0x156/0x1e0
[   44.939363]  ? kasan_complete_mode_report_info+0x64/0x200
[   44.940110]  kasan_report+0xff/0x140
[   44.941171]  ? krealloc_uaf+0x131/0x2e0
[   44.941789]  ? krealloc_uaf+0x131/0x2e0
[   44.942994]  __asan_load1+0x66/0x70
[   44.943626]  krealloc_uaf+0x131/0x2e0
[   44.944320]  ? __pfx_krealloc_uaf+0x10/0x10
[   44.945139]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   44.945801]  ? __schedule+0x70b/0x1190
[   44.947188]  ? ktime_get_ts64+0x118/0x140
[   44.947900]  kunit_try_run_case+0x126/0x290
[   44.948464]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.949290]  ? __kasan_check_write+0x18/0x20
[   44.950602]  ? trace_preempt_on+0x20/0xa0
[   44.951278]  ? __kthread_parkme+0x4f/0xd0
[   44.951856]  ? preempt_count_sub+0x50/0x80
[   44.952518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.953597]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   44.955098]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   44.955842]  kthread+0x19e/0x1e0
[   44.956859]  ? __pfx_kthread+0x10/0x10
[   44.957564]  ret_from_fork+0x41/0x70
[   44.958624]  ? __pfx_kthread+0x10/0x10
[   44.959499]  ret_from_fork_asm+0x1b/0x30
[   44.960354]  </TASK>
[   44.961015] 
[   44.961379] Allocated by task 160:
[   44.962272]  kasan_save_stack+0x3c/0x60
[   44.963301]  kasan_set_track+0x29/0x40
[   44.963950]  kasan_save_alloc_info+0x22/0x30
[   44.965000]  __kasan_kmalloc+0xb7/0xc0
[   44.965495]  kmalloc_trace+0x4c/0xb0
[   44.966119]  krealloc_uaf+0xb0/0x2e0
[   44.966722]  kunit_try_run_case+0x126/0x290
[   44.967645]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   44.968820]  kthread+0x19e/0x1e0
[   44.969858]  ret_from_fork+0x41/0x70
[   44.970591]  ret_from_fork_asm+0x1b/0x30
[   44.971638] 
[   44.972024] Freed by task 160:
[   44.972934]  kasan_save_stack+0x3c/0x60
[   44.973836]  kasan_set_track+0x29/0x40
[   44.974573]  kasan_save_free_info+0x2f/0x50
[   44.975396]  ____kasan_slab_free+0x172/0x1d0
[   44.976457]  __kasan_slab_free+0x16/0x20
[   44.977304]  __kmem_cache_free+0x190/0x310
[   44.978312]  kfree+0x7c/0x120
[   44.979203]  krealloc_uaf+0xd0/0x2e0
[   44.979704]  kunit_try_run_case+0x126/0x290
[   44.981071]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   44.982350]  kthread+0x19e/0x1e0
[   44.982903]  ret_from_fork+0x41/0x70
[   44.983850]  ret_from_fork_asm+0x1b/0x30
[   44.984262] 
[   44.984407] The buggy address belongs to the object at ffff888100982800
[   44.984407]  which belongs to the cache kmalloc-256 of size 256
[   44.987234] The buggy address is located 0 bytes inside of
[   44.987234]  freed 256-byte region [ffff888100982800, ffff888100982900)
[   44.989419] 
[   44.990205] The buggy address belongs to the physical page:
[   44.991391] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100982
[   44.992965] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   44.994433] flags: 0x200000000000840(slab|head|node=0|zone=2)
[   44.995519] page_type: 0xffffffff()
[   44.996215] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[   44.998236] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   45.000024] page dumped because: kasan: bad access detected
[   45.001023] 
[   45.001278] Memory state around the buggy address:
[   45.002374]  ffff888100982700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.003713]  ffff888100982780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.005674] >ffff888100982800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   45.006995]                    ^
[   45.007332]  ffff888100982880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   45.008172]  ffff888100982900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.009296] ==================================================================

test log snippet test parser 159

Home

[   44.849615] ==================================================================
[   44.851652] BUG: KASAN: slab-use-after-free in krealloc_uaf+0xf1/0x2e0
[   44.852636] Read of size 1 at addr ffff888100982800 by task kunit_try_catch/160
[   44.853713] 
[   44.854483] CPU: 1 PID: 160 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   44.856147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   44.857651] Call Trace:
[   44.858389]  <TASK>
[   44.858843]  dump_stack_lvl+0x4e/0x90
[   44.859416]  print_report+0xd2/0x660
[   44.860159]  ? __virt_addr_valid+0x156/0x1e0
[   44.861156]  ? kasan_complete_mode_report_info+0x64/0x200
[   44.862301]  kasan_report+0xff/0x140
[   44.863046]  ? krealloc_uaf+0xf1/0x2e0
[   44.863556]  ? krealloc_uaf+0xf1/0x2e0
[   44.864542]  ? krealloc_uaf+0xf1/0x2e0
[   44.865298]  __kasan_check_byte+0x3d/0x50
[   44.865674]  krealloc+0x35/0x140
[   44.866564]  krealloc_uaf+0xf1/0x2e0
[   44.867408]  ? __pfx_krealloc_uaf+0x10/0x10
[   44.868303]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   44.869316]  ? __schedule+0x70b/0x1190
[   44.870231]  ? ktime_get_ts64+0x118/0x140
[   44.870979]  kunit_try_run_case+0x126/0x290
[   44.871554]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.872308]  ? __kasan_check_write+0x18/0x20
[   44.873243]  ? trace_preempt_on+0x20/0xa0
[   44.874044]  ? __kthread_parkme+0x4f/0xd0
[   44.874956]  ? preempt_count_sub+0x50/0x80
[   44.875619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.876470]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   44.877425]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   44.878425]  kthread+0x19e/0x1e0
[   44.879134]  ? __pfx_kthread+0x10/0x10
[   44.879899]  ret_from_fork+0x41/0x70
[   44.880454]  ? __pfx_kthread+0x10/0x10
[   44.881235]  ret_from_fork_asm+0x1b/0x30
[   44.882076]  </TASK>
[   44.882521] 
[   44.883158] Allocated by task 160:
[   44.883710]  kasan_save_stack+0x3c/0x60
[   44.884501]  kasan_set_track+0x29/0x40
[   44.885222]  kasan_save_alloc_info+0x22/0x30
[   44.886287]  __kasan_kmalloc+0xb7/0xc0
[   44.886804]  kmalloc_trace+0x4c/0xb0
[   44.887821]  krealloc_uaf+0xb0/0x2e0
[   44.888330]  kunit_try_run_case+0x126/0x290
[   44.889086]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   44.890230]  kthread+0x19e/0x1e0
[   44.890493]  ret_from_fork+0x41/0x70
[   44.891370]  ret_from_fork_asm+0x1b/0x30
[   44.892225] 
[   44.892450] Freed by task 160:
[   44.893204]  kasan_save_stack+0x3c/0x60
[   44.894093]  kasan_set_track+0x29/0x40
[   44.894673]  kasan_save_free_info+0x2f/0x50
[   44.895582]  ____kasan_slab_free+0x172/0x1d0
[   44.896229]  __kasan_slab_free+0x16/0x20
[   44.897493]  __kmem_cache_free+0x190/0x310
[   44.898134]  kfree+0x7c/0x120
[   44.898540]  krealloc_uaf+0xd0/0x2e0
[   44.898980]  kunit_try_run_case+0x126/0x290
[   44.899491]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   44.900309]  kthread+0x19e/0x1e0
[   44.900902]  ret_from_fork+0x41/0x70
[   44.901369]  ret_from_fork_asm+0x1b/0x30
[   44.902952] 
[   44.903437] The buggy address belongs to the object at ffff888100982800
[   44.903437]  which belongs to the cache kmalloc-256 of size 256
[   44.905392] The buggy address is located 0 bytes inside of
[   44.905392]  freed 256-byte region [ffff888100982800, ffff888100982900)
[   44.907209] 
[   44.907543] The buggy address belongs to the physical page:
[   44.908495] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100982
[   44.909651] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   44.911951] flags: 0x200000000000840(slab|head|node=0|zone=2)
[   44.913016] page_type: 0xffffffff()
[   44.913597] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[   44.914456] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   44.915590] page dumped because: kasan: bad access detected
[   44.916355] 
[   44.916768] Memory state around the buggy address:
[   44.917746]  ffff888100982700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.919312]  ffff888100982780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.920483] >ffff888100982800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   44.921630]                    ^
[   44.922442]  ffff888100982880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   44.923623]  ffff888100982900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.924649] ==================================================================

test log snippet test parser 160

Home

[   47.021375] ==================================================================
[   47.023499] BUG: KASAN: slab-use-after-free in ksize_uaf+0x108/0x310
[   47.024245] Read of size 1 at addr ffff88810242e800 by task kunit_try_catch/210
[   47.024680] 
[   47.024835] CPU: 1 PID: 210 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   47.026093] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.027177] Call Trace:
[   47.028090]  <TASK>
[   47.028840]  dump_stack_lvl+0x4e/0x90
[   47.029610]  print_report+0xd2/0x660
[   47.030478]  ? __virt_addr_valid+0x156/0x1e0
[   47.031189]  ? kasan_complete_mode_report_info+0x64/0x200
[   47.032068]  kasan_report+0xff/0x140
[   47.032636]  ? ksize_uaf+0x108/0x310
[   47.033357]  ? ksize_uaf+0x108/0x310
[   47.033934]  __asan_load1+0x66/0x70
[   47.034351]  ksize_uaf+0x108/0x310
[   47.034890]  ? __pfx_ksize_uaf+0x10/0x10
[   47.035688]  ? __schedule+0x70b/0x1190
[   47.036245]  ? ktime_get_ts64+0x118/0x140
[   47.036790]  kunit_try_run_case+0x126/0x290
[   47.037410]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.038262]  ? __kasan_check_write+0x18/0x20
[   47.038755]  ? trace_preempt_on+0x20/0xa0
[   47.039730]  ? __kthread_parkme+0x4f/0xd0
[   47.040345]  ? preempt_count_sub+0x50/0x80
[   47.040871]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.041510]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.042367]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.043201]  kthread+0x19e/0x1e0
[   47.043788]  ? __pfx_kthread+0x10/0x10
[   47.044614]  ret_from_fork+0x41/0x70
[   47.045196]  ? __pfx_kthread+0x10/0x10
[   47.045940]  ret_from_fork_asm+0x1b/0x30
[   47.046643]  </TASK>
[   47.047072] 
[   47.047378] Allocated by task 210:
[   47.047846]  kasan_save_stack+0x3c/0x60
[   47.048572]  kasan_set_track+0x29/0x40
[   47.049269]  kasan_save_alloc_info+0x22/0x30
[   47.049980]  __kasan_kmalloc+0xb7/0xc0
[   47.050564]  kmalloc_trace+0x4c/0xb0
[   47.051146]  ksize_uaf+0x9d/0x310
[   47.051729]  kunit_try_run_case+0x126/0x290
[   47.052408]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.053284]  kthread+0x19e/0x1e0
[   47.053903]  ret_from_fork+0x41/0x70
[   47.054488]  ret_from_fork_asm+0x1b/0x30
[   47.055142] 
[   47.055418] Freed by task 210:
[   47.055935]  kasan_save_stack+0x3c/0x60
[   47.056605]  kasan_set_track+0x29/0x40
[   47.057165]  kasan_save_free_info+0x2f/0x50
[   47.057978]  ____kasan_slab_free+0x172/0x1d0
[   47.058489]  __kasan_slab_free+0x16/0x20
[   47.059152]  __kmem_cache_free+0x190/0x310
[   47.059768]  kfree+0x7c/0x120
[   47.060317]  ksize_uaf+0xbd/0x310
[   47.060896]  kunit_try_run_case+0x126/0x290
[   47.061604]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.062407]  kthread+0x19e/0x1e0
[   47.063003]  ret_from_fork+0x41/0x70
[   47.063602]  ret_from_fork_asm+0x1b/0x30
[   47.064262] 
[   47.064578] The buggy address belongs to the object at ffff88810242e800
[   47.064578]  which belongs to the cache kmalloc-128 of size 128
[   47.066077] The buggy address is located 0 bytes inside of
[   47.066077]  freed 128-byte region [ffff88810242e800, ffff88810242e880)
[   47.067458] 
[   47.067843] The buggy address belongs to the physical page:
[   47.068589] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10242e
[   47.069782] flags: 0x200000000000800(slab|node=0|zone=2)
[   47.070495] page_type: 0xffffffff()
[   47.071428] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   47.072432] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   47.073336] page dumped because: kasan: bad access detected
[   47.074021] 
[   47.074277] Memory state around the buggy address:
[   47.074883]  ffff88810242e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.075725]  ffff88810242e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.076689] >ffff88810242e800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.077510]                    ^
[   47.077989]  ffff88810242e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.078994]  ffff88810242e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.079935] ==================================================================

test log snippet test parser 161

Home

[   47.081397] ==================================================================
[   47.083353] BUG: KASAN: slab-use-after-free in ksize_uaf+0x140/0x310
[   47.084178] Read of size 1 at addr ffff88810242e878 by task kunit_try_catch/210
[   47.085368] 
[   47.085780] CPU: 1 PID: 210 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   47.087094] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.088214] Call Trace:
[   47.088618]  <TASK>
[   47.089167]  dump_stack_lvl+0x4e/0x90
[   47.089822]  print_report+0xd2/0x660
[   47.090406]  ? __virt_addr_valid+0x156/0x1e0
[   47.091135]  ? kasan_complete_mode_report_info+0x64/0x200
[   47.091941]  kasan_report+0xff/0x140
[   47.092434]  ? ksize_uaf+0x140/0x310
[   47.093137]  ? ksize_uaf+0x140/0x310
[   47.094343]  __asan_load1+0x66/0x70
[   47.094935]  ksize_uaf+0x140/0x310
[   47.095731]  ? __pfx_ksize_uaf+0x10/0x10
[   47.096330]  ? __schedule+0x70b/0x1190
[   47.097024]  ? ktime_get_ts64+0x118/0x140
[   47.097630]  kunit_try_run_case+0x126/0x290
[   47.098259]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.099250]  ? __kasan_check_write+0x18/0x20
[   47.100286]  ? trace_preempt_on+0x20/0xa0
[   47.100866]  ? __kthread_parkme+0x4f/0xd0
[   47.101489]  ? preempt_count_sub+0x50/0x80
[   47.103084]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.103973]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.105086]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.106366]  kthread+0x19e/0x1e0
[   47.107105]  ? __pfx_kthread+0x10/0x10
[   47.107690]  ret_from_fork+0x41/0x70
[   47.108495]  ? __pfx_kthread+0x10/0x10
[   47.109423]  ret_from_fork_asm+0x1b/0x30
[   47.110270]  </TASK>
[   47.110682] 
[   47.110968] Allocated by task 210:
[   47.112164]  kasan_save_stack+0x3c/0x60
[   47.112959]  kasan_set_track+0x29/0x40
[   47.113447]  kasan_save_alloc_info+0x22/0x30
[   47.114077]  __kasan_kmalloc+0xb7/0xc0
[   47.115030]  kmalloc_trace+0x4c/0xb0
[   47.115681]  ksize_uaf+0x9d/0x310
[   47.116111]  kunit_try_run_case+0x126/0x290
[   47.116676]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.117314]  kthread+0x19e/0x1e0
[   47.118766]  ret_from_fork+0x41/0x70
[   47.119497]  ret_from_fork_asm+0x1b/0x30
[   47.120217] 
[   47.120589] Freed by task 210:
[   47.121199]  kasan_save_stack+0x3c/0x60
[   47.121793]  kasan_set_track+0x29/0x40
[   47.122384]  kasan_save_free_info+0x2f/0x50
[   47.122969]  ____kasan_slab_free+0x172/0x1d0
[   47.123954]  __kasan_slab_free+0x16/0x20
[   47.124536]  __kmem_cache_free+0x190/0x310
[   47.125195]  kfree+0x7c/0x120
[   47.125966]  ksize_uaf+0xbd/0x310
[   47.126480]  kunit_try_run_case+0x126/0x290
[   47.126994]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.128316]  kthread+0x19e/0x1e0
[   47.128855]  ret_from_fork+0x41/0x70
[   47.129680]  ret_from_fork_asm+0x1b/0x30
[   47.130646] 
[   47.131128] The buggy address belongs to the object at ffff88810242e800
[   47.131128]  which belongs to the cache kmalloc-128 of size 128
[   47.132978] The buggy address is located 120 bytes inside of
[   47.132978]  freed 128-byte region [ffff88810242e800, ffff88810242e880)
[   47.135673] 
[   47.135928] The buggy address belongs to the physical page:
[   47.136605] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10242e
[   47.137789] flags: 0x200000000000800(slab|node=0|zone=2)
[   47.138877] page_type: 0xffffffff()
[   47.139490] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   47.140496] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   47.141393] page dumped because: kasan: bad access detected
[   47.142552] 
[   47.142890] Memory state around the buggy address:
[   47.143955]  ffff88810242e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.144818]  ffff88810242e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.146191] >ffff88810242e800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.147655]                                                                 ^
[   47.148504]  ffff88810242e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.149723]  ffff88810242e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.150588] ==================================================================

test log snippet test parser 162

Home

[   46.950497] ==================================================================
[   46.951759] BUG: KASAN: slab-use-after-free in ksize_uaf+0xd4/0x310
[   46.952892] Read of size 1 at addr ffff88810242e800 by task kunit_try_catch/210
[   46.953662] 
[   46.954108] CPU: 1 PID: 210 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   46.955322] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   46.956545] Call Trace:
[   46.956925]  <TASK>
[   46.957697]  dump_stack_lvl+0x4e/0x90
[   46.958286]  print_report+0xd2/0x660
[   46.959361]  ? __virt_addr_valid+0x156/0x1e0
[   46.960276]  ? kasan_complete_mode_report_info+0x64/0x200
[   46.961385]  kasan_report+0xff/0x140
[   46.962156]  ? ksize_uaf+0xd4/0x310
[   46.962611]  ? ksize_uaf+0xd4/0x310
[   46.963592]  ? ksize_uaf+0xd4/0x310
[   46.964248]  __kasan_check_byte+0x3d/0x50
[   46.965328]  ksize+0x20/0x60
[   46.966079]  ksize_uaf+0xd4/0x310
[   46.966665]  ? __pfx_ksize_uaf+0x10/0x10
[   46.967471]  ? __schedule+0x70b/0x1190
[   46.968275]  ? ktime_get_ts64+0x118/0x140
[   46.969321]  kunit_try_run_case+0x126/0x290
[   46.970053]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.970918]  ? __kasan_check_write+0x18/0x20
[   46.971503]  ? trace_preempt_on+0x20/0xa0
[   46.972662]  ? __kthread_parkme+0x4f/0xd0
[   46.973514]  ? preempt_count_sub+0x50/0x80
[   46.974317]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.975265]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   46.976176]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   46.977198]  kthread+0x19e/0x1e0
[   46.978056]  ? __pfx_kthread+0x10/0x10
[   46.979032]  ret_from_fork+0x41/0x70
[   46.979816]  ? __pfx_kthread+0x10/0x10
[   46.980401]  ret_from_fork_asm+0x1b/0x30
[   46.981476]  </TASK>
[   46.981894] 
[   46.982133] Allocated by task 210:
[   46.982729]  kasan_save_stack+0x3c/0x60
[   46.983316]  kasan_set_track+0x29/0x40
[   46.983829]  kasan_save_alloc_info+0x22/0x30
[   46.984364]  __kasan_kmalloc+0xb7/0xc0
[   46.984877]  kmalloc_trace+0x4c/0xb0
[   46.986172]  ksize_uaf+0x9d/0x310
[   46.986822]  kunit_try_run_case+0x126/0x290
[   46.987367]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   46.987973]  kthread+0x19e/0x1e0
[   46.988976]  ret_from_fork+0x41/0x70
[   46.989601]  ret_from_fork_asm+0x1b/0x30
[   46.990139] 
[   46.990507] Freed by task 210:
[   46.990885]  kasan_save_stack+0x3c/0x60
[   46.991815]  kasan_set_track+0x29/0x40
[   46.992309]  kasan_save_free_info+0x2f/0x50
[   46.993023]  ____kasan_slab_free+0x172/0x1d0
[   46.993670]  __kasan_slab_free+0x16/0x20
[   46.994310]  __kmem_cache_free+0x190/0x310
[   46.995069]  kfree+0x7c/0x120
[   46.995625]  ksize_uaf+0xbd/0x310
[   46.996425]  kunit_try_run_case+0x126/0x290
[   46.997369]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   46.998289]  kthread+0x19e/0x1e0
[   46.998723]  ret_from_fork+0x41/0x70
[   46.999366]  ret_from_fork_asm+0x1b/0x30
[   47.000004] 
[   47.000483] The buggy address belongs to the object at ffff88810242e800
[   47.000483]  which belongs to the cache kmalloc-128 of size 128
[   47.001975] The buggy address is located 0 bytes inside of
[   47.001975]  freed 128-byte region [ffff88810242e800, ffff88810242e880)
[   47.003221] 
[   47.003796] The buggy address belongs to the physical page:
[   47.004475] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10242e
[   47.005855] flags: 0x200000000000800(slab|node=0|zone=2)
[   47.006837] page_type: 0xffffffff()
[   47.007304] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   47.008412] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   47.009370] page dumped because: kasan: bad access detected
[   47.011000] 
[   47.011240] Memory state around the buggy address:
[   47.011695]  ffff88810242e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.013475]  ffff88810242e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.014441] >ffff88810242e800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.015549]                    ^
[   47.016744]  ffff88810242e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.017809]  ffff88810242e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.019437] ==================================================================

test log snippet test parser 163

Home

[   49.321815] ==================================================================
[   49.323234] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x27/0x40
[   49.324116] Read of size 4 at addr ffff888102857980 by task swapper/0/0
[   49.325222] 
[   49.325606] CPU: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N 6.6.74-rc1 #1
[   49.326668] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   49.327940] Call Trace:
[   49.328790]  <IRQ>
[   49.329300]  dump_stack_lvl+0x4e/0x90
[   49.330300]  print_report+0xd2/0x660
[   49.330974]  ? __virt_addr_valid+0x156/0x1e0
[   49.331812]  ? kasan_complete_mode_report_info+0x64/0x200
[   49.332740]  kasan_report+0xff/0x140
[   49.333406]  ? rcu_uaf_reclaim+0x27/0x40
[   49.334078]  ? rcu_uaf_reclaim+0x27/0x40
[   49.334848]  ? __pfx_rcu_uaf_reclaim+0x10/0x10
[   49.335650]  __asan_load4+0x85/0xb0
[   49.336374]  rcu_uaf_reclaim+0x27/0x40
[   49.337107]  rcu_core+0x4be/0x1020
[   49.337603]  ? rcu_core+0x3ef/0x1020
[   49.338117]  ? __pfx_rcu_core+0x10/0x10
[   49.339054]  ? __pfx_read_tsc+0x10/0x10
[   49.339566]  ? ktime_get+0x55/0xc0
[   49.339999]  ? handle_softirqs+0x12c/0x520
[   49.340731]  rcu_core_si+0x12/0x20
[   49.341438]  handle_softirqs+0x195/0x520
[   49.342351]  ? __pfx_handle_softirqs+0x10/0x10
[   49.342952]  irq_exit_rcu+0x92/0xb0
[   49.343711]  sysvec_apic_timer_interrupt+0x80/0xa0
[   49.344684]  </IRQ>
[   49.344969]  <TASK>
[   49.345675]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   49.346916] RIP: 0010:default_idle+0xf/0x20
[   49.347697] Code: 4c 01 c7 4c 29 c2 e9 72 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d e3 e3 28 00 fb f4 <fa> c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90
[   49.349661] RSP: 0000:ffffffff93407df0 EFLAGS: 00010216
[   49.350596] RAX: ffff88815b4342c0 RBX: ffffffff93418540 RCX: ffffffff923c96c8
[   49.351689] RDX: ffffed102b686859 RSI: 0000000000000004 RDI: 000000000000b41c
[   49.352808] RBP: ffffffff93407df8 R08: 0000000000000001 R09: ffffed102b686858
[   49.353572] R10: ffff88815b4342c3 R11: ffffffff9060325b R12: 0000000000000000
[   49.354609] R13: ffffffff93e158d0 R14: 0000000000000000 R15: ffffffff93418540
[   49.355688]  ? ret_from_fork_asm+0x1b/0x30
[   49.356242]  ? ct_kernel_exit.constprop.0+0xa8/0xd0
[   49.356743]  ? arch_cpu_idle+0xd/0x20
[   49.357298]  default_idle_call+0x42/0x70
[   49.357880]  do_idle+0x2ba/0x310
[   49.358640]  ? __pfx_do_idle+0x10/0x10
[   49.359142]  ? trace_preempt_on+0x20/0xa0
[   49.359610]  ? schedule+0xa7/0x130
[   49.360228]  ? preempt_count_sub+0x50/0x80
[   49.360793]  cpu_startup_entry+0x3c/0x40
[   49.361714]  rest_init+0xe9/0xf0
[   49.362212]  arch_call_rest_init+0x17/0x50
[   49.362863]  start_kernel+0x2e3/0x3c0
[   49.363485]  x86_64_start_reservations+0x1c/0x30
[   49.364102]  x86_64_start_kernel+0xcf/0xe0
[   49.364931]  secondary_startup_64_no_verify+0x178/0x17b
[   49.365729]  </TASK>
[   49.366110] 
[   49.366583] Allocated by task 230:
[   49.367241]  kasan_save_stack+0x3c/0x60
[   49.367725]  kasan_set_track+0x29/0x40
[   49.368627]  kasan_save_alloc_info+0x22/0x30
[   49.369156]  __kasan_kmalloc+0xb7/0xc0
[   49.369946]  kmalloc_trace+0x4c/0xb0
[   49.371022]  rcu_uaf+0x9b/0x1e0
[   49.371632]  kunit_try_run_case+0x126/0x290
[   49.372291]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.373016]  kthread+0x19e/0x1e0
[   49.373458]  ret_from_fork+0x41/0x70
[   49.373954]  ret_from_fork_asm+0x1b/0x30
[   49.374589] 
[   49.374893] Freed by task 0:
[   49.375307]  kasan_save_stack+0x3c/0x60
[   49.375928]  kasan_set_track+0x29/0x40
[   49.376401]  kasan_save_free_info+0x2f/0x50
[   49.377119]  ____kasan_slab_free+0x172/0x1d0
[   49.377741]  __kasan_slab_free+0x16/0x20
[   49.378321]  __kmem_cache_free+0x190/0x310
[   49.378950]  kfree+0x7c/0x120
[   49.379492]  rcu_uaf_reclaim+0x1f/0x40
[   49.380120]  rcu_core+0x4be/0x1020
[   49.380584]  rcu_core_si+0x12/0x20
[   49.381255]  handle_softirqs+0x195/0x520
[   49.381808]  irq_exit_rcu+0x92/0xb0
[   49.382330]  sysvec_apic_timer_interrupt+0x80/0xa0
[   49.382934]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   49.383754] 
[   49.384164] Last potentially related work creation:
[   49.384655]  kasan_save_stack+0x3c/0x60
[   49.385316]  __kasan_record_aux_stack+0xb3/0xd0
[   49.386098]  kasan_record_aux_stack_noalloc+0xf/0x20
[   49.386760]  __call_rcu_common.constprop.0+0x4c/0x5e0
[   49.387461]  call_rcu+0x12/0x20
[   49.387893]  rcu_uaf+0xdd/0x1e0
[   49.388401]  kunit_try_run_case+0x126/0x290
[   49.388991]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.389843]  kthread+0x19e/0x1e0
[   49.390347]  ret_from_fork+0x41/0x70
[   49.391021]  ret_from_fork_asm+0x1b/0x30
[   49.391718] 
[   49.392045] The buggy address belongs to the object at ffff888102857980
[   49.392045]  which belongs to the cache kmalloc-32 of size 32
[   49.393328] The buggy address is located 0 bytes inside of
[   49.393328]  freed 32-byte region [ffff888102857980, ffff8881028579a0)
[   49.394692] 
[   49.395031] The buggy address belongs to the physical page:
[   49.395668] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102857
[   49.396603] flags: 0x200000000000800(slab|node=0|zone=2)
[   49.397323] page_type: 0xffffffff()
[   49.397970] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[   49.398769] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   49.399719] page dumped because: kasan: bad access detected
[   49.400359] 
[   49.400713] Memory state around the buggy address:
[   49.401329]  ffff888102857880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   49.402316]  ffff888102857900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   49.403111] >ffff888102857980: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   49.404157]                    ^
[   49.404554]  ffff888102857a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.405425]  ffff888102857a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.406319] ==================================================================

test log snippet test parser 164

Home

[   47.558242] ==================================================================
[   47.559630] BUG: KASAN: slab-use-after-free in strchr+0x18/0x60
[   47.561136] Read of size 1 at addr ffff888102a1d050 by task kunit_try_catch/222
[   47.563356] 
[   47.563782] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   47.564622] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.565818] Call Trace:
[   47.566426]  <TASK>
[   47.566762]  dump_stack_lvl+0x4e/0x90
[   47.567389]  print_report+0xd2/0x660
[   47.567882]  ? __virt_addr_valid+0x156/0x1e0
[   47.569068]  ? kasan_complete_mode_report_info+0x64/0x200
[   47.570332]  kasan_report+0xff/0x140
[   47.570868]  ? strchr+0x18/0x60
[   47.571576]  ? strchr+0x18/0x60
[   47.572097]  __asan_load1+0x66/0x70
[   47.572886]  strchr+0x18/0x60
[   47.573555]  kasan_strings+0xdf/0x510
[   47.574269]  ? __pfx_kasan_strings+0x10/0x10
[   47.575179]  ? __pfx_kasan_strings+0x10/0x10
[   47.575785]  ? kunit_try_run_case+0x11b/0x290
[   47.576644]  kunit_try_run_case+0x126/0x290
[   47.577354]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.578510]  ? __kasan_check_write+0x18/0x20
[   47.579375]  ? trace_preempt_on+0x20/0xa0
[   47.579875]  ? __kthread_parkme+0x4f/0xd0
[   47.580548]  ? preempt_count_sub+0x50/0x80
[   47.581593]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.582584]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.583392]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.584442]  kthread+0x19e/0x1e0
[   47.585500]  ? __pfx_kthread+0x10/0x10
[   47.586404]  ret_from_fork+0x41/0x70
[   47.587276]  ? __pfx_kthread+0x10/0x10
[   47.587801]  ret_from_fork_asm+0x1b/0x30
[   47.588387]  </TASK>
[   47.588694] 
[   47.589329] Allocated by task 222:
[   47.589958]  kasan_save_stack+0x3c/0x60
[   47.590753]  kasan_set_track+0x29/0x40
[   47.591450]  kasan_save_alloc_info+0x22/0x30
[   47.592298]  __kasan_kmalloc+0xb7/0xc0
[   47.593003]  kmalloc_trace+0x4c/0xb0
[   47.593475]  kasan_strings+0x9f/0x510
[   47.593952]  kunit_try_run_case+0x126/0x290
[   47.595080]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.595899]  kthread+0x19e/0x1e0
[   47.596611]  ret_from_fork+0x41/0x70
[   47.597497]  ret_from_fork_asm+0x1b/0x30
[   47.598102] 
[   47.598363] Freed by task 222:
[   47.598776]  kasan_save_stack+0x3c/0x60
[   47.599999]  kasan_set_track+0x29/0x40
[   47.600584]  kasan_save_free_info+0x2f/0x50
[   47.601218]  ____kasan_slab_free+0x172/0x1d0
[   47.601762]  __kasan_slab_free+0x16/0x20
[   47.602845]  __kmem_cache_free+0x190/0x310
[   47.603489]  kfree+0x7c/0x120
[   47.604154]  kasan_strings+0xc3/0x510
[   47.604909]  kunit_try_run_case+0x126/0x290
[   47.605548]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.606353]  kthread+0x19e/0x1e0
[   47.606891]  ret_from_fork+0x41/0x70
[   47.607420]  ret_from_fork_asm+0x1b/0x30
[   47.607978] 
[   47.608319] The buggy address belongs to the object at ffff888102a1d040
[   47.608319]  which belongs to the cache kmalloc-32 of size 32
[   47.609712] The buggy address is located 16 bytes inside of
[   47.609712]  freed 32-byte region [ffff888102a1d040, ffff888102a1d060)
[   47.611162] 
[   47.611502] The buggy address belongs to the physical page:
[   47.612150] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1d
[   47.613322] flags: 0x200000000000800(slab|node=0|zone=2)
[   47.614138] page_type: 0xffffffff()
[   47.614842] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[   47.615811] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   47.616815] page dumped because: kasan: bad access detected
[   47.617166] 
[   47.617310] Memory state around the buggy address:
[   47.617620]  ffff888102a1cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.618419]  ffff888102a1cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.619948] >ffff888102a1d000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   47.620766]                                                  ^
[   47.621609]  ffff888102a1d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.622552]  ffff888102a1d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.623691] ==================================================================

test log snippet test parser 165

Home

[   47.700152] ==================================================================
[   47.700867] BUG: KASAN: slab-use-after-free in strcmp+0x26/0x60
[   47.701983] Read of size 1 at addr ffff888102a1d050 by task kunit_try_catch/222
[   47.703907] 
[   47.704778] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   47.705760] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.707502] Call Trace:
[   47.708580]  <TASK>
[   47.709247]  dump_stack_lvl+0x4e/0x90
[   47.709939]  print_report+0xd2/0x660
[   47.710459]  ? __virt_addr_valid+0x156/0x1e0
[   47.711249]  ? kasan_complete_mode_report_info+0x64/0x200
[   47.712020]  kasan_report+0xff/0x140
[   47.712419]  ? strcmp+0x26/0x60
[   47.712914]  ? strcmp+0x26/0x60
[   47.713389]  __asan_load1+0x66/0x70
[   47.713963]  strcmp+0x26/0x60
[   47.714449]  kasan_strings+0x161/0x510
[   47.714966]  ? __pfx_kasan_strings+0x10/0x10
[   47.715637]  ? __pfx_kasan_strings+0x10/0x10
[   47.716775]  ? kunit_try_run_case+0x11b/0x290
[   47.717462]  kunit_try_run_case+0x126/0x290
[   47.718111]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.718755]  ? __kasan_check_write+0x18/0x20
[   47.719554]  ? trace_preempt_on+0x20/0xa0
[   47.720455]  ? __kthread_parkme+0x4f/0xd0
[   47.721352]  ? preempt_count_sub+0x50/0x80
[   47.722566]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.723322]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.724343]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.725173]  kthread+0x19e/0x1e0
[   47.725446]  ? __pfx_kthread+0x10/0x10
[   47.726407]  ret_from_fork+0x41/0x70
[   47.726857]  ? __pfx_kthread+0x10/0x10
[   47.727364]  ret_from_fork_asm+0x1b/0x30
[   47.728097]  </TASK>
[   47.728370] 
[   47.728696] Allocated by task 222:
[   47.729601]  kasan_save_stack+0x3c/0x60
[   47.730299]  kasan_set_track+0x29/0x40
[   47.730794]  kasan_save_alloc_info+0x22/0x30
[   47.731363]  __kasan_kmalloc+0xb7/0xc0
[   47.731845]  kmalloc_trace+0x4c/0xb0
[   47.732324]  kasan_strings+0x9f/0x510
[   47.732936]  kunit_try_run_case+0x126/0x290
[   47.733463]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.734549]  kthread+0x19e/0x1e0
[   47.735119]  ret_from_fork+0x41/0x70
[   47.735742]  ret_from_fork_asm+0x1b/0x30
[   47.736660] 
[   47.737024] Freed by task 222:
[   47.737474]  kasan_save_stack+0x3c/0x60
[   47.738829]  kasan_set_track+0x29/0x40
[   47.739368]  kasan_save_free_info+0x2f/0x50
[   47.740115]  ____kasan_slab_free+0x172/0x1d0
[   47.740621]  __kasan_slab_free+0x16/0x20
[   47.741209]  __kmem_cache_free+0x190/0x310
[   47.741961]  kfree+0x7c/0x120
[   47.742595]  kasan_strings+0xc3/0x510
[   47.743651]  kunit_try_run_case+0x126/0x290
[   47.744305]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.745214]  kthread+0x19e/0x1e0
[   47.745768]  ret_from_fork+0x41/0x70
[   47.746464]  ret_from_fork_asm+0x1b/0x30
[   47.747791] 
[   47.748210] The buggy address belongs to the object at ffff888102a1d040
[   47.748210]  which belongs to the cache kmalloc-32 of size 32
[   47.750337] The buggy address is located 16 bytes inside of
[   47.750337]  freed 32-byte region [ffff888102a1d040, ffff888102a1d060)
[   47.751978] 
[   47.753045] The buggy address belongs to the physical page:
[   47.753658] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1d
[   47.754765] flags: 0x200000000000800(slab|node=0|zone=2)
[   47.755408] page_type: 0xffffffff()
[   47.756448] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[   47.757389] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   47.758209] page dumped because: kasan: bad access detected
[   47.758792] 
[   47.759294] Memory state around the buggy address:
[   47.760615]  ffff888102a1cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.761709]  ffff888102a1cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.762487] >ffff888102a1d000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   47.763224]                                                  ^
[   47.764328]  ffff888102a1d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.765515]  ffff888102a1d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.767148] ==================================================================

test log snippet test parser 166

Home

[   47.834067] ==================================================================
[   47.835685] BUG: KASAN: slab-use-after-free in strlen+0x13/0x50
[   47.836244] Read of size 1 at addr ffff888102a1d050 by task kunit_try_catch/222
[   47.837481] 
[   47.837782] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   47.839285] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.840394] Call Trace:
[   47.840785]  <TASK>
[   47.841117]  dump_stack_lvl+0x4e/0x90
[   47.841717]  print_report+0xd2/0x660
[   47.842249]  ? __virt_addr_valid+0x156/0x1e0
[   47.842846]  ? kasan_complete_mode_report_info+0x64/0x200
[   47.843478]  kasan_report+0xff/0x140
[   47.844251]  ? strlen+0x13/0x50
[   47.844757]  ? strlen+0x13/0x50
[   47.845388]  __asan_load1+0x66/0x70
[   47.846044]  strlen+0x13/0x50
[   47.846440]  kasan_strings+0x1dc/0x510
[   47.846839]  ? __pfx_kasan_strings+0x10/0x10
[   47.847626]  ? __pfx_kasan_strings+0x10/0x10
[   47.848352]  ? kunit_try_run_case+0x11b/0x290
[   47.849013]  kunit_try_run_case+0x126/0x290
[   47.849717]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.850743]  ? __kasan_check_write+0x18/0x20
[   47.851449]  ? trace_preempt_on+0x20/0xa0
[   47.852499]  ? __kthread_parkme+0x4f/0xd0
[   47.853066]  ? preempt_count_sub+0x50/0x80
[   47.854230]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.854776]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.855477]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.856327]  kthread+0x19e/0x1e0
[   47.856803]  ? __pfx_kthread+0x10/0x10
[   47.857393]  ret_from_fork+0x41/0x70
[   47.858061]  ? __pfx_kthread+0x10/0x10
[   47.859241]  ret_from_fork_asm+0x1b/0x30
[   47.859890]  </TASK>
[   47.860313] 
[   47.860665] Allocated by task 222:
[   47.861401]  kasan_save_stack+0x3c/0x60
[   47.862249]  kasan_set_track+0x29/0x40
[   47.863727]  kasan_save_alloc_info+0x22/0x30
[   47.864569]  __kasan_kmalloc+0xb7/0xc0
[   47.865149]  kmalloc_trace+0x4c/0xb0
[   47.866336]  kasan_strings+0x9f/0x510
[   47.866912]  kunit_try_run_case+0x126/0x290
[   47.867833]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.868832]  kthread+0x19e/0x1e0
[   47.869405]  ret_from_fork+0x41/0x70
[   47.869918]  ret_from_fork_asm+0x1b/0x30
[   47.870423] 
[   47.871392] Freed by task 222:
[   47.872227]  kasan_save_stack+0x3c/0x60
[   47.872997]  kasan_set_track+0x29/0x40
[   47.873743]  kasan_save_free_info+0x2f/0x50
[   47.875159]  ____kasan_slab_free+0x172/0x1d0
[   47.875573]  __kasan_slab_free+0x16/0x20
[   47.875955]  __kmem_cache_free+0x190/0x310
[   47.876348]  kfree+0x7c/0x120
[   47.877894]  kasan_strings+0xc3/0x510
[   47.878858]  kunit_try_run_case+0x126/0x290
[   47.880124]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.883233]  kthread+0x19e/0x1e0
[   47.883626]  ret_from_fork+0x41/0x70
[   47.883999]  ret_from_fork_asm+0x1b/0x30
[   47.884378] 
[   47.887069] The buggy address belongs to the object at ffff888102a1d040
[   47.887069]  which belongs to the cache kmalloc-32 of size 32
[   47.890295] The buggy address is located 16 bytes inside of
[   47.890295]  freed 32-byte region [ffff888102a1d040, ffff888102a1d060)
[   47.893020] 
[   47.893266] The buggy address belongs to the physical page:
[   47.894429] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1d
[   47.895444] flags: 0x200000000000800(slab|node=0|zone=2)
[   47.896298] page_type: 0xffffffff()
[   47.897073] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[   47.898214] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   47.899362] page dumped because: kasan: bad access detected
[   47.900190] 
[   47.900627] Memory state around the buggy address:
[   47.901214]  ffff888102a1cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.902478]  ffff888102a1cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.903263] >ffff888102a1d000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   47.904689]                                                  ^
[   47.905422]  ffff888102a1d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.906274]  ffff888102a1d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.907691] ==================================================================

test log snippet test parser 167

Home

[   47.909288] ==================================================================
[   47.910181] BUG: KASAN: slab-use-after-free in strnlen+0x31/0x50
[   47.912171] Read of size 1 at addr ffff888102a1d050 by task kunit_try_catch/222
[   47.913370] 
[   47.913725] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   47.915325] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.916774] Call Trace:
[   47.917210]  <TASK>
[   47.917644]  dump_stack_lvl+0x4e/0x90
[   47.918364]  print_report+0xd2/0x660
[   47.919563]  ? __virt_addr_valid+0x156/0x1e0
[   47.920825]  ? kasan_complete_mode_report_info+0x64/0x200
[   47.921609]  kasan_report+0xff/0x140
[   47.921973]  ? strnlen+0x31/0x50
[   47.923205]  ? strnlen+0x31/0x50
[   47.923874]  __asan_load1+0x66/0x70
[   47.924572]  strnlen+0x31/0x50
[   47.925487]  kasan_strings+0x21b/0x510
[   47.926479]  ? __pfx_kasan_strings+0x10/0x10
[   47.927207]  ? __pfx_kasan_strings+0x10/0x10
[   47.927823]  ? kunit_try_run_case+0x11b/0x290
[   47.929311]  kunit_try_run_case+0x126/0x290
[   47.930071]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.931105]  ? __kasan_check_write+0x18/0x20
[   47.931860]  ? trace_preempt_on+0x20/0xa0
[   47.932382]  ? __kthread_parkme+0x4f/0xd0
[   47.933680]  ? preempt_count_sub+0x50/0x80
[   47.934439]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.935155]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.936035]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.937312]  kthread+0x19e/0x1e0
[   47.937767]  ? __pfx_kthread+0x10/0x10
[   47.938300]  ret_from_fork+0x41/0x70
[   47.939032]  ? __pfx_kthread+0x10/0x10
[   47.940636]  ret_from_fork_asm+0x1b/0x30
[   47.941208]  </TASK>
[   47.941568] 
[   47.941820] Allocated by task 222:
[   47.942611]  kasan_save_stack+0x3c/0x60
[   47.944100]  kasan_set_track+0x29/0x40
[   47.944670]  kasan_save_alloc_info+0x22/0x30
[   47.945427]  __kasan_kmalloc+0xb7/0xc0
[   47.946228]  kmalloc_trace+0x4c/0xb0
[   47.946775]  kasan_strings+0x9f/0x510
[   47.947268]  kunit_try_run_case+0x126/0x290
[   47.947828]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.948600]  kthread+0x19e/0x1e0
[   47.949743]  ret_from_fork+0x41/0x70
[   47.950591]  ret_from_fork_asm+0x1b/0x30
[   47.951552] 
[   47.951772] Freed by task 222:
[   47.952595]  kasan_save_stack+0x3c/0x60
[   47.953757]  kasan_set_track+0x29/0x40
[   47.954644]  kasan_save_free_info+0x2f/0x50
[   47.955233]  ____kasan_slab_free+0x172/0x1d0
[   47.955984]  __kasan_slab_free+0x16/0x20
[   47.956878]  __kmem_cache_free+0x190/0x310
[   47.957575]  kfree+0x7c/0x120
[   47.958231]  kasan_strings+0xc3/0x510
[   47.959321]  kunit_try_run_case+0x126/0x290
[   47.960099]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.960749]  kthread+0x19e/0x1e0
[   47.961187]  ret_from_fork+0x41/0x70
[   47.962384]  ret_from_fork_asm+0x1b/0x30
[   47.963815] 
[   47.964282] The buggy address belongs to the object at ffff888102a1d040
[   47.964282]  which belongs to the cache kmalloc-32 of size 32
[   47.965468] The buggy address is located 16 bytes inside of
[   47.965468]  freed 32-byte region [ffff888102a1d040, ffff888102a1d060)
[   47.967180] 
[   47.967533] The buggy address belongs to the physical page:
[   47.968887] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1d
[   47.970512] flags: 0x200000000000800(slab|node=0|zone=2)
[   47.971052] page_type: 0xffffffff()
[   47.971308] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[   47.971867] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   47.973509] page dumped because: kasan: bad access detected
[   47.974469] 
[   47.974968] Memory state around the buggy address:
[   47.975738]  ffff888102a1cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.977205]  ffff888102a1cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.978292] >ffff888102a1d000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   47.979430]                                                  ^
[   47.981219]  ffff888102a1d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.982122]  ffff888102a1d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.983063] ==================================================================

test log snippet test parser 168

Home

[   47.626505] ==================================================================
[   47.627593] BUG: KASAN: slab-use-after-free in strrchr+0x1e/0x40
[   47.628386] Read of size 1 at addr ffff888102a1d050 by task kunit_try_catch/222
[   47.629338] 
[   47.629604] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   47.631654] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.633063] Call Trace:
[   47.633780]  <TASK>
[   47.634696]  dump_stack_lvl+0x4e/0x90
[   47.635511]  print_report+0xd2/0x660
[   47.636419]  ? __virt_addr_valid+0x156/0x1e0
[   47.637409]  ? kasan_complete_mode_report_info+0x64/0x200
[   47.638706]  kasan_report+0xff/0x140
[   47.639258]  ? strrchr+0x1e/0x40
[   47.639825]  ? strrchr+0x1e/0x40
[   47.640375]  __asan_load1+0x66/0x70
[   47.641021]  strrchr+0x1e/0x40
[   47.641636]  kasan_strings+0x11f/0x510
[   47.642766]  ? __pfx_kasan_strings+0x10/0x10
[   47.643384]  ? __pfx_kasan_strings+0x10/0x10
[   47.643959]  ? kunit_try_run_case+0x11b/0x290
[   47.644894]  kunit_try_run_case+0x126/0x290
[   47.645601]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.646680]  ? __kasan_check_write+0x18/0x20
[   47.647432]  ? trace_preempt_on+0x20/0xa0
[   47.648103]  ? __kthread_parkme+0x4f/0xd0
[   47.648758]  ? preempt_count_sub+0x50/0x80
[   47.649401]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.650331]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.651471]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.652379]  kthread+0x19e/0x1e0
[   47.652944]  ? __pfx_kthread+0x10/0x10
[   47.653569]  ret_from_fork+0x41/0x70
[   47.654741]  ? __pfx_kthread+0x10/0x10
[   47.655352]  ret_from_fork_asm+0x1b/0x30
[   47.656010]  </TASK>
[   47.656418] 
[   47.656685] Allocated by task 222:
[   47.657429]  kasan_save_stack+0x3c/0x60
[   47.658516]  kasan_set_track+0x29/0x40
[   47.659785]  kasan_save_alloc_info+0x22/0x30
[   47.660495]  __kasan_kmalloc+0xb7/0xc0
[   47.661268]  kmalloc_trace+0x4c/0xb0
[   47.662260]  kasan_strings+0x9f/0x510
[   47.663056]  kunit_try_run_case+0x126/0x290
[   47.663923]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.664714]  kthread+0x19e/0x1e0
[   47.665390]  ret_from_fork+0x41/0x70
[   47.666242]  ret_from_fork_asm+0x1b/0x30
[   47.667416] 
[   47.668186] Freed by task 222:
[   47.668683]  kasan_save_stack+0x3c/0x60
[   47.669537]  kasan_set_track+0x29/0x40
[   47.670236]  kasan_save_free_info+0x2f/0x50
[   47.671049]  ____kasan_slab_free+0x172/0x1d0
[   47.672102]  __kasan_slab_free+0x16/0x20
[   47.672513]  __kmem_cache_free+0x190/0x310
[   47.673160]  kfree+0x7c/0x120
[   47.674139]  kasan_strings+0xc3/0x510
[   47.674746]  kunit_try_run_case+0x126/0x290
[   47.675944]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.676838]  kthread+0x19e/0x1e0
[   47.677483]  ret_from_fork+0x41/0x70
[   47.678181]  ret_from_fork_asm+0x1b/0x30
[   47.678800] 
[   47.679134] The buggy address belongs to the object at ffff888102a1d040
[   47.679134]  which belongs to the cache kmalloc-32 of size 32
[   47.680987] The buggy address is located 16 bytes inside of
[   47.680987]  freed 32-byte region [ffff888102a1d040, ffff888102a1d060)
[   47.682515] 
[   47.682772] The buggy address belongs to the physical page:
[   47.683347] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1d
[   47.684912] flags: 0x200000000000800(slab|node=0|zone=2)
[   47.686019] page_type: 0xffffffff()
[   47.686797] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[   47.687846] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   47.689098] page dumped because: kasan: bad access detected
[   47.690162] 
[   47.690641] Memory state around the buggy address:
[   47.691643]  ffff888102a1cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.692501]  ffff888102a1cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.694334] >ffff888102a1d000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   47.695447]                                                  ^
[   47.696400]  ffff888102a1d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.697563]  ffff888102a1d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.698717] ==================================================================

test log snippet test parser 169

Home

[   49.420649] ==================================================================
[   49.421976] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x166/0x2a0
[   49.423339] Read of size 8 at addr ffff888102857a00 by task kunit_try_catch/232
[   49.425150] 
[   49.425533] CPU: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   49.427095] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   49.428374] Call Trace:
[   49.428666]  <TASK>
[   49.429146]  dump_stack_lvl+0x4e/0x90
[   49.430277]  print_report+0xd2/0x660
[   49.431173]  ? __virt_addr_valid+0x156/0x1e0
[   49.432002]  ? kasan_complete_mode_report_info+0x64/0x200
[   49.432792]  kasan_report+0xff/0x140
[   49.433374]  ? workqueue_uaf+0x166/0x2a0
[   49.434108]  ? workqueue_uaf+0x166/0x2a0
[   49.435179]  __asan_load8+0x82/0xb0
[   49.435955]  workqueue_uaf+0x166/0x2a0
[   49.437044]  ? __pfx_workqueue_uaf+0x10/0x10
[   49.438196]  ? __schedule+0x70b/0x1190
[   49.438489]  ? ktime_get_ts64+0x118/0x140
[   49.439705]  kunit_try_run_case+0x126/0x290
[   49.440649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.442029]  ? __kasan_check_write+0x18/0x20
[   49.442629]  ? trace_preempt_on+0x20/0xa0
[   49.443466]  ? __kthread_parkme+0x4f/0xd0
[   49.444395]  ? preempt_count_sub+0x50/0x80
[   49.445252]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.446493]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.447849]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.448764]  kthread+0x19e/0x1e0
[   49.449717]  ? __pfx_kthread+0x10/0x10
[   49.450616]  ret_from_fork+0x41/0x70
[   49.451481]  ? __pfx_kthread+0x10/0x10
[   49.452995]  ret_from_fork_asm+0x1b/0x30
[   49.453600]  </TASK>
[   49.454020] 
[   49.454339] Allocated by task 232:
[   49.455130]  kasan_save_stack+0x3c/0x60
[   49.456201]  kasan_set_track+0x29/0x40
[   49.457064]  kasan_save_alloc_info+0x22/0x30
[   49.457977]  __kasan_kmalloc+0xb7/0xc0
[   49.458594]  kmalloc_trace+0x4c/0xb0
[   49.459719]  workqueue_uaf+0xdb/0x2a0
[   49.460187]  kunit_try_run_case+0x126/0x290
[   49.461128]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.462626]  kthread+0x19e/0x1e0
[   49.463486]  ret_from_fork+0x41/0x70
[   49.464185]  ret_from_fork_asm+0x1b/0x30
[   49.465009] 
[   49.465338] Freed by task 66:
[   49.465762]  kasan_save_stack+0x3c/0x60
[   49.466394]  kasan_set_track+0x29/0x40
[   49.466888]  kasan_save_free_info+0x2f/0x50
[   49.467626]  ____kasan_slab_free+0x172/0x1d0
[   49.468233]  __kasan_slab_free+0x16/0x20
[   49.469019]  __kmem_cache_free+0x190/0x310
[   49.469579]  kfree+0x7c/0x120
[   49.470501]  workqueue_uaf_work+0x12/0x20
[   49.471392]  process_one_work+0x2fb/0x640
[   49.472216]  worker_thread+0x521/0x780
[   49.473175]  kthread+0x19e/0x1e0
[   49.474307]  ret_from_fork+0x41/0x70
[   49.475218]  ret_from_fork_asm+0x1b/0x30
[   49.475949] 
[   49.476399] Last potentially related work creation:
[   49.477462]  kasan_save_stack+0x3c/0x60
[   49.478508]  __kasan_record_aux_stack+0xb3/0xd0
[   49.479434]  kasan_record_aux_stack_noalloc+0xf/0x20
[   49.479828]  __queue_work.part.0+0x269/0x730
[   49.481109]  __queue_work+0x44/0xc0
[   49.482064]  queue_work_on+0x91/0xa0
[   49.482794]  workqueue_uaf+0x147/0x2a0
[   49.483631]  kunit_try_run_case+0x126/0x290
[   49.484792]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.485554]  kthread+0x19e/0x1e0
[   49.486292]  ret_from_fork+0x41/0x70
[   49.486915]  ret_from_fork_asm+0x1b/0x30
[   49.487512] 
[   49.488003] The buggy address belongs to the object at ffff888102857a00
[   49.488003]  which belongs to the cache kmalloc-32 of size 32
[   49.489372] The buggy address is located 0 bytes inside of
[   49.489372]  freed 32-byte region [ffff888102857a00, ffff888102857a20)
[   49.491563] 
[   49.492085] The buggy address belongs to the physical page:
[   49.492974] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102857
[   49.494828] flags: 0x200000000000800(slab|node=0|zone=2)
[   49.496024] page_type: 0xffffffff()
[   49.496725] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[   49.497802] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   49.498994] page dumped because: kasan: bad access detected
[   49.500367] 
[   49.500647] Memory state around the buggy address:
[   49.501773]  ffff888102857900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   49.502864]  ffff888102857980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   49.503887] >ffff888102857a00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   49.505335]                    ^
[   49.506095]  ffff888102857a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.506927]  ffff888102857b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.508055] ==================================================================

test log snippet test parser 170

Home

[   49.420649] ==================================================================
[   49.421976] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x166/0x2a0
[   49.423339] Read of size 8 at addr ffff888102857a00 by task kunit_try_catch/232
[   49.425150] 
[   49.425533] CPU: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   49.427095] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   49.428374] Call Trace:
[   49.428666]  <TASK>
[   49.429146]  dump_stack_lvl+0x4e/0x90
[   49.430277]  print_report+0xd2/0x660
[   49.431173]  ? __virt_addr_valid+0x156/0x1e0
[   49.432002]  ? kasan_complete_mode_report_info+0x64/0x200
[   49.432792]  kasan_report+0xff/0x140
[   49.433374]  ? workqueue_uaf+0x166/0x2a0
[   49.434108]  ? workqueue_uaf+0x166/0x2a0
[   49.435179]  __asan_load8+0x82/0xb0
[   49.435955]  workqueue_uaf+0x166/0x2a0
[   49.437044]  ? __pfx_workqueue_uaf+0x10/0x10
[   49.438196]  ? __schedule+0x70b/0x1190
[   49.438489]  ? ktime_get_ts64+0x118/0x140
[   49.439705]  kunit_try_run_case+0x126/0x290
[   49.440649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.442029]  ? __kasan_check_write+0x18/0x20
[   49.442629]  ? trace_preempt_on+0x20/0xa0
[   49.443466]  ? __kthread_parkme+0x4f/0xd0
[   49.444395]  ? preempt_count_sub+0x50/0x80
[   49.445252]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.446493]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.447849]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.448764]  kthread+0x19e/0x1e0
[   49.449717]  ? __pfx_kthread+0x10/0x10
[   49.450616]  ret_from_fork+0x41/0x70
[   49.451481]  ? __pfx_kthread+0x10/0x10
[   49.452995]  ret_from_fork_asm+0x1b/0x30
[   49.453600]  </TASK>
[   49.454020] 
[   49.454339] Allocated by task 232:
[   49.455130]  kasan_save_stack+0x3c/0x60
[   49.456201]  kasan_set_track+0x29/0x40
[   49.457064]  kasan_save_alloc_info+0x22/0x30
[   49.457977]  __kasan_kmalloc+0xb7/0xc0
[   49.458594]  kmalloc_trace+0x4c/0xb0
[   49.459719]  workqueue_uaf+0xdb/0x2a0
[   49.460187]  kunit_try_run_case+0x126/0x290
[   49.461128]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.462626]  kthread+0x19e/0x1e0
[   49.463486]  ret_from_fork+0x41/0x70
[   49.464185]  ret_from_fork_asm+0x1b/0x30
[   49.465009] 
[   49.465338] Freed by task 66:
[   49.465762]  kasan_save_stack+0x3c/0x60
[   49.466394]  kasan_set_track+0x29/0x40
[   49.466888]  kasan_save_free_info+0x2f/0x50
[   49.467626]  ____kasan_slab_free+0x172/0x1d0
[   49.468233]  __kasan_slab_free+0x16/0x20
[   49.469019]  __kmem_cache_free+0x190/0x310
[   49.469579]  kfree+0x7c/0x120
[   49.470501]  workqueue_uaf_work+0x12/0x20
[   49.471392]  process_one_work+0x2fb/0x640
[   49.472216]  worker_thread+0x521/0x780
[   49.473175]  kthread+0x19e/0x1e0
[   49.474307]  ret_from_fork+0x41/0x70
[   49.475218]  ret_from_fork_asm+0x1b/0x30
[   49.475949] 
[   49.476399] Last potentially related work creation:
[   49.477462]  kasan_save_stack+0x3c/0x60
[   49.478508]  __kasan_record_aux_stack+0xb3/0xd0
[   49.479434]  kasan_record_aux_stack_noalloc+0xf/0x20
[   49.479828]  __queue_work.part.0+0x269/0x730
[   49.481109]  __queue_work+0x44/0xc0
[   49.482064]  queue_work_on+0x91/0xa0
[   49.482794]  workqueue_uaf+0x147/0x2a0
[   49.483631]  kunit_try_run_case+0x126/0x290
[   49.484792]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.485554]  kthread+0x19e/0x1e0
[   49.486292]  ret_from_fork+0x41/0x70
[   49.486915]  ret_from_fork_asm+0x1b/0x30
[   49.487512] 
[   49.488003] The buggy address belongs to the object at ffff888102857a00
[   49.488003]  which belongs to the cache kmalloc-32 of size 32
[   49.489372] The buggy address is located 0 bytes inside of
[   49.489372]  freed 32-byte region [ffff888102857a00, ffff888102857a20)
[   49.491563] 
[   49.492085] The buggy address belongs to the physical page:
[   49.492974] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102857
[   49.494828] flags: 0x200000000000800(slab|node=0|zone=2)
[   49.496024] page_type: 0xffffffff()
[   49.496725] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[   49.497802] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   49.498994] page dumped because: kasan: bad access detected
[   49.500367] 
[   49.500647] Memory state around the buggy address:
[   49.501773]  ffff888102857900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   49.502864]  ffff888102857980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   49.503887] >ffff888102857a00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   49.505335]                    ^
[   49.506095]  ffff888102857a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.506927]  ffff888102857b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.508055] ==================================================================

test log snippet test parser 171

Home

[   46.583428] ==================================================================
[   46.585678] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0xc1/0x190
[   46.587099] Read of size 1 at addr ffff888102927d9a by task kunit_try_catch/202
[   46.588453] 
[   46.589095] CPU: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   46.590363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   46.592099] Call Trace:
[   46.592699]  <TASK>
[   46.593136]  dump_stack_lvl+0x4e/0x90
[   46.594281]  print_report+0xd2/0x660
[   46.595274]  ? __virt_addr_valid+0x156/0x1e0
[   46.596175]  ? kasan_addr_to_slab+0x11/0xb0
[   46.597259]  kasan_report+0xff/0x140
[   46.597986]  ? kasan_stack_oob+0xc1/0x190
[   46.598958]  ? kasan_stack_oob+0xc1/0x190
[   46.599569]  __asan_load1+0x66/0x70
[   46.600362]  kasan_stack_oob+0xc1/0x190
[   46.601140]  ? __pfx_kasan_stack_oob+0x10/0x10
[   46.602329]  ? __schedule+0x70b/0x1190
[   46.603178]  ? ktime_get_ts64+0x118/0x140
[   46.604282]  kunit_try_run_case+0x126/0x290
[   46.605066]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.606075]  ? __kasan_check_write+0x18/0x20
[   46.606959]  ? trace_preempt_on+0x20/0xa0
[   46.607578]  ? __kthread_parkme+0x4f/0xd0
[   46.608324]  ? preempt_count_sub+0x50/0x80
[   46.609110]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.609917]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   46.611374]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   46.612130]  kthread+0x19e/0x1e0
[   46.612621]  ? __pfx_kthread+0x10/0x10
[   46.613183]  ret_from_fork+0x41/0x70
[   46.613889]  ? __pfx_kthread+0x10/0x10
[   46.614954]  ret_from_fork_asm+0x1b/0x30
[   46.615687]  </TASK>
[   46.616460] 
[   46.617119] The buggy address belongs to stack of task kunit_try_catch/202
[   46.618037]  and is located at offset 138 in frame:
[   46.618782]  kasan_stack_oob+0x0/0x190
[   46.619895] 
[   46.620205] This frame has 4 objects:
[   46.621063]  [48, 49) '__assertion'
[   46.621190]  [64, 72) 'array'
[   46.622084]  [96, 112) '__assertion'
[   46.622582]  [128, 138) 'stack_array'
[   46.623051] 
[   46.624319] The buggy address belongs to the physical page:
[   46.625477] page:(____ptrval____) refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102927
[   46.626445] flags: 0x200000000000000(node=0|zone=2)
[   46.627311] page_type: 0xffffffff()
[   46.627940] raw: 0200000000000000 ffffea00040a49c8 ffffea00040a49c8 0000000000000000
[   46.628811] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   46.629723] page dumped because: kasan: bad access detected
[   46.630264] 
[   46.630811] Memory state around the buggy address:
[   46.631397]  ffff888102927c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.632436]  ffff888102927d00: 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00
[   46.633406] >ffff888102927d80: f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 00 f1
[   46.634319]                             ^
[   46.635082]  ffff888102927e00: f1 f1 f1 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00
[   46.636121]  ffff888102927e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.637097] ==================================================================

test log snippet test parser 172

Home

[   43.759588] ==================================================================
[   43.760993] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0xaf/0x1b0
[   43.763424] Read of size 1 at addr ffff8881026b8000 by task kunit_try_catch/142
[   43.764608] 
[   43.765056] CPU: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   43.766320] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   43.768177] Call Trace:
[   43.768850]  <TASK>
[   43.769579]  dump_stack_lvl+0x4e/0x90
[   43.770332]  print_report+0xd2/0x660
[   43.770899]  ? __virt_addr_valid+0x156/0x1e0
[   43.771713]  ? kasan_addr_to_slab+0x11/0xb0
[   43.772373]  kasan_report+0xff/0x140
[   43.773369]  ? kmalloc_pagealloc_uaf+0xaf/0x1b0
[   43.774450]  ? kmalloc_pagealloc_uaf+0xaf/0x1b0
[   43.775856]  __asan_load1+0x66/0x70
[   43.776908]  kmalloc_pagealloc_uaf+0xaf/0x1b0
[   43.778260]  ? __pfx_kmalloc_pagealloc_uaf+0x10/0x10
[   43.778664]  ? __schedule+0x70b/0x1190
[   43.779277]  ? ktime_get_ts64+0x118/0x140
[   43.779938]  kunit_try_run_case+0x126/0x290
[   43.780516]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.781994]  ? __kasan_check_write+0x18/0x20
[   43.782764]  ? trace_preempt_on+0x20/0xa0
[   43.783259]  ? __kthread_parkme+0x4f/0xd0
[   43.784089]  ? preempt_count_sub+0x50/0x80
[   43.785134]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.785996]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   43.787163]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   43.787838]  kthread+0x19e/0x1e0
[   43.788600]  ? __pfx_kthread+0x10/0x10
[   43.789497]  ret_from_fork+0x41/0x70
[   43.790497]  ? __pfx_kthread+0x10/0x10
[   43.791387]  ret_from_fork_asm+0x1b/0x30
[   43.792322]  </TASK>
[   43.793003] 
[   43.793505] The buggy address belongs to the physical page:
[   43.794468] page:(____ptrval____) refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026b8
[   43.795871] flags: 0x200000000000000(node=0|zone=2)
[   43.796934] page_type: 0xffffffff()
[   43.797881] raw: 0200000000000000 ffffea000409af08 ffff88815b43c8b8 0000000000000000
[   43.799204] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   43.799914] page dumped because: kasan: bad access detected
[   43.800521] 
[   43.801488] Memory state around the buggy address:
[   43.802632]  ffff8881026b7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.804082]  ffff8881026b7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.804831] >ffff8881026b8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   43.806419]                    ^
[   43.807283]  ffff8881026b8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   43.808400]  ffff8881026b8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   43.809878] ==================================================================

test log snippet test parser 173

Home

[   43.878461] ==================================================================
[   43.880596] BUG: KASAN: use-after-free in pagealloc_uaf+0xe9/0x1f0
[   43.881820] Read of size 1 at addr ffff888102970000 by task kunit_try_catch/148
[   43.883497] 
[   43.884032] CPU: 1 PID: 148 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   43.885356] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   43.886679] Call Trace:
[   43.887565]  <TASK>
[   43.888275]  dump_stack_lvl+0x4e/0x90
[   43.889231]  print_report+0xd2/0x660
[   43.890210]  ? __virt_addr_valid+0x156/0x1e0
[   43.890801]  ? kasan_addr_to_slab+0x11/0xb0
[   43.891327]  kasan_report+0xff/0x140
[   43.892834]  ? pagealloc_uaf+0xe9/0x1f0
[   43.893277]  ? pagealloc_uaf+0xe9/0x1f0
[   43.894321]  __asan_load1+0x66/0x70
[   43.895062]  pagealloc_uaf+0xe9/0x1f0
[   43.895352]  ? __pfx_pagealloc_uaf+0x10/0x10
[   43.895741]  ? __schedule+0x70b/0x1190
[   43.897252]  ? ktime_get_ts64+0x118/0x140
[   43.898161]  kunit_try_run_case+0x126/0x290
[   43.899467]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.900372]  ? __kasan_check_write+0x18/0x20
[   43.901493]  ? trace_preempt_on+0x20/0xa0
[   43.902389]  ? __kthread_parkme+0x4f/0xd0
[   43.903384]  ? preempt_count_sub+0x50/0x80
[   43.904111]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.904807]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   43.906143]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   43.907269]  kthread+0x19e/0x1e0
[   43.908277]  ? __pfx_kthread+0x10/0x10
[   43.909258]  ret_from_fork+0x41/0x70
[   43.910446]  ? __pfx_kthread+0x10/0x10
[   43.911465]  ret_from_fork_asm+0x1b/0x30
[   43.912402]  </TASK>
[   43.913115] 
[   43.913373] The buggy address belongs to the physical page:
[   43.914188] page:(____ptrval____) refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102970
[   43.915302] flags: 0x200000000000000(node=0|zone=2)
[   43.916046] page_type: 0xffffff7f(buddy)
[   43.916908] raw: 0200000000000000 ffff88817fffbb60 ffff88817fffbb60 0000000000000000
[   43.918630] raw: 0000000000000000 0000000000000004 00000000ffffff7f 0000000000000000
[   43.919443] page dumped because: kasan: bad access detected
[   43.920438] 
[   43.921132] Memory state around the buggy address:
[   43.921673]  ffff88810296ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   43.922721]  ffff88810296ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   43.924308] >ffff888102970000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   43.925264]                    ^
[   43.926257]  ffff888102970080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   43.927235]  ffff888102970100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   43.928317] ==================================================================

test log snippet test parser 174

Home

[   50.993906] ==================================================================
[   50.994802] BUG: KFENCE: invalid free in test_double_free+0xff/0x1d0
[   50.994802] 
[   50.995640] Invalid free of 0x(____ptrval____) (in kfence-#153):
[   50.996379]  test_double_free+0xff/0x1d0
[   50.997047]  kunit_try_run_case+0x126/0x290
[   50.997669]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.998462]  kthread+0x19e/0x1e0
[   50.998960]  ret_from_fork+0x41/0x70
[   50.999419]  ret_from_fork_asm+0x1b/0x30
[   51.000062] 
[   51.000329] kfence-#153: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   51.000329] 
[   51.001326] allocated by task 263 on cpu 0 at 50.993373s:
[   51.001915]  test_alloc+0x1e8/0x8d0
[   51.002486]  test_double_free+0xd0/0x1d0
[   51.003141]  kunit_try_run_case+0x126/0x290
[   51.003657]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.004464]  kthread+0x19e/0x1e0
[   51.005103]  ret_from_fork+0x41/0x70
[   51.005543]  ret_from_fork_asm+0x1b/0x30
[   51.006155] 
[   51.006463] freed by task 263 on cpu 0 at 50.993496s:
[   51.007132]  test_double_free+0xeb/0x1d0
[   51.007774]  kunit_try_run_case+0x126/0x290
[   51.008314]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.009059]  kthread+0x19e/0x1e0
[   51.009457]  ret_from_fork+0x41/0x70
[   51.010025]  ret_from_fork_asm+0x1b/0x30
[   51.010722] 
[   51.011066] CPU: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   51.011820] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   51.012846] ==================================================================

test log snippet test parser 175

Home

[   50.889917] ==================================================================
[   50.890816] BUG: KFENCE: invalid free in test_double_free+0x16a/0x1d0
[   50.890816] 
[   50.891577] Invalid free of 0x(____ptrval____) (in kfence-#152):
[   50.892242]  test_double_free+0x16a/0x1d0
[   50.892771]  kunit_try_run_case+0x126/0x290
[   50.893427]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.894366]  kthread+0x19e/0x1e0
[   50.895019]  ret_from_fork+0x41/0x70
[   50.895677]  ret_from_fork_asm+0x1b/0x30
[   50.896227] 
[   50.896452] kfence-#152: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   50.896452] 
[   50.897653] allocated by task 261 on cpu 0 at 50.889356s:
[   50.898420]  test_alloc+0x2a0/0x8d0
[   50.899010]  test_double_free+0xd0/0x1d0
[   50.899577]  kunit_try_run_case+0x126/0x290
[   50.900246]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.901101]  kthread+0x19e/0x1e0
[   50.901509]  ret_from_fork+0x41/0x70
[   50.902278]  ret_from_fork_asm+0x1b/0x30
[   50.902801] 
[   50.903169] freed by task 261 on cpu 0 at 50.889475s:
[   50.903902]  test_double_free+0x156/0x1d0
[   50.904576]  kunit_try_run_case+0x126/0x290
[   50.905315]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.906058]  kthread+0x19e/0x1e0
[   50.906686]  ret_from_fork+0x41/0x70
[   50.907319]  ret_from_fork_asm+0x1b/0x30
[   50.907834] 
[   50.908245] CPU: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   50.909190] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   50.910146] ==================================================================

test log snippet test parser 176

Home

[   51.097809] ==================================================================
[   51.098698] BUG: KFENCE: invalid free in test_invalid_addr_free+0x157/0x1d0
[   51.098698] 
[   51.099355] Invalid free of 0x(____ptrval____) (in kfence-#154):
[   51.100237]  test_invalid_addr_free+0x157/0x1d0
[   51.100749]  kunit_try_run_case+0x126/0x290
[   51.101434]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.102262]  kthread+0x19e/0x1e0
[   51.102742]  ret_from_fork+0x41/0x70
[   51.103325]  ret_from_fork_asm+0x1b/0x30
[   51.103836] 
[   51.104177] kfence-#154: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   51.104177] 
[   51.105249] allocated by task 265 on cpu 0 at 51.097474s:
[   51.106034]  test_alloc+0x2a0/0x8d0
[   51.106662]  test_invalid_addr_free+0xd0/0x1d0
[   51.107314]  kunit_try_run_case+0x126/0x290
[   51.107826]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.108544]  kthread+0x19e/0x1e0
[   51.109064]  ret_from_fork+0x41/0x70
[   51.109551]  ret_from_fork_asm+0x1b/0x30
[   51.110204] 
[   51.110531] CPU: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   51.111488] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   51.112435] ==================================================================

test log snippet test parser 177

Home

[   51.202059] ==================================================================
[   51.203031] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x1d0
[   51.203031] 
[   51.204001] Invalid free of 0x(____ptrval____) (in kfence-#155):
[   51.205633]  test_invalid_addr_free+0xec/0x1d0
[   51.206436]  kunit_try_run_case+0x126/0x290
[   51.207167]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.207843]  kthread+0x19e/0x1e0
[   51.208490]  ret_from_fork+0x41/0x70
[   51.209121]  ret_from_fork_asm+0x1b/0x30
[   51.209716] 
[   51.210277] kfence-#155: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   51.210277] 
[   51.211328] allocated by task 267 on cpu 0 at 51.201585s:
[   51.212419]  test_alloc+0x1e8/0x8d0
[   51.213049]  test_invalid_addr_free+0xd0/0x1d0
[   51.213610]  kunit_try_run_case+0x126/0x290
[   51.214350]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.214981]  kthread+0x19e/0x1e0
[   51.215479]  ret_from_fork+0x41/0x70
[   51.216096]  ret_from_fork_asm+0x1b/0x30
[   51.216733] 
[   51.217062] CPU: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   51.218078] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   51.219083] ==================================================================

test log snippet test parser 178

Home

[   56.626248] ==================================================================
[   56.627616] BUG: KFENCE: invalid read in test_invalid_access+0xba/0x150
[   56.627616] 
[   56.628600] Invalid read at 0x(____ptrval____):
[   56.629495]  test_invalid_access+0xba/0x150
[   56.630047]  kunit_try_run_case+0x126/0x290
[   56.630778]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   56.631549]  kthread+0x19e/0x1e0
[   56.632225]  ret_from_fork+0x41/0x70
[   56.632817]  ret_from_fork_asm+0x1b/0x30
[   56.633410] 
[   56.633733] CPU: 1 PID: 289 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   56.634706] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   56.635490] ==================================================================

test log snippet test parser 179

Home

[   51.825908] ==================================================================
[   51.826758] BUG: KFENCE: memory corruption in test_corruption+0x160/0x280
[   51.826758] 
[   51.827646] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#161):
[   51.828957]  test_corruption+0x160/0x280
[   51.829537]  kunit_try_run_case+0x126/0x290
[   51.830349]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.831223]  kthread+0x19e/0x1e0
[   51.831801]  ret_from_fork+0x41/0x70
[   51.832447]  ret_from_fork_asm+0x1b/0x30
[   51.832947] 
[   51.833279] kfence-#161: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   51.833279] 
[   51.834347] allocated by task 271 on cpu 0 at 51.825440s:
[   51.834924]  test_alloc+0x1e8/0x8d0
[   51.835697]  test_corruption+0x133/0x280
[   51.836298]  kunit_try_run_case+0x126/0x290
[   51.836842]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.837706]  kthread+0x19e/0x1e0
[   51.838302]  ret_from_fork+0x41/0x70
[   51.838793]  ret_from_fork_asm+0x1b/0x30
[   51.839344] 
[   51.839640] freed by task 271 on cpu 0 at 51.825577s:
[   51.840570]  test_corruption+0x160/0x280
[   51.841006]  kunit_try_run_case+0x126/0x290
[   51.841725]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.842333]  kthread+0x19e/0x1e0
[   51.842960]  ret_from_fork+0x41/0x70
[   51.843405]  ret_from_fork_asm+0x1b/0x30
[   51.844187] 
[   51.844460] CPU: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   51.845412] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   51.846447] ==================================================================

test log snippet test parser 180

Home

[   51.721924] ==================================================================
[   51.722840] BUG: KFENCE: memory corruption in test_corruption+0x10c/0x280
[   51.722840] 
[   51.723668] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#160):
[   51.725798]  test_corruption+0x10c/0x280
[   51.726441]  kunit_try_run_case+0x126/0x290
[   51.727050]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.727752]  kthread+0x19e/0x1e0
[   51.728370]  ret_from_fork+0x41/0x70
[   51.729039]  ret_from_fork_asm+0x1b/0x30
[   51.729621] 
[   51.729948] kfence-#160: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   51.729948] 
[   51.730912] allocated by task 271 on cpu 0 at 51.721481s:
[   51.731615]  test_alloc+0x1e8/0x8d0
[   51.732155]  test_corruption+0xdb/0x280
[   51.732894]  kunit_try_run_case+0x126/0x290
[   51.733510]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.734409]  kthread+0x19e/0x1e0
[   51.734988]  ret_from_fork+0x41/0x70
[   51.735488]  ret_from_fork_asm+0x1b/0x30
[   51.736118] 
[   51.736459] freed by task 271 on cpu 0 at 51.721654s:
[   51.737193]  test_corruption+0x10c/0x280
[   51.737760]  kunit_try_run_case+0x126/0x290
[   51.738454]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.739226]  kthread+0x19e/0x1e0
[   51.739701]  ret_from_fork+0x41/0x70
[   51.740348]  ret_from_fork_asm+0x1b/0x30
[   51.740942] 
[   51.741249] CPU: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   51.742247] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   51.743236] ==================================================================

test log snippet test parser 181

Home

[   51.410116] ==================================================================
[   51.411029] BUG: KFENCE: memory corruption in test_corruption+0x20f/0x280
[   51.411029] 
[   51.411762] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#157):
[   51.412868]  test_corruption+0x20f/0x280
[   51.413417]  kunit_try_run_case+0x126/0x290
[   51.414119]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.414758]  kthread+0x19e/0x1e0
[   51.415442]  ret_from_fork+0x41/0x70
[   51.416016]  ret_from_fork_asm+0x1b/0x30
[   51.416449] 
[   51.416779] kfence-#157: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   51.416779] 
[   51.417937] allocated by task 269 on cpu 1 at 51.409538s:
[   51.418579]  test_alloc+0x2a0/0x8d0
[   51.419225]  test_corruption+0x133/0x280
[   51.419751]  kunit_try_run_case+0x126/0x290
[   51.420403]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.421168]  kthread+0x19e/0x1e0
[   51.421591]  ret_from_fork+0x41/0x70
[   51.422383]  ret_from_fork_asm+0x1b/0x30
[   51.423006] 
[   51.423315] freed by task 269 on cpu 1 at 51.409784s:
[   51.423967]  test_corruption+0x20f/0x280
[   51.424710]  kunit_try_run_case+0x126/0x290
[   51.425295]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.426174]  kthread+0x19e/0x1e0
[   51.426629]  ret_from_fork+0x41/0x70
[   51.427372]  ret_from_fork_asm+0x1b/0x30
[   51.427924] 
[   51.428260] CPU: 1 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   51.429321] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   51.430166] ==================================================================

test log snippet test parser 182

Home

[   51.305940] ==================================================================
[   51.306835] BUG: KFENCE: memory corruption in test_corruption+0x1c0/0x280
[   51.306835] 
[   51.308134] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#156):
[   51.310228]  test_corruption+0x1c0/0x280
[   51.310956]  kunit_try_run_case+0x126/0x290
[   51.311545]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.312307]  kthread+0x19e/0x1e0
[   51.312776]  ret_from_fork+0x41/0x70
[   51.313645]  ret_from_fork_asm+0x1b/0x30
[   51.314436] 
[   51.314814] kfence-#156: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   51.314814] 
[   51.315911] allocated by task 269 on cpu 1 at 51.305326s:
[   51.316924]  test_alloc+0x2a0/0x8d0
[   51.317641]  test_corruption+0xdb/0x280
[   51.318352]  kunit_try_run_case+0x126/0x290
[   51.318998]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.319730]  kthread+0x19e/0x1e0
[   51.320390]  ret_from_fork+0x41/0x70
[   51.321357]  ret_from_fork_asm+0x1b/0x30
[   51.321846] 
[   51.322221] freed by task 269 on cpu 1 at 51.305480s:
[   51.322962]  test_corruption+0x1c0/0x280
[   51.323458]  kunit_try_run_case+0x126/0x290
[   51.324630]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   51.325395]  kthread+0x19e/0x1e0
[   51.325753]  ret_from_fork+0x41/0x70
[   51.326364]  ret_from_fork_asm+0x1b/0x30
[   51.326979] 
[   51.327404] CPU: 1 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   51.328555] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   51.329675] ==================================================================

test log snippet test parser 183

Home

[   56.402056] ==================================================================
[   56.402955] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x158/0x1f0
[   56.402955] 
[   56.403835] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . ] (in kfence-#205):
[   56.405584]  test_kmalloc_aligned_oob_write+0x158/0x1f0
[   56.406314]  kunit_try_run_case+0x126/0x290
[   56.406808]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   56.407634]  kthread+0x19e/0x1e0
[   56.408332]  ret_from_fork+0x41/0x70
[   56.408947]  ret_from_fork_asm+0x1b/0x30
[   56.409405] 
[   56.409762] kfence-#205: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[   56.409762] 
[   56.410698] allocated by task 283 on cpu 1 at 56.401451s:
[   56.411940]  test_alloc+0x2a0/0x8d0
[   56.412501]  test_kmalloc_aligned_oob_write+0xc0/0x1f0
[   56.413161]  kunit_try_run_case+0x126/0x290
[   56.413734]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   56.414335]  kthread+0x19e/0x1e0
[   56.414916]  ret_from_fork+0x41/0x70
[   56.415488]  ret_from_fork_asm+0x1b/0x30
[   56.416173] 
[   56.416472] freed by task 283 on cpu 1 at 56.401663s:
[   56.417357]  test_kmalloc_aligned_oob_write+0x158/0x1f0
[   56.418152]  kunit_try_run_case+0x126/0x290
[   56.418813]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   56.419537]  kthread+0x19e/0x1e0
[   56.420074]  ret_from_fork+0x41/0x70
[   56.420590]  ret_from_fork_asm+0x1b/0x30
[   56.421086] 
[   56.421368] CPU: 1 PID: 283 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   56.422429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   56.423413] ==================================================================

test log snippet test parser 184

Home

[   55.881814] ==================================================================
[   55.882661] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x12a/0x250
[   55.882661] 
[   55.883854] Out-of-bounds read at 0x(____ptrval____) (81B right of kfence-#200):
[   55.884776]  test_kmalloc_aligned_oob_read+0x12a/0x250
[   55.885254]  kunit_try_run_case+0x126/0x290
[   55.885600]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   55.886467]  kthread+0x19e/0x1e0
[   55.887498]  ret_from_fork+0x41/0x70
[   55.888732]  ret_from_fork_asm+0x1b/0x30
[   55.889458] 
[   55.889784] kfence-#200: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[   55.889784] 
[   55.891198] allocated by task 281 on cpu 0 at 55.881467s:
[   55.892034]  test_alloc+0x2a0/0x8d0
[   55.892657]  test_kmalloc_aligned_oob_read+0xda/0x250
[   55.893385]  kunit_try_run_case+0x126/0x290
[   55.894466]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   55.895461]  kthread+0x19e/0x1e0
[   55.895929]  ret_from_fork+0x41/0x70
[   55.896750]  ret_from_fork_asm+0x1b/0x30
[   55.897351] 
[   55.897548] CPU: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   55.898357] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   55.899688] ==================================================================

test log snippet test parser 185

Home

[   49.643198] ==================================================================
[   49.644064] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0xeb/0x290
[   49.644064] 
[   49.645043] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#140):
[   49.645843]  test_out_of_bounds_read+0xeb/0x290
[   49.646370]  kunit_try_run_case+0x126/0x290
[   49.646891]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.647683]  kthread+0x19e/0x1e0
[   49.648152]  ret_from_fork+0x41/0x70
[   49.648704]  ret_from_fork_asm+0x1b/0x30
[   49.649307] 
[   49.649969] kfence-#140: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   49.649969] 
[   49.651226] allocated by task 249 on cpu 1 at 49.641280s:
[   49.652540]  test_alloc+0x2a0/0x8d0
[   49.653222]  test_out_of_bounds_read+0xdb/0x290
[   49.653864]  kunit_try_run_case+0x126/0x290
[   49.654481]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.655399]  kthread+0x19e/0x1e0
[   49.655924]  ret_from_fork+0x41/0x70
[   49.656394]  ret_from_fork_asm+0x1b/0x30
[   49.657335] 
[   49.657685] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   49.658703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   49.659722] ==================================================================

test log snippet test parser 186

Home

[   50.369648] ==================================================================
[   50.370506] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x151/0x290
[   50.370506] 
[   50.371382] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#147):
[   50.372252]  test_out_of_bounds_read+0x151/0x290
[   50.373102]  kunit_try_run_case+0x126/0x290
[   50.373656]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.374558]  kthread+0x19e/0x1e0
[   50.375055]  ret_from_fork+0x41/0x70
[   50.375672]  ret_from_fork_asm+0x1b/0x30
[   50.376444] 
[   50.376767] kfence-#147: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   50.376767] 
[   50.378102] allocated by task 251 on cpu 1 at 50.369502s:
[   50.378907]  test_alloc+0x1e8/0x8d0
[   50.379572]  test_out_of_bounds_read+0x138/0x290
[   50.380173]  kunit_try_run_case+0x126/0x290
[   50.380948]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.381583]  kthread+0x19e/0x1e0
[   50.382382]  ret_from_fork+0x41/0x70
[   50.382948]  ret_from_fork_asm+0x1b/0x30
[   50.383761] 
[   50.384131] CPU: 1 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   50.385277] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   50.386415] ==================================================================

test log snippet test parser 187

Home

[   50.057650] ==================================================================
[   50.058269] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0xeb/0x290
[   50.058269] 
[   50.059171] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#144):
[   50.059926]  test_out_of_bounds_read+0xeb/0x290
[   50.060782]  kunit_try_run_case+0x126/0x290
[   50.061607]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.062574]  kthread+0x19e/0x1e0
[   50.063292]  ret_from_fork+0x41/0x70
[   50.063836]  ret_from_fork_asm+0x1b/0x30
[   50.064613] 
[   50.064994] kfence-#144: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   50.064994] 
[   50.066172] allocated by task 251 on cpu 1 at 50.057508s:
[   50.067342]  test_alloc+0x1e8/0x8d0
[   50.067899]  test_out_of_bounds_read+0xdb/0x290
[   50.068795]  kunit_try_run_case+0x126/0x290
[   50.069462]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.070246]  kthread+0x19e/0x1e0
[   50.070814]  ret_from_fork+0x41/0x70
[   50.071412]  ret_from_fork_asm+0x1b/0x30
[   50.072018] 
[   50.072346] CPU: 1 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   50.073465] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   50.074481] ==================================================================

test log snippet test parser 188

Home

[   49.953680] ==================================================================
[   49.954569] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x151/0x290
[   49.954569] 
[   49.955628] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#143):
[   49.956627]  test_out_of_bounds_read+0x151/0x290
[   49.957335]  kunit_try_run_case+0x126/0x290
[   49.958092]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.958739]  kthread+0x19e/0x1e0
[   49.959334]  ret_from_fork+0x41/0x70
[   49.959951]  ret_from_fork_asm+0x1b/0x30
[   49.960486] 
[   49.960739] kfence-#143: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   49.960739] 
[   49.961904] allocated by task 249 on cpu 1 at 49.953435s:
[   49.963051]  test_alloc+0x2a0/0x8d0
[   49.963687]  test_out_of_bounds_read+0x138/0x290
[   49.964510]  kunit_try_run_case+0x126/0x290
[   49.965024]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.965892]  kthread+0x19e/0x1e0
[   49.966381]  ret_from_fork+0x41/0x70
[   49.966910]  ret_from_fork_asm+0x1b/0x30
[   49.967597] 
[   49.967956] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   49.968933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   49.970036] ==================================================================

test log snippet test parser 189

Home

[   50.473541] ==================================================================
[   50.474425] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0xd9/0x1a0
[   50.474425] 
[   50.475255] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#148):
[   50.476295]  test_out_of_bounds_write+0xd9/0x1a0
[   50.476959]  kunit_try_run_case+0x126/0x290
[   50.477453]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.478310]  kthread+0x19e/0x1e0
[   50.479041]  ret_from_fork+0x41/0x70
[   50.479610]  ret_from_fork_asm+0x1b/0x30
[   50.480399] 
[   50.480737] kfence-#148: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   50.480737] 
[   50.481843] allocated by task 253 on cpu 1 at 50.473370s:
[   50.482716]  test_alloc+0x2a0/0x8d0
[   50.483311]  test_out_of_bounds_write+0xc9/0x1a0
[   50.484069]  kunit_try_run_case+0x126/0x290
[   50.484657]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.485548]  kthread+0x19e/0x1e0
[   50.486016]  ret_from_fork+0x41/0x70
[   50.486673]  ret_from_fork_asm+0x1b/0x30
[   50.487435] 
[   50.487730] CPU: 1 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   50.488595] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   50.489712] ==================================================================

test log snippet test parser 190

Home

[   50.577683] ==================================================================
[   50.578610] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0xd9/0x1a0
[   50.578610] 
[   50.579444] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#149):
[   50.580289]  test_out_of_bounds_write+0xd9/0x1a0
[   50.580788]  kunit_try_run_case+0x126/0x290
[   50.581335]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.581930]  kthread+0x19e/0x1e0
[   50.582560]  ret_from_fork+0x41/0x70
[   50.583268]  ret_from_fork_asm+0x1b/0x30
[   50.583890] 
[   50.584195] kfence-#149: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   50.584195] 
[   50.585680] allocated by task 255 on cpu 1 at 50.577500s:
[   50.586283]  test_alloc+0x1e8/0x8d0
[   50.586709]  test_out_of_bounds_write+0xc9/0x1a0
[   50.587437]  kunit_try_run_case+0x126/0x290
[   50.588008]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.588693]  kthread+0x19e/0x1e0
[   50.589217]  ret_from_fork+0x41/0x70
[   50.589773]  ret_from_fork_asm+0x1b/0x30
[   50.590289] 
[   50.590660] CPU: 1 PID: 255 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   50.591632] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   50.592539] ==================================================================

test log snippet test parser 191

Home

[   78.138178] ==================================================================
[   78.139090] BUG: KFENCE: use-after-free read in test_krealloc+0x2e9/0x530
[   78.139090] 
[   78.140513] Use-after-free read at 0x(____ptrval____) (in kfence-#210):
[   78.141390]  test_krealloc+0x2e9/0x530
[   78.142009]  kunit_try_run_case+0x126/0x290
[   78.142797]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   78.143613]  kthread+0x19e/0x1e0
[   78.144196]  ret_from_fork+0x41/0x70
[   78.144781]  ret_from_fork_asm+0x1b/0x30
[   78.145447] 
[   78.145770] kfence-#210: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   78.145770] 
[   78.146935] allocated by task 295 on cpu 0 at 78.137341s:
[   78.147925]  test_alloc+0x2a0/0x8d0
[   78.148551]  test_krealloc+0xb1/0x530
[   78.149186]  kunit_try_run_case+0x126/0x290
[   78.149804]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   78.150604]  kthread+0x19e/0x1e0
[   78.151190]  ret_from_fork+0x41/0x70
[   78.151763]  ret_from_fork_asm+0x1b/0x30
[   78.152438] 
[   78.152867] freed by task 295 on cpu 0 at 78.137662s:
[   78.153674]  krealloc+0x83/0x140
[   78.154234]  test_krealloc+0x137/0x530
[   78.154765]  kunit_try_run_case+0x126/0x290
[   78.155524]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   78.156312]  kthread+0x19e/0x1e0
[   78.156869]  ret_from_fork+0x41/0x70
[   78.157466]  ret_from_fork_asm+0x1b/0x30
[   78.158097] 
[   78.158446] CPU: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   78.159549] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   78.160606] ==================================================================

test log snippet test parser 192

Home

[   78.039097] ==================================================================
[   78.040005] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x14f/0x370
[   78.040005] 
[   78.041883] Use-after-free read at 0x(____ptrval____) (in kfence-#209):
[   78.042766]  test_memcache_typesafe_by_rcu+0x14f/0x370
[   78.043776]  kunit_try_run_case+0x126/0x290
[   78.044403]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   78.045175]  kthread+0x19e/0x1e0
[   78.045935]  ret_from_fork+0x41/0x70
[   78.046456]  ret_from_fork_asm+0x1b/0x30
[   78.046976] 
[   78.047296] kfence-#209: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   78.047296] 
[   78.048209] allocated by task 293 on cpu 1 at 78.033383s:
[   78.049024]  test_alloc+0x1e8/0x8d0
[   78.049580]  test_memcache_typesafe_by_rcu+0xec/0x370
[   78.050403]  kunit_try_run_case+0x126/0x290
[   78.051151]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   78.051885]  kthread+0x19e/0x1e0
[   78.052345]  ret_from_fork+0x41/0x70
[   78.052806]  ret_from_fork_asm+0x1b/0x30
[   78.053413] 
[   78.053724] freed by task 0 on cpu 1 at 78.038849s:
[   78.054682]  rcu_guarded_free+0x2e/0x40
[   78.055319]  rcu_core+0x4be/0x1020
[   78.055806]  rcu_core_si+0x12/0x20
[   78.056384]  handle_softirqs+0x195/0x520
[   78.057019]  irq_exit_rcu+0x92/0xb0
[   78.057429]  sysvec_apic_timer_interrupt+0x80/0xa0
[   78.058155]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   78.058794]  default_idle+0xf/0x20
[   78.059246]  default_idle_call+0x42/0x70
[   78.059901]  do_idle+0x2ba/0x310
[   78.060287]  cpu_startup_entry+0x3c/0x40
[   78.060965]  start_secondary+0x1ac/0x1d0
[   78.061477]  secondary_startup_64_no_verify+0x178/0x17b
[   78.062249] 
[   78.062530] CPU: 1 PID: 293 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   78.063800] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   78.065064] ==================================================================

test log snippet test parser 193

Home

[   50.682275] ==================================================================
[   50.683555] BUG: KFENCE: use-after-free read in test_use_after_free_read+0xf7/0x1a0
[   50.683555] 
[   50.684598] Use-after-free read at 0x(____ptrval____) (in kfence-#150):
[   50.686159]  test_use_after_free_read+0xf7/0x1a0
[   50.686759]  kunit_try_run_case+0x126/0x290
[   50.687409]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.688187]  kthread+0x19e/0x1e0
[   50.688628]  ret_from_fork+0x41/0x70
[   50.689242]  ret_from_fork_asm+0x1b/0x30
[   50.689795] 
[   50.690101] kfence-#150: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   50.690101] 
[   50.691086] allocated by task 257 on cpu 1 at 50.681634s:
[   50.691946]  test_alloc+0x2a0/0x8d0
[   50.692401]  test_use_after_free_read+0xd0/0x1a0
[   50.693132]  kunit_try_run_case+0x126/0x290
[   50.693719]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.694402]  kthread+0x19e/0x1e0
[   50.694946]  ret_from_fork+0x41/0x70
[   50.695427]  ret_from_fork_asm+0x1b/0x30
[   50.696073] 
[   50.696423] freed by task 257 on cpu 1 at 50.681803s:
[   50.697450]  test_use_after_free_read+0x14b/0x1a0
[   50.698149]  kunit_try_run_case+0x126/0x290
[   50.698773]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.699547]  kthread+0x19e/0x1e0
[   50.700025]  ret_from_fork+0x41/0x70
[   50.700565]  ret_from_fork_asm+0x1b/0x30
[   50.701068] 
[   50.701398] CPU: 1 PID: 257 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   50.702377] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   50.703251] ==================================================================

test log snippet test parser 194

Home

[   50.785838] ==================================================================
[   50.786474] BUG: KFENCE: use-after-free read in test_use_after_free_read+0xf7/0x1a0
[   50.786474] 
[   50.787482] Use-after-free read at 0x(____ptrval____) (in kfence-#151):
[   50.788219]  test_use_after_free_read+0xf7/0x1a0
[   50.788984]  kunit_try_run_case+0x126/0x290
[   50.789603]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.790603]  kthread+0x19e/0x1e0
[   50.791223]  ret_from_fork+0x41/0x70
[   50.791816]  ret_from_fork_asm+0x1b/0x30
[   50.792576] 
[   50.792919] kfence-#151: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   50.792919] 
[   50.794068] allocated by task 259 on cpu 1 at 50.785481s:
[   50.795024]  test_alloc+0x1e8/0x8d0
[   50.795567]  test_use_after_free_read+0xd0/0x1a0
[   50.796424]  kunit_try_run_case+0x126/0x290
[   50.797114]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.797912]  kthread+0x19e/0x1e0
[   50.798438]  ret_from_fork+0x41/0x70
[   50.799077]  ret_from_fork_asm+0x1b/0x30
[   50.799674] 
[   50.800100] freed by task 259 on cpu 1 at 50.785646s:
[   50.801029]  test_use_after_free_read+0xeb/0x1a0
[   50.801675]  kunit_try_run_case+0x126/0x290
[   50.802340]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   50.803117]  kthread+0x19e/0x1e0
[   50.803658]  ret_from_fork+0x41/0x70
[   50.804429]  ret_from_fork_asm+0x1b/0x30
[   50.805134] 
[   50.805511] CPU: 1 PID: 259 Comm: kunit_try_catch Tainted: G    B            N 6.6.74-rc1 #1
[   50.806645] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   50.807666] ==================================================================

test log snippet test parser 195

Home

------------[ cut here ]------------
[   52.812666] WARNING: CPU: 0 PID: 478 at mm/util.c:632 kvmalloc_node+0xd1/0xe0
[   52.814338] Modules linked in:
[   52.815462] CPU: 0 PID: 478 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[   52.818084] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   52.819808] RIP: 0010:kvmalloc_node+0xd1/0xe0
[   52.820353] Code: 04 00 48 83 c4 18 48 8d 65 e8 5b 41 5c 41 5d 5d c3 cc cc cc cc 48 b9 00 00 00 00 00 20 00 00 eb bd 80 e7 20 0f 85 52 ff ff ff <0f> 0b e9 4b ff ff ff 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90
[   52.820987] RSP: 0018:ffffafb1005efe00 EFLAGS: 00010246
[   52.822925] RAX: 0000000000000000 RBX: 00000000004000c0 RCX: 0000000000000015
[   52.823436] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000452cc0
[   52.824438] RBP: ffffafb1005efe18 R08: 0000000000000040 R09: 0000000000000000
[   52.824746] R10: 0000000000000038 R11: ffff8bfc8139f100 R12: 0000000200002000
[   52.826418] R13: 00000000ffffffff R14: ffff8bfc80a75100 R15: ffff8bfc80a75080
[   52.827168] FS:  00007f657ffdd740(0000) GS:ffff8bfcfbc00000(0000) knlGS:0000000000000000
[   52.828113] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   52.828378] CR2: 00007f6580181680 CR3: 0000000105174000 CR4: 00000000000006f0
[   52.829719] Call Trace:
[   52.831740]  <TASK>
[   52.832377]  ? show_regs+0x64/0x70
[   52.833062]  ? __warn+0x88/0x150
[   52.833227]  ? kvmalloc_node+0xd1/0xe0
[   52.833948]  ? report_bug+0x171/0x1a0
[   52.834673]  ? handle_bug+0x5b/0x90
[   52.835290]  ? exc_invalid_op+0x1c/0x70
[   52.835451]  ? asm_exc_invalid_op+0x1f/0x30
[   52.836428]  ? kvmalloc_node+0xd1/0xe0
[   52.837307]  alloc_fdtable+0x74/0x100
[   52.838115]  expand_files+0x62/0x300
[   52.838394]  ? lapic_next_event+0x14/0x20
[   52.838552]  ? clockevents_program_event+0x9f/0x100
[   52.838737]  ksys_dup3+0x70/0x110
[   52.838880]  __x64_sys_dup2+0x2a/0xa0
[   52.839029]  x64_sys_call+0x1b43/0x1c90
[   52.840717]  do_syscall_64+0x39/0x90
[   52.841085]  entry_SYSCALL_64_after_hwframe+0x78/0xe2
[   52.842301] RIP: 0033:0x7f65800d5c17
[   52.843450] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[   52.845206] RSP: 002b:00007ffdb0c3fc68 EFLAGS: 00000202 ORIG_RAX: 0000000000000021
[   52.846197] RAX: ffffffffffffffda RBX: 00007ffdb0c404c8 RCX: 00007f65800d5c17
[   52.846951] RDX: 00007ffdb0c3fc90 RSI: 0000000040000038 RDI: 0000000000000002
[   52.847193] RBP: 00007ffdb0c3fe90 R08: 0000000000000064 R09: 0000000000000000
[   52.847655] R10: 00007f657fff2170 R11: 0000000000000202 R12: 0000000000000000
[   52.848096] R13: 00007ffdb0c404d8 R14: 00007f658020b000 R15: 0000560b289c9dd8
[   52.848602]  </TASK>
[   52.848972] ---[ end trace 0000000000000000 ]---

test log snippet test parser 196

Home

------------[ cut here ]------------
[   52.812666] WARNING: CPU: 0 PID: 478 at mm/util.c:632 kvmalloc_node+0xd1/0xe0
[   52.814338] Modules linked in:
[   52.815462] CPU: 0 PID: 478 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[   52.818084] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   52.819808] RIP: 0010:kvmalloc_node+0xd1/0xe0
[   52.820353] Code: 04 00 48 83 c4 18 48 8d 65 e8 5b 41 5c 41 5d 5d c3 cc cc cc cc 48 b9 00 00 00 00 00 20 00 00 eb bd 80 e7 20 0f 85 52 ff ff ff <0f> 0b e9 4b ff ff ff 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90
[   52.820987] RSP: 0018:ffffafb1005efe00 EFLAGS: 00010246
[   52.822925] RAX: 0000000000000000 RBX: 00000000004000c0 RCX: 0000000000000015
[   52.823436] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000452cc0
[   52.824438] RBP: ffffafb1005efe18 R08: 0000000000000040 R09: 0000000000000000
[   52.824746] R10: 0000000000000038 R11: ffff8bfc8139f100 R12: 0000000200002000
[   52.826418] R13: 00000000ffffffff R14: ffff8bfc80a75100 R15: ffff8bfc80a75080
[   52.827168] FS:  00007f657ffdd740(0000) GS:ffff8bfcfbc00000(0000) knlGS:0000000000000000
[   52.828113] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   52.828378] CR2: 00007f6580181680 CR3: 0000000105174000 CR4: 00000000000006f0
[   52.829719] Call Trace:
[   52.831740]  <TASK>
[   52.832377]  ? show_regs+0x64/0x70
[   52.833062]  ? __warn+0x88/0x150
[   52.833227]  ? kvmalloc_node+0xd1/0xe0
[   52.833948]  ? report_bug+0x171/0x1a0
[   52.834673]  ? handle_bug+0x5b/0x90
[   52.835290]  ? exc_invalid_op+0x1c/0x70
[   52.835451]  ? asm_exc_invalid_op+0x1f/0x30
[   52.836428]  ? kvmalloc_node+0xd1/0xe0
[   52.837307]  alloc_fdtable+0x74/0x100
[   52.838115]  expand_files+0x62/0x300
[   52.838394]  ? lapic_next_event+0x14/0x20
[   52.838552]  ? clockevents_program_event+0x9f/0x100
[   52.838737]  ksys_dup3+0x70/0x110
[   52.838880]  __x64_sys_dup2+0x2a/0xa0
[   52.839029]  x64_sys_call+0x1b43/0x1c90
[   52.840717]  do_syscall_64+0x39/0x90
[   52.841085]  entry_SYSCALL_64_after_hwframe+0x78/0xe2
[   52.842301] RIP: 0033:0x7f65800d5c17
[   52.843450] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[   52.845206] RSP: 002b:00007ffdb0c3fc68 EFLAGS: 00000202 ORIG_RAX: 0000000000000021
[   52.846197] RAX: ffffffffffffffda RBX: 00007ffdb0c404c8 RCX: 00007f65800d5c17
[   52.846951] RDX: 00007ffdb0c3fc90 RSI: 0000000040000038 RDI: 0000000000000002
[   52.847193] RBP: 00007ffdb0c3fe90 R08: 0000000000000064 R09: 0000000000000000
[   52.847655] R10: 00007f657fff2170 R11: 0000000000000202 R12: 0000000000000000
[   52.848096] R13: 00007ffdb0c404d8 R14: 00007f658020b000 R15: 0000560b289c9dd8
[   52.848602]  </TASK>
[   52.848972] ---[ end trace 0000000000000000 ]---

test log snippet test parser 197

Home

------------[ cut here ]------------
[  211.746434] WARNING: CPU: 1 PID: 1460 at mm/util.c:632 kvmalloc_node+0xe0/0xe8
[  211.747082] Modules linked in: snd_soc_hdmi_codec hantro_vpu dw_hdmi_cec dw_hdmi_i2s_audio crct10dif_ce snd_soc_audio_graph_card snd_soc_spdif_tx v4l2_h264 snd_soc_simple_card brcmfmac v4l2_vp9 panfrost v4l2_mem2mem snd_soc_simple_card_utils rockchipdrm gpu_sched hci_uart brcmutil videobuf2_v4l2 btqca dw_mipi_dsi btbcm drm_shmem_helper rtc_rk808 analogix_dp bluetooth dw_hdmi videodev phy_rockchip_pcie cec videobuf2_dma_contig ecdh_generic videobuf2_memops snd_soc_rockchip_i2s cfg80211 ecc videobuf2_common mc drm_display_helper drm_dma_helper rfkill snd_soc_es8316 rockchip_saradc drm_kms_helper industrialio_triggered_buffer coresight_cpu_debug kfifo_buf coresight pcie_rockchip_host rockchip_thermal drm backlight fuse ip_tables x_tables
[  211.752868] CPU: 1 PID: 1460 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[  211.753465] Hardware name: Radxa ROCK Pi 4B (DT)
[  211.753872] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  211.754484] pc : kvmalloc_node+0xe0/0xe8
[  211.754836] lr : kvmalloc_node+0x50/0xe8
[  211.755184] sp : ffff8000848abce0
[  211.755476] x29: ffff8000848abcf0 x28: ffff000007caa000 x27: 0000000000000000
[  211.756107] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[  211.756737] x23: 0000000080000000 x22: ffff800080306d68 x21: 0000000200002000
[  211.757368] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[  211.757998] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  211.758628] x14: 0000000000000000 x13: 0000000000000000 x12: ffffffffffffd754
[  211.759258] x11: 0000000000000040 x10: 3890b587d2886a00 x9 : 3890b587d2886a00
[  211.759888] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000038
[  211.760518] x5 : 0000000000000000 x4 : ffff8000848abca0 x3 : 0000000000000000
[  211.761148] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[  211.761778] Call trace:
[  211.761997]  kvmalloc_node+0xe0/0xe8
[  211.762315]  alloc_fdtable+0x7c/0x108
[  211.762645]  expand_files+0x114/0x2f0
[  211.762972]  ksys_dup3+0x60/0xf4
[  211.763260]  __arm64_sys_dup3+0x20/0x30
[  211.763601]  invoke_syscall+0x40/0x100
[  211.763940]  el0_svc_common+0xa8/0xd8
[  211.764267]  do_el0_svc+0x1c/0x28
[  211.764564]  el0_svc+0x38/0x64
[  211.764842]  el0t_64_sync_handler+0x90/0xfc
[  211.765213]  el0t_64_sync+0x190/0x194
[  211.765541] ---[ end trace 0000000000000000 ]---

test log snippet test parser 198

Home

------------[ cut here ]------------
[  211.746434] WARNING: CPU: 1 PID: 1460 at mm/util.c:632 kvmalloc_node+0xe0/0xe8
[  211.747082] Modules linked in: snd_soc_hdmi_codec hantro_vpu dw_hdmi_cec dw_hdmi_i2s_audio crct10dif_ce snd_soc_audio_graph_card snd_soc_spdif_tx v4l2_h264 snd_soc_simple_card brcmfmac v4l2_vp9 panfrost v4l2_mem2mem snd_soc_simple_card_utils rockchipdrm gpu_sched hci_uart brcmutil videobuf2_v4l2 btqca dw_mipi_dsi btbcm drm_shmem_helper rtc_rk808 analogix_dp bluetooth dw_hdmi videodev phy_rockchip_pcie cec videobuf2_dma_contig ecdh_generic videobuf2_memops snd_soc_rockchip_i2s cfg80211 ecc videobuf2_common mc drm_display_helper drm_dma_helper rfkill snd_soc_es8316 rockchip_saradc drm_kms_helper industrialio_triggered_buffer coresight_cpu_debug kfifo_buf coresight pcie_rockchip_host rockchip_thermal drm backlight fuse ip_tables x_tables
[  211.752868] CPU: 1 PID: 1460 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[  211.753465] Hardware name: Radxa ROCK Pi 4B (DT)
[  211.753872] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  211.754484] pc : kvmalloc_node+0xe0/0xe8
[  211.754836] lr : kvmalloc_node+0x50/0xe8
[  211.755184] sp : ffff8000848abce0
[  211.755476] x29: ffff8000848abcf0 x28: ffff000007caa000 x27: 0000000000000000
[  211.756107] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[  211.756737] x23: 0000000080000000 x22: ffff800080306d68 x21: 0000000200002000
[  211.757368] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[  211.757998] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  211.758628] x14: 0000000000000000 x13: 0000000000000000 x12: ffffffffffffd754
[  211.759258] x11: 0000000000000040 x10: 3890b587d2886a00 x9 : 3890b587d2886a00
[  211.759888] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000038
[  211.760518] x5 : 0000000000000000 x4 : ffff8000848abca0 x3 : 0000000000000000
[  211.761148] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[  211.761778] Call trace:
[  211.761997]  kvmalloc_node+0xe0/0xe8
[  211.762315]  alloc_fdtable+0x7c/0x108
[  211.762645]  expand_files+0x114/0x2f0
[  211.762972]  ksys_dup3+0x60/0xf4
[  211.763260]  __arm64_sys_dup3+0x20/0x30
[  211.763601]  invoke_syscall+0x40/0x100
[  211.763940]  el0_svc_common+0xa8/0xd8
[  211.764267]  do_el0_svc+0x1c/0x28
[  211.764564]  el0_svc+0x38/0x64
[  211.764842]  el0t_64_sync_handler+0x90/0xfc
[  211.765213]  el0t_64_sync+0x190/0x194
[  211.765541] ---[ end trace 0000000000000000 ]---

test log snippet test parser 199

Home

------------[ cut here ]------------
[  281.127099] WARNING: CPU: 1 PID: 1445 at mm/util.c:632 kvmalloc_node+0xfc/0x10c
[  281.127751] Modules linked in: hantro_vpu snd_soc_hdmi_codec dw_hdmi_cec dw_hdmi_i2s_audio v4l2_vp9 panfrost brcmfmac v4l2_h264 v4l2_mem2mem brcmutil crct10dif_ce rockchipdrm drm_shmem_helper videobuf2_dma_contig snd_soc_audio_graph_card snd_soc_simple_card hci_uart videobuf2_memops analogix_dp videobuf2_v4l2 snd_soc_simple_card_utils snd_soc_spdif_tx gpu_sched btqca btbcm videodev dw_mipi_dsi phy_rockchip_pcie bluetooth dw_hdmi videobuf2_common cfg80211 mc snd_soc_rockchip_i2s cec ecdh_generic drm_display_helper ecc rtc_rk808 drm_dma_helper rfkill rockchip_saradc snd_soc_es8316 industrialio_triggered_buffer drm_kms_helper kfifo_buf rockchip_thermal coresight_cpu_debug coresight pcie_rockchip_host fuse drm backlight ip_tables x_tables
[  281.133535] CPU: 1 PID: 1445 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[  281.134136] Hardware name: Radxa ROCK Pi 4B (DT)
[  281.134543] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  281.135155] pc : kvmalloc_node+0xfc/0x10c
[  281.135514] lr : kvmalloc_node+0x64/0x10c
[  281.135869] sp : ffff8000846f3ce0
[  281.136161] x29: ffff8000846f3cf0 x28: ffff000009bbc000 x27: 0000000000000000
[  281.136793] x26: 0000000000000000 x25: 0000000000000000 x24: ffff00000252e700
[  281.137425] x23: ffff00000252e680 x22: ffff8000802eece4 x21: 00000000ffffffff
[  281.138057] x20: 0000000200002000 x19: 0000000000400cc0 x18: 0000000000000000
[  281.138688] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  281.139319] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[  281.139948] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[  281.140578] x8 : 0000000000000000 x7 : 0000000000000000 x6 : ffffffffffffd6e3
[  281.141209] x5 : 0000000000000000 x4 : ffff000009bbc000 x3 : 0000000000000000
[  281.141839] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[  281.142471] Call trace:
[  281.142692]  kvmalloc_node+0xfc/0x10c
[  281.143022]  alloc_fdtable+0x94/0x114
[  281.143350]  expand_files+0x78/0x318
[  281.143669]  ksys_dup3+0x60/0x128
[  281.143965]  __arm64_sys_dup3+0x20/0x30
[  281.144309]  invoke_syscall+0x48/0x114
[  281.144646]  el0_svc_common.constprop.0+0x40/0xe0
[  281.145065]  do_el0_svc+0x1c/0x28
[  281.145362]  el0_svc+0x38/0xc8
[  281.145639]  el0t_64_sync_handler+0x120/0x12c
[  281.146025]  el0t_64_sync+0x190/0x194
[  281.146351] ---[ end trace 0000000000000000 ]---

test log snippet test parser 200

Home

------------[ cut here ]------------
[  281.127099] WARNING: CPU: 1 PID: 1445 at mm/util.c:632 kvmalloc_node+0xfc/0x10c
[  281.127751] Modules linked in: hantro_vpu snd_soc_hdmi_codec dw_hdmi_cec dw_hdmi_i2s_audio v4l2_vp9 panfrost brcmfmac v4l2_h264 v4l2_mem2mem brcmutil crct10dif_ce rockchipdrm drm_shmem_helper videobuf2_dma_contig snd_soc_audio_graph_card snd_soc_simple_card hci_uart videobuf2_memops analogix_dp videobuf2_v4l2 snd_soc_simple_card_utils snd_soc_spdif_tx gpu_sched btqca btbcm videodev dw_mipi_dsi phy_rockchip_pcie bluetooth dw_hdmi videobuf2_common cfg80211 mc snd_soc_rockchip_i2s cec ecdh_generic drm_display_helper ecc rtc_rk808 drm_dma_helper rfkill rockchip_saradc snd_soc_es8316 industrialio_triggered_buffer drm_kms_helper kfifo_buf rockchip_thermal coresight_cpu_debug coresight pcie_rockchip_host fuse drm backlight ip_tables x_tables
[  281.133535] CPU: 1 PID: 1445 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[  281.134136] Hardware name: Radxa ROCK Pi 4B (DT)
[  281.134543] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  281.135155] pc : kvmalloc_node+0xfc/0x10c
[  281.135514] lr : kvmalloc_node+0x64/0x10c
[  281.135869] sp : ffff8000846f3ce0
[  281.136161] x29: ffff8000846f3cf0 x28: ffff000009bbc000 x27: 0000000000000000
[  281.136793] x26: 0000000000000000 x25: 0000000000000000 x24: ffff00000252e700
[  281.137425] x23: ffff00000252e680 x22: ffff8000802eece4 x21: 00000000ffffffff
[  281.138057] x20: 0000000200002000 x19: 0000000000400cc0 x18: 0000000000000000
[  281.138688] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  281.139319] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[  281.139948] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[  281.140578] x8 : 0000000000000000 x7 : 0000000000000000 x6 : ffffffffffffd6e3
[  281.141209] x5 : 0000000000000000 x4 : ffff000009bbc000 x3 : 0000000000000000
[  281.141839] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[  281.142471] Call trace:
[  281.142692]  kvmalloc_node+0xfc/0x10c
[  281.143022]  alloc_fdtable+0x94/0x114
[  281.143350]  expand_files+0x78/0x318
[  281.143669]  ksys_dup3+0x60/0x128
[  281.143965]  __arm64_sys_dup3+0x20/0x30
[  281.144309]  invoke_syscall+0x48/0x114
[  281.144646]  el0_svc_common.constprop.0+0x40/0xe0
[  281.145065]  do_el0_svc+0x1c/0x28
[  281.145362]  el0_svc+0x38/0xc8
[  281.145639]  el0t_64_sync_handler+0x120/0x12c
[  281.146025]  el0t_64_sync+0x190/0x194
[  281.146351] ---[ end trace 0000000000000000 ]---

test log snippet test parser 201

Home

------------[ cut here ]------------
[  249.289599] WARNING: CPU: 2 PID: 1425 at mm/util.c:632 kvmalloc_node+0xd1/0xe0
[  249.296863] Modules linked in: x86_pkg_temp_thermal
[  249.303083] CPU: 2 PID: 1425 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[  249.309913] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  249.318646] RIP: 0010:kvmalloc_node+0xd1/0xe0
[  249.323096] Code: 04 00 48 83 c4 18 48 8d 65 e8 5b 41 5c 41 5d 5d c3 cc cc cc cc 48 b9 00 00 00 00 00 20 00 00 eb bd 80 e7 20 0f 85 52 ff ff ff <0f> 0b e9 4b ff ff ff 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90
[  249.343245] RSP: 0018:ffff8e4a017dbe00 EFLAGS: 00010246
[  249.349811] RAX: 0000000000000000 RBX: 00000000004000c0 RCX: 0000000000000015
[  249.356987] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000452cc0
[  249.365455] RBP: ffff8e4a017dbe18 R08: 0000000000000040 R09: 0000000000000000
[  249.372629] R10: 0000000000000038 R11: ffff8a9f820d4680 R12: 0000000200002000
[  249.381098] R13: 00000000ffffffff R14: ffff8a9f801ee9c0 R15: ffff8a9f801ee940
[  249.388310] FS:  00007efe6d596740(0000) GS:ffff8aa0efb00000(0000) knlGS:0000000000000000
[  249.397695] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  249.403527] CR2: 00007efe6d71d942 CR3: 000000010d96c005 CR4: 00000000003706e0
[  249.411961] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  249.419253] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  249.427629] Call Trace:
[  249.430164]  <TASK>
[  249.433565]  ? show_regs+0x64/0x70
[  249.437055]  ? __warn+0x88/0x150
[  249.441607]  ? kvmalloc_node+0xd1/0xe0
[  249.445472]  ? report_bug+0x171/0x1a0
[  249.450429]  ? handle_bug+0x5b/0x90
[  249.454012]  ? exc_invalid_op+0x1c/0x70
[  249.459276]  ? asm_exc_invalid_op+0x1f/0x30
[  249.464764]  ? kvmalloc_node+0xd1/0xe0
[  249.468624]  alloc_fdtable+0x74/0x100
[  249.473588]  expand_files+0x62/0x300
[  249.477318]  ? do_prlimit+0x132/0x210
[  249.482288]  ksys_dup3+0x70/0x110
[  249.485700]  __x64_sys_dup2+0x2a/0xa0
[  249.490686]  x64_sys_call+0x1b43/0x1c90
[  249.494637]  do_syscall_64+0x39/0x90
[  249.499508]  entry_SYSCALL_64_after_hwframe+0x78/0xe2
[  249.504671] RIP: 0033:0x7efe6d68ec17
[  249.509543] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[  249.528403] RSP: 002b:00007ffc34781ca8 EFLAGS: 00000202 ORIG_RAX: 0000000000000021
[  249.537259] RAX: ffffffffffffffda RBX: 00007ffc34782508 RCX: 00007efe6d68ec17
[  249.544473] RDX: 00007ffc34781cd0 RSI: 0000000040000038 RDI: 0000000000000002
[  249.552900] RBP: 00007ffc34781ed0 R08: 0000000000000064 R09: 0000000000000000
[  249.560085] R10: 00007efe6d5ab170 R11: 0000000000000202 R12: 0000000000000000
[  249.568537] R13: 00007ffc34782518 R14: 00007efe6d7c4000 R15: 0000564edeb77dd8
[  249.575736]  </TASK>
[  249.579239] ---[ end trace 0000000000000000 ]---

test log snippet test parser 202

Home

------------[ cut here ]------------
[  249.289599] WARNING: CPU: 2 PID: 1425 at mm/util.c:632 kvmalloc_node+0xd1/0xe0
[  249.296863] Modules linked in: x86_pkg_temp_thermal
[  249.303083] CPU: 2 PID: 1425 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[  249.309913] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  249.318646] RIP: 0010:kvmalloc_node+0xd1/0xe0
[  249.323096] Code: 04 00 48 83 c4 18 48 8d 65 e8 5b 41 5c 41 5d 5d c3 cc cc cc cc 48 b9 00 00 00 00 00 20 00 00 eb bd 80 e7 20 0f 85 52 ff ff ff <0f> 0b e9 4b ff ff ff 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90
[  249.343245] RSP: 0018:ffff8e4a017dbe00 EFLAGS: 00010246
[  249.349811] RAX: 0000000000000000 RBX: 00000000004000c0 RCX: 0000000000000015
[  249.356987] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000452cc0
[  249.365455] RBP: ffff8e4a017dbe18 R08: 0000000000000040 R09: 0000000000000000
[  249.372629] R10: 0000000000000038 R11: ffff8a9f820d4680 R12: 0000000200002000
[  249.381098] R13: 00000000ffffffff R14: ffff8a9f801ee9c0 R15: ffff8a9f801ee940
[  249.388310] FS:  00007efe6d596740(0000) GS:ffff8aa0efb00000(0000) knlGS:0000000000000000
[  249.397695] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  249.403527] CR2: 00007efe6d71d942 CR3: 000000010d96c005 CR4: 00000000003706e0
[  249.411961] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  249.419253] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  249.427629] Call Trace:
[  249.430164]  <TASK>
[  249.433565]  ? show_regs+0x64/0x70
[  249.437055]  ? __warn+0x88/0x150
[  249.441607]  ? kvmalloc_node+0xd1/0xe0
[  249.445472]  ? report_bug+0x171/0x1a0
[  249.450429]  ? handle_bug+0x5b/0x90
[  249.454012]  ? exc_invalid_op+0x1c/0x70
[  249.459276]  ? asm_exc_invalid_op+0x1f/0x30
[  249.464764]  ? kvmalloc_node+0xd1/0xe0
[  249.468624]  alloc_fdtable+0x74/0x100
[  249.473588]  expand_files+0x62/0x300
[  249.477318]  ? do_prlimit+0x132/0x210
[  249.482288]  ksys_dup3+0x70/0x110
[  249.485700]  __x64_sys_dup2+0x2a/0xa0
[  249.490686]  x64_sys_call+0x1b43/0x1c90
[  249.494637]  do_syscall_64+0x39/0x90
[  249.499508]  entry_SYSCALL_64_after_hwframe+0x78/0xe2
[  249.504671] RIP: 0033:0x7efe6d68ec17
[  249.509543] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[  249.528403] RSP: 002b:00007ffc34781ca8 EFLAGS: 00000202 ORIG_RAX: 0000000000000021
[  249.537259] RAX: ffffffffffffffda RBX: 00007ffc34782508 RCX: 00007efe6d68ec17
[  249.544473] RDX: 00007ffc34781cd0 RSI: 0000000040000038 RDI: 0000000000000002
[  249.552900] RBP: 00007ffc34781ed0 R08: 0000000000000064 R09: 0000000000000000
[  249.560085] R10: 00007efe6d5ab170 R11: 0000000000000202 R12: 0000000000000000
[  249.568537] R13: 00007ffc34782518 R14: 00007efe6d7c4000 R15: 0000564edeb77dd8
[  249.575736]  </TASK>
[  249.579239] ---[ end trace 0000000000000000 ]---