Home
exec_load_address_static_0x1000000_Unwanted_INTERP_program_header_missing pass
exec_load_address_static_0x1000000_Alignment_found pass
exec_load_address_static_0x1000000_Alignment_is_a_power_of_2_0x1000000 pass
exec_load_address_static_0x1000000_Load_Address_is_MISaligned_0xe00000 fail
exec_load_address_static_0x1000000 fail
Home
fs_fill fs_fill
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 38775ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file0
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 49248ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file1
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file1
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file1
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file1
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 68915ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 28519ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file3
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file3
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file3
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file3
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 44187ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 21161ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file0
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 50753ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 11822ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file0
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 29324ms
Home
Home
Home
Home
starvation starvation
starvation.c:98: TINFO: Setting affinity to CPU 0
starvation.c:52: TINFO: CPU did 120000000 loops in 251277us
starvation.c:148: TFAIL: Scheduller starvation reproduced.
Home
net_mptcp_simult_flows_sh_-_simult_flows_balanced_bwidth_with_unbalanced_delay fail
net_mptcp_simult_flows_sh_-_simult_flows_balanced_bwidth_with_unbalanced_delay__reverse_direction pass
Home
_19_Breakpoint_overflow_sampling fail
Home
hugemmap15 hugemmap15
hugemmap15.c:190: TFAIL: icache unclean
Home
timers_posix_timers_check_signal_distribution fail
Home
starvation starvation
starvation.c:98: TINFO: Setting affinity to CPU 0
starvation.c:52: TINFO: CPU did 120000000 loops in 280883us
starvation.c:148: TFAIL: Scheduller starvation reproduced.
Home
starvation starvation
starvation.c:98: TINFO: Setting affinity to CPU 0
starvation.c:52: TINFO: CPU did 120000000 loops in 261638us
starvation.c:148: TFAIL: Scheduller starvation reproduced.
Home
starvation starvation
starvation.c:98: TINFO: Setting affinity to CPU 0
starvation.c:52: TINFO: CPU did 120000000 loops in 282036us
starvation.c:148: TFAIL: Scheduller starvation reproduced.
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
In file included from basic_percpu_ops_test.c:12:
/usr/bin/i686-linux-gnu-ld: /tmp/basic_percpu_ops_test-dd3d36.o: warning: relocation in read-only section `.text'
Home
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build DESTDIR=/home/tuxbuild/.cache/tuxmake/builds/1/build/cpupower-install ARCH=i386 SRCARCH=x86 CROSS_COMPILE=i686-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1 -C tools/power/cpupower
utils/cpupower-info.c:60:utils/cpupower-set.c:77:21: warning: implicit truncation from 'int' to a one-bit wide bit-field changes value from 1 to -1 [-Wsingle-bit-bitfield-constant-conversion]
77 | params.perf_bias = 1;
| ^ ~
Home
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build DESTDIR=/home/tuxbuild/.cache/tuxmake/builds/1/build/cpupower-install ARCH=i386 SRCARCH=x86 CROSS_COMPILE=i686-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1 -C tools/power/cpupower
21: warning: utils/cpupower-set.c:86:15: warning: implicit truncation from 'int' to a one-bit wide bit-field changes value from 1 to -1 [-Wsingle-bit-bitfield-constant-conversion]
86 | params.epp = 1;
| ^ ~
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
In file included from basic_percpu_ops_test.c:12:
/usr/bin/i686-linux-gnu-ld: /tmp/basic_percpu_ops_test-a8861f.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
In file included from basic_percpu_ops_test.c:12:
/usr/bin/i686-linux-gnu-ld: /tmp/basic_percpu_ops_test-dd9f8c.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccejdjhZ.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/cc23jt5X.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccK6XrA1.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccLL8OeR.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccNXPB2m.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccRfwTHV.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccw62RHr.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/2/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccX4j0ah.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/3/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/cccG2bRm.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/3/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccgaGw5z.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/3/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccHpqXh7.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/3/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccJGoW4m.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/3/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/cc1kj1DT.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/3/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccL366DZ.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/3/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccrN1iF9.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/3/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/rseq'
/usr/lib/gcc-cross/i686-linux-gnu/13/../../../../i686-linux-gnu/bin/ld: /tmp/ccvyLu0o.o: warning: relocation in read-only section `.text'
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/ld: warning: /tmp/cc07amWm.o: missing .note.GNU-stack section implies executable stack
/usr/bin/ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker
Home
make -C /builds/linux/tools/lib/bpf OUTPUT=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest/net/tools/build/libbpf/ \
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/ld: warning: /tmp/ccUpdRKj.o: missing .note.GNU-stack section implies executable stack
/usr/bin/ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker
Home
------------[ cut here ]------------
[ 4.309775] sd 0:0:0:2: [sdc] Write Protect is off
[ 4.313328] sda: sda1
[ 4.313599] sd 0:0:0:0: [sda] Attached SCSI disk
[ 4.314377] WARNING: CPU: 3 PID: 11 at block/blk-mq.c:264 blk_mq_unquiesce_queue+0x98/0xa0
[ 4.321594] Modules linked in:
[ 4.326601] sd 0:0:0:2: [sdc] Write cache: enabled, read cache: enabled, supports DPO and FUA
[ 4.334562] ecc typec spi_geni_qcom qcom_rng phy_qcom_qusb2 phy_qcom_qmp_usb
[ 4.334585] sd 0:0:0:2: [sdc] Preferred minimum I/O size 786432 bytes
[ 4.337655] gpi
[ 4.346252] sd 0:0:0:2: [sdc] Optimal transfer size 786432 bytes
[ 4.353428] libdes coresight_stm cfg80211 coresight_tmc qrtr
[ 4.362904] sdc: sdc1 sdc2
[ 4.367827] coresight_funnel coresight_replicator stm_core ufs_qcom phy_qcom_qmp_ufs icc_osm_l3 qcom_q6v5_mss qcom_q6v5_pas
[ 4.373888] sd 0:0:0:2: [sdc] Attached SCSI disk
[ 4.376445] phy_qcom_qmp_pcie rfkill qcom_wdt lmh coresight slim_qcom_ngd_ctrl(+) slimbus pdr_interface qcom_pil_info qcom_q6v5 qcom_sysmon llcc_qcom icc_bwmon qcom_common qcom_glink_smem mdt_loader qmi_helpers display_connector drm_kms_helper drm socinfo backlight rmtfs_mem
[ 4.417098] CPU: 3 PID: 11 Comm: kworker/u16:0 Not tainted 6.6.74-rc1 #1
[ 4.423856] Hardware name: Thundercomm Dragonboard 845c (DT)
[ 4.429564] Workqueue: devfreq_wq devfreq_monitor
[ 4.434321] pstate: 604000c5 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 4.441338] pc : blk_mq_unquiesce_queue+0x98/0xa0
[ 4.446090] lr : blk_mq_unquiesce_queue+0x24/0xa0
[ 4.450840] sp : ffff8000800abbb0
[ 4.454181] x29: ffff8000800abbb0 x28: 0000000000000000 x27: ffff33870775b468
[ 4.461383] x26: ffff338700018028 x25: 0000000000000000 x24: 00000000000f4240
[ 4.468584] x23: 00000000edf396dd x22: 0000000000000000 x21: ffff3387076f1628
[ 4.475785] x20: 0000000000000000 x19: ffff3387076f1590 x18: ffff33877d78e07c
[ 4.482987] x17: 0000000000048ab0 x16: 0000000000000000 x15: 0000000000000000
[ 4.490181] x14: 0000000000000040 x13: 00000000000000a6 x12: 0000000000000002
[ 4.497382] x11: fffffffff7a6c7a6 x10: 0000000000000001 x9 : ffffffffffffffff
[ 4.504584] x8 : ffff8000800abb00 x7 : ffff338707d00090 x6 : ffff8000800abb00
[ 4.511786] x5 : fffffffff7a6c7a6 x4 : ffff33870012a000 x3 : 0000000000000001
[ 4.518986] x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
[ 4.526180] Call trace:
[ 4.528648] blk_mq_unquiesce_queue+0x98/0xa0
[ 4.533045] blk_mq_unquiesce_tagset+0x58/0x84
[ 4.537529] ufshcd_devfreq_scale+0x210/0x350
[ 4.541928] ufshcd_devfreq_target+0xf0/0x1a4
[ 4.546325] devfreq_set_target+0x90/0x194
[ 4.550463] devfreq_update_target+0xc0/0xd8
[ 4.554768] devfreq_monitor+0x34/0x9c
[ 4.558552] process_one_work+0x144/0x29c
[ 4.562607] worker_thread+0x324/0x43c
[ 4.566390] kthread+0x110/0x114
[ 4.569648] ret_from_fork+0x10/0x20
[ 4.573261] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 4.309775] sd 0:0:0:2: [sdc] Write Protect is off
[ 4.313328] sda: sda1
[ 4.313599] sd 0:0:0:0: [sda] Attached SCSI disk
[ 4.314377] WARNING: CPU: 3 PID: 11 at block/blk-mq.c:264 blk_mq_unquiesce_queue+0x98/0xa0
[ 4.321594] Modules linked in:
[ 4.326601] sd 0:0:0:2: [sdc] Write cache: enabled, read cache: enabled, supports DPO and FUA
[ 4.334562] ecc typec spi_geni_qcom qcom_rng phy_qcom_qusb2 phy_qcom_qmp_usb
[ 4.334585] sd 0:0:0:2: [sdc] Preferred minimum I/O size 786432 bytes
[ 4.337655] gpi
[ 4.346252] sd 0:0:0:2: [sdc] Optimal transfer size 786432 bytes
[ 4.353428] libdes coresight_stm cfg80211 coresight_tmc qrtr
[ 4.362904] sdc: sdc1 sdc2
[ 4.367827] coresight_funnel coresight_replicator stm_core ufs_qcom phy_qcom_qmp_ufs icc_osm_l3 qcom_q6v5_mss qcom_q6v5_pas
[ 4.373888] sd 0:0:0:2: [sdc] Attached SCSI disk
[ 4.376445] phy_qcom_qmp_pcie rfkill qcom_wdt lmh coresight slim_qcom_ngd_ctrl(+) slimbus pdr_interface qcom_pil_info qcom_q6v5 qcom_sysmon llcc_qcom icc_bwmon qcom_common qcom_glink_smem mdt_loader qmi_helpers display_connector drm_kms_helper drm socinfo backlight rmtfs_mem
[ 4.417098] CPU: 3 PID: 11 Comm: kworker/u16:0 Not tainted 6.6.74-rc1 #1
[ 4.423856] Hardware name: Thundercomm Dragonboard 845c (DT)
[ 4.429564] Workqueue: devfreq_wq devfreq_monitor
[ 4.434321] pstate: 604000c5 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 4.441338] pc : blk_mq_unquiesce_queue+0x98/0xa0
[ 4.446090] lr : blk_mq_unquiesce_queue+0x24/0xa0
[ 4.450840] sp : ffff8000800abbb0
[ 4.454181] x29: ffff8000800abbb0 x28: 0000000000000000 x27: ffff33870775b468
[ 4.461383] x26: ffff338700018028 x25: 0000000000000000 x24: 00000000000f4240
[ 4.468584] x23: 00000000edf396dd x22: 0000000000000000 x21: ffff3387076f1628
[ 4.475785] x20: 0000000000000000 x19: ffff3387076f1590 x18: ffff33877d78e07c
[ 4.482987] x17: 0000000000048ab0 x16: 0000000000000000 x15: 0000000000000000
[ 4.490181] x14: 0000000000000040 x13: 00000000000000a6 x12: 0000000000000002
[ 4.497382] x11: fffffffff7a6c7a6 x10: 0000000000000001 x9 : ffffffffffffffff
[ 4.504584] x8 : ffff8000800abb00 x7 : ffff338707d00090 x6 : ffff8000800abb00
[ 4.511786] x5 : fffffffff7a6c7a6 x4 : ffff33870012a000 x3 : 0000000000000001
[ 4.518986] x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
[ 4.526180] Call trace:
[ 4.528648] blk_mq_unquiesce_queue+0x98/0xa0
[ 4.533045] blk_mq_unquiesce_tagset+0x58/0x84
[ 4.537529] ufshcd_devfreq_scale+0x210/0x350
[ 4.541928] ufshcd_devfreq_target+0xf0/0x1a4
[ 4.546325] devfreq_set_target+0x90/0x194
[ 4.550463] devfreq_update_target+0xc0/0xd8
[ 4.554768] devfreq_monitor+0x34/0x9c
[ 4.558552] process_one_work+0x144/0x29c
[ 4.562607] worker_thread+0x324/0x43c
[ 4.566390] kthread+0x110/0x114
[ 4.569648] ret_from_fork+0x10/0x20
[ 4.573261] ---[ end trace 0000000000000000 ]---
Home
[ 191.499833] ==================================================================
[ 191.502488] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x108/0x1f0
[ 191.503975] Read of size 1 at addr ffff800080757c1f by task kunit_try_catch/187
[ 191.505717]
[ 191.506389] CPU: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 191.508128] Hardware name: linux,dummy-virt (DT)
[ 191.509282] Call trace:
[ 191.510062] dump_backtrace+0x9c/0x128
[ 191.511189] show_stack+0x20/0x38
[ 191.512199] dump_stack_lvl+0x60/0xb0
[ 191.513396] print_report+0x314/0x5d8
[ 191.514573] kasan_report+0xc8/0x118
[ 191.515720] __asan_load1+0x60/0x70
[ 191.516831] kasan_alloca_oob_left+0x108/0x1f0
[ 191.518124] kunit_try_run_case+0xf8/0x260
[ 191.519320] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 191.520847] kthread+0x18c/0x1a8
[ 191.521787] ret_from_fork+0x10/0x20
[ 191.522926]
[ 191.523533] The buggy address belongs to stack of task kunit_try_catch/187
[ 191.525026]
[ 191.525651] The buggy address belongs to the virtual mapping at
[ 191.525651] [ffff800080750000, ffff800080759000) created by:
[ 191.525651] kernel_clone+0xf8/0x540
[ 191.528470]
[ 191.529115] The buggy address belongs to the physical page:
[ 191.530401] page:00000000597d4963 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fc7
[ 191.532312] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[ 191.533809] page_type: 0xffffffff()
[ 191.534856] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[ 191.536567] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 191.538171] page dumped because: kasan: bad access detected
[ 191.539412]
[ 191.540027] Memory state around the buggy address:
[ 191.541228] ffff800080757b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 191.542830] ffff800080757b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 191.544422] >ffff800080757c00: ca ca ca ca 00 02 cb cb cb cb cb cb 00 00 f1 f1
[ 191.545906] ^
[ 191.547020] ffff800080757c80: f1 f1 01 f2 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00
[ 191.548612] ffff800080757d00: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1
[ 191.550152] ==================================================================
Home
[ 191.577498] ==================================================================
[ 191.579822] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x114/0x200
[ 191.582008] Read of size 1 at addr ffff800080877c2a by task kunit_try_catch/189
[ 191.583533]
[ 191.584355] CPU: 1 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 191.586851] Hardware name: linux,dummy-virt (DT)
[ 191.588340] Call trace:
[ 191.589486] dump_backtrace+0x9c/0x128
[ 191.590694] show_stack+0x20/0x38
[ 191.591783] dump_stack_lvl+0x60/0xb0
[ 191.592910] print_report+0x314/0x5d8
[ 191.594176] kasan_report+0xc8/0x118
[ 191.595714] __asan_load1+0x60/0x70
[ 191.597096] kasan_alloca_oob_right+0x114/0x200
[ 191.598572] kunit_try_run_case+0xf8/0x260
[ 191.599882] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 191.601580] kthread+0x18c/0x1a8
[ 191.602654] ret_from_fork+0x10/0x20
[ 191.603945]
[ 191.605004] The buggy address belongs to stack of task kunit_try_catch/189
[ 191.606500]
[ 191.607193] The buggy address belongs to the virtual mapping at
[ 191.607193] [ffff800080870000, ffff800080879000) created by:
[ 191.607193] kernel_clone+0xf8/0x540
[ 191.610544]
[ 191.611153] The buggy address belongs to the physical page:
[ 191.612824] page:00000000077af11d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060a5
[ 191.614795] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[ 191.616546] page_type: 0xffffffff()
[ 191.617697] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[ 191.619453] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 191.621188] page dumped because: kasan: bad access detected
[ 191.623327]
[ 191.623865] Memory state around the buggy address:
[ 191.625520] ffff800080877b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 191.627226] ffff800080877b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 191.629053] >ffff800080877c00: ca ca ca ca 00 02 cb cb cb cb cb cb f1 f1 f1 f1
[ 191.630579] ^
[ 191.631828] ffff800080877c80: 01 f2 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00
[ 191.633549] ffff800080877d00: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1
[ 191.635178] ==================================================================
Home
[ 194.918408] ==================================================================
[ 194.920718] BUG: KASAN: double-free in kfree+0x74/0x138
[ 194.922959] Free of addr ffff0000c5e64a60 by task kunit_try_catch/211
[ 194.925971]
[ 194.926833] CPU: 1 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 194.929394] Hardware name: linux,dummy-virt (DT)
[ 194.930466] Call trace:
[ 194.931901] dump_backtrace+0x9c/0x128
[ 194.933465] show_stack+0x20/0x38
[ 194.934864] dump_stack_lvl+0x60/0xb0
[ 194.936336] print_report+0xf8/0x5d8
[ 194.937455] kasan_report_invalid_free+0xb0/0xd8
[ 194.939520] __kasan_slab_free+0x134/0x170
[ 194.941189] __kmem_cache_free+0x170/0x2e0
[ 194.942417] kfree+0x74/0x138
[ 194.943393] kfree_sensitive+0x3c/0xb0
[ 194.944617] kmalloc_double_kzfree+0xc8/0x1d8
[ 194.946150] kunit_try_run_case+0xf8/0x260
[ 194.947690] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 194.949443] kthread+0x18c/0x1a8
[ 194.950550] ret_from_fork+0x10/0x20
[ 194.951834]
[ 194.952399] Allocated by task 211:
[ 194.954205] kasan_save_stack+0x3c/0x68
[ 194.955265] kasan_set_track+0x2c/0x40
[ 194.956561] kasan_save_alloc_info+0x24/0x38
[ 194.958282] __kasan_kmalloc+0xd4/0xd8
[ 194.959491] kmalloc_trace+0x68/0x130
[ 194.960721] kmalloc_double_kzfree+0x9c/0x1d8
[ 194.962149] kunit_try_run_case+0xf8/0x260
[ 194.963362] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 194.965272] kthread+0x18c/0x1a8
[ 194.967095] ret_from_fork+0x10/0x20
[ 194.968642]
[ 194.969291] Freed by task 211:
[ 194.970184] kasan_save_stack+0x3c/0x68
[ 194.971391] kasan_set_track+0x2c/0x40
[ 194.972719] kasan_save_free_info+0x38/0x60
[ 194.974895] __kasan_slab_free+0x100/0x170
[ 194.976200] __kmem_cache_free+0x170/0x2e0
[ 194.977544] kfree+0x74/0x138
[ 194.978578] kfree_sensitive+0x80/0xb0
[ 194.979702] kmalloc_double_kzfree+0xb8/0x1d8
[ 194.981118] kunit_try_run_case+0xf8/0x260
[ 194.982431] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 194.984055] kthread+0x18c/0x1a8
[ 194.985106] ret_from_fork+0x10/0x20
[ 194.986412]
[ 194.986997] The buggy address belongs to the object at ffff0000c5e64a60
[ 194.986997] which belongs to the cache kmalloc-16 of size 16
[ 194.989837] The buggy address is located 0 bytes inside of
[ 194.989837] 16-byte region [ffff0000c5e64a60, ffff0000c5e64a70)
[ 194.992847]
[ 194.993486] The buggy address belongs to the physical page:
[ 194.995273] page:000000004e539889 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e64
[ 194.997127] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 194.998940] page_type: 0xffffffff()
[ 195.000153] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 195.002205] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 195.003462] page dumped because: kasan: bad access detected
[ 195.004858]
[ 195.005803] Memory state around the buggy address:
[ 195.007380] ffff0000c5e64900: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[ 195.009431] ffff0000c5e64980: 00 00 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[ 195.011090] >ffff0000c5e64a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 195.012813] ^
[ 195.014294] ffff0000c5e64a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 195.015721] ffff0000c5e64b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 195.017832] ==================================================================
Home
[ 192.229996] ==================================================================
[ 192.231845] BUG: KASAN: double-free in kmem_cache_double_free+0xe8/0x240
[ 192.233493] Free of addr ffff0000c5f13000 by task kunit_try_catch/195
[ 192.234896]
[ 192.235701] CPU: 1 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 192.237850] Hardware name: linux,dummy-virt (DT)
[ 192.239142] Call trace:
[ 192.239998] dump_backtrace+0x9c/0x128
[ 192.241303] show_stack+0x20/0x38
[ 192.242488] dump_stack_lvl+0x60/0xb0
[ 192.243995] print_report+0xf8/0x5d8
[ 192.245415] kasan_report_invalid_free+0xb0/0xd8
[ 192.247072] __kasan_slab_free+0x134/0x170
[ 192.248414] kmem_cache_free+0x18c/0x3f8
[ 192.249724] kmem_cache_double_free+0xe8/0x240
[ 192.250965] kunit_try_run_case+0xf8/0x260
[ 192.252288] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 192.253936] kthread+0x18c/0x1a8
[ 192.254944] ret_from_fork+0x10/0x20
[ 192.256413]
[ 192.257428] Allocated by task 195:
[ 192.258389] kasan_save_stack+0x3c/0x68
[ 192.259525] kasan_set_track+0x2c/0x40
[ 192.260761] kasan_save_alloc_info+0x24/0x38
[ 192.262204] __kasan_slab_alloc+0xa8/0xb0
[ 192.263500] kmem_cache_alloc+0x134/0x330
[ 192.265085] kmem_cache_double_free+0xb8/0x240
[ 192.266455] kunit_try_run_case+0xf8/0x260
[ 192.267749] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 192.269429] kthread+0x18c/0x1a8
[ 192.270521] ret_from_fork+0x10/0x20
[ 192.271785]
[ 192.273129] Freed by task 195:
[ 192.274024] kasan_save_stack+0x3c/0x68
[ 192.275181] kasan_set_track+0x2c/0x40
[ 192.276696] kasan_save_free_info+0x38/0x60
[ 192.278693] __kasan_slab_free+0x100/0x170
[ 192.280219] kmem_cache_free+0x18c/0x3f8
[ 192.281600] kmem_cache_double_free+0xd4/0x240
[ 192.282929] kunit_try_run_case+0xf8/0x260
[ 192.284207] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 192.286557] kthread+0x18c/0x1a8
[ 192.287677] ret_from_fork+0x10/0x20
[ 192.289298]
[ 192.289948] The buggy address belongs to the object at ffff0000c5f13000
[ 192.289948] which belongs to the cache test_cache of size 200
[ 192.292451] The buggy address is located 0 bytes inside of
[ 192.292451] 200-byte region [ffff0000c5f13000, ffff0000c5f130c8)
[ 192.295163]
[ 192.295802] The buggy address belongs to the physical page:
[ 192.297310] page:00000000daf056e8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f13
[ 192.299303] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 192.301038] page_type: 0xffffffff()
[ 192.302081] raw: 0bfffc0000000800 ffff0000c60bf280 dead000000000122 0000000000000000
[ 192.304165] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[ 192.306031] page dumped because: kasan: bad access detected
[ 192.307177]
[ 192.307786] Memory state around the buggy address:
[ 192.309196] ffff0000c5f12f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 192.310975] ffff0000c5f12f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 192.312815] >ffff0000c5f13000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 192.314543] ^
[ 192.315469] ffff0000c5f13080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[ 192.317408] ffff0000c5f13100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 192.319217] ==================================================================
Home
[ 191.311520] ==================================================================
[ 191.313639] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0xa8/0x168
[ 191.315339] Read of size 1 at addr ffffd84b69c75d0d by task kunit_try_catch/181
[ 191.317843]
[ 191.318499] CPU: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 191.320716] Hardware name: linux,dummy-virt (DT)
[ 191.322547] Call trace:
[ 191.323209] dump_backtrace+0x9c/0x128
[ 191.324408] show_stack+0x20/0x38
[ 191.325430] dump_stack_lvl+0x60/0xb0
[ 191.326577] print_report+0x314/0x5d8
[ 191.327816] kasan_report+0xc8/0x118
[ 191.329238] __asan_load1+0x60/0x70
[ 191.330420] kasan_global_oob_right+0xa8/0x168
[ 191.331653] kunit_try_run_case+0xf8/0x260
[ 191.332922] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 191.334503] kthread+0x18c/0x1a8
[ 191.335786] ret_from_fork+0x10/0x20
[ 191.337120]
[ 191.337969] The buggy address belongs to the variable:
[ 191.339171] global_array+0xd/0x40
[ 191.340577]
[ 191.341378] The buggy address belongs to the virtual mapping at
[ 191.341378] [ffffd84b68370000, ffffd84b69d01000) created by:
[ 191.341378] paging_init+0x26c/0x968
[ 191.343688]
[ 191.345043] The buggy address belongs to the physical page:
[ 191.346231] page:00000000386be299 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x45675
[ 191.348328] flags: 0x3fffc0000004000(reserved|node=0|zone=0|lastcpupid=0xffff)
[ 191.349580] page_type: 0xffffffff()
[ 191.350713] raw: 03fffc0000004000 fffffc0000159d48 fffffc0000159d48 0000000000000000
[ 191.352336] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 191.354026] page dumped because: kasan: bad access detected
[ 191.355281]
[ 191.355925] Memory state around the buggy address:
[ 191.357213] ffffd84b69c75c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 191.358931] ffffd84b69c75c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 191.360686] >ffffd84b69c75d00: 00 02 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9
[ 191.362415] ^
[ 191.363396] ffffd84b69c75d80: 00 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[ 191.365132] ffffd84b69c75e00: 04 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[ 191.366658] ==================================================================
Home
[ 188.094594] ==================================================================
[ 188.096896] BUG: KASAN: invalid-free in kfree+0x12c/0x138
[ 188.098240] Free of addr ffff0000c5ec8001 by task kunit_try_catch/127
[ 188.099678]
[ 188.100372] CPU: 1 PID: 127 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 188.102053] Hardware name: linux,dummy-virt (DT)
[ 188.103158] Call trace:
[ 188.103873] dump_backtrace+0x9c/0x128
[ 188.104965] show_stack+0x20/0x38
[ 188.105979] dump_stack_lvl+0x60/0xb0
[ 188.107201] print_report+0xf8/0x5d8
[ 188.108383] kasan_report_invalid_free+0xb0/0xd8
[ 188.109688] __kasan_kfree_large+0x54/0xa0
[ 188.110948] free_large_kmalloc+0x5c/0x100
[ 188.112115] kfree+0x12c/0x138
[ 188.113067] kmalloc_pagealloc_invalid_free+0xa8/0x1a8
[ 188.114515] kunit_try_run_case+0xf8/0x260
[ 188.115702] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 188.117191] kthread+0x18c/0x1a8
[ 188.118190] ret_from_fork+0x10/0x20
[ 188.119366]
[ 188.119959] The buggy address belongs to the physical page:
[ 188.121180] page:00000000361d544d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ec8
[ 188.123098] head:00000000361d544d order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 188.124742] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[ 188.126309] page_type: 0xffffffff()
[ 188.127357] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[ 188.129105] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 188.130660] page dumped because: kasan: bad access detected
[ 188.131918]
[ 188.132458] Memory state around the buggy address:
[ 188.133633] ffff0000c5ec7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 188.135258] ffff0000c5ec7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 188.136902] >ffff0000c5ec8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 188.138415] ^
[ 188.139306] ffff0000c5ec8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 188.140874] ffff0000c5ec8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 188.142437] ==================================================================
Home
[ 192.378315] ==================================================================
[ 192.380354] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xdc/0x230
[ 192.381964] Free of addr ffff0000c5f7c001 by task kunit_try_catch/197
[ 192.383616]
[ 192.384310] CPU: 1 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 192.386032] Hardware name: linux,dummy-virt (DT)
[ 192.387148] Call trace:
[ 192.387918] dump_backtrace+0x9c/0x128
[ 192.389194] show_stack+0x20/0x38
[ 192.390238] dump_stack_lvl+0x60/0xb0
[ 192.391420] print_report+0xf8/0x5d8
[ 192.392733] kasan_report_invalid_free+0xb0/0xd8
[ 192.394149] __kasan_slab_free+0x164/0x170
[ 192.395405] kmem_cache_free+0x18c/0x3f8
[ 192.396736] kmem_cache_invalid_free+0xdc/0x230
[ 192.398249] kunit_try_run_case+0xf8/0x260
[ 192.399681] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 192.401527] kthread+0x18c/0x1a8
[ 192.402625] ret_from_fork+0x10/0x20
[ 192.403791]
[ 192.404748] Allocated by task 197:
[ 192.405660] kasan_save_stack+0x3c/0x68
[ 192.406834] kasan_set_track+0x2c/0x40
[ 192.408142] kasan_save_alloc_info+0x24/0x38
[ 192.409600] __kasan_slab_alloc+0xa8/0xb0
[ 192.410929] kmem_cache_alloc+0x134/0x330
[ 192.412220] kmem_cache_invalid_free+0xb8/0x230
[ 192.413699] kunit_try_run_case+0xf8/0x260
[ 192.415037] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 192.416607] kthread+0x18c/0x1a8
[ 192.417578] ret_from_fork+0x10/0x20
[ 192.419983]
[ 192.420933] The buggy address belongs to the object at ffff0000c5f7c000
[ 192.420933] which belongs to the cache test_cache of size 200
[ 192.423008] The buggy address is located 1 bytes inside of
[ 192.423008] 200-byte region [ffff0000c5f7c000, ffff0000c5f7c0c8)
[ 192.425933]
[ 192.426616] The buggy address belongs to the physical page:
[ 192.428066] page:00000000aa834a49 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f7c
[ 192.430233] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 192.431740] page_type: 0xffffffff()
[ 192.433241] raw: 0bfffc0000000800 ffff0000c5760a00 dead000000000122 0000000000000000
[ 192.434846] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[ 192.436521] page dumped because: kasan: bad access detected
[ 192.437709]
[ 192.438362] Memory state around the buggy address:
[ 192.439621] ffff0000c5f7bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 192.441502] ffff0000c5f7bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 192.443417] >ffff0000c5f7c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 192.445092] ^
[ 192.446067] ffff0000c5f7c080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[ 192.447753] ffff0000c5f7c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 192.449246] ==================================================================
Home
[ 189.971653] ==================================================================
[ 189.973700] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0xe0/0x1f0
[ 189.975598] Read of size 18446744073709551614 at addr ffff0000c5fdcd84 by task kunit_try_catch/159
[ 189.978101]
[ 189.978790] CPU: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 189.980989] Hardware name: linux,dummy-virt (DT)
[ 189.982014] Call trace:
[ 189.982849] dump_backtrace+0x9c/0x128
[ 189.984358] show_stack+0x20/0x38
[ 189.985500] dump_stack_lvl+0x60/0xb0
[ 189.986683] print_report+0xf8/0x5d8
[ 189.987873] kasan_report+0xc8/0x118
[ 189.989273] kasan_check_range+0xe8/0x190
[ 189.990584] __asan_memmove+0x3c/0x98
[ 189.991712] kmalloc_memmove_negative_size+0xe0/0x1f0
[ 189.993184] kunit_try_run_case+0xf8/0x260
[ 189.994463] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.996278] kthread+0x18c/0x1a8
[ 189.997227] ret_from_fork+0x10/0x20
[ 189.998438]
[ 189.999110] Allocated by task 159:
[ 190.000122] kasan_save_stack+0x3c/0x68
[ 190.001487] kasan_set_track+0x2c/0x40
[ 190.002689] kasan_save_alloc_info+0x24/0x38
[ 190.004143] __kasan_kmalloc+0xd4/0xd8
[ 190.005524] kmalloc_trace+0x68/0x130
[ 190.006584] kmalloc_memmove_negative_size+0xa0/0x1f0
[ 190.008118] kunit_try_run_case+0xf8/0x260
[ 190.009505] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 190.011105] kthread+0x18c/0x1a8
[ 190.012136] ret_from_fork+0x10/0x20
[ 190.013466]
[ 190.014150] The buggy address belongs to the object at ffff0000c5fdcd80
[ 190.014150] which belongs to the cache kmalloc-64 of size 64
[ 190.016961] The buggy address is located 4 bytes inside of
[ 190.016961] 64-byte region [ffff0000c5fdcd80, ffff0000c5fdcdc0)
[ 190.019429]
[ 190.020050] The buggy address belongs to the physical page:
[ 190.021280] page:00000000f84ce13e refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fdc
[ 190.023240] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 190.025178] page_type: 0xffffffff()
[ 190.026225] raw: 0bfffc0000000800 ffff0000c0001640 dead000000000122 0000000000000000
[ 190.027947] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[ 190.029794] page dumped because: kasan: bad access detected
[ 190.031012]
[ 190.031619] Memory state around the buggy address:
[ 190.033397] ffff0000c5fdcc80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 190.034922] ffff0000c5fdcd00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 190.036932] >ffff0000c5fdcd80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 190.038455] ^
[ 190.039404] ffff0000c5fdce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 190.041135] ffff0000c5fdce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 190.042288] ==================================================================
Home
[ 193.754818] ==================================================================
[ 193.756937] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x194/0x6d8
[ 193.758821] Write of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[ 193.760550]
[ 193.761177] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 193.762968] Hardware name: linux,dummy-virt (DT)
[ 193.763954] Call trace:
[ 193.764689] dump_backtrace+0x9c/0x128
[ 193.765792] show_stack+0x20/0x38
[ 193.766754] dump_stack_lvl+0x60/0xb0
[ 193.767994] print_report+0xf8/0x5d8
[ 193.769213] kasan_report+0xc8/0x118
[ 193.770351] kasan_check_range+0xe8/0x190
[ 193.771579] __kasan_check_write+0x20/0x30
[ 193.772731] kasan_bitops_modify.constprop.0+0x194/0x6d8
[ 193.774178] kasan_bitops_generic+0xb4/0x148
[ 193.775371] kunit_try_run_case+0xf8/0x260
[ 193.776627] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 193.778094] kthread+0x18c/0x1a8
[ 193.779058] ret_from_fork+0x10/0x20
[ 193.780142]
[ 193.780678] Allocated by task 207:
[ 193.781645] kasan_save_stack+0x3c/0x68
[ 193.782843] kasan_set_track+0x2c/0x40
[ 193.783951] kasan_save_alloc_info+0x24/0x38
[ 193.785314] __kasan_kmalloc+0xd4/0xd8
[ 193.786488] kmalloc_trace+0x68/0x130
[ 193.787624] kasan_bitops_generic+0x98/0x148
[ 193.788870] kunit_try_run_case+0xf8/0x260
[ 193.790317] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 193.791946] kthread+0x18c/0x1a8
[ 193.793027] ret_from_fork+0x10/0x20
[ 193.794113]
[ 193.794708] The buggy address belongs to the object at ffff0000c5bd5800
[ 193.794708] which belongs to the cache kmalloc-16 of size 16
[ 193.796943] The buggy address is located 8 bytes inside of
[ 193.796943] allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[ 193.798487]
[ 193.799063] The buggy address belongs to the physical page:
[ 193.800406] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[ 193.802317] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 193.803857] page_type: 0xffffffff()
[ 193.804943] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 193.806615] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 193.808196] page dumped because: kasan: bad access detected
[ 193.809465]
[ 193.810037] Memory state around the buggy address:
[ 193.811286] ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[ 193.812893] ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 193.814486] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.815980] ^
[ 193.816995] ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.818551] ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.820213] ==================================================================
---
[ 193.961428] ==================================================================
[ 193.962897] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0x6d8
[ 193.964573] Write of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[ 193.966309]
[ 193.966934] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 193.968727] Hardware name: linux,dummy-virt (DT)
[ 193.969866] Call trace:
[ 193.970572] dump_backtrace+0x9c/0x128
[ 193.971674] show_stack+0x20/0x38
[ 193.972750] dump_stack_lvl+0x60/0xb0
[ 193.973945] print_report+0xf8/0x5d8
[ 193.975062] kasan_report+0xc8/0x118
[ 193.976282] kasan_check_range+0xe8/0x190
[ 193.977513] __kasan_check_write+0x20/0x30
[ 193.978650] kasan_bitops_modify.constprop.0+0x1dc/0x6d8
[ 193.980074] kasan_bitops_generic+0xb4/0x148
[ 193.981357] kunit_try_run_case+0xf8/0x260
[ 193.982586] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 193.984036] kthread+0x18c/0x1a8
[ 193.984988] ret_from_fork+0x10/0x20
[ 193.986188]
[ 193.986805] Allocated by task 207:
[ 193.987721] kasan_save_stack+0x3c/0x68
[ 193.988908] kasan_set_track+0x2c/0x40
[ 193.990027] kasan_save_alloc_info+0x24/0x38
[ 193.991389] __kasan_kmalloc+0xd4/0xd8
[ 193.992530] kmalloc_trace+0x68/0x130
[ 193.993558] kasan_bitops_generic+0x98/0x148
[ 193.994874] kunit_try_run_case+0xf8/0x260
[ 193.996136] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 193.998736] kthread+0x18c/0x1a8
[ 193.999866] ret_from_fork+0x10/0x20
[ 194.001036]
[ 194.001591] The buggy address belongs to the object at ffff0000c5bd5800
[ 194.001591] which belongs to the cache kmalloc-16 of size 16
[ 194.004048] The buggy address is located 8 bytes inside of
[ 194.004048] allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[ 194.006348]
[ 194.006986] The buggy address belongs to the physical page:
[ 194.008272] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[ 194.010136] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 194.011681] page_type: 0xffffffff()
[ 194.012815] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 194.014497] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 194.016022] page dumped because: kasan: bad access detected
[ 194.017252]
[ 194.017882] Memory state around the buggy address:
[ 194.019068] ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[ 194.020789] ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 194.022340] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.023792] ^
[ 194.024684] ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.026318] ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.027884] ==================================================================
---
[ 193.685450] ==================================================================
[ 193.687019] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x160/0x6d8
[ 193.688694] Write of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[ 193.690413]
[ 193.691044] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 193.692802] Hardware name: linux,dummy-virt (DT)
[ 193.693909] Call trace:
[ 193.694641] dump_backtrace+0x9c/0x128
[ 193.695742] show_stack+0x20/0x38
[ 193.696783] dump_stack_lvl+0x60/0xb0
[ 193.697939] print_report+0xf8/0x5d8
[ 193.699093] kasan_report+0xc8/0x118
[ 193.700279] kasan_check_range+0xe8/0x190
[ 193.701448] __kasan_check_write+0x20/0x30
[ 193.702674] kasan_bitops_modify.constprop.0+0x160/0x6d8
[ 193.704102] kasan_bitops_generic+0xb4/0x148
[ 193.705277] kunit_try_run_case+0xf8/0x260
[ 193.706571] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 193.708061] kthread+0x18c/0x1a8
[ 193.709001] ret_from_fork+0x10/0x20
[ 193.710153]
[ 193.710725] Allocated by task 207:
[ 193.711607] kasan_save_stack+0x3c/0x68
[ 193.712719] kasan_set_track+0x2c/0x40
[ 193.713976] kasan_save_alloc_info+0x24/0x38
[ 193.715266] __kasan_kmalloc+0xd4/0xd8
[ 193.716437] kmalloc_trace+0x68/0x130
[ 193.717488] kasan_bitops_generic+0x98/0x148
[ 193.718783] kunit_try_run_case+0xf8/0x260
[ 193.720042] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 193.721512] kthread+0x18c/0x1a8
[ 193.722526] ret_from_fork+0x10/0x20
[ 193.723573]
[ 193.724136] The buggy address belongs to the object at ffff0000c5bd5800
[ 193.724136] which belongs to the cache kmalloc-16 of size 16
[ 193.726407] The buggy address is located 8 bytes inside of
[ 193.726407] allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[ 193.728699]
[ 193.729327] The buggy address belongs to the physical page:
[ 193.730560] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[ 193.732557] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 193.734070] page_type: 0xffffffff()
[ 193.735151] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 193.736742] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 193.738477] page dumped because: kasan: bad access detected
[ 193.739729]
[ 193.740349] Memory state around the buggy address:
[ 193.741598] ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[ 193.743203] ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 193.744833] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.746377] ^
[ 193.747339] ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.748931] ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.750435] ==================================================================
---
[ 193.526588] ==================================================================
[ 193.528236] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0x6d8
[ 193.530497] Write of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[ 193.532874]
[ 193.533537] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 193.535442] Hardware name: linux,dummy-virt (DT)
[ 193.536638] Call trace:
[ 193.537354] dump_backtrace+0x9c/0x128
[ 193.538654] show_stack+0x20/0x38
[ 193.539872] dump_stack_lvl+0x60/0xb0
[ 193.541335] print_report+0xf8/0x5d8
[ 193.542684] kasan_report+0xc8/0x118
[ 193.544160] kasan_check_range+0xe8/0x190
[ 193.545522] __kasan_check_write+0x20/0x30
[ 193.546731] kasan_bitops_modify.constprop.0+0x100/0x6d8
[ 193.548483] kasan_bitops_generic+0xb4/0x148
[ 193.549805] kunit_try_run_case+0xf8/0x260
[ 193.550568] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 193.552526] kthread+0x18c/0x1a8
[ 193.554003] ret_from_fork+0x10/0x20
[ 193.555330]
[ 193.555993] Allocated by task 207:
[ 193.557275] kasan_save_stack+0x3c/0x68
[ 193.558945] kasan_set_track+0x2c/0x40
[ 193.560734] kasan_save_alloc_info+0x24/0x38
[ 193.562323] __kasan_kmalloc+0xd4/0xd8
[ 193.563528] kmalloc_trace+0x68/0x130
[ 193.564858] kasan_bitops_generic+0x98/0x148
[ 193.566143] kunit_try_run_case+0xf8/0x260
[ 193.567553] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 193.569717] kthread+0x18c/0x1a8
[ 193.571091] ret_from_fork+0x10/0x20
[ 193.572631]
[ 193.573202] The buggy address belongs to the object at ffff0000c5bd5800
[ 193.573202] which belongs to the cache kmalloc-16 of size 16
[ 193.575662] The buggy address is located 8 bytes inside of
[ 193.575662] allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[ 193.578940]
[ 193.579553] The buggy address belongs to the physical page:
[ 193.581010] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[ 193.582974] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 193.584627] page_type: 0xffffffff()
[ 193.585823] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 193.587847] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 193.589506] page dumped because: kasan: bad access detected
[ 193.590892]
[ 193.591437] Memory state around the buggy address:
[ 193.592640] ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[ 193.594511] ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 193.597130] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.599275] ^
[ 193.600793] ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.602465] ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.604002] ==================================================================
---
[ 193.366345] ==================================================================
[ 193.368534] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4/0x6d8
[ 193.371557] Write of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[ 193.373576]
[ 193.374331] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 193.376436] Hardware name: linux,dummy-virt (DT)
[ 193.377696] Call trace:
[ 193.378406] dump_backtrace+0x9c/0x128
[ 193.379970] show_stack+0x20/0x38
[ 193.381352] dump_stack_lvl+0x60/0xb0
[ 193.382661] print_report+0xf8/0x5d8
[ 193.383661] kasan_report+0xc8/0x118
[ 193.386036] kasan_check_range+0xe8/0x190
[ 193.387272] __kasan_check_write+0x20/0x30
[ 193.388400] kasan_bitops_modify.constprop.0+0xa4/0x6d8
[ 193.390006] kasan_bitops_generic+0xb4/0x148
[ 193.391251] kunit_try_run_case+0xf8/0x260
[ 193.392853] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 193.394477] kthread+0x18c/0x1a8
[ 193.395605] ret_from_fork+0x10/0x20
[ 193.396748]
[ 193.397410] Allocated by task 207:
[ 193.398534] kasan_save_stack+0x3c/0x68
[ 193.399735] kasan_set_track+0x2c/0x40
[ 193.401025] kasan_save_alloc_info+0x24/0x38
[ 193.402474] __kasan_kmalloc+0xd4/0xd8
[ 193.403742] kmalloc_trace+0x68/0x130
[ 193.405068] kasan_bitops_generic+0x98/0x148
[ 193.406743] kunit_try_run_case+0xf8/0x260
[ 193.408105] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 193.409707] kthread+0x18c/0x1a8
[ 193.411155] ret_from_fork+0x10/0x20
[ 193.412353]
[ 193.412939] The buggy address belongs to the object at ffff0000c5bd5800
[ 193.412939] which belongs to the cache kmalloc-16 of size 16
[ 193.415384] The buggy address is located 8 bytes inside of
[ 193.415384] allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[ 193.417859]
[ 193.418463] The buggy address belongs to the physical page:
[ 193.419826] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[ 193.422115] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 193.424096] page_type: 0xffffffff()
[ 193.425148] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 193.427494] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 193.429711] page dumped because: kasan: bad access detected
[ 193.430952]
[ 193.431608] Memory state around the buggy address:
[ 193.433667] ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[ 193.435346] ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 193.437129] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.438710] ^
[ 193.439699] ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.441589] ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.443243] ==================================================================
---
[ 193.890188] ==================================================================
[ 193.892355] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1ac/0x6d8
[ 193.895160] Write of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[ 193.896821]
[ 193.897434] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 193.899269] Hardware name: linux,dummy-virt (DT)
[ 193.900321] Call trace:
[ 193.901016] dump_backtrace+0x9c/0x128
[ 193.902173] show_stack+0x20/0x38
[ 193.903178] dump_stack_lvl+0x60/0xb0
[ 193.904359] print_report+0xf8/0x5d8
[ 193.905456] kasan_report+0xc8/0x118
[ 193.906667] kasan_check_range+0xe8/0x190
[ 193.907931] __kasan_check_write+0x20/0x30
[ 193.909105] kasan_bitops_modify.constprop.0+0x1ac/0x6d8
[ 193.910513] kasan_bitops_generic+0xb4/0x148
[ 193.911739] kunit_try_run_case+0xf8/0x260
[ 193.912971] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 193.914407] kthread+0x18c/0x1a8
[ 193.915398] ret_from_fork+0x10/0x20
[ 193.916514]
[ 193.917138] Allocated by task 207:
[ 193.918033] kasan_save_stack+0x3c/0x68
[ 193.919304] kasan_set_track+0x2c/0x40
[ 193.920461] kasan_save_alloc_info+0x24/0x38
[ 193.921761] __kasan_kmalloc+0xd4/0xd8
[ 193.922952] kmalloc_trace+0x68/0x130
[ 193.924046] kasan_bitops_generic+0x98/0x148
[ 193.925248] kunit_try_run_case+0xf8/0x260
[ 193.926486] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 193.927981] kthread+0x18c/0x1a8
[ 193.928985] ret_from_fork+0x10/0x20
[ 193.930085]
[ 193.930646] The buggy address belongs to the object at ffff0000c5bd5800
[ 193.930646] which belongs to the cache kmalloc-16 of size 16
[ 193.932893] The buggy address is located 8 bytes inside of
[ 193.932893] allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[ 193.935202]
[ 193.935825] The buggy address belongs to the physical page:
[ 193.937132] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[ 193.939012] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 193.940550] page_type: 0xffffffff()
[ 193.941617] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 193.943301] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 193.944902] page dumped because: kasan: bad access detected
[ 193.946195]
[ 193.946811] Memory state around the buggy address:
[ 193.948043] ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[ 193.949643] ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 193.951270] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.952743] ^
[ 193.953808] ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.955384] ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.957006] ==================================================================
Home
[ 193.611507] ==================================================================
[ 193.613342] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x130/0x6d8
[ 193.615040] Read of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[ 193.616632]
[ 193.617119] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 193.618587] Hardware name: linux,dummy-virt (DT)
[ 193.619729] Call trace:
[ 193.620519] dump_backtrace+0x9c/0x128
[ 193.621609] show_stack+0x20/0x38
[ 193.622846] dump_stack_lvl+0x60/0xb0
[ 193.624403] print_report+0xf8/0x5d8
[ 193.625552] kasan_report+0xc8/0x118
[ 193.626716] __asan_load8+0x9c/0xc0
[ 193.627942] kasan_bitops_modify.constprop.0+0x130/0x6d8
[ 193.629524] kasan_bitops_generic+0xb4/0x148
[ 193.630877] kunit_try_run_case+0xf8/0x260
[ 193.632431] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 193.634078] kthread+0x18c/0x1a8
[ 193.634866] ret_from_fork+0x10/0x20
[ 193.636334]
[ 193.636826] Allocated by task 207:
[ 193.637616] kasan_save_stack+0x3c/0x68
[ 193.638893] kasan_set_track+0x2c/0x40
[ 193.640304] kasan_save_alloc_info+0x24/0x38
[ 193.641798] __kasan_kmalloc+0xd4/0xd8
[ 193.642924] kmalloc_trace+0x68/0x130
[ 193.644278] kasan_bitops_generic+0x98/0x148
[ 193.645639] kunit_try_run_case+0xf8/0x260
[ 193.646859] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 193.648432] kthread+0x18c/0x1a8
[ 193.649287] ret_from_fork+0x10/0x20
[ 193.650516]
[ 193.651209] The buggy address belongs to the object at ffff0000c5bd5800
[ 193.651209] which belongs to the cache kmalloc-16 of size 16
[ 193.653498] The buggy address is located 8 bytes inside of
[ 193.653498] allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[ 193.656230]
[ 193.656899] The buggy address belongs to the physical page:
[ 193.658470] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[ 193.660444] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 193.662143] page_type: 0xffffffff()
[ 193.663269] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 193.665203] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 193.666734] page dumped because: kasan: bad access detected
[ 193.668326]
[ 193.668894] Memory state around the buggy address:
[ 193.670105] ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[ 193.671686] ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 193.673400] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.674705] ^
[ 193.675744] ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.677737] ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.679091] ==================================================================
---
[ 193.447718] ==================================================================
[ 193.449340] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xd0/0x6d8
[ 193.450954] Read of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[ 193.453866]
[ 193.454654] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 193.456428] Hardware name: linux,dummy-virt (DT)
[ 193.457528] Call trace:
[ 193.459334] dump_backtrace+0x9c/0x128
[ 193.460582] show_stack+0x20/0x38
[ 193.461792] dump_stack_lvl+0x60/0xb0
[ 193.463059] print_report+0xf8/0x5d8
[ 193.464346] kasan_report+0xc8/0x118
[ 193.466411] __asan_load8+0x9c/0xc0
[ 193.467660] kasan_bitops_modify.constprop.0+0xd0/0x6d8
[ 193.469584] kasan_bitops_generic+0xb4/0x148
[ 193.470829] kunit_try_run_case+0xf8/0x260
[ 193.472017] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 193.473561] kthread+0x18c/0x1a8
[ 193.474698] ret_from_fork+0x10/0x20
[ 193.476093]
[ 193.476710] Allocated by task 207:
[ 193.477814] kasan_save_stack+0x3c/0x68
[ 193.479102] kasan_set_track+0x2c/0x40
[ 193.480805] kasan_save_alloc_info+0x24/0x38
[ 193.482107] __kasan_kmalloc+0xd4/0xd8
[ 193.482795] kmalloc_trace+0x68/0x130
[ 193.483985] kasan_bitops_generic+0x98/0x148
[ 193.485964] kunit_try_run_case+0xf8/0x260
[ 193.487256] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 193.489018] kthread+0x18c/0x1a8
[ 193.490174] ret_from_fork+0x10/0x20
[ 193.491536]
[ 193.492701] The buggy address belongs to the object at ffff0000c5bd5800
[ 193.492701] which belongs to the cache kmalloc-16 of size 16
[ 193.495291] The buggy address is located 8 bytes inside of
[ 193.495291] allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[ 193.497644]
[ 193.498247] The buggy address belongs to the physical page:
[ 193.499538] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[ 193.502062] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 193.503714] page_type: 0xffffffff()
[ 193.506113] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 193.507633] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 193.509863] page dumped because: kasan: bad access detected
[ 193.511204]
[ 193.511806] Memory state around the buggy address:
[ 193.513867] ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[ 193.515852] ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 193.517879] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.519261] ^
[ 193.520670] ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.522276] ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.523472] ==================================================================
---
[ 193.823049] ==================================================================
[ 193.824420] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0x6d8
[ 193.826640] Read of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[ 193.828301]
[ 193.829003] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 193.830825] Hardware name: linux,dummy-virt (DT)
[ 193.831978] Call trace:
[ 193.832617] dump_backtrace+0x9c/0x128
[ 193.833717] show_stack+0x20/0x38
[ 193.834811] dump_stack_lvl+0x60/0xb0
[ 193.835965] print_report+0xf8/0x5d8
[ 193.837241] kasan_report+0xc8/0x118
[ 193.838414] __asan_load8+0x9c/0xc0
[ 193.839580] kasan_bitops_modify.constprop.0+0x19c/0x6d8
[ 193.841015] kasan_bitops_generic+0xb4/0x148
[ 193.842222] kunit_try_run_case+0xf8/0x260
[ 193.843540] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 193.844980] kthread+0x18c/0x1a8
[ 193.845932] ret_from_fork+0x10/0x20
[ 193.847055]
[ 193.847630] Allocated by task 207:
[ 193.848581] kasan_save_stack+0x3c/0x68
[ 193.849789] kasan_set_track+0x2c/0x40
[ 193.850955] kasan_save_alloc_info+0x24/0x38
[ 193.852226] __kasan_kmalloc+0xd4/0xd8
[ 193.853372] kmalloc_trace+0x68/0x130
[ 193.854446] kasan_bitops_generic+0x98/0x148
[ 193.855702] kunit_try_run_case+0xf8/0x260
[ 193.856943] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 193.858499] kthread+0x18c/0x1a8
[ 193.859497] ret_from_fork+0x10/0x20
[ 193.860621]
[ 193.861194] The buggy address belongs to the object at ffff0000c5bd5800
[ 193.861194] which belongs to the cache kmalloc-16 of size 16
[ 193.863473] The buggy address is located 8 bytes inside of
[ 193.863473] allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[ 193.865800]
[ 193.866405] The buggy address belongs to the physical page:
[ 193.867740] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[ 193.869666] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 193.871211] page_type: 0xffffffff()
[ 193.872340] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 193.873935] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 193.875549] page dumped because: kasan: bad access detected
[ 193.876860]
[ 193.877435] Memory state around the buggy address:
[ 193.878710] ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[ 193.880267] ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 193.881875] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.883373] ^
[ 193.884307] ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.885964] ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.887459] ==================================================================
---
[ 194.030960] ==================================================================
[ 194.032235] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x20c/0x6d8
[ 194.033992] Read of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[ 194.035728]
[ 194.036330] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 194.038102] Hardware name: linux,dummy-virt (DT)
[ 194.039249] Call trace:
[ 194.039965] dump_backtrace+0x9c/0x128
[ 194.041075] show_stack+0x20/0x38
[ 194.042124] dump_stack_lvl+0x60/0xb0
[ 194.043399] print_report+0xf8/0x5d8
[ 194.044526] kasan_report+0xc8/0x118
[ 194.045621] __asan_load8+0x9c/0xc0
[ 194.046804] kasan_bitops_modify.constprop.0+0x20c/0x6d8
[ 194.048270] kasan_bitops_generic+0xb4/0x148
[ 194.049510] kunit_try_run_case+0xf8/0x260
[ 194.050716] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 194.052202] kthread+0x18c/0x1a8
[ 194.053208] ret_from_fork+0x10/0x20
[ 194.054290]
[ 194.054854] Allocated by task 207:
[ 194.055748] kasan_save_stack+0x3c/0x68
[ 194.056951] kasan_set_track+0x2c/0x40
[ 194.058082] kasan_save_alloc_info+0x24/0x38
[ 194.059420] __kasan_kmalloc+0xd4/0xd8
[ 194.060561] kmalloc_trace+0x68/0x130
[ 194.061721] kasan_bitops_generic+0x98/0x148
[ 194.063007] kunit_try_run_case+0xf8/0x260
[ 194.064262] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 194.065684] kthread+0x18c/0x1a8
[ 194.066644] ret_from_fork+0x10/0x20
[ 194.067642]
[ 194.068265] The buggy address belongs to the object at ffff0000c5bd5800
[ 194.068265] which belongs to the cache kmalloc-16 of size 16
[ 194.070630] The buggy address is located 8 bytes inside of
[ 194.070630] allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[ 194.072933]
[ 194.073544] The buggy address belongs to the physical page:
[ 194.074893] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[ 194.076760] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 194.078372] page_type: 0xffffffff()
[ 194.079479] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 194.081065] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 194.082747] page dumped because: kasan: bad access detected
[ 194.084038]
[ 194.084626] Memory state around the buggy address:
[ 194.085789] ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[ 194.087485] ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 194.089055] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.090583] ^
[ 194.091547] ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.093150] ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.094649] ==================================================================
Home
[ 194.373422] ==================================================================
[ 194.374694] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x144/0x7b8
[ 194.376517] Write of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[ 194.378322]
[ 194.378935] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 194.380617] Hardware name: linux,dummy-virt (DT)
[ 194.381705] Call trace:
[ 194.382429] dump_backtrace+0x9c/0x128
[ 194.383577] show_stack+0x20/0x38
[ 194.384625] dump_stack_lvl+0x60/0xb0
[ 194.385819] print_report+0xf8/0x5d8
[ 194.387002] kasan_report+0xc8/0x118
[ 194.388173] kasan_check_range+0xe8/0x190
[ 194.389372] __kasan_check_write+0x20/0x30
[ 194.390530] kasan_bitops_test_and_modify.constprop.0+0x144/0x7b8
[ 194.392140] kasan_bitops_generic+0xc0/0x148
[ 194.393355] kunit_try_run_case+0xf8/0x260
[ 194.394584] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 194.396045] kthread+0x18c/0x1a8
[ 194.396980] ret_from_fork+0x10/0x20
[ 194.398181]
[ 194.398758] Allocated by task 207:
[ 194.399676] kasan_save_stack+0x3c/0x68
[ 194.400858] kasan_set_track+0x2c/0x40
[ 194.402019] kasan_save_alloc_info+0x24/0x38
[ 194.403318] __kasan_kmalloc+0xd4/0xd8
[ 194.404468] kmalloc_trace+0x68/0x130
[ 194.405550] kasan_bitops_generic+0x98/0x148
[ 194.406753] kunit_try_run_case+0xf8/0x260
[ 194.408043] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 194.409502] kthread+0x18c/0x1a8
[ 194.410535] ret_from_fork+0x10/0x20
[ 194.411631]
[ 194.412166] The buggy address belongs to the object at ffff0000c5bd5800
[ 194.412166] which belongs to the cache kmalloc-16 of size 16
[ 194.414558] The buggy address is located 8 bytes inside of
[ 194.414558] allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[ 194.417865]
[ 194.418619] The buggy address belongs to the physical page:
[ 194.419884] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[ 194.421944] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 194.423468] page_type: 0xffffffff()
[ 194.424597] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 194.426281] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 194.427922] page dumped because: kasan: bad access detected
[ 194.429141]
[ 194.429716] Memory state around the buggy address:
[ 194.431010] ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[ 194.432580] ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 194.434161] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.435668] ^
[ 194.436640] ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.438284] ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.439741] ==================================================================
---
[ 194.235192] ==================================================================
[ 194.236813] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x100/0x7b8
[ 194.238558] Write of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[ 194.240272]
[ 194.240968] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 194.242695] Hardware name: linux,dummy-virt (DT)
[ 194.243863] Call trace:
[ 194.244641] dump_backtrace+0x9c/0x128
[ 194.245740] show_stack+0x20/0x38
[ 194.246788] dump_stack_lvl+0x60/0xb0
[ 194.247989] print_report+0xf8/0x5d8
[ 194.249149] kasan_report+0xc8/0x118
[ 194.250280] kasan_check_range+0xe8/0x190
[ 194.251600] __kasan_check_write+0x20/0x30
[ 194.252743] kasan_bitops_test_and_modify.constprop.0+0x100/0x7b8
[ 194.254414] kasan_bitops_generic+0xc0/0x148
[ 194.255668] kunit_try_run_case+0xf8/0x260
[ 194.256898] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 194.258374] kthread+0x18c/0x1a8
[ 194.259376] ret_from_fork+0x10/0x20
[ 194.260493]
[ 194.261090] Allocated by task 207:
[ 194.262011] kasan_save_stack+0x3c/0x68
[ 194.263133] kasan_set_track+0x2c/0x40
[ 194.264336] kasan_save_alloc_info+0x24/0x38
[ 194.265702] __kasan_kmalloc+0xd4/0xd8
[ 194.266889] kmalloc_trace+0x68/0x130
[ 194.267922] kasan_bitops_generic+0x98/0x148
[ 194.269206] kunit_try_run_case+0xf8/0x260
[ 194.270449] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 194.271888] kthread+0x18c/0x1a8
[ 194.272874] ret_from_fork+0x10/0x20
[ 194.273844]
[ 194.274379] The buggy address belongs to the object at ffff0000c5bd5800
[ 194.274379] which belongs to the cache kmalloc-16 of size 16
[ 194.277315] The buggy address is located 8 bytes inside of
[ 194.277315] allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[ 194.279638]
[ 194.280333] The buggy address belongs to the physical page:
[ 194.281603] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[ 194.283459] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 194.285117] page_type: 0xffffffff()
[ 194.286308] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 194.287999] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 194.289470] page dumped because: kasan: bad access detected
[ 194.290832]
[ 194.291480] Memory state around the buggy address:
[ 194.292689] ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[ 194.294308] ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 194.295977] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.297461] ^
[ 194.298429] ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.300027] ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.301445] ==================================================================
---
[ 194.719296] ==================================================================
[ 194.720865] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x230/0x7b8
[ 194.722693] Write of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[ 194.724478]
[ 194.725215] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 194.726956] Hardware name: linux,dummy-virt (DT)
[ 194.728353] Call trace:
[ 194.729050] dump_backtrace+0x9c/0x128
[ 194.730852] show_stack+0x20/0x38
[ 194.731883] dump_stack_lvl+0x60/0xb0
[ 194.733038] print_report+0xf8/0x5d8
[ 194.734279] kasan_report+0xc8/0x118
[ 194.735384] kasan_check_range+0xe8/0x190
[ 194.736685] __kasan_check_write+0x20/0x30
[ 194.737904] kasan_bitops_test_and_modify.constprop.0+0x230/0x7b8
[ 194.739475] kasan_bitops_generic+0xc0/0x148
[ 194.740686] kunit_try_run_case+0xf8/0x260
[ 194.741947] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 194.743399] kthread+0x18c/0x1a8
[ 194.744399] ret_from_fork+0x10/0x20
[ 194.745477]
[ 194.746045] Allocated by task 207:
[ 194.747028] kasan_save_stack+0x3c/0x68
[ 194.748204] kasan_set_track+0x2c/0x40
[ 194.749462] kasan_save_alloc_info+0x24/0x38
[ 194.750801] __kasan_kmalloc+0xd4/0xd8
[ 194.751977] kmalloc_trace+0x68/0x130
[ 194.753053] kasan_bitops_generic+0x98/0x148
[ 194.754343] kunit_try_run_case+0xf8/0x260
[ 194.755541] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 194.757090] kthread+0x18c/0x1a8
[ 194.758193] ret_from_fork+0x10/0x20
[ 194.759279]
[ 194.759890] The buggy address belongs to the object at ffff0000c5bd5800
[ 194.759890] which belongs to the cache kmalloc-16 of size 16
[ 194.762237] The buggy address is located 8 bytes inside of
[ 194.762237] allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[ 194.764571]
[ 194.765204] The buggy address belongs to the physical page:
[ 194.766473] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[ 194.768453] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 194.769997] page_type: 0xffffffff()
[ 194.771105] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 194.772813] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 194.774386] page dumped because: kasan: bad access detected
[ 194.775622]
[ 194.776269] Memory state around the buggy address:
[ 194.777514] ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[ 194.779143] ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 194.780719] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.782262] ^
[ 194.783228] ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.785164] ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.786512] ==================================================================
---
[ 194.510347] ==================================================================
[ 194.511644] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a4/0x7b8
[ 194.513389] Write of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[ 194.515207]
[ 194.515876] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 194.517639] Hardware name: linux,dummy-virt (DT)
[ 194.518729] Call trace:
[ 194.519432] dump_backtrace+0x9c/0x128
[ 194.520498] show_stack+0x20/0x38
[ 194.521566] dump_stack_lvl+0x60/0xb0
[ 194.522821] print_report+0xf8/0x5d8
[ 194.524030] kasan_report+0xc8/0x118
[ 194.526091] kasan_check_range+0xe8/0x190
[ 194.527226] __kasan_check_write+0x20/0x30
[ 194.528434] kasan_bitops_test_and_modify.constprop.0+0x1a4/0x7b8
[ 194.530061] kasan_bitops_generic+0xc0/0x148
[ 194.531338] kunit_try_run_case+0xf8/0x260
[ 194.532589] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 194.534039] kthread+0x18c/0x1a8
[ 194.535006] ret_from_fork+0x10/0x20
[ 194.536134]
[ 194.536668] Allocated by task 207:
[ 194.537626] kasan_save_stack+0x3c/0x68
[ 194.538844] kasan_set_track+0x2c/0x40
[ 194.539974] kasan_save_alloc_info+0x24/0x38
[ 194.541273] __kasan_kmalloc+0xd4/0xd8
[ 194.542530] kmalloc_trace+0x68/0x130
[ 194.543551] kasan_bitops_generic+0x98/0x148
[ 194.544859] kunit_try_run_case+0xf8/0x260
[ 194.546072] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 194.547519] kthread+0x18c/0x1a8
[ 194.548672] ret_from_fork+0x10/0x20
[ 194.549823]
[ 194.550464] The buggy address belongs to the object at ffff0000c5bd5800
[ 194.550464] which belongs to the cache kmalloc-16 of size 16
[ 194.552788] The buggy address is located 8 bytes inside of
[ 194.552788] allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[ 194.555129]
[ 194.555754] The buggy address belongs to the physical page:
[ 194.557036] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[ 194.559004] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 194.560587] page_type: 0xffffffff()
[ 194.561639] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 194.563352] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 194.564952] page dumped because: kasan: bad access detected
[ 194.566232]
[ 194.566829] Memory state around the buggy address:
[ 194.568058] ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[ 194.569693] ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 194.571405] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.572928] ^
[ 194.573938] ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.575507] ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.577056] ==================================================================
---
[ 194.097444] ==================================================================
[ 194.099337] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa4/0x7b8
[ 194.101140] Write of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[ 194.103700]
[ 194.104366] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 194.106220] Hardware name: linux,dummy-virt (DT)
[ 194.107283] Call trace:
[ 194.107944] dump_backtrace+0x9c/0x128
[ 194.109074] show_stack+0x20/0x38
[ 194.110088] dump_stack_lvl+0x60/0xb0
[ 194.111221] print_report+0xf8/0x5d8
[ 194.112419] kasan_report+0xc8/0x118
[ 194.113570] kasan_check_range+0xe8/0x190
[ 194.114830] __kasan_check_write+0x20/0x30
[ 194.115963] kasan_bitops_test_and_modify.constprop.0+0xa4/0x7b8
[ 194.117493] kasan_bitops_generic+0xc0/0x148
[ 194.118709] kunit_try_run_case+0xf8/0x260
[ 194.119934] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 194.121402] kthread+0x18c/0x1a8
[ 194.122429] ret_from_fork+0x10/0x20
[ 194.123504]
[ 194.124094] Allocated by task 207:
[ 194.124994] kasan_save_stack+0x3c/0x68
[ 194.126189] kasan_set_track+0x2c/0x40
[ 194.127399] kasan_save_alloc_info+0x24/0x38
[ 194.128645] __kasan_kmalloc+0xd4/0xd8
[ 194.129859] kmalloc_trace+0x68/0x130
[ 194.131002] kasan_bitops_generic+0x98/0x148
[ 194.132275] kunit_try_run_case+0xf8/0x260
[ 194.133498] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 194.134972] kthread+0x18c/0x1a8
[ 194.135976] ret_from_fork+0x10/0x20
[ 194.137070]
[ 194.137660] The buggy address belongs to the object at ffff0000c5bd5800
[ 194.137660] which belongs to the cache kmalloc-16 of size 16
[ 194.139982] The buggy address is located 8 bytes inside of
[ 194.139982] allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[ 194.142326]
[ 194.142919] The buggy address belongs to the physical page:
[ 194.144237] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[ 194.146136] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 194.147720] page_type: 0xffffffff()
[ 194.148828] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 194.150510] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 194.152087] page dumped because: kasan: bad access detected
[ 194.153349]
[ 194.153921] Memory state around the buggy address:
[ 194.155189] ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[ 194.156708] ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 194.158433] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.159901] ^
[ 194.160818] ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.162438] ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.163977] ==================================================================
Home
[ 194.305511] ==================================================================
[ 194.306852] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x108/0x7b8
[ 194.308512] Read of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[ 194.310318]
[ 194.310970] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 194.312594] Hardware name: linux,dummy-virt (DT)
[ 194.313699] Call trace:
[ 194.314855] dump_backtrace+0x9c/0x128
[ 194.316187] show_stack+0x20/0x38
[ 194.317227] dump_stack_lvl+0x60/0xb0
[ 194.318387] print_report+0xf8/0x5d8
[ 194.319506] kasan_report+0xc8/0x118
[ 194.320746] __asan_load8+0x9c/0xc0
[ 194.321864] kasan_bitops_test_and_modify.constprop.0+0x108/0x7b8
[ 194.323433] kasan_bitops_generic+0xc0/0x148
[ 194.324701] kunit_try_run_case+0xf8/0x260
[ 194.325907] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 194.327417] kthread+0x18c/0x1a8
[ 194.328364] ret_from_fork+0x10/0x20
[ 194.329544]
[ 194.330183] Allocated by task 207:
[ 194.331071] kasan_save_stack+0x3c/0x68
[ 194.332337] kasan_set_track+0x2c/0x40
[ 194.333489] kasan_save_alloc_info+0x24/0x38
[ 194.334753] __kasan_kmalloc+0xd4/0xd8
[ 194.336009] kmalloc_trace+0x68/0x130
[ 194.337129] kasan_bitops_generic+0x98/0x148
[ 194.338366] kunit_try_run_case+0xf8/0x260
[ 194.339581] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 194.341061] kthread+0x18c/0x1a8
[ 194.342069] ret_from_fork+0x10/0x20
[ 194.343194]
[ 194.343741] The buggy address belongs to the object at ffff0000c5bd5800
[ 194.343741] which belongs to the cache kmalloc-16 of size 16
[ 194.345971] The buggy address is located 8 bytes inside of
[ 194.345971] allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[ 194.348306]
[ 194.348927] The buggy address belongs to the physical page:
[ 194.350231] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[ 194.352084] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 194.353701] page_type: 0xffffffff()
[ 194.354756] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 194.356535] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 194.358131] page dumped because: kasan: bad access detected
[ 194.359411]
[ 194.360012] Memory state around the buggy address:
[ 194.361208] ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[ 194.362855] ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 194.364332] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.366013] ^
[ 194.366999] ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.368585] ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.370075] ==================================================================
---
[ 194.651624] ==================================================================
[ 194.653072] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x200/0x7b8
[ 194.654927] Read of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[ 194.656642]
[ 194.657322] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 194.659060] Hardware name: linux,dummy-virt (DT)
[ 194.660182] Call trace:
[ 194.660919] dump_backtrace+0x9c/0x128
[ 194.662003] show_stack+0x20/0x38
[ 194.663110] dump_stack_lvl+0x60/0xb0
[ 194.664294] print_report+0xf8/0x5d8
[ 194.665456] kasan_report+0xc8/0x118
[ 194.666622] __asan_load8+0x9c/0xc0
[ 194.667798] kasan_bitops_test_and_modify.constprop.0+0x200/0x7b8
[ 194.669360] kasan_bitops_generic+0xc0/0x148
[ 194.670656] kunit_try_run_case+0xf8/0x260
[ 194.671899] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 194.673387] kthread+0x18c/0x1a8
[ 194.674354] ret_from_fork+0x10/0x20
[ 194.675549]
[ 194.676114] Allocated by task 207:
[ 194.676974] kasan_save_stack+0x3c/0x68
[ 194.678205] kasan_set_track+0x2c/0x40
[ 194.679360] kasan_save_alloc_info+0x24/0x38
[ 194.680647] __kasan_kmalloc+0xd4/0xd8
[ 194.681846] kmalloc_trace+0x68/0x130
[ 194.682944] kasan_bitops_generic+0x98/0x148
[ 194.684192] kunit_try_run_case+0xf8/0x260
[ 194.685357] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 194.686948] kthread+0x18c/0x1a8
[ 194.687910] ret_from_fork+0x10/0x20
[ 194.689039]
[ 194.689625] The buggy address belongs to the object at ffff0000c5bd5800
[ 194.689625] which belongs to the cache kmalloc-16 of size 16
[ 194.691987] The buggy address is located 8 bytes inside of
[ 194.691987] allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[ 194.694328]
[ 194.694983] The buggy address belongs to the physical page:
[ 194.696284] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[ 194.698261] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 194.699857] page_type: 0xffffffff()
[ 194.700986] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 194.702675] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 194.704300] page dumped because: kasan: bad access detected
[ 194.705548]
[ 194.706197] Memory state around the buggy address:
[ 194.707414] ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[ 194.709057] ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 194.710578] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.712219] ^
[ 194.713208] ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.714841] ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.716328] ==================================================================
---
[ 194.582162] ==================================================================
[ 194.583512] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d4/0x7b8
[ 194.585274] Read of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[ 194.586952]
[ 194.587669] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 194.589375] Hardware name: linux,dummy-virt (DT)
[ 194.590584] Call trace:
[ 194.591378] dump_backtrace+0x9c/0x128
[ 194.592447] show_stack+0x20/0x38
[ 194.593491] dump_stack_lvl+0x60/0xb0
[ 194.594809] print_report+0xf8/0x5d8
[ 194.595932] kasan_report+0xc8/0x118
[ 194.597207] __asan_load8+0x9c/0xc0
[ 194.598365] kasan_bitops_test_and_modify.constprop.0+0x1d4/0x7b8
[ 194.599991] kasan_bitops_generic+0xc0/0x148
[ 194.601257] kunit_try_run_case+0xf8/0x260
[ 194.602525] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 194.604000] kthread+0x18c/0x1a8
[ 194.604963] ret_from_fork+0x10/0x20
[ 194.606163]
[ 194.606714] Allocated by task 207:
[ 194.607664] kasan_save_stack+0x3c/0x68
[ 194.608864] kasan_set_track+0x2c/0x40
[ 194.610037] kasan_save_alloc_info+0x24/0x38
[ 194.611348] __kasan_kmalloc+0xd4/0xd8
[ 194.612540] kmalloc_trace+0x68/0x130
[ 194.613647] kasan_bitops_generic+0x98/0x148
[ 194.614902] kunit_try_run_case+0xf8/0x260
[ 194.616142] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 194.617614] kthread+0x18c/0x1a8
[ 194.618642] ret_from_fork+0x10/0x20
[ 194.619736]
[ 194.620361] The buggy address belongs to the object at ffff0000c5bd5800
[ 194.620361] which belongs to the cache kmalloc-16 of size 16
[ 194.622689] The buggy address is located 8 bytes inside of
[ 194.622689] allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[ 194.625061]
[ 194.625704] The buggy address belongs to the physical page:
[ 194.628750] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[ 194.630850] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 194.632390] page_type: 0xffffffff()
[ 194.633537] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 194.635245] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 194.636832] page dumped because: kasan: bad access detected
[ 194.638133]
[ 194.638793] Memory state around the buggy address:
[ 194.640033] ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[ 194.641558] ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 194.643268] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.644702] ^
[ 194.645634] ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.647399] ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.648971] ==================================================================
---
[ 194.167507] ==================================================================
[ 194.168880] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd0/0x7b8
[ 194.170539] Read of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[ 194.172186]
[ 194.172795] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 194.174582] Hardware name: linux,dummy-virt (DT)
[ 194.175691] Call trace:
[ 194.176436] dump_backtrace+0x9c/0x128
[ 194.177607] show_stack+0x20/0x38
[ 194.178646] dump_stack_lvl+0x60/0xb0
[ 194.179839] print_report+0xf8/0x5d8
[ 194.181002] kasan_report+0xc8/0x118
[ 194.182113] __asan_load8+0x9c/0xc0
[ 194.183315] kasan_bitops_test_and_modify.constprop.0+0xd0/0x7b8
[ 194.184868] kasan_bitops_generic+0xc0/0x148
[ 194.186065] kunit_try_run_case+0xf8/0x260
[ 194.187395] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 194.188866] kthread+0x18c/0x1a8
[ 194.189816] ret_from_fork+0x10/0x20
[ 194.190990]
[ 194.191601] Allocated by task 207:
[ 194.192546] kasan_save_stack+0x3c/0x68
[ 194.193695] kasan_set_track+0x2c/0x40
[ 194.194848] kasan_save_alloc_info+0x24/0x38
[ 194.196211] __kasan_kmalloc+0xd4/0xd8
[ 194.197404] kmalloc_trace+0x68/0x130
[ 194.198516] kasan_bitops_generic+0x98/0x148
[ 194.199716] kunit_try_run_case+0xf8/0x260
[ 194.201020] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 194.202518] kthread+0x18c/0x1a8
[ 194.203455] ret_from_fork+0x10/0x20
[ 194.204606]
[ 194.205176] The buggy address belongs to the object at ffff0000c5bd5800
[ 194.205176] which belongs to the cache kmalloc-16 of size 16
[ 194.207300] The buggy address is located 8 bytes inside of
[ 194.207300] allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[ 194.210551]
[ 194.211216] The buggy address belongs to the physical page:
[ 194.212668] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[ 194.214716] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 194.216265] page_type: 0xffffffff()
[ 194.217292] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 194.219015] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 194.220521] page dumped because: kasan: bad access detected
[ 194.221730]
[ 194.222382] Memory state around the buggy address:
[ 194.223624] ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[ 194.225251] ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 194.226813] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.228328] ^
[ 194.229324] ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.230977] ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.232519] ==================================================================
---
[ 194.443022] ==================================================================
[ 194.444381] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x174/0x7b8
[ 194.446218] Read of size 8 at addr ffff0000c5bd5808 by task kunit_try_catch/207
[ 194.447909]
[ 194.448539] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 194.450368] Hardware name: linux,dummy-virt (DT)
[ 194.451460] Call trace:
[ 194.452215] dump_backtrace+0x9c/0x128
[ 194.453277] show_stack+0x20/0x38
[ 194.454368] dump_stack_lvl+0x60/0xb0
[ 194.455520] print_report+0xf8/0x5d8
[ 194.456699] kasan_report+0xc8/0x118
[ 194.457886] __asan_load8+0x9c/0xc0
[ 194.459050] kasan_bitops_test_and_modify.constprop.0+0x174/0x7b8
[ 194.460603] kasan_bitops_generic+0xc0/0x148
[ 194.461843] kunit_try_run_case+0xf8/0x260
[ 194.463080] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 194.464546] kthread+0x18c/0x1a8
[ 194.465552] ret_from_fork+0x10/0x20
[ 194.466654]
[ 194.467324] Allocated by task 207:
[ 194.468262] kasan_save_stack+0x3c/0x68
[ 194.469455] kasan_set_track+0x2c/0x40
[ 194.470577] kasan_save_alloc_info+0x24/0x38
[ 194.471968] __kasan_kmalloc+0xd4/0xd8
[ 194.473139] kmalloc_trace+0x68/0x130
[ 194.474160] kasan_bitops_generic+0x98/0x148
[ 194.475490] kunit_try_run_case+0xf8/0x260
[ 194.476687] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 194.478215] kthread+0x18c/0x1a8
[ 194.479265] ret_from_fork+0x10/0x20
[ 194.480387]
[ 194.480990] The buggy address belongs to the object at ffff0000c5bd5800
[ 194.480990] which belongs to the cache kmalloc-16 of size 16
[ 194.483217] The buggy address is located 8 bytes inside of
[ 194.483217] allocated 9-byte region [ffff0000c5bd5800, ffff0000c5bd5809)
[ 194.485490]
[ 194.486119] The buggy address belongs to the physical page:
[ 194.487390] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[ 194.489258] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 194.490792] page_type: 0xffffffff()
[ 194.491846] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 194.493537] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 194.495153] page dumped because: kasan: bad access detected
[ 194.496443]
[ 194.497029] Memory state around the buggy address:
[ 194.498164] ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[ 194.499869] ffff0000c5bd5780: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 194.501464] >ffff0000c5bd5800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.503008] ^
[ 194.504006] ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.505572] ffff0000c5bd5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.507086] ==================================================================
Home
[ 188.261895] ==================================================================
[ 188.264012] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xc8/0x1e0
[ 188.265691] Write of size 1 at addr ffff0000c6061f00 by task kunit_try_catch/133
[ 188.267553]
[ 188.268229] CPU: 1 PID: 133 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 188.270076] Hardware name: linux,dummy-virt (DT)
[ 188.271437] Call trace:
[ 188.273098] dump_backtrace+0x9c/0x128
[ 188.274231] show_stack+0x20/0x38
[ 188.275371] dump_stack_lvl+0x60/0xb0
[ 188.276826] print_report+0xf8/0x5d8
[ 188.278333] kasan_report+0xc8/0x118
[ 188.279538] __asan_store1+0x60/0x70
[ 188.281049] kmalloc_large_oob_right+0xc8/0x1e0
[ 188.283291] kunit_try_run_case+0xf8/0x260
[ 188.284916] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 188.286636] kthread+0x18c/0x1a8
[ 188.287644] ret_from_fork+0x10/0x20
[ 188.288885]
[ 188.289450] Allocated by task 133:
[ 188.290316] kasan_save_stack+0x3c/0x68
[ 188.291616] kasan_set_track+0x2c/0x40
[ 188.293084] kasan_save_alloc_info+0x24/0x38
[ 188.294619] __kasan_kmalloc+0xd4/0xd8
[ 188.295687] kmalloc_trace+0x68/0x130
[ 188.296866] kmalloc_large_oob_right+0x9c/0x1e0
[ 188.298300] kunit_try_run_case+0xf8/0x260
[ 188.299613] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 188.301469] kthread+0x18c/0x1a8
[ 188.302631] ret_from_fork+0x10/0x20
[ 188.303875]
[ 188.304545] The buggy address belongs to the object at ffff0000c6060000
[ 188.304545] which belongs to the cache kmalloc-8k of size 8192
[ 188.306983] The buggy address is located 0 bytes to the right of
[ 188.306983] allocated 7936-byte region [ffff0000c6060000, ffff0000c6061f00)
[ 188.309965]
[ 188.310662] The buggy address belongs to the physical page:
[ 188.312135] page:00000000594cb34f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106060
[ 188.314413] head:00000000594cb34f order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 188.316703] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[ 188.318351] page_type: 0xffffffff()
[ 188.320024] raw: 0bfffc0000000840 ffff0000c0002280 dead000000000122 0000000000000000
[ 188.321526] raw: 0000000000000000 0000000080020002 00000001ffffffff 0000000000000000
[ 188.322978] page dumped because: kasan: bad access detected
[ 188.324228]
[ 188.324863] Memory state around the buggy address:
[ 188.326112] ffff0000c6061e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 188.328017] ffff0000c6061e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 188.329925] >ffff0000c6061f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 188.331660] ^
[ 188.333008] ffff0000c6061f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 188.334467] ffff0000c6062000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 188.336023] ==================================================================
Home
[ 187.838752] ==================================================================
[ 187.841151] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0xd0/0x1f0
[ 187.842733] Read of size 1 at addr ffff0000c57bf000 by task kunit_try_catch/121
[ 187.845374]
[ 187.846041] CPU: 1 PID: 121 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 187.848014] Hardware name: linux,dummy-virt (DT)
[ 187.849136] Call trace:
[ 187.849894] dump_backtrace+0x9c/0x128
[ 187.851114] show_stack+0x20/0x38
[ 187.852265] dump_stack_lvl+0x60/0xb0
[ 187.853690] print_report+0xf8/0x5d8
[ 187.855020] kasan_report+0xc8/0x118
[ 187.856347] __asan_load1+0x60/0x70
[ 187.858280] kmalloc_node_oob_right+0xd0/0x1f0
[ 187.859429] kunit_try_run_case+0xf8/0x260
[ 187.860943] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 187.862652] kthread+0x18c/0x1a8
[ 187.863649] ret_from_fork+0x10/0x20
[ 187.864891]
[ 187.865798] Allocated by task 121:
[ 187.866671] kasan_save_stack+0x3c/0x68
[ 187.868513] kasan_set_track+0x2c/0x40
[ 187.870137] kasan_save_alloc_info+0x24/0x38
[ 187.871306] __kasan_kmalloc+0xd4/0xd8
[ 187.872549] kmalloc_node_trace+0x64/0x130
[ 187.874220] kmalloc_node_oob_right+0xa4/0x1f0
[ 187.875713] kunit_try_run_case+0xf8/0x260
[ 187.877127] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 187.878620] kthread+0x18c/0x1a8
[ 187.879595] ret_from_fork+0x10/0x20
[ 187.880750]
[ 187.881356] The buggy address belongs to the object at ffff0000c57be000
[ 187.881356] which belongs to the cache kmalloc-4k of size 4096
[ 187.884474] The buggy address is located 0 bytes to the right of
[ 187.884474] allocated 4096-byte region [ffff0000c57be000, ffff0000c57bf000)
[ 187.887675]
[ 187.888304] The buggy address belongs to the physical page:
[ 187.890333] page:000000005e803cb8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057b8
[ 187.893028] head:000000005e803cb8 order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 187.894955] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[ 187.896562] page_type: 0xffffffff()
[ 187.897965] raw: 0bfffc0000000840 ffff0000c0002140 dead000000000122 0000000000000000
[ 187.899728] raw: 0000000000000000 0000000080040004 00000001ffffffff 0000000000000000
[ 187.901556] page dumped because: kasan: bad access detected
[ 187.902976]
[ 187.903625] Memory state around the buggy address:
[ 187.904994] ffff0000c57bef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 187.907491] ffff0000c57bef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 187.909584] >ffff0000c57bf000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 187.911416] ^
[ 187.912817] ffff0000c57bf080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 187.914608] ffff0000c57bf100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 187.916168] ==================================================================
Home
[ 189.294960] ==================================================================
[ 189.297214] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xf8/0x268
[ 189.298814] Write of size 16 at addr ffff0000c5bd57c0 by task kunit_try_catch/145
[ 189.300801]
[ 189.301654] CPU: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 189.303444] Hardware name: linux,dummy-virt (DT)
[ 189.304582] Call trace:
[ 189.305447] dump_backtrace+0x9c/0x128
[ 189.306595] show_stack+0x20/0x38
[ 189.307644] dump_stack_lvl+0x60/0xb0
[ 189.309305] print_report+0xf8/0x5d8
[ 189.310457] kasan_report+0xc8/0x118
[ 189.311597] __asan_store16+0xa4/0xa8
[ 189.313250] kmalloc_oob_16+0xf8/0x268
[ 189.314336] kunit_try_run_case+0xf8/0x260
[ 189.315600] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.316974] kthread+0x18c/0x1a8
[ 189.318054] ret_from_fork+0x10/0x20
[ 189.319266]
[ 189.319854] Allocated by task 145:
[ 189.320859] kasan_save_stack+0x3c/0x68
[ 189.321987] kasan_set_track+0x2c/0x40
[ 189.323279] kasan_save_alloc_info+0x24/0x38
[ 189.324637] __kasan_kmalloc+0xd4/0xd8
[ 189.325897] kmalloc_trace+0x68/0x130
[ 189.327121] kmalloc_oob_16+0xa4/0x268
[ 189.328590] kunit_try_run_case+0xf8/0x260
[ 189.329717] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.331299] kthread+0x18c/0x1a8
[ 189.332569] ret_from_fork+0x10/0x20
[ 189.333853]
[ 189.334409] The buggy address belongs to the object at ffff0000c5bd57c0
[ 189.334409] which belongs to the cache kmalloc-16 of size 16
[ 189.337230] The buggy address is located 0 bytes inside of
[ 189.337230] allocated 13-byte region [ffff0000c5bd57c0, ffff0000c5bd57cd)
[ 189.339546]
[ 189.340377] The buggy address belongs to the physical page:
[ 189.341619] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[ 189.343548] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 189.345374] page_type: 0xffffffff()
[ 189.346468] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 189.348258] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 189.349720] page dumped because: kasan: bad access detected
[ 189.351035]
[ 189.351641] Memory state around the buggy address:
[ 189.353183] ffff0000c5bd5680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 189.355540] ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[ 189.357131] >ffff0000c5bd5780: 00 05 fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc
[ 189.358693] ^
[ 189.360047] ffff0000c5bd5800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.362091] ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.363574] ==================================================================
Home
[ 189.294960] ==================================================================
[ 189.297214] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xf8/0x268
[ 189.298814] Write of size 16 at addr ffff0000c5bd57c0 by task kunit_try_catch/145
[ 189.300801]
[ 189.301654] CPU: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 189.303444] Hardware name: linux,dummy-virt (DT)
[ 189.304582] Call trace:
[ 189.305447] dump_backtrace+0x9c/0x128
[ 189.306595] show_stack+0x20/0x38
[ 189.307644] dump_stack_lvl+0x60/0xb0
[ 189.309305] print_report+0xf8/0x5d8
[ 189.310457] kasan_report+0xc8/0x118
[ 189.311597] __asan_store16+0xa4/0xa8
[ 189.313250] kmalloc_oob_16+0xf8/0x268
[ 189.314336] kunit_try_run_case+0xf8/0x260
[ 189.315600] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.316974] kthread+0x18c/0x1a8
[ 189.318054] ret_from_fork+0x10/0x20
[ 189.319266]
[ 189.319854] Allocated by task 145:
[ 189.320859] kasan_save_stack+0x3c/0x68
[ 189.321987] kasan_set_track+0x2c/0x40
[ 189.323279] kasan_save_alloc_info+0x24/0x38
[ 189.324637] __kasan_kmalloc+0xd4/0xd8
[ 189.325897] kmalloc_trace+0x68/0x130
[ 189.327121] kmalloc_oob_16+0xa4/0x268
[ 189.328590] kunit_try_run_case+0xf8/0x260
[ 189.329717] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.331299] kthread+0x18c/0x1a8
[ 189.332569] ret_from_fork+0x10/0x20
[ 189.333853]
[ 189.334409] The buggy address belongs to the object at ffff0000c5bd57c0
[ 189.334409] which belongs to the cache kmalloc-16 of size 16
[ 189.337230] The buggy address is located 0 bytes inside of
[ 189.337230] allocated 13-byte region [ffff0000c5bd57c0, ffff0000c5bd57cd)
[ 189.339546]
[ 189.340377] The buggy address belongs to the physical page:
[ 189.341619] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[ 189.343548] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 189.345374] page_type: 0xffffffff()
[ 189.346468] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 189.348258] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 189.349720] page dumped because: kasan: bad access detected
[ 189.351035]
[ 189.351641] Memory state around the buggy address:
[ 189.353183] ffff0000c5bd5680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 189.355540] ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[ 189.357131] >ffff0000c5bd5780: 00 05 fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc
[ 189.358693] ^
[ 189.360047] ffff0000c5bd5800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.362091] ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.363574] ==================================================================
Home
[ 189.502232] ==================================================================
[ 189.504248] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0xd4/0x1e8
[ 189.507330] Write of size 128 at addr ffff0000c5fdba00 by task kunit_try_catch/149
[ 189.509976]
[ 189.510668] CPU: 1 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 189.512452] Hardware name: linux,dummy-virt (DT)
[ 189.513719] Call trace:
[ 189.514582] dump_backtrace+0x9c/0x128
[ 189.515894] show_stack+0x20/0x38
[ 189.517146] dump_stack_lvl+0x60/0xb0
[ 189.518327] print_report+0xf8/0x5d8
[ 189.519536] kasan_report+0xc8/0x118
[ 189.520849] kasan_check_range+0xe8/0x190
[ 189.522175] __asan_memset+0x34/0x78
[ 189.523409] kmalloc_oob_in_memset+0xd4/0x1e8
[ 189.524642] kunit_try_run_case+0xf8/0x260
[ 189.525818] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.527346] kthread+0x18c/0x1a8
[ 189.528448] ret_from_fork+0x10/0x20
[ 189.529610]
[ 189.530253] Allocated by task 149:
[ 189.531283] kasan_save_stack+0x3c/0x68
[ 189.532536] kasan_set_track+0x2c/0x40
[ 189.533788] kasan_save_alloc_info+0x24/0x38
[ 189.535077] __kasan_kmalloc+0xd4/0xd8
[ 189.536574] kmalloc_trace+0x68/0x130
[ 189.537652] kmalloc_oob_in_memset+0xa0/0x1e8
[ 189.538898] kunit_try_run_case+0xf8/0x260
[ 189.540267] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.542263] kthread+0x18c/0x1a8
[ 189.543234] ret_from_fork+0x10/0x20
[ 189.544329]
[ 189.544912] The buggy address belongs to the object at ffff0000c5fdba00
[ 189.544912] which belongs to the cache kmalloc-128 of size 128
[ 189.547295] The buggy address is located 0 bytes inside of
[ 189.547295] allocated 120-byte region [ffff0000c5fdba00, ffff0000c5fdba78)
[ 189.549808]
[ 189.550435] The buggy address belongs to the physical page:
[ 189.551718] page:00000000bce0b260 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fdb
[ 189.553869] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 189.555435] page_type: 0xffffffff()
[ 189.556593] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[ 189.558029] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 189.559575] page dumped because: kasan: bad access detected
[ 189.560726]
[ 189.561396] Memory state around the buggy address:
[ 189.563354] ffff0000c5fdb900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 189.565170] ffff0000c5fdb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.566872] >ffff0000c5fdba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 189.568611] ^
[ 189.570179] ffff0000c5fdba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.571700] ffff0000c5fdbb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.573345] ==================================================================
Home
[ 187.737561] ==================================================================
[ 187.739715] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0xc8/0x1f0
[ 187.741214] Read of size 1 at addr ffff0000c5bd579f by task kunit_try_catch/119
[ 187.742964]
[ 187.743651] CPU: 0 PID: 119 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 187.745876] Hardware name: linux,dummy-virt (DT)
[ 187.747049] Call trace:
[ 187.747803] dump_backtrace+0x9c/0x128
[ 187.748995] show_stack+0x20/0x38
[ 187.749991] dump_stack_lvl+0x60/0xb0
[ 187.751186] print_report+0xf8/0x5d8
[ 187.752529] kasan_report+0xc8/0x118
[ 187.753650] __asan_load1+0x60/0x70
[ 187.754824] kmalloc_oob_left+0xc8/0x1f0
[ 187.755993] kunit_try_run_case+0xf8/0x260
[ 187.757415] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 187.759397] kthread+0x18c/0x1a8
[ 187.760545] ret_from_fork+0x10/0x20
[ 187.761675]
[ 187.762237] Allocated by task 1:
[ 187.763129] kasan_save_stack+0x3c/0x68
[ 187.764658] kasan_set_track+0x2c/0x40
[ 187.765839] kasan_save_alloc_info+0x24/0x38
[ 187.767115] __kasan_kmalloc+0xd4/0xd8
[ 187.768360] __kmalloc_node_track_caller+0x74/0x1d0
[ 187.769845] kvasprintf+0xcc/0x170
[ 187.770920] __kthread_create_on_node+0x11c/0x250
[ 187.772576] kthread_create_on_node+0xac/0xf0
[ 187.773880] create_worker+0x160/0x3b8
[ 187.775000] alloc_unbound_pwq+0x418/0x428
[ 187.776222] apply_wqattrs_prepare+0x1b8/0x3c8
[ 187.778400] apply_workqueue_attrs_locked+0x6c/0xc0
[ 187.779991] alloc_workqueue+0x6cc/0x870
[ 187.781375] latency_fsnotify_init+0x28/0x60
[ 187.782667] do_one_initcall+0xb0/0x3f0
[ 187.783744] kernel_init_freeable+0x2b4/0x550
[ 187.785352] kernel_init+0x2c/0x1f8
[ 187.786415] ret_from_fork+0x10/0x20
[ 187.787594]
[ 187.788202] The buggy address belongs to the object at ffff0000c5bd5780
[ 187.788202] which belongs to the cache kmalloc-16 of size 16
[ 187.790692] The buggy address is located 18 bytes to the right of
[ 187.790692] allocated 13-byte region [ffff0000c5bd5780, ffff0000c5bd578d)
[ 187.793427]
[ 187.794052] The buggy address belongs to the physical page:
[ 187.795306] page:00000000bbda046d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bd5
[ 187.797136] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 187.798582] page_type: 0xffffffff()
[ 187.799741] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 187.801880] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 187.803696] page dumped because: kasan: bad access detected
[ 187.805262]
[ 187.805981] Memory state around the buggy address:
[ 187.807317] ffff0000c5bd5680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 187.809117] ffff0000c5bd5700: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[ 187.810725] >ffff0000c5bd5780: 00 05 fc fc 00 07 fc fc fc fc fc fc fc fc fc fc
[ 187.812316] ^
[ 187.813185] ffff0000c5bd5800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 187.814792] ffff0000c5bd5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 187.816302] ==================================================================
Home
[ 189.871068] ==================================================================
[ 189.873463] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xd8/0x1e8
[ 189.875430] Write of size 16 at addr ffff0000c5fdbd69 by task kunit_try_catch/157
[ 189.877668]
[ 189.878389] CPU: 1 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 189.880222] Hardware name: linux,dummy-virt (DT)
[ 189.881245] Call trace:
[ 189.881977] dump_backtrace+0x9c/0x128
[ 189.883229] show_stack+0x20/0x38
[ 189.884383] dump_stack_lvl+0x60/0xb0
[ 189.885932] print_report+0xf8/0x5d8
[ 189.887145] kasan_report+0xc8/0x118
[ 189.888363] kasan_check_range+0xe8/0x190
[ 189.889729] __asan_memset+0x34/0x78
[ 189.891309] kmalloc_oob_memset_16+0xd8/0x1e8
[ 189.892685] kunit_try_run_case+0xf8/0x260
[ 189.894193] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.895714] kthread+0x18c/0x1a8
[ 189.896697] ret_from_fork+0x10/0x20
[ 189.898783]
[ 189.899383] Allocated by task 157:
[ 189.900338] kasan_save_stack+0x3c/0x68
[ 189.901716] kasan_set_track+0x2c/0x40
[ 189.902928] kasan_save_alloc_info+0x24/0x38
[ 189.904323] __kasan_kmalloc+0xd4/0xd8
[ 189.905680] kmalloc_trace+0x68/0x130
[ 189.907285] kmalloc_oob_memset_16+0xa0/0x1e8
[ 189.908595] kunit_try_run_case+0xf8/0x260
[ 189.910018] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.911415] kthread+0x18c/0x1a8
[ 189.912462] ret_from_fork+0x10/0x20
[ 189.913849]
[ 189.914504] The buggy address belongs to the object at ffff0000c5fdbd00
[ 189.914504] which belongs to the cache kmalloc-128 of size 128
[ 189.918083] The buggy address is located 105 bytes inside of
[ 189.918083] allocated 120-byte region [ffff0000c5fdbd00, ffff0000c5fdbd78)
[ 189.920897]
[ 189.922122] The buggy address belongs to the physical page:
[ 189.923479] page:00000000bce0b260 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fdb
[ 189.925604] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 189.927233] page_type: 0xffffffff()
[ 189.928730] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[ 189.930788] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 189.932507] page dumped because: kasan: bad access detected
[ 189.933931]
[ 189.934588] Memory state around the buggy address:
[ 189.935914] ffff0000c5fdbc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 189.938252] ffff0000c5fdbc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.940369] >ffff0000c5fdbd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 189.942257] ^
[ 189.944008] ffff0000c5fdbd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.945674] ffff0000c5fdbe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.947415] ==================================================================
Home
[ 189.871068] ==================================================================
[ 189.873463] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xd8/0x1e8
[ 189.875430] Write of size 16 at addr ffff0000c5fdbd69 by task kunit_try_catch/157
[ 189.877668]
[ 189.878389] CPU: 1 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 189.880222] Hardware name: linux,dummy-virt (DT)
[ 189.881245] Call trace:
[ 189.881977] dump_backtrace+0x9c/0x128
[ 189.883229] show_stack+0x20/0x38
[ 189.884383] dump_stack_lvl+0x60/0xb0
[ 189.885932] print_report+0xf8/0x5d8
[ 189.887145] kasan_report+0xc8/0x118
[ 189.888363] kasan_check_range+0xe8/0x190
[ 189.889729] __asan_memset+0x34/0x78
[ 189.891309] kmalloc_oob_memset_16+0xd8/0x1e8
[ 189.892685] kunit_try_run_case+0xf8/0x260
[ 189.894193] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.895714] kthread+0x18c/0x1a8
[ 189.896697] ret_from_fork+0x10/0x20
[ 189.898783]
[ 189.899383] Allocated by task 157:
[ 189.900338] kasan_save_stack+0x3c/0x68
[ 189.901716] kasan_set_track+0x2c/0x40
[ 189.902928] kasan_save_alloc_info+0x24/0x38
[ 189.904323] __kasan_kmalloc+0xd4/0xd8
[ 189.905680] kmalloc_trace+0x68/0x130
[ 189.907285] kmalloc_oob_memset_16+0xa0/0x1e8
[ 189.908595] kunit_try_run_case+0xf8/0x260
[ 189.910018] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.911415] kthread+0x18c/0x1a8
[ 189.912462] ret_from_fork+0x10/0x20
[ 189.913849]
[ 189.914504] The buggy address belongs to the object at ffff0000c5fdbd00
[ 189.914504] which belongs to the cache kmalloc-128 of size 128
[ 189.918083] The buggy address is located 105 bytes inside of
[ 189.918083] allocated 120-byte region [ffff0000c5fdbd00, ffff0000c5fdbd78)
[ 189.920897]
[ 189.922122] The buggy address belongs to the physical page:
[ 189.923479] page:00000000bce0b260 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fdb
[ 189.925604] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 189.927233] page_type: 0xffffffff()
[ 189.928730] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[ 189.930788] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 189.932507] page dumped because: kasan: bad access detected
[ 189.933931]
[ 189.934588] Memory state around the buggy address:
[ 189.935914] ffff0000c5fdbc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 189.938252] ffff0000c5fdbc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.940369] >ffff0000c5fdbd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 189.942257] ^
[ 189.944008] ffff0000c5fdbd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.945674] ffff0000c5fdbe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.947415] ==================================================================
Home
[ 189.673207] ==================================================================
[ 189.675234] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xd8/0x1e8
[ 189.676841] Write of size 4 at addr ffff0000c5f8ba75 by task kunit_try_catch/153
[ 189.680682]
[ 189.681371] CPU: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 189.683134] Hardware name: linux,dummy-virt (DT)
[ 189.684272] Call trace:
[ 189.685365] dump_backtrace+0x9c/0x128
[ 189.686839] show_stack+0x20/0x38
[ 189.688119] dump_stack_lvl+0x60/0xb0
[ 189.689786] print_report+0xf8/0x5d8
[ 189.691000] kasan_report+0xc8/0x118
[ 189.692118] kasan_check_range+0xe8/0x190
[ 189.693423] __asan_memset+0x34/0x78
[ 189.694504] kmalloc_oob_memset_4+0xd8/0x1e8
[ 189.696294] kunit_try_run_case+0xf8/0x260
[ 189.697411] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.698755] kthread+0x18c/0x1a8
[ 189.699719] ret_from_fork+0x10/0x20
[ 189.701067]
[ 189.701669] Allocated by task 153:
[ 189.702537] kasan_save_stack+0x3c/0x68
[ 189.704011] kasan_set_track+0x2c/0x40
[ 189.705421] kasan_save_alloc_info+0x24/0x38
[ 189.706918] __kasan_kmalloc+0xd4/0xd8
[ 189.708060] kmalloc_trace+0x68/0x130
[ 189.709578] kmalloc_oob_memset_4+0xa0/0x1e8
[ 189.711117] kunit_try_run_case+0xf8/0x260
[ 189.712335] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.713956] kthread+0x18c/0x1a8
[ 189.714993] ret_from_fork+0x10/0x20
[ 189.716166]
[ 189.716810] The buggy address belongs to the object at ffff0000c5f8ba00
[ 189.716810] which belongs to the cache kmalloc-128 of size 128
[ 189.720752] The buggy address is located 117 bytes inside of
[ 189.720752] allocated 120-byte region [ffff0000c5f8ba00, ffff0000c5f8ba78)
[ 189.723241]
[ 189.723928] The buggy address belongs to the physical page:
[ 189.725330] page:00000000720dd2a1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f8b
[ 189.727450] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 189.729191] page_type: 0xffffffff()
[ 189.730463] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[ 189.732379] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 189.734143] page dumped because: kasan: bad access detected
[ 189.735523]
[ 189.736269] Memory state around the buggy address:
[ 189.737542] ffff0000c5f8b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 189.739130] ffff0000c5f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.740697] >ffff0000c5f8ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 189.742484] ^
[ 189.744181] ffff0000c5f8ba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.745818] ffff0000c5f8bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.747559] ==================================================================
Home
[ 189.673207] ==================================================================
[ 189.675234] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xd8/0x1e8
[ 189.676841] Write of size 4 at addr ffff0000c5f8ba75 by task kunit_try_catch/153
[ 189.680682]
[ 189.681371] CPU: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 189.683134] Hardware name: linux,dummy-virt (DT)
[ 189.684272] Call trace:
[ 189.685365] dump_backtrace+0x9c/0x128
[ 189.686839] show_stack+0x20/0x38
[ 189.688119] dump_stack_lvl+0x60/0xb0
[ 189.689786] print_report+0xf8/0x5d8
[ 189.691000] kasan_report+0xc8/0x118
[ 189.692118] kasan_check_range+0xe8/0x190
[ 189.693423] __asan_memset+0x34/0x78
[ 189.694504] kmalloc_oob_memset_4+0xd8/0x1e8
[ 189.696294] kunit_try_run_case+0xf8/0x260
[ 189.697411] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.698755] kthread+0x18c/0x1a8
[ 189.699719] ret_from_fork+0x10/0x20
[ 189.701067]
[ 189.701669] Allocated by task 153:
[ 189.702537] kasan_save_stack+0x3c/0x68
[ 189.704011] kasan_set_track+0x2c/0x40
[ 189.705421] kasan_save_alloc_info+0x24/0x38
[ 189.706918] __kasan_kmalloc+0xd4/0xd8
[ 189.708060] kmalloc_trace+0x68/0x130
[ 189.709578] kmalloc_oob_memset_4+0xa0/0x1e8
[ 189.711117] kunit_try_run_case+0xf8/0x260
[ 189.712335] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.713956] kthread+0x18c/0x1a8
[ 189.714993] ret_from_fork+0x10/0x20
[ 189.716166]
[ 189.716810] The buggy address belongs to the object at ffff0000c5f8ba00
[ 189.716810] which belongs to the cache kmalloc-128 of size 128
[ 189.720752] The buggy address is located 117 bytes inside of
[ 189.720752] allocated 120-byte region [ffff0000c5f8ba00, ffff0000c5f8ba78)
[ 189.723241]
[ 189.723928] The buggy address belongs to the physical page:
[ 189.725330] page:00000000720dd2a1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f8b
[ 189.727450] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 189.729191] page_type: 0xffffffff()
[ 189.730463] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[ 189.732379] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 189.734143] page dumped because: kasan: bad access detected
[ 189.735523]
[ 189.736269] Memory state around the buggy address:
[ 189.737542] ffff0000c5f8b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 189.739130] ffff0000c5f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.740697] >ffff0000c5f8ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 189.742484] ^
[ 189.744181] ffff0000c5f8ba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.745818] ffff0000c5f8bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.747559] ==================================================================
Home
[ 189.773039] ==================================================================
[ 189.775855] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xd8/0x1e8
[ 189.777729] Write of size 8 at addr ffff0000c5f8bd71 by task kunit_try_catch/155
[ 189.779745]
[ 189.780461] CPU: 0 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 189.782358] Hardware name: linux,dummy-virt (DT)
[ 189.783388] Call trace:
[ 189.784720] dump_backtrace+0x9c/0x128
[ 189.785758] show_stack+0x20/0x38
[ 189.786919] dump_stack_lvl+0x60/0xb0
[ 189.788126] print_report+0xf8/0x5d8
[ 189.789924] kasan_report+0xc8/0x118
[ 189.791301] kasan_check_range+0xe8/0x190
[ 189.792764] __asan_memset+0x34/0x78
[ 189.793857] kmalloc_oob_memset_8+0xd8/0x1e8
[ 189.795111] kunit_try_run_case+0xf8/0x260
[ 189.796449] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.798462] kthread+0x18c/0x1a8
[ 189.799713] ret_from_fork+0x10/0x20
[ 189.801112]
[ 189.801806] Allocated by task 155:
[ 189.802789] kasan_save_stack+0x3c/0x68
[ 189.803946] kasan_set_track+0x2c/0x40
[ 189.805331] kasan_save_alloc_info+0x24/0x38
[ 189.807237] __kasan_kmalloc+0xd4/0xd8
[ 189.808693] kmalloc_trace+0x68/0x130
[ 189.809892] kmalloc_oob_memset_8+0xa0/0x1e8
[ 189.811059] kunit_try_run_case+0xf8/0x260
[ 189.812347] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.814008] kthread+0x18c/0x1a8
[ 189.815531] ret_from_fork+0x10/0x20
[ 189.816618]
[ 189.817250] The buggy address belongs to the object at ffff0000c5f8bd00
[ 189.817250] which belongs to the cache kmalloc-128 of size 128
[ 189.819530] The buggy address is located 113 bytes inside of
[ 189.819530] allocated 120-byte region [ffff0000c5f8bd00, ffff0000c5f8bd78)
[ 189.822140]
[ 189.822811] The buggy address belongs to the physical page:
[ 189.824200] page:00000000720dd2a1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f8b
[ 189.826328] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 189.827953] page_type: 0xffffffff()
[ 189.829016] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[ 189.830592] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 189.832547] page dumped because: kasan: bad access detected
[ 189.834669]
[ 189.835351] Memory state around the buggy address:
[ 189.836604] ffff0000c5f8bc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 189.838328] ffff0000c5f8bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.840275] >ffff0000c5f8bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 189.841760] ^
[ 189.843440] ffff0000c5f8bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.845235] ffff0000c5f8be00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.847148] ==================================================================
Home
[ 189.773039] ==================================================================
[ 189.775855] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xd8/0x1e8
[ 189.777729] Write of size 8 at addr ffff0000c5f8bd71 by task kunit_try_catch/155
[ 189.779745]
[ 189.780461] CPU: 0 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 189.782358] Hardware name: linux,dummy-virt (DT)
[ 189.783388] Call trace:
[ 189.784720] dump_backtrace+0x9c/0x128
[ 189.785758] show_stack+0x20/0x38
[ 189.786919] dump_stack_lvl+0x60/0xb0
[ 189.788126] print_report+0xf8/0x5d8
[ 189.789924] kasan_report+0xc8/0x118
[ 189.791301] kasan_check_range+0xe8/0x190
[ 189.792764] __asan_memset+0x34/0x78
[ 189.793857] kmalloc_oob_memset_8+0xd8/0x1e8
[ 189.795111] kunit_try_run_case+0xf8/0x260
[ 189.796449] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.798462] kthread+0x18c/0x1a8
[ 189.799713] ret_from_fork+0x10/0x20
[ 189.801112]
[ 189.801806] Allocated by task 155:
[ 189.802789] kasan_save_stack+0x3c/0x68
[ 189.803946] kasan_set_track+0x2c/0x40
[ 189.805331] kasan_save_alloc_info+0x24/0x38
[ 189.807237] __kasan_kmalloc+0xd4/0xd8
[ 189.808693] kmalloc_trace+0x68/0x130
[ 189.809892] kmalloc_oob_memset_8+0xa0/0x1e8
[ 189.811059] kunit_try_run_case+0xf8/0x260
[ 189.812347] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.814008] kthread+0x18c/0x1a8
[ 189.815531] ret_from_fork+0x10/0x20
[ 189.816618]
[ 189.817250] The buggy address belongs to the object at ffff0000c5f8bd00
[ 189.817250] which belongs to the cache kmalloc-128 of size 128
[ 189.819530] The buggy address is located 113 bytes inside of
[ 189.819530] allocated 120-byte region [ffff0000c5f8bd00, ffff0000c5f8bd78)
[ 189.822140]
[ 189.822811] The buggy address belongs to the physical page:
[ 189.824200] page:00000000720dd2a1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f8b
[ 189.826328] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 189.827953] page_type: 0xffffffff()
[ 189.829016] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[ 189.830592] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 189.832547] page dumped because: kasan: bad access detected
[ 189.834669]
[ 189.835351] Memory state around the buggy address:
[ 189.836604] ffff0000c5f8bc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 189.838328] ffff0000c5f8bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.840275] >ffff0000c5f8bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 189.841760] ^
[ 189.843440] ffff0000c5f8bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.845235] ffff0000c5f8be00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.847148] ==================================================================
Home
[ 187.497358] ==================================================================
[ 187.499869] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xc8/0x308
[ 187.502251] Write of size 1 at addr ffff0000c5f2d673 by task kunit_try_catch/117
[ 187.504388]
[ 187.505570] CPU: 1 PID: 117 Comm: kunit_try_catch Tainted: G N 6.6.74-rc1 #1
[ 187.508152] Hardware name: linux,dummy-virt (DT)
[ 187.509875] Call trace:
[ 187.510520] dump_backtrace+0x9c/0x128
[ 187.511648] show_stack+0x20/0x38
[ 187.513137] dump_stack_lvl+0x60/0xb0
[ 187.514422] print_report+0xf8/0x5d8
[ 187.515948] kasan_report+0xc8/0x118
[ 187.517222] __asan_store1+0x60/0x70
[ 187.518467] kmalloc_oob_right+0xc8/0x308
[ 187.519608] kunit_try_run_case+0xf8/0x260
[ 187.521668] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 187.523925] kthread+0x18c/0x1a8
[ 187.524922] ret_from_fork+0x10/0x20
[ 187.526408]
[ 187.526960] Allocated by task 117:
[ 187.528138] kasan_save_stack+0x3c/0x68
[ 187.530010] kasan_set_track+0x2c/0x40
[ 187.531477] kasan_save_alloc_info+0x24/0x38
[ 187.532965] __kasan_kmalloc+0xd4/0xd8
[ 187.534123] kmalloc_trace+0x68/0x130
[ 187.535235] kmalloc_oob_right+0xa0/0x308
[ 187.536802] kunit_try_run_case+0xf8/0x260
[ 187.538154] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 187.540243] kthread+0x18c/0x1a8
[ 187.541213] ret_from_fork+0x10/0x20
[ 187.542504]
[ 187.543290] The buggy address belongs to the object at ffff0000c5f2d600
[ 187.543290] which belongs to the cache kmalloc-128 of size 128
[ 187.545688] The buggy address is located 0 bytes to the right of
[ 187.545688] allocated 115-byte region [ffff0000c5f2d600, ffff0000c5f2d673)
[ 187.549116]
[ 187.550137] The buggy address belongs to the physical page:
[ 187.551762] page:0000000066b8e3d8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f2d
[ 187.554526] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 187.556520] page_type: 0xffffffff()
[ 187.558274] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[ 187.559923] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 187.561701] page dumped because: kasan: bad access detected
[ 187.563147]
[ 187.563798] Memory state around the buggy address:
[ 187.565875] ffff0000c5f2d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 187.567792] ffff0000c5f2d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 187.569640] >ffff0000c5f2d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 187.571553] ^
[ 187.573160] ffff0000c5f2d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 187.574682] ffff0000c5f2d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 187.576403] ==================================================================
Home
[ 187.582992] ==================================================================
[ 187.585115] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xf0/0x308
[ 187.587058] Write of size 1 at addr ffff0000c5f2d678 by task kunit_try_catch/117
[ 187.588858]
[ 187.589471] CPU: 0 PID: 117 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 187.591567] Hardware name: linux,dummy-virt (DT)
[ 187.592666] Call trace:
[ 187.593456] dump_backtrace+0x9c/0x128
[ 187.594572] show_stack+0x20/0x38
[ 187.595598] dump_stack_lvl+0x60/0xb0
[ 187.596737] print_report+0xf8/0x5d8
[ 187.597960] kasan_report+0xc8/0x118
[ 187.599122] __asan_store1+0x60/0x70
[ 187.600240] kmalloc_oob_right+0xf0/0x308
[ 187.601413] kunit_try_run_case+0xf8/0x260
[ 187.602713] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 187.604152] kthread+0x18c/0x1a8
[ 187.605103] ret_from_fork+0x10/0x20
[ 187.606275]
[ 187.606803] Allocated by task 117:
[ 187.607739] kasan_save_stack+0x3c/0x68
[ 187.608968] kasan_set_track+0x2c/0x40
[ 187.610093] kasan_save_alloc_info+0x24/0x38
[ 187.611458] __kasan_kmalloc+0xd4/0xd8
[ 187.612607] kmalloc_trace+0x68/0x130
[ 187.613645] kmalloc_oob_right+0xa0/0x308
[ 187.614875] kunit_try_run_case+0xf8/0x260
[ 187.616044] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 187.617578] kthread+0x18c/0x1a8
[ 187.618543] ret_from_fork+0x10/0x20
[ 187.619674]
[ 187.620304] The buggy address belongs to the object at ffff0000c5f2d600
[ 187.620304] which belongs to the cache kmalloc-128 of size 128
[ 187.622563] The buggy address is located 5 bytes to the right of
[ 187.622563] allocated 115-byte region [ffff0000c5f2d600, ffff0000c5f2d673)
[ 187.625012]
[ 187.625628] The buggy address belongs to the physical page:
[ 187.626889] page:0000000066b8e3d8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f2d
[ 187.628800] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 187.630334] page_type: 0xffffffff()
[ 187.631397] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[ 187.633056] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 187.634590] page dumped because: kasan: bad access detected
[ 187.635842]
[ 187.636413] Memory state around the buggy address:
[ 187.637588] ffff0000c5f2d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 187.639291] ffff0000c5f2d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 187.640901] >ffff0000c5f2d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 187.642420] ^
[ 187.643989] ffff0000c5f2d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 187.645512] ffff0000c5f2d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 187.647130] ==================================================================
Home
[ 187.652205] ==================================================================
[ 187.653718] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x118/0x308
[ 187.655247] Read of size 1 at addr ffff0000c5f2d680 by task kunit_try_catch/117
[ 187.656905]
[ 187.657548] CPU: 0 PID: 117 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 187.659347] Hardware name: linux,dummy-virt (DT)
[ 187.660453] Call trace:
[ 187.661234] dump_backtrace+0x9c/0x128
[ 187.662341] show_stack+0x20/0x38
[ 187.663313] dump_stack_lvl+0x60/0xb0
[ 187.664508] print_report+0xf8/0x5d8
[ 187.665619] kasan_report+0xc8/0x118
[ 187.666847] __asan_load1+0x60/0x70
[ 187.668000] kmalloc_oob_right+0x118/0x308
[ 187.669172] kunit_try_run_case+0xf8/0x260
[ 187.670367] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 187.671832] kthread+0x18c/0x1a8
[ 187.672833] ret_from_fork+0x10/0x20
[ 187.673943]
[ 187.674526] Allocated by task 117:
[ 187.675446] kasan_save_stack+0x3c/0x68
[ 187.676632] kasan_set_track+0x2c/0x40
[ 187.677823] kasan_save_alloc_info+0x24/0x38
[ 187.679107] __kasan_kmalloc+0xd4/0xd8
[ 187.680257] kmalloc_trace+0x68/0x130
[ 187.681313] kmalloc_oob_right+0xa0/0x308
[ 187.682497] kunit_try_run_case+0xf8/0x260
[ 187.683763] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 187.685194] kthread+0x18c/0x1a8
[ 187.686233] ret_from_fork+0x10/0x20
[ 187.687341]
[ 187.687893] The buggy address belongs to the object at ffff0000c5f2d600
[ 187.687893] which belongs to the cache kmalloc-128 of size 128
[ 187.690166] The buggy address is located 13 bytes to the right of
[ 187.690166] allocated 115-byte region [ffff0000c5f2d600, ffff0000c5f2d673)
[ 187.693266]
[ 187.693949] The buggy address belongs to the physical page:
[ 187.695934] page:0000000066b8e3d8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f2d
[ 187.697872] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 187.699418] page_type: 0xffffffff()
[ 187.700599] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[ 187.702207] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 187.703796] page dumped because: kasan: bad access detected
[ 187.705170]
[ 187.705835] Memory state around the buggy address:
[ 187.707087] ffff0000c5f2d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 187.708647] ffff0000c5f2d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 187.710338] >ffff0000c5f2d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 187.711786] ^
[ 187.712686] ffff0000c5f2d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 187.714267] ffff0000c5f2d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 187.715706] ==================================================================
Home
[ 187.944979] ==================================================================
[ 187.947628] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0xac/0x1c0
[ 187.950578] Write of size 1 at addr ffff0000c5eca00a by task kunit_try_catch/123
[ 187.952330]
[ 187.953135] CPU: 1 PID: 123 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 187.955197] Hardware name: linux,dummy-virt (DT)
[ 187.956438] Call trace:
[ 187.957133] dump_backtrace+0x9c/0x128
[ 187.958821] show_stack+0x20/0x38
[ 187.959981] dump_stack_lvl+0x60/0xb0
[ 187.961572] print_report+0xf8/0x5d8
[ 187.963305] kasan_report+0xc8/0x118
[ 187.964340] __asan_store1+0x60/0x70
[ 187.965608] kmalloc_pagealloc_oob_right+0xac/0x1c0
[ 187.966934] kunit_try_run_case+0xf8/0x260
[ 187.968213] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 187.970177] kthread+0x18c/0x1a8
[ 187.971306] ret_from_fork+0x10/0x20
[ 187.972611]
[ 187.973469] The buggy address belongs to the physical page:
[ 187.974922] page:00000000361d544d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ec8
[ 187.977036] head:00000000361d544d order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 187.978946] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[ 187.980378] page_type: 0xffffffff()
[ 187.981603] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[ 187.983412] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 187.985218] page dumped because: kasan: bad access detected
[ 187.987223]
[ 187.987890] Memory state around the buggy address:
[ 187.989402] ffff0000c5ec9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 187.991144] ffff0000c5ec9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 187.992753] >ffff0000c5eca000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 187.994574] ^
[ 187.995681] ffff0000c5eca080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 187.997638] ffff0000c5eca100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 187.999180] ==================================================================
Home
[ 190.551817] ==================================================================
[ 190.553971] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xd8/0x268
[ 190.555408] Read of size 1 at addr ffff0000c60aa0c8 by task kunit_try_catch/175
[ 190.557197]
[ 190.558411] CPU: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 190.560357] Hardware name: linux,dummy-virt (DT)
[ 190.561402] Call trace:
[ 190.562214] dump_backtrace+0x9c/0x128
[ 190.563533] show_stack+0x20/0x38
[ 190.564715] dump_stack_lvl+0x60/0xb0
[ 190.566226] print_report+0xf8/0x5d8
[ 190.568220] kasan_report+0xc8/0x118
[ 190.569793] __asan_load1+0x60/0x70
[ 190.571293] kmem_cache_oob+0xd8/0x268
[ 190.572550] kunit_try_run_case+0xf8/0x260
[ 190.574523] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 190.575872] kthread+0x18c/0x1a8
[ 190.576848] ret_from_fork+0x10/0x20
[ 190.577960]
[ 190.578574] Allocated by task 175:
[ 190.579520] kasan_save_stack+0x3c/0x68
[ 190.580798] kasan_set_track+0x2c/0x40
[ 190.582836] kasan_save_alloc_info+0x24/0x38
[ 190.584348] __kasan_slab_alloc+0xa8/0xb0
[ 190.585681] kmem_cache_alloc+0x134/0x330
[ 190.586951] kmem_cache_oob+0xb8/0x268
[ 190.588206] kunit_try_run_case+0xf8/0x260
[ 190.590482] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 190.592029] kthread+0x18c/0x1a8
[ 190.593126] ret_from_fork+0x10/0x20
[ 190.594271]
[ 190.594932] The buggy address belongs to the object at ffff0000c60aa000
[ 190.594932] which belongs to the cache test_cache of size 200
[ 190.597175] The buggy address is located 0 bytes to the right of
[ 190.597175] allocated 200-byte region [ffff0000c60aa000, ffff0000c60aa0c8)
[ 190.600870]
[ 190.601474] The buggy address belongs to the physical page:
[ 190.602754] page:000000000157b634 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060aa
[ 190.604649] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 190.607257] page_type: 0xffffffff()
[ 190.608494] raw: 0bfffc0000000800 ffff0000c57608c0 dead000000000122 0000000000000000
[ 190.610175] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[ 190.611666] page dumped because: kasan: bad access detected
[ 190.613057]
[ 190.613608] Memory state around the buggy address:
[ 190.614926] ffff0000c60a9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 190.616704] ffff0000c60aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 190.618490] >ffff0000c60aa080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[ 190.620471] ^
[ 190.621933] ffff0000c60aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 190.624048] ffff0000c60aa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 190.625860] ==================================================================
Home
[ 188.834345] ==================================================================
[ 188.835637] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x140/0x590
[ 188.837519] Write of size 1 at addr ffff0000c5eea0d0 by task kunit_try_catch/141
[ 188.839323]
[ 188.840083] CPU: 0 PID: 141 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 188.842235] Hardware name: linux,dummy-virt (DT)
[ 188.843411] Call trace:
[ 188.844433] dump_backtrace+0x9c/0x128
[ 188.845580] show_stack+0x20/0x38
[ 188.846620] dump_stack_lvl+0x60/0xb0
[ 188.847796] print_report+0xf8/0x5d8
[ 188.849126] kasan_report+0xc8/0x118
[ 188.850318] __asan_store1+0x60/0x70
[ 188.851473] krealloc_less_oob_helper+0x140/0x590
[ 188.853000] krealloc_pagealloc_less_oob+0x20/0x38
[ 188.854375] kunit_try_run_case+0xf8/0x260
[ 188.855553] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 188.857446] kthread+0x18c/0x1a8
[ 188.858416] ret_from_fork+0x10/0x20
[ 188.859739]
[ 188.860414] The buggy address belongs to the physical page:
[ 188.862042] page:00000000afef2623 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ee8
[ 188.864207] head:00000000afef2623 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 188.865803] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[ 188.867415] page_type: 0xffffffff()
[ 188.868852] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[ 188.870592] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 188.872195] page dumped because: kasan: bad access detected
[ 188.873556]
[ 188.874151] Memory state around the buggy address:
[ 188.875359] ffff0000c5ee9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 188.877022] ffff0000c5eea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 188.878869] >ffff0000c5eea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 188.880556] ^
[ 188.881999] ffff0000c5eea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 188.883758] ffff0000c5eea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 188.885488] ==================================================================
Home
[ 188.945523] ==================================================================
[ 188.946746] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1b8/0x590
[ 188.948651] Write of size 1 at addr ffff0000c5eea0ea by task kunit_try_catch/141
[ 188.950679]
[ 188.951423] CPU: 0 PID: 141 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 188.953318] Hardware name: linux,dummy-virt (DT)
[ 188.954397] Call trace:
[ 188.955138] dump_backtrace+0x9c/0x128
[ 188.956582] show_stack+0x20/0x38
[ 188.957687] dump_stack_lvl+0x60/0xb0
[ 188.958881] print_report+0xf8/0x5d8
[ 188.960485] kasan_report+0xc8/0x118
[ 188.961528] __asan_store1+0x60/0x70
[ 188.962678] krealloc_less_oob_helper+0x1b8/0x590
[ 188.963962] krealloc_pagealloc_less_oob+0x20/0x38
[ 188.965273] kunit_try_run_case+0xf8/0x260
[ 188.966634] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 188.969255] kthread+0x18c/0x1a8
[ 188.970260] ret_from_fork+0x10/0x20
[ 188.971337]
[ 188.971897] The buggy address belongs to the physical page:
[ 188.973302] page:00000000afef2623 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ee8
[ 188.975207] head:00000000afef2623 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 188.977005] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[ 188.978748] page_type: 0xffffffff()
[ 188.979942] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[ 188.981482] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 188.983017] page dumped because: kasan: bad access detected
[ 188.984684]
[ 188.985254] Memory state around the buggy address:
[ 188.986832] ffff0000c5ee9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 188.988807] ffff0000c5eea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 188.990406] >ffff0000c5eea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 188.991911] ^
[ 188.993539] ffff0000c5eea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 188.995137] ffff0000c5eea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 188.996931] ==================================================================
---
[ 188.999531] ==================================================================
[ 189.001336] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1e0/0x590
[ 189.004145] Write of size 1 at addr ffff0000c5eea0eb by task kunit_try_catch/141
[ 189.006437]
[ 189.007117] CPU: 0 PID: 141 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 189.009053] Hardware name: linux,dummy-virt (DT)
[ 189.010186] Call trace:
[ 189.010930] dump_backtrace+0x9c/0x128
[ 189.012431] show_stack+0x20/0x38
[ 189.013362] dump_stack_lvl+0x60/0xb0
[ 189.014491] print_report+0xf8/0x5d8
[ 189.015687] kasan_report+0xc8/0x118
[ 189.016898] __asan_store1+0x60/0x70
[ 189.018182] krealloc_less_oob_helper+0x1e0/0x590
[ 189.019536] krealloc_pagealloc_less_oob+0x20/0x38
[ 189.021295] kunit_try_run_case+0xf8/0x260
[ 189.022458] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.023929] kthread+0x18c/0x1a8
[ 189.025101] ret_from_fork+0x10/0x20
[ 189.026350]
[ 189.026881] The buggy address belongs to the physical page:
[ 189.028200] page:00000000afef2623 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ee8
[ 189.030359] head:00000000afef2623 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 189.032075] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[ 189.033657] page_type: 0xffffffff()
[ 189.034741] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[ 189.036857] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 189.038437] page dumped because: kasan: bad access detected
[ 189.039695]
[ 189.040346] Memory state around the buggy address:
[ 189.041563] ffff0000c5ee9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 189.043992] ffff0000c5eea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 189.045739] >ffff0000c5eea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 189.047293] ^
[ 189.049097] ffff0000c5eea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 189.050661] ffff0000c5eea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 189.052453] ==================================================================
Home
[ 188.779385] ==================================================================
[ 188.781608] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x110/0x590
[ 188.783303] Write of size 1 at addr ffff0000c5eea0c9 by task kunit_try_catch/141
[ 188.785305]
[ 188.786040] CPU: 0 PID: 141 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 188.787821] Hardware name: linux,dummy-virt (DT)
[ 188.789076] Call trace:
[ 188.789890] dump_backtrace+0x9c/0x128
[ 188.790965] show_stack+0x20/0x38
[ 188.792104] dump_stack_lvl+0x60/0xb0
[ 188.793174] print_report+0xf8/0x5d8
[ 188.794377] kasan_report+0xc8/0x118
[ 188.795521] __asan_store1+0x60/0x70
[ 188.796885] krealloc_less_oob_helper+0x110/0x590
[ 188.798221] krealloc_pagealloc_less_oob+0x20/0x38
[ 188.799466] kunit_try_run_case+0xf8/0x260
[ 188.800926] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 188.802663] kthread+0x18c/0x1a8
[ 188.803798] ret_from_fork+0x10/0x20
[ 188.805151]
[ 188.805758] The buggy address belongs to the physical page:
[ 188.807096] page:00000000afef2623 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ee8
[ 188.809127] head:00000000afef2623 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 188.810780] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[ 188.812429] page_type: 0xffffffff()
[ 188.813550] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[ 188.815200] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 188.817012] page dumped because: kasan: bad access detected
[ 188.818302]
[ 188.818873] Memory state around the buggy address:
[ 188.820079] ffff0000c5ee9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 188.821681] ffff0000c5eea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 188.823458] >ffff0000c5eea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 188.825222] ^
[ 188.826509] ffff0000c5eea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 188.828433] ffff0000c5eea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 188.829759] ==================================================================
Home
[ 188.889841] ==================================================================
[ 188.891231] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x18c/0x590
[ 188.893224] Write of size 1 at addr ffff0000c5eea0da by task kunit_try_catch/141
[ 188.895498]
[ 188.896188] CPU: 0 PID: 141 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 188.898610] Hardware name: linux,dummy-virt (DT)
[ 188.899803] Call trace:
[ 188.900520] dump_backtrace+0x9c/0x128
[ 188.901955] show_stack+0x20/0x38
[ 188.902984] dump_stack_lvl+0x60/0xb0
[ 188.904290] print_report+0xf8/0x5d8
[ 188.905570] kasan_report+0xc8/0x118
[ 188.906735] __asan_store1+0x60/0x70
[ 188.907933] krealloc_less_oob_helper+0x18c/0x590
[ 188.909347] krealloc_pagealloc_less_oob+0x20/0x38
[ 188.910931] kunit_try_run_case+0xf8/0x260
[ 188.912512] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 188.914265] kthread+0x18c/0x1a8
[ 188.915326] ret_from_fork+0x10/0x20
[ 188.916687]
[ 188.917321] The buggy address belongs to the physical page:
[ 188.918624] page:00000000afef2623 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ee8
[ 188.920845] head:00000000afef2623 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 188.922575] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[ 188.924452] page_type: 0xffffffff()
[ 188.925703] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[ 188.927200] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 188.929056] page dumped because: kasan: bad access detected
[ 188.930187]
[ 188.930745] Memory state around the buggy address:
[ 188.932185] ffff0000c5ee9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 188.934128] ffff0000c5eea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 188.935714] >ffff0000c5eea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 188.937519] ^
[ 188.938980] ffff0000c5eea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 188.940886] ffff0000c5eea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 188.942335] ==================================================================
Home
[ 188.359271] ==================================================================
[ 188.361179] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x138/0x380
[ 188.364393] Write of size 1 at addr ffff0000c5a806eb by task kunit_try_catch/135
[ 188.366037]
[ 188.366847] CPU: 0 PID: 135 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 188.369644] Hardware name: linux,dummy-virt (DT)
[ 188.370889] Call trace:
[ 188.371669] dump_backtrace+0x9c/0x128
[ 188.373503] show_stack+0x20/0x38
[ 188.374471] dump_stack_lvl+0x60/0xb0
[ 188.375714] print_report+0xf8/0x5d8
[ 188.377149] kasan_report+0xc8/0x118
[ 188.378355] __asan_store1+0x60/0x70
[ 188.379501] krealloc_more_oob_helper+0x138/0x380
[ 188.380857] krealloc_more_oob+0x20/0x38
[ 188.382115] kunit_try_run_case+0xf8/0x260
[ 188.383544] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 188.385297] kthread+0x18c/0x1a8
[ 188.386296] ret_from_fork+0x10/0x20
[ 188.387615]
[ 188.388585] Allocated by task 135:
[ 188.389524] kasan_save_stack+0x3c/0x68
[ 188.390805] kasan_set_track+0x2c/0x40
[ 188.391976] kasan_save_alloc_info+0x24/0x38
[ 188.393261] __kasan_krealloc+0x10c/0x140
[ 188.394587] krealloc+0x10c/0x1a0
[ 188.395631] krealloc_more_oob_helper+0xd4/0x380
[ 188.396930] krealloc_more_oob+0x20/0x38
[ 188.398151] kunit_try_run_case+0xf8/0x260
[ 188.399443] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 188.401944] kthread+0x18c/0x1a8
[ 188.403028] ret_from_fork+0x10/0x20
[ 188.404238]
[ 188.405112] The buggy address belongs to the object at ffff0000c5a80600
[ 188.405112] which belongs to the cache kmalloc-256 of size 256
[ 188.407354] The buggy address is located 0 bytes to the right of
[ 188.407354] allocated 235-byte region [ffff0000c5a80600, ffff0000c5a806eb)
[ 188.409933]
[ 188.410556] The buggy address belongs to the physical page:
[ 188.411912] page:00000000c3cb256b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[ 188.413811] head:00000000c3cb256b order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 188.415426] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[ 188.417343] page_type: 0xffffffff()
[ 188.418389] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000
[ 188.420115] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 188.421595] page dumped because: kasan: bad access detected
[ 188.422719]
[ 188.423346] Memory state around the buggy address:
[ 188.425138] ffff0000c5a80580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 188.427344] ffff0000c5a80600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 188.429175] >ffff0000c5a80680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[ 188.430842] ^
[ 188.432505] ffff0000c5a80700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 188.434255] ffff0000c5a80780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 188.435714] ==================================================================
Home
[ 188.651534] ==================================================================
[ 188.653479] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x138/0x380
[ 188.655005] Write of size 1 at addr ffff0000c5eea0eb by task kunit_try_catch/139
[ 188.656793]
[ 188.657480] CPU: 0 PID: 139 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 188.659290] Hardware name: linux,dummy-virt (DT)
[ 188.660405] Call trace:
[ 188.661129] dump_backtrace+0x9c/0x128
[ 188.662253] show_stack+0x20/0x38
[ 188.663296] dump_stack_lvl+0x60/0xb0
[ 188.664474] print_report+0xf8/0x5d8
[ 188.665630] kasan_report+0xc8/0x118
[ 188.666740] __asan_store1+0x60/0x70
[ 188.667945] krealloc_more_oob_helper+0x138/0x380
[ 188.669305] krealloc_pagealloc_more_oob+0x20/0x38
[ 188.670635] kunit_try_run_case+0xf8/0x260
[ 188.671878] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 188.673311] kthread+0x18c/0x1a8
[ 188.674220] ret_from_fork+0x10/0x20
[ 188.675346]
[ 188.675962] The buggy address belongs to the physical page:
[ 188.677213] page:00000000afef2623 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ee8
[ 188.679068] head:00000000afef2623 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 188.680719] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[ 188.682306] page_type: 0xffffffff()
[ 188.683332] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[ 188.685083] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 188.686579] page dumped because: kasan: bad access detected
[ 188.687873]
[ 188.688420] Memory state around the buggy address:
[ 188.689629] ffff0000c5ee9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 188.691260] ffff0000c5eea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 188.692856] >ffff0000c5eea080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[ 188.694352] ^
[ 188.695763] ffff0000c5eea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 188.697390] ffff0000c5eea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 188.698979] ==================================================================
Home
[ 188.701648] ==================================================================
[ 188.703166] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x168/0x380
[ 188.704673] Write of size 1 at addr ffff0000c5eea0f0 by task kunit_try_catch/139
[ 188.706681]
[ 188.707319] CPU: 0 PID: 139 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 188.709251] Hardware name: linux,dummy-virt (DT)
[ 188.710462] Call trace:
[ 188.711245] dump_backtrace+0x9c/0x128
[ 188.712445] show_stack+0x20/0x38
[ 188.713752] dump_stack_lvl+0x60/0xb0
[ 188.715138] print_report+0xf8/0x5d8
[ 188.716295] kasan_report+0xc8/0x118
[ 188.717440] __asan_store1+0x60/0x70
[ 188.718641] krealloc_more_oob_helper+0x168/0x380
[ 188.719911] krealloc_pagealloc_more_oob+0x20/0x38
[ 188.721281] kunit_try_run_case+0xf8/0x260
[ 188.722510] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 188.723984] kthread+0x18c/0x1a8
[ 188.724985] ret_from_fork+0x10/0x20
[ 188.726112]
[ 188.726758] The buggy address belongs to the physical page:
[ 188.728044] page:00000000afef2623 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ee8
[ 188.729917] head:00000000afef2623 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 188.731596] flags: 0xbfffc0000000040(head|node=0|zone=2|lastcpupid=0xffff)
[ 188.733157] page_type: 0xffffffff()
[ 188.734337] raw: 0bfffc0000000040 0000000000000000 dead000000000122 0000000000000000
[ 188.735977] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 188.737487] page dumped because: kasan: bad access detected
[ 188.738786]
[ 188.739422] Memory state around the buggy address:
[ 188.740624] ffff0000c5ee9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 188.742228] ffff0000c5eea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 188.743815] >ffff0000c5eea080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[ 188.745292] ^
[ 188.746831] ffff0000c5eea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 188.748408] ffff0000c5eea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 188.749903] ==================================================================
Home
[ 188.442366] ==================================================================
[ 188.443799] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x168/0x380
[ 188.445634] Write of size 1 at addr ffff0000c5a806f0 by task kunit_try_catch/135
[ 188.447464]
[ 188.448664] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 188.450453] Hardware name: linux,dummy-virt (DT)
[ 188.452485] Call trace:
[ 188.453598] dump_backtrace+0x9c/0x128
[ 188.454785] show_stack+0x20/0x38
[ 188.455730] dump_stack_lvl+0x60/0xb0
[ 188.457192] print_report+0xf8/0x5d8
[ 188.458686] kasan_report+0xc8/0x118
[ 188.460296] __asan_store1+0x60/0x70
[ 188.461764] krealloc_more_oob_helper+0x168/0x380
[ 188.463160] krealloc_more_oob+0x20/0x38
[ 188.464426] kunit_try_run_case+0xf8/0x260
[ 188.466112] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 188.468619] kthread+0x18c/0x1a8
[ 188.469465] ret_from_fork+0x10/0x20
[ 188.470616]
[ 188.471174] Allocated by task 135:
[ 188.472115] kasan_save_stack+0x3c/0x68
[ 188.473383] kasan_set_track+0x2c/0x40
[ 188.474615] kasan_save_alloc_info+0x24/0x38
[ 188.476188] __kasan_krealloc+0x10c/0x140
[ 188.477569] krealloc+0x10c/0x1a0
[ 188.478717] krealloc_more_oob_helper+0xd4/0x380
[ 188.480175] krealloc_more_oob+0x20/0x38
[ 188.481535] kunit_try_run_case+0xf8/0x260
[ 188.482864] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 188.484422] kthread+0x18c/0x1a8
[ 188.485422] ret_from_fork+0x10/0x20
[ 188.487002]
[ 188.487561] The buggy address belongs to the object at ffff0000c5a80600
[ 188.487561] which belongs to the cache kmalloc-256 of size 256
[ 188.490690] The buggy address is located 5 bytes to the right of
[ 188.490690] allocated 235-byte region [ffff0000c5a80600, ffff0000c5a806eb)
[ 188.493129]
[ 188.493788] The buggy address belongs to the physical page:
[ 188.495176] page:00000000c3cb256b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[ 188.497843] head:00000000c3cb256b order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 188.499535] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[ 188.501717] page_type: 0xffffffff()
[ 188.503046] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000
[ 188.505193] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 188.506442] page dumped because: kasan: bad access detected
[ 188.507152]
[ 188.507451] Memory state around the buggy address:
[ 188.508711] ffff0000c5a80580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 188.510582] ffff0000c5a80600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 188.513116] >ffff0000c5a80680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[ 188.514689] ^
[ 188.516250] ffff0000c5a80700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 188.519000] ffff0000c5a80780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 188.520915] ==================================================================
Home
[ 191.817253] ==================================================================
[ 191.819207] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x150/0x378
[ 191.821061] Read of size 1 at addr ffff0000c60c537f by task kunit_try_catch/191
[ 191.822887]
[ 191.823670] CPU: 1 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 191.825467] Hardware name: linux,dummy-virt (DT)
[ 191.826534] Call trace:
[ 191.827695] dump_backtrace+0x9c/0x128
[ 191.829020] show_stack+0x20/0x38
[ 191.830064] dump_stack_lvl+0x60/0xb0
[ 191.831482] print_report+0xf8/0x5d8
[ 191.832810] kasan_report+0xc8/0x118
[ 191.834042] __asan_load1+0x60/0x70
[ 191.835237] ksize_unpoisons_memory+0x150/0x378
[ 191.836745] kunit_try_run_case+0xf8/0x260
[ 191.837908] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 191.839441] kthread+0x18c/0x1a8
[ 191.840540] ret_from_fork+0x10/0x20
[ 191.842440]
[ 191.843055] Allocated by task 191:
[ 191.843966] kasan_save_stack+0x3c/0x68
[ 191.845294] kasan_set_track+0x2c/0x40
[ 191.846523] kasan_save_alloc_info+0x24/0x38
[ 191.847915] __kasan_kmalloc+0xd4/0xd8
[ 191.849342] kmalloc_trace+0x68/0x130
[ 191.850573] ksize_unpoisons_memory+0xb0/0x378
[ 191.852679] kunit_try_run_case+0xf8/0x260
[ 191.853923] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 191.855428] kthread+0x18c/0x1a8
[ 191.856503] ret_from_fork+0x10/0x20
[ 191.858048]
[ 191.858997] The buggy address belongs to the object at ffff0000c60c5300
[ 191.858997] which belongs to the cache kmalloc-128 of size 128
[ 191.861895] The buggy address is located 12 bytes to the right of
[ 191.861895] allocated 115-byte region [ffff0000c60c5300, ffff0000c60c5373)
[ 191.864417]
[ 191.864998] The buggy address belongs to the physical page:
[ 191.866705] page:000000005f243d63 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060c5
[ 191.868356] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 191.869640] page_type: 0xffffffff()
[ 191.871267] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[ 191.873338] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 191.875189] page dumped because: kasan: bad access detected
[ 191.876616]
[ 191.877525] Memory state around the buggy address:
[ 191.878806] ffff0000c60c5200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 191.881008] ffff0000c60c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 191.882687] >ffff0000c60c5300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 191.884363] ^
[ 191.885953] ffff0000c60c5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 191.887908] ffff0000c60c5400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 191.889519] ==================================================================
---
[ 191.739262] ==================================================================
[ 191.741052] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x128/0x378
[ 191.743139] Read of size 1 at addr ffff0000c60c5378 by task kunit_try_catch/191
[ 191.745574]
[ 191.746187] CPU: 1 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 191.748242] Hardware name: linux,dummy-virt (DT)
[ 191.749357] Call trace:
[ 191.750516] dump_backtrace+0x9c/0x128
[ 191.751793] show_stack+0x20/0x38
[ 191.753091] dump_stack_lvl+0x60/0xb0
[ 191.755067] print_report+0xf8/0x5d8
[ 191.756429] kasan_report+0xc8/0x118
[ 191.757811] __asan_load1+0x60/0x70
[ 191.758968] ksize_unpoisons_memory+0x128/0x378
[ 191.760289] kunit_try_run_case+0xf8/0x260
[ 191.761628] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 191.763501] kthread+0x18c/0x1a8
[ 191.764984] ret_from_fork+0x10/0x20
[ 191.766122]
[ 191.766709] Allocated by task 191:
[ 191.767678] kasan_save_stack+0x3c/0x68
[ 191.769092] kasan_set_track+0x2c/0x40
[ 191.770501] kasan_save_alloc_info+0x24/0x38
[ 191.772118] __kasan_kmalloc+0xd4/0xd8
[ 191.773513] kmalloc_trace+0x68/0x130
[ 191.774635] ksize_unpoisons_memory+0xb0/0x378
[ 191.775956] kunit_try_run_case+0xf8/0x260
[ 191.777353] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 191.779107] kthread+0x18c/0x1a8
[ 191.780298] ret_from_fork+0x10/0x20
[ 191.781846]
[ 191.782585] The buggy address belongs to the object at ffff0000c60c5300
[ 191.782585] which belongs to the cache kmalloc-128 of size 128
[ 191.785342] The buggy address is located 5 bytes to the right of
[ 191.785342] allocated 115-byte region [ffff0000c60c5300, ffff0000c60c5373)
[ 191.787820]
[ 191.788517] The buggy address belongs to the physical page:
[ 191.790306] page:000000005f243d63 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060c5
[ 191.792290] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 191.793870] page_type: 0xffffffff()
[ 191.795360] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[ 191.797432] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 191.799272] page dumped because: kasan: bad access detected
[ 191.800432]
[ 191.801006] Memory state around the buggy address:
[ 191.803069] ffff0000c60c5200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 191.805108] ffff0000c60c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 191.806995] >ffff0000c60c5300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 191.808351] ^
[ 191.810311] ffff0000c60c5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 191.811876] ffff0000c60c5400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 191.813705] ==================================================================
Home
[ 191.661872] ==================================================================
[ 191.663821] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x104/0x378
[ 191.666395] Read of size 1 at addr ffff0000c60c5373 by task kunit_try_catch/191
[ 191.669301]
[ 191.669901] CPU: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 191.672029] Hardware name: linux,dummy-virt (DT)
[ 191.673240] Call trace:
[ 191.674113] dump_backtrace+0x9c/0x128
[ 191.675221] show_stack+0x20/0x38
[ 191.676339] dump_stack_lvl+0x60/0xb0
[ 191.677364] print_report+0xf8/0x5d8
[ 191.678576] kasan_report+0xc8/0x118
[ 191.679701] __asan_load1+0x60/0x70
[ 191.681185] ksize_unpoisons_memory+0x104/0x378
[ 191.683348] kunit_try_run_case+0xf8/0x260
[ 191.684806] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 191.686264] kthread+0x18c/0x1a8
[ 191.687263] ret_from_fork+0x10/0x20
[ 191.688520]
[ 191.689216] Allocated by task 191:
[ 191.690019] kasan_save_stack+0x3c/0x68
[ 191.691212] kasan_set_track+0x2c/0x40
[ 191.692511] kasan_save_alloc_info+0x24/0x38
[ 191.693872] __kasan_kmalloc+0xd4/0xd8
[ 191.694996] kmalloc_trace+0x68/0x130
[ 191.696172] ksize_unpoisons_memory+0xb0/0x378
[ 191.697299] kunit_try_run_case+0xf8/0x260
[ 191.698545] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 191.700795] kthread+0x18c/0x1a8
[ 191.701973] ret_from_fork+0x10/0x20
[ 191.702942]
[ 191.703548] The buggy address belongs to the object at ffff0000c60c5300
[ 191.703548] which belongs to the cache kmalloc-128 of size 128
[ 191.706095] The buggy address is located 0 bytes to the right of
[ 191.706095] allocated 115-byte region [ffff0000c60c5300, ffff0000c60c5373)
[ 191.708720]
[ 191.709256] The buggy address belongs to the physical page:
[ 191.710584] page:000000005f243d63 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060c5
[ 191.712697] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 191.714122] page_type: 0xffffffff()
[ 191.715148] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[ 191.716908] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 191.718416] page dumped because: kasan: bad access detected
[ 191.719647]
[ 191.720276] Memory state around the buggy address:
[ 191.721372] ffff0000c60c5200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 191.723228] ffff0000c60c5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 191.725540] >ffff0000c60c5300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 191.727145] ^
[ 191.728892] ffff0000c60c5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 191.730555] ffff0000c60c5400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 191.732043] ==================================================================
Home
[ 192.643579] ==================================================================
[ 192.646214] BUG: KASAN: slab-out-of-bounds in memchr+0x28/0x78
[ 192.647595] Read of size 1 at addr ffff0000c5f2cb18 by task kunit_try_catch/201
[ 192.649786]
[ 192.650362] CPU: 1 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 192.652218] Hardware name: linux,dummy-virt (DT)
[ 192.652937] Call trace:
[ 192.653453] dump_backtrace+0x9c/0x128
[ 192.654722] show_stack+0x20/0x38
[ 192.655848] dump_stack_lvl+0x60/0xb0
[ 192.657330] print_report+0xf8/0x5d8
[ 192.658573] kasan_report+0xc8/0x118
[ 192.659990] __asan_load1+0x60/0x70
[ 192.661383] memchr+0x28/0x78
[ 192.662410] kasan_memchr+0xd4/0x1f0
[ 192.663525] kunit_try_run_case+0xf8/0x260
[ 192.665166] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 192.667040] kthread+0x18c/0x1a8
[ 192.668182] ret_from_fork+0x10/0x20
[ 192.669660]
[ 192.670246] Allocated by task 201:
[ 192.671180] kasan_save_stack+0x3c/0x68
[ 192.672332] kasan_set_track+0x2c/0x40
[ 192.673629] kasan_save_alloc_info+0x24/0x38
[ 192.674945] __kasan_kmalloc+0xd4/0xd8
[ 192.676071] kmalloc_trace+0x68/0x130
[ 192.677264] kasan_memchr+0xa0/0x1f0
[ 192.678423] kunit_try_run_case+0xf8/0x260
[ 192.679666] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 192.681360] kthread+0x18c/0x1a8
[ 192.682376] ret_from_fork+0x10/0x20
[ 192.683485]
[ 192.684198] The buggy address belongs to the object at ffff0000c5f2cb00
[ 192.684198] which belongs to the cache kmalloc-32 of size 32
[ 192.687039] The buggy address is located 0 bytes to the right of
[ 192.687039] allocated 24-byte region [ffff0000c5f2cb00, ffff0000c5f2cb18)
[ 192.690380]
[ 192.691062] The buggy address belongs to the physical page:
[ 192.692653] page:00000000e427c865 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f2c
[ 192.694555] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 192.696366] page_type: 0xffffffff()
[ 192.697631] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[ 192.699462] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 192.701099] page dumped because: kasan: bad access detected
[ 192.702389]
[ 192.702992] Memory state around the buggy address:
[ 192.704654] ffff0000c5f2ca00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 192.706344] ffff0000c5f2ca80: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[ 192.708458] >ffff0000c5f2cb00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 192.710104] ^
[ 192.711144] ffff0000c5f2cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 192.712950] ffff0000c5f2cc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 192.714502] ==================================================================
Home
[ 192.739868] ==================================================================
[ 192.741951] BUG: KASAN: slab-out-of-bounds in memcmp+0x44/0xd0
[ 192.743308] Read of size 1 at addr ffff0000c5f2cb58 by task kunit_try_catch/203
[ 192.745006]
[ 192.745665] CPU: 1 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 192.747438] Hardware name: linux,dummy-virt (DT)
[ 192.748488] Call trace:
[ 192.749177] dump_backtrace+0x9c/0x128
[ 192.750319] show_stack+0x20/0x38
[ 192.751357] dump_stack_lvl+0x60/0xb0
[ 192.752471] print_report+0xf8/0x5d8
[ 192.753663] kasan_report+0xc8/0x118
[ 192.754915] __asan_load1+0x60/0x70
[ 192.756085] memcmp+0x44/0xd0
[ 192.757169] kasan_memcmp+0xf0/0x208
[ 192.758269] kunit_try_run_case+0xf8/0x260
[ 192.759607] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 192.760930] kthread+0x18c/0x1a8
[ 192.761882] ret_from_fork+0x10/0x20
[ 192.763054]
[ 192.763617] Allocated by task 203:
[ 192.764564] kasan_save_stack+0x3c/0x68
[ 192.765751] kasan_set_track+0x2c/0x40
[ 192.766945] kasan_save_alloc_info+0x24/0x38
[ 192.768272] __kasan_kmalloc+0xd4/0xd8
[ 192.769404] kmalloc_trace+0x68/0x130
[ 192.770550] kasan_memcmp+0xac/0x208
[ 192.771639] kunit_try_run_case+0xf8/0x260
[ 192.772842] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 192.774371] kthread+0x18c/0x1a8
[ 192.775354] ret_from_fork+0x10/0x20
[ 192.776463]
[ 192.777080] The buggy address belongs to the object at ffff0000c5f2cb40
[ 192.777080] which belongs to the cache kmalloc-32 of size 32
[ 192.779378] The buggy address is located 0 bytes to the right of
[ 192.779378] allocated 24-byte region [ffff0000c5f2cb40, ffff0000c5f2cb58)
[ 192.781758]
[ 192.782422] The buggy address belongs to the physical page:
[ 192.783683] page:00000000e427c865 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f2c
[ 192.785638] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 192.787163] page_type: 0xffffffff()
[ 192.788131] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[ 192.789937] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 192.791506] page dumped because: kasan: bad access detected
[ 192.792796]
[ 192.793393] Memory state around the buggy address:
[ 192.794619] ffff0000c5f2ca00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 192.796247] ffff0000c5f2ca80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 192.797845] >ffff0000c5f2cb00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[ 192.799336] ^
[ 192.800816] ffff0000c5f2cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 192.802433] ffff0000c5f2cc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 192.803963] ==================================================================
Home
[ 193.101622] ==================================================================
[ 193.103288] BUG: KASAN: slab-use-after-free in kasan_strings+0x150/0x478
[ 193.105606] Read of size 1 at addr ffff0000c5f2cb90 by task kunit_try_catch/205
[ 193.107151]
[ 193.107743] CPU: 1 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 193.109509] Hardware name: linux,dummy-virt (DT)
[ 193.110631] Call trace:
[ 193.111355] dump_backtrace+0x9c/0x128
[ 193.112449] show_stack+0x20/0x38
[ 193.113462] dump_stack_lvl+0x60/0xb0
[ 193.114602] print_report+0xf8/0x5d8
[ 193.115834] kasan_report+0xc8/0x118
[ 193.116974] __asan_load1+0x60/0x70
[ 193.118131] kasan_strings+0x150/0x478
[ 193.119248] kunit_try_run_case+0xf8/0x260
[ 193.120475] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 193.121925] kthread+0x18c/0x1a8
[ 193.122943] ret_from_fork+0x10/0x20
[ 193.124020]
[ 193.124601] Allocated by task 205:
[ 193.125496] kasan_save_stack+0x3c/0x68
[ 193.126652] kasan_set_track+0x2c/0x40
[ 193.127898] kasan_save_alloc_info+0x24/0x38
[ 193.129189] __kasan_kmalloc+0xd4/0xd8
[ 193.130354] kmalloc_trace+0x68/0x130
[ 193.131431] kasan_strings+0xa0/0x478
[ 193.132473] kunit_try_run_case+0xf8/0x260
[ 193.133722] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 193.135293] kthread+0x18c/0x1a8
[ 193.136276] ret_from_fork+0x10/0x20
[ 193.137421]
[ 193.138004] Freed by task 205:
[ 193.138904] kasan_save_stack+0x3c/0x68
[ 193.140080] kasan_set_track+0x2c/0x40
[ 193.141196] kasan_save_free_info+0x38/0x60
[ 193.142558] __kasan_slab_free+0x100/0x170
[ 193.143752] __kmem_cache_free+0x170/0x2e0
[ 193.145036] kfree+0x74/0x138
[ 193.145994] kasan_strings+0xbc/0x478
[ 193.147068] kunit_try_run_case+0xf8/0x260
[ 193.148348] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 193.149885] kthread+0x18c/0x1a8
[ 193.150861] ret_from_fork+0x10/0x20
[ 193.151916]
[ 193.152476] The buggy address belongs to the object at ffff0000c5f2cb80
[ 193.152476] which belongs to the cache kmalloc-32 of size 32
[ 193.154840] The buggy address is located 16 bytes inside of
[ 193.154840] freed 32-byte region [ffff0000c5f2cb80, ffff0000c5f2cba0)
[ 193.158195]
[ 193.159136] The buggy address belongs to the physical page:
[ 193.160324] page:00000000e427c865 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f2c
[ 193.162253] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 193.163872] page_type: 0xffffffff()
[ 193.165041] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[ 193.166705] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 193.168279] page dumped because: kasan: bad access detected
[ 193.169513]
[ 193.170113] Memory state around the buggy address:
[ 193.171327] ffff0000c5f2ca80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 193.172744] ffff0000c5f2cb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 193.174313] >ffff0000c5f2cb80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.175793] ^
[ 193.176748] ffff0000c5f2cc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.178493] ffff0000c5f2cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.180069] ==================================================================
Home
[ 194.825807] ==================================================================
[ 194.828154] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0xc8/0x1d8
[ 194.829809] Read of size 1 at addr ffff0000c5e64a60 by task kunit_try_catch/211
[ 194.831512]
[ 194.832708] CPU: 1 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 194.834459] Hardware name: linux,dummy-virt (DT)
[ 194.835444] Call trace:
[ 194.836282] dump_backtrace+0x9c/0x128
[ 194.837572] show_stack+0x20/0x38
[ 194.838671] dump_stack_lvl+0x60/0xb0
[ 194.839880] print_report+0xf8/0x5d8
[ 194.841330] kasan_report+0xc8/0x118
[ 194.842553] __kasan_check_byte+0x54/0x70
[ 194.843849] kfree_sensitive+0x30/0xb0
[ 194.844968] kmalloc_double_kzfree+0xc8/0x1d8
[ 194.846470] kunit_try_run_case+0xf8/0x260
[ 194.847842] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 194.849386] kthread+0x18c/0x1a8
[ 194.850074] ret_from_fork+0x10/0x20
[ 194.851349]
[ 194.852502] Allocated by task 211:
[ 194.853468] kasan_save_stack+0x3c/0x68
[ 194.854648] kasan_set_track+0x2c/0x40
[ 194.855887] kasan_save_alloc_info+0x24/0x38
[ 194.857278] __kasan_kmalloc+0xd4/0xd8
[ 194.858642] kmalloc_trace+0x68/0x130
[ 194.859686] kmalloc_double_kzfree+0x9c/0x1d8
[ 194.860950] kunit_try_run_case+0xf8/0x260
[ 194.862477] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 194.864187] kthread+0x18c/0x1a8
[ 194.865516] ret_from_fork+0x10/0x20
[ 194.866698]
[ 194.867343] Freed by task 211:
[ 194.868593] kasan_save_stack+0x3c/0x68
[ 194.869999] kasan_set_track+0x2c/0x40
[ 194.871204] kasan_save_free_info+0x38/0x60
[ 194.872611] __kasan_slab_free+0x100/0x170
[ 194.874075] __kmem_cache_free+0x170/0x2e0
[ 194.875348] kfree+0x74/0x138
[ 194.876416] kfree_sensitive+0x80/0xb0
[ 194.877721] kmalloc_double_kzfree+0xb8/0x1d8
[ 194.878989] kunit_try_run_case+0xf8/0x260
[ 194.880693] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 194.882313] kthread+0x18c/0x1a8
[ 194.883366] ret_from_fork+0x10/0x20
[ 194.884487]
[ 194.885164] The buggy address belongs to the object at ffff0000c5e64a60
[ 194.885164] which belongs to the cache kmalloc-16 of size 16
[ 194.887719] The buggy address is located 0 bytes inside of
[ 194.887719] freed 16-byte region [ffff0000c5e64a60, ffff0000c5e64a70)
[ 194.890844]
[ 194.891625] The buggy address belongs to the physical page:
[ 194.893185] page:000000004e539889 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e64
[ 194.895027] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 194.896544] page_type: 0xffffffff()
[ 194.897994] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 194.899661] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 194.901824] page dumped because: kasan: bad access detected
[ 194.903072]
[ 194.903691] Memory state around the buggy address:
[ 194.905023] ffff0000c5e64900: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[ 194.906702] ffff0000c5e64980: 00 00 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[ 194.908320] >ffff0000c5e64a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 194.909992] ^
[ 194.911450] ffff0000c5e64a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.913288] ffff0000c5e64b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 194.914892] ==================================================================
Home
[ 190.135474] ==================================================================
[ 190.137846] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0xc8/0x1d0
[ 190.139324] Read of size 1 at addr ffff0000c5e64a48 by task kunit_try_catch/163
[ 190.141020]
[ 190.141719] CPU: 1 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 190.143719] Hardware name: linux,dummy-virt (DT)
[ 190.144987] Call trace:
[ 190.145899] dump_backtrace+0x9c/0x128
[ 190.147140] show_stack+0x20/0x38
[ 190.148293] dump_stack_lvl+0x60/0xb0
[ 190.149889] print_report+0xf8/0x5d8
[ 190.151050] kasan_report+0xc8/0x118
[ 190.152281] __asan_load1+0x60/0x70
[ 190.153542] kmalloc_uaf+0xc8/0x1d0
[ 190.154707] kunit_try_run_case+0xf8/0x260
[ 190.155994] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 190.157649] kthread+0x18c/0x1a8
[ 190.158738] ret_from_fork+0x10/0x20
[ 190.159812]
[ 190.160605] Allocated by task 163:
[ 190.161616] kasan_save_stack+0x3c/0x68
[ 190.163010] kasan_set_track+0x2c/0x40
[ 190.164228] kasan_save_alloc_info+0x24/0x38
[ 190.165714] __kasan_kmalloc+0xd4/0xd8
[ 190.167026] kmalloc_trace+0x68/0x130
[ 190.168233] kmalloc_uaf+0x9c/0x1d0
[ 190.169373] kunit_try_run_case+0xf8/0x260
[ 190.170754] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 190.172478] kthread+0x18c/0x1a8
[ 190.173540] ret_from_fork+0x10/0x20
[ 190.174473]
[ 190.175102] Freed by task 163:
[ 190.176056] kasan_save_stack+0x3c/0x68
[ 190.177380] kasan_set_track+0x2c/0x40
[ 190.178724] kasan_save_free_info+0x38/0x60
[ 190.180287] __kasan_slab_free+0x100/0x170
[ 190.181839] __kmem_cache_free+0x170/0x2e0
[ 190.183123] kfree+0x74/0x138
[ 190.184051] kmalloc_uaf+0xb8/0x1d0
[ 190.185471] kunit_try_run_case+0xf8/0x260
[ 190.186865] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 190.188356] kthread+0x18c/0x1a8
[ 190.189358] ret_from_fork+0x10/0x20
[ 190.190190]
[ 190.190824] The buggy address belongs to the object at ffff0000c5e64a40
[ 190.190824] which belongs to the cache kmalloc-16 of size 16
[ 190.193798] The buggy address is located 8 bytes inside of
[ 190.193798] freed 16-byte region [ffff0000c5e64a40, ffff0000c5e64a50)
[ 190.196317]
[ 190.196981] The buggy address belongs to the physical page:
[ 190.198251] page:000000004e539889 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e64
[ 190.200222] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 190.201351] page_type: 0xffffffff()
[ 190.202323] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 190.204107] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 190.205904] page dumped because: kasan: bad access detected
[ 190.207164]
[ 190.207795] Memory state around the buggy address:
[ 190.209346] ffff0000c5e64900: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[ 190.210905] ffff0000c5e64980: 00 00 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[ 190.212817] >ffff0000c5e64a00: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[ 190.214398] ^
[ 190.215696] ffff0000c5e64a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 190.217445] ffff0000c5e64b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 190.218984] ==================================================================
Home
[ 190.357649] ==================================================================
[ 190.359519] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x108/0x290
[ 190.361652] Read of size 1 at addr ffff0000c60461a8 by task kunit_try_catch/167
[ 190.363418]
[ 190.364021] CPU: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 190.366128] Hardware name: linux,dummy-virt (DT)
[ 190.367420] Call trace:
[ 190.368210] dump_backtrace+0x9c/0x128
[ 190.369543] show_stack+0x20/0x38
[ 190.370569] dump_stack_lvl+0x60/0xb0
[ 190.371932] print_report+0xf8/0x5d8
[ 190.373203] kasan_report+0xc8/0x118
[ 190.374452] __asan_load1+0x60/0x70
[ 190.375594] kmalloc_uaf2+0x108/0x290
[ 190.377148] kunit_try_run_case+0xf8/0x260
[ 190.378636] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 190.380288] kthread+0x18c/0x1a8
[ 190.381631] ret_from_fork+0x10/0x20
[ 190.382756]
[ 190.383294] Allocated by task 167:
[ 190.384595] kasan_save_stack+0x3c/0x68
[ 190.385878] kasan_set_track+0x2c/0x40
[ 190.386653] kasan_save_alloc_info+0x24/0x38
[ 190.388373] __kasan_kmalloc+0xd4/0xd8
[ 190.389626] kmalloc_trace+0x68/0x130
[ 190.390893] kmalloc_uaf2+0xb4/0x290
[ 190.392403] kunit_try_run_case+0xf8/0x260
[ 190.393676] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 190.395551] kthread+0x18c/0x1a8
[ 190.396697] ret_from_fork+0x10/0x20
[ 190.398022]
[ 190.398653] Freed by task 167:
[ 190.399567] kasan_save_stack+0x3c/0x68
[ 190.400989] kasan_set_track+0x2c/0x40
[ 190.403011] kasan_save_free_info+0x38/0x60
[ 190.404394] __kasan_slab_free+0x100/0x170
[ 190.405916] __kmem_cache_free+0x170/0x2e0
[ 190.407161] kfree+0x74/0x138
[ 190.408174] kmalloc_uaf2+0xc8/0x290
[ 190.409268] kunit_try_run_case+0xf8/0x260
[ 190.410977] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 190.412796] kthread+0x18c/0x1a8
[ 190.413887] ret_from_fork+0x10/0x20
[ 190.415212]
[ 190.415846] The buggy address belongs to the object at ffff0000c6046180
[ 190.415846] which belongs to the cache kmalloc-64 of size 64
[ 190.418955] The buggy address is located 40 bytes inside of
[ 190.418955] freed 64-byte region [ffff0000c6046180, ffff0000c60461c0)
[ 190.421936]
[ 190.422608] The buggy address belongs to the physical page:
[ 190.423861] page:00000000dbdec0ab refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106046
[ 190.425866] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 190.427637] page_type: 0xffffffff()
[ 190.429488] raw: 0bfffc0000000800 ffff0000c0001640 dead000000000122 0000000000000000
[ 190.431020] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[ 190.432923] page dumped because: kasan: bad access detected
[ 190.434078]
[ 190.434931] Memory state around the buggy address:
[ 190.436280] ffff0000c6046080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 190.438353] ffff0000c6046100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 190.439835] >ffff0000c6046180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 190.442468] ^
[ 190.443612] ffff0000c6046200: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[ 190.445345] ffff0000c6046280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 190.447133] ==================================================================
Home
[ 190.357649] ==================================================================
[ 190.359519] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x108/0x290
[ 190.361652] Read of size 1 at addr ffff0000c60461a8 by task kunit_try_catch/167
[ 190.363418]
[ 190.364021] CPU: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 190.366128] Hardware name: linux,dummy-virt (DT)
[ 190.367420] Call trace:
[ 190.368210] dump_backtrace+0x9c/0x128
[ 190.369543] show_stack+0x20/0x38
[ 190.370569] dump_stack_lvl+0x60/0xb0
[ 190.371932] print_report+0xf8/0x5d8
[ 190.373203] kasan_report+0xc8/0x118
[ 190.374452] __asan_load1+0x60/0x70
[ 190.375594] kmalloc_uaf2+0x108/0x290
[ 190.377148] kunit_try_run_case+0xf8/0x260
[ 190.378636] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 190.380288] kthread+0x18c/0x1a8
[ 190.381631] ret_from_fork+0x10/0x20
[ 190.382756]
[ 190.383294] Allocated by task 167:
[ 190.384595] kasan_save_stack+0x3c/0x68
[ 190.385878] kasan_set_track+0x2c/0x40
[ 190.386653] kasan_save_alloc_info+0x24/0x38
[ 190.388373] __kasan_kmalloc+0xd4/0xd8
[ 190.389626] kmalloc_trace+0x68/0x130
[ 190.390893] kmalloc_uaf2+0xb4/0x290
[ 190.392403] kunit_try_run_case+0xf8/0x260
[ 190.393676] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 190.395551] kthread+0x18c/0x1a8
[ 190.396697] ret_from_fork+0x10/0x20
[ 190.398022]
[ 190.398653] Freed by task 167:
[ 190.399567] kasan_save_stack+0x3c/0x68
[ 190.400989] kasan_set_track+0x2c/0x40
[ 190.403011] kasan_save_free_info+0x38/0x60
[ 190.404394] __kasan_slab_free+0x100/0x170
[ 190.405916] __kmem_cache_free+0x170/0x2e0
[ 190.407161] kfree+0x74/0x138
[ 190.408174] kmalloc_uaf2+0xc8/0x290
[ 190.409268] kunit_try_run_case+0xf8/0x260
[ 190.410977] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 190.412796] kthread+0x18c/0x1a8
[ 190.413887] ret_from_fork+0x10/0x20
[ 190.415212]
[ 190.415846] The buggy address belongs to the object at ffff0000c6046180
[ 190.415846] which belongs to the cache kmalloc-64 of size 64
[ 190.418955] The buggy address is located 40 bytes inside of
[ 190.418955] freed 64-byte region [ffff0000c6046180, ffff0000c60461c0)
[ 190.421936]
[ 190.422608] The buggy address belongs to the physical page:
[ 190.423861] page:00000000dbdec0ab refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106046
[ 190.425866] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 190.427637] page_type: 0xffffffff()
[ 190.429488] raw: 0bfffc0000000800 ffff0000c0001640 dead000000000122 0000000000000000
[ 190.431020] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[ 190.432923] page dumped because: kasan: bad access detected
[ 190.434078]
[ 190.434931] Memory state around the buggy address:
[ 190.436280] ffff0000c6046080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 190.438353] ffff0000c6046100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 190.439835] >ffff0000c6046180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 190.442468] ^
[ 190.443612] ffff0000c6046200: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[ 190.445345] ffff0000c6046280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 190.447133] ==================================================================
Home
[ 189.389809] ==================================================================
[ 189.391839] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x100/0x258
[ 189.393817] Read of size 16 at addr ffff0000c5e64a20 by task kunit_try_catch/147
[ 189.395575]
[ 189.396922] CPU: 1 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 189.398927] Hardware name: linux,dummy-virt (DT)
[ 189.400045] Call trace:
[ 189.401173] dump_backtrace+0x9c/0x128
[ 189.402331] show_stack+0x20/0x38
[ 189.403410] dump_stack_lvl+0x60/0xb0
[ 189.404733] print_report+0xf8/0x5d8
[ 189.405851] kasan_report+0xc8/0x118
[ 189.407090] __asan_load16+0xa4/0xa8
[ 189.408354] kmalloc_uaf_16+0x100/0x258
[ 189.409575] kunit_try_run_case+0xf8/0x260
[ 189.410857] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.412392] kthread+0x18c/0x1a8
[ 189.413399] ret_from_fork+0x10/0x20
[ 189.415298]
[ 189.415910] Allocated by task 147:
[ 189.417098] kasan_save_stack+0x3c/0x68
[ 189.418361] kasan_set_track+0x2c/0x40
[ 189.419505] kasan_save_alloc_info+0x24/0x38
[ 189.421019] __kasan_kmalloc+0xd4/0xd8
[ 189.422170] kmalloc_trace+0x68/0x130
[ 189.423399] kmalloc_uaf_16+0xcc/0x258
[ 189.424626] kunit_try_run_case+0xf8/0x260
[ 189.425942] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.427402] kthread+0x18c/0x1a8
[ 189.428551] ret_from_fork+0x10/0x20
[ 189.429805]
[ 189.430389] Freed by task 147:
[ 189.431247] kasan_save_stack+0x3c/0x68
[ 189.433088] kasan_set_track+0x2c/0x40
[ 189.434605] kasan_save_free_info+0x38/0x60
[ 189.435921] __kasan_slab_free+0x100/0x170
[ 189.437283] __kmem_cache_free+0x170/0x2e0
[ 189.438522] kfree+0x74/0x138
[ 189.439472] kmalloc_uaf_16+0xe8/0x258
[ 189.440678] kunit_try_run_case+0xf8/0x260
[ 189.442044] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.443629] kthread+0x18c/0x1a8
[ 189.444636] ret_from_fork+0x10/0x20
[ 189.445871]
[ 189.446494] The buggy address belongs to the object at ffff0000c5e64a20
[ 189.446494] which belongs to the cache kmalloc-16 of size 16
[ 189.449067] The buggy address is located 0 bytes inside of
[ 189.449067] freed 16-byte region [ffff0000c5e64a20, ffff0000c5e64a30)
[ 189.451516]
[ 189.452072] The buggy address belongs to the physical page:
[ 189.453306] page:000000004e539889 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e64
[ 189.455280] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 189.457023] page_type: 0xffffffff()
[ 189.458635] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 189.460140] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 189.462061] page dumped because: kasan: bad access detected
[ 189.463332]
[ 189.463998] Memory state around the buggy address:
[ 189.465469] ffff0000c5e64900: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[ 189.467131] ffff0000c5e64980: 00 00 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[ 189.469011] >ffff0000c5e64a00: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[ 189.470492] ^
[ 189.471662] ffff0000c5e64a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.473398] ffff0000c5e64b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.475057] ==================================================================
Home
[ 189.389809] ==================================================================
[ 189.391839] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x100/0x258
[ 189.393817] Read of size 16 at addr ffff0000c5e64a20 by task kunit_try_catch/147
[ 189.395575]
[ 189.396922] CPU: 1 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 189.398927] Hardware name: linux,dummy-virt (DT)
[ 189.400045] Call trace:
[ 189.401173] dump_backtrace+0x9c/0x128
[ 189.402331] show_stack+0x20/0x38
[ 189.403410] dump_stack_lvl+0x60/0xb0
[ 189.404733] print_report+0xf8/0x5d8
[ 189.405851] kasan_report+0xc8/0x118
[ 189.407090] __asan_load16+0xa4/0xa8
[ 189.408354] kmalloc_uaf_16+0x100/0x258
[ 189.409575] kunit_try_run_case+0xf8/0x260
[ 189.410857] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.412392] kthread+0x18c/0x1a8
[ 189.413399] ret_from_fork+0x10/0x20
[ 189.415298]
[ 189.415910] Allocated by task 147:
[ 189.417098] kasan_save_stack+0x3c/0x68
[ 189.418361] kasan_set_track+0x2c/0x40
[ 189.419505] kasan_save_alloc_info+0x24/0x38
[ 189.421019] __kasan_kmalloc+0xd4/0xd8
[ 189.422170] kmalloc_trace+0x68/0x130
[ 189.423399] kmalloc_uaf_16+0xcc/0x258
[ 189.424626] kunit_try_run_case+0xf8/0x260
[ 189.425942] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.427402] kthread+0x18c/0x1a8
[ 189.428551] ret_from_fork+0x10/0x20
[ 189.429805]
[ 189.430389] Freed by task 147:
[ 189.431247] kasan_save_stack+0x3c/0x68
[ 189.433088] kasan_set_track+0x2c/0x40
[ 189.434605] kasan_save_free_info+0x38/0x60
[ 189.435921] __kasan_slab_free+0x100/0x170
[ 189.437283] __kmem_cache_free+0x170/0x2e0
[ 189.438522] kfree+0x74/0x138
[ 189.439472] kmalloc_uaf_16+0xe8/0x258
[ 189.440678] kunit_try_run_case+0xf8/0x260
[ 189.442044] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.443629] kthread+0x18c/0x1a8
[ 189.444636] ret_from_fork+0x10/0x20
[ 189.445871]
[ 189.446494] The buggy address belongs to the object at ffff0000c5e64a20
[ 189.446494] which belongs to the cache kmalloc-16 of size 16
[ 189.449067] The buggy address is located 0 bytes inside of
[ 189.449067] freed 16-byte region [ffff0000c5e64a20, ffff0000c5e64a30)
[ 189.451516]
[ 189.452072] The buggy address belongs to the physical page:
[ 189.453306] page:000000004e539889 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e64
[ 189.455280] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 189.457023] page_type: 0xffffffff()
[ 189.458635] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000
[ 189.460140] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 189.462061] page dumped because: kasan: bad access detected
[ 189.463332]
[ 189.463998] Memory state around the buggy address:
[ 189.465469] ffff0000c5e64900: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[ 189.467131] ffff0000c5e64980: 00 00 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[ 189.469011] >ffff0000c5e64a00: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[ 189.470492] ^
[ 189.471662] ffff0000c5e64a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.473398] ffff0000c5e64b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.475057] ==================================================================
Home
[ 190.246334] ==================================================================
[ 190.248497] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0xd0/0x1d8
[ 190.250271] Write of size 33 at addr ffff0000c6046000 by task kunit_try_catch/165
[ 190.252181]
[ 190.253314] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 190.255081] Hardware name: linux,dummy-virt (DT)
[ 190.256315] Call trace:
[ 190.256940] dump_backtrace+0x9c/0x128
[ 190.257561] show_stack+0x20/0x38
[ 190.258569] dump_stack_lvl+0x60/0xb0
[ 190.260424] print_report+0xf8/0x5d8
[ 190.261570] kasan_report+0xc8/0x118
[ 190.262681] kasan_check_range+0xe8/0x190
[ 190.264690] __asan_memset+0x34/0x78
[ 190.265573] kmalloc_uaf_memset+0xd0/0x1d8
[ 190.266602] kunit_try_run_case+0xf8/0x260
[ 190.267901] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 190.269375] kthread+0x18c/0x1a8
[ 190.270513] ret_from_fork+0x10/0x20
[ 190.271816]
[ 190.272389] Allocated by task 165:
[ 190.273591] kasan_save_stack+0x3c/0x68
[ 190.274906] kasan_set_track+0x2c/0x40
[ 190.276073] kasan_save_alloc_info+0x24/0x38
[ 190.277831] __kasan_kmalloc+0xd4/0xd8
[ 190.279027] kmalloc_trace+0x68/0x130
[ 190.280173] kmalloc_uaf_memset+0x9c/0x1d8
[ 190.281554] kunit_try_run_case+0xf8/0x260
[ 190.282986] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 190.284875] kthread+0x18c/0x1a8
[ 190.285936] ret_from_fork+0x10/0x20
[ 190.287158]
[ 190.287789] Freed by task 165:
[ 190.288630] kasan_save_stack+0x3c/0x68
[ 190.290256] kasan_set_track+0x2c/0x40
[ 190.290915] kasan_save_free_info+0x38/0x60
[ 190.291613] __kasan_slab_free+0x100/0x170
[ 190.293169] __kmem_cache_free+0x170/0x2e0
[ 190.294655] kfree+0x74/0x138
[ 190.295681] kmalloc_uaf_memset+0xb8/0x1d8
[ 190.296965] kunit_try_run_case+0xf8/0x260
[ 190.298285] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 190.299133] kthread+0x18c/0x1a8
[ 190.299634] ret_from_fork+0x10/0x20
[ 190.301486]
[ 190.302194] The buggy address belongs to the object at ffff0000c6046000
[ 190.302194] which belongs to the cache kmalloc-64 of size 64
[ 190.304467] The buggy address is located 0 bytes inside of
[ 190.304467] freed 64-byte region [ffff0000c6046000, ffff0000c6046040)
[ 190.307140]
[ 190.307817] The buggy address belongs to the physical page:
[ 190.309264] page:00000000dbdec0ab refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106046
[ 190.311374] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 190.313267] page_type: 0xffffffff()
[ 190.314481] raw: 0bfffc0000000800 ffff0000c0001640 dead000000000122 0000000000000000
[ 190.316123] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[ 190.317954] page dumped because: kasan: bad access detected
[ 190.319539]
[ 190.320688] Memory state around the buggy address:
[ 190.322001] ffff0000c6045f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 190.323632] ffff0000c6045f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 190.325379] >ffff0000c6046000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 190.327048] ^
[ 190.328103] ffff0000c6046080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 190.329956] ffff0000c6046100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 190.331468] ==================================================================
Home
[ 192.508884] ==================================================================
[ 192.511401] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0xd0/0x1b8
[ 192.513996] Read of size 1 at addr ffff0000c60bf3c0 by task kunit_try_catch/199
[ 192.516296]
[ 192.517572] CPU: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 192.519567] Hardware name: linux,dummy-virt (DT)
[ 192.520810] Call trace:
[ 192.521747] dump_backtrace+0x9c/0x128
[ 192.523030] show_stack+0x20/0x38
[ 192.524096] dump_stack_lvl+0x60/0xb0
[ 192.525544] print_report+0xf8/0x5d8
[ 192.526988] kasan_report+0xc8/0x118
[ 192.528449] __kasan_check_byte+0x54/0x70
[ 192.529841] kmem_cache_destroy+0x30/0x178
[ 192.530707] kmem_cache_double_destroy+0xd0/0x1b8
[ 192.532126] kunit_try_run_case+0xf8/0x260
[ 192.533456] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 192.535044] kthread+0x18c/0x1a8
[ 192.536079] ret_from_fork+0x10/0x20
[ 192.537234]
[ 192.537811] Allocated by task 199:
[ 192.539245] kasan_save_stack+0x3c/0x68
[ 192.540611] kasan_set_track+0x2c/0x40
[ 192.541955] kasan_save_alloc_info+0x24/0x38
[ 192.543336] __kasan_slab_alloc+0xa8/0xb0
[ 192.544887] kmem_cache_alloc+0x134/0x330
[ 192.547577] kmem_cache_create_usercopy+0x170/0x260
[ 192.549011] kmem_cache_create+0x24/0x38
[ 192.550283] kmem_cache_double_destroy+0xa4/0x1b8
[ 192.551561] kunit_try_run_case+0xf8/0x260
[ 192.552944] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 192.554643] kthread+0x18c/0x1a8
[ 192.555686] ret_from_fork+0x10/0x20
[ 192.556971]
[ 192.557598] Freed by task 199:
[ 192.558415] kasan_save_stack+0x3c/0x68
[ 192.560274] kasan_set_track+0x2c/0x40
[ 192.561523] kasan_save_free_info+0x38/0x60
[ 192.563336] __kasan_slab_free+0x100/0x170
[ 192.564578] kmem_cache_free+0x18c/0x3f8
[ 192.566006] slab_kmem_cache_release+0x38/0x50
[ 192.567331] kmem_cache_release+0x1c/0x30
[ 192.568521] kobject_put+0x104/0x2d0
[ 192.569706] sysfs_slab_release+0x30/0x48
[ 192.571130] kmem_cache_destroy+0xd8/0x178
[ 192.572456] kmem_cache_double_destroy+0xc0/0x1b8
[ 192.574045] kunit_try_run_case+0xf8/0x260
[ 192.575289] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 192.577040] kthread+0x18c/0x1a8
[ 192.578674] ret_from_fork+0x10/0x20
[ 192.579940]
[ 192.580565] The buggy address belongs to the object at ffff0000c60bf3c0
[ 192.580565] which belongs to the cache kmem_cache of size 208
[ 192.583111] The buggy address is located 0 bytes inside of
[ 192.583111] freed 208-byte region [ffff0000c60bf3c0, ffff0000c60bf490)
[ 192.585415]
[ 192.586006] The buggy address belongs to the physical page:
[ 192.587248] page:00000000e4daeeb8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060bf
[ 192.589446] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 192.591072] page_type: 0xffffffff()
[ 192.592492] raw: 0bfffc0000000800 ffff0000c0001000 dead000000000122 0000000000000000
[ 192.594798] raw: 0000000000000000 00000000800c000c 00000001ffffffff 0000000000000000
[ 192.597231] page dumped because: kasan: bad access detected
[ 192.598529]
[ 192.599204] Memory state around the buggy address:
[ 192.600414] ffff0000c60bf280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 192.602868] ffff0000c60bf300: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[ 192.604826] >ffff0000c60bf380: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[ 192.606419] ^
[ 192.607829] ffff0000c60bf400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 192.609928] ffff0000c60bf480: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 192.611498] ==================================================================
Home
[ 189.174448] ==================================================================
[ 189.176144] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x10c/0x2c0
[ 189.178425] Read of size 1 at addr ffff0000c3fdfa00 by task kunit_try_catch/143
[ 189.180228]
[ 189.180862] CPU: 1 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 189.183376] Hardware name: linux,dummy-virt (DT)
[ 189.184640] Call trace:
[ 189.185604] dump_backtrace+0x9c/0x128
[ 189.186719] show_stack+0x20/0x38
[ 189.187751] dump_stack_lvl+0x60/0xb0
[ 189.189111] print_report+0xf8/0x5d8
[ 189.190251] kasan_report+0xc8/0x118
[ 189.191484] __asan_load1+0x60/0x70
[ 189.192911] krealloc_uaf+0x10c/0x2c0
[ 189.194067] kunit_try_run_case+0xf8/0x260
[ 189.195280] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.196963] kthread+0x18c/0x1a8
[ 189.197984] ret_from_fork+0x10/0x20
[ 189.199269]
[ 189.199885] Allocated by task 143:
[ 189.201175] kasan_save_stack+0x3c/0x68
[ 189.202521] kasan_set_track+0x2c/0x40
[ 189.203896] kasan_save_alloc_info+0x24/0x38
[ 189.205899] __kasan_kmalloc+0xd4/0xd8
[ 189.207279] kmalloc_trace+0x68/0x130
[ 189.209013] krealloc_uaf+0xb0/0x2c0
[ 189.210037] kunit_try_run_case+0xf8/0x260
[ 189.211271] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.212752] kthread+0x18c/0x1a8
[ 189.213934] ret_from_fork+0x10/0x20
[ 189.215209]
[ 189.215841] Freed by task 143:
[ 189.216840] kasan_save_stack+0x3c/0x68
[ 189.218182] kasan_set_track+0x2c/0x40
[ 189.219458] kasan_save_free_info+0x38/0x60
[ 189.220876] __kasan_slab_free+0x100/0x170
[ 189.222339] __kmem_cache_free+0x170/0x2e0
[ 189.223727] kfree+0x74/0x138
[ 189.224828] krealloc_uaf+0xcc/0x2c0
[ 189.225908] kunit_try_run_case+0xf8/0x260
[ 189.227357] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.229246] kthread+0x18c/0x1a8
[ 189.230236] ret_from_fork+0x10/0x20
[ 189.231474]
[ 189.232145] The buggy address belongs to the object at ffff0000c3fdfa00
[ 189.232145] which belongs to the cache kmalloc-256 of size 256
[ 189.235559] The buggy address is located 0 bytes inside of
[ 189.235559] freed 256-byte region [ffff0000c3fdfa00, ffff0000c3fdfb00)
[ 189.238896]
[ 189.239582] The buggy address belongs to the physical page:
[ 189.241253] page:00000000b639ff95 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fde
[ 189.243205] head:00000000b639ff95 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 189.244909] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[ 189.246918] page_type: 0xffffffff()
[ 189.248699] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000
[ 189.250596] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 189.252251] page dumped because: kasan: bad access detected
[ 189.253929]
[ 189.254546] Memory state around the buggy address:
[ 189.255742] ffff0000c3fdf900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.257279] ffff0000c3fdf980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.259170] >ffff0000c3fdfa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 189.261083] ^
[ 189.261918] ffff0000c3fdfa80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 189.263605] ffff0000c3fdfb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.265078] ==================================================================
Home
[ 189.075495] ==================================================================
[ 189.078222] BUG: KASAN: slab-use-after-free in krealloc_uaf+0xe4/0x2c0
[ 189.079740] Read of size 1 at addr ffff0000c3fdfa00 by task kunit_try_catch/143
[ 189.081398]
[ 189.082373] CPU: 1 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 189.084909] Hardware name: linux,dummy-virt (DT)
[ 189.086294] Call trace:
[ 189.087034] dump_backtrace+0x9c/0x128
[ 189.088337] show_stack+0x20/0x38
[ 189.089357] dump_stack_lvl+0x60/0xb0
[ 189.091369] print_report+0xf8/0x5d8
[ 189.092816] kasan_report+0xc8/0x118
[ 189.094141] __kasan_check_byte+0x54/0x70
[ 189.095374] krealloc+0x48/0x1a0
[ 189.096425] krealloc_uaf+0xe4/0x2c0
[ 189.097635] kunit_try_run_case+0xf8/0x260
[ 189.099451] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.101118] kthread+0x18c/0x1a8
[ 189.102199] ret_from_fork+0x10/0x20
[ 189.103271]
[ 189.103865] Allocated by task 143:
[ 189.104913] kasan_save_stack+0x3c/0x68
[ 189.106275] kasan_set_track+0x2c/0x40
[ 189.107693] kasan_save_alloc_info+0x24/0x38
[ 189.109252] __kasan_kmalloc+0xd4/0xd8
[ 189.110615] kmalloc_trace+0x68/0x130
[ 189.111760] krealloc_uaf+0xb0/0x2c0
[ 189.113106] kunit_try_run_case+0xf8/0x260
[ 189.114407] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.115869] kthread+0x18c/0x1a8
[ 189.116846] ret_from_fork+0x10/0x20
[ 189.118182]
[ 189.118841] Freed by task 143:
[ 189.119697] kasan_save_stack+0x3c/0x68
[ 189.121006] kasan_set_track+0x2c/0x40
[ 189.122496] kasan_save_free_info+0x38/0x60
[ 189.124423] __kasan_slab_free+0x100/0x170
[ 189.126001] __kmem_cache_free+0x170/0x2e0
[ 189.127327] kfree+0x74/0x138
[ 189.128381] krealloc_uaf+0xcc/0x2c0
[ 189.129528] kunit_try_run_case+0xf8/0x260
[ 189.131303] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.133314] kthread+0x18c/0x1a8
[ 189.134335] ret_from_fork+0x10/0x20
[ 189.135436]
[ 189.136024] The buggy address belongs to the object at ffff0000c3fdfa00
[ 189.136024] which belongs to the cache kmalloc-256 of size 256
[ 189.138789] The buggy address is located 0 bytes inside of
[ 189.138789] freed 256-byte region [ffff0000c3fdfa00, ffff0000c3fdfb00)
[ 189.142287]
[ 189.142888] The buggy address belongs to the physical page:
[ 189.144141] page:00000000b639ff95 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fde
[ 189.146076] head:00000000b639ff95 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 189.147618] flags: 0xbfffc0000000840(slab|head|node=0|zone=2|lastcpupid=0xffff)
[ 189.149439] page_type: 0xffffffff()
[ 189.150631] raw: 0bfffc0000000840 ffff0000c0001b40 dead000000000122 0000000000000000
[ 189.153313] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 189.155346] page dumped because: kasan: bad access detected
[ 189.156764]
[ 189.157480] Memory state around the buggy address:
[ 189.158700] ffff0000c3fdf900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.160458] ffff0000c3fdf980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.162081] >ffff0000c3fdfa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 189.163888] ^
[ 189.164945] ffff0000c3fdfa80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 189.166692] ffff0000c3fdfb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 189.168306] ==================================================================
Home
[ 191.915341] ==================================================================
[ 191.917295] BUG: KASAN: slab-use-after-free in ksize_uaf+0xc8/0x2f0
[ 191.920008] Read of size 1 at addr ffff0000c6049000 by task kunit_try_catch/193
[ 191.922195]
[ 191.923613] CPU: 1 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 191.925868] Hardware name: linux,dummy-virt (DT)
[ 191.927031] Call trace:
[ 191.927903] dump_backtrace+0x9c/0x128
[ 191.928989] show_stack+0x20/0x38
[ 191.930136] dump_stack_lvl+0x60/0xb0
[ 191.931312] print_report+0xf8/0x5d8
[ 191.932653] kasan_report+0xc8/0x118
[ 191.934082] __kasan_check_byte+0x54/0x70
[ 191.935650] ksize+0x30/0x88
[ 191.936637] ksize_uaf+0xc8/0x2f0
[ 191.937890] kunit_try_run_case+0xf8/0x260
[ 191.939112] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 191.940931] kthread+0x18c/0x1a8
[ 191.942151] ret_from_fork+0x10/0x20
[ 191.943795]
[ 191.944495] Allocated by task 193:
[ 191.945482] kasan_save_stack+0x3c/0x68
[ 191.946787] kasan_set_track+0x2c/0x40
[ 191.948856] kasan_save_alloc_info+0x24/0x38
[ 191.950355] __kasan_kmalloc+0xd4/0xd8
[ 191.951572] kmalloc_trace+0x68/0x130
[ 191.952873] ksize_uaf+0x9c/0x2f0
[ 191.953998] kunit_try_run_case+0xf8/0x260
[ 191.955238] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 191.957210] kthread+0x18c/0x1a8
[ 191.958530] ret_from_fork+0x10/0x20
[ 191.959686]
[ 191.960319] Freed by task 193:
[ 191.961188] kasan_save_stack+0x3c/0x68
[ 191.962527] kasan_set_track+0x2c/0x40
[ 191.963654] kasan_save_free_info+0x38/0x60
[ 191.965055] __kasan_slab_free+0x100/0x170
[ 191.966933] __kmem_cache_free+0x170/0x2e0
[ 191.968275] kfree+0x74/0x138
[ 191.969724] ksize_uaf+0xb8/0x2f0
[ 191.970739] kunit_try_run_case+0xf8/0x260
[ 191.972019] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 191.973791] kthread+0x18c/0x1a8
[ 191.974793] ret_from_fork+0x10/0x20
[ 191.976435]
[ 191.977309] The buggy address belongs to the object at ffff0000c6049000
[ 191.977309] which belongs to the cache kmalloc-128 of size 128
[ 191.979699] The buggy address is located 0 bytes inside of
[ 191.979699] freed 128-byte region [ffff0000c6049000, ffff0000c6049080)
[ 191.982017]
[ 191.982592] The buggy address belongs to the physical page:
[ 191.983830] page:00000000d79d6910 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106049
[ 191.986089] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 191.987591] page_type: 0xffffffff()
[ 191.989255] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[ 191.991228] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 191.992916] page dumped because: kasan: bad access detected
[ 191.994188]
[ 191.994798] Memory state around the buggy address:
[ 191.996529] ffff0000c6048f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 191.998288] ffff0000c6048f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 192.000035] >ffff0000c6049000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 192.001898] ^
[ 192.002941] ffff0000c6049080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 192.004887] ffff0000c6049100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 192.006352] ==================================================================
Home
[ 192.009244] ==================================================================
[ 192.010642] BUG: KASAN: slab-use-after-free in ksize_uaf+0xe8/0x2f0
[ 192.012085] Read of size 1 at addr ffff0000c6049000 by task kunit_try_catch/193
[ 192.015198]
[ 192.015793] CPU: 1 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 192.017827] Hardware name: linux,dummy-virt (DT)
[ 192.018973] Call trace:
[ 192.019645] dump_backtrace+0x9c/0x128
[ 192.020837] show_stack+0x20/0x38
[ 192.022216] dump_stack_lvl+0x60/0xb0
[ 192.023554] print_report+0xf8/0x5d8
[ 192.024889] kasan_report+0xc8/0x118
[ 192.026144] __asan_load1+0x60/0x70
[ 192.027388] ksize_uaf+0xe8/0x2f0
[ 192.028613] kunit_try_run_case+0xf8/0x260
[ 192.030112] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 192.031921] kthread+0x18c/0x1a8
[ 192.033141] ret_from_fork+0x10/0x20
[ 192.034382]
[ 192.034993] Allocated by task 193:
[ 192.035968] kasan_save_stack+0x3c/0x68
[ 192.037392] kasan_set_track+0x2c/0x40
[ 192.038638] kasan_save_alloc_info+0x24/0x38
[ 192.040378] __kasan_kmalloc+0xd4/0xd8
[ 192.041886] kmalloc_trace+0x68/0x130
[ 192.043070] ksize_uaf+0x9c/0x2f0
[ 192.044205] kunit_try_run_case+0xf8/0x260
[ 192.046172] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 192.048182] kthread+0x18c/0x1a8
[ 192.049357] ret_from_fork+0x10/0x20
[ 192.050528]
[ 192.051126] Freed by task 193:
[ 192.052701] kasan_save_stack+0x3c/0x68
[ 192.054225] kasan_set_track+0x2c/0x40
[ 192.055433] kasan_save_free_info+0x38/0x60
[ 192.056799] __kasan_slab_free+0x100/0x170
[ 192.058249] __kmem_cache_free+0x170/0x2e0
[ 192.059194] kfree+0x74/0x138
[ 192.060267] ksize_uaf+0xb8/0x2f0
[ 192.061515] kunit_try_run_case+0xf8/0x260
[ 192.063017] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 192.064803] kthread+0x18c/0x1a8
[ 192.065889] ret_from_fork+0x10/0x20
[ 192.067088]
[ 192.067705] The buggy address belongs to the object at ffff0000c6049000
[ 192.067705] which belongs to the cache kmalloc-128 of size 128
[ 192.070068] The buggy address is located 0 bytes inside of
[ 192.070068] freed 128-byte region [ffff0000c6049000, ffff0000c6049080)
[ 192.072831]
[ 192.073370] The buggy address belongs to the physical page:
[ 192.074735] page:00000000d79d6910 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106049
[ 192.077269] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 192.078812] page_type: 0xffffffff()
[ 192.080021] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[ 192.081861] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 192.083453] page dumped because: kasan: bad access detected
[ 192.085809]
[ 192.086395] Memory state around the buggy address:
[ 192.087708] ffff0000c6048f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 192.089578] ffff0000c6048f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 192.091333] >ffff0000c6049000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 192.093150] ^
[ 192.094054] ffff0000c6049080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 192.095858] ffff0000c6049100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 192.097543] ==================================================================
Home
[ 192.100885] ==================================================================
[ 192.102306] BUG: KASAN: slab-use-after-free in ksize_uaf+0x10c/0x2f0
[ 192.103674] Read of size 1 at addr ffff0000c6049078 by task kunit_try_catch/193
[ 192.106855]
[ 192.107440] CPU: 1 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 192.110318] Hardware name: linux,dummy-virt (DT)
[ 192.111516] Call trace:
[ 192.112501] dump_backtrace+0x9c/0x128
[ 192.113878] show_stack+0x20/0x38
[ 192.114957] dump_stack_lvl+0x60/0xb0
[ 192.116208] print_report+0xf8/0x5d8
[ 192.117346] kasan_report+0xc8/0x118
[ 192.118610] __asan_load1+0x60/0x70
[ 192.120555] ksize_uaf+0x10c/0x2f0
[ 192.121599] kunit_try_run_case+0xf8/0x260
[ 192.122877] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 192.124485] kthread+0x18c/0x1a8
[ 192.126232] ret_from_fork+0x10/0x20
[ 192.127440]
[ 192.127750] Allocated by task 193:
[ 192.128752] kasan_save_stack+0x3c/0x68
[ 192.130176] kasan_set_track+0x2c/0x40
[ 192.131484] kasan_save_alloc_info+0x24/0x38
[ 192.132854] __kasan_kmalloc+0xd4/0xd8
[ 192.134093] kmalloc_trace+0x68/0x130
[ 192.135646] ksize_uaf+0x9c/0x2f0
[ 192.136875] kunit_try_run_case+0xf8/0x260
[ 192.138332] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 192.139908] kthread+0x18c/0x1a8
[ 192.140982] ret_from_fork+0x10/0x20
[ 192.142266]
[ 192.142930] Freed by task 193:
[ 192.143812] kasan_save_stack+0x3c/0x68
[ 192.145480] kasan_set_track+0x2c/0x40
[ 192.146759] kasan_save_free_info+0x38/0x60
[ 192.148158] __kasan_slab_free+0x100/0x170
[ 192.150071] __kmem_cache_free+0x170/0x2e0
[ 192.151624] kfree+0x74/0x138
[ 192.153080] ksize_uaf+0xb8/0x2f0
[ 192.154243] kunit_try_run_case+0xf8/0x260
[ 192.155472] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 192.157209] kthread+0x18c/0x1a8
[ 192.158342] ret_from_fork+0x10/0x20
[ 192.159730]
[ 192.160364] The buggy address belongs to the object at ffff0000c6049000
[ 192.160364] which belongs to the cache kmalloc-128 of size 128
[ 192.163108] The buggy address is located 120 bytes inside of
[ 192.163108] freed 128-byte region [ffff0000c6049000, ffff0000c6049080)
[ 192.166650]
[ 192.167287] The buggy address belongs to the physical page:
[ 192.168718] page:00000000d79d6910 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106049
[ 192.170883] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 192.172497] page_type: 0xffffffff()
[ 192.173712] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[ 192.176443] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 192.178097] page dumped because: kasan: bad access detected
[ 192.179102]
[ 192.179716] Memory state around the buggy address:
[ 192.181293] ffff0000c6048f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 192.183034] ffff0000c6048f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 192.184808] >ffff0000c6049000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 192.186911] ^
[ 192.188501] ffff0000c6049080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 192.190598] ffff0000c6049100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 192.192376] ==================================================================
Home
[ 195.064579] ==================================================================
[ 195.065754] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x30/0x50
[ 195.067231] Read of size 4 at addr ffff0000c5fddc80 by task swapper/0/0
[ 195.068706]
[ 195.069384] CPU: 0 PID: 0 Comm: swapper/0 Tainted: G B N 6.6.74-rc1 #1
[ 195.071094] Hardware name: linux,dummy-virt (DT)
[ 195.072279] Call trace:
[ 195.072952] dump_backtrace+0x9c/0x128
[ 195.074139] show_stack+0x20/0x38
[ 195.075179] dump_stack_lvl+0x60/0xb0
[ 195.076372] print_report+0xf8/0x5d8
[ 195.077565] kasan_report+0xc8/0x118
[ 195.078738] __asan_load4+0x9c/0xc0
[ 195.079905] rcu_uaf_reclaim+0x30/0x50
[ 195.080984] rcu_core+0x448/0xf40
[ 195.082116] rcu_core_si+0x18/0x30
[ 195.083268] handle_softirqs+0x240/0x678
[ 195.084507] __do_softirq+0x1c/0x28
[ 195.085511] ____do_softirq+0x18/0x30
[ 195.086673] call_on_irq_stack+0x24/0x58
[ 195.087847] do_softirq_own_stack+0x24/0x38
[ 195.089155] irq_exit_rcu+0x110/0x160
[ 195.090294] el1_interrupt+0x38/0x58
[ 195.091343] el1h_64_irq_handler+0x18/0x28
[ 195.092555] el1h_64_irq+0x64/0x68
[ 195.093546] arch_local_irq_enable+0x4/0x8
[ 195.094823] do_idle+0x304/0x388
[ 195.095879] cpu_startup_entry+0x48/0x58
[ 195.096998] rest_init+0x11c/0x128
[ 195.098186] arch_call_rest_init+0x1c/0x28
[ 195.099405] start_kernel+0x2cc/0x390
[ 195.100560] __primary_switched+0xc0/0xd0
[ 195.101751]
[ 195.102319] Allocated by task 213:
[ 195.103248] kasan_save_stack+0x3c/0x68
[ 195.104499] kasan_set_track+0x2c/0x40
[ 195.105680] kasan_save_alloc_info+0x24/0x38
[ 195.106941] __kasan_kmalloc+0xd4/0xd8
[ 195.108180] kmalloc_trace+0x68/0x130
[ 195.109305] rcu_uaf+0x9c/0x1e0
[ 195.110386] kunit_try_run_case+0xf8/0x260
[ 195.111600] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 195.113035] kthread+0x18c/0x1a8
[ 195.114006] ret_from_fork+0x10/0x20
[ 195.115170]
[ 195.115798] Freed by task 0:
[ 195.116553] kasan_save_stack+0x3c/0x68
[ 195.117817] kasan_set_track+0x2c/0x40
[ 195.119005] kasan_save_free_info+0x38/0x60
[ 195.120403] __kasan_slab_free+0x100/0x170
[ 195.121645] __kmem_cache_free+0x170/0x2e0
[ 195.122930] kfree+0x74/0x138
[ 195.123930] rcu_uaf_reclaim+0x28/0x50
[ 195.125019] rcu_core+0x448/0xf40
[ 195.126246] rcu_core_si+0x18/0x30
[ 195.127400] handle_softirqs+0x240/0x678
[ 195.128568] __do_softirq+0x1c/0x28
[ 195.129645]
[ 195.130308] Last potentially related work creation:
[ 195.131478] kasan_save_stack+0x3c/0x68
[ 195.132614] __kasan_record_aux_stack+0xb8/0xe8
[ 195.134068] kasan_record_aux_stack_noalloc+0x14/0x20
[ 195.135521] __call_rcu_common.constprop.0+0x58/0x598
[ 195.136989] call_rcu+0x18/0x30
[ 195.138075] rcu_uaf+0xd4/0x1e0
[ 195.139101] kunit_try_run_case+0xf8/0x260
[ 195.140329] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 195.141897] kthread+0x18c/0x1a8
[ 195.142939] ret_from_fork+0x10/0x20
[ 195.144078]
[ 195.144713] The buggy address belongs to the object at ffff0000c5fddc80
[ 195.144713] which belongs to the cache kmalloc-32 of size 32
[ 195.147170] The buggy address is located 0 bytes inside of
[ 195.147170] freed 32-byte region [ffff0000c5fddc80, ffff0000c5fddca0)
[ 195.148705]
[ 195.149196] The buggy address belongs to the physical page:
[ 195.150860] page:00000000e655aac2 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fdd
[ 195.152862] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 195.154399] page_type: 0xffffffff()
[ 195.155531] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[ 195.157389] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 195.158960] page dumped because: kasan: bad access detected
[ 195.160258]
[ 195.160859] Memory state around the buggy address:
[ 195.162107] ffff0000c5fddb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 195.163788] ffff0000c5fddc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 195.165347] >ffff0000c5fddc80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[ 195.166984] ^
[ 195.167948] ffff0000c5fddd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 195.169492] ffff0000c5fddd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 195.171130] ==================================================================
Home
[ 192.833558] ==================================================================
[ 192.835639] BUG: KASAN: slab-use-after-free in strchr+0x20/0x80
[ 192.837091] Read of size 1 at addr ffff0000c5f2cb90 by task kunit_try_catch/205
[ 192.838646]
[ 192.839319] CPU: 1 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 192.841441] Hardware name: linux,dummy-virt (DT)
[ 192.842498] Call trace:
[ 192.843690] dump_backtrace+0x9c/0x128
[ 192.844963] show_stack+0x20/0x38
[ 192.845994] dump_stack_lvl+0x60/0xb0
[ 192.847449] print_report+0xf8/0x5d8
[ 192.848939] kasan_report+0xc8/0x118
[ 192.850140] __asan_load1+0x60/0x70
[ 192.851310] strchr+0x20/0x80
[ 192.852327] kasan_strings+0xdc/0x478
[ 192.853546] kunit_try_run_case+0xf8/0x260
[ 192.854762] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 192.857068] kthread+0x18c/0x1a8
[ 192.858500] ret_from_fork+0x10/0x20
[ 192.859619]
[ 192.860265] Allocated by task 205:
[ 192.861454] kasan_save_stack+0x3c/0x68
[ 192.862619] kasan_set_track+0x2c/0x40
[ 192.863817] kasan_save_alloc_info+0x24/0x38
[ 192.865329] __kasan_kmalloc+0xd4/0xd8
[ 192.866523] kmalloc_trace+0x68/0x130
[ 192.867608] kasan_strings+0xa0/0x478
[ 192.868921] kunit_try_run_case+0xf8/0x260
[ 192.870207] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 192.871636] kthread+0x18c/0x1a8
[ 192.872939] ret_from_fork+0x10/0x20
[ 192.874042]
[ 192.874579] Freed by task 205:
[ 192.875443] kasan_save_stack+0x3c/0x68
[ 192.876877] kasan_set_track+0x2c/0x40
[ 192.878142] kasan_save_free_info+0x38/0x60
[ 192.879581] __kasan_slab_free+0x100/0x170
[ 192.881024] __kmem_cache_free+0x170/0x2e0
[ 192.882293] kfree+0x74/0x138
[ 192.883293] kasan_strings+0xbc/0x478
[ 192.884369] kunit_try_run_case+0xf8/0x260
[ 192.885343] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 192.886908] kthread+0x18c/0x1a8
[ 192.887950] ret_from_fork+0x10/0x20
[ 192.889043]
[ 192.889595] The buggy address belongs to the object at ffff0000c5f2cb80
[ 192.889595] which belongs to the cache kmalloc-32 of size 32
[ 192.891970] The buggy address is located 16 bytes inside of
[ 192.891970] freed 32-byte region [ffff0000c5f2cb80, ffff0000c5f2cba0)
[ 192.894500]
[ 192.895135] The buggy address belongs to the physical page:
[ 192.896389] page:00000000e427c865 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f2c
[ 192.899079] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 192.900736] page_type: 0xffffffff()
[ 192.902124] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[ 192.903695] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 192.905459] page dumped because: kasan: bad access detected
[ 192.906662]
[ 192.907323] Memory state around the buggy address:
[ 192.908717] ffff0000c5f2ca80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 192.910374] ffff0000c5f2cb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 192.911974] >ffff0000c5f2cb80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[ 192.913734] ^
[ 192.914840] ffff0000c5f2cc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 192.916470] ffff0000c5f2cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 192.919146] ==================================================================
Home
[ 193.011940] ==================================================================
[ 193.013532] BUG: KASAN: slab-use-after-free in strcmp+0x2c/0x78
[ 193.015015] Read of size 1 at addr ffff0000c5f2cb90 by task kunit_try_catch/205
[ 193.016476]
[ 193.017629] CPU: 1 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 193.019409] Hardware name: linux,dummy-virt (DT)
[ 193.020735] Call trace:
[ 193.021457] dump_backtrace+0x9c/0x128
[ 193.022590] show_stack+0x20/0x38
[ 193.023614] dump_stack_lvl+0x60/0xb0
[ 193.024851] print_report+0xf8/0x5d8
[ 193.026118] kasan_report+0xc8/0x118
[ 193.027426] __asan_load1+0x60/0x70
[ 193.028829] strcmp+0x2c/0x78
[ 193.029795] kasan_strings+0x12c/0x478
[ 193.030982] kunit_try_run_case+0xf8/0x260
[ 193.032231] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 193.034737] kthread+0x18c/0x1a8
[ 193.035574] ret_from_fork+0x10/0x20
[ 193.037000]
[ 193.037590] Allocated by task 205:
[ 193.038494] kasan_save_stack+0x3c/0x68
[ 193.039755] kasan_set_track+0x2c/0x40
[ 193.041232] kasan_save_alloc_info+0x24/0x38
[ 193.042551] __kasan_kmalloc+0xd4/0xd8
[ 193.043657] kmalloc_trace+0x68/0x130
[ 193.044849] kasan_strings+0xa0/0x478
[ 193.046067] kunit_try_run_case+0xf8/0x260
[ 193.047326] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 193.048952] kthread+0x18c/0x1a8
[ 193.049974] ret_from_fork+0x10/0x20
[ 193.051112]
[ 193.051696] Freed by task 205:
[ 193.052594] kasan_save_stack+0x3c/0x68
[ 193.053937] kasan_set_track+0x2c/0x40
[ 193.055750] kasan_save_free_info+0x38/0x60
[ 193.057788] __kasan_slab_free+0x100/0x170
[ 193.059277] __kmem_cache_free+0x170/0x2e0
[ 193.060752] kfree+0x74/0x138
[ 193.061715] kasan_strings+0xbc/0x478
[ 193.062841] kunit_try_run_case+0xf8/0x260
[ 193.064509] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 193.066023] kthread+0x18c/0x1a8
[ 193.066991] ret_from_fork+0x10/0x20
[ 193.068123]
[ 193.068710] The buggy address belongs to the object at ffff0000c5f2cb80
[ 193.068710] which belongs to the cache kmalloc-32 of size 32
[ 193.070955] The buggy address is located 16 bytes inside of
[ 193.070955] freed 32-byte region [ffff0000c5f2cb80, ffff0000c5f2cba0)
[ 193.073271]
[ 193.074083] The buggy address belongs to the physical page:
[ 193.075395] page:00000000e427c865 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f2c
[ 193.078357] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 193.080069] page_type: 0xffffffff()
[ 193.081021] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[ 193.082443] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 193.084208] page dumped because: kasan: bad access detected
[ 193.085310]
[ 193.085939] Memory state around the buggy address:
[ 193.087189] ffff0000c5f2ca80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 193.089337] ffff0000c5f2cb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 193.090893] >ffff0000c5f2cb80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.092252] ^
[ 193.093209] ffff0000c5f2cc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.095587] ffff0000c5f2cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.097360] ==================================================================
Home
[ 193.183473] ==================================================================
[ 193.184850] BUG: KASAN: slab-use-after-free in strlen+0x18/0x68
[ 193.186213] Read of size 1 at addr ffff0000c5f2cb90 by task kunit_try_catch/205
[ 193.188148]
[ 193.188815] CPU: 1 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 193.190516] Hardware name: linux,dummy-virt (DT)
[ 193.191665] Call trace:
[ 193.192372] dump_backtrace+0x9c/0x128
[ 193.193516] show_stack+0x20/0x38
[ 193.194490] dump_stack_lvl+0x60/0xb0
[ 193.195729] print_report+0xf8/0x5d8
[ 193.196905] kasan_report+0xc8/0x118
[ 193.198028] __asan_load1+0x60/0x70
[ 193.199211] strlen+0x18/0x68
[ 193.200215] kasan_strings+0x17c/0x478
[ 193.201290] kunit_try_run_case+0xf8/0x260
[ 193.202505] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 193.204015] kthread+0x18c/0x1a8
[ 193.205027] ret_from_fork+0x10/0x20
[ 193.206141]
[ 193.206734] Allocated by task 205:
[ 193.207640] kasan_save_stack+0x3c/0x68
[ 193.208893] kasan_set_track+0x2c/0x40
[ 193.210016] kasan_save_alloc_info+0x24/0x38
[ 193.211386] __kasan_kmalloc+0xd4/0xd8
[ 193.212479] kmalloc_trace+0x68/0x130
[ 193.213634] kasan_strings+0xa0/0x478
[ 193.214720] kunit_try_run_case+0xf8/0x260
[ 193.215957] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 193.218104] kthread+0x18c/0x1a8
[ 193.219066] ret_from_fork+0x10/0x20
[ 193.220275]
[ 193.220914] Freed by task 205:
[ 193.221701] kasan_save_stack+0x3c/0x68
[ 193.222996] kasan_set_track+0x2c/0x40
[ 193.224115] kasan_save_free_info+0x38/0x60
[ 193.225445] __kasan_slab_free+0x100/0x170
[ 193.226726] __kmem_cache_free+0x170/0x2e0
[ 193.227964] kfree+0x74/0x138
[ 193.228949] kasan_strings+0xbc/0x478
[ 193.230052] kunit_try_run_case+0xf8/0x260
[ 193.231241] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 193.232814] kthread+0x18c/0x1a8
[ 193.233814] ret_from_fork+0x10/0x20
[ 193.234876]
[ 193.235440] The buggy address belongs to the object at ffff0000c5f2cb80
[ 193.235440] which belongs to the cache kmalloc-32 of size 32
[ 193.237811] The buggy address is located 16 bytes inside of
[ 193.237811] freed 32-byte region [ffff0000c5f2cb80, ffff0000c5f2cba0)
[ 193.240098]
[ 193.240719] The buggy address belongs to the physical page:
[ 193.242025] page:00000000e427c865 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f2c
[ 193.243923] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 193.245447] page_type: 0xffffffff()
[ 193.246609] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[ 193.248347] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 193.249925] page dumped because: kasan: bad access detected
[ 193.251192]
[ 193.251745] Memory state around the buggy address:
[ 193.253029] ffff0000c5f2ca80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 193.254640] ffff0000c5f2cb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 193.256212] >ffff0000c5f2cb80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.257710] ^
[ 193.258730] ffff0000c5f2cc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.260921] ffff0000c5f2cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.263098] ==================================================================
Home
[ 193.265869] ==================================================================
[ 193.267455] BUG: KASAN: slab-use-after-free in strnlen+0x3c/0x68
[ 193.269078] Read of size 1 at addr ffff0000c5f2cb90 by task kunit_try_catch/205
[ 193.270889]
[ 193.271464] CPU: 1 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 193.273315] Hardware name: linux,dummy-virt (DT)
[ 193.274457] Call trace:
[ 193.275271] dump_backtrace+0x9c/0x128
[ 193.276393] show_stack+0x20/0x38
[ 193.277439] dump_stack_lvl+0x60/0xb0
[ 193.278619] print_report+0xf8/0x5d8
[ 193.279782] kasan_report+0xc8/0x118
[ 193.281005] __asan_load1+0x60/0x70
[ 193.282169] strnlen+0x3c/0x68
[ 193.283162] kasan_strings+0x1a4/0x478
[ 193.284349] kunit_try_run_case+0xf8/0x260
[ 193.285577] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 193.287048] kthread+0x18c/0x1a8
[ 193.288071] ret_from_fork+0x10/0x20
[ 193.289212]
[ 193.289748] Allocated by task 205:
[ 193.290755] kasan_save_stack+0x3c/0x68
[ 193.291957] kasan_set_track+0x2c/0x40
[ 193.293122] kasan_save_alloc_info+0x24/0x38
[ 193.294401] __kasan_kmalloc+0xd4/0xd8
[ 193.295581] kmalloc_trace+0x68/0x130
[ 193.296676] kasan_strings+0xa0/0x478
[ 193.297831] kunit_try_run_case+0xf8/0x260
[ 193.299079] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 193.300501] kthread+0x18c/0x1a8
[ 193.301542] ret_from_fork+0x10/0x20
[ 193.302709]
[ 193.303312] Freed by task 205:
[ 193.304238] kasan_save_stack+0x3c/0x68
[ 193.305441] kasan_set_track+0x2c/0x40
[ 193.306675] kasan_save_free_info+0x38/0x60
[ 193.307866] __kasan_slab_free+0x100/0x170
[ 193.309174] __kmem_cache_free+0x170/0x2e0
[ 193.310387] kfree+0x74/0x138
[ 193.311350] kasan_strings+0xbc/0x478
[ 193.312473] kunit_try_run_case+0xf8/0x260
[ 193.313748] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 193.315271] kthread+0x18c/0x1a8
[ 193.316308] ret_from_fork+0x10/0x20
[ 193.317371]
[ 193.317953] The buggy address belongs to the object at ffff0000c5f2cb80
[ 193.317953] which belongs to the cache kmalloc-32 of size 32
[ 193.320378] The buggy address is located 16 bytes inside of
[ 193.320378] freed 32-byte region [ffff0000c5f2cb80, ffff0000c5f2cba0)
[ 193.322692]
[ 193.323347] The buggy address belongs to the physical page:
[ 193.324627] page:00000000e427c865 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f2c
[ 193.326525] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 193.328251] page_type: 0xffffffff()
[ 193.329357] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[ 193.331041] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 193.332542] page dumped because: kasan: bad access detected
[ 193.333838]
[ 193.334410] Memory state around the buggy address:
[ 193.335633] ffff0000c5f2ca80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 193.337330] ffff0000c5f2cb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 193.338925] >ffff0000c5f2cb80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.340455] ^
[ 193.341490] ffff0000c5f2cc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.343112] ffff0000c5f2cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.344594] ==================================================================
Home
[ 192.922728] ==================================================================
[ 192.924180] BUG: KASAN: slab-use-after-free in strrchr+0x28/0x58
[ 192.925744] Read of size 1 at addr ffff0000c5f2cb90 by task kunit_try_catch/205
[ 192.927650]
[ 192.928321] CPU: 1 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 192.930736] Hardware name: linux,dummy-virt (DT)
[ 192.931851] Call trace:
[ 192.932937] dump_backtrace+0x9c/0x128
[ 192.934009] show_stack+0x20/0x38
[ 192.935096] dump_stack_lvl+0x60/0xb0
[ 192.936545] print_report+0xf8/0x5d8
[ 192.937719] kasan_report+0xc8/0x118
[ 192.938843] __asan_load1+0x60/0x70
[ 192.940457] strrchr+0x28/0x58
[ 192.941296] kasan_strings+0x104/0x478
[ 192.942428] kunit_try_run_case+0xf8/0x260
[ 192.943627] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 192.945160] kthread+0x18c/0x1a8
[ 192.946151] ret_from_fork+0x10/0x20
[ 192.947307]
[ 192.947897] Allocated by task 205:
[ 192.948859] kasan_save_stack+0x3c/0x68
[ 192.950173] kasan_set_track+0x2c/0x40
[ 192.951526] kasan_save_alloc_info+0x24/0x38
[ 192.953001] __kasan_kmalloc+0xd4/0xd8
[ 192.954321] kmalloc_trace+0x68/0x130
[ 192.955528] kasan_strings+0xa0/0x478
[ 192.956791] kunit_try_run_case+0xf8/0x260
[ 192.958952] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 192.960787] kthread+0x18c/0x1a8
[ 192.961748] ret_from_fork+0x10/0x20
[ 192.962831]
[ 192.963399] Freed by task 205:
[ 192.964302] kasan_save_stack+0x3c/0x68
[ 192.965806] kasan_set_track+0x2c/0x40
[ 192.967317] kasan_save_free_info+0x38/0x60
[ 192.969087] __kasan_slab_free+0x100/0x170
[ 192.970274] __kmem_cache_free+0x170/0x2e0
[ 192.971457] kfree+0x74/0x138
[ 192.972495] kasan_strings+0xbc/0x478
[ 192.973754] kunit_try_run_case+0xf8/0x260
[ 192.975111] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 192.976646] kthread+0x18c/0x1a8
[ 192.977620] ret_from_fork+0x10/0x20
[ 192.978807]
[ 192.979386] The buggy address belongs to the object at ffff0000c5f2cb80
[ 192.979386] which belongs to the cache kmalloc-32 of size 32
[ 192.981968] The buggy address is located 16 bytes inside of
[ 192.981968] freed 32-byte region [ffff0000c5f2cb80, ffff0000c5f2cba0)
[ 192.984836]
[ 192.985649] The buggy address belongs to the physical page:
[ 192.986873] page:00000000e427c865 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f2c
[ 192.989421] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 192.990984] page_type: 0xffffffff()
[ 192.992108] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[ 192.993954] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 192.995520] page dumped because: kasan: bad access detected
[ 192.996904]
[ 192.997433] Memory state around the buggy address:
[ 192.999095] ffff0000c5f2ca80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 193.000630] ffff0000c5f2cb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 193.002520] >ffff0000c5f2cb80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.003959] ^
[ 193.005249] ffff0000c5f2cc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.007205] ffff0000c5f2cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 193.009221] ==================================================================
Home
[ 195.214906] ==================================================================
[ 195.217672] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x14c/0x270
[ 195.220728] Read of size 8 at addr ffff0000c5f2ce00 by task kunit_try_catch/215
[ 195.222439]
[ 195.223064] CPU: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 195.225398] Hardware name: linux,dummy-virt (DT)
[ 195.226603] Call trace:
[ 195.227448] dump_backtrace+0x9c/0x128
[ 195.228453] show_stack+0x20/0x38
[ 195.229673] dump_stack_lvl+0x60/0xb0
[ 195.230913] print_report+0xf8/0x5d8
[ 195.232089] kasan_report+0xc8/0x118
[ 195.233343] __asan_load8+0x9c/0xc0
[ 195.234593] workqueue_uaf+0x14c/0x270
[ 195.235734] kunit_try_run_case+0xf8/0x260
[ 195.237192] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 195.239146] kthread+0x18c/0x1a8
[ 195.240442] ret_from_fork+0x10/0x20
[ 195.241539]
[ 195.242137] Allocated by task 215:
[ 195.243045] kasan_save_stack+0x3c/0x68
[ 195.244601] kasan_set_track+0x2c/0x40
[ 195.245850] kasan_save_alloc_info+0x24/0x38
[ 195.247149] __kasan_kmalloc+0xd4/0xd8
[ 195.248545] kmalloc_trace+0x68/0x130
[ 195.249654] workqueue_uaf+0xd0/0x270
[ 195.250871] kunit_try_run_case+0xf8/0x260
[ 195.252146] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 195.253814] kthread+0x18c/0x1a8
[ 195.254760] ret_from_fork+0x10/0x20
[ 195.255990]
[ 195.256600] Freed by task 28:
[ 195.257496] kasan_save_stack+0x3c/0x68
[ 195.258891] kasan_set_track+0x2c/0x40
[ 195.260139] kasan_save_free_info+0x38/0x60
[ 195.261722] __kasan_slab_free+0x100/0x170
[ 195.263182] __kmem_cache_free+0x170/0x2e0
[ 195.264632] kfree+0x74/0x138
[ 195.265705] workqueue_uaf_work+0x18/0x30
[ 195.266901] process_one_work+0x2a8/0x6d0
[ 195.268456] worker_thread+0x53c/0x708
[ 195.269693] kthread+0x18c/0x1a8
[ 195.270891] ret_from_fork+0x10/0x20
[ 195.272012]
[ 195.272589] Last potentially related work creation:
[ 195.273716] kasan_save_stack+0x3c/0x68
[ 195.275059] __kasan_record_aux_stack+0xb8/0xe8
[ 195.276493] kasan_record_aux_stack_noalloc+0x14/0x20
[ 195.278038] __queue_work+0x260/0x800
[ 195.279315] queue_work_on+0xb4/0xf0
[ 195.280620] workqueue_uaf+0x12c/0x270
[ 195.281864] kunit_try_run_case+0xf8/0x260
[ 195.283513] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 195.285261] kthread+0x18c/0x1a8
[ 195.286283] ret_from_fork+0x10/0x20
[ 195.287377]
[ 195.288022] The buggy address belongs to the object at ffff0000c5f2ce00
[ 195.288022] which belongs to the cache kmalloc-32 of size 32
[ 195.290547] The buggy address is located 0 bytes inside of
[ 195.290547] freed 32-byte region [ffff0000c5f2ce00, ffff0000c5f2ce20)
[ 195.293168]
[ 195.293621] The buggy address belongs to the physical page:
[ 195.295045] page:00000000e427c865 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f2c
[ 195.297031] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[ 195.300381] page_type: 0xffffffff()
[ 195.301374] raw: 0bfffc0000000800 ffff0000c0001500 dead000000000122 0000000000000000
[ 195.303003] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 195.304763] page dumped because: kasan: bad access detected
[ 195.306039]
[ 195.306671] Memory state around the buggy address:
[ 195.307901] ffff0000c5f2cd00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 195.309641] ffff0000c5f2cd80: 00 00 07 fc fc fc fc fc 00 00 00 07 fc fc fc fc
[ 195.311334] >ffff0000c5f2ce00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[ 195.312907] ^
[ 195.314277] ffff0000c5f2ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 195.315817] ffff0000c5f2cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 195.318802] ==================================================================
Home
[ 191.410903] ==================================================================
[ 191.414019] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0xbc/0x180
[ 191.415521] Read of size 1 at addr ffff800080877cfa by task kunit_try_catch/185
[ 191.417583]
[ 191.418219] CPU: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 191.420438] Hardware name: linux,dummy-virt (DT)
[ 191.421370] Call trace:
[ 191.422096] dump_backtrace+0x9c/0x128
[ 191.423255] show_stack+0x20/0x38
[ 191.424423] dump_stack_lvl+0x60/0xb0
[ 191.425632] print_report+0x314/0x5d8
[ 191.426811] kasan_report+0xc8/0x118
[ 191.428243] __asan_load1+0x60/0x70
[ 191.429412] kasan_stack_oob+0xbc/0x180
[ 191.430557] kunit_try_run_case+0xf8/0x260
[ 191.431793] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 191.433375] kthread+0x18c/0x1a8
[ 191.434469] ret_from_fork+0x10/0x20
[ 191.435761]
[ 191.436602] The buggy address belongs to stack of task kunit_try_catch/185
[ 191.438732] and is located at offset 138 in frame:
[ 191.439792] kasan_stack_oob+0x0/0x180
[ 191.441189]
[ 191.441847] This frame has 4 objects:
[ 191.442903] [48, 49) '__assertion'
[ 191.443275] [64, 72) 'array'
[ 191.444206] [96, 112) '__assertion'
[ 191.445302] [128, 138) 'stack_array'
[ 191.446392]
[ 191.447726] The buggy address belongs to the virtual mapping at
[ 191.447726] [ffff800080870000, ffff800080879000) created by:
[ 191.447726] kernel_clone+0xf8/0x540
[ 191.450732]
[ 191.451380] The buggy address belongs to the physical page:
[ 191.452827] page:00000000077af11d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060a5
[ 191.454763] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[ 191.456359] page_type: 0xffffffff()
[ 191.457755] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[ 191.460733] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 191.462548] page dumped because: kasan: bad access detected
[ 191.463815]
[ 191.464646] Memory state around the buggy address:
[ 191.465850] ffff800080877b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 191.467542] ffff800080877c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1
[ 191.469355] >ffff800080877c80: f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00 02
[ 191.470806] ^
[ 191.472886] ffff800080877d00: f3 f3 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1
[ 191.474493] ffff800080877d80: 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00
[ 191.476243] ==================================================================
Home
[ 188.022616] ==================================================================
[ 188.024802] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0xac/0x1b0
[ 188.026472] Read of size 1 at addr ffff0000c5ee0000 by task kunit_try_catch/125
[ 188.029365]
[ 188.030059] CPU: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 188.032103] Hardware name: linux,dummy-virt (DT)
[ 188.033327] Call trace:
[ 188.034576] dump_backtrace+0x9c/0x128
[ 188.035617] show_stack+0x20/0x38
[ 188.036707] dump_stack_lvl+0x60/0xb0
[ 188.038169] print_report+0xf8/0x5d8
[ 188.039335] kasan_report+0xc8/0x118
[ 188.040708] __asan_load1+0x60/0x70
[ 188.041829] kmalloc_pagealloc_uaf+0xac/0x1b0
[ 188.043043] kunit_try_run_case+0xf8/0x260
[ 188.044326] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 188.046083] kthread+0x18c/0x1a8
[ 188.047080] ret_from_fork+0x10/0x20
[ 188.048568]
[ 188.049466] The buggy address belongs to the physical page:
[ 188.050897] page:0000000082de2537 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ee0
[ 188.052808] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[ 188.054319] page_type: 0xffffffff()
[ 188.055444] raw: 0bfffc0000000000 fffffc000317b908 ffff0000daa134f8 0000000000000000
[ 188.057173] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[ 188.058762] page dumped because: kasan: bad access detected
[ 188.060001]
[ 188.060900] Memory state around the buggy address:
[ 188.062105] ffff0000c5edff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 188.063656] ffff0000c5edff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 188.065379] >ffff0000c5ee0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 188.066728] ^
[ 188.067652] ffff0000c5ee0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 188.069426] ffff0000c5ee0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 188.071320] ==================================================================
Home
[ 188.190545] ==================================================================
[ 188.192971] BUG: KASAN: use-after-free in pagealloc_uaf+0xd4/0x1e8
[ 188.194319] Read of size 1 at addr ffff0000c6070000 by task kunit_try_catch/131
[ 188.195941]
[ 188.196836] CPU: 0 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 188.198947] Hardware name: linux,dummy-virt (DT)
[ 188.200179] Call trace:
[ 188.201415] dump_backtrace+0x9c/0x128
[ 188.202630] show_stack+0x20/0x38
[ 188.203663] dump_stack_lvl+0x60/0xb0
[ 188.205263] print_report+0xf8/0x5d8
[ 188.206489] kasan_report+0xc8/0x118
[ 188.207668] __asan_load1+0x60/0x70
[ 188.208831] pagealloc_uaf+0xd4/0x1e8
[ 188.210101] kunit_try_run_case+0xf8/0x260
[ 188.211363] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 188.213257] kthread+0x18c/0x1a8
[ 188.214220] ret_from_fork+0x10/0x20
[ 188.215331]
[ 188.215905] The buggy address belongs to the physical page:
[ 188.217172] page:0000000011234266 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106070
[ 188.219304] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[ 188.220921] page_type: 0xffffff7f(buddy)
[ 188.222232] raw: 0bfffc0000000000 ffff0000ff5fc960 ffff0000ff5fc960 0000000000000000
[ 188.223893] raw: 0000000000000000 0000000000000004 00000000ffffff7f 0000000000000000
[ 188.225357] page dumped because: kasan: bad access detected
[ 188.226557]
[ 188.227118] Memory state around the buggy address:
[ 188.228384] ffff0000c606ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 188.230110] ffff0000c606ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 188.231719] >ffff0000c6070000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 188.233473] ^
[ 188.234413] ffff0000c6070080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 188.236714] ffff0000c6070100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 188.238080] ==================================================================
Home
[ 195.420509] ==================================================================
[ 195.422202] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xec/0x320
[ 195.424140] Read of size 1 at addr ffff8000800fd7f8 by task kunit_try_catch/220
[ 195.425746]
[ 195.426465] CPU: 0 PID: 220 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 195.428695] Hardware name: linux,dummy-virt (DT)
[ 195.430271] Call trace:
[ 195.431658] dump_backtrace+0x9c/0x128
[ 195.432850] show_stack+0x20/0x38
[ 195.434092] dump_stack_lvl+0x60/0xb0
[ 195.435515] print_report+0x314/0x5d8
[ 195.436918] kasan_report+0xc8/0x118
[ 195.438081] __asan_load1+0x60/0x70
[ 195.439170] vmalloc_oob+0xec/0x320
[ 195.440286] kunit_try_run_case+0xf8/0x260
[ 195.441852] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 195.443522] kthread+0x18c/0x1a8
[ 195.444998] ret_from_fork+0x10/0x20
[ 195.446300]
[ 195.447013] The buggy address belongs to the virtual mapping at
[ 195.447013] [ffff8000800fd000, ffff8000800ff000) created by:
[ 195.447013] vmalloc_oob+0x88/0x320
[ 195.450670]
[ 195.451364] The buggy address belongs to the physical page:
[ 195.452689] page:00000000a572b734 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10604d
[ 195.454587] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[ 195.456265] page_type: 0xffffffff()
[ 195.457733] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[ 195.459452] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 195.462133] page dumped because: kasan: bad access detected
[ 195.463457]
[ 195.464117] Memory state around the buggy address:
[ 195.465965] ffff8000800fd680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 195.467555] ffff8000800fd700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 195.469829] >ffff8000800fd780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[ 195.471557] ^
[ 195.473128] ffff8000800fd800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[ 195.475253] ffff8000800fd880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[ 195.476827] ==================================================================
Home
[ 195.363246] ==================================================================
[ 195.365803] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xc8/0x320
[ 195.367480] Read of size 1 at addr ffff8000800fd7f3 by task kunit_try_catch/220
[ 195.369155]
[ 195.369847] CPU: 0 PID: 220 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 195.371912] Hardware name: linux,dummy-virt (DT)
[ 195.373183] Call trace:
[ 195.374054] dump_backtrace+0x9c/0x128
[ 195.375321] show_stack+0x20/0x38
[ 195.376501] dump_stack_lvl+0x60/0xb0
[ 195.377891] print_report+0x314/0x5d8
[ 195.379037] kasan_report+0xc8/0x118
[ 195.380334] __asan_load1+0x60/0x70
[ 195.381317] vmalloc_oob+0xc8/0x320
[ 195.382525] kunit_try_run_case+0xf8/0x260
[ 195.383823] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 195.385625] kthread+0x18c/0x1a8
[ 195.386670] ret_from_fork+0x10/0x20
[ 195.387830]
[ 195.388586] The buggy address belongs to the virtual mapping at
[ 195.388586] [ffff8000800fd000, ffff8000800ff000) created by:
[ 195.388586] vmalloc_oob+0x88/0x320
[ 195.391542]
[ 195.392391] The buggy address belongs to the physical page:
[ 195.393886] page:00000000a572b734 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10604d
[ 195.395749] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[ 195.397562] page_type: 0xffffffff()
[ 195.398639] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[ 195.400591] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 195.402279] page dumped because: kasan: bad access detected
[ 195.403522]
[ 195.404288] Memory state around the buggy address:
[ 195.405501] ffff8000800fd680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 195.407637] ffff8000800fd700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 195.409356] >ffff8000800fd780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[ 195.410971] ^
[ 195.412486] ffff8000800fd800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[ 195.413529] ffff8000800fd880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[ 195.415260] ==================================================================
Home
[ 196.886906] ==================================================================
[ 196.888295] BUG: KFENCE: invalid free in test_double_free+0x15c/0x1d0
[ 196.888295]
[ 196.889993] Invalid free of 0x0000000043718bc4 (in kfence-#36):
[ 196.891461] test_double_free+0x15c/0x1d0
[ 196.892857] kunit_try_run_case+0xf8/0x260
[ 196.894051] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 196.895488] kthread+0x18c/0x1a8
[ 196.896440] ret_from_fork+0x10/0x20
[ 196.897631]
[ 196.898210] kfence-#36: 0x0000000043718bc4-0x00000000ba784fdd, size=32, cache=kmalloc-32
[ 196.898210]
[ 196.900090] allocated by task 244 on cpu 0 at 196.885813s:
[ 196.901819] test_alloc+0x224/0x3d8
[ 196.902750] test_double_free+0xcc/0x1d0
[ 196.903961] kunit_try_run_case+0xf8/0x260
[ 196.905175] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 196.906600] kthread+0x18c/0x1a8
[ 196.907684] ret_from_fork+0x10/0x20
[ 196.908806]
[ 196.909405] freed by task 244 on cpu 0 at 196.886223s:
[ 196.911196] test_double_free+0x14c/0x1d0
[ 196.912183] kunit_try_run_case+0xf8/0x260
[ 196.913427] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 196.914841] kthread+0x18c/0x1a8
[ 196.915870] ret_from_fork+0x10/0x20
[ 196.916983]
[ 196.917627] CPU: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 196.919404] Hardware name: linux,dummy-virt (DT)
[ 196.920526] ==================================================================
Home
[ 196.990653] ==================================================================
[ 196.991950] BUG: KFENCE: invalid free in test_double_free+0xf8/0x1d0
[ 196.991950]
[ 196.993362] Invalid free of 0x00000000135b9330 (in kfence-#26):
[ 196.994811] test_double_free+0xf8/0x1d0
[ 196.996187] kunit_try_run_case+0xf8/0x260
[ 196.997425] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 196.998890] kthread+0x18c/0x1a8
[ 196.999827] ret_from_fork+0x10/0x20
[ 197.000972]
[ 197.001560] kfence-#26: 0x00000000135b9330-0x00000000a01968e3, size=32, cache=test
[ 197.001560]
[ 197.003341] allocated by task 246 on cpu 0 at 196.989709s:
[ 197.004919] test_alloc+0x1b8/0x3d8
[ 197.005914] test_double_free+0xcc/0x1d0
[ 197.007127] kunit_try_run_case+0xf8/0x260
[ 197.008347] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 197.009845] kthread+0x18c/0x1a8
[ 197.010847] ret_from_fork+0x10/0x20
[ 197.011954]
[ 197.012536] freed by task 246 on cpu 0 at 196.990099s:
[ 197.014283] test_double_free+0xe8/0x1d0
[ 197.015276] kunit_try_run_case+0xf8/0x260
[ 197.016482] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 197.017939] kthread+0x18c/0x1a8
[ 197.018961] ret_from_fork+0x10/0x20
[ 197.020005]
[ 197.020602] CPU: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 197.022324] Hardware name: linux,dummy-virt (DT)
[ 197.023439] ==================================================================
Home
[ 197.094500] ==================================================================
[ 197.095737] BUG: KFENCE: invalid free in test_invalid_addr_free+0x14c/0x1d0
[ 197.095737]
[ 197.097636] Invalid free of 0x0000000075270e42 (in kfence-#37):
[ 197.099073] test_invalid_addr_free+0x14c/0x1d0
[ 197.100497] kunit_try_run_case+0xf8/0x260
[ 197.101654] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 197.103167] kthread+0x18c/0x1a8
[ 197.104127] ret_from_fork+0x10/0x20
[ 197.105301]
[ 197.105906] kfence-#37: 0x00000000c8a38ac4-0x00000000acd4689c, size=32, cache=kmalloc-32
[ 197.105906]
[ 197.107708] allocated by task 248 on cpu 1 at 197.093686s:
[ 197.109422] test_alloc+0x224/0x3d8
[ 197.110342] test_invalid_addr_free+0xcc/0x1d0
[ 197.111674] kunit_try_run_case+0xf8/0x260
[ 197.112861] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 197.114372] kthread+0x18c/0x1a8
[ 197.115362] ret_from_fork+0x10/0x20
[ 197.116399]
[ 197.117055] CPU: 1 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 197.118803] Hardware name: linux,dummy-virt (DT)
[ 197.119870] ==================================================================
Home
[ 197.198558] ==================================================================
[ 197.199833] BUG: KFENCE: invalid free in test_invalid_addr_free+0xe4/0x1d0
[ 197.199833]
[ 197.201541] Invalid free of 0x00000000cb7257db (in kfence-#41):
[ 197.202943] test_invalid_addr_free+0xe4/0x1d0
[ 197.204273] kunit_try_run_case+0xf8/0x260
[ 197.205553] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 197.207020] kthread+0x18c/0x1a8
[ 197.207981] ret_from_fork+0x10/0x20
[ 197.209129]
[ 197.209709] kfence-#41: 0x0000000092ebfe73-0x000000000b9bd06a, size=32, cache=test
[ 197.209709]
[ 197.211452] allocated by task 250 on cpu 1 at 197.197846s:
[ 197.213121] test_alloc+0x1b8/0x3d8
[ 197.214040] test_invalid_addr_free+0xcc/0x1d0
[ 197.215388] kunit_try_run_case+0xf8/0x260
[ 197.216590] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 197.218070] kthread+0x18c/0x1a8
[ 197.219074] ret_from_fork+0x10/0x20
[ 197.220138]
[ 197.220798] CPU: 1 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 197.222576] Hardware name: linux,dummy-virt (DT)
[ 197.223645] ==================================================================
Home
[ 226.043457] ==================================================================
[ 226.053581] BUG: KFENCE: invalid read in test_invalid_access+0xb4/0x158
[ 226.053581]
[ 226.059378] Invalid read at 0x00000000345b590a:
[ 226.066085] test_invalid_access+0xb4/0x158
[ 226.069444] kunit_try_run_case+0xf8/0x260
[ 226.072852] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 226.075702] kthread+0x18c/0x1a8
[ 226.078638] ret_from_fork+0x10/0x20
[ 226.081836]
[ 226.083231] CPU: 1 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 226.086643] Hardware name: linux,dummy-virt (DT)
[ 226.088890] ==================================================================
Home
[ 189.606868] ==================================================================
[ 189.610572] BUG: KFENCE: memory corruption in kmalloc_oob_memset_2+0xf0/0x1f0
[ 189.610572]
[ 189.612373] Corrupted memory at 0x00000000132ae698 [ ! . . . . . . . . . . . . . . . ] (in kfence-#41):
[ 189.616670] kmalloc_oob_memset_2+0xf0/0x1f0
[ 189.618020] kunit_try_run_case+0xf8/0x260
[ 189.619211] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.620850] kthread+0x18c/0x1a8
[ 189.621380] ret_from_fork+0x10/0x20
[ 189.622149]
[ 189.622723] kfence-#41: 0x0000000070e32e42-0x0000000049c622ba, size=120, cache=kmalloc-128
[ 189.622723]
[ 189.625020] allocated by task 151 on cpu 1 at 189.599023s:
[ 189.627214] __kmem_cache_alloc_node+0x288/0x2d0
[ 189.628360] kmalloc_trace+0x48/0x130
[ 189.629477] kmalloc_oob_memset_2+0xa0/0x1f0
[ 189.631302] kunit_try_run_case+0xf8/0x260
[ 189.632743] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.634214] kthread+0x18c/0x1a8
[ 189.635241] ret_from_fork+0x10/0x20
[ 189.636619]
[ 189.637251] freed by task 151 on cpu 1 at 189.606280s:
[ 189.639091] kmalloc_oob_memset_2+0xf0/0x1f0
[ 189.640169] kunit_try_run_case+0xf8/0x260
[ 189.641278] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.642741] kthread+0x18c/0x1a8
[ 189.643721] ret_from_fork+0x10/0x20
[ 189.645019]
[ 189.645624] CPU: 1 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 189.647512] Hardware name: linux,dummy-virt (DT)
[ 189.648859] ==================================================================
Home
[ 189.606868] ==================================================================
[ 189.610572] BUG: KFENCE: memory corruption in kmalloc_oob_memset_2+0xf0/0x1f0
[ 189.610572]
[ 189.612373] Corrupted memory at 0x00000000132ae698 [ ! . . . . . . . . . . . . . . . ] (in kfence-#41):
[ 189.616670] kmalloc_oob_memset_2+0xf0/0x1f0
[ 189.618020] kunit_try_run_case+0xf8/0x260
[ 189.619211] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.620850] kthread+0x18c/0x1a8
[ 189.621380] ret_from_fork+0x10/0x20
[ 189.622149]
[ 189.622723] kfence-#41: 0x0000000070e32e42-0x0000000049c622ba, size=120, cache=kmalloc-128
[ 189.622723]
[ 189.625020] allocated by task 151 on cpu 1 at 189.599023s:
[ 189.627214] __kmem_cache_alloc_node+0x288/0x2d0
[ 189.628360] kmalloc_trace+0x48/0x130
[ 189.629477] kmalloc_oob_memset_2+0xa0/0x1f0
[ 189.631302] kunit_try_run_case+0xf8/0x260
[ 189.632743] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.634214] kthread+0x18c/0x1a8
[ 189.635241] ret_from_fork+0x10/0x20
[ 189.636619]
[ 189.637251] freed by task 151 on cpu 1 at 189.606280s:
[ 189.639091] kmalloc_oob_memset_2+0xf0/0x1f0
[ 189.640169] kunit_try_run_case+0xf8/0x260
[ 189.641278] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 189.642741] kthread+0x18c/0x1a8
[ 189.643721] ret_from_fork+0x10/0x20
[ 189.645019]
[ 189.645624] CPU: 1 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 189.647512] Hardware name: linux,dummy-virt (DT)
[ 189.648859] ==================================================================
Home
[ 188.588609] ==================================================================
[ 188.592263] BUG: KFENCE: memory corruption in krealloc_less_oob_helper+0x200/0x590
[ 188.592263]
[ 188.594150] Corrupted memory at 0x00000000ac902a13 [ ! . . . . . . . . . . . . . . . ] (in kfence-#11):
[ 188.598921] krealloc_less_oob_helper+0x200/0x590
[ 188.600270] krealloc_less_oob+0x20/0x38
[ 188.601396] kunit_try_run_case+0xf8/0x260
[ 188.602585] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 188.603862] kthread+0x18c/0x1a8
[ 188.604712] ret_from_fork+0x10/0x20
[ 188.605350]
[ 188.605899] kfence-#11: 0x000000000d4641e7-0x000000006f6cd587, size=235, cache=kmalloc-256
[ 188.605899]
[ 188.608158] allocated by task 137 on cpu 0 at 188.547631s:
[ 188.609724] krealloc_less_oob_helper+0xb8/0x590
[ 188.610629] krealloc_less_oob+0x20/0x38
[ 188.611724] kunit_try_run_case+0xf8/0x260
[ 188.612737] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 188.613982] kthread+0x18c/0x1a8
[ 188.614503] ret_from_fork+0x10/0x20
[ 188.615421]
[ 188.616082] freed by task 137 on cpu 0 at 188.586962s:
[ 188.617862] krealloc_less_oob_helper+0x200/0x590
[ 188.618933] krealloc_less_oob+0x20/0x38
[ 188.619951] kunit_try_run_case+0xf8/0x260
[ 188.620609] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 188.621975] kthread+0x18c/0x1a8
[ 188.622928] ret_from_fork+0x10/0x20
[ 188.623996]
[ 188.624653] CPU: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 188.625999] Hardware name: linux,dummy-virt (DT)
[ 188.627123] ==================================================================
Home
[ 188.588609] ==================================================================
[ 188.592263] BUG: KFENCE: memory corruption in krealloc_less_oob_helper+0x200/0x590
[ 188.592263]
[ 188.594150] Corrupted memory at 0x00000000ac902a13 [ ! . . . . . . . . . . . . . . . ] (in kfence-#11):
[ 188.598921] krealloc_less_oob_helper+0x200/0x590
[ 188.600270] krealloc_less_oob+0x20/0x38
[ 188.601396] kunit_try_run_case+0xf8/0x260
[ 188.602585] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 188.603862] kthread+0x18c/0x1a8
[ 188.604712] ret_from_fork+0x10/0x20
[ 188.605350]
[ 188.605899] kfence-#11: 0x000000000d4641e7-0x000000006f6cd587, size=235, cache=kmalloc-256
[ 188.605899]
[ 188.608158] allocated by task 137 on cpu 0 at 188.547631s:
[ 188.609724] krealloc_less_oob_helper+0xb8/0x590
[ 188.610629] krealloc_less_oob+0x20/0x38
[ 188.611724] kunit_try_run_case+0xf8/0x260
[ 188.612737] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 188.613982] kthread+0x18c/0x1a8
[ 188.614503] ret_from_fork+0x10/0x20
[ 188.615421]
[ 188.616082] freed by task 137 on cpu 0 at 188.586962s:
[ 188.617862] krealloc_less_oob_helper+0x200/0x590
[ 188.618933] krealloc_less_oob+0x20/0x38
[ 188.619951] kunit_try_run_case+0xf8/0x260
[ 188.620609] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 188.621975] kthread+0x18c/0x1a8
[ 188.622928] ret_from_fork+0x10/0x20
[ 188.623996]
[ 188.624653] CPU: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 188.625999] Hardware name: linux,dummy-virt (DT)
[ 188.627123] ==================================================================
Home
[ 197.926747] ==================================================================
[ 197.928015] BUG: KFENCE: memory corruption in test_corruption+0xf4/0x258
[ 197.928015]
[ 197.929637] Corrupted memory at 0x00000000bbf2668c [ ! . . . . . . . . . . . . . . . ] (in kfence-#108):
[ 197.933625] test_corruption+0xf4/0x258
[ 197.934875] kunit_try_run_case+0xf8/0x260
[ 197.936110] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 197.937624] kthread+0x18c/0x1a8
[ 197.938640] ret_from_fork+0x10/0x20
[ 197.939705]
[ 197.940309] kfence-#108: 0x0000000099c34203-0x000000004ebba905, size=32, cache=test
[ 197.940309]
[ 197.942074] allocated by task 254 on cpu 0 at 197.925921s:
[ 197.943683] test_alloc+0x1b8/0x3d8
[ 197.944702] test_corruption+0xc8/0x258
[ 197.945859] kunit_try_run_case+0xf8/0x260
[ 197.947128] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 197.948583] kthread+0x18c/0x1a8
[ 197.949586] ret_from_fork+0x10/0x20
[ 197.950655]
[ 197.951235] freed by task 254 on cpu 0 at 197.926293s:
[ 197.952963] test_corruption+0xf4/0x258
[ 197.953950] kunit_try_run_case+0xf8/0x260
[ 197.955170] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 197.956614] kthread+0x18c/0x1a8
[ 197.957606] ret_from_fork+0x10/0x20
[ 197.958721]
[ 197.959387] CPU: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 197.961162] Hardware name: linux,dummy-virt (DT)
[ 197.962287] ==================================================================
Home
[ 197.302616] ==================================================================
[ 197.304031] BUG: KFENCE: memory corruption in test_corruption+0x194/0x258
[ 197.304031]
[ 197.305714] Corrupted memory at 0x0000000002aaea0a [ ! . . . . . . . . . . . . . . . ] (in kfence-#48):
[ 197.309888] test_corruption+0x194/0x258
[ 197.311079] kunit_try_run_case+0xf8/0x260
[ 197.312273] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 197.313690] kthread+0x18c/0x1a8
[ 197.314697] ret_from_fork+0x10/0x20
[ 197.315742]
[ 197.316377] kfence-#48: 0x00000000fa28bb67-0x00000000d862c4c7, size=32, cache=kmalloc-32
[ 197.316377]
[ 197.318227] allocated by task 252 on cpu 1 at 197.301698s:
[ 197.319963] test_alloc+0x224/0x3d8
[ 197.320979] test_corruption+0xc8/0x258
[ 197.322161] kunit_try_run_case+0xf8/0x260
[ 197.323350] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 197.324800] kthread+0x18c/0x1a8
[ 197.325813] ret_from_fork+0x10/0x20
[ 197.326896]
[ 197.327450] freed by task 252 on cpu 1 at 197.302125s:
[ 197.329205] test_corruption+0x194/0x258
[ 197.330218] kunit_try_run_case+0xf8/0x260
[ 197.331433] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 197.332815] kthread+0x18c/0x1a8
[ 197.333888] ret_from_fork+0x10/0x20
[ 197.334958]
[ 197.335576] CPU: 1 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 197.337313] Hardware name: linux,dummy-virt (DT)
[ 197.338493] ==================================================================
Home
[ 197.617061] ==================================================================
[ 197.618334] BUG: KFENCE: memory corruption in test_corruption+0x1e8/0x258
[ 197.618334]
[ 197.620432] Corrupted memory at 0x00000000027a4ba0 [ ! ] (in kfence-#70):
[ 197.622413] test_corruption+0x1e8/0x258
[ 197.623811] kunit_try_run_case+0xf8/0x260
[ 197.625114] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 197.626626] kthread+0x18c/0x1a8
[ 197.627631] ret_from_fork+0x10/0x20
[ 197.628721]
[ 197.629367] kfence-#70: 0x00000000515ea46b-0x00000000901c5a4c, size=32, cache=kmalloc-32
[ 197.629367]
[ 197.631163] allocated by task 252 on cpu 1 at 197.615477s:
[ 197.632948] test_alloc+0x224/0x3d8
[ 197.633885] test_corruption+0x114/0x258
[ 197.635086] kunit_try_run_case+0xf8/0x260
[ 197.636318] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 197.637735] kthread+0x18c/0x1a8
[ 197.638736] ret_from_fork+0x10/0x20
[ 197.639814]
[ 197.640373] freed by task 252 on cpu 1 at 197.615962s:
[ 197.642134] test_corruption+0x1e8/0x258
[ 197.643152] kunit_try_run_case+0xf8/0x260
[ 197.644379] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 197.645816] kthread+0x18c/0x1a8
[ 197.646764] ret_from_fork+0x10/0x20
[ 197.647985]
[ 197.648568] CPU: 1 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 197.650313] Hardware name: linux,dummy-virt (DT)
[ 197.651401] ==================================================================
Home
[ 215.194934] ==================================================================
[ 215.196295] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x150/0x1d8
[ 215.196295]
[ 215.198267] Corrupted memory at 0x0000000062cc45f6 [ ! . . . . . . ] (in kfence-#8):
[ 215.201292] test_kmalloc_aligned_oob_write+0x150/0x1d8
[ 215.202681] kunit_try_run_case+0xf8/0x260
[ 215.203926] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 215.205361] kthread+0x18c/0x1a8
[ 215.206358] ret_from_fork+0x10/0x20
[ 215.207492]
[ 215.208171] kfence-#8: 0x00000000181e00c9-0x0000000084542278, size=73, cache=kmalloc-96
[ 215.208171]
[ 215.209946] allocated by task 266 on cpu 0 at 215.193869s:
[ 215.211697] test_alloc+0x224/0x3d8
[ 215.212603] test_kmalloc_aligned_oob_write+0xb4/0x1d8
[ 215.214044] kunit_try_run_case+0xf8/0x260
[ 215.215237] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 215.216675] kthread+0x18c/0x1a8
[ 215.217693] ret_from_fork+0x10/0x20
[ 215.218843]
[ 215.219408] freed by task 266 on cpu 0 at 215.194314s:
[ 215.221215] test_kmalloc_aligned_oob_write+0x150/0x1d8
[ 215.222436] kunit_try_run_case+0xf8/0x260
[ 215.223636] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 215.225067] kthread+0x18c/0x1a8
[ 215.226066] ret_from_fork+0x10/0x20
[ 215.227208]
[ 215.227897] CPU: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 215.229583] Hardware name: linux,dummy-virt (DT)
[ 215.230688] ==================================================================
Home
[ 190.069967] ==================================================================
[ 190.072185] BUG: KFENCE: out-of-bounds read in __memcpy+0x9c/0x240
[ 190.072185]
[ 190.074020] Out-of-bounds read at 0x00000000958e71ef (64B right of kfence-#70):
[ 190.075703] __memcpy+0x9c/0x240
[ 190.077038] kmalloc_memmove_invalid_size+0xe0/0x1f8
[ 190.078480] kunit_try_run_case+0xf8/0x260
[ 190.079686] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 190.081387] kthread+0x18c/0x1a8
[ 190.082370] ret_from_fork+0x10/0x20
[ 190.083399]
[ 190.084036] kfence-#70: 0x00000000d170b24b-0x00000000901c5a4c, size=64, cache=kmalloc-64
[ 190.084036]
[ 190.086014] allocated by task 161 on cpu 0 at 190.067158s:
[ 190.088433] __kmem_cache_alloc_node+0x288/0x2d0
[ 190.089550] kmalloc_trace+0x48/0x130
[ 190.090578] kmalloc_memmove_invalid_size+0xa0/0x1f8
[ 190.091997] kunit_try_run_case+0xf8/0x260
[ 190.093135] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 190.094697] kthread+0x18c/0x1a8
[ 190.095758] ret_from_fork+0x10/0x20
[ 190.097172]
[ 190.097856] CPU: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 190.099709] Hardware name: linux,dummy-virt (DT)
[ 190.100978] ==================================================================
Home
[ 190.069967] ==================================================================
[ 190.072185] BUG: KFENCE: out-of-bounds read in __memcpy+0x9c/0x240
[ 190.072185]
[ 190.074020] Out-of-bounds read at 0x00000000958e71ef (64B right of kfence-#70):
[ 190.075703] __memcpy+0x9c/0x240
[ 190.077038] kmalloc_memmove_invalid_size+0xe0/0x1f8
[ 190.078480] kunit_try_run_case+0xf8/0x260
[ 190.079686] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 190.081387] kthread+0x18c/0x1a8
[ 190.082370] ret_from_fork+0x10/0x20
[ 190.083399]
[ 190.084036] kfence-#70: 0x00000000d170b24b-0x00000000901c5a4c, size=64, cache=kmalloc-64
[ 190.084036]
[ 190.086014] allocated by task 161 on cpu 0 at 190.067158s:
[ 190.088433] __kmem_cache_alloc_node+0x288/0x2d0
[ 190.089550] kmalloc_trace+0x48/0x130
[ 190.090578] kmalloc_memmove_invalid_size+0xa0/0x1f8
[ 190.091997] kunit_try_run_case+0xf8/0x260
[ 190.093135] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 190.094697] kthread+0x18c/0x1a8
[ 190.095758] ret_from_fork+0x10/0x20
[ 190.097172]
[ 190.097856] CPU: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 190.099709] Hardware name: linux,dummy-virt (DT)
[ 190.100978] ==================================================================
Home
[ 214.993877] ==================================================================
[ 214.995085] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x118/0x270
[ 214.995085]
[ 214.997299] Out-of-bounds read at 0x00000000e011ed37 (81B right of kfence-#233):
[ 214.999463] test_kmalloc_aligned_oob_read+0x118/0x270
[ 215.001459] kunit_try_run_case+0xf8/0x260
[ 215.002561] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 215.004578] kthread+0x18c/0x1a8
[ 215.005691] ret_from_fork+0x10/0x20
[ 215.006948]
[ 215.007277] kfence-#233: 0x0000000082f3cf9b-0x0000000098a640d9, size=73, cache=kmalloc-96
[ 215.007277]
[ 215.008690] allocated by task 264 on cpu 1 at 214.991971s:
[ 215.010490] test_alloc+0x224/0x3d8
[ 215.011412] test_kmalloc_aligned_oob_read+0xd4/0x270
[ 215.013069] kunit_try_run_case+0xf8/0x260
[ 215.014863] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 215.016513] kthread+0x18c/0x1a8
[ 215.017540] ret_from_fork+0x10/0x20
[ 215.018707]
[ 215.019353] CPU: 1 PID: 264 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 215.021271] Hardware name: linux,dummy-virt (DT)
[ 215.022385] ==================================================================
Home
[ 196.366694] ==================================================================
[ 196.368105] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x120/0x278
[ 196.368105]
[ 196.369980] Out-of-bounds read at 0x0000000026a73450 (32B right of kfence-#2):
[ 196.371436] test_out_of_bounds_read+0x120/0x278
[ 196.372964] kunit_try_run_case+0xf8/0x260
[ 196.374201] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 196.375687] kthread+0x18c/0x1a8
[ 196.376649] ret_from_fork+0x10/0x20
[ 196.377853]
[ 196.378499] kfence-#2: 0x0000000000aeda7b-0x00000000bd33e17b, size=32, cache=test
[ 196.378499]
[ 196.380269] allocated by task 234 on cpu 1 at 196.366261s:
[ 196.382006] test_alloc+0x1b8/0x3d8
[ 196.383013] test_out_of_bounds_read+0x110/0x278
[ 196.384319] kunit_try_run_case+0xf8/0x260
[ 196.385537] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 196.387005] kthread+0x18c/0x1a8
[ 196.388011] ret_from_fork+0x10/0x20
[ 196.389120]
[ 196.389803] CPU: 1 PID: 234 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 196.391534] Hardware name: linux,dummy-virt (DT)
[ 196.392662] ==================================================================
Home
[ 195.743438] ==================================================================
[ 195.744793] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0xdc/0x278
[ 195.744793]
[ 195.746860] Out-of-bounds read at 0x0000000020c64231 (1B left of kfence-#249):
[ 195.748913] test_out_of_bounds_read+0xdc/0x278
[ 195.750259] kunit_try_run_case+0xf8/0x260
[ 195.751511] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 195.752973] kthread+0x18c/0x1a8
[ 195.754002] ret_from_fork+0x10/0x20
[ 195.755158]
[ 195.755840] kfence-#249: 0x0000000020cc24eb-0x00000000d4115433, size=32, cache=kmalloc-32
[ 195.755840]
[ 195.757700] allocated by task 232 on cpu 1 at 195.742850s:
[ 195.759461] test_alloc+0x224/0x3d8
[ 195.760385] test_out_of_bounds_read+0xcc/0x278
[ 195.761729] kunit_try_run_case+0xf8/0x260
[ 195.762986] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 195.764420] kthread+0x18c/0x1a8
[ 195.765438] ret_from_fork+0x10/0x20
[ 195.766522]
[ 195.767221] CPU: 1 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 195.768983] Hardware name: linux,dummy-virt (DT)
[ 195.770145] ==================================================================
Home
[ 195.950229] ==================================================================
[ 195.951503] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x120/0x278
[ 195.951503]
[ 195.953398] Out-of-bounds read at 0x00000000ecf09eee (32B right of kfence-#251):
[ 195.955293] test_out_of_bounds_read+0x120/0x278
[ 195.956601] kunit_try_run_case+0xf8/0x260
[ 195.957974] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 195.959453] kthread+0x18c/0x1a8
[ 195.960448] ret_from_fork+0x10/0x20
[ 195.961563]
[ 195.962137] kfence-#251: 0x000000006b4a421c-0x000000004070fa1a, size=32, cache=kmalloc-32
[ 195.962137]
[ 195.964035] allocated by task 232 on cpu 1 at 195.949733s:
[ 195.965763] test_alloc+0x224/0x3d8
[ 195.966701] test_out_of_bounds_read+0x110/0x278
[ 195.968106] kunit_try_run_case+0xf8/0x260
[ 195.969300] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 195.970827] kthread+0x18c/0x1a8
[ 195.971820] ret_from_fork+0x10/0x20
[ 195.972932]
[ 195.973586] CPU: 1 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 195.975314] Hardware name: linux,dummy-virt (DT)
[ 195.976443] ==================================================================
Home
[ 196.159217] ==================================================================
[ 196.160591] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0xdc/0x278
[ 196.160591]
[ 196.162510] Out-of-bounds read at 0x000000008266e0bc (1B left of kfence-#253):
[ 196.164218] test_out_of_bounds_read+0xdc/0x278
[ 196.165661] kunit_try_run_case+0xf8/0x260
[ 196.166895] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 196.168299] kthread+0x18c/0x1a8
[ 196.169353] ret_from_fork+0x10/0x20
[ 196.170434]
[ 196.171035] kfence-#253: 0x00000000fe214acf-0x00000000ada6f791, size=32, cache=test
[ 196.171035]
[ 196.172865] allocated by task 234 on cpu 1 at 196.158730s:
[ 196.174609] test_alloc+0x1b8/0x3d8
[ 196.175583] test_out_of_bounds_read+0xcc/0x278
[ 196.176887] kunit_try_run_case+0xf8/0x260
[ 196.178109] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 196.179514] kthread+0x18c/0x1a8
[ 196.180488] ret_from_fork+0x10/0x20
[ 196.181600]
[ 196.182275] CPU: 1 PID: 234 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 196.184003] Hardware name: linux,dummy-virt (DT)
[ 196.185103] ==================================================================
Home
[ 196.471392] ==================================================================
[ 196.472749] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0xd8/0x1b0
[ 196.472749]
[ 196.474690] Out-of-bounds write at 0x000000003af33f21 (1B left of kfence-#11):
[ 196.476384] test_out_of_bounds_write+0xd8/0x1b0
[ 196.477852] kunit_try_run_case+0xf8/0x260
[ 196.479090] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 196.480511] kthread+0x18c/0x1a8
[ 196.481456] ret_from_fork+0x10/0x20
[ 196.482645]
[ 196.483286] kfence-#11: 0x00000000a0feb797-0x000000009942cf45, size=32, cache=kmalloc-32
[ 196.483286]
[ 196.485090] allocated by task 236 on cpu 1 at 196.470844s:
[ 196.486847] test_alloc+0x224/0x3d8
[ 196.487754] test_out_of_bounds_write+0xc0/0x1b0
[ 196.489151] kunit_try_run_case+0xf8/0x260
[ 196.490376] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 196.491837] kthread+0x18c/0x1a8
[ 196.492888] ret_from_fork+0x10/0x20
[ 196.493999]
[ 196.494646] CPU: 1 PID: 236 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 196.496314] Hardware name: linux,dummy-virt (DT)
[ 196.497433] ==================================================================
Home
[ 196.575329] ==================================================================
[ 196.576662] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0xd8/0x1b0
[ 196.576662]
[ 196.578607] Out-of-bounds write at 0x000000009b3d5ad9 (1B left of kfence-#15):
[ 196.580221] test_out_of_bounds_write+0xd8/0x1b0
[ 196.581751] kunit_try_run_case+0xf8/0x260
[ 196.582991] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 196.584417] kthread+0x18c/0x1a8
[ 196.585424] ret_from_fork+0x10/0x20
[ 196.586482]
[ 196.587082] kfence-#15: 0x00000000605cb1f4-0x0000000055d01fc7, size=32, cache=test
[ 196.587082]
[ 196.588916] allocated by task 238 on cpu 1 at 196.574844s:
[ 196.590567] test_alloc+0x1b8/0x3d8
[ 196.591549] test_out_of_bounds_write+0xc0/0x1b0
[ 196.592856] kunit_try_run_case+0xf8/0x260
[ 196.594085] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 196.595526] kthread+0x18c/0x1a8
[ 196.596522] ret_from_fork+0x10/0x20
[ 196.597614]
[ 196.598267] CPU: 1 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 196.599979] Hardware name: linux,dummy-virt (DT)
[ 196.601040] ==================================================================
Home
[ 231.590527] ==================================================================
[ 231.593145] BUG: KFENCE: use-after-free read in test_krealloc+0x2b8/0x4e8
[ 231.593145]
[ 231.595199] Use-after-free read at 0x00000000b5e97b6f (in kfence-#250):
[ 231.599220] test_krealloc+0x2b8/0x4e8
[ 231.603614] kunit_try_run_case+0xf8/0x260
[ 231.605186] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 231.610440] kthread+0x18c/0x1a8
[ 231.611464] ret_from_fork+0x10/0x20
[ 231.612600]
[ 231.613189] kfence-#250: 0x00000000b5e97b6f-0x000000002f976c78, size=32, cache=kmalloc-32
[ 231.613189]
[ 231.615144] allocated by task 278 on cpu 0 at 231.582283s:
[ 231.616990] test_alloc+0x224/0x3d8
[ 231.618164] test_krealloc+0xc0/0x4e8
[ 231.619377] kunit_try_run_case+0xf8/0x260
[ 231.620631] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 231.622175] kthread+0x18c/0x1a8
[ 231.623149] ret_from_fork+0x10/0x20
[ 231.625113]
[ 231.625692] freed by task 278 on cpu 0 at 231.582967s:
[ 231.628235] krealloc+0xa8/0x1a0
[ 231.629425] test_krealloc+0x128/0x4e8
[ 231.630641] kunit_try_run_case+0xf8/0x260
[ 231.631926] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 231.633440] kthread+0x18c/0x1a8
[ 231.634402] ret_from_fork+0x10/0x20
[ 231.635535]
[ 231.636142] CPU: 1 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 231.638092] Hardware name: linux,dummy-virt (DT)
[ 231.639279] ==================================================================
Home
[ 231.386214] ==================================================================
[ 231.387571] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x148/0x368
[ 231.387571]
[ 231.389692] Use-after-free read at 0x00000000d9714e1f (in kfence-#248):
[ 231.391092] test_memcache_typesafe_by_rcu+0x148/0x368
[ 231.394694] kunit_try_run_case+0xf8/0x260
[ 231.397234] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 231.399281] kthread+0x18c/0x1a8
[ 231.400409] ret_from_fork+0x10/0x20
[ 231.401672]
[ 231.402292] kfence-#248: 0x00000000d9714e1f-0x00000000a76db64f, size=32, cache=test
[ 231.402292]
[ 231.403971] allocated by task 276 on cpu 1 at 231.369547s:
[ 231.405438] test_alloc+0x1b8/0x3d8
[ 231.407650] test_memcache_typesafe_by_rcu+0xe8/0x368
[ 231.409190] kunit_try_run_case+0xf8/0x260
[ 231.410481] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 231.412064] kthread+0x18c/0x1a8
[ 231.413023] ret_from_fork+0x10/0x20
[ 231.416110]
[ 231.416803] freed by task 0 on cpu 1 at 231.384925s:
[ 231.421987] rcu_guarded_free+0x34/0x50
[ 231.423246] rcu_core+0x448/0xf40
[ 231.424393] rcu_core_si+0x18/0x30
[ 231.425571] handle_softirqs+0x240/0x678
[ 231.427393] __do_softirq+0x1c/0x28
[ 231.428501] ____do_softirq+0x18/0x30
[ 231.429646] call_on_irq_stack+0x24/0x58
[ 231.432090] do_softirq_own_stack+0x24/0x38
[ 231.433366] irq_exit_rcu+0x110/0x160
[ 231.434550] el1_interrupt+0x38/0x58
[ 231.436324] el1h_64_irq_handler+0x18/0x28
[ 231.437497] el1h_64_irq+0x64/0x68
[ 231.438541] arch_local_irq_enable+0x4/0x8
[ 231.439674] do_idle+0x304/0x388
[ 231.441457] cpu_startup_entry+0x44/0x58
[ 231.442917] secondary_start_kernel+0x1e8/0x228
[ 231.444558] __secondary_switched+0xb8/0xc0
[ 231.446105]
[ 231.446854] CPU: 1 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 231.448881] Hardware name: linux,dummy-virt (DT)
[ 231.449911] ==================================================================
Home
[ 196.782434] ==================================================================
[ 196.783682] BUG: KFENCE: use-after-free read in test_use_after_free_read+0xf0/0x1c8
[ 196.783682]
[ 196.785546] Use-after-free read at 0x00000000976b97ed (in kfence-#28):
[ 196.787182] test_use_after_free_read+0xf0/0x1c8
[ 196.788479] kunit_try_run_case+0xf8/0x260
[ 196.789795] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 196.791237] kthread+0x18c/0x1a8
[ 196.792245] ret_from_fork+0x10/0x20
[ 196.793286]
[ 196.793886] kfence-#28: 0x00000000976b97ed-0x00000000a736476b, size=32, cache=test
[ 196.793886]
[ 196.795629] allocated by task 242 on cpu 1 at 196.781702s:
[ 196.797178] test_alloc+0x1b8/0x3d8
[ 196.798308] test_use_after_free_read+0xc8/0x1c8
[ 196.799560] kunit_try_run_case+0xf8/0x260
[ 196.800807] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 196.802327] kthread+0x18c/0x1a8
[ 196.803325] ret_from_fork+0x10/0x20
[ 196.804416]
[ 196.805030] freed by task 242 on cpu 1 at 196.782093s:
[ 196.806817] test_use_after_free_read+0xe8/0x1c8
[ 196.807952] kunit_try_run_case+0xf8/0x260
[ 196.809110] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 196.810582] kthread+0x18c/0x1a8
[ 196.811510] ret_from_fork+0x10/0x20
[ 196.812697]
[ 196.813311] CPU: 1 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 196.815095] Hardware name: linux,dummy-virt (DT)
[ 196.816158] ==================================================================
Home
[ 196.678675] ==================================================================
[ 196.680109] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x150/0x1c8
[ 196.680109]
[ 196.682004] Use-after-free read at 0x00000000fb4d104d (in kfence-#25):
[ 196.683533] test_use_after_free_read+0x150/0x1c8
[ 196.685083] kunit_try_run_case+0xf8/0x260
[ 196.686318] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 196.687758] kthread+0x18c/0x1a8
[ 196.688762] ret_from_fork+0x10/0x20
[ 196.689854]
[ 196.690495] kfence-#25: 0x00000000fb4d104d-0x0000000038882d26, size=32, cache=kmalloc-32
[ 196.690495]
[ 196.692354] allocated by task 240 on cpu 0 at 196.677834s:
[ 196.694057] test_alloc+0x224/0x3d8
[ 196.695061] test_use_after_free_read+0xc8/0x1c8
[ 196.696402] kunit_try_run_case+0xf8/0x260
[ 196.697673] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 196.699116] kthread+0x18c/0x1a8
[ 196.700110] ret_from_fork+0x10/0x20
[ 196.701170]
[ 196.701752] freed by task 240 on cpu 0 at 196.678294s:
[ 196.703588] test_use_after_free_read+0x148/0x1c8
[ 196.704718] kunit_try_run_case+0xf8/0x260
[ 196.705957] kunit_generic_run_threadfn_adapter+0x38/0x60
[ 196.707399] kthread+0x18c/0x1a8
[ 196.708414] ret_from_fork+0x10/0x20
[ 196.709510]
[ 196.710108] CPU: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 196.711916] Hardware name: linux,dummy-virt (DT)
[ 196.713038] ==================================================================
Home
------------[ cut here ]------------
[ 298.064568] WARNING: CPU: 0 PID: 1425 at drivers/gpu/drm/drm_rect.c:138 drm_rect_calc_hscale+0x54/0x68
[ 298.065815] Modules linked in:
[ 298.066281] CPU: 0 PID: 1425 Comm: kunit_try_catch Tainted: G B W N 6.6.74-rc1 #1
[ 298.066739] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 298.067884] EIP: drm_rect_calc_hscale+0x54/0x68
[ 298.068447] Code: 99 f7 f9 89 c1 39 cb 7f 2d 39 4d 08 7c 28 5b 89 c8 5d c3 8d b4 26 00 00 00 00 8d 44 08 ff 99 f7 f9 85 c0 89 c1 79 de eb e5 90 <0f> 0b 5b b9 ea ff ff ff 89 c8 5d c3 b9 de ff ff ff eb d1 90 3e 8d
[ 298.069955] EAX: 00010000 EBX: 00000000 ECX: ffff0000 EDX: ffff0000
[ 298.070435] ESI: c1179d38 EDI: 7fffffff EBP: c30b1ebc ESP: c30b1eb8
[ 298.070909] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00010286
[ 298.071788] CR0: 80050033 CR2: f59c8000 CR3: 19a35000 CR4: 000006d0
[ 298.072094] DR0: d9a94800 DR1: d9a94801 DR2: d9a94803 DR3: d9a94805
[ 298.072331] DR6: ffff0ff0 DR7: 00000600
[ 298.072843] Call Trace:
[ 298.073562] ? show_regs+0x52/0x5c
[ 298.073889] ? drm_rect_calc_hscale+0x54/0x68
[ 298.074278] ? __warn+0x89/0x15c
[ 298.074518] ? drm_rect_calc_hscale+0x54/0x68
[ 298.074953] ? drm_rect_calc_hscale+0x54/0x68
[ 298.075572] ? report_bug+0x189/0x1b0
[ 298.075772] ? drm_rect_calc_hscale+0x55/0x68
[ 298.075964] ? exc_overflow+0x50/0x50
[ 298.076476] ? handle_bug+0x56/0x90
[ 298.077004] ? exc_invalid_op+0x1b/0x70
[ 298.077338] ? handle_exception+0x133/0x133
[ 298.077599] ? exc_overflow+0x50/0x50
[ 298.077823] ? drm_rect_calc_hscale+0x54/0x68
[ 298.077914] ? exc_overflow+0x50/0x50
[ 298.077914] ? drm_rect_calc_hscale+0x54/0x68
[ 298.077914] drm_test_rect_calc_hscale+0x38/0xa8
[ 298.079605] ? ktime_get_ts64+0x4f/0x178
[ 298.079963] kunit_try_run_case+0x8a/0x1c4
[ 298.080536] ? _raw_spin_lock_irqsave+0x28/0x6c
[ 298.081259] ? _raw_spin_unlock_irqrestore+0x1a/0x40
[ 298.081686] ? preempt_count_sub+0x54/0x78
[ 298.081981] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 298.082166] kthread+0xe0/0x108
[ 298.082166] ? kunit_try_catch_throw+0x1c/0x1c
[ 298.082166] ? kthread_complete_and_exit+0x1c/0x1c
[ 298.082166] ret_from_fork+0x40/0x4c
[ 298.083760] ? kthread_complete_and_exit+0x1c/0x1c
[ 298.085447] ret_from_fork_asm+0x12/0x18
[ 298.086140] entry_INT80_32+0xf0/0xf0
[ 298.087230] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[ 298.034129] WARNING: CPU: 0 PID: 1423 at drivers/gpu/drm/drm_rect.c:138 drm_rect_calc_hscale+0x54/0x68
[ 298.034129] Modules linked in:
[ 298.036123] CPU: 0 PID: 1423 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 298.036846] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 298.037635] EIP: drm_rect_calc_hscale+0x54/0x68
[ 298.038397] Code: 99 f7 f9 89 c1 39 cb 7f 2d 39 4d 08 7c 28 5b 89 c8 5d c3 8d b4 26 00 00 00 00 8d 44 08 ff 99 f7 f9 85 c0 89 c1 79 de eb e5 90 <0f> 0b 5b b9 ea ff ff ff 89 c8 5d c3 b9 de ff ff ff eb d1 90 3e 8d
[ 298.039800] EAX: ffff0000 EBX: 00000000 ECX: 00010000 EDX: ffff0000
[ 298.040478] ESI: c1179d38 EDI: 7fffffff EBP: c30bbebc ESP: c30bbeb8
[ 298.040972] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00010286
[ 298.041318] CR0: 80050033 CR2: f59c8000 CR3: 19a35000 CR4: 000006d0
[ 298.041318] DR0: d9a94800 DR1: d9a94801 DR2: d9a94803 DR3: d9a94805
[ 298.041318] DR6: ffff0ff0 DR7: 00000600
[ 298.041318] Call Trace:
[ 298.044461] ? show_regs+0x52/0x5c
[ 298.044870] ? drm_rect_calc_hscale+0x54/0x68
[ 298.045500] ? __warn+0x89/0x15c
[ 298.045807] ? drm_rect_calc_hscale+0x54/0x68
[ 298.046613] ? drm_rect_calc_hscale+0x54/0x68
[ 298.047235] ? report_bug+0x189/0x1b0
[ 298.047666] ? drm_rect_calc_hscale+0x55/0x68
[ 298.048267] ? exc_overflow+0x50/0x50
[ 298.048732] ? handle_bug+0x56/0x90
[ 298.048928] ? exc_invalid_op+0x1b/0x70
[ 298.049587] ? dequeue_entity+0x172/0x570
[ 298.050227] ? sched_clock_cpu+0x75/0x3b4
[ 298.050650] ? handle_exception+0x133/0x133
[ 298.051291] ? exc_overflow+0x50/0x50
[ 298.051756] ? drm_rect_calc_hscale+0x54/0x68
[ 298.052160] ? exc_overflow+0x50/0x50
[ 298.052690] ? drm_rect_calc_hscale+0x54/0x68
[ 298.053267] drm_test_rect_calc_hscale+0x38/0xa8
[ 298.053832] ? ktime_get_ts64+0x4f/0x178
[ 298.054270] kunit_try_run_case+0x8a/0x1c4
[ 298.054704] ? ttwu_queue_wakelist+0xe3/0xe8
[ 298.055484] ? _raw_spin_lock_irqsave+0x28/0x6c
[ 298.055936] ? _raw_spin_unlock_irqrestore+0x1a/0x40
[ 298.056621] ? preempt_count_sub+0x54/0x78
[ 298.056914] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 298.057556] kthread+0xe0/0x108
[ 298.057958] ? kunit_try_catch_throw+0x1c/0x1c
[ 298.058190] ? kthread_complete_and_exit+0x1c/0x1c
[ 298.058443] ret_from_fork+0x40/0x4c
[ 298.058489] ? kthread_complete_and_exit+0x1c/0x1c
[ 298.059254] ret_from_fork_asm+0x12/0x18
[ 298.059633] entry_INT80_32+0xf0/0xf0
[ 298.060486] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 298.034129] WARNING: CPU: 0 PID: 1423 at drivers/gpu/drm/drm_rect.c:138 drm_rect_calc_hscale+0x54/0x68
[ 298.034129] Modules linked in:
[ 298.036123] CPU: 0 PID: 1423 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 298.036846] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 298.037635] EIP: drm_rect_calc_hscale+0x54/0x68
[ 298.038397] Code: 99 f7 f9 89 c1 39 cb 7f 2d 39 4d 08 7c 28 5b 89 c8 5d c3 8d b4 26 00 00 00 00 8d 44 08 ff 99 f7 f9 85 c0 89 c1 79 de eb e5 90 <0f> 0b 5b b9 ea ff ff ff 89 c8 5d c3 b9 de ff ff ff eb d1 90 3e 8d
[ 298.039800] EAX: ffff0000 EBX: 00000000 ECX: 00010000 EDX: ffff0000
[ 298.040478] ESI: c1179d38 EDI: 7fffffff EBP: c30bbebc ESP: c30bbeb8
[ 298.040972] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00010286
[ 298.041318] CR0: 80050033 CR2: f59c8000 CR3: 19a35000 CR4: 000006d0
[ 298.041318] DR0: d9a94800 DR1: d9a94801 DR2: d9a94803 DR3: d9a94805
[ 298.041318] DR6: ffff0ff0 DR7: 00000600
[ 298.041318] Call Trace:
[ 298.044461] ? show_regs+0x52/0x5c
[ 298.044870] ? drm_rect_calc_hscale+0x54/0x68
[ 298.045500] ? __warn+0x89/0x15c
[ 298.045807] ? drm_rect_calc_hscale+0x54/0x68
[ 298.046613] ? drm_rect_calc_hscale+0x54/0x68
[ 298.047235] ? report_bug+0x189/0x1b0
[ 298.047666] ? drm_rect_calc_hscale+0x55/0x68
[ 298.048267] ? exc_overflow+0x50/0x50
[ 298.048732] ? handle_bug+0x56/0x90
[ 298.048928] ? exc_invalid_op+0x1b/0x70
[ 298.049587] ? dequeue_entity+0x172/0x570
[ 298.050227] ? sched_clock_cpu+0x75/0x3b4
[ 298.050650] ? handle_exception+0x133/0x133
[ 298.051291] ? exc_overflow+0x50/0x50
[ 298.051756] ? drm_rect_calc_hscale+0x54/0x68
[ 298.052160] ? exc_overflow+0x50/0x50
[ 298.052690] ? drm_rect_calc_hscale+0x54/0x68
[ 298.053267] drm_test_rect_calc_hscale+0x38/0xa8
[ 298.053832] ? ktime_get_ts64+0x4f/0x178
[ 298.054270] kunit_try_run_case+0x8a/0x1c4
[ 298.054704] ? ttwu_queue_wakelist+0xe3/0xe8
[ 298.055484] ? _raw_spin_lock_irqsave+0x28/0x6c
[ 298.055936] ? _raw_spin_unlock_irqrestore+0x1a/0x40
[ 298.056621] ? preempt_count_sub+0x54/0x78
[ 298.056914] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 298.057556] kthread+0xe0/0x108
[ 298.057958] ? kunit_try_catch_throw+0x1c/0x1c
[ 298.058190] ? kthread_complete_and_exit+0x1c/0x1c
[ 298.058443] ret_from_fork+0x40/0x4c
[ 298.058489] ? kthread_complete_and_exit+0x1c/0x1c
[ 298.059254] ret_from_fork_asm+0x12/0x18
[ 298.059633] entry_INT80_32+0xf0/0xf0
[ 298.060486] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 298.064568] WARNING: CPU: 0 PID: 1425 at drivers/gpu/drm/drm_rect.c:138 drm_rect_calc_hscale+0x54/0x68
[ 298.065815] Modules linked in:
[ 298.066281] CPU: 0 PID: 1425 Comm: kunit_try_catch Tainted: G B W N 6.6.74-rc1 #1
[ 298.066739] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 298.067884] EIP: drm_rect_calc_hscale+0x54/0x68
[ 298.068447] Code: 99 f7 f9 89 c1 39 cb 7f 2d 39 4d 08 7c 28 5b 89 c8 5d c3 8d b4 26 00 00 00 00 8d 44 08 ff 99 f7 f9 85 c0 89 c1 79 de eb e5 90 <0f> 0b 5b b9 ea ff ff ff 89 c8 5d c3 b9 de ff ff ff eb d1 90 3e 8d
[ 298.069955] EAX: 00010000 EBX: 00000000 ECX: ffff0000 EDX: ffff0000
[ 298.070435] ESI: c1179d38 EDI: 7fffffff EBP: c30b1ebc ESP: c30b1eb8
[ 298.070909] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00010286
[ 298.071788] CR0: 80050033 CR2: f59c8000 CR3: 19a35000 CR4: 000006d0
[ 298.072094] DR0: d9a94800 DR1: d9a94801 DR2: d9a94803 DR3: d9a94805
[ 298.072331] DR6: ffff0ff0 DR7: 00000600
[ 298.072843] Call Trace:
[ 298.073562] ? show_regs+0x52/0x5c
[ 298.073889] ? drm_rect_calc_hscale+0x54/0x68
[ 298.074278] ? __warn+0x89/0x15c
[ 298.074518] ? drm_rect_calc_hscale+0x54/0x68
[ 298.074953] ? drm_rect_calc_hscale+0x54/0x68
[ 298.075572] ? report_bug+0x189/0x1b0
[ 298.075772] ? drm_rect_calc_hscale+0x55/0x68
[ 298.075964] ? exc_overflow+0x50/0x50
[ 298.076476] ? handle_bug+0x56/0x90
[ 298.077004] ? exc_invalid_op+0x1b/0x70
[ 298.077338] ? handle_exception+0x133/0x133
[ 298.077599] ? exc_overflow+0x50/0x50
[ 298.077823] ? drm_rect_calc_hscale+0x54/0x68
[ 298.077914] ? exc_overflow+0x50/0x50
[ 298.077914] ? drm_rect_calc_hscale+0x54/0x68
[ 298.077914] drm_test_rect_calc_hscale+0x38/0xa8
[ 298.079605] ? ktime_get_ts64+0x4f/0x178
[ 298.079963] kunit_try_run_case+0x8a/0x1c4
[ 298.080536] ? _raw_spin_lock_irqsave+0x28/0x6c
[ 298.081259] ? _raw_spin_unlock_irqrestore+0x1a/0x40
[ 298.081686] ? preempt_count_sub+0x54/0x78
[ 298.081981] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 298.082166] kthread+0xe0/0x108
[ 298.082166] ? kunit_try_catch_throw+0x1c/0x1c
[ 298.082166] ? kthread_complete_and_exit+0x1c/0x1c
[ 298.082166] ret_from_fork+0x40/0x4c
[ 298.083760] ? kthread_complete_and_exit+0x1c/0x1c
[ 298.085447] ret_from_fork_asm+0x12/0x18
[ 298.086140] entry_INT80_32+0xf0/0xf0
[ 298.087230] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 298.101269] WARNING: CPU: 1 PID: 1435 at drivers/gpu/drm/drm_rect.c:138 drm_rect_calc_vscale+0x50/0x70
[ 298.102837] Modules linked in:
[ 298.104029] CPU: 1 PID: 1435 Comm: kunit_try_catch Tainted: G B W N 6.6.74-rc1 #1
[ 298.104788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 298.105268] EIP: drm_rect_calc_vscale+0x50/0x70
[ 298.105557] Code: e2 10 39 d0 7f 14 99 f7 f9 89 c1 39 cb 7f 27 39 4d 08 7c 22 5b 89 c8 5d c3 90 8d 44 08 ff 99 f7 f9 85 c0 89 c1 79 e4 eb eb 90 <0f> 0b 5b b9 ea ff ff ff 89 c8 5d c3 b9 de ff ff ff eb d7 cc cc cc
[ 298.107266] EAX: ffff0000 EBX: 00000000 ECX: 00010000 EDX: ffff0000
[ 298.107843] ESI: c1179d38 EDI: 7fffffff EBP: c30c1ebc ESP: c30c1eb8
[ 298.108617] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00010286
[ 298.109498] CR0: 80050033 CR2: f59c6fe0 CR3: 19a35000 CR4: 000006d0
[ 298.110183] DR0: d9a94804 DR1: d9a94809 DR2: d9a9480a DR3: d9a9480b
[ 298.110794] DR6: ffff0ff0 DR7: 00000600
[ 298.111379] Call Trace:
[ 298.111681] ? show_regs+0x52/0x5c
[ 298.112242] ? drm_rect_calc_vscale+0x50/0x70
[ 298.112678] ? __warn+0x89/0x15c
[ 298.113277] ? drm_rect_calc_vscale+0x50/0x70
[ 298.113709] ? drm_rect_calc_vscale+0x50/0x70
[ 298.114415] ? report_bug+0x189/0x1b0
[ 298.114787] ? drm_rect_calc_vscale+0x51/0x70
[ 298.115511] ? exc_overflow+0x50/0x50
[ 298.115892] ? handle_bug+0x56/0x90
[ 298.116478] ? exc_invalid_op+0x1b/0x70
[ 298.116933] ? dequeue_entity+0x172/0x570
[ 298.117477] ? sched_clock_cpu+0x75/0x3b4
[ 298.117920] ? handle_exception+0x133/0x133
[ 298.118624] ? exc_overflow+0x50/0x50
[ 298.119018] ? drm_rect_calc_vscale+0x50/0x70
[ 298.119686] ? exc_overflow+0x50/0x50
[ 298.120238] ? drm_rect_calc_vscale+0x50/0x70
[ 298.120645] drm_test_rect_calc_vscale+0x38/0xac
[ 298.121305] ? ktime_get_ts64+0x4f/0x178
[ 298.121891] kunit_try_run_case+0x8a/0x1c4
[ 298.122478] ? ttwu_queue_wakelist+0xe3/0xe8
[ 298.123151] ? _raw_spin_lock_irqsave+0x28/0x6c
[ 298.123638] ? _raw_spin_unlock_irqrestore+0x1a/0x40
[ 298.124018] ? preempt_count_sub+0x54/0x78
[ 298.124550] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 298.125237] kthread+0xe0/0x108
[ 298.125591] ? kunit_try_catch_throw+0x1c/0x1c
[ 298.126218] ? kthread_complete_and_exit+0x1c/0x1c
[ 298.126574] ret_from_fork+0x40/0x4c
[ 298.126754] ? kthread_complete_and_exit+0x1c/0x1c
[ 298.126964] ret_from_fork_asm+0x12/0x18
[ 298.127437] entry_INT80_32+0xf0/0xf0
[ 298.127863] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[ 298.131974] WARNING: CPU: 0 PID: 1437 at drivers/gpu/drm/drm_rect.c:138 drm_rect_calc_vscale+0x50/0x70
[ 298.132475] Modules linked in:
[ 298.132475] CPU: 0 PID: 1437 Comm: kunit_try_catch Tainted: G B W N 6.6.74-rc1 #1
[ 298.133619] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 298.134022] EIP: drm_rect_calc_vscale+0x50/0x70
[ 298.134723] Code: e2 10 39 d0 7f 14 99 f7 f9 89 c1 39 cb 7f 27 39 4d 08 7c 22 5b 89 c8 5d c3 90 8d 44 08 ff 99 f7 f9 85 c0 89 c1 79 e4 eb eb 90 <0f> 0b 5b b9 ea ff ff ff 89 c8 5d c3 b9 de ff ff ff eb d7 cc cc cc
[ 298.135782] EAX: 00010000 EBX: 00000000 ECX: ffff0000 EDX: ffff0000
[ 298.136280] ESI: c1179d38 EDI: 7fffffff EBP: c30b9ebc ESP: c30b9eb8
[ 298.136649] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00010286
[ 298.136651] CR0: 80050033 CR2: f59c8000 CR3: 19a35000 CR4: 000006d0
[ 298.136651] DR0: d9a94800 DR1: d9a94801 DR2: d9a94803 DR3: d9a94805
[ 298.136651] DR6: ffff0ff0 DR7: 00000600
[ 298.138362] Call Trace:
[ 298.138633] ? show_regs+0x52/0x5c
[ 298.139633] ? drm_rect_calc_vscale+0x50/0x70
[ 298.140805] ? __warn+0x89/0x15c
[ 298.141883] ? drm_rect_calc_vscale+0x50/0x70
[ 298.142613] ? drm_rect_calc_vscale+0x50/0x70
[ 298.143489] ? report_bug+0x189/0x1b0
[ 298.143865] ? drm_rect_calc_vscale+0x51/0x70
[ 298.144429] ? exc_overflow+0x50/0x50
[ 298.144783] ? handle_bug+0x56/0x90
[ 298.144959] ? exc_invalid_op+0x1b/0x70
[ 298.145400] ? dequeue_entity+0x172/0x570
[ 298.145796] ? sched_clock_cpu+0x75/0x3b4
[ 298.146362] ? handle_exception+0x133/0x133
[ 298.146755] ? exc_overflow+0x50/0x50
[ 298.147630] ? drm_rect_calc_vscale+0x50/0x70
[ 298.148002] ? exc_overflow+0x50/0x50
[ 298.149255] ? drm_rect_calc_vscale+0x50/0x70
[ 298.149653] drm_test_rect_calc_vscale+0x38/0xac
[ 298.149860] ? ktime_get_ts64+0x4f/0x178
[ 298.150174] kunit_try_run_case+0x8a/0x1c4
[ 298.150174] ? ttwu_queue_wakelist+0xe3/0xe8
[ 298.150174] ? _raw_spin_lock_irqsave+0x28/0x6c
[ 298.151418] ? _raw_spin_unlock_irqrestore+0x1a/0x40
[ 298.151735] ? preempt_count_sub+0x54/0x78
[ 298.151948] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 298.152579] kthread+0xe0/0x108
[ 298.152749] ? kunit_try_catch_throw+0x1c/0x1c
[ 298.153317] ? kthread_complete_and_exit+0x1c/0x1c
[ 298.153710] ret_from_fork+0x40/0x4c
[ 298.154008] ? kthread_complete_and_exit+0x1c/0x1c
[ 298.154486] ret_from_fork_asm+0x12/0x18
[ 298.154774] entry_INT80_32+0xf0/0xf0
[ 298.155443] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 298.101269] WARNING: CPU: 1 PID: 1435 at drivers/gpu/drm/drm_rect.c:138 drm_rect_calc_vscale+0x50/0x70
[ 298.102837] Modules linked in:
[ 298.104029] CPU: 1 PID: 1435 Comm: kunit_try_catch Tainted: G B W N 6.6.74-rc1 #1
[ 298.104788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 298.105268] EIP: drm_rect_calc_vscale+0x50/0x70
[ 298.105557] Code: e2 10 39 d0 7f 14 99 f7 f9 89 c1 39 cb 7f 27 39 4d 08 7c 22 5b 89 c8 5d c3 90 8d 44 08 ff 99 f7 f9 85 c0 89 c1 79 e4 eb eb 90 <0f> 0b 5b b9 ea ff ff ff 89 c8 5d c3 b9 de ff ff ff eb d7 cc cc cc
[ 298.107266] EAX: ffff0000 EBX: 00000000 ECX: 00010000 EDX: ffff0000
[ 298.107843] ESI: c1179d38 EDI: 7fffffff EBP: c30c1ebc ESP: c30c1eb8
[ 298.108617] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00010286
[ 298.109498] CR0: 80050033 CR2: f59c6fe0 CR3: 19a35000 CR4: 000006d0
[ 298.110183] DR0: d9a94804 DR1: d9a94809 DR2: d9a9480a DR3: d9a9480b
[ 298.110794] DR6: ffff0ff0 DR7: 00000600
[ 298.111379] Call Trace:
[ 298.111681] ? show_regs+0x52/0x5c
[ 298.112242] ? drm_rect_calc_vscale+0x50/0x70
[ 298.112678] ? __warn+0x89/0x15c
[ 298.113277] ? drm_rect_calc_vscale+0x50/0x70
[ 298.113709] ? drm_rect_calc_vscale+0x50/0x70
[ 298.114415] ? report_bug+0x189/0x1b0
[ 298.114787] ? drm_rect_calc_vscale+0x51/0x70
[ 298.115511] ? exc_overflow+0x50/0x50
[ 298.115892] ? handle_bug+0x56/0x90
[ 298.116478] ? exc_invalid_op+0x1b/0x70
[ 298.116933] ? dequeue_entity+0x172/0x570
[ 298.117477] ? sched_clock_cpu+0x75/0x3b4
[ 298.117920] ? handle_exception+0x133/0x133
[ 298.118624] ? exc_overflow+0x50/0x50
[ 298.119018] ? drm_rect_calc_vscale+0x50/0x70
[ 298.119686] ? exc_overflow+0x50/0x50
[ 298.120238] ? drm_rect_calc_vscale+0x50/0x70
[ 298.120645] drm_test_rect_calc_vscale+0x38/0xac
[ 298.121305] ? ktime_get_ts64+0x4f/0x178
[ 298.121891] kunit_try_run_case+0x8a/0x1c4
[ 298.122478] ? ttwu_queue_wakelist+0xe3/0xe8
[ 298.123151] ? _raw_spin_lock_irqsave+0x28/0x6c
[ 298.123638] ? _raw_spin_unlock_irqrestore+0x1a/0x40
[ 298.124018] ? preempt_count_sub+0x54/0x78
[ 298.124550] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 298.125237] kthread+0xe0/0x108
[ 298.125591] ? kunit_try_catch_throw+0x1c/0x1c
[ 298.126218] ? kthread_complete_and_exit+0x1c/0x1c
[ 298.126574] ret_from_fork+0x40/0x4c
[ 298.126754] ? kthread_complete_and_exit+0x1c/0x1c
[ 298.126964] ret_from_fork_asm+0x12/0x18
[ 298.127437] entry_INT80_32+0xf0/0xf0
[ 298.127863] ---[ end trace 0000000000000000 ]---
---
------------[ cut here ]------------
[ 298.131974] WARNING: CPU: 0 PID: 1437 at drivers/gpu/drm/drm_rect.c:138 drm_rect_calc_vscale+0x50/0x70
[ 298.132475] Modules linked in:
[ 298.132475] CPU: 0 PID: 1437 Comm: kunit_try_catch Tainted: G B W N 6.6.74-rc1 #1
[ 298.133619] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 298.134022] EIP: drm_rect_calc_vscale+0x50/0x70
[ 298.134723] Code: e2 10 39 d0 7f 14 99 f7 f9 89 c1 39 cb 7f 27 39 4d 08 7c 22 5b 89 c8 5d c3 90 8d 44 08 ff 99 f7 f9 85 c0 89 c1 79 e4 eb eb 90 <0f> 0b 5b b9 ea ff ff ff 89 c8 5d c3 b9 de ff ff ff eb d7 cc cc cc
[ 298.135782] EAX: 00010000 EBX: 00000000 ECX: ffff0000 EDX: ffff0000
[ 298.136280] ESI: c1179d38 EDI: 7fffffff EBP: c30b9ebc ESP: c30b9eb8
[ 298.136649] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00010286
[ 298.136651] CR0: 80050033 CR2: f59c8000 CR3: 19a35000 CR4: 000006d0
[ 298.136651] DR0: d9a94800 DR1: d9a94801 DR2: d9a94803 DR3: d9a94805
[ 298.136651] DR6: ffff0ff0 DR7: 00000600
[ 298.138362] Call Trace:
[ 298.138633] ? show_regs+0x52/0x5c
[ 298.139633] ? drm_rect_calc_vscale+0x50/0x70
[ 298.140805] ? __warn+0x89/0x15c
[ 298.141883] ? drm_rect_calc_vscale+0x50/0x70
[ 298.142613] ? drm_rect_calc_vscale+0x50/0x70
[ 298.143489] ? report_bug+0x189/0x1b0
[ 298.143865] ? drm_rect_calc_vscale+0x51/0x70
[ 298.144429] ? exc_overflow+0x50/0x50
[ 298.144783] ? handle_bug+0x56/0x90
[ 298.144959] ? exc_invalid_op+0x1b/0x70
[ 298.145400] ? dequeue_entity+0x172/0x570
[ 298.145796] ? sched_clock_cpu+0x75/0x3b4
[ 298.146362] ? handle_exception+0x133/0x133
[ 298.146755] ? exc_overflow+0x50/0x50
[ 298.147630] ? drm_rect_calc_vscale+0x50/0x70
[ 298.148002] ? exc_overflow+0x50/0x50
[ 298.149255] ? drm_rect_calc_vscale+0x50/0x70
[ 298.149653] drm_test_rect_calc_vscale+0x38/0xac
[ 298.149860] ? ktime_get_ts64+0x4f/0x178
[ 298.150174] kunit_try_run_case+0x8a/0x1c4
[ 298.150174] ? ttwu_queue_wakelist+0xe3/0xe8
[ 298.150174] ? _raw_spin_lock_irqsave+0x28/0x6c
[ 298.151418] ? _raw_spin_unlock_irqrestore+0x1a/0x40
[ 298.151735] ? preempt_count_sub+0x54/0x78
[ 298.151948] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 298.152579] kthread+0xe0/0x108
[ 298.152749] ? kunit_try_catch_throw+0x1c/0x1c
[ 298.153317] ? kthread_complete_and_exit+0x1c/0x1c
[ 298.153710] ret_from_fork+0x40/0x4c
[ 298.154008] ? kthread_complete_and_exit+0x1c/0x1c
[ 298.154486] ret_from_fork_asm+0x12/0x18
[ 298.154774] entry_INT80_32+0xf0/0xf0
[ 298.155443] ---[ end trace 0000000000000000 ]---
Home
[ 26.251677] ==================================================================
[ 26.252085] BUG: KFENCE: invalid free in test_double_free+0x75/0x130
[ 26.252085]
[ 26.252125] Invalid free of 0x(ptrval) (in kfence-#38):
[ 26.252125] test_double_free+0x75/0x130
[ 26.252125] kunit_try_run_case+0x8a/0x1c4
[ 26.252125] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 26.252125] kthread+0xe0/0x108
[ 26.252125] ret_from_fork+0x40/0x4c
[ 26.252125] ret_from_fork_asm+0x12/0x18
[ 26.252125] restore_all_switch_stack+0x0/0xc3
[ 26.252125]
[ 26.252125] kfence-#38: 0x(ptrval)-0x(ptrval), size=32, cache=test
[ 26.252125]
[ 26.252125] allocated by task 149 on cpu 1 at 26.251515s:
[ 26.252125] test_alloc+0xed/0x2d4
[ 26.252125] test_double_free+0x50/0x130
[ 26.252125] kunit_try_run_case+0x8a/0x1c4
[ 26.252125] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 26.252125] kthread+0xe0/0x108
[ 26.252125] ret_from_fork+0x40/0x4c
[ 26.252125] ret_from_fork_asm+0x12/0x18
[ 26.252125] restore_all_switch_stack+0x0/0xc3
[ 26.252125]
[ 26.252125] freed by task 149 on cpu 1 at 26.251573s:
[ 26.252125] test_double_free+0x65/0x130
[ 26.252125] kunit_try_run_case+0x8a/0x1c4
[ 26.252125] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 26.252125] kthread+0xe0/0x108
[ 26.252125] ret_from_fork+0x40/0x4c
[ 26.252125] ret_from_fork_asm+0x12/0x18
[ 26.252125] restore_all_switch_stack+0x0/0xc3
[ 26.252125]
[ 26.252125] CPU: 1 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 26.252125] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.252125] ==================================================================
Home
[ 26.147737] ==================================================================
[ 26.148089] BUG: KFENCE: invalid free in test_double_free+0xb7/0x130
[ 26.148089]
[ 26.148089] Invalid free of 0x(ptrval) (in kfence-#37):
[ 26.148089] test_double_free+0xb7/0x130
[ 26.148089] kunit_try_run_case+0x8a/0x1c4
[ 26.148089] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 26.148089] kthread+0xe0/0x108
[ 26.148089] ret_from_fork+0x40/0x4c
[ 26.148089] ret_from_fork_asm+0x12/0x18
[ 26.148089] restore_all_switch_stack+0x0/0xc3
[ 26.148089]
[ 26.148089] kfence-#37: 0x(ptrval)-0x(ptrval), size=32, cache=kmalloc-32
[ 26.148089]
[ 26.148089] allocated by task 147 on cpu 0 at 26.147487s:
[ 26.148089] test_alloc+0x153/0x2d4
[ 26.148089] test_double_free+0x50/0x130
[ 26.148089] kunit_try_run_case+0x8a/0x1c4
[ 26.148089] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 26.148089] kthread+0xe0/0x108
[ 26.148089] ret_from_fork+0x40/0x4c
[ 26.148089] ret_from_fork_asm+0x12/0x18
[ 26.148089] restore_all_switch_stack+0x0/0xc3
[ 26.148089]
[ 26.148089] freed by task 147 on cpu 0 at 26.147558s:
[ 26.148089] test_double_free+0xa7/0x130
[ 26.148089] kunit_try_run_case+0x8a/0x1c4
[ 26.148089] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 26.148089] kthread+0xe0/0x108
[ 26.148089] ret_from_fork+0x40/0x4c
[ 26.148089] ret_from_fork_asm+0x12/0x18
[ 26.148089] restore_all_switch_stack+0x0/0xc3
[ 26.148089]
[ 26.148089] CPU: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 26.148089] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.148089] ==================================================================
Home
[ 26.459719] ==================================================================
[ 26.460115] BUG: KFENCE: invalid free in test_invalid_addr_free+0x66/0x130
[ 26.460115]
[ 26.460115] Invalid free of 0x(ptrval) (in kfence-#40):
[ 26.460115] test_invalid_addr_free+0x66/0x130
[ 26.460115] kunit_try_run_case+0x8a/0x1c4
[ 26.460115] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 26.460115] kthread+0xe0/0x108
[ 26.460115] ret_from_fork+0x40/0x4c
[ 26.460115] ret_from_fork_asm+0x12/0x18
[ 26.460115] restore_all_switch_stack+0x0/0xc3
[ 26.460115]
[ 26.460115] kfence-#40: 0x(ptrval)-0x(ptrval), size=32, cache=test
[ 26.460115]
[ 26.460115] allocated by task 153 on cpu 1 at 26.459583s:
[ 26.460115] test_alloc+0xed/0x2d4
[ 26.460115] test_invalid_addr_free+0x50/0x130
[ 26.460115] kunit_try_run_case+0x8a/0x1c4
[ 26.460115] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 26.460115] kthread+0xe0/0x108
[ 26.460115] ret_from_fork+0x40/0x4c
[ 26.460115] ret_from_fork_asm+0x12/0x18
[ 26.460115] restore_all_switch_stack+0x0/0xc3
[ 26.460115]
[ 26.460115] CPU: 1 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 26.460115] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.460115] ==================================================================
Home
[ 26.355625] ==================================================================
[ 26.356101] BUG: KFENCE: invalid free in test_invalid_addr_free+0xa7/0x130
[ 26.356101]
[ 26.356101] Invalid free of 0x(ptrval) (in kfence-#39):
[ 26.356101] test_invalid_addr_free+0xa7/0x130
[ 26.356101] kunit_try_run_case+0x8a/0x1c4
[ 26.356101] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 26.356101] kthread+0xe0/0x108
[ 26.356101] ret_from_fork+0x40/0x4c
[ 26.356101] ret_from_fork_asm+0x12/0x18
[ 26.356101] restore_all_switch_stack+0x0/0xc3
[ 26.356101]
[ 26.356101] kfence-#39: 0x(ptrval)-0x(ptrval), size=32, cache=kmalloc-32
[ 26.356101]
[ 26.356101] allocated by task 151 on cpu 1 at 26.355497s:
[ 26.356101] test_alloc+0x153/0x2d4
[ 26.356101] test_invalid_addr_free+0x50/0x130
[ 26.356101] kunit_try_run_case+0x8a/0x1c4
[ 26.356101] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 26.356101] kthread+0xe0/0x108
[ 26.356101] ret_from_fork+0x40/0x4c
[ 26.356101] ret_from_fork_asm+0x12/0x18
[ 26.356101] restore_all_switch_stack+0x0/0xc3
[ 26.356101]
[ 26.356101] CPU: 1 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 26.356101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.356101] ==================================================================
Home
[ 32.493754] ==================================================================
[ 32.494578] BUG: KFENCE: invalid read in test_invalid_access+0x3b/0xac
[ 32.494578]
[ 32.494578] Invalid read at 0x(ptrval):
[ 32.494578] test_invalid_access+0x3b/0xac
[ 32.494578] kunit_try_run_case+0x8a/0x1c4
[ 32.494578] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 32.494578] kthread+0xe0/0x108
[ 32.494578] ret_from_fork+0x40/0x4c
[ 32.494578] ret_from_fork_asm+0x12/0x18
[ 32.494578] restore_all_switch_stack+0x0/0xc3
[ 32.494578]
[ 32.494578] CPU: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 32.494578] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 32.494578] ==================================================================
Home
[ 26.979597] ==================================================================
[ 26.980113] BUG: KFENCE: memory corruption in test_corruption+0xad/0x1b0
[ 26.980113]
[ 26.980113] Corrupted memory at 0x(ptrval) [ ! ] (in kfence-#45):
[ 26.980113] test_corruption+0xad/0x1b0
[ 26.980113] kunit_try_run_case+0x8a/0x1c4
[ 26.980113] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 26.980113] kthread+0xe0/0x108
[ 26.980113] ret_from_fork+0x40/0x4c
[ 26.980113] ret_from_fork_asm+0x12/0x18
[ 26.980113] restore_all_switch_stack+0x0/0xc3
[ 26.980113]
[ 26.980113] kfence-#45: 0x(ptrval)-0x(ptrval), size=32, cache=test
[ 26.980113]
[ 26.980113] allocated by task 157 on cpu 1 at 26.979481s:
[ 26.980113] test_alloc+0xed/0x2d4
[ 26.980113] test_corruption+0x8f/0x1b0
[ 26.980113] kunit_try_run_case+0x8a/0x1c4
[ 26.980113] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 26.980113] kthread+0xe0/0x108
[ 26.980113] ret_from_fork+0x40/0x4c
[ 26.980113] ret_from_fork_asm+0x12/0x18
[ 26.980113] restore_all_switch_stack+0x0/0xc3
[ 26.980113]
[ 26.980113] freed by task 157 on cpu 1 at 26.979536s:
[ 26.980113] test_corruption+0xad/0x1b0
[ 26.980113] kunit_try_run_case+0x8a/0x1c4
[ 26.980113] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 26.980113] kthread+0xe0/0x108
[ 26.980113] ret_from_fork+0x40/0x4c
[ 26.980113] ret_from_fork_asm+0x12/0x18
[ 26.980113] restore_all_switch_stack+0x0/0xc3
[ 26.980113]
[ 26.980113] CPU: 1 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 26.980113] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.980113] ==================================================================
Home
[ 26.875611] ==================================================================
[ 26.876002] BUG: KFENCE: memory corruption in test_corruption+0x6b/0x1b0
[ 26.876002]
[ 26.876089] Corrupted memory at 0x(ptrval) [ ! . . . . . . . . . . . . . . . ] (in kfence-#44):
[ 26.876089] test_corruption+0x6b/0x1b0
[ 26.876089] kunit_try_run_case+0x8a/0x1c4
[ 26.876089] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 26.876089] kthread+0xe0/0x108
[ 26.876089] ret_from_fork+0x40/0x4c
[ 26.876089] ret_from_fork_asm+0x12/0x18
[ 26.876089] restore_all_switch_stack+0x0/0xc3
[ 26.876089]
[ 26.876089] kfence-#44: 0x(ptrval)-0x(ptrval), size=32, cache=test
[ 26.876089]
[ 26.876089] allocated by task 157 on cpu 1 at 26.875488s:
[ 26.876089] test_alloc+0xed/0x2d4
[ 26.876089] test_corruption+0x51/0x1b0
[ 26.876089] kunit_try_run_case+0x8a/0x1c4
[ 26.876089] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 26.876089] kthread+0xe0/0x108
[ 26.876089] ret_from_fork+0x40/0x4c
[ 26.876089] ret_from_fork_asm+0x12/0x18
[ 26.876089] restore_all_switch_stack+0x0/0xc3
[ 26.876089]
[ 26.876089] freed by task 157 on cpu 1 at 26.875551s:
[ 26.876089] test_corruption+0x6b/0x1b0
[ 26.876089] kunit_try_run_case+0x8a/0x1c4
[ 26.876089] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 26.876089] kthread+0xe0/0x108
[ 26.876089] ret_from_fork+0x40/0x4c
[ 26.876089] ret_from_fork_asm+0x12/0x18
[ 26.876089] restore_all_switch_stack+0x0/0xc3
[ 26.876089]
[ 26.876089] CPU: 1 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 26.876089] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.876089] ==================================================================
Home
[ 26.563719] ==================================================================
[ 26.564091] BUG: KFENCE: memory corruption in test_corruption+0xdf/0x1b0
[ 26.564091]
[ 26.564091] Corrupted memory at 0x(ptrval) [ ! . . . . . . . . . . . . . . . ] (in kfence-#41):
[ 26.564091] test_corruption+0xdf/0x1b0
[ 26.564091] kunit_try_run_case+0x8a/0x1c4
[ 26.564091] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 26.564091] kthread+0xe0/0x108
[ 26.564091] ret_from_fork+0x40/0x4c
[ 26.564091] ret_from_fork_asm+0x12/0x18
[ 26.564091] restore_all_switch_stack+0x0/0xc3
[ 26.564091]
[ 26.564091] kfence-#41: 0x(ptrval)-0x(ptrval), size=32, cache=kmalloc-32
[ 26.564091]
[ 26.564091] allocated by task 155 on cpu 0 at 26.563478s:
[ 26.564091] test_alloc+0x153/0x2d4
[ 26.564091] test_corruption+0x51/0x1b0
[ 26.564091] kunit_try_run_case+0x8a/0x1c4
[ 26.564091] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 26.564091] kthread+0xe0/0x108
[ 26.564091] ret_from_fork+0x40/0x4c
[ 26.564091] ret_from_fork_asm+0x12/0x18
[ 26.564091] restore_all_switch_stack+0x0/0xc3
[ 26.564091]
[ 26.564091] freed by task 155 on cpu 0 at 26.563558s:
[ 26.564091] test_corruption+0xdf/0x1b0
[ 26.564091] kunit_try_run_case+0x8a/0x1c4
[ 26.564091] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 26.564091] kthread+0xe0/0x108
[ 26.564091] ret_from_fork+0x40/0x4c
[ 26.564091] ret_from_fork_asm+0x12/0x18
[ 26.564091] restore_all_switch_stack+0x0/0xc3
[ 26.564091]
[ 26.564091] CPU: 0 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 26.564091] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.564091] ==================================================================
Home
[ 26.771791] ==================================================================
[ 26.772131] BUG: KFENCE: memory corruption in test_corruption+0x137/0x1b0
[ 26.772131]
[ 26.772131] Corrupted memory at 0x(ptrval) [ ! ] (in kfence-#43):
[ 26.772131] test_corruption+0x137/0x1b0
[ 26.772131] kunit_try_run_case+0x8a/0x1c4
[ 26.772131] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 26.772131] kthread+0xe0/0x108
[ 26.772131] ret_from_fork+0x40/0x4c
[ 26.772131] ret_from_fork_asm+0x12/0x18
[ 26.772131] restore_all_switch_stack+0x0/0xc3
[ 26.772131]
[ 26.772131] kfence-#43: 0x(ptrval)-0x(ptrval), size=32, cache=kmalloc-32
[ 26.772131]
[ 26.772131] allocated by task 155 on cpu 0 at 26.771539s:
[ 26.772131] test_alloc+0x153/0x2d4
[ 26.772131] test_corruption+0x8f/0x1b0
[ 26.772131] kunit_try_run_case+0x8a/0x1c4
[ 26.772131] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 26.772131] kthread+0xe0/0x108
[ 26.772131] ret_from_fork+0x40/0x4c
[ 26.772131] ret_from_fork_asm+0x12/0x18
[ 26.772131] restore_all_switch_stack+0x0/0xc3
[ 26.772131]
[ 26.772131] freed by task 155 on cpu 0 at 26.771621s:
[ 26.772131] test_corruption+0x137/0x1b0
[ 26.772131] kunit_try_run_case+0x8a/0x1c4
[ 26.772131] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 26.772131] kthread+0xe0/0x108
[ 26.772131] ret_from_fork+0x40/0x4c
[ 26.772131] ret_from_fork_asm+0x12/0x18
[ 26.772131] restore_all_switch_stack+0x0/0xc3
[ 26.772131]
[ 26.772131] CPU: 0 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 26.772131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.772131] ==================================================================
Home
[ 32.283687] ==================================================================
[ 32.284107] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x9f/0x140
[ 32.284107]
[ 32.284107] Corrupted memory at 0x(ptrval) [ ! . . . . . . ] (in kfence-#96):
[ 32.284107] test_kmalloc_aligned_oob_write+0x9f/0x140
[ 32.284107] kunit_try_run_case+0x8a/0x1c4
[ 32.284107] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 32.284107] kthread+0xe0/0x108
[ 32.284107] ret_from_fork+0x40/0x4c
[ 32.284107] ret_from_fork_asm+0x12/0x18
[ 32.284107] restore_all_switch_stack+0x0/0xc3
[ 32.284107]
[ 32.284107] kfence-#96: 0x(ptrval)-0x(ptrval), size=73, cache=kmalloc-96
[ 32.284107]
[ 32.284107] allocated by task 169 on cpu 0 at 32.283477s:
[ 32.284107] test_alloc+0x153/0x2d4
[ 32.284107] test_kmalloc_aligned_oob_write+0x48/0x140
[ 32.284107] kunit_try_run_case+0x8a/0x1c4
[ 32.284107] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 32.284107] kthread+0xe0/0x108
[ 32.284107] ret_from_fork+0x40/0x4c
[ 32.284107] ret_from_fork_asm+0x12/0x18
[ 32.284107] restore_all_switch_stack+0x0/0xc3
[ 32.284107]
[ 32.284107] freed by task 169 on cpu 0 at 32.283571s:
[ 32.284107] test_kmalloc_aligned_oob_write+0x9f/0x140
[ 32.284107] kunit_try_run_case+0x8a/0x1c4
[ 32.284107] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 32.284107] kthread+0xe0/0x108
[ 32.284107] ret_from_fork+0x40/0x4c
[ 32.284107] ret_from_fork_asm+0x12/0x18
[ 32.284107] restore_all_switch_stack+0x0/0xc3
[ 32.284107]
[ 32.284107] CPU: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 32.284107] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 32.284107] ==================================================================
Home
[ 32.179505] ==================================================================
[ 32.179930] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x82/0x1b0
[ 32.179930]
[ 32.180089] Out-of-bounds read at 0x(ptrval) (81B right of kfence-#95):
[ 32.180089] test_kmalloc_aligned_oob_read+0x82/0x1b0
[ 32.180089] kunit_try_run_case+0x8a/0x1c4
[ 32.180089] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 32.180089] kthread+0xe0/0x108
[ 32.180089] ret_from_fork+0x40/0x4c
[ 32.180089] ret_from_fork_asm+0x12/0x18
[ 32.180089] restore_all_switch_stack+0x0/0xc3
[ 32.180089]
[ 32.180089] kfence-#95: 0x(ptrval)-0x(ptrval), size=73, cache=kmalloc-96
[ 32.180089]
[ 32.180089] allocated by task 167 on cpu 0 at 32.179402s:
[ 32.180089] test_alloc+0x153/0x2d4
[ 32.180089] test_kmalloc_aligned_oob_read+0x55/0x1b0
[ 32.180089] kunit_try_run_case+0x8a/0x1c4
[ 32.180089] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 32.180089] kthread+0xe0/0x108
[ 32.180089] ret_from_fork+0x40/0x4c
[ 32.180089] ret_from_fork_asm+0x12/0x18
[ 32.180089] restore_all_switch_stack+0x0/0xc3
[ 32.180089]
[ 32.180089] CPU: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 32.180089] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 32.180089] ==================================================================
Home
[ 24.900101] ==================================================================
[ 24.900101] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x6f/0x1d8
[ 24.900101]
[ 24.900101] Out-of-bounds read at 0x(ptrval) (1B left of kfence-#25):
[ 24.900101] test_out_of_bounds_read+0x6f/0x1d8
[ 24.900101] kunit_try_run_case+0x8a/0x1c4
[ 24.900101] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 24.900101] kthread+0xe0/0x108
[ 24.900101] ret_from_fork+0x40/0x4c
[ 24.900101] ret_from_fork_asm+0x12/0x18
[ 24.900101] restore_all_switch_stack+0x0/0xc3
[ 24.900101]
[ 24.900101] kfence-#25: 0x(ptrval)-0x(ptrval), size=32, cache=kmalloc-32
[ 24.900101]
[ 24.900101] allocated by task 135 on cpu 1 at 24.899503s:
[ 24.900101] test_alloc+0x153/0x2d4
[ 24.900101] test_out_of_bounds_read+0x67/0x1d8
[ 24.900101] kunit_try_run_case+0x8a/0x1c4
[ 24.900101] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 24.900101] kthread+0xe0/0x108
[ 24.900101] ret_from_fork+0x40/0x4c
[ 24.900101] ret_from_fork_asm+0x12/0x18
[ 24.900101] restore_all_switch_stack+0x0/0xc3
[ 24.900101]
[ 24.900101] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G N 6.6.74-rc1 #1
[ 24.900101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 24.900101] ==================================================================
Home
[ 25.211753] ==================================================================
[ 25.212132] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0xaf/0x1d8
[ 25.212132]
[ 25.212132] Out-of-bounds read at 0x(ptrval) (32B right of kfence-#28):
[ 25.212132] test_out_of_bounds_read+0xaf/0x1d8
[ 25.212132] kunit_try_run_case+0x8a/0x1c4
[ 25.212132] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 25.212132] kthread+0xe0/0x108
[ 25.212132] ret_from_fork+0x40/0x4c
[ 25.212132] ret_from_fork_asm+0x12/0x18
[ 25.212132] restore_all_switch_stack+0x0/0xc3
[ 25.212132]
[ 25.212132] kfence-#28: 0x(ptrval)-0x(ptrval), size=32, cache=kmalloc-32
[ 25.212132]
[ 25.212132] allocated by task 135 on cpu 1 at 25.211585s:
[ 25.212132] test_alloc+0x153/0x2d4
[ 25.212132] test_out_of_bounds_read+0xa8/0x1d8
[ 25.212132] kunit_try_run_case+0x8a/0x1c4
[ 25.212132] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 25.212132] kthread+0xe0/0x108
[ 25.212132] ret_from_fork+0x40/0x4c
[ 25.212132] ret_from_fork_asm+0x12/0x18
[ 25.212132] restore_all_switch_stack+0x0/0xc3
[ 25.212132]
[ 25.212132] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 25.212132] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.212132] ==================================================================
Home
[ 25.315521] ==================================================================
[ 25.315806] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x6f/0x1d8
[ 25.315806]
[ 25.316090] Out-of-bounds read at 0x(ptrval) (1B left of kfence-#29):
[ 25.316090] test_out_of_bounds_read+0x6f/0x1d8
[ 25.316090] kunit_try_run_case+0x8a/0x1c4
[ 25.316090] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 25.316090] kthread+0xe0/0x108
[ 25.316090] ret_from_fork+0x40/0x4c
[ 25.316090] ret_from_fork_asm+0x12/0x18
[ 25.316090] restore_all_switch_stack+0x0/0xc3
[ 25.316090]
[ 25.316090] kfence-#29: 0x(ptrval)-0x(ptrval), size=32, cache=test
[ 25.316090]
[ 25.316090] allocated by task 137 on cpu 0 at 25.315477s:
[ 25.316090] test_alloc+0xed/0x2d4
[ 25.316090] test_out_of_bounds_read+0x67/0x1d8
[ 25.316090] kunit_try_run_case+0x8a/0x1c4
[ 25.316090] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 25.316090] kthread+0xe0/0x108
[ 25.316090] ret_from_fork+0x40/0x4c
[ 25.316090] ret_from_fork_asm+0x12/0x18
[ 25.316090] restore_all_switch_stack+0x0/0xc3
[ 25.316090]
[ 25.316090] CPU: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 25.316090] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.316090] ==================================================================
Home
[ 25.523702] ==================================================================
[ 25.524116] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0xaf/0x1d8
[ 25.524116]
[ 25.524116] Out-of-bounds read at 0x(ptrval) (32B right of kfence-#31):
[ 25.524116] test_out_of_bounds_read+0xaf/0x1d8
[ 25.524116] kunit_try_run_case+0x8a/0x1c4
[ 25.524116] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 25.524116] kthread+0xe0/0x108
[ 25.524116] ret_from_fork+0x40/0x4c
[ 25.524116] ret_from_fork_asm+0x12/0x18
[ 25.524116] restore_all_switch_stack+0x0/0xc3
[ 25.524116]
[ 25.524116] kfence-#31: 0x(ptrval)-0x(ptrval), size=32, cache=test
[ 25.524116]
[ 25.524116] allocated by task 137 on cpu 0 at 25.523657s:
[ 25.524116] test_alloc+0xed/0x2d4
[ 25.524116] test_out_of_bounds_read+0xa8/0x1d8
[ 25.524116] kunit_try_run_case+0x8a/0x1c4
[ 25.524116] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 25.524116] kthread+0xe0/0x108
[ 25.524116] ret_from_fork+0x40/0x4c
[ 25.524116] ret_from_fork_asm+0x12/0x18
[ 25.524116] restore_all_switch_stack+0x0/0xc3
[ 25.524116]
[ 25.524116] CPU: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 25.524116] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.524116] ==================================================================
Home
[ 25.627576] ==================================================================
[ 25.627978] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x59/0x108
[ 25.627978]
[ 25.628091] Out-of-bounds write at 0x(ptrval) (1B left of kfence-#32):
[ 25.628091] test_out_of_bounds_write+0x59/0x108
[ 25.628091] kunit_try_run_case+0x8a/0x1c4
[ 25.628091] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 25.628091] kthread+0xe0/0x108
[ 25.628091] ret_from_fork+0x40/0x4c
[ 25.628091] ret_from_fork_asm+0x12/0x18
[ 25.628091] restore_all_switch_stack+0x0/0xc3
[ 25.628091]
[ 25.628091] kfence-#32: 0x(ptrval)-0x(ptrval), size=32, cache=kmalloc-32
[ 25.628091]
[ 25.628091] allocated by task 139 on cpu 1 at 25.627485s:
[ 25.628091] test_alloc+0x153/0x2d4
[ 25.628091] test_out_of_bounds_write+0x57/0x108
[ 25.628091] kunit_try_run_case+0x8a/0x1c4
[ 25.628091] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 25.628091] kthread+0xe0/0x108
[ 25.628091] ret_from_fork+0x40/0x4c
[ 25.628091] ret_from_fork_asm+0x12/0x18
[ 25.628091] restore_all_switch_stack+0x0/0xc3
[ 25.628091]
[ 25.628091] CPU: 1 PID: 139 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 25.628091] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.628091] ==================================================================
Home
[ 25.835586] ==================================================================
[ 25.836006] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x59/0x108
[ 25.836006]
[ 25.836102] Out-of-bounds write at 0x(ptrval) (1B left of kfence-#34):
[ 25.836102] test_out_of_bounds_write+0x59/0x108
[ 25.836102] kunit_try_run_case+0x8a/0x1c4
[ 25.836102] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 25.836102] kthread+0xe0/0x108
[ 25.836102] ret_from_fork+0x40/0x4c
[ 25.836102] ret_from_fork_asm+0x12/0x18
[ 25.836102] restore_all_switch_stack+0x0/0xc3
[ 25.836102]
[ 25.836102] kfence-#34: 0x(ptrval)-0x(ptrval), size=32, cache=test
[ 25.836102]
[ 25.836102] allocated by task 141 on cpu 0 at 25.835540s:
[ 25.836102] test_alloc+0xed/0x2d4
[ 25.836102] test_out_of_bounds_write+0x57/0x108
[ 25.836102] kunit_try_run_case+0x8a/0x1c4
[ 25.836102] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 25.836102] kthread+0xe0/0x108
[ 25.836102] ret_from_fork+0x40/0x4c
[ 25.836102] ret_from_fork_asm+0x12/0x18
[ 25.836102] restore_all_switch_stack+0x0/0xc3
[ 25.836102]
[ 25.836102] CPU: 0 PID: 141 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 25.836102] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.836102] ==================================================================
Home
[ 58.179738] ==================================================================
[ 58.180088] BUG: KFENCE: use-after-free read in test_krealloc+0x250/0x4b0
[ 58.180088]
[ 58.180088] Use-after-free read at 0x(ptrval) (in kfence-#101):
[ 58.180088] test_krealloc+0x250/0x4b0
[ 58.180088] kunit_try_run_case+0x8a/0x1c4
[ 58.180088] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 58.180088] kthread+0xe0/0x108
[ 58.180088] ret_from_fork+0x40/0x4c
[ 58.180088] ret_from_fork_asm+0x12/0x18
[ 58.180088] restore_all_switch_stack+0x0/0xc3
[ 58.180088]
[ 58.180088] kfence-#101: 0x(ptrval)-0x(ptrval), size=32, cache=kmalloc-32
[ 58.180088]
[ 58.180088] allocated by task 181 on cpu 0 at 58.179324s:
[ 58.180088] test_alloc+0x153/0x2d4
[ 58.180088] test_krealloc+0x44/0x4b0
[ 58.180088] kunit_try_run_case+0x8a/0x1c4
[ 58.180088] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 58.180088] kthread+0xe0/0x108
[ 58.180088] ret_from_fork+0x40/0x4c
[ 58.180088] ret_from_fork_asm+0x12/0x18
[ 58.180088] restore_all_switch_stack+0x0/0xc3
[ 58.180088]
[ 58.180088] freed by task 181 on cpu 0 at 58.179514s:
[ 58.180088] krealloc+0x6c/0x1d4
[ 58.180088] test_krealloc+0x9c/0x4b0
[ 58.180088] kunit_try_run_case+0x8a/0x1c4
[ 58.180088] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 58.180088] kthread+0xe0/0x108
[ 58.180088] ret_from_fork+0x40/0x4c
[ 58.180088] ret_from_fork_asm+0x12/0x18
[ 58.180088] restore_all_switch_stack+0x0/0xc3
[ 58.180088]
[ 58.180088] CPU: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 58.180088] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 58.180088] ==================================================================
Home
[ 58.081436] ==================================================================
[ 58.081868] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0xa0/0x2b8
[ 58.081868]
[ 58.082104] Use-after-free read at 0x(ptrval) (in kfence-#100):
[ 58.082104] test_memcache_typesafe_by_rcu+0xa0/0x2b8
[ 58.082104] kunit_try_run_case+0x8a/0x1c4
[ 58.082104] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 58.082104] kthread+0xe0/0x108
[ 58.082104] ret_from_fork+0x40/0x4c
[ 58.082104] ret_from_fork_asm+0x12/0x18
[ 58.082104] restore_all_switch_stack+0x0/0xc3
[ 58.082104]
[ 58.082104] kfence-#100: 0x(ptrval)-0x(ptrval), size=32, cache=test
[ 58.082104]
[ 58.082104] allocated by task 179 on cpu 1 at 58.075420s:
[ 58.082104] test_alloc+0xed/0x2d4
[ 58.082104] test_memcache_typesafe_by_rcu+0x64/0x2b8
[ 58.082104] kunit_try_run_case+0x8a/0x1c4
[ 58.082104] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 58.082104] kthread+0xe0/0x108
[ 58.082104] ret_from_fork+0x40/0x4c
[ 58.082104] ret_from_fork_asm+0x12/0x18
[ 58.082104] restore_all_switch_stack+0x0/0xc3
[ 58.082104]
[ 58.082104] freed by task 0 on cpu 1 at 58.081171s:
[ 58.082104] rcu_guarded_free+0x15/0x18
[ 58.082104] rcu_core+0x277/0xa24
[ 58.082104] rcu_core_si+0xd/0x10
[ 58.082104] handle_softirqs+0xe0/0x36c
[ 58.082104] __do_softirq+0xf/0x11
[ 58.082104] call_on_stack+0x4c/0x58
[ 58.082104] do_softirq_own_stack+0x21/0x24
[ 58.082104] irq_exit_rcu+0x86/0xb0
[ 58.082104] sysvec_apic_timer_interrupt+0x2c/0x40
[ 58.082104] handle_exception_return+0x0/0xad
[ 58.082104] default_idle+0xb/0x10
[ 58.082104] default_idle_call+0x34/0xe8
[ 58.082104] do_idle+0x1f9/0x23c
[ 58.082104] cpu_startup_entry+0x29/0x2c
[ 58.082104] start_secondary+0x113/0x134
[ 58.082104] startup_32_smp+0x156/0x158
[ 58.082104]
[ 58.082104] CPU: 1 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 58.082104] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 58.082104] ==================================================================
Home
[ 26.043608] ==================================================================
[ 26.043959] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x65/0x110
[ 26.043959]
[ 26.044091] Use-after-free read at 0x(ptrval) (in kfence-#36):
[ 26.044091] test_use_after_free_read+0x65/0x110
[ 26.044091] kunit_try_run_case+0x8a/0x1c4
[ 26.044091] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 26.044091] kthread+0xe0/0x108
[ 26.044091] ret_from_fork+0x40/0x4c
[ 26.044091] ret_from_fork_asm+0x12/0x18
[ 26.044091] restore_all_switch_stack+0x0/0xc3
[ 26.044091]
[ 26.044091] kfence-#36: 0x(ptrval)-0x(ptrval), size=32, cache=test
[ 26.044091]
[ 26.044091] allocated by task 145 on cpu 1 at 26.043484s:
[ 26.044091] test_alloc+0xed/0x2d4
[ 26.044091] test_use_after_free_read+0x50/0x110
[ 26.044091] kunit_try_run_case+0x8a/0x1c4
[ 26.044091] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 26.044091] kthread+0xe0/0x108
[ 26.044091] ret_from_fork+0x40/0x4c
[ 26.044091] ret_from_fork_asm+0x12/0x18
[ 26.044091] restore_all_switch_stack+0x0/0xc3
[ 26.044091]
[ 26.044091] freed by task 145 on cpu 1 at 26.043543s:
[ 26.044091] test_use_after_free_read+0x65/0x110
[ 26.044091] kunit_try_run_case+0x8a/0x1c4
[ 26.044091] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 26.044091] kthread+0xe0/0x108
[ 26.044091] ret_from_fork+0x40/0x4c
[ 26.044091] ret_from_fork_asm+0x12/0x18
[ 26.044091] restore_all_switch_stack+0x0/0xc3
[ 26.044091]
[ 26.044091] CPU: 1 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 26.044091] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.044091] ==================================================================
Home
[ 25.939755] ==================================================================
[ 25.940109] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x97/0x110
[ 25.940109]
[ 25.940109] Use-after-free read at 0x(ptrval) (in kfence-#35):
[ 25.940109] test_use_after_free_read+0x97/0x110
[ 25.940109] kunit_try_run_case+0x8a/0x1c4
[ 25.940109] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 25.940109] kthread+0xe0/0x108
[ 25.940109] ret_from_fork+0x40/0x4c
[ 25.940109] ret_from_fork_asm+0x12/0x18
[ 25.940109] restore_all_switch_stack+0x0/0xc3
[ 25.940109]
[ 25.940109] kfence-#35: 0x(ptrval)-0x(ptrval), size=32, cache=kmalloc-32
[ 25.940109]
[ 25.940109] allocated by task 143 on cpu 0 at 25.939529s:
[ 25.940109] test_alloc+0x153/0x2d4
[ 25.940109] test_use_after_free_read+0x50/0x110
[ 25.940109] kunit_try_run_case+0x8a/0x1c4
[ 25.940109] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 25.940109] kthread+0xe0/0x108
[ 25.940109] ret_from_fork+0x40/0x4c
[ 25.940109] ret_from_fork_asm+0x12/0x18
[ 25.940109] restore_all_switch_stack+0x0/0xc3
[ 25.940109]
[ 25.940109] freed by task 143 on cpu 0 at 25.939613s:
[ 25.940109] test_use_after_free_read+0x97/0x110
[ 25.940109] kunit_try_run_case+0x8a/0x1c4
[ 25.940109] kunit_generic_run_threadfn_adapter+0x16/0x20
[ 25.940109] kthread+0xe0/0x108
[ 25.940109] ret_from_fork+0x40/0x4c
[ 25.940109] ret_from_fork_asm+0x12/0x18
[ 25.940109] restore_all_switch_stack+0x0/0xc3
[ 25.940109]
[ 25.940109] CPU: 0 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 25.940109] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.940109] ==================================================================
Home
------------[ cut here ]------------
[ 4.813354] systemd[1]: systemd 256.5-1 running in system mode (+PAM +AUDIT +SELINUX +APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBCRYPTSETUP_PLUGINS +LIBFDISK +PCRE2 +PWQUALITY +P11KIT +QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT +LIBARCHIVE)
[ 4.817932] WARNING: CPU: 0 PID: 0 at kernel/smp.c:786 smp_call_function_many_cond+0x4b0/0x5dc
[ 4.850799] systemd[1]: Detected architecture arm.
[ 4.859436] Modules linked in:
[ 4.859466] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.6.74-rc1 #1
[ 4.859466] Hardware name: Generic DRA74X (Flattened Device Tree)
[ 4.859466] unwind_backtrace from show_stack+0x18/0x1c
[ 4.885009] show_stack from dump_stack_lvl+0x58/0x70
[ 4.890075] dump_stack_lvl from __warn+0x80/0x12c
[ 4.894927] __warn from warn_slowpath_fmt+0x18c/0x194
[ 4.900115] warn_slowpath_fmt from smp_call_function_many_cond+0x4b0/0x5dc
[ 4.907135] smp_call_function_many_cond from smp_call_function+0x34/0x3c
[ 4.913940] smp_call_function from set_memory_valid+0x84/0xc0
[ 4.919830] set_memory_valid from kfence_guarded_free+0x16c/0x2e0
[ 4.926055] kfence_guarded_free from rcu_core+0x2cc/0x998
[ 4.931579] rcu_core from handle_softirqs+0x15c/0x3dc
[ 4.936767] handle_softirqs from irq_exit+0xac/0xd4
[ 4.941772] irq_exit from __irq_svc+0x78/0x9c
[ 4.946228] Exception stack(0xc2201f18 to 0xc2201f60)
[ 4.951324] 1f00: 0005272c 00000001
[ 4.959533] 1f20: 2da61000 00000000 c2210040 c248d7bc c2209f60 c2209fbc 00000000 00000000
[ 4.967773] 1f40: 00000000 c20dea70 c248d048 c2201f68 c14bd210 c14bd214 600f0013 ffffffff
[ 4.975982] __irq_svc from default_idle_call+0x20/0xc0
[ 4.981231] default_idle_call from do_idle+0x234/0x2c4
[ 4.986480] do_idle from cpu_startup_entry+0x30/0x34
[ 4.991577] cpu_startup_entry from rest_init+0xb4/0xb8
[ 4.996826] rest_init from arch_post_acpi_subsys_init+0x0/0x18
[ 5.002838] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 4.813354] systemd[1]: systemd 256.5-1 running in system mode (+PAM +AUDIT +SELINUX +APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBCRYPTSETUP_PLUGINS +LIBFDISK +PCRE2 +PWQUALITY +P11KIT +QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT +LIBARCHIVE)
[ 4.817932] WARNING: CPU: 0 PID: 0 at kernel/smp.c:786 smp_call_function_many_cond+0x4b0/0x5dc
[ 4.850799] systemd[1]: Detected architecture arm.
[ 4.859436] Modules linked in:
[ 4.859466] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.6.74-rc1 #1
[ 4.859466] Hardware name: Generic DRA74X (Flattened Device Tree)
[ 4.859466] unwind_backtrace from show_stack+0x18/0x1c
[ 4.885009] show_stack from dump_stack_lvl+0x58/0x70
[ 4.890075] dump_stack_lvl from __warn+0x80/0x12c
[ 4.894927] __warn from warn_slowpath_fmt+0x18c/0x194
[ 4.900115] warn_slowpath_fmt from smp_call_function_many_cond+0x4b0/0x5dc
[ 4.907135] smp_call_function_many_cond from smp_call_function+0x34/0x3c
[ 4.913940] smp_call_function from set_memory_valid+0x84/0xc0
[ 4.919830] set_memory_valid from kfence_guarded_free+0x16c/0x2e0
[ 4.926055] kfence_guarded_free from rcu_core+0x2cc/0x998
[ 4.931579] rcu_core from handle_softirqs+0x15c/0x3dc
[ 4.936767] handle_softirqs from irq_exit+0xac/0xd4
[ 4.941772] irq_exit from __irq_svc+0x78/0x9c
[ 4.946228] Exception stack(0xc2201f18 to 0xc2201f60)
[ 4.951324] 1f00: 0005272c 00000001
[ 4.959533] 1f20: 2da61000 00000000 c2210040 c248d7bc c2209f60 c2209fbc 00000000 00000000
[ 4.967773] 1f40: 00000000 c20dea70 c248d048 c2201f68 c14bd210 c14bd214 600f0013 ffffffff
[ 4.975982] __irq_svc from default_idle_call+0x20/0xc0
[ 4.981231] default_idle_call from do_idle+0x234/0x2c4
[ 4.986480] do_idle from cpu_startup_entry+0x30/0x34
[ 4.991577] cpu_startup_entry from rest_init+0xb4/0xb8
[ 4.996826] rest_init from arch_post_acpi_subsys_init+0x0/0x18
[ 5.002838] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 60.534683] Modules linked in: snd_soc_hdmi_codec venus_dec venus_enc videobuf2_dma_contig pm8916_wdt crct10dif_ce qcom_wcnss_pil coresight_stm coresight_cpu_debug coresight_cti stm_core qcom_camss coresight_tmc coresight_tpiu coresight_funnel coresight_replicator snd_soc_lpass_apq8016 coresight adv7511 snd_soc_lpass_cpu venus_core qrtr videobuf2_dma_sg cec msm snd_soc_lpass_platform v4l2_fwnode snd_soc_msm8916_digital snd_soc_msm8916_analog snd_soc_apq8016_sbc snd_soc_qcom_common qcom_q6v5_mss v4l2_mem2mem v4l2_async qcom_pil_info qcom_q6v5 qcom_sysmon videobuf2_v4l2 qcom_spmi_temp_alarm llcc_qcom qcom_spmi_vadc rtc_pm8xxx qcom_common qcom_pon qcom_vadc_common ocmem qcom_glink_smem videodev qcom_stats mdt_loader qnoc_msm8916 qmi_helpers videobuf2_memops gpu_sched videobuf2_common drm_dp_aux_bus qcom_rng mc drm_display_helper rpmsg_ctrl icc_smd_rpm rpmsg_char phy_qcom_usb_hs display_connector drm_kms_helper socinfo rmtfs_mem fuse drm backlight ip_tables x_tables
[ 60.662949] CPU: 2 PID: 1450 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[ 60.983948] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 61.035373] lr : kvmalloc_node+0x50/0xe8
[ 61.345493] sp : ffff800085ecbce0
[ 61.351010] x29: ffff800085ecbcf0 x28: ffff00000f230000 x27: 0000000000000000
[ 61.369269] x23: 0000000080000000 x22: ffff800080386d68 x21: 0000000200002000
[ 61.413431] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 61.731882] x11: 0000000000000040 x10: b7b7fcdb7d76d400 x9 : b7b7fcdb7d76d400
[ 61.783700] x5 : 0000000000000000 x4 : ffff800085ecbca0 x3 : 0000000000000000
[ 62.102293] Call trace:
[ 62.107691] kvmalloc_node+0xe0/0xe8
[ 62.147935] alloc_fdtable+0x7c/0x108
[ 62.463135] expand_files+0x114/0x2f0
[ 62.468451] ksys_dup3+0x60/0xf4
[ 62.514977] __arm64_sys_dup3+0x20/0x30
[ 62.829902] invoke_syscall+0x40/0x100
[ 62.838474] el0_svc_common+0xa8/0xd8
[ 62.882238] do_el0_svc+0x1c/0x28
[ 62.915638] el0_svc+0x38/0x64
[ 62.920796] el0t_64_sync_handler+0x90/0xfc
[ 62.925994] el0t_64_sync+0x190/0x194
[ 62.931185] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 60.534683] Modules linked in: snd_soc_hdmi_codec venus_dec venus_enc videobuf2_dma_contig pm8916_wdt crct10dif_ce qcom_wcnss_pil coresight_stm coresight_cpu_debug coresight_cti stm_core qcom_camss coresight_tmc coresight_tpiu coresight_funnel coresight_replicator snd_soc_lpass_apq8016 coresight adv7511 snd_soc_lpass_cpu venus_core qrtr videobuf2_dma_sg cec msm snd_soc_lpass_platform v4l2_fwnode snd_soc_msm8916_digital snd_soc_msm8916_analog snd_soc_apq8016_sbc snd_soc_qcom_common qcom_q6v5_mss v4l2_mem2mem v4l2_async qcom_pil_info qcom_q6v5 qcom_sysmon videobuf2_v4l2 qcom_spmi_temp_alarm llcc_qcom qcom_spmi_vadc rtc_pm8xxx qcom_common qcom_pon qcom_vadc_common ocmem qcom_glink_smem videodev qcom_stats mdt_loader qnoc_msm8916 qmi_helpers videobuf2_memops gpu_sched videobuf2_common drm_dp_aux_bus qcom_rng mc drm_display_helper rpmsg_ctrl icc_smd_rpm rpmsg_char phy_qcom_usb_hs display_connector drm_kms_helper socinfo rmtfs_mem fuse drm backlight ip_tables x_tables
[ 60.662949] CPU: 2 PID: 1450 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[ 60.983948] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 61.035373] lr : kvmalloc_node+0x50/0xe8
[ 61.345493] sp : ffff800085ecbce0
[ 61.351010] x29: ffff800085ecbcf0 x28: ffff00000f230000 x27: 0000000000000000
[ 61.369269] x23: 0000000080000000 x22: ffff800080386d68 x21: 0000000200002000
[ 61.413431] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 61.731882] x11: 0000000000000040 x10: b7b7fcdb7d76d400 x9 : b7b7fcdb7d76d400
[ 61.783700] x5 : 0000000000000000 x4 : ffff800085ecbca0 x3 : 0000000000000000
[ 62.102293] Call trace:
[ 62.107691] kvmalloc_node+0xe0/0xe8
[ 62.147935] alloc_fdtable+0x7c/0x108
[ 62.463135] expand_files+0x114/0x2f0
[ 62.468451] ksys_dup3+0x60/0xf4
[ 62.514977] __arm64_sys_dup3+0x20/0x30
[ 62.829902] invoke_syscall+0x40/0x100
[ 62.838474] el0_svc_common+0xa8/0xd8
[ 62.882238] do_el0_svc+0x1c/0x28
[ 62.915638] el0_svc+0x38/0x64
[ 62.920796] el0t_64_sync_handler+0x90/0xfc
[ 62.925994] el0t_64_sync+0x190/0x194
[ 62.931185] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 155.201545] WARNING: CPU: 0 PID: 1859 at mm/util.c:632 kvmalloc_node+0xfc/0x10c
[ 155.208980] Modules linked in: ax88179_178a usbnet fuse ip_tables x_tables snd_soc_hdmi_codec venus_enc venus_dec videobuf2_dma_contig lontium_lt9611 qcom_camss videobuf2_dma_sg mcp251xfd v4l2_fwnode v4l2_async venus_core xhci_pci v4l2_mem2mem videobuf2_memops xhci_pci_renesas videobuf2_v4l2 can_dev qcom_spmi_temp_alarm rtc_pm8xxx leds_qcom_lpg led_class_multicolor qcom_pon qcom_spmi_adc5 qcom_vadc_common ath10k_snoc hci_uart videodev btqca msm snd_soc_sdm845 snd_soc_rt5663 snd_soc_qcom_common snd_soc_rl6231 btbcm ocmem reset_qcom_pdc ath10k_core soundwire_bus videobuf2_common ath gpu_sched i2c_qcom_geni qcom_stats mac80211 mc drm_dp_aux_bus drm_display_helper crct10dif_ce camcc_sdm845 qcrypto authenc bluetooth libarc4 ecdh_generic phy_qcom_qmp_combo ecc typec spi_geni_qcom qcom_rng phy_qcom_qusb2 phy_qcom_qmp_usb gpi libdes coresight_stm cfg80211 coresight_tmc qrtr coresight_funnel coresight_replicator stm_core ufs_qcom phy_qcom_qmp_ufs icc_osm_l3 qcom_q6v5_mss qcom_q6v5_pas phy_qcom_qmp_pcie rfkill qcom_wdt lmh
[ 155.209218] coresight slim_qcom_ngd_ctrl slimbus pdr_interface qcom_pil_info qcom_q6v5 qcom_sysmon llcc_qcom icc_bwmon qcom_common qcom_glink_smem mdt_loader qmi_helpers display_connector drm_kms_helper drm socinfo backlight rmtfs_mem
[ 155.321185] CPU: 0 PID: 1859 Comm: unshare_test Tainted: G W 6.6.74-rc1 #1
[ 155.329570] Hardware name: Thundercomm Dragonboard 845c (DT)
[ 155.335317] pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 155.342377] pc : kvmalloc_node+0xfc/0x10c
[ 155.346453] lr : kvmalloc_node+0x64/0x10c
[ 155.350528] sp : ffff800088a13ce0
[ 155.353898] x29: ffff800088a13cf0 x28: ffff33870980d000 x27: 0000000000000000
[ 155.361138] x26: 0000000000000000 x25: 0000000000000000 x24: ffff338700eb6f40
[ 155.368379] x23: ffff338700eb6ec0 x22: ffffa2f6af6eece4 x21: 00000000ffffffff
[ 155.375621] x20: 0000000200002000 x19: 0000000000400cc0 x18: 0000000000000000
[ 155.382865] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 155.390109] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 155.397347] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[ 155.404587] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000001
[ 155.411825] x5 : 0000000000000000 x4 : ffff33870980d000 x3 : 0000000000000000
[ 155.419071] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[ 155.426316] Call trace:
[ 155.428810] kvmalloc_node+0xfc/0x10c
[ 155.432529] alloc_fdtable+0x94/0x114
[ 155.436250] expand_files+0x78/0x318
[ 155.439884] ksys_dup3+0x60/0x128
[ 155.443260] __arm64_sys_dup3+0x20/0x30
[ 155.447163] invoke_syscall+0x48/0x114
[ 155.450972] el0_svc_common.constprop.0+0x40/0xe0
[ 155.455748] do_el0_svc+0x1c/0x28
[ 155.459116] el0_svc+0x38/0xc8
[ 155.462222] el0t_64_sync_handler+0x120/0x12c
[ 155.466653] el0t_64_sync+0x190/0x194
[ 155.470375] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 155.201545] WARNING: CPU: 0 PID: 1859 at mm/util.c:632 kvmalloc_node+0xfc/0x10c
[ 155.208980] Modules linked in: ax88179_178a usbnet fuse ip_tables x_tables snd_soc_hdmi_codec venus_enc venus_dec videobuf2_dma_contig lontium_lt9611 qcom_camss videobuf2_dma_sg mcp251xfd v4l2_fwnode v4l2_async venus_core xhci_pci v4l2_mem2mem videobuf2_memops xhci_pci_renesas videobuf2_v4l2 can_dev qcom_spmi_temp_alarm rtc_pm8xxx leds_qcom_lpg led_class_multicolor qcom_pon qcom_spmi_adc5 qcom_vadc_common ath10k_snoc hci_uart videodev btqca msm snd_soc_sdm845 snd_soc_rt5663 snd_soc_qcom_common snd_soc_rl6231 btbcm ocmem reset_qcom_pdc ath10k_core soundwire_bus videobuf2_common ath gpu_sched i2c_qcom_geni qcom_stats mac80211 mc drm_dp_aux_bus drm_display_helper crct10dif_ce camcc_sdm845 qcrypto authenc bluetooth libarc4 ecdh_generic phy_qcom_qmp_combo ecc typec spi_geni_qcom qcom_rng phy_qcom_qusb2 phy_qcom_qmp_usb gpi libdes coresight_stm cfg80211 coresight_tmc qrtr coresight_funnel coresight_replicator stm_core ufs_qcom phy_qcom_qmp_ufs icc_osm_l3 qcom_q6v5_mss qcom_q6v5_pas phy_qcom_qmp_pcie rfkill qcom_wdt lmh
[ 155.209218] coresight slim_qcom_ngd_ctrl slimbus pdr_interface qcom_pil_info qcom_q6v5 qcom_sysmon llcc_qcom icc_bwmon qcom_common qcom_glink_smem mdt_loader qmi_helpers display_connector drm_kms_helper drm socinfo backlight rmtfs_mem
[ 155.321185] CPU: 0 PID: 1859 Comm: unshare_test Tainted: G W 6.6.74-rc1 #1
[ 155.329570] Hardware name: Thundercomm Dragonboard 845c (DT)
[ 155.335317] pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 155.342377] pc : kvmalloc_node+0xfc/0x10c
[ 155.346453] lr : kvmalloc_node+0x64/0x10c
[ 155.350528] sp : ffff800088a13ce0
[ 155.353898] x29: ffff800088a13cf0 x28: ffff33870980d000 x27: 0000000000000000
[ 155.361138] x26: 0000000000000000 x25: 0000000000000000 x24: ffff338700eb6f40
[ 155.368379] x23: ffff338700eb6ec0 x22: ffffa2f6af6eece4 x21: 00000000ffffffff
[ 155.375621] x20: 0000000200002000 x19: 0000000000400cc0 x18: 0000000000000000
[ 155.382865] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 155.390109] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 155.397347] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[ 155.404587] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000001
[ 155.411825] x5 : 0000000000000000 x4 : ffff33870980d000 x3 : 0000000000000000
[ 155.419071] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[ 155.426316] Call trace:
[ 155.428810] kvmalloc_node+0xfc/0x10c
[ 155.432529] alloc_fdtable+0x94/0x114
[ 155.436250] expand_files+0x78/0x318
[ 155.439884] ksys_dup3+0x60/0x128
[ 155.443260] __arm64_sys_dup3+0x20/0x30
[ 155.447163] invoke_syscall+0x48/0x114
[ 155.450972] el0_svc_common.constprop.0+0x40/0xe0
[ 155.455748] do_el0_svc+0x1c/0x28
[ 155.459116] el0_svc+0x38/0xc8
[ 155.462222] el0t_64_sync_handler+0x120/0x12c
[ 155.466653] el0t_64_sync+0x190/0x194
[ 155.470375] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 51.726600] WARNING: CPU: 7 PID: 1420 at mm/util.c:632 kvmalloc_node+0xe0/0xe8
[ 51.726693] Modules linked in: crct10dif_ce fuse drm backlight ip_tables x_tables
[ 51.728322] CPU: 7 PID: 1420 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[ 51.735087] Hardware name: WinLink E850-96 board (DT)
[ 51.740125] pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 51.747066] pc : kvmalloc_node+0xe0/0xe8
[ 51.750972] lr : kvmalloc_node+0x50/0xe8
[ 51.754878] sp : ffff80008410bce0
[ 51.758176] x29: ffff80008410bcf0 x28: ffff000801c1f000 x27: 0000000000000000
[ 51.765294] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 51.772412] x23: 0000000080000000 x22: ffff800080306d68 x21: 0000000200002000
[ 51.779532] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[ 51.786648] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 51.793768] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 51.800884] x11: 0000000000000040 x10: 1601a0ad9893a300 x9 : 1601a0ad9893a300
[ 51.808002] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000038
[ 51.815120] x5 : 0000000000000000 x4 : ffff80008410bca0 x3 : 0000000000000000
[ 51.822238] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[ 51.829360] Call trace:
[ 51.831790] kvmalloc_node+0xe0/0xe8
[ 51.835347] alloc_fdtable+0x7c/0x108
[ 51.838991] expand_files+0x114/0x2f0
[ 51.842637] ksys_dup3+0x60/0xf4
[ 51.845849] __arm64_sys_dup3+0x20/0x30
[ 51.849668] invoke_syscall+0x40/0x100
[ 51.853401] el0_svc_common+0xa8/0xd8
[ 51.857048] do_el0_svc+0x1c/0x28
[ 51.860345] el0_svc+0x38/0x64
[ 51.863383] el0t_64_sync_handler+0x90/0xfc
[ 51.867551] el0t_64_sync+0x190/0x194
[ 51.871200] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 51.726600] WARNING: CPU: 7 PID: 1420 at mm/util.c:632 kvmalloc_node+0xe0/0xe8
[ 51.726693] Modules linked in: crct10dif_ce fuse drm backlight ip_tables x_tables
[ 51.728322] CPU: 7 PID: 1420 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[ 51.735087] Hardware name: WinLink E850-96 board (DT)
[ 51.740125] pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 51.747066] pc : kvmalloc_node+0xe0/0xe8
[ 51.750972] lr : kvmalloc_node+0x50/0xe8
[ 51.754878] sp : ffff80008410bce0
[ 51.758176] x29: ffff80008410bcf0 x28: ffff000801c1f000 x27: 0000000000000000
[ 51.765294] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 51.772412] x23: 0000000080000000 x22: ffff800080306d68 x21: 0000000200002000
[ 51.779532] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[ 51.786648] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 51.793768] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 51.800884] x11: 0000000000000040 x10: 1601a0ad9893a300 x9 : 1601a0ad9893a300
[ 51.808002] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000038
[ 51.815120] x5 : 0000000000000000 x4 : ffff80008410bca0 x3 : 0000000000000000
[ 51.822238] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[ 51.829360] Call trace:
[ 51.831790] kvmalloc_node+0xe0/0xe8
[ 51.835347] alloc_fdtable+0x7c/0x108
[ 51.838991] expand_files+0x114/0x2f0
[ 51.842637] ksys_dup3+0x60/0xf4
[ 51.845849] __arm64_sys_dup3+0x20/0x30
[ 51.849668] invoke_syscall+0x40/0x100
[ 51.853401] el0_svc_common+0xa8/0xd8
[ 51.857048] do_el0_svc+0x1c/0x28
[ 51.860345] el0_svc+0x38/0x64
[ 51.863383] el0t_64_sync_handler+0x90/0xfc
[ 51.867551] el0t_64_sync+0x190/0x194
[ 51.871200] ---[ end trace 0000000000000000 ]---
Home
[ 1.844944] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0)
[ 1.844950] CPU: 6 PID: 1 Comm: swapper/0 Not tainted 6.6.74-rc1 #1
[ 1.844959] Hardware name: WinLink E850-96 board (DT)
[ 1.844966] Call trace:
[ 1.844970] dump_backtrace+0x90/0xe8
[ 1.844988] show_stack+0x18/0x24
[ 1.844999] dump_stack_lvl+0x48/0x60
[ 1.845012] dump_stack+0x18/0x24
[ 1.845019] panic+0x324/0x380
[ 1.845031] mount_root_generic+0x260/0x330
[ 1.845043] mount_root+0x170/0x334
[ 1.845051] prepare_namespace+0x6c/0x2a4
[ 1.845058] kernel_init_freeable+0x244/0x284
[ 1.845067] kernel_init+0x24/0x1dc
[ 1.845081] ret_from_fork+0x10/0x20
[ 1.845093] SMP: stopping secondary CPUs
[ 1.846840] Kernel Offset: disabled
[ 1.846842] CPU features: 0x0,c0000000,00020143,0000721b
[ 1.846848] Memory Limit: none
[ 1.934510] ---[ end Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) ]---
Home
------------[ cut here ]------------
[ 328.055838] WARNING: CPU: 1 PID: 534 at mm/util.c:632 kvmalloc_node+0xe0/0xe8
[ 328.055975] Modules linked in: pl111_drm arm_spe_pmu panel_simple crct10dif_ce drm_dma_helper drm_kms_helper fuse drm backlight ip_tables x_tables
[ 328.056375] CPU: 1 PID: 534 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[ 328.056491] Hardware name: FVP Base RevC (DT)
[ 328.056558] pstate: 123402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[ 328.056686] pc : kvmalloc_node+0xe0/0xe8
[ 328.056782] lr : kvmalloc_node+0x50/0xe8
[ 328.056878] sp : ffff8000818e3ce0
[ 328.056940] x29: ffff8000818e3cf0 x28: ffff0008044b3000 x27: 0000000000000000
[ 328.057110] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 328.057274] x23: 0000000080000000 x22: ecc8d7c64b706d68 x21: 0000000200002000
[ 328.057442] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[ 328.057611] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 328.057775] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 328.057940] x11: 0000000000000040 x10: 384389d8c64dff00 x9 : 384389d8c64dff00
[ 328.058109] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000038
[ 328.058268] x5 : 0000000000000000 x4 : ffff8000818e3ca0 x3 : 0000000000000000
[ 328.058436] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[ 328.058600] Call trace:
[ 328.058652] kvmalloc_node+0xe0/0xe8
[ 328.058750] alloc_fdtable+0x7c/0x108
[ 328.058885] expand_files+0x114/0x2f0
[ 328.058983] ksys_dup3+0x60/0xf4
[ 328.059081] __arm64_sys_dup3+0x20/0x30
[ 328.059182] invoke_syscall+0x40/0x100
[ 328.059308] el0_svc_common+0xa8/0xd8
[ 328.059434] do_el0_svc+0x1c/0x28
[ 328.059556] el0_svc+0x38/0x64
[ 328.059657] el0t_64_sync_handler+0x90/0xfc
[ 328.059775] el0t_64_sync+0x190/0x194
[ 328.059875] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 328.055838] WARNING: CPU: 1 PID: 534 at mm/util.c:632 kvmalloc_node+0xe0/0xe8
[ 328.055975] Modules linked in: pl111_drm arm_spe_pmu panel_simple crct10dif_ce drm_dma_helper drm_kms_helper fuse drm backlight ip_tables x_tables
[ 328.056375] CPU: 1 PID: 534 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[ 328.056491] Hardware name: FVP Base RevC (DT)
[ 328.056558] pstate: 123402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[ 328.056686] pc : kvmalloc_node+0xe0/0xe8
[ 328.056782] lr : kvmalloc_node+0x50/0xe8
[ 328.056878] sp : ffff8000818e3ce0
[ 328.056940] x29: ffff8000818e3cf0 x28: ffff0008044b3000 x27: 0000000000000000
[ 328.057110] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 328.057274] x23: 0000000080000000 x22: ecc8d7c64b706d68 x21: 0000000200002000
[ 328.057442] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[ 328.057611] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 328.057775] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 328.057940] x11: 0000000000000040 x10: 384389d8c64dff00 x9 : 384389d8c64dff00
[ 328.058109] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000038
[ 328.058268] x5 : 0000000000000000 x4 : ffff8000818e3ca0 x3 : 0000000000000000
[ 328.058436] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[ 328.058600] Call trace:
[ 328.058652] kvmalloc_node+0xe0/0xe8
[ 328.058750] alloc_fdtable+0x7c/0x108
[ 328.058885] expand_files+0x114/0x2f0
[ 328.058983] ksys_dup3+0x60/0xf4
[ 328.059081] __arm64_sys_dup3+0x20/0x30
[ 328.059182] invoke_syscall+0x40/0x100
[ 328.059308] el0_svc_common+0xa8/0xd8
[ 328.059434] do_el0_svc+0x1c/0x28
[ 328.059556] el0_svc+0x38/0x64
[ 328.059657] el0t_64_sync_handler+0x90/0xfc
[ 328.059775] el0t_64_sync+0x190/0x194
[ 328.059875] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 329.497787] WARNING: CPU: 1 PID: 535 at mm/util.c:632 kvmalloc_node+0xfc/0x10c
[ 329.497928] Modules linked in: arm_spe_pmu crct10dif_ce panel_simple pl111_drm drm_dma_helper drm_kms_helper fuse drm backlight ip_tables x_tables
[ 329.498352] CPU: 1 PID: 535 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[ 329.498473] Hardware name: FVP Base RevC (DT)
[ 329.498542] pstate: 123402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[ 329.498677] pc : kvmalloc_node+0xfc/0x10c
[ 329.498775] lr : kvmalloc_node+0x64/0x10c
[ 329.498871] sp : ffff8000819c3ce0
[ 329.498940] x29: ffff8000819c3cf0 x28: ffff00080708f000 x27: 0000000000000000
[ 329.499122] x26: 0000000000000000 x25: 0000000000000000 x24: ffff00080140af40
[ 329.499300] x23: ffff00080140aec0 x22: a0bed7c64b6eece4 x21: 00000000ffffffff
[ 329.499484] x20: 0000000200002000 x19: 0000000000400cc0 x18: 0000000000000000
[ 329.499663] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 329.499838] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 329.500012] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[ 329.500187] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000001
[ 329.500360] x5 : 0000000000000000 x4 : ffff00080708f000 x3 : 0000000000000000
[ 329.500537] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[ 329.500713] Call trace:
[ 329.500768] kvmalloc_node+0xfc/0x10c
[ 329.500867] alloc_fdtable+0x94/0x114
[ 329.500974] expand_files+0x78/0x318
[ 329.501082] ksys_dup3+0x60/0x128
[ 329.501190] __arm64_sys_dup3+0x20/0x30
[ 329.501306] invoke_syscall+0x48/0x114
[ 329.501438] el0_svc_common.constprop.0+0x40/0xe0
[ 329.501580] do_el0_svc+0x1c/0x28
[ 329.501710] el0_svc+0x38/0xc8
[ 329.501821] el0t_64_sync_handler+0x120/0x12c
[ 329.501947] el0t_64_sync+0x190/0x194
[ 329.502051] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 329.497787] WARNING: CPU: 1 PID: 535 at mm/util.c:632 kvmalloc_node+0xfc/0x10c
[ 329.497928] Modules linked in: arm_spe_pmu crct10dif_ce panel_simple pl111_drm drm_dma_helper drm_kms_helper fuse drm backlight ip_tables x_tables
[ 329.498352] CPU: 1 PID: 535 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[ 329.498473] Hardware name: FVP Base RevC (DT)
[ 329.498542] pstate: 123402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[ 329.498677] pc : kvmalloc_node+0xfc/0x10c
[ 329.498775] lr : kvmalloc_node+0x64/0x10c
[ 329.498871] sp : ffff8000819c3ce0
[ 329.498940] x29: ffff8000819c3cf0 x28: ffff00080708f000 x27: 0000000000000000
[ 329.499122] x26: 0000000000000000 x25: 0000000000000000 x24: ffff00080140af40
[ 329.499300] x23: ffff00080140aec0 x22: a0bed7c64b6eece4 x21: 00000000ffffffff
[ 329.499484] x20: 0000000200002000 x19: 0000000000400cc0 x18: 0000000000000000
[ 329.499663] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 329.499838] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 329.500012] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[ 329.500187] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000001
[ 329.500360] x5 : 0000000000000000 x4 : ffff00080708f000 x3 : 0000000000000000
[ 329.500537] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[ 329.500713] Call trace:
[ 329.500768] kvmalloc_node+0xfc/0x10c
[ 329.500867] alloc_fdtable+0x94/0x114
[ 329.500974] expand_files+0x78/0x318
[ 329.501082] ksys_dup3+0x60/0x128
[ 329.501190] __arm64_sys_dup3+0x20/0x30
[ 329.501306] invoke_syscall+0x48/0x114
[ 329.501438] el0_svc_common.constprop.0+0x40/0xe0
[ 329.501580] do_el0_svc+0x1c/0x28
[ 329.501710] el0_svc+0x38/0xc8
[ 329.501821] el0t_64_sync_handler+0x120/0x12c
[ 329.501947] el0t_64_sync+0x190/0x194
[ 329.502051] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 214.429124] WARNING: CPU: 4 PID: 1452 at mm/util.c:632 kvmalloc_node+0xe0/0xe8
[ 214.439129] Modules linked in: hdlcd tda998x onboard_usb_hub cec drm_dma_helper crct10dif_ce drm_kms_helper fuse drm backlight ip_tables x_tables
[ 214.454972] CPU: 4 PID: 1452 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[ 214.464544] Hardware name: ARM Juno development board (r2) (DT)
[ 214.473250] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 214.482999] pc : kvmalloc_node+0xe0/0xe8
[ 214.489702] lr : kvmalloc_node+0x50/0xe8
[ 214.496405] sp : ffff8000835cbce0
[ 214.502498] x29: ffff8000835cbcf0 x28: ffff000822e1e000 x27: 0000000000000000
[ 214.512421] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 214.522343] x23: 0000000080000000 x22: ffff800080306d68 x21: 0000000200002000
[ 214.532265] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[ 214.542187] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 214.552109] x14: 0000000000000000 x13: 0000000000000000 x12: ffffffffffffe5ec
[ 214.562032] x11: 0000000000000040 x10: 6cdf6537adc69200 x9 : 6cdf6537adc69200
[ 214.571954] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000038
[ 214.581876] x5 : 0000000000000000 x4 : ffff8000835cbca0 x3 : 0000000000000000
[ 214.591798] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[ 214.601723] Call trace:
[ 214.606946] kvmalloc_node+0xe0/0xe8
[ 214.613299] alloc_fdtable+0x7c/0x108
[ 214.619740] expand_files+0x114/0x2f0
[ 214.626182] ksys_dup3+0x60/0xf4
[ 214.632188] __arm64_sys_dup3+0x20/0x30
[ 214.638803] invoke_syscall+0x40/0x100
[ 214.645332] el0_svc_common+0xa8/0xd8
[ 214.651773] do_el0_svc+0x1c/0x28
[ 214.657866] el0_svc+0x38/0x64
[ 214.663699] el0t_64_sync_handler+0x90/0xfc
[ 214.670663] el0t_64_sync+0x190/0x194
[ 214.677105] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 214.429124] WARNING: CPU: 4 PID: 1452 at mm/util.c:632 kvmalloc_node+0xe0/0xe8
[ 214.439129] Modules linked in: hdlcd tda998x onboard_usb_hub cec drm_dma_helper crct10dif_ce drm_kms_helper fuse drm backlight ip_tables x_tables
[ 214.454972] CPU: 4 PID: 1452 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[ 214.464544] Hardware name: ARM Juno development board (r2) (DT)
[ 214.473250] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 214.482999] pc : kvmalloc_node+0xe0/0xe8
[ 214.489702] lr : kvmalloc_node+0x50/0xe8
[ 214.496405] sp : ffff8000835cbce0
[ 214.502498] x29: ffff8000835cbcf0 x28: ffff000822e1e000 x27: 0000000000000000
[ 214.512421] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 214.522343] x23: 0000000080000000 x22: ffff800080306d68 x21: 0000000200002000
[ 214.532265] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[ 214.542187] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 214.552109] x14: 0000000000000000 x13: 0000000000000000 x12: ffffffffffffe5ec
[ 214.562032] x11: 0000000000000040 x10: 6cdf6537adc69200 x9 : 6cdf6537adc69200
[ 214.571954] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000038
[ 214.581876] x5 : 0000000000000000 x4 : ffff8000835cbca0 x3 : 0000000000000000
[ 214.591798] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[ 214.601723] Call trace:
[ 214.606946] kvmalloc_node+0xe0/0xe8
[ 214.613299] alloc_fdtable+0x7c/0x108
[ 214.619740] expand_files+0x114/0x2f0
[ 214.626182] ksys_dup3+0x60/0xf4
[ 214.632188] __arm64_sys_dup3+0x20/0x30
[ 214.638803] invoke_syscall+0x40/0x100
[ 214.645332] el0_svc_common+0xa8/0xd8
[ 214.651773] do_el0_svc+0x1c/0x28
[ 214.657866] el0_svc+0x38/0x64
[ 214.663699] el0t_64_sync_handler+0x90/0xfc
[ 214.670663] el0t_64_sync+0x190/0x194
[ 214.677105] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 217.246981] WARNING: CPU: 0 PID: 1452 at mm/util.c:632 kvmalloc_node+0xfc/0x10c
[ 217.254320] Modules linked in: tda998x hdlcd onboard_usb_hub cec drm_dma_helper crct10dif_ce drm_kms_helper fuse drm backlight ip_tables x_tables
[ 217.267445] CPU: 0 PID: 1452 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[ 217.274249] Hardware name: ARM Juno development board (r2) (DT)
[ 217.280178] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 217.287157] pc : kvmalloc_node+0xfc/0x10c
[ 217.291176] lr : kvmalloc_node+0x64/0x10c
[ 217.295193] sp : ffff800083ed3ce0
[ 217.298510] x29: ffff800083ed3cf0 x28: ffff00082d5e9000 x27: 0000000000000000
[ 217.305670] x26: 0000000000000000 x25: 0000000000000000 x24: ffff000821b5c600
[ 217.312830] x23: ffff000821b5c580 x22: ffff8000802eece4 x21: 00000000ffffffff
[ 217.319990] x20: 0000000200002000 x19: 0000000000400cc0 x18: 0000000000000000
[ 217.327150] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 217.334309] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 217.341468] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[ 217.348627] x8 : 0000000000000000 x7 : 0000000000000000 x6 : fffffffffffffd1c
[ 217.355786] x5 : 0000000000000000 x4 : ffff00082d5e9000 x3 : 0000000000000000
[ 217.362945] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[ 217.370104] Call trace:
[ 217.372552] kvmalloc_node+0xfc/0x10c
[ 217.376222] alloc_fdtable+0x94/0x114
[ 217.379895] expand_files+0x78/0x318
[ 217.383479] ksys_dup3+0x60/0x128
[ 217.386802] __arm64_sys_dup3+0x20/0x30
[ 217.390648] invoke_syscall+0x48/0x114
[ 217.394410] el0_svc_common.constprop.0+0x40/0xe0
[ 217.399129] do_el0_svc+0x1c/0x28
[ 217.402455] el0_svc+0x38/0xc8
[ 217.405519] el0t_64_sync_handler+0x120/0x12c
[ 217.409888] el0t_64_sync+0x190/0x194
[ 217.413559] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 217.246981] WARNING: CPU: 0 PID: 1452 at mm/util.c:632 kvmalloc_node+0xfc/0x10c
[ 217.254320] Modules linked in: tda998x hdlcd onboard_usb_hub cec drm_dma_helper crct10dif_ce drm_kms_helper fuse drm backlight ip_tables x_tables
[ 217.267445] CPU: 0 PID: 1452 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[ 217.274249] Hardware name: ARM Juno development board (r2) (DT)
[ 217.280178] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 217.287157] pc : kvmalloc_node+0xfc/0x10c
[ 217.291176] lr : kvmalloc_node+0x64/0x10c
[ 217.295193] sp : ffff800083ed3ce0
[ 217.298510] x29: ffff800083ed3cf0 x28: ffff00082d5e9000 x27: 0000000000000000
[ 217.305670] x26: 0000000000000000 x25: 0000000000000000 x24: ffff000821b5c600
[ 217.312830] x23: ffff000821b5c580 x22: ffff8000802eece4 x21: 00000000ffffffff
[ 217.319990] x20: 0000000200002000 x19: 0000000000400cc0 x18: 0000000000000000
[ 217.327150] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 217.334309] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 217.341468] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[ 217.348627] x8 : 0000000000000000 x7 : 0000000000000000 x6 : fffffffffffffd1c
[ 217.355786] x5 : 0000000000000000 x4 : ffff00082d5e9000 x3 : 0000000000000000
[ 217.362945] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[ 217.370104] Call trace:
[ 217.372552] kvmalloc_node+0xfc/0x10c
[ 217.376222] alloc_fdtable+0x94/0x114
[ 217.379895] expand_files+0x78/0x318
[ 217.383479] ksys_dup3+0x60/0x128
[ 217.386802] __arm64_sys_dup3+0x20/0x30
[ 217.390648] invoke_syscall+0x48/0x114
[ 217.394410] el0_svc_common.constprop.0+0x40/0xe0
[ 217.399129] do_el0_svc+0x1c/0x28
[ 217.402455] el0_svc+0x38/0xc8
[ 217.405519] el0t_64_sync_handler+0x120/0x12c
[ 217.409888] el0t_64_sync+0x190/0x194
[ 217.413559] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 53.808384] WARNING: CPU: 1 PID: 465 at mm/util.c:632 kvmalloc_node+0xe0/0xe8
[ 53.809928] Modules linked in: crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[ 53.814330] CPU: 1 PID: 465 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[ 53.814883] Hardware name: linux,dummy-virt (DT)
[ 53.816379] pstate: 23402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[ 53.817631] pc : kvmalloc_node+0xe0/0xe8
[ 53.817898] lr : kvmalloc_node+0x50/0xe8
[ 53.818142] sp : ffff80008080bce0
[ 53.818361] x29: ffff80008080bcf0 x28: ffff0000c740d000 x27: 0000000000000000
[ 53.820331] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 53.821585] x23: 0000000080001000 x22: 39d0acce39706d68 x21: 0000000200002000
[ 53.822091] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[ 53.822766] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 53.823392] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 53.824049] x11: 0000000000000040 x10: cdcba7fd1a130900 x9 : cdcba7fd1a130900
[ 53.824607] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000038
[ 53.825138] x5 : 0000000000000000 x4 : ffff80008080bca0 x3 : 0000000000000000
[ 53.825743] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[ 53.826719] Call trace:
[ 53.827332] kvmalloc_node+0xe0/0xe8
[ 53.827954] alloc_fdtable+0x7c/0x108
[ 53.828320] expand_files+0x114/0x2f0
[ 53.828713] ksys_dup3+0x60/0xf4
[ 53.829074] __arm64_sys_dup3+0x20/0x30
[ 53.829496] invoke_syscall+0x40/0x100
[ 53.830018] el0_svc_common+0xa8/0xd8
[ 53.830359] do_el0_svc+0x1c/0x28
[ 53.830607] el0_svc+0x38/0x64
[ 53.830984] el0t_64_sync_handler+0x90/0xfc
[ 53.831379] el0t_64_sync+0x190/0x194
[ 53.832089] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 53.808384] WARNING: CPU: 1 PID: 465 at mm/util.c:632 kvmalloc_node+0xe0/0xe8
[ 53.809928] Modules linked in: crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[ 53.814330] CPU: 1 PID: 465 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[ 53.814883] Hardware name: linux,dummy-virt (DT)
[ 53.816379] pstate: 23402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[ 53.817631] pc : kvmalloc_node+0xe0/0xe8
[ 53.817898] lr : kvmalloc_node+0x50/0xe8
[ 53.818142] sp : ffff80008080bce0
[ 53.818361] x29: ffff80008080bcf0 x28: ffff0000c740d000 x27: 0000000000000000
[ 53.820331] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 53.821585] x23: 0000000080001000 x22: 39d0acce39706d68 x21: 0000000200002000
[ 53.822091] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[ 53.822766] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 53.823392] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 53.824049] x11: 0000000000000040 x10: cdcba7fd1a130900 x9 : cdcba7fd1a130900
[ 53.824607] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000038
[ 53.825138] x5 : 0000000000000000 x4 : ffff80008080bca0 x3 : 0000000000000000
[ 53.825743] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[ 53.826719] Call trace:
[ 53.827332] kvmalloc_node+0xe0/0xe8
[ 53.827954] alloc_fdtable+0x7c/0x108
[ 53.828320] expand_files+0x114/0x2f0
[ 53.828713] ksys_dup3+0x60/0xf4
[ 53.829074] __arm64_sys_dup3+0x20/0x30
[ 53.829496] invoke_syscall+0x40/0x100
[ 53.830018] el0_svc_common+0xa8/0xd8
[ 53.830359] do_el0_svc+0x1c/0x28
[ 53.830607] el0_svc+0x38/0x64
[ 53.830984] el0t_64_sync_handler+0x90/0xfc
[ 53.831379] el0t_64_sync+0x190/0x194
[ 53.832089] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 51.310404] WARNING: CPU: 1 PID: 464 at mm/util.c:632 kvmalloc_node+0xfc/0x10c
[ 51.313315] Modules linked in: crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[ 51.316142] CPU: 1 PID: 464 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[ 51.316759] Hardware name: linux,dummy-virt (DT)
[ 51.317342] pstate: 23402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[ 51.317954] pc : kvmalloc_node+0xfc/0x10c
[ 51.319178] lr : kvmalloc_node+0x64/0x10c
[ 51.319891] sp : ffff80008084bce0
[ 51.320583] x29: ffff80008084bcf0 x28: ffff0000c27f7000 x27: 0000000000000000
[ 51.321371] x26: 0000000000000000 x25: 0000000000000000 x24: ffff0000c0861c00
[ 51.322469] x23: ffff0000c0861b80 x22: 90aba64c6b6eece4 x21: 00000000ffffffff
[ 51.323525] x20: 0000000200002000 x19: 0000000000400cc0 x18: 0000000000000000
[ 51.323990] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 51.325237] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 51.326248] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[ 51.327327] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000001
[ 51.328142] x5 : 0000000000000000 x4 : ffff0000c27f7000 x3 : 0000000000000000
[ 51.329794] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[ 51.331286] Call trace:
[ 51.331989] kvmalloc_node+0xfc/0x10c
[ 51.332504] alloc_fdtable+0x94/0x114
[ 51.333478] expand_files+0x78/0x318
[ 51.333886] ksys_dup3+0x60/0x128
[ 51.334241] __arm64_sys_dup3+0x20/0x30
[ 51.334631] invoke_syscall+0x48/0x114
[ 51.335721] el0_svc_common.constprop.0+0x40/0xe0
[ 51.337361] do_el0_svc+0x1c/0x28
[ 51.337764] el0_svc+0x38/0xc8
[ 51.338118] el0t_64_sync_handler+0x120/0x12c
[ 51.339579] el0t_64_sync+0x190/0x194
[ 51.340188] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 51.310404] WARNING: CPU: 1 PID: 464 at mm/util.c:632 kvmalloc_node+0xfc/0x10c
[ 51.313315] Modules linked in: crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[ 51.316142] CPU: 1 PID: 464 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[ 51.316759] Hardware name: linux,dummy-virt (DT)
[ 51.317342] pstate: 23402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[ 51.317954] pc : kvmalloc_node+0xfc/0x10c
[ 51.319178] lr : kvmalloc_node+0x64/0x10c
[ 51.319891] sp : ffff80008084bce0
[ 51.320583] x29: ffff80008084bcf0 x28: ffff0000c27f7000 x27: 0000000000000000
[ 51.321371] x26: 0000000000000000 x25: 0000000000000000 x24: ffff0000c0861c00
[ 51.322469] x23: ffff0000c0861b80 x22: 90aba64c6b6eece4 x21: 00000000ffffffff
[ 51.323525] x20: 0000000200002000 x19: 0000000000400cc0 x18: 0000000000000000
[ 51.323990] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 51.325237] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 51.326248] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[ 51.327327] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000001
[ 51.328142] x5 : 0000000000000000 x4 : ffff0000c27f7000 x3 : 0000000000000000
[ 51.329794] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[ 51.331286] Call trace:
[ 51.331989] kvmalloc_node+0xfc/0x10c
[ 51.332504] alloc_fdtable+0x94/0x114
[ 51.333478] expand_files+0x78/0x318
[ 51.333886] ksys_dup3+0x60/0x128
[ 51.334241] __arm64_sys_dup3+0x20/0x30
[ 51.334631] invoke_syscall+0x48/0x114
[ 51.335721] el0_svc_common.constprop.0+0x40/0xe0
[ 51.337361] do_el0_svc+0x1c/0x28
[ 51.337764] el0_svc+0x38/0xc8
[ 51.338118] el0t_64_sync_handler+0x120/0x12c
[ 51.339579] el0t_64_sync+0x190/0x194
[ 51.340188] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 48.356714] WARNING: CPU: 0 PID: 471 at mm/util.c:632 kvmalloc_node+0xfc/0x108
[ 48.358680] Modules linked in:
[ 48.360839] CPU: 0 PID: 471 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[ 48.361836] Hardware name: Generic DT based system
[ 48.363328] unwind_backtrace from show_stack+0x10/0x14
[ 48.364842] show_stack from dump_stack_lvl+0x48/0x54
[ 48.365680] dump_stack_lvl from __warn+0xd4/0x200
[ 48.366542] __warn from warn_slowpath_fmt+0x11c/0x168
[ 48.367094] warn_slowpath_fmt from kvmalloc_node+0xfc/0x108
[ 48.368083] kvmalloc_node from alloc_fdtable+0x78/0x104
[ 48.368781] alloc_fdtable from expand_files+0x134/0x304
[ 48.369658] expand_files from ksys_dup3+0x58/0xd0
[ 48.370077] ksys_dup3 from ret_fast_syscall+0x0/0x4c
[ 48.371376] Exception stack(0xfa21dfa8 to 0xfa21dff0)
[ 48.372052] dfa0: 004f6bcd 00000001 00000002 2000003c 00000000 00000000
[ 48.372446] dfc0: 004f6bcd 00000001 004f8e6c 0000003f 004f4920 b6f47ce0 00000000 bea813e0
[ 48.373413] dfe0: 0000003f bea811b4 b6ea6f43 b6e24786
[ 48.375663] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 48.356714] WARNING: CPU: 0 PID: 471 at mm/util.c:632 kvmalloc_node+0xfc/0x108
[ 48.358680] Modules linked in:
[ 48.360839] CPU: 0 PID: 471 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[ 48.361836] Hardware name: Generic DT based system
[ 48.363328] unwind_backtrace from show_stack+0x10/0x14
[ 48.364842] show_stack from dump_stack_lvl+0x48/0x54
[ 48.365680] dump_stack_lvl from __warn+0xd4/0x200
[ 48.366542] __warn from warn_slowpath_fmt+0x11c/0x168
[ 48.367094] warn_slowpath_fmt from kvmalloc_node+0xfc/0x108
[ 48.368083] kvmalloc_node from alloc_fdtable+0x78/0x104
[ 48.368781] alloc_fdtable from expand_files+0x134/0x304
[ 48.369658] expand_files from ksys_dup3+0x58/0xd0
[ 48.370077] ksys_dup3 from ret_fast_syscall+0x0/0x4c
[ 48.371376] Exception stack(0xfa21dfa8 to 0xfa21dff0)
[ 48.372052] dfa0: 004f6bcd 00000001 00000002 2000003c 00000000 00000000
[ 48.372446] dfc0: 004f6bcd 00000001 004f8e6c 0000003f 004f4920 b6f47ce0 00000000 bea813e0
[ 48.373413] dfe0: 0000003f bea811b4 b6ea6f43 b6e24786
[ 48.375663] ---[ end trace 0000000000000000 ]---
Home
[ 124.845724] ==================================================================
[ 124.846701] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0xf4/0x1d0
[ 124.847438] Read of size 1 at addr fa0abd3f by task kunit_try_catch/182
[ 124.848191]
[ 124.848459] CPU: 1 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 124.849465] Hardware name: Generic DT based system
[ 124.850694] unwind_backtrace from show_stack+0x18/0x1c
[ 124.851580] show_stack from dump_stack_lvl+0x58/0x70
[ 124.852398] dump_stack_lvl from print_report+0x164/0x51c
[ 124.853228] print_report from kasan_report+0xc8/0x104
[ 124.854065] kasan_report from kasan_alloca_oob_left+0xf4/0x1d0
[ 124.854933] kasan_alloca_oob_left from kunit_try_run_case+0x11c/0x2e4
[ 124.855810] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 124.856726] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 124.857535] kthread from ret_from_fork+0x14/0x30
[ 124.858151] Exception stack(0xfa0abfb0 to 0xfa0abff8)
[ 124.858856] bfa0: 00000000 00000000 00000000 00000000
[ 124.859638] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 124.860852] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 124.861924]
[ 124.862227] The buggy address belongs to stack of task kunit_try_catch/182
[ 124.862960]
[ 124.863230] The buggy address belongs to the virtual mapping at
[ 124.863230] [fa0a8000, fa0ad000) created by:
[ 124.863230] kernel_clone+0xcc/0x4b0
[ 124.865262]
[ 124.865599] The buggy address belongs to the physical page:
[ 124.866238] page:e3007dee refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fc9e
[ 124.867429] flags: 0x80000000(zone=2)
[ 124.867914] page_type: 0xffffffff()
[ 124.868764] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 124.870086] raw: 00000000
[ 124.870769] page dumped because: kasan: bad access detected
[ 124.871383]
[ 124.871968] Memory state around the buggy address:
[ 124.872781] fa0abc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 124.873396] fa0abc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 124.874134] >fa0abd00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[ 124.875157] ^
[ 124.875927] fa0abd80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 04 f2 04 f2
[ 124.876861] fa0abe00: 00 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
[ 124.877511] ==================================================================
Home
[ 124.887645] ==================================================================
[ 124.888708] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0xfc/0x1dc
[ 124.889939] Read of size 1 at addr fa0bbd4a by task kunit_try_catch/184
[ 124.890517]
[ 124.891366] CPU: 1 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 124.892228] Hardware name: Generic DT based system
[ 124.893407] unwind_backtrace from show_stack+0x18/0x1c
[ 124.894428] show_stack from dump_stack_lvl+0x58/0x70
[ 124.895363] dump_stack_lvl from print_report+0x164/0x51c
[ 124.896263] print_report from kasan_report+0xc8/0x104
[ 124.897088] kasan_report from kasan_alloca_oob_right+0xfc/0x1dc
[ 124.897873] kasan_alloca_oob_right from kunit_try_run_case+0x11c/0x2e4
[ 124.898678] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 124.900270] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 124.901803] kthread from ret_from_fork+0x14/0x30
[ 124.902643] Exception stack(0xfa0bbfb0 to 0xfa0bbff8)
[ 124.903230] bfa0: 00000000 00000000 00000000 00000000
[ 124.904443] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 124.905476] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 124.906338]
[ 124.906798] The buggy address belongs to stack of task kunit_try_catch/184
[ 124.907541]
[ 124.907839] The buggy address belongs to the virtual mapping at
[ 124.907839] [fa0b8000, fa0bd000) created by:
[ 124.907839] kernel_clone+0xcc/0x4b0
[ 124.909545]
[ 124.910285] The buggy address belongs to the physical page:
[ 124.911309] page:deea74ee refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fca6
[ 124.912345] flags: 0x80000000(zone=2)
[ 124.913037] page_type: 0xffffffff()
[ 124.913831] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 124.914632] raw: 00000000
[ 124.914992] page dumped because: kasan: bad access detected
[ 124.915575]
[ 124.916346] Memory state around the buggy address:
[ 124.916735] fa0bbc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 124.917734] fa0bbc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 124.918656] >fa0bbd00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[ 124.919499] ^
[ 124.920730] fa0bbd80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 04 f2 04 f2
[ 124.921395] fa0bbe00: 00 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
[ 124.922424] ==================================================================
Home
[ 126.268069] ==================================================================
[ 126.268783] BUG: KASAN: double-free in kmalloc_double_kzfree+0xd0/0x1cc
[ 126.269968] Free of addr c8fcbe00 by task kunit_try_catch/207
[ 126.271053]
[ 126.271344] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 126.272162] Hardware name: Generic DT based system
[ 126.274150] unwind_backtrace from show_stack+0x18/0x1c
[ 126.275073] show_stack from dump_stack_lvl+0x58/0x70
[ 126.275949] dump_stack_lvl from print_report+0x164/0x51c
[ 126.276870] print_report from kasan_report_invalid_free+0xb4/0xe8
[ 126.277728] kasan_report_invalid_free from __kasan_slab_free+0xfc/0x124
[ 126.278862] __kasan_slab_free from __kmem_cache_free+0x140/0x2a8
[ 126.279913] __kmem_cache_free from kmalloc_double_kzfree+0xd0/0x1cc
[ 126.282317] kmalloc_double_kzfree from kunit_try_run_case+0x11c/0x2e4
[ 126.282980] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 126.283915] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 126.284801] kthread from ret_from_fork+0x14/0x30
[ 126.285439] Exception stack(0xf9d63fb0 to 0xf9d63ff8)
[ 126.286209] 3fa0: 00000000 00000000 00000000 00000000
[ 126.287239] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 126.288264] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 126.288918]
[ 126.289178] Allocated by task 207:
[ 126.289960] kasan_set_track+0x3c/0x5c
[ 126.290490] __kasan_kmalloc+0x8c/0x94
[ 126.291719] kmalloc_double_kzfree+0xa0/0x1cc
[ 126.292349] kunit_try_run_case+0x11c/0x2e4
[ 126.292947] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 126.293439] kthread+0x184/0x1a8
[ 126.293962] ret_from_fork+0x14/0x30
[ 126.294496]
[ 126.294757] Freed by task 207:
[ 126.295189] kasan_set_track+0x3c/0x5c
[ 126.295675] kasan_save_free_info+0x30/0x3c
[ 126.296268] __kasan_slab_free+0xdc/0x124
[ 126.296759] __kmem_cache_free+0x140/0x2a8
[ 126.297360] kmalloc_double_kzfree+0xbc/0x1cc
[ 126.297918] kunit_try_run_case+0x11c/0x2e4
[ 126.298556] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 126.299284] kthread+0x184/0x1a8
[ 126.300562] ret_from_fork+0x14/0x30
[ 126.301128]
[ 126.301404] The buggy address belongs to the object at c8fcbe00
[ 126.301404] which belongs to the cache kmalloc-64 of size 64
[ 126.302539] The buggy address is located 0 bytes inside of
[ 126.302539] 64-byte region [c8fcbe00, c8fcbe40)
[ 126.303729]
[ 126.304007] The buggy address belongs to the physical page:
[ 126.304677] page:69fea40a refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fcb
[ 126.305312] flags: 0x800(slab|zone=0)
[ 126.305874] page_type: 0xffffffff()
[ 126.306419] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 126.307317] raw: 00000000
[ 126.307728] page dumped because: kasan: bad access detected
[ 126.308247]
[ 126.308532] Memory state around the buggy address:
[ 126.309145] c8fcbd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 126.310294] c8fcbd80: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 126.310921] >c8fcbe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 126.311596] ^
[ 126.312883] c8fcbe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 126.313729] c8fcbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 126.314274] ==================================================================
Home
[ 125.213600] ==================================================================
[ 125.214834] BUG: KASAN: double-free in kmem_cache_double_free+0xe4/0x23c
[ 125.215731] Free of addr c4ce3000 by task kunit_try_catch/190
[ 125.216399]
[ 125.216711] CPU: 1 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 125.217518] Hardware name: Generic DT based system
[ 125.218090] unwind_backtrace from show_stack+0x18/0x1c
[ 125.218886] show_stack from dump_stack_lvl+0x58/0x70
[ 125.219487] dump_stack_lvl from print_report+0x164/0x51c
[ 125.220294] print_report from kasan_report_invalid_free+0xb4/0xe8
[ 125.221496] kasan_report_invalid_free from __kasan_slab_free+0xfc/0x124
[ 125.222457] __kasan_slab_free from kmem_cache_free+0x170/0x41c
[ 125.223374] kmem_cache_free from kmem_cache_double_free+0xe4/0x23c
[ 125.224286] kmem_cache_double_free from kunit_try_run_case+0x11c/0x2e4
[ 125.225103] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.226140] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 125.226997] kthread from ret_from_fork+0x14/0x30
[ 125.227602] Exception stack(0xfa0e3fb0 to 0xfa0e3ff8)
[ 125.228193] 3fa0: 00000000 00000000 00000000 00000000
[ 125.229002] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 125.229815] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 125.230845]
[ 125.231131] Allocated by task 190:
[ 125.231813] kasan_set_track+0x3c/0x5c
[ 125.232401] __kasan_slab_alloc+0x60/0x68
[ 125.232979] kmem_cache_alloc+0x1dc/0x574
[ 125.233580] kmem_cache_double_free+0xb0/0x23c
[ 125.234197] kunit_try_run_case+0x11c/0x2e4
[ 125.234825] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.235461] kthread+0x184/0x1a8
[ 125.235989] ret_from_fork+0x14/0x30
[ 125.236490]
[ 125.236804] Freed by task 190:
[ 125.237212] kasan_set_track+0x3c/0x5c
[ 125.237744] kasan_save_free_info+0x30/0x3c
[ 125.238360] __kasan_slab_free+0xdc/0x124
[ 125.238927] kmem_cache_free+0x170/0x41c
[ 125.239600] kmem_cache_double_free+0xcc/0x23c
[ 125.240252] kunit_try_run_case+0x11c/0x2e4
[ 125.240894] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.241942] kthread+0x184/0x1a8
[ 125.242395] ret_from_fork+0x14/0x30
[ 125.242890]
[ 125.243180] The buggy address belongs to the object at c4ce3000
[ 125.243180] which belongs to the cache test_cache of size 200
[ 125.244348] The buggy address is located 0 bytes inside of
[ 125.244348] 200-byte region [c4ce3000, c4ce30c8)
[ 125.245399]
[ 125.245684] The buggy address belongs to the physical page:
[ 125.246349] page:7f63fee1 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce3
[ 125.247167] flags: 0x800(slab|zone=0)
[ 125.247734] page_type: 0xffffffff()
[ 125.248292] raw: 00000800 c4cde200 00000122 00000000 00000000 800f000f ffffffff 00000001
[ 125.249156] raw: 00000000
[ 125.249903] page dumped because: kasan: bad access detected
[ 125.250568]
[ 125.250877] Memory state around the buggy address:
[ 125.251478] c4ce2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.252277] c4ce2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.252905] >c4ce3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 125.253651] ^
[ 125.254044] c4ce3080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[ 125.254829] c4ce3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.255431] ==================================================================
Home
[ 124.752068] ==================================================================
[ 124.753058] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0xa0/0x150
[ 124.753885] Read of size 1 at addr c418502d by task kunit_try_catch/176
[ 124.754630]
[ 124.754941] CPU: 1 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 124.755837] Hardware name: Generic DT based system
[ 124.756269] unwind_backtrace from show_stack+0x18/0x1c
[ 124.757076] show_stack from dump_stack_lvl+0x58/0x70
[ 124.757862] dump_stack_lvl from print_report+0x164/0x51c
[ 124.758459] print_report from kasan_report+0xc8/0x104
[ 124.759250] kasan_report from kasan_global_oob_right+0xa0/0x150
[ 124.760492] kasan_global_oob_right from kunit_try_run_case+0x11c/0x2e4
[ 124.761370] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 124.762215] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 124.762964] kthread from ret_from_fork+0x14/0x30
[ 124.764067] Exception stack(0xfa083fb0 to 0xfa083ff8)
[ 124.764661] 3fa0: 00000000 00000000 00000000 00000000
[ 124.765481] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 124.766893] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 124.767827]
[ 124.768372] The buggy address belongs to the variable:
[ 124.769116] global_array+0xd/0x40
[ 124.769880]
[ 124.770822] The buggy address belongs to the physical page:
[ 124.771241] page:796266e7 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44185
[ 124.772144] flags: 0x4000(reserved|zone=0)
[ 124.772863] page_type: 0xffffffff()
[ 124.773561] raw: 00004000 edc8c6b8 edc8c6b8 00000000 00000000 00000000 ffffffff 00000001
[ 124.774588] raw: 00000000
[ 124.774923] page dumped because: kasan: bad access detected
[ 124.775734]
[ 124.776025] Memory state around the buggy address:
[ 124.776590] c4184f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 124.777416] c4184f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 124.778204] >c4185000: 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 02 f9 f9 f9
[ 124.779012] ^
[ 124.779551] c4185080: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9
[ 124.780237] c4185100: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[ 124.780823] ==================================================================
Home
[ 122.701685] ==================================================================
[ 122.702991] BUG: KASAN: invalid-free in kmalloc_pagealloc_invalid_free+0xb0/0x1b0
[ 122.703831] Free of addr c4dd8001 by task kunit_try_catch/122
[ 122.704414]
[ 122.704741] CPU: 1 PID: 122 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 122.705413] Hardware name: Generic DT based system
[ 122.706163] unwind_backtrace from show_stack+0x18/0x1c
[ 122.707046] show_stack from dump_stack_lvl+0x58/0x70
[ 122.707882] dump_stack_lvl from print_report+0x164/0x51c
[ 122.708709] print_report from kasan_report_invalid_free+0xb4/0xe8
[ 122.709707] kasan_report_invalid_free from free_large_kmalloc+0x48/0x104
[ 122.710555] free_large_kmalloc from kmalloc_pagealloc_invalid_free+0xb0/0x1b0
[ 122.711264] kmalloc_pagealloc_invalid_free from kunit_try_run_case+0x11c/0x2e4
[ 122.712274] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 122.713252] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 122.714055] kthread from ret_from_fork+0x14/0x30
[ 122.714721] Exception stack(0xf9edbfb0 to 0xf9edbff8)
[ 122.715354] bfa0: 00000000 00000000 00000000 00000000
[ 122.716162] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 122.717032] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 122.717799]
[ 122.718053] The buggy address belongs to the physical page:
[ 122.718746] page:50be9d29 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44dd8
[ 122.719532] head:50be9d29 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 122.720317] flags: 0x40(head|zone=0)
[ 122.720855] page_type: 0xffffffff()
[ 122.721409] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 122.722198] raw: 00000000
[ 122.722537] page dumped because: kasan: bad access detected
[ 122.723216]
[ 122.723510] Memory state around the buggy address:
[ 122.724104] c4dd7f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 122.724744] c4dd7f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 122.725500] >c4dd8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 122.726281] ^
[ 122.726748] c4dd8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 122.727318] c4dd8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 122.728498] ==================================================================
Home
[ 125.274833] ==================================================================
[ 125.275683] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xd8/0x23c
[ 125.276725] Free of addr c4ce4001 by task kunit_try_catch/192
[ 125.277369]
[ 125.277758] CPU: 1 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 125.278602] Hardware name: Generic DT based system
[ 125.279191] unwind_backtrace from show_stack+0x18/0x1c
[ 125.280013] show_stack from dump_stack_lvl+0x58/0x70
[ 125.281867] dump_stack_lvl from print_report+0x164/0x51c
[ 125.282639] print_report from kasan_report_invalid_free+0xb4/0xe8
[ 125.283589] kasan_report_invalid_free from __kasan_slab_free+0x114/0x124
[ 125.284527] __kasan_slab_free from kmem_cache_free+0x170/0x41c
[ 125.285517] kmem_cache_free from kmem_cache_invalid_free+0xd8/0x23c
[ 125.286534] kmem_cache_invalid_free from kunit_try_run_case+0x11c/0x2e4
[ 125.287583] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.288713] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 125.289839] kthread from ret_from_fork+0x14/0x30
[ 125.290808] Exception stack(0xfa0f3fb0 to 0xfa0f3ff8)
[ 125.291680] 3fa0: 00000000 00000000 00000000 00000000
[ 125.292762] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 125.293802] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 125.294764]
[ 125.295265] Allocated by task 192:
[ 125.295837] kasan_set_track+0x3c/0x5c
[ 125.296328] __kasan_slab_alloc+0x60/0x68
[ 125.296846] kmem_cache_alloc+0x1dc/0x574
[ 125.297339] kmem_cache_invalid_free+0xb0/0x23c
[ 125.298416] kunit_try_run_case+0x11c/0x2e4
[ 125.299254] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.300000] kthread+0x184/0x1a8
[ 125.300957] ret_from_fork+0x14/0x30
[ 125.301716]
[ 125.302215] The buggy address belongs to the object at c4ce4000
[ 125.302215] which belongs to the cache test_cache of size 200
[ 125.303444] The buggy address is located 1 bytes inside of
[ 125.303444] 200-byte region [c4ce4000, c4ce40c8)
[ 125.304598]
[ 125.305338] The buggy address belongs to the physical page:
[ 125.306071] page:192b438f refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ce4
[ 125.306942] flags: 0x800(slab|zone=0)
[ 125.307398] page_type: 0xffffffff()
[ 125.308262] raw: 00000800 c4cde300 00000122 00000000 00000000 800f000f ffffffff 00000001
[ 125.309108] raw: 00000000
[ 125.310229] page dumped because: kasan: bad access detected
[ 125.310774]
[ 125.311061] Memory state around the buggy address:
[ 125.311903] c4ce3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.312566] c4ce3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.313257] >c4ce4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 125.314355] ^
[ 125.314789] c4ce4080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[ 125.315814] c4ce4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.316679] ==================================================================
Home
[ 123.783068] ==================================================================
[ 123.784191] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0xe4/0x1f0
[ 123.785182] Read of size 4294967294 at addr c4cdd484 by task kunit_try_catch/154
[ 123.786142]
[ 123.786466] CPU: 1 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 123.787524] Hardware name: Generic DT based system
[ 123.788053] unwind_backtrace from show_stack+0x18/0x1c
[ 123.788816] show_stack from dump_stack_lvl+0x58/0x70
[ 123.789572] dump_stack_lvl from print_report+0x164/0x51c
[ 123.790238] print_report from kasan_report+0xc8/0x104
[ 123.790963] kasan_report from kasan_check_range+0x14c/0x198
[ 123.791753] kasan_check_range from __asan_memmove+0x28/0x68
[ 123.792531] __asan_memmove from kmalloc_memmove_negative_size+0xe4/0x1f0
[ 123.793403] kmalloc_memmove_negative_size from kunit_try_run_case+0x11c/0x2e4
[ 123.794381] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.795337] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 123.796184] kthread from ret_from_fork+0x14/0x30
[ 123.796723] Exception stack(0xf9fdbfb0 to 0xf9fdbff8)
[ 123.797386] bfa0: 00000000 00000000 00000000 00000000
[ 123.798220] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 123.799025] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 123.799840]
[ 123.800128] Allocated by task 154:
[ 123.800547] kasan_set_track+0x3c/0x5c
[ 123.801166] __kasan_kmalloc+0x8c/0x94
[ 123.802830] kmalloc_memmove_negative_size+0xa0/0x1f0
[ 123.803754] kunit_try_run_case+0x11c/0x2e4
[ 123.804358] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.805110] kthread+0x184/0x1a8
[ 123.805500] ret_from_fork+0x14/0x30
[ 123.806057]
[ 123.806335] The buggy address belongs to the object at c4cdd480
[ 123.806335] which belongs to the cache kmalloc-64 of size 64
[ 123.807350] The buggy address is located 4 bytes inside of
[ 123.807350] 64-byte region [c4cdd480, c4cdd4c0)
[ 123.808396]
[ 123.808726] The buggy address belongs to the physical page:
[ 123.809385] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[ 123.810077] flags: 0x800(slab|zone=0)
[ 123.810647] page_type: 0xffffffff()
[ 123.811230] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 123.811965] raw: 00000000
[ 123.812369] page dumped because: kasan: bad access detected
[ 123.812912]
[ 123.813198] Memory state around the buggy address:
[ 123.813864] c4cdd380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 123.814538] c4cdd400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 123.815353] >c4cdd480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 123.816068] ^
[ 123.816490] c4cdd500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.817223] c4cdd580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.817915] ==================================================================
Home
[ 125.882949] ==================================================================
[ 125.884640] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x26c/0xc30
[ 125.885434] Read of size 4 at addr c4cddf84 by task kunit_try_catch/203
[ 125.886115]
[ 125.886424] CPU: 1 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 125.887703] Hardware name: Generic DT based system
[ 125.888300] unwind_backtrace from show_stack+0x18/0x1c
[ 125.889094] show_stack from dump_stack_lvl+0x58/0x70
[ 125.890353] dump_stack_lvl from print_report+0x164/0x51c
[ 125.891063] print_report from kasan_report+0xc8/0x104
[ 125.891892] kasan_report from kasan_bitops_generic+0x26c/0xc30
[ 125.892914] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 125.893884] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.894836] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 125.895727] kthread from ret_from_fork+0x14/0x30
[ 125.896368] Exception stack(0xfa133fb0 to 0xfa133ff8)
[ 125.896972] 3fa0: 00000000 00000000 00000000 00000000
[ 125.897775] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 125.898512] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 125.899291]
[ 125.899680] Allocated by task 203:
[ 125.900128] kasan_set_track+0x3c/0x5c
[ 125.901025] __kasan_kmalloc+0x8c/0x94
[ 125.901867] kasan_bitops_generic+0xa0/0xc30
[ 125.902335] kunit_try_run_case+0x11c/0x2e4
[ 125.902976] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.903758] kthread+0x184/0x1a8
[ 125.904284] ret_from_fork+0x14/0x30
[ 125.904729]
[ 125.905028] The buggy address belongs to the object at c4cddf80
[ 125.905028] which belongs to the cache kmalloc-64 of size 64
[ 125.906050] The buggy address is located 4 bytes inside of
[ 125.906050] allocated 5-byte region [c4cddf80, c4cddf85)
[ 125.907143]
[ 125.907441] The buggy address belongs to the physical page:
[ 125.908092] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[ 125.909034] flags: 0x800(slab|zone=0)
[ 125.909563] page_type: 0xffffffff()
[ 125.910487] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 125.911420] raw: 00000000
[ 125.911827] page dumped because: kasan: bad access detected
[ 125.912416]
[ 125.912883] Memory state around the buggy address:
[ 125.913675] c4cdde80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 125.914286] c4cddf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 125.914963] >c4cddf80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.915487] ^
[ 125.915914] c4cde000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 125.916708] c4cde080: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.917294] ==================================================================
---
[ 125.998515] ==================================================================
[ 125.999337] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x318/0xc30
[ 126.001383] Read of size 4 at addr c4cddf84 by task kunit_try_catch/203
[ 126.002192]
[ 126.002461] CPU: 1 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 126.003450] Hardware name: Generic DT based system
[ 126.004061] unwind_backtrace from show_stack+0x18/0x1c
[ 126.004974] show_stack from dump_stack_lvl+0x58/0x70
[ 126.005661] dump_stack_lvl from print_report+0x164/0x51c
[ 126.006512] print_report from kasan_report+0xc8/0x104
[ 126.007320] kasan_report from kasan_bitops_generic+0x318/0xc30
[ 126.008111] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 126.009003] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 126.010313] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 126.011247] kthread from ret_from_fork+0x14/0x30
[ 126.011914] Exception stack(0xfa133fb0 to 0xfa133ff8)
[ 126.012486] 3fa0: 00000000 00000000 00000000 00000000
[ 126.013428] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 126.014370] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 126.015112]
[ 126.015409] Allocated by task 203:
[ 126.015919] kasan_set_track+0x3c/0x5c
[ 126.016518] __kasan_kmalloc+0x8c/0x94
[ 126.017139] kasan_bitops_generic+0xa0/0xc30
[ 126.017752] kunit_try_run_case+0x11c/0x2e4
[ 126.018426] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 126.019151] kthread+0x184/0x1a8
[ 126.020079] ret_from_fork+0x14/0x30
[ 126.020566]
[ 126.020790] The buggy address belongs to the object at c4cddf80
[ 126.020790] which belongs to the cache kmalloc-64 of size 64
[ 126.021984] The buggy address is located 4 bytes inside of
[ 126.021984] allocated 5-byte region [c4cddf80, c4cddf85)
[ 126.023079]
[ 126.023462] The buggy address belongs to the physical page:
[ 126.024037] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[ 126.025003] flags: 0x800(slab|zone=0)
[ 126.025458] page_type: 0xffffffff()
[ 126.026041] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 126.026943] raw: 00000000
[ 126.027276] page dumped because: kasan: bad access detected
[ 126.027865]
[ 126.028142] Memory state around the buggy address:
[ 126.028812] c4cdde80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 126.029525] c4cddf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 126.030454] >c4cddf80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 126.031378] ^
[ 126.031811] c4cde000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 126.032489] c4cde080: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 126.033245] ==================================================================
---
[ 125.662062] ==================================================================
[ 125.663606] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x100/0xc30
[ 125.664319] Read of size 4 at addr c4cddf84 by task kunit_try_catch/203
[ 125.664980]
[ 125.665283] CPU: 1 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 125.666235] Hardware name: Generic DT based system
[ 125.666772] unwind_backtrace from show_stack+0x18/0x1c
[ 125.667387] show_stack from dump_stack_lvl+0x58/0x70
[ 125.668304] dump_stack_lvl from print_report+0x164/0x51c
[ 125.669131] print_report from kasan_report+0xc8/0x104
[ 125.670067] kasan_report from kasan_bitops_generic+0x100/0xc30
[ 125.670757] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 125.672092] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.672987] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 125.674662] kthread from ret_from_fork+0x14/0x30
[ 125.675266] Exception stack(0xfa133fb0 to 0xfa133ff8)
[ 125.675947] 3fa0: 00000000 00000000 00000000 00000000
[ 125.676723] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 125.677600] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 125.678308]
[ 125.678659] Allocated by task 203:
[ 125.679104] kasan_set_track+0x3c/0x5c
[ 125.679982] __kasan_kmalloc+0x8c/0x94
[ 125.680908] kasan_bitops_generic+0xa0/0xc30
[ 125.681313] kunit_try_run_case+0x11c/0x2e4
[ 125.681768] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.682375] kthread+0x184/0x1a8
[ 125.683415] ret_from_fork+0x14/0x30
[ 125.684049]
[ 125.684679] The buggy address belongs to the object at c4cddf80
[ 125.684679] which belongs to the cache kmalloc-64 of size 64
[ 125.685700] The buggy address is located 4 bytes inside of
[ 125.685700] allocated 5-byte region [c4cddf80, c4cddf85)
[ 125.686631]
[ 125.686931] The buggy address belongs to the physical page:
[ 125.687556] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[ 125.688235] flags: 0x800(slab|zone=0)
[ 125.688789] page_type: 0xffffffff()
[ 125.689323] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 125.690466] raw: 00000000
[ 125.691172] page dumped because: kasan: bad access detected
[ 125.691850]
[ 125.692070] Memory state around the buggy address:
[ 125.692577] c4cdde80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 125.693724] c4cddf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 125.694554] >c4cddf80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.695337] ^
[ 125.695750] c4cde000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 125.696530] c4cde080: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.697218] ==================================================================
---
[ 125.702044] ==================================================================
[ 125.703680] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x168/0xc30
[ 125.704488] Read of size 4 at addr c4cddf84 by task kunit_try_catch/203
[ 125.705226]
[ 125.705532] CPU: 1 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 125.706333] Hardware name: Generic DT based system
[ 125.706931] unwind_backtrace from show_stack+0x18/0x1c
[ 125.707674] show_stack from dump_stack_lvl+0x58/0x70
[ 125.708432] dump_stack_lvl from print_report+0x164/0x51c
[ 125.709104] print_report from kasan_report+0xc8/0x104
[ 125.710012] kasan_report from kasan_bitops_generic+0x168/0xc30
[ 125.710964] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 125.711745] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.713162] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 125.714114] kthread from ret_from_fork+0x14/0x30
[ 125.714688] Exception stack(0xfa133fb0 to 0xfa133ff8)
[ 125.715356] 3fa0: 00000000 00000000 00000000 00000000
[ 125.716194] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 125.716966] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 125.717689]
[ 125.717910] Allocated by task 203:
[ 125.718373] kasan_set_track+0x3c/0x5c
[ 125.719022] __kasan_kmalloc+0x8c/0x94
[ 125.719606] kasan_bitops_generic+0xa0/0xc30
[ 125.720169] kunit_try_run_case+0x11c/0x2e4
[ 125.720701] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.721898] kthread+0x184/0x1a8
[ 125.722416] ret_from_fork+0x14/0x30
[ 125.722967]
[ 125.723191] The buggy address belongs to the object at c4cddf80
[ 125.723191] which belongs to the cache kmalloc-64 of size 64
[ 125.724421] The buggy address is located 4 bytes inside of
[ 125.724421] allocated 5-byte region [c4cddf80, c4cddf85)
[ 125.725348]
[ 125.725667] The buggy address belongs to the physical page:
[ 125.726311] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[ 125.727243] flags: 0x800(slab|zone=0)
[ 125.727791] page_type: 0xffffffff()
[ 125.728283] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 125.729195] raw: 00000000
[ 125.730011] page dumped because: kasan: bad access detected
[ 125.730666]
[ 125.730962] Memory state around the buggy address:
[ 125.731435] c4cdde80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 125.732247] c4cddf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 125.733030] >c4cddf80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.733697] ^
[ 125.734110] c4cde000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 125.734765] c4cde080: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.735509] ==================================================================
---
[ 126.081633] ==================================================================
[ 126.083875] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x404/0xc30
[ 126.084887] Read of size 4 at addr c4cddf84 by task kunit_try_catch/203
[ 126.086261]
[ 126.086564] CPU: 1 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 126.087385] Hardware name: Generic DT based system
[ 126.087935] unwind_backtrace from show_stack+0x18/0x1c
[ 126.088555] show_stack from dump_stack_lvl+0x58/0x70
[ 126.089963] dump_stack_lvl from print_report+0x164/0x51c
[ 126.090717] print_report from kasan_report+0xc8/0x104
[ 126.091334] kasan_report from kasan_bitops_generic+0x404/0xc30
[ 126.092805] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 126.093794] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 126.094874] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 126.095892] kthread from ret_from_fork+0x14/0x30
[ 126.096702] Exception stack(0xfa133fb0 to 0xfa133ff8)
[ 126.097515] 3fa0: 00000000 00000000 00000000 00000000
[ 126.098349] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 126.099726] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 126.100677]
[ 126.100903] Allocated by task 203:
[ 126.101293] kasan_set_track+0x3c/0x5c
[ 126.102533] __kasan_kmalloc+0x8c/0x94
[ 126.103221] kasan_bitops_generic+0xa0/0xc30
[ 126.103976] kunit_try_run_case+0x11c/0x2e4
[ 126.104745] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 126.105585] kthread+0x184/0x1a8
[ 126.106045] ret_from_fork+0x14/0x30
[ 126.106508]
[ 126.107164] The buggy address belongs to the object at c4cddf80
[ 126.107164] which belongs to the cache kmalloc-64 of size 64
[ 126.108338] The buggy address is located 4 bytes inside of
[ 126.108338] allocated 5-byte region [c4cddf80, c4cddf85)
[ 126.109664]
[ 126.110015] The buggy address belongs to the physical page:
[ 126.110924] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[ 126.112220] flags: 0x800(slab|zone=0)
[ 126.112978] page_type: 0xffffffff()
[ 126.113681] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 126.114426] raw: 00000000
[ 126.114799] page dumped because: kasan: bad access detected
[ 126.115372]
[ 126.116169] Memory state around the buggy address:
[ 126.116864] c4cdde80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 126.117685] c4cddf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 126.118371] >c4cddf80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 126.119366] ^
[ 126.119985] c4cde000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 126.120673] c4cde080: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 126.121318] ==================================================================
---
[ 126.123870] ==================================================================
[ 126.124966] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x43c/0xc30
[ 126.125917] Read of size 4 at addr c4cddf84 by task kunit_try_catch/203
[ 126.126797]
[ 126.127098] CPU: 1 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 126.128392] Hardware name: Generic DT based system
[ 126.129138] unwind_backtrace from show_stack+0x18/0x1c
[ 126.130146] show_stack from dump_stack_lvl+0x58/0x70
[ 126.131107] dump_stack_lvl from print_report+0x164/0x51c
[ 126.132021] print_report from kasan_report+0xc8/0x104
[ 126.132925] kasan_report from kasan_bitops_generic+0x43c/0xc30
[ 126.133939] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 126.135051] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 126.136181] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 126.137078] kthread from ret_from_fork+0x14/0x30
[ 126.137678] Exception stack(0xfa133fb0 to 0xfa133ff8)
[ 126.138269] 3fa0: 00000000 00000000 00000000 00000000
[ 126.139845] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 126.140789] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 126.141331]
[ 126.141657] Allocated by task 203:
[ 126.142296] kasan_set_track+0x3c/0x5c
[ 126.143121] __kasan_kmalloc+0x8c/0x94
[ 126.143916] kasan_bitops_generic+0xa0/0xc30
[ 126.144445] kunit_try_run_case+0x11c/0x2e4
[ 126.145138] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 126.145901] kthread+0x184/0x1a8
[ 126.146369] ret_from_fork+0x14/0x30
[ 126.146876]
[ 126.147191] The buggy address belongs to the object at c4cddf80
[ 126.147191] which belongs to the cache kmalloc-64 of size 64
[ 126.148402] The buggy address is located 4 bytes inside of
[ 126.148402] allocated 5-byte region [c4cddf80, c4cddf85)
[ 126.149500]
[ 126.149960] The buggy address belongs to the physical page:
[ 126.150545] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[ 126.151317] flags: 0x800(slab|zone=0)
[ 126.152307] page_type: 0xffffffff()
[ 126.152844] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 126.153851] raw: 00000000
[ 126.154249] page dumped because: kasan: bad access detected
[ 126.154885]
[ 126.155215] Memory state around the buggy address:
[ 126.155793] c4cdde80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 126.156506] c4cddf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 126.157325] >c4cddf80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 126.158098] ^
[ 126.158560] c4cde000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 126.159197] c4cde080: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 126.160078] ==================================================================
---
[ 125.922137] ==================================================================
[ 125.923776] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x2d4/0xc30
[ 125.924590] Read of size 4 at addr c4cddf84 by task kunit_try_catch/203
[ 125.925177]
[ 125.925475] CPU: 1 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 125.926358] Hardware name: Generic DT based system
[ 125.926987] unwind_backtrace from show_stack+0x18/0x1c
[ 125.927692] show_stack from dump_stack_lvl+0x58/0x70
[ 125.928457] dump_stack_lvl from print_report+0x164/0x51c
[ 125.929243] print_report from kasan_report+0xc8/0x104
[ 125.931025] kasan_report from kasan_bitops_generic+0x2d4/0xc30
[ 125.931749] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 125.932481] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.933572] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 125.934377] kthread from ret_from_fork+0x14/0x30
[ 125.934947] Exception stack(0xfa133fb0 to 0xfa133ff8)
[ 125.935490] 3fa0: 00000000 00000000 00000000 00000000
[ 125.936688] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 125.937427] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 125.937983]
[ 125.938348] Allocated by task 203:
[ 125.938887] kasan_set_track+0x3c/0x5c
[ 125.940065] __kasan_kmalloc+0x8c/0x94
[ 125.940628] kasan_bitops_generic+0xa0/0xc30
[ 125.941379] kunit_try_run_case+0x11c/0x2e4
[ 125.941792] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.942636] kthread+0x184/0x1a8
[ 125.943220] ret_from_fork+0x14/0x30
[ 125.943857]
[ 125.944163] The buggy address belongs to the object at c4cddf80
[ 125.944163] which belongs to the cache kmalloc-64 of size 64
[ 125.945217] The buggy address is located 4 bytes inside of
[ 125.945217] allocated 5-byte region [c4cddf80, c4cddf85)
[ 125.946420]
[ 125.946741] The buggy address belongs to the physical page:
[ 125.947213] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[ 125.948175] flags: 0x800(slab|zone=0)
[ 125.948756] page_type: 0xffffffff()
[ 125.949338] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 125.950811] raw: 00000000
[ 125.951436] page dumped because: kasan: bad access detected
[ 125.952082]
[ 125.952375] Memory state around the buggy address:
[ 125.953347] c4cdde80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 125.954317] c4cddf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 125.955258] >c4cddf80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.956163] ^
[ 125.956837] c4cde000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 125.957554] c4cde080: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.958561] ==================================================================
---
[ 125.810705] ==================================================================
[ 125.811366] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1f8/0xc30
[ 125.812218] Read of size 4 at addr c4cddf84 by task kunit_try_catch/203
[ 125.812762]
[ 125.813069] CPU: 1 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 125.813989] Hardware name: Generic DT based system
[ 125.814595] unwind_backtrace from show_stack+0x18/0x1c
[ 125.815353] show_stack from dump_stack_lvl+0x58/0x70
[ 125.816117] dump_stack_lvl from print_report+0x164/0x51c
[ 125.816867] print_report from kasan_report+0xc8/0x104
[ 125.817584] kasan_report from kasan_bitops_generic+0x1f8/0xc30
[ 125.818447] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 125.819169] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.820233] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 125.821153] kthread from ret_from_fork+0x14/0x30
[ 125.822432] Exception stack(0xfa133fb0 to 0xfa133ff8)
[ 125.823111] 3fa0: 00000000 00000000 00000000 00000000
[ 125.824116] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 125.825048] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 125.825818]
[ 125.826104] Allocated by task 203:
[ 125.826554] kasan_set_track+0x3c/0x5c
[ 125.827625] __kasan_kmalloc+0x8c/0x94
[ 125.828359] kasan_bitops_generic+0xa0/0xc30
[ 125.829144] kunit_try_run_case+0x11c/0x2e4
[ 125.829968] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.830872] kthread+0x184/0x1a8
[ 125.831410] ret_from_fork+0x14/0x30
[ 125.831998]
[ 125.832293] The buggy address belongs to the object at c4cddf80
[ 125.832293] which belongs to the cache kmalloc-64 of size 64
[ 125.833384] The buggy address is located 4 bytes inside of
[ 125.833384] allocated 5-byte region [c4cddf80, c4cddf85)
[ 125.834272]
[ 125.834587] The buggy address belongs to the physical page:
[ 125.835264] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[ 125.836080] flags: 0x800(slab|zone=0)
[ 125.836474] page_type: 0xffffffff()
[ 125.837039] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 125.837951] raw: 00000000
[ 125.838280] page dumped because: kasan: bad access detected
[ 125.838948]
[ 125.839171] Memory state around the buggy address:
[ 125.840128] c4cdde80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 125.840921] c4cddf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 125.841561] >c4cddf80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.842338] ^
[ 125.842680] c4cde000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 125.843465] c4cde080: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.844207] ==================================================================
---
[ 126.037242] ==================================================================
[ 126.038876] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x39c/0xc30
[ 126.039953] Read of size 4 at addr c4cddf84 by task kunit_try_catch/203
[ 126.040602]
[ 126.040945] CPU: 1 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 126.043224] Hardware name: Generic DT based system
[ 126.043739] unwind_backtrace from show_stack+0x18/0x1c
[ 126.044386] show_stack from dump_stack_lvl+0x58/0x70
[ 126.045780] dump_stack_lvl from print_report+0x164/0x51c
[ 126.046682] print_report from kasan_report+0xc8/0x104
[ 126.047600] kasan_report from kasan_bitops_generic+0x39c/0xc30
[ 126.048564] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 126.049918] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 126.050825] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 126.051587] kthread from ret_from_fork+0x14/0x30
[ 126.052647] Exception stack(0xfa133fb0 to 0xfa133ff8)
[ 126.053449] 3fa0: 00000000 00000000 00000000 00000000
[ 126.054534] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 126.055625] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 126.056554]
[ 126.057023] Allocated by task 203:
[ 126.057707] kasan_set_track+0x3c/0x5c
[ 126.058472] __kasan_kmalloc+0x8c/0x94
[ 126.059234] kasan_bitops_generic+0xa0/0xc30
[ 126.060078] kunit_try_run_case+0x11c/0x2e4
[ 126.060690] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 126.061749] kthread+0x184/0x1a8
[ 126.062444] ret_from_fork+0x14/0x30
[ 126.063200]
[ 126.063480] The buggy address belongs to the object at c4cddf80
[ 126.063480] which belongs to the cache kmalloc-64 of size 64
[ 126.065032] The buggy address is located 4 bytes inside of
[ 126.065032] allocated 5-byte region [c4cddf80, c4cddf85)
[ 126.066057]
[ 126.066673] The buggy address belongs to the physical page:
[ 126.067374] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[ 126.068271] flags: 0x800(slab|zone=0)
[ 126.068819] page_type: 0xffffffff()
[ 126.069421] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 126.070737] raw: 00000000
[ 126.071075] page dumped because: kasan: bad access detected
[ 126.071719]
[ 126.071983] Memory state around the buggy address:
[ 126.072533] c4cdde80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 126.073528] c4cddf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 126.074229] >c4cddf80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 126.075113] ^
[ 126.075522] c4cde000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 126.076263] c4cde080: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 126.077107] ==================================================================
Home
[ 125.845356] ==================================================================
[ 125.846192] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x20c/0xc30
[ 125.846962] Write of size 4 at addr c4cddf84 by task kunit_try_catch/203
[ 125.847482]
[ 125.847801] CPU: 1 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 125.848771] Hardware name: Generic DT based system
[ 125.849374] unwind_backtrace from show_stack+0x18/0x1c
[ 125.851757] show_stack from dump_stack_lvl+0x58/0x70
[ 125.852426] dump_stack_lvl from print_report+0x164/0x51c
[ 125.853207] print_report from kasan_report+0xc8/0x104
[ 125.853927] kasan_report from kasan_bitops_generic+0x20c/0xc30
[ 125.854829] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 125.855757] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.856763] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 125.857594] kthread from ret_from_fork+0x14/0x30
[ 125.858167] Exception stack(0xfa133fb0 to 0xfa133ff8)
[ 125.858844] 3fa0: 00000000 00000000 00000000 00000000
[ 125.859690] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 125.860504] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 125.861207]
[ 125.861499] Allocated by task 203:
[ 125.862407] kasan_set_track+0x3c/0x5c
[ 125.862955] __kasan_kmalloc+0x8c/0x94
[ 125.863584] kasan_bitops_generic+0xa0/0xc30
[ 125.864140] kunit_try_run_case+0x11c/0x2e4
[ 125.864697] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.865382] kthread+0x184/0x1a8
[ 125.865869] ret_from_fork+0x14/0x30
[ 125.866410]
[ 125.866734] The buggy address belongs to the object at c4cddf80
[ 125.866734] which belongs to the cache kmalloc-64 of size 64
[ 125.867747] The buggy address is located 4 bytes inside of
[ 125.867747] allocated 5-byte region [c4cddf80, c4cddf85)
[ 125.868780]
[ 125.869059] The buggy address belongs to the physical page:
[ 125.870031] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[ 125.870960] flags: 0x800(slab|zone=0)
[ 125.871490] page_type: 0xffffffff()
[ 125.871961] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 125.872761] raw: 00000000
[ 125.873111] page dumped because: kasan: bad access detected
[ 125.873836]
[ 125.874125] Memory state around the buggy address:
[ 125.874701] c4cdde80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 125.875490] c4cddf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 125.876188] >c4cddf80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.876941] ^
[ 125.877355] c4cde000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 125.877981] c4cde080: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.878670] ==================================================================
Home
[ 125.960133] ==================================================================
[ 125.960899] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x310/0xc30
[ 125.963456] Write of size 4 at addr c4cddf84 by task kunit_try_catch/203
[ 125.964240]
[ 125.964491] CPU: 1 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 125.965347] Hardware name: Generic DT based system
[ 125.965981] unwind_backtrace from show_stack+0x18/0x1c
[ 125.966719] show_stack from dump_stack_lvl+0x58/0x70
[ 125.967475] dump_stack_lvl from print_report+0x164/0x51c
[ 125.968188] print_report from kasan_report+0xc8/0x104
[ 125.968954] kasan_report from kasan_check_range+0x14c/0x198
[ 125.970306] kasan_check_range from kasan_bitops_generic+0x310/0xc30
[ 125.971450] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 125.972301] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.973263] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 125.974127] kthread from ret_from_fork+0x14/0x30
[ 125.974835] Exception stack(0xfa133fb0 to 0xfa133ff8)
[ 125.975401] 3fa0: 00000000 00000000 00000000 00000000
[ 125.976334] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 125.977478] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 125.978399]
[ 125.978726] Allocated by task 203:
[ 125.979724] kasan_set_track+0x3c/0x5c
[ 125.980568] __kasan_kmalloc+0x8c/0x94
[ 125.981065] kasan_bitops_generic+0xa0/0xc30
[ 125.981562] kunit_try_run_case+0x11c/0x2e4
[ 125.982245] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.982956] kthread+0x184/0x1a8
[ 125.983441] ret_from_fork+0x14/0x30
[ 125.983949]
[ 125.984289] The buggy address belongs to the object at c4cddf80
[ 125.984289] which belongs to the cache kmalloc-64 of size 64
[ 125.985419] The buggy address is located 4 bytes inside of
[ 125.985419] allocated 5-byte region [c4cddf80, c4cddf85)
[ 125.986692]
[ 125.987008] The buggy address belongs to the physical page:
[ 125.987722] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[ 125.988802] flags: 0x800(slab|zone=0)
[ 125.989277] page_type: 0xffffffff()
[ 125.989946] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 125.991108] raw: 00000000
[ 125.991595] page dumped because: kasan: bad access detected
[ 125.992170]
[ 125.992463] Memory state around the buggy address:
[ 125.993049] c4cdde80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 125.993815] c4cddf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 125.994604] >c4cddf80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.995287] ^
[ 125.995757] c4cde000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 125.996441] c4cde080: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.997188] ==================================================================
---
[ 125.736944] ==================================================================
[ 125.737662] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1a4/0xc30
[ 125.738515] Write of size 4 at addr c4cddf84 by task kunit_try_catch/203
[ 125.739192]
[ 125.740596] CPU: 1 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 125.741441] Hardware name: Generic DT based system
[ 125.742077] unwind_backtrace from show_stack+0x18/0x1c
[ 125.742896] show_stack from dump_stack_lvl+0x58/0x70
[ 125.743677] dump_stack_lvl from print_report+0x164/0x51c
[ 125.744472] print_report from kasan_report+0xc8/0x104
[ 125.745266] kasan_report from kasan_check_range+0x14c/0x198
[ 125.745965] kasan_check_range from kasan_bitops_generic+0x1a4/0xc30
[ 125.746884] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 125.747820] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.748724] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 125.749678] kthread from ret_from_fork+0x14/0x30
[ 125.750225] Exception stack(0xfa133fb0 to 0xfa133ff8)
[ 125.750904] 3fa0: 00000000 00000000 00000000 00000000
[ 125.752146] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 125.753028] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 125.753666]
[ 125.753956] Allocated by task 203:
[ 125.754418] kasan_set_track+0x3c/0x5c
[ 125.755020] __kasan_kmalloc+0x8c/0x94
[ 125.755628] kasan_bitops_generic+0xa0/0xc30
[ 125.756103] kunit_try_run_case+0x11c/0x2e4
[ 125.756741] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.757477] kthread+0x184/0x1a8
[ 125.757877] ret_from_fork+0x14/0x30
[ 125.758427]
[ 125.758741] The buggy address belongs to the object at c4cddf80
[ 125.758741] which belongs to the cache kmalloc-64 of size 64
[ 125.760299] The buggy address is located 4 bytes inside of
[ 125.760299] allocated 5-byte region [c4cddf80, c4cddf85)
[ 125.761344]
[ 125.761646] The buggy address belongs to the physical page:
[ 125.762206] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[ 125.763207] flags: 0x800(slab|zone=0)
[ 125.763794] page_type: 0xffffffff()
[ 125.764398] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 125.765354] raw: 00000000
[ 125.765713] page dumped because: kasan: bad access detected
[ 125.766404]
[ 125.766749] Memory state around the buggy address:
[ 125.767363] c4cdde80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 125.768136] c4cddf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 125.768983] >c4cddf80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.769723] ^
[ 125.770169] c4cde000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 125.770972] c4cde080: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.771766] ==================================================================
---
[ 125.773196] ==================================================================
[ 125.774169] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1f0/0xc30
[ 125.775102] Write of size 4 at addr c4cddf84 by task kunit_try_catch/203
[ 125.775840]
[ 125.776148] CPU: 1 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 125.777109] Hardware name: Generic DT based system
[ 125.777788] unwind_backtrace from show_stack+0x18/0x1c
[ 125.778671] show_stack from dump_stack_lvl+0x58/0x70
[ 125.780888] dump_stack_lvl from print_report+0x164/0x51c
[ 125.781822] print_report from kasan_report+0xc8/0x104
[ 125.782464] kasan_report from kasan_check_range+0x14c/0x198
[ 125.783495] kasan_check_range from kasan_bitops_generic+0x1f0/0xc30
[ 125.784255] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 125.785178] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.785980] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 125.786806] kthread from ret_from_fork+0x14/0x30
[ 125.787407] Exception stack(0xfa133fb0 to 0xfa133ff8)
[ 125.787980] 3fa0: 00000000 00000000 00000000 00000000
[ 125.788777] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 125.789745] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 125.790505]
[ 125.791165] Allocated by task 203:
[ 125.791639] kasan_set_track+0x3c/0x5c
[ 125.792158] __kasan_kmalloc+0x8c/0x94
[ 125.792655] kasan_bitops_generic+0xa0/0xc30
[ 125.793292] kunit_try_run_case+0x11c/0x2e4
[ 125.794054] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.794834] kthread+0x184/0x1a8
[ 125.795302] ret_from_fork+0x14/0x30
[ 125.795869]
[ 125.796165] The buggy address belongs to the object at c4cddf80
[ 125.796165] which belongs to the cache kmalloc-64 of size 64
[ 125.797062] The buggy address is located 4 bytes inside of
[ 125.797062] allocated 5-byte region [c4cddf80, c4cddf85)
[ 125.798177]
[ 125.798475] The buggy address belongs to the physical page:
[ 125.799059] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[ 125.800340] flags: 0x800(slab|zone=0)
[ 125.800888] page_type: 0xffffffff()
[ 125.801436] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 125.802338] raw: 00000000
[ 125.802753] page dumped because: kasan: bad access detected
[ 125.803254]
[ 125.803638] Memory state around the buggy address:
[ 125.804247] c4cdde80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 125.804927] c4cddf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 125.805718] >c4cddf80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.806274] ^
[ 125.806700] c4cde000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 125.807455] c4cde080: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.808101] ==================================================================
---
[ 126.161737] ==================================================================
[ 126.162305] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x478/0xc30
[ 126.163233] Write of size 4 at addr c4cddf84 by task kunit_try_catch/203
[ 126.164089]
[ 126.164427] CPU: 1 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 126.165285] Hardware name: Generic DT based system
[ 126.165947] unwind_backtrace from show_stack+0x18/0x1c
[ 126.166677] show_stack from dump_stack_lvl+0x58/0x70
[ 126.167495] dump_stack_lvl from print_report+0x164/0x51c
[ 126.168198] print_report from kasan_report+0xc8/0x104
[ 126.169028] kasan_report from kasan_check_range+0x14c/0x198
[ 126.170023] kasan_check_range from kasan_bitops_generic+0x478/0xc30
[ 126.171804] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[ 126.172579] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 126.173458] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 126.174729] kthread from ret_from_fork+0x14/0x30
[ 126.175542] Exception stack(0xfa133fb0 to 0xfa133ff8)
[ 126.176324] 3fa0: 00000000 00000000 00000000 00000000
[ 126.177169] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 126.178338] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 126.179261]
[ 126.179816] Allocated by task 203:
[ 126.180288] kasan_set_track+0x3c/0x5c
[ 126.181157] __kasan_kmalloc+0x8c/0x94
[ 126.181684] kasan_bitops_generic+0xa0/0xc30
[ 126.182296] kunit_try_run_case+0x11c/0x2e4
[ 126.183222] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 126.184135] kthread+0x184/0x1a8
[ 126.184835] ret_from_fork+0x14/0x30
[ 126.185513]
[ 126.185831] The buggy address belongs to the object at c4cddf80
[ 126.185831] which belongs to the cache kmalloc-64 of size 64
[ 126.187123] The buggy address is located 4 bytes inside of
[ 126.187123] allocated 5-byte region [c4cddf80, c4cddf85)
[ 126.188079]
[ 126.188383] The buggy address belongs to the physical page:
[ 126.189041] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[ 126.190466] flags: 0x800(slab|zone=0)
[ 126.190978] page_type: 0xffffffff()
[ 126.192060] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 126.193137] raw: 00000000
[ 126.193791] page dumped because: kasan: bad access detected
[ 126.194383]
[ 126.194690] Memory state around the buggy address:
[ 126.195292] c4cdde80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 126.196525] c4cddf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 126.197269] >c4cddf80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 126.198236] ^
[ 126.198655] c4cde000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 126.199319] c4cde080: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 126.200437] ==================================================================
Home
[ 122.780995] ==================================================================
[ 122.782463] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xcc/0x1dc
[ 122.783286] Write of size 1 at addr c5c7df00 by task kunit_try_catch/128
[ 122.783847]
[ 122.784150] CPU: 1 PID: 128 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 122.785134] Hardware name: Generic DT based system
[ 122.785818] unwind_backtrace from show_stack+0x18/0x1c
[ 122.786663] show_stack from dump_stack_lvl+0x58/0x70
[ 122.787482] dump_stack_lvl from print_report+0x164/0x51c
[ 122.788331] print_report from kasan_report+0xc8/0x104
[ 122.789050] kasan_report from kmalloc_large_oob_right+0xcc/0x1dc
[ 122.789951] kmalloc_large_oob_right from kunit_try_run_case+0x11c/0x2e4
[ 122.790892] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 122.791903] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 122.792821] kthread from ret_from_fork+0x14/0x30
[ 122.793440] Exception stack(0xf9f0bfb0 to 0xf9f0bff8)
[ 122.793989] bfa0: 00000000 00000000 00000000 00000000
[ 122.795002] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 122.795369] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 122.795728]
[ 122.796066] Allocated by task 128:
[ 122.796599] kasan_set_track+0x3c/0x5c
[ 122.797261] __kasan_kmalloc+0x8c/0x94
[ 122.797914] kmalloc_large_oob_right+0xa0/0x1dc
[ 122.798429] kunit_try_run_case+0x11c/0x2e4
[ 122.798934] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 122.799501] kthread+0x184/0x1a8
[ 122.800148] ret_from_fork+0x14/0x30
[ 122.801100]
[ 122.801673] The buggy address belongs to the object at c5c7c000
[ 122.801673] which belongs to the cache kmalloc-8k of size 8192
[ 122.802948] The buggy address is located 0 bytes to the right of
[ 122.802948] allocated 7936-byte region [c5c7c000, c5c7df00)
[ 122.804061]
[ 122.804347] The buggy address belongs to the physical page:
[ 122.805046] page:04f3da84 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x45c78
[ 122.805785] head:04f3da84 order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 122.806672] flags: 0x840(slab|head|zone=0)
[ 122.807200] page_type: 0xffffffff()
[ 122.807650] raw: 00000840 c4801a00 00000122 00000000 00000000 80020002 ffffffff 00000001
[ 122.808596] raw: 00000000
[ 122.809007] page dumped because: kasan: bad access detected
[ 122.809529]
[ 122.809769] Memory state around the buggy address:
[ 122.810219] c5c7de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 122.811084] c5c7de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 122.811754] >c5c7df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 122.812436] ^
[ 122.812869] c5c7df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 122.813681] c5c7e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 122.814291] ==================================================================
Home
[ 123.829413] ==================================================================
[ 123.830677] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0xe4/0x1e8
[ 123.831586] Read of size 64 at addr c4cdd504 by task kunit_try_catch/156
[ 123.833230]
[ 123.834037] CPU: 1 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 123.834852] Hardware name: Generic DT based system
[ 123.835445] unwind_backtrace from show_stack+0x18/0x1c
[ 123.836440] show_stack from dump_stack_lvl+0x58/0x70
[ 123.837305] dump_stack_lvl from print_report+0x164/0x51c
[ 123.837979] print_report from kasan_report+0xc8/0x104
[ 123.838705] kasan_report from kasan_check_range+0x14c/0x198
[ 123.839519] kasan_check_range from __asan_memmove+0x28/0x68
[ 123.840245] __asan_memmove from kmalloc_memmove_invalid_size+0xe4/0x1e8
[ 123.841299] kmalloc_memmove_invalid_size from kunit_try_run_case+0x11c/0x2e4
[ 123.842817] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.843643] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 123.844908] kthread from ret_from_fork+0x14/0x30
[ 123.845569] Exception stack(0xf9febfb0 to 0xf9febff8)
[ 123.846177] bfa0: 00000000 00000000 00000000 00000000
[ 123.847397] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 123.848458] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 123.849370]
[ 123.849879] Allocated by task 156:
[ 123.850253] kasan_set_track+0x3c/0x5c
[ 123.851114] __kasan_kmalloc+0x8c/0x94
[ 123.851896] kmalloc_memmove_invalid_size+0xa0/0x1e8
[ 123.852799] kunit_try_run_case+0x11c/0x2e4
[ 123.853541] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.854256] kthread+0x184/0x1a8
[ 123.855024] ret_from_fork+0x14/0x30
[ 123.855526]
[ 123.855811] The buggy address belongs to the object at c4cdd500
[ 123.855811] which belongs to the cache kmalloc-64 of size 64
[ 123.856681] The buggy address is located 4 bytes inside of
[ 123.856681] allocated 64-byte region [c4cdd500, c4cdd540)
[ 123.857988]
[ 123.858294] The buggy address belongs to the physical page:
[ 123.859070] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[ 123.860672] flags: 0x800(slab|zone=0)
[ 123.861650] page_type: 0xffffffff()
[ 123.862578] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 123.863349] raw: 00000000
[ 123.863536] page dumped because: kasan: bad access detected
[ 123.863807]
[ 123.863922] Memory state around the buggy address:
[ 123.864158] c4cdd400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 123.864444] c4cdd480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 123.865001] >c4cdd500: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 123.865812] ^
[ 123.866452] c4cdd580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.867335] c4cdd600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.868128] ==================================================================
Home
[ 122.584365] ==================================================================
[ 122.585158] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0xd4/0x1e8
[ 122.586047] Read of size 1 at addr c4ded000 by task kunit_try_catch/116
[ 122.586727]
[ 122.586982] CPU: 1 PID: 116 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 122.587719] Hardware name: Generic DT based system
[ 122.588318] unwind_backtrace from show_stack+0x18/0x1c
[ 122.589076] show_stack from dump_stack_lvl+0x58/0x70
[ 122.589788] dump_stack_lvl from print_report+0x164/0x51c
[ 122.590594] print_report from kasan_report+0xc8/0x104
[ 122.591355] kasan_report from kmalloc_node_oob_right+0xd4/0x1e8
[ 122.592597] kmalloc_node_oob_right from kunit_try_run_case+0x11c/0x2e4
[ 122.593390] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 122.594268] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 122.595986] kthread from ret_from_fork+0x14/0x30
[ 122.596515] Exception stack(0xf9eabfb0 to 0xf9eabff8)
[ 122.597096] bfa0: 00000000 00000000 00000000 00000000
[ 122.597909] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 122.598715] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 122.599519]
[ 122.600138] Allocated by task 116:
[ 122.600635] kasan_set_track+0x3c/0x5c
[ 122.601126] __kasan_kmalloc+0x8c/0x94
[ 122.601820] kmalloc_node_oob_right+0xa4/0x1e8
[ 122.602476] kunit_try_run_case+0x11c/0x2e4
[ 122.603132] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 122.603790] kthread+0x184/0x1a8
[ 122.604311] ret_from_fork+0x14/0x30
[ 122.604801]
[ 122.605102] The buggy address belongs to the object at c4dec000
[ 122.605102] which belongs to the cache kmalloc-4k of size 4096
[ 122.606086] The buggy address is located 0 bytes to the right of
[ 122.606086] allocated 4096-byte region [c4dec000, c4ded000)
[ 122.607344]
[ 122.607584] The buggy address belongs to the physical page:
[ 122.608255] page:1cce8090 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44de8
[ 122.609133] head:1cce8090 order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 122.610452] flags: 0x840(slab|head|zone=0)
[ 122.611151] page_type: 0xffffffff()
[ 122.611591] raw: 00000840 c4801900 00000122 00000000 00000000 80040004 ffffffff 00000001
[ 122.612467] raw: 00000000
[ 122.612908] page dumped because: kasan: bad access detected
[ 122.613488]
[ 122.613795] Memory state around the buggy address:
[ 122.614373] c4decf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 122.615227] c4decf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 122.615855] >c4ded000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 122.616593] ^
[ 122.617030] c4ded080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 122.617688] c4ded100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 122.618250] ==================================================================
Home
[ 123.432189] ==================================================================
[ 123.433242] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xf8/0x24c
[ 123.434129] Write of size 16 at addr c4cdd280 by task kunit_try_catch/140
[ 123.435465]
[ 123.435797] CPU: 1 PID: 140 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 123.437419] Hardware name: Generic DT based system
[ 123.437933] unwind_backtrace from show_stack+0x18/0x1c
[ 123.438691] show_stack from dump_stack_lvl+0x58/0x70
[ 123.439759] dump_stack_lvl from print_report+0x164/0x51c
[ 123.440681] print_report from kasan_report+0xc8/0x104
[ 123.441551] kasan_report from kasan_check_range+0x14c/0x198
[ 123.442353] kasan_check_range from kmalloc_oob_16+0xf8/0x24c
[ 123.443378] kmalloc_oob_16 from kunit_try_run_case+0x11c/0x2e4
[ 123.444373] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.445464] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 123.446325] kthread from ret_from_fork+0x14/0x30
[ 123.447318] Exception stack(0xf9f6bfb0 to 0xf9f6bff8)
[ 123.448163] bfa0: 00000000 00000000 00000000 00000000
[ 123.449222] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 123.450283] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 123.451852]
[ 123.452133] Allocated by task 140:
[ 123.452529] kasan_set_track+0x3c/0x5c
[ 123.453003] __kasan_kmalloc+0x8c/0x94
[ 123.453424] kmalloc_oob_16+0xa0/0x24c
[ 123.454504] kunit_try_run_case+0x11c/0x2e4
[ 123.455494] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.456120] kthread+0x184/0x1a8
[ 123.456641] ret_from_fork+0x14/0x30
[ 123.457169]
[ 123.457491] The buggy address belongs to the object at c4cdd280
[ 123.457491] which belongs to the cache kmalloc-64 of size 64
[ 123.458406] The buggy address is located 0 bytes inside of
[ 123.458406] allocated 13-byte region [c4cdd280, c4cdd28d)
[ 123.459678]
[ 123.459983] The buggy address belongs to the physical page:
[ 123.460567] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[ 123.462005] flags: 0x800(slab|zone=0)
[ 123.462734] page_type: 0xffffffff()
[ 123.463413] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 123.464445] raw: 00000000
[ 123.465045] page dumped because: kasan: bad access detected
[ 123.465805]
[ 123.466131] Memory state around the buggy address:
[ 123.466645] c4cdd180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 123.467704] c4cdd200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 123.468388] >c4cdd280: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.469022] ^
[ 123.469413] c4cdd300: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.470713] c4cdd380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.471695] ==================================================================
Home
[ 123.432189] ==================================================================
[ 123.433242] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xf8/0x24c
[ 123.434129] Write of size 16 at addr c4cdd280 by task kunit_try_catch/140
[ 123.435465]
[ 123.435797] CPU: 1 PID: 140 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 123.437419] Hardware name: Generic DT based system
[ 123.437933] unwind_backtrace from show_stack+0x18/0x1c
[ 123.438691] show_stack from dump_stack_lvl+0x58/0x70
[ 123.439759] dump_stack_lvl from print_report+0x164/0x51c
[ 123.440681] print_report from kasan_report+0xc8/0x104
[ 123.441551] kasan_report from kasan_check_range+0x14c/0x198
[ 123.442353] kasan_check_range from kmalloc_oob_16+0xf8/0x24c
[ 123.443378] kmalloc_oob_16 from kunit_try_run_case+0x11c/0x2e4
[ 123.444373] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.445464] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 123.446325] kthread from ret_from_fork+0x14/0x30
[ 123.447318] Exception stack(0xf9f6bfb0 to 0xf9f6bff8)
[ 123.448163] bfa0: 00000000 00000000 00000000 00000000
[ 123.449222] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 123.450283] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 123.451852]
[ 123.452133] Allocated by task 140:
[ 123.452529] kasan_set_track+0x3c/0x5c
[ 123.453003] __kasan_kmalloc+0x8c/0x94
[ 123.453424] kmalloc_oob_16+0xa0/0x24c
[ 123.454504] kunit_try_run_case+0x11c/0x2e4
[ 123.455494] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.456120] kthread+0x184/0x1a8
[ 123.456641] ret_from_fork+0x14/0x30
[ 123.457169]
[ 123.457491] The buggy address belongs to the object at c4cdd280
[ 123.457491] which belongs to the cache kmalloc-64 of size 64
[ 123.458406] The buggy address is located 0 bytes inside of
[ 123.458406] allocated 13-byte region [c4cdd280, c4cdd28d)
[ 123.459678]
[ 123.459983] The buggy address belongs to the physical page:
[ 123.460567] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[ 123.462005] flags: 0x800(slab|zone=0)
[ 123.462734] page_type: 0xffffffff()
[ 123.463413] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 123.464445] raw: 00000000
[ 123.465045] page dumped because: kasan: bad access detected
[ 123.465805]
[ 123.466131] Memory state around the buggy address:
[ 123.466645] c4cdd180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 123.467704] c4cdd200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 123.468388] >c4cdd280: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.469022] ^
[ 123.469413] c4cdd300: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.470713] c4cdd380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.471695] ==================================================================
Home
[ 123.534702] ==================================================================
[ 123.535488] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0xd8/0x1dc
[ 123.536436] Write of size 128 at addr c4cdc200 by task kunit_try_catch/144
[ 123.537202]
[ 123.537501] CPU: 1 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 123.538327] Hardware name: Generic DT based system
[ 123.538965] unwind_backtrace from show_stack+0x18/0x1c
[ 123.539745] show_stack from dump_stack_lvl+0x58/0x70
[ 123.540238] dump_stack_lvl from print_report+0x164/0x51c
[ 123.541066] print_report from kasan_report+0xc8/0x104
[ 123.541754] kasan_report from kasan_check_range+0x14c/0x198
[ 123.542412] kasan_check_range from __asan_memset+0x20/0x3c
[ 123.543312] __asan_memset from kmalloc_oob_in_memset+0xd8/0x1dc
[ 123.544205] kmalloc_oob_in_memset from kunit_try_run_case+0x11c/0x2e4
[ 123.545170] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.546200] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 123.547092] kthread from ret_from_fork+0x14/0x30
[ 123.547759] Exception stack(0xf9f8bfb0 to 0xf9f8bff8)
[ 123.548366] bfa0: 00000000 00000000 00000000 00000000
[ 123.549235] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 123.550554] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 123.551333]
[ 123.552003] Allocated by task 144:
[ 123.552430] kasan_set_track+0x3c/0x5c
[ 123.553106] __kasan_kmalloc+0x8c/0x94
[ 123.554247] kmalloc_oob_in_memset+0xa0/0x1dc
[ 123.555013] kunit_try_run_case+0x11c/0x2e4
[ 123.555663] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.556299] kthread+0x184/0x1a8
[ 123.557184] ret_from_fork+0x14/0x30
[ 123.557962]
[ 123.558295] The buggy address belongs to the object at c4cdc200
[ 123.558295] which belongs to the cache kmalloc-128 of size 128
[ 123.559693] The buggy address is located 0 bytes inside of
[ 123.559693] allocated 120-byte region [c4cdc200, c4cdc278)
[ 123.561053]
[ 123.561555] The buggy address belongs to the physical page:
[ 123.562402] page:4ad3b9de refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdc
[ 123.563306] flags: 0x800(slab|zone=0)
[ 123.564140] page_type: 0xffffffff()
[ 123.564874] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 123.565847] raw: 00000000
[ 123.566446] page dumped because: kasan: bad access detected
[ 123.567103]
[ 123.567748] Memory state around the buggy address:
[ 123.568369] c4cdc100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 123.569100] c4cdc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.570462] >c4cdc200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 123.571682] ^
[ 123.572553] c4cdc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.573411] c4cdc300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.574288] ==================================================================
Home
[ 122.532533] ==================================================================
[ 122.534052] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0xcc/0x1e0
[ 122.534811] Read of size 1 at addr c4cdd1ff by task kunit_try_catch/114
[ 122.535506]
[ 122.535773] CPU: 1 PID: 114 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 122.536825] Hardware name: Generic DT based system
[ 122.537333] unwind_backtrace from show_stack+0x18/0x1c
[ 122.538190] show_stack from dump_stack_lvl+0x58/0x70
[ 122.539012] dump_stack_lvl from print_report+0x164/0x51c
[ 122.539891] print_report from kasan_report+0xc8/0x104
[ 122.541168] kasan_report from kmalloc_oob_left+0xcc/0x1e0
[ 122.541800] kmalloc_oob_left from kunit_try_run_case+0x11c/0x2e4
[ 122.542745] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 122.543838] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 122.544673] kthread from ret_from_fork+0x14/0x30
[ 122.545280] Exception stack(0xf9e9bfb0 to 0xf9e9bff8)
[ 122.545867] bfa0: 00000000 00000000 00000000 00000000
[ 122.546586] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 122.547540] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 122.548193]
[ 122.548488] Allocated by task 110:
[ 122.548969] kasan_set_track+0x3c/0x5c
[ 122.550115] __kasan_kmalloc+0x8c/0x94
[ 122.550696] kunit_add_action+0xa0/0x1e8
[ 122.551242] kunit_add_action_or_reset+0x18/0x30
[ 122.551890] kunit_kmalloc_array+0x44/0x60
[ 122.552490] sysctl_test_api_dointvec_write_single_greater_int_max+0x134/0x2b8
[ 122.553446] kunit_try_run_case+0x11c/0x2e4
[ 122.554059] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 122.555012] kthread+0x184/0x1a8
[ 122.555671] ret_from_fork+0x14/0x30
[ 122.556174]
[ 122.556554] Freed by task 111:
[ 122.557086] kasan_set_track+0x3c/0x5c
[ 122.557772] kasan_save_free_info+0x30/0x3c
[ 122.558471] __kasan_slab_free+0xdc/0x124
[ 122.559197] __kmem_cache_free+0x140/0x2a8
[ 122.560400] kunit_cleanup+0x44/0x90
[ 122.561022] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 122.561681] kthread+0x184/0x1a8
[ 122.562121] ret_from_fork+0x14/0x30
[ 122.562635]
[ 122.562875] The buggy address belongs to the object at c4cdd180
[ 122.562875] which belongs to the cache kmalloc-64 of size 64
[ 122.563909] The buggy address is located 63 bytes to the right of
[ 122.563909] allocated 64-byte region [c4cdd180, c4cdd1c0)
[ 122.564916]
[ 122.565197] The buggy address belongs to the physical page:
[ 122.565824] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[ 122.566550] flags: 0x800(slab|zone=0)
[ 122.567105] page_type: 0xffffffff()
[ 122.567678] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 122.568411] raw: 00000000
[ 122.568831] page dumped because: kasan: bad access detected
[ 122.569327]
[ 122.570066] Memory state around the buggy address:
[ 122.570678] c4cdd080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 122.571297] c4cdd100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 122.572079] >c4cdd180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 122.572839] ^
[ 122.573396] c4cdd200: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 122.574181] c4cdd280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 122.574802] ==================================================================
Home
[ 123.733746] ==================================================================
[ 123.734540] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xdc/0x1e0
[ 123.735858] Write of size 16 at addr c4cdc669 by task kunit_try_catch/152
[ 123.737017]
[ 123.737240] CPU: 1 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 123.738185] Hardware name: Generic DT based system
[ 123.739135] unwind_backtrace from show_stack+0x18/0x1c
[ 123.740067] show_stack from dump_stack_lvl+0x58/0x70
[ 123.740970] dump_stack_lvl from print_report+0x164/0x51c
[ 123.741884] print_report from kasan_report+0xc8/0x104
[ 123.742802] kasan_report from kasan_check_range+0x14c/0x198
[ 123.743731] kasan_check_range from __asan_memset+0x20/0x3c
[ 123.744498] __asan_memset from kmalloc_oob_memset_16+0xdc/0x1e0
[ 123.745526] kmalloc_oob_memset_16 from kunit_try_run_case+0x11c/0x2e4
[ 123.746545] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.747654] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 123.748673] kthread from ret_from_fork+0x14/0x30
[ 123.749292] Exception stack(0xf9fcbfb0 to 0xf9fcbff8)
[ 123.750944] bfa0: 00000000 00000000 00000000 00000000
[ 123.752259] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 123.753140] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 123.754216]
[ 123.754482] Allocated by task 152:
[ 123.754901] kasan_set_track+0x3c/0x5c
[ 123.755524] __kasan_kmalloc+0x8c/0x94
[ 123.756218] kmalloc_oob_memset_16+0xa0/0x1e0
[ 123.756841] kunit_try_run_case+0x11c/0x2e4
[ 123.757509] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.758298] kthread+0x184/0x1a8
[ 123.758940] ret_from_fork+0x14/0x30
[ 123.759407]
[ 123.759735] The buggy address belongs to the object at c4cdc600
[ 123.759735] which belongs to the cache kmalloc-128 of size 128
[ 123.760866] The buggy address is located 105 bytes inside of
[ 123.760866] allocated 120-byte region [c4cdc600, c4cdc678)
[ 123.761996]
[ 123.762308] The buggy address belongs to the physical page:
[ 123.762910] page:4ad3b9de refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdc
[ 123.763907] flags: 0x800(slab|zone=0)
[ 123.764476] page_type: 0xffffffff()
[ 123.764959] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 123.765809] raw: 00000000
[ 123.766249] page dumped because: kasan: bad access detected
[ 123.766915]
[ 123.767212] Memory state around the buggy address:
[ 123.767823] c4cdc500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 123.768550] c4cdc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.769294] >c4cdc600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 123.770187] ^
[ 123.770732] c4cdc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.771545] c4cdc700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.772228] ==================================================================
Home
[ 123.733746] ==================================================================
[ 123.734540] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xdc/0x1e0
[ 123.735858] Write of size 16 at addr c4cdc669 by task kunit_try_catch/152
[ 123.737017]
[ 123.737240] CPU: 1 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 123.738185] Hardware name: Generic DT based system
[ 123.739135] unwind_backtrace from show_stack+0x18/0x1c
[ 123.740067] show_stack from dump_stack_lvl+0x58/0x70
[ 123.740970] dump_stack_lvl from print_report+0x164/0x51c
[ 123.741884] print_report from kasan_report+0xc8/0x104
[ 123.742802] kasan_report from kasan_check_range+0x14c/0x198
[ 123.743731] kasan_check_range from __asan_memset+0x20/0x3c
[ 123.744498] __asan_memset from kmalloc_oob_memset_16+0xdc/0x1e0
[ 123.745526] kmalloc_oob_memset_16 from kunit_try_run_case+0x11c/0x2e4
[ 123.746545] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.747654] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 123.748673] kthread from ret_from_fork+0x14/0x30
[ 123.749292] Exception stack(0xf9fcbfb0 to 0xf9fcbff8)
[ 123.750944] bfa0: 00000000 00000000 00000000 00000000
[ 123.752259] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 123.753140] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 123.754216]
[ 123.754482] Allocated by task 152:
[ 123.754901] kasan_set_track+0x3c/0x5c
[ 123.755524] __kasan_kmalloc+0x8c/0x94
[ 123.756218] kmalloc_oob_memset_16+0xa0/0x1e0
[ 123.756841] kunit_try_run_case+0x11c/0x2e4
[ 123.757509] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.758298] kthread+0x184/0x1a8
[ 123.758940] ret_from_fork+0x14/0x30
[ 123.759407]
[ 123.759735] The buggy address belongs to the object at c4cdc600
[ 123.759735] which belongs to the cache kmalloc-128 of size 128
[ 123.760866] The buggy address is located 105 bytes inside of
[ 123.760866] allocated 120-byte region [c4cdc600, c4cdc678)
[ 123.761996]
[ 123.762308] The buggy address belongs to the physical page:
[ 123.762910] page:4ad3b9de refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdc
[ 123.763907] flags: 0x800(slab|zone=0)
[ 123.764476] page_type: 0xffffffff()
[ 123.764959] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 123.765809] raw: 00000000
[ 123.766249] page dumped because: kasan: bad access detected
[ 123.766915]
[ 123.767212] Memory state around the buggy address:
[ 123.767823] c4cdc500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 123.768550] c4cdc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.769294] >c4cdc600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 123.770187] ^
[ 123.770732] c4cdc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.771545] c4cdc700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.772228] ==================================================================
Home
[ 123.584763] ==================================================================
[ 123.585548] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xdc/0x1e4
[ 123.586311] Write of size 2 at addr c4cdc377 by task kunit_try_catch/146
[ 123.587118]
[ 123.587360] CPU: 1 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 123.588292] Hardware name: Generic DT based system
[ 123.588904] unwind_backtrace from show_stack+0x18/0x1c
[ 123.589634] show_stack from dump_stack_lvl+0x58/0x70
[ 123.590300] dump_stack_lvl from print_report+0x164/0x51c
[ 123.591170] print_report from kasan_report+0xc8/0x104
[ 123.591927] kasan_report from kasan_check_range+0x14c/0x198
[ 123.592591] kasan_check_range from __asan_memset+0x20/0x3c
[ 123.593484] __asan_memset from kmalloc_oob_memset_2+0xdc/0x1e4
[ 123.594285] kmalloc_oob_memset_2 from kunit_try_run_case+0x11c/0x2e4
[ 123.595057] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.596014] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 123.596877] kthread from ret_from_fork+0x14/0x30
[ 123.597535] Exception stack(0xf9f9bfb0 to 0xf9f9bff8)
[ 123.598036] bfa0: 00000000 00000000 00000000 00000000
[ 123.598924] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 123.600152] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 123.601139]
[ 123.601425] Allocated by task 146:
[ 123.602110] kasan_set_track+0x3c/0x5c
[ 123.602668] __kasan_kmalloc+0x8c/0x94
[ 123.603188] kmalloc_oob_memset_2+0xa0/0x1e4
[ 123.603600] kunit_try_run_case+0x11c/0x2e4
[ 123.604245] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.605668] kthread+0x184/0x1a8
[ 123.606313] ret_from_fork+0x14/0x30
[ 123.607048]
[ 123.607339] The buggy address belongs to the object at c4cdc300
[ 123.607339] which belongs to the cache kmalloc-128 of size 128
[ 123.608326] The buggy address is located 119 bytes inside of
[ 123.608326] allocated 120-byte region [c4cdc300, c4cdc378)
[ 123.609316]
[ 123.610405] The buggy address belongs to the physical page:
[ 123.610973] page:4ad3b9de refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdc
[ 123.612013] flags: 0x800(slab|zone=0)
[ 123.612696] page_type: 0xffffffff()
[ 123.613420] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 123.614464] raw: 00000000
[ 123.615077] page dumped because: kasan: bad access detected
[ 123.615773]
[ 123.616060] Memory state around the buggy address:
[ 123.616875] c4cdc200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 123.617535] c4cdc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.618216] >c4cdc300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 123.619227] ^
[ 123.620014] c4cdc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.620928] c4cdc400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.621529] ==================================================================
Home
[ 123.584763] ==================================================================
[ 123.585548] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xdc/0x1e4
[ 123.586311] Write of size 2 at addr c4cdc377 by task kunit_try_catch/146
[ 123.587118]
[ 123.587360] CPU: 1 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 123.588292] Hardware name: Generic DT based system
[ 123.588904] unwind_backtrace from show_stack+0x18/0x1c
[ 123.589634] show_stack from dump_stack_lvl+0x58/0x70
[ 123.590300] dump_stack_lvl from print_report+0x164/0x51c
[ 123.591170] print_report from kasan_report+0xc8/0x104
[ 123.591927] kasan_report from kasan_check_range+0x14c/0x198
[ 123.592591] kasan_check_range from __asan_memset+0x20/0x3c
[ 123.593484] __asan_memset from kmalloc_oob_memset_2+0xdc/0x1e4
[ 123.594285] kmalloc_oob_memset_2 from kunit_try_run_case+0x11c/0x2e4
[ 123.595057] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.596014] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 123.596877] kthread from ret_from_fork+0x14/0x30
[ 123.597535] Exception stack(0xf9f9bfb0 to 0xf9f9bff8)
[ 123.598036] bfa0: 00000000 00000000 00000000 00000000
[ 123.598924] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 123.600152] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 123.601139]
[ 123.601425] Allocated by task 146:
[ 123.602110] kasan_set_track+0x3c/0x5c
[ 123.602668] __kasan_kmalloc+0x8c/0x94
[ 123.603188] kmalloc_oob_memset_2+0xa0/0x1e4
[ 123.603600] kunit_try_run_case+0x11c/0x2e4
[ 123.604245] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.605668] kthread+0x184/0x1a8
[ 123.606313] ret_from_fork+0x14/0x30
[ 123.607048]
[ 123.607339] The buggy address belongs to the object at c4cdc300
[ 123.607339] which belongs to the cache kmalloc-128 of size 128
[ 123.608326] The buggy address is located 119 bytes inside of
[ 123.608326] allocated 120-byte region [c4cdc300, c4cdc378)
[ 123.609316]
[ 123.610405] The buggy address belongs to the physical page:
[ 123.610973] page:4ad3b9de refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdc
[ 123.612013] flags: 0x800(slab|zone=0)
[ 123.612696] page_type: 0xffffffff()
[ 123.613420] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 123.614464] raw: 00000000
[ 123.615077] page dumped because: kasan: bad access detected
[ 123.615773]
[ 123.616060] Memory state around the buggy address:
[ 123.616875] c4cdc200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 123.617535] c4cdc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.618216] >c4cdc300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 123.619227] ^
[ 123.620014] c4cdc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.620928] c4cdc400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.621529] ==================================================================
Home
[ 123.632738] ==================================================================
[ 123.633536] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xdc/0x1e8
[ 123.634765] Write of size 4 at addr c4cdc475 by task kunit_try_catch/148
[ 123.635514]
[ 123.635832] CPU: 1 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 123.637964] Hardware name: Generic DT based system
[ 123.638504] unwind_backtrace from show_stack+0x18/0x1c
[ 123.639183] show_stack from dump_stack_lvl+0x58/0x70
[ 123.640081] dump_stack_lvl from print_report+0x164/0x51c
[ 123.641014] print_report from kasan_report+0xc8/0x104
[ 123.641914] kasan_report from kasan_check_range+0x14c/0x198
[ 123.642857] kasan_check_range from __asan_memset+0x20/0x3c
[ 123.643771] __asan_memset from kmalloc_oob_memset_4+0xdc/0x1e8
[ 123.644480] kmalloc_oob_memset_4 from kunit_try_run_case+0x11c/0x2e4
[ 123.645305] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.646521] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 123.647571] kthread from ret_from_fork+0x14/0x30
[ 123.648383] Exception stack(0xf9fabfb0 to 0xf9fabff8)
[ 123.649209] bfa0: 00000000 00000000 00000000 00000000
[ 123.650336] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 123.651526] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 123.652666]
[ 123.653083] Allocated by task 148:
[ 123.653699] kasan_set_track+0x3c/0x5c
[ 123.654221] __kasan_kmalloc+0x8c/0x94
[ 123.654741] kmalloc_oob_memset_4+0xa0/0x1e8
[ 123.655264] kunit_try_run_case+0x11c/0x2e4
[ 123.656183] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.657063] kthread+0x184/0x1a8
[ 123.657735] ret_from_fork+0x14/0x30
[ 123.658407]
[ 123.658737] The buggy address belongs to the object at c4cdc400
[ 123.658737] which belongs to the cache kmalloc-128 of size 128
[ 123.660053] The buggy address is located 117 bytes inside of
[ 123.660053] allocated 120-byte region [c4cdc400, c4cdc478)
[ 123.661307]
[ 123.661975] The buggy address belongs to the physical page:
[ 123.662461] page:4ad3b9de refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdc
[ 123.663338] flags: 0x800(slab|zone=0)
[ 123.663877] page_type: 0xffffffff()
[ 123.664347] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 123.665748] raw: 00000000
[ 123.666478] page dumped because: kasan: bad access detected
[ 123.667062]
[ 123.667542] Memory state around the buggy address:
[ 123.668252] c4cdc300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 123.669160] c4cdc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.670571] >c4cdc400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 123.671456] ^
[ 123.672242] c4cdc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.672929] c4cdc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.674038] ==================================================================
Home
[ 123.632738] ==================================================================
[ 123.633536] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xdc/0x1e8
[ 123.634765] Write of size 4 at addr c4cdc475 by task kunit_try_catch/148
[ 123.635514]
[ 123.635832] CPU: 1 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 123.637964] Hardware name: Generic DT based system
[ 123.638504] unwind_backtrace from show_stack+0x18/0x1c
[ 123.639183] show_stack from dump_stack_lvl+0x58/0x70
[ 123.640081] dump_stack_lvl from print_report+0x164/0x51c
[ 123.641014] print_report from kasan_report+0xc8/0x104
[ 123.641914] kasan_report from kasan_check_range+0x14c/0x198
[ 123.642857] kasan_check_range from __asan_memset+0x20/0x3c
[ 123.643771] __asan_memset from kmalloc_oob_memset_4+0xdc/0x1e8
[ 123.644480] kmalloc_oob_memset_4 from kunit_try_run_case+0x11c/0x2e4
[ 123.645305] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.646521] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 123.647571] kthread from ret_from_fork+0x14/0x30
[ 123.648383] Exception stack(0xf9fabfb0 to 0xf9fabff8)
[ 123.649209] bfa0: 00000000 00000000 00000000 00000000
[ 123.650336] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 123.651526] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 123.652666]
[ 123.653083] Allocated by task 148:
[ 123.653699] kasan_set_track+0x3c/0x5c
[ 123.654221] __kasan_kmalloc+0x8c/0x94
[ 123.654741] kmalloc_oob_memset_4+0xa0/0x1e8
[ 123.655264] kunit_try_run_case+0x11c/0x2e4
[ 123.656183] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.657063] kthread+0x184/0x1a8
[ 123.657735] ret_from_fork+0x14/0x30
[ 123.658407]
[ 123.658737] The buggy address belongs to the object at c4cdc400
[ 123.658737] which belongs to the cache kmalloc-128 of size 128
[ 123.660053] The buggy address is located 117 bytes inside of
[ 123.660053] allocated 120-byte region [c4cdc400, c4cdc478)
[ 123.661307]
[ 123.661975] The buggy address belongs to the physical page:
[ 123.662461] page:4ad3b9de refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdc
[ 123.663338] flags: 0x800(slab|zone=0)
[ 123.663877] page_type: 0xffffffff()
[ 123.664347] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 123.665748] raw: 00000000
[ 123.666478] page dumped because: kasan: bad access detected
[ 123.667062]
[ 123.667542] Memory state around the buggy address:
[ 123.668252] c4cdc300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 123.669160] c4cdc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.670571] >c4cdc400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 123.671456] ^
[ 123.672242] c4cdc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.672929] c4cdc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.674038] ==================================================================
Home
[ 123.683839] ==================================================================
[ 123.684673] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xdc/0x1e8
[ 123.685507] Write of size 8 at addr c4cdc571 by task kunit_try_catch/150
[ 123.686167]
[ 123.686433] CPU: 1 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 123.687332] Hardware name: Generic DT based system
[ 123.687832] unwind_backtrace from show_stack+0x18/0x1c
[ 123.688630] show_stack from dump_stack_lvl+0x58/0x70
[ 123.689234] dump_stack_lvl from print_report+0x164/0x51c
[ 123.690089] print_report from kasan_report+0xc8/0x104
[ 123.690897] kasan_report from kasan_check_range+0x14c/0x198
[ 123.691749] kasan_check_range from __asan_memset+0x20/0x3c
[ 123.692464] __asan_memset from kmalloc_oob_memset_8+0xdc/0x1e8
[ 123.693145] kmalloc_oob_memset_8 from kunit_try_run_case+0x11c/0x2e4
[ 123.694079] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.694941] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 123.695888] kthread from ret_from_fork+0x14/0x30
[ 123.696558] Exception stack(0xf9fbbfb0 to 0xf9fbbff8)
[ 123.697067] bfa0: 00000000 00000000 00000000 00000000
[ 123.697949] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 123.698745] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 123.699377]
[ 123.699696] Allocated by task 150:
[ 123.700095] kasan_set_track+0x3c/0x5c
[ 123.700696] __kasan_kmalloc+0x8c/0x94
[ 123.701241] kmalloc_oob_memset_8+0xa0/0x1e8
[ 123.701957] kunit_try_run_case+0x11c/0x2e4
[ 123.702983] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.703525] kthread+0x184/0x1a8
[ 123.704040] ret_from_fork+0x14/0x30
[ 123.705186]
[ 123.705805] The buggy address belongs to the object at c4cdc500
[ 123.705805] which belongs to the cache kmalloc-128 of size 128
[ 123.707283] The buggy address is located 113 bytes inside of
[ 123.707283] allocated 120-byte region [c4cdc500, c4cdc578)
[ 123.708543]
[ 123.708764] The buggy address belongs to the physical page:
[ 123.709751] page:4ad3b9de refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdc
[ 123.710643] flags: 0x800(slab|zone=0)
[ 123.711440] page_type: 0xffffffff()
[ 123.712130] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 123.713146] raw: 00000000
[ 123.713758] page dumped because: kasan: bad access detected
[ 123.714562]
[ 123.714894] Memory state around the buggy address:
[ 123.715784] c4cdc400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 123.716690] c4cdc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.717367] >c4cdc500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 123.718011] ^
[ 123.719219] c4cdc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.720038] c4cdc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.721339] ==================================================================
Home
[ 123.683839] ==================================================================
[ 123.684673] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xdc/0x1e8
[ 123.685507] Write of size 8 at addr c4cdc571 by task kunit_try_catch/150
[ 123.686167]
[ 123.686433] CPU: 1 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 123.687332] Hardware name: Generic DT based system
[ 123.687832] unwind_backtrace from show_stack+0x18/0x1c
[ 123.688630] show_stack from dump_stack_lvl+0x58/0x70
[ 123.689234] dump_stack_lvl from print_report+0x164/0x51c
[ 123.690089] print_report from kasan_report+0xc8/0x104
[ 123.690897] kasan_report from kasan_check_range+0x14c/0x198
[ 123.691749] kasan_check_range from __asan_memset+0x20/0x3c
[ 123.692464] __asan_memset from kmalloc_oob_memset_8+0xdc/0x1e8
[ 123.693145] kmalloc_oob_memset_8 from kunit_try_run_case+0x11c/0x2e4
[ 123.694079] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.694941] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 123.695888] kthread from ret_from_fork+0x14/0x30
[ 123.696558] Exception stack(0xf9fbbfb0 to 0xf9fbbff8)
[ 123.697067] bfa0: 00000000 00000000 00000000 00000000
[ 123.697949] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 123.698745] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 123.699377]
[ 123.699696] Allocated by task 150:
[ 123.700095] kasan_set_track+0x3c/0x5c
[ 123.700696] __kasan_kmalloc+0x8c/0x94
[ 123.701241] kmalloc_oob_memset_8+0xa0/0x1e8
[ 123.701957] kunit_try_run_case+0x11c/0x2e4
[ 123.702983] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.703525] kthread+0x184/0x1a8
[ 123.704040] ret_from_fork+0x14/0x30
[ 123.705186]
[ 123.705805] The buggy address belongs to the object at c4cdc500
[ 123.705805] which belongs to the cache kmalloc-128 of size 128
[ 123.707283] The buggy address is located 113 bytes inside of
[ 123.707283] allocated 120-byte region [c4cdc500, c4cdc578)
[ 123.708543]
[ 123.708764] The buggy address belongs to the physical page:
[ 123.709751] page:4ad3b9de refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdc
[ 123.710643] flags: 0x800(slab|zone=0)
[ 123.711440] page_type: 0xffffffff()
[ 123.712130] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 123.713146] raw: 00000000
[ 123.713758] page dumped because: kasan: bad access detected
[ 123.714562]
[ 123.714894] Memory state around the buggy address:
[ 123.715784] c4cdc400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 123.716690] c4cdc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.717367] >c4cdc500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 123.718011] ^
[ 123.719219] c4cdc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.720038] c4cdc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.721339] ==================================================================
Home
[ 122.451356] ==================================================================
[ 122.452873] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x100/0x320
[ 122.453452] Write of size 1 at addr c8e25878 by task kunit_try_catch/112
[ 122.453993]
[ 122.454211] CPU: 0 PID: 112 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 122.456381] Hardware name: Generic DT based system
[ 122.457467] unwind_backtrace from show_stack+0x18/0x1c
[ 122.458432] show_stack from dump_stack_lvl+0x58/0x70
[ 122.459659] dump_stack_lvl from print_report+0x164/0x51c
[ 122.460759] print_report from kasan_report+0xc8/0x104
[ 122.461849] kasan_report from kmalloc_oob_right+0x100/0x320
[ 122.463393] kmalloc_oob_right from kunit_try_run_case+0x11c/0x2e4
[ 122.464348] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 122.465393] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 122.466327] kthread from ret_from_fork+0x14/0x30
[ 122.466998] Exception stack(0xf9e93fb0 to 0xf9e93ff8)
[ 122.467582] 3fa0: 00000000 00000000 00000000 00000000
[ 122.468488] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 122.469339] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 122.470053]
[ 122.470246] Allocated by task 112:
[ 122.470746] kasan_set_track+0x3c/0x5c
[ 122.471383] __kasan_kmalloc+0x8c/0x94
[ 122.471837] kmalloc_oob_right+0xa0/0x320
[ 122.472389] kunit_try_run_case+0x11c/0x2e4
[ 122.473262] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 122.474538] kthread+0x184/0x1a8
[ 122.475034] ret_from_fork+0x14/0x30
[ 122.475545]
[ 122.475870] The buggy address belongs to the object at c8e25800
[ 122.475870] which belongs to the cache kmalloc-128 of size 128
[ 122.476996] The buggy address is located 5 bytes to the right of
[ 122.476996] allocated 115-byte region [c8e25800, c8e25873)
[ 122.478126]
[ 122.478456] The buggy address belongs to the physical page:
[ 122.479006] page:b090acfa refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e25
[ 122.480410] flags: 0x800(slab|zone=0)
[ 122.481148] page_type: 0xffffffff()
[ 122.482028] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 122.482745] raw: 00000000
[ 122.483141] page dumped because: kasan: bad access detected
[ 122.484040]
[ 122.484431] Memory state around the buggy address:
[ 122.485070] c8e25700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 122.485854] c8e25780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 122.486386] >c8e25800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 122.486998] ^
[ 122.487779] c8e25880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 122.488342] c8e25900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 122.489094] ==================================================================
Home
[ 122.491033] ==================================================================
[ 122.491651] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x134/0x320
[ 122.492206] Read of size 1 at addr c8e25880 by task kunit_try_catch/112
[ 122.492824]
[ 122.493141] CPU: 0 PID: 112 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 122.494234] Hardware name: Generic DT based system
[ 122.494894] unwind_backtrace from show_stack+0x18/0x1c
[ 122.495743] show_stack from dump_stack_lvl+0x58/0x70
[ 122.496521] dump_stack_lvl from print_report+0x164/0x51c
[ 122.497374] print_report from kasan_report+0xc8/0x104
[ 122.498111] kasan_report from kmalloc_oob_right+0x134/0x320
[ 122.498462] kmalloc_oob_right from kunit_try_run_case+0x11c/0x2e4
[ 122.499059] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 122.500182] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 122.501554] kthread from ret_from_fork+0x14/0x30
[ 122.502016] Exception stack(0xf9e93fb0 to 0xf9e93ff8)
[ 122.502458] 3fa0: 00000000 00000000 00000000 00000000
[ 122.503447] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 122.504350] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 122.505140]
[ 122.505392] Allocated by task 112:
[ 122.505926] kasan_set_track+0x3c/0x5c
[ 122.506463] __kasan_kmalloc+0x8c/0x94
[ 122.507117] kmalloc_oob_right+0xa0/0x320
[ 122.507707] kunit_try_run_case+0x11c/0x2e4
[ 122.508339] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 122.509059] kthread+0x184/0x1a8
[ 122.509706] ret_from_fork+0x14/0x30
[ 122.510635]
[ 122.510854] The buggy address belongs to the object at c8e25800
[ 122.510854] which belongs to the cache kmalloc-128 of size 128
[ 122.512338] The buggy address is located 13 bytes to the right of
[ 122.512338] allocated 115-byte region [c8e25800, c8e25873)
[ 122.513738]
[ 122.513979] The buggy address belongs to the physical page:
[ 122.514672] page:b090acfa refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e25
[ 122.515527] flags: 0x800(slab|zone=0)
[ 122.516117] page_type: 0xffffffff()
[ 122.516694] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 122.517573] raw: 00000000
[ 122.517990] page dumped because: kasan: bad access detected
[ 122.518677]
[ 122.518904] Memory state around the buggy address:
[ 122.519315] c8e25780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 122.520764] c8e25800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 122.521501] >c8e25880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 122.522432] ^
[ 122.522779] c8e25900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 122.523416] c8e25980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 122.524104] ==================================================================
Home
[ 122.401778] ==================================================================
[ 122.403990] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xcc/0x320
[ 122.407192] Write of size 1 at addr c8e25873 by task kunit_try_catch/112
[ 122.407957]
[ 122.408767] CPU: 0 PID: 112 Comm: kunit_try_catch Tainted: G N 6.6.74-rc1 #1
[ 122.410441] Hardware name: Generic DT based system
[ 122.411970] unwind_backtrace from show_stack+0x18/0x1c
[ 122.412936] show_stack from dump_stack_lvl+0x58/0x70
[ 122.413788] dump_stack_lvl from print_report+0x164/0x51c
[ 122.414572] print_report from kasan_report+0xc8/0x104
[ 122.415271] kasan_report from kmalloc_oob_right+0xcc/0x320
[ 122.416000] kmalloc_oob_right from kunit_try_run_case+0x11c/0x2e4
[ 122.416677] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 122.417399] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 122.417941] kthread from ret_from_fork+0x14/0x30
[ 122.418640] Exception stack(0xf9e93fb0 to 0xf9e93ff8)
[ 122.419957] 3fa0: 00000000 00000000 00000000 00000000
[ 122.420902] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 122.421912] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 122.422963]
[ 122.423345] Allocated by task 112:
[ 122.423996] kasan_set_track+0x3c/0x5c
[ 122.424649] __kasan_kmalloc+0x8c/0x94
[ 122.425097] kmalloc_oob_right+0xa0/0x320
[ 122.425546] kunit_try_run_case+0x11c/0x2e4
[ 122.426177] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 122.426864] kthread+0x184/0x1a8
[ 122.427264] ret_from_fork+0x14/0x30
[ 122.427841]
[ 122.428265] The buggy address belongs to the object at c8e25800
[ 122.428265] which belongs to the cache kmalloc-128 of size 128
[ 122.429476] The buggy address is located 0 bytes to the right of
[ 122.429476] allocated 115-byte region [c8e25800, c8e25873)
[ 122.431163]
[ 122.432047] The buggy address belongs to the physical page:
[ 122.433341] page:b090acfa refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e25
[ 122.435080] flags: 0x800(slab|zone=0)
[ 122.436186] page_type: 0xffffffff()
[ 122.437325] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 122.438148] raw: 00000000
[ 122.438643] page dumped because: kasan: bad access detected
[ 122.439201]
[ 122.439493] Memory state around the buggy address:
[ 122.441080] c8e25700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 122.441971] c8e25780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 122.442660] >c8e25800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 122.443328] ^
[ 122.444208] c8e25880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 122.444913] c8e25900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 122.445692] ==================================================================
Home
[ 122.628633] ==================================================================
[ 122.629515] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0xb4/0x1bc
[ 122.630729] Write of size 1 at addr c4dda00a by task kunit_try_catch/118
[ 122.631327]
[ 122.631653] CPU: 1 PID: 118 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 122.632548] Hardware name: Generic DT based system
[ 122.634084] unwind_backtrace from show_stack+0x18/0x1c
[ 122.634848] show_stack from dump_stack_lvl+0x58/0x70
[ 122.635641] dump_stack_lvl from print_report+0x164/0x51c
[ 122.636378] print_report from kasan_report+0xc8/0x104
[ 122.636981] kasan_report from kmalloc_pagealloc_oob_right+0xb4/0x1bc
[ 122.637896] kmalloc_pagealloc_oob_right from kunit_try_run_case+0x11c/0x2e4
[ 122.638723] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 122.639888] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 122.640904] kthread from ret_from_fork+0x14/0x30
[ 122.641690] Exception stack(0xf9ebbfb0 to 0xf9ebbff8)
[ 122.642255] bfa0: 00000000 00000000 00000000 00000000
[ 122.642991] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 122.643783] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 122.644378]
[ 122.644704] The buggy address belongs to the physical page:
[ 122.645504] page:50be9d29 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44dd8
[ 122.646425] head:50be9d29 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 122.647131] flags: 0x40(head|zone=0)
[ 122.647654] page_type: 0xffffffff()
[ 122.648196] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 122.648942] raw: 00000000
[ 122.649325] page dumped because: kasan: bad access detected
[ 122.649880]
[ 122.650478] Memory state around the buggy address:
[ 122.651121] c4dd9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 122.651796] c4dd9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 122.652466] >c4dda000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 122.653226] ^
[ 122.653645] c4dda080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 122.654493] c4dda100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 122.655133] ==================================================================
Home
[ 124.066658] ==================================================================
[ 124.067440] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xd4/0x248
[ 124.068181] Read of size 1 at addr c8fa90c8 by task kunit_try_catch/170
[ 124.068736]
[ 124.069022] CPU: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 124.070926] Hardware name: Generic DT based system
[ 124.071550] unwind_backtrace from show_stack+0x18/0x1c
[ 124.072285] show_stack from dump_stack_lvl+0x58/0x70
[ 124.073547] dump_stack_lvl from print_report+0x164/0x51c
[ 124.074381] print_report from kasan_report+0xc8/0x104
[ 124.075657] kasan_report from kmem_cache_oob+0xd4/0x248
[ 124.076407] kmem_cache_oob from kunit_try_run_case+0x11c/0x2e4
[ 124.077490] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 124.078591] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 124.079684] kthread from ret_from_fork+0x14/0x30
[ 124.080831] Exception stack(0xfa05bfb0 to 0xfa05bff8)
[ 124.081304] bfa0: 00000000 00000000 00000000 00000000
[ 124.082810] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 124.083690] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 124.084363]
[ 124.085135] Allocated by task 170:
[ 124.085549] kasan_set_track+0x3c/0x5c
[ 124.086282] __kasan_slab_alloc+0x60/0x68
[ 124.087043] kmem_cache_alloc+0x1dc/0x574
[ 124.087792] kmem_cache_oob+0xb0/0x248
[ 124.088493] kunit_try_run_case+0x11c/0x2e4
[ 124.089271] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 124.090126] kthread+0x184/0x1a8
[ 124.090452] ret_from_fork+0x14/0x30
[ 124.090963]
[ 124.091187] The buggy address belongs to the object at c8fa9000
[ 124.091187] which belongs to the cache test_cache of size 200
[ 124.093085] The buggy address is located 0 bytes to the right of
[ 124.093085] allocated 200-byte region [c8fa9000, c8fa90c8)
[ 124.094456]
[ 124.094795] The buggy address belongs to the physical page:
[ 124.095390] page:8017358a refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fa9
[ 124.096184] flags: 0x800(slab|zone=0)
[ 124.097263] page_type: 0xffffffff()
[ 124.097749] raw: 00000800 c8901e00 00000122 00000000 00000000 800f000f ffffffff 00000001
[ 124.098789] raw: 00000000
[ 124.099363] page dumped because: kasan: bad access detected
[ 124.100302]
[ 124.100494] Memory state around the buggy address:
[ 124.101559] c8fa8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 124.102639] c8fa9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 124.103256] >c8fa9080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[ 124.104116] ^
[ 124.104637] c8fa9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 124.105288] c8fa9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 124.106288] ==================================================================
Home
[ 122.948662] ==================================================================
[ 122.949339] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x150/0x5f0
[ 122.950685] Write of size 1 at addr c4d424d0 by task kunit_try_catch/132
[ 122.951468]
[ 122.951794] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 122.952578] Hardware name: Generic DT based system
[ 122.953101] unwind_backtrace from show_stack+0x18/0x1c
[ 122.953971] show_stack from dump_stack_lvl+0x58/0x70
[ 122.954734] dump_stack_lvl from print_report+0x164/0x51c
[ 122.955348] print_report from kasan_report+0xc8/0x104
[ 122.956138] kasan_report from krealloc_less_oob_helper+0x150/0x5f0
[ 122.956869] krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 122.957717] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 122.958753] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 122.959526] kthread from ret_from_fork+0x14/0x30
[ 122.960223] Exception stack(0xf9f2bfb0 to 0xf9f2bff8)
[ 122.960812] bfa0: 00000000 00000000 00000000 00000000
[ 122.961565] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 122.962417] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 122.963139]
[ 122.963490] Allocated by task 132:
[ 122.963972] kasan_set_track+0x3c/0x5c
[ 122.964567] __kasan_krealloc+0xe0/0x104
[ 122.965189] krealloc+0xd4/0x134
[ 122.965657] krealloc_less_oob_helper+0xd4/0x5f0
[ 122.966304] kunit_try_run_case+0x11c/0x2e4
[ 122.966952] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 122.967523] kthread+0x184/0x1a8
[ 122.968054] ret_from_fork+0x14/0x30
[ 122.968582]
[ 122.968864] The buggy address belongs to the object at c4d42400
[ 122.968864] which belongs to the cache kmalloc-256 of size 256
[ 122.969911] The buggy address is located 7 bytes to the right of
[ 122.969911] allocated 201-byte region [c4d42400, c4d424c9)
[ 122.971068]
[ 122.971378] The buggy address belongs to the physical page:
[ 122.973702] page:c6df89a3 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d42
[ 122.974493] head:c6df89a3 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 122.975250] flags: 0x840(slab|head|zone=0)
[ 122.975888] page_type: 0xffffffff()
[ 122.976324] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 122.977195] raw: 00000000
[ 122.977492] page dumped because: kasan: bad access detected
[ 122.978155]
[ 122.978393] Memory state around the buggy address:
[ 122.979023] c4d42380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 122.979732] c4d42400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 122.980260] >c4d42480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 122.981016] ^
[ 122.981676] c4d42500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 122.982245] c4d42580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 122.983006] ==================================================================
Home
[ 122.911531] ==================================================================
[ 122.912337] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x114/0x5f0
[ 122.913220] Write of size 1 at addr c4d424c9 by task kunit_try_catch/132
[ 122.913968]
[ 122.914267] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 122.914960] Hardware name: Generic DT based system
[ 122.915557] unwind_backtrace from show_stack+0x18/0x1c
[ 122.916305] show_stack from dump_stack_lvl+0x58/0x70
[ 122.917081] dump_stack_lvl from print_report+0x164/0x51c
[ 122.917789] print_report from kasan_report+0xc8/0x104
[ 122.918389] kasan_report from krealloc_less_oob_helper+0x114/0x5f0
[ 122.919257] krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 122.920127] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 122.921130] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 122.921919] kthread from ret_from_fork+0x14/0x30
[ 122.922632] Exception stack(0xf9f2bfb0 to 0xf9f2bff8)
[ 122.923354] bfa0: 00000000 00000000 00000000 00000000
[ 122.924152] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 122.924916] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 122.925693]
[ 122.925982] Allocated by task 132:
[ 122.926439] kasan_set_track+0x3c/0x5c
[ 122.926980] __kasan_krealloc+0xe0/0x104
[ 122.927568] krealloc+0xd4/0x134
[ 122.928013] krealloc_less_oob_helper+0xd4/0x5f0
[ 122.928676] kunit_try_run_case+0x11c/0x2e4
[ 122.929241] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 122.930045] kthread+0x184/0x1a8
[ 122.930509] ret_from_fork+0x14/0x30
[ 122.931058]
[ 122.931309] The buggy address belongs to the object at c4d42400
[ 122.931309] which belongs to the cache kmalloc-256 of size 256
[ 122.933056] The buggy address is located 0 bytes to the right of
[ 122.933056] allocated 201-byte region [c4d42400, c4d424c9)
[ 122.933988]
[ 122.934822] The buggy address belongs to the physical page:
[ 122.935901] page:c6df89a3 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d42
[ 122.936824] head:c6df89a3 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 122.937581] flags: 0x840(slab|head|zone=0)
[ 122.938144] page_type: 0xffffffff()
[ 122.938718] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 122.939449] raw: 00000000
[ 122.939855] page dumped because: kasan: bad access detected
[ 122.940418]
[ 122.940719] Memory state around the buggy address:
[ 122.941186] c4d42380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 122.941967] c4d42400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 122.942700] >c4d42480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 122.943364] ^
[ 122.943895] c4d42500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 122.944678] c4d42580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 122.945254] ==================================================================
Home
[ 123.294325] ==================================================================
[ 123.295131] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x214/0x5f0
[ 123.296003] Write of size 1 at addr c4dda0eb by task kunit_try_catch/136
[ 123.296683]
[ 123.296989] CPU: 1 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 123.297904] Hardware name: Generic DT based system
[ 123.298578] unwind_backtrace from show_stack+0x18/0x1c
[ 123.299262] show_stack from dump_stack_lvl+0x58/0x70
[ 123.300136] dump_stack_lvl from print_report+0x164/0x51c
[ 123.300962] print_report from kasan_report+0xc8/0x104
[ 123.301702] kasan_report from krealloc_less_oob_helper+0x214/0x5f0
[ 123.302715] krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 123.304951] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.305836] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 123.306808] kthread from ret_from_fork+0x14/0x30
[ 123.307511] Exception stack(0xf9f4bfb0 to 0xf9f4bff8)
[ 123.308166] bfa0: 00000000 00000000 00000000 00000000
[ 123.309128] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 123.309942] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 123.310679]
[ 123.311050] The buggy address belongs to the physical page:
[ 123.311627] page:50be9d29 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44dd8
[ 123.312706] head:50be9d29 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 123.313484] flags: 0x40(head|zone=0)
[ 123.314011] page_type: 0xffffffff()
[ 123.314562] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 123.315346] raw: 00000000
[ 123.315765] page dumped because: kasan: bad access detected
[ 123.316579]
[ 123.316893] Memory state around the buggy address:
[ 123.317419] c4dd9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 123.318252] c4dda000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 123.319083] >c4dda080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 123.320251] ^
[ 123.320929] c4dda100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 123.322056] c4dda180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 123.323239] ==================================================================
---
[ 123.264761] ==================================================================
[ 123.265589] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1e0/0x5f0
[ 123.266383] Write of size 1 at addr c4dda0ea by task kunit_try_catch/136
[ 123.266970]
[ 123.267278] CPU: 1 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 123.268413] Hardware name: Generic DT based system
[ 123.269125] unwind_backtrace from show_stack+0x18/0x1c
[ 123.270039] show_stack from dump_stack_lvl+0x58/0x70
[ 123.270889] dump_stack_lvl from print_report+0x164/0x51c
[ 123.271774] print_report from kasan_report+0xc8/0x104
[ 123.272798] kasan_report from krealloc_less_oob_helper+0x1e0/0x5f0
[ 123.273748] krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 123.274773] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.275828] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 123.276738] kthread from ret_from_fork+0x14/0x30
[ 123.277329] Exception stack(0xf9f4bfb0 to 0xf9f4bff8)
[ 123.277945] bfa0: 00000000 00000000 00000000 00000000
[ 123.278863] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 123.279735] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 123.280475]
[ 123.281199] The buggy address belongs to the physical page:
[ 123.281753] page:50be9d29 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44dd8
[ 123.282560] head:50be9d29 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 123.284250] flags: 0x40(head|zone=0)
[ 123.284860] page_type: 0xffffffff()
[ 123.285465] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 123.286320] raw: 00000000
[ 123.286782] page dumped because: kasan: bad access detected
[ 123.287367]
[ 123.287744] Memory state around the buggy address:
[ 123.288326] c4dd9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 123.289240] c4dda000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 123.290111] >c4dda080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 123.290858] ^
[ 123.291516] c4dda100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 123.292426] c4dda180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 123.292993] ==================================================================
Home
[ 123.174781] ==================================================================
[ 123.175809] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x114/0x5f0
[ 123.177289] Write of size 1 at addr c4dda0c9 by task kunit_try_catch/136
[ 123.178101]
[ 123.178644] CPU: 1 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 123.179670] Hardware name: Generic DT based system
[ 123.180236] unwind_backtrace from show_stack+0x18/0x1c
[ 123.180908] show_stack from dump_stack_lvl+0x58/0x70
[ 123.181519] dump_stack_lvl from print_report+0x164/0x51c
[ 123.182546] print_report from kasan_report+0xc8/0x104
[ 123.183310] kasan_report from krealloc_less_oob_helper+0x114/0x5f0
[ 123.184073] krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 123.185358] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.186481] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 123.187292] kthread from ret_from_fork+0x14/0x30
[ 123.188373] Exception stack(0xf9f4bfb0 to 0xf9f4bff8)
[ 123.189167] bfa0: 00000000 00000000 00000000 00000000
[ 123.189986] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 123.190790] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 123.191458]
[ 123.191782] The buggy address belongs to the physical page:
[ 123.192357] page:50be9d29 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44dd8
[ 123.193189] head:50be9d29 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 123.193881] flags: 0x40(head|zone=0)
[ 123.194407] page_type: 0xffffffff()
[ 123.194905] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 123.195806] raw: 00000000
[ 123.196132] page dumped because: kasan: bad access detected
[ 123.196742]
[ 123.197025] Memory state around the buggy address:
[ 123.197590] c4dd9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 123.198388] c4dda000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 123.199126] >c4dda080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 123.199674] ^
[ 123.200289] c4dda100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 123.201032] c4dda180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 123.201803] ==================================================================
Home
[ 123.233230] ==================================================================
[ 123.234042] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a8/0x5f0
[ 123.234803] Write of size 1 at addr c4dda0da by task kunit_try_catch/136
[ 123.235492]
[ 123.235797] CPU: 1 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 123.236466] Hardware name: Generic DT based system
[ 123.237079] unwind_backtrace from show_stack+0x18/0x1c
[ 123.237874] show_stack from dump_stack_lvl+0x58/0x70
[ 123.238482] dump_stack_lvl from print_report+0x164/0x51c
[ 123.239300] print_report from kasan_report+0xc8/0x104
[ 123.241908] kasan_report from krealloc_less_oob_helper+0x1a8/0x5f0
[ 123.242745] krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 123.243500] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.244529] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 123.245332] kthread from ret_from_fork+0x14/0x30
[ 123.245981] Exception stack(0xf9f4bfb0 to 0xf9f4bff8)
[ 123.246678] bfa0: 00000000 00000000 00000000 00000000
[ 123.247370] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 123.248333] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 123.248922]
[ 123.249231] The buggy address belongs to the physical page:
[ 123.249906] page:50be9d29 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44dd8
[ 123.250564] head:50be9d29 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 123.251415] flags: 0x40(head|zone=0)
[ 123.251962] page_type: 0xffffffff()
[ 123.252417] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 123.253261] raw: 00000000
[ 123.253677] page dumped because: kasan: bad access detected
[ 123.254180]
[ 123.254471] Memory state around the buggy address:
[ 123.255061] c4dd9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 123.255863] c4dda000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 123.256553] >c4dda080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 123.257097] ^
[ 123.257892] c4dda100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 123.258675] c4dda180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 123.259332] ==================================================================
Home
[ 123.205593] ==================================================================
[ 123.206301] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x150/0x5f0
[ 123.207099] Write of size 1 at addr c4dda0d0 by task kunit_try_catch/136
[ 123.207684]
[ 123.207996] CPU: 1 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 123.208811] Hardware name: Generic DT based system
[ 123.209383] unwind_backtrace from show_stack+0x18/0x1c
[ 123.210252] show_stack from dump_stack_lvl+0x58/0x70
[ 123.210977] dump_stack_lvl from print_report+0x164/0x51c
[ 123.211792] print_report from kasan_report+0xc8/0x104
[ 123.212481] kasan_report from krealloc_less_oob_helper+0x150/0x5f0
[ 123.213375] krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 123.214316] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.215177] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 123.216103] kthread from ret_from_fork+0x14/0x30
[ 123.216683] Exception stack(0xf9f4bfb0 to 0xf9f4bff8)
[ 123.217320] bfa0: 00000000 00000000 00000000 00000000
[ 123.218210] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 123.219110] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 123.221053]
[ 123.221432] The buggy address belongs to the physical page:
[ 123.222042] page:50be9d29 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44dd8
[ 123.222797] head:50be9d29 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 123.223556] flags: 0x40(head|zone=0)
[ 123.224257] page_type: 0xffffffff()
[ 123.224765] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 123.225543] raw: 00000000
[ 123.225954] page dumped because: kasan: bad access detected
[ 123.226520]
[ 123.226838] Memory state around the buggy address:
[ 123.227338] c4dd9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 123.228128] c4dda000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 123.228763] >c4dda080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 123.229418] ^
[ 123.229985] c4dda100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 123.230700] c4dda180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 123.231444] ==================================================================
Home
[ 122.984994] ==================================================================
[ 122.985848] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a8/0x5f0
[ 122.986716] Write of size 1 at addr c4d424da by task kunit_try_catch/132
[ 122.987474]
[ 122.987782] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 122.988598] Hardware name: Generic DT based system
[ 122.989090] unwind_backtrace from show_stack+0x18/0x1c
[ 122.991416] show_stack from dump_stack_lvl+0x58/0x70
[ 122.992202] dump_stack_lvl from print_report+0x164/0x51c
[ 122.992940] print_report from kasan_report+0xc8/0x104
[ 122.993803] kasan_report from krealloc_less_oob_helper+0x1a8/0x5f0
[ 122.994675] krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 122.995569] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 122.996506] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 122.997383] kthread from ret_from_fork+0x14/0x30
[ 122.997994] Exception stack(0xf9f2bfb0 to 0xf9f2bff8)
[ 122.998685] bfa0: 00000000 00000000 00000000 00000000
[ 122.999464] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 123.000342] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 123.001014]
[ 123.001244] Allocated by task 132:
[ 123.001730] kasan_set_track+0x3c/0x5c
[ 123.002284] __kasan_krealloc+0xe0/0x104
[ 123.002896] krealloc+0xd4/0x134
[ 123.003496] krealloc_less_oob_helper+0xd4/0x5f0
[ 123.004084] kunit_try_run_case+0x11c/0x2e4
[ 123.004739] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.005397] kthread+0x184/0x1a8
[ 123.005825] ret_from_fork+0x14/0x30
[ 123.006360]
[ 123.006686] The buggy address belongs to the object at c4d42400
[ 123.006686] which belongs to the cache kmalloc-256 of size 256
[ 123.007770] The buggy address is located 17 bytes to the right of
[ 123.007770] allocated 201-byte region [c4d42400, c4d424c9)
[ 123.008706]
[ 123.009006] The buggy address belongs to the physical page:
[ 123.009750] page:c6df89a3 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d42
[ 123.010389] head:c6df89a3 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 123.012318] flags: 0x840(slab|head|zone=0)
[ 123.012874] page_type: 0xffffffff()
[ 123.013341] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 123.014890] raw: 00000000
[ 123.015485] page dumped because: kasan: bad access detected
[ 123.016236]
[ 123.016756] Memory state around the buggy address:
[ 123.017481] c4d42380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.018245] c4d42400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 123.018965] >c4d42480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 123.019598] ^
[ 123.020189] c4d42500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.021338] c4d42580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.022215] ==================================================================
Home
[ 123.063270] ==================================================================
[ 123.064185] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x214/0x5f0
[ 123.064993] Write of size 1 at addr c4d424eb by task kunit_try_catch/132
[ 123.065650]
[ 123.065918] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 123.066625] Hardware name: Generic DT based system
[ 123.067216] unwind_backtrace from show_stack+0x18/0x1c
[ 123.067976] show_stack from dump_stack_lvl+0x58/0x70
[ 123.068648] dump_stack_lvl from print_report+0x164/0x51c
[ 123.069296] print_report from kasan_report+0xc8/0x104
[ 123.070173] kasan_report from krealloc_less_oob_helper+0x214/0x5f0
[ 123.072163] krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 123.073365] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.074340] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 123.075129] kthread from ret_from_fork+0x14/0x30
[ 123.076111] Exception stack(0xf9f2bfb0 to 0xf9f2bff8)
[ 123.076525] bfa0: 00000000 00000000 00000000 00000000
[ 123.077791] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 123.078857] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 123.079767]
[ 123.080250] Allocated by task 132:
[ 123.080857] kasan_set_track+0x3c/0x5c
[ 123.081659] __kasan_krealloc+0xe0/0x104
[ 123.082193] krealloc+0xd4/0x134
[ 123.083025] krealloc_less_oob_helper+0xd4/0x5f0
[ 123.083678] kunit_try_run_case+0x11c/0x2e4
[ 123.084140] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.084854] kthread+0x184/0x1a8
[ 123.085422] ret_from_fork+0x14/0x30
[ 123.085844]
[ 123.086183] The buggy address belongs to the object at c4d42400
[ 123.086183] which belongs to the cache kmalloc-256 of size 256
[ 123.087283] The buggy address is located 34 bytes to the right of
[ 123.087283] allocated 201-byte region [c4d42400, c4d424c9)
[ 123.088369]
[ 123.088692] The buggy address belongs to the physical page:
[ 123.089386] page:c6df89a3 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d42
[ 123.090350] head:c6df89a3 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 123.092202] flags: 0x840(slab|head|zone=0)
[ 123.092741] page_type: 0xffffffff()
[ 123.093168] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 123.094022] raw: 00000000
[ 123.094449] page dumped because: kasan: bad access detected
[ 123.094946]
[ 123.095235] Memory state around the buggy address:
[ 123.095845] c4d42380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.096375] c4d42400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 123.097160] >c4d42480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 123.097861] ^
[ 123.098468] c4d42500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.099250] c4d42580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.099865] ==================================================================
---
[ 123.023936] ==================================================================
[ 123.024678] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1e0/0x5f0
[ 123.025708] Write of size 1 at addr c4d424ea by task kunit_try_catch/132
[ 123.026163]
[ 123.026997] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 123.027979] Hardware name: Generic DT based system
[ 123.028687] unwind_backtrace from show_stack+0x18/0x1c
[ 123.029735] show_stack from dump_stack_lvl+0x58/0x70
[ 123.030335] dump_stack_lvl from print_report+0x164/0x51c
[ 123.031575] print_report from kasan_report+0xc8/0x104
[ 123.032641] kasan_report from krealloc_less_oob_helper+0x1e0/0x5f0
[ 123.033494] krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 123.034398] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.035325] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 123.036469] kthread from ret_from_fork+0x14/0x30
[ 123.037281] Exception stack(0xf9f2bfb0 to 0xf9f2bff8)
[ 123.038102] bfa0: 00000000 00000000 00000000 00000000
[ 123.039148] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 123.040177] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 123.040794]
[ 123.041079] Allocated by task 132:
[ 123.041452] kasan_set_track+0x3c/0x5c
[ 123.042073] __kasan_krealloc+0xe0/0x104
[ 123.042654] krealloc+0xd4/0x134
[ 123.043105] krealloc_less_oob_helper+0xd4/0x5f0
[ 123.043765] kunit_try_run_case+0x11c/0x2e4
[ 123.044328] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.045011] kthread+0x184/0x1a8
[ 123.045406] ret_from_fork+0x14/0x30
[ 123.045949]
[ 123.046245] The buggy address belongs to the object at c4d42400
[ 123.046245] which belongs to the cache kmalloc-256 of size 256
[ 123.047233] The buggy address is located 33 bytes to the right of
[ 123.047233] allocated 201-byte region [c4d42400, c4d424c9)
[ 123.048238]
[ 123.048535] The buggy address belongs to the physical page:
[ 123.049206] page:c6df89a3 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d42
[ 123.051170] head:c6df89a3 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 123.052026] flags: 0x840(slab|head|zone=0)
[ 123.052578] page_type: 0xffffffff()
[ 123.053034] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 123.054539] raw: 00000000
[ 123.055108] page dumped because: kasan: bad access detected
[ 123.055726]
[ 123.056000] Memory state around the buggy address:
[ 123.056437] c4d42380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.057569] c4d42400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 123.058489] >c4d42480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 123.059195] ^
[ 123.059820] c4d42500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.060469] c4d42580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.061296] ==================================================================
Home
[ 122.864987] ==================================================================
[ 122.865690] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x180/0x384
[ 122.866475] Write of size 1 at addr c4d422f0 by task kunit_try_catch/130
[ 122.867065]
[ 122.867304] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 122.868277] Hardware name: Generic DT based system
[ 122.868844] unwind_backtrace from show_stack+0x18/0x1c
[ 122.869504] show_stack from dump_stack_lvl+0x58/0x70
[ 122.870848] dump_stack_lvl from print_report+0x164/0x51c
[ 122.871593] print_report from kasan_report+0xc8/0x104
[ 122.872275] kasan_report from krealloc_more_oob_helper+0x180/0x384
[ 122.873043] krealloc_more_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 122.874008] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 122.874949] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 122.875794] kthread from ret_from_fork+0x14/0x30
[ 122.876400] Exception stack(0xf9f1bfb0 to 0xf9f1bff8)
[ 122.877119] bfa0: 00000000 00000000 00000000 00000000
[ 122.877926] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 122.878686] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 122.879391]
[ 122.880151] Allocated by task 130:
[ 122.881140] kasan_set_track+0x3c/0x5c
[ 122.881604] __kasan_krealloc+0xe0/0x104
[ 122.882360] krealloc+0xd4/0x134
[ 122.882957] krealloc_more_oob_helper+0xd4/0x384
[ 122.883823] kunit_try_run_case+0x11c/0x2e4
[ 122.884380] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 122.885226] kthread+0x184/0x1a8
[ 122.885700] ret_from_fork+0x14/0x30
[ 122.886377]
[ 122.886703] The buggy address belongs to the object at c4d42200
[ 122.886703] which belongs to the cache kmalloc-256 of size 256
[ 122.888070] The buggy address is located 5 bytes to the right of
[ 122.888070] allocated 235-byte region [c4d42200, c4d422eb)
[ 122.889586]
[ 122.889944] The buggy address belongs to the physical page:
[ 122.890504] page:c6df89a3 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d42
[ 122.891518] head:c6df89a3 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 122.892248] flags: 0x840(slab|head|zone=0)
[ 122.892917] page_type: 0xffffffff()
[ 122.893452] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 122.894287] raw: 00000000
[ 122.894776] page dumped because: kasan: bad access detected
[ 122.895368]
[ 122.895715] Memory state around the buggy address:
[ 122.896201] c4d42180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 122.896988] c4d42200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 122.897775] >c4d42280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[ 122.898441] ^
[ 122.899165] c4d42300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 122.900701] c4d42380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 122.901274] ==================================================================
Home
[ 123.109053] ==================================================================
[ 123.110166] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x144/0x384
[ 123.111231] Write of size 1 at addr c4dda0eb by task kunit_try_catch/134
[ 123.112002]
[ 123.112347] CPU: 1 PID: 134 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 123.113183] Hardware name: Generic DT based system
[ 123.113806] unwind_backtrace from show_stack+0x18/0x1c
[ 123.114685] show_stack from dump_stack_lvl+0x58/0x70
[ 123.115334] dump_stack_lvl from print_report+0x164/0x51c
[ 123.116224] print_report from kasan_report+0xc8/0x104
[ 123.116932] kasan_report from krealloc_more_oob_helper+0x144/0x384
[ 123.117773] krealloc_more_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 123.118776] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.119859] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 123.120721] kthread from ret_from_fork+0x14/0x30
[ 123.121450] Exception stack(0xf9f3bfb0 to 0xf9f3bff8)
[ 123.121981] bfa0: 00000000 00000000 00000000 00000000
[ 123.122892] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 123.123272] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 123.123601]
[ 123.123751] The buggy address belongs to the physical page:
[ 123.124005] page:50be9d29 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44dd8
[ 123.124349] head:50be9d29 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 123.124738] flags: 0x40(head|zone=0)
[ 123.125433] page_type: 0xffffffff()
[ 123.126087] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 123.127181] raw: 00000000
[ 123.127689] page dumped because: kasan: bad access detected
[ 123.128513]
[ 123.128975] Memory state around the buggy address:
[ 123.129541] c4dd9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 123.130730] c4dda000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 123.131638] >c4dda080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[ 123.132199] ^
[ 123.132871] c4dda100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 123.133592] c4dda180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 123.134188] ==================================================================
Home
[ 122.824295] ==================================================================
[ 122.825082] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x144/0x384
[ 122.825456] Write of size 1 at addr c4d422eb by task kunit_try_catch/130
[ 122.825866]
[ 122.827194] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 122.828291] Hardware name: Generic DT based system
[ 122.828914] unwind_backtrace from show_stack+0x18/0x1c
[ 122.829515] show_stack from dump_stack_lvl+0x58/0x70
[ 122.830401] dump_stack_lvl from print_report+0x164/0x51c
[ 122.831081] print_report from kasan_report+0xc8/0x104
[ 122.831709] kasan_report from krealloc_more_oob_helper+0x144/0x384
[ 122.832592] krealloc_more_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 122.833439] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 122.834368] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 122.835236] kthread from ret_from_fork+0x14/0x30
[ 122.835811] Exception stack(0xf9f1bfb0 to 0xf9f1bff8)
[ 122.836436] bfa0: 00000000 00000000 00000000 00000000
[ 122.837255] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 122.838129] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 122.838787]
[ 122.839064] Allocated by task 130:
[ 122.840469] kasan_set_track+0x3c/0x5c
[ 122.841502] __kasan_krealloc+0xe0/0x104
[ 122.842248] krealloc+0xd4/0x134
[ 122.843006] krealloc_more_oob_helper+0xd4/0x384
[ 122.843695] kunit_try_run_case+0x11c/0x2e4
[ 122.843981] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 122.844276] kthread+0x184/0x1a8
[ 122.844474] ret_from_fork+0x14/0x30
[ 122.844774]
[ 122.844996] The buggy address belongs to the object at c4d42200
[ 122.844996] which belongs to the cache kmalloc-256 of size 256
[ 122.846858] The buggy address is located 0 bytes to the right of
[ 122.846858] allocated 235-byte region [c4d42200, c4d422eb)
[ 122.847746]
[ 122.848049] The buggy address belongs to the physical page:
[ 122.848770] page:c6df89a3 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d42
[ 122.849461] head:c6df89a3 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 122.850380] flags: 0x840(slab|head|zone=0)
[ 122.851097] page_type: 0xffffffff()
[ 122.851582] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 122.852431] raw: 00000000
[ 122.852834] page dumped because: kasan: bad access detected
[ 122.853491]
[ 122.853792] Memory state around the buggy address:
[ 122.854448] c4d42180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 122.855340] c4d42200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 122.856298] >c4d42280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[ 122.856947] ^
[ 122.857556] c4d42300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 122.858220] c4d42380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 122.858938] ==================================================================
Home
[ 123.135838] ==================================================================
[ 123.136931] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x180/0x384
[ 123.137837] Write of size 1 at addr c4dda0f0 by task kunit_try_catch/134
[ 123.139258]
[ 123.139711] CPU: 1 PID: 134 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 123.140495] Hardware name: Generic DT based system
[ 123.141137] unwind_backtrace from show_stack+0x18/0x1c
[ 123.141820] show_stack from dump_stack_lvl+0x58/0x70
[ 123.142603] dump_stack_lvl from print_report+0x164/0x51c
[ 123.143269] print_report from kasan_report+0xc8/0x104
[ 123.144124] kasan_report from krealloc_more_oob_helper+0x180/0x384
[ 123.144910] krealloc_more_oob_helper from kunit_try_run_case+0x11c/0x2e4
[ 123.145801] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.146707] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 123.147514] kthread from ret_from_fork+0x14/0x30
[ 123.148068] Exception stack(0xf9f3bfb0 to 0xf9f3bff8)
[ 123.148741] bfa0: 00000000 00000000 00000000 00000000
[ 123.149491] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 123.150950] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 123.151557]
[ 123.151874] The buggy address belongs to the physical page:
[ 123.152408] page:50be9d29 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44dd8
[ 123.153343] head:50be9d29 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 123.154064] flags: 0x40(head|zone=0)
[ 123.154681] page_type: 0xffffffff()
[ 123.155229] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 123.156045] raw: 00000000
[ 123.156512] page dumped because: kasan: bad access detected
[ 123.157161]
[ 123.157467] Memory state around the buggy address:
[ 123.158290] c4dd9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 123.159095] c4dda000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 123.160032] >c4dda080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[ 123.160918] ^
[ 123.161535] c4dda100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 123.162269] c4dda180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 123.162858] ==================================================================
Home
[ 124.934040] ==================================================================
[ 124.934879] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x10c/0x3b4
[ 124.935880] Read of size 1 at addr c4cdc773 by task kunit_try_catch/186
[ 124.936430]
[ 124.936731] CPU: 1 PID: 186 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 124.937589] Hardware name: Generic DT based system
[ 124.939089] unwind_backtrace from show_stack+0x18/0x1c
[ 124.940464] show_stack from dump_stack_lvl+0x58/0x70
[ 124.941390] dump_stack_lvl from print_report+0x164/0x51c
[ 124.942303] print_report from kasan_report+0xc8/0x104
[ 124.943265] kasan_report from ksize_unpoisons_memory+0x10c/0x3b4
[ 124.944100] ksize_unpoisons_memory from kunit_try_run_case+0x11c/0x2e4
[ 124.945191] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 124.946291] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 124.947327] kthread from ret_from_fork+0x14/0x30
[ 124.948154] Exception stack(0xfa0cbfb0 to 0xfa0cbff8)
[ 124.948794] bfa0: 00000000 00000000 00000000 00000000
[ 124.949940] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 124.951186] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 124.952166]
[ 124.952669] Allocated by task 186:
[ 124.953337] kasan_set_track+0x3c/0x5c
[ 124.953892] __kasan_kmalloc+0x8c/0x94
[ 124.954758] ksize_unpoisons_memory+0xb4/0x3b4
[ 124.955562] kunit_try_run_case+0x11c/0x2e4
[ 124.956378] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 124.957273] kthread+0x184/0x1a8
[ 124.957740] ret_from_fork+0x14/0x30
[ 124.958546]
[ 124.958869] The buggy address belongs to the object at c4cdc700
[ 124.958869] which belongs to the cache kmalloc-128 of size 128
[ 124.960501] The buggy address is located 0 bytes to the right of
[ 124.960501] allocated 115-byte region [c4cdc700, c4cdc773)
[ 124.961899]
[ 124.962099] The buggy address belongs to the physical page:
[ 124.963184] page:4ad3b9de refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdc
[ 124.964149] flags: 0x800(slab|zone=0)
[ 124.964966] page_type: 0xffffffff()
[ 124.965729] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 124.966746] raw: 00000000
[ 124.967346] page dumped because: kasan: bad access detected
[ 124.967959]
[ 124.968526] Memory state around the buggy address:
[ 124.968980] c4cdc600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 124.970203] c4cdc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 124.971229] >c4cdc700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 124.971909] ^
[ 124.972866] c4cdc780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 124.973691] c4cdc800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 124.974564] ==================================================================
Home
[ 125.017559] ==================================================================
[ 125.018813] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x170/0x3b4
[ 125.019560] Read of size 1 at addr c4cdc77f by task kunit_try_catch/186
[ 125.020485]
[ 125.020816] CPU: 1 PID: 186 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 125.022410] Hardware name: Generic DT based system
[ 125.022905] unwind_backtrace from show_stack+0x18/0x1c
[ 125.024023] show_stack from dump_stack_lvl+0x58/0x70
[ 125.024860] dump_stack_lvl from print_report+0x164/0x51c
[ 125.025760] print_report from kasan_report+0xc8/0x104
[ 125.026424] kasan_report from ksize_unpoisons_memory+0x170/0x3b4
[ 125.027186] ksize_unpoisons_memory from kunit_try_run_case+0x11c/0x2e4
[ 125.028129] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.029041] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 125.030286] kthread from ret_from_fork+0x14/0x30
[ 125.030827] Exception stack(0xfa0cbfb0 to 0xfa0cbff8)
[ 125.031477] bfa0: 00000000 00000000 00000000 00000000
[ 125.032226] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 125.033185] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 125.033982]
[ 125.034220] Allocated by task 186:
[ 125.034725] kasan_set_track+0x3c/0x5c
[ 125.035218] __kasan_kmalloc+0x8c/0x94
[ 125.035835] ksize_unpoisons_memory+0xb4/0x3b4
[ 125.036484] kunit_try_run_case+0x11c/0x2e4
[ 125.036987] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.037749] kthread+0x184/0x1a8
[ 125.038142] ret_from_fork+0x14/0x30
[ 125.038709]
[ 125.038973] The buggy address belongs to the object at c4cdc700
[ 125.038973] which belongs to the cache kmalloc-128 of size 128
[ 125.040426] The buggy address is located 12 bytes to the right of
[ 125.040426] allocated 115-byte region [c4cdc700, c4cdc773)
[ 125.041501]
[ 125.041798] The buggy address belongs to the physical page:
[ 125.042424] page:4ad3b9de refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdc
[ 125.043429] flags: 0x800(slab|zone=0)
[ 125.043993] page_type: 0xffffffff()
[ 125.044505] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 125.045428] raw: 00000000
[ 125.045835] page dumped because: kasan: bad access detected
[ 125.046402]
[ 125.046678] Memory state around the buggy address:
[ 125.047273] c4cdc600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 125.047926] c4cdc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.048593] >c4cdc700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 125.049269] ^
[ 125.050396] c4cdc780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.051197] c4cdc800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.052703] ==================================================================
---
[ 124.977649] ==================================================================
[ 124.978355] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x13c/0x3b4
[ 124.979244] Read of size 1 at addr c4cdc778 by task kunit_try_catch/186
[ 124.979877]
[ 124.980185] CPU: 1 PID: 186 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 124.981203] Hardware name: Generic DT based system
[ 124.982535] unwind_backtrace from show_stack+0x18/0x1c
[ 124.983514] show_stack from dump_stack_lvl+0x58/0x70
[ 124.984289] dump_stack_lvl from print_report+0x164/0x51c
[ 124.984961] print_report from kasan_report+0xc8/0x104
[ 124.985644] kasan_report from ksize_unpoisons_memory+0x13c/0x3b4
[ 124.986415] ksize_unpoisons_memory from kunit_try_run_case+0x11c/0x2e4
[ 124.987319] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 124.988292] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 124.989226] kthread from ret_from_fork+0x14/0x30
[ 124.989890] Exception stack(0xfa0cbfb0 to 0xfa0cbff8)
[ 124.990408] bfa0: 00000000 00000000 00000000 00000000
[ 124.991243] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 124.992470] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 124.993226]
[ 124.994010] Allocated by task 186:
[ 124.994349] kasan_set_track+0x3c/0x5c
[ 124.995293] __kasan_kmalloc+0x8c/0x94
[ 124.996036] ksize_unpoisons_memory+0xb4/0x3b4
[ 124.996849] kunit_try_run_case+0x11c/0x2e4
[ 124.997668] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 124.998386] kthread+0x184/0x1a8
[ 124.999192] ret_from_fork+0x14/0x30
[ 125.000209]
[ 125.000533] The buggy address belongs to the object at c4cdc700
[ 125.000533] which belongs to the cache kmalloc-128 of size 128
[ 125.001895] The buggy address is located 5 bytes to the right of
[ 125.001895] allocated 115-byte region [c4cdc700, c4cdc773)
[ 125.003568]
[ 125.003811] The buggy address belongs to the physical page:
[ 125.004523] page:4ad3b9de refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdc
[ 125.005289] flags: 0x800(slab|zone=0)
[ 125.006087] page_type: 0xffffffff()
[ 125.006893] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 125.007735] raw: 00000000
[ 125.008450] page dumped because: kasan: bad access detected
[ 125.009257]
[ 125.009876] Memory state around the buggy address:
[ 125.010923] c4cdc600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 125.011580] c4cdc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.012272] >c4cdc700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 125.013280] ^
[ 125.014066] c4cdc780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.014967] c4cdc800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.015836] ==================================================================
Home
[ 125.412226] ==================================================================
[ 125.413197] BUG: KASAN: slab-out-of-bounds in memcmp+0x30/0xa0
[ 125.413950] Read of size 1 at addr c4cddf18 by task kunit_try_catch/199
[ 125.414637]
[ 125.414942] CPU: 1 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 125.415803] Hardware name: Generic DT based system
[ 125.416340] unwind_backtrace from show_stack+0x18/0x1c
[ 125.417136] show_stack from dump_stack_lvl+0x58/0x70
[ 125.417780] dump_stack_lvl from print_report+0x164/0x51c
[ 125.418571] print_report from kasan_report+0xc8/0x104
[ 125.419182] kasan_report from memcmp+0x30/0xa0
[ 125.420399] memcmp from kasan_memcmp+0x100/0x210
[ 125.421489] kasan_memcmp from kunit_try_run_case+0x11c/0x2e4
[ 125.422456] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.423278] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 125.424553] kthread from ret_from_fork+0x14/0x30
[ 125.425273] Exception stack(0xfa123fb0 to 0xfa123ff8)
[ 125.426104] 3fa0: 00000000 00000000 00000000 00000000
[ 125.426937] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 125.427794] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 125.428400]
[ 125.428706] Allocated by task 199:
[ 125.429233] kasan_set_track+0x3c/0x5c
[ 125.429975] __kasan_kmalloc+0x8c/0x94
[ 125.430968] kasan_memcmp+0xb4/0x210
[ 125.431568] kunit_try_run_case+0x11c/0x2e4
[ 125.432235] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.432976] kthread+0x184/0x1a8
[ 125.433427] ret_from_fork+0x14/0x30
[ 125.434016]
[ 125.434256] The buggy address belongs to the object at c4cddf00
[ 125.434256] which belongs to the cache kmalloc-64 of size 64
[ 125.435553] The buggy address is located 0 bytes to the right of
[ 125.435553] allocated 24-byte region [c4cddf00, c4cddf18)
[ 125.436784]
[ 125.437096] The buggy address belongs to the physical page:
[ 125.437641] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[ 125.438592] flags: 0x800(slab|zone=0)
[ 125.439084] page_type: 0xffffffff()
[ 125.440164] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 125.440887] raw: 00000000
[ 125.441316] page dumped because: kasan: bad access detected
[ 125.441997]
[ 125.442332] Memory state around the buggy address:
[ 125.442875] c4cdde00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 125.443699] c4cdde80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 125.444375] >c4cddf00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.445105] ^
[ 125.445642] c4cddf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.446369] c4cde000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 125.447154] ==================================================================
Home
[ 125.514197] ==================================================================
[ 125.515021] BUG: KASAN: slab-use-after-free in kasan_strings+0x170/0x4ec
[ 125.515966] Read of size 1 at addr c8fc7890 by task kunit_try_catch/201
[ 125.516757]
[ 125.517145] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 125.517918] Hardware name: Generic DT based system
[ 125.518667] unwind_backtrace from show_stack+0x18/0x1c
[ 125.519473] show_stack from dump_stack_lvl+0x58/0x70
[ 125.520596] dump_stack_lvl from print_report+0x164/0x51c
[ 125.521673] print_report from kasan_report+0xc8/0x104
[ 125.522290] kasan_report from kasan_strings+0x170/0x4ec
[ 125.522679] kasan_strings from kunit_try_run_case+0x11c/0x2e4
[ 125.523026] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.523487] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 125.524384] kthread from ret_from_fork+0x14/0x30
[ 125.525170] Exception stack(0xfa12bfb0 to 0xfa12bff8)
[ 125.525948] bfa0: 00000000 00000000 00000000 00000000
[ 125.526880] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 125.527716] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 125.528383]
[ 125.528594] Allocated by task 201:
[ 125.528960] kasan_set_track+0x3c/0x5c
[ 125.529652] __kasan_kmalloc+0x8c/0x94
[ 125.530761] kasan_strings+0xa0/0x4ec
[ 125.531572] kunit_try_run_case+0x11c/0x2e4
[ 125.532130] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.533382] kthread+0x184/0x1a8
[ 125.534108] ret_from_fork+0x14/0x30
[ 125.534908]
[ 125.535418] Freed by task 201:
[ 125.536063] kasan_set_track+0x3c/0x5c
[ 125.536640] kasan_save_free_info+0x30/0x3c
[ 125.537182] __kasan_slab_free+0xdc/0x124
[ 125.537733] __kmem_cache_free+0x140/0x2a8
[ 125.538364] kasan_strings+0xbc/0x4ec
[ 125.538960] kunit_try_run_case+0x11c/0x2e4
[ 125.539676] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.540707] kthread+0x184/0x1a8
[ 125.541600] ret_from_fork+0x14/0x30
[ 125.542342]
[ 125.542664] The buggy address belongs to the object at c8fc7880
[ 125.542664] which belongs to the cache kmalloc-64 of size 64
[ 125.544296] The buggy address is located 16 bytes inside of
[ 125.544296] freed 64-byte region [c8fc7880, c8fc78c0)
[ 125.545588]
[ 125.545872] The buggy address belongs to the physical page:
[ 125.546511] page:c8c1e52b refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fc7
[ 125.547581] flags: 0x800(slab|zone=0)
[ 125.548316] page_type: 0xffffffff()
[ 125.549019] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 125.550102] raw: 00000000
[ 125.550556] page dumped because: kasan: bad access detected
[ 125.551403]
[ 125.551719] Memory state around the buggy address:
[ 125.552319] c8fc7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.552974] c8fc7800: 00 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc
[ 125.553543] >c8fc7880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 125.554878] ^
[ 125.555423] c8fc7900: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.556321] c8fc7980: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 125.557195] ==================================================================
Home
[ 126.215819] ==================================================================
[ 126.216964] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0xd0/0x1cc
[ 126.217919] Read of size 1 at addr c8fcbe00 by task kunit_try_catch/207
[ 126.218893]
[ 126.219294] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 126.221089] Hardware name: Generic DT based system
[ 126.221876] unwind_backtrace from show_stack+0x18/0x1c
[ 126.222776] show_stack from dump_stack_lvl+0x58/0x70
[ 126.223600] dump_stack_lvl from print_report+0x164/0x51c
[ 126.224465] print_report from kasan_report+0xc8/0x104
[ 126.225282] kasan_report from __kasan_check_byte+0x34/0x3c
[ 126.226202] __kasan_check_byte from kfree_sensitive+0x20/0x6c
[ 126.226931] kfree_sensitive from kmalloc_double_kzfree+0xd0/0x1cc
[ 126.227736] kmalloc_double_kzfree from kunit_try_run_case+0x11c/0x2e4
[ 126.228646] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 126.230218] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 126.231119] kthread from ret_from_fork+0x14/0x30
[ 126.231855] Exception stack(0xf9d63fb0 to 0xf9d63ff8)
[ 126.232473] 3fa0: 00000000 00000000 00000000 00000000
[ 126.233406] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 126.234333] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 126.235057]
[ 126.235418] Allocated by task 207:
[ 126.235858] kasan_set_track+0x3c/0x5c
[ 126.236598] __kasan_kmalloc+0x8c/0x94
[ 126.237108] kmalloc_double_kzfree+0xa0/0x1cc
[ 126.237666] kunit_try_run_case+0x11c/0x2e4
[ 126.238176] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 126.238850] kthread+0x184/0x1a8
[ 126.239244] ret_from_fork+0x14/0x30
[ 126.240097]
[ 126.240899] Freed by task 207:
[ 126.241768] kasan_set_track+0x3c/0x5c
[ 126.242656] kasan_save_free_info+0x30/0x3c
[ 126.243424] __kasan_slab_free+0xdc/0x124
[ 126.243996] __kmem_cache_free+0x140/0x2a8
[ 126.244858] kmalloc_double_kzfree+0xbc/0x1cc
[ 126.245705] kunit_try_run_case+0x11c/0x2e4
[ 126.246254] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 126.247288] kthread+0x184/0x1a8
[ 126.247740] ret_from_fork+0x14/0x30
[ 126.248540]
[ 126.249072] The buggy address belongs to the object at c8fcbe00
[ 126.249072] which belongs to the cache kmalloc-64 of size 64
[ 126.250738] The buggy address is located 0 bytes inside of
[ 126.250738] freed 64-byte region [c8fcbe00, c8fcbe40)
[ 126.252073]
[ 126.252682] The buggy address belongs to the physical page:
[ 126.253337] page:69fea40a refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fcb
[ 126.254581] flags: 0x800(slab|zone=0)
[ 126.255323] page_type: 0xffffffff()
[ 126.256011] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 126.257053] raw: 00000000
[ 126.257408] page dumped because: kasan: bad access detected
[ 126.258324]
[ 126.258877] Memory state around the buggy address:
[ 126.259391] c8fcbd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 126.260387] c8fcbd80: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 126.262134] >c8fcbe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 126.262812] ^
[ 126.263460] c8fcbe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 126.264275] c8fcbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 126.265151] ==================================================================
Home
[ 123.878773] ==================================================================
[ 123.879938] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0xd0/0x1d0
[ 123.880650] Read of size 1 at addr c4cdd588 by task kunit_try_catch/158
[ 123.881418]
[ 123.881738] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 123.882506] Hardware name: Generic DT based system
[ 123.883197] unwind_backtrace from show_stack+0x18/0x1c
[ 123.884053] show_stack from dump_stack_lvl+0x58/0x70
[ 123.884855] dump_stack_lvl from print_report+0x164/0x51c
[ 123.885711] print_report from kasan_report+0xc8/0x104
[ 123.886480] kasan_report from kmalloc_uaf+0xd0/0x1d0
[ 123.887329] kmalloc_uaf from kunit_try_run_case+0x11c/0x2e4
[ 123.888069] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.889156] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 123.890034] kthread from ret_from_fork+0x14/0x30
[ 123.890625] Exception stack(0xf9ffbfb0 to 0xf9ffbff8)
[ 123.891216] bfa0: 00000000 00000000 00000000 00000000
[ 123.892025] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 123.892693] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 123.893863]
[ 123.894144] Allocated by task 158:
[ 123.894550] kasan_set_track+0x3c/0x5c
[ 123.895114] __kasan_kmalloc+0x8c/0x94
[ 123.895816] kmalloc_uaf+0xa0/0x1d0
[ 123.896440] kunit_try_run_case+0x11c/0x2e4
[ 123.897145] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.897975] kthread+0x184/0x1a8
[ 123.898486] ret_from_fork+0x14/0x30
[ 123.899144]
[ 123.899826] Freed by task 158:
[ 123.900520] kasan_set_track+0x3c/0x5c
[ 123.901018] kasan_save_free_info+0x30/0x3c
[ 123.901677] __kasan_slab_free+0xdc/0x124
[ 123.902173] __kmem_cache_free+0x140/0x2a8
[ 123.902874] kmalloc_uaf+0xbc/0x1d0
[ 123.903384] kunit_try_run_case+0x11c/0x2e4
[ 123.904066] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.904806] kthread+0x184/0x1a8
[ 123.905364] ret_from_fork+0x14/0x30
[ 123.905839]
[ 123.906179] The buggy address belongs to the object at c4cdd580
[ 123.906179] which belongs to the cache kmalloc-64 of size 64
[ 123.907254] The buggy address is located 8 bytes inside of
[ 123.907254] freed 64-byte region [c4cdd580, c4cdd5c0)
[ 123.908374]
[ 123.908737] The buggy address belongs to the physical page:
[ 123.909345] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[ 123.910534] flags: 0x800(slab|zone=0)
[ 123.911471] page_type: 0xffffffff()
[ 123.912066] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 123.913038] raw: 00000000
[ 123.913368] page dumped because: kasan: bad access detected
[ 123.914064]
[ 123.914395] Memory state around the buggy address:
[ 123.914952] c4cdd480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 123.915772] c4cdd500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 123.916529] >c4cdd580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 123.917283] ^
[ 123.917776] c4cdd600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.918428] c4cdd680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.919154] ==================================================================
Home
[ 123.985987] ==================================================================
[ 123.986991] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x104/0x274
[ 123.987591] Read of size 1 at addr c4cdd6a8 by task kunit_try_catch/162
[ 123.988478]
[ 123.988821] CPU: 1 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 123.989879] Hardware name: Generic DT based system
[ 123.990726] unwind_backtrace from show_stack+0x18/0x1c
[ 123.992705] show_stack from dump_stack_lvl+0x58/0x70
[ 123.993456] dump_stack_lvl from print_report+0x164/0x51c
[ 123.994071] print_report from kasan_report+0xc8/0x104
[ 123.994659] kasan_report from kmalloc_uaf2+0x104/0x274
[ 123.995222] kmalloc_uaf2 from kunit_try_run_case+0x11c/0x2e4
[ 123.995838] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.996911] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 123.997768] kthread from ret_from_fork+0x14/0x30
[ 123.998250] Exception stack(0xfa01bfb0 to 0xfa01bff8)
[ 123.998761] bfa0: 00000000 00000000 00000000 00000000
[ 123.999722] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 124.000672] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 124.001441]
[ 124.001766] Allocated by task 162:
[ 124.002256] kasan_set_track+0x3c/0x5c
[ 124.002916] __kasan_kmalloc+0x8c/0x94
[ 124.003602] kmalloc_uaf2+0xac/0x274
[ 124.004219] kunit_try_run_case+0x11c/0x2e4
[ 124.004907] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 124.005707] kthread+0x184/0x1a8
[ 124.006246] ret_from_fork+0x14/0x30
[ 124.006843]
[ 124.007148] Freed by task 162:
[ 124.007604] kasan_set_track+0x3c/0x5c
[ 124.008246] kasan_save_free_info+0x30/0x3c
[ 124.008901] __kasan_slab_free+0xdc/0x124
[ 124.009540] __kmem_cache_free+0x140/0x2a8
[ 124.010230] kmalloc_uaf2+0xc0/0x274
[ 124.010933] kunit_try_run_case+0x11c/0x2e4
[ 124.011493] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 124.012247] kthread+0x184/0x1a8
[ 124.012784] ret_from_fork+0x14/0x30
[ 124.013268]
[ 124.013654] The buggy address belongs to the object at c4cdd680
[ 124.013654] which belongs to the cache kmalloc-64 of size 64
[ 124.014708] The buggy address is located 40 bytes inside of
[ 124.014708] freed 64-byte region [c4cdd680, c4cdd6c0)
[ 124.015704]
[ 124.016008] The buggy address belongs to the physical page:
[ 124.016498] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[ 124.017343] flags: 0x800(slab|zone=0)
[ 124.017887] page_type: 0xffffffff()
[ 124.018425] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 124.019194] raw: 00000000
[ 124.019578] page dumped because: kasan: bad access detected
[ 124.020244]
[ 124.020529] Memory state around the buggy address:
[ 124.021058] c4cdd580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 124.021787] c4cdd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 124.022453] >c4cdd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 124.023121] ^
[ 124.024105] c4cdd700: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[ 124.025239] c4cdd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 124.025728] ==================================================================
Home
[ 123.985987] ==================================================================
[ 123.986991] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x104/0x274
[ 123.987591] Read of size 1 at addr c4cdd6a8 by task kunit_try_catch/162
[ 123.988478]
[ 123.988821] CPU: 1 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 123.989879] Hardware name: Generic DT based system
[ 123.990726] unwind_backtrace from show_stack+0x18/0x1c
[ 123.992705] show_stack from dump_stack_lvl+0x58/0x70
[ 123.993456] dump_stack_lvl from print_report+0x164/0x51c
[ 123.994071] print_report from kasan_report+0xc8/0x104
[ 123.994659] kasan_report from kmalloc_uaf2+0x104/0x274
[ 123.995222] kmalloc_uaf2 from kunit_try_run_case+0x11c/0x2e4
[ 123.995838] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.996911] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 123.997768] kthread from ret_from_fork+0x14/0x30
[ 123.998250] Exception stack(0xfa01bfb0 to 0xfa01bff8)
[ 123.998761] bfa0: 00000000 00000000 00000000 00000000
[ 123.999722] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 124.000672] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 124.001441]
[ 124.001766] Allocated by task 162:
[ 124.002256] kasan_set_track+0x3c/0x5c
[ 124.002916] __kasan_kmalloc+0x8c/0x94
[ 124.003602] kmalloc_uaf2+0xac/0x274
[ 124.004219] kunit_try_run_case+0x11c/0x2e4
[ 124.004907] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 124.005707] kthread+0x184/0x1a8
[ 124.006246] ret_from_fork+0x14/0x30
[ 124.006843]
[ 124.007148] Freed by task 162:
[ 124.007604] kasan_set_track+0x3c/0x5c
[ 124.008246] kasan_save_free_info+0x30/0x3c
[ 124.008901] __kasan_slab_free+0xdc/0x124
[ 124.009540] __kmem_cache_free+0x140/0x2a8
[ 124.010230] kmalloc_uaf2+0xc0/0x274
[ 124.010933] kunit_try_run_case+0x11c/0x2e4
[ 124.011493] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 124.012247] kthread+0x184/0x1a8
[ 124.012784] ret_from_fork+0x14/0x30
[ 124.013268]
[ 124.013654] The buggy address belongs to the object at c4cdd680
[ 124.013654] which belongs to the cache kmalloc-64 of size 64
[ 124.014708] The buggy address is located 40 bytes inside of
[ 124.014708] freed 64-byte region [c4cdd680, c4cdd6c0)
[ 124.015704]
[ 124.016008] The buggy address belongs to the physical page:
[ 124.016498] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[ 124.017343] flags: 0x800(slab|zone=0)
[ 124.017887] page_type: 0xffffffff()
[ 124.018425] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 124.019194] raw: 00000000
[ 124.019578] page dumped because: kasan: bad access detected
[ 124.020244]
[ 124.020529] Memory state around the buggy address:
[ 124.021058] c4cdd580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 124.021787] c4cdd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 124.022453] >c4cdd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 124.023121] ^
[ 124.024105] c4cdd700: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[ 124.025239] c4cdd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 124.025728] ==================================================================
Home
[ 123.482732] ==================================================================
[ 123.483558] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x100/0x240
[ 123.484912] Read of size 16 at addr c4cdd400 by task kunit_try_catch/142
[ 123.485544]
[ 123.485918] CPU: 1 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 123.486856] Hardware name: Generic DT based system
[ 123.487498] unwind_backtrace from show_stack+0x18/0x1c
[ 123.488203] show_stack from dump_stack_lvl+0x58/0x70
[ 123.488881] dump_stack_lvl from print_report+0x164/0x51c
[ 123.489602] print_report from kasan_report+0xc8/0x104
[ 123.490460] kasan_report from kmalloc_uaf_16+0x100/0x240
[ 123.491225] kmalloc_uaf_16 from kunit_try_run_case+0x11c/0x2e4
[ 123.491821] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.492853] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 123.493689] kthread from ret_from_fork+0x14/0x30
[ 123.494325] Exception stack(0xf9f7bfb0 to 0xf9f7bff8)
[ 123.494958] bfa0: 00000000 00000000 00000000 00000000
[ 123.495774] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 123.496652] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 123.497378]
[ 123.497684] Allocated by task 142:
[ 123.498078] kasan_set_track+0x3c/0x5c
[ 123.498713] __kasan_kmalloc+0x8c/0x94
[ 123.499291] kmalloc_uaf_16+0xc8/0x240
[ 123.500133] kunit_try_run_case+0x11c/0x2e4
[ 123.500599] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.501870] kthread+0x184/0x1a8
[ 123.502375] ret_from_fork+0x14/0x30
[ 123.502840]
[ 123.503062] Freed by task 142:
[ 123.503476] kasan_set_track+0x3c/0x5c
[ 123.505410] kasan_save_free_info+0x30/0x3c
[ 123.506030] __kasan_slab_free+0xdc/0x124
[ 123.506577] __kmem_cache_free+0x140/0x2a8
[ 123.507147] kmalloc_uaf_16+0xe4/0x240
[ 123.507660] kunit_try_run_case+0x11c/0x2e4
[ 123.508249] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.508998] kthread+0x184/0x1a8
[ 123.509510] ret_from_fork+0x14/0x30
[ 123.509950]
[ 123.510238] The buggy address belongs to the object at c4cdd400
[ 123.510238] which belongs to the cache kmalloc-64 of size 64
[ 123.511341] The buggy address is located 0 bytes inside of
[ 123.511341] freed 64-byte region [c4cdd400, c4cdd440)
[ 123.512341]
[ 123.512578] The buggy address belongs to the physical page:
[ 123.513261] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[ 123.514190] flags: 0x800(slab|zone=0)
[ 123.514595] page_type: 0xffffffff()
[ 123.515157] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 123.515848] raw: 00000000
[ 123.516241] page dumped because: kasan: bad access detected
[ 123.516899]
[ 123.517122] Memory state around the buggy address:
[ 123.517733] c4cdd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 123.518495] c4cdd380: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.519200] >c4cdd400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 123.519892] ^
[ 123.521662] c4cdd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.522433] c4cdd500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.523185] ==================================================================
Home
[ 123.482732] ==================================================================
[ 123.483558] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x100/0x240
[ 123.484912] Read of size 16 at addr c4cdd400 by task kunit_try_catch/142
[ 123.485544]
[ 123.485918] CPU: 1 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 123.486856] Hardware name: Generic DT based system
[ 123.487498] unwind_backtrace from show_stack+0x18/0x1c
[ 123.488203] show_stack from dump_stack_lvl+0x58/0x70
[ 123.488881] dump_stack_lvl from print_report+0x164/0x51c
[ 123.489602] print_report from kasan_report+0xc8/0x104
[ 123.490460] kasan_report from kmalloc_uaf_16+0x100/0x240
[ 123.491225] kmalloc_uaf_16 from kunit_try_run_case+0x11c/0x2e4
[ 123.491821] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.492853] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 123.493689] kthread from ret_from_fork+0x14/0x30
[ 123.494325] Exception stack(0xf9f7bfb0 to 0xf9f7bff8)
[ 123.494958] bfa0: 00000000 00000000 00000000 00000000
[ 123.495774] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 123.496652] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 123.497378]
[ 123.497684] Allocated by task 142:
[ 123.498078] kasan_set_track+0x3c/0x5c
[ 123.498713] __kasan_kmalloc+0x8c/0x94
[ 123.499291] kmalloc_uaf_16+0xc8/0x240
[ 123.500133] kunit_try_run_case+0x11c/0x2e4
[ 123.500599] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.501870] kthread+0x184/0x1a8
[ 123.502375] ret_from_fork+0x14/0x30
[ 123.502840]
[ 123.503062] Freed by task 142:
[ 123.503476] kasan_set_track+0x3c/0x5c
[ 123.505410] kasan_save_free_info+0x30/0x3c
[ 123.506030] __kasan_slab_free+0xdc/0x124
[ 123.506577] __kmem_cache_free+0x140/0x2a8
[ 123.507147] kmalloc_uaf_16+0xe4/0x240
[ 123.507660] kunit_try_run_case+0x11c/0x2e4
[ 123.508249] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.508998] kthread+0x184/0x1a8
[ 123.509510] ret_from_fork+0x14/0x30
[ 123.509950]
[ 123.510238] The buggy address belongs to the object at c4cdd400
[ 123.510238] which belongs to the cache kmalloc-64 of size 64
[ 123.511341] The buggy address is located 0 bytes inside of
[ 123.511341] freed 64-byte region [c4cdd400, c4cdd440)
[ 123.512341]
[ 123.512578] The buggy address belongs to the physical page:
[ 123.513261] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[ 123.514190] flags: 0x800(slab|zone=0)
[ 123.514595] page_type: 0xffffffff()
[ 123.515157] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 123.515848] raw: 00000000
[ 123.516241] page dumped because: kasan: bad access detected
[ 123.516899]
[ 123.517122] Memory state around the buggy address:
[ 123.517733] c4cdd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 123.518495] c4cdd380: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.519200] >c4cdd400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 123.519892] ^
[ 123.521662] c4cdd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.522433] c4cdd500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.523185] ==================================================================
Home
[ 123.928380] ==================================================================
[ 123.929282] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0xd8/0x1d4
[ 123.930339] Write of size 33 at addr c4cdd600 by task kunit_try_catch/160
[ 123.930916]
[ 123.931237] CPU: 1 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 123.932961] Hardware name: Generic DT based system
[ 123.933829] unwind_backtrace from show_stack+0x18/0x1c
[ 123.934744] show_stack from dump_stack_lvl+0x58/0x70
[ 123.935698] dump_stack_lvl from print_report+0x164/0x51c
[ 123.936431] print_report from kasan_report+0xc8/0x104
[ 123.937422] kasan_report from kasan_check_range+0x14c/0x198
[ 123.938357] kasan_check_range from __asan_memset+0x20/0x3c
[ 123.939325] __asan_memset from kmalloc_uaf_memset+0xd8/0x1d4
[ 123.940378] kmalloc_uaf_memset from kunit_try_run_case+0x11c/0x2e4
[ 123.941491] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.942248] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 123.943511] kthread from ret_from_fork+0x14/0x30
[ 123.944335] Exception stack(0xfa00bfb0 to 0xfa00bff8)
[ 123.944982] bfa0: 00000000 00000000 00000000 00000000
[ 123.946128] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 123.947163] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 123.947876]
[ 123.948165] Allocated by task 160:
[ 123.948582] kasan_set_track+0x3c/0x5c
[ 123.949665] __kasan_kmalloc+0x8c/0x94
[ 123.950436] kmalloc_uaf_memset+0xa0/0x1d4
[ 123.951245] kunit_try_run_case+0x11c/0x2e4
[ 123.952054] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.952941] kthread+0x184/0x1a8
[ 123.953368] ret_from_fork+0x14/0x30
[ 123.954255]
[ 123.954577] Freed by task 160:
[ 123.955337] kasan_set_track+0x3c/0x5c
[ 123.955899] kasan_save_free_info+0x30/0x3c
[ 123.956760] __kasan_slab_free+0xdc/0x124
[ 123.957542] __kmem_cache_free+0x140/0x2a8
[ 123.958117] kmalloc_uaf_memset+0xbc/0x1d4
[ 123.958967] kunit_try_run_case+0x11c/0x2e4
[ 123.960850] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.961562] kthread+0x184/0x1a8
[ 123.962222] ret_from_fork+0x14/0x30
[ 123.962500]
[ 123.962670] The buggy address belongs to the object at c4cdd600
[ 123.962670] which belongs to the cache kmalloc-64 of size 64
[ 123.964151] The buggy address is located 0 bytes inside of
[ 123.964151] freed 64-byte region [c4cdd600, c4cdd640)
[ 123.965389]
[ 123.965723] The buggy address belongs to the physical page:
[ 123.966328] page:f22c9dfb refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdd
[ 123.967127] flags: 0x800(slab|zone=0)
[ 123.967531] page_type: 0xffffffff()
[ 123.968160] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 123.968979] raw: 00000000
[ 123.969403] page dumped because: kasan: bad access detected
[ 123.969868]
[ 123.970157] Memory state around the buggy address:
[ 123.970820] c4cdd500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 123.971536] c4cdd580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 123.972220] >c4cdd600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 123.972899] ^
[ 123.973390] c4cdd680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.974023] c4cdd700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.974822] ==================================================================
Home
[ 125.344139] ==================================================================
[ 125.345264] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0xd0/0x1cc
[ 125.346202] Read of size 1 at addr c4cde400 by task kunit_try_catch/194
[ 125.346878]
[ 125.347195] CPU: 1 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 125.348044] Hardware name: Generic DT based system
[ 125.348481] unwind_backtrace from show_stack+0x18/0x1c
[ 125.349298] show_stack from dump_stack_lvl+0x58/0x70
[ 125.350495] dump_stack_lvl from print_report+0x164/0x51c
[ 125.351193] print_report from kasan_report+0xc8/0x104
[ 125.351893] kasan_report from __kasan_check_byte+0x34/0x3c
[ 125.352802] __kasan_check_byte from kmem_cache_destroy+0x24/0x150
[ 125.353736] kmem_cache_destroy from kmem_cache_double_destroy+0xd0/0x1cc
[ 125.354755] kmem_cache_double_destroy from kunit_try_run_case+0x11c/0x2e4
[ 125.355700] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.356705] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 125.357635] kthread from ret_from_fork+0x14/0x30
[ 125.358293] Exception stack(0xfa103fb0 to 0xfa103ff8)
[ 125.358856] 3fa0: 00000000 00000000 00000000 00000000
[ 125.360170] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 125.361039] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 125.361752]
[ 125.362045] Allocated by task 194:
[ 125.362538] kasan_set_track+0x3c/0x5c
[ 125.363171] __kasan_slab_alloc+0x60/0x68
[ 125.363922] kmem_cache_alloc+0x1dc/0x574
[ 125.364501] kmem_cache_create_usercopy+0x160/0x2a8
[ 125.365197] kmem_cache_create+0x28/0x30
[ 125.365845] kmem_cache_double_destroy+0xa0/0x1cc
[ 125.366646] kunit_try_run_case+0x11c/0x2e4
[ 125.367401] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.368053] kthread+0x184/0x1a8
[ 125.368627] ret_from_fork+0x14/0x30
[ 125.369163]
[ 125.369494] Freed by task 194:
[ 125.370420] kasan_set_track+0x3c/0x5c
[ 125.371067] kasan_save_free_info+0x30/0x3c
[ 125.371653] __kasan_slab_free+0xdc/0x124
[ 125.372204] kmem_cache_free+0x170/0x41c
[ 125.372846] kobject_put+0xfc/0x320
[ 125.373486] kmem_cache_double_destroy+0xbc/0x1cc
[ 125.374193] kunit_try_run_case+0x11c/0x2e4
[ 125.374747] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.375566] kthread+0x184/0x1a8
[ 125.376079] ret_from_fork+0x14/0x30
[ 125.376685]
[ 125.376975] The buggy address belongs to the object at c4cde400
[ 125.376975] which belongs to the cache kmem_cache of size 132
[ 125.378081] The buggy address is located 0 bytes inside of
[ 125.378081] freed 132-byte region [c4cde400, c4cde484)
[ 125.379268]
[ 125.379686] The buggy address belongs to the physical page:
[ 125.380686] page:6d15f967 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cde
[ 125.381565] flags: 0x800(slab|zone=0)
[ 125.382159] page_type: 0xffffffff()
[ 125.382700] raw: 00000800 c4801000 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 125.383606] raw: 00000000
[ 125.384068] page dumped because: kasan: bad access detected
[ 125.384678]
[ 125.384971] Memory state around the buggy address:
[ 125.385632] c4cde300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 125.386161] c4cde380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.386984] >c4cde400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 125.387704] ^
[ 125.388121] c4cde480: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.388868] c4cde500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.389741] ==================================================================
Home
[ 123.381543] ==================================================================
[ 123.382250] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x11c/0x2b8
[ 123.382961] Read of size 1 at addr c4d42600 by task kunit_try_catch/138
[ 123.383658]
[ 123.383983] CPU: 1 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 123.384817] Hardware name: Generic DT based system
[ 123.385437] unwind_backtrace from show_stack+0x18/0x1c
[ 123.386250] show_stack from dump_stack_lvl+0x58/0x70
[ 123.386945] dump_stack_lvl from print_report+0x164/0x51c
[ 123.387704] print_report from kasan_report+0xc8/0x104
[ 123.388479] kasan_report from krealloc_uaf+0x11c/0x2b8
[ 123.389154] krealloc_uaf from kunit_try_run_case+0x11c/0x2e4
[ 123.390042] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.391135] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 123.392708] kthread from ret_from_fork+0x14/0x30
[ 123.393115] Exception stack(0xf9f5bfb0 to 0xf9f5bff8)
[ 123.393427] bfa0: 00000000 00000000 00000000 00000000
[ 123.394152] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 123.395789] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 123.396677]
[ 123.396950] Allocated by task 138:
[ 123.397324] kasan_set_track+0x3c/0x5c
[ 123.397968] __kasan_kmalloc+0x8c/0x94
[ 123.398587] krealloc_uaf+0xac/0x2b8
[ 123.399065] kunit_try_run_case+0x11c/0x2e4
[ 123.399743] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.400441] kthread+0x184/0x1a8
[ 123.401005] ret_from_fork+0x14/0x30
[ 123.401551]
[ 123.401879] Freed by task 138:
[ 123.402297] kasan_set_track+0x3c/0x5c
[ 123.402805] kasan_save_free_info+0x30/0x3c
[ 123.403493] __kasan_slab_free+0xdc/0x124
[ 123.404158] __kmem_cache_free+0x140/0x2a8
[ 123.404778] krealloc_uaf+0xc8/0x2b8
[ 123.405355] kunit_try_run_case+0x11c/0x2e4
[ 123.405998] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.406792] kthread+0x184/0x1a8
[ 123.407331] ret_from_fork+0x14/0x30
[ 123.407803]
[ 123.408112] The buggy address belongs to the object at c4d42600
[ 123.408112] which belongs to the cache kmalloc-256 of size 256
[ 123.409254] The buggy address is located 0 bytes inside of
[ 123.409254] freed 256-byte region [c4d42600, c4d42700)
[ 123.410271]
[ 123.410537] The buggy address belongs to the physical page:
[ 123.411233] page:c6df89a3 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d42
[ 123.413743] head:c6df89a3 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 123.414470] flags: 0x840(slab|head|zone=0)
[ 123.414943] page_type: 0xffffffff()
[ 123.415519] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 123.416332] raw: 00000000
[ 123.416709] page dumped because: kasan: bad access detected
[ 123.417371]
[ 123.417694] Memory state around the buggy address:
[ 123.418276] c4d42500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.419096] c4d42580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.419749] >c4d42600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 123.420422] ^
[ 123.420849] c4d42680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 123.421571] c4d42700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.422352] ==================================================================
Home
[ 123.333539] ==================================================================
[ 123.334665] BUG: KASAN: slab-use-after-free in krealloc_uaf+0xe4/0x2b8
[ 123.335414] Read of size 1 at addr c4d42600 by task kunit_try_catch/138
[ 123.335959]
[ 123.336287] CPU: 1 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 123.337212] Hardware name: Generic DT based system
[ 123.338080] unwind_backtrace from show_stack+0x18/0x1c
[ 123.338735] show_stack from dump_stack_lvl+0x58/0x70
[ 123.339520] dump_stack_lvl from print_report+0x164/0x51c
[ 123.340464] print_report from kasan_report+0xc8/0x104
[ 123.341374] kasan_report from __kasan_check_byte+0x34/0x3c
[ 123.342357] __kasan_check_byte from krealloc+0x30/0x134
[ 123.343029] krealloc from krealloc_uaf+0xe4/0x2b8
[ 123.343938] krealloc_uaf from kunit_try_run_case+0x11c/0x2e4
[ 123.344895] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.345970] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 123.346926] kthread from ret_from_fork+0x14/0x30
[ 123.347559] Exception stack(0xf9f5bfb0 to 0xf9f5bff8)
[ 123.348118] bfa0: 00000000 00000000 00000000 00000000
[ 123.349028] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 123.350029] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 123.351163]
[ 123.351472] Allocated by task 138:
[ 123.352102] kasan_set_track+0x3c/0x5c
[ 123.352758] __kasan_kmalloc+0x8c/0x94
[ 123.353446] krealloc_uaf+0xac/0x2b8
[ 123.354043] kunit_try_run_case+0x11c/0x2e4
[ 123.354600] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.355389] kthread+0x184/0x1a8
[ 123.355903] ret_from_fork+0x14/0x30
[ 123.356349]
[ 123.356692] Freed by task 138:
[ 123.357158] kasan_set_track+0x3c/0x5c
[ 123.357794] kasan_save_free_info+0x30/0x3c
[ 123.358510] __kasan_slab_free+0xdc/0x124
[ 123.359187] __kmem_cache_free+0x140/0x2a8
[ 123.359887] krealloc_uaf+0xc8/0x2b8
[ 123.360450] kunit_try_run_case+0x11c/0x2e4
[ 123.361094] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 123.361920] kthread+0x184/0x1a8
[ 123.362502] ret_from_fork+0x14/0x30
[ 123.363108]
[ 123.363493] The buggy address belongs to the object at c4d42600
[ 123.363493] which belongs to the cache kmalloc-256 of size 256
[ 123.364762] The buggy address is located 0 bytes inside of
[ 123.364762] freed 256-byte region [c4d42600, c4d42700)
[ 123.365810]
[ 123.366172] The buggy address belongs to the physical page:
[ 123.366798] page:c6df89a3 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44d42
[ 123.367585] head:c6df89a3 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 123.368404] flags: 0x840(slab|head|zone=0)
[ 123.369037] page_type: 0xffffffff()
[ 123.369872] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 123.371458] raw: 00000000
[ 123.371889] page dumped because: kasan: bad access detected
[ 123.372771]
[ 123.373075] Memory state around the buggy address:
[ 123.373682] c4d42500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.374375] c4d42580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.375198] >c4d42600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 123.376398] ^
[ 123.376819] c4d42680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 123.377493] c4d42700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 123.378177] ==================================================================
Home
[ 125.061998] ==================================================================
[ 125.062840] BUG: KASAN: slab-use-after-free in ksize_uaf+0xd0/0x308
[ 125.063576] Read of size 1 at addr c4cdc800 by task kunit_try_catch/188
[ 125.065148]
[ 125.065433] CPU: 1 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 125.066259] Hardware name: Generic DT based system
[ 125.067214] unwind_backtrace from show_stack+0x18/0x1c
[ 125.068133] show_stack from dump_stack_lvl+0x58/0x70
[ 125.069001] dump_stack_lvl from print_report+0x164/0x51c
[ 125.069964] print_report from kasan_report+0xc8/0x104
[ 125.070668] kasan_report from __kasan_check_byte+0x34/0x3c
[ 125.071435] __kasan_check_byte from ksize+0x20/0x3c
[ 125.072405] ksize from ksize_uaf+0xd0/0x308
[ 125.072913] ksize_uaf from kunit_try_run_case+0x11c/0x2e4
[ 125.073692] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.075137] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 125.075886] kthread from ret_from_fork+0x14/0x30
[ 125.076474] Exception stack(0xfa0dbfb0 to 0xfa0dbff8)
[ 125.077368] bfa0: 00000000 00000000 00000000 00000000
[ 125.078416] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 125.079429] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 125.080138]
[ 125.080390] Allocated by task 188:
[ 125.080802] kasan_set_track+0x3c/0x5c
[ 125.081333] __kasan_kmalloc+0x8c/0x94
[ 125.082414] ksize_uaf+0xa0/0x308
[ 125.083117] kunit_try_run_case+0x11c/0x2e4
[ 125.083934] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.084804] kthread+0x184/0x1a8
[ 125.085490] ret_from_fork+0x14/0x30
[ 125.086177]
[ 125.086722] Freed by task 188:
[ 125.087175] kasan_set_track+0x3c/0x5c
[ 125.087736] kasan_save_free_info+0x30/0x3c
[ 125.088636] __kasan_slab_free+0xdc/0x124
[ 125.089426] __kmem_cache_free+0x140/0x2a8
[ 125.090228] ksize_uaf+0xbc/0x308
[ 125.090977] kunit_try_run_case+0x11c/0x2e4
[ 125.091780] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.092660] kthread+0x184/0x1a8
[ 125.093350] ret_from_fork+0x14/0x30
[ 125.094011]
[ 125.094351] The buggy address belongs to the object at c4cdc800
[ 125.094351] which belongs to the cache kmalloc-128 of size 128
[ 125.095554] The buggy address is located 0 bytes inside of
[ 125.095554] freed 128-byte region [c4cdc800, c4cdc880)
[ 125.096814]
[ 125.097120] The buggy address belongs to the physical page:
[ 125.097701] page:4ad3b9de refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdc
[ 125.098468] flags: 0x800(slab|zone=0)
[ 125.099498] page_type: 0xffffffff()
[ 125.100213] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 125.101250] raw: 00000000
[ 125.101883] page dumped because: kasan: bad access detected
[ 125.102686]
[ 125.103202] Memory state around the buggy address:
[ 125.103969] c4cdc700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 125.104835] c4cdc780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.105489] >c4cdc800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 125.106200] ^
[ 125.106602] c4cdc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.107738] c4cdc900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.108597] ==================================================================
Home
[ 125.157915] ==================================================================
[ 125.158772] BUG: KASAN: slab-use-after-free in ksize_uaf+0x12c/0x308
[ 125.159508] Read of size 1 at addr c4cdc878 by task kunit_try_catch/188
[ 125.160479]
[ 125.161485] CPU: 1 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 125.163155] Hardware name: Generic DT based system
[ 125.163909] unwind_backtrace from show_stack+0x18/0x1c
[ 125.164632] show_stack from dump_stack_lvl+0x58/0x70
[ 125.165309] dump_stack_lvl from print_report+0x164/0x51c
[ 125.166286] print_report from kasan_report+0xc8/0x104
[ 125.167141] kasan_report from ksize_uaf+0x12c/0x308
[ 125.167978] ksize_uaf from kunit_try_run_case+0x11c/0x2e4
[ 125.168792] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.169788] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 125.170689] kthread from ret_from_fork+0x14/0x30
[ 125.171355] Exception stack(0xfa0dbfb0 to 0xfa0dbff8)
[ 125.171950] bfa0: 00000000 00000000 00000000 00000000
[ 125.172856] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 125.173695] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 125.174466]
[ 125.174787] Allocated by task 188:
[ 125.175207] kasan_set_track+0x3c/0x5c
[ 125.175891] __kasan_kmalloc+0x8c/0x94
[ 125.176384] ksize_uaf+0xa0/0x308
[ 125.176985] kunit_try_run_case+0x11c/0x2e4
[ 125.177553] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.178387] kthread+0x184/0x1a8
[ 125.178932] ret_from_fork+0x14/0x30
[ 125.179476]
[ 125.179828] Freed by task 188:
[ 125.180304] kasan_set_track+0x3c/0x5c
[ 125.180896] kasan_save_free_info+0x30/0x3c
[ 125.181381] __kasan_slab_free+0xdc/0x124
[ 125.182065] __kmem_cache_free+0x140/0x2a8
[ 125.182644] ksize_uaf+0xbc/0x308
[ 125.183237] kunit_try_run_case+0x11c/0x2e4
[ 125.183827] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.184776] kthread+0x184/0x1a8
[ 125.185545] ret_from_fork+0x14/0x30
[ 125.186261]
[ 125.186803] The buggy address belongs to the object at c4cdc800
[ 125.186803] which belongs to the cache kmalloc-128 of size 128
[ 125.188528] The buggy address is located 120 bytes inside of
[ 125.188528] freed 128-byte region [c4cdc800, c4cdc880)
[ 125.189637]
[ 125.189914] The buggy address belongs to the physical page:
[ 125.190565] page:4ad3b9de refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdc
[ 125.191385] flags: 0x800(slab|zone=0)
[ 125.191847] page_type: 0xffffffff()
[ 125.192268] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 125.193258] raw: 00000000
[ 125.193695] page dumped because: kasan: bad access detected
[ 125.194373]
[ 125.194691] Memory state around the buggy address:
[ 125.195247] c4cdc700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 125.195902] c4cdc780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.196755] >c4cdc800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 125.197415] ^
[ 125.198218] c4cdc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.198867] c4cdc900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.199559] ==================================================================
Home
[ 125.112853] ==================================================================
[ 125.113505] BUG: KASAN: slab-use-after-free in ksize_uaf+0xfc/0x308
[ 125.114456] Read of size 1 at addr c4cdc800 by task kunit_try_catch/188
[ 125.115552]
[ 125.115879] CPU: 1 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 125.117120] Hardware name: Generic DT based system
[ 125.117790] unwind_backtrace from show_stack+0x18/0x1c
[ 125.118693] show_stack from dump_stack_lvl+0x58/0x70
[ 125.119630] dump_stack_lvl from print_report+0x164/0x51c
[ 125.120582] print_report from kasan_report+0xc8/0x104
[ 125.121488] kasan_report from ksize_uaf+0xfc/0x308
[ 125.122393] ksize_uaf from kunit_try_run_case+0x11c/0x2e4
[ 125.123344] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.124440] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 125.125464] kthread from ret_from_fork+0x14/0x30
[ 125.126117] Exception stack(0xfa0dbfb0 to 0xfa0dbff8)
[ 125.126740] bfa0: 00000000 00000000 00000000 00000000
[ 125.127563] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 125.128940] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 125.129786]
[ 125.130272] Allocated by task 188:
[ 125.130898] kasan_set_track+0x3c/0x5c
[ 125.131686] __kasan_kmalloc+0x8c/0x94
[ 125.132438] ksize_uaf+0xa0/0x308
[ 125.133180] kunit_try_run_case+0x11c/0x2e4
[ 125.133766] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.134400] kthread+0x184/0x1a8
[ 125.135293] ret_from_fork+0x14/0x30
[ 125.136044]
[ 125.136733] Freed by task 188:
[ 125.137113] kasan_set_track+0x3c/0x5c
[ 125.137884] kasan_save_free_info+0x30/0x3c
[ 125.138688] __kasan_slab_free+0xdc/0x124
[ 125.139208] __kmem_cache_free+0x140/0x2a8
[ 125.140017] ksize_uaf+0xbc/0x308
[ 125.140638] kunit_try_run_case+0x11c/0x2e4
[ 125.141243] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.142013] kthread+0x184/0x1a8
[ 125.142458] ret_from_fork+0x14/0x30
[ 125.143050]
[ 125.143336] The buggy address belongs to the object at c4cdc800
[ 125.143336] which belongs to the cache kmalloc-128 of size 128
[ 125.144518] The buggy address is located 0 bytes inside of
[ 125.144518] freed 128-byte region [c4cdc800, c4cdc880)
[ 125.145446]
[ 125.145807] The buggy address belongs to the physical page:
[ 125.146502] page:4ad3b9de refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44cdc
[ 125.147355] flags: 0x800(slab|zone=0)
[ 125.147948] page_type: 0xffffffff()
[ 125.148591] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[ 125.149347] raw: 00000000
[ 125.149762] page dumped because: kasan: bad access detected
[ 125.150408]
[ 125.150672] Memory state around the buggy address:
[ 125.151246] c4cdc700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 125.152049] c4cdc780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.152842] >c4cdc800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 125.153518] ^
[ 125.153985] c4cdc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.154672] c4cdc900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.155289] ==================================================================
Home
[ 126.380189] ==================================================================
[ 126.381176] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x24/0x2c
[ 126.382065] Read of size 4 at addr c8fcf080 by task swapper/0/0
[ 126.382629]
[ 126.382935] CPU: 0 PID: 0 Comm: swapper/0 Tainted: G B N 6.6.74-rc1 #1
[ 126.384178] Hardware name: Generic DT based system
[ 126.384830] unwind_backtrace from show_stack+0x18/0x1c
[ 126.385679] show_stack from dump_stack_lvl+0x58/0x70
[ 126.386536] dump_stack_lvl from print_report+0x164/0x51c
[ 126.387428] print_report from kasan_report+0xc8/0x104
[ 126.388329] kasan_report from rcu_uaf_reclaim+0x24/0x2c
[ 126.389199] rcu_uaf_reclaim from rcu_core+0x418/0xc84
[ 126.389930] rcu_core from handle_softirqs+0x23c/0x5fc
[ 126.390565] handle_softirqs from irq_exit+0xec/0x138
[ 126.391244] irq_exit from __irq_svc+0x78/0x9c
[ 126.391768] Exception stack(0xc3603ec0 to 0xc3603f08)
[ 126.392461] 3ec0: e7b62fd0 00000000 e7b62fd0 00000000 c3614a00 c360bf60 00000000 c360bfbc
[ 126.393420] 3ee0: b76c07e4 00000000 00000000 c3603f80 00000000 c3603f10 c04dc054 c04d3684
[ 126.394148] 3f00: 60000013 ffffffff
[ 126.394655] __irq_svc from arch_local_irq_enable+0x4/0x8
[ 126.395326] arch_local_irq_enable from do_idle+0x2d8/0x380
[ 126.395948] do_idle from cpu_startup_entry+0x38/0x3c
[ 126.396679] cpu_startup_entry from rest_init+0xdc/0xe0
[ 126.397500] rest_init from arch_post_acpi_subsys_init+0x0/0x18
[ 126.398329]
[ 126.398578] Allocated by task 209:
[ 126.399060] kasan_set_track+0x3c/0x5c
[ 126.399656] __kasan_kmalloc+0x8c/0x94
[ 126.400595] rcu_uaf+0xa0/0x1dc
[ 126.401230] kunit_try_run_case+0x11c/0x2e4
[ 126.402196] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 126.402939] kthread+0x184/0x1a8
[ 126.403347] ret_from_fork+0x14/0x30
[ 126.404032]
[ 126.404265] Freed by task 0:
[ 126.404695] kasan_set_track+0x3c/0x5c
[ 126.405445] kasan_save_free_info+0x30/0x3c
[ 126.406060] __kasan_slab_free+0xdc/0x124
[ 126.406763] __kmem_cache_free+0x140/0x2a8
[ 126.407365] rcu_uaf_reclaim+0x1c/0x2c
[ 126.407947] rcu_core+0x418/0xc84
[ 126.408566] handle_softirqs+0x23c/0x5fc
[ 126.409245] irq_exit+0xec/0x138
[ 126.409859] __irq_svc+0x78/0x9c
[ 126.410433] arch_local_irq_enable+0x4/0x8
[ 126.410987] do_idle+0x2d8/0x380
[ 126.411497] cpu_startup_entry+0x38/0x3c
[ 126.412128] rest_init+0xdc/0xe0
[ 126.412522] arch_post_acpi_subsys_init+0x0/0x18
[ 126.413245]
[ 126.413668] Last potentially related work creation:
[ 126.414268] kasan_save_stack+0x30/0x4c
[ 126.414946] __kasan_record_aux_stack+0x84/0x8c
[ 126.415501] __call_rcu_common.constprop.0+0x44/0x59c
[ 126.416243] rcu_uaf+0xdc/0x1dc
[ 126.416798] kunit_try_run_case+0x11c/0x2e4
[ 126.417377] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 126.418254] kthread+0x184/0x1a8
[ 126.418841] ret_from_fork+0x14/0x30
[ 126.419391]
[ 126.419753] The buggy address belongs to the object at c8fcf080
[ 126.419753] which belongs to the cache kmalloc-64 of size 64
[ 126.421250] The buggy address is located 0 bytes inside of
[ 126.421250] freed 64-byte region [c8fcf080, c8fcf0c0)
[ 126.423109]
[ 126.423408] The buggy address belongs to the physical page:
[ 126.423980] page:6cc93337 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fcf
[ 126.424936] flags: 0x800(slab|zone=0)
[ 126.425400] page_type: 0xffffffff()
[ 126.426008] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 126.426828] raw: 00000000
[ 126.427261] page dumped because: kasan: bad access detected
[ 126.427848]
[ 126.428139] Memory state around the buggy address:
[ 126.428808] c8fcef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 126.429190] c8fcf000: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 126.429489] >c8fcf080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 126.430117] ^
[ 126.430863] c8fcf100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 126.431747] c8fcf180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 126.432579] ==================================================================
Home
[ 125.465477] ==================================================================
[ 125.467227] BUG: KASAN: slab-use-after-free in strcmp+0x20/0x54
[ 125.467936] Read of size 1 at addr c8fc7890 by task kunit_try_catch/201
[ 125.468557]
[ 125.468930] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 125.469830] Hardware name: Generic DT based system
[ 125.470741] unwind_backtrace from show_stack+0x18/0x1c
[ 125.471901] show_stack from dump_stack_lvl+0x58/0x70
[ 125.473118] dump_stack_lvl from print_report+0x164/0x51c
[ 125.474401] print_report from kasan_report+0xc8/0x104
[ 125.475214] kasan_report from strcmp+0x20/0x54
[ 125.475834] strcmp from kasan_strings+0x140/0x4ec
[ 125.476449] kasan_strings from kunit_try_run_case+0x11c/0x2e4
[ 125.477141] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.478106] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 125.478962] kthread from ret_from_fork+0x14/0x30
[ 125.480651] Exception stack(0xfa12bfb0 to 0xfa12bff8)
[ 125.481460] bfa0: 00000000 00000000 00000000 00000000
[ 125.482521] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 125.483537] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 125.484516]
[ 125.484902] Allocated by task 201:
[ 125.485448] kasan_set_track+0x3c/0x5c
[ 125.486042] __kasan_kmalloc+0x8c/0x94
[ 125.486703] kasan_strings+0xa0/0x4ec
[ 125.487238] kunit_try_run_case+0x11c/0x2e4
[ 125.487570] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.488194] kthread+0x184/0x1a8
[ 125.488799] ret_from_fork+0x14/0x30
[ 125.489235]
[ 125.489423] Freed by task 201:
[ 125.489750] kasan_set_track+0x3c/0x5c
[ 125.490136] kasan_save_free_info+0x30/0x3c
[ 125.490540] __kasan_slab_free+0xdc/0x124
[ 125.491672] __kmem_cache_free+0x140/0x2a8
[ 125.493002] kasan_strings+0xbc/0x4ec
[ 125.493555] kunit_try_run_case+0x11c/0x2e4
[ 125.494038] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.494812] kthread+0x184/0x1a8
[ 125.495284] ret_from_fork+0x14/0x30
[ 125.495906]
[ 125.496342] The buggy address belongs to the object at c8fc7880
[ 125.496342] which belongs to the cache kmalloc-64 of size 64
[ 125.497562] The buggy address is located 16 bytes inside of
[ 125.497562] freed 64-byte region [c8fc7880, c8fc78c0)
[ 125.498780]
[ 125.499015] The buggy address belongs to the physical page:
[ 125.500474] page:c8c1e52b refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fc7
[ 125.502350] flags: 0x800(slab|zone=0)
[ 125.502811] page_type: 0xffffffff()
[ 125.503274] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 125.504275] raw: 00000000
[ 125.504537] page dumped because: kasan: bad access detected
[ 125.505780]
[ 125.505983] Memory state around the buggy address:
[ 125.506680] c8fc7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.507478] c8fc7800: 00 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc
[ 125.508354] >c8fc7880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 125.509090] ^
[ 125.509649] c8fc7900: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.511543] c8fc7980: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 125.512189] ==================================================================
Home
[ 125.558579] ==================================================================
[ 125.560362] BUG: KASAN: slab-use-after-free in strlen+0xc/0x44
[ 125.561082] Read of size 1 at addr c8fc7890 by task kunit_try_catch/201
[ 125.561784]
[ 125.562017] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 125.564277] Hardware name: Generic DT based system
[ 125.565121] unwind_backtrace from show_stack+0x18/0x1c
[ 125.566044] show_stack from dump_stack_lvl+0x58/0x70
[ 125.566948] dump_stack_lvl from print_report+0x164/0x51c
[ 125.567862] print_report from kasan_report+0xc8/0x104
[ 125.568641] kasan_report from strlen+0xc/0x44
[ 125.569304] strlen from kasan_strings+0x1a8/0x4ec
[ 125.570263] kasan_strings from kunit_try_run_case+0x11c/0x2e4
[ 125.571216] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.572142] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 125.573265] kthread from ret_from_fork+0x14/0x30
[ 125.574122] Exception stack(0xfa12bfb0 to 0xfa12bff8)
[ 125.574911] bfa0: 00000000 00000000 00000000 00000000
[ 125.575970] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 125.576948] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 125.577638]
[ 125.577907] Allocated by task 201:
[ 125.578313] kasan_set_track+0x3c/0x5c
[ 125.579296] __kasan_kmalloc+0x8c/0x94
[ 125.580123] kasan_strings+0xa0/0x4ec
[ 125.581089] kunit_try_run_case+0x11c/0x2e4
[ 125.581868] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.582760] kthread+0x184/0x1a8
[ 125.583431] ret_from_fork+0x14/0x30
[ 125.584143]
[ 125.584432] Freed by task 201:
[ 125.585225] kasan_set_track+0x3c/0x5c
[ 125.586005] kasan_save_free_info+0x30/0x3c
[ 125.586782] __kasan_slab_free+0xdc/0x124
[ 125.587378] __kmem_cache_free+0x140/0x2a8
[ 125.587897] kasan_strings+0xbc/0x4ec
[ 125.588341] kunit_try_run_case+0x11c/0x2e4
[ 125.589430] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.590315] kthread+0x184/0x1a8
[ 125.591709] ret_from_fork+0x14/0x30
[ 125.592412]
[ 125.592720] The buggy address belongs to the object at c8fc7880
[ 125.592720] which belongs to the cache kmalloc-64 of size 64
[ 125.594160] The buggy address is located 16 bytes inside of
[ 125.594160] freed 64-byte region [c8fc7880, c8fc78c0)
[ 125.595803]
[ 125.596101] The buggy address belongs to the physical page:
[ 125.596683] page:c8c1e52b refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fc7
[ 125.597466] flags: 0x800(slab|zone=0)
[ 125.597922] page_type: 0xffffffff()
[ 125.598340] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 125.599314] raw: 00000000
[ 125.599802] page dumped because: kasan: bad access detected
[ 125.601212]
[ 125.601483] Memory state around the buggy address:
[ 125.601987] c8fc7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.602561] c8fc7800: 00 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc
[ 125.603371] >c8fc7880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 125.604142] ^
[ 125.604839] c8fc7900: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.605711] c8fc7980: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 125.606375] ==================================================================
Home
[ 125.607943] ==================================================================
[ 125.609094] BUG: KASAN: slab-use-after-free in strnlen+0x30/0x58
[ 125.609412] Read of size 1 at addr c8fc7890 by task kunit_try_catch/201
[ 125.611215]
[ 125.611509] CPU: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 125.612502] Hardware name: Generic DT based system
[ 125.613200] unwind_backtrace from show_stack+0x18/0x1c
[ 125.614046] show_stack from dump_stack_lvl+0x58/0x70
[ 125.614910] dump_stack_lvl from print_report+0x164/0x51c
[ 125.615716] print_report from kasan_report+0xc8/0x104
[ 125.616568] kasan_report from strnlen+0x30/0x58
[ 125.617372] strnlen from kasan_strings+0x1dc/0x4ec
[ 125.618077] kasan_strings from kunit_try_run_case+0x11c/0x2e4
[ 125.618905] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.619929] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 125.621182] kthread from ret_from_fork+0x14/0x30
[ 125.621898] Exception stack(0xfa12bfb0 to 0xfa12bff8)
[ 125.622488] bfa0: 00000000 00000000 00000000 00000000
[ 125.623336] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 125.624523] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 125.625463]
[ 125.625752] Allocated by task 201:
[ 125.626121] kasan_set_track+0x3c/0x5c
[ 125.626751] __kasan_kmalloc+0x8c/0x94
[ 125.627260] kasan_strings+0xa0/0x4ec
[ 125.627824] kunit_try_run_case+0x11c/0x2e4
[ 125.628393] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.629112] kthread+0x184/0x1a8
[ 125.629557] ret_from_fork+0x14/0x30
[ 125.630996]
[ 125.631272] Freed by task 201:
[ 125.632147] kasan_set_track+0x3c/0x5c
[ 125.632511] kasan_save_free_info+0x30/0x3c
[ 125.633264] __kasan_slab_free+0xdc/0x124
[ 125.633978] __kmem_cache_free+0x140/0x2a8
[ 125.634816] kasan_strings+0xbc/0x4ec
[ 125.635066] kunit_try_run_case+0x11c/0x2e4
[ 125.635319] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 125.635631] kthread+0x184/0x1a8
[ 125.635838] ret_from_fork+0x14/0x30
[ 125.636045]
[ 125.636160] The buggy address belongs to the object at c8fc7880
[ 125.636160] which belongs to the cache kmalloc-64 of size 64
[ 125.636656] The buggy address is located 16 bytes inside of
[ 125.636656] freed 64-byte region [c8fc7880, c8fc78c0)
[ 125.637394]
[ 125.637656] The buggy address belongs to the physical page:
[ 125.639032] page:c8c1e52b refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fc7
[ 125.640009] flags: 0x800(slab|zone=0)
[ 125.640556] page_type: 0xffffffff()
[ 125.641983] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[ 125.643210] raw: 00000000
[ 125.643757] page dumped because: kasan: bad access detected
[ 125.644546]
[ 125.644798] Memory state around the buggy address:
[ 125.645746] c8fc7780: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.646713] c8fc7800: 00 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc
[ 125.647397] >c8fc7880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 125.648195] ^
[ 125.648633] c8fc7900: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 125.649520] c8fc7980: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[ 125.651207] ==================================================================
Home
[ 126.445963] ==================================================================
[ 126.447045] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x14c/0x264
[ 126.448071] Read of size 4 at addr c8fcf400 by task kunit_try_catch/211
[ 126.448889]
[ 126.449137] CPU: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 126.450705] Hardware name: Generic DT based system
[ 126.451324] unwind_backtrace from show_stack+0x18/0x1c
[ 126.452141] show_stack from dump_stack_lvl+0x58/0x70
[ 126.452991] dump_stack_lvl from print_report+0x164/0x51c
[ 126.453884] print_report from kasan_report+0xc8/0x104
[ 126.454693] kasan_report from workqueue_uaf+0x14c/0x264
[ 126.455531] workqueue_uaf from kunit_try_run_case+0x11c/0x2e4
[ 126.456374] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 126.457387] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 126.458284] kthread from ret_from_fork+0x14/0x30
[ 126.459036] Exception stack(0xfa14bfb0 to 0xfa14bff8)
[ 126.459696] bfa0: 00000000 00000000 00000000 00000000
[ 126.460945] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 126.461731] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 126.462454]
[ 126.462811] Allocated by task 211:
[ 126.463587] kasan_set_track+0x3c/0x5c
[ 126.464214] __kasan_kmalloc+0x8c/0x94
[ 126.464952] workqueue_uaf+0xcc/0x264
[ 126.465458] kunit_try_run_case+0x11c/0x2e4
[ 126.466152] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 126.466796] kthread+0x184/0x1a8
[ 126.467346] ret_from_fork+0x14/0x30
[ 126.467926]
[ 126.468191] Freed by task 8:
[ 126.468678] kasan_set_track+0x3c/0x5c
[ 126.469230] kasan_save_free_info+0x30/0x3c
[ 126.469904] __kasan_slab_free+0xdc/0x124
[ 126.470376] __kmem_cache_free+0x140/0x2a8
[ 126.471473] process_one_work+0x2e4/0x678
[ 126.471884] worker_thread+0x4d8/0x828
[ 126.472448] kthread+0x184/0x1a8
[ 126.473101] ret_from_fork+0x14/0x30
[ 126.473700]
[ 126.473965] Last potentially related work creation:
[ 126.474434] kasan_save_stack+0x30/0x4c
[ 126.475048] __kasan_record_aux_stack+0x84/0x8c
[ 126.475649] __queue_work+0x2a8/0x9b8
[ 126.476208] queue_work_on+0x98/0x9c
[ 126.476739] workqueue_uaf+0x128/0x264
[ 126.477324] kunit_try_run_case+0x11c/0x2e4
[ 126.477959] kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 126.478573] kthread+0x184/0x1a8
[ 126.479115] ret_from_fork+0x14/0x30
[ 126.480138]
[ 126.480420] The buggy address belongs to the object at c8fcf400
[ 126.480420] which belongs to the cache kmalloc-64 of size 64
[ 126.481393] The buggy address is located 0 bytes inside of
[ 126.481393] freed 64-byte region [c8fcf400, c8fcf440)
[ 126.482519]
[ 126.482819] The buggy address belongs to the physical page:
[ 126.483538] page:6cc93337 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fcf
[ 126.484385] flags: 0x800(slab|zone=0)
[ 126.484908] page_type: 0xffffffff()
[ 126.485469] raw: 00000800 c4801200 00000122 00000000 00000000 80200020 ffffffff 00000001
[ 126.486262] raw: 00000000
[ 126.486689] page dumped because: kasan: bad access detected
[ 126.487216]
[ 126.487509] Memory state around the buggy address:
[ 126.488065] c8fcf300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 126.488769] c8fcf380: 00 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc
[ 126.489915] >c8fcf400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 126.490640] ^
[ 126.490961] c8fcf480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 126.491764] c8fcf500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 126.492497] ==================================================================
Home
[ 124.799348] ==================================================================
[ 124.800697] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0xc0/0x174
[ 124.801474] Read of size 1 at addr fa09be0a by task kunit_try_catch/180
[ 124.802017]
[ 124.802357] CPU: 1 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 124.803522] Hardware name: Generic DT based system
[ 124.804228] unwind_backtrace from show_stack+0x18/0x1c
[ 124.804942] show_stack from dump_stack_lvl+0x58/0x70
[ 124.805518] dump_stack_lvl from print_report+0x164/0x51c
[ 124.806194] print_report from kasan_report+0xc8/0x104
[ 124.806983] kasan_report from kasan_stack_oob+0xc0/0x174
[ 124.807718] kasan_stack_oob from kunit_try_run_case+0x11c/0x2e4
[ 124.808581] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 124.809969] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 124.810764] kthread from ret_from_fork+0x14/0x30
[ 124.811342] Exception stack(0xfa09bfb0 to 0xfa09bff8)
[ 124.812003] bfa0: 00000000 00000000 00000000 00000000
[ 124.812814] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 124.813685] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 124.814437]
[ 124.814900] The buggy address belongs to stack of task kunit_try_catch/180
[ 124.815770] and is located at offset 106 in frame:
[ 124.816315] kasan_stack_oob+0x0/0x174
[ 124.817519]
[ 124.817878] This frame has 4 objects:
[ 124.818446] [32, 33) '__assertion'
[ 124.818602] [48, 52) 'array'
[ 124.819097] [64, 72) '__assertion'
[ 124.819964] [96, 106) 'stack_array'
[ 124.820498]
[ 124.821235] The buggy address belongs to the virtual mapping at
[ 124.821235] [fa098000, fa09d000) created by:
[ 124.821235] kernel_clone+0xcc/0x4b0
[ 124.822522]
[ 124.823102] The buggy address belongs to the physical page:
[ 124.823783] page:100fd0ab refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fc96
[ 124.824687] flags: 0x80000000(zone=2)
[ 124.825201] page_type: 0xffffffff()
[ 124.825684] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 124.826519] raw: 00000000
[ 124.826871] page dumped because: kasan: bad access detected
[ 124.827509]
[ 124.827813] Memory state around the buggy address:
[ 124.828282] fa09bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 124.829072] fa09bd80: 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2
[ 124.830231] >fa09be00: 00 02 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
[ 124.830913] ^
[ 124.831340] fa09be80: 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 00 00 f2 f2
[ 124.832119] fa09bf00: 00 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
[ 124.832728] ==================================================================
Home
[ 122.665338] ==================================================================
[ 122.666409] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0xb4/0x1ac
[ 122.667011] Read of size 1 at addr c4dd8000 by task kunit_try_catch/120
[ 122.667495]
[ 122.667757] CPU: 1 PID: 120 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 122.668572] Hardware name: Generic DT based system
[ 122.669123] unwind_backtrace from show_stack+0x18/0x1c
[ 122.669898] show_stack from dump_stack_lvl+0x58/0x70
[ 122.671881] dump_stack_lvl from print_report+0x164/0x51c
[ 122.672748] print_report from kasan_report+0xc8/0x104
[ 122.673423] kasan_report from kmalloc_pagealloc_uaf+0xb4/0x1ac
[ 122.674198] kmalloc_pagealloc_uaf from kunit_try_run_case+0x11c/0x2e4
[ 122.675165] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 122.676163] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 122.677057] kthread from ret_from_fork+0x14/0x30
[ 122.677675] Exception stack(0xf9ecbfb0 to 0xf9ecbff8)
[ 122.678373] bfa0: 00000000 00000000 00000000 00000000
[ 122.679304] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 122.680070] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 122.680793]
[ 122.681098] The buggy address belongs to the physical page:
[ 122.681753] page:50be9d29 refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x44dd8
[ 122.682469] flags: 0x0(zone=0)
[ 122.682910] page_type: 0xffffffff()
[ 122.683330] raw: 00000000 e7b79e84 e7b79e84 00000000 00000000 00000000 ffffffff 00000000
[ 122.684241] raw: 00000000
[ 122.684650] page dumped because: kasan: bad access detected
[ 122.685289]
[ 122.685576] Memory state around the buggy address:
[ 122.686037] c4dd7f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 122.686824] c4dd7f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 122.687388] >c4dd8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 122.688148] ^
[ 122.688560] c4dd8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 122.689166] c4dd8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 122.689915] ==================================================================
Home
[ 122.745656] ==================================================================
[ 122.746889] BUG: KASAN: use-after-free in pagealloc_uaf+0xc8/0x1cc
[ 122.747712] Read of size 1 at addr c8f60000 by task kunit_try_catch/126
[ 122.748509]
[ 122.748843] CPU: 1 PID: 126 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 122.749917] Hardware name: Generic DT based system
[ 122.750590] unwind_backtrace from show_stack+0x18/0x1c
[ 122.751461] show_stack from dump_stack_lvl+0x58/0x70
[ 122.752274] dump_stack_lvl from print_report+0x164/0x51c
[ 122.752992] print_report from kasan_report+0xc8/0x104
[ 122.753711] kasan_report from pagealloc_uaf+0xc8/0x1cc
[ 122.754366] pagealloc_uaf from kunit_try_run_case+0x11c/0x2e4
[ 122.755241] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 122.756156] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 122.757030] kthread from ret_from_fork+0x14/0x30
[ 122.757554] Exception stack(0xf9efbfb0 to 0xf9efbff8)
[ 122.758229] bfa0: 00000000 00000000 00000000 00000000
[ 122.759219] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 122.761221] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 122.761994]
[ 122.762187] The buggy address belongs to the physical page:
[ 122.763179] page:c0c5e598 refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x48f60
[ 122.764224] flags: 0x0(zone=0)
[ 122.764674] page_type: 0xffffff7f(buddy)
[ 122.765266] raw: 00000000 c40f8d44 c40f8d44 00000000 00000000 00000005 ffffff7f 00000000
[ 122.765913] raw: 00000000
[ 122.766083] page dumped because: kasan: bad access detected
[ 122.766325]
[ 122.766438] Memory state around the buggy address:
[ 122.766767] c8f5ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 122.767275] c8f5ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 122.767943] >c8f60000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 122.768739] ^
[ 122.769166] c8f60080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 122.770003] c8f60100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 122.770813] ==================================================================
Home
[ 126.540768] ==================================================================
[ 126.541460] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x10c/0x300
[ 126.542244] Read of size 1 at addr f18f57f8 by task kunit_try_catch/216
[ 126.542858]
[ 126.543160] CPU: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 126.543973] Hardware name: Generic DT based system
[ 126.544407] unwind_backtrace from show_stack+0x18/0x1c
[ 126.545271] show_stack from dump_stack_lvl+0x58/0x70
[ 126.546079] dump_stack_lvl from print_report+0x164/0x51c
[ 126.546887] print_report from kasan_report+0xc8/0x104
[ 126.547558] kasan_report from vmalloc_oob+0x10c/0x300
[ 126.548297] vmalloc_oob from kunit_try_run_case+0x11c/0x2e4
[ 126.549297] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 126.550745] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 126.551886] kthread from ret_from_fork+0x14/0x30
[ 126.552573] Exception stack(0xfa173fb0 to 0xfa173ff8)
[ 126.553262] 3fa0: 00000000 00000000 00000000 00000000
[ 126.554096] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 126.555056] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 126.555594]
[ 126.555940] The buggy address belongs to the virtual mapping at
[ 126.555940] [f18f5000, f18f7000) created by:
[ 126.555940] vmalloc_oob+0x88/0x300
[ 126.557281]
[ 126.557595] The buggy address belongs to the physical page:
[ 126.558099] page:3e55a4b0 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fcde
[ 126.559024] flags: 0x80000000(zone=2)
[ 126.559815] page_type: 0xffffffff()
[ 126.560675] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 126.561459] raw: 00000000
[ 126.561869] page dumped because: kasan: bad access detected
[ 126.562404]
[ 126.562675] Memory state around the buggy address:
[ 126.563402] f18f5680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 126.564250] f18f5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 126.565044] >f18f5780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[ 126.565835] ^
[ 126.566634] f18f5800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[ 126.567415] f18f5880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[ 126.568173] ==================================================================
Home
[ 126.508297] ==================================================================
[ 126.509646] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xd8/0x300
[ 126.510323] Read of size 1 at addr f18f57f3 by task kunit_try_catch/216
[ 126.511671]
[ 126.512015] CPU: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 126.513067] Hardware name: Generic DT based system
[ 126.513846] unwind_backtrace from show_stack+0x18/0x1c
[ 126.514696] show_stack from dump_stack_lvl+0x58/0x70
[ 126.515415] dump_stack_lvl from print_report+0x164/0x51c
[ 126.516154] print_report from kasan_report+0xc8/0x104
[ 126.516876] kasan_report from vmalloc_oob+0xd8/0x300
[ 126.517564] vmalloc_oob from kunit_try_run_case+0x11c/0x2e4
[ 126.518303] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[ 126.519269] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[ 126.520514] kthread from ret_from_fork+0x14/0x30
[ 126.521087] Exception stack(0xfa173fb0 to 0xfa173ff8)
[ 126.521716] 3fa0: 00000000 00000000 00000000 00000000
[ 126.522666] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 126.523533] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 126.524311]
[ 126.524659] The buggy address belongs to the virtual mapping at
[ 126.524659] [f18f5000, f18f7000) created by:
[ 126.524659] vmalloc_oob+0x88/0x300
[ 126.525928]
[ 126.526243] The buggy address belongs to the physical page:
[ 126.526855] page:3e55a4b0 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fcde
[ 126.527707] flags: 0x80000000(zone=2)
[ 126.528191] page_type: 0xffffffff()
[ 126.528652] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[ 126.529948] raw: 00000000
[ 126.530365] page dumped because: kasan: bad access detected
[ 126.531035]
[ 126.531329] Memory state around the buggy address:
[ 126.531912] f18f5680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 126.532702] f18f5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 126.533439] >f18f5780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[ 126.533969] ^
[ 126.534739] f18f5800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[ 126.535407] f18f5880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[ 126.536045] ==================================================================
Home
------------[ cut here ]------------
[ 50.113326] WARNING: CPU: 1 PID: 470 at mm/util.c:632 kvmalloc_node+0xf4/0xf8
[ 50.115451] Modules linked in:
[ 50.117494] CPU: 1 PID: 470 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[ 50.118510] Hardware name: Generic DT based system
[ 50.120849] unwind_backtrace from show_stack+0x10/0x14
[ 50.121694] show_stack from dump_stack_lvl+0x40/0x4c
[ 50.122877] dump_stack_lvl from __warn+0x78/0x124
[ 50.124296] __warn from warn_slowpath_fmt+0x184/0x18c
[ 50.124960] warn_slowpath_fmt from kvmalloc_node+0xf4/0xf8
[ 50.125255] kvmalloc_node from alloc_fdtable+0x88/0x104
[ 50.125522] alloc_fdtable from expand_files+0x78/0x2f4
[ 50.126989] expand_files from ksys_dup3+0x58/0xe0
[ 50.127903] ksys_dup3 from ret_fast_syscall+0x0/0x4c
[ 50.129495] Exception stack(0xfa1d9fa8 to 0xfa1d9ff0)
[ 50.129978] 9fa0: beb7f2bc 004b0000 00000002 2000003c 00000000 2000003c
[ 50.130372] 9fc0: beb7f2bc 004b0000 004aff0c 0000003f 00492edd b6f53ce0 00000000 004aff0c
[ 50.130723] 9fe0: 0000003f beb7f0e4 b6eb2f43 b6e30786
[ 50.134221] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 50.113326] WARNING: CPU: 1 PID: 470 at mm/util.c:632 kvmalloc_node+0xf4/0xf8
[ 50.115451] Modules linked in:
[ 50.117494] CPU: 1 PID: 470 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[ 50.118510] Hardware name: Generic DT based system
[ 50.120849] unwind_backtrace from show_stack+0x10/0x14
[ 50.121694] show_stack from dump_stack_lvl+0x40/0x4c
[ 50.122877] dump_stack_lvl from __warn+0x78/0x124
[ 50.124296] __warn from warn_slowpath_fmt+0x184/0x18c
[ 50.124960] warn_slowpath_fmt from kvmalloc_node+0xf4/0xf8
[ 50.125255] kvmalloc_node from alloc_fdtable+0x88/0x104
[ 50.125522] alloc_fdtable from expand_files+0x78/0x2f4
[ 50.126989] expand_files from ksys_dup3+0x58/0xe0
[ 50.127903] ksys_dup3 from ret_fast_syscall+0x0/0x4c
[ 50.129495] Exception stack(0xfa1d9fa8 to 0xfa1d9ff0)
[ 50.129978] 9fa0: beb7f2bc 004b0000 00000002 2000003c 00000000 2000003c
[ 50.130372] 9fc0: beb7f2bc 004b0000 004aff0c 0000003f 00492edd b6f53ce0 00000000 004aff0c
[ 50.130723] 9fe0: 0000003f beb7f0e4 b6eb2f43 b6e30786
[ 50.134221] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 32.751016] WARNING: CPU: 0 PID: 476 at mm/util.c:632 kvmalloc_node+0xd1/0xe0
[ 32.752711] Modules linked in:
[ 32.754328] CPU: 0 PID: 476 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[ 32.754616] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 32.757383] EIP: kvmalloc_node+0xd1/0xe0
[ 32.757714] Code: 00 00 ff 75 04 ff 75 ec 68 00 04 00 00 ff 75 f0 56 57 e8 b2 de 02 00 83 c4 18 83 c4 08 5e 5f 5b 5d c3 f7 c6 00 20 00 00 75 f0 <0f> 0b eb ec 90 90 90 90 90 90 90 90 90 90 90 83 f8 11 72 2c 55 89
[ 32.759953] EAX: 00000000 EBX: 80001000 ECX: ca9bd4ed EDX: 00000000
[ 32.760614] ESI: 00400cc0 EDI: ffffffff EBP: c20e1eb8 ESP: c20e1ea4
[ 32.761773] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010246
[ 32.762519] CR0: 80050033 CR2: b7d69e40 CR3: 02397000 CR4: 000006d0
[ 32.762929] Call Trace:
[ 32.766057] ? show_regs+0x4e/0x60
[ 32.767210] ? kvmalloc_node+0xd1/0xe0
[ 32.767576] ? __warn+0xa5/0x180
[ 32.767921] ? kvmalloc_node+0xd1/0xe0
[ 32.768433] ? kvmalloc_node+0xd1/0xe0
[ 32.768813] ? report_bug+0x11e/0x1b0
[ 32.769462] ? exc_overflow+0x38/0x38
[ 32.769758] ? handle_bug+0x48/0x68
[ 32.770370] ? exc_invalid_op+0x17/0x3c
[ 32.771185] ? handle_exception+0x133/0x133
[ 32.772163] ? kvmalloc_node+0x3d/0xe0
[ 32.772702] ? exc_overflow+0x38/0x38
[ 32.773021] ? kvmalloc_node+0xd1/0xe0
[ 32.773476] ? exc_overflow+0x38/0x38
[ 32.774040] ? kvmalloc_node+0xd1/0xe0
[ 32.774326] ? security_task_setrlimit+0x36/0x50
[ 32.774839] alloc_fdtable+0x70/0xf0
[ 32.775594] ? do_prlimit+0x11f/0x170
[ 32.775751] expand_files+0x101/0x2b0
[ 32.775880] ? __ia32_sys_prlimit64+0x20e/0x2c0
[ 32.776029] ksys_dup3+0x5b/0xb0
[ 32.776508] __ia32_sys_dup2+0x16/0x70
[ 32.777204] ia32_sys_call+0x273a/0x27d0
[ 32.777605] __do_fast_syscall_32+0x6c/0xb4
[ 32.777915] ? hrtimer_interrupt+0x137/0x420
[ 32.778582] ? exit_to_user_mode_prepare+0x29/0xc0
[ 32.779235] do_fast_syscall_32+0x29/0x5c
[ 32.779691] do_SYSENTER_32+0x12/0x14
[ 32.780007] entry_SYSENTER_32+0x98/0xf9
[ 32.780653] EIP: 0xb7f0b539
[ 32.781437] Code: 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 90 90 90 58 b8 77 00 00 00 cd 80 90 90 90
[ 32.782885] EAX: ffffffda EBX: 00000002 ECX: 2000003c EDX: b7ef0e14
[ 32.783095] ESI: 004d9124 EDI: bfcb0960 EBP: bfcb0978 ESP: bfcb06f8
[ 32.783734] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b EFLAGS: 00000296
[ 32.784585] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 32.751016] WARNING: CPU: 0 PID: 476 at mm/util.c:632 kvmalloc_node+0xd1/0xe0
[ 32.752711] Modules linked in:
[ 32.754328] CPU: 0 PID: 476 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[ 32.754616] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 32.757383] EIP: kvmalloc_node+0xd1/0xe0
[ 32.757714] Code: 00 00 ff 75 04 ff 75 ec 68 00 04 00 00 ff 75 f0 56 57 e8 b2 de 02 00 83 c4 18 83 c4 08 5e 5f 5b 5d c3 f7 c6 00 20 00 00 75 f0 <0f> 0b eb ec 90 90 90 90 90 90 90 90 90 90 90 83 f8 11 72 2c 55 89
[ 32.759953] EAX: 00000000 EBX: 80001000 ECX: ca9bd4ed EDX: 00000000
[ 32.760614] ESI: 00400cc0 EDI: ffffffff EBP: c20e1eb8 ESP: c20e1ea4
[ 32.761773] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010246
[ 32.762519] CR0: 80050033 CR2: b7d69e40 CR3: 02397000 CR4: 000006d0
[ 32.762929] Call Trace:
[ 32.766057] ? show_regs+0x4e/0x60
[ 32.767210] ? kvmalloc_node+0xd1/0xe0
[ 32.767576] ? __warn+0xa5/0x180
[ 32.767921] ? kvmalloc_node+0xd1/0xe0
[ 32.768433] ? kvmalloc_node+0xd1/0xe0
[ 32.768813] ? report_bug+0x11e/0x1b0
[ 32.769462] ? exc_overflow+0x38/0x38
[ 32.769758] ? handle_bug+0x48/0x68
[ 32.770370] ? exc_invalid_op+0x17/0x3c
[ 32.771185] ? handle_exception+0x133/0x133
[ 32.772163] ? kvmalloc_node+0x3d/0xe0
[ 32.772702] ? exc_overflow+0x38/0x38
[ 32.773021] ? kvmalloc_node+0xd1/0xe0
[ 32.773476] ? exc_overflow+0x38/0x38
[ 32.774040] ? kvmalloc_node+0xd1/0xe0
[ 32.774326] ? security_task_setrlimit+0x36/0x50
[ 32.774839] alloc_fdtable+0x70/0xf0
[ 32.775594] ? do_prlimit+0x11f/0x170
[ 32.775751] expand_files+0x101/0x2b0
[ 32.775880] ? __ia32_sys_prlimit64+0x20e/0x2c0
[ 32.776029] ksys_dup3+0x5b/0xb0
[ 32.776508] __ia32_sys_dup2+0x16/0x70
[ 32.777204] ia32_sys_call+0x273a/0x27d0
[ 32.777605] __do_fast_syscall_32+0x6c/0xb4
[ 32.777915] ? hrtimer_interrupt+0x137/0x420
[ 32.778582] ? exit_to_user_mode_prepare+0x29/0xc0
[ 32.779235] do_fast_syscall_32+0x29/0x5c
[ 32.779691] do_SYSENTER_32+0x12/0x14
[ 32.780007] entry_SYSENTER_32+0x98/0xf9
[ 32.780653] EIP: 0xb7f0b539
[ 32.781437] Code: 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 90 90 90 58 b8 77 00 00 00 cd 80 90 90 90
[ 32.782885] EAX: ffffffda EBX: 00000002 ECX: 2000003c EDX: b7ef0e14
[ 32.783095] ESI: 004d9124 EDI: bfcb0960 EBP: bfcb0978 ESP: bfcb06f8
[ 32.783734] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b EFLAGS: 00000296
[ 32.784585] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 31.026812] WARNING: CPU: 0 PID: 476 at mm/util.c:632 kvmalloc_node+0xd8/0xe0
[ 31.028229] Modules linked in:
[ 31.028832] CPU: 0 PID: 476 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[ 31.029801] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 31.031058] EIP: kvmalloc_node+0xd8/0xe0
[ 31.031524] Code: ff 2d 00 20 80 00 89 04 24 89 d8 e8 fe 22 03 00 8b 5d f4 8b 75 f8 8b 7d fc 89 ec 5d c3 90 81 e6 00 20 00 00 0f 85 49 ff ff ff <0f> 0b e9 42 ff ff ff 90 55 89 e5 83 ec 0c 89 5d f4 89 d3 89 ca 89
[ 31.032807] EAX: 00000000 EBX: 80001000 ECX: 00000013 EDX: ffffffff
[ 31.033200] ESI: 00000000 EDI: ffffffff EBP: c1de5ef0 ESP: c1de5ecc
[ 31.033638] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010246
[ 31.033998] CR0: 80050033 CR2: b7d5be40 CR3: 0214e000 CR4: 000006d0
[ 31.034663] Call Trace:
[ 31.036252] ? show_regs+0x4d/0x54
[ 31.036641] ? kvmalloc_node+0xd8/0xe0
[ 31.037077] ? __warn+0x84/0x150
[ 31.037427] ? kvmalloc_node+0xd8/0xe0
[ 31.037611] ? kvmalloc_node+0xd8/0xe0
[ 31.037998] ? report_bug+0x189/0x1b0
[ 31.038653] ? kvmalloc_node+0xd9/0xe0
[ 31.039017] ? exc_overflow+0x50/0x50
[ 31.039444] ? handle_bug+0x56/0x90
[ 31.039615] ? exc_invalid_op+0x1b/0x70
[ 31.039792] ? kvmalloc_node+0x59/0xe0
[ 31.041075] ? handle_exception+0x133/0x133
[ 31.041453] ? exc_overflow+0x50/0x50
[ 31.041760] ? kvmalloc_node+0xd8/0xe0
[ 31.042513] ? exc_overflow+0x50/0x50
[ 31.042757] ? kvmalloc_node+0xd8/0xe0
[ 31.043776] ? kmalloc_trace+0x2b/0xa0
[ 31.044768] ? alloc_fdtable+0x42/0xd8
[ 31.045159] ? selinux_task_setrlimit+0x7b/0x84
[ 31.045679] alloc_fdtable+0x67/0xd8
[ 31.046238] expand_files+0x55/0x81c
[ 31.046718] ? do_prlimit+0xfc/0x1c8
[ 31.047120] ? __ia32_sys_prlimit64+0x293/0x340
[ 31.047835] ksys_dup3+0x5a/0xe4
[ 31.048465] __ia32_sys_dup2+0x19/0x70
[ 31.049096] ia32_sys_call+0x1d96/0x2738
[ 31.049594] __do_fast_syscall_32+0x45/0xac
[ 31.049794] do_fast_syscall_32+0x32/0x74
[ 31.050063] do_SYSENTER_32+0x15/0x24
[ 31.050306] entry_SYSENTER_32+0x98/0xf9
[ 31.050743] EIP: 0xb7efd579
[ 31.051180] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d 76 00 58 b8 77 00 00 00 cd 80 90 8d 76
[ 31.052175] EAX: ffffffda EBX: 00000002 ECX: 2000003c EDX: b7ee2e14
[ 31.052639] ESI: 0040b5cc EDI: bf8a1bb0 EBP: bf8a1d28 ESP: bf8a1b18
[ 31.053198] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b EFLAGS: 00000296
[ 31.053768] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 31.026812] WARNING: CPU: 0 PID: 476 at mm/util.c:632 kvmalloc_node+0xd8/0xe0
[ 31.028229] Modules linked in:
[ 31.028832] CPU: 0 PID: 476 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[ 31.029801] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 31.031058] EIP: kvmalloc_node+0xd8/0xe0
[ 31.031524] Code: ff 2d 00 20 80 00 89 04 24 89 d8 e8 fe 22 03 00 8b 5d f4 8b 75 f8 8b 7d fc 89 ec 5d c3 90 81 e6 00 20 00 00 0f 85 49 ff ff ff <0f> 0b e9 42 ff ff ff 90 55 89 e5 83 ec 0c 89 5d f4 89 d3 89 ca 89
[ 31.032807] EAX: 00000000 EBX: 80001000 ECX: 00000013 EDX: ffffffff
[ 31.033200] ESI: 00000000 EDI: ffffffff EBP: c1de5ef0 ESP: c1de5ecc
[ 31.033638] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010246
[ 31.033998] CR0: 80050033 CR2: b7d5be40 CR3: 0214e000 CR4: 000006d0
[ 31.034663] Call Trace:
[ 31.036252] ? show_regs+0x4d/0x54
[ 31.036641] ? kvmalloc_node+0xd8/0xe0
[ 31.037077] ? __warn+0x84/0x150
[ 31.037427] ? kvmalloc_node+0xd8/0xe0
[ 31.037611] ? kvmalloc_node+0xd8/0xe0
[ 31.037998] ? report_bug+0x189/0x1b0
[ 31.038653] ? kvmalloc_node+0xd9/0xe0
[ 31.039017] ? exc_overflow+0x50/0x50
[ 31.039444] ? handle_bug+0x56/0x90
[ 31.039615] ? exc_invalid_op+0x1b/0x70
[ 31.039792] ? kvmalloc_node+0x59/0xe0
[ 31.041075] ? handle_exception+0x133/0x133
[ 31.041453] ? exc_overflow+0x50/0x50
[ 31.041760] ? kvmalloc_node+0xd8/0xe0
[ 31.042513] ? exc_overflow+0x50/0x50
[ 31.042757] ? kvmalloc_node+0xd8/0xe0
[ 31.043776] ? kmalloc_trace+0x2b/0xa0
[ 31.044768] ? alloc_fdtable+0x42/0xd8
[ 31.045159] ? selinux_task_setrlimit+0x7b/0x84
[ 31.045679] alloc_fdtable+0x67/0xd8
[ 31.046238] expand_files+0x55/0x81c
[ 31.046718] ? do_prlimit+0xfc/0x1c8
[ 31.047120] ? __ia32_sys_prlimit64+0x293/0x340
[ 31.047835] ksys_dup3+0x5a/0xe4
[ 31.048465] __ia32_sys_dup2+0x19/0x70
[ 31.049096] ia32_sys_call+0x1d96/0x2738
[ 31.049594] __do_fast_syscall_32+0x45/0xac
[ 31.049794] do_fast_syscall_32+0x32/0x74
[ 31.050063] do_SYSENTER_32+0x15/0x24
[ 31.050306] entry_SYSENTER_32+0x98/0xf9
[ 31.050743] EIP: 0xb7efd579
[ 31.051180] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d 76 00 58 b8 77 00 00 00 cd 80 90 8d 76
[ 31.052175] EAX: ffffffda EBX: 00000002 ECX: 2000003c EDX: b7ee2e14
[ 31.052639] ESI: 0040b5cc EDI: bf8a1bb0 EBP: bf8a1d28 ESP: bf8a1b18
[ 31.053198] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b EFLAGS: 00000296
[ 31.053768] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 104.688855] event 'ma_read' has unsafe pointer field 'fn'
[ 104.689941] WARNING: CPU: 1 PID: 309 at kernel/trace/trace.c:3881 ignore_event+0x1f8/0x214
[ 104.690095] Modules linked in: drm i2c_core drm_panel_orientation_quirks backlight dm_mod ip_tables x_tables
[ 104.691421] CPU: 1 PID: 309 Comm: cat Not tainted 6.6.74-rc1 #1
[ 104.691483] Hardware name: riscv-virtio,qemu (DT)
[ 104.691654] epc : ignore_event+0x1f8/0x214
[ 104.691760] ra : ignore_event+0x1f8/0x214
[ 104.691840] epc : ffffffff8012b980 ra : ffffffff8012b980 sp : ff2000000064bc00
[ 104.691885] gp : ffffffff81a32398 tp : ff60000083e58000 t0 : ffffffff80098da4
[ 104.691928] t1 : 00000000ffffffff t2 : 205b2d2d2d2d2d2d s0 : ff2000000064bc70
[ 104.691971] s1 : ff6000008014f150 a0 : 000000000000002d a1 : 0000000000000001
[ 104.692015] a2 : 0000000000000000 a3 : 0000000000000008 a4 : 0000000000000000
[ 104.692058] a5 : 0000000000000000 a6 : 0000000000000001 a7 : 0000000000000ad9
[ 104.692129] s2 : ffffffff81600c80 s3 : ff600000867400a0 s4 : ffffffff819bfae0
[ 104.692181] s5 : ff600000867410d8 s6 : ff60000086773198 s7 : ff600000867410a0
[ 104.692233] s8 : ffffffff81000000 s9 : ffffffff81600000 s10: ffffffff819cc138
[ 104.692283] s11: ff60000086742000 t3 : 0000000000100000 t4 : 0000000000000064
[ 104.692333] t5 : ffffffff81a48748 t6 : ff2000000064ba18
[ 104.692381] status: 0000000200000120 badaddr: ffffffff8012b980 cause: 0000000000000003
[ 104.692501] [<ffffffff8012b980>] ignore_event+0x1f8/0x214
[ 104.692637] [<ffffffff80130baa>] trace_event_printf+0x36/0x80
[ 104.692691] [<ffffffff80ba4c6c>] trace_raw_output_ma_read+0x5e/0x7a
[ 104.692743] [<ffffffff8012cf9c>] print_trace_line+0x1d8/0x4a8
[ 104.692793] [<ffffffff8012d860>] tracing_read_pipe+0x168/0x302
[ 104.692844] [<ffffffff802aa73e>] vfs_read+0xac/0x27c
[ 104.692899] [<ffffffff802ab11a>] ksys_read+0x68/0xec
[ 104.692951] [<ffffffff802ab1be>] __riscv_sys_read+0x20/0x28
[ 104.693002] [<ffffffff80bcfe64>] do_trap_ecall_u+0x12a/0x13c
[ 104.693057] [<ffffffff80bdbb10>] ret_from_exception+0x0/0x64
[ 104.693262] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 54.079215] WARNING: CPU: 1 PID: 477 at mm/util.c:632 kvmalloc_node+0xde/0xf0
[ 54.081249] Modules linked in:
[ 54.082158] CPU: 1 PID: 477 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[ 54.083066] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 54.084213] RIP: 0010:kvmalloc_node+0xde/0xf0
[ 54.084956] Code: 45 89 f0 ff 75 08 53 68 00 04 00 00 e8 9b 16 04 00 48 83 c4 18 5b 41 5e 41 5f 5d c3 cc cc cc cc cc 41 f7 c6 00 20 00 00 75 81 <0f> 0b 31 c0 eb e5 66 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90
[ 54.086433] RSP: 0018:ffffba06c0603db0 EFLAGS: 00010246
[ 54.086807] RAX: 0000000000000004 RBX: 00000000ffffffff RCX: 0000000400000000
[ 54.087080] RDX: 0000000200002000 RSI: 0000000000000000 RDI: ffffffffa5e457f8
[ 54.087339] RBP: ffffba06c0603dc8 R08: 0000000000412cc0 R09: 00000000ffffffff
[ 54.087627] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000040000400
[ 54.087881] R13: 0000000040000038 R14: 0000000000400cc0 R15: 0000000200002000
[ 54.088188] FS: 00007f7cd10ea740(0000) GS:ffffa2597bd00000(0000) knlGS:0000000000000000
[ 54.089627] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 54.090249] CR2: 00007f7cd11679e0 CR3: 00000001018c0000 CR4: 00000000000006e0
[ 54.091892] Call Trace:
[ 54.094029] <TASK>
[ 54.095384] ? show_regs+0x5c/0x70
[ 54.096272] ? __warn+0xc9/0x1d0
[ 54.097230] ? kvmalloc_node+0xde/0xf0
[ 54.097828] ? report_bug+0x152/0x200
[ 54.098834] ? handle_bug+0x68/0x90
[ 54.099087] ? exc_invalid_op+0x1f/0x50
[ 54.099281] ? asm_exc_invalid_op+0x1f/0x30
[ 54.100461] ? kvmalloc_node+0x48/0xf0
[ 54.101311] ? kvmalloc_node+0xde/0xf0
[ 54.101604] alloc_fdtable+0x7a/0x120
[ 54.102907] expand_files+0x11a/0x310
[ 54.103094] ? do_prlimit+0x120/0x160
[ 54.103252] ksys_dup3+0x75/0xe0
[ 54.103536] __x64_sys_dup2+0x25/0x90
[ 54.103829] x64_sys_call+0x256b/0x2d20
[ 54.104346] do_syscall_64+0x55/0xb0
[ 54.105631] ? exc_page_fault+0x65/0xc0
[ 54.106884] entry_SYSCALL_64_after_hwframe+0x78/0xe2
[ 54.107416] RIP: 0033:0x7f7cd11e2c17
[ 54.108838] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[ 54.109875] RSP: 002b:00007ffeb04e7f08 EFLAGS: 00000202 ORIG_RAX: 0000000000000021
[ 54.110179] RAX: ffffffffffffffda RBX: 00007ffeb04e8768 RCX: 00007f7cd11e2c17
[ 54.110416] RDX: 00007ffeb04e8088 RSI: 0000000040000038 RDI: 0000000000000002
[ 54.111839] RBP: 00007ffeb04e8120 R08: 0000000000000064 R09: 0000000000000000
[ 54.112813] R10: 00007f7cd10ff170 R11: 0000000000000202 R12: 0000000000000000
[ 54.113580] R13: 00007ffeb04e8778 R14: 00007f7cd1318000 R15: 0000557aacc46cf8
[ 54.114931] </TASK>
[ 54.115742] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 54.079215] WARNING: CPU: 1 PID: 477 at mm/util.c:632 kvmalloc_node+0xde/0xf0
[ 54.081249] Modules linked in:
[ 54.082158] CPU: 1 PID: 477 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[ 54.083066] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 54.084213] RIP: 0010:kvmalloc_node+0xde/0xf0
[ 54.084956] Code: 45 89 f0 ff 75 08 53 68 00 04 00 00 e8 9b 16 04 00 48 83 c4 18 5b 41 5e 41 5f 5d c3 cc cc cc cc cc 41 f7 c6 00 20 00 00 75 81 <0f> 0b 31 c0 eb e5 66 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90
[ 54.086433] RSP: 0018:ffffba06c0603db0 EFLAGS: 00010246
[ 54.086807] RAX: 0000000000000004 RBX: 00000000ffffffff RCX: 0000000400000000
[ 54.087080] RDX: 0000000200002000 RSI: 0000000000000000 RDI: ffffffffa5e457f8
[ 54.087339] RBP: ffffba06c0603dc8 R08: 0000000000412cc0 R09: 00000000ffffffff
[ 54.087627] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000040000400
[ 54.087881] R13: 0000000040000038 R14: 0000000000400cc0 R15: 0000000200002000
[ 54.088188] FS: 00007f7cd10ea740(0000) GS:ffffa2597bd00000(0000) knlGS:0000000000000000
[ 54.089627] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 54.090249] CR2: 00007f7cd11679e0 CR3: 00000001018c0000 CR4: 00000000000006e0
[ 54.091892] Call Trace:
[ 54.094029] <TASK>
[ 54.095384] ? show_regs+0x5c/0x70
[ 54.096272] ? __warn+0xc9/0x1d0
[ 54.097230] ? kvmalloc_node+0xde/0xf0
[ 54.097828] ? report_bug+0x152/0x200
[ 54.098834] ? handle_bug+0x68/0x90
[ 54.099087] ? exc_invalid_op+0x1f/0x50
[ 54.099281] ? asm_exc_invalid_op+0x1f/0x30
[ 54.100461] ? kvmalloc_node+0x48/0xf0
[ 54.101311] ? kvmalloc_node+0xde/0xf0
[ 54.101604] alloc_fdtable+0x7a/0x120
[ 54.102907] expand_files+0x11a/0x310
[ 54.103094] ? do_prlimit+0x120/0x160
[ 54.103252] ksys_dup3+0x75/0xe0
[ 54.103536] __x64_sys_dup2+0x25/0x90
[ 54.103829] x64_sys_call+0x256b/0x2d20
[ 54.104346] do_syscall_64+0x55/0xb0
[ 54.105631] ? exc_page_fault+0x65/0xc0
[ 54.106884] entry_SYSCALL_64_after_hwframe+0x78/0xe2
[ 54.107416] RIP: 0033:0x7f7cd11e2c17
[ 54.108838] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[ 54.109875] RSP: 002b:00007ffeb04e7f08 EFLAGS: 00000202 ORIG_RAX: 0000000000000021
[ 54.110179] RAX: ffffffffffffffda RBX: 00007ffeb04e8768 RCX: 00007f7cd11e2c17
[ 54.110416] RDX: 00007ffeb04e8088 RSI: 0000000040000038 RDI: 0000000000000002
[ 54.111839] RBP: 00007ffeb04e8120 R08: 0000000000000064 R09: 0000000000000000
[ 54.112813] R10: 00007f7cd10ff170 R11: 0000000000000202 R12: 0000000000000000
[ 54.113580] R13: 00007ffeb04e8778 R14: 00007f7cd1318000 R15: 0000557aacc46cf8
[ 54.114931] </TASK>
[ 54.115742] ---[ end trace 0000000000000000 ]---
Home
[ 46.648369] ==================================================================
[ 46.650458] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0xfe/0x1f0
[ 46.651302] Read of size 1 at addr ffff888102967cbf by task kunit_try_catch/204
[ 46.651841]
[ 46.652185] CPU: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 46.654132] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 46.655274] Call Trace:
[ 46.655648] <TASK>
[ 46.656056] dump_stack_lvl+0x4e/0x90
[ 46.656664] print_report+0xd2/0x660
[ 46.657159] ? __virt_addr_valid+0x156/0x1e0
[ 46.658201] ? kasan_addr_to_slab+0x11/0xb0
[ 46.659206] kasan_report+0xff/0x140
[ 46.659768] ? kasan_alloca_oob_left+0xfe/0x1f0
[ 46.660362] ? kasan_alloca_oob_left+0xfe/0x1f0
[ 46.661457] __asan_load1+0x66/0x70
[ 46.662264] kasan_alloca_oob_left+0xfe/0x1f0
[ 46.663065] ? __pfx_rcu_cpu_stall_reset+0x1/0x10
[ 46.663927] ? trace_event_raw_event_ipi_handler+0xf0/0x130
[ 46.664625] ? __schedule+0x70b/0x1190
[ 46.665502] ? trace_hardirqs_on+0x37/0xd0
[ 46.666397] ? __pfx_kasan_alloca_oob_left+0x10/0x10
[ 46.667470] ? __schedule+0x70b/0x1190
[ 46.668058] ? ktime_get_ts64+0x118/0x140
[ 46.668698] kunit_try_run_case+0x126/0x290
[ 46.669331] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.670157] ? __kasan_check_write+0x18/0x20
[ 46.671070] ? trace_preempt_on+0x20/0xa0
[ 46.671974] ? __kthread_parkme+0x4f/0xd0
[ 46.672609] ? preempt_count_sub+0x50/0x80
[ 46.673476] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.674123] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 46.675366] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 46.676003] kthread+0x19e/0x1e0
[ 46.676386] ? __pfx_kthread+0x10/0x10
[ 46.676821] ret_from_fork+0x41/0x70
[ 46.677239] ? __pfx_kthread+0x10/0x10
[ 46.678075] ret_from_fork_asm+0x1b/0x30
[ 46.679979] </TASK>
[ 46.680324]
[ 46.680657] The buggy address belongs to stack of task kunit_try_catch/204
[ 46.681667]
[ 46.681816] The buggy address belongs to the physical page:
[ 46.682691] page:(____ptrval____) refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102967
[ 46.683713] flags: 0x200000000000000(node=0|zone=2)
[ 46.684479] page_type: 0xffffffff()
[ 46.685405] raw: 0200000000000000 ffffea00040a59c8 ffffea00040a59c8 0000000000000000
[ 46.686489] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[ 46.687622] page dumped because: kasan: bad access detected
[ 46.688390]
[ 46.688716] Memory state around the buggy address:
[ 46.690723] ffff888102967b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 46.691239] ffff888102967c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 46.692324] >ffff888102967c80: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[ 46.693291] ^
[ 46.694422] ffff888102967d00: 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2
[ 46.696271] ffff888102967d80: 00 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 f1
[ 46.697536] ==================================================================
Home
[ 46.707111] ==================================================================
[ 46.708810] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x107/0x1f0
[ 46.709860] Read of size 1 at addr ffff888102947cca by task kunit_try_catch/206
[ 46.710497]
[ 46.711466] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 46.712780] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 46.713899] Call Trace:
[ 46.714275] <TASK>
[ 46.714742] dump_stack_lvl+0x4e/0x90
[ 46.715341] print_report+0xd2/0x660
[ 46.715867] ? __virt_addr_valid+0x156/0x1e0
[ 46.716459] ? kasan_addr_to_slab+0x11/0xb0
[ 46.717217] kasan_report+0xff/0x140
[ 46.718068] ? kasan_alloca_oob_right+0x107/0x1f0
[ 46.719150] ? kasan_alloca_oob_right+0x107/0x1f0
[ 46.719995] __asan_load1+0x66/0x70
[ 46.720495] kasan_alloca_oob_right+0x107/0x1f0
[ 46.722090] ? __pfx_rcu_cpu_stall_reset+0x1/0x10
[ 46.722421] ? trace_event_raw_event_ipi_handler+0xf0/0x130
[ 46.723410] ? __schedule+0x70b/0x1190
[ 46.724325] ? trace_hardirqs_on+0x37/0xd0
[ 46.725564] ? __pfx_kasan_alloca_oob_right+0x10/0x10
[ 46.726437] ? __schedule+0x70b/0x1190
[ 46.727157] ? ktime_get_ts64+0x118/0x140
[ 46.727763] kunit_try_run_case+0x126/0x290
[ 46.728595] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.729730] ? __kasan_check_write+0x18/0x20
[ 46.730452] ? trace_preempt_on+0x20/0xa0
[ 46.731333] ? __kthread_parkme+0x4f/0xd0
[ 46.732087] ? preempt_count_sub+0x50/0x80
[ 46.732704] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.733879] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 46.734693] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 46.735487] kthread+0x19e/0x1e0
[ 46.736028] ? __pfx_kthread+0x10/0x10
[ 46.737462] ret_from_fork+0x41/0x70
[ 46.738294] ? __pfx_kthread+0x10/0x10
[ 46.738918] ret_from_fork_asm+0x1b/0x30
[ 46.739382] </TASK>
[ 46.739728]
[ 46.740227] The buggy address belongs to stack of task kunit_try_catch/206
[ 46.741503]
[ 46.741735] The buggy address belongs to the physical page:
[ 46.742837] page:(____ptrval____) refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102947
[ 46.744153] flags: 0x200000000000000(node=0|zone=2)
[ 46.744809] page_type: 0xffffffff()
[ 46.745491] raw: 0200000000000000 ffffea00040a51c8 ffffea00040a51c8 0000000000000000
[ 46.747100] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[ 46.748101] page dumped because: kasan: bad access detected
[ 46.749196]
[ 46.749659] Memory state around the buggy address:
[ 46.750772] ffff888102947b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 46.751619] ffff888102947c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 46.752889] >ffff888102947c80: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[ 46.754443] ^
[ 46.755334] ffff888102947d00: 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2
[ 46.756449] ffff888102947d80: 00 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 f1
[ 46.757294] ==================================================================
Home
[ 49.223463] ==================================================================
[ 49.224412] BUG: KASAN: double-free in kfree+0x7c/0x120
[ 49.225147] Free of addr ffff8881025b8a80 by task kunit_try_catch/228
[ 49.226342]
[ 49.226611] CPU: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 49.227757] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 49.228746] Call Trace:
[ 49.229212] <TASK>
[ 49.229751] dump_stack_lvl+0x4e/0x90
[ 49.230587] print_report+0xd2/0x660
[ 49.231213] ? __virt_addr_valid+0x156/0x1e0
[ 49.231938] ? kfree+0x7c/0x120
[ 49.232829] ? kasan_complete_mode_report_info+0x64/0x200
[ 49.233652] ? kfree+0x7c/0x120
[ 49.234281] kasan_report_invalid_free+0xcf/0x100
[ 49.235111] ? kfree+0x7c/0x120
[ 49.235706] ? kfree+0x7c/0x120
[ 49.236118] ____kasan_slab_free+0x19c/0x1d0
[ 49.236558] ? kfree_sensitive+0x2e/0x90
[ 49.237368] __kasan_slab_free+0x16/0x20
[ 49.238172] __kmem_cache_free+0x190/0x310
[ 49.239086] kfree+0x7c/0x120
[ 49.239502] kfree_sensitive+0x2e/0x90
[ 49.240308] kmalloc_double_kzfree+0xd4/0x1d0
[ 49.241781] ? __pfx_kmalloc_double_kzfree+0x10/0x10
[ 49.243082] ? __schedule+0x70b/0x1190
[ 49.243928] ? ktime_get_ts64+0x118/0x140
[ 49.244792] kunit_try_run_case+0x126/0x290
[ 49.245692] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.247064] ? __kasan_check_write+0x18/0x20
[ 49.248240] ? trace_preempt_on+0x20/0xa0
[ 49.249307] ? __kthread_parkme+0x4f/0xd0
[ 49.249682] ? preempt_count_sub+0x50/0x80
[ 49.250097] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.251555] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 49.252683] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.254334] kthread+0x19e/0x1e0
[ 49.255253] ? __pfx_kthread+0x10/0x10
[ 49.256131] ret_from_fork+0x41/0x70
[ 49.256685] ? __pfx_kthread+0x10/0x10
[ 49.257891] ret_from_fork_asm+0x1b/0x30
[ 49.258606] </TASK>
[ 49.259174]
[ 49.259501] Allocated by task 228:
[ 49.260465] kasan_save_stack+0x3c/0x60
[ 49.261348] kasan_set_track+0x29/0x40
[ 49.262276] kasan_save_alloc_info+0x22/0x30
[ 49.263486] __kasan_kmalloc+0xb7/0xc0
[ 49.264563] kmalloc_trace+0x4c/0xb0
[ 49.265512] kmalloc_double_kzfree+0x9d/0x1d0
[ 49.266619] kunit_try_run_case+0x126/0x290
[ 49.267421] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.268333] kthread+0x19e/0x1e0
[ 49.269083] ret_from_fork+0x41/0x70
[ 49.269881] ret_from_fork_asm+0x1b/0x30
[ 49.270820]
[ 49.271083] Freed by task 228:
[ 49.272079] kasan_save_stack+0x3c/0x60
[ 49.272621] kasan_set_track+0x29/0x40
[ 49.273241] kasan_save_free_info+0x2f/0x50
[ 49.274032] ____kasan_slab_free+0x172/0x1d0
[ 49.274730] __kasan_slab_free+0x16/0x20
[ 49.275449] __kmem_cache_free+0x190/0x310
[ 49.276214] kfree+0x7c/0x120
[ 49.276739] kfree_sensitive+0x67/0x90
[ 49.277280] kmalloc_double_kzfree+0xbd/0x1d0
[ 49.278557] kunit_try_run_case+0x126/0x290
[ 49.279423] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.280798] kthread+0x19e/0x1e0
[ 49.281597] ret_from_fork+0x41/0x70
[ 49.282355] ret_from_fork_asm+0x1b/0x30
[ 49.283599]
[ 49.284233] The buggy address belongs to the object at ffff8881025b8a80
[ 49.284233] which belongs to the cache kmalloc-16 of size 16
[ 49.286472] The buggy address is located 0 bytes inside of
[ 49.286472] 16-byte region [ffff8881025b8a80, ffff8881025b8a90)
[ 49.287598]
[ 49.288432] The buggy address belongs to the physical page:
[ 49.289647] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025b8
[ 49.290929] flags: 0x200000000000800(slab|node=0|zone=2)
[ 49.291588] page_type: 0xffffffff()
[ 49.292049] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 49.294373] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 49.295597] page dumped because: kasan: bad access detected
[ 49.296478]
[ 49.297002] Memory state around the buggy address:
[ 49.297555] ffff8881025b8980: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[ 49.299009] ffff8881025b8a00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[ 49.300310] >ffff8881025b8a80: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.301768] ^
[ 49.302473] ffff8881025b8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.303640] ffff8881025b8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.304709] ==================================================================
Home
[ 47.164025] ==================================================================
[ 47.165620] BUG: KASAN: double-free in kmem_cache_double_free+0xeb/0x250
[ 47.166624] Free of addr ffff8881029e8000 by task kunit_try_catch/212
[ 47.167510]
[ 47.167929] CPU: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 47.169006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 47.170224] Call Trace:
[ 47.170712] <TASK>
[ 47.171144] dump_stack_lvl+0x4e/0x90
[ 47.171902] print_report+0xd2/0x660
[ 47.172479] ? __virt_addr_valid+0x156/0x1e0
[ 47.173315] ? kmem_cache_double_free+0xeb/0x250
[ 47.174052] ? kasan_complete_mode_report_info+0x64/0x200
[ 47.174932] ? kmem_cache_double_free+0xeb/0x250
[ 47.175639] kasan_report_invalid_free+0xcf/0x100
[ 47.176397] ? kmem_cache_double_free+0xeb/0x250
[ 47.177178] ? kmem_cache_double_free+0xeb/0x250
[ 47.177830] ____kasan_slab_free+0x19c/0x1d0
[ 47.178382] ? kmem_cache_double_free+0xeb/0x250
[ 47.179051] __kasan_slab_free+0x16/0x20
[ 47.179746] kmem_cache_free+0x1a7/0x4b0
[ 47.180547] kmem_cache_double_free+0xeb/0x250
[ 47.181363] ? __pfx_kmem_cache_double_free+0x10/0x10
[ 47.182131] ? __schedule+0x70b/0x1190
[ 47.182695] ? ktime_get_ts64+0x118/0x140
[ 47.183415] kunit_try_run_case+0x126/0x290
[ 47.184094] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.184748] ? __kasan_check_write+0x18/0x20
[ 47.185420] ? trace_preempt_on+0x20/0xa0
[ 47.186093] ? __kthread_parkme+0x4f/0xd0
[ 47.186655] ? preempt_count_sub+0x50/0x80
[ 47.187274] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.188106] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 47.189064] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.189969] kthread+0x19e/0x1e0
[ 47.190516] ? __pfx_kthread+0x10/0x10
[ 47.191240] ret_from_fork+0x41/0x70
[ 47.191957] ? __pfx_kthread+0x10/0x10
[ 47.192575] ret_from_fork_asm+0x1b/0x30
[ 47.193318] </TASK>
[ 47.193918]
[ 47.194247] Allocated by task 212:
[ 47.194796] kasan_save_stack+0x3c/0x60
[ 47.195573] kasan_set_track+0x29/0x40
[ 47.196224] kasan_save_alloc_info+0x22/0x30
[ 47.196914] __kasan_slab_alloc+0x91/0xa0
[ 47.197660] kmem_cache_alloc+0x180/0x3b0
[ 47.198349] kmem_cache_double_free+0xba/0x250
[ 47.199051] kunit_try_run_case+0x126/0x290
[ 47.199756] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.200495] kthread+0x19e/0x1e0
[ 47.201224] ret_from_fork+0x41/0x70
[ 47.201761] ret_from_fork_asm+0x1b/0x30
[ 47.202790]
[ 47.203014] Freed by task 212:
[ 47.203775] kasan_save_stack+0x3c/0x60
[ 47.204469] kasan_set_track+0x29/0x40
[ 47.204941] kasan_save_free_info+0x2f/0x50
[ 47.205601] ____kasan_slab_free+0x172/0x1d0
[ 47.206484] __kasan_slab_free+0x16/0x20
[ 47.207325] kmem_cache_free+0x1a7/0x4b0
[ 47.208239] kmem_cache_double_free+0xd1/0x250
[ 47.209069] kunit_try_run_case+0x126/0x290
[ 47.209726] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.210491] kthread+0x19e/0x1e0
[ 47.210969] ret_from_fork+0x41/0x70
[ 47.211625] ret_from_fork_asm+0x1b/0x30
[ 47.212256]
[ 47.212818] The buggy address belongs to the object at ffff8881029e8000
[ 47.212818] which belongs to the cache test_cache of size 200
[ 47.214653] The buggy address is located 0 bytes inside of
[ 47.214653] 200-byte region [ffff8881029e8000, ffff8881029e80c8)
[ 47.216131]
[ 47.216415] The buggy address belongs to the physical page:
[ 47.217159] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e8
[ 47.218378] flags: 0x200000000000800(slab|node=0|zone=2)
[ 47.219099] page_type: 0xffffffff()
[ 47.219658] raw: 0200000000000800 ffff88810199d500 dead000000000122 0000000000000000
[ 47.220665] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[ 47.221627] page dumped because: kasan: bad access detected
[ 47.222327]
[ 47.222725] Memory state around the buggy address:
[ 47.223330] ffff8881029e7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 47.224368] ffff8881029e7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.225278] >ffff8881029e8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 47.226231] ^
[ 47.226749] ffff8881029e8080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[ 47.227588] ffff8881029e8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.228451] ==================================================================
Home
[ 46.515126] ==================================================================
[ 46.516964] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0xa3/0x170
[ 46.519490] Read of size 1 at addr ffffffff945a96ed by task kunit_try_catch/198
[ 46.520329]
[ 46.520725] CPU: 1 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 46.522210] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 46.523333] Call Trace:
[ 46.523731] <TASK>
[ 46.524059] dump_stack_lvl+0x4e/0x90
[ 46.525305] print_report+0xd2/0x660
[ 46.526084] ? __virt_addr_valid+0x156/0x1e0
[ 46.527136] ? kasan_addr_to_slab+0x11/0xb0
[ 46.527937] kasan_report+0xff/0x140
[ 46.528655] ? kasan_global_oob_right+0xa3/0x170
[ 46.530348] ? kasan_global_oob_right+0xa3/0x170
[ 46.531012] __asan_load1+0x66/0x70
[ 46.531481] kasan_global_oob_right+0xa3/0x170
[ 46.532818] ? __pfx_kasan_global_oob_right+0x10/0x10
[ 46.533725] ? ktime_get_ts64+0x118/0x140
[ 46.534851] kunit_try_run_case+0x126/0x290
[ 46.535424] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.536028] ? __kasan_check_write+0x18/0x20
[ 46.536634] ? trace_preempt_on+0x20/0xa0
[ 46.537211] ? __kthread_parkme+0x4f/0xd0
[ 46.538246] ? preempt_count_sub+0x50/0x80
[ 46.539420] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.540202] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 46.541234] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 46.542153] kthread+0x19e/0x1e0
[ 46.543363] ? __pfx_kthread+0x10/0x10
[ 46.544594] ret_from_fork+0x41/0x70
[ 46.546067] ? __pfx_kthread+0x10/0x10
[ 46.547193] ret_from_fork_asm+0x1b/0x30
[ 46.548152] </TASK>
[ 46.548468]
[ 46.548848] The buggy address belongs to the variable:
[ 46.550042] global_array+0xd/0x40
[ 46.550569]
[ 46.551271] The buggy address belongs to the physical page:
[ 46.552350] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1441a9
[ 46.553579] flags: 0x200000000004000(reserved|node=0|zone=2)
[ 46.555013] page_type: 0xffffffff()
[ 46.555740] raw: 0200000000004000 ffffea0005106a48 ffffea0005106a48 0000000000000000
[ 46.556930] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 46.558470] page dumped because: kasan: bad access detected
[ 46.559437]
[ 46.559819] Memory state around the buggy address:
[ 46.560793] ffffffff945a9580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 46.561845] ffffffff945a9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 46.562662] >ffffffff945a9680: 00 00 00 00 00 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9
[ 46.563983] ^
[ 46.565041] ffffffff945a9700: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9
[ 46.566066] ffffffff945a9780: f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[ 46.567118] ==================================================================
Home
[ 43.819833] ==================================================================
[ 43.821795] BUG: KASAN: invalid-free in kfree+0xfb/0x120
[ 43.822718] Free of addr ffff8881026b8001 by task kunit_try_catch/144
[ 43.823401]
[ 43.823809] CPU: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 43.825011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 43.826135] Call Trace:
[ 43.826553] <TASK>
[ 43.827066] dump_stack_lvl+0x4e/0x90
[ 43.827663] print_report+0xd2/0x660
[ 43.828399] ? __virt_addr_valid+0x156/0x1e0
[ 43.829145] ? kfree+0xfb/0x120
[ 43.829736] ? kasan_addr_to_slab+0x11/0xb0
[ 43.830437] ? kfree+0xfb/0x120
[ 43.831056] kasan_report_invalid_free+0xcf/0x100
[ 43.831697] ? kfree+0xfb/0x120
[ 43.832378] ? kfree+0xfb/0x120
[ 43.832972] __kasan_kfree_large+0x86/0xd0
[ 43.833516] free_large_kmalloc+0x46/0xd0
[ 43.834298] kfree+0xfb/0x120
[ 43.834950] kmalloc_pagealloc_invalid_free+0xa9/0x1a0
[ 43.835658] ? __pfx_kmalloc_pagealloc_invalid_free+0x10/0x10
[ 43.836451] ? __schedule+0x70b/0x1190
[ 43.837108] ? ktime_get_ts64+0x118/0x140
[ 43.837799] kunit_try_run_case+0x126/0x290
[ 43.838501] ? __pfx_kunit_try_run_case+0x10/0x10
[ 43.839294] ? __kasan_check_write+0x18/0x20
[ 43.839994] ? trace_preempt_on+0x20/0xa0
[ 43.840598] ? __kthread_parkme+0x4f/0xd0
[ 43.841198] ? preempt_count_sub+0x50/0x80
[ 43.841955] ? __pfx_kunit_try_run_case+0x10/0x10
[ 43.842667] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 43.843503] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 43.844351] kthread+0x19e/0x1e0
[ 43.844952] ? __pfx_kthread+0x10/0x10
[ 43.845560] ret_from_fork+0x41/0x70
[ 43.846236] ? __pfx_kthread+0x10/0x10
[ 43.846911] ret_from_fork_asm+0x1b/0x30
[ 43.847553] </TASK>
[ 43.847956]
[ 43.848297] The buggy address belongs to the physical page:
[ 43.849130] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026b8
[ 43.850336] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 43.851317] flags: 0x200000000000040(head|node=0|zone=2)
[ 43.852037] page_type: 0xffffffff()
[ 43.852469] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 43.853495] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 43.854327] page dumped because: kasan: bad access detected
[ 43.854976]
[ 43.855232] Memory state around the buggy address:
[ 43.855838] ffff8881026b7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.856933] ffff8881026b7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.857791] >ffff8881026b8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 43.858709] ^
[ 43.859203] ffff8881026b8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 43.860163] ffff8881026b8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 43.861160] ==================================================================
Home
[ 47.247046] ==================================================================
[ 47.249496] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xe4/0x260
[ 47.250510] Free of addr ffff888102a1d001 by task kunit_try_catch/214
[ 47.252022]
[ 47.252552] CPU: 1 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 47.254165] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 47.255030] Call Trace:
[ 47.255547] <TASK>
[ 47.256302] dump_stack_lvl+0x4e/0x90
[ 47.257026] print_report+0xd2/0x660
[ 47.258037] ? __virt_addr_valid+0x156/0x1e0
[ 47.258640] ? kmem_cache_invalid_free+0xe4/0x260
[ 47.259238] ? kasan_complete_mode_report_info+0x2a/0x200
[ 47.259974] ? kmem_cache_invalid_free+0xe4/0x260
[ 47.261121] kasan_report_invalid_free+0xcf/0x100
[ 47.261884] ? kmem_cache_invalid_free+0xe4/0x260
[ 47.263064] ? kmem_cache_invalid_free+0xe4/0x260
[ 47.263737] ____kasan_slab_free+0x1c0/0x1d0
[ 47.265085] ? kmem_cache_invalid_free+0xe4/0x260
[ 47.265687] __kasan_slab_free+0x16/0x20
[ 47.266870] kmem_cache_free+0x1a7/0x4b0
[ 47.267602] kmem_cache_invalid_free+0xe4/0x260
[ 47.268413] ? __pfx_kmem_cache_invalid_free+0x10/0x10
[ 47.269216] ? __schedule+0x70b/0x1190
[ 47.269835] ? ktime_get_ts64+0x118/0x140
[ 47.270909] kunit_try_run_case+0x126/0x290
[ 47.271680] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.272254] ? __kasan_check_write+0x18/0x20
[ 47.272831] ? trace_preempt_on+0x20/0xa0
[ 47.273356] ? __kthread_parkme+0x4f/0xd0
[ 47.274516] ? preempt_count_sub+0x50/0x80
[ 47.275429] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.276319] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 47.277352] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.278227] kthread+0x19e/0x1e0
[ 47.279172] ? __pfx_kthread+0x10/0x10
[ 47.280209] ret_from_fork+0x41/0x70
[ 47.280835] ? __pfx_kthread+0x10/0x10
[ 47.281391] ret_from_fork_asm+0x1b/0x30
[ 47.282402] </TASK>
[ 47.283116]
[ 47.283599] Allocated by task 214:
[ 47.284069] kasan_save_stack+0x3c/0x60
[ 47.284942] kasan_set_track+0x29/0x40
[ 47.285472] kasan_save_alloc_info+0x22/0x30
[ 47.286584] __kasan_slab_alloc+0x91/0xa0
[ 47.287432] kmem_cache_alloc+0x180/0x3b0
[ 47.288311] kmem_cache_invalid_free+0xbd/0x260
[ 47.289249] kunit_try_run_case+0x126/0x290
[ 47.290160] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.291005] kthread+0x19e/0x1e0
[ 47.292171] ret_from_fork+0x41/0x70
[ 47.292873] ret_from_fork_asm+0x1b/0x30
[ 47.293831]
[ 47.294129] The buggy address belongs to the object at ffff888102a1d000
[ 47.294129] which belongs to the cache test_cache of size 200
[ 47.295901] The buggy address is located 1 bytes inside of
[ 47.295901] 200-byte region [ffff888102a1d000, ffff888102a1d0c8)
[ 47.297450]
[ 47.297858] The buggy address belongs to the physical page:
[ 47.298797] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1d
[ 47.300212] flags: 0x200000000000800(slab|node=0|zone=2)
[ 47.301061] page_type: 0xffffffff()
[ 47.301569] raw: 0200000000000800 ffff88815af08000 dead000000000122 0000000000000000
[ 47.302829] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[ 47.304323] page dumped because: kasan: bad access detected
[ 47.305457]
[ 47.305912] Memory state around the buggy address:
[ 47.306474] ffff888102a1cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.307632] ffff888102a1cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.309291] >ffff888102a1d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 47.310034] ^
[ 47.310482] ffff888102a1d080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[ 47.311247] ffff888102a1d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.312254] ==================================================================
Home
[ 45.494467] ==================================================================
[ 45.496017] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0xeb/0x1f0
[ 45.496847] Read of size 18446744073709551614 at addr ffff888102422c04 by task kunit_try_catch/176
[ 45.498549]
[ 45.499048] CPU: 1 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 45.499961] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 45.501150] Call Trace:
[ 45.501918] <TASK>
[ 45.502282] dump_stack_lvl+0x4e/0x90
[ 45.502848] print_report+0xd2/0x660
[ 45.503352] ? __virt_addr_valid+0x156/0x1e0
[ 45.504028] ? kasan_complete_mode_report_info+0x2a/0x200
[ 45.504754] kasan_report+0xff/0x140
[ 45.505348] ? kmalloc_memmove_negative_size+0xeb/0x1f0
[ 45.506094] ? kmalloc_memmove_negative_size+0xeb/0x1f0
[ 45.506939] kasan_check_range+0x10c/0x1c0
[ 45.507538] __asan_memmove+0x27/0x70
[ 45.508232] kmalloc_memmove_negative_size+0xeb/0x1f0
[ 45.508933] ? __pfx_kmalloc_memmove_negative_size+0x10/0x10
[ 45.509637] ? __schedule+0x70b/0x1190
[ 45.510272] ? ktime_get_ts64+0x118/0x140
[ 45.511031] kunit_try_run_case+0x126/0x290
[ 45.511576] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.512279] ? __kasan_check_write+0x18/0x20
[ 45.512964] ? trace_preempt_on+0x20/0xa0
[ 45.513678] ? __kthread_parkme+0x4f/0xd0
[ 45.514228] ? preempt_count_sub+0x50/0x80
[ 45.514929] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.515660] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 45.516425] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.517238] kthread+0x19e/0x1e0
[ 45.517738] ? __pfx_kthread+0x10/0x10
[ 45.518373] ret_from_fork+0x41/0x70
[ 45.518985] ? __pfx_kthread+0x10/0x10
[ 45.519607] ret_from_fork_asm+0x1b/0x30
[ 45.520279] </TASK>
[ 45.521457]
[ 45.521947] Allocated by task 176:
[ 45.522394] kasan_save_stack+0x3c/0x60
[ 45.522926] kasan_set_track+0x29/0x40
[ 45.523414] kasan_save_alloc_info+0x22/0x30
[ 45.524169] __kasan_kmalloc+0xb7/0xc0
[ 45.524650] kmalloc_trace+0x4c/0xb0
[ 45.525322] kmalloc_memmove_negative_size+0x9f/0x1f0
[ 45.526073] kunit_try_run_case+0x126/0x290
[ 45.526675] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.527418] kthread+0x19e/0x1e0
[ 45.528050] ret_from_fork+0x41/0x70
[ 45.528548] ret_from_fork_asm+0x1b/0x30
[ 45.529239]
[ 45.529477] The buggy address belongs to the object at ffff888102422c00
[ 45.529477] which belongs to the cache kmalloc-64 of size 64
[ 45.530829] The buggy address is located 4 bytes inside of
[ 45.530829] 64-byte region [ffff888102422c00, ffff888102422c40)
[ 45.532070]
[ 45.532405] The buggy address belongs to the physical page:
[ 45.533107] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102422
[ 45.534178] flags: 0x200000000000800(slab|node=0|zone=2)
[ 45.535018] page_type: 0xffffffff()
[ 45.535558] raw: 0200000000000800 ffff888100041640 dead000000000122 0000000000000000
[ 45.536332] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[ 45.537297] page dumped because: kasan: bad access detected
[ 45.537893]
[ 45.538199] Memory state around the buggy address:
[ 45.538705] ffff888102422b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 45.539602] ffff888102422b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 45.540361] >ffff888102422c00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 45.541119] ^
[ 45.541591] ffff888102422c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.542432] ffff888102422d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.543285] ==================================================================
Home
[ 48.109894] ==================================================================
[ 48.110849] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x11c/0x5e0
[ 48.112041] Write of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[ 48.112832]
[ 48.113262] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 48.114559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 48.116305] Call Trace:
[ 48.116705] <TASK>
[ 48.117172] dump_stack_lvl+0x4e/0x90
[ 48.118489] print_report+0xd2/0x660
[ 48.119154] ? __virt_addr_valid+0x156/0x1e0
[ 48.119875] ? kasan_complete_mode_report_info+0x2a/0x200
[ 48.120656] kasan_report+0xff/0x140
[ 48.121393] ? kasan_bitops_modify.constprop.0+0x11c/0x5e0
[ 48.122211] ? kasan_bitops_modify.constprop.0+0x11c/0x5e0
[ 48.123336] kasan_check_range+0x10c/0x1c0
[ 48.124063] __kasan_check_write+0x18/0x20
[ 48.124558] kasan_bitops_modify.constprop.0+0x11c/0x5e0
[ 48.125265] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 48.126433] ? kasan_save_alloc_info+0x22/0x30
[ 48.127081] ? kasan_set_track+0x29/0x40
[ 48.127864] ? kasan_set_track+0x29/0x40
[ 48.128569] kasan_bitops_generic+0xa9/0x130
[ 48.129313] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 48.130142] ? ktime_get_ts64+0x118/0x140
[ 48.131015] kunit_try_run_case+0x126/0x290
[ 48.132267] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.133378] ? __kasan_check_write+0x18/0x20
[ 48.134464] ? trace_preempt_on+0x20/0xa0
[ 48.135646] ? __kthread_parkme+0x4f/0xd0
[ 48.136815] ? preempt_count_sub+0x50/0x80
[ 48.137880] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.138979] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 48.139799] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.140451] kthread+0x19e/0x1e0
[ 48.141448] ? __pfx_kthread+0x10/0x10
[ 48.142428] ret_from_fork+0x41/0x70
[ 48.143355] ? __pfx_kthread+0x10/0x10
[ 48.143937] ret_from_fork_asm+0x1b/0x30
[ 48.145019] </TASK>
[ 48.145487]
[ 48.145955] Allocated by task 224:
[ 48.147206] kasan_save_stack+0x3c/0x60
[ 48.148143] kasan_set_track+0x29/0x40
[ 48.148913] kasan_save_alloc_info+0x22/0x30
[ 48.149505] __kasan_kmalloc+0xb7/0xc0
[ 48.150064] kmalloc_trace+0x4c/0xb0
[ 48.150909] kasan_bitops_generic+0x8e/0x130
[ 48.151589] kunit_try_run_case+0x126/0x290
[ 48.152820] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.153487] kthread+0x19e/0x1e0
[ 48.153992] ret_from_fork+0x41/0x70
[ 48.154564] ret_from_fork_asm+0x1b/0x30
[ 48.155322]
[ 48.155633] The buggy address belongs to the object at ffff8881023f99a0
[ 48.155633] which belongs to the cache kmalloc-16 of size 16
[ 48.157653] The buggy address is located 8 bytes inside of
[ 48.157653] allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[ 48.159026]
[ 48.159432] The buggy address belongs to the physical page:
[ 48.161668] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[ 48.162895] flags: 0x200000000000800(slab|node=0|zone=2)
[ 48.163380] page_type: 0xffffffff()
[ 48.163806] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 48.164415] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 48.165033] page dumped because: kasan: bad access detected
[ 48.166647]
[ 48.167029] Memory state around the buggy address:
[ 48.168410] ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 48.169730] ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 48.171092] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 48.172264] ^
[ 48.172827] ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.174055] ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.175467] ==================================================================
---
[ 48.177414] ==================================================================
[ 48.179339] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x15a/0x5e0
[ 48.181424] Write of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[ 48.183368]
[ 48.183937] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 48.185031] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 48.185930] Call Trace:
[ 48.186413] <TASK>
[ 48.187280] dump_stack_lvl+0x4e/0x90
[ 48.188021] print_report+0xd2/0x660
[ 48.188540] ? __virt_addr_valid+0x156/0x1e0
[ 48.189400] ? kasan_complete_mode_report_info+0x2a/0x200
[ 48.190182] kasan_report+0xff/0x140
[ 48.190704] ? kasan_bitops_modify.constprop.0+0x15a/0x5e0
[ 48.191438] ? kasan_bitops_modify.constprop.0+0x15a/0x5e0
[ 48.192495] kasan_check_range+0x10c/0x1c0
[ 48.193359] __kasan_check_write+0x18/0x20
[ 48.194210] kasan_bitops_modify.constprop.0+0x15a/0x5e0
[ 48.195144] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 48.196111] ? kasan_save_alloc_info+0x22/0x30
[ 48.196909] ? kasan_set_track+0x29/0x40
[ 48.197458] ? kasan_set_track+0x29/0x40
[ 48.198099] kasan_bitops_generic+0xa9/0x130
[ 48.199065] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 48.199826] ? ktime_get_ts64+0x118/0x140
[ 48.200674] kunit_try_run_case+0x126/0x290
[ 48.201693] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.202463] ? __kasan_check_write+0x18/0x20
[ 48.202936] ? trace_preempt_on+0x20/0xa0
[ 48.203346] ? __kthread_parkme+0x4f/0xd0
[ 48.203786] ? preempt_count_sub+0x50/0x80
[ 48.204222] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.205003] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 48.206226] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.207344] kthread+0x19e/0x1e0
[ 48.208729] ? __pfx_kthread+0x10/0x10
[ 48.209637] ret_from_fork+0x41/0x70
[ 48.210266] ? __pfx_kthread+0x10/0x10
[ 48.210902] ret_from_fork_asm+0x1b/0x30
[ 48.211571] </TASK>
[ 48.211906]
[ 48.212321] Allocated by task 224:
[ 48.214169] kasan_save_stack+0x3c/0x60
[ 48.214780] kasan_set_track+0x29/0x40
[ 48.215678] kasan_save_alloc_info+0x22/0x30
[ 48.216479] __kasan_kmalloc+0xb7/0xc0
[ 48.217274] kmalloc_trace+0x4c/0xb0
[ 48.217724] kasan_bitops_generic+0x8e/0x130
[ 48.218987] kunit_try_run_case+0x126/0x290
[ 48.219513] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.220171] kthread+0x19e/0x1e0
[ 48.220640] ret_from_fork+0x41/0x70
[ 48.221109] ret_from_fork_asm+0x1b/0x30
[ 48.222320]
[ 48.222705] The buggy address belongs to the object at ffff8881023f99a0
[ 48.222705] which belongs to the cache kmalloc-16 of size 16
[ 48.224724] The buggy address is located 8 bytes inside of
[ 48.224724] allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[ 48.226112]
[ 48.226340] The buggy address belongs to the physical page:
[ 48.228117] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[ 48.229264] flags: 0x200000000000800(slab|node=0|zone=2)
[ 48.229839] page_type: 0xffffffff()
[ 48.230180] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 48.231403] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 48.232625] page dumped because: kasan: bad access detected
[ 48.233089]
[ 48.233417] Memory state around the buggy address:
[ 48.234429] ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 48.235633] ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 48.237153] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 48.238428] ^
[ 48.239488] ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.240130] ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.242351] ==================================================================
---
[ 47.990841] ==================================================================
[ 47.992189] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x9c/0x5e0
[ 47.993364] Write of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[ 47.994102]
[ 47.994688] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 47.995831] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 47.996857] Call Trace:
[ 47.997377] <TASK>
[ 47.997833] dump_stack_lvl+0x4e/0x90
[ 47.998488] print_report+0xd2/0x660
[ 47.999622] ? __virt_addr_valid+0x156/0x1e0
[ 48.000344] ? kasan_complete_mode_report_info+0x2a/0x200
[ 48.001185] kasan_report+0xff/0x140
[ 48.001732] ? kasan_bitops_modify.constprop.0+0x9c/0x5e0
[ 48.002489] ? kasan_bitops_modify.constprop.0+0x9c/0x5e0
[ 48.003135] kasan_check_range+0x10c/0x1c0
[ 48.003846] __kasan_check_write+0x18/0x20
[ 48.004506] kasan_bitops_modify.constprop.0+0x9c/0x5e0
[ 48.005392] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 48.006210] ? kasan_save_alloc_info+0x22/0x30
[ 48.006955] ? kasan_set_track+0x29/0x40
[ 48.007740] ? kasan_set_track+0x29/0x40
[ 48.008402] kasan_bitops_generic+0xa9/0x130
[ 48.008859] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 48.009649] ? ktime_get_ts64+0x118/0x140
[ 48.010279] kunit_try_run_case+0x126/0x290
[ 48.010859] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.011714] ? __kasan_check_write+0x18/0x20
[ 48.012509] ? trace_preempt_on+0x20/0xa0
[ 48.013032] ? __kthread_parkme+0x4f/0xd0
[ 48.013801] ? preempt_count_sub+0x50/0x80
[ 48.014442] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.015171] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 48.015987] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.017028] kthread+0x19e/0x1e0
[ 48.017614] ? __pfx_kthread+0x10/0x10
[ 48.018176] ret_from_fork+0x41/0x70
[ 48.019212] ? __pfx_kthread+0x10/0x10
[ 48.020315] ret_from_fork_asm+0x1b/0x30
[ 48.020807] </TASK>
[ 48.021225]
[ 48.021483] Allocated by task 224:
[ 48.022121] kasan_save_stack+0x3c/0x60
[ 48.022686] kasan_set_track+0x29/0x40
[ 48.023232] kasan_save_alloc_info+0x22/0x30
[ 48.023958] __kasan_kmalloc+0xb7/0xc0
[ 48.024645] kmalloc_trace+0x4c/0xb0
[ 48.025306] kasan_bitops_generic+0x8e/0x130
[ 48.026102] kunit_try_run_case+0x126/0x290
[ 48.026812] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.027591] kthread+0x19e/0x1e0
[ 48.028212] ret_from_fork+0x41/0x70
[ 48.028792] ret_from_fork_asm+0x1b/0x30
[ 48.029362]
[ 48.029745] The buggy address belongs to the object at ffff8881023f99a0
[ 48.029745] which belongs to the cache kmalloc-16 of size 16
[ 48.031281] The buggy address is located 8 bytes inside of
[ 48.031281] allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[ 48.032919]
[ 48.033261] The buggy address belongs to the physical page:
[ 48.033990] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[ 48.035165] flags: 0x200000000000800(slab|node=0|zone=2)
[ 48.035924] page_type: 0xffffffff()
[ 48.036407] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 48.037447] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 48.038341] page dumped because: kasan: bad access detected
[ 48.039005]
[ 48.039195] Memory state around the buggy address:
[ 48.039989] ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 48.041029] ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 48.041901] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 48.042786] ^
[ 48.043403] ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.044301] ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.045187] ==================================================================
---
[ 48.243589] ==================================================================
[ 48.244377] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0x5e0
[ 48.246686] Write of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[ 48.248053]
[ 48.249044] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 48.250514] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 48.251333] Call Trace:
[ 48.251790] <TASK>
[ 48.252120] dump_stack_lvl+0x4e/0x90
[ 48.252738] print_report+0xd2/0x660
[ 48.253340] ? __virt_addr_valid+0x156/0x1e0
[ 48.254670] ? kasan_complete_mode_report_info+0x2a/0x200
[ 48.255377] kasan_report+0xff/0x140
[ 48.256044] ? kasan_bitops_modify.constprop.0+0x19c/0x5e0
[ 48.256737] ? kasan_bitops_modify.constprop.0+0x19c/0x5e0
[ 48.257455] kasan_check_range+0x10c/0x1c0
[ 48.258211] __kasan_check_write+0x18/0x20
[ 48.258804] kasan_bitops_modify.constprop.0+0x19c/0x5e0
[ 48.259560] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 48.260418] ? kasan_save_alloc_info+0x22/0x30
[ 48.261205] ? kasan_set_track+0x29/0x40
[ 48.261922] ? kasan_set_track+0x29/0x40
[ 48.262598] kasan_bitops_generic+0xa9/0x130
[ 48.263424] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 48.264377] ? ktime_get_ts64+0x118/0x140
[ 48.264955] kunit_try_run_case+0x126/0x290
[ 48.265724] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.266332] ? __kasan_check_write+0x18/0x20
[ 48.267086] ? trace_preempt_on+0x20/0xa0
[ 48.267630] ? __kthread_parkme+0x4f/0xd0
[ 48.268249] ? preempt_count_sub+0x50/0x80
[ 48.269040] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.269757] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 48.270736] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.271546] kthread+0x19e/0x1e0
[ 48.272238] ? __pfx_kthread+0x10/0x10
[ 48.272907] ret_from_fork+0x41/0x70
[ 48.273403] ? __pfx_kthread+0x10/0x10
[ 48.274120] ret_from_fork_asm+0x1b/0x30
[ 48.274778] </TASK>
[ 48.275128]
[ 48.275395] Allocated by task 224:
[ 48.275962] kasan_save_stack+0x3c/0x60
[ 48.276632] kasan_set_track+0x29/0x40
[ 48.277089] kasan_save_alloc_info+0x22/0x30
[ 48.277840] __kasan_kmalloc+0xb7/0xc0
[ 48.278360] kmalloc_trace+0x4c/0xb0
[ 48.279166] kasan_bitops_generic+0x8e/0x130
[ 48.279759] kunit_try_run_case+0x126/0x290
[ 48.280424] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.281947] kthread+0x19e/0x1e0
[ 48.282478] ret_from_fork+0x41/0x70
[ 48.283368] ret_from_fork_asm+0x1b/0x30
[ 48.283998]
[ 48.284199] The buggy address belongs to the object at ffff8881023f99a0
[ 48.284199] which belongs to the cache kmalloc-16 of size 16
[ 48.285557] The buggy address is located 8 bytes inside of
[ 48.285557] allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[ 48.287466]
[ 48.287803] The buggy address belongs to the physical page:
[ 48.288462] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[ 48.290155] flags: 0x200000000000800(slab|node=0|zone=2)
[ 48.290800] page_type: 0xffffffff()
[ 48.291366] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 48.292318] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 48.293152] page dumped because: kasan: bad access detected
[ 48.294336]
[ 48.294568] Memory state around the buggy address:
[ 48.295224] ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 48.296236] ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 48.297283] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 48.298071] ^
[ 48.299319] ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.300181] ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.300922] ==================================================================
---
[ 48.301909] ==================================================================
[ 48.302597] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1da/0x5e0
[ 48.304273] Write of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[ 48.305470]
[ 48.305967] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 48.307170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 48.307956] Call Trace:
[ 48.308433] <TASK>
[ 48.309018] dump_stack_lvl+0x4e/0x90
[ 48.309597] print_report+0xd2/0x660
[ 48.310190] ? __virt_addr_valid+0x156/0x1e0
[ 48.310813] ? kasan_complete_mode_report_info+0x2a/0x200
[ 48.311391] kasan_report+0xff/0x140
[ 48.312287] ? kasan_bitops_modify.constprop.0+0x1da/0x5e0
[ 48.313988] ? kasan_bitops_modify.constprop.0+0x1da/0x5e0
[ 48.314863] kasan_check_range+0x10c/0x1c0
[ 48.315575] __kasan_check_write+0x18/0x20
[ 48.316289] kasan_bitops_modify.constprop.0+0x1da/0x5e0
[ 48.317661] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 48.318488] ? kasan_save_alloc_info+0x22/0x30
[ 48.319129] ? kasan_set_track+0x29/0x40
[ 48.319667] ? kasan_set_track+0x29/0x40
[ 48.320355] kasan_bitops_generic+0xa9/0x130
[ 48.320978] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 48.321773] ? ktime_get_ts64+0x118/0x140
[ 48.322435] kunit_try_run_case+0x126/0x290
[ 48.323828] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.324709] ? __kasan_check_write+0x18/0x20
[ 48.325378] ? trace_preempt_on+0x20/0xa0
[ 48.325948] ? __kthread_parkme+0x4f/0xd0
[ 48.327113] ? preempt_count_sub+0x50/0x80
[ 48.327963] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.328982] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 48.330014] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.330973] kthread+0x19e/0x1e0
[ 48.331681] ? __pfx_kthread+0x10/0x10
[ 48.332643] ret_from_fork+0x41/0x70
[ 48.333866] ? __pfx_kthread+0x10/0x10
[ 48.334429] ret_from_fork_asm+0x1b/0x30
[ 48.335466] </TASK>
[ 48.335829]
[ 48.336045] Allocated by task 224:
[ 48.336841] kasan_save_stack+0x3c/0x60
[ 48.337768] kasan_set_track+0x29/0x40
[ 48.338513] kasan_save_alloc_info+0x22/0x30
[ 48.339606] __kasan_kmalloc+0xb7/0xc0
[ 48.340261] kmalloc_trace+0x4c/0xb0
[ 48.341665] kasan_bitops_generic+0x8e/0x130
[ 48.342323] kunit_try_run_case+0x126/0x290
[ 48.342941] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.343780] kthread+0x19e/0x1e0
[ 48.344449] ret_from_fork+0x41/0x70
[ 48.345445] ret_from_fork_asm+0x1b/0x30
[ 48.346721]
[ 48.347113] The buggy address belongs to the object at ffff8881023f99a0
[ 48.347113] which belongs to the cache kmalloc-16 of size 16
[ 48.348642] The buggy address is located 8 bytes inside of
[ 48.348642] allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[ 48.350066]
[ 48.350339] The buggy address belongs to the physical page:
[ 48.350991] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[ 48.352330] flags: 0x200000000000800(slab|node=0|zone=2)
[ 48.353142] page_type: 0xffffffff()
[ 48.353839] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 48.354830] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 48.355706] page dumped because: kasan: bad access detected
[ 48.356283]
[ 48.356650] Memory state around the buggy address:
[ 48.357247] ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 48.358653] ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 48.359625] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 48.360656] ^
[ 48.361426] ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.363079] ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.363781] ==================================================================
---
[ 48.046930] ==================================================================
[ 48.047544] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xda/0x5e0
[ 48.049042] Write of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[ 48.050056]
[ 48.050309] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 48.051842] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 48.053371] Call Trace:
[ 48.053756] <TASK>
[ 48.054047] dump_stack_lvl+0x4e/0x90
[ 48.054983] print_report+0xd2/0x660
[ 48.055830] ? __virt_addr_valid+0x156/0x1e0
[ 48.056692] ? kasan_complete_mode_report_info+0x2a/0x200
[ 48.057655] kasan_report+0xff/0x140
[ 48.058455] ? kasan_bitops_modify.constprop.0+0xda/0x5e0
[ 48.059209] ? kasan_bitops_modify.constprop.0+0xda/0x5e0
[ 48.060567] kasan_check_range+0x10c/0x1c0
[ 48.061199] __kasan_check_write+0x18/0x20
[ 48.062439] kasan_bitops_modify.constprop.0+0xda/0x5e0
[ 48.063305] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 48.064055] ? kasan_save_alloc_info+0x22/0x30
[ 48.065306] ? kasan_set_track+0x29/0x40
[ 48.065811] ? kasan_set_track+0x29/0x40
[ 48.066363] kasan_bitops_generic+0xa9/0x130
[ 48.067015] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 48.067708] ? ktime_get_ts64+0x118/0x140
[ 48.068282] kunit_try_run_case+0x126/0x290
[ 48.069385] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.070111] ? __kasan_check_write+0x18/0x20
[ 48.070773] ? trace_preempt_on+0x20/0xa0
[ 48.071396] ? __kthread_parkme+0x4f/0xd0
[ 48.072007] ? preempt_count_sub+0x50/0x80
[ 48.072496] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.073885] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 48.074709] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.075464] kthread+0x19e/0x1e0
[ 48.075975] ? __pfx_kthread+0x10/0x10
[ 48.076601] ret_from_fork+0x41/0x70
[ 48.077814] ? __pfx_kthread+0x10/0x10
[ 48.078393] ret_from_fork_asm+0x1b/0x30
[ 48.079015] </TASK>
[ 48.079305]
[ 48.079637] Allocated by task 224:
[ 48.080000] kasan_save_stack+0x3c/0x60
[ 48.081178] kasan_set_track+0x29/0x40
[ 48.081666] kasan_save_alloc_info+0x22/0x30
[ 48.082666] __kasan_kmalloc+0xb7/0xc0
[ 48.083223] kmalloc_trace+0x4c/0xb0
[ 48.083949] kasan_bitops_generic+0x8e/0x130
[ 48.084510] kunit_try_run_case+0x126/0x290
[ 48.085686] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.086634] kthread+0x19e/0x1e0
[ 48.087007] ret_from_fork+0x41/0x70
[ 48.087707] ret_from_fork_asm+0x1b/0x30
[ 48.088252]
[ 48.088617] The buggy address belongs to the object at ffff8881023f99a0
[ 48.088617] which belongs to the cache kmalloc-16 of size 16
[ 48.091236] The buggy address is located 8 bytes inside of
[ 48.091236] allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[ 48.092892]
[ 48.093116] The buggy address belongs to the physical page:
[ 48.094309] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[ 48.095424] flags: 0x200000000000800(slab|node=0|zone=2)
[ 48.096073] page_type: 0xffffffff()
[ 48.096552] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 48.097392] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 48.098738] page dumped because: kasan: bad access detected
[ 48.099671]
[ 48.100175] Memory state around the buggy address:
[ 48.100749] ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 48.101552] ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 48.102948] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 48.103878] ^
[ 48.104664] ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.105582] ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.107064] ==================================================================
---
[ 48.366205] ==================================================================
[ 48.367358] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x21c/0x5e0
[ 48.368468] Write of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[ 48.369440]
[ 48.370429] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 48.371515] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 48.372882] Call Trace:
[ 48.373731] <TASK>
[ 48.374348] dump_stack_lvl+0x4e/0x90
[ 48.375477] print_report+0xd2/0x660
[ 48.376140] ? __virt_addr_valid+0x156/0x1e0
[ 48.376487] ? kasan_complete_mode_report_info+0x2a/0x200
[ 48.377494] kasan_report+0xff/0x140
[ 48.378161] ? kasan_bitops_modify.constprop.0+0x21c/0x5e0
[ 48.379003] ? kasan_bitops_modify.constprop.0+0x21c/0x5e0
[ 48.380032] kasan_check_range+0x10c/0x1c0
[ 48.380612] __kasan_check_write+0x18/0x20
[ 48.381338] kasan_bitops_modify.constprop.0+0x21c/0x5e0
[ 48.382449] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 48.383413] ? kasan_save_alloc_info+0x22/0x30
[ 48.384386] ? kasan_set_track+0x29/0x40
[ 48.384998] ? kasan_set_track+0x29/0x40
[ 48.385639] kasan_bitops_generic+0xa9/0x130
[ 48.386260] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 48.387592] ? ktime_get_ts64+0x118/0x140
[ 48.388412] kunit_try_run_case+0x126/0x290
[ 48.389242] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.389895] ? __kasan_check_write+0x18/0x20
[ 48.390584] ? trace_preempt_on+0x20/0xa0
[ 48.391229] ? __kthread_parkme+0x4f/0xd0
[ 48.392073] ? preempt_count_sub+0x50/0x80
[ 48.392797] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.393513] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 48.394642] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.395575] kthread+0x19e/0x1e0
[ 48.396058] ? __pfx_kthread+0x10/0x10
[ 48.396585] ret_from_fork+0x41/0x70
[ 48.397466] ? __pfx_kthread+0x10/0x10
[ 48.398295] ret_from_fork_asm+0x1b/0x30
[ 48.399369] </TASK>
[ 48.399817]
[ 48.400324] Allocated by task 224:
[ 48.400806] kasan_save_stack+0x3c/0x60
[ 48.401610] kasan_set_track+0x29/0x40
[ 48.402312] kasan_save_alloc_info+0x22/0x30
[ 48.403169] __kasan_kmalloc+0xb7/0xc0
[ 48.404385] kmalloc_trace+0x4c/0xb0
[ 48.405115] kasan_bitops_generic+0x8e/0x130
[ 48.405902] kunit_try_run_case+0x126/0x290
[ 48.406488] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.407944] kthread+0x19e/0x1e0
[ 48.408692] ret_from_fork+0x41/0x70
[ 48.409263] ret_from_fork_asm+0x1b/0x30
[ 48.409863]
[ 48.410206] The buggy address belongs to the object at ffff8881023f99a0
[ 48.410206] which belongs to the cache kmalloc-16 of size 16
[ 48.412030] The buggy address is located 8 bytes inside of
[ 48.412030] allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[ 48.414126]
[ 48.414494] The buggy address belongs to the physical page:
[ 48.415117] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[ 48.416431] flags: 0x200000000000800(slab|node=0|zone=2)
[ 48.417181] page_type: 0xffffffff()
[ 48.418226] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 48.419678] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 48.420545] page dumped because: kasan: bad access detected
[ 48.421463]
[ 48.421755] Memory state around the buggy address:
[ 48.422421] ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 48.423426] ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 48.424948] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 48.425750] ^
[ 48.426484] ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.427580] ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.428420] ==================================================================
---
[ 48.430170] ==================================================================
[ 48.431083] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x25a/0x5e0
[ 48.431951] Write of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[ 48.433424]
[ 48.433712] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 48.434756] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 48.436121] Call Trace:
[ 48.436459] <TASK>
[ 48.436733] dump_stack_lvl+0x4e/0x90
[ 48.437378] print_report+0xd2/0x660
[ 48.437935] ? __virt_addr_valid+0x156/0x1e0
[ 48.438659] ? kasan_complete_mode_report_info+0x2a/0x200
[ 48.439999] kasan_report+0xff/0x140
[ 48.440502] ? kasan_bitops_modify.constprop.0+0x25a/0x5e0
[ 48.441237] ? kasan_bitops_modify.constprop.0+0x25a/0x5e0
[ 48.441968] kasan_check_range+0x10c/0x1c0
[ 48.442652] __kasan_check_write+0x18/0x20
[ 48.443434] kasan_bitops_modify.constprop.0+0x25a/0x5e0
[ 48.444691] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 48.445442] ? kasan_save_alloc_info+0x22/0x30
[ 48.446020] ? kasan_set_track+0x29/0x40
[ 48.446883] ? kasan_set_track+0x29/0x40
[ 48.447557] kasan_bitops_generic+0xa9/0x130
[ 48.448796] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 48.449406] ? ktime_get_ts64+0x118/0x140
[ 48.450077] kunit_try_run_case+0x126/0x290
[ 48.450678] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.451286] ? __kasan_check_write+0x18/0x20
[ 48.452682] ? trace_preempt_on+0x20/0xa0
[ 48.453233] ? __kthread_parkme+0x4f/0xd0
[ 48.453861] ? preempt_count_sub+0x50/0x80
[ 48.454588] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.455292] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 48.456037] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.457959] kthread+0x19e/0x1e0
[ 48.458500] ? __pfx_kthread+0x10/0x10
[ 48.459016] ret_from_fork+0x41/0x70
[ 48.459653] ? __pfx_kthread+0x10/0x10
[ 48.460216] ret_from_fork_asm+0x1b/0x30
[ 48.461398] </TASK>
[ 48.461665]
[ 48.462055] Allocated by task 224:
[ 48.462620] kasan_save_stack+0x3c/0x60
[ 48.463205] kasan_set_track+0x29/0x40
[ 48.463683] kasan_save_alloc_info+0x22/0x30
[ 48.464568] __kasan_kmalloc+0xb7/0xc0
[ 48.465855] kmalloc_trace+0x4c/0xb0
[ 48.466428] kasan_bitops_generic+0x8e/0x130
[ 48.466982] kunit_try_run_case+0x126/0x290
[ 48.467799] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.468474] kthread+0x19e/0x1e0
[ 48.469785] ret_from_fork+0x41/0x70
[ 48.470406] ret_from_fork_asm+0x1b/0x30
[ 48.470862]
[ 48.471259] The buggy address belongs to the object at ffff8881023f99a0
[ 48.471259] which belongs to the cache kmalloc-16 of size 16
[ 48.472565] The buggy address is located 8 bytes inside of
[ 48.472565] allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[ 48.474726]
[ 48.475234] The buggy address belongs to the physical page:
[ 48.475942] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[ 48.476876] flags: 0x200000000000800(slab|node=0|zone=2)
[ 48.477456] page_type: 0xffffffff()
[ 48.478691] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 48.479613] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 48.480278] page dumped because: kasan: bad access detected
[ 48.480691]
[ 48.480833] Memory state around the buggy address:
[ 48.481433] ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 48.482673] ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 48.484001] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 48.484879] ^
[ 48.485546] ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.486578] ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.487790] ==================================================================
Home
[ 49.007333] ==================================================================
[ 49.009053] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0
[ 49.010380] Read of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[ 49.011658]
[ 49.012374] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 49.013440] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 49.014441] Call Trace:
[ 49.015174] <TASK>
[ 49.015640] dump_stack_lvl+0x4e/0x90
[ 49.016308] print_report+0xd2/0x660
[ 49.016825] ? __virt_addr_valid+0x156/0x1e0
[ 49.017703] ? kasan_complete_mode_report_info+0x2a/0x200
[ 49.019460] kasan_report+0xff/0x140
[ 49.020271] ? kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0
[ 49.021073] ? kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0
[ 49.022561] __asan_load8+0x82/0xb0
[ 49.023097] kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0
[ 49.023822] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 49.025105] ? kasan_save_alloc_info+0x22/0x30
[ 49.025788] ? kasan_set_track+0x29/0x40
[ 49.026513] ? kasan_set_track+0x29/0x40
[ 49.027557] kasan_bitops_generic+0xb4/0x130
[ 49.028312] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 49.029179] ? ktime_get_ts64+0x118/0x140
[ 49.030261] kunit_try_run_case+0x126/0x290
[ 49.031328] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.032558] ? __kasan_check_write+0x18/0x20
[ 49.033228] ? trace_preempt_on+0x20/0xa0
[ 49.034123] ? __kthread_parkme+0x4f/0xd0
[ 49.034650] ? preempt_count_sub+0x50/0x80
[ 49.035285] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.035801] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 49.037208] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.038665] kthread+0x19e/0x1e0
[ 49.039423] ? __pfx_kthread+0x10/0x10
[ 49.040107] ret_from_fork+0x41/0x70
[ 49.040700] ? __pfx_kthread+0x10/0x10
[ 49.041283] ret_from_fork_asm+0x1b/0x30
[ 49.041897] </TASK>
[ 49.042259]
[ 49.042510] Allocated by task 224:
[ 49.043684] kasan_save_stack+0x3c/0x60
[ 49.044229] kasan_set_track+0x29/0x40
[ 49.044708] kasan_save_alloc_info+0x22/0x30
[ 49.045704] __kasan_kmalloc+0xb7/0xc0
[ 49.046379] kmalloc_trace+0x4c/0xb0
[ 49.047644] kasan_bitops_generic+0x8e/0x130
[ 49.048398] kunit_try_run_case+0x126/0x290
[ 49.049284] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.050420] kthread+0x19e/0x1e0
[ 49.050818] ret_from_fork+0x41/0x70
[ 49.051206] ret_from_fork_asm+0x1b/0x30
[ 49.051493]
[ 49.052646] The buggy address belongs to the object at ffff8881023f99a0
[ 49.052646] which belongs to the cache kmalloc-16 of size 16
[ 49.054404] The buggy address is located 8 bytes inside of
[ 49.054404] allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[ 49.056125]
[ 49.056360] The buggy address belongs to the physical page:
[ 49.056902] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[ 49.058622] flags: 0x200000000000800(slab|node=0|zone=2)
[ 49.059265] page_type: 0xffffffff()
[ 49.059968] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 49.060950] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 49.061978] page dumped because: kasan: bad access detected
[ 49.062566]
[ 49.062927] Memory state around the buggy address:
[ 49.063356] ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 49.064333] ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 49.066012] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 49.067772] ^
[ 49.068536] ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.069589] ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.070332] ==================================================================
Home
[ 48.680267] ==================================================================
[ 48.681064] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0
[ 48.682125] Write of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[ 48.683133]
[ 48.683469] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 48.685914] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 48.686957] Call Trace:
[ 48.687378] <TASK>
[ 48.688421] dump_stack_lvl+0x4e/0x90
[ 48.689478] print_report+0xd2/0x660
[ 48.690163] ? __virt_addr_valid+0x156/0x1e0
[ 48.690900] ? kasan_complete_mode_report_info+0x2a/0x200
[ 48.691831] kasan_report+0xff/0x140
[ 48.692835] ? kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0
[ 48.693785] ? kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0
[ 48.694956] kasan_check_range+0x10c/0x1c0
[ 48.695790] __kasan_check_write+0x18/0x20
[ 48.696545] kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0
[ 48.697539] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 48.698472] ? kasan_save_alloc_info+0x22/0x30
[ 48.699495] ? kasan_set_track+0x29/0x40
[ 48.700441] ? kasan_set_track+0x29/0x40
[ 48.700997] kasan_bitops_generic+0xb4/0x130
[ 48.701810] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 48.702746] ? ktime_get_ts64+0x118/0x140
[ 48.703894] kunit_try_run_case+0x126/0x290
[ 48.704438] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.705339] ? __kasan_check_write+0x18/0x20
[ 48.706166] ? trace_preempt_on+0x20/0xa0
[ 48.707650] ? __kthread_parkme+0x4f/0xd0
[ 48.708495] ? preempt_count_sub+0x50/0x80
[ 48.709361] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.710302] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 48.711676] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.712539] kthread+0x19e/0x1e0
[ 48.712997] ? __pfx_kthread+0x10/0x10
[ 48.713666] ret_from_fork+0x41/0x70
[ 48.714508] ? __pfx_kthread+0x10/0x10
[ 48.715604] ret_from_fork_asm+0x1b/0x30
[ 48.716690] </TASK>
[ 48.717477]
[ 48.718175] Allocated by task 224:
[ 48.718781] kasan_save_stack+0x3c/0x60
[ 48.719361] kasan_set_track+0x29/0x40
[ 48.720038] kasan_save_alloc_info+0x22/0x30
[ 48.720488] __kasan_kmalloc+0xb7/0xc0
[ 48.721150] kmalloc_trace+0x4c/0xb0
[ 48.721808] kasan_bitops_generic+0x8e/0x130
[ 48.722953] kunit_try_run_case+0x126/0x290
[ 48.723403] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.724302] kthread+0x19e/0x1e0
[ 48.724891] ret_from_fork+0x41/0x70
[ 48.725354] ret_from_fork_asm+0x1b/0x30
[ 48.726107]
[ 48.726474] The buggy address belongs to the object at ffff8881023f99a0
[ 48.726474] which belongs to the cache kmalloc-16 of size 16
[ 48.728026] The buggy address is located 8 bytes inside of
[ 48.728026] allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[ 48.729387]
[ 48.729732] The buggy address belongs to the physical page:
[ 48.730605] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[ 48.731709] flags: 0x200000000000800(slab|node=0|zone=2)
[ 48.732475] page_type: 0xffffffff()
[ 48.733099] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 48.734175] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 48.735293] page dumped because: kasan: bad access detected
[ 48.736079]
[ 48.736442] Memory state around the buggy address:
[ 48.737201] ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 48.738187] ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 48.739201] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 48.740130] ^
[ 48.740789] ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.741785] ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.742762] ==================================================================
---
[ 48.810299] ==================================================================
[ 48.811722] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0
[ 48.813945] Write of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[ 48.814671]
[ 48.815053] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 48.816022] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 48.817370] Call Trace:
[ 48.817778] <TASK>
[ 48.818549] dump_stack_lvl+0x4e/0x90
[ 48.819147] print_report+0xd2/0x660
[ 48.819667] ? __virt_addr_valid+0x156/0x1e0
[ 48.820403] ? kasan_complete_mode_report_info+0x2a/0x200
[ 48.821760] kasan_report+0xff/0x140
[ 48.822212] ? kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0
[ 48.823279] ? kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0
[ 48.824198] kasan_check_range+0x10c/0x1c0
[ 48.825599] __kasan_check_write+0x18/0x20
[ 48.826208] kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0
[ 48.827137] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 48.828141] ? kasan_save_alloc_info+0x22/0x30
[ 48.828888] ? kasan_set_track+0x29/0x40
[ 48.830104] ? kasan_set_track+0x29/0x40
[ 48.830641] kasan_bitops_generic+0xb4/0x130
[ 48.831361] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 48.832072] ? ktime_get_ts64+0x118/0x140
[ 48.832746] kunit_try_run_case+0x126/0x290
[ 48.833901] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.834905] ? __kasan_check_write+0x18/0x20
[ 48.835694] ? trace_preempt_on+0x20/0xa0
[ 48.836544] ? __kthread_parkme+0x4f/0xd0
[ 48.837096] ? preempt_count_sub+0x50/0x80
[ 48.838031] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.839222] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 48.840366] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.841178] kthread+0x19e/0x1e0
[ 48.842421] ? __pfx_kthread+0x10/0x10
[ 48.842998] ret_from_fork+0x41/0x70
[ 48.843876] ? __pfx_kthread+0x10/0x10
[ 48.844414] ret_from_fork_asm+0x1b/0x30
[ 48.845044] </TASK>
[ 48.845464]
[ 48.845783] Allocated by task 224:
[ 48.846786] kasan_save_stack+0x3c/0x60
[ 48.847375] kasan_set_track+0x29/0x40
[ 48.847990] kasan_save_alloc_info+0x22/0x30
[ 48.848658] __kasan_kmalloc+0xb7/0xc0
[ 48.849161] kmalloc_trace+0x4c/0xb0
[ 48.850931] kasan_bitops_generic+0x8e/0x130
[ 48.851595] kunit_try_run_case+0x126/0x290
[ 48.852211] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.852971] kthread+0x19e/0x1e0
[ 48.853453] ret_from_fork+0x41/0x70
[ 48.854636] ret_from_fork_asm+0x1b/0x30
[ 48.855405]
[ 48.855645] The buggy address belongs to the object at ffff8881023f99a0
[ 48.855645] which belongs to the cache kmalloc-16 of size 16
[ 48.856994] The buggy address is located 8 bytes inside of
[ 48.856994] allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[ 48.859012]
[ 48.859270] The buggy address belongs to the physical page:
[ 48.859786] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[ 48.860881] flags: 0x200000000000800(slab|node=0|zone=2)
[ 48.861817] page_type: 0xffffffff()
[ 48.862342] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 48.864243] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 48.865124] page dumped because: kasan: bad access detected
[ 48.865689]
[ 48.866020] Memory state around the buggy address:
[ 48.866646] ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 48.867876] ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 48.869462] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 48.870281] ^
[ 48.870920] ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.871741] ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.872566] ==================================================================
---
[ 48.743890] ==================================================================
[ 48.744721] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0
[ 48.746502] Write of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[ 48.747446]
[ 48.748065] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 48.750156] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 48.751473] Call Trace:
[ 48.752498] <TASK>
[ 48.753112] dump_stack_lvl+0x4e/0x90
[ 48.753755] print_report+0xd2/0x660
[ 48.754414] ? __virt_addr_valid+0x156/0x1e0
[ 48.755246] ? kasan_complete_mode_report_info+0x2a/0x200
[ 48.755900] kasan_report+0xff/0x140
[ 48.756991] ? kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0
[ 48.758295] ? kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0
[ 48.758831] kasan_check_range+0x10c/0x1c0
[ 48.759795] __kasan_check_write+0x18/0x20
[ 48.760410] kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0
[ 48.761576] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 48.763211] ? kasan_save_alloc_info+0x22/0x30
[ 48.763975] ? kasan_set_track+0x29/0x40
[ 48.764674] ? kasan_set_track+0x29/0x40
[ 48.765725] kasan_bitops_generic+0xb4/0x130
[ 48.766372] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 48.767826] ? ktime_get_ts64+0x118/0x140
[ 48.768425] kunit_try_run_case+0x126/0x290
[ 48.769364] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.770340] ? __kasan_check_write+0x18/0x20
[ 48.771563] ? trace_preempt_on+0x20/0xa0
[ 48.772319] ? __kthread_parkme+0x4f/0xd0
[ 48.773450] ? preempt_count_sub+0x50/0x80
[ 48.774705] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.775430] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 48.777053] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.777840] kthread+0x19e/0x1e0
[ 48.778954] ? __pfx_kthread+0x10/0x10
[ 48.779623] ret_from_fork+0x41/0x70
[ 48.780625] ? __pfx_kthread+0x10/0x10
[ 48.781306] ret_from_fork_asm+0x1b/0x30
[ 48.781919] </TASK>
[ 48.782275]
[ 48.782565] Allocated by task 224:
[ 48.783146] kasan_save_stack+0x3c/0x60
[ 48.784292] kasan_set_track+0x29/0x40
[ 48.784946] kasan_save_alloc_info+0x22/0x30
[ 48.785609] __kasan_kmalloc+0xb7/0xc0
[ 48.787273] kmalloc_trace+0x4c/0xb0
[ 48.788177] kasan_bitops_generic+0x8e/0x130
[ 48.788788] kunit_try_run_case+0x126/0x290
[ 48.789331] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.790664] kthread+0x19e/0x1e0
[ 48.791326] ret_from_fork+0x41/0x70
[ 48.791774] ret_from_fork_asm+0x1b/0x30
[ 48.792287]
[ 48.792594] The buggy address belongs to the object at ffff8881023f99a0
[ 48.792594] which belongs to the cache kmalloc-16 of size 16
[ 48.793945] The buggy address is located 8 bytes inside of
[ 48.793945] allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[ 48.795255]
[ 48.795700] The buggy address belongs to the physical page:
[ 48.796252] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[ 48.797297] flags: 0x200000000000800(slab|node=0|zone=2)
[ 48.798075] page_type: 0xffffffff()
[ 48.798707] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 48.799913] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 48.800747] page dumped because: kasan: bad access detected
[ 48.801275]
[ 48.801421] Memory state around the buggy address:
[ 48.802068] ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 48.803448] ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 48.804992] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 48.805813] ^
[ 48.806429] ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.807413] ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.808534] ==================================================================
---
[ 48.554936] ==================================================================
[ 48.555792] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0
[ 48.557202] Write of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[ 48.558936]
[ 48.559317] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 48.560667] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 48.562504] Call Trace:
[ 48.562987] <TASK>
[ 48.563464] dump_stack_lvl+0x4e/0x90
[ 48.564317] print_report+0xd2/0x660
[ 48.564901] ? __virt_addr_valid+0x156/0x1e0
[ 48.566077] ? kasan_complete_mode_report_info+0x2a/0x200
[ 48.567120] kasan_report+0xff/0x140
[ 48.567402] ? kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0
[ 48.568483] ? kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0
[ 48.569434] kasan_check_range+0x10c/0x1c0
[ 48.570780] __kasan_check_write+0x18/0x20
[ 48.571590] kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0
[ 48.572569] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 48.573574] ? kasan_save_alloc_info+0x22/0x30
[ 48.574340] ? kasan_set_track+0x29/0x40
[ 48.575086] ? kasan_set_track+0x29/0x40
[ 48.576212] kasan_bitops_generic+0xb4/0x130
[ 48.577000] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 48.577752] ? ktime_get_ts64+0x118/0x140
[ 48.578592] kunit_try_run_case+0x126/0x290
[ 48.579484] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.580386] ? __kasan_check_write+0x18/0x20
[ 48.581043] ? trace_preempt_on+0x20/0xa0
[ 48.581598] ? __kthread_parkme+0x4f/0xd0
[ 48.582559] ? preempt_count_sub+0x50/0x80
[ 48.583089] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.584311] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 48.585384] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.586733] kthread+0x19e/0x1e0
[ 48.587349] ? __pfx_kthread+0x10/0x10
[ 48.588094] ret_from_fork+0x41/0x70
[ 48.588777] ? __pfx_kthread+0x10/0x10
[ 48.589440] ret_from_fork_asm+0x1b/0x30
[ 48.590347] </TASK>
[ 48.590942]
[ 48.591660] Allocated by task 224:
[ 48.592955] kasan_save_stack+0x3c/0x60
[ 48.593625] kasan_set_track+0x29/0x40
[ 48.594312] kasan_save_alloc_info+0x22/0x30
[ 48.594832] __kasan_kmalloc+0xb7/0xc0
[ 48.595436] kmalloc_trace+0x4c/0xb0
[ 48.596429] kasan_bitops_generic+0x8e/0x130
[ 48.597165] kunit_try_run_case+0x126/0x290
[ 48.598130] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.599627] kthread+0x19e/0x1e0
[ 48.600198] ret_from_fork+0x41/0x70
[ 48.600698] ret_from_fork_asm+0x1b/0x30
[ 48.601413]
[ 48.602269] The buggy address belongs to the object at ffff8881023f99a0
[ 48.602269] which belongs to the cache kmalloc-16 of size 16
[ 48.604357] The buggy address is located 8 bytes inside of
[ 48.604357] allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[ 48.605556]
[ 48.605859] The buggy address belongs to the physical page:
[ 48.607185] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[ 48.608473] flags: 0x200000000000800(slab|node=0|zone=2)
[ 48.609377] page_type: 0xffffffff()
[ 48.610194] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 48.611465] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 48.612561] page dumped because: kasan: bad access detected
[ 48.613145]
[ 48.613480] Memory state around the buggy address:
[ 48.614623] ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 48.615835] ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 48.617203] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 48.617879] ^
[ 48.618885] ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.619685] ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.620409] ==================================================================
---
[ 49.071450] ==================================================================
[ 49.073581] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0
[ 49.074760] Write of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[ 49.076336]
[ 49.076637] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 49.078056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 49.079276] Call Trace:
[ 49.079876] <TASK>
[ 49.080221] dump_stack_lvl+0x4e/0x90
[ 49.080789] print_report+0xd2/0x660
[ 49.081684] ? __virt_addr_valid+0x156/0x1e0
[ 49.082373] ? kasan_complete_mode_report_info+0x2a/0x200
[ 49.083556] kasan_report+0xff/0x140
[ 49.084660] ? kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0
[ 49.085409] ? kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0
[ 49.086252] kasan_check_range+0x10c/0x1c0
[ 49.086929] __kasan_check_write+0x18/0x20
[ 49.087471] kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0
[ 49.088674] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 49.089445] ? kasan_save_alloc_info+0x22/0x30
[ 49.090208] ? kasan_set_track+0x29/0x40
[ 49.090729] ? kasan_set_track+0x29/0x40
[ 49.091395] kasan_bitops_generic+0xb4/0x130
[ 49.092160] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 49.092891] ? ktime_get_ts64+0x118/0x140
[ 49.093686] kunit_try_run_case+0x126/0x290
[ 49.094377] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.095117] ? __kasan_check_write+0x18/0x20
[ 49.095937] ? trace_preempt_on+0x20/0xa0
[ 49.096434] ? __kthread_parkme+0x4f/0xd0
[ 49.097428] ? preempt_count_sub+0x50/0x80
[ 49.098238] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.099107] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 49.100140] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.101081] kthread+0x19e/0x1e0
[ 49.101594] ? __pfx_kthread+0x10/0x10
[ 49.102172] ret_from_fork+0x41/0x70
[ 49.103197] ? __pfx_kthread+0x10/0x10
[ 49.103776] ret_from_fork_asm+0x1b/0x30
[ 49.104311] </TASK>
[ 49.104721]
[ 49.105010] Allocated by task 224:
[ 49.105496] kasan_save_stack+0x3c/0x60
[ 49.106022] kasan_set_track+0x29/0x40
[ 49.106479] kasan_save_alloc_info+0x22/0x30
[ 49.107462] __kasan_kmalloc+0xb7/0xc0
[ 49.108140] kmalloc_trace+0x4c/0xb0
[ 49.109465] kasan_bitops_generic+0x8e/0x130
[ 49.110286] kunit_try_run_case+0x126/0x290
[ 49.111279] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.112120] kthread+0x19e/0x1e0
[ 49.112631] ret_from_fork+0x41/0x70
[ 49.113619] ret_from_fork_asm+0x1b/0x30
[ 49.114512]
[ 49.114894] The buggy address belongs to the object at ffff8881023f99a0
[ 49.114894] which belongs to the cache kmalloc-16 of size 16
[ 49.116475] The buggy address is located 8 bytes inside of
[ 49.116475] allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[ 49.117754]
[ 49.118337] The buggy address belongs to the physical page:
[ 49.119769] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[ 49.120944] flags: 0x200000000000800(slab|node=0|zone=2)
[ 49.121719] page_type: 0xffffffff()
[ 49.122315] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 49.123854] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 49.125134] page dumped because: kasan: bad access detected
[ 49.125982]
[ 49.126229] Memory state around the buggy address:
[ 49.127003] ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 49.128317] ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 49.129432] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 49.130367] ^
[ 49.132011] ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.132811] ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.133572] ==================================================================
---
[ 48.622347] ==================================================================
[ 48.623012] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0
[ 48.624441] Write of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[ 48.625887]
[ 48.626125] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 48.627436] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 48.628629] Call Trace:
[ 48.629173] <TASK>
[ 48.629582] dump_stack_lvl+0x4e/0x90
[ 48.630170] print_report+0xd2/0x660
[ 48.630672] ? __virt_addr_valid+0x156/0x1e0
[ 48.631304] ? kasan_complete_mode_report_info+0x2a/0x200
[ 48.632560] kasan_report+0xff/0x140
[ 48.633139] ? kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0
[ 48.633988] ? kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0
[ 48.634732] kasan_check_range+0x10c/0x1c0
[ 48.635391] __kasan_check_write+0x18/0x20
[ 48.636117] kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0
[ 48.637278] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 48.638713] ? kasan_save_alloc_info+0x22/0x30
[ 48.639443] ? kasan_set_track+0x29/0x40
[ 48.640135] ? kasan_set_track+0x29/0x40
[ 48.640664] kasan_bitops_generic+0xb4/0x130
[ 48.641193] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 48.642616] ? ktime_get_ts64+0x118/0x140
[ 48.643656] kunit_try_run_case+0x126/0x290
[ 48.644340] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.645171] ? __kasan_check_write+0x18/0x20
[ 48.645963] ? trace_preempt_on+0x20/0xa0
[ 48.646963] ? __kthread_parkme+0x4f/0xd0
[ 48.647538] ? preempt_count_sub+0x50/0x80
[ 48.648578] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.649100] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 48.650021] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.651559] kthread+0x19e/0x1e0
[ 48.652262] ? __pfx_kthread+0x10/0x10
[ 48.652829] ret_from_fork+0x41/0x70
[ 48.653355] ? __pfx_kthread+0x10/0x10
[ 48.653959] ret_from_fork_asm+0x1b/0x30
[ 48.654543] </TASK>
[ 48.654941]
[ 48.655265] Allocated by task 224:
[ 48.655707] kasan_save_stack+0x3c/0x60
[ 48.656486] kasan_set_track+0x29/0x40
[ 48.657339] kasan_save_alloc_info+0x22/0x30
[ 48.658678] __kasan_kmalloc+0xb7/0xc0
[ 48.659268] kmalloc_trace+0x4c/0xb0
[ 48.659833] kasan_bitops_generic+0x8e/0x130
[ 48.660469] kunit_try_run_case+0x126/0x290
[ 48.661367] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.662091] kthread+0x19e/0x1e0
[ 48.662504] ret_from_fork+0x41/0x70
[ 48.663183] ret_from_fork_asm+0x1b/0x30
[ 48.663753]
[ 48.664117] The buggy address belongs to the object at ffff8881023f99a0
[ 48.664117] which belongs to the cache kmalloc-16 of size 16
[ 48.665404] The buggy address is located 8 bytes inside of
[ 48.665404] allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[ 48.666925]
[ 48.667228] The buggy address belongs to the physical page:
[ 48.667758] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[ 48.669037] flags: 0x200000000000800(slab|node=0|zone=2)
[ 48.669824] page_type: 0xffffffff()
[ 48.670439] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 48.671383] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 48.672261] page dumped because: kasan: bad access detected
[ 48.673006]
[ 48.673332] Memory state around the buggy address:
[ 48.673926] ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 48.674624] ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 48.675652] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 48.676551] ^
[ 48.677024] ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.678145] ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.679039] ==================================================================
---
[ 48.489405] ==================================================================
[ 48.491270] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0
[ 48.492697] Write of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[ 48.494200]
[ 48.494620] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 48.495937] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 48.497026] Call Trace:
[ 48.497393] <TASK>
[ 48.498063] dump_stack_lvl+0x4e/0x90
[ 48.499276] print_report+0xd2/0x660
[ 48.499932] ? __virt_addr_valid+0x156/0x1e0
[ 48.500668] ? kasan_complete_mode_report_info+0x2a/0x200
[ 48.501534] kasan_report+0xff/0x140
[ 48.502164] ? kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0
[ 48.504042] ? kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0
[ 48.504819] kasan_check_range+0x10c/0x1c0
[ 48.505384] __kasan_check_write+0x18/0x20
[ 48.506182] kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0
[ 48.506601] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 48.507781] ? kasan_save_alloc_info+0x22/0x30
[ 48.508703] ? kasan_set_track+0x29/0x40
[ 48.509405] ? kasan_set_track+0x29/0x40
[ 48.510074] kasan_bitops_generic+0xb4/0x130
[ 48.510675] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 48.511471] ? ktime_get_ts64+0x118/0x140
[ 48.512481] kunit_try_run_case+0x126/0x290
[ 48.513473] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.514254] ? __kasan_check_write+0x18/0x20
[ 48.515110] ? trace_preempt_on+0x20/0xa0
[ 48.515689] ? __kthread_parkme+0x4f/0xd0
[ 48.516844] ? preempt_count_sub+0x50/0x80
[ 48.517396] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.518242] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 48.519324] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.520097] kthread+0x19e/0x1e0
[ 48.520872] ? __pfx_kthread+0x10/0x10
[ 48.522005] ret_from_fork+0x41/0x70
[ 48.522841] ? __pfx_kthread+0x10/0x10
[ 48.523627] ret_from_fork_asm+0x1b/0x30
[ 48.524276] </TASK>
[ 48.525487]
[ 48.526073] Allocated by task 224:
[ 48.526609] kasan_save_stack+0x3c/0x60
[ 48.527260] kasan_set_track+0x29/0x40
[ 48.527944] kasan_save_alloc_info+0x22/0x30
[ 48.528628] __kasan_kmalloc+0xb7/0xc0
[ 48.529185] kmalloc_trace+0x4c/0xb0
[ 48.530171] kasan_bitops_generic+0x8e/0x130
[ 48.531084] kunit_try_run_case+0x126/0x290
[ 48.531680] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.532797] kthread+0x19e/0x1e0
[ 48.533549] ret_from_fork+0x41/0x70
[ 48.534574] ret_from_fork_asm+0x1b/0x30
[ 48.535704]
[ 48.535969] The buggy address belongs to the object at ffff8881023f99a0
[ 48.535969] which belongs to the cache kmalloc-16 of size 16
[ 48.537539] The buggy address is located 8 bytes inside of
[ 48.537539] allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[ 48.539594]
[ 48.540220] The buggy address belongs to the physical page:
[ 48.541038] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[ 48.542388] flags: 0x200000000000800(slab|node=0|zone=2)
[ 48.543126] page_type: 0xffffffff()
[ 48.543992] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 48.544857] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 48.545786] page dumped because: kasan: bad access detected
[ 48.546649]
[ 48.547133] Memory state around the buggy address:
[ 48.547738] ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 48.548919] ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 48.549757] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 48.550818] ^
[ 48.551961] ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.552877] ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.553708] ==================================================================
---
[ 48.874887] ==================================================================
[ 48.875645] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0
[ 48.877329] Write of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[ 48.878294]
[ 48.878681] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 48.879593] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 48.880721] Call Trace:
[ 48.882223] <TASK>
[ 48.882570] dump_stack_lvl+0x4e/0x90
[ 48.883127] print_report+0xd2/0x660
[ 48.883734] ? __virt_addr_valid+0x156/0x1e0
[ 48.884389] ? kasan_complete_mode_report_info+0x2a/0x200
[ 48.885938] kasan_report+0xff/0x140
[ 48.886455] ? kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0
[ 48.887397] ? kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0
[ 48.888188] kasan_check_range+0x10c/0x1c0
[ 48.888862] __kasan_check_write+0x18/0x20
[ 48.890507] kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0
[ 48.891226] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 48.892006] ? kasan_save_alloc_info+0x22/0x30
[ 48.892855] ? kasan_set_track+0x29/0x40
[ 48.893378] ? kasan_set_track+0x29/0x40
[ 48.894537] kasan_bitops_generic+0xb4/0x130
[ 48.895354] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 48.896137] ? ktime_get_ts64+0x118/0x140
[ 48.896959] kunit_try_run_case+0x126/0x290
[ 48.897935] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.898618] ? __kasan_check_write+0x18/0x20
[ 48.899913] ? trace_preempt_on+0x20/0xa0
[ 48.900457] ? __kthread_parkme+0x4f/0xd0
[ 48.900995] ? preempt_count_sub+0x50/0x80
[ 48.901920] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.902708] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 48.903496] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.904296] kthread+0x19e/0x1e0
[ 48.905040] ? __pfx_kthread+0x10/0x10
[ 48.905616] ret_from_fork+0x41/0x70
[ 48.906108] ? __pfx_kthread+0x10/0x10
[ 48.906814] ret_from_fork_asm+0x1b/0x30
[ 48.907570] </TASK>
[ 48.908055]
[ 48.908416] Allocated by task 224:
[ 48.908899] kasan_save_stack+0x3c/0x60
[ 48.909596] kasan_set_track+0x29/0x40
[ 48.910304] kasan_save_alloc_info+0x22/0x30
[ 48.910815] __kasan_kmalloc+0xb7/0xc0
[ 48.911547] kmalloc_trace+0x4c/0xb0
[ 48.912136] kasan_bitops_generic+0x8e/0x130
[ 48.912933] kunit_try_run_case+0x126/0x290
[ 48.913782] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.914420] kthread+0x19e/0x1e0
[ 48.915127] ret_from_fork+0x41/0x70
[ 48.915961] ret_from_fork_asm+0x1b/0x30
[ 48.916392]
[ 48.916744] The buggy address belongs to the object at ffff8881023f99a0
[ 48.916744] which belongs to the cache kmalloc-16 of size 16
[ 48.918233] The buggy address is located 8 bytes inside of
[ 48.918233] allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[ 48.920023]
[ 48.920435] The buggy address belongs to the physical page:
[ 48.921140] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[ 48.922348] flags: 0x200000000000800(slab|node=0|zone=2)
[ 48.923311] page_type: 0xffffffff()
[ 48.923936] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 48.924964] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 48.926051] page dumped because: kasan: bad access detected
[ 48.926967]
[ 48.927277] Memory state around the buggy address:
[ 48.928067] ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 48.928901] ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 48.929772] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 48.931852] ^
[ 48.933071] ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.933823] ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 48.935302] ==================================================================
Home
[ 48.938360] ==================================================================
[ 48.939050] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0
[ 48.940047] Read of size 8 at addr ffff8881023f99a8 by task kunit_try_catch/224
[ 48.940804]
[ 48.941135] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 48.943607] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 48.944707] Call Trace:
[ 48.945403] <TASK>
[ 48.945751] dump_stack_lvl+0x4e/0x90
[ 48.946408] print_report+0xd2/0x660
[ 48.948225] ? __virt_addr_valid+0x156/0x1e0
[ 48.949260] ? kasan_complete_mode_report_info+0x2a/0x200
[ 48.950579] kasan_report+0xff/0x140
[ 48.951123] ? kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0
[ 48.951901] ? kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0
[ 48.952611] kasan_check_range+0x10c/0x1c0
[ 48.953218] __kasan_check_read+0x15/0x20
[ 48.954238] kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0
[ 48.955549] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 48.957203] ? kasan_save_alloc_info+0x22/0x30
[ 48.958138] ? kasan_set_track+0x29/0x40
[ 48.958906] ? kasan_set_track+0x29/0x40
[ 48.959917] kasan_bitops_generic+0xb4/0x130
[ 48.960643] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 48.961286] ? ktime_get_ts64+0x118/0x140
[ 48.963029] kunit_try_run_case+0x126/0x290
[ 48.963978] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.964695] ? __kasan_check_write+0x18/0x20
[ 48.965381] ? trace_preempt_on+0x20/0xa0
[ 48.965852] ? __kthread_parkme+0x4f/0xd0
[ 48.967297] ? preempt_count_sub+0x50/0x80
[ 48.968374] ? __pfx_kunit_try_run_case+0x10/0x10
[ 48.969138] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 48.970619] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.971367] kthread+0x19e/0x1e0
[ 48.971794] ? __pfx_kthread+0x10/0x10
[ 48.972471] ret_from_fork+0x41/0x70
[ 48.973435] ? __pfx_kthread+0x10/0x10
[ 48.974232] ret_from_fork_asm+0x1b/0x30
[ 48.974809] </TASK>
[ 48.975361]
[ 48.975762] Allocated by task 224:
[ 48.976363] kasan_save_stack+0x3c/0x60
[ 48.977104] kasan_set_track+0x29/0x40
[ 48.978436] kasan_save_alloc_info+0x22/0x30
[ 48.979202] __kasan_kmalloc+0xb7/0xc0
[ 48.979775] kmalloc_trace+0x4c/0xb0
[ 48.980400] kasan_bitops_generic+0x8e/0x130
[ 48.981107] kunit_try_run_case+0x126/0x290
[ 48.981910] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 48.983008] kthread+0x19e/0x1e0
[ 48.984327] ret_from_fork+0x41/0x70
[ 48.985154] ret_from_fork_asm+0x1b/0x30
[ 48.985876]
[ 48.986555] The buggy address belongs to the object at ffff8881023f99a0
[ 48.986555] which belongs to the cache kmalloc-16 of size 16
[ 48.988414] The buggy address is located 8 bytes inside of
[ 48.988414] allocated 9-byte region [ffff8881023f99a0, ffff8881023f99a9)
[ 48.990557]
[ 48.990937] The buggy address belongs to the physical page:
[ 48.991805] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[ 48.993642] flags: 0x200000000000800(slab|node=0|zone=2)
[ 48.994293] page_type: 0xffffffff()
[ 48.994761] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 48.995705] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 48.997006] page dumped because: kasan: bad access detected
[ 48.998137]
[ 48.998337] Memory state around the buggy address:
[ 48.999443] ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 49.000694] ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 49.001629] >ffff8881023f9980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[ 49.002679] ^
[ 49.003452] ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.005043] ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.005787] ==================================================================
Home
[ 43.936481] ==================================================================
[ 43.937610] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xd0/0x1e0
[ 43.939271] Write of size 1 at addr ffff8881024bdf00 by task kunit_try_catch/150
[ 43.940689]
[ 43.941222] CPU: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 43.942401] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 43.944220] Call Trace:
[ 43.944629] <TASK>
[ 43.945083] dump_stack_lvl+0x4e/0x90
[ 43.945928] print_report+0xd2/0x660
[ 43.946548] ? __virt_addr_valid+0x156/0x1e0
[ 43.947400] ? kasan_complete_mode_report_info+0x2a/0x200
[ 43.948142] kasan_report+0xff/0x140
[ 43.948706] ? kmalloc_large_oob_right+0xd0/0x1e0
[ 43.949424] ? kmalloc_large_oob_right+0xd0/0x1e0
[ 43.950152] __asan_store1+0x69/0x70
[ 43.951017] kmalloc_large_oob_right+0xd0/0x1e0
[ 43.951341] ? __pfx_kmalloc_large_oob_right+0x10/0x10
[ 43.952213] ? __schedule+0x70b/0x1190
[ 43.953507] ? ktime_get_ts64+0x118/0x140
[ 43.954397] kunit_try_run_case+0x126/0x290
[ 43.955327] ? __pfx_kunit_try_run_case+0x10/0x10
[ 43.956147] ? __kasan_check_write+0x18/0x20
[ 43.956961] ? trace_preempt_on+0x20/0xa0
[ 43.957495] ? __kthread_parkme+0x4f/0xd0
[ 43.958074] ? preempt_count_sub+0x50/0x80
[ 43.958970] ? __pfx_kunit_try_run_case+0x10/0x10
[ 43.959914] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 43.961007] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 43.961974] kthread+0x19e/0x1e0
[ 43.962566] ? __pfx_kthread+0x10/0x10
[ 43.963401] ret_from_fork+0x41/0x70
[ 43.964572] ? __pfx_kthread+0x10/0x10
[ 43.965542] ret_from_fork_asm+0x1b/0x30
[ 43.966730] </TASK>
[ 43.967176]
[ 43.967582] Allocated by task 150:
[ 43.968212] kasan_save_stack+0x3c/0x60
[ 43.969338] kasan_set_track+0x29/0x40
[ 43.969925] kasan_save_alloc_info+0x22/0x30
[ 43.971344] __kasan_kmalloc+0xb7/0xc0
[ 43.972197] kmalloc_trace+0x4c/0xb0
[ 43.972933] kmalloc_large_oob_right+0x9d/0x1e0
[ 43.973481] kunit_try_run_case+0x126/0x290
[ 43.974046] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 43.974826] kthread+0x19e/0x1e0
[ 43.975330] ret_from_fork+0x41/0x70
[ 43.976283] ret_from_fork_asm+0x1b/0x30
[ 43.977081]
[ 43.977360] The buggy address belongs to the object at ffff8881024bc000
[ 43.977360] which belongs to the cache kmalloc-8k of size 8192
[ 43.979089] The buggy address is located 0 bytes to the right of
[ 43.979089] allocated 7936-byte region [ffff8881024bc000, ffff8881024bdf00)
[ 43.980596]
[ 43.981040] The buggy address belongs to the physical page:
[ 43.981557] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024b8
[ 43.982745] head:(____ptrval____) order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 43.983942] flags: 0x200000000000840(slab|head|node=0|zone=2)
[ 43.984736] page_type: 0xffffffff()
[ 43.985305] raw: 0200000000000840 ffff888100042280 dead000000000122 0000000000000000
[ 43.986319] raw: 0000000000000000 0000000080020002 00000001ffffffff 0000000000000000
[ 43.987382] page dumped because: kasan: bad access detected
[ 43.988083]
[ 43.988415] Memory state around the buggy address:
[ 43.989277] ffff8881024bde00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 43.990495] ffff8881024bde80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 43.991582] >ffff8881024bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.992783] ^
[ 43.993660] ffff8881024bdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.994449] ffff8881024be000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.995468] ==================================================================
Home
[ 45.552483] ==================================================================
[ 45.554220] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0xea/0x1f0
[ 45.555359] Read of size 64 at addr ffff888102851d04 by task kunit_try_catch/178
[ 45.556423]
[ 45.556781] CPU: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 45.558144] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 45.559188] Call Trace:
[ 45.559620] <TASK>
[ 45.560061] dump_stack_lvl+0x4e/0x90
[ 45.560772] print_report+0xd2/0x660
[ 45.561505] ? __virt_addr_valid+0x156/0x1e0
[ 45.563062] ? kasan_complete_mode_report_info+0x2a/0x200
[ 45.563918] kasan_report+0xff/0x140
[ 45.564451] ? kmalloc_memmove_invalid_size+0xea/0x1f0
[ 45.565353] ? kmalloc_memmove_invalid_size+0xea/0x1f0
[ 45.566544] kasan_check_range+0x10c/0x1c0
[ 45.567398] __asan_memmove+0x27/0x70
[ 45.568242] kmalloc_memmove_invalid_size+0xea/0x1f0
[ 45.569426] ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10
[ 45.570337] ? __schedule+0x70b/0x1190
[ 45.571186] ? ktime_get_ts64+0x118/0x140
[ 45.572116] kunit_try_run_case+0x126/0x290
[ 45.573273] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.574781] ? __kasan_check_write+0x18/0x20
[ 45.576026] ? trace_preempt_on+0x20/0xa0
[ 45.576345] ? __kthread_parkme+0x4f/0xd0
[ 45.576784] ? preempt_count_sub+0x50/0x80
[ 45.577922] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.579278] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 45.580377] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.581283] kthread+0x19e/0x1e0
[ 45.581942] ? __pfx_kthread+0x10/0x10
[ 45.583087] ret_from_fork+0x41/0x70
[ 45.583676] ? __pfx_kthread+0x10/0x10
[ 45.584264] ret_from_fork_asm+0x1b/0x30
[ 45.584840] </TASK>
[ 45.585203]
[ 45.585470] Allocated by task 178:
[ 45.586512] kasan_save_stack+0x3c/0x60
[ 45.587462] kasan_set_track+0x29/0x40
[ 45.588187] kasan_save_alloc_info+0x22/0x30
[ 45.588978] __kasan_kmalloc+0xb7/0xc0
[ 45.589619] kmalloc_trace+0x4c/0xb0
[ 45.590433] kmalloc_memmove_invalid_size+0x9f/0x1f0
[ 45.591360] kunit_try_run_case+0x126/0x290
[ 45.591862] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.593134] kthread+0x19e/0x1e0
[ 45.593929] ret_from_fork+0x41/0x70
[ 45.594445] ret_from_fork_asm+0x1b/0x30
[ 45.595245]
[ 45.595509] The buggy address belongs to the object at ffff888102851d00
[ 45.595509] which belongs to the cache kmalloc-64 of size 64
[ 45.597191] The buggy address is located 4 bytes inside of
[ 45.597191] allocated 64-byte region [ffff888102851d00, ffff888102851d40)
[ 45.598368]
[ 45.599241] The buggy address belongs to the physical page:
[ 45.600226] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102851
[ 45.601572] flags: 0x200000000000800(slab|node=0|zone=2)
[ 45.602434] page_type: 0xffffffff()
[ 45.603594] raw: 0200000000000800 ffff888100041640 dead000000000122 0000000000000000
[ 45.604868] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[ 45.606120] page dumped because: kasan: bad access detected
[ 45.607259]
[ 45.607506] Memory state around the buggy address:
[ 45.609174] ffff888102851c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 45.610141] ffff888102851c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 45.611198] >ffff888102851d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 45.612193] ^
[ 45.613260] ffff888102851d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.614192] ffff888102851e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.615401] ==================================================================
Home
[ 43.646210] ==================================================================
[ 43.647670] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0xd4/0x1f0
[ 43.648638] Read of size 1 at addr ffff8881028a5000 by task kunit_try_catch/138
[ 43.649454]
[ 43.651011] CPU: 1 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 43.651835] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 43.652824] Call Trace:
[ 43.653212] <TASK>
[ 43.653676] dump_stack_lvl+0x4e/0x90
[ 43.654295] print_report+0xd2/0x660
[ 43.654947] ? __virt_addr_valid+0x156/0x1e0
[ 43.655514] ? kasan_complete_mode_report_info+0x2a/0x200
[ 43.656302] kasan_report+0xff/0x140
[ 43.656826] ? kmalloc_node_oob_right+0xd4/0x1f0
[ 43.657465] ? kmalloc_node_oob_right+0xd4/0x1f0
[ 43.658125] __asan_load1+0x66/0x70
[ 43.658719] kmalloc_node_oob_right+0xd4/0x1f0
[ 43.659363] ? __pfx_kmalloc_node_oob_right+0x10/0x10
[ 43.660103] ? __schedule+0x70b/0x1190
[ 43.660648] ? ktime_get_ts64+0x118/0x140
[ 43.661377] kunit_try_run_case+0x126/0x290
[ 43.662130] ? __pfx_kunit_try_run_case+0x10/0x10
[ 43.662723] ? __kasan_check_write+0x18/0x20
[ 43.663388] ? trace_preempt_on+0x20/0xa0
[ 43.663924] ? __kthread_parkme+0x4f/0xd0
[ 43.664664] ? preempt_count_sub+0x50/0x80
[ 43.665481] ? __pfx_kunit_try_run_case+0x10/0x10
[ 43.666085] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 43.667853] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 43.669105] kthread+0x19e/0x1e0
[ 43.669816] ? __pfx_kthread+0x10/0x10
[ 43.670647] ret_from_fork+0x41/0x70
[ 43.671194] ? __pfx_kthread+0x10/0x10
[ 43.672199] ret_from_fork_asm+0x1b/0x30
[ 43.672845] </TASK>
[ 43.673600]
[ 43.673925] Allocated by task 138:
[ 43.674420] kasan_save_stack+0x3c/0x60
[ 43.674942] kasan_set_track+0x29/0x40
[ 43.675596] kasan_save_alloc_info+0x22/0x30
[ 43.676310] __kasan_kmalloc+0xb7/0xc0
[ 43.676917] kmalloc_node_trace+0x49/0xb0
[ 43.677652] kmalloc_node_oob_right+0xa1/0x1f0
[ 43.678831] kunit_try_run_case+0x126/0x290
[ 43.679505] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 43.680318] kthread+0x19e/0x1e0
[ 43.680916] ret_from_fork+0x41/0x70
[ 43.681571] ret_from_fork_asm+0x1b/0x30
[ 43.682275]
[ 43.682637] The buggy address belongs to the object at ffff8881028a4000
[ 43.682637] which belongs to the cache kmalloc-4k of size 4096
[ 43.684155] The buggy address is located 0 bytes to the right of
[ 43.684155] allocated 4096-byte region [ffff8881028a4000, ffff8881028a5000)
[ 43.685627]
[ 43.685879] The buggy address belongs to the physical page:
[ 43.686790] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a0
[ 43.688092] head:(____ptrval____) order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 43.689323] flags: 0x200000000000840(slab|head|node=0|zone=2)
[ 43.690223] page_type: 0xffffffff()
[ 43.690669] raw: 0200000000000840 ffff888100042140 dead000000000122 0000000000000000
[ 43.691623] raw: 0000000000000000 0000000080040004 00000001ffffffff 0000000000000000
[ 43.692760] page dumped because: kasan: bad access detected
[ 43.693581]
[ 43.693856] Memory state around the buggy address:
[ 43.694679] ffff8881028a4f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 43.695796] ffff8881028a4f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 43.696756] >ffff8881028a5000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.697572] ^
[ 43.698037] ffff8881028a5080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.698969] ffff8881028a5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.699685] ==================================================================
Home
[ 45.018558] ==================================================================
[ 45.020211] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xf3/0x250
[ 45.021389] Write of size 16 at addr ffff8881023f9920 by task kunit_try_catch/162
[ 45.023320]
[ 45.023590] CPU: 1 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 45.025334] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 45.026330] Call Trace:
[ 45.026704] <TASK>
[ 45.027243] dump_stack_lvl+0x4e/0x90
[ 45.028080] print_report+0xd2/0x660
[ 45.028579] ? __virt_addr_valid+0x156/0x1e0
[ 45.029226] ? kasan_complete_mode_report_info+0x2a/0x200
[ 45.030601] kasan_report+0xff/0x140
[ 45.031411] ? kmalloc_oob_16+0xf3/0x250
[ 45.032390] ? kmalloc_oob_16+0xf3/0x250
[ 45.033245] __asan_store16+0x6c/0xa0
[ 45.034125] kmalloc_oob_16+0xf3/0x250
[ 45.035360] ? __pfx_kmalloc_oob_16+0x10/0x10
[ 45.036087] ? __schedule+0x70b/0x1190
[ 45.036758] ? ktime_get_ts64+0x118/0x140
[ 45.037505] kunit_try_run_case+0x126/0x290
[ 45.038148] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.039297] ? __kasan_check_write+0x18/0x20
[ 45.040265] ? trace_preempt_on+0x20/0xa0
[ 45.041203] ? __kthread_parkme+0x4f/0xd0
[ 45.041983] ? preempt_count_sub+0x50/0x80
[ 45.042869] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.044059] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 45.044937] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.045838] kthread+0x19e/0x1e0
[ 45.046368] ? __pfx_kthread+0x10/0x10
[ 45.046888] ret_from_fork+0x41/0x70
[ 45.047543] ? __pfx_kthread+0x10/0x10
[ 45.048199] ret_from_fork_asm+0x1b/0x30
[ 45.048769] </TASK>
[ 45.049354]
[ 45.049802] Allocated by task 162:
[ 45.050306] kasan_save_stack+0x3c/0x60
[ 45.051090] kasan_set_track+0x29/0x40
[ 45.051668] kasan_save_alloc_info+0x22/0x30
[ 45.052220] __kasan_kmalloc+0xb7/0xc0
[ 45.052800] kmalloc_trace+0x4c/0xb0
[ 45.053262] kmalloc_oob_16+0x8f/0x250
[ 45.054236] kunit_try_run_case+0x126/0x290
[ 45.054728] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.055588] kthread+0x19e/0x1e0
[ 45.056175] ret_from_fork+0x41/0x70
[ 45.056879] ret_from_fork_asm+0x1b/0x30
[ 45.057514]
[ 45.058123] The buggy address belongs to the object at ffff8881023f9920
[ 45.058123] which belongs to the cache kmalloc-16 of size 16
[ 45.059933] The buggy address is located 0 bytes inside of
[ 45.059933] allocated 13-byte region [ffff8881023f9920, ffff8881023f992d)
[ 45.061247]
[ 45.061612] The buggy address belongs to the physical page:
[ 45.062367] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[ 45.063409] flags: 0x200000000000800(slab|node=0|zone=2)
[ 45.064413] page_type: 0xffffffff()
[ 45.065130] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 45.066056] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 45.067246] page dumped because: kasan: bad access detected
[ 45.067810]
[ 45.068347] Memory state around the buggy address:
[ 45.069071] ffff8881023f9800: 00 00 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[ 45.070126] ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 45.071033] >ffff8881023f9900: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc
[ 45.072147] ^
[ 45.072686] ffff8881023f9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.073976] ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.074690] ==================================================================
Home
[ 45.018558] ==================================================================
[ 45.020211] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xf3/0x250
[ 45.021389] Write of size 16 at addr ffff8881023f9920 by task kunit_try_catch/162
[ 45.023320]
[ 45.023590] CPU: 1 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 45.025334] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 45.026330] Call Trace:
[ 45.026704] <TASK>
[ 45.027243] dump_stack_lvl+0x4e/0x90
[ 45.028080] print_report+0xd2/0x660
[ 45.028579] ? __virt_addr_valid+0x156/0x1e0
[ 45.029226] ? kasan_complete_mode_report_info+0x2a/0x200
[ 45.030601] kasan_report+0xff/0x140
[ 45.031411] ? kmalloc_oob_16+0xf3/0x250
[ 45.032390] ? kmalloc_oob_16+0xf3/0x250
[ 45.033245] __asan_store16+0x6c/0xa0
[ 45.034125] kmalloc_oob_16+0xf3/0x250
[ 45.035360] ? __pfx_kmalloc_oob_16+0x10/0x10
[ 45.036087] ? __schedule+0x70b/0x1190
[ 45.036758] ? ktime_get_ts64+0x118/0x140
[ 45.037505] kunit_try_run_case+0x126/0x290
[ 45.038148] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.039297] ? __kasan_check_write+0x18/0x20
[ 45.040265] ? trace_preempt_on+0x20/0xa0
[ 45.041203] ? __kthread_parkme+0x4f/0xd0
[ 45.041983] ? preempt_count_sub+0x50/0x80
[ 45.042869] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.044059] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 45.044937] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.045838] kthread+0x19e/0x1e0
[ 45.046368] ? __pfx_kthread+0x10/0x10
[ 45.046888] ret_from_fork+0x41/0x70
[ 45.047543] ? __pfx_kthread+0x10/0x10
[ 45.048199] ret_from_fork_asm+0x1b/0x30
[ 45.048769] </TASK>
[ 45.049354]
[ 45.049802] Allocated by task 162:
[ 45.050306] kasan_save_stack+0x3c/0x60
[ 45.051090] kasan_set_track+0x29/0x40
[ 45.051668] kasan_save_alloc_info+0x22/0x30
[ 45.052220] __kasan_kmalloc+0xb7/0xc0
[ 45.052800] kmalloc_trace+0x4c/0xb0
[ 45.053262] kmalloc_oob_16+0x8f/0x250
[ 45.054236] kunit_try_run_case+0x126/0x290
[ 45.054728] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.055588] kthread+0x19e/0x1e0
[ 45.056175] ret_from_fork+0x41/0x70
[ 45.056879] ret_from_fork_asm+0x1b/0x30
[ 45.057514]
[ 45.058123] The buggy address belongs to the object at ffff8881023f9920
[ 45.058123] which belongs to the cache kmalloc-16 of size 16
[ 45.059933] The buggy address is located 0 bytes inside of
[ 45.059933] allocated 13-byte region [ffff8881023f9920, ffff8881023f992d)
[ 45.061247]
[ 45.061612] The buggy address belongs to the physical page:
[ 45.062367] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[ 45.063409] flags: 0x200000000000800(slab|node=0|zone=2)
[ 45.064413] page_type: 0xffffffff()
[ 45.065130] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 45.066056] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 45.067246] page dumped because: kasan: bad access detected
[ 45.067810]
[ 45.068347] Memory state around the buggy address:
[ 45.069071] ffff8881023f9800: 00 00 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[ 45.070126] ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 45.071033] >ffff8881023f9900: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc
[ 45.072147] ^
[ 45.072686] ffff8881023f9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.073976] ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.074690] ==================================================================
Home
[ 45.163174] ==================================================================
[ 45.164586] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0xda/0x1e0
[ 45.165489] Write of size 128 at addr ffff888102425c00 by task kunit_try_catch/166
[ 45.166516]
[ 45.166845] CPU: 1 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 45.168453] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 45.169569] Call Trace:
[ 45.170299] <TASK>
[ 45.170909] dump_stack_lvl+0x4e/0x90
[ 45.171660] print_report+0xd2/0x660
[ 45.172413] ? __virt_addr_valid+0x156/0x1e0
[ 45.173300] ? kasan_complete_mode_report_info+0x2a/0x200
[ 45.174276] kasan_report+0xff/0x140
[ 45.174824] ? kmalloc_oob_in_memset+0xda/0x1e0
[ 45.175768] ? kmalloc_oob_in_memset+0xda/0x1e0
[ 45.176629] kasan_check_range+0x10c/0x1c0
[ 45.177364] __asan_memset+0x27/0x50
[ 45.178311] kmalloc_oob_in_memset+0xda/0x1e0
[ 45.178888] ? __pfx_kmalloc_oob_in_memset+0x10/0x10
[ 45.179754] ? __schedule+0x70b/0x1190
[ 45.180329] ? ktime_get_ts64+0x118/0x140
[ 45.181202] kunit_try_run_case+0x126/0x290
[ 45.181514] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.182271] ? __kasan_check_write+0x18/0x20
[ 45.182913] ? trace_preempt_on+0x20/0xa0
[ 45.183416] ? __kthread_parkme+0x4f/0xd0
[ 45.184028] ? preempt_count_sub+0x50/0x80
[ 45.184739] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.185442] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 45.186391] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.187139] kthread+0x19e/0x1e0
[ 45.187582] ? __pfx_kthread+0x10/0x10
[ 45.188252] ret_from_fork+0x41/0x70
[ 45.188903] ? __pfx_kthread+0x10/0x10
[ 45.189441] ret_from_fork_asm+0x1b/0x30
[ 45.190074] </TASK>
[ 45.190468]
[ 45.190762] Allocated by task 166:
[ 45.191328] kasan_save_stack+0x3c/0x60
[ 45.191919] kasan_set_track+0x29/0x40
[ 45.192330] kasan_save_alloc_info+0x22/0x30
[ 45.193089] __kasan_kmalloc+0xb7/0xc0
[ 45.193606] kmalloc_trace+0x4c/0xb0
[ 45.194282] kmalloc_oob_in_memset+0x9f/0x1e0
[ 45.194952] kunit_try_run_case+0x126/0x290
[ 45.195651] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.196412] kthread+0x19e/0x1e0
[ 45.197022] ret_from_fork+0x41/0x70
[ 45.197603] ret_from_fork_asm+0x1b/0x30
[ 45.198288]
[ 45.198625] The buggy address belongs to the object at ffff888102425c00
[ 45.198625] which belongs to the cache kmalloc-128 of size 128
[ 45.199993] The buggy address is located 0 bytes inside of
[ 45.199993] allocated 120-byte region [ffff888102425c00, ffff888102425c78)
[ 45.201314]
[ 45.201575] The buggy address belongs to the physical page:
[ 45.202244] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102425
[ 45.203368] flags: 0x200000000000800(slab|node=0|zone=2)
[ 45.204062] page_type: 0xffffffff()
[ 45.204542] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[ 45.205440] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 45.206228] page dumped because: kasan: bad access detected
[ 45.206909]
[ 45.207237] Memory state around the buggy address:
[ 45.207793] ffff888102425b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 45.209168] ffff888102425b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.210547] >ffff888102425c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 45.211511] ^
[ 45.212314] ffff888102425c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.213151] ffff888102425d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.213977] ==================================================================
Home
[ 43.572848] ==================================================================
[ 43.574513] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0xcf/0x1f0
[ 43.575381] Read of size 1 at addr ffff8881023f98ff by task kunit_try_catch/136
[ 43.576676]
[ 43.576975] CPU: 1 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 43.578323] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 43.579381] Call Trace:
[ 43.580143] <TASK>
[ 43.580434] dump_stack_lvl+0x4e/0x90
[ 43.581298] print_report+0xd2/0x660
[ 43.581830] ? __virt_addr_valid+0x156/0x1e0
[ 43.582404] ? kasan_complete_mode_report_info+0x64/0x200
[ 43.583207] kasan_report+0xff/0x140
[ 43.583496] ? kmalloc_oob_left+0xcf/0x1f0
[ 43.584381] ? kmalloc_oob_left+0xcf/0x1f0
[ 43.584975] __asan_load1+0x66/0x70
[ 43.585460] kmalloc_oob_left+0xcf/0x1f0
[ 43.586159] ? __pfx_kmalloc_oob_left+0x10/0x10
[ 43.586737] ? __schedule+0x70b/0x1190
[ 43.587347] ? ktime_get_ts64+0x118/0x140
[ 43.588122] kunit_try_run_case+0x126/0x290
[ 43.588859] ? __pfx_kunit_try_run_case+0x10/0x10
[ 43.589485] ? __kasan_check_write+0x18/0x20
[ 43.590650] ? trace_preempt_on+0x20/0xa0
[ 43.591468] ? __kthread_parkme+0x4f/0xd0
[ 43.592076] ? preempt_count_sub+0x50/0x80
[ 43.593097] ? __pfx_kunit_try_run_case+0x10/0x10
[ 43.593879] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 43.594692] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 43.595518] kthread+0x19e/0x1e0
[ 43.596269] ? __pfx_kthread+0x10/0x10
[ 43.596812] ret_from_fork+0x41/0x70
[ 43.597326] ? __pfx_kthread+0x10/0x10
[ 43.597875] ret_from_fork_asm+0x1b/0x30
[ 43.598905] </TASK>
[ 43.599431]
[ 43.599771] Allocated by task 1:
[ 43.600639] kasan_save_stack+0x3c/0x60
[ 43.601482] kasan_set_track+0x29/0x40
[ 43.602300] kasan_save_alloc_info+0x22/0x30
[ 43.603243] __kasan_kmalloc+0xb7/0xc0
[ 43.603793] __kmalloc+0x65/0x170
[ 43.604542] kobject_get_path+0x81/0x130
[ 43.605022] kobject_uevent_env+0x13e/0x890
[ 43.606012] kobject_uevent+0xf/0x20
[ 43.606508] param_sysfs_builtin_init+0x1e4/0x280
[ 43.607559] do_one_initcall+0xb3/0x340
[ 43.608170] kernel_init_freeable+0x2ae/0x470
[ 43.608773] kernel_init+0x23/0x1e0
[ 43.609510] ret_from_fork+0x41/0x70
[ 43.610058] ret_from_fork_asm+0x1b/0x30
[ 43.610576]
[ 43.610897] Freed by task 1:
[ 43.611561] kasan_save_stack+0x3c/0x60
[ 43.612415] kasan_set_track+0x29/0x40
[ 43.613184] kasan_save_free_info+0x2f/0x50
[ 43.613916] ____kasan_slab_free+0x172/0x1d0
[ 43.614733] __kasan_slab_free+0x16/0x20
[ 43.615317] __kmem_cache_free+0x190/0x310
[ 43.615812] kfree+0x7c/0x120
[ 43.616415] kobject_uevent_env+0x16e/0x890
[ 43.617015] kobject_uevent+0xf/0x20
[ 43.617504] param_sysfs_builtin_init+0x1e4/0x280
[ 43.618148] do_one_initcall+0xb3/0x340
[ 43.618783] kernel_init_freeable+0x2ae/0x470
[ 43.619344] kernel_init+0x23/0x1e0
[ 43.619937] ret_from_fork+0x41/0x70
[ 43.620510] ret_from_fork_asm+0x1b/0x30
[ 43.621174]
[ 43.621547] The buggy address belongs to the object at ffff8881023f98e0
[ 43.621547] which belongs to the cache kmalloc-16 of size 16
[ 43.622939] The buggy address is located 15 bytes to the right of
[ 43.622939] allocated 16-byte region [ffff8881023f98e0, ffff8881023f98f0)
[ 43.624298]
[ 43.624580] The buggy address belongs to the physical page:
[ 43.625312] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[ 43.626306] flags: 0x200000000000800(slab|node=0|zone=2)
[ 43.627071] page_type: 0xffffffff()
[ 43.627574] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 43.628446] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 43.629322] page dumped because: kasan: bad access detected
[ 43.630124]
[ 43.630810] Memory state around the buggy address:
[ 43.631547] ffff8881023f9780: 00 00 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[ 43.632410] ffff8881023f9800: 00 00 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[ 43.633190] >ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 43.633850] ^
[ 43.634928] ffff8881023f9900: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.635747] ffff8881023f9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.637314] ==================================================================
Home
[ 45.424133] ==================================================================
[ 45.426080] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xdd/0x1e0
[ 45.427054] Write of size 16 at addr ffff888102427069 by task kunit_try_catch/174
[ 45.428380]
[ 45.429174] CPU: 1 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 45.430562] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 45.431855] Call Trace:
[ 45.432207] <TASK>
[ 45.432546] dump_stack_lvl+0x4e/0x90
[ 45.433880] print_report+0xd2/0x660
[ 45.434594] ? __virt_addr_valid+0x156/0x1e0
[ 45.435480] ? kasan_complete_mode_report_info+0x2a/0x200
[ 45.436300] kasan_report+0xff/0x140
[ 45.437054] ? kmalloc_oob_memset_16+0xdd/0x1e0
[ 45.437867] ? kmalloc_oob_memset_16+0xdd/0x1e0
[ 45.438478] kasan_check_range+0x10c/0x1c0
[ 45.439466] __asan_memset+0x27/0x50
[ 45.440172] kmalloc_oob_memset_16+0xdd/0x1e0
[ 45.441048] ? __pfx_kmalloc_oob_memset_16+0x10/0x10
[ 45.442043] ? __schedule+0x70b/0x1190
[ 45.443212] ? ktime_get_ts64+0x118/0x140
[ 45.444452] kunit_try_run_case+0x126/0x290
[ 45.445250] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.445844] ? __kasan_check_write+0x18/0x20
[ 45.446556] ? trace_preempt_on+0x20/0xa0
[ 45.447301] ? __kthread_parkme+0x4f/0xd0
[ 45.448313] ? preempt_count_sub+0x50/0x80
[ 45.449030] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.449627] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 45.450352] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.451270] kthread+0x19e/0x1e0
[ 45.451782] ? __pfx_kthread+0x10/0x10
[ 45.452287] ret_from_fork+0x41/0x70
[ 45.453114] ? __pfx_kthread+0x10/0x10
[ 45.453984] ret_from_fork_asm+0x1b/0x30
[ 45.454928] </TASK>
[ 45.455341]
[ 45.456162] Allocated by task 174:
[ 45.456765] kasan_save_stack+0x3c/0x60
[ 45.457439] kasan_set_track+0x29/0x40
[ 45.458286] kasan_save_alloc_info+0x22/0x30
[ 45.458906] __kasan_kmalloc+0xb7/0xc0
[ 45.459620] kmalloc_trace+0x4c/0xb0
[ 45.460548] kmalloc_oob_memset_16+0x9f/0x1e0
[ 45.461684] kunit_try_run_case+0x126/0x290
[ 45.462503] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.463447] kthread+0x19e/0x1e0
[ 45.463901] ret_from_fork+0x41/0x70
[ 45.464340] ret_from_fork_asm+0x1b/0x30
[ 45.465328]
[ 45.466072] The buggy address belongs to the object at ffff888102427000
[ 45.466072] which belongs to the cache kmalloc-128 of size 128
[ 45.467561] The buggy address is located 105 bytes inside of
[ 45.467561] allocated 120-byte region [ffff888102427000, ffff888102427078)
[ 45.469228]
[ 45.469543] The buggy address belongs to the physical page:
[ 45.470257] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102427
[ 45.471467] flags: 0x200000000000800(slab|node=0|zone=2)
[ 45.472358] page_type: 0xffffffff()
[ 45.472959] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[ 45.474637] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 45.475958] page dumped because: kasan: bad access detected
[ 45.476602]
[ 45.477512] Memory state around the buggy address:
[ 45.478141] ffff888102426f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.478927] ffff888102426f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.480222] >ffff888102427000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 45.481474] ^
[ 45.482669] ffff888102427080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.483515] ffff888102427100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.484520] ==================================================================
Home
[ 45.424133] ==================================================================
[ 45.426080] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xdd/0x1e0
[ 45.427054] Write of size 16 at addr ffff888102427069 by task kunit_try_catch/174
[ 45.428380]
[ 45.429174] CPU: 1 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 45.430562] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 45.431855] Call Trace:
[ 45.432207] <TASK>
[ 45.432546] dump_stack_lvl+0x4e/0x90
[ 45.433880] print_report+0xd2/0x660
[ 45.434594] ? __virt_addr_valid+0x156/0x1e0
[ 45.435480] ? kasan_complete_mode_report_info+0x2a/0x200
[ 45.436300] kasan_report+0xff/0x140
[ 45.437054] ? kmalloc_oob_memset_16+0xdd/0x1e0
[ 45.437867] ? kmalloc_oob_memset_16+0xdd/0x1e0
[ 45.438478] kasan_check_range+0x10c/0x1c0
[ 45.439466] __asan_memset+0x27/0x50
[ 45.440172] kmalloc_oob_memset_16+0xdd/0x1e0
[ 45.441048] ? __pfx_kmalloc_oob_memset_16+0x10/0x10
[ 45.442043] ? __schedule+0x70b/0x1190
[ 45.443212] ? ktime_get_ts64+0x118/0x140
[ 45.444452] kunit_try_run_case+0x126/0x290
[ 45.445250] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.445844] ? __kasan_check_write+0x18/0x20
[ 45.446556] ? trace_preempt_on+0x20/0xa0
[ 45.447301] ? __kthread_parkme+0x4f/0xd0
[ 45.448313] ? preempt_count_sub+0x50/0x80
[ 45.449030] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.449627] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 45.450352] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.451270] kthread+0x19e/0x1e0
[ 45.451782] ? __pfx_kthread+0x10/0x10
[ 45.452287] ret_from_fork+0x41/0x70
[ 45.453114] ? __pfx_kthread+0x10/0x10
[ 45.453984] ret_from_fork_asm+0x1b/0x30
[ 45.454928] </TASK>
[ 45.455341]
[ 45.456162] Allocated by task 174:
[ 45.456765] kasan_save_stack+0x3c/0x60
[ 45.457439] kasan_set_track+0x29/0x40
[ 45.458286] kasan_save_alloc_info+0x22/0x30
[ 45.458906] __kasan_kmalloc+0xb7/0xc0
[ 45.459620] kmalloc_trace+0x4c/0xb0
[ 45.460548] kmalloc_oob_memset_16+0x9f/0x1e0
[ 45.461684] kunit_try_run_case+0x126/0x290
[ 45.462503] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.463447] kthread+0x19e/0x1e0
[ 45.463901] ret_from_fork+0x41/0x70
[ 45.464340] ret_from_fork_asm+0x1b/0x30
[ 45.465328]
[ 45.466072] The buggy address belongs to the object at ffff888102427000
[ 45.466072] which belongs to the cache kmalloc-128 of size 128
[ 45.467561] The buggy address is located 105 bytes inside of
[ 45.467561] allocated 120-byte region [ffff888102427000, ffff888102427078)
[ 45.469228]
[ 45.469543] The buggy address belongs to the physical page:
[ 45.470257] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102427
[ 45.471467] flags: 0x200000000000800(slab|node=0|zone=2)
[ 45.472358] page_type: 0xffffffff()
[ 45.472959] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[ 45.474637] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 45.475958] page dumped because: kasan: bad access detected
[ 45.476602]
[ 45.477512] Memory state around the buggy address:
[ 45.478141] ffff888102426f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.478927] ffff888102426f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.480222] >ffff888102427000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 45.481474] ^
[ 45.482669] ffff888102427080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.483515] ffff888102427100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.484520] ==================================================================
Home
[ 45.222465] ==================================================================
[ 45.223808] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xdd/0x1e0
[ 45.224714] Write of size 2 at addr ffff888102425d77 by task kunit_try_catch/168
[ 45.225334]
[ 45.225777] CPU: 1 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 45.227518] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 45.228735] Call Trace:
[ 45.229054] <TASK>
[ 45.229737] dump_stack_lvl+0x4e/0x90
[ 45.230256] print_report+0xd2/0x660
[ 45.230859] ? __virt_addr_valid+0x156/0x1e0
[ 45.231684] ? kasan_complete_mode_report_info+0x2a/0x200
[ 45.232859] kasan_report+0xff/0x140
[ 45.233513] ? kmalloc_oob_memset_2+0xdd/0x1e0
[ 45.234396] ? kmalloc_oob_memset_2+0xdd/0x1e0
[ 45.235269] kasan_check_range+0x10c/0x1c0
[ 45.235978] __asan_memset+0x27/0x50
[ 45.236708] kmalloc_oob_memset_2+0xdd/0x1e0
[ 45.237606] ? __pfx_kmalloc_oob_memset_2+0x10/0x10
[ 45.238478] ? __schedule+0x70b/0x1190
[ 45.239153] ? ktime_get_ts64+0x118/0x140
[ 45.240118] kunit_try_run_case+0x126/0x290
[ 45.240802] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.242185] ? __kasan_check_write+0x18/0x20
[ 45.242901] ? trace_preempt_on+0x20/0xa0
[ 45.243559] ? __kthread_parkme+0x4f/0xd0
[ 45.244399] ? preempt_count_sub+0x50/0x80
[ 45.245226] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.245954] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 45.246788] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.247457] kthread+0x19e/0x1e0
[ 45.248364] ? __pfx_kthread+0x10/0x10
[ 45.248931] ret_from_fork+0x41/0x70
[ 45.249663] ? __pfx_kthread+0x10/0x10
[ 45.250845] ret_from_fork_asm+0x1b/0x30
[ 45.251542] </TASK>
[ 45.252347]
[ 45.252856] Allocated by task 168:
[ 45.253396] kasan_save_stack+0x3c/0x60
[ 45.254414] kasan_set_track+0x29/0x40
[ 45.255063] kasan_save_alloc_info+0x22/0x30
[ 45.255642] __kasan_kmalloc+0xb7/0xc0
[ 45.256097] kmalloc_trace+0x4c/0xb0
[ 45.256755] kmalloc_oob_memset_2+0x9f/0x1e0
[ 45.257410] kunit_try_run_case+0x126/0x290
[ 45.258362] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.259369] kthread+0x19e/0x1e0
[ 45.260120] ret_from_fork+0x41/0x70
[ 45.260974] ret_from_fork_asm+0x1b/0x30
[ 45.261785]
[ 45.262195] The buggy address belongs to the object at ffff888102425d00
[ 45.262195] which belongs to the cache kmalloc-128 of size 128
[ 45.264043] The buggy address is located 119 bytes inside of
[ 45.264043] allocated 120-byte region [ffff888102425d00, ffff888102425d78)
[ 45.265966]
[ 45.266282] The buggy address belongs to the physical page:
[ 45.267132] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102425
[ 45.268441] flags: 0x200000000000800(slab|node=0|zone=2)
[ 45.269277] page_type: 0xffffffff()
[ 45.269843] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[ 45.270891] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 45.272012] page dumped because: kasan: bad access detected
[ 45.272739]
[ 45.273047] Memory state around the buggy address:
[ 45.273937] ffff888102425c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 45.274952] ffff888102425c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.276209] >ffff888102425d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 45.277198] ^
[ 45.277631] ffff888102425d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.278577] ffff888102425e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.279651] ==================================================================
Home
[ 45.222465] ==================================================================
[ 45.223808] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xdd/0x1e0
[ 45.224714] Write of size 2 at addr ffff888102425d77 by task kunit_try_catch/168
[ 45.225334]
[ 45.225777] CPU: 1 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 45.227518] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 45.228735] Call Trace:
[ 45.229054] <TASK>
[ 45.229737] dump_stack_lvl+0x4e/0x90
[ 45.230256] print_report+0xd2/0x660
[ 45.230859] ? __virt_addr_valid+0x156/0x1e0
[ 45.231684] ? kasan_complete_mode_report_info+0x2a/0x200
[ 45.232859] kasan_report+0xff/0x140
[ 45.233513] ? kmalloc_oob_memset_2+0xdd/0x1e0
[ 45.234396] ? kmalloc_oob_memset_2+0xdd/0x1e0
[ 45.235269] kasan_check_range+0x10c/0x1c0
[ 45.235978] __asan_memset+0x27/0x50
[ 45.236708] kmalloc_oob_memset_2+0xdd/0x1e0
[ 45.237606] ? __pfx_kmalloc_oob_memset_2+0x10/0x10
[ 45.238478] ? __schedule+0x70b/0x1190
[ 45.239153] ? ktime_get_ts64+0x118/0x140
[ 45.240118] kunit_try_run_case+0x126/0x290
[ 45.240802] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.242185] ? __kasan_check_write+0x18/0x20
[ 45.242901] ? trace_preempt_on+0x20/0xa0
[ 45.243559] ? __kthread_parkme+0x4f/0xd0
[ 45.244399] ? preempt_count_sub+0x50/0x80
[ 45.245226] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.245954] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 45.246788] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.247457] kthread+0x19e/0x1e0
[ 45.248364] ? __pfx_kthread+0x10/0x10
[ 45.248931] ret_from_fork+0x41/0x70
[ 45.249663] ? __pfx_kthread+0x10/0x10
[ 45.250845] ret_from_fork_asm+0x1b/0x30
[ 45.251542] </TASK>
[ 45.252347]
[ 45.252856] Allocated by task 168:
[ 45.253396] kasan_save_stack+0x3c/0x60
[ 45.254414] kasan_set_track+0x29/0x40
[ 45.255063] kasan_save_alloc_info+0x22/0x30
[ 45.255642] __kasan_kmalloc+0xb7/0xc0
[ 45.256097] kmalloc_trace+0x4c/0xb0
[ 45.256755] kmalloc_oob_memset_2+0x9f/0x1e0
[ 45.257410] kunit_try_run_case+0x126/0x290
[ 45.258362] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.259369] kthread+0x19e/0x1e0
[ 45.260120] ret_from_fork+0x41/0x70
[ 45.260974] ret_from_fork_asm+0x1b/0x30
[ 45.261785]
[ 45.262195] The buggy address belongs to the object at ffff888102425d00
[ 45.262195] which belongs to the cache kmalloc-128 of size 128
[ 45.264043] The buggy address is located 119 bytes inside of
[ 45.264043] allocated 120-byte region [ffff888102425d00, ffff888102425d78)
[ 45.265966]
[ 45.266282] The buggy address belongs to the physical page:
[ 45.267132] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102425
[ 45.268441] flags: 0x200000000000800(slab|node=0|zone=2)
[ 45.269277] page_type: 0xffffffff()
[ 45.269843] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[ 45.270891] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 45.272012] page dumped because: kasan: bad access detected
[ 45.272739]
[ 45.273047] Memory state around the buggy address:
[ 45.273937] ffff888102425c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 45.274952] ffff888102425c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.276209] >ffff888102425d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 45.277198] ^
[ 45.277631] ffff888102425d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.278577] ffff888102425e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.279651] ==================================================================
Home
[ 45.289080] ==================================================================
[ 45.290570] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xdd/0x1e0
[ 45.291755] Write of size 4 at addr ffff888102425e75 by task kunit_try_catch/170
[ 45.293571]
[ 45.294230] CPU: 1 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 45.295496] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 45.296387] Call Trace:
[ 45.297127] <TASK>
[ 45.298082] dump_stack_lvl+0x4e/0x90
[ 45.298812] print_report+0xd2/0x660
[ 45.299591] ? __virt_addr_valid+0x156/0x1e0
[ 45.300351] ? kasan_complete_mode_report_info+0x2a/0x200
[ 45.301431] kasan_report+0xff/0x140
[ 45.302178] ? kmalloc_oob_memset_4+0xdd/0x1e0
[ 45.303216] ? kmalloc_oob_memset_4+0xdd/0x1e0
[ 45.304823] kasan_check_range+0x10c/0x1c0
[ 45.305434] __asan_memset+0x27/0x50
[ 45.306096] kmalloc_oob_memset_4+0xdd/0x1e0
[ 45.306423] ? __pfx_kmalloc_oob_memset_4+0x10/0x10
[ 45.307269] ? ret_from_fork+0x41/0x70
[ 45.308147] ? __pfx_kmalloc_oob_memset_4+0x10/0x10
[ 45.309352] ? kunit_try_run_case+0x11b/0x290
[ 45.310274] kunit_try_run_case+0x126/0x290
[ 45.311618] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.312414] ? __kasan_check_write+0x18/0x20
[ 45.313354] ? trace_preempt_on+0x20/0xa0
[ 45.314995] ? __kthread_parkme+0x4f/0xd0
[ 45.315646] ? preempt_count_sub+0x50/0x80
[ 45.316607] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.317386] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 45.318508] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.319301] kthread+0x19e/0x1e0
[ 45.319999] ? __pfx_kthread+0x10/0x10
[ 45.320648] ret_from_fork+0x41/0x70
[ 45.321387] ? __pfx_kthread+0x10/0x10
[ 45.322923] ret_from_fork_asm+0x1b/0x30
[ 45.323734] </TASK>
[ 45.324109]
[ 45.324592] Allocated by task 170:
[ 45.325628] kasan_save_stack+0x3c/0x60
[ 45.326331] kasan_set_track+0x29/0x40
[ 45.326772] kasan_save_alloc_info+0x22/0x30
[ 45.328104] __kasan_kmalloc+0xb7/0xc0
[ 45.328980] kmalloc_trace+0x4c/0xb0
[ 45.329656] kmalloc_oob_memset_4+0x9f/0x1e0
[ 45.330282] kunit_try_run_case+0x126/0x290
[ 45.330827] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.331436] kthread+0x19e/0x1e0
[ 45.332508] ret_from_fork+0x41/0x70
[ 45.333394] ret_from_fork_asm+0x1b/0x30
[ 45.334329]
[ 45.334682] The buggy address belongs to the object at ffff888102425e00
[ 45.334682] which belongs to the cache kmalloc-128 of size 128
[ 45.336077] The buggy address is located 117 bytes inside of
[ 45.336077] allocated 120-byte region [ffff888102425e00, ffff888102425e78)
[ 45.337129]
[ 45.337541] The buggy address belongs to the physical page:
[ 45.338687] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102425
[ 45.340503] flags: 0x200000000000800(slab|node=0|zone=2)
[ 45.341684] page_type: 0xffffffff()
[ 45.342555] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[ 45.343493] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 45.344683] page dumped because: kasan: bad access detected
[ 45.345577]
[ 45.346155] Memory state around the buggy address:
[ 45.346725] ffff888102425d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 45.348423] ffff888102425d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.349789] >ffff888102425e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 45.351039] ^
[ 45.352253] ffff888102425e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.353304] ffff888102425f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.354433] ==================================================================
Home
[ 45.289080] ==================================================================
[ 45.290570] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xdd/0x1e0
[ 45.291755] Write of size 4 at addr ffff888102425e75 by task kunit_try_catch/170
[ 45.293571]
[ 45.294230] CPU: 1 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 45.295496] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 45.296387] Call Trace:
[ 45.297127] <TASK>
[ 45.298082] dump_stack_lvl+0x4e/0x90
[ 45.298812] print_report+0xd2/0x660
[ 45.299591] ? __virt_addr_valid+0x156/0x1e0
[ 45.300351] ? kasan_complete_mode_report_info+0x2a/0x200
[ 45.301431] kasan_report+0xff/0x140
[ 45.302178] ? kmalloc_oob_memset_4+0xdd/0x1e0
[ 45.303216] ? kmalloc_oob_memset_4+0xdd/0x1e0
[ 45.304823] kasan_check_range+0x10c/0x1c0
[ 45.305434] __asan_memset+0x27/0x50
[ 45.306096] kmalloc_oob_memset_4+0xdd/0x1e0
[ 45.306423] ? __pfx_kmalloc_oob_memset_4+0x10/0x10
[ 45.307269] ? ret_from_fork+0x41/0x70
[ 45.308147] ? __pfx_kmalloc_oob_memset_4+0x10/0x10
[ 45.309352] ? kunit_try_run_case+0x11b/0x290
[ 45.310274] kunit_try_run_case+0x126/0x290
[ 45.311618] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.312414] ? __kasan_check_write+0x18/0x20
[ 45.313354] ? trace_preempt_on+0x20/0xa0
[ 45.314995] ? __kthread_parkme+0x4f/0xd0
[ 45.315646] ? preempt_count_sub+0x50/0x80
[ 45.316607] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.317386] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 45.318508] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.319301] kthread+0x19e/0x1e0
[ 45.319999] ? __pfx_kthread+0x10/0x10
[ 45.320648] ret_from_fork+0x41/0x70
[ 45.321387] ? __pfx_kthread+0x10/0x10
[ 45.322923] ret_from_fork_asm+0x1b/0x30
[ 45.323734] </TASK>
[ 45.324109]
[ 45.324592] Allocated by task 170:
[ 45.325628] kasan_save_stack+0x3c/0x60
[ 45.326331] kasan_set_track+0x29/0x40
[ 45.326772] kasan_save_alloc_info+0x22/0x30
[ 45.328104] __kasan_kmalloc+0xb7/0xc0
[ 45.328980] kmalloc_trace+0x4c/0xb0
[ 45.329656] kmalloc_oob_memset_4+0x9f/0x1e0
[ 45.330282] kunit_try_run_case+0x126/0x290
[ 45.330827] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.331436] kthread+0x19e/0x1e0
[ 45.332508] ret_from_fork+0x41/0x70
[ 45.333394] ret_from_fork_asm+0x1b/0x30
[ 45.334329]
[ 45.334682] The buggy address belongs to the object at ffff888102425e00
[ 45.334682] which belongs to the cache kmalloc-128 of size 128
[ 45.336077] The buggy address is located 117 bytes inside of
[ 45.336077] allocated 120-byte region [ffff888102425e00, ffff888102425e78)
[ 45.337129]
[ 45.337541] The buggy address belongs to the physical page:
[ 45.338687] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102425
[ 45.340503] flags: 0x200000000000800(slab|node=0|zone=2)
[ 45.341684] page_type: 0xffffffff()
[ 45.342555] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[ 45.343493] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 45.344683] page dumped because: kasan: bad access detected
[ 45.345577]
[ 45.346155] Memory state around the buggy address:
[ 45.346725] ffff888102425d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 45.348423] ffff888102425d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.349789] >ffff888102425e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 45.351039] ^
[ 45.352253] ffff888102425e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.353304] ffff888102425f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.354433] ==================================================================
Home
[ 45.363863] ==================================================================
[ 45.365084] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xdd/0x1e0
[ 45.365952] Write of size 8 at addr ffff888102425f71 by task kunit_try_catch/172
[ 45.367562]
[ 45.367987] CPU: 1 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 45.369100] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 45.370254] Call Trace:
[ 45.370641] <TASK>
[ 45.371258] dump_stack_lvl+0x4e/0x90
[ 45.371844] print_report+0xd2/0x660
[ 45.372409] ? __virt_addr_valid+0x156/0x1e0
[ 45.373095] ? kasan_complete_mode_report_info+0x2a/0x200
[ 45.373768] kasan_report+0xff/0x140
[ 45.374445] ? kmalloc_oob_memset_8+0xdd/0x1e0
[ 45.375284] ? kmalloc_oob_memset_8+0xdd/0x1e0
[ 45.376075] kasan_check_range+0x10c/0x1c0
[ 45.376765] __asan_memset+0x27/0x50
[ 45.377343] kmalloc_oob_memset_8+0xdd/0x1e0
[ 45.378058] ? __pfx_kmalloc_oob_memset_8+0x10/0x10
[ 45.378901] ? ret_from_fork+0x41/0x70
[ 45.379589] ? __pfx_kmalloc_oob_memset_8+0x10/0x10
[ 45.380353] ? kunit_try_run_case+0x11b/0x290
[ 45.381021] kunit_try_run_case+0x126/0x290
[ 45.381596] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.382411] ? __kasan_check_write+0x18/0x20
[ 45.383161] ? trace_preempt_on+0x20/0xa0
[ 45.383847] ? __kthread_parkme+0x4f/0xd0
[ 45.384543] ? preempt_count_sub+0x50/0x80
[ 45.385251] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.385987] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 45.386821] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.387705] kthread+0x19e/0x1e0
[ 45.388288] ? __pfx_kthread+0x10/0x10
[ 45.388965] ret_from_fork+0x41/0x70
[ 45.389559] ? __pfx_kthread+0x10/0x10
[ 45.390257] ret_from_fork_asm+0x1b/0x30
[ 45.390968] </TASK>
[ 45.391332]
[ 45.391687] Allocated by task 172:
[ 45.392250] kasan_save_stack+0x3c/0x60
[ 45.392938] kasan_set_track+0x29/0x40
[ 45.393570] kasan_save_alloc_info+0x22/0x30
[ 45.394150] __kasan_kmalloc+0xb7/0xc0
[ 45.394634] kmalloc_trace+0x4c/0xb0
[ 45.395338] kmalloc_oob_memset_8+0x9f/0x1e0
[ 45.396014] kunit_try_run_case+0x126/0x290
[ 45.396703] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.397483] kthread+0x19e/0x1e0
[ 45.398097] ret_from_fork+0x41/0x70
[ 45.398684] ret_from_fork_asm+0x1b/0x30
[ 45.399329]
[ 45.399671] The buggy address belongs to the object at ffff888102425f00
[ 45.399671] which belongs to the cache kmalloc-128 of size 128
[ 45.401134] The buggy address is located 113 bytes inside of
[ 45.401134] allocated 120-byte region [ffff888102425f00, ffff888102425f78)
[ 45.402599]
[ 45.402983] The buggy address belongs to the physical page:
[ 45.403667] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102425
[ 45.404781] flags: 0x200000000000800(slab|node=0|zone=2)
[ 45.405501] page_type: 0xffffffff()
[ 45.406210] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[ 45.407198] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 45.408163] page dumped because: kasan: bad access detected
[ 45.408893]
[ 45.409234] Memory state around the buggy address:
[ 45.410057] ffff888102425e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 45.410993] ffff888102425e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.411764] >ffff888102425f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 45.412711] ^
[ 45.413652] ffff888102425f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.414545] ffff888102426000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 45.415428] ==================================================================
Home
[ 45.363863] ==================================================================
[ 45.365084] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xdd/0x1e0
[ 45.365952] Write of size 8 at addr ffff888102425f71 by task kunit_try_catch/172
[ 45.367562]
[ 45.367987] CPU: 1 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 45.369100] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 45.370254] Call Trace:
[ 45.370641] <TASK>
[ 45.371258] dump_stack_lvl+0x4e/0x90
[ 45.371844] print_report+0xd2/0x660
[ 45.372409] ? __virt_addr_valid+0x156/0x1e0
[ 45.373095] ? kasan_complete_mode_report_info+0x2a/0x200
[ 45.373768] kasan_report+0xff/0x140
[ 45.374445] ? kmalloc_oob_memset_8+0xdd/0x1e0
[ 45.375284] ? kmalloc_oob_memset_8+0xdd/0x1e0
[ 45.376075] kasan_check_range+0x10c/0x1c0
[ 45.376765] __asan_memset+0x27/0x50
[ 45.377343] kmalloc_oob_memset_8+0xdd/0x1e0
[ 45.378058] ? __pfx_kmalloc_oob_memset_8+0x10/0x10
[ 45.378901] ? ret_from_fork+0x41/0x70
[ 45.379589] ? __pfx_kmalloc_oob_memset_8+0x10/0x10
[ 45.380353] ? kunit_try_run_case+0x11b/0x290
[ 45.381021] kunit_try_run_case+0x126/0x290
[ 45.381596] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.382411] ? __kasan_check_write+0x18/0x20
[ 45.383161] ? trace_preempt_on+0x20/0xa0
[ 45.383847] ? __kthread_parkme+0x4f/0xd0
[ 45.384543] ? preempt_count_sub+0x50/0x80
[ 45.385251] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.385987] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 45.386821] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.387705] kthread+0x19e/0x1e0
[ 45.388288] ? __pfx_kthread+0x10/0x10
[ 45.388965] ret_from_fork+0x41/0x70
[ 45.389559] ? __pfx_kthread+0x10/0x10
[ 45.390257] ret_from_fork_asm+0x1b/0x30
[ 45.390968] </TASK>
[ 45.391332]
[ 45.391687] Allocated by task 172:
[ 45.392250] kasan_save_stack+0x3c/0x60
[ 45.392938] kasan_set_track+0x29/0x40
[ 45.393570] kasan_save_alloc_info+0x22/0x30
[ 45.394150] __kasan_kmalloc+0xb7/0xc0
[ 45.394634] kmalloc_trace+0x4c/0xb0
[ 45.395338] kmalloc_oob_memset_8+0x9f/0x1e0
[ 45.396014] kunit_try_run_case+0x126/0x290
[ 45.396703] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.397483] kthread+0x19e/0x1e0
[ 45.398097] ret_from_fork+0x41/0x70
[ 45.398684] ret_from_fork_asm+0x1b/0x30
[ 45.399329]
[ 45.399671] The buggy address belongs to the object at ffff888102425f00
[ 45.399671] which belongs to the cache kmalloc-128 of size 128
[ 45.401134] The buggy address is located 113 bytes inside of
[ 45.401134] allocated 120-byte region [ffff888102425f00, ffff888102425f78)
[ 45.402599]
[ 45.402983] The buggy address belongs to the physical page:
[ 45.403667] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102425
[ 45.404781] flags: 0x200000000000800(slab|node=0|zone=2)
[ 45.405501] page_type: 0xffffffff()
[ 45.406210] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[ 45.407198] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 45.408163] page dumped because: kasan: bad access detected
[ 45.408893]
[ 45.409234] Memory state around the buggy address:
[ 45.410057] ffff888102425e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 45.410993] ffff888102425e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.411764] >ffff888102425f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 45.412711] ^
[ 45.413652] ffff888102425f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.414545] ffff888102426000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 45.415428] ==================================================================
Home
[ 43.459463] ==================================================================
[ 43.460090] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x108/0x330
[ 43.461172] Write of size 1 at addr ffff888102420b78 by task kunit_try_catch/134
[ 43.462596]
[ 43.462853] CPU: 1 PID: 134 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 43.463976] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 43.464994] Call Trace:
[ 43.465367] <TASK>
[ 43.465742] dump_stack_lvl+0x4e/0x90
[ 43.466453] print_report+0xd2/0x660
[ 43.467238] ? __virt_addr_valid+0x156/0x1e0
[ 43.467813] ? kasan_complete_mode_report_info+0x2a/0x200
[ 43.469122] kasan_report+0xff/0x140
[ 43.469805] ? kmalloc_oob_right+0x108/0x330
[ 43.470381] ? kmalloc_oob_right+0x108/0x330
[ 43.470970] __asan_store1+0x69/0x70
[ 43.471501] kmalloc_oob_right+0x108/0x330
[ 43.472248] ? __pfx_kmalloc_oob_right+0x10/0x10
[ 43.473196] ? __schedule+0x70b/0x1190
[ 43.473722] ? ktime_get_ts64+0x118/0x140
[ 43.474523] kunit_try_run_case+0x126/0x290
[ 43.475338] ? __pfx_kunit_try_run_case+0x10/0x10
[ 43.476254] ? __kasan_check_write+0x18/0x20
[ 43.476801] ? trace_preempt_on+0x20/0xa0
[ 43.477855] ? __kthread_parkme+0x4f/0xd0
[ 43.478646] ? preempt_count_sub+0x50/0x80
[ 43.479412] ? __pfx_kunit_try_run_case+0x10/0x10
[ 43.480623] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 43.481457] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 43.482452] kthread+0x19e/0x1e0
[ 43.483368] ? __pfx_kthread+0x10/0x10
[ 43.483923] ret_from_fork+0x41/0x70
[ 43.484615] ? __pfx_kthread+0x10/0x10
[ 43.485574] ret_from_fork_asm+0x1b/0x30
[ 43.486116] </TASK>
[ 43.486685]
[ 43.487030] Allocated by task 134:
[ 43.487584] kasan_save_stack+0x3c/0x60
[ 43.488201] kasan_set_track+0x29/0x40
[ 43.488921] kasan_save_alloc_info+0x22/0x30
[ 43.489633] __kasan_kmalloc+0xb7/0xc0
[ 43.490209] kmalloc_trace+0x4c/0xb0
[ 43.490848] kmalloc_oob_right+0x9f/0x330
[ 43.491513] kunit_try_run_case+0x126/0x290
[ 43.492248] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 43.492975] kthread+0x19e/0x1e0
[ 43.493566] ret_from_fork+0x41/0x70
[ 43.494330] ret_from_fork_asm+0x1b/0x30
[ 43.494951]
[ 43.495376] The buggy address belongs to the object at ffff888102420b00
[ 43.495376] which belongs to the cache kmalloc-128 of size 128
[ 43.496788] The buggy address is located 5 bytes to the right of
[ 43.496788] allocated 115-byte region [ffff888102420b00, ffff888102420b73)
[ 43.498600]
[ 43.498853] The buggy address belongs to the physical page:
[ 43.499677] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102420
[ 43.500586] flags: 0x200000000000800(slab|node=0|zone=2)
[ 43.501511] page_type: 0xffffffff()
[ 43.502359] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[ 43.503473] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 43.504474] page dumped because: kasan: bad access detected
[ 43.505253]
[ 43.505593] Memory state around the buggy address:
[ 43.506329] ffff888102420a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 43.507349] ffff888102420a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.508164] >ffff888102420b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 43.508938] ^
[ 43.509795] ffff888102420b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.510727] ffff888102420c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.511795] ==================================================================
Home
[ 43.403809] ==================================================================
[ 43.405131] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xcf/0x330
[ 43.406666] Write of size 1 at addr ffff888102420b73 by task kunit_try_catch/134
[ 43.407404]
[ 43.408465] CPU: 1 PID: 134 Comm: kunit_try_catch Tainted: G N 6.6.74-rc1 #1
[ 43.409626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 43.411267] Call Trace:
[ 43.411740] <TASK>
[ 43.412360] dump_stack_lvl+0x4e/0x90
[ 43.413126] print_report+0xd2/0x660
[ 43.413646] ? __virt_addr_valid+0x156/0x1e0
[ 43.414372] ? kasan_complete_mode_report_info+0x2a/0x200
[ 43.415199] kasan_report+0xff/0x140
[ 43.415681] ? kmalloc_oob_right+0xcf/0x330
[ 43.416415] ? kmalloc_oob_right+0xcf/0x330
[ 43.416997] __asan_store1+0x69/0x70
[ 43.417622] kmalloc_oob_right+0xcf/0x330
[ 43.418185] ? __pfx_kmalloc_oob_right+0x10/0x10
[ 43.418842] ? __schedule+0x70b/0x1190
[ 43.419427] ? ktime_get_ts64+0x118/0x140
[ 43.420122] kunit_try_run_case+0x126/0x290
[ 43.420742] ? __pfx_kunit_try_run_case+0x10/0x10
[ 43.421367] ? __kasan_check_write+0x18/0x20
[ 43.422137] ? trace_preempt_on+0x20/0xa0
[ 43.422804] ? __kthread_parkme+0x4f/0xd0
[ 43.423328] ? preempt_count_sub+0x50/0x80
[ 43.424044] ? __pfx_kunit_try_run_case+0x10/0x10
[ 43.424795] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 43.425600] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 43.426409] kthread+0x19e/0x1e0
[ 43.426991] ? __pfx_kthread+0x10/0x10
[ 43.427560] ret_from_fork+0x41/0x70
[ 43.428150] ? __pfx_kthread+0x10/0x10
[ 43.428740] ret_from_fork_asm+0x1b/0x30
[ 43.429371] </TASK>
[ 43.429975]
[ 43.430355] Allocated by task 134:
[ 43.431080] kasan_save_stack+0x3c/0x60
[ 43.431670] kasan_set_track+0x29/0x40
[ 43.432221] kasan_save_alloc_info+0x22/0x30
[ 43.432839] __kasan_kmalloc+0xb7/0xc0
[ 43.433421] kmalloc_trace+0x4c/0xb0
[ 43.433940] kmalloc_oob_right+0x9f/0x330
[ 43.434553] kunit_try_run_case+0x126/0x290
[ 43.435262] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 43.436021] kthread+0x19e/0x1e0
[ 43.436580] ret_from_fork+0x41/0x70
[ 43.437170] ret_from_fork_asm+0x1b/0x30
[ 43.437850]
[ 43.438275] The buggy address belongs to the object at ffff888102420b00
[ 43.438275] which belongs to the cache kmalloc-128 of size 128
[ 43.439823] The buggy address is located 0 bytes to the right of
[ 43.439823] allocated 115-byte region [ffff888102420b00, ffff888102420b73)
[ 43.441310]
[ 43.441735] The buggy address belongs to the physical page:
[ 43.443050] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102420
[ 43.444427] flags: 0x200000000000800(slab|node=0|zone=2)
[ 43.445685] page_type: 0xffffffff()
[ 43.447048] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[ 43.447926] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 43.448878] page dumped because: kasan: bad access detected
[ 43.449595]
[ 43.449949] Memory state around the buggy address:
[ 43.451157] ffff888102420a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 43.452035] ffff888102420a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.452820] >ffff888102420b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 43.453669] ^
[ 43.454718] ffff888102420b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.455602] ffff888102420c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.456500] ==================================================================
Home
[ 43.512989] ==================================================================
[ 43.514170] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x144/0x330
[ 43.514880] Read of size 1 at addr ffff888102420b80 by task kunit_try_catch/134
[ 43.516338]
[ 43.516607] CPU: 1 PID: 134 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 43.517969] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 43.519201] Call Trace:
[ 43.519556] <TASK>
[ 43.519945] dump_stack_lvl+0x4e/0x90
[ 43.520514] print_report+0xd2/0x660
[ 43.521278] ? __virt_addr_valid+0x156/0x1e0
[ 43.521985] ? kasan_complete_mode_report_info+0x2a/0x200
[ 43.523007] kasan_report+0xff/0x140
[ 43.523616] ? kmalloc_oob_right+0x144/0x330
[ 43.524428] ? kmalloc_oob_right+0x144/0x330
[ 43.525209] __asan_load1+0x66/0x70
[ 43.525781] kmalloc_oob_right+0x144/0x330
[ 43.526322] ? __pfx_kmalloc_oob_right+0x10/0x10
[ 43.526909] ? __schedule+0x70b/0x1190
[ 43.527458] ? ktime_get_ts64+0x118/0x140
[ 43.528226] kunit_try_run_case+0x126/0x290
[ 43.528889] ? __pfx_kunit_try_run_case+0x10/0x10
[ 43.529660] ? __kasan_check_write+0x18/0x20
[ 43.530367] ? trace_preempt_on+0x20/0xa0
[ 43.531003] ? __kthread_parkme+0x4f/0xd0
[ 43.531711] ? preempt_count_sub+0x50/0x80
[ 43.532359] ? __pfx_kunit_try_run_case+0x10/0x10
[ 43.533045] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 43.533927] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 43.534867] kthread+0x19e/0x1e0
[ 43.535476] ? __pfx_kthread+0x10/0x10
[ 43.536170] ret_from_fork+0x41/0x70
[ 43.536747] ? __pfx_kthread+0x10/0x10
[ 43.537404] ret_from_fork_asm+0x1b/0x30
[ 43.538065] </TASK>
[ 43.538520]
[ 43.538869] Allocated by task 134:
[ 43.539566] kasan_save_stack+0x3c/0x60
[ 43.540203] kasan_set_track+0x29/0x40
[ 43.540737] kasan_save_alloc_info+0x22/0x30
[ 43.541409] __kasan_kmalloc+0xb7/0xc0
[ 43.542038] kmalloc_trace+0x4c/0xb0
[ 43.542779] kmalloc_oob_right+0x9f/0x330
[ 43.543398] kunit_try_run_case+0x126/0x290
[ 43.544157] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 43.544875] kthread+0x19e/0x1e0
[ 43.545510] ret_from_fork+0x41/0x70
[ 43.546170] ret_from_fork_asm+0x1b/0x30
[ 43.546860]
[ 43.547268] The buggy address belongs to the object at ffff888102420b00
[ 43.547268] which belongs to the cache kmalloc-128 of size 128
[ 43.548716] The buggy address is located 13 bytes to the right of
[ 43.548716] allocated 115-byte region [ffff888102420b00, ffff888102420b73)
[ 43.550135]
[ 43.550477] The buggy address belongs to the physical page:
[ 43.551204] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102420
[ 43.552554] flags: 0x200000000000800(slab|node=0|zone=2)
[ 43.553357] page_type: 0xffffffff()
[ 43.553900] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[ 43.554836] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 43.555666] page dumped because: kasan: bad access detected
[ 43.556259]
[ 43.556569] Memory state around the buggy address:
[ 43.557379] ffff888102420a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.558384] ffff888102420b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 43.559635] >ffff888102420b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.560203] ^
[ 43.560666] ffff888102420c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.562265] ffff888102420c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.563749] ==================================================================
Home
[ 43.709160] ==================================================================
[ 43.710486] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0xab/0x1c0
[ 43.711509] Write of size 1 at addr ffff8881020b600a by task kunit_try_catch/140
[ 43.712676]
[ 43.713013] CPU: 1 PID: 140 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 43.714113] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 43.715375] Call Trace:
[ 43.715852] <TASK>
[ 43.716410] dump_stack_lvl+0x4e/0x90
[ 43.717185] print_report+0xd2/0x660
[ 43.717869] ? __virt_addr_valid+0x156/0x1e0
[ 43.718436] ? kasan_addr_to_slab+0x11/0xb0
[ 43.719130] kasan_report+0xff/0x140
[ 43.719662] ? kmalloc_pagealloc_oob_right+0xab/0x1c0
[ 43.720375] ? kmalloc_pagealloc_oob_right+0xab/0x1c0
[ 43.721026] __asan_store1+0x69/0x70
[ 43.721700] kmalloc_pagealloc_oob_right+0xab/0x1c0
[ 43.722332] ? __pfx_kmalloc_pagealloc_oob_right+0x10/0x10
[ 43.723423] ? __schedule+0x70b/0x1190
[ 43.724055] ? ktime_get_ts64+0x118/0x140
[ 43.724603] kunit_try_run_case+0x126/0x290
[ 43.725170] ? __pfx_kunit_try_run_case+0x10/0x10
[ 43.725814] ? __kasan_check_write+0x18/0x20
[ 43.726516] ? trace_preempt_on+0x20/0xa0
[ 43.727213] ? __kthread_parkme+0x4f/0xd0
[ 43.727764] ? preempt_count_sub+0x50/0x80
[ 43.728301] ? __pfx_kunit_try_run_case+0x10/0x10
[ 43.729426] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 43.730434] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 43.731417] kthread+0x19e/0x1e0
[ 43.732461] ? __pfx_kthread+0x10/0x10
[ 43.733179] ret_from_fork+0x41/0x70
[ 43.733678] ? __pfx_kthread+0x10/0x10
[ 43.734430] ret_from_fork_asm+0x1b/0x30
[ 43.735550] </TASK>
[ 43.735853]
[ 43.736548] The buggy address belongs to the physical page:
[ 43.737497] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1020b4
[ 43.738444] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 43.739415] flags: 0x200000000000040(head|node=0|zone=2)
[ 43.740103] page_type: 0xffffffff()
[ 43.740649] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 43.741376] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 43.742455] page dumped because: kasan: bad access detected
[ 43.743598]
[ 43.743843] Memory state around the buggy address:
[ 43.744398] ffff8881020b5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 43.745559] ffff8881020b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 43.746599] >ffff8881020b6000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 43.748059] ^
[ 43.748478] ffff8881020b6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 43.749612] ffff8881020b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 43.750673] ==================================================================
Home
[ 45.874513] ==================================================================
[ 45.876816] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xdd/0x260
[ 45.877695] Read of size 1 at addr ffff88810242c0c8 by task kunit_try_catch/192
[ 45.878364]
[ 45.879255] CPU: 1 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 45.880834] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 45.882078] Call Trace:
[ 45.882440] <TASK>
[ 45.883288] dump_stack_lvl+0x4e/0x90
[ 45.884328] print_report+0xd2/0x660
[ 45.885403] ? __virt_addr_valid+0x156/0x1e0
[ 45.886200] ? kasan_complete_mode_report_info+0x2a/0x200
[ 45.886928] kasan_report+0xff/0x140
[ 45.887486] ? kmem_cache_oob+0xdd/0x260
[ 45.888094] ? kmem_cache_oob+0xdd/0x260
[ 45.888761] __asan_load1+0x66/0x70
[ 45.889203] kmem_cache_oob+0xdd/0x260
[ 45.890966] ? __pfx_kmem_cache_oob+0x10/0x10
[ 45.891549] ? __schedule+0x70b/0x1190
[ 45.892558] ? ktime_get_ts64+0x118/0x140
[ 45.893301] kunit_try_run_case+0x126/0x290
[ 45.894548] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.895642] ? __kasan_check_write+0x18/0x20
[ 45.896356] ? trace_preempt_on+0x20/0xa0
[ 45.897038] ? __kthread_parkme+0x4f/0xd0
[ 45.897605] ? preempt_count_sub+0x50/0x80
[ 45.898781] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.899397] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 45.900252] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.900708] kthread+0x19e/0x1e0
[ 45.901408] ? __pfx_kthread+0x10/0x10
[ 45.902950] ret_from_fork+0x41/0x70
[ 45.903505] ? __pfx_kthread+0x10/0x10
[ 45.904316] ret_from_fork_asm+0x1b/0x30
[ 45.905370] </TASK>
[ 45.906183]
[ 45.906448] Allocated by task 192:
[ 45.907074] kasan_save_stack+0x3c/0x60
[ 45.907576] kasan_set_track+0x29/0x40
[ 45.908446] kasan_save_alloc_info+0x22/0x30
[ 45.909279] __kasan_slab_alloc+0x91/0xa0
[ 45.910653] kmem_cache_alloc+0x180/0x3b0
[ 45.911309] kmem_cache_oob+0xb6/0x260
[ 45.912052] kunit_try_run_case+0x126/0x290
[ 45.912798] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.913658] kthread+0x19e/0x1e0
[ 45.914093] ret_from_fork+0x41/0x70
[ 45.914755] ret_from_fork_asm+0x1b/0x30
[ 45.915970]
[ 45.916430] The buggy address belongs to the object at ffff88810242c000
[ 45.916430] which belongs to the cache test_cache of size 200
[ 45.918140] The buggy address is located 0 bytes to the right of
[ 45.918140] allocated 200-byte region [ffff88810242c000, ffff88810242c0c8)
[ 45.919593]
[ 45.919920] The buggy address belongs to the physical page:
[ 45.920398] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10242c
[ 45.921767] flags: 0x200000000000800(slab|node=0|zone=2)
[ 45.923787] page_type: 0xffffffff()
[ 45.924792] raw: 0200000000000800 ffff888101d1f780 dead000000000122 0000000000000000
[ 45.925925] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[ 45.927710] page dumped because: kasan: bad access detected
[ 45.928313]
[ 45.928514] Memory state around the buggy address:
[ 45.929127] ffff88810242bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.930669] ffff88810242c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 45.931907] >ffff88810242c080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[ 45.933737] ^
[ 45.934583] ffff88810242c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.935668] ffff88810242c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.936730] ==================================================================
Home
[ 44.417369] ==================================================================
[ 44.418189] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x294/0x660
[ 44.419386] Write of size 1 at addr ffff888100365eeb by task kunit_try_catch/154
[ 44.421329]
[ 44.421690] CPU: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 44.422916] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 44.423886] Call Trace:
[ 44.424506] <TASK>
[ 44.424891] dump_stack_lvl+0x4e/0x90
[ 44.425590] print_report+0xd2/0x660
[ 44.427373] ? __virt_addr_valid+0x156/0x1e0
[ 44.428146] ? kasan_complete_mode_report_info+0x2a/0x200
[ 44.429228] kasan_report+0xff/0x140
[ 44.429844] ? krealloc_less_oob_helper+0x294/0x660
[ 44.430816] ? krealloc_less_oob_helper+0x294/0x660
[ 44.431692] __asan_store1+0x69/0x70
[ 44.432452] krealloc_less_oob_helper+0x294/0x660
[ 44.433453] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 44.434505] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 44.435574] ? __schedule+0x70b/0x1190
[ 44.436108] ? ktime_get_ts64+0x118/0x140
[ 44.436827] krealloc_less_oob+0x1c/0x30
[ 44.437461] kunit_try_run_case+0x126/0x290
[ 44.438615] ? __pfx_kunit_try_run_case+0x10/0x10
[ 44.439252] ? __kasan_check_write+0x18/0x20
[ 44.440048] ? trace_preempt_on+0x20/0xa0
[ 44.441179] ? __kthread_parkme+0x4f/0xd0
[ 44.441750] ? preempt_count_sub+0x50/0x80
[ 44.442602] ? __pfx_kunit_try_run_case+0x10/0x10
[ 44.443480] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 44.444616] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 44.445519] kthread+0x19e/0x1e0
[ 44.446316] ? __pfx_kthread+0x10/0x10
[ 44.447513] ret_from_fork+0x41/0x70
[ 44.448211] ? __pfx_kthread+0x10/0x10
[ 44.448843] ret_from_fork_asm+0x1b/0x30
[ 44.449424] </TASK>
[ 44.449883]
[ 44.450214] Allocated by task 154:
[ 44.451334] kasan_save_stack+0x3c/0x60
[ 44.451776] kasan_set_track+0x29/0x40
[ 44.452748] kasan_save_alloc_info+0x22/0x30
[ 44.453451] __kasan_krealloc+0x12f/0x180
[ 44.454117] krealloc+0xc1/0x140
[ 44.454361] krealloc_less_oob_helper+0xe5/0x660
[ 44.454884] krealloc_less_oob+0x1c/0x30
[ 44.455804] kunit_try_run_case+0x126/0x290
[ 44.457036] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 44.458131] kthread+0x19e/0x1e0
[ 44.458658] ret_from_fork+0x41/0x70
[ 44.459649] ret_from_fork_asm+0x1b/0x30
[ 44.460515]
[ 44.461087] The buggy address belongs to the object at ffff888100365e00
[ 44.461087] which belongs to the cache kmalloc-256 of size 256
[ 44.463003] The buggy address is located 34 bytes to the right of
[ 44.463003] allocated 201-byte region [ffff888100365e00, ffff888100365ec9)
[ 44.464797]
[ 44.465744] The buggy address belongs to the physical page:
[ 44.466774] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100364
[ 44.468441] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 44.469446] flags: 0x200000000000840(slab|head|node=0|zone=2)
[ 44.470313] page_type: 0xffffffff()
[ 44.470901] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[ 44.471807] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 44.473056] page dumped because: kasan: bad access detected
[ 44.473941]
[ 44.474444] Memory state around the buggy address:
[ 44.475346] ffff888100365d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 44.476486] ffff888100365e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 44.477641] >ffff888100365e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 44.478607] ^
[ 44.479382] ffff888100365f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 44.480642] ffff888100365f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 44.481668] ==================================================================
---
[ 44.355664] ==================================================================
[ 44.356222] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x258/0x660
[ 44.358952] Write of size 1 at addr ffff888100365eea by task kunit_try_catch/154
[ 44.360258]
[ 44.360575] CPU: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 44.361685] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 44.363163] Call Trace:
[ 44.364022] <TASK>
[ 44.364568] dump_stack_lvl+0x4e/0x90
[ 44.365249] print_report+0xd2/0x660
[ 44.365780] ? __virt_addr_valid+0x156/0x1e0
[ 44.366358] ? kasan_complete_mode_report_info+0x2a/0x200
[ 44.367605] kasan_report+0xff/0x140
[ 44.368051] ? krealloc_less_oob_helper+0x258/0x660
[ 44.368746] ? krealloc_less_oob_helper+0x258/0x660
[ 44.369434] __asan_store1+0x69/0x70
[ 44.370819] krealloc_less_oob_helper+0x258/0x660
[ 44.371760] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 44.372491] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 44.373167] ? __schedule+0x70b/0x1190
[ 44.373806] ? ktime_get_ts64+0x118/0x140
[ 44.374407] krealloc_less_oob+0x1c/0x30
[ 44.374988] kunit_try_run_case+0x126/0x290
[ 44.375815] ? __pfx_kunit_try_run_case+0x10/0x10
[ 44.376381] ? __kasan_check_write+0x18/0x20
[ 44.377257] ? trace_preempt_on+0x20/0xa0
[ 44.377761] ? __kthread_parkme+0x4f/0xd0
[ 44.379021] ? preempt_count_sub+0x50/0x80
[ 44.379608] ? __pfx_kunit_try_run_case+0x10/0x10
[ 44.380317] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 44.381071] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 44.381797] kthread+0x19e/0x1e0
[ 44.382837] ? __pfx_kthread+0x10/0x10
[ 44.383379] ret_from_fork+0x41/0x70
[ 44.384007] ? __pfx_kthread+0x10/0x10
[ 44.384495] ret_from_fork_asm+0x1b/0x30
[ 44.385243] </TASK>
[ 44.385640]
[ 44.385867] Allocated by task 154:
[ 44.386432] kasan_save_stack+0x3c/0x60
[ 44.386953] kasan_set_track+0x29/0x40
[ 44.387494] kasan_save_alloc_info+0x22/0x30
[ 44.388879] __kasan_krealloc+0x12f/0x180
[ 44.389796] krealloc+0xc1/0x140
[ 44.390317] krealloc_less_oob_helper+0xe5/0x660
[ 44.390855] krealloc_less_oob+0x1c/0x30
[ 44.391444] kunit_try_run_case+0x126/0x290
[ 44.392594] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 44.393339] kthread+0x19e/0x1e0
[ 44.393876] ret_from_fork+0x41/0x70
[ 44.394500] ret_from_fork_asm+0x1b/0x30
[ 44.395211]
[ 44.395462] The buggy address belongs to the object at ffff888100365e00
[ 44.395462] which belongs to the cache kmalloc-256 of size 256
[ 44.397593] The buggy address is located 33 bytes to the right of
[ 44.397593] allocated 201-byte region [ffff888100365e00, ffff888100365ec9)
[ 44.399279]
[ 44.399572] The buggy address belongs to the physical page:
[ 44.400202] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100364
[ 44.401663] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 44.403274] flags: 0x200000000000840(slab|head|node=0|zone=2)
[ 44.403914] page_type: 0xffffffff()
[ 44.404565] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[ 44.405511] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 44.406554] page dumped because: kasan: bad access detected
[ 44.407748]
[ 44.408600] Memory state around the buggy address:
[ 44.409196] ffff888100365d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 44.410079] ffff888100365e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 44.411224] >ffff888100365e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 44.412149] ^
[ 44.412955] ffff888100365f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 44.413891] ffff888100365f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 44.415496] ==================================================================
Home
[ 44.199590] ==================================================================
[ 44.200507] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a6/0x660
[ 44.201802] Write of size 1 at addr ffff888100365ed0 by task kunit_try_catch/154
[ 44.203058]
[ 44.203351] CPU: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 44.204689] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 44.205976] Call Trace:
[ 44.206317] <TASK>
[ 44.206739] dump_stack_lvl+0x4e/0x90
[ 44.207352] print_report+0xd2/0x660
[ 44.207980] ? __virt_addr_valid+0x156/0x1e0
[ 44.208540] ? kasan_complete_mode_report_info+0x2a/0x200
[ 44.209286] kasan_report+0xff/0x140
[ 44.209902] ? krealloc_less_oob_helper+0x1a6/0x660
[ 44.210819] ? krealloc_less_oob_helper+0x1a6/0x660
[ 44.211562] __asan_store1+0x69/0x70
[ 44.212124] krealloc_less_oob_helper+0x1a6/0x660
[ 44.213260] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 44.214089] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 44.214440] ? __schedule+0x70b/0x1190
[ 44.215021] ? ktime_get_ts64+0x118/0x140
[ 44.215908] krealloc_less_oob+0x1c/0x30
[ 44.216665] kunit_try_run_case+0x126/0x290
[ 44.217789] ? __pfx_kunit_try_run_case+0x10/0x10
[ 44.218543] ? __kasan_check_write+0x18/0x20
[ 44.219160] ? trace_preempt_on+0x20/0xa0
[ 44.219985] ? __kthread_parkme+0x4f/0xd0
[ 44.221100] ? preempt_count_sub+0x50/0x80
[ 44.221727] ? __pfx_kunit_try_run_case+0x10/0x10
[ 44.222513] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 44.223479] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 44.224664] kthread+0x19e/0x1e0
[ 44.225295] ? __pfx_kthread+0x10/0x10
[ 44.226396] ret_from_fork+0x41/0x70
[ 44.227323] ? __pfx_kthread+0x10/0x10
[ 44.228243] ret_from_fork_asm+0x1b/0x30
[ 44.228818] </TASK>
[ 44.229352]
[ 44.229610] Allocated by task 154:
[ 44.230225] kasan_save_stack+0x3c/0x60
[ 44.231326] kasan_set_track+0x29/0x40
[ 44.231739] kasan_save_alloc_info+0x22/0x30
[ 44.233178] __kasan_krealloc+0x12f/0x180
[ 44.234687] krealloc+0xc1/0x140
[ 44.235373] krealloc_less_oob_helper+0xe5/0x660
[ 44.236542] krealloc_less_oob+0x1c/0x30
[ 44.237034] kunit_try_run_case+0x126/0x290
[ 44.238572] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 44.239687] kthread+0x19e/0x1e0
[ 44.240572] ret_from_fork+0x41/0x70
[ 44.241182] ret_from_fork_asm+0x1b/0x30
[ 44.241757]
[ 44.242069] The buggy address belongs to the object at ffff888100365e00
[ 44.242069] which belongs to the cache kmalloc-256 of size 256
[ 44.246080] The buggy address is located 7 bytes to the right of
[ 44.246080] allocated 201-byte region [ffff888100365e00, ffff888100365ec9)
[ 44.249063]
[ 44.249298] The buggy address belongs to the physical page:
[ 44.250142] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100364
[ 44.251791] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 44.253495] flags: 0x200000000000840(slab|head|node=0|zone=2)
[ 44.254426] page_type: 0xffffffff()
[ 44.255313] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[ 44.257433] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 44.259706] page dumped because: kasan: bad access detected
[ 44.260925]
[ 44.261281] Memory state around the buggy address:
[ 44.263114] ffff888100365d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 44.265158] ffff888100365e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 44.267090] >ffff888100365e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 44.268456] ^
[ 44.270047] ffff888100365f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 44.271315] ffff888100365f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 44.272963] ==================================================================
Home
[ 44.135215] ==================================================================
[ 44.136281] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x146/0x660
[ 44.137256] Write of size 1 at addr ffff888100365ec9 by task kunit_try_catch/154
[ 44.138217]
[ 44.138563] CPU: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 44.139955] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 44.141037] Call Trace:
[ 44.141374] <TASK>
[ 44.142117] dump_stack_lvl+0x4e/0x90
[ 44.143208] print_report+0xd2/0x660
[ 44.143731] ? __virt_addr_valid+0x156/0x1e0
[ 44.144355] ? kasan_complete_mode_report_info+0x2a/0x200
[ 44.145158] kasan_report+0xff/0x140
[ 44.145659] ? krealloc_less_oob_helper+0x146/0x660
[ 44.146384] ? krealloc_less_oob_helper+0x146/0x660
[ 44.147500] __asan_store1+0x69/0x70
[ 44.148037] krealloc_less_oob_helper+0x146/0x660
[ 44.149035] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 44.149671] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 44.150520] ? __schedule+0x70b/0x1190
[ 44.151283] ? ktime_get_ts64+0x118/0x140
[ 44.151935] krealloc_less_oob+0x1c/0x30
[ 44.152520] kunit_try_run_case+0x126/0x290
[ 44.153353] ? __pfx_kunit_try_run_case+0x10/0x10
[ 44.154403] ? __kasan_check_write+0x18/0x20
[ 44.155423] ? trace_preempt_on+0x20/0xa0
[ 44.155905] ? __kthread_parkme+0x4f/0xd0
[ 44.156434] ? preempt_count_sub+0x50/0x80
[ 44.157511] ? __pfx_kunit_try_run_case+0x10/0x10
[ 44.158229] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 44.159243] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 44.160483] kthread+0x19e/0x1e0
[ 44.161034] ? __pfx_kthread+0x10/0x10
[ 44.161845] ret_from_fork+0x41/0x70
[ 44.162776] ? __pfx_kthread+0x10/0x10
[ 44.163774] ret_from_fork_asm+0x1b/0x30
[ 44.164486] </TASK>
[ 44.165016]
[ 44.165298] Allocated by task 154:
[ 44.165708] kasan_save_stack+0x3c/0x60
[ 44.166367] kasan_set_track+0x29/0x40
[ 44.166963] kasan_save_alloc_info+0x22/0x30
[ 44.168063] __kasan_krealloc+0x12f/0x180
[ 44.168477] krealloc+0xc1/0x140
[ 44.169128] krealloc_less_oob_helper+0xe5/0x660
[ 44.170090] krealloc_less_oob+0x1c/0x30
[ 44.170797] kunit_try_run_case+0x126/0x290
[ 44.171681] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 44.173050] kthread+0x19e/0x1e0
[ 44.173548] ret_from_fork+0x41/0x70
[ 44.174119] ret_from_fork_asm+0x1b/0x30
[ 44.174774]
[ 44.175136] The buggy address belongs to the object at ffff888100365e00
[ 44.175136] which belongs to the cache kmalloc-256 of size 256
[ 44.177025] The buggy address is located 0 bytes to the right of
[ 44.177025] allocated 201-byte region [ffff888100365e00, ffff888100365ec9)
[ 44.179476]
[ 44.179696] The buggy address belongs to the physical page:
[ 44.180995] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100364
[ 44.182478] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 44.183442] flags: 0x200000000000840(slab|head|node=0|zone=2)
[ 44.184347] page_type: 0xffffffff()
[ 44.185487] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[ 44.186795] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 44.187802] page dumped because: kasan: bad access detected
[ 44.188358]
[ 44.188675] Memory state around the buggy address:
[ 44.189273] ffff888100365d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 44.190666] ffff888100365e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 44.192117] >ffff888100365e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 44.192887] ^
[ 44.193839] ffff888100365f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 44.194888] ffff888100365f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 44.196543] ==================================================================
Home
[ 44.274862] ==================================================================
[ 44.276431] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x21a/0x660
[ 44.277467] Write of size 1 at addr ffff888100365eda by task kunit_try_catch/154
[ 44.279242]
[ 44.279611] CPU: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 44.280684] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 44.282636] Call Trace:
[ 44.283086] <TASK>
[ 44.283493] dump_stack_lvl+0x4e/0x90
[ 44.284169] print_report+0xd2/0x660
[ 44.285671] ? __virt_addr_valid+0x156/0x1e0
[ 44.286289] ? kasan_complete_mode_report_info+0x2a/0x200
[ 44.287374] kasan_report+0xff/0x140
[ 44.287897] ? krealloc_less_oob_helper+0x21a/0x660
[ 44.288500] ? krealloc_less_oob_helper+0x21a/0x660
[ 44.289849] __asan_store1+0x69/0x70
[ 44.290827] krealloc_less_oob_helper+0x21a/0x660
[ 44.292321] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 44.293731] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 44.295115] ? __schedule+0x70b/0x1190
[ 44.296005] ? ktime_get_ts64+0x118/0x140
[ 44.297918] krealloc_less_oob+0x1c/0x30
[ 44.298709] kunit_try_run_case+0x126/0x290
[ 44.299469] ? __pfx_kunit_try_run_case+0x10/0x10
[ 44.301076] ? __kasan_check_write+0x18/0x20
[ 44.302117] ? trace_preempt_on+0x20/0xa0
[ 44.303663] ? __kthread_parkme+0x4f/0xd0
[ 44.304353] ? preempt_count_sub+0x50/0x80
[ 44.305481] ? __pfx_kunit_try_run_case+0x10/0x10
[ 44.306822] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 44.308366] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 44.310326] kthread+0x19e/0x1e0
[ 44.311237] ? __pfx_kthread+0x10/0x10
[ 44.312398] ret_from_fork+0x41/0x70
[ 44.313135] ? __pfx_kthread+0x10/0x10
[ 44.314811] ret_from_fork_asm+0x1b/0x30
[ 44.315958] </TASK>
[ 44.316684]
[ 44.316920] Allocated by task 154:
[ 44.317499] kasan_save_stack+0x3c/0x60
[ 44.318659] kasan_set_track+0x29/0x40
[ 44.319331] kasan_save_alloc_info+0x22/0x30
[ 44.320441] __kasan_krealloc+0x12f/0x180
[ 44.321513] krealloc+0xc1/0x140
[ 44.322323] krealloc_less_oob_helper+0xe5/0x660
[ 44.323287] krealloc_less_oob+0x1c/0x30
[ 44.324137] kunit_try_run_case+0x126/0x290
[ 44.325059] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 44.326081] kthread+0x19e/0x1e0
[ 44.326707] ret_from_fork+0x41/0x70
[ 44.327290] ret_from_fork_asm+0x1b/0x30
[ 44.328792]
[ 44.329106] The buggy address belongs to the object at ffff888100365e00
[ 44.329106] which belongs to the cache kmalloc-256 of size 256
[ 44.331579] The buggy address is located 17 bytes to the right of
[ 44.331579] allocated 201-byte region [ffff888100365e00, ffff888100365ec9)
[ 44.333213]
[ 44.334251] The buggy address belongs to the physical page:
[ 44.335542] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100364
[ 44.336695] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 44.338764] flags: 0x200000000000840(slab|head|node=0|zone=2)
[ 44.339772] page_type: 0xffffffff()
[ 44.340564] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[ 44.343055] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 44.344002] page dumped because: kasan: bad access detected
[ 44.344776]
[ 44.345139] Memory state around the buggy address:
[ 44.346299] ffff888100365d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 44.348259] ffff888100365e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 44.349405] >ffff888100365e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 44.350757] ^
[ 44.351637] ffff888100365f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 44.352392] ffff888100365f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 44.353694] ==================================================================
Home
[ 44.636864] ==================================================================
[ 44.638067] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a6/0x660
[ 44.640017] Write of size 1 at addr ffff8881020be0d0 by task kunit_try_catch/158
[ 44.641647]
[ 44.641932] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 44.642880] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 44.644655] Call Trace:
[ 44.645275] <TASK>
[ 44.645957] dump_stack_lvl+0x4e/0x90
[ 44.647074] print_report+0xd2/0x660
[ 44.648149] ? __virt_addr_valid+0x156/0x1e0
[ 44.648913] ? kasan_addr_to_slab+0x11/0xb0
[ 44.650086] kasan_report+0xff/0x140
[ 44.650572] ? krealloc_less_oob_helper+0x1a6/0x660
[ 44.651468] ? krealloc_less_oob_helper+0x1a6/0x660
[ 44.652404] __asan_store1+0x69/0x70
[ 44.653233] krealloc_less_oob_helper+0x1a6/0x660
[ 44.654243] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 44.655066] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 44.655656] ? __schedule+0x70b/0x1190
[ 44.656308] ? ktime_get_ts64+0x118/0x140
[ 44.657264] krealloc_pagealloc_less_oob+0x1c/0x30
[ 44.658301] kunit_try_run_case+0x126/0x290
[ 44.658739] ? __pfx_kunit_try_run_case+0x10/0x10
[ 44.659972] ? __kasan_check_write+0x18/0x20
[ 44.660743] ? trace_preempt_on+0x20/0xa0
[ 44.661648] ? __kthread_parkme+0x4f/0xd0
[ 44.662360] ? preempt_count_sub+0x50/0x80
[ 44.663428] ? __pfx_kunit_try_run_case+0x10/0x10
[ 44.664421] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 44.665671] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 44.666816] kthread+0x19e/0x1e0
[ 44.667571] ? __pfx_kthread+0x10/0x10
[ 44.668184] ret_from_fork+0x41/0x70
[ 44.669626] ? __pfx_kthread+0x10/0x10
[ 44.670094] ret_from_fork_asm+0x1b/0x30
[ 44.670834] </TASK>
[ 44.671544]
[ 44.672037] The buggy address belongs to the physical page:
[ 44.672856] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1020bc
[ 44.674951] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 44.676104] flags: 0x200000000000040(head|node=0|zone=2)
[ 44.677326] page_type: 0xffffffff()
[ 44.678122] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 44.679341] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 44.680479] page dumped because: kasan: bad access detected
[ 44.681086]
[ 44.681367] Memory state around the buggy address:
[ 44.682147] ffff8881020bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 44.683189] ffff8881020be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 44.684650] >ffff8881020be080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 44.685701] ^
[ 44.686485] ffff8881020be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 44.687696] ffff8881020be180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 44.689058] ==================================================================
Home
[ 44.790844] ==================================================================
[ 44.792428] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x294/0x660
[ 44.793789] Write of size 1 at addr ffff8881020be0eb by task kunit_try_catch/158
[ 44.794697]
[ 44.795033] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 44.796785] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 44.798468] Call Trace:
[ 44.798760] <TASK>
[ 44.799462] dump_stack_lvl+0x4e/0x90
[ 44.800011] print_report+0xd2/0x660
[ 44.800854] ? __virt_addr_valid+0x156/0x1e0
[ 44.801933] ? kasan_addr_to_slab+0x11/0xb0
[ 44.802659] kasan_report+0xff/0x140
[ 44.803544] ? krealloc_less_oob_helper+0x294/0x660
[ 44.804687] ? krealloc_less_oob_helper+0x294/0x660
[ 44.805708] __asan_store1+0x69/0x70
[ 44.806615] krealloc_less_oob_helper+0x294/0x660
[ 44.807476] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 44.808924] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 44.809747] ? __schedule+0x70b/0x1190
[ 44.810548] ? ktime_get_ts64+0x118/0x140
[ 44.811282] krealloc_pagealloc_less_oob+0x1c/0x30
[ 44.811896] kunit_try_run_case+0x126/0x290
[ 44.812771] ? __pfx_kunit_try_run_case+0x10/0x10
[ 44.813808] ? __kasan_check_write+0x18/0x20
[ 44.814432] ? trace_preempt_on+0x20/0xa0
[ 44.815358] ? __kthread_parkme+0x4f/0xd0
[ 44.816197] ? preempt_count_sub+0x50/0x80
[ 44.816843] ? __pfx_kunit_try_run_case+0x10/0x10
[ 44.817578] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 44.818632] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 44.819923] kthread+0x19e/0x1e0
[ 44.820396] ? __pfx_kthread+0x10/0x10
[ 44.820965] ret_from_fork+0x41/0x70
[ 44.821747] ? __pfx_kthread+0x10/0x10
[ 44.822574] ret_from_fork_asm+0x1b/0x30
[ 44.823698] </TASK>
[ 44.824167]
[ 44.824452] The buggy address belongs to the physical page:
[ 44.825103] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1020bc
[ 44.826911] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 44.828870] flags: 0x200000000000040(head|node=0|zone=2)
[ 44.829494] page_type: 0xffffffff()
[ 44.829977] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 44.831830] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 44.833188] page dumped because: kasan: bad access detected
[ 44.833820]
[ 44.834116] Memory state around the buggy address:
[ 44.834731] ffff8881020bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 44.835895] ffff8881020be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 44.837548] >ffff8881020be080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 44.838447] ^
[ 44.839182] ffff8881020be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 44.839929] ffff8881020be180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 44.840772] ==================================================================
---
[ 44.741753] ==================================================================
[ 44.743019] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x258/0x660
[ 44.743793] Write of size 1 at addr ffff8881020be0ea by task kunit_try_catch/158
[ 44.744738]
[ 44.745576] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 44.746803] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 44.748018] Call Trace:
[ 44.748661] <TASK>
[ 44.749000] dump_stack_lvl+0x4e/0x90
[ 44.749660] print_report+0xd2/0x660
[ 44.750406] ? __virt_addr_valid+0x156/0x1e0
[ 44.751148] ? kasan_addr_to_slab+0x11/0xb0
[ 44.751664] kasan_report+0xff/0x140
[ 44.753017] ? krealloc_less_oob_helper+0x258/0x660
[ 44.753829] ? krealloc_less_oob_helper+0x258/0x660
[ 44.754596] __asan_store1+0x69/0x70
[ 44.755035] krealloc_less_oob_helper+0x258/0x660
[ 44.756150] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 44.756799] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 44.757812] ? __schedule+0x70b/0x1190
[ 44.758408] ? ktime_get_ts64+0x118/0x140
[ 44.759208] krealloc_pagealloc_less_oob+0x1c/0x30
[ 44.759872] kunit_try_run_case+0x126/0x290
[ 44.761027] ? __pfx_kunit_try_run_case+0x10/0x10
[ 44.761352] ? __kasan_check_write+0x18/0x20
[ 44.762313] ? trace_preempt_on+0x20/0xa0
[ 44.763251] ? __kthread_parkme+0x4f/0xd0
[ 44.763801] ? preempt_count_sub+0x50/0x80
[ 44.764405] ? __pfx_kunit_try_run_case+0x10/0x10
[ 44.765176] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 44.765922] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 44.766969] kthread+0x19e/0x1e0
[ 44.767694] ? __pfx_kthread+0x10/0x10
[ 44.768466] ret_from_fork+0x41/0x70
[ 44.769203] ? __pfx_kthread+0x10/0x10
[ 44.769921] ret_from_fork_asm+0x1b/0x30
[ 44.771170] </TASK>
[ 44.771605]
[ 44.772107] The buggy address belongs to the physical page:
[ 44.772787] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1020bc
[ 44.774069] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 44.775585] flags: 0x200000000000040(head|node=0|zone=2)
[ 44.776381] page_type: 0xffffffff()
[ 44.777027] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 44.778245] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 44.779845] page dumped because: kasan: bad access detected
[ 44.781221]
[ 44.782060] Memory state around the buggy address:
[ 44.782604] ffff8881020bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 44.783463] ffff8881020be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 44.784234] >ffff8881020be080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 44.785760] ^
[ 44.787348] ffff8881020be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 44.788833] ffff8881020be180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 44.789570] ==================================================================
Home
[ 44.583889] ==================================================================
[ 44.585819] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x146/0x660
[ 44.586907] Write of size 1 at addr ffff8881020be0c9 by task kunit_try_catch/158
[ 44.588774]
[ 44.589303] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 44.590548] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 44.591826] Call Trace:
[ 44.592367] <TASK>
[ 44.592921] dump_stack_lvl+0x4e/0x90
[ 44.593509] print_report+0xd2/0x660
[ 44.594408] ? __virt_addr_valid+0x156/0x1e0
[ 44.595439] ? kasan_addr_to_slab+0x11/0xb0
[ 44.596313] kasan_report+0xff/0x140
[ 44.597230] ? krealloc_less_oob_helper+0x146/0x660
[ 44.598485] ? krealloc_less_oob_helper+0x146/0x660
[ 44.599639] __asan_store1+0x69/0x70
[ 44.600553] krealloc_less_oob_helper+0x146/0x660
[ 44.601170] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 44.602899] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 44.603726] ? __schedule+0x70b/0x1190
[ 44.604749] ? ktime_get_ts64+0x118/0x140
[ 44.606181] krealloc_pagealloc_less_oob+0x1c/0x30
[ 44.607379] kunit_try_run_case+0x126/0x290
[ 44.608625] ? __pfx_kunit_try_run_case+0x10/0x10
[ 44.609762] ? __kasan_check_write+0x18/0x20
[ 44.610159] ? trace_preempt_on+0x20/0xa0
[ 44.610448] ? __kthread_parkme+0x4f/0xd0
[ 44.610872] ? preempt_count_sub+0x50/0x80
[ 44.612509] ? __pfx_kunit_try_run_case+0x10/0x10
[ 44.613454] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 44.614552] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 44.615435] kthread+0x19e/0x1e0
[ 44.616358] ? __pfx_kthread+0x10/0x10
[ 44.617440] ret_from_fork+0x41/0x70
[ 44.618044] ? __pfx_kthread+0x10/0x10
[ 44.618337] ret_from_fork_asm+0x1b/0x30
[ 44.619135] </TASK>
[ 44.619387]
[ 44.619634] The buggy address belongs to the physical page:
[ 44.621127] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1020bc
[ 44.622048] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 44.622989] flags: 0x200000000000040(head|node=0|zone=2)
[ 44.623644] page_type: 0xffffffff()
[ 44.624091] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 44.624961] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 44.626296] page dumped because: kasan: bad access detected
[ 44.626888]
[ 44.627109] Memory state around the buggy address:
[ 44.628323] ffff8881020bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 44.629191] ffff8881020be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 44.630341] >ffff8881020be080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 44.631409] ^
[ 44.632464] ffff8881020be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 44.634292] ffff8881020be180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 44.635504] ==================================================================
Home
[ 44.690740] ==================================================================
[ 44.691628] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x21a/0x660
[ 44.693290] Write of size 1 at addr ffff8881020be0da by task kunit_try_catch/158
[ 44.694864]
[ 44.695256] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 44.696965] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 44.698499] Call Trace:
[ 44.699135] <TASK>
[ 44.699459] dump_stack_lvl+0x4e/0x90
[ 44.700146] print_report+0xd2/0x660
[ 44.700690] ? __virt_addr_valid+0x156/0x1e0
[ 44.702125] ? kasan_addr_to_slab+0x11/0xb0
[ 44.702944] kasan_report+0xff/0x140
[ 44.703482] ? krealloc_less_oob_helper+0x21a/0x660
[ 44.704134] ? krealloc_less_oob_helper+0x21a/0x660
[ 44.705498] __asan_store1+0x69/0x70
[ 44.706363] krealloc_less_oob_helper+0x21a/0x660
[ 44.707009] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 44.708133] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 44.708809] ? __schedule+0x70b/0x1190
[ 44.709976] ? ktime_get_ts64+0x118/0x140
[ 44.710591] krealloc_pagealloc_less_oob+0x1c/0x30
[ 44.711482] kunit_try_run_case+0x126/0x290
[ 44.712306] ? __pfx_kunit_try_run_case+0x10/0x10
[ 44.713430] ? __kasan_check_write+0x18/0x20
[ 44.714365] ? trace_preempt_on+0x20/0xa0
[ 44.715191] ? __kthread_parkme+0x4f/0xd0
[ 44.716000] ? preempt_count_sub+0x50/0x80
[ 44.716597] ? __pfx_kunit_try_run_case+0x10/0x10
[ 44.717623] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 44.718625] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 44.719596] kthread+0x19e/0x1e0
[ 44.720191] ? __pfx_kthread+0x10/0x10
[ 44.721233] ret_from_fork+0x41/0x70
[ 44.721830] ? __pfx_kthread+0x10/0x10
[ 44.722447] ret_from_fork_asm+0x1b/0x30
[ 44.723039] </TASK>
[ 44.723843]
[ 44.724465] The buggy address belongs to the physical page:
[ 44.725339] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1020bc
[ 44.726634] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 44.727822] flags: 0x200000000000040(head|node=0|zone=2)
[ 44.728837] page_type: 0xffffffff()
[ 44.729803] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 44.731354] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 44.732729] page dumped because: kasan: bad access detected
[ 44.734128]
[ 44.734349] Memory state around the buggy address:
[ 44.735164] ffff8881020bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 44.735735] ffff8881020be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 44.737258] >ffff8881020be080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 44.738181] ^
[ 44.738825] ffff8881020be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 44.739695] ffff8881020be180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 44.740493] ==================================================================
Home
[ 44.491291] ==================================================================
[ 44.493125] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x179/0x3b0
[ 44.494477] Write of size 1 at addr ffff8881026be0eb by task kunit_try_catch/156
[ 44.495287]
[ 44.495658] CPU: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 44.496891] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 44.497930] Call Trace:
[ 44.498588] <TASK>
[ 44.499020] dump_stack_lvl+0x4e/0x90
[ 44.499554] print_report+0xd2/0x660
[ 44.500075] ? __virt_addr_valid+0x156/0x1e0
[ 44.500964] ? kasan_addr_to_slab+0x11/0xb0
[ 44.501745] kasan_report+0xff/0x140
[ 44.502317] ? krealloc_more_oob_helper+0x179/0x3b0
[ 44.502800] ? krealloc_more_oob_helper+0x179/0x3b0
[ 44.503616] __asan_store1+0x69/0x70
[ 44.504353] krealloc_more_oob_helper+0x179/0x3b0
[ 44.505035] ? __pfx_krealloc_more_oob_helper+0x10/0x10
[ 44.505814] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 44.506597] ? __schedule+0x70b/0x1190
[ 44.507262] ? ktime_get_ts64+0x118/0x140
[ 44.508048] krealloc_pagealloc_more_oob+0x1c/0x30
[ 44.508720] kunit_try_run_case+0x126/0x290
[ 44.509277] ? __pfx_kunit_try_run_case+0x10/0x10
[ 44.510020] ? __kasan_check_write+0x18/0x20
[ 44.510759] ? trace_preempt_on+0x20/0xa0
[ 44.511330] ? __kthread_parkme+0x4f/0xd0
[ 44.512024] ? preempt_count_sub+0x50/0x80
[ 44.512635] ? __pfx_kunit_try_run_case+0x10/0x10
[ 44.513381] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 44.514204] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 44.515021] kthread+0x19e/0x1e0
[ 44.515807] ? __pfx_kthread+0x10/0x10
[ 44.516364] ret_from_fork+0x41/0x70
[ 44.516920] ? __pfx_kthread+0x10/0x10
[ 44.517477] ret_from_fork_asm+0x1b/0x30
[ 44.518173] </TASK>
[ 44.518451]
[ 44.518798] The buggy address belongs to the physical page:
[ 44.519515] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026bc
[ 44.520588] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 44.521564] flags: 0x200000000000040(head|node=0|zone=2)
[ 44.522254] page_type: 0xffffffff()
[ 44.522760] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 44.523719] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 44.524661] page dumped because: kasan: bad access detected
[ 44.525259]
[ 44.525575] Memory state around the buggy address:
[ 44.526174] ffff8881026bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 44.526905] ffff8881026be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 44.527792] >ffff8881026be080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[ 44.528626] ^
[ 44.529432] ffff8881026be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 44.530368] ffff8881026be180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 44.531242] ==================================================================
Home
[ 44.067393] ==================================================================
[ 44.069636] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x1bb/0x3b0
[ 44.070473] Write of size 1 at addr ffff888100365cf0 by task kunit_try_catch/152
[ 44.071838]
[ 44.072269] CPU: 0 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 44.073732] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 44.074907] Call Trace:
[ 44.075375] <TASK>
[ 44.075812] dump_stack_lvl+0x4e/0x90
[ 44.076332] print_report+0xd2/0x660
[ 44.077322] ? __virt_addr_valid+0x156/0x1e0
[ 44.077945] ? kasan_complete_mode_report_info+0x2a/0x200
[ 44.078919] kasan_report+0xff/0x140
[ 44.079473] ? krealloc_more_oob_helper+0x1bb/0x3b0
[ 44.080912] ? krealloc_more_oob_helper+0x1bb/0x3b0
[ 44.081658] __asan_store1+0x69/0x70
[ 44.082404] krealloc_more_oob_helper+0x1bb/0x3b0
[ 44.083335] ? __pfx_krealloc_more_oob_helper+0x10/0x10
[ 44.084382] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 44.085682] ? __schedule+0x70b/0x1190
[ 44.086417] ? ktime_get_ts64+0x118/0x140
[ 44.087247] krealloc_more_oob+0x1c/0x30
[ 44.087842] kunit_try_run_case+0x126/0x290
[ 44.088487] ? __pfx_kunit_try_run_case+0x10/0x10
[ 44.089044] ? __kasan_check_write+0x18/0x20
[ 44.090179] ? trace_preempt_on+0x20/0xa0
[ 44.090782] ? __kthread_parkme+0x4f/0xd0
[ 44.091282] ? preempt_count_sub+0x50/0x80
[ 44.091958] ? __pfx_kunit_try_run_case+0x10/0x10
[ 44.092557] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 44.093864] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 44.094547] kthread+0x19e/0x1e0
[ 44.095026] ? __pfx_kthread+0x10/0x10
[ 44.095653] ret_from_fork+0x41/0x70
[ 44.096096] ? __pfx_kthread+0x10/0x10
[ 44.097276] ret_from_fork_asm+0x1b/0x30
[ 44.098062] </TASK>
[ 44.098325]
[ 44.098621] Allocated by task 152:
[ 44.099157] kasan_save_stack+0x3c/0x60
[ 44.099687] kasan_set_track+0x29/0x40
[ 44.100178] kasan_save_alloc_info+0x22/0x30
[ 44.100976] __kasan_krealloc+0x12f/0x180
[ 44.101471] krealloc+0xc1/0x140
[ 44.102052] krealloc_more_oob_helper+0xe2/0x3b0
[ 44.102753] krealloc_more_oob+0x1c/0x30
[ 44.103370] kunit_try_run_case+0x126/0x290
[ 44.104010] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 44.104688] kthread+0x19e/0x1e0
[ 44.105727] ret_from_fork+0x41/0x70
[ 44.106376] ret_from_fork_asm+0x1b/0x30
[ 44.107060]
[ 44.107314] The buggy address belongs to the object at ffff888100365c00
[ 44.107314] which belongs to the cache kmalloc-256 of size 256
[ 44.109002] The buggy address is located 5 bytes to the right of
[ 44.109002] allocated 235-byte region [ffff888100365c00, ffff888100365ceb)
[ 44.110296]
[ 44.110548] The buggy address belongs to the physical page:
[ 44.111266] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100364
[ 44.112332] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 44.113163] flags: 0x200000000000840(slab|head|node=0|zone=2)
[ 44.113972] page_type: 0xffffffff()
[ 44.115579] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[ 44.116552] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 44.117380] page dumped because: kasan: bad access detected
[ 44.117954]
[ 44.118425] Memory state around the buggy address:
[ 44.119411] ffff888100365b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 44.120411] ffff888100365c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 44.121186] >ffff888100365c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[ 44.121945] ^
[ 44.123252] ffff888100365d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 44.124122] ffff888100365d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 44.124894] ==================================================================
Home
[ 44.534847] ==================================================================
[ 44.535691] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x1bb/0x3b0
[ 44.536419] Write of size 1 at addr ffff8881026be0f0 by task kunit_try_catch/156
[ 44.537336]
[ 44.537619] CPU: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 44.539759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 44.540709] Call Trace:
[ 44.540979] <TASK>
[ 44.541444] dump_stack_lvl+0x4e/0x90
[ 44.542355] print_report+0xd2/0x660
[ 44.543102] ? __virt_addr_valid+0x156/0x1e0
[ 44.543672] ? kasan_addr_to_slab+0x11/0xb0
[ 44.544252] kasan_report+0xff/0x140
[ 44.544760] ? krealloc_more_oob_helper+0x1bb/0x3b0
[ 44.545375] ? krealloc_more_oob_helper+0x1bb/0x3b0
[ 44.546300] __asan_store1+0x69/0x70
[ 44.546793] krealloc_more_oob_helper+0x1bb/0x3b0
[ 44.547479] ? __pfx_krealloc_more_oob_helper+0x10/0x10
[ 44.548261] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 44.549005] ? __schedule+0x70b/0x1190
[ 44.549633] ? ktime_get_ts64+0x118/0x140
[ 44.550224] krealloc_pagealloc_more_oob+0x1c/0x30
[ 44.550966] kunit_try_run_case+0x126/0x290
[ 44.551642] ? __pfx_kunit_try_run_case+0x10/0x10
[ 44.552308] ? __kasan_check_write+0x18/0x20
[ 44.552950] ? trace_preempt_on+0x20/0xa0
[ 44.553506] ? __kthread_parkme+0x4f/0xd0
[ 44.554148] ? preempt_count_sub+0x50/0x80
[ 44.554814] ? __pfx_kunit_try_run_case+0x10/0x10
[ 44.555469] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 44.556290] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 44.557100] kthread+0x19e/0x1e0
[ 44.557503] ? __pfx_kthread+0x10/0x10
[ 44.558203] ret_from_fork+0x41/0x70
[ 44.558813] ? __pfx_kthread+0x10/0x10
[ 44.559325] ret_from_fork_asm+0x1b/0x30
[ 44.560052] </TASK>
[ 44.560492]
[ 44.560758] The buggy address belongs to the physical page:
[ 44.561398] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026bc
[ 44.562505] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 44.563485] flags: 0x200000000000040(head|node=0|zone=2)
[ 44.564148] page_type: 0xffffffff()
[ 44.564671] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 44.565418] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 44.566437] page dumped because: kasan: bad access detected
[ 44.567369]
[ 44.567803] Memory state around the buggy address:
[ 44.568708] ffff8881026bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 44.569727] ffff8881026be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 44.570971] >ffff8881026be080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[ 44.571648] ^
[ 44.572795] ffff8881026be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 44.573850] ffff8881026be180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 44.574820] ==================================================================
Home
[ 44.004509] ==================================================================
[ 44.005783] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x179/0x3b0
[ 44.006857] Write of size 1 at addr ffff888100365ceb by task kunit_try_catch/152
[ 44.008197]
[ 44.008598] CPU: 0 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 44.009665] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 44.010634] Call Trace:
[ 44.011240] <TASK>
[ 44.011673] dump_stack_lvl+0x4e/0x90
[ 44.012267] print_report+0xd2/0x660
[ 44.012825] ? __virt_addr_valid+0x156/0x1e0
[ 44.013621] ? kasan_complete_mode_report_info+0x2a/0x200
[ 44.014671] kasan_report+0xff/0x140
[ 44.015265] ? krealloc_more_oob_helper+0x179/0x3b0
[ 44.016060] ? krealloc_more_oob_helper+0x179/0x3b0
[ 44.016778] __asan_store1+0x69/0x70
[ 44.017966] krealloc_more_oob_helper+0x179/0x3b0
[ 44.018846] ? __pfx_krealloc_more_oob_helper+0x10/0x10
[ 44.019721] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 44.020371] ? __schedule+0x70b/0x1190
[ 44.020892] ? ktime_get_ts64+0x118/0x140
[ 44.021409] krealloc_more_oob+0x1c/0x30
[ 44.023010] kunit_try_run_case+0x126/0x290
[ 44.024072] ? __pfx_kunit_try_run_case+0x10/0x10
[ 44.025287] ? __kasan_check_write+0x18/0x20
[ 44.026157] ? trace_preempt_on+0x20/0xa0
[ 44.027037] ? __kthread_parkme+0x4f/0xd0
[ 44.027875] ? preempt_count_sub+0x50/0x80
[ 44.029155] ? __pfx_kunit_try_run_case+0x10/0x10
[ 44.029898] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 44.031054] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 44.031784] kthread+0x19e/0x1e0
[ 44.032239] ? __pfx_kthread+0x10/0x10
[ 44.033355] ret_from_fork+0x41/0x70
[ 44.034020] ? __pfx_kthread+0x10/0x10
[ 44.034662] ret_from_fork_asm+0x1b/0x30
[ 44.035584] </TASK>
[ 44.036127]
[ 44.036400] Allocated by task 152:
[ 44.037234] kasan_save_stack+0x3c/0x60
[ 44.038268] kasan_set_track+0x29/0x40
[ 44.039091] kasan_save_alloc_info+0x22/0x30
[ 44.039665] __kasan_krealloc+0x12f/0x180
[ 44.040208] krealloc+0xc1/0x140
[ 44.041138] krealloc_more_oob_helper+0xe2/0x3b0
[ 44.041731] krealloc_more_oob+0x1c/0x30
[ 44.042688] kunit_try_run_case+0x126/0x290
[ 44.043449] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 44.044556] kthread+0x19e/0x1e0
[ 44.045265] ret_from_fork+0x41/0x70
[ 44.046071] ret_from_fork_asm+0x1b/0x30
[ 44.046771]
[ 44.047089] The buggy address belongs to the object at ffff888100365c00
[ 44.047089] which belongs to the cache kmalloc-256 of size 256
[ 44.048329] The buggy address is located 0 bytes to the right of
[ 44.048329] allocated 235-byte region [ffff888100365c00, ffff888100365ceb)
[ 44.050633]
[ 44.050958] The buggy address belongs to the physical page:
[ 44.051650] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100364
[ 44.052738] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 44.053694] flags: 0x200000000000840(slab|head|node=0|zone=2)
[ 44.054436] page_type: 0xffffffff()
[ 44.055038] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[ 44.055973] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 44.056822] page dumped because: kasan: bad access detected
[ 44.057764]
[ 44.058032] Memory state around the buggy address:
[ 44.058805] ffff888100365b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 44.059785] ffff888100365c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 44.060701] >ffff888100365c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[ 44.062269] ^
[ 44.063455] ffff888100365d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 44.064158] ffff888100365d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 44.065273] ==================================================================
Home
[ 46.822915] ==================================================================
[ 46.823718] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x146/0x3b0
[ 46.824338] Read of size 1 at addr ffff8881029e1b78 by task kunit_try_catch/208
[ 46.824762]
[ 46.824974] CPU: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 46.826361] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 46.828062] Call Trace:
[ 46.828450] <TASK>
[ 46.828840] dump_stack_lvl+0x4e/0x90
[ 46.829402] print_report+0xd2/0x660
[ 46.830092] ? __virt_addr_valid+0x156/0x1e0
[ 46.831342] ? kasan_complete_mode_report_info+0x2a/0x200
[ 46.832337] kasan_report+0xff/0x140
[ 46.832855] ? ksize_unpoisons_memory+0x146/0x3b0
[ 46.833679] ? ksize_unpoisons_memory+0x146/0x3b0
[ 46.834318] __asan_load1+0x66/0x70
[ 46.835149] ksize_unpoisons_memory+0x146/0x3b0
[ 46.835730] ? __pfx_ksize_unpoisons_memory+0x10/0x10
[ 46.836337] ? sysvec_apic_timer_interrupt+0x94/0xa0
[ 46.837176] ? asm_sysvec_apic_timer_interrupt+0x1f/0x30
[ 46.837742] ? __pfx_ksize_unpoisons_memory+0x10/0x10
[ 46.838254] ? kunit_try_run_case+0x11b/0x290
[ 46.839060] kunit_try_run_case+0x126/0x290
[ 46.839583] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.840246] ? __kasan_check_write+0x18/0x20
[ 46.840917] ? trace_preempt_on+0x20/0xa0
[ 46.841483] ? __kthread_parkme+0x4f/0xd0
[ 46.842088] ? preempt_count_sub+0x50/0x80
[ 46.843086] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.843988] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 46.844808] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 46.845509] kthread+0x19e/0x1e0
[ 46.846110] ? __pfx_kthread+0x10/0x10
[ 46.846952] ret_from_fork+0x41/0x70
[ 46.847500] ? __pfx_kthread+0x10/0x10
[ 46.848236] ret_from_fork_asm+0x1b/0x30
[ 46.849092] </TASK>
[ 46.849473]
[ 46.850021] Allocated by task 208:
[ 46.850488] kasan_save_stack+0x3c/0x60
[ 46.851813] kasan_set_track+0x29/0x40
[ 46.852328] kasan_save_alloc_info+0x22/0x30
[ 46.853044] __kasan_kmalloc+0xb7/0xc0
[ 46.853563] kmalloc_trace+0x4c/0xb0
[ 46.854118] ksize_unpoisons_memory+0xb0/0x3b0
[ 46.854959] kunit_try_run_case+0x126/0x290
[ 46.855677] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 46.856435] kthread+0x19e/0x1e0
[ 46.857571] ret_from_fork+0x41/0x70
[ 46.858313] ret_from_fork_asm+0x1b/0x30
[ 46.858947]
[ 46.859666] The buggy address belongs to the object at ffff8881029e1b00
[ 46.859666] which belongs to the cache kmalloc-128 of size 128
[ 46.861837] The buggy address is located 5 bytes to the right of
[ 46.861837] allocated 115-byte region [ffff8881029e1b00, ffff8881029e1b73)
[ 46.863335]
[ 46.863482] The buggy address belongs to the physical page:
[ 46.863823] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e1
[ 46.865286] flags: 0x200000000000800(slab|node=0|zone=2)
[ 46.866396] page_type: 0xffffffff()
[ 46.867203] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[ 46.868394] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 46.869693] page dumped because: kasan: bad access detected
[ 46.870504]
[ 46.871151] Memory state around the buggy address:
[ 46.871919] ffff8881029e1a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 46.872897] ffff8881029e1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 46.874289] >ffff8881029e1b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 46.875015] ^
[ 46.875769] ffff8881029e1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 46.877130] ffff8881029e1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 46.879215] ==================================================================
---
[ 46.880911] ==================================================================
[ 46.881638] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x183/0x3b0
[ 46.882941] Read of size 1 at addr ffff8881029e1b7f by task kunit_try_catch/208
[ 46.884285]
[ 46.884634] CPU: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 46.885768] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 46.886618] Call Trace:
[ 46.887747] <TASK>
[ 46.888162] dump_stack_lvl+0x4e/0x90
[ 46.888863] print_report+0xd2/0x660
[ 46.889391] ? __virt_addr_valid+0x156/0x1e0
[ 46.890071] ? kasan_complete_mode_report_info+0x2a/0x200
[ 46.891024] kasan_report+0xff/0x140
[ 46.891978] ? ksize_unpoisons_memory+0x183/0x3b0
[ 46.892716] ? ksize_unpoisons_memory+0x183/0x3b0
[ 46.893904] __asan_load1+0x66/0x70
[ 46.894350] ksize_unpoisons_memory+0x183/0x3b0
[ 46.894865] ? __pfx_ksize_unpoisons_memory+0x10/0x10
[ 46.895617] ? sysvec_apic_timer_interrupt+0x94/0xa0
[ 46.896368] ? asm_sysvec_apic_timer_interrupt+0x1f/0x30
[ 46.897084] ? __pfx_ksize_unpoisons_memory+0x10/0x10
[ 46.897739] ? kunit_try_run_case+0x11b/0x290
[ 46.898381] kunit_try_run_case+0x126/0x290
[ 46.899941] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.900506] ? __kasan_check_write+0x18/0x20
[ 46.901182] ? trace_preempt_on+0x20/0xa0
[ 46.901759] ? __kthread_parkme+0x4f/0xd0
[ 46.902269] ? preempt_count_sub+0x50/0x80
[ 46.902983] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.903697] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 46.905592] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 46.906574] kthread+0x19e/0x1e0
[ 46.907333] ? __pfx_kthread+0x10/0x10
[ 46.908267] ret_from_fork+0x41/0x70
[ 46.909574] ? __pfx_kthread+0x10/0x10
[ 46.910418] ret_from_fork_asm+0x1b/0x30
[ 46.911195] </TASK>
[ 46.911590]
[ 46.911908] Allocated by task 208:
[ 46.912672] kasan_save_stack+0x3c/0x60
[ 46.913494] kasan_set_track+0x29/0x40
[ 46.914494] kasan_save_alloc_info+0x22/0x30
[ 46.914975] __kasan_kmalloc+0xb7/0xc0
[ 46.915555] kmalloc_trace+0x4c/0xb0
[ 46.916200] ksize_unpoisons_memory+0xb0/0x3b0
[ 46.916959] kunit_try_run_case+0x126/0x290
[ 46.917457] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 46.918697] kthread+0x19e/0x1e0
[ 46.919223] ret_from_fork+0x41/0x70
[ 46.919817] ret_from_fork_asm+0x1b/0x30
[ 46.920661]
[ 46.921078] The buggy address belongs to the object at ffff8881029e1b00
[ 46.921078] which belongs to the cache kmalloc-128 of size 128
[ 46.923420] The buggy address is located 12 bytes to the right of
[ 46.923420] allocated 115-byte region [ffff8881029e1b00, ffff8881029e1b73)
[ 46.925122]
[ 46.925543] The buggy address belongs to the physical page:
[ 46.926841] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e1
[ 46.927877] flags: 0x200000000000800(slab|node=0|zone=2)
[ 46.928627] page_type: 0xffffffff()
[ 46.929444] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[ 46.930946] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 46.931699] page dumped because: kasan: bad access detected
[ 46.932632]
[ 46.932846] Memory state around the buggy address:
[ 46.933577] ffff8881029e1a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 46.934499] ffff8881029e1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 46.936146] >ffff8881029e1b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 46.936914] ^
[ 46.937878] ffff8881029e1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 46.939670] ffff8881029e1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 46.940434] ==================================================================
Home
[ 46.766246] ==================================================================
[ 46.767715] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x10d/0x3b0
[ 46.768505] Read of size 1 at addr ffff8881029e1b73 by task kunit_try_catch/208
[ 46.770318]
[ 46.770610] CPU: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 46.771966] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 46.773144] Call Trace:
[ 46.773750] <TASK>
[ 46.774191] dump_stack_lvl+0x4e/0x90
[ 46.774500] print_report+0xd2/0x660
[ 46.774796] ? __virt_addr_valid+0x156/0x1e0
[ 46.775702] ? kasan_complete_mode_report_info+0x2a/0x200
[ 46.776676] kasan_report+0xff/0x140
[ 46.777386] ? ksize_unpoisons_memory+0x10d/0x3b0
[ 46.778361] ? ksize_unpoisons_memory+0x10d/0x3b0
[ 46.779016] __asan_load1+0x66/0x70
[ 46.779504] ksize_unpoisons_memory+0x10d/0x3b0
[ 46.780121] ? __pfx_ksize_unpoisons_memory+0x10/0x10
[ 46.780849] ? sysvec_apic_timer_interrupt+0x94/0xa0
[ 46.781751] ? asm_sysvec_apic_timer_interrupt+0x1f/0x30
[ 46.782703] ? __pfx_ksize_unpoisons_memory+0x10/0x10
[ 46.783486] ? kunit_try_run_case+0x11b/0x290
[ 46.784167] kunit_try_run_case+0x126/0x290
[ 46.784900] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.786150] ? __kasan_check_write+0x18/0x20
[ 46.786755] ? trace_preempt_on+0x20/0xa0
[ 46.787561] ? __kthread_parkme+0x4f/0xd0
[ 46.788343] ? preempt_count_sub+0x50/0x80
[ 46.789208] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.790121] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 46.791177] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 46.792134] kthread+0x19e/0x1e0
[ 46.792862] ? __pfx_kthread+0x10/0x10
[ 46.793454] ret_from_fork+0x41/0x70
[ 46.794008] ? __pfx_kthread+0x10/0x10
[ 46.794569] ret_from_fork_asm+0x1b/0x30
[ 46.795279] </TASK>
[ 46.795706]
[ 46.796278] Allocated by task 208:
[ 46.796694] kasan_save_stack+0x3c/0x60
[ 46.797517] kasan_set_track+0x29/0x40
[ 46.798199] kasan_save_alloc_info+0x22/0x30
[ 46.798505] __kasan_kmalloc+0xb7/0xc0
[ 46.799001] kmalloc_trace+0x4c/0xb0
[ 46.799539] ksize_unpoisons_memory+0xb0/0x3b0
[ 46.800042] kunit_try_run_case+0x126/0x290
[ 46.800695] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 46.802278] kthread+0x19e/0x1e0
[ 46.802660] ret_from_fork+0x41/0x70
[ 46.802936] ret_from_fork_asm+0x1b/0x30
[ 46.803237]
[ 46.803373] The buggy address belongs to the object at ffff8881029e1b00
[ 46.803373] which belongs to the cache kmalloc-128 of size 128
[ 46.805182] The buggy address is located 0 bytes to the right of
[ 46.805182] allocated 115-byte region [ffff8881029e1b00, ffff8881029e1b73)
[ 46.806747]
[ 46.807056] The buggy address belongs to the physical page:
[ 46.807715] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e1
[ 46.809020] flags: 0x200000000000800(slab|node=0|zone=2)
[ 46.809709] page_type: 0xffffffff()
[ 46.810289] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[ 46.811303] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 46.812211] page dumped because: kasan: bad access detected
[ 46.813207]
[ 46.813474] Memory state around the buggy address:
[ 46.813990] ffff8881029e1a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 46.814776] ffff8881029e1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 46.816022] >ffff8881029e1b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 46.816982] ^
[ 46.818140] ffff8881029e1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 46.819085] ffff8881029e1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 46.819842] ==================================================================
Home
[ 47.422621] ==================================================================
[ 47.424251] BUG: KASAN: slab-out-of-bounds in memchr+0x27/0x60
[ 47.425395] Read of size 1 at addr ffff88810241dfd8 by task kunit_try_catch/218
[ 47.426589]
[ 47.427018] CPU: 1 PID: 218 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 47.428448] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 47.429651] Call Trace:
[ 47.430016] <TASK>
[ 47.430428] dump_stack_lvl+0x4e/0x90
[ 47.430973] print_report+0xd2/0x660
[ 47.431945] ? __virt_addr_valid+0x156/0x1e0
[ 47.432753] ? kasan_complete_mode_report_info+0x2a/0x200
[ 47.433465] kasan_report+0xff/0x140
[ 47.433986] ? memchr+0x27/0x60
[ 47.434506] ? memchr+0x27/0x60
[ 47.435207] __asan_load1+0x66/0x70
[ 47.436219] memchr+0x27/0x60
[ 47.436655] kasan_memchr+0xdd/0x1f0
[ 47.437413] ? __pfx_kasan_memchr+0x10/0x10
[ 47.438263] ? __schedule+0x70b/0x1190
[ 47.438832] ? ktime_get_ts64+0x118/0x140
[ 47.439747] kunit_try_run_case+0x126/0x290
[ 47.440418] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.441036] ? __kasan_check_write+0x18/0x20
[ 47.442021] ? trace_preempt_on+0x20/0xa0
[ 47.442710] ? __kthread_parkme+0x4f/0xd0
[ 47.444074] ? preempt_count_sub+0x50/0x80
[ 47.445120] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.445735] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 47.447110] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.448201] kthread+0x19e/0x1e0
[ 47.448891] ? __pfx_kthread+0x10/0x10
[ 47.450262] ret_from_fork+0x41/0x70
[ 47.450722] ? __pfx_kthread+0x10/0x10
[ 47.451980] ret_from_fork_asm+0x1b/0x30
[ 47.452547] </TASK>
[ 47.453496]
[ 47.453736] Allocated by task 218:
[ 47.455185] kasan_save_stack+0x3c/0x60
[ 47.456295] kasan_set_track+0x29/0x40
[ 47.457330] kasan_save_alloc_info+0x22/0x30
[ 47.457752] __kasan_kmalloc+0xb7/0xc0
[ 47.458818] kmalloc_trace+0x4c/0xb0
[ 47.459265] kasan_memchr+0x9f/0x1f0
[ 47.460213] kunit_try_run_case+0x126/0x290
[ 47.461290] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.462075] kthread+0x19e/0x1e0
[ 47.462993] ret_from_fork+0x41/0x70
[ 47.463884] ret_from_fork_asm+0x1b/0x30
[ 47.465047]
[ 47.465556] The buggy address belongs to the object at ffff88810241dfc0
[ 47.465556] which belongs to the cache kmalloc-32 of size 32
[ 47.467448] The buggy address is located 0 bytes to the right of
[ 47.467448] allocated 24-byte region [ffff88810241dfc0, ffff88810241dfd8)
[ 47.469941]
[ 47.470582] The buggy address belongs to the physical page:
[ 47.471459] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10241d
[ 47.473324] flags: 0x200000000000800(slab|node=0|zone=2)
[ 47.473961] page_type: 0xffffffff()
[ 47.474571] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[ 47.475634] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 47.476888] page dumped because: kasan: bad access detected
[ 47.477655]
[ 47.478247] Memory state around the buggy address:
[ 47.479278] ffff88810241de80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 47.480377] ffff88810241df00: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[ 47.481255] >ffff88810241df80: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[ 47.482388] ^
[ 47.483642] ffff88810241e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 47.484753] ffff88810241e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.486113] ==================================================================
Home
[ 47.493831] ==================================================================
[ 47.495591] BUG: KASAN: slab-out-of-bounds in memcmp+0x3d/0xb0
[ 47.496460] Read of size 1 at addr ffff888102a1d018 by task kunit_try_catch/220
[ 47.497265]
[ 47.497776] CPU: 1 PID: 220 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 47.499401] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 47.501105] Call Trace:
[ 47.501446] <TASK>
[ 47.501779] dump_stack_lvl+0x4e/0x90
[ 47.502727] print_report+0xd2/0x660
[ 47.503340] ? __virt_addr_valid+0x156/0x1e0
[ 47.504535] ? kasan_complete_mode_report_info+0x2a/0x200
[ 47.505377] kasan_report+0xff/0x140
[ 47.506136] ? memcmp+0x3d/0xb0
[ 47.506828] ? memcmp+0x3d/0xb0
[ 47.507297] __asan_load1+0x66/0x70
[ 47.508165] memcmp+0x3d/0xb0
[ 47.508669] kasan_memcmp+0x100/0x230
[ 47.509417] ? __pfx_kasan_memcmp+0x10/0x10
[ 47.510243] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 47.511350] ? ktime_get_ts64+0x118/0x140
[ 47.512290] kunit_try_run_case+0x126/0x290
[ 47.513255] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.513843] ? __kasan_check_write+0x18/0x20
[ 47.514472] ? trace_preempt_on+0x20/0xa0
[ 47.515028] ? __kthread_parkme+0x4f/0xd0
[ 47.515659] ? preempt_count_sub+0x50/0x80
[ 47.516351] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.517764] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 47.518495] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.519457] kthread+0x19e/0x1e0
[ 47.520061] ? __pfx_kthread+0x10/0x10
[ 47.520383] ret_from_fork+0x41/0x70
[ 47.521380] ? __pfx_kthread+0x10/0x10
[ 47.521875] ret_from_fork_asm+0x1b/0x30
[ 47.522767] </TASK>
[ 47.523187]
[ 47.523429] Allocated by task 220:
[ 47.524012] kasan_save_stack+0x3c/0x60
[ 47.524956] kasan_set_track+0x29/0x40
[ 47.525675] kasan_save_alloc_info+0x22/0x30
[ 47.526419] __kasan_kmalloc+0xb7/0xc0
[ 47.527013] kmalloc_trace+0x4c/0xb0
[ 47.527661] kasan_memcmp+0xb0/0x230
[ 47.528267] kunit_try_run_case+0x126/0x290
[ 47.529048] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.530271] kthread+0x19e/0x1e0
[ 47.530718] ret_from_fork+0x41/0x70
[ 47.531318] ret_from_fork_asm+0x1b/0x30
[ 47.531820]
[ 47.532173] The buggy address belongs to the object at ffff888102a1d000
[ 47.532173] which belongs to the cache kmalloc-32 of size 32
[ 47.534254] The buggy address is located 0 bytes to the right of
[ 47.534254] allocated 24-byte region [ffff888102a1d000, ffff888102a1d018)
[ 47.535936]
[ 47.536159] The buggy address belongs to the physical page:
[ 47.536812] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1d
[ 47.538310] flags: 0x200000000000800(slab|node=0|zone=2)
[ 47.538663] page_type: 0xffffffff()
[ 47.538967] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[ 47.540265] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 47.541140] page dumped because: kasan: bad access detected
[ 47.542343]
[ 47.542794] Memory state around the buggy address:
[ 47.543646] ffff888102a1cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.544623] ffff888102a1cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.545622] >ffff888102a1d000: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.546843] ^
[ 47.547635] ffff888102a1d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.548613] ffff888102a1d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.549411] ==================================================================
Home
[ 47.769493] ==================================================================
[ 47.770371] BUG: KASAN: slab-use-after-free in kasan_strings+0x19b/0x510
[ 47.771507] Read of size 1 at addr ffff888102a1d050 by task kunit_try_catch/222
[ 47.772513]
[ 47.772702] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 47.773677] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 47.774785] Call Trace:
[ 47.775593] <TASK>
[ 47.776267] dump_stack_lvl+0x4e/0x90
[ 47.776922] print_report+0xd2/0x660
[ 47.777426] ? __virt_addr_valid+0x156/0x1e0
[ 47.778161] ? kasan_complete_mode_report_info+0x64/0x200
[ 47.778979] kasan_report+0xff/0x140
[ 47.779606] ? kasan_strings+0x19b/0x510
[ 47.780487] ? kasan_strings+0x19b/0x510
[ 47.780982] __asan_load1+0x66/0x70
[ 47.781471] kasan_strings+0x19b/0x510
[ 47.781971] ? __pfx_kasan_strings+0x10/0x10
[ 47.782693] ? __pfx_kasan_strings+0x10/0x10
[ 47.783360] ? kunit_try_run_case+0x11b/0x290
[ 47.784683] kunit_try_run_case+0x126/0x290
[ 47.785284] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.785836] ? __kasan_check_write+0x18/0x20
[ 47.786579] ? trace_preempt_on+0x20/0xa0
[ 47.787216] ? __kthread_parkme+0x4f/0xd0
[ 47.788065] ? preempt_count_sub+0x50/0x80
[ 47.788807] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.789418] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 47.790083] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.790968] kthread+0x19e/0x1e0
[ 47.791384] ? __pfx_kthread+0x10/0x10
[ 47.792435] ret_from_fork+0x41/0x70
[ 47.793023] ? __pfx_kthread+0x10/0x10
[ 47.793804] ret_from_fork_asm+0x1b/0x30
[ 47.794417] </TASK>
[ 47.794855]
[ 47.795166] Allocated by task 222:
[ 47.795679] kasan_save_stack+0x3c/0x60
[ 47.796941] kasan_set_track+0x29/0x40
[ 47.797512] kasan_save_alloc_info+0x22/0x30
[ 47.798303] __kasan_kmalloc+0xb7/0xc0
[ 47.798843] kmalloc_trace+0x4c/0xb0
[ 47.799419] kasan_strings+0x9f/0x510
[ 47.800048] kunit_try_run_case+0x126/0x290
[ 47.801101] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.801920] kthread+0x19e/0x1e0
[ 47.802404] ret_from_fork+0x41/0x70
[ 47.803043] ret_from_fork_asm+0x1b/0x30
[ 47.803635]
[ 47.804116] Freed by task 222:
[ 47.804887] kasan_save_stack+0x3c/0x60
[ 47.805572] kasan_set_track+0x29/0x40
[ 47.806096] kasan_save_free_info+0x2f/0x50
[ 47.806829] ____kasan_slab_free+0x172/0x1d0
[ 47.807726] __kasan_slab_free+0x16/0x20
[ 47.808427] __kmem_cache_free+0x190/0x310
[ 47.809441] kfree+0x7c/0x120
[ 47.810047] kasan_strings+0xc3/0x510
[ 47.810989] kunit_try_run_case+0x126/0x290
[ 47.811283] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.811655] kthread+0x19e/0x1e0
[ 47.811998] ret_from_fork+0x41/0x70
[ 47.813025] ret_from_fork_asm+0x1b/0x30
[ 47.813645]
[ 47.813967] The buggy address belongs to the object at ffff888102a1d040
[ 47.813967] which belongs to the cache kmalloc-32 of size 32
[ 47.816232] The buggy address is located 16 bytes inside of
[ 47.816232] freed 32-byte region [ffff888102a1d040, ffff888102a1d060)
[ 47.817362]
[ 47.817750] The buggy address belongs to the physical page:
[ 47.818761] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1d
[ 47.819982] flags: 0x200000000000800(slab|node=0|zone=2)
[ 47.821189] page_type: 0xffffffff()
[ 47.821939] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[ 47.822772] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 47.823867] page dumped because: kasan: bad access detected
[ 47.824792]
[ 47.825181] Memory state around the buggy address:
[ 47.825648] ffff888102a1cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.826726] ffff888102a1cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.827896] >ffff888102a1d000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 47.829190] ^
[ 47.830189] ffff888102a1d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.831358] ffff888102a1d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.832297] ==================================================================
Home
[ 49.150217] ==================================================================
[ 49.151707] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0xd4/0x1d0
[ 49.152433] Read of size 1 at addr ffff8881025b8a80 by task kunit_try_catch/228
[ 49.154034]
[ 49.154281] CPU: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 49.155490] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 49.156655] Call Trace:
[ 49.157424] <TASK>
[ 49.158151] dump_stack_lvl+0x4e/0x90
[ 49.158800] print_report+0xd2/0x660
[ 49.159609] ? __virt_addr_valid+0x156/0x1e0
[ 49.160333] ? kasan_complete_mode_report_info+0x64/0x200
[ 49.161535] kasan_report+0xff/0x140
[ 49.162220] ? kmalloc_double_kzfree+0xd4/0x1d0
[ 49.163044] ? kmalloc_double_kzfree+0xd4/0x1d0
[ 49.163940] ? kmalloc_double_kzfree+0xd4/0x1d0
[ 49.164692] __kasan_check_byte+0x3d/0x50
[ 49.165260] kfree_sensitive+0x22/0x90
[ 49.165801] kmalloc_double_kzfree+0xd4/0x1d0
[ 49.166391] ? __pfx_kmalloc_double_kzfree+0x10/0x10
[ 49.167099] ? __schedule+0x70b/0x1190
[ 49.168219] ? ktime_get_ts64+0x118/0x140
[ 49.168768] kunit_try_run_case+0x126/0x290
[ 49.169361] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.170218] ? __kasan_check_write+0x18/0x20
[ 49.171376] ? trace_preempt_on+0x20/0xa0
[ 49.171953] ? __kthread_parkme+0x4f/0xd0
[ 49.172686] ? preempt_count_sub+0x50/0x80
[ 49.173476] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.174333] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 49.175912] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.176631] kthread+0x19e/0x1e0
[ 49.177301] ? __pfx_kthread+0x10/0x10
[ 49.178107] ret_from_fork+0x41/0x70
[ 49.178963] ? __pfx_kthread+0x10/0x10
[ 49.179343] ret_from_fork_asm+0x1b/0x30
[ 49.180020] </TASK>
[ 49.180496]
[ 49.180972] Allocated by task 228:
[ 49.181593] kasan_save_stack+0x3c/0x60
[ 49.182228] kasan_set_track+0x29/0x40
[ 49.183384] kasan_save_alloc_info+0x22/0x30
[ 49.184271] __kasan_kmalloc+0xb7/0xc0
[ 49.184770] kmalloc_trace+0x4c/0xb0
[ 49.185416] kmalloc_double_kzfree+0x9d/0x1d0
[ 49.186320] kunit_try_run_case+0x126/0x290
[ 49.187835] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.188749] kthread+0x19e/0x1e0
[ 49.189284] ret_from_fork+0x41/0x70
[ 49.189961] ret_from_fork_asm+0x1b/0x30
[ 49.190486]
[ 49.191370] Freed by task 228:
[ 49.191920] kasan_save_stack+0x3c/0x60
[ 49.192462] kasan_set_track+0x29/0x40
[ 49.193147] kasan_save_free_info+0x2f/0x50
[ 49.193961] ____kasan_slab_free+0x172/0x1d0
[ 49.194502] __kasan_slab_free+0x16/0x20
[ 49.195756] __kmem_cache_free+0x190/0x310
[ 49.196431] kfree+0x7c/0x120
[ 49.197150] kfree_sensitive+0x67/0x90
[ 49.197778] kmalloc_double_kzfree+0xbd/0x1d0
[ 49.198448] kunit_try_run_case+0x126/0x290
[ 49.199614] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.200331] kthread+0x19e/0x1e0
[ 49.201059] ret_from_fork+0x41/0x70
[ 49.201758] ret_from_fork_asm+0x1b/0x30
[ 49.202352]
[ 49.203101] The buggy address belongs to the object at ffff8881025b8a80
[ 49.203101] which belongs to the cache kmalloc-16 of size 16
[ 49.204557] The buggy address is located 0 bytes inside of
[ 49.204557] freed 16-byte region [ffff8881025b8a80, ffff8881025b8a90)
[ 49.206136]
[ 49.206478] The buggy address belongs to the physical page:
[ 49.207724] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025b8
[ 49.208810] flags: 0x200000000000800(slab|node=0|zone=2)
[ 49.209443] page_type: 0xffffffff()
[ 49.210623] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 49.211848] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 49.212512] page dumped because: kasan: bad access detected
[ 49.213117]
[ 49.213394] Memory state around the buggy address:
[ 49.214365] ffff8881025b8980: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[ 49.215180] ffff8881025b8a00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[ 49.217091] >ffff8881025b8a80: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.218129] ^
[ 49.219219] ffff8881025b8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.220662] ffff8881025b8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.221944] ==================================================================
Home
[ 45.623861] ==================================================================
[ 45.626039] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0xd5/0x1d0
[ 45.627275] Read of size 1 at addr ffff8881025b8a68 by task kunit_try_catch/180
[ 45.628342]
[ 45.628593] CPU: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 45.630431] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 45.631821] Call Trace:
[ 45.632592] <TASK>
[ 45.633423] dump_stack_lvl+0x4e/0x90
[ 45.634392] print_report+0xd2/0x660
[ 45.635111] ? __virt_addr_valid+0x156/0x1e0
[ 45.635912] ? kasan_complete_mode_report_info+0x64/0x200
[ 45.637172] kasan_report+0xff/0x140
[ 45.637860] ? kmalloc_uaf+0xd5/0x1d0
[ 45.639048] ? kmalloc_uaf+0xd5/0x1d0
[ 45.639582] __asan_load1+0x66/0x70
[ 45.640346] kmalloc_uaf+0xd5/0x1d0
[ 45.641292] ? __pfx_kmalloc_uaf+0x10/0x10
[ 45.642149] ? __schedule+0x70b/0x1190
[ 45.642728] ? ktime_get_ts64+0x118/0x140
[ 45.643396] kunit_try_run_case+0x126/0x290
[ 45.644502] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.645605] ? __kasan_check_write+0x18/0x20
[ 45.646185] ? trace_preempt_on+0x20/0xa0
[ 45.647004] ? __kthread_parkme+0x4f/0xd0
[ 45.648041] ? preempt_count_sub+0x50/0x80
[ 45.649140] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.649632] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 45.650801] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.651943] kthread+0x19e/0x1e0
[ 45.652412] ? __pfx_kthread+0x10/0x10
[ 45.653256] ret_from_fork+0x41/0x70
[ 45.653835] ? __pfx_kthread+0x10/0x10
[ 45.655317] ret_from_fork_asm+0x1b/0x30
[ 45.656018] </TASK>
[ 45.656226]
[ 45.656364] Allocated by task 180:
[ 45.656629] kasan_save_stack+0x3c/0x60
[ 45.658140] kasan_set_track+0x29/0x40
[ 45.658672] kasan_save_alloc_info+0x22/0x30
[ 45.659215] __kasan_kmalloc+0xb7/0xc0
[ 45.660384] kmalloc_trace+0x4c/0xb0
[ 45.661492] kmalloc_uaf+0x9d/0x1d0
[ 45.662777] kunit_try_run_case+0x126/0x290
[ 45.663350] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.664454] kthread+0x19e/0x1e0
[ 45.665236] ret_from_fork+0x41/0x70
[ 45.666450] ret_from_fork_asm+0x1b/0x30
[ 45.667302]
[ 45.668169] Freed by task 180:
[ 45.668571] kasan_save_stack+0x3c/0x60
[ 45.669806] kasan_set_track+0x29/0x40
[ 45.670388] kasan_save_free_info+0x2f/0x50
[ 45.671024] ____kasan_slab_free+0x172/0x1d0
[ 45.671752] __kasan_slab_free+0x16/0x20
[ 45.672795] __kmem_cache_free+0x190/0x310
[ 45.673353] kfree+0x7c/0x120
[ 45.674254] kmalloc_uaf+0xbd/0x1d0
[ 45.674955] kunit_try_run_case+0x126/0x290
[ 45.676273] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.677379] kthread+0x19e/0x1e0
[ 45.678406] ret_from_fork+0x41/0x70
[ 45.679395] ret_from_fork_asm+0x1b/0x30
[ 45.680022]
[ 45.680417] The buggy address belongs to the object at ffff8881025b8a60
[ 45.680417] which belongs to the cache kmalloc-16 of size 16
[ 45.682384] The buggy address is located 8 bytes inside of
[ 45.682384] freed 16-byte region [ffff8881025b8a60, ffff8881025b8a70)
[ 45.684141]
[ 45.684515] The buggy address belongs to the physical page:
[ 45.685591] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025b8
[ 45.686572] flags: 0x200000000000800(slab|node=0|zone=2)
[ 45.687002] page_type: 0xffffffff()
[ 45.688413] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 45.689610] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 45.690719] page dumped because: kasan: bad access detected
[ 45.691518]
[ 45.691877] Memory state around the buggy address:
[ 45.692484] ffff8881025b8900: 00 03 fc fc 00 02 fc fc 00 05 fc fc 00 02 fc fc
[ 45.693559] ffff8881025b8980: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[ 45.694683] >ffff8881025b8a00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[ 45.695974] ^
[ 45.697093] ffff8881025b8a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.698626] ffff8881025b8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.699612] ==================================================================
Home
[ 45.775292] ==================================================================
[ 45.776749] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x122/0x2b0
[ 45.777655] Read of size 1 at addr ffff888102851e28 by task kunit_try_catch/184
[ 45.778559]
[ 45.779188] CPU: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 45.780217] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 45.781276] Call Trace:
[ 45.781752] <TASK>
[ 45.782368] dump_stack_lvl+0x4e/0x90
[ 45.783345] print_report+0xd2/0x660
[ 45.784105] ? __virt_addr_valid+0x156/0x1e0
[ 45.784984] ? kasan_complete_mode_report_info+0x64/0x200
[ 45.785670] kasan_report+0xff/0x140
[ 45.786292] ? kmalloc_uaf2+0x122/0x2b0
[ 45.786871] ? kmalloc_uaf2+0x122/0x2b0
[ 45.787389] __asan_load1+0x66/0x70
[ 45.788015] kmalloc_uaf2+0x122/0x2b0
[ 45.788596] ? __pfx_kmalloc_uaf2+0x10/0x10
[ 45.789730] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 45.790558] ? __schedule+0x70b/0x1190
[ 45.791103] ? ktime_get_ts64+0x118/0x140
[ 45.791695] kunit_try_run_case+0x126/0x290
[ 45.792612] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.793643] ? __kasan_check_write+0x18/0x20
[ 45.794359] ? trace_preempt_on+0x20/0xa0
[ 45.795033] ? __kthread_parkme+0x4f/0xd0
[ 45.795606] ? preempt_count_sub+0x50/0x80
[ 45.796083] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.797041] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 45.797746] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.798637] kthread+0x19e/0x1e0
[ 45.799175] ? __pfx_kthread+0x10/0x10
[ 45.799802] ret_from_fork+0x41/0x70
[ 45.800483] ? __pfx_kthread+0x10/0x10
[ 45.801304] ret_from_fork_asm+0x1b/0x30
[ 45.802135] </TASK>
[ 45.802677]
[ 45.803252] Allocated by task 184:
[ 45.803712] kasan_save_stack+0x3c/0x60
[ 45.804591] kasan_set_track+0x29/0x40
[ 45.805406] kasan_save_alloc_info+0x22/0x30
[ 45.805988] __kasan_kmalloc+0xb7/0xc0
[ 45.806586] kmalloc_trace+0x4c/0xb0
[ 45.807275] kmalloc_uaf2+0xb0/0x2b0
[ 45.808125] kunit_try_run_case+0x126/0x290
[ 45.808421] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.809078] kthread+0x19e/0x1e0
[ 45.809697] ret_from_fork+0x41/0x70
[ 45.810129] ret_from_fork_asm+0x1b/0x30
[ 45.811459]
[ 45.812248] Freed by task 184:
[ 45.813137] kasan_save_stack+0x3c/0x60
[ 45.813681] kasan_set_track+0x29/0x40
[ 45.814508] kasan_save_free_info+0x2f/0x50
[ 45.815703] ____kasan_slab_free+0x172/0x1d0
[ 45.816258] __kasan_slab_free+0x16/0x20
[ 45.817087] __kmem_cache_free+0x190/0x310
[ 45.817793] kfree+0x7c/0x120
[ 45.818441] kmalloc_uaf2+0xd0/0x2b0
[ 45.819194] kunit_try_run_case+0x126/0x290
[ 45.820022] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.820804] kthread+0x19e/0x1e0
[ 45.821696] ret_from_fork+0x41/0x70
[ 45.822316] ret_from_fork_asm+0x1b/0x30
[ 45.823001]
[ 45.823279] The buggy address belongs to the object at ffff888102851e00
[ 45.823279] which belongs to the cache kmalloc-64 of size 64
[ 45.824590] The buggy address is located 40 bytes inside of
[ 45.824590] freed 64-byte region [ffff888102851e00, ffff888102851e40)
[ 45.826399]
[ 45.826751] The buggy address belongs to the physical page:
[ 45.827339] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102851
[ 45.828450] flags: 0x200000000000800(slab|node=0|zone=2)
[ 45.829076] page_type: 0xffffffff()
[ 45.829631] raw: 0200000000000800 ffff888100041640 dead000000000122 0000000000000000
[ 45.830624] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[ 45.831546] page dumped because: kasan: bad access detected
[ 45.832257]
[ 45.832567] Memory state around the buggy address:
[ 45.833261] ffff888102851d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 45.834258] ffff888102851d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 45.835151] >ffff888102851e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 45.836097] ^
[ 45.836834] ffff888102851e80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[ 45.838151] ffff888102851f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.839097] ==================================================================
Home
[ 45.775292] ==================================================================
[ 45.776749] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x122/0x2b0
[ 45.777655] Read of size 1 at addr ffff888102851e28 by task kunit_try_catch/184
[ 45.778559]
[ 45.779188] CPU: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 45.780217] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 45.781276] Call Trace:
[ 45.781752] <TASK>
[ 45.782368] dump_stack_lvl+0x4e/0x90
[ 45.783345] print_report+0xd2/0x660
[ 45.784105] ? __virt_addr_valid+0x156/0x1e0
[ 45.784984] ? kasan_complete_mode_report_info+0x64/0x200
[ 45.785670] kasan_report+0xff/0x140
[ 45.786292] ? kmalloc_uaf2+0x122/0x2b0
[ 45.786871] ? kmalloc_uaf2+0x122/0x2b0
[ 45.787389] __asan_load1+0x66/0x70
[ 45.788015] kmalloc_uaf2+0x122/0x2b0
[ 45.788596] ? __pfx_kmalloc_uaf2+0x10/0x10
[ 45.789730] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 45.790558] ? __schedule+0x70b/0x1190
[ 45.791103] ? ktime_get_ts64+0x118/0x140
[ 45.791695] kunit_try_run_case+0x126/0x290
[ 45.792612] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.793643] ? __kasan_check_write+0x18/0x20
[ 45.794359] ? trace_preempt_on+0x20/0xa0
[ 45.795033] ? __kthread_parkme+0x4f/0xd0
[ 45.795606] ? preempt_count_sub+0x50/0x80
[ 45.796083] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.797041] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 45.797746] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.798637] kthread+0x19e/0x1e0
[ 45.799175] ? __pfx_kthread+0x10/0x10
[ 45.799802] ret_from_fork+0x41/0x70
[ 45.800483] ? __pfx_kthread+0x10/0x10
[ 45.801304] ret_from_fork_asm+0x1b/0x30
[ 45.802135] </TASK>
[ 45.802677]
[ 45.803252] Allocated by task 184:
[ 45.803712] kasan_save_stack+0x3c/0x60
[ 45.804591] kasan_set_track+0x29/0x40
[ 45.805406] kasan_save_alloc_info+0x22/0x30
[ 45.805988] __kasan_kmalloc+0xb7/0xc0
[ 45.806586] kmalloc_trace+0x4c/0xb0
[ 45.807275] kmalloc_uaf2+0xb0/0x2b0
[ 45.808125] kunit_try_run_case+0x126/0x290
[ 45.808421] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.809078] kthread+0x19e/0x1e0
[ 45.809697] ret_from_fork+0x41/0x70
[ 45.810129] ret_from_fork_asm+0x1b/0x30
[ 45.811459]
[ 45.812248] Freed by task 184:
[ 45.813137] kasan_save_stack+0x3c/0x60
[ 45.813681] kasan_set_track+0x29/0x40
[ 45.814508] kasan_save_free_info+0x2f/0x50
[ 45.815703] ____kasan_slab_free+0x172/0x1d0
[ 45.816258] __kasan_slab_free+0x16/0x20
[ 45.817087] __kmem_cache_free+0x190/0x310
[ 45.817793] kfree+0x7c/0x120
[ 45.818441] kmalloc_uaf2+0xd0/0x2b0
[ 45.819194] kunit_try_run_case+0x126/0x290
[ 45.820022] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.820804] kthread+0x19e/0x1e0
[ 45.821696] ret_from_fork+0x41/0x70
[ 45.822316] ret_from_fork_asm+0x1b/0x30
[ 45.823001]
[ 45.823279] The buggy address belongs to the object at ffff888102851e00
[ 45.823279] which belongs to the cache kmalloc-64 of size 64
[ 45.824590] The buggy address is located 40 bytes inside of
[ 45.824590] freed 64-byte region [ffff888102851e00, ffff888102851e40)
[ 45.826399]
[ 45.826751] The buggy address belongs to the physical page:
[ 45.827339] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102851
[ 45.828450] flags: 0x200000000000800(slab|node=0|zone=2)
[ 45.829076] page_type: 0xffffffff()
[ 45.829631] raw: 0200000000000800 ffff888100041640 dead000000000122 0000000000000000
[ 45.830624] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[ 45.831546] page dumped because: kasan: bad access detected
[ 45.832257]
[ 45.832567] Memory state around the buggy address:
[ 45.833261] ffff888102851d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 45.834258] ffff888102851d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 45.835151] >ffff888102851e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 45.836097] ^
[ 45.836834] ffff888102851e80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[ 45.838151] ffff888102851f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.839097] ==================================================================
Home
[ 45.083351] ==================================================================
[ 45.084786] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x108/0x250
[ 45.085601] Read of size 16 at addr ffff8881023f9980 by task kunit_try_catch/164
[ 45.087245]
[ 45.087489] CPU: 1 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 45.088728] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 45.090413] Call Trace:
[ 45.090795] <TASK>
[ 45.091139] dump_stack_lvl+0x4e/0x90
[ 45.091879] print_report+0xd2/0x660
[ 45.092185] ? __virt_addr_valid+0x156/0x1e0
[ 45.092497] ? kasan_complete_mode_report_info+0x64/0x200
[ 45.093825] kasan_report+0xff/0x140
[ 45.094392] ? kmalloc_uaf_16+0x108/0x250
[ 45.095143] ? kmalloc_uaf_16+0x108/0x250
[ 45.095906] __asan_load16+0x69/0x90
[ 45.096493] kmalloc_uaf_16+0x108/0x250
[ 45.097364] ? __pfx_kmalloc_uaf_16+0x10/0x10
[ 45.098224] ? __schedule+0x70b/0x1190
[ 45.098962] ? ktime_get_ts64+0x118/0x140
[ 45.099748] kunit_try_run_case+0x126/0x290
[ 45.100409] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.101341] ? __kasan_check_write+0x18/0x20
[ 45.102186] ? trace_preempt_on+0x20/0xa0
[ 45.103155] ? __kthread_parkme+0x4f/0xd0
[ 45.104017] ? preempt_count_sub+0x50/0x80
[ 45.104833] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.105417] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 45.106479] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.107294] kthread+0x19e/0x1e0
[ 45.108087] ? __pfx_kthread+0x10/0x10
[ 45.108737] ret_from_fork+0x41/0x70
[ 45.109353] ? __pfx_kthread+0x10/0x10
[ 45.110313] ret_from_fork_asm+0x1b/0x30
[ 45.111371] </TASK>
[ 45.111776]
[ 45.112407] Allocated by task 164:
[ 45.113286] kasan_save_stack+0x3c/0x60
[ 45.114352] kasan_set_track+0x29/0x40
[ 45.115001] kasan_save_alloc_info+0x22/0x30
[ 45.115941] __kasan_kmalloc+0xb7/0xc0
[ 45.116420] kmalloc_trace+0x4c/0xb0
[ 45.117297] kmalloc_uaf_16+0xc9/0x250
[ 45.118285] kunit_try_run_case+0x126/0x290
[ 45.119144] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.120075] kthread+0x19e/0x1e0
[ 45.120619] ret_from_fork+0x41/0x70
[ 45.121541] ret_from_fork_asm+0x1b/0x30
[ 45.122395]
[ 45.122741] Freed by task 164:
[ 45.123730] kasan_save_stack+0x3c/0x60
[ 45.124590] kasan_set_track+0x29/0x40
[ 45.126036] kasan_save_free_info+0x2f/0x50
[ 45.126701] ____kasan_slab_free+0x172/0x1d0
[ 45.127228] __kasan_slab_free+0x16/0x20
[ 45.127967] __kmem_cache_free+0x190/0x310
[ 45.129312] kfree+0x7c/0x120
[ 45.129754] kmalloc_uaf_16+0xe9/0x250
[ 45.130736] kunit_try_run_case+0x126/0x290
[ 45.131383] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.132462] kthread+0x19e/0x1e0
[ 45.133090] ret_from_fork+0x41/0x70
[ 45.133948] ret_from_fork_asm+0x1b/0x30
[ 45.134402]
[ 45.134856] The buggy address belongs to the object at ffff8881023f9980
[ 45.134856] which belongs to the cache kmalloc-16 of size 16
[ 45.136462] The buggy address is located 0 bytes inside of
[ 45.136462] freed 16-byte region [ffff8881023f9980, ffff8881023f9990)
[ 45.137907]
[ 45.138344] The buggy address belongs to the physical page:
[ 45.138956] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[ 45.140382] flags: 0x200000000000800(slab|node=0|zone=2)
[ 45.141010] page_type: 0xffffffff()
[ 45.141628] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 45.142758] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 45.143588] page dumped because: kasan: bad access detected
[ 45.144624]
[ 45.145110] Memory state around the buggy address:
[ 45.146146] ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 45.147466] ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc
[ 45.148708] >ffff8881023f9980: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.149905] ^
[ 45.150504] ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.151790] ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.153089] ==================================================================
Home
[ 45.083351] ==================================================================
[ 45.084786] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x108/0x250
[ 45.085601] Read of size 16 at addr ffff8881023f9980 by task kunit_try_catch/164
[ 45.087245]
[ 45.087489] CPU: 1 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 45.088728] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 45.090413] Call Trace:
[ 45.090795] <TASK>
[ 45.091139] dump_stack_lvl+0x4e/0x90
[ 45.091879] print_report+0xd2/0x660
[ 45.092185] ? __virt_addr_valid+0x156/0x1e0
[ 45.092497] ? kasan_complete_mode_report_info+0x64/0x200
[ 45.093825] kasan_report+0xff/0x140
[ 45.094392] ? kmalloc_uaf_16+0x108/0x250
[ 45.095143] ? kmalloc_uaf_16+0x108/0x250
[ 45.095906] __asan_load16+0x69/0x90
[ 45.096493] kmalloc_uaf_16+0x108/0x250
[ 45.097364] ? __pfx_kmalloc_uaf_16+0x10/0x10
[ 45.098224] ? __schedule+0x70b/0x1190
[ 45.098962] ? ktime_get_ts64+0x118/0x140
[ 45.099748] kunit_try_run_case+0x126/0x290
[ 45.100409] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.101341] ? __kasan_check_write+0x18/0x20
[ 45.102186] ? trace_preempt_on+0x20/0xa0
[ 45.103155] ? __kthread_parkme+0x4f/0xd0
[ 45.104017] ? preempt_count_sub+0x50/0x80
[ 45.104833] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.105417] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 45.106479] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.107294] kthread+0x19e/0x1e0
[ 45.108087] ? __pfx_kthread+0x10/0x10
[ 45.108737] ret_from_fork+0x41/0x70
[ 45.109353] ? __pfx_kthread+0x10/0x10
[ 45.110313] ret_from_fork_asm+0x1b/0x30
[ 45.111371] </TASK>
[ 45.111776]
[ 45.112407] Allocated by task 164:
[ 45.113286] kasan_save_stack+0x3c/0x60
[ 45.114352] kasan_set_track+0x29/0x40
[ 45.115001] kasan_save_alloc_info+0x22/0x30
[ 45.115941] __kasan_kmalloc+0xb7/0xc0
[ 45.116420] kmalloc_trace+0x4c/0xb0
[ 45.117297] kmalloc_uaf_16+0xc9/0x250
[ 45.118285] kunit_try_run_case+0x126/0x290
[ 45.119144] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.120075] kthread+0x19e/0x1e0
[ 45.120619] ret_from_fork+0x41/0x70
[ 45.121541] ret_from_fork_asm+0x1b/0x30
[ 45.122395]
[ 45.122741] Freed by task 164:
[ 45.123730] kasan_save_stack+0x3c/0x60
[ 45.124590] kasan_set_track+0x29/0x40
[ 45.126036] kasan_save_free_info+0x2f/0x50
[ 45.126701] ____kasan_slab_free+0x172/0x1d0
[ 45.127228] __kasan_slab_free+0x16/0x20
[ 45.127967] __kmem_cache_free+0x190/0x310
[ 45.129312] kfree+0x7c/0x120
[ 45.129754] kmalloc_uaf_16+0xe9/0x250
[ 45.130736] kunit_try_run_case+0x126/0x290
[ 45.131383] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.132462] kthread+0x19e/0x1e0
[ 45.133090] ret_from_fork+0x41/0x70
[ 45.133948] ret_from_fork_asm+0x1b/0x30
[ 45.134402]
[ 45.134856] The buggy address belongs to the object at ffff8881023f9980
[ 45.134856] which belongs to the cache kmalloc-16 of size 16
[ 45.136462] The buggy address is located 0 bytes inside of
[ 45.136462] freed 16-byte region [ffff8881023f9980, ffff8881023f9990)
[ 45.137907]
[ 45.138344] The buggy address belongs to the physical page:
[ 45.138956] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f9
[ 45.140382] flags: 0x200000000000800(slab|node=0|zone=2)
[ 45.141010] page_type: 0xffffffff()
[ 45.141628] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000
[ 45.142758] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[ 45.143588] page dumped because: kasan: bad access detected
[ 45.144624]
[ 45.145110] Memory state around the buggy address:
[ 45.146146] ffff8881023f9880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 45.147466] ffff8881023f9900: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc
[ 45.148708] >ffff8881023f9980: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.149905] ^
[ 45.150504] ffff8881023f9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.151790] ffff8881023f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.153089] ==================================================================
Home
[ 45.710465] ==================================================================
[ 45.712047] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0xdb/0x1d0
[ 45.712992] Write of size 33 at addr ffff888102851d80 by task kunit_try_catch/182
[ 45.714023]
[ 45.714345] CPU: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 45.715668] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 45.716722] Call Trace:
[ 45.717202] <TASK>
[ 45.717648] dump_stack_lvl+0x4e/0x90
[ 45.718319] print_report+0xd2/0x660
[ 45.718912] ? __virt_addr_valid+0x156/0x1e0
[ 45.719634] ? kasan_complete_mode_report_info+0x64/0x200
[ 45.720411] kasan_report+0xff/0x140
[ 45.721007] ? kmalloc_uaf_memset+0xdb/0x1d0
[ 45.721595] ? kmalloc_uaf_memset+0xdb/0x1d0
[ 45.722404] kasan_check_range+0x10c/0x1c0
[ 45.723093] __asan_memset+0x27/0x50
[ 45.723691] kmalloc_uaf_memset+0xdb/0x1d0
[ 45.724334] ? __pfx_kmalloc_uaf_memset+0x10/0x10
[ 45.725040] ? __pfx_kmalloc_uaf_memset+0x10/0x10
[ 45.725667] ? kunit_try_run_case+0x11b/0x290
[ 45.726423] kunit_try_run_case+0x126/0x290
[ 45.727125] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.727818] ? __kasan_check_write+0x18/0x20
[ 45.728513] ? trace_preempt_on+0x20/0xa0
[ 45.729174] ? __kthread_parkme+0x4f/0xd0
[ 45.729933] ? preempt_count_sub+0x50/0x80
[ 45.730594] ? __pfx_kunit_try_run_case+0x10/0x10
[ 45.731322] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 45.732172] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.733045] kthread+0x19e/0x1e0
[ 45.733630] ? __pfx_kthread+0x10/0x10
[ 45.734363] ret_from_fork+0x41/0x70
[ 45.734979] ? __pfx_kthread+0x10/0x10
[ 45.735582] ret_from_fork_asm+0x1b/0x30
[ 45.736371] </TASK>
[ 45.736777]
[ 45.737185] Allocated by task 182:
[ 45.737637] kasan_save_stack+0x3c/0x60
[ 45.738388] kasan_set_track+0x29/0x40
[ 45.739106] kasan_save_alloc_info+0x22/0x30
[ 45.739917] __kasan_kmalloc+0xb7/0xc0
[ 45.740662] kmalloc_trace+0x4c/0xb0
[ 45.741300] kmalloc_uaf_memset+0x9d/0x1d0
[ 45.741924] kunit_try_run_case+0x126/0x290
[ 45.742506] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.743322] kthread+0x19e/0x1e0
[ 45.743906] ret_from_fork+0x41/0x70
[ 45.744406] ret_from_fork_asm+0x1b/0x30
[ 45.745022]
[ 45.745301] Freed by task 182:
[ 45.745718] kasan_save_stack+0x3c/0x60
[ 45.746281] kasan_set_track+0x29/0x40
[ 45.746939] kasan_save_free_info+0x2f/0x50
[ 45.747572] ____kasan_slab_free+0x172/0x1d0
[ 45.748159] __kasan_slab_free+0x16/0x20
[ 45.748805] __kmem_cache_free+0x190/0x310
[ 45.749337] kfree+0x7c/0x120
[ 45.749994] kmalloc_uaf_memset+0xbd/0x1d0
[ 45.750517] kunit_try_run_case+0x126/0x290
[ 45.751219] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 45.751959] kthread+0x19e/0x1e0
[ 45.752490] ret_from_fork+0x41/0x70
[ 45.753016] ret_from_fork_asm+0x1b/0x30
[ 45.753661]
[ 45.753990] The buggy address belongs to the object at ffff888102851d80
[ 45.753990] which belongs to the cache kmalloc-64 of size 64
[ 45.755359] The buggy address is located 0 bytes inside of
[ 45.755359] freed 64-byte region [ffff888102851d80, ffff888102851dc0)
[ 45.756792]
[ 45.757081] The buggy address belongs to the physical page:
[ 45.757772] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102851
[ 45.758792] flags: 0x200000000000800(slab|node=0|zone=2)
[ 45.759470] page_type: 0xffffffff()
[ 45.759993] raw: 0200000000000800 ffff888100041640 dead000000000122 0000000000000000
[ 45.760809] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[ 45.761654] page dumped because: kasan: bad access detected
[ 45.762289]
[ 45.762608] Memory state around the buggy address:
[ 45.763294] ffff888102851c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 45.764171] ffff888102851d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 45.765000] >ffff888102851d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 45.765745] ^
[ 45.766289] ffff888102851e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.767096] ffff888102851e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.767766] ==================================================================
Home
[ 47.336051] ==================================================================
[ 47.337368] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0xce/0x1d0
[ 47.339515] Read of size 1 at addr ffff88810199d640 by task kunit_try_catch/216
[ 47.340447]
[ 47.340728] CPU: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 47.341868] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 47.343283] Call Trace:
[ 47.343791] <TASK>
[ 47.344449] dump_stack_lvl+0x4e/0x90
[ 47.345167] print_report+0xd2/0x660
[ 47.345720] ? __virt_addr_valid+0x156/0x1e0
[ 47.346693] ? kasan_complete_mode_report_info+0x64/0x200
[ 47.348146] kasan_report+0xff/0x140
[ 47.348576] ? kmem_cache_double_destroy+0xce/0x1d0
[ 47.349208] ? kmem_cache_double_destroy+0xce/0x1d0
[ 47.349577] ? kmem_cache_double_destroy+0xce/0x1d0
[ 47.349949] __kasan_check_byte+0x3d/0x50
[ 47.350763] kmem_cache_destroy+0x25/0x170
[ 47.352077] kmem_cache_double_destroy+0xce/0x1d0
[ 47.353217] ? __pfx_kmem_cache_double_destroy+0x10/0x10
[ 47.354096] ? __schedule+0x70b/0x1190
[ 47.354544] ? ktime_get_ts64+0x118/0x140
[ 47.355055] kunit_try_run_case+0x126/0x290
[ 47.356077] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.357138] ? __kasan_check_write+0x18/0x20
[ 47.357807] ? trace_preempt_on+0x20/0xa0
[ 47.358364] ? __kthread_parkme+0x4f/0xd0
[ 47.358942] ? preempt_count_sub+0x50/0x80
[ 47.359807] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.360392] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 47.361434] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.362466] kthread+0x19e/0x1e0
[ 47.363139] ? __pfx_kthread+0x10/0x10
[ 47.364064] ret_from_fork+0x41/0x70
[ 47.364736] ? __pfx_kthread+0x10/0x10
[ 47.365312] ret_from_fork_asm+0x1b/0x30
[ 47.365899] </TASK>
[ 47.366312]
[ 47.366619] Allocated by task 216:
[ 47.367208] kasan_save_stack+0x3c/0x60
[ 47.368038] kasan_set_track+0x29/0x40
[ 47.368804] kasan_save_alloc_info+0x22/0x30
[ 47.369581] __kasan_slab_alloc+0x91/0xa0
[ 47.370140] kmem_cache_alloc+0x180/0x3b0
[ 47.370749] kmem_cache_create_usercopy+0x13e/0x230
[ 47.371502] kmem_cache_create+0x1a/0x20
[ 47.372479] kmem_cache_double_destroy+0x97/0x1d0
[ 47.373402] kunit_try_run_case+0x126/0x290
[ 47.374110] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.374750] kthread+0x19e/0x1e0
[ 47.375186] ret_from_fork+0x41/0x70
[ 47.375772] ret_from_fork_asm+0x1b/0x30
[ 47.376382]
[ 47.377303] Freed by task 216:
[ 47.378033] kasan_save_stack+0x3c/0x60
[ 47.378619] kasan_set_track+0x29/0x40
[ 47.379506] kasan_save_free_info+0x2f/0x50
[ 47.380211] ____kasan_slab_free+0x172/0x1d0
[ 47.381376] __kasan_slab_free+0x16/0x20
[ 47.381958] kmem_cache_free+0x1a7/0x4b0
[ 47.382461] slab_kmem_cache_release+0x2e/0x40
[ 47.383078] kmem_cache_release+0x16/0x20
[ 47.383968] kobject_put+0xf6/0x250
[ 47.384391] sysfs_slab_release+0x24/0x30
[ 47.385683] kmem_cache_destroy+0xd2/0x170
[ 47.386357] kmem_cache_double_destroy+0xb7/0x1d0
[ 47.387109] kunit_try_run_case+0x126/0x290
[ 47.387681] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.388497] kthread+0x19e/0x1e0
[ 47.389128] ret_from_fork+0x41/0x70
[ 47.389668] ret_from_fork_asm+0x1b/0x30
[ 47.390253]
[ 47.390703] The buggy address belongs to the object at ffff88810199d640
[ 47.390703] which belongs to the cache kmem_cache of size 208
[ 47.392332] The buggy address is located 0 bytes inside of
[ 47.392332] freed 208-byte region [ffff88810199d640, ffff88810199d710)
[ 47.394506]
[ 47.395103] The buggy address belongs to the physical page:
[ 47.396344] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10199d
[ 47.397690] flags: 0x200000000000800(slab|node=0|zone=2)
[ 47.398513] page_type: 0xffffffff()
[ 47.399305] raw: 0200000000000800 ffff888100041000 dead000000000122 0000000000000000
[ 47.400423] raw: 0000000000000000 00000000800c000c 00000001ffffffff 0000000000000000
[ 47.401967] page dumped because: kasan: bad access detected
[ 47.403061]
[ 47.403274] Memory state around the buggy address:
[ 47.404071] ffff88810199d500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 47.404957] ffff88810199d580: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[ 47.406480] >ffff88810199d600: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[ 47.407873] ^
[ 47.408452] ffff88810199d680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 47.410160] ffff88810199d700: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.411243] ==================================================================
Home
[ 44.928948] ==================================================================
[ 44.929573] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x131/0x2e0
[ 44.930854] Read of size 1 at addr ffff888100982800 by task kunit_try_catch/160
[ 44.932015]
[ 44.932438] CPU: 1 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 44.933635] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 44.935502] Call Trace:
[ 44.936122] <TASK>
[ 44.936504] dump_stack_lvl+0x4e/0x90
[ 44.937397] print_report+0xd2/0x660
[ 44.938513] ? __virt_addr_valid+0x156/0x1e0
[ 44.939363] ? kasan_complete_mode_report_info+0x64/0x200
[ 44.940110] kasan_report+0xff/0x140
[ 44.941171] ? krealloc_uaf+0x131/0x2e0
[ 44.941789] ? krealloc_uaf+0x131/0x2e0
[ 44.942994] __asan_load1+0x66/0x70
[ 44.943626] krealloc_uaf+0x131/0x2e0
[ 44.944320] ? __pfx_krealloc_uaf+0x10/0x10
[ 44.945139] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 44.945801] ? __schedule+0x70b/0x1190
[ 44.947188] ? ktime_get_ts64+0x118/0x140
[ 44.947900] kunit_try_run_case+0x126/0x290
[ 44.948464] ? __pfx_kunit_try_run_case+0x10/0x10
[ 44.949290] ? __kasan_check_write+0x18/0x20
[ 44.950602] ? trace_preempt_on+0x20/0xa0
[ 44.951278] ? __kthread_parkme+0x4f/0xd0
[ 44.951856] ? preempt_count_sub+0x50/0x80
[ 44.952518] ? __pfx_kunit_try_run_case+0x10/0x10
[ 44.953597] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 44.955098] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 44.955842] kthread+0x19e/0x1e0
[ 44.956859] ? __pfx_kthread+0x10/0x10
[ 44.957564] ret_from_fork+0x41/0x70
[ 44.958624] ? __pfx_kthread+0x10/0x10
[ 44.959499] ret_from_fork_asm+0x1b/0x30
[ 44.960354] </TASK>
[ 44.961015]
[ 44.961379] Allocated by task 160:
[ 44.962272] kasan_save_stack+0x3c/0x60
[ 44.963301] kasan_set_track+0x29/0x40
[ 44.963950] kasan_save_alloc_info+0x22/0x30
[ 44.965000] __kasan_kmalloc+0xb7/0xc0
[ 44.965495] kmalloc_trace+0x4c/0xb0
[ 44.966119] krealloc_uaf+0xb0/0x2e0
[ 44.966722] kunit_try_run_case+0x126/0x290
[ 44.967645] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 44.968820] kthread+0x19e/0x1e0
[ 44.969858] ret_from_fork+0x41/0x70
[ 44.970591] ret_from_fork_asm+0x1b/0x30
[ 44.971638]
[ 44.972024] Freed by task 160:
[ 44.972934] kasan_save_stack+0x3c/0x60
[ 44.973836] kasan_set_track+0x29/0x40
[ 44.974573] kasan_save_free_info+0x2f/0x50
[ 44.975396] ____kasan_slab_free+0x172/0x1d0
[ 44.976457] __kasan_slab_free+0x16/0x20
[ 44.977304] __kmem_cache_free+0x190/0x310
[ 44.978312] kfree+0x7c/0x120
[ 44.979203] krealloc_uaf+0xd0/0x2e0
[ 44.979704] kunit_try_run_case+0x126/0x290
[ 44.981071] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 44.982350] kthread+0x19e/0x1e0
[ 44.982903] ret_from_fork+0x41/0x70
[ 44.983850] ret_from_fork_asm+0x1b/0x30
[ 44.984262]
[ 44.984407] The buggy address belongs to the object at ffff888100982800
[ 44.984407] which belongs to the cache kmalloc-256 of size 256
[ 44.987234] The buggy address is located 0 bytes inside of
[ 44.987234] freed 256-byte region [ffff888100982800, ffff888100982900)
[ 44.989419]
[ 44.990205] The buggy address belongs to the physical page:
[ 44.991391] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100982
[ 44.992965] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 44.994433] flags: 0x200000000000840(slab|head|node=0|zone=2)
[ 44.995519] page_type: 0xffffffff()
[ 44.996215] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[ 44.998236] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 45.000024] page dumped because: kasan: bad access detected
[ 45.001023]
[ 45.001278] Memory state around the buggy address:
[ 45.002374] ffff888100982700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.003713] ffff888100982780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.005674] >ffff888100982800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 45.006995] ^
[ 45.007332] ffff888100982880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 45.008172] ffff888100982900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.009296] ==================================================================
Home
[ 44.849615] ==================================================================
[ 44.851652] BUG: KASAN: slab-use-after-free in krealloc_uaf+0xf1/0x2e0
[ 44.852636] Read of size 1 at addr ffff888100982800 by task kunit_try_catch/160
[ 44.853713]
[ 44.854483] CPU: 1 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 44.856147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 44.857651] Call Trace:
[ 44.858389] <TASK>
[ 44.858843] dump_stack_lvl+0x4e/0x90
[ 44.859416] print_report+0xd2/0x660
[ 44.860159] ? __virt_addr_valid+0x156/0x1e0
[ 44.861156] ? kasan_complete_mode_report_info+0x64/0x200
[ 44.862301] kasan_report+0xff/0x140
[ 44.863046] ? krealloc_uaf+0xf1/0x2e0
[ 44.863556] ? krealloc_uaf+0xf1/0x2e0
[ 44.864542] ? krealloc_uaf+0xf1/0x2e0
[ 44.865298] __kasan_check_byte+0x3d/0x50
[ 44.865674] krealloc+0x35/0x140
[ 44.866564] krealloc_uaf+0xf1/0x2e0
[ 44.867408] ? __pfx_krealloc_uaf+0x10/0x10
[ 44.868303] ? finish_task_switch.isra.0+0xc8/0x3e0
[ 44.869316] ? __schedule+0x70b/0x1190
[ 44.870231] ? ktime_get_ts64+0x118/0x140
[ 44.870979] kunit_try_run_case+0x126/0x290
[ 44.871554] ? __pfx_kunit_try_run_case+0x10/0x10
[ 44.872308] ? __kasan_check_write+0x18/0x20
[ 44.873243] ? trace_preempt_on+0x20/0xa0
[ 44.874044] ? __kthread_parkme+0x4f/0xd0
[ 44.874956] ? preempt_count_sub+0x50/0x80
[ 44.875619] ? __pfx_kunit_try_run_case+0x10/0x10
[ 44.876470] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 44.877425] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 44.878425] kthread+0x19e/0x1e0
[ 44.879134] ? __pfx_kthread+0x10/0x10
[ 44.879899] ret_from_fork+0x41/0x70
[ 44.880454] ? __pfx_kthread+0x10/0x10
[ 44.881235] ret_from_fork_asm+0x1b/0x30
[ 44.882076] </TASK>
[ 44.882521]
[ 44.883158] Allocated by task 160:
[ 44.883710] kasan_save_stack+0x3c/0x60
[ 44.884501] kasan_set_track+0x29/0x40
[ 44.885222] kasan_save_alloc_info+0x22/0x30
[ 44.886287] __kasan_kmalloc+0xb7/0xc0
[ 44.886804] kmalloc_trace+0x4c/0xb0
[ 44.887821] krealloc_uaf+0xb0/0x2e0
[ 44.888330] kunit_try_run_case+0x126/0x290
[ 44.889086] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 44.890230] kthread+0x19e/0x1e0
[ 44.890493] ret_from_fork+0x41/0x70
[ 44.891370] ret_from_fork_asm+0x1b/0x30
[ 44.892225]
[ 44.892450] Freed by task 160:
[ 44.893204] kasan_save_stack+0x3c/0x60
[ 44.894093] kasan_set_track+0x29/0x40
[ 44.894673] kasan_save_free_info+0x2f/0x50
[ 44.895582] ____kasan_slab_free+0x172/0x1d0
[ 44.896229] __kasan_slab_free+0x16/0x20
[ 44.897493] __kmem_cache_free+0x190/0x310
[ 44.898134] kfree+0x7c/0x120
[ 44.898540] krealloc_uaf+0xd0/0x2e0
[ 44.898980] kunit_try_run_case+0x126/0x290
[ 44.899491] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 44.900309] kthread+0x19e/0x1e0
[ 44.900902] ret_from_fork+0x41/0x70
[ 44.901369] ret_from_fork_asm+0x1b/0x30
[ 44.902952]
[ 44.903437] The buggy address belongs to the object at ffff888100982800
[ 44.903437] which belongs to the cache kmalloc-256 of size 256
[ 44.905392] The buggy address is located 0 bytes inside of
[ 44.905392] freed 256-byte region [ffff888100982800, ffff888100982900)
[ 44.907209]
[ 44.907543] The buggy address belongs to the physical page:
[ 44.908495] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100982
[ 44.909651] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 44.911951] flags: 0x200000000000840(slab|head|node=0|zone=2)
[ 44.913016] page_type: 0xffffffff()
[ 44.913597] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[ 44.914456] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 44.915590] page dumped because: kasan: bad access detected
[ 44.916355]
[ 44.916768] Memory state around the buggy address:
[ 44.917746] ffff888100982700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 44.919312] ffff888100982780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 44.920483] >ffff888100982800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 44.921630] ^
[ 44.922442] ffff888100982880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 44.923623] ffff888100982900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 44.924649] ==================================================================
Home
[ 47.021375] ==================================================================
[ 47.023499] BUG: KASAN: slab-use-after-free in ksize_uaf+0x108/0x310
[ 47.024245] Read of size 1 at addr ffff88810242e800 by task kunit_try_catch/210
[ 47.024680]
[ 47.024835] CPU: 1 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 47.026093] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 47.027177] Call Trace:
[ 47.028090] <TASK>
[ 47.028840] dump_stack_lvl+0x4e/0x90
[ 47.029610] print_report+0xd2/0x660
[ 47.030478] ? __virt_addr_valid+0x156/0x1e0
[ 47.031189] ? kasan_complete_mode_report_info+0x64/0x200
[ 47.032068] kasan_report+0xff/0x140
[ 47.032636] ? ksize_uaf+0x108/0x310
[ 47.033357] ? ksize_uaf+0x108/0x310
[ 47.033934] __asan_load1+0x66/0x70
[ 47.034351] ksize_uaf+0x108/0x310
[ 47.034890] ? __pfx_ksize_uaf+0x10/0x10
[ 47.035688] ? __schedule+0x70b/0x1190
[ 47.036245] ? ktime_get_ts64+0x118/0x140
[ 47.036790] kunit_try_run_case+0x126/0x290
[ 47.037410] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.038262] ? __kasan_check_write+0x18/0x20
[ 47.038755] ? trace_preempt_on+0x20/0xa0
[ 47.039730] ? __kthread_parkme+0x4f/0xd0
[ 47.040345] ? preempt_count_sub+0x50/0x80
[ 47.040871] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.041510] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 47.042367] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.043201] kthread+0x19e/0x1e0
[ 47.043788] ? __pfx_kthread+0x10/0x10
[ 47.044614] ret_from_fork+0x41/0x70
[ 47.045196] ? __pfx_kthread+0x10/0x10
[ 47.045940] ret_from_fork_asm+0x1b/0x30
[ 47.046643] </TASK>
[ 47.047072]
[ 47.047378] Allocated by task 210:
[ 47.047846] kasan_save_stack+0x3c/0x60
[ 47.048572] kasan_set_track+0x29/0x40
[ 47.049269] kasan_save_alloc_info+0x22/0x30
[ 47.049980] __kasan_kmalloc+0xb7/0xc0
[ 47.050564] kmalloc_trace+0x4c/0xb0
[ 47.051146] ksize_uaf+0x9d/0x310
[ 47.051729] kunit_try_run_case+0x126/0x290
[ 47.052408] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.053284] kthread+0x19e/0x1e0
[ 47.053903] ret_from_fork+0x41/0x70
[ 47.054488] ret_from_fork_asm+0x1b/0x30
[ 47.055142]
[ 47.055418] Freed by task 210:
[ 47.055935] kasan_save_stack+0x3c/0x60
[ 47.056605] kasan_set_track+0x29/0x40
[ 47.057165] kasan_save_free_info+0x2f/0x50
[ 47.057978] ____kasan_slab_free+0x172/0x1d0
[ 47.058489] __kasan_slab_free+0x16/0x20
[ 47.059152] __kmem_cache_free+0x190/0x310
[ 47.059768] kfree+0x7c/0x120
[ 47.060317] ksize_uaf+0xbd/0x310
[ 47.060896] kunit_try_run_case+0x126/0x290
[ 47.061604] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.062407] kthread+0x19e/0x1e0
[ 47.063003] ret_from_fork+0x41/0x70
[ 47.063602] ret_from_fork_asm+0x1b/0x30
[ 47.064262]
[ 47.064578] The buggy address belongs to the object at ffff88810242e800
[ 47.064578] which belongs to the cache kmalloc-128 of size 128
[ 47.066077] The buggy address is located 0 bytes inside of
[ 47.066077] freed 128-byte region [ffff88810242e800, ffff88810242e880)
[ 47.067458]
[ 47.067843] The buggy address belongs to the physical page:
[ 47.068589] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10242e
[ 47.069782] flags: 0x200000000000800(slab|node=0|zone=2)
[ 47.070495] page_type: 0xffffffff()
[ 47.071428] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[ 47.072432] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 47.073336] page dumped because: kasan: bad access detected
[ 47.074021]
[ 47.074277] Memory state around the buggy address:
[ 47.074883] ffff88810242e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 47.075725] ffff88810242e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.076689] >ffff88810242e800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 47.077510] ^
[ 47.077989] ffff88810242e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.078994] ffff88810242e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.079935] ==================================================================
Home
[ 47.081397] ==================================================================
[ 47.083353] BUG: KASAN: slab-use-after-free in ksize_uaf+0x140/0x310
[ 47.084178] Read of size 1 at addr ffff88810242e878 by task kunit_try_catch/210
[ 47.085368]
[ 47.085780] CPU: 1 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 47.087094] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 47.088214] Call Trace:
[ 47.088618] <TASK>
[ 47.089167] dump_stack_lvl+0x4e/0x90
[ 47.089822] print_report+0xd2/0x660
[ 47.090406] ? __virt_addr_valid+0x156/0x1e0
[ 47.091135] ? kasan_complete_mode_report_info+0x64/0x200
[ 47.091941] kasan_report+0xff/0x140
[ 47.092434] ? ksize_uaf+0x140/0x310
[ 47.093137] ? ksize_uaf+0x140/0x310
[ 47.094343] __asan_load1+0x66/0x70
[ 47.094935] ksize_uaf+0x140/0x310
[ 47.095731] ? __pfx_ksize_uaf+0x10/0x10
[ 47.096330] ? __schedule+0x70b/0x1190
[ 47.097024] ? ktime_get_ts64+0x118/0x140
[ 47.097630] kunit_try_run_case+0x126/0x290
[ 47.098259] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.099250] ? __kasan_check_write+0x18/0x20
[ 47.100286] ? trace_preempt_on+0x20/0xa0
[ 47.100866] ? __kthread_parkme+0x4f/0xd0
[ 47.101489] ? preempt_count_sub+0x50/0x80
[ 47.103084] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.103973] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 47.105086] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.106366] kthread+0x19e/0x1e0
[ 47.107105] ? __pfx_kthread+0x10/0x10
[ 47.107690] ret_from_fork+0x41/0x70
[ 47.108495] ? __pfx_kthread+0x10/0x10
[ 47.109423] ret_from_fork_asm+0x1b/0x30
[ 47.110270] </TASK>
[ 47.110682]
[ 47.110968] Allocated by task 210:
[ 47.112164] kasan_save_stack+0x3c/0x60
[ 47.112959] kasan_set_track+0x29/0x40
[ 47.113447] kasan_save_alloc_info+0x22/0x30
[ 47.114077] __kasan_kmalloc+0xb7/0xc0
[ 47.115030] kmalloc_trace+0x4c/0xb0
[ 47.115681] ksize_uaf+0x9d/0x310
[ 47.116111] kunit_try_run_case+0x126/0x290
[ 47.116676] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.117314] kthread+0x19e/0x1e0
[ 47.118766] ret_from_fork+0x41/0x70
[ 47.119497] ret_from_fork_asm+0x1b/0x30
[ 47.120217]
[ 47.120589] Freed by task 210:
[ 47.121199] kasan_save_stack+0x3c/0x60
[ 47.121793] kasan_set_track+0x29/0x40
[ 47.122384] kasan_save_free_info+0x2f/0x50
[ 47.122969] ____kasan_slab_free+0x172/0x1d0
[ 47.123954] __kasan_slab_free+0x16/0x20
[ 47.124536] __kmem_cache_free+0x190/0x310
[ 47.125195] kfree+0x7c/0x120
[ 47.125966] ksize_uaf+0xbd/0x310
[ 47.126480] kunit_try_run_case+0x126/0x290
[ 47.126994] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.128316] kthread+0x19e/0x1e0
[ 47.128855] ret_from_fork+0x41/0x70
[ 47.129680] ret_from_fork_asm+0x1b/0x30
[ 47.130646]
[ 47.131128] The buggy address belongs to the object at ffff88810242e800
[ 47.131128] which belongs to the cache kmalloc-128 of size 128
[ 47.132978] The buggy address is located 120 bytes inside of
[ 47.132978] freed 128-byte region [ffff88810242e800, ffff88810242e880)
[ 47.135673]
[ 47.135928] The buggy address belongs to the physical page:
[ 47.136605] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10242e
[ 47.137789] flags: 0x200000000000800(slab|node=0|zone=2)
[ 47.138877] page_type: 0xffffffff()
[ 47.139490] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[ 47.140496] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 47.141393] page dumped because: kasan: bad access detected
[ 47.142552]
[ 47.142890] Memory state around the buggy address:
[ 47.143955] ffff88810242e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 47.144818] ffff88810242e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.146191] >ffff88810242e800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 47.147655] ^
[ 47.148504] ffff88810242e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.149723] ffff88810242e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.150588] ==================================================================
Home
[ 46.950497] ==================================================================
[ 46.951759] BUG: KASAN: slab-use-after-free in ksize_uaf+0xd4/0x310
[ 46.952892] Read of size 1 at addr ffff88810242e800 by task kunit_try_catch/210
[ 46.953662]
[ 46.954108] CPU: 1 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 46.955322] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 46.956545] Call Trace:
[ 46.956925] <TASK>
[ 46.957697] dump_stack_lvl+0x4e/0x90
[ 46.958286] print_report+0xd2/0x660
[ 46.959361] ? __virt_addr_valid+0x156/0x1e0
[ 46.960276] ? kasan_complete_mode_report_info+0x64/0x200
[ 46.961385] kasan_report+0xff/0x140
[ 46.962156] ? ksize_uaf+0xd4/0x310
[ 46.962611] ? ksize_uaf+0xd4/0x310
[ 46.963592] ? ksize_uaf+0xd4/0x310
[ 46.964248] __kasan_check_byte+0x3d/0x50
[ 46.965328] ksize+0x20/0x60
[ 46.966079] ksize_uaf+0xd4/0x310
[ 46.966665] ? __pfx_ksize_uaf+0x10/0x10
[ 46.967471] ? __schedule+0x70b/0x1190
[ 46.968275] ? ktime_get_ts64+0x118/0x140
[ 46.969321] kunit_try_run_case+0x126/0x290
[ 46.970053] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.970918] ? __kasan_check_write+0x18/0x20
[ 46.971503] ? trace_preempt_on+0x20/0xa0
[ 46.972662] ? __kthread_parkme+0x4f/0xd0
[ 46.973514] ? preempt_count_sub+0x50/0x80
[ 46.974317] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.975265] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 46.976176] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 46.977198] kthread+0x19e/0x1e0
[ 46.978056] ? __pfx_kthread+0x10/0x10
[ 46.979032] ret_from_fork+0x41/0x70
[ 46.979816] ? __pfx_kthread+0x10/0x10
[ 46.980401] ret_from_fork_asm+0x1b/0x30
[ 46.981476] </TASK>
[ 46.981894]
[ 46.982133] Allocated by task 210:
[ 46.982729] kasan_save_stack+0x3c/0x60
[ 46.983316] kasan_set_track+0x29/0x40
[ 46.983829] kasan_save_alloc_info+0x22/0x30
[ 46.984364] __kasan_kmalloc+0xb7/0xc0
[ 46.984877] kmalloc_trace+0x4c/0xb0
[ 46.986172] ksize_uaf+0x9d/0x310
[ 46.986822] kunit_try_run_case+0x126/0x290
[ 46.987367] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 46.987973] kthread+0x19e/0x1e0
[ 46.988976] ret_from_fork+0x41/0x70
[ 46.989601] ret_from_fork_asm+0x1b/0x30
[ 46.990139]
[ 46.990507] Freed by task 210:
[ 46.990885] kasan_save_stack+0x3c/0x60
[ 46.991815] kasan_set_track+0x29/0x40
[ 46.992309] kasan_save_free_info+0x2f/0x50
[ 46.993023] ____kasan_slab_free+0x172/0x1d0
[ 46.993670] __kasan_slab_free+0x16/0x20
[ 46.994310] __kmem_cache_free+0x190/0x310
[ 46.995069] kfree+0x7c/0x120
[ 46.995625] ksize_uaf+0xbd/0x310
[ 46.996425] kunit_try_run_case+0x126/0x290
[ 46.997369] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 46.998289] kthread+0x19e/0x1e0
[ 46.998723] ret_from_fork+0x41/0x70
[ 46.999366] ret_from_fork_asm+0x1b/0x30
[ 47.000004]
[ 47.000483] The buggy address belongs to the object at ffff88810242e800
[ 47.000483] which belongs to the cache kmalloc-128 of size 128
[ 47.001975] The buggy address is located 0 bytes inside of
[ 47.001975] freed 128-byte region [ffff88810242e800, ffff88810242e880)
[ 47.003221]
[ 47.003796] The buggy address belongs to the physical page:
[ 47.004475] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10242e
[ 47.005855] flags: 0x200000000000800(slab|node=0|zone=2)
[ 47.006837] page_type: 0xffffffff()
[ 47.007304] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[ 47.008412] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 47.009370] page dumped because: kasan: bad access detected
[ 47.011000]
[ 47.011240] Memory state around the buggy address:
[ 47.011695] ffff88810242e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 47.013475] ffff88810242e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.014441] >ffff88810242e800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 47.015549] ^
[ 47.016744] ffff88810242e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.017809] ffff88810242e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.019437] ==================================================================
Home
[ 49.321815] ==================================================================
[ 49.323234] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x27/0x40
[ 49.324116] Read of size 4 at addr ffff888102857980 by task swapper/0/0
[ 49.325222]
[ 49.325606] CPU: 0 PID: 0 Comm: swapper/0 Tainted: G B N 6.6.74-rc1 #1
[ 49.326668] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 49.327940] Call Trace:
[ 49.328790] <IRQ>
[ 49.329300] dump_stack_lvl+0x4e/0x90
[ 49.330300] print_report+0xd2/0x660
[ 49.330974] ? __virt_addr_valid+0x156/0x1e0
[ 49.331812] ? kasan_complete_mode_report_info+0x64/0x200
[ 49.332740] kasan_report+0xff/0x140
[ 49.333406] ? rcu_uaf_reclaim+0x27/0x40
[ 49.334078] ? rcu_uaf_reclaim+0x27/0x40
[ 49.334848] ? __pfx_rcu_uaf_reclaim+0x10/0x10
[ 49.335650] __asan_load4+0x85/0xb0
[ 49.336374] rcu_uaf_reclaim+0x27/0x40
[ 49.337107] rcu_core+0x4be/0x1020
[ 49.337603] ? rcu_core+0x3ef/0x1020
[ 49.338117] ? __pfx_rcu_core+0x10/0x10
[ 49.339054] ? __pfx_read_tsc+0x10/0x10
[ 49.339566] ? ktime_get+0x55/0xc0
[ 49.339999] ? handle_softirqs+0x12c/0x520
[ 49.340731] rcu_core_si+0x12/0x20
[ 49.341438] handle_softirqs+0x195/0x520
[ 49.342351] ? __pfx_handle_softirqs+0x10/0x10
[ 49.342952] irq_exit_rcu+0x92/0xb0
[ 49.343711] sysvec_apic_timer_interrupt+0x80/0xa0
[ 49.344684] </IRQ>
[ 49.344969] <TASK>
[ 49.345675] asm_sysvec_apic_timer_interrupt+0x1f/0x30
[ 49.346916] RIP: 0010:default_idle+0xf/0x20
[ 49.347697] Code: 4c 01 c7 4c 29 c2 e9 72 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d e3 e3 28 00 fb f4 <fa> c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90
[ 49.349661] RSP: 0000:ffffffff93407df0 EFLAGS: 00010216
[ 49.350596] RAX: ffff88815b4342c0 RBX: ffffffff93418540 RCX: ffffffff923c96c8
[ 49.351689] RDX: ffffed102b686859 RSI: 0000000000000004 RDI: 000000000000b41c
[ 49.352808] RBP: ffffffff93407df8 R08: 0000000000000001 R09: ffffed102b686858
[ 49.353572] R10: ffff88815b4342c3 R11: ffffffff9060325b R12: 0000000000000000
[ 49.354609] R13: ffffffff93e158d0 R14: 0000000000000000 R15: ffffffff93418540
[ 49.355688] ? ret_from_fork_asm+0x1b/0x30
[ 49.356242] ? ct_kernel_exit.constprop.0+0xa8/0xd0
[ 49.356743] ? arch_cpu_idle+0xd/0x20
[ 49.357298] default_idle_call+0x42/0x70
[ 49.357880] do_idle+0x2ba/0x310
[ 49.358640] ? __pfx_do_idle+0x10/0x10
[ 49.359142] ? trace_preempt_on+0x20/0xa0
[ 49.359610] ? schedule+0xa7/0x130
[ 49.360228] ? preempt_count_sub+0x50/0x80
[ 49.360793] cpu_startup_entry+0x3c/0x40
[ 49.361714] rest_init+0xe9/0xf0
[ 49.362212] arch_call_rest_init+0x17/0x50
[ 49.362863] start_kernel+0x2e3/0x3c0
[ 49.363485] x86_64_start_reservations+0x1c/0x30
[ 49.364102] x86_64_start_kernel+0xcf/0xe0
[ 49.364931] secondary_startup_64_no_verify+0x178/0x17b
[ 49.365729] </TASK>
[ 49.366110]
[ 49.366583] Allocated by task 230:
[ 49.367241] kasan_save_stack+0x3c/0x60
[ 49.367725] kasan_set_track+0x29/0x40
[ 49.368627] kasan_save_alloc_info+0x22/0x30
[ 49.369156] __kasan_kmalloc+0xb7/0xc0
[ 49.369946] kmalloc_trace+0x4c/0xb0
[ 49.371022] rcu_uaf+0x9b/0x1e0
[ 49.371632] kunit_try_run_case+0x126/0x290
[ 49.372291] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.373016] kthread+0x19e/0x1e0
[ 49.373458] ret_from_fork+0x41/0x70
[ 49.373954] ret_from_fork_asm+0x1b/0x30
[ 49.374589]
[ 49.374893] Freed by task 0:
[ 49.375307] kasan_save_stack+0x3c/0x60
[ 49.375928] kasan_set_track+0x29/0x40
[ 49.376401] kasan_save_free_info+0x2f/0x50
[ 49.377119] ____kasan_slab_free+0x172/0x1d0
[ 49.377741] __kasan_slab_free+0x16/0x20
[ 49.378321] __kmem_cache_free+0x190/0x310
[ 49.378950] kfree+0x7c/0x120
[ 49.379492] rcu_uaf_reclaim+0x1f/0x40
[ 49.380120] rcu_core+0x4be/0x1020
[ 49.380584] rcu_core_si+0x12/0x20
[ 49.381255] handle_softirqs+0x195/0x520
[ 49.381808] irq_exit_rcu+0x92/0xb0
[ 49.382330] sysvec_apic_timer_interrupt+0x80/0xa0
[ 49.382934] asm_sysvec_apic_timer_interrupt+0x1f/0x30
[ 49.383754]
[ 49.384164] Last potentially related work creation:
[ 49.384655] kasan_save_stack+0x3c/0x60
[ 49.385316] __kasan_record_aux_stack+0xb3/0xd0
[ 49.386098] kasan_record_aux_stack_noalloc+0xf/0x20
[ 49.386760] __call_rcu_common.constprop.0+0x4c/0x5e0
[ 49.387461] call_rcu+0x12/0x20
[ 49.387893] rcu_uaf+0xdd/0x1e0
[ 49.388401] kunit_try_run_case+0x126/0x290
[ 49.388991] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.389843] kthread+0x19e/0x1e0
[ 49.390347] ret_from_fork+0x41/0x70
[ 49.391021] ret_from_fork_asm+0x1b/0x30
[ 49.391718]
[ 49.392045] The buggy address belongs to the object at ffff888102857980
[ 49.392045] which belongs to the cache kmalloc-32 of size 32
[ 49.393328] The buggy address is located 0 bytes inside of
[ 49.393328] freed 32-byte region [ffff888102857980, ffff8881028579a0)
[ 49.394692]
[ 49.395031] The buggy address belongs to the physical page:
[ 49.395668] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102857
[ 49.396603] flags: 0x200000000000800(slab|node=0|zone=2)
[ 49.397323] page_type: 0xffffffff()
[ 49.397970] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[ 49.398769] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 49.399719] page dumped because: kasan: bad access detected
[ 49.400359]
[ 49.400713] Memory state around the buggy address:
[ 49.401329] ffff888102857880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 49.402316] ffff888102857900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 49.403111] >ffff888102857980: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.404157] ^
[ 49.404554] ffff888102857a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.405425] ffff888102857a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.406319] ==================================================================
Home
[ 47.558242] ==================================================================
[ 47.559630] BUG: KASAN: slab-use-after-free in strchr+0x18/0x60
[ 47.561136] Read of size 1 at addr ffff888102a1d050 by task kunit_try_catch/222
[ 47.563356]
[ 47.563782] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 47.564622] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 47.565818] Call Trace:
[ 47.566426] <TASK>
[ 47.566762] dump_stack_lvl+0x4e/0x90
[ 47.567389] print_report+0xd2/0x660
[ 47.567882] ? __virt_addr_valid+0x156/0x1e0
[ 47.569068] ? kasan_complete_mode_report_info+0x64/0x200
[ 47.570332] kasan_report+0xff/0x140
[ 47.570868] ? strchr+0x18/0x60
[ 47.571576] ? strchr+0x18/0x60
[ 47.572097] __asan_load1+0x66/0x70
[ 47.572886] strchr+0x18/0x60
[ 47.573555] kasan_strings+0xdf/0x510
[ 47.574269] ? __pfx_kasan_strings+0x10/0x10
[ 47.575179] ? __pfx_kasan_strings+0x10/0x10
[ 47.575785] ? kunit_try_run_case+0x11b/0x290
[ 47.576644] kunit_try_run_case+0x126/0x290
[ 47.577354] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.578510] ? __kasan_check_write+0x18/0x20
[ 47.579375] ? trace_preempt_on+0x20/0xa0
[ 47.579875] ? __kthread_parkme+0x4f/0xd0
[ 47.580548] ? preempt_count_sub+0x50/0x80
[ 47.581593] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.582584] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 47.583392] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.584442] kthread+0x19e/0x1e0
[ 47.585500] ? __pfx_kthread+0x10/0x10
[ 47.586404] ret_from_fork+0x41/0x70
[ 47.587276] ? __pfx_kthread+0x10/0x10
[ 47.587801] ret_from_fork_asm+0x1b/0x30
[ 47.588387] </TASK>
[ 47.588694]
[ 47.589329] Allocated by task 222:
[ 47.589958] kasan_save_stack+0x3c/0x60
[ 47.590753] kasan_set_track+0x29/0x40
[ 47.591450] kasan_save_alloc_info+0x22/0x30
[ 47.592298] __kasan_kmalloc+0xb7/0xc0
[ 47.593003] kmalloc_trace+0x4c/0xb0
[ 47.593475] kasan_strings+0x9f/0x510
[ 47.593952] kunit_try_run_case+0x126/0x290
[ 47.595080] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.595899] kthread+0x19e/0x1e0
[ 47.596611] ret_from_fork+0x41/0x70
[ 47.597497] ret_from_fork_asm+0x1b/0x30
[ 47.598102]
[ 47.598363] Freed by task 222:
[ 47.598776] kasan_save_stack+0x3c/0x60
[ 47.599999] kasan_set_track+0x29/0x40
[ 47.600584] kasan_save_free_info+0x2f/0x50
[ 47.601218] ____kasan_slab_free+0x172/0x1d0
[ 47.601762] __kasan_slab_free+0x16/0x20
[ 47.602845] __kmem_cache_free+0x190/0x310
[ 47.603489] kfree+0x7c/0x120
[ 47.604154] kasan_strings+0xc3/0x510
[ 47.604909] kunit_try_run_case+0x126/0x290
[ 47.605548] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.606353] kthread+0x19e/0x1e0
[ 47.606891] ret_from_fork+0x41/0x70
[ 47.607420] ret_from_fork_asm+0x1b/0x30
[ 47.607978]
[ 47.608319] The buggy address belongs to the object at ffff888102a1d040
[ 47.608319] which belongs to the cache kmalloc-32 of size 32
[ 47.609712] The buggy address is located 16 bytes inside of
[ 47.609712] freed 32-byte region [ffff888102a1d040, ffff888102a1d060)
[ 47.611162]
[ 47.611502] The buggy address belongs to the physical page:
[ 47.612150] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1d
[ 47.613322] flags: 0x200000000000800(slab|node=0|zone=2)
[ 47.614138] page_type: 0xffffffff()
[ 47.614842] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[ 47.615811] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 47.616815] page dumped because: kasan: bad access detected
[ 47.617166]
[ 47.617310] Memory state around the buggy address:
[ 47.617620] ffff888102a1cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.618419] ffff888102a1cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.619948] >ffff888102a1d000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 47.620766] ^
[ 47.621609] ffff888102a1d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.622552] ffff888102a1d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.623691] ==================================================================
Home
[ 47.700152] ==================================================================
[ 47.700867] BUG: KASAN: slab-use-after-free in strcmp+0x26/0x60
[ 47.701983] Read of size 1 at addr ffff888102a1d050 by task kunit_try_catch/222
[ 47.703907]
[ 47.704778] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 47.705760] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 47.707502] Call Trace:
[ 47.708580] <TASK>
[ 47.709247] dump_stack_lvl+0x4e/0x90
[ 47.709939] print_report+0xd2/0x660
[ 47.710459] ? __virt_addr_valid+0x156/0x1e0
[ 47.711249] ? kasan_complete_mode_report_info+0x64/0x200
[ 47.712020] kasan_report+0xff/0x140
[ 47.712419] ? strcmp+0x26/0x60
[ 47.712914] ? strcmp+0x26/0x60
[ 47.713389] __asan_load1+0x66/0x70
[ 47.713963] strcmp+0x26/0x60
[ 47.714449] kasan_strings+0x161/0x510
[ 47.714966] ? __pfx_kasan_strings+0x10/0x10
[ 47.715637] ? __pfx_kasan_strings+0x10/0x10
[ 47.716775] ? kunit_try_run_case+0x11b/0x290
[ 47.717462] kunit_try_run_case+0x126/0x290
[ 47.718111] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.718755] ? __kasan_check_write+0x18/0x20
[ 47.719554] ? trace_preempt_on+0x20/0xa0
[ 47.720455] ? __kthread_parkme+0x4f/0xd0
[ 47.721352] ? preempt_count_sub+0x50/0x80
[ 47.722566] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.723322] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 47.724343] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.725173] kthread+0x19e/0x1e0
[ 47.725446] ? __pfx_kthread+0x10/0x10
[ 47.726407] ret_from_fork+0x41/0x70
[ 47.726857] ? __pfx_kthread+0x10/0x10
[ 47.727364] ret_from_fork_asm+0x1b/0x30
[ 47.728097] </TASK>
[ 47.728370]
[ 47.728696] Allocated by task 222:
[ 47.729601] kasan_save_stack+0x3c/0x60
[ 47.730299] kasan_set_track+0x29/0x40
[ 47.730794] kasan_save_alloc_info+0x22/0x30
[ 47.731363] __kasan_kmalloc+0xb7/0xc0
[ 47.731845] kmalloc_trace+0x4c/0xb0
[ 47.732324] kasan_strings+0x9f/0x510
[ 47.732936] kunit_try_run_case+0x126/0x290
[ 47.733463] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.734549] kthread+0x19e/0x1e0
[ 47.735119] ret_from_fork+0x41/0x70
[ 47.735742] ret_from_fork_asm+0x1b/0x30
[ 47.736660]
[ 47.737024] Freed by task 222:
[ 47.737474] kasan_save_stack+0x3c/0x60
[ 47.738829] kasan_set_track+0x29/0x40
[ 47.739368] kasan_save_free_info+0x2f/0x50
[ 47.740115] ____kasan_slab_free+0x172/0x1d0
[ 47.740621] __kasan_slab_free+0x16/0x20
[ 47.741209] __kmem_cache_free+0x190/0x310
[ 47.741961] kfree+0x7c/0x120
[ 47.742595] kasan_strings+0xc3/0x510
[ 47.743651] kunit_try_run_case+0x126/0x290
[ 47.744305] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.745214] kthread+0x19e/0x1e0
[ 47.745768] ret_from_fork+0x41/0x70
[ 47.746464] ret_from_fork_asm+0x1b/0x30
[ 47.747791]
[ 47.748210] The buggy address belongs to the object at ffff888102a1d040
[ 47.748210] which belongs to the cache kmalloc-32 of size 32
[ 47.750337] The buggy address is located 16 bytes inside of
[ 47.750337] freed 32-byte region [ffff888102a1d040, ffff888102a1d060)
[ 47.751978]
[ 47.753045] The buggy address belongs to the physical page:
[ 47.753658] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1d
[ 47.754765] flags: 0x200000000000800(slab|node=0|zone=2)
[ 47.755408] page_type: 0xffffffff()
[ 47.756448] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[ 47.757389] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 47.758209] page dumped because: kasan: bad access detected
[ 47.758792]
[ 47.759294] Memory state around the buggy address:
[ 47.760615] ffff888102a1cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.761709] ffff888102a1cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.762487] >ffff888102a1d000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 47.763224] ^
[ 47.764328] ffff888102a1d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.765515] ffff888102a1d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.767148] ==================================================================
Home
[ 47.834067] ==================================================================
[ 47.835685] BUG: KASAN: slab-use-after-free in strlen+0x13/0x50
[ 47.836244] Read of size 1 at addr ffff888102a1d050 by task kunit_try_catch/222
[ 47.837481]
[ 47.837782] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 47.839285] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 47.840394] Call Trace:
[ 47.840785] <TASK>
[ 47.841117] dump_stack_lvl+0x4e/0x90
[ 47.841717] print_report+0xd2/0x660
[ 47.842249] ? __virt_addr_valid+0x156/0x1e0
[ 47.842846] ? kasan_complete_mode_report_info+0x64/0x200
[ 47.843478] kasan_report+0xff/0x140
[ 47.844251] ? strlen+0x13/0x50
[ 47.844757] ? strlen+0x13/0x50
[ 47.845388] __asan_load1+0x66/0x70
[ 47.846044] strlen+0x13/0x50
[ 47.846440] kasan_strings+0x1dc/0x510
[ 47.846839] ? __pfx_kasan_strings+0x10/0x10
[ 47.847626] ? __pfx_kasan_strings+0x10/0x10
[ 47.848352] ? kunit_try_run_case+0x11b/0x290
[ 47.849013] kunit_try_run_case+0x126/0x290
[ 47.849717] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.850743] ? __kasan_check_write+0x18/0x20
[ 47.851449] ? trace_preempt_on+0x20/0xa0
[ 47.852499] ? __kthread_parkme+0x4f/0xd0
[ 47.853066] ? preempt_count_sub+0x50/0x80
[ 47.854230] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.854776] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 47.855477] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.856327] kthread+0x19e/0x1e0
[ 47.856803] ? __pfx_kthread+0x10/0x10
[ 47.857393] ret_from_fork+0x41/0x70
[ 47.858061] ? __pfx_kthread+0x10/0x10
[ 47.859241] ret_from_fork_asm+0x1b/0x30
[ 47.859890] </TASK>
[ 47.860313]
[ 47.860665] Allocated by task 222:
[ 47.861401] kasan_save_stack+0x3c/0x60
[ 47.862249] kasan_set_track+0x29/0x40
[ 47.863727] kasan_save_alloc_info+0x22/0x30
[ 47.864569] __kasan_kmalloc+0xb7/0xc0
[ 47.865149] kmalloc_trace+0x4c/0xb0
[ 47.866336] kasan_strings+0x9f/0x510
[ 47.866912] kunit_try_run_case+0x126/0x290
[ 47.867833] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.868832] kthread+0x19e/0x1e0
[ 47.869405] ret_from_fork+0x41/0x70
[ 47.869918] ret_from_fork_asm+0x1b/0x30
[ 47.870423]
[ 47.871392] Freed by task 222:
[ 47.872227] kasan_save_stack+0x3c/0x60
[ 47.872997] kasan_set_track+0x29/0x40
[ 47.873743] kasan_save_free_info+0x2f/0x50
[ 47.875159] ____kasan_slab_free+0x172/0x1d0
[ 47.875573] __kasan_slab_free+0x16/0x20
[ 47.875955] __kmem_cache_free+0x190/0x310
[ 47.876348] kfree+0x7c/0x120
[ 47.877894] kasan_strings+0xc3/0x510
[ 47.878858] kunit_try_run_case+0x126/0x290
[ 47.880124] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.883233] kthread+0x19e/0x1e0
[ 47.883626] ret_from_fork+0x41/0x70
[ 47.883999] ret_from_fork_asm+0x1b/0x30
[ 47.884378]
[ 47.887069] The buggy address belongs to the object at ffff888102a1d040
[ 47.887069] which belongs to the cache kmalloc-32 of size 32
[ 47.890295] The buggy address is located 16 bytes inside of
[ 47.890295] freed 32-byte region [ffff888102a1d040, ffff888102a1d060)
[ 47.893020]
[ 47.893266] The buggy address belongs to the physical page:
[ 47.894429] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1d
[ 47.895444] flags: 0x200000000000800(slab|node=0|zone=2)
[ 47.896298] page_type: 0xffffffff()
[ 47.897073] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[ 47.898214] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 47.899362] page dumped because: kasan: bad access detected
[ 47.900190]
[ 47.900627] Memory state around the buggy address:
[ 47.901214] ffff888102a1cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.902478] ffff888102a1cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.903263] >ffff888102a1d000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 47.904689] ^
[ 47.905422] ffff888102a1d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.906274] ffff888102a1d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.907691] ==================================================================
Home
[ 47.909288] ==================================================================
[ 47.910181] BUG: KASAN: slab-use-after-free in strnlen+0x31/0x50
[ 47.912171] Read of size 1 at addr ffff888102a1d050 by task kunit_try_catch/222
[ 47.913370]
[ 47.913725] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 47.915325] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 47.916774] Call Trace:
[ 47.917210] <TASK>
[ 47.917644] dump_stack_lvl+0x4e/0x90
[ 47.918364] print_report+0xd2/0x660
[ 47.919563] ? __virt_addr_valid+0x156/0x1e0
[ 47.920825] ? kasan_complete_mode_report_info+0x64/0x200
[ 47.921609] kasan_report+0xff/0x140
[ 47.921973] ? strnlen+0x31/0x50
[ 47.923205] ? strnlen+0x31/0x50
[ 47.923874] __asan_load1+0x66/0x70
[ 47.924572] strnlen+0x31/0x50
[ 47.925487] kasan_strings+0x21b/0x510
[ 47.926479] ? __pfx_kasan_strings+0x10/0x10
[ 47.927207] ? __pfx_kasan_strings+0x10/0x10
[ 47.927823] ? kunit_try_run_case+0x11b/0x290
[ 47.929311] kunit_try_run_case+0x126/0x290
[ 47.930071] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.931105] ? __kasan_check_write+0x18/0x20
[ 47.931860] ? trace_preempt_on+0x20/0xa0
[ 47.932382] ? __kthread_parkme+0x4f/0xd0
[ 47.933680] ? preempt_count_sub+0x50/0x80
[ 47.934439] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.935155] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 47.936035] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.937312] kthread+0x19e/0x1e0
[ 47.937767] ? __pfx_kthread+0x10/0x10
[ 47.938300] ret_from_fork+0x41/0x70
[ 47.939032] ? __pfx_kthread+0x10/0x10
[ 47.940636] ret_from_fork_asm+0x1b/0x30
[ 47.941208] </TASK>
[ 47.941568]
[ 47.941820] Allocated by task 222:
[ 47.942611] kasan_save_stack+0x3c/0x60
[ 47.944100] kasan_set_track+0x29/0x40
[ 47.944670] kasan_save_alloc_info+0x22/0x30
[ 47.945427] __kasan_kmalloc+0xb7/0xc0
[ 47.946228] kmalloc_trace+0x4c/0xb0
[ 47.946775] kasan_strings+0x9f/0x510
[ 47.947268] kunit_try_run_case+0x126/0x290
[ 47.947828] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.948600] kthread+0x19e/0x1e0
[ 47.949743] ret_from_fork+0x41/0x70
[ 47.950591] ret_from_fork_asm+0x1b/0x30
[ 47.951552]
[ 47.951772] Freed by task 222:
[ 47.952595] kasan_save_stack+0x3c/0x60
[ 47.953757] kasan_set_track+0x29/0x40
[ 47.954644] kasan_save_free_info+0x2f/0x50
[ 47.955233] ____kasan_slab_free+0x172/0x1d0
[ 47.955984] __kasan_slab_free+0x16/0x20
[ 47.956878] __kmem_cache_free+0x190/0x310
[ 47.957575] kfree+0x7c/0x120
[ 47.958231] kasan_strings+0xc3/0x510
[ 47.959321] kunit_try_run_case+0x126/0x290
[ 47.960099] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.960749] kthread+0x19e/0x1e0
[ 47.961187] ret_from_fork+0x41/0x70
[ 47.962384] ret_from_fork_asm+0x1b/0x30
[ 47.963815]
[ 47.964282] The buggy address belongs to the object at ffff888102a1d040
[ 47.964282] which belongs to the cache kmalloc-32 of size 32
[ 47.965468] The buggy address is located 16 bytes inside of
[ 47.965468] freed 32-byte region [ffff888102a1d040, ffff888102a1d060)
[ 47.967180]
[ 47.967533] The buggy address belongs to the physical page:
[ 47.968887] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1d
[ 47.970512] flags: 0x200000000000800(slab|node=0|zone=2)
[ 47.971052] page_type: 0xffffffff()
[ 47.971308] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[ 47.971867] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 47.973509] page dumped because: kasan: bad access detected
[ 47.974469]
[ 47.974968] Memory state around the buggy address:
[ 47.975738] ffff888102a1cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.977205] ffff888102a1cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.978292] >ffff888102a1d000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 47.979430] ^
[ 47.981219] ffff888102a1d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.982122] ffff888102a1d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.983063] ==================================================================
Home
[ 47.626505] ==================================================================
[ 47.627593] BUG: KASAN: slab-use-after-free in strrchr+0x1e/0x40
[ 47.628386] Read of size 1 at addr ffff888102a1d050 by task kunit_try_catch/222
[ 47.629338]
[ 47.629604] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 47.631654] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 47.633063] Call Trace:
[ 47.633780] <TASK>
[ 47.634696] dump_stack_lvl+0x4e/0x90
[ 47.635511] print_report+0xd2/0x660
[ 47.636419] ? __virt_addr_valid+0x156/0x1e0
[ 47.637409] ? kasan_complete_mode_report_info+0x64/0x200
[ 47.638706] kasan_report+0xff/0x140
[ 47.639258] ? strrchr+0x1e/0x40
[ 47.639825] ? strrchr+0x1e/0x40
[ 47.640375] __asan_load1+0x66/0x70
[ 47.641021] strrchr+0x1e/0x40
[ 47.641636] kasan_strings+0x11f/0x510
[ 47.642766] ? __pfx_kasan_strings+0x10/0x10
[ 47.643384] ? __pfx_kasan_strings+0x10/0x10
[ 47.643959] ? kunit_try_run_case+0x11b/0x290
[ 47.644894] kunit_try_run_case+0x126/0x290
[ 47.645601] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.646680] ? __kasan_check_write+0x18/0x20
[ 47.647432] ? trace_preempt_on+0x20/0xa0
[ 47.648103] ? __kthread_parkme+0x4f/0xd0
[ 47.648758] ? preempt_count_sub+0x50/0x80
[ 47.649401] ? __pfx_kunit_try_run_case+0x10/0x10
[ 47.650331] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 47.651471] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.652379] kthread+0x19e/0x1e0
[ 47.652944] ? __pfx_kthread+0x10/0x10
[ 47.653569] ret_from_fork+0x41/0x70
[ 47.654741] ? __pfx_kthread+0x10/0x10
[ 47.655352] ret_from_fork_asm+0x1b/0x30
[ 47.656010] </TASK>
[ 47.656418]
[ 47.656685] Allocated by task 222:
[ 47.657429] kasan_save_stack+0x3c/0x60
[ 47.658516] kasan_set_track+0x29/0x40
[ 47.659785] kasan_save_alloc_info+0x22/0x30
[ 47.660495] __kasan_kmalloc+0xb7/0xc0
[ 47.661268] kmalloc_trace+0x4c/0xb0
[ 47.662260] kasan_strings+0x9f/0x510
[ 47.663056] kunit_try_run_case+0x126/0x290
[ 47.663923] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.664714] kthread+0x19e/0x1e0
[ 47.665390] ret_from_fork+0x41/0x70
[ 47.666242] ret_from_fork_asm+0x1b/0x30
[ 47.667416]
[ 47.668186] Freed by task 222:
[ 47.668683] kasan_save_stack+0x3c/0x60
[ 47.669537] kasan_set_track+0x29/0x40
[ 47.670236] kasan_save_free_info+0x2f/0x50
[ 47.671049] ____kasan_slab_free+0x172/0x1d0
[ 47.672102] __kasan_slab_free+0x16/0x20
[ 47.672513] __kmem_cache_free+0x190/0x310
[ 47.673160] kfree+0x7c/0x120
[ 47.674139] kasan_strings+0xc3/0x510
[ 47.674746] kunit_try_run_case+0x126/0x290
[ 47.675944] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 47.676838] kthread+0x19e/0x1e0
[ 47.677483] ret_from_fork+0x41/0x70
[ 47.678181] ret_from_fork_asm+0x1b/0x30
[ 47.678800]
[ 47.679134] The buggy address belongs to the object at ffff888102a1d040
[ 47.679134] which belongs to the cache kmalloc-32 of size 32
[ 47.680987] The buggy address is located 16 bytes inside of
[ 47.680987] freed 32-byte region [ffff888102a1d040, ffff888102a1d060)
[ 47.682515]
[ 47.682772] The buggy address belongs to the physical page:
[ 47.683347] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1d
[ 47.684912] flags: 0x200000000000800(slab|node=0|zone=2)
[ 47.686019] page_type: 0xffffffff()
[ 47.686797] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[ 47.687846] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 47.689098] page dumped because: kasan: bad access detected
[ 47.690162]
[ 47.690641] Memory state around the buggy address:
[ 47.691643] ffff888102a1cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.692501] ffff888102a1cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.694334] >ffff888102a1d000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 47.695447] ^
[ 47.696400] ffff888102a1d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.697563] ffff888102a1d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 47.698717] ==================================================================
Home
[ 49.420649] ==================================================================
[ 49.421976] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x166/0x2a0
[ 49.423339] Read of size 8 at addr ffff888102857a00 by task kunit_try_catch/232
[ 49.425150]
[ 49.425533] CPU: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 49.427095] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 49.428374] Call Trace:
[ 49.428666] <TASK>
[ 49.429146] dump_stack_lvl+0x4e/0x90
[ 49.430277] print_report+0xd2/0x660
[ 49.431173] ? __virt_addr_valid+0x156/0x1e0
[ 49.432002] ? kasan_complete_mode_report_info+0x64/0x200
[ 49.432792] kasan_report+0xff/0x140
[ 49.433374] ? workqueue_uaf+0x166/0x2a0
[ 49.434108] ? workqueue_uaf+0x166/0x2a0
[ 49.435179] __asan_load8+0x82/0xb0
[ 49.435955] workqueue_uaf+0x166/0x2a0
[ 49.437044] ? __pfx_workqueue_uaf+0x10/0x10
[ 49.438196] ? __schedule+0x70b/0x1190
[ 49.438489] ? ktime_get_ts64+0x118/0x140
[ 49.439705] kunit_try_run_case+0x126/0x290
[ 49.440649] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.442029] ? __kasan_check_write+0x18/0x20
[ 49.442629] ? trace_preempt_on+0x20/0xa0
[ 49.443466] ? __kthread_parkme+0x4f/0xd0
[ 49.444395] ? preempt_count_sub+0x50/0x80
[ 49.445252] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.446493] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 49.447849] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.448764] kthread+0x19e/0x1e0
[ 49.449717] ? __pfx_kthread+0x10/0x10
[ 49.450616] ret_from_fork+0x41/0x70
[ 49.451481] ? __pfx_kthread+0x10/0x10
[ 49.452995] ret_from_fork_asm+0x1b/0x30
[ 49.453600] </TASK>
[ 49.454020]
[ 49.454339] Allocated by task 232:
[ 49.455130] kasan_save_stack+0x3c/0x60
[ 49.456201] kasan_set_track+0x29/0x40
[ 49.457064] kasan_save_alloc_info+0x22/0x30
[ 49.457977] __kasan_kmalloc+0xb7/0xc0
[ 49.458594] kmalloc_trace+0x4c/0xb0
[ 49.459719] workqueue_uaf+0xdb/0x2a0
[ 49.460187] kunit_try_run_case+0x126/0x290
[ 49.461128] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.462626] kthread+0x19e/0x1e0
[ 49.463486] ret_from_fork+0x41/0x70
[ 49.464185] ret_from_fork_asm+0x1b/0x30
[ 49.465009]
[ 49.465338] Freed by task 66:
[ 49.465762] kasan_save_stack+0x3c/0x60
[ 49.466394] kasan_set_track+0x29/0x40
[ 49.466888] kasan_save_free_info+0x2f/0x50
[ 49.467626] ____kasan_slab_free+0x172/0x1d0
[ 49.468233] __kasan_slab_free+0x16/0x20
[ 49.469019] __kmem_cache_free+0x190/0x310
[ 49.469579] kfree+0x7c/0x120
[ 49.470501] workqueue_uaf_work+0x12/0x20
[ 49.471392] process_one_work+0x2fb/0x640
[ 49.472216] worker_thread+0x521/0x780
[ 49.473175] kthread+0x19e/0x1e0
[ 49.474307] ret_from_fork+0x41/0x70
[ 49.475218] ret_from_fork_asm+0x1b/0x30
[ 49.475949]
[ 49.476399] Last potentially related work creation:
[ 49.477462] kasan_save_stack+0x3c/0x60
[ 49.478508] __kasan_record_aux_stack+0xb3/0xd0
[ 49.479434] kasan_record_aux_stack_noalloc+0xf/0x20
[ 49.479828] __queue_work.part.0+0x269/0x730
[ 49.481109] __queue_work+0x44/0xc0
[ 49.482064] queue_work_on+0x91/0xa0
[ 49.482794] workqueue_uaf+0x147/0x2a0
[ 49.483631] kunit_try_run_case+0x126/0x290
[ 49.484792] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.485554] kthread+0x19e/0x1e0
[ 49.486292] ret_from_fork+0x41/0x70
[ 49.486915] ret_from_fork_asm+0x1b/0x30
[ 49.487512]
[ 49.488003] The buggy address belongs to the object at ffff888102857a00
[ 49.488003] which belongs to the cache kmalloc-32 of size 32
[ 49.489372] The buggy address is located 0 bytes inside of
[ 49.489372] freed 32-byte region [ffff888102857a00, ffff888102857a20)
[ 49.491563]
[ 49.492085] The buggy address belongs to the physical page:
[ 49.492974] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102857
[ 49.494828] flags: 0x200000000000800(slab|node=0|zone=2)
[ 49.496024] page_type: 0xffffffff()
[ 49.496725] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[ 49.497802] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 49.498994] page dumped because: kasan: bad access detected
[ 49.500367]
[ 49.500647] Memory state around the buggy address:
[ 49.501773] ffff888102857900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 49.502864] ffff888102857980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 49.503887] >ffff888102857a00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.505335] ^
[ 49.506095] ffff888102857a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.506927] ffff888102857b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.508055] ==================================================================
Home
[ 49.420649] ==================================================================
[ 49.421976] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x166/0x2a0
[ 49.423339] Read of size 8 at addr ffff888102857a00 by task kunit_try_catch/232
[ 49.425150]
[ 49.425533] CPU: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 49.427095] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 49.428374] Call Trace:
[ 49.428666] <TASK>
[ 49.429146] dump_stack_lvl+0x4e/0x90
[ 49.430277] print_report+0xd2/0x660
[ 49.431173] ? __virt_addr_valid+0x156/0x1e0
[ 49.432002] ? kasan_complete_mode_report_info+0x64/0x200
[ 49.432792] kasan_report+0xff/0x140
[ 49.433374] ? workqueue_uaf+0x166/0x2a0
[ 49.434108] ? workqueue_uaf+0x166/0x2a0
[ 49.435179] __asan_load8+0x82/0xb0
[ 49.435955] workqueue_uaf+0x166/0x2a0
[ 49.437044] ? __pfx_workqueue_uaf+0x10/0x10
[ 49.438196] ? __schedule+0x70b/0x1190
[ 49.438489] ? ktime_get_ts64+0x118/0x140
[ 49.439705] kunit_try_run_case+0x126/0x290
[ 49.440649] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.442029] ? __kasan_check_write+0x18/0x20
[ 49.442629] ? trace_preempt_on+0x20/0xa0
[ 49.443466] ? __kthread_parkme+0x4f/0xd0
[ 49.444395] ? preempt_count_sub+0x50/0x80
[ 49.445252] ? __pfx_kunit_try_run_case+0x10/0x10
[ 49.446493] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 49.447849] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.448764] kthread+0x19e/0x1e0
[ 49.449717] ? __pfx_kthread+0x10/0x10
[ 49.450616] ret_from_fork+0x41/0x70
[ 49.451481] ? __pfx_kthread+0x10/0x10
[ 49.452995] ret_from_fork_asm+0x1b/0x30
[ 49.453600] </TASK>
[ 49.454020]
[ 49.454339] Allocated by task 232:
[ 49.455130] kasan_save_stack+0x3c/0x60
[ 49.456201] kasan_set_track+0x29/0x40
[ 49.457064] kasan_save_alloc_info+0x22/0x30
[ 49.457977] __kasan_kmalloc+0xb7/0xc0
[ 49.458594] kmalloc_trace+0x4c/0xb0
[ 49.459719] workqueue_uaf+0xdb/0x2a0
[ 49.460187] kunit_try_run_case+0x126/0x290
[ 49.461128] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.462626] kthread+0x19e/0x1e0
[ 49.463486] ret_from_fork+0x41/0x70
[ 49.464185] ret_from_fork_asm+0x1b/0x30
[ 49.465009]
[ 49.465338] Freed by task 66:
[ 49.465762] kasan_save_stack+0x3c/0x60
[ 49.466394] kasan_set_track+0x29/0x40
[ 49.466888] kasan_save_free_info+0x2f/0x50
[ 49.467626] ____kasan_slab_free+0x172/0x1d0
[ 49.468233] __kasan_slab_free+0x16/0x20
[ 49.469019] __kmem_cache_free+0x190/0x310
[ 49.469579] kfree+0x7c/0x120
[ 49.470501] workqueue_uaf_work+0x12/0x20
[ 49.471392] process_one_work+0x2fb/0x640
[ 49.472216] worker_thread+0x521/0x780
[ 49.473175] kthread+0x19e/0x1e0
[ 49.474307] ret_from_fork+0x41/0x70
[ 49.475218] ret_from_fork_asm+0x1b/0x30
[ 49.475949]
[ 49.476399] Last potentially related work creation:
[ 49.477462] kasan_save_stack+0x3c/0x60
[ 49.478508] __kasan_record_aux_stack+0xb3/0xd0
[ 49.479434] kasan_record_aux_stack_noalloc+0xf/0x20
[ 49.479828] __queue_work.part.0+0x269/0x730
[ 49.481109] __queue_work+0x44/0xc0
[ 49.482064] queue_work_on+0x91/0xa0
[ 49.482794] workqueue_uaf+0x147/0x2a0
[ 49.483631] kunit_try_run_case+0x126/0x290
[ 49.484792] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.485554] kthread+0x19e/0x1e0
[ 49.486292] ret_from_fork+0x41/0x70
[ 49.486915] ret_from_fork_asm+0x1b/0x30
[ 49.487512]
[ 49.488003] The buggy address belongs to the object at ffff888102857a00
[ 49.488003] which belongs to the cache kmalloc-32 of size 32
[ 49.489372] The buggy address is located 0 bytes inside of
[ 49.489372] freed 32-byte region [ffff888102857a00, ffff888102857a20)
[ 49.491563]
[ 49.492085] The buggy address belongs to the physical page:
[ 49.492974] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102857
[ 49.494828] flags: 0x200000000000800(slab|node=0|zone=2)
[ 49.496024] page_type: 0xffffffff()
[ 49.496725] raw: 0200000000000800 ffff888100041500 dead000000000122 0000000000000000
[ 49.497802] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[ 49.498994] page dumped because: kasan: bad access detected
[ 49.500367]
[ 49.500647] Memory state around the buggy address:
[ 49.501773] ffff888102857900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 49.502864] ffff888102857980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 49.503887] >ffff888102857a00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.505335] ^
[ 49.506095] ffff888102857a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.506927] ffff888102857b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.508055] ==================================================================
Home
[ 46.583428] ==================================================================
[ 46.585678] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0xc1/0x190
[ 46.587099] Read of size 1 at addr ffff888102927d9a by task kunit_try_catch/202
[ 46.588453]
[ 46.589095] CPU: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 46.590363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 46.592099] Call Trace:
[ 46.592699] <TASK>
[ 46.593136] dump_stack_lvl+0x4e/0x90
[ 46.594281] print_report+0xd2/0x660
[ 46.595274] ? __virt_addr_valid+0x156/0x1e0
[ 46.596175] ? kasan_addr_to_slab+0x11/0xb0
[ 46.597259] kasan_report+0xff/0x140
[ 46.597986] ? kasan_stack_oob+0xc1/0x190
[ 46.598958] ? kasan_stack_oob+0xc1/0x190
[ 46.599569] __asan_load1+0x66/0x70
[ 46.600362] kasan_stack_oob+0xc1/0x190
[ 46.601140] ? __pfx_kasan_stack_oob+0x10/0x10
[ 46.602329] ? __schedule+0x70b/0x1190
[ 46.603178] ? ktime_get_ts64+0x118/0x140
[ 46.604282] kunit_try_run_case+0x126/0x290
[ 46.605066] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.606075] ? __kasan_check_write+0x18/0x20
[ 46.606959] ? trace_preempt_on+0x20/0xa0
[ 46.607578] ? __kthread_parkme+0x4f/0xd0
[ 46.608324] ? preempt_count_sub+0x50/0x80
[ 46.609110] ? __pfx_kunit_try_run_case+0x10/0x10
[ 46.609917] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 46.611374] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 46.612130] kthread+0x19e/0x1e0
[ 46.612621] ? __pfx_kthread+0x10/0x10
[ 46.613183] ret_from_fork+0x41/0x70
[ 46.613889] ? __pfx_kthread+0x10/0x10
[ 46.614954] ret_from_fork_asm+0x1b/0x30
[ 46.615687] </TASK>
[ 46.616460]
[ 46.617119] The buggy address belongs to stack of task kunit_try_catch/202
[ 46.618037] and is located at offset 138 in frame:
[ 46.618782] kasan_stack_oob+0x0/0x190
[ 46.619895]
[ 46.620205] This frame has 4 objects:
[ 46.621063] [48, 49) '__assertion'
[ 46.621190] [64, 72) 'array'
[ 46.622084] [96, 112) '__assertion'
[ 46.622582] [128, 138) 'stack_array'
[ 46.623051]
[ 46.624319] The buggy address belongs to the physical page:
[ 46.625477] page:(____ptrval____) refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102927
[ 46.626445] flags: 0x200000000000000(node=0|zone=2)
[ 46.627311] page_type: 0xffffffff()
[ 46.627940] raw: 0200000000000000 ffffea00040a49c8 ffffea00040a49c8 0000000000000000
[ 46.628811] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[ 46.629723] page dumped because: kasan: bad access detected
[ 46.630264]
[ 46.630811] Memory state around the buggy address:
[ 46.631397] ffff888102927c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 46.632436] ffff888102927d00: 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00
[ 46.633406] >ffff888102927d80: f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 00 f1
[ 46.634319] ^
[ 46.635082] ffff888102927e00: f1 f1 f1 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00
[ 46.636121] ffff888102927e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 46.637097] ==================================================================
Home
[ 43.759588] ==================================================================
[ 43.760993] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0xaf/0x1b0
[ 43.763424] Read of size 1 at addr ffff8881026b8000 by task kunit_try_catch/142
[ 43.764608]
[ 43.765056] CPU: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 43.766320] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 43.768177] Call Trace:
[ 43.768850] <TASK>
[ 43.769579] dump_stack_lvl+0x4e/0x90
[ 43.770332] print_report+0xd2/0x660
[ 43.770899] ? __virt_addr_valid+0x156/0x1e0
[ 43.771713] ? kasan_addr_to_slab+0x11/0xb0
[ 43.772373] kasan_report+0xff/0x140
[ 43.773369] ? kmalloc_pagealloc_uaf+0xaf/0x1b0
[ 43.774450] ? kmalloc_pagealloc_uaf+0xaf/0x1b0
[ 43.775856] __asan_load1+0x66/0x70
[ 43.776908] kmalloc_pagealloc_uaf+0xaf/0x1b0
[ 43.778260] ? __pfx_kmalloc_pagealloc_uaf+0x10/0x10
[ 43.778664] ? __schedule+0x70b/0x1190
[ 43.779277] ? ktime_get_ts64+0x118/0x140
[ 43.779938] kunit_try_run_case+0x126/0x290
[ 43.780516] ? __pfx_kunit_try_run_case+0x10/0x10
[ 43.781994] ? __kasan_check_write+0x18/0x20
[ 43.782764] ? trace_preempt_on+0x20/0xa0
[ 43.783259] ? __kthread_parkme+0x4f/0xd0
[ 43.784089] ? preempt_count_sub+0x50/0x80
[ 43.785134] ? __pfx_kunit_try_run_case+0x10/0x10
[ 43.785996] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 43.787163] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 43.787838] kthread+0x19e/0x1e0
[ 43.788600] ? __pfx_kthread+0x10/0x10
[ 43.789497] ret_from_fork+0x41/0x70
[ 43.790497] ? __pfx_kthread+0x10/0x10
[ 43.791387] ret_from_fork_asm+0x1b/0x30
[ 43.792322] </TASK>
[ 43.793003]
[ 43.793505] The buggy address belongs to the physical page:
[ 43.794468] page:(____ptrval____) refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026b8
[ 43.795871] flags: 0x200000000000000(node=0|zone=2)
[ 43.796934] page_type: 0xffffffff()
[ 43.797881] raw: 0200000000000000 ffffea000409af08 ffff88815b43c8b8 0000000000000000
[ 43.799204] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[ 43.799914] page dumped because: kasan: bad access detected
[ 43.800521]
[ 43.801488] Memory state around the buggy address:
[ 43.802632] ffff8881026b7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.804082] ffff8881026b7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.804831] >ffff8881026b8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 43.806419] ^
[ 43.807283] ffff8881026b8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 43.808400] ffff8881026b8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 43.809878] ==================================================================
Home
[ 43.878461] ==================================================================
[ 43.880596] BUG: KASAN: use-after-free in pagealloc_uaf+0xe9/0x1f0
[ 43.881820] Read of size 1 at addr ffff888102970000 by task kunit_try_catch/148
[ 43.883497]
[ 43.884032] CPU: 1 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 43.885356] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 43.886679] Call Trace:
[ 43.887565] <TASK>
[ 43.888275] dump_stack_lvl+0x4e/0x90
[ 43.889231] print_report+0xd2/0x660
[ 43.890210] ? __virt_addr_valid+0x156/0x1e0
[ 43.890801] ? kasan_addr_to_slab+0x11/0xb0
[ 43.891327] kasan_report+0xff/0x140
[ 43.892834] ? pagealloc_uaf+0xe9/0x1f0
[ 43.893277] ? pagealloc_uaf+0xe9/0x1f0
[ 43.894321] __asan_load1+0x66/0x70
[ 43.895062] pagealloc_uaf+0xe9/0x1f0
[ 43.895352] ? __pfx_pagealloc_uaf+0x10/0x10
[ 43.895741] ? __schedule+0x70b/0x1190
[ 43.897252] ? ktime_get_ts64+0x118/0x140
[ 43.898161] kunit_try_run_case+0x126/0x290
[ 43.899467] ? __pfx_kunit_try_run_case+0x10/0x10
[ 43.900372] ? __kasan_check_write+0x18/0x20
[ 43.901493] ? trace_preempt_on+0x20/0xa0
[ 43.902389] ? __kthread_parkme+0x4f/0xd0
[ 43.903384] ? preempt_count_sub+0x50/0x80
[ 43.904111] ? __pfx_kunit_try_run_case+0x10/0x10
[ 43.904807] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 43.906143] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 43.907269] kthread+0x19e/0x1e0
[ 43.908277] ? __pfx_kthread+0x10/0x10
[ 43.909258] ret_from_fork+0x41/0x70
[ 43.910446] ? __pfx_kthread+0x10/0x10
[ 43.911465] ret_from_fork_asm+0x1b/0x30
[ 43.912402] </TASK>
[ 43.913115]
[ 43.913373] The buggy address belongs to the physical page:
[ 43.914188] page:(____ptrval____) refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102970
[ 43.915302] flags: 0x200000000000000(node=0|zone=2)
[ 43.916046] page_type: 0xffffff7f(buddy)
[ 43.916908] raw: 0200000000000000 ffff88817fffbb60 ffff88817fffbb60 0000000000000000
[ 43.918630] raw: 0000000000000000 0000000000000004 00000000ffffff7f 0000000000000000
[ 43.919443] page dumped because: kasan: bad access detected
[ 43.920438]
[ 43.921132] Memory state around the buggy address:
[ 43.921673] ffff88810296ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 43.922721] ffff88810296ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 43.924308] >ffff888102970000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 43.925264] ^
[ 43.926257] ffff888102970080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 43.927235] ffff888102970100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 43.928317] ==================================================================
Home
[ 50.993906] ==================================================================
[ 50.994802] BUG: KFENCE: invalid free in test_double_free+0xff/0x1d0
[ 50.994802]
[ 50.995640] Invalid free of 0x(____ptrval____) (in kfence-#153):
[ 50.996379] test_double_free+0xff/0x1d0
[ 50.997047] kunit_try_run_case+0x126/0x290
[ 50.997669] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.998462] kthread+0x19e/0x1e0
[ 50.998960] ret_from_fork+0x41/0x70
[ 50.999419] ret_from_fork_asm+0x1b/0x30
[ 51.000062]
[ 51.000329] kfence-#153: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[ 51.000329]
[ 51.001326] allocated by task 263 on cpu 0 at 50.993373s:
[ 51.001915] test_alloc+0x1e8/0x8d0
[ 51.002486] test_double_free+0xd0/0x1d0
[ 51.003141] kunit_try_run_case+0x126/0x290
[ 51.003657] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.004464] kthread+0x19e/0x1e0
[ 51.005103] ret_from_fork+0x41/0x70
[ 51.005543] ret_from_fork_asm+0x1b/0x30
[ 51.006155]
[ 51.006463] freed by task 263 on cpu 0 at 50.993496s:
[ 51.007132] test_double_free+0xeb/0x1d0
[ 51.007774] kunit_try_run_case+0x126/0x290
[ 51.008314] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.009059] kthread+0x19e/0x1e0
[ 51.009457] ret_from_fork+0x41/0x70
[ 51.010025] ret_from_fork_asm+0x1b/0x30
[ 51.010722]
[ 51.011066] CPU: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 51.011820] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 51.012846] ==================================================================
Home
[ 50.889917] ==================================================================
[ 50.890816] BUG: KFENCE: invalid free in test_double_free+0x16a/0x1d0
[ 50.890816]
[ 50.891577] Invalid free of 0x(____ptrval____) (in kfence-#152):
[ 50.892242] test_double_free+0x16a/0x1d0
[ 50.892771] kunit_try_run_case+0x126/0x290
[ 50.893427] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.894366] kthread+0x19e/0x1e0
[ 50.895019] ret_from_fork+0x41/0x70
[ 50.895677] ret_from_fork_asm+0x1b/0x30
[ 50.896227]
[ 50.896452] kfence-#152: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[ 50.896452]
[ 50.897653] allocated by task 261 on cpu 0 at 50.889356s:
[ 50.898420] test_alloc+0x2a0/0x8d0
[ 50.899010] test_double_free+0xd0/0x1d0
[ 50.899577] kunit_try_run_case+0x126/0x290
[ 50.900246] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.901101] kthread+0x19e/0x1e0
[ 50.901509] ret_from_fork+0x41/0x70
[ 50.902278] ret_from_fork_asm+0x1b/0x30
[ 50.902801]
[ 50.903169] freed by task 261 on cpu 0 at 50.889475s:
[ 50.903902] test_double_free+0x156/0x1d0
[ 50.904576] kunit_try_run_case+0x126/0x290
[ 50.905315] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.906058] kthread+0x19e/0x1e0
[ 50.906686] ret_from_fork+0x41/0x70
[ 50.907319] ret_from_fork_asm+0x1b/0x30
[ 50.907834]
[ 50.908245] CPU: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 50.909190] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 50.910146] ==================================================================
Home
[ 51.097809] ==================================================================
[ 51.098698] BUG: KFENCE: invalid free in test_invalid_addr_free+0x157/0x1d0
[ 51.098698]
[ 51.099355] Invalid free of 0x(____ptrval____) (in kfence-#154):
[ 51.100237] test_invalid_addr_free+0x157/0x1d0
[ 51.100749] kunit_try_run_case+0x126/0x290
[ 51.101434] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.102262] kthread+0x19e/0x1e0
[ 51.102742] ret_from_fork+0x41/0x70
[ 51.103325] ret_from_fork_asm+0x1b/0x30
[ 51.103836]
[ 51.104177] kfence-#154: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[ 51.104177]
[ 51.105249] allocated by task 265 on cpu 0 at 51.097474s:
[ 51.106034] test_alloc+0x2a0/0x8d0
[ 51.106662] test_invalid_addr_free+0xd0/0x1d0
[ 51.107314] kunit_try_run_case+0x126/0x290
[ 51.107826] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.108544] kthread+0x19e/0x1e0
[ 51.109064] ret_from_fork+0x41/0x70
[ 51.109551] ret_from_fork_asm+0x1b/0x30
[ 51.110204]
[ 51.110531] CPU: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 51.111488] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 51.112435] ==================================================================
Home
[ 51.202059] ==================================================================
[ 51.203031] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x1d0
[ 51.203031]
[ 51.204001] Invalid free of 0x(____ptrval____) (in kfence-#155):
[ 51.205633] test_invalid_addr_free+0xec/0x1d0
[ 51.206436] kunit_try_run_case+0x126/0x290
[ 51.207167] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.207843] kthread+0x19e/0x1e0
[ 51.208490] ret_from_fork+0x41/0x70
[ 51.209121] ret_from_fork_asm+0x1b/0x30
[ 51.209716]
[ 51.210277] kfence-#155: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[ 51.210277]
[ 51.211328] allocated by task 267 on cpu 0 at 51.201585s:
[ 51.212419] test_alloc+0x1e8/0x8d0
[ 51.213049] test_invalid_addr_free+0xd0/0x1d0
[ 51.213610] kunit_try_run_case+0x126/0x290
[ 51.214350] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.214981] kthread+0x19e/0x1e0
[ 51.215479] ret_from_fork+0x41/0x70
[ 51.216096] ret_from_fork_asm+0x1b/0x30
[ 51.216733]
[ 51.217062] CPU: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 51.218078] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 51.219083] ==================================================================
Home
[ 56.626248] ==================================================================
[ 56.627616] BUG: KFENCE: invalid read in test_invalid_access+0xba/0x150
[ 56.627616]
[ 56.628600] Invalid read at 0x(____ptrval____):
[ 56.629495] test_invalid_access+0xba/0x150
[ 56.630047] kunit_try_run_case+0x126/0x290
[ 56.630778] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 56.631549] kthread+0x19e/0x1e0
[ 56.632225] ret_from_fork+0x41/0x70
[ 56.632817] ret_from_fork_asm+0x1b/0x30
[ 56.633410]
[ 56.633733] CPU: 1 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 56.634706] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 56.635490] ==================================================================
Home
[ 51.825908] ==================================================================
[ 51.826758] BUG: KFENCE: memory corruption in test_corruption+0x160/0x280
[ 51.826758]
[ 51.827646] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#161):
[ 51.828957] test_corruption+0x160/0x280
[ 51.829537] kunit_try_run_case+0x126/0x290
[ 51.830349] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.831223] kthread+0x19e/0x1e0
[ 51.831801] ret_from_fork+0x41/0x70
[ 51.832447] ret_from_fork_asm+0x1b/0x30
[ 51.832947]
[ 51.833279] kfence-#161: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[ 51.833279]
[ 51.834347] allocated by task 271 on cpu 0 at 51.825440s:
[ 51.834924] test_alloc+0x1e8/0x8d0
[ 51.835697] test_corruption+0x133/0x280
[ 51.836298] kunit_try_run_case+0x126/0x290
[ 51.836842] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.837706] kthread+0x19e/0x1e0
[ 51.838302] ret_from_fork+0x41/0x70
[ 51.838793] ret_from_fork_asm+0x1b/0x30
[ 51.839344]
[ 51.839640] freed by task 271 on cpu 0 at 51.825577s:
[ 51.840570] test_corruption+0x160/0x280
[ 51.841006] kunit_try_run_case+0x126/0x290
[ 51.841725] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.842333] kthread+0x19e/0x1e0
[ 51.842960] ret_from_fork+0x41/0x70
[ 51.843405] ret_from_fork_asm+0x1b/0x30
[ 51.844187]
[ 51.844460] CPU: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 51.845412] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 51.846447] ==================================================================
Home
[ 51.721924] ==================================================================
[ 51.722840] BUG: KFENCE: memory corruption in test_corruption+0x10c/0x280
[ 51.722840]
[ 51.723668] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#160):
[ 51.725798] test_corruption+0x10c/0x280
[ 51.726441] kunit_try_run_case+0x126/0x290
[ 51.727050] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.727752] kthread+0x19e/0x1e0
[ 51.728370] ret_from_fork+0x41/0x70
[ 51.729039] ret_from_fork_asm+0x1b/0x30
[ 51.729621]
[ 51.729948] kfence-#160: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[ 51.729948]
[ 51.730912] allocated by task 271 on cpu 0 at 51.721481s:
[ 51.731615] test_alloc+0x1e8/0x8d0
[ 51.732155] test_corruption+0xdb/0x280
[ 51.732894] kunit_try_run_case+0x126/0x290
[ 51.733510] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.734409] kthread+0x19e/0x1e0
[ 51.734988] ret_from_fork+0x41/0x70
[ 51.735488] ret_from_fork_asm+0x1b/0x30
[ 51.736118]
[ 51.736459] freed by task 271 on cpu 0 at 51.721654s:
[ 51.737193] test_corruption+0x10c/0x280
[ 51.737760] kunit_try_run_case+0x126/0x290
[ 51.738454] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.739226] kthread+0x19e/0x1e0
[ 51.739701] ret_from_fork+0x41/0x70
[ 51.740348] ret_from_fork_asm+0x1b/0x30
[ 51.740942]
[ 51.741249] CPU: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 51.742247] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 51.743236] ==================================================================
Home
[ 51.410116] ==================================================================
[ 51.411029] BUG: KFENCE: memory corruption in test_corruption+0x20f/0x280
[ 51.411029]
[ 51.411762] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#157):
[ 51.412868] test_corruption+0x20f/0x280
[ 51.413417] kunit_try_run_case+0x126/0x290
[ 51.414119] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.414758] kthread+0x19e/0x1e0
[ 51.415442] ret_from_fork+0x41/0x70
[ 51.416016] ret_from_fork_asm+0x1b/0x30
[ 51.416449]
[ 51.416779] kfence-#157: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[ 51.416779]
[ 51.417937] allocated by task 269 on cpu 1 at 51.409538s:
[ 51.418579] test_alloc+0x2a0/0x8d0
[ 51.419225] test_corruption+0x133/0x280
[ 51.419751] kunit_try_run_case+0x126/0x290
[ 51.420403] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.421168] kthread+0x19e/0x1e0
[ 51.421591] ret_from_fork+0x41/0x70
[ 51.422383] ret_from_fork_asm+0x1b/0x30
[ 51.423006]
[ 51.423315] freed by task 269 on cpu 1 at 51.409784s:
[ 51.423967] test_corruption+0x20f/0x280
[ 51.424710] kunit_try_run_case+0x126/0x290
[ 51.425295] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.426174] kthread+0x19e/0x1e0
[ 51.426629] ret_from_fork+0x41/0x70
[ 51.427372] ret_from_fork_asm+0x1b/0x30
[ 51.427924]
[ 51.428260] CPU: 1 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 51.429321] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 51.430166] ==================================================================
Home
[ 51.305940] ==================================================================
[ 51.306835] BUG: KFENCE: memory corruption in test_corruption+0x1c0/0x280
[ 51.306835]
[ 51.308134] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#156):
[ 51.310228] test_corruption+0x1c0/0x280
[ 51.310956] kunit_try_run_case+0x126/0x290
[ 51.311545] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.312307] kthread+0x19e/0x1e0
[ 51.312776] ret_from_fork+0x41/0x70
[ 51.313645] ret_from_fork_asm+0x1b/0x30
[ 51.314436]
[ 51.314814] kfence-#156: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[ 51.314814]
[ 51.315911] allocated by task 269 on cpu 1 at 51.305326s:
[ 51.316924] test_alloc+0x2a0/0x8d0
[ 51.317641] test_corruption+0xdb/0x280
[ 51.318352] kunit_try_run_case+0x126/0x290
[ 51.318998] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.319730] kthread+0x19e/0x1e0
[ 51.320390] ret_from_fork+0x41/0x70
[ 51.321357] ret_from_fork_asm+0x1b/0x30
[ 51.321846]
[ 51.322221] freed by task 269 on cpu 1 at 51.305480s:
[ 51.322962] test_corruption+0x1c0/0x280
[ 51.323458] kunit_try_run_case+0x126/0x290
[ 51.324630] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 51.325395] kthread+0x19e/0x1e0
[ 51.325753] ret_from_fork+0x41/0x70
[ 51.326364] ret_from_fork_asm+0x1b/0x30
[ 51.326979]
[ 51.327404] CPU: 1 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 51.328555] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 51.329675] ==================================================================
Home
[ 56.402056] ==================================================================
[ 56.402955] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x158/0x1f0
[ 56.402955]
[ 56.403835] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . ] (in kfence-#205):
[ 56.405584] test_kmalloc_aligned_oob_write+0x158/0x1f0
[ 56.406314] kunit_try_run_case+0x126/0x290
[ 56.406808] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 56.407634] kthread+0x19e/0x1e0
[ 56.408332] ret_from_fork+0x41/0x70
[ 56.408947] ret_from_fork_asm+0x1b/0x30
[ 56.409405]
[ 56.409762] kfence-#205: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[ 56.409762]
[ 56.410698] allocated by task 283 on cpu 1 at 56.401451s:
[ 56.411940] test_alloc+0x2a0/0x8d0
[ 56.412501] test_kmalloc_aligned_oob_write+0xc0/0x1f0
[ 56.413161] kunit_try_run_case+0x126/0x290
[ 56.413734] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 56.414335] kthread+0x19e/0x1e0
[ 56.414916] ret_from_fork+0x41/0x70
[ 56.415488] ret_from_fork_asm+0x1b/0x30
[ 56.416173]
[ 56.416472] freed by task 283 on cpu 1 at 56.401663s:
[ 56.417357] test_kmalloc_aligned_oob_write+0x158/0x1f0
[ 56.418152] kunit_try_run_case+0x126/0x290
[ 56.418813] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 56.419537] kthread+0x19e/0x1e0
[ 56.420074] ret_from_fork+0x41/0x70
[ 56.420590] ret_from_fork_asm+0x1b/0x30
[ 56.421086]
[ 56.421368] CPU: 1 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 56.422429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 56.423413] ==================================================================
Home
[ 55.881814] ==================================================================
[ 55.882661] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x12a/0x250
[ 55.882661]
[ 55.883854] Out-of-bounds read at 0x(____ptrval____) (81B right of kfence-#200):
[ 55.884776] test_kmalloc_aligned_oob_read+0x12a/0x250
[ 55.885254] kunit_try_run_case+0x126/0x290
[ 55.885600] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 55.886467] kthread+0x19e/0x1e0
[ 55.887498] ret_from_fork+0x41/0x70
[ 55.888732] ret_from_fork_asm+0x1b/0x30
[ 55.889458]
[ 55.889784] kfence-#200: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[ 55.889784]
[ 55.891198] allocated by task 281 on cpu 0 at 55.881467s:
[ 55.892034] test_alloc+0x2a0/0x8d0
[ 55.892657] test_kmalloc_aligned_oob_read+0xda/0x250
[ 55.893385] kunit_try_run_case+0x126/0x290
[ 55.894466] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 55.895461] kthread+0x19e/0x1e0
[ 55.895929] ret_from_fork+0x41/0x70
[ 55.896750] ret_from_fork_asm+0x1b/0x30
[ 55.897351]
[ 55.897548] CPU: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 55.898357] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 55.899688] ==================================================================
Home
[ 49.643198] ==================================================================
[ 49.644064] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0xeb/0x290
[ 49.644064]
[ 49.645043] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#140):
[ 49.645843] test_out_of_bounds_read+0xeb/0x290
[ 49.646370] kunit_try_run_case+0x126/0x290
[ 49.646891] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.647683] kthread+0x19e/0x1e0
[ 49.648152] ret_from_fork+0x41/0x70
[ 49.648704] ret_from_fork_asm+0x1b/0x30
[ 49.649307]
[ 49.649969] kfence-#140: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[ 49.649969]
[ 49.651226] allocated by task 249 on cpu 1 at 49.641280s:
[ 49.652540] test_alloc+0x2a0/0x8d0
[ 49.653222] test_out_of_bounds_read+0xdb/0x290
[ 49.653864] kunit_try_run_case+0x126/0x290
[ 49.654481] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.655399] kthread+0x19e/0x1e0
[ 49.655924] ret_from_fork+0x41/0x70
[ 49.656394] ret_from_fork_asm+0x1b/0x30
[ 49.657335]
[ 49.657685] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 49.658703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 49.659722] ==================================================================
Home
[ 50.369648] ==================================================================
[ 50.370506] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x151/0x290
[ 50.370506]
[ 50.371382] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#147):
[ 50.372252] test_out_of_bounds_read+0x151/0x290
[ 50.373102] kunit_try_run_case+0x126/0x290
[ 50.373656] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.374558] kthread+0x19e/0x1e0
[ 50.375055] ret_from_fork+0x41/0x70
[ 50.375672] ret_from_fork_asm+0x1b/0x30
[ 50.376444]
[ 50.376767] kfence-#147: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[ 50.376767]
[ 50.378102] allocated by task 251 on cpu 1 at 50.369502s:
[ 50.378907] test_alloc+0x1e8/0x8d0
[ 50.379572] test_out_of_bounds_read+0x138/0x290
[ 50.380173] kunit_try_run_case+0x126/0x290
[ 50.380948] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.381583] kthread+0x19e/0x1e0
[ 50.382382] ret_from_fork+0x41/0x70
[ 50.382948] ret_from_fork_asm+0x1b/0x30
[ 50.383761]
[ 50.384131] CPU: 1 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 50.385277] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 50.386415] ==================================================================
Home
[ 50.057650] ==================================================================
[ 50.058269] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0xeb/0x290
[ 50.058269]
[ 50.059171] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#144):
[ 50.059926] test_out_of_bounds_read+0xeb/0x290
[ 50.060782] kunit_try_run_case+0x126/0x290
[ 50.061607] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.062574] kthread+0x19e/0x1e0
[ 50.063292] ret_from_fork+0x41/0x70
[ 50.063836] ret_from_fork_asm+0x1b/0x30
[ 50.064613]
[ 50.064994] kfence-#144: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[ 50.064994]
[ 50.066172] allocated by task 251 on cpu 1 at 50.057508s:
[ 50.067342] test_alloc+0x1e8/0x8d0
[ 50.067899] test_out_of_bounds_read+0xdb/0x290
[ 50.068795] kunit_try_run_case+0x126/0x290
[ 50.069462] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.070246] kthread+0x19e/0x1e0
[ 50.070814] ret_from_fork+0x41/0x70
[ 50.071412] ret_from_fork_asm+0x1b/0x30
[ 50.072018]
[ 50.072346] CPU: 1 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 50.073465] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 50.074481] ==================================================================
Home
[ 49.953680] ==================================================================
[ 49.954569] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x151/0x290
[ 49.954569]
[ 49.955628] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#143):
[ 49.956627] test_out_of_bounds_read+0x151/0x290
[ 49.957335] kunit_try_run_case+0x126/0x290
[ 49.958092] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.958739] kthread+0x19e/0x1e0
[ 49.959334] ret_from_fork+0x41/0x70
[ 49.959951] ret_from_fork_asm+0x1b/0x30
[ 49.960486]
[ 49.960739] kfence-#143: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[ 49.960739]
[ 49.961904] allocated by task 249 on cpu 1 at 49.953435s:
[ 49.963051] test_alloc+0x2a0/0x8d0
[ 49.963687] test_out_of_bounds_read+0x138/0x290
[ 49.964510] kunit_try_run_case+0x126/0x290
[ 49.965024] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 49.965892] kthread+0x19e/0x1e0
[ 49.966381] ret_from_fork+0x41/0x70
[ 49.966910] ret_from_fork_asm+0x1b/0x30
[ 49.967597]
[ 49.967956] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 49.968933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 49.970036] ==================================================================
Home
[ 50.473541] ==================================================================
[ 50.474425] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0xd9/0x1a0
[ 50.474425]
[ 50.475255] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#148):
[ 50.476295] test_out_of_bounds_write+0xd9/0x1a0
[ 50.476959] kunit_try_run_case+0x126/0x290
[ 50.477453] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.478310] kthread+0x19e/0x1e0
[ 50.479041] ret_from_fork+0x41/0x70
[ 50.479610] ret_from_fork_asm+0x1b/0x30
[ 50.480399]
[ 50.480737] kfence-#148: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[ 50.480737]
[ 50.481843] allocated by task 253 on cpu 1 at 50.473370s:
[ 50.482716] test_alloc+0x2a0/0x8d0
[ 50.483311] test_out_of_bounds_write+0xc9/0x1a0
[ 50.484069] kunit_try_run_case+0x126/0x290
[ 50.484657] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.485548] kthread+0x19e/0x1e0
[ 50.486016] ret_from_fork+0x41/0x70
[ 50.486673] ret_from_fork_asm+0x1b/0x30
[ 50.487435]
[ 50.487730] CPU: 1 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 50.488595] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 50.489712] ==================================================================
Home
[ 50.577683] ==================================================================
[ 50.578610] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0xd9/0x1a0
[ 50.578610]
[ 50.579444] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#149):
[ 50.580289] test_out_of_bounds_write+0xd9/0x1a0
[ 50.580788] kunit_try_run_case+0x126/0x290
[ 50.581335] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.581930] kthread+0x19e/0x1e0
[ 50.582560] ret_from_fork+0x41/0x70
[ 50.583268] ret_from_fork_asm+0x1b/0x30
[ 50.583890]
[ 50.584195] kfence-#149: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[ 50.584195]
[ 50.585680] allocated by task 255 on cpu 1 at 50.577500s:
[ 50.586283] test_alloc+0x1e8/0x8d0
[ 50.586709] test_out_of_bounds_write+0xc9/0x1a0
[ 50.587437] kunit_try_run_case+0x126/0x290
[ 50.588008] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.588693] kthread+0x19e/0x1e0
[ 50.589217] ret_from_fork+0x41/0x70
[ 50.589773] ret_from_fork_asm+0x1b/0x30
[ 50.590289]
[ 50.590660] CPU: 1 PID: 255 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 50.591632] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 50.592539] ==================================================================
Home
[ 78.138178] ==================================================================
[ 78.139090] BUG: KFENCE: use-after-free read in test_krealloc+0x2e9/0x530
[ 78.139090]
[ 78.140513] Use-after-free read at 0x(____ptrval____) (in kfence-#210):
[ 78.141390] test_krealloc+0x2e9/0x530
[ 78.142009] kunit_try_run_case+0x126/0x290
[ 78.142797] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 78.143613] kthread+0x19e/0x1e0
[ 78.144196] ret_from_fork+0x41/0x70
[ 78.144781] ret_from_fork_asm+0x1b/0x30
[ 78.145447]
[ 78.145770] kfence-#210: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[ 78.145770]
[ 78.146935] allocated by task 295 on cpu 0 at 78.137341s:
[ 78.147925] test_alloc+0x2a0/0x8d0
[ 78.148551] test_krealloc+0xb1/0x530
[ 78.149186] kunit_try_run_case+0x126/0x290
[ 78.149804] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 78.150604] kthread+0x19e/0x1e0
[ 78.151190] ret_from_fork+0x41/0x70
[ 78.151763] ret_from_fork_asm+0x1b/0x30
[ 78.152438]
[ 78.152867] freed by task 295 on cpu 0 at 78.137662s:
[ 78.153674] krealloc+0x83/0x140
[ 78.154234] test_krealloc+0x137/0x530
[ 78.154765] kunit_try_run_case+0x126/0x290
[ 78.155524] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 78.156312] kthread+0x19e/0x1e0
[ 78.156869] ret_from_fork+0x41/0x70
[ 78.157466] ret_from_fork_asm+0x1b/0x30
[ 78.158097]
[ 78.158446] CPU: 0 PID: 295 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 78.159549] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 78.160606] ==================================================================
Home
[ 78.039097] ==================================================================
[ 78.040005] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x14f/0x370
[ 78.040005]
[ 78.041883] Use-after-free read at 0x(____ptrval____) (in kfence-#209):
[ 78.042766] test_memcache_typesafe_by_rcu+0x14f/0x370
[ 78.043776] kunit_try_run_case+0x126/0x290
[ 78.044403] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 78.045175] kthread+0x19e/0x1e0
[ 78.045935] ret_from_fork+0x41/0x70
[ 78.046456] ret_from_fork_asm+0x1b/0x30
[ 78.046976]
[ 78.047296] kfence-#209: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[ 78.047296]
[ 78.048209] allocated by task 293 on cpu 1 at 78.033383s:
[ 78.049024] test_alloc+0x1e8/0x8d0
[ 78.049580] test_memcache_typesafe_by_rcu+0xec/0x370
[ 78.050403] kunit_try_run_case+0x126/0x290
[ 78.051151] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 78.051885] kthread+0x19e/0x1e0
[ 78.052345] ret_from_fork+0x41/0x70
[ 78.052806] ret_from_fork_asm+0x1b/0x30
[ 78.053413]
[ 78.053724] freed by task 0 on cpu 1 at 78.038849s:
[ 78.054682] rcu_guarded_free+0x2e/0x40
[ 78.055319] rcu_core+0x4be/0x1020
[ 78.055806] rcu_core_si+0x12/0x20
[ 78.056384] handle_softirqs+0x195/0x520
[ 78.057019] irq_exit_rcu+0x92/0xb0
[ 78.057429] sysvec_apic_timer_interrupt+0x80/0xa0
[ 78.058155] asm_sysvec_apic_timer_interrupt+0x1f/0x30
[ 78.058794] default_idle+0xf/0x20
[ 78.059246] default_idle_call+0x42/0x70
[ 78.059901] do_idle+0x2ba/0x310
[ 78.060287] cpu_startup_entry+0x3c/0x40
[ 78.060965] start_secondary+0x1ac/0x1d0
[ 78.061477] secondary_startup_64_no_verify+0x178/0x17b
[ 78.062249]
[ 78.062530] CPU: 1 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 78.063800] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 78.065064] ==================================================================
Home
[ 50.682275] ==================================================================
[ 50.683555] BUG: KFENCE: use-after-free read in test_use_after_free_read+0xf7/0x1a0
[ 50.683555]
[ 50.684598] Use-after-free read at 0x(____ptrval____) (in kfence-#150):
[ 50.686159] test_use_after_free_read+0xf7/0x1a0
[ 50.686759] kunit_try_run_case+0x126/0x290
[ 50.687409] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.688187] kthread+0x19e/0x1e0
[ 50.688628] ret_from_fork+0x41/0x70
[ 50.689242] ret_from_fork_asm+0x1b/0x30
[ 50.689795]
[ 50.690101] kfence-#150: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[ 50.690101]
[ 50.691086] allocated by task 257 on cpu 1 at 50.681634s:
[ 50.691946] test_alloc+0x2a0/0x8d0
[ 50.692401] test_use_after_free_read+0xd0/0x1a0
[ 50.693132] kunit_try_run_case+0x126/0x290
[ 50.693719] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.694402] kthread+0x19e/0x1e0
[ 50.694946] ret_from_fork+0x41/0x70
[ 50.695427] ret_from_fork_asm+0x1b/0x30
[ 50.696073]
[ 50.696423] freed by task 257 on cpu 1 at 50.681803s:
[ 50.697450] test_use_after_free_read+0x14b/0x1a0
[ 50.698149] kunit_try_run_case+0x126/0x290
[ 50.698773] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.699547] kthread+0x19e/0x1e0
[ 50.700025] ret_from_fork+0x41/0x70
[ 50.700565] ret_from_fork_asm+0x1b/0x30
[ 50.701068]
[ 50.701398] CPU: 1 PID: 257 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 50.702377] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 50.703251] ==================================================================
Home
[ 50.785838] ==================================================================
[ 50.786474] BUG: KFENCE: use-after-free read in test_use_after_free_read+0xf7/0x1a0
[ 50.786474]
[ 50.787482] Use-after-free read at 0x(____ptrval____) (in kfence-#151):
[ 50.788219] test_use_after_free_read+0xf7/0x1a0
[ 50.788984] kunit_try_run_case+0x126/0x290
[ 50.789603] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.790603] kthread+0x19e/0x1e0
[ 50.791223] ret_from_fork+0x41/0x70
[ 50.791816] ret_from_fork_asm+0x1b/0x30
[ 50.792576]
[ 50.792919] kfence-#151: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[ 50.792919]
[ 50.794068] allocated by task 259 on cpu 1 at 50.785481s:
[ 50.795024] test_alloc+0x1e8/0x8d0
[ 50.795567] test_use_after_free_read+0xd0/0x1a0
[ 50.796424] kunit_try_run_case+0x126/0x290
[ 50.797114] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.797912] kthread+0x19e/0x1e0
[ 50.798438] ret_from_fork+0x41/0x70
[ 50.799077] ret_from_fork_asm+0x1b/0x30
[ 50.799674]
[ 50.800100] freed by task 259 on cpu 1 at 50.785646s:
[ 50.801029] test_use_after_free_read+0xeb/0x1a0
[ 50.801675] kunit_try_run_case+0x126/0x290
[ 50.802340] kunit_generic_run_threadfn_adapter+0x33/0x50
[ 50.803117] kthread+0x19e/0x1e0
[ 50.803658] ret_from_fork+0x41/0x70
[ 50.804429] ret_from_fork_asm+0x1b/0x30
[ 50.805134]
[ 50.805511] CPU: 1 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.6.74-rc1 #1
[ 50.806645] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 50.807666] ==================================================================
Home
------------[ cut here ]------------
[ 52.812666] WARNING: CPU: 0 PID: 478 at mm/util.c:632 kvmalloc_node+0xd1/0xe0
[ 52.814338] Modules linked in:
[ 52.815462] CPU: 0 PID: 478 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[ 52.818084] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 52.819808] RIP: 0010:kvmalloc_node+0xd1/0xe0
[ 52.820353] Code: 04 00 48 83 c4 18 48 8d 65 e8 5b 41 5c 41 5d 5d c3 cc cc cc cc 48 b9 00 00 00 00 00 20 00 00 eb bd 80 e7 20 0f 85 52 ff ff ff <0f> 0b e9 4b ff ff ff 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90
[ 52.820987] RSP: 0018:ffffafb1005efe00 EFLAGS: 00010246
[ 52.822925] RAX: 0000000000000000 RBX: 00000000004000c0 RCX: 0000000000000015
[ 52.823436] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000452cc0
[ 52.824438] RBP: ffffafb1005efe18 R08: 0000000000000040 R09: 0000000000000000
[ 52.824746] R10: 0000000000000038 R11: ffff8bfc8139f100 R12: 0000000200002000
[ 52.826418] R13: 00000000ffffffff R14: ffff8bfc80a75100 R15: ffff8bfc80a75080
[ 52.827168] FS: 00007f657ffdd740(0000) GS:ffff8bfcfbc00000(0000) knlGS:0000000000000000
[ 52.828113] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 52.828378] CR2: 00007f6580181680 CR3: 0000000105174000 CR4: 00000000000006f0
[ 52.829719] Call Trace:
[ 52.831740] <TASK>
[ 52.832377] ? show_regs+0x64/0x70
[ 52.833062] ? __warn+0x88/0x150
[ 52.833227] ? kvmalloc_node+0xd1/0xe0
[ 52.833948] ? report_bug+0x171/0x1a0
[ 52.834673] ? handle_bug+0x5b/0x90
[ 52.835290] ? exc_invalid_op+0x1c/0x70
[ 52.835451] ? asm_exc_invalid_op+0x1f/0x30
[ 52.836428] ? kvmalloc_node+0xd1/0xe0
[ 52.837307] alloc_fdtable+0x74/0x100
[ 52.838115] expand_files+0x62/0x300
[ 52.838394] ? lapic_next_event+0x14/0x20
[ 52.838552] ? clockevents_program_event+0x9f/0x100
[ 52.838737] ksys_dup3+0x70/0x110
[ 52.838880] __x64_sys_dup2+0x2a/0xa0
[ 52.839029] x64_sys_call+0x1b43/0x1c90
[ 52.840717] do_syscall_64+0x39/0x90
[ 52.841085] entry_SYSCALL_64_after_hwframe+0x78/0xe2
[ 52.842301] RIP: 0033:0x7f65800d5c17
[ 52.843450] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[ 52.845206] RSP: 002b:00007ffdb0c3fc68 EFLAGS: 00000202 ORIG_RAX: 0000000000000021
[ 52.846197] RAX: ffffffffffffffda RBX: 00007ffdb0c404c8 RCX: 00007f65800d5c17
[ 52.846951] RDX: 00007ffdb0c3fc90 RSI: 0000000040000038 RDI: 0000000000000002
[ 52.847193] RBP: 00007ffdb0c3fe90 R08: 0000000000000064 R09: 0000000000000000
[ 52.847655] R10: 00007f657fff2170 R11: 0000000000000202 R12: 0000000000000000
[ 52.848096] R13: 00007ffdb0c404d8 R14: 00007f658020b000 R15: 0000560b289c9dd8
[ 52.848602] </TASK>
[ 52.848972] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 52.812666] WARNING: CPU: 0 PID: 478 at mm/util.c:632 kvmalloc_node+0xd1/0xe0
[ 52.814338] Modules linked in:
[ 52.815462] CPU: 0 PID: 478 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[ 52.818084] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 52.819808] RIP: 0010:kvmalloc_node+0xd1/0xe0
[ 52.820353] Code: 04 00 48 83 c4 18 48 8d 65 e8 5b 41 5c 41 5d 5d c3 cc cc cc cc 48 b9 00 00 00 00 00 20 00 00 eb bd 80 e7 20 0f 85 52 ff ff ff <0f> 0b e9 4b ff ff ff 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90
[ 52.820987] RSP: 0018:ffffafb1005efe00 EFLAGS: 00010246
[ 52.822925] RAX: 0000000000000000 RBX: 00000000004000c0 RCX: 0000000000000015
[ 52.823436] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000452cc0
[ 52.824438] RBP: ffffafb1005efe18 R08: 0000000000000040 R09: 0000000000000000
[ 52.824746] R10: 0000000000000038 R11: ffff8bfc8139f100 R12: 0000000200002000
[ 52.826418] R13: 00000000ffffffff R14: ffff8bfc80a75100 R15: ffff8bfc80a75080
[ 52.827168] FS: 00007f657ffdd740(0000) GS:ffff8bfcfbc00000(0000) knlGS:0000000000000000
[ 52.828113] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 52.828378] CR2: 00007f6580181680 CR3: 0000000105174000 CR4: 00000000000006f0
[ 52.829719] Call Trace:
[ 52.831740] <TASK>
[ 52.832377] ? show_regs+0x64/0x70
[ 52.833062] ? __warn+0x88/0x150
[ 52.833227] ? kvmalloc_node+0xd1/0xe0
[ 52.833948] ? report_bug+0x171/0x1a0
[ 52.834673] ? handle_bug+0x5b/0x90
[ 52.835290] ? exc_invalid_op+0x1c/0x70
[ 52.835451] ? asm_exc_invalid_op+0x1f/0x30
[ 52.836428] ? kvmalloc_node+0xd1/0xe0
[ 52.837307] alloc_fdtable+0x74/0x100
[ 52.838115] expand_files+0x62/0x300
[ 52.838394] ? lapic_next_event+0x14/0x20
[ 52.838552] ? clockevents_program_event+0x9f/0x100
[ 52.838737] ksys_dup3+0x70/0x110
[ 52.838880] __x64_sys_dup2+0x2a/0xa0
[ 52.839029] x64_sys_call+0x1b43/0x1c90
[ 52.840717] do_syscall_64+0x39/0x90
[ 52.841085] entry_SYSCALL_64_after_hwframe+0x78/0xe2
[ 52.842301] RIP: 0033:0x7f65800d5c17
[ 52.843450] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[ 52.845206] RSP: 002b:00007ffdb0c3fc68 EFLAGS: 00000202 ORIG_RAX: 0000000000000021
[ 52.846197] RAX: ffffffffffffffda RBX: 00007ffdb0c404c8 RCX: 00007f65800d5c17
[ 52.846951] RDX: 00007ffdb0c3fc90 RSI: 0000000040000038 RDI: 0000000000000002
[ 52.847193] RBP: 00007ffdb0c3fe90 R08: 0000000000000064 R09: 0000000000000000
[ 52.847655] R10: 00007f657fff2170 R11: 0000000000000202 R12: 0000000000000000
[ 52.848096] R13: 00007ffdb0c404d8 R14: 00007f658020b000 R15: 0000560b289c9dd8
[ 52.848602] </TASK>
[ 52.848972] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 211.746434] WARNING: CPU: 1 PID: 1460 at mm/util.c:632 kvmalloc_node+0xe0/0xe8
[ 211.747082] Modules linked in: snd_soc_hdmi_codec hantro_vpu dw_hdmi_cec dw_hdmi_i2s_audio crct10dif_ce snd_soc_audio_graph_card snd_soc_spdif_tx v4l2_h264 snd_soc_simple_card brcmfmac v4l2_vp9 panfrost v4l2_mem2mem snd_soc_simple_card_utils rockchipdrm gpu_sched hci_uart brcmutil videobuf2_v4l2 btqca dw_mipi_dsi btbcm drm_shmem_helper rtc_rk808 analogix_dp bluetooth dw_hdmi videodev phy_rockchip_pcie cec videobuf2_dma_contig ecdh_generic videobuf2_memops snd_soc_rockchip_i2s cfg80211 ecc videobuf2_common mc drm_display_helper drm_dma_helper rfkill snd_soc_es8316 rockchip_saradc drm_kms_helper industrialio_triggered_buffer coresight_cpu_debug kfifo_buf coresight pcie_rockchip_host rockchip_thermal drm backlight fuse ip_tables x_tables
[ 211.752868] CPU: 1 PID: 1460 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[ 211.753465] Hardware name: Radxa ROCK Pi 4B (DT)
[ 211.753872] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 211.754484] pc : kvmalloc_node+0xe0/0xe8
[ 211.754836] lr : kvmalloc_node+0x50/0xe8
[ 211.755184] sp : ffff8000848abce0
[ 211.755476] x29: ffff8000848abcf0 x28: ffff000007caa000 x27: 0000000000000000
[ 211.756107] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 211.756737] x23: 0000000080000000 x22: ffff800080306d68 x21: 0000000200002000
[ 211.757368] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[ 211.757998] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 211.758628] x14: 0000000000000000 x13: 0000000000000000 x12: ffffffffffffd754
[ 211.759258] x11: 0000000000000040 x10: 3890b587d2886a00 x9 : 3890b587d2886a00
[ 211.759888] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000038
[ 211.760518] x5 : 0000000000000000 x4 : ffff8000848abca0 x3 : 0000000000000000
[ 211.761148] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[ 211.761778] Call trace:
[ 211.761997] kvmalloc_node+0xe0/0xe8
[ 211.762315] alloc_fdtable+0x7c/0x108
[ 211.762645] expand_files+0x114/0x2f0
[ 211.762972] ksys_dup3+0x60/0xf4
[ 211.763260] __arm64_sys_dup3+0x20/0x30
[ 211.763601] invoke_syscall+0x40/0x100
[ 211.763940] el0_svc_common+0xa8/0xd8
[ 211.764267] do_el0_svc+0x1c/0x28
[ 211.764564] el0_svc+0x38/0x64
[ 211.764842] el0t_64_sync_handler+0x90/0xfc
[ 211.765213] el0t_64_sync+0x190/0x194
[ 211.765541] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 211.746434] WARNING: CPU: 1 PID: 1460 at mm/util.c:632 kvmalloc_node+0xe0/0xe8
[ 211.747082] Modules linked in: snd_soc_hdmi_codec hantro_vpu dw_hdmi_cec dw_hdmi_i2s_audio crct10dif_ce snd_soc_audio_graph_card snd_soc_spdif_tx v4l2_h264 snd_soc_simple_card brcmfmac v4l2_vp9 panfrost v4l2_mem2mem snd_soc_simple_card_utils rockchipdrm gpu_sched hci_uart brcmutil videobuf2_v4l2 btqca dw_mipi_dsi btbcm drm_shmem_helper rtc_rk808 analogix_dp bluetooth dw_hdmi videodev phy_rockchip_pcie cec videobuf2_dma_contig ecdh_generic videobuf2_memops snd_soc_rockchip_i2s cfg80211 ecc videobuf2_common mc drm_display_helper drm_dma_helper rfkill snd_soc_es8316 rockchip_saradc drm_kms_helper industrialio_triggered_buffer coresight_cpu_debug kfifo_buf coresight pcie_rockchip_host rockchip_thermal drm backlight fuse ip_tables x_tables
[ 211.752868] CPU: 1 PID: 1460 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[ 211.753465] Hardware name: Radxa ROCK Pi 4B (DT)
[ 211.753872] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 211.754484] pc : kvmalloc_node+0xe0/0xe8
[ 211.754836] lr : kvmalloc_node+0x50/0xe8
[ 211.755184] sp : ffff8000848abce0
[ 211.755476] x29: ffff8000848abcf0 x28: ffff000007caa000 x27: 0000000000000000
[ 211.756107] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 211.756737] x23: 0000000080000000 x22: ffff800080306d68 x21: 0000000200002000
[ 211.757368] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[ 211.757998] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 211.758628] x14: 0000000000000000 x13: 0000000000000000 x12: ffffffffffffd754
[ 211.759258] x11: 0000000000000040 x10: 3890b587d2886a00 x9 : 3890b587d2886a00
[ 211.759888] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000038
[ 211.760518] x5 : 0000000000000000 x4 : ffff8000848abca0 x3 : 0000000000000000
[ 211.761148] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[ 211.761778] Call trace:
[ 211.761997] kvmalloc_node+0xe0/0xe8
[ 211.762315] alloc_fdtable+0x7c/0x108
[ 211.762645] expand_files+0x114/0x2f0
[ 211.762972] ksys_dup3+0x60/0xf4
[ 211.763260] __arm64_sys_dup3+0x20/0x30
[ 211.763601] invoke_syscall+0x40/0x100
[ 211.763940] el0_svc_common+0xa8/0xd8
[ 211.764267] do_el0_svc+0x1c/0x28
[ 211.764564] el0_svc+0x38/0x64
[ 211.764842] el0t_64_sync_handler+0x90/0xfc
[ 211.765213] el0t_64_sync+0x190/0x194
[ 211.765541] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 281.127099] WARNING: CPU: 1 PID: 1445 at mm/util.c:632 kvmalloc_node+0xfc/0x10c
[ 281.127751] Modules linked in: hantro_vpu snd_soc_hdmi_codec dw_hdmi_cec dw_hdmi_i2s_audio v4l2_vp9 panfrost brcmfmac v4l2_h264 v4l2_mem2mem brcmutil crct10dif_ce rockchipdrm drm_shmem_helper videobuf2_dma_contig snd_soc_audio_graph_card snd_soc_simple_card hci_uart videobuf2_memops analogix_dp videobuf2_v4l2 snd_soc_simple_card_utils snd_soc_spdif_tx gpu_sched btqca btbcm videodev dw_mipi_dsi phy_rockchip_pcie bluetooth dw_hdmi videobuf2_common cfg80211 mc snd_soc_rockchip_i2s cec ecdh_generic drm_display_helper ecc rtc_rk808 drm_dma_helper rfkill rockchip_saradc snd_soc_es8316 industrialio_triggered_buffer drm_kms_helper kfifo_buf rockchip_thermal coresight_cpu_debug coresight pcie_rockchip_host fuse drm backlight ip_tables x_tables
[ 281.133535] CPU: 1 PID: 1445 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[ 281.134136] Hardware name: Radxa ROCK Pi 4B (DT)
[ 281.134543] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 281.135155] pc : kvmalloc_node+0xfc/0x10c
[ 281.135514] lr : kvmalloc_node+0x64/0x10c
[ 281.135869] sp : ffff8000846f3ce0
[ 281.136161] x29: ffff8000846f3cf0 x28: ffff000009bbc000 x27: 0000000000000000
[ 281.136793] x26: 0000000000000000 x25: 0000000000000000 x24: ffff00000252e700
[ 281.137425] x23: ffff00000252e680 x22: ffff8000802eece4 x21: 00000000ffffffff
[ 281.138057] x20: 0000000200002000 x19: 0000000000400cc0 x18: 0000000000000000
[ 281.138688] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 281.139319] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 281.139948] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[ 281.140578] x8 : 0000000000000000 x7 : 0000000000000000 x6 : ffffffffffffd6e3
[ 281.141209] x5 : 0000000000000000 x4 : ffff000009bbc000 x3 : 0000000000000000
[ 281.141839] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[ 281.142471] Call trace:
[ 281.142692] kvmalloc_node+0xfc/0x10c
[ 281.143022] alloc_fdtable+0x94/0x114
[ 281.143350] expand_files+0x78/0x318
[ 281.143669] ksys_dup3+0x60/0x128
[ 281.143965] __arm64_sys_dup3+0x20/0x30
[ 281.144309] invoke_syscall+0x48/0x114
[ 281.144646] el0_svc_common.constprop.0+0x40/0xe0
[ 281.145065] do_el0_svc+0x1c/0x28
[ 281.145362] el0_svc+0x38/0xc8
[ 281.145639] el0t_64_sync_handler+0x120/0x12c
[ 281.146025] el0t_64_sync+0x190/0x194
[ 281.146351] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 281.127099] WARNING: CPU: 1 PID: 1445 at mm/util.c:632 kvmalloc_node+0xfc/0x10c
[ 281.127751] Modules linked in: hantro_vpu snd_soc_hdmi_codec dw_hdmi_cec dw_hdmi_i2s_audio v4l2_vp9 panfrost brcmfmac v4l2_h264 v4l2_mem2mem brcmutil crct10dif_ce rockchipdrm drm_shmem_helper videobuf2_dma_contig snd_soc_audio_graph_card snd_soc_simple_card hci_uart videobuf2_memops analogix_dp videobuf2_v4l2 snd_soc_simple_card_utils snd_soc_spdif_tx gpu_sched btqca btbcm videodev dw_mipi_dsi phy_rockchip_pcie bluetooth dw_hdmi videobuf2_common cfg80211 mc snd_soc_rockchip_i2s cec ecdh_generic drm_display_helper ecc rtc_rk808 drm_dma_helper rfkill rockchip_saradc snd_soc_es8316 industrialio_triggered_buffer drm_kms_helper kfifo_buf rockchip_thermal coresight_cpu_debug coresight pcie_rockchip_host fuse drm backlight ip_tables x_tables
[ 281.133535] CPU: 1 PID: 1445 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[ 281.134136] Hardware name: Radxa ROCK Pi 4B (DT)
[ 281.134543] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 281.135155] pc : kvmalloc_node+0xfc/0x10c
[ 281.135514] lr : kvmalloc_node+0x64/0x10c
[ 281.135869] sp : ffff8000846f3ce0
[ 281.136161] x29: ffff8000846f3cf0 x28: ffff000009bbc000 x27: 0000000000000000
[ 281.136793] x26: 0000000000000000 x25: 0000000000000000 x24: ffff00000252e700
[ 281.137425] x23: ffff00000252e680 x22: ffff8000802eece4 x21: 00000000ffffffff
[ 281.138057] x20: 0000000200002000 x19: 0000000000400cc0 x18: 0000000000000000
[ 281.138688] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 281.139319] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 281.139948] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[ 281.140578] x8 : 0000000000000000 x7 : 0000000000000000 x6 : ffffffffffffd6e3
[ 281.141209] x5 : 0000000000000000 x4 : ffff000009bbc000 x3 : 0000000000000000
[ 281.141839] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[ 281.142471] Call trace:
[ 281.142692] kvmalloc_node+0xfc/0x10c
[ 281.143022] alloc_fdtable+0x94/0x114
[ 281.143350] expand_files+0x78/0x318
[ 281.143669] ksys_dup3+0x60/0x128
[ 281.143965] __arm64_sys_dup3+0x20/0x30
[ 281.144309] invoke_syscall+0x48/0x114
[ 281.144646] el0_svc_common.constprop.0+0x40/0xe0
[ 281.145065] do_el0_svc+0x1c/0x28
[ 281.145362] el0_svc+0x38/0xc8
[ 281.145639] el0t_64_sync_handler+0x120/0x12c
[ 281.146025] el0t_64_sync+0x190/0x194
[ 281.146351] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 249.289599] WARNING: CPU: 2 PID: 1425 at mm/util.c:632 kvmalloc_node+0xd1/0xe0
[ 249.296863] Modules linked in: x86_pkg_temp_thermal
[ 249.303083] CPU: 2 PID: 1425 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[ 249.309913] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[ 249.318646] RIP: 0010:kvmalloc_node+0xd1/0xe0
[ 249.323096] Code: 04 00 48 83 c4 18 48 8d 65 e8 5b 41 5c 41 5d 5d c3 cc cc cc cc 48 b9 00 00 00 00 00 20 00 00 eb bd 80 e7 20 0f 85 52 ff ff ff <0f> 0b e9 4b ff ff ff 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90
[ 249.343245] RSP: 0018:ffff8e4a017dbe00 EFLAGS: 00010246
[ 249.349811] RAX: 0000000000000000 RBX: 00000000004000c0 RCX: 0000000000000015
[ 249.356987] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000452cc0
[ 249.365455] RBP: ffff8e4a017dbe18 R08: 0000000000000040 R09: 0000000000000000
[ 249.372629] R10: 0000000000000038 R11: ffff8a9f820d4680 R12: 0000000200002000
[ 249.381098] R13: 00000000ffffffff R14: ffff8a9f801ee9c0 R15: ffff8a9f801ee940
[ 249.388310] FS: 00007efe6d596740(0000) GS:ffff8aa0efb00000(0000) knlGS:0000000000000000
[ 249.397695] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 249.403527] CR2: 00007efe6d71d942 CR3: 000000010d96c005 CR4: 00000000003706e0
[ 249.411961] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 249.419253] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 249.427629] Call Trace:
[ 249.430164] <TASK>
[ 249.433565] ? show_regs+0x64/0x70
[ 249.437055] ? __warn+0x88/0x150
[ 249.441607] ? kvmalloc_node+0xd1/0xe0
[ 249.445472] ? report_bug+0x171/0x1a0
[ 249.450429] ? handle_bug+0x5b/0x90
[ 249.454012] ? exc_invalid_op+0x1c/0x70
[ 249.459276] ? asm_exc_invalid_op+0x1f/0x30
[ 249.464764] ? kvmalloc_node+0xd1/0xe0
[ 249.468624] alloc_fdtable+0x74/0x100
[ 249.473588] expand_files+0x62/0x300
[ 249.477318] ? do_prlimit+0x132/0x210
[ 249.482288] ksys_dup3+0x70/0x110
[ 249.485700] __x64_sys_dup2+0x2a/0xa0
[ 249.490686] x64_sys_call+0x1b43/0x1c90
[ 249.494637] do_syscall_64+0x39/0x90
[ 249.499508] entry_SYSCALL_64_after_hwframe+0x78/0xe2
[ 249.504671] RIP: 0033:0x7efe6d68ec17
[ 249.509543] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[ 249.528403] RSP: 002b:00007ffc34781ca8 EFLAGS: 00000202 ORIG_RAX: 0000000000000021
[ 249.537259] RAX: ffffffffffffffda RBX: 00007ffc34782508 RCX: 00007efe6d68ec17
[ 249.544473] RDX: 00007ffc34781cd0 RSI: 0000000040000038 RDI: 0000000000000002
[ 249.552900] RBP: 00007ffc34781ed0 R08: 0000000000000064 R09: 0000000000000000
[ 249.560085] R10: 00007efe6d5ab170 R11: 0000000000000202 R12: 0000000000000000
[ 249.568537] R13: 00007ffc34782518 R14: 00007efe6d7c4000 R15: 0000564edeb77dd8
[ 249.575736] </TASK>
[ 249.579239] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 249.289599] WARNING: CPU: 2 PID: 1425 at mm/util.c:632 kvmalloc_node+0xd1/0xe0
[ 249.296863] Modules linked in: x86_pkg_temp_thermal
[ 249.303083] CPU: 2 PID: 1425 Comm: unshare_test Not tainted 6.6.74-rc1 #1
[ 249.309913] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[ 249.318646] RIP: 0010:kvmalloc_node+0xd1/0xe0
[ 249.323096] Code: 04 00 48 83 c4 18 48 8d 65 e8 5b 41 5c 41 5d 5d c3 cc cc cc cc 48 b9 00 00 00 00 00 20 00 00 eb bd 80 e7 20 0f 85 52 ff ff ff <0f> 0b e9 4b ff ff ff 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90
[ 249.343245] RSP: 0018:ffff8e4a017dbe00 EFLAGS: 00010246
[ 249.349811] RAX: 0000000000000000 RBX: 00000000004000c0 RCX: 0000000000000015
[ 249.356987] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000452cc0
[ 249.365455] RBP: ffff8e4a017dbe18 R08: 0000000000000040 R09: 0000000000000000
[ 249.372629] R10: 0000000000000038 R11: ffff8a9f820d4680 R12: 0000000200002000
[ 249.381098] R13: 00000000ffffffff R14: ffff8a9f801ee9c0 R15: ffff8a9f801ee940
[ 249.388310] FS: 00007efe6d596740(0000) GS:ffff8aa0efb00000(0000) knlGS:0000000000000000
[ 249.397695] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 249.403527] CR2: 00007efe6d71d942 CR3: 000000010d96c005 CR4: 00000000003706e0
[ 249.411961] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 249.419253] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 249.427629] Call Trace:
[ 249.430164] <TASK>
[ 249.433565] ? show_regs+0x64/0x70
[ 249.437055] ? __warn+0x88/0x150
[ 249.441607] ? kvmalloc_node+0xd1/0xe0
[ 249.445472] ? report_bug+0x171/0x1a0
[ 249.450429] ? handle_bug+0x5b/0x90
[ 249.454012] ? exc_invalid_op+0x1c/0x70
[ 249.459276] ? asm_exc_invalid_op+0x1f/0x30
[ 249.464764] ? kvmalloc_node+0xd1/0xe0
[ 249.468624] alloc_fdtable+0x74/0x100
[ 249.473588] expand_files+0x62/0x300
[ 249.477318] ? do_prlimit+0x132/0x210
[ 249.482288] ksys_dup3+0x70/0x110
[ 249.485700] __x64_sys_dup2+0x2a/0xa0
[ 249.490686] x64_sys_call+0x1b43/0x1c90
[ 249.494637] do_syscall_64+0x39/0x90
[ 249.499508] entry_SYSCALL_64_after_hwframe+0x78/0xe2
[ 249.504671] RIP: 0033:0x7efe6d68ec17
[ 249.509543] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[ 249.528403] RSP: 002b:00007ffc34781ca8 EFLAGS: 00000202 ORIG_RAX: 0000000000000021
[ 249.537259] RAX: ffffffffffffffda RBX: 00007ffc34782508 RCX: 00007efe6d68ec17
[ 249.544473] RDX: 00007ffc34781cd0 RSI: 0000000040000038 RDI: 0000000000000002
[ 249.552900] RBP: 00007ffc34781ed0 R08: 0000000000000064 R09: 0000000000000000
[ 249.560085] R10: 00007efe6d5ab170 R11: 0000000000000202 R12: 0000000000000000
[ 249.568537] R13: 00007ffc34782518 R14: 00007efe6d7c4000 R15: 0000564edeb77dd8
[ 249.575736] </TASK>
[ 249.579239] ---[ end trace 0000000000000000 ]---