[ 0.000000] Linux version 6.11.0-rc2-00008-g2377a7d90f5b (kbuild@45e5549ea11f) (gcc-12 (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40) #1 SMP PREEMPT_DYNAMIC Thu Aug 22 21:35:15 CST 2024 [ 0.000000] Command line: ip=::::lkp-csl-d02::dhcp root=/dev/ram0 RESULT_ROOT=/result/kunit/group-00/lkp-csl-d02/debian-12-x86_64-20240206.cgz/x86_64-rhel-8.3-kunit/gcc-12/2377a7d90f5bb2ccc302b5fb0e6ba4c67cf24ddd/3 BOOT_IMAGE=/pkg/linux/x86_64-rhel-8.3-kunit/gcc-12/2377a7d90f5bb2ccc302b5fb0e6ba4c67cf24ddd/vmlinuz-6.11.0-rc2-00008-g2377a7d90f5b branch=linux-next/master job=/lkp/jobs/scheduled/lkp-csl-d02/kunit-group-00-debian-12-x86_64-20240206.cgz-2377a7d90f5b-20240823-137313-1l6zztg-3.yaml user=lkp ARCH=x86_64 kconfig=x86_64-rhel-8.3-kunit commit=2377a7d90f5bb2ccc302b5fb0e6ba4c67cf24ddd kunit.enable=1 intremap=posted_msi acpi_rsdp=0x36983000 max_uptime=6000 LKP_SERVER=10.239.97.5 nokaslr selinux=0 debug apic=debug sysrq_always_enabled rcupdate.rcu_cpu_stall_timeout=100 net.ifnames=0 printk.devkmsg=on panic=-1 softlockup_panic=1 nmi_watchdog=panic oops=panic load_ramdisk=2 prompt_ramdisk=0 drbd.minor_count=8 systemd.log_level=err ignore_loglevel console=tty0 earlyprintk=ttyS0,115200 console=ttyS0,115200 vga=normal rw [ 0.000000] BIOS-provided physical RAM map: [ 0.000000] BIOS-e820: [mem 0x0000000000000400-0x000000000009ffff] usable [ 0.000000] BIOS-e820: [mem 0x00000000000a0000-0x00000000000fffff] reserved [ 0.000000] BIOS-e820: [mem 0x0000000000100000-0x000000003569bfff] usable [ 0.000000] BIOS-e820: [mem 0x000000003569c000-0x0000000036683fff] reserved [ 0.000000] BIOS-e820: [mem 0x0000000036684000-0x0000000036982fff] usable [ 0.000000] BIOS-e820: [mem 0x0000000036983000-0x00000000377c7fff] ACPI NVS [ 0.000000] BIOS-e820: [mem 0x00000000377c8000-0x00000000386b2fff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000386b3000-0x000000004fffffff] usable [ 0.000000] BIOS-e820: [mem 0x0000000050000000-0x000000006fffffff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000fed00000-0x00000000fed00fff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved [ 0.000000] BIOS-e820: [mem 0x0000000100000000-0x000000209fffffff] usable [ 0.000000] random: crng init done [ 0.000000] printk: debug: ignoring loglevel setting. [ 0.000000] printk: legacy bootconsole [earlyser0] enabled [ 0.000000] NX (Execute Disable) protection: active [ 0.000000] APIC: Static calls initialized [ 0.000000] e820: update [mem 0x00100000-0x0010000f] usable ==> usable [ 0.000000] extended physical RAM map: [ 0.000000] reserve setup_data: [mem 0x0000000000000400-0x000000000009ffff] usable [ 0.000000] reserve setup_data: [mem 0x00000000000a0000-0x00000000000fffff] reserved [ 0.000000] reserve setup_data: [mem 0x0000000000100000-0x000000000010000f] usable [ 0.000000] reserve setup_data: [mem 0x0000000000100010-0x000000003569bfff] usable [ 0.000000] reserve setup_data: [mem 0x000000003569c000-0x0000000036683fff] reserved [ 0.000000] reserve setup_data: [mem 0x0000000036684000-0x0000000036982fff] usable [ 0.000000] reserve setup_data: [mem 0x0000000036983000-0x00000000377c7fff] ACPI NVS [ 0.000000] reserve setup_data: [mem 0x00000000377c8000-0x00000000386b2fff] reserved [ 0.000000] reserve setup_data: [mem 0x00000000386b3000-0x000000004fffffff] usable [ 0.000000] reserve setup_data: [mem 0x0000000050000000-0x000000006fffffff] reserved [ 0.000000] reserve setup_data: [mem 0x00000000fe000000-0x00000000fe010fff] reserved [ 0.000000] reserve setup_data: [mem 0x00000000fec00000-0x00000000fec00fff] reserved [ 0.000000] reserve setup_data: [mem 0x00000000fed00000-0x00000000fed00fff] reserved [ 0.000000] reserve setup_data: [mem 0x00000000fee00000-0x00000000fee00fff] reserved [ 0.000000] reserve setup_data: [mem 0x00000000ff000000-0x00000000ffffffff] reserved [ 0.000000] reserve setup_data: [mem 0x0000000100000000-0x000000209fffffff] usable [ 0.000000] SMBIOS 3.0.0 present. [ 0.000000] DMI: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 0.000000] DMI: Memory slots populated: 8/8 [ 0.000000] tsc: Detected 3000.000 MHz processor [ 0.000869] e820: update [mem 0x00000000-0x00000fff] usable ==> reserved [ 0.001468] e820: remove [mem 0x000a0000-0x000fffff] usable [ 0.001978] last_pfn = 0x20a0000 max_arch_pfn = 0x400000000 [ 0.002488] total RAM covered: 131056M [ 0.003098] gran_size: 64K chunk_size: 64K num_reg: 10 lose cover RAM: 68096M [ 0.003764] gran_size: 64K chunk_size: 128K num_reg: 10 lose cover RAM: 68096M [ 0.004437] gran_size: 64K chunk_size: 256K num_reg: 10 lose cover RAM: 68096M [ 0.005108] gran_size: 64K chunk_size: 512K num_reg: 10 lose cover RAM: 68096M [ 0.005781] gran_size: 64K chunk_size: 1M num_reg: 10 lose cover RAM: 68096M [ 0.006439] gran_size: 64K chunk_size: 2M num_reg: 10 lose cover RAM: 68096M [ 0.007096] gran_size: 64K chunk_size: 4M num_reg: 10 lose cover RAM: 68096M [ 0.007755] gran_size: 64K chunk_size: 8M num_reg: 10 lose cover RAM: 68096M [ 0.008412] gran_size: 64K chunk_size: 16M num_reg: 10 lose cover RAM: 68096M [ 0.009077] gran_size: 64K chunk_size: 32M num_reg: 10 lose cover RAM: 0G [ 0.009714] gran_size: 64K chunk_size: 64M num_reg: 10 lose cover RAM: 0G [ 0.010350] gran_size: 64K chunk_size: 128M num_reg: 10 lose cover RAM: 0G [ 0.010995] gran_size: 64K chunk_size: 256M num_reg: 10 lose cover RAM: 0G [ 0.011639] gran_size: 64K chunk_size: 512M num_reg: 10 lose cover RAM: 0G [ 0.012283] *BAD*gran_size: 64K chunk_size: 1G num_reg: 10 lose cover RAM: -512M [ 0.012962] *BAD*gran_size: 64K chunk_size: 2G num_reg: 10 lose cover RAM: -1G [ 0.013627] gran_size: 128K chunk_size: 128K num_reg: 10 lose cover RAM: 68096M [ 0.014306] gran_size: 128K chunk_size: 256K num_reg: 10 lose cover RAM: 68096M [ 0.014985] gran_size: 128K chunk_size: 512K num_reg: 10 lose cover RAM: 68096M [ 0.015663] gran_size: 128K chunk_size: 1M num_reg: 10 lose cover RAM: 68096M [ 0.016328] gran_size: 128K chunk_size: 2M num_reg: 10 lose cover RAM: 68096M [ 0.016992] gran_size: 128K chunk_size: 4M num_reg: 10 lose cover RAM: 68096M [ 0.017657] gran_size: 128K chunk_size: 8M num_reg: 10 lose cover RAM: 68096M [ 0.018321] gran_size: 128K chunk_size: 16M num_reg: 10 lose cover RAM: 68096M [ 0.018993] gran_size: 128K chunk_size: 32M num_reg: 10 lose cover RAM: 0G [ 0.019637] gran_size: 128K chunk_size: 64M num_reg: 10 lose cover RAM: 0G [ 0.020282] gran_size: 128K chunk_size: 128M num_reg: 10 lose cover RAM: 0G [ 0.020932] gran_size: 128K chunk_size: 256M num_reg: 10 lose cover RAM: 0G [ 0.021582] gran_size: 128K chunk_size: 512M num_reg: 10 lose cover RAM: 0G [ 0.022233] *BAD*gran_size: 128K chunk_size: 1G num_reg: 10 lose cover RAM: -512M [ 0.022918] *BAD*gran_size: 128K chunk_size: 2G num_reg: 10 lose cover RAM: -1G [ 0.023590] gran_size: 256K chunk_size: 256K num_reg: 10 lose cover RAM: 68096M [ 0.024268] gran_size: 256K chunk_size: 512K num_reg: 10 lose cover RAM: 68096M [ 0.024946] gran_size: 256K chunk_size: 1M num_reg: 10 lose cover RAM: 68096M [ 0.025610] gran_size: 256K chunk_size: 2M num_reg: 10 lose cover RAM: 68096M [ 0.026275] gran_size: 256K chunk_size: 4M num_reg: 10 lose cover RAM: 68096M [ 0.026939] gran_size: 256K chunk_size: 8M num_reg: 10 lose cover RAM: 68096M [ 0.027603] gran_size: 256K chunk_size: 16M num_reg: 10 lose cover RAM: 68096M [ 0.028275] gran_size: 256K chunk_size: 32M num_reg: 10 lose cover RAM: 0G [ 0.028919] gran_size: 256K chunk_size: 64M num_reg: 10 lose cover RAM: 0G [ 0.029562] gran_size: 256K chunk_size: 128M num_reg: 10 lose cover RAM: 0G [ 0.030213] gran_size: 256K chunk_size: 256M num_reg: 10 lose cover RAM: 0G [ 0.030864] gran_size: 256K chunk_size: 512M num_reg: 10 lose cover RAM: 0G [ 0.031513] *BAD*gran_size: 256K chunk_size: 1G num_reg: 10 lose cover RAM: -512M [ 0.032199] *BAD*gran_size: 256K chunk_size: 2G num_reg: 10 lose cover RAM: -1G [ 0.032871] gran_size: 512K chunk_size: 512K num_reg: 10 lose cover RAM: 68096M [ 0.033549] gran_size: 512K chunk_size: 1M num_reg: 10 lose cover RAM: 68096M [ 0.034213] gran_size: 512K chunk_size: 2M num_reg: 10 lose cover RAM: 68096M [ 0.034878] gran_size: 512K chunk_size: 4M num_reg: 10 lose cover RAM: 68096M [ 0.035542] gran_size: 512K chunk_size: 8M num_reg: 10 lose cover RAM: 68096M [ 0.036206] gran_size: 512K chunk_size: 16M num_reg: 10 lose cover RAM: 68096M [ 0.036877] gran_size: 512K chunk_size: 32M num_reg: 10 lose cover RAM: 0G [ 0.037521] gran_size: 512K chunk_size: 64M num_reg: 10 lose cover RAM: 0G [ 0.038166] gran_size: 512K chunk_size: 128M num_reg: 10 lose cover RAM: 0G [ 0.038816] gran_size: 512K chunk_size: 256M num_reg: 10 lose cover RAM: 0G [ 0.039466] gran_size: 512K chunk_size: 512M num_reg: 10 lose cover RAM: 0G [ 0.040116] *BAD*gran_size: 512K chunk_size: 1G num_reg: 10 lose cover RAM: -512M [ 0.040801] *BAD*gran_size: 512K chunk_size: 2G num_reg: 10 lose cover RAM: -1G [ 0.041472] gran_size: 1M chunk_size: 1M num_reg: 10 lose cover RAM: 68096M [ 0.042123] gran_size: 1M chunk_size: 2M num_reg: 10 lose cover RAM: 68096M [ 0.042773] gran_size: 1M chunk_size: 4M num_reg: 10 lose cover RAM: 68096M [ 0.043424] gran_size: 1M chunk_size: 8M num_reg: 10 lose cover RAM: 68096M [ 0.044074] gran_size: 1M chunk_size: 16M num_reg: 10 lose cover RAM: 68096M [ 0.044731] gran_size: 1M chunk_size: 32M num_reg: 10 lose cover RAM: 0G [ 0.045361] gran_size: 1M chunk_size: 64M num_reg: 10 lose cover RAM: 0G [ 0.045991] gran_size: 1M chunk_size: 128M num_reg: 10 lose cover RAM: 0G [ 0.046627] gran_size: 1M chunk_size: 256M num_reg: 10 lose cover RAM: 0G [ 0.047264] gran_size: 1M chunk_size: 512M num_reg: 10 lose cover RAM: 0G [ 0.047901] *BAD*gran_size: 1M chunk_size: 1G num_reg: 10 lose cover RAM: -512M [ 0.048572] *BAD*gran_size: 1M chunk_size: 2G num_reg: 10 lose cover RAM: -1G [ 0.049229] gran_size: 2M chunk_size: 2M num_reg: 10 lose cover RAM: 68096M [ 0.049880] gran_size: 2M chunk_size: 4M num_reg: 10 lose cover RAM: 68096M [ 0.050530] gran_size: 2M chunk_size: 8M num_reg: 10 lose cover RAM: 68096M [ 0.051181] gran_size: 2M chunk_size: 16M num_reg: 10 lose cover RAM: 68096M [ 0.051838] gran_size: 2M chunk_size: 32M num_reg: 10 lose cover RAM: 0G [ 0.052468] gran_size: 2M chunk_size: 64M num_reg: 10 lose cover RAM: 0G [ 0.053098] gran_size: 2M chunk_size: 128M num_reg: 10 lose cover RAM: 0G [ 0.053735] gran_size: 2M chunk_size: 256M num_reg: 10 lose cover RAM: 0G [ 0.054371] gran_size: 2M chunk_size: 512M num_reg: 10 lose cover RAM: 0G [ 0.055007] *BAD*gran_size: 2M chunk_size: 1G num_reg: 10 lose cover RAM: -512M [ 0.055679] *BAD*gran_size: 2M chunk_size: 2G num_reg: 10 lose cover RAM: -1G [ 0.056336] gran_size: 4M chunk_size: 4M num_reg: 10 lose cover RAM: 68096M [ 0.056986] gran_size: 4M chunk_size: 8M num_reg: 10 lose cover RAM: 68096M [ 0.057637] gran_size: 4M chunk_size: 16M num_reg: 10 lose cover RAM: 68096M [ 0.058294] gran_size: 4M chunk_size: 32M num_reg: 10 lose cover RAM: 0G [ 0.058923] gran_size: 4M chunk_size: 64M num_reg: 10 lose cover RAM: 0G [ 0.059553] gran_size: 4M chunk_size: 128M num_reg: 10 lose cover RAM: 0G [ 0.060189] gran_size: 4M chunk_size: 256M num_reg: 10 lose cover RAM: 0G [ 0.060825] gran_size: 4M chunk_size: 512M num_reg: 10 lose cover RAM: 0G [ 0.061462] *BAD*gran_size: 4M chunk_size: 1G num_reg: 10 lose cover RAM: -512M [ 0.062133] *BAD*gran_size: 4M chunk_size: 2G num_reg: 10 lose cover RAM: -1G [ 0.062791] gran_size: 8M chunk_size: 8M num_reg: 10 lose cover RAM: 68096M [ 0.063442] gran_size: 8M chunk_size: 16M num_reg: 10 lose cover RAM: 68096M [ 0.064100] gran_size: 8M chunk_size: 32M num_reg: 10 lose cover RAM: 0G [ 0.064729] gran_size: 8M chunk_size: 64M num_reg: 10 lose cover RAM: 0G [ 0.065358] gran_size: 8M chunk_size: 128M num_reg: 10 lose cover RAM: 0G [ 0.065996] gran_size: 8M chunk_size: 256M num_reg: 10 lose cover RAM: 0G [ 0.066632] gran_size: 8M chunk_size: 512M num_reg: 10 lose cover RAM: 0G [ 0.067269] *BAD*gran_size: 8M chunk_size: 1G num_reg: 10 lose cover RAM: -512M [ 0.067940] *BAD*gran_size: 8M chunk_size: 2G num_reg: 10 lose cover RAM: -1G [ 0.068598] gran_size: 16M chunk_size: 16M num_reg: 10 lose cover RAM: 68096M [ 0.069263] gran_size: 16M chunk_size: 32M num_reg: 10 lose cover RAM: 0G [ 0.069899] gran_size: 16M chunk_size: 64M num_reg: 10 lose cover RAM: 0G [ 0.070537] gran_size: 16M chunk_size: 128M num_reg: 10 lose cover RAM: 0G [ 0.071181] gran_size: 16M chunk_size: 256M num_reg: 10 lose cover RAM: 0G [ 0.071824] gran_size: 16M chunk_size: 512M num_reg: 10 lose cover RAM: 0G [ 0.072468] *BAD*gran_size: 16M chunk_size: 1G num_reg: 10 lose cover RAM: -512M [ 0.073147] *BAD*gran_size: 16M chunk_size: 2G num_reg: 10 lose cover RAM: -1G [ 0.073812] gran_size: 32M chunk_size: 32M num_reg: 10 lose cover RAM: 2576M [ 0.074470] gran_size: 32M chunk_size: 64M num_reg: 10 lose cover RAM: 16M [ 0.075113] gran_size: 32M chunk_size: 128M num_reg: 10 lose cover RAM: 16M [ 0.075764] gran_size: 32M chunk_size: 256M num_reg: 10 lose cover RAM: 16M [ 0.076415] gran_size: 32M chunk_size: 512M num_reg: 10 lose cover RAM: 16M [ 0.077065] *BAD*gran_size: 32M chunk_size: 1G num_reg: 10 lose cover RAM: -496M [ 0.077744] *BAD*gran_size: 32M chunk_size: 2G num_reg: 10 lose cover RAM: -1008M [ 0.078429] gran_size: 64M chunk_size: 64M num_reg: 10 lose cover RAM: 560M [ 0.079080] gran_size: 64M chunk_size: 128M num_reg: 10 lose cover RAM: 48M [ 0.079730] gran_size: 64M chunk_size: 256M num_reg: 10 lose cover RAM: 48M [ 0.080382] gran_size: 64M chunk_size: 512M num_reg: 10 lose cover RAM: 48M [ 0.081032] *BAD*gran_size: 64M chunk_size: 1G num_reg: 10 lose cover RAM: -464M [ 0.081710] *BAD*gran_size: 64M chunk_size: 2G num_reg: 10 lose cover RAM: -976M [ 0.082389] gran_size: 128M chunk_size: 128M num_reg: 10 lose cover RAM: 112M [ 0.083053] gran_size: 128M chunk_size: 256M num_reg: 10 lose cover RAM: 112M [ 0.083717] gran_size: 128M chunk_size: 512M num_reg: 10 lose cover RAM: 112M [ 0.084382] *BAD*gran_size: 128M chunk_size: 1G num_reg: 10 lose cover RAM: -400M [ 0.085067] *BAD*gran_size: 128M chunk_size: 2G num_reg: 10 lose cover RAM: -912M [ 0.085753] gran_size: 256M chunk_size: 256M num_reg: 9 lose cover RAM: 240M [ 0.086411] gran_size: 256M chunk_size: 512M num_reg: 10 lose cover RAM: 240M [ 0.087076] *BAD*gran_size: 256M chunk_size: 1G num_reg: 10 lose cover RAM: -272M [ 0.087762] *BAD*gran_size: 256M chunk_size: 2G num_reg: 10 lose cover RAM: -784M [ 0.088448] gran_size: 512M chunk_size: 512M num_reg: 8 lose cover RAM: 496M [ 0.089106] gran_size: 512M chunk_size: 1G num_reg: 9 lose cover RAM: 496M [ 0.089750] gran_size: 512M chunk_size: 2G num_reg: 9 lose cover RAM: 496M [ 0.090393] gran_size: 1G chunk_size: 1G num_reg: 7 lose cover RAM: 1008M [ 0.091030] gran_size: 1G chunk_size: 2G num_reg: 7 lose cover RAM: 1008M [ 0.091667] gran_size: 2G chunk_size: 2G num_reg: 6 lose cover RAM: 2032M [ 0.092304] mtrr_cleanup: can not find optimal value [ 0.092757] please specify mtrr_gran_size/mtrr_chunk_size [ 0.093248] MTRR map: 6 entries (3 fixed + 3 variable; max 23), built from 10 variable MTRRs [ 0.093983] x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT [ 0.094980] e820: update [mem 0x5f000000-0xffffffff] usable ==> reserved [ 0.095578] last_pfn = 0x50000 max_arch_pfn = 0x400000000 [ 0.096067] Scan for SMP in [mem 0x00000000-0x000003ff] [ 0.096558] Scan for SMP in [mem 0x0009fc00-0x0009ffff] [ 0.097048] Scan for SMP in [mem 0x000f0000-0x000fffff] [ 0.103677] found SMP MP-table at [mem 0x000fd040-0x000fd04f] [ 0.104195] mpc: fcb30-fcec4 [ 0.104507] Using GB pages for direct mapping [ 0.106015] RAMDISK: [mem 0x20819d7000-0x20983fffff] [ 0.106472] ACPI: Early table checksum verification disabled [ 0.106983] ACPI: RSDP 0x0000000036983000 000024 (v02 ALASKA) [ 0.107505] ACPI: XSDT 0x00000000369830D8 00012C (v01 ALASKA A M I 01072009 AMI 00010013) [ 0.108252] ACPI: FACP 0x00000000369A2A28 000114 (v06 ALASKA A M I 01072009 AMI 00010013) [ 0.108999] ACPI: DSDT 0x0000000036983298 01F790 (v02 ALASKA A M I 01072009 INTL 20160422) [ 0.109742] ACPI: FACS 0x00000000377C5080 000040 [ 0.110172] ACPI: FPDT 0x00000000369A2B40 000044 (v01 ALASKA A M I 01072009 AMI 00010013) [ 0.110915] ACPI: FIDT 0x00000000369A2B88 00009C (v01 ALASKA A M I 01072009 AMI 00010013) [ 0.111658] ACPI: SSDT 0x00000000369A2C28 007A36 (v01 GBT GSWApp 00000001 INTL 20160422) [ 0.112402] ACPI: UEFI 0x00000000369AA660 000042 (v01 ALASKA A M I 00000002 01000013) [ 0.113144] ACPI: MCFG 0x00000000369AA6A8 00003C (v01 ALASKA A M I 01072009 MSFT 00000097) [ 0.113887] ACPI: HPET 0x00000000369AA6E8 000038 (v01 ALASKA A M I 00000001 INTL 20091013) [ 0.114630] ACPI: APIC 0x00000000369AA720 00071E (v03 ALASKA A M I 00000000 INTL 20091013) [ 0.115374] ACPI: MCFG 0x00000000369AAE40 00003C (v01 ALASKA A M I 00000001 INTL 20091013) [ 0.116117] ACPI: MIGT 0x00000000369AAE80 000040 (v01 ALASKA A M I 00000000 INTL 20091013) [ 0.116860] ACPI: MSCT 0x00000000369AAEC0 00004E (v01 ALASKA A M I 00000001 INTL 20091013) [ 0.117603] ACPI: PCCT 0x00000000369AAF10 00006E (v01 ALASKA A M I 00000002 INTL 20091013) [ 0.118346] ACPI: RASF 0x00000000369AAF80 000030 (v01 ALASKA A M I 00000001 INTL 20091013) [ 0.119089] ACPI: SLIT 0x00000000369AAFB0 00006C (v01 ALASKA A M I 00000001 INTL 20091013) [ 0.119832] ACPI: SRAT 0x00000000369AB020 000A30 (v03 ALASKA A M I 00000002 INTL 20091013) [ 0.120575] ACPI: SVOS 0x00000000369ABA50 000032 (v01 ALASKA A M I 00000000 INTL 20091013) [ 0.121318] ACPI: WDDT 0x00000000369ABA88 000040 (v01 ALASKA A M I 00000000 INTL 20091013) [ 0.122060] ACPI: OEM4 0x00000000369ABAC8 029A72 (v02 INTEL CPU CST 00003000 INTL 20160422) [ 0.122804] ACPI: OEM1 0x00000000369D5540 00ABCB (v02 INTEL CPU EIST 00003000 INTL 20160422) [ 0.123547] ACPI: OEM2 0x00000000369E0110 006AB0 (v02 INTEL CPU HWP 00003000 INTL 20160422) [ 0.124290] ACPI: SSDT 0x00000000369E6BC0 00D427 (v02 INTEL SSDT PM 00004000 INTL 20160422) [ 0.125033] ACPI: NITR 0x00000000369F3FE8 000071 (v02 ALASKA A M I 00000001 INTL 20091013) [ 0.125776] ACPI: SSDT 0x00000000369F4060 000956 (v02 ALASKA A M I 00000000 INTL 20091013) [ 0.126519] ACPI: LPIT 0x00000000369F49B8 000094 (v01 INTEL SKL 00000000 MSFT 0000005F) [ 0.127263] ACPI: WSMT 0x00000000369F4A50 000028 (v01 INTEL SKL 00000000 MSFT 0000005F) [ 0.128007] ACPI: WDAT 0x00000000369F4A78 000134 (v01 INTEL SKL 00000000 MSFT 0000005F) [ 0.128750] ACPI: SSDT 0x00000000369F4BB0 00029F (v02 INTEL sensrhub 00000000 INTL 20160422) [ 0.129493] ACPI: SSDT 0x00000000369F4E50 003002 (v02 INTEL PtidDevc 00001000 INTL 20160422) [ 0.130237] ACPI: DBGP 0x00000000369F7E58 000034 (v01 INTEL 00000002 MSFT 0000005F) [ 0.130981] ACPI: DBG2 0x00000000369F7E90 000054 (v00 INTEL 00000002 MSFT 0000005F) [ 0.131724] ACPI: BGRT 0x00000000369F7EE8 000038 (v01 ALASKA A M I 01072009 AMI 00010013) [ 0.132466] ACPI: DMAR 0x00000000369F7F20 0000D8 (v01 ALASKA A M I 00000001 INTL 20091013) [ 0.133210] ACPI: WSMT 0x00000000369F7FF8 000028 (v01 ALASKA A M I 01072009 AMI 00010013) [ 0.133952] ACPI: Reserving FACP table memory at [mem 0x369a2a28-0x369a2b3b] [ 0.134574] ACPI: Reserving DSDT table memory at [mem 0x36983298-0x369a2a27] [ 0.135197] ACPI: Reserving FACS table memory at [mem 0x377c5080-0x377c50bf] [ 0.135818] ACPI: Reserving FPDT table memory at [mem 0x369a2b40-0x369a2b83] [ 0.136440] ACPI: Reserving FIDT table memory at [mem 0x369a2b88-0x369a2c23] [ 0.137062] ACPI: Reserving SSDT table memory at [mem 0x369a2c28-0x369aa65d] [ 0.137683] ACPI: Reserving UEFI table memory at [mem 0x369aa660-0x369aa6a1] [ 0.138305] ACPI: Reserving MCFG table memory at [mem 0x369aa6a8-0x369aa6e3] [ 0.138926] ACPI: Reserving HPET table memory at [mem 0x369aa6e8-0x369aa71f] [ 0.139547] ACPI: Reserving APIC table memory at [mem 0x369aa720-0x369aae3d] [ 0.140169] ACPI: Reserving MCFG table memory at [mem 0x369aae40-0x369aae7b] [ 0.140791] ACPI: Reserving MIGT table memory at [mem 0x369aae80-0x369aaebf] [ 0.141413] ACPI: Reserving MSCT table memory at [mem 0x369aaec0-0x369aaf0d] [ 0.142035] ACPI: Reserving PCCT table memory at [mem 0x369aaf10-0x369aaf7d] [ 0.142657] ACPI: Reserving RASF table memory at [mem 0x369aaf80-0x369aafaf] [ 0.143278] ACPI: Reserving SLIT table memory at [mem 0x369aafb0-0x369ab01b] [ 0.143900] ACPI: Reserving SRAT table memory at [mem 0x369ab020-0x369aba4f] [ 0.144521] ACPI: Reserving SVOS table memory at [mem 0x369aba50-0x369aba81] [ 0.145142] ACPI: Reserving WDDT table memory at [mem 0x369aba88-0x369abac7] [ 0.145764] ACPI: Reserving OEM4 table memory at [mem 0x369abac8-0x369d5539] [ 0.146386] ACPI: Reserving OEM1 table memory at [mem 0x369d5540-0x369e010a] [ 0.147007] ACPI: Reserving OEM2 table memory at [mem 0x369e0110-0x369e6bbf] [ 0.147628] ACPI: Reserving SSDT table memory at [mem 0x369e6bc0-0x369f3fe6] [ 0.148249] ACPI: Reserving NITR table memory at [mem 0x369f3fe8-0x369f4058] [ 0.148871] ACPI: Reserving SSDT table memory at [mem 0x369f4060-0x369f49b5] [ 0.149493] ACPI: Reserving LPIT table memory at [mem 0x369f49b8-0x369f4a4b] [ 0.150116] ACPI: Reserving WSMT table memory at [mem 0x369f4a50-0x369f4a77] [ 0.150737] ACPI: Reserving WDAT table memory at [mem 0x369f4a78-0x369f4bab] [ 0.151359] ACPI: Reserving SSDT table memory at [mem 0x369f4bb0-0x369f4e4e] [ 0.151981] ACPI: Reserving SSDT table memory at [mem 0x369f4e50-0x369f7e51] [ 0.152602] ACPI: Reserving DBGP table memory at [mem 0x369f7e58-0x369f7e8b] [ 0.153223] ACPI: Reserving DBG2 table memory at [mem 0x369f7e90-0x369f7ee3] [ 0.153845] ACPI: Reserving BGRT table memory at [mem 0x369f7ee8-0x369f7f1f] [ 0.154467] ACPI: Reserving DMAR table memory at [mem 0x369f7f20-0x369f7ff7] [ 0.155089] ACPI: Reserving WSMT table memory at [mem 0x369f7ff8-0x369f801f] [ 0.155726] mapped APIC to ffffffffff5fc000 ( fee00000) [ 0.156311] SRAT: PXM 0 -> APIC 0x00 -> Node 0 [ 0.156724] SRAT: PXM 0 -> APIC 0x02 -> Node 0 [ 0.157137] SRAT: PXM 0 -> APIC 0x04 -> Node 0 [ 0.157550] SRAT: PXM 0 -> APIC 0x06 -> Node 0 [ 0.157962] SRAT: PXM 0 -> APIC 0x08 -> Node 0 [ 0.158374] SRAT: PXM 0 -> APIC 0x10 -> Node 0 [ 0.158787] SRAT: PXM 0 -> APIC 0x12 -> Node 0 [ 0.159199] SRAT: PXM 0 -> APIC 0x14 -> Node 0 [ 0.159612] SRAT: PXM 0 -> APIC 0x16 -> Node 0 [ 0.160025] SRAT: PXM 0 -> APIC 0x20 -> Node 0 [ 0.160437] SRAT: PXM 0 -> APIC 0x22 -> Node 0 [ 0.160849] SRAT: PXM 0 -> APIC 0x24 -> Node 0 [ 0.161262] SRAT: PXM 0 -> APIC 0x26 -> Node 0 [ 0.161674] SRAT: PXM 0 -> APIC 0x28 -> Node 0 [ 0.162086] SRAT: PXM 0 -> APIC 0x30 -> Node 0 [ 0.162499] SRAT: PXM 0 -> APIC 0x32 -> Node 0 [ 0.162911] SRAT: PXM 0 -> APIC 0x34 -> Node 0 [ 0.163323] SRAT: PXM 0 -> APIC 0x36 -> Node 0 [ 0.163736] SRAT: PXM 0 -> APIC 0x01 -> Node 0 [ 0.164148] SRAT: PXM 0 -> APIC 0x03 -> Node 0 [ 0.164560] SRAT: PXM 0 -> APIC 0x05 -> Node 0 [ 0.164973] SRAT: PXM 0 -> APIC 0x07 -> Node 0 [ 0.165385] SRAT: PXM 0 -> APIC 0x09 -> Node 0 [ 0.165798] SRAT: PXM 0 -> APIC 0x11 -> Node 0 [ 0.166210] SRAT: PXM 0 -> APIC 0x13 -> Node 0 [ 0.166623] SRAT: PXM 0 -> APIC 0x15 -> Node 0 [ 0.167035] SRAT: PXM 0 -> APIC 0x17 -> Node 0 [ 0.167447] SRAT: PXM 0 -> APIC 0x21 -> Node 0 [ 0.167859] SRAT: PXM 0 -> APIC 0x23 -> Node 0 [ 0.168272] SRAT: PXM 0 -> APIC 0x25 -> Node 0 [ 0.168683] SRAT: PXM 0 -> APIC 0x27 -> Node 0 [ 0.169096] SRAT: PXM 0 -> APIC 0x29 -> Node 0 [ 0.169508] SRAT: PXM 0 -> APIC 0x31 -> Node 0 [ 0.169920] SRAT: PXM 0 -> APIC 0x33 -> Node 0 [ 0.170332] SRAT: PXM 0 -> APIC 0x35 -> Node 0 [ 0.170745] SRAT: PXM 0 -> APIC 0x37 -> Node 0 [ 0.171162] ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0xffffffff] [ 0.171702] ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x209fffffff] [ 0.172269] NUMA: Initialized distance table, cnt=1 [ 0.172719] NUMA: Node 0 [mem 0x00000000-0xffffffff] + [mem 0x100000000-0x209fffffff] -> [mem 0x00000000-0x209fffffff] [ 0.173651] NODE_DATA(0) allocated [mem 0x209ffd4000-0x209fffefff] [ 0.174621] Zone ranges: [ 0.174881] DMA [mem 0x0000000000001000-0x0000000000ffffff] [ 0.175434] DMA32 [mem 0x0000000001000000-0x00000000ffffffff] [ 0.175988] Normal [mem 0x0000000100000000-0x000000209fffffff] [ 0.176541] Device empty [ 0.176828] Movable zone start for each node [ 0.177228] Early memory node ranges [ 0.177570] node 0: [mem 0x0000000000001000-0x000000000009ffff] [ 0.178130] node 0: [mem 0x0000000000100000-0x000000003569bfff] [ 0.178690] node 0: [mem 0x0000000036684000-0x0000000036982fff] [ 0.179249] node 0: [mem 0x00000000386b3000-0x000000004fffffff] [ 0.179807] node 0: [mem 0x0000000100000000-0x000000209fffffff] [ 0.180379] Initmem setup node 0 [mem 0x0000000000001000-0x000000209fffffff] [ 0.181009] On node 0, zone DMA: 1 pages in unavailable ranges [ 0.181647] On node 0, zone DMA: 96 pages in unavailable ranges [ 0.188562] On node 0, zone DMA32: 4072 pages in unavailable ranges [ 0.192219] On node 0, zone DMA32: 7472 pages in unavailable ranges [ 1.469952] kasan: KernelAddressSanitizer initialized [ 1.470569] ACPI: PM-Timer IO Port: 0x1808 [ 1.470974] ACPI: X2APIC_NMI (uid[0xffffffff] high level lint[0x1]) [ 1.471534] ACPI: LAPIC_NMI (acpi_id[0xff] high level lint[0x1]) [ 1.472098] IOAPIC[0]: apic_id 8, version 32, address 0xfec00000, GSI 0-23 [ 1.472710] IOAPIC[1]: apic_id 9, version 32, address 0xfec01000, GSI 24-31 [ 1.473328] IOAPIC[2]: apic_id 10, version 32, address 0xfec08000, GSI 32-39 [ 1.473952] IOAPIC[3]: apic_id 11, version 32, address 0xfec10000, GSI 40-47 [ 1.474576] IOAPIC[4]: apic_id 12, version 32, address 0xfec18000, GSI 48-55 [ 1.475200] ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) [ 1.475766] Int: type 0, pol 0, trig 0, bus 00, IRQ 00, APIC ID 8, APIC INT 02 [ 1.476403] ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) [ 1.476989] Int: type 0, pol 1, trig 3, bus 00, IRQ 09, APIC ID 8, APIC INT 09 [ 1.477625] Int: type 0, pol 0, trig 0, bus 00, IRQ 01, APIC ID 8, APIC INT 01 [ 1.478260] Int: type 0, pol 0, trig 0, bus 00, IRQ 03, APIC ID 8, APIC INT 03 [ 1.478895] Int: type 0, pol 0, trig 0, bus 00, IRQ 04, APIC ID 8, APIC INT 04 [ 1.479530] Int: type 0, pol 0, trig 0, bus 00, IRQ 05, APIC ID 8, APIC INT 05 [ 1.480165] Int: type 0, pol 0, trig 0, bus 00, IRQ 06, APIC ID 8, APIC INT 06 [ 1.480801] Int: type 0, pol 0, trig 0, bus 00, IRQ 07, APIC ID 8, APIC INT 07 [ 1.481436] Int: type 0, pol 0, trig 0, bus 00, IRQ 08, APIC ID 8, APIC INT 08 [ 1.482071] Int: type 0, pol 0, trig 0, bus 00, IRQ 0a, APIC ID 8, APIC INT 0a [ 1.482706] Int: type 0, pol 0, trig 0, bus 00, IRQ 0b, APIC ID 8, APIC INT 0b [ 1.483342] Int: type 0, pol 0, trig 0, bus 00, IRQ 0c, APIC ID 8, APIC INT 0c [ 1.483977] Int: type 0, pol 0, trig 0, bus 00, IRQ 0d, APIC ID 8, APIC INT 0d [ 1.484613] Int: type 0, pol 0, trig 0, bus 00, IRQ 0e, APIC ID 8, APIC INT 0e [ 1.485247] Int: type 0, pol 0, trig 0, bus 00, IRQ 0f, APIC ID 8, APIC INT 0f [ 1.485885] ACPI: Using ACPI (MADT) for SMP configuration information [ 1.486457] ACPI: HPET id: 0x8086a701 base: 0xfed00000 [ 1.486929] TSC deadline timer available [ 1.487303] CPU topo: Max. logical packages: 1 [ 1.487730] CPU topo: Max. logical dies: 1 [ 1.488155] CPU topo: Max. dies per package: 1 [ 1.488585] CPU topo: Max. threads per core: 2 [ 1.489011] CPU topo: Num. cores per package: 18 [ 1.489458] CPU topo: Num. threads per package: 36 [ 1.489904] CPU topo: Allowing 36 present CPUs plus 0 hotplug CPUs [ 1.490461] mapped IOAPIC to ffffffffff5fb000 (fec00000) [ 1.490942] mapped IOAPIC to ffffffffff5fa000 (fec01000) [ 1.491424] mapped IOAPIC to ffffffffff5f9000 (fec08000) [ 1.491906] mapped IOAPIC to ffffffffff5f8000 (fec10000) [ 1.492387] mapped IOAPIC to ffffffffff5f7000 (fec18000) [ 1.492886] PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] [ 1.493551] PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000fffff] [ 1.494213] PM: hibernation: Registered nosave memory: [mem 0x00100000-0x00100fff] [ 1.494877] PM: hibernation: Registered nosave memory: [mem 0x3569c000-0x36683fff] [ 1.495540] PM: hibernation: Registered nosave memory: [mem 0x36983000-0x377c7fff] [ 1.496203] PM: hibernation: Registered nosave memory: [mem 0x377c8000-0x386b2fff] [ 1.496867] PM: hibernation: Registered nosave memory: [mem 0x50000000-0x6fffffff] [ 1.497530] PM: hibernation: Registered nosave memory: [mem 0x70000000-0xfdffffff] [ 1.498192] PM: hibernation: Registered nosave memory: [mem 0xfe000000-0xfe010fff] [ 1.498854] PM: hibernation: Registered nosave memory: [mem 0xfe011000-0xfebfffff] [ 1.499516] PM: hibernation: Registered nosave memory: [mem 0xfec00000-0xfec00fff] [ 1.500178] PM: hibernation: Registered nosave memory: [mem 0xfec01000-0xfecfffff] [ 1.500840] PM: hibernation: Registered nosave memory: [mem 0xfed00000-0xfed00fff] [ 1.501503] PM: hibernation: Registered nosave memory: [mem 0xfed01000-0xfedfffff] [ 1.502165] PM: hibernation: Registered nosave memory: [mem 0xfee00000-0xfee00fff] [ 1.502828] PM: hibernation: Registered nosave memory: [mem 0xfee01000-0xfeffffff] [ 1.503490] PM: hibernation: Registered nosave memory: [mem 0xff000000-0xffffffff] [ 1.504153] [mem 0x70000000-0xfdffffff] available for PCI devices [ 1.504698] Booting paravirtualized kernel on bare hardware [ 1.505202] clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns [ 1.524297] setup_percpu: NR_CPUS:8192 nr_cpumask_bits:36 nr_cpu_ids:36 nr_node_ids:1 [ 1.527911] percpu: Embedded 81 pages/cpu s294912 r8192 d28672 u524288 [ 1.528508] pcpu-alloc: s294912 r8192 d28672 u524288 alloc=1*2097152 [ 1.529078] pcpu-alloc: [0] 00 01 02 03 [0] 04 05 06 07 [ 1.529570] pcpu-alloc: [0] 08 09 10 11 [0] 12 13 14 15 [ 1.530062] pcpu-alloc: [0] 16 17 18 19 [0] 20 21 22 23 [ 1.530555] pcpu-alloc: [0] 24 25 26 27 [0] 28 29 30 31 [ 1.531046] pcpu-alloc: [0] 32 33 34 35 [ 1.531456] Kernel command line: ip=::::lkp-csl-d02::dhcp root=/dev/ram0 RESULT_ROOT=/result/kunit/group-00/lkp-csl-d02/debian-12-x86_64-20240206.cgz/x86_64-rhel-8.3-kunit/gcc-12/2377a7d90f5bb2ccc302b5fb0e6ba4c67cf24ddd/3 BOOT_IMAGE=/pkg/linux/x86_64-rhel-8.3-kunit/gcc-12/2377a7d90f5bb2ccc302b5fb0e6ba4c67cf24ddd/vmlinuz-6.11.0-rc2-00008-g2377a7d90f5b branch=linux-next/master job=/lkp/jobs/scheduled/lkp-csl-d02/kunit-group-00-debian-12-x86_64-20240206.cgz-2377a7d90f5b-20240823-137313-1l6zztg-3.yaml user=lkp ARCH=x86_64 kconfig=x86_64-rhel-8.3-kunit commit=2377a7d90f5bb2ccc302b5fb0e6ba4c67cf24ddd kunit.enable=1 intremap=posted_msi acpi_rsdp=0x36983000 max_uptime=6000 LKP_SERVER=10.239.97.5 nokaslr selinux=0 debug apic=debug sysrq_always_enabled rcupdate.rcu_cpu_stall_timeout=100 net.ifnames=0 printk.devkmsg=on panic=-1 softlockup_panic=1 nmi_watchdog=panic oops=panic load_ramdisk=2 prompt_ramdisk=0 drbd.minor_count=8 systemd.log_level=err ignore_loglevel console=tty0 earlyprintk=ttyS0,115200 console=ttyS0,115200 vga=nor [ 1.531749] sysrq: sysrq always enabled. [ 1.539478] ignoring the deprecated load_ramdisk= option [ 1.540098] Unknown kernel command line parameters "nokaslr RESULT_ROOT=/result/kunit/group-00/lkp-csl-d02/debian-12-x86_64-20240206.cgz/x86_64-rhel-8.3-kunit/gcc-12/2377a7d90f5bb2ccc302b5fb0e6ba4c67cf24ddd/3 BOOT_IMAGE=/pkg/linux/x86_64-rhel-8.3-kunit/gcc-12/2377a7d90f5bb2ccc302b5fb0e6ba4c67cf24ddd/vmlinuz-6.11.0-rc2-00008-g2377a7d90f5b branch=linux-next/master job=/lkp/jobs/scheduled/lkp-csl-d02/kunit-group-00-debian-12-x86_64-20240206.cgz-2377a7d90f5b-20240823-137313-1l6zztg-3.yaml user=lkp ARCH=x86_64 kconfig=x86_64-rhel-8.3-kunit commit=2377a7d90f5bb2ccc302b5fb0e6ba4c67cf24ddd max_uptime=6000 LKP_SERVER=10.239.97.5 prompt_ramdisk=0 vga=normal", will be passed to user space. [ 1.550922] Dentry cache hash table entries: 8388608 (order: 14, 67108864 bytes, linear) [ 1.554572] Inode-cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) [ 1.556444] Fallback order for Node 0: 0 [ 1.556457] Built 1 zonelists, mobility grouping on. Total pages: 33477255 [ 1.557451] Policy zone: Normal [ 1.557998] mem auto-init: stack:all(zero), heap alloc:off, heap free:off [ 1.558605] stackdepot: allocating hash table via alloc_large_system_hash [ 1.559209] stackdepot hash table entries: 1048576 (order: 12, 16777216 bytes, linear) [ 1.561176] software IO TLB: area num 64. [ 1.834280] SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=36, Nodes=1 [ 1.835359] ftrace: allocating 57202 entries in 224 pages [ 1.835980] ftrace section at ffffffff86db4d10 sorted properly [ 1.848429] ftrace: allocated 224 pages with 3 groups [ 1.851591] Dynamic Preempt: voluntary [ 1.856425] rcu: Preemptible hierarchical RCU implementation. [ 1.856947] rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=36. [ 1.857555] RCU CPU stall warnings timeout set to 100 (rcu_cpu_stall_timeout). [ 1.858196] Trampoline variant of Tasks RCU enabled. [ 1.858656] Rude variant of Tasks RCU enabled. [ 1.859074] Tracing variant of Tasks RCU enabled. [ 1.859513] rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. [ 1.860183] rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=36 [ 1.861182] RCU Tasks: Setting shift to 6 and lim to 1 rcu_task_cb_adjust=1. [ 1.861808] RCU Tasks Rude: Setting shift to 6 and lim to 1 rcu_task_cb_adjust=1. [ 1.862468] RCU Tasks Trace: Setting shift to 6 and lim to 1 rcu_task_cb_adjust=1. [ 1.906713] NR_IRQS: 524544, nr_irqs: 1256, preallocated irqs: 16 [ 1.908200] rcu: srcu_init: Setting srcu_struct sizes based on contention. [ 1.909081] kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) [ 1.910396] Console: colour dummy device 80x25 [ 1.910812] printk: legacy console [tty0] enabled [ 1.912963] printk: legacy console [ttyS0] enabled [ 1.913860] printk: legacy bootconsole [earlyser0] disabled [ 1.915046] ACPI: Core revision 20240322 [ 1.916901] clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 79635855245 ns [ 1.917788] APIC: Switch to symmetric I/O mode setup [ 1.918261] DMAR: Host address width 46 [ 1.918641] DMAR: DRHD base: 0x000000b5ffc000 flags: 0x0 [ 1.919238] DMAR: dmar0: reg_base_addr b5ffc000 ver 1:0 cap 8d2078c106f0466 ecap f020df [ 1.919982] DMAR: DRHD base: 0x000000d8ffc000 flags: 0x0 [ 1.920545] DMAR: dmar1: reg_base_addr d8ffc000 ver 1:0 cap 8d2078c106f0466 ecap f020df [ 1.921289] DMAR: DRHD base: 0x000000fbffc000 flags: 0x0 [ 1.921871] DMAR: dmar2: reg_base_addr fbffc000 ver 1:0 cap 8d2078c106f0466 ecap f020df [ 1.922588] DMAR: DRHD base: 0x00000092ffc000 flags: 0x1 [ 1.923168] DMAR: dmar3: reg_base_addr 92ffc000 ver 1:0 cap 8d2078c106f0466 ecap f020df [ 1.923912] DMAR: RMRR base: 0x000000377bf000 end: 0x000000377c1fff [ 1.924505] DMAR: ATSR flags: 0x0 [ 1.924888] DMAR-IR: IOAPIC id 12 under DRHD base 0xfbffc000 IOMMU 2 [ 1.925479] DMAR-IR: IOAPIC id 11 under DRHD base 0xd8ffc000 IOMMU 1 [ 1.926095] DMAR-IR: IOAPIC id 10 under DRHD base 0xb5ffc000 IOMMU 0 [ 1.926684] DMAR-IR: IOAPIC id 8 under DRHD base 0x92ffc000 IOMMU 3 [ 1.927293] DMAR-IR: IOAPIC id 9 under DRHD base 0x92ffc000 IOMMU 3 [ 1.927902] DMAR-IR: HPET id 0 under DRHD base 0x92ffc000 [ 1.928408] DMAR-IR: x2apic is disabled because BIOS sets x2apic opt out bit. [ 1.928410] DMAR-IR: Use 'intremap=no_x2apic_optout' to override the BIOS setting. [ 1.930088] DMAR-IR: IRQ remapping was enabled on dmar2 but we are not in kdump mode [ 1.932013] DMAR-IR: Enabled IRQ remapping in xapic mode [ 1.932519] x2apic: IRQ remapping doesn't support X2APIC mode [ 1.933095] APIC: Switched APIC routing to: physical flat [ 1.933602] masked ExtINT on CPU#0 [ 1.934810] ENABLING IO-APIC IRQs [ 1.935286] init IO_APIC IRQs [ 1.935596] apic 8 pin 0 not connected [ 1.936020] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:0 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000000 SID:F0F8 SQ:0 SVT:1) [ 1.937191] IOAPIC[0]: Preconfigured routing entry (8-1 -> IRQ 1 Level:0 ActiveLow:0) [ 1.937938] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:0 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:30 Dest:00000000 SID:F0F8 SQ:0 SVT:1) [ 1.939107] IOAPIC[0]: Preconfigured routing entry (8-2 -> IRQ 0 Level:0 ActiveLow:0) [ 1.939863] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:0 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000000 SID:F0F8 SQ:0 SVT:1) [ 1.941032] IOAPIC[0]: Preconfigured routing entry (8-3 -> IRQ 3 Level:0 ActiveLow:0) [ 1.941781] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:0 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000000 SID:F0F8 SQ:0 SVT:1) [ 1.942949] IOAPIC[0]: Preconfigured routing entry (8-4 -> IRQ 4 Level:0 ActiveLow:0) [ 1.943701] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:0 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000000 SID:F0F8 SQ:0 SVT:1) [ 1.944869] IOAPIC[0]: Preconfigured routing entry (8-5 -> IRQ 5 Level:0 ActiveLow:0) [ 1.945633] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:0 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000000 SID:F0F8 SQ:0 SVT:1) [ 1.946800] IOAPIC[0]: Preconfigured routing entry (8-6 -> IRQ 6 Level:0 ActiveLow:0) [ 1.947551] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:0 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000000 SID:F0F8 SQ:0 SVT:1) [ 1.948718] IOAPIC[0]: Preconfigured routing entry (8-7 -> IRQ 7 Level:0 ActiveLow:0) [ 1.949467] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:0 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000000 SID:F0F8 SQ:0 SVT:1) [ 1.950635] IOAPIC[0]: Preconfigured routing entry (8-8 -> IRQ 8 Level:0 ActiveLow:0) [ 1.951384] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:0 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000000 SID:F0F8 SQ:0 SVT:1) [ 1.952553] IOAPIC[0]: Preconfigured routing entry (8-9 -> IRQ 9 Level:1 ActiveLow:0) [ 1.953308] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:0 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000000 SID:F0F8 SQ:0 SVT:1) [ 1.954477] IOAPIC[0]: Preconfigured routing entry (8-10 -> IRQ 10 Level:0 ActiveLow:0) [ 1.955241] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:0 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000000 SID:F0F8 SQ:0 SVT:1) [ 1.956408] IOAPIC[0]: Preconfigured routing entry (8-11 -> IRQ 11 Level:0 ActiveLow:0) [ 1.957171] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:0 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000000 SID:F0F8 SQ:0 SVT:1) [ 1.958340] IOAPIC[0]: Preconfigured routing entry (8-12 -> IRQ 12 Level:0 ActiveLow:0) [ 1.959103] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:0 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000000 SID:F0F8 SQ:0 SVT:1) [ 1.960271] IOAPIC[0]: Preconfigured routing entry (8-13 -> IRQ 13 Level:0 ActiveLow:0) [ 1.961041] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:0 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000000 SID:F0F8 SQ:0 SVT:1) [ 1.962210] IOAPIC[0]: Preconfigured routing entry (8-14 -> IRQ 14 Level:0 ActiveLow:0) [ 1.962974] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:0 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000000 SID:F0F8 SQ:0 SVT:1) [ 1.964142] IOAPIC[0]: Preconfigured routing entry (8-15 -> IRQ 15 Level:0 ActiveLow:0) [ 1.964871] apic 8 pin 16 not connected [ 1.965259] apic 8 pin 17 not connected [ 1.965645] apic 8 pin 18 not connected [ 1.966032] apic 8 pin 19 not connected [ 1.966419] apic 8 pin 20 not connected [ 1.966806] apic 8 pin 21 not connected [ 1.967193] apic 8 pin 22 not connected [ 1.967580] apic 8 pin 23 not connected [ 1.967966] apic 9 pin 0 not connected [ 1.968346] apic 9 pin 1 not connected [ 1.968726] apic 9 pin 2 not connected [ 1.969106] apic 9 pin 3 not connected [ 1.969485] apic 9 pin 4 not connected [ 1.969865] apic 9 pin 5 not connected [ 1.970245] apic 9 pin 6 not connected [ 1.970624] apic 9 pin 7 not connected [ 1.971004] apic 10 pin 0 not connected [ 1.971391] apic 10 pin 1 not connected [ 1.971777] apic 10 pin 2 not connected [ 1.972164] apic 10 pin 3 not connected [ 1.972550] apic 10 pin 4 not connected [ 1.972938] apic 10 pin 5 not connected [ 1.973324] apic 10 pin 6 not connected [ 1.973710] apic 10 pin 7 not connected [ 1.974097] apic 11 pin 0 not connected [ 1.974484] apic 11 pin 1 not connected [ 1.974870] apic 11 pin 2 not connected [ 1.975257] apic 11 pin 3 not connected [ 1.975644] apic 11 pin 4 not connected [ 1.976031] apic 11 pin 5 not connected [ 1.976417] apic 11 pin 6 not connected [ 1.976804] apic 11 pin 7 not connected [ 1.977190] apic 12 pin 0 not connected [ 1.977577] apic 12 pin 1 not connected [ 1.977965] apic 12 pin 2 not connected [ 1.978351] apic 12 pin 3 not connected [ 1.978738] apic 12 pin 4 not connected [ 1.979125] apic 12 pin 5 not connected [ 1.979512] apic 12 pin 6 not connected [ 1.979898] apic 12 pin 7 not connected [ 1.980447] ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 [ 1.985746] clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x2b3e459bf4c, max_idle_ns: 440795289890 ns [ 1.986674] Calibrating delay loop (skipped), value calculated using timer frequency.. 6000.00 BogoMIPS (lpj=3000000) [ 1.987703] CPU0: Thermal monitoring enabled (TM1) [ 1.988916] Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 [ 1.989673] Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 [ 1.990237] process: using mwait in idle threads [ 1.990674] Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization [ 1.991437] Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall and VM exit [ 1.991673] Spectre V2 : Mitigation: Enhanced / Automatic IBRS [ 1.992672] Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch [ 1.993409] Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT [ 1.993674] RETBleed: Mitigation: Enhanced IBRS [ 1.994114] Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier [ 1.994678] Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl [ 1.995682] TAA: Mitigation: TSX disabled [ 1.996076] MMIO Stale Data: Mitigation: Clear CPU buffers [ 1.996678] GDS: Mitigation: Microcode [ 1.997056] x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' [ 1.997673] x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' [ 1.998673] x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' [ 1.999255] x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' [ 1.999673] x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' [ 2.000213] x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' [ 2.000673] x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' [ 2.001256] x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' [ 2.001673] x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 [ 2.002673] x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 [ 2.003241] x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 [ 2.003673] x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 [ 2.004241] x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 [ 2.004673] x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 [ 2.005673] x86/fpu: Enabled xstate features 0xff, context size is 2560 bytes, using 'compacted' format. [ 2.039986] Freeing SMP alternatives memory: 48K [ 2.040436] pid_max: default: 36864 minimum: 301 [ 2.041064] LSM: initializing lsm=capability,yama,apparmor,ima,evm [ 2.041749] Yama: becoming mindful. [ 2.042349] AppArmor: AppArmor initialized [ 2.043075] Mount-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) [ 2.043749] Mountpoint-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) [ 2.047571] smpboot: CPU0: Intel(R) Core(TM) i9-10980XE CPU @ 3.00GHz (family: 0x6, model: 0x55, stepping: 0x7) [ 2.049357] Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. [ 2.049678] ... version: 4 [ 2.050072] ... bit width: 48 [ 2.050472] ... generic registers: 4 [ 2.050673] ... value mask: 0000ffffffffffff [ 2.051171] ... max period: 00007fffffffffff [ 2.051668] ... fixed-purpose events: 3 [ 2.052061] ... event mask: 000000070000000f [ 2.052781] signal: max sigframe size: 3632 [ 2.053208] Estimated ratio of average max frequency by base frequency (times 1024): 1604 [ 2.053834] rcu: Hierarchical SRCU implementation. [ 2.054292] rcu: Max phase no-delay instances is 400. [ 2.054953] Timer migration: 2 hierarchy levels; 8 children per group; 2 crossnode level [ 2.061500] NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. [ 2.064912] smp: Bringing up secondary CPUs ... [ 2.066106] smpboot: x86: Booting SMP configuration: [ 2.066580] .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 #9 #10 #11 #12 #13 #14 #15 #16 #17 [ 0.057732] masked ExtINT on CPU#1 [ 0.057732] masked ExtINT on CPU#2 [ 0.057732] masked ExtINT on CPU#3 [ 0.057732] masked ExtINT on CPU#4 [ 0.057732] masked ExtINT on CPU#5 [ 0.057732] masked ExtINT on CPU#6 [ 0.057732] masked ExtINT on CPU#7 [ 0.057732] masked ExtINT on CPU#8 [ 0.057732] masked ExtINT on CPU#9 [ 0.057732] masked ExtINT on CPU#10 [ 0.057732] masked ExtINT on CPU#11 [ 0.057732] masked ExtINT on CPU#12 [ 0.057732] masked ExtINT on CPU#13 [ 0.057732] masked ExtINT on CPU#14 [ 0.057732] masked ExtINT on CPU#15 [ 0.057732] masked ExtINT on CPU#16 [ 0.057732] masked ExtINT on CPU#17 [ 2.096902] #18 #19 #20 #21 #22 #23 #24 #25 #26 #27 #28 #29 #30 #31 #32 #33 #34 #35 [ 0.057732] masked ExtINT on CPU#18 [ 2.124892] MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. [ 0.057732] masked ExtINT on CPU#19 [ 0.057732] masked ExtINT on CPU#20 [ 0.057732] masked ExtINT on CPU#21 [ 0.057732] masked ExtINT on CPU#22 [ 0.057732] masked ExtINT on CPU#23 [ 0.057732] masked ExtINT on CPU#24 [ 0.057732] masked ExtINT on CPU#25 [ 0.057732] masked ExtINT on CPU#26 [ 0.057732] masked ExtINT on CPU#27 [ 0.057732] masked ExtINT on CPU#28 [ 0.057732] masked ExtINT on CPU#29 [ 0.057732] masked ExtINT on CPU#30 [ 0.057732] masked ExtINT on CPU#31 [ 0.057732] masked ExtINT on CPU#32 [ 0.057732] masked ExtINT on CPU#33 [ 0.057732] masked ExtINT on CPU#34 [ 0.057732] masked ExtINT on CPU#35 [ 2.136764] smp: Brought up 1 node, 36 CPUs [ 2.137711] smpboot: Total of 36 processors activated (216000.00 BogoMIPS) [ 2.210112] node 0 deferred pages initialised in 65ms [ 2.210721] Memory: 114332748K/133909020K available (53248K kernel code, 16352K rwdata, 12988K rodata, 7864K init, 9776K bss, 19524400K reserved, 0K cma-reserved) [ 2.219862] devtmpfs: initialized [ 2.220974] x86/mm: Memory block size: 2048MB [ 2.244842] ACPI: PM: Registering ACPI NVS region [mem 0x36983000-0x377c7fff] (14962688 bytes) [ 2.261847] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns [ 2.262697] futex hash table entries: 16384 (order: 8, 1048576 bytes, linear) [ 2.263851] Running postponed tracer tests: [ 2.264694] Testing tracer function: PASSED [ 2.574674] Testing dynamic ftrace: PASSED [ 2.822090] Testing dynamic ftrace ops #1: [ 2.954848] (1 0 1 0 0) [ 2.955261] (1 1 2 0 0) [ 3.065370] (2 1 3 0 2352794) [ 3.065651] (2 2 4 0 2355006) [ 3.100604] (3 2 4 0 2835107) [ 3.101682] (3 3 5 0 2835876) PASSED [ 3.200437] Testing dynamic ftrace ops #2: [ 3.440555] (1 0 1 2383659 0) [ 3.441675] (1 1 2 2384486 0) [ 3.866534] (2 1 3 6487657 2872804) [ 3.866704] (2 2 4 6488946 2874092) [ 3.953270] (3 2 4 7046833 3438490) [ 3.953695] (3 3 5 7048892 3440595) PASSED [ 4.298581] Testing ftrace recursion: PASSED [ 4.333674] Testing ftrace recursion safe: PASSED [ 4.368674] Testing ftrace regs: PASSED [ 4.404677] Testing tracer nop: PASSED [ 4.405064] Testing tracer wakeup: PASSED [ 4.600088] Testing tracer wakeup_rt: PASSED [ 4.797092] Testing tracer wakeup_dl: PASSED [ 4.994682] Testing tracer function_graph: PASSED [ 9.020680] Testing fgraph storage of 1 byte: PASSED [ 9.057674] Testing fgraph storage of 2 bytes: PASSED [ 9.093674] Testing fgraph storage of 4 bytes: PASSED [ 9.129674] Testing fgraph storage of 8 bytes: PASSED [ 9.165674] Testing multiple fgraph storage on a function: PASSED [ 9.803112] pinctrl core: initialized pinctrl subsystem [ 9.805397] NET: Registered PF_NETLINK/PF_ROUTE protocol family [ 9.807246] DMA: preallocated 4096 KiB GFP_KERNEL pool for atomic allocations [ 9.808769] DMA: preallocated 4096 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations [ 9.809548] DMA: preallocated 4096 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations [ 9.809805] audit: initializing netlink subsys (disabled) [ 9.810750] audit: type=2000 audit(1724389741.845:1): state=initialized audit_enabled=0 res=1 [ 9.811776] thermal_sys: Registered thermal governor 'fair_share' [ 9.811780] thermal_sys: Registered thermal governor 'bang_bang' [ 9.812342] thermal_sys: Registered thermal governor 'step_wise' [ 9.812673] thermal_sys: Registered thermal governor 'user_space' [ 9.813673] cpuidle: using governor menu [ 9.814324] Detected 1 PCC Subspaces [ 9.814672] Registering PCC driver as Mailbox controller [ 9.815923] acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 [ 9.817489] PCI: ECAM [mem 0x60000000-0x6fffffff] (base 0x60000000) for domain 0000 [bus 00-ff] [ 9.826496] PCI: Using configuration type 1 for base access [ 9.827774] kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. [ 9.830044] HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages [ 9.830675] HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page [ 9.831279] HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages [ 9.831673] HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page [ 9.835080] cryptd: max_cpu_qlen set to 1000 [ 9.838092] ACPI: Added _OSI(Module Device) [ 9.838504] ACPI: Added _OSI(Processor Device) [ 9.839673] ACPI: Added _OSI(3.0 _SCP Extensions) [ 9.840123] ACPI: Added _OSI(Processor Aggregator Device) [ 11.280193] ACPI: 6 ACPI AML tables successfully acquired and loaded [ 12.109061] ACPI: Dynamic OEM Table Load: [ 12.557494] ACPI: Dynamic OEM Table Load: [ 12.769034] ACPI: Dynamic OEM Table Load: [ 15.690078] ACPI: Interpreter enabled [ 15.690635] ACPI: PM: (supports S0 S3 S4 S5) [ 15.691212] ACPI: Using IOAPIC for interrupt routing [ 15.692185] PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug [ 15.692674] PCI: Using E820 reservations for host bridge windows [ 15.707656] ACPI: Enabled 9 GPEs in block 00 to 7F [ 16.623736] ACPI BIOS Error (bug): Could not resolve symbol [\SHAD._STA.SDS0], AE_NOT_FOUND (20240322/psargs-330) [ 16.624701] ACPI Error: Aborting method \SHAD._STA due to previous error (AE_NOT_FOUND) (20240322/psparse-529) [ 17.132296] ACPI: PCI Root Bridge [PC00] (domain 0000 [bus 00-15]) [ 17.133126] acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] [ 17.137802] acpi PNP0A08:00: _OSC: platform does not support [SHPCHotplug AER LTR] [ 17.146324] acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] [ 17.176409] PCI host bridge to bus 0000:00 [ 17.177286] pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] [ 17.177681] pci_bus 0000:00: root bus resource [io 0x1000-0x3fff window] [ 17.178307] pci_bus 0000:00: root bus resource [mem 0x000c4000-0x000c7fff window] [ 17.178680] pci_bus 0000:00: root bus resource [mem 0xfe010000-0xfe010fff window] [ 17.179361] pci_bus 0000:00: root bus resource [mem 0x70000000-0x92ffffff window] [ 17.181144] pci_bus 0000:00: root bus resource [mem 0x380000000000-0x380fffffffff window] [ 17.181682] pci_bus 0000:00: root bus resource [bus 00-15] [ 17.182254] pci 0000:00:00.0: [8086:2020] type 00 class 0x060000 PCIe Root Port [ 17.184461] pci 0000:00:04.0: [8086:2021] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.186030] pci 0000:00:04.0: BAR 0 [mem 0x92f64000-0x92f67fff 64bit] [ 17.188440] pci 0000:00:04.1: [8086:2021] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.188723] pci 0000:00:04.1: BAR 0 [mem 0x92f60000-0x92f63fff 64bit] [ 17.190988] pci 0000:00:04.2: [8086:2021] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.192691] pci 0000:00:04.2: BAR 0 [mem 0x92f5c000-0x92f5ffff 64bit] [ 17.195205] pci 0000:00:04.3: [8086:2021] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.195691] pci 0000:00:04.3: BAR 0 [mem 0x92f58000-0x92f5bfff 64bit] [ 17.197954] pci 0000:00:04.4: [8086:2021] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.198691] pci 0000:00:04.4: BAR 0 [mem 0x92f54000-0x92f57fff 64bit] [ 17.201264] pci 0000:00:04.5: [8086:2021] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.201691] pci 0000:00:04.5: BAR 0 [mem 0x92f50000-0x92f53fff 64bit] [ 17.203953] pci 0000:00:04.6: [8086:2021] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.205691] pci 0000:00:04.6: BAR 0 [mem 0x92f4c000-0x92f4ffff 64bit] [ 17.208455] pci 0000:00:04.7: [8086:2021] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.208691] pci 0000:00:04.7: BAR 0 [mem 0x92f48000-0x92f4bfff 64bit] [ 17.211414] pci 0000:00:05.0: [8086:2024] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.214329] pci 0000:00:05.2: [8086:2025] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.215346] pci 0000:00:05.4: [8086:2026] type 00 class 0x080020 PCIe Root Complex Integrated Endpoint [ 17.216686] pci 0000:00:05.4: BAR 0 [mem 0x92f6e000-0x92f6efff] [ 17.217816] pci 0000:00:08.0: [8086:2014] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.220524] pci 0000:00:08.1: [8086:2015] type 00 class 0x110100 conventional PCI endpoint [ 17.221176] pci 0000:00:08.2: [8086:2016] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.223253] pci 0000:00:14.0: [8086:a2af] type 00 class 0x0c0330 conventional PCI endpoint [ 17.223698] pci 0000:00:14.0: BAR 0 [mem 0x92f30000-0x92f3ffff 64bit] [ 17.224425] pci 0000:00:14.0: PME# supported from D3hot D3cold [ 17.232329] pci 0000:00:16.0: [8086:a2ba] type 00 class 0x078000 conventional PCI endpoint [ 17.233987] pci 0000:00:16.0: BAR 0 [mem 0x92f6d000-0x92f6dfff 64bit] [ 17.234774] pci 0000:00:16.0: PME# supported from D3hot [ 17.237745] pci 0000:00:17.0: [8086:a282] type 00 class 0x010601 conventional PCI endpoint [ 17.238503] pci 0000:00:17.0: BAR 0 [mem 0x92f68000-0x92f69fff] [ 17.238683] pci 0000:00:17.0: BAR 1 [mem 0x92f6c000-0x92f6c0ff] [ 17.239240] pci 0000:00:17.0: BAR 2 [io 0x3050-0x3057] [ 17.239802] pci 0000:00:17.0: BAR 3 [io 0x3040-0x3043] [ 17.240304] pci 0000:00:17.0: BAR 4 [io 0x3020-0x303f] [ 17.240683] pci 0000:00:17.0: BAR 5 [mem 0x92f6b000-0x92f6b7ff] [ 17.241331] pci 0000:00:17.0: PME# supported from D3hot [ 17.248825] pci 0000:00:1b.0: [8086:a2e7] type 01 class 0x060400 PCIe Root Port [ 17.249524] pci 0000:00:1b.0: PCI bridge to [bus 01] [ 17.249676] pci 0000:00:1b.0: bridge window [mem 0x92e00000-0x92efffff] [ 17.250414] pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold [ 17.272346] pci 0000:00:1c.0: [8086:a290] type 01 class 0x060400 PCIe Root Port [ 17.272713] pci 0000:00:1c.0: PCI bridge to [bus 02] [ 17.273315] pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold [ 17.295204] pci 0000:00:1c.4: [8086:a294] type 01 class 0x060400 PCIe Root Port [ 17.295708] pci 0000:00:1c.4: PCI bridge to [bus 03] [ 17.296184] pci 0000:00:1c.4: bridge window [mem 0x92d00000-0x92dfffff] [ 17.297792] pci 0000:00:1c.4: PME# supported from D0 D3hot D3cold [ 17.319704] pci 0000:00:1d.0: [8086:a298] type 01 class 0x060400 PCIe Root Port [ 17.320405] pci 0000:00:1d.0: PCI bridge to [bus 04] [ 17.320668] pci 0000:00:1d.0: bridge window [io 0x1000-0x1fff] [ 17.320668] pci 0000:00:1d.0: bridge window [mem 0x70000000-0x701fffff] [ 17.323033] pci 0000:00:1d.0: bridge window [mem 0x380000000000-0x3800001fffff 64bit pref] [ 17.323962] pci 0000:00:1d.0: PME# supported from D0 D3hot D3cold [ 17.346080] pci 0000:00:1f.0: [8086:a2d2] type 00 class 0x060100 conventional PCI endpoint [ 17.352903] pci 0000:00:1f.2: [8086:a2a1] type 00 class 0x058000 conventional PCI endpoint [ 17.353663] pci 0000:00:1f.2: BAR 0 [mem 0x92f44000-0x92f47fff] [ 17.361636] pci 0000:00:1f.3: [8086:a2f0] type 00 class 0x040300 conventional PCI endpoint [ 17.362699] pci 0000:00:1f.3: BAR 0 [mem 0x92f40000-0x92f43fff 64bit] [ 17.363328] pci 0000:00:1f.3: BAR 4 [mem 0x92f20000-0x92f2ffff 64bit] [ 17.364242] pci 0000:00:1f.3: PME# supported from D3hot D3cold [ 17.375839] pci 0000:00:1f.4: [8086:a2a3] type 00 class 0x0c0500 conventional PCI endpoint [ 17.376637] pci 0000:00:1f.4: BAR 0 [mem 0x92f6a000-0x92f6a0ff 64bit] [ 17.378097] pci 0000:00:1f.4: BAR 4 [io 0x3000-0x301f] [ 17.380590] pci 0000:00:1f.6: [8086:15b8] type 00 class 0x020000 conventional PCI endpoint [ 17.381031] pci 0000:00:1f.6: BAR 0 [mem 0x92f00000-0x92f1ffff] [ 17.381941] pci 0000:00:1f.6: PME# supported from D0 D3hot D3cold [ 17.389179] pci 0000:01:00.0: [8086:f1a8] type 00 class 0x010802 PCIe Endpoint [ 17.389705] pci 0000:01:00.0: BAR 0 [mem 0x92e00000-0x92e03fff 64bit] [ 17.392810] pci 0000:00:1b.0: PCI bridge to [bus 01] [ 17.393802] pci 0000:00:1c.0: PCI bridge to [bus 02] [ 17.394814] pci 0000:03:00.0: [1b21:2142] type 00 class 0x0c0330 PCIe Legacy Endpoint [ 17.395547] pci 0000:03:00.0: BAR 0 [mem 0x92d00000-0x92d07fff 64bit] [ 17.396937] pci 0000:03:00.0: PME# supported from D0 [ 17.400077] pci 0000:00:1c.4: PCI bridge to [bus 03] [ 17.401245] pci 0000:00:1d.0: PCI bridge to [bus 04] [ 17.401714] pci_bus 0000:00: on NUMA node 0 [ 17.434272] ACPI: PCI Root Bridge [PC01] (domain 0000 [bus 16-63]) [ 17.434704] acpi PNP0A08:01: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] [ 17.447216] acpi PNP0A08:01: _OSC: platform does not support [SHPCHotplug AER LTR] [ 17.460766] acpi PNP0A08:01: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] [ 17.471078] PCI host bridge to bus 0000:16 [ 17.471615] pci_bus 0000:16: root bus resource [io 0x4000-0x7fff window] [ 17.473082] pci_bus 0000:16: root bus resource [mem 0x93000000-0xb5ffffff window] [ 17.473680] pci_bus 0000:16: root bus resource [mem 0x381000000000-0x381fffffffff window] [ 17.474410] pci_bus 0000:16: root bus resource [bus 16-63] [ 17.474705] pci 0000:16:05.0: [8086:2034] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.476673] pci 0000:16:05.2: [8086:2035] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.478243] pci 0000:16:05.4: [8086:2036] type 00 class 0x080020 PCIe Root Complex Integrated Endpoint [ 17.478686] pci 0000:16:05.4: BAR 0 [mem 0xb5f00000-0xb5f00fff] [ 17.480355] pci 0000:16:08.0: [8086:208d] type 00 class 0x088000 conventional PCI endpoint [ 17.483260] pci 0000:16:08.1: [8086:208d] type 00 class 0x088000 conventional PCI endpoint [ 17.484173] pci 0000:16:08.2: [8086:208d] type 00 class 0x088000 conventional PCI endpoint [ 17.485165] pci 0000:16:08.3: [8086:208d] type 00 class 0x088000 conventional PCI endpoint [ 17.487153] pci 0000:16:08.4: [8086:208d] type 00 class 0x088000 conventional PCI endpoint [ 17.488165] pci 0000:16:08.5: [8086:208d] type 00 class 0x088000 conventional PCI endpoint [ 17.489153] pci 0000:16:08.6: [8086:208d] type 00 class 0x088000 conventional PCI endpoint [ 17.490162] pci 0000:16:08.7: [8086:208d] type 00 class 0x088000 conventional PCI endpoint [ 17.491156] pci 0000:16:09.0: [8086:208d] type 00 class 0x088000 conventional PCI endpoint [ 17.494262] pci 0000:16:09.1: [8086:208d] type 00 class 0x088000 conventional PCI endpoint [ 17.495212] pci 0000:16:09.2: [8086:208d] type 00 class 0x088000 conventional PCI endpoint [ 17.496154] pci 0000:16:09.3: [8086:208d] type 00 class 0x088000 conventional PCI endpoint [ 17.497163] pci 0000:16:09.4: [8086:208d] type 00 class 0x088000 conventional PCI endpoint [ 17.499155] pci 0000:16:09.5: [8086:208d] type 00 class 0x088000 conventional PCI endpoint [ 17.500167] pci 0000:16:09.6: [8086:208d] type 00 class 0x088000 conventional PCI endpoint [ 17.501154] pci 0000:16:09.7: [8086:208d] type 00 class 0x088000 conventional PCI endpoint [ 17.502163] pci 0000:16:0a.0: [8086:208d] type 00 class 0x088000 conventional PCI endpoint [ 17.505255] pci 0000:16:0a.1: [8086:208d] type 00 class 0x088000 conventional PCI endpoint [ 17.506162] pci 0000:16:0e.0: [8086:208e] type 00 class 0x088000 conventional PCI endpoint [ 17.508231] pci 0000:16:0e.1: [8086:208e] type 00 class 0x088000 conventional PCI endpoint [ 17.510172] pci 0000:16:0e.2: [8086:208e] type 00 class 0x088000 conventional PCI endpoint [ 17.511159] pci 0000:16:0e.3: [8086:208e] type 00 class 0x088000 conventional PCI endpoint [ 17.512166] pci 0000:16:0e.4: [8086:208e] type 00 class 0x088000 conventional PCI endpoint [ 17.513156] pci 0000:16:0e.5: [8086:208e] type 00 class 0x088000 conventional PCI endpoint [ 17.514164] pci 0000:16:0e.6: [8086:208e] type 00 class 0x088000 conventional PCI endpoint [ 17.516163] pci 0000:16:0e.7: [8086:208e] type 00 class 0x088000 conventional PCI endpoint [ 17.517156] pci 0000:16:0f.0: [8086:208e] type 00 class 0x088000 conventional PCI endpoint [ 17.519255] pci 0000:16:0f.1: [8086:208e] type 00 class 0x088000 conventional PCI endpoint [ 17.520158] pci 0000:16:0f.2: [8086:208e] type 00 class 0x088000 conventional PCI endpoint [ 17.522164] pci 0000:16:0f.3: [8086:208e] type 00 class 0x088000 conventional PCI endpoint [ 17.523163] pci 0000:16:0f.4: [8086:208e] type 00 class 0x088000 conventional PCI endpoint [ 17.524157] pci 0000:16:0f.5: [8086:208e] type 00 class 0x088000 conventional PCI endpoint [ 17.525163] pci 0000:16:0f.6: [8086:208e] type 00 class 0x088000 conventional PCI endpoint [ 17.527152] pci 0000:16:0f.7: [8086:208e] type 00 class 0x088000 conventional PCI endpoint [ 17.528166] pci 0000:16:10.0: [8086:208e] type 00 class 0x088000 conventional PCI endpoint [ 17.530257] pci 0000:16:10.1: [8086:208e] type 00 class 0x088000 conventional PCI endpoint [ 17.531164] pci 0000:16:1d.0: [8086:2054] type 00 class 0x088000 conventional PCI endpoint [ 17.534254] pci 0000:16:1d.1: [8086:2055] type 00 class 0x088000 conventional PCI endpoint [ 17.535170] pci 0000:16:1d.2: [8086:2056] type 00 class 0x088000 conventional PCI endpoint [ 17.536161] pci 0000:16:1d.3: [8086:2057] type 00 class 0x088000 conventional PCI endpoint [ 17.537164] pci 0000:16:1e.0: [8086:2080] type 00 class 0x088000 conventional PCI endpoint [ 17.540250] pci 0000:16:1e.1: [8086:2081] type 00 class 0x088000 conventional PCI endpoint [ 17.541513] pci 0000:16:1e.2: [8086:2082] type 00 class 0x088000 conventional PCI endpoint [ 17.542502] pci 0000:16:1e.3: [8086:2083] type 00 class 0x088000 conventional PCI endpoint [ 17.544147] pci 0000:16:1e.4: [8086:2084] type 00 class 0x088000 conventional PCI endpoint [ 17.545167] pci 0000:16:1e.5: [8086:2085] type 00 class 0x088000 conventional PCI endpoint [ 17.547159] pci 0000:16:1e.6: [8086:2086] type 00 class 0x088000 conventional PCI endpoint [ 17.548231] pci_bus 0000:16: on NUMA node 0 [ 17.551609] ACPI: PCI Root Bridge [PC02] (domain 0000 [bus 64-b1]) [ 17.551701] acpi PNP0A08:02: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] [ 17.562974] acpi PNP0A08:02: _OSC: platform does not support [SHPCHotplug AER LTR] [ 17.576156] acpi PNP0A08:02: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] [ 17.585672] PCI host bridge to bus 0000:64 [ 17.586207] pci_bus 0000:64: root bus resource [mem 0x000a0000-0x000bffff window] [ 17.586680] pci_bus 0000:64: root bus resource [io 0x8000-0xbfff window] [ 17.587306] pci_bus 0000:64: root bus resource [io 0x03b0-0x03bb window] [ 17.588680] pci_bus 0000:64: root bus resource [io 0x03c0-0x03df window] [ 17.589305] pci_bus 0000:64: root bus resource [mem 0xb6000000-0xd8ffffff window] [ 17.589680] pci_bus 0000:64: root bus resource [mem 0x382000000000-0x382fffffffff window] [ 17.590411] pci_bus 0000:64: root bus resource [bus 64-b1] [ 17.590706] pci 0000:64:00.0: [8086:2030] type 01 class 0x060400 PCIe Root Port [ 17.591395] pci 0000:64:00.0: PCI bridge to [bus 65-67] [ 17.591674] pci 0000:64:00.0: bridge window [io 0xb000-0xbfff] [ 17.592237] pci 0000:64:00.0: bridge window [mem 0xd8c00000-0xd8efffff] [ 17.593679] pci 0000:64:00.0: bridge window [mem 0xc0000000-0xd01fffff 64bit pref] [ 17.594476] pci 0000:64:00.0: PME# supported from D0 D3hot D3cold [ 17.597087] pci 0000:64:05.0: [8086:2034] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.598243] pci 0000:64:05.2: [8086:2035] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.600747] pci 0000:64:05.4: [8086:2036] type 00 class 0x080020 PCIe Root Complex Integrated Endpoint [ 17.601585] pci 0000:64:05.4: BAR 0 [mem 0xd8f00000-0xd8f00fff] [ 17.602248] pci 0000:64:08.0: [8086:2066] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.604479] pci 0000:64:09.0: [8086:2066] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.607309] pci 0000:64:0a.0: [8086:2040] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.610304] pci 0000:64:0a.1: [8086:2041] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.611216] pci 0000:64:0a.2: [8086:2042] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.612225] pci 0000:64:0a.3: [8086:2043] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.614214] pci 0000:64:0a.4: [8086:2044] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.615221] pci 0000:64:0a.5: [8086:2045] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.616223] pci 0000:64:0a.6: [8086:2046] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.618208] pci 0000:64:0a.7: [8086:2047] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.619224] pci 0000:64:0b.0: [8086:2048] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.622311] pci 0000:64:0b.1: [8086:2049] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.623239] pci 0000:64:0b.2: [8086:204a] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.624222] pci 0000:64:0b.3: [8086:204b] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.626223] pci 0000:64:0c.0: [8086:2040] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.628315] pci 0000:64:0c.1: [8086:2041] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.630753] pci 0000:64:0c.2: [8086:2042] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.632126] pci 0000:64:0c.3: [8086:2043] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.633210] pci 0000:64:0c.4: [8086:2044] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.634471] pci 0000:64:0c.5: [8086:2045] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.636220] pci 0000:64:0c.6: [8086:2046] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.637212] pci 0000:64:0c.7: [8086:2047] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.639222] pci 0000:64:0d.0: [8086:2048] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.641311] pci 0000:64:0d.1: [8086:2049] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.642215] pci 0000:64:0d.2: [8086:204a] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.644226] pci 0000:64:0d.3: [8086:204b] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.645918] pci 0000:65:00.0: [1002:1478] type 01 class 0x060400 PCIe Switch Upstream Port [ 17.646679] pci 0000:65:00.0: BAR 0 [mem 0xd8e00000-0xd8e03fff] [ 17.647253] pci 0000:65:00.0: PCI bridge to [bus 66-67] [ 17.647816] pci 0000:65:00.0: bridge window [io 0xb000-0xbfff] [ 17.648384] pci 0000:65:00.0: bridge window [mem 0xd8c00000-0xd8dfffff] [ 17.649686] pci 0000:65:00.0: bridge window [mem 0xc0000000-0xd01fffff 64bit pref] [ 17.650606] pci 0000:65:00.0: PME# supported from D0 D3hot D3cold [ 17.650741] pci 0000:65:00.0: 63.008 Gb/s available PCIe bandwidth, limited by 8.0 GT/s PCIe x8 link at 0000:64:00.0 (capable of 126.024 Gb/s with 16.0 GT/s PCIe x8 link) [ 17.654291] pci 0000:64:00.0: PCI bridge to [bus 65-67] [ 17.655967] pci 0000:66:00.0: [1002:1479] type 01 class 0x060400 PCIe Switch Downstream Port [ 17.656799] pci 0000:66:00.0: PCI bridge to [bus 67] [ 17.657274] pci 0000:66:00.0: bridge window [io 0xb000-0xbfff] [ 17.657678] pci 0000:66:00.0: bridge window [mem 0xd8c00000-0xd8dfffff] [ 17.658310] pci 0000:66:00.0: bridge window [mem 0xc0000000-0xd01fffff 64bit pref] [ 17.658963] pci 0000:66:00.0: PME# supported from D0 D3hot D3cold [ 17.660250] pci 0000:65:00.0: PCI bridge to [bus 66-67] [ 17.660996] pci 0000:67:00.0: [1002:73e3] type 00 class 0x030000 PCIe Legacy Endpoint [ 17.661701] pci 0000:67:00.0: BAR 0 [mem 0xc0000000-0xcfffffff 64bit pref] [ 17.662346] pci 0000:67:00.0: BAR 2 [mem 0xd0000000-0xd01fffff 64bit pref] [ 17.663688] pci 0000:67:00.0: BAR 4 [io 0xb000-0xb0ff] [ 17.664190] pci 0000:67:00.0: BAR 5 [mem 0xd8c00000-0xd8cfffff] [ 17.664687] pci 0000:67:00.0: ROM [mem 0xd8d00000-0xd8d1ffff pref] [ 17.665506] pci 0000:67:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] [ 17.665742] pci 0000:67:00.0: PME# supported from D1 D2 D3hot D3cold [ 17.666399] pci 0000:67:00.0: 63.008 Gb/s available PCIe bandwidth, limited by 8.0 GT/s PCIe x8 link at 0000:64:00.0 (capable of 252.048 Gb/s with 16.0 GT/s PCIe x16 link) [ 17.668379] pci 0000:67:00.1: [1002:ab28] type 00 class 0x040300 PCIe Legacy Endpoint [ 17.669694] pci 0000:67:00.1: BAR 0 [mem 0xd8d20000-0xd8d23fff] [ 17.670561] pci 0000:67:00.1: PME# supported from D1 D2 D3hot D3cold [ 17.671406] pci 0000:66:00.0: PCI bridge to [bus 67] [ 17.671716] pci_bus 0000:64: on NUMA node 0 [ 17.674838] ACPI: PCI Root Bridge [PC03] (domain 0000 [bus b2-ff]) [ 17.675439] acpi PNP0A08:03: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] [ 17.688164] acpi PNP0A08:03: _OSC: platform does not support [SHPCHotplug AER LTR] [ 17.701295] acpi PNP0A08:03: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] [ 17.710251] PCI host bridge to bus 0000:b2 [ 17.710786] pci_bus 0000:b2: root bus resource [io 0xc000-0xffff window] [ 17.711414] pci_bus 0000:b2: root bus resource [mem 0xd9000000-0xfbffffff window] [ 17.713084] pci_bus 0000:b2: root bus resource [mem 0x383000000000-0x383fffffffff window] [ 17.713674] pci_bus 0000:b2: root bus resource [bus b2-ff] [ 17.714216] pci 0000:b2:05.0: [8086:2034] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.715249] pci 0000:b2:05.2: [8086:2035] type 00 class 0x088000 PCIe Root Complex Integrated Endpoint [ 17.717700] pci 0000:b2:05.4: [8086:2036] type 00 class 0x080020 PCIe Root Complex Integrated Endpoint [ 17.718534] pci 0000:b2:05.4: BAR 0 [mem 0xfbf00000-0xfbf00fff] [ 17.719253] pci 0000:b2:12.0: [8086:204c] type 00 class 0x110100 PCIe Root Complex Integrated Endpoint [ 17.721588] pci 0000:b2:12.1: [8086:204d] type 00 class 0x110100 conventional PCI endpoint [ 17.723160] pci 0000:b2:12.2: [8086:204e] type 00 class 0x088000 conventional PCI endpoint [ 17.724168] pci 0000:b2:15.0: [8086:2018] type 00 class 0x088000 conventional PCI endpoint [ 17.727256] pci 0000:b2:15.1: [8086:2088] type 00 class 0x110100 conventional PCI endpoint [ 17.728182] pci 0000:b2:16.0: [8086:2018] type 00 class 0x088000 conventional PCI endpoint [ 17.730252] pci 0000:b2:16.1: [8086:2088] type 00 class 0x110100 conventional PCI endpoint [ 17.731166] pci 0000:b2:16.4: [8086:2018] type 00 class 0x088000 conventional PCI endpoint [ 17.733153] pci 0000:b2:16.5: [8086:2088] type 00 class 0x110100 conventional PCI endpoint [ 17.734173] pci 0000:b2:17.0: [8086:2018] type 00 class 0x088000 conventional PCI endpoint [ 17.736248] pci 0000:b2:17.1: [8086:2088] type 00 class 0x110100 conventional PCI endpoint [ 17.737142] pci_bus 0000:b2: on NUMA node 0 [ 17.743744] ACPI: PCI: Interrupt link LNKA configured for IRQ 11 [ 17.744302] ACPI: PCI: Interrupt link LNKA disabled [ 17.747481] ACPI: PCI: Interrupt link LNKB configured for IRQ 10 [ 17.747673] ACPI: PCI: Interrupt link LNKB disabled [ 17.749742] ACPI: PCI: Interrupt link LNKC configured for IRQ 11 [ 17.750297] ACPI: PCI: Interrupt link LNKC disabled [ 17.752282] ACPI: PCI: Interrupt link LNKD configured for IRQ 11 [ 17.752673] ACPI: PCI: Interrupt link LNKD disabled [ 17.754744] ACPI: PCI: Interrupt link LNKE configured for IRQ 11 [ 17.755299] ACPI: PCI: Interrupt link LNKE disabled [ 17.757711] ACPI: PCI: Interrupt link LNKF configured for IRQ 11 [ 17.758268] ACPI: PCI: Interrupt link LNKF disabled [ 17.761201] ACPI: PCI: Interrupt link LNKG configured for IRQ 11 [ 17.761673] ACPI: PCI: Interrupt link LNKG disabled [ 17.763817] ACPI: PCI: Interrupt link LNKH configured for IRQ 11 [ 17.764374] ACPI: PCI: Interrupt link LNKH disabled [ 17.766294] ACPI BIOS Error (bug): Could not resolve symbol [\SHAD._STA.SDS0], AE_NOT_FOUND (20240322/psargs-330) [ 17.767699] ACPI Error: Aborting method \SHAD._STA due to previous error (AE_NOT_FOUND) (20240322/psparse-529) [ 17.770784] iommu: Default domain type: Translated [ 17.771134] iommu: DMA domain TLB invalidation policy: lazy mode [ 17.772796] SCSI subsystem initialized [ 17.773447] ACPI: bus type USB registered [ 17.773880] usbcore: registered new interface driver usbfs [ 17.774477] usbcore: registered new interface driver hub [ 17.775913] usbcore: registered new device driver usb [ 17.777104] pps_core: LinuxPPS API ver. 1 registered [ 17.777578] pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti [ 17.777925] PTP clock support registered [ 17.779740] EDAC MC: Ver: 3.0.0 [ 17.782723] NetLabel: Initializing [ 17.783071] NetLabel: domain hash size = 128 [ 17.783493] NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO [ 17.784852] NetLabel: unlabeled traffic allowed by default [ 17.785371] mctp: management component transport protocol core [ 17.785673] NET: Registered PF_MCTP protocol family [ 17.786199] PCI: Using ACPI for IRQ routing [ 17.790711] PCI: pci_cache_line_size set to 64 bytes [ 17.791340] e820: reserve RAM buffer [mem 0x3569c000-0x37ffffff] [ 17.791868] e820: reserve RAM buffer [mem 0x36983000-0x37ffffff] [ 17.792750] pci 0000:67:00.0: vgaarb: setting as boot VGA device [ 17.793277] pci 0000:67:00.0: vgaarb: bridge control possible [ 17.793668] pci 0000:67:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none [ 17.794673] vgaarb: loaded [ 17.794983] hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 [ 17.795674] hpet0: 8 comparators, 64-bit 24.000000 MHz counter [ 17.798896] clocksource: Switched to clocksource tsc-early [ 17.812600] VFS: Disk quotas dquot_6.6.0 [ 17.813056] VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) [ 17.815558] netfs: FS-Cache loaded [ 17.817850] AppArmor: AppArmor Filesystem Enabled [ 17.818486] pnp: PnP ACPI init [ 17.825552] system 00:01: [io 0x0500-0x053f] has been reserved [ 17.826138] system 00:01: [io 0x0400-0x047f] could not be reserved [ 17.826730] system 00:01: [io 0x0540-0x057f] has been reserved [ 17.827296] system 00:01: [io 0x0600-0x061f] has been reserved [ 17.827865] system 00:01: [io 0x0ca0-0x0ca5] has been reserved [ 17.828427] system 00:01: [io 0x0880-0x0883] has been reserved [ 17.829063] system 00:01: [io 0x0800-0x081f] has been reserved [ 17.829628] system 00:01: [mem 0xfed1c000-0xfed3ffff] has been reserved [ 17.830251] system 00:01: [mem 0xfed45000-0xfed8bfff] has been reserved [ 17.830874] system 00:01: [mem 0xff000000-0xffffffff] has been reserved [ 17.831506] system 00:01: [mem 0xfee00000-0xfeefffff] could not be reserved [ 17.832158] system 00:01: [mem 0xfed12000-0xfed1200f] has been reserved [ 17.832779] system 00:01: [mem 0xfed12010-0xfed1201f] has been reserved [ 17.833398] system 00:01: [mem 0xfed1b000-0xfed1bfff] has been reserved [ 17.839325] system 00:02: [io 0x0a00-0x0a2f] has been reserved [ 17.840081] system 00:02: [io 0x0a30-0x0a3f] has been reserved [ 17.840646] system 00:02: [io 0x0a40-0x0a4f] has been reserved [ 17.845537] system 00:03: [mem 0xfd000000-0xfdabffff] has been reserved [ 17.846164] system 00:03: [mem 0xfdad0000-0xfdadffff] has been reserved [ 17.846798] system 00:03: [mem 0xfdb00000-0xfdffffff] could not be reserved [ 17.847446] system 00:03: [mem 0xfe000000-0xfe00ffff] has been reserved [ 17.848071] system 00:03: [mem 0xfe011000-0xfe01ffff] has been reserved [ 17.848690] system 00:03: [mem 0xfe036000-0xfe03bfff] has been reserved [ 17.849314] system 00:03: [mem 0xfe03d000-0xfe3fffff] has been reserved [ 17.849935] system 00:03: [mem 0xfe410000-0xfe7fffff] has been reserved [ 17.853978] system 00:04: [io 0x0f00-0x0ffe] has been reserved [ 17.882536] system 00:05: [mem 0xfdaf0000-0xfdafffff] has been reserved [ 17.883165] system 00:05: [mem 0xfdae0000-0xfdaeffff] has been reserved [ 17.883790] system 00:05: [mem 0xfdac0000-0xfdacffff] has been reserved [ 17.907316] ACPI BIOS Error (bug): Could not resolve symbol [\SHAD._STA.SDS0], AE_NOT_FOUND (20240322/psargs-330) [ 17.908296] ACPI Error: Aborting method \SHAD._STA due to previous error (AE_NOT_FOUND) (20240322/psparse-529) [ 17.910268] pnp: PnP ACPI: found 6 devices [ 17.932648] clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns [ 17.934260] NET: Registered PF_INET protocol family [ 17.934982] IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) [ 17.942652] tcp_listen_portaddr_hash hash table entries: 65536 (order: 8, 1048576 bytes, linear) [ 17.943567] Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) [ 17.944384] TCP established hash table entries: 524288 (order: 10, 4194304 bytes, linear) [ 17.945665] TCP bind hash table entries: 65536 (order: 9, 2097152 bytes, linear) [ 17.946571] TCP: Hash tables configured (established 524288 bind 65536) [ 17.949038] MPTCP token hash table entries: 65536 (order: 8, 1572864 bytes, linear) [ 17.949963] UDP hash table entries: 65536 (order: 9, 2097152 bytes, linear) [ 17.950977] UDP-Lite hash table entries: 65536 (order: 9, 2097152 bytes, linear) [ 17.953214] NET: Registered PF_UNIX/PF_LOCAL protocol family [ 17.955155] RPC: Registered named UNIX socket transport module. [ 17.955706] RPC: Registered udp transport module. [ 17.956161] RPC: Registered tcp transport module. [ 17.956610] RPC: Registered tcp-with-tls transport module. [ 17.957222] RPC: Registered tcp NFSv4.1 backchannel transport module. [ 17.957815] NET: Registered PF_XDP protocol family [ 17.958289] pci 0000:00:1b.0: PCI bridge to [bus 01] [ 17.958770] pci 0000:00:1b.0: bridge window [mem 0x92e00000-0x92efffff] [ 17.959400] pci 0000:00:1c.0: PCI bridge to [bus 02] [ 17.959894] pci 0000:00:1c.4: PCI bridge to [bus 03] [ 17.960369] pci 0000:00:1c.4: bridge window [mem 0x92d00000-0x92dfffff] [ 17.961003] pci 0000:00:1d.0: PCI bridge to [bus 04] [ 17.961474] pci 0000:00:1d.0: bridge window [io 0x1000-0x1fff] [ 17.962044] pci 0000:00:1d.0: bridge window [mem 0x70000000-0x701fffff] [ 17.962666] pci 0000:00:1d.0: bridge window [mem 0x380000000000-0x3800001fffff 64bit pref] [ 17.963428] pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] [ 17.964002] pci_bus 0000:00: resource 5 [io 0x1000-0x3fff window] [ 17.964571] pci_bus 0000:00: resource 6 [mem 0x000c4000-0x000c7fff window] [ 17.965198] pci_bus 0000:00: resource 7 [mem 0xfe010000-0xfe010fff window] [ 17.965825] pci_bus 0000:00: resource 8 [mem 0x70000000-0x92ffffff window] [ 17.966450] pci_bus 0000:00: resource 9 [mem 0x380000000000-0x380fffffffff window] [ 17.967134] pci_bus 0000:01: resource 1 [mem 0x92e00000-0x92efffff] [ 17.967710] pci_bus 0000:03: resource 1 [mem 0x92d00000-0x92dfffff] [ 17.968290] pci_bus 0000:04: resource 0 [io 0x1000-0x1fff] [ 17.968813] pci_bus 0000:04: resource 1 [mem 0x70000000-0x701fffff] [ 17.969389] pci_bus 0000:04: resource 2 [mem 0x380000000000-0x3800001fffff 64bit pref] [ 17.972092] pci_bus 0000:16: resource 4 [io 0x4000-0x7fff window] [ 17.972662] pci_bus 0000:16: resource 5 [mem 0x93000000-0xb5ffffff window] [ 17.973289] pci_bus 0000:16: resource 6 [mem 0x381000000000-0x381fffffffff window] [ 17.974238] pci 0000:66:00.0: PCI bridge to [bus 67] [ 17.974715] pci 0000:66:00.0: bridge window [io 0xb000-0xbfff] [ 17.975290] pci 0000:66:00.0: bridge window [mem 0xd8c00000-0xd8dfffff] [ 17.975919] pci 0000:66:00.0: bridge window [mem 0xc0000000-0xd01fffff 64bit pref] [ 17.976625] pci 0000:65:00.0: PCI bridge to [bus 66-67] [ 17.977120] pci 0000:65:00.0: bridge window [io 0xb000-0xbfff] [ 17.977692] pci 0000:65:00.0: bridge window [mem 0xd8c00000-0xd8dfffff] [ 17.978320] pci 0000:65:00.0: bridge window [mem 0xc0000000-0xd01fffff 64bit pref] [ 17.979030] pci 0000:64:00.0: PCI bridge to [bus 65-67] [ 17.979522] pci 0000:64:00.0: bridge window [io 0xb000-0xbfff] [ 17.980091] pci 0000:64:00.0: bridge window [mem 0xd8c00000-0xd8efffff] [ 17.980712] pci 0000:64:00.0: bridge window [mem 0xc0000000-0xd01fffff 64bit pref] [ 17.981417] pci_bus 0000:64: resource 4 [mem 0x000a0000-0x000bffff window] [ 17.982044] pci_bus 0000:64: resource 5 [io 0x8000-0xbfff window] [ 17.982612] pci_bus 0000:64: resource 6 [io 0x03b0-0x03bb window] [ 17.983185] pci_bus 0000:64: resource 7 [io 0x03c0-0x03df window] [ 17.983756] pci_bus 0000:64: resource 8 [mem 0xb6000000-0xd8ffffff window] [ 17.984381] pci_bus 0000:64: resource 9 [mem 0x382000000000-0x382fffffffff window] [ 17.985064] pci_bus 0000:65: resource 0 [io 0xb000-0xbfff] [ 17.985584] pci_bus 0000:65: resource 1 [mem 0xd8c00000-0xd8efffff] [ 17.986164] pci_bus 0000:65: resource 2 [mem 0xc0000000-0xd01fffff 64bit pref] [ 17.986821] pci_bus 0000:66: resource 0 [io 0xb000-0xbfff] [ 17.987341] pci_bus 0000:66: resource 1 [mem 0xd8c00000-0xd8dfffff] [ 17.987918] pci_bus 0000:66: resource 2 [mem 0xc0000000-0xd01fffff 64bit pref] [ 17.988571] pci_bus 0000:67: resource 0 [io 0xb000-0xbfff] [ 17.989093] pci_bus 0000:67: resource 1 [mem 0xd8c00000-0xd8dfffff] [ 17.989668] pci_bus 0000:67: resource 2 [mem 0xc0000000-0xd01fffff 64bit pref] [ 17.990513] pci_bus 0000:b2: resource 4 [io 0xc000-0xffff window] [ 17.991086] pci_bus 0000:b2: resource 5 [mem 0xd9000000-0xfbffffff window] [ 17.991711] pci_bus 0000:b2: resource 6 [mem 0x383000000000-0x383fffffffff window] [ 17.995717] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:0 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000000 SID:F0F8 SQ:0 SVT:1) [ 17.996896] IOAPIC[0]: Preconfigured routing entry (8-16 -> IRQ 16 Level:1 ActiveLow:1) [ 18.000915] pci 0000:03:00.0: PME# does not work under D0, disabling it [ 18.004719] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:0 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000000 SID:F0F8 SQ:0 SVT:1) [ 18.005892] IOAPIC[0]: Preconfigured routing entry (8-16 -> IRQ 16 Level:1 ActiveLow:1) [ 18.007767] pci 0000:16:05.0: disabled boot interrupts on device [8086:2034] [ 18.008547] pci 0000:64:05.0: disabled boot interrupts on device [8086:2034] [ 18.009506] pci 0000:65:00.0: CLS mismatch (64 != 32), using 64 bytes [ 18.010896] pci 0000:67:00.1: D0 power state depends on 0000:67:00.0 [ 18.011489] pci 0000:b2:05.0: disabled boot interrupts on device [8086:2034] [ 18.012294] pci 0000:00:1f.1: [8086:a2a0] type 00 class 0x058000 conventional PCI endpoint [ 18.013090] pci 0000:00:1f.1: BAR 0 [mem 0xfd000000-0xfdffffff 64bit] [ 18.015488] PCI-DMA: Using software bounce buffering for IO (SWIOTLB) [ 18.015725] Trying to unpack rootfs image as initramfs... [ 18.016084] software IO TLB: mapped [mem 0x000000004c000000-0x0000000050000000] (64MB) [ 18.017930] ACPI: bus type thunderbolt registered [ 18.049357] Initialise system trusted keyrings [ 18.049813] Key type blacklist registered [ 18.050419] workingset: timestamp_bits=36 max_order=25 bucket_order=0 [ 18.051071] zbud: loaded [ 18.054865] 9p: Installing v9fs 9p2000 file system support [ 18.056010] alg: extra crypto tests enabled. This is intended for developer use only. [ 18.075332] NET: Registered PF_ALG protocol family [ 18.075816] Key type asymmetric registered [ 18.076218] Asymmetric key parser 'x509' registered [ 18.076840] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 247) [ 18.077801] io scheduler mq-deadline registered [ 18.078238] io scheduler kyber registered [ 18.078705] io scheduler bfq registered [ 18.112885] pcieport 0000:00:1b.0: PME: Signaling with IRQ 24 [ 18.117053] pcieport 0000:00:1c.0: PME: Signaling with IRQ 25 [ 18.118459] pcieport 0000:00:1c.4: PME: Signaling with IRQ 26 [ 18.122591] pcieport 0000:00:1d.0: PME: Signaling with IRQ 27 [ 18.123349] pcieport 0000:00:1d.0: pciehp: Slot #0 AttnBtn- PwrCtrl- MRL- AttnInd- PwrInd- HotPlug+ Surprise+ Interlock- NoCompl+ IbPresDis- LLActRep+ [ 18.127283] IOAPIC[11]: Set IRTE entry (P:1 FPD:0 Dst_Mode:0 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000000 SID:642C SQ:0 SVT:1) [ 18.128774] IOAPIC[3]: Preconfigured routing entry (11-7 -> IRQ 28 Level:1 ActiveLow:1) [ 18.130881] pcieport 0000:64:00.0: PME: Signaling with IRQ 29 [ 18.132380] IOAPIC[11]: Set IRTE entry (P:1 FPD:0 Dst_Mode:0 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000000 SID:642C SQ:0 SVT:1) [ 18.133559] IOAPIC[3]: Preconfigured routing entry (11-0 -> IRQ 30 Level:1 ActiveLow:1) [ 18.136412] shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 [ 18.138668] Monitor-Mwait will be used to enter C-1 state [ 18.139186] Monitor-Mwait will be used to enter C-2 state [ 18.139701] ACPI: \_SB_.SCK0.CP00: Found 2 idle states [ 18.158913] input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input0 [ 18.159982] ACPI: button: Sleep Button [SLPB] [ 18.160810] input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input1 [ 18.161851] ACPI: button: Power Button [PWRB] [ 18.162653] input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 [ 18.163871] ACPI: button: Power Button [PWRF] [ 18.234653] Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled [ 18.240790] Non-volatile memory driver v1.3 [ 18.266598] rdac: device handler registered [ 18.267334] hp_sw: device handler registered [ 18.267750] emc: device handler registered [ 18.268455] alua: device handler registered [ 18.271268] e1000: Intel(R) PRO/1000 Network Driver [ 18.271735] e1000: Copyright (c) 1999-2006 Intel Corporation. [ 18.272389] e1000e: Intel(R) PRO/1000 Network Driver [ 18.272861] e1000e: Copyright(c) 1999 - 2015 Intel Corporation. [ 18.276118] e1000e 0000:00:1f.6: Interrupt Throttling Rate (ints/sec) set to dynamic conservative mode [ 18.503806] e1000e 0000:00:1f.6 0000:00:1f.6 (uninitialized): registered PHC clock [ 18.567749] e1000e 0000:00:1f.6 eth0: (PCI Express:2.5GT/s:Width x1) d8:5e:d3:0a:00:02 [ 18.568461] e1000e 0000:00:1f.6 eth0: Intel(R) PRO/1000 Network Connection [ 18.569142] e1000e 0000:00:1f.6 eth0: MAC: 12, PHY: 12, PBA No: FFFFFF-0FF [ 18.570028] igb: Intel(R) Gigabit Ethernet Network Driver [ 18.570537] igb: Copyright (c) 2007-2014 Intel Corporation. [ 18.571181] Intel(R) 2.5G Ethernet Linux Driver [ 18.571617] Copyright(c) 2018 Intel Corporation. [ 18.572145] ixgbe: Intel(R) 10 Gigabit PCI Express Network Driver [ 18.572705] ixgbe: Copyright (c) 1999-2016 Intel Corporation. [ 18.573731] i40e: Intel(R) Ethernet Connection XL710 Network Driver [ 18.574310] i40e: Copyright (c) 2013 - 2019 Intel Corporation. [ 18.575244] usbcore: registered new device driver r8152-cfgselector [ 18.575880] usbcore: registered new interface driver r8152 [ 18.576445] usbcore: registered new interface driver asix [ 18.577018] usbcore: registered new interface driver ax88179_178a [ 18.577633] usbcore: registered new interface driver cdc_ether [ 18.578233] usbcore: registered new interface driver net1080 [ 18.578812] usbcore: registered new interface driver cdc_subset [ 18.579409] usbcore: registered new interface driver zaurus [ 18.579983] usbcore: registered new interface driver cdc_ncm [ 18.580565] usbcore: registered new interface driver r8153_ecm [ 18.581139] e1000e 0000:00:1f.6 eth0: no PCI slot information [ 18.581673] hv_vmbus: registering driver hv_netvsc [ 18.585584] xhci_hcd 0000:00:14.0: xHCI Host Controller [ 18.586411] xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 [ 18.588302] xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x100 quirks 0x0000000000009810 [ 18.592689] xhci_hcd 0000:00:14.0: xHCI Host Controller [ 18.593474] xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 [ 18.594161] xhci_hcd 0000:00:14.0: Host supports USB 3.0 SuperSpeed [ 18.595117] usb usb1: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.11 [ 18.595857] usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 18.596510] usb usb1: Product: xHCI Host Controller [ 18.597106] usb usb1: Manufacturer: Linux 6.11.0-rc2-00008-g2377a7d90f5b xhci-hcd [ 18.597780] usb usb1: SerialNumber: 0000:00:14.0 [ 18.599382] hub 1-0:1.0: USB hub found [ 18.599860] hub 1-0:1.0: 16 ports detected [ 18.729784] usb usb2: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.11 [ 18.730525] usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 18.731179] usb usb2: Product: xHCI Host Controller [ 18.731642] usb usb2: Manufacturer: Linux 6.11.0-rc2-00008-g2377a7d90f5b xhci-hcd [ 18.732316] usb usb2: SerialNumber: 0000:00:14.0 [ 18.733958] hub 2-0:1.0: USB hub found [ 18.734428] hub 2-0:1.0: 10 ports detected [ 18.817442] xhci_hcd 0000:03:00.0: xHCI Host Controller [ 18.818390] xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 3 [ 18.875301] xhci_hcd 0000:03:00.0: hcc params 0x0200ef80 hci version 0x110 quirks 0x0000000000800010 [ 18.878707] xhci_hcd 0000:03:00.0: xHCI Host Controller [ 18.879599] xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 4 [ 18.880285] xhci_hcd 0000:03:00.0: Host supports USB 3.1 Enhanced SuperSpeed [ 18.881330] usb usb3: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.11 [ 18.882070] usb usb3: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 18.882722] usb usb3: Product: xHCI Host Controller [ 18.883198] usb usb3: Manufacturer: Linux 6.11.0-rc2-00008-g2377a7d90f5b xhci-hcd [ 18.883887] usb usb3: SerialNumber: 0000:03:00.0 [ 18.885237] hub 3-0:1.0: USB hub found [ 18.885696] hub 3-0:1.0: 2 ports detected [ 18.887271] usb usb4: We don't know the algorithms for LPM for this host, disabling LPM. [ 18.888303] usb usb4: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.11 [ 18.889043] usb usb4: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 18.889695] usb usb4: Product: xHCI Host Controller [ 18.890161] usb usb4: Manufacturer: Linux 6.11.0-rc2-00008-g2377a7d90f5b xhci-hcd [ 18.890837] usb usb4: SerialNumber: 0000:03:00.0 [ 18.892199] hub 4-0:1.0: USB hub found [ 18.892657] hub 4-0:1.0: 2 ports detected [ 18.894588] i8042: PNP: No PS/2 controller found. [ 18.895313] mousedev: PS/2 mouse device common for all mice [ 18.896929] rtc_cmos 00:00: RTC can wake from S4 [ 18.899216] rtc_cmos 00:00: registered as rtc0 [ 18.899793] rtc_cmos 00:00: setting system clock to 2024-08-23T05:09:11 UTC (1724389751) [ 18.900718] rtc_cmos 00:00: alarms up to one month, y3k, 114 bytes nvram [ 18.904897] i801_smbus 0000:00:1f.4: SPD Write Disable is set [ 18.905561] i801_smbus 0000:00:1f.4: SMBus using PCI interrupt [ 18.905891] iTCO_vendor_support: vendor-support=0 [ 18.906567] intel_pstate: HWP enabled by BIOS [ 18.906992] intel_pstate: Intel P-state driver initializing [ 18.923872] intel_pstate: HWP enabled [ 18.930722] efifb: probing for efifb [ 18.931212] efifb: framebuffer at 0xc0000000, using 3072k, total 3072k [ 18.931814] efifb: mode is 1024x768x32, linelength=4096, pages=768 [ 18.932382] efifb: scrolling: redraw [ 18.932741] efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 [ 18.935630] Console: switching to colour frame buffer device 128x48 [ 18.937636] fb0: EFI VGA frame buffer device [ 18.938232] hid: raw HID events driver (C) Jiri Kosina [ 18.938987] usbcore: registered new interface driver usbhid [ 18.939522] usbhid: USB HID core driver [ 18.940767] drop_monitor: Initializing network drop monitor service [ 18.941561] Initializing XFRM netlink socket [ 18.942270] NET: Registered PF_INET6 protocol family [ 18.946376] Segment Routing with IPv6 [ 18.946849] In-situ OAM (IOAM) with IPv6 [ 18.947360] NET: Registered PF_PACKET protocol family [ 18.948208] 9pnet: Installing 9P2000 support [ 18.948704] mpls_gso: MPLS GSO support [ 18.969720] microcode: Current revision: 0x05003604 [ 18.971962] IPI shorthand broadcast: enabled [ 18.972448] ... APIC ID: 00000000 (0) [ 18.972867] ... APIC VERSION: 01060015 [ 18.973252] 0000000000000000000000000000000000000000000000000000000000000000 [ 18.973447] 0000000000000000000000000000000000000000000000000000000000000000 [ 18.973447] 0000000000000000000000000000000000000000000000000000000000001000 [ 18.976944] number of MP IRQ sources: 15. [ 18.977845] number of IO-APIC #8 registers: 24. [ 18.978779] number of IO-APIC #9 registers: 8. [ 18.979695] number of IO-APIC #10 registers: 8. [ 18.980613] number of IO-APIC #11 registers: 8. [ 18.981528] number of IO-APIC #12 registers: 8. [ 18.982434] testing the IO APIC....................... [ 18.983402] IO APIC #8...... [ 18.984157] .... register #00: 08000000 [ 18.984982] ....... : physical APIC id: 08 [ 18.985841] ....... : Delivery Type: 0 [ 18.986669] ....... : LTS : 0 [ 18.987490] .... register #01: 00170020 [ 18.988295] ....... : max redirection entries: 17 [ 18.988742] usb 1-14: new full-speed USB device number 2 using xhci_hcd [ 18.988771] ....... : PRQ implemented: 0 [ 18.991101] ....... : IO APIC version: 20 [ 18.991959] .... register #02: 00000000 [ 18.992764] ....... : arbitration: 00 [ 18.993573] .... IRQ redirection table: [ 18.994364] IOAPIC 0: [ 18.995034] pin00, disabled, edge , high, V(44), IRR(0), S(0), physical, D(027B), M(2) [ 18.996183] pin01, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 18.997323] pin02, enabled , edge , high, V(02), IRR(0), S(0), remapped, I(0001), Z(0) [ 18.998467] pin03, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 18.999601] pin04, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.000727] pin05, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.001842] pin06, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.002944] pin07, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.004039] pin08, enabled , edge , high, V(08), IRR(0), S(0), remapped, I(0007), Z(0) [ 19.005138] pin09, enabled , level, high, V(09), IRR(0), S(0), remapped, I(0008), Z(0) [ 19.006234] pin0a, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.007322] pin0b, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.008403] pin0c, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.009477] pin0d, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.010543] pin0e, disabled, edge , high, V(60), IRR(0), S(0), logical , D(7104), M(2) [ 19.011605] pin0f, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.012664] pin10, enabled , level, low , V(10), IRR(0), S(0), remapped, I(000F), Z(0) [ 19.013738] pin11, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.014807] pin12, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.015869] pin13, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.016932] pin14, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.017982] pin15, disabled, edge , high, V(40), IRR(0), S(0), physical, D(1010), M(2) [ 19.019028] pin16, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.020068] pin17, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.020759] tsc: Refined TSC clocksource calibration: 2999.997 MHz [ 19.020787] IO APIC #9...... [ 19.021360] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x2b3e4269d76, max_idle_ns: 440795235636 ns [ 19.021663] .... register #00: 09000000 [ 19.026014] ....... : physical APIC id: 09 [ 19.027088] ....... : Delivery Type: 0 [ 19.028140] ....... : LTS : 0 [ 19.029187] .... register #01: 00070020 [ 19.030210] ....... : max redirection entries: 07 [ 19.031345] ....... : PRQ implemented: 0 [ 19.032420] ....... : IO APIC version: 20 [ 19.033494] .... register #02: 00000000 [ 19.034510] ....... : arbitration: 00 [ 19.035524] .... register #03: 00000001 [ 19.036528] ....... : Boot DT : 1 [ 19.037537] .... IRQ redirection table: [ 19.038537] IOAPIC 1: [ 19.039407] pin00, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.040786] pin01, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.042142] pin02, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.043488] pin03, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.044823] pin04, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.046143] pin05, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.047466] pin06, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.048788] pin07, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.050110] IO APIC #10...... [ 19.051026] .... register #00: 0A000000 [ 19.052014] ....... : physical APIC id: 0A [ 19.053060] ....... : Delivery Type: 0 [ 19.054063] ....... : LTS : 0 [ 19.055078] .... register #01: 00070020 [ 19.056084] ....... : max redirection entries: 07 [ 19.057203] ....... : PRQ implemented: 0 [ 19.058258] ....... : IO APIC version: 20 [ 19.059334] .... register #02: 00000000 [ 19.060345] ....... : arbitration: 00 [ 19.061368] .... register #03: 00000001 [ 19.062387] ....... : Boot DT : 1 [ 19.063422] .... IRQ redirection table: [ 19.064458] IOAPIC 2: [ 19.065368] pin00, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.066800] pin01, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.068227] pin02, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.069624] pin03, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.071005] pin04, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.072337] pin05, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.073633] pin06, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.074917] pin07, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.076191] IO APIC #11...... [ 19.077065] .... register #00: 0B000000 [ 19.078006] ....... : physical APIC id: 0B [ 19.078990] ....... : Delivery Type: 0 [ 19.079940] ....... : LTS : 0 [ 19.080890] .... register #01: 00070020 [ 19.081824] ....... : max redirection entries: 07 [ 19.082867] ....... : PRQ implemented: 0 [ 19.083842] ....... : IO APIC version: 20 [ 19.084822] .... register #02: 00000000 [ 19.085760] ....... : arbitration: 00 [ 19.086711] .... register #03: 00000001 [ 19.087635] ....... : Boot DT : 1 [ 19.088570] .... IRQ redirection table: [ 19.089507] IOAPIC 3: [ 19.090324] pin00, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.091659] pin01, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.092995] pin02, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.094328] pin03, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.095666] pin04, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.096979] pin05, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.098284] pin06, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.099568] pin07, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.100846] IO APIC #12...... [ 19.101715] .... register #00: 0C000000 [ 19.102660] ....... : physical APIC id: 0C [ 19.103647] ....... : Delivery Type: 0 [ 19.104602] ....... : LTS : 0 [ 19.105554] .... register #01: 00070020 [ 19.106490] ....... : max redirection entries: 07 [ 19.107533] ....... : PRQ implemented: 0 [ 19.108512] ....... : IO APIC version: 20 [ 19.109495] .... register #02: 00000000 [ 19.110436] ....... : arbitration: 00 [ 19.111391] .... register #03: 00000001 [ 19.112311] ....... : Boot DT : 1 [ 19.113243] .... IRQ redirection table: [ 19.114190] IOAPIC 4: [ 19.115005] pin00, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.116339] pin01, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.117676] pin02, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.119019] pin03, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.120356] pin04, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.121663] pin05, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.122960] pin06, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.124242] pin07, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 19.125518] IRQ to pin mappings: [ 19.126412] IRQ0 -> 0:2 [ 19.127245] IRQ1 -> 0:1 [ 19.128056] IRQ3 -> 0:3 [ 19.128859] IRQ4 -> 0:4 [ 19.129654] IRQ5 -> 0:5 [ 19.130442] IRQ6 -> 0:6 [ 19.131219] IRQ7 -> 0:7 [ 19.131988] IRQ8 -> 0:8 [ 19.132750] IRQ9 -> 0:9 [ 19.133501] IRQ10 -> 0:10 [ 19.134264] IRQ11 -> 0:11 [ 19.134995] IRQ12 -> 0:12 [ 19.135726] IRQ13 -> 0:13 [ 19.136459] IRQ14 -> 0:14 [ 19.137193] IRQ15 -> 0:15 [ 19.137927] IRQ16 -> 0:16 [ 19.138662] IRQ28 -> 3:7 [ 19.139395] IRQ30 -> 3:0 [ 19.140129] .................................... done. [ 19.141082] clocksource: Switched to clocksource tsc [ 19.141865] AES CTR mode by8 optimization enabled [ 19.173438] sched_clock: Marking stable (19116001306, 56732591)->(19409112568, -236378671) [ 19.175530] registered taskstats version 1 [ 19.183872] Running tests on trace events: [ 19.184578] Testing event initcall_finish: [ 19.207410] usb 1-14: New USB device found, idVendor=1b1c, idProduct=0c20, bcdDevice= 1.00 [ 19.209314] usb 1-14: New USB device strings: Mfr=1, Product=2, SerialNumber=0 [ 19.210540] usb 1-14: Product: H100iRGBPROXT [ 19.211261] usb 1-14: Manufacturer: Corsair Inc. [ 19.224546] hid-generic 0003:1B1C:0C20.0001: hidraw0: USB HID v1.11 Device [Corsair Inc. H100iRGBPROXT] on usb-0000:00:14.0-14/input0 [ 19.306532] OK [ 19.307101] Testing event initcall_start: [ 19.317899] usb 3-1: new full-speed USB device number 2 using xhci_hcd [ 19.416379] OK [ 19.416965] Testing event initcall_level: OK [ 19.533272] Testing event emulate_vsyscall: OK [ 19.653256] Testing event xen_cpu_set_ldt: [ 19.702251] usb 3-1: New USB device found, idVendor=14dd, idProduct=1005, bcdDevice= 0.00 [ 19.704105] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 19.705126] usb 3-1: Product: D2CIM-VUSB [ 19.705893] usb 3-1: Manufacturer: Raritan [ 19.706661] usb 3-1: SerialNumber: 56C0A6F5915A148 [ 19.736655] input: Raritan D2CIM-VUSB as /devices/pci0000:00/0000:00:1c.4/0000:03:00.0/usb3/3-1/3-1:1.0/0003:14DD:1005.0002/input/input3 [ 19.769286] OK [ 19.769970] Testing event xen_cpu_write_gdt_entry: [ 19.792458] hid-generic 0003:14DD:1005.0002: input,hidraw1: USB HID v1.11 Keyboard [Raritan D2CIM-VUSB] on usb-0000:03:00.0-1/input0 [ 19.812209] input: Raritan D2CIM-VUSB as /devices/pci0000:00/0000:00:1c.4/0000:03:00.0/usb3/3-1/3-1:1.1/0003:14DD:1005.0003/input/input4 [ 19.815325] hid-generic 0003:14DD:1005.0003: input,hidraw2: USB HID v1.11 Mouse [Raritan D2CIM-VUSB] on usb-0000:03:00.0-1/input1 [ 19.883310] OK [ 19.884157] Testing event xen_cpu_load_idt: OK [ 19.997444] Testing event xen_cpu_write_idt_entry: OK [ 20.116501] Testing event xen_cpu_write_ldt_entry: OK [ 20.227575] Testing event xen_mmu_write_cr3: OK [ 20.341377] Testing event xen_mmu_flush_tlb_multi: OK [ 20.453631] Testing event xen_mmu_flush_tlb_one_user: OK [ 20.567657] Testing event xen_mmu_pgd_unpin: OK [ 20.680468] Testing event xen_mmu_pgd_pin: OK [ 20.797279] Testing event xen_mmu_release_ptpage: OK [ 20.913389] Testing event xen_mmu_alloc_ptpage: OK [ 21.023432] Testing event xen_mmu_ptep_modify_prot_commit: OK [ 21.135568] Testing event xen_mmu_ptep_modify_prot_start: OK [ 21.247394] Testing event xen_mmu_set_p4d: OK [ 21.359356] Testing event xen_mmu_set_pud: OK [ 21.474329] Testing event xen_mmu_set_pmd: OK [ 21.589292] Testing event xen_mmu_set_pte: OK [ 21.708408] Testing event xen_mc_extend_args: OK [ 21.821387] Testing event xen_mc_flush: OK [ 21.934248] Testing event xen_mc_flush_reason: OK [ 22.054345] Testing event xen_mc_callback: OK [ 22.168242] Testing event xen_mc_entry_alloc: OK [ 22.284370] Testing event xen_mc_entry: OK [ 22.394315] Testing event xen_mc_issue: OK [ 22.512271] Testing event xen_mc_batch: OK [ 22.622150] Testing event hyperv_send_ipi_one: OK [ 22.733405] Testing event hyperv_send_ipi_mask: OK [ 22.849285] Testing event hyperv_nested_flush_guest_mapping_range: OK [ 22.963481] Testing event hyperv_nested_flush_guest_mapping: OK [ 23.084382] Testing event hyperv_mmu_flush_tlb_multi: OK [ 23.194298] Testing event vector_free_moved: OK [ 23.308201] Testing event vector_setup: OK [ 23.419191] Testing event vector_teardown: OK [ 23.529278] Testing event vector_deactivate: OK [ 23.639181] Testing event vector_activate: OK [ 23.753360] Testing event vector_alloc_managed: OK [ 23.866235] Testing event vector_alloc: OK [ 23.976218] Testing event vector_reserve: OK [ 24.091160] Testing event vector_reserve_managed: OK [ 24.201237] Testing event vector_clear: OK [ 24.311148] Testing event vector_update: OK [ 24.424159] Testing event vector_config: OK [ 24.534983] Testing event thermal_apic_exit: OK [ 24.648113] Testing event thermal_apic_entry: OK [ 24.758196] Testing event deferred_error_apic_exit: OK [ 24.871138] Testing event deferred_error_apic_entry: OK [ 24.982206] Testing event threshold_apic_exit: OK [ 25.092072] Testing event threshold_apic_entry: OK [ 25.205198] Testing event call_function_single_exit: OK [ 25.317128] Testing event call_function_single_entry: OK [ 25.427193] Testing event call_function_exit: OK [ 25.538213] Testing event call_function_entry: OK [ 25.648080] Testing event reschedule_exit: OK [ 25.758144] Testing event reschedule_entry: OK [ 25.870152] Testing event irq_work_exit: OK [ 25.981159] Testing event irq_work_entry: OK [ 26.096156] Testing event x86_platform_ipi_exit: OK [ 26.209171] Testing event x86_platform_ipi_entry: OK [ 26.320178] Testing event error_apic_exit: OK [ 26.431158] Testing event error_apic_entry: OK [ 26.541128] Testing event spurious_apic_exit: OK [ 26.652149] Testing event spurious_apic_entry: OK [ 26.765077] Testing event local_timer_exit: OK [ 26.880085] Testing event local_timer_entry: [ 26.963193] Freeing initrd memory: 370852K [ 27.005323] OK [ 27.005835] Testing event nmi_handler: OK [ 27.119573] Testing event x86_fpu_xstate_check_failed: OK [ 27.233819] Testing event x86_fpu_copy_dst: OK [ 27.344825] Testing event x86_fpu_copy_src: OK [ 27.457692] Testing event x86_fpu_dropped: OK [ 27.568564] Testing event x86_fpu_init_state: OK [ 27.679685] Testing event x86_fpu_regs_deactivated: OK [ 27.793803] Testing event x86_fpu_regs_activated: OK [ 27.905887] Testing event x86_fpu_after_restore: OK [ 28.016591] Testing event x86_fpu_before_restore: OK [ 28.133677] Testing event x86_fpu_after_save: OK [ 28.244648] Testing event x86_fpu_before_save: OK [ 28.356925] Testing event mce_record: OK [ 28.467826] Testing event page_fault_kernel: OK [ 28.578952] Testing event page_fault_user: OK [ 28.689775] Testing event task_rename: OK [ 28.800769] Testing event task_newtask: OK [ 28.911753] Testing event cpuhp_exit: OK [ 29.022951] Testing event cpuhp_multi_enter: OK [ 29.134849] Testing event cpuhp_enter: OK [ 29.246685] Testing event tasklet_exit: OK [ 29.357657] Testing event tasklet_entry: OK [ 29.468949] Testing event softirq_raise: OK [ 29.579578] Testing event softirq_exit: OK [ 29.696924] Testing event softirq_entry: OK [ 29.808909] Testing event irq_handler_exit: OK [ 29.921209] Testing event irq_handler_entry: OK [ 30.031994] Testing event signal_deliver: OK [ 30.143060] Testing event signal_generate: OK [ 30.254840] Testing event workqueue_execute_end: OK [ 30.366806] Testing event workqueue_execute_start: OK [ 30.479814] Testing event workqueue_activate_work: OK [ 30.591121] Testing event workqueue_queue_work: OK [ 30.701732] Testing event notifier_run: OK [ 30.812665] Testing event notifier_unregister: OK [ 30.922795] Testing event notifier_register: OK [ 31.033786] Testing event ipi_exit: OK [ 31.144666] Testing event ipi_entry: OK [ 31.254798] Testing event ipi_send_cpumask: OK [ 31.365778] Testing event ipi_send_cpu: OK [ 31.478259] Testing event ipi_raise: OK [ 31.589563] Testing event sched_wake_idle_without_ipi: OK [ 31.700954] Testing event sched_skip_vma_numa: OK [ 31.812115] Testing event sched_swap_numa: OK [ 31.924100] Testing event sched_stick_numa: OK [ 32.035899] Testing event sched_move_numa: OK [ 32.147754] Testing event sched_process_hang: OK [ 32.260767] Testing event sched_pi_setprio: OK [ 32.371709] Testing event sched_stat_runtime: [ 32.372609] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 32.485015] OK [ 32.485624] Testing event sched_stat_blocked: OK [ 32.596761] Testing event sched_stat_iowait: OK [ 32.708775] Testing event sched_stat_sleep: OK [ 32.819888] Testing event sched_stat_wait: OK [ 32.930707] Testing event sched_prepare_exec: OK [ 33.042922] Testing event sched_process_exec: OK [ 33.156924] Testing event sched_process_fork: OK [ 33.267867] Testing event sched_process_wait: OK [ 33.378855] Testing event sched_wait_task: OK [ 33.491949] Testing event sched_process_exit: OK [ 33.603867] Testing event sched_process_free: OK [ 33.716000] Testing event sched_migrate_task: OK [ 33.826706] Testing event sched_switch: OK [ 33.941676] Testing event sched_wakeup_new: OK [ 34.055219] Testing event sched_wakeup: OK [ 34.171137] Testing event sched_waking: OK [ 34.285035] Testing event sched_kthread_work_execute_end: OK [ 34.395887] Testing event sched_kthread_work_execute_start: OK [ 34.506860] Testing event sched_kthread_work_queue_work: OK [ 34.621097] Testing event sched_kthread_stop_ret: OK [ 34.732790] Testing event sched_kthread_stop: OK [ 34.843990] Testing event contention_end: OK [ 34.956864] Testing event contention_begin: OK [ 35.069697] Testing event console: OK [ 35.181870] Testing event irq_matrix_free: OK [ 35.293979] Testing event irq_matrix_alloc: OK [ 35.410723] Testing event irq_matrix_assign: OK [ 35.526077] Testing event irq_matrix_alloc_managed: OK [ 35.636789] Testing event irq_matrix_remove_managed: OK [ 35.749855] Testing event irq_matrix_reserve_managed: OK [ 35.860872] Testing event irq_matrix_alloc_reserved: OK [ 35.971718] Testing event irq_matrix_assign_system: OK [ 36.084912] Testing event irq_matrix_remove_reserved: OK [ 36.195815] Testing event irq_matrix_reserve: OK [ 36.306790] Testing event irq_matrix_offline: OK [ 36.417950] Testing event irq_matrix_online: OK [ 36.528952] Testing event rcu_stall_warning: OK [ 36.640016] Testing event rcu_utilization: OK [ 36.752228] Testing event swiotlb_bounced: OK [ 36.864021] Testing event sys_exit: OK [ 36.974809] Testing event sys_enter: OK [ 37.086711] Testing event module_request: OK [ 37.196695] Testing event module_put: OK [ 37.309638] Testing event module_get: OK [ 37.424688] Testing event module_free: OK [ 37.536810] Testing event module_load: OK [ 37.648962] Testing event tick_stop: OK [ 37.761102] Testing event itimer_expire: OK [ 37.872673] Testing event itimer_state: OK [ 37.986888] Testing event hrtimer_cancel: OK [ 38.100008] Testing event hrtimer_expire_exit: OK [ 38.212772] Testing event hrtimer_expire_entry: OK [ 38.323727] Testing event hrtimer_start: OK [ 38.434664] Testing event hrtimer_init: OK [ 38.545968] Testing event timer_base_idle: OK [ 38.656784] Testing event timer_cancel: OK [ 38.768877] Testing event timer_expire_exit: OK [ 38.879859] Testing event timer_expire_entry: OK [ 38.990698] Testing event timer_start: OK [ 39.103901] Testing event timer_init: OK [ 39.214810] Testing event alarmtimer_cancel: OK [ 39.326843] Testing event alarmtimer_start: OK [ 39.437716] Testing event alarmtimer_fired: OK [ 39.551007] Testing event alarmtimer_suspend: OK [ 39.661865] Testing event tmigr_handle_remote: OK [ 39.772934] Testing event tmigr_update_events: OK [ 39.883855] Testing event tmigr_cpu_new_timer_idle: OK [ 39.994927] Testing event tmigr_cpu_idle: OK [ 40.108793] Testing event tmigr_handle_remote_cpu: OK [ 40.219772] Testing event tmigr_cpu_offline: OK [ 40.330933] Testing event tmigr_cpu_online: OK [ 40.441904] Testing event tmigr_cpu_active: OK [ 40.552976] Testing event tmigr_cpu_new_timer: OK [ 40.664085] Testing event tmigr_group_set_cpu_active: OK [ 40.774962] Testing event tmigr_group_set_cpu_inactive: OK [ 40.886125] Testing event tmigr_connect_cpu_parent: OK [ 40.996897] Testing event tmigr_connect_child_parent: OK [ 41.107934] Testing event tmigr_group_set: OK [ 41.223629] Testing event csd_function_exit: OK [ 41.334998] Testing event csd_function_entry: OK [ 41.447005] Testing event csd_queue_cpu: OK [ 41.560305] Testing event cgroup_rstat_cpu_unlock_fastpath: OK [ 41.672656] Testing event cgroup_rstat_cpu_unlock: OK [ 41.783883] Testing event cgroup_rstat_cpu_locked_fastpath: OK [ 41.896010] Testing event cgroup_rstat_cpu_locked: OK [ 42.007763] Testing event cgroup_rstat_cpu_lock_contended_fastpath: OK [ 42.119878] Testing event cgroup_rstat_cpu_lock_contended: OK [ 42.231874] Testing event cgroup_rstat_unlock: OK [ 42.345966] Testing event cgroup_rstat_locked: OK [ 42.456870] Testing event cgroup_rstat_lock_contended: OK [ 42.567834] Testing event cgroup_notify_frozen: OK [ 42.679834] Testing event cgroup_notify_populated: OK [ 42.791983] Testing event cgroup_transfer_tasks: OK [ 42.902664] Testing event cgroup_attach_task: OK [ 43.018044] Testing event cgroup_unfreeze: OK [ 43.129684] Testing event cgroup_freeze: OK [ 43.239874] Testing event cgroup_rename: OK [ 43.351018] Testing event cgroup_release: OK [ 43.461722] Testing event cgroup_rmdir: OK [ 43.572986] Testing event cgroup_mkdir: OK [ 43.684670] Testing event cgroup_remount: OK [ 43.795725] Testing event cgroup_destroy_root: OK [ 43.906728] Testing event cgroup_setup_root: OK [ 44.018689] Testing event ftrace_test_filter: OK [ 44.130659] Testing event bpf_trace_printk: OK [ 44.241814] Testing event error_report_end: OK [ 44.352858] Testing event guest_halt_poll_ns: OK [ 44.465792] Testing event dev_pm_qos_remove_request: OK [ 44.580843] Testing event dev_pm_qos_update_request: OK [ 44.691608] Testing event dev_pm_qos_add_request: OK [ 44.804082] Testing event pm_qos_update_flags: OK [ 44.914823] Testing event pm_qos_update_target: OK [ 45.026791] Testing event pm_qos_remove_request: OK [ 45.137923] Testing event pm_qos_update_request: OK [ 45.251719] Testing event pm_qos_add_request: OK [ 45.363894] Testing event power_domain_target: OK [ 45.476615] Testing event clock_set_rate: OK [ 45.590653] Testing event clock_disable: OK [ 45.703607] Testing event clock_enable: OK [ 45.814610] Testing event wakeup_source_deactivate: OK [ 45.926801] Testing event wakeup_source_activate: OK [ 46.038903] Testing event suspend_resume: OK [ 46.155018] Testing event device_pm_callback_end: OK [ 46.269905] Testing event device_pm_callback_start: OK [ 46.382020] Testing event cpu_frequency_limits: OK [ 46.495946] Testing event cpu_frequency: OK [ 46.607013] Testing event pstate_sample: OK [ 46.717823] Testing event powernv_throttle: OK [ 46.830640] Testing event cpu_idle_miss: OK [ 46.942698] Testing event cpu_idle: OK [ 47.055000] Testing event rpm_status: OK [ 47.168948] Testing event rpm_return_int: OK [ 47.280045] Testing event rpm_usage: OK [ 47.391925] Testing event rpm_idle: OK [ 47.503942] Testing event rpm_resume: OK [ 47.615677] Testing event rpm_suspend: OK [ 47.727684] Testing event bpf_xdp_link_attach_failed: OK [ 47.840012] Testing event mem_return_failed: OK [ 47.951833] Testing event mem_connect: OK [ 48.063730] Testing event mem_disconnect: OK [ 48.178711] Testing event xdp_devmap_xmit: OK [ 48.290775] Testing event xdp_cpumap_enqueue: OK [ 48.403091] Testing event xdp_cpumap_kthread: OK [ 48.515759] Testing event xdp_redirect_map_err: OK [ 48.628070] Testing event xdp_redirect_map: OK [ 48.740680] Testing event xdp_redirect_err: OK [ 48.853072] Testing event xdp_redirect: OK [ 48.967130] Testing event xdp_bulk_tx: OK [ 49.078584] Testing event xdp_exception: OK [ 49.193499] Testing event user_exit: OK [ 49.304901] Testing event user_enter: OK [ 49.417893] Testing event rseq_ip_fixup: OK [ 49.528883] Testing event rseq_update: OK [ 49.640716] Testing event file_check_and_advance_wb_err: OK [ 49.752025] Testing event filemap_set_wb_err: OK [ 49.866004] Testing event mm_filemap_add_to_page_cache: OK [ 49.979050] Testing event mm_filemap_delete_from_page_cache: OK [ 50.090770] Testing event compact_retry: OK [ 50.203678] Testing event skip_task_reaping: OK [ 50.315782] Testing event finish_task_reaping: OK [ 50.427816] Testing event start_task_reaping: OK [ 50.538717] Testing event wake_reaper: OK [ 50.650926] Testing event mark_victim: OK [ 50.762723] Testing event reclaim_retry_zone: OK [ 50.874814] Testing event oom_score_adj_update: OK [ 50.988106] Testing event mm_lru_activate: OK [ 51.101819] Testing event mm_lru_insertion: OK [ 51.213909] Testing event mm_vmscan_throttled: OK [ 51.325652] Testing event mm_vmscan_node_reclaim_end: OK [ 51.436856] Testing event mm_vmscan_node_reclaim_begin: OK [ 51.548781] Testing event mm_vmscan_lru_shrink_active: OK [ 51.660836] Testing event mm_vmscan_lru_shrink_inactive: OK [ 51.774172] Testing event mm_vmscan_write_folio: OK [ 51.884889] Testing event mm_vmscan_lru_isolate: OK [ 51.996956] Testing event mm_shrink_slab_end: OK [ 52.110648] Testing event mm_shrink_slab_start: OK [ 52.220775] Testing event mm_vmscan_memcg_softlimit_reclaim_end: OK [ 52.332023] Testing event mm_vmscan_memcg_reclaim_end: OK [ 52.443986] Testing event mm_vmscan_direct_reclaim_end: OK [ 52.554831] Testing event mm_vmscan_memcg_softlimit_reclaim_begin: OK [ 52.665893] Testing event mm_vmscan_memcg_reclaim_begin: OK [ 52.777853] Testing event mm_vmscan_direct_reclaim_begin: OK [ 52.888987] Testing event mm_vmscan_wakeup_kswapd: OK [ 53.000119] Testing event mm_vmscan_kswapd_wake: OK [ 53.110934] Testing event mm_vmscan_kswapd_sleep: OK [ 53.221709] Testing event percpu_destroy_chunk: OK [ 53.334008] Testing event percpu_create_chunk: OK [ 53.445148] Testing event percpu_alloc_percpu_fail: OK [ 53.556987] Testing event percpu_free_percpu: OK [ 53.667817] Testing event percpu_alloc_percpu: OK [ 53.780935] Testing event rss_stat: OK [ 53.895391] Testing event mm_alloc_contig_migrate_range_info: OK [ 54.005850] Testing event mm_page_alloc_extfrag: OK [ 54.117946] Testing event mm_page_pcpu_drain: OK [ 54.228759] Testing event mm_page_alloc_zone_locked: OK [ 54.341065] Testing event mm_page_alloc: OK [ 54.453794] Testing event mm_page_free_batched: OK [ 54.564953] Testing event mm_page_free: OK [ 54.678230] Testing event kmem_cache_free: OK [ 54.789785] Testing event kfree: OK [ 54.900657] Testing event kmalloc: OK [ 55.014300] Testing event kmem_cache_alloc: OK [ 55.126059] Testing event mm_compaction_kcompactd_wake: OK [ 55.236889] Testing event mm_compaction_wakeup_kcompactd: OK [ 55.347953] Testing event mm_compaction_kcompactd_sleep: OK [ 55.458815] Testing event mm_compaction_defer_reset: OK [ 55.569886] Testing event mm_compaction_defer_compaction: OK [ 55.681166] Testing event mm_compaction_deferred: OK [ 55.792796] Testing event mm_compaction_suitable: OK [ 55.903781] Testing event mm_compaction_finished: OK [ 56.018125] Testing event mm_compaction_try_to_compact_pages: OK [ 56.131178] Testing event mm_compaction_end: OK [ 56.242934] Testing event mm_compaction_begin: OK [ 56.355827] Testing event mm_compaction_migratepages: OK [ 56.468145] Testing event mm_compaction_fast_isolate_freepages: OK [ 56.579961] Testing event mm_compaction_isolate_freepages: OK [ 56.690905] Testing event mm_compaction_isolate_migratepages: OK [ 56.805017] Testing event mmap_lock_acquire_returned: OK [ 56.917107] Testing event mmap_lock_released: OK [ 57.028342] Testing event mmap_lock_start_locking: OK [ 57.139351] Testing event exit_mmap: OK [ 57.250706] Testing event vma_store: OK [ 57.361549] Testing event vma_mas_szero: OK [ 57.471587] Testing event vm_unmapped_area: OK [ 57.586052] Testing event remove_migration_pte: OK [ 57.697767] Testing event set_migration_pte: OK [ 57.810879] Testing event mm_migrate_pages_start: OK [ 57.923115] Testing event mm_migrate_pages: OK [ 58.034832] Testing event tlb_flush: OK [ 58.147214] Testing event free_vmap_area_noflush: OK [ 58.257989] Testing event purge_vmap_area_lazy: OK [ 58.369772] Testing event alloc_vmap_area: OK [ 58.480981] Testing event ksm_advisor: OK [ 58.591964] Testing event ksm_remove_rmap_item: OK [ 58.703113] Testing event ksm_remove_ksm_page: OK [ 58.813855] Testing event ksm_merge_with_ksm_page: OK [ 58.924801] Testing event ksm_merge_one_page: OK [ 59.037869] Testing event ksm_exit: OK [ 59.148964] Testing event ksm_enter: OK [ 59.259942] Testing event ksm_stop_scan: OK [ 59.370909] Testing event ksm_start_scan: OK [ 59.481919] Testing event remove_migration_pmd: OK [ 59.592934] Testing event set_migration_pmd: OK [ 59.703935] Testing event hugepage_update_pud: OK [ 59.814620] Testing event hugepage_update_pmd: OK [ 59.925880] Testing event hugepage_set_pud: OK [ 60.039656] Testing event hugepage_set_pmd: OK [ 60.151523] Testing event mm_khugepaged_collapse_file: OK [ 60.263885] Testing event mm_khugepaged_scan_file: OK [ 60.374801] Testing event mm_collapse_huge_page_swapin: OK [ 60.486016] Testing event mm_collapse_huge_page_isolate: OK [ 60.601045] Testing event mm_collapse_huge_page: OK [ 60.713069] Testing event mm_khugepaged_scan_pmd: OK [ 60.823904] Testing event test_pages_isolated: OK [ 60.936809] Testing event damon_aggregated: OK [ 61.049919] Testing event damos_before_apply: OK [ 61.162780] Testing event sb_clear_inode_writeback: OK [ 61.273820] Testing event sb_mark_inode_writeback: OK [ 61.385947] Testing event writeback_dirty_inode_enqueue: OK [ 61.497059] Testing event writeback_lazytime_iput: OK [ 61.609977] Testing event writeback_lazytime: OK [ 61.723974] Testing event writeback_single_inode: OK [ 61.835973] Testing event writeback_single_inode_start: OK [ 61.946929] Testing event writeback_sb_inodes_requeue: OK [ 62.057850] Testing event balance_dirty_pages: OK [ 62.168979] Testing event bdi_dirty_ratelimit: OK [ 62.279969] Testing event global_dirty_state: OK [ 62.391800] Testing event writeback_queue_io: OK [ 62.503719] Testing event wbc_writepage: OK [ 62.615781] Testing event writeback_bdi_register: OK [ 62.728085] Testing event writeback_wake_background: OK [ 62.838865] Testing event writeback_pages_written: OK [ 62.949877] Testing event writeback_wait: OK [ 63.060808] Testing event writeback_written: OK [ 63.172836] Testing event writeback_start: OK [ 63.284914] Testing event writeback_exec: OK [ 63.398880] Testing event writeback_queue: OK [ 63.510681] Testing event writeback_write_inode: OK [ 63.621797] Testing event writeback_write_inode_start: OK [ 63.733868] Testing event flush_foreign: OK [ 63.844831] Testing event track_foreign_dirty: OK [ 63.955891] Testing event inode_switch_wbs: OK [ 64.067963] Testing event inode_foreign_history: OK [ 64.178754] Testing event writeback_dirty_inode: OK [ 64.290894] Testing event writeback_dirty_inode_start: OK [ 64.401856] Testing event writeback_mark_inode_dirty: OK [ 64.512837] Testing event folio_wait_writeback: OK [ 64.623850] Testing event writeback_dirty_folio: OK [ 64.734961] Testing event dax_writeback_one: OK [ 64.846000] Testing event dax_writeback_range_done: OK [ 64.957036] Testing event dax_writeback_range: OK [ 65.067985] Testing event dax_insert_mapping: OK [ 65.179945] Testing event dax_insert_pfn_mkwrite: OK [ 65.291940] Testing event dax_insert_pfn_mkwrite_no_entry: OK [ 65.403088] Testing event dax_load_hole: OK [ 65.514820] Testing event dax_pte_fault_done: OK [ 65.626994] Testing event dax_pte_fault: OK [ 65.737605] Testing event dax_pmd_insert_mapping: OK [ 65.848851] Testing event dax_pmd_load_hole_fallback: OK [ 65.960845] Testing event dax_pmd_load_hole: OK [ 66.071809] Testing event dax_pmd_fault_done: OK [ 66.184720] Testing event dax_pmd_fault: OK [ 66.296933] Testing event leases_conflict: OK [ 66.407771] Testing event generic_add_lease: OK [ 66.519794] Testing event time_out_leases: OK [ 66.630681] Testing event generic_delete_lease: OK [ 66.742169] Testing event break_lease_unblock: OK [ 66.852904] Testing event break_lease_block: OK [ 66.963977] Testing event break_lease_noblock: OK [ 67.075926] Testing event flock_lock_inode: OK [ 67.186953] Testing event locks_remove_posix: OK [ 67.298838] Testing event fcntl_setlk: OK [ 67.409654] Testing event posix_lock_inode: OK [ 67.519791] Testing event locks_get_lock_context: OK [ 67.631771] Testing event iomap_dio_complete: OK [ 67.745101] Testing event iomap_dio_rw_begin: OK [ 67.855795] Testing event iomap_iter: OK [ 67.968639] Testing event iomap_writepage_map: OK [ 68.078932] Testing event iomap_iter_srcmap: OK [ 68.190094] Testing event iomap_iter_dstmap: OK [ 68.301004] Testing event iomap_dio_rw_queued: OK [ 68.417932] Testing event iomap_dio_invalidate_fail: OK [ 68.528856] Testing event iomap_invalidate_folio: OK [ 68.640764] Testing event iomap_release_folio: OK [ 68.750897] Testing event iomap_writepage: OK [ 68.861890] Testing event iomap_readahead: OK [ 68.973799] Testing event iomap_readpage: OK [ 69.084771] Testing event netfs_collect_stream: OK [ 69.196068] Testing event netfs_collect_gap: OK [ 69.308085] Testing event netfs_collect_state: OK [ 69.419823] Testing event netfs_collect_folio: OK [ 69.531851] Testing event netfs_collect_sreq: OK [ 69.644907] Testing event netfs_collect_contig: OK [ 69.756044] Testing event netfs_collect: OK [ 69.868818] Testing event netfs_write: OK [ 69.980825] Testing event netfs_write_iter: OK [ 70.093902] Testing event netfs_folio: OK [ 70.208572] Testing event netfs_sreq_ref: OK [ 70.321106] Testing event netfs_rreq_ref: OK [ 70.433044] Testing event netfs_failure: OK [ 70.543890] Testing event netfs_sreq: OK [ 70.656410] Testing event netfs_rreq: OK [ 70.769345] Testing event netfs_read: OK [ 70.880964] Testing event fscache_resize: OK [ 70.992714] Testing event fscache_invalidate: OK [ 71.104696] Testing event fscache_relinquish: OK [ 71.217827] Testing event fscache_acquire: OK [ 71.328681] Testing event fscache_access: OK [ 71.440029] Testing event fscache_access_volume: OK [ 71.554020] Testing event fscache_access_cache: OK [ 71.665912] Testing event fscache_active: OK [ 71.776969] Testing event fscache_cookie: OK [ 71.891653] Testing event fscache_volume: OK [ 72.003942] Testing event fscache_cache: OK [ 72.115758] Testing event ext4_update_sb: OK [ 72.228012] Testing event ext4_fc_cleanup: OK [ 72.338902] Testing event ext4_fc_track_range: OK [ 72.450709] Testing event ext4_fc_track_inode: OK [ 72.563804] Testing event ext4_fc_track_unlink: OK [ 72.675131] Testing event ext4_fc_track_link: OK [ 72.786786] Testing event ext4_fc_track_create: OK [ 72.897820] Testing event ext4_fc_stats: OK [ 73.008799] Testing event ext4_fc_commit_stop: OK [ 73.120903] Testing event ext4_fc_commit_start: OK [ 73.232830] Testing event ext4_fc_replay: OK [ 73.345133] Testing event ext4_fc_replay_scan: OK [ 73.457683] Testing event ext4_lazy_itable_init: OK [ 73.570931] Testing event ext4_prefetch_bitmaps: OK [ 73.683884] Testing event ext4_error: OK [ 73.795095] Testing event ext4_shutdown: OK [ 73.905863] Testing event ext4_getfsmap_mapping: OK [ 74.017923] Testing event ext4_getfsmap_high_key: OK [ 74.129861] Testing event ext4_getfsmap_low_key: OK [ 74.241001] Testing event ext4_fsmap_mapping: OK [ 74.352704] Testing event ext4_fsmap_high_key: OK [ 74.463911] Testing event ext4_fsmap_low_key: OK [ 74.574901] Testing event ext4_es_insert_delayed_extent: OK [ 74.686827] Testing event ext4_es_shrink: OK [ 74.797863] Testing event ext4_insert_range: OK [ 74.908657] Testing event ext4_collapse_range: OK [ 75.018976] Testing event ext4_es_shrink_scan_exit: OK [ 75.130034] Testing event ext4_es_shrink_scan_enter: OK [ 75.240981] Testing event ext4_es_shrink_count: OK [ 75.351693] Testing event ext4_es_lookup_extent_exit: OK [ 75.461770] Testing event ext4_es_lookup_extent_enter: OK [ 75.578911] Testing event ext4_es_find_extent_range_exit: OK [ 75.690856] Testing event ext4_es_find_extent_range_enter: OK [ 75.802014] Testing event ext4_es_remove_extent: OK [ 75.912758] Testing event ext4_es_cache_extent: OK [ 76.025915] Testing event ext4_es_insert_extent: OK [ 76.138009] Testing event ext4_ext_remove_space_done: OK [ 76.248928] Testing event ext4_ext_remove_space: OK [ 76.359969] Testing event ext4_ext_rm_idx: OK [ 76.471653] Testing event ext4_ext_rm_leaf: OK [ 76.582671] Testing event ext4_remove_blocks: OK [ 76.694978] Testing event ext4_ext_show_extent: OK [ 76.807717] Testing event ext4_get_implied_cluster_alloc_exit: OK [ 76.918859] Testing event ext4_ext_handle_unwritten_extents: OK [ 77.030929] Testing event ext4_trim_all_free: OK [ 77.142928] Testing event ext4_trim_extent: OK [ 77.254764] Testing event ext4_journal_start_reserved: OK [ 77.365927] Testing event ext4_journal_start_inode: OK [ 77.478858] Testing event ext4_journal_start_sb: OK [ 77.590911] Testing event ext4_load_inode: OK [ 77.702790] Testing event ext4_ext_load_extent: OK [ 77.813909] Testing event ext4_ind_map_blocks_exit: OK [ 77.924789] Testing event ext4_ext_map_blocks_exit: OK [ 78.037975] Testing event ext4_ind_map_blocks_enter: OK [ 78.149821] Testing event ext4_ext_map_blocks_enter: OK [ 78.261021] Testing event ext4_ext_convert_to_initialized_fastpath: OK [ 78.372130] Testing event ext4_ext_convert_to_initialized_enter: OK [ 78.483038] Testing event ext4_truncate_exit: OK [ 78.593972] Testing event ext4_truncate_enter: OK [ 78.705933] Testing event ext4_unlink_exit: OK [ 78.818028] Testing event ext4_unlink_enter: OK [ 78.928845] Testing event ext4_fallocate_exit: OK [ 79.040814] Testing event ext4_zero_range: OK [ 79.152761] Testing event ext4_punch_hole: OK [ 79.263958] Testing event ext4_fallocate_enter: OK [ 79.378985] Testing event ext4_read_block_bitmap_load: OK [ 79.491043] Testing event ext4_load_inode_bitmap: OK [ 79.602831] Testing event ext4_mb_buddy_bitmap_load: OK [ 79.714031] Testing event ext4_mb_bitmap_load: OK [ 79.824723] Testing event ext4_da_release_space: OK [ 79.937819] Testing event ext4_da_reserve_space: OK [ 80.050066] Testing event ext4_da_update_reserve_space: OK [ 80.161850] Testing event ext4_forget: OK [ 80.273924] Testing event ext4_mballoc_free: OK [ 80.384912] Testing event ext4_mballoc_discard: OK [ 80.496033] Testing event ext4_mballoc_prealloc: OK [ 80.606671] Testing event ext4_mballoc_alloc: OK [ 80.717859] Testing event ext4_alloc_da_blocks: OK [ 80.828826] Testing event ext4_sync_fs: OK [ 80.939685] Testing event ext4_sync_file_exit: OK [ 81.051704] Testing event ext4_sync_file_enter: OK [ 81.165080] Testing event ext4_free_blocks: OK [ 81.276768] Testing event ext4_allocate_blocks: OK [ 81.388922] Testing event ext4_request_blocks: OK [ 81.500855] Testing event ext4_mb_discard_preallocations: OK [ 81.612858] Testing event ext4_discard_preallocations: OK [ 81.723838] Testing event ext4_mb_release_group_pa: OK [ 81.835874] Testing event ext4_mb_release_inode_pa: OK [ 81.948113] Testing event ext4_mb_new_group_pa: OK [ 82.058719] Testing event ext4_mb_new_inode_pa: OK [ 82.169752] Testing event ext4_discard_blocks: OK [ 82.284968] Testing event ext4_journalled_invalidate_folio: OK [ 82.395836] Testing event ext4_invalidate_folio: OK [ 82.507772] Testing event ext4_release_folio: OK [ 82.619788] Testing event ext4_read_folio: OK [ 82.733893] Testing event ext4_writepages_result: OK [ 82.844873] Testing event ext4_da_write_pages_extent: OK [ 82.955801] Testing event ext4_da_write_pages: OK [ 83.070056] Testing event ext4_writepages: OK [ 83.181835] Testing event ext4_da_write_end: OK [ 83.292863] Testing event ext4_journalled_write_end: OK [ 83.403873] Testing event ext4_write_end: OK [ 83.514935] Testing event ext4_da_write_begin: OK [ 83.627747] Testing event ext4_write_begin: OK [ 83.738825] Testing event ext4_begin_ordered_truncate: OK [ 83.850942] Testing event ext4_mark_inode_dirty: OK [ 83.961812] Testing event ext4_nfs_commit_metadata: OK [ 84.072825] Testing event ext4_drop_inode: OK [ 84.188059] Testing event ext4_evict_inode: OK [ 84.299802] Testing event ext4_allocate_inode: OK [ 84.411132] Testing event ext4_request_inode: OK [ 84.522837] Testing event ext4_free_inode: OK [ 84.636096] Testing event ext4_other_inode_update_time: OK [ 84.747162] Testing event jbd2_shrink_checkpoint_list: OK [ 84.859158] Testing event jbd2_shrink_scan_exit: OK [ 84.970792] Testing event jbd2_shrink_scan_enter: OK [ 85.081724] Testing event jbd2_shrink_count: OK [ 85.192805] Testing event jbd2_lock_buffer_stall: OK [ 85.303971] Testing event jbd2_write_superblock: OK [ 85.416031] Testing event jbd2_update_log_tail: OK [ 85.527004] Testing event jbd2_checkpoint_stats: OK [ 85.637721] Testing event jbd2_run_stats: OK [ 85.748863] Testing event jbd2_handle_stats: OK [ 85.861751] Testing event jbd2_handle_extend: OK [ 85.972911] Testing event jbd2_handle_restart: OK [ 86.084842] Testing event jbd2_handle_start: OK [ 86.195979] Testing event jbd2_submit_inode_data: OK [ 86.307886] Testing event jbd2_end_commit: OK [ 86.418975] Testing event jbd2_drop_transaction: OK [ 86.530820] Testing event jbd2_commit_logging: OK [ 86.641658] Testing event jbd2_commit_flushing: OK [ 86.753796] Testing event jbd2_commit_locking: OK [ 86.864977] Testing event jbd2_start_commit: OK [ 86.975977] Testing event jbd2_checkpoint: OK [ 87.086808] Testing event nfs_xdr_bad_filehandle: OK [ 87.197923] Testing event nfs_xdr_status: OK [ 87.308935] Testing event nfs_mount_path: OK [ 87.419860] Testing event nfs_mount_option: OK [ 87.530949] Testing event nfs_mount_assign: OK [ 87.644412] Testing event nfs_fh_to_dentry: OK [ 87.755924] Testing event nfs_direct_write_reschedule_io: OK [ 87.870866] Testing event nfs_direct_write_schedule_iovec: OK [ 87.983118] Testing event nfs_direct_write_completion: OK [ 88.094753] Testing event nfs_direct_write_complete: OK [ 88.205831] Testing event nfs_direct_resched_write: OK [ 88.316992] Testing event nfs_direct_commit_complete: OK [ 88.428866] Testing event nfs_commit_done: OK [ 88.539960] Testing event nfs_initiate_commit: OK [ 88.655768] Testing event nfs_commit_error: OK [ 88.766887] Testing event nfs_comp_error: OK [ 88.877828] Testing event nfs_write_error: OK [ 88.995853] Testing event nfs_writeback_done: OK [ 89.107811] Testing event nfs_initiate_write: OK [ 89.219896] Testing event nfs_pgio_error: OK [ 89.332043] Testing event nfs_readpage_short: OK [ 89.443793] Testing event nfs_readpage_done: OK [ 89.555970] Testing event nfs_initiate_read: OK [ 89.667839] Testing event nfs_aop_readahead_done: OK [ 89.780092] Testing event nfs_aop_readahead: OK [ 89.892837] Testing event nfs_launder_folio_done: OK [ 90.003854] Testing event nfs_invalidate_folio: OK [ 90.114954] Testing event nfs_writeback_folio_done: OK [ 90.226856] Testing event nfs_writeback_folio: OK [ 90.337992] Testing event nfs_aop_readpage_done: OK [ 90.448800] Testing event nfs_aop_readpage: OK [ 90.560754] Testing event nfs_sillyrename_unlink: OK [ 90.674059] Testing event nfs_async_rename_done: OK [ 90.784795] Testing event nfs_rename_exit: OK [ 90.895945] Testing event nfs_rename_enter: OK [ 91.011022] Testing event nfs_link_exit: OK [ 91.121957] Testing event nfs_link_enter: OK [ 91.232781] Testing event nfs_symlink_exit: OK [ 91.343676] Testing event nfs_symlink_enter: OK [ 91.454170] Testing event nfs_unlink_exit: OK [ 91.564719] Testing event nfs_unlink_enter: OK [ 91.676745] Testing event nfs_remove_exit: OK [ 91.788929] Testing event nfs_remove_enter: OK [ 91.900843] Testing event nfs_rmdir_exit: OK [ 92.012820] Testing event nfs_rmdir_enter: OK [ 92.128011] Testing event nfs_mkdir_exit: OK [ 92.239773] Testing event nfs_mkdir_enter: OK [ 92.350931] Testing event nfs_mknod_exit: OK [ 92.461847] Testing event nfs_mknod_enter: OK [ 92.573667] Testing event nfs_create_exit: OK [ 92.689952] Testing event nfs_create_enter: OK [ 92.800729] Testing event nfs_atomic_open_exit: OK [ 92.913030] Testing event nfs_atomic_open_enter: OK [ 93.024708] Testing event nfs_readdir_lookup_revalidate: OK [ 93.136881] Testing event nfs_readdir_lookup_revalidate_failed: OK [ 93.248921] Testing event nfs_readdir_lookup: OK [ 93.360697] Testing event nfs_lookup_revalidate_exit: OK [ 93.471934] Testing event nfs_lookup_revalidate_enter: OK [ 93.584072] Testing event nfs_lookup_exit: OK [ 93.695812] Testing event nfs_lookup_enter: OK [ 93.808766] Testing event nfs_readdir_uncached: OK [ 93.920704] Testing event nfs_readdir_cache_fill: OK [ 94.032786] Testing event nfs_readdir_invalidate_cache_range: OK [ 94.145920] Testing event nfs_size_grow: OK [ 94.257759] Testing event nfs_size_update: OK [ 94.368813] Testing event nfs_size_wcc: OK [ 94.479845] Testing event nfs_size_truncate: OK [ 94.590815] Testing event nfs_access_exit: OK [ 94.702898] Testing event nfs_readdir_uncached_done: OK [ 94.813893] Testing event nfs_readdir_cache_fill_done: OK [ 94.924820] Testing event nfs_readdir_force_readdirplus: OK [ 95.035809] Testing event nfs_set_cache_invalid: OK [ 95.146950] Testing event nfs_access_enter: OK [ 95.257988] Testing event nfs_fsync_exit: OK [ 95.368920] Testing event nfs_fsync_enter: OK [ 95.484716] Testing event nfs_writeback_inode_exit: OK [ 95.596914] Testing event nfs_writeback_inode_enter: OK [ 95.708021] Testing event nfs_setattr_exit: OK [ 95.819935] Testing event nfs_setattr_enter: OK [ 95.930675] Testing event nfs_getattr_exit: OK [ 96.041867] Testing event nfs_getattr_enter: OK [ 96.153818] Testing event nfs_invalidate_mapping_exit: OK [ 96.264821] Testing event nfs_invalidate_mapping_enter: OK [ 96.376966] Testing event nfs_revalidate_inode_exit: OK [ 96.488895] Testing event nfs_revalidate_inode_enter: OK [ 96.599915] Testing event nfs_refresh_inode_exit: OK [ 96.710871] Testing event nfs_refresh_inode_enter: OK [ 96.821914] Testing event nfs_set_inode_stale: OK [ 96.933995] Testing event nlmclnt_grant: OK [ 97.045803] Testing event nlmclnt_unlock: OK [ 97.156721] Testing event nlmclnt_lock: OK [ 97.269059] Testing event nlmclnt_test: OK [ 97.384956] Testing event selinux_audited: OK [ 97.496828] Testing event block_rq_remap: OK [ 97.609571] Testing event block_bio_remap: OK [ 97.719756] Testing event block_split: OK [ 97.831722] Testing event block_unplug: OK [ 97.943018] Testing event block_plug: OK [ 98.055879] Testing event block_getrq: OK [ 98.166695] Testing event block_bio_queue: OK [ 98.276664] Testing event block_bio_frontmerge: OK [ 98.390659] Testing event block_bio_backmerge: OK [ 98.501876] Testing event block_bio_bounce: OK [ 98.612626] Testing event block_bio_complete: OK [ 98.723773] Testing event block_io_done: OK [ 98.836763] Testing event block_io_start: OK [ 98.947687] Testing event block_rq_merge: OK [ 99.057990] Testing event block_rq_issue: OK [ 99.168751] Testing event block_rq_insert: OK [ 99.279953] Testing event block_rq_error: OK [ 99.391624] Testing event block_rq_complete: OK [ 99.502855] Testing event block_rq_requeue: OK [ 99.613721] Testing event block_dirty_buffer: OK [ 99.726755] Testing event block_touch_buffer: OK [ 99.837874] Testing event kyber_throttled: OK [ 99.948929] Testing event kyber_adjust: OK [ 100.060597] Testing event kyber_latency: OK [ 100.171649] Testing event wbt_timer: OK [ 100.285645] Testing event wbt_step: OK [ 100.399683] Testing event wbt_lat: OK [ 100.512667] Testing event wbt_stat: OK [ 100.624908] Testing event io_uring_local_work_run: OK [ 100.737985] Testing event io_uring_short_write: OK [ 100.850013] Testing event io_uring_task_work_run: OK [ 100.961854] Testing event io_uring_cqe_overflow: OK [ 101.074023] Testing event io_uring_req_failed: OK [ 101.185897] Testing event io_uring_task_add: OK [ 101.296935] Testing event io_uring_poll_arm: OK [ 101.408790] Testing event io_uring_submit_req: OK [ 101.519766] Testing event io_uring_complete: OK [ 101.631831] Testing event io_uring_fail_link: OK [ 101.743975] Testing event io_uring_cqring_wait: OK [ 101.854710] Testing event io_uring_link: OK [ 101.964632] Testing event io_uring_defer: OK [ 102.076916] Testing event io_uring_queue_async_work: OK [ 102.190794] Testing event io_uring_file_get: OK [ 102.303721] Testing event io_uring_register: OK [ 102.415763] Testing event io_uring_create: OK [ 102.527729] Testing event rdpmc: OK [ 102.640629] Testing event write_msr: OK [ 102.754843] Testing event read_msr: OK [ 102.867499] Testing event gpio_value: OK [ 102.980950] Testing event gpio_direction: OK [ 103.092004] Testing event pwm_get: OK [ 103.203653] Testing event pwm_apply: OK [ 103.314945] Testing event clk_rate_request_done: OK [ 103.427248] Testing event clk_rate_request_start: OK [ 103.539538] Testing event clk_set_duty_cycle_complete: OK [ 103.650921] Testing event clk_set_duty_cycle: OK [ 103.761871] Testing event clk_set_phase_complete: OK [ 103.872949] Testing event clk_set_phase: OK [ 103.983991] Testing event clk_set_parent_complete: OK [ 104.095916] Testing event clk_set_parent: OK [ 104.207029] Testing event clk_set_rate_range: OK [ 104.318704] Testing event clk_set_max_rate: OK [ 104.429729] Testing event clk_set_min_rate: OK [ 104.542851] Testing event clk_set_rate_complete: OK [ 104.654884] Testing event clk_set_rate: OK [ 104.766696] Testing event clk_unprepare_complete: OK [ 104.877838] Testing event clk_unprepare: OK [ 104.989702] Testing event clk_prepare_complete: OK [ 105.102021] Testing event clk_prepare: OK [ 105.213795] Testing event clk_disable_complete: OK [ 105.325778] Testing event clk_disable: OK [ 105.437870] Testing event clk_enable_complete: OK [ 105.549768] Testing event clk_enable: OK [ 105.662778] Testing event cache_tag_flush_range_np: OK [ 105.774876] Testing event cache_tag_flush_range: OK [ 105.886798] Testing event cache_tag_flush_all: OK [ 105.998776] Testing event cache_tag_unassign: OK [ 106.110753] Testing event cache_tag_assign: OK [ 106.223816] Testing event prq_report: OK [ 106.334587] Testing event qi_submit: OK [ 106.446799] Testing event io_page_fault: OK [ 106.557913] Testing event unmap: OK [ 106.668668] Testing event map: OK [ 106.779816] Testing event attach_device_to_domain: OK [ 106.890765] Testing event remove_device_from_group: OK [ 107.003895] Testing event add_device_to_group: OK [ 107.114797] Testing event regcache_drop_region: OK [ 107.225913] Testing event regmap_async_complete_done: OK [ 107.339922] Testing event regmap_async_complete_start: OK [ 107.450779] Testing event regmap_async_io_complete: OK [ 107.561994] Testing event regmap_async_write_start: OK [ 107.674761] Testing event regmap_cache_bypass: OK [ 107.786980] Testing event regmap_cache_only: OK [ 107.899900] Testing event regcache_sync: OK [ 108.011825] Testing event regmap_hw_write_done: OK [ 108.122832] Testing event regmap_hw_write_start: OK [ 108.235033] Testing event regmap_hw_read_done: OK [ 108.345907] Testing event regmap_hw_read_start: OK [ 108.456784] Testing event regmap_bulk_read: OK [ 108.567832] Testing event regmap_bulk_write: OK [ 108.679045] Testing event regmap_reg_read_cache: OK [ 108.790814] Testing event regmap_reg_read: OK [ 108.901791] Testing event regmap_reg_write: OK [ 109.012779] Testing event devres_log: OK [ 109.124856] Testing event dma_fence_wait_end: OK [ 109.236777] Testing event dma_fence_wait_start: OK [ 109.350779] Testing event dma_fence_signaled: OK [ 109.461785] Testing event dma_fence_enable_signal: OK [ 109.573825] Testing event dma_fence_destroy: OK [ 109.685751] Testing event dma_fence_init: OK [ 109.797920] Testing event dma_fence_emit: OK [ 109.908727] Testing event scsi_eh_wakeup: OK [ 110.024015] Testing event scsi_dispatch_cmd_timeout: OK [ 110.134844] Testing event scsi_dispatch_cmd_done: OK [ 110.246716] Testing event scsi_dispatch_cmd_error: OK [ 110.357819] Testing event scsi_dispatch_cmd_start: OK [ 110.468747] Testing event spi_transfer_stop: OK [ 110.579838] Testing event spi_transfer_start: OK [ 110.690887] Testing event spi_message_done: OK [ 110.801910] Testing event spi_message_start: OK [ 110.913751] Testing event spi_message_submit: OK [ 111.027911] Testing event spi_set_cs: OK [ 111.138797] Testing event spi_setup: OK [ 111.253711] Testing event spi_controller_busy: OK [ 111.364755] Testing event spi_controller_idle: OK [ 111.476903] Testing event mdio_access: OK [ 111.588085] Testing event e1000e_trace_mac_register: OK [ 111.699904] Testing event i40e_xmit_frame_ring_drop: OK [ 111.810826] Testing event i40e_xmit_frame_ring: OK [ 111.922685] Testing event i40e_clean_rx_irq_rx: OK [ 112.034748] Testing event i40e_clean_rx_irq: OK [ 112.145722] Testing event i40e_clean_tx_irq_unmap: OK [ 112.257826] Testing event i40e_clean_tx_irq: OK [ 112.369663] Testing event i40e_napi_poll: OK [ 112.480996] Testing event nvsp_recv: OK [ 112.591683] Testing event nvsp_send_pkt: OK [ 112.703616] Testing event nvsp_send: OK [ 112.816196] Testing event rndis_recv: OK [ 112.927715] Testing event rndis_send: OK [ 113.038765] Testing event xhci_dbc_giveback_request: OK [ 113.150692] Testing event xhci_dbc_queue_request: OK [ 113.261895] Testing event xhci_dbc_free_request: OK [ 113.376648] Testing event xhci_dbc_alloc_request: OK [ 113.490962] Testing event xhci_ring_host_doorbell: OK [ 113.603764] Testing event xhci_ring_ep_doorbell: OK [ 113.715997] Testing event xhci_hub_status_data: OK [ 113.826827] Testing event xhci_get_port_status: OK [ 113.938756] Testing event xhci_handle_port_status: OK [ 114.050714] Testing event xhci_inc_deq: OK [ 114.164755] Testing event xhci_inc_enq: OK [ 114.282713] Testing event xhci_ring_expansion: OK [ 114.394007] Testing event xhci_ring_free: OK [ 114.504751] Testing event xhci_ring_alloc: OK [ 114.615772] Testing event xhci_configure_endpoint_ctrl_ctx: OK [ 114.727907] Testing event xhci_address_ctrl_ctx: OK [ 114.839724] Testing event xhci_configure_endpoint: OK [ 114.951828] Testing event xhci_handle_cmd_set_deq: OK [ 115.065771] Testing event xhci_handle_cmd_reset_dev: OK [ 115.177781] Testing event xhci_handle_cmd_addr_dev: OK [ 115.289721] Testing event xhci_setup_device_slot: OK [ 115.402957] Testing event xhci_discover_or_reset_device: OK [ 115.514932] Testing event xhci_handle_cmd_disable_slot: OK [ 115.626043] Testing event xhci_free_dev: OK [ 115.738818] Testing event xhci_alloc_dev: OK [ 115.849730] Testing event xhci_add_endpoint: OK [ 115.961828] Testing event xhci_handle_cmd_config_ep: OK [ 116.072915] Testing event xhci_handle_cmd_reset_ep: OK [ 116.183972] Testing event xhci_handle_cmd_set_deq_ep: OK [ 116.294972] Testing event xhci_handle_cmd_stop_ep: OK [ 116.405840] Testing event xhci_urb_dequeue: OK [ 116.517010] Testing event xhci_urb_giveback: OK [ 116.627785] Testing event xhci_urb_enqueue: OK [ 116.739774] Testing event xhci_stop_device: OK [ 116.852944] Testing event xhci_setup_addressable_virt_device: OK [ 116.963956] Testing event xhci_setup_device: OK [ 117.074780] Testing event xhci_alloc_virt_device: OK [ 117.185821] Testing event xhci_free_virt_device: OK [ 117.296718] Testing event xhci_dbc_gadget_ep_queue: OK [ 117.407886] Testing event xhci_dbc_handle_transfer: OK [ 117.519832] Testing event xhci_dbc_handle_event: OK [ 117.631711] Testing event xhci_queue_trb: OK [ 117.742769] Testing event xhci_handle_transfer: OK [ 117.856788] Testing event xhci_handle_command: OK [ 117.968977] Testing event xhci_handle_event: OK [ 118.080803] Testing event xhci_address_ctx: OK [ 118.198879] Testing event xhci_dbg_ring_expansion: OK [ 118.309882] Testing event xhci_dbg_init: OK [ 118.420836] Testing event xhci_dbg_cancel_urb: OK [ 118.532730] Testing event xhci_dbg_reset_ep: OK [ 118.643705] Testing event xhci_dbg_quirks: OK [ 118.756004] Testing event xhci_dbg_context_change: OK [ 118.867866] Testing event xhci_dbg_address: OK [ 118.980948] Testing event ucsi_register_altmode: OK [ 119.092834] Testing event ucsi_register_port: OK [ 119.204687] Testing event ucsi_connector_change: OK [ 119.316808] Testing event ucsi_reset_ppm: OK [ 119.427622] Testing event ucsi_run_command: OK [ 119.539672] Testing event rtc_timer_fired: OK [ 119.650892] Testing event rtc_timer_dequeue: OK [ 119.762955] Testing event rtc_timer_enqueue: OK [ 119.873927] Testing event rtc_read_offset: OK [ 119.985020] Testing event rtc_set_offset: OK [ 120.096777] Testing event rtc_alarm_irq_enable: OK [ 120.207923] Testing event rtc_irq_set_state: OK [ 120.319041] Testing event rtc_irq_set_freq: OK [ 120.430920] Testing event rtc_read_alarm: OK [ 120.542060] Testing event rtc_set_alarm: OK [ 120.653760] Testing event rtc_read_time: OK [ 120.768691] Testing event rtc_set_time: OK [ 120.880844] Testing event i2c_result: OK [ 120.993658] Testing event i2c_reply: OK [ 121.105912] Testing event i2c_read: OK [ 121.217879] Testing event i2c_write: OK [ 121.328761] Testing event smbus_result: OK [ 121.440941] Testing event smbus_reply: OK [ 121.552724] Testing event smbus_read: OK [ 121.663816] Testing event smbus_write: OK [ 121.775878] Testing event hwmon_attr_show_string: OK [ 121.887776] Testing event hwmon_attr_store: OK [ 121.998702] Testing event hwmon_attr_show: OK [ 122.109808] Testing event thermal_zone_trip: OK [ 122.220866] Testing event cdev_update: OK [ 122.336881] Testing event thermal_temperature: OK [ 122.447778] Testing event watchdog_set_timeout: OK [ 122.559778] Testing event watchdog_stop: OK [ 122.672832] Testing event watchdog_ping: OK [ 122.784698] Testing event watchdog_start: OK [ 122.896020] Testing event amd_pstate_perf: OK [ 123.007939] Testing event cros_ec_request_done: OK [ 123.118916] Testing event cros_ec_request_start: OK [ 123.229820] Testing event vmbus_on_event: OK [ 123.343729] Testing event vmbus_setevent: OK [ 123.454646] Testing event vmbus_chan_sched: OK [ 123.566921] Testing event vmbus_send_modifychannel: OK [ 123.678898] Testing event vmbus_send_tl_connect_request: OK [ 123.789837] Testing event vmbus_release_relid: OK [ 123.901780] Testing event vmbus_negotiate_version: OK [ 124.014815] Testing event vmbus_teardown_gpadl: OK [ 124.126855] Testing event vmbus_establish_gpadl_body: OK [ 124.238690] Testing event vmbus_establish_gpadl_header: OK [ 124.349919] Testing event vmbus_close_internal: OK [ 124.461773] Testing event vmbus_open: OK [ 124.572944] Testing event vmbus_request_offers: OK [ 124.683788] Testing event vmbus_onversion_response: OK [ 124.795914] Testing event vmbus_ongpadl_torndown: OK [ 124.906841] Testing event vmbus_onmodifychannel_response: OK [ 125.019008] Testing event vmbus_ongpadl_created: OK [ 125.129778] Testing event vmbus_onopen_result: OK [ 125.240718] Testing event vmbus_onoffer_rescind: OK [ 125.352803] Testing event vmbus_onoffer: OK [ 125.465971] Testing event vmbus_on_message: OK [ 125.577836] Testing event vmbus_on_msg_dpc: OK [ 125.688899] Testing event memory_failure_event: OK [ 125.799779] Testing event aer_event: OK [ 125.911782] Testing event non_standard_event: OK [ 126.022885] Testing event arm_event: OK [ 126.134772] Testing event mc_event: OK [ 126.245693] Testing event extlog_mem_event: OK [ 126.358759] Testing event tb_rx: OK [ 126.469726] Testing event tb_event: OK [ 126.581719] Testing event tb_tx: OK [ 126.692816] Testing event neigh_cleanup_and_release: OK [ 126.803841] Testing event neigh_event_send_dead: OK [ 126.914851] Testing event neigh_event_send_done: OK [ 127.025801] Testing event neigh_timer_handler: OK [ 127.137949] Testing event neigh_update_done: OK [ 127.249861] Testing event neigh_update: OK [ 127.360861] Testing event neigh_create: OK [ 127.471792] Testing event page_pool_update_nid: OK [ 127.583803] Testing event page_pool_state_hold: OK [ 127.695150] Testing event page_pool_state_release: OK [ 127.806898] Testing event page_pool_release: OK [ 127.918831] Testing event br_mdb_full: OK [ 128.029725] Testing event br_fdb_update: OK [ 128.140590] Testing event fdb_delete: OK [ 128.251722] Testing event br_fdb_external_learn_add: OK [ 128.362859] Testing event br_fdb_add: OK [ 128.473820] Testing event qdisc_create: OK [ 128.586763] Testing event qdisc_destroy: OK [ 128.699766] Testing event qdisc_reset: OK [ 128.811689] Testing event qdisc_enqueue: OK [ 128.922786] Testing event qdisc_dequeue: OK [ 129.035726] Testing event fib_table_lookup: OK [ 129.149984] Testing event tcp_ao_rcv_sne_update: OK [ 129.261633] Testing event tcp_ao_snd_sne_update: OK [ 129.372787] Testing event tcp_ao_synack_no_key: OK [ 129.483807] Testing event tcp_ao_rnext_request: OK [ 129.596482] Testing event tcp_ao_key_not_found: OK [ 129.710656] Testing event tcp_ao_mismatch: OK [ 129.822804] Testing event tcp_ao_wrong_maclen: OK [ 129.936685] Testing event tcp_ao_handshake_failure: OK [ 130.047975] Testing event tcp_hash_ao_required: OK [ 130.159670] Testing event tcp_hash_md5_mismatch: OK [ 130.270926] Testing event tcp_hash_md5_unexpected: OK [ 130.382007] Testing event tcp_hash_md5_required: OK [ 130.492892] Testing event tcp_hash_bad_header: OK [ 130.604778] Testing event tcp_cong_state_set: OK [ 130.719021] Testing event tcp_bad_csum: OK [ 130.830992] Testing event tcp_probe: OK [ 130.942670] Testing event tcp_retransmit_synack: OK [ 131.053768] Testing event tcp_rcv_space_adjust: OK [ 131.165683] Testing event tcp_destroy_sock: OK [ 131.276714] Testing event tcp_receive_reset: OK [ 131.387774] Testing event tcp_send_reset: OK [ 131.499839] Testing event tcp_retransmit_skb: OK [ 131.611767] Testing event udp_fail_queue_rcv_skb: OK [ 131.722861] Testing event sock_recv_length: OK [ 131.834056] Testing event sock_send_length: OK [ 131.944773] Testing event sk_data_ready: OK [ 132.059214] Testing event inet_sk_error_report: OK [ 132.170949] Testing event inet_sock_set_state: OK [ 132.281857] Testing event sock_exceed_buf_limit: OK [ 132.392883] Testing event sock_rcvqueue_full: OK [ 132.505842] Testing event dql_stall_detected: OK [ 132.616837] Testing event napi_poll: OK [ 132.728862] Testing event netif_receive_skb_list_exit: OK [ 132.841797] Testing event netif_rx_exit: OK [ 132.954909] Testing event netif_receive_skb_exit: OK [ 133.066924] Testing event napi_gro_receive_exit: OK [ 133.178948] Testing event napi_gro_frags_exit: OK [ 133.290795] Testing event netif_rx_entry: OK [ 133.403812] Testing event netif_receive_skb_list_entry: OK [ 133.515860] Testing event netif_receive_skb_entry: OK [ 133.628092] Testing event napi_gro_receive_entry: OK [ 133.738828] Testing event napi_gro_frags_entry: OK [ 133.849858] Testing event netif_rx: OK [ 133.961846] Testing event netif_receive_skb: OK [ 134.072713] Testing event net_dev_queue: OK [ 134.186818] Testing event net_dev_xmit_timeout: OK [ 134.297706] Testing event net_dev_xmit: OK [ 134.409773] Testing event net_dev_start_xmit: OK [ 134.521839] Testing event skb_copy_datagram_iovec: OK [ 134.632790] Testing event consume_skb: OK [ 134.744302] Testing event kfree_skb: OK [ 134.855880] Testing event netlink_extack: OK [ 134.970027] Testing event bpf_test_finish: OK [ 135.082269] Testing event bpf_trigger_tp: OK [ 135.193667] Testing event icmp_send: OK [ 135.304773] Testing event fib6_table_lookup: OK [ 135.415911] Testing event devlink_trap_report: OK [ 135.526978] Testing event devlink_health_reporter_state_update: OK [ 135.638972] Testing event devlink_health_recover_aborted: OK [ 135.750904] Testing event devlink_health_report: OK [ 135.861832] Testing event devlink_hwerr: OK [ 135.975016] Testing event devlink_hwmsg: OK [ 136.085521] Testing event svc_unregister: OK [ 136.200807] Testing event svc_noregister: OK [ 136.314039] Testing event svc_register: OK [ 136.424706] Testing event cache_entry_no_listener: OK [ 136.534892] Testing event cache_entry_make_negative: OK [ 136.645949] Testing event cache_entry_update: OK [ 136.756915] Testing event cache_entry_upcall: OK [ 136.867824] Testing event cache_entry_expired: OK [ 136.978930] Testing event svcsock_getpeername_err: OK [ 137.090876] Testing event svcsock_accept_err: OK [ 137.201818] Testing event svcsock_tcp_state: OK [ 137.313807] Testing event svcsock_tcp_recv_short: OK [ 137.424849] Testing event svcsock_write_space: OK [ 137.536753] Testing event svcsock_data_ready: OK [ 137.647915] Testing event svcsock_tcp_recv_err: OK [ 137.759979] Testing event svcsock_tcp_recv_eagain: OK [ 137.870931] Testing event svcsock_tcp_recv: OK [ 137.981974] Testing event svcsock_tcp_send: OK [ 138.093764] Testing event svcsock_udp_recv_err: OK [ 138.205800] Testing event svcsock_udp_recv: OK [ 138.318901] Testing event svcsock_udp_send: OK [ 138.433908] Testing event svcsock_marker: OK [ 138.545802] Testing event svcsock_free: OK [ 138.658819] Testing event svcsock_new: OK [ 138.770672] Testing event svc_defer_recv: OK [ 138.881781] Testing event svc_defer_queue: OK [ 138.996009] Testing event svc_defer_drop: OK [ 139.108766] Testing event svc_alloc_arg_err: OK [ 139.221944] Testing event svc_wake_up: OK [ 139.332692] Testing event svc_xprt_accept: OK [ 139.443899] Testing event svc_tls_timed_out: OK [ 139.555774] Testing event svc_tls_not_started: OK [ 139.666960] Testing event svc_tls_unavailable: OK [ 139.778821] Testing event svc_tls_upcall: OK [ 139.889694] Testing event svc_tls_start: OK [ 140.000688] Testing event svc_xprt_free: OK [ 140.111894] Testing event svc_xprt_detach: OK [ 140.226801] Testing event svc_xprt_close: OK [ 140.338047] Testing event svc_xprt_no_write_space: OK [ 140.448970] Testing event svc_xprt_dequeue: OK [ 140.559700] Testing event svc_xprt_enqueue: OK [ 140.670691] Testing event svc_xprt_create_err: OK [ 140.782812] Testing event svc_stats_latency: OK [ 140.893924] Testing event svc_replace_page_err: OK [ 141.005879] Testing event svc_send: OK [ 141.117669] Testing event svc_drop: OK [ 141.230762] Testing event svc_defer: OK [ 141.341636] Testing event svc_process: OK [ 141.453688] Testing event svc_authenticate: OK [ 141.564694] Testing event svc_xdr_sendto: OK [ 141.677701] Testing event svc_xdr_recvfrom: OK [ 141.789638] Testing event rpc_tls_not_started: OK [ 141.900700] Testing event rpc_tls_unavailable: OK [ 142.012743] Testing event rpcb_unregister: OK [ 142.125841] Testing event rpcb_register: OK [ 142.237750] Testing event pmap_register: OK [ 142.349721] Testing event rpcb_setport: OK [ 142.461728] Testing event rpcb_getport: OK [ 142.573593] Testing event xs_stream_read_request: OK [ 142.686841] Testing event xs_stream_read_data: OK [ 142.797751] Testing event xs_data_ready: OK [ 142.908704] Testing event xprt_reserve: OK [ 143.020785] Testing event xprt_put_cong: OK [ 143.132655] Testing event xprt_get_cong: OK [ 143.244631] Testing event xprt_release_cong: OK [ 143.355753] Testing event xprt_reserve_cong: OK [ 143.466714] Testing event xprt_release_xprt: OK [ 143.580766] Testing event xprt_reserve_xprt: OK [ 143.694949] Testing event xprt_ping: OK [ 143.805883] Testing event xprt_retransmit: OK [ 143.916718] Testing event xprt_transmit: OK [ 144.027931] Testing event xprt_lookup_rqst: OK [ 144.138890] Testing event xprt_timer: OK [ 144.250693] Testing event xprt_destroy: OK [ 144.361789] Testing event xprt_disconnect_force: OK [ 144.473674] Testing event xprt_disconnect_done: OK [ 144.584808] Testing event xprt_disconnect_auto: OK [ 144.695792] Testing event xprt_connect: OK [ 144.806683] Testing event xprt_create: OK [ 144.918669] Testing event rpc_socket_nospace: OK [ 145.031877] Testing event rpc_socket_shutdown: OK [ 145.143785] Testing event rpc_socket_close: OK [ 145.254656] Testing event rpc_socket_reset_connection: OK [ 145.369759] Testing event rpc_socket_error: OK [ 145.480785] Testing event rpc_socket_connect: OK [ 145.591922] Testing event rpc_socket_state_change: OK [ 145.703772] Testing event rpc_xdr_alignment: OK [ 145.816871] Testing event rpc_xdr_overflow: OK [ 145.928838] Testing event rpc_stats_latency: OK [ 146.040038] Testing event rpc_call_rpcerror: OK [ 146.150749] Testing event rpc_buf_alloc: OK [ 146.261897] Testing event rpcb_unrecognized_err: OK [ 146.372797] Testing event rpcb_unreachable_err: OK [ 146.483787] Testing event rpcb_bind_version_err: OK [ 146.594874] Testing event rpcb_timeout_err: OK [ 146.705714] Testing event rpcb_prog_unavail_err: OK [ 146.819774] Testing event rpc__auth_tooweak: OK [ 146.930823] Testing event rpc__bad_creds: OK [ 147.043027] Testing event rpc__stale_creds: OK [ 147.155003] Testing event rpc__mismatch: OK [ 147.266852] Testing event rpc__unparsable: OK [ 147.379714] Testing event rpc__garbage_args: OK [ 147.490833] Testing event rpc__proc_unavail: OK [ 147.601756] Testing event rpc__prog_mismatch: OK [ 147.713901] Testing event rpc__prog_unavail: OK [ 147.824695] Testing event rpc_bad_verifier: OK [ 147.936715] Testing event rpc_bad_callhdr: OK [ 148.047752] Testing event rpc_task_wakeup: OK [ 148.158776] Testing event rpc_task_sleep: OK [ 148.270959] Testing event rpc_task_call_done: OK [ 148.382715] Testing event rpc_task_end: OK [ 148.493773] Testing event rpc_task_signalled: OK [ 148.604679] Testing event rpc_task_timeout: OK [ 148.716772] Testing event rpc_task_complete: OK [ 148.830648] Testing event rpc_task_sync_wake: OK [ 148.941803] Testing event rpc_task_sync_sleep: OK [ 149.052803] Testing event rpc_task_run_action: OK [ 149.164981] Testing event rpc_task_begin: OK [ 149.275707] Testing event rpc_request: OK [ 149.388700] Testing event rpc_refresh_status: OK [ 149.500708] Testing event rpc_retry_refresh_status: OK [ 149.613133] Testing event rpc_timeout_status: OK [ 149.726801] Testing event rpc_connect_status: OK [ 149.837723] Testing event rpc_call_status: OK [ 149.951789] Testing event rpc_clnt_clone_err: OK [ 150.063774] Testing event rpc_clnt_new_err: OK [ 150.176792] Testing event rpc_clnt_new: OK [ 150.287867] Testing event rpc_clnt_replace_xprt_err: OK [ 150.399966] Testing event rpc_clnt_replace_xprt: OK [ 150.512770] Testing event rpc_clnt_release: OK [ 150.623753] Testing event rpc_clnt_shutdown: OK [ 150.735023] Testing event rpc_clnt_killall: OK [ 150.845689] Testing event rpc_clnt_free: OK [ 150.956623] Testing event rpc_xdr_reply_pages: OK [ 151.069819] Testing event rpc_xdr_recvfrom: OK [ 151.181861] Testing event rpc_xdr_sendto: OK [ 151.292933] Testing event 9p_fid_ref: OK [ 151.404095] Testing event 9p_protocol_dump: OK [ 151.517068] Testing event 9p_client_res: OK [ 151.628889] Testing event 9p_client_req: OK [ 151.739710] Testing event subflow_check_data_avail: OK [ 151.850827] Testing event ack_update_msk: OK [ 151.962663] Testing event get_mapping_status: OK [ 152.073704] Testing event mptcp_sendmsg_frag: OK [ 152.186759] Testing event mptcp_subflow_get_send: OK [ 152.298809] Testing event mctp_key_release: OK [ 152.410122] Testing event mctp_key_acquire: OK [ 152.522750] Testing event tls_alert_recv: OK [ 152.635900] Testing event tls_alert_send: OK [ 152.747756] Testing event tls_contenttype: OK [ 152.859758] Testing event handshake_cmd_done_err: OK [ 152.970817] Testing event handshake_cmd_done: OK [ 153.082974] Testing event handshake_cmd_accept_err: OK [ 153.193829] Testing event handshake_cmd_accept: OK [ 153.305657] Testing event handshake_notify_err: OK [ 153.418808] Testing event handshake_complete: OK [ 153.529711] Testing event handshake_destruct: OK [ 153.642912] Testing event handshake_cancel_busy: OK [ 153.753861] Testing event handshake_cancel_none: OK [ 153.865799] Testing event handshake_cancel: OK [ 153.977800] Testing event handshake_submit_err: OK [ 154.089812] Testing event handshake_submit: OK [ 154.202764] Testing event ma_write: OK [ 154.314346] Testing event ma_read: OK [ 154.424784] Testing event ma_op: OK [ 154.535990] Running tests on trace event systems: [ 154.536772] Testing event system maple_tree: OK [ 154.650892] Testing event system handshake: OK [ 154.767089] Testing event system mctp: OK [ 154.878220] Testing event system mptcp: OK [ 154.990471] Testing event system 9p: OK [ 155.107091] Testing event system sunrpc: OK [ 155.261118] Testing event system devlink: OK [ 155.374528] Testing event system fib6: OK [ 155.488057] Testing event system icmp: OK [ 155.599882] Testing event system bpf_test_run: OK [ 155.715134] Testing event system netlink: OK [ 155.826142] Testing event system skb: OK [ 155.938477] Testing event system net: OK [ 156.055501] Testing event system napi: OK [ 156.167104] Testing event system sock: OK [ 156.281266] Testing event system udp: OK [ 156.392856] Testing event system tcp: OK [ 156.509725] Testing event system fib: OK [ 156.622975] Testing event system qdisc: OK [ 156.736663] Testing event system bridge: OK [ 156.849124] Testing event system page_pool: OK [ 156.967364] Testing event system neigh: OK [ 157.079604] Testing event system thunderbolt: OK [ 157.192094] Testing event system ras: OK [ 157.305485] Testing event system cros_ec: OK [ 157.419258] Testing event system amd_cpu: OK [ 157.531784] Testing event system watchdog: OK [ 157.643315] Testing event system thermal: OK [ 157.757222] Testing event system hwmon: OK [ 157.868376] Testing event system smbus: OK [ 157.981389] Testing event system i2c: OK [ 158.095309] Testing event system rtc: OK [ 158.211006] Testing event system ucsi: OK [ 158.324090] Testing event system xhci-hcd: OK [ 158.452083] Testing event system netvsc: OK [ 158.565771] Testing event system i40e: OK [ 158.681902] Testing event system e1000e_trace: OK [ 158.793979] Testing event system mdio: OK [ 158.906157] Testing event system spi: OK [ 159.023177] Testing event system scsi: OK [ 159.137582] Testing event system dma_fence: OK [ 159.253610] Testing event system dev: OK [ 159.364983] Testing event system regmap: OK [ 159.481806] Testing event system iommu: OK [ 159.594536] Testing event system intel_iommu: OK [ 159.708737] Testing event system clk: OK [ 159.828939] Testing event system pwm: OK [ 159.941117] Testing event system gpio: OK [ 160.055233] Testing event system msr: OK [ 160.170646] Testing event system io_uring: OK [ 160.288427] Testing event system wbt: OK [ 160.401436] Testing event system kyber: OK [ 160.513340] Testing event system block: OK [ 160.632138] Testing event system avc: OK [ 160.744693] Testing event system lockd: OK [ 160.857188] Testing event system nfs: OK [ 160.997511] Testing event system jbd2: OK [ 161.116067] Testing event system ext4: OK [ 161.265998] Testing event system fscache: OK [ 161.385036] Testing event system netfs: OK [ 161.509059] Testing event system iomap: OK [ 161.625519] Testing event system filelock: OK [ 161.739518] Testing event system fs_dax: OK [ 161.855671] Testing event system writeback: OK [ 161.977984] Testing event system damon: OK [ 162.090042] Testing event system page_isolation: OK [ 162.204015] Testing event system huge_memory: OK [ 162.317837] Testing event system thp: OK [ 162.430274] Testing event system ksm: OK [ 162.544994] Testing event system vmalloc: OK [ 162.656043] Testing event system tlb: OK [ 162.768080] Testing event system migrate: OK [ 162.880484] Testing event system mmap: OK [ 162.991979] Testing event system mmap_lock: OK [ 163.105067] Testing event system compaction: OK [ 163.221059] Testing event system kmem: OK [ 163.338795] Testing event system percpu: OK [ 163.453501] Testing event system vmscan: OK [ 163.569647] Testing event system pagemap: OK [ 163.683047] Testing event system oom: OK [ 163.797015] Testing event system filemap: OK [ 163.909505] Testing event system rseq: OK [ 164.020983] Testing event system context_tracking: OK [ 164.133052] Testing event system xdp: OK [ 164.249598] Testing event system rpm: OK [ 164.363911] Testing event system power: OK [ 164.488107] Testing event system error_report: OK [ 164.601019] Testing event system bpf_trace: OK [ 164.711999] Testing event system test: OK [ 164.823670] Testing event system cgroup: OK [ 164.943458] Testing event system csd: OK [ 165.057446] Testing event system timer_migration: OK [ 165.174034] Testing event system alarmtimer: OK [ 165.286270] Testing event system timer: OK [ 165.402909] Testing event system module: OK [ 165.516715] Testing event system raw_syscalls: OK [ 165.628128] Testing event system swiotlb: OK [ 165.739822] Testing event system rcu: OK [ 165.852564] Testing event system irq_matrix: OK [ 165.966695] Testing event system printk: OK [ 166.077936] Testing event system lock: OK [ 166.193959] Testing event system sched: OK [ 166.314954] Testing event system ipi: OK [ 166.431426] Testing event system notifier: OK [ 166.543339] Testing event system workqueue: OK [ 166.655325] Testing event system signal: OK [ 166.767159] Testing event system irq: OK [ 166.880092] Testing event system cpuhp: OK [ 166.993533] Testing event system task: OK [ 167.106047] Testing event system exceptions: OK [ 167.218077] Testing event system mce: OK [ 167.329760] Testing event system x86_fpu: OK [ 167.444387] Testing event system nmi: OK [ 167.555760] Testing event system irq_vectors: OK [ 167.677303] Testing event system syscalls: OK [ 167.789222] Testing event system hyperv: OK [ 167.908957] Testing event system xen: OK [ 168.024303] Testing event system vsyscall: OK [ 168.135826] Testing event system initcall: OK [ 168.247374] Running tests on all trace events: [ 168.248079] Testing all events: OK [ 169.472813] Running tests again, along with the function tracer [ 169.475357] Running tests on trace events: [ 169.477642] Testing event initcall_finish: OK [ 169.595797] Testing event initcall_start: OK [ 169.714012] Testing event initcall_level: OK [ 169.832505] Testing event emulate_vsyscall: OK [ 169.950904] Testing event xen_cpu_set_ldt: OK [ 170.067716] Testing event xen_cpu_write_gdt_entry: OK [ 170.184697] Testing event xen_cpu_load_idt: OK [ 170.303181] Testing event xen_cpu_write_idt_entry: OK [ 170.420127] Testing event xen_cpu_write_ldt_entry: OK [ 170.536893] Testing event xen_mmu_write_cr3: OK [ 170.653712] Testing event xen_mmu_flush_tlb_multi: OK [ 170.771192] Testing event xen_mmu_flush_tlb_one_user: OK [ 170.890200] Testing event xen_mmu_pgd_unpin: OK [ 171.008770] Testing event xen_mmu_pgd_pin: OK [ 171.125767] Testing event xen_mmu_release_ptpage: OK [ 171.242902] Testing event xen_mmu_alloc_ptpage: OK [ 171.362057] Testing event xen_mmu_ptep_modify_prot_commit: OK [ 171.480151] Testing event xen_mmu_ptep_modify_prot_start: OK [ 171.597877] Testing event xen_mmu_set_p4d: OK [ 171.716002] Testing event xen_mmu_set_pud: OK [ 171.833835] Testing event xen_mmu_set_pmd: OK [ 171.950916] Testing event xen_mmu_set_pte: OK [ 172.068052] Testing event xen_mc_extend_args: OK [ 172.185329] Testing event xen_mc_flush: OK [ 172.302938] Testing event xen_mc_flush_reason: OK [ 172.420061] Testing event xen_mc_callback: OK [ 172.538963] Testing event xen_mc_entry_alloc: OK [ 172.656158] Testing event xen_mc_entry: OK [ 172.775008] Testing event xen_mc_issue: OK [ 172.892975] Testing event xen_mc_batch: OK [ 173.012364] Testing event hyperv_send_ipi_one: OK [ 173.131584] Testing event hyperv_send_ipi_mask: OK [ 173.250233] Testing event hyperv_nested_flush_guest_mapping_range: OK [ 173.369271] Testing event hyperv_nested_flush_guest_mapping: OK [ 173.487649] Testing event hyperv_mmu_flush_tlb_multi: OK [ 173.606274] Testing event vector_free_moved: OK [ 173.725312] Testing event vector_setup: OK [ 173.844313] Testing event vector_teardown: OK [ 173.963283] Testing event vector_deactivate: OK [ 174.083454] Testing event vector_activate: OK [ 174.202317] Testing event vector_alloc_managed: OK [ 174.321183] Testing event vector_alloc: OK [ 174.440170] Testing event vector_reserve: OK [ 174.558195] Testing event vector_reserve_managed: OK [ 174.676216] Testing event vector_clear: OK [ 174.794323] Testing event vector_update: OK [ 174.912156] Testing event vector_config: OK [ 175.031109] Testing event thermal_apic_exit: OK [ 175.149527] Testing event thermal_apic_entry: OK [ 175.270332] Testing event deferred_error_apic_exit: OK [ 175.390282] Testing event deferred_error_apic_entry: OK [ 175.509340] Testing event threshold_apic_exit: OK [ 175.628478] Testing event threshold_apic_entry: OK [ 175.747057] Testing event call_function_single_exit: OK [ 175.865238] Testing event call_function_single_entry: OK [ 175.984359] Testing event call_function_exit: OK [ 176.102231] Testing event call_function_entry: OK [ 176.221671] Testing event reschedule_exit: OK [ 176.340403] Testing event reschedule_entry: OK [ 176.459199] Testing event irq_work_exit: OK [ 176.577336] Testing event irq_work_entry: OK [ 176.695961] Testing event x86_platform_ipi_exit: OK [ 176.814158] Testing event x86_platform_ipi_entry: OK [ 176.932447] Testing event error_apic_exit: OK [ 177.051492] Testing event error_apic_entry: OK [ 177.169369] Testing event spurious_apic_exit: OK [ 177.288393] Testing event spurious_apic_entry: OK [ 177.406280] Testing event local_timer_exit: OK [ 177.524324] Testing event local_timer_entry: OK [ 177.642445] Testing event nmi_handler: OK [ 177.760419] Testing event x86_fpu_xstate_check_failed: OK [ 177.879413] Testing event x86_fpu_copy_dst: OK [ 177.998263] Testing event x86_fpu_copy_src: OK [ 178.118244] Testing event x86_fpu_dropped: OK [ 178.236007] Testing event x86_fpu_init_state: OK [ 178.354367] Testing event x86_fpu_regs_deactivated: OK [ 178.474539] Testing event x86_fpu_regs_activated: OK [ 178.593833] Testing event x86_fpu_after_restore: OK [ 178.711002] Testing event x86_fpu_before_restore: OK [ 178.831241] Testing event x86_fpu_after_save: OK [ 178.949737] Testing event x86_fpu_before_save: OK [ 179.067524] Testing event mce_record: OK [ 179.185096] Testing event page_fault_kernel: OK [ 179.303743] Testing event page_fault_user: OK [ 179.422150] Testing event task_rename: OK [ 179.540298] Testing event task_newtask: OK [ 179.658193] Testing event cpuhp_exit: OK [ 179.777710] Testing event cpuhp_multi_enter: OK [ 179.898798] Testing event cpuhp_enter: OK [ 180.017482] Testing event tasklet_exit: OK [ 180.137565] Testing event tasklet_entry: OK [ 180.255500] Testing event softirq_raise: OK [ 180.374545] Testing event softirq_exit: OK [ 180.492312] Testing event softirq_entry: OK [ 180.611654] Testing event irq_handler_exit: OK [ 180.731102] Testing event irq_handler_entry: OK [ 180.850113] Testing event signal_deliver: OK [ 180.971148] Testing event signal_generate: OK [ 181.089255] Testing event workqueue_execute_end: OK [ 181.208383] Testing event workqueue_execute_start: OK [ 181.327282] Testing event workqueue_activate_work: OK [ 181.446583] Testing event workqueue_queue_work: OK [ 181.565354] Testing event notifier_run: OK [ 181.684648] Testing event notifier_unregister: OK [ 181.803091] Testing event notifier_register: OK [ 181.921265] Testing event ipi_exit: OK [ 182.039839] Testing event ipi_entry: OK [ 182.158284] Testing event ipi_send_cpumask: OK [ 182.276154] Testing event ipi_send_cpu: OK [ 182.396265] Testing event ipi_raise: OK [ 182.514862] Testing event sched_wake_idle_without_ipi: OK [ 182.635020] Testing event sched_skip_vma_numa: OK [ 182.755133] Testing event sched_swap_numa: OK [ 182.873297] Testing event sched_stick_numa: OK [ 182.992524] Testing event sched_move_numa: OK [ 183.112235] Testing event sched_process_hang: OK [ 183.230691] Testing event sched_pi_setprio: OK [ 183.350568] Testing event sched_stat_runtime: OK [ 183.468298] Testing event sched_stat_blocked: OK [ 183.586450] Testing event sched_stat_iowait: OK [ 183.704304] Testing event sched_stat_sleep: OK [ 183.822753] Testing event sched_stat_wait: OK [ 183.942183] Testing event sched_prepare_exec: OK [ 184.060791] Testing event sched_process_exec: OK [ 184.180427] Testing event sched_process_fork: OK [ 184.298327] Testing event sched_process_wait: OK [ 184.417120] Testing event sched_wait_task: OK [ 184.536241] Testing event sched_process_exit: OK [ 184.656436] Testing event sched_process_free: OK [ 184.775191] Testing event sched_migrate_task: OK [ 184.895652] Testing event sched_switch: OK [ 185.016895] Testing event sched_wakeup_new: OK [ 185.137014] Testing event sched_wakeup: OK [ 185.256796] Testing event sched_waking: OK [ 185.378620] Testing event sched_kthread_work_execute_end: OK [ 185.497768] Testing event sched_kthread_work_execute_start: OK [ 185.615715] Testing event sched_kthread_work_queue_work: OK [ 185.734773] Testing event sched_kthread_stop_ret: OK [ 185.852573] Testing event sched_kthread_stop: OK [ 185.972024] Testing event contention_end: OK [ 186.095196] Testing event contention_begin: OK [ 186.218800] Testing event console: OK [ 186.337162] Testing event irq_matrix_free: OK [ 186.455284] Testing event irq_matrix_alloc: OK [ 186.574277] Testing event irq_matrix_assign: OK [ 186.692503] Testing event irq_matrix_alloc_managed: OK [ 186.811170] Testing event irq_matrix_remove_managed: OK [ 186.930625] Testing event irq_matrix_reserve_managed: OK [ 187.048587] Testing event irq_matrix_alloc_reserved: OK [ 187.167100] Testing event irq_matrix_assign_system: OK [ 187.286566] Testing event irq_matrix_remove_reserved: OK [ 187.406712] Testing event irq_matrix_reserve: OK [ 187.525258] Testing event irq_matrix_offline: OK [ 187.643315] Testing event irq_matrix_online: OK [ 187.761219] Testing event rcu_stall_warning: OK [ 187.880456] Testing event rcu_utilization: OK [ 188.002623] Testing event swiotlb_bounced: OK [ 188.122262] Testing event sys_exit: OK [ 188.240519] Testing event sys_enter: OK [ 188.359554] Testing event module_request: OK [ 188.480563] Testing event module_put: OK [ 188.600251] Testing event module_get: OK [ 188.718315] Testing event module_free: OK [ 188.837530] Testing event module_load: OK [ 188.955042] Testing event tick_stop: OK [ 189.076210] Testing event itimer_expire: OK [ 189.195613] Testing event itimer_state: OK [ 189.313374] Testing event hrtimer_cancel: OK [ 189.433653] Testing event hrtimer_expire_exit: OK [ 189.552025] Testing event hrtimer_expire_entry: OK [ 189.670268] Testing event hrtimer_start: OK [ 189.789862] Testing event hrtimer_init: OK [ 189.910178] Testing event timer_base_idle: OK [ 190.028498] Testing event timer_cancel: OK [ 190.153412] Testing event timer_expire_exit: OK [ 190.271164] Testing event timer_expire_entry: OK [ 190.390511] Testing event timer_start: OK [ 190.508161] Testing event timer_init: OK [ 190.627608] Testing event alarmtimer_cancel: OK [ 190.746625] Testing event alarmtimer_start: OK [ 190.864156] Testing event alarmtimer_fired: OK [ 190.982285] Testing event alarmtimer_suspend: OK [ 191.100244] Testing event tmigr_handle_remote: OK [ 191.218056] Testing event tmigr_update_events: OK [ 191.336563] Testing event tmigr_cpu_new_timer_idle: OK [ 191.454337] Testing event tmigr_cpu_idle: OK [ 191.572281] Testing event tmigr_handle_remote_cpu: OK [ 191.691475] Testing event tmigr_cpu_offline: OK [ 191.811174] Testing event tmigr_cpu_online: OK [ 191.929173] Testing event tmigr_cpu_active: OK [ 192.049520] Testing event tmigr_cpu_new_timer: OK [ 192.169350] Testing event tmigr_group_set_cpu_active: OK [ 192.287318] Testing event tmigr_group_set_cpu_inactive: OK [ 192.406695] Testing event tmigr_connect_cpu_parent: OK [ 192.525311] Testing event tmigr_connect_child_parent: OK [ 192.643252] Testing event tmigr_group_set: OK [ 192.761869] Testing event csd_function_exit: OK [ 192.881775] Testing event csd_function_entry: OK [ 193.001744] Testing event csd_queue_cpu: OK [ 193.120678] Testing event cgroup_rstat_cpu_unlock_fastpath: OK [ 193.239811] Testing event cgroup_rstat_cpu_unlock: OK [ 193.358383] Testing event cgroup_rstat_cpu_locked_fastpath: OK [ 193.478374] Testing event cgroup_rstat_cpu_locked: OK [ 193.597352] Testing event cgroup_rstat_cpu_lock_contended_fastpath: OK [ 193.715658] Testing event cgroup_rstat_cpu_lock_contended: OK [ 193.834462] Testing event cgroup_rstat_unlock: OK [ 193.955861] Testing event cgroup_rstat_locked: OK [ 194.074277] Testing event cgroup_rstat_lock_contended: OK [ 194.192323] Testing event cgroup_notify_frozen: OK [ 194.311884] Testing event cgroup_notify_populated: OK [ 194.430419] Testing event cgroup_transfer_tasks: OK [ 194.548254] Testing event cgroup_attach_task: OK [ 194.666614] Testing event cgroup_unfreeze: OK [ 194.785619] Testing event cgroup_freeze: OK [ 194.905205] Testing event cgroup_rename: OK [ 195.023273] Testing event cgroup_release: OK [ 195.143631] Testing event cgroup_rmdir: OK [ 195.262729] Testing event cgroup_mkdir: OK [ 195.381352] Testing event cgroup_remount: OK [ 195.499507] Testing event cgroup_destroy_root: OK [ 195.618470] Testing event cgroup_setup_root: OK [ 195.736773] Testing event ftrace_test_filter: OK [ 195.854274] Testing event bpf_trace_printk: OK [ 195.972122] Testing event error_report_end: OK [ 196.091595] Testing event guest_halt_poll_ns: OK [ 196.210527] Testing event dev_pm_qos_remove_request: OK [ 196.329888] Testing event dev_pm_qos_update_request: OK [ 196.448207] Testing event dev_pm_qos_add_request: OK [ 196.567760] Testing event pm_qos_update_flags: OK [ 196.686885] Testing event pm_qos_update_target: OK [ 196.804329] Testing event pm_qos_remove_request: OK [ 196.922505] Testing event pm_qos_update_request: OK [ 197.041614] Testing event pm_qos_add_request: OK [ 197.160443] Testing event power_domain_target: OK [ 197.278372] Testing event clock_set_rate: OK [ 197.395903] Testing event clock_disable: OK [ 197.514290] Testing event clock_enable: OK [ 197.632066] Testing event wakeup_source_deactivate: OK [ 197.750411] Testing event wakeup_source_activate: OK [ 197.869281] Testing event suspend_resume: OK [ 198.000351] Testing event device_pm_callback_end: OK [ 198.119848] Testing event device_pm_callback_start: OK [ 198.239681] Testing event cpu_frequency_limits: OK [ 198.358364] Testing event cpu_frequency: OK [ 198.477588] Testing event pstate_sample: OK [ 198.596316] Testing event powernv_throttle: OK [ 198.715103] Testing event cpu_idle_miss: OK [ 198.834294] Testing event cpu_idle: OK [ 198.953224] Testing event rpm_status: OK [ 199.073153] Testing event rpm_return_int: OK [ 199.192738] Testing event rpm_usage: OK [ 199.311917] Testing event rpm_idle: OK [ 199.430336] Testing event rpm_resume: OK [ 199.549169] Testing event rpm_suspend: OK [ 199.668368] Testing event bpf_xdp_link_attach_failed: OK [ 199.788559] Testing event mem_return_failed: OK [ 199.908049] Testing event mem_connect: OK [ 200.026407] Testing event mem_disconnect: OK [ 200.144301] Testing event xdp_devmap_xmit: OK [ 200.262451] Testing event xdp_cpumap_enqueue: OK [ 200.382576] Testing event xdp_cpumap_kthread: OK [ 200.500702] Testing event xdp_redirect_map_err: OK [ 200.621181] Testing event xdp_redirect_map: OK [ 200.738977] Testing event xdp_redirect_err: OK [ 200.858577] Testing event xdp_redirect: OK [ 200.978190] Testing event xdp_bulk_tx: OK [ 201.096439] Testing event xdp_exception: OK [ 201.219470] Testing event user_exit: OK [ 201.340296] Testing event user_enter: OK [ 201.458283] Testing event rseq_ip_fixup: OK [ 201.577274] Testing event rseq_update: OK [ 201.696505] Testing event file_check_and_advance_wb_err: OK [ 201.814637] Testing event filemap_set_wb_err: OK [ 201.933089] Testing event mm_filemap_add_to_page_cache: OK [ 202.052503] Testing event mm_filemap_delete_from_page_cache: OK [ 202.171936] Testing event compact_retry: OK [ 202.291325] Testing event skip_task_reaping: OK [ 202.411497] Testing event finish_task_reaping: OK [ 202.530218] Testing event start_task_reaping: OK [ 202.650256] Testing event wake_reaper: OK [ 202.769577] Testing event mark_victim: OK [ 202.887657] Testing event reclaim_retry_zone: OK [ 203.007068] Testing event oom_score_adj_update: OK [ 203.125680] Testing event mm_lru_activate: OK [ 203.245216] Testing event mm_lru_insertion: OK [ 203.363330] Testing event mm_vmscan_throttled: OK [ 203.481693] Testing event mm_vmscan_node_reclaim_end: OK [ 203.601474] Testing event mm_vmscan_node_reclaim_begin: OK [ 203.720724] Testing event mm_vmscan_lru_shrink_active: OK [ 203.839454] Testing event mm_vmscan_lru_shrink_inactive: OK [ 203.957364] Testing event mm_vmscan_write_folio: OK [ 204.075572] Testing event mm_vmscan_lru_isolate: OK [ 204.194275] Testing event mm_shrink_slab_end: OK [ 204.312382] Testing event mm_shrink_slab_start: OK [ 204.430374] Testing event mm_vmscan_memcg_softlimit_reclaim_end: OK [ 204.549365] Testing event mm_vmscan_memcg_reclaim_end: OK [ 204.668200] Testing event mm_vmscan_direct_reclaim_end: OK [ 204.787372] Testing event mm_vmscan_memcg_softlimit_reclaim_begin: OK [ 204.906502] Testing event mm_vmscan_memcg_reclaim_begin: OK [ 205.025481] Testing event mm_vmscan_direct_reclaim_begin: OK [ 205.144452] Testing event mm_vmscan_wakeup_kswapd: OK [ 205.262767] Testing event mm_vmscan_kswapd_wake: OK [ 205.382480] Testing event mm_vmscan_kswapd_sleep: OK [ 205.500315] Testing event percpu_destroy_chunk: OK [ 205.618607] Testing event percpu_create_chunk: OK [ 205.737945] Testing event percpu_alloc_percpu_fail: OK [ 205.856536] Testing event percpu_free_percpu: OK [ 205.974314] Testing event percpu_alloc_percpu: OK [ 206.093562] Testing event rss_stat: OK [ 206.214639] Testing event mm_alloc_contig_migrate_range_info: OK [ 206.334077] Testing event mm_page_alloc_extfrag: OK [ 206.453894] Testing event mm_page_pcpu_drain: OK [ 206.573346] Testing event mm_page_alloc_zone_locked: OK [ 206.693167] Testing event mm_page_alloc: OK [ 206.811113] Testing event mm_page_free_batched: OK [ 206.930663] Testing event mm_page_free: OK [ 207.049975] Testing event kmem_cache_free: OK [ 207.168142] Testing event kfree: OK [ 207.287258] Testing event kmalloc: OK [ 207.409673] Testing event kmem_cache_alloc: OK [ 207.528546] Testing event mm_compaction_kcompactd_wake: OK [ 207.647435] Testing event mm_compaction_wakeup_kcompactd: OK [ 207.766889] Testing event mm_compaction_kcompactd_sleep: OK [ 207.884717] Testing event mm_compaction_defer_reset: OK [ 208.003444] Testing event mm_compaction_defer_compaction: OK [ 208.121255] Testing event mm_compaction_deferred: OK [ 208.240514] Testing event mm_compaction_suitable: OK [ 208.358250] Testing event mm_compaction_finished: OK [ 208.477110] Testing event mm_compaction_try_to_compact_pages: OK [ 208.595693] Testing event mm_compaction_end: OK [ 208.715392] Testing event mm_compaction_begin: OK [ 208.833300] Testing event mm_compaction_migratepages: OK [ 208.951287] Testing event mm_compaction_fast_isolate_freepages: OK [ 209.069107] Testing event mm_compaction_isolate_freepages: OK [ 209.187480] Testing event mm_compaction_isolate_migratepages: OK [ 209.305512] Testing event mmap_lock_acquire_returned: OK [ 209.431005] Testing event mmap_lock_released: OK [ 209.557384] Testing event mmap_lock_start_locking: OK [ 209.683158] Testing event exit_mmap: OK [ 209.802219] Testing event vma_store: OK [ 209.920277] Testing event vma_mas_szero: OK [ 210.038187] Testing event vm_unmapped_area: OK [ 210.156418] Testing event remove_migration_pte: OK [ 210.274317] Testing event set_migration_pte: OK [ 210.393295] Testing event mm_migrate_pages_start: OK [ 210.512348] Testing event mm_migrate_pages: OK [ 210.631448] Testing event tlb_flush: OK [ 210.751584] Testing event free_vmap_area_noflush: OK [ 210.870705] Testing event purge_vmap_area_lazy: OK [ 210.989334] Testing event alloc_vmap_area: OK [ 211.107446] Testing event ksm_advisor: OK [ 211.225293] Testing event ksm_remove_rmap_item: OK [ 211.344503] Testing event ksm_remove_ksm_page: OK [ 211.462701] Testing event ksm_merge_with_ksm_page: OK [ 211.581173] Testing event ksm_merge_one_page: OK [ 211.700339] Testing event ksm_exit: OK [ 211.818210] Testing event ksm_enter: OK [ 211.936505] Testing event ksm_stop_scan: OK [ 212.054344] Testing event ksm_start_scan: OK [ 212.173737] Testing event remove_migration_pmd: OK [ 212.292283] Testing event set_migration_pmd: OK [ 212.411723] Testing event hugepage_update_pud: OK [ 212.530217] Testing event hugepage_update_pmd: OK [ 212.648177] Testing event hugepage_set_pud: OK [ 212.766096] Testing event hugepage_set_pmd: OK [ 212.885156] Testing event mm_khugepaged_collapse_file: OK [ 213.003153] Testing event mm_khugepaged_scan_file: OK [ 213.122429] Testing event mm_collapse_huge_page_swapin: OK [ 213.240261] Testing event mm_collapse_huge_page_isolate: OK [ 213.360002] Testing event mm_collapse_huge_page: OK [ 213.478159] Testing event mm_khugepaged_scan_pmd: OK [ 213.597082] Testing event test_pages_isolated: OK [ 213.715168] Testing event damon_aggregated: OK [ 213.833170] Testing event damos_before_apply: OK [ 213.952381] Testing event sb_clear_inode_writeback: OK [ 214.071500] Testing event sb_mark_inode_writeback: OK [ 214.192460] Testing event writeback_dirty_inode_enqueue: OK [ 214.312266] Testing event writeback_lazytime_iput: OK [ 214.431562] Testing event writeback_lazytime: OK [ 214.550280] Testing event writeback_single_inode: OK [ 214.669300] Testing event writeback_single_inode_start: OK [ 214.788685] Testing event writeback_sb_inodes_requeue: OK [ 214.908261] Testing event balance_dirty_pages: OK [ 215.027573] Testing event bdi_dirty_ratelimit: OK [ 215.147221] Testing event global_dirty_state: OK [ 215.265363] Testing event writeback_queue_io: OK [ 215.384203] Testing event wbc_writepage: OK [ 215.502274] Testing event writeback_bdi_register: OK [ 215.620386] Testing event writeback_wake_background: OK [ 215.738684] Testing event writeback_pages_written: OK [ 215.857558] Testing event writeback_wait: OK [ 215.976570] Testing event writeback_written: OK [ 216.095420] Testing event writeback_start: OK [ 216.215672] Testing event writeback_exec: OK [ 216.335227] Testing event writeback_queue: OK [ 216.453499] Testing event writeback_write_inode: OK [ 216.571131] Testing event writeback_write_inode_start: OK [ 216.690456] Testing event flush_foreign: OK [ 216.808267] Testing event track_foreign_dirty: OK [ 216.928337] Testing event inode_switch_wbs: OK [ 217.046336] Testing event inode_foreign_history: OK [ 217.164238] Testing event writeback_dirty_inode: OK [ 217.281991] Testing event writeback_dirty_inode_start: OK [ 217.400143] Testing event writeback_mark_inode_dirty: OK [ 217.519177] Testing event folio_wait_writeback: OK [ 217.637742] Testing event writeback_dirty_folio: OK [ 217.756477] Testing event dax_writeback_one: OK [ 217.874262] Testing event dax_writeback_range_done: OK [ 217.993755] Testing event dax_writeback_range: OK [ 218.112152] Testing event dax_insert_mapping: OK [ 218.230199] Testing event dax_insert_pfn_mkwrite: OK [ 218.348451] Testing event dax_insert_pfn_mkwrite_no_entry: OK [ 218.467361] Testing event dax_load_hole: OK [ 218.585570] Testing event dax_pte_fault_done: OK [ 218.704776] Testing event dax_pte_fault: OK [ 218.823306] Testing event dax_pmd_insert_mapping: OK [ 218.941183] Testing event dax_pmd_load_hole_fallback: OK [ 219.059377] Testing event dax_pmd_load_hole: OK [ 219.178512] Testing event dax_pmd_fault_done: OK [ 219.296341] Testing event dax_pmd_fault: OK [ 219.415222] Testing event leases_conflict: OK [ 219.533605] Testing event generic_add_lease: OK [ 219.652381] Testing event time_out_leases: OK [ 219.770182] Testing event generic_delete_lease: OK [ 219.889507] Testing event break_lease_unblock: OK [ 220.007299] Testing event break_lease_block: OK [ 220.125561] Testing event break_lease_noblock: OK [ 220.243524] Testing event flock_lock_inode: OK [ 220.361078] Testing event locks_remove_posix: OK [ 220.479445] Testing event fcntl_setlk: OK [ 220.597351] Testing event posix_lock_inode: OK [ 220.715655] Testing event locks_get_lock_context: OK [ 220.834198] Testing event iomap_dio_complete: OK [ 220.952398] Testing event iomap_dio_rw_begin: OK [ 221.071542] Testing event iomap_iter: OK [ 221.189353] Testing event iomap_writepage_map: OK [ 221.308493] Testing event iomap_iter_srcmap: OK [ 221.426857] Testing event iomap_iter_dstmap: OK [ 221.545687] Testing event iomap_dio_rw_queued: OK [ 221.664787] Testing event iomap_dio_invalidate_fail: OK [ 221.782719] Testing event iomap_invalidate_folio: OK [ 221.900605] Testing event iomap_release_folio: OK [ 222.019363] Testing event iomap_writepage: OK [ 222.137663] Testing event iomap_readahead: OK [ 222.255370] Testing event iomap_readpage: OK [ 222.373400] Testing event netfs_collect_stream: OK [ 222.491682] Testing event netfs_collect_gap: OK [ 222.609712] Testing event netfs_collect_state: OK [ 222.729574] Testing event netfs_collect_folio: OK [ 222.849332] Testing event netfs_collect_sreq: OK [ 222.968647] Testing event netfs_collect_contig: OK [ 223.087795] Testing event netfs_collect: OK [ 223.206313] Testing event netfs_write: OK [ 223.324561] Testing event netfs_write_iter: OK [ 223.443298] Testing event netfs_folio: OK [ 223.567073] Testing event netfs_sreq_ref: OK [ 223.687052] Testing event netfs_rreq_ref: OK [ 223.806084] Testing event netfs_failure: OK [ 223.925661] Testing event netfs_sreq: OK [ 224.048305] Testing event netfs_rreq: OK [ 224.170370] Testing event netfs_read: OK [ 224.290139] Testing event fscache_resize: OK [ 224.408272] Testing event fscache_invalidate: OK [ 224.526109] Testing event fscache_relinquish: OK [ 224.645340] Testing event fscache_acquire: OK [ 224.763195] Testing event fscache_access: OK [ 224.882416] Testing event fscache_access_volume: OK [ 225.000378] Testing event fscache_access_cache: OK [ 225.119792] Testing event fscache_active: OK [ 225.238681] Testing event fscache_cookie: OK [ 225.359994] Testing event fscache_volume: OK [ 225.480163] Testing event fscache_cache: OK [ 225.599537] Testing event ext4_update_sb: OK [ 225.718991] Testing event ext4_fc_cleanup: OK [ 225.837233] Testing event ext4_fc_track_range: OK [ 225.954899] Testing event ext4_fc_track_inode: OK [ 226.073080] Testing event ext4_fc_track_unlink: OK [ 226.192101] Testing event ext4_fc_track_link: OK [ 226.311171] Testing event ext4_fc_track_create: OK [ 226.429095] Testing event ext4_fc_stats: OK [ 226.547173] Testing event ext4_fc_commit_stop: OK [ 226.665794] Testing event ext4_fc_commit_start: OK [ 226.783120] Testing event ext4_fc_replay: OK [ 226.903223] Testing event ext4_fc_replay_scan: OK [ 227.021607] Testing event ext4_lazy_itable_init: OK [ 227.139147] Testing event ext4_prefetch_bitmaps: OK [ 227.258546] Testing event ext4_error: OK [ 227.378843] Testing event ext4_shutdown: OK [ 227.497416] Testing event ext4_getfsmap_mapping: OK [ 227.615267] Testing event ext4_getfsmap_high_key: OK [ 227.733379] Testing event ext4_getfsmap_low_key: OK [ 227.852149] Testing event ext4_fsmap_mapping: OK [ 227.970359] Testing event ext4_fsmap_high_key: OK [ 228.089674] Testing event ext4_fsmap_low_key: OK [ 228.208704] Testing event ext4_es_insert_delayed_extent: OK [ 228.328539] Testing event ext4_es_shrink: OK [ 228.446358] Testing event ext4_insert_range: OK [ 228.564277] Testing event ext4_collapse_range: OK [ 228.682269] Testing event ext4_es_shrink_scan_exit: OK [ 228.800570] Testing event ext4_es_shrink_scan_enter: OK [ 228.919203] Testing event ext4_es_shrink_count: OK [ 229.037010] Testing event ext4_es_lookup_extent_exit: OK [ 229.155346] Testing event ext4_es_lookup_extent_enter: OK [ 229.274375] Testing event ext4_es_find_extent_range_exit: OK [ 229.393279] Testing event ext4_es_find_extent_range_enter: OK [ 229.511401] Testing event ext4_es_remove_extent: OK [ 229.631264] Testing event ext4_es_cache_extent: OK [ 229.749579] Testing event ext4_es_insert_extent: OK [ 229.868284] Testing event ext4_ext_remove_space_done: OK [ 229.986664] Testing event ext4_ext_remove_space: OK [ 230.106318] Testing event ext4_ext_rm_idx: OK [ 230.224364] Testing event ext4_ext_rm_leaf: OK [ 230.343198] Testing event ext4_remove_blocks: OK [ 230.461606] Testing event ext4_ext_show_extent: OK [ 230.580244] Testing event ext4_get_implied_cluster_alloc_exit: OK [ 230.698529] Testing event ext4_ext_handle_unwritten_extents: OK [ 230.817289] Testing event ext4_trim_all_free: OK [ 230.936161] Testing event ext4_trim_extent: OK [ 231.055507] Testing event ext4_journal_start_reserved: OK [ 231.174624] Testing event ext4_journal_start_inode: OK [ 231.293359] Testing event ext4_journal_start_sb: OK [ 231.411293] Testing event ext4_load_inode: OK [ 231.529313] Testing event ext4_ext_load_extent: OK [ 231.647305] Testing event ext4_ind_map_blocks_exit: OK [ 231.766721] Testing event ext4_ext_map_blocks_exit: OK [ 231.885570] Testing event ext4_ind_map_blocks_enter: OK [ 232.003427] Testing event ext4_ext_map_blocks_enter: OK [ 232.121443] Testing event ext4_ext_convert_to_initialized_fastpath: OK [ 232.239903] Testing event ext4_ext_convert_to_initialized_enter: OK [ 232.358566] Testing event ext4_truncate_exit: OK [ 232.476232] Testing event ext4_truncate_enter: OK [ 232.594569] Testing event ext4_unlink_exit: OK [ 232.713570] Testing event ext4_unlink_enter: OK [ 232.832439] Testing event ext4_fallocate_exit: OK [ 232.950291] Testing event ext4_zero_range: OK [ 233.068685] Testing event ext4_punch_hole: OK [ 233.188334] Testing event ext4_fallocate_enter: OK [ 233.306314] Testing event ext4_read_block_bitmap_load: OK [ 233.425450] Testing event ext4_load_inode_bitmap: OK [ 233.543100] Testing event ext4_mb_buddy_bitmap_load: OK [ 233.661303] Testing event ext4_mb_bitmap_load: OK [ 233.780271] Testing event ext4_da_release_space: OK [ 233.899328] Testing event ext4_da_reserve_space: OK [ 234.017675] Testing event ext4_da_update_reserve_space: OK [ 234.136322] Testing event ext4_forget: OK [ 234.255514] Testing event ext4_mballoc_free: OK [ 234.374463] Testing event ext4_mballoc_discard: OK [ 234.493655] Testing event ext4_mballoc_prealloc: OK [ 234.611626] Testing event ext4_mballoc_alloc: OK [ 234.730190] Testing event ext4_alloc_da_blocks: OK [ 234.848393] Testing event ext4_sync_fs: OK [ 234.966344] Testing event ext4_sync_file_exit: OK [ 235.084433] Testing event ext4_sync_file_enter: OK [ 235.202230] Testing event ext4_free_blocks: OK [ 235.320676] Testing event ext4_allocate_blocks: OK [ 235.438376] Testing event ext4_request_blocks: OK [ 235.556486] Testing event ext4_mb_discard_preallocations: OK [ 235.674769] Testing event ext4_discard_preallocations: OK [ 235.792514] Testing event ext4_mb_release_group_pa: OK [ 235.912759] Testing event ext4_mb_release_inode_pa: OK [ 236.032237] Testing event ext4_mb_new_group_pa: OK [ 236.151387] Testing event ext4_mb_new_inode_pa: OK [ 236.271262] Testing event ext4_discard_blocks: OK [ 236.390686] Testing event ext4_journalled_invalidate_folio: OK [ 236.510542] Testing event ext4_invalidate_folio: OK [ 236.630422] Testing event ext4_release_folio: OK [ 236.748411] Testing event ext4_read_folio: OK [ 236.868387] Testing event ext4_writepages_result: OK [ 236.987488] Testing event ext4_da_write_pages_extent: OK [ 237.106229] Testing event ext4_da_write_pages: OK [ 237.224627] Testing event ext4_writepages: OK [ 237.343342] Testing event ext4_da_write_end: OK [ 237.461257] Testing event ext4_journalled_write_end: OK [ 237.579842] Testing event ext4_write_end: OK [ 237.698325] Testing event ext4_da_write_begin: OK [ 237.816203] Testing event ext4_write_begin: OK [ 237.935615] Testing event ext4_begin_ordered_truncate: OK [ 238.055600] Testing event ext4_mark_inode_dirty: OK [ 238.176301] Testing event ext4_nfs_commit_metadata: OK [ 238.295402] Testing event ext4_drop_inode: OK [ 238.414442] Testing event ext4_evict_inode: OK [ 238.533681] Testing event ext4_allocate_inode: OK [ 238.652120] Testing event ext4_request_inode: OK [ 238.771376] Testing event ext4_free_inode: OK [ 238.890463] Testing event ext4_other_inode_update_time: OK [ 239.008721] Testing event jbd2_shrink_checkpoint_list: OK [ 239.128635] Testing event jbd2_shrink_scan_exit: OK [ 239.247404] Testing event jbd2_shrink_scan_enter: OK [ 239.366702] Testing event jbd2_shrink_count: OK [ 239.486144] Testing event jbd2_lock_buffer_stall: OK [ 239.605443] Testing event jbd2_write_superblock: OK [ 239.725477] Testing event jbd2_update_log_tail: OK [ 239.844497] Testing event jbd2_checkpoint_stats: OK [ 239.963524] Testing event jbd2_run_stats: OK [ 240.082308] Testing event jbd2_handle_stats: OK [ 240.201200] Testing event jbd2_handle_extend: OK [ 240.319467] Testing event jbd2_handle_restart: OK [ 240.437276] Testing event jbd2_handle_start: OK [ 240.555478] Testing event jbd2_submit_inode_data: OK [ 240.675414] Testing event jbd2_end_commit: OK [ 240.794487] Testing event jbd2_drop_transaction: OK [ 240.914464] Testing event jbd2_commit_logging: OK [ 241.034402] Testing event jbd2_commit_flushing: OK [ 241.153389] Testing event jbd2_commit_locking: OK [ 241.271596] Testing event jbd2_start_commit: OK [ 241.390726] Testing event jbd2_checkpoint: OK [ 241.509351] Testing event nfs_xdr_bad_filehandle: OK [ 241.627215] Testing event nfs_xdr_status: OK [ 241.745983] Testing event nfs_mount_path: OK [ 241.865546] Testing event nfs_mount_option: OK [ 241.984479] Testing event nfs_mount_assign: OK [ 242.107108] Testing event nfs_fh_to_dentry: OK [ 242.226406] Testing event nfs_direct_write_reschedule_io: OK [ 242.344426] Testing event nfs_direct_write_schedule_iovec: OK [ 242.462700] Testing event nfs_direct_write_completion: OK [ 242.582381] Testing event nfs_direct_write_complete: OK [ 242.701773] Testing event nfs_direct_resched_write: OK [ 242.820768] Testing event nfs_direct_commit_complete: OK [ 242.940412] Testing event nfs_commit_done: OK [ 243.060709] Testing event nfs_initiate_commit: OK [ 243.181516] Testing event nfs_commit_error: OK [ 243.300363] Testing event nfs_comp_error: OK [ 243.419405] Testing event nfs_write_error: OK [ 243.538829] Testing event nfs_writeback_done: OK [ 243.657148] Testing event nfs_initiate_write: OK [ 243.776556] Testing event nfs_pgio_error: OK [ 243.896311] Testing event nfs_readpage_short: OK [ 244.014697] Testing event nfs_readpage_done: OK [ 244.133625] Testing event nfs_initiate_read: OK [ 244.251301] Testing event nfs_aop_readahead_done: OK [ 244.369404] Testing event nfs_aop_readahead: OK [ 244.488239] Testing event nfs_launder_folio_done: OK [ 244.606434] Testing event nfs_invalidate_folio: OK [ 244.725410] Testing event nfs_writeback_folio_done: OK [ 244.845456] Testing event nfs_writeback_folio: OK [ 244.963335] Testing event nfs_aop_readpage_done: OK [ 245.081549] Testing event nfs_aop_readpage: OK [ 245.199225] Testing event nfs_sillyrename_unlink: OK [ 245.317633] Testing event nfs_async_rename_done: OK [ 245.437343] Testing event nfs_rename_exit: OK [ 245.556597] Testing event nfs_rename_enter: OK [ 245.675548] Testing event nfs_link_exit: OK [ 245.793436] Testing event nfs_link_enter: OK [ 245.911321] Testing event nfs_symlink_exit: OK [ 246.030476] Testing event nfs_symlink_enter: OK [ 246.148630] Testing event nfs_unlink_exit: OK [ 246.267563] Testing event nfs_unlink_enter: OK [ 246.386415] Testing event nfs_remove_exit: OK [ 246.504358] Testing event nfs_remove_enter: OK [ 246.622544] Testing event nfs_rmdir_exit: OK [ 246.742258] Testing event nfs_rmdir_enter: OK [ 246.860120] Testing event nfs_mkdir_exit: OK [ 246.978321] Testing event nfs_mkdir_enter: OK [ 247.098171] Testing event nfs_mknod_exit: OK [ 247.216506] Testing event nfs_mknod_enter: OK [ 247.334633] Testing event nfs_create_exit: OK [ 247.453670] Testing event nfs_create_enter: OK [ 247.573682] Testing event nfs_atomic_open_exit: OK [ 247.692635] Testing event nfs_atomic_open_enter: OK [ 247.812269] Testing event nfs_readdir_lookup_revalidate: OK [ 247.930312] Testing event nfs_readdir_lookup_revalidate_failed: OK [ 248.048513] Testing event nfs_readdir_lookup: OK [ 248.166609] Testing event nfs_lookup_revalidate_exit: OK [ 248.287094] Testing event nfs_lookup_revalidate_enter: OK [ 248.405599] Testing event nfs_lookup_exit: OK [ 248.523373] Testing event nfs_lookup_enter: OK [ 248.641302] Testing event nfs_readdir_uncached: OK [ 248.759331] Testing event nfs_readdir_cache_fill: OK [ 248.878485] Testing event nfs_readdir_invalidate_cache_range: OK [ 248.997605] Testing event nfs_size_grow: OK [ 249.116635] Testing event nfs_size_update: OK [ 249.234994] Testing event nfs_size_wcc: OK [ 249.353694] Testing event nfs_size_truncate: OK [ 249.471988] Testing event nfs_access_exit: OK [ 249.590561] Testing event nfs_readdir_uncached_done: OK [ 249.708216] Testing event nfs_readdir_cache_fill_done: OK [ 249.826303] Testing event nfs_readdir_force_readdirplus: OK [ 249.945462] Testing event nfs_set_cache_invalid: OK [ 250.063438] Testing event nfs_access_enter: OK [ 250.182570] Testing event nfs_fsync_exit: OK [ 250.301271] Testing event nfs_fsync_enter: OK [ 250.419472] Testing event nfs_writeback_inode_exit: OK [ 250.537224] Testing event nfs_writeback_inode_enter: OK [ 250.655230] Testing event nfs_setattr_exit: OK [ 250.773405] Testing event nfs_setattr_enter: OK [ 250.891275] Testing event nfs_getattr_exit: OK [ 251.010351] Testing event nfs_getattr_enter: OK [ 251.128145] Testing event nfs_invalidate_mapping_exit: OK [ 251.246388] Testing event nfs_invalidate_mapping_enter: OK [ 251.364578] Testing event nfs_revalidate_inode_exit: OK [ 251.482340] Testing event nfs_revalidate_inode_enter: OK [ 251.600735] Testing event nfs_refresh_inode_exit: OK [ 251.720331] Testing event nfs_refresh_inode_enter: OK [ 251.838335] Testing event nfs_set_inode_stale: OK [ 251.956143] Testing event nlmclnt_grant: OK [ 252.075570] Testing event nlmclnt_unlock: OK [ 252.194377] Testing event nlmclnt_lock: OK [ 252.312763] Testing event nlmclnt_test: OK [ 252.431277] Testing event selinux_audited: OK [ 252.549428] Testing event block_rq_remap: OK [ 252.667133] Testing event block_bio_remap: OK [ 252.786702] Testing event block_split: OK [ 252.905262] Testing event block_unplug: OK [ 253.024186] Testing event block_plug: OK [ 253.143312] Testing event block_getrq: OK [ 253.262272] Testing event block_bio_queue: OK [ 253.380011] Testing event block_bio_frontmerge: OK [ 253.498475] Testing event block_bio_backmerge: OK [ 253.618145] Testing event block_bio_bounce: OK [ 253.736105] Testing event block_bio_complete: OK [ 253.855098] Testing event block_io_done: OK [ 253.973297] Testing event block_io_start: OK [ 254.093490] Testing event block_rq_merge: OK [ 254.211955] Testing event block_rq_issue: OK [ 254.331184] Testing event block_rq_insert: OK [ 254.449995] Testing event block_rq_error: OK [ 254.569492] Testing event block_rq_complete: OK [ 254.688494] Testing event block_rq_requeue: OK [ 254.808407] Testing event block_dirty_buffer: OK [ 254.926463] Testing event block_touch_buffer: OK [ 255.046274] Testing event kyber_throttled: OK [ 255.164307] Testing event kyber_adjust: OK [ 255.284688] Testing event kyber_latency: OK [ 255.404078] Testing event wbt_timer: OK [ 255.522518] Testing event wbt_step: OK [ 255.640924] Testing event wbt_lat: OK [ 255.759548] Testing event wbt_stat: OK [ 255.878309] Testing event io_uring_local_work_run: OK [ 255.996645] Testing event io_uring_short_write: OK [ 256.114295] Testing event io_uring_task_work_run: OK [ 256.232321] Testing event io_uring_cqe_overflow: OK [ 256.351309] Testing event io_uring_req_failed: OK [ 256.469433] Testing event io_uring_task_add: OK [ 256.588224] Testing event io_uring_poll_arm: OK [ 256.706276] Testing event io_uring_submit_req: OK [ 256.824197] Testing event io_uring_complete: OK [ 256.943430] Testing event io_uring_fail_link: OK [ 257.063353] Testing event io_uring_cqring_wait: OK [ 257.182352] Testing event io_uring_link: OK [ 257.300157] Testing event io_uring_defer: OK [ 257.418452] Testing event io_uring_queue_async_work: OK [ 257.537865] Testing event io_uring_file_get: OK [ 257.657526] Testing event io_uring_register: OK [ 257.775507] Testing event io_uring_create: OK [ 257.893164] Testing event rdpmc: OK [ 258.011373] Testing event write_msr: OK [ 258.149572] Testing event read_msr: OK [ 258.285013] Testing event gpio_value: OK [ 258.403365] Testing event gpio_direction: OK [ 258.523101] Testing event pwm_get: OK [ 258.642220] Testing event pwm_apply: OK [ 258.760290] Testing event clk_rate_request_done: OK [ 258.881128] Testing event clk_rate_request_start: OK [ 259.001095] Testing event clk_set_duty_cycle_complete: OK [ 259.119268] Testing event clk_set_duty_cycle: OK [ 259.238372] Testing event clk_set_phase_complete: OK [ 259.357280] Testing event clk_set_phase: OK [ 259.475540] Testing event clk_set_parent_complete: OK [ 259.593658] Testing event clk_set_parent: OK [ 259.712742] Testing event clk_set_rate_range: OK [ 259.830295] Testing event clk_set_max_rate: OK [ 259.948615] Testing event clk_set_min_rate: OK [ 260.067357] Testing event clk_set_rate_complete: OK [ 260.186395] Testing event clk_set_rate: OK [ 260.305522] Testing event clk_unprepare_complete: OK [ 260.423841] Testing event clk_unprepare: OK [ 260.542213] Testing event clk_prepare_complete: OK [ 260.660315] Testing event clk_prepare: OK [ 260.778223] Testing event clk_disable_complete: OK [ 260.896912] Testing event clk_disable: OK [ 261.014300] Testing event clk_enable_complete: OK [ 261.132333] Testing event clk_enable: OK [ 261.250397] Testing event cache_tag_flush_range_np: OK [ 261.368405] Testing event cache_tag_flush_range: OK [ 261.486187] Testing event cache_tag_flush_all: OK [ 261.604388] Testing event cache_tag_unassign: OK [ 261.723632] Testing event cache_tag_assign: OK [ 261.842554] Testing event prq_report: OK [ 261.960102] Testing event qi_submit: OK [ 262.079204] Testing event io_page_fault: OK [ 262.197091] Testing event unmap: OK [ 262.316353] Testing event map: OK [ 262.435094] Testing event attach_device_to_domain: OK [ 262.554398] Testing event remove_device_from_group: OK [ 262.673390] Testing event add_device_to_group: OK [ 262.791434] Testing event regcache_drop_region: OK [ 262.910311] Testing event regmap_async_complete_done: OK [ 263.028405] Testing event regmap_async_complete_start: OK [ 263.148415] Testing event regmap_async_io_complete: OK [ 263.266453] Testing event regmap_async_write_start: OK [ 263.384354] Testing event regmap_cache_bypass: OK [ 263.503337] Testing event regmap_cache_only: OK [ 263.622449] Testing event regcache_sync: OK [ 263.741499] Testing event regmap_hw_write_done: OK [ 263.860965] Testing event regmap_hw_write_start: OK [ 263.980916] Testing event regmap_hw_read_done: OK [ 264.098376] Testing event regmap_hw_read_start: OK [ 264.216722] Testing event regmap_bulk_read: OK [ 264.335615] Testing event regmap_bulk_write: OK [ 264.454241] Testing event regmap_reg_read_cache: OK [ 264.572215] Testing event regmap_reg_read: OK [ 264.690000] Testing event regmap_reg_write: OK [ 264.808613] Testing event devres_log: OK [ 264.929765] Testing event dma_fence_wait_end: OK [ 265.050413] Testing event dma_fence_wait_start: OK [ 265.169299] Testing event dma_fence_signaled: OK [ 265.287539] Testing event dma_fence_enable_signal: OK [ 265.406698] Testing event dma_fence_destroy: OK [ 265.526297] Testing event dma_fence_init: OK [ 265.645441] Testing event dma_fence_emit: OK [ 265.765149] Testing event scsi_eh_wakeup: OK [ 265.883292] Testing event scsi_dispatch_cmd_timeout: OK [ 266.002346] Testing event scsi_dispatch_cmd_done: OK [ 266.122236] Testing event scsi_dispatch_cmd_error: OK [ 266.241427] Testing event scsi_dispatch_cmd_start: OK [ 266.360100] Testing event spi_transfer_stop: OK [ 266.479719] Testing event spi_transfer_start: OK [ 266.598214] Testing event spi_message_done: OK [ 266.718068] Testing event spi_message_start: OK [ 266.837682] Testing event spi_message_submit: OK [ 266.956467] Testing event spi_set_cs: OK [ 267.075679] Testing event spi_setup: OK [ 267.193209] Testing event spi_controller_busy: OK [ 267.311656] Testing event spi_controller_idle: OK [ 267.431578] Testing event mdio_access: OK [ 267.551603] Testing event e1000e_trace_mac_register: OK [ 267.669833] Testing event i40e_xmit_frame_ring_drop: OK [ 267.789455] Testing event i40e_xmit_frame_ring: OK [ 267.907304] Testing event i40e_clean_rx_irq_rx: OK [ 268.025518] Testing event i40e_clean_rx_irq: OK [ 268.144308] Testing event i40e_clean_tx_irq_unmap: OK [ 268.262643] Testing event i40e_clean_tx_irq: OK [ 268.381189] Testing event i40e_napi_poll: OK [ 268.499258] Testing event nvsp_recv: OK [ 268.617080] Testing event nvsp_send_pkt: OK [ 268.735581] Testing event nvsp_send: OK [ 268.856314] Testing event rndis_recv: OK [ 268.974488] Testing event rndis_send: OK [ 269.092257] Testing event xhci_dbc_giveback_request: OK [ 269.210343] Testing event xhci_dbc_queue_request: OK [ 269.328092] Testing event xhci_dbc_free_request: OK [ 269.446068] Testing event xhci_dbc_alloc_request: OK [ 269.564029] Testing event xhci_ring_host_doorbell: OK [ 269.683024] Testing event xhci_ring_ep_doorbell: OK [ 269.801312] Testing event xhci_hub_status_data: OK [ 269.920159] Testing event xhci_get_port_status: OK [ 270.037977] Testing event xhci_handle_port_status: OK [ 270.157490] Testing event xhci_inc_deq: OK [ 270.276556] Testing event xhci_inc_enq: OK [ 270.395206] Testing event xhci_ring_expansion: OK [ 270.515763] Testing event xhci_ring_free: OK [ 270.634977] Testing event xhci_ring_alloc: OK [ 270.756632] Testing event xhci_configure_endpoint_ctrl_ctx: OK [ 270.874374] Testing event xhci_address_ctrl_ctx: OK [ 270.994454] Testing event xhci_configure_endpoint: OK [ 271.112151] Testing event xhci_handle_cmd_set_deq: OK [ 271.230373] Testing event xhci_handle_cmd_reset_dev: OK [ 271.349685] Testing event xhci_handle_cmd_addr_dev: OK [ 271.469317] Testing event xhci_setup_device_slot: OK [ 271.588491] Testing event xhci_discover_or_reset_device: OK [ 271.706605] Testing event xhci_handle_cmd_disable_slot: OK [ 271.825722] Testing event xhci_free_dev: OK [ 271.943485] Testing event xhci_alloc_dev: OK [ 272.061485] Testing event xhci_add_endpoint: OK [ 272.179263] Testing event xhci_handle_cmd_config_ep: OK [ 272.297530] Testing event xhci_handle_cmd_reset_ep: OK [ 272.417352] Testing event xhci_handle_cmd_set_deq_ep: OK [ 272.536396] Testing event xhci_handle_cmd_stop_ep: OK [ 272.655327] Testing event xhci_urb_dequeue: OK [ 272.774586] Testing event xhci_urb_giveback: OK [ 272.893057] Testing event xhci_urb_enqueue: OK [ 273.011398] Testing event xhci_stop_device: OK [ 273.129397] Testing event xhci_setup_addressable_virt_device: OK [ 273.247502] Testing event xhci_setup_device: OK [ 273.367755] Testing event xhci_alloc_virt_device: OK [ 273.485077] Testing event xhci_free_virt_device: OK [ 273.604714] Testing event xhci_dbc_gadget_ep_queue: OK [ 273.722150] Testing event xhci_dbc_handle_transfer: OK [ 273.840209] Testing event xhci_dbc_handle_event: OK [ 273.958394] Testing event xhci_queue_trb: OK [ 274.078610] Testing event xhci_handle_transfer: OK [ 274.198495] Testing event xhci_handle_command: OK [ 274.318533] Testing event xhci_handle_event: OK [ 274.437270] Testing event xhci_address_ctx: OK [ 274.558251] Testing event xhci_dbg_ring_expansion: OK [ 274.678699] Testing event xhci_dbg_init: OK [ 274.799185] Testing event xhci_dbg_cancel_urb: OK [ 274.919729] Testing event xhci_dbg_reset_ep: OK [ 275.038391] Testing event xhci_dbg_quirks: OK [ 275.160983] Testing event xhci_dbg_context_change: OK [ 275.280299] Testing event xhci_dbg_address: OK [ 275.400451] Testing event ucsi_register_altmode: OK [ 275.521633] Testing event ucsi_register_port: OK [ 275.641015] Testing event ucsi_connector_change: OK [ 275.761531] Testing event ucsi_reset_ppm: OK [ 275.879203] Testing event ucsi_run_command: OK [ 275.996138] Testing event rtc_timer_fired: OK [ 276.115536] Testing event rtc_timer_dequeue: OK [ 276.237477] Testing event rtc_timer_enqueue: OK [ 276.359033] Testing event rtc_read_offset: OK [ 276.478382] Testing event rtc_set_offset: OK [ 276.598452] Testing event rtc_alarm_irq_enable: OK [ 276.717784] Testing event rtc_irq_set_state: OK [ 276.836854] Testing event rtc_irq_set_freq: OK [ 276.956909] Testing event rtc_read_alarm: OK [ 277.076147] Testing event rtc_set_alarm: OK [ 277.196504] Testing event rtc_read_time: OK [ 277.317259] Testing event rtc_set_time: OK [ 277.435387] Testing event i2c_result: OK [ 277.554502] Testing event i2c_reply: OK [ 277.673505] Testing event i2c_read: OK [ 277.791714] Testing event i2c_write: OK [ 277.910434] Testing event smbus_result: OK [ 278.028261] Testing event smbus_reply: OK [ 278.148812] Testing event smbus_read: OK [ 278.270511] Testing event smbus_write: OK [ 278.390237] Testing event hwmon_attr_show_string: OK [ 278.508264] Testing event hwmon_attr_store: OK [ 278.626831] Testing event hwmon_attr_show: OK [ 278.745418] Testing event thermal_zone_trip: OK [ 278.864596] Testing event cdev_update: OK [ 278.985429] Testing event thermal_temperature: OK [ 279.102997] Testing event watchdog_set_timeout: OK [ 279.224835] Testing event watchdog_stop: OK [ 279.343330] Testing event watchdog_ping: OK [ 279.462533] Testing event watchdog_start: OK [ 279.580597] Testing event amd_pstate_perf: OK [ 279.699908] Testing event cros_ec_request_done: OK [ 279.818424] Testing event cros_ec_request_start: OK [ 279.938321] Testing event vmbus_on_event: OK [ 280.058227] Testing event vmbus_setevent: OK [ 280.176482] Testing event vmbus_chan_sched: OK [ 280.296402] Testing event vmbus_send_modifychannel: OK [ 280.416260] Testing event vmbus_send_tl_connect_request: OK [ 280.534646] Testing event vmbus_release_relid: OK [ 280.653444] Testing event vmbus_negotiate_version: OK [ 280.771634] Testing event vmbus_teardown_gpadl: OK [ 280.892690] Testing event vmbus_establish_gpadl_body: OK [ 281.014706] Testing event vmbus_establish_gpadl_header: OK [ 281.134384] Testing event vmbus_close_internal: OK [ 281.254561] Testing event vmbus_open: OK [ 281.373431] Testing event vmbus_request_offers: OK [ 281.492436] Testing event vmbus_onversion_response: OK [ 281.611361] Testing event vmbus_ongpadl_torndown: OK [ 281.730837] Testing event vmbus_onmodifychannel_response: OK [ 281.849975] Testing event vmbus_ongpadl_created: OK [ 281.969553] Testing event vmbus_onopen_result: OK [ 282.089390] Testing event vmbus_onoffer_rescind: OK [ 282.207315] Testing event vmbus_onoffer: OK [ 282.325174] Testing event vmbus_on_message: OK [ 282.443695] Testing event vmbus_on_msg_dpc: OK [ 282.563392] Testing event memory_failure_event: OK [ 282.681784] Testing event aer_event: OK [ 282.799237] Testing event non_standard_event: OK [ 282.917548] Testing event arm_event: OK [ 283.036723] Testing event mc_event: OK [ 283.156269] Testing event extlog_mem_event: OK [ 283.274154] Testing event tb_rx: OK [ 283.392205] Testing event tb_event: OK [ 283.510785] Testing event tb_tx: OK [ 283.629318] Testing event neigh_cleanup_and_release: OK [ 283.748530] Testing event neigh_event_send_dead: OK [ 283.867821] Testing event neigh_event_send_done: OK [ 283.986532] Testing event neigh_timer_handler: OK [ 284.105627] Testing event neigh_update_done: OK [ 284.224916] Testing event neigh_update: OK [ 284.343538] Testing event neigh_create: OK [ 284.464305] Testing event page_pool_update_nid: OK [ 284.582155] Testing event page_pool_state_hold: OK [ 284.702981] Testing event page_pool_state_release: OK [ 284.821670] Testing event page_pool_release: OK [ 284.940415] Testing event br_mdb_full: OK [ 285.059241] Testing event br_fdb_update: OK [ 285.177214] Testing event fdb_delete: OK [ 285.295059] Testing event br_fdb_external_learn_add: OK [ 285.412646] Testing event br_fdb_add: OK [ 285.531125] Testing event qdisc_create: OK [ 285.649771] Testing event qdisc_destroy: OK [ 285.768875] Testing event qdisc_reset: OK [ 285.886809] Testing event qdisc_enqueue: OK [ 286.005761] Testing event qdisc_dequeue: OK [ 286.123331] Testing event fib_table_lookup: OK [ 286.241705] Testing event tcp_ao_rcv_sne_update: OK [ 286.359140] Testing event tcp_ao_snd_sne_update: OK [ 286.477224] Testing event tcp_ao_synack_no_key: OK [ 286.595348] Testing event tcp_ao_rnext_request: OK [ 286.712915] Testing event tcp_ao_key_not_found: OK [ 286.831277] Testing event tcp_ao_mismatch: OK [ 286.949290] Testing event tcp_ao_wrong_maclen: OK [ 287.065938] Testing event tcp_ao_handshake_failure: OK [ 287.185326] Testing event tcp_hash_ao_required: OK [ 287.302075] Testing event tcp_hash_md5_mismatch: OK [ 287.420544] Testing event tcp_hash_md5_unexpected: OK [ 287.539466] Testing event tcp_hash_md5_required: OK [ 287.659428] Testing event tcp_hash_bad_header: OK [ 287.777456] Testing event tcp_cong_state_set: OK [ 287.896237] Testing event tcp_bad_csum: OK [ 288.016048] Testing event tcp_probe: OK [ 288.135050] Testing event tcp_retransmit_synack: OK [ 288.254812] Testing event tcp_rcv_space_adjust: OK [ 288.374047] Testing event tcp_destroy_sock: OK [ 288.492455] Testing event tcp_receive_reset: OK [ 288.610136] Testing event tcp_send_reset: OK [ 288.728888] Testing event tcp_retransmit_skb: OK [ 288.847313] Testing event udp_fail_queue_rcv_skb: OK [ 288.965509] Testing event sock_recv_length: OK [ 289.085876] Testing event sock_send_length: OK [ 289.204727] Testing event sk_data_ready: OK [ 289.325346] Testing event inet_sk_error_report: OK [ 289.443721] Testing event inet_sock_set_state: OK [ 289.562377] Testing event sock_exceed_buf_limit: OK [ 289.680443] Testing event sock_rcvqueue_full: OK [ 289.799224] Testing event dql_stall_detected: OK [ 289.917563] Testing event napi_poll: OK [ 290.037615] Testing event netif_receive_skb_list_exit: OK [ 290.156429] Testing event netif_rx_exit: OK [ 290.275537] Testing event netif_receive_skb_exit: OK [ 290.393285] Testing event napi_gro_receive_exit: OK [ 290.513641] Testing event napi_gro_frags_exit: OK [ 290.632233] Testing event netif_rx_entry: OK [ 290.751686] Testing event netif_receive_skb_list_entry: OK [ 290.870896] Testing event netif_receive_skb_entry: OK [ 290.989517] Testing event napi_gro_receive_entry: OK [ 291.107339] Testing event napi_gro_frags_entry: OK [ 291.225387] Testing event netif_rx: OK [ 291.343970] Testing event netif_receive_skb: OK [ 291.463376] Testing event net_dev_queue: OK [ 291.582118] Testing event net_dev_xmit_timeout: OK [ 291.700388] Testing event net_dev_xmit: OK [ 291.819358] Testing event net_dev_start_xmit: OK [ 291.938638] Testing event skb_copy_datagram_iovec: OK [ 292.058739] Testing event consume_skb: OK [ 292.179416] Testing event kfree_skb: OK [ 292.299126] Testing event netlink_extack: OK [ 292.417165] Testing event bpf_test_finish: OK [ 292.536768] Testing event bpf_trigger_tp: OK [ 292.656575] Testing event icmp_send: OK [ 292.775144] Testing event fib6_table_lookup: OK [ 292.896982] Testing event devlink_trap_report: OK [ 293.018119] Testing event devlink_health_reporter_state_update: OK [ 293.136673] Testing event devlink_health_recover_aborted: OK [ 293.255587] Testing event devlink_health_report: OK [ 293.374479] Testing event devlink_hwerr: OK [ 293.492493] Testing event devlink_hwmsg: OK [ 293.610286] Testing event svc_unregister: OK [ 293.728695] Testing event svc_noregister: OK [ 293.847538] Testing event svc_register: OK [ 293.965966] Testing event cache_entry_no_listener: OK [ 294.085467] Testing event cache_entry_make_negative: OK [ 294.205387] Testing event cache_entry_update: OK [ 294.324850] Testing event cache_entry_upcall: OK [ 294.443280] Testing event cache_entry_expired: OK [ 294.564703] Testing event svcsock_getpeername_err: OK [ 294.686517] Testing event svcsock_accept_err: OK [ 294.805317] Testing event svcsock_tcp_state: OK [ 294.924392] Testing event svcsock_tcp_recv_short: OK [ 295.042577] Testing event svcsock_write_space: OK [ 295.162447] Testing event svcsock_data_ready: OK [ 295.280403] Testing event svcsock_tcp_recv_err: OK [ 295.398429] Testing event svcsock_tcp_recv_eagain: OK [ 295.518087] Testing event svcsock_tcp_recv: OK [ 295.637417] Testing event svcsock_tcp_send: OK [ 295.758804] Testing event svcsock_udp_recv_err: OK [ 295.878090] Testing event svcsock_udp_recv: OK [ 295.996818] Testing event svcsock_udp_send: OK [ 296.117250] Testing event svcsock_marker: OK [ 296.236502] Testing event svcsock_free: OK [ 296.354903] Testing event svcsock_new: OK [ 296.473241] Testing event svc_defer_recv: OK [ 296.591616] Testing event svc_defer_queue: OK [ 296.710356] Testing event svc_defer_drop: OK [ 296.829698] Testing event svc_alloc_arg_err: OK [ 296.948203] Testing event svc_wake_up: OK [ 297.066543] Testing event svc_xprt_accept: OK [ 297.185591] Testing event svc_tls_timed_out: OK [ 297.304487] Testing event svc_tls_not_started: OK [ 297.422509] Testing event svc_tls_unavailable: OK [ 297.542303] Testing event svc_tls_upcall: OK [ 297.660532] Testing event svc_tls_start: OK [ 297.778996] Testing event svc_xprt_free: OK [ 297.897342] Testing event svc_xprt_detach: OK [ 298.017219] Testing event svc_xprt_close: OK [ 298.136537] Testing event svc_xprt_no_write_space: OK [ 298.255646] Testing event svc_xprt_dequeue: OK [ 298.376413] Testing event svc_xprt_enqueue: OK [ 298.494224] Testing event svc_xprt_create_err: OK [ 298.613594] Testing event svc_stats_latency: OK [ 298.733540] Testing event svc_replace_page_err: OK [ 298.851565] Testing event svc_send: OK [ 298.970443] Testing event svc_drop: OK [ 299.089309] Testing event svc_defer: OK [ 299.208198] Testing event svc_process: OK [ 299.326897] Testing event svc_authenticate: OK [ 299.444164] Testing event svc_xdr_sendto: OK [ 299.562274] Testing event svc_xdr_recvfrom: OK [ 299.680286] Testing event rpc_tls_not_started: OK [ 299.798280] Testing event rpc_tls_unavailable: OK [ 299.919517] Testing event rpcb_unregister: OK [ 300.038244] Testing event rpcb_register: OK [ 300.155964] Testing event pmap_register: OK [ 300.274532] Testing event rpcb_setport: OK [ 300.392138] Testing event rpcb_getport: OK [ 300.509885] Testing event xs_stream_read_request: OK [ 300.628152] Testing event xs_stream_read_data: OK [ 300.747893] Testing event xs_data_ready: OK [ 300.866343] Testing event xprt_reserve: OK [ 300.986458] Testing event xprt_put_cong: OK [ 301.107685] Testing event xprt_get_cong: OK [ 301.226632] Testing event xprt_release_cong: OK [ 301.344165] Testing event xprt_reserve_cong: OK [ 301.462032] Testing event xprt_release_xprt: OK [ 301.580515] Testing event xprt_reserve_xprt: OK [ 301.699248] Testing event xprt_ping: OK [ 301.820497] Testing event xprt_retransmit: OK [ 301.939443] Testing event xprt_transmit: OK [ 302.058204] Testing event xprt_lookup_rqst: OK [ 302.177600] Testing event xprt_timer: OK [ 302.296165] Testing event xprt_destroy: OK [ 302.414590] Testing event xprt_disconnect_force: OK [ 302.533227] Testing event xprt_disconnect_done: OK [ 302.651073] Testing event xprt_disconnect_auto: OK [ 302.769436] Testing event xprt_connect: OK [ 302.888147] Testing event xprt_create: OK [ 303.006311] Testing event rpc_socket_nospace: OK [ 303.124288] Testing event rpc_socket_shutdown: OK [ 303.242269] Testing event rpc_socket_close: OK [ 303.360726] Testing event rpc_socket_reset_connection: OK [ 303.479992] Testing event rpc_socket_error: OK [ 303.598539] Testing event rpc_socket_connect: OK [ 303.717622] Testing event rpc_socket_state_change: OK [ 303.836654] Testing event rpc_xdr_alignment: OK [ 303.955500] Testing event rpc_xdr_overflow: OK [ 304.074619] Testing event rpc_stats_latency: OK [ 304.193433] Testing event rpc_call_rpcerror: OK [ 304.311323] Testing event rpc_buf_alloc: OK [ 304.429364] Testing event rpcb_unrecognized_err: OK [ 304.547544] Testing event rpcb_unreachable_err: OK [ 304.666358] Testing event rpcb_bind_version_err: OK [ 304.785187] Testing event rpcb_timeout_err: OK [ 304.903120] Testing event rpcb_prog_unavail_err: OK [ 305.023130] Testing event rpc__auth_tooweak: OK [ 305.141462] Testing event rpc__bad_creds: OK [ 305.260254] Testing event rpc__stale_creds: OK [ 305.378472] Testing event rpc__mismatch: OK [ 305.496198] Testing event rpc__unparsable: OK [ 305.614372] Testing event rpc__garbage_args: OK [ 305.732378] Testing event rpc__proc_unavail: OK [ 305.853348] Testing event rpc__prog_mismatch: OK [ 305.973968] Testing event rpc__prog_unavail: OK [ 306.093105] Testing event rpc_bad_verifier: OK [ 306.213705] Testing event rpc_bad_callhdr: OK [ 306.333098] Testing event rpc_task_wakeup: OK [ 306.452038] Testing event rpc_task_sleep: OK [ 306.570697] Testing event rpc_task_call_done: OK [ 306.688870] Testing event rpc_task_end: OK [ 306.806360] Testing event rpc_task_signalled: OK [ 306.925165] Testing event rpc_task_timeout: OK [ 307.043289] Testing event rpc_task_complete: OK [ 307.162413] Testing event rpc_task_sync_wake: OK [ 307.281717] Testing event rpc_task_sync_sleep: OK [ 307.399189] Testing event rpc_task_run_action: OK [ 307.518651] Testing event rpc_task_begin: OK [ 307.637291] Testing event rpc_request: OK [ 307.755503] Testing event rpc_refresh_status: OK [ 307.875249] Testing event rpc_retry_refresh_status: OK [ 307.993756] Testing event rpc_timeout_status: OK [ 308.112124] Testing event rpc_connect_status: OK [ 308.230082] Testing event rpc_call_status: OK [ 308.349702] Testing event rpc_clnt_clone_err: OK [ 308.468301] Testing event rpc_clnt_new_err: OK [ 308.587526] Testing event rpc_clnt_new: OK [ 308.708052] Testing event rpc_clnt_replace_xprt_err: OK [ 308.827171] Testing event rpc_clnt_replace_xprt: OK [ 308.945767] Testing event rpc_clnt_release: OK [ 309.065313] Testing event rpc_clnt_shutdown: OK [ 309.184351] Testing event rpc_clnt_killall: OK [ 309.302384] Testing event rpc_clnt_free: OK [ 309.420418] Testing event rpc_xdr_reply_pages: OK [ 309.539549] Testing event rpc_xdr_recvfrom: OK [ 309.658770] Testing event rpc_xdr_sendto: OK [ 309.777356] Testing event 9p_fid_ref: OK [ 309.899598] Testing event 9p_protocol_dump: OK [ 310.025926] Testing event 9p_client_res: OK [ 310.144596] Testing event 9p_client_req: OK [ 310.266162] Testing event subflow_check_data_avail: OK [ 310.384417] Testing event ack_update_msk: OK [ 310.505279] Testing event get_mapping_status: OK [ 310.623293] Testing event mptcp_sendmsg_frag: OK [ 310.741759] Testing event mptcp_subflow_get_send: OK [ 310.860310] Testing event mctp_key_release: OK [ 310.979666] Testing event mctp_key_acquire: OK [ 311.100739] Testing event tls_alert_recv: OK [ 311.218344] Testing event tls_alert_send: OK [ 311.337304] Testing event tls_contenttype: OK [ 311.456106] Testing event handshake_cmd_done_err: OK [ 311.574314] Testing event handshake_cmd_done: OK [ 311.692079] Testing event handshake_cmd_accept_err: OK [ 311.810381] Testing event handshake_cmd_accept: OK [ 311.929389] Testing event handshake_notify_err: OK [ 312.047807] Testing event handshake_complete: OK [ 312.166222] Testing event handshake_destruct: OK [ 312.286300] Testing event handshake_cancel_busy: OK [ 312.405382] Testing event handshake_cancel_none: OK [ 312.523520] Testing event handshake_cancel: OK [ 312.641538] Testing event handshake_submit_err: OK [ 312.760507] Testing event handshake_submit: OK [ 312.879148] Testing event ma_write: OK [ 312.999512] Testing event ma_read: OK [ 313.119815] Testing event ma_op: OK [ 313.238962] Running tests on trace event systems: [ 313.241420] Testing event system maple_tree: OK [ 313.365573] Testing event system handshake: OK [ 313.498157] Testing event system mctp: OK [ 313.617835] Testing event system mptcp: OK [ 313.742946] Testing event system 9p: OK [ 313.878699] Testing event system sunrpc: OK [ 314.125208] Testing event system devlink: OK [ 314.246869] Testing event system fib6: OK [ 314.366296] Testing event system icmp: OK [ 314.484974] Testing event system bpf_test_run: OK [ 314.605744] Testing event system netlink: OK [ 314.722845] Testing event system skb: OK [ 314.846803] Testing event system net: OK [ 314.978641] Testing event system napi: OK [ 315.098437] Testing event system sock: OK [ 315.225300] Testing event system udp: OK [ 315.344929] Testing event system tcp: OK [ 315.481470] Testing event system fib: OK [ 315.600337] Testing event system qdisc: OK [ 315.723333] Testing event system bridge: OK [ 315.843675] Testing event system page_pool: OK [ 315.965989] Testing event system neigh: OK [ 316.091085] Testing event system thunderbolt: OK [ 316.212106] Testing event system ras: OK [ 316.335388] Testing event system cros_ec: OK [ 316.454808] Testing event system amd_cpu: OK [ 316.573457] Testing event system watchdog: OK [ 316.695316] Testing event system thermal: OK [ 316.816476] Testing event system hwmon: OK [ 316.937367] Testing event system smbus: OK [ 317.059569] Testing event system i2c: OK [ 317.181090] Testing event system rtc: OK [ 317.312454] Testing event system ucsi: OK [ 317.434433] Testing event system xhci-hcd: OK [ 317.604037] Testing event system netvsc: OK [ 317.733025] Testing event system i40e: OK [ 317.858003] Testing event system e1000e_trace: OK [ 317.976247] Testing event system mdio: OK [ 318.095880] Testing event system spi: OK [ 318.223183] Testing event system scsi: OK [ 318.345588] Testing event system dma_fence: OK [ 318.470000] Testing event system dev: OK [ 318.590821] Testing event system regmap: OK [ 318.727572] Testing event system iommu: OK [ 318.851247] Testing event system intel_iommu: OK [ 318.975205] Testing event system clk: OK [ 319.118239] Testing event system pwm: OK [ 319.237536] Testing event system gpio: OK [ 319.358723] Testing event system msr: OK [ 319.518321] Testing event system io_uring: OK [ 319.654251] Testing event system wbt: OK [ 319.778258] Testing event system kyber: OK [ 319.899205] Testing event system block: OK [ 320.039410] Testing event system avc: OK [ 320.158559] Testing event system lockd: OK [ 320.279862] Testing event system nfs: OK [ 320.486139] Testing event system jbd2: OK [ 320.625226] Testing event system ext4: OK [ 320.852109] Testing event system fscache: OK [ 320.988756] Testing event system netfs: OK [ 321.136719] Testing event system iomap: OK [ 321.266369] Testing event system filelock: OK [ 321.393785] Testing event system fs_dax: OK [ 321.522956] Testing event system writeback: OK [ 321.668768] Testing event system damon: OK [ 321.787441] Testing event system page_isolation: OK [ 321.905017] Testing event system huge_memory: OK [ 322.028829] Testing event system thp: OK [ 322.149149] Testing event system ksm: OK [ 322.274499] Testing event system vmalloc: OK [ 322.394361] Testing event system tlb: OK [ 322.513969] Testing event system migrate: OK [ 322.636164] Testing event system mmap: OK [ 322.756936] Testing event system mmap_lock: OK [ 322.899058] Testing event system compaction: OK [ 323.030894] Testing event system kmem: OK [ 323.168690] Testing event system percpu: OK [ 323.291095] Testing event system vmscan: OK [ 323.426346] Testing event system pagemap: OK [ 323.546062] Testing event system oom: OK [ 323.671425] Testing event system filemap: OK [ 323.792984] Testing event system rseq: OK [ 323.911646] Testing event system context_tracking: OK [ 324.030893] Testing event system xdp: OK [ 324.164904] Testing event system rpm: OK [ 324.289648] Testing event system power: OK [ 324.444839] Testing event system error_report: OK [ 324.563727] Testing event system bpf_trace: OK [ 324.681206] Testing event system test: OK [ 324.798935] Testing event system cgroup: OK [ 324.942772] Testing event system csd: OK [ 325.066814] Testing event system timer_migration: OK [ 325.198128] Testing event system alarmtimer: OK [ 325.319997] Testing event system timer: OK [ 325.459278] Testing event system module: OK [ 325.581573] Testing event system raw_syscalls: OK [ 325.701815] Testing event system swiotlb: OK [ 325.820460] Testing event system rcu: OK [ 325.943416] Testing event system irq_matrix: OK [ 326.072251] Testing event system printk: OK [ 326.191371] Testing event system lock: OK [ 326.322373] Testing event system sched: OK [ 326.474978] Testing event system ipi: OK [ 326.598285] Testing event system notifier: OK [ 326.720814] Testing event system workqueue: OK [ 326.843610] Testing event system signal: OK [ 326.964316] Testing event system irq: OK [ 327.091450] Testing event system cpuhp: OK [ 327.214009] Testing event system task: OK [ 327.333537] Testing event system exceptions: OK [ 327.453002] Testing event system mce: OK [ 327.571315] Testing event system x86_fpu: OK [ 327.699054] Testing event system nmi: OK [ 327.818573] Testing event system irq_vectors: OK [ 327.970184] Testing event system syscalls: OK [ 328.094026] Testing event system hyperv: OK [ 328.238449] Testing event system xen: OK [ 328.369947] Testing event system vsyscall: OK [ 328.489418] Testing event system initcall: OK [ 328.611190] Running tests on all trace events: [ 328.613542] Testing all events: OK [ 330.622778] Testing ftrace filter: OK [ 330.627601] trace_kprobe: Testing kprobe tracing: OK [ 330.645585] Loading compiled-in X.509 certificates [ 330.685136] Loaded X.509 cert 'Build time autogenerated kernel key: e8a3e68aa10635139108e0d86b370dcb157755f4' [ 330.729642] Demotion targets for Node 0: null [ 330.730626] kmemleak: Kernel memory leak detector initialized (mem pool available: 13821) [ 330.730629] kmemleak: Automatic memory scanning thread started [ 330.731358] page_owner is disabled [ 330.732047] Key type .fscrypt registered [ 330.734077] Key type fscrypt-provisioning registered [ 330.971551] Key type encrypted registered [ 330.972287] AppArmor: AppArmor sha256 policy hashing enabled [ 330.973171] ima: No TPM chip found, activating TPM-bypass! [ 330.974045] ima: Allocated hash algorithm: sha1 [ 330.974868] ima: No architecture policies found [ 330.975847] evm: Initialising EVM extended attributes: [ 330.976671] evm: security.selinux [ 330.977351] evm: security.SMACK64 (disabled) [ 330.978108] evm: security.SMACK64EXEC (disabled) [ 330.978895] evm: security.SMACK64TRANSMUTE (disabled) [ 330.979713] evm: security.SMACK64MMAP (disabled) [ 330.980500] evm: security.apparmor [ 330.981188] evm: security.ima [ 330.981841] evm: security.capability [ 330.982539] evm: HMAC attrs: 0x1 [ 331.743926] alg: skcipher: skipping comparison tests for xctr-aes-aesni because xctr(aes-generic) is unavailable [ 332.730018] Running certificate verification RSA selftest [ 332.732007] Loaded X.509 cert 'Certificate verification self-testing key: f58703bb33ce1b73ee02eccdee5b8817518fe3db' [ 335.876360] e1000e 0000:00:1f.6 eth0: NIC Link is Up 1000 Mbps Full Duplex, Flow Control: None [ 335.889900] Sending DHCP requests .., OK [ 338.788984] IP-Config: Got DHCP answer from 10.239.62.242, my address is 10.239.62.165 [ 338.790254] IP-Config: Complete: [ 338.791121] device=eth0, hwaddr=d8:5e:d3:0a:00:02, ipaddr=10.239.62.165, mask=255.255.255.0, gw=10.239.62.241 [ 338.792576] host=lkp-csl-d02, domain=sh.intel.com, nis-domain=(none) [ 338.793760] bootserver=10.112.226.6, rootserver=10.112.226.6, rootpath= [ 338.793762] nameserver0=10.248.2.5, nameserver1=10.109.19.215, nameserver2=172.17.24.39 [ 338.797534] clk: Disabling unused clocks [ 338.798527] KTAP version 1 [ 338.799405] 1..20 [ 338.800502] KTAP version 1 [ 338.801497] # Subtest: hw_breakpoint [ 338.802479] # module: hw_breakpoint_test [ 338.802496] 1..9 [ 338.805188] ok 1 test_one_cpu [ 338.812835] ok 2 test_many_cpus [ 338.814510] ok 3 test_one_task_on_all_cpus [ 338.816177] ok 4 test_two_tasks_on_all_cpus [ 338.817613] ok 5 test_one_task_on_one_cpu [ 338.819212] ok 6 test_one_task_mixed [ 338.820943] ok 7 test_two_tasks_on_one_cpu [ 338.822790] ok 8 test_two_tasks_on_one_all_cpus [ 338.824572] ok 9 test_task_on_all_and_one_cpu [ 338.825576] # hw_breakpoint: pass:9 fail:0 skip:0 total:9 [ 338.826566] # Totals: pass:9 fail:0 skip:0 total:9 [ 338.827617] ok 1 hw_breakpoint [ 338.829586] KTAP version 1 [ 338.830424] # Subtest: damon [ 338.831273] # module: core [ 338.831288] 1..16 [ 338.833280] ok 1 damon_test_target [ 338.833618] ok 2 damon_test_regions [ 338.834959] ok 3 damon_test_aggregate [ 338.836113] ok 4 damon_test_split_at [ 338.837437] ok 5 damon_test_merge_two [ 338.838641] ok 6 damon_test_merge_regions_of [ 338.839877] ok 7 damon_test_split_regions_of [ 338.841171] ok 8 damon_test_ops_registration [ 338.842409] ok 9 damon_test_set_regions [ 338.843582] ok 10 damon_test_nr_accesses_to_accesses_bp [ 338.844713] ok 11 damon_test_update_monitoring_result [ 338.845957] ok 12 damon_test_set_attrs [ 338.847151] ok 13 damon_test_moving_sum [ 338.848243] ok 14 damos_test_new_filter [ 338.849344] ok 15 damos_test_filter_out [ 338.850404] ok 16 damon_test_feed_loop_next_input [ 338.851216] # damon: pass:16 fail:0 skip:0 total:16 [ 338.852093] # Totals: pass:16 fail:0 skip:0 total:16 [ 338.852962] ok 2 damon [ 338.854478] KTAP version 1 [ 338.855127] # Subtest: damon-operations [ 338.855868] # module: vaddr [ 338.855881] 1..6 [ 338.857503] ok 1 damon_test_three_regions_in_vmas [ 338.857821] ok 2 damon_test_apply_three_regions1 [ 338.858953] ok 3 damon_test_apply_three_regions2 [ 338.860093] ok 4 damon_test_apply_three_regions3 [ 338.861215] ok 5 damon_test_apply_three_regions4 [ 338.862424] ok 6 damon_test_split_evenly [ 338.863230] # damon-operations: pass:6 fail:0 skip:0 total:6 [ 338.863978] # Totals: pass:6 fail:0 skip:0 total:6 [ 338.864847] ok 3 damon-operations [ 338.866425] KTAP version 1 [ 338.867078] # Subtest: damon-sysfs [ 338.867791] # module: sysfs [ 338.867806] 1..1 [ 338.869478] ok 1 damon_sysfs_test_add_targets [ 338.869491] ok 4 damon-sysfs [ 338.870977] KTAP version 1 [ 338.871616] # Subtest: exec [ 338.872284] # module: exec [ 338.872297] 1..1 [ 338.873843] ok 1 exec_test_bprm_stack_limits [ 338.873856] ok 5 exec [ 338.875266] KTAP version 1 [ 338.875917] # Subtest: binfmt_elf [ 338.876614] # module: binfmt_elf [ 338.876627] 1..1 [ 338.878242] ok 1 total_mapping_size_test [ 338.878254] ok 6 binfmt_elf [ 338.879708] KTAP version 1 [ 338.880372] # Subtest: compat_binfmt_elf [ 338.881134] # module: compat_binfmt_elf [ 338.881147] 1..1 [ 338.882847] ok 1 total_mapping_size_test [ 338.882861] ok 7 compat_binfmt_elf [ 338.884420] KTAP version 1 [ 338.885087] # Subtest: fprobe_test [ 338.885811] # module: test_fprobe [ 338.885824] 1..6 [ 338.926622] ok 1 test_fprobe_entry [ 339.030132] ok 2 test_fprobe [ 339.133717] ok 3 test_fprobe_syms [ 339.237946] ok 4 test_fprobe_data [ 339.341712] ok 5 test_fprobe_nest [ 339.445936] ok 6 test_fprobe_skip [ 339.446720] # fprobe_test: pass:6 fail:0 skip:0 total:6 [ 339.447495] # Totals: pass:6 fail:0 skip:0 total:6 [ 339.448353] ok 8 fprobe_test [ 339.449938] KTAP version 1 [ 339.450622] # Subtest: qos-kunit-test [ 339.451422] # module: qos_test [ 339.451435] 1..3 [ 339.453044] ok 1 freq_qos_test_min [ 339.453480] ok 2 freq_qos_test_maxdef [ 339.454476] ok 3 freq_qos_test_readd [ 339.455239] # qos-kunit-test: pass:3 fail:0 skip:0 total:3 [ 339.455993] # Totals: pass:3 fail:0 skip:0 total:3 [ 339.456881] ok 9 qos-kunit-test [ 339.458459] KTAP version 1 [ 339.459128] # Subtest: VCAP_API_DebugFS_Testsuite [ 339.459963] # module: vcap [ 339.459976] 1..4 [ 339.461361] ================================================================== [ 339.462397] BUG: KASAN: stack-out-of-bounds in test_cache_read+0x3b0/0x3f0 [ 339.463397] Read of size 4 at addr ffffc90000637d30 by task kunit_try_catch/3308 [ 339.465012] CPU: 25 UID: 0 PID: 3308 Comm: kunit_try_catch Tainted: G N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 339.466788] Tainted: [N]=TEST [ 339.467532] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 339.468816] Call Trace: [ 339.469519] [ 339.470192] dump_stack_lvl+0x53/0x70 [ 339.470995] print_address_description.constprop.0+0x2c/0x3a0 [ 339.471973] ? test_cache_read+0x3b0/0x3f0 [ 339.472820] print_report+0xb9/0x2b0 [ 339.473623] ? kasan_addr_to_slab+0xd/0xb0 [ 339.474469] ? test_cache_read+0x3b0/0x3f0 [ 339.475315] kasan_report+0xe8/0x120 [ 339.476120] ? test_cache_read+0x3b0/0x3f0 [ 339.476971] test_cache_read+0x3b0/0x3f0 [ 339.477820] vcap_addr_keysets+0x169/0x3a0 [ 339.478663] ? __asan_memset+0x23/0x50 [ 339.479481] vcap_api_addr_keyset_test+0x306/0x7f0 [ 339.480390] ? __pfx_vcap_api_addr_keyset_test+0x10/0x10 [ 339.481348] ? update_load_avg+0x1c7/0x20e0 [ 339.482218] ? __pfx___perf_event_task_sched_in+0x10/0x10 [ 339.483193] ? __perf_event_task_sched_out+0x9b/0x160 [ 339.484140] ? __pfx___perf_event_task_sched_out+0x10/0x10 [ 339.485124] ? __switch_to+0x5be/0xdc0 [ 339.485967] ? __schedule+0x7ec/0x1950 [ 339.486807] ? ktime_get_ts64+0x7f/0x230 [ 339.487676] kunit_try_run_case+0x1b0/0x490 [ 339.488546] ? __pfx_kunit_try_run_case+0x10/0x10 [ 339.489463] ? set_cpus_allowed_ptr+0x85/0xc0 [ 339.490352] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 339.491290] ? __pfx_kunit_try_run_case+0x10/0x10 [ 339.492216] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 339.493258] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 339.494243] kthread+0x2d8/0x3c0 [ 339.495051] ? __pfx_kthread+0x10/0x10 [ 339.495902] ret_from_fork+0x31/0x70 [ 339.496736] ? __pfx_kthread+0x10/0x10 [ 339.497582] ret_from_fork_asm+0x1a/0x30 [ 339.498463] [ 339.499805] The buggy address belongs to stack of task kunit_try_catch/3308 [ 339.500895] and is located at offset 560 in frame: [ 339.501809] vcap_api_addr_keyset_test+0x0/0x7f0 [ 339.503301] This frame has 7 objects: [ 339.504087] [32, 48) 'matches' [ 339.504089] [64, 88) '__assertion' [ 339.504818] [128, 288) 'admin' [ 339.505559] [352, 392) 'keysets' [ 339.506273] [432, 480) 'keydata' [ 339.507000] [512, 560) 'mskdata' [ 339.507721] [592, 640) 'actdata' [ 339.509704] The buggy address belongs to the virtual mapping at [ffffc90000630000, ffffc90000639000) created by: dup_task_struct+0x59/0x600 [ 339.512829] The buggy address belongs to the physical page: [ 339.513732] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2084332 [ 339.514854] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 339.515856] raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 339.516961] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 339.518073] page dumped because: kasan: bad access detected [ 339.519587] Memory state around the buggy address: [ 339.520448] ffffc90000637c00: 00 00 00 00 f2 f2 f2 f2 f2 f2 f2 f2 00 00 00 00 [ 339.521517] ffffc90000637c80: 00 f2 f2 f2 f2 f2 00 00 00 00 00 00 f2 f2 f2 f2 [ 339.522594] >ffffc90000637d00: 00 00 00 00 00 00 f2 f2 f2 f2 00 00 00 00 00 00 [ 339.523681] ^ [ 339.524578] ffffc90000637d80: f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 [ 339.525686] ffffc90000637e00: f1 f1 f1 f1 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 [ 339.526795] ================================================================== [ 339.527964] Disabling lock debugging due to kernel taint [ 339.529075] not ok 1 vcap_api_addr_keyset_test [ 339.529253] # vcap_api_show_admin_raw_test: EXPECTATION FAILED at drivers/net/ethernet/microchip/vcap/vcap_api_debugfs_kunit.c:377 Expected test_expected == test_pr_buffer[0], but test_expected == " addr: 786, X6 rule, keysets: VCAP_KFS_MAC_ETYPE " test_pr_buffer[0] == "" [ 339.530394] not ok 2 vcap_api_show_admin_raw_test [ 339.536501] ok 3 vcap_api_show_admin_test [ 339.537852] ok 4 vcap_api_show_admin_rule_test [ 339.538821] # VCAP_API_DebugFS_Testsuite: pass:2 fail:2 skip:0 total:4 [ 339.539800] # Totals: pass:2 fail:2 skip:0 total:4 [ 339.540922] not ok 10 VCAP_API_DebugFS_Testsuite [ 339.542960] KTAP version 1 [ 339.543793] # Subtest: VCAP_API_Encoding_Testsuite [ 339.544800] # module: vcap [ 339.544811] 1..17 [ 339.546615] ok 1 vcap_api_set_bit_1_test [ 339.546882] ok 2 vcap_api_set_bit_0_test [ 339.548038] ok 3 vcap_api_iterator_init_test [ 339.549324] ok 4 vcap_api_iterator_next_test [ 339.550495] ok 5 vcap_api_encode_typegroups_test [ 339.551723] ok 6 vcap_api_encode_bit_test [ 339.552923] ok 7 vcap_api_encode_field_test [ 339.554071] ok 8 vcap_api_encode_short_field_test [ 339.555219] ok 9 vcap_api_encode_keyfield_test [ 339.556410] ok 10 vcap_api_encode_max_keyfield_test [ 339.557582] ok 11 vcap_api_encode_actionfield_test [ 339.558797] ok 12 vcap_api_keyfield_typegroup_test [ 339.559971] ok 13 vcap_api_actionfield_typegroup_test [ 339.561136] ok 14 vcap_api_vcap_keyfields_test [ 339.562310] ok 15 vcap_api_vcap_actionfields_test [ 339.563335] vcap_encode_rule_keyset:670: no keyfields in the rule [ 339.565504] ok 16 vcap_api_encode_rule_keyset_test [ 339.565603] vcap_encode_rule_actionset:829: no actionfields in the rule [ 339.567744] ok 17 vcap_api_encode_rule_actionset_test [ 339.567755] # VCAP_API_Encoding_Testsuite: pass:17 fail:0 skip:0 total:17 [ 339.568754] # Totals: pass:17 fail:0 skip:0 total:17 [ 339.569851] ok 11 VCAP_API_Encoding_Testsuite [ 339.571704] KTAP version 1 [ 339.572471] # Subtest: VCAP_API_Rule_Value_Testsuite [ 339.573448] # module: vcap [ 339.573460] 1..2 [ 339.575115] ok 1 vcap_api_rule_add_keyvalue_test [ 339.575351] ok 2 vcap_api_rule_add_actionvalue_test [ 339.576257] # VCAP_API_Rule_Value_Testsuite: pass:2 fail:0 skip:0 total:2 [ 339.577162] # Totals: pass:2 fail:0 skip:0 total:2 [ 339.578210] ok 12 VCAP_API_Rule_Value_Testsuite [ 339.579958] KTAP version 1 [ 339.580663] # Subtest: VCAP_API_Full_Rule_Testsuite [ 339.581572] # module: vcap [ 339.581584] 1..4 [ 339.583123] ok 1 vcap_api_rule_find_keyset_basic_test [ 339.583348] ok 2 vcap_api_rule_find_keyset_failed_test [ 339.584450] ok 3 vcap_api_rule_find_keyset_many_test [ 339.585464] vcap_rule_add_key:2679: keyfield ETYPE_LEN_IS is already in the rule [ 339.587683] ok 4 vcap_api_encode_rule_test [ 339.587695] # VCAP_API_Full_Rule_Testsuite: pass:4 fail:0 skip:0 total:4 [ 339.588541] # Totals: pass:4 fail:0 skip:0 total:4 [ 339.589572] ok 13 VCAP_API_Full_Rule_Testsuite [ 339.591329] KTAP version 1 [ 339.592057] # Subtest: VCAP_API_Support_Testsuite [ 339.592952] # module: vcap [ 339.592964] 1..4 [ 339.594539] ok 1 vcap_api_next_lookup_basic_test [ 339.594734] ok 2 vcap_api_next_lookup_advanced_test [ 339.595898] ok 3 vcap_api_filter_unsupported_keys_test [ 339.597221] ok 4 vcap_api_filter_keylist_test [ 339.598187] # VCAP_API_Support_Testsuite: pass:4 fail:0 skip:0 total:4 [ 339.599074] # Totals: pass:4 fail:0 skip:0 total:4 [ 339.600115] ok 14 VCAP_API_Support_Testsuite [ 339.601916] KTAP version 1 [ 339.602666] # Subtest: VCAP_API_Rule_Counter_Testsuite [ 339.603624] # module: vcap [ 339.603635] 1..2 [ 339.605179] vcap_api_set_rule_counter_test:1493 [ 339.606062] vcap_api_set_rule_counter_test:1495 [ 339.607106] ok 1 vcap_api_set_rule_counter_test [ 339.607445] ok 2 vcap_api_get_rule_counter_test [ 339.608397] # VCAP_API_Rule_Counter_Testsuite: pass:2 fail:0 skip:0 total:2 [ 339.609313] # Totals: pass:2 fail:0 skip:0 total:2 [ 339.610366] ok 15 VCAP_API_Rule_Counter_Testsuite [ 339.612167] KTAP version 1 [ 339.612939] # Subtest: VCAP_API_Rule_Insert_Testsuite [ 339.613868] # module: vcap [ 339.613879] 1..2 [ 339.615771] ok 1 vcap_api_rule_insert_in_order_test [ 339.616184] ok 2 vcap_api_rule_insert_reverse_order_test [ 339.617142] # VCAP_API_Rule_Insert_Testsuite: pass:2 fail:0 skip:0 total:2 [ 339.618128] # Totals: pass:2 fail:0 skip:0 total:2 [ 339.619175] ok 16 VCAP_API_Rule_Insert_Testsuite [ 339.621027] KTAP version 1 [ 339.621764] # Subtest: VCAP_API_Rule_Remove_Testsuite [ 339.622681] # module: vcap [ 339.622692] 1..3 [ 339.624673] ok 1 vcap_api_rule_remove_at_end_test [ 339.625087] ok 2 vcap_api_rule_remove_in_middle_test [ 339.626417] ok 3 vcap_api_rule_remove_in_front_test [ 339.627388] # VCAP_API_Rule_Remove_Testsuite: pass:3 fail:0 skip:0 total:3 [ 339.628339] # Totals: pass:3 fail:0 skip:0 total:3 [ 339.629431] ok 17 VCAP_API_Rule_Remove_Testsuite [ 339.631267] KTAP version 1 [ 339.632021] # Subtest: VCAP_API_Rule_Enable_Testsuite [ 339.632969] # module: vcap [ 339.632981] 1..1 [ 339.634703] ok 1 vcap_api_rule_chain_path_test [ 339.634716] ok 18 VCAP_API_Rule_Enable_Testsuite [ 339.636697] KTAP version 1 [ 339.637463] # Subtest: thunderbolt [ 339.638256] # module: thunderbolt [ 339.638268] 1..39 [ 339.640202] ok 1 tb_test_path_basic [ 339.640966] ok 2 tb_test_path_not_connected_walk [ 339.642618] ok 3 tb_test_path_single_hop_walk [ 339.644663] ok 4 tb_test_path_daisy_chain_walk [ 339.647164] ok 5 tb_test_path_simple_tree_walk [ 339.651239] ok 6 tb_test_path_complex_tree_walk [ 339.656138] ok 7 tb_test_path_max_length_walk [ 339.657999] ok 8 tb_test_path_not_connected [ 339.659580] ok 9 tb_test_path_not_bonded_lane0 [ 339.661156] ok 10 tb_test_path_not_bonded_lane1 [ 339.663293] ok 11 tb_test_path_not_bonded_lane1_chain [ 339.665454] ok 12 tb_test_path_not_bonded_lane1_chain_reverse [ 339.667995] ok 13 tb_test_path_mixed_chain [ 339.670627] ok 14 tb_test_path_mixed_chain_reverse [ 339.672523] ok 15 tb_test_tunnel_pcie [ 339.674183] ok 16 tb_test_tunnel_dp [ 339.676568] ok 17 tb_test_tunnel_dp_chain [ 339.679206] ok 18 tb_test_tunnel_dp_tree [ 339.683817] ok 19 tb_test_tunnel_dp_max_length [ 339.686564] ok 20 tb_test_tunnel_3dp [ 339.689256] ok 21 tb_test_tunnel_port_on_path [ 339.691066] ok 22 tb_test_tunnel_usb3 [ 339.692330] ok 23 tb_test_tunnel_dma [ 339.693519] ok 24 tb_test_tunnel_dma_rx [ 339.694697] ok 25 tb_test_tunnel_dma_tx [ 339.696446] ok 26 tb_test_tunnel_dma_chain [ 339.697718] ok 27 tb_test_tunnel_dma_match [ 339.699206] ok 28 tb_test_credit_alloc_legacy_not_bonded [ 339.700697] ok 29 tb_test_credit_alloc_legacy_bonded [ 339.702376] ok 30 tb_test_credit_alloc_pcie [ 339.703942] ok 31 tb_test_credit_alloc_without_dp [ 339.705446] ok 32 tb_test_credit_alloc_dp [ 339.706968] ok 33 tb_test_credit_alloc_usb3 [ 339.708430] ok 34 tb_test_credit_alloc_dma [ 339.710071] ok 35 tb_test_credit_alloc_dma_multiple [ 339.711806] ok 36 tb_test_credit_alloc_all [ 339.712913] ok 37 tb_test_property_parse [ 339.713964] ok 38 tb_test_property_format [ 339.715101] ok 39 tb_test_property_copy [ 339.715795] # thunderbolt: pass:39 fail:0 skip:0 total:39 [ 339.716464] # Totals: pass:39 fail:0 skip:0 total:39 [ 339.717263] ok 19 thunderbolt [ 339.718662] KTAP version 1 [ 339.719242] # Subtest: mctp [ 339.719829] # module: mctp [ 339.719842] 1..10 [ 339.720928] KTAP version 1 [ 339.721542] # Subtest: mctp_test_fragment [ 339.721996] ok 1 mtu 63 len 68 -> 1 frags [ 339.723064] ok 2 mtu 64 len 68 -> 1 frags [ 339.724121] ok 3 mtu 65 len 68 -> 2 frags [ 339.725198] ok 4 mtu 66 len 68 -> 2 frags [ 339.726166] ok 5 mtu 127 len 68 -> 2 frags [ 339.727210] ok 6 mtu 128 len 68 -> 2 frags [ 339.728278] ok 7 mtu 129 len 68 -> 3 frags [ 339.729340] ok 8 mtu 130 len 68 -> 3 frags [ 339.730063] # mctp_test_fragment: pass:8 fail:0 skip:0 total:8 [ 339.730786] ok 1 mctp_test_fragment [ 339.731626] KTAP version 1 [ 339.732902] # Subtest: mctp_test_rx_input [ 339.756177] ok 1 {1,a,8,0} [ 339.784557] ok 2 {1,a,9,0} [ 339.795450] ok 3 {2,a,8,0} [ 339.796065] # mctp_test_rx_input: pass:3 fail:0 skip:0 total:3 [ 339.796663] ok 2 mctp_test_rx_input [ 339.797502] KTAP version 1 [ 339.798761] # Subtest: mctp_test_route_input_sk [ 339.812942] ok 1 {1,a,8,c8} type 0 [ 339.829482] ok 2 {1,a,8,c8} type 1 [ 339.841341] ok 3 {1,a,8,c0} type 0 [ 339.855159] ok 4 {1,a,8,48} type 0 [ 339.870982] ok 5 {1,a,8,8} type 0 [ 339.895610] ok 6 {1,a,8,0} type 0 [ 339.896323] # mctp_test_route_input_sk: pass:6 fail:0 skip:0 total:6 [ 339.897015] ok 3 mctp_test_route_input_sk [ 339.897932] KTAP version 1 [ 339.899280] # Subtest: mctp_test_route_input_sk_reasm [ 339.918692] ok 1 single packet [ 339.941703] ok 2 single packet, offset seq [ 339.966309] ok 3 start & end packets [ 339.989825] ok 4 start & end packets, offset seq [ 340.010378] ok 5 start & end packets, out of order [ 340.035313] ok 6 start, middle & end packets [ 340.059000] ok 7 missing seq [ 340.083284] ok 8 seq wrap [ 340.083990] # mctp_test_route_input_sk_reasm: pass:8 fail:0 skip:0 total:8 [ 340.084654] ok 4 mctp_test_route_input_sk_reasm [ 340.085641] KTAP version 1 [ 340.087111] # Subtest: mctp_test_route_input_sk_keys [ 340.108754] ok 1 direct match [ 340.131726] ok 2 flipped src/dest [ 340.155986] ok 3 peer addr mismatch [ 340.180696] ok 4 tag value mismatch [ 340.204856] ok 5 TO mismatch [ 340.224082] ok 6 broadcast response [ 340.248883] ok 7 any local match [ 340.249664] # mctp_test_route_input_sk_keys: pass:7 fail:0 skip:0 total:7 [ 340.250464] ok 5 mctp_test_route_input_sk_keys [ 340.300141] ok 6 mctp_test_route_input_multiple_nets_bind [ 340.348468] ok 7 mctp_test_route_input_multiple_nets_key [ 340.371851] ok 8 mctp_test_packet_flow [ 340.395932] ok 9 mctp_test_fragment_flow [ 340.420473] ok 10 mctp_test_route_output_key_create [ 340.421318] # mctp: pass:10 fail:0 skip:0 total:10 [ 340.422209] # Totals: pass:37 fail:0 skip:0 total:37 [ 340.423080] ok 20 mctp [ 340.442339] Freeing unused decrypted memory: 2028K [ 340.445482] Freeing unused kernel image (initmem) memory: 7864K [ 340.446985] Write protecting the kernel read-only data: 67584k [ 340.449704] Freeing unused kernel image (rodata/data gap) memory: 1348K [ 340.451775] Run /init as init process [ 340.452565] with arguments: [ 340.453273] /init [ 340.453921] nokaslr [ 340.454577] with environment: [ 340.455297] HOME=/ [ 340.455943] TERM=linux [ 340.456605] RESULT_ROOT=/result/kunit/group-00/lkp-csl-d02/debian-12-x86_64-20240206.cgz/x86_64-rhel-8.3-kunit/gcc-12/2377a7d90f5bb2ccc302b5fb0e6ba4c67cf24ddd/3 [ 340.458662] BOOT_IMAGE=/pkg/linux/x86_64-rhel-8.3-kunit/gcc-12/2377a7d90f5bb2ccc302b5fb0e6ba4c67cf24ddd/vmlinuz-6.11.0-rc2-00008-g2377a7d90f5b [ 340.460643] branch=linux-next/master [ 340.461466] job=/lkp/jobs/scheduled/lkp-csl-d02/kunit-group-00-debian-12-x86_64-20240206.cgz-2377a7d90f5b-20240823-137313-1l6zztg-3.yaml [ 340.463497] user=lkp [ 340.464234] ARCH=x86_64 [ 340.464990] kconfig=x86_64-rhel-8.3-kunit [ 340.465878] commit=2377a7d90f5bb2ccc302b5fb0e6ba4c67cf24ddd [ 340.466892] max_uptime=6000 [ 340.467670] LKP_SERVER=10.239.97.5 [ 340.468497] prompt_ramdisk=0 [ 340.469279] vga=normal [ 340.486114] systemd[1]: RTC configured in localtime, applying delta of 0 minutes to system time. [ 340.842251] device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. [ 340.844617] device-mapper: uevent: version 1.0.3 [ 340.846918] device-mapper: ioctl: 4.48.0-ioctl (2023-03-01) initialised: dm-devel@lists.linux.dev [ 340.852450] loop: module loaded [ 340.858532] fuse: init (API version 7.40) [ 340.887985] ACPI: bus type drm_connector registered [ 341.745750] wmi_bus wmi_bus-PNP0C14:00: [Firmware Bug]: WMAA method block execution control method not found [ 341.766775] dca service started, version 1.12.1 [ 341.777406] ioatdma: Intel(R) QuickData Technology Driver 5.00 [ 341.790017] IOAPIC[9]: Set IRTE entry (P:1 FPD:0 Dst_Mode:0 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000000 SID:002C SQ:0 SVT:1) [ 341.794120] IOAPIC[1]: Preconfigured routing entry (9-2 -> IRQ 49 Level:1 ActiveLow:1) [ 341.814217] libata version 3.00 loaded. [ 341.978840] IPMI message handler: version 39.2 [ 342.497832] nvme nvme0: pci function 0000:01:00.0 [ 342.584379] nvme nvme0: 8/0/0 default/read/poll queues [ 342.592662] IOAPIC[9]: Set IRTE entry (P:1 FPD:0 Dst_Mode:0 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000000 SID:002C SQ:0 SVT:1) [ 342.601271] IOAPIC[1]: Preconfigured routing entry (9-3 -> IRQ 61 Level:1 ActiveLow:1) [ 343.071745] nvme0n1: p1 p2 p3 p4 [ 343.300299] ipmi device interface [ 343.327630] ipmi_si: IPMI System Interface driver [ 343.330298] ipmi_si: Unable to find any System Interface(s) [ 343.407771] raid6: avx512x4 gen() 46461 MB/s [ 343.425763] raid6: avx512x2 gen() 46404 MB/s [ 343.443762] raid6: avx512x1 gen() 43028 MB/s [ 343.461761] raid6: avx2x4 gen() 30791 MB/s [ 343.479762] raid6: avx2x2 gen() 28706 MB/s [ 343.497762] raid6: avx2x1 gen() 22860 MB/s [ 343.498922] raid6: using algorithm avx512x4 gen() 46461 MB/s [ 343.516762] raid6: .... xor() 6907 MB/s, rmw enabled [ 343.517961] raid6: using avx512x2 recovery algorithm [ 343.523461] xor: automatically using best checksumming function avx [ 343.807871] Btrfs loaded, zoned=no, fsverity=no [ 343.809097] BTRFS: selftest: sectorsize: 4096 nodesize: 4096 [ 343.810221] BTRFS: selftest: running btrfs free space cache tests [ 343.811435] BTRFS: selftest: running extent only tests [ 343.812547] BTRFS: selftest: running bitmap only tests [ 343.813688] BTRFS: selftest: running bitmap and extent tests [ 343.814986] BTRFS: selftest: running space stealing from bitmap to extent tests [ 343.816531] BTRFS: selftest: running bytes index tests [ 343.817967] BTRFS: selftest: running extent buffer operation tests [ 343.819091] BTRFS: selftest: running btrfs_split_item tests [ 343.820266] BTRFS: selftest: running extent I/O tests [ 343.821273] BTRFS: selftest: running find delalloc tests [ 343.876406] ahci 0000:00:17.0: version 3.0 [ 343.880690] ahci 0000:00:17.0: AHCI vers 0001.0301, 32 command slots, 6 Gbps, SATA mode [ 343.881953] ahci 0000:00:17.0: 4/4 ports implemented (port mask 0xf) [ 343.883065] ahci 0000:00:17.0: flags: 64bit ncq sntf led clo only pio slum part ems deso sadm sds apst [ 343.890615] RAPL PMU: API unit is 2^-32 Joules, 2 fixed counters, 655360 ms ovfl timer [ 343.891940] RAPL PMU: hw unit of domain package 2^-14 Joules [ 343.892979] RAPL PMU: hw unit of domain dram 2^-16 Joules [ 343.916681] BTRFS: selftest: running find_first_clear_extent_bit test [ 343.917912] BTRFS: selftest: running extent buffer bitmap tests [ 343.956942] BTRFS: selftest: running extent buffer memory operation tests [ 343.958210] BTRFS: selftest: running inode tests [ 343.959179] BTRFS: selftest: running btrfs_get_extent tests [ 343.960895] BTRFS: selftest: running hole first btrfs_get_extent test [ 343.962170] BTRFS: selftest: running outstanding_extents tests [ 343.963611] BTRFS: selftest: running qgroup tests [ 343.964532] BTRFS: selftest: running qgroup add/remove tests [ 343.965899] BTRFS: selftest: running qgroup multiple refs test [ 343.967614] BTRFS: selftest: running free space tree tests [ 344.001438] BTRFS: selftest: sectorsize: 4096 nodesize: 8192 [ 344.002430] BTRFS: selftest: running btrfs free space cache tests [ 344.003480] BTRFS: selftest: running extent only tests [ 344.004442] BTRFS: selftest: running bitmap only tests [ 344.005450] BTRFS: selftest: running bitmap and extent tests [ 344.006617] BTRFS: selftest: running space stealing from bitmap to extent tests [ 344.008057] BTRFS: selftest: running bytes index tests [ 344.009401] BTRFS: selftest: running extent buffer operation tests [ 344.010425] BTRFS: selftest: running btrfs_split_item tests [ 344.011521] BTRFS: selftest: running extent I/O tests [ 344.012446] BTRFS: selftest: running find delalloc tests [ 344.115751] BTRFS: selftest: running find_first_clear_extent_bit test [ 344.116869] BTRFS: selftest: running extent buffer bitmap tests [ 344.216952] BTRFS: selftest: running extent buffer memory operation tests [ 344.218314] BTRFS: selftest: running inode tests [ 344.219595] BTRFS: selftest: running btrfs_get_extent tests [ 344.221634] BTRFS: selftest: running hole first btrfs_get_extent test [ 344.222853] BTRFS: selftest: running outstanding_extents tests [ 344.224223] BTRFS: selftest: running qgroup tests [ 344.225114] BTRFS: selftest: running qgroup add/remove tests [ 344.226431] BTRFS: selftest: running qgroup multiple refs test [ 344.228111] BTRFS: selftest: running free space tree tests [ 344.261238] BTRFS: selftest: sectorsize: 4096 nodesize: 16384 [ 344.262226] BTRFS: selftest: running btrfs free space cache tests [ 344.263267] BTRFS: selftest: running extent only tests [ 344.264226] BTRFS: selftest: running bitmap only tests [ 344.265215] BTRFS: selftest: running bitmap and extent tests [ 344.266351] BTRFS: selftest: running space stealing from bitmap to extent tests [ 344.267752] BTRFS: selftest: running bytes index tests [ 344.269030] BTRFS: selftest: running extent buffer operation tests [ 344.269982] BTRFS: selftest: running btrfs_split_item tests [ 344.271002] BTRFS: selftest: running extent I/O tests [ 344.271854] BTRFS: selftest: running find delalloc tests [ 344.385583] BTRFS: selftest: running find_first_clear_extent_bit test [ 344.386636] BTRFS: selftest: running extent buffer bitmap tests [ 344.567909] BTRFS: selftest: running extent buffer memory operation tests [ 344.569026] BTRFS: selftest: running inode tests [ 344.569800] BTRFS: selftest: running btrfs_get_extent tests [ 344.571212] BTRFS: selftest: running hole first btrfs_get_extent test [ 344.572267] BTRFS: selftest: running outstanding_extents tests [ 344.573506] BTRFS: selftest: running qgroup tests [ 344.574293] BTRFS: selftest: running qgroup add/remove tests [ 344.575472] BTRFS: selftest: running qgroup multiple refs test [ 344.576986] BTRFS: selftest: running free space tree tests [ 344.607126] BTRFS: selftest: sectorsize: 4096 nodesize: 32768 [ 344.608027] BTRFS: selftest: running btrfs free space cache tests [ 344.608960] BTRFS: selftest: running extent only tests [ 344.609815] BTRFS: selftest: running bitmap only tests [ 344.610699] BTRFS: selftest: running bitmap and extent tests [ 344.611752] BTRFS: selftest: running space stealing from bitmap to extent tests [ 344.613357] BTRFS: selftest: running bytes index tests [ 344.614522] BTRFS: selftest: running extent buffer operation tests [ 344.615415] BTRFS: selftest: running btrfs_split_item tests [ 344.616388] BTRFS: selftest: running extent I/O tests [ 344.617201] BTRFS: selftest: running find delalloc tests [ 344.708882] BTRFS: selftest: running find_first_clear_extent_bit test [ 344.709889] BTRFS: selftest: running extent buffer bitmap tests [ 345.013997] scsi host0: ahci [ 345.017856] scsi host1: ahci [ 345.044776] scsi host2: ahci [ 345.053580] scsi host3: ahci [ 345.061352] ata1: SATA max UDMA/133 abar m2048@0x92f6b000 port 0x92f6b100 irq 64 lpm-pol 0 [ 345.065463] ata2: SATA max UDMA/133 abar m2048@0x92f6b000 port 0x92f6b180 irq 64 lpm-pol 0 [ 345.069549] ata3: SATA max UDMA/133 abar m2048@0x92f6b000 port 0x92f6b200 irq 64 lpm-pol 0 [ 345.073626] ata4: SATA max UDMA/133 abar m2048@0x92f6b000 port 0x92f6b280 irq 64 lpm-pol 0 [ 345.075282] BTRFS: selftest: running extent buffer memory operation tests [ 345.075515] BTRFS: selftest: running inode tests [ 345.075517] BTRFS: selftest: running btrfs_get_extent tests [ 345.076137] BTRFS: selftest: running hole first btrfs_get_extent test [ 345.076289] BTRFS: selftest: running outstanding_extents tests [ 345.076601] BTRFS: selftest: running qgroup tests [ 345.076603] BTRFS: selftest: running qgroup add/remove tests [ 345.076955] BTRFS: selftest: running qgroup multiple refs test [ 345.077570] BTRFS: selftest: running free space tree tests [ 345.114965] BTRFS: selftest: sectorsize: 4096 nodesize: 65536 [ 345.115855] BTRFS: selftest: running btrfs free space cache tests [ 345.116793] BTRFS: selftest: running extent only tests [ 345.117646] BTRFS: selftest: running bitmap only tests [ 345.118533] BTRFS: selftest: running bitmap and extent tests [ 345.119565] BTRFS: selftest: running space stealing from bitmap to extent tests [ 345.120857] BTRFS: selftest: running bytes index tests [ 345.122032] BTRFS: selftest: running extent buffer operation tests [ 345.123203] BTRFS: selftest: running btrfs_split_item tests [ 345.124225] BTRFS: selftest: running extent I/O tests [ 345.125034] BTRFS: selftest: running find delalloc tests [ 345.216162] BTRFS: selftest: running find_first_clear_extent_bit test [ 345.217183] BTRFS: selftest: running extent buffer bitmap tests [ 345.387172] ata4: SATA link down (SStatus 4 SControl 300) [ 345.388072] ata1: SATA link down (SStatus 4 SControl 300) [ 345.388946] ata3: SATA link down (SStatus 4 SControl 300) [ 345.389865] ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) [ 345.419060] ata2.00: ATA-10: ST4000DM004-2U9104, 0001, max UDMA/133 [ 345.429071] ata2.00: 7814037168 sectors, multi 16: LBA48 NCQ (depth 32), AA [ 345.479751] ata2.00: configured for UDMA/133 [ 345.481320] scsi 1:0:0:0: Direct-Access ATA ST4000DM004-2U91 0001 PQ: 0 ANSI: 5 [ 345.501526] scsi 1:0:0:0: Attached scsi generic sg0 type 0 [ 345.509980] sd 1:0:0:0: [sda] 7814037168 512-byte logical blocks: (4.00 TB/3.64 TiB) [ 345.511161] sd 1:0:0:0: [sda] 4096-byte physical blocks [ 345.512148] sd 1:0:0:0: [sda] Write Protect is off [ 345.513059] sd 1:0:0:0: [sda] Mode Sense: 00 3a 00 00 [ 345.514041] sd 1:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA [ 345.515406] sd 1:0:0:0: [sda] Preferred minimum I/O size 4096 bytes [ 345.599906] sda: sda1 sda2 sda3 sda4 sda5 sda6 [ 345.603134] sd 1:0:0:0: [sda] Attached SCSI disk [ 345.611605] EDAC skx: ECC is disabled on imc 0 [ 345.951476] BTRFS: selftest: running extent buffer memory operation tests [ 345.953165] BTRFS: selftest: running inode tests [ 345.954102] BTRFS: selftest: running btrfs_get_extent tests [ 345.955722] BTRFS: selftest: running hole first btrfs_get_extent test [ 345.956950] BTRFS: selftest: running outstanding_extents tests [ 345.958285] BTRFS: selftest: running qgroup tests [ 345.959201] BTRFS: selftest: running qgroup add/remove tests [ 345.960557] BTRFS: selftest: running qgroup multiple refs test [ 345.962272] BTRFS: selftest: running free space tree tests [ 345.995541] BTRFS: selftest: running extent_map tests [ 345.997204] BTRFS: selftest: Running btrfs_drop_extent_map_range tests [ 345.998489] BTRFS: selftest: Running btrfs_drop_extent_cache with pinned [ 345.999635] BTRFS: selftest: running rmap tests [ 346.147587] BTRFS: device fsid 2c46c954-c55c-4397-8de5-bcb819ee340d devid 4 transid 84 /dev/sda5 (8:5) scanned by (udev-worker) (3728) [ 346.346530] BTRFS: device fsid 2c46c954-c55c-4397-8de5-bcb819ee340d devid 2 transid 84 /dev/sda6 (8:6) scanned by (udev-worker) (3709) [ 346.439054] intel_rapl_common: Found RAPL domain package [ 346.440062] intel_rapl_common: Found RAPL domain dram [ 347.963816] BTRFS: device fsid 28327ed8-a50e-4d49-b70f-b38c17356ca5 devid 1 transid 11035 /dev/nvme0n1p4 (259:4) scanned by mount (3971) [ 347.979005] BTRFS info (device nvme0n1p4): first mount of filesystem 28327ed8-a50e-4d49-b70f-b38c17356ca5 [ 347.980445] BTRFS info (device nvme0n1p4): using crc32c (crc32c-intel) checksum algorithm [ 347.981736] BTRFS info (device nvme0n1p4): using free-space-tree [ 349.423806] is_virt=false [ 349.452589] process 'src/bin/event/wakeup' started with executable stack [ 349.457821] x86/PAT: bmc-watchdog:4064 map pfn expected mapping type uncached-minus for [mem 0x38510000-0x38510fff], got write-back [ 349.461846] x86/PAT: bmc-watchdog:4064 map pfn expected mapping type uncached-minus for [mem 0x38510000-0x38510fff], got write-back [ 349.465584] x86/PAT: bmc-watchdog:4064 map pfn expected mapping type uncached-minus for [mem 0x38510000-0x38510fff], got write-back [ 350.555144] KTAP version 1 [ 350.556135] 1..1 [ 350.557277] KTAP version 1 [ 350.558283] # Subtest: bitfields [ 350.559321] # module: bitfield_kunit [ 350.559340] 1..2 [ 350.561617] ok 1 test_bitfields_constants [ 350.561918] ok 2 test_bitfields_variables [ 350.563069] # bitfields: pass:2 fail:0 skip:0 total:2 [ 350.564141] # Totals: pass:2 fail:0 skip:0 total:2 [ 350.565294] ok 1 bitfields [ 350.632506] KTAP version 1 [ 350.633437] 1..1 [ 350.634519] KTAP version 1 [ 350.635478] # Subtest: bits-test [ 350.636417] # module: test_bits [ 350.636434] 1..3 [ 350.638529] ok 1 genmask_test [ 350.638788] ok 2 genmask_ull_test [ 350.639983] ok 3 genmask_input_check_test [ 350.640928] # bits-test: pass:3 fail:0 skip:0 total:3 [ 350.641927] # Totals: pass:3 fail:0 skip:0 total:3 [ 350.642989] ok 1 bits-test [ 350.705574] KTAP version 1 [ 350.706410] 1..1 [ 350.707404] KTAP version 1 [ 350.708277] # Subtest: cmdline [ 350.709116] # module: cmdline_kunit [ 350.709132] 1..4 [ 350.711017] ok 1 cmdline_test_noint [ 350.711356] ok 2 cmdline_test_lead_int [ 350.712891] ok 3 cmdline_test_tail_int [ 350.714108] ok 4 cmdline_test_range [ 350.714983] # cmdline: pass:4 fail:0 skip:0 total:4 [ 350.715830] # Totals: pass:4 fail:0 skip:0 total:4 [ 350.716724] ok 1 cmdline [ 350.777867] KTAP version 1 [ 350.778555] 1..1 [ 350.779331] KTAP version 1 [ 350.780041] # Subtest: ext4_inode_test [ 350.780783] # module: ext4_inode_test [ 350.780799] 1..1 [ 350.782038] KTAP version 1 [ 350.782680] # Subtest: inode_test_xtimestamp_decoding [ 350.783076] ok 1 1901-12-13 Lower bound of 32bit < 0 timestamp, no extra bits [ 350.785173] ok 2 1969-12-31 Upper bound of 32bit < 0 timestamp, no extra bits [ 350.786533] ok 3 1970-01-01 Lower bound of 32bit >=0 timestamp, no extra bits [ 350.787816] ok 4 2038-01-19 Upper bound of 32bit >=0 timestamp, no extra bits [ 350.789165] ok 5 2038-01-19 Lower bound of 32bit <0 timestamp, lo extra sec bit on [ 350.790574] ok 6 2106-02-07 Upper bound of 32bit <0 timestamp, lo extra sec bit on [ 350.792053] ok 7 2106-02-07 Lower bound of 32bit >=0 timestamp, lo extra sec bit on [ 350.793475] ok 8 2174-02-25 Upper bound of 32bit >=0 timestamp, lo extra sec bit on [ 350.794901] ok 9 2174-02-25 Lower bound of 32bit <0 timestamp, hi extra sec bit on [ 350.796336] ok 10 2242-03-16 Upper bound of 32bit <0 timestamp, hi extra sec bit on [ 350.797779] ok 11 2242-03-16 Lower bound of 32bit >=0 timestamp, hi extra sec bit on [ 350.799229] ok 12 2310-04-04 Upper bound of 32bit >=0 timestamp, hi extra sec bit on [ 350.800680] ok 13 2310-04-04 Upper bound of 32bit>=0 timestamp, hi extra sec bit 1. 1 ns [ 350.802122] ok 14 2378-04-22 Lower bound of 32bit>= timestamp. Extra sec bits 1. Max ns [ 350.803588] ok 15 2378-04-22 Lower bound of 32bit >=0 timestamp. All extra sec bits on [ 350.805087] ok 16 2446-05-10 Upper bound of 32bit >=0 timestamp. All extra sec bits on [ 350.806235] # inode_test_xtimestamp_decoding: pass:16 fail:0 skip:0 total:16 [ 350.807383] ok 1 inode_test_xtimestamp_decoding [ 350.808446] # Totals: pass:16 fail:0 skip:0 total:16 [ 350.809308] ok 1 ext4_inode_test [ 350.877663] KTAP version 1 [ 350.878630] 1..1 [ 350.879963] KTAP version 1 [ 350.880674] # Subtest: hash [ 350.881364] # module: test_hash [ 350.881380] 1..2 [ 350.883595] ok 1 test_string_or [ 350.890849] ok 2 test_hash_or [ 350.891553] # hash: pass:2 fail:0 skip:0 total:2 [ 350.892253] # Totals: pass:2 fail:0 skip:0 total:2 [ 350.893055] ok 1 hash [ 350.959021] KTAP version 1 [ 350.959712] 1..1 [ 350.960543] KTAP version 1 [ 350.961250] # Subtest: linear-ranges-test [ 350.962030] # module: test_linear_ranges [ 350.962047] 1..4 [ 350.963776] ok 1 range_test_get_value_amount [ 350.964070] ok 2 range_test_get_selector_high [ 350.965146] ok 3 range_test_get_selector_low [ 350.966238] ok 4 range_test_get_value [ 350.967203] # linear-ranges-test: pass:4 fail:0 skip:0 total:4 [ 350.967996] # Totals: pass:4 fail:0 skip:0 total:4 [ 350.968966] ok 1 linear-ranges-test [ 351.031476] KTAP version 1 [ 351.032176] 1..3 [ 351.033223] KTAP version 1 [ 351.033932] # Subtest: list-kunit-test [ 351.034691] # module: list_test [ 351.034707] 1..39 [ 351.036319] ok 1 list_test_list_init [ 351.036652] ok 2 list_test_list_add [ 351.037651] ok 3 list_test_list_add_tail [ 351.038882] ok 4 list_test_list_del [ 351.039987] ok 5 list_test_list_replace [ 351.040959] ok 6 list_test_list_replace_init [ 351.041945] ok 7 list_test_list_swap [ 351.043017] ok 8 list_test_list_del_init [ 351.043968] ok 9 list_test_list_del_init_careful [ 351.044951] ok 10 list_test_list_move [ 351.045987] ok 11 list_test_list_move_tail [ 351.048096] ok 12 list_test_list_bulk_move_tail [ 351.049055] ok 13 list_test_list_is_head [ 351.050043] ok 14 list_test_list_is_first [ 351.050978] ok 15 list_test_list_is_last [ 351.051922] ok 16 list_test_list_empty [ 351.052887] ok 17 list_test_list_empty_careful [ 351.053836] ok 18 list_test_list_rotate_left [ 351.054878] ok 19 list_test_list_rotate_to_front [ 351.055905] ok 20 list_test_list_is_singular [ 351.056915] ok 21 list_test_list_cut_position [ 351.057924] ok 22 list_test_list_cut_before [ 351.058931] ok 23 list_test_list_splice [ 351.059926] ok 24 list_test_list_splice_tail [ 351.060854] ok 25 list_test_list_splice_init [ 351.061836] ok 26 list_test_list_splice_tail_init [ 351.062834] ok 27 list_test_list_entry [ 351.063849] ok 28 list_test_list_entry_is_head [ 351.064772] ok 29 list_test_list_first_entry [ 351.065718] ok 30 list_test_list_last_entry [ 351.066691] ok 31 list_test_list_first_entry_or_null [ 351.067629] ok 32 list_test_list_next_entry [ 351.068616] ok 33 list_test_list_prev_entry [ 351.069543] ok 34 list_test_list_for_each [ 351.070494] ok 35 list_test_list_for_each_prev [ 351.071723] ok 36 list_test_list_for_each_safe [ 351.072680] ok 37 list_test_list_for_each_prev_safe [ 351.073616] ok 38 list_test_list_for_each_entry [ 351.074607] ok 39 list_test_list_for_each_entry_reverse [ 351.075339] # list-kunit-test: pass:39 fail:0 skip:0 total:39 [ 351.076115] # Totals: pass:39 fail:0 skip:0 total:39 [ 351.076915] ok 1 list-kunit-test [ 351.078405] KTAP version 1 [ 351.078991] # Subtest: hlist [ 351.079569] # module: list_test [ 351.079585] 1..18 [ 351.080952] ok 1 hlist_test_init [ 351.081179] ok 2 hlist_test_unhashed [ 351.082056] ok 3 hlist_test_unhashed_lockless [ 351.082956] ok 4 hlist_test_del [ 351.083995] ok 5 hlist_test_del_init [ 351.084865] ok 6 hlist_test_add [ 351.085774] ok 7 hlist_test_fake [ 351.086616] ok 8 hlist_test_is_singular_node [ 351.087490] ok 9 hlist_test_empty [ 351.088432] ok 10 hlist_test_move_list [ 351.089287] ok 11 hlist_test_entry [ 351.090217] ok 12 hlist_test_entry_safe [ 351.091091] ok 13 hlist_test_for_each [ 351.091997] ok 14 hlist_test_for_each_safe [ 351.092904] ok 15 hlist_test_for_each_entry [ 351.093870] ok 16 hlist_test_for_each_entry_continue [ 351.094826] ok 17 hlist_test_for_each_entry_from [ 351.095853] ok 18 hlist_test_for_each_entry_safe [ 351.096590] # hlist: pass:18 fail:0 skip:0 total:18 [ 351.097329] # Totals: pass:18 fail:0 skip:0 total:18 [ 351.098065] ok 2 hlist [ 351.099439] KTAP version 1 [ 351.100026] # Subtest: klist [ 351.100622] # module: list_test [ 351.100637] 1..8 [ 351.102044] ok 1 klist_test_add_tail [ 351.102274] ok 2 klist_test_add_head [ 351.103170] ok 3 klist_test_add_behind [ 351.104068] ok 4 klist_test_add_before [ 351.105035] ok 5 klist_test_del_refcount_greater_than_zero [ 351.105950] ok 6 klist_test_del_refcount_zero [ 351.107011] ok 7 klist_test_remove [ 351.107994] ok 8 klist_test_node_attached [ 351.108661] # klist: pass:8 fail:0 skip:0 total:8 [ 351.109409] # Totals: pass:8 fail:0 skip:0 total:8 [ 351.110207] ok 3 klist [ 351.173492] KTAP version 1 [ 351.174083] 1..1 [ 351.174767] KTAP version 1 [ 351.175360] # Subtest: memcpy [ 351.175988] # module: memcpy_kunit [ 351.176004] 1..6 [ 351.177295] # memset_test: ok: memset() direct assignment [ 351.178123] # memset_test: ok: memset() complete overwrite [ 351.178957] # memset_test: ok: memset() middle overwrite [ 351.179771] # memset_test: ok: memset() argument side-effects [ 351.180609] # memset_test: ok: memset() memset_after() [ 351.181401] # memset_test: ok: memset() memset_startat() [ 351.182423] ok 1 memset_test [ 351.182610] # memcpy_test: ok: memcpy() static initializers [ 351.184091] # memcpy_test: ok: memcpy() direct assignment [ 351.184928] # memcpy_test: ok: memcpy() complete overwrite [ 351.185761] # memcpy_test: ok: memcpy() middle overwrite [ 351.186577] # memcpy_test: ok: memcpy() argument side-effects [ 351.187648] ok 2 memcpy_test [ 351.276676] lkp: kernel tainted state: 262176 [ 351.435220] # memcpy_large_test.speed: slow [ 351.435240] ok 3 memcpy_large_test [ 351.436145] # memmove_test: ok: memmove() static initializers [ 351.437741] # memmove_test: ok: memmove() direct assignment [ 351.438615] # memmove_test: ok: memmove() complete overwrite [ 351.439496] # memmove_test: ok: memmove() middle overwrite [ 351.440356] # memmove_test: ok: memmove() argument side-effects [ 351.441253] # memmove_test: ok: memmove() overlapping write [ 351.442372] # memmove_test.speed: slow [ 351.442388] ok 4 memmove_test [ 351.689675] # memmove_large_test.speed: slow [ 351.690363] ok 5 memmove_large_test [ 351.979260] LKP: stdout: 3792: Kernel tests: Boot OK! [ 352.343034] # memmove_overlap_test.speed: slow [ 352.343052] ok 6 memmove_overlap_test [ 352.343883] # memcpy: pass:6 fail:0 skip:0 total:6 [ 352.344629] # Totals: pass:6 fail:0 skip:0 total:6 [ 352.345444] ok 1 memcpy [ 352.406695] KTAP version 1 [ 352.407380] 1..1 [ 352.408227] KTAP version 1 [ 352.408919] # Subtest: dev-addr-list-test [ 352.409685] # module: dev_addr_lists_test [ 352.409701] 1..6 [ 352.438951] ok 1 dev_addr_test_basic [ 352.462774] ok 2 dev_addr_test_sync_one [ 352.487788] ok 3 dev_addr_test_add_del [ 352.509850] ok 4 dev_addr_test_del_main [ 352.532017] ok 5 dev_addr_test_add_set [ 352.555779] ok 6 dev_addr_test_add_excl [ 352.556576] # dev-addr-list-test: pass:6 fail:0 skip:0 total:6 [ 352.557371] # Totals: pass:6 fail:0 skip:0 total:6 [ 352.558305] ok 1 dev-addr-list-test [ 352.638223] KTAP version 1 [ 352.638983] 1..1 [ 352.639771] KTAP version 1 [ 352.640459] # Subtest: resource [ 352.641190] # module: resource_kunit [ 352.641210] 1..2 [ 352.642813] ok 1 resource_test_union [ 352.643092] ok 2 resource_test_intersection [ 352.643851] # resource: pass:2 fail:0 skip:0 total:2 [ 352.644652] # Totals: pass:2 fail:0 skip:0 total:2 [ 352.645492] ok 1 resource [ 352.729938] KTAP version 1 [ 352.730605] 1..1 [ 352.731407] KTAP version 1 [ 352.732083] # Subtest: rtc_lib_test_cases [ 352.732838] # module: lib_test [ 352.732855] 1..2 [ 352.740500] ok 1 rtc_time64_to_tm_test_date_range_1000 [ 353.814098] # rtc_time64_to_tm_test_date_range_160000.speed: slow [ 353.814983] ok 2 rtc_time64_to_tm_test_date_range_160000 [ 353.815960] # rtc_lib_test_cases: pass:2 fail:0 skip:0 total:2 [ 353.816845] # Totals: pass:2 fail:0 skip:0 total:2 [ 353.817739] ok 1 rtc_lib_test_cases [ 353.897276] KTAP version 1 [ 353.897942] 1..1 [ 353.898761] KTAP version 1 [ 353.899452] # Subtest: sysctl_test [ 353.900161] # module: sysctl_test [ 353.900179] 1..11 [ 353.901770] ok 1 sysctl_test_api_dointvec_null_tbl_data [ 353.902090] ok 2 sysctl_test_api_dointvec_table_maxlen_unset [ 353.903169] ok 3 sysctl_test_api_dointvec_table_len_is_zero [ 353.904402] ok 4 sysctl_test_api_dointvec_table_read_but_position_set [ 353.905580] ok 5 sysctl_test_dointvec_read_happy_single_positive [ 353.906875] ok 6 sysctl_test_dointvec_read_happy_single_negative [ 353.908085] ok 7 sysctl_test_dointvec_write_happy_single_positive [ 353.909377] ok 8 sysctl_test_dointvec_write_happy_single_negative [ 353.910663] ok 9 sysctl_test_api_dointvec_write_single_less_int_min [ 353.911907] ok 10 sysctl_test_api_dointvec_write_single_greater_int_max [ 353.913044] sysctl table check failed: foo/foo range value too large for proc_dou8vec_minmax [ 353.915224] sysctl table check failed: foo/bar range value too large for proc_dou8vec_minmax [ 353.916495] ok 11 sysctl_test_register_sysctl_sz_invalid_extra_value [ 353.916512] # sysctl_test: pass:11 fail:0 skip:0 total:11 [ 353.917536] # Totals: pass:11 fail:0 skip:0 total:11 [ 353.918450] ok 1 sysctl_test [ 353.989604] KTAP version 1 [ 353.990610] 1..1 [ 353.991436] KTAP version 1 [ 353.992173] # Subtest: time_test_cases [ 353.992951] # module: time_test [ 353.992969] 1..1 [ 355.061030] # time64_to_tm_test_date_range.speed: slow [ 355.061051] ok 1 time64_to_tm_test_date_range [ 355.061964] ok 1 time_test_cases [ 355.122953] KTAP version 1 [ 355.123655] 1..1 [ 355.124708] KTAP version 1 [ 355.125480] # Subtest: list_sort [ 355.126246] # module: test_list_sort [ 355.126274] 1..1 [ 355.135913] ok 1 list_sort_test [ 355.135931] ok 1 list_sort [ 355.196953] KTAP version 1 [ 355.197629] 1..1 [ 355.199349] KTAP version 1 [ 355.200042] # Subtest: lib_sort [ 355.200739] # module: test_sort [ 355.200771] 1..1 [ 355.202605] ok 1 test_sort [ 355.202621] ok 1 lib_sort [ 355.265368] KTAP version 1 [ 355.266005] 1..1 [ 355.267184] KTAP version 1 [ 355.267863] # Subtest: kasan [ 355.268542] # module: kasan_test [ 355.268559] 1..71 [ 355.270702] ================================================================== [ 355.271732] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x637/0x6d0 [kasan_test] [ 355.272822] Write of size 1 at addr ffff888285e16773 by task kunit_try_catch/4520 [ 355.274398] CPU: 5 UID: 0 PID: 4520 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 355.276084] Tainted: [B]=BAD_PAGE, [N]=TEST [ 355.276869] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 355.278109] Call Trace: [ 355.278760] [ 355.279375] dump_stack_lvl+0x53/0x70 [ 355.280121] print_address_description.constprop.0+0x2c/0x3a0 [ 355.281044] ? kmalloc_oob_right+0x637/0x6d0 [kasan_test] [ 355.281948] print_report+0xb9/0x2b0 [ 355.282699] ? kasan_addr_to_slab+0xd/0xb0 [ 355.283495] ? kmalloc_oob_right+0x637/0x6d0 [kasan_test] [ 355.284406] kasan_report+0xe8/0x120 [ 355.285167] ? kmalloc_oob_right+0x637/0x6d0 [kasan_test] [ 355.286086] kmalloc_oob_right+0x637/0x6d0 [kasan_test] [ 355.286988] ? __pfx_kmalloc_oob_right+0x10/0x10 [kasan_test] [ 355.287938] ? __schedule+0x7ec/0x1950 [ 355.288718] ? ktime_get_ts64+0x7f/0x230 [ 355.289515] kunit_try_run_case+0x1b0/0x490 [ 355.290338] ? __pfx_kunit_try_run_case+0x10/0x10 [ 355.291206] ? set_cpus_allowed_ptr+0x85/0xc0 [ 355.292047] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 355.292934] ? __pfx_kunit_try_run_case+0x10/0x10 [ 355.293807] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 355.294798] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 355.295738] kthread+0x2d8/0x3c0 [ 355.296505] ? __pfx_kthread+0x10/0x10 [ 355.297315] ret_from_fork+0x31/0x70 [ 355.298113] ? __pfx_kthread+0x10/0x10 [ 355.298927] ret_from_fork_asm+0x1a/0x30 [ 355.299758] [ 355.301074] Allocated by task 4520: [ 355.301869] kasan_save_stack+0x33/0x60 [ 355.302695] kasan_save_track+0x14/0x30 [ 355.303521] __kasan_kmalloc+0xaa/0xb0 [ 355.304341] kmalloc_oob_right+0x9e/0x6d0 [kasan_test] [ 355.305286] kunit_try_run_case+0x1b0/0x490 [ 355.306149] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 355.307107] kthread+0x2d8/0x3c0 [ 355.307879] ret_from_fork+0x31/0x70 [ 355.308670] ret_from_fork_asm+0x1a/0x30 [ 355.310072] The buggy address belongs to the object at ffff888285e16700 which belongs to the cache kmalloc-128 of size 128 [ 355.312016] The buggy address is located 0 bytes to the right of allocated 115-byte region [ffff888285e16700, ffff888285e16773) [ 355.314556] The buggy address belongs to the physical page: [ 355.315480] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x285e16 [ 355.316611] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 355.317717] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 355.318773] page_type: 0xfdffffff(slab) [ 355.319577] raw: 0017ffffc0000040 ffff88810004ca00 dead000000000122 0000000000000000 [ 355.320709] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 355.321841] head: 0017ffffc0000040 ffff88810004ca00 dead000000000122 0000000000000000 [ 355.322981] head: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 355.324121] head: 0017ffffc0000001 ffffea000a178581 ffffffffffffffff 0000000000000000 [ 355.325258] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 355.326393] page dumped because: kasan: bad access detected [ 355.327974] Memory state around the buggy address: [ 355.328871] ffff888285e16600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 355.329977] ffff888285e16680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 355.331077] >ffff888285e16700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 355.332182] ^ [ 355.333266] ffff888285e16780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 355.334383] ffff888285e16800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 355.335491] ================================================================== [ 355.336615] ================================================================== [ 355.337728] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x620/0x6d0 [kasan_test] [ 355.338929] Write of size 1 at addr ffff888285e16778 by task kunit_try_catch/4520 [ 355.340750] CPU: 5 UID: 0 PID: 4520 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 355.342716] Tainted: [B]=BAD_PAGE, [N]=TEST [ 355.343642] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 355.345038] Call Trace: [ 355.345852] [ 355.346630] dump_stack_lvl+0x53/0x70 [ 355.347537] print_address_description.constprop.0+0x2c/0x3a0 [ 355.348618] ? kmalloc_oob_right+0x620/0x6d0 [kasan_test] [ 355.349676] print_report+0xb9/0x2b0 [ 355.350582] ? kasan_addr_to_slab+0xd/0xb0 [ 355.351535] ? kmalloc_oob_right+0x620/0x6d0 [kasan_test] [ 355.352603] kasan_report+0xe8/0x120 [ 355.353510] ? kmalloc_oob_right+0x620/0x6d0 [kasan_test] [ 355.354573] kmalloc_oob_right+0x620/0x6d0 [kasan_test] [ 355.355619] ? __pfx_kmalloc_oob_right+0x10/0x10 [kasan_test] [ 355.356707] ? __schedule+0x7ec/0x1950 [ 355.357620] ? ktime_get_ts64+0x7f/0x230 [ 355.358543] kunit_try_run_case+0x1b0/0x490 [ 355.359479] ? __pfx_kunit_try_run_case+0x10/0x10 [ 355.360451] ? set_cpus_allowed_ptr+0x85/0xc0 [ 355.361386] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 355.362358] ? __pfx_kunit_try_run_case+0x10/0x10 [ 355.363307] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 355.364372] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 355.365379] kthread+0x2d8/0x3c0 [ 355.366208] ? __pfx_kthread+0x10/0x10 [ 355.367077] ret_from_fork+0x31/0x70 [ 355.367930] ? __pfx_kthread+0x10/0x10 [ 355.368788] ret_from_fork_asm+0x1a/0x30 [ 355.369657] [ 355.371030] Allocated by task 4520: [ 355.371850] kasan_save_stack+0x33/0x60 [ 355.372695] kasan_save_track+0x14/0x30 [ 355.373524] __kasan_kmalloc+0xaa/0xb0 [ 355.374338] kmalloc_oob_right+0x9e/0x6d0 [kasan_test] [ 355.375280] kunit_try_run_case+0x1b0/0x490 [ 355.376132] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 355.377093] kthread+0x2d8/0x3c0 [ 355.377868] ret_from_fork+0x31/0x70 [ 355.378659] ret_from_fork_asm+0x1a/0x30 [ 355.380062] The buggy address belongs to the object at ffff888285e16700 which belongs to the cache kmalloc-128 of size 128 [ 355.382008] The buggy address is located 5 bytes to the right of allocated 115-byte region [ffff888285e16700, ffff888285e16773) [ 355.384551] The buggy address belongs to the physical page: [ 355.385473] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x285e16 [ 355.386604] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 355.387710] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 355.388765] page_type: 0xfdffffff(slab) [ 355.389568] raw: 0017ffffc0000040 ffff88810004ca00 dead000000000122 0000000000000000 [ 355.390700] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 355.391832] head: 0017ffffc0000040 ffff88810004ca00 dead000000000122 0000000000000000 [ 355.392973] head: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 355.394112] head: 0017ffffc0000001 ffffea000a178581 ffffffffffffffff 0000000000000000 [ 355.395249] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 355.396384] page dumped because: kasan: bad access detected [ 355.397964] Memory state around the buggy address: [ 355.398862] ffff888285e16600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 355.399967] ffff888285e16680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 355.401066] >ffff888285e16700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 355.402171] ^ [ 355.403276] ffff888285e16780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 355.404392] ffff888285e16800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 355.405501] ================================================================== [ 355.406622] ================================================================== [ 355.407734] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x609/0x6d0 [kasan_test] [ 355.408935] Read of size 1 at addr ffff888285e16780 by task kunit_try_catch/4520 [ 355.410747] CPU: 5 UID: 0 PID: 4520 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 355.412711] Tainted: [B]=BAD_PAGE, [N]=TEST [ 355.413636] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 355.415031] Call Trace: [ 355.415844] [ 355.416622] dump_stack_lvl+0x53/0x70 [ 355.417528] print_address_description.constprop.0+0x2c/0x3a0 [ 355.418609] ? kmalloc_oob_right+0x609/0x6d0 [kasan_test] [ 355.419667] print_report+0xb9/0x2b0 [ 355.420573] ? kasan_addr_to_slab+0xd/0xb0 [ 355.421527] ? kmalloc_oob_right+0x609/0x6d0 [kasan_test] [ 355.422596] kasan_report+0xe8/0x120 [ 355.423505] ? kmalloc_oob_right+0x609/0x6d0 [kasan_test] [ 355.424569] kmalloc_oob_right+0x609/0x6d0 [kasan_test] [ 355.425617] ? __pfx_kmalloc_oob_right+0x10/0x10 [kasan_test] [ 355.426707] ? __schedule+0x7ec/0x1950 [ 355.427622] ? ktime_get_ts64+0x7f/0x230 [ 355.428547] kunit_try_run_case+0x1b0/0x490 [ 355.429484] ? __pfx_kunit_try_run_case+0x10/0x10 [ 355.430457] ? set_cpus_allowed_ptr+0x85/0xc0 [ 355.431393] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 355.432368] ? __pfx_kunit_try_run_case+0x10/0x10 [ 355.433320] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 355.434385] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 355.435394] kthread+0x2d8/0x3c0 [ 355.436223] ? __pfx_kthread+0x10/0x10 [ 355.437094] ret_from_fork+0x31/0x70 [ 355.437949] ? __pfx_kthread+0x10/0x10 [ 355.438808] ret_from_fork_asm+0x1a/0x30 [ 355.439679] [ 355.441055] Allocated by task 4520: [ 355.441877] kasan_save_stack+0x33/0x60 [ 355.442723] kasan_save_track+0x14/0x30 [ 355.443554] __kasan_kmalloc+0xaa/0xb0 [ 355.444369] kmalloc_oob_right+0x9e/0x6d0 [kasan_test] [ 355.445313] kunit_try_run_case+0x1b0/0x490 [ 355.446166] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 355.447128] kthread+0x2d8/0x3c0 [ 355.447904] ret_from_fork+0x31/0x70 [ 355.448697] ret_from_fork_asm+0x1a/0x30 [ 355.450105] The buggy address belongs to the object at ffff888285e16700 which belongs to the cache kmalloc-128 of size 128 [ 355.452054] The buggy address is located 13 bytes to the right of allocated 115-byte region [ffff888285e16700, ffff888285e16773) [ 355.454609] The buggy address belongs to the physical page: [ 355.455534] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x285e16 [ 355.456665] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 355.457773] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 355.458829] page_type: 0xfdffffff(slab) [ 355.459634] raw: 0017ffffc0000040 ffff88810004ca00 dead000000000122 0000000000000000 [ 355.460766] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 355.461899] head: 0017ffffc0000040 ffff88810004ca00 dead000000000122 0000000000000000 [ 355.463038] head: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 355.464178] head: 0017ffffc0000001 ffffea000a178581 ffffffffffffffff 0000000000000000 [ 355.465316] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 355.466450] page dumped because: kasan: bad access detected [ 355.468031] Memory state around the buggy address: [ 355.468929] ffff888285e16680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 355.470035] ffff888285e16700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 355.471145] >ffff888285e16780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 355.472259] ^ [ 355.473050] ffff888285e16800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 355.474176] ffff888285e16880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 355.475294] ================================================================== [ 355.476632] ok 1 kmalloc_oob_right [ 355.476773] ================================================================== [ 355.478845] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x315/0x360 [kasan_test] [ 355.480072] Read of size 1 at addr ffff88824822015f by task kunit_try_catch/4523 [ 355.481950] CPU: 2 UID: 0 PID: 4523 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 355.483975] Tainted: [B]=BAD_PAGE, [N]=TEST [ 355.484935] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 355.486361] Call Trace: [ 355.487201] [ 355.488006] dump_stack_lvl+0x53/0x70 [ 355.488941] print_address_description.constprop.0+0x2c/0x3a0 [ 355.490048] ? kmalloc_oob_left+0x315/0x360 [kasan_test] [ 355.491129] print_report+0xb9/0x2b0 [ 355.492067] ? kasan_addr_to_slab+0xd/0xb0 [ 355.493049] ? kmalloc_oob_left+0x315/0x360 [kasan_test] [ 355.494131] kasan_report+0xe8/0x120 [ 355.495062] ? kmalloc_oob_left+0x315/0x360 [kasan_test] [ 355.496141] kmalloc_oob_left+0x315/0x360 [kasan_test] [ 355.497202] ? __pfx_kmalloc_oob_left+0x10/0x10 [kasan_test] [ 355.498303] ? __schedule+0x7ec/0x1950 [ 355.499240] ? ktime_get_ts64+0x7f/0x230 [ 355.500183] kunit_try_run_case+0x1b0/0x490 [ 355.501139] ? __pfx_kunit_try_run_case+0x10/0x10 [ 355.502130] ? set_cpus_allowed_ptr+0x85/0xc0 [ 355.503088] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 355.504081] ? __pfx_kunit_try_run_case+0x10/0x10 [ 355.505056] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 355.506144] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 355.507177] kthread+0x2d8/0x3c0 [ 355.508033] ? __pfx_kthread+0x10/0x10 [ 355.508929] ret_from_fork+0x31/0x70 [ 355.509802] ? __pfx_kthread+0x10/0x10 [ 355.510684] ret_from_fork_asm+0x1a/0x30 [ 355.511580] [ 355.512996] The buggy address belongs to the object at ffff888248220140 which belongs to the cache kmalloc-16 of size 16 [ 355.515101] The buggy address is located 15 bytes to the right of allocated 16-byte region [ffff888248220140, ffff888248220150) [ 355.517930] The buggy address belongs to the physical page: [ 355.518939] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x248220 [ 355.520152] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 355.521242] page_type: 0xfdffffff(slab) [ 355.522107] raw: 0017ffffc0000000 ffff88810004c640 dead000000000122 0000000000000000 [ 355.523294] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 [ 355.524470] page dumped because: kasan: bad access detected [ 355.526111] Memory state around the buggy address: [ 355.527023] ffff888248220000: fc fc fc fc fc fc fc fc fc fc fc fc fa fb fc fc [ 355.528134] ffff888248220080: 00 03 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 355.529245] >ffff888248220100: fc fc fc fc fa fb fc fc fc fc fc fc 00 07 fc fc [ 355.530357] ^ [ 355.531380] ffff888248220180: fc fc fc fc fc fc fc fc fc fc fc fc fa fb fc fc [ 355.532503] ffff888248220200: 00 00 fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 355.533620] ================================================================== [ 355.534874] ok 2 kmalloc_oob_left [ 355.535052] ================================================================== [ 355.537044] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x31d/0x360 [kasan_test] [ 355.538305] Read of size 1 at addr ffff8881ece1f000 by task kunit_try_catch/4525 [ 355.540152] CPU: 3 UID: 0 PID: 4525 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 355.542132] Tainted: [B]=BAD_PAGE, [N]=TEST [ 355.543064] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 355.544461] Call Trace: [ 355.545274] [ 355.546053] dump_stack_lvl+0x53/0x70 [ 355.546963] print_address_description.constprop.0+0x2c/0x3a0 [ 355.548045] ? kmalloc_node_oob_right+0x31d/0x360 [kasan_test] [ 355.549139] print_report+0xb9/0x2b0 [ 355.550041] ? kasan_addr_to_slab+0xd/0xb0 [ 355.550988] ? kmalloc_node_oob_right+0x31d/0x360 [kasan_test] [ 355.552088] kasan_report+0xe8/0x120 [ 355.553000] ? kmalloc_node_oob_right+0x31d/0x360 [kasan_test] [ 355.554109] kmalloc_node_oob_right+0x31d/0x360 [kasan_test] [ 355.555208] ? __pfx_kmalloc_node_oob_right+0x10/0x10 [kasan_test] [ 355.556359] ? __schedule+0x7ec/0x1950 [ 355.557300] ? ktime_get_ts64+0x7f/0x230 [ 355.558251] kunit_try_run_case+0x1b0/0x490 [ 355.559220] ? __pfx_kunit_try_run_case+0x10/0x10 [ 355.560227] ? set_cpus_allowed_ptr+0x85/0xc0 [ 355.561200] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 355.562214] ? __pfx_kunit_try_run_case+0x10/0x10 [ 355.563205] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 355.564304] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 355.565346] kthread+0x2d8/0x3c0 [ 355.566202] ? __pfx_kthread+0x10/0x10 [ 355.567099] ret_from_fork+0x31/0x70 [ 355.567971] ? __pfx_kthread+0x10/0x10 [ 355.568855] ret_from_fork_asm+0x1a/0x30 [ 355.569752] [ 355.571177] Allocated by task 4525: [ 355.572026] kasan_save_stack+0x33/0x60 [ 355.572895] kasan_save_track+0x14/0x30 [ 355.573750] __kasan_kmalloc+0xaa/0xb0 [ 355.574600] kmalloc_node_oob_right+0x9f/0x360 [kasan_test] [ 355.575602] kunit_try_run_case+0x1b0/0x490 [ 355.576478] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 355.577450] kthread+0x2d8/0x3c0 [ 355.578234] ret_from_fork+0x31/0x70 [ 355.579035] ret_from_fork_asm+0x1a/0x30 [ 355.580460] The buggy address belongs to the object at ffff8881ece1e000 which belongs to the cache kmalloc-4k of size 4096 [ 355.582424] The buggy address is located 0 bytes to the right of allocated 4096-byte region [ffff8881ece1e000, ffff8881ece1f000) [ 355.585002] The buggy address belongs to the physical page: [ 355.585935] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1ece18 [ 355.587077] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 355.588193] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 355.589258] page_type: 0xfdffffff(slab) [ 355.590071] raw: 0017ffffc0000040 ffff88810004d040 dead000000000122 0000000000000000 [ 355.591212] raw: 0000000000000000 0000000080040004 00000001fdffffff 0000000000000000 [ 355.592351] head: 0017ffffc0000040 ffff88810004d040 dead000000000122 0000000000000000 [ 355.593498] head: 0000000000000000 0000000080040004 00000001fdffffff 0000000000000000 [ 355.594642] head: 0017ffffc0000003 ffffea0007b38601 ffffffffffffffff 0000000000000000 [ 355.595784] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 [ 355.596922] page dumped because: kasan: bad access detected [ 355.598506] Memory state around the buggy address: [ 355.599405] ffff8881ece1ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 355.600513] ffff8881ece1ef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 355.601614] >ffff8881ece1f000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 355.602720] ^ [ 355.603504] ffff8881ece1f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 355.604622] ffff8881ece1f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 355.605732] ================================================================== [ 355.606980] ok 3 kmalloc_node_oob_right [ 355.607121] ================================================================== [ 355.609207] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2df/0x330 [kasan_test] [ 355.610461] Write of size 1 at addr ffff8881c5fb9f00 by task kunit_try_catch/4530 [ 355.612333] CPU: 3 UID: 0 PID: 4530 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 355.614348] Tainted: [B]=BAD_PAGE, [N]=TEST [ 355.615301] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 355.616722] Call Trace: [ 355.617556] [ 355.618355] dump_stack_lvl+0x53/0x70 [ 355.619283] print_address_description.constprop.0+0x2c/0x3a0 [ 355.620384] ? kmalloc_big_oob_right+0x2df/0x330 [kasan_test] [ 355.621496] print_report+0xb9/0x2b0 [ 355.622427] ? kasan_addr_to_slab+0xd/0xb0 [ 355.623403] ? kmalloc_big_oob_right+0x2df/0x330 [kasan_test] [ 355.624518] kasan_report+0xe8/0x120 [ 355.625447] ? kmalloc_big_oob_right+0x2df/0x330 [kasan_test] [ 355.626561] kmalloc_big_oob_right+0x2df/0x330 [kasan_test] [ 355.627658] ? __pfx_kmalloc_big_oob_right+0x10/0x10 [kasan_test] [ 355.628795] ? __schedule+0x7ec/0x1950 [ 355.629731] ? ktime_get_ts64+0x7f/0x230 [ 355.630674] kunit_try_run_case+0x1b0/0x490 [ 355.631630] ? __pfx_kunit_try_run_case+0x10/0x10 [ 355.632623] ? set_cpus_allowed_ptr+0x85/0xc0 [ 355.633581] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 355.634575] ? __pfx_kunit_try_run_case+0x10/0x10 [ 355.635552] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 355.636642] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 355.637677] kthread+0x2d8/0x3c0 [ 355.638533] ? __pfx_kthread+0x10/0x10 [ 355.639431] ret_from_fork+0x31/0x70 [ 355.640305] ? __pfx_kthread+0x10/0x10 [ 355.641190] ret_from_fork_asm+0x1a/0x30 [ 355.642088] [ 355.643517] Allocated by task 4530: [ 355.644360] kasan_save_stack+0x33/0x60 [ 355.645224] kasan_save_track+0x14/0x30 [ 355.646074] __kasan_kmalloc+0xaa/0xb0 [ 355.646923] kmalloc_big_oob_right+0x9b/0x330 [kasan_test] [ 355.647918] kunit_try_run_case+0x1b0/0x490 [ 355.648794] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 355.649763] kthread+0x2d8/0x3c0 [ 355.650546] ret_from_fork+0x31/0x70 [ 355.651347] ret_from_fork_asm+0x1a/0x30 [ 355.652769] The buggy address belongs to the object at ffff8881c5fb8000 which belongs to the cache kmalloc-8k of size 8192 [ 355.654732] The buggy address is located 0 bytes to the right of allocated 7936-byte region [ffff8881c5fb8000, ffff8881c5fb9f00) [ 355.657306] The buggy address belongs to the physical page: [ 355.658238] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1c5fb8 [ 355.659378] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 355.660493] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 355.661557] page_type: 0xfdffffff(slab) [ 355.662368] raw: 0017ffffc0000040 ffff88810004d180 dead000000000122 0000000000000000 [ 355.663507] raw: 0000000000000000 0000000080020002 00000001fdffffff 0000000000000000 [ 355.664644] head: 0017ffffc0000040 ffff88810004d180 dead000000000122 0000000000000000 [ 355.665790] head: 0000000000000000 0000000080020002 00000001fdffffff 0000000000000000 [ 355.666933] head: 0017ffffc0000003 ffffea000717ee01 ffffffffffffffff 0000000000000000 [ 355.668073] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 [ 355.669211] page dumped because: kasan: bad access detected [ 355.670796] Memory state around the buggy address: [ 355.671694] ffff8881c5fb9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 355.672801] ffff8881c5fb9e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 355.673902] >ffff8881c5fb9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 355.675008] ^ [ 355.675793] ffff8881c5fb9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 355.676910] ffff8881c5fba000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 355.678020] ================================================================== [ 355.679264] ok 4 kmalloc_big_oob_right [ 355.679407] ================================================================== [ 355.681464] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2b2/0x2f0 [kasan_test] [ 355.682732] Write of size 1 at addr ffff8881f1f5a00a by task kunit_try_catch/4532 [ 355.684606] CPU: 3 UID: 0 PID: 4532 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 355.686621] Tainted: [B]=BAD_PAGE, [N]=TEST [ 355.687575] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 355.688995] Call Trace: [ 355.689830] [ 355.690629] dump_stack_lvl+0x53/0x70 [ 355.691556] print_address_description.constprop.0+0x2c/0x3a0 [ 355.692656] ? kmalloc_large_oob_right+0x2b2/0x2f0 [kasan_test] [ 355.693782] print_report+0xb9/0x2b0 [ 355.694714] ? kasan_addr_to_slab+0xd/0xb0 [ 355.695691] ? kmalloc_large_oob_right+0x2b2/0x2f0 [kasan_test] [ 355.696819] kasan_report+0xe8/0x120 [ 355.697748] ? kmalloc_large_oob_right+0x2b2/0x2f0 [kasan_test] [ 355.698876] kmalloc_large_oob_right+0x2b2/0x2f0 [kasan_test] [ 355.699989] ? __pfx_kmalloc_large_oob_right+0x10/0x10 [kasan_test] [ 355.701143] ? __schedule+0x7ec/0x1950 [ 355.702083] ? ktime_get_ts64+0x7f/0x230 [ 355.703027] kunit_try_run_case+0x1b0/0x490 [ 355.703984] ? __pfx_kunit_try_run_case+0x10/0x10 [ 355.704978] ? set_cpus_allowed_ptr+0x85/0xc0 [ 355.705938] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 355.706934] ? __pfx_kunit_try_run_case+0x10/0x10 [ 355.707913] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 355.709003] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 355.710039] kthread+0x2d8/0x3c0 [ 355.710897] ? __pfx_kthread+0x10/0x10 [ 355.711796] ret_from_fork+0x31/0x70 [ 355.712672] ? __pfx_kthread+0x10/0x10 [ 355.713558] ret_from_fork_asm+0x1a/0x30 [ 355.714457] [ 355.715890] The buggy address belongs to the physical page: [ 355.716913] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1f1f58 [ 355.718137] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 355.719332] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 355.720485] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 355.721703] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 355.722912] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 355.724122] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 355.725319] head: 0017ffffc0000002 ffffea0007c7d601 ffffffffffffffff 0000000000000000 [ 355.726508] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 355.727689] page dumped because: kasan: bad access detected [ 355.729319] Memory state around the buggy address: [ 355.730230] ffff8881f1f59f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 355.731338] ffff8881f1f59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 355.732429] >ffff8881f1f5a000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 355.733528] ^ [ 355.734329] ffff8881f1f5a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 355.735445] ffff8881f1f5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 355.736551] ================================================================== [ 355.737793] ok 5 kmalloc_large_oob_right [ 355.738042] ================================================================== [ 355.740105] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2e9/0x340 [kasan_test] [ 355.741287] Read of size 1 at addr ffff8882d7098000 by task kunit_try_catch/4534 [ 355.743194] CPU: 0 UID: 0 PID: 4534 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 355.745129] Tainted: [B]=BAD_PAGE, [N]=TEST [ 355.746074] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 355.747448] Call Trace: [ 355.748237] [ 355.748993] dump_stack_lvl+0x53/0x70 [ 355.749879] print_address_description.constprop.0+0x2c/0x3a0 [ 355.750940] ? kmalloc_large_uaf+0x2e9/0x340 [kasan_test] [ 355.751978] print_report+0xb9/0x2b0 [ 355.752858] ? kasan_addr_to_slab+0xd/0xb0 [ 355.753780] ? kmalloc_large_uaf+0x2e9/0x340 [kasan_test] [ 355.754817] kasan_report+0xe8/0x120 [ 355.755700] ? kmalloc_large_uaf+0x2e9/0x340 [kasan_test] [ 355.756745] kmalloc_large_uaf+0x2e9/0x340 [kasan_test] [ 355.757778] ? __pfx_kmalloc_large_uaf+0x10/0x10 [kasan_test] [ 355.758859] ? __schedule+0x7ec/0x1950 [ 355.759775] ? ktime_get_ts64+0x7f/0x230 [ 355.760701] kunit_try_run_case+0x1b0/0x490 [ 355.761641] ? __pfx_kunit_try_run_case+0x10/0x10 [ 355.762616] ? set_cpus_allowed_ptr+0x85/0xc0 [ 355.763555] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 355.764530] ? __pfx_kunit_try_run_case+0x10/0x10 [ 355.765491] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 355.766568] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 355.767593] kthread+0x2d8/0x3c0 [ 355.768440] ? __pfx_kthread+0x10/0x10 [ 355.769329] ret_from_fork+0x31/0x70 [ 355.770194] ? __pfx_kthread+0x10/0x10 [ 355.771069] ret_from_fork_asm+0x1a/0x30 [ 355.771957] [ 355.773367] The buggy address belongs to the physical page: [ 355.774379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x201a pfn:0x2d7098 [ 355.775616] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 355.776710] raw: 0017ffffc0000000 ffffea000b5c2708 ffff889fc324b600 0000000000000000 [ 355.777915] raw: 000000000000201a 0000000000000000 00000000ffffffff 0000000000000000 [ 355.779115] page dumped because: kasan: bad access detected [ 355.780817] Memory state around the buggy address: [ 355.781764] ffff8882d7097f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 355.782911] ffff8882d7097f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 355.784046] >ffff8882d7098000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 355.785171] ^ [ 355.785960] ffff8882d7098080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 355.787084] ffff8882d7098100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 355.788190] ================================================================== [ 355.789540] ok 6 kmalloc_large_uaf [ 355.789674] kmemleak: Found object by alias at 0xffff8881f1f58001 [ 355.791576] CPU: 3 UID: 0 PID: 4536 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 355.793473] Tainted: [B]=BAD_PAGE, [N]=TEST [ 355.794360] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 355.795712] Call Trace: [ 355.796478] [ 355.797210] dump_stack_lvl+0x53/0x70 [ 355.798069] __lookup_object+0x80/0x90 [ 355.798931] delete_object_full+0x2b/0x70 [ 355.799810] free_large_kmalloc+0x30/0xe0 [ 355.800686] kmalloc_large_invalid_free+0x114/0x2b0 [kasan_test] [ 355.801738] ? __pfx_kmalloc_large_invalid_free+0x10/0x10 [kasan_test] [ 355.802837] ? __schedule+0x7ec/0x1950 [ 355.803704] ? ktime_get_ts64+0x7f/0x230 [ 355.804584] kunit_try_run_case+0x1b0/0x490 [ 355.805484] ? __pfx_kunit_try_run_case+0x10/0x10 [ 355.806428] ? set_cpus_allowed_ptr+0x85/0xc0 [ 355.807342] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 355.808296] ? __pfx_kunit_try_run_case+0x10/0x10 [ 355.809234] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 355.810288] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 355.811291] kthread+0x2d8/0x3c0 [ 355.812118] ? __pfx_kthread+0x10/0x10 [ 355.812988] ret_from_fork+0x31/0x70 [ 355.813842] ? __pfx_kthread+0x10/0x10 [ 355.814714] ret_from_fork_asm+0x1a/0x30 [ 355.815598] [ 355.816326] kmemleak: Object 0xffff8881f1f58000 (size 8202): [ 355.817335] kmemleak: comm "kunit_try_catch", pid 4536, jiffies 4295021120 [ 355.818458] kmemleak: min_count = 1 [ 355.819301] kmemleak: count = 0 [ 355.820103] kmemleak: flags = 0x1 [ 355.820912] kmemleak: checksum = 0 [ 355.821722] kmemleak: backtrace: [ 355.822508] ___kmalloc_large_node+0x104/0x180 [ 355.823387] __kmalloc_large_noprof+0x21/0xb0 [ 355.824256] kmalloc_large_invalid_free+0x82/0x2b0 [kasan_test] [ 355.825256] kunit_try_run_case+0x1b0/0x490 [ 355.826100] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 355.827050] kthread+0x2d8/0x3c0 [ 355.827817] ret_from_fork+0x31/0x70 [ 355.828603] ret_from_fork_asm+0x1a/0x30 [ 355.829419] ================================================================== [ 355.830549] BUG: KASAN: invalid-free in kmalloc_large_invalid_free+0x114/0x2b0 [kasan_test] [ 355.831727] Free of addr ffff8881f1f58001 by task kunit_try_catch/4536 [ 355.833337] CPU: 3 UID: 0 PID: 4536 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 355.835211] Tainted: [B]=BAD_PAGE, [N]=TEST [ 355.836050] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 355.837356] Call Trace: [ 355.838122] [ 355.838858] dump_stack_lvl+0x53/0x70 [ 355.839684] print_address_description.constprop.0+0x2c/0x3a0 [ 355.840671] ? kmalloc_large_invalid_free+0x114/0x2b0 [kasan_test] [ 355.841700] print_report+0xb9/0x2b0 [ 355.842571] ? kmalloc_large_invalid_free+0x114/0x2b0 [kasan_test] [ 355.843619] ? kasan_addr_to_slab+0xd/0xb0 [ 355.844483] ? kmalloc_large_invalid_free+0x114/0x2b0 [kasan_test] [ 355.845526] kasan_report_invalid_free+0xbe/0xe0 [ 355.846500] ? kmalloc_large_invalid_free+0x114/0x2b0 [kasan_test] [ 355.847562] free_large_kmalloc+0x42/0xe0 [ 355.848431] kmalloc_large_invalid_free+0x114/0x2b0 [kasan_test] [ 355.849470] ? __pfx_kmalloc_large_invalid_free+0x10/0x10 [kasan_test] [ 355.850618] ? __schedule+0x7ec/0x1950 [ 355.851483] ? ktime_get_ts64+0x7f/0x230 [ 355.852353] kunit_try_run_case+0x1b0/0x490 [ 355.853246] ? __pfx_kunit_try_run_case+0x10/0x10 [ 355.854240] ? set_cpus_allowed_ptr+0x85/0xc0 [ 355.855190] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 355.856140] ? __pfx_kunit_try_run_case+0x10/0x10 [ 355.857071] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 355.858163] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 355.859196] kthread+0x2d8/0x3c0 [ 355.860016] ? __pfx_kthread+0x10/0x10 [ 355.860882] ret_from_fork+0x31/0x70 [ 355.861735] ? __pfx_kthread+0x10/0x10 [ 355.862664] ret_from_fork_asm+0x1a/0x30 [ 355.863556] [ 355.864951] The buggy address belongs to the physical page: [ 355.865990] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1f1f58 [ 355.867240] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 355.868434] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 355.869584] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 355.870864] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 355.872078] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 355.873280] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 355.874540] head: 0017ffffc0000002 ffffea0007c7d601 ffffffffffffffff 0000000000000000 [ 355.875733] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 355.876901] page dumped because: kasan: bad access detected [ 355.878599] Memory state around the buggy address: [ 355.879509] ffff8881f1f57f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 355.880625] ffff8881f1f57f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 355.881736] >ffff8881f1f58000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 355.882909] ^ [ 355.883706] ffff8881f1f58080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 355.884829] ffff8881f1f58100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 355.885971] ================================================================== [ 355.887441] ok 7 kmalloc_large_invalid_free [ 355.887676] ok 8 page_alloc_oob_right # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 355.888775] ================================================================== [ 355.891179] BUG: KASAN: use-after-free in page_alloc_uaf+0x356/0x3d0 [kasan_test] [ 355.892361] Read of size 1 at addr ffff8881c3bc0000 by task kunit_try_catch/4540 [ 355.894171] CPU: 3 UID: 0 PID: 4540 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 355.896209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 355.897121] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 355.898497] Call Trace: [ 355.899355] [ 355.900160] dump_stack_lvl+0x53/0x70 [ 355.901049] print_address_description.constprop.0+0x2c/0x3a0 [ 355.902112] ? page_alloc_uaf+0x356/0x3d0 [kasan_test] [ 355.903179] print_report+0xb9/0x2b0 [ 355.904111] ? kasan_addr_to_slab+0xd/0xb0 [ 355.905038] ? page_alloc_uaf+0x356/0x3d0 [kasan_test] [ 355.906059] kasan_report+0xe8/0x120 [ 355.906981] ? page_alloc_uaf+0x356/0x3d0 [kasan_test] [ 355.908066] page_alloc_uaf+0x356/0x3d0 [kasan_test] [ 355.909081] ? __pfx_page_alloc_uaf+0x10/0x10 [kasan_test] [ 355.910147] ? __schedule+0x7ec/0x1950 [ 355.911107] ? ktime_get_ts64+0x7f/0x230 [ 355.912082] kunit_try_run_case+0x1b0/0x490 [ 355.913016] ? __pfx_kunit_try_run_case+0x10/0x10 [ 355.913985] ? set_cpus_allowed_ptr+0x85/0xc0 [ 355.914949] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 355.915989] ? __pfx_kunit_try_run_case+0x10/0x10 [ 355.916951] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 355.918032] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 355.919103] kthread+0x2d8/0x3c0 [ 355.920012] ? __pfx_kthread+0x10/0x10 [ 355.920896] ret_from_fork+0x31/0x70 [ 355.921759] ? __pfx_kthread+0x10/0x10 [ 355.922635] ret_from_fork_asm+0x1a/0x30 [ 355.923581] [ 355.925019] The buggy address belongs to the physical page: [ 355.926024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x2d98 pfn:0x1c3bc0 [ 355.927315] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 355.928435] page_type: 0xbfffffff(buddy) [ 355.929318] raw: 0017ffffc0000000 ffffea000551c008 ffff88a09ffd4f10 0000000000000000 [ 355.930518] raw: 0000000000002d98 0000000000000006 00000000bfffffff 0000000000000000 [ 355.931776] page dumped because: kasan: bad access detected [ 355.933472] Memory state around the buggy address: [ 355.934411] ffff8881c3bbff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 355.935615] ffff8881c3bbff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 355.936750] >ffff8881c3bc0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 355.937861] ^ [ 355.938647] ffff8881c3bc0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 355.939818] ffff8881c3bc0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 355.940923] ================================================================== [ 355.942352] ok 9 page_alloc_uaf [ 355.942519] ================================================================== [ 355.944503] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x772/0x820 [kasan_test] [ 355.945760] Write of size 1 at addr ffff8881777584eb by task kunit_try_catch/4542 [ 355.947655] CPU: 2 UID: 0 PID: 4542 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 355.949607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 355.950586] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 355.951976] Call Trace: [ 355.952768] [ 355.953525] dump_stack_lvl+0x53/0x70 [ 355.954414] print_address_description.constprop.0+0x2c/0x3a0 [ 355.955478] ? krealloc_more_oob_helper+0x772/0x820 [kasan_test] [ 355.956573] print_report+0xb9/0x2b0 [ 355.957463] ? kasan_addr_to_slab+0xd/0xb0 [ 355.958396] ? krealloc_more_oob_helper+0x772/0x820 [kasan_test] [ 355.959495] kasan_report+0xe8/0x120 [ 355.960390] ? krealloc_more_oob_helper+0x772/0x820 [kasan_test] [ 355.961492] krealloc_more_oob_helper+0x772/0x820 [kasan_test] [ 355.962582] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [kasan_test] [ 355.963720] ? finish_task_switch.isra.0+0x155/0x750 [ 355.964742] ? __switch_to+0x5be/0xdc0 [ 355.965667] ? __schedule+0x7ec/0x1950 [ 355.966591] ? ktime_get_ts64+0x7f/0x230 [ 355.967529] kunit_try_run_case+0x1b0/0x490 [ 355.968493] ? __pfx_kunit_try_run_case+0x10/0x10 [ 355.969498] ? set_cpus_allowed_ptr+0x85/0xc0 [ 355.970465] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 355.971467] ? __pfx_kunit_try_run_case+0x10/0x10 [ 355.972448] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 355.973539] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 355.974573] kthread+0x2d8/0x3c0 [ 355.975423] ? __pfx_kthread+0x10/0x10 [ 355.976312] ret_from_fork+0x31/0x70 [ 355.977183] ? __pfx_kthread+0x10/0x10 [ 355.978059] ret_from_fork_asm+0x1a/0x30 [ 355.978956] [ 355.980379] Allocated by task 4542: [ 355.981210] kasan_save_stack+0x33/0x60 [ 355.982076] kasan_save_track+0x14/0x30 [ 355.982930] __kasan_krealloc+0x199/0x200 [ 355.983790] krealloc_noprof+0xac/0x110 [ 355.984628] krealloc_more_oob_helper+0x19c/0x820 [kasan_test] [ 355.985629] kunit_try_run_case+0x1b0/0x490 [ 355.986480] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 355.987425] kthread+0x2d8/0x3c0 [ 355.988181] ret_from_fork+0x31/0x70 [ 355.988947] ret_from_fork_asm+0x1a/0x30 [ 355.990310] The buggy address belongs to the object at ffff888177758400 which belongs to the cache kmalloc-256 of size 256 [ 355.992227] The buggy address is located 0 bytes to the right of allocated 235-byte region [ffff888177758400, ffff8881777584eb) [ 355.994787] The buggy address belongs to the physical page: [ 355.995710] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x177758 [ 355.996843] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 355.997953] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 355.999009] page_type: 0xfdffffff(slab) [ 355.999809] raw: 0017ffffc0000040 ffff88810004cb40 dead000000000122 0000000000000000 [ 356.000935] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 356.002059] head: 0017ffffc0000040 ffff88810004cb40 dead000000000122 0000000000000000 [ 356.003190] head: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 356.004322] head: 0017ffffc0000002 ffffea0005ddd601 ffffffffffffffff 0000000000000000 [ 356.005456] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 356.006593] page dumped because: kasan: bad access detected [ 356.008173] Memory state around the buggy address: [ 356.009069] ffff888177758380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 356.010174] ffff888177758400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 356.011284] >ffff888177758480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 356.012389] ^ [ 356.013448] ffff888177758500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 356.014565] ffff888177758580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 356.015676] ================================================================== [ 356.016859] ================================================================== [ 356.017975] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x744/0x820 [kasan_test] [ 356.019231] Write of size 1 at addr ffff8881777584f0 by task kunit_try_catch/4542 [ 356.021064] CPU: 2 UID: 0 PID: 4542 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 356.023040] Tainted: [B]=BAD_PAGE, [N]=TEST [ 356.023973] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 356.025374] Call Trace: [ 356.026192] [ 356.026976] dump_stack_lvl+0x53/0x70 [ 356.027886] print_address_description.constprop.0+0x2c/0x3a0 [ 356.028970] ? krealloc_more_oob_helper+0x744/0x820 [kasan_test] [ 356.030082] print_report+0xb9/0x2b0 [ 356.030993] ? kasan_addr_to_slab+0xd/0xb0 [ 356.031950] ? krealloc_more_oob_helper+0x744/0x820 [kasan_test] [ 356.033075] kasan_report+0xe8/0x120 [ 356.033991] ? krealloc_more_oob_helper+0x744/0x820 [kasan_test] [ 356.035114] krealloc_more_oob_helper+0x744/0x820 [kasan_test] [ 356.036222] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [kasan_test] [ 356.037372] ? finish_task_switch.isra.0+0x155/0x750 [ 356.038399] ? __switch_to+0x5be/0xdc0 [ 356.039324] ? __schedule+0x7ec/0x1950 [ 356.040238] ? ktime_get_ts64+0x7f/0x230 [ 356.041158] kunit_try_run_case+0x1b0/0x490 [ 356.042091] ? __pfx_kunit_try_run_case+0x10/0x10 [ 356.043062] ? set_cpus_allowed_ptr+0x85/0xc0 [ 356.043996] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 356.044973] ? __pfx_kunit_try_run_case+0x10/0x10 [ 356.045930] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 356.047003] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 356.048021] kthread+0x2d8/0x3c0 [ 356.048861] ? __pfx_kthread+0x10/0x10 [ 356.049735] ret_from_fork+0x31/0x70 [ 356.050589] ? __pfx_kthread+0x10/0x10 [ 356.051456] ret_from_fork_asm+0x1a/0x30 [ 356.052330] [ 356.053711] Allocated by task 4542: [ 356.054528] kasan_save_stack+0x33/0x60 [ 356.055365] kasan_save_track+0x14/0x30 [ 356.056204] __kasan_krealloc+0x199/0x200 [ 356.057048] krealloc_noprof+0xac/0x110 [ 356.057883] krealloc_more_oob_helper+0x19c/0x820 [kasan_test] [ 356.058883] kunit_try_run_case+0x1b0/0x490 [ 356.059732] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 356.060675] kthread+0x2d8/0x3c0 [ 356.061428] ret_from_fork+0x31/0x70 [ 356.062193] ret_from_fork_asm+0x1a/0x30 [ 356.063551] The buggy address belongs to the object at ffff888177758400 which belongs to the cache kmalloc-256 of size 256 [ 356.065463] The buggy address is located 5 bytes to the right of allocated 235-byte region [ffff888177758400, ffff8881777584eb) [ 356.068019] The buggy address belongs to the physical page: [ 356.068939] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x177758 [ 356.070070] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 356.071178] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 356.072232] page_type: 0xfdffffff(slab) [ 356.073031] raw: 0017ffffc0000040 ffff88810004cb40 dead000000000122 0000000000000000 [ 356.074157] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 356.075279] head: 0017ffffc0000040 ffff88810004cb40 dead000000000122 0000000000000000 [ 356.076410] head: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 356.077541] head: 0017ffffc0000002 ffffea0005ddd601 ffffffffffffffff 0000000000000000 [ 356.078674] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 356.079808] page dumped because: kasan: bad access detected [ 356.081386] Memory state around the buggy address: [ 356.082281] ffff888177758380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 356.083386] ffff888177758400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 356.084496] >ffff888177758480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 356.085601] ^ [ 356.086681] ffff888177758500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 356.087796] ffff888177758580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 356.088906] ================================================================== [ 356.090350] ok 10 krealloc_more_oob [ 356.090493] ================================================================== [ 356.092519] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xc4f/0xeb0 [kasan_test] [ 356.093796] Write of size 1 at addr ffff8881ece468c9 by task kunit_try_catch/4544 [ 356.095675] CPU: 3 UID: 0 PID: 4544 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 356.097696] Tainted: [B]=BAD_PAGE, [N]=TEST [ 356.098653] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 356.100076] Call Trace: [ 356.100912] [ 356.101714] dump_stack_lvl+0x53/0x70 [ 356.102645] print_address_description.constprop.0+0x2c/0x3a0 [ 356.103748] ? krealloc_less_oob_helper+0xc4f/0xeb0 [kasan_test] [ 356.104884] print_report+0xb9/0x2b0 [ 356.105820] ? kasan_addr_to_slab+0xd/0xb0 [ 356.106801] ? krealloc_less_oob_helper+0xc4f/0xeb0 [kasan_test] [ 356.107943] kasan_report+0xe8/0x120 [ 356.108876] ? krealloc_less_oob_helper+0xc4f/0xeb0 [kasan_test] [ 356.110017] krealloc_less_oob_helper+0xc4f/0xeb0 [kasan_test] [ 356.111143] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [kasan_test] [ 356.112310] ? finish_task_switch.isra.0+0x155/0x750 [ 356.113358] ? __switch_to+0x5be/0xdc0 [ 356.114298] ? __schedule+0x7ec/0x1950 [ 356.115227] ? ktime_get_ts64+0x7f/0x230 [ 356.116161] kunit_try_run_case+0x1b0/0x490 [ 356.117110] ? __pfx_kunit_try_run_case+0x10/0x10 [ 356.118096] ? set_cpus_allowed_ptr+0x85/0xc0 [ 356.119051] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 356.120046] ? __pfx_kunit_try_run_case+0x10/0x10 [ 356.121024] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 356.122119] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 356.123160] kthread+0x2d8/0x3c0 [ 356.124015] ? __pfx_kthread+0x10/0x10 [ 356.124909] ret_from_fork+0x31/0x70 [ 356.125787] ? __pfx_kthread+0x10/0x10 [ 356.126668] ret_from_fork_asm+0x1a/0x30 [ 356.127557] [ 356.128981] Allocated by task 4544: [ 356.129812] kasan_save_stack+0x33/0x60 [ 356.130679] kasan_save_track+0x14/0x30 [ 356.131535] __kasan_krealloc+0x199/0x200 [ 356.132396] krealloc_noprof+0xac/0x110 [ 356.133236] krealloc_less_oob_helper+0x19c/0xeb0 [kasan_test] [ 356.134238] kunit_try_run_case+0x1b0/0x490 [ 356.135090] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 356.136037] kthread+0x2d8/0x3c0 [ 356.136793] ret_from_fork+0x31/0x70 [ 356.137561] ret_from_fork_asm+0x1a/0x30 [ 356.138925] The buggy address belongs to the object at ffff8881ece46800 which belongs to the cache kmalloc-256 of size 256 [ 356.140843] The buggy address is located 0 bytes to the right of allocated 201-byte region [ffff8881ece46800, ffff8881ece468c9) [ 356.143403] The buggy address belongs to the physical page: [ 356.144326] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1ece44 [ 356.145460] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 356.146568] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 356.147625] page_type: 0xfdffffff(slab) [ 356.148425] raw: 0017ffffc0000040 ffff88810004cb40 dead000000000122 0000000000000000 [ 356.149553] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 356.150677] head: 0017ffffc0000040 ffff88810004cb40 dead000000000122 0000000000000000 [ 356.151808] head: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 356.152939] head: 0017ffffc0000002 ffffea0007b39101 ffffffffffffffff 0000000000000000 [ 356.154073] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 356.155209] page dumped because: kasan: bad access detected [ 356.156789] Memory state around the buggy address: [ 356.157684] ffff8881ece46780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 356.158788] ffff8881ece46800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 356.159898] >ffff8881ece46880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 356.161005] ^ [ 356.161981] ffff8881ece46900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 356.163098] ffff8881ece46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 356.164211] ================================================================== [ 356.165379] ================================================================== [ 356.166497] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xcbc/0xeb0 [kasan_test] [ 356.167753] Write of size 1 at addr ffff8881ece468d0 by task kunit_try_catch/4544 [ 356.169589] CPU: 3 UID: 0 PID: 4544 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 356.171566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 356.172502] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 356.173904] Call Trace: [ 356.174723] [ 356.175508] dump_stack_lvl+0x53/0x70 [ 356.176420] print_address_description.constprop.0+0x2c/0x3a0 [ 356.177506] ? krealloc_less_oob_helper+0xcbc/0xeb0 [kasan_test] [ 356.178620] print_report+0xb9/0x2b0 [ 356.179533] ? kasan_addr_to_slab+0xd/0xb0 [ 356.180493] ? krealloc_less_oob_helper+0xcbc/0xeb0 [kasan_test] [ 356.181619] kasan_report+0xe8/0x120 [ 356.182537] ? krealloc_less_oob_helper+0xcbc/0xeb0 [kasan_test] [ 356.183662] krealloc_less_oob_helper+0xcbc/0xeb0 [kasan_test] [ 356.184771] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [kasan_test] [ 356.185923] ? finish_task_switch.isra.0+0x155/0x750 [ 356.186953] ? __switch_to+0x5be/0xdc0 [ 356.187879] ? __schedule+0x7ec/0x1950 [ 356.188794] ? ktime_get_ts64+0x7f/0x230 [ 356.189715] kunit_try_run_case+0x1b0/0x490 [ 356.190649] ? __pfx_kunit_try_run_case+0x10/0x10 [ 356.191622] ? set_cpus_allowed_ptr+0x85/0xc0 [ 356.192558] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 356.193536] ? __pfx_kunit_try_run_case+0x10/0x10 [ 356.194495] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 356.195569] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 356.196588] kthread+0x2d8/0x3c0 [ 356.197430] ? __pfx_kthread+0x10/0x10 [ 356.198306] ret_from_fork+0x31/0x70 [ 356.199162] ? __pfx_kthread+0x10/0x10 [ 356.200031] ret_from_fork_asm+0x1a/0x30 [ 356.200907] [ 356.202292] Allocated by task 4544: [ 356.203108] kasan_save_stack+0x33/0x60 [ 356.203946] kasan_save_track+0x14/0x30 [ 356.204784] __kasan_krealloc+0x199/0x200 [ 356.205630] krealloc_noprof+0xac/0x110 [ 356.206465] krealloc_less_oob_helper+0x19c/0xeb0 [kasan_test] [ 356.207465] kunit_try_run_case+0x1b0/0x490 [ 356.208315] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 356.209257] kthread+0x2d8/0x3c0 [ 356.210012] ret_from_fork+0x31/0x70 [ 356.210777] ret_from_fork_asm+0x1a/0x30 [ 356.212136] The buggy address belongs to the object at ffff8881ece46800 which belongs to the cache kmalloc-256 of size 256 [ 356.214050] The buggy address is located 7 bytes to the right of allocated 201-byte region [ffff8881ece46800, ffff8881ece468c9) [ 356.216605] The buggy address belongs to the physical page: [ 356.217525] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1ece44 [ 356.218658] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 356.219764] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 356.220818] page_type: 0xfdffffff(slab) [ 356.221616] raw: 0017ffffc0000040 ffff88810004cb40 dead000000000122 0000000000000000 [ 356.222742] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 356.223865] head: 0017ffffc0000040 ffff88810004cb40 dead000000000122 0000000000000000 [ 356.224995] head: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 356.226126] head: 0017ffffc0000002 ffffea0007b39101 ffffffffffffffff 0000000000000000 [ 356.227259] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 356.228394] page dumped because: kasan: bad access detected [ 356.229970] Memory state around the buggy address: [ 356.230865] ffff8881ece46780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 356.231967] ffff8881ece46800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 356.233076] >ffff8881ece46880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 356.234182] ^ [ 356.235180] ffff8881ece46900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 356.236297] ffff8881ece46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 356.237410] ================================================================== [ 356.238537] ================================================================== [ 356.239652] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd11/0xeb0 [kasan_test] [ 356.240907] Write of size 1 at addr ffff8881ece468da by task kunit_try_catch/4544 [ 356.242742] CPU: 3 UID: 0 PID: 4544 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 356.244719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 356.245653] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 356.247054] Call Trace: [ 356.247873] [ 356.248657] dump_stack_lvl+0x53/0x70 [ 356.249567] print_address_description.constprop.0+0x2c/0x3a0 [ 356.250652] ? krealloc_less_oob_helper+0xd11/0xeb0 [kasan_test] [ 356.251766] print_report+0xb9/0x2b0 [ 356.252678] ? kasan_addr_to_slab+0xd/0xb0 [ 356.253635] ? krealloc_less_oob_helper+0xd11/0xeb0 [kasan_test] [ 356.254761] kasan_report+0xe8/0x120 [ 356.255679] ? krealloc_less_oob_helper+0xd11/0xeb0 [kasan_test] [ 356.256803] krealloc_less_oob_helper+0xd11/0xeb0 [kasan_test] [ 356.257914] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [kasan_test] [ 356.259065] ? finish_task_switch.isra.0+0x155/0x750 [ 356.260094] ? __switch_to+0x5be/0xdc0 [ 356.261021] ? __schedule+0x7ec/0x1950 [ 356.261938] ? ktime_get_ts64+0x7f/0x230 [ 356.262860] kunit_try_run_case+0x1b0/0x490 [ 356.263795] ? __pfx_kunit_try_run_case+0x10/0x10 [ 356.264768] ? set_cpus_allowed_ptr+0x85/0xc0 [ 356.265704] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 356.266682] ? __pfx_kunit_try_run_case+0x10/0x10 [ 356.267642] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 356.268715] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 356.269735] kthread+0x2d8/0x3c0 [ 356.270578] ? __pfx_kthread+0x10/0x10 [ 356.271453] ret_from_fork+0x31/0x70 [ 356.272310] ? __pfx_kthread+0x10/0x10 [ 356.273179] ret_from_fork_asm+0x1a/0x30 [ 356.274055] [ 356.275437] Allocated by task 4544: [ 356.276253] kasan_save_stack+0x33/0x60 [ 356.277090] kasan_save_track+0x14/0x30 [ 356.277927] __kasan_krealloc+0x199/0x200 [ 356.278771] krealloc_noprof+0xac/0x110 [ 356.279606] krealloc_less_oob_helper+0x19c/0xeb0 [kasan_test] [ 356.280605] kunit_try_run_case+0x1b0/0x490 [ 356.281454] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 356.282398] kthread+0x2d8/0x3c0 [ 356.283152] ret_from_fork+0x31/0x70 [ 356.283917] ret_from_fork_asm+0x1a/0x30 [ 356.285276] The buggy address belongs to the object at ffff8881ece46800 which belongs to the cache kmalloc-256 of size 256 [ 356.287190] The buggy address is located 17 bytes to the right of allocated 201-byte region [ffff8881ece46800, ffff8881ece468c9) [ 356.289752] The buggy address belongs to the physical page: [ 356.290673] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1ece44 [ 356.291805] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 356.292912] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 356.293967] page_type: 0xfdffffff(slab) [ 356.294766] raw: 0017ffffc0000040 ffff88810004cb40 dead000000000122 0000000000000000 [ 356.295892] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 356.297015] head: 0017ffffc0000040 ffff88810004cb40 dead000000000122 0000000000000000 [ 356.298146] head: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 356.299276] head: 0017ffffc0000002 ffffea0007b39101 ffffffffffffffff 0000000000000000 [ 356.300411] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 356.301546] page dumped because: kasan: bad access detected [ 356.303125] Memory state around the buggy address: [ 356.304020] ffff8881ece46780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 356.305124] ffff8881ece46800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 356.306235] >ffff8881ece46880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 356.307342] ^ [ 356.308362] ffff8881ece46900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 356.309480] ffff8881ece46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 356.310594] ================================================================== [ 356.311721] ================================================================== [ 356.312838] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xcf7/0xeb0 [kasan_test] [ 356.314095] Write of size 1 at addr ffff8881ece468ea by task kunit_try_catch/4544 [ 356.315933] CPU: 3 UID: 0 PID: 4544 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 356.317913] Tainted: [B]=BAD_PAGE, [N]=TEST [ 356.318849] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 356.320252] Call Trace: [ 356.321073] [ 356.321858] dump_stack_lvl+0x53/0x70 [ 356.322770] print_address_description.constprop.0+0x2c/0x3a0 [ 356.323855] ? krealloc_less_oob_helper+0xcf7/0xeb0 [kasan_test] [ 356.324970] print_report+0xb9/0x2b0 [ 356.325883] ? kasan_addr_to_slab+0xd/0xb0 [ 356.326843] ? krealloc_less_oob_helper+0xcf7/0xeb0 [kasan_test] [ 356.327971] kasan_report+0xe8/0x120 [ 356.328889] ? krealloc_less_oob_helper+0xcf7/0xeb0 [kasan_test] [ 356.330014] krealloc_less_oob_helper+0xcf7/0xeb0 [kasan_test] [ 356.331126] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [kasan_test] [ 356.332279] ? finish_task_switch.isra.0+0x155/0x750 [ 356.333309] ? __switch_to+0x5be/0xdc0 [ 356.334236] ? __schedule+0x7ec/0x1950 [ 356.335152] ? ktime_get_ts64+0x7f/0x230 [ 356.336074] kunit_try_run_case+0x1b0/0x490 [ 356.337009] ? __pfx_kunit_try_run_case+0x10/0x10 [ 356.337982] ? set_cpus_allowed_ptr+0x85/0xc0 [ 356.338917] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 356.339895] ? __pfx_kunit_try_run_case+0x10/0x10 [ 356.340854] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 356.341929] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 356.342949] kthread+0x2d8/0x3c0 [ 356.343791] ? __pfx_kthread+0x10/0x10 [ 356.344667] ret_from_fork+0x31/0x70 [ 356.345523] ? __pfx_kthread+0x10/0x10 [ 356.346391] ret_from_fork_asm+0x1a/0x30 [ 356.347265] [ 356.348647] Allocated by task 4544: [ 356.349463] kasan_save_stack+0x33/0x60 [ 356.350298] kasan_save_track+0x14/0x30 [ 356.351135] __kasan_krealloc+0x199/0x200 [ 356.351978] krealloc_noprof+0xac/0x110 [ 356.352813] krealloc_less_oob_helper+0x19c/0xeb0 [kasan_test] [ 356.353811] kunit_try_run_case+0x1b0/0x490 [ 356.354660] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 356.355603] kthread+0x2d8/0x3c0 [ 356.356357] ret_from_fork+0x31/0x70 [ 356.357121] ret_from_fork_asm+0x1a/0x30 [ 356.358479] The buggy address belongs to the object at ffff8881ece46800 which belongs to the cache kmalloc-256 of size 256 [ 356.360390] The buggy address is located 33 bytes to the right of allocated 201-byte region [ffff8881ece46800, ffff8881ece468c9) [ 356.362952] The buggy address belongs to the physical page: [ 356.363872] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1ece44 [ 356.365003] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 356.366110] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 356.367165] page_type: 0xfdffffff(slab) [ 356.367963] raw: 0017ffffc0000040 ffff88810004cb40 dead000000000122 0000000000000000 [ 356.369088] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 356.370210] head: 0017ffffc0000040 ffff88810004cb40 dead000000000122 0000000000000000 [ 356.371340] head: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 356.372471] head: 0017ffffc0000002 ffffea0007b39101 ffffffffffffffff 0000000000000000 [ 356.373604] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 356.374739] page dumped because: kasan: bad access detected [ 356.376316] Memory state around the buggy address: [ 356.377211] ffff8881ece46780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 356.378314] ffff8881ece46800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 356.379424] >ffff8881ece46880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 356.380530] ^ [ 356.381591] ffff8881ece46900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 356.382708] ffff8881ece46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 356.383821] ================================================================== [ 356.384947] ================================================================== [ 356.386063] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xc38/0xeb0 [kasan_test] [ 356.387319] Write of size 1 at addr ffff8881ece468eb by task kunit_try_catch/4544 [ 356.389155] CPU: 3 UID: 0 PID: 4544 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 356.391132] Tainted: [B]=BAD_PAGE, [N]=TEST [ 356.392069] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 356.393471] Call Trace: [ 356.394290] [ 356.395077] dump_stack_lvl+0x53/0x70 [ 356.395988] print_address_description.constprop.0+0x2c/0x3a0 [ 356.397074] ? krealloc_less_oob_helper+0xc38/0xeb0 [kasan_test] [ 356.398188] print_report+0xb9/0x2b0 [ 356.399100] ? kasan_addr_to_slab+0xd/0xb0 [ 356.400060] ? krealloc_less_oob_helper+0xc38/0xeb0 [kasan_test] [ 356.401186] kasan_report+0xe8/0x120 [ 356.402104] ? krealloc_less_oob_helper+0xc38/0xeb0 [kasan_test] [ 356.403229] krealloc_less_oob_helper+0xc38/0xeb0 [kasan_test] [ 356.404338] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [kasan_test] [ 356.405490] ? finish_task_switch.isra.0+0x155/0x750 [ 356.406519] ? __switch_to+0x5be/0xdc0 [ 356.407446] ? __schedule+0x7ec/0x1950 [ 356.408362] ? ktime_get_ts64+0x7f/0x230 [ 356.409283] kunit_try_run_case+0x1b0/0x490 [ 356.410218] ? __pfx_kunit_try_run_case+0x10/0x10 [ 356.411190] ? set_cpus_allowed_ptr+0x85/0xc0 [ 356.412126] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 356.413105] ? __pfx_kunit_try_run_case+0x10/0x10 [ 356.414064] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 356.415138] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 356.416157] kthread+0x2d8/0x3c0 [ 356.416999] ? __pfx_kthread+0x10/0x10 [ 356.417875] ret_from_fork+0x31/0x70 [ 356.418733] ? __pfx_kthread+0x10/0x10 [ 356.419601] ret_from_fork_asm+0x1a/0x30 [ 356.420477] [ 356.421862] Allocated by task 4544: [ 356.422678] kasan_save_stack+0x33/0x60 [ 356.423515] kasan_save_track+0x14/0x30 [ 356.424354] __kasan_krealloc+0x199/0x200 [ 356.425198] krealloc_noprof+0xac/0x110 [ 356.426034] krealloc_less_oob_helper+0x19c/0xeb0 [kasan_test] [ 356.427033] kunit_try_run_case+0x1b0/0x490 [ 356.427883] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 356.428826] kthread+0x2d8/0x3c0 [ 356.429581] ret_from_fork+0x31/0x70 [ 356.430346] ret_from_fork_asm+0x1a/0x30 [ 356.431707] The buggy address belongs to the object at ffff8881ece46800 which belongs to the cache kmalloc-256 of size 256 [ 356.433622] The buggy address is located 34 bytes to the right of allocated 201-byte region [ffff8881ece46800, ffff8881ece468c9) [ 356.436187] The buggy address belongs to the physical page: [ 356.437108] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1ece44 [ 356.438241] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 356.439349] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 356.440405] page_type: 0xfdffffff(slab) [ 356.441205] raw: 0017ffffc0000040 ffff88810004cb40 dead000000000122 0000000000000000 [ 356.442330] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 356.443454] head: 0017ffffc0000040 ffff88810004cb40 dead000000000122 0000000000000000 [ 356.444585] head: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 356.445716] head: 0017ffffc0000002 ffffea0007b39101 ffffffffffffffff 0000000000000000 [ 356.446851] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 356.447987] page dumped because: kasan: bad access detected [ 356.449567] Memory state around the buggy address: [ 356.450463] ffff8881ece46780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 356.451568] ffff8881ece46800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 356.452679] >ffff8881ece46880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 356.453786] ^ [ 356.454849] ffff8881ece46900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 356.455968] ffff8881ece46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 356.457082] ================================================================== [ 356.458603] ok 11 krealloc_less_oob [ 356.458759] ================================================================== [ 356.460765] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x772/0x820 [kasan_test] [ 356.462049] Write of size 1 at addr ffff88822464a0eb by task kunit_try_catch/4546 [ 356.463941] CPU: 4 UID: 0 PID: 4546 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 356.465973] Tainted: [B]=BAD_PAGE, [N]=TEST [ 356.466934] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 356.468363] Call Trace: [ 356.469206] [ 356.470012] dump_stack_lvl+0x53/0x70 [ 356.470948] print_address_description.constprop.0+0x2c/0x3a0 [ 356.472056] ? krealloc_more_oob_helper+0x772/0x820 [kasan_test] [ 356.473198] print_report+0xb9/0x2b0 [ 356.474138] ? kasan_addr_to_slab+0xd/0xb0 [ 356.475123] ? krealloc_more_oob_helper+0x772/0x820 [kasan_test] [ 356.476269] kasan_report+0xe8/0x120 [ 356.477206] ? krealloc_more_oob_helper+0x772/0x820 [kasan_test] [ 356.478351] krealloc_more_oob_helper+0x772/0x820 [kasan_test] [ 356.479482] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [kasan_test] [ 356.480652] ? finish_task_switch.isra.0+0x155/0x750 [ 356.481704] ? __switch_to+0x5be/0xdc0 [ 356.482647] ? __schedule+0x7ec/0x1950 [ 356.483579] ? ktime_get_ts64+0x7f/0x230 [ 356.484517] kunit_try_run_case+0x1b0/0x490 [ 356.485470] ? __pfx_kunit_try_run_case+0x10/0x10 [ 356.486459] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 356.487562] ? __pfx_kunit_try_run_case+0x10/0x10 [ 356.488547] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 356.489647] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 356.490692] kthread+0x2d8/0x3c0 [ 356.491561] ? __pfx_kthread+0x10/0x10 [ 356.492462] ret_from_fork+0x31/0x70 [ 356.493344] ? __pfx_kthread+0x10/0x10 [ 356.494239] ret_from_fork_asm+0x1a/0x30 [ 356.495140] [ 356.496574] The buggy address belongs to the physical page: [ 356.497593] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x224648 [ 356.498814] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 356.500019] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 356.501171] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 356.502386] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 356.503592] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 356.504797] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 356.505990] head: 0017ffffc0000002 ffffea0008919201 ffffffffffffffff 0000000000000000 [ 356.507176] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 356.508351] page dumped because: kasan: bad access detected [ 356.509973] Memory state around the buggy address: [ 356.510877] ffff888224649f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 356.511979] ffff88822464a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 356.513079] >ffff88822464a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 356.514175] ^ [ 356.515229] ffff88822464a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 356.516337] ffff88822464a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 356.517436] ================================================================== [ 356.518549] ================================================================== [ 356.519645] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x744/0x820 [kasan_test] [ 356.520879] Write of size 1 at addr ffff88822464a0f0 by task kunit_try_catch/4546 [ 356.522649] CPU: 4 UID: 0 PID: 4546 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 356.524535] Tainted: [B]=BAD_PAGE, [N]=TEST [ 356.525417] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 356.526768] Call Trace: [ 356.527534] [ 356.528268] dump_stack_lvl+0x53/0x70 [ 356.529131] print_address_description.constprop.0+0x2c/0x3a0 [ 356.530167] ? krealloc_more_oob_helper+0x744/0x820 [kasan_test] [ 356.531234] print_report+0xb9/0x2b0 [ 356.532095] ? kasan_addr_to_slab+0xd/0xb0 [ 356.532996] ? krealloc_more_oob_helper+0x744/0x820 [kasan_test] [ 356.534061] kasan_report+0xe8/0x120 [ 356.534924] ? krealloc_more_oob_helper+0x744/0x820 [kasan_test] [ 356.535999] krealloc_more_oob_helper+0x744/0x820 [kasan_test] [ 356.537064] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [kasan_test] [ 356.538179] ? finish_task_switch.isra.0+0x155/0x750 [ 356.539177] ? __switch_to+0x5be/0xdc0 [ 356.540080] ? __schedule+0x7ec/0x1950 [ 356.540978] ? ktime_get_ts64+0x7f/0x230 [ 356.541880] kunit_try_run_case+0x1b0/0x490 [ 356.542796] ? __pfx_kunit_try_run_case+0x10/0x10 [ 356.543748] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 356.544808] ? __pfx_kunit_try_run_case+0x10/0x10 [ 356.545755] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 356.546817] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 356.547827] kthread+0x2d8/0x3c0 [ 356.548658] ? __pfx_kthread+0x10/0x10 [ 356.549531] ret_from_fork+0x31/0x70 [ 356.550380] ? __pfx_kthread+0x10/0x10 [ 356.551239] ret_from_fork_asm+0x1a/0x30 [ 356.552112] [ 356.553490] The buggy address belongs to the physical page: [ 356.554495] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x224648 [ 356.555701] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 356.556878] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 356.558012] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 356.559210] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 356.560413] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 356.561615] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 356.562806] head: 0017ffffc0000002 ffffea0008919201 ffffffffffffffff 0000000000000000 [ 356.563989] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 356.565162] page dumped because: kasan: bad access detected [ 356.566780] Memory state around the buggy address: [ 356.567742] ffff888224649f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 356.568851] ffff88822464a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 356.569949] >ffff88822464a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 356.571087] ^ [ 356.572195] ffff88822464a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 356.573301] ffff88822464a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 356.574397] ================================================================== [ 356.575815] ok 12 krealloc_large_more_oob [ 356.575944] kmemleak: Cannot insert 0xffff8881f1f58000 into the object search tree (overlaps existing) [ 356.578162] CPU: 3 UID: 0 PID: 4551 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 356.580164] Tainted: [B]=BAD_PAGE, [N]=TEST [ 356.581048] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 356.582392] Call Trace: [ 356.583205] [ 356.583994] dump_stack_lvl+0x53/0x70 [ 356.584856] __link_object+0x18d/0x1b0 [ 356.585724] __create_object+0x4d/0x90 [ 356.586588] ___kmalloc_large_node+0x104/0x180 [ 356.587572] __kmalloc_large_node_noprof+0x21/0xb0 [ 356.588530] __kmalloc_noprof.cold+0xc/0xa6 [ 356.589426] ? krealloc_less_oob_helper+0x10f/0xeb0 [kasan_test] [ 356.590479] ? krealloc_less_oob_helper+0x10f/0xeb0 [kasan_test] [ 356.591585] krealloc_less_oob_helper+0x10f/0xeb0 [kasan_test] [ 356.592630] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [kasan_test] [ 356.593714] ? finish_task_switch.isra.0+0x155/0x750 [ 356.594682] ? __switch_to+0x5be/0xdc0 [ 356.595614] ? __schedule+0x7ec/0x1950 [ 356.596494] ? ktime_get_ts64+0x7f/0x230 [ 356.597381] kunit_try_run_case+0x1b0/0x490 [ 356.598284] ? __pfx_kunit_try_run_case+0x10/0x10 [ 356.599284] ? set_cpus_allowed_ptr+0x85/0xc0 [ 356.600224] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 356.601162] ? __pfx_kunit_try_run_case+0x10/0x10 [ 356.602079] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 356.603162] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 356.604180] kthread+0x2d8/0x3c0 [ 356.604983] ? __pfx_kthread+0x10/0x10 [ 356.605826] ret_from_fork+0x31/0x70 [ 356.606654] ? __pfx_kthread+0x10/0x10 [ 356.607546] ret_from_fork_asm+0x1a/0x30 [ 356.608406] [ 356.609103] kmemleak: Kernel memory leak detector disabled [ 356.610068] kmemleak: Object 0xffff8881f1f58000 (size 8202): [ 356.611098] kmemleak: comm "kunit_try_catch", pid 4536, jiffies 4295021120 [ 356.612239] kmemleak: min_count = 1 [ 356.613062] kmemleak: count = 0 [ 356.613843] kmemleak: flags = 0x1 [ 356.614641] kmemleak: checksum = 0 [ 356.615493] kmemleak: backtrace: [ 356.616291] ___kmalloc_large_node+0x104/0x180 [ 356.617138] __kmalloc_large_noprof+0x21/0xb0 [ 356.617961] kmalloc_large_invalid_free+0x82/0x2b0 [kasan_test] [ 356.618937] kunit_try_run_case+0x1b0/0x490 [ 356.619774] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 356.620670] kthread+0x2d8/0x3c0 [ 356.621368] ret_from_fork+0x31/0x70 [ 356.622096] ret_from_fork_asm+0x1a/0x30 [ 356.622883] ================================================================== [ 356.623957] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xc4f/0xeb0 [kasan_test] [ 356.625162] Write of size 1 at addr ffff8881f1f5a0c9 by task kunit_try_catch/4551 [ 356.626834] CPU: 3 UID: 0 PID: 4551 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 356.628734] Tainted: [B]=BAD_PAGE, [N]=TEST [ 356.629590] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 356.630897] Call Trace: [ 356.631616] [ 356.632356] dump_stack_lvl+0x53/0x70 [ 356.633204] print_address_description.constprop.0+0x2c/0x3a0 [ 356.634193] ? krealloc_less_oob_helper+0xc4f/0xeb0 [kasan_test] [ 356.635214] print_report+0xb9/0x2b0 [ 356.636070] ? kasan_addr_to_slab+0xd/0xb0 [ 356.636975] ? krealloc_less_oob_helper+0xc4f/0xeb0 [kasan_test] [ 356.638011] kasan_report+0xe8/0x120 [ 356.638832] ? krealloc_less_oob_helper+0xc4f/0xeb0 [kasan_test] [ 356.639890] krealloc_less_oob_helper+0xc4f/0xeb0 [kasan_test] [ 356.640959] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [kasan_test] [ 356.642034] ? finish_task_switch.isra.0+0x155/0x750 [ 356.642980] ? __switch_to+0x5be/0xdc0 [ 356.643849] ? __schedule+0x7ec/0x1950 [ 356.644742] ? ktime_get_ts64+0x7f/0x230 [ 356.645613] kunit_try_run_case+0x1b0/0x490 [ 356.646496] ? __pfx_kunit_try_run_case+0x10/0x10 [ 356.647424] ? set_cpus_allowed_ptr+0x85/0xc0 [ 356.648383] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 356.649347] ? __pfx_kunit_try_run_case+0x10/0x10 [ 356.650267] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 356.651300] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 356.652344] kthread+0x2d8/0x3c0 [ 356.653194] ? __pfx_kthread+0x10/0x10 [ 356.654049] ret_from_fork+0x31/0x70 [ 356.654893] ? __pfx_kthread+0x10/0x10 [ 356.655748] ret_from_fork_asm+0x1a/0x30 [ 356.656681] [ 356.658070] The buggy address belongs to the physical page: [ 356.659063] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1f1f58 [ 356.660330] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 356.661523] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 356.662661] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 356.663889] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 356.665127] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 356.666317] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 356.667497] head: 0017ffffc0000002 ffffea0007c7d601 ffffffffffffffff 0000000000000000 [ 356.668728] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 356.669891] page dumped because: kasan: bad access detected [ 356.671488] Memory state around the buggy address: [ 356.672431] ffff8881f1f59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 356.673542] ffff8881f1f5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 356.674638] >ffff8881f1f5a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 356.675730] ^ [ 356.676750] ffff8881f1f5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 356.677861] ffff8881f1f5a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 356.678957] ================================================================== [ 356.680106] ================================================================== [ 356.681231] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xcbc/0xeb0 [kasan_test] [ 356.682456] Write of size 1 at addr ffff8881f1f5a0d0 by task kunit_try_catch/4551 [ 356.684271] CPU: 3 UID: 0 PID: 4551 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 356.686157] Tainted: [B]=BAD_PAGE, [N]=TEST [ 356.687040] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 356.688451] Call Trace: [ 356.689251] [ 356.689982] dump_stack_lvl+0x53/0x70 [ 356.690842] print_address_description.constprop.0+0x2c/0x3a0 [ 356.691903] ? krealloc_less_oob_helper+0xcbc/0xeb0 [kasan_test] [ 356.693026] print_report+0xb9/0x2b0 [ 356.693886] ? kasan_addr_to_slab+0xd/0xb0 [ 356.694784] ? krealloc_less_oob_helper+0xcbc/0xeb0 [kasan_test] [ 356.695870] kasan_report+0xe8/0x120 [ 356.696780] ? krealloc_less_oob_helper+0xcbc/0xeb0 [kasan_test] [ 356.697864] krealloc_less_oob_helper+0xcbc/0xeb0 [kasan_test] [ 356.698929] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [kasan_test] [ 356.700083] ? finish_task_switch.isra.0+0x155/0x750 [ 356.701130] ? __switch_to+0x5be/0xdc0 [ 356.702032] ? __schedule+0x7ec/0x1950 [ 356.702929] ? ktime_get_ts64+0x7f/0x230 [ 356.703853] kunit_try_run_case+0x1b0/0x490 [ 356.704817] ? __pfx_kunit_try_run_case+0x10/0x10 [ 356.705778] ? set_cpus_allowed_ptr+0x85/0xc0 [ 356.706693] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 356.707651] ? __pfx_kunit_try_run_case+0x10/0x10 [ 356.708658] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 356.709729] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 356.710737] kthread+0x2d8/0x3c0 [ 356.711567] ? __pfx_kthread+0x10/0x10 [ 356.712494] ret_from_fork+0x31/0x70 [ 356.713360] ? __pfx_kthread+0x10/0x10 [ 356.714217] ret_from_fork_asm+0x1a/0x30 [ 356.715080] [ 356.716527] The buggy address belongs to the physical page: [ 356.717530] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1f1f58 [ 356.718724] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 356.719932] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 356.721107] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 356.722309] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 356.723499] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 356.724753] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 356.725943] head: 0017ffffc0000002 ffffea0007c7d601 ffffffffffffffff 0000000000000000 [ 356.727112] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 356.728325] page dumped because: kasan: bad access detected [ 356.729946] Memory state around the buggy address: [ 356.730833] ffff8881f1f59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 356.731964] ffff8881f1f5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 356.733105] >ffff8881f1f5a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 356.734197] ^ [ 356.735179] ffff8881f1f5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 356.736340] ffff8881f1f5a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 356.737447] ================================================================== [ 356.738552] ================================================================== [ 356.739699] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd11/0xeb0 [kasan_test] [ 356.740937] Write of size 1 at addr ffff8881f1f5a0da by task kunit_try_catch/4551 [ 356.742735] CPU: 3 UID: 0 PID: 4551 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 356.744611] Tainted: [B]=BAD_PAGE, [N]=TEST [ 356.745493] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 356.746841] Call Trace: [ 356.747606] [ 356.748337] dump_stack_lvl+0x53/0x70 [ 356.749199] print_address_description.constprop.0+0x2c/0x3a0 [ 356.750233] ? krealloc_less_oob_helper+0xd11/0xeb0 [kasan_test] [ 356.751299] print_report+0xb9/0x2b0 [ 356.752161] ? kasan_addr_to_slab+0xd/0xb0 [ 356.753060] ? krealloc_less_oob_helper+0xd11/0xeb0 [kasan_test] [ 356.754125] kasan_report+0xe8/0x120 [ 356.754988] ? krealloc_less_oob_helper+0xd11/0xeb0 [kasan_test] [ 356.756063] krealloc_less_oob_helper+0xd11/0xeb0 [kasan_test] [ 356.757129] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [kasan_test] [ 356.758243] ? finish_task_switch.isra.0+0x155/0x750 [ 356.759242] ? __switch_to+0x5be/0xdc0 [ 356.760147] ? __schedule+0x7ec/0x1950 [ 356.761045] ? ktime_get_ts64+0x7f/0x230 [ 356.761948] kunit_try_run_case+0x1b0/0x490 [ 356.762864] ? __pfx_kunit_try_run_case+0x10/0x10 [ 356.763817] ? set_cpus_allowed_ptr+0x85/0xc0 [ 356.764733] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 356.765694] ? __pfx_kunit_try_run_case+0x10/0x10 [ 356.766639] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 356.767702] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 356.768712] kthread+0x2d8/0x3c0 [ 356.769543] ? __pfx_kthread+0x10/0x10 [ 356.770408] ret_from_fork+0x31/0x70 [ 356.771255] ? __pfx_kthread+0x10/0x10 [ 356.772113] ret_from_fork_asm+0x1a/0x30 [ 356.772979] [ 356.774364] The buggy address belongs to the physical page: [ 356.775358] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1f1f58 [ 356.776555] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 356.777736] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 356.778863] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 356.780067] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 356.781259] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 356.782449] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 356.783629] head: 0017ffffc0000002 ffffea0007c7d601 ffffffffffffffff 0000000000000000 [ 356.784799] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 356.785952] page dumped because: kasan: bad access detected [ 356.787550] Memory state around the buggy address: [ 356.788437] ffff8881f1f59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 356.789538] ffff8881f1f5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 356.790634] >ffff8881f1f5a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 356.791727] ^ [ 356.792732] ffff8881f1f5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 356.793833] ffff8881f1f5a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 356.794930] ================================================================== [ 356.796045] ================================================================== [ 356.797136] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xcf7/0xeb0 [kasan_test] [ 356.798363] Write of size 1 at addr ffff8881f1f5a0ea by task kunit_try_catch/4551 [ 356.800120] CPU: 3 UID: 0 PID: 4551 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 356.801998] Tainted: [B]=BAD_PAGE, [N]=TEST [ 356.802882] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 356.804231] Call Trace: [ 356.804997] [ 356.805728] dump_stack_lvl+0x53/0x70 [ 356.806590] print_address_description.constprop.0+0x2c/0x3a0 [ 356.807625] ? krealloc_less_oob_helper+0xcf7/0xeb0 [kasan_test] [ 356.808692] print_report+0xb9/0x2b0 [ 356.809553] ? kasan_addr_to_slab+0xd/0xb0 [ 356.810454] ? krealloc_less_oob_helper+0xcf7/0xeb0 [kasan_test] [ 356.811520] kasan_report+0xe8/0x120 [ 356.812383] ? krealloc_less_oob_helper+0xcf7/0xeb0 [kasan_test] [ 356.813459] krealloc_less_oob_helper+0xcf7/0xeb0 [kasan_test] [ 356.814526] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [kasan_test] [ 356.815640] ? finish_task_switch.isra.0+0x155/0x750 [ 356.816640] ? __switch_to+0x5be/0xdc0 [ 356.817543] ? __schedule+0x7ec/0x1950 [ 356.818442] ? ktime_get_ts64+0x7f/0x230 [ 356.819344] kunit_try_run_case+0x1b0/0x490 [ 356.820260] ? __pfx_kunit_try_run_case+0x10/0x10 [ 356.821213] ? set_cpus_allowed_ptr+0x85/0xc0 [ 356.822129] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 356.823091] ? __pfx_kunit_try_run_case+0x10/0x10 [ 356.824036] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 356.825100] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 356.826110] kthread+0x2d8/0x3c0 [ 356.826943] ? __pfx_kthread+0x10/0x10 [ 356.827808] ret_from_fork+0x31/0x70 [ 356.828655] ? __pfx_kthread+0x10/0x10 [ 356.829513] ret_from_fork_asm+0x1a/0x30 [ 356.830379] [ 356.831765] The buggy address belongs to the physical page: [ 356.832759] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1f1f58 [ 356.833955] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 356.835136] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 356.836262] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 356.837465] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 356.838657] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 356.839848] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 356.841029] head: 0017ffffc0000002 ffffea0007c7d601 ffffffffffffffff 0000000000000000 [ 356.842199] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 356.843353] page dumped because: kasan: bad access detected [ 356.844950] Memory state around the buggy address: [ 356.845837] ffff8881f1f59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 356.846938] ffff8881f1f5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 356.848036] >ffff8881f1f5a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 356.849128] ^ [ 356.850177] ffff8881f1f5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 356.851280] ffff8881f1f5a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 356.852377] ================================================================== [ 356.853482] ================================================================== [ 356.854573] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xc38/0xeb0 [kasan_test] [ 356.855798] Write of size 1 at addr ffff8881f1f5a0eb by task kunit_try_catch/4551 [ 356.857556] CPU: 3 UID: 0 PID: 4551 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 356.859434] Tainted: [B]=BAD_PAGE, [N]=TEST [ 356.860317] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 356.861666] Call Trace: [ 356.862431] [ 356.863163] dump_stack_lvl+0x53/0x70 [ 356.864025] print_address_description.constprop.0+0x2c/0x3a0 [ 356.865060] ? krealloc_less_oob_helper+0xc38/0xeb0 [kasan_test] [ 356.866127] print_report+0xb9/0x2b0 [ 356.866987] ? kasan_addr_to_slab+0xd/0xb0 [ 356.867887] ? krealloc_less_oob_helper+0xc38/0xeb0 [kasan_test] [ 356.868951] kasan_report+0xe8/0x120 [ 356.869815] ? krealloc_less_oob_helper+0xc38/0xeb0 [kasan_test] [ 356.870890] krealloc_less_oob_helper+0xc38/0xeb0 [kasan_test] [ 356.871956] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [kasan_test] [ 356.873069] ? finish_task_switch.isra.0+0x155/0x750 [ 356.874067] ? __switch_to+0x5be/0xdc0 [ 356.874972] ? __schedule+0x7ec/0x1950 [ 356.875869] ? ktime_get_ts64+0x7f/0x230 [ 356.876771] kunit_try_run_case+0x1b0/0x490 [ 356.877686] ? __pfx_kunit_try_run_case+0x10/0x10 [ 356.878638] ? set_cpus_allowed_ptr+0x85/0xc0 [ 356.879554] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 356.880514] ? __pfx_kunit_try_run_case+0x10/0x10 [ 356.881458] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 356.882519] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 356.883528] kthread+0x2d8/0x3c0 [ 356.884358] ? __pfx_kthread+0x10/0x10 [ 356.885223] ret_from_fork+0x31/0x70 [ 356.886068] ? __pfx_kthread+0x10/0x10 [ 356.886925] ret_from_fork_asm+0x1a/0x30 [ 356.887789] [ 356.889171] The buggy address belongs to the physical page: [ 356.890162] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1f1f58 [ 356.891356] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 356.892535] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 356.893660] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 356.894862] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 356.896053] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 356.897242] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 356.898422] head: 0017ffffc0000002 ffffea0007c7d601 ffffffffffffffff 0000000000000000 [ 356.899589] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 356.900741] page dumped because: kasan: bad access detected [ 356.902336] Memory state around the buggy address: [ 356.903223] ffff8881f1f59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 356.904322] ffff8881f1f5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 356.905419] >ffff8881f1f5a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 356.906510] ^ [ 356.907556] ffff8881f1f5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 356.908659] ffff8881f1f5a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 356.909755] ================================================================== [ 356.910896] kmemleak: Automatic memory scanning thread ended [ 356.911230] ok 13 krealloc_large_less_oob [ 356.911996] ================================================================== [ 356.914028] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b0/0x580 [kasan_test] [ 356.915196] Read of size 1 at addr ffff88830d21a800 by task kunit_try_catch/4554 [ 356.916980] CPU: 0 UID: 0 PID: 4554 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 356.918909] Tainted: [B]=BAD_PAGE, [N]=TEST [ 356.919817] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 356.921190] Call Trace: [ 356.921978] [ 356.922731] dump_stack_lvl+0x53/0x70 [ 356.923616] print_address_description.constprop.0+0x2c/0x3a0 [ 356.924674] ? krealloc_uaf+0x1b0/0x580 [kasan_test] [ 356.925673] print_report+0xb9/0x2b0 [ 356.926547] ? kasan_addr_to_slab+0xd/0xb0 [ 356.927469] ? krealloc_uaf+0x1b0/0x580 [kasan_test] [ 356.928468] kasan_report+0xe8/0x120 [ 356.929350] ? krealloc_uaf+0x1b0/0x580 [kasan_test] [ 356.930355] ? krealloc_uaf+0x1b0/0x580 [kasan_test] [ 356.931353] __kasan_check_byte+0x36/0x50 [ 356.932273] krealloc_noprof+0x31/0x110 [ 356.933176] krealloc_uaf+0x1b0/0x580 [kasan_test] [ 356.934155] ? __pfx_krealloc_uaf+0x10/0x10 [kasan_test] [ 356.935171] ? finish_task_switch.isra.0+0x155/0x750 [ 356.936147] ? __switch_to+0x5be/0xdc0 [ 356.937017] ? __schedule+0x7ec/0x1950 [ 356.937884] ? ktime_get_ts64+0x7f/0x230 [ 356.938764] kunit_try_run_case+0x1b0/0x490 [ 356.939667] ? __pfx_kunit_try_run_case+0x10/0x10 [ 356.940612] ? set_cpus_allowed_ptr+0x85/0xc0 [ 356.941529] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 356.942481] ? __pfx_kunit_try_run_case+0x10/0x10 [ 356.943414] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 356.944463] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 356.945451] kthread+0x2d8/0x3c0 [ 356.946268] ? __pfx_kthread+0x10/0x10 [ 356.947127] ret_from_fork+0x31/0x70 [ 356.947960] ? __pfx_kthread+0x10/0x10 [ 356.948797] ret_from_fork_asm+0x1a/0x30 [ 356.949654] [ 356.950992] Allocated by task 4554: [ 356.951786] kasan_save_stack+0x33/0x60 [ 356.952602] kasan_save_track+0x14/0x30 [ 356.953406] __kasan_kmalloc+0xaa/0xb0 [ 356.954194] krealloc_uaf+0xb3/0x580 [kasan_test] [ 356.955061] kunit_try_run_case+0x1b0/0x490 [ 356.955867] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 356.956759] kthread+0x2d8/0x3c0 [ 356.957471] ret_from_fork+0x31/0x70 [ 356.958196] ret_from_fork_asm+0x1a/0x30 [ 356.959475] Freed by task 4554: [ 356.960150] kasan_save_stack+0x33/0x60 [ 356.960879] kasan_save_track+0x14/0x30 [ 356.961602] kasan_save_free_info+0x3b/0x60 [ 356.962350] poison_slab_object+0x109/0x170 [ 356.963097] __kasan_slab_free+0x32/0x50 [ 356.963823] kfree+0x10c/0x310 [ 356.964474] krealloc_uaf+0x135/0x580 [kasan_test] [ 356.965272] kunit_try_run_case+0x1b0/0x490 [ 356.966022] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 356.966872] kthread+0x2d8/0x3c0 [ 356.967544] ret_from_fork+0x31/0x70 [ 356.968244] ret_from_fork_asm+0x1a/0x30 [ 356.969484] The buggy address belongs to the object at ffff88830d21a800 which belongs to the cache kmalloc-256 of size 256 [ 356.971311] The buggy address is located 0 bytes inside of freed 256-byte region [ffff88830d21a800, ffff88830d21a900) [ 356.973668] The buggy address belongs to the physical page: [ 356.974551] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x30d218 [ 356.975645] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 356.976718] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 356.977740] page_type: 0xfdffffff(slab) [ 356.978506] raw: 0017ffffc0000040 ffff88810004cb40 dead000000000122 0000000000000000 [ 356.979600] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 356.980698] head: 0017ffffc0000040 ffff88810004cb40 dead000000000122 0000000000000000 [ 356.981808] head: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 356.982922] head: 0017ffffc0000002 ffffea000c348601 ffffffffffffffff 0000000000000000 [ 356.984035] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 356.985151] page dumped because: kasan: bad access detected [ 356.986700] Memory state around the buggy address: [ 356.987584] ffff88830d21a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 356.988681] ffff88830d21a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 356.989774] >ffff88830d21a800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 356.990868] ^ [ 356.991640] ffff88830d21a880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 356.992750] ffff88830d21a900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 356.993860] ================================================================== [ 356.994986] ================================================================== [ 356.996102] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x502/0x580 [kasan_test] [ 356.997278] Read of size 1 at addr ffff88830d21a800 by task kunit_try_catch/4554 [ 356.999098] CPU: 0 UID: 0 PID: 4554 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 357.001068] Tainted: [B]=BAD_PAGE, [N]=TEST [ 357.001998] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 357.003392] Call Trace: [ 357.004205] [ 357.004983] dump_stack_lvl+0x53/0x70 [ 357.005889] print_address_description.constprop.0+0x2c/0x3a0 [ 357.006970] ? krealloc_uaf+0x502/0x580 [kasan_test] [ 357.007993] print_report+0xb9/0x2b0 [ 357.008899] ? kasan_addr_to_slab+0xd/0xb0 [ 357.009852] ? krealloc_uaf+0x502/0x580 [kasan_test] [ 357.010885] kasan_report+0xe8/0x120 [ 357.011793] ? krealloc_uaf+0x502/0x580 [kasan_test] [ 357.012819] krealloc_uaf+0x502/0x580 [kasan_test] [ 357.013829] ? __pfx_krealloc_uaf+0x10/0x10 [kasan_test] [ 357.014879] ? finish_task_switch.isra.0+0x155/0x750 [ 357.015892] ? __switch_to+0x5be/0xdc0 [ 357.016802] ? __schedule+0x7ec/0x1950 [ 357.017701] ? ktime_get_ts64+0x7f/0x230 [ 357.018605] kunit_try_run_case+0x1b0/0x490 [ 357.019523] ? __pfx_kunit_try_run_case+0x10/0x10 [ 357.020479] ? set_cpus_allowed_ptr+0x85/0xc0 [ 357.021398] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 357.022359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 357.023301] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 357.024358] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 357.025361] kthread+0x2d8/0x3c0 [ 357.026188] ? __pfx_kthread+0x10/0x10 [ 357.027047] ret_from_fork+0x31/0x70 [ 357.027887] ? __pfx_kthread+0x10/0x10 [ 357.028740] ret_from_fork_asm+0x1a/0x30 [ 357.029599] [ 357.030969] Allocated by task 4554: [ 357.031776] kasan_save_stack+0x33/0x60 [ 357.032603] kasan_save_track+0x14/0x30 [ 357.033424] __kasan_kmalloc+0xaa/0xb0 [ 357.034230] krealloc_uaf+0xb3/0x580 [kasan_test] [ 357.035128] kunit_try_run_case+0x1b0/0x490 [ 357.035970] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 357.036905] kthread+0x2d8/0x3c0 [ 357.037656] ret_from_fork+0x31/0x70 [ 357.038422] ret_from_fork_asm+0x1a/0x30 [ 357.039768] Freed by task 4554: [ 357.040459] kasan_save_stack+0x33/0x60 [ 357.041196] kasan_save_track+0x14/0x30 [ 357.041933] kasan_save_free_info+0x3b/0x60 [ 357.042698] poison_slab_object+0x109/0x170 [ 357.043459] __kasan_slab_free+0x32/0x50 [ 357.044195] kfree+0x10c/0x310 [ 357.044857] krealloc_uaf+0x135/0x580 [kasan_test] [ 357.045670] kunit_try_run_case+0x1b0/0x490 [ 357.046426] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 357.047281] kthread+0x2d8/0x3c0 [ 357.047957] ret_from_fork+0x31/0x70 [ 357.048657] ret_from_fork_asm+0x1a/0x30 [ 357.049900] The buggy address belongs to the object at ffff88830d21a800 which belongs to the cache kmalloc-256 of size 256 [ 357.051728] The buggy address is located 0 bytes inside of freed 256-byte region [ffff88830d21a800, ffff88830d21a900) [ 357.054084] The buggy address belongs to the physical page: [ 357.054968] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x30d218 [ 357.056061] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 357.057134] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 357.058157] page_type: 0xfdffffff(slab) [ 357.058922] raw: 0017ffffc0000040 ffff88810004cb40 dead000000000122 0000000000000000 [ 357.060015] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 357.061112] head: 0017ffffc0000040 ffff88810004cb40 dead000000000122 0000000000000000 [ 357.062222] head: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 357.063335] head: 0017ffffc0000002 ffffea000c348601 ffffffffffffffff 0000000000000000 [ 357.064449] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 357.065564] page dumped because: kasan: bad access detected [ 357.067115] Memory state around the buggy address: [ 357.067999] ffff88830d21a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 357.069096] ffff88830d21a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 357.070189] >ffff88830d21a800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 357.071285] ^ [ 357.072059] ffff88830d21a880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 357.073171] ffff88830d21a900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 357.074283] ================================================================== [ 357.075642] ok 14 krealloc_uaf [ 357.075866] ok 15 kmalloc_oob_16 # SKIP Test requires checked mem*() [ 357.076931] ok 16 kmalloc_uaf_16 # SKIP Test requires checked mem*() [ 357.078414] ok 17 kmalloc_oob_in_memset # SKIP Test requires checked mem*() [ 357.079774] ok 18 kmalloc_oob_memset_2 # SKIP Test requires checked mem*() [ 357.081197] ok 19 kmalloc_oob_memset_4 # SKIP Test requires checked mem*() [ 357.082252] LKP: stdout: 3792: HOSTNAME lkp-csl-d02, MAC d8:5e:d3:0a:00:02, kernel 6.11.0-rc2-00008-g2377a7d90f5b 1 [ 357.082677] ok 20 kmalloc_oob_memset_8 # SKIP Test requires checked mem*() [ 357.084209] ok 21 kmalloc_oob_memset_16 # SKIP Test requires checked mem*() [ 357.087138] ok 22 kmalloc_memmove_negative_size # SKIP Test requires checked mem*() [ 357.088653] ok 23 kmalloc_memmove_invalid_size # SKIP Test requires checked mem*() [ 357.090114] ================================================================== [ 357.092611] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x316/0x380 [kasan_test] [ 357.093869] Read of size 1 at addr ffff8882482203c8 by task kunit_try_catch/4574 [ 357.095867] CPU: 2 UID: 0 PID: 4574 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 357.097987] Tainted: [B]=BAD_PAGE, [N]=TEST [ 357.098982] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 357.100437] Call Trace: [ 357.101332] [ 357.102166] dump_stack_lvl+0x53/0x70 [ 357.103123] print_address_description.constprop.0+0x2c/0x3a0 [ 357.104246] ? kmalloc_uaf+0x316/0x380 [kasan_test] [ 357.105297] print_report+0xb9/0x2b0 [ 357.106230] ? kasan_addr_to_slab+0xd/0xb0 [ 357.107198] ? kmalloc_uaf+0x316/0x380 [kasan_test] [ 357.108233] kasan_report+0xe8/0x120 [ 357.109152] ? kmalloc_uaf+0x316/0x380 [kasan_test] [ 357.110184] kmalloc_uaf+0x316/0x380 [kasan_test] [ 357.111203] ? __pfx_kmalloc_uaf+0x10/0x10 [kasan_test] [ 357.112266] ? __schedule+0x7ec/0x1950 [ 357.113196] ? ktime_get_ts64+0x7f/0x230 [ 357.114136] kunit_try_run_case+0x1b0/0x490 [ 357.115096] ? __pfx_kunit_try_run_case+0x10/0x10 [ 357.116092] ? set_cpus_allowed_ptr+0x85/0xc0 [ 357.117065] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 357.118079] ? __pfx_kunit_try_run_case+0x10/0x10 [ 357.119068] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 357.120166] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 357.121208] kthread+0x2d8/0x3c0 [ 357.122067] ? __pfx_kthread+0x10/0x10 [ 357.122960] ret_from_fork+0x31/0x70 [ 357.123833] ? __pfx_kthread+0x10/0x10 [ 357.124723] ret_from_fork_asm+0x1a/0x30 [ 357.125623] [ 357.127067] Allocated by task 4574: [ 357.127911] kasan_save_stack+0x33/0x60 [ 357.128770] kasan_save_track+0x14/0x30 [ 357.129614] __kasan_kmalloc+0xaa/0xb0 [ 357.130443] kmalloc_uaf+0x9b/0x380 [kasan_test] [ 357.131344] kunit_try_run_case+0x1b0/0x490 [ 357.132201] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 357.133151] kthread+0x2d8/0x3c0 [ 357.133915] ret_from_fork+0x31/0x70 [ 357.134697] ret_from_fork_asm+0x1a/0x30 [ 357.136082] Freed by task 4574: [ 357.136789] kasan_save_stack+0x33/0x60 [ 357.137548] kasan_save_track+0x14/0x30 [ 357.138290] kasan_save_free_info+0x3b/0x60 [ 357.139049] poison_slab_object+0x109/0x170 [ 357.139810] __kasan_slab_free+0x32/0x50 [ 357.140549] kfree+0x10c/0x310 [ 357.141212] kmalloc_uaf+0x11d/0x380 [kasan_test] [ 357.142015] kunit_try_run_case+0x1b0/0x490 [ 357.142770] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 357.143623] kthread+0x2d8/0x3c0 [ 357.144299] ret_from_fork+0x31/0x70 [ 357.145002] ret_from_fork_asm+0x1a/0x30 [ 357.146249] The buggy address belongs to the object at ffff8882482203c0 which belongs to the cache kmalloc-16 of size 16 [ 357.148062] The buggy address is located 8 bytes inside of freed 16-byte region [ffff8882482203c0, ffff8882482203d0) [ 357.150407] The buggy address belongs to the physical page: [ 357.151289] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x248220 [ 357.152379] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 357.153357] page_type: 0xfdffffff(slab) [ 357.154118] raw: 0017ffffc0000000 ffff88810004c640 dead000000000122 0000000000000000 [ 357.155204] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 [ 357.156288] page dumped because: kasan: bad access detected [ 357.157783] Memory state around the buggy address: [ 357.158640] ffff888248220280: fc fc fc fc fc fc fc fc fc fc fc fc fa fb fc fc [ 357.159707] ffff888248220300: 00 00 fc fc 00 04 fc fc 00 00 fc fc fc fc fc fc [ 357.160777] >ffff888248220380: fc fc fc fc fc fc fc fc fa fb fc fc fa fb fc fc [ 357.161851] ^ [ 357.162799] ffff888248220400: fc fc fc fc 00 00 fc fc 00 00 fc fc fc fc fc fc [ 357.163892] ffff888248220480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 357.164988] ================================================================== [ 357.166314] ok 24 kmalloc_uaf [ 357.166438] ok 25 kmalloc_uaf_memset # SKIP Test requires checked mem*() [ 357.167424] ================================================================== [ 357.169672] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x47d/0x500 [kasan_test] [ 357.170848] Read of size 1 at addr ffff8882a62a9928 by task kunit_try_catch/4578 [ 357.172666] CPU: 2 UID: 0 PID: 4578 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 357.174630] Tainted: [B]=BAD_PAGE, [N]=TEST [ 357.175556] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 357.176952] Call Trace: [ 357.177767] [ 357.178549] dump_stack_lvl+0x53/0x70 [ 357.179462] print_address_description.constprop.0+0x2c/0x3a0 [ 357.180550] ? kmalloc_uaf2+0x47d/0x500 [kasan_test] [ 357.181581] print_report+0xb9/0x2b0 [ 357.182492] ? kasan_addr_to_slab+0xd/0xb0 [ 357.183444] ? kmalloc_uaf2+0x47d/0x500 [kasan_test] [ 357.184473] kasan_report+0xe8/0x120 [ 357.185386] ? kmalloc_uaf2+0x47d/0x500 [kasan_test] [ 357.186424] kmalloc_uaf2+0x47d/0x500 [kasan_test] [ 357.187450] ? __pfx_kmalloc_uaf2+0x10/0x10 [kasan_test] [ 357.188516] ? finish_task_switch.isra.0+0x155/0x750 [ 357.189546] ? __switch_to+0x5be/0xdc0 [ 357.190474] ? __schedule+0x7ec/0x1950 [ 357.191394] ? ktime_get_ts64+0x7f/0x230 [ 357.192322] kunit_try_run_case+0x1b0/0x490 [ 357.193270] ? __pfx_kunit_try_run_case+0x10/0x10 [ 357.194253] ? set_cpus_allowed_ptr+0x85/0xc0 [ 357.195200] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 357.196185] ? __pfx_kunit_try_run_case+0x10/0x10 [ 357.197148] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 357.198226] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 357.199242] kthread+0x2d8/0x3c0 [ 357.200077] ? __pfx_kthread+0x10/0x10 [ 357.200954] ret_from_fork+0x31/0x70 [ 357.201810] ? __pfx_kthread+0x10/0x10 [ 357.202674] ret_from_fork_asm+0x1a/0x30 [ 357.203553] [ 357.204932] Allocated by task 4578: [ 357.205752] kasan_save_stack+0x33/0x60 [ 357.206594] kasan_save_track+0x14/0x30 [ 357.207424] __kasan_kmalloc+0xaa/0xb0 [ 357.208242] kmalloc_uaf2+0xb8/0x500 [kasan_test] [ 357.209141] kunit_try_run_case+0x1b0/0x490 [ 357.209984] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 357.210920] kthread+0x2d8/0x3c0 [ 357.211669] ret_from_fork+0x31/0x70 [ 357.212433] ret_from_fork_asm+0x1a/0x30 [ 357.213777] Freed by task 4578: [ 357.214467] kasan_save_stack+0x33/0x60 [ 357.215202] kasan_save_track+0x14/0x30 [ 357.215939] kasan_save_free_info+0x3b/0x60 [ 357.216701] poison_slab_object+0x109/0x170 [ 357.217459] __kasan_slab_free+0x32/0x50 [ 357.218193] kfree+0x10c/0x310 [ 357.218854] kmalloc_uaf2+0x13e/0x500 [kasan_test] [ 357.219664] kunit_try_run_case+0x1b0/0x490 [ 357.220417] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 357.221270] kthread+0x2d8/0x3c0 [ 357.221946] ret_from_fork+0x31/0x70 [ 357.222645] ret_from_fork_asm+0x1a/0x30 [ 357.223886] The buggy address belongs to the object at ffff8882a62a9900 which belongs to the cache kmalloc-64 of size 64 [ 357.225697] The buggy address is located 40 bytes inside of freed 64-byte region [ffff8882a62a9900, ffff8882a62a9940) [ 357.228050] The buggy address belongs to the physical page: [ 357.228935] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 357.230027] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 357.231007] page_type: 0xfdffffff(slab) [ 357.231768] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 357.232856] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 357.233942] page dumped because: kasan: bad access detected [ 357.235436] Memory state around the buggy address: [ 357.236292] ffff8882a62a9800: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 357.237357] ffff8882a62a9880: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 357.238419] >ffff8882a62a9900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 357.239487] ^ [ 357.240342] ffff8882a62a9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 357.241430] ffff8882a62a9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 357.242516] ================================================================== [ 357.243894] ok 26 kmalloc_uaf2 [ 357.244019] ok 27 kmalloc_uaf3 # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 357.244979] ================================================================== [ 357.247264] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x18f/0x350 [kasan_test] [ 357.248499] Read of size 1 at addr ffff88a08acef140 by task kunit_try_catch/4582 [ 357.250309] CPU: 4 UID: 0 PID: 4582 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 357.252267] Tainted: [B]=BAD_PAGE, [N]=TEST [ 357.253191] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 357.254583] Call Trace: [ 357.255394] [ 357.256172] dump_stack_lvl+0x53/0x70 [ 357.257082] print_address_description.constprop.0+0x2c/0x3a0 [ 357.258167] ? kmalloc_double_kzfree+0x18f/0x350 [kasan_test] [ 357.259261] print_report+0xb9/0x2b0 [ 357.260171] ? kasan_addr_to_slab+0xd/0xb0 [ 357.261123] ? kmalloc_double_kzfree+0x18f/0x350 [kasan_test] [ 357.262218] kasan_report+0xe8/0x120 [ 357.263132] ? kmalloc_double_kzfree+0x18f/0x350 [kasan_test] [ 357.264238] ? kmalloc_double_kzfree+0x18f/0x350 [kasan_test] [ 357.265340] __kasan_check_byte+0x36/0x50 [ 357.266288] kfree_sensitive+0x1e/0x70 [ 357.267211] kmalloc_double_kzfree+0x18f/0x350 [kasan_test] [ 357.268289] ? __pfx_kmalloc_double_kzfree+0x10/0x10 [kasan_test] [ 357.269411] ? __schedule+0x7ec/0x1950 [ 357.270331] ? ktime_get_ts64+0x7f/0x230 [ 357.271262] kunit_try_run_case+0x1b0/0x490 [ 357.272206] ? __pfx_kunit_try_run_case+0x10/0x10 [ 357.273185] ? set_cpus_allowed_ptr+0x85/0xc0 [ 357.274130] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 357.275111] ? __pfx_kunit_try_run_case+0x10/0x10 [ 357.276078] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 357.277153] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 357.278170] kthread+0x2d8/0x3c0 [ 357.279010] ? __pfx_kthread+0x10/0x10 [ 357.279884] ret_from_fork+0x31/0x70 [ 357.280745] ? __pfx_kthread+0x10/0x10 [ 357.281618] ret_from_fork_asm+0x1a/0x30 [ 357.282498] [ 357.283888] Allocated by task 4582: [ 357.284711] kasan_save_stack+0x33/0x60 [ 357.285557] kasan_save_track+0x14/0x30 [ 357.286396] __kasan_kmalloc+0xaa/0xb0 [ 357.287219] kmalloc_double_kzfree+0x9c/0x350 [kasan_test] [ 357.288184] kunit_try_run_case+0x1b0/0x490 [ 357.289029] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 357.289967] kthread+0x2d8/0x3c0 [ 357.290716] ret_from_fork+0x31/0x70 [ 357.291476] ret_from_fork_asm+0x1a/0x30 [ 357.292825] Freed by task 4582: [ 357.293513] kasan_save_stack+0x33/0x60 [ 357.294264] kasan_save_track+0x14/0x30 [ 357.295011] kasan_save_free_info+0x3b/0x60 [ 357.295782] poison_slab_object+0x109/0x170 [ 357.296551] __kasan_slab_free+0x32/0x50 [ 357.297293] kfree+0x10c/0x310 [ 357.297963] kmalloc_double_kzfree+0x11e/0x350 [kasan_test] [ 357.298847] kunit_try_run_case+0x1b0/0x490 [ 357.299608] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 357.300468] kthread+0x2d8/0x3c0 [ 357.301157] ret_from_fork+0x31/0x70 [ 357.301870] ret_from_fork_asm+0x1a/0x30 [ 357.303141] The buggy address belongs to the object at ffff88a08acef140 which belongs to the cache kmalloc-16 of size 16 [ 357.304971] The buggy address is located 0 bytes inside of freed 16-byte region [ffff88a08acef140, ffff88a08acef150) [ 357.307334] The buggy address belongs to the physical page: [ 357.308223] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x208acef [ 357.309330] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 357.310315] page_type: 0xfdffffff(slab) [ 357.311082] raw: 0017ffffc0000000 ffff88810004c640 dead000000000122 0000000000000000 [ 357.312175] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 [ 357.313265] page dumped because: kasan: bad access detected [ 357.314773] Memory state around the buggy address: [ 357.315637] ffff88a08acef000: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc [ 357.316710] ffff88a08acef080: fa fb fc fc fa fb fc fc 00 07 fc fc fa fb fc fc [ 357.317781] >ffff88a08acef100: fa fb fc fc 00 04 fc fc fa fb fc fc 00 03 fc fc [ 357.318855] ^ [ 357.319784] ffff88a08acef180: fa fb fc fc fa fb fc fc 00 07 fc fc 00 03 fc fc [ 357.320879] ffff88a08acef200: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 357.321975] ================================================================== [ 357.323106] ================================================================== [ 357.324202] BUG: KASAN: double-free in kmalloc_double_kzfree+0x18f/0x350 [kasan_test] [ 357.325362] Free of addr ffff88a08acef140 by task kunit_try_catch/4582 [ 357.327050] CPU: 4 UID: 0 PID: 4582 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 357.328953] Tainted: [B]=BAD_PAGE, [N]=TEST [ 357.329849] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 357.331213] Call Trace: [ 357.331993] [ 357.332744] dump_stack_lvl+0x53/0x70 [ 357.333628] print_address_description.constprop.0+0x2c/0x3a0 [ 357.334689] ? kmalloc_double_kzfree+0x18f/0x350 [kasan_test] [ 357.335759] print_report+0xb9/0x2b0 [ 357.336647] ? kmalloc_double_kzfree+0x18f/0x350 [kasan_test] [ 357.337722] ? kasan_addr_to_slab+0xd/0xb0 [ 357.338655] ? kmalloc_double_kzfree+0x18f/0x350 [kasan_test] [ 357.339731] kasan_report_invalid_free+0xbe/0xe0 [ 357.340707] ? kmalloc_double_kzfree+0x18f/0x350 [kasan_test] [ 357.341789] ? kmalloc_double_kzfree+0x18f/0x350 [kasan_test] [ 357.342868] poison_slab_object+0x148/0x170 [ 357.343817] ? kmalloc_double_kzfree+0x18f/0x350 [kasan_test] [ 357.344899] __kasan_slab_free+0x32/0x50 [ 357.345823] kfree+0x10c/0x310 [ 357.346671] kmalloc_double_kzfree+0x18f/0x350 [kasan_test] [ 357.347731] ? __pfx_kmalloc_double_kzfree+0x10/0x10 [kasan_test] [ 357.348832] ? __schedule+0x7ec/0x1950 [ 357.349736] ? ktime_get_ts64+0x7f/0x230 [ 357.350644] kunit_try_run_case+0x1b0/0x490 [ 357.351564] ? __pfx_kunit_try_run_case+0x10/0x10 [ 357.352523] ? set_cpus_allowed_ptr+0x85/0xc0 [ 357.353446] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 357.354411] ? __pfx_kunit_try_run_case+0x10/0x10 [ 357.355354] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 357.356410] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 357.357411] kthread+0x2d8/0x3c0 [ 357.358227] ? __pfx_kthread+0x10/0x10 [ 357.359088] ret_from_fork+0x31/0x70 [ 357.359934] ? __pfx_kthread+0x10/0x10 [ 357.360783] ret_from_fork_asm+0x1a/0x30 [ 357.361639] [ 357.362994] Allocated by task 4582: [ 357.363807] kasan_save_stack+0x33/0x60 [ 357.364642] kasan_save_track+0x14/0x30 [ 357.365465] __kasan_kmalloc+0xaa/0xb0 [ 357.366273] kmalloc_double_kzfree+0x9c/0x350 [kasan_test] [ 357.367223] kunit_try_run_case+0x1b0/0x490 [ 357.368045] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 357.368964] kthread+0x2d8/0x3c0 [ 357.369694] ret_from_fork+0x31/0x70 [ 357.370439] ret_from_fork_asm+0x1a/0x30 [ 357.371784] Freed by task 4582: [ 357.372488] kasan_save_stack+0x33/0x60 [ 357.373246] kasan_save_track+0x14/0x30 [ 357.373997] kasan_save_free_info+0x3b/0x60 [ 357.374771] poison_slab_object+0x109/0x170 [ 357.375541] __kasan_slab_free+0x32/0x50 [ 357.376287] kfree+0x10c/0x310 [ 357.376958] kmalloc_double_kzfree+0x11e/0x350 [kasan_test] [ 357.377842] kunit_try_run_case+0x1b0/0x490 [ 357.378613] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 357.379484] kthread+0x2d8/0x3c0 [ 357.380172] ret_from_fork+0x31/0x70 [ 357.380884] ret_from_fork_asm+0x1a/0x30 [ 357.382155] The buggy address belongs to the object at ffff88a08acef140 which belongs to the cache kmalloc-16 of size 16 [ 357.383985] The buggy address is located 0 bytes inside of 16-byte region [ffff88a08acef140, ffff88a08acef150) [ 357.386302] The buggy address belongs to the physical page: [ 357.387188] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x208acef [ 357.388292] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 357.389275] page_type: 0xfdffffff(slab) [ 357.390040] raw: 0017ffffc0000000 ffff88810004c640 dead000000000122 0000000000000000 [ 357.391130] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 [ 357.392220] page dumped because: kasan: bad access detected [ 357.393725] Memory state around the buggy address: [ 357.394586] ffff88a08acef000: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc [ 357.395656] ffff88a08acef080: fa fb fc fc fa fb fc fc 00 07 fc fc fa fb fc fc [ 357.396724] >ffff88a08acef100: fa fb fc fc 00 04 fc fc fa fb fc fc 00 03 fc fc [ 357.397796] ^ [ 357.398721] ffff88a08acef180: fa fb fc fc fa fb fc fc 00 07 fc fc 00 03 fc fc [ 357.399814] ffff88a08acef200: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 357.400908] ================================================================== [ 357.402114] ok 28 kmalloc_double_kzfree [ 357.402179] ================================================================== [ 357.404146] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x766/0x850 [kasan_test] [ 357.405382] Read of size 1 at addr ffff88821c3a4473 by task kunit_try_catch/4584 [ 357.407190] CPU: 4 UID: 0 PID: 4584 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 357.409145] Tainted: [B]=BAD_PAGE, [N]=TEST [ 357.410068] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 357.411456] Call Trace: [ 357.412265] [ 357.413044] dump_stack_lvl+0x53/0x70 [ 357.413953] print_address_description.constprop.0+0x2c/0x3a0 [ 357.415038] ? ksize_unpoisons_memory+0x766/0x850 [kasan_test] [ 357.416140] print_report+0xb9/0x2b0 [ 357.417050] ? kasan_addr_to_slab+0xd/0xb0 [ 357.418000] ? ksize_unpoisons_memory+0x766/0x850 [kasan_test] [ 357.419100] kasan_report+0xe8/0x120 [ 357.420008] ? ksize_unpoisons_memory+0x766/0x850 [kasan_test] [ 357.421115] ksize_unpoisons_memory+0x766/0x850 [kasan_test] [ 357.422216] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [kasan_test] [ 357.423365] ? finish_task_switch.isra.0+0x155/0x750 [ 357.424405] ? __switch_to+0x5be/0xdc0 [ 357.425341] ? __schedule+0x7ec/0x1950 [ 357.426271] ? ktime_get_ts64+0x7f/0x230 [ 357.427211] kunit_try_run_case+0x1b0/0x490 [ 357.428168] ? __pfx_kunit_try_run_case+0x10/0x10 [ 357.429166] ? set_cpus_allowed_ptr+0x85/0xc0 [ 357.430127] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 357.431124] ? __pfx_kunit_try_run_case+0x10/0x10 [ 357.432100] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 357.433186] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 357.434217] kthread+0x2d8/0x3c0 [ 357.435063] ? __pfx_kthread+0x10/0x10 [ 357.435946] ret_from_fork+0x31/0x70 [ 357.436814] ? __pfx_kthread+0x10/0x10 [ 357.437686] ret_from_fork_asm+0x1a/0x30 [ 357.438576] [ 357.439993] Allocated by task 4584: [ 357.440819] kasan_save_stack+0x33/0x60 [ 357.441679] kasan_save_track+0x14/0x30 [ 357.442528] __kasan_kmalloc+0xaa/0xb0 [ 357.443361] ksize_unpoisons_memory+0xb3/0x850 [kasan_test] [ 357.444346] kunit_try_run_case+0x1b0/0x490 [ 357.445202] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 357.446150] kthread+0x2d8/0x3c0 [ 357.446914] ret_from_fork+0x31/0x70 [ 357.447693] ret_from_fork_asm+0x1a/0x30 [ 357.449065] The buggy address belongs to the object at ffff88821c3a4400 which belongs to the cache kmalloc-128 of size 128 [ 357.450985] The buggy address is located 0 bytes to the right of allocated 115-byte region [ffff88821c3a4400, ffff88821c3a4473) [ 357.453540] The buggy address belongs to the physical page: [ 357.454463] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x21c3a4 [ 357.455594] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 357.456704] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 357.457763] page_type: 0xfdffffff(slab) [ 357.458566] raw: 0017ffffc0000040 ffff88810004ca00 dead000000000122 0000000000000000 [ 357.459698] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 357.460827] head: 0017ffffc0000040 ffff88810004ca00 dead000000000122 0000000000000000 [ 357.461964] head: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 357.463098] head: 0017ffffc0000001 ffffea000870e901 ffffffffffffffff 0000000000000000 [ 357.464232] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 357.465369] page dumped because: kasan: bad access detected [ 357.466954] Memory state around the buggy address: [ 357.467854] ffff88821c3a4300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 357.468963] ffff88821c3a4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 357.470063] >ffff88821c3a4400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 357.471169] ^ [ 357.472254] ffff88821c3a4480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 357.473372] ffff88821c3a4500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 357.474491] ================================================================== [ 357.475646] ================================================================== [ 357.476768] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x74f/0x850 [kasan_test] [ 357.478016] Read of size 1 at addr ffff88821c3a4478 by task kunit_try_catch/4584 [ 357.479852] CPU: 4 UID: 0 PID: 4584 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 357.481839] Tainted: [B]=BAD_PAGE, [N]=TEST [ 357.482776] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 357.484182] Call Trace: [ 357.485006] [ 357.485794] dump_stack_lvl+0x53/0x70 [ 357.486709] print_address_description.constprop.0+0x2c/0x3a0 [ 357.487798] ? ksize_unpoisons_memory+0x74f/0x850 [kasan_test] [ 357.488901] print_report+0xb9/0x2b0 [ 357.489817] ? kasan_addr_to_slab+0xd/0xb0 [ 357.490780] ? ksize_unpoisons_memory+0x74f/0x850 [kasan_test] [ 357.491895] kasan_report+0xe8/0x120 [ 357.492815] ? ksize_unpoisons_memory+0x74f/0x850 [kasan_test] [ 357.493928] ksize_unpoisons_memory+0x74f/0x850 [kasan_test] [ 357.495024] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [kasan_test] [ 357.496164] ? finish_task_switch.isra.0+0x155/0x750 [ 357.497194] ? __switch_to+0x5be/0xdc0 [ 357.498123] ? __schedule+0x7ec/0x1950 [ 357.499040] ? ktime_get_ts64+0x7f/0x230 [ 357.499963] kunit_try_run_case+0x1b0/0x490 [ 357.500900] ? __pfx_kunit_try_run_case+0x10/0x10 [ 357.501874] ? set_cpus_allowed_ptr+0x85/0xc0 [ 357.502811] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 357.503791] ? __pfx_kunit_try_run_case+0x10/0x10 [ 357.504751] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 357.505825] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 357.506845] kthread+0x2d8/0x3c0 [ 357.507687] ? __pfx_kthread+0x10/0x10 [ 357.508563] ret_from_fork+0x31/0x70 [ 357.509419] ? __pfx_kthread+0x10/0x10 [ 357.510288] ret_from_fork_asm+0x1a/0x30 [ 357.511163] [ 357.512564] Allocated by task 4584: [ 357.513385] kasan_save_stack+0x33/0x60 [ 357.514228] kasan_save_track+0x14/0x30 [ 357.515063] __kasan_kmalloc+0xaa/0xb0 [ 357.515883] ksize_unpoisons_memory+0xb3/0x850 [kasan_test] [ 357.516869] kunit_try_run_case+0x1b0/0x490 [ 357.517727] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 357.518676] kthread+0x2d8/0x3c0 [ 357.519442] ret_from_fork+0x31/0x70 [ 357.520222] ret_from_fork_asm+0x1a/0x30 [ 357.521595] The buggy address belongs to the object at ffff88821c3a4400 which belongs to the cache kmalloc-128 of size 128 [ 357.523515] The buggy address is located 5 bytes to the right of allocated 115-byte region [ffff88821c3a4400, ffff88821c3a4473) [ 357.526074] The buggy address belongs to the physical page: [ 357.526997] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x21c3a4 [ 357.528128] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 357.529237] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 357.530296] page_type: 0xfdffffff(slab) [ 357.531098] raw: 0017ffffc0000040 ffff88810004ca00 dead000000000122 0000000000000000 [ 357.532230] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 357.533359] head: 0017ffffc0000040 ffff88810004ca00 dead000000000122 0000000000000000 [ 357.534496] head: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 357.535629] head: 0017ffffc0000001 ffffea000870e901 ffffffffffffffff 0000000000000000 [ 357.536763] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 357.537900] page dumped because: kasan: bad access detected [ 357.539483] Memory state around the buggy address: [ 357.540381] ffff88821c3a4300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 357.541488] ffff88821c3a4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 357.542588] >ffff88821c3a4400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 357.543694] ^ [ 357.544800] ffff88821c3a4480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 357.545918] ffff88821c3a4500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 357.547037] ================================================================== [ 357.548170] ================================================================== [ 357.549291] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x738/0x850 [kasan_test] [ 357.550539] Read of size 1 at addr ffff88821c3a447f by task kunit_try_catch/4584 [ 357.552373] CPU: 4 UID: 0 PID: 4584 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 357.554358] Tainted: [B]=BAD_PAGE, [N]=TEST [ 357.555296] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 357.556701] Call Trace: [ 357.557524] [ 357.558313] dump_stack_lvl+0x53/0x70 [ 357.559228] print_address_description.constprop.0+0x2c/0x3a0 [ 357.560316] ? ksize_unpoisons_memory+0x738/0x850 [kasan_test] [ 357.561419] print_report+0xb9/0x2b0 [ 357.562334] ? kasan_addr_to_slab+0xd/0xb0 [ 357.563297] ? ksize_unpoisons_memory+0x738/0x850 [kasan_test] [ 357.564413] kasan_report+0xe8/0x120 [ 357.565333] ? ksize_unpoisons_memory+0x738/0x850 [kasan_test] [ 357.566445] ksize_unpoisons_memory+0x738/0x850 [kasan_test] [ 357.567542] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [kasan_test] [ 357.568681] ? finish_task_switch.isra.0+0x155/0x750 [ 357.569712] ? __switch_to+0x5be/0xdc0 [ 357.570641] ? __schedule+0x7ec/0x1950 [ 357.571558] ? ktime_get_ts64+0x7f/0x230 [ 357.572481] kunit_try_run_case+0x1b0/0x490 [ 357.573418] ? __pfx_kunit_try_run_case+0x10/0x10 [ 357.574392] ? set_cpus_allowed_ptr+0x85/0xc0 [ 357.575329] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 357.576309] ? __pfx_kunit_try_run_case+0x10/0x10 [ 357.577269] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 357.578407] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 357.579438] kthread+0x2d8/0x3c0 [ 357.580280] ? __pfx_kthread+0x10/0x10 [ 357.581157] ret_from_fork+0x31/0x70 [ 357.582014] ? __pfx_kthread+0x10/0x10 [ 357.582883] ret_from_fork_asm+0x1a/0x30 [ 357.583759] [ 357.585160] Allocated by task 4584: [ 357.585981] kasan_save_stack+0x33/0x60 [ 357.586823] kasan_save_track+0x14/0x30 [ 357.587658] __kasan_kmalloc+0xaa/0xb0 [ 357.588479] ksize_unpoisons_memory+0xb3/0x850 [kasan_test] [ 357.589465] kunit_try_run_case+0x1b0/0x490 [ 357.590324] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 357.591274] kthread+0x2d8/0x3c0 [ 357.592040] ret_from_fork+0x31/0x70 [ 357.592821] ret_from_fork_asm+0x1a/0x30 [ 357.594194] The buggy address belongs to the object at ffff88821c3a4400 which belongs to the cache kmalloc-128 of size 128 [ 357.596114] The buggy address is located 12 bytes to the right of allocated 115-byte region [ffff88821c3a4400, ffff88821c3a4473) [ 357.598679] The buggy address belongs to the physical page: [ 357.599603] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x21c3a4 [ 357.600734] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 357.601845] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 357.602904] page_type: 0xfdffffff(slab) [ 357.603707] raw: 0017ffffc0000040 ffff88810004ca00 dead000000000122 0000000000000000 [ 357.604839] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 357.605969] head: 0017ffffc0000040 ffff88810004ca00 dead000000000122 0000000000000000 [ 357.607107] head: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 357.608241] head: 0017ffffc0000001 ffffea000870e901 ffffffffffffffff 0000000000000000 [ 357.609375] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 357.610512] page dumped because: kasan: bad access detected [ 357.612096] Memory state around the buggy address: [ 357.612994] ffff88821c3a4300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 357.614103] ffff88821c3a4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 357.615204] >ffff88821c3a4400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 357.616310] ^ [ 357.617417] ffff88821c3a4480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 357.618537] ffff88821c3a4500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 357.619655] ================================================================== [ 357.621033] ok 29 ksize_unpoisons_memory [ 357.621103] ================================================================== [ 357.623138] BUG: KASAN: slab-use-after-free in ksize_uaf+0x18f/0x6c0 [kasan_test] [ 357.624319] Read of size 1 at addr ffff88821c3a4200 by task kunit_try_catch/4589 [ 357.626192] CPU: 4 UID: 0 PID: 4589 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 357.628216] Tainted: [B]=BAD_PAGE, [N]=TEST [ 357.629174] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 357.630598] Call Trace: [ 357.631436] [ 357.632238] dump_stack_lvl+0x53/0x70 [ 357.633170] print_address_description.constprop.0+0x2c/0x3a0 [ 357.634274] ? ksize_uaf+0x18f/0x6c0 [kasan_test] [ 357.635303] print_report+0xb9/0x2b0 [ 357.636236] ? kasan_addr_to_slab+0xd/0xb0 [ 357.637214] ? ksize_uaf+0x18f/0x6c0 [kasan_test] [ 357.638243] kasan_report+0xe8/0x120 [ 357.639168] ? ksize_uaf+0x18f/0x6c0 [kasan_test] [ 357.640188] ? ksize_uaf+0x18f/0x6c0 [kasan_test] [ 357.641197] __kasan_check_byte+0x36/0x50 [ 357.642138] ksize+0x1d/0x50 [ 357.642982] ksize_uaf+0x18f/0x6c0 [kasan_test] [ 357.643959] ? __pfx_ksize_uaf+0x10/0x10 [kasan_test] [ 357.644973] ? __schedule+0x7ec/0x1950 [ 357.645866] ? ktime_get_ts64+0x7f/0x230 [ 357.646767] kunit_try_run_case+0x1b0/0x490 [ 357.647681] ? __pfx_kunit_try_run_case+0x10/0x10 [ 357.648638] ? set_cpus_allowed_ptr+0x85/0xc0 [ 357.649561] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 357.650527] ? __pfx_kunit_try_run_case+0x10/0x10 [ 357.651477] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 357.652542] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 357.653546] kthread+0x2d8/0x3c0 [ 357.654369] ? __pfx_kthread+0x10/0x10 [ 357.655233] ret_from_fork+0x31/0x70 [ 357.656074] ? __pfx_kthread+0x10/0x10 [ 357.656934] ret_from_fork_asm+0x1a/0x30 [ 357.657802] [ 357.659155] Allocated by task 4589: [ 357.659957] kasan_save_stack+0x33/0x60 [ 357.660783] kasan_save_track+0x14/0x30 [ 357.661596] __kasan_kmalloc+0xaa/0xb0 [ 357.662395] ksize_uaf+0x9c/0x6c0 [kasan_test] [ 357.663251] kunit_try_run_case+0x1b0/0x490 [ 357.664071] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 357.664984] kthread+0x2d8/0x3c0 [ 357.665709] ret_from_fork+0x31/0x70 [ 357.666444] ret_from_fork_asm+0x1a/0x30 [ 357.667743] Freed by task 4589: [ 357.668407] kasan_save_stack+0x33/0x60 [ 357.669133] kasan_save_track+0x14/0x30 [ 357.669856] kasan_save_free_info+0x3b/0x60 [ 357.670601] poison_slab_object+0x109/0x170 [ 357.671343] __kasan_slab_free+0x32/0x50 [ 357.672063] kfree+0x10c/0x310 [ 357.672712] ksize_uaf+0x11e/0x6c0 [kasan_test] [ 357.673486] kunit_try_run_case+0x1b0/0x490 [ 357.674225] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 357.675067] kthread+0x2d8/0x3c0 [ 357.675737] ret_from_fork+0x31/0x70 [ 357.676432] ret_from_fork_asm+0x1a/0x30 [ 357.677672] The buggy address belongs to the object at ffff88821c3a4200 which belongs to the cache kmalloc-128 of size 128 [ 357.679494] The buggy address is located 0 bytes inside of freed 128-byte region [ffff88821c3a4200, ffff88821c3a4280) [ 357.681839] The buggy address belongs to the physical page: [ 357.682718] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x21c3a4 [ 357.683808] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 357.684876] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 357.685894] page_type: 0xfdffffff(slab) [ 357.686656] raw: 0017ffffc0000040 ffff88810004ca00 dead000000000122 0000000000000000 [ 357.687747] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 357.688843] head: 0017ffffc0000040 ffff88810004ca00 dead000000000122 0000000000000000 [ 357.689950] head: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 357.691060] head: 0017ffffc0000001 ffffea000870e901 ffffffffffffffff 0000000000000000 [ 357.692172] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 357.693285] page dumped because: kasan: bad access detected [ 357.694829] Memory state around the buggy address: [ 357.695711] ffff88821c3a4100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 357.696806] ffff88821c3a4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 357.697906] >ffff88821c3a4200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 357.699006] ^ [ 357.699785] ffff88821c3a4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 357.700900] ffff88821c3a4300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 357.702009] ================================================================== [ 357.703143] ================================================================== [ 357.704258] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fb/0x6c0 [kasan_test] [ 357.705412] Read of size 1 at addr ffff88821c3a4200 by task kunit_try_catch/4589 [ 357.707227] CPU: 4 UID: 0 PID: 4589 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 357.709195] Tainted: [B]=BAD_PAGE, [N]=TEST [ 357.710122] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 357.711515] Call Trace: [ 357.712326] [ 357.713104] dump_stack_lvl+0x53/0x70 [ 357.714011] print_address_description.constprop.0+0x2c/0x3a0 [ 357.715093] ? ksize_uaf+0x5fb/0x6c0 [kasan_test] [ 357.716095] print_report+0xb9/0x2b0 [ 357.717000] ? kasan_addr_to_slab+0xd/0xb0 [ 357.717952] ? ksize_uaf+0x5fb/0x6c0 [kasan_test] [ 357.718959] kasan_report+0xe8/0x120 [ 357.719862] ? ksize_uaf+0x5fb/0x6c0 [kasan_test] [ 357.720860] ksize_uaf+0x5fb/0x6c0 [kasan_test] [ 357.721842] ? __pfx_ksize_uaf+0x10/0x10 [kasan_test] [ 357.722863] ? __schedule+0x7ec/0x1950 [ 357.723767] ? ktime_get_ts64+0x7f/0x230 [ 357.724681] kunit_try_run_case+0x1b0/0x490 [ 357.725608] ? __pfx_kunit_try_run_case+0x10/0x10 [ 357.726573] ? set_cpus_allowed_ptr+0x85/0xc0 [ 357.727500] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 357.728464] ? __pfx_kunit_try_run_case+0x10/0x10 [ 357.729405] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 357.730462] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 357.731461] kthread+0x2d8/0x3c0 [ 357.732280] ? __pfx_kthread+0x10/0x10 [ 357.733140] ret_from_fork+0x31/0x70 [ 357.733983] ? __pfx_kthread+0x10/0x10 [ 357.734832] ret_from_fork_asm+0x1a/0x30 [ 357.735691] [ 357.737045] Allocated by task 4589: [ 357.737848] kasan_save_stack+0x33/0x60 [ 357.738678] kasan_save_track+0x14/0x30 [ 357.739495] __kasan_kmalloc+0xaa/0xb0 [ 357.740296] ksize_uaf+0x9c/0x6c0 [kasan_test] [ 357.741165] kunit_try_run_case+0x1b0/0x490 [ 357.741999] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 357.742942] kthread+0x2d8/0x3c0 [ 357.743700] ret_from_fork+0x31/0x70 [ 357.744477] ret_from_fork_asm+0x1a/0x30 [ 357.745853] Freed by task 4589: [ 357.746552] kasan_save_stack+0x33/0x60 [ 357.747307] kasan_save_track+0x14/0x30 [ 357.748044] kasan_save_free_info+0x3b/0x60 [ 357.748795] poison_slab_object+0x109/0x170 [ 357.749551] __kasan_slab_free+0x32/0x50 [ 357.750286] kfree+0x10c/0x310 [ 357.750945] ksize_uaf+0x11e/0x6c0 [kasan_test] [ 357.751728] kunit_try_run_case+0x1b0/0x490 [ 357.752476] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 357.753327] kthread+0x2d8/0x3c0 [ 357.754000] ret_from_fork+0x31/0x70 [ 357.754699] ret_from_fork_asm+0x1a/0x30 [ 357.755944] The buggy address belongs to the object at ffff88821c3a4200 which belongs to the cache kmalloc-128 of size 128 [ 357.757770] The buggy address is located 0 bytes inside of freed 128-byte region [ffff88821c3a4200, ffff88821c3a4280) [ 357.760119] The buggy address belongs to the physical page: [ 357.761002] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x21c3a4 [ 357.762093] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 357.763164] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 357.764185] page_type: 0xfdffffff(slab) [ 357.764948] raw: 0017ffffc0000040 ffff88810004ca00 dead000000000122 0000000000000000 [ 357.766041] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 357.767137] head: 0017ffffc0000040 ffff88810004ca00 dead000000000122 0000000000000000 [ 357.768245] head: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 357.769356] head: 0017ffffc0000001 ffffea000870e901 ffffffffffffffff 0000000000000000 [ 357.770469] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 357.771584] page dumped because: kasan: bad access detected [ 357.773131] Memory state around the buggy address: [ 357.774014] ffff88821c3a4100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 357.775111] ffff88821c3a4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 357.776211] >ffff88821c3a4200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 357.777313] ^ [ 357.778093] ffff88821c3a4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 357.779212] ffff88821c3a4300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 357.780322] ================================================================== [ 357.781447] ================================================================== [ 357.782564] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e1/0x6c0 [kasan_test] [ 357.783715] Read of size 1 at addr ffff88821c3a4278 by task kunit_try_catch/4589 [ 357.785530] CPU: 4 UID: 0 PID: 4589 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 357.787497] Tainted: [B]=BAD_PAGE, [N]=TEST [ 357.788425] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 357.789819] Call Trace: [ 357.790629] [ 357.791407] dump_stack_lvl+0x53/0x70 [ 357.792313] print_address_description.constprop.0+0x2c/0x3a0 [ 357.793394] ? ksize_uaf+0x5e1/0x6c0 [kasan_test] [ 357.794395] print_report+0xb9/0x2b0 [ 357.795299] ? kasan_addr_to_slab+0xd/0xb0 [ 357.796251] ? ksize_uaf+0x5e1/0x6c0 [kasan_test] [ 357.797259] kasan_report+0xe8/0x120 [ 357.798164] ? ksize_uaf+0x5e1/0x6c0 [kasan_test] [ 357.799164] ksize_uaf+0x5e1/0x6c0 [kasan_test] [ 357.800145] ? __pfx_ksize_uaf+0x10/0x10 [kasan_test] [ 357.801167] ? __schedule+0x7ec/0x1950 [ 357.802072] ? ktime_get_ts64+0x7f/0x230 [ 357.802987] kunit_try_run_case+0x1b0/0x490 [ 357.803913] ? __pfx_kunit_try_run_case+0x10/0x10 [ 357.804877] ? set_cpus_allowed_ptr+0x85/0xc0 [ 357.805803] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 357.806767] ? __pfx_kunit_try_run_case+0x10/0x10 [ 357.807708] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 357.808765] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 357.809763] kthread+0x2d8/0x3c0 [ 357.810582] ? __pfx_kthread+0x10/0x10 [ 357.811443] ret_from_fork+0x31/0x70 [ 357.812288] ? __pfx_kthread+0x10/0x10 [ 357.813137] ret_from_fork_asm+0x1a/0x30 [ 357.813997] [ 357.815351] Allocated by task 4589: [ 357.816153] kasan_save_stack+0x33/0x60 [ 357.816983] kasan_save_track+0x14/0x30 [ 357.817799] __kasan_kmalloc+0xaa/0xb0 [ 357.818598] ksize_uaf+0x9c/0x6c0 [kasan_test] [ 357.819466] kunit_try_run_case+0x1b0/0x490 [ 357.820301] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 357.821243] kthread+0x2d8/0x3c0 [ 357.822001] ret_from_fork+0x31/0x70 [ 357.822778] ret_from_fork_asm+0x1a/0x30 [ 357.824156] Freed by task 4589: [ 357.824856] kasan_save_stack+0x33/0x60 [ 357.825609] kasan_save_track+0x14/0x30 [ 357.826346] kasan_save_free_info+0x3b/0x60 [ 357.827098] poison_slab_object+0x109/0x170 [ 357.827852] __kasan_slab_free+0x32/0x50 [ 357.828587] kfree+0x10c/0x310 [ 357.829245] ksize_uaf+0x11e/0x6c0 [kasan_test] [ 357.830027] kunit_try_run_case+0x1b0/0x490 [ 357.830776] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 357.831625] kthread+0x2d8/0x3c0 [ 357.832298] ret_from_fork+0x31/0x70 [ 357.832995] ret_from_fork_asm+0x1a/0x30 [ 357.834237] The buggy address belongs to the object at ffff88821c3a4200 which belongs to the cache kmalloc-128 of size 128 [ 357.836063] The buggy address is located 120 bytes inside of freed 128-byte region [ffff88821c3a4200, ffff88821c3a4280) [ 357.838425] The buggy address belongs to the physical page: [ 357.839305] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x21c3a4 [ 357.840395] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 357.841465] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 357.842483] page_type: 0xfdffffff(slab) [ 357.843245] raw: 0017ffffc0000040 ffff88810004ca00 dead000000000122 0000000000000000 [ 357.844336] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 357.845431] head: 0017ffffc0000040 ffff88810004ca00 dead000000000122 0000000000000000 [ 357.846538] head: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 357.847647] head: 0017ffffc0000001 ffffea000870e901 ffffffffffffffff 0000000000000000 [ 357.848759] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 357.849873] page dumped because: kasan: bad access detected [ 357.851420] Memory state around the buggy address: [ 357.852301] ffff88821c3a4100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 357.853397] ffff88821c3a4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 357.854496] >ffff88821c3a4200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 357.855597] ^ [ 357.856701] ffff88821c3a4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 357.857818] ffff88821c3a4300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 357.858928] ================================================================== [ 357.860151] ok 30 ksize_uaf [ 357.863733] ================================================================== [ 357.865666] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x49/0x50 [kasan_test] [ 357.866872] Read of size 4 at addr ffff88a083ff7740 by task swapper/4/0 [ 357.868674] CPU: 4 UID: 0 PID: 0 Comm: swapper/4 Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 357.870094] Tainted: [B]=BAD_PAGE, [N]=TEST [ 357.871033] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 357.872439] Call Trace: [ 357.873262] [ 357.874045] dump_stack_lvl+0x53/0x70 [ 357.874965] print_address_description.constprop.0+0x2c/0x3a0 [ 357.876058] ? rcu_uaf_reclaim+0x49/0x50 [kasan_test] [ 357.877099] print_report+0xb9/0x2b0 [ 357.878017] ? kasan_addr_to_slab+0xd/0xb0 [ 357.878982] ? rcu_uaf_reclaim+0x49/0x50 [kasan_test] [ 357.880032] kasan_report+0xe8/0x120 [ 357.880951] ? rcu_uaf_reclaim+0x49/0x50 [kasan_test] [ 357.881994] rcu_uaf_reclaim+0x49/0x50 [kasan_test] [ 357.883021] rcu_do_batch+0x388/0xde0 [ 357.883940] ? __pfx_rcu_do_batch+0x10/0x10 [ 357.884894] ? __note_gp_changes+0x5c6/0x830 [ 357.885852] ? __pfx_sched_clock_cpu+0x10/0x10 [ 357.886816] rcu_core+0x419/0xea0 [ 357.887678] ? irqtime_account_irq+0x51/0x200 [ 357.888618] handle_softirqs+0x1d3/0x630 [ 357.889517] ? hrtimer_interrupt+0x319/0x7c0 [ 357.890436] ? __pfx_handle_softirqs+0x10/0x10 [ 357.891367] ? irqtime_account_irq+0x51/0x200 [ 357.892287] __irq_exit_rcu+0x125/0x170 [ 357.893161] sysvec_apic_timer_interrupt+0x6f/0x90 [ 357.894115] [ 357.894844] [ 357.895560] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 357.896529] RIP: 0010:cpuidle_enter_state+0x1c0/0x4d0 [ 357.897491] Code: 7c 2b 30 00 0f 84 52 01 00 00 41 83 ec 01 73 dd 48 83 c4 20 44 89 e8 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc fb 45 85 ed <0f> 89 22 ff ff ff 48 c7 43 18 00 00 00 00 49 83 fc 09 0f 87 49 02 [ 357.900093] RSP: 0000:ffffc90000247d88 EFLAGS: 00000202 [ 357.901106] RAX: 0000000000000000 RBX: ffff889fc344fd58 RCX: 0000000000000000 [ 357.902271] RDX: 1ffff113f8688b49 RSI: 0000000000000004 RDI: ffff889fc3445a48 [ 357.903432] RBP: ffffffff85c36960 R08: 0000000000000000 R09: ffffed13f8687f65 [ 357.904600] R10: ffff889fc343fb2b R11: 0000000000000018 R12: 0000000000000002 [ 357.905762] R13: 0000000000000002 R14: 0000005352572493 R15: 0000000000000000 [ 357.906920] ? cpuidle_enter_state+0xd7/0x4d0 [ 357.907847] cpuidle_enter+0x4e/0xa0 [ 357.908702] cpuidle_idle_call+0x1ad/0x270 [ 357.909590] ? __pfx_cpuidle_idle_call+0x10/0x10 [ 357.910516] ? check_tsc_sync_source+0x320/0x320 [ 357.911433] do_idle+0xe3/0x190 [ 357.912216] cpu_startup_entry+0x54/0x60 [ 357.913050] start_secondary+0x21a/0x2a0 [ 357.913870] ? __pfx_start_secondary+0x10/0x10 [ 357.914737] ? startup_64_load_idt+0xc1/0xf0 [ 357.915592] common_startup_64+0x13e/0x141 [ 357.916431] [ 357.917713] Allocated by task 4591: [ 357.918487] kasan_save_stack+0x33/0x60 [ 357.919290] kasan_save_track+0x14/0x30 [ 357.920086] __kasan_kmalloc+0xaa/0xb0 [ 357.920874] rcu_uaf+0xa3/0x320 [kasan_test] [ 357.921707] kunit_try_run_case+0x1b0/0x490 [ 357.922527] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 357.923449] kthread+0x2d8/0x3c0 [ 357.924195] ret_from_fork+0x31/0x70 [ 357.924967] ret_from_fork_asm+0x1a/0x30 [ 357.926359] Freed by task 0: [ 357.927067] kasan_save_stack+0x33/0x60 [ 357.927852] kasan_save_track+0x14/0x30 [ 357.928634] kasan_save_free_info+0x3b/0x60 [ 357.929443] poison_slab_object+0x109/0x170 [ 357.930251] __kasan_slab_free+0x32/0x50 [ 357.931036] kfree+0x10c/0x310 [ 357.931748] rcu_uaf_reclaim+0x1a/0x50 [kasan_test] [ 357.932623] rcu_do_batch+0x388/0xde0 [ 357.933390] rcu_core+0x419/0xea0 [ 357.934123] handle_softirqs+0x1d3/0x630 [ 357.934888] __irq_exit_rcu+0x125/0x170 [ 357.935624] sysvec_apic_timer_interrupt+0x6f/0x90 [ 357.936429] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 357.937784] Last potentially related work creation: [ 357.938589] kasan_save_stack+0x33/0x60 [ 357.939309] __kasan_record_aux_stack+0xad/0xc0 [ 357.940086] __call_rcu_common.constprop.0+0xc3/0x9e0 [ 357.940900] rcu_uaf+0x15b/0x320 [kasan_test] [ 357.941664] kunit_try_run_case+0x1b0/0x490 [ 357.942410] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 357.943256] kthread+0x2d8/0x3c0 [ 357.943925] ret_from_fork+0x31/0x70 [ 357.944620] ret_from_fork_asm+0x1a/0x30 [ 357.945860] The buggy address belongs to the object at ffff88a083ff7740 which belongs to the cache kmalloc-32 of size 32 [ 357.947675] The buggy address is located 0 bytes inside of freed 32-byte region [ffff88a083ff7740, ffff88a083ff7760) [ 357.950026] The buggy address belongs to the physical page: [ 357.950917] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2083ff7 [ 357.952028] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 357.953022] page_type: 0xfdffffff(slab) [ 357.953799] raw: 0017ffffc0000000 ffff88810004c780 dead000000000122 0000000000000000 [ 357.954906] raw: 0000000000000000 0000000080400040 00000001fdffffff 0000000000000000 [ 357.956014] page dumped because: kasan: bad access detected [ 357.957548] Memory state around the buggy address: [ 357.958423] ffff88a083ff7600: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 357.959511] ffff88a083ff7680: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 357.960595] >ffff88a083ff7700: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 357.961677] ^ [ 357.962614] ffff88a083ff7780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 357.963721] ffff88a083ff7800: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 357.964828] ================================================================== [ 357.980421] ok 31 rcu_uaf [ 357.980774] ================================================================== [ 357.982685] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x4c3/0x540 [kasan_test] [ 357.983883] Read of size 8 at addr ffff88a090a622c0 by task kunit_try_catch/4594 [ 357.985722] CPU: 5 UID: 0 PID: 4594 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 357.987706] Tainted: [B]=BAD_PAGE, [N]=TEST [ 357.988639] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 357.990036] Call Trace: [ 357.990847] [ 357.991624] dump_stack_lvl+0x53/0x70 [ 357.992530] print_address_description.constprop.0+0x2c/0x3a0 [ 357.993610] ? workqueue_uaf+0x4c3/0x540 [kasan_test] [ 357.994640] print_report+0xb9/0x2b0 [ 357.995542] ? kasan_addr_to_slab+0xd/0xb0 [ 357.996487] ? workqueue_uaf+0x4c3/0x540 [kasan_test] [ 357.997515] kasan_report+0xe8/0x120 [ 357.998415] ? workqueue_uaf+0x4c3/0x540 [kasan_test] [ 357.999447] workqueue_uaf+0x4c3/0x540 [kasan_test] [ 358.000469] ? __switch_to+0x5be/0xdc0 [ 358.001396] ? __pfx_workqueue_uaf+0x10/0x10 [kasan_test] [ 358.002459] ? __schedule+0x7ec/0x1950 [ 358.003379] ? ktime_get_ts64+0x7f/0x230 [ 358.004307] kunit_try_run_case+0x1b0/0x490 [ 358.005254] ? __pfx_kunit_try_run_case+0x10/0x10 [ 358.006238] ? set_cpus_allowed_ptr+0x85/0xc0 [ 358.007192] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 358.008179] ? __pfx_kunit_try_run_case+0x10/0x10 [ 358.009144] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 358.010221] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 358.011236] kthread+0x2d8/0x3c0 [ 358.012073] ? __pfx_kthread+0x10/0x10 [ 358.012945] ret_from_fork+0x31/0x70 [ 358.013797] ? __pfx_kthread+0x10/0x10 [ 358.014661] ret_from_fork_asm+0x1a/0x30 [ 358.015532] [ 358.016928] Allocated by task 4594: [ 358.017751] kasan_save_stack+0x33/0x60 [ 358.018595] kasan_save_track+0x14/0x30 [ 358.019437] __kasan_kmalloc+0xaa/0xb0 [ 358.020265] workqueue_uaf+0x13f/0x540 [kasan_test] [ 358.021185] kunit_try_run_case+0x1b0/0x490 [ 358.022035] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 358.022978] kthread+0x2d8/0x3c0 [ 358.023736] ret_from_fork+0x31/0x70 [ 358.024513] ret_from_fork_asm+0x1a/0x30 [ 358.025875] Freed by task 375: [ 358.026572] kasan_save_stack+0x33/0x60 [ 358.027321] kasan_save_track+0x14/0x30 [ 358.028053] kasan_save_free_info+0x3b/0x60 [ 358.028816] poison_slab_object+0x109/0x170 [ 358.029579] __kasan_slab_free+0x32/0x50 [ 358.030317] kfree+0x10c/0x310 [ 358.030981] process_one_work+0x676/0x1000 [ 358.031729] worker_thread+0x714/0xf50 [ 358.032447] kthread+0x2d8/0x3c0 [ 358.033118] ret_from_fork+0x31/0x70 [ 358.033815] ret_from_fork_asm+0x1a/0x30 [ 358.035051] Last potentially related work creation: [ 358.035847] kasan_save_stack+0x33/0x60 [ 358.036557] __kasan_record_aux_stack+0xad/0xc0 [ 358.037323] insert_work+0x2d/0x230 [ 358.038006] __queue_work.part.0+0x509/0x940 [ 358.038753] queue_work_on+0x62/0x70 [ 358.039441] workqueue_uaf+0x257/0x540 [kasan_test] [ 358.040244] kunit_try_run_case+0x1b0/0x490 [ 358.040982] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 358.041823] kthread+0x2d8/0x3c0 [ 358.042485] ret_from_fork+0x31/0x70 [ 358.043168] ret_from_fork_asm+0x1a/0x30 [ 358.044380] The buggy address belongs to the object at ffff88a090a622c0 which belongs to the cache kmalloc-32 of size 32 [ 358.046170] The buggy address is located 0 bytes inside of freed 32-byte region [ffff88a090a622c0, ffff88a090a622e0) [ 358.048488] The buggy address belongs to the physical page: [ 358.049368] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2090a62 [ 358.050467] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 358.051449] page_type: 0xfdffffff(slab) [ 358.052215] raw: 0017ffffc0000000 ffff88810004c780 dead000000000122 0000000000000000 [ 358.053310] raw: 0000000000000000 0000000080400040 00000001fdffffff 0000000000000000 [ 358.054405] page dumped because: kasan: bad access detected [ 358.055912] Memory state around the buggy address: [ 358.056774] ffff88a090a62180: fc fc fc fc fc fc fc fc 00 00 00 07 fc fc fc fc [ 358.057849] ffff88a090a62200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 358.058923] >ffff88a090a62280: fc fc fc fc fc fc fc fc fa fb fb fb fc fc fc fc [ 358.059995] ^ [ 358.060919] ffff88a090a62300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 358.062014] ffff88a090a62380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 358.063105] ================================================================== [ 358.064398] ok 32 workqueue_uaf [ 358.064565] ok 33 kfree_via_page [ 358.065487] ok 34 kfree_via_phys [ 358.066481] ================================================================== [ 358.068398] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x370/0x470 [kasan_test] [ 358.069576] Read of size 1 at addr ffff8882d73742d8 by task kunit_try_catch/4601 [ 358.071383] CPU: 7 UID: 0 PID: 4601 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 358.073332] Tainted: [B]=BAD_PAGE, [N]=TEST [ 358.074248] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 358.075629] Call Trace: [ 358.076425] [ 358.077189] dump_stack_lvl+0x53/0x70 [ 358.078083] print_address_description.constprop.0+0x2c/0x3a0 [ 358.079153] ? kmem_cache_oob+0x370/0x470 [kasan_test] [ 358.080179] print_report+0xb9/0x2b0 [ 358.081070] ? kasan_addr_to_slab+0xd/0xb0 [ 358.082004] ? kmem_cache_oob+0x370/0x470 [kasan_test] [ 358.083031] kasan_report+0xe8/0x120 [ 358.083930] ? kmem_cache_oob+0x370/0x470 [kasan_test] [ 358.084966] kmem_cache_oob+0x370/0x470 [kasan_test] [ 358.085984] ? __switch_to+0x5be/0xdc0 [ 358.086895] ? __pfx_kmem_cache_oob+0x10/0x10 [kasan_test] [ 358.087952] ? __schedule+0x7ec/0x1950 [ 358.088857] ? ktime_get_ts64+0x7f/0x230 [ 358.089772] kunit_try_run_case+0x1b0/0x490 [ 358.090706] ? __pfx_kunit_try_run_case+0x10/0x10 [ 358.091674] ? set_cpus_allowed_ptr+0x85/0xc0 [ 358.092605] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 358.093575] ? __pfx_kunit_try_run_case+0x10/0x10 [ 358.094522] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 358.095583] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 358.096644] kthread+0x2d8/0x3c0 [ 358.097511] ? __pfx_kthread+0x10/0x10 [ 358.098385] ret_from_fork+0x31/0x70 [ 358.099222] ? __pfx_kthread+0x10/0x10 [ 358.100075] ret_from_fork_asm+0x1a/0x30 [ 358.100983] [ 358.102342] Allocated by task 4601: [ 358.103156] kasan_save_stack+0x33/0x60 [ 358.103992] kasan_save_track+0x14/0x30 [ 358.104815] __kasan_slab_alloc+0x89/0x90 [ 358.105655] kmem_cache_alloc_noprof+0x10e/0x380 [ 358.106551] kmem_cache_oob+0x113/0x470 [kasan_test] [ 358.107473] kunit_try_run_case+0x1b0/0x490 [ 358.108319] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 358.109258] kthread+0x2d8/0x3c0 [ 358.110012] ret_from_fork+0x31/0x70 [ 358.110782] ret_from_fork_asm+0x1a/0x30 [ 358.112133] The buggy address belongs to the object at ffff8882d7374210 which belongs to the cache test_cache of size 200 [ 358.114022] The buggy address is located 0 bytes to the right of allocated 200-byte region [ffff8882d7374210, ffff8882d73742d8) [ 358.116545] The buggy address belongs to the physical page: [ 358.117457] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2d7374 [ 358.118578] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 358.119678] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 358.120728] page_type: 0xfdffffff(slab) [ 358.121523] raw: 0017ffffc0000040 ffff888272645900 dead000000000122 0000000000000000 [ 358.122647] raw: 0000000000000000 00000000801f001f 00000001fdffffff 0000000000000000 [ 358.123771] head: 0017ffffc0000040 ffff888272645900 dead000000000122 0000000000000000 [ 358.124903] head: 0000000000000000 00000000801f001f 00000001fdffffff 0000000000000000 [ 358.126036] head: 0017ffffc0000001 ffffea000b5cdd01 ffffffffffffffff 0000000000000000 [ 358.127167] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 358.128299] page dumped because: kasan: bad access detected [ 358.129995] Memory state around the buggy address: [ 358.130891] ffff8882d7374180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 358.131993] ffff8882d7374200: fc fc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 358.133103] >ffff8882d7374280: 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc [ 358.134245] ^ [ 358.135261] ffff8882d7374300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 358.136377] ffff8882d7374380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 358.137487] ================================================================== [ 358.508931] ok 35 kmem_cache_oob [ 358.509151] ================================================================== [ 358.511130] BUG: KASAN: double-free in kmem_cache_double_free+0x195/0x400 [kasan_test] [ 358.512344] Free of addr ffff8882a639ec60 by task kunit_try_catch/4603 [ 358.514136] CPU: 3 UID: 0 PID: 4603 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 358.516145] Tainted: [B]=BAD_PAGE, [N]=TEST [ 358.517094] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 358.518509] Call Trace: [ 358.519338] [ 358.520141] dump_stack_lvl+0x53/0x70 [ 358.521080] print_address_description.constprop.0+0x2c/0x3a0 [ 358.522180] ? kmem_cache_double_free+0x195/0x400 [kasan_test] [ 358.523296] print_report+0xb9/0x2b0 [ 358.524225] ? kmem_cache_double_free+0x195/0x400 [kasan_test] [ 358.525351] ? kasan_addr_to_slab+0xd/0xb0 [ 358.526327] ? kmem_cache_double_free+0x195/0x400 [kasan_test] [ 358.527449] kasan_report_invalid_free+0xbe/0xe0 [ 358.528465] ? kmem_cache_double_free+0x195/0x400 [kasan_test] [ 358.529586] ? kmem_cache_double_free+0x195/0x400 [kasan_test] [ 358.530694] poison_slab_object+0x148/0x170 [ 358.531660] ? kmem_cache_double_free+0x195/0x400 [kasan_test] [ 358.532764] __kasan_slab_free+0x32/0x50 [ 358.533700] kmem_cache_free+0x109/0x430 [ 358.534630] kmem_cache_double_free+0x195/0x400 [kasan_test] [ 358.535702] ? __pfx_kmem_cache_double_free+0x10/0x10 [kasan_test] [ 358.536812] ? __schedule+0x7ec/0x1950 [ 358.537717] ? ktime_get_ts64+0x7f/0x230 [ 358.538632] kunit_try_run_case+0x1b0/0x490 [ 358.539566] ? __pfx_kunit_try_run_case+0x10/0x10 [ 358.540542] ? set_cpus_allowed_ptr+0x85/0xc0 [ 358.541491] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 358.542475] ? __pfx_kunit_try_run_case+0x10/0x10 [ 358.543440] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 358.544522] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 358.545541] kthread+0x2d8/0x3c0 [ 358.546379] ? __pfx_kthread+0x10/0x10 [ 358.547260] ret_from_fork+0x31/0x70 [ 358.548116] ? __pfx_kthread+0x10/0x10 [ 358.548976] ret_from_fork_asm+0x1a/0x30 [ 358.549857] [ 358.551242] Allocated by task 4603: [ 358.552056] kasan_save_stack+0x33/0x60 [ 358.552891] kasan_save_track+0x14/0x30 [ 358.553713] __kasan_slab_alloc+0x89/0x90 [ 358.554542] kmem_cache_alloc_noprof+0x10e/0x380 [ 358.555410] kmem_cache_double_free+0x10a/0x400 [kasan_test] [ 358.556356] kunit_try_run_case+0x1b0/0x490 [ 358.557174] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 358.558081] kthread+0x2d8/0x3c0 [ 358.558798] ret_from_fork+0x31/0x70 [ 358.559546] ret_from_fork_asm+0x1a/0x30 [ 358.560888] Freed by task 4603: [ 358.561588] kasan_save_stack+0x33/0x60 [ 358.562342] kasan_save_track+0x14/0x30 [ 358.563088] kasan_save_free_info+0x3b/0x60 [ 358.563859] poison_slab_object+0x109/0x170 [ 358.564624] __kasan_slab_free+0x32/0x50 [ 358.565365] kmem_cache_free+0x109/0x430 [ 358.566101] kmem_cache_double_free+0x121/0x400 [kasan_test] [ 358.566993] kunit_try_run_case+0x1b0/0x490 [ 358.567757] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 358.568619] kthread+0x2d8/0x3c0 [ 358.569300] ret_from_fork+0x31/0x70 [ 358.570007] ret_from_fork_asm+0x1a/0x30 [ 358.571265] The buggy address belongs to the object at ffff8882a639ec60 which belongs to the cache test_cache of size 200 [ 358.573095] The buggy address is located 0 bytes inside of 200-byte region [ffff8882a639ec60, ffff8882a639ed28) [ 358.575411] The buggy address belongs to the physical page: [ 358.576294] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a639e [ 358.577389] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 358.578460] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 358.579479] page_type: 0xfdffffff(slab) [ 358.580243] raw: 0017ffffc0000040 ffff8881f1f5b700 dead000000000122 0000000000000000 [ 358.581338] raw: 0000000000000000 00000000801f001f 00000001fdffffff 0000000000000000 [ 358.582438] head: 0017ffffc0000040 ffff8881f1f5b700 dead000000000122 0000000000000000 [ 358.583550] head: 0000000000000000 00000000801f001f 00000001fdffffff 0000000000000000 [ 358.584664] head: 0017ffffc0000001 ffffea000a98e781 ffffffffffffffff 0000000000000000 [ 358.585779] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 358.586899] page dumped because: kasan: bad access detected [ 358.588451] Memory state around the buggy address: [ 358.589340] ffff8882a639eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 358.590438] ffff8882a639eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 358.591529] >ffff8882a639ec00: fc fc fc fc fc fc fc fc fc fc fc fc fa fb fb fb [ 358.592617] ^ [ 358.593639] ffff8882a639ec80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 358.594739] ffff8882a639ed00: fb fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc [ 358.595837] ================================================================== [ 358.958642] ok 36 kmem_cache_double_free [ 358.958911] ================================================================== [ 358.960936] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x18e/0x400 [kasan_test] [ 358.962160] Free of addr ffff88a08506c319 by task kunit_try_catch/4608 [ 358.963939] CPU: 4 UID: 0 PID: 4608 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 358.965938] Tainted: [B]=BAD_PAGE, [N]=TEST [ 358.966880] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 358.968292] Call Trace: [ 358.969103] [ 358.969880] dump_stack_lvl+0x53/0x70 [ 358.970805] print_address_description.constprop.0+0x2c/0x3a0 [ 358.971896] ? kmem_cache_invalid_free+0x18e/0x400 [kasan_test] [ 358.973009] print_report+0xb9/0x2b0 [ 358.973920] ? kmem_cache_invalid_free+0x18e/0x400 [kasan_test] [ 358.975055] ? kasan_addr_to_slab+0xd/0xb0 [ 358.976033] ? kmem_cache_invalid_free+0x18e/0x400 [kasan_test] [ 358.977143] kasan_report_invalid_free+0xbe/0xe0 [ 358.978137] ? kmem_cache_invalid_free+0x18e/0x400 [kasan_test] [ 358.979269] ? kmem_cache_invalid_free+0x18e/0x400 [kasan_test] [ 358.980377] poison_slab_object+0x168/0x170 [ 358.981324] ? kmem_cache_invalid_free+0x18e/0x400 [kasan_test] [ 358.982415] __kasan_slab_free+0x32/0x50 [ 358.983358] kmem_cache_free+0x109/0x430 [ 358.984283] kmem_cache_invalid_free+0x18e/0x400 [kasan_test] [ 358.985343] ? __pfx_kmem_cache_invalid_free+0x10/0x10 [kasan_test] [ 358.986441] ? __schedule+0x7ec/0x1950 [ 358.987353] ? ktime_get_ts64+0x7f/0x230 [ 358.988266] kunit_try_run_case+0x1b0/0x490 [ 358.989207] ? __pfx_kunit_try_run_case+0x10/0x10 [ 358.990183] ? set_cpus_allowed_ptr+0x85/0xc0 [ 358.991137] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 358.992122] ? __pfx_kunit_try_run_case+0x10/0x10 [ 358.993071] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 358.994133] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 358.995159] kthread+0x2d8/0x3c0 [ 358.996010] ? __pfx_kthread+0x10/0x10 [ 358.996886] ret_from_fork+0x31/0x70 [ 358.997738] ? __pfx_kthread+0x10/0x10 [ 358.998592] ret_from_fork_asm+0x1a/0x30 [ 358.999487] [ 359.000866] Allocated by task 4608: [ 359.001670] kasan_save_stack+0x33/0x60 [ 359.002494] kasan_save_track+0x14/0x30 [ 359.003330] __kasan_slab_alloc+0x89/0x90 [ 359.004164] kmem_cache_alloc_noprof+0x10e/0x380 [ 359.005024] kmem_cache_invalid_free+0x10d/0x400 [kasan_test] [ 359.005967] kunit_try_run_case+0x1b0/0x490 [ 359.006790] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 359.007695] kthread+0x2d8/0x3c0 [ 359.008412] ret_from_fork+0x31/0x70 [ 359.009149] ret_from_fork_asm+0x1a/0x30 [ 359.010473] The buggy address belongs to the object at ffff88a08506c318 which belongs to the cache test_cache of size 200 [ 359.012395] The buggy address is located 1 bytes inside of 200-byte region [ffff88a08506c318, ffff88a08506c3e0) [ 359.014793] The buggy address belongs to the physical page: [ 359.015704] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x208506c [ 359.016834] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 359.017931] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 359.018996] page_type: 0xfdffffff(slab) [ 359.019794] raw: 0017ffffc0000040 ffff888183119680 dead000000000122 0000000000000000 [ 359.020921] raw: 0000000000000000 00000000801f001f 00000001fdffffff 0000000000000000 [ 359.022040] head: 0017ffffc0000040 ffff888183119680 dead000000000122 0000000000000000 [ 359.023195] head: 0000000000000000 00000000801f001f 00000001fdffffff 0000000000000000 [ 359.024335] head: 0017ffffc0000001 ffffea0082141b01 ffffffffffffffff 0000000000000000 [ 359.025458] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 359.026583] page dumped because: kasan: bad access detected [ 359.028180] Memory state around the buggy address: [ 359.029065] ffff88a08506c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 359.030159] ffff88a08506c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 359.031270] >ffff88a08506c300: fc fc fc 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 359.032372] ^ [ 359.033202] ffff88a08506c380: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 359.034302] ffff88a08506c400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 359.035431] ================================================================== [ 359.059360] install debs round one: dpkg -i --force-confdef --force-depends /opt/deb/ntpdate_1%3a4.2.8p15+dfsg-2~1.2.2+dfsg1-1+deb12u1_all.deb [ 359.063141] /opt/deb/ntpsec-ntpdate_1.2.2+dfsg1-1+deb12u1_amd64.deb [ 359.065783] /opt/deb/python3-ntp_1.2.2+dfsg1-1+deb12u1_amd64.deb [ 359.068107] /opt/deb/gawk_1%3a5.2.1-2_amd64.deb [ 359.070902] (Reading database ... 17676 files and directories currently installed.) [ 359.074226] Preparing to unpack .../ntpdate_1%3a4.2.8p15+dfsg-2~1.2.2+dfsg1-1+deb12u1_all.deb ... [ 359.078081] Unpacking ntpdate (1:4.2.8p15+dfsg-2~1.2.2+dfsg1-1+deb12u1) over (1:4.2.8p15+dfsg-2~1.2.2+dfsg1-1+deb12u1) ... [ 359.082142] Preparing to unpack .../ntpsec-ntpdate_1.2.2+dfsg1-1+deb12u1_amd64.deb ... [ 359.085468] Unpacking ntpsec-ntpdate (1.2.2+dfsg1-1+deb12u1) over (1.2.2+dfsg1-1+deb12u1) ... [ 359.088704] Preparing to unpack .../python3-ntp_1.2.2+dfsg1-1+deb12u1_amd64.deb ... [ 359.092001] Unpacking python3-ntp (1.2.2+dfsg1-1+deb12u1) over (1.2.2+dfsg1-1+deb12u1) ... [ 359.094899] Selecting previously unselected package gawk. [ 359.097715] Preparing to unpack .../deb/gawk_1%3a5.2.1-2_amd64.deb ... [ 359.100170] Unpacking gawk (1:5.2.1-2) ... [ 359.102751] Setting up ntpsec-ntpdate (1.2.2+dfsg1-1+deb12u1) ... [ 359.105484] Setting up python3-ntp (1.2.2+dfsg1-1+deb12u1) ... [ 359.108397] Setting up ntpdate (1:4.2.8p15+dfsg-2~1.2.2+dfsg1-1+deb12u1) ... [ 359.110899] Setting up gawk (1:5.2.1-2) ... [ 359.112875] NO_NETWORK= [ 359.418014] ok 37 kmem_cache_invalid_free [ 359.418388] ================================================================== [ 359.420640] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x179/0x330 [kasan_test] [ 359.422031] Read of size 1 at addr ffff8881f1f5a1c0 by task kunit_try_catch/4610 [ 359.424038] CPU: 3 UID: 0 PID: 4610 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 359.426174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 359.427178] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 359.428644] Call Trace: [ 359.429525] [ 359.430372] dump_stack_lvl+0x53/0x70 [ 359.431345] print_address_description.constprop.0+0x2c/0x3a0 [ 359.432485] ? kmem_cache_double_destroy+0x179/0x330 [kasan_test] [ 359.433651] print_report+0xb9/0x2b0 [ 359.434595] ? kasan_addr_to_slab+0xd/0xb0 [ 359.435571] ? kmem_cache_double_destroy+0x179/0x330 [kasan_test] [ 359.436701] kasan_report+0xe8/0x120 [ 359.437625] ? kmem_cache_double_destroy+0x179/0x330 [kasan_test] [ 359.438757] ? kmem_cache_double_destroy+0x179/0x330 [kasan_test] [ 359.439874] __kasan_check_byte+0x36/0x50 [ 359.440809] kmem_cache_destroy+0x21/0x140 [ 359.441742] kmem_cache_double_destroy+0x179/0x330 [kasan_test] [ 359.442824] ? __pfx_kmem_cache_double_destroy+0x10/0x10 [kasan_test] [ 359.443947] ? __schedule+0x7ec/0x1950 [ 359.444836] ? ktime_get_ts64+0x7f/0x230 [ 359.445731] kunit_try_run_case+0x1b0/0x490 [ 359.446645] ? __pfx_kunit_try_run_case+0x10/0x10 [ 359.447599] ? set_cpus_allowed_ptr+0x85/0xc0 [ 359.448521] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 359.449480] ? __pfx_kunit_try_run_case+0x10/0x10 [ 359.450425] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 359.451488] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 359.452492] kthread+0x2d8/0x3c0 [ 359.453317] ? __pfx_kthread+0x10/0x10 [ 359.454178] ret_from_fork+0x31/0x70 [ 359.455022] ? __pfx_kthread+0x10/0x10 [ 359.455872] ret_from_fork_asm+0x1a/0x30 [ 359.456730] [ 359.458087] Allocated by task 4610: [ 359.458903] kasan_save_stack+0x33/0x60 [ 359.459753] kasan_save_track+0x14/0x30 [ 359.460596] __kasan_slab_alloc+0x89/0x90 [ 359.461445] kmem_cache_alloc_noprof+0x10e/0x380 [ 359.462336] kmem_cache_create_usercopy+0x124/0x300 [ 359.463236] kmem_cache_create+0x16/0x20 [ 359.464047] kmem_cache_double_destroy+0x8f/0x330 [kasan_test] [ 359.465011] kunit_try_run_case+0x1b0/0x490 [ 359.465821] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 359.466730] kthread+0x2d8/0x3c0 [ 359.467448] ret_from_fork+0x31/0x70 [ 359.468180] ret_from_fork_asm+0x1a/0x30 [ 359.469503] Freed by task 4610: [ 359.470194] kasan_save_stack+0x33/0x60 [ 359.470940] kasan_save_track+0x14/0x30 [ 359.471676] kasan_save_free_info+0x3b/0x60 [ 359.472440] poison_slab_object+0x109/0x170 [ 359.473199] __kasan_slab_free+0x32/0x50 [ 359.473934] kmem_cache_free+0x109/0x430 [ 359.474663] kmem_cache_double_destroy+0x108/0x330 [kasan_test] [ 359.475570] kunit_try_run_case+0x1b0/0x490 [ 359.476327] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 359.477187] kthread+0x2d8/0x3c0 [ 359.477867] ret_from_fork+0x31/0x70 [ 359.478569] ret_from_fork_asm+0x1a/0x30 [ 359.479815] The buggy address belongs to the object at ffff8881f1f5a1c0 which belongs to the cache kmem_cache of size 224 [ 359.481643] The buggy address is located 0 bytes inside of freed 224-byte region [ffff8881f1f5a1c0, ffff8881f1f5a2a0) [ 359.483998] The buggy address belongs to the physical page: [ 359.484880] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1f1f58 [ 359.485970] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 359.487034] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 359.488052] page_type: 0xfdffffff(slab) [ 359.488820] raw: 0017ffffc0000040 ffff88810004c000 dead000000000122 0000000000000000 [ 359.489918] raw: 0000000000000000 0000000080330033 00000001fdffffff 0000000000000000 [ 359.491019] head: 0017ffffc0000040 ffff88810004c000 dead000000000122 0000000000000000 [ 359.492134] head: 0000000000000000 0000000080330033 00000001fdffffff 0000000000000000 [ 359.493254] head: 0017ffffc0000002 ffffea0007c7d601 ffffffffffffffff 0000000000000000 [ 359.494377] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 359.495501] page dumped because: kasan: bad access detected [ 359.497066] Memory state around the buggy address: [ 359.497955] ffff8881f1f5a080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 359.499055] ffff8881f1f5a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 359.500150] >ffff8881f1f5a180: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 359.501243] ^ [ 359.502183] ffff8881f1f5a200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 359.503288] ffff8881f1f5a280: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 359.504391] ================================================================== [ 359.505711] ok 38 kmem_cache_double_destroy [ 360.390643] ok 39 kmem_cache_accounted [ 360.754716] ok 40 kmem_cache_bulk [ 360.755722] ================================================================== [ 360.757691] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2e0/0x320 [kasan_test] [ 360.758979] Read of size 1 at addr ffff888301b31373 by task kunit_try_catch/4625 [ 360.760840] CPU: 2 UID: 0 PID: 4625 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 360.762840] Tainted: [B]=BAD_PAGE, [N]=TEST [ 360.763784] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 360.765188] Call Trace: [ 360.765998] [ 360.766788] dump_stack_lvl+0x53/0x70 [ 360.767710] print_address_description.constprop.0+0x2c/0x3a0 [ 360.768806] ? mempool_oob_right_helper+0x2e0/0x320 [kasan_test] [ 360.769922] print_report+0xb9/0x2b0 [ 360.770847] ? kasan_addr_to_slab+0xd/0xb0 [ 360.771805] ? mempool_oob_right_helper+0x2e0/0x320 [kasan_test] [ 360.772922] kasan_report+0xe8/0x120 [ 360.773823] ? mempool_oob_right_helper+0x2e0/0x320 [kasan_test] [ 360.774951] mempool_oob_right_helper+0x2e0/0x320 [kasan_test] [ 360.776067] ? __pfx_mempool_oob_right_helper+0x10/0x10 [kasan_test] [ 360.777199] ? __pfx_sched_balance_newidle+0x10/0x10 [ 360.778210] ? dequeue_entity+0x38b/0x1190 [ 360.779164] mempool_kmalloc_oob_right+0xa8/0x100 [kasan_test] [ 360.780256] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [kasan_test] [ 360.781379] ? finish_task_switch.isra.0+0x155/0x750 [ 360.782376] ? __switch_to+0x5be/0xdc0 [ 360.783296] ? __pfx_mempool_kmalloc+0x10/0x10 [ 360.784261] ? __pfx_mempool_kfree+0x10/0x10 [ 360.785191] ? ktime_get_ts64+0x7f/0x230 [ 360.786093] kunit_try_run_case+0x1b0/0x490 [ 360.787031] ? __pfx_kunit_try_run_case+0x10/0x10 [ 360.787998] ? set_cpus_allowed_ptr+0x85/0xc0 [ 360.788935] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 360.789897] ? __pfx_kunit_try_run_case+0x10/0x10 [ 360.790868] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 360.791950] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 360.792968] kthread+0x2d8/0x3c0 [ 360.793794] ? __pfx_kthread+0x10/0x10 [ 360.794659] ret_from_fork+0x31/0x70 [ 360.795526] ? __pfx_kthread+0x10/0x10 [ 360.796387] ret_from_fork_asm+0x1a/0x30 [ 360.797253] [ 360.798627] Allocated by task 4625: [ 360.799457] kasan_save_stack+0x33/0x60 [ 360.800297] kasan_save_track+0x14/0x30 [ 360.801111] remove_element+0x114/0x180 [ 360.801912] mempool_alloc_preallocated+0x48/0x90 [ 360.802786] mempool_oob_right_helper+0x81/0x320 [kasan_test] [ 360.803745] mempool_kmalloc_oob_right+0xa8/0x100 [kasan_test] [ 360.804699] kunit_try_run_case+0x1b0/0x490 [ 360.805493] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 360.806394] kthread+0x2d8/0x3c0 [ 360.807143] ret_from_fork+0x31/0x70 [ 360.807899] ret_from_fork_asm+0x1a/0x30 [ 360.809243] The buggy address belongs to the object at ffff888301b31300 which belongs to the cache kmalloc-128 of size 128 [ 360.811182] The buggy address is located 0 bytes to the right of allocated 115-byte region [ffff888301b31300, ffff888301b31373) [ 360.813719] The buggy address belongs to the physical page: [ 360.814630] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x301b30 [ 360.815772] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 360.816876] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 360.817921] page_type: 0xfdffffff(slab) [ 360.818707] raw: 0017ffffc0000040 ffff88810004ca00 dead000000000122 0000000000000000 [ 360.819842] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 360.820964] head: 0017ffffc0000040 ffff88810004ca00 dead000000000122 0000000000000000 [ 360.822089] head: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 360.823243] head: 0017ffffc0000001 ffffea000c06cc01 ffffffffffffffff 0000000000000000 [ 360.824385] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 360.825516] page dumped because: kasan: bad access detected [ 360.827107] Memory state around the buggy address: [ 360.828017] ffff888301b31200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 360.829140] ffff888301b31280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 360.830247] >ffff888301b31300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 360.831363] ^ [ 360.832442] ffff888301b31380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 360.833551] ffff888301b31400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 360.834664] ================================================================== [ 360.836022] ok 41 mempool_kmalloc_oob_right [ 360.836113] ================================================================== [ 360.838191] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2e0/0x320 [kasan_test] [ 360.839487] Read of size 1 at addr ffff8882853b6001 by task kunit_try_catch/4627 [ 360.841387] CPU: 21 UID: 0 PID: 4627 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 360.843441] Tainted: [B]=BAD_PAGE, [N]=TEST [ 360.844408] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 360.845837] Call Trace: [ 360.846682] [ 360.847490] dump_stack_lvl+0x53/0x70 [ 360.848427] print_address_description.constprop.0+0x2c/0x3a0 [ 360.849538] ? mempool_oob_right_helper+0x2e0/0x320 [kasan_test] [ 360.850680] print_report+0xb9/0x2b0 [ 360.851622] ? kasan_addr_to_slab+0xd/0xb0 [ 360.852610] ? mempool_oob_right_helper+0x2e0/0x320 [kasan_test] [ 360.853757] kasan_report+0xe8/0x120 [ 360.854697] ? mempool_oob_right_helper+0x2e0/0x320 [kasan_test] [ 360.855844] mempool_oob_right_helper+0x2e0/0x320 [kasan_test] [ 360.856977] ? __pfx_mempool_oob_right_helper+0x10/0x10 [kasan_test] [ 360.858148] ? __pfx_sched_balance_newidle+0x10/0x10 [ 360.859201] ? dequeue_entity+0x38b/0x1190 [ 360.860174] mempool_kmalloc_large_oob_right+0xa8/0x100 [kasan_test] [ 360.861336] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [kasan_test] [ 360.862545] ? finish_task_switch.isra.0+0x155/0x750 [ 360.863583] ? __switch_to+0x5be/0xdc0 [ 360.864514] ? __pfx_mempool_kmalloc+0x10/0x10 [ 360.865501] ? __pfx_mempool_kfree+0x10/0x10 [ 360.866465] ? ktime_get_ts64+0x7f/0x230 [ 360.867399] kunit_try_run_case+0x1b0/0x490 [ 360.868354] ? __pfx_kunit_try_run_case+0x10/0x10 [ 360.869352] ? set_cpus_allowed_ptr+0x85/0xc0 [ 360.870313] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 360.871315] ? __pfx_kunit_try_run_case+0x10/0x10 [ 360.872301] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 360.873396] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 360.874444] kthread+0x2d8/0x3c0 [ 360.875309] ? __pfx_kthread+0x10/0x10 [ 360.876207] ret_from_fork+0x31/0x70 [ 360.877082] ? __pfx_kthread+0x10/0x10 [ 360.877965] ret_from_fork_asm+0x1a/0x30 [ 360.878856] [ 360.880260] The buggy address belongs to the physical page: [ 360.881258] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2853b4 [ 360.882457] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 360.883628] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 360.884741] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 360.885907] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 360.887069] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 360.888226] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 360.889369] head: 0017ffffc0000002 ffffea000a14ed01 ffffffffffffffff 0000000000000000 [ 360.890517] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 360.891667] page dumped because: kasan: bad access detected [ 360.893262] Memory state around the buggy address: [ 360.894161] ffff8882853b5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 360.895271] ffff8882853b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 360.896370] >ffff8882853b6000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 360.897471] ^ [ 360.898249] ffff8882853b6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 360.899361] ffff8882853b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 360.900463] ================================================================== [ 360.901709] ok 42 mempool_kmalloc_large_oob_right [ 360.901947] ================================================================== [ 360.904002] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2e0/0x320 [kasan_test] [ 360.905253] Read of size 1 at addr ffff8881ba9cad3b by task kunit_try_catch/4629 [ 360.907048] CPU: 3 UID: 0 PID: 4629 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 360.908984] Tainted: [B]=BAD_PAGE, [N]=TEST [ 360.909896] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 360.911274] Call Trace: [ 360.912066] [ 360.912826] dump_stack_lvl+0x53/0x70 [ 360.913716] print_address_description.constprop.0+0x2c/0x3a0 [ 360.914780] ? mempool_oob_right_helper+0x2e0/0x320 [kasan_test] [ 360.915874] print_report+0xb9/0x2b0 [ 360.916758] ? kasan_addr_to_slab+0xd/0xb0 [ 360.917685] ? mempool_oob_right_helper+0x2e0/0x320 [kasan_test] [ 360.918778] kasan_report+0xe8/0x120 [ 360.919670] ? mempool_oob_right_helper+0x2e0/0x320 [kasan_test] [ 360.920773] mempool_oob_right_helper+0x2e0/0x320 [kasan_test] [ 360.921868] ? __pfx_mempool_oob_right_helper+0x10/0x10 [kasan_test] [ 360.923011] ? __pfx_sched_balance_newidle+0x10/0x10 [ 360.924042] ? dequeue_entity+0x38b/0x1190 [ 360.924999] mempool_slab_oob_right+0xa3/0xf0 [kasan_test] [ 360.926069] ? __pfx_mempool_slab_oob_right+0x10/0x10 [kasan_test] [ 360.927192] ? finish_task_switch.isra.0+0x155/0x750 [ 360.928205] ? __switch_to+0x5be/0xdc0 [ 360.929112] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 360.930098] ? __pfx_mempool_free_slab+0x10/0x10 [ 360.931074] ? ktime_get_ts64+0x7f/0x230 [ 360.931994] kunit_try_run_case+0x1b0/0x490 [ 360.932937] ? __pfx_kunit_try_run_case+0x10/0x10 [ 360.933921] ? set_cpus_allowed_ptr+0x85/0xc0 [ 360.934870] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 360.935859] ? __pfx_kunit_try_run_case+0x10/0x10 [ 360.936832] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 360.937912] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 360.938945] kthread+0x2d8/0x3c0 [ 360.939796] ? __pfx_kthread+0x10/0x10 [ 360.940679] ret_from_fork+0x31/0x70 [ 360.941538] ? __pfx_kthread+0x10/0x10 [ 360.942415] ret_from_fork_asm+0x1a/0x30 [ 360.943300] [ 360.944693] Allocated by task 4629: [ 360.945509] kasan_save_stack+0x33/0x60 [ 360.946344] kasan_save_track+0x14/0x30 [ 360.947167] __kasan_mempool_unpoison_object+0x1b5/0x200 [ 360.948102] remove_element+0x114/0x180 [ 360.948903] mempool_alloc_preallocated+0x48/0x90 [ 360.949773] mempool_oob_right_helper+0x81/0x320 [kasan_test] [ 360.950725] mempool_slab_oob_right+0xa3/0xf0 [kasan_test] [ 360.951645] kunit_try_run_case+0x1b0/0x490 [ 360.952456] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 360.953371] kthread+0x2d8/0x3c0 [ 360.954106] ret_from_fork+0x31/0x70 [ 360.954864] ret_from_fork_asm+0x1a/0x30 [ 360.956219] The buggy address belongs to the object at ffff8881ba9cacc0 which belongs to the cache test_cache of size 123 [ 360.958144] The buggy address is located 0 bytes to the right of allocated 123-byte region [ffff8881ba9cacc0, ffff8881ba9cad3b) [ 360.960697] The buggy address belongs to the physical page: [ 360.961618] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1ba9ca [ 360.962748] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 360.963853] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 360.964906] page_type: 0xfdffffff(slab) [ 360.965704] raw: 0017ffffc0000040 ffff8881f1f58a00 dead000000000122 0000000000000000 [ 360.966832] raw: 0000000000000000 00000000802a002a 00000001fdffffff 0000000000000000 [ 360.967961] head: 0017ffffc0000040 ffff8881f1f58a00 dead000000000122 0000000000000000 [ 360.969103] head: 0000000000000000 00000000802a002a 00000001fdffffff 0000000000000000 [ 360.970246] head: 0017ffffc0000001 ffffea0006ea7281 ffffffffffffffff 0000000000000000 [ 360.971390] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 360.972534] page dumped because: kasan: bad access detected [ 360.974127] Memory state around the buggy address: [ 360.975030] ffff8881ba9cac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 360.976140] ffff8881ba9cac80: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 360.977246] >ffff8881ba9cad00: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 360.978355] ^ [ 360.979295] ffff8881ba9cad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 360.980423] ffff8881ba9cae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 360.981548] ================================================================== [ 361.344005] ok 43 mempool_slab_oob_right [ 361.344118] ================================================================== [ 361.346200] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x373/0x3e0 [kasan_test] [ 361.347456] Read of size 1 at addr ffff8882506d9500 by task kunit_try_catch/4631 [ 361.349376] CPU: 3 UID: 0 PID: 4631 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 361.351417] Tainted: [B]=BAD_PAGE, [N]=TEST [ 361.352377] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 361.353801] Call Trace: [ 361.354639] [ 361.355442] dump_stack_lvl+0x53/0x70 [ 361.356377] print_address_description.constprop.0+0x2c/0x3a0 [ 361.357483] ? mempool_uaf_helper+0x373/0x3e0 [kasan_test] [ 361.358580] print_report+0xb9/0x2b0 [ 361.359516] ? kasan_addr_to_slab+0xd/0xb0 [ 361.360497] ? mempool_uaf_helper+0x373/0x3e0 [kasan_test] [ 361.361592] kasan_report+0xe8/0x120 [ 361.362523] ? mempool_uaf_helper+0x373/0x3e0 [kasan_test] [ 361.363617] mempool_uaf_helper+0x373/0x3e0 [kasan_test] [ 361.364694] ? __pfx_mempool_uaf_helper+0x10/0x10 [kasan_test] [ 361.365811] ? __pfx_sched_balance_newidle+0x10/0x10 [ 361.366851] ? dequeue_entity+0x38b/0x1190 [ 361.367810] mempool_kmalloc_uaf+0xa5/0x100 [kasan_test] [ 361.368870] ? __pfx_mempool_kmalloc_uaf+0x10/0x10 [kasan_test] [ 361.369975] ? finish_task_switch.isra.0+0x155/0x750 [ 361.370994] ? __switch_to+0x5be/0xdc0 [ 361.371905] ? __pfx_mempool_kmalloc+0x10/0x10 [ 361.372872] ? __pfx_mempool_kfree+0x10/0x10 [ 361.373816] ? ktime_get_ts64+0x7f/0x230 [ 361.374731] kunit_try_run_case+0x1b0/0x490 [ 361.375665] ? __pfx_kunit_try_run_case+0x10/0x10 [ 361.376643] ? set_cpus_allowed_ptr+0x85/0xc0 [ 361.377584] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 361.378566] ? __pfx_kunit_try_run_case+0x10/0x10 [ 361.379531] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 361.380606] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 361.381628] kthread+0x2d8/0x3c0 [ 361.382467] ? __pfx_kthread+0x10/0x10 [ 361.383339] ret_from_fork+0x31/0x70 [ 361.384186] ? __pfx_kthread+0x10/0x10 [ 361.385052] ret_from_fork_asm+0x1a/0x30 [ 361.385927] [ 361.387295] Allocated by task 4631: [ 361.388099] kasan_save_stack+0x33/0x60 [ 361.388925] kasan_save_track+0x14/0x30 [ 361.389737] remove_element+0x114/0x180 [ 361.390536] mempool_alloc_preallocated+0x48/0x90 [ 361.391394] mempool_uaf_helper+0x88/0x3e0 [kasan_test] [ 361.392297] mempool_kmalloc_uaf+0xa5/0x100 [kasan_test] [ 361.393196] kunit_try_run_case+0x1b0/0x490 [ 361.393986] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 361.394881] kthread+0x2d8/0x3c0 [ 361.395601] ret_from_fork+0x31/0x70 [ 361.396344] ret_from_fork_asm+0x1a/0x30 [ 361.397668] Freed by task 4631: [ 361.398362] kasan_save_stack+0x33/0x60 [ 361.399111] kasan_save_track+0x14/0x30 [ 361.399853] kasan_save_free_info+0x3b/0x60 [ 361.400619] poison_slab_object+0x109/0x170 [ 361.401382] __kasan_mempool_poison_object+0x96/0x1a0 [ 361.402215] mempool_free+0x24a/0x340 [ 361.402932] mempool_uaf_helper+0x104/0x3e0 [kasan_test] [ 361.403790] mempool_kmalloc_uaf+0xa5/0x100 [kasan_test] [ 361.404644] kunit_try_run_case+0x1b0/0x490 [ 361.405397] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 361.406249] kthread+0x2d8/0x3c0 [ 361.406922] ret_from_fork+0x31/0x70 [ 361.407621] ret_from_fork_asm+0x1a/0x30 [ 361.408876] The buggy address belongs to the object at ffff8882506d9500 which belongs to the cache kmalloc-128 of size 128 [ 361.410718] The buggy address is located 0 bytes inside of freed 128-byte region [ffff8882506d9500, ffff8882506d9580) [ 361.413086] The buggy address belongs to the physical page: [ 361.413974] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2506d8 [ 361.415067] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 361.416136] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 361.417160] page_type: 0xfdffffff(slab) [ 361.417931] raw: 0017ffffc0000040 ffff88810004ca00 dead000000000122 0000000000000000 [ 361.419034] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 361.420139] head: 0017ffffc0000040 ffff88810004ca00 dead000000000122 0000000000000000 [ 361.420524] LKP: stdout: 3792: /lkp/lkp/src/bin/run-lkp /lkp/jobs/scheduled/lkp-csl-d02/kunit-group-00-debian-12-x86_64-20240206.cgz-2377a7d90f5b-20240823-137313-1l6zztg-3.yaml [ 361.420838] head: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 361.420840] head: 0017ffffc0000001 ffffea000941b601 ffffffffffffffff 0000000000000000 [ 361.420842] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 361.420844] page dumped because: kasan: bad access detected [ 361.420845] Memory state around the buggy address: [ 361.420847] ffff8882506d9400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 361.420849] ffff8882506d9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 361.420850] >ffff8882506d9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 361.422905] ^ [ 361.422907] ffff8882506d9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 361.422908] ffff8882506d9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 361.422910] ================================================================== [ 361.423059] ok 44 mempool_kmalloc_uaf [ 361.426151] RESULT_ROOT=/result/kunit/group-00/lkp-csl-d02/debian-12-x86_64-20240206.cgz/x86_64-rhel-8.3-kunit/gcc-12/2377a7d90f5bb2ccc302b5fb0e6ba4c67cf24ddd/3 [ 361.426420] ================================================================== [ 361.427452] BUG: KASAN: use-after-free in mempool_uaf_helper+0x373/0x3e0 [kasan_test] [ 361.430155] job=/lkp/jobs/scheduled/lkp-csl-d02/kunit-group-00-debian-12-x86_64-20240206.cgz-2377a7d90f5b-20240823-137313-1l6zztg-3.yaml [ 361.430244] Read of size 1 at addr ffff888177770000 by task kunit_try_catch/4633 [ 361.431564] CPU: 2 UID: 0 PID: 4633 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 361.452225] Tainted: [B]=BAD_PAGE, [N]=TEST [ 361.453294] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 361.454824] Call Trace: [ 361.455766] [ 361.456672] dump_stack_lvl+0x53/0x70 [ 361.457704] print_address_description.constprop.0+0x2c/0x3a0 [ 361.458906] ? mempool_uaf_helper+0x373/0x3e0 [kasan_test] [ 361.460087] print_report+0xb9/0x2b0 [ 361.461099] ? kasan_addr_to_slab+0xd/0xb0 [ 361.462147] ? mempool_uaf_helper+0x373/0x3e0 [kasan_test] [ 361.463309] kasan_report+0xe8/0x120 [ 361.464302] ? mempool_uaf_helper+0x373/0x3e0 [kasan_test] [ 361.465461] mempool_uaf_helper+0x373/0x3e0 [kasan_test] [ 361.466604] ? __pfx_mempool_uaf_helper+0x10/0x10 [kasan_test] [ 361.467777] ? __pfx_sched_balance_newidle+0x10/0x10 [ 361.468860] ? dequeue_entity+0x38b/0x1190 [ 361.469858] mempool_kmalloc_large_uaf+0xa5/0x100 [kasan_test] [ 361.471009] ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10 [kasan_test] [ 361.472214] ? finish_task_switch.isra.0+0x155/0x750 [ 361.473289] ? __switch_to+0x5be/0xdc0 [ 361.474263] ? __pfx_mempool_kmalloc+0x10/0x10 [ 361.475293] ? __pfx_mempool_kfree+0x10/0x10 [ 361.476298] ? ktime_get_ts64+0x7f/0x230 [ 361.477270] kunit_try_run_case+0x1b0/0x490 [ 361.478261] ? __pfx_kunit_try_run_case+0x10/0x10 [ 361.479286] ? set_cpus_allowed_ptr+0x85/0xc0 [ 361.480288] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 361.481326] ? __pfx_kunit_try_run_case+0x10/0x10 [ 361.482343] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 361.483470] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 361.484537] kthread+0x2d8/0x3c0 [ 361.485411] ? __pfx_kthread+0x10/0x10 [ 361.486308] ret_from_fork+0x31/0x70 [ 361.487181] ? __pfx_kthread+0x10/0x10 [ 361.488058] ret_from_fork_asm+0x1a/0x30 [ 361.488941] [ 361.490303] The buggy address belongs to the physical page: [ 361.491274] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x1498 pfn:0x177770 [ 361.492470] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 361.493629] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 361.494730] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 361.495885] raw: 0000000000001498 0000000000000000 00000001ffffffff 0000000000000000 [ 361.497035] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 361.498182] head: 0000000000001498 0000000000000000 00000001ffffffff 0000000000000000 [ 361.499316] head: 0017ffffc0000002 ffffea0005dddc01 ffffffffffffffff 0000000000000000 [ 361.500456] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 361.501596] page dumped because: kasan: bad access detected [ 361.503175] Memory state around the buggy address: [ 361.504067] ffff88817776ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 361.505169] ffff88817776ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 361.506263] >ffff888177770000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 361.507349] ^ [ 361.508112] ffff888177770080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 361.509212] ffff888177770100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 361.510301] ================================================================== [ 361.511541] ok 45 mempool_kmalloc_large_uaf [ 361.511852] ================================================================== [ 361.513846] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x373/0x3e0 [kasan_test] [ 361.515052] Read of size 1 at addr ffff8881a465da40 by task kunit_try_catch/4635 [ 361.516829] CPU: 4 UID: 0 PID: 4635 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 361.518745] Tainted: [B]=BAD_PAGE, [N]=TEST [ 361.519648] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 361.521016] Call Trace: [ 361.521799] [ 361.522549] dump_stack_lvl+0x53/0x70 [ 361.523429] print_address_description.constprop.0+0x2c/0x3a0 [ 361.524483] ? mempool_uaf_helper+0x373/0x3e0 [kasan_test] [ 361.525523] print_report+0xb9/0x2b0 [ 361.526396] ? kasan_addr_to_slab+0xd/0xb0 [ 361.527312] ? mempool_uaf_helper+0x373/0x3e0 [kasan_test] [ 361.528350] kasan_report+0xe8/0x120 [ 361.529229] ? mempool_uaf_helper+0x373/0x3e0 [kasan_test] [ 361.530276] mempool_uaf_helper+0x373/0x3e0 [kasan_test] [ 361.531313] ? __pfx_mempool_uaf_helper+0x10/0x10 [kasan_test] [ 361.532397] ? __pfx_sched_balance_newidle+0x10/0x10 [ 361.533412] ? dequeue_entity+0x38b/0x1190 [ 361.534352] mempool_slab_uaf+0xa0/0xf0 [kasan_test] [ 361.535361] ? __pfx_mempool_slab_uaf+0x10/0x10 [kasan_test] [ 361.536421] ? finish_task_switch.isra.0+0x155/0x750 [ 361.537412] ? __switch_to+0x5be/0xdc0 [ 361.538298] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 361.539263] ? __pfx_mempool_free_slab+0x10/0x10 [ 361.540218] ? ktime_get_ts64+0x7f/0x230 [ 361.541117] kunit_try_run_case+0x1b0/0x490 [ 361.542035] ? __pfx_kunit_try_run_case+0x10/0x10 [ 361.542997] ? set_cpus_allowed_ptr+0x85/0xc0 [ 361.543923] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 361.544889] ? __pfx_kunit_try_run_case+0x10/0x10 [ 361.545840] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 361.546899] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 361.547910] kthread+0x2d8/0x3c0 [ 361.548748] ? __pfx_kthread+0x10/0x10 [ 361.549619] ret_from_fork+0x31/0x70 [ 361.550466] ? __pfx_kthread+0x10/0x10 [ 361.551332] ret_from_fork_asm+0x1a/0x30 [ 361.552206] [ 361.553576] Allocated by task 4635: [ 361.554381] kasan_save_stack+0x33/0x60 [ 361.555206] kasan_save_track+0x14/0x30 [ 361.556020] __kasan_mempool_unpoison_object+0x1b5/0x200 [ 361.556945] remove_element+0x114/0x180 [ 361.557735] mempool_alloc_preallocated+0x48/0x90 [ 361.558594] mempool_uaf_helper+0x88/0x3e0 [kasan_test] [ 361.559491] mempool_slab_uaf+0xa0/0xf0 [kasan_test] [ 361.560353] kunit_try_run_case+0x1b0/0x490 [ 361.561150] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 361.562051] kthread+0x2d8/0x3c0 [ 361.562772] ret_from_fork+0x31/0x70 [ 361.563516] ret_from_fork_asm+0x1a/0x30 [ 361.564848] Freed by task 4635: [ 361.565545] kasan_save_stack+0x33/0x60 [ 361.566298] kasan_save_track+0x14/0x30 [ 361.567043] kasan_save_free_info+0x3b/0x60 [ 361.567813] poison_slab_object+0x109/0x170 [ 361.568577] __kasan_mempool_poison_object+0x96/0x1a0 [ 361.569412] mempool_free+0x24a/0x340 [ 361.570133] mempool_uaf_helper+0x104/0x3e0 [kasan_test] [ 361.570996] mempool_slab_uaf+0xa0/0xf0 [kasan_test] [ 361.571827] kunit_try_run_case+0x1b0/0x490 [ 361.572588] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 361.573448] kthread+0x2d8/0x3c0 [ 361.574130] ret_from_fork+0x31/0x70 [ 361.574841] ret_from_fork_asm+0x1a/0x30 [ 361.576109] The buggy address belongs to the object at ffff8881a465da40 which belongs to the cache test_cache of size 123 [ 361.577956] The buggy address is located 0 bytes inside of freed 123-byte region [ffff8881a465da40, ffff8881a465dabb) [ 361.580341] The buggy address belongs to the physical page: [ 361.581230] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1a465c [ 361.582328] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 361.583405] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 361.584435] page_type: 0xfdffffff(slab) [ 361.585214] raw: 0017ffffc0000040 ffff888183118280 dead000000000122 0000000000000000 [ 361.586324] raw: 0000000000000000 00000000802a002a 00000001fdffffff 0000000000000000 [ 361.587436] head: 0017ffffc0000040 ffff888183118280 dead000000000122 0000000000000000 [ 361.588565] head: 0000000000000000 00000000802a002a 00000001fdffffff 0000000000000000 [ 361.589697] head: 0017ffffc0000001 ffffea0006919701 ffffffffffffffff 0000000000000000 [ 361.590831] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 361.591970] page dumped because: kasan: bad access detected [ 361.593549] Memory state around the buggy address: [ 361.594444] ffff8881a465d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 361.595550] ffff8881a465d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 361.596648] >ffff8881a465da00: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 361.597746] ^ [ 361.598692] ffff8881a465da80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 361.599802] ffff8881a465db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 361.600913] ================================================================== [ 361.963724] ok 46 mempool_slab_uaf [ 361.963913] ================================================================== [ 361.965909] BUG: KASAN: use-after-free in mempool_uaf_helper+0x373/0x3e0 [kasan_test] [ 361.967117] Read of size 1 at addr ffff8881f1f68000 by task kunit_try_catch/4641 [ 361.969010] CPU: 3 UID: 0 PID: 4641 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 361.970998] Tainted: [B]=BAD_PAGE, [N]=TEST [ 361.971951] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 361.973363] Call Trace: [ 361.974176] [ 361.974954] dump_stack_lvl+0x53/0x70 [ 361.975884] print_address_description.constprop.0+0x2c/0x3a0 [ 361.976988] ? mempool_uaf_helper+0x373/0x3e0 [kasan_test] [ 361.978059] print_report+0xb9/0x2b0 [ 361.978972] ? kasan_addr_to_slab+0xd/0xb0 [ 361.979948] ? mempool_uaf_helper+0x373/0x3e0 [kasan_test] [ 361.981041] kasan_report+0xe8/0x120 [ 361.981947] ? mempool_uaf_helper+0x373/0x3e0 [kasan_test] [ 361.983016] mempool_uaf_helper+0x373/0x3e0 [kasan_test] [ 361.984092] ? __pfx_mempool_uaf_helper+0x10/0x10 [kasan_test] [ 361.985204] ? __pfx_sched_balance_newidle+0x10/0x10 [ 361.986221] ? dequeue_entity+0x38b/0x1190 [ 361.987158] mempool_page_alloc_uaf+0xa3/0xf0 [kasan_test] [ 361.988236] ? __pfx_mempool_page_alloc_uaf+0x10/0x10 [kasan_test] [ 361.989355] ? finish_task_switch.isra.0+0x155/0x750 [ 361.990354] ? __switch_to+0x5be/0xdc0 [ 361.991244] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 361.992246] ? __pfx_mempool_free_pages+0x10/0x10 [ 361.993223] ? ktime_get_ts64+0x7f/0x230 [ 361.994119] kunit_try_run_case+0x1b0/0x490 [ 361.995037] ? __pfx_kunit_try_run_case+0x10/0x10 [ 361.996016] ? set_cpus_allowed_ptr+0x85/0xc0 [ 361.996961] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 361.997925] ? __pfx_kunit_try_run_case+0x10/0x10 [ 361.998873] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 361.999947] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 362.000976] kthread+0x2d8/0x3c0 [ 362.001810] ? __pfx_kthread+0x10/0x10 [ 362.002675] ret_from_fork+0x31/0x70 [ 362.003517] ? __pfx_kthread+0x10/0x10 [ 362.004398] ret_from_fork_asm+0x1a/0x30 [ 362.005277] [ 362.006628] The buggy address belongs to the physical page: [ 362.007601] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1f1f68 [ 362.008802] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 362.009868] raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 362.011019] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 362.012177] page dumped because: kasan: bad access detected [ 362.013765] Memory state around the buggy address: [ 362.014639] ffff8881f1f67f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 362.015728] ffff8881f1f67f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 362.016834] >ffff8881f1f68000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 362.017918] ^ [ 362.018669] ffff8881f1f68080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 362.019755] ffff8881f1f68100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 362.020859] ================================================================== [ 362.022237] ok 47 mempool_page_alloc_uaf [ 362.022398] ================================================================== [ 362.024378] BUG: KASAN: double-free in mempool_double_free_helper+0x16c/0x320 [kasan_test] [ 362.025589] Free of addr ffff88821c3a4600 by task kunit_try_catch/4643 [ 362.027298] CPU: 4 UID: 0 PID: 4643 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 362.029208] Tainted: [B]=BAD_PAGE, [N]=TEST [ 362.030101] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 362.031454] Call Trace: [ 362.032223] [ 362.032959] dump_stack_lvl+0x53/0x70 [ 362.033829] print_address_description.constprop.0+0x2c/0x3a0 [ 362.034872] ? mempool_double_free_helper+0x16c/0x320 [kasan_test] [ 362.035960] print_report+0xb9/0x2b0 [ 362.036830] ? mempool_double_free_helper+0x16c/0x320 [kasan_test] [ 362.037923] ? kasan_addr_to_slab+0xd/0xb0 [ 362.038844] ? mempool_double_free_helper+0x16c/0x320 [kasan_test] [ 362.039945] kasan_report_invalid_free+0xbe/0xe0 [ 362.040915] ? mempool_double_free_helper+0x16c/0x320 [kasan_test] [ 362.042019] ? mempool_double_free_helper+0x16c/0x320 [kasan_test] [ 362.043114] poison_slab_object+0x148/0x170 [ 362.044045] ? mempool_double_free_helper+0x16c/0x320 [kasan_test] [ 362.045151] __kasan_mempool_poison_object+0x96/0x1a0 [ 362.046165] mempool_free+0x24a/0x340 [ 362.047066] mempool_double_free_helper+0x16c/0x320 [kasan_test] [ 362.048170] ? __pfx_mempool_double_free_helper+0x10/0x10 [kasan_test] [ 362.049327] ? __pfx_sched_balance_newidle+0x10/0x10 [ 362.050350] ? dequeue_entity+0x38b/0x1190 [ 362.051292] mempool_kmalloc_double_free+0xa3/0xf0 [kasan_test] [ 362.052386] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [kasan_test] [ 362.053535] ? finish_task_switch.isra.0+0x155/0x750 [ 362.054548] ? __switch_to+0x5be/0xdc0 [ 362.055454] ? __pfx_mempool_kmalloc+0x10/0x10 [ 362.056414] ? __pfx_mempool_kfree+0x10/0x10 [ 362.057354] ? ktime_get_ts64+0x7f/0x230 [ 362.058258] kunit_try_run_case+0x1b0/0x490 [ 362.059189] ? __pfx_kunit_try_run_case+0x10/0x10 [ 362.060170] ? set_cpus_allowed_ptr+0x85/0xc0 [ 362.061112] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 362.062091] ? __pfx_kunit_try_run_case+0x10/0x10 [ 362.063060] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 362.064139] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 362.065157] kthread+0x2d8/0x3c0 [ 362.065992] ? __pfx_kthread+0x10/0x10 [ 362.066859] ret_from_fork+0x31/0x70 [ 362.067701] ? __pfx_kthread+0x10/0x10 [ 362.068551] ret_from_fork_asm+0x1a/0x30 [ 362.069404] [ 362.070718] Allocated by task 4643: [ 362.071493] kasan_save_stack+0x33/0x60 [ 362.072286] kasan_save_track+0x14/0x30 [ 362.073078] remove_element+0x114/0x180 [ 362.073870] mempool_alloc_preallocated+0x48/0x90 [ 362.074732] mempool_double_free_helper+0x7c/0x320 [kasan_test] [ 362.075698] mempool_kmalloc_double_free+0xa3/0xf0 [kasan_test] [ 362.076657] kunit_try_run_case+0x1b0/0x490 [ 362.077468] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 362.078377] kthread+0x2d8/0x3c0 [ 362.079104] ret_from_fork+0x31/0x70 [ 362.079854] ret_from_fork_asm+0x1a/0x30 [ 362.081199] Freed by task 4643: [ 362.081903] kasan_save_stack+0x33/0x60 [ 362.082660] kasan_save_track+0x14/0x30 [ 362.083410] kasan_save_free_info+0x3b/0x60 [ 362.084183] poison_slab_object+0x109/0x170 [ 362.084953] __kasan_mempool_poison_object+0x96/0x1a0 [ 362.085791] mempool_free+0x24a/0x340 [ 362.086514] mempool_double_free_helper+0xf8/0x320 [kasan_test] [ 362.087429] mempool_kmalloc_double_free+0xa3/0xf0 [kasan_test] [ 362.088340] kunit_try_run_case+0x1b0/0x490 [ 362.089100] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 362.089957] kthread+0x2d8/0x3c0 [ 362.090634] ret_from_fork+0x31/0x70 [ 362.091339] ret_from_fork_asm+0x1a/0x30 [ 362.092604] The buggy address belongs to the object at ffff88821c3a4600 which belongs to the cache kmalloc-128 of size 128 [ 362.094456] The buggy address is located 0 bytes inside of 128-byte region [ffff88821c3a4600, ffff88821c3a4680) [ 362.096791] The buggy address belongs to the physical page: [ 362.097679] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x21c3a4 [ 362.098775] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 362.099847] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 362.100873] page_type: 0xfdffffff(slab) [ 362.101647] raw: 0017ffffc0000040 ffff88810004ca00 dead000000000122 0000000000000000 [ 362.102753] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 362.103861] head: 0017ffffc0000040 ffff88810004ca00 dead000000000122 0000000000000000 [ 362.104982] head: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 362.106110] head: 0017ffffc0000001 ffffea000870e901 ffffffffffffffff 0000000000000000 [ 362.107239] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 362.108370] page dumped because: kasan: bad access detected [ 362.109950] Memory state around the buggy address: [ 362.110848] ffff88821c3a4500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 362.111953] ffff88821c3a4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 362.113062] >ffff88821c3a4600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 362.114168] ^ [ 362.114953] ffff88821c3a4680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 362.116075] ffff88821c3a4700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 362.117200] ================================================================== [ 362.118639] ok 48 mempool_kmalloc_double_free [ 362.118720] ================================================================== [ 362.120811] BUG: KASAN: double-free in mempool_double_free_helper+0x16c/0x320 [kasan_test] [ 362.122068] Free of addr ffff8881f1f68000 by task kunit_try_catch/4645 [ 362.123895] CPU: 3 UID: 0 PID: 4645 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 362.125933] Tainted: [B]=BAD_PAGE, [N]=TEST [ 362.126892] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 362.128316] Call Trace: [ 362.129154] [ 362.129957] dump_stack_lvl+0x53/0x70 [ 362.130889] print_address_description.constprop.0+0x2c/0x3a0 [ 362.131994] ? mempool_double_free_helper+0x16c/0x320 [kasan_test] [ 362.133147] print_report+0xb9/0x2b0 [ 362.134083] ? mempool_double_free_helper+0x16c/0x320 [kasan_test] [ 362.135246] ? kasan_addr_to_slab+0xd/0xb0 [ 362.136231] ? mempool_double_free_helper+0x16c/0x320 [kasan_test] [ 362.137391] kasan_report_invalid_free+0xbe/0xe0 [ 362.138417] ? mempool_double_free_helper+0x16c/0x320 [kasan_test] [ 362.139580] ? mempool_double_free_helper+0x16c/0x320 [kasan_test] [ 362.140732] __kasan_mempool_poison_object+0x188/0x1a0 [ 362.141794] mempool_free+0x24a/0x340 [ 362.142728] mempool_double_free_helper+0x16c/0x320 [kasan_test] [ 362.143856] ? __pfx_mempool_double_free_helper+0x10/0x10 [kasan_test] [ 362.145022] ? __pfx_sched_balance_newidle+0x10/0x10 [ 362.146051] ? dequeue_entity+0x38b/0x1190 [ 362.147001] mempool_kmalloc_large_double_free+0xa3/0xf0 [kasan_test] [ 362.148154] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [kasan_test] [ 362.149364] ? finish_task_switch.isra.0+0x155/0x750 [ 362.150394] ? __switch_to+0x5be/0xdc0 [ 362.151324] ? __pfx_mempool_kmalloc+0x10/0x10 [ 362.152310] ? __pfx_mempool_kfree+0x10/0x10 [ 362.153272] ? ktime_get_ts64+0x7f/0x230 [ 362.154200] kunit_try_run_case+0x1b0/0x490 [ 362.155151] ? __pfx_kunit_try_run_case+0x10/0x10 [ 362.156136] ? set_cpus_allowed_ptr+0x85/0xc0 [ 362.157090] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 362.158086] ? __pfx_kunit_try_run_case+0x10/0x10 [ 362.159058] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 362.160139] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 362.161163] kthread+0x2d8/0x3c0 [ 362.162005] ? __pfx_kthread+0x10/0x10 [ 362.162881] ret_from_fork+0x31/0x70 [ 362.163734] ? __pfx_kthread+0x10/0x10 [ 362.164591] ret_from_fork_asm+0x1a/0x30 [ 362.165455] [ 362.166802] The buggy address belongs to the physical page: [ 362.167763] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1f1f68 [ 362.168933] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 362.170068] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 362.171143] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 362.172294] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 362.173444] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 362.174599] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 362.175749] head: 0017ffffc0000002 ffffea0007c7da01 ffffffffffffffff 0000000000000000 [ 362.176896] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 362.178037] page dumped because: kasan: bad access detected [ 362.179615] Memory state around the buggy address: [ 362.180506] ffff8881f1f67f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 362.181602] ffff8881f1f67f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 362.182698] >ffff8881f1f68000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 362.183785] ^ [ 362.184550] ffff8881f1f68080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 362.185650] ffff8881f1f68100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 362.186739] ================================================================== [ 362.187945] ok 49 mempool_kmalloc_large_double_free [ 362.188024] ================================================================== [ 362.190061] BUG: KASAN: double-free in mempool_double_free_helper+0x16c/0x320 [kasan_test] [ 362.191259] Free of addr ffff8881f1f68000 by task kunit_try_catch/4647 [ 362.192947] CPU: 3 UID: 0 PID: 4647 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 362.194848] Tainted: [B]=BAD_PAGE, [N]=TEST [ 362.195743] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 362.197104] Call Trace: [ 362.197880] [ 362.198621] dump_stack_lvl+0x53/0x70 [ 362.199492] print_address_description.constprop.0+0x2c/0x3a0 [ 362.200537] ? mempool_double_free_helper+0x16c/0x320 [kasan_test] [ 362.201628] print_report+0xb9/0x2b0 [ 362.202496] ? mempool_double_free_helper+0x16c/0x320 [kasan_test] [ 362.203587] ? kasan_addr_to_slab+0xd/0xb0 [ 362.204505] ? mempool_double_free_helper+0x16c/0x320 [kasan_test] [ 362.205607] kasan_report_invalid_free+0xbe/0xe0 [ 362.206579] ? mempool_double_free_helper+0x16c/0x320 [kasan_test] [ 362.207691] ? mempool_double_free_helper+0x16c/0x320 [kasan_test] [ 362.208797] __kasan_mempool_poison_pages+0x10c/0x120 [ 362.209814] mempool_free+0x2cd/0x340 [ 362.210714] mempool_double_free_helper+0x16c/0x320 [kasan_test] [ 362.211806] ? __pfx_mempool_double_free_helper+0x10/0x10 [kasan_test] [ 362.212939] ? __pfx_sched_balance_newidle+0x10/0x10 [ 362.213933] ? dequeue_entity+0x38b/0x1190 [ 362.214848] mempool_page_alloc_double_free+0x9e/0xf0 [kasan_test] [ 362.215947] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [kasan_test] [ 362.217107] ? finish_task_switch.isra.0+0x155/0x750 [ 362.218110] ? __switch_to+0x5be/0xdc0 [ 362.219015] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 362.220004] ? __pfx_mempool_free_pages+0x10/0x10 [ 362.220977] ? ktime_get_ts64+0x7f/0x230 [ 362.221884] kunit_try_run_case+0x1b0/0x490 [ 362.222810] ? __pfx_kunit_try_run_case+0x10/0x10 [ 362.223772] ? set_cpus_allowed_ptr+0x85/0xc0 [ 362.224712] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 362.225700] ? __pfx_kunit_try_run_case+0x10/0x10 [ 362.226665] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 362.227737] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 362.228762] kthread+0x2d8/0x3c0 [ 362.229603] ? __pfx_kthread+0x10/0x10 [ 362.230478] ret_from_fork+0x31/0x70 [ 362.231331] ? __pfx_kthread+0x10/0x10 [ 362.232187] ret_from_fork_asm+0x1a/0x30 [ 362.233050] [ 362.234395] The buggy address belongs to the physical page: [ 362.235356] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1f1f68 [ 362.236525] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 362.237568] raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 362.238705] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 362.239846] page dumped because: kasan: bad access detected [ 362.241447] Memory state around the buggy address: [ 362.242350] ffff8881f1f67f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 362.243456] ffff8881f1f67f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 362.244555] >ffff8881f1f68000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 362.245643] ^ [ 362.246407] ffff8881f1f68080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 362.247504] ffff8881f1f68100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 362.248592] ================================================================== [ 362.249781] ok 50 mempool_page_alloc_double_free [ 362.249873] ================================================================== [ 362.251904] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x11e/0x2c0 [kasan_test] [ 362.253190] Free of addr ffff8882506d8701 by task kunit_try_catch/4649 [ 362.254914] CPU: 3 UID: 0 PID: 4649 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 362.256838] Tainted: [B]=BAD_PAGE, [N]=TEST [ 362.257734] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 362.259092] Call Trace: [ 362.259862] [ 362.260599] dump_stack_lvl+0x53/0x70 [ 362.261469] print_address_description.constprop.0+0x2c/0x3a0 [ 362.262512] ? mempool_kmalloc_invalid_free_helper+0x11e/0x2c0 [kasan_test] [ 362.263668] print_report+0xb9/0x2b0 [ 362.264543] ? mempool_kmalloc_invalid_free_helper+0x11e/0x2c0 [kasan_test] [ 362.265710] ? kasan_addr_to_slab+0xd/0xb0 [ 362.266638] ? mempool_kmalloc_invalid_free_helper+0x11e/0x2c0 [kasan_test] [ 362.267813] kasan_report_invalid_free+0xbe/0xe0 [ 362.268794] ? mempool_kmalloc_invalid_free_helper+0x11e/0x2c0 [kasan_test] [ 362.269977] ? mempool_kmalloc_invalid_free_helper+0x11e/0x2c0 [kasan_test] [ 362.271149] poison_slab_object+0x168/0x170 [ 362.272095] ? mempool_kmalloc_invalid_free_helper+0x11e/0x2c0 [kasan_test] [ 362.273282] __kasan_mempool_poison_object+0x96/0x1a0 [ 362.274314] mempool_free+0x24a/0x340 [ 362.275232] mempool_kmalloc_invalid_free_helper+0x11e/0x2c0 [kasan_test] [ 362.276422] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [kasan_test] [ 362.277665] ? __pfx_sched_balance_newidle+0x10/0x10 [ 362.278711] ? dequeue_entity+0x38b/0x1190 [ 362.279677] mempool_kmalloc_invalid_free+0xa3/0xf0 [kasan_test] [ 362.280803] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [kasan_test] [ 362.281983] ? finish_task_switch.isra.0+0x155/0x750 [ 362.283022] ? __switch_to+0x5be/0xdc0 [ 362.283952] ? __pfx_mempool_kmalloc+0x10/0x10 [ 362.284936] ? __pfx_mempool_kfree+0x10/0x10 [ 362.285901] ? ktime_get_ts64+0x7f/0x230 [ 362.286830] kunit_try_run_case+0x1b0/0x490 [ 362.287787] ? __pfx_kunit_try_run_case+0x10/0x10 [ 362.288791] ? set_cpus_allowed_ptr+0x85/0xc0 [ 362.289758] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 362.290762] ? __pfx_kunit_try_run_case+0x10/0x10 [ 362.291756] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 362.292860] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 362.293902] kthread+0x2d8/0x3c0 [ 362.294760] ? __pfx_kthread+0x10/0x10 [ 362.295649] ret_from_fork+0x31/0x70 [ 362.296511] ? __pfx_kthread+0x10/0x10 [ 362.297381] ret_from_fork_asm+0x1a/0x30 [ 362.298254] [ 362.299609] Allocated by task 4649: [ 362.300405] kasan_save_stack+0x33/0x60 [ 362.301219] kasan_save_track+0x14/0x30 [ 362.302032] remove_element+0x114/0x180 [ 362.302845] mempool_alloc_preallocated+0x48/0x90 [ 362.303727] mempool_kmalloc_invalid_free_helper+0x7c/0x2c0 [kasan_test] [ 362.304779] mempool_kmalloc_invalid_free+0xa3/0xf0 [kasan_test] [ 362.305768] kunit_try_run_case+0x1b0/0x490 [ 362.306599] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 362.307525] kthread+0x2d8/0x3c0 [ 362.308269] ret_from_fork+0x31/0x70 [ 362.309033] ret_from_fork_asm+0x1a/0x30 [ 362.310404] The buggy address belongs to the object at ffff8882506d8700 which belongs to the cache kmalloc-128 of size 128 [ 362.312352] The buggy address is located 1 bytes inside of 128-byte region [ffff8882506d8700, ffff8882506d8780) [ 362.314802] The buggy address belongs to the physical page: [ 362.315721] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2506d8 [ 362.316845] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 362.317946] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 362.318997] page_type: 0xfdffffff(slab) [ 362.319789] raw: 0017ffffc0000040 ffff88810004ca00 dead000000000122 0000000000000000 [ 362.320908] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 362.322027] head: 0017ffffc0000040 ffff88810004ca00 dead000000000122 0000000000000000 [ 362.323158] head: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 362.324293] head: 0017ffffc0000001 ffffea000941b601 ffffffffffffffff 0000000000000000 [ 362.325429] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 362.326566] page dumped because: kasan: bad access detected [ 362.328145] Memory state around the buggy address: [ 362.329041] ffff8882506d8600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 362.330146] ffff8882506d8680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 362.331243] >ffff8882506d8700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 362.332343] ^ [ 362.333119] ffff8882506d8780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 362.334236] ffff8882506d8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 362.335349] ================================================================== [ 362.336572] ok 51 mempool_kmalloc_invalid_free [ 362.336725] ================================================================== [ 362.338805] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x11e/0x2c0 [kasan_test] [ 362.340128] Free of addr ffff8881789a0001 by task kunit_try_catch/4651 [ 362.341937] CPU: 22 UID: 0 PID: 4651 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 362.343973] Tainted: [B]=BAD_PAGE, [N]=TEST [ 362.344929] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 362.346347] Call Trace: [ 362.347181] [ 362.347978] dump_stack_lvl+0x53/0x70 [ 362.348904] print_address_description.constprop.0+0x2c/0x3a0 [ 362.350002] ? mempool_kmalloc_invalid_free_helper+0x11e/0x2c0 [kasan_test] [ 362.351216] print_report+0xb9/0x2b0 [ 362.352151] ? mempool_kmalloc_invalid_free_helper+0x11e/0x2c0 [kasan_test] [ 362.353379] ? kasan_addr_to_slab+0xd/0xb0 [ 362.354365] ? mempool_kmalloc_invalid_free_helper+0x11e/0x2c0 [kasan_test] [ 362.355593] kasan_report_invalid_free+0xbe/0xe0 [ 362.356624] ? mempool_kmalloc_invalid_free_helper+0x11e/0x2c0 [kasan_test] [ 362.357858] ? mempool_kmalloc_invalid_free_helper+0x11e/0x2c0 [kasan_test] [ 362.359082] __kasan_mempool_poison_object+0xff/0x1a0 [ 362.360144] mempool_free+0x24a/0x340 [ 362.361086] mempool_kmalloc_invalid_free_helper+0x11e/0x2c0 [kasan_test] [ 362.362287] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [kasan_test] [ 362.363530] ? __pfx_sched_balance_newidle+0x10/0x10 [ 362.364574] ? dequeue_entity+0x38b/0x1190 [ 362.365539] mempool_kmalloc_large_invalid_free+0xa3/0xf0 [kasan_test] [ 362.366714] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 [kasan_test] [ 362.367948] ? finish_task_switch.isra.0+0x155/0x750 [ 362.368994] ? __switch_to+0x5be/0xdc0 [ 362.369940] ? __pfx_mempool_kmalloc+0x10/0x10 [ 362.370942] ? __pfx_mempool_kfree+0x10/0x10 [ 362.371918] ? ktime_get_ts64+0x7f/0x230 [ 362.372863] kunit_try_run_case+0x1b0/0x490 [ 362.373829] ? __pfx_kunit_try_run_case+0x10/0x10 [ 362.374829] ? set_cpus_allowed_ptr+0x85/0xc0 [ 362.375806] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 362.376821] ? __pfx_kunit_try_run_case+0x10/0x10 [ 362.377812] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 362.378912] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 362.379963] kthread+0x2d8/0x3c0 [ 362.380831] ? __pfx_kthread+0x10/0x10 [ 362.381734] ret_from_fork+0x31/0x70 [ 362.382614] ? __pfx_kthread+0x10/0x10 [ 362.383496] ret_from_fork_asm+0x1a/0x30 [ 362.384382] [ 362.385775] The buggy address belongs to the physical page: [ 362.386760] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1789a0 [ 362.387952] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 362.389110] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 362.390209] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 362.391382] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 362.392556] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 362.393733] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 362.394904] head: 0017ffffc0000002 ffffea0005e26801 ffffffffffffffff 0000000000000000 [ 362.396070] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 362.397229] page dumped because: kasan: bad access detected [ 362.398841] Memory state around the buggy address: [ 362.399746] ffff88817899ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 362.400853] ffff88817899ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 362.401962] >ffff8881789a0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 362.403071] ^ [ 362.403857] ffff8881789a0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 362.404977] ffff8881789a0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 362.406084] ================================================================== [ 362.407291] ok 52 mempool_kmalloc_large_invalid_free [ 362.407358] ================================================================== [ 362.409434] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x257/0x290 [kasan_test] [ 362.410684] Read of size 1 at addr ffffffffc122b64d by task kunit_try_catch/4653 [ 362.412478] CPU: 3 UID: 0 PID: 4653 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 362.414412] Tainted: [B]=BAD_PAGE, [N]=TEST [ 362.415322] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 362.416698] Call Trace: [ 362.417489] [ 362.418247] dump_stack_lvl+0x53/0x70 [ 362.419134] print_address_description.constprop.0+0x2c/0x3a0 [ 362.420196] ? kasan_global_oob_right+0x257/0x290 [kasan_test] [ 362.421273] print_report+0xb9/0x2b0 [ 362.422157] ? kasan_addr_to_slab+0xd/0xb0 [ 362.423081] ? kasan_global_oob_right+0x257/0x290 [kasan_test] [ 362.424155] kasan_report+0xe8/0x120 [ 362.425043] ? kasan_global_oob_right+0x257/0x290 [kasan_test] [ 362.426129] kasan_global_oob_right+0x257/0x290 [kasan_test] [ 362.427205] ? __pfx_kasan_global_oob_right+0x10/0x10 [kasan_test] [ 362.428329] ? __schedule+0x7ec/0x1950 [ 362.429254] ? ktime_get_ts64+0x7f/0x230 [ 362.430189] kunit_try_run_case+0x1b0/0x490 [ 362.431138] ? __pfx_kunit_try_run_case+0x10/0x10 [ 362.432122] ? set_cpus_allowed_ptr+0x85/0xc0 [ 362.433069] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 362.434052] ? __pfx_kunit_try_run_case+0x10/0x10 [ 362.435022] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 362.436107] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 362.437140] kthread+0x2d8/0x3c0 [ 362.437996] ? __pfx_kthread+0x10/0x10 [ 362.438892] ret_from_fork+0x31/0x70 [ 362.439765] ? __pfx_kthread+0x10/0x10 [ 362.440648] ret_from_fork_asm+0x1a/0x30 [ 362.441546] [ 362.442973] The buggy address belongs to the variable: [ 362.443954] global_array+0xd/0xffffffffffff29c0 [kasan_test] [ 362.445662] Memory state around the buggy address: [ 362.446613] ffffffffc122b500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 362.447767] ffffffffc122b580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 362.448908] >ffffffffc122b600: 00 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 [ 362.450041] ^ [ 362.451037] ffffffffc122b680: 00 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 362.452168] ffffffffc122b700: 00 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 [ 362.453287] ================================================================== [ 362.454503] ok 53 kasan_global_oob_right [ 362.454740] ok 54 kasan_global_oob_left # SKIP Test requires CONFIG_CC_IS_CLANG=y [ 362.455670] ================================================================== [ 362.457936] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x27f/0x2b0 [kasan_test] [ 362.459109] Read of size 1 at addr ffffc90003527d92 by task kunit_try_catch/4657 [ 362.460881] CPU: 2 UID: 0 PID: 4657 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 362.462784] Tainted: [B]=BAD_PAGE, [N]=TEST [ 362.463673] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 362.465026] Call Trace: [ 362.465794] [ 362.466526] dump_stack_lvl+0x53/0x70 [ 362.467386] print_address_description.constprop.0+0x2c/0x3a0 [ 362.468418] ? kasan_stack_oob+0x27f/0x2b0 [kasan_test] [ 362.469410] print_report+0xb9/0x2b0 [ 362.470258] ? kasan_addr_to_slab+0xd/0xb0 [ 362.471150] ? kasan_stack_oob+0x27f/0x2b0 [kasan_test] [ 362.472142] kasan_report+0xe8/0x120 [ 362.472992] ? kasan_stack_oob+0x27f/0x2b0 [kasan_test] [ 362.473985] kasan_stack_oob+0x27f/0x2b0 [kasan_test] [ 362.474966] ? __pfx_kasan_stack_oob+0x10/0x10 [kasan_test] [ 362.475993] ? finish_task_switch.isra.0+0x155/0x750 [ 362.476965] ? __switch_to+0x5be/0xdc0 [ 362.477835] ? __schedule+0x7ec/0x1950 [ 362.478698] ? ktime_get_ts64+0x7f/0x230 [ 362.479577] kunit_try_run_case+0x1b0/0x490 [ 362.480478] ? __pfx_kunit_try_run_case+0x10/0x10 [ 362.481425] ? set_cpus_allowed_ptr+0x85/0xc0 [ 362.482344] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 362.483307] ? __pfx_kunit_try_run_case+0x10/0x10 [ 362.484260] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 362.485327] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 362.486337] kthread+0x2d8/0x3c0 [ 362.487167] ? __pfx_kthread+0x10/0x10 [ 362.488037] ret_from_fork+0x31/0x70 [ 362.488882] ? __pfx_kthread+0x10/0x10 [ 362.489745] ret_from_fork_asm+0x1a/0x30 [ 362.490624] [ 362.491999] The buggy address belongs to stack of task kunit_try_catch/4657 [ 362.493115] and is located at offset 138 in frame: [ 362.494057] kasan_stack_oob+0x0/0x2b0 [kasan_test] [ 362.495656] This frame has 4 objects: [ 362.496482] [48, 49) '__assertion' [ 362.496484] [64, 72) 'array' [ 362.497285] [96, 112) '__assertion' [ 362.498031] [128, 138) 'stack_array' [ 362.500186] The buggy address belongs to the virtual mapping at [ffffc90003520000, ffffc90003529000) created by: dup_task_struct+0x59/0x600 [ 362.503365] The buggy address belongs to the physical page: [ 362.504277] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x178adf [ 362.505397] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 362.506401] raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 362.507509] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 362.508615] page dumped because: kasan: bad access detected [ 362.510146] Memory state around the buggy address: [ 362.511016] ffffc90003527c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 362.512094] ffffc90003527d00: 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00 f2 [ 362.513170] >ffffc90003527d80: f2 00 02 f3 f3 00 00 00 00 00 00 00 00 00 00 00 [ 362.514248] ^ [ 362.515045] ffffc90003527e00: f1 f1 f1 f1 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 [ 362.516141] ffffc90003527e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 362.517241] ================================================================== [ 362.518442] ok 55 kasan_stack_oob [ 362.518499] ================================================================== [ 362.520438] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x31f/0x380 [kasan_test] [ 362.521690] Read of size 1 at addr ffffc90003547cbf by task kunit_try_catch/4659 [ 362.523511] CPU: 3 UID: 0 PID: 4659 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 362.525460] Tainted: [B]=BAD_PAGE, [N]=TEST [ 362.526377] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 362.527761] Call Trace: [ 362.528562] [ 362.529331] dump_stack_lvl+0x53/0x70 [ 362.530232] print_address_description.constprop.0+0x2c/0x3a0 [ 362.531312] ? kasan_alloca_oob_left+0x31f/0x380 [kasan_test] [ 362.532396] print_report+0xb9/0x2b0 [ 362.533290] ? kasan_addr_to_slab+0xd/0xb0 [ 362.534227] ? kasan_alloca_oob_left+0x31f/0x380 [kasan_test] [ 362.535306] kasan_report+0xe8/0x120 [ 362.536204] ? kasan_alloca_oob_left+0x31f/0x380 [kasan_test] [ 362.537294] kasan_alloca_oob_left+0x31f/0x380 [kasan_test] [ 362.538373] ? dequeue_entity+0x38b/0x1190 [ 362.539332] ? __pfx_kasan_alloca_oob_left+0x10/0x10 [kasan_test] [ 362.540464] ? __switch_to+0x5be/0xdc0 [ 362.541402] ? __schedule+0x7ec/0x1950 [ 362.542333] ? ktime_get_ts64+0x7f/0x230 [ 362.543275] kunit_try_run_case+0x1b0/0x490 [ 362.544237] ? __pfx_kunit_try_run_case+0x10/0x10 [ 362.545244] ? set_cpus_allowed_ptr+0x85/0xc0 [ 362.546219] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 362.547230] ? __pfx_kunit_try_run_case+0x10/0x10 [ 362.548217] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 362.549314] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 362.550360] kthread+0x2d8/0x3c0 [ 362.551222] ? __pfx_kthread+0x10/0x10 [ 362.552121] ret_from_fork+0x31/0x70 [ 362.553004] ? __pfx_kthread+0x10/0x10 [ 362.553892] ret_from_fork_asm+0x1a/0x30 [ 362.554791] [ 362.556219] The buggy address belongs to stack of task kunit_try_catch/4659 [ 362.558032] The buggy address belongs to the virtual mapping at [ffffc90003540000, ffffc90003549000) created by: dup_task_struct+0x59/0x600 [ 362.561593] The buggy address belongs to the physical page: [ 362.562582] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x178af2 [ 362.563775] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 362.564843] raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 362.566003] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 362.567156] page dumped because: kasan: bad access detected [ 362.568748] Memory state around the buggy address: [ 362.569648] ffffc90003547b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 362.570759] ffffc90003547c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 362.571860] >ffffc90003547c80: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 362.572961] ^ [ 362.573888] ffffc90003547d00: 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 [ 362.575003] ffffc90003547d80: 00 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 [ 362.576120] ================================================================== [ 362.577494] ok 56 kasan_alloca_oob_left [ 362.577573] ================================================================== [ 362.579590] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x328/0x390 [kasan_test] [ 362.580860] Read of size 1 at addr ffffc90003567cca by task kunit_try_catch/4661 [ 362.582695] CPU: 22 UID: 0 PID: 4661 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 362.584678] Tainted: [B]=BAD_PAGE, [N]=TEST [ 362.585609] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 362.587003] Call Trace: [ 362.587813] [ 362.588590] dump_stack_lvl+0x53/0x70 [ 362.589498] print_address_description.constprop.0+0x2c/0x3a0 [ 362.590579] ? kasan_alloca_oob_right+0x328/0x390 [kasan_test] [ 362.591671] print_report+0xb9/0x2b0 [ 362.592572] ? kasan_addr_to_slab+0xd/0xb0 [ 362.593517] ? kasan_alloca_oob_right+0x328/0x390 [kasan_test] [ 362.594613] kasan_report+0xe8/0x120 [ 362.595522] ? kasan_alloca_oob_right+0x328/0x390 [kasan_test] [ 362.596628] kasan_alloca_oob_right+0x328/0x390 [kasan_test] [ 362.597725] ? dequeue_entity+0x38b/0x1190 [ 362.598696] ? __pfx_kasan_alloca_oob_right+0x10/0x10 [kasan_test] [ 362.599840] ? __switch_to+0x5be/0xdc0 [ 362.600777] ? __schedule+0x7ec/0x1950 [ 362.601706] ? ktime_get_ts64+0x7f/0x230 [ 362.602646] kunit_try_run_case+0x1b0/0x490 [ 362.603606] ? __pfx_kunit_try_run_case+0x10/0x10 [ 362.604610] ? set_cpus_allowed_ptr+0x85/0xc0 [ 362.605583] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 362.606591] ? __pfx_kunit_try_run_case+0x10/0x10 [ 362.607575] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 362.608669] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 362.609711] kthread+0x2d8/0x3c0 [ 362.610568] ? __pfx_kthread+0x10/0x10 [ 362.611463] ret_from_fork+0x31/0x70 [ 362.612341] ? __pfx_kthread+0x10/0x10 [ 362.613225] ret_from_fork_asm+0x1a/0x30 [ 362.614129] [ 362.615567] The buggy address belongs to stack of task kunit_try_catch/4661 [ 362.617388] The buggy address belongs to the virtual mapping at [ffffc90003560000, ffffc90003569000) created by: dup_task_struct+0x59/0x600 [ 362.620960] The buggy address belongs to the physical page: [ 362.621952] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x178b05 [ 362.623147] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 362.624219] raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 362.625381] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 362.626536] page dumped because: kasan: bad access detected [ 362.628133] Memory state around the buggy address: [ 362.629037] ffffc90003567b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 362.630152] ffffc90003567c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 362.631257] >ffffc90003567c80: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 362.632362] ^ [ 362.633336] ffffc90003567d00: 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 [ 362.634455] ffffc90003567d80: 00 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 [ 362.635575] ================================================================== [ 362.636936] ok 57 kasan_alloca_oob_right [ 362.637068] ok 58 kasan_memchr # SKIP Test requires CONFIG_AMD_MEM_ENCRYPT=n [ 362.638083] ok 59 kasan_memcmp # SKIP Test requires CONFIG_AMD_MEM_ENCRYPT=n [ 362.639345] ok 60 kasan_strings # SKIP Test requires CONFIG_AMD_MEM_ENCRYPT=n [ 362.640547] ================================================================== [ 362.642820] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xeb/0xd40 [kasan_test] [ 362.644137] Write of size 8 at addr ffff8881a461e568 by task kunit_try_catch/4672 [ 362.646000] CPU: 4 UID: 0 PID: 4672 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 362.647992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 362.648930] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 362.650332] Call Trace: [ 362.651150] [ 362.651932] dump_stack_lvl+0x53/0x70 [ 362.652843] print_address_description.constprop.0+0x2c/0x3a0 [ 362.653929] ? kasan_bitops_modify.constprop.0+0xeb/0xd40 [kasan_test] [ 362.655091] print_report+0xb9/0x2b0 [ 362.656009] ? kasan_addr_to_slab+0xd/0xb0 [ 362.656972] ? kasan_bitops_modify.constprop.0+0xeb/0xd40 [kasan_test] [ 362.658144] kasan_report+0xe8/0x120 [ 362.659076] ? kasan_bitops_modify.constprop.0+0xeb/0xd40 [kasan_test] [ 362.660256] kasan_check_range+0x100/0x1b0 [ 362.661228] kasan_bitops_modify.constprop.0+0xeb/0xd40 [kasan_test] [ 362.662391] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [kasan_test] [ 362.663608] kasan_bitops_generic+0x10d/0x1c0 [kasan_test] [ 362.664705] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 362.665852] ? ktime_get_ts64+0x7f/0x230 [ 362.666821] kunit_try_run_case+0x1b0/0x490 [ 362.667804] ? __pfx_kunit_try_run_case+0x10/0x10 [ 362.668821] ? set_cpus_allowed_ptr+0x85/0xc0 [ 362.669804] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 362.670833] ? __pfx_kunit_try_run_case+0x10/0x10 [ 362.671838] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 362.672958] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 362.674021] kthread+0x2d8/0x3c0 [ 362.674900] ? __pfx_kthread+0x10/0x10 [ 362.675824] ret_from_fork+0x31/0x70 [ 362.676729] ? __pfx_kthread+0x10/0x10 [ 362.677640] ret_from_fork_asm+0x1a/0x30 [ 362.678555] [ 362.680016] Allocated by task 4672: [ 362.680872] kasan_save_stack+0x33/0x60 [ 362.681751] kasan_save_track+0x14/0x30 [ 362.682628] __kasan_kmalloc+0xaa/0xb0 [ 362.683492] kasan_bitops_generic+0x89/0x1c0 [kasan_test] [ 362.684494] kunit_try_run_case+0x1b0/0x490 [ 362.685379] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 362.686355] kthread+0x2d8/0x3c0 [ 362.687148] ret_from_fork+0x31/0x70 [ 362.687955] ret_from_fork_asm+0x1a/0x30 [ 362.689380] The buggy address belongs to the object at ffff8881a461e560 which belongs to the cache kmalloc-16 of size 16 [ 362.691337] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff8881a461e560, ffff8881a461e569) [ 362.693917] The buggy address belongs to the physical page: [ 362.694866] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1a461e [ 362.696020] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 362.697062] page_type: 0xfdffffff(slab) [ 362.697884] raw: 0017ffffc0000000 ffff88810004c640 dead000000000122 0000000000000000 [ 362.699030] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 [ 362.700172] page dumped because: kasan: bad access detected [ 362.701768] Memory state around the buggy address: [ 362.702663] ffff8881a461e400: fc fc fc fc fc fc fc fc fa fb fc fc fc fc fc fc [ 362.703762] ffff8881a461e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 362.704856] >ffff8881a461e500: fc fc fc fc fc fc fc fc fc fc fc fc 00 01 fc fc [ 362.705941] ^ [ 362.706984] ffff8881a461e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 362.708086] ffff8881a461e600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 362.709181] ================================================================== [ 362.710288] ================================================================== [ 362.711382] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x185/0xd40 [kasan_test] [ 362.712667] Write of size 8 at addr ffff8881a461e568 by task kunit_try_catch/4672 [ 362.714445] CPU: 4 UID: 0 PID: 4672 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 362.716358] Tainted: [B]=BAD_PAGE, [N]=TEST [ 362.717258] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 362.718624] Call Trace: [ 362.719407] [ 362.720164] dump_stack_lvl+0x53/0x70 [ 362.721053] print_address_description.constprop.0+0x2c/0x3a0 [ 362.722118] ? kasan_bitops_modify.constprop.0+0x185/0xd40 [kasan_test] [ 362.723268] print_report+0xb9/0x2b0 [ 362.724166] ? kasan_addr_to_slab+0xd/0xb0 [ 362.725107] ? kasan_bitops_modify.constprop.0+0x185/0xd40 [kasan_test] [ 362.726261] kasan_report+0xe8/0x120 [ 362.727163] ? kasan_bitops_modify.constprop.0+0x185/0xd40 [kasan_test] [ 362.728324] kasan_check_range+0x100/0x1b0 [ 362.729279] kasan_bitops_modify.constprop.0+0x185/0xd40 [kasan_test] [ 362.730440] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [kasan_test] [ 362.731652] kasan_bitops_generic+0x10d/0x1c0 [kasan_test] [ 362.732741] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 362.733874] ? ktime_get_ts64+0x7f/0x230 [ 362.734829] kunit_try_run_case+0x1b0/0x490 [ 362.735801] ? __pfx_kunit_try_run_case+0x10/0x10 [ 362.736811] ? set_cpus_allowed_ptr+0x85/0xc0 [ 362.737790] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 362.738803] ? __pfx_kunit_try_run_case+0x10/0x10 [ 362.739793] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 362.740895] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 362.741935] kthread+0x2d8/0x3c0 [ 362.742796] ? __pfx_kthread+0x10/0x10 [ 362.743687] ret_from_fork+0x31/0x70 [ 362.744560] ? __pfx_kthread+0x10/0x10 [ 362.745445] ret_from_fork_asm+0x1a/0x30 [ 362.746337] [ 362.747780] Allocated by task 4672: [ 362.748625] kasan_save_stack+0x33/0x60 [ 362.749491] kasan_save_track+0x14/0x30 [ 362.750357] __kasan_kmalloc+0xaa/0xb0 [ 362.751210] kasan_bitops_generic+0x89/0x1c0 [kasan_test] [ 362.752213] kunit_try_run_case+0x1b0/0x490 [ 362.753101] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 362.754079] kthread+0x2d8/0x3c0 [ 362.754872] ret_from_fork+0x31/0x70 [ 362.755678] ret_from_fork_asm+0x1a/0x30 [ 362.757105] The buggy address belongs to the object at ffff8881a461e560 which belongs to the cache kmalloc-16 of size 16 [ 362.759066] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff8881a461e560, ffff8881a461e569) [ 362.761646] The buggy address belongs to the physical page: [ 362.762593] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1a461e [ 362.763748] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 362.764788] page_type: 0xfdffffff(slab) [ 362.765606] raw: 0017ffffc0000000 ffff88810004c640 dead000000000122 0000000000000000 [ 362.766752] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 [ 362.767892] page dumped because: kasan: bad access detected [ 362.769481] Memory state around the buggy address: [ 362.770375] ffff8881a461e400: fc fc fc fc fc fc fc fc fa fb fc fc fc fc fc fc [ 362.771472] ffff8881a461e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 362.772560] >ffff8881a461e500: fc fc fc fc fc fc fc fc fc fc fc fc 00 01 fc fc [ 362.773641] ^ [ 362.774681] ffff8881a461e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 362.775780] ffff8881a461e600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 362.776873] ================================================================== [ 362.777981] ================================================================== [ 362.779074] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x222/0xd40 [kasan_test] [ 362.780356] Write of size 8 at addr ffff8881a461e568 by task kunit_try_catch/4672 [ 362.782134] CPU: 4 UID: 0 PID: 4672 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 362.784044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 362.784943] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 362.786308] Call Trace: [ 362.787090] [ 362.787845] dump_stack_lvl+0x53/0x70 [ 362.788731] print_address_description.constprop.0+0x2c/0x3a0 [ 362.789794] ? kasan_bitops_modify.constprop.0+0x222/0xd40 [kasan_test] [ 362.790943] print_report+0xb9/0x2b0 [ 362.791841] ? kasan_addr_to_slab+0xd/0xb0 [ 362.792780] ? kasan_bitops_modify.constprop.0+0x222/0xd40 [kasan_test] [ 362.793935] kasan_report+0xe8/0x120 [ 362.794834] ? kasan_bitops_modify.constprop.0+0x222/0xd40 [kasan_test] [ 362.795996] kasan_check_range+0x100/0x1b0 [ 362.796950] kasan_bitops_modify.constprop.0+0x222/0xd40 [kasan_test] [ 362.798111] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [kasan_test] [ 362.799320] kasan_bitops_generic+0x10d/0x1c0 [kasan_test] [ 362.800406] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 362.801536] ? ktime_get_ts64+0x7f/0x230 [ 362.802488] kunit_try_run_case+0x1b0/0x490 [ 362.803455] ? __pfx_kunit_try_run_case+0x10/0x10 [ 362.804460] ? set_cpus_allowed_ptr+0x85/0xc0 [ 362.805435] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 362.806445] ? __pfx_kunit_try_run_case+0x10/0x10 [ 362.807433] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 362.808532] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 362.809569] kthread+0x2d8/0x3c0 [ 362.810428] ? __pfx_kthread+0x10/0x10 [ 362.811322] ret_from_fork+0x31/0x70 [ 362.812199] ? __pfx_kthread+0x10/0x10 [ 362.813088] ret_from_fork_asm+0x1a/0x30 [ 362.813984] [ 362.815427] Allocated by task 4672: [ 362.816274] kasan_save_stack+0x33/0x60 [ 362.817143] kasan_save_track+0x14/0x30 [ 362.818014] __kasan_kmalloc+0xaa/0xb0 [ 362.818870] kasan_bitops_generic+0x89/0x1c0 [kasan_test] [ 362.819877] kunit_try_run_case+0x1b0/0x490 [ 362.820766] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 362.821747] kthread+0x2d8/0x3c0 [ 362.822541] ret_from_fork+0x31/0x70 [ 362.823351] ret_from_fork_asm+0x1a/0x30 [ 362.824784] The buggy address belongs to the object at ffff8881a461e560 which belongs to the cache kmalloc-16 of size 16 [ 362.826749] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff8881a461e560, ffff8881a461e569) [ 362.829334] The buggy address belongs to the physical page: [ 362.830284] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1a461e [ 362.831439] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 362.832480] page_type: 0xfdffffff(slab) [ 362.833301] raw: 0017ffffc0000000 ffff88810004c640 dead000000000122 0000000000000000 [ 362.834448] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 [ 362.835590] page dumped because: kasan: bad access detected [ 362.837182] Memory state around the buggy address: [ 362.838080] ffff8881a461e400: fc fc fc fc fc fc fc fc fa fb fc fc fc fc fc fc [ 362.839181] ffff8881a461e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 362.840272] >ffff8881a461e500: fc fc fc fc fc fc fc fc fc fc fc fc 00 01 fc fc [ 362.841355] ^ [ 362.842398] ffff8881a461e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 362.843499] ffff8881a461e600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 362.844594] ================================================================== [ 362.845701] ================================================================== [ 362.846799] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2bc/0xd40 [kasan_test] [ 362.848088] Write of size 8 at addr ffff8881a461e568 by task kunit_try_catch/4672 [ 362.849868] CPU: 4 UID: 0 PID: 4672 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 362.851781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 362.852681] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 362.854051] Call Trace: [ 362.854835] [ 362.855591] dump_stack_lvl+0x53/0x70 [ 362.856477] print_address_description.constprop.0+0x2c/0x3a0 [ 362.857539] ? kasan_bitops_modify.constprop.0+0x2bc/0xd40 [kasan_test] [ 362.858687] print_report+0xb9/0x2b0 [ 362.859583] ? kasan_addr_to_slab+0xd/0xb0 [ 362.860520] ? kasan_bitops_modify.constprop.0+0x2bc/0xd40 [kasan_test] [ 362.861675] kasan_report+0xe8/0x120 [ 362.862574] ? kasan_bitops_modify.constprop.0+0x2bc/0xd40 [kasan_test] [ 362.863735] kasan_check_range+0x100/0x1b0 [ 362.864687] kasan_bitops_modify.constprop.0+0x2bc/0xd40 [kasan_test] [ 362.865849] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [kasan_test] [ 362.867062] kasan_bitops_generic+0x10d/0x1c0 [kasan_test] [ 362.868151] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 362.869284] ? ktime_get_ts64+0x7f/0x230 [ 362.870237] kunit_try_run_case+0x1b0/0x490 [ 362.871209] ? __pfx_kunit_try_run_case+0x10/0x10 [ 362.872217] ? set_cpus_allowed_ptr+0x85/0xc0 [ 362.873195] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 362.874208] ? __pfx_kunit_try_run_case+0x10/0x10 [ 362.875199] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 362.876297] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 362.877335] kthread+0x2d8/0x3c0 [ 362.878195] ? __pfx_kthread+0x10/0x10 [ 362.879090] ret_from_fork+0x31/0x70 [ 362.879965] ? __pfx_kthread+0x10/0x10 [ 362.880852] ret_from_fork_asm+0x1a/0x30 [ 362.881746] [ 362.883188] Allocated by task 4672: [ 362.884035] kasan_save_stack+0x33/0x60 [ 362.884903] kasan_save_track+0x14/0x30 [ 362.885771] __kasan_kmalloc+0xaa/0xb0 [ 362.886622] kasan_bitops_generic+0x89/0x1c0 [kasan_test] [ 362.887624] kunit_try_run_case+0x1b0/0x490 [ 362.888510] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 362.889486] kthread+0x2d8/0x3c0 [ 362.890277] ret_from_fork+0x31/0x70 [ 362.891085] ret_from_fork_asm+0x1a/0x30 [ 362.892513] The buggy address belongs to the object at ffff8881a461e560 which belongs to the cache kmalloc-16 of size 16 [ 362.894571] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff8881a461e560, ffff8881a461e569) [ 362.897155] The buggy address belongs to the physical page: [ 362.898105] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1a461e [ 362.899258] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 362.900298] page_type: 0xfdffffff(slab) [ 362.901121] raw: 0017ffffc0000000 ffff88810004c640 dead000000000122 0000000000000000 [ 362.902266] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 [ 362.903406] page dumped because: kasan: bad access detected [ 362.904995] Memory state around the buggy address: [ 362.905890] ffff8881a461e400: fc fc fc fc fc fc fc fc fa fb fc fc fc fc fc fc [ 362.906989] ffff8881a461e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 362.908078] >ffff8881a461e500: fc fc fc fc fc fc fc fc fc fc fc fc 00 01 fc fc [ 362.909161] ^ [ 362.910200] ffff8881a461e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 362.911298] ffff8881a461e600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 362.912390] ================================================================== [ 362.913519] ================================================================== [ 362.914668] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x359/0xd40 [kasan_test] [ 362.915966] Write of size 8 at addr ffff8881a461e568 by task kunit_try_catch/4672 [ 362.917742] CPU: 4 UID: 0 PID: 4672 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 362.919652] Tainted: [B]=BAD_PAGE, [N]=TEST [ 362.920549] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 362.921914] Call Trace: [ 362.922695] [ 362.923448] dump_stack_lvl+0x53/0x70 [ 362.924331] print_address_description.constprop.0+0x2c/0x3a0 [ 362.925391] ? kasan_bitops_modify.constprop.0+0x359/0xd40 [kasan_test] [ 362.926538] print_report+0xb9/0x2b0 [ 362.927433] ? kasan_addr_to_slab+0xd/0xb0 [ 362.928372] ? kasan_bitops_modify.constprop.0+0x359/0xd40 [kasan_test] [ 362.929523] kasan_report+0xe8/0x120 [ 362.930421] ? kasan_bitops_modify.constprop.0+0x359/0xd40 [kasan_test] [ 362.931580] kasan_check_range+0x100/0x1b0 [ 362.932532] kasan_bitops_modify.constprop.0+0x359/0xd40 [kasan_test] [ 362.933691] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [kasan_test] [ 362.934903] kasan_bitops_generic+0x10d/0x1c0 [kasan_test] [ 362.935992] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 362.937124] ? ktime_get_ts64+0x7f/0x230 [ 362.938077] kunit_try_run_case+0x1b0/0x490 [ 362.939046] ? __pfx_kunit_try_run_case+0x10/0x10 [ 362.940053] ? set_cpus_allowed_ptr+0x85/0xc0 [ 362.941030] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 362.942043] ? __pfx_kunit_try_run_case+0x10/0x10 [ 362.943032] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 362.944132] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 362.945171] kthread+0x2d8/0x3c0 [ 362.946032] ? __pfx_kthread+0x10/0x10 [ 362.946927] ret_from_fork+0x31/0x70 [ 362.947803] ? __pfx_kthread+0x10/0x10 [ 362.948688] ret_from_fork_asm+0x1a/0x30 [ 362.949581] [ 362.951025] Allocated by task 4672: [ 362.951873] kasan_save_stack+0x33/0x60 [ 362.952741] kasan_save_track+0x14/0x30 [ 362.953609] __kasan_kmalloc+0xaa/0xb0 [ 362.954462] kasan_bitops_generic+0x89/0x1c0 [kasan_test] [ 362.955465] kunit_try_run_case+0x1b0/0x490 [ 362.956352] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 362.957329] kthread+0x2d8/0x3c0 [ 362.958123] ret_from_fork+0x31/0x70 [ 362.958933] ret_from_fork_asm+0x1a/0x30 [ 362.960363] The buggy address belongs to the object at ffff8881a461e560 which belongs to the cache kmalloc-16 of size 16 [ 362.962327] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff8881a461e560, ffff8881a461e569) [ 362.964912] The buggy address belongs to the physical page: [ 362.965863] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1a461e [ 362.967020] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 362.968064] page_type: 0xfdffffff(slab) [ 362.968887] raw: 0017ffffc0000000 ffff88810004c640 dead000000000122 0000000000000000 [ 362.970034] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 [ 362.971178] page dumped because: kasan: bad access detected [ 362.972772] Memory state around the buggy address: [ 362.973667] ffff8881a461e400: fc fc fc fc fc fc fc fc fa fb fc fc fc fc fc fc [ 362.974767] ffff8881a461e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 362.975858] >ffff8881a461e500: fc fc fc fc fc fc fc fc fc fc fc fc 00 01 fc fc [ 362.976942] ^ [ 362.977984] ffff8881a461e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 362.979086] ffff8881a461e600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 362.980180] ================================================================== [ 362.981286] ================================================================== [ 362.982434] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3f3/0xd40 [kasan_test] [ 362.983737] Write of size 8 at addr ffff8881a461e568 by task kunit_try_catch/4672 [ 362.985514] CPU: 4 UID: 0 PID: 4672 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 362.987425] Tainted: [B]=BAD_PAGE, [N]=TEST [ 362.988324] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 362.989688] Call Trace: [ 362.990470] [ 362.991226] dump_stack_lvl+0x53/0x70 [ 362.992113] print_address_description.constprop.0+0x2c/0x3a0 [ 362.993177] ? kasan_bitops_modify.constprop.0+0x3f3/0xd40 [kasan_test] [ 362.994326] print_report+0xb9/0x2b0 [ 362.995225] ? kasan_addr_to_slab+0xd/0xb0 [ 362.996165] ? kasan_bitops_modify.constprop.0+0x3f3/0xd40 [kasan_test] [ 362.997319] kasan_report+0xe8/0x120 [ 362.998223] ? kasan_bitops_modify.constprop.0+0x3f3/0xd40 [kasan_test] [ 362.999383] kasan_check_range+0x100/0x1b0 [ 363.000335] kasan_bitops_modify.constprop.0+0x3f3/0xd40 [kasan_test] [ 363.001495] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [kasan_test] [ 363.002706] kasan_bitops_generic+0x10d/0x1c0 [kasan_test] [ 363.003794] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 363.004927] ? ktime_get_ts64+0x7f/0x230 [ 363.005880] kunit_try_run_case+0x1b0/0x490 [ 363.006852] ? __pfx_kunit_try_run_case+0x10/0x10 [ 363.007860] ? set_cpus_allowed_ptr+0x85/0xc0 [ 363.008838] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 363.009852] ? __pfx_kunit_try_run_case+0x10/0x10 [ 363.010843] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 363.011944] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 363.012987] kthread+0x2d8/0x3c0 [ 363.013850] ? __pfx_kthread+0x10/0x10 [ 363.014746] ret_from_fork+0x31/0x70 [ 363.015621] ? __pfx_kthread+0x10/0x10 [ 363.016508] ret_from_fork_asm+0x1a/0x30 [ 363.017402] [ 363.018852] Allocated by task 4672: [ 363.019701] kasan_save_stack+0x33/0x60 [ 363.020570] kasan_save_track+0x14/0x30 [ 363.021440] __kasan_kmalloc+0xaa/0xb0 [ 363.022295] kasan_bitops_generic+0x89/0x1c0 [kasan_test] [ 363.023300] kunit_try_run_case+0x1b0/0x490 [ 363.024192] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 363.025173] kthread+0x2d8/0x3c0 [ 363.025969] ret_from_fork+0x31/0x70 [ 363.026780] ret_from_fork_asm+0x1a/0x30 [ 363.028211] The buggy address belongs to the object at ffff8881a461e560 which belongs to the cache kmalloc-16 of size 16 [ 363.030176] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff8881a461e560, ffff8881a461e569) [ 363.032763] The buggy address belongs to the physical page: [ 363.033712] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1a461e [ 363.034870] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 363.035913] page_type: 0xfdffffff(slab) [ 363.036735] raw: 0017ffffc0000000 ffff88810004c640 dead000000000122 0000000000000000 [ 363.037884] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 [ 363.039029] page dumped because: kasan: bad access detected [ 363.040623] Memory state around the buggy address: [ 363.041519] ffff8881a461e400: fc fc fc fc fc fc fc fc fa fb fc fc fc fc fc fc [ 363.042617] ffff8881a461e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.043706] >ffff8881a461e500: fc fc fc fc fc fc fc fc fc fc fc fc 00 01 fc fc [ 363.044791] ^ [ 363.045835] ffff8881a461e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.046938] ffff8881a461e600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.048033] ================================================================== [ 363.049147] ================================================================== [ 363.050306] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x490/0xd40 [kasan_test] [ 363.051600] Write of size 8 at addr ffff8881a461e568 by task kunit_try_catch/4672 [ 363.053376] CPU: 4 UID: 0 PID: 4672 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 363.055288] Tainted: [B]=BAD_PAGE, [N]=TEST [ 363.056189] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 363.057554] Call Trace: [ 363.058335] [ 363.059092] dump_stack_lvl+0x53/0x70 [ 363.059979] print_address_description.constprop.0+0x2c/0x3a0 [ 363.061042] ? kasan_bitops_modify.constprop.0+0x490/0xd40 [kasan_test] [ 363.062191] print_report+0xb9/0x2b0 [ 363.063090] ? kasan_addr_to_slab+0xd/0xb0 [ 363.064031] ? kasan_bitops_modify.constprop.0+0x490/0xd40 [kasan_test] [ 363.065186] kasan_report+0xe8/0x120 [ 363.066087] ? kasan_bitops_modify.constprop.0+0x490/0xd40 [kasan_test] [ 363.067250] kasan_check_range+0x100/0x1b0 [ 363.068206] kasan_bitops_modify.constprop.0+0x490/0xd40 [kasan_test] [ 363.069366] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [kasan_test] [ 363.070577] kasan_bitops_generic+0x10d/0x1c0 [kasan_test] [ 363.071666] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 363.072799] ? ktime_get_ts64+0x7f/0x230 [ 363.073752] kunit_try_run_case+0x1b0/0x490 [ 363.074721] ? __pfx_kunit_try_run_case+0x10/0x10 [ 363.075728] ? set_cpus_allowed_ptr+0x85/0xc0 [ 363.076704] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 363.077715] ? __pfx_kunit_try_run_case+0x10/0x10 [ 363.078703] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 363.079805] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 363.080846] kthread+0x2d8/0x3c0 [ 363.081706] ? __pfx_kthread+0x10/0x10 [ 363.082600] ret_from_fork+0x31/0x70 [ 363.083476] ? __pfx_kthread+0x10/0x10 [ 363.084364] ret_from_fork_asm+0x1a/0x30 [ 363.085259] [ 363.086705] Allocated by task 4672: [ 363.087553] kasan_save_stack+0x33/0x60 [ 363.088421] kasan_save_track+0x14/0x30 [ 363.089290] __kasan_kmalloc+0xaa/0xb0 [ 363.090146] kasan_bitops_generic+0x89/0x1c0 [kasan_test] [ 363.091153] kunit_try_run_case+0x1b0/0x490 [ 363.092044] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 363.093026] kthread+0x2d8/0x3c0 [ 363.093822] ret_from_fork+0x31/0x70 [ 363.094631] ret_from_fork_asm+0x1a/0x30 [ 363.096065] The buggy address belongs to the object at ffff8881a461e560 which belongs to the cache kmalloc-16 of size 16 [ 363.098029] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff8881a461e560, ffff8881a461e569) [ 363.100617] The buggy address belongs to the physical page: [ 363.101567] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1a461e [ 363.102724] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 363.103768] page_type: 0xfdffffff(slab) [ 363.104590] raw: 0017ffffc0000000 ffff88810004c640 dead000000000122 0000000000000000 [ 363.105737] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 [ 363.106883] page dumped because: kasan: bad access detected [ 363.108477] Memory state around the buggy address: [ 363.109374] ffff8881a461e400: fc fc fc fc fc fc fc fc fa fb fc fc fc fc fc fc [ 363.110474] ffff8881a461e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.111566] >ffff8881a461e500: fc fc fc fc fc fc fc fc fc fc fc fc 00 01 fc fc [ 363.112650] ^ [ 363.113693] ffff8881a461e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.114797] ffff8881a461e600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.115894] ================================================================== [ 363.117002] ================================================================== [ 363.118141] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x52a/0xd40 [kasan_test] [ 363.119451] Write of size 8 at addr ffff8881a461e568 by task kunit_try_catch/4672 [ 363.121226] CPU: 4 UID: 0 PID: 4672 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 363.123137] Tainted: [B]=BAD_PAGE, [N]=TEST [ 363.124036] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 363.125401] Call Trace: [ 363.126184] [ 363.126939] dump_stack_lvl+0x53/0x70 [ 363.127824] print_address_description.constprop.0+0x2c/0x3a0 [ 363.128885] ? kasan_bitops_modify.constprop.0+0x52a/0xd40 [kasan_test] [ 363.130033] print_report+0xb9/0x2b0 [ 363.130930] ? kasan_addr_to_slab+0xd/0xb0 [ 363.131868] ? kasan_bitops_modify.constprop.0+0x52a/0xd40 [kasan_test] [ 363.133021] kasan_report+0xe8/0x120 [ 363.133921] ? kasan_bitops_modify.constprop.0+0x52a/0xd40 [kasan_test] [ 363.135079] kasan_check_range+0x100/0x1b0 [ 363.136031] kasan_bitops_modify.constprop.0+0x52a/0xd40 [kasan_test] [ 363.137190] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [kasan_test] [ 363.138400] kasan_bitops_generic+0x10d/0x1c0 [kasan_test] [ 363.139487] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 363.140616] ? ktime_get_ts64+0x7f/0x230 [ 363.141566] kunit_try_run_case+0x1b0/0x490 [ 363.142534] ? __pfx_kunit_try_run_case+0x10/0x10 [ 363.143539] ? set_cpus_allowed_ptr+0x85/0xc0 [ 363.144512] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 363.145522] ? __pfx_kunit_try_run_case+0x10/0x10 [ 363.146508] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 363.147606] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 363.148643] kthread+0x2d8/0x3c0 [ 363.149501] ? __pfx_kthread+0x10/0x10 [ 363.150393] ret_from_fork+0x31/0x70 [ 363.151266] ? __pfx_kthread+0x10/0x10 [ 363.152150] ret_from_fork_asm+0x1a/0x30 [ 363.153041] [ 363.154481] Allocated by task 4672: [ 363.155326] kasan_save_stack+0x33/0x60 [ 363.156191] kasan_save_track+0x14/0x30 [ 363.157057] __kasan_kmalloc+0xaa/0xb0 [ 363.157908] kasan_bitops_generic+0x89/0x1c0 [kasan_test] [ 363.158909] kunit_try_run_case+0x1b0/0x490 [ 363.159795] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 363.160771] kthread+0x2d8/0x3c0 [ 363.161563] ret_from_fork+0x31/0x70 [ 363.162368] ret_from_fork_asm+0x1a/0x30 [ 363.163795] The buggy address belongs to the object at ffff8881a461e560 which belongs to the cache kmalloc-16 of size 16 [ 363.165753] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff8881a461e560, ffff8881a461e569) [ 363.168329] The buggy address belongs to the physical page: [ 363.169276] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1a461e [ 363.170429] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 363.171468] page_type: 0xfdffffff(slab) [ 363.172287] raw: 0017ffffc0000000 ffff88810004c640 dead000000000122 0000000000000000 [ 363.173432] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 [ 363.174572] page dumped because: kasan: bad access detected [ 363.176161] Memory state around the buggy address: [ 363.177056] ffff8881a461e400: fc fc fc fc fc fc fc fc fa fb fc fc fc fc fc fc [ 363.178154] ffff8881a461e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.179243] >ffff8881a461e500: fc fc fc fc fc fc fc fc fc fc fc fc 00 01 fc fc [ 363.180325] ^ [ 363.181365] ffff8881a461e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.182464] ffff8881a461e600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.183557] ================================================================== [ 363.184670] ================================================================== [ 363.185817] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xeb/0xd80 [kasan_test] [ 363.187178] Write of size 8 at addr ffff8881a461e568 by task kunit_try_catch/4672 [ 363.188957] CPU: 4 UID: 0 PID: 4672 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 363.190870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 363.191770] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 363.193137] Call Trace: [ 363.193920] [ 363.194675] dump_stack_lvl+0x53/0x70 [ 363.195562] print_address_description.constprop.0+0x2c/0x3a0 [ 363.196626] ? kasan_bitops_test_and_modify.constprop.0+0xeb/0xd80 [kasan_test] [ 363.197834] print_report+0xb9/0x2b0 [ 363.198735] ? kasan_addr_to_slab+0xd/0xb0 [ 363.199678] ? kasan_bitops_test_and_modify.constprop.0+0xeb/0xd80 [kasan_test] [ 363.200895] kasan_report+0xe8/0x120 [ 363.201802] ? kasan_bitops_test_and_modify.constprop.0+0xeb/0xd80 [kasan_test] [ 363.203029] kasan_check_range+0x100/0x1b0 [ 363.203992] kasan_bitops_test_and_modify.constprop.0+0xeb/0xd80 [kasan_test] [ 363.205222] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [kasan_test] [ 363.206510] kasan_bitops_generic+0x118/0x1c0 [kasan_test] [ 363.207612] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 363.208758] ? ktime_get_ts64+0x7f/0x230 [ 363.209725] kunit_try_run_case+0x1b0/0x490 [ 363.210709] ? __pfx_kunit_try_run_case+0x10/0x10 [ 363.211732] ? set_cpus_allowed_ptr+0x85/0xc0 [ 363.212722] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 363.213748] ? __pfx_kunit_try_run_case+0x10/0x10 [ 363.214751] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 363.215866] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 363.216919] kthread+0x2d8/0x3c0 [ 363.217794] ? __pfx_kthread+0x10/0x10 [ 363.218702] ret_from_fork+0x31/0x70 [ 363.219591] ? __pfx_kthread+0x10/0x10 [ 363.220492] ret_from_fork_asm+0x1a/0x30 [ 363.221401] [ 363.222874] Allocated by task 4672: [ 363.223737] kasan_save_stack+0x33/0x60 [ 363.224620] kasan_save_track+0x14/0x30 [ 363.225503] __kasan_kmalloc+0xaa/0xb0 [ 363.226372] kasan_bitops_generic+0x89/0x1c0 [kasan_test] [ 363.227391] kunit_try_run_case+0x1b0/0x490 [ 363.228295] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 363.229287] kthread+0x2d8/0x3c0 [ 363.230094] ret_from_fork+0x31/0x70 [ 363.230916] ret_from_fork_asm+0x1a/0x30 [ 363.232374] The buggy address belongs to the object at ffff8881a461e560 which belongs to the cache kmalloc-16 of size 16 [ 363.234364] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff8881a461e560, ffff8881a461e569) [ 363.236989] The buggy address belongs to the physical page: [ 363.237950] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1a461e [ 363.239117] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 363.240170] page_type: 0xfdffffff(slab) [ 363.241001] raw: 0017ffffc0000000 ffff88810004c640 dead000000000122 0000000000000000 [ 363.242155] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 [ 363.243304] page dumped because: kasan: bad access detected [ 363.244904] Memory state around the buggy address: [ 363.245801] ffff8881a461e400: fc fc fc fc fc fc fc fc fa fb fc fc fc fc fc fc [ 363.246900] ffff8881a461e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.247991] >ffff8881a461e500: fc fc fc fc fc fc fc fc fc fc fc fc 00 01 fc fc [ 363.249074] ^ [ 363.250117] ffff8881a461e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.251216] ffff8881a461e600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.252309] ================================================================== [ 363.253413] ================================================================== [ 363.254553] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x189/0xd80 [kasan_test] [ 363.255917] Write of size 8 at addr ffff8881a461e568 by task kunit_try_catch/4672 [ 363.257698] CPU: 4 UID: 0 PID: 4672 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 363.259594] Tainted: [B]=BAD_PAGE, [N]=TEST [ 363.260510] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 363.261877] Call Trace: [ 363.262660] [ 363.263405] dump_stack_lvl+0x53/0x70 [ 363.264308] print_address_description.constprop.0+0x2c/0x3a0 [ 363.265375] ? kasan_bitops_test_and_modify.constprop.0+0x189/0xd80 [kasan_test] [ 363.266582] print_report+0xb9/0x2b0 [ 363.267473] ? kasan_addr_to_slab+0xd/0xb0 [ 363.268432] ? kasan_bitops_test_and_modify.constprop.0+0x189/0xd80 [kasan_test] [ 363.269655] kasan_report+0xe8/0x120 [ 363.270552] ? kasan_bitops_test_and_modify.constprop.0+0x189/0xd80 [kasan_test] [ 363.271791] kasan_check_range+0x100/0x1b0 [ 363.272756] kasan_bitops_test_and_modify.constprop.0+0x189/0xd80 [kasan_test] [ 363.273991] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [kasan_test] [ 363.275271] kasan_bitops_generic+0x118/0x1c0 [kasan_test] [ 363.276390] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 363.277537] ? ktime_get_ts64+0x7f/0x230 [ 363.278494] kunit_try_run_case+0x1b0/0x490 [ 363.279468] ? __pfx_kunit_try_run_case+0x10/0x10 [ 363.280508] ? set_cpus_allowed_ptr+0x85/0xc0 [ 363.281500] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 363.282517] ? __pfx_kunit_try_run_case+0x10/0x10 [ 363.283511] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 363.284641] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 363.285693] kthread+0x2d8/0x3c0 [ 363.286557] ? __pfx_kthread+0x10/0x10 [ 363.287456] ret_from_fork+0x31/0x70 [ 363.288362] ? __pfx_kthread+0x10/0x10 [ 363.289271] ret_from_fork_asm+0x1a/0x30 [ 363.290170] [ 363.291625] Allocated by task 4672: [ 363.292503] kasan_save_stack+0x33/0x60 [ 363.293390] kasan_save_track+0x14/0x30 [ 363.294264] __kasan_kmalloc+0xaa/0xb0 [ 363.295124] kasan_bitops_generic+0x89/0x1c0 [kasan_test] [ 363.296158] kunit_try_run_case+0x1b0/0x490 [ 363.297073] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 363.298056] kthread+0x2d8/0x3c0 [ 363.298854] ret_from_fork+0x31/0x70 [ 363.299667] ret_from_fork_asm+0x1a/0x30 [ 363.301150] The buggy address belongs to the object at ffff8881a461e560 which belongs to the cache kmalloc-16 of size 16 [ 363.303123] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff8881a461e560, ffff8881a461e569) [ 363.305762] The buggy address belongs to the physical page: [ 363.306714] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1a461e [ 363.307889] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 363.308943] page_type: 0xfdffffff(slab) [ 363.309772] raw: 0017ffffc0000000 ffff88810004c640 dead000000000122 0000000000000000 [ 363.310917] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 [ 363.312077] page dumped because: kasan: bad access detected [ 363.313675] Memory state around the buggy address: [ 363.314561] ffff8881a461e400: fc fc fc fc fc fc fc fc fa fb fc fc fc fc fc fc [ 363.315650] ffff8881a461e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.316753] >ffff8881a461e500: fc fc fc fc fc fc fc fc fc fc fc fc 00 01 fc fc [ 363.317836] ^ [ 363.318867] ffff8881a461e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.319978] ffff8881a461e600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.321080] ================================================================== [ 363.322176] ================================================================== [ 363.323338] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x226/0xd80 [kasan_test] [ 363.324697] Write of size 8 at addr ffff8881a461e568 by task kunit_try_catch/4672 [ 363.326469] CPU: 4 UID: 0 PID: 4672 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 363.328393] Tainted: [B]=BAD_PAGE, [N]=TEST [ 363.329299] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 363.330656] Call Trace: [ 363.331430] [ 363.332201] dump_stack_lvl+0x53/0x70 [ 363.333097] print_address_description.constprop.0+0x2c/0x3a0 [ 363.334150] ? kasan_bitops_test_and_modify.constprop.0+0x226/0xd80 [kasan_test] [ 363.335355] print_report+0xb9/0x2b0 [ 363.336273] ? kasan_addr_to_slab+0xd/0xb0 [ 363.337223] ? kasan_bitops_test_and_modify.constprop.0+0x226/0xd80 [kasan_test] [ 363.338436] kasan_report+0xe8/0x120 [ 363.339333] ? kasan_bitops_test_and_modify.constprop.0+0x226/0xd80 [kasan_test] [ 363.340583] kasan_check_range+0x100/0x1b0 [ 363.341546] kasan_bitops_test_and_modify.constprop.0+0x226/0xd80 [kasan_test] [ 363.342773] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [kasan_test] [ 363.344074] kasan_bitops_generic+0x118/0x1c0 [kasan_test] [ 363.345186] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 363.346321] ? ktime_get_ts64+0x7f/0x230 [ 363.347278] kunit_try_run_case+0x1b0/0x490 [ 363.348279] ? __pfx_kunit_try_run_case+0x10/0x10 [ 363.349303] ? set_cpus_allowed_ptr+0x85/0xc0 [ 363.350299] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 363.351316] ? __pfx_kunit_try_run_case+0x10/0x10 [ 363.352337] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 363.353453] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 363.354496] kthread+0x2d8/0x3c0 [ 363.355362] ? __pfx_kthread+0x10/0x10 [ 363.356288] ret_from_fork+0x31/0x70 [ 363.357186] ? __pfx_kthread+0x10/0x10 [ 363.358079] ret_from_fork_asm+0x1a/0x30 [ 363.358979] [ 363.360459] Allocated by task 4672: [ 363.361327] kasan_save_stack+0x33/0x60 [ 363.362201] kasan_save_track+0x14/0x30 [ 363.363075] __kasan_kmalloc+0xaa/0xb0 [ 363.363955] kasan_bitops_generic+0x89/0x1c0 [kasan_test] [ 363.364975] kunit_try_run_case+0x1b0/0x490 [ 363.365878] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 363.366869] kthread+0x2d8/0x3c0 [ 363.367667] ret_from_fork+0x31/0x70 [ 363.368503] ret_from_fork_asm+0x1a/0x30 [ 363.369955] The buggy address belongs to the object at ffff8881a461e560 which belongs to the cache kmalloc-16 of size 16 [ 363.371946] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff8881a461e560, ffff8881a461e569) [ 363.374553] The buggy address belongs to the physical page: [ 363.375506] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1a461e [ 363.376686] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 363.377738] page_type: 0xfdffffff(slab) [ 363.378558] raw: 0017ffffc0000000 ffff88810004c640 dead000000000122 0000000000000000 [ 363.379701] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 [ 363.380862] page dumped because: kasan: bad access detected [ 363.382452] Memory state around the buggy address: [ 363.383338] ffff8881a461e400: fc fc fc fc fc fc fc fc fa fb fc fc fc fc fc fc [ 363.384451] ffff8881a461e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.385540] >ffff8881a461e500: fc fc fc fc fc fc fc fc fc fc fc fc 00 01 fc fc [ 363.386612] ^ [ 363.387643] ffff8881a461e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.388757] ffff8881a461e600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.389849] ================================================================== [ 363.390943] ================================================================== [ 363.392052] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2c4/0xd80 [kasan_test] [ 363.393423] Write of size 8 at addr ffff8881a461e568 by task kunit_try_catch/4672 [ 363.395192] CPU: 4 UID: 0 PID: 4672 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 363.397110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 363.398021] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 363.399378] Call Trace: [ 363.400151] [ 363.400916] dump_stack_lvl+0x53/0x70 [ 363.401804] print_address_description.constprop.0+0x2c/0x3a0 [ 363.402866] ? kasan_bitops_test_and_modify.constprop.0+0x2c4/0xd80 [kasan_test] [ 363.404071] print_report+0xb9/0x2b0 [ 363.404984] ? kasan_addr_to_slab+0xd/0xb0 [ 363.405928] ? kasan_bitops_test_and_modify.constprop.0+0x2c4/0xd80 [kasan_test] [ 363.407150] kasan_report+0xe8/0x120 [ 363.408048] ? kasan_bitops_test_and_modify.constprop.0+0x2c4/0xd80 [kasan_test] [ 363.409299] kasan_check_range+0x100/0x1b0 [ 363.410269] kasan_bitops_test_and_modify.constprop.0+0x2c4/0xd80 [kasan_test] [ 363.411494] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [kasan_test] [ 363.412787] kasan_bitops_generic+0x118/0x1c0 [kasan_test] [ 363.413892] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 363.415036] ? ktime_get_ts64+0x7f/0x230 [ 363.415992] kunit_try_run_case+0x1b0/0x490 [ 363.416984] ? __pfx_kunit_try_run_case+0x10/0x10 [ 363.418018] ? set_cpus_allowed_ptr+0x85/0xc0 [ 363.418997] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 363.420012] ? __pfx_kunit_try_run_case+0x10/0x10 [ 363.421025] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 363.422148] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 363.423190] kthread+0x2d8/0x3c0 [ 363.424055] ? __pfx_kthread+0x10/0x10 [ 363.424973] ret_from_fork+0x31/0x70 [ 363.425863] ? __pfx_kthread+0x10/0x10 [ 363.426763] ret_from_fork_asm+0x1a/0x30 [ 363.427661] [ 363.429137] Allocated by task 4672: [ 363.430009] kasan_save_stack+0x33/0x60 [ 363.430881] kasan_save_track+0x14/0x30 [ 363.431754] __kasan_kmalloc+0xaa/0xb0 [ 363.432614] kasan_bitops_generic+0x89/0x1c0 [kasan_test] [ 363.433649] kunit_try_run_case+0x1b0/0x490 [ 363.434550] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 363.435532] kthread+0x2d8/0x3c0 [ 363.436328] ret_from_fork+0x31/0x70 [ 363.437164] ret_from_fork_asm+0x1a/0x30 [ 363.438620] The buggy address belongs to the object at ffff8881a461e560 which belongs to the cache kmalloc-16 of size 16 [ 363.440591] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff8881a461e560, ffff8881a461e569) [ 363.443215] The buggy address belongs to the physical page: [ 363.444165] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1a461e [ 363.445343] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 363.446395] page_type: 0xfdffffff(slab) [ 363.447213] raw: 0017ffffc0000000 ffff88810004c640 dead000000000122 0000000000000000 [ 363.448355] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 [ 363.449516] page dumped because: kasan: bad access detected [ 363.451102] Memory state around the buggy address: [ 363.451987] ffff8881a461e400: fc fc fc fc fc fc fc fc fa fb fc fc fc fc fc fc [ 363.453096] ffff8881a461e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.454190] >ffff8881a461e500: fc fc fc fc fc fc fc fc fc fc fc fc 00 01 fc fc [ 363.455262] ^ [ 363.456293] ffff8881a461e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.457406] ffff8881a461e600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.458498] ================================================================== [ 363.459594] ================================================================== [ 363.460702] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x362/0xd80 [kasan_test] [ 363.462050] Write of size 8 at addr ffff8881a461e568 by task kunit_try_catch/4672 [ 363.463826] CPU: 4 UID: 0 PID: 4672 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 363.465755] Tainted: [B]=BAD_PAGE, [N]=TEST [ 363.466656] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 363.468014] Call Trace: [ 363.468804] [ 363.469560] dump_stack_lvl+0x53/0x70 [ 363.470449] print_address_description.constprop.0+0x2c/0x3a0 [ 363.471501] ? kasan_bitops_test_and_modify.constprop.0+0x362/0xd80 [kasan_test] [ 363.472705] print_report+0xb9/0x2b0 [ 363.473622] ? kasan_addr_to_slab+0xd/0xb0 [ 363.474564] ? kasan_bitops_test_and_modify.constprop.0+0x362/0xd80 [kasan_test] [ 363.475776] kasan_report+0xe8/0x120 [ 363.476673] ? kasan_bitops_test_and_modify.constprop.0+0x362/0xd80 [kasan_test] [ 363.477923] kasan_check_range+0x100/0x1b0 [ 363.478885] kasan_bitops_test_and_modify.constprop.0+0x362/0xd80 [kasan_test] [ 363.480111] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [kasan_test] [ 363.481416] kasan_bitops_generic+0x118/0x1c0 [kasan_test] [ 363.482521] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 363.483656] ? ktime_get_ts64+0x7f/0x230 [ 363.484613] kunit_try_run_case+0x1b0/0x490 [ 363.485613] ? __pfx_kunit_try_run_case+0x10/0x10 [ 363.486634] ? set_cpus_allowed_ptr+0x85/0xc0 [ 363.487614] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 363.488631] ? __pfx_kunit_try_run_case+0x10/0x10 [ 363.489650] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 363.490764] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 363.491807] kthread+0x2d8/0x3c0 [ 363.492673] ? __pfx_kthread+0x10/0x10 [ 363.493598] ret_from_fork+0x31/0x70 [ 363.494489] ? __pfx_kthread+0x10/0x10 [ 363.495382] ret_from_fork_asm+0x1a/0x30 [ 363.496281] [ 363.497771] Allocated by task 4672: [ 363.498632] kasan_save_stack+0x33/0x60 [ 363.499505] kasan_save_track+0x14/0x30 [ 363.500379] __kasan_kmalloc+0xaa/0xb0 [ 363.501266] kasan_bitops_generic+0x89/0x1c0 [kasan_test] [ 363.502291] kunit_try_run_case+0x1b0/0x490 [ 363.503184] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 363.504166] kthread+0x2d8/0x3c0 [ 363.504984] ret_from_fork+0x31/0x70 [ 363.505806] ret_from_fork_asm+0x1a/0x30 [ 363.507255] The buggy address belongs to the object at ffff8881a461e560 which belongs to the cache kmalloc-16 of size 16 [ 363.509253] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff8881a461e560, ffff8881a461e569) [ 363.511859] The buggy address belongs to the physical page: [ 363.512829] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1a461e [ 363.514005] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 363.515047] page_type: 0xfdffffff(slab) [ 363.515867] raw: 0017ffffc0000000 ffff88810004c640 dead000000000122 0000000000000000 [ 363.517032] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 [ 363.518186] page dumped because: kasan: bad access detected [ 363.519764] Memory state around the buggy address: [ 363.520651] ffff8881a461e400: fc fc fc fc fc fc fc fc fa fb fc fc fc fc fc fc [ 363.521762] ffff8881a461e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.522851] >ffff8881a461e500: fc fc fc fc fc fc fc fc fc fc fc fc 00 01 fc fc [ 363.523923] ^ [ 363.524974] ffff8881a461e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.526083] ffff8881a461e600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.527166] ================================================================== [ 363.528261] ================================================================== [ 363.529368] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x3ff/0xd80 [kasan_test] [ 363.530716] Write of size 8 at addr ffff8881a461e568 by task kunit_try_catch/4672 [ 363.532477] CPU: 4 UID: 0 PID: 4672 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 363.534372] Tainted: [B]=BAD_PAGE, [N]=TEST [ 363.535264] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 363.536620] Call Trace: [ 363.537393] [ 363.538139] dump_stack_lvl+0x53/0x70 [ 363.539016] print_address_description.constprop.0+0x2c/0x3a0 [ 363.540069] ? kasan_bitops_test_and_modify.constprop.0+0x3ff/0xd80 [kasan_test] [ 363.541274] print_report+0xb9/0x2b0 [ 363.542166] ? kasan_addr_to_slab+0xd/0xb0 [ 363.543098] ? kasan_bitops_test_and_modify.constprop.0+0x3ff/0xd80 [kasan_test] [ 363.544310] kasan_report+0xe8/0x120 [ 363.545207] ? kasan_bitops_test_and_modify.constprop.0+0x3ff/0xd80 [kasan_test] [ 363.546429] kasan_check_range+0x100/0x1b0 [ 363.547381] kasan_bitops_test_and_modify.constprop.0+0x3ff/0xd80 [kasan_test] [ 363.548607] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [kasan_test] [ 363.549884] kasan_bitops_generic+0x118/0x1c0 [kasan_test] [ 363.550975] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 363.552109] ? ktime_get_ts64+0x7f/0x230 [ 363.553065] kunit_try_run_case+0x1b0/0x490 [ 363.554037] ? __pfx_kunit_try_run_case+0x10/0x10 [ 363.555048] ? set_cpus_allowed_ptr+0x85/0xc0 [ 363.556028] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 363.557044] ? __pfx_kunit_try_run_case+0x10/0x10 [ 363.558036] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 363.559140] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 363.560183] kthread+0x2d8/0x3c0 [ 363.561048] ? __pfx_kthread+0x10/0x10 [ 363.561948] ret_from_fork+0x31/0x70 [ 363.562827] ? __pfx_kthread+0x10/0x10 [ 363.563719] ret_from_fork_asm+0x1a/0x30 [ 363.564618] [ 363.566073] Allocated by task 4672: [ 363.566926] kasan_save_stack+0x33/0x60 [ 363.567799] kasan_save_track+0x14/0x30 [ 363.568674] __kasan_kmalloc+0xaa/0xb0 [ 363.569534] kasan_bitops_generic+0x89/0x1c0 [kasan_test] [ 363.570545] kunit_try_run_case+0x1b0/0x490 [ 363.571438] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 363.572419] kthread+0x2d8/0x3c0 [ 363.573215] ret_from_fork+0x31/0x70 [ 363.574028] ret_from_fork_asm+0x1a/0x30 [ 363.575467] The buggy address belongs to the object at ffff8881a461e560 which belongs to the cache kmalloc-16 of size 16 [ 363.577439] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff8881a461e560, ffff8881a461e569) [ 363.580037] The buggy address belongs to the physical page: [ 363.580990] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1a461e [ 363.582145] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 363.583188] page_type: 0xfdffffff(slab) [ 363.584008] raw: 0017ffffc0000000 ffff88810004c640 dead000000000122 0000000000000000 [ 363.585153] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 [ 363.586291] page dumped because: kasan: bad access detected [ 363.587871] Memory state around the buggy address: [ 363.588759] ffff8881a461e400: fc fc fc fc fc fc fc fc fa fb fc fc fc fc fc fc [ 363.589847] ffff8881a461e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.590928] >ffff8881a461e500: fc fc fc fc fc fc fc fc fc fc fc fc 00 01 fc fc [ 363.592001] ^ [ 363.593033] ffff8881a461e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.594124] ffff8881a461e600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.595208] ================================================================== [ 363.596304] ================================================================== [ 363.597412] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x49d/0xd80 [kasan_test] [ 363.598759] Write of size 8 at addr ffff8881a461e568 by task kunit_try_catch/4672 [ 363.600520] CPU: 4 UID: 0 PID: 4672 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 363.602415] Tainted: [B]=BAD_PAGE, [N]=TEST [ 363.603308] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 363.604665] Call Trace: [ 363.605440] [ 363.606186] dump_stack_lvl+0x53/0x70 [ 363.607062] print_address_description.constprop.0+0x2c/0x3a0 [ 363.608114] ? kasan_bitops_test_and_modify.constprop.0+0x49d/0xd80 [kasan_test] [ 363.609336] print_report+0xb9/0x2b0 [ 363.610239] ? kasan_addr_to_slab+0xd/0xb0 [ 363.611183] ? kasan_bitops_test_and_modify.constprop.0+0x49d/0xd80 [kasan_test] [ 363.612408] kasan_report+0xe8/0x120 [ 363.613317] ? kasan_bitops_test_and_modify.constprop.0+0x49d/0xd80 [kasan_test] [ 363.614553] kasan_check_range+0x100/0x1b0 [ 363.615518] kasan_bitops_test_and_modify.constprop.0+0x49d/0xd80 [kasan_test] [ 363.616756] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [kasan_test] [ 363.618047] kasan_bitops_generic+0x118/0x1c0 [kasan_test] [ 363.619152] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 363.620299] ? ktime_get_ts64+0x7f/0x230 [ 363.621267] kunit_try_run_case+0x1b0/0x490 [ 363.622253] ? __pfx_kunit_try_run_case+0x10/0x10 [ 363.623277] ? set_cpus_allowed_ptr+0x85/0xc0 [ 363.624270] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 363.625299] ? __pfx_kunit_try_run_case+0x10/0x10 [ 363.626304] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 363.627420] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 363.628475] kthread+0x2d8/0x3c0 [ 363.629352] ? __pfx_kthread+0x10/0x10 [ 363.630262] ret_from_fork+0x31/0x70 [ 363.631153] ? __pfx_kthread+0x10/0x10 [ 363.632057] ret_from_fork_asm+0x1a/0x30 [ 363.632966] [ 363.634444] Allocated by task 4672: [ 363.635307] kasan_save_stack+0x33/0x60 [ 363.636191] kasan_save_track+0x14/0x30 [ 363.637077] __kasan_kmalloc+0xaa/0xb0 [ 363.637948] kasan_bitops_generic+0x89/0x1c0 [kasan_test] [ 363.638969] kunit_try_run_case+0x1b0/0x490 [ 363.639873] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 363.640866] kthread+0x2d8/0x3c0 [ 363.641674] ret_from_fork+0x31/0x70 [ 363.642496] ret_from_fork_asm+0x1a/0x30 [ 363.643953] The buggy address belongs to the object at ffff8881a461e560 which belongs to the cache kmalloc-16 of size 16 [ 363.645943] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff8881a461e560, ffff8881a461e569) [ 363.648568] The buggy address belongs to the physical page: [ 363.649528] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1a461e [ 363.650694] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 363.651746] page_type: 0xfdffffff(slab) [ 363.652575] raw: 0017ffffc0000000 ffff88810004c640 dead000000000122 0000000000000000 [ 363.653727] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 [ 363.654874] page dumped because: kasan: bad access detected [ 363.656471] Memory state around the buggy address: [ 363.657367] ffff8881a461e400: fc fc fc fc fc fc fc fc fa fb fc fc fc fc fc fc [ 363.658465] ffff8881a461e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.659553] >ffff8881a461e500: fc fc fc fc fc fc fc fc fc fc fc fc 00 01 fc fc [ 363.660635] ^ [ 363.661675] ffff8881a461e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.662774] ffff8881a461e600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.663866] ================================================================== [ 363.664969] ================================================================== [ 363.666061] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x53a/0xd80 [kasan_test] [ 363.667410] Read of size 8 at addr ffff8881a461e568 by task kunit_try_catch/4672 [ 363.669182] CPU: 4 UID: 0 PID: 4672 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 363.671095] Tainted: [B]=BAD_PAGE, [N]=TEST [ 363.671995] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 363.673361] Call Trace: [ 363.674144] [ 363.674900] dump_stack_lvl+0x53/0x70 [ 363.675785] print_address_description.constprop.0+0x2c/0x3a0 [ 363.676847] ? kasan_bitops_test_and_modify.constprop.0+0x53a/0xd80 [kasan_test] [ 363.678062] print_report+0xb9/0x2b0 [ 363.678963] ? kasan_addr_to_slab+0xd/0xb0 [ 363.679904] ? kasan_bitops_test_and_modify.constprop.0+0x53a/0xd80 [kasan_test] [ 363.681127] kasan_report+0xe8/0x120 [ 363.682034] ? kasan_bitops_test_and_modify.constprop.0+0x53a/0xd80 [kasan_test] [ 363.683269] kasan_check_range+0x100/0x1b0 [ 363.684232] kasan_bitops_test_and_modify.constprop.0+0x53a/0xd80 [kasan_test] [ 363.685469] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [kasan_test] [ 363.686758] kasan_bitops_generic+0x118/0x1c0 [kasan_test] [ 363.687862] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 363.689008] ? ktime_get_ts64+0x7f/0x230 [ 363.689976] kunit_try_run_case+0x1b0/0x490 [ 363.690960] ? __pfx_kunit_try_run_case+0x10/0x10 [ 363.691983] ? set_cpus_allowed_ptr+0x85/0xc0 [ 363.692975] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 363.694002] ? __pfx_kunit_try_run_case+0x10/0x10 [ 363.695006] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 363.696121] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 363.697175] kthread+0x2d8/0x3c0 [ 363.698051] ? __pfx_kthread+0x10/0x10 [ 363.698960] ret_from_fork+0x31/0x70 [ 363.699850] ? __pfx_kthread+0x10/0x10 [ 363.700751] ret_from_fork_asm+0x1a/0x30 [ 363.701660] [ 363.703134] Allocated by task 4672: [ 363.703996] kasan_save_stack+0x33/0x60 [ 363.704879] kasan_save_track+0x14/0x30 [ 363.705764] __kasan_kmalloc+0xaa/0xb0 [ 363.706634] kasan_bitops_generic+0x89/0x1c0 [kasan_test] [ 363.707653] kunit_try_run_case+0x1b0/0x490 [ 363.708556] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 363.709546] kthread+0x2d8/0x3c0 [ 363.710353] ret_from_fork+0x31/0x70 [ 363.711174] ret_from_fork_asm+0x1a/0x30 [ 363.712629] The buggy address belongs to the object at ffff8881a461e560 which belongs to the cache kmalloc-16 of size 16 [ 363.714617] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff8881a461e560, ffff8881a461e569) [ 363.717241] The buggy address belongs to the physical page: [ 363.718202] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1a461e [ 363.719368] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 363.720421] page_type: 0xfdffffff(slab) [ 363.721251] raw: 0017ffffc0000000 ffff88810004c640 dead000000000122 0000000000000000 [ 363.722404] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 [ 363.723551] page dumped because: kasan: bad access detected [ 363.725147] Memory state around the buggy address: [ 363.726043] ffff8881a461e400: fc fc fc fc fc fc fc fc fa fb fc fc fc fc fc fc [ 363.727141] ffff8881a461e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.728230] >ffff8881a461e500: fc fc fc fc fc fc fc fc fc fc fc fc 00 01 fc fc [ 363.729312] ^ [ 363.730353] ffff8881a461e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.731452] ffff8881a461e600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.732546] ================================================================== [ 363.733652] ================================================================== [ 363.734745] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xcfa/0xd80 [kasan_test] [ 363.736094] Read of size 8 at addr ffff8881a461e568 by task kunit_try_catch/4672 [ 363.737866] CPU: 4 UID: 0 PID: 4672 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 363.739779] Tainted: [B]=BAD_PAGE, [N]=TEST [ 363.740681] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 363.742048] Call Trace: [ 363.742832] [ 363.743588] dump_stack_lvl+0x53/0x70 [ 363.744475] print_address_description.constprop.0+0x2c/0x3a0 [ 363.745538] ? kasan_bitops_test_and_modify.constprop.0+0xcfa/0xd80 [kasan_test] [ 363.746755] print_report+0xb9/0x2b0 [ 363.747657] ? kasan_addr_to_slab+0xd/0xb0 [ 363.748600] ? kasan_bitops_test_and_modify.constprop.0+0xcfa/0xd80 [kasan_test] [ 363.749825] kasan_report+0xe8/0x120 [ 363.750733] ? kasan_bitops_test_and_modify.constprop.0+0xcfa/0xd80 [kasan_test] [ 363.751968] kasan_bitops_test_and_modify.constprop.0+0xcfa/0xd80 [kasan_test] [ 363.753197] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [kasan_test] [ 363.754481] kasan_bitops_generic+0x118/0x1c0 [kasan_test] [ 363.755587] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 363.756733] ? ktime_get_ts64+0x7f/0x230 [ 363.757700] kunit_try_run_case+0x1b0/0x490 [ 363.758685] ? __pfx_kunit_try_run_case+0x10/0x10 [ 363.759710] ? set_cpus_allowed_ptr+0x85/0xc0 [ 363.760699] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 363.761731] ? __pfx_kunit_try_run_case+0x10/0x10 [ 363.762738] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 363.763854] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 363.764910] kthread+0x2d8/0x3c0 [ 363.765781] ? __pfx_kthread+0x10/0x10 [ 363.766694] ret_from_fork+0x31/0x70 [ 363.767583] ? __pfx_kthread+0x10/0x10 [ 363.768480] ret_from_fork_asm+0x1a/0x30 [ 363.769392] [ 363.770847] Allocated by task 4672: [ 363.771714] kasan_save_stack+0x33/0x60 [ 363.772601] kasan_save_track+0x14/0x30 [ 363.773475] __kasan_kmalloc+0xaa/0xb0 [ 363.774346] kasan_bitops_generic+0x89/0x1c0 [kasan_test] [ 363.775354] kunit_try_run_case+0x1b0/0x490 [ 363.776265] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 363.777264] kthread+0x2d8/0x3c0 [ 363.778073] ret_from_fork+0x31/0x70 [ 363.778901] ret_from_fork_asm+0x1a/0x30 [ 363.780365] The buggy address belongs to the object at ffff8881a461e560 which belongs to the cache kmalloc-16 of size 16 [ 363.782367] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff8881a461e560, ffff8881a461e569) [ 363.784971] The buggy address belongs to the physical page: [ 363.785934] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1a461e [ 363.787100] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 363.788147] page_type: 0xfdffffff(slab) [ 363.788976] raw: 0017ffffc0000000 ffff88810004c640 dead000000000122 0000000000000000 [ 363.790131] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000 [ 363.791280] page dumped because: kasan: bad access detected [ 363.792878] Memory state around the buggy address: [ 363.793774] ffff8881a461e400: fc fc fc fc fc fc fc fc fa fb fc fc fc fc fc fc [ 363.794870] ffff8881a461e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.795958] >ffff8881a461e500: fc fc fc fc fc fc fc fc fc fc fc fc 00 01 fc fc [ 363.797040] ^ [ 363.798079] ffff8881a461e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.799178] ffff8881a461e600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 363.800271] ================================================================== [ 363.801737] ok 61 kasan_bitops_generic [ 363.801939] ok 62 kasan_bitops_tags # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 363.802877] ================================================================== [ 363.805143] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8f/0x5400 [kasan_test] [ 363.806381] Read of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 363.808193] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 363.810149] Tainted: [B]=BAD_PAGE, [N]=TEST [ 363.811070] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 363.812462] Call Trace: [ 363.813270] [ 363.814047] dump_stack_lvl+0x53/0x70 [ 363.814961] print_address_description.constprop.0+0x2c/0x3a0 [ 363.816049] ? kasan_atomics_helper+0x4b8f/0x5400 [kasan_test] [ 363.817149] print_report+0xb9/0x2b0 [ 363.818058] ? kasan_addr_to_slab+0xd/0xb0 [ 363.819008] ? kasan_atomics_helper+0x4b8f/0x5400 [kasan_test] [ 363.820107] kasan_report+0xe8/0x120 [ 363.821018] ? kasan_atomics_helper+0x4b8f/0x5400 [kasan_test] [ 363.822129] kasan_atomics_helper+0x4b8f/0x5400 [kasan_test] [ 363.823231] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 363.824360] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 363.825394] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 363.826471] ? __schedule+0x7ec/0x1950 [ 363.827401] ? ktime_get_ts64+0x7f/0x230 [ 363.828339] kunit_try_run_case+0x1b0/0x490 [ 363.829296] ? __pfx_kunit_try_run_case+0x10/0x10 [ 363.830287] ? set_cpus_allowed_ptr+0x85/0xc0 [ 363.831242] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 363.832236] ? __pfx_kunit_try_run_case+0x10/0x10 [ 363.833207] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 363.834293] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 363.835318] kthread+0x2d8/0x3c0 [ 363.836164] ? __pfx_kthread+0x10/0x10 [ 363.837050] ret_from_fork+0x31/0x70 [ 363.837912] ? __pfx_kthread+0x10/0x10 [ 363.838791] ret_from_fork_asm+0x1a/0x30 [ 363.839689] [ 363.841102] Allocated by task 4680: [ 363.841942] kasan_save_stack+0x33/0x60 [ 363.842804] kasan_save_track+0x14/0x30 [ 363.843654] __kasan_kmalloc+0xaa/0xb0 [ 363.844492] kasan_atomics+0x96/0x2d0 [kasan_test] [ 363.845415] kunit_try_run_case+0x1b0/0x490 [ 363.846274] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 363.847225] kthread+0x2d8/0x3c0 [ 363.847991] ret_from_fork+0x31/0x70 [ 363.848772] ret_from_fork_asm+0x1a/0x30 [ 363.850146] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 363.852053] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 363.854607] The buggy address belongs to the physical page: [ 363.855532] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 363.856665] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 363.857685] page_type: 0xfdffffff(slab) [ 363.858485] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 363.859613] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 363.860738] page dumped because: kasan: bad access detected [ 363.862298] Memory state around the buggy address: [ 363.863180] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 363.864268] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 363.865348] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 363.866429] ^ [ 363.867319] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 363.868417] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 363.869509] ================================================================== [ 363.870616] ================================================================== [ 363.871707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b75/0x5400 [kasan_test] [ 363.872923] Write of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 363.874686] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 363.876583] Tainted: [B]=BAD_PAGE, [N]=TEST [ 363.877475] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 363.878833] Call Trace: [ 363.879608] [ 363.880356] dump_stack_lvl+0x53/0x70 [ 363.881235] print_address_description.constprop.0+0x2c/0x3a0 [ 363.882291] ? kasan_atomics_helper+0x4b75/0x5400 [kasan_test] [ 363.883368] print_report+0xb9/0x2b0 [ 363.884256] ? kasan_addr_to_slab+0xd/0xb0 [ 363.885186] ? kasan_atomics_helper+0x4b75/0x5400 [kasan_test] [ 363.886265] kasan_report+0xe8/0x120 [ 363.887153] ? kasan_atomics_helper+0x4b75/0x5400 [kasan_test] [ 363.888236] kasan_atomics_helper+0x4b75/0x5400 [kasan_test] [ 363.889309] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 363.890418] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 363.891440] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 363.892499] ? __schedule+0x7ec/0x1950 [ 363.893415] ? ktime_get_ts64+0x7f/0x230 [ 363.894341] kunit_try_run_case+0x1b0/0x490 [ 363.895282] ? __pfx_kunit_try_run_case+0x10/0x10 [ 363.896261] ? set_cpus_allowed_ptr+0x85/0xc0 [ 363.897210] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 363.898193] ? __pfx_kunit_try_run_case+0x10/0x10 [ 363.899154] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 363.900226] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 363.901238] kthread+0x2d8/0x3c0 [ 363.902071] ? __pfx_kthread+0x10/0x10 [ 363.902938] ret_from_fork+0x31/0x70 [ 363.903786] ? __pfx_kthread+0x10/0x10 [ 363.904646] ret_from_fork_asm+0x1a/0x30 [ 363.905512] [ 363.906900] Allocated by task 4680: [ 363.907719] kasan_save_stack+0x33/0x60 [ 363.908557] kasan_save_track+0x14/0x30 [ 363.909397] __kasan_kmalloc+0xaa/0xb0 [ 363.910223] kasan_atomics+0x96/0x2d0 [kasan_test] [ 363.911148] kunit_try_run_case+0x1b0/0x490 [ 363.912007] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 363.912959] kthread+0x2d8/0x3c0 [ 363.913724] ret_from_fork+0x31/0x70 [ 363.914505] ret_from_fork_asm+0x1a/0x30 [ 363.915879] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 363.917787] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 363.920339] The buggy address belongs to the physical page: [ 363.921263] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 363.922394] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 363.923412] page_type: 0xfdffffff(slab) [ 363.924213] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 363.925340] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 363.926465] page dumped because: kasan: bad access detected [ 363.928025] Memory state around the buggy address: [ 363.928906] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 363.929995] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 363.931075] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 363.932156] ^ [ 363.933047] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 363.934146] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 363.935239] ================================================================== [ 363.936342] ================================================================== [ 363.937434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b5b/0x5400 [kasan_test] [ 363.938649] Read of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 363.940405] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 363.942303] Tainted: [B]=BAD_PAGE, [N]=TEST [ 363.943196] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 363.944555] Call Trace: [ 363.945331] [ 363.946080] dump_stack_lvl+0x53/0x70 [ 363.946959] print_address_description.constprop.0+0x2c/0x3a0 [ 363.948015] ? kasan_atomics_helper+0x4b5b/0x5400 [kasan_test] [ 363.949090] print_report+0xb9/0x2b0 [ 363.949977] ? kasan_addr_to_slab+0xd/0xb0 [ 363.950907] ? kasan_atomics_helper+0x4b5b/0x5400 [kasan_test] [ 363.951985] kasan_report+0xe8/0x120 [ 363.952874] ? kasan_atomics_helper+0x4b5b/0x5400 [kasan_test] [ 363.953958] kasan_atomics_helper+0x4b5b/0x5400 [kasan_test] [ 363.955033] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 363.956143] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 363.957165] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 363.958226] ? __schedule+0x7ec/0x1950 [ 363.959142] ? ktime_get_ts64+0x7f/0x230 [ 363.960066] kunit_try_run_case+0x1b0/0x490 [ 363.961008] ? __pfx_kunit_try_run_case+0x10/0x10 [ 363.961989] ? set_cpus_allowed_ptr+0x85/0xc0 [ 363.962937] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 363.963921] ? __pfx_kunit_try_run_case+0x10/0x10 [ 363.964882] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 363.965954] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 363.966965] kthread+0x2d8/0x3c0 [ 363.967797] ? __pfx_kthread+0x10/0x10 [ 363.968663] ret_from_fork+0x31/0x70 [ 363.969509] ? __pfx_kthread+0x10/0x10 [ 363.970368] ret_from_fork_asm+0x1a/0x30 [ 363.971233] [ 363.972620] Allocated by task 4680: [ 363.973437] kasan_save_stack+0x33/0x60 [ 363.974275] kasan_save_track+0x14/0x30 [ 363.975113] __kasan_kmalloc+0xaa/0xb0 [ 363.975937] kasan_atomics+0x96/0x2d0 [kasan_test] [ 363.976860] kunit_try_run_case+0x1b0/0x490 [ 363.977718] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 363.978669] kthread+0x2d8/0x3c0 [ 363.979435] ret_from_fork+0x31/0x70 [ 363.980215] ret_from_fork_asm+0x1a/0x30 [ 363.981588] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 363.983494] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 363.986046] The buggy address belongs to the physical page: [ 363.986968] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 363.988099] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 363.989117] page_type: 0xfdffffff(slab) [ 363.989915] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 363.991041] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 363.992164] page dumped because: kasan: bad access detected [ 363.993722] Memory state around the buggy address: [ 363.994603] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 363.995690] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 363.996769] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 363.997852] ^ [ 363.998742] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 363.999839] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.000930] ================================================================== [ 364.002033] ================================================================== [ 364.003125] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b41/0x5400 [kasan_test] [ 364.004340] Write of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 364.006108] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 364.008008] Tainted: [B]=BAD_PAGE, [N]=TEST [ 364.008902] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 364.010262] Call Trace: [ 364.011039] [ 364.011788] dump_stack_lvl+0x53/0x70 [ 364.012668] print_address_description.constprop.0+0x2c/0x3a0 [ 364.013725] ? kasan_atomics_helper+0x4b41/0x5400 [kasan_test] [ 364.014801] print_report+0xb9/0x2b0 [ 364.015689] ? kasan_addr_to_slab+0xd/0xb0 [ 364.016620] ? kasan_atomics_helper+0x4b41/0x5400 [kasan_test] [ 364.017699] kasan_report+0xe8/0x120 [ 364.018589] ? kasan_atomics_helper+0x4b41/0x5400 [kasan_test] [ 364.019673] kasan_atomics_helper+0x4b41/0x5400 [kasan_test] [ 364.020748] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 364.021859] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 364.022881] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 364.023943] ? __schedule+0x7ec/0x1950 [ 364.024860] ? ktime_get_ts64+0x7f/0x230 [ 364.025786] kunit_try_run_case+0x1b0/0x490 [ 364.026729] ? __pfx_kunit_try_run_case+0x10/0x10 [ 364.027710] ? set_cpus_allowed_ptr+0x85/0xc0 [ 364.028659] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 364.029644] ? __pfx_kunit_try_run_case+0x10/0x10 [ 364.030605] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 364.031679] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 364.032692] kthread+0x2d8/0x3c0 [ 364.033526] ? __pfx_kthread+0x10/0x10 [ 364.034394] ret_from_fork+0x31/0x70 [ 364.035242] ? __pfx_kthread+0x10/0x10 [ 364.036103] ret_from_fork_asm+0x1a/0x30 [ 364.036971] [ 364.038360] Allocated by task 4680: [ 364.039179] kasan_save_stack+0x33/0x60 [ 364.040018] kasan_save_track+0x14/0x30 [ 364.040859] __kasan_kmalloc+0xaa/0xb0 [ 364.041684] kasan_atomics+0x96/0x2d0 [kasan_test] [ 364.042608] kunit_try_run_case+0x1b0/0x490 [ 364.043468] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 364.044419] kthread+0x2d8/0x3c0 [ 364.045185] ret_from_fork+0x31/0x70 [ 364.045966] ret_from_fork_asm+0x1a/0x30 [ 364.047343] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 364.049251] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 364.051806] The buggy address belongs to the physical page: [ 364.052732] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 364.053864] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 364.054884] page_type: 0xfdffffff(slab) [ 364.055685] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 364.056813] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 364.057938] page dumped because: kasan: bad access detected [ 364.059499] Memory state around the buggy address: [ 364.060381] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.061470] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.062550] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 364.063632] ^ [ 364.064523] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.065622] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.066714] ================================================================== [ 364.067841] ================================================================== [ 364.068933] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3c2/0x5400 [kasan_test] [ 364.070141] Read of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 364.071898] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 364.073794] Tainted: [B]=BAD_PAGE, [N]=TEST [ 364.074687] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 364.076046] Call Trace: [ 364.076822] [ 364.077569] dump_stack_lvl+0x53/0x70 [ 364.078448] print_address_description.constprop.0+0x2c/0x3a0 [ 364.079504] ? kasan_atomics_helper+0x3c2/0x5400 [kasan_test] [ 364.080573] print_report+0xb9/0x2b0 [ 364.081459] ? kasan_addr_to_slab+0xd/0xb0 [ 364.082388] ? kasan_atomics_helper+0x3c2/0x5400 [kasan_test] [ 364.083460] kasan_report+0xe8/0x120 [ 364.084347] ? kasan_atomics_helper+0x3c2/0x5400 [kasan_test] [ 364.085422] kasan_check_range+0x100/0x1b0 [ 364.086359] kasan_atomics_helper+0x3c2/0x5400 [kasan_test] [ 364.087428] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 364.088539] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 364.089554] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 364.090610] ? __schedule+0x7ec/0x1950 [ 364.091521] ? ktime_get_ts64+0x7f/0x230 [ 364.092442] kunit_try_run_case+0x1b0/0x490 [ 364.093377] ? __pfx_kunit_try_run_case+0x10/0x10 [ 364.094353] ? set_cpus_allowed_ptr+0x85/0xc0 [ 364.095292] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 364.096267] ? __pfx_kunit_try_run_case+0x10/0x10 [ 364.097221] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 364.098285] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 364.099293] kthread+0x2d8/0x3c0 [ 364.100116] ? __pfx_kthread+0x10/0x10 [ 364.100979] ret_from_fork+0x31/0x70 [ 364.101825] ? __pfx_kthread+0x10/0x10 [ 364.102676] ret_from_fork_asm+0x1a/0x30 [ 364.103548] [ 364.104926] Allocated by task 4680: [ 364.105734] kasan_save_stack+0x33/0x60 [ 364.106577] kasan_save_track+0x14/0x30 [ 364.107409] __kasan_kmalloc+0xaa/0xb0 [ 364.108240] kasan_atomics+0x96/0x2d0 [kasan_test] [ 364.109154] kunit_try_run_case+0x1b0/0x490 [ 364.110004] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 364.110948] kthread+0x2d8/0x3c0 [ 364.111702] ret_from_fork+0x31/0x70 [ 364.112467] ret_from_fork_asm+0x1a/0x30 [ 364.113827] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 364.115725] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 364.118274] The buggy address belongs to the physical page: [ 364.119196] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 364.120329] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 364.121347] page_type: 0xfdffffff(slab) [ 364.122145] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 364.123269] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 364.124392] page dumped because: kasan: bad access detected [ 364.125953] Memory state around the buggy address: [ 364.126834] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.127923] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.129005] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 364.130087] ^ [ 364.130978] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.132078] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.133171] ================================================================== [ 364.134277] ================================================================== [ 364.135369] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b27/0x5400 [kasan_test] [ 364.136585] Read of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 364.138344] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 364.140244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 364.141137] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 364.142498] Call Trace: [ 364.143274] [ 364.144024] dump_stack_lvl+0x53/0x70 [ 364.144903] print_address_description.constprop.0+0x2c/0x3a0 [ 364.145960] ? kasan_atomics_helper+0x4b27/0x5400 [kasan_test] [ 364.147037] print_report+0xb9/0x2b0 [ 364.147925] ? kasan_addr_to_slab+0xd/0xb0 [ 364.148854] ? kasan_atomics_helper+0x4b27/0x5400 [kasan_test] [ 364.149935] kasan_report+0xe8/0x120 [ 364.150824] ? kasan_atomics_helper+0x4b27/0x5400 [kasan_test] [ 364.151907] kasan_atomics_helper+0x4b27/0x5400 [kasan_test] [ 364.152982] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 364.154094] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 364.155116] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 364.156177] ? __schedule+0x7ec/0x1950 [ 364.157095] ? ktime_get_ts64+0x7f/0x230 [ 364.158020] kunit_try_run_case+0x1b0/0x490 [ 364.158962] ? __pfx_kunit_try_run_case+0x10/0x10 [ 364.159942] ? set_cpus_allowed_ptr+0x85/0xc0 [ 364.160891] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 364.161875] ? __pfx_kunit_try_run_case+0x10/0x10 [ 364.162836] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 364.163909] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 364.164920] kthread+0x2d8/0x3c0 [ 364.165752] ? __pfx_kthread+0x10/0x10 [ 364.166618] ret_from_fork+0x31/0x70 [ 364.167464] ? __pfx_kthread+0x10/0x10 [ 364.168323] ret_from_fork_asm+0x1a/0x30 [ 364.169189] [ 364.170575] Allocated by task 4680: [ 364.171392] kasan_save_stack+0x33/0x60 [ 364.172230] kasan_save_track+0x14/0x30 [ 364.173069] __kasan_kmalloc+0xaa/0xb0 [ 364.173893] kasan_atomics+0x96/0x2d0 [kasan_test] [ 364.174817] kunit_try_run_case+0x1b0/0x490 [ 364.175675] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 364.176626] kthread+0x2d8/0x3c0 [ 364.177392] ret_from_fork+0x31/0x70 [ 364.178173] ret_from_fork_asm+0x1a/0x30 [ 364.179548] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 364.181455] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 364.184009] The buggy address belongs to the physical page: [ 364.184934] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 364.186066] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 364.187085] page_type: 0xfdffffff(slab) [ 364.187886] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 364.189014] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 364.190138] page dumped because: kasan: bad access detected [ 364.191697] Memory state around the buggy address: [ 364.192579] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.193667] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.194747] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 364.195829] ^ [ 364.196718] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.197816] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.198908] ================================================================== [ 364.200012] ================================================================== [ 364.201104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x481/0x5400 [kasan_test] [ 364.202312] Write of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 364.204077] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 364.205976] Tainted: [B]=BAD_PAGE, [N]=TEST [ 364.206870] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 364.208230] Call Trace: [ 364.209007] [ 364.209757] dump_stack_lvl+0x53/0x70 [ 364.210637] print_address_description.constprop.0+0x2c/0x3a0 [ 364.211692] ? kasan_atomics_helper+0x481/0x5400 [kasan_test] [ 364.212763] print_report+0xb9/0x2b0 [ 364.213650] ? kasan_addr_to_slab+0xd/0xb0 [ 364.214580] ? kasan_atomics_helper+0x481/0x5400 [kasan_test] [ 364.215653] kasan_report+0xe8/0x120 [ 364.216541] ? kasan_atomics_helper+0x481/0x5400 [kasan_test] [ 364.217617] kasan_check_range+0x100/0x1b0 [ 364.218554] kasan_atomics_helper+0x481/0x5400 [kasan_test] [ 364.219625] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 364.220736] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 364.221752] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 364.222809] ? __schedule+0x7ec/0x1950 [ 364.223720] ? ktime_get_ts64+0x7f/0x230 [ 364.224640] kunit_try_run_case+0x1b0/0x490 [ 364.225575] ? __pfx_kunit_try_run_case+0x10/0x10 [ 364.226551] ? set_cpus_allowed_ptr+0x85/0xc0 [ 364.227490] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 364.228465] ? __pfx_kunit_try_run_case+0x10/0x10 [ 364.229420] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 364.230483] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 364.231493] kthread+0x2d8/0x3c0 [ 364.232317] ? __pfx_kthread+0x10/0x10 [ 364.233179] ret_from_fork+0x31/0x70 [ 364.234025] ? __pfx_kthread+0x10/0x10 [ 364.234876] ret_from_fork_asm+0x1a/0x30 [ 364.235749] [ 364.237127] Allocated by task 4680: [ 364.237935] kasan_save_stack+0x33/0x60 [ 364.238779] kasan_save_track+0x14/0x30 [ 364.239611] __kasan_kmalloc+0xaa/0xb0 [ 364.240441] kasan_atomics+0x96/0x2d0 [kasan_test] [ 364.241355] kunit_try_run_case+0x1b0/0x490 [ 364.242204] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 364.243147] kthread+0x2d8/0x3c0 [ 364.243900] ret_from_fork+0x31/0x70 [ 364.244664] ret_from_fork_asm+0x1a/0x30 [ 364.246021] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 364.247918] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 364.250464] The buggy address belongs to the physical page: [ 364.251386] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 364.252518] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 364.253535] page_type: 0xfdffffff(slab) [ 364.254331] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 364.255456] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 364.256578] page dumped because: kasan: bad access detected [ 364.258138] Memory state around the buggy address: [ 364.259019] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.260107] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.261188] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 364.262271] ^ [ 364.263162] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.264261] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.265354] ================================================================== [ 364.266464] ================================================================== [ 364.267556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b0d/0x5400 [kasan_test] [ 364.268772] Write of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 364.270536] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 364.272436] Tainted: [B]=BAD_PAGE, [N]=TEST [ 364.273331] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 364.274692] Call Trace: [ 364.275469] [ 364.276225] dump_stack_lvl+0x53/0x70 [ 364.277097] print_address_description.constprop.0+0x2c/0x3a0 [ 364.278144] ? kasan_atomics_helper+0x4b0d/0x5400 [kasan_test] [ 364.279210] print_report+0xb9/0x2b0 [ 364.280088] ? kasan_addr_to_slab+0xd/0xb0 [ 364.281009] ? kasan_atomics_helper+0x4b0d/0x5400 [kasan_test] [ 364.282078] kasan_report+0xe8/0x120 [ 364.282958] ? kasan_atomics_helper+0x4b0d/0x5400 [kasan_test] [ 364.284032] kasan_atomics_helper+0x4b0d/0x5400 [kasan_test] [ 364.285096] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 364.286197] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 364.287210] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 364.288261] ? __schedule+0x7ec/0x1950 [ 364.289168] ? ktime_get_ts64+0x7f/0x230 [ 364.290085] kunit_try_run_case+0x1b0/0x490 [ 364.291019] ? __pfx_kunit_try_run_case+0x10/0x10 [ 364.291991] ? set_cpus_allowed_ptr+0x85/0xc0 [ 364.292931] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 364.293906] ? __pfx_kunit_try_run_case+0x10/0x10 [ 364.294859] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 364.295922] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 364.296925] kthread+0x2d8/0x3c0 [ 364.297748] ? __pfx_kthread+0x10/0x10 [ 364.298605] ret_from_fork+0x31/0x70 [ 364.299443] ? __pfx_kthread+0x10/0x10 [ 364.300293] ret_from_fork_asm+0x1a/0x30 [ 364.301151] [ 364.302521] Allocated by task 4680: [ 364.303329] kasan_save_stack+0x33/0x60 [ 364.304159] kasan_save_track+0x14/0x30 [ 364.304989] __kasan_kmalloc+0xaa/0xb0 [ 364.305804] kasan_atomics+0x96/0x2d0 [kasan_test] [ 364.306719] kunit_try_run_case+0x1b0/0x490 [ 364.307569] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 364.308510] kthread+0x2d8/0x3c0 [ 364.309267] ret_from_fork+0x31/0x70 [ 364.310039] ret_from_fork_asm+0x1a/0x30 [ 364.311398] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 364.313288] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 364.315815] The buggy address belongs to the physical page: [ 364.316731] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 364.317853] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 364.318862] page_type: 0xfdffffff(slab) [ 364.319652] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 364.320769] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 364.321884] page dumped because: kasan: bad access detected [ 364.323425] Memory state around the buggy address: [ 364.324297] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.325376] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.326447] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 364.327518] ^ [ 364.328398] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.329486] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.330567] ================================================================== [ 364.331667] ================================================================== [ 364.332772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x544/0x5400 [kasan_test] [ 364.333979] Write of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 364.335722] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 364.337599] Tainted: [B]=BAD_PAGE, [N]=TEST [ 364.338482] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 364.339829] Call Trace: [ 364.340594] [ 364.341332] dump_stack_lvl+0x53/0x70 [ 364.342200] print_address_description.constprop.0+0x2c/0x3a0 [ 364.343244] ? kasan_atomics_helper+0x544/0x5400 [kasan_test] [ 364.344302] print_report+0xb9/0x2b0 [ 364.345178] ? kasan_addr_to_slab+0xd/0xb0 [ 364.346097] ? kasan_atomics_helper+0x544/0x5400 [kasan_test] [ 364.347159] kasan_report+0xe8/0x120 [ 364.348036] ? kasan_atomics_helper+0x544/0x5400 [kasan_test] [ 364.349102] kasan_check_range+0x100/0x1b0 [ 364.350027] kasan_atomics_helper+0x544/0x5400 [kasan_test] [ 364.351086] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 364.352186] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 364.353190] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 364.354235] ? __schedule+0x7ec/0x1950 [ 364.355136] ? ktime_get_ts64+0x7f/0x230 [ 364.356046] kunit_try_run_case+0x1b0/0x490 [ 364.356971] ? __pfx_kunit_try_run_case+0x10/0x10 [ 364.357936] ? set_cpus_allowed_ptr+0x85/0xc0 [ 364.358865] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 364.359830] ? __pfx_kunit_try_run_case+0x10/0x10 [ 364.360776] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 364.361829] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 364.362828] kthread+0x2d8/0x3c0 [ 364.363642] ? __pfx_kthread+0x10/0x10 [ 364.364494] ret_from_fork+0x31/0x70 [ 364.365329] ? __pfx_kthread+0x10/0x10 [ 364.366170] ret_from_fork_asm+0x1a/0x30 [ 364.367031] [ 364.368388] Allocated by task 4680: [ 364.369186] kasan_save_stack+0x33/0x60 [ 364.370020] kasan_save_track+0x14/0x30 [ 364.370844] __kasan_kmalloc+0xaa/0xb0 [ 364.371665] kasan_atomics+0x96/0x2d0 [kasan_test] [ 364.372570] kunit_try_run_case+0x1b0/0x490 [ 364.373410] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 364.374343] kthread+0x2d8/0x3c0 [ 364.375089] ret_from_fork+0x31/0x70 [ 364.375846] ret_from_fork_asm+0x1a/0x30 [ 364.377187] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 364.379071] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 364.381592] The buggy address belongs to the physical page: [ 364.382504] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 364.383629] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 364.384637] page_type: 0xfdffffff(slab) [ 364.385425] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 364.386540] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 364.387653] page dumped because: kasan: bad access detected [ 364.389194] Memory state around the buggy address: [ 364.390065] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.391143] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.392214] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 364.393286] ^ [ 364.394167] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.395256] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.396340] ================================================================== [ 364.397436] ================================================================== [ 364.398542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5db/0x5400 [kasan_test] [ 364.399754] Write of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 364.401499] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 364.403380] Tainted: [B]=BAD_PAGE, [N]=TEST [ 364.404264] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 364.405614] Call Trace: [ 364.406380] [ 364.407118] dump_stack_lvl+0x53/0x70 [ 364.407988] print_address_description.constprop.0+0x2c/0x3a0 [ 364.409033] ? kasan_atomics_helper+0x5db/0x5400 [kasan_test] [ 364.410092] print_report+0xb9/0x2b0 [ 364.410968] ? kasan_addr_to_slab+0xd/0xb0 [ 364.411887] ? kasan_atomics_helper+0x5db/0x5400 [kasan_test] [ 364.412949] kasan_report+0xe8/0x120 [ 364.413827] ? kasan_atomics_helper+0x5db/0x5400 [kasan_test] [ 364.414892] kasan_check_range+0x100/0x1b0 [ 364.415819] kasan_atomics_helper+0x5db/0x5400 [kasan_test] [ 364.416879] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 364.417980] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 364.418985] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 364.420031] ? __schedule+0x7ec/0x1950 [ 364.420933] ? ktime_get_ts64+0x7f/0x230 [ 364.421843] kunit_try_run_case+0x1b0/0x490 [ 364.422768] ? __pfx_kunit_try_run_case+0x10/0x10 [ 364.423734] ? set_cpus_allowed_ptr+0x85/0xc0 [ 364.424663] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 364.425629] ? __pfx_kunit_try_run_case+0x10/0x10 [ 364.426574] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 364.427628] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 364.428627] kthread+0x2d8/0x3c0 [ 364.429440] ? __pfx_kthread+0x10/0x10 [ 364.430293] ret_from_fork+0x31/0x70 [ 364.431128] ? __pfx_kthread+0x10/0x10 [ 364.431969] ret_from_fork_asm+0x1a/0x30 [ 364.432829] [ 364.434185] Allocated by task 4680: [ 364.434982] kasan_save_stack+0x33/0x60 [ 364.435814] kasan_save_track+0x14/0x30 [ 364.436636] __kasan_kmalloc+0xaa/0xb0 [ 364.437456] kasan_atomics+0x96/0x2d0 [kasan_test] [ 364.438359] kunit_try_run_case+0x1b0/0x490 [ 364.439198] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 364.440131] kthread+0x2d8/0x3c0 [ 364.440875] ret_from_fork+0x31/0x70 [ 364.441631] ret_from_fork_asm+0x1a/0x30 [ 364.442971] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 364.444851] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 364.447370] The buggy address belongs to the physical page: [ 364.448282] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 364.449404] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 364.450412] page_type: 0xfdffffff(slab) [ 364.451199] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 364.452314] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 364.453425] page dumped because: kasan: bad access detected [ 364.454963] Memory state around the buggy address: [ 364.455833] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.456910] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.457978] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 364.459049] ^ [ 364.459927] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.461015] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.462095] ================================================================== [ 364.463187] ================================================================== [ 364.464291] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x672/0x5400 [kasan_test] [ 364.465497] Write of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 364.467238] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 364.469114] Tainted: [B]=BAD_PAGE, [N]=TEST [ 364.469996] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 364.471343] Call Trace: [ 364.472108] [ 364.472845] dump_stack_lvl+0x53/0x70 [ 364.473714] print_address_description.constprop.0+0x2c/0x3a0 [ 364.474757] ? kasan_atomics_helper+0x672/0x5400 [kasan_test] [ 364.475816] print_report+0xb9/0x2b0 [ 364.476692] ? kasan_addr_to_slab+0xd/0xb0 [ 364.477609] ? kasan_atomics_helper+0x672/0x5400 [kasan_test] [ 364.478671] kasan_report+0xe8/0x120 [ 364.479547] ? kasan_atomics_helper+0x672/0x5400 [kasan_test] [ 364.480612] kasan_check_range+0x100/0x1b0 [ 364.481538] kasan_atomics_helper+0x672/0x5400 [kasan_test] [ 364.482596] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 364.483696] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 364.484700] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 364.485746] ? __schedule+0x7ec/0x1950 [ 364.486647] ? ktime_get_ts64+0x7f/0x230 [ 364.487557] kunit_try_run_case+0x1b0/0x490 [ 364.488482] ? __pfx_kunit_try_run_case+0x10/0x10 [ 364.489449] ? set_cpus_allowed_ptr+0x85/0xc0 [ 364.490378] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 364.491343] ? __pfx_kunit_try_run_case+0x10/0x10 [ 364.492290] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 364.493343] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 364.494343] kthread+0x2d8/0x3c0 [ 364.495156] ? __pfx_kthread+0x10/0x10 [ 364.496008] ret_from_fork+0x31/0x70 [ 364.496844] ? __pfx_kthread+0x10/0x10 [ 364.497685] ret_from_fork_asm+0x1a/0x30 [ 364.498547] [ 364.499905] Allocated by task 4680: [ 364.500704] kasan_save_stack+0x33/0x60 [ 364.501538] kasan_save_track+0x14/0x30 [ 364.502362] __kasan_kmalloc+0xaa/0xb0 [ 364.503183] kasan_atomics+0x96/0x2d0 [kasan_test] [ 364.504088] kunit_try_run_case+0x1b0/0x490 [ 364.504929] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 364.505863] kthread+0x2d8/0x3c0 [ 364.506609] ret_from_fork+0x31/0x70 [ 364.507365] ret_from_fork_asm+0x1a/0x30 [ 364.508708] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 364.510591] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 364.513114] The buggy address belongs to the physical page: [ 364.514027] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 364.515151] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 364.516160] page_type: 0xfdffffff(slab) [ 364.516947] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 364.518062] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 364.519174] page dumped because: kasan: bad access detected [ 364.520714] Memory state around the buggy address: [ 364.521586] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.522664] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.523735] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 364.524806] ^ [ 364.525686] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.526774] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.527857] ================================================================== [ 364.528950] ================================================================== [ 364.530055] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x708/0x5400 [kasan_test] [ 364.531261] Write of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 364.533006] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 364.534884] Tainted: [B]=BAD_PAGE, [N]=TEST [ 364.535767] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 364.537117] Call Trace: [ 364.537882] [ 364.538620] dump_stack_lvl+0x53/0x70 [ 364.539489] print_address_description.constprop.0+0x2c/0x3a0 [ 364.540533] ? kasan_atomics_helper+0x708/0x5400 [kasan_test] [ 364.541590] print_report+0xb9/0x2b0 [ 364.542466] ? kasan_addr_to_slab+0xd/0xb0 [ 364.543385] ? kasan_atomics_helper+0x708/0x5400 [kasan_test] [ 364.544447] kasan_report+0xe8/0x120 [ 364.545324] ? kasan_atomics_helper+0x708/0x5400 [kasan_test] [ 364.546389] kasan_check_range+0x100/0x1b0 [ 364.547315] kasan_atomics_helper+0x708/0x5400 [kasan_test] [ 364.548374] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 364.549475] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 364.550481] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 364.551529] ? __schedule+0x7ec/0x1950 [ 364.552431] ? ktime_get_ts64+0x7f/0x230 [ 364.553341] kunit_try_run_case+0x1b0/0x490 [ 364.554268] ? __pfx_kunit_try_run_case+0x10/0x10 [ 364.555235] ? set_cpus_allowed_ptr+0x85/0xc0 [ 364.556165] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 364.557130] ? __pfx_kunit_try_run_case+0x10/0x10 [ 364.558075] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 364.559130] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 364.560129] kthread+0x2d8/0x3c0 [ 364.560945] ? __pfx_kthread+0x10/0x10 [ 364.561798] ret_from_fork+0x31/0x70 [ 364.562634] ? __pfx_kthread+0x10/0x10 [ 364.563475] ret_from_fork_asm+0x1a/0x30 [ 364.564337] [ 364.565696] Allocated by task 4680: [ 364.566495] kasan_save_stack+0x33/0x60 [ 364.567330] kasan_save_track+0x14/0x30 [ 364.568154] __kasan_kmalloc+0xaa/0xb0 [ 364.568975] kasan_atomics+0x96/0x2d0 [kasan_test] [ 364.569880] kunit_try_run_case+0x1b0/0x490 [ 364.570721] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 364.571655] kthread+0x2d8/0x3c0 [ 364.572401] ret_from_fork+0x31/0x70 [ 364.573158] ret_from_fork_asm+0x1a/0x30 [ 364.574502] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 364.576385] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 364.578910] The buggy address belongs to the physical page: [ 364.579823] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 364.580947] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 364.581956] page_type: 0xfdffffff(slab) [ 364.582746] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 364.583862] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 364.584992] page dumped because: kasan: bad access detected [ 364.586534] Memory state around the buggy address: [ 364.587406] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.588483] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.589554] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 364.590626] ^ [ 364.591506] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.592596] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.593678] ================================================================== [ 364.594763] ================================================================== [ 364.595884] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x79e/0x5400 [kasan_test] [ 364.597090] Write of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 364.598833] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 364.600711] Tainted: [B]=BAD_PAGE, [N]=TEST [ 364.601593] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 364.602940] Call Trace: [ 364.603705] [ 364.604442] dump_stack_lvl+0x53/0x70 [ 364.605311] print_address_description.constprop.0+0x2c/0x3a0 [ 364.606354] ? kasan_atomics_helper+0x79e/0x5400 [kasan_test] [ 364.607413] print_report+0xb9/0x2b0 [ 364.608288] ? kasan_addr_to_slab+0xd/0xb0 [ 364.609206] ? kasan_atomics_helper+0x79e/0x5400 [kasan_test] [ 364.610268] kasan_report+0xe8/0x120 [ 364.611145] ? kasan_atomics_helper+0x79e/0x5400 [kasan_test] [ 364.612210] kasan_check_range+0x100/0x1b0 [ 364.613136] kasan_atomics_helper+0x79e/0x5400 [kasan_test] [ 364.614195] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 364.615296] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 364.616327] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 364.617386] ? __schedule+0x7ec/0x1950 [ 364.618300] ? ktime_get_ts64+0x7f/0x230 [ 364.619223] kunit_try_run_case+0x1b0/0x490 [ 364.620161] ? __pfx_kunit_try_run_case+0x10/0x10 [ 364.621140] ? set_cpus_allowed_ptr+0x85/0xc0 [ 364.622083] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 364.623060] ? __pfx_kunit_try_run_case+0x10/0x10 [ 364.624017] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 364.625084] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 364.626095] kthread+0x2d8/0x3c0 [ 364.626922] ? __pfx_kthread+0x10/0x10 [ 364.627787] ret_from_fork+0x31/0x70 [ 364.628635] ? __pfx_kthread+0x10/0x10 [ 364.629488] ret_from_fork_asm+0x1a/0x30 [ 364.630362] [ 364.631744] Allocated by task 4680: [ 364.632554] kasan_save_stack+0x33/0x60 [ 364.633400] kasan_save_track+0x14/0x30 [ 364.634234] __kasan_kmalloc+0xaa/0xb0 [ 364.635066] kasan_atomics+0x96/0x2d0 [kasan_test] [ 364.635983] kunit_try_run_case+0x1b0/0x490 [ 364.636834] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 364.637779] kthread+0x2d8/0x3c0 [ 364.638535] ret_from_fork+0x31/0x70 [ 364.639302] ret_from_fork_asm+0x1a/0x30 [ 364.640665] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 364.642566] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 364.645120] The buggy address belongs to the physical page: [ 364.646043] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 364.647177] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 364.648197] page_type: 0xfdffffff(slab) [ 364.648995] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 364.650121] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 364.651244] page dumped because: kasan: bad access detected [ 364.652807] Memory state around the buggy address: [ 364.653689] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.654778] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.655858] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 364.656940] ^ [ 364.657829] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.658928] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.660020] ================================================================== [ 364.661122] ================================================================== [ 364.662215] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x835/0x5400 [kasan_test] [ 364.663423] Write of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 364.665188] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 364.667087] Tainted: [B]=BAD_PAGE, [N]=TEST [ 364.667980] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 364.669340] Call Trace: [ 364.670116] [ 364.670864] dump_stack_lvl+0x53/0x70 [ 364.671744] print_address_description.constprop.0+0x2c/0x3a0 [ 364.672799] ? kasan_atomics_helper+0x835/0x5400 [kasan_test] [ 364.673869] print_report+0xb9/0x2b0 [ 364.674757] ? kasan_addr_to_slab+0xd/0xb0 [ 364.675686] ? kasan_atomics_helper+0x835/0x5400 [kasan_test] [ 364.676759] kasan_report+0xe8/0x120 [ 364.677647] ? kasan_atomics_helper+0x835/0x5400 [kasan_test] [ 364.678723] kasan_check_range+0x100/0x1b0 [ 364.679661] kasan_atomics_helper+0x835/0x5400 [kasan_test] [ 364.680732] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 364.681843] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 364.682859] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 364.683916] ? __schedule+0x7ec/0x1950 [ 364.684827] ? ktime_get_ts64+0x7f/0x230 [ 364.685748] kunit_try_run_case+0x1b0/0x490 [ 364.686683] ? __pfx_kunit_try_run_case+0x10/0x10 [ 364.687659] ? set_cpus_allowed_ptr+0x85/0xc0 [ 364.688598] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 364.689573] ? __pfx_kunit_try_run_case+0x10/0x10 [ 364.690529] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 364.691593] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 364.692602] kthread+0x2d8/0x3c0 [ 364.693426] ? __pfx_kthread+0x10/0x10 [ 364.694288] ret_from_fork+0x31/0x70 [ 364.695135] ? __pfx_kthread+0x10/0x10 [ 364.695986] ret_from_fork_asm+0x1a/0x30 [ 364.696858] [ 364.698236] Allocated by task 4680: [ 364.699044] kasan_save_stack+0x33/0x60 [ 364.699888] kasan_save_track+0x14/0x30 [ 364.700720] __kasan_kmalloc+0xaa/0xb0 [ 364.701550] kasan_atomics+0x96/0x2d0 [kasan_test] [ 364.702464] kunit_try_run_case+0x1b0/0x490 [ 364.703313] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 364.704256] kthread+0x2d8/0x3c0 [ 364.705010] ret_from_fork+0x31/0x70 [ 364.705774] ret_from_fork_asm+0x1a/0x30 [ 364.707132] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 364.709030] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 364.711578] The buggy address belongs to the physical page: [ 364.712499] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 364.713632] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 364.714650] page_type: 0xfdffffff(slab) [ 364.715447] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 364.716571] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 364.717694] page dumped because: kasan: bad access detected [ 364.719253] Memory state around the buggy address: [ 364.720134] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.721223] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.722303] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 364.723385] ^ [ 364.724275] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.725374] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.726466] ================================================================== [ 364.727571] ================================================================== [ 364.728664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8cc/0x5400 [kasan_test] [ 364.729871] Write of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 364.731635] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 364.733533] Tainted: [B]=BAD_PAGE, [N]=TEST [ 364.734427] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 364.735787] Call Trace: [ 364.736563] [ 364.737312] dump_stack_lvl+0x53/0x70 [ 364.738192] print_address_description.constprop.0+0x2c/0x3a0 [ 364.739247] ? kasan_atomics_helper+0x8cc/0x5400 [kasan_test] [ 364.740316] print_report+0xb9/0x2b0 [ 364.741203] ? kasan_addr_to_slab+0xd/0xb0 [ 364.742133] ? kasan_atomics_helper+0x8cc/0x5400 [kasan_test] [ 364.743206] kasan_report+0xe8/0x120 [ 364.744095] ? kasan_atomics_helper+0x8cc/0x5400 [kasan_test] [ 364.745171] kasan_check_range+0x100/0x1b0 [ 364.746108] kasan_atomics_helper+0x8cc/0x5400 [kasan_test] [ 364.747179] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 364.748291] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 364.749308] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 364.750365] ? __schedule+0x7ec/0x1950 [ 364.751278] ? ktime_get_ts64+0x7f/0x230 [ 364.752199] kunit_try_run_case+0x1b0/0x490 [ 364.753135] ? __pfx_kunit_try_run_case+0x10/0x10 [ 364.754113] ? set_cpus_allowed_ptr+0x85/0xc0 [ 364.755054] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 364.756029] ? __pfx_kunit_try_run_case+0x10/0x10 [ 364.756986] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 364.758050] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 364.759060] kthread+0x2d8/0x3c0 [ 364.759884] ? __pfx_kthread+0x10/0x10 [ 364.760746] ret_from_fork+0x31/0x70 [ 364.761592] ? __pfx_kthread+0x10/0x10 [ 364.762443] ret_from_fork_asm+0x1a/0x30 [ 364.763314] [ 364.764691] Allocated by task 4680: [ 364.765499] kasan_save_stack+0x33/0x60 [ 364.766343] kasan_save_track+0x14/0x30 [ 364.767175] __kasan_kmalloc+0xaa/0xb0 [ 364.768005] kasan_atomics+0x96/0x2d0 [kasan_test] [ 364.768919] kunit_try_run_case+0x1b0/0x490 [ 364.769769] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 364.770710] kthread+0x2d8/0x3c0 [ 364.771464] ret_from_fork+0x31/0x70 [ 364.772229] ret_from_fork_asm+0x1a/0x30 [ 364.773588] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 364.775486] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 364.778034] The buggy address belongs to the physical page: [ 364.778956] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 364.780087] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 364.781105] page_type: 0xfdffffff(slab) [ 364.781903] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 364.783028] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 364.784150] page dumped because: kasan: bad access detected [ 364.785708] Memory state around the buggy address: [ 364.786590] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.787678] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.788758] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 364.789839] ^ [ 364.790728] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.791826] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.792916] ================================================================== [ 364.794018] ================================================================== [ 364.795108] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x963/0x5400 [kasan_test] [ 364.796314] Write of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 364.798077] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 364.799976] Tainted: [B]=BAD_PAGE, [N]=TEST [ 364.800869] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 364.802227] Call Trace: [ 364.803004] [ 364.803753] dump_stack_lvl+0x53/0x70 [ 364.804633] print_address_description.constprop.0+0x2c/0x3a0 [ 364.805689] ? kasan_atomics_helper+0x963/0x5400 [kasan_test] [ 364.806760] print_report+0xb9/0x2b0 [ 364.807647] ? kasan_addr_to_slab+0xd/0xb0 [ 364.808576] ? kasan_atomics_helper+0x963/0x5400 [kasan_test] [ 364.809648] kasan_report+0xe8/0x120 [ 364.810537] ? kasan_atomics_helper+0x963/0x5400 [kasan_test] [ 364.811613] kasan_check_range+0x100/0x1b0 [ 364.812551] kasan_atomics_helper+0x963/0x5400 [kasan_test] [ 364.813621] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 364.814733] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 364.815748] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 364.816804] ? __schedule+0x7ec/0x1950 [ 364.817716] ? ktime_get_ts64+0x7f/0x230 [ 364.818636] kunit_try_run_case+0x1b0/0x490 [ 364.819571] ? __pfx_kunit_try_run_case+0x10/0x10 [ 364.820546] ? set_cpus_allowed_ptr+0x85/0xc0 [ 364.821486] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 364.822461] ? __pfx_kunit_try_run_case+0x10/0x10 [ 364.823416] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 364.824479] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 364.825487] kthread+0x2d8/0x3c0 [ 364.826311] ? __pfx_kthread+0x10/0x10 [ 364.827174] ret_from_fork+0x31/0x70 [ 364.828020] ? __pfx_kthread+0x10/0x10 [ 364.828872] ret_from_fork_asm+0x1a/0x30 [ 364.829743] [ 364.831122] Allocated by task 4680: [ 364.831931] kasan_save_stack+0x33/0x60 [ 364.832774] kasan_save_track+0x14/0x30 [ 364.833607] __kasan_kmalloc+0xaa/0xb0 [ 364.834437] kasan_atomics+0x96/0x2d0 [kasan_test] [ 364.835352] kunit_try_run_case+0x1b0/0x490 [ 364.836201] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 364.837144] kthread+0x2d8/0x3c0 [ 364.837897] ret_from_fork+0x31/0x70 [ 364.838662] ret_from_fork_asm+0x1a/0x30 [ 364.840020] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 364.841918] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 364.844464] The buggy address belongs to the physical page: [ 364.845384] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 364.846516] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 364.847533] page_type: 0xfdffffff(slab) [ 364.848329] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 364.849453] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 364.850574] page dumped because: kasan: bad access detected [ 364.852133] Memory state around the buggy address: [ 364.853014] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.854103] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.855183] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 364.856265] ^ [ 364.857155] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.858253] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.859345] ================================================================== [ 364.860449] ================================================================== [ 364.861541] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x9fa/0x5400 [kasan_test] [ 364.862749] Write of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 364.864514] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 364.866414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 364.867308] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 364.868668] Call Trace: [ 364.869445] [ 364.870195] dump_stack_lvl+0x53/0x70 [ 364.871074] print_address_description.constprop.0+0x2c/0x3a0 [ 364.872131] ? kasan_atomics_helper+0x9fa/0x5400 [kasan_test] [ 364.873201] print_report+0xb9/0x2b0 [ 364.874088] ? kasan_addr_to_slab+0xd/0xb0 [ 364.875018] ? kasan_atomics_helper+0x9fa/0x5400 [kasan_test] [ 364.876091] kasan_report+0xe8/0x120 [ 364.876980] ? kasan_atomics_helper+0x9fa/0x5400 [kasan_test] [ 364.878057] kasan_check_range+0x100/0x1b0 [ 364.878994] kasan_atomics_helper+0x9fa/0x5400 [kasan_test] [ 364.880064] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 364.881177] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 364.882192] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 364.883249] ? __schedule+0x7ec/0x1950 [ 364.884162] ? ktime_get_ts64+0x7f/0x230 [ 364.885082] kunit_try_run_case+0x1b0/0x490 [ 364.886018] ? __pfx_kunit_try_run_case+0x10/0x10 [ 364.886995] ? set_cpus_allowed_ptr+0x85/0xc0 [ 364.887935] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 364.888910] ? __pfx_kunit_try_run_case+0x10/0x10 [ 364.889865] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 364.890929] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 364.891938] kthread+0x2d8/0x3c0 [ 364.892762] ? __pfx_kthread+0x10/0x10 [ 364.893623] ret_from_fork+0x31/0x70 [ 364.894469] ? __pfx_kthread+0x10/0x10 [ 364.895319] ret_from_fork_asm+0x1a/0x30 [ 364.896190] [ 364.897566] Allocated by task 4680: [ 364.898375] kasan_save_stack+0x33/0x60 [ 364.899218] kasan_save_track+0x14/0x30 [ 364.900049] __kasan_kmalloc+0xaa/0xb0 [ 364.900879] kasan_atomics+0x96/0x2d0 [kasan_test] [ 364.901792] kunit_try_run_case+0x1b0/0x490 [ 364.902640] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 364.903582] kthread+0x2d8/0x3c0 [ 364.904334] ret_from_fork+0x31/0x70 [ 364.905098] ret_from_fork_asm+0x1a/0x30 [ 364.906454] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 364.908350] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 364.910895] The buggy address belongs to the physical page: [ 364.911816] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 364.912948] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 364.913965] page_type: 0xfdffffff(slab) [ 364.914762] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 364.915887] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 364.917009] page dumped because: kasan: bad access detected [ 364.918569] Memory state around the buggy address: [ 364.919450] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.920538] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.921619] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 364.922701] ^ [ 364.923592] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.924690] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.925783] ================================================================== [ 364.926887] ================================================================== [ 364.927979] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa94/0x5400 [kasan_test] [ 364.929189] Write of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 364.930954] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 364.932853] Tainted: [B]=BAD_PAGE, [N]=TEST [ 364.933747] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 364.935108] Call Trace: [ 364.935885] [ 364.936634] dump_stack_lvl+0x53/0x70 [ 364.937515] print_address_description.constprop.0+0x2c/0x3a0 [ 364.938570] ? kasan_atomics_helper+0xa94/0x5400 [kasan_test] [ 364.939642] print_report+0xb9/0x2b0 [ 364.940530] ? kasan_addr_to_slab+0xd/0xb0 [ 364.941460] ? kasan_atomics_helper+0xa94/0x5400 [kasan_test] [ 364.942534] kasan_report+0xe8/0x120 [ 364.943424] ? kasan_atomics_helper+0xa94/0x5400 [kasan_test] [ 364.944501] kasan_check_range+0x100/0x1b0 [ 364.945439] kasan_atomics_helper+0xa94/0x5400 [kasan_test] [ 364.946510] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 364.947623] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 364.948640] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 364.949698] ? __schedule+0x7ec/0x1950 [ 364.950611] ? ktime_get_ts64+0x7f/0x230 [ 364.951533] kunit_try_run_case+0x1b0/0x490 [ 364.952470] ? __pfx_kunit_try_run_case+0x10/0x10 [ 364.953447] ? set_cpus_allowed_ptr+0x85/0xc0 [ 364.954389] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 364.955365] ? __pfx_kunit_try_run_case+0x10/0x10 [ 364.956321] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 364.957386] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 364.958397] kthread+0x2d8/0x3c0 [ 364.959221] ? __pfx_kthread+0x10/0x10 [ 364.960085] ret_from_fork+0x31/0x70 [ 364.960932] ? __pfx_kthread+0x10/0x10 [ 364.961785] ret_from_fork_asm+0x1a/0x30 [ 364.962657] [ 364.964038] Allocated by task 4680: [ 364.964847] kasan_save_stack+0x33/0x60 [ 364.965691] kasan_save_track+0x14/0x30 [ 364.966524] __kasan_kmalloc+0xaa/0xb0 [ 364.967356] kasan_atomics+0x96/0x2d0 [kasan_test] [ 364.968271] kunit_try_run_case+0x1b0/0x490 [ 364.969121] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 364.970064] kthread+0x2d8/0x3c0 [ 364.970818] ret_from_fork+0x31/0x70 [ 364.971584] ret_from_fork_asm+0x1a/0x30 [ 364.972945] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 364.974845] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 364.977392] The buggy address belongs to the physical page: [ 364.978314] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 364.979447] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 364.980465] page_type: 0xfdffffff(slab) [ 364.981263] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 364.982389] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 364.983513] page dumped because: kasan: bad access detected [ 364.985076] Memory state around the buggy address: [ 364.985959] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.987048] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.988129] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 364.989211] ^ [ 364.990102] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.991202] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.992295] ================================================================== [ 364.993400] ================================================================== [ 364.994493] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb35/0x5400 [kasan_test] [ 364.995700] Write of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 364.997465] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 364.999366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 365.000260] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 365.001621] Call Trace: [ 365.002399] [ 365.003149] dump_stack_lvl+0x53/0x70 [ 365.004029] print_address_description.constprop.0+0x2c/0x3a0 [ 365.005086] ? kasan_atomics_helper+0xb35/0x5400 [kasan_test] [ 365.006158] print_report+0xb9/0x2b0 [ 365.007047] ? kasan_addr_to_slab+0xd/0xb0 [ 365.007978] ? kasan_atomics_helper+0xb35/0x5400 [kasan_test] [ 365.009052] kasan_report+0xe8/0x120 [ 365.009941] ? kasan_atomics_helper+0xb35/0x5400 [kasan_test] [ 365.011019] kasan_check_range+0x100/0x1b0 [ 365.011958] kasan_atomics_helper+0xb35/0x5400 [kasan_test] [ 365.013029] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 365.014142] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 365.015159] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 365.016217] ? __schedule+0x7ec/0x1950 [ 365.017131] ? ktime_get_ts64+0x7f/0x230 [ 365.018052] kunit_try_run_case+0x1b0/0x490 [ 365.018989] ? __pfx_kunit_try_run_case+0x10/0x10 [ 365.019967] ? set_cpus_allowed_ptr+0x85/0xc0 [ 365.020908] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 365.021884] ? __pfx_kunit_try_run_case+0x10/0x10 [ 365.022840] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 365.023905] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 365.024915] kthread+0x2d8/0x3c0 [ 365.025739] ? __pfx_kthread+0x10/0x10 [ 365.026602] ret_from_fork+0x31/0x70 [ 365.027448] ? __pfx_kthread+0x10/0x10 [ 365.028300] ret_from_fork_asm+0x1a/0x30 [ 365.029171] [ 365.030549] Allocated by task 4680: [ 365.031357] kasan_save_stack+0x33/0x60 [ 365.032202] kasan_save_track+0x14/0x30 [ 365.033035] __kasan_kmalloc+0xaa/0xb0 [ 365.033865] kasan_atomics+0x96/0x2d0 [kasan_test] [ 365.034779] kunit_try_run_case+0x1b0/0x490 [ 365.035629] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 365.036572] kthread+0x2d8/0x3c0 [ 365.037325] ret_from_fork+0x31/0x70 [ 365.038090] ret_from_fork_asm+0x1a/0x30 [ 365.039447] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 365.041342] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 365.043887] The buggy address belongs to the physical page: [ 365.044806] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 365.045939] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 365.046955] page_type: 0xfdffffff(slab) [ 365.047751] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 365.048876] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 365.049999] page dumped because: kasan: bad access detected [ 365.051558] Memory state around the buggy address: [ 365.052439] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.053528] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.054609] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 365.055690] ^ [ 365.056580] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.057680] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.058772] ================================================================== [ 365.059874] ================================================================== [ 365.060966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc1e/0x5400 [kasan_test] [ 365.062174] Write of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 365.063939] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 365.065839] Tainted: [B]=BAD_PAGE, [N]=TEST [ 365.066733] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 365.068093] Call Trace: [ 365.068870] [ 365.069619] dump_stack_lvl+0x53/0x70 [ 365.070499] print_address_description.constprop.0+0x2c/0x3a0 [ 365.071555] ? kasan_atomics_helper+0xc1e/0x5400 [kasan_test] [ 365.072626] print_report+0xb9/0x2b0 [ 365.073514] ? kasan_addr_to_slab+0xd/0xb0 [ 365.074444] ? kasan_atomics_helper+0xc1e/0x5400 [kasan_test] [ 365.075518] kasan_report+0xe8/0x120 [ 365.076407] ? kasan_atomics_helper+0xc1e/0x5400 [kasan_test] [ 365.077483] kasan_check_range+0x100/0x1b0 [ 365.078423] kasan_atomics_helper+0xc1e/0x5400 [kasan_test] [ 365.079494] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 365.080607] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 365.081624] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 365.082683] ? __schedule+0x7ec/0x1950 [ 365.083596] ? ktime_get_ts64+0x7f/0x230 [ 365.084518] kunit_try_run_case+0x1b0/0x490 [ 365.085456] ? __pfx_kunit_try_run_case+0x10/0x10 [ 365.086435] ? set_cpus_allowed_ptr+0x85/0xc0 [ 365.087377] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 365.088354] ? __pfx_kunit_try_run_case+0x10/0x10 [ 365.089311] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 365.090378] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 365.091389] kthread+0x2d8/0x3c0 [ 365.092215] ? __pfx_kthread+0x10/0x10 [ 365.093080] ret_from_fork+0x31/0x70 [ 365.093927] ? __pfx_kthread+0x10/0x10 [ 365.094779] ret_from_fork_asm+0x1a/0x30 [ 365.095652] [ 365.097033] Allocated by task 4680: [ 365.097842] kasan_save_stack+0x33/0x60 [ 365.098688] kasan_save_track+0x14/0x30 [ 365.099522] __kasan_kmalloc+0xaa/0xb0 [ 365.100353] kasan_atomics+0x96/0x2d0 [kasan_test] [ 365.101269] kunit_try_run_case+0x1b0/0x490 [ 365.102121] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 365.103065] kthread+0x2d8/0x3c0 [ 365.103821] ret_from_fork+0x31/0x70 [ 365.104587] ret_from_fork_asm+0x1a/0x30 [ 365.105949] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 365.107850] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 365.110402] The buggy address belongs to the physical page: [ 365.111325] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 365.112460] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 365.113479] page_type: 0xfdffffff(slab) [ 365.114278] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 365.115406] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 365.116530] page dumped because: kasan: bad access detected [ 365.118093] Memory state around the buggy address: [ 365.118975] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.120065] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.121146] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 365.122229] ^ [ 365.123120] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.124220] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.125313] ================================================================== [ 365.126417] ================================================================== [ 365.127509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a57/0x5400 [kasan_test] [ 365.128724] Read of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 365.130480] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 365.132379] Tainted: [B]=BAD_PAGE, [N]=TEST [ 365.133272] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 365.134633] Call Trace: [ 365.135410] [ 365.136158] dump_stack_lvl+0x53/0x70 [ 365.137038] print_address_description.constprop.0+0x2c/0x3a0 [ 365.138094] ? kasan_atomics_helper+0x4a57/0x5400 [kasan_test] [ 365.139171] print_report+0xb9/0x2b0 [ 365.140059] ? kasan_addr_to_slab+0xd/0xb0 [ 365.140989] ? kasan_atomics_helper+0x4a57/0x5400 [kasan_test] [ 365.142068] kasan_report+0xe8/0x120 [ 365.142957] ? kasan_atomics_helper+0x4a57/0x5400 [kasan_test] [ 365.144041] kasan_atomics_helper+0x4a57/0x5400 [kasan_test] [ 365.145115] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 365.146226] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 365.147247] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 365.148308] ? __schedule+0x7ec/0x1950 [ 365.149225] ? ktime_get_ts64+0x7f/0x230 [ 365.150149] kunit_try_run_case+0x1b0/0x490 [ 365.151091] ? __pfx_kunit_try_run_case+0x10/0x10 [ 365.152071] ? set_cpus_allowed_ptr+0x85/0xc0 [ 365.153018] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 365.154002] ? __pfx_kunit_try_run_case+0x10/0x10 [ 365.154962] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 365.156034] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 365.157042] kthread+0x2d8/0x3c0 [ 365.157873] ? __pfx_kthread+0x10/0x10 [ 365.158737] ret_from_fork+0x31/0x70 [ 365.159582] ? __pfx_kthread+0x10/0x10 [ 365.160440] ret_from_fork_asm+0x1a/0x30 [ 365.161305] [ 365.162689] Allocated by task 4680: [ 365.163504] kasan_save_stack+0x33/0x60 [ 365.164341] kasan_save_track+0x14/0x30 [ 365.165178] __kasan_kmalloc+0xaa/0xb0 [ 365.166001] kasan_atomics+0x96/0x2d0 [kasan_test] [ 365.166923] kunit_try_run_case+0x1b0/0x490 [ 365.167780] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 365.168730] kthread+0x2d8/0x3c0 [ 365.169495] ret_from_fork+0x31/0x70 [ 365.170274] ret_from_fork_asm+0x1a/0x30 [ 365.171647] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 365.173550] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 365.176097] The buggy address belongs to the physical page: [ 365.177020] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 365.178150] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 365.179166] page_type: 0xfdffffff(slab) [ 365.179966] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 365.181091] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 365.182214] page dumped because: kasan: bad access detected [ 365.183771] Memory state around the buggy address: [ 365.184651] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.185737] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.186816] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 365.187896] ^ [ 365.188785] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.189882] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.190972] ================================================================== [ 365.192073] ================================================================== [ 365.193163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xced/0x5400 [kasan_test] [ 365.194370] Write of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 365.196133] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 365.198029] Tainted: [B]=BAD_PAGE, [N]=TEST [ 365.198922] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 365.200280] Call Trace: [ 365.201056] [ 365.201803] dump_stack_lvl+0x53/0x70 [ 365.202681] print_address_description.constprop.0+0x2c/0x3a0 [ 365.203736] ? kasan_atomics_helper+0xced/0x5400 [kasan_test] [ 365.204805] print_report+0xb9/0x2b0 [ 365.205692] ? kasan_addr_to_slab+0xd/0xb0 [ 365.206622] ? kasan_atomics_helper+0xced/0x5400 [kasan_test] [ 365.207694] kasan_report+0xe8/0x120 [ 365.208582] ? kasan_atomics_helper+0xced/0x5400 [kasan_test] [ 365.209658] kasan_check_range+0x100/0x1b0 [ 365.210595] kasan_atomics_helper+0xced/0x5400 [kasan_test] [ 365.211665] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 365.212776] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 365.213791] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 365.214848] ? __schedule+0x7ec/0x1950 [ 365.215759] ? ktime_get_ts64+0x7f/0x230 [ 365.216680] kunit_try_run_case+0x1b0/0x490 [ 365.217616] ? __pfx_kunit_try_run_case+0x10/0x10 [ 365.218592] ? set_cpus_allowed_ptr+0x85/0xc0 [ 365.219531] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 365.220506] ? __pfx_kunit_try_run_case+0x10/0x10 [ 365.221461] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 365.222526] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 365.223534] kthread+0x2d8/0x3c0 [ 365.224358] ? __pfx_kthread+0x10/0x10 [ 365.225221] ret_from_fork+0x31/0x70 [ 365.226067] ? __pfx_kthread+0x10/0x10 [ 365.226918] ret_from_fork_asm+0x1a/0x30 [ 365.227790] [ 365.229167] Allocated by task 4680: [ 365.229976] kasan_save_stack+0x33/0x60 [ 365.230820] kasan_save_track+0x14/0x30 [ 365.231652] __kasan_kmalloc+0xaa/0xb0 [ 365.232483] kasan_atomics+0x96/0x2d0 [kasan_test] [ 365.233398] kunit_try_run_case+0x1b0/0x490 [ 365.234248] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 365.235191] kthread+0x2d8/0x3c0 [ 365.235945] ret_from_fork+0x31/0x70 [ 365.236709] ret_from_fork_asm+0x1a/0x30 [ 365.238067] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 365.239966] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 365.242514] The buggy address belongs to the physical page: [ 365.243437] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 365.244570] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 365.245588] page_type: 0xfdffffff(slab) [ 365.246386] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 365.247513] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 365.248636] page dumped because: kasan: bad access detected [ 365.250196] Memory state around the buggy address: [ 365.251077] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.252165] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.253247] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 365.254330] ^ [ 365.255220] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.256318] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.257410] ================================================================== [ 365.258514] ================================================================== [ 365.259606] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd84/0x5400 [kasan_test] [ 365.260814] Write of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 365.262579] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 365.264478] Tainted: [B]=BAD_PAGE, [N]=TEST [ 365.265372] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 365.266732] Call Trace: [ 365.267510] [ 365.268262] dump_stack_lvl+0x53/0x70 [ 365.269133] print_address_description.constprop.0+0x2c/0x3a0 [ 365.270179] ? kasan_atomics_helper+0xd84/0x5400 [kasan_test] [ 365.271240] print_report+0xb9/0x2b0 [ 365.272118] ? kasan_addr_to_slab+0xd/0xb0 [ 365.273037] ? kasan_atomics_helper+0xd84/0x5400 [kasan_test] [ 365.274100] kasan_report+0xe8/0x120 [ 365.274978] ? kasan_atomics_helper+0xd84/0x5400 [kasan_test] [ 365.276045] kasan_check_range+0x100/0x1b0 [ 365.276972] kasan_atomics_helper+0xd84/0x5400 [kasan_test] [ 365.278032] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 365.279132] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 365.280137] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 365.281183] ? __schedule+0x7ec/0x1950 [ 365.282084] ? ktime_get_ts64+0x7f/0x230 [ 365.282994] kunit_try_run_case+0x1b0/0x490 [ 365.283919] ? __pfx_kunit_try_run_case+0x10/0x10 [ 365.284885] ? set_cpus_allowed_ptr+0x85/0xc0 [ 365.285815] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 365.286779] ? __pfx_kunit_try_run_case+0x10/0x10 [ 365.287724] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 365.288777] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 365.289776] kthread+0x2d8/0x3c0 [ 365.290589] ? __pfx_kthread+0x10/0x10 [ 365.291442] ret_from_fork+0x31/0x70 [ 365.292278] ? __pfx_kthread+0x10/0x10 [ 365.293119] ret_from_fork_asm+0x1a/0x30 [ 365.293979] [ 365.295337] Allocated by task 4680: [ 365.296135] kasan_save_stack+0x33/0x60 [ 365.296968] kasan_save_track+0x14/0x30 [ 365.297790] __kasan_kmalloc+0xaa/0xb0 [ 365.298610] kasan_atomics+0x96/0x2d0 [kasan_test] [ 365.299514] kunit_try_run_case+0x1b0/0x490 [ 365.300354] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 365.301288] kthread+0x2d8/0x3c0 [ 365.302033] ret_from_fork+0x31/0x70 [ 365.302789] ret_from_fork_asm+0x1a/0x30 [ 365.304129] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 365.306010] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 365.308530] The buggy address belongs to the physical page: [ 365.309440] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 365.310562] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 365.311569] page_type: 0xfdffffff(slab) [ 365.312356] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 365.313469] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 365.314581] page dumped because: kasan: bad access detected [ 365.316120] Memory state around the buggy address: [ 365.316992] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.318070] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.319140] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 365.320212] ^ [ 365.321092] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.322180] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.323285] ================================================================== [ 365.324386] ================================================================== [ 365.325493] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe1a/0x5400 [kasan_test] [ 365.326704] Write of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 365.328448] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 365.330326] Tainted: [B]=BAD_PAGE, [N]=TEST [ 365.331208] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 365.332556] Call Trace: [ 365.333322] [ 365.334060] dump_stack_lvl+0x53/0x70 [ 365.334929] print_address_description.constprop.0+0x2c/0x3a0 [ 365.335974] ? kasan_atomics_helper+0xe1a/0x5400 [kasan_test] [ 365.337030] print_report+0xb9/0x2b0 [ 365.337906] ? kasan_addr_to_slab+0xd/0xb0 [ 365.338824] ? kasan_atomics_helper+0xe1a/0x5400 [kasan_test] [ 365.339885] kasan_report+0xe8/0x120 [ 365.340762] ? kasan_atomics_helper+0xe1a/0x5400 [kasan_test] [ 365.341853] kasan_check_range+0x100/0x1b0 [ 365.342788] kasan_atomics_helper+0xe1a/0x5400 [kasan_test] [ 365.343846] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 365.344946] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 365.345949] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 365.346993] ? __schedule+0x7ec/0x1950 [ 365.347893] ? ktime_get_ts64+0x7f/0x230 [ 365.348801] kunit_try_run_case+0x1b0/0x490 [ 365.349726] ? __pfx_kunit_try_run_case+0x10/0x10 [ 365.350691] ? set_cpus_allowed_ptr+0x85/0xc0 [ 365.351620] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 365.352584] ? __pfx_kunit_try_run_case+0x10/0x10 [ 365.353530] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 365.354583] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 365.355582] kthread+0x2d8/0x3c0 [ 365.356397] ? __pfx_kthread+0x10/0x10 [ 365.357249] ret_from_fork+0x31/0x70 [ 365.358084] ? __pfx_kthread+0x10/0x10 [ 365.358924] ret_from_fork_asm+0x1a/0x30 [ 365.359785] [ 365.361143] Allocated by task 4680: [ 365.361942] kasan_save_stack+0x33/0x60 [ 365.362776] kasan_save_track+0x14/0x30 [ 365.363598] __kasan_kmalloc+0xaa/0xb0 [ 365.364419] kasan_atomics+0x96/0x2d0 [kasan_test] [ 365.365324] kunit_try_run_case+0x1b0/0x490 [ 365.366163] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 365.367097] kthread+0x2d8/0x3c0 [ 365.367842] ret_from_fork+0x31/0x70 [ 365.368597] ret_from_fork_asm+0x1a/0x30 [ 365.369939] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 365.371820] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 365.374341] The buggy address belongs to the physical page: [ 365.375255] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 365.376378] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 365.377385] page_type: 0xfdffffff(slab) [ 365.378172] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 365.379287] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 365.380399] page dumped because: kasan: bad access detected [ 365.381939] Memory state around the buggy address: [ 365.382810] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.383889] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.384959] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 365.386032] ^ [ 365.386912] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.388000] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.389105] ================================================================== [ 365.390214] ================================================================== [ 365.391320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb0/0x5400 [kasan_test] [ 365.392531] Write of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 365.394274] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 365.396151] Tainted: [B]=BAD_PAGE, [N]=TEST [ 365.397034] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 365.398383] Call Trace: [ 365.399149] [ 365.399886] dump_stack_lvl+0x53/0x70 [ 365.400755] print_address_description.constprop.0+0x2c/0x3a0 [ 365.401799] ? kasan_atomics_helper+0xeb0/0x5400 [kasan_test] [ 365.402859] print_report+0xb9/0x2b0 [ 365.403735] ? kasan_addr_to_slab+0xd/0xb0 [ 365.404653] ? kasan_atomics_helper+0xeb0/0x5400 [kasan_test] [ 365.405713] kasan_report+0xe8/0x120 [ 365.406590] ? kasan_atomics_helper+0xeb0/0x5400 [kasan_test] [ 365.407655] kasan_check_range+0x100/0x1b0 [ 365.408582] kasan_atomics_helper+0xeb0/0x5400 [kasan_test] [ 365.409640] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 365.410741] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 365.411745] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 365.412789] ? __schedule+0x7ec/0x1950 [ 365.413690] ? ktime_get_ts64+0x7f/0x230 [ 365.414599] kunit_try_run_case+0x1b0/0x490 [ 365.415524] ? __pfx_kunit_try_run_case+0x10/0x10 [ 365.416491] ? set_cpus_allowed_ptr+0x85/0xc0 [ 365.417420] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 365.418385] ? __pfx_kunit_try_run_case+0x10/0x10 [ 365.419330] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 365.420384] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 365.421384] kthread+0x2d8/0x3c0 [ 365.422197] ? __pfx_kthread+0x10/0x10 [ 365.423049] ret_from_fork+0x31/0x70 [ 365.423885] ? __pfx_kthread+0x10/0x10 [ 365.424725] ret_from_fork_asm+0x1a/0x30 [ 365.425585] [ 365.426942] Allocated by task 4680: [ 365.427740] kasan_save_stack+0x33/0x60 [ 365.428574] kasan_save_track+0x14/0x30 [ 365.429396] __kasan_kmalloc+0xaa/0xb0 [ 365.430216] kasan_atomics+0x96/0x2d0 [kasan_test] [ 365.431121] kunit_try_run_case+0x1b0/0x490 [ 365.431960] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 365.432893] kthread+0x2d8/0x3c0 [ 365.433637] ret_from_fork+0x31/0x70 [ 365.434393] ret_from_fork_asm+0x1a/0x30 [ 365.435735] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 365.437616] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 365.440135] The buggy address belongs to the physical page: [ 365.441048] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 365.442170] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 365.443177] page_type: 0xfdffffff(slab) [ 365.443964] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 365.445078] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 365.446189] page dumped because: kasan: bad access detected [ 365.447729] Memory state around the buggy address: [ 365.448600] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.449677] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.450748] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 365.451820] ^ [ 365.452700] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.453788] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.454870] ================================================================== [ 365.455963] ================================================================== [ 365.457068] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf47/0x5400 [kasan_test] [ 365.458274] Write of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 365.460016] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 365.461894] Tainted: [B]=BAD_PAGE, [N]=TEST [ 365.462778] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 365.464127] Call Trace: [ 365.464893] [ 365.465631] dump_stack_lvl+0x53/0x70 [ 365.466500] print_address_description.constprop.0+0x2c/0x3a0 [ 365.467544] ? kasan_atomics_helper+0xf47/0x5400 [kasan_test] [ 365.468604] print_report+0xb9/0x2b0 [ 365.469479] ? kasan_addr_to_slab+0xd/0xb0 [ 365.470397] ? kasan_atomics_helper+0xf47/0x5400 [kasan_test] [ 365.471457] kasan_report+0xe8/0x120 [ 365.472334] ? kasan_atomics_helper+0xf47/0x5400 [kasan_test] [ 365.473400] kasan_check_range+0x100/0x1b0 [ 365.474326] kasan_atomics_helper+0xf47/0x5400 [kasan_test] [ 365.475385] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 365.476484] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 365.477488] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 365.478534] ? __schedule+0x7ec/0x1950 [ 365.479435] ? ktime_get_ts64+0x7f/0x230 [ 365.480344] kunit_try_run_case+0x1b0/0x490 [ 365.481271] ? __pfx_kunit_try_run_case+0x10/0x10 [ 365.482238] ? set_cpus_allowed_ptr+0x85/0xc0 [ 365.483168] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 365.484133] ? __pfx_kunit_try_run_case+0x10/0x10 [ 365.485080] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 365.486134] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 365.487133] kthread+0x2d8/0x3c0 [ 365.487947] ? __pfx_kthread+0x10/0x10 [ 365.488801] ret_from_fork+0x31/0x70 [ 365.489636] ? __pfx_kthread+0x10/0x10 [ 365.490478] ret_from_fork_asm+0x1a/0x30 [ 365.491338] [ 365.492696] Allocated by task 4680: [ 365.493494] kasan_save_stack+0x33/0x60 [ 365.494328] kasan_save_track+0x14/0x30 [ 365.495151] __kasan_kmalloc+0xaa/0xb0 [ 365.495973] kasan_atomics+0x96/0x2d0 [kasan_test] [ 365.496878] kunit_try_run_case+0x1b0/0x490 [ 365.497718] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 365.498652] kthread+0x2d8/0x3c0 [ 365.499396] ret_from_fork+0x31/0x70 [ 365.500152] ret_from_fork_asm+0x1a/0x30 [ 365.501494] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 365.503374] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 365.505896] The buggy address belongs to the physical page: [ 365.506808] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 365.507932] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 365.508940] page_type: 0xfdffffff(slab) [ 365.509728] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 365.510845] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 365.511958] page dumped because: kasan: bad access detected [ 365.513499] Memory state around the buggy address: [ 365.514371] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.515450] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.516521] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 365.517592] ^ [ 365.518473] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.519562] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.520644] ================================================================== [ 365.521738] ================================================================== [ 365.522843] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a09/0x5400 [kasan_test] [ 365.524057] Read of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 365.525795] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 365.527675] Tainted: [B]=BAD_PAGE, [N]=TEST [ 365.528558] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 365.529907] Call Trace: [ 365.530673] [ 365.531412] dump_stack_lvl+0x53/0x70 [ 365.532281] print_address_description.constprop.0+0x2c/0x3a0 [ 365.533325] ? kasan_atomics_helper+0x4a09/0x5400 [kasan_test] [ 365.534390] print_report+0xb9/0x2b0 [ 365.535267] ? kasan_addr_to_slab+0xd/0xb0 [ 365.536187] ? kasan_atomics_helper+0x4a09/0x5400 [kasan_test] [ 365.537255] kasan_report+0xe8/0x120 [ 365.538133] ? kasan_atomics_helper+0x4a09/0x5400 [kasan_test] [ 365.539205] kasan_atomics_helper+0x4a09/0x5400 [kasan_test] [ 365.540268] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 365.541366] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 365.542376] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 365.543425] ? __schedule+0x7ec/0x1950 [ 365.544330] ? ktime_get_ts64+0x7f/0x230 [ 365.545244] kunit_try_run_case+0x1b0/0x490 [ 365.546175] ? __pfx_kunit_try_run_case+0x10/0x10 [ 365.547144] ? set_cpus_allowed_ptr+0x85/0xc0 [ 365.548081] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 365.549055] ? __pfx_kunit_try_run_case+0x10/0x10 [ 365.550004] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 365.551065] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 365.552066] kthread+0x2d8/0x3c0 [ 365.552888] ? __pfx_kthread+0x10/0x10 [ 365.553743] ret_from_fork+0x31/0x70 [ 365.554580] ? __pfx_kthread+0x10/0x10 [ 365.555428] ret_from_fork_asm+0x1a/0x30 [ 365.556284] [ 365.557650] Allocated by task 4680: [ 365.558456] kasan_save_stack+0x33/0x60 [ 365.559283] kasan_save_track+0x14/0x30 [ 365.560112] __kasan_kmalloc+0xaa/0xb0 [ 365.560927] kasan_atomics+0x96/0x2d0 [kasan_test] [ 365.561840] kunit_try_run_case+0x1b0/0x490 [ 365.562688] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 365.563630] kthread+0x2d8/0x3c0 [ 365.564387] ret_from_fork+0x31/0x70 [ 365.565159] ret_from_fork_asm+0x1a/0x30 [ 365.566518] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 365.568409] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 365.570936] The buggy address belongs to the physical page: [ 365.571853] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 365.572975] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 365.573984] page_type: 0xfdffffff(slab) [ 365.574776] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 365.575895] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 365.577010] page dumped because: kasan: bad access detected [ 365.578551] Memory state around the buggy address: [ 365.579423] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.580502] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.581575] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 365.582648] ^ [ 365.583529] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.584619] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.585701] ================================================================== [ 365.586794] ================================================================== [ 365.587900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1014/0x5400 [kasan_test] [ 365.589114] Write of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 365.590860] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 365.592740] Tainted: [B]=BAD_PAGE, [N]=TEST [ 365.593624] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 365.594973] Call Trace: [ 365.595739] [ 365.596478] dump_stack_lvl+0x53/0x70 [ 365.597348] print_address_description.constprop.0+0x2c/0x3a0 [ 365.598392] ? kasan_atomics_helper+0x1014/0x5400 [kasan_test] [ 365.599457] print_report+0xb9/0x2b0 [ 365.600335] ? kasan_addr_to_slab+0xd/0xb0 [ 365.601255] ? kasan_atomics_helper+0x1014/0x5400 [kasan_test] [ 365.602324] kasan_report+0xe8/0x120 [ 365.603202] ? kasan_atomics_helper+0x1014/0x5400 [kasan_test] [ 365.604274] kasan_check_range+0x100/0x1b0 [ 365.605203] kasan_atomics_helper+0x1014/0x5400 [kasan_test] [ 365.606271] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 365.607374] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 365.608382] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 365.609430] ? __schedule+0x7ec/0x1950 [ 365.610334] ? ktime_get_ts64+0x7f/0x230 [ 365.611247] kunit_try_run_case+0x1b0/0x490 [ 365.612175] ? __pfx_kunit_try_run_case+0x10/0x10 [ 365.613144] ? set_cpus_allowed_ptr+0x85/0xc0 [ 365.614077] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 365.615046] ? __pfx_kunit_try_run_case+0x10/0x10 [ 365.615995] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 365.617051] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 365.618053] kthread+0x2d8/0x3c0 [ 365.618869] ? __pfx_kthread+0x10/0x10 [ 365.619725] ret_from_fork+0x31/0x70 [ 365.620563] ? __pfx_kthread+0x10/0x10 [ 365.621407] ret_from_fork_asm+0x1a/0x30 [ 365.622297] [ 365.623680] Allocated by task 4680: [ 365.624491] kasan_save_stack+0x33/0x60 [ 365.625338] kasan_save_track+0x14/0x30 [ 365.626174] __kasan_kmalloc+0xaa/0xb0 [ 365.627008] kasan_atomics+0x96/0x2d0 [kasan_test] [ 365.627926] kunit_try_run_case+0x1b0/0x490 [ 365.628778] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 365.629723] kthread+0x2d8/0x3c0 [ 365.630479] ret_from_fork+0x31/0x70 [ 365.631247] ret_from_fork_asm+0x1a/0x30 [ 365.632611] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 365.634514] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 365.637070] The buggy address belongs to the physical page: [ 365.637993] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 365.639127] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 365.640147] page_type: 0xfdffffff(slab) [ 365.640945] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 365.642071] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 365.643193] page dumped because: kasan: bad access detected [ 365.644751] Memory state around the buggy address: [ 365.645631] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.646718] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.647796] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 365.648877] ^ [ 365.649766] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.650863] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.651954] ================================================================== [ 365.653055] ================================================================== [ 365.654146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ef/0x5400 [kasan_test] [ 365.655359] Read of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 365.657114] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 365.659012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 365.659903] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 365.661261] Call Trace: [ 365.662037] [ 365.662785] dump_stack_lvl+0x53/0x70 [ 365.663664] print_address_description.constprop.0+0x2c/0x3a0 [ 365.664719] ? kasan_atomics_helper+0x49ef/0x5400 [kasan_test] [ 365.665795] print_report+0xb9/0x2b0 [ 365.666683] ? kasan_addr_to_slab+0xd/0xb0 [ 365.667612] ? kasan_atomics_helper+0x49ef/0x5400 [kasan_test] [ 365.668692] kasan_report+0xe8/0x120 [ 365.669580] ? kasan_atomics_helper+0x49ef/0x5400 [kasan_test] [ 365.670664] kasan_atomics_helper+0x49ef/0x5400 [kasan_test] [ 365.671738] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 365.672848] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 365.673868] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 365.674929] ? __schedule+0x7ec/0x1950 [ 365.675844] ? ktime_get_ts64+0x7f/0x230 [ 365.676767] kunit_try_run_case+0x1b0/0x490 [ 365.677707] ? __pfx_kunit_try_run_case+0x10/0x10 [ 365.678685] ? set_cpus_allowed_ptr+0x85/0xc0 [ 365.679633] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 365.680616] ? __pfx_kunit_try_run_case+0x10/0x10 [ 365.681576] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 365.682647] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 365.683657] kthread+0x2d8/0x3c0 [ 365.684488] ? __pfx_kthread+0x10/0x10 [ 365.685353] ret_from_fork+0x31/0x70 [ 365.686198] ? __pfx_kthread+0x10/0x10 [ 365.687056] ret_from_fork_asm+0x1a/0x30 [ 365.687921] [ 365.689305] Allocated by task 4680: [ 365.690120] kasan_save_stack+0x33/0x60 [ 365.690957] kasan_save_track+0x14/0x30 [ 365.691794] __kasan_kmalloc+0xaa/0xb0 [ 365.692616] kasan_atomics+0x96/0x2d0 [kasan_test] [ 365.693539] kunit_try_run_case+0x1b0/0x490 [ 365.694395] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 365.695344] kthread+0x2d8/0x3c0 [ 365.696107] ret_from_fork+0x31/0x70 [ 365.696887] ret_from_fork_asm+0x1a/0x30 [ 365.698258] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 365.700162] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 365.702712] The buggy address belongs to the physical page: [ 365.703636] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 365.704765] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 365.705782] page_type: 0xfdffffff(slab) [ 365.706580] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 365.707706] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 365.708829] page dumped because: kasan: bad access detected [ 365.710385] Memory state around the buggy address: [ 365.711265] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.712352] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.713432] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 365.714513] ^ [ 365.715401] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.716500] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.717592] ================================================================== [ 365.718695] ================================================================== [ 365.719788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10e0/0x5400 [kasan_test] [ 365.721003] Write of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 365.722769] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 365.724670] Tainted: [B]=BAD_PAGE, [N]=TEST [ 365.725565] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 365.726925] Call Trace: [ 365.727702] [ 365.728452] dump_stack_lvl+0x53/0x70 [ 365.729333] print_address_description.constprop.0+0x2c/0x3a0 [ 365.730389] ? kasan_atomics_helper+0x10e0/0x5400 [kasan_test] [ 365.731467] print_report+0xb9/0x2b0 [ 365.732355] ? kasan_addr_to_slab+0xd/0xb0 [ 365.733286] ? kasan_atomics_helper+0x10e0/0x5400 [kasan_test] [ 365.734367] kasan_report+0xe8/0x120 [ 365.735256] ? kasan_atomics_helper+0x10e0/0x5400 [kasan_test] [ 365.736340] kasan_check_range+0x100/0x1b0 [ 365.737279] kasan_atomics_helper+0x10e0/0x5400 [kasan_test] [ 365.738360] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 365.739475] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 365.740493] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 365.741553] ? __schedule+0x7ec/0x1950 [ 365.742467] ? ktime_get_ts64+0x7f/0x230 [ 365.743389] kunit_try_run_case+0x1b0/0x490 [ 365.744327] ? __pfx_kunit_try_run_case+0x10/0x10 [ 365.745306] ? set_cpus_allowed_ptr+0x85/0xc0 [ 365.746248] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 365.747226] ? __pfx_kunit_try_run_case+0x10/0x10 [ 365.748185] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 365.749251] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 365.750261] kthread+0x2d8/0x3c0 [ 365.751087] ? __pfx_kthread+0x10/0x10 [ 365.751952] ret_from_fork+0x31/0x70 [ 365.752799] ? __pfx_kthread+0x10/0x10 [ 365.753652] ret_from_fork_asm+0x1a/0x30 [ 365.754524] [ 365.755906] Allocated by task 4680: [ 365.756716] kasan_save_stack+0x33/0x60 [ 365.757560] kasan_save_track+0x14/0x30 [ 365.758394] __kasan_kmalloc+0xaa/0xb0 [ 365.759225] kasan_atomics+0x96/0x2d0 [kasan_test] [ 365.760139] kunit_try_run_case+0x1b0/0x490 [ 365.760989] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 365.761933] kthread+0x2d8/0x3c0 [ 365.762687] ret_from_fork+0x31/0x70 [ 365.763452] ret_from_fork_asm+0x1a/0x30 [ 365.764813] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 365.766713] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 365.769263] The buggy address belongs to the physical page: [ 365.770184] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 365.771316] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 365.772334] page_type: 0xfdffffff(slab) [ 365.773131] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 365.774255] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 365.775377] page dumped because: kasan: bad access detected [ 365.776936] Memory state around the buggy address: [ 365.777817] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.778904] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.779984] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 365.781065] ^ [ 365.781954] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.783051] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.784143] ================================================================== [ 365.785245] ================================================================== [ 365.786336] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d5/0x5400 [kasan_test] [ 365.787551] Read of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 365.789306] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 365.791203] Tainted: [B]=BAD_PAGE, [N]=TEST [ 365.792096] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 365.793455] Call Trace: [ 365.794232] [ 365.794980] dump_stack_lvl+0x53/0x70 [ 365.795858] print_address_description.constprop.0+0x2c/0x3a0 [ 365.796913] ? kasan_atomics_helper+0x49d5/0x5400 [kasan_test] [ 365.797990] print_report+0xb9/0x2b0 [ 365.798878] ? kasan_addr_to_slab+0xd/0xb0 [ 365.799807] ? kasan_atomics_helper+0x49d5/0x5400 [kasan_test] [ 365.800887] kasan_report+0xe8/0x120 [ 365.801776] ? kasan_atomics_helper+0x49d5/0x5400 [kasan_test] [ 365.802859] kasan_atomics_helper+0x49d5/0x5400 [kasan_test] [ 365.803935] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 365.805046] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 365.806067] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 365.807128] ? __schedule+0x7ec/0x1950 [ 365.808044] ? ktime_get_ts64+0x7f/0x230 [ 365.808970] kunit_try_run_case+0x1b0/0x490 [ 365.809912] ? __pfx_kunit_try_run_case+0x10/0x10 [ 365.810892] ? set_cpus_allowed_ptr+0x85/0xc0 [ 365.811841] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 365.812825] ? __pfx_kunit_try_run_case+0x10/0x10 [ 365.813786] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 365.814857] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 365.815868] kthread+0x2d8/0x3c0 [ 365.816700] ? __pfx_kthread+0x10/0x10 [ 365.817566] ret_from_fork+0x31/0x70 [ 365.818413] ? __pfx_kthread+0x10/0x10 [ 365.819272] ret_from_fork_asm+0x1a/0x30 [ 365.820137] [ 365.821524] Allocated by task 4680: [ 365.822341] kasan_save_stack+0x33/0x60 [ 365.823180] kasan_save_track+0x14/0x30 [ 365.824018] __kasan_kmalloc+0xaa/0xb0 [ 365.824842] kasan_atomics+0x96/0x2d0 [kasan_test] [ 365.825765] kunit_try_run_case+0x1b0/0x490 [ 365.826624] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 365.827574] kthread+0x2d8/0x3c0 [ 365.828339] ret_from_fork+0x31/0x70 [ 365.829119] ret_from_fork_asm+0x1a/0x30 [ 365.830492] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 365.832398] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 365.834950] The buggy address belongs to the physical page: [ 365.835873] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 365.837004] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 365.838022] page_type: 0xfdffffff(slab) [ 365.838821] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 365.839947] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 365.841071] page dumped because: kasan: bad access detected [ 365.842630] Memory state around the buggy address: [ 365.843510] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.844597] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.845677] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 365.846758] ^ [ 365.847647] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.848745] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.849838] ================================================================== [ 365.850940] ================================================================== [ 365.852032] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11ac/0x5400 [kasan_test] [ 365.853248] Write of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 365.855011] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 365.856909] Tainted: [B]=BAD_PAGE, [N]=TEST [ 365.857803] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 365.859162] Call Trace: [ 365.859939] [ 365.860688] dump_stack_lvl+0x53/0x70 [ 365.861568] print_address_description.constprop.0+0x2c/0x3a0 [ 365.862624] ? kasan_atomics_helper+0x11ac/0x5400 [kasan_test] [ 365.863700] print_report+0xb9/0x2b0 [ 365.864588] ? kasan_addr_to_slab+0xd/0xb0 [ 365.865518] ? kasan_atomics_helper+0x11ac/0x5400 [kasan_test] [ 365.866597] kasan_report+0xe8/0x120 [ 365.867487] ? kasan_atomics_helper+0x11ac/0x5400 [kasan_test] [ 365.868571] kasan_check_range+0x100/0x1b0 [ 365.869511] kasan_atomics_helper+0x11ac/0x5400 [kasan_test] [ 365.870590] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 365.871705] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 365.872723] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 365.873783] ? __schedule+0x7ec/0x1950 [ 365.874698] ? ktime_get_ts64+0x7f/0x230 [ 365.875620] kunit_try_run_case+0x1b0/0x490 [ 365.876559] ? __pfx_kunit_try_run_case+0x10/0x10 [ 365.877539] ? set_cpus_allowed_ptr+0x85/0xc0 [ 365.878481] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 365.879459] ? __pfx_kunit_try_run_case+0x10/0x10 [ 365.880416] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 365.881484] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 365.882496] kthread+0x2d8/0x3c0 [ 365.883323] ? __pfx_kthread+0x10/0x10 [ 365.884189] ret_from_fork+0x31/0x70 [ 365.885037] ? __pfx_kthread+0x10/0x10 [ 365.885891] ret_from_fork_asm+0x1a/0x30 [ 365.886765] [ 365.888148] Allocated by task 4680: [ 365.888959] kasan_save_stack+0x33/0x60 [ 365.889805] kasan_save_track+0x14/0x30 [ 365.890639] __kasan_kmalloc+0xaa/0xb0 [ 365.891472] kasan_atomics+0x96/0x2d0 [kasan_test] [ 365.892389] kunit_try_run_case+0x1b0/0x490 [ 365.893240] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 365.894187] kthread+0x2d8/0x3c0 [ 365.894943] ret_from_fork+0x31/0x70 [ 365.895710] ret_from_fork_asm+0x1a/0x30 [ 365.897073] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 365.898975] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 365.901530] The buggy address belongs to the physical page: [ 365.902454] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 365.903588] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 365.904608] page_type: 0xfdffffff(slab) [ 365.905405] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 365.906532] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 365.907655] page dumped because: kasan: bad access detected [ 365.909216] Memory state around the buggy address: [ 365.910097] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.911186] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.912268] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 365.913350] ^ [ 365.914241] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.915340] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.916435] ================================================================== [ 365.917539] ================================================================== [ 365.918633] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49bb/0x5400 [kasan_test] [ 365.919848] Read of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 365.921608] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 365.923507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 365.924402] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 365.925763] Call Trace: [ 365.926541] [ 365.927291] dump_stack_lvl+0x53/0x70 [ 365.928172] print_address_description.constprop.0+0x2c/0x3a0 [ 365.929229] ? kasan_atomics_helper+0x49bb/0x5400 [kasan_test] [ 365.930307] print_report+0xb9/0x2b0 [ 365.931196] ? kasan_addr_to_slab+0xd/0xb0 [ 365.932127] ? kasan_atomics_helper+0x49bb/0x5400 [kasan_test] [ 365.933208] kasan_report+0xe8/0x120 [ 365.934099] ? kasan_atomics_helper+0x49bb/0x5400 [kasan_test] [ 365.935183] kasan_atomics_helper+0x49bb/0x5400 [kasan_test] [ 365.936260] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 365.937372] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 365.938396] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 365.939458] ? __schedule+0x7ec/0x1950 [ 365.940376] ? ktime_get_ts64+0x7f/0x230 [ 365.941303] kunit_try_run_case+0x1b0/0x490 [ 365.942247] ? __pfx_kunit_try_run_case+0x10/0x10 [ 365.943228] ? set_cpus_allowed_ptr+0x85/0xc0 [ 365.944177] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 365.945163] ? __pfx_kunit_try_run_case+0x10/0x10 [ 365.946125] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 365.947199] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 365.948211] kthread+0x2d8/0x3c0 [ 365.949045] ? __pfx_kthread+0x10/0x10 [ 365.949913] ret_from_fork+0x31/0x70 [ 365.950761] ? __pfx_kthread+0x10/0x10 [ 365.951621] ret_from_fork_asm+0x1a/0x30 [ 365.952488] [ 365.953877] Allocated by task 4680: [ 365.954695] kasan_save_stack+0x33/0x60 [ 365.955534] kasan_save_track+0x14/0x30 [ 365.956373] __kasan_kmalloc+0xaa/0xb0 [ 365.957198] kasan_atomics+0x96/0x2d0 [kasan_test] [ 365.958122] kunit_try_run_case+0x1b0/0x490 [ 365.958981] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 365.959932] kthread+0x2d8/0x3c0 [ 365.960698] ret_from_fork+0x31/0x70 [ 365.961479] ret_from_fork_asm+0x1a/0x30 [ 365.962856] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 365.964764] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 365.967321] The buggy address belongs to the physical page: [ 365.968246] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 365.969379] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 365.970398] page_type: 0xfdffffff(slab) [ 365.971198] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 365.972326] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 365.973451] page dumped because: kasan: bad access detected [ 365.975013] Memory state around the buggy address: [ 365.975895] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.976984] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.978065] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 365.979148] ^ [ 365.980039] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.981138] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 365.982231] ================================================================== [ 365.983337] ================================================================== [ 365.984431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1278/0x5400 [kasan_test] [ 365.985647] Write of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 365.987415] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 365.989317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 365.990212] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 365.991573] Call Trace: [ 365.992352] [ 365.993102] dump_stack_lvl+0x53/0x70 [ 365.993984] print_address_description.constprop.0+0x2c/0x3a0 [ 365.995041] ? kasan_atomics_helper+0x1278/0x5400 [kasan_test] [ 365.996120] print_report+0xb9/0x2b0 [ 365.997009] ? kasan_addr_to_slab+0xd/0xb0 [ 365.997941] ? kasan_atomics_helper+0x1278/0x5400 [kasan_test] [ 365.999022] kasan_report+0xe8/0x120 [ 365.999913] ? kasan_atomics_helper+0x1278/0x5400 [kasan_test] [ 366.000998] kasan_check_range+0x100/0x1b0 [ 366.001940] kasan_atomics_helper+0x1278/0x5400 [kasan_test] [ 366.003022] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 366.004138] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 366.005158] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 366.006218] ? __schedule+0x7ec/0x1950 [ 366.007133] ? ktime_get_ts64+0x7f/0x230 [ 366.008058] kunit_try_run_case+0x1b0/0x490 [ 366.008997] ? __pfx_kunit_try_run_case+0x10/0x10 [ 366.009976] ? set_cpus_allowed_ptr+0x85/0xc0 [ 366.010919] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 366.011898] ? __pfx_kunit_try_run_case+0x10/0x10 [ 366.012856] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 366.013923] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 366.014934] kthread+0x2d8/0x3c0 [ 366.015761] ? __pfx_kthread+0x10/0x10 [ 366.016627] ret_from_fork+0x31/0x70 [ 366.017476] ? __pfx_kthread+0x10/0x10 [ 366.018331] ret_from_fork_asm+0x1a/0x30 [ 366.019206] [ 366.020590] Allocated by task 4680: [ 366.021402] kasan_save_stack+0x33/0x60 [ 366.022248] kasan_save_track+0x14/0x30 [ 366.023084] __kasan_kmalloc+0xaa/0xb0 [ 366.023917] kasan_atomics+0x96/0x2d0 [kasan_test] [ 366.024833] kunit_try_run_case+0x1b0/0x490 [ 366.025684] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 366.026629] kthread+0x2d8/0x3c0 [ 366.027384] ret_from_fork+0x31/0x70 [ 366.028152] ret_from_fork_asm+0x1a/0x30 [ 366.029514] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 366.031416] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 366.033970] The buggy address belongs to the physical page: [ 366.034893] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 366.036027] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 366.037047] page_type: 0xfdffffff(slab) [ 366.037846] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 366.038971] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 366.040093] page dumped because: kasan: bad access detected [ 366.041652] Memory state around the buggy address: [ 366.042532] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.043620] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.044700] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 366.045780] ^ [ 366.046669] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.047767] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.048859] ================================================================== [ 366.049961] ================================================================== [ 366.051053] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49a1/0x5400 [kasan_test] [ 366.052267] Read of size 4 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 366.054022] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 366.055919] Tainted: [B]=BAD_PAGE, [N]=TEST [ 366.056812] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 366.058170] Call Trace: [ 366.058946] [ 366.059693] dump_stack_lvl+0x53/0x70 [ 366.060571] print_address_description.constprop.0+0x2c/0x3a0 [ 366.061625] ? kasan_atomics_helper+0x49a1/0x5400 [kasan_test] [ 366.062700] print_report+0xb9/0x2b0 [ 366.063588] ? kasan_addr_to_slab+0xd/0xb0 [ 366.064517] ? kasan_atomics_helper+0x49a1/0x5400 [kasan_test] [ 366.065596] kasan_report+0xe8/0x120 [ 366.066485] ? kasan_atomics_helper+0x49a1/0x5400 [kasan_test] [ 366.067568] kasan_atomics_helper+0x49a1/0x5400 [kasan_test] [ 366.068642] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 366.069752] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 366.070772] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 366.071832] ? __schedule+0x7ec/0x1950 [ 366.072746] ? ktime_get_ts64+0x7f/0x230 [ 366.073670] kunit_try_run_case+0x1b0/0x490 [ 366.074611] ? __pfx_kunit_try_run_case+0x10/0x10 [ 366.075590] ? set_cpus_allowed_ptr+0x85/0xc0 [ 366.076537] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 366.077521] ? __pfx_kunit_try_run_case+0x10/0x10 [ 366.078481] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 366.079552] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 366.080562] kthread+0x2d8/0x3c0 [ 366.081393] ? __pfx_kthread+0x10/0x10 [ 366.082259] ret_from_fork+0x31/0x70 [ 366.083104] ? __pfx_kthread+0x10/0x10 [ 366.083961] ret_from_fork_asm+0x1a/0x30 [ 366.084826] [ 366.086210] Allocated by task 4680: [ 366.087026] kasan_save_stack+0x33/0x60 [ 366.087863] kasan_save_track+0x14/0x30 [ 366.088701] __kasan_kmalloc+0xaa/0xb0 [ 366.089524] kasan_atomics+0x96/0x2d0 [kasan_test] [ 366.090447] kunit_try_run_case+0x1b0/0x490 [ 366.091305] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 366.092255] kthread+0x2d8/0x3c0 [ 366.093020] ret_from_fork+0x31/0x70 [ 366.093799] ret_from_fork_asm+0x1a/0x30 [ 366.095171] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 366.097076] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 366.099626] The buggy address belongs to the physical page: [ 366.100549] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 366.101680] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 366.102697] page_type: 0xfdffffff(slab) [ 366.103496] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 366.104622] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 366.105746] page dumped because: kasan: bad access detected [ 366.107303] Memory state around the buggy address: [ 366.108184] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.109270] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.110350] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 366.111432] ^ [ 366.112320] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.113419] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.114510] ================================================================== [ 366.115613] ================================================================== [ 366.116705] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1344/0x5400 [kasan_test] [ 366.117920] Read of size 8 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 366.119676] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 366.121574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 366.122467] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 366.123827] Call Trace: [ 366.124603] [ 366.125352] dump_stack_lvl+0x53/0x70 [ 366.126232] print_address_description.constprop.0+0x2c/0x3a0 [ 366.127288] ? kasan_atomics_helper+0x1344/0x5400 [kasan_test] [ 366.128364] print_report+0xb9/0x2b0 [ 366.129253] ? kasan_addr_to_slab+0xd/0xb0 [ 366.130182] ? kasan_atomics_helper+0x1344/0x5400 [kasan_test] [ 366.131262] kasan_report+0xe8/0x120 [ 366.132151] ? kasan_atomics_helper+0x1344/0x5400 [kasan_test] [ 366.133234] kasan_check_range+0x100/0x1b0 [ 366.134173] kasan_atomics_helper+0x1344/0x5400 [kasan_test] [ 366.135252] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 366.136367] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 366.137384] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 366.138443] ? __schedule+0x7ec/0x1950 [ 366.139356] ? ktime_get_ts64+0x7f/0x230 [ 366.140277] kunit_try_run_case+0x1b0/0x490 [ 366.141215] ? __pfx_kunit_try_run_case+0x10/0x10 [ 366.142193] ? set_cpus_allowed_ptr+0x85/0xc0 [ 366.143134] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 366.144112] ? __pfx_kunit_try_run_case+0x10/0x10 [ 366.145069] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 366.146134] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 366.147145] kthread+0x2d8/0x3c0 [ 366.147970] ? __pfx_kthread+0x10/0x10 [ 366.148833] ret_from_fork+0x31/0x70 [ 366.149680] ? __pfx_kthread+0x10/0x10 [ 366.150532] ret_from_fork_asm+0x1a/0x30 [ 366.151405] [ 366.152785] Allocated by task 4680: [ 366.153595] kasan_save_stack+0x33/0x60 [ 366.154440] kasan_save_track+0x14/0x30 [ 366.155273] __kasan_kmalloc+0xaa/0xb0 [ 366.156105] kasan_atomics+0x96/0x2d0 [kasan_test] [ 366.157019] kunit_try_run_case+0x1b0/0x490 [ 366.157869] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 366.158813] kthread+0x2d8/0x3c0 [ 366.159568] ret_from_fork+0x31/0x70 [ 366.160334] ret_from_fork_asm+0x1a/0x30 [ 366.161695] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 366.163597] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 366.166151] The buggy address belongs to the physical page: [ 366.167074] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 366.168208] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 366.169227] page_type: 0xfdffffff(slab) [ 366.170024] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 366.171150] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 366.172273] page dumped because: kasan: bad access detected [ 366.173834] Memory state around the buggy address: [ 366.174716] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.175805] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.176885] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 366.177968] ^ [ 366.178859] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.179957] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.181050] ================================================================== [ 366.182154] ================================================================== [ 366.183246] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e81/0x5400 [kasan_test] [ 366.184461] Read of size 8 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 366.186219] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 366.188119] Tainted: [B]=BAD_PAGE, [N]=TEST [ 366.189013] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 366.190374] Call Trace: [ 366.191151] [ 366.191901] dump_stack_lvl+0x53/0x70 [ 366.192781] print_address_description.constprop.0+0x2c/0x3a0 [ 366.193836] ? kasan_atomics_helper+0x4e81/0x5400 [kasan_test] [ 366.194913] print_report+0xb9/0x2b0 [ 366.195801] ? kasan_addr_to_slab+0xd/0xb0 [ 366.196732] ? kasan_atomics_helper+0x4e81/0x5400 [kasan_test] [ 366.197812] kasan_report+0xe8/0x120 [ 366.198700] ? kasan_atomics_helper+0x4e81/0x5400 [kasan_test] [ 366.199785] kasan_atomics_helper+0x4e81/0x5400 [kasan_test] [ 366.200860] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 366.201972] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 366.202993] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 366.204055] ? __schedule+0x7ec/0x1950 [ 366.204972] ? ktime_get_ts64+0x7f/0x230 [ 366.205898] kunit_try_run_case+0x1b0/0x490 [ 366.206840] ? __pfx_kunit_try_run_case+0x10/0x10 [ 366.207819] ? set_cpus_allowed_ptr+0x85/0xc0 [ 366.208767] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 366.209751] ? __pfx_kunit_try_run_case+0x10/0x10 [ 366.210712] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 366.211785] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 366.212796] kthread+0x2d8/0x3c0 [ 366.213628] ? __pfx_kthread+0x10/0x10 [ 366.214495] ret_from_fork+0x31/0x70 [ 366.215343] ? __pfx_kthread+0x10/0x10 [ 366.216204] ret_from_fork_asm+0x1a/0x30 [ 366.217071] [ 366.218459] Allocated by task 4680: [ 366.219278] kasan_save_stack+0x33/0x60 [ 366.220116] kasan_save_track+0x14/0x30 [ 366.220955] __kasan_kmalloc+0xaa/0xb0 [ 366.221780] kasan_atomics+0x96/0x2d0 [kasan_test] [ 366.222703] kunit_try_run_case+0x1b0/0x490 [ 366.223562] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 366.224514] kthread+0x2d8/0x3c0 [ 366.225281] ret_from_fork+0x31/0x70 [ 366.226062] ret_from_fork_asm+0x1a/0x30 [ 366.227440] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 366.229348] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 366.231905] The buggy address belongs to the physical page: [ 366.232831] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 366.233964] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 366.234984] page_type: 0xfdffffff(slab) [ 366.235785] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 366.236913] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 366.238040] page dumped because: kasan: bad access detected [ 366.239602] Memory state around the buggy address: [ 366.240484] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.241573] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.242654] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 366.243738] ^ [ 366.244629] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.245729] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.246823] ================================================================== [ 366.247927] ================================================================== [ 366.249020] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13f5/0x5400 [kasan_test] [ 366.250236] Write of size 8 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 366.252003] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 366.253905] Tainted: [B]=BAD_PAGE, [N]=TEST [ 366.254799] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 366.256160] Call Trace: [ 366.256938] [ 366.257688] dump_stack_lvl+0x53/0x70 [ 366.258568] print_address_description.constprop.0+0x2c/0x3a0 [ 366.259613] ? kasan_atomics_helper+0x13f5/0x5400 [kasan_test] [ 366.260679] print_report+0xb9/0x2b0 [ 366.261558] ? kasan_addr_to_slab+0xd/0xb0 [ 366.262477] ? kasan_atomics_helper+0x13f5/0x5400 [kasan_test] [ 366.263547] kasan_report+0xe8/0x120 [ 366.264425] ? kasan_atomics_helper+0x13f5/0x5400 [kasan_test] [ 366.265497] kasan_check_range+0x100/0x1b0 [ 366.266426] kasan_atomics_helper+0x13f5/0x5400 [kasan_test] [ 366.267495] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 366.268599] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 366.269607] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 366.270655] ? __schedule+0x7ec/0x1950 [ 366.271559] ? ktime_get_ts64+0x7f/0x230 [ 366.272471] kunit_try_run_case+0x1b0/0x490 [ 366.273399] ? __pfx_kunit_try_run_case+0x10/0x10 [ 366.274368] ? set_cpus_allowed_ptr+0x85/0xc0 [ 366.275301] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 366.276269] ? __pfx_kunit_try_run_case+0x10/0x10 [ 366.277218] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 366.278275] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 366.279278] kthread+0x2d8/0x3c0 [ 366.280096] ? __pfx_kthread+0x10/0x10 [ 366.280952] ret_from_fork+0x31/0x70 [ 366.281792] ? __pfx_kthread+0x10/0x10 [ 366.282637] ret_from_fork_asm+0x1a/0x30 [ 366.283502] [ 366.284868] Allocated by task 4680: [ 366.285671] kasan_save_stack+0x33/0x60 [ 366.286508] kasan_save_track+0x14/0x30 [ 366.287334] __kasan_kmalloc+0xaa/0xb0 [ 366.288158] kasan_atomics+0x96/0x2d0 [kasan_test] [ 366.289066] kunit_try_run_case+0x1b0/0x490 [ 366.289908] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 366.290844] kthread+0x2d8/0x3c0 [ 366.291591] ret_from_fork+0x31/0x70 [ 366.292350] ret_from_fork_asm+0x1a/0x30 [ 366.293697] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 366.295584] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 366.298115] The buggy address belongs to the physical page: [ 366.299030] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 366.300156] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 366.301166] page_type: 0xfdffffff(slab) [ 366.301956] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 366.303074] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 366.304188] page dumped because: kasan: bad access detected [ 366.305730] Memory state around the buggy address: [ 366.306601] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.307679] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.308750] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 366.309822] ^ [ 366.310702] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.311791] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.312873] ================================================================== [ 366.313965] ================================================================== [ 366.315070] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50a3/0x5400 [kasan_test] [ 366.316283] Write of size 8 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 366.318026] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 366.319903] Tainted: [B]=BAD_PAGE, [N]=TEST [ 366.320786] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 366.322134] Call Trace: [ 366.322900] [ 366.323638] dump_stack_lvl+0x53/0x70 [ 366.324506] print_address_description.constprop.0+0x2c/0x3a0 [ 366.325551] ? kasan_atomics_helper+0x50a3/0x5400 [kasan_test] [ 366.326616] print_report+0xb9/0x2b0 [ 366.327492] ? kasan_addr_to_slab+0xd/0xb0 [ 366.328411] ? kasan_atomics_helper+0x50a3/0x5400 [kasan_test] [ 366.329479] kasan_report+0xe8/0x120 [ 366.330357] ? kasan_atomics_helper+0x50a3/0x5400 [kasan_test] [ 366.331430] kasan_atomics_helper+0x50a3/0x5400 [kasan_test] [ 366.332494] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 366.333594] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 366.334605] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 366.335654] ? __schedule+0x7ec/0x1950 [ 366.336559] ? ktime_get_ts64+0x7f/0x230 [ 366.337475] kunit_try_run_case+0x1b0/0x490 [ 366.338406] ? __pfx_kunit_try_run_case+0x10/0x10 [ 366.339377] ? set_cpus_allowed_ptr+0x85/0xc0 [ 366.340315] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 366.341290] ? __pfx_kunit_try_run_case+0x10/0x10 [ 366.342241] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 366.343304] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 366.344305] kthread+0x2d8/0x3c0 [ 366.345128] ? __pfx_kthread+0x10/0x10 [ 366.345985] ret_from_fork+0x31/0x70 [ 366.346822] ? __pfx_kthread+0x10/0x10 [ 366.347673] ret_from_fork_asm+0x1a/0x30 [ 366.348530] [ 366.349899] Allocated by task 4680: [ 366.350707] kasan_save_stack+0x33/0x60 [ 366.351536] kasan_save_track+0x14/0x30 [ 366.352366] __kasan_kmalloc+0xaa/0xb0 [ 366.353181] kasan_atomics+0x96/0x2d0 [kasan_test] [ 366.354095] kunit_try_run_case+0x1b0/0x490 [ 366.354946] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 366.355888] kthread+0x2d8/0x3c0 [ 366.356644] ret_from_fork+0x31/0x70 [ 366.357416] ret_from_fork_asm+0x1a/0x30 [ 366.358774] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 366.360665] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 366.363194] The buggy address belongs to the physical page: [ 366.364110] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 366.365233] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 366.366243] page_type: 0xfdffffff(slab) [ 366.367033] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 366.368149] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 366.369264] page dumped because: kasan: bad access detected [ 366.370804] Memory state around the buggy address: [ 366.371675] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.372753] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.373823] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 366.374894] ^ [ 366.375776] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.376864] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.377946] ================================================================== [ 366.379040] ================================================================== [ 366.380145] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14aa/0x5400 [kasan_test] [ 366.381359] Write of size 8 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 366.383105] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 366.384984] Tainted: [B]=BAD_PAGE, [N]=TEST [ 366.385867] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 366.387215] Call Trace: [ 366.387981] [ 366.388720] dump_stack_lvl+0x53/0x70 [ 366.389588] print_address_description.constprop.0+0x2c/0x3a0 [ 366.390632] ? kasan_atomics_helper+0x14aa/0x5400 [kasan_test] [ 366.391697] print_report+0xb9/0x2b0 [ 366.392575] ? kasan_addr_to_slab+0xd/0xb0 [ 366.393494] ? kasan_atomics_helper+0x14aa/0x5400 [kasan_test] [ 366.394564] kasan_report+0xe8/0x120 [ 366.395443] ? kasan_atomics_helper+0x14aa/0x5400 [kasan_test] [ 366.396515] kasan_check_range+0x100/0x1b0 [ 366.397444] kasan_atomics_helper+0x14aa/0x5400 [kasan_test] [ 366.398512] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 366.399614] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 366.400621] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 366.401669] ? __schedule+0x7ec/0x1950 [ 366.402573] ? ktime_get_ts64+0x7f/0x230 [ 366.403485] kunit_try_run_case+0x1b0/0x490 [ 366.404413] ? __pfx_kunit_try_run_case+0x10/0x10 [ 366.405381] ? set_cpus_allowed_ptr+0x85/0xc0 [ 366.406313] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 366.407282] ? __pfx_kunit_try_run_case+0x10/0x10 [ 366.408230] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 366.409287] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 366.410289] kthread+0x2d8/0x3c0 [ 366.411107] ? __pfx_kthread+0x10/0x10 [ 366.411963] ret_from_fork+0x31/0x70 [ 366.412802] ? __pfx_kthread+0x10/0x10 [ 366.413646] ret_from_fork_asm+0x1a/0x30 [ 366.414511] [ 366.415875] Allocated by task 4680: [ 366.416676] kasan_save_stack+0x33/0x60 [ 366.417513] kasan_save_track+0x14/0x30 [ 366.418339] __kasan_kmalloc+0xaa/0xb0 [ 366.419163] kasan_atomics+0x96/0x2d0 [kasan_test] [ 366.420071] kunit_try_run_case+0x1b0/0x490 [ 366.420915] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 366.421851] kthread+0x2d8/0x3c0 [ 366.422599] ret_from_fork+0x31/0x70 [ 366.423359] ret_from_fork_asm+0x1a/0x30 [ 366.424706] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 366.426592] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 366.429121] The buggy address belongs to the physical page: [ 366.430035] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 366.431160] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 366.432170] page_type: 0xfdffffff(slab) [ 366.432960] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 366.434077] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 366.435191] page dumped because: kasan: bad access detected [ 366.436733] Memory state around the buggy address: [ 366.437604] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.438682] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.439752] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 366.440825] ^ [ 366.441705] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.442793] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.443876] ================================================================== [ 366.444969] ================================================================== [ 366.446076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1542/0x5400 [kasan_test] [ 366.447290] Write of size 8 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 366.449032] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 366.450909] Tainted: [B]=BAD_PAGE, [N]=TEST [ 366.451792] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 366.453141] Call Trace: [ 366.453907] [ 366.454645] dump_stack_lvl+0x53/0x70 [ 366.455513] print_address_description.constprop.0+0x2c/0x3a0 [ 366.456556] ? kasan_atomics_helper+0x1542/0x5400 [kasan_test] [ 366.457621] print_report+0xb9/0x2b0 [ 366.458496] ? kasan_addr_to_slab+0xd/0xb0 [ 366.459415] ? kasan_atomics_helper+0x1542/0x5400 [kasan_test] [ 366.460482] kasan_report+0xe8/0x120 [ 366.461360] ? kasan_atomics_helper+0x1542/0x5400 [kasan_test] [ 366.462432] kasan_check_range+0x100/0x1b0 [ 366.463360] kasan_atomics_helper+0x1542/0x5400 [kasan_test] [ 366.464429] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 366.465530] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 366.466537] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 366.467584] ? __schedule+0x7ec/0x1950 [ 366.468487] ? ktime_get_ts64+0x7f/0x230 [ 366.469399] kunit_try_run_case+0x1b0/0x490 [ 366.470325] ? __pfx_kunit_try_run_case+0x10/0x10 [ 366.471294] ? set_cpus_allowed_ptr+0x85/0xc0 [ 366.472225] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 366.473192] ? __pfx_kunit_try_run_case+0x10/0x10 [ 366.474140] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 366.475196] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 366.476198] kthread+0x2d8/0x3c0 [ 366.477015] ? __pfx_kthread+0x10/0x10 [ 366.477871] ret_from_fork+0x31/0x70 [ 366.478709] ? __pfx_kthread+0x10/0x10 [ 366.479554] ret_from_fork_asm+0x1a/0x30 [ 366.480417] [ 366.481781] Allocated by task 4680: [ 366.482583] kasan_save_stack+0x33/0x60 [ 366.483419] kasan_save_track+0x14/0x30 [ 366.484245] __kasan_kmalloc+0xaa/0xb0 [ 366.485069] kasan_atomics+0x96/0x2d0 [kasan_test] [ 366.485977] kunit_try_run_case+0x1b0/0x490 [ 366.486820] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 366.487756] kthread+0x2d8/0x3c0 [ 366.488504] ret_from_fork+0x31/0x70 [ 366.489264] ret_from_fork_asm+0x1a/0x30 [ 366.490611] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 366.492498] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 366.495030] The buggy address belongs to the physical page: [ 366.495944] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 366.497070] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 366.498080] page_type: 0xfdffffff(slab) [ 366.498869] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 366.499985] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 366.501097] page dumped because: kasan: bad access detected [ 366.502638] Memory state around the buggy address: [ 366.503510] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.504588] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.505661] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 366.506734] ^ [ 366.507615] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.508704] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.509788] ================================================================== [ 366.510882] ================================================================== [ 366.511990] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15da/0x5400 [kasan_test] [ 366.513205] Write of size 8 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 366.514951] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 366.516831] Tainted: [B]=BAD_PAGE, [N]=TEST [ 366.517715] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 366.519064] Call Trace: [ 366.519831] [ 366.520568] dump_stack_lvl+0x53/0x70 [ 366.521438] print_address_description.constprop.0+0x2c/0x3a0 [ 366.522482] ? kasan_atomics_helper+0x15da/0x5400 [kasan_test] [ 366.523546] print_report+0xb9/0x2b0 [ 366.524423] ? kasan_addr_to_slab+0xd/0xb0 [ 366.525343] ? kasan_atomics_helper+0x15da/0x5400 [kasan_test] [ 366.526411] kasan_report+0xe8/0x120 [ 366.527289] ? kasan_atomics_helper+0x15da/0x5400 [kasan_test] [ 366.528361] kasan_check_range+0x100/0x1b0 [ 366.529289] kasan_atomics_helper+0x15da/0x5400 [kasan_test] [ 366.530358] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 366.531460] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 366.532466] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 366.533513] ? __schedule+0x7ec/0x1950 [ 366.534416] ? ktime_get_ts64+0x7f/0x230 [ 366.535327] kunit_try_run_case+0x1b0/0x490 [ 366.536254] ? __pfx_kunit_try_run_case+0x10/0x10 [ 366.537221] ? set_cpus_allowed_ptr+0x85/0xc0 [ 366.538152] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 366.539119] ? __pfx_kunit_try_run_case+0x10/0x10 [ 366.540066] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 366.541123] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 366.542124] kthread+0x2d8/0x3c0 [ 366.542940] ? __pfx_kthread+0x10/0x10 [ 366.543795] ret_from_fork+0x31/0x70 [ 366.544632] ? __pfx_kthread+0x10/0x10 [ 366.545474] ret_from_fork_asm+0x1a/0x30 [ 366.546337] [ 366.547697] Allocated by task 4680: [ 366.548497] kasan_save_stack+0x33/0x60 [ 366.549332] kasan_save_track+0x14/0x30 [ 366.550155] __kasan_kmalloc+0xaa/0xb0 [ 366.550977] kasan_atomics+0x96/0x2d0 [kasan_test] [ 366.551882] kunit_try_run_case+0x1b0/0x490 [ 366.552722] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 366.553656] kthread+0x2d8/0x3c0 [ 366.554401] ret_from_fork+0x31/0x70 [ 366.555158] ret_from_fork_asm+0x1a/0x30 [ 366.556501] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 366.558384] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 366.560907] The buggy address belongs to the physical page: [ 366.561819] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 366.562942] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 366.563950] page_type: 0xfdffffff(slab) [ 366.564738] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 366.565852] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 366.566964] page dumped because: kasan: bad access detected [ 366.568504] Memory state around the buggy address: [ 366.569375] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.570454] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.571525] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 366.572598] ^ [ 366.573479] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.574568] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.575652] ================================================================== [ 366.576744] ================================================================== [ 366.577850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1671/0x5400 [kasan_test] [ 366.579063] Write of size 8 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 366.580808] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 366.582688] Tainted: [B]=BAD_PAGE, [N]=TEST [ 366.583572] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 366.584921] Call Trace: [ 366.585688] [ 366.586426] dump_stack_lvl+0x53/0x70 [ 366.587296] print_address_description.constprop.0+0x2c/0x3a0 [ 366.588340] ? kasan_atomics_helper+0x1671/0x5400 [kasan_test] [ 366.589405] print_report+0xb9/0x2b0 [ 366.590282] ? kasan_addr_to_slab+0xd/0xb0 [ 366.591201] ? kasan_atomics_helper+0x1671/0x5400 [kasan_test] [ 366.592269] kasan_report+0xe8/0x120 [ 366.593149] ? kasan_atomics_helper+0x1671/0x5400 [kasan_test] [ 366.594222] kasan_check_range+0x100/0x1b0 [ 366.595151] kasan_atomics_helper+0x1671/0x5400 [kasan_test] [ 366.596220] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 366.597323] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 366.598331] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 366.599379] ? __schedule+0x7ec/0x1950 [ 366.600283] ? ktime_get_ts64+0x7f/0x230 [ 366.601196] kunit_try_run_case+0x1b0/0x490 [ 366.602125] ? __pfx_kunit_try_run_case+0x10/0x10 [ 366.603095] ? set_cpus_allowed_ptr+0x85/0xc0 [ 366.604028] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 366.604998] ? __pfx_kunit_try_run_case+0x10/0x10 [ 366.605946] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 366.607004] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 366.608006] kthread+0x2d8/0x3c0 [ 366.608823] ? __pfx_kthread+0x10/0x10 [ 366.609679] ret_from_fork+0x31/0x70 [ 366.610517] ? __pfx_kthread+0x10/0x10 [ 366.611361] ret_from_fork_asm+0x1a/0x30 [ 366.612224] [ 366.613587] Allocated by task 4680: [ 366.614388] kasan_save_stack+0x33/0x60 [ 366.615225] kasan_save_track+0x14/0x30 [ 366.616050] __kasan_kmalloc+0xaa/0xb0 [ 366.616873] kasan_atomics+0x96/0x2d0 [kasan_test] [ 366.617781] kunit_try_run_case+0x1b0/0x490 [ 366.618623] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 366.619559] kthread+0x2d8/0x3c0 [ 366.620306] ret_from_fork+0x31/0x70 [ 366.621065] ret_from_fork_asm+0x1a/0x30 [ 366.622412] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 366.624299] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 366.626829] The buggy address belongs to the physical page: [ 366.627745] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 366.628895] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 366.629916] page_type: 0xfdffffff(slab) [ 366.630714] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 366.631840] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 366.632963] page dumped because: kasan: bad access detected [ 366.634523] Memory state around the buggy address: [ 366.635404] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.635723] result_service: tmpfs, RESULT_MNT: /10.239.97.5/result, RESULT_ROOT: /10.239.97.5/result/kunit/group-00/lkp-csl-d02/debian-12-x86_64-20240206.cgz/x86_64-rhel-8.3-kunit/gcc-12/2377a7d90f5bb2ccc302b5fb0e6ba4c67cf24ddd/3, TMP_RESULT_ROOT: /tmp/lkp/result [ 366.636053] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.636055] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 366.638436] ^ [ 366.638438] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.638440] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.638441] ================================================================== [ 366.638446] ================================================================== [ 366.638447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1708/0x5400 [kasan_test] [ 366.641255] run-job /lkp/jobs/scheduled/lkp-csl-d02/kunit-group-00-debian-12-x86_64-20240206.cgz-2377a7d90f5b-20240823-137313-1l6zztg-3.yaml [ 366.641340] Write of size 8 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 366.642442] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 366.656606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 366.657603] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 366.659065] Call Trace: [ 366.659941] [ 366.660784] dump_stack_lvl+0x53/0x70 [ 366.661755] print_address_description.constprop.0+0x2c/0x3a0 [ 366.662902] ? kasan_atomics_helper+0x1708/0x5400 [kasan_test] [ 366.664069] print_report+0xb9/0x2b0 [ 366.665048] ? kasan_addr_to_slab+0xd/0xb0 [ 366.666064] ? kasan_atomics_helper+0x1708/0x5400 [kasan_test] [ 366.667227] kasan_report+0xe8/0x120 [ 366.668197] ? kasan_atomics_helper+0x1708/0x5400 [kasan_test] [ 366.669358] kasan_check_range+0x100/0x1b0 [ 366.670366] kasan_atomics_helper+0x1708/0x5400 [kasan_test] [ 366.671510] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 366.672678] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 366.673748] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 366.674857] ? __schedule+0x7ec/0x1950 [ 366.675817] ? ktime_get_ts64+0x7f/0x230 [ 366.676790] kunit_try_run_case+0x1b0/0x490 [ 366.677775] ? __pfx_kunit_try_run_case+0x10/0x10 [ 366.678803] ? set_cpus_allowed_ptr+0x85/0xc0 [ 366.679800] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 366.680834] ? __pfx_kunit_try_run_case+0x10/0x10 [ 366.681838] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 366.682940] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 366.683971] kthread+0x2d8/0x3c0 [ 366.684814] ? __pfx_kthread+0x10/0x10 [ 366.685699] ret_from_fork+0x31/0x70 [ 366.686559] ? __pfx_kthread+0x10/0x10 [ 366.687436] ret_from_fork_asm+0x1a/0x30 [ 366.688321] [ 366.689738] Allocated by task 4680: [ 366.690582] kasan_save_stack+0x33/0x60 [ 366.691448] kasan_save_track+0x14/0x30 [ 366.692294] __kasan_kmalloc+0xaa/0xb0 [ 366.693114] kasan_atomics+0x96/0x2d0 [kasan_test] [ 366.694016] kunit_try_run_case+0x1b0/0x490 [ 366.694854] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 366.695799] kthread+0x2d8/0x3c0 [ 366.696554] ret_from_fork+0x31/0x70 [ 366.697321] ret_from_fork_asm+0x1a/0x30 [ 366.698683] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 366.700586] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 366.703139] The buggy address belongs to the physical page: [ 366.704062] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 366.705195] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 366.706214] page_type: 0xfdffffff(slab) [ 366.707012] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 366.708137] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 366.709259] page dumped because: kasan: bad access detected [ 366.710817] Memory state around the buggy address: [ 366.711697] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.712785] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.713865] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 366.714946] ^ [ 366.715836] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.716933] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.718025] ================================================================== [ 366.719127] ================================================================== [ 366.720218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17a0/0x5400 [kasan_test] [ 366.721434] Write of size 8 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 366.723200] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 366.725099] Tainted: [B]=BAD_PAGE, [N]=TEST [ 366.725994] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 366.727354] Call Trace: [ 366.728131] [ 366.728881] dump_stack_lvl+0x53/0x70 [ 366.729761] print_address_description.constprop.0+0x2c/0x3a0 [ 366.730817] ? kasan_atomics_helper+0x17a0/0x5400 [kasan_test] [ 366.731895] print_report+0xb9/0x2b0 [ 366.732783] ? kasan_addr_to_slab+0xd/0xb0 [ 366.733714] ? kasan_atomics_helper+0x17a0/0x5400 [kasan_test] [ 366.734793] kasan_report+0xe8/0x120 [ 366.735685] ? kasan_atomics_helper+0x17a0/0x5400 [kasan_test] [ 366.736770] kasan_check_range+0x100/0x1b0 [ 366.737711] kasan_atomics_helper+0x17a0/0x5400 [kasan_test] [ 366.738791] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 366.739906] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 366.740926] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 366.741987] ? __schedule+0x7ec/0x1950 [ 366.742902] ? ktime_get_ts64+0x7f/0x230 [ 366.743826] kunit_try_run_case+0x1b0/0x490 [ 366.744765] ? __pfx_kunit_try_run_case+0x10/0x10 [ 366.745745] ? set_cpus_allowed_ptr+0x85/0xc0 [ 366.746688] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 366.747667] ? __pfx_kunit_try_run_case+0x10/0x10 [ 366.748625] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 366.749693] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 366.750705] kthread+0x2d8/0x3c0 [ 366.751533] ? __pfx_kthread+0x10/0x10 [ 366.752399] ret_from_fork+0x31/0x70 [ 366.753248] ? __pfx_kthread+0x10/0x10 [ 366.754103] ret_from_fork_asm+0x1a/0x30 [ 366.754978] [ 366.756362] Allocated by task 4680: [ 366.757174] kasan_save_stack+0x33/0x60 [ 366.758021] kasan_save_track+0x14/0x30 [ 366.758856] __kasan_kmalloc+0xaa/0xb0 [ 366.759690] kasan_atomics+0x96/0x2d0 [kasan_test] [ 366.760606] kunit_try_run_case+0x1b0/0x490 [ 366.761458] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 366.762404] kthread+0x2d8/0x3c0 [ 366.763177] ret_from_fork+0x31/0x70 [ 366.763946] ret_from_fork_asm+0x1a/0x30 [ 366.765310] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 366.767213] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 366.769773] The buggy address belongs to the physical page: [ 366.770698] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 366.771833] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 366.772852] page_type: 0xfdffffff(slab) [ 366.773652] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 366.774778] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 366.775902] page dumped because: kasan: bad access detected [ 366.777462] Memory state around the buggy address: [ 366.778343] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.779433] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.780513] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 366.781595] ^ [ 366.782486] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.783585] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.784678] ================================================================== [ 366.785782] ================================================================== [ 366.786875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1838/0x5400 [kasan_test] [ 366.788089] Write of size 8 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 366.789855] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 366.791754] Tainted: [B]=BAD_PAGE, [N]=TEST [ 366.792647] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 366.794008] Call Trace: [ 366.794786] [ 366.795535] dump_stack_lvl+0x53/0x70 [ 366.796414] print_address_description.constprop.0+0x2c/0x3a0 [ 366.797470] ? kasan_atomics_helper+0x1838/0x5400 [kasan_test] [ 366.798547] print_report+0xb9/0x2b0 [ 366.799435] ? kasan_addr_to_slab+0xd/0xb0 [ 366.800367] ? kasan_atomics_helper+0x1838/0x5400 [kasan_test] [ 366.801447] kasan_report+0xe8/0x120 [ 366.802337] ? kasan_atomics_helper+0x1838/0x5400 [kasan_test] [ 366.803421] kasan_check_range+0x100/0x1b0 [ 366.804360] kasan_atomics_helper+0x1838/0x5400 [kasan_test] [ 366.805439] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 366.806553] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 366.807570] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 366.808629] ? __schedule+0x7ec/0x1950 [ 366.809542] ? ktime_get_ts64+0x7f/0x230 [ 366.810464] kunit_try_run_case+0x1b0/0x490 [ 366.811401] ? __pfx_kunit_try_run_case+0x10/0x10 [ 366.812381] ? set_cpus_allowed_ptr+0x85/0xc0 [ 366.813323] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 366.814300] ? __pfx_kunit_try_run_case+0x10/0x10 [ 366.815258] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 366.816324] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 366.817336] kthread+0x2d8/0x3c0 [ 366.818161] ? __pfx_kthread+0x10/0x10 [ 366.819026] ret_from_fork+0x31/0x70 [ 366.819873] ? __pfx_kthread+0x10/0x10 [ 366.820726] ret_from_fork_asm+0x1a/0x30 [ 366.821600] [ 366.822982] Allocated by task 4680: [ 366.823793] kasan_save_stack+0x33/0x60 [ 366.824637] kasan_save_track+0x14/0x30 [ 366.825472] __kasan_kmalloc+0xaa/0xb0 [ 366.826304] kasan_atomics+0x96/0x2d0 [kasan_test] [ 366.827220] kunit_try_run_case+0x1b0/0x490 [ 366.828072] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 366.829016] kthread+0x2d8/0x3c0 [ 366.829772] ret_from_fork+0x31/0x70 [ 366.830538] ret_from_fork_asm+0x1a/0x30 [ 366.831901] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 366.833803] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 366.836357] The buggy address belongs to the physical page: [ 366.837280] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 366.838413] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 366.839431] page_type: 0xfdffffff(slab) [ 366.840229] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 366.841355] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 366.842478] page dumped because: kasan: bad access detected [ 366.844038] Memory state around the buggy address: [ 366.844919] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.846007] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.847088] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 366.848171] ^ [ 366.849061] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.850160] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.851253] ================================================================== [ 366.852356] ================================================================== [ 366.853449] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18d0/0x5400 [kasan_test] [ 366.854665] Write of size 8 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 366.856431] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 366.858333] Tainted: [B]=BAD_PAGE, [N]=TEST [ 366.859228] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 366.860589] Call Trace: [ 366.861368] [ 366.862118] dump_stack_lvl+0x53/0x70 [ 366.862998] print_address_description.constprop.0+0x2c/0x3a0 [ 366.864055] ? kasan_atomics_helper+0x18d0/0x5400 [kasan_test] [ 366.865133] print_report+0xb9/0x2b0 [ 366.866022] ? kasan_addr_to_slab+0xd/0xb0 [ 366.866952] ? kasan_atomics_helper+0x18d0/0x5400 [kasan_test] [ 366.868031] kasan_report+0xe8/0x120 [ 366.868920] ? kasan_atomics_helper+0x18d0/0x5400 [kasan_test] [ 366.870003] kasan_check_range+0x100/0x1b0 [ 366.870943] kasan_atomics_helper+0x18d0/0x5400 [kasan_test] [ 366.872022] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 366.873135] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 366.874152] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 366.875211] ? __schedule+0x7ec/0x1950 [ 366.876124] ? ktime_get_ts64+0x7f/0x230 [ 366.877045] kunit_try_run_case+0x1b0/0x490 [ 366.877983] ? __pfx_kunit_try_run_case+0x10/0x10 [ 366.878961] ? set_cpus_allowed_ptr+0x85/0xc0 [ 366.879902] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 366.880878] ? __pfx_kunit_try_run_case+0x10/0x10 [ 366.881835] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 366.882902] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 366.883912] kthread+0x2d8/0x3c0 [ 366.884737] ? __pfx_kthread+0x10/0x10 [ 366.885601] ret_from_fork+0x31/0x70 [ 366.886447] ? __pfx_kthread+0x10/0x10 [ 366.887299] ret_from_fork_asm+0x1a/0x30 [ 366.888172] [ 366.889550] Allocated by task 4680: [ 366.890359] kasan_save_stack+0x33/0x60 [ 366.891204] kasan_save_track+0x14/0x30 [ 366.892037] __kasan_kmalloc+0xaa/0xb0 [ 366.892868] kasan_atomics+0x96/0x2d0 [kasan_test] [ 366.893782] kunit_try_run_case+0x1b0/0x490 [ 366.894632] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 366.895575] kthread+0x2d8/0x3c0 [ 366.896329] ret_from_fork+0x31/0x70 [ 366.897094] ret_from_fork_asm+0x1a/0x30 [ 366.898452] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 366.900349] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 366.902897] The buggy address belongs to the physical page: [ 366.903818] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 366.904952] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 366.905969] page_type: 0xfdffffff(slab) [ 366.906766] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 366.907892] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 366.909014] page dumped because: kasan: bad access detected [ 366.910572] Memory state around the buggy address: [ 366.911454] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.912542] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.913623] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 366.914705] ^ [ 366.915595] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.916694] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.917786] ================================================================== [ 366.918888] ================================================================== [ 366.919979] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1968/0x5400 [kasan_test] [ 366.921194] Write of size 8 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 366.922959] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 366.924861] Tainted: [B]=BAD_PAGE, [N]=TEST [ 366.925755] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 366.927115] Call Trace: [ 366.927892] [ 366.928641] dump_stack_lvl+0x53/0x70 [ 366.929521] print_address_description.constprop.0+0x2c/0x3a0 [ 366.930577] ? kasan_atomics_helper+0x1968/0x5400 [kasan_test] [ 366.931654] print_report+0xb9/0x2b0 [ 366.932542] ? kasan_addr_to_slab+0xd/0xb0 [ 366.933473] ? kasan_atomics_helper+0x1968/0x5400 [kasan_test] [ 366.934553] kasan_report+0xe8/0x120 [ 366.935443] ? kasan_atomics_helper+0x1968/0x5400 [kasan_test] [ 366.936527] kasan_check_range+0x100/0x1b0 [ 366.937468] kasan_atomics_helper+0x1968/0x5400 [kasan_test] [ 366.938547] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 366.939661] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 366.940679] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 366.941738] ? __schedule+0x7ec/0x1950 [ 366.942653] ? ktime_get_ts64+0x7f/0x230 [ 366.943575] kunit_try_run_case+0x1b0/0x490 [ 366.944513] ? __pfx_kunit_try_run_case+0x10/0x10 [ 366.945492] ? set_cpus_allowed_ptr+0x85/0xc0 [ 366.946433] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 366.947410] ? __pfx_kunit_try_run_case+0x10/0x10 [ 366.948368] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 366.949433] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 366.950443] kthread+0x2d8/0x3c0 [ 366.951269] ? __pfx_kthread+0x10/0x10 [ 366.952133] ret_from_fork+0x31/0x70 [ 366.952980] ? __pfx_kthread+0x10/0x10 [ 366.953833] ret_from_fork_asm+0x1a/0x30 [ 366.954705] [ 366.956086] Allocated by task 4680: [ 366.956896] kasan_save_stack+0x33/0x60 [ 366.957740] kasan_save_track+0x14/0x30 [ 366.958573] __kasan_kmalloc+0xaa/0xb0 [ 366.959404] kasan_atomics+0x96/0x2d0 [kasan_test] [ 366.960319] kunit_try_run_case+0x1b0/0x490 [ 366.961169] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 366.962113] kthread+0x2d8/0x3c0 [ 366.962868] ret_from_fork+0x31/0x70 [ 366.963633] ret_from_fork_asm+0x1a/0x30 [ 366.964993] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 366.966893] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 366.969441] The buggy address belongs to the physical page: [ 366.970363] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 366.971496] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 366.972513] page_type: 0xfdffffff(slab) [ 366.973310] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 366.974436] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 366.975559] page dumped because: kasan: bad access detected [ 366.977117] Memory state around the buggy address: [ 366.977999] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.979086] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.980167] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 366.981248] ^ [ 366.982137] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.983236] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 366.984328] ================================================================== [ 366.985431] ================================================================== [ 366.986522] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a03/0x5400 [kasan_test] [ 366.987736] Write of size 8 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 366.989500] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 366.991400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 366.992294] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 366.993654] Call Trace: [ 366.994431] [ 366.995180] dump_stack_lvl+0x53/0x70 [ 366.996060] print_address_description.constprop.0+0x2c/0x3a0 [ 366.997116] ? kasan_atomics_helper+0x1a03/0x5400 [kasan_test] [ 366.998193] print_report+0xb9/0x2b0 [ 366.999081] ? kasan_addr_to_slab+0xd/0xb0 [ 367.000012] ? kasan_atomics_helper+0x1a03/0x5400 [kasan_test] [ 367.001093] kasan_report+0xe8/0x120 [ 367.001985] ? kasan_atomics_helper+0x1a03/0x5400 [kasan_test] [ 367.003069] kasan_check_range+0x100/0x1b0 [ 367.004009] kasan_atomics_helper+0x1a03/0x5400 [kasan_test] [ 367.005090] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 367.006205] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 367.007224] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 367.008285] ? __schedule+0x7ec/0x1950 [ 367.009201] ? ktime_get_ts64+0x7f/0x230 [ 367.010126] kunit_try_run_case+0x1b0/0x490 [ 367.011067] ? __pfx_kunit_try_run_case+0x10/0x10 [ 367.012048] ? set_cpus_allowed_ptr+0x85/0xc0 [ 367.012993] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 367.013973] ? __pfx_kunit_try_run_case+0x10/0x10 [ 367.014932] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 367.016001] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 367.017013] kthread+0x2d8/0x3c0 [ 367.017841] ? __pfx_kthread+0x10/0x10 [ 367.018707] ret_from_fork+0x31/0x70 [ 367.019556] ? __pfx_kthread+0x10/0x10 [ 367.020410] ret_from_fork_asm+0x1a/0x30 [ 367.021286] [ 367.022672] Allocated by task 4680: [ 367.023485] kasan_save_stack+0x33/0x60 [ 367.024332] kasan_save_track+0x14/0x30 [ 367.025167] __kasan_kmalloc+0xaa/0xb0 [ 367.026002] kasan_atomics+0x96/0x2d0 [kasan_test] [ 367.026919] kunit_try_run_case+0x1b0/0x490 [ 367.027773] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 367.028719] kthread+0x2d8/0x3c0 [ 367.029476] ret_from_fork+0x31/0x70 [ 367.030244] ret_from_fork_asm+0x1a/0x30 [ 367.031610] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 367.033516] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 367.036076] The buggy address belongs to the physical page: [ 367.037000] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 367.038136] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 367.039156] page_type: 0xfdffffff(slab) [ 367.039954] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 367.041079] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 367.042203] page dumped because: kasan: bad access detected [ 367.043764] Memory state around the buggy address: [ 367.044646] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.045733] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.046814] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 367.047895] ^ [ 367.048783] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.049881] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.050972] ================================================================== [ 367.052078] ================================================================== [ 367.053170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1aa5/0x5400 [kasan_test] [ 367.054385] Write of size 8 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 367.056152] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 367.058055] Tainted: [B]=BAD_PAGE, [N]=TEST [ 367.058951] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 367.060312] Call Trace: [ 367.061091] [ 367.061841] dump_stack_lvl+0x53/0x70 [ 367.062722] print_address_description.constprop.0+0x2c/0x3a0 [ 367.063779] ? kasan_atomics_helper+0x1aa5/0x5400 [kasan_test] [ 367.064857] print_report+0xb9/0x2b0 [ 367.065746] ? kasan_addr_to_slab+0xd/0xb0 [ 367.066678] ? kasan_atomics_helper+0x1aa5/0x5400 [kasan_test] [ 367.067759] kasan_report+0xe8/0x120 [ 367.068650] ? kasan_atomics_helper+0x1aa5/0x5400 [kasan_test] [ 367.069736] kasan_check_range+0x100/0x1b0 [ 367.070677] kasan_atomics_helper+0x1aa5/0x5400 [kasan_test] [ 367.071758] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 367.072875] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 367.073894] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 367.074955] ? __schedule+0x7ec/0x1950 [ 367.075870] ? ktime_get_ts64+0x7f/0x230 [ 367.076794] kunit_try_run_case+0x1b0/0x490 [ 367.077734] ? __pfx_kunit_try_run_case+0x10/0x10 [ 367.078714] ? set_cpus_allowed_ptr+0x85/0xc0 [ 367.079656] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 367.080634] ? __pfx_kunit_try_run_case+0x10/0x10 [ 367.081593] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 367.082660] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 367.083673] kthread+0x2d8/0x3c0 [ 367.084500] ? __pfx_kthread+0x10/0x10 [ 367.085366] ret_from_fork+0x31/0x70 [ 367.086214] ? __pfx_kthread+0x10/0x10 [ 367.087070] ret_from_fork_asm+0x1a/0x30 [ 367.087944] [ 367.089328] Allocated by task 4680: [ 367.090139] kasan_save_stack+0x33/0x60 [ 367.090985] kasan_save_track+0x14/0x30 [ 367.091820] __kasan_kmalloc+0xaa/0xb0 [ 367.092653] kasan_atomics+0x96/0x2d0 [kasan_test] [ 367.093570] kunit_try_run_case+0x1b0/0x490 [ 367.094421] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 367.095365] kthread+0x2d8/0x3c0 [ 367.096120] ret_from_fork+0x31/0x70 [ 367.096886] ret_from_fork_asm+0x1a/0x30 [ 367.098247] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 367.100147] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 367.102698] The buggy address belongs to the physical page: [ 367.103620] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 367.104753] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 367.105772] page_type: 0xfdffffff(slab) [ 367.106569] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 367.107693] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 367.108815] page dumped because: kasan: bad access detected [ 367.110374] Memory state around the buggy address: [ 367.111255] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.112342] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.113422] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 367.114504] ^ [ 367.115394] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.116491] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.117582] ================================================================== [ 367.118684] ================================================================== [ 367.119776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b80/0x5400 [kasan_test] [ 367.120990] Write of size 8 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 367.122754] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 367.124653] Tainted: [B]=BAD_PAGE, [N]=TEST [ 367.125546] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 367.126905] Call Trace: [ 367.127682] [ 367.128431] dump_stack_lvl+0x53/0x70 [ 367.129315] print_address_description.constprop.0+0x2c/0x3a0 [ 367.130360] ? kasan_atomics_helper+0x1b80/0x5400 [kasan_test] [ 367.131426] print_report+0xb9/0x2b0 [ 367.132329] ? kasan_addr_to_slab+0xd/0xb0 [ 367.133265] ? kasan_atomics_helper+0x1b80/0x5400 [kasan_test] [ 367.134334] kasan_report+0xe8/0x120 [ 367.135214] ? kasan_atomics_helper+0x1b80/0x5400 [kasan_test] [ 367.136314] kasan_check_range+0x100/0x1b0 [ 367.137259] kasan_atomics_helper+0x1b80/0x5400 [kasan_test] [ 367.138327] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 367.139429] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 367.140461] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 367.141521] ? __schedule+0x7ec/0x1950 [ 367.142425] ? ktime_get_ts64+0x7f/0x230 [ 367.143337] kunit_try_run_case+0x1b0/0x490 [ 367.144291] ? __pfx_kunit_try_run_case+0x10/0x10 [ 367.145276] ? set_cpus_allowed_ptr+0x85/0xc0 [ 367.146207] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 367.147173] ? __pfx_kunit_try_run_case+0x10/0x10 [ 367.148145] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 367.149216] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 367.150217] kthread+0x2d8/0x3c0 [ 367.151032] ? __pfx_kthread+0x10/0x10 [ 367.151907] ret_from_fork+0x31/0x70 [ 367.152754] ? __pfx_kthread+0x10/0x10 [ 367.153607] ret_from_fork_asm+0x1a/0x30 [ 367.154471] [ 367.155852] Allocated by task 4680: [ 367.156663] kasan_save_stack+0x33/0x60 [ 367.157508] kasan_save_track+0x14/0x30 [ 367.158333] __kasan_kmalloc+0xaa/0xb0 [ 367.159156] kasan_atomics+0x96/0x2d0 [kasan_test] [ 367.160085] kunit_try_run_case+0x1b0/0x490 [ 367.160937] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 367.161882] kthread+0x2d8/0x3c0 [ 367.162629] ret_from_fork+0x31/0x70 [ 367.163387] ret_from_fork_asm+0x1a/0x30 [ 367.164764] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 367.166658] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 367.169230] The buggy address belongs to the physical page: [ 367.170144] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 367.171268] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 367.172301] page_type: 0xfdffffff(slab) [ 367.173106] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 367.174223] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 367.175336] page dumped because: kasan: bad access detected [ 367.176911] Memory state around the buggy address: [ 367.177792] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.178870] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.179961] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 367.181051] ^ [ 367.181932] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.183020] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.184127] ================================================================== [ 367.185234] ================================================================== [ 367.186340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f03/0x5400 [kasan_test] [ 367.187553] Read of size 8 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 367.189326] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 367.191202] Tainted: [B]=BAD_PAGE, [N]=TEST [ 367.192108] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 367.193468] Call Trace: [ 367.194233] [ 367.194970] dump_stack_lvl+0x53/0x70 [ 367.195856] print_address_description.constprop.0+0x2c/0x3a0 [ 367.196911] ? kasan_atomics_helper+0x4f03/0x5400 [kasan_test] [ 367.197984] print_report+0xb9/0x2b0 [ 367.198860] ? kasan_addr_to_slab+0xd/0xb0 [ 367.199793] ? kasan_atomics_helper+0x4f03/0x5400 [kasan_test] [ 367.200872] kasan_report+0xe8/0x120 [ 367.201759] ? kasan_atomics_helper+0x4f03/0x5400 [kasan_test] [ 367.202831] kasan_atomics_helper+0x4f03/0x5400 [kasan_test] [ 367.203913] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 367.205033] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 367.206042] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 367.207091] ? __schedule+0x7ec/0x1950 [ 367.208016] ? ktime_get_ts64+0x7f/0x230 [ 367.208941] kunit_try_run_case+0x1b0/0x490 [ 367.209882] ? __pfx_kunit_try_run_case+0x10/0x10 [ 367.210850] ? set_cpus_allowed_ptr+0x85/0xc0 [ 367.211803] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 367.212787] ? __pfx_kunit_try_run_case+0x10/0x10 [ 367.213747] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 367.214808] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 367.215825] kthread+0x2d8/0x3c0 [ 367.216657] ? __pfx_kthread+0x10/0x10 [ 367.217521] ret_from_fork+0x31/0x70 [ 367.218357] ? __pfx_kthread+0x10/0x10 [ 367.219205] ret_from_fork_asm+0x1a/0x30 [ 367.220082] [ 367.221468] Allocated by task 4680: [ 367.222274] kasan_save_stack+0x33/0x60 [ 367.223102] kasan_save_track+0x14/0x30 [ 367.223951] __kasan_kmalloc+0xaa/0xb0 [ 367.224775] kasan_atomics+0x96/0x2d0 [kasan_test] [ 367.225697] kunit_try_run_case+0x1b0/0x490 [ 367.226545] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 367.227486] kthread+0x2d8/0x3c0 [ 367.228266] ret_from_fork+0x31/0x70 [ 367.229056] ret_from_fork_asm+0x1a/0x30 [ 367.230413] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 367.232331] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 367.234866] The buggy address belongs to the physical page: [ 367.235797] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 367.236928] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 367.237945] page_type: 0xfdffffff(slab) [ 367.238736] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 367.239871] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 367.241005] page dumped because: kasan: bad access detected [ 367.242544] Memory state around the buggy address: [ 367.243415] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.244517] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.245598] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 367.246670] ^ [ 367.247549] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.248662] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.249754] ================================================================== [ 367.250846] ================================================================== [ 367.251951] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c41/0x5400 [kasan_test] [ 367.253165] Write of size 8 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 367.254909] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 367.256787] Tainted: [B]=BAD_PAGE, [N]=TEST [ 367.257671] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 367.259020] Call Trace: [ 367.259785] [ 367.260523] dump_stack_lvl+0x53/0x70 [ 367.261392] print_address_description.constprop.0+0x2c/0x3a0 [ 367.262437] ? kasan_atomics_helper+0x1c41/0x5400 [kasan_test] [ 367.263501] print_report+0xb9/0x2b0 [ 367.264377] ? kasan_addr_to_slab+0xd/0xb0 [ 367.265295] ? kasan_atomics_helper+0x1c41/0x5400 [kasan_test] [ 367.266363] kasan_report+0xe8/0x120 [ 367.267240] ? kasan_atomics_helper+0x1c41/0x5400 [kasan_test] [ 367.268311] kasan_check_range+0x100/0x1b0 [ 367.269239] kasan_atomics_helper+0x1c41/0x5400 [kasan_test] [ 367.270306] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 367.271408] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 367.272414] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 367.273461] ? __schedule+0x7ec/0x1950 [ 367.274364] ? ktime_get_ts64+0x7f/0x230 [ 367.275276] kunit_try_run_case+0x1b0/0x490 [ 367.276204] ? __pfx_kunit_try_run_case+0x10/0x10 [ 367.277173] ? set_cpus_allowed_ptr+0x85/0xc0 [ 367.278104] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 367.279073] ? __pfx_kunit_try_run_case+0x10/0x10 [ 367.280021] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 367.281078] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 367.282080] kthread+0x2d8/0x3c0 [ 367.282897] ? __pfx_kthread+0x10/0x10 [ 367.283753] ret_from_fork+0x31/0x70 [ 367.284592] ? __pfx_kthread+0x10/0x10 [ 367.285437] ret_from_fork_asm+0x1a/0x30 [ 367.286301] [ 367.287666] Allocated by task 4680: [ 367.288468] kasan_save_stack+0x33/0x60 [ 367.289304] kasan_save_track+0x14/0x30 [ 367.290131] __kasan_kmalloc+0xaa/0xb0 [ 367.290955] kasan_atomics+0x96/0x2d0 [kasan_test] [ 367.291863] kunit_try_run_case+0x1b0/0x490 [ 367.292706] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 367.293643] kthread+0x2d8/0x3c0 [ 367.294391] ret_from_fork+0x31/0x70 [ 367.295151] ret_from_fork_asm+0x1a/0x30 [ 367.296500] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 367.298389] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 367.300920] The buggy address belongs to the physical page: [ 367.301836] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 367.302962] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 367.303972] page_type: 0xfdffffff(slab) [ 367.304762] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 367.305880] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 367.306995] page dumped because: kasan: bad access detected [ 367.308538] Memory state around the buggy address: [ 367.309412] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.310491] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.311564] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 367.312637] ^ [ 367.313518] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.314608] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.315691] ================================================================== [ 367.316785] ================================================================== [ 367.317892] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1cd9/0x5400 [kasan_test] [ 367.319107] Write of size 8 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 367.320853] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 367.322732] Tainted: [B]=BAD_PAGE, [N]=TEST [ 367.323616] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 367.324966] Call Trace: [ 367.325732] [ 367.326470] dump_stack_lvl+0x53/0x70 [ 367.327339] print_address_description.constprop.0+0x2c/0x3a0 [ 367.328383] ? kasan_atomics_helper+0x1cd9/0x5400 [kasan_test] [ 367.329448] print_report+0xb9/0x2b0 [ 367.330325] ? kasan_addr_to_slab+0xd/0xb0 [ 367.331245] ? kasan_atomics_helper+0x1cd9/0x5400 [kasan_test] [ 367.332313] kasan_report+0xe8/0x120 [ 367.333191] ? kasan_atomics_helper+0x1cd9/0x5400 [kasan_test] [ 367.334262] kasan_check_range+0x100/0x1b0 [ 367.335191] kasan_atomics_helper+0x1cd9/0x5400 [kasan_test] [ 367.336259] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 367.337361] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 367.338366] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 367.339413] ? __schedule+0x7ec/0x1950 [ 367.340315] ? ktime_get_ts64+0x7f/0x230 [ 367.341226] kunit_try_run_case+0x1b0/0x490 [ 367.342152] ? __pfx_kunit_try_run_case+0x10/0x10 [ 367.343119] ? set_cpus_allowed_ptr+0x85/0xc0 [ 367.344050] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 367.345016] ? __pfx_kunit_try_run_case+0x10/0x10 [ 367.345963] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 367.347018] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 367.348019] kthread+0x2d8/0x3c0 [ 367.348834] ? __pfx_kthread+0x10/0x10 [ 367.349688] ret_from_fork+0x31/0x70 [ 367.350530] ? __pfx_kthread+0x10/0x10 [ 367.351372] ret_from_fork_asm+0x1a/0x30 [ 367.352235] [ 367.353593] Allocated by task 4680: [ 367.354392] kasan_save_stack+0x33/0x60 [ 367.355227] kasan_save_track+0x14/0x30 [ 367.356050] __kasan_kmalloc+0xaa/0xb0 [ 367.356872] kasan_atomics+0x96/0x2d0 [kasan_test] [ 367.357777] kunit_try_run_case+0x1b0/0x490 [ 367.358618] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 367.359553] kthread+0x2d8/0x3c0 [ 367.360298] ret_from_fork+0x31/0x70 [ 367.361056] ret_from_fork_asm+0x1a/0x30 [ 367.362400] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 367.364284] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 367.366809] The buggy address belongs to the physical page: [ 367.367722] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 367.368844] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 367.369853] page_type: 0xfdffffff(slab) [ 367.370641] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 367.371755] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 367.372869] page dumped because: kasan: bad access detected [ 367.374409] Memory state around the buggy address: [ 367.375281] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.376361] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.377432] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 367.378505] ^ [ 367.379386] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.380475] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.381558] ================================================================== [ 367.382651] ================================================================== [ 367.383757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d70/0x5400 [kasan_test] [ 367.384974] Write of size 8 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 367.386737] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 367.388653] Tainted: [B]=BAD_PAGE, [N]=TEST [ 367.389547] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 367.390896] Call Trace: [ 367.391664] [ 367.392429] dump_stack_lvl+0x53/0x70 [ 367.393315] print_address_description.constprop.0+0x2c/0x3a0 [ 367.394361] ? kasan_atomics_helper+0x1d70/0x5400 [kasan_test] [ 367.395427] print_report+0xb9/0x2b0 [ 367.396332] ? kasan_addr_to_slab+0xd/0xb0 [ 367.397268] ? kasan_atomics_helper+0x1d70/0x5400 [kasan_test] [ 367.398337] kasan_report+0xe8/0x120 [ 367.399216] ? kasan_atomics_helper+0x1d70/0x5400 [kasan_test] [ 367.400319] kasan_check_range+0x100/0x1b0 [ 367.401265] kasan_atomics_helper+0x1d70/0x5400 [kasan_test] [ 367.402334] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 367.403437] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 367.404471] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 367.405529] ? __schedule+0x7ec/0x1950 [ 367.406432] ? ktime_get_ts64+0x7f/0x230 [ 367.407345] kunit_try_run_case+0x1b0/0x490 [ 367.408300] ? __pfx_kunit_try_run_case+0x10/0x10 [ 367.409285] ? set_cpus_allowed_ptr+0x85/0xc0 [ 367.410217] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 367.411186] ? __pfx_kunit_try_run_case+0x10/0x10 [ 367.412158] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 367.413232] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 367.414233] kthread+0x2d8/0x3c0 [ 367.415051] ? __pfx_kthread+0x10/0x10 [ 367.415925] ret_from_fork+0x31/0x70 [ 367.416773] ? __pfx_kthread+0x10/0x10 [ 367.417626] ret_from_fork_asm+0x1a/0x30 [ 367.418491] [ 367.419872] Allocated by task 4680: [ 367.420684] kasan_save_stack+0x33/0x60 [ 367.421529] kasan_save_track+0x14/0x30 [ 367.422355] __kasan_kmalloc+0xaa/0xb0 [ 367.423179] kasan_atomics+0x96/0x2d0 [kasan_test] [ 367.424109] kunit_try_run_case+0x1b0/0x490 [ 367.424960] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 367.425905] kthread+0x2d8/0x3c0 [ 367.426652] ret_from_fork+0x31/0x70 [ 367.427410] ret_from_fork_asm+0x1a/0x30 [ 367.428789] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 367.430684] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 367.433258] The buggy address belongs to the physical page: [ 367.434172] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 367.435297] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 367.436330] page_type: 0xfdffffff(slab) [ 367.437137] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 367.438254] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 367.439367] page dumped because: kasan: bad access detected [ 367.440943] Memory state around the buggy address: [ 367.441825] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.442903] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.443996] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 367.445086] ^ [ 367.445968] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.447057] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.448165] ================================================================== [ 367.449273] ================================================================== [ 367.450379] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e07/0x5400 [kasan_test] [ 367.451593] Write of size 8 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 367.453374] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 367.455254] Tainted: [B]=BAD_PAGE, [N]=TEST [ 367.456162] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 367.457520] Call Trace: [ 367.458287] [ 367.459025] dump_stack_lvl+0x53/0x70 [ 367.459913] print_address_description.constprop.0+0x2c/0x3a0 [ 367.460979] ? kasan_atomics_helper+0x1e07/0x5400 [kasan_test] [ 367.462045] print_report+0xb9/0x2b0 [ 367.462923] ? kasan_addr_to_slab+0xd/0xb0 [ 367.463860] ? kasan_atomics_helper+0x1e07/0x5400 [kasan_test] [ 367.464940] kasan_report+0xe8/0x120 [ 367.465828] ? kasan_atomics_helper+0x1e07/0x5400 [kasan_test] [ 367.466900] kasan_check_range+0x100/0x1b0 [ 367.467846] kasan_atomics_helper+0x1e07/0x5400 [kasan_test] [ 367.468925] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 367.470037] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 367.471043] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 367.472113] ? __schedule+0x7ec/0x1950 [ 367.473036] ? ktime_get_ts64+0x7f/0x230 [ 367.473945] kunit_try_run_case+0x1b0/0x490 [ 367.474872] ? __pfx_kunit_try_run_case+0x10/0x10 [ 367.475855] ? set_cpus_allowed_ptr+0x85/0xc0 [ 367.476797] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 367.477772] ? __pfx_kunit_try_run_case+0x10/0x10 [ 367.478717] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 367.479789] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 367.480799] kthread+0x2d8/0x3c0 [ 367.481623] ? __pfx_kthread+0x10/0x10 [ 367.482476] ret_from_fork+0x31/0x70 [ 367.483312] ? __pfx_kthread+0x10/0x10 [ 367.484178] ret_from_fork_asm+0x1a/0x30 [ 367.485061] [ 367.486419] Allocated by task 4680: [ 367.487219] kasan_save_stack+0x33/0x60 [ 367.488076] kasan_save_track+0x14/0x30 [ 367.488909] __kasan_kmalloc+0xaa/0xb0 [ 367.489740] kasan_atomics+0x96/0x2d0 [kasan_test] [ 367.490645] kunit_try_run_case+0x1b0/0x490 [ 367.491487] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 367.492446] kthread+0x2d8/0x3c0 [ 367.493206] ret_from_fork+0x31/0x70 [ 367.493964] ret_from_fork_asm+0x1a/0x30 [ 367.495308] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 367.497227] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 367.499753] The buggy address belongs to the physical page: [ 367.500689] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 367.501823] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 367.502831] page_type: 0xfdffffff(slab) [ 367.503619] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 367.504758] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 367.505880] page dumped because: kasan: bad access detected [ 367.507420] Memory state around the buggy address: [ 367.508316] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.509406] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.510476] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 367.511549] ^ [ 367.512453] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.513551] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.514634] ================================================================== [ 367.515729] ================================================================== [ 367.516836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e9f/0x5400 [kasan_test] [ 367.518049] Write of size 8 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 367.519812] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 367.521705] Tainted: [B]=BAD_PAGE, [N]=TEST [ 367.522588] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 367.523958] Call Trace: [ 367.524734] [ 367.525480] dump_stack_lvl+0x53/0x70 [ 367.526349] print_address_description.constprop.0+0x2c/0x3a0 [ 367.527393] ? kasan_atomics_helper+0x1e9f/0x5400 [kasan_test] [ 367.528483] print_report+0xb9/0x2b0 [ 367.529373] ? kasan_addr_to_slab+0xd/0xb0 [ 367.530292] ? kasan_atomics_helper+0x1e9f/0x5400 [kasan_test] [ 367.531360] kasan_report+0xe8/0x120 [ 367.532264] ? kasan_atomics_helper+0x1e9f/0x5400 [kasan_test] [ 367.533350] kasan_check_range+0x100/0x1b0 [ 367.534279] kasan_atomics_helper+0x1e9f/0x5400 [kasan_test] [ 367.535347] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 367.536475] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 367.537493] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 367.538539] ? __schedule+0x7ec/0x1950 [ 367.539441] ? ktime_get_ts64+0x7f/0x230 [ 367.540379] kunit_try_run_case+0x1b0/0x490 [ 367.541320] ? __pfx_kunit_try_run_case+0x10/0x10 [ 367.542288] ? set_cpus_allowed_ptr+0x85/0xc0 [ 367.543218] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 367.544210] ? __pfx_kunit_try_run_case+0x10/0x10 [ 367.545174] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 367.546228] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 367.547228] kthread+0x2d8/0x3c0 [ 367.548064] ? __pfx_kthread+0x10/0x10 [ 367.548928] ret_from_fork+0x31/0x70 [ 367.549772] ? __pfx_kthread+0x10/0x10 [ 367.550613] ret_from_fork_asm+0x1a/0x30 [ 367.551475] [ 367.552870] Allocated by task 4680: [ 367.553678] kasan_save_stack+0x33/0x60 [ 367.554512] kasan_save_track+0x14/0x30 [ 367.555335] __kasan_kmalloc+0xaa/0xb0 [ 367.556181] kasan_atomics+0x96/0x2d0 [kasan_test] [ 367.557104] kunit_try_run_case+0x1b0/0x490 [ 367.557945] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 367.558879] kthread+0x2d8/0x3c0 [ 367.559624] ret_from_fork+0x31/0x70 [ 367.560405] ret_from_fork_asm+0x1a/0x30 [ 367.561763] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 367.563647] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 367.566201] The buggy address belongs to the physical page: [ 367.567115] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 367.568263] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 367.569286] page_type: 0xfdffffff(slab) [ 367.570074] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 367.571189] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 367.572326] page dumped because: kasan: bad access detected [ 367.573880] Memory state around the buggy address: [ 367.574751] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.575846] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.576925] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 367.578006] ^ [ 367.578886] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.579994] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.581092] ================================================================== [ 367.582185] ================================================================== [ 367.583290] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f44/0x5400 [kasan_test] [ 367.584527] Read of size 8 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 367.586272] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 367.588172] Tainted: [B]=BAD_PAGE, [N]=TEST [ 367.589075] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 367.590424] Call Trace: [ 367.591190] [ 367.591947] dump_stack_lvl+0x53/0x70 [ 367.592826] print_address_description.constprop.0+0x2c/0x3a0 [ 367.593880] ? kasan_atomics_helper+0x4f44/0x5400 [kasan_test] [ 367.594944] print_report+0xb9/0x2b0 [ 367.595837] ? kasan_addr_to_slab+0xd/0xb0 [ 367.596766] ? kasan_atomics_helper+0x4f44/0x5400 [kasan_test] [ 367.597842] kasan_report+0xe8/0x120 [ 367.598719] ? kasan_atomics_helper+0x4f44/0x5400 [kasan_test] [ 367.599806] kasan_atomics_helper+0x4f44/0x5400 [kasan_test] [ 367.600881] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 367.601988] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 367.602998] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 367.604069] ? __schedule+0x7ec/0x1950 [ 367.604996] ? ktime_get_ts64+0x7f/0x230 [ 367.605908] kunit_try_run_case+0x1b0/0x490 [ 367.606838] ? __pfx_kunit_try_run_case+0x10/0x10 [ 367.607823] ? set_cpus_allowed_ptr+0x85/0xc0 [ 367.608770] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 367.609752] ? __pfx_kunit_try_run_case+0x10/0x10 [ 367.610701] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 367.611761] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 367.612785] kthread+0x2d8/0x3c0 [ 367.613615] ? __pfx_kthread+0x10/0x10 [ 367.614470] ret_from_fork+0x31/0x70 [ 367.615305] ? __pfx_kthread+0x10/0x10 [ 367.616178] ret_from_fork_asm+0x1a/0x30 [ 367.617053] [ 367.618420] Allocated by task 4680: [ 367.619226] kasan_save_stack+0x33/0x60 [ 367.620078] kasan_save_track+0x14/0x30 [ 367.620918] __kasan_kmalloc+0xaa/0xb0 [ 367.621741] kasan_atomics+0x96/0x2d0 [kasan_test] [ 367.622655] kunit_try_run_case+0x1b0/0x490 [ 367.623504] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 367.624471] kthread+0x2d8/0x3c0 [ 367.625243] ret_from_fork+0x31/0x70 [ 367.626015] ret_from_fork_asm+0x1a/0x30 [ 367.627374] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 367.629301] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 367.631848] The buggy address belongs to the physical page: [ 367.632772] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 367.633905] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 367.634939] page_type: 0xfdffffff(slab) [ 367.635740] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 367.636868] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 367.637993] page dumped because: kasan: bad access detected [ 367.639554] Memory state around the buggy address: [ 367.640434] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.641522] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.642601] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 367.643682] ^ [ 367.644572] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.645670] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.646762] ================================================================== [ 367.647865] ================================================================== [ 367.648956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f61/0x5400 [kasan_test] [ 367.650171] Write of size 8 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 367.651935] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 367.653833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 367.654727] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 367.656087] Call Trace: [ 367.656863] [ 367.657612] dump_stack_lvl+0x53/0x70 [ 367.658491] print_address_description.constprop.0+0x2c/0x3a0 [ 367.659546] ? kasan_atomics_helper+0x1f61/0x5400 [kasan_test] [ 367.660623] print_report+0xb9/0x2b0 [ 367.661511] ? kasan_addr_to_slab+0xd/0xb0 [ 367.662440] ? kasan_atomics_helper+0x1f61/0x5400 [kasan_test] [ 367.663520] kasan_report+0xe8/0x120 [ 367.664408] ? kasan_atomics_helper+0x1f61/0x5400 [kasan_test] [ 367.665492] kasan_check_range+0x100/0x1b0 [ 367.666431] kasan_atomics_helper+0x1f61/0x5400 [kasan_test] [ 367.667511] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 367.668625] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 367.669644] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 367.670703] ? __schedule+0x7ec/0x1950 [ 367.671617] ? ktime_get_ts64+0x7f/0x230 [ 367.672540] kunit_try_run_case+0x1b0/0x490 [ 367.673477] ? __pfx_kunit_try_run_case+0x10/0x10 [ 367.674456] ? set_cpus_allowed_ptr+0x85/0xc0 [ 367.675398] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 367.676376] ? __pfx_kunit_try_run_case+0x10/0x10 [ 367.677335] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 367.678402] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 367.679414] kthread+0x2d8/0x3c0 [ 367.680241] ? __pfx_kthread+0x10/0x10 [ 367.681107] ret_from_fork+0x31/0x70 [ 367.681956] ? __pfx_kthread+0x10/0x10 [ 367.682810] ret_from_fork_asm+0x1a/0x30 [ 367.683684] [ 367.685067] Allocated by task 4680: [ 367.685879] kasan_save_stack+0x33/0x60 [ 367.686725] kasan_save_track+0x14/0x30 [ 367.687560] __kasan_kmalloc+0xaa/0xb0 [ 367.688392] kasan_atomics+0x96/0x2d0 [kasan_test] [ 367.689309] kunit_try_run_case+0x1b0/0x490 [ 367.690161] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 367.691105] kthread+0x2d8/0x3c0 [ 367.691862] ret_from_fork+0x31/0x70 [ 367.692629] ret_from_fork_asm+0x1a/0x30 [ 367.693993] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 367.695896] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 367.698452] The buggy address belongs to the physical page: [ 367.699376] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 367.700511] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 367.701531] page_type: 0xfdffffff(slab) [ 367.702330] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 367.703458] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 367.704582] page dumped because: kasan: bad access detected [ 367.706144] Memory state around the buggy address: [ 367.707027] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.708117] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.709199] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 367.710282] ^ [ 367.711173] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.712274] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.713369] ================================================================== [ 367.714473] ================================================================== [ 367.715567] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f6b/0x5400 [kasan_test] [ 367.716783] Read of size 8 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 367.718543] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 367.720443] Tainted: [B]=BAD_PAGE, [N]=TEST [ 367.721338] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 367.722698] Call Trace: [ 367.723476] [ 367.724225] dump_stack_lvl+0x53/0x70 [ 367.725106] print_address_description.constprop.0+0x2c/0x3a0 [ 367.726162] ? kasan_atomics_helper+0x4f6b/0x5400 [kasan_test] [ 367.727240] print_report+0xb9/0x2b0 [ 367.728129] ? kasan_addr_to_slab+0xd/0xb0 [ 367.729060] ? kasan_atomics_helper+0x4f6b/0x5400 [kasan_test] [ 367.730140] kasan_report+0xe8/0x120 [ 367.731030] ? kasan_atomics_helper+0x4f6b/0x5400 [kasan_test] [ 367.732112] kasan_atomics_helper+0x4f6b/0x5400 [kasan_test] [ 367.733187] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 367.734298] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 367.735321] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 367.736381] ? __schedule+0x7ec/0x1950 [ 367.737298] ? ktime_get_ts64+0x7f/0x230 [ 367.738223] kunit_try_run_case+0x1b0/0x490 [ 367.739165] ? __pfx_kunit_try_run_case+0x10/0x10 [ 367.740144] ? set_cpus_allowed_ptr+0x85/0xc0 [ 367.741092] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 367.742076] ? __pfx_kunit_try_run_case+0x10/0x10 [ 367.743037] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 367.744108] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 367.745118] kthread+0x2d8/0x3c0 [ 367.745951] ? __pfx_kthread+0x10/0x10 [ 367.746816] ret_from_fork+0x31/0x70 [ 367.747662] ? __pfx_kthread+0x10/0x10 [ 367.748520] ret_from_fork_asm+0x1a/0x30 [ 367.749385] [ 367.750770] Allocated by task 4680: [ 367.751587] kasan_save_stack+0x33/0x60 [ 367.752425] kasan_save_track+0x14/0x30 [ 367.753263] __kasan_kmalloc+0xaa/0xb0 [ 367.754086] kasan_atomics+0x96/0x2d0 [kasan_test] [ 367.755008] kunit_try_run_case+0x1b0/0x490 [ 367.755866] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 367.756816] kthread+0x2d8/0x3c0 [ 367.757581] ret_from_fork+0x31/0x70 [ 367.758361] ret_from_fork_asm+0x1a/0x30 [ 367.759734] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 367.761639] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 367.764190] The buggy address belongs to the physical page: [ 367.765114] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 367.766244] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 367.767262] page_type: 0xfdffffff(slab) [ 367.768061] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 367.769188] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 367.770313] page dumped because: kasan: bad access detected [ 367.771873] Memory state around the buggy address: [ 367.772755] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.773843] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.774925] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 367.776008] ^ [ 367.776898] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.777997] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.779088] ================================================================== [ 367.780191] ================================================================== [ 367.781283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2022/0x5400 [kasan_test] [ 367.782498] Write of size 8 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 367.784262] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 367.786162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 367.787056] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 367.788416] Call Trace: [ 367.789192] [ 367.789941] dump_stack_lvl+0x53/0x70 [ 367.790821] print_address_description.constprop.0+0x2c/0x3a0 [ 367.791878] ? kasan_atomics_helper+0x2022/0x5400 [kasan_test] [ 367.792955] print_report+0xb9/0x2b0 [ 367.793844] ? kasan_addr_to_slab+0xd/0xb0 [ 367.794774] ? kasan_atomics_helper+0x2022/0x5400 [kasan_test] [ 367.795854] kasan_report+0xe8/0x120 [ 367.796743] ? kasan_atomics_helper+0x2022/0x5400 [kasan_test] [ 367.797827] kasan_check_range+0x100/0x1b0 [ 367.798766] kasan_atomics_helper+0x2022/0x5400 [kasan_test] [ 367.799846] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 367.800959] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 367.801978] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 367.803038] ? __schedule+0x7ec/0x1950 [ 367.803951] ? ktime_get_ts64+0x7f/0x230 [ 367.804873] kunit_try_run_case+0x1b0/0x490 [ 367.805811] ? __pfx_kunit_try_run_case+0x10/0x10 [ 367.806790] ? set_cpus_allowed_ptr+0x85/0xc0 [ 367.807731] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 367.808708] ? __pfx_kunit_try_run_case+0x10/0x10 [ 367.809664] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 367.810729] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 367.811740] kthread+0x2d8/0x3c0 [ 367.812565] ? __pfx_kthread+0x10/0x10 [ 367.813428] ret_from_fork+0x31/0x70 [ 367.814276] ? __pfx_kthread+0x10/0x10 [ 367.815129] ret_from_fork_asm+0x1a/0x30 [ 367.816002] [ 367.817384] Allocated by task 4680: [ 367.818194] kasan_save_stack+0x33/0x60 [ 367.819038] kasan_save_track+0x14/0x30 [ 367.819873] __kasan_kmalloc+0xaa/0xb0 [ 367.820704] kasan_atomics+0x96/0x2d0 [kasan_test] [ 367.821620] kunit_try_run_case+0x1b0/0x490 [ 367.822470] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 367.823414] kthread+0x2d8/0x3c0 [ 367.824169] ret_from_fork+0x31/0x70 [ 367.824934] ret_from_fork_asm+0x1a/0x30 [ 367.826295] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 367.828196] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 367.830748] The buggy address belongs to the physical page: [ 367.831671] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 367.832804] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 367.833822] page_type: 0xfdffffff(slab) [ 367.834620] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 367.835746] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 367.836870] page dumped because: kasan: bad access detected [ 367.838430] Memory state around the buggy address: [ 367.839312] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.840400] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.841482] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 367.842566] ^ [ 367.843458] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.844557] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.845651] ================================================================== [ 367.846754] ================================================================== [ 367.847849] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f85/0x5400 [kasan_test] [ 367.849065] Read of size 8 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 367.850825] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 367.852726] Tainted: [B]=BAD_PAGE, [N]=TEST [ 367.853622] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 367.854983] Call Trace: [ 367.855761] [ 367.856512] dump_stack_lvl+0x53/0x70 [ 367.857392] print_address_description.constprop.0+0x2c/0x3a0 [ 367.858451] ? kasan_atomics_helper+0x4f85/0x5400 [kasan_test] [ 367.859529] print_report+0xb9/0x2b0 [ 367.860419] ? kasan_addr_to_slab+0xd/0xb0 [ 367.861352] ? kasan_atomics_helper+0x4f85/0x5400 [kasan_test] [ 367.862433] kasan_report+0xe8/0x120 [ 367.863323] ? kasan_atomics_helper+0x4f85/0x5400 [kasan_test] [ 367.864408] kasan_atomics_helper+0x4f85/0x5400 [kasan_test] [ 367.865484] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 367.866596] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 367.867619] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 367.868682] ? __schedule+0x7ec/0x1950 [ 367.869599] ? ktime_get_ts64+0x7f/0x230 [ 367.870526] kunit_try_run_case+0x1b0/0x490 [ 367.871469] ? __pfx_kunit_try_run_case+0x10/0x10 [ 367.872450] ? set_cpus_allowed_ptr+0x85/0xc0 [ 367.873400] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 367.874385] ? __pfx_kunit_try_run_case+0x10/0x10 [ 367.875347] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 367.876420] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 367.877432] kthread+0x2d8/0x3c0 [ 367.878266] ? __pfx_kthread+0x10/0x10 [ 367.879133] ret_from_fork+0x31/0x70 [ 367.879981] ? __pfx_kthread+0x10/0x10 [ 367.880841] ret_from_fork_asm+0x1a/0x30 [ 367.881707] [ 367.883095] Allocated by task 4680: [ 367.883912] kasan_save_stack+0x33/0x60 [ 367.884749] kasan_save_track+0x14/0x30 [ 367.885588] __kasan_kmalloc+0xaa/0xb0 [ 367.886412] kasan_atomics+0x96/0x2d0 [kasan_test] [ 367.887335] kunit_try_run_case+0x1b0/0x490 [ 367.888193] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 367.889143] kthread+0x2d8/0x3c0 [ 367.889908] ret_from_fork+0x31/0x70 [ 367.890688] ret_from_fork_asm+0x1a/0x30 [ 367.892061] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 367.893966] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 367.896517] The buggy address belongs to the physical page: [ 367.897440] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 367.898572] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 367.899589] page_type: 0xfdffffff(slab) [ 367.900389] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 367.901516] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 367.902641] page dumped because: kasan: bad access detected [ 367.904200] Memory state around the buggy address: [ 367.905081] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.906169] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.907249] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 367.908330] ^ [ 367.909220] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.910317] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.911409] ================================================================== [ 367.912511] ================================================================== [ 367.913602] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20e3/0x5400 [kasan_test] [ 367.914815] Write of size 8 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 367.916578] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 367.918475] Tainted: [B]=BAD_PAGE, [N]=TEST [ 367.919368] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 367.920727] Call Trace: [ 367.921503] [ 367.922251] dump_stack_lvl+0x53/0x70 [ 367.923131] print_address_description.constprop.0+0x2c/0x3a0 [ 367.924186] ? kasan_atomics_helper+0x20e3/0x5400 [kasan_test] [ 367.925261] print_report+0xb9/0x2b0 [ 367.926149] ? kasan_addr_to_slab+0xd/0xb0 [ 367.927078] ? kasan_atomics_helper+0x20e3/0x5400 [kasan_test] [ 367.928157] kasan_report+0xe8/0x120 [ 367.929045] ? kasan_atomics_helper+0x20e3/0x5400 [kasan_test] [ 367.930128] kasan_check_range+0x100/0x1b0 [ 367.931068] kasan_atomics_helper+0x20e3/0x5400 [kasan_test] [ 367.932147] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 367.933261] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 367.934278] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 367.935336] ? __schedule+0x7ec/0x1950 [ 367.936250] ? ktime_get_ts64+0x7f/0x230 [ 367.937171] kunit_try_run_case+0x1b0/0x490 [ 367.938108] ? __pfx_kunit_try_run_case+0x10/0x10 [ 367.939086] ? set_cpus_allowed_ptr+0x85/0xc0 [ 367.940027] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 367.941004] ? __pfx_kunit_try_run_case+0x10/0x10 [ 367.941962] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 367.943027] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 367.944037] kthread+0x2d8/0x3c0 [ 367.944863] ? __pfx_kthread+0x10/0x10 [ 367.945726] ret_from_fork+0x31/0x70 [ 367.946572] ? __pfx_kthread+0x10/0x10 [ 367.947424] ret_from_fork_asm+0x1a/0x30 [ 367.948297] [ 367.949676] Allocated by task 4680: [ 367.950486] kasan_save_stack+0x33/0x60 [ 367.951331] kasan_save_track+0x14/0x30 [ 367.952165] __kasan_kmalloc+0xaa/0xb0 [ 367.952997] kasan_atomics+0x96/0x2d0 [kasan_test] [ 367.953911] kunit_try_run_case+0x1b0/0x490 [ 367.954762] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 367.955706] kthread+0x2d8/0x3c0 [ 367.956462] ret_from_fork+0x31/0x70 [ 367.957229] ret_from_fork_asm+0x1a/0x30 [ 367.958590] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 367.960490] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 367.963041] The buggy address belongs to the physical page: [ 367.963964] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 367.965097] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 367.966114] page_type: 0xfdffffff(slab) [ 367.966911] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 367.968036] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 367.969157] page dumped because: kasan: bad access detected [ 367.970715] Memory state around the buggy address: [ 367.971595] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.972682] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.973761] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 367.974842] ^ [ 367.975731] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.976829] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 367.977920] ================================================================== [ 367.979021] ================================================================== [ 367.980113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f78/0x5400 [kasan_test] [ 367.981326] Read of size 8 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 367.983080] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 367.984978] Tainted: [B]=BAD_PAGE, [N]=TEST [ 367.985871] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 367.987231] Call Trace: [ 367.988007] [ 367.988755] dump_stack_lvl+0x53/0x70 [ 367.989634] print_address_description.constprop.0+0x2c/0x3a0 [ 367.990688] ? kasan_atomics_helper+0x4f78/0x5400 [kasan_test] [ 367.991764] print_report+0xb9/0x2b0 [ 367.992651] ? kasan_addr_to_slab+0xd/0xb0 [ 367.993581] ? kasan_atomics_helper+0x4f78/0x5400 [kasan_test] [ 367.994660] kasan_report+0xe8/0x120 [ 367.995548] ? kasan_atomics_helper+0x4f78/0x5400 [kasan_test] [ 367.996630] kasan_atomics_helper+0x4f78/0x5400 [kasan_test] [ 367.997704] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 367.998814] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 367.999834] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 368.000894] ? __schedule+0x7ec/0x1950 [ 368.001809] ? ktime_get_ts64+0x7f/0x230 [ 368.002734] kunit_try_run_case+0x1b0/0x490 [ 368.003675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 368.004655] ? set_cpus_allowed_ptr+0x85/0xc0 [ 368.005602] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 368.006584] ? __pfx_kunit_try_run_case+0x10/0x10 [ 368.007545] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 368.008617] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 368.009627] kthread+0x2d8/0x3c0 [ 368.010459] ? __pfx_kthread+0x10/0x10 [ 368.011324] ret_from_fork+0x31/0x70 [ 368.012171] ? __pfx_kthread+0x10/0x10 [ 368.013030] ret_from_fork_asm+0x1a/0x30 [ 368.013895] [ 368.015281] Allocated by task 4680: [ 368.016098] kasan_save_stack+0x33/0x60 [ 368.016936] kasan_save_track+0x14/0x30 [ 368.017774] __kasan_kmalloc+0xaa/0xb0 [ 368.018598] kasan_atomics+0x96/0x2d0 [kasan_test] [ 368.019521] kunit_try_run_case+0x1b0/0x490 [ 368.020379] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 368.021329] kthread+0x2d8/0x3c0 [ 368.022094] ret_from_fork+0x31/0x70 [ 368.022874] ret_from_fork_asm+0x1a/0x30 [ 368.024247] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 368.026151] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 368.028702] The buggy address belongs to the physical page: [ 368.029625] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 368.030755] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 368.031772] page_type: 0xfdffffff(slab) [ 368.032571] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 368.033698] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 368.034823] page dumped because: kasan: bad access detected [ 368.036381] Memory state around the buggy address: [ 368.037262] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 368.038350] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 368.039430] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 368.040510] ^ [ 368.041399] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 368.042497] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 368.043589] ================================================================== [ 368.044690] ================================================================== [ 368.045782] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x21a4/0x5400 [kasan_test] [ 368.046995] Write of size 8 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 368.048759] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 368.050656] Tainted: [B]=BAD_PAGE, [N]=TEST [ 368.051549] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 368.052908] Call Trace: [ 368.053684] [ 368.054432] dump_stack_lvl+0x53/0x70 [ 368.055311] print_address_description.constprop.0+0x2c/0x3a0 [ 368.056367] ? kasan_atomics_helper+0x21a4/0x5400 [kasan_test] [ 368.057444] print_report+0xb9/0x2b0 [ 368.058332] ? kasan_addr_to_slab+0xd/0xb0 [ 368.059262] ? kasan_atomics_helper+0x21a4/0x5400 [kasan_test] [ 368.060341] kasan_report+0xe8/0x120 [ 368.061229] ? kasan_atomics_helper+0x21a4/0x5400 [kasan_test] [ 368.062311] kasan_check_range+0x100/0x1b0 [ 368.063251] kasan_atomics_helper+0x21a4/0x5400 [kasan_test] [ 368.064330] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 368.065443] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 368.066461] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 368.067519] ? __schedule+0x7ec/0x1950 [ 368.068432] ? ktime_get_ts64+0x7f/0x230 [ 368.069354] kunit_try_run_case+0x1b0/0x490 [ 368.070290] ? __pfx_kunit_try_run_case+0x10/0x10 [ 368.071269] ? set_cpus_allowed_ptr+0x85/0xc0 [ 368.072211] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 368.073188] ? __pfx_kunit_try_run_case+0x10/0x10 [ 368.074145] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 368.075211] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 368.076222] kthread+0x2d8/0x3c0 [ 368.077047] ? __pfx_kthread+0x10/0x10 [ 368.077912] ret_from_fork+0x31/0x70 [ 368.078759] ? __pfx_kthread+0x10/0x10 [ 368.079611] ret_from_fork_asm+0x1a/0x30 [ 368.080483] [ 368.081865] Allocated by task 4680: [ 368.082676] kasan_save_stack+0x33/0x60 [ 368.083521] kasan_save_track+0x14/0x30 [ 368.084355] __kasan_kmalloc+0xaa/0xb0 [ 368.085187] kasan_atomics+0x96/0x2d0 [kasan_test] [ 368.086104] kunit_try_run_case+0x1b0/0x490 [ 368.086955] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 368.087900] kthread+0x2d8/0x3c0 [ 368.088657] ret_from_fork+0x31/0x70 [ 368.089424] ret_from_fork_asm+0x1a/0x30 [ 368.090787] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 368.092692] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 368.095246] The buggy address belongs to the physical page: [ 368.096169] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 368.097302] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 368.098321] page_type: 0xfdffffff(slab) [ 368.099119] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 368.100245] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 368.101369] page dumped because: kasan: bad access detected [ 368.102932] Memory state around the buggy address: [ 368.103815] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 368.104905] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 368.105987] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 368.107070] ^ [ 368.107962] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 368.109061] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 368.110154] ================================================================== [ 368.111260] ================================================================== [ 368.112353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50e4/0x5400 [kasan_test] [ 368.113568] Read of size 8 at addr ffff8882a62a9430 by task kunit_try_catch/4680 [ 368.115327] CPU: 2 UID: 0 PID: 4680 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 368.117226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 368.118119] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 368.119478] Call Trace: [ 368.120255] [ 368.121004] dump_stack_lvl+0x53/0x70 [ 368.121885] print_address_description.constprop.0+0x2c/0x3a0 [ 368.122942] ? kasan_atomics_helper+0x50e4/0x5400 [kasan_test] [ 368.124020] print_report+0xb9/0x2b0 [ 368.124909] ? kasan_addr_to_slab+0xd/0xb0 [ 368.125840] ? kasan_atomics_helper+0x50e4/0x5400 [kasan_test] [ 368.126920] kasan_report+0xe8/0x120 [ 368.127808] ? kasan_atomics_helper+0x50e4/0x5400 [kasan_test] [ 368.128891] kasan_atomics_helper+0x50e4/0x5400 [kasan_test] [ 368.129966] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 368.131076] kasan_atomics+0x1c7/0x2d0 [kasan_test] [ 368.132097] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 368.133158] ? __schedule+0x7ec/0x1950 [ 368.134074] ? ktime_get_ts64+0x7f/0x230 [ 368.134999] kunit_try_run_case+0x1b0/0x490 [ 368.135940] ? __pfx_kunit_try_run_case+0x10/0x10 [ 368.136920] ? set_cpus_allowed_ptr+0x85/0xc0 [ 368.137869] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 368.138853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 368.139813] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 368.140884] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 368.141895] kthread+0x2d8/0x3c0 [ 368.142727] ? __pfx_kthread+0x10/0x10 [ 368.143592] ret_from_fork+0x31/0x70 [ 368.144438] ? __pfx_kthread+0x10/0x10 [ 368.144797] /usr/bin/wget -q --timeout=3600 --tries=1 --local-encoding=UTF-8 http://10.239.97.5:80/~lkp/cgi-bin/lkp-jobfile-append-var?job_file=/lkp/jobs/scheduled/lkp-csl-d02/kunit-group-00-debian-12-x86_64-20240206.cgz-2377a7d90f5b-20240823-137313-1l6zztg-3.yaml&job_state=running -O /dev/null [ 368.144809] ret_from_fork_asm+0x1a/0x30 [ 368.144813] [ 368.147473] Allocated by task 4680: [ 368.147475] kasan_save_stack+0x33/0x60 [ 368.147477] kasan_save_track+0x14/0x30 [ 368.147480] __kasan_kmalloc+0xaa/0xb0 [ 368.147482] kasan_atomics+0x96/0x2d0 [kasan_test] [ 368.148275] target ucode: 0x5003604 [ 368.149706] kunit_try_run_case+0x1b0/0x490 [ 368.149709] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 368.149711] kthread+0x2d8/0x3c0 [ 368.149712] ret_from_fork+0x31/0x70 [ 368.149714] ret_from_fork_asm+0x1a/0x30 [ 368.149717] The buggy address belongs to the object at ffff8882a62a9400 which belongs to the cache kmalloc-64 of size 64 [ 368.150107] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff8882a62a9400, ffff8882a62a9430) [ 368.151567] LKP: stdout: 3990: current_version: 5003604, target_version: 5003604 [ 368.151737] The buggy address belongs to the physical page: [ 368.151738] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a62a9 [ 368.151740] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 368.151742] page_type: 0xfdffffff(slab) [ 368.152563] raw: 0017ffffc0000000 ffff88810004c8c0 dead000000000122 0000000000000000 [ 368.153137] check_nr_cpu [ 368.153338] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 368.154166] page dumped because: kasan: bad access detected [ 368.155144] CPU(s): 36 [ 368.155425] Memory state around the buggy address: [ 368.156735] ffff8882a62a9300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 368.156737] ffff8882a62a9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 368.156739] >ffff8882a62a9400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 368.156740] ^ [ 368.156741] ffff8882a62a9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 368.157608] On-line CPU(s) list: 0-35 [ 368.158098] ffff8882a62a9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 368.158100] ================================================================== [ 368.158109] # kasan_atomics: Test should be marked slow (runtime: 4.355238493s) [ 368.159149] ok 63 kasan_atomics [ 368.160778] Model name: Intel(R) Core(TM) i9-10980XE CPU @ 3.00GHz [ 368.161461] ok 64 vmalloc_helpers_tags # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 368.162033] ================================================================== [ 368.164067] BIOS Model name: Intel(R) Core(TM) i9-10980XE CPU @ 3.00GHz CPU @ 3.0GHz [ 368.164558] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x63b/0x6e0 [kasan_test] [ 368.165261] Read of size 1 at addr ffffc900001eb7f3 by task kunit_try_catch/4699 [ 368.166351] Thread(s) per core: 2 [ 368.167062] CPU: 22 UID: 0 PID: 4699 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 368.168343] Core(s) per socket: 18 [ 368.168357] Tainted: [B]=BAD_PAGE, [N]=TEST [ 368.169455] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 368.170702] Socket(s): 1 [ 368.171073] Call Trace: [ 368.171075] [ 368.171076] dump_stack_lvl+0x53/0x70 [ 368.171081] print_address_description.constprop.0+0x2c/0x3a0 [ 368.172376] ? vmalloc_oob+0x63b/0x6e0 [kasan_test] [ 368.173705] CPU(s) scaling MHz: 44% [ 368.173726] print_report+0xb9/0x2b0 [ 368.174819] ? kasan_addr_to_slab+0xd/0xb0 [ 368.174823] ? vmalloc_oob+0x63b/0x6e0 [kasan_test] [ 368.176128] NUMA node(s): 1 [ 368.176187] kasan_report+0xe8/0x120 [ 368.177677] ? vmalloc_oob+0x63b/0x6e0 [kasan_test] [ 368.179024] NUMA node0 CPU(s): 0-35 [ 368.179678] vmalloc_oob+0x63b/0x6e0 [kasan_test] [ 368.180326] ? __pfx_vmalloc_oob+0x10/0x10 [kasan_test] [ 368.181230] 2024-08-23 05:14:43 modprobe -v bitfield_kunit [ 368.181459] ? __schedule+0x7ec/0x1950 [ 368.182329] ? ktime_get_ts64+0x7f/0x230 [ 368.183821] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/lib/bitfield_kunit.ko [ 368.184272] kunit_try_run_case+0x1b0/0x490 [ 368.184774] ? __pfx_kunit_try_run_case+0x10/0x10 [ 368.184777] ? set_cpus_allowed_ptr+0x85/0xc0 [ 368.184781] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 368.185767] 2024-08-23 05:14:43 rmmod bitfield_kunit [ 368.186115] ? __pfx_kunit_try_run_case+0x10/0x10 [ 368.186762] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 368.186765] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 368.186768] kthread+0x2d8/0x3c0 [ 368.186771] ? __pfx_kthread+0x10/0x10 [ 368.187876] 2024-08-23 05:14:43 modprobe -v test_bits [ 368.188031] ret_from_fork+0x31/0x70 [ 368.188616] ? __pfx_kthread+0x10/0x10 [ 368.190251] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/lib/test_bits.ko [ 368.190321] ret_from_fork_asm+0x1a/0x30 [ 368.190970] [ 368.190972] The buggy address belongs to the virtual mapping at [ffffc900001eb000, ffffc900001ed000) created by: vmalloc_oob+0x7f/0x6e0 [kasan_test] [ 368.191995] 2024-08-23 05:14:43 rmmod test_bits [ 368.192332] The buggy address belongs to the physical page: [ 368.193006] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x178b05 [ 368.193009] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 368.194224] 2024-08-23 05:14:43 modprobe -v cmdline_kunit [ 368.194311] raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 368.194881] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 368.194883] page dumped because: kasan: bad access detected [ 368.194884] Memory state around the buggy address: [ 368.194886] ffffc900001eb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 368.194888] ffffc900001eb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 368.196869] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/lib/cmdline_kunit.ko [ 368.196902] >ffffc900001eb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 368.197534] ^ [ 368.198557] 2024-08-23 05:14:43 rmmod cmdline_kunit [ 368.198843] ffffc900001eb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 368.198845] ffffc900001eb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 368.198847] ================================================================== [ 368.198861] ================================================================== [ 368.199763] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x624/0x6e0 [kasan_test] [ 368.200682] 2024-08-23 05:14:43 modprobe -v ext4-inode-test [ 368.201402] Read of size 1 at addr ffffc900001eb7f8 by task kunit_try_catch/4699 [ 368.201406] CPU: 22 UID: 0 PID: 4699 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 368.202237] Tainted: [B]=BAD_PAGE, [N]=TEST [ 368.203941] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/fs/ext4/ext4-inode-test.ko [ 368.204329] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 368.204886] Call Trace: [ 368.204887] [ 368.204889] dump_stack_lvl+0x53/0x70 [ 368.204892] print_address_description.constprop.0+0x2c/0x3a0 [ 368.206237] 2024-08-23 05:14:43 rmmod ext4-inode-test [ 368.206436] ? vmalloc_oob+0x624/0x6e0 [kasan_test] [ 368.206867] print_report+0xb9/0x2b0 [ 368.206870] ? kasan_addr_to_slab+0xd/0xb0 [ 368.206873] ? vmalloc_oob+0x624/0x6e0 [kasan_test] [ 368.207711] 2024-08-23 05:14:43 modprobe -v test_hash [ 368.208545] kasan_report+0xe8/0x120 [ 368.208548] ? vmalloc_oob+0x624/0x6e0 [kasan_test] [ 368.209170] vmalloc_oob+0x624/0x6e0 [kasan_test] [ 368.210835] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/lib/test_hash.ko [ 368.211043] ? __pfx_vmalloc_oob+0x10/0x10 [kasan_test] [ 368.212136] ? __schedule+0x7ec/0x1950 [ 368.212139] ? ktime_get_ts64+0x7f/0x230 [ 368.212141] kunit_try_run_case+0x1b0/0x490 [ 368.213380] 2024-08-23 05:14:43 rmmod test_hash [ 368.213483] ? __pfx_kunit_try_run_case+0x10/0x10 [ 368.214687] ? set_cpus_allowed_ptr+0x85/0xc0 [ 368.215642] 2024-08-23 05:14:43 modprobe -v test_linear_ranges [ 368.215787] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 368.215791] ? __pfx_kunit_try_run_case+0x10/0x10 [ 368.215793] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 368.217088] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 368.217090] kthread+0x2d8/0x3c0 [ 368.217093] ? __pfx_kthread+0x10/0x10 [ 368.219086] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/lib/linear_ranges.ko [ 368.219123] ret_from_fork+0x31/0x70 [ 368.220203] ? __pfx_kthread+0x10/0x10 [ 368.222164] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/lib/test_linear_ranges.ko [ 368.222624] ret_from_fork_asm+0x1a/0x30 [ 368.223461] [ 368.224859] 2024-08-23 05:14:43 rmmod test_linear_ranges [ 368.225149] The buggy address belongs to the virtual mapping at [ffffc900001eb000, ffffc900001ed000) created by: vmalloc_oob+0x7f/0x6e0 [kasan_test] [ 368.225997] The buggy address belongs to the physical page: [ 368.227590] 2024-08-23 05:14:43 modprobe -v list-test [ 368.227625] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x178b05 [ 368.228808] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 368.228812] raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 368.228814] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 368.230807] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/lib/list-test.ko [ 368.231100] page dumped because: kasan: bad access detected [ 368.231700] Memory state around the buggy address: [ 368.232784] 2024-08-23 05:14:43 rmmod list-test [ 368.233205] ffffc900001eb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 368.233852] ffffc900001eb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 368.233854] >ffffc900001eb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 368.233856] ^ [ 368.233857] ffffc900001eb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 368.234889] 2024-08-23 05:14:43 modprobe -v memcpy_kunit [ 368.235099] ffffc900001eb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 368.236032] ================================================================== [ 368.236208] ok 65 vmalloc_oob [ 368.237637] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/lib/memcpy_kunit.ko [ 368.238210] ok 66 vmap_tags # SKIP Test requires CONFIG_KASAN_SW_TAGS=y [ 368.239486] ok 67 vm_map_ram_tags # SKIP Test requires CONFIG_KASAN_SW_TAGS=y [ 368.240304] 2024-08-23 05:14:44 rmmod memcpy_kunit [ 368.240499] ok 68 vmalloc_percpu # SKIP Test requires CONFIG_KASAN_SW_TAGS=y [ 368.241261] ok 69 match_all_not_assigned # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 368.242355] 2024-08-23 05:14:44 modprobe -v dev_addr_lists_test [ 368.242665] ok 70 match_all_ptr_tag # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 368.243322] ok 71 match_all_mem_tag # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 368.245151] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/net/core/dev_addr_lists_test.ko [ 368.377101] 2024-08-23 05:14:45 rmmod dev_addr_lists_test [ 368.379972] 2024-08-23 05:14:45 modprobe -v resource_kunit [ 368.383479] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/kernel/resource_kunit.ko [ 368.386483] 2024-08-23 05:14:45 rmmod resource_kunit [ 368.389205] 2024-08-23 05:14:45 modprobe -v lib_test [ 368.391732] # kasan: pass:47 fail:0 skip:24 total:71 [ 368.391741] # Totals: pass:47 fail:0 skip:24 total:71 [ 368.392643] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/drivers/rtc/lib_test.ko [ 368.392939] ok 1 kasan [ 368.398343] 2024-08-23 05:14:46 rmmod lib_test [ 368.401410] 2024-08-23 05:14:46 modprobe -v sysctl-test [ 368.404646] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/kernel/sysctl-test.ko [ 368.407420] 2024-08-23 05:14:46 rmmod sysctl-test [ 368.410043] 2024-08-23 05:14:46 modprobe -v time_test [ 368.412997] IPMI BMC is not supported on this machine, skip bmc-watchdog setup! [ 368.416346] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/kernel/time/time_test.ko [ 368.419081] 2024-08-23 05:14:47 rmmod time_test [ 368.421611] 2024-08-23 05:14:47 modprobe -v test_list_sort [ 368.424700] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/lib/test_list_sort.ko [ 368.427438] 2024-08-23 05:14:47 rmmod test_list_sort [ 368.429882] 2024-08-23 05:14:47 modprobe -v test_sort [ 368.432806] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/lib/test_sort.ko [ 368.435351] 2024-08-23 05:14:47 rmmod test_sort [ 368.437699] 2024-08-23 05:14:47 modprobe -v kasan_test [ 368.440763] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/mm/kasan/kasan_test.ko [ 368.443380] 2024-08-23 05:15:01 rmmod kasan_test [ 368.458253] 2024-08-23 05:15:01 modprobe -v kfence_test [ 368.463885] KTAP version 1 [ 368.464772] 1..1 [ 368.465765] KTAP version 1 [ 368.466650] # Subtest: kfence [ 368.467492] 1..25 [ 368.468345] # test_out_of_bounds_read: test_alloc: size=32, gfp=cc0, policy=left, cache=0 [ 368.668745] ================================================================== [ 368.669920] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x127/0x4e0 [kfence_test] [ 368.671882] Out-of-bounds read at 0x00000000e3ffb4f8 (1B left of kfence-#41): [ 368.673044] test_out_of_bounds_read+0x127/0x4e0 [kfence_test] [ 368.674120] kunit_try_run_case+0x1b0/0x490 [ 368.675050] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 368.676063] kthread+0x2d8/0x3c0 [ 368.676875] ret_from_fork+0x31/0x70 [ 368.677711] ret_from_fork_asm+0x1a/0x30 [ 368.679257] kfence-#41: 0x000000009fae0fab-0x00000000054ec1fd, size=32, cache=kmalloc-32 [ 368.681097] allocated by task 4719 on cpu 6 at 368.668741s: [ 368.682082] test_alloc+0x35f/0x1150 [kfence_test] [ 368.683004] test_out_of_bounds_read+0xee/0x4e0 [kfence_test] [ 368.684032] kunit_try_run_case+0x1b0/0x490 [ 368.684925] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 368.685906] kthread+0x2d8/0x3c0 [ 368.686693] ret_from_fork+0x31/0x70 [ 368.687498] ret_from_fork_asm+0x1a/0x30 [ 368.688978] CPU: 6 UID: 0 PID: 4719 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 368.690855] Tainted: [B]=BAD_PAGE, [N]=TEST [ 368.691721] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 368.693043] ================================================================== [ 368.694221] # test_out_of_bounds_read: test_alloc: size=32, gfp=cc0, policy=right, cache=0 [ 368.772744] ================================================================== [ 368.773896] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x217/0x4e0 [kfence_test] [ 368.775853] Out-of-bounds read at 0x0000000016b95861 (32B right of kfence-#43): [ 368.777016] test_out_of_bounds_read+0x217/0x4e0 [kfence_test] [ 368.778065] kunit_try_run_case+0x1b0/0x490 [ 368.778982] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 368.779994] kthread+0x2d8/0x3c0 [ 368.780828] ret_from_fork+0x31/0x70 [ 368.781692] ret_from_fork_asm+0x1a/0x30 [ 368.783275] kfence-#43: 0x00000000cbe70c4a-0x00000000299263bc, size=32, cache=kmalloc-32 [ 368.785218] allocated by task 4719 on cpu 6 at 368.772740s: [ 368.786266] test_alloc+0x35f/0x1150 [kfence_test] [ 368.787242] test_out_of_bounds_read+0x1e3/0x4e0 [kfence_test] [ 368.788297] kunit_try_run_case+0x1b0/0x490 [ 368.789210] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 368.790216] kthread+0x2d8/0x3c0 [ 368.791040] ret_from_fork+0x31/0x70 [ 368.791889] ret_from_fork_asm+0x1a/0x30 [ 368.793428] CPU: 6 UID: 0 PID: 4719 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 368.795387] Tainted: [B]=BAD_PAGE, [N]=TEST [ 368.796311] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 368.797690] ================================================================== [ 368.799148] ok 1 test_out_of_bounds_read [ 368.799274] # test_out_of_bounds_read-memcache: setup_test_cache: size=32, ctor=0x0 [ 368.801696] # test_out_of_bounds_read-memcache: test_alloc: size=32, gfp=cc0, policy=left, cache=1 [ 368.980793] ================================================================== [ 368.981999] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x127/0x4e0 [kfence_test] [ 368.984068] Out-of-bounds read at 0x000000008cb16f99 (1B left of kfence-#55): [ 368.985286] test_out_of_bounds_read+0x127/0x4e0 [kfence_test] [ 368.986408] kunit_try_run_case+0x1b0/0x490 [ 368.987397] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 368.988473] kthread+0x2d8/0x3c0 [ 368.989359] ret_from_fork+0x31/0x70 [ 368.990269] ret_from_fork_asm+0x1a/0x30 [ 368.991901] kfence-#55: 0x00000000318914f4-0x0000000030481bcf, size=32, cache=test [ 368.993799] allocated by task 4724 on cpu 6 at 368.980789s: [ 368.994837] test_alloc+0x2a7/0x1150 [kfence_test] [ 368.995804] test_out_of_bounds_read+0xee/0x4e0 [kfence_test] [ 368.996845] kunit_try_run_case+0x1b0/0x490 [ 368.997752] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 368.998757] kthread+0x2d8/0x3c0 [ 368.999584] ret_from_fork+0x31/0x70 [ 369.000434] ret_from_fork_asm+0x1a/0x30 [ 369.001993] CPU: 6 UID: 0 PID: 4724 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 369.003964] Tainted: [B]=BAD_PAGE, [N]=TEST [ 369.004879] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 369.006255] ================================================================== [ 369.007456] # test_out_of_bounds_read-memcache: test_alloc: size=32, gfp=cc0, policy=right, cache=1 [ 369.188796] ================================================================== [ 369.189999] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x217/0x4e0 [kfence_test] [ 369.192063] Out-of-bounds read at 0x00000000b3393584 (32B right of kfence-#53): [ 369.193293] test_out_of_bounds_read+0x217/0x4e0 [kfence_test] [ 369.194414] kunit_try_run_case+0x1b0/0x490 [ 369.195402] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 369.196478] kthread+0x2d8/0x3c0 [ 369.197363] ret_from_fork+0x31/0x70 [ 369.198273] ret_from_fork_asm+0x1a/0x30 [ 369.199904] kfence-#53: 0x0000000010d4a46a-0x000000005db3d57e, size=32, cache=test [ 369.201806] allocated by task 4724 on cpu 6 at 369.188791s: [ 369.202854] test_alloc+0x2a7/0x1150 [kfence_test] [ 369.203828] test_out_of_bounds_read+0x1e3/0x4e0 [kfence_test] [ 369.204882] kunit_try_run_case+0x1b0/0x490 [ 369.205793] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 369.206798] kthread+0x2d8/0x3c0 [ 369.207619] ret_from_fork+0x31/0x70 [ 369.208465] ret_from_fork_asm+0x1a/0x30 [ 369.210001] CPU: 6 UID: 0 PID: 4724 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 369.211955] Tainted: [B]=BAD_PAGE, [N]=TEST [ 369.212878] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 369.214256] ================================================================== [ 369.606073] ok 2 test_out_of_bounds_read-memcache [ 369.606171] # test_out_of_bounds_write: test_alloc: size=32, gfp=cc0, policy=left, cache=0 [ 370.644748] ================================================================== [ 370.645961] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x10e/0x260 [kfence_test] [ 370.648048] Out-of-bounds write at 0x0000000048e0acb3 (1B left of kfence-#75): [ 370.649272] test_out_of_bounds_write+0x10e/0x260 [kfence_test] [ 370.650398] kunit_try_run_case+0x1b0/0x490 [ 370.651387] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 370.652514] kthread+0x2d8/0x3c0 [ 370.653468] ret_from_fork+0x31/0x70 [ 370.654418] ret_from_fork_asm+0x1a/0x30 [ 370.656148] kfence-#75: 0x00000000cda3f1fb-0x0000000001e123a7, size=32, cache=kmalloc-32 [ 370.658180] allocated by task 4726 on cpu 0 at 370.644742s: [ 370.659263] test_alloc+0x35f/0x1150 [kfence_test] [ 370.660273] test_out_of_bounds_write+0xd5/0x260 [kfence_test] [ 370.661362] kunit_try_run_case+0x1b0/0x490 [ 370.662308] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 370.663349] kthread+0x2d8/0x3c0 [ 370.664210] ret_from_fork+0x31/0x70 [ 370.665095] ret_from_fork_asm+0x1a/0x30 [ 370.666712] CPU: 0 UID: 0 PID: 4726 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 370.668759] Tainted: [B]=BAD_PAGE, [N]=TEST [ 370.669717] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 370.671134] ================================================================== [ 370.672510] ok 3 test_out_of_bounds_write [ 370.672651] # test_out_of_bounds_write-memcache: setup_test_cache: size=32, ctor=0x0 [ 370.675175] # test_out_of_bounds_write-memcache: test_alloc: size=32, gfp=cc0, policy=left, cache=1 [ 370.748745] ================================================================== [ 370.749957] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x10e/0x260 [kfence_test] [ 370.752055] Out-of-bounds write at 0x000000003ae42a49 (1B left of kfence-#72): [ 370.753291] test_out_of_bounds_write+0x10e/0x260 [kfence_test] [ 370.754429] kunit_try_run_case+0x1b0/0x490 [ 370.755414] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 370.756485] kthread+0x2d8/0x3c0 [ 370.757377] ret_from_fork+0x31/0x70 [ 370.758284] ret_from_fork_asm+0x1a/0x30 [ 370.759917] kfence-#72: 0x000000001c9f229b-0x00000000d7ea531f, size=32, cache=test [ 370.761818] allocated by task 4734 on cpu 6 at 370.748741s: [ 370.762858] test_alloc+0x2a7/0x1150 [kfence_test] [ 370.763826] test_out_of_bounds_write+0xd5/0x260 [kfence_test] [ 370.764876] kunit_try_run_case+0x1b0/0x490 [ 370.765785] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 370.766791] kthread+0x2d8/0x3c0 [ 370.767618] ret_from_fork+0x31/0x70 [ 370.768470] ret_from_fork_asm+0x1a/0x30 [ 370.770031] CPU: 6 UID: 0 PID: 4734 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 370.772006] Tainted: [B]=BAD_PAGE, [N]=TEST [ 370.772923] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 370.774301] ================================================================== [ 371.155192] ok 4 test_out_of_bounds_write-memcache [ 371.155368] # test_use_after_free_read: test_alloc: size=32, gfp=cc0, policy=any, cache=0 [ 371.164842] ================================================================== [ 371.166063] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x12a/0x270 [kfence_test] [ 371.168155] Use-after-free read at 0x000000006f2b177f (in kfence-#76): [ 371.169329] test_use_after_free_read+0x12a/0x270 [kfence_test] [ 371.170461] kunit_try_run_case+0x1b0/0x490 [ 371.171440] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 371.172506] kthread+0x2d8/0x3c0 [ 371.173391] ret_from_fork+0x31/0x70 [ 371.174292] ret_from_fork_asm+0x1a/0x30 [ 371.175912] kfence-#76: 0x000000006f2b177f-0x000000002d493d4a, size=32, cache=kmalloc-32 [ 371.177855] allocated by task 4736 on cpu 6 at 371.164836s: [ 371.178896] test_alloc+0x35f/0x1150 [kfence_test] [ 371.179866] test_use_after_free_read+0xdd/0x270 [kfence_test] [ 371.180915] kunit_try_run_case+0x1b0/0x490 [ 371.181823] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 371.182825] kthread+0x2d8/0x3c0 [ 371.183646] ret_from_fork+0x31/0x70 [ 371.184493] ret_from_fork_asm+0x1a/0x30 [ 371.186033] freed by task 4736 on cpu 6 at 371.164839s: [ 371.187019] test_use_after_free_read+0x1e9/0x270 [kfence_test] [ 371.188068] kunit_try_run_case+0x1b0/0x490 [ 371.188967] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 371.189963] kthread+0x2d8/0x3c0 [ 371.190777] ret_from_fork+0x31/0x70 [ 371.191616] ret_from_fork_asm+0x1a/0x30 [ 371.193133] CPU: 6 UID: 0 PID: 4736 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 371.195058] Tainted: [B]=BAD_PAGE, [N]=TEST [ 371.195964] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 371.197336] ================================================================== [ 371.198827] ok 5 test_use_after_free_read [ 371.198967] # test_use_after_free_read-memcache: setup_test_cache: size=32, ctor=0x0 [ 371.201387] # test_use_after_free_read-memcache: test_alloc: size=32, gfp=cc0, policy=any, cache=1 [ 371.268748] ================================================================== [ 371.269926] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x12a/0x270 [kfence_test] [ 371.271929] Use-after-free read at 0x000000003fa4d92d (in kfence-#79): [ 371.273040] test_use_after_free_read+0x12a/0x270 [kfence_test] [ 371.274100] kunit_try_run_case+0x1b0/0x490 [ 371.275008] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 371.276008] kthread+0x2d8/0x3c0 [ 371.276826] ret_from_fork+0x31/0x70 [ 371.277664] ret_from_fork_asm+0x1a/0x30 [ 371.279182] kfence-#79: 0x000000003fa4d92d-0x000000000dcb7a82, size=32, cache=test [ 371.280999] allocated by task 4738 on cpu 6 at 371.268742s: [ 371.282016] test_alloc+0x2a7/0x1150 [kfence_test] [ 371.282971] test_use_after_free_read+0xdd/0x270 [kfence_test] [ 371.284006] kunit_try_run_case+0x1b0/0x490 [ 371.284898] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 371.285889] kthread+0x2d8/0x3c0 [ 371.286700] ret_from_fork+0x31/0x70 [ 371.287534] ret_from_fork_asm+0x1a/0x30 [ 371.289045] freed by task 4738 on cpu 6 at 371.268744s: [ 371.290010] test_use_after_free_read+0xfc/0x270 [kfence_test] [ 371.291031] kunit_try_run_case+0x1b0/0x490 [ 371.291923] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 371.292915] kthread+0x2d8/0x3c0 [ 371.293728] ret_from_fork+0x31/0x70 [ 371.294563] ret_from_fork_asm+0x1a/0x30 [ 371.296075] CPU: 6 UID: 0 PID: 4738 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 371.297999] Tainted: [B]=BAD_PAGE, [N]=TEST [ 371.298908] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 371.300281] ================================================================== [ 371.695082] ok 6 test_use_after_free_read-memcache [ 371.695224] # test_double_free: test_alloc: size=32, gfp=cc0, policy=any, cache=0 [ 371.788757] ================================================================== [ 371.789934] BUG: KFENCE: invalid free in test_double_free+0x1d5/0x260 [kfence_test] [ 371.791813] Invalid free of 0x000000002028a952 (in kfence-#81): [ 371.792866] test_double_free+0x1d5/0x260 [kfence_test] [ 371.793865] kunit_try_run_case+0x1b0/0x490 [ 371.794768] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 371.795761] kthread+0x2d8/0x3c0 [ 371.796568] ret_from_fork+0x31/0x70 [ 371.797397] ret_from_fork_asm+0x1a/0x30 [ 371.798891] kfence-#81: 0x000000002028a952-0x00000000abe49bc3, size=32, cache=kmalloc-32 [ 371.800726] allocated by task 4747 on cpu 0 at 371.788746s: [ 371.801725] test_alloc+0x35f/0x1150 [kfence_test] [ 371.802668] test_double_free+0xdc/0x260 [kfence_test] [ 371.803640] kunit_try_run_case+0x1b0/0x490 [ 371.804526] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 371.805508] kthread+0x2d8/0x3c0 [ 371.806309] ret_from_fork+0x31/0x70 [ 371.807135] ret_from_fork_asm+0x1a/0x30 [ 371.808627] freed by task 4747 on cpu 0 at 371.788749s: [ 371.809582] test_double_free+0x1e2/0x260 [kfence_test] [ 371.810538] kunit_try_run_case+0x1b0/0x490 [ 371.811412] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 371.812389] kthread+0x2d8/0x3c0 [ 371.813190] ret_from_fork+0x31/0x70 [ 371.814014] ret_from_fork_asm+0x1a/0x30 [ 371.815502] CPU: 0 UID: 0 PID: 4747 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 371.817397] Tainted: [B]=BAD_PAGE, [N]=TEST [ 371.818288] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 371.819645] ================================================================== [ 371.821057] ok 7 test_double_free [ 371.821126] # test_double_free-memcache: setup_test_cache: size=32, ctor=0x0 [ 371.823375] # test_double_free-memcache: test_alloc: size=32, gfp=cc0, policy=any, cache=1 [ 371.892754] ================================================================== [ 371.893912] BUG: KFENCE: invalid free in test_double_free+0x113/0x260 [kfence_test] [ 371.895760] Invalid free of 0x000000000d9afe4c (in kfence-#84): [ 371.896799] test_double_free+0x113/0x260 [kfence_test] [ 371.897777] kunit_try_run_case+0x1b0/0x490 [ 371.898665] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 371.899645] kthread+0x2d8/0x3c0 [ 371.900446] ret_from_fork+0x31/0x70 [ 371.901270] ret_from_fork_asm+0x1a/0x30 [ 371.902760] kfence-#84: 0x000000000d9afe4c-0x0000000092baef55, size=32, cache=test [ 371.904548] allocated by task 4749 on cpu 0 at 371.892744s: [ 371.905548] test_alloc+0x2a7/0x1150 [kfence_test] [ 371.906489] test_double_free+0xdc/0x260 [kfence_test] [ 371.907450] kunit_try_run_case+0x1b0/0x490 [ 371.908327] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 371.909302] kthread+0x2d8/0x3c0 [ 371.910096] ret_from_fork+0x31/0x70 [ 371.910917] ret_from_fork_asm+0x1a/0x30 [ 371.912401] freed by task 4749 on cpu 0 at 371.892747s: [ 371.913351] test_double_free+0xfb/0x260 [kfence_test] [ 371.914298] kunit_try_run_case+0x1b0/0x490 [ 371.915171] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 371.916146] kthread+0x2d8/0x3c0 [ 371.916941] ret_from_fork+0x31/0x70 [ 371.917760] ret_from_fork_asm+0x1a/0x30 [ 371.919242] CPU: 0 UID: 0 PID: 4749 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 371.921136] Tainted: [B]=BAD_PAGE, [N]=TEST [ 371.922029] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 371.923386] ================================================================== [ 372.327145] ok 8 test_double_free-memcache [ 372.327292] # test_invalid_addr_free: test_alloc: size=32, gfp=cc0, policy=any, cache=0 [ 372.412757] ================================================================== [ 372.413918] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1e3/0x260 [kfence_test] [ 372.415814] Invalid free of 0x000000005158d7a5 (in kfence-#86): [ 372.416857] test_invalid_addr_free+0x1e3/0x260 [kfence_test] [ 372.417886] kunit_try_run_case+0x1b0/0x490 [ 372.418782] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 372.419768] kthread+0x2d8/0x3c0 [ 372.420574] ret_from_fork+0x31/0x70 [ 372.421402] ret_from_fork_asm+0x1a/0x30 [ 372.422896] kfence-#86: 0x00000000a85350f5-0x0000000035803923, size=32, cache=kmalloc-32 [ 372.424732] allocated by task 4751 on cpu 0 at 372.412747s: [ 372.425731] test_alloc+0x35f/0x1150 [kfence_test] [ 372.426673] test_invalid_addr_free+0xdc/0x260 [kfence_test] [ 372.427689] kunit_try_run_case+0x1b0/0x490 [ 372.428578] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 372.429562] kthread+0x2d8/0x3c0 [ 372.430366] ret_from_fork+0x31/0x70 [ 372.431195] ret_from_fork_asm+0x1a/0x30 [ 372.432699] CPU: 0 UID: 0 PID: 4751 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 372.434610] Tainted: [B]=BAD_PAGE, [N]=TEST [ 372.435508] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 372.436873] ================================================================== [ 372.438338] ok 9 test_invalid_addr_free [ 372.438433] # test_invalid_addr_free-memcache: setup_test_cache: size=32, ctor=0x0 [ 372.440844] # test_invalid_addr_free-memcache: test_alloc: size=32, gfp=cc0, policy=any, cache=1 [ 372.516754] ================================================================== [ 372.517956] BUG: KFENCE: invalid free in test_invalid_addr_free+0xfc/0x260 [kfence_test] [ 372.519957] Invalid free of 0x00000000a3f97c45 (in kfence-#90): [ 372.521069] test_invalid_addr_free+0xfc/0x260 [kfence_test] [ 372.522167] kunit_try_run_case+0x1b0/0x490 [ 372.523134] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 372.524187] kthread+0x2d8/0x3c0 [ 372.525061] ret_from_fork+0x31/0x70 [ 372.525950] ret_from_fork_asm+0x1a/0x30 [ 372.527545] kfence-#90: 0x0000000072c0af4b-0x00000000d6d900d7, size=32, cache=test [ 372.529410] allocated by task 4753 on cpu 0 at 372.516745s: [ 372.530433] test_alloc+0x2a7/0x1150 [kfence_test] [ 372.531387] test_invalid_addr_free+0xdc/0x260 [kfence_test] [ 372.532411] kunit_try_run_case+0x1b0/0x490 [ 372.533310] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 372.534307] kthread+0x2d8/0x3c0 [ 372.535125] ret_from_fork+0x31/0x70 [ 372.535968] ret_from_fork_asm+0x1a/0x30 [ 372.537510] CPU: 0 UID: 0 PID: 4753 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 372.539465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 372.540374] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 372.541742] ================================================================== [ 372.927478] ok 10 test_invalid_addr_free-memcache [ 372.927587] # test_corruption: test_alloc: size=32, gfp=cc0, policy=left, cache=0 [ 373.036754] ================================================================== [ 373.037954] BUG: KFENCE: memory corruption in test_corruption+0x2d4/0x3e0 [kfence_test] [ 373.039939] Corrupted memory at 0x00000000bc14a1c9 [ ! . . . . . . . . . . . . . . . ] (in kfence-#93): [ 373.041356] test_corruption+0x2d4/0x3e0 [kfence_test] [ 373.042423] kunit_try_run_case+0x1b0/0x490 [ 373.043402] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 373.044467] kthread+0x2d8/0x3c0 [ 373.045352] ret_from_fork+0x31/0x70 [ 373.046252] ret_from_fork_asm+0x1a/0x30 [ 373.047872] kfence-#93: 0x000000002e1ab239-0x000000004ea6f370, size=32, cache=kmalloc-32 [ 373.049813] allocated by task 4758 on cpu 0 at 373.036743s: [ 373.050852] test_alloc+0x35f/0x1150 [kfence_test] [ 373.051825] test_corruption+0xe7/0x3e0 [kfence_test] [ 373.052813] kunit_try_run_case+0x1b0/0x490 [ 373.053725] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 373.054736] kthread+0x2d8/0x3c0 [ 373.055566] ret_from_fork+0x31/0x70 [ 373.056421] ret_from_fork_asm+0x1a/0x30 [ 373.057976] freed by task 4758 on cpu 0 at 373.036746s: [ 373.058968] test_corruption+0x2d4/0x3e0 [kfence_test] [ 373.059958] kunit_try_run_case+0x1b0/0x490 [ 373.060862] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 373.061861] kthread+0x2d8/0x3c0 [ 373.062680] ret_from_fork+0x31/0x70 [ 373.063523] ret_from_fork_asm+0x1a/0x30 [ 373.065049] CPU: 0 UID: 0 PID: 4758 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 373.066983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 373.067893] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 373.069269] ================================================================== [ 373.070469] # test_corruption: test_alloc: size=32, gfp=cc0, policy=right, cache=0 [ 373.244752] ================================================================== [ 373.245934] BUG: KFENCE: memory corruption in test_corruption+0x2e1/0x3e0 [kfence_test] [ 373.247874] Corrupted memory at 0x00000000b010c363 [ ! ] (in kfence-#96): [ 373.249015] test_corruption+0x2e1/0x3e0 [kfence_test] [ 373.250016] kunit_try_run_case+0x1b0/0x490 [ 373.250932] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 373.251939] kthread+0x2d8/0x3c0 [ 373.252762] ret_from_fork+0x31/0x70 [ 373.253605] ret_from_fork_asm+0x1a/0x30 [ 373.255100] kfence-#96: 0x000000003bc3f3bf-0x000000004cc1fd73, size=32, cache=kmalloc-32 [ 373.256925] allocated by task 4758 on cpu 0 at 373.244742s: [ 373.257915] test_alloc+0x35f/0x1150 [kfence_test] [ 373.258848] test_corruption+0x1cc/0x3e0 [kfence_test] [ 373.259813] kunit_try_run_case+0x1b0/0x490 [ 373.260701] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 373.261683] kthread+0x2d8/0x3c0 [ 373.262481] ret_from_fork+0x31/0x70 [ 373.263301] ret_from_fork_asm+0x1a/0x30 [ 373.264782] freed by task 4758 on cpu 0 at 373.244745s: [ 373.265731] test_corruption+0x2e1/0x3e0 [kfence_test] [ 373.266675] kunit_try_run_case+0x1b0/0x490 [ 373.267538] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 373.268505] kthread+0x2d8/0x3c0 [ 373.269297] ret_from_fork+0x31/0x70 [ 373.270117] ret_from_fork_asm+0x1a/0x30 [ 373.271599] CPU: 0 UID: 0 PID: 4758 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 373.273489] Tainted: [B]=BAD_PAGE, [N]=TEST [ 373.274373] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 373.275722] ================================================================== [ 373.277108] ok 11 test_corruption [ 373.277252] # test_corruption-memcache: setup_test_cache: size=32, ctor=0x0 [ 373.279528] # test_corruption-memcache: test_alloc: size=32, gfp=cc0, policy=left, cache=1 [ 373.348754] ================================================================== [ 373.349921] BUG: KFENCE: memory corruption in test_corruption+0x132/0x3e0 [kfence_test] [ 373.351811] Corrupted memory at 0x0000000073abfa6a [ ! . . . . . . . . . . . . . . . ] (in kfence-#97): [ 373.353163] test_corruption+0x132/0x3e0 [kfence_test] [ 373.354157] kunit_try_run_case+0x1b0/0x490 [ 373.355066] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 373.356068] kthread+0x2d8/0x3c0 [ 373.356887] ret_from_fork+0x31/0x70 [ 373.357727] ret_from_fork_asm+0x1a/0x30 [ 373.359252] kfence-#97: 0x00000000b0cedfe8-0x00000000c28f2a96, size=32, cache=test [ 373.361077] allocated by task 4760 on cpu 0 at 373.348744s: [ 373.362095] test_alloc+0x2a7/0x1150 [kfence_test] [ 373.363055] test_corruption+0xe7/0x3e0 [kfence_test] [ 373.364029] kunit_try_run_case+0x1b0/0x490 [ 373.364925] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 373.365920] kthread+0x2d8/0x3c0 [ 373.366734] ret_from_fork+0x31/0x70 [ 373.367573] ret_from_fork_asm+0x1a/0x30 [ 373.369095] freed by task 4760 on cpu 0 at 373.348747s: [ 373.370064] test_corruption+0x132/0x3e0 [kfence_test] [ 373.371031] kunit_try_run_case+0x1b0/0x490 [ 373.371924] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 373.372918] kthread+0x2d8/0x3c0 [ 373.373733] ret_from_fork+0x31/0x70 [ 373.374571] ret_from_fork_asm+0x1a/0x30 [ 373.376095] CPU: 0 UID: 0 PID: 4760 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 373.378028] Tainted: [B]=BAD_PAGE, [N]=TEST [ 373.378941] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 373.380318] ================================================================== [ 373.381509] # test_corruption-memcache: test_alloc: size=32, gfp=cc0, policy=right, cache=1 [ 373.452754] ================================================================== [ 373.453936] BUG: KFENCE: memory corruption in test_corruption+0x217/0x3e0 [kfence_test] [ 373.455859] Corrupted memory at 0x00000000564a6dfa [ ! ] (in kfence-#98): [ 373.456996] test_corruption+0x217/0x3e0 [kfence_test] [ 373.457994] kunit_try_run_case+0x1b0/0x490 [ 373.458912] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 373.459920] kthread+0x2d8/0x3c0 [ 373.460745] ret_from_fork+0x31/0x70 [ 373.461589] ret_from_fork_asm+0x1a/0x30 [ 373.463089] kfence-#98: 0x00000000d069b2c7-0x000000009eba4d84, size=32, cache=test [ 373.464872] allocated by task 4760 on cpu 0 at 373.452744s: [ 373.465862] test_alloc+0x2a7/0x1150 [kfence_test] [ 373.466796] test_corruption+0x1cc/0x3e0 [kfence_test] [ 373.467762] kunit_try_run_case+0x1b0/0x490 [ 373.468651] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 373.469634] kthread+0x2d8/0x3c0 [ 373.470434] ret_from_fork+0x31/0x70 [ 373.471257] ret_from_fork_asm+0x1a/0x30 [ 373.472744] freed by task 4760 on cpu 0 at 373.452746s: [ 373.473696] test_corruption+0x217/0x3e0 [kfence_test] [ 373.474642] kunit_try_run_case+0x1b0/0x490 [ 373.475508] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 373.476478] kthread+0x2d8/0x3c0 [ 373.477273] ret_from_fork+0x31/0x70 [ 373.478096] ret_from_fork_asm+0x1a/0x30 [ 373.479583] CPU: 0 UID: 0 PID: 4760 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 373.481477] Tainted: [B]=BAD_PAGE, [N]=TEST [ 373.482363] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 373.483714] ================================================================== [ 373.875368] ok 12 test_corruption-memcache [ 373.875622] # test_free_bulk: test_alloc: size=176, gfp=cc0, policy=right, cache=0 [ 374.076792] # test_free_bulk: test_alloc: size=176, gfp=cc0, policy=none, cache=0 [ 374.078017] # test_free_bulk: test_alloc: size=176, gfp=cc0, policy=left, cache=0 [ 374.388798] # test_free_bulk: test_alloc: size=176, gfp=cc0, policy=none, cache=0 [ 374.389996] # test_free_bulk: test_alloc: size=176, gfp=cc0, policy=none, cache=0 [ 374.391179] # test_free_bulk: test_alloc: size=287, gfp=cc0, policy=right, cache=0 [ 375.012792] # test_free_bulk: test_alloc: size=287, gfp=cc0, policy=none, cache=0 [ 375.013950] # test_free_bulk: test_alloc: size=287, gfp=cc0, policy=left, cache=0 [ 375.116790] # test_free_bulk: test_alloc: size=287, gfp=cc0, policy=none, cache=0 [ 375.117922] # test_free_bulk: test_alloc: size=287, gfp=cc0, policy=none, cache=0 [ 375.119042] # test_free_bulk: test_alloc: size=108, gfp=cc0, policy=right, cache=0 [ 375.220812] # test_free_bulk: test_alloc: size=108, gfp=cc0, policy=none, cache=0 [ 375.221916] # test_free_bulk: test_alloc: size=108, gfp=cc0, policy=left, cache=0 [ 375.532792] # test_free_bulk: test_alloc: size=108, gfp=cc0, policy=none, cache=0 [ 375.533882] # test_free_bulk: test_alloc: size=108, gfp=cc0, policy=none, cache=0 [ 375.534973] # test_free_bulk: test_alloc: size=9, gfp=cc0, policy=right, cache=0 [ 375.636741] # test_free_bulk: test_alloc: size=9, gfp=cc0, policy=none, cache=0 [ 375.637813] # test_free_bulk: test_alloc: size=9, gfp=cc0, policy=left, cache=0 [ 375.844790] # test_free_bulk: test_alloc: size=9, gfp=cc0, policy=none, cache=0 [ 375.845843] # test_free_bulk: test_alloc: size=9, gfp=cc0, policy=none, cache=0 [ 375.846889] # test_free_bulk: test_alloc: size=259, gfp=cc0, policy=right, cache=0 [ 375.948826] # test_free_bulk: test_alloc: size=259, gfp=cc0, policy=none, cache=0 [ 375.949893] # test_free_bulk: test_alloc: size=259, gfp=cc0, policy=left, cache=0 [ 376.780795] # test_free_bulk: test_alloc: size=259, gfp=cc0, policy=none, cache=0 [ 376.781851] # test_free_bulk: test_alloc: size=259, gfp=cc0, policy=none, cache=0 [ 376.782897] # test_free_bulk: Test should be marked slow (runtime: 2.907275981s) [ 376.783251] ok 13 test_free_bulk [ 376.784413] # test_free_bulk-memcache: setup_test_cache: size=185, ctor=0x0 [ 376.786271] # test_free_bulk-memcache: test_alloc: size=185, gfp=cc0, policy=right, cache=1 [ 376.988791] # test_free_bulk-memcache: test_alloc: size=185, gfp=cc0, policy=none, cache=1 [ 376.989910] # test_free_bulk-memcache: test_alloc: size=185, gfp=cc0, policy=left, cache=1 [ 377.196792] # test_free_bulk-memcache: test_alloc: size=185, gfp=cc0, policy=none, cache=1 [ 377.197894] # test_free_bulk-memcache: test_alloc: size=185, gfp=cc0, policy=none, cache=1 [ 377.725710] # test_free_bulk-memcache: setup_test_cache: size=215, ctor=ctor_set_x [kfence_test] [ 377.727005] # test_free_bulk-memcache: test_alloc: size=215, gfp=cc0, policy=right, cache=1 [ 377.820796] # test_free_bulk-memcache: test_alloc: size=215, gfp=cc0, policy=none, cache=1 [ 377.821908] # test_free_bulk-memcache: test_alloc: size=215, gfp=cc0, policy=left, cache=1 [ 378.028793] # test_free_bulk-memcache: test_alloc: size=215, gfp=cc0, policy=none, cache=1 [ 378.029868] # test_free_bulk-memcache: test_alloc: size=215, gfp=cc0, policy=none, cache=1 [ 378.537323] # test_free_bulk-memcache: setup_test_cache: size=300, ctor=0x0 [ 378.538394] # test_free_bulk-memcache: test_alloc: size=300, gfp=cc0, policy=right, cache=1 [ 378.964790] # test_free_bulk-memcache: test_alloc: size=300, gfp=cc0, policy=none, cache=1 [ 378.965835] # test_free_bulk-memcache: test_alloc: size=300, gfp=cc0, policy=left, cache=1 [ 379.068791] # test_free_bulk-memcache: test_alloc: size=300, gfp=cc0, policy=none, cache=1 [ 379.069819] # test_free_bulk-memcache: test_alloc: size=300, gfp=cc0, policy=none, cache=1 [ 379.595266] # test_free_bulk-memcache: setup_test_cache: size=127, ctor=ctor_set_x [kfence_test] [ 379.596478] # test_free_bulk-memcache: test_alloc: size=127, gfp=cc0, policy=right, cache=1 [ 379.796797] # test_free_bulk-memcache: test_alloc: size=127, gfp=cc0, policy=none, cache=1 [ 379.797865] # test_free_bulk-memcache: test_alloc: size=127, gfp=cc0, policy=left, cache=1 [ 380.004790] # test_free_bulk-memcache: test_alloc: size=127, gfp=cc0, policy=none, cache=1 [ 380.005834] # test_free_bulk-memcache: test_alloc: size=127, gfp=cc0, policy=none, cache=1 [ 380.519599] # test_free_bulk-memcache: setup_test_cache: size=189, ctor=0x0 [ 380.520667] # test_free_bulk-memcache: test_alloc: size=189, gfp=cc0, policy=right, cache=1 [ 380.628791] # test_free_bulk-memcache: test_alloc: size=189, gfp=cc0, policy=none, cache=1 [ 380.629854] # test_free_bulk-memcache: test_alloc: size=189, gfp=cc0, policy=left, cache=1 [ 381.044792] # test_free_bulk-memcache: test_alloc: size=189, gfp=cc0, policy=none, cache=1 [ 381.045854] # test_free_bulk-memcache: test_alloc: size=189, gfp=cc0, policy=none, cache=1 [ 381.567045] # test_free_bulk-memcache: Test should be marked slow (runtime: 4.782632347s) [ 381.567371] ok 14 test_free_bulk-memcache [ 381.568659] ok 15 test_init_on_free # SKIP Test requires: IS_ENABLED(CONFIG_INIT_ON_FREE_DEFAULT_ON) [ 381.569570] ok 16 test_init_on_free-memcache # SKIP Test requires: IS_ENABLED(CONFIG_INIT_ON_FREE_DEFAULT_ON) [ 381.570809] # test_kmalloc_aligned_oob_read: test_alloc: size=73, gfp=cc0, policy=right, cache=0 [ 381.668798] ================================================================== [ 381.669803] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x27f/0x570 [kfence_test] [ 381.671529] Out-of-bounds read at 0x0000000038d0334e (105B right of kfence-#199): [ 381.672588] test_kmalloc_aligned_oob_read+0x27f/0x570 [kfence_test] [ 381.673568] kunit_try_run_case+0x1b0/0x490 [ 381.674371] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 381.675265] kthread+0x2d8/0x3c0 [ 381.675977] ret_from_fork+0x31/0x70 [ 381.676710] ret_from_fork_asm+0x1a/0x30 [ 381.678037] kfence-#199: 0x00000000ab97e9bc-0x000000005c156adc, size=73, cache=kmalloc-96 [ 381.679745] allocated by task 4794 on cpu 0 at 381.668792s: [ 381.680674] test_alloc+0x35f/0x1150 [kfence_test] [ 381.681536] test_kmalloc_aligned_oob_read+0x106/0x570 [kfence_test] [ 381.682532] kunit_try_run_case+0x1b0/0x490 [ 381.683356] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 381.684285] kthread+0x2d8/0x3c0 [ 381.685043] ret_from_fork+0x31/0x70 [ 381.685825] ret_from_fork_asm+0x1a/0x30 [ 381.687231] CPU: 0 UID: 0 PID: 4794 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 381.689070] Tainted: [B]=BAD_PAGE, [N]=TEST [ 381.689940] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 381.691267] ================================================================== [ 381.692687] ok 17 test_kmalloc_aligned_oob_read [ 381.692778] # test_kmalloc_aligned_oob_write: test_alloc: size=73, gfp=cc0, policy=right, cache=0 [ 381.980801] ================================================================== [ 381.981982] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x251/0x340 [kfence_test] [ 381.984055] Corrupted memory at 0x00000000e742f67a [ ! . . . . . . . . . . . . . . . ] (in kfence-#220): [ 381.985461] test_kmalloc_aligned_oob_write+0x251/0x340 [kfence_test] [ 381.986618] kunit_try_run_case+0x1b0/0x490 [ 381.987599] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 381.988683] kthread+0x2d8/0x3c0 [ 381.989596] ret_from_fork+0x31/0x70 [ 381.990532] ret_from_fork_asm+0x1a/0x30 [ 381.992229] kfence-#220: 0x00000000fbf7230e-0x0000000075166485, size=73, cache=kmalloc-96 [ 381.994243] allocated by task 4796 on cpu 0 at 381.980790s: [ 381.995313] test_alloc+0x35f/0x1150 [kfence_test] [ 381.996312] test_kmalloc_aligned_oob_write+0xc9/0x340 [kfence_test] [ 381.997432] kunit_try_run_case+0x1b0/0x490 [ 381.998368] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 381.999399] kthread+0x2d8/0x3c0 [ 382.000249] ret_from_fork+0x31/0x70 [ 382.001124] ret_from_fork_asm+0x1a/0x30 [ 382.002721] freed by task 4796 on cpu 0 at 381.980793s: [ 382.003735] test_kmalloc_aligned_oob_write+0x251/0x340 [kfence_test] [ 382.004856] kunit_try_run_case+0x1b0/0x490 [ 382.005786] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 382.006810] kthread+0x2d8/0x3c0 [ 382.007652] ret_from_fork+0x31/0x70 [ 382.008519] ret_from_fork_asm+0x1a/0x30 [ 382.010091] CPU: 0 UID: 0 PID: 4796 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 382.012071] Tainted: [B]=BAD_PAGE, [N]=TEST [ 382.013004] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 382.014402] ================================================================== [ 382.015902] ok 18 test_kmalloc_aligned_oob_write [ 382.016128] # test_shrink_memcache: setup_test_cache: size=32, ctor=0x0 [ 382.018555] # test_shrink_memcache: test_alloc: size=32, gfp=cc0, policy=any, cache=1 [ 382.572797] ok 19 test_shrink_memcache [ 382.572877] # test_memcache_ctor: setup_test_cache: size=32, ctor=ctor_set_x [kfence_test] [ 382.575362] # test_memcache_ctor: test_alloc: size=32, gfp=cc0, policy=any, cache=1 [ 383.097347] ok 20 test_memcache_ctor [ 383.097994] ================================================================== [ 383.100171] BUG: KFENCE: invalid read in test_invalid_access+0xf1/0x210 [kfence_test] [ 383.102143] Invalid read at 0x000000008d92b475: [ 383.103109] test_invalid_access+0xf1/0x210 [kfence_test] [ 383.104140] kunit_try_run_case+0x1b0/0x490 [ 383.105070] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 383.106096] kthread+0x2d8/0x3c0 [ 383.106944] ret_from_fork+0x31/0x70 [ 383.107809] ret_from_fork_asm+0x1a/0x30 [ 383.109375] CPU: 25 UID: 0 PID: 4811 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 383.111390] Tainted: [B]=BAD_PAGE, [N]=TEST [ 383.112301] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 383.113675] ================================================================== [ 383.115269] ok 21 test_invalid_access [ 383.115383] # test_gfpzero: test_alloc: size=4096, gfp=cc0, policy=any, cache=0 [ 383.124751] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 383.228900] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 383.332806] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 383.436818] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 383.540803] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 383.644808] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 383.748744] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 383.852753] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 383.957748] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 384.060799] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 384.164799] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 384.268801] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 384.372805] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 384.476868] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 384.580802] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 384.684803] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 384.788799] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 384.892839] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 384.996808] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 385.100801] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 385.204803] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 385.308802] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 385.412802] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 385.516823] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 385.620801] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 385.724800] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 385.828830] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 385.932803] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 386.036805] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 386.140803] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 386.244827] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 386.348809] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 386.452840] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 386.556802] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 386.660801] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 386.764798] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 386.868801] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 386.972802] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 387.076831] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 387.180836] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 387.284829] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 387.388810] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 387.492834] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 387.596805] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 387.700803] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 387.804803] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 387.908801] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 388.012805] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 388.116800] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 388.220800] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 388.324804] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 388.428800] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 388.532799] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 388.636800] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 388.740798] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 388.844817] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 388.948800] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 389.052799] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 389.156799] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 389.260801] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 389.364798] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 389.468800] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 389.572798] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 389.676800] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 389.780798] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 389.884804] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 389.988820] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 390.092752] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 390.196799] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 390.300824] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 390.404800] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 390.508799] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 390.612803] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 390.716800] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 390.820797] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 390.924800] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 391.028800] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 391.132802] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 391.236834] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 391.340798] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 391.444802] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 391.548801] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 391.652825] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 391.756799] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 391.860803] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 391.964805] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 392.068800] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 392.172821] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 392.276798] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 392.380800] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 392.484837] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 392.588800] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 392.692801] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 392.796821] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 392.900797] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 393.004826] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 393.108801] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 393.212801] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 393.316798] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 393.420819] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 393.524839] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 393.628802] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 393.732814] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 393.836800] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 393.940799] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 394.044832] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 394.148803] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 394.252801] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 394.356809] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 394.460800] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 394.564806] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 394.668800] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 394.772800] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 394.876805] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 394.980798] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 395.084804] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 395.188801] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 395.292800] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 395.396802] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 395.500798] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 395.604799] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 395.708798] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 395.812800] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 395.916801] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 396.020837] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 396.124796] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 396.228829] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 396.332807] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 396.436799] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 396.540799] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 396.644797] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 396.748799] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 396.852798] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 396.956800] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 397.060806] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 397.164799] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 397.268799] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 397.372832] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 397.476798] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 397.580799] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 397.684800] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 397.788799] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 397.892813] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 397.996799] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 398.100802] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 398.204813] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 398.308798] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 398.412800] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 398.516802] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 398.620800] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 398.724801] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 398.828819] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 398.932797] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 399.036801] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 399.140813] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 399.244802] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 399.348804] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 399.452810] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 399.556799] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 399.660799] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 399.764798] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 399.868803] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 399.972805] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 400.076797] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 400.180803] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 400.284797] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 400.388798] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 400.492798] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 400.596800] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 400.700798] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 400.804800] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 400.908801] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 401.012807] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 401.116836] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 401.220799] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 401.324798] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 401.428800] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 401.532800] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 401.636807] # test_gfpzero: Test should be marked slow (runtime: 18.521425393s) [ 401.637138] ok 22 test_gfpzero [ 401.638044] # test_memcache_typesafe_by_rcu: setup_test_cache: size=32, ctor=0x0 [ 401.639528] # test_memcache_typesafe_by_rcu: test_alloc: size=32, gfp=cc0, policy=any, cache=1 [ 401.750764] ================================================================== [ 401.751616] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x2ed/0x670 [kfence_test] [ 401.753012] Use-after-free read at 0x00000000b288e8c9 (in kfence-#205): [ 401.753831] test_memcache_typesafe_by_rcu+0x2ed/0x670 [kfence_test] [ 401.754641] kunit_try_run_case+0x1b0/0x490 [ 401.755281] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 401.756025] kthread+0x2d8/0x3c0 [ 401.756600] ret_from_fork+0x31/0x70 [ 401.757206] ret_from_fork_asm+0x1a/0x30 [ 401.758282] kfence-#205: 0x00000000b288e8c9-0x0000000011c468ff, size=32, cache=test [ 401.759690] allocated by task 4872 on cpu 0 at 401.740791s: [ 401.760504] test_alloc+0x2a7/0x1150 [kfence_test] [ 401.761259] test_memcache_typesafe_by_rcu+0x170/0x670 [kfence_test] [ 401.762151] kunit_try_run_case+0x1b0/0x490 [ 401.762873] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 401.763700] kthread+0x2d8/0x3c0 [ 401.764356] ret_from_fork+0x31/0x70 [ 401.765045] ret_from_fork_asm+0x1a/0x30 [ 401.766287] freed by task 0 on cpu 0 at 401.750743s: [ 401.767128] rcu_do_batch+0x388/0xde0 [ 401.767845] rcu_core+0x419/0xea0 [ 401.768537] handle_softirqs+0x1d3/0x630 [ 401.769282] __irq_exit_rcu+0x125/0x170 [ 401.770026] sysvec_apic_timer_interrupt+0x6f/0x90 [ 401.770856] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 401.771721] cpuidle_enter_state+0x1c0/0x4d0 [ 401.772522] cpuidle_enter+0x4e/0xa0 [ 401.773269] cpuidle_idle_call+0x1ad/0x270 [ 401.774063] do_idle+0xe3/0x190 [ 401.774783] cpu_startup_entry+0x54/0x60 [ 401.775572] rest_init+0x12c/0x170 [ 401.776321] start_kernel+0x30b/0x3d0 [ 401.777096] x86_64_start_reservations+0x18/0x30 [ 401.777956] x86_64_start_kernel+0xbc/0x110 [ 401.778784] common_startup_64+0x13e/0x141 [ 401.780193] CPU: 0 UID: 0 PID: 4872 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 401.781978] Tainted: [B]=BAD_PAGE, [N]=TEST [ 401.782801] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 401.784076] ================================================================== [ 401.850331] ok 23 test_memcache_typesafe_by_rcu [ 401.850405] # test_krealloc: test_alloc: size=32, gfp=cc0, policy=any, cache=0 [ 401.948809] ================================================================== [ 401.949929] BUG: KFENCE: use-after-free read in test_krealloc+0x6fd/0xbe0 [kfence_test] [ 401.951693] Use-after-free read at 0x0000000026002dcc (in kfence-#209): [ 401.952745] test_krealloc+0x6fd/0xbe0 [kfence_test] [ 401.953672] kunit_try_run_case+0x1b0/0x490 [ 401.954537] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 401.955493] kthread+0x2d8/0x3c0 [ 401.956266] ret_from_fork+0x31/0x70 [ 401.957063] ret_from_fork_asm+0x1a/0x30 [ 401.958495] kfence-#209: 0x0000000026002dcc-0x00000000fa523d88, size=32, cache=kmalloc-32 [ 401.960271] allocated by task 4875 on cpu 0 at 401.948797s: [ 401.961237] test_alloc+0x35f/0x1150 [kfence_test] [ 401.962142] test_krealloc+0xae/0xbe0 [kfence_test] [ 401.963057] kunit_try_run_case+0x1b0/0x490 [ 401.963916] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 401.964873] kthread+0x2d8/0x3c0 [ 401.965652] ret_from_fork+0x31/0x70 [ 401.966459] ret_from_fork_asm+0x1a/0x30 [ 401.967925] freed by task 4875 on cpu 0 at 401.948802s: [ 401.968870] krealloc_noprof+0xc1/0x110 [ 401.969701] test_krealloc+0x227/0xbe0 [kfence_test] [ 401.970625] kunit_try_run_case+0x1b0/0x490 [ 401.971487] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 401.972451] kthread+0x2d8/0x3c0 [ 401.973240] ret_from_fork+0x31/0x70 [ 401.974056] ret_from_fork_asm+0x1a/0x30 [ 401.975542] CPU: 0 UID: 0 PID: 4875 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 401.977446] Tainted: [B]=BAD_PAGE, [N]=TEST [ 401.978340] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 401.979700] ================================================================== [ 401.981121] ok 24 test_krealloc [ 401.981245] # test_memcache_alloc_bulk: setup_test_cache: size=32, ctor=0x0 [ 402.092615] ok 25 test_memcache_alloc_bulk [ 402.106816] # kfence: pass:23 fail:0 skip:2 total:25 [ 402.107796] # Totals: pass:23 fail:0 skip:2 total:25 [ 402.108765] ok 1 kfence [ 402.113805] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/mm/kfence/kfence_test.ko [ 402.116507] 2024-08-23 05:15:34 rmmod kfence_test [ 402.167048] 2024-08-23 05:15:34 modprobe -v mptcp_crypto_test [ 402.171641] KTAP version 1 [ 402.172502] 1..1 [ 402.173362] KTAP version 1 [ 402.174229] # Subtest: mptcp-crypto [ 402.175101] # module: mptcp_crypto_test [ 402.175110] 1..1 [ 402.177086] ok 1 mptcp_crypto_test_basic [ 402.177094] ok 1 mptcp-crypto [ 402.180736] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/net/mptcp/mptcp_crypto_test.ko [ 402.183379] 2024-08-23 05:15:34 rmmod mptcp_crypto_test [ 402.242543] 2024-08-23 05:15:34 modprobe -v mptcp_token_test [ 402.246742] KTAP version 1 [ 402.247585] 1..1 [ 402.248559] KTAP version 1 [ 402.249424] # Subtest: mptcp-token [ 402.250285] # module: mptcp_token_test [ 402.250293] 1..4 [ 402.252027] ok 1 mptcp_token_test_req_basic [ 402.252328] ok 2 mptcp_token_test_msk_basic [ 402.253421] ok 3 mptcp_token_test_accept [ 402.254435] ok 4 mptcp_token_test_destroyed [ 402.255318] # mptcp-token: pass:4 fail:0 skip:0 total:4 [ 402.256224] # Totals: pass:4 fail:0 skip:0 total:4 [ 402.257438] ok 1 mptcp-token [ 402.261147] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/net/mptcp/mptcp_token_test.ko [ 402.263789] 2024-08-23 05:15:34 rmmod mptcp_token_test [ 402.304396] 2024-08-23 05:15:34 modprobe -v rational-test [ 402.308496] KTAP version 1 [ 402.309282] 1..1 [ 402.310140] KTAP version 1 [ 402.310925] # Subtest: rational [ 402.311684] # module: rational_test [ 402.311693] 1..1 [ 402.313104] KTAP version 1 [ 402.313835] # Subtest: rational_test [ 402.313942] ok 1 Exceeds bounds, semi-convergent term > 1/2 last term [ 402.315090] ok 2 Exceeds bounds, semi-convergent term < 1/2 last term [ 402.316226] ok 3 Closest to zero [ 402.317620] ok 4 Closest to smallest non-zero [ 402.318638] ok 5 Use convergent [ 402.319606] ok 6 Exact answer [ 402.320610] ok 7 Semiconvergent, numerator limit [ 402.321507] ok 8 Semiconvergent, denominator limit [ 402.322444] # rational_test: pass:8 fail:0 skip:0 total:8 [ 402.323395] ok 1 rational_test [ 402.324367] # Totals: pass:8 fail:0 skip:0 total:8 [ 402.325146] ok 1 rational [ 402.328597] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/lib/math/rational-test.ko [ 402.331416] 2024-08-23 05:15:34 rmmod rational-test [ 402.366307] 2024-08-23 05:15:34 modprobe -v slub_kunit [ 402.370617] KTAP version 1 [ 402.371367] 1..1 [ 402.372188] KTAP version 1 [ 402.372949] # Subtest: slub_test [ 402.373708] # module: slub_kunit [ 402.373716] 1..5 [ 402.436536] ok 1 test_clobber_zone [ 402.475176] ok 2 test_clobber_redzone_free [ 402.513847] ok 3 test_kmalloc_redzone_access [ 402.562133] ok 4 test_kfree_rcu [ 402.600302] Object 0x000000003df15ffe @offset=768 [ 402.601850] ------------[ cut here ]------------ [ 402.602683] kmem_cache_destroy TestSlub_kfree_rcu: Slab cache still has objects when called from test_leak_destroy+0xba/0x1d0 [slub_kunit] [ 402.602700] WARNING: CPU: 0 PID: 4936 at mm/slab_common.c:528 kmem_cache_destroy+0x137/0x140 [ 402.605758] Modules linked in: slub_kunit linear_ranges intel_rapl_msr intel_rapl_common skx_edac_common nfit sd_mod sg libnvdimm x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm crct10dif_pclmul crc32_generic crc32_pclmul ghash_clmulni_intel sha512_ssse3 btrfs blake2b_generic xor raid6_pq libcrc32c snd_soc_avs snd_soc_hda_codec snd_hda_ext_core snd_hda_codec snd_hda_core snd_intel_dspcfg crc32c_intel rapl snd_soc_core snd_compress ahci snd_pcm libahci intel_cstate ipmi_devintf ipmi_msghandler nvme intel_uncore wmi_bmof intel_wmi_thunderbolt mxm_wmi wdat_wdt snd_timer mei_me libata nvme_core snd ioatdma mei soundcore dca wmi binfmt_misc drm fuse loop dm_mod ip_tables cts xts [last unloaded: rational_test] [ 402.613823] CPU: 0 UID: 0 PID: 4936 Comm: kunit_try_catch Tainted: G B N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 402.615894] Tainted: [B]=BAD_PAGE, [N]=TEST [ 402.616872] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 402.618338] RIP: 0010:kmem_cache_destroy+0x137/0x140 [ 402.619412] Code: 8c ff c3 cc cc cc cc e8 57 e0 ab ff eb ad 48 8b 53 60 48 8b 4c 24 10 48 c7 c6 20 21 55 84 48 c7 c7 d0 b9 ee 84 e8 a9 d4 8b ff <0f> 0b e9 28 ff ff ff 66 90 90 90 90 90 90 90 90 90 90 90 90 90 90 [ 402.622288] RSP: 0018:ffffc9000300fd38 EFLAGS: 00010282 [ 402.623454] RAX: 0000000000000000 RBX: ffff8881ac7a88c0 RCX: 0000000000000027 [ 402.624796] RDX: 0000000000000027 RSI: 0000000000000004 RDI: ffff889fc3230b08 [ 402.626072] RBP: 0000000000000001 R08: 0000000000000001 R09: ffffed13f8646161 [ 402.627396] R10: ffff889fc3230b0b R11: 0000000000000001 R12: ffffc900009877c8 [ 402.628741] R13: dffffc0000000000 R14: 0000000000000000 R15: ffffc9000300fe40 [ 402.630015] FS: 0000000000000000(0000) GS:ffff889fc3200000(0000) knlGS:0000000000000000 [ 402.631431] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 402.632653] CR2: 000056455377c3b0 CR3: 000000209c662004 CR4: 00000000003706f0 [ 402.633979] DR0: ffffffff8741b384 DR1: ffffffff8741b385 DR2: ffffffff8741b382 [ 402.635257] DR3: ffffffff8741b383 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 402.636580] Call Trace: [ 402.637518] [ 402.638397] ? __warn+0xcc/0x260 [ 402.639368] ? kmem_cache_destroy+0x137/0x140 [ 402.640432] ? report_bug+0x261/0x2c0 [ 402.641445] ? handle_bug+0x3c/0x70 [ 402.642443] ? exc_invalid_op+0x17/0x40 [ 402.643469] ? asm_exc_invalid_op+0x1a/0x20 [ 402.644529] ? kmem_cache_destroy+0x137/0x140 [ 402.645601] ? kmem_cache_destroy+0x137/0x140 [ 402.646668] test_leak_destroy+0xba/0x1d0 [slub_kunit] [ 402.647868] ? __pfx_test_leak_destroy+0x10/0x10 [slub_kunit] [ 402.649054] ? __kunit_add_resource+0x18c/0x240 [ 402.650182] ? ktime_get_ts64+0x7f/0x230 [ 402.651224] ? test_init+0x16d/0x230 [slub_kunit] [ 402.652347] kunit_try_run_case+0x1b0/0x490 [ 402.653447] ? __pfx_kunit_try_run_case+0x10/0x10 [ 402.654525] ? set_cpus_allowed_ptr+0x85/0xc0 [ 402.655563] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 402.656629] ? __pfx_kunit_try_run_case+0x10/0x10 [ 402.657662] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 402.658854] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 402.659920] kthread+0x2d8/0x3c0 [ 402.660818] ? __pfx_kthread+0x10/0x10 [ 402.661706] ret_from_fork+0x31/0x70 [ 402.662601] ? __pfx_kthread+0x10/0x10 [ 402.663457] ret_from_fork_asm+0x1a/0x30 [ 402.664326] [ 402.665053] ---[ end trace 0000000000000000 ]--- [ 402.666287] ok 5 test_leak_destroy [ 402.666297] # slub_test: pass:5 fail:0 skip:0 total:5 [ 402.667126] # Totals: pass:5 fail:0 skip:0 total:5 [ 402.668029] ok 1 slub_test [ 402.671515] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/lib/slub_kunit.ko [ 402.674354] 2024-08-23 05:15:35 rmmod slub_kunit [ 402.711476] 2024-08-23 05:15:35 modprobe -v apparmor_policy_unpack_test [ 402.716214] KTAP version 1 [ 402.716966] 1..1 [ 402.717781] KTAP version 1 [ 402.718533] # Subtest: apparmor_policy_unpack [ 402.719403] # module: apparmor_policy_unpack_test [ 402.719412] 1..30 [ 402.721216] ok 1 policy_unpack_test_inbounds_when_inbounds [ 402.721768] ok 2 policy_unpack_test_inbounds_when_out_of_bounds [ 402.723322] ok 3 policy_unpack_test_unpack_array_with_null_name [ 402.724710] ok 4 policy_unpack_test_unpack_array_with_name [ 402.725874] ok 5 policy_unpack_test_unpack_array_out_of_bounds [ 402.726920] ok 6 policy_unpack_test_unpack_blob_with_null_name [ 402.728123] ok 7 policy_unpack_test_unpack_blob_with_name [ 402.729492] ok 8 policy_unpack_test_unpack_blob_out_of_bounds [ 402.730584] ok 9 policy_unpack_test_unpack_nameX_with_null_name [ 402.731719] ok 10 policy_unpack_test_unpack_nameX_with_wrong_code [ 402.733290] ok 11 policy_unpack_test_unpack_nameX_with_name [ 402.734464] ok 12 policy_unpack_test_unpack_nameX_with_wrong_name [ 402.735555] ok 13 policy_unpack_test_unpack_str_with_null_name [ 402.736683] ok 14 policy_unpack_test_unpack_str_with_name [ 402.737786] ok 15 policy_unpack_test_unpack_str_out_of_bounds [ 402.738854] ok 16 policy_unpack_test_unpack_strdup_with_null_name [ 402.739947] ok 17 policy_unpack_test_unpack_strdup_with_name [ 402.741082] ok 18 policy_unpack_test_unpack_strdup_out_of_bounds [ 402.742152] ok 19 policy_unpack_test_unpack_u16_chunk_basic [ 402.743244] ok 20 policy_unpack_test_unpack_u16_chunk_out_of_bounds_1 [ 402.744296] ok 21 policy_unpack_test_unpack_u16_chunk_out_of_bounds_2 [ 402.745602] ok 22 policy_unpack_test_unpack_u32_with_null_name [ 402.746714] ok 23 policy_unpack_test_unpack_u32_with_name [ 402.747804] ok 24 policy_unpack_test_unpack_u32_out_of_bounds [ 402.748865] ok 25 policy_unpack_test_unpack_u64_with_null_name [ 402.749933] ok 26 policy_unpack_test_unpack_u64_with_name [ 402.750992] ok 27 policy_unpack_test_unpack_u64_out_of_bounds [ 402.752038] ok 28 policy_unpack_test_unpack_X_code_match [ 402.753099] ok 29 policy_unpack_test_unpack_X_code_mismatch [ 402.754113] ok 30 policy_unpack_test_unpack_X_out_of_bounds [ 402.755111] # apparmor_policy_unpack: pass:30 fail:0 skip:0 total:30 [ 402.756020] # Totals: pass:30 fail:0 skip:0 total:30 [ 402.756946] ok 1 apparmor_policy_unpack [ 402.761176] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/security/apparmor/apparmor_policy_unpack_test.ko [ 402.764315] 2024-08-23 05:15:35 rmmod apparmor_policy_unpack_test [ 402.800712] 2024-08-23 05:15:35 modprobe -v fortify_kunit [ 402.811284] KTAP version 1 [ 402.811958] 1..1 [ 402.812716] KTAP version 1 [ 402.813406] # Subtest: fortify [ 402.814095] # module: fortify_kunit [ 402.814104] 1..26 [ 402.815565] ok 1 fortify_test_known_sizes [ 402.815761] ok 2 fortify_test_control_flow_split [ 402.817050] ok 3 fortify_test_alloc_size_kmalloc_const [ 402.818308] ok 4 fortify_test_alloc_size_kmalloc_dynamic [ 402.832672] ok 5 fortify_test_alloc_size_vmalloc_const [ 402.833793] ok 6 fortify_test_alloc_size_vmalloc_dynamic [ 402.893592] ok 7 fortify_test_alloc_size_kvmalloc_const [ 402.894872] ok 8 fortify_test_alloc_size_kvmalloc_dynamic [ 402.898181] ok 9 fortify_test_alloc_size_devm_kmalloc_const [ 402.899459] ok 10 fortify_test_alloc_size_devm_kmalloc_dynamic [ 402.900645] ok 11 fortify_test_realloc_size [ 402.901704] ok 12 fortify_test_strlen [ 402.902639] ok 13 fortify_test_strnlen [ 402.903518] ok 14 fortify_test_strcpy [ 402.904407] ok 15 fortify_test_strncpy [ 402.905281] ok 16 fortify_test_strscpy [ 402.906259] ok 17 fortify_test_strcat [ 402.907145] ok 18 fortify_test_strncat [ 402.908085] ok 19 fortify_test_strlcat [ 402.908969] ok 20 fortify_test_memcpy [ 402.909848] ok 21 fortify_test_memmove [ 402.910711] ok 22 fortify_test_memscan [ 402.911615] ok 23 fortify_test_memchr [ 402.912495] ok 24 fortify_test_memchr_inv [ 402.913360] ok 25 fortify_test_memcmp [ 402.914268] ok 26 fortify_test_kmemdup [ 402.915019] # fortify: pass:26 fail:0 skip:0 total:26 [ 402.915774] # Totals: pass:26 fail:0 skip:0 total:26 [ 402.916596] ok 1 fortify [ 402.921181] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/lib/fortify_kunit.ko [ 402.924305] 2024-08-23 05:15:35 rmmod fortify_kunit [ 402.953903] 2024-08-23 05:15:35 modprobe -v property-entry-test [ 402.959329] KTAP version 1 [ 402.959948] 1..1 [ 402.960614] KTAP version 1 [ 402.961251] # Subtest: property-entry [ 402.961954] # module: property_entry_test [ 402.961963] 1..7 [ 402.963401] ok 1 pe_test_uints [ 402.963754] ok 2 pe_test_uint_arrays [ 402.964738] ok 3 pe_test_strings [ 402.965693] ok 4 pe_test_bool [ 402.966506] ok 5 pe_test_move_inline_u8 [ 402.967285] ok 6 pe_test_move_inline_str [ 402.968278] ok 7 pe_test_reference [ 402.969007] # property-entry: pass:7 fail:0 skip:0 total:7 [ 402.969691] # Totals: pass:7 fail:0 skip:0 total:7 [ 402.970550] ok 1 property-entry [ 402.974253] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/drivers/base/test/property-entry-test.ko [ 402.976941] 2024-08-23 05:15:35 rmmod property-entry-test [ 403.023822] 2024-08-23 05:15:35 modprobe -v drm_cmdline_parser_test [ 403.030398] KTAP version 1 [ 403.031107] 1..1 [ 403.031896] KTAP version 1 [ 403.032613] # Subtest: drm_cmdline_parser [ 403.033413] # module: drm_cmdline_parser_test [ 403.033422] 1..40 [ 403.035198] ok 1 drm_test_cmdline_force_d_only [ 403.035424] ok 2 drm_test_cmdline_force_D_only_dvi [ 403.036416] ok 3 drm_test_cmdline_force_D_only_hdmi [ 403.038006] ok 4 drm_test_cmdline_force_D_only_not_digital [ 403.039110] ok 5 drm_test_cmdline_force_e_only [ 403.040155] ok 6 drm_test_cmdline_res [ 403.041164] ok 7 drm_test_cmdline_res_vesa [ 403.042131] ok 8 drm_test_cmdline_res_vesa_rblank [ 403.043132] ok 9 drm_test_cmdline_res_rblank [ 403.044120] ok 10 drm_test_cmdline_res_bpp [ 403.045058] ok 11 drm_test_cmdline_res_refresh [ 403.045971] ok 12 drm_test_cmdline_res_bpp_refresh [ 403.046906] ok 13 drm_test_cmdline_res_bpp_refresh_interlaced [ 403.047888] ok 14 drm_test_cmdline_res_bpp_refresh_margins [ 403.048915] ok 15 drm_test_cmdline_res_bpp_refresh_force_off [ 403.049915] ok 16 drm_test_cmdline_res_bpp_refresh_force_on [ 403.050933] ok 17 drm_test_cmdline_res_bpp_refresh_force_on_analog [ 403.051940] ok 18 drm_test_cmdline_res_bpp_refresh_force_on_digital [ 403.052998] ok 19 drm_test_cmdline_res_bpp_refresh_interlaced_margins_force_on [ 403.054056] ok 20 drm_test_cmdline_res_margins_force_on [ 403.055194] ok 21 drm_test_cmdline_res_vesa_margins [ 403.056182] ok 22 drm_test_cmdline_name [ 403.057129] ok 23 drm_test_cmdline_name_bpp [ 403.057992] ok 24 drm_test_cmdline_name_option [ 403.058886] ok 25 drm_test_cmdline_name_bpp_option [ 403.059802] ok 26 drm_test_cmdline_rotate_0 [ 403.060775] ok 27 drm_test_cmdline_rotate_90 [ 403.061723] ok 28 drm_test_cmdline_rotate_180 [ 403.062685] ok 29 drm_test_cmdline_rotate_270 [ 403.063584] ok 30 drm_test_cmdline_hmirror [ 403.064472] ok 31 drm_test_cmdline_vmirror [ 403.065337] ok 32 drm_test_cmdline_margin_options [ 403.066179] ok 33 drm_test_cmdline_multiple_options [ 403.067086] ok 34 drm_test_cmdline_bpp_extra_and_option [ 403.067976] ok 35 drm_test_cmdline_extra_and_option [ 403.068884] ok 36 drm_test_cmdline_freestanding_options [ 403.069750] ok 37 drm_test_cmdline_freestanding_force_e_and_options [ 403.070636] ok 38 drm_test_cmdline_panel_orientation [ 403.071509] KTAP version 1 [ 403.072889] # Subtest: drm_test_cmdline_invalid [ 403.072999] ok 1 margin_only [ 403.073876] ok 2 interlace_only [ 403.074606] ok 3 res_missing_x [ 403.075364] ok 4 res_missing_y [ 403.076110] ok 5 res_bad_y [ 403.077028] ok 6 res_missing_y_bpp [ 403.077743] ok 7 res_bad_bpp [ 403.078509] ok 8 res_bad_refresh [ 403.079237] ok 9 res_bpp_refresh_force_on_off [ 403.080000] ok 10 res_invalid_mode [ 403.080849] ok 11 res_bpp_wrong_place_mode [ 403.081620] ok 12 name_bpp_refresh [ 403.082476] ok 13 name_refresh [ 403.083252] ok 14 name_refresh_wrong_mode [ 403.084112] ok 15 name_refresh_invalid_mode [ 403.084983] ok 16 rotate_multiple [ 403.085846] ok 17 rotate_invalid_val [ 403.086612] ok 18 rotate_truncated [ 403.087422] ok 19 invalid_option [ 403.088201] ok 20 invalid_tv_option [ 403.088970] ok 21 truncated_tv_option [ 403.089656] # drm_test_cmdline_invalid: pass:21 fail:0 skip:0 total:21 [ 403.090380] ok 39 drm_test_cmdline_invalid [ 403.091295] KTAP version 1 [ 403.092645] # Subtest: drm_test_cmdline_tv_options [ 403.092859] ok 1 NTSC [ 403.093791] ok 2 NTSC_443 [ 403.094599] ok 3 NTSC_J [ 403.095346] ok 4 PAL [ 403.096080] ok 5 PAL_M [ 403.096790] ok 6 PAL_N [ 403.097507] ok 7 SECAM [ 403.098228] ok 8 MONO_525 [ 403.098996] ok 9 MONO_625 [ 403.099629] # drm_test_cmdline_tv_options: pass:9 fail:0 skip:0 total:9 [ 403.100265] ok 40 drm_test_cmdline_tv_options [ 403.101212] # drm_cmdline_parser: pass:40 fail:0 skip:0 total:40 [ 403.101980] # Totals: pass:68 fail:0 skip:0 total:68 [ 403.102863] ok 1 drm_cmdline_parser [ 403.107509] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/drivers/gpu/drm/tests/drm_cmdline_parser_test.ko [ 403.110743] 2024-08-23 05:15:35 rmmod drm_cmdline_parser_test [ 403.155992] 2024-08-23 05:15:35 modprobe -v drm_damage_helper_test [ 403.174212] KTAP version 1 [ 403.174908] 1..1 [ 403.175677] KTAP version 1 [ 403.176394] # Subtest: drm_damage_helper [ 403.177181] # module: drm_damage_helper_test [ 403.177189] 1..21 [ 403.178815] ok 1 drm_test_damage_iter_no_damage [ 403.179060] ok 2 drm_test_damage_iter_no_damage_fractional_src [ 403.180121] ok 3 drm_test_damage_iter_no_damage_src_moved [ 403.181241] ok 4 drm_test_damage_iter_no_damage_fractional_src_moved [ 403.182308] ok 5 drm_test_damage_iter_no_damage_not_visible [ 403.183694] ok 6 drm_test_damage_iter_no_damage_no_crtc [ 403.184815] ok 7 drm_test_damage_iter_no_damage_no_fb [ 403.185862] ok 8 drm_test_damage_iter_simple_damage [ 403.186880] ok 9 drm_test_damage_iter_single_damage [ 403.187893] ok 10 drm_test_damage_iter_single_damage_intersect_src [ 403.188948] ok 11 drm_test_damage_iter_single_damage_outside_src [ 403.190390] ok 12 drm_test_damage_iter_single_damage_fractional_src [ 403.191497] ok 13 drm_test_damage_iter_single_damage_intersect_fractional_src [ 403.192643] ok 14 drm_test_damage_iter_single_damage_outside_fractional_src [ 403.193834] ok 15 drm_test_damage_iter_single_damage_src_moved [ 403.195002] ok 16 drm_test_damage_iter_single_damage_fractional_src_moved [ 403.196077] ok 17 drm_test_damage_iter_damage [ 403.197227] ok 18 drm_test_damage_iter_damage_one_intersect [ 403.198177] ok 19 drm_test_damage_iter_damage_one_outside [ 403.199227] ok 20 drm_test_damage_iter_damage_src_moved [ 403.200263] ok 21 drm_test_damage_iter_damage_not_visible [ 403.201182] # drm_damage_helper: pass:21 fail:0 skip:0 total:21 [ 403.202115] # Totals: pass:21 fail:0 skip:0 total:21 [ 403.203088] ok 1 drm_damage_helper [ 403.207013] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/drivers/gpu/drm/drm_kms_helper.ko [ 403.210866] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/drivers/gpu/drm/tests/drm_damage_helper_test.ko [ 403.214196] 2024-08-23 05:15:35 rmmod drm_damage_helper_test [ 403.253923] 2024-08-23 05:15:35 modprobe -v drm_dp_mst_helper_test [ 403.271309] KTAP version 1 [ 403.272044] 1..1 [ 403.272794] KTAP version 1 [ 403.273531] # Subtest: drm_dp_mst_helper [ 403.274574] # module: drm_dp_mst_helper_test [ 403.274583] 1..3 [ 403.276031] KTAP version 1 [ 403.276759] # Subtest: drm_test_dp_mst_calc_pbn_mode [ 403.277153] ok 1 Clock 154000 BPP 30 DSC disabled [ 403.278557] ok 2 Clock 234000 BPP 30 DSC disabled [ 403.279706] ok 3 Clock 297000 BPP 24 DSC disabled [ 403.280697] ok 4 Clock 332880 BPP 24 DSC enabled [ 403.281792] ok 5 Clock 324540 BPP 24 DSC enabled [ 403.282693] # drm_test_dp_mst_calc_pbn_mode: pass:5 fail:0 skip:0 total:5 [ 403.283593] ok 1 drm_test_dp_mst_calc_pbn_mode [ 403.284711] KTAP version 1 [ 403.286433] # Subtest: drm_test_dp_mst_calc_pbn_div [ 403.286635] ok 1 Link rate 2000000 lane count 4 [ 403.287672] ok 2 Link rate 2000000 lane count 2 [ 403.288762] ok 3 Link rate 2000000 lane count 1 [ 403.289817] ok 4 Link rate 1350000 lane count 4 [ 403.291056] ok 5 Link rate 1350000 lane count 2 [ 403.292178] ok 6 Link rate 1350000 lane count 1 [ 403.293213] ok 7 Link rate 1000000 lane count 4 [ 403.294245] ok 8 Link rate 1000000 lane count 2 [ 403.295277] ok 9 Link rate 1000000 lane count 1 [ 403.296300] ok 10 Link rate 810000 lane count 4 [ 403.297313] ok 11 Link rate 810000 lane count 2 [ 403.298329] ok 12 Link rate 810000 lane count 1 [ 403.299346] ok 13 Link rate 540000 lane count 4 [ 403.300361] ok 14 Link rate 540000 lane count 2 [ 403.301372] ok 15 Link rate 540000 lane count 1 [ 403.302375] ok 16 Link rate 270000 lane count 4 [ 403.303370] ok 17 Link rate 270000 lane count 2 [ 403.304355] ok 18 Link rate 270000 lane count 1 [ 403.305324] ok 19 Link rate 162000 lane count 4 [ 403.306273] ok 20 Link rate 162000 lane count 2 [ 403.307201] ok 21 Link rate 162000 lane count 1 [ 403.308008] # drm_test_dp_mst_calc_pbn_div: pass:21 fail:0 skip:0 total:21 [ 403.308819] ok 2 drm_test_dp_mst_calc_pbn_div [ 403.309783] KTAP version 1 [ 403.311173] # Subtest: drm_test_dp_mst_sideband_msg_req_decode [ 403.311390] ok 1 DP_ENUM_PATH_RESOURCES with port number [ 403.312417] ok 2 DP_POWER_UP_PHY with port number [ 403.313403] ok 3 DP_POWER_DOWN_PHY with port number [ 403.314341] ok 4 DP_ALLOCATE_PAYLOAD with SDP stream sinks [ 403.315302] ok 5 DP_ALLOCATE_PAYLOAD with port number [ 403.316312] ok 6 DP_ALLOCATE_PAYLOAD with VCPI [ 403.317284] ok 7 DP_ALLOCATE_PAYLOAD with PBN [ 403.318205] ok 8 DP_QUERY_PAYLOAD with port number [ 403.319112] ok 9 DP_QUERY_PAYLOAD with VCPI [ 403.320054] ok 10 DP_REMOTE_DPCD_READ with port number [ 403.321036] ok 11 DP_REMOTE_DPCD_READ with DPCD address [ 403.322011] ok 12 DP_REMOTE_DPCD_READ with max number of bytes [ 403.322993] ok 13 DP_REMOTE_DPCD_WRITE with port number [ 403.324025] ok 14 DP_REMOTE_DPCD_WRITE with DPCD address [ 403.325017] ok 15 DP_REMOTE_DPCD_WRITE with data array [ 403.326001] ok 16 DP_REMOTE_I2C_READ with port number [ 403.326961] ok 17 DP_REMOTE_I2C_READ with I2C device ID [ 403.327924] ok 18 DP_REMOTE_I2C_READ with transactions array [ 403.329014] ok 19 DP_REMOTE_I2C_WRITE with port number [ 403.330046] ok 20 DP_REMOTE_I2C_WRITE with I2C device ID [ 403.331013] ok 21 DP_REMOTE_I2C_WRITE with data array [ 403.331993] ok 22 DP_QUERY_STREAM_ENC_STATUS with stream ID [ 403.332954] ok 23 DP_QUERY_STREAM_ENC_STATUS with client ID [ 403.333965] ok 24 DP_QUERY_STREAM_ENC_STATUS with stream event [ 403.334981] ok 25 DP_QUERY_STREAM_ENC_STATUS with valid stream event [ 403.336017] ok 26 DP_QUERY_STREAM_ENC_STATUS with stream behavior [ 403.337101] ok 27 DP_QUERY_STREAM_ENC_STATUS with a valid stream behavior [ 403.338050] # drm_test_dp_mst_sideband_msg_req_decode: pass:27 fail:0 skip:0 total:27 [ 403.339059] ok 3 drm_test_dp_mst_sideband_msg_req_decode [ 403.340132] # drm_dp_mst_helper: pass:3 fail:0 skip:0 total:3 [ 403.341018] # Totals: pass:53 fail:0 skip:0 total:53 [ 403.341926] ok 1 drm_dp_mst_helper [ 403.346508] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/drivers/gpu/drm/display/drm_display_helper.ko [ 403.350333] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/drivers/gpu/drm/tests/drm_dp_mst_helper_test.ko [ 403.353645] 2024-08-23 05:15:35 rmmod drm_dp_mst_helper_test [ 403.391367] 2024-08-23 05:15:35 modprobe -v drm_mm_test [ 403.395998] KTAP version 1 [ 403.396758] 1..1 [ 403.397537] KTAP version 1 [ 403.398306] # Subtest: drm_mm [ 403.399058] # module: drm_mm_test [ 403.399066] 1..6 [ 403.400793] ok 1 drm_test_mm_init [ 403.400986] ok 2 drm_test_mm_debug [ 403.401991] ok 3 drm_test_mm_align32 [ 403.403084] ok 4 drm_test_mm_align64 [ 403.404043] ok 5 drm_test_mm_lowest [ 403.405499] ok 6 drm_test_mm_highest [ 403.406322] # drm_mm: pass:6 fail:0 skip:0 total:6 [ 403.407128] # Totals: pass:6 fail:0 skip:0 total:6 [ 403.408031] ok 1 drm_mm [ 403.412045] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/drivers/gpu/drm/tests/drm_mm_test.ko [ 403.414775] 2024-08-23 05:15:36 rmmod drm_mm_test [ 403.458597] 2024-08-23 05:15:36 modprobe -v drm_format_helper_test [ 403.465652] KTAP version 1 [ 403.466437] 1..1 [ 403.467348] KTAP version 1 [ 403.468149] # Subtest: drm_format_helper_test [ 403.469044] # module: drm_format_helper_test [ 403.469052] 1..17 [ 403.470614] KTAP version 1 [ 403.471644] # Subtest: drm_test_fb_xrgb8888_to_gray8 [ 403.471865] ok 1 single_pixel_source_buffer [ 403.473009] ok 2 single_pixel_clip_rectangle [ 403.474108] ok 3 well_known_colors [ 403.475191] ok 4 destination_pitch [ 403.476064] # drm_test_fb_xrgb8888_to_gray8: pass:4 fail:0 skip:0 total:4 [ 403.476881] ok 1 drm_test_fb_xrgb8888_to_gray8 [ 403.477940] KTAP version 1 [ 403.479567] # Subtest: drm_test_fb_xrgb8888_to_rgb332 [ 403.479687] ok 1 single_pixel_source_buffer [ 403.480834] ok 2 single_pixel_clip_rectangle [ 403.481857] ok 3 well_known_colors [ 403.482931] ok 4 destination_pitch [ 403.483737] # drm_test_fb_xrgb8888_to_rgb332: pass:4 fail:0 skip:0 total:4 [ 403.484508] ok 2 drm_test_fb_xrgb8888_to_rgb332 [ 403.485534] KTAP version 1 [ 403.487091] # Subtest: drm_test_fb_xrgb8888_to_rgb565 [ 403.487237] ok 1 single_pixel_source_buffer [ 403.488288] ok 2 single_pixel_clip_rectangle [ 403.489429] ok 3 well_known_colors [ 403.490478] ok 4 destination_pitch [ 403.491309] # drm_test_fb_xrgb8888_to_rgb565: pass:4 fail:0 skip:0 total:4 [ 403.492141] ok 3 drm_test_fb_xrgb8888_to_rgb565 [ 403.493255] KTAP version 1 [ 403.494970] # Subtest: drm_test_fb_xrgb8888_to_xrgb1555 [ 403.495119] ok 1 single_pixel_source_buffer [ 403.496291] ok 2 single_pixel_clip_rectangle [ 403.497354] ok 3 well_known_colors [ 403.498416] ok 4 destination_pitch [ 403.499294] # drm_test_fb_xrgb8888_to_xrgb1555: pass:4 fail:0 skip:0 total:4 [ 403.500162] ok 4 drm_test_fb_xrgb8888_to_xrgb1555 [ 403.501309] KTAP version 1 [ 403.503037] # Subtest: drm_test_fb_xrgb8888_to_argb1555 [ 403.503264] ok 1 single_pixel_source_buffer [ 403.504404] ok 2 single_pixel_clip_rectangle [ 403.505448] ok 3 well_known_colors [ 403.506489] ok 4 destination_pitch [ 403.507336] # drm_test_fb_xrgb8888_to_argb1555: pass:4 fail:0 skip:0 total:4 [ 403.508184] ok 5 drm_test_fb_xrgb8888_to_argb1555 [ 403.509316] KTAP version 1 [ 403.511056] # Subtest: drm_test_fb_xrgb8888_to_rgba5551 [ 403.511198] ok 1 single_pixel_source_buffer [ 403.512345] ok 2 single_pixel_clip_rectangle [ 403.513381] ok 3 well_known_colors [ 403.514396] ok 4 destination_pitch [ 403.515277] # drm_test_fb_xrgb8888_to_rgba5551: pass:4 fail:0 skip:0 total:4 [ 403.516140] ok 6 drm_test_fb_xrgb8888_to_rgba5551 [ 403.517244] KTAP version 1 [ 403.518963] # Subtest: drm_test_fb_xrgb8888_to_rgb888 [ 403.519103] ok 1 single_pixel_source_buffer [ 403.520206] ok 2 single_pixel_clip_rectangle [ 403.521221] ok 3 well_known_colors [ 403.522391] ok 4 destination_pitch [ 403.523262] # drm_test_fb_xrgb8888_to_rgb888: pass:4 fail:0 skip:0 total:4 [ 403.524127] ok 7 drm_test_fb_xrgb8888_to_rgb888 [ 403.525220] KTAP version 1 [ 403.526897] # Subtest: drm_test_fb_xrgb8888_to_argb8888 [ 403.527061] ok 1 single_pixel_source_buffer [ 403.528275] ok 2 single_pixel_clip_rectangle [ 403.529297] ok 3 well_known_colors [ 403.530490] ok 4 destination_pitch [ 403.531361] # drm_test_fb_xrgb8888_to_argb8888: pass:4 fail:0 skip:0 total:4 [ 403.532232] ok 8 drm_test_fb_xrgb8888_to_argb8888 [ 403.533414] KTAP version 1 [ 403.535198] # Subtest: drm_test_fb_xrgb8888_to_xrgb2101010 [ 403.535654] ok 1 single_pixel_source_buffer [ 403.536858] ok 2 single_pixel_clip_rectangle [ 403.537933] ok 3 well_known_colors [ 403.539116] ok 4 destination_pitch [ 403.539988] # drm_test_fb_xrgb8888_to_xrgb2101010: pass:4 fail:0 skip:0 total:4 [ 403.540868] ok 9 drm_test_fb_xrgb8888_to_xrgb2101010 [ 403.542044] KTAP version 1 [ 403.543880] # Subtest: drm_test_fb_xrgb8888_to_argb2101010 [ 403.544032] ok 1 single_pixel_source_buffer [ 403.545267] ok 2 single_pixel_clip_rectangle [ 403.546341] ok 3 well_known_colors [ 403.547417] ok 4 destination_pitch [ 403.548293] # drm_test_fb_xrgb8888_to_argb2101010: pass:4 fail:0 skip:0 total:4 [ 403.549167] ok 10 drm_test_fb_xrgb8888_to_argb2101010 [ 403.550360] KTAP version 1 [ 403.552189] # Subtest: drm_test_fb_xrgb8888_to_mono [ 403.552411] ok 1 single_pixel_source_buffer [ 403.553559] ok 2 single_pixel_clip_rectangle [ 403.554623] ok 3 well_known_colors [ 403.555693] ok 4 destination_pitch [ 403.556568] # drm_test_fb_xrgb8888_to_mono: pass:4 fail:0 skip:0 total:4 [ 403.557443] ok 11 drm_test_fb_xrgb8888_to_mono [ 403.558569] KTAP version 1 [ 403.560336] # Subtest: drm_test_fb_swab [ 403.560483] ok 1 single_pixel_source_buffer [ 403.561532] ok 2 single_pixel_clip_rectangle [ 403.562611] ok 3 well_known_colors [ 403.563693] ok 4 destination_pitch [ 403.564560] # drm_test_fb_swab: pass:4 fail:0 skip:0 total:4 [ 403.565426] ok 12 drm_test_fb_swab [ 403.566455] KTAP version 1 [ 403.568108] # Subtest: drm_test_fb_xrgb8888_to_xbgr8888 [ 403.568232] ok 1 single_pixel_source_buffer [ 403.569391] ok 2 single_pixel_clip_rectangle [ 403.570443] ok 3 well_known_colors [ 403.571500] ok 4 destination_pitch [ 403.572357] # drm_test_fb_xrgb8888_to_xbgr8888: pass:4 fail:0 skip:0 total:4 [ 403.573215] ok 13 drm_test_fb_xrgb8888_to_xbgr8888 [ 403.574362] KTAP version 1 [ 403.576129] # Subtest: drm_test_fb_xrgb8888_to_abgr8888 [ 403.576412] ok 1 single_pixel_source_buffer [ 403.577565] ok 2 single_pixel_clip_rectangle [ 403.578642] ok 3 well_known_colors [ 403.579700] ok 4 destination_pitch [ 403.580555] # drm_test_fb_xrgb8888_to_abgr8888: pass:4 fail:0 skip:0 total:4 [ 403.581411] ok 14 drm_test_fb_xrgb8888_to_abgr8888 [ 403.582547] KTAP version 1 [ 403.584308] # Subtest: drm_test_fb_clip_offset [ 403.584498] ok 1 pass through [ 403.585572] ok 2 horizontal offset [ 403.586499] ok 3 vertical offset [ 403.587456] ok 4 horizontal and vertical offset [ 403.588392] ok 5 horizontal offset (custom pitch) [ 403.589441] ok 6 vertical offset (custom pitch) [ 403.590503] ok 7 horizontal and vertical offset (custom pitch) [ 403.591450] # drm_test_fb_clip_offset: pass:7 fail:0 skip:0 total:7 [ 403.592500] ok 15 drm_test_fb_clip_offset [ 403.593555] KTAP version 1 [ 403.595214] # Subtest: drm_test_fb_build_fourcc_list [ 403.596330] ok 1 no native formats [ 403.598213] ok 2 XRGB8888 as native format [ 403.600018] ok 3 remove duplicates [ 403.601771] ok 4 convert alpha formats [ 403.603763] ok 5 random formats [ 403.604643] # drm_test_fb_build_fourcc_list: pass:5 fail:0 skip:0 total:5 [ 403.605474] ok 16 drm_test_fb_build_fourcc_list [ 403.606584] KTAP version 1 [ 403.608340] # Subtest: drm_test_fb_memcpy [ 403.608565] ok 1 single_pixel_source_buffer: XR24 little-endian (0x34325258) [ 403.609672] ok 2 single_pixel_source_buffer: XRA8 little-endian (0x38415258) [ 403.611066] ok 3 single_pixel_source_buffer: YU24 little-endian (0x34325559) [ 403.612494] ok 4 single_pixel_clip_rectangle: XB24 little-endian (0x34324258) [ 403.613908] ok 5 single_pixel_clip_rectangle: XRA8 little-endian (0x38415258) [ 403.615352] ok 6 single_pixel_clip_rectangle: YU24 little-endian (0x34325559) [ 403.616684] ok 7 well_known_colors: XB24 little-endian (0x34324258) [ 403.618007] ok 8 well_known_colors: XRA8 little-endian (0x38415258) [ 403.619299] ok 9 well_known_colors: YU24 little-endian (0x34325559) [ 403.620524] ok 10 destination_pitch: XB24 little-endian (0x34324258) [ 403.621809] ok 11 destination_pitch: XRA8 little-endian (0x38415258) [ 403.623163] ok 12 destination_pitch: YU24 little-endian (0x34325559) [ 403.624273] # drm_test_fb_memcpy: pass:12 fail:0 skip:0 total:12 [ 403.625360] ok 17 drm_test_fb_memcpy [ 403.626392] # drm_format_helper_test: pass:17 fail:0 skip:0 total:17 [ 403.627226] # Totals: pass:80 fail:0 skip:0 total:80 [ 403.628263] ok 1 drm_format_helper_test [ 403.633352] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/drivers/gpu/drm/tests/drm_kunit_helpers.ko [ 403.637369] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/drivers/gpu/drm/tests/drm_format_helper_test.ko [ 403.640879] 2024-08-23 05:15:36 rmmod drm_format_helper_test [ 403.695782] 2024-08-23 05:15:36 modprobe -v drm_format_test [ 403.701847] KTAP version 1 [ 403.702658] 1..1 [ 403.703513] KTAP version 1 [ 403.704339] # Subtest: drm_format [ 403.705161] # module: drm_format_test [ 403.705169] 1..18 [ 403.706940] ok 1 drm_test_format_block_width_invalid [ 403.707425] ok 2 drm_test_format_block_width_one_plane [ 403.708622] ok 3 drm_test_format_block_width_two_plane [ 403.709801] ok 4 drm_test_format_block_width_three_plane [ 403.710853] ok 5 drm_test_format_block_width_tiled [ 403.711932] ok 6 drm_test_format_block_height_invalid [ 403.713383] ok 7 drm_test_format_block_height_one_plane [ 403.714465] ok 8 drm_test_format_block_height_two_plane [ 403.715605] ok 9 drm_test_format_block_height_three_plane [ 403.716709] ok 10 drm_test_format_block_height_tiled [ 403.717848] ok 11 drm_test_format_min_pitch_invalid [ 403.718909] ok 12 drm_test_format_min_pitch_one_plane_8bpp [ 403.719945] ok 13 drm_test_format_min_pitch_one_plane_16bpp [ 403.721086] ok 14 drm_test_format_min_pitch_one_plane_24bpp [ 403.722171] ok 15 drm_test_format_min_pitch_one_plane_32bpp [ 403.723247] ok 16 drm_test_format_min_pitch_two_plane [ 403.724319] ok 17 drm_test_format_min_pitch_three_plane_8bpp [ 403.725358] ok 18 drm_test_format_min_pitch_tiled [ 403.726333] # drm_format: pass:18 fail:0 skip:0 total:18 [ 403.727229] # Totals: pass:18 fail:0 skip:0 total:18 [ 403.728154] ok 1 drm_format [ 403.732174] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/drivers/gpu/drm/tests/drm_format_test.ko [ 403.734933] 2024-08-23 05:15:36 rmmod drm_format_test [ 403.787697] 2024-08-23 05:15:36 modprobe -v drm_framebuffer_test [ 403.792062] KTAP version 1 [ 403.792820] 1..1 [ 403.793568] KTAP version 1 [ 403.794307] # Subtest: drm_framebuffer [ 403.795082] # module: drm_framebuffer_test [ 403.795096] 1..1 [ 403.796446] KTAP version 1 [ 403.797136] # Subtest: drm_test_framebuffer_create [ 403.797428] ok 1 ABGR8888 normal sizes [ 403.798397] ok 2 ABGR8888 max sizes [ 403.799353] ok 3 ABGR8888 pitch greater than min required [ 403.800207] ok 4 ABGR8888 pitch less than min required [ 403.801381] ok 5 ABGR8888 Invalid width [ 403.802413] ok 6 ABGR8888 Invalid buffer handle [ 403.803307] ok 7 No pixel format [ 403.804337] ok 8 ABGR8888 Width 0 [ 403.805336] ok 9 ABGR8888 Height 0 [ 403.806210] ok 10 ABGR8888 Out of bound height * pitch combination [ 403.807195] ok 11 ABGR8888 Large buffer offset [ 403.808321] ok 12 ABGR8888 Set DRM_MODE_FB_MODIFIERS without modifiers [ 403.809376] ok 13 ABGR8888 Valid buffer modifier [ 403.810841] ok 14 ABGR8888 Invalid buffer modifier(DRM_FORMAT_MOD_SAMSUNG_64_32_TILE) [ 403.811864] ok 15 ABGR8888 Extra pitches without DRM_MODE_FB_MODIFIERS [ 403.813239] ok 16 ABGR8888 Extra pitches with DRM_MODE_FB_MODIFIERS [ 403.814432] ok 17 NV12 Normal sizes [ 403.815617] ok 18 NV12 Max sizes [ 403.816562] ok 19 NV12 Invalid pitch [ 403.817480] ok 20 NV12 Invalid modifier/missing DRM_MODE_FB_MODIFIERS flag [ 403.818427] ok 21 NV12 different modifier per-plane [ 403.819699] ok 22 NV12 with DRM_FORMAT_MOD_SAMSUNG_64_32_TILE [ 403.820777] ok 23 NV12 Valid modifiers without DRM_MODE_FB_MODIFIERS [ 403.822030] ok 24 NV12 Modifier for inexistent plane [ 403.823458] ok 25 NV12 Handle for inexistent plane [ 403.824559] ok 26 NV12 Handle for inexistent plane without DRM_MODE_FB_MODIFIERS [ 403.825645] ok 27 YVU420 DRM_MODE_FB_MODIFIERS set without modifier [ 403.826950] ok 28 YVU420 Normal sizes [ 403.828161] ok 29 YVU420 Max sizes [ 403.829154] ok 30 YVU420 Invalid pitch [ 403.830112] ok 31 YVU420 Different pitches [ 403.831076] ok 32 YVU420 Different buffer offsets/pitches [ 403.832064] ok 33 YVU420 Modifier set just for plane 0, without DRM_MODE_FB_MODIFIERS [ 403.833157] ok 34 YVU420 Modifier set just for planes 0, 1, without DRM_MODE_FB_MODIFIERS [ 403.834535] ok 35 YVU420 Modifier set just for plane 0, 1, with DRM_MODE_FB_MODIFIERS [ 403.835923] ok 36 YVU420 Valid modifier [ 403.837397] ok 37 YVU420 Different modifiers per plane [ 403.838386] ok 38 YVU420 Modifier for inexistent plane [ 403.839476] ok 39 X0L2 Normal sizes [ 403.840566] ok 40 X0L2 Max sizes [ 403.841552] ok 41 X0L2 Invalid pitch [ 403.842500] ok 42 X0L2 Pitch greater than minimum required [ 403.843461] ok 43 X0L2 Handle for inexistent plane [ 403.844575] ok 44 X0L2 Offset for inexistent plane, without DRM_MODE_FB_MODIFIERS set [ 403.845636] ok 45 X0L2 Modifier without DRM_MODE_FB_MODIFIERS set [ 403.847018] ok 46 X0L2 Valid modifier [ 403.848330] ok 47 X0L2 Modifier for inexistent plane [ 403.849226] # drm_test_framebuffer_create: pass:47 fail:0 skip:0 total:47 [ 403.850262] ok 1 drm_test_framebuffer_create [ 403.851395] # Totals: pass:47 fail:0 skip:0 total:47 [ 403.852311] ok 1 drm_framebuffer [ 403.856857] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/drivers/gpu/drm/tests/drm_framebuffer_test.ko [ 403.859811] 2024-08-23 05:15:36 rmmod drm_framebuffer_test [ 403.914171] 2024-08-23 05:15:36 modprobe -v drm_plane_helper_test [ 403.918673] KTAP version 1 [ 403.919479] 1..1 [ 403.920337] KTAP version 1 [ 403.921170] # Subtest: drm_plane_helper [ 403.922035] # module: drm_plane_helper_test [ 403.922042] 1..2 [ 403.923599] KTAP version 1 [ 403.924381] # Subtest: drm_test_check_plane_state [ 403.924687] ok 1 clipping_simple [ 403.925762] ok 2 clipping_rotate_reflect [ 403.926778] ok 3 positioning_simple [ 403.927984] ok 4 upscaling [ 403.928931] ok 5 downscaling [ 403.929963] ok 6 rounding1 [ 403.930877] ok 7 rounding2 [ 403.931858] ok 8 rounding3 [ 403.932777] ok 9 rounding4 [ 403.933570] # drm_test_check_plane_state: pass:9 fail:0 skip:0 total:9 [ 403.934334] ok 1 drm_test_check_plane_state [ 403.935539] KTAP version 1 [ 403.937160] # Subtest: drm_test_check_invalid_plane_state [ 403.937363] ok 1 positioning_invalid [ 403.938520] ok 2 upscaling_invalid [ 403.939584] ok 3 downscaling_invalid [ 403.940435] # drm_test_check_invalid_plane_state: pass:3 fail:0 skip:0 total:3 [ 403.941299] ok 2 drm_test_check_invalid_plane_state [ 403.942463] # drm_plane_helper: pass:2 fail:0 skip:0 total:2 [ 403.943426] # Totals: pass:12 fail:0 skip:0 total:12 [ 403.944426] ok 1 drm_plane_helper [ 403.948546] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/drivers/gpu/drm/tests/drm_plane_helper_test.ko [ 403.951529] 2024-08-23 05:15:36 rmmod drm_plane_helper_test [ 403.988637] 2024-08-23 05:15:36 modprobe -v drm_rect_test [ 403.993337] KTAP version 1 [ 403.994127] 1..1 [ 403.994931] KTAP version 1 [ 403.995695] # Subtest: drm_rect [ 403.996455] # module: drm_rect_test [ 403.996464] 1..9 [ 403.998207] ok 1 drm_test_rect_clip_scaled_div_by_zero [ 403.998661] ok 2 drm_test_rect_clip_scaled_not_clipped [ 403.999664] ok 3 drm_test_rect_clip_scaled_clipped [ 404.000802] ok 4 drm_test_rect_clip_scaled_signed_vs_unsigned [ 404.001690] KTAP version 1 [ 404.003842] # Subtest: drm_test_rect_intersect [ 404.004063] ok 1 top-left x bottom-right: 2x2+1+1 x 2x2+0+0 [ 404.005044] ok 2 top-right x bottom-left: 2x2+0+0 x 2x2+1-1 [ 404.006176] ok 3 bottom-left x top-right: 2x2+1-1 x 2x2+0+0 [ 404.007316] ok 4 bottom-right x top-left: 2x2+0+0 x 2x2+1+1 [ 404.008462] ok 5 right x left: 2x1+0+0 x 3x1+1+0 [ 404.009672] ok 6 left x right: 3x1+1+0 x 2x1+0+0 [ 404.010805] ok 7 up x bottom: 1x2+0+0 x 1x3+0-1 [ 404.011935] ok 8 bottom x up: 1x3+0-1 x 1x2+0+0 [ 404.012949] ok 9 touching corner: 1x1+0+0 x 2x2+1+1 [ 404.013988] ok 10 touching side: 1x1+0+0 x 1x1+1+0 [ 404.015065] ok 11 equal rects: 2x2+0+0 x 2x2+0+0 [ 404.016136] ok 12 inside another: 2x2+0+0 x 1x1+1+1 [ 404.017201] ok 13 far away: 1x1+0+0 x 1x1+3+6 [ 404.018297] ok 14 points intersecting: 0x0+5+10 x 0x0+5+10 [ 404.019340] ok 15 points not intersecting: 0x0+0+0 x 0x0+5+10 [ 404.020405] # drm_test_rect_intersect: pass:15 fail:0 skip:0 total:15 [ 404.021462] ok 5 drm_test_rect_intersect [ 404.022551] KTAP version 1 [ 404.024242] # Subtest: drm_test_rect_calc_hscale [ 404.024431] ok 1 normal use [ 404.025520] ok 2 out of max range [ 404.026447] ok 3 out of min range [ 404.027394] ok 4 zero dst [ 404.028327] ------------[ cut here ]------------ [ 404.029992] WARNING: CPU: 25 PID: 5789 at drivers/gpu/drm/drm_rect.c:138 drm_calc_scale+0x30/0x40 [drm_kms_helper] [ 404.031377] Modules linked in: drm_rect_test drm_kunit_helpers drm_display_helper drm_kms_helper linear_ranges intel_rapl_msr intel_rapl_common skx_edac_common nfit sd_mod sg libnvdimm x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm crct10dif_pclmul crc32_generic crc32_pclmul ghash_clmulni_intel sha512_ssse3 btrfs blake2b_generic xor raid6_pq libcrc32c snd_soc_avs snd_soc_hda_codec snd_hda_ext_core snd_hda_codec snd_hda_core snd_intel_dspcfg crc32c_intel rapl snd_soc_core snd_compress ahci snd_pcm libahci intel_cstate ipmi_devintf ipmi_msghandler nvme intel_uncore wmi_bmof intel_wmi_thunderbolt mxm_wmi wdat_wdt snd_timer mei_me libata nvme_core snd ioatdma mei soundcore dca wmi binfmt_misc drm fuse loop dm_mod ip_tables cts xts [last unloaded: drm_plane_helper_test] [ 404.040236] CPU: 25 UID: 0 PID: 5789 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 404.042239] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 404.043257] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 404.044670] RIP: 0010:drm_calc_scale+0x30/0x40 [drm_kms_helper] [ 404.045805] Code: f8 09 f0 78 25 31 c0 85 f6 74 0e 89 f0 c1 e0 10 39 c7 7f 0a 89 f8 99 f7 fe c3 cc cc cc cc 8d 44 37 ff 99 f7 fe c3 cc cc cc cc <0f> 0b b8 ea ff ff ff c3 cc cc cc cc 0f 1f 40 00 90 90 90 90 90 90 [ 404.048596] RSP: 0018:ffffc9000247fd10 EFLAGS: 00010286 [ 404.049713] RAX: 00000000ffff0000 RBX: ffffc900013df7c8 RCX: 000000007fffffff [ 404.050989] RDX: 0000000000000000 RSI: 0000000000010000 RDI: 00000000ffff0000 [ 404.052266] RBP: 0000000000010000 R08: 0000000000000000 R09: ffffed1033f4c9a0 [ 404.053538] R10: ffff88819fa64d07 R11: 0000000000000101 R12: 0000000000000000 [ 404.054813] R13: 000000007fffffff R14: 00000000ffff0000 R15: ffffc9000247fe40 [ 404.056091] FS: 0000000000000000(0000) GS:ffff889fc3e80000(0000) knlGS:0000000000000000 [ 404.057456] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 404.058631] CR2: 00005587c4652b28 CR3: 000000209c662006 CR4: 00000000003706f0 [ 404.059930] DR0: ffffffff8741b3e4 DR1: ffffffff8741b3e5 DR2: ffffffff8741b3e6 [ 404.061233] DR3: ffffffff8741b3e7 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 404.062541] Call Trace: [ 404.063467] [ 404.064359] ? __warn+0xcc/0x260 [ 404.065346] ? drm_calc_scale+0x30/0x40 [drm_kms_helper] [ 404.066521] ? report_bug+0x261/0x2c0 [ 404.067544] ? handle_bug+0x3c/0x70 [ 404.068549] ? exc_invalid_op+0x17/0x40 [ 404.069577] ? asm_exc_invalid_op+0x1a/0x20 [ 404.070631] ? drm_calc_scale+0x30/0x40 [drm_kms_helper] [ 404.071790] drm_rect_calc_hscale+0xdc/0x150 [drm_kms_helper] [ 404.072988] drm_test_rect_calc_hscale+0xf1/0x260 [drm_rect_test] [ 404.074203] ? __pfx_drm_test_rect_calc_hscale+0x10/0x10 [drm_rect_test] [ 404.075470] ? __schedule+0x7ec/0x1950 [ 404.076500] ? ktime_get_ts64+0x7f/0x230 [ 404.077550] kunit_try_run_case+0x1b0/0x490 [ 404.078624] ? __pfx_kunit_try_run_case+0x10/0x10 [ 404.079739] ? set_cpus_allowed_ptr+0x85/0xc0 [ 404.080810] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 404.081911] ? __pfx_kunit_try_run_case+0x10/0x10 [ 404.082979] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 404.084146] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 404.085243] kthread+0x2d8/0x3c0 [ 404.086146] ? __pfx_kthread+0x10/0x10 [ 404.087072] ret_from_fork+0x31/0x70 [ 404.087967] ? __pfx_kthread+0x10/0x10 [ 404.088858] ret_from_fork_asm+0x1a/0x30 [ 404.089748] [ 404.090482] ---[ end trace 0000000000000000 ]--- [ 404.091603] ok 5 negative src [ 404.091695] ------------[ cut here ]------------ [ 404.093515] WARNING: CPU: 9 PID: 5791 at drivers/gpu/drm/drm_rect.c:138 drm_calc_scale+0x30/0x40 [drm_kms_helper] [ 404.094903] Modules linked in: drm_rect_test drm_kunit_helpers drm_display_helper drm_kms_helper linear_ranges intel_rapl_msr intel_rapl_common skx_edac_common nfit sd_mod sg libnvdimm x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm crct10dif_pclmul crc32_generic crc32_pclmul ghash_clmulni_intel sha512_ssse3 btrfs blake2b_generic xor raid6_pq libcrc32c snd_soc_avs snd_soc_hda_codec snd_hda_ext_core snd_hda_codec snd_hda_core snd_intel_dspcfg crc32c_intel rapl snd_soc_core snd_compress ahci snd_pcm libahci intel_cstate ipmi_devintf ipmi_msghandler nvme intel_uncore wmi_bmof intel_wmi_thunderbolt mxm_wmi wdat_wdt snd_timer mei_me libata nvme_core snd ioatdma mei soundcore dca wmi binfmt_misc drm fuse loop dm_mod ip_tables cts xts [last unloaded: drm_plane_helper_test] [ 404.104133] CPU: 9 UID: 0 PID: 5791 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 404.106190] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 404.107226] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 404.108652] RIP: 0010:drm_calc_scale+0x30/0x40 [drm_kms_helper] [ 404.109797] Code: f8 09 f0 78 25 31 c0 85 f6 74 0e 89 f0 c1 e0 10 39 c7 7f 0a 89 f8 99 f7 fe c3 cc cc cc cc 8d 44 37 ff 99 f7 fe c3 cc cc cc cc <0f> 0b b8 ea ff ff ff c3 cc cc cc cc 0f 1f 40 00 90 90 90 90 90 90 [ 404.112606] RSP: 0018:ffffc900024cfd10 EFLAGS: 00010286 [ 404.113726] RAX: 00000000ffff0000 RBX: ffffc900013df7c8 RCX: 000000007fffffff [ 404.115009] RDX: 0000000000000000 RSI: 00000000ffff0000 RDI: 0000000000010000 [ 404.116294] RBP: 00000000ffff0000 R08: 0000000000000000 R09: ffffed1033f4cb00 [ 404.117580] R10: ffff88819fa65807 R11: 00000000000001b3 R12: 0000000000000000 [ 404.118871] R13: 000000007fffffff R14: 0000000000010000 R15: ffffc900024cfe40 [ 404.120161] FS: 0000000000000000(0000) GS:ffff889fc3680000(0000) knlGS:0000000000000000 [ 404.121534] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 404.122716] CR2: 000055d9c7e70722 CR3: 000000209c662005 CR4: 00000000003706f0 [ 404.124017] DR0: ffffffff8741b3a4 DR1: ffffffff8741b3a5 DR2: ffffffff8741b3a6 [ 404.125316] DR3: ffffffff8741b3a7 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 404.126620] Call Trace: [ 404.127545] [ 404.128436] ? __warn+0xcc/0x260 [ 404.129421] ? drm_calc_scale+0x30/0x40 [drm_kms_helper] [ 404.130595] ? report_bug+0x261/0x2c0 [ 404.131618] ? handle_bug+0x3c/0x70 [ 404.132622] ? exc_invalid_op+0x17/0x40 [ 404.133647] ? asm_exc_invalid_op+0x1a/0x20 [ 404.134700] ? drm_calc_scale+0x30/0x40 [drm_kms_helper] [ 404.135867] drm_rect_calc_hscale+0xdc/0x150 [drm_kms_helper] [ 404.137073] drm_test_rect_calc_hscale+0xf1/0x260 [drm_rect_test] [ 404.138295] ? __pfx_drm_test_rect_calc_hscale+0x10/0x10 [drm_rect_test] [ 404.139573] ? __schedule+0x7ec/0x1950 [ 404.140613] ? ktime_get_ts64+0x7f/0x230 [ 404.141665] kunit_try_run_case+0x1b0/0x490 [ 404.142739] ? __pfx_kunit_try_run_case+0x10/0x10 [ 404.143854] ? set_cpus_allowed_ptr+0x85/0xc0 [ 404.144926] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 404.146027] ? __pfx_kunit_try_run_case+0x10/0x10 [ 404.147095] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 404.148263] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 404.149359] kthread+0x2d8/0x3c0 [ 404.150261] ? __pfx_kthread+0x10/0x10 [ 404.151189] ret_from_fork+0x31/0x70 [ 404.152085] ? __pfx_kthread+0x10/0x10 [ 404.152976] ret_from_fork_asm+0x1a/0x30 [ 404.153867] [ 404.154602] ---[ end trace 0000000000000000 ]--- [ 404.155679] ok 6 negative dst [ 404.155688] # drm_test_rect_calc_hscale: pass:6 fail:0 skip:0 total:6 [ 404.156612] ok 6 drm_test_rect_calc_hscale [ 404.157719] KTAP version 1 [ 404.159384] # Subtest: drm_test_rect_calc_vscale [ 404.159638] ok 1 normal use [ 404.160733] ok 2 out of max range [ 404.161658] ok 3 out of min range [ 404.162644] ok 4 zero dst [ 404.163578] ------------[ cut here ]------------ [ 404.165274] WARNING: CPU: 35 PID: 5801 at drivers/gpu/drm/drm_rect.c:138 drm_calc_scale+0x30/0x40 [drm_kms_helper] [ 404.166633] Modules linked in: drm_rect_test drm_kunit_helpers drm_display_helper drm_kms_helper linear_ranges intel_rapl_msr intel_rapl_common skx_edac_common nfit sd_mod sg libnvdimm x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm crct10dif_pclmul crc32_generic crc32_pclmul ghash_clmulni_intel sha512_ssse3 btrfs blake2b_generic xor raid6_pq libcrc32c snd_soc_avs snd_soc_hda_codec snd_hda_ext_core snd_hda_codec snd_hda_core snd_intel_dspcfg crc32c_intel rapl snd_soc_core snd_compress ahci snd_pcm libahci intel_cstate ipmi_devintf ipmi_msghandler nvme intel_uncore wmi_bmof intel_wmi_thunderbolt mxm_wmi wdat_wdt snd_timer mei_me libata nvme_core snd ioatdma mei soundcore dca wmi binfmt_misc drm fuse loop dm_mod ip_tables cts xts [last unloaded: drm_plane_helper_test] [ 404.175665] CPU: 35 UID: 0 PID: 5801 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 404.177761] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 404.178798] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 404.180228] RIP: 0010:drm_calc_scale+0x30/0x40 [drm_kms_helper] [ 404.181454] Code: f8 09 f0 78 25 31 c0 85 f6 74 0e 89 f0 c1 e0 10 39 c7 7f 0a 89 f8 99 f7 fe c3 cc cc cc cc 8d 44 37 ff 99 f7 fe c3 cc cc cc cc <0f> 0b b8 ea ff ff ff c3 cc cc cc cc 0f 1f 40 00 90 90 90 90 90 90 [ 404.184273] RSP: 0018:ffffc900026afd10 EFLAGS: 00010286 [ 404.185388] RAX: 00000000ffff0000 RBX: ffffc900013df7c8 RCX: 000000007fffffff [ 404.186743] RDX: 0000000000000000 RSI: 0000000000010000 RDI: 00000000ffff0000 [ 404.188028] RBP: 0000000000010000 R08: 0000000000000000 R09: ffffed1033f4ca40 [ 404.189301] R10: ffff88819fa65207 R11: 000000000000009a R12: 0000000000000000 [ 404.190577] R13: 000000007fffffff R14: 00000000ffff0000 R15: ffffc900026afe40 [ 404.191919] FS: 0000000000000000(0000) GS:ffff889fc4380000(0000) knlGS:0000000000000000 [ 404.193293] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 404.194473] CR2: 00007f2a82c4f620 CR3: 000000209c662006 CR4: 00000000003706f0 [ 404.195769] DR0: ffffffff8741b40c DR1: ffffffff8741b40d DR2: ffffffff8741b40e [ 404.197090] DR3: ffffffff8741b40f DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 404.198387] Call Trace: [ 404.199304] [ 404.200191] ? __warn+0xcc/0x260 [ 404.201173] ? drm_calc_scale+0x30/0x40 [drm_kms_helper] [ 404.202395] ? report_bug+0x261/0x2c0 [ 404.203418] ? handle_bug+0x3c/0x70 [ 404.204422] ? exc_invalid_op+0x17/0x40 [ 404.205450] ? asm_exc_invalid_op+0x1a/0x20 [ 404.206581] ? drm_calc_scale+0x30/0x40 [drm_kms_helper] [ 404.207755] drm_rect_calc_vscale+0xe5/0x150 [drm_kms_helper] [ 404.208954] drm_test_rect_calc_vscale+0xf1/0x260 [drm_rect_test] [ 404.210168] ? __pfx_drm_test_rect_calc_vscale+0x10/0x10 [drm_rect_test] [ 404.211507] ? __schedule+0x7ec/0x1950 [ 404.212557] ? ktime_get_ts64+0x7f/0x230 [ 404.213607] kunit_try_run_case+0x1b0/0x490 [ 404.214680] ? __pfx_kunit_try_run_case+0x10/0x10 [ 404.215814] ? set_cpus_allowed_ptr+0x85/0xc0 [ 404.216904] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 404.218005] ? __pfx_kunit_try_run_case+0x10/0x10 [ 404.219075] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 404.220243] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 404.221410] kthread+0x2d8/0x3c0 [ 404.222364] ? __pfx_kthread+0x10/0x10 [ 404.223292] ret_from_fork+0x31/0x70 [ 404.224189] ? __pfx_kthread+0x10/0x10 [ 404.225080] ret_from_fork_asm+0x1a/0x30 [ 404.225970] [ 404.226770] ---[ end trace 0000000000000000 ]--- [ 404.227866] ok 5 negative src [ 404.227950] ------------[ cut here ]------------ [ 404.229809] WARNING: CPU: 8 PID: 5803 at drivers/gpu/drm/drm_rect.c:138 drm_calc_scale+0x30/0x40 [drm_kms_helper] [ 404.231195] Modules linked in: drm_rect_test drm_kunit_helpers drm_display_helper drm_kms_helper linear_ranges intel_rapl_msr intel_rapl_common skx_edac_common nfit sd_mod sg libnvdimm x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm crct10dif_pclmul crc32_generic crc32_pclmul ghash_clmulni_intel sha512_ssse3 btrfs blake2b_generic xor raid6_pq libcrc32c snd_soc_avs snd_soc_hda_codec snd_hda_ext_core snd_hda_codec snd_hda_core snd_intel_dspcfg crc32c_intel rapl snd_soc_core snd_compress ahci snd_pcm libahci intel_cstate ipmi_devintf ipmi_msghandler nvme intel_uncore wmi_bmof intel_wmi_thunderbolt mxm_wmi wdat_wdt snd_timer mei_me libata nvme_core snd ioatdma mei soundcore dca wmi binfmt_misc drm fuse loop dm_mod ip_tables cts xts [last unloaded: drm_plane_helper_test] [ 404.240434] CPU: 8 UID: 0 PID: 5803 Comm: kunit_try_catch Tainted: G B W N 6.11.0-rc2-00008-g2377a7d90f5b #1 [ 404.242493] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 404.243530] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021 [ 404.244961] RIP: 0010:drm_calc_scale+0x30/0x40 [drm_kms_helper] [ 404.246105] Code: f8 09 f0 78 25 31 c0 85 f6 74 0e 89 f0 c1 e0 10 39 c7 7f 0a 89 f8 99 f7 fe c3 cc cc cc cc 8d 44 37 ff 99 f7 fe c3 cc cc cc cc <0f> 0b b8 ea ff ff ff c3 cc cc cc cc 0f 1f 40 00 90 90 90 90 90 90 [ 404.248918] RSP: 0018:ffffc90002777d10 EFLAGS: 00010286 [ 404.250041] RAX: 00000000ffff0000 RBX: ffffc900013df7c8 RCX: 000000007fffffff [ 404.251323] RDX: 0000000000000000 RSI: 00000000ffff0000 RDI: 0000000000010000 [ 404.252612] RBP: 00000000ffff0000 R08: 0000000000000000 R09: ffffed1033f4c840 [ 404.253903] R10: ffff88819fa64207 R11: 0000000000000365 R12: 0000000000000000 [ 404.255194] R13: 000000007fffffff R14: 0000000000010000 R15: ffffc90002777e40 [ 404.256487] FS: 0000000000000000(0000) GS:ffff889fc3600000(0000) knlGS:0000000000000000 [ 404.257866] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 404.259050] CR2: 000056455377c2c8 CR3: 000000209c662003 CR4: 00000000003706f0 [ 404.260350] DR0: ffffffff8741b3a0 DR1: ffffffff8741b3a1 DR2: ffffffff8741b3a2 [ 404.261652] DR3: ffffffff8741b3a3 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 404.262959] Call Trace: [ 404.263885] [ 404.264778] ? __warn+0xcc/0x260 [ 404.265764] ? drm_calc_scale+0x30/0x40 [drm_kms_helper] [ 404.266939] ? report_bug+0x261/0x2c0 [ 404.267963] ? handle_bug+0x3c/0x70 [ 404.268970] ? exc_invalid_op+0x17/0x40 [ 404.269998] ? asm_exc_invalid_op+0x1a/0x20 [ 404.271055] ? drm_calc_scale+0x30/0x40 [drm_kms_helper] [ 404.272225] drm_rect_calc_vscale+0xe5/0x150 [drm_kms_helper] [ 404.273434] drm_test_rect_calc_vscale+0xf1/0x260 [drm_rect_test] [ 404.274659] ? __pfx_drm_test_rect_calc_vscale+0x10/0x10 [drm_rect_test] [ 404.275942] ? __schedule+0x7ec/0x1950 [ 404.276984] ? ktime_get_ts64+0x7f/0x230 [ 404.278041] kunit_try_run_case+0x1b0/0x490 [ 404.279121] ? __pfx_kunit_try_run_case+0x10/0x10 [ 404.280243] ? set_cpus_allowed_ptr+0x85/0xc0 [ 404.281323] ? __pfx_set_cpus_allowed_ptr+0x10/0x10 [ 404.282447] ? __pfx_kunit_try_run_case+0x10/0x10 [ 404.283538] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 404.284731] kunit_generic_run_threadfn_adapter+0x7d/0xe0 [ 404.285832] kthread+0x2d8/0x3c0 [ 404.286739] ? __pfx_kthread+0x10/0x10 [ 404.287670] ret_from_fork+0x31/0x70 [ 404.288585] ? __pfx_kthread+0x10/0x10 [ 404.289498] ret_from_fork_asm+0x1a/0x30 [ 404.290408] [ 404.291152] ---[ end trace 0000000000000000 ]--- [ 404.292234] ok 6 negative dst [ 404.292243] # drm_test_rect_calc_vscale: pass:6 fail:0 skip:0 total:6 [ 404.293105] ok 7 drm_test_rect_calc_vscale [ 404.294200] KTAP version 1 [ 404.295857] # Subtest: drm_test_rect_rotate [ 404.296108] ok 1 reflect-x [ 404.297204] ok 2 reflect-y [ 404.298127] ok 3 rotate-0 [ 404.299039] ok 4 rotate-90 [ 404.299973] ok 5 rotate-180 [ 404.300869] ok 6 rotate-270 [ 404.301654] # drm_test_rect_rotate: pass:6 fail:0 skip:0 total:6 [ 404.302410] ok 8 drm_test_rect_rotate [ 404.303385] KTAP version 1 [ 404.304881] # Subtest: drm_test_rect_rotate_inv [ 404.305122] ok 1 reflect-x [ 404.306158] ok 2 reflect-y [ 404.307021] ok 3 rotate-0 [ 404.307893] ok 4 rotate-90 [ 404.308754] ok 5 rotate-180 [ 404.309657] ok 6 rotate-270 [ 404.310461] # drm_test_rect_rotate_inv: pass:6 fail:0 skip:0 total:6 [ 404.311207] ok 9 drm_test_rect_rotate_inv [ 404.312223] # drm_rect: pass:9 fail:0 skip:0 total:9 [ 404.313065] # Totals: pass:43 fail:0 skip:0 total:43 [ 404.313960] ok 1 drm_rect [ 404.318182] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/drivers/gpu/drm/tests/drm_rect_test.ko [ 404.320931] 2024-08-23 05:15:36 rmmod drm_rect_test [ 404.366698] 2024-08-23 05:15:36 modprobe -v clk-gate_test [ 404.372106] KTAP version 1 [ 404.372836] 1..5 [ 404.373561] KTAP version 1 [ 404.374295] # Subtest: clk-gate-register-test [ 404.375125] # module: clk_gate_test [ 404.375133] 1..6 [ 404.377128] ok 1 clk_gate_register_test_dev [ 404.377769] ok 2 clk_gate_register_test_parent_names [ 404.379099] ok 3 clk_gate_register_test_parent_data [ 404.381154] ok 4 clk_gate_register_test_parent_data_legacy [ 404.382468] ok 5 clk_gate_register_test_parent_hw [ 404.383470] gate bit exceeds LOWORD field [ 404.385240] ok 6 clk_gate_register_test_hiword_invalid [ 404.385248] # clk-gate-register-test: pass:6 fail:0 skip:0 total:6 [ 404.386154] # Totals: pass:6 fail:0 skip:0 total:6 [ 404.387121] ok 1 clk-gate-register-test [ 404.388804] KTAP version 1 [ 404.389492] # Subtest: clk-gate-test [ 404.390292] # module: clk_gate_test [ 404.390299] 1..3 [ 404.392330] ok 1 clk_gate_test_parent_rate [ 404.392890] clk_unregister: unregistering prepared clock: test_gate [ 404.394818] clk_unregister: unregistering prepared clock: test_parent [ 404.395886] ok 2 clk_gate_test_enable [ 404.396414] ok 3 clk_gate_test_disable [ 404.397254] # clk-gate-test: pass:3 fail:0 skip:0 total:3 [ 404.398069] # Totals: pass:3 fail:0 skip:0 total:3 [ 404.398992] ok 2 clk-gate-test [ 404.400632] KTAP version 1 [ 404.401373] # Subtest: clk-gate-invert-test [ 404.402241] # module: clk_gate_test [ 404.402248] 1..2 [ 404.404154] clk_unregister: unregistering prepared clock: test_gate [ 404.405246] clk_unregister: unregistering prepared clock: test_parent [ 404.406354] ok 1 clk_gate_test_invert_enable [ 404.406985] ok 2 clk_gate_test_invert_disable [ 404.407871] # clk-gate-invert-test: pass:2 fail:0 skip:0 total:2 [ 404.408748] # Totals: pass:2 fail:0 skip:0 total:2 [ 404.409745] ok 3 clk-gate-invert-test [ 404.411429] KTAP version 1 [ 404.412150] # Subtest: clk-gate-hiword-test [ 404.413006] # module: clk_gate_test [ 404.413012] 1..2 [ 404.414925] clk_unregister: unregistering prepared clock: test_gate [ 404.416173] clk_unregister: unregistering prepared clock: test_parent [ 404.417187] ok 1 clk_gate_test_hiword_enable [ 404.417769] ok 2 clk_gate_test_hiword_disable [ 404.418627] # clk-gate-hiword-test: pass:2 fail:0 skip:0 total:2 [ 404.419492] # Totals: pass:2 fail:0 skip:0 total:2 [ 404.420464] ok 4 clk-gate-hiword-test [ 404.422159] KTAP version 1 [ 404.422882] # Subtest: clk-gate-is_enabled-test [ 404.423775] # module: clk_gate_test [ 404.423782] 1..4 [ 404.425632] ok 1 clk_gate_test_is_enabled [ 404.425955] ok 2 clk_gate_test_is_disabled [ 404.427083] ok 3 clk_gate_test_is_enabled_inverted [ 404.428253] ok 4 clk_gate_test_is_disabled_inverted [ 404.429148] # clk-gate-is_enabled-test: pass:4 fail:0 skip:0 total:4 [ 404.430019] # Totals: pass:4 fail:0 skip:0 total:4 [ 404.430981] ok 5 clk-gate-is_enabled-test [ 404.434877] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/drivers/clk/clk-gate_test.ko [ 404.437959] 2024-08-23 05:15:37 rmmod clk-gate_test [ 404.484070] 2024-08-23 05:15:37 modprobe -v clk_test [ 404.490975] KTAP version 1 [ 404.491718] 1..13 [ 404.492494] KTAP version 1 [ 404.493250] # Subtest: clk-leaf-mux-set-rate-parent [ 404.494148] # module: clk_test [ 404.494156] 1..1 [ 404.495556] KTAP version 1 [ 404.496295] # Subtest: clk_leaf_mux_set_rate_parent_determine_rate_test [ 404.497643] ok 1 clk_leaf_mux_set_rate_parent__clk_determine_rate_proper_parent [ 404.500131] ok 2 clk_leaf_mux_set_rate_parent__clk_mux_determine_rate_proper_parent [ 404.502467] ok 3 clk_leaf_mux_set_rate_parent__clk_mux_determine_rate_closest_proper_parent [ 404.504905] ok 4 clk_leaf_mux_set_rate_parent_clk_hw_determine_rate_no_reparent_proper_parent [ 404.506126] # clk_leaf_mux_set_rate_parent_determine_rate_test: pass:4 fail:0 skip:0 total:4 [ 404.507405] ok 1 clk_leaf_mux_set_rate_parent_determine_rate_test [ 404.508658] # Totals: pass:4 fail:0 skip:0 total:4 [ 404.509718] ok 1 clk-leaf-mux-set-rate-parent [ 404.511556] KTAP version 1 [ 404.512346] # Subtest: clk-test [ 404.513164] # module: clk_test [ 404.513171] 1..4 [ 404.515239] ok 1 clk_test_get_rate [ 404.515608] ok 2 clk_test_set_get_rate [ 404.516761] ok 3 clk_test_set_set_get_rate [ 404.518018] ok 4 clk_test_round_set_get_rate [ 404.518909] # clk-test: pass:4 fail:0 skip:0 total:4 [ 404.519808] # Totals: pass:4 fail:0 skip:0 total:4 [ 404.520751] ok 2 clk-test [ 404.522431] KTAP version 1 [ 404.523197] # Subtest: clk-multiple-parents-mux-test [ 404.524159] # module: clk_test [ 404.524165] 1..3 [ 404.526426] ok 1 clk_test_multiple_parents_mux_get_parent [ 404.527122] ok 2 clk_test_multiple_parents_mux_has_parent [ 404.528905] ok 3 clk_test_multiple_parents_mux_set_range_set_parent_get_rate # SKIP This needs to be fixed in the core. [ 404.529920] # clk-multiple-parents-mux-test: pass:2 fail:0 skip:1 total:3 [ 404.531836] # Totals: pass:2 fail:0 skip:1 total:3 [ 404.532952] ok 3 clk-multiple-parents-mux-test [ 404.534799] KTAP version 1 [ 404.535570] # Subtest: clk-mux-no-reparent [ 404.536482] # module: clk_test [ 404.536488] 1..2 [ 404.538807] ok 1 clk_mux_no_reparent_round_rate [ 404.539470] ok 2 clk_mux_no_reparent_set_rate [ 404.540444] # clk-mux-no-reparent: pass:2 fail:0 skip:0 total:2 [ 404.541366] # Totals: pass:2 fail:0 skip:0 total:2 [ 404.542381] ok 4 clk-mux-no-reparent [ 404.544184] KTAP version 1 [ 404.544987] # Subtest: clk-mux-notifier [ 404.545876] # module: clk_test [ 404.545882] 1..1 [ 404.548367] ok 1 clk_mux_notifier_set_parent_test [ 404.548375] ok 5 clk-mux-notifier [ 404.550159] KTAP version 1 [ 404.550930] # Subtest: clk-orphan-transparent-multiple-parent-mux-test [ 404.552018] # module: clk_test [ 404.552024] 1..9 [ 404.554206] ok 1 clk_test_orphan_transparent_multiple_parent_mux_get_parent [ 404.554709] ok 2 clk_test_orphan_transparent_multiple_parent_mux_set_parent [ 404.556348] ok 3 clk_test_orphan_transparent_multiple_parent_mux_set_parent_drop_range [ 404.558063] ok 4 clk_test_orphan_transparent_multiple_parent_mux_set_parent_get_rate [ 404.559722] ok 5 clk_test_orphan_transparent_multiple_parent_mux_set_parent_put [ 404.561399] ok 6 clk_test_orphan_transparent_multiple_parent_mux_set_parent_set_range_modified [ 404.563059] ok 7 clk_test_orphan_transparent_multiple_parent_mux_set_parent_set_range_untouched [ 404.565012] ok 8 clk_test_orphan_transparent_multiple_parent_mux_set_range_round_rate [ 404.566732] ok 9 clk_test_orphan_transparent_multiple_parent_mux_set_range_set_parent_get_rate # SKIP This needs to be fixed in the core. [ 404.567939] # clk-orphan-transparent-multiple-parent-mux-test: pass:8 fail:0 skip:1 total:9 [ 404.569957] # Totals: pass:8 fail:0 skip:1 total:9 [ 404.571183] ok 6 clk-orphan-transparent-multiple-parent-mux-test [ 404.573203] KTAP version 1 [ 404.573995] # Subtest: clk-orphan-transparent-single-parent-test [ 404.575090] # module: clk_test [ 404.575097] 1..1 [ 404.577177] ok 1 clk_test_orphan_transparent_parent_mux_set_range [ 404.577185] ok 7 clk-orphan-transparent-single-parent-test [ 404.579350] KTAP version 1 [ 404.580135] # Subtest: clk-orphan-two-level-root-last-test [ 404.581179] # module: clk_test [ 404.581191] 1..2 [ 404.583442] ok 1 clk_orphan_two_level_root_last_test_get_rate [ 404.584204] ok 2 clk_orphan_two_level_root_last_test_set_range [ 404.585254] # clk-orphan-two-level-root-last-test: pass:2 fail:0 skip:0 total:2 [ 404.586313] # Totals: pass:2 fail:0 skip:0 total:2 [ 404.587514] ok 8 clk-orphan-two-level-root-last-test [ 404.589462] KTAP version 1 [ 404.590284] # Subtest: clk-range-test [ 404.591174] # module: clk_test [ 404.591181] 1..11 [ 404.593126] ok 1 clk_range_test_set_range [ 404.593300] clk_set_rate_range_nolock: clk test_dummy_rate dev (null) con (null): invalid range [142001000, 142000000] [ 404.596448] ok 2 clk_range_test_set_range_invalid [ 404.596758] ok 3 clk_range_test_multiple_disjoints_range [ 404.598254] ok 4 clk_range_test_set_range_round_rate_lower [ 404.599707] ok 5 clk_range_test_set_range_set_rate_lower [ 404.601214] ok 6 clk_range_test_set_range_set_round_rate_consistent_lower [ 404.602671] ok 7 clk_range_test_set_range_round_rate_higher [ 404.604261] ok 8 clk_range_test_set_range_set_rate_higher [ 404.605723] ok 9 clk_range_test_set_range_set_round_rate_consistent_higher [ 404.607172] ok 10 clk_range_test_set_range_get_rate_raised [ 404.608849] ok 11 clk_range_test_set_range_get_rate_lowered [ 404.609922] # clk-range-test: pass:11 fail:0 skip:0 total:11 [ 404.610982] # Totals: pass:11 fail:0 skip:0 total:11 [ 404.612055] ok 9 clk-range-test [ 404.613935] KTAP version 1 [ 404.614772] # Subtest: clk-range-maximize-test [ 404.615754] # module: clk_test [ 404.615762] 1..3 [ 404.617861] ok 1 clk_range_test_set_range_rate_maximized [ 404.618245] ok 2 clk_range_test_multiple_set_range_rate_maximized [ 404.619690] ok 3 clk_range_test_multiple_set_range_rate_put_maximized [ 404.620813] # clk-range-maximize-test: pass:3 fail:0 skip:0 total:3 [ 404.621927] # Totals: pass:3 fail:0 skip:0 total:3 [ 404.623024] ok 10 clk-range-maximize-test [ 404.624851] KTAP version 1 [ 404.625635] # Subtest: clk-range-minimize-test [ 404.626589] # module: clk_test [ 404.626596] 1..3 [ 404.628497] ok 1 clk_range_test_set_range_rate_minimized [ 404.628934] ok 2 clk_range_test_multiple_set_range_rate_minimized [ 404.630381] ok 3 clk_range_test_multiple_set_range_rate_put_minimized [ 404.631479] # clk-range-minimize-test: pass:3 fail:0 skip:0 total:3 [ 404.632565] # Totals: pass:3 fail:0 skip:0 total:3 [ 404.633607] ok 11 clk-range-minimize-test [ 404.635428] KTAP version 1 [ 404.636195] # Subtest: clk-single-parent-mux-test [ 404.637127] # module: clk_test [ 404.637134] 1..7 [ 404.639243] ok 1 clk_test_single_parent_mux_get_parent [ 404.639747] ok 2 clk_test_single_parent_mux_has_parent [ 404.641280] ok 3 clk_test_single_parent_mux_set_range_disjoint_child_last # SKIP This needs to be fixed in the core. [ 404.642837] ok 4 clk_test_single_parent_mux_set_range_disjoint_parent_last # SKIP This needs to be fixed in the core. [ 404.645404] ok 5 clk_test_single_parent_mux_set_range_round_rate_child_smaller [ 404.647961] ok 6 clk_test_single_parent_mux_set_range_round_rate_parent_only [ 404.649715] ok 7 clk_test_single_parent_mux_set_range_round_rate_parent_smaller [ 404.650914] # clk-single-parent-mux-test: pass:5 fail:0 skip:2 total:7 [ 404.652117] # Totals: pass:5 fail:0 skip:2 total:7 [ 404.653250] ok 12 clk-single-parent-mux-test [ 404.655202] KTAP version 1 [ 404.656032] # Subtest: clk-uncached-test [ 404.656975] # module: clk_test [ 404.656982] 1..3 [ 404.659468] ok 1 clk_test_uncached_get_rate [ 404.659972] ok 2 clk_test_uncached_set_range [ 404.661241] ok 3 clk_test_uncached_updated_rate_set_range [ 404.662177] # clk-uncached-test: pass:3 fail:0 skip:0 total:3 [ 404.663230] # Totals: pass:3 fail:0 skip:0 total:3 [ 404.664261] ok 13 clk-uncached-test [ 404.668826] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/drivers/clk/clk_test.ko [ 404.671594] 2024-08-23 05:15:37 rmmod clk_test [ 404.719345] 2024-08-23 05:15:37 modprobe -v cpumask_kunit [ 404.723898] KTAP version 1 [ 404.724714] 1..1 [ 404.725557] KTAP version 1 [ 404.726391] # Subtest: cpumask [ 404.727204] # module: cpumask_kunit [ 404.727212] 1..6 [ 404.728898] ok 1 test_cpumask_weight [ 404.729174] ok 2 test_cpumask_first [ 404.730152] ok 3 test_cpumask_last [ 404.731156] ok 4 test_cpumask_next [ 404.732156] ok 5 test_cpumask_iterators [ 404.733242] ok 6 test_cpumask_iterators_builtin [ 404.734133] # cpumask: pass:6 fail:0 skip:0 total:6 [ 404.735068] # Totals: pass:6 fail:0 skip:0 total:6 [ 404.736004] ok 1 cpumask [ 404.739817] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/lib/cpumask_kunit.ko [ 404.742407] 2024-08-23 05:15:37 rmmod cpumask_kunit [ 404.765844] 2024-08-23 05:15:37 modprobe -v cros_kunit_proto_test [ 404.774549] KTAP version 1 [ 404.775243] 1..1 [ 404.776122] KTAP version 1 [ 404.776873] # Subtest: cros_ec_proto_test [ 404.777676] # module: cros_kunit_proto_test [ 404.777684] 1..54 [ 404.779431] ok 1 cros_ec_proto_test_prepare_tx_legacy_normal [ 404.779745] ok 2 cros_ec_proto_test_prepare_tx_legacy_bad_msg_outsize [ 404.781052] ok 3 cros_ec_proto_test_prepare_tx_normal [ 404.782158] ok 4 cros_ec_proto_test_prepare_tx_bad_msg_outsize [ 404.783279] ok 5 cros_ec_proto_test_check_result [ 404.784481] ok 6 cros_ec_proto_test_query_all_normal [ 404.785463] cros_ec_proto_test: failed to retrieve wake mask: -71 [ 404.787409] ok 7 cros_ec_proto_test_query_all_no_pd_return_error [ 404.787499] cros_ec_proto_test: failed to retrieve wake mask: -71 [ 404.789569] ok 8 cros_ec_proto_test_query_all_no_pd_return0 [ 404.789661] cros_ec_proto_test: failed to retrieve wake mask: -71 [ 404.791684] ok 9 cros_ec_proto_test_query_all_legacy_normal_v3_return_error [ 404.791801] cros_ec_proto_test: failed to retrieve wake mask: -71 [ 404.793936] ok 10 cros_ec_proto_test_query_all_legacy_normal_v3_return0 [ 404.794157] ok 11 cros_ec_proto_test_query_all_legacy_xfer_error [ 404.795392] cros_ec_proto_test: EC responded to v2 hello with error: 1 [ 404.797596] ok 12 cros_ec_proto_test_query_all_legacy_return_error [ 404.797692] cros_ec_proto_test: EC responded to v2 hello with bad result: 3203383231 [ 404.800072] ok 13 cros_ec_proto_test_query_all_legacy_data_error [ 404.800237] ok 14 cros_ec_proto_test_query_all_legacy_return0 [ 404.801414] cros_ec_proto_test: failed to retrieve wake mask: -71 [ 404.803610] ok 15 cros_ec_proto_test_query_all_no_mkbp [ 404.803799] cros_ec_proto_test: failed to retrieve wake mask: -71 [ 404.806020] ok 16 cros_ec_proto_test_query_all_no_mkbp_return_error [ 404.806204] cros_ec_proto_test: failed to retrieve wake mask: -71 [ 404.808610] ok 17 cros_ec_proto_test_query_all_no_mkbp_return0 [ 404.808732] cros_ec_proto_test: failed to retrieve wake mask: -71 [ 404.811088] ok 18 cros_ec_proto_test_query_all_no_host_sleep [ 404.811210] cros_ec_proto_test: failed to retrieve wake mask: -71 [ 404.813566] ok 19 cros_ec_proto_test_query_all_no_host_sleep_return0 [ 404.813781] ok 20 cros_ec_proto_test_query_all_default_wake_mask_return_error [ 404.815077] cros_ec_proto_test: failed to retrieve wake mask: -71 [ 404.817543] ok 21 cros_ec_proto_test_query_all_default_wake_mask_return0 [ 404.817682] ok 22 cros_ec_proto_test_cmd_xfer_normal [ 404.819062] ok 23 cros_ec_proto_test_cmd_xfer_excess_msg_insize [ 404.820176] cros_ec_proto_test: request of size 256 is too big (max: 255) [ 404.822553] ok 24 cros_ec_proto_test_cmd_xfer_excess_msg_outsize_without_passthru [ 404.822615] cros_ec_proto_test: passthru rq of size 222 is too big (max: 221) [ 404.825271] ok 25 cros_ec_proto_test_cmd_xfer_excess_msg_outsize_with_passthru [ 404.825397] ok 26 cros_ec_proto_test_cmd_xfer_protocol_v3_normal [ 404.826779] cros_ec_proto_test: missing EC transfer API, cannot send command [ 404.829376] ok 27 cros_ec_proto_test_cmd_xfer_protocol_v3_no_op [ 404.829657] ok 28 cros_ec_proto_test_cmd_xfer_protocol_v2_normal [ 404.831032] ok 29 cros_ec_proto_test_cmd_xfer_protocol_v2_no_op [ 404.843097] ok 30 cros_ec_proto_test_cmd_xfer_in_progress_normal [ 405.398204] ok 31 cros_ec_proto_test_cmd_xfer_in_progress_retries_eagain [ 405.955355] ok 32 cros_ec_proto_test_cmd_xfer_in_progress_retries_status_processing [ 405.968544] ok 33 cros_ec_proto_test_cmd_xfer_in_progress_xfer_error [ 405.981404] ok 34 cros_ec_proto_test_cmd_xfer_in_progress_return_error [ 405.994527] ok 35 cros_ec_proto_test_cmd_xfer_in_progress_return0 [ 405.996160] ok 36 cros_ec_proto_test_cmd_xfer_status_normal [ 405.997852] ok 37 cros_ec_proto_test_cmd_xfer_status_xfer_error [ 406.010505] ok 38 cros_ec_proto_test_cmd_xfer_status_return_error [ 406.012017] ok 39 cros_ec_proto_test_get_next_event_no_mkbp_event [ 406.013625] ok 40 cros_ec_proto_test_get_next_event_mkbp_event_ec_suspended [ 406.015512] ok 41 cros_ec_proto_test_get_next_event_mkbp_event_version0 [ 406.016939] ok 42 cros_ec_proto_test_get_next_event_mkbp_event_version2 [ 406.018356] ok 43 cros_ec_proto_test_get_next_event_mkbp_event_host_event_rtc [ 406.019761] ok 44 cros_ec_proto_test_get_next_event_mkbp_event_host_event_masked [ 406.021280] ok 45 cros_ec_proto_test_get_host_event_no_mkbp_event [ 406.022743] ok 46 cros_ec_proto_test_get_host_event_not_host_event [ 406.023942] cros_ec_proto_test: Invalid host event size [ 406.026118] ok 47 cros_ec_proto_test_get_host_event_wrong_event_size [ 406.026495] ok 48 cros_ec_proto_test_get_host_event_normal [ 406.027838] ok 49 cros_ec_proto_test_check_features_cached [ 406.029263] ok 50 cros_ec_proto_test_check_features_not_cached [ 406.030551] ok 51 cros_ec_proto_test_get_sensor_count_normal [ 406.031915] ok 52 cros_ec_proto_test_get_sensor_count_xfer_error [ 406.033304] ok 53 cros_ec_proto_test_get_sensor_count_legacy [ 406.034575] ok 54 cros_ec_proto_test_ec_cmd [ 406.035602] # cros_ec_proto_test: pass:54 fail:0 skip:0 total:54 [ 406.036498] # Totals: pass:54 fail:0 skip:0 total:54 [ 406.037515] ok 1 cros_ec_proto_test [ 406.043238] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/drivers/platform/chrome/cros_kunit_proto_test.ko [ 406.046619] 2024-08-23 05:15:38 rmmod cros_kunit_proto_test [ 406.085175] 2024-08-23 05:15:38 modprobe -v hid-uclogic-test [ 406.093288] KTAP version 1 [ 406.094023] 1..1 [ 406.094836] KTAP version 1 [ 406.095575] # Subtest: hid_uclogic_rdesc_test [ 406.096430] # module: hid_uclogic_test [ 406.096454] 1..1 [ 406.097872] KTAP version 1 [ 406.098587] # Subtest: hid_test_uclogic_template [ 406.098890] ok 1 empty_template [ 406.099893] ok 2 template_smaller_than_the_placeholder [ 406.100977] ok 3 no_placeholder [ 406.102023] ok 4 pen_placeholder_at_the_end_without_id [ 406.103127] ok 5 frame_button_placeholder_at_the_end_without_id [ 406.104284] ok 6 all_params_present_in_the_pen_template [ 406.105669] ok 7 all_params_present_in_the_frame_template [ 406.106822] ok 8 some_params_present_in_the_pen_template_with_complete_param_list [ 406.107976] ok 9 some_params_present_in_the_pen_template_with_incomplete_param_list [ 406.109373] ok 10 no_params_present_in_the_template [ 406.110581] # hid_test_uclogic_template: pass:10 fail:0 skip:0 total:10 [ 406.111568] ok 1 hid_test_uclogic_template [ 406.112681] # Totals: pass:10 fail:0 skip:0 total:10 [ 406.113595] ok 1 hid_uclogic_rdesc_test [ 406.117439] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/drivers/hid/hid-uclogic.ko [ 406.121093] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/drivers/hid/hid-uclogic-test.ko [ 406.123873] 2024-08-23 05:15:38 rmmod hid-uclogic-test [ 406.156933] 2024-08-23 05:15:38 modprobe -v iio-test-format [ 406.166447] KTAP version 1 [ 406.167296] 1..1 [ 406.168261] KTAP version 1 [ 406.169118] # Subtest: iio-format [ 406.169968] # module: iio_test_format [ 406.170116] 1..6 [ 406.171871] ok 1 iio_test_iio_format_value_integer [ 406.172070] ok 2 iio_test_iio_format_value_fixedpoint [ 406.173107] ok 3 iio_test_iio_format_value_fractional [ 406.174221] ok 4 iio_test_iio_format_value_fractional_log2 [ 406.175346] ok 5 iio_test_iio_format_value_multiple [ 406.176474] ok 6 iio_test_iio_format_value_integer_64 [ 406.177437] # iio-format: pass:6 fail:0 skip:0 total:6 [ 406.178415] # Totals: pass:6 fail:0 skip:0 total:6 [ 406.179362] ok 1 iio-format [ 406.183019] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/drivers/iio/industrialio.ko [ 406.186659] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/drivers/iio/test/iio-test-format.ko [ 406.189449] 2024-08-23 05:15:38 rmmod iio-test-format [ 406.230351] 2024-08-23 05:15:38 modprobe -v iio-test-rescale [ 406.236656] KTAP version 1 [ 406.237488] 1..1 [ 406.238399] KTAP version 1 [ 406.239241] # Subtest: iio-rescale [ 406.240090] # module: iio_test_rescale [ 406.240100] 1..2 [ 406.241651] KTAP version 1 [ 406.242481] # Subtest: iio_rescale_test_scale [ 406.242762] ok 1 typical IIO_VAL_INT, positive [ 406.243956] ok 2 typical IIO_VAL_INT, negative [ 406.245091] ok 3 typical IIO_VAL_FRACTIONAL, positive [ 406.246200] ok 4 typical IIO_VAL_FRACTIONAL, negative [ 406.247460] ok 5 typical IIO_VAL_FRACTIONAL_LOG2, positive [ 406.248557] ok 6 typical IIO_VAL_FRACTIONAL_LOG2, negative [ 406.249688] ok 7 typical IIO_VAL_INT_PLUS_NANO, positive [ 406.250887] ok 8 typical IIO_VAL_INT_PLUS_NANO, negative [ 406.252031] ok 9 typical IIO_VAL_INT_PLUS_MICRO, positive [ 406.253220] ok 10 typical IIO_VAL_INT_PLUS_MICRO, negative [ 406.254301] ok 11 small IIO_VAL_FRACTIONAL, 261/509 scaled by 90/1373754273 [ 406.255388] ok 12 small IIO_VAL_FRACTIONAL, 90/1373754273 scaled by 261/509 [ 406.256748] ok 13 small IIO_VAL_FRACTIONAL, 760/1373754273 scaled by 427/2727 [ 406.257978] ok 14 small IIO_VAL_FRACTIONAL, 761/1373754273 scaled by 427/2727 [ 406.259446] ok 15 small IIO_VAL_FRACTIONAL, 5/32768 scaled by 3/10000 [ 406.260797] ok 16 small IIO_VAL_FRACTIONAL, 0 < scale < 1 [ 406.261971] ok 17 small IIO_VAL_FRACTIONAL, -1 < scale < 0 [ 406.263054] ok 18 small IIO_VAL_FRACTIONAL, 0 < scale < 2 [ 406.264212] ok 19 small IIO_VAL_FRACTIONAL, -2 < scale < 0 [ 406.265283] ok 20 small IIO_VAL_FRACTIONAL_LOG2, 760/32768 scaled by 15/22 [ 406.266363] ok 21 small IIO_VAL_FRACTIONAL_LOG2, 761/32768 scaled by 15/22 [ 406.267713] ok 22 small IIO_VAL_FRACTIONAL_LOG2, 0 < scale < 1 [ 406.269045] ok 23 small IIO_VAL_FRACTIONAL_LOG2, -1 < scale < 0 [ 406.270171] ok 24 small IIO_VAL_FRACTIONAL_LOG2, 0 < scale < 2 [ 406.271299] ok 25 small IIO_VAL_FRACTIONAL_LOG2, -2 < scale < 0 [ 406.272413] ok 26 small IIO_VAL_INT_PLUS_MICRO, positive [ 406.273525] ok 27 small IIO_VAL_INT_PLUS_MICRO, negative [ 406.274620] ok 28 negative IIO_VAL_INT_PLUS_NANO, negative schan [ 406.275670] ok 29 negative IIO_VAL_INT_PLUS_NANO, both negative [ 406.276771] ok 30 negative IIO_VAL_INT_PLUS_NANO, 3 negative [ 406.277847] ok 31 negative IIO_VAL_INT_PLUS_NANO, 4 negative [ 406.278877] ok 32 negative IIO_VAL_INT_PLUS_NANO, negative, *val = 0 [ 406.279902] ok 33 decimal overflow IIO_VAL_INT_PLUS_NANO, positive [ 406.280984] ok 34 decimal overflow IIO_VAL_INT_PLUS_NANO, negative [ 406.282049] ok 35 decimal overflow IIO_VAL_INT_PLUS_NANO, negative schan [ 406.283105] ok 36 decimal overflow IIO_VAL_INT_PLUS_MICRO, positive [ 406.284202] ok 37 decimal overflow IIO_VAL_INT_PLUS_MICRO, negative [ 406.285269] ok 38 decimal overflow IIO_VAL_INT_PLUS_MICRO, negative schan [ 406.286380] ok 39 overflow IIO_VAL_FRACTIONAL, positive [ 406.287509] ok 40 overflow IIO_VAL_FRACTIONAL, negative [ 406.288572] ok 41 overflow IIO_VAL_FRACTIONAL_LOG2, positive [ 406.289564] ok 42 overflow IIO_VAL_FRACTIONAL_LOG2, negative [ 406.290581] ok 43 overflow IIO_VAL_INT_PLUS_NANO, positive [ 406.291593] ok 44 overflow IIO_VAL_INT_PLUS_NANO, negative [ 406.292591] ok 45 overflow IIO_VAL_INT_PLUS_NANO, negative schan [ 406.293599] ok 46 overflow IIO_VAL_INT_PLUS_MICRO, positive [ 406.294634] ok 47 overflow IIO_VAL_INT_PLUS_MICRO, negative [ 406.295639] ok 48 overflow IIO_VAL_INT_PLUS_MICRO, negative schan [ 406.296529] # iio_rescale_test_scale: pass:48 fail:0 skip:0 total:48 [ 406.297463] ok 1 iio_rescale_test_scale [ 406.298397] KTAP version 1 [ 406.299793] # Subtest: iio_rescale_test_offset [ 406.299921] ok 1 typical IIO_VAL_INT, positive [ 406.300853] ok 2 typical IIO_VAL_INT, negative [ 406.301786] ok 3 typical IIO_VAL_FRACTIONAL, positive [ 406.302691] ok 4 typical IIO_VAL_FRACTIONAL, negative [ 406.303695] ok 5 typical IIO_VAL_FRACTIONAL_LOG2, positive [ 406.304659] ok 6 typical IIO_VAL_FRACTIONAL_LOG2, negative [ 406.305659] ok 7 typical IIO_VAL_INT_PLUS_NANO, positive [ 406.306651] ok 8 typical IIO_VAL_INT_PLUS_NANO, negative [ 406.307634] ok 9 typical IIO_VAL_INT_PLUS_MICRO, positive [ 406.308611] ok 10 typical IIO_VAL_INT_PLUS_MICRO, negative [ 406.309484] # iio_rescale_test_offset: pass:10 fail:0 skip:0 total:10 [ 406.310365] ok 2 iio_rescale_test_offset [ 406.311308] # iio-rescale: pass:2 fail:0 skip:0 total:2 [ 406.312051] # Totals: pass:58 fail:0 skip:0 total:58 [ 406.312878] ok 1 iio-rescale [ 406.317116] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/drivers/iio/afe/iio-rescale.ko [ 406.320623] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/drivers/iio/test/iio-test-rescale.ko [ 406.323264] 2024-08-23 05:15:38 rmmod iio-test-rescale [ 406.367424] 2024-08-23 05:15:38 modprobe -v overflow_kunit [ 406.378571] KTAP version 1 [ 406.379289] 1..1 [ 406.380140] KTAP version 1 [ 406.380877] # Subtest: overflow [ 406.381611] # module: overflow_kunit [ 406.381633] 1..22 [ 406.383148] # u8_u8__u8_overflow_test: 18 u8_u8__u8 arithmetic tests finished [ 406.384363] ok 1 u8_u8__u8_overflow_test [ 406.384518] # s8_s8__s8_overflow_test: 19 s8_s8__s8 arithmetic tests finished [ 406.386615] ok 2 s8_s8__s8_overflow_test [ 406.386737] # u16_u16__u16_overflow_test: 17 u16_u16__u16 arithmetic tests finished [ 406.388862] ok 3 u16_u16__u16_overflow_test [ 406.388920] # s16_s16__s16_overflow_test: 17 s16_s16__s16 arithmetic tests finished [ 406.391163] ok 4 s16_s16__s16_overflow_test [ 406.391288] # u32_u32__u32_overflow_test: 17 u32_u32__u32 arithmetic tests finished [ 406.393598] ok 5 u32_u32__u32_overflow_test [ 406.393654] # s32_s32__s32_overflow_test: 17 s32_s32__s32 arithmetic tests finished [ 406.396025] ok 6 s32_s32__s32_overflow_test [ 406.396158] # u64_u64__u64_overflow_test: 17 u64_u64__u64 arithmetic tests finished [ 406.398609] ok 7 u64_u64__u64_overflow_test [ 406.398670] # s64_s64__s64_overflow_test: 21 s64_s64__s64 arithmetic tests finished [ 406.401272] ok 8 s64_s64__s64_overflow_test [ 406.401447] # u32_u32__int_overflow_test: 2 u32_u32__int arithmetic tests finished [ 406.404318] ok 9 u32_u32__int_overflow_test [ 406.404380] # u32_u32__u8_overflow_test: 3 u32_u32__u8 arithmetic tests finished [ 406.406997] ok 10 u32_u32__u8_overflow_test [ 406.407058] # u8_u8__int_overflow_test: 3 u8_u8__int arithmetic tests finished [ 406.409668] ok 11 u8_u8__int_overflow_test [ 406.409745] # int_int__u8_overflow_test: 3 int_int__u8 arithmetic tests finished [ 406.412462] ok 12 int_int__u8_overflow_test [ 406.412525] # shift_sane_test: 36 sane shift tests finished [ 406.415175] ok 13 shift_sane_test [ 406.415345] # shift_overflow_test: 25 overflow shift tests finished [ 406.417900] ok 14 shift_overflow_test [ 406.417962] # shift_truncate_test: 27 truncate shift tests finished [ 406.420552] ok 15 shift_truncate_test [ 406.420673] # shift_nonsense_test: 25 nonsense shift tests finished [ 406.423427] ok 16 shift_nonsense_test [ 406.424057] # overflow_allocation_test: 11 allocation overflow tests finished [ 406.427081] ok 17 overflow_allocation_test [ 406.427265] # overflow_size_helpers_test: 43 overflow size helper tests finished [ 406.430077] ok 18 overflow_size_helpers_test [ 406.430145] # overflows_type_test: 658 overflows_type() tests finished [ 406.432780] ok 19 overflows_type_test [ 406.432940] # same_type_test: 0 __same_type() tests finished [ 406.435906] ok 20 same_type_test [ 406.435967] # castable_to_type_test: 103 castable_to_type() tests finished [ 406.438629] ok 21 castable_to_type_test [ 406.438815] ok 22 DEFINE_FLEX_test [ 406.439951] # overflow: pass:22 fail:0 skip:0 total:22 [ 406.441034] # Totals: pass:22 fail:0 skip:0 total:22 [ 406.442226] ok 1 overflow [ 406.446466] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/lib/overflow_kunit.ko [ 406.449500] 2024-08-23 05:15:39 rmmod overflow_kunit [ 406.473186] 2024-08-23 05:15:39 modprobe -v soc-utils-test [ 406.477716] KTAP version 1 [ 406.478956] 1..1 [ 406.480002] KTAP version 1 [ 406.480974] # Subtest: soc-utils [ 406.481912] # module: soc_utils_test [ 406.481930] 1..2 [ 406.483953] ok 1 test_tdm_params_to_bclk [ 406.484329] ok 2 test_snd_soc_params_to_bclk [ 406.485284] # soc-utils: pass:2 fail:0 skip:0 total:2 [ 406.486260] # Totals: pass:2 fail:0 skip:0 total:2 [ 406.487297] ok 1 soc-utils [ 406.491072] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/sound/soc/soc-utils-test.ko [ 406.493942] 2024-08-23 05:15:39 rmmod soc-utils-test [ 406.530925] 2024-08-23 05:15:39 modprobe -v stackinit_kunit [ 406.538303] KTAP version 1 [ 406.539170] 1..1 [ 406.540203] KTAP version 1 [ 406.541060] # Subtest: stackinit [ 406.541900] # module: stackinit_kunit [ 406.541908] 1..65 [ 406.543836] ok 1 test_u8_zero [ 406.544230] ok 2 test_u16_zero [ 406.545210] ok 3 test_u32_zero [ 406.546151] ok 4 test_u64_zero [ 406.547084] ok 5 test_char_array_zero [ 406.548073] ok 6 test_small_hole_zero [ 406.548983] ok 7 test_big_hole_zero [ 406.549951] ok 8 test_trailing_hole_zero [ 406.550970] ok 9 test_packed_zero [ 406.551912] ok 10 test_small_hole_dynamic_partial [ 406.552848] ok 11 test_big_hole_dynamic_partial [ 406.553935] ok 12 test_trailing_hole_dynamic_partial [ 406.554942] ok 13 test_packed_dynamic_partial [ 406.555963] ok 14 test_small_hole_assigned_dynamic_partial [ 406.556929] ok 15 test_big_hole_assigned_dynamic_partial [ 406.557982] ok 16 test_trailing_hole_assigned_dynamic_partial [ 406.559010] ok 17 test_packed_assigned_dynamic_partial [ 406.560071] ok 18 test_small_hole_static_partial [ 406.561088] ok 19 test_big_hole_static_partial [ 406.562059] ok 20 test_trailing_hole_static_partial [ 406.563014] ok 21 test_packed_static_partial [ 406.564005] ok 22 test_small_hole_static_all [ 406.564956] ok 23 test_big_hole_static_all [ 406.565900] ok 24 test_trailing_hole_static_all [ 406.566837] ok 25 test_packed_static_all [ 406.567867] ok 26 test_small_hole_dynamic_all [ 406.568791] ok 27 test_big_hole_dynamic_all [ 406.569741] ok 28 test_trailing_hole_dynamic_all [ 406.570754] ok 29 test_packed_dynamic_all [ 406.571718] ok 30 test_small_hole_runtime_partial [ 406.572641] ok 31 test_big_hole_runtime_partial [ 406.573610] ok 32 test_trailing_hole_runtime_partial [ 406.574552] ok 33 test_packed_runtime_partial [ 406.575520] ok 34 test_small_hole_runtime_all [ 406.576434] ok 35 test_big_hole_runtime_all [ 406.577352] ok 36 test_trailing_hole_runtime_all [ 406.578253] ok 37 test_packed_runtime_all [ 406.579187] ok 38 test_small_hole_assigned_static_partial [ 406.580066] ok 39 test_big_hole_assigned_static_partial [ 406.581068] ok 40 test_trailing_hole_assigned_static_partial [ 406.582056] ok 41 test_packed_assigned_static_partial [ 406.583090] ok 42 test_small_hole_assigned_static_all [ 406.584075] ok 43 test_big_hole_assigned_static_all [ 406.585100] ok 44 test_trailing_hole_assigned_static_all [ 406.586107] ok 45 test_packed_assigned_static_all [ 406.587122] ok 46 test_small_hole_assigned_dynamic_all [ 406.588094] ok 47 test_big_hole_assigned_dynamic_all [ 406.589107] ok 48 test_trailing_hole_assigned_dynamic_all [ 406.590114] ok 49 test_packed_assigned_dynamic_all [ 406.591162] ok 50 test_small_hole_assigned_copy # SKIP XFAIL uninit bytes: 3 [ 406.593240] ok 51 test_big_hole_assigned_copy # SKIP XFAIL uninit bytes: 124 [ 406.594438] ok 52 test_trailing_hole_assigned_copy # SKIP XFAIL uninit bytes: 7 [ 406.595666] ok 53 test_packed_assigned_copy [ 406.595781] ok 54 test_u8_none [ 406.596751] ok 55 test_u16_none [ 406.597621] ok 56 test_u32_none [ 406.598498] ok 57 test_u64_none [ 406.599369] ok 58 test_char_array_none [ 406.600261] ok 59 test_switch_1_none # SKIP XFAIL uninit bytes: 80 [ 406.602168] ok 60 test_switch_2_none # SKIP XFAIL uninit bytes: 80 [ 406.603271] ok 61 test_small_hole_none [ 406.603381] ok 62 test_big_hole_none [ 406.604361] ok 63 test_trailing_hole_none [ 406.605248] ok 64 test_packed_none [ 406.606179] ok 65 test_user [ 406.606967] # stackinit: pass:60 fail:0 skip:5 total:65 [ 406.607684] # Totals: pass:60 fail:0 skip:5 total:65 [ 406.608607] ok 1 stackinit [ 406.612689] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/lib/stackinit_kunit.ko [ 406.615716] 2024-08-23 05:15:39 rmmod stackinit_kunit [ 406.639190] 2024-08-23 05:15:39 modprobe -v is_signed_type_kunit [ 406.643301] KTAP version 1 [ 406.644040] 1..1 [ 406.644794] KTAP version 1 [ 406.645552] # Subtest: is_signed_type [ 406.646344] # module: is_signed_type_kunit [ 406.646352] 1..1 [ 406.648043] ok 1 is_signed_type_test [ 406.648050] ok 1 is_signed_type [ 406.651378] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/lib/is_signed_type_kunit.ko [ 406.654268] 2024-08-23 05:15:39 rmmod is_signed_type_kunit [ 406.683292] 2024-08-23 05:15:39 modprobe -v siphash_kunit [ 406.687631] KTAP version 1 [ 406.688388] 1..1 [ 406.689250] KTAP version 1 [ 406.690016] # Subtest: siphash [ 406.690765] # module: siphash_kunit [ 406.690773] 1..1 [ 406.692333] ok 1 siphash_test [ 406.692340] ok 1 siphash [ 406.695412] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/lib/siphash_kunit.ko [ 406.698470] 2024-08-23 05:15:39 rmmod siphash_kunit [ 406.735506] 2024-08-23 05:15:39 modprobe -v soc-topology-test [ 406.740649] KTAP version 1 [ 406.741409] 1..1 [ 406.742264] KTAP version 1 [ 406.743048] # Subtest: snd_soc_tplg_test [ 406.743893] # module: soc_topology_test [ 406.743902] 1..11 [ 406.746008] ok 1 snd_soc_tplg_test_load_with_null_comp [ 406.746561] ok 2 snd_soc_tplg_test_load_with_null_ops [ 406.747944] ok 3 snd_soc_tplg_test_load_with_null_fw [ 406.749476] ok 4 snd_soc_tplg_test_load_empty_tplg [ 406.750981] ok 5 snd_soc_tplg_test_load_empty_tplg_bad_magic [ 406.752604] ok 6 snd_soc_tplg_test_load_empty_tplg_bad_abi [ 406.754097] ok 7 snd_soc_tplg_test_load_empty_tplg_bad_size [ 406.755582] ok 8 snd_soc_tplg_test_load_empty_tplg_bad_payload_size [ 406.757030] ok 9 snd_soc_tplg_test_load_pcm_tplg [ 406.758480] ok 10 snd_soc_tplg_test_load_pcm_tplg_reload_comp [ 406.759929] ok 11 snd_soc_tplg_test_load_pcm_tplg_reload_card [ 406.761016] # snd_soc_tplg_test: pass:11 fail:0 skip:0 total:11 [ 406.761984] # Totals: pass:11 fail:0 skip:0 total:11 [ 406.762939] ok 1 snd_soc_tplg_test [ 406.766665] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/sound/soc/soc-topology-test.ko [ 406.769591] 2024-08-23 05:15:39 rmmod soc-topology-test [ 406.806787] 2024-08-23 05:15:39 modprobe -v fat_test [ 406.817040] KTAP version 1 [ 406.817747] 1..1 [ 406.818467] KTAP version 1 [ 406.819188] # Subtest: fat_test [ 406.819921] # module: fat_test [ 406.819929] 1..3 [ 406.821416] ok 1 fat_checksum_test [ 406.821424] KTAP version 1 [ 406.822866] # Subtest: fat_time_fat2unix_test [ 406.823038] ok 1 Earliest possible UTC (1980-01-01 00:00:00) [ 406.824121] ok 2 Latest possible UTC (2107-12-31 23:59:58) [ 406.825271] ok 3 Earliest possible (UTC-11) (== 1979-12-31 13:00:00 UTC) [ 406.826316] ok 4 Latest possible (UTC+11) (== 2108-01-01 10:59:58 UTC) [ 406.827556] ok 5 Leap Day / Year (1996-02-29 00:00:00) [ 406.828795] ok 6 Year 2000 is leap year (2000-02-29 00:00:00) [ 406.829910] ok 7 Year 2100 not leap year (2100-03-01 00:00:00) [ 406.831048] ok 8 Leap year + timezone UTC+1 (== 2004-02-29 00:30:00 UTC) [ 406.832224] ok 9 Leap year + timezone UTC-1 (== 2004-02-29 23:30:00 UTC) [ 406.833596] ok 10 VFAT odd-second resolution (1999-12-31 23:59:59) [ 406.834803] ok 11 VFAT 10ms resolution (1980-01-01 00:00:00:0010) [ 406.835878] # fat_time_fat2unix_test: pass:11 fail:0 skip:0 total:11 [ 406.836937] ok 2 fat_time_fat2unix_test [ 406.837982] KTAP version 1 [ 406.839624] # Subtest: fat_time_unix2fat_test [ 406.839768] ok 1 Earliest possible UTC (1980-01-01 00:00:00) [ 406.840815] ok 2 Latest possible UTC (2107-12-31 23:59:58) [ 406.841970] ok 3 Earliest possible (UTC-11) (== 1979-12-31 13:00:00 UTC) [ 406.843125] ok 4 Latest possible (UTC+11) (== 2108-01-01 10:59:58 UTC) [ 406.844481] ok 5 Leap Day / Year (1996-02-29 00:00:00) [ 406.845838] ok 6 Year 2000 is leap year (2000-02-29 00:00:00) [ 406.847010] ok 7 Year 2100 not leap year (2100-03-01 00:00:00) [ 406.848208] ok 8 Leap year + timezone UTC+1 (== 2004-02-29 00:30:00 UTC) [ 406.849472] ok 9 Leap year + timezone UTC-1 (== 2004-02-29 23:30:00 UTC) [ 406.850754] ok 10 VFAT odd-second resolution (1999-12-31 23:59:59) [ 406.852030] ok 11 VFAT 10ms resolution (1980-01-01 00:00:00:0010) [ 406.853159] # fat_time_unix2fat_test: pass:11 fail:0 skip:0 total:11 [ 406.854281] ok 3 fat_time_unix2fat_test [ 406.855398] # fat_test: pass:3 fail:0 skip:0 total:3 [ 406.856299] # Totals: pass:23 fail:0 skip:0 total:23 [ 406.857253] ok 1 fat_test [ 406.860972] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/fs/fat/fat.ko [ 406.864276] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/fs/fat/fat_test.ko [ 406.866867] 2024-08-23 05:15:39 rmmod fat_test [ 406.902766] 2024-08-23 05:15:39 modprobe -v string_kunit [ 406.908225] KTAP version 1 [ 406.909069] 1..1 [ 406.910004] KTAP version 1 [ 406.910862] # Subtest: string [ 406.911680] # module: string_kunit [ 406.911688] 1..20 [ 406.986922] ok 1 string_test_memset16 [ 407.086286] ok 2 string_test_memset32 [ 407.164377] ok 3 string_test_memset64 [ 407.165456] ok 4 string_test_strchr [ 407.166459] ok 5 string_test_strnchr [ 407.167374] ok 6 string_test_strspn [ 407.168349] ok 7 string_test_strcmp [ 407.169270] ok 8 string_test_strcmp_long_strings [ 407.170170] ok 9 string_test_strncmp [ 407.171159] ok 10 string_test_strncmp_long_strings [ 407.172106] ok 11 string_test_strcasecmp [ 407.173094] ok 12 string_test_strcasecmp_long_strings [ 407.174003] ok 13 string_test_strncasecmp [ 407.175019] ok 14 string_test_strncasecmp_long_strings [ 407.175932] ok 15 string_test_strscpy [ 407.176930] ok 16 string_test_strcat [ 407.177801] ok 17 string_test_strncat [ 407.178808] ok 18 string_test_strlcat [ 407.179696] ok 19 string_test_strtomem [ 407.180582] ok 20 string_test_memtostr [ 407.181361] # string: pass:20 fail:0 skip:0 total:20 [ 407.182132] # Totals: pass:20 fail:0 skip:0 total:20 [ 407.182980] ok 1 string [ 407.186371] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/lib/string_kunit.ko [ 407.189589] 2024-08-23 05:15:39 rmmod string_kunit [ 407.219282] 2024-08-23 05:15:39 modprobe -v string_helpers_kunit [ 407.223773] KTAP version 1 [ 407.224428] 1..1 [ 407.225166] KTAP version 1 [ 407.225819] # Subtest: string_helpers [ 407.226528] # module: string_helpers_kunit [ 407.226536] 1..3 [ 407.228017] ok 1 test_get_size [ 407.228262] ok 2 test_upper_lower [ 407.244581] ok 3 test_unescape [ 407.245399] # string_helpers: pass:3 fail:0 skip:0 total:3 [ 407.246042] # Totals: pass:3 fail:0 skip:0 total:3 [ 407.246854] ok 1 string_helpers [ 407.250206] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/lib/string_helpers_kunit.ko [ 407.253175] 2024-08-23 05:15:39 rmmod string_helpers_kunit [ 407.287755] 2024-08-23 05:15:39 modprobe -v usercopy_kunit [ 407.292461] KTAP version 1 [ 407.293160] 1..1 [ 407.293905] KTAP version 1 [ 407.294622] # Subtest: usercopy [ 407.295603] # module: usercopy_kunit [ 407.295644] 1..4 [ 407.297249] ok 1 usercopy_test_valid [ 407.297543] ok 2 usercopy_test_invalid [ 407.316347] ok 3 usercopy_test_check_nonzero_user [ 407.317349] ok 4 usercopy_test_copy_struct_from_user [ 407.318229] # usercopy: pass:4 fail:0 skip:0 total:4 [ 407.319139] # Totals: pass:4 fail:0 skip:0 total:4 [ 407.320058] ok 1 usercopy [ 407.323473] insmod /lib/modules/6.11.0-rc2-00008-g2377a7d90f5b/kernel/lib/usercopy_kunit.ko [ 407.326311] 2024-08-23 05:15:39 rmmod usercopy_kunit