[ 0.000000] Linux version 6.15.0-rc7-00008-gfe301d6b4b4a (kbuild@1e3262c0913f) (gcc-12 (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40) #1 SMP PREEMPT_DYNAMIC Thu May 29 00:29:44 CST 2025 [ 0.000000] Command line: ip=::::lkp-hsw-d03::dhcp root=/dev/ram0 RESULT_ROOT=/result/kunit/group-03/lkp-hsw-d03/debian-12-x86_64-20240206.cgz/x86_64-rhel-9.4-kunit/gcc-12/fe301d6b4b4aec003ff84aa4d2860e772b147225/1 BOOT_IMAGE=/pkg/linux/x86_64-rhel-9.4-kunit/gcc-12/fe301d6b4b4aec003ff84aa4d2860e772b147225/vmlinuz-6.15.0-rc7-00008-gfe301d6b4b4a branch=linux-devel/devel-hourly-20250527-080923 job=/lkp/jobs/scheduled/lkp-hsw-d03/kunit-group-03-debian-12-x86_64-20240206.cgz-fe301d6b4b4a-20250529-138988-1olf57i-0.yaml user=lkp ARCH=x86_64 kconfig=x86_64-rhel-9.4-kunit commit=fe301d6b4b4aec003ff84aa4d2860e772b147225 kunit.enable=1 intremap=posted_msi max_uptime=6000 LKP_SERVER=internal-lkp-server nokaslr selinux=0 debug apic=debug sysrq_always_enabled rcupdate.rcu_cpu_stall_timeout=100 net.ifnames=0 printk.devkmsg=on panic=-1 softlockup_panic=1 nmi_watchdog=panic oops=panic load_ramdisk=2 prompt_ramdisk=0 drbd.minor_count=8 systemd.log_level=err ignore_loglevel console=tty0 earlyprintk=ttyS0,115200 console=ttyS0,115200 vga [ 0.000000] BIOS-provided physical RAM map: [ 0.000000] BIOS-e820: [mem 0x0000000000000100-0x000000000009d7ff] usable [ 0.000000] BIOS-e820: [mem 0x000000000009d800-0x000000000009ffff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved [ 0.000000] BIOS-e820: [mem 0x0000000000100000-0x00000000d1694fff] usable [ 0.000000] BIOS-e820: [mem 0x00000000d1695000-0x00000000d169bfff] ACPI NVS [ 0.000000] BIOS-e820: [mem 0x00000000d169c000-0x00000000d1ac9fff] usable [ 0.000000] BIOS-e820: [mem 0x00000000d1aca000-0x00000000d1f4afff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000d1f4b000-0x00000000d7eeafff] usable [ 0.000000] BIOS-e820: [mem 0x00000000d7eeb000-0x00000000d7ffffff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000d8000000-0x00000000d875ffff] usable [ 0.000000] BIOS-e820: [mem 0x00000000d8760000-0x00000000d87fffff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000d8800000-0x00000000d8fadfff] usable [ 0.000000] BIOS-e820: [mem 0x00000000d8fae000-0x00000000d8ffffff] ACPI data [ 0.000000] BIOS-e820: [mem 0x00000000d9000000-0x00000000da71bfff] usable [ 0.000000] BIOS-e820: [mem 0x00000000da71c000-0x00000000da7fffff] ACPI NVS [ 0.000000] BIOS-e820: [mem 0x00000000da800000-0x00000000dbb8cfff] usable [ 0.000000] BIOS-e820: [mem 0x00000000dbb8d000-0x00000000dbffffff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000dd000000-0x00000000df1fffff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000f8000000-0x00000000fbffffff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000fed00000-0x00000000fed03fff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved [ 0.000000] BIOS-e820: [mem 0x0000000100000000-0x000000041edfffff] usable [ 0.000000] printk: debug: ignoring loglevel setting. [ 0.000000] printk: legacy bootconsole [earlyser0] enabled [ 0.000000] NX (Execute Disable) protection: active [ 0.000000] APIC: Static calls initialized [ 0.000000] SMBIOS 2.7 present. [ 0.000000] DMI: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 0.000000] DMI: Memory slots populated: 4/4 [ 0.000000] tsc: Fast TSC calibration using PIT [ 0.000000] tsc: Detected 3392.226 MHz processor [ 0.001259] e820: update [mem 0x00000000-0x00000fff] usable ==> reserved [ 0.008450] e820: remove [mem 0x000a0000-0x000fffff] usable [ 0.014675] last_pfn = 0x41ee00 max_arch_pfn = 0x400000000 [ 0.020799] total RAM covered: 16318M [ 0.025374] gran_size: 64K chunk_size: 64K num_reg: 10 lose cover RAM: 110M [ 0.033253] gran_size: 64K chunk_size: 128K num_reg: 10 lose cover RAM: 110M [ 0.041365] gran_size: 64K chunk_size: 256K num_reg: 10 lose cover RAM: 110M [ 0.049478] gran_size: 64K chunk_size: 512K num_reg: 10 lose cover RAM: 110M [ 0.057592] gran_size: 64K chunk_size: 1M num_reg: 10 lose cover RAM: 110M [ 0.065534] gran_size: 64K chunk_size: 2M num_reg: 10 lose cover RAM: 110M [ 0.073474] gran_size: 64K chunk_size: 4M num_reg: 10 lose cover RAM: 110M [ 0.081414] gran_size: 64K chunk_size: 8M num_reg: 10 lose cover RAM: 110M [ 0.089356] gran_size: 64K chunk_size: 16M num_reg: 10 lose cover RAM: 110M [ 0.097386] *BAD*gran_size: 64K chunk_size: 32M num_reg: 10 lose cover RAM: -18M [ 0.105757] gran_size: 64K chunk_size: 64M num_reg: 10 lose cover RAM: 0G [ 0.113611] gran_size: 64K chunk_size: 128M num_reg: 10 lose cover RAM: 0G [ 0.121553] gran_size: 64K chunk_size: 256M num_reg: 10 lose cover RAM: 0G [ 0.129494] gran_size: 64K chunk_size: 512M num_reg: 10 lose cover RAM: 0G [ 0.137436] gran_size: 64K chunk_size: 1G num_reg: 10 lose cover RAM: 0G [ 0.145204] *BAD*gran_size: 64K chunk_size: 2G num_reg: 10 lose cover RAM: -1G [ 0.153403] gran_size: 128K chunk_size: 128K num_reg: 10 lose cover RAM: 110M [ 0.161606] gran_size: 128K chunk_size: 256K num_reg: 10 lose cover RAM: 110M [ 0.169807] gran_size: 128K chunk_size: 512K num_reg: 10 lose cover RAM: 110M [ 0.178007] gran_size: 128K chunk_size: 1M num_reg: 10 lose cover RAM: 110M [ 0.186032] gran_size: 128K chunk_size: 2M num_reg: 10 lose cover RAM: 110M [ 0.194059] gran_size: 128K chunk_size: 4M num_reg: 10 lose cover RAM: 110M [ 0.202087] gran_size: 128K chunk_size: 8M num_reg: 10 lose cover RAM: 110M [ 0.210112] gran_size: 128K chunk_size: 16M num_reg: 10 lose cover RAM: 110M [ 0.218224] *BAD*gran_size: 128K chunk_size: 32M num_reg: 10 lose cover RAM: -18M [ 0.226685] gran_size: 128K chunk_size: 64M num_reg: 10 lose cover RAM: 0G [ 0.234624] gran_size: 128K chunk_size: 128M num_reg: 10 lose cover RAM: 0G [ 0.242650] gran_size: 128K chunk_size: 256M num_reg: 10 lose cover RAM: 0G [ 0.250674] gran_size: 128K chunk_size: 512M num_reg: 10 lose cover RAM: 0G [ 0.258700] gran_size: 128K chunk_size: 1G num_reg: 10 lose cover RAM: 0G [ 0.266555] *BAD*gran_size: 128K chunk_size: 2G num_reg: 10 lose cover RAM: -1G [ 0.274839] gran_size: 256K chunk_size: 256K num_reg: 10 lose cover RAM: 110M [ 0.283039] gran_size: 256K chunk_size: 512K num_reg: 10 lose cover RAM: 110M [ 0.291237] gran_size: 256K chunk_size: 1M num_reg: 10 lose cover RAM: 110M [ 0.299263] gran_size: 256K chunk_size: 2M num_reg: 10 lose cover RAM: 110M [ 0.307289] gran_size: 256K chunk_size: 4M num_reg: 10 lose cover RAM: 110M [ 0.315313] gran_size: 256K chunk_size: 8M num_reg: 10 lose cover RAM: 110M [ 0.323337] gran_size: 256K chunk_size: 16M num_reg: 10 lose cover RAM: 110M [ 0.331448] *BAD*gran_size: 256K chunk_size: 32M num_reg: 10 lose cover RAM: -18M [ 0.339905] gran_size: 256K chunk_size: 64M num_reg: 10 lose cover RAM: 0G [ 0.347845] gran_size: 256K chunk_size: 128M num_reg: 10 lose cover RAM: 0G [ 0.355871] gran_size: 256K chunk_size: 256M num_reg: 10 lose cover RAM: 0G [ 0.363896] gran_size: 256K chunk_size: 512M num_reg: 10 lose cover RAM: 0G [ 0.371921] gran_size: 256K chunk_size: 1G num_reg: 10 lose cover RAM: 0G [ 0.379775] *BAD*gran_size: 256K chunk_size: 2G num_reg: 10 lose cover RAM: -1G [ 0.388060] gran_size: 512K chunk_size: 512K num_reg: 10 lose cover RAM: 110M [ 0.396257] gran_size: 512K chunk_size: 1M num_reg: 10 lose cover RAM: 110M [ 0.404283] gran_size: 512K chunk_size: 2M num_reg: 10 lose cover RAM: 110M [ 0.412310] gran_size: 512K chunk_size: 4M num_reg: 10 lose cover RAM: 110M [ 0.420335] gran_size: 512K chunk_size: 8M num_reg: 10 lose cover RAM: 110M [ 0.428362] gran_size: 512K chunk_size: 16M num_reg: 10 lose cover RAM: 110M [ 0.436475] *BAD*gran_size: 512K chunk_size: 32M num_reg: 10 lose cover RAM: -18M [ 0.444930] gran_size: 512K chunk_size: 64M num_reg: 10 lose cover RAM: 0G [ 0.452870] gran_size: 512K chunk_size: 128M num_reg: 10 lose cover RAM: 0G [ 0.460895] gran_size: 512K chunk_size: 256M num_reg: 10 lose cover RAM: 0G [ 0.468921] gran_size: 512K chunk_size: 512M num_reg: 10 lose cover RAM: 0G [ 0.476948] gran_size: 512K chunk_size: 1G num_reg: 10 lose cover RAM: 0G [ 0.484800] *BAD*gran_size: 512K chunk_size: 2G num_reg: 10 lose cover RAM: -1G [ 0.493086] gran_size: 1M chunk_size: 1M num_reg: 10 lose cover RAM: 110M [ 0.500940] gran_size: 1M chunk_size: 2M num_reg: 10 lose cover RAM: 110M [ 0.508793] gran_size: 1M chunk_size: 4M num_reg: 10 lose cover RAM: 110M [ 0.516647] gran_size: 1M chunk_size: 8M num_reg: 10 lose cover RAM: 110M [ 0.524500] gran_size: 1M chunk_size: 16M num_reg: 10 lose cover RAM: 110M [ 0.532439] *BAD*gran_size: 1M chunk_size: 32M num_reg: 10 lose cover RAM: -18M [ 0.540727] gran_size: 1M chunk_size: 64M num_reg: 10 lose cover RAM: 0G [ 0.548493] gran_size: 1M chunk_size: 128M num_reg: 10 lose cover RAM: 0G [ 0.556347] gran_size: 1M chunk_size: 256M num_reg: 10 lose cover RAM: 0G [ 0.564201] gran_size: 1M chunk_size: 512M num_reg: 10 lose cover RAM: 0G [ 0.572057] gran_size: 1M chunk_size: 1G num_reg: 10 lose cover RAM: 0G [ 0.579738] *BAD*gran_size: 1M chunk_size: 2G num_reg: 10 lose cover RAM: -1G [ 0.587849] gran_size: 2M chunk_size: 2M num_reg: 10 lose cover RAM: 110M [ 0.595701] gran_size: 2M chunk_size: 4M num_reg: 10 lose cover RAM: 110M [ 0.603552] gran_size: 2M chunk_size: 8M num_reg: 10 lose cover RAM: 110M [ 0.611406] gran_size: 2M chunk_size: 16M num_reg: 10 lose cover RAM: 110M [ 0.619345] *BAD*gran_size: 2M chunk_size: 32M num_reg: 10 lose cover RAM: -18M [ 0.627629] gran_size: 2M chunk_size: 64M num_reg: 10 lose cover RAM: 0G [ 0.635395] gran_size: 2M chunk_size: 128M num_reg: 10 lose cover RAM: 0G [ 0.643247] gran_size: 2M chunk_size: 256M num_reg: 10 lose cover RAM: 0G [ 0.651102] gran_size: 2M chunk_size: 512M num_reg: 10 lose cover RAM: 0G [ 0.658953] gran_size: 2M chunk_size: 1G num_reg: 10 lose cover RAM: 0G [ 0.666634] *BAD*gran_size: 2M chunk_size: 2G num_reg: 10 lose cover RAM: -1G [ 0.674746] gran_size: 4M chunk_size: 4M num_reg: 10 lose cover RAM: 110M [ 0.682598] gran_size: 4M chunk_size: 8M num_reg: 10 lose cover RAM: 110M [ 0.690451] gran_size: 4M chunk_size: 16M num_reg: 10 lose cover RAM: 110M [ 0.698389] *BAD*gran_size: 4M chunk_size: 32M num_reg: 10 lose cover RAM: -18M [ 0.706675] gran_size: 4M chunk_size: 64M num_reg: 10 lose cover RAM: 2M [ 0.714441] gran_size: 4M chunk_size: 128M num_reg: 10 lose cover RAM: 2M [ 0.722292] gran_size: 4M chunk_size: 256M num_reg: 10 lose cover RAM: 2M [ 0.730146] gran_size: 4M chunk_size: 512M num_reg: 10 lose cover RAM: 2M [ 0.737998] gran_size: 4M chunk_size: 1G num_reg: 10 lose cover RAM: 2M [ 0.745679] *BAD*gran_size: 4M chunk_size: 2G num_reg: 10 lose cover RAM: -1022M [ 0.754048] gran_size: 8M chunk_size: 8M num_reg: 10 lose cover RAM: 110M [ 0.761901] gran_size: 8M chunk_size: 16M num_reg: 10 lose cover RAM: 110M [ 0.769840] *BAD*gran_size: 8M chunk_size: 32M num_reg: 10 lose cover RAM: -18M [ 0.778126] gran_size: 8M chunk_size: 64M num_reg: 10 lose cover RAM: 6M [ 0.785893] gran_size: 8M chunk_size: 128M num_reg: 10 lose cover RAM: 6M [ 0.793744] gran_size: 8M chunk_size: 256M num_reg: 10 lose cover RAM: 6M [ 0.801599] gran_size: 8M chunk_size: 512M num_reg: 10 lose cover RAM: 6M [ 0.809454] gran_size: 8M chunk_size: 1G num_reg: 10 lose cover RAM: 6M [ 0.817133] *BAD*gran_size: 8M chunk_size: 2G num_reg: 10 lose cover RAM: -1018M [ 0.825507] gran_size: 16M chunk_size: 16M num_reg: 10 lose cover RAM: 110M [ 0.833531] gran_size: 16M chunk_size: 32M num_reg: 10 lose cover RAM: 238M [ 0.841557] gran_size: 16M chunk_size: 64M num_reg: 9 lose cover RAM: 14M [ 0.849411] gran_size: 16M chunk_size: 128M num_reg: 9 lose cover RAM: 14M [ 0.857352] gran_size: 16M chunk_size: 256M num_reg: 9 lose cover RAM: 14M [ 0.865292] gran_size: 16M chunk_size: 512M num_reg: 9 lose cover RAM: 14M [ 0.873231] gran_size: 16M chunk_size: 1G num_reg: 9 lose cover RAM: 14M [ 0.880995] gran_size: 16M chunk_size: 2G num_reg: 10 lose cover RAM: 14M [ 0.888850] gran_size: 32M chunk_size: 32M num_reg: 10 lose cover RAM: 62M [ 0.896791] gran_size: 32M chunk_size: 64M num_reg: 9 lose cover RAM: 30M [ 0.904646] gran_size: 32M chunk_size: 128M num_reg: 8 lose cover RAM: 30M [ 0.912585] gran_size: 32M chunk_size: 256M num_reg: 8 lose cover RAM: 30M [ 0.920524] gran_size: 32M chunk_size: 512M num_reg: 8 lose cover RAM: 30M [ 0.928465] gran_size: 32M chunk_size: 1G num_reg: 8 lose cover RAM: 30M [ 0.936231] gran_size: 32M chunk_size: 2G num_reg: 9 lose cover RAM: 30M [ 0.943999] gran_size: 64M chunk_size: 64M num_reg: 10 lose cover RAM: 62M [ 0.951940] gran_size: 64M chunk_size: 128M num_reg: 8 lose cover RAM: 62M [ 0.959880] gran_size: 64M chunk_size: 256M num_reg: 8 lose cover RAM: 62M [ 0.967820] gran_size: 64M chunk_size: 512M num_reg: 8 lose cover RAM: 62M [ 0.975761] gran_size: 64M chunk_size: 1G num_reg: 8 lose cover RAM: 62M [ 0.983526] gran_size: 64M chunk_size: 2G num_reg: 9 lose cover RAM: 62M [ 0.991293] gran_size: 128M chunk_size: 128M num_reg: 8 lose cover RAM: 190M [ 0.999407] gran_size: 128M chunk_size: 256M num_reg: 8 lose cover RAM: 190M [ 1.007522] gran_size: 128M chunk_size: 512M num_reg: 8 lose cover RAM: 190M [ 1.015635] gran_size: 128M chunk_size: 1G num_reg: 8 lose cover RAM: 190M [ 1.023575] gran_size: 128M chunk_size: 2G num_reg: 9 lose cover RAM: 190M [ 1.031514] gran_size: 256M chunk_size: 256M num_reg: 6 lose cover RAM: 446M [ 1.039626] gran_size: 256M chunk_size: 512M num_reg: 8 lose cover RAM: 446M [ 1.047738] gran_size: 256M chunk_size: 1G num_reg: 8 lose cover RAM: 446M [ 1.055678] gran_size: 256M chunk_size: 2G num_reg: 9 lose cover RAM: 446M [ 1.063619] gran_size: 512M chunk_size: 512M num_reg: 4 lose cover RAM: 958M [ 1.071728] gran_size: 512M chunk_size: 1G num_reg: 4 lose cover RAM: 958M [ 1.079671] gran_size: 512M chunk_size: 2G num_reg: 4 lose cover RAM: 958M [ 1.087610] gran_size: 1G chunk_size: 1G num_reg: 4 lose cover RAM: 958M [ 1.095378] gran_size: 1G chunk_size: 2G num_reg: 4 lose cover RAM: 958M [ 1.103145] gran_size: 2G chunk_size: 2G num_reg: 3 lose cover RAM: 1982M [ 1.110995] mtrr_cleanup: can not find optimal value [ 1.116606] please specify mtrr_gran_size/mtrr_chunk_size [ 1.122650] MTRR map: 9 entries (5 fixed + 4 variable; max 25), built from 10 variable MTRRs [ 1.131709] x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT [ 1.139564] e820: update [mem 0xdd000000-0xffffffff] usable ==> reserved [ 1.146753] x2apic: enabled by BIOS, switching to x2apic ops [ 1.153055] last_pfn = 0xdbb8d max_arch_pfn = 0x400000000 [ 1.159094] Scan for SMP in [mem 0x00000000-0x000003ff] [ 1.164978] Scan for SMP in [mem 0x0009fc00-0x0009ffff] [ 1.170845] Scan for SMP in [mem 0x000f0000-0x000fffff] [ 1.183074] found SMP MP-table at [mem 0x000fd970-0x000fd97f] [ 1.189307] mpc: fd6b0-fd8f4 [ 1.193027] Using GB pages for direct mapping [ 1.200438] RAMDISK: [mem 0x3f697e000-0x4171fffff] [ 1.205724] ACPI: Early table checksum verification disabled [ 1.212024] ACPI: RSDP 0x00000000000F0490 000024 (v02 DELL ) [ 1.218409] ACPI: XSDT 0x00000000D8FEE088 000094 (v01 DELL CBX3 01072009 AMI 00010013) [ 1.227560] ACPI: FACP 0x00000000D8FF94B0 00010C (v05 DELL CBX3 01072009 AMI 00010013) [ 1.236709] ACPI: DSDT 0x00000000D8FEE1B0 00B2FD (v02 DELL CBX3 00000014 INTL 20091112) [ 1.245853] ACPI: FACS 0x00000000DA7FE080 000040 [ 1.251117] ACPI: APIC 0x00000000D8FF95C0 000092 (v03 DELL CBX3 01072009 AMI 00010013) [ 1.260266] ACPI: FPDT 0x00000000D8FF9658 000044 (v01 DELL CBX3 01072009 AMI 00010013) [ 1.269413] ACPI: SLIC 0x00000000D8FF96A0 000176 (v03 DELL CBX3 01072009 MSFT 00010013) [ 1.278563] ACPI: LPIT 0x00000000D8FF9818 00005C (v01 DELL CBX3 00000000 AMI. 00000005) [ 1.287709] ACPI: SSDT 0x00000000D8FF9878 000539 (v01 PmRef Cpu0Ist 00003000 INTL 20120711) [ 1.296857] ACPI: SSDT 0x00000000D8FF9DB8 000AD8 (v01 PmRef CpuPm 00003000 INTL 20120711) [ 1.306007] ACPI: SSDT 0x00000000D8FFA890 0001C7 (v01 PmRef LakeTiny 00003000 INTL 20120711) [ 1.315156] ACPI: HPET 0x00000000D8FFAA58 000038 (v01 DELL CBX3 01072009 AMI. 00000005) [ 1.324303] ACPI: SSDT 0x00000000D8FFAA90 00036D (v01 SataRe SataTabl 00001000 INTL 20120711) [ 1.333451] ACPI: MCFG 0x00000000D8FFAE00 00003C (v01 DELL CBX3 01072009 MSFT 00000097) [ 1.342600] ACPI: SSDT 0x00000000D8FFAE40 003406 (v01 SaSsdt SaSsdt 00003000 INTL 20091112) [ 1.351749] ACPI: ASF! 0x00000000D8FFE248 0000A5 (v32 INTEL HCG 00000001 TFSM 000F4240) [ 1.360895] ACPI: DMAR 0x00000000D8FFE2F0 0000B8 (v01 INTEL HSW 00000001 INTL 00000001) [ 1.370044] ACPI: Reserving FACP table memory at [mem 0xd8ff94b0-0xd8ff95bb] [ 1.377725] ACPI: Reserving DSDT table memory at [mem 0xd8fee1b0-0xd8ff94ac] [ 1.385409] ACPI: Reserving FACS table memory at [mem 0xda7fe080-0xda7fe0bf] [ 1.393091] ACPI: Reserving APIC table memory at [mem 0xd8ff95c0-0xd8ff9651] [ 1.400771] ACPI: Reserving FPDT table memory at [mem 0xd8ff9658-0xd8ff969b] [ 1.408454] ACPI: Reserving SLIC table memory at [mem 0xd8ff96a0-0xd8ff9815] [ 1.416136] ACPI: Reserving LPIT table memory at [mem 0xd8ff9818-0xd8ff9873] [ 1.423817] ACPI: Reserving SSDT table memory at [mem 0xd8ff9878-0xd8ff9db0] [ 1.431497] ACPI: Reserving SSDT table memory at [mem 0xd8ff9db8-0xd8ffa88f] [ 1.439177] ACPI: Reserving SSDT table memory at [mem 0xd8ffa890-0xd8ffaa56] [ 1.446859] ACPI: Reserving HPET table memory at [mem 0xd8ffaa58-0xd8ffaa8f] [ 1.454541] ACPI: Reserving SSDT table memory at [mem 0xd8ffaa90-0xd8ffadfc] [ 1.462222] ACPI: Reserving MCFG table memory at [mem 0xd8ffae00-0xd8ffae3b] [ 1.469902] ACPI: Reserving SSDT table memory at [mem 0xd8ffae40-0xd8ffe245] [ 1.477584] ACPI: Reserving ASF! table memory at [mem 0xd8ffe248-0xd8ffe2ec] [ 1.485264] ACPI: Reserving DMAR table memory at [mem 0xd8ffe2f0-0xd8ffe3a7] [ 1.493025] APIC: Switched APIC routing to: cluster x2apic [ 1.499247] No NUMA configuration found [ 1.503582] Faking a node at [mem 0x0000000000000000-0x000000041edfffff] [ 1.510933] NODE_DATA(0) allocated [mem 0x41edd4f40-0x41edffcbf] [ 1.517905] Zone ranges: [ 1.520946] DMA [mem 0x0000000000001000-0x0000000000ffffff] [ 1.527765] DMA32 [mem 0x0000000001000000-0x00000000ffffffff] [ 1.534584] Normal [mem 0x0000000100000000-0x000000041edfffff] [ 1.541401] Device empty [ 1.544941] Movable zone start for each node [ 1.549861] Early memory node ranges [ 1.554091] node 0: [mem 0x0000000000001000-0x000000000009cfff] [ 1.560996] node 0: [mem 0x0000000000100000-0x00000000d1694fff] [ 1.567900] node 0: [mem 0x00000000d169c000-0x00000000d1ac9fff] [ 1.574803] node 0: [mem 0x00000000d1f4b000-0x00000000d7eeafff] [ 1.581710] node 0: [mem 0x00000000d8000000-0x00000000d875ffff] [ 1.588615] node 0: [mem 0x00000000d8800000-0x00000000d8fadfff] [ 1.595519] node 0: [mem 0x00000000d9000000-0x00000000da71bfff] [ 1.602426] node 0: [mem 0x00000000da800000-0x00000000dbb8cfff] [ 1.609331] node 0: [mem 0x0000000100000000-0x000000041edfffff] [ 1.616235] Initmem setup node 0 [mem 0x0000000000001000-0x000000041edfffff] [ 1.623925] On node 0, zone DMA: 1 pages in unavailable ranges [ 1.630487] On node 0, zone DMA: 99 pages in unavailable ranges [ 1.654604] On node 0, zone DMA32: 7 pages in unavailable ranges [ 1.661695] On node 0, zone DMA32: 1153 pages in unavailable ranges [ 1.668501] On node 0, zone DMA32: 277 pages in unavailable ranges [ 1.675312] On node 0, zone DMA32: 160 pages in unavailable ranges [ 1.682217] On node 0, zone DMA32: 82 pages in unavailable ranges [ 1.688941] On node 0, zone DMA32: 228 pages in unavailable ranges [ 1.696932] On node 0, zone Normal: 17523 pages in unavailable ranges [ 1.704007] On node 0, zone Normal: 4608 pages in unavailable ranges [ 1.955848] kasan: KernelAddressSanitizer initialized [ 1.961403] Reserving Intel graphics memory at [mem 0xdd200000-0xdf1fffff] [ 1.969120] ACPI: PM-Timer IO Port: 0x1808 [ 1.973723] ACPI: LAPIC_NMI (acpi_id[0xff] high edge lint[0x1]) [ 1.980283] IOAPIC[0]: apic_id 8, version 32, address 0xfec00000, GSI 0-23 [ 1.987780] ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) [ 1.994772] Int: type 0, pol 0, trig 0, bus 00, IRQ 00, APIC ID 8, APIC INT 02 [ 2.002628] ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) [ 2.009879] Int: type 0, pol 1, trig 3, bus 00, IRQ 09, APIC ID 8, APIC INT 09 [ 2.017734] Int: type 0, pol 0, trig 0, bus 00, IRQ 01, APIC ID 8, APIC INT 01 [ 2.025590] Int: type 0, pol 0, trig 0, bus 00, IRQ 03, APIC ID 8, APIC INT 03 [ 2.033443] Int: type 0, pol 0, trig 0, bus 00, IRQ 04, APIC ID 8, APIC INT 04 [ 2.041299] Int: type 0, pol 0, trig 0, bus 00, IRQ 05, APIC ID 8, APIC INT 05 [ 2.049155] Int: type 0, pol 0, trig 0, bus 00, IRQ 06, APIC ID 8, APIC INT 06 [ 2.057009] Int: type 0, pol 0, trig 0, bus 00, IRQ 07, APIC ID 8, APIC INT 07 [ 2.064862] Int: type 0, pol 0, trig 0, bus 00, IRQ 08, APIC ID 8, APIC INT 08 [ 2.072716] Int: type 0, pol 0, trig 0, bus 00, IRQ 0a, APIC ID 8, APIC INT 0a [ 2.080572] Int: type 0, pol 0, trig 0, bus 00, IRQ 0b, APIC ID 8, APIC INT 0b [ 2.088427] Int: type 0, pol 0, trig 0, bus 00, IRQ 0c, APIC ID 8, APIC INT 0c [ 2.096282] Int: type 0, pol 0, trig 0, bus 00, IRQ 0d, APIC ID 8, APIC INT 0d [ 2.104133] Int: type 0, pol 0, trig 0, bus 00, IRQ 0e, APIC ID 8, APIC INT 0e [ 2.111990] Int: type 0, pol 0, trig 0, bus 00, IRQ 0f, APIC ID 8, APIC INT 0f [ 2.119846] ACPI: Using ACPI (MADT) for SMP configuration information [ 2.126922] ACPI: HPET id: 0x8086a701 base: 0xfed00000 [ 2.132709] [Firmware Bug]: TSC_DEADLINE disabled due to Errata; please update microcode to version: 0x22 (or later) [ 2.143844] CPU topo: Max. logical packages: 1 [ 2.149104] CPU topo: Max. logical dies: 1 [ 2.154369] CPU topo: Max. dies per package: 1 [ 2.159638] CPU topo: Max. threads per core: 2 [ 2.164897] CPU topo: Num. cores per package: 4 [ 2.170421] CPU topo: Num. threads per package: 8 [ 2.175944] CPU topo: Allowing 8 present CPUs plus 0 hotplug CPUs [ 2.182679] mapped IOAPIC to ffffffffff5fb000 (fec00000) [ 2.188658] PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] [ 2.196832] PM: hibernation: Registered nosave memory: [mem 0x0009d000-0x000fffff] [ 2.205031] PM: hibernation: Registered nosave memory: [mem 0xd1695000-0xd169bfff] [ 2.213232] PM: hibernation: Registered nosave memory: [mem 0xd1aca000-0xd1f4afff] [ 2.221430] PM: hibernation: Registered nosave memory: [mem 0xd7eeb000-0xd7ffffff] [ 2.229630] PM: hibernation: Registered nosave memory: [mem 0xd8760000-0xd87fffff] [ 2.237829] PM: hibernation: Registered nosave memory: [mem 0xd8fae000-0xd8ffffff] [ 2.246029] PM: hibernation: Registered nosave memory: [mem 0xda71c000-0xda7fffff] [ 2.254229] PM: hibernation: Registered nosave memory: [mem 0xdbb8d000-0xffffffff] [ 2.262427] [mem 0xdf200000-0xf7ffffff] available for PCI devices [ 2.269162] Booting paravirtualized kernel on bare hardware [ 2.275380] clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns [ 2.304105] setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 [ 2.312952] percpu: Embedded 77 pages/cpu s278528 r8192 d28672 u524288 [ 2.319972] pcpu-alloc: s278528 r8192 d28672 u524288 alloc=1*2097152 [ 2.326953] pcpu-alloc: [0] 0 1 2 3 [0] 4 5 6 7 [ 2.332243] Kernel command line: ip=::::lkp-hsw-d03::dhcp root=/dev/ram0 RESULT_ROOT=/result/kunit/group-03/lkp-hsw-d03/debian-12-x86_64-20240206.cgz/x86_64-rhel-9.4-kunit/gcc-12/fe301d6b4b4aec003ff84aa4d2860e772b147225/1 BOOT_IMAGE=/pkg/linux/x86_64-rhel-9.4-kunit/gcc-12/fe301d6b4b4aec003ff84aa4d2860e772b147225/vmlinuz-6.15.0-rc7-00008-gfe301d6b4b4a branch=linux-devel/devel-hourly-20250527-080923 job=/lkp/jobs/scheduled/lkp-hsw-d03/kunit-group-03-debian-12-x86_64-20240206.cgz-fe301d6b4b4a-20250529-138988-1olf57i-0.yaml user=lkp ARCH=x86_64 kconfig=x86_64-rhel-9.4-kunit commit=fe301d6b4b4aec003ff84aa4d2860e772b147225 kunit.enable=1 intremap=posted_msi max_uptime=6000 LKP_SERVER=internal-lkp-server nokaslr selinux=0 debug apic=debug sysrq_always_enabled rcupdate.rcu_cpu_stall_timeout=100 net.ifnames=0 printk.devkmsg=on panic=-1 softlockup_panic=1 nmi_watchdog=panic oops=panic load_ramdisk=2 prompt_ramdisk=0 drbd.minor_count=8 systemd.log_level=err ignore_loglevel console=tty0 earlyprintk=ttyS0,115200 console=ttyS0,115 [ 2.332522] sysrq: sysrq always enabled. [ 2.427294] ignoring the deprecated load_ramdisk= option [ 2.433294] Unknown kernel command line parameters "nokaslr RESULT_ROOT=/result/kunit/group-03/lkp-hsw-d03/debian-12-x86_64-20240206.cgz/x86_64-rhel-9.4-kunit/gcc-12/fe301d6b4b4aec003ff84aa4d2860e772b147225/1 BOOT_IMAGE=/pkg/linux/x86_64-rhel-9.4-kunit/gcc-12/fe301d6b4b4aec003ff84aa4d2860e772b147225/vmlinuz-6.15.0-rc7-00008-gfe301d6b4b4a branch=linux-devel/devel-hourly-20250527-080923 job=/lkp/jobs/scheduled/lkp-hsw-d03/kunit-group-03-debian-12-x86_64-20240206.cgz-fe301d6b4b4a-20250529-138988-1olf57i-0.yaml user=lkp ARCH=x86_64 kconfig=x86_64-rhel-9.4-kunit commit=fe301d6b4b4aec003ff84aa4d2860e772b147225 max_uptime=6000 LKP_SERVER=internal-lkp-server prompt_ramdisk=0 vga=normal", will be passed to user space. [ 2.496278] random: crng init done [ 2.500320] printk: log buffer data + meta data: 1048576 + 3670016 = 4718592 bytes [ 2.510492] Dentry cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) [ 2.520134] Inode-cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) [ 2.528810] software IO TLB: area num 8. [ 2.549986] Fallback order for Node 0: 0 [ 2.549997] Built 1 zonelists, mobility grouping on. Total pages: 4170166 [ 2.562015] Policy zone: Normal [ 2.566131] mem auto-init: stack:off, heap alloc:off, heap free:off [ 2.572884] stackdepot: allocating hash table via alloc_large_system_hash [ 2.580308] stackdepot hash table entries: 1048576 (order: 12, 16777216 bytes, linear) [ 2.641904] SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 [ 2.648961] Kernel/User page tables isolation: enabled [ 2.657920] ftrace section at ffffffff87216af0 sorted properly [ 2.675529] ftrace: allocating 58330 entries in 228 pages [ 2.681420] ftrace: allocated 228 pages with 4 groups [ 2.688571] Dynamic Preempt: voluntary [ 2.693334] rcu: Preemptible hierarchical RCU implementation. [ 2.699570] rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. [ 2.706991] RCU CPU stall warnings timeout set to 100 (rcu_cpu_stall_timeout). [ 2.714930] Trampoline variant of Tasks RCU enabled. [ 2.720628] Rude variant of Tasks RCU enabled. [ 2.725807] Tracing variant of Tasks RCU enabled. [ 2.731244] rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. [ 2.739531] rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 [ 2.746917] RCU Tasks: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. [ 2.756192] RCU Tasks Rude: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. [ 2.765946] RCU Tasks Trace: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. [ 2.793414] NR_IRQS: 524544, nr_irqs: 488, preallocated irqs: 16 [ 2.800316] rcu: srcu_init: Setting srcu_struct sizes based on contention. [ 2.807842] kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) [ 2.819480] Console: colour VGA+ 80x25 [ 2.823732] printk: legacy console [tty0] enabled [ 2.855371] printk: legacy console [ttyS0] enabled [ 2.866166] printk: legacy bootconsole [earlyser0] disabled [ 2.878653] ACPI: Core revision 20240827 [ 2.883645] clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns [ 2.893531] APIC: Switch to symmetric I/O mode setup [ 2.899225] DMAR: Host address width 39 [ 2.903792] DMAR: DRHD base: 0x000000fed90000 flags: 0x0 [ 2.909863] DMAR: dmar0: reg_base_addr fed90000 ver 1:0 cap c0000020660462 ecap f0101a [ 2.918512] DMAR: DRHD base: 0x000000fed91000 flags: 0x1 [ 2.924575] DMAR: dmar1: reg_base_addr fed91000 ver 1:0 cap d2008020660462 ecap f010da [ 2.933216] DMAR: RMRR base: 0x000000dbcf7000 end: 0x000000dbd04fff [ 2.940208] DMAR: RMRR base: 0x000000dd000000 end: 0x000000df1fffff [ 2.947200] DMAR-IR: IOAPIC id 8 under DRHD base 0xfed91000 IOMMU 1 [ 2.954271] DMAR-IR: HPET id 0 under DRHD base 0xfed91000 [ 2.960393] DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. [ 2.970019] DMAR-IR: IRQ remapping was enabled on dmar0 but we are not in kdump mode [ 2.978837] DMAR-IR: Enabled IRQ remapping in x2apic mode [ 2.984977] Masked ExtINT on CPU#0 [ 2.989326] ENABLING IO-APIC IRQs [ 2.993378] Init IO_APIC IRQs [ 2.997071] apic 8 pin 0 not connected [ 3.001564] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:1 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000001 SID:F0F8 SQ:0 SVT:1) [ 3.015751] IOAPIC[0]: Preconfigured routing entry (8-1 -> IRQ 1 Level:0 ActiveLow:0) [ 3.024313] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:1 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:30 Dest:00000001 SID:F0F8 SQ:0 SVT:1) [ 3.038496] IOAPIC[0]: Preconfigured routing entry (8-2 -> IRQ 0 Level:0 ActiveLow:0) [ 3.047064] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:1 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000001 SID:F0F8 SQ:0 SVT:1) [ 3.061250] IOAPIC[0]: Preconfigured routing entry (8-3 -> IRQ 3 Level:0 ActiveLow:0) [ 3.069817] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:1 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000001 SID:F0F8 SQ:0 SVT:1) [ 3.084002] IOAPIC[0]: Preconfigured routing entry (8-4 -> IRQ 4 Level:0 ActiveLow:0) [ 3.092565] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:1 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000001 SID:F0F8 SQ:0 SVT:1) [ 3.106750] IOAPIC[0]: Preconfigured routing entry (8-5 -> IRQ 5 Level:0 ActiveLow:0) [ 3.115321] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:1 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000001 SID:F0F8 SQ:0 SVT:1) [ 3.129504] IOAPIC[0]: Preconfigured routing entry (8-6 -> IRQ 6 Level:0 ActiveLow:0) [ 3.138067] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:1 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000001 SID:F0F8 SQ:0 SVT:1) [ 3.152251] IOAPIC[0]: Preconfigured routing entry (8-7 -> IRQ 7 Level:0 ActiveLow:0) [ 3.160816] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:1 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000001 SID:F0F8 SQ:0 SVT:1) [ 3.175000] IOAPIC[0]: Preconfigured routing entry (8-8 -> IRQ 8 Level:0 ActiveLow:0) [ 3.183566] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:1 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000001 SID:F0F8 SQ:0 SVT:1) [ 3.197751] IOAPIC[0]: Preconfigured routing entry (8-9 -> IRQ 9 Level:1 ActiveLow:0) [ 3.206323] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:1 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000001 SID:F0F8 SQ:0 SVT:1) [ 3.220508] IOAPIC[0]: Preconfigured routing entry (8-10 -> IRQ 10 Level:0 ActiveLow:0) [ 3.229247] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:1 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000001 SID:F0F8 SQ:0 SVT:1) [ 3.243431] IOAPIC[0]: Preconfigured routing entry (8-11 -> IRQ 11 Level:0 ActiveLow:0) [ 3.252171] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:1 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000001 SID:F0F8 SQ:0 SVT:1) [ 3.266355] IOAPIC[0]: Preconfigured routing entry (8-12 -> IRQ 12 Level:0 ActiveLow:0) [ 3.275091] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:1 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000001 SID:F0F8 SQ:0 SVT:1) [ 3.289274] IOAPIC[0]: Preconfigured routing entry (8-13 -> IRQ 13 Level:0 ActiveLow:0) [ 3.298012] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:1 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000001 SID:F0F8 SQ:0 SVT:1) [ 3.312660] IOAPIC[0]: Preconfigured routing entry (8-14 -> IRQ 14 Level:0 ActiveLow:0) [ 3.321398] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:1 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000001 SID:F0F8 SQ:0 SVT:1) [ 3.335583] IOAPIC[0]: Preconfigured routing entry (8-15 -> IRQ 15 Level:0 ActiveLow:0) [ 3.344306] apic 8 pin 16 not connected [ 3.348865] apic 8 pin 17 not connected [ 3.353424] apic 8 pin 18 not connected [ 3.357981] apic 8 pin 19 not connected [ 3.362538] apic 8 pin 20 not connected [ 3.367096] apic 8 pin 21 not connected [ 3.371653] apic 8 pin 22 not connected [ 3.376210] apic 8 pin 23 not connected [ 3.380904] ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 [ 3.392490] clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x30e59e89da8, max_idle_ns: 440795245430 ns [ 3.403726] Calibrating delay loop (skipped), value calculated using timer frequency.. 6784.45 BogoMIPS (lpj=3392226) [ 3.404829] CPU0: Thermal monitoring enabled (TM1) [ 3.405819] Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 [ 3.406784] Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 [ 3.407799] process: using mwait in idle threads [ 3.408783] Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization [ 3.409805] Spectre V2 : Mitigation: Retpolines [ 3.410782] Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT [ 3.411800] Speculative Store Bypass: Vulnerable [ 3.412783] MDS: Vulnerable: Clear CPU buffers attempted, no microcode [ 3.413797] TAA: Vulnerable: Clear CPU buffers attempted, no microcode [ 3.415724] MMIO Stale Data: Unknown: No mitigations [ 3.416782] SRBDS: Vulnerable: No microcode [ 3.417786] x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' [ 3.418798] x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' [ 3.420724] x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' [ 3.421785] x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 [ 3.423724] x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. [ 3.450520] Freeing SMP alternatives memory: 52K [ 3.450787] pid_max: default: 32768 minimum: 301 [ 3.451937] LSM: initializing lsm=lockdown,capability,yama,ima,evm [ 3.452827] Yama: becoming mindful. [ 3.454743] Mount-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) [ 3.455816] Mountpoint-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) [ 3.458798] Using local APIC timer interrupts. Calibrating APIC timer ... [ 3.562325] ... lapic delta = 623571 [ 3.562722] ... PM-Timer delta = 357964 [ 3.562722] ... PM-Timer result ok [ 3.562722] ..... delta 623571 [ 3.562722] ..... mult: 26779121 [ 3.562722] ..... calibration result: 99771 [ 3.562722] ..... CPU clock speed is 3392.0235 MHz. [ 3.562722] ..... host bus clock speed is 99.0771 MHz. [ 3.562730] smpboot: CPU0: Intel(R) Core(TM) i7-4770 CPU @ 3.40GHz (family: 0x6, model: 0x3c, stepping: 0x3) [ 3.564955] Performance Events: PEBS fmt2+, Haswell events, 16-deep LBR, full-width counters, Intel PMU driver. [ 3.566725] ... version: 3 [ 3.567781] ... bit width: 48 [ 3.568780] ... generic registers: 4 [ 3.569779] ... value mask: 0000ffffffffffff [ 3.570782] ... max period: 00007fffffffffff [ 3.571782] ... fixed-purpose events: 3 [ 3.572780] ... event mask: 000000070000000f [ 3.573975] signal: max sigframe size: 1776 [ 3.574803] Estimated ratio of average max frequency by base frequency (times 1024): 1114 [ 3.575879] rcu: Hierarchical SRCU implementation. [ 3.576782] rcu: Max phase no-delay instances is 400. [ 3.577951] Timer migration: 1 hierarchy levels; 8 children per group; 1 crossnode level [ 3.581600] NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. [ 3.582130] smp: Bringing up secondary CPUs ... [ 3.583167] smpboot: x86: Booting SMP configuration: [ 3.583791] .... node #0, CPUs: #1 #2 #3 [ 0.574019] Masked ExtINT on CPU#1 [ 0.574019] Masked ExtINT on CPU#2 [ 0.574019] Masked ExtINT on CPU#3 [ 3.603130] #4 #5 #6 #7 [ 0.574019] Masked ExtINT on CPU#4 [ 3.614735] MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. [ 3.615931] TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. [ 0.574019] Masked ExtINT on CPU#5 [ 0.574019] Masked ExtINT on CPU#6 [ 0.574019] Masked ExtINT on CPU#7 [ 3.628793] smp: Brought up 1 node, 8 CPUs [ 3.629945] smpboot: Total of 8 processors activated (54275.61 BogoMIPS) [ 3.661730] node 0 deferred pages initialised in 29ms [ 3.667775] Memory: 13543952K/16680664K available (52715K kernel code, 18532K rwdata, 15972K rodata, 8264K init, 6908K bss, 3120380K reserved, 0K cma-reserved) [ 3.670806] devtmpfs: initialized [ 3.672105] x86/mm: Memory block size: 128MB [ 3.687879] ACPI: PM: Registering ACPI NVS region [mem 0xd1695000-0xd169bfff] (28672 bytes) [ 3.696816] ACPI: PM: Registering ACPI NVS region [mem 0xda71c000-0xda7fffff] (933888 bytes) [ 3.706772] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns [ 3.717808] posixtimers hash table entries: 4096 (order: 4, 65536 bytes, linear) [ 3.725800] futex hash table entries: 2048 (order: 5, 131072 bytes, linear) [ 3.732863] Running postponed tracer tests: [ 3.737787] Testing tracer function: PASSED [ 4.108789] Testing dynamic ftrace: PASSED [ 4.353783] Testing dynamic ftrace ops #1: [ 4.481369] (1 0 1 0 0) [ 4.486796] (1 1 2 0 0) [ 4.614059] (2 1 3 0 2684166) [ 4.617782] (2 2 4 0 2689597) [ 4.654767] (3 2 4 0 3125354) [ 4.658786] (3 3 5 0 3131875) PASSED [ 4.787784] Testing dynamic ftrace ops #2: [ 5.041376] (1 0 1 2684460 0) [ 5.045786] (1 1 2 2692547 0) [ 5.400410] (2 1 3 6965118 2821232) [ 5.403809] (2 2 4 6971071 2827176) [ 5.476391] (3 2 4 7428626 3282750) [ 5.480812] (3 3 5 7435729 3289832) PASSED [ 5.829783] Testing ftrace recursion: PASSED [ 5.868782] Testing ftrace recursion safe: PASSED [ 5.908781] Testing ftrace regs: PASSED [ 5.946789] Testing tracer nop: PASSED [ 5.951727] Testing tracer wakeup: PASSED [ 6.215794] Testing tracer wakeup_rt: PASSED [ 6.476792] Testing tracer wakeup_dl: PASSED [ 6.737792] Testing tracer function_graph: PASSED [ 11.429785] Testing fgraph storage of 1 byte: PASSED [ 11.469787] Testing fgraph storage of 2 bytes: PASSED [ 11.509786] Testing fgraph storage of 4 bytes: PASSED [ 11.549784] Testing fgraph storage of 8 bytes: PASSED [ 11.589785] Testing multiple fgraph storage on a function: PASSED [ 11.724066] pinctrl core: initialized pinctrl subsystem [ 11.730523] NET: Registered PF_NETLINK/PF_ROUTE protocol family [ 11.738343] DMA: preallocated 2048 KiB GFP_KERNEL pool for atomic allocations [ 11.745840] DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations [ 11.754842] DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations [ 11.763804] audit: initializing netlink subsys (disabled) [ 11.769820] audit: type=2000 audit(1748507025.389:1): state=initialized audit_enabled=0 res=1 [ 11.770324] thermal_sys: Registered thermal governor 'fair_share' [ 11.778804] thermal_sys: Registered thermal governor 'step_wise' [ 11.785784] thermal_sys: Registered thermal governor 'user_space' [ 11.792811] cpuidle: using governor menu [ 11.804008] acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 [ 11.812196] PCI: ECAM [mem 0xf8000000-0xfbffffff] (base 0xf8000000) for domain 0000 [bus 00-3f] [ 11.821805] PCI: ECAM [mem 0xf8000000-0xfbffffff] reserved as E820 entry [ 11.831191] PCI: Using configuration type 1 for base access [ 11.838017] core: PMU erratum BJ122, BV98, HSD29 worked around, HT is on [ 11.844910] kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. [ 11.855874] HugeTLB: allocation took 0ms with hugepage_allocation_threads=2 [ 11.863812] HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages [ 11.870801] HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page [ 11.878805] HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages [ 11.886266] HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page [ 11.895077] cryptd: max_cpu_qlen set to 1000 [ 11.901181] ACPI: Added _OSI(Module Device) [ 11.905782] ACPI: Added _OSI(Processor Device) [ 11.910781] ACPI: Added _OSI(3.0 _SCP Extensions) [ 11.916782] ACPI: Added _OSI(Processor Aggregator Device) [ 12.065506] ACPI: 6 ACPI AML tables successfully acquired and loaded [ 12.080339] ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored [ 12.096586] ACPI: Dynamic OEM Table Load: [ 12.101787] ACPI: SSDT 0xFFFF888101CB6000 0003D3 (v01 PmRef Cpu0Cst 00003001 INTL 20120711) [ 12.116808] ACPI: Dynamic OEM Table Load: [ 12.121810] ACPI: SSDT 0xFFFF8881032D4000 0005AA (v01 PmRef ApIst 00003000 INTL 20120711) [ 12.143455] ACPI: Dynamic OEM Table Load: [ 12.148785] ACPI: SSDT 0xFFFF88810315AC00 000119 (v01 PmRef ApCst 00003000 INTL 20120711) [ 12.184910] ACPI: Interpreter enabled [ 12.188878] ACPI: PM: (supports S0 S3 S4 S5) [ 12.193782] ACPI: Using IOAPIC for interrupt routing [ 12.201020] PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug [ 12.210801] PCI: Using E820 reservations for host bridge windows [ 12.220061] ACPI: Enabled 9 GPEs in block 00 to 3F [ 12.441265] ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-3e]) [ 12.447809] acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] [ 12.467228] acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug SHPCHotplug PME AER PCIeCapability LTR DPC] [ 12.487131] PCI host bridge to bus 0000:00 [ 12.491852] pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] [ 12.499800] pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] [ 12.506800] pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] [ 12.514816] pci_bus 0000:00: root bus resource [mem 0x000d4000-0x000e7fff window] [ 12.523804] pci_bus 0000:00: root bus resource [mem 0xdf200000-0xfeafffff window] [ 12.531807] pci_bus 0000:00: root bus resource [bus 00-3e] [ 12.537814] pci 0000:00:00.0: [8086:0c00] type 00 class 0x060000 conventional PCI endpoint [ 12.547107] pci 0000:00:02.0: [8086:0412] type 00 class 0x030000 conventional PCI endpoint [ 12.555812] pci 0000:00:02.0: BAR 0 [mem 0xf7800000-0xf7bfffff 64bit] [ 12.563784] pci 0000:00:02.0: BAR 2 [mem 0xe0000000-0xefffffff 64bit pref] [ 12.570797] pci 0000:00:02.0: BAR 4 [io 0xf000-0xf03f] [ 12.576821] pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] [ 12.587162] pci 0000:00:03.0: [8086:0c0c] type 00 class 0x040300 PCIe Root Complex Integrated Endpoint [ 12.596813] pci 0000:00:03.0: BAR 0 [mem 0xf7d34000-0xf7d37fff 64bit] [ 12.604995] pci 0000:00:14.0: [8086:8c31] type 00 class 0x0c0330 conventional PCI endpoint [ 12.613835] pci 0000:00:14.0: BAR 0 [mem 0xf7d20000-0xf7d2ffff 64bit] [ 12.621858] pci 0000:00:14.0: PME# supported from D3hot D3cold [ 12.628762] pci 0000:00:16.0: [8086:8c3a] type 00 class 0x078000 conventional PCI endpoint [ 12.637801] pci 0000:00:16.0: BAR 0 [mem 0xf7d40000-0xf7d4000f 64bit] [ 12.644796] pci 0000:00:16.0: PME# supported from D0 D3hot D3cold [ 12.651966] pci 0000:00:19.0: [8086:153a] type 00 class 0x020000 conventional PCI endpoint [ 12.660830] pci 0000:00:19.0: BAR 0 [mem 0xf7d00000-0xf7d1ffff] [ 12.667785] pci 0000:00:19.0: BAR 1 [mem 0xf7d3d000-0xf7d3dfff] [ 12.674785] pci 0000:00:19.0: BAR 2 [io 0xf080-0xf09f] [ 12.680847] pci 0000:00:19.0: PME# supported from D0 D3hot D3cold [ 12.688431] pci 0000:00:1a.0: [8086:8c2d] type 00 class 0x0c0320 conventional PCI endpoint [ 12.697837] pci 0000:00:1a.0: BAR 0 [mem 0xf7d3c000-0xf7d3c3ff] [ 12.703829] pci 0000:00:1a.0: PME# supported from D0 D3hot D3cold [ 12.711502] pci 0000:00:1b.0: [8086:8c20] type 00 class 0x040300 PCIe Root Complex Integrated Endpoint [ 12.721832] pci 0000:00:1b.0: BAR 0 [mem 0xf7d30000-0xf7d33fff 64bit] [ 12.728805] pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold [ 12.737170] pci 0000:00:1c.0: [8086:8c10] type 01 class 0x060400 PCIe Root Port [ 12.744818] pci 0000:00:1c.0: PCI bridge to [bus 01] [ 12.750877] pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold [ 12.766430] pci 0000:00:1c.1: [8086:8c12] type 01 class 0x060400 PCIe Root Port [ 12.773819] pci 0000:00:1c.1: PCI bridge to [bus 02-03] [ 12.779879] pci 0000:00:1c.1: PME# supported from D0 D3hot D3cold [ 12.795670] pci 0000:00:1c.2: [8086:8c14] type 01 class 0x060400 PCIe Root Port [ 12.803726] pci 0000:00:1c.2: PCI bridge to [bus 04] [ 12.808784] pci 0000:00:1c.2: bridge window [io 0xe000-0xefff] [ 12.815786] pci 0000:00:1c.2: bridge window [mem 0xf7c00000-0xf7cfffff] [ 12.823817] pci 0000:00:1c.2: PME# supported from D0 D3hot D3cold [ 12.838639] pci 0000:00:1d.0: [8086:8c26] type 00 class 0x0c0320 conventional PCI endpoint [ 12.847838] pci 0000:00:1d.0: BAR 0 [mem 0xf7d3b000-0xf7d3b3ff] [ 12.853858] pci 0000:00:1d.0: PME# supported from D0 D3hot D3cold [ 12.862126] pci 0000:00:1f.0: [8086:8c4e] type 00 class 0x060100 conventional PCI endpoint [ 12.872122] pci 0000:00:1f.2: [8086:8c02] type 00 class 0x010601 conventional PCI endpoint [ 12.880826] pci 0000:00:1f.2: BAR 0 [io 0xf0d0-0xf0d7] [ 12.886785] pci 0000:00:1f.2: BAR 1 [io 0xf0c0-0xf0c3] [ 12.892784] pci 0000:00:1f.2: BAR 2 [io 0xf0b0-0xf0b7] [ 12.898783] pci 0000:00:1f.2: BAR 3 [io 0xf0a0-0xf0a3] [ 12.904783] pci 0000:00:1f.2: BAR 4 [io 0xf060-0xf07f] [ 12.910784] pci 0000:00:1f.2: BAR 5 [mem 0xf7d3a000-0xf7d3a7ff] [ 12.917791] pci 0000:00:1f.2: PME# supported from D3hot [ 12.924355] pci 0000:00:1f.3: [8086:8c22] type 00 class 0x0c0500 conventional PCI endpoint [ 12.933829] pci 0000:00:1f.3: BAR 0 [mem 0xf7d39000-0xf7d390ff 64bit] [ 12.940787] pci 0000:00:1f.3: BAR 4 [io 0xf040-0xf05f] [ 12.947624] acpiphp: Slot [1] registered [ 12.952786] pci 0000:00:1c.0: PCI bridge to [bus 01] [ 12.958250] pci 0000:02:00.0: [104c:8240] type 01 class 0x060400 PCIe to PCI/PCI-X bridge [ 12.967840] pci 0000:02:00.0: PCI bridge to [bus 03] [ 12.973974] pci 0000:02:00.0: supports D1 D2 [ 12.979351] pci 0000:00:1c.1: PCI bridge to [bus 02-03] [ 12.985799] pci_bus 0000:03: extended config space not accessible [ 12.992918] pci 0000:02:00.0: PCI bridge to [bus 03] [ 12.999150] pci 0000:04:00.0: [8086:10d3] type 00 class 0x020000 PCIe Endpoint [ 13.006896] pci 0000:04:00.0: BAR 0 [mem 0xf7cc0000-0xf7cdffff] [ 13.013786] pci 0000:04:00.0: BAR 1 [mem 0xf7c00000-0xf7c7ffff] [ 13.019788] pci 0000:04:00.0: BAR 2 [io 0xe000-0xe01f] [ 13.025786] pci 0000:04:00.0: BAR 3 [mem 0xf7ce0000-0xf7ce3fff] [ 13.032792] pci 0000:04:00.0: ROM [mem 0xf7c80000-0xf7cbffff pref] [ 13.039909] pci 0000:04:00.0: PME# supported from D0 D3hot D3cold [ 13.048069] pci 0000:00:1c.2: PCI bridge to [bus 04] [ 13.066810] ACPI: PCI: Interrupt link LNKA configured for IRQ 11 [ 13.073784] ACPI: PCI: Interrupt link LNKA disabled [ 13.080194] ACPI: PCI: Interrupt link LNKB configured for IRQ 11 [ 13.086785] ACPI: PCI: Interrupt link LNKB disabled [ 13.093549] ACPI: PCI: Interrupt link LNKC configured for IRQ 10 [ 13.099784] ACPI: PCI: Interrupt link LNKC disabled [ 13.106565] ACPI: PCI: Interrupt link LNKD configured for IRQ 10 [ 13.113786] ACPI: PCI: Interrupt link LNKD disabled [ 13.119939] ACPI: PCI: Interrupt link LNKE configured for IRQ 5 [ 13.126784] ACPI: PCI: Interrupt link LNKE disabled [ 13.133332] ACPI: PCI: Interrupt link LNKF configured for IRQ 0 [ 13.139787] ACPI: PCI: Interrupt link LNKF disabled [ 13.146343] ACPI: PCI: Interrupt link LNKG configured for IRQ 3 [ 13.153786] ACPI: PCI: Interrupt link LNKG disabled [ 13.159625] ACPI: PCI: Interrupt link LNKH configured for IRQ 5 [ 13.166784] ACPI: PCI: Interrupt link LNKH disabled [ 13.174809] iommu: Default domain type: Translated [ 13.180784] iommu: DMA domain TLB invalidation policy: lazy mode [ 13.188386] SCSI subsystem initialized [ 13.192930] ACPI: bus type USB registered [ 13.197916] usbcore: registered new interface driver usbfs [ 13.203844] usbcore: registered new interface driver hub [ 13.209833] usbcore: registered new device driver usb [ 13.215945] pps_core: LinuxPPS API ver. 1 registered [ 13.221784] pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti [ 13.231813] PTP clock support registered [ 13.236814] EDAC MC: Ver: 3.0.0 [ 13.241929] NetLabel: Initializing [ 13.245781] NetLabel: domain hash size = 128 [ 13.250781] NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO [ 13.257781] NetLabel: unlabeled traffic allowed by default [ 13.263786] mctp: management component transport protocol core [ 13.269783] NET: Registered PF_MCTP protocol family [ 13.275833] PCI: Using ACPI for IRQ routing [ 13.282397] PCI: pci_cache_line_size set to 64 bytes [ 13.287833] e820: reserve RAM buffer [mem 0x0009d800-0x0009ffff] [ 13.294791] e820: reserve RAM buffer [mem 0xd1695000-0xd3ffffff] [ 13.300788] e820: reserve RAM buffer [mem 0xd1aca000-0xd3ffffff] [ 13.307787] e820: reserve RAM buffer [mem 0xd7eeb000-0xd7ffffff] [ 13.314788] e820: reserve RAM buffer [mem 0xd8760000-0xdbffffff] [ 13.321784] e820: reserve RAM buffer [mem 0xd8fae000-0xdbffffff] [ 13.327788] e820: reserve RAM buffer [mem 0xda71c000-0xdbffffff] [ 13.334787] e820: reserve RAM buffer [mem 0xdbb8d000-0xdbffffff] [ 13.341790] e820: reserve RAM buffer [mem 0x41ee00000-0x41fffffff] [ 13.348798] pci 0000:00:02.0: vgaarb: setting as boot VGA device [ 13.349722] pci 0000:00:02.0: vgaarb: bridge control possible [ 13.349722] pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none [ 13.370728] vgaarb: loaded [ 13.374903] hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 [ 13.382254] hpet0: 8 comparators, 64-bit 14.318180 MHz counter [ 13.390807] clocksource: Switched to clocksource tsc-early [ 13.402301] VFS: Disk quotas dquot_6.6.0 [ 13.406974] VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) [ 13.415508] netfs: FS-Cache loaded [ 13.419831] pnp: PnP ACPI init [ 13.424146] system 00:00: [mem 0xfed40000-0xfed44fff] has been reserved [ 13.433973] system 00:01: [io 0x0680-0x069f] has been reserved [ 13.440625] system 00:01: [io 0xffff] has been reserved [ 13.446668] system 00:01: [io 0xffff] has been reserved [ 13.452711] system 00:01: [io 0xffff] has been reserved [ 13.458763] system 00:01: [io 0x1c00-0x1cfe] has been reserved [ 13.465412] system 00:01: [io 0x1d00-0x1dfe] has been reserved [ 13.472055] system 00:01: [io 0x1e00-0x1efe] has been reserved [ 13.478698] system 00:01: [io 0x1f00-0x1ffe] has been reserved [ 13.485349] system 00:01: [io 0x1800-0x18fe] could not be reserved [ 13.492334] system 00:01: [io 0x164e-0x164f] has been reserved [ 13.500858] system 00:03: [io 0x0a00-0x0a0f] has been reserved [ 13.507984] system 00:04: [io 0x04d0-0x04d1] has been reserved [ 13.524001] pnp 00:05: [dma 0 disabled] [ 13.534386] system 00:06: [mem 0xfed1c000-0xfed1ffff] has been reserved [ 13.541738] system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved [ 13.549091] system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved [ 13.556439] system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved [ 13.563797] system 00:06: [mem 0xf8000000-0xfbffffff] has been reserved [ 13.571147] system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved [ 13.578500] system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved [ 13.586190] system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved [ 13.593535] system 00:06: [mem 0xff000000-0xffffffff] has been reserved [ 13.600889] system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved [ 13.608579] system 00:06: [mem 0xf7fee000-0xf7feefff] has been reserved [ 13.615924] system 00:06: [mem 0xf7fd0000-0xf7fdffff] has been reserved [ 13.626585] pnp: PnP ACPI: found 7 devices [ 13.644314] clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns [ 13.654187] NET: Registered PF_INET protocol family [ 13.659985] IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) [ 13.672160] tcp_listen_portaddr_hash hash table entries: 8192 (order: 5, 131072 bytes, linear) [ 13.681514] Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) [ 13.690037] TCP established hash table entries: 131072 (order: 8, 1048576 bytes, linear) [ 13.699034] TCP bind hash table entries: 65536 (order: 9, 2097152 bytes, linear) [ 13.707426] TCP: Hash tables configured (established 131072 bind 65536) [ 13.715187] MPTCP token hash table entries: 16384 (order: 6, 393216 bytes, linear) [ 13.723568] UDP hash table entries: 8192 (order: 7, 524288 bytes, linear) [ 13.731185] UDP-Lite hash table entries: 8192 (order: 7, 524288 bytes, linear) [ 13.739420] NET: Registered PF_UNIX/PF_LOCAL protocol family [ 13.746393] RPC: Registered named UNIX socket transport module. [ 13.753036] RPC: Registered udp transport module. [ 13.758468] RPC: Registered tcp transport module. [ 13.763895] RPC: Registered tcp-with-tls transport module. [ 13.770098] RPC: Registered tcp NFSv4.1 backchannel transport module. [ 13.777258] NET: Registered PF_XDP protocol family [ 13.782791] pci 0000:00:1c.0: PCI bridge to [bus 01] [ 13.788487] pci 0000:02:00.0: PCI bridge to [bus 03] [ 13.794184] pci 0000:00:1c.1: PCI bridge to [bus 02-03] [ 13.800135] pci 0000:00:1c.2: PCI bridge to [bus 04] [ 13.805820] pci 0000:00:1c.2: bridge window [io 0xe000-0xefff] [ 13.812632] pci 0000:00:1c.2: bridge window [mem 0xf7c00000-0xf7cfffff] [ 13.820150] pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] [ 13.827044] pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] [ 13.833938] pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] [ 13.841536] pci_bus 0000:00: resource 7 [mem 0x000d4000-0x000e7fff window] [ 13.849135] pci_bus 0000:00: resource 8 [mem 0xdf200000-0xfeafffff window] [ 13.856732] pci_bus 0000:04: resource 0 [io 0xe000-0xefff] [ 13.863028] pci_bus 0000:04: resource 1 [mem 0xf7c00000-0xf7cfffff] [ 13.871782] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:1 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000001 SID:F0F8 SQ:0 SVT:1) [ 13.885975] IOAPIC[0]: Preconfigured routing entry (8-16 -> IRQ 16 Level:1 ActiveLow:1) [ 13.895780] pci 0000:00:14.0: quirk_usb_early_handoff+0x0/0x3c0 took 24497 usecs [ 13.904948] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:1 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000001 SID:F0F8 SQ:0 SVT:1) [ 13.919135] IOAPIC[0]: Preconfigured routing entry (8-16 -> IRQ 16 Level:1 ActiveLow:1) [ 13.928877] pci 0000:00:1a.0: quirk_usb_early_handoff+0x0/0x3c0 took 24367 usecs [ 13.938128] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:1 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000001 SID:F0F8 SQ:0 SVT:1) [ 13.952317] IOAPIC[0]: Preconfigured routing entry (8-23 -> IRQ 23 Level:1 ActiveLow:1) [ 13.962128] pci 0000:00:1d.0: quirk_usb_early_handoff+0x0/0x3c0 took 24460 usecs [ 13.970279] PCI: CLS 64 bytes, default 64 [ 13.975107] PCI-DMA: Using software bounce buffering for IO (SWIOTLB) [ 13.975226] Trying to unpack rootfs image as initramfs... [ 13.982200] software IO TLB: mapped [mem 0x00000000d3eeb000-0x00000000d7eeb000] (64MB) [ 13.982218] ACPI: bus type thunderbolt registered [ 14.007745] Initialise system trusted keyrings [ 14.012957] Key type blacklist registered [ 14.017828] workingset: timestamp_bits=36 max_order=22 bucket_order=0 [ 14.025899] 9p: Installing v9fs 9p2000 file system support [ 14.032302] integrity: Platform Keyring initialized [ 14.037925] integrity: Machine keyring initialized [ 14.044181] alg: extra crypto tests enabled. This is intended for developer use only. [ 14.078593] NET: Registered PF_ALG protocol family [ 14.084118] Key type asymmetric registered [ 14.088938] Asymmetric key parser 'x509' registered [ 15.060075] tsc: Refined TSC clocksource calibration: 3392.145 MHz [ 15.066994] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x30e55212bb0, max_idle_ns: 440795241820 ns [ 15.077896] clocksource: Switched to clocksource tsc [ 25.306887] Freeing initrd memory: 533000K [ 25.404087] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246) [ 25.412297] io scheduler mq-deadline registered [ 25.417551] io scheduler kyber registered [ 25.422310] io scheduler bfq registered [ 25.450670] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:1 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000001 SID:F0F8 SQ:0 SVT:1) [ 25.464869] IOAPIC[0]: Preconfigured routing entry (8-16 -> IRQ 16 Level:1 ActiveLow:1) [ 25.474037] pcieport 0000:00:1c.0: PME: Signaling with IRQ 24 [ 25.482113] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:1 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000001 SID:F0F8 SQ:0 SVT:1) [ 25.496310] IOAPIC[0]: Preconfigured routing entry (8-17 -> IRQ 17 Level:1 ActiveLow:1) [ 25.505435] pcieport 0000:00:1c.1: PME: Signaling with IRQ 25 [ 25.513545] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:1 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000001 SID:F0F8 SQ:0 SVT:1) [ 25.527751] IOAPIC[0]: Preconfigured routing entry (8-18 -> IRQ 18 Level:1 ActiveLow:1) [ 25.536872] pcieport 0000:00:1c.2: PME: Signaling with IRQ 26 [ 25.547455] input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 [ 25.556800] ACPI: button: Power Button [PWRB] [ 25.562199] input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input1 [ 25.570614] ACPI: button: Power Button [PWRF] [ 25.580157] ACPI: \_TZ_.TZ00: _AL0 evaluation failure [ 25.587766] thermal LNXTHERM:00: registered as thermal_zone0 [ 25.594146] ACPI: thermal: Thermal Zone [TZ00] (28 C) [ 25.604496] thermal LNXTHERM:01: registered as thermal_zone1 [ 25.610874] ACPI: thermal: Thermal Zone [TZ01] (30 C) [ 25.617223] Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled [ 25.624639] 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A [ 25.635583] Non-volatile memory driver v1.3 [ 25.643472] ACPI Warning: SystemIO range 0x0000000000001828-0x000000000000182F conflicts with OpRegion 0x0000000000001800-0x000000000000187F (\PMIO) (20240827/utaddress-204) [ 25.659661] ACPI: OSL: Resource conflict; ACPI support missing from driver? [ 25.667365] ACPI Warning: SystemIO range 0x0000000000001C40-0x0000000000001C4F conflicts with OpRegion 0x0000000000001C00-0x0000000000001FFF (\GPR) (20240827/utaddress-204) [ 25.683919] ACPI: OSL: Resource conflict; ACPI support missing from driver? [ 25.691605] ACPI Warning: SystemIO range 0x0000000000001C30-0x0000000000001C3F conflicts with OpRegion 0x0000000000001C00-0x0000000000001C3F (\GPRL) (20240827/utaddress-204) [ 25.707788] ACPI Warning: SystemIO range 0x0000000000001C30-0x0000000000001C3F conflicts with OpRegion 0x0000000000001C00-0x0000000000001FFF (\GPR) (20240827/utaddress-204) [ 25.723874] ACPI: OSL: Resource conflict; ACPI support missing from driver? [ 25.731595] ACPI Warning: SystemIO range 0x0000000000001C00-0x0000000000001C2F conflicts with OpRegion 0x0000000000001C00-0x0000000000001C3F (\GPRL) (20240827/utaddress-204) [ 25.747797] ACPI Warning: SystemIO range 0x0000000000001C00-0x0000000000001C2F conflicts with OpRegion 0x0000000000001C00-0x0000000000001FFF (\GPR) (20240827/utaddress-204) [ 25.763884] ACPI: OSL: Resource conflict; ACPI support missing from driver? [ 25.771566] lpc_ich: Resource conflict(s) found affecting gpio_ich [ 25.778964] rdac: device handler registered [ 25.784000] hp_sw: device handler registered [ 25.788997] emc: device handler registered [ 25.793987] alua: device handler registered [ 25.800236] e1000: Intel(R) PRO/1000 Network Driver [ 25.805841] e1000: Copyright (c) 1999-2006 Intel Corporation. [ 25.812379] e1000e: Intel(R) PRO/1000 Network Driver [ 25.818065] e1000e: Copyright(c) 1999 - 2015 Intel Corporation. [ 25.825984] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:1 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000001 SID:F0F8 SQ:0 SVT:1) [ 25.840211] IOAPIC[0]: Preconfigured routing entry (8-20 -> IRQ 20 Level:1 ActiveLow:1) [ 25.849060] e1000e 0000:00:19.0: Interrupt Throttling Rate (ints/sec) set to dynamic conservative mode [ 25.930095] e1000e 0000:00:19.0 0000:00:19.0 (uninitialized): registered PHC clock [ 26.002602] e1000e 0000:00:19.0 eth0: (PCI Express:2.5GT/s:Width x1) f8:b1:56:e3:03:ca [ 26.011262] e1000e 0000:00:19.0 eth0: Intel(R) PRO/1000 Network Connection [ 26.018903] e1000e 0000:00:19.0 eth0: MAC: 11, PHY: 12, PBA No: FFFFFF-0FF [ 26.027354] e1000e 0000:04:00.0: Interrupt Throttling Rate (ints/sec) set to dynamic conservative mode [ 26.078015] e1000e 0000:04:00.0 0000:04:00.0 (uninitialized): registered PHC clock [ 26.132929] e1000e 0000:04:00.0 eth1: (PCI Express:2.5GT/s:Width x1) 2c:53:4a:03:93:bf [ 26.141584] e1000e 0000:04:00.0 eth1: Intel(R) PRO/1000 Network Connection [ 26.149195] e1000e 0000:04:00.0 eth1: MAC: 3, PHY: 8, PBA No: FFFFFF-0FF [ 26.156718] igb: Intel(R) Gigabit Ethernet Network Driver [ 26.162836] igb: Copyright (c) 2007-2014 Intel Corporation. [ 26.169203] Intel(R) 2.5G Ethernet Linux Driver [ 26.174457] Copyright(c) 2018 Intel Corporation. [ 26.179871] ixgbe: Intel(R) 10 Gigabit PCI Express Network Driver [ 26.186685] ixgbe: Copyright (c) 1999-2016 Intel Corporation. [ 26.193497] i40e: Intel(R) Ethernet Connection XL710 Network Driver [ 26.200488] i40e: Copyright (c) 2013 - 2019 Intel Corporation. [ 26.207303] usbcore: registered new interface driver asix [ 26.215725] ehci-pci 0000:00:1a.0: EHCI Host Controller [ 26.216992] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:1 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000001 SID:F0F8 SQ:0 SVT:1) [ 26.221937] ehci-pci 0000:00:1a.0: new USB bus registered, assigned bus number 1 [ 26.235718] IOAPIC[0]: Preconfigured routing entry (8-23 -> IRQ 23 Level:1 ActiveLow:1) [ 26.243785] ehci-pci 0000:00:1a.0: debug port 2 [ 26.261949] ehci-pci 0000:00:1a.0: irq 16, io mem 0xf7d3c000 [ 26.274103] ehci-pci 0000:00:1a.0: USB 2.0 started, EHCI 1.00 [ 26.281003] usb usb1: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.15 [ 26.289997] usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 26.297937] usb usb1: Product: EHCI Host Controller [ 26.303535] usb usb1: Manufacturer: Linux 6.15.0-rc7-00008-gfe301d6b4b4a ehci_hcd [ 26.311740] usb usb1: SerialNumber: 0000:00:1a.0 [ 26.317879] hub 1-0:1.0: USB hub found [ 26.322423] hub 1-0:1.0: 2 ports detected [ 26.329291] xhci_hcd 0000:00:14.0: xHCI Host Controller [ 26.335567] xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 [ 26.344849] xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x100 quirks 0x0000000000009810 [ 26.356488] ehci-pci 0000:00:1d.0: EHCI Host Controller [ 26.356626] xhci_hcd 0000:00:14.0: xHCI Host Controller [ 26.362658] ehci-pci 0000:00:1d.0: new USB bus registered, assigned bus number 3 [ 26.368541] xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 4 [ 26.376354] ehci-pci 0000:00:1d.0: debug port 2 [ 26.384392] xhci_hcd 0000:00:14.0: Host supports USB 3.0 SuperSpeed [ 26.393598] ehci-pci 0000:00:1d.0: irq 23, io mem 0xf7d3b000 [ 26.396851] usb usb2: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.15 [ 26.411766] ehci-pci 0000:00:1d.0: USB 2.0 started, EHCI 1.00 [ 26.411808] usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 26.426661] usb usb2: Product: xHCI Host Controller [ 26.432255] usb usb2: Manufacturer: Linux 6.15.0-rc7-00008-gfe301d6b4b4a xhci-hcd [ 26.440457] usb usb2: SerialNumber: 0000:00:14.0 [ 26.446548] hub 2-0:1.0: USB hub found [ 26.451105] hub 2-0:1.0: 15 ports detected [ 26.564043] usb 1-1: new high-speed USB device number 2 using ehci-pci [ 26.610690] usb usb4: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.15 [ 26.619678] usb usb4: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 26.627622] usb usb4: Product: xHCI Host Controller [ 26.633262] usb usb4: Manufacturer: Linux 6.15.0-rc7-00008-gfe301d6b4b4a xhci-hcd [ 26.641467] usb usb4: SerialNumber: 0000:00:14.0 [ 26.647973] hub 4-0:1.0: USB hub found [ 26.652596] hub 4-0:1.0: 6 ports detected [ 26.676502] usbcore: registered new interface driver usbserial_generic [ 26.676534] usb usb3: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.15 [ 26.683730] usbserial: USB Serial support registered for generic [ 26.692596] usb usb3: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 26.692599] usb usb3: Product: EHCI Host Controller [ 26.692601] usb usb3: Manufacturer: Linux 6.15.0-rc7-00008-gfe301d6b4b4a ehci_hcd [ 26.692603] usb usb3: SerialNumber: 0000:00:1d.0 [ 26.693458] hub 3-0:1.0: USB hub found [ 26.699445] i8042: PNP: No PS/2 controller found. [ 26.707232] hub 3-0:1.0: 2 ports detected [ 26.712925] mousedev: PS/2 mouse device common for all mice [ 26.724427] usb 1-1: New USB device found, idVendor=8087, idProduct=8008, bcdDevice= 0.04 [ 26.726798] rtc_cmos 00:02: RTC can wake from S4 [ 26.730575] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 26.731838] hub 1-1:1.0: USB hub found [ 26.737008] rtc_cmos 00:02: registered as rtc0 [ 26.740777] hub 1-1:1.0: 6 ports detected [ 26.746956] rtc_cmos 00:02: setting system clock to 2025-05-29T08:24:01 UTC (1748507041) [ 26.793214] rtc_cmos 00:02: alarms up to one month, y3k, 242 bytes nvram, hpet irqs [ 26.802977] i801_smbus 0000:00:1f.3: SPD Write Disable is set [ 26.809566] i801_smbus 0000:00:1f.3: SMBus using PCI interrupt [ 26.809921] iTCO_wdt iTCO_wdt.0.auto: Found a Lynx Point TCO device (Version=2, TCOBASE=0x1860) [ 26.820675] i2c i2c-0: Successfully instantiated SPD at 0x50 [ 26.825928] iTCO_wdt iTCO_wdt.0.auto: initialized. heartbeat=30 sec (nowayout=0) [ 26.832169] i2c i2c-0: Successfully instantiated SPD at 0x51 [ 26.839911] iTCO_vendor_support: vendor-support=0 [ 26.846546] i2c i2c-0: Successfully instantiated SPD at 0x52 [ 26.851585] intel_pstate: Intel P-state driver initializing [ 26.858303] i2c i2c-0: Successfully instantiated SPD at 0x53 [ 26.874661] hid: raw HID events driver (C) Jiri Kosina [ 26.880810] usbcore: registered new interface driver usbhid [ 26.887149] usbhid: USB HID core driver [ 26.891796] drop_monitor: Initializing network drop monitor service [ 26.899008] Initializing XFRM netlink socket [ 26.904333] NET: Registered PF_INET6 protocol family [ 26.961119] Segment Routing with IPv6 [ 26.965578] In-situ OAM (IOAM) with IPv6 [ 26.970211] usb 3-1: new high-speed USB device number 2 using ehci-pci [ 26.970313] NET: Registered PF_PACKET protocol family [ 26.983526] 9pnet: Installing 9P2000 support [ 26.988597] mpls_gso: MPLS GSO support [ 26.995569] microcode: Current revision: 0x00000016 [ 27.001680] IPI shorthand broadcast: enabled [ 27.006691] ... APIC ID: 00000000 (0) [ 27.007615] ... APIC VERSION: 01060015 [ 27.007615] 0000000000000000000000000000000000000000000000000000000000000000 [ 27.007615] 0000000000000000000000000000000000000000000000000000000000000000 [ 27.007615] 0000000000000000000000000000000000000000000000000000000000001000 [ 27.042017] number of MP IRQ sources: 15. [ 27.046752] number of IO-APIC #8 registers: 24. [ 27.052003] testing the IO APIC....................... [ 27.057865] IO APIC #8...... [ 27.061472] .... register #00: 08000000 [ 27.066034] ....... : physical APIC id: 08 [ 27.071114] ....... : Delivery Type: 0 [ 27.075845] ....... : LTS : 0 [ 27.080575] .... register #01: 00170020 [ 27.085134] ....... : max redirection entries: 17 [ 27.090904] ....... : PRQ implemented: 0 [ 27.095903] ....... : IO APIC version: 20 [ 27.100982] .... IRQ redirection table: [ 27.105545] IOAPIC 0: [ 27.108553] pin00, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 27.117287] pin01, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 27.117657] usb 3-1: New USB device found, idVendor=8087, idProduct=8000, bcdDevice= 0.04 [ 27.125937] pin02, enabled , edge , high, V(02), IRR(0), S(0), remapped, I(0001), Z(0) [ 27.134758] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 27.143506] pin03, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 27.152598] hub 3-1:1.0: USB hub found [ 27.159946] pin04, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 27.164530] hub 3-1:1.0: 8 ports detected [ 27.173025] pin05, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 27.186978] pin06, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 27.195707] pin07, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 27.204435] pin08, enabled , edge , high, V(08), IRR(0), S(0), remapped, I(0007), Z(0) [ 27.213248] pin09, enabled , level, high, V(09), IRR(0), S(0), remapped, I(0008), Z(0) [ 27.222065] pin0a, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 27.230792] pin0b, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 27.239518] pin0c, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 27.248242] pin0d, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 27.256976] pin0e, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 27.265717] pin0f, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 27.274451] pin10, enabled , level, low , V(10), IRR(0), S(0), remapped, I(000F), Z(0) [ 27.283267] pin11, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 27.291998] pin12, enabled , level, low , V(12), IRR(0), S(0), remapped, I(0013), Z(0) [ 27.300821] pin13, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 27.309552] pin14, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 27.318283] pin15, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 27.327014] pin16, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 27.335744] pin17, enabled , level, low , V(17), IRR(0), S(0), remapped, I(001A), Z(0) [ 27.344559] IRQ to pin mappings: [ 27.348521] IRQ0 -> 0:2 [ 27.351703] IRQ1 -> 0:1 [ 27.354887] IRQ3 -> 0:3 [ 27.358073] IRQ4 -> 0:4 [ 27.361258] IRQ5 -> 0:5 [ 27.364444] IRQ6 -> 0:6 [ 27.367624] IRQ7 -> 0:7 [ 27.370808] IRQ8 -> 0:8 [ 27.373996] IRQ9 -> 0:9 [ 27.377182] IRQ10 -> 0:10 [ 27.380536] IRQ11 -> 0:11 [ 27.383893] IRQ12 -> 0:12 [ 27.387250] IRQ13 -> 0:13 [ 27.390605] IRQ14 -> 0:14 [ 27.393961] IRQ15 -> 0:15 [ 27.397320] IRQ16 -> 0:16 [ 27.400675] IRQ17 -> 0:17 [ 27.404040] IRQ18 -> 0:18 [ 27.407396] IRQ20 -> 0:20 [ 27.410748] IRQ23 -> 0:23 [ 27.414107] .................................... done. [ 27.440547] sched_clock: Marking stable (26867001473, 573019367)->(27777845843, -337825003) [ 27.450810] registered taskstats version 1 [ 27.456718] Running tests on trace events: [ 27.461544] Testing event initcall_finish: OK [ 27.483777] Testing event initcall_start: OK [ 27.505484] Testing event initcall_level: OK [ 27.528744] Testing event emulate_vsyscall: OK [ 27.550653] Testing event xen_cpu_set_ldt: OK [ 27.573775] Testing event xen_cpu_write_gdt_entry: OK [ 27.598414] Testing event xen_cpu_load_idt: OK [ 27.621837] Testing event xen_cpu_write_idt_entry: OK [ 27.645464] Testing event xen_cpu_write_ldt_entry: OK [ 27.668449] Testing event xen_mmu_write_cr3: OK [ 27.690716] Testing event xen_mmu_flush_tlb_multi: OK [ 27.714455] Testing event xen_mmu_flush_tlb_one_user: OK [ 27.737654] Testing event xen_mmu_pgd_unpin: OK [ 27.760709] Testing event xen_mmu_pgd_pin: OK [ 27.782604] Testing event xen_mmu_release_ptpage: OK [ 27.806365] Testing event xen_mmu_alloc_ptpage: OK [ 27.828986] Testing event xen_mmu_ptep_modify_prot_commit: OK [ 27.854011] Testing event xen_mmu_ptep_modify_prot_start: OK [ 27.879004] Testing event xen_mmu_set_p4d: OK [ 27.901568] Testing event xen_mmu_set_pud: OK [ 27.924541] Testing event xen_mmu_set_pmd: OK [ 27.947530] Testing event xen_mmu_set_pte: OK [ 27.969693] Testing event xen_mc_extend_args: OK [ 27.993013] Testing event xen_mc_flush: OK [ 28.015271] Testing event xen_mc_flush_reason: OK [ 28.039908] Testing event xen_mc_callback: OK [ 28.062626] Testing event xen_mc_entry_alloc: OK [ 28.084996] Testing event xen_mc_entry: OK [ 28.106308] Testing event xen_mc_issue: OK [ 28.128280] Testing event xen_mc_batch: OK [ 28.151314] Testing event hyperv_send_ipi_one: OK [ 28.173124] Testing event hyperv_send_ipi_mask: OK [ 28.196196] Testing event hyperv_nested_flush_guest_mapping_range: OK [ 28.221673] Testing event hyperv_nested_flush_guest_mapping: OK [ 28.245270] Testing event hyperv_mmu_flush_tlb_multi: OK [ 28.268730] Testing event vector_free_moved: OK [ 28.291967] Testing event vector_setup: OK [ 28.315381] Testing event vector_teardown: OK [ 28.336533] Testing event vector_deactivate: OK [ 28.358793] Testing event vector_activate: OK [ 28.380552] Testing event vector_alloc_managed: OK [ 28.404103] Testing event vector_alloc: OK [ 28.426359] Testing event vector_reserve: OK [ 28.448680] Testing event vector_reserve_managed: OK [ 28.472149] Testing event vector_clear: OK [ 28.494391] Testing event vector_update: OK [ 28.515596] Testing event vector_config: OK [ 28.538428] Testing event thermal_apic_exit: OK [ 28.560912] Testing event thermal_apic_entry: OK [ 28.583880] Testing event deferred_error_apic_exit: OK [ 28.606382] Testing event deferred_error_apic_entry: OK [ 28.630505] Testing event threshold_apic_exit: OK [ 28.654106] Testing event threshold_apic_entry: OK [ 28.676194] Testing event call_function_single_exit: OK [ 28.699422] Testing event call_function_single_entry: OK [ 28.723705] Testing event call_function_exit: OK [ 28.745947] Testing event call_function_entry: OK [ 28.769883] Testing event reschedule_exit: OK [ 28.792793] Testing event reschedule_entry: OK [ 28.815724] Testing event irq_work_exit: OK [ 28.838448] Testing event irq_work_entry: OK [ 28.859525] Testing event x86_platform_ipi_exit: OK [ 28.881149] Testing event x86_platform_ipi_entry: OK [ 28.904382] Testing event error_apic_exit: OK [ 28.926576] Testing event error_apic_entry: OK [ 28.950693] Testing event spurious_apic_exit: OK [ 28.973808] Testing event spurious_apic_entry: OK [ 28.998089] Testing event local_timer_exit: OK [ 29.020654] Testing event local_timer_entry: OK [ 29.043927] Testing event nmi_handler: OK [ 29.065436] Testing event x86_fpu_xstate_check_failed: OK [ 29.088650] Testing event x86_fpu_copy_dst: OK [ 29.111855] Testing event x86_fpu_copy_src: OK [ 29.134598] Testing event x86_fpu_dropped: OK [ 29.157724] Testing event x86_fpu_init_state: OK [ 29.180987] Testing event x86_fpu_regs_deactivated: OK [ 29.205335] Testing event x86_fpu_regs_activated: OK [ 29.227397] Testing event x86_fpu_after_restore: OK [ 29.250044] Testing event x86_fpu_before_restore: OK [ 29.272157] Testing event x86_fpu_after_save: OK [ 29.295870] Testing event x86_fpu_before_save: OK [ 29.317878] Testing event mce_record: OK [ 29.340344] Testing event mon_llc_occupancy_limbo: OK [ 29.362923] Testing event pseudo_lock_l3: OK [ 29.385682] Testing event pseudo_lock_l2: OK [ 29.407672] Testing event pseudo_lock_mem_latency: OK [ 29.430232] Testing event page_fault_kernel: OK [ 29.452817] Testing event page_fault_user: OK [ 29.474613] Testing event task_prctl_unknown: OK [ 29.498080] Testing event task_rename: OK [ 29.520303] Testing event task_newtask: OK [ 29.543306] Testing event cpuhp_exit: OK [ 29.565362] Testing event cpuhp_multi_enter: OK [ 29.587968] Testing event cpuhp_enter: OK [ 29.610268] Testing event tasklet_exit: OK [ 29.633473] Testing event tasklet_entry: OK [ 29.655680] Testing event softirq_raise: OK [ 29.678402] Testing event softirq_exit: OK [ 29.701301] Testing event softirq_entry: OK [ 29.724369] Testing event irq_handler_exit: OK [ 29.746970] Testing event irq_handler_entry: OK [ 29.769972] Testing event signal_deliver: OK [ 29.792675] Testing event signal_generate: OK [ 29.814781] Testing event workqueue_execute_end: OK [ 29.838083] Testing event workqueue_execute_start: OK [ 29.860268] Testing event workqueue_activate_work: OK [ 29.884245] Testing event workqueue_queue_work: OK [ 29.906210] Testing event notifier_run: OK [ 29.928345] Testing event notifier_unregister: OK [ 29.951124] Testing event notifier_register: OK [ 29.972938] Testing event ipi_exit: OK [ 29.993956] Testing event ipi_entry: OK [ 30.017186] Testing event ipi_send_cpumask: OK [ 30.039676] Testing event ipi_send_cpu: OK [ 30.062456] Testing event ipi_raise: OK [ 30.083217] Testing event sched_wake_idle_without_ipi: OK [ 30.107610] Testing event sched_skip_vma_numa: OK [ 30.130261] Testing event sched_swap_numa: OK [ 30.153582] Testing event sched_stick_numa: OK [ 30.175908] Testing event sched_move_numa: OK [ 30.198761] Testing event sched_process_hang: OK [ 30.222100] Testing event sched_pi_setprio: OK [ 30.245880] Testing event sched_stat_runtime: [ 30.246257] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 30.274679] OK [ 30.277114] Testing event sched_stat_blocked: OK [ 30.299001] Testing event sched_stat_iowait: OK [ 30.320920] Testing event sched_stat_sleep: OK [ 30.342867] Testing event sched_stat_wait: OK [ 30.365762] Testing event sched_prepare_exec: OK [ 30.389002] Testing event sched_process_exec: OK [ 30.411005] Testing event sched_process_fork: OK [ 30.433010] Testing event sched_process_wait: OK [ 30.456018] Testing event sched_wait_task: OK [ 30.477548] Testing event sched_process_exit: OK [ 30.500856] Testing event sched_process_free: OK [ 30.523852] Testing event sched_migrate_task: OK [ 30.547009] Testing event sched_switch: OK [ 30.569551] Testing event sched_wakeup_new: OK [ 30.592648] Testing event sched_wakeup: OK [ 30.614371] Testing event sched_waking: OK [ 30.637565] Testing event sched_kthread_work_execute_end: OK [ 30.661922] Testing event sched_kthread_work_execute_start: OK [ 30.686112] Testing event sched_kthread_work_queue_work: OK [ 30.709968] Testing event sched_kthread_stop_ret: OK [ 30.733207] Testing event sched_kthread_stop: OK [ 30.755049] Testing event contention_end: OK [ 30.778955] Testing event contention_begin: OK [ 30.802116] Testing event console: OK [ 30.822928] Testing event irq_matrix_free: OK [ 30.844535] Testing event irq_matrix_alloc: OK [ 30.866637] Testing event irq_matrix_assign: OK [ 30.889947] Testing event irq_matrix_alloc_managed: OK [ 30.913361] Testing event irq_matrix_remove_managed: OK [ 30.937449] Testing event irq_matrix_reserve_managed: OK [ 30.959581] Testing event irq_matrix_alloc_reserved: OK [ 30.981413] Testing event irq_matrix_assign_system: OK [ 31.003382] Testing event irq_matrix_remove_reserved: OK [ 31.026540] Testing event irq_matrix_reserve: OK [ 31.048988] Testing event irq_matrix_offline: OK [ 31.071011] Testing event irq_matrix_online: OK [ 31.092767] Testing event rcu_stall_warning: OK [ 31.115983] Testing event rcu_utilization: OK [ 31.138969] Testing event dma_sync_sg_for_device: OK [ 31.161382] Testing event dma_sync_sg_for_cpu: OK [ 31.184087] Testing event dma_sync_single_for_device: OK [ 31.207533] Testing event dma_sync_single_for_cpu: OK [ 31.231452] Testing event dma_unmap_sg: OK [ 31.253329] Testing event dma_map_sg_err: OK [ 31.275714] Testing event dma_map_sg: OK [ 31.297298] Testing event dma_free_sgt: OK [ 31.318291] Testing event dma_free_pages: OK [ 31.340486] Testing event dma_free: OK [ 31.362995] Testing event dma_alloc_sgt: OK [ 31.385583] Testing event dma_alloc_sgt_err: OK [ 31.408761] Testing event dma_alloc_pages: OK [ 31.431785] Testing event dma_alloc: OK [ 31.453231] Testing event dma_unmap_resource: OK [ 31.476011] Testing event dma_unmap_page: OK [ 31.499672] Testing event dma_map_resource: OK [ 31.522702] Testing event dma_map_page: OK [ 31.544493] Testing event swiotlb_bounced: OK [ 31.566782] Testing event sys_exit: OK [ 31.589012] Testing event sys_enter: OK [ 31.611246] Testing event module_request: OK [ 31.633450] Testing event module_put: OK [ 31.655137] Testing event module_get: OK [ 31.676328] Testing event module_free: OK [ 31.698200] Testing event module_load: OK [ 31.720209] Testing event tick_stop: OK [ 31.742180] Testing event itimer_expire: OK [ 31.764421] Testing event itimer_state: OK [ 31.787306] Testing event hrtimer_cancel: OK [ 31.810719] Testing event hrtimer_expire_exit: OK [ 31.832886] Testing event hrtimer_expire_entry: OK [ 31.856011] Testing event hrtimer_start: OK [ 31.879625] Testing event hrtimer_setup: OK [ 31.902384] Testing event timer_base_idle: OK [ 31.923606] Testing event timer_cancel: OK [ 31.946606] Testing event timer_expire_exit: OK [ 31.969911] Testing event timer_expire_entry: OK [ 31.992053] Testing event timer_start: OK [ 32.014229] Testing event timer_init: OK [ 32.036148] Testing event alarmtimer_cancel: OK [ 32.059731] Testing event alarmtimer_start: OK [ 32.082832] Testing event alarmtimer_fired: OK [ 32.105650] Testing event alarmtimer_suspend: OK [ 32.127816] Testing event tmigr_handle_remote: OK [ 32.149931] Testing event tmigr_update_events: OK [ 32.173089] Testing event tmigr_cpu_new_timer_idle: OK [ 32.195462] Testing event tmigr_cpu_idle: OK [ 32.217473] Testing event tmigr_handle_remote_cpu: OK [ 32.241226] Testing event tmigr_cpu_offline: OK [ 32.263753] Testing event tmigr_cpu_online: OK [ 32.286659] Testing event tmigr_cpu_active: OK [ 32.308637] Testing event tmigr_cpu_new_timer: OK [ 32.331968] Testing event tmigr_group_set_cpu_active: OK [ 32.355605] Testing event tmigr_group_set_cpu_inactive: OK [ 32.379656] Testing event tmigr_connect_cpu_parent: OK [ 32.402584] Testing event tmigr_connect_child_parent: OK [ 32.426549] Testing event tmigr_group_set: OK [ 32.448750] Testing event csd_function_exit: OK [ 32.472116] Testing event csd_function_entry: OK [ 32.495132] Testing event csd_queue_cpu: OK [ 32.517683] Testing event cgroup_rstat_cpu_unlock_fastpath: OK [ 32.542226] Testing event cgroup_rstat_cpu_unlock: OK [ 32.564389] Testing event cgroup_rstat_cpu_locked_fastpath: OK [ 32.587216] Testing event cgroup_rstat_cpu_locked: OK [ 32.611264] Testing event cgroup_rstat_cpu_lock_contended_fastpath: OK [ 32.635949] Testing event cgroup_rstat_cpu_lock_contended: OK [ 32.661048] Testing event cgroup_rstat_unlock: OK [ 32.684142] Testing event cgroup_rstat_locked: OK [ 32.705917] Testing event cgroup_rstat_lock_contended: OK [ 32.728589] Testing event cgroup_notify_frozen: OK [ 32.752027] Testing event cgroup_notify_populated: OK [ 32.775474] Testing event cgroup_transfer_tasks: OK [ 32.798083] Testing event cgroup_attach_task: OK [ 32.820987] Testing event cgroup_unfreeze: OK [ 32.843746] Testing event cgroup_freeze: OK [ 32.865406] Testing event cgroup_rename: OK [ 32.887575] Testing event cgroup_release: OK [ 32.910466] Testing event cgroup_rmdir: OK [ 32.932498] Testing event cgroup_mkdir: OK [ 32.954269] Testing event cgroup_remount: OK [ 32.976468] Testing event cgroup_destroy_root: OK [ 32.999941] Testing event cgroup_setup_root: OK [ 33.021722] Testing event sample_threshold: OK [ 33.043629] Testing event nmi_noise: OK [ 33.066043] Testing event irq_noise: OK [ 33.089038] Testing event softirq_noise: OK [ 33.112441] Testing event thread_noise: OK [ 33.133279] Testing event timerlat_sample: OK [ 33.154727] Testing event osnoise_sample: OK [ 33.177674] Testing event ftrace_test_filter: OK [ 33.200826] Testing event bpf_trace_printk: OK [ 33.222679] Testing event error_report_end: OK [ 33.244650] Testing event guest_halt_poll_ns: OK [ 33.267069] Testing event dev_pm_qos_remove_request: OK [ 33.289623] Testing event dev_pm_qos_update_request: OK [ 33.312434] Testing event dev_pm_qos_add_request: OK [ 33.334625] Testing event pm_qos_update_flags: OK [ 33.357967] Testing event pm_qos_update_target: OK [ 33.381187] Testing event pm_qos_remove_request: OK [ 33.404112] Testing event pm_qos_update_request: OK [ 33.426085] Testing event pm_qos_add_request: OK [ 33.450044] Testing event power_domain_target: OK [ 33.471884] Testing event clock_set_rate: OK [ 33.493481] Testing event clock_disable: OK [ 33.514532] Testing event clock_enable: OK [ 33.536346] Testing event wakeup_source_deactivate: OK [ 33.558539] Testing event wakeup_source_activate: OK [ 33.582176] Testing event suspend_resume: OK [ 33.606310] Testing event device_pm_callback_end: OK [ 33.630217] Testing event device_pm_callback_start: OK [ 33.654383] Testing event cpu_frequency_limits: OK [ 33.678198] Testing event cpu_frequency: OK [ 33.701425] Testing event pstate_sample: OK [ 33.723438] Testing event powernv_throttle: OK [ 33.744825] Testing event psci_domain_idle_exit: OK [ 33.768101] Testing event psci_domain_idle_enter: OK [ 33.790148] Testing event cpu_idle_miss: OK [ 33.812370] Testing event cpu_idle: OK [ 33.835048] Testing event rpm_status: OK [ 33.857354] Testing event rpm_return_int: OK [ 33.879698] Testing event rpm_usage: OK [ 33.902290] Testing event rpm_idle: OK [ 33.923942] Testing event rpm_resume: OK [ 33.945253] Testing event rpm_suspend: OK [ 33.966219] Testing event error_wwnr: OK [ 33.987348] Testing event event_wwnr: OK [ 34.008377] Testing event bpf_xdp_link_attach_failed: OK [ 34.030540] Testing event mem_return_failed: OK [ 34.052729] Testing event mem_connect: OK [ 34.075231] Testing event mem_disconnect: OK [ 34.097554] Testing event xdp_devmap_xmit: OK [ 34.120625] Testing event xdp_cpumap_enqueue: OK [ 34.144100] Testing event xdp_cpumap_kthread: OK [ 34.166844] Testing event xdp_redirect_map_err: OK [ 34.188949] Testing event xdp_redirect_map: OK [ 34.211821] Testing event xdp_redirect_err: OK [ 34.234911] Testing event xdp_redirect: OK [ 34.258533] Testing event xdp_bulk_tx: OK [ 34.281370] Testing event xdp_exception: OK [ 34.303712] Testing event user_exit: OK [ 34.325993] Testing event user_enter: OK [ 34.347271] Testing event rseq_ip_fixup: OK [ 34.368413] Testing event rseq_update: OK [ 34.389320] Testing event file_check_and_advance_wb_err: OK [ 34.412806] Testing event filemap_set_wb_err: OK [ 34.435839] Testing event mm_filemap_fault: OK [ 34.458656] Testing event mm_filemap_map_pages: OK [ 34.481968] Testing event mm_filemap_get_pages: OK [ 34.506068] Testing event mm_filemap_add_to_page_cache: OK [ 34.529672] Testing event mm_filemap_delete_from_page_cache: OK [ 34.554170] Testing event compact_retry: OK [ 34.577584] Testing event skip_task_reaping: OK [ 34.599712] Testing event finish_task_reaping: OK [ 34.622094] Testing event start_task_reaping: OK [ 34.644878] Testing event wake_reaper: OK [ 34.667222] Testing event mark_victim: OK [ 34.689222] Testing event reclaim_retry_zone: OK [ 34.711875] Testing event oom_score_adj_update: OK [ 34.735965] Testing event mm_lru_activate: OK [ 34.758725] Testing event mm_lru_insertion: OK [ 34.780673] Testing event mm_vmscan_throttled: OK [ 34.804081] Testing event mm_vmscan_node_reclaim_end: OK [ 34.827527] Testing event mm_vmscan_node_reclaim_begin: OK [ 34.850897] Testing event mm_vmscan_lru_shrink_active: OK [ 34.873619] Testing event mm_vmscan_lru_shrink_inactive: OK [ 34.898986] Testing event mm_vmscan_reclaim_pages: OK [ 34.922266] Testing event mm_vmscan_write_folio: OK [ 34.945283] Testing event mm_vmscan_lru_isolate: OK [ 34.969305] Testing event mm_shrink_slab_end: OK [ 34.992046] Testing event mm_shrink_slab_start: OK [ 35.014960] Testing event mm_vmscan_memcg_softlimit_reclaim_end: OK [ 35.039684] Testing event mm_vmscan_memcg_reclaim_end: OK [ 35.063792] Testing event mm_vmscan_direct_reclaim_end: OK [ 35.087718] Testing event mm_vmscan_memcg_softlimit_reclaim_begin: OK [ 35.112808] Testing event mm_vmscan_memcg_reclaim_begin: OK [ 35.136999] Testing event mm_vmscan_direct_reclaim_begin: OK [ 35.159877] Testing event mm_vmscan_wakeup_kswapd: OK [ 35.182292] Testing event mm_vmscan_kswapd_wake: OK [ 35.205106] Testing event mm_vmscan_kswapd_sleep: OK [ 35.228170] Testing event percpu_destroy_chunk: OK [ 35.251228] Testing event percpu_create_chunk: OK [ 35.274100] Testing event percpu_alloc_percpu_fail: OK [ 35.297562] Testing event percpu_free_percpu: OK [ 35.320028] Testing event percpu_alloc_percpu: OK [ 35.344164] Testing event rss_stat: OK [ 35.366361] Testing event mm_calculate_totalreserve_pages: OK [ 35.389973] Testing event mm_setup_per_zone_lowmem_reserve: OK [ 35.414090] Testing event mm_setup_per_zone_wmarks: OK [ 35.437333] Testing event mm_alloc_contig_migrate_range_info: OK [ 35.460201] Testing event mm_page_alloc_extfrag: OK [ 35.484341] Testing event mm_page_pcpu_drain: OK [ 35.505848] Testing event mm_page_alloc_zone_locked: OK [ 35.529588] Testing event mm_page_alloc: OK [ 35.551444] Testing event mm_page_free_batched: OK [ 35.575108] Testing event mm_page_free: OK [ 35.597481] Testing event kmem_cache_free: OK [ 35.621559] Testing event kfree: OK [ 35.642893] Testing event kmalloc: OK [ 35.665226] Testing event kmem_cache_alloc: OK [ 35.687934] Testing event mm_compaction_kcompactd_wake: OK [ 35.710685] Testing event mm_compaction_wakeup_kcompactd: OK [ 35.736071] Testing event mm_compaction_kcompactd_sleep: OK [ 35.758780] Testing event mm_compaction_defer_reset: OK [ 35.782423] Testing event mm_compaction_defer_compaction: OK [ 35.805073] Testing event mm_compaction_deferred: OK [ 35.827400] Testing event mm_compaction_suitable: OK [ 35.851136] Testing event mm_compaction_finished: OK [ 35.873203] Testing event mm_compaction_try_to_compact_pages: OK [ 35.897248] Testing event mm_compaction_end: OK [ 35.919787] Testing event mm_compaction_begin: OK [ 35.942886] Testing event mm_compaction_migratepages: OK [ 35.966517] Testing event mm_compaction_fast_isolate_freepages: OK [ 35.990388] Testing event mm_compaction_isolate_freepages: OK [ 36.013929] Testing event mm_compaction_isolate_migratepages: OK [ 36.037402] Testing event mmap_lock_acquire_returned: OK [ 36.062081] Testing event mmap_lock_released: OK [ 36.086264] Testing event mmap_lock_start_locking: OK [ 36.110775] Testing event exit_mmap: OK [ 36.133251] Testing event vma_store: OK [ 36.155232] Testing event vma_mas_szero: OK [ 36.176361] Testing event vm_unmapped_area: OK [ 36.198630] Testing event remove_migration_pte: OK [ 36.222025] Testing event set_migration_pte: OK [ 36.244729] Testing event mm_migrate_pages_start: OK [ 36.268189] Testing event mm_migrate_pages: OK [ 36.291824] Testing event tlb_flush: OK [ 36.314310] Testing event free_vmap_area_noflush: OK [ 36.337336] Testing event purge_vmap_area_lazy: OK [ 36.361077] Testing event alloc_vmap_area: OK [ 36.383559] Testing event ksm_advisor: OK [ 36.406436] Testing event ksm_remove_rmap_item: OK [ 36.428983] Testing event ksm_remove_ksm_page: OK [ 36.451119] Testing event ksm_merge_with_ksm_page: OK [ 36.475449] Testing event ksm_merge_one_page: OK [ 36.496907] Testing event ksm_exit: OK [ 36.518174] Testing event ksm_enter: OK [ 36.542241] Testing event ksm_stop_scan: OK [ 36.565590] Testing event ksm_start_scan: OK [ 36.587458] Testing event remove_migration_pmd: OK [ 36.609003] Testing event set_migration_pmd: OK [ 36.630740] Testing event hugepage_update_pud: OK [ 36.653862] Testing event hugepage_update_pmd: OK [ 36.675913] Testing event hugepage_set_pud: OK [ 36.698615] Testing event hugepage_set_pmd: OK [ 36.721613] Testing event mm_khugepaged_collapse_file: OK [ 36.745778] Testing event mm_khugepaged_scan_file: OK [ 36.769315] Testing event mm_collapse_huge_page_swapin: OK [ 36.792908] Testing event mm_collapse_huge_page_isolate: OK [ 36.817009] Testing event mm_collapse_huge_page: OK [ 36.841283] Testing event mm_khugepaged_scan_pmd: OK [ 36.864266] Testing event memcg_flush_stats: OK [ 36.886845] Testing event count_memcg_events: OK [ 36.910853] Testing event mod_memcg_lruvec_state: OK [ 36.933140] Testing event mod_memcg_state: OK [ 36.955579] Testing event test_pages_isolated: OK [ 36.977917] Testing event cma_alloc_busy_retry: OK [ 37.001167] Testing event cma_alloc_finish: OK [ 37.022813] Testing event cma_alloc_start: OK [ 37.045596] Testing event cma_release: OK [ 37.067410] Testing event damon_aggregated: OK [ 37.088648] Testing event damos_before_apply: OK [ 37.112004] Testing event fill_mg_cmtime: OK [ 37.134698] Testing event ctime_ns_xchg: OK [ 37.157375] Testing event ctime_xchg_skip: OK [ 37.179623] Testing event inode_set_ctime_to_ts: OK [ 37.202302] Testing event sb_clear_inode_writeback: OK [ 37.226510] Testing event sb_mark_inode_writeback: OK [ 37.250291] Testing event writeback_dirty_inode_enqueue: OK [ 37.273713] Testing event writeback_lazytime_iput: OK [ 37.298241] Testing event writeback_lazytime: OK [ 37.322067] Testing event writeback_single_inode: OK [ 37.345151] Testing event writeback_single_inode_start: OK [ 37.368671] Testing event writeback_sb_inodes_requeue: OK [ 37.393763] Testing event balance_dirty_pages: OK [ 37.417135] Testing event bdi_dirty_ratelimit: OK [ 37.439890] Testing event global_dirty_state: OK [ 37.463513] Testing event writeback_queue_io: OK [ 37.484888] Testing event wbc_writepage: OK [ 37.507597] Testing event writeback_bdi_register: OK [ 37.531130] Testing event writeback_wake_background: OK [ 37.554434] Testing event writeback_pages_written: OK [ 37.577253] Testing event writeback_wait: OK [ 37.599694] Testing event writeback_written: OK [ 37.621813] Testing event writeback_start: OK [ 37.644756] Testing event writeback_exec: OK [ 37.667655] Testing event writeback_queue: OK [ 37.690634] Testing event writeback_write_inode: OK [ 37.714239] Testing event writeback_write_inode_start: OK [ 37.737736] Testing event flush_foreign: OK [ 37.760404] Testing event track_foreign_dirty: OK [ 37.782105] Testing event inode_switch_wbs: OK [ 37.804833] Testing event inode_foreign_history: OK [ 37.828319] Testing event writeback_dirty_inode: OK [ 37.851292] Testing event writeback_dirty_inode_start: OK [ 37.874614] Testing event writeback_mark_inode_dirty: OK [ 37.898507] Testing event folio_wait_writeback: OK [ 37.921205] Testing event writeback_dirty_folio: OK [ 37.944239] Testing event dax_writeback_one: OK [ 37.966712] Testing event dax_writeback_range_done: OK [ 37.990376] Testing event dax_writeback_range: OK [ 38.013926] Testing event dax_insert_mapping: OK [ 38.036804] Testing event dax_insert_pfn_mkwrite: OK [ 38.059335] Testing event dax_insert_pfn_mkwrite_no_entry: OK [ 38.082086] Testing event dax_load_hole: OK [ 38.103400] Testing event dax_pte_fault_done: OK [ 38.126845] Testing event dax_pte_fault: OK [ 38.148601] Testing event dax_pmd_insert_mapping: OK [ 38.171426] Testing event dax_pmd_load_hole_fallback: OK [ 38.194716] Testing event dax_pmd_load_hole: OK [ 38.218941] Testing event dax_pmd_fault_done: OK [ 38.242043] Testing event dax_pmd_fault: OK [ 38.264361] Testing event leases_conflict: OK [ 38.285583] Testing event generic_add_lease: OK [ 38.308899] Testing event time_out_leases: OK [ 38.331729] Testing event generic_delete_lease: OK [ 38.353983] Testing event break_lease_unblock: OK [ 38.377114] Testing event break_lease_block: OK [ 38.399897] Testing event break_lease_noblock: OK [ 38.423157] Testing event flock_lock_inode: OK [ 38.444711] Testing event locks_remove_posix: OK [ 38.466843] Testing event fcntl_setlk: OK [ 38.488404] Testing event posix_lock_inode: OK [ 38.511647] Testing event locks_get_lock_context: OK [ 38.535325] Testing event iomap_dio_complete: OK [ 38.557842] Testing event iomap_dio_rw_begin: OK [ 38.580795] Testing event iomap_iter: OK [ 38.603177] Testing event iomap_writepage_map: OK [ 38.627137] Testing event iomap_iter_srcmap: OK [ 38.650923] Testing event iomap_iter_dstmap: OK [ 38.673714] Testing event iomap_dio_rw_queued: OK [ 38.697912] Testing event iomap_dio_invalidate_fail: OK [ 38.720452] Testing event iomap_invalidate_folio: OK [ 38.745355] Testing event iomap_release_folio: OK [ 38.768128] Testing event iomap_writepage: OK [ 38.791786] Testing event iomap_readahead: OK [ 38.813564] Testing event iomap_readpage: OK [ 38.836491] Testing event netfs_folioq: OK [ 38.859553] Testing event netfs_collect_stream: OK [ 38.883007] Testing event netfs_collect_gap: OK [ 38.905927] Testing event netfs_collect_state: OK [ 38.929144] Testing event netfs_collect_folio: OK [ 38.952125] Testing event netfs_collect_sreq: OK [ 38.974817] Testing event netfs_collect: OK [ 38.997373] Testing event netfs_write: OK [ 39.019450] Testing event netfs_write_iter: OK [ 39.042867] Testing event netfs_folio: OK [ 39.066943] Testing event netfs_sreq_ref: OK [ 39.090743] Testing event netfs_rreq_ref: OK [ 39.112557] Testing event netfs_failure: OK [ 39.135540] Testing event netfs_sreq: OK [ 39.159770] Testing event netfs_rreq: OK [ 39.183520] Testing event netfs_read: OK [ 39.206238] Testing event fscache_resize: OK [ 39.228492] Testing event fscache_invalidate: OK [ 39.250022] Testing event fscache_relinquish: OK [ 39.273806] Testing event fscache_acquire: OK [ 39.296556] Testing event fscache_access: OK [ 39.319780] Testing event fscache_access_volume: OK [ 39.343397] Testing event fscache_access_cache: OK [ 39.367094] Testing event fscache_active: OK [ 39.388728] Testing event fscache_cookie: OK [ 39.410838] Testing event fscache_volume: OK [ 39.432724] Testing event fscache_cache: OK [ 39.454570] Testing event hugetlbfs_fallocate: OK [ 39.477909] Testing event hugetlbfs_setattr: OK [ 39.500774] Testing event hugetlbfs_free_inode: OK [ 39.523958] Testing event hugetlbfs_evict_inode: OK [ 39.547126] Testing event hugetlbfs_alloc_inode: OK [ 39.571185] Testing event nfs_xdr_bad_filehandle: OK [ 39.595162] Testing event nfs_xdr_status: OK [ 39.617522] Testing event nfs_local_open_fh: OK [ 39.639943] Testing event nfs_mount_path: OK [ 39.662461] Testing event nfs_mount_option: OK [ 39.685800] Testing event nfs_mount_assign: OK [ 39.709079] Testing event nfs_fh_to_dentry: OK [ 39.730659] Testing event nfs_direct_write_reschedule_io: OK [ 39.754854] Testing event nfs_direct_write_schedule_iovec: OK [ 39.778156] Testing event nfs_direct_write_completion: OK [ 39.802605] Testing event nfs_direct_write_complete: OK [ 39.825486] Testing event nfs_direct_resched_write: OK [ 39.848543] Testing event nfs_direct_commit_complete: OK [ 39.871677] Testing event nfs_commit_done: OK [ 39.894752] Testing event nfs_initiate_commit: OK [ 39.917917] Testing event nfs_commit_error: OK [ 39.939873] Testing event nfs_comp_error: OK [ 39.963572] Testing event nfs_write_error: OK [ 39.984757] Testing event nfs_writeback_done: OK [ 40.007821] Testing event nfs_initiate_write: OK [ 40.029804] Testing event nfs_pgio_error: OK [ 40.052499] Testing event nfs_readpage_short: OK [ 40.076004] Testing event nfs_readpage_done: OK [ 40.098943] Testing event nfs_initiate_read: OK [ 40.120958] Testing event nfs_aop_readahead_done: OK [ 40.144209] Testing event nfs_aop_readahead: OK [ 40.168010] Testing event nfs_launder_folio_done: OK [ 40.191209] Testing event nfs_invalidate_folio: OK [ 40.214085] Testing event nfs_writeback_folio_done: OK [ 40.236423] Testing event nfs_writeback_folio: OK [ 40.258125] Testing event nfs_aop_readpage_done: OK [ 40.282306] Testing event nfs_aop_readpage: OK [ 40.303860] Testing event nfs_sillyrename_unlink: OK [ 40.327367] Testing event nfs_async_rename_done: OK [ 40.351073] Testing event nfs_rename_exit: OK [ 40.374620] Testing event nfs_rename_enter: OK [ 40.396824] Testing event nfs_link_exit: OK [ 40.419578] Testing event nfs_link_enter: OK [ 40.441483] Testing event nfs_symlink_exit: OK [ 40.463715] Testing event nfs_symlink_enter: OK [ 40.485763] Testing event nfs_unlink_exit: OK [ 40.508586] Testing event nfs_unlink_enter: OK [ 40.530636] Testing event nfs_remove_exit: OK [ 40.553783] Testing event nfs_remove_enter: OK [ 40.576869] Testing event nfs_rmdir_exit: OK [ 40.598543] Testing event nfs_rmdir_enter: OK [ 40.621787] Testing event nfs_mkdir_exit: OK [ 40.643530] Testing event nfs_mkdir_enter: OK [ 40.665581] Testing event nfs_mknod_exit: OK [ 40.688689] Testing event nfs_mknod_enter: OK [ 40.710567] Testing event nfs_create_exit: OK [ 40.733708] Testing event nfs_create_enter: OK [ 40.756628] Testing event nfs_atomic_open_exit: OK [ 40.782000] Testing event nfs_atomic_open_enter: OK [ 40.805298] Testing event nfs_readdir_lookup_revalidate: OK [ 40.828993] Testing event nfs_readdir_lookup_revalidate_failed: OK [ 40.852409] Testing event nfs_readdir_lookup: OK [ 40.874972] Testing event nfs_lookup_revalidate_exit: OK [ 40.899762] Testing event nfs_lookup_revalidate_enter: OK [ 40.923814] Testing event nfs_lookup_exit: OK [ 40.945638] Testing event nfs_lookup_enter: OK [ 40.968851] Testing event nfs_readdir_uncached: OK [ 40.991181] Testing event nfs_readdir_cache_fill: OK [ 41.013136] Testing event nfs_readdir_invalidate_cache_range: OK [ 41.038440] Testing event nfs_size_grow: OK [ 41.061612] Testing event nfs_size_update: OK [ 41.084520] Testing event nfs_size_wcc: OK [ 41.107557] Testing event nfs_size_truncate: OK [ 41.130850] Testing event nfs_access_exit: OK [ 41.153563] Testing event nfs_readdir_uncached_done: OK [ 41.176611] Testing event nfs_readdir_cache_fill_done: OK [ 41.199609] Testing event nfs_readdir_force_readdirplus: OK [ 41.223010] Testing event nfs_set_cache_invalid: OK [ 41.245268] Testing event nfs_access_enter: OK [ 41.266775] Testing event nfs_fsync_exit: OK [ 41.289503] Testing event nfs_fsync_enter: OK [ 41.311559] Testing event nfs_writeback_inode_exit: OK [ 41.334521] Testing event nfs_writeback_inode_enter: OK [ 41.358421] Testing event nfs_setattr_exit: OK [ 41.380694] Testing event nfs_setattr_enter: OK [ 41.403929] Testing event nfs_getattr_exit: OK [ 41.425684] Testing event nfs_getattr_enter: OK [ 41.449717] Testing event nfs_invalidate_mapping_exit: OK [ 41.473606] Testing event nfs_invalidate_mapping_enter: OK [ 41.497682] Testing event nfs_revalidate_inode_exit: OK [ 41.521405] Testing event nfs_revalidate_inode_enter: OK [ 41.543508] Testing event nfs_refresh_inode_exit: OK [ 41.567366] Testing event nfs_refresh_inode_enter: OK [ 41.591923] Testing event nfs_set_inode_stale: OK [ 41.615920] Testing event nlmclnt_grant: OK [ 41.637395] Testing event nlmclnt_unlock: OK [ 41.658470] Testing event nlmclnt_lock: OK [ 41.682337] Testing event nlmclnt_test: OK [ 41.705499] Testing event cap_capable: OK [ 41.728410] Testing event selinux_audited: OK [ 41.750806] Testing event block_rq_remap: OK [ 41.772633] Testing event block_bio_remap: OK [ 41.796797] Testing event block_split: OK [ 41.818258] Testing event block_unplug: OK [ 41.841483] Testing event block_plug: OK [ 41.863127] Testing event block_getrq: OK [ 41.885375] Testing event block_bio_queue: OK [ 41.907735] Testing event block_bio_frontmerge: OK [ 41.931029] Testing event block_bio_backmerge: OK [ 41.953952] Testing event block_bio_bounce: OK [ 41.976614] Testing event block_bio_complete: OK [ 41.998991] Testing event block_io_done: OK [ 42.021621] Testing event block_io_start: OK [ 42.043659] Testing event block_rq_merge: OK [ 42.066485] Testing event block_rq_issue: OK [ 42.088698] Testing event block_rq_insert: OK [ 42.111835] Testing event block_rq_error: OK [ 42.134700] Testing event block_rq_complete: OK [ 42.156765] Testing event block_rq_requeue: OK [ 42.179643] Testing event block_dirty_buffer: OK [ 42.201811] Testing event block_touch_buffer: OK [ 42.225920] Testing event kyber_throttled: OK [ 42.248597] Testing event kyber_adjust: OK [ 42.271341] Testing event kyber_latency: OK [ 42.293374] Testing event wbt_timer: OK [ 42.314225] Testing event wbt_step: OK [ 42.335204] Testing event wbt_lat: OK [ 42.358117] Testing event wbt_stat: OK [ 42.379955] Testing event io_uring_local_work_run: OK [ 42.403432] Testing event io_uring_short_write: OK [ 42.425043] Testing event io_uring_task_work_run: OK [ 42.448249] Testing event io_uring_cqe_overflow: OK [ 42.470172] Testing event io_uring_req_failed: OK [ 42.494075] Testing event io_uring_task_add: OK [ 42.517936] Testing event io_uring_poll_arm: OK [ 42.540722] Testing event io_uring_submit_req: OK [ 42.563151] Testing event io_uring_complete: OK [ 42.584976] Testing event io_uring_fail_link: OK [ 42.607030] Testing event io_uring_cqring_wait: OK [ 42.631994] Testing event io_uring_link: OK [ 42.654397] Testing event io_uring_defer: OK [ 42.675462] Testing event io_uring_queue_async_work: OK [ 42.698400] Testing event io_uring_file_get: OK [ 42.720766] Testing event io_uring_register: OK [ 42.744941] Testing event io_uring_create: OK [ 42.766815] Testing event rdpmc: OK [ 42.788775] Testing event write_msr: OK [ 42.813117] Testing event read_msr: OK [ 42.837093] Testing event gpio_value: OK [ 42.859401] Testing event gpio_direction: OK [ 42.881526] Testing event pwm_get: OK [ 42.901952] Testing event pwm_apply: OK [ 42.924074] Testing event pwm_write_waveform: OK [ 42.945805] Testing event pwm_read_waveform: OK [ 42.968743] Testing event pwm_round_waveform_fromhw: OK [ 42.992611] Testing event pwm_round_waveform_tohw: OK [ 43.016266] Testing event clk_rate_request_done: OK [ 43.040355] Testing event clk_rate_request_start: OK [ 43.064510] Testing event clk_set_duty_cycle_complete: OK [ 43.088578] Testing event clk_set_duty_cycle: OK [ 43.112054] Testing event clk_set_phase_complete: OK [ 43.136164] Testing event clk_set_phase: OK [ 43.157585] Testing event clk_set_parent_complete: OK [ 43.180277] Testing event clk_set_parent: OK [ 43.202466] Testing event clk_set_rate_range: OK [ 43.223859] Testing event clk_set_max_rate: OK [ 43.247844] Testing event clk_set_min_rate: OK [ 43.269623] Testing event clk_set_rate_complete: OK [ 43.293248] Testing event clk_set_rate: OK [ 43.316344] Testing event clk_unprepare_complete: OK [ 43.338393] Testing event clk_unprepare: OK [ 43.360394] Testing event clk_prepare_complete: OK [ 43.384189] Testing event clk_prepare: OK [ 43.406235] Testing event clk_disable_complete: OK [ 43.429110] Testing event clk_disable: OK [ 43.450440] Testing event clk_enable_complete: OK [ 43.474148] Testing event clk_enable: OK [ 43.495273] Testing event cache_tag_flush_range_np: OK [ 43.517370] Testing event cache_tag_flush_range: OK [ 43.540056] Testing event cache_tag_flush_all: OK [ 43.563890] Testing event cache_tag_unassign: OK [ 43.585792] Testing event cache_tag_assign: OK [ 43.608674] Testing event prq_report: OK [ 43.632132] Testing event qi_submit: OK [ 43.655201] Testing event io_page_fault: OK [ 43.677387] Testing event unmap: OK [ 43.698714] Testing event map: OK [ 43.719517] Testing event attach_device_to_domain: OK [ 43.743257] Testing event remove_device_from_group: OK [ 43.765529] Testing event add_device_to_group: OK [ 43.787928] Testing event regcache_drop_region: OK [ 43.810130] Testing event regmap_async_complete_done: OK [ 43.832697] Testing event regmap_async_complete_start: OK [ 43.856594] Testing event regmap_async_io_complete: OK [ 43.881312] Testing event regmap_async_write_start: OK [ 43.903444] Testing event regmap_cache_bypass: OK [ 43.927115] Testing event regmap_cache_only: OK [ 43.951919] Testing event regcache_sync: OK [ 43.974459] Testing event regmap_hw_write_done: OK [ 43.997213] Testing event regmap_hw_write_start: OK [ 44.020309] Testing event regmap_hw_read_done: OK [ 44.044096] Testing event regmap_hw_read_start: OK [ 44.066983] Testing event regmap_bulk_read: OK [ 44.089696] Testing event regmap_bulk_write: OK [ 44.111912] Testing event regmap_reg_read_cache: OK [ 44.135077] Testing event regmap_reg_read: OK [ 44.158638] Testing event regmap_reg_write: OK [ 44.181637] Testing event devres_log: OK [ 44.205233] Testing event dma_fence_wait_end: OK [ 44.226796] Testing event dma_fence_wait_start: OK [ 44.249015] Testing event dma_fence_signaled: OK [ 44.271833] Testing event dma_fence_enable_signal: OK [ 44.294319] Testing event dma_fence_destroy: OK [ 44.317906] Testing event dma_fence_init: OK [ 44.340535] Testing event dma_fence_emit: OK [ 44.362449] Testing event scsi_eh_wakeup: OK [ 44.386565] Testing event scsi_dispatch_cmd_timeout: OK [ 44.408616] Testing event scsi_dispatch_cmd_done: OK [ 44.432380] Testing event scsi_dispatch_cmd_error: OK [ 44.455488] Testing event scsi_dispatch_cmd_start: OK [ 44.477368] Testing event spi_transfer_stop: OK [ 44.498947] Testing event spi_transfer_start: OK [ 44.520850] Testing event spi_message_done: OK [ 44.542691] Testing event spi_message_start: OK [ 44.565783] Testing event spi_message_submit: OK [ 44.587840] Testing event spi_set_cs: OK [ 44.609097] Testing event spi_setup: OK [ 44.631064] Testing event spi_controller_busy: OK [ 44.654133] Testing event spi_controller_idle: OK [ 44.677123] Testing event mdio_access: OK [ 44.698443] Testing event e1000e_trace_mac_register: OK [ 44.720468] Testing event i40e_xmit_frame_ring_drop: OK [ 44.743598] Testing event i40e_xmit_frame_ring: OK [ 44.767275] Testing event i40e_clean_rx_irq_rx: OK [ 44.790029] Testing event i40e_clean_rx_irq: OK [ 44.812702] Testing event i40e_clean_tx_irq_unmap: OK [ 44.835467] Testing event i40e_clean_tx_irq: OK [ 44.857713] Testing event i40e_napi_poll: OK [ 44.880705] Testing event xhci_dbc_giveback_request: OK [ 44.904657] Testing event xhci_dbc_queue_request: OK [ 44.928154] Testing event xhci_dbc_free_request: OK [ 44.951083] Testing event xhci_dbc_alloc_request: OK [ 44.973197] Testing event xhci_ring_host_doorbell: OK [ 44.996276] Testing event xhci_ring_ep_doorbell: OK [ 45.019311] Testing event xhci_hub_status_data: OK [ 45.042197] Testing event xhci_get_port_status: OK [ 45.065214] Testing event xhci_handle_port_status: OK [ 45.088260] Testing event xhci_inc_deq: OK [ 45.110311] Testing event xhci_inc_enq: OK [ 45.131495] Testing event xhci_ring_expansion: OK [ 45.153140] Testing event xhci_ring_free: OK [ 45.174479] Testing event xhci_ring_alloc: OK [ 45.195591] Testing event xhci_configure_endpoint_ctrl_ctx: OK [ 45.219236] Testing event xhci_address_ctrl_ctx: OK [ 45.242242] Testing event xhci_configure_endpoint: OK [ 45.266267] Testing event xhci_handle_cmd_set_deq: OK [ 45.288291] Testing event xhci_handle_cmd_reset_dev: OK [ 45.311672] Testing event xhci_handle_cmd_addr_dev: OK [ 45.335380] Testing event xhci_setup_device_slot: OK [ 45.358354] Testing event xhci_discover_or_reset_device: OK [ 45.382972] Testing event xhci_handle_cmd_disable_slot: OK [ 45.406666] Testing event xhci_free_dev: OK [ 45.428374] Testing event xhci_alloc_dev: OK [ 45.450439] Testing event xhci_add_endpoint: OK [ 45.471721] Testing event xhci_handle_cmd_config_ep: OK [ 45.495461] Testing event xhci_handle_cmd_reset_ep: OK [ 45.517345] Testing event xhci_handle_cmd_set_deq_ep: OK [ 45.539509] Testing event xhci_handle_cmd_stop_ep: OK [ 45.563432] Testing event xhci_handle_cmd_set_deq_stream: OK [ 45.587870] Testing event xhci_alloc_stream_info_ctx: OK [ 45.611512] Testing event xhci_urb_dequeue: OK [ 45.634834] Testing event xhci_urb_giveback: OK [ 45.657970] Testing event xhci_urb_enqueue: OK [ 45.683146] Testing event xhci_stop_device: OK [ 45.705851] Testing event xhci_setup_addressable_virt_device: OK [ 45.729296] Testing event xhci_setup_device: OK [ 45.751714] Testing event xhci_alloc_virt_device: OK [ 45.775191] Testing event xhci_free_virt_device: OK [ 45.797275] Testing event xhci_dbc_gadget_ep_queue: OK [ 45.820529] Testing event xhci_dbc_handle_transfer: OK [ 45.843513] Testing event xhci_dbc_handle_event: OK [ 45.866138] Testing event xhci_queue_trb: OK [ 45.890691] Testing event xhci_handle_transfer: OK [ 45.913229] Testing event xhci_handle_command: OK [ 45.936150] Testing event xhci_handle_event: OK [ 45.957667] Testing event xhci_address_ctx: OK [ 45.980871] Testing event xhci_dbg_ring_expansion: OK [ 46.005409] Testing event xhci_dbg_init: OK [ 46.027622] Testing event xhci_dbg_cancel_urb: OK [ 46.049891] Testing event xhci_dbg_reset_ep: OK [ 46.072984] Testing event xhci_dbg_quirks: OK [ 46.095823] Testing event xhci_dbg_context_change: OK [ 46.118290] Testing event xhci_dbg_address: OK [ 46.139643] Testing event ucsi_register_altmode: OK [ 46.162104] Testing event ucsi_register_port: OK [ 46.183864] Testing event ucsi_connector_change: OK [ 46.207271] Testing event ucsi_reset_ppm: OK [ 46.230473] Testing event ucsi_run_command: OK [ 46.253830] Testing event rtc_timer_fired: OK [ 46.275556] Testing event rtc_timer_dequeue: OK [ 46.297806] Testing event rtc_timer_enqueue: OK [ 46.321790] Testing event rtc_read_offset: OK [ 46.343581] Testing event rtc_set_offset: OK [ 46.365459] Testing event rtc_alarm_irq_enable: OK [ 46.388080] Testing event rtc_irq_set_state: OK [ 46.410774] Testing event rtc_irq_set_freq: OK [ 46.432614] Testing event rtc_read_alarm: OK [ 46.455457] Testing event rtc_set_alarm: OK [ 46.478620] Testing event rtc_read_time: OK [ 46.501491] Testing event rtc_set_time: OK [ 46.524502] Testing event i2c_result: OK [ 46.547121] Testing event i2c_reply: OK [ 46.569079] Testing event i2c_read: OK [ 46.590967] Testing event i2c_write: OK [ 46.613256] Testing event smbus_result: OK [ 46.635492] Testing event smbus_reply: OK [ 46.658367] Testing event smbus_read: OK [ 46.681337] Testing event smbus_write: OK [ 46.703202] Testing event hwmon_attr_show_string: OK [ 46.726402] Testing event hwmon_attr_store: OK [ 46.748867] Testing event hwmon_attr_show: OK [ 46.771700] Testing event thermal_zone_trip: OK [ 46.794850] Testing event cdev_update: OK [ 46.817381] Testing event thermal_temperature: OK [ 46.840136] Testing event watchdog_set_timeout: OK [ 46.863169] Testing event watchdog_stop: OK [ 46.885379] Testing event watchdog_ping: OK [ 46.907384] Testing event watchdog_start: OK [ 46.930499] Testing event amd_pstate_epp_perf: OK [ 46.954011] Testing event amd_pstate_perf: OK [ 46.976562] Testing event cros_ec_request_done: OK [ 46.999968] Testing event cros_ec_request_start: OK [ 47.023069] Testing event memory_failure_event: OK [ 47.044942] Testing event aer_event: OK [ 47.067276] Testing event non_standard_event: OK [ 47.090816] Testing event arm_event: OK [ 47.113239] Testing event mc_event: OK [ 47.134989] Testing event extlog_mem_event: OK [ 47.157827] Testing event tb_rx: OK [ 47.179884] Testing event tb_event: OK [ 47.201999] Testing event tb_tx: OK [ 47.223744] Testing event neigh_cleanup_and_release: OK [ 47.248613] Testing event neigh_event_send_dead: OK [ 47.272077] Testing event neigh_event_send_done: OK [ 47.295224] Testing event neigh_timer_handler: OK [ 47.319069] Testing event neigh_update_done: OK [ 47.341729] Testing event neigh_update: OK [ 47.364311] Testing event neigh_create: OK [ 47.385357] Testing event page_pool_update_nid: OK [ 47.409210] Testing event page_pool_state_hold: OK [ 47.432048] Testing event page_pool_state_release: OK [ 47.454240] Testing event page_pool_release: OK [ 47.476866] Testing event br_mdb_full: OK [ 47.498205] Testing event br_fdb_update: OK [ 47.520430] Testing event fdb_delete: OK [ 47.541326] Testing event br_fdb_external_learn_add: OK [ 47.564447] Testing event br_fdb_add: OK [ 47.585132] Testing event qdisc_create: OK [ 47.607518] Testing event qdisc_destroy: OK [ 47.630432] Testing event qdisc_reset: OK [ 47.652203] Testing event qdisc_enqueue: OK [ 47.674425] Testing event qdisc_dequeue: OK [ 47.696411] Testing event fib_table_lookup: OK [ 47.720845] Testing event tcp_ao_rcv_sne_update: OK [ 47.743086] Testing event tcp_ao_snd_sne_update: OK [ 47.766224] Testing event tcp_ao_synack_no_key: OK [ 47.790150] Testing event tcp_ao_rnext_request: OK [ 47.813985] Testing event tcp_ao_key_not_found: OK [ 47.836955] Testing event tcp_ao_mismatch: OK [ 47.859520] Testing event tcp_ao_wrong_maclen: OK [ 47.881900] Testing event tcp_ao_handshake_failure: OK [ 47.906577] Testing event tcp_hash_ao_required: OK [ 47.929975] Testing event tcp_hash_md5_mismatch: OK [ 47.952085] Testing event tcp_hash_md5_unexpected: OK [ 47.975247] Testing event tcp_hash_md5_required: OK [ 47.999094] Testing event tcp_hash_bad_header: OK [ 48.020953] Testing event tcp_cong_state_set: OK [ 48.044827] Testing event tcp_bad_csum: OK [ 48.068541] Testing event tcp_probe: OK [ 48.091046] Testing event tcp_retransmit_synack: OK [ 48.114126] Testing event tcp_rcv_space_adjust: OK [ 48.137154] Testing event tcp_destroy_sock: OK [ 48.160836] Testing event tcp_receive_reset: OK [ 48.182894] Testing event tcp_send_reset: OK [ 48.204482] Testing event tcp_retransmit_skb: OK [ 48.228006] Testing event udp_fail_queue_rcv_skb: OK [ 48.251281] Testing event sock_recv_length: OK [ 48.274832] Testing event sock_send_length: OK [ 48.296841] Testing event sk_data_ready: OK [ 48.319661] Testing event inet_sk_error_report: OK [ 48.342027] Testing event inet_sock_set_state: OK [ 48.364931] Testing event sock_exceed_buf_limit: OK [ 48.388308] Testing event sock_rcvqueue_full: OK [ 48.411897] Testing event dql_stall_detected: OK [ 48.435038] Testing event napi_poll: OK [ 48.459114] Testing event netif_receive_skb_list_exit: OK [ 48.482588] Testing event netif_rx_exit: OK [ 48.504449] Testing event netif_receive_skb_exit: OK [ 48.527202] Testing event napi_gro_receive_exit: OK [ 48.550298] Testing event napi_gro_frags_exit: OK [ 48.572888] Testing event netif_rx_entry: OK [ 48.594467] Testing event netif_receive_skb_list_entry: OK [ 48.617704] Testing event netif_receive_skb_entry: OK [ 48.642250] Testing event napi_gro_receive_entry: OK [ 48.665159] Testing event napi_gro_frags_entry: OK [ 48.688023] Testing event netif_rx: OK [ 48.711151] Testing event netif_receive_skb: OK [ 48.733973] Testing event net_dev_queue: OK [ 48.755404] Testing event net_dev_xmit_timeout: OK [ 48.777975] Testing event net_dev_xmit: OK [ 48.799313] Testing event net_dev_start_xmit: OK [ 48.821808] Testing event skb_copy_datagram_iovec: OK [ 48.845319] Testing event consume_skb: OK [ 48.867488] Testing event kfree_skb: OK [ 48.889235] Testing event netlink_extack: OK [ 48.912468] Testing event bpf_test_finish: OK [ 48.935748] Testing event bpf_trigger_tp: OK [ 48.958528] Testing event icmp_send: OK [ 48.981052] Testing event fib6_table_lookup: OK [ 49.003743] Testing event devlink_trap_report: OK [ 49.027071] Testing event devlink_health_reporter_state_update: OK [ 49.052371] Testing event devlink_health_recover_aborted: OK [ 49.076890] Testing event devlink_health_report: OK [ 49.099063] Testing event devlink_hwerr: OK [ 49.120396] Testing event devlink_hwmsg: OK [ 49.142369] Testing event svc_unregister: OK [ 49.165500] Testing event svc_noregister: OK [ 49.188683] Testing event svc_register: OK [ 49.212525] Testing event cache_entry_no_listener: OK [ 49.235244] Testing event cache_entry_make_negative: OK [ 49.258411] Testing event cache_entry_update: OK [ 49.280834] Testing event cache_entry_upcall: OK [ 49.303827] Testing event cache_entry_expired: OK [ 49.326897] Testing event svcsock_getpeername_err: OK [ 49.349224] Testing event svcsock_accept_err: OK [ 49.371882] Testing event svcsock_tcp_state: OK [ 49.393784] Testing event svcsock_tcp_recv_short: OK [ 49.417371] Testing event svcsock_write_space: OK [ 49.439903] Testing event svcsock_data_ready: OK [ 49.463064] Testing event svcsock_tcp_recv_err: OK [ 49.486054] Testing event svcsock_tcp_recv_eagain: OK [ 49.509239] Testing event svcsock_tcp_recv: OK [ 49.532640] Testing event svcsock_tcp_send: OK [ 49.555608] Testing event svcsock_udp_recv_err: OK [ 49.577999] Testing event svcsock_udp_recv: OK [ 49.600842] Testing event svcsock_udp_send: OK [ 49.623657] Testing event svcsock_marker: OK [ 49.646682] Testing event svcsock_free: OK [ 49.669507] Testing event svcsock_new: OK [ 49.692462] Testing event svc_defer_recv: OK [ 49.714691] Testing event svc_defer_queue: OK [ 49.737769] Testing event svc_defer_drop: OK [ 49.760513] Testing event svc_alloc_arg_err: OK [ 49.783412] Testing event svc_wake_up: OK [ 49.806240] Testing event svc_xprt_accept: OK [ 49.828784] Testing event svc_tls_timed_out: OK [ 49.851971] Testing event svc_tls_not_started: OK [ 49.874918] Testing event svc_tls_unavailable: OK [ 49.896983] Testing event svc_tls_upcall: OK [ 49.920670] Testing event svc_tls_start: OK [ 49.943560] Testing event svc_xprt_free: OK [ 49.966406] Testing event svc_xprt_detach: OK [ 49.988531] Testing event svc_xprt_close: OK [ 50.011532] Testing event svc_xprt_no_write_space: OK [ 50.034480] Testing event svc_xprt_dequeue: OK [ 50.057643] Testing event svc_xprt_enqueue: OK [ 50.080879] Testing event svc_xprt_create_err: OK [ 50.104153] Testing event svc_stats_latency: OK [ 50.126742] Testing event svc_replace_page_err: OK [ 50.149963] Testing event svc_send: OK [ 50.171928] Testing event svc_drop: OK [ 50.192946] Testing event svc_defer: OK [ 50.215043] Testing event svc_process: OK [ 50.236396] Testing event svc_authenticate: OK [ 50.258718] Testing event svc_xdr_sendto: OK [ 50.281566] Testing event svc_xdr_recvfrom: OK [ 50.303834] Testing event rpc_tls_not_started: OK [ 50.326101] Testing event rpc_tls_unavailable: OK [ 50.348916] Testing event rpcb_unregister: OK [ 50.371543] Testing event rpcb_register: OK [ 50.393587] Testing event pmap_register: OK [ 50.415427] Testing event rpcb_setport: OK [ 50.438333] Testing event rpcb_getport: OK [ 50.461488] Testing event xs_stream_read_request: OK [ 50.483176] Testing event xs_stream_read_data: OK [ 50.505898] Testing event xs_data_ready: OK [ 50.527404] Testing event xprt_reserve: OK [ 50.548440] Testing event xprt_put_cong: OK [ 50.570612] Testing event xprt_get_cong: OK [ 50.592511] Testing event xprt_release_cong: OK [ 50.613773] Testing event xprt_reserve_cong: OK [ 50.635761] Testing event xprt_release_xprt: OK [ 50.658729] Testing event xprt_reserve_xprt: OK [ 50.680711] Testing event xprt_ping: OK [ 50.703195] Testing event xprt_retransmit: OK [ 50.725646] Testing event xprt_transmit: OK [ 50.748578] Testing event xprt_lookup_rqst: OK [ 50.770704] Testing event xprt_timer: OK [ 50.792106] Testing event xprt_destroy: OK [ 50.815277] Testing event xprt_disconnect_force: OK [ 50.837268] Testing event xprt_disconnect_done: OK [ 50.859013] Testing event xprt_disconnect_auto: OK [ 50.880965] Testing event xprt_connect: OK [ 50.905512] Testing event xprt_create: OK [ 50.928404] Testing event rpc_socket_nospace: OK [ 50.952041] Testing event rpc_socket_shutdown: OK [ 50.973951] Testing event rpc_socket_close: OK [ 50.995666] Testing event rpc_socket_reset_connection: OK [ 51.018611] Testing event rpc_socket_error: OK [ 51.041742] Testing event rpc_socket_connect: OK [ 51.066136] Testing event rpc_socket_state_change: OK [ 51.089284] Testing event rpc_xdr_alignment: OK [ 51.111972] Testing event rpc_xdr_overflow: OK [ 51.135885] Testing event rpc_stats_latency: OK [ 51.158747] Testing event rpc_call_rpcerror: OK [ 51.180737] Testing event rpc_buf_alloc: OK [ 51.203482] Testing event rpcb_unrecognized_err: OK [ 51.228271] Testing event rpcb_unreachable_err: OK [ 51.251125] Testing event rpcb_bind_version_err: OK [ 51.274316] Testing event rpcb_timeout_err: OK [ 51.297655] Testing event rpcb_prog_unavail_err: OK [ 51.321091] Testing event rpc__auth_tooweak: OK [ 51.342769] Testing event rpc__bad_creds: OK [ 51.364521] Testing event rpc__stale_creds: OK [ 51.387808] Testing event rpc__mismatch: OK [ 51.409611] Testing event rpc__unparsable: OK [ 51.432779] Testing event rpc__garbage_args: OK [ 51.455737] Testing event rpc__proc_unavail: OK [ 51.478812] Testing event rpc__prog_mismatch: OK [ 51.500825] Testing event rpc__prog_unavail: OK [ 51.522817] Testing event rpc_bad_verifier: OK [ 51.545746] Testing event rpc_bad_callhdr: OK [ 51.568748] Testing event rpc_task_wakeup: OK [ 51.591524] Testing event rpc_task_sleep: OK [ 51.613691] Testing event rpc_task_call_done: OK [ 51.636810] Testing event rpc_task_end: OK [ 51.658359] Testing event rpc_task_signalled: OK [ 51.681048] Testing event rpc_task_timeout: OK [ 51.703822] Testing event rpc_task_complete: OK [ 51.725742] Testing event rpc_task_sync_wake: OK [ 51.747841] Testing event rpc_task_sync_sleep: OK [ 51.769981] Testing event rpc_task_run_action: OK [ 51.792972] Testing event rpc_task_begin: OK [ 51.815623] Testing event rpc_request: OK [ 51.837389] Testing event rpc_refresh_status: OK [ 51.858869] Testing event rpc_retry_refresh_status: OK [ 51.881308] Testing event rpc_timeout_status: OK [ 51.904809] Testing event rpc_connect_status: OK [ 51.927875] Testing event rpc_call_status: OK [ 51.949580] Testing event rpc_clnt_clone_err: OK [ 51.972846] Testing event rpc_clnt_new_err: OK [ 51.995702] Testing event rpc_clnt_new: OK [ 52.018308] Testing event rpc_clnt_replace_xprt_err: OK [ 52.042415] Testing event rpc_clnt_replace_xprt: OK [ 52.065241] Testing event rpc_clnt_release: OK [ 52.087626] Testing event rpc_clnt_shutdown: OK [ 52.109781] Testing event rpc_clnt_killall: OK [ 52.131623] Testing event rpc_clnt_free: OK [ 52.154578] Testing event rpc_xdr_reply_pages: OK [ 52.178089] Testing event rpc_xdr_recvfrom: OK [ 52.199651] Testing event rpc_xdr_sendto: OK [ 52.221702] Testing event 9p_fid_ref: OK [ 52.244371] Testing event 9p_protocol_dump: OK [ 52.268170] Testing event 9p_client_res: OK [ 52.292405] Testing event 9p_client_req: OK [ 52.314583] Testing event subflow_check_data_avail: OK [ 52.338519] Testing event ack_update_msk: OK [ 52.360690] Testing event get_mapping_status: OK [ 52.382809] Testing event mptcp_sendmsg_frag: OK [ 52.404978] Testing event mptcp_subflow_get_send: OK [ 52.427404] Testing event mctp_key_release: OK [ 52.450858] Testing event mctp_key_acquire: OK [ 52.473653] Testing event tls_alert_recv: OK [ 52.495508] Testing event tls_alert_send: OK [ 52.517519] Testing event tls_contenttype: OK [ 52.538777] Testing event handshake_cmd_done_err: OK [ 52.562165] Testing event handshake_cmd_done: OK [ 52.583812] Testing event handshake_cmd_accept_err: OK [ 52.606370] Testing event handshake_cmd_accept: OK [ 52.630208] Testing event handshake_notify_err: OK [ 52.654166] Testing event handshake_complete: OK [ 52.677841] Testing event handshake_destruct: OK [ 52.699805] Testing event handshake_cancel_busy: OK [ 52.722090] Testing event handshake_cancel_none: OK [ 52.745086] Testing event handshake_cancel: OK [ 52.767865] Testing event handshake_submit_err: OK [ 52.790997] Testing event handshake_submit: OK [ 52.813702] Testing event ma_write: OK [ 52.836081] Testing event ma_read: OK [ 52.857934] Testing event ma_op: OK [ 52.879780] Running tests on trace event systems: [ 52.885207] Testing event system maple_tree: OK [ 52.909170] Testing event system handshake: OK [ 52.932766] Testing event system mctp: OK [ 52.955394] Testing event system mptcp: OK [ 52.977594] Testing event system 9p: OK [ 53.003070] Testing event system sunrpc: OK [ 53.036802] Testing event system devlink: OK [ 53.059823] Testing event system fib6: OK [ 53.082595] Testing event system icmp: OK [ 53.105348] Testing event system bpf_test_run: OK [ 53.130342] Testing event system netlink: OK [ 53.153708] Testing event system skb: OK [ 53.176642] Testing event system net: OK [ 53.201368] Testing event system napi: OK [ 53.222726] Testing event system sock: OK [ 53.246891] Testing event system udp: OK [ 53.270332] Testing event system tcp: OK [ 53.294118] Testing event system fib: OK [ 53.318509] Testing event system qdisc: OK [ 53.340809] Testing event system bridge: OK [ 53.363566] Testing event system page_pool: OK [ 53.387222] Testing event system neigh: OK [ 53.411944] Testing event system thunderbolt: OK [ 53.437178] Testing event system ras: OK [ 53.458786] Testing event system cros_ec: OK [ 53.481888] Testing event system amd_cpu: OK [ 53.503896] Testing event system watchdog: OK [ 53.526868] Testing event system thermal: OK [ 53.549768] Testing event system hwmon: OK [ 53.572511] Testing event system smbus: OK [ 53.595544] Testing event system i2c: OK [ 53.618687] Testing event system rtc: OK [ 53.641933] Testing event system ucsi: OK [ 53.665743] Testing event system xhci-hcd: OK [ 53.693150] Testing event system i40e: OK [ 53.716643] Testing event system e1000e_trace: OK [ 53.741080] Testing event system mdio: OK [ 53.763405] Testing event system spi: OK [ 53.786860] Testing event system scsi: OK [ 53.810525] Testing event system dma_fence: OK [ 53.833056] Testing event system dev: OK [ 53.856349] Testing event system regmap: OK [ 53.880796] Testing event system iommu: OK [ 53.903753] Testing event system intel_iommu: OK [ 53.927320] Testing event system clk: OK [ 53.952010] Testing event system pwm: OK [ 53.975730] Testing event system gpio: OK [ 53.997793] Testing event system msr: OK [ 54.024440] Testing event system io_uring: OK [ 54.049657] Testing event system wbt: OK [ 54.072653] Testing event system kyber: OK [ 54.095538] Testing event system block: OK [ 54.120548] Testing event system avc: OK [ 54.144262] Testing event system capability: OK [ 54.165872] Testing event system lockd: OK [ 54.187613] Testing event system nfs: OK [ 54.217984] Testing event system hugetlbfs: OK [ 54.239998] Testing event system fscache: OK [ 54.264708] Testing event system netfs: OK [ 54.292011] Testing event system iomap: OK [ 54.316120] Testing event system filelock: OK [ 54.340454] Testing event system fs_dax: OK [ 54.363229] Testing event system writeback: OK [ 54.390521] Testing event system timestamp: OK [ 54.414145] Testing event system damon: OK [ 54.435636] Testing event system cma: OK [ 54.458525] Testing event system page_isolation: OK [ 54.482293] Testing event system memcg: OK [ 54.504580] Testing event system huge_memory: OK [ 54.527221] Testing event system thp: OK [ 54.550390] Testing event system ksm: OK [ 54.574915] Testing event system vmalloc: OK [ 54.597696] Testing event system tlb: OK [ 54.621554] Testing event system migrate: OK [ 54.644962] Testing event system mmap: OK [ 54.667441] Testing event system mmap_lock: OK [ 54.693188] Testing event system compaction: OK [ 54.717649] Testing event system kmem: OK [ 54.743696] Testing event system percpu: OK [ 54.766750] Testing event system vmscan: OK [ 54.791883] Testing event system pagemap: OK [ 54.813642] Testing event system oom: OK [ 54.836677] Testing event system filemap: OK [ 54.859177] Testing event system rseq: OK [ 54.881609] Testing event system context_tracking: OK [ 54.905469] Testing event system xdp: OK [ 54.931152] Testing event system rv: OK [ 54.953277] Testing event system rpm: OK [ 54.976846] Testing event system power: OK [ 55.004589] Testing event system error_report: OK [ 55.027277] Testing event system bpf_trace: OK [ 55.050773] Testing event system test: OK [ 55.074376] Testing event system osnoise: OK [ 55.096933] Testing event system cgroup: OK [ 55.121657] Testing event system csd: OK [ 55.145996] Testing event system timer_migration: OK [ 55.171109] Testing event system alarmtimer: OK [ 55.195154] Testing event system timer: OK [ 55.219577] Testing event system module: OK [ 55.242760] Testing event system raw_syscalls: OK [ 55.265141] Testing event system swiotlb: OK [ 55.287705] Testing event system dma: OK [ 55.311228] Testing event system rcu: OK [ 55.334743] Testing event system irq_matrix: OK [ 55.359401] Testing event system printk: OK [ 55.382750] Testing event system lock: OK [ 55.405262] Testing event system sched: OK [ 55.431331] Testing event system ipi: OK [ 55.453575] Testing event system notifier: OK [ 55.478056] Testing event system workqueue: OK [ 55.501962] Testing event system signal: OK [ 55.524665] Testing event system irq: OK [ 55.547889] Testing event system cpuhp: OK [ 55.570911] Testing event system task: OK [ 55.593520] Testing event system exceptions: OK [ 55.618127] Testing event system resctrl: OK [ 55.639802] Testing event system mce: OK [ 55.662410] Testing event system x86_fpu: OK [ 55.686328] Testing event system nmi: OK [ 55.710227] Testing event system irq_vectors: OK [ 55.737648] Testing event system syscalls: OK [ 55.760896] Testing event system hyperv: OK [ 55.783833] Testing event system xen: OK [ 55.806711] Testing event system vsyscall: OK [ 55.829871] Testing event system initcall: OK [ 55.851854] Running tests on all trace events: [ 55.857023] Testing all events: OK [ 56.824674] Running tests again, along with the function tracer [ 56.831471] Running tests on trace events: [ 56.836415] Testing event initcall_finish: OK [ 56.862828] Testing event initcall_start: OK [ 56.889716] Testing event initcall_level: OK [ 56.915815] Testing event emulate_vsyscall: OK [ 56.941696] Testing event xen_cpu_set_ldt: OK [ 56.967370] Testing event xen_cpu_write_gdt_entry: OK [ 56.994127] Testing event xen_cpu_load_idt: OK [ 57.020526] Testing event xen_cpu_write_idt_entry: OK [ 57.047164] Testing event xen_cpu_write_ldt_entry: OK [ 57.073103] Testing event xen_mmu_write_cr3: OK [ 57.099692] Testing event xen_mmu_flush_tlb_multi: OK [ 57.126175] Testing event xen_mmu_flush_tlb_one_user: OK [ 57.152306] Testing event xen_mmu_pgd_unpin: OK [ 57.178623] Testing event xen_mmu_pgd_pin: OK [ 57.204452] Testing event xen_mmu_release_ptpage: OK [ 57.231106] Testing event xen_mmu_alloc_ptpage: OK [ 57.256821] Testing event xen_mmu_ptep_modify_prot_commit: OK [ 57.284971] Testing event xen_mmu_ptep_modify_prot_start: OK [ 57.311742] Testing event xen_mmu_set_p4d: OK [ 57.337586] Testing event xen_mmu_set_pud: OK [ 57.363454] Testing event xen_mmu_set_pmd: OK [ 57.389515] Testing event xen_mmu_set_pte: OK [ 57.416484] Testing event xen_mc_extend_args: OK [ 57.442862] Testing event xen_mc_flush: OK [ 57.469162] Testing event xen_mc_flush_reason: OK [ 57.494865] Testing event xen_mc_callback: OK [ 57.521569] Testing event xen_mc_entry_alloc: OK [ 57.547711] Testing event xen_mc_entry: OK [ 57.573248] Testing event xen_mc_issue: OK [ 57.600217] Testing event xen_mc_batch: OK [ 57.625244] Testing event hyperv_send_ipi_one: OK [ 57.652910] Testing event hyperv_send_ipi_mask: OK [ 57.680261] Testing event hyperv_nested_flush_guest_mapping_range: OK [ 57.708802] Testing event hyperv_nested_flush_guest_mapping: OK [ 57.736321] Testing event hyperv_mmu_flush_tlb_multi: OK [ 57.764555] Testing event vector_free_moved: OK [ 57.790884] Testing event vector_setup: OK [ 57.817545] Testing event vector_teardown: OK [ 57.844690] Testing event vector_deactivate: OK [ 57.871821] Testing event vector_activate: OK [ 57.898633] Testing event vector_alloc_managed: OK [ 57.925085] Testing event vector_alloc: OK [ 57.952339] Testing event vector_reserve: OK [ 57.978567] Testing event vector_reserve_managed: OK [ 58.005253] Testing event vector_clear: OK [ 58.031396] Testing event vector_update: OK [ 58.058519] Testing event vector_config: OK [ 58.085405] Testing event thermal_apic_exit: OK [ 58.111851] Testing event thermal_apic_entry: OK [ 58.138841] Testing event deferred_error_apic_exit: OK [ 58.165372] Testing event deferred_error_apic_entry: OK [ 58.193377] Testing event threshold_apic_exit: OK [ 58.219948] Testing event threshold_apic_entry: OK [ 58.247158] Testing event call_function_single_exit: OK [ 58.275796] Testing event call_function_single_entry: OK [ 58.304608] Testing event call_function_exit: OK [ 58.330851] Testing event call_function_entry: OK [ 58.358103] Testing event reschedule_exit: OK [ 58.384755] Testing event reschedule_entry: OK [ 58.411949] Testing event irq_work_exit: OK [ 58.438491] Testing event irq_work_entry: OK [ 58.464629] Testing event x86_platform_ipi_exit: OK [ 58.492204] Testing event x86_platform_ipi_entry: OK [ 58.519257] Testing event error_apic_exit: OK [ 58.545591] Testing event error_apic_entry: OK [ 58.571758] Testing event spurious_apic_exit: OK [ 58.597797] Testing event spurious_apic_entry: OK [ 58.624003] Testing event local_timer_exit: OK [ 58.651702] Testing event local_timer_entry: OK [ 58.677811] Testing event nmi_handler: OK [ 58.703319] Testing event x86_fpu_xstate_check_failed: OK [ 58.731715] Testing event x86_fpu_copy_dst: OK [ 58.758727] Testing event x86_fpu_copy_src: OK [ 58.785782] Testing event x86_fpu_dropped: OK [ 58.812723] Testing event x86_fpu_init_state: OK [ 58.838624] Testing event x86_fpu_regs_deactivated: OK [ 58.865571] Testing event x86_fpu_regs_activated: OK [ 58.894658] Testing event x86_fpu_after_restore: OK [ 58.921975] Testing event x86_fpu_before_restore: OK [ 58.948120] Testing event x86_fpu_after_save: OK [ 58.975864] Testing event x86_fpu_before_save: OK [ 59.003995] Testing event mce_record: OK [ 59.029241] Testing event mon_llc_occupancy_limbo: OK [ 59.057369] Testing event pseudo_lock_l3: OK [ 59.084629] Testing event pseudo_lock_l2: OK [ 59.110584] Testing event pseudo_lock_mem_latency: OK [ 59.138370] Testing event page_fault_kernel: OK [ 59.165975] Testing event page_fault_user: OK [ 59.192747] Testing event task_prctl_unknown: OK [ 59.219905] Testing event task_rename: OK [ 59.246384] Testing event task_newtask: OK [ 59.274426] Testing event cpuhp_exit: OK [ 59.300708] Testing event cpuhp_multi_enter: OK [ 59.328453] Testing event cpuhp_enter: OK [ 59.355384] Testing event tasklet_exit: OK [ 59.381422] Testing event tasklet_entry: OK [ 59.407617] Testing event softirq_raise: OK [ 59.434596] Testing event softirq_exit: OK [ 59.461429] Testing event softirq_entry: OK [ 59.488480] Testing event irq_handler_exit: OK [ 59.515144] Testing event irq_handler_entry: OK [ 59.542193] Testing event signal_deliver: OK [ 59.569755] Testing event signal_generate: OK [ 59.597806] Testing event workqueue_execute_end: OK [ 59.625199] Testing event workqueue_execute_start: OK [ 59.652349] Testing event workqueue_activate_work: OK [ 59.680425] Testing event workqueue_queue_work: OK [ 59.708426] Testing event notifier_run: OK [ 59.736413] Testing event notifier_unregister: OK [ 59.764056] Testing event notifier_register: OK [ 59.791979] Testing event ipi_exit: OK [ 59.817859] Testing event ipi_entry: OK [ 59.843919] Testing event ipi_send_cpumask: OK [ 59.871736] Testing event ipi_send_cpu: OK [ 59.899149] Testing event ipi_raise: OK [ 59.924913] Testing event sched_wake_idle_without_ipi: OK [ 59.953955] Testing event sched_skip_vma_numa: OK [ 59.982855] Testing event sched_swap_numa: OK [ 60.009685] Testing event sched_stick_numa: OK [ 60.036981] Testing event sched_move_numa: OK [ 60.063622] Testing event sched_process_hang: OK [ 60.090101] Testing event sched_pi_setprio: OK [ 60.117770] Testing event sched_stat_runtime: OK [ 60.145993] Testing event sched_stat_blocked: OK [ 60.173941] Testing event sched_stat_iowait: OK [ 60.200807] Testing event sched_stat_sleep: OK [ 60.227701] Testing event sched_stat_wait: OK [ 60.253651] Testing event sched_prepare_exec: OK [ 60.280956] Testing event sched_process_exec: OK [ 60.308930] Testing event sched_process_fork: OK [ 60.334922] Testing event sched_process_wait: OK [ 60.361900] Testing event sched_wait_task: OK [ 60.390673] Testing event sched_process_exit: OK [ 60.418086] Testing event sched_process_free: OK [ 60.445914] Testing event sched_migrate_task: OK [ 60.473911] Testing event sched_switch: OK [ 60.500468] Testing event sched_wakeup_new: OK [ 60.526981] Testing event sched_wakeup: OK [ 60.555734] Testing event sched_waking: OK [ 60.581466] Testing event sched_kthread_work_execute_end: OK [ 60.610007] Testing event sched_kthread_work_execute_start: OK [ 60.638089] Testing event sched_kthread_work_queue_work: OK [ 60.665972] Testing event sched_kthread_stop_ret: OK [ 60.693299] Testing event sched_kthread_stop: OK [ 60.720994] Testing event contention_end: OK [ 60.752168] Testing event contention_begin: OK [ 60.783157] Testing event console: OK [ 60.810070] Testing event irq_matrix_free: OK [ 60.837627] Testing event irq_matrix_alloc: OK [ 60.863814] Testing event irq_matrix_assign: OK [ 60.891902] Testing event irq_matrix_alloc_managed: OK [ 60.918486] Testing event irq_matrix_remove_managed: OK [ 60.946589] Testing event irq_matrix_reserve_managed: OK [ 60.974644] Testing event irq_matrix_alloc_reserved: OK [ 61.002292] Testing event irq_matrix_assign_system: OK [ 61.031535] Testing event irq_matrix_remove_reserved: OK [ 61.059667] Testing event irq_matrix_reserve: OK [ 61.086934] Testing event irq_matrix_offline: OK [ 61.114854] Testing event irq_matrix_online: OK [ 61.141859] Testing event rcu_stall_warning: OK [ 61.169125] Testing event rcu_utilization: OK [ 61.197890] Testing event dma_sync_sg_for_device: OK [ 61.225309] Testing event dma_sync_sg_for_cpu: OK [ 61.253062] Testing event dma_sync_single_for_device: OK [ 61.281665] Testing event dma_sync_single_for_cpu: OK [ 61.308409] Testing event dma_unmap_sg: OK [ 61.335427] Testing event dma_map_sg_err: OK [ 61.362603] Testing event dma_map_sg: OK [ 61.389265] Testing event dma_free_sgt: OK [ 61.416354] Testing event dma_free_pages: OK [ 61.443517] Testing event dma_free: OK [ 61.469069] Testing event dma_alloc_sgt: OK [ 61.495550] Testing event dma_alloc_sgt_err: OK [ 61.521824] Testing event dma_alloc_pages: OK [ 61.548802] Testing event dma_alloc: OK [ 61.576358] Testing event dma_unmap_resource: OK [ 61.603893] Testing event dma_unmap_page: OK [ 61.631664] Testing event dma_map_resource: OK [ 61.657815] Testing event dma_map_page: OK [ 61.685455] Testing event swiotlb_bounced: OK [ 61.711774] Testing event sys_exit: OK [ 61.738152] Testing event sys_enter: OK [ 61.765150] Testing event module_request: OK [ 61.791661] Testing event module_put: OK [ 61.818156] Testing event module_get: OK [ 61.845367] Testing event module_free: OK [ 61.872235] Testing event module_load: OK [ 61.898378] Testing event tick_stop: OK [ 61.926934] Testing event itimer_expire: OK [ 61.954652] Testing event itimer_state: OK [ 61.981505] Testing event hrtimer_cancel: OK [ 62.008965] Testing event hrtimer_expire_exit: OK [ 62.034998] Testing event hrtimer_expire_entry: OK [ 62.063204] Testing event hrtimer_start: OK [ 62.089542] Testing event hrtimer_setup: OK [ 62.116537] Testing event timer_base_idle: OK [ 62.142847] Testing event timer_cancel: OK [ 62.170618] Testing event timer_expire_exit: OK [ 62.197954] Testing event timer_expire_entry: OK [ 62.225863] Testing event timer_start: OK [ 62.251311] Testing event timer_init: OK [ 62.278322] Testing event alarmtimer_cancel: OK [ 62.305821] Testing event alarmtimer_start: OK [ 62.332612] Testing event alarmtimer_fired: OK [ 62.358765] Testing event alarmtimer_suspend: OK [ 62.385911] Testing event tmigr_handle_remote: OK [ 62.413017] Testing event tmigr_update_events: OK [ 62.440977] Testing event tmigr_cpu_new_timer_idle: OK [ 62.467490] Testing event tmigr_cpu_idle: OK [ 62.494615] Testing event tmigr_handle_remote_cpu: OK [ 62.521397] Testing event tmigr_cpu_offline: OK [ 62.548853] Testing event tmigr_cpu_online: OK [ 62.574687] Testing event tmigr_cpu_active: OK [ 62.600807] Testing event tmigr_cpu_new_timer: OK [ 62.626942] Testing event tmigr_group_set_cpu_active: OK [ 62.654622] Testing event tmigr_group_set_cpu_inactive: OK [ 62.682773] Testing event tmigr_connect_cpu_parent: OK [ 62.711493] Testing event tmigr_connect_child_parent: OK [ 62.738703] Testing event tmigr_group_set: OK [ 62.764680] Testing event csd_function_exit: OK [ 62.793431] Testing event csd_function_entry: OK [ 62.820435] Testing event csd_queue_cpu: OK [ 62.846676] Testing event cgroup_rstat_cpu_unlock_fastpath: OK [ 62.875161] Testing event cgroup_rstat_cpu_unlock: OK [ 62.903360] Testing event cgroup_rstat_cpu_locked_fastpath: OK [ 62.932167] Testing event cgroup_rstat_cpu_locked: OK [ 62.959348] Testing event cgroup_rstat_cpu_lock_contended_fastpath: OK [ 62.988898] Testing event cgroup_rstat_cpu_lock_contended: OK [ 63.016152] Testing event cgroup_rstat_unlock: OK [ 63.043174] Testing event cgroup_rstat_locked: OK [ 63.069996] Testing event cgroup_rstat_lock_contended: OK [ 63.098835] Testing event cgroup_notify_frozen: OK [ 63.126275] Testing event cgroup_notify_populated: OK [ 63.153427] Testing event cgroup_transfer_tasks: OK [ 63.180212] Testing event cgroup_attach_task: OK [ 63.208011] Testing event cgroup_unfreeze: OK [ 63.235701] Testing event cgroup_freeze: OK [ 63.261586] Testing event cgroup_rename: OK [ 63.287479] Testing event cgroup_release: OK [ 63.314616] Testing event cgroup_rmdir: OK [ 63.341431] Testing event cgroup_mkdir: OK [ 63.367448] Testing event cgroup_remount: OK [ 63.395592] Testing event cgroup_destroy_root: OK [ 63.423015] Testing event cgroup_setup_root: OK [ 63.449845] Testing event sample_threshold: OK [ 63.476687] Testing event nmi_noise: OK [ 63.502137] Testing event irq_noise: OK [ 63.529152] Testing event softirq_noise: OK [ 63.556578] Testing event thread_noise: OK [ 63.582278] Testing event timerlat_sample: OK [ 63.608729] Testing event osnoise_sample: OK [ 63.634636] Testing event ftrace_test_filter: OK [ 63.660749] Testing event bpf_trace_printk: OK [ 63.687850] Testing event error_report_end: OK [ 63.715007] Testing event guest_halt_poll_ns: OK [ 63.742112] Testing event dev_pm_qos_remove_request: OK [ 63.769559] Testing event dev_pm_qos_update_request: OK [ 63.796418] Testing event dev_pm_qos_add_request: OK [ 63.823369] Testing event pm_qos_update_flags: OK [ 63.851183] Testing event pm_qos_update_target: OK [ 63.879175] Testing event pm_qos_remove_request: OK [ 63.907254] Testing event pm_qos_update_request: OK [ 63.934197] Testing event pm_qos_add_request: OK [ 63.960946] Testing event power_domain_target: OK [ 63.987830] Testing event clock_set_rate: OK [ 64.013342] Testing event clock_disable: OK [ 64.039330] Testing event clock_enable: OK [ 64.065219] Testing event wakeup_source_deactivate: OK [ 64.093603] Testing event wakeup_source_activate: OK [ 64.121256] Testing event suspend_resume: OK [ 64.158279] Testing event device_pm_callback_end: OK [ 64.186620] Testing event device_pm_callback_start: OK [ 64.215307] Testing event cpu_frequency_limits: OK [ 64.242192] Testing event cpu_frequency: OK [ 64.269974] Testing event pstate_sample: OK [ 64.298707] Testing event powernv_throttle: OK [ 64.324650] Testing event psci_domain_idle_exit: OK [ 64.351006] Testing event psci_domain_idle_enter: OK [ 64.378184] Testing event cpu_idle_miss: OK [ 64.404496] Testing event cpu_idle: OK [ 64.431251] Testing event rpm_status: OK [ 64.458302] Testing event rpm_return_int: OK [ 64.486028] Testing event rpm_usage: OK [ 64.515610] Testing event rpm_idle: OK [ 64.542066] Testing event rpm_resume: OK [ 64.568248] Testing event rpm_suspend: OK [ 64.595318] Testing event error_wwnr: OK [ 64.621136] Testing event event_wwnr: OK [ 64.649212] Testing event bpf_xdp_link_attach_failed: OK [ 64.676648] Testing event mem_return_failed: OK [ 64.702647] Testing event mem_connect: OK [ 64.728327] Testing event mem_disconnect: OK [ 64.755720] Testing event xdp_devmap_xmit: OK [ 64.782743] Testing event xdp_cpumap_enqueue: OK [ 64.810146] Testing event xdp_cpumap_kthread: OK [ 64.837796] Testing event xdp_redirect_map_err: OK [ 64.863862] Testing event xdp_redirect_map: OK [ 64.890523] Testing event xdp_redirect_err: OK [ 64.918280] Testing event xdp_redirect: OK [ 64.944764] Testing event xdp_bulk_tx: OK [ 64.971153] Testing event xdp_exception: OK [ 64.999964] Testing event user_exit: OK [ 65.026143] Testing event user_enter: OK [ 65.052324] Testing event rseq_ip_fixup: OK [ 65.078524] Testing event rseq_update: OK [ 65.106325] Testing event file_check_and_advance_wb_err: OK [ 65.133928] Testing event filemap_set_wb_err: OK [ 65.160905] Testing event mm_filemap_fault: OK [ 65.187835] Testing event mm_filemap_map_pages: OK [ 65.215142] Testing event mm_filemap_get_pages: OK [ 65.243207] Testing event mm_filemap_add_to_page_cache: OK [ 65.270777] Testing event mm_filemap_delete_from_page_cache: OK [ 65.298441] Testing event compact_retry: OK [ 65.325565] Testing event skip_task_reaping: OK [ 65.353190] Testing event finish_task_reaping: OK [ 65.380915] Testing event start_task_reaping: OK [ 65.407946] Testing event wake_reaper: OK [ 65.435292] Testing event mark_victim: OK [ 65.463236] Testing event reclaim_retry_zone: OK [ 65.489898] Testing event oom_score_adj_update: OK [ 65.516106] Testing event mm_lru_activate: OK [ 65.542629] Testing event mm_lru_insertion: OK [ 65.569737] Testing event mm_vmscan_throttled: OK [ 65.597102] Testing event mm_vmscan_node_reclaim_end: OK [ 65.625603] Testing event mm_vmscan_node_reclaim_begin: OK [ 65.652875] Testing event mm_vmscan_lru_shrink_active: OK [ 65.679648] Testing event mm_vmscan_lru_shrink_inactive: OK [ 65.708059] Testing event mm_vmscan_reclaim_pages: OK [ 65.735430] Testing event mm_vmscan_write_folio: OK [ 65.763272] Testing event mm_vmscan_lru_isolate: OK [ 65.791309] Testing event mm_shrink_slab_end: OK [ 65.818955] Testing event mm_shrink_slab_start: OK [ 65.846173] Testing event mm_vmscan_memcg_softlimit_reclaim_end: OK [ 65.874594] Testing event mm_vmscan_memcg_reclaim_end: OK [ 65.901792] Testing event mm_vmscan_direct_reclaim_end: OK [ 65.930811] Testing event mm_vmscan_memcg_softlimit_reclaim_begin: OK [ 65.959814] Testing event mm_vmscan_memcg_reclaim_begin: OK [ 65.988855] Testing event mm_vmscan_direct_reclaim_begin: OK [ 66.016924] Testing event mm_vmscan_wakeup_kswapd: OK [ 66.044370] Testing event mm_vmscan_kswapd_wake: OK [ 66.072221] Testing event mm_vmscan_kswapd_sleep: OK [ 66.099241] Testing event percpu_destroy_chunk: OK [ 66.126962] Testing event percpu_create_chunk: OK [ 66.154125] Testing event percpu_alloc_percpu_fail: OK [ 66.182422] Testing event percpu_free_percpu: OK [ 66.210002] Testing event percpu_alloc_percpu: OK [ 66.236939] Testing event rss_stat: OK [ 66.265624] Testing event mm_calculate_totalreserve_pages: OK [ 66.294075] Testing event mm_setup_per_zone_lowmem_reserve: OK [ 66.322149] Testing event mm_setup_per_zone_wmarks: OK [ 66.350477] Testing event mm_alloc_contig_migrate_range_info: OK [ 66.378393] Testing event mm_page_alloc_extfrag: OK [ 66.406659] Testing event mm_page_pcpu_drain: OK [ 66.433977] Testing event mm_page_alloc_zone_locked: OK [ 66.462335] Testing event mm_page_alloc: OK [ 66.489640] Testing event mm_page_free_batched: OK [ 66.516063] Testing event mm_page_free: OK [ 66.542831] Testing event kmem_cache_free: OK [ 66.569643] Testing event kfree: OK [ 66.594774] Testing event kmalloc: OK [ 66.623405] Testing event kmem_cache_alloc: OK [ 66.650972] Testing event mm_compaction_kcompactd_wake: OK [ 66.678805] Testing event mm_compaction_wakeup_kcompactd: OK [ 66.707074] Testing event mm_compaction_kcompactd_sleep: OK [ 66.734970] Testing event mm_compaction_defer_reset: OK [ 66.762604] Testing event mm_compaction_defer_compaction: OK [ 66.790006] Testing event mm_compaction_deferred: OK [ 66.817233] Testing event mm_compaction_suitable: OK [ 66.844211] Testing event mm_compaction_finished: OK [ 66.872284] Testing event mm_compaction_try_to_compact_pages: OK [ 66.901378] Testing event mm_compaction_end: OK [ 66.928835] Testing event mm_compaction_begin: OK [ 66.957096] Testing event mm_compaction_migratepages: OK [ 66.985734] Testing event mm_compaction_fast_isolate_freepages: OK [ 67.013526] Testing event mm_compaction_isolate_freepages: OK [ 67.041195] Testing event mm_compaction_isolate_migratepages: OK [ 67.070355] Testing event mmap_lock_acquire_returned: OK [ 67.105705] Testing event mmap_lock_released: OK [ 67.142386] Testing event mmap_lock_start_locking: OK [ 67.176993] Testing event exit_mmap: OK [ 67.204135] Testing event vma_store: OK [ 67.230893] Testing event vma_mas_szero: OK [ 67.256274] Testing event vm_unmapped_area: OK [ 67.282829] Testing event remove_migration_pte: OK [ 67.310148] Testing event set_migration_pte: OK [ 67.336828] Testing event mm_migrate_pages_start: OK [ 67.364271] Testing event mm_migrate_pages: OK [ 67.391738] Testing event tlb_flush: OK [ 67.418913] Testing event free_vmap_area_noflush: OK [ 67.447249] Testing event purge_vmap_area_lazy: OK [ 67.475179] Testing event alloc_vmap_area: OK [ 67.501561] Testing event ksm_advisor: OK [ 67.528330] Testing event ksm_remove_rmap_item: OK [ 67.555980] Testing event ksm_remove_ksm_page: OK [ 67.583099] Testing event ksm_merge_with_ksm_page: OK [ 67.610416] Testing event ksm_merge_one_page: OK [ 67.638935] Testing event ksm_exit: OK [ 67.666078] Testing event ksm_enter: OK [ 67.692190] Testing event ksm_stop_scan: OK [ 67.719536] Testing event ksm_start_scan: OK [ 67.746520] Testing event remove_migration_pmd: OK [ 67.773101] Testing event set_migration_pmd: OK [ 67.799906] Testing event hugepage_update_pud: OK [ 67.826794] Testing event hugepage_update_pmd: OK [ 67.852771] Testing event hugepage_set_pud: OK [ 67.878603] Testing event hugepage_set_pmd: OK [ 67.904562] Testing event mm_khugepaged_collapse_file: OK [ 67.932721] Testing event mm_khugepaged_scan_file: OK [ 67.961349] Testing event mm_collapse_huge_page_swapin: OK [ 67.989820] Testing event mm_collapse_huge_page_isolate: OK [ 68.017972] Testing event mm_collapse_huge_page: OK [ 68.046196] Testing event mm_khugepaged_scan_pmd: OK [ 68.073178] Testing event memcg_flush_stats: OK [ 68.100842] Testing event count_memcg_events: OK [ 68.128104] Testing event mod_memcg_lruvec_state: OK [ 68.156235] Testing event mod_memcg_state: OK [ 68.182711] Testing event test_pages_isolated: OK [ 68.210008] Testing event cma_alloc_busy_retry: OK [ 68.238151] Testing event cma_alloc_finish: OK [ 68.264736] Testing event cma_alloc_start: OK [ 68.290670] Testing event cma_release: OK [ 68.317302] Testing event damon_aggregated: OK [ 68.344765] Testing event damos_before_apply: OK [ 68.371905] Testing event fill_mg_cmtime: OK [ 68.399626] Testing event ctime_ns_xchg: OK [ 68.426570] Testing event ctime_xchg_skip: OK [ 68.453661] Testing event inode_set_ctime_to_ts: OK [ 68.481206] Testing event sb_clear_inode_writeback: OK [ 68.508491] Testing event sb_mark_inode_writeback: OK [ 68.535337] Testing event writeback_dirty_inode_enqueue: OK [ 68.562895] Testing event writeback_lazytime_iput: OK [ 68.590268] Testing event writeback_lazytime: OK [ 68.617958] Testing event writeback_single_inode: OK [ 68.645259] Testing event writeback_single_inode_start: OK [ 68.672806] Testing event writeback_sb_inodes_requeue: OK [ 68.700720] Testing event balance_dirty_pages: OK [ 68.728269] Testing event bdi_dirty_ratelimit: OK [ 68.756098] Testing event global_dirty_state: OK [ 68.783857] Testing event writeback_queue_io: OK [ 68.809948] Testing event wbc_writepage: OK [ 68.838574] Testing event writeback_bdi_register: OK [ 68.867258] Testing event writeback_wake_background: OK [ 68.896540] Testing event writeback_pages_written: OK [ 68.924454] Testing event writeback_wait: OK [ 68.951589] Testing event writeback_written: OK [ 68.978968] Testing event writeback_start: OK [ 69.006696] Testing event writeback_exec: OK [ 69.032609] Testing event writeback_queue: OK [ 69.059681] Testing event writeback_write_inode: OK [ 69.086265] Testing event writeback_write_inode_start: OK [ 69.114651] Testing event flush_foreign: OK [ 69.141501] Testing event track_foreign_dirty: OK [ 69.169424] Testing event inode_switch_wbs: OK [ 69.195549] Testing event inode_foreign_history: OK [ 69.222230] Testing event writeback_dirty_inode: OK [ 69.250226] Testing event writeback_dirty_inode_start: OK [ 69.278673] Testing event writeback_mark_inode_dirty: OK [ 69.305460] Testing event folio_wait_writeback: OK [ 69.332225] Testing event writeback_dirty_folio: OK [ 69.359191] Testing event dax_writeback_one: OK [ 69.385933] Testing event dax_writeback_range_done: OK [ 69.413451] Testing event dax_writeback_range: OK [ 69.440056] Testing event dax_insert_mapping: OK [ 69.465697] Testing event dax_insert_pfn_mkwrite: OK [ 69.492259] Testing event dax_insert_pfn_mkwrite_no_entry: OK [ 69.521006] Testing event dax_load_hole: OK [ 69.547503] Testing event dax_pte_fault_done: OK [ 69.573977] Testing event dax_pte_fault: OK [ 69.601489] Testing event dax_pmd_insert_mapping: OK [ 69.629142] Testing event dax_pmd_load_hole_fallback: OK [ 69.657566] Testing event dax_pmd_load_hole: OK [ 69.684844] Testing event dax_pmd_fault_done: OK [ 69.712947] Testing event dax_pmd_fault: OK [ 69.740368] Testing event leases_conflict: OK [ 69.767655] Testing event generic_add_lease: OK [ 69.794851] Testing event time_out_leases: OK [ 69.821623] Testing event generic_delete_lease: OK [ 69.850211] Testing event break_lease_unblock: OK [ 69.878091] Testing event break_lease_block: OK [ 69.905818] Testing event break_lease_noblock: OK [ 69.934051] Testing event flock_lock_inode: OK [ 69.960762] Testing event locks_remove_posix: OK [ 69.988942] Testing event fcntl_setlk: OK [ 70.015344] Testing event posix_lock_inode: OK [ 70.041761] Testing event locks_get_lock_context: OK [ 70.069260] Testing event iomap_dio_complete: OK [ 70.095967] Testing event iomap_dio_rw_begin: OK [ 70.123948] Testing event iomap_iter: OK [ 70.150184] Testing event iomap_writepage_map: OK [ 70.177062] Testing event iomap_iter_srcmap: OK [ 70.203837] Testing event iomap_iter_dstmap: OK [ 70.229897] Testing event iomap_dio_rw_queued: OK [ 70.256976] Testing event iomap_dio_invalidate_fail: OK [ 70.284573] Testing event iomap_invalidate_folio: OK [ 70.312320] Testing event iomap_release_folio: OK [ 70.340101] Testing event iomap_writepage: OK [ 70.366659] Testing event iomap_readahead: OK [ 70.392687] Testing event iomap_readpage: OK [ 70.420594] Testing event netfs_folioq: OK [ 70.446626] Testing event netfs_collect_stream: OK [ 70.474221] Testing event netfs_collect_gap: OK [ 70.501145] Testing event netfs_collect_state: OK [ 70.528192] Testing event netfs_collect_folio: OK [ 70.556167] Testing event netfs_collect_sreq: OK [ 70.584134] Testing event netfs_collect: OK [ 70.611623] Testing event netfs_write: OK [ 70.638997] Testing event netfs_write_iter: OK [ 70.666760] Testing event netfs_folio: OK [ 70.703635] Testing event netfs_sreq_ref: OK [ 70.730959] Testing event netfs_rreq_ref: OK [ 70.759120] Testing event netfs_failure: OK [ 70.785870] Testing event netfs_sreq: OK [ 70.820595] Testing event netfs_rreq: OK [ 70.853447] Testing event netfs_read: OK [ 70.882170] Testing event fscache_resize: OK [ 70.908637] Testing event fscache_invalidate: OK [ 70.934918] Testing event fscache_relinquish: OK [ 70.962926] Testing event fscache_acquire: OK [ 70.989593] Testing event fscache_access: OK [ 71.017127] Testing event fscache_access_volume: OK [ 71.044520] Testing event fscache_access_cache: OK [ 71.072336] Testing event fscache_active: OK [ 71.098868] Testing event fscache_cookie: OK [ 71.128241] Testing event fscache_volume: OK [ 71.156107] Testing event fscache_cache: OK [ 71.183717] Testing event hugetlbfs_fallocate: OK [ 71.209986] Testing event hugetlbfs_setattr: OK [ 71.236858] Testing event hugetlbfs_free_inode: OK [ 71.264262] Testing event hugetlbfs_evict_inode: OK [ 71.291129] Testing event hugetlbfs_alloc_inode: OK [ 71.318238] Testing event nfs_xdr_bad_filehandle: OK [ 71.346285] Testing event nfs_xdr_status: OK [ 71.372531] Testing event nfs_local_open_fh: OK [ 71.398651] Testing event nfs_mount_path: OK [ 71.424759] Testing event nfs_mount_option: OK [ 71.451780] Testing event nfs_mount_assign: OK [ 71.482968] Testing event nfs_fh_to_dentry: OK [ 71.509811] Testing event nfs_direct_write_reschedule_io: OK [ 71.537094] Testing event nfs_direct_write_schedule_iovec: OK [ 71.566243] Testing event nfs_direct_write_completion: OK [ 71.593707] Testing event nfs_direct_write_complete: OK [ 71.621626] Testing event nfs_direct_resched_write: OK [ 71.648499] Testing event nfs_direct_commit_complete: OK [ 71.676684] Testing event nfs_commit_done: OK [ 71.702714] Testing event nfs_initiate_commit: OK [ 71.730107] Testing event nfs_commit_error: OK [ 71.756756] Testing event nfs_comp_error: OK [ 71.783604] Testing event nfs_write_error: OK [ 71.809710] Testing event nfs_writeback_done: OK [ 71.836941] Testing event nfs_initiate_write: OK [ 71.863956] Testing event nfs_pgio_error: OK [ 71.891558] Testing event nfs_readpage_short: OK [ 71.917866] Testing event nfs_readpage_done: OK [ 71.944785] Testing event nfs_initiate_read: OK [ 71.972868] Testing event nfs_aop_readahead_done: OK [ 72.000331] Testing event nfs_aop_readahead: OK [ 72.027732] Testing event nfs_launder_folio_done: OK [ 72.055352] Testing event nfs_invalidate_folio: OK [ 72.083142] Testing event nfs_writeback_folio_done: OK [ 72.110345] Testing event nfs_writeback_folio: OK [ 72.138084] Testing event nfs_aop_readpage_done: OK [ 72.166333] Testing event nfs_aop_readpage: OK [ 72.192769] Testing event nfs_sillyrename_unlink: OK [ 72.220236] Testing event nfs_async_rename_done: OK [ 72.247264] Testing event nfs_rename_exit: OK [ 72.275737] Testing event nfs_rename_enter: OK [ 72.301783] Testing event nfs_link_exit: OK [ 72.327489] Testing event nfs_link_enter: OK [ 72.354478] Testing event nfs_symlink_exit: OK [ 72.380758] Testing event nfs_symlink_enter: OK [ 72.408846] Testing event nfs_unlink_exit: OK [ 72.435642] Testing event nfs_unlink_enter: OK [ 72.461754] Testing event nfs_remove_exit: OK [ 72.487685] Testing event nfs_remove_enter: OK [ 72.514800] Testing event nfs_rmdir_exit: OK [ 72.541506] Testing event nfs_rmdir_enter: OK [ 72.567690] Testing event nfs_mkdir_exit: OK [ 72.594604] Testing event nfs_mkdir_enter: OK [ 72.620747] Testing event nfs_mknod_exit: OK [ 72.647586] Testing event nfs_mknod_enter: OK [ 72.674571] Testing event nfs_create_exit: OK [ 72.700650] Testing event nfs_create_enter: OK [ 72.726716] Testing event nfs_atomic_open_exit: OK [ 72.753170] Testing event nfs_atomic_open_enter: OK [ 72.780304] Testing event nfs_readdir_lookup_revalidate: OK [ 72.807856] Testing event nfs_readdir_lookup_revalidate_failed: OK [ 72.836501] Testing event nfs_readdir_lookup: OK [ 72.863906] Testing event nfs_lookup_revalidate_exit: OK [ 72.891949] Testing event nfs_lookup_revalidate_enter: OK [ 72.919939] Testing event nfs_lookup_exit: OK [ 72.946641] Testing event nfs_lookup_enter: OK [ 72.972773] Testing event nfs_readdir_uncached: OK [ 73.000154] Testing event nfs_readdir_cache_fill: OK [ 73.028257] Testing event nfs_readdir_invalidate_cache_range: OK [ 73.057376] Testing event nfs_size_grow: OK [ 73.083619] Testing event nfs_size_update: OK [ 73.110751] Testing event nfs_size_wcc: OK [ 73.138328] Testing event nfs_size_truncate: OK [ 73.164752] Testing event nfs_access_exit: OK [ 73.190706] Testing event nfs_readdir_uncached_done: OK [ 73.218555] Testing event nfs_readdir_cache_fill_done: OK [ 73.246766] Testing event nfs_readdir_force_readdirplus: OK [ 73.274857] Testing event nfs_set_cache_invalid: OK [ 73.302248] Testing event nfs_access_enter: OK [ 73.329821] Testing event nfs_fsync_exit: OK [ 73.355476] Testing event nfs_fsync_enter: OK [ 73.382742] Testing event nfs_writeback_inode_exit: OK [ 73.410499] Testing event nfs_writeback_inode_enter: OK [ 73.438547] Testing event nfs_setattr_exit: OK [ 73.465671] Testing event nfs_setattr_enter: OK [ 73.491876] Testing event nfs_getattr_exit: OK [ 73.518797] Testing event nfs_getattr_enter: OK [ 73.544860] Testing event nfs_invalidate_mapping_exit: OK [ 73.572770] Testing event nfs_invalidate_mapping_enter: OK [ 73.599854] Testing event nfs_revalidate_inode_exit: OK [ 73.627642] Testing event nfs_revalidate_inode_enter: OK [ 73.655710] Testing event nfs_refresh_inode_exit: OK [ 73.684289] Testing event nfs_refresh_inode_enter: OK [ 73.711506] Testing event nfs_set_inode_stale: OK [ 73.739199] Testing event nlmclnt_grant: OK [ 73.766625] Testing event nlmclnt_unlock: OK [ 73.792575] Testing event nlmclnt_lock: OK [ 73.819606] Testing event nlmclnt_test: OK [ 73.845471] Testing event cap_capable: OK [ 73.871437] Testing event selinux_audited: OK [ 73.898719] Testing event block_rq_remap: OK [ 73.924491] Testing event block_bio_remap: OK [ 73.950845] Testing event block_split: OK [ 73.977386] Testing event block_unplug: OK [ 74.003608] Testing event block_plug: OK [ 74.030376] Testing event block_getrq: OK [ 74.058466] Testing event block_bio_queue: OK [ 74.086191] Testing event block_bio_frontmerge: OK [ 74.114261] Testing event block_bio_backmerge: OK [ 74.142197] Testing event block_bio_bounce: OK [ 74.169673] Testing event block_bio_complete: OK [ 74.197932] Testing event block_io_done: OK [ 74.224792] Testing event block_io_start: OK [ 74.251523] Testing event block_rq_merge: OK [ 74.277605] Testing event block_rq_issue: OK [ 74.303487] Testing event block_rq_insert: OK [ 74.331191] Testing event block_rq_error: OK [ 74.357527] Testing event block_rq_complete: OK [ 74.383907] Testing event block_rq_requeue: OK [ 74.410757] Testing event block_dirty_buffer: OK [ 74.436984] Testing event block_touch_buffer: OK [ 74.464026] Testing event kyber_throttled: OK [ 74.490722] Testing event kyber_adjust: OK [ 74.516389] Testing event kyber_latency: OK [ 74.542490] Testing event wbt_timer: OK [ 74.569217] Testing event wbt_step: OK [ 74.595071] Testing event wbt_lat: OK [ 74.622073] Testing event wbt_stat: OK [ 74.648217] Testing event io_uring_local_work_run: OK [ 74.675447] Testing event io_uring_short_write: OK [ 74.703130] Testing event io_uring_task_work_run: OK [ 74.730328] Testing event io_uring_cqe_overflow: OK [ 74.758201] Testing event io_uring_req_failed: OK [ 74.785055] Testing event io_uring_task_add: OK [ 74.812834] Testing event io_uring_poll_arm: OK [ 74.838930] Testing event io_uring_submit_req: OK [ 74.866081] Testing event io_uring_complete: OK [ 74.894083] Testing event io_uring_fail_link: OK [ 74.921909] Testing event io_uring_cqring_wait: OK [ 74.949094] Testing event io_uring_link: OK [ 74.976514] Testing event io_uring_defer: OK [ 75.002670] Testing event io_uring_queue_async_work: OK [ 75.030559] Testing event io_uring_file_get: OK [ 75.056860] Testing event io_uring_register: OK [ 75.082868] Testing event io_uring_create: OK [ 75.108710] Testing event rdpmc: OK [ 75.134135] Testing event write_msr: OK [ 75.180324] Testing event read_msr: OK [ 75.224478] Testing event gpio_value: OK [ 75.251751] Testing event gpio_direction: OK [ 75.278927] Testing event pwm_get: OK [ 75.305061] Testing event pwm_apply: OK [ 75.331124] Testing event pwm_write_waveform: OK [ 75.357952] Testing event pwm_read_waveform: OK [ 75.384815] Testing event pwm_round_waveform_fromhw: OK [ 75.411520] Testing event pwm_round_waveform_tohw: OK [ 75.438317] Testing event clk_rate_request_done: OK [ 75.466993] Testing event clk_rate_request_start: OK [ 75.495227] Testing event clk_set_duty_cycle_complete: OK [ 75.523733] Testing event clk_set_duty_cycle: OK [ 75.550917] Testing event clk_set_phase_complete: OK [ 75.577283] Testing event clk_set_phase: OK [ 75.604466] Testing event clk_set_parent_complete: OK [ 75.632488] Testing event clk_set_parent: OK [ 75.658688] Testing event clk_set_rate_range: OK [ 75.684839] Testing event clk_set_max_rate: OK [ 75.710753] Testing event clk_set_min_rate: OK [ 75.736642] Testing event clk_set_rate_complete: OK [ 75.764193] Testing event clk_set_rate: OK [ 75.791339] Testing event clk_unprepare_complete: OK [ 75.818402] Testing event clk_unprepare: OK [ 75.845767] Testing event clk_prepare_complete: OK [ 75.872102] Testing event clk_prepare: OK [ 75.899362] Testing event clk_disable_complete: OK [ 75.927206] Testing event clk_disable: OK [ 75.953559] Testing event clk_enable_complete: OK [ 75.979970] Testing event clk_enable: OK [ 76.006302] Testing event cache_tag_flush_range_np: OK [ 76.034523] Testing event cache_tag_flush_range: OK [ 76.061174] Testing event cache_tag_flush_all: OK [ 76.088955] Testing event cache_tag_unassign: OK [ 76.115962] Testing event cache_tag_assign: OK [ 76.143872] Testing event prq_report: OK [ 76.170184] Testing event qi_submit: OK [ 76.196213] Testing event io_page_fault: OK [ 76.223482] Testing event unmap: OK [ 76.249759] Testing event map: OK [ 76.275564] Testing event attach_device_to_domain: OK [ 76.302430] Testing event remove_device_from_group: OK [ 76.330440] Testing event add_device_to_group: OK [ 76.359074] Testing event regcache_drop_region: OK [ 76.385991] Testing event regmap_async_complete_done: OK [ 76.412628] Testing event regmap_async_complete_start: OK [ 76.440720] Testing event regmap_async_io_complete: OK [ 76.467482] Testing event regmap_async_write_start: OK [ 76.496410] Testing event regmap_cache_bypass: OK [ 76.523023] Testing event regmap_cache_only: OK [ 76.551911] Testing event regcache_sync: OK [ 76.578714] Testing event regmap_hw_write_done: OK [ 76.605232] Testing event regmap_hw_write_start: OK [ 76.632409] Testing event regmap_hw_read_done: OK [ 76.659001] Testing event regmap_hw_read_start: OK [ 76.687136] Testing event regmap_bulk_read: OK [ 76.714759] Testing event regmap_bulk_write: OK [ 76.741907] Testing event regmap_reg_read_cache: OK [ 76.769224] Testing event regmap_reg_read: OK [ 76.796665] Testing event regmap_reg_write: OK [ 76.823754] Testing event devres_log: OK [ 76.850875] Testing event dma_fence_wait_end: OK [ 76.877955] Testing event dma_fence_wait_start: OK [ 76.905163] Testing event dma_fence_signaled: OK [ 76.931852] Testing event dma_fence_enable_signal: OK [ 76.959383] Testing event dma_fence_destroy: OK [ 76.986818] Testing event dma_fence_init: OK [ 77.013578] Testing event dma_fence_emit: OK [ 77.040347] Testing event scsi_eh_wakeup: OK [ 77.066506] Testing event scsi_dispatch_cmd_timeout: OK [ 77.093630] Testing event scsi_dispatch_cmd_done: OK [ 77.120303] Testing event scsi_dispatch_cmd_error: OK [ 77.147642] Testing event scsi_dispatch_cmd_start: OK [ 77.174350] Testing event spi_transfer_stop: OK [ 77.200867] Testing event spi_transfer_start: OK [ 77.227845] Testing event spi_message_done: OK [ 77.253788] Testing event spi_message_start: OK [ 77.279898] Testing event spi_message_submit: OK [ 77.307126] Testing event spi_set_cs: OK [ 77.333222] Testing event spi_setup: OK [ 77.359179] Testing event spi_controller_busy: OK [ 77.386273] Testing event spi_controller_idle: OK [ 77.414227] Testing event mdio_access: OK [ 77.440707] Testing event e1000e_trace_mac_register: OK [ 77.468657] Testing event i40e_xmit_frame_ring_drop: OK [ 77.495657] Testing event i40e_xmit_frame_ring: OK [ 77.523258] Testing event i40e_clean_rx_irq_rx: OK [ 77.552125] Testing event i40e_clean_rx_irq: OK [ 77.579170] Testing event i40e_clean_tx_irq_unmap: OK [ 77.606418] Testing event i40e_clean_tx_irq: OK [ 77.632834] Testing event i40e_napi_poll: OK [ 77.660616] Testing event xhci_dbc_giveback_request: OK [ 77.687650] Testing event xhci_dbc_queue_request: OK [ 77.715422] Testing event xhci_dbc_free_request: OK [ 77.744199] Testing event xhci_dbc_alloc_request: OK [ 77.771328] Testing event xhci_ring_host_doorbell: OK [ 77.798471] Testing event xhci_ring_ep_doorbell: OK [ 77.826299] Testing event xhci_hub_status_data: OK [ 77.853153] Testing event xhci_get_port_status: OK [ 77.881255] Testing event xhci_handle_port_status: OK [ 77.909439] Testing event xhci_inc_deq: OK [ 77.935556] Testing event xhci_inc_enq: OK [ 77.962458] Testing event xhci_ring_expansion: OK [ 77.989977] Testing event xhci_ring_free: OK [ 78.015596] Testing event xhci_ring_alloc: OK [ 78.042861] Testing event xhci_configure_endpoint_ctrl_ctx: OK [ 78.072140] Testing event xhci_address_ctrl_ctx: OK [ 78.100252] Testing event xhci_configure_endpoint: OK [ 78.128308] Testing event xhci_handle_cmd_set_deq: OK [ 78.155261] Testing event xhci_handle_cmd_reset_dev: OK [ 78.184526] Testing event xhci_handle_cmd_addr_dev: OK [ 78.212458] Testing event xhci_setup_device_slot: OK [ 78.239229] Testing event xhci_discover_or_reset_device: OK [ 78.268114] Testing event xhci_handle_cmd_disable_slot: OK [ 78.296871] Testing event xhci_free_dev: OK [ 78.323492] Testing event xhci_alloc_dev: OK [ 78.350642] Testing event xhci_add_endpoint: OK [ 78.377783] Testing event xhci_handle_cmd_config_ep: OK [ 78.405605] Testing event xhci_handle_cmd_reset_ep: OK [ 78.432419] Testing event xhci_handle_cmd_set_deq_ep: OK [ 78.459628] Testing event xhci_handle_cmd_stop_ep: OK [ 78.486420] Testing event xhci_handle_cmd_set_deq_stream: OK [ 78.514135] Testing event xhci_alloc_stream_info_ctx: OK [ 78.541685] Testing event xhci_urb_dequeue: OK [ 78.568676] Testing event xhci_urb_giveback: OK [ 78.595891] Testing event xhci_urb_enqueue: OK [ 78.623774] Testing event xhci_stop_device: OK [ 78.650806] Testing event xhci_setup_addressable_virt_device: OK [ 78.679270] Testing event xhci_setup_device: OK [ 78.706928] Testing event xhci_alloc_virt_device: OK [ 78.735228] Testing event xhci_free_virt_device: OK [ 78.762246] Testing event xhci_dbc_gadget_ep_queue: OK [ 78.790532] Testing event xhci_dbc_handle_transfer: OK [ 78.818434] Testing event xhci_dbc_handle_event: OK [ 78.845193] Testing event xhci_queue_trb: OK [ 78.871914] Testing event xhci_handle_transfer: OK [ 78.900171] Testing event xhci_handle_command: OK [ 78.926993] Testing event xhci_handle_event: OK [ 78.954898] Testing event xhci_address_ctx: OK [ 78.982120] Testing event xhci_dbg_ring_expansion: OK [ 79.010009] Testing event xhci_dbg_init: OK [ 79.037733] Testing event xhci_dbg_cancel_urb: OK [ 79.064170] Testing event xhci_dbg_reset_ep: OK [ 79.090811] Testing event xhci_dbg_quirks: OK [ 79.119082] Testing event xhci_dbg_context_change: OK [ 79.147749] Testing event xhci_dbg_address: OK [ 79.175662] Testing event ucsi_register_altmode: OK [ 79.202170] Testing event ucsi_register_port: OK [ 79.228860] Testing event ucsi_connector_change: OK [ 79.256199] Testing event ucsi_reset_ppm: OK [ 79.282428] Testing event ucsi_run_command: OK [ 79.308528] Testing event rtc_timer_fired: OK [ 79.334647] Testing event rtc_timer_dequeue: OK [ 79.362414] Testing event rtc_timer_enqueue: OK [ 79.389064] Testing event rtc_read_offset: OK [ 79.415513] Testing event rtc_set_offset: OK [ 79.441595] Testing event rtc_alarm_irq_enable: OK [ 79.469242] Testing event rtc_irq_set_state: OK [ 79.495877] Testing event rtc_irq_set_freq: OK [ 79.522770] Testing event rtc_read_alarm: OK [ 79.549697] Testing event rtc_set_alarm: OK [ 79.575501] Testing event rtc_read_time: OK [ 79.601553] Testing event rtc_set_time: OK [ 79.627349] Testing event i2c_result: OK [ 79.653493] Testing event i2c_reply: OK [ 79.679268] Testing event i2c_read: OK [ 79.706296] Testing event i2c_write: OK [ 79.733213] Testing event smbus_result: OK [ 79.759467] Testing event smbus_reply: OK [ 79.786341] Testing event smbus_read: OK [ 79.812225] Testing event smbus_write: OK [ 79.839387] Testing event hwmon_attr_show_string: OK [ 79.867310] Testing event hwmon_attr_store: OK [ 79.894900] Testing event hwmon_attr_show: OK [ 79.922588] Testing event thermal_zone_trip: OK [ 79.950126] Testing event cdev_update: OK [ 79.976297] Testing event thermal_temperature: OK [ 80.004053] Testing event watchdog_set_timeout: OK [ 80.031063] Testing event watchdog_stop: OK [ 80.057734] Testing event watchdog_ping: OK [ 80.084558] Testing event watchdog_start: OK [ 80.110669] Testing event amd_pstate_epp_perf: OK [ 80.138467] Testing event amd_pstate_perf: OK [ 80.165680] Testing event cros_ec_request_done: OK [ 80.193154] Testing event cros_ec_request_start: OK [ 80.220297] Testing event memory_failure_event: OK [ 80.248104] Testing event aer_event: OK [ 80.275294] Testing event non_standard_event: OK [ 80.302827] Testing event arm_event: OK [ 80.329214] Testing event mc_event: OK [ 80.355984] Testing event extlog_mem_event: OK [ 80.381625] Testing event tb_rx: OK [ 80.407823] Testing event tb_event: OK [ 80.434127] Testing event tb_tx: OK [ 80.459760] Testing event neigh_cleanup_and_release: OK [ 80.488529] Testing event neigh_event_send_dead: OK [ 80.515223] Testing event neigh_event_send_done: OK [ 80.542160] Testing event neigh_timer_handler: OK [ 80.570023] Testing event neigh_update_done: OK [ 80.597842] Testing event neigh_update: OK [ 80.624403] Testing event neigh_create: OK [ 80.650409] Testing event page_pool_update_nid: OK [ 80.677202] Testing event page_pool_state_hold: OK [ 80.704591] Testing event page_pool_state_release: OK [ 80.732373] Testing event page_pool_release: OK [ 80.758700] Testing event br_mdb_full: OK [ 80.784165] Testing event br_fdb_update: OK [ 80.811296] Testing event fdb_delete: OK [ 80.837003] Testing event br_fdb_external_learn_add: OK [ 80.864322] Testing event br_fdb_add: OK [ 80.890964] Testing event qdisc_create: OK [ 80.917517] Testing event qdisc_destroy: OK [ 80.943539] Testing event qdisc_reset: OK [ 80.969278] Testing event qdisc_enqueue: OK [ 80.997495] Testing event qdisc_dequeue: OK [ 81.024477] Testing event fib_table_lookup: OK [ 81.051022] Testing event tcp_ao_rcv_sne_update: OK [ 81.076967] Testing event tcp_ao_snd_sne_update: OK [ 81.103152] Testing event tcp_ao_synack_no_key: OK [ 81.129941] Testing event tcp_ao_rnext_request: OK [ 81.156875] Testing event tcp_ao_key_not_found: OK [ 81.182872] Testing event tcp_ao_mismatch: OK [ 81.209450] Testing event tcp_ao_wrong_maclen: OK [ 81.235883] Testing event tcp_ao_handshake_failure: OK [ 81.263451] Testing event tcp_hash_ao_required: OK [ 81.289884] Testing event tcp_hash_md5_mismatch: OK [ 81.317219] Testing event tcp_hash_md5_unexpected: OK [ 81.344422] Testing event tcp_hash_md5_required: OK [ 81.371264] Testing event tcp_hash_bad_header: OK [ 81.397977] Testing event tcp_cong_state_set: OK [ 81.425980] Testing event tcp_bad_csum: OK [ 81.453895] Testing event tcp_probe: OK [ 81.480141] Testing event tcp_retransmit_synack: OK [ 81.507238] Testing event tcp_rcv_space_adjust: OK [ 81.535128] Testing event tcp_destroy_sock: OK [ 81.561842] Testing event tcp_receive_reset: OK [ 81.588803] Testing event tcp_send_reset: OK [ 81.617846] Testing event tcp_retransmit_skb: OK [ 81.643953] Testing event udp_fail_queue_rcv_skb: OK [ 81.671350] Testing event sock_recv_length: OK [ 81.697718] Testing event sock_send_length: OK [ 81.724925] Testing event sk_data_ready: OK [ 81.753427] Testing event inet_sk_error_report: OK [ 81.780227] Testing event inet_sock_set_state: OK [ 81.808183] Testing event sock_exceed_buf_limit: OK [ 81.835288] Testing event sock_rcvqueue_full: OK [ 81.861999] Testing event dql_stall_detected: OK [ 81.888990] Testing event napi_poll: OK [ 81.916462] Testing event netif_receive_skb_list_exit: OK [ 81.943655] Testing event netif_rx_exit: OK [ 81.970609] Testing event netif_receive_skb_exit: OK [ 81.997278] Testing event napi_gro_receive_exit: OK [ 82.024232] Testing event napi_gro_frags_exit: OK [ 82.051168] Testing event netif_rx_entry: OK [ 82.077747] Testing event netif_receive_skb_list_entry: OK [ 82.104771] Testing event netif_receive_skb_entry: OK [ 82.131367] Testing event napi_gro_receive_entry: OK [ 82.158315] Testing event napi_gro_frags_entry: OK [ 82.185059] Testing event netif_rx: OK [ 82.211082] Testing event netif_receive_skb: OK [ 82.238846] Testing event net_dev_queue: OK [ 82.265549] Testing event net_dev_xmit_timeout: OK [ 82.294100] Testing event net_dev_xmit: OK [ 82.321404] Testing event net_dev_start_xmit: OK [ 82.347939] Testing event skb_copy_datagram_iovec: OK [ 82.375365] Testing event consume_skb: OK [ 82.403106] Testing event kfree_skb: OK [ 82.430410] Testing event netlink_extack: OK [ 82.457600] Testing event bpf_test_finish: OK [ 82.483793] Testing event bpf_trigger_tp: OK [ 82.509593] Testing event icmp_send: OK [ 82.536110] Testing event fib6_table_lookup: OK [ 82.563219] Testing event devlink_trap_report: OK [ 82.591124] Testing event devlink_health_reporter_state_update: OK [ 82.618706] Testing event devlink_health_recover_aborted: OK [ 82.645992] Testing event devlink_health_report: OK [ 82.673194] Testing event devlink_hwerr: OK [ 82.699283] Testing event devlink_hwmsg: OK [ 82.726418] Testing event svc_unregister: OK [ 82.753634] Testing event svc_noregister: OK [ 82.779784] Testing event svc_register: OK [ 82.807294] Testing event cache_entry_no_listener: OK [ 82.834361] Testing event cache_entry_make_negative: OK [ 82.861589] Testing event cache_entry_update: OK [ 82.887910] Testing event cache_entry_upcall: OK [ 82.914929] Testing event cache_entry_expired: OK [ 82.942128] Testing event svcsock_getpeername_err: OK [ 82.970458] Testing event svcsock_accept_err: OK [ 82.997950] Testing event svcsock_tcp_state: OK [ 83.024804] Testing event svcsock_tcp_recv_short: OK [ 83.051233] Testing event svcsock_write_space: OK [ 83.078934] Testing event svcsock_data_ready: OK [ 83.107092] Testing event svcsock_tcp_recv_err: OK [ 83.134183] Testing event svcsock_tcp_recv_eagain: OK [ 83.161328] Testing event svcsock_tcp_recv: OK [ 83.189776] Testing event svcsock_tcp_send: OK [ 83.215815] Testing event svcsock_udp_recv_err: OK [ 83.242002] Testing event svcsock_udp_recv: OK [ 83.268679] Testing event svcsock_udp_send: OK [ 83.295737] Testing event svcsock_marker: OK [ 83.321602] Testing event svcsock_free: OK [ 83.347362] Testing event svcsock_new: OK [ 83.374304] Testing event svc_defer_recv: OK [ 83.400722] Testing event svc_defer_queue: OK [ 83.427743] Testing event svc_defer_drop: OK [ 83.454628] Testing event svc_alloc_arg_err: OK [ 83.480802] Testing event svc_wake_up: OK [ 83.507338] Testing event svc_xprt_accept: OK [ 83.533679] Testing event svc_tls_timed_out: OK [ 83.559905] Testing event svc_tls_not_started: OK [ 83.587048] Testing event svc_tls_unavailable: OK [ 83.614132] Testing event svc_tls_upcall: OK [ 83.641779] Testing event svc_tls_start: OK [ 83.667475] Testing event svc_xprt_free: OK [ 83.693514] Testing event svc_xprt_detach: OK [ 83.720692] Testing event svc_xprt_close: OK [ 83.746679] Testing event svc_xprt_no_write_space: OK [ 83.774348] Testing event svc_xprt_dequeue: OK [ 83.801671] Testing event svc_xprt_enqueue: OK [ 83.828762] Testing event svc_xprt_create_err: OK [ 83.855564] Testing event svc_stats_latency: OK [ 83.883741] Testing event svc_replace_page_err: OK [ 83.911050] Testing event svc_send: OK [ 83.938137] Testing event svc_drop: OK [ 83.966166] Testing event svc_defer: OK [ 83.992292] Testing event svc_process: OK [ 84.020326] Testing event svc_authenticate: OK [ 84.046759] Testing event svc_xdr_sendto: OK [ 84.072573] Testing event svc_xdr_recvfrom: OK [ 84.099748] Testing event rpc_tls_not_started: OK [ 84.126210] Testing event rpc_tls_unavailable: OK [ 84.153070] Testing event rpcb_unregister: OK [ 84.180699] Testing event rpcb_register: OK [ 84.207508] Testing event pmap_register: OK [ 84.233429] Testing event rpcb_setport: OK [ 84.260437] Testing event rpcb_getport: OK [ 84.286433] Testing event xs_stream_read_request: OK [ 84.314276] Testing event xs_stream_read_data: OK [ 84.342029] Testing event xs_data_ready: OK [ 84.369574] Testing event xprt_reserve: OK [ 84.396384] Testing event xprt_put_cong: OK [ 84.422546] Testing event xprt_get_cong: OK [ 84.448633] Testing event xprt_release_cong: OK [ 84.474766] Testing event xprt_reserve_cong: OK [ 84.500827] Testing event xprt_release_xprt: OK [ 84.527846] Testing event xprt_reserve_xprt: OK [ 84.555863] Testing event xprt_ping: OK [ 84.582250] Testing event xprt_retransmit: OK [ 84.609653] Testing event xprt_transmit: OK [ 84.635855] Testing event xprt_lookup_rqst: OK [ 84.664723] Testing event xprt_timer: OK [ 84.690211] Testing event xprt_destroy: OK [ 84.716334] Testing event xprt_disconnect_force: OK [ 84.743191] Testing event xprt_disconnect_done: OK [ 84.770987] Testing event xprt_disconnect_auto: OK [ 84.800146] Testing event xprt_connect: OK [ 84.827325] Testing event xprt_create: OK [ 84.853380] Testing event rpc_socket_nospace: OK [ 84.880921] Testing event rpc_socket_shutdown: OK [ 84.908025] Testing event rpc_socket_close: OK [ 84.934813] Testing event rpc_socket_reset_connection: OK [ 84.962580] Testing event rpc_socket_error: OK [ 84.989728] Testing event rpc_socket_connect: OK [ 85.018287] Testing event rpc_socket_state_change: OK [ 85.045273] Testing event rpc_xdr_alignment: OK [ 85.071952] Testing event rpc_xdr_overflow: OK [ 85.100284] Testing event rpc_stats_latency: OK [ 85.127735] Testing event rpc_call_rpcerror: OK [ 85.153871] Testing event rpc_buf_alloc: OK [ 85.179517] Testing event rpcb_unrecognized_err: OK [ 85.207218] Testing event rpcb_unreachable_err: OK [ 85.235125] Testing event rpcb_bind_version_err: OK [ 85.263372] Testing event rpcb_timeout_err: OK [ 85.291090] Testing event rpcb_prog_unavail_err: OK [ 85.318260] Testing event rpc__auth_tooweak: OK [ 85.346051] Testing event rpc__bad_creds: OK [ 85.374607] Testing event rpc__stale_creds: OK [ 85.400776] Testing event rpc__mismatch: OK [ 85.426556] Testing event rpc__unparsable: OK [ 85.453699] Testing event rpc__garbage_args: OK [ 85.480901] Testing event rpc__proc_unavail: OK [ 85.509799] Testing event rpc__prog_mismatch: OK [ 85.537893] Testing event rpc__prog_unavail: OK [ 85.565725] Testing event rpc_bad_verifier: OK [ 85.591771] Testing event rpc_bad_callhdr: OK [ 85.618803] Testing event rpc_task_wakeup: OK [ 85.646602] Testing event rpc_task_sleep: OK [ 85.672655] Testing event rpc_task_call_done: OK [ 85.699823] Testing event rpc_task_end: OK [ 85.726465] Testing event rpc_task_signalled: OK [ 85.752938] Testing event rpc_task_timeout: OK [ 85.779761] Testing event rpc_task_complete: OK [ 85.806740] Testing event rpc_task_sync_wake: OK [ 85.832951] Testing event rpc_task_sync_sleep: OK [ 85.860012] Testing event rpc_task_run_action: OK [ 85.887291] Testing event rpc_task_begin: OK [ 85.913691] Testing event rpc_request: OK [ 85.940371] Testing event rpc_refresh_status: OK [ 85.967991] Testing event rpc_retry_refresh_status: OK [ 85.996774] Testing event rpc_timeout_status: OK [ 86.023960] Testing event rpc_connect_status: OK [ 86.050985] Testing event rpc_call_status: OK [ 86.077684] Testing event rpc_clnt_clone_err: OK [ 86.104251] Testing event rpc_clnt_new_err: OK [ 86.130692] Testing event rpc_clnt_new: OK [ 86.158468] Testing event rpc_clnt_replace_xprt_err: OK [ 86.186443] Testing event rpc_clnt_replace_xprt: OK [ 86.213197] Testing event rpc_clnt_release: OK [ 86.240937] Testing event rpc_clnt_shutdown: OK [ 86.268099] Testing event rpc_clnt_killall: OK [ 86.295778] Testing event rpc_clnt_free: OK [ 86.322502] Testing event rpc_xdr_reply_pages: OK [ 86.349988] Testing event rpc_xdr_recvfrom: OK [ 86.376906] Testing event rpc_xdr_sendto: OK [ 86.403589] Testing event 9p_fid_ref: OK [ 86.434678] Testing event 9p_protocol_dump: OK [ 86.467212] Testing event 9p_client_res: OK [ 86.494574] Testing event 9p_client_req: OK [ 86.521804] Testing event subflow_check_data_avail: OK [ 86.549469] Testing event ack_update_msk: OK [ 86.575690] Testing event get_mapping_status: OK [ 86.601948] Testing event mptcp_sendmsg_frag: OK [ 86.628949] Testing event mptcp_subflow_get_send: OK [ 86.657316] Testing event mctp_key_release: OK [ 86.683827] Testing event mctp_key_acquire: OK [ 86.712178] Testing event tls_alert_recv: OK [ 86.738464] Testing event tls_alert_send: OK [ 86.764552] Testing event tls_contenttype: OK [ 86.791548] Testing event handshake_cmd_done_err: OK [ 86.818411] Testing event handshake_cmd_done: OK [ 86.846005] Testing event handshake_cmd_accept_err: OK [ 86.874718] Testing event handshake_cmd_accept: OK [ 86.903058] Testing event handshake_notify_err: OK [ 86.930128] Testing event handshake_complete: OK [ 86.956945] Testing event handshake_destruct: OK [ 86.983947] Testing event handshake_cancel_busy: OK [ 87.011220] Testing event handshake_cancel_none: OK [ 87.038209] Testing event handshake_cancel: OK [ 87.065825] Testing event handshake_submit_err: OK [ 87.092431] Testing event handshake_submit: OK [ 87.119780] Testing event ma_write: OK [ 87.147255] Testing event ma_read: OK [ 87.174161] Testing event ma_op: OK [ 87.201173] Running tests on trace event systems: [ 87.206727] Testing event system maple_tree: OK [ 87.238130] Testing event system handshake: OK [ 87.276481] Testing event system mctp: OK [ 87.305113] Testing event system mptcp: OK [ 87.335011] Testing event system 9p: OK [ 87.375110] Testing event system sunrpc: OK [ 87.511917] Testing event system devlink: OK [ 87.546147] Testing event system fib6: OK [ 87.572631] Testing event system icmp: OK [ 87.599472] Testing event system bpf_test_run: OK [ 87.628873] Testing event system netlink: OK [ 87.655510] Testing event system skb: OK [ 87.685143] Testing event system net: OK [ 87.723534] Testing event system napi: OK [ 87.751088] Testing event system sock: OK [ 87.785697] Testing event system udp: OK [ 87.811615] Testing event system tcp: OK [ 87.852976] Testing event system fib: OK [ 87.880678] Testing event system qdisc: OK [ 87.909865] Testing event system bridge: OK [ 87.937287] Testing event system page_pool: OK [ 87.968442] Testing event system neigh: OK [ 88.000803] Testing event system thunderbolt: OK [ 88.028814] Testing event system ras: OK [ 88.059205] Testing event system cros_ec: OK [ 88.087008] Testing event system amd_cpu: OK [ 88.115542] Testing event system watchdog: OK [ 88.145267] Testing event system thermal: OK [ 88.173802] Testing event system hwmon: OK [ 88.201367] Testing event system smbus: OK [ 88.229666] Testing event system i2c: OK [ 88.258606] Testing event system rtc: OK [ 88.295859] Testing event system ucsi: OK [ 88.324596] Testing event system xhci-hcd: OK [ 88.397749] Testing event system i40e: OK [ 88.428905] Testing event system e1000e_trace: OK [ 88.456279] Testing event system mdio: OK [ 88.483708] Testing event system spi: OK [ 88.517092] Testing event system scsi: OK [ 88.547125] Testing event system dma_fence: OK [ 88.580089] Testing event system dev: OK [ 88.606844] Testing event system regmap: OK [ 88.648455] Testing event system iommu: OK [ 88.678551] Testing event system intel_iommu: OK [ 88.710708] Testing event system clk: OK [ 88.758688] Testing event system pwm: OK [ 88.789233] Testing event system gpio: OK [ 88.817639] Testing event system msr: OK [ 88.885169] Testing event system io_uring: OK [ 88.924499] Testing event system wbt: OK [ 88.953708] Testing event system kyber: OK [ 88.981255] Testing event system block: OK [ 89.025671] Testing event system avc: OK [ 89.051261] Testing event system capability: OK [ 89.077905] Testing event system lockd: OK [ 89.107786] Testing event system nfs: OK [ 89.213591] Testing event system hugetlbfs: OK [ 89.245559] Testing event system fscache: OK [ 89.288812] Testing event system netfs: OK [ 89.363208] Testing event system iomap: OK [ 89.398594] Testing event system filelock: OK [ 89.434602] Testing event system fs_dax: OK [ 89.470689] Testing event system writeback: OK [ 89.523208] Testing event system timestamp: OK [ 89.555253] Testing event system damon: OK [ 89.583129] Testing event system cma: OK [ 89.611744] Testing event system page_isolation: OK [ 89.639421] Testing event system memcg: OK [ 89.669000] Testing event system huge_memory: OK [ 89.701284] Testing event system thp: OK [ 89.730628] Testing event system ksm: OK [ 89.763679] Testing event system vmalloc: OK [ 89.792596] Testing event system tlb: OK [ 89.820089] Testing event system migrate: OK [ 89.849969] Testing event system mmap: OK [ 89.878241] Testing event system mmap_lock: OK [ 89.930531] Testing event system compaction: OK [ 89.968827] Testing event system kmem: OK [ 90.016757] Testing event system percpu: OK [ 90.046351] Testing event system vmscan: OK [ 90.089152] Testing event system pagemap: OK [ 90.117099] Testing event system oom: OK [ 90.149768] Testing event system filemap: OK [ 90.181450] Testing event system rseq: OK [ 90.208886] Testing event system context_tracking: OK [ 90.237771] Testing event system xdp: OK [ 90.276950] Testing event system rv: OK [ 90.303640] Testing event system rpm: OK [ 90.335296] Testing event system power: OK [ 90.394191] Testing event system error_report: OK [ 90.421473] Testing event system bpf_trace: OK [ 90.448143] Testing event system test: OK [ 90.475332] Testing event system osnoise: OK [ 90.506367] Testing event system cgroup: OK [ 90.551755] Testing event system csd: OK [ 90.583418] Testing event system timer_migration: OK [ 90.620694] Testing event system alarmtimer: OK [ 90.649216] Testing event system timer: OK [ 90.690652] Testing event system module: OK [ 90.720493] Testing event system raw_syscalls: OK [ 90.747419] Testing event system swiotlb: OK [ 90.773929] Testing event system dma: OK [ 90.814695] Testing event system rcu: OK [ 90.844492] Testing event system irq_matrix: OK [ 90.880638] Testing event system printk: OK [ 90.907755] Testing event system lock: OK [ 90.945715] Testing event system sched: OK [ 90.998694] Testing event system ipi: OK [ 91.028147] Testing event system notifier: OK [ 91.056638] Testing event system workqueue: OK [ 91.086327] Testing event system signal: OK [ 91.114257] Testing event system irq: OK [ 91.147055] Testing event system cpuhp: OK [ 91.175997] Testing event system task: OK [ 91.204308] Testing event system exceptions: OK [ 91.232320] Testing event system resctrl: OK [ 91.260987] Testing event system mce: OK [ 91.287374] Testing event system x86_fpu: OK [ 91.322422] Testing event system nmi: OK [ 91.349390] Testing event system irq_vectors: OK [ 91.404939] Testing event system syscalls: OK [ 91.437056] Testing event system hyperv: OK [ 91.466264] Testing event system xen: OK [ 91.501863] Testing event system vsyscall: OK [ 91.527980] Testing event system initcall: OK [ 91.558193] Running tests on all trace events: [ 91.563496] Testing all events: OK [ 93.249431] Testing ftrace filter: OK [ 93.255780] trace_kprobe: Testing kprobe tracing: OK [ 93.269325] Loading compiled-in X.509 certificates [ 93.305374] Loaded X.509 cert 'Build time autogenerated kernel key: f0aa52fe25d5a3ba89ee211e75228393482c57d0' [ 93.338412] Demotion targets for Node 0: null [ 93.343521] page_owner is disabled [ 93.347849] Key type big_key registered [ 93.539205] Key type encrypted registered [ 93.544006] ima: No TPM chip found, activating TPM-bypass! [ 93.550228] Loading compiled-in module X.509 certificates [ 93.557107] Loaded X.509 cert 'Build time autogenerated kernel key: f0aa52fe25d5a3ba89ee211e75228393482c57d0' [ 93.567742] ima: Allocated hash algorithm: sha256 [ 93.573206] ima: No architecture policies found [ 93.578549] evm: Initialising EVM extended attributes: [ 93.584410] evm: security.selinux [ 93.588450] evm: security.SMACK64 (disabled) [ 93.593444] evm: security.SMACK64EXEC (disabled) [ 93.598785] evm: security.SMACK64TRANSMUTE (disabled) [ 93.604558] evm: security.SMACK64MMAP (disabled) [ 93.609897] evm: security.apparmor [ 93.614028] evm: security.ima [ 93.617726] evm: security.capability [ 93.622032] evm: HMAC attrs: 0x1 [ 93.711766] Running certificate verification RSA selftest [ 93.782416] Loaded X.509 cert 'Certificate verification self-testing key: f58703bb33ce1b73ee02eccdee5b8817518fe3db' [ 93.820448] Running certificate verification ECDSA selftest [ 93.904662] Loaded X.509 cert 'Certificate verification ECDSA self-testing key: 2900bcea1deb7bc8479a84a23d758efdfdd2b2d3' [ 93.907792] alg: skcipher: skipping comparison tests for xctr-aes-aesni-avx because xctr(aes-generic) is unavailable [ 96.981308] e1000e 0000:00:19.0 eth0: NIC Link is Up 1000 Mbps Full Duplex, Flow Control: None [ 97.003101] Sending DHCP requests ...., OK [ 108.956001] IP-Config: Got DHCP answer from 192.168.3.1, my address is 192.168.3.114 [ 108.964480] IP-Config: Complete: [ 108.968438] device=eth0, hwaddr=f8:b1:56:e3:03:ca, ipaddr=192.168.3.114, mask=255.255.255.0, gw=192.168.3.200 [ 108.979500] host=lkp-hsw-d03, domain=lkp.intel.com, nis-domain=(none) [ 108.987100] bootserver=192.168.3.200, rootserver=192.168.3.200, rootpath= [ 108.987102] nameserver0=192.168.3.200 [ 109.058650] e1000e 0000:04:00.0 eth1: NIC Link is Down [ 109.065564] clk: Disabling unused clocks [ 109.070219] PM: genpd: Disabling unused power domains [ 109.075998] KTAP version 1 [ 109.079439] 1..21 [ 109.082256] KTAP version 1 [ 109.086045] # Subtest: initramfs [ 109.090346] # module: initramfs_test [ 109.090355] # is_init: true [ 109.095009] 1..6 [ 109.102417] ok 1 initramfs_test_extract [ 109.102546] initramfs name without nulterm: initramfs_test_fname_overrunP [ 109.115276] ok 2 initramfs_test_fname_overrun [ 109.115691] ok 3 initramfs_test_data [ 109.121523] ok 4 initramfs_test_csum [ 109.126601] ok 5 initramfs_test_hardlink [ 109.179688] ok 6 initramfs_test_many [ 109.184797] # initramfs: pass:6 fail:0 skip:0 total:6 [ 109.189454] # Totals: pass:6 fail:0 skip:0 total:6 [ 109.195229] ok 1 initramfs [ 109.204213] KTAP version 1 [ 109.207994] # Subtest: hw_breakpoint [ 109.212640] # module: hw_breakpoint_test [ 109.212654] 1..9 [ 109.221070] ok 1 test_one_cpu [ 109.221771] ok 2 test_many_cpus [ 109.226231] ok 3 test_one_task_on_all_cpus [ 109.230963] ok 4 test_two_tasks_on_all_cpus [ 109.236503] ok 5 test_one_task_on_one_cpu [ 109.242118] ok 6 test_one_task_mixed [ 109.247787] ok 7 test_two_tasks_on_one_cpu [ 109.252928] ok 8 test_two_tasks_on_one_all_cpus [ 109.258506] ok 9 test_task_on_all_and_one_cpu [ 109.264131] # hw_breakpoint: pass:9 fail:0 skip:0 total:9 [ 109.269564] # Totals: pass:9 fail:0 skip:0 total:9 [ 109.275688] ok 2 hw_breakpoint [ 109.285046] KTAP version 1 [ 109.288841] # Subtest: damon [ 109.292795] # module: core [ 109.292802] 1..16 [ 109.299827] ok 1 damon_test_target [ 109.299998] ok 2 damon_test_regions [ 109.304775] ok 3 damon_test_aggregate [ 109.309586] ok 4 damon_test_split_at [ 109.314593] ok 5 damon_test_merge_two [ 109.319511] ok 6 damon_test_merge_regions_of [ 109.324535] ok 7 damon_test_split_regions_of [ 109.330158] ok 8 damon_test_ops_registration [ 109.335827] ok 9 damon_test_set_regions [ 109.341414] ok 10 damon_test_nr_accesses_to_accesses_bp [ 109.346556] ok 11 damon_test_update_monitoring_result [ 109.353047] ok 12 damon_test_set_attrs [ 109.359532] ok 13 damon_test_moving_sum [ 109.364588] ok 14 damos_test_new_filter [ 109.369751] ok 15 damos_test_filter_out [ 109.374891] ok 16 damon_test_feed_loop_next_input [ 109.379804] # damon: pass:16 fail:0 skip:0 total:16 [ 109.385580] # Totals: pass:16 fail:0 skip:0 total:16 [ 109.391181] ok 3 damon [ 109.399987] KTAP version 1 [ 109.403771] # Subtest: damon-operations [ 109.408675] # module: vaddr [ 109.408682] 1..6 [ 109.416216] ok 1 damon_test_three_regions_in_vmas [ 109.416463] ok 2 damon_test_apply_three_regions1 [ 109.422542] ok 3 damon_test_apply_three_regions2 [ 109.428508] ok 4 damon_test_apply_three_regions3 [ 109.434509] ok 5 damon_test_apply_three_regions4 [ 109.440399] # damon_test_split_evenly: EXPECTATION FAILED at mm/damon/tests/vaddr-kunit.h:290 Expected r->ar.end == start + i * expected_width, but r->ar.end == 16 (0x10) start + i * expected_width == 15 (0xf) [ 109.446223] # damon_test_split_evenly: EXPECTATION FAILED at mm/damon/tests/vaddr-kunit.h:288 Expected r->ar.start == start + i++ * expected_width, but r->ar.start == 16 (0x10) start + i++ * expected_width == 15 (0xf) [ 109.473938] # damon_test_split_evenly: EXPECTATION FAILED at mm/damon/tests/vaddr-kunit.h:290 Expected r->ar.end == start + i * expected_width, but r->ar.end == 27 (0x1b) start + i * expected_width == 25 (0x19) [ 109.502332] # damon_test_split_evenly: EXPECTATION FAILED at mm/damon/tests/vaddr-kunit.h:288 Expected r->ar.start == start + i++ * expected_width, but r->ar.start == 27 (0x1b) start + i++ * expected_width == 25 (0x19) [ 109.530150] # damon_test_split_evenly: EXPECTATION FAILED at mm/damon/tests/vaddr-kunit.h:290 Expected r->ar.end == start + i * expected_width, but r->ar.end == 38 (0x26) start + i * expected_width == 35 (0x23) [ 109.558624] # damon_test_split_evenly: EXPECTATION FAILED at mm/damon/tests/vaddr-kunit.h:288 Expected r->ar.start == start + i++ * expected_width, but r->ar.start == 38 (0x26) start + i++ * expected_width == 35 (0x23) [ 109.586405] # damon_test_split_evenly: EXPECTATION FAILED at mm/damon/tests/vaddr-kunit.h:290 Expected r->ar.end == start + i * expected_width, but r->ar.end == 49 (0x31) start + i * expected_width == 45 (0x2d) [ 109.614882] # damon_test_split_evenly: EXPECTATION FAILED at mm/damon/tests/vaddr-kunit.h:283 Expected r->ar.start == start + i * expected_width, but r->ar.start == 49 (0x31) start + i * expected_width == 45 (0x2d) [ 109.642682] # damon_test_split_evenly: EXPECTATION FAILED at mm/damon/tests/vaddr-kunit.h:290 Expected r->ar.end == start + i * expected_width, but r->ar.end == 2 (0x2) start + i * expected_width == 1 (0x1) [ 109.670817] # damon_test_split_evenly: EXPECTATION FAILED at mm/damon/tests/vaddr-kunit.h:283 Expected r->ar.start == start + i * expected_width, but r->ar.start == 2 (0x2) start + i * expected_width == 1 (0x1) [ 109.698255] # damon_test_split_evenly: EXPECTATION FAILED at mm/damon/tests/vaddr-kunit.h:256 Expected damon_va_evenly_split_region(t, r, nr_pieces) == -22, but damon_va_evenly_split_region(t, r, nr_pieces) == 0 (0x0) [ 109.751585] # damon_test_split_evenly: EXPECTATION FAILED at mm/damon/tests/vaddr-kunit.h:258 Expected damon_nr_regions(t) == 1u, but damon_nr_regions(t) == 2 (0x2) 1u == 1 (0x1) [ 109.751634] # damon_test_split_evenly: EXPECTATION FAILED at mm/damon/tests/vaddr-kunit.h:261 Expected r->ar.start == start, but r->ar.start == 6 (0x6) start == 5 (0x5) [ 109.776758] not ok 6 damon_test_split_evenly [ 109.800835] # damon-operations: pass:5 fail:1 skip:0 total:6 [ 109.806182] # Totals: pass:5 fail:1 skip:0 total:6 [ 109.812563] not ok 4 damon-operations [ 109.822516] KTAP version 1 [ 109.826298] # Subtest: damon-sysfs [ 109.830769] # module: sysfs [ 109.830776] 1..1 [ 109.837956] ok 1 damon_sysfs_test_add_targets [ 109.837967] ok 5 damon-sysfs [ 109.847057] KTAP version 1 [ 109.850853] # Subtest: exec [ 109.854722] # module: exec [ 109.854729] 1..1 [ 109.861667] ok 1 exec_test_bprm_stack_limits [ 109.861675] ok 6 exec [ 109.870096] KTAP version 1 [ 109.873878] # Subtest: binfmt_elf [ 109.878263] # module: binfmt_elf [ 109.878270] 1..1 [ 109.885724] ok 1 total_mapping_size_test [ 109.885732] ok 7 binfmt_elf [ 109.894268] KTAP version 1 [ 109.898077] # Subtest: compat_binfmt_elf [ 109.903102] # module: compat_binfmt_elf [ 109.903109] 1..1 [ 109.911201] ok 1 total_mapping_size_test [ 109.911209] ok 8 compat_binfmt_elf [ 109.920359] KTAP version 1 [ 109.924140] # Subtest: fprobe_test [ 109.928611] # module: test_fprobe [ 109.928618] 1..5 [ 109.979615] ok 1 test_fprobe_entry [ 110.023155] ok 2 test_fprobe [ 110.042303] ok 3 test_fprobe_syms [ 110.089726] ok 4 test_fprobe_data [ 110.137128] ok 5 test_fprobe_skip [ 110.141529] # fprobe_test: pass:5 fail:0 skip:0 total:5 [ 110.145925] # Totals: pass:5 fail:0 skip:0 total:5 [ 110.151874] ok 9 fprobe_test [ 110.161048] KTAP version 1 [ 110.164829] # Subtest: qos-kunit-test [ 110.169561] # module: qos_test [ 110.169568] 1..3 [ 110.176864] ok 1 freq_qos_test_min [ 110.177108] ok 2 freq_qos_test_maxdef [ 110.181829] ok 3 freq_qos_test_readd [ 110.186568] # qos-kunit-test: pass:3 fail:0 skip:0 total:3 [ 110.191220] # Totals: pass:3 fail:0 skip:0 total:3 [ 110.197428] ok 10 qos-kunit-test [ 110.206924] KTAP version 1 [ 110.210706] # Subtest: VCAP_API_DebugFS_Testsuite [ 110.216475] # module: vcap [ 110.216482] 1..4 [ 110.223292] ================================================================== [ 110.231243] BUG: KASAN: stack-out-of-bounds in test_cache_read+0x3ac/0x3f0 [ 110.238844] Read of size 4 at addr ffffc900015c7cd0 by task kunit_try_catch/2944 [ 110.249186] CPU: 6 UID: 0 PID: 2944 Comm: kunit_try_catch Tainted: G N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 110.249192] Tainted: [N]=TEST [ 110.249193] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 110.249195] Call Trace: [ 110.249197] [ 110.249199] dump_stack_lvl+0x4f/0x70 [ 110.249203] print_address_description.constprop.0+0x2c/0x3b0 [ 110.249207] ? test_cache_read+0x3ac/0x3f0 [ 110.249209] print_report+0xb9/0x280 [ 110.249213] ? test_cache_read+0x3ac/0x3f0 [ 110.249215] ? kasan_addr_to_slab+0x9/0x90 [ 110.249218] ? test_cache_read+0x3ac/0x3f0 [ 110.249220] kasan_report+0xda/0x110 [ 110.249223] ? test_cache_read+0x3ac/0x3f0 [ 110.249226] test_cache_read+0x3ac/0x3f0 [ 110.249229] vcap_addr_keysets+0x168/0x390 [ 110.249233] ? __asan_memset+0x1f/0x40 [ 110.249236] vcap_api_addr_keyset_test+0x2b3/0x790 [ 110.249239] ? __pfx_vcap_api_addr_keyset_test+0x10/0x10 [ 110.249242] ? switch_hrtimer_base+0x3c7/0x710 [ 110.249246] ? __pfx_perf_event_context_sched_out+0x10/0x10 [ 110.249250] ? __perf_event_task_sched_in+0x264/0x420 [ 110.249253] ? __pfx___perf_event_task_sched_in+0x10/0x10 [ 110.249255] ? __perf_event_task_sched_out+0x96/0x1a0 [ 110.249257] ? pick_next_task_fair+0x51/0xba0 [ 110.249261] ? finish_task_switch.isra.0+0x155/0x750 [ 110.249264] ? __switch_to+0x5ba/0x1020 [ 110.249267] ? __schedule+0x757/0x1420 [ 110.249269] ? __pfx_read_tsc+0x10/0x10 [ 110.249272] ? ktime_get_ts64+0x7f/0x220 [ 110.249275] kunit_try_run_case+0x175/0x440 [ 110.249277] ? __pfx_kunit_try_run_case+0x10/0x10 [ 110.249280] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 110.249283] ? __pfx_kunit_try_run_case+0x10/0x10 [ 110.249285] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 110.249288] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 110.249291] kthread+0x3b4/0x780 [ 110.249294] ? __pfx_kthread+0x10/0x10 [ 110.249297] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 110.249300] ? __pfx_kthread+0x10/0x10 [ 110.249303] ret_from_fork+0x30/0x70 [ 110.249306] ? __pfx_kthread+0x10/0x10 [ 110.249309] ret_from_fork_asm+0x1a/0x30 [ 110.249314] [ 110.479148] The buggy address belongs to stack of task kunit_try_catch/2944 [ 110.486831] and is located at offset 560 in frame: [ 110.492427] vcap_api_addr_keyset_test+0x0/0x790 [ 110.499989] This frame has 7 objects: [ 110.504375] [32, 48) 'matches' [ 110.504377] [64, 88) '__assertion' [ 110.508244] [128, 288) 'admin' [ 110.512457] [352, 392) 'keysets' [ 110.516322] [432, 480) 'keydata' [ 110.520362] [512, 560) 'mskdata' [ 110.524401] [592, 640) 'actdata' [ 110.534702] The buggy address belongs to the virtual mapping at [ffffc900015c0000, ffffc900015c9000) created by: dup_task_struct+0x59/0x600 [ 110.554485] The buggy address belongs to the physical page: [ 110.560774] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888103bd55c0 pfn:0x103bd5 [ 110.570794] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 110.578049] raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 110.586513] raw: ffff888103bd55c0 0000000000000000 00000001ffffffff 0000000000000000 [ 110.594974] page dumped because: kasan: bad access detected [ 110.603482] Memory state around the buggy address: [ 110.608991] ffffc900015c7b80: 00 00 00 00 00 00 00 00 f2 f2 f2 f2 f2 f2 f2 f2 [ 110.616933] ffffc900015c7c00: 00 00 00 00 00 f2 f2 f2 f2 f2 00 00 00 00 00 00 [ 110.624874] >ffffc900015c7c80: f2 f2 f2 f2 00 00 00 00 00 00 f2 f2 f2 f2 00 00 [ 110.632817] ^ [ 110.639365] ffffc900015c7d00: 00 00 00 00 f3 f3 f3 f3 00 00 00 00 00 00 00 00 [ 110.647308] ffffc900015c7d80: 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 00 00 f2 f2 [ 110.655251] ================================================================== [ 110.663284] Disabling lock debugging due to kernel taint [ 110.669633] not ok 1 vcap_api_addr_keyset_test [ 110.669773] addr: 788 X6 error rule, keyset: VCAP_KFS_MAC_ETYPE [ 110.682245] ok 2 vcap_api_show_admin_raw_test [ 110.682735] ok 3 vcap_api_show_admin_test [ 110.688570] ok 4 vcap_api_show_admin_rule_test [ 110.693693] # VCAP_API_DebugFS_Testsuite: pass:3 fail:1 skip:0 total:4 [ 110.699210] # Totals: pass:3 fail:1 skip:0 total:4 [ 110.706467] not ok 11 VCAP_API_DebugFS_Testsuite [ 110.717369] KTAP version 1 [ 110.721152] # Subtest: VCAP_API_Encoding_Testsuite [ 110.727008] # module: vcap [ 110.727019] 1..17 [ 110.734075] ok 1 vcap_api_set_bit_1_test [ 110.734312] ok 2 vcap_api_set_bit_0_test [ 110.739560] ok 3 vcap_api_iterator_init_test [ 110.744809] ok 4 vcap_api_iterator_next_test [ 110.750417] ok 5 vcap_api_encode_typegroups_test [ 110.755998] ok 6 vcap_api_encode_bit_test [ 110.761941] ok 7 vcap_api_encode_field_test [ 110.767278] ok 8 vcap_api_encode_short_field_test [ 110.772777] ok 9 vcap_api_encode_keyfield_test [ 110.778818] ok 10 vcap_api_encode_max_keyfield_test [ 110.784526] ok 11 vcap_api_encode_actionfield_test [ 110.790813] ok 12 vcap_api_keyfield_typegroup_test [ 110.796948] ok 13 vcap_api_actionfield_typegroup_test [ 110.803068] ok 14 vcap_api_vcap_keyfields_test [ 110.809422] ok 15 vcap_api_vcap_actionfields_test [ 110.815099] vcap_encode_rule_keyset:670: no keyfields in the rule [ 110.827950] ok 16 vcap_api_encode_rule_keyset_test [ 110.828118] vcap_encode_rule_actionset:829: no actionfields in the rule [ 110.841533] ok 17 vcap_api_encode_rule_actionset_test [ 110.841544] # VCAP_API_Encoding_Testsuite: pass:17 fail:0 skip:0 total:17 [ 110.847679] # Totals: pass:17 fail:0 skip:0 total:17 [ 110.855201] ok 12 VCAP_API_Encoding_Testsuite [ 110.866001] KTAP version 1 [ 110.869786] # Subtest: VCAP_API_Rule_Value_Testsuite [ 110.875817] # module: vcap [ 110.875825] 1..2 [ 110.882850] ok 1 vcap_api_rule_add_keyvalue_test [ 110.883012] ok 2 vcap_api_rule_add_actionvalue_test [ 110.888721] # VCAP_API_Rule_Value_Testsuite: pass:2 fail:0 skip:0 total:2 [ 110.894675] # Totals: pass:2 fail:0 skip:0 total:2 [ 110.902201] ok 13 VCAP_API_Rule_Value_Testsuite [ 110.913000] KTAP version 1 [ 110.916783] # Subtest: VCAP_API_Full_Rule_Testsuite [ 110.922729] # module: vcap [ 110.922737] 1..4 [ 110.929683] ok 1 vcap_api_rule_find_keyset_basic_test [ 110.929853] ok 2 vcap_api_rule_find_keyset_failed_test [ 110.936258] ok 3 vcap_api_rule_find_keyset_many_test [ 110.942580] vcap_rule_add_key:2679: keyfield ETYPE_LEN_IS is already in the rule [ 110.957212] ok 4 vcap_api_encode_rule_test [ 110.957224] # VCAP_API_Full_Rule_Testsuite: pass:4 fail:0 skip:0 total:4 [ 110.962413] # Totals: pass:4 fail:0 skip:0 total:4 [ 110.969845] ok 14 VCAP_API_Full_Rule_Testsuite [ 110.980554] KTAP version 1 [ 110.984337] # Subtest: VCAP_API_Support_Testsuite [ 110.990119] # module: vcap [ 110.990126] 1..4 [ 110.997243] ok 1 vcap_api_next_lookup_basic_test [ 110.997568] ok 2 vcap_api_next_lookup_advanced_test [ 111.003505] ok 3 vcap_api_filter_unsupported_keys_test [ 111.009805] ok 4 vcap_api_filter_keylist_test [ 111.016053] # VCAP_API_Support_Testsuite: pass:4 fail:0 skip:0 total:4 [ 111.021485] # Totals: pass:4 fail:0 skip:0 total:4 [ 111.028743] ok 15 VCAP_API_Support_Testsuite [ 111.039284] KTAP version 1 [ 111.043087] # Subtest: VCAP_API_Rule_Counter_Testsuite [ 111.049291] # module: vcap [ 111.049298] 1..2 [ 111.056179] vcap_api_set_rule_counter_test:1488 [ 111.061489] vcap_api_set_rule_counter_test:1490 [ 111.066986] ok 1 vcap_api_set_rule_counter_test [ 111.067449] ok 2 vcap_api_get_rule_counter_test [ 111.073096] # VCAP_API_Rule_Counter_Testsuite: pass:2 fail:0 skip:0 total:2 [ 111.078702] # Totals: pass:2 fail:0 skip:0 total:2 [ 111.086392] ok 16 VCAP_API_Rule_Counter_Testsuite [ 111.097359] KTAP version 1 [ 111.101142] # Subtest: VCAP_API_Rule_Insert_Testsuite [ 111.107260] # module: vcap [ 111.107267] 1..2 [ 111.114363] ok 1 vcap_api_rule_insert_in_order_test [ 111.114715] ok 2 vcap_api_rule_insert_reverse_order_test [ 111.120665] # VCAP_API_Rule_Insert_Testsuite: pass:2 fail:0 skip:0 total:2 [ 111.127117] # Totals: pass:2 fail:0 skip:0 total:2 [ 111.134744] ok 17 VCAP_API_Rule_Insert_Testsuite [ 111.145624] KTAP version 1 [ 111.149406] # Subtest: VCAP_API_Rule_Remove_Testsuite [ 111.155522] # module: vcap [ 111.155528] 1..3 [ 111.162576] ok 1 vcap_api_rule_remove_at_end_test [ 111.162871] ok 2 vcap_api_rule_remove_in_middle_test [ 111.168925] ok 3 vcap_api_rule_remove_in_front_test [ 111.174989] # VCAP_API_Rule_Remove_Testsuite: pass:3 fail:0 skip:0 total:3 [ 111.180938] # Totals: pass:3 fail:0 skip:0 total:3 [ 111.188540] ok 18 VCAP_API_Rule_Remove_Testsuite [ 111.199443] KTAP version 1 [ 111.203224] # Subtest: VCAP_API_Rule_Enable_Testsuite [ 111.209343] # module: vcap [ 111.209349] 1..1 [ 111.216292] ok 1 vcap_api_rule_chain_path_test [ 111.216300] ok 19 VCAP_API_Rule_Enable_Testsuite [ 111.227225] KTAP version 1 [ 111.231006] # Subtest: thunderbolt [ 111.235479] # module: thunderbolt [ 111.235485] 1..39 [ 111.243229] ok 1 tb_test_path_basic [ 111.243745] ok 2 tb_test_path_not_connected_walk [ 111.248915] ok 3 tb_test_path_single_hop_walk [ 111.255220] ok 4 tb_test_path_daisy_chain_walk [ 111.261757] ok 5 tb_test_path_simple_tree_walk [ 111.269001] ok 6 tb_test_path_complex_tree_walk [ 111.276662] ok 7 tb_test_path_max_length_walk [ 111.283122] ok 8 tb_test_path_not_connected [ 111.289325] ok 9 tb_test_path_not_bonded_lane0 [ 111.295196] ok 10 tb_test_path_not_bonded_lane1 [ 111.301604] ok 11 tb_test_path_not_bonded_lane1_chain [ 111.308001] ok 12 tb_test_path_not_bonded_lane1_chain_reverse [ 111.315199] ok 13 tb_test_path_mixed_chain [ 111.323096] ok 14 tb_test_path_mixed_chain_reverse [ 111.329112] ok 15 tb_test_tunnel_pcie [ 111.335696] ok 16 tb_test_tunnel_dp [ 111.341990] ok 17 tb_test_tunnel_dp_chain [ 111.347729] ok 18 tb_test_tunnel_dp_tree [ 111.355144] ok 19 tb_test_tunnel_dp_max_length [ 111.361357] ok 20 tb_test_tunnel_3dp [ 111.368037] ok 21 tb_test_tunnel_port_on_path [ 111.373606] ok 22 tb_test_tunnel_usb3 [ 111.379561] ok 23 tb_test_tunnel_dma [ 111.384744] ok 24 tb_test_tunnel_dma_rx [ 111.389737] ok 25 tb_test_tunnel_dma_tx [ 111.395281] ok 26 tb_test_tunnel_dma_chain [ 111.400766] ok 27 tb_test_tunnel_dma_match [ 111.406571] ok 28 tb_test_credit_alloc_legacy_not_bonded [ 111.412407] ok 29 tb_test_credit_alloc_legacy_bonded [ 111.419434] ok 30 tb_test_credit_alloc_pcie [ 111.426110] ok 31 tb_test_credit_alloc_without_dp [ 111.432068] ok 32 tb_test_credit_alloc_dp [ 111.438524] ok 33 tb_test_credit_alloc_usb3 [ 111.444275] ok 34 tb_test_credit_alloc_dma [ 111.450215] ok 35 tb_test_credit_alloc_dma_multiple [ 111.456084] ok 36 tb_test_credit_alloc_all [ 111.462529] ok 37 tb_test_property_parse [ 111.468033] ok 38 tb_test_property_format [ 111.473619] ok 39 tb_test_property_copy [ 111.478708] # thunderbolt: pass:39 fail:0 skip:0 total:39 [ 111.483624] # Totals: pass:39 fail:0 skip:0 total:39 [ 111.489834] ok 20 thunderbolt [ 111.499261] KTAP version 1 [ 111.503066] # Subtest: mctp [ 111.506936] # module: mctp [ 111.506943] 1..13 [ 111.513724] KTAP version 1 [ 111.517859] # Subtest: mctp_test_fragment [ 111.518181] ok 1 mtu 63 len 68 -> 1 frags [ 111.523897] ok 2 mtu 64 len 68 -> 1 frags [ 111.529598] ok 3 mtu 65 len 68 -> 2 frags [ 111.535367] ok 4 mtu 66 len 68 -> 2 frags [ 111.541002] ok 5 mtu 127 len 68 -> 2 frags [ 111.546688] ok 6 mtu 128 len 68 -> 2 frags [ 111.552479] ok 7 mtu 129 len 68 -> 3 frags [ 111.558283] ok 8 mtu 130 len 68 -> 3 frags [ 111.563803] # mctp_test_fragment: pass:8 fail:0 skip:0 total:8 [ 111.569323] ok 1 mctp_test_fragment [ 111.576225] KTAP version 1 [ 111.584914] # Subtest: mctp_test_rx_input [ 111.606445] ok 1 {1,a,8,0} [ 111.621652] ok 2 {1,a,9,0} [ 111.645645] ok 3 {2,a,8,0} [ 111.649802] # mctp_test_rx_input: pass:3 fail:0 skip:0 total:3 [ 111.653938] ok 2 mctp_test_rx_input [ 111.660840] KTAP version 1 [ 111.669530] # Subtest: mctp_test_route_input_sk [ 111.688650] ok 1 {1,a,8,c8} type 0 [ 111.709649] ok 2 {1,a,8,c8} type 1 [ 111.732667] ok 3 {1,a,8,c0} type 0 [ 111.756648] ok 4 {1,a,8,48} type 0 [ 111.780648] ok 5 {1,a,8,8} type 0 [ 111.804706] ok 6 {1,a,8,0} type 0 [ 111.809472] # mctp_test_route_input_sk: pass:6 fail:0 skip:0 total:6 [ 111.814213] ok 3 mctp_test_route_input_sk [ 111.821648] KTAP version 1 [ 111.830861] # Subtest: mctp_test_route_input_sk_reasm [ 111.849658] ok 1 single packet [ 111.875656] ok 2 single packet, offset seq [ 111.899629] ok 3 start & end packets [ 111.927706] ok 4 start & end packets, offset seq [ 111.950655] ok 5 start & end packets, out of order [ 111.975652] ok 6 start, middle & end packets [ 111.999649] ok 7 missing seq [ 112.023651] ok 8 seq wrap [ 112.027980] # mctp_test_route_input_sk_reasm: pass:8 fail:0 skip:0 total:8 [ 112.032041] ok 4 mctp_test_route_input_sk_reasm [ 112.040004] KTAP version 1 [ 112.049733] # Subtest: mctp_test_route_input_sk_keys [ 112.068645] ok 1 direct match [ 112.094639] ok 2 flipped src/dest [ 112.118644] ok 3 peer addr mismatch [ 112.143643] ok 4 tag value mismatch [ 112.166624] ok 5 TO mismatch [ 112.186648] ok 6 broadcast response [ 112.217710] ok 7 any local match [ 112.222647] # mctp_test_route_input_sk_keys: pass:7 fail:0 skip:0 total:7 [ 112.227304] ok 5 mctp_test_route_input_sk_keys [ 112.244674] ok 6 mctp_test_route_input_sk_fail_single [ 112.260646] ok 7 mctp_test_route_input_sk_fail_frag [ 112.284674] ok 8 mctp_test_route_input_multiple_nets_bind [ 112.306679] ok 9 mctp_test_route_input_multiple_nets_key [ 112.320655] ok 10 mctp_test_packet_flow [ 112.336628] ok 11 mctp_test_fragment_flow [ 112.351691] ok 12 mctp_test_route_output_key_create [ 112.357562] pkt1 skb len=7 headroom=0 headlen=7 tailroom=377 mac=(-1,-1) mac_len=0 net=(0,-1) trans=-1 shinfo(txflags=0 nr_frags=0 gso(size=0 type=0 segs=0)) csum(0x0 start=0 offset=0 ip_summed=0 complete_sw=0 valid=0 level=0) hash(0x0 sw=0 l4=0) proto=0x0000 pkttype=0 iif=0 priority=0x0 mark=0x0 alloc_cpu=0 vlan_all=0x0 encapsulation=0 inner(proto=0x0000, mac=0, net=0, trans=0) [ 112.410224] pkt1 dev name=mctptest0 feat=0x0000000000004000 [ 112.416524] pkt1 skb linear: 00000000: 01 08 0a 88 00 00 00 [ 112.422995] pkt2 skb len=7 headroom=7 headlen=7 tailroom=370 mac=(-1,-1) mac_len=0 net=(7,-1) trans=-1 shinfo(txflags=0 nr_frags=0 gso(size=0 type=0 segs=0)) csum(0x0 start=0 offset=0 ip_summed=0 complete_sw=0 valid=0 level=0) hash(0x0 sw=0 l4=0) proto=0x0000 pkttype=0 iif=0 priority=0x0 mark=0x0 alloc_cpu=0 vlan_all=0x0 encapsulation=0 inner(proto=0x0000, mac=0, net=0, trans=0) [ 112.469699] pkt2 dev name=mctptest0 feat=0x0000000000004000 [ 112.475991] pkt2 skb linear: 00000000: 01 08 0a 18 11 11 11 [ 112.482457] pkt3 skb len=7 headroom=14 headlen=7 tailroom=363 mac=(-1,-1) mac_len=0 net=(14,-1) trans=-1 shinfo(txflags=0 nr_frags=0 gso(size=0 type=0 segs=0)) csum(0x0 start=0 offset=0 ip_summed=0 complete_sw=0 valid=0 level=0) hash(0x0 sw=0 l4=0) proto=0x0000 pkttype=0 iif=0 priority=0x0 mark=0x0 alloc_cpu=0 vlan_all=0x0 encapsulation=0 inner(proto=0x0000, mac=0, net=0, trans=0) [ 112.529327] pkt3 dev name=mctptest0 feat=0x0000000000004000 [ 112.535620] pkt3 skb linear: 00000000: 01 08 0a 68 22 22 22 [ 112.542086] pkt4 skb len=7 headroom=21 headlen=7 tailroom=356 mac=(-1,-1) mac_len=0 net=(21,-1) trans=-1 shinfo(txflags=0 nr_frags=0 gso(size=0 type=0 segs=0)) csum(0x0 start=0 offset=0 ip_summed=0 complete_sw=0 valid=0 level=0) hash(0x0 sw=0 l4=0) proto=0x0000 pkttype=0 iif=0 priority=0x0 mark=0x0 alloc_cpu=0 vlan_all=0x0 encapsulation=0 inner(proto=0x0000, mac=0, net=0, trans=0) [ 112.588961] pkt4 dev name=mctptest0 feat=0x0000000000004000 [ 112.595254] pkt4 skb linear: 00000000: 01 08 0a 88 00 33 33 [ 112.601720] pkt5 skb len=7 headroom=28 headlen=7 tailroom=349 mac=(-1,-1) mac_len=0 net=(28,-1) trans=-1 shinfo(txflags=0 nr_frags=0 gso(size=0 type=0 segs=0)) csum(0x0 start=0 offset=0 ip_summed=0 complete_sw=0 valid=0 level=0) hash(0x0 sw=0 l4=0) proto=0x0000 pkttype=0 iif=0 priority=0x0 mark=0x0 alloc_cpu=0 vlan_all=0x0 encapsulation=0 inner(proto=0x0000, mac=0, net=0, trans=0) [ 112.648599] pkt5 dev name=mctptest0 feat=0x0000000000004000 [ 112.654893] pkt5 skb linear: 00000000: 01 08 0a 58 44 44 44 [ 112.672673] ok 13 mctp_test_route_input_cloned_frag [ 112.672692] # mctp: pass:13 fail:0 skip:0 total:13 [ 112.678656] # Totals: pass:40 fail:0 skip:0 total:40 [ 112.684175] ok 21 mctp [ 112.701319] Freeing unused decrypted memory: 2028K [ 112.709446] Freeing unused kernel image (initmem) memory: 8264K [ 112.716314] Write protecting the kernel read-only data: 69632k [ 112.723929] Freeing unused kernel image (text/rodata gap) memory: 532K [ 112.731471] Freeing unused kernel image (rodata/data gap) memory: 412K [ 112.784466] x86/mm: Checked W+X mappings: passed, no W+X pages found. [ 112.791625] x86/mm: Checking user space page tables [ 112.838887] x86/mm: Checked W+X mappings: passed, no W+X pages found. [ 112.846291] Run /init as init process [ 112.850683] with arguments: [ 112.854382] /init [ 112.857385] nokaslr [ 112.860592] with environment: [ 112.864465] HOME=/ [ 112.867556] TERM=linux [ 112.870994] RESULT_ROOT=/result/kunit/group-03/lkp-hsw-d03/debian-12-x86_64-20240206.cgz/x86_64-rhel-9.4-kunit/gcc-12/fe301d6b4b4aec003ff84aa4d2860e772b147225/1 [ 112.886387] BOOT_IMAGE=/pkg/linux/x86_64-rhel-9.4-kunit/gcc-12/fe301d6b4b4aec003ff84aa4d2860e772b147225/vmlinuz-6.15.0-rc7-00008-gfe301d6b4b4a [ 112.900215] branch=linux-devel/devel-hourly-20250527-080923 [ 112.906853] job=/lkp/jobs/scheduled/lkp-hsw-d03/kunit-group-03-debian-12-x86_64-20240206.cgz-fe301d6b4b4a-20250529-138988-1olf57i-0.yaml [ 112.920162] user=lkp [ 112.923427] ARCH=x86_64 [ 112.926950] kconfig=x86_64-rhel-9.4-kunit [ 112.932502] commit=fe301d6b4b4aec003ff84aa4d2860e772b147225 [ 112.939164] max_uptime=6000 [ 112.943036] LKP_SERVER=internal-lkp-server [ 112.948200] prompt_ramdisk=0 [ 112.952156] vga=normal [ 112.964542] systemd[1]: RTC configured in localtime, applying delta of 0 minutes to system time. [ 113.225222] device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. [ 113.242247] device-mapper: uevent: version 1.0.3 [ 113.242648] loop: module loaded [ 113.249519] device-mapper: ioctl: 4.49.0-ioctl (2025-01-17) initialised: dm-devel@lists.linux.dev [ 113.272877] fuse: init (API version 7.43) [ 113.316743] ACPI: bus type drm_connector registered [ 113.766428] input: PC Speaker as /devices/platform/pcspkr/input/input2 [ 113.779815] dcdbas dcdbas: Dell Systems Management Base Driver (version 5.6.0-3.4) [ 113.782805] libata version 3.00 loaded. [ 113.798579] RAPL PMU: API unit is 2^-32 Joules, 4 fixed counters, 655360 ms ovfl timer [ 113.807344] RAPL PMU: hw unit of domain pp0-core 2^-14 Joules [ 113.813819] RAPL PMU: hw unit of domain package 2^-14 Joules [ 113.820198] RAPL PMU: hw unit of domain dram 2^-14 Joules [ 113.826315] RAPL PMU: hw unit of domain pp1-gpu 2^-14 Joules [ 113.855954] Error: Driver 'pcspkr' is already registered, aborting... [ 113.856110] ahci 0000:00:1f.2: version 3.0 [ 113.871382] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:1 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000001 SID:F0F8 SQ:0 SVT:1) [ 113.886642] IOAPIC[0]: Preconfigured routing entry (8-19 -> IRQ 19 Level:1 ActiveLow:1) [ 113.897597] ahci 0000:00:1f.2: AHCI vers 0001.0300, 32 command slots, 6 Gbps, SATA mode [ 113.906664] ahci 0000:00:1f.2: 2/6 ports implemented (port mask 0x5) [ 113.914915] ahci 0000:00:1f.2: flags: 64bit ncq pm led clo pio slum part ems apst [ 113.934846] scsi host0: ahci [ 113.940391] scsi host1: ahci [ 113.945226] scsi host2: ahci [ 113.950927] scsi host3: ahci [ 113.957979] scsi host4: ahci [ 113.963534] scsi host5: ahci [ 113.968465] ata1: SATA max UDMA/133 abar m2048@0xf7d3a000 port 0xf7d3a100 irq 40 lpm-pol 0 [ 113.977468] ata2: DUMMY [ 113.980670] ata3: SATA max UDMA/133 abar m2048@0xf7d3a000 port 0xf7d3a200 irq 40 lpm-pol 0 [ 113.989673] ata4: DUMMY [ 113.989687] ata5: DUMMY [ 113.989689] ata6: DUMMY [ 114.298174] ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) [ 114.306321] ata3: SATA link up 6.0 Gbps (SStatus 133 SControl 300) [ 114.314547] ata1.00: Model 'INTEL SSDSC2BB480G6', rev 'G2010140', applying quirks: zeroaftertrim [ 114.330039] ata1.00: ATA-9: INTEL SSDSC2BB480G6, G2010140, max UDMA/133 [ 114.338716] ata1.00: 937703088 sectors, multi 1: LBA48 NCQ (depth 32) [ 114.347235] ata3.00: ATA-8: ST1000DM010-2EP102, CC46, max UDMA/133 [ 114.357555] ata1.00: configured for UDMA/133 [ 114.363466] scsi 0:0:0:0: Direct-Access ATA INTEL SSDSC2BB48 0140 PQ: 0 ANSI: 5 [ 114.375871] ata3.00: 1953525168 sectors, multi 0: LBA48 NCQ (depth 32), AA [ 114.386136] ata3.00: configured for UDMA/133 [ 114.391442] scsi 2:0:0:0: Direct-Access ATA ST1000DM010-2EP1 CC46 PQ: 0 ANSI: 5 [ 114.406197] dell_smbios: No dell-smbios drivers are loaded [ 114.421926] scsi 0:0:0:0: Attached scsi generic sg0 type 0 [ 114.427319] IOAPIC[8]: Set IRTE entry (P:1 FPD:0 Dst_Mode:1 Redir_hint:1 Trig_Mode:0 Dlvry_Mode:0 Avail:0 Vector:EF Dest:00000001 SID:F0F8 SQ:0 SVT:1) [ 114.429582] scsi 2:0:0:0: Attached scsi generic sg1 type 0 [ 114.442803] IOAPIC[0]: Preconfigured routing entry (8-22 -> IRQ 22 Level:1 ActiveLow:1) [ 114.476099] ata1.00: Enabling discard_zeroes_data [ 114.481624] sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) [ 114.481628] sd 2:0:0:0: [sdb] 1953525168 512-byte logical blocks: (1.00 TB/932 GiB) [ 114.481642] sd 2:0:0:0: [sdb] 4096-byte physical blocks [ 114.489783] sd 0:0:0:0: [sda] 4096-byte physical blocks [ 114.498155] sd 2:0:0:0: [sdb] Write Protect is off [ 114.504058] sd 0:0:0:0: [sda] Write Protect is off [ 114.511270] sd 2:0:0:0: [sdb] Mode Sense: 00 3a 00 00 [ 114.518104] sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 [ 114.525031] sd 2:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA [ 114.532094] sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA [ 114.539234] sd 2:0:0:0: [sdb] Preferred minimum I/O size 4096 bytes [ 114.550273] sd 0:0:0:0: [sda] Preferred minimum I/O size 4096 bytes [ 114.581872] ata1.00: Enabling discard_zeroes_data [ 114.597684] microcode: Unsafe microcode update: Microcode header does not specify a required min version [ 114.602174] sda: sda1 sda2 [ 114.607877] microcode: Late microcode loading without minimal revision check. [ 114.611968] sd 0:0:0:0: [sda] Attached SCSI disk [ 114.619179] microcode: You should switch to early loading, if possible. [ 114.633906] microcode: load: updated on 4 primary CPUs with 4 siblings [ 114.641439] microcode: revision: 0x16 -> 0x28 [ 114.647698] x86/CPU: CPU features have changed after loading microcode, but might not take effect. [ 114.658690] x86/CPU: Please consider either early loading through initrd/built-in or a potential BIOS update. [ 114.664319] sdb: sdb1 sdb2 sdb3 sdb4 [ 114.677793] sd 2:0:0:0: [sdb] Attached SCSI disk [ 115.513109] raid6: skipped pq benchmark and selected avx2x4 [ 115.517777] i915 0000:00:02.0: [drm] Found haswell (device ID 0412) integrated display version 7.00 stepping N/A [ 115.519373] raid6: using avx2x2 recovery algorithm [ 115.539148] snd_hda_codec_realtek hdaudioC0D0: autoconfig for ALC3220: line_outs=1 (0x1b/0x0/0x0/0x0/0x0) type:line [ 115.550617] snd_hda_codec_realtek hdaudioC0D0: speaker_outs=1 (0x14/0x0/0x0/0x0/0x0) [ 115.550639] snd_hda_codec_realtek hdaudioC0D0: hp_outs=1 (0x15/0x0/0x0/0x0/0x0) [ 115.559989] i915 0000:00:02.0: vgaarb: deactivate vga console [ 115.567586] snd_hda_codec_realtek hdaudioC0D0: mono: mono_out=0x0 [ 115.581465] snd_hda_codec_realtek hdaudioC0D0: inputs: [ 115.581496] snd_hda_codec_realtek hdaudioC0D0: Rear Mic=0x18 [ 115.581502] snd_hda_codec_realtek hdaudioC0D0: Front Mic=0x1a [ 115.581842] xor: automatically using best checksumming function avx [ 115.583045] Console: switching to colour dummy device 80x25 [ 115.608496] intel_rapl_common: Found RAPL domain package [ 115.630038] intel_rapl_common: Found RAPL domain core [ 115.635843] intel_rapl_common: Found RAPL domain uncore [ 115.642152] intel_rapl_common: Found RAPL domain dram [ 115.651552] intel_rapl_common: package-0:package:long_term locked by BIOS [ 115.662113] intel_rapl_common: package-0:package:short_term locked by BIOS [ 115.672807] input: HDA Intel PCH Rear Mic as /devices/pci0000:00/0000:00:1b.0/sound/card0/input3 [ 115.673998] i915 0000:00:02.0: vgaarb: VGA decodes changed: olddecodes=io+mem,decodes=io+mem:owns=io+mem [ 115.683588] input: HDA Intel PCH Front Mic as /devices/pci0000:00/0000:00:1b.0/sound/card0/input4 [ 115.717167] input: HDA Intel PCH Line Out as /devices/pci0000:00/0000:00:1b.0/sound/card0/input5 [ 115.727485] input: HDA Intel PCH Front Headphone as /devices/pci0000:00/0000:00:1b.0/sound/card0/input6 [ 115.742809] [drm] Initialized i915 1.6.0 for 0000:00:02.0 on minor 0 [ 115.794775] ACPI: video: Video Device [GFX0] (multi-head: yes rom: no post: no) [ 115.808523] input: Video Bus as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A08:00/LNXVIDEO:00/input/input7 [ 115.844322] i915 0000:00:02.0: [drm] Cannot find any crtc or sizes [ 115.885285] snd_hda_intel 0000:00:03.0: bound 0000:00:02.0 (ops intel_audio_component_bind_ops [i915]) [ 115.898674] i915 0000:00:02.0: [drm] Cannot find any crtc or sizes [ 115.914829] Btrfs loaded, zoned=yes, fsverity=yes [ 115.920479] i915 0000:00:02.0: [drm] Cannot find any crtc or sizes [ 115.920595] BTRFS: selftest: sectorsize: 4096 nodesize: 4096 [ 115.923972] input: HDA Intel HDMI HDMI/DP,pcm=3 as /devices/pci0000:00/0000:00:03.0/sound/card1/input8 [ 115.926325] input: HDA Intel HDMI HDMI/DP,pcm=7 as /devices/pci0000:00/0000:00:03.0/sound/card1/input9 [ 115.927036] input: HDA Intel HDMI HDMI/DP,pcm=8 as /devices/pci0000:00/0000:00:03.0/sound/card1/input10 [ 115.969844] BTRFS: selftest: running btrfs free space cache tests [ 115.976696] BTRFS: selftest: running extent only tests [ 115.982607] BTRFS: selftest: running bitmap only tests [ 115.988544] BTRFS: selftest: running bitmap and extent tests [ 115.995093] BTRFS: selftest: running space stealing from bitmap to extent tests [ 116.004604] BTRFS: selftest: running bytes index tests [ 116.011737] BTRFS: selftest: running extent buffer operation tests [ 116.019697] BTRFS: selftest: running btrfs_split_item tests [ 116.027443] BTRFS: selftest: running extent I/O tests [ 116.033487] BTRFS: selftest: running find delalloc tests [ 116.166398] BTRFS: selftest: running find_first_clear_extent_bit test [ 116.173977] BTRFS: selftest: running extent buffer bitmap tests [ 116.181983] IPMI message handler: version 39.2 [ 116.190629] ipmi device interface [ 116.217828] BTRFS: selftest: running extent buffer memory operation tests [ 116.225413] BTRFS: selftest: running inode tests [ 116.230778] BTRFS: selftest: running btrfs_get_extent tests [ 116.237603] BTRFS: selftest: running hole first btrfs_get_extent test [ 116.245043] BTRFS: selftest: running outstanding_extents tests [ 116.246226] ipmi_si: IPMI System Interface driver [ 116.251874] BTRFS: selftest: running qgroup tests [ 116.257590] ipmi_si: Unable to find any System Interface(s) [ 116.262352] BTRFS: selftest: running qgroup add/remove tests [ 116.262669] BTRFS: selftest: running qgroup multiple refs test [ 116.282102] BTRFS: selftest: running free space tree tests [ 116.322997] BTRFS: selftest: running raid-stripe-tree tests [ 116.330679] BTRFS: selftest: running delayed refs tests [ 116.337064] BTRFS: selftest: running delayed refs merg tests on metadata refs [ 116.348317] BTRFS: selftest: running delayed refs merg tests on data refs [ 116.358575] BTRFS: selftest: sectorsize: 4096 nodesize: 8192 [ 116.365493] BTRFS: selftest: running btrfs free space cache tests [ 116.373729] BTRFS: selftest: running extent only tests [ 116.379670] BTRFS: selftest: running bitmap only tests [ 116.385696] BTRFS: selftest: running bitmap and extent tests [ 116.392311] BTRFS: selftest: running space stealing from bitmap to extent tests [ 116.401922] BTRFS: selftest: running bytes index tests [ 116.409076] BTRFS: selftest: running extent buffer operation tests [ 116.416965] BTRFS: selftest: running btrfs_split_item tests [ 116.424060] BTRFS: selftest: running extent I/O tests [ 116.429892] BTRFS: selftest: running find delalloc tests [ 116.557071] BTRFS: selftest: running find_first_clear_extent_bit test [ 116.567880] BTRFS: selftest: running extent buffer bitmap tests [ 116.662569] BTRFS: selftest: running extent buffer memory operation tests [ 116.670179] BTRFS: selftest: running inode tests [ 116.675517] BTRFS: selftest: running btrfs_get_extent tests [ 116.682205] BTRFS: selftest: running hole first btrfs_get_extent test [ 116.689509] BTRFS: selftest: running outstanding_extents tests [ 116.696358] BTRFS: selftest: running qgroup tests [ 116.701772] BTRFS: selftest: running qgroup add/remove tests [ 116.708436] BTRFS: selftest: running qgroup multiple refs test [ 116.715503] BTRFS: selftest: running free space tree tests [ 116.752961] BTRFS: selftest: running raid-stripe-tree tests [ 116.760669] BTRFS: selftest: running delayed refs tests [ 116.766954] BTRFS: selftest: running delayed refs merg tests on metadata refs [ 116.777065] BTRFS: selftest: running delayed refs merg tests on data refs [ 116.786789] BTRFS: selftest: sectorsize: 4096 nodesize: 16384 [ 116.793441] BTRFS: selftest: running btrfs free space cache tests [ 116.800299] BTRFS: selftest: running extent only tests [ 116.806218] BTRFS: selftest: running bitmap only tests [ 116.812167] BTRFS: selftest: running bitmap and extent tests [ 116.818697] BTRFS: selftest: running space stealing from bitmap to extent tests [ 116.827067] BTRFS: selftest: running bytes index tests [ 116.833219] BTRFS: selftest: running extent buffer operation tests [ 116.840094] BTRFS: selftest: running btrfs_split_item tests [ 116.846508] BTRFS: selftest: running extent I/O tests [ 116.852264] BTRFS: selftest: running find delalloc tests [ 116.980879] BTRFS: selftest: running find_first_clear_extent_bit test [ 116.988107] BTRFS: selftest: running extent buffer bitmap tests [ 117.175253] BTRFS: selftest: running extent buffer memory operation tests [ 117.182995] BTRFS: selftest: running inode tests [ 117.188340] BTRFS: selftest: running btrfs_get_extent tests [ 117.195139] BTRFS: selftest: running hole first btrfs_get_extent test [ 117.202495] BTRFS: selftest: running outstanding_extents tests [ 117.209360] BTRFS: selftest: running qgroup tests [ 117.214778] BTRFS: selftest: running qgroup add/remove tests [ 117.221444] BTRFS: selftest: running qgroup multiple refs test [ 117.228526] BTRFS: selftest: running free space tree tests [ 117.266039] BTRFS: selftest: running raid-stripe-tree tests [ 117.273742] BTRFS: selftest: running delayed refs tests [ 117.279965] BTRFS: selftest: running delayed refs merg tests on metadata refs [ 117.289919] BTRFS: selftest: running delayed refs merg tests on data refs [ 117.299761] BTRFS: selftest: sectorsize: 4096 nodesize: 32768 [ 117.306300] BTRFS: selftest: running btrfs free space cache tests [ 117.313150] BTRFS: selftest: running extent only tests [ 117.319066] BTRFS: selftest: running bitmap only tests [ 117.325078] BTRFS: selftest: running bitmap and extent tests [ 117.331626] BTRFS: selftest: running space stealing from bitmap to extent tests [ 117.339978] BTRFS: selftest: running bytes index tests [ 117.346135] BTRFS: selftest: running extent buffer operation tests [ 117.353010] BTRFS: selftest: running btrfs_split_item tests [ 117.359431] BTRFS: selftest: running extent I/O tests [ 117.365190] BTRFS: selftest: running find delalloc tests [ 117.493269] BTRFS: selftest: running find_first_clear_extent_bit test [ 117.501046] BTRFS: selftest: running extent buffer bitmap tests [ 117.860575] BTRFS: selftest: running extent buffer memory operation tests [ 117.868422] BTRFS: selftest: running inode tests [ 117.873763] BTRFS: selftest: running btrfs_get_extent tests [ 117.880540] BTRFS: selftest: running hole first btrfs_get_extent test [ 117.887876] BTRFS: selftest: running outstanding_extents tests [ 117.894737] BTRFS: selftest: running qgroup tests [ 117.900155] BTRFS: selftest: running qgroup add/remove tests [ 117.906833] BTRFS: selftest: running qgroup multiple refs test [ 117.913949] BTRFS: selftest: running free space tree tests [ 117.951896] BTRFS: selftest: running raid-stripe-tree tests [ 117.959899] BTRFS: selftest: running delayed refs tests [ 117.966164] BTRFS: selftest: running delayed refs merg tests on metadata refs [ 117.976144] BTRFS: selftest: running delayed refs merg tests on data refs [ 117.985933] BTRFS: selftest: sectorsize: 4096 nodesize: 65536 [ 117.992665] BTRFS: selftest: running btrfs free space cache tests [ 117.999519] BTRFS: selftest: running extent only tests [ 118.005434] BTRFS: selftest: running bitmap only tests [ 118.011360] BTRFS: selftest: running bitmap and extent tests [ 118.017898] BTRFS: selftest: running space stealing from bitmap to extent tests [ 118.026278] BTRFS: selftest: running bytes index tests [ 118.032454] BTRFS: selftest: running extent buffer operation tests [ 118.039332] BTRFS: selftest: running btrfs_split_item tests [ 118.045759] BTRFS: selftest: running extent I/O tests [ 118.051517] BTRFS: selftest: running find delalloc tests [ 118.182555] BTRFS: selftest: running find_first_clear_extent_bit test [ 118.190338] BTRFS: selftest: running extent buffer bitmap tests [ 118.904497] BTRFS: selftest: running extent buffer memory operation tests [ 118.912598] BTRFS: selftest: running inode tests [ 118.917952] BTRFS: selftest: running btrfs_get_extent tests [ 118.924979] BTRFS: selftest: running hole first btrfs_get_extent test [ 118.932293] BTRFS: selftest: running outstanding_extents tests [ 118.939069] BTRFS: selftest: running qgroup tests [ 118.944468] BTRFS: selftest: running qgroup add/remove tests [ 118.951073] BTRFS: selftest: running qgroup multiple refs test [ 118.958103] BTRFS: selftest: running free space tree tests [ 118.994236] BTRFS: selftest: running raid-stripe-tree tests [ 119.001714] BTRFS: selftest: running delayed refs tests [ 119.007891] BTRFS: selftest: running delayed refs merg tests on metadata refs [ 119.017646] BTRFS: selftest: running delayed refs merg tests on data refs [ 119.027120] BTRFS: selftest: running extent_map tests [ 119.033161] BTRFS: selftest: Running btrfs_drop_extent_map_range tests [ 119.040546] BTRFS: selftest: Running btrfs_drop_extent_cache with pinned [ 119.048006] BTRFS: selftest: running rmap tests [ 120.670375] BTRFS: device fsid 1c1cf7ac-caa5-46aa-890e-ce2c463807e8 devid 1 transid 3050 /dev/sda2 (8:2) scanned by mount (3514) [ 120.684352] BTRFS info (device sda2): first mount of filesystem 1c1cf7ac-caa5-46aa-890e-ce2c463807e8 [ 120.694307] BTRFS info (device sda2): using crc32c (crc32c-x86_64) checksum algorithm [ 120.702868] BTRFS info (device sda2): using free-space-tree [ 120.714939] BTRFS info (device sda2): bdev /dev/sda2 errs: wr 6062, rd 478, flush 0, corrupt 0, gen 0 [ 121.770590] x86/PAT: bmc-watchdog:3605 map pfn expected mapping type uncached-minus for [mem 0xd8fee000-0xd8feefff], got write-back [ 121.783309] x86/PAT: bmc-watchdog:3605 map pfn expected mapping type uncached-minus for [mem 0xd8fee000-0xd8feefff], got write-back [ 121.815529] x86/PAT: bmc-watchdog:3605 map pfn expected mapping type uncached-minus for [mem 0xd8fee000-0xd8feefff], got write-back [ 121.828264] x86/PAT: bmc-watchdog:3605 map pfn expected mapping type uncached-minus for [mem 0xd8fee000-0xd8feefff], got write-back [ 121.859894] x86/PAT: bmc-watchdog:3605 map pfn expected mapping type uncached-minus for [mem 0xd8fee000-0xd8feefff], got write-back [ 121.872589] x86/PAT: bmc-watchdog:3605 map pfn expected mapping type uncached-minus for [mem 0xd8fee000-0xd8feefff], got write-back [ 121.904204] x86/PAT: bmc-watchdog:3605 map pfn expected mapping type uncached-minus for [mem 0xd8fee000-0xd8feefff], got write-back [ 121.916892] x86/PAT: bmc-watchdog:3605 map pfn expected mapping type uncached-minus for [mem 0xd8fee000-0xd8feefff], got write-back [ 121.948542] x86/PAT: bmc-watchdog:3605 map pfn expected mapping type uncached-minus for [mem 0xd8fee000-0xd8feefff], got write-back [ 121.961234] x86/PAT: bmc-watchdog:3605 map pfn expected mapping type uncached-minus for [mem 0xd8fee000-0xd8feefff], got write-back [ 121.993237] x86/PAT: bmc-watchdog:3605 map pfn expected mapping type uncached-minus for [mem 0xd8fee000-0xd8feefff], got write-back [ 122.005936] x86/PAT: bmc-watchdog:3605 map pfn expected mapping type uncached-minus for [mem 0xd8fee000-0xd8feefff], got write-back [ 122.037542] x86/PAT: bmc-watchdog:3605 map pfn expected mapping type uncached-minus for [mem 0xd8fee000-0xd8feefff], got write-back [ 122.050231] x86/PAT: bmc-watchdog:3605 map pfn expected mapping type uncached-minus for [mem 0xd8fee000-0xd8feefff], got write-back [ 122.081896] x86/PAT: bmc-watchdog:3605 map pfn expected mapping type uncached-minus for [mem 0xd8fee000-0xd8feefff], got write-back [ 122.094618] x86/PAT: bmc-watchdog:3605 map pfn expected mapping type uncached-minus for [mem 0xd8fee000-0xd8feefff], got write-back [ 122.126235] x86/PAT: bmc-watchdog:3605 map pfn expected mapping type uncached-minus for [mem 0xd8fee000-0xd8feefff], got write-back [ 122.138947] x86/PAT: bmc-watchdog:3605 map pfn expected mapping type uncached-minus for [mem 0xd8fee000-0xd8feefff], got write-back [ 122.170598] x86/PAT: bmc-watchdog:3605 map pfn expected mapping type uncached-minus for [mem 0xd8fee000-0xd8feefff], got write-back [ 122.183340] x86/PAT: bmc-watchdog:3605 map pfn expected mapping type uncached-minus for [mem 0xd8fee000-0xd8feefff], got write-back [ 122.215307] x86/PAT: bmc-watchdog:3605 map pfn expected mapping type uncached-minus for [mem 0xd8fee000-0xd8feefff], got write-back [ 122.228005] x86/PAT: bmc-watchdog:3605 map pfn expected mapping type uncached-minus for [mem 0xd8fee000-0xd8feefff], got write-back [ 122.259619] x86/PAT: bmc-watchdog:3605 map pfn expected mapping type uncached-minus for [mem 0xd8fee000-0xd8feefff], got write-back [ 122.272303] x86/PAT: bmc-watchdog:3605 map pfn expected mapping type uncached-minus for [mem 0xd8fee000-0xd8feefff], got write-back [ 122.303907] x86/PAT: bmc-watchdog:3605 map pfn expected mapping type uncached-minus for [mem 0xd8fee000-0xd8feefff], got write-back [ 122.316606] x86/PAT: bmc-watchdog:3605 map pfn expected mapping type uncached-minus for [mem 0xd8fee000-0xd8feefff], got write-back [ 122.348226] x86/PAT: bmc-watchdog:3605 map pfn expected mapping type uncached-minus for [mem 0xd8fee000-0xd8feefff], got write-back [ 122.360901] x86/PAT: bmc-watchdog:3605 map pfn expected mapping type uncached-minus for [mem 0xd8fee000-0xd8feefff], got write-back [ 122.392499] x86/PAT: bmc-watchdog:3605 map pfn expected mapping type uncached-minus for [mem 0xd8fee000-0xd8feefff], got write-back [ 122.405207] x86/PAT: bmc-watchdog:3605 map pfn expected mapping type uncached-minus for [mem 0xd8fee000-0xd8feefff], got write-back [ 122.828984] KTAP version 1 [ 122.832812] 1..1 [ 122.836139] # drm_buddy: Testing DRM buddy manager, with random_seed=0x140cf29b [ 122.845860] KTAP version 1 [ 122.849616] # Subtest: drm_buddy [ 122.853882] # module: drm_buddy_test [ 122.853896] 1..7 [ 122.861902] ok 1 drm_test_buddy_alloc_limit [ 122.862191] ok 2 drm_test_buddy_alloc_optimistic [ 122.867840] ok 3 drm_test_buddy_alloc_pessimistic [ 122.873861] ok 4 drm_test_buddy_alloc_pathological [ 122.880346] ok 5 drm_test_buddy_alloc_contiguous [ 122.939813] ok 6 drm_test_buddy_alloc_clear [ 122.945653] # drm_test_buddy_alloc_range_bias: mm_size=7340032, ps=1048576 [ 122.959525] ok 7 drm_test_buddy_alloc_range_bias [ 122.959552] # drm_buddy: pass:7 fail:0 skip:0 total:7 [ 122.965226] # Totals: pass:7 fail:0 skip:0 total:7 [ 122.970977] ok 1 drm_buddy [ 123.054549] KTAP version 1 [ 123.058489] 1..1 [ 123.062146] KTAP version 1 [ 123.066421] # Subtest: kasan [ 123.070389] # module: kasan_test [ 123.070770] 1..75 [ 123.078222] ================================================================== [ 123.086117] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x631/0x6d0 [kasan_test] [ 123.094879] Write of size 1 at addr ffff888415f0f573 by task kunit_try_catch/3687 [ 123.105209] CPU: 4 UID: 0 PID: 3687 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 123.105217] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 123.105219] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 123.105221] Call Trace: [ 123.105224] [ 123.105227] dump_stack_lvl+0x4f/0x70 [ 123.105235] print_address_description.constprop.0+0x2c/0x3b0 [ 123.105244] ? kmalloc_oob_right+0x631/0x6d0 [kasan_test] [ 123.105261] print_report+0xb9/0x280 [ 123.105266] ? kmalloc_oob_right+0x631/0x6d0 [kasan_test] [ 123.105276] ? kasan_addr_to_slab+0x9/0x90 [ 123.105280] ? kmalloc_oob_right+0x631/0x6d0 [kasan_test] [ 123.105289] kasan_report+0xda/0x110 [ 123.105294] ? kmalloc_oob_right+0x631/0x6d0 [kasan_test] [ 123.105303] kmalloc_oob_right+0x631/0x6d0 [kasan_test] [ 123.105314] ? __pfx_kmalloc_oob_right+0x10/0x10 [kasan_test] [ 123.105324] ? __schedule+0x757/0x1420 [ 123.105327] ? __pfx_read_tsc+0x10/0x10 [ 123.105331] ? ktime_get_ts64+0x7f/0x220 [ 123.105335] kunit_try_run_case+0x175/0x440 [ 123.105340] ? __pfx_kunit_try_run_case+0x10/0x10 [ 123.105343] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 123.105347] ? __pfx_kunit_try_run_case+0x10/0x10 [ 123.105350] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 123.105354] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 123.105358] kthread+0x3b4/0x780 [ 123.105363] ? __pfx_kthread+0x10/0x10 [ 123.105367] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 123.105371] ? __pfx_kthread+0x10/0x10 [ 123.105374] ret_from_fork+0x30/0x70 [ 123.105378] ? __pfx_kthread+0x10/0x10 [ 123.105382] ret_from_fork_asm+0x1a/0x30 [ 123.105387] [ 123.283825] Allocated by task 3687: [ 123.287992] kasan_save_stack+0x1c/0x40 [ 123.292506] kasan_save_track+0x10/0x30 [ 123.297022] __kasan_kmalloc+0xa6/0xb0 [ 123.301451] kmalloc_oob_right+0x99/0x6d0 [kasan_test] [ 123.307265] kunit_try_run_case+0x175/0x440 [ 123.312124] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 123.318194] kthread+0x3b4/0x780 [ 123.322103] ret_from_fork+0x30/0x70 [ 123.326356] ret_from_fork_asm+0x1a/0x30 [ 123.333132] The buggy address belongs to the object at ffff888415f0f500 which belongs to the cache kmalloc-128 of size 128 [ 123.346974] The buggy address is located 0 bytes to the right of allocated 115-byte region [ffff888415f0f500, ffff888415f0f573) [ 123.363431] The buggy address belongs to the physical page: [ 123.369669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415f0e [ 123.378329] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 123.386644] anon flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 123.394700] page_type: f5(slab) [ 123.398524] raw: 0017ffffc0000040 ffff888100042a00 0000000000000000 dead000000000001 [ 123.406926] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 123.415326] head: 0017ffffc0000040 ffff888100042a00 0000000000000000 dead000000000001 [ 123.423813] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 123.432299] head: 0017ffffc0000001 ffffea001057c381 00000000ffffffff 00000000ffffffff [ 123.440785] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 123.449269] page dumped because: kasan: bad access detected [ 123.457686] Memory state around the buggy address: [ 123.463148] ffff888415f0f400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 123.471034] ffff888415f0f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 123.478915] >ffff888415f0f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 123.486796] ^ [ 123.494330] ffff888415f0f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 123.502212] ffff888415f0f600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 123.510091] ================================================================== [ 123.518005] ================================================================== [ 123.525886] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x61a/0x6d0 [kasan_test] [ 123.534638] Write of size 1 at addr ffff888415f0f578 by task kunit_try_catch/3687 [ 123.544953] CPU: 4 UID: 0 PID: 3687 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 123.544960] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 123.544962] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 123.544964] Call Trace: [ 123.544967] [ 123.544969] dump_stack_lvl+0x4f/0x70 [ 123.544976] print_address_description.constprop.0+0x2c/0x3b0 [ 123.544984] ? kmalloc_oob_right+0x61a/0x6d0 [kasan_test] [ 123.544994] print_report+0xb9/0x280 [ 123.544999] ? kmalloc_oob_right+0x61a/0x6d0 [kasan_test] [ 123.545008] ? kasan_addr_to_slab+0x9/0x90 [ 123.545012] ? kmalloc_oob_right+0x61a/0x6d0 [kasan_test] [ 123.545024] kasan_report+0xda/0x110 [ 123.545031] ? kmalloc_oob_right+0x61a/0x6d0 [kasan_test] [ 123.545045] kmalloc_oob_right+0x61a/0x6d0 [kasan_test] [ 123.545054] ? __pfx_kmalloc_oob_right+0x10/0x10 [kasan_test] [ 123.545063] ? __schedule+0x757/0x1420 [ 123.545067] ? __pfx_read_tsc+0x10/0x10 [ 123.545071] ? ktime_get_ts64+0x7f/0x220 [ 123.545075] kunit_try_run_case+0x175/0x440 [ 123.545079] ? __pfx_kunit_try_run_case+0x10/0x10 [ 123.545082] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 123.545086] ? __pfx_kunit_try_run_case+0x10/0x10 [ 123.545089] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 123.545093] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 123.545096] kthread+0x3b4/0x780 [ 123.545101] ? __pfx_kthread+0x10/0x10 [ 123.545104] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 123.545108] ? __pfx_kthread+0x10/0x10 [ 123.545112] ret_from_fork+0x30/0x70 [ 123.545116] ? __pfx_kthread+0x10/0x10 [ 123.545119] ret_from_fork_asm+0x1a/0x30 [ 123.545125] [ 123.723486] Allocated by task 3687: [ 123.727650] kasan_save_stack+0x1c/0x40 [ 123.732164] kasan_save_track+0x10/0x30 [ 123.736673] __kasan_kmalloc+0xa6/0xb0 [ 123.741097] kmalloc_oob_right+0x99/0x6d0 [kasan_test] [ 123.746910] kunit_try_run_case+0x175/0x440 [ 123.751766] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 123.757832] kthread+0x3b4/0x780 [ 123.761739] ret_from_fork+0x30/0x70 [ 123.765992] ret_from_fork_asm+0x1a/0x30 [ 123.772766] The buggy address belongs to the object at ffff888415f0f500 which belongs to the cache kmalloc-128 of size 128 [ 123.786610] The buggy address is located 5 bytes to the right of allocated 115-byte region [ffff888415f0f500, ffff888415f0f573) [ 123.803065] The buggy address belongs to the physical page: [ 123.809303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415f0e [ 123.817960] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 123.826274] anon flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 123.834328] page_type: f5(slab) [ 123.838150] raw: 0017ffffc0000040 ffff888100042a00 0000000000000000 dead000000000001 [ 123.846547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 123.854945] head: 0017ffffc0000040 ffff888100042a00 0000000000000000 dead000000000001 [ 123.863429] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 123.871915] head: 0017ffffc0000001 ffffea001057c381 00000000ffffffff 00000000ffffffff [ 123.880400] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 123.888884] page dumped because: kasan: bad access detected [ 123.897299] Memory state around the buggy address: [ 123.902760] ffff888415f0f400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 123.910641] ffff888415f0f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 123.918521] >ffff888415f0f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 123.926400] ^ [ 123.934195] ffff888415f0f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 123.942075] ffff888415f0f600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 123.949955] ================================================================== [ 123.957873] ================================================================== [ 123.965759] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x603/0x6d0 [kasan_test] [ 123.974521] Read of size 1 at addr ffff888415f0f580 by task kunit_try_catch/3687 [ 123.984761] CPU: 4 UID: 0 PID: 3687 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 123.984771] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 123.984774] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 123.984777] Call Trace: [ 123.984780] [ 123.984784] dump_stack_lvl+0x4f/0x70 [ 123.984792] print_address_description.constprop.0+0x2c/0x3b0 [ 123.984800] ? kmalloc_oob_right+0x603/0x6d0 [kasan_test] [ 123.984815] print_report+0xb9/0x280 [ 123.984820] ? kmalloc_oob_right+0x603/0x6d0 [kasan_test] [ 123.984833] ? kasan_addr_to_slab+0x9/0x90 [ 123.984838] ? kmalloc_oob_right+0x603/0x6d0 [kasan_test] [ 123.984852] kasan_report+0xda/0x110 [ 123.984857] ? kmalloc_oob_right+0x603/0x6d0 [kasan_test] [ 123.984872] kmalloc_oob_right+0x603/0x6d0 [kasan_test] [ 123.984887] ? __pfx_kmalloc_oob_right+0x10/0x10 [kasan_test] [ 123.984901] ? __schedule+0x757/0x1420 [ 123.984906] ? __pfx_read_tsc+0x10/0x10 [ 123.984911] ? ktime_get_ts64+0x7f/0x220 [ 123.984917] kunit_try_run_case+0x175/0x440 [ 123.984922] ? __pfx_kunit_try_run_case+0x10/0x10 [ 123.984927] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 123.984933] ? __pfx_kunit_try_run_case+0x10/0x10 [ 123.984937] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 123.984943] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 123.984948] kthread+0x3b4/0x780 [ 123.984954] ? __pfx_kthread+0x10/0x10 [ 123.984958] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 123.984964] ? __pfx_kthread+0x10/0x10 [ 123.984969] ret_from_fork+0x30/0x70 [ 123.984974] ? __pfx_kthread+0x10/0x10 [ 123.984978] ret_from_fork_asm+0x1a/0x30 [ 123.984987] [ 124.163465] Allocated by task 3687: [ 124.167638] kasan_save_stack+0x1c/0x40 [ 124.172156] kasan_save_track+0x10/0x30 [ 124.176671] __kasan_kmalloc+0xa6/0xb0 [ 124.181098] kmalloc_oob_right+0x99/0x6d0 [kasan_test] [ 124.186923] kunit_try_run_case+0x175/0x440 [ 124.191786] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 124.197857] kthread+0x3b4/0x780 [ 124.201769] ret_from_fork+0x30/0x70 [ 124.206025] ret_from_fork_asm+0x1a/0x30 [ 124.212808] The buggy address belongs to the object at ffff888415f0f500 which belongs to the cache kmalloc-128 of size 128 [ 124.226662] The buggy address is located 13 bytes to the right of allocated 115-byte region [ffff888415f0f500, ffff888415f0f573) [ 124.243229] The buggy address belongs to the physical page: [ 124.249471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415f0e [ 124.258138] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 124.266456] anon flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 124.274520] page_type: f5(slab) [ 124.278347] raw: 0017ffffc0000040 ffff888100042a00 0000000000000000 dead000000000001 [ 124.286751] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 124.295157] head: 0017ffffc0000040 ffff888100042a00 0000000000000000 dead000000000001 [ 124.303652] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 124.312146] head: 0017ffffc0000001 ffffea001057c381 00000000ffffffff 00000000ffffffff [ 124.320638] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 124.329129] page dumped because: kasan: bad access detected [ 124.337550] Memory state around the buggy address: [ 124.343014] ffff888415f0f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 124.350911] ffff888415f0f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 124.358797] >ffff888415f0f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 124.366681] ^ [ 124.370593] ffff888415f0f600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 124.378477] ffff888415f0f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 124.386364] ================================================================== [ 124.394533] ok 1 kmalloc_oob_right [ 124.394792] ================================================================== [ 124.407104] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x30f/0x360 [kasan_test] [ 124.415780] Read of size 1 at addr ffff8881033a6e9f by task kunit_try_catch/3689 [ 124.426026] CPU: 4 UID: 0 PID: 3689 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 124.426037] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 124.426039] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 124.426042] Call Trace: [ 124.426045] [ 124.426048] dump_stack_lvl+0x4f/0x70 [ 124.426056] print_address_description.constprop.0+0x2c/0x3b0 [ 124.426065] ? kmalloc_oob_left+0x30f/0x360 [kasan_test] [ 124.426080] print_report+0xb9/0x280 [ 124.426086] ? kmalloc_oob_left+0x30f/0x360 [kasan_test] [ 124.426099] ? kasan_addr_to_slab+0x9/0x90 [ 124.426104] ? kmalloc_oob_left+0x30f/0x360 [kasan_test] [ 124.426117] kasan_report+0xda/0x110 [ 124.426122] ? kmalloc_oob_left+0x30f/0x360 [kasan_test] [ 124.426137] kmalloc_oob_left+0x30f/0x360 [kasan_test] [ 124.426152] ? __pfx_kmalloc_oob_left+0x10/0x10 [kasan_test] [ 124.426166] ? __schedule+0x757/0x1420 [ 124.426170] ? __pfx_read_tsc+0x10/0x10 [ 124.426175] ? ktime_get_ts64+0x7f/0x220 [ 124.426181] kunit_try_run_case+0x175/0x440 [ 124.426187] ? __pfx_kunit_try_run_case+0x10/0x10 [ 124.426191] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 124.426198] ? __pfx_kunit_try_run_case+0x10/0x10 [ 124.426201] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 124.426207] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 124.426212] kthread+0x3b4/0x780 [ 124.426218] ? __pfx_kthread+0x10/0x10 [ 124.426222] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 124.426228] ? __pfx_kthread+0x10/0x10 [ 124.426233] ret_from_fork+0x30/0x70 [ 124.426237] ? __pfx_kthread+0x10/0x10 [ 124.426242] ret_from_fork_asm+0x1a/0x30 [ 124.426250] [ 124.520406] is_virt=false [ 124.524513] Allocated by task 3242: [ 124.524517] kasan_save_stack+0x1c/0x40 [ 124.533630] kasan_save_track+0x10/0x30 [ 124.533634] __kasan_kmalloc+0xa6/0xb0 [ 124.533648] proc_self_get_link+0x18c/0x210 [ 124.632192] pick_link+0x844/0x1020 [ 124.636366] step_into+0x615/0x1050 [ 124.640533] link_path_walk.part.0.constprop.0+0x413/0x960 [ 124.646689] path_lookupat+0x72/0x670 [ 124.651032] filename_lookup+0x1ca/0x560 [ 124.655648] user_path_at+0x33/0x50 [ 124.659819] do_utimes+0xe4/0x180 [ 124.663818] __x64_sys_utimensat+0x149/0x1f0 [ 124.668764] do_syscall_64+0x79/0x160 [ 124.673109] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 124.681008] Freed by task 3242: [ 124.684828] kasan_save_stack+0x1c/0x40 [ 124.689346] kasan_save_track+0x10/0x30 [ 124.693861] kasan_save_free_info+0x37/0x60 [ 124.698721] __kasan_slab_free+0x4d/0x70 [ 124.703322] kfree+0x23f/0x440 [ 124.707068] walk_component+0x147/0x500 [ 124.711591] link_path_walk.part.0.constprop.0+0x34a/0x960 [ 124.717747] path_lookupat+0x72/0x670 [ 124.722096] filename_lookup+0x1ca/0x560 [ 124.726695] user_path_at+0x33/0x50 [ 124.730864] do_utimes+0xe4/0x180 [ 124.734863] __x64_sys_utimensat+0x149/0x1f0 [ 124.739810] do_syscall_64+0x79/0x160 [ 124.744153] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 124.752066] The buggy address belongs to the object at ffff8881033a6e80 which belongs to the cache kmalloc-16 of size 16 [ 124.765751] The buggy address is located 15 bytes to the right of allocated 16-byte region [ffff8881033a6e80, ffff8881033a6e90) [ 124.782237] The buggy address belongs to the physical page: [ 124.788477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033a6 [ 124.797144] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 124.804772] page_type: f5(slab) [ 124.808596] raw: 0017ffffc0000000 ffff888100042640 0000000000000000 dead000000000001 [ 124.817000] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 124.825401] page dumped because: kasan: bad access detected [ 124.833819] Memory state around the buggy address: [ 124.839283] ffff8881033a6d80: 00 03 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 124.847169] ffff8881033a6e00: fa fb fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc [ 124.855065] >ffff8881033a6e80: fa fb fc fc 00 07 fc fc fa fb fc fc fa fb fc fc [ 124.862948] ^ [ 124.867637] ffff8881033a6f00: 00 04 fc fc fa fb fc fc fa fb fc fc 00 03 fc fc [ 124.875520] ffff8881033a6f80: fa fb fc fc fa fb fc fc 00 03 fc fc fa fb fc fc [ 124.883402] ================================================================== [ 124.891508] ok 2 kmalloc_oob_left [ 124.891657] ================================================================== [ 124.903880] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x317/0x360 [kasan_test] [ 124.913083] Read of size 1 at addr ffff8884136e1000 by task kunit_try_catch/3693 [ 124.923312] CPU: 5 UID: 0 PID: 3693 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 124.923318] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 124.923320] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 124.923322] Call Trace: [ 124.923324] [ 124.923326] dump_stack_lvl+0x4f/0x70 [ 124.923332] print_address_description.constprop.0+0x2c/0x3b0 [ 124.923339] ? kmalloc_node_oob_right+0x317/0x360 [kasan_test] [ 124.923349] print_report+0xb9/0x280 [ 124.923353] ? kmalloc_node_oob_right+0x317/0x360 [kasan_test] [ 124.923361] ? kasan_addr_to_slab+0x9/0x90 [ 124.923364] ? kmalloc_node_oob_right+0x317/0x360 [kasan_test] [ 124.923372] kasan_report+0xda/0x110 [ 124.923376] ? kmalloc_node_oob_right+0x317/0x360 [kasan_test] [ 124.923385] kmalloc_node_oob_right+0x317/0x360 [kasan_test] [ 124.923394] ? __pfx_kmalloc_node_oob_right+0x10/0x10 [kasan_test] [ 124.923403] ? __schedule+0x757/0x1420 [ 124.923406] ? __pfx_read_tsc+0x10/0x10 [ 124.923410] ? ktime_get_ts64+0x7f/0x220 [ 124.923414] kunit_try_run_case+0x175/0x440 [ 124.923418] ? __pfx_kunit_try_run_case+0x10/0x10 [ 124.923420] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 124.923425] ? __pfx_kunit_try_run_case+0x10/0x10 [ 124.923427] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 124.923430] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 124.923434] kthread+0x3b4/0x780 [ 124.923438] ? __pfx_kthread+0x10/0x10 [ 124.923441] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 124.923445] ? __pfx_kthread+0x10/0x10 [ 124.923448] ret_from_fork+0x30/0x70 [ 124.923452] ? __pfx_kthread+0x10/0x10 [ 124.923455] ret_from_fork_asm+0x1a/0x30 [ 124.923460] [ 125.104408] Allocated by task 3693: [ 125.108574] kasan_save_stack+0x1c/0x40 [ 125.113090] kasan_save_track+0x10/0x30 [ 125.117603] __kasan_kmalloc+0xa6/0xb0 [ 125.122039] kmalloc_node_oob_right+0x9a/0x360 [kasan_test] [ 125.128292] kunit_try_run_case+0x175/0x440 [ 125.133151] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 125.139218] kthread+0x3b4/0x780 [ 125.143125] ret_from_fork+0x30/0x70 [ 125.147379] ret_from_fork_asm+0x1a/0x30 [ 125.154154] The buggy address belongs to the object at ffff8884136e0000 which belongs to the cache kmalloc-4k of size 4096 [ 125.167998] The buggy address is located 0 bytes to the right of allocated 4096-byte region [ffff8884136e0000, ffff8884136e1000) [ 125.184532] The buggy address belongs to the physical page: [ 125.190767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x4136e0 [ 125.199427] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 125.207739] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 125.215361] page_type: f5(slab) [ 125.219178] raw: 0017ffffc0000040 ffff888100043040 ffffea00104dba00 dead000000000002 [ 125.227575] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 125.235975] head: 0017ffffc0000040 ffff888100043040 ffffea00104dba00 dead000000000002 [ 125.244460] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 125.252946] head: 0017ffffc0000003 ffffea00104db801 00000000ffffffff 00000000ffffffff [ 125.261429] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 125.269910] page dumped because: kasan: bad access detected [ 125.278325] Memory state around the buggy address: [ 125.283785] ffff8884136e0f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 125.291663] ffff8884136e0f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 125.299543] >ffff8884136e1000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 125.307424] ^ [ 125.311330] ffff8884136e1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 125.319209] ffff8884136e1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 125.327094] ================================================================== [ 125.335233] ok 3 kmalloc_node_oob_right [ 125.335402] ================================================================== [ 125.348135] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520 [kasan_test] [ 125.358012] Write of size 1 at addr ffff88813b38ed78 by task kunit_try_catch/3697 [ 125.368344] CPU: 4 UID: 0 PID: 3697 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 125.368351] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 125.368352] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 125.368354] Call Trace: [ 125.368356] [ 125.368359] dump_stack_lvl+0x4f/0x70 [ 125.368365] print_address_description.constprop.0+0x2c/0x3b0 [ 125.368372] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [kasan_test] [ 125.368382] print_report+0xb9/0x280 [ 125.368386] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [kasan_test] [ 125.368394] ? kasan_addr_to_slab+0x9/0x90 [ 125.368397] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [kasan_test] [ 125.368405] kasan_report+0xda/0x110 [ 125.368409] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [kasan_test] [ 125.368418] kmalloc_track_caller_oob_right+0x4c8/0x520 [kasan_test] [ 125.368428] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [kasan_test] [ 125.368436] ? __schedule+0x757/0x1420 [ 125.368440] ? __pfx_read_tsc+0x10/0x10 [ 125.368444] ? ktime_get_ts64+0x7f/0x220 [ 125.368448] kunit_try_run_case+0x175/0x440 [ 125.368451] ? __pfx_kunit_try_run_case+0x10/0x10 [ 125.368454] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 125.368458] ? __pfx_kunit_try_run_case+0x10/0x10 [ 125.368460] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 125.368464] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 125.368467] kthread+0x3b4/0x780 [ 125.368472] ? __pfx_kthread+0x10/0x10 [ 125.368475] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 125.368478] ? __pfx_kthread+0x10/0x10 [ 125.368481] ret_from_fork+0x30/0x70 [ 125.368485] ? __pfx_kthread+0x10/0x10 [ 125.368488] ret_from_fork_asm+0x1a/0x30 [ 125.368494] [ 125.553631] Allocated by task 3697: [ 125.557797] kasan_save_stack+0x1c/0x40 [ 125.562312] kasan_save_track+0x10/0x30 [ 125.566820] __kasan_kmalloc+0xa6/0xb0 [ 125.571244] __kmalloc_node_track_caller_noprof+0x1c1/0x520 [ 125.577484] kmalloc_track_caller_oob_right+0x8b/0x520 [kasan_test] [ 125.584424] kunit_try_run_case+0x175/0x440 [ 125.589282] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 125.595352] kthread+0x3b4/0x780 [ 125.599259] ret_from_fork+0x30/0x70 [ 125.603512] ret_from_fork_asm+0x1a/0x30 [ 125.610289] The buggy address belongs to the object at ffff88813b38ed00 which belongs to the cache kmalloc-128 of size 128 [ 125.624131] The buggy address is located 0 bytes to the right of allocated 120-byte region [ffff88813b38ed00, ffff88813b38ed78) [ 125.640584] The buggy address belongs to the physical page: [ 125.646822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x13b38e [ 125.655483] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 125.663798] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 125.671421] page_type: f5(slab) [ 125.675240] raw: 0017ffffc0000040 ffff888100042a00 dead000000000100 dead000000000122 [ 125.683642] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 125.692045] head: 0017ffffc0000040 ffff888100042a00 dead000000000100 dead000000000122 [ 125.700541] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 125.709038] head: 0017ffffc0000001 ffffea0004ece381 00000000ffffffff 00000000ffffffff [ 125.717524] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 125.726009] page dumped because: kasan: bad access detected [ 125.734421] Memory state around the buggy address: [ 125.739879] ffff88813b38ec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 125.747761] ffff88813b38ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 125.755646] >ffff88813b38ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 125.763529] ^ [ 125.771325] ffff88813b38ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 125.779208] ffff88813b38ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 125.787090] ================================================================== [ 125.795108] ================================================================== [ 125.803002] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520 [kasan_test] [ 125.812898] Write of size 1 at addr ffff888117593d78 by task kunit_try_catch/3697 [ 125.823218] CPU: 0 UID: 0 PID: 3697 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 125.823224] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 125.823226] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 125.823228] Call Trace: [ 125.823230] [ 125.823232] dump_stack_lvl+0x4f/0x70 [ 125.823239] print_address_description.constprop.0+0x2c/0x3b0 [ 125.823246] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [kasan_test] [ 125.823257] print_report+0xb9/0x280 [ 125.823262] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [kasan_test] [ 125.823270] ? kasan_addr_to_slab+0x9/0x90 [ 125.823274] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [kasan_test] [ 125.823283] kasan_report+0xda/0x110 [ 125.823287] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [kasan_test] [ 125.823296] kmalloc_track_caller_oob_right+0x4b1/0x520 [kasan_test] [ 125.823306] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [kasan_test] [ 125.823315] ? __schedule+0x757/0x1420 [ 125.823318] ? __pfx_read_tsc+0x10/0x10 [ 125.823322] ? ktime_get_ts64+0x7f/0x220 [ 125.823326] kunit_try_run_case+0x175/0x440 [ 125.823330] ? __pfx_kunit_try_run_case+0x10/0x10 [ 125.823333] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 125.823337] ? __pfx_kunit_try_run_case+0x10/0x10 [ 125.823339] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 125.823343] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 125.823346] kthread+0x3b4/0x780 [ 125.823351] ? __pfx_kthread+0x10/0x10 [ 125.823354] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 125.823358] ? __pfx_kthread+0x10/0x10 [ 125.823361] ret_from_fork+0x30/0x70 [ 125.823365] ? __pfx_kthread+0x10/0x10 [ 125.823369] ret_from_fork_asm+0x1a/0x30 [ 125.823374] [ 126.008520] Allocated by task 3697: [ 126.012687] kasan_save_stack+0x1c/0x40 [ 126.017203] kasan_save_track+0x10/0x30 [ 126.021719] __kasan_kmalloc+0xa6/0xb0 [ 126.026144] __kmalloc_node_track_caller_noprof+0x1c1/0x520 [ 126.032385] kmalloc_track_caller_oob_right+0x18f/0x520 [kasan_test] [ 126.039412] kunit_try_run_case+0x175/0x440 [ 126.044273] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 126.050343] kthread+0x3b4/0x780 [ 126.054255] ret_from_fork+0x30/0x70 [ 126.058510] ret_from_fork_asm+0x1a/0x30 [ 126.065291] The buggy address belongs to the object at ffff888117593d00 which belongs to the cache kmalloc-128 of size 128 [ 126.079134] The buggy address is located 0 bytes to the right of allocated 120-byte region [ffff888117593d00, ffff888117593d78) [ 126.095592] The buggy address belongs to the physical page: [ 126.101833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x117592 [ 126.110496] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 126.118810] anon flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 126.126867] page_type: f5(slab) [ 126.130690] raw: 0017ffffc0000040 ffff888100042a00 0000000000000000 dead000000000001 [ 126.139092] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 126.147492] head: 0017ffffc0000040 ffff888100042a00 0000000000000000 dead000000000001 [ 126.155981] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 126.164469] head: 0017ffffc0000001 ffffea00045d6481 00000000ffffffff 00000000ffffffff [ 126.172957] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 126.181443] page dumped because: kasan: bad access detected [ 126.189858] Memory state around the buggy address: [ 126.195319] ffff888117593c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc [ 126.203202] ffff888117593c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 126.211085] >ffff888117593d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 126.218968] ^ [ 126.226765] ffff888117593d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 126.234647] ffff888117593e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 126.242530] ================================================================== [ 126.250642] ok 4 kmalloc_track_caller_oob_right [ 126.250768] ================================================================== [ 126.264201] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2d9/0x320 [kasan_test] [ 126.273302] Write of size 1 at addr ffff8881bcaddf00 by task kunit_try_catch/3700 [ 126.283616] CPU: 4 UID: 0 PID: 3700 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 126.283623] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 126.283624] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 126.283627] Call Trace: [ 126.283629] [ 126.283632] dump_stack_lvl+0x4f/0x70 [ 126.283639] print_address_description.constprop.0+0x2c/0x3b0 [ 126.283646] ? kmalloc_big_oob_right+0x2d9/0x320 [kasan_test] [ 126.283655] print_report+0xb9/0x280 [ 126.283659] ? kmalloc_big_oob_right+0x2d9/0x320 [kasan_test] [ 126.283667] ? kasan_addr_to_slab+0x9/0x90 [ 126.283671] ? kmalloc_big_oob_right+0x2d9/0x320 [kasan_test] [ 126.283679] kasan_report+0xda/0x110 [ 126.283683] ? kmalloc_big_oob_right+0x2d9/0x320 [kasan_test] [ 126.283691] kmalloc_big_oob_right+0x2d9/0x320 [kasan_test] [ 126.283701] ? __pfx_kmalloc_big_oob_right+0x10/0x10 [kasan_test] [ 126.283710] ? __schedule+0x757/0x1420 [ 126.283713] ? __pfx_read_tsc+0x10/0x10 [ 126.283717] ? ktime_get_ts64+0x7f/0x220 [ 126.283721] kunit_try_run_case+0x175/0x440 [ 126.283725] ? __pfx_kunit_try_run_case+0x10/0x10 [ 126.283728] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 126.283732] ? __pfx_kunit_try_run_case+0x10/0x10 [ 126.283735] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 126.283738] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 126.283742] kthread+0x3b4/0x780 [ 126.283746] ? __pfx_kthread+0x10/0x10 [ 126.283749] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 126.283753] ? __pfx_kthread+0x10/0x10 [ 126.283756] ret_from_fork+0x30/0x70 [ 126.283759] ? __pfx_kthread+0x10/0x10 [ 126.283762] ret_from_fork_asm+0x1a/0x30 [ 126.283768] [ 126.464215] Allocated by task 3700: [ 126.468380] kasan_save_stack+0x1c/0x40 [ 126.472895] kasan_save_track+0x10/0x30 [ 126.477404] __kasan_kmalloc+0xa6/0xb0 [ 126.481828] kmalloc_big_oob_right+0x96/0x320 [kasan_test] [ 126.487987] kunit_try_run_case+0x175/0x440 [ 126.492843] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 126.498909] kthread+0x3b4/0x780 [ 126.502816] ret_from_fork+0x30/0x70 [ 126.507073] ret_from_fork_asm+0x1a/0x30 [ 126.513847] The buggy address belongs to the object at ffff8881bcadc000 which belongs to the cache kmalloc-8k of size 8192 [ 126.527689] The buggy address is located 0 bytes to the right of allocated 7936-byte region [ffff8881bcadc000, ffff8881bcaddf00) [ 126.537825] lkp: kernel tainted state: 262180 [ 126.542046] The buggy address belongs to the physical page: [ 126.542049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1bcad8 [ 126.549256] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 126.549259] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 126.549263] page_type: f5(slab) [ 126.549277] raw: 0017ffffc0000040 ffff888100043180 dead000000000122 0000000000000000 [ 126.594483] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 126.602884] head: 0017ffffc0000040 ffff888100043180 dead000000000122 0000000000000000 [ 126.611370] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 126.619857] head: 0017ffffc0000003 ffffea0006f2b601 00000000ffffffff 00000000ffffffff [ 126.628344] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 126.636830] page dumped because: kasan: bad access detected [ 126.645255] Memory state around the buggy address: [ 126.650715] ffff8881bcadde00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 126.658597] ffff8881bcadde80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 126.666478] >ffff8881bcaddf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 126.674361] ^ [ 126.678267] ffff8881bcaddf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 126.686147] ffff8881bcade000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 126.694039] ================================================================== [ 126.702213] ok 5 kmalloc_big_oob_right [ 126.702430] ================================================================== [ 126.715082] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2ac/0x2e0 [kasan_test] [ 126.724358] Write of size 1 at addr ffff88812c6ba00a by task kunit_try_catch/3704 [ 126.734677] CPU: 5 UID: 0 PID: 3704 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 126.734684] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 126.734686] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 126.734688] Call Trace: [ 126.734690] [ 126.734693] dump_stack_lvl+0x4f/0x70 [ 126.734699] print_address_description.constprop.0+0x2c/0x3b0 [ 126.734706] ? kmalloc_large_oob_right+0x2ac/0x2e0 [kasan_test] [ 126.734716] print_report+0xb9/0x280 [ 126.734719] ? kmalloc_large_oob_right+0x2ac/0x2e0 [kasan_test] [ 126.734727] ? kasan_addr_to_slab+0x9/0x90 [ 126.734731] ? kmalloc_large_oob_right+0x2ac/0x2e0 [kasan_test] [ 126.734739] kasan_report+0xda/0x110 [ 126.734743] ? kmalloc_large_oob_right+0x2ac/0x2e0 [kasan_test] [ 126.734751] kmalloc_large_oob_right+0x2ac/0x2e0 [kasan_test] [ 126.734762] ? __pfx_kmalloc_large_oob_right+0x10/0x10 [kasan_test] [ 126.734771] ? __schedule+0x757/0x1420 [ 126.734774] ? __pfx_read_tsc+0x10/0x10 [ 126.734778] ? ktime_get_ts64+0x7f/0x220 [ 126.734782] kunit_try_run_case+0x175/0x440 [ 126.734786] ? __pfx_kunit_try_run_case+0x10/0x10 [ 126.734789] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 126.734793] ? __pfx_kunit_try_run_case+0x10/0x10 [ 126.734795] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 126.734799] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 126.734802] kthread+0x3b4/0x780 [ 126.734807] ? __pfx_kthread+0x10/0x10 [ 126.734810] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 126.734813] ? __pfx_kthread+0x10/0x10 [ 126.734816] ret_from_fork+0x30/0x70 [ 126.734820] ? __pfx_kthread+0x10/0x10 [ 126.734823] ret_from_fork_asm+0x1a/0x30 [ 126.734829] [ 126.916350] The buggy address belongs to the physical page: [ 126.922597] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x8b2 pfn:0x12c6b8 [ 126.931434] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 126.939750] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 126.947376] page_type: f8(unknown) [ 126.951455] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 126.959856] raw: 00000000000008b2 0000000000000000 00000001f8000000 0000000000000000 [ 126.968259] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 126.976746] head: 00000000000008b2 0000000000000000 00000001f8000000 0000000000000000 [ 126.985233] head: 0017ffffc0000002 ffffea0004b1ae01 00000000ffffffff 00000000ffffffff [ 126.993722] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 127.002209] page dumped because: kasan: bad access detected [ 127.010627] Memory state around the buggy address: [ 127.016089] ffff88812c6b9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 127.023972] ffff88812c6b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 127.031855] >ffff88812c6ba000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 127.039737] ^ [ 127.043902] ffff88812c6ba080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 127.051785] ffff88812c6ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 127.059669] ================================================================== [ 127.069453] ok 6 kmalloc_large_oob_right [ 127.069608] ================================================================== [ 127.082442] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2e3/0x330 [kasan_test] [ 127.090869] Read of size 1 at addr ffff88812c6b8000 by task kunit_try_catch/3706 [ 127.101116] CPU: 5 UID: 0 PID: 3706 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 127.101127] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 127.101130] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 127.101133] Call Trace: [ 127.101137] [ 127.101141] dump_stack_lvl+0x4f/0x70 [ 127.101149] print_address_description.constprop.0+0x2c/0x3b0 [ 127.101158] ? kmalloc_large_uaf+0x2e3/0x330 [kasan_test] [ 127.101173] print_report+0xb9/0x280 [ 127.101179] ? kmalloc_large_uaf+0x2e3/0x330 [kasan_test] [ 127.101193] ? kasan_addr_to_slab+0x9/0x90 [ 127.101198] ? kmalloc_large_uaf+0x2e3/0x330 [kasan_test] [ 127.101212] kasan_report+0xda/0x110 [ 127.101218] ? kmalloc_large_uaf+0x2e3/0x330 [kasan_test] [ 127.101234] kmalloc_large_uaf+0x2e3/0x330 [kasan_test] [ 127.101250] ? __pfx_kmalloc_large_uaf+0x10/0x10 [kasan_test] [ 127.101265] ? __schedule+0x757/0x1420 [ 127.101270] ? __pfx_read_tsc+0x10/0x10 [ 127.101275] ? ktime_get_ts64+0x7f/0x220 [ 127.101281] kunit_try_run_case+0x175/0x440 [ 127.101287] ? __pfx_kunit_try_run_case+0x10/0x10 [ 127.101292] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 127.101299] ? __pfx_kunit_try_run_case+0x10/0x10 [ 127.101303] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 127.101308] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 127.101314] kthread+0x3b4/0x780 [ 127.101320] ? __pfx_kthread+0x10/0x10 [ 127.101325] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 127.101331] ? __pfx_kthread+0x10/0x10 [ 127.101336] ret_from_fork+0x30/0x70 [ 127.101341] ? __pfx_kthread+0x10/0x10 [ 127.101345] ret_from_fork_asm+0x1a/0x30 [ 127.101354] [ 127.279851] The buggy address belongs to the physical page: [ 127.286095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x8b2 pfn:0x12c6b8 [ 127.294935] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 127.302136] raw: 0017ffffc0000000 ffffea000573c108 ffff8883a72c6f40 0000000000000000 [ 127.310542] raw: 00000000000008b2 0000000000000000 00000000ffffffff 0000000000000000 [ 127.318946] page dumped because: kasan: bad access detected [ 127.327371] Memory state around the buggy address: [ 127.332837] ffff88812c6b7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 127.340723] ffff88812c6b7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 127.348610] >ffff88812c6b8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 127.356496] ^ [ 127.360408] ffff88812c6b8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 127.368294] ffff88812c6b8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 127.376179] ================================================================== [ 127.387948] ok 7 kmalloc_large_uaf [ 127.391161] ================================================================== [ 127.403484] BUG: KASAN: invalid-free in kmalloc_large_invalid_free+0x10f/0x2a0 [kasan_test] [ 127.412510] Free of addr ffff88812c6b8001 by task kunit_try_catch/3708 [ 127.421885] CPU: 5 UID: 0 PID: 3708 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 127.421896] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 127.421898] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 127.421901] Call Trace: [ 127.421905] [ 127.421908] dump_stack_lvl+0x4f/0x70 [ 127.421917] print_address_description.constprop.0+0x2c/0x3b0 [ 127.421925] print_report+0xb9/0x280 [ 127.421931] ? kasan_addr_to_slab+0x9/0x90 [ 127.421937] ? kmalloc_large_invalid_free+0x10f/0x2a0 [kasan_test] [ 127.421952] kasan_report_invalid_free+0xba/0xe0 [ 127.421958] ? kmalloc_large_invalid_free+0x10f/0x2a0 [kasan_test] [ 127.421972] free_large_kmalloc+0x47/0x110 [ 127.421978] kmalloc_large_invalid_free+0x10f/0x2a0 [kasan_test] [ 127.421993] ? __pfx_kmalloc_large_invalid_free+0x10/0x10 [kasan_test] [ 127.422008] ? __schedule+0x757/0x1420 [ 127.422013] ? __pfx_read_tsc+0x10/0x10 [ 127.422019] ? ktime_get_ts64+0x7f/0x220 [ 127.422035] kunit_try_run_case+0x175/0x440 [ 127.422041] ? __pfx_kunit_try_run_case+0x10/0x10 [ 127.422045] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 127.422052] ? __pfx_kunit_try_run_case+0x10/0x10 [ 127.422056] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 127.422062] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 127.422076] kthread+0x3b4/0x780 [ 127.422082] ? __pfx_kthread+0x10/0x10 [ 127.422087] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 127.422093] ? __pfx_kthread+0x10/0x10 [ 127.422097] ret_from_fork+0x30/0x70 [ 127.422103] ? __pfx_kthread+0x10/0x10 [ 127.422107] ret_from_fork_asm+0x1a/0x30 [ 127.422115] [ 127.597410] The buggy address belongs to the physical page: [ 127.603655] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x8b2 pfn:0x12c6b8 [ 127.612495] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 127.620814] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 127.628446] page_type: f8(unknown) [ 127.632530] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 127.640937] raw: 00000000000008b2 0000000000000000 00000001f8000000 0000000000000000 [ 127.649345] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 127.657837] head: 00000000000008b2 0000000000000000 00000001f8000000 0000000000000000 [ 127.666333] head: 0017ffffc0000002 ffffea0004b1ae01 00000000ffffffff 00000000ffffffff [ 127.674825] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 127.683314] page dumped because: kasan: bad access detected [ 127.691735] Memory state around the buggy address: [ 127.697198] ffff88812c6b7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 127.705081] ffff88812c6b7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 127.712964] >ffff88812c6b8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 127.720845] ^ [ 127.724755] ffff88812c6b8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 127.732634] ffff88812c6b8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 127.740515] ================================================================== [ 127.748598] ok 8 kmalloc_large_invalid_free [ 127.748888] ok 9 page_alloc_oob_right # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 127.754427] ================================================================== [ 127.758277] LKP: stdout: 3340: Kernel tests: Boot OK! [ 127.762910] BUG: KASAN: use-after-free in page_alloc_uaf+0x350/0x3c0 [kasan_test] [ 127.776506] Read of size 1 at addr ffff888412c20000 by task kunit_try_catch/3713 [ 127.776523] CPU: 7 UID: 0 PID: 3713 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 127.776530] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 127.776542] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 127.776544] Call Trace: [ 127.776546] [ 127.776548] dump_stack_lvl+0x4f/0x70 [ 127.776554] print_address_description.constprop.0+0x2c/0x3b0 [ 127.776562] ? page_alloc_uaf+0x350/0x3c0 [kasan_test] [ 127.776576] print_report+0xb9/0x280 [ 127.776584] ? page_alloc_uaf+0x350/0x3c0 [kasan_test] [ 127.776600] ? kasan_addr_to_slab+0x9/0x90 [ 127.776606] ? page_alloc_uaf+0x350/0x3c0 [kasan_test] [ 127.776624] kasan_report+0xda/0x110 [ 127.776632] ? page_alloc_uaf+0x350/0x3c0 [kasan_test] [ 127.776651] page_alloc_uaf+0x350/0x3c0 [kasan_test] [ 127.776672] ? __pfx_page_alloc_uaf+0x10/0x10 [kasan_test] [ 127.776682] ? __schedule+0x757/0x1420 [ 127.776686] ? __pfx_read_tsc+0x10/0x10 [ 127.776690] ? ktime_get_ts64+0x7f/0x220 [ 127.776694] kunit_try_run_case+0x175/0x440 [ 127.776698] ? __pfx_kunit_try_run_case+0x10/0x10 [ 127.776701] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 127.776715] ? __pfx_kunit_try_run_case+0x10/0x10 [ 127.776718] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 127.776721] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 127.776725] kthread+0x3b4/0x780 [ 127.776729] ? __pfx_kthread+0x10/0x10 [ 127.776732] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 127.776736] ? __pfx_kthread+0x10/0x10 [ 127.776739] ret_from_fork+0x30/0x70 [ 127.776743] ? __pfx_kthread+0x10/0x10 [ 127.776746] ret_from_fork_asm+0x1a/0x30 [ 127.776751] [ 127.973954] The buggy address belongs to the physical page: [ 127.980196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888412c24400 pfn:0x412c20 [ 127.990155] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 127.997347] page_type: f0(buddy) [ 128.001256] raw: 0017ffffc0000000 ffffea00104b6808 ffffea0004bf7408 0000000000000000 [ 128.009652] raw: ffff888412c24400 0000000000000004 00000000f0000000 0000000000000000 [ 128.018049] page dumped because: kasan: bad access detected [ 128.026473] Memory state around the buggy address: [ 128.031933] ffff888412c1ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 128.039813] ffff888412c1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 128.047693] >ffff888412c20000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 128.055576] ^ [ 128.059482] ffff888412c20080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 128.067363] ffff888412c20100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 128.075242] ================================================================== [ 128.083553] ok 10 page_alloc_uaf [ 128.083733] ================================================================== [ 128.095866] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x770/0x820 [kasan_test] [ 128.105226] Write of size 1 at addr ffff888131e600eb by task kunit_try_catch/3720 [ 128.115548] CPU: 1 UID: 0 PID: 3720 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 128.115555] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 128.115557] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 128.115559] Call Trace: [ 128.115561] [ 128.115564] dump_stack_lvl+0x4f/0x70 [ 128.115571] print_address_description.constprop.0+0x2c/0x3b0 [ 128.115578] ? krealloc_more_oob_helper+0x770/0x820 [kasan_test] [ 128.115589] print_report+0xb9/0x280 [ 128.115594] ? krealloc_more_oob_helper+0x770/0x820 [kasan_test] [ 128.115602] ? kasan_addr_to_slab+0x9/0x90 [ 128.115606] ? krealloc_more_oob_helper+0x770/0x820 [kasan_test] [ 128.115615] kasan_report+0xda/0x110 [ 128.115619] ? krealloc_more_oob_helper+0x770/0x820 [kasan_test] [ 128.115629] krealloc_more_oob_helper+0x770/0x820 [kasan_test] [ 128.115639] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [kasan_test] [ 128.115648] ? finish_task_switch.isra.0+0x155/0x750 [ 128.115652] ? __switch_to+0x5ba/0x1020 [ 128.115656] ? __schedule+0x757/0x1420 [ 128.115660] ? __pfx_read_tsc+0x10/0x10 [ 128.115664] ? ktime_get_ts64+0x7f/0x220 [ 128.115668] kunit_try_run_case+0x175/0x440 [ 128.115672] ? __pfx_kunit_try_run_case+0x10/0x10 [ 128.115674] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 128.115679] ? __pfx_kunit_try_run_case+0x10/0x10 [ 128.115681] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 128.115685] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 128.115689] kthread+0x3b4/0x780 [ 128.115693] ? __pfx_kthread+0x10/0x10 [ 128.115696] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 128.115700] ? __pfx_kthread+0x10/0x10 [ 128.115704] ret_from_fork+0x30/0x70 [ 128.115708] ? __pfx_kthread+0x10/0x10 [ 128.115711] ret_from_fork_asm+0x1a/0x30 [ 128.115716] [ 128.307868] Allocated by task 3720: [ 128.312043] kasan_save_stack+0x1c/0x40 [ 128.316569] kasan_save_track+0x10/0x30 [ 128.321082] __kasan_krealloc+0x17f/0x1e0 [ 128.325770] krealloc_noprof+0x127/0x380 [ 128.330368] krealloc_more_oob_helper+0x19b/0x820 [kasan_test] [ 128.336874] kunit_try_run_case+0x175/0x440 [ 128.341733] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 128.347802] kthread+0x3b4/0x780 [ 128.351711] ret_from_fork+0x30/0x70 [ 128.355964] ret_from_fork_asm+0x1a/0x30 [ 128.362740] The buggy address belongs to the object at ffff888131e60000 which belongs to the cache kmalloc-256 of size 256 [ 128.376583] The buggy address is located 0 bytes to the right of allocated 235-byte region [ffff888131e60000, ffff888131e600eb) [ 128.393042] The buggy address belongs to the physical page: [ 128.399280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x131e60 [ 128.407942] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 128.416255] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 128.423880] page_type: f5(slab) [ 128.427702] raw: 0017ffffc0000040 ffff888100042b40 dead000000000122 0000000000000000 [ 128.436102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 128.444504] head: 0017ffffc0000040 ffff888100042b40 dead000000000122 0000000000000000 [ 128.452993] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 128.461482] head: 0017ffffc0000002 ffffea0004c79801 00000000ffffffff 00000000ffffffff [ 128.469971] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 128.478458] page dumped because: kasan: bad access detected [ 128.486875] Memory state around the buggy address: [ 128.492336] ffff888131e5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 128.500218] ffff888131e60000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 128.508101] >ffff888131e60080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 128.515984] ^ [ 128.523263] ffff888131e60100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 128.531146] ffff888131e60180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 128.539040] ================================================================== [ 128.547039] ================================================================== [ 128.554927] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x742/0x820 [kasan_test] [ 128.564289] Write of size 1 at addr ffff888131e600f0 by task kunit_try_catch/3720 [ 128.574611] CPU: 1 UID: 0 PID: 3720 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 128.574618] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 128.574619] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 128.574621] Call Trace: [ 128.574623] [ 128.574625] dump_stack_lvl+0x4f/0x70 [ 128.574632] print_address_description.constprop.0+0x2c/0x3b0 [ 128.574639] ? krealloc_more_oob_helper+0x742/0x820 [kasan_test] [ 128.574650] print_report+0xb9/0x280 [ 128.574654] ? krealloc_more_oob_helper+0x742/0x820 [kasan_test] [ 128.574663] ? kasan_addr_to_slab+0x9/0x90 [ 128.574667] ? krealloc_more_oob_helper+0x742/0x820 [kasan_test] [ 128.574676] kasan_report+0xda/0x110 [ 128.574680] ? krealloc_more_oob_helper+0x742/0x820 [kasan_test] [ 128.574689] krealloc_more_oob_helper+0x742/0x820 [kasan_test] [ 128.574699] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [kasan_test] [ 128.574708] ? finish_task_switch.isra.0+0x155/0x750 [ 128.574711] ? __switch_to+0x5ba/0x1020 [ 128.574715] ? __schedule+0x757/0x1420 [ 128.574719] ? __pfx_read_tsc+0x10/0x10 [ 128.574722] ? ktime_get_ts64+0x7f/0x220 [ 128.574726] kunit_try_run_case+0x175/0x440 [ 128.574730] ? __pfx_kunit_try_run_case+0x10/0x10 [ 128.574732] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 128.574736] ? __pfx_kunit_try_run_case+0x10/0x10 [ 128.574739] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 128.574742] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 128.574745] kthread+0x3b4/0x780 [ 128.574750] ? __pfx_kthread+0x10/0x10 [ 128.574753] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 128.574756] ? __pfx_kthread+0x10/0x10 [ 128.574760] ret_from_fork+0x30/0x70 [ 128.574764] ? __pfx_kthread+0x10/0x10 [ 128.574767] ret_from_fork_asm+0x1a/0x30 [ 128.574772] [ 128.766947] Allocated by task 3720: [ 128.771125] kasan_save_stack+0x1c/0x40 [ 128.775641] kasan_save_track+0x10/0x30 [ 128.780156] __kasan_krealloc+0x17f/0x1e0 [ 128.784844] krealloc_noprof+0x127/0x380 [ 128.789447] krealloc_more_oob_helper+0x19b/0x820 [kasan_test] [ 128.795957] kunit_try_run_case+0x175/0x440 [ 128.800815] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 128.806884] kthread+0x3b4/0x780 [ 128.810792] ret_from_fork+0x30/0x70 [ 128.815049] ret_from_fork_asm+0x1a/0x30 [ 128.821835] The buggy address belongs to the object at ffff888131e60000 which belongs to the cache kmalloc-256 of size 256 [ 128.835680] The buggy address is located 5 bytes to the right of allocated 235-byte region [ffff888131e60000, ffff888131e600eb) [ 128.852136] The buggy address belongs to the physical page: [ 128.858375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x131e60 [ 128.867047] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 128.875373] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 128.882999] page_type: f5(slab) [ 128.886823] raw: 0017ffffc0000040 ffff888100042b40 dead000000000122 0000000000000000 [ 128.895222] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 128.903624] head: 0017ffffc0000040 ffff888100042b40 dead000000000122 0000000000000000 [ 128.912113] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 128.920602] head: 0017ffffc0000002 ffffea0004c79801 00000000ffffffff 00000000ffffffff [ 128.929096] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 128.937585] page dumped because: kasan: bad access detected [ 128.946004] Memory state around the buggy address: [ 128.951465] ffff888131e5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 128.959346] ffff888131e60000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 128.967227] >ffff888131e60080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 128.975106] ^ [ 128.982643] ffff888131e60100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 128.990527] ffff888131e60180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 128.998409] ================================================================== [ 129.006522] ok 11 krealloc_more_oob [ 129.006634] ================================================================== [ 129.019039] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xc4d/0xeb0 [kasan_test] [ 129.028408] Write of size 1 at addr ffff888131e61ec9 by task kunit_try_catch/3726 [ 129.038730] CPU: 1 UID: 0 PID: 3726 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 129.038737] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 129.038739] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 129.038741] Call Trace: [ 129.038744] [ 129.038747] dump_stack_lvl+0x4f/0x70 [ 129.038753] print_address_description.constprop.0+0x2c/0x3b0 [ 129.038761] ? krealloc_less_oob_helper+0xc4d/0xeb0 [kasan_test] [ 129.038771] print_report+0xb9/0x280 [ 129.038776] ? krealloc_less_oob_helper+0xc4d/0xeb0 [kasan_test] [ 129.038784] ? kasan_addr_to_slab+0x9/0x90 [ 129.038788] ? krealloc_less_oob_helper+0xc4d/0xeb0 [kasan_test] [ 129.038797] kasan_report+0xda/0x110 [ 129.038801] ? krealloc_less_oob_helper+0xc4d/0xeb0 [kasan_test] [ 129.038810] krealloc_less_oob_helper+0xc4d/0xeb0 [kasan_test] [ 129.038820] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [kasan_test] [ 129.038828] ? finish_task_switch.isra.0+0x155/0x750 [ 129.038832] ? __switch_to+0x5ba/0x1020 [ 129.038836] ? __schedule+0x757/0x1420 [ 129.038839] ? __pfx_read_tsc+0x10/0x10 [ 129.038843] ? ktime_get_ts64+0x7f/0x220 [ 129.038846] kunit_try_run_case+0x175/0x440 [ 129.038851] ? __pfx_kunit_try_run_case+0x10/0x10 [ 129.038853] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 129.038858] ? __pfx_kunit_try_run_case+0x10/0x10 [ 129.038860] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 129.038864] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 129.038867] kthread+0x3b4/0x780 [ 129.038872] ? __pfx_kthread+0x10/0x10 [ 129.038875] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 129.038878] ? __pfx_kthread+0x10/0x10 [ 129.038881] ret_from_fork+0x30/0x70 [ 129.038885] ? __pfx_kthread+0x10/0x10 [ 129.038889] ret_from_fork_asm+0x1a/0x30 [ 129.038894] [ 129.231107] Allocated by task 3726: [ 129.235273] kasan_save_stack+0x1c/0x40 [ 129.239789] kasan_save_track+0x10/0x30 [ 129.244301] __kasan_krealloc+0x17f/0x1e0 [ 129.248990] krealloc_noprof+0x127/0x380 [ 129.253590] krealloc_less_oob_helper+0x19b/0xeb0 [kasan_test] [ 129.260098] kunit_try_run_case+0x175/0x440 [ 129.264965] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 129.271043] kthread+0x3b4/0x780 [ 129.274952] ret_from_fork+0x30/0x70 [ 129.279208] ret_from_fork_asm+0x1a/0x30 [ 129.285983] The buggy address belongs to the object at ffff888131e61e00 which belongs to the cache kmalloc-256 of size 256 [ 129.299827] The buggy address is located 0 bytes to the right of allocated 201-byte region [ffff888131e61e00, ffff888131e61ec9) [ 129.316284] The buggy address belongs to the physical page: [ 129.322521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x131e60 [ 129.331183] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 129.339498] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 129.347122] page_type: f5(slab) [ 129.350943] raw: 0017ffffc0000040 ffff888100042b40 dead000000000122 0000000000000000 [ 129.359343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 129.367742] head: 0017ffffc0000040 ffff888100042b40 dead000000000122 0000000000000000 [ 129.376230] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 129.384718] head: 0017ffffc0000002 ffffea0004c79801 00000000ffffffff 00000000ffffffff [ 129.393206] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 129.401693] page dumped because: kasan: bad access detected [ 129.410113] Memory state around the buggy address: [ 129.415573] ffff888131e61d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 129.423456] ffff888131e61e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 129.431337] >ffff888131e61e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 129.439221] ^ [ 129.445461] ffff888131e61f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 129.453344] ffff888131e61f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 129.461224] ================================================================== [ 129.469146] ================================================================== [ 129.477039] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xcba/0xeb0 [kasan_test] [ 129.486408] Write of size 1 at addr ffff888131e61ed0 by task kunit_try_catch/3726 [ 129.496729] CPU: 1 UID: 0 PID: 3726 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 129.496735] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 129.496737] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 129.496739] Call Trace: [ 129.496742] [ 129.496744] dump_stack_lvl+0x4f/0x70 [ 129.496751] print_address_description.constprop.0+0x2c/0x3b0 [ 129.496758] ? krealloc_less_oob_helper+0xcba/0xeb0 [kasan_test] [ 129.496768] print_report+0xb9/0x280 [ 129.496773] ? krealloc_less_oob_helper+0xcba/0xeb0 [kasan_test] [ 129.496782] ? kasan_addr_to_slab+0x9/0x90 [ 129.496786] ? krealloc_less_oob_helper+0xcba/0xeb0 [kasan_test] [ 129.496794] kasan_report+0xda/0x110 [ 129.496798] ? krealloc_less_oob_helper+0xcba/0xeb0 [kasan_test] [ 129.496806] krealloc_less_oob_helper+0xcba/0xeb0 [kasan_test] [ 129.496816] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [kasan_test] [ 129.496824] ? finish_task_switch.isra.0+0x155/0x750 [ 129.496828] ? __switch_to+0x5ba/0x1020 [ 129.496832] ? __schedule+0x757/0x1420 [ 129.496835] ? __pfx_read_tsc+0x10/0x10 [ 129.496838] ? ktime_get_ts64+0x7f/0x220 [ 129.496842] kunit_try_run_case+0x175/0x440 [ 129.496846] ? __pfx_kunit_try_run_case+0x10/0x10 [ 129.496849] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 129.496853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 129.496855] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 129.496859] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 129.496862] kthread+0x3b4/0x780 [ 129.496866] ? __pfx_kthread+0x10/0x10 [ 129.496869] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 129.496873] ? __pfx_kthread+0x10/0x10 [ 129.496876] ret_from_fork+0x30/0x70 [ 129.496879] ? __pfx_kthread+0x10/0x10 [ 129.496883] ret_from_fork_asm+0x1a/0x30 [ 129.496888] [ 129.689117] Allocated by task 3726: [ 129.693286] kasan_save_stack+0x1c/0x40 [ 129.697803] kasan_save_track+0x10/0x30 [ 129.702316] __kasan_krealloc+0x17f/0x1e0 [ 129.707002] krealloc_noprof+0x127/0x380 [ 129.711603] krealloc_less_oob_helper+0x19b/0xeb0 [kasan_test] [ 129.718111] kunit_try_run_case+0x175/0x440 [ 129.722969] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 129.729044] kthread+0x3b4/0x780 [ 129.732962] ret_from_fork+0x30/0x70 [ 129.737217] ret_from_fork_asm+0x1a/0x30 [ 129.743996] The buggy address belongs to the object at ffff888131e61e00 which belongs to the cache kmalloc-256 of size 256 [ 129.757842] The buggy address is located 7 bytes to the right of allocated 201-byte region [ffff888131e61e00, ffff888131e61ec9) [ 129.774304] The buggy address belongs to the physical page: [ 129.780543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x131e60 [ 129.789203] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 129.797516] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 129.805142] page_type: f5(slab) [ 129.808963] raw: 0017ffffc0000040 ffff888100042b40 dead000000000122 0000000000000000 [ 129.817364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 129.825765] head: 0017ffffc0000040 ffff888100042b40 dead000000000122 0000000000000000 [ 129.834252] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 129.842741] head: 0017ffffc0000002 ffffea0004c79801 00000000ffffffff 00000000ffffffff [ 129.851228] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 129.859716] page dumped because: kasan: bad access detected [ 129.868134] Memory state around the buggy address: [ 129.873596] ffff888131e61d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 129.881479] ffff888131e61e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 129.889363] >ffff888131e61e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 129.897245] ^ [ 129.903745] ffff888131e61f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 129.911628] ffff888131e61f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 129.919508] ================================================================== [ 129.927438] ================================================================== [ 129.935325] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd0f/0xeb0 [kasan_test] [ 129.944688] Write of size 1 at addr ffff888131e61eda by task kunit_try_catch/3726 [ 129.955009] CPU: 1 UID: 0 PID: 3726 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 129.955017] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 129.955019] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 129.955033] Call Trace: [ 129.955036] [ 129.955039] dump_stack_lvl+0x4f/0x70 [ 129.955046] print_address_description.constprop.0+0x2c/0x3b0 [ 129.955062] ? krealloc_less_oob_helper+0xd0f/0xeb0 [kasan_test] [ 129.955082] print_report+0xb9/0x280 [ 129.955086] ? krealloc_less_oob_helper+0xd0f/0xeb0 [kasan_test] [ 129.955095] ? kasan_addr_to_slab+0x9/0x90 [ 129.955098] ? krealloc_less_oob_helper+0xd0f/0xeb0 [kasan_test] [ 129.955106] kasan_report+0xda/0x110 [ 129.955110] ? krealloc_less_oob_helper+0xd0f/0xeb0 [kasan_test] [ 129.955119] krealloc_less_oob_helper+0xd0f/0xeb0 [kasan_test] [ 129.955129] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [kasan_test] [ 129.955138] ? finish_task_switch.isra.0+0x155/0x750 [ 129.955141] ? __switch_to+0x5ba/0x1020 [ 129.955145] ? __schedule+0x757/0x1420 [ 129.955149] ? __pfx_read_tsc+0x10/0x10 [ 129.955152] ? ktime_get_ts64+0x7f/0x220 [ 129.955156] kunit_try_run_case+0x175/0x440 [ 129.955160] ? __pfx_kunit_try_run_case+0x10/0x10 [ 129.955163] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 129.955167] ? __pfx_kunit_try_run_case+0x10/0x10 [ 129.955169] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 129.955172] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 129.955176] kthread+0x3b4/0x780 [ 129.955180] ? __pfx_kthread+0x10/0x10 [ 129.955183] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 129.955187] ? __pfx_kthread+0x10/0x10 [ 129.955190] ret_from_fork+0x30/0x70 [ 129.955194] ? __pfx_kthread+0x10/0x10 [ 129.955197] ret_from_fork_asm+0x1a/0x30 [ 129.955202] [ 130.147440] Allocated by task 3726: [ 130.151608] kasan_save_stack+0x1c/0x40 [ 130.156124] kasan_save_track+0x10/0x30 [ 130.160634] __kasan_krealloc+0x17f/0x1e0 [ 130.165320] krealloc_noprof+0x127/0x380 [ 130.169919] krealloc_less_oob_helper+0x19b/0xeb0 [kasan_test] [ 130.176429] kunit_try_run_case+0x175/0x440 [ 130.181286] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 130.187353] kthread+0x3b4/0x780 [ 130.191262] ret_from_fork+0x30/0x70 [ 130.195519] ret_from_fork_asm+0x1a/0x30 [ 130.202299] The buggy address belongs to the object at ffff888131e61e00 which belongs to the cache kmalloc-256 of size 256 [ 130.216149] The buggy address is located 17 bytes to the right of allocated 201-byte region [ffff888131e61e00, ffff888131e61ec9) [ 130.232696] The buggy address belongs to the physical page: [ 130.238934] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x131e60 [ 130.247598] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 130.255912] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 130.263537] page_type: f5(slab) [ 130.267362] raw: 0017ffffc0000040 ffff888100042b40 dead000000000122 0000000000000000 [ 130.275765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 130.284168] head: 0017ffffc0000040 ffff888100042b40 dead000000000122 0000000000000000 [ 130.292656] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 130.301146] head: 0017ffffc0000002 ffffea0004c79801 00000000ffffffff 00000000ffffffff [ 130.309635] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 130.318123] page dumped because: kasan: bad access detected [ 130.326542] Memory state around the buggy address: [ 130.332003] ffff888131e61d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 130.339885] ffff888131e61e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 130.347767] >ffff888131e61e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 130.355649] ^ [ 130.362409] ffff888131e61f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 130.370292] ffff888131e61f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 130.378175] ================================================================== [ 130.386163] ================================================================== [ 130.394046] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xcf5/0xeb0 [kasan_test] [ 130.403422] Write of size 1 at addr ffff888131e61eea by task kunit_try_catch/3726 [ 130.413744] CPU: 1 UID: 0 PID: 3726 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 130.413751] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 130.413753] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 130.413755] Call Trace: [ 130.413758] [ 130.413761] dump_stack_lvl+0x4f/0x70 [ 130.413767] print_address_description.constprop.0+0x2c/0x3b0 [ 130.413775] ? krealloc_less_oob_helper+0xcf5/0xeb0 [kasan_test] [ 130.413786] print_report+0xb9/0x280 [ 130.413790] ? krealloc_less_oob_helper+0xcf5/0xeb0 [kasan_test] [ 130.413799] ? kasan_addr_to_slab+0x9/0x90 [ 130.413804] ? krealloc_less_oob_helper+0xcf5/0xeb0 [kasan_test] [ 130.413812] kasan_report+0xda/0x110 [ 130.413816] ? krealloc_less_oob_helper+0xcf5/0xeb0 [kasan_test] [ 130.413825] krealloc_less_oob_helper+0xcf5/0xeb0 [kasan_test] [ 130.413835] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [kasan_test] [ 130.413844] ? finish_task_switch.isra.0+0x155/0x750 [ 130.413848] ? __switch_to+0x5ba/0x1020 [ 130.413852] ? __schedule+0x757/0x1420 [ 130.413855] ? __pfx_read_tsc+0x10/0x10 [ 130.413858] ? ktime_get_ts64+0x7f/0x220 [ 130.413861] kunit_try_run_case+0x175/0x440 [ 130.413866] ? __pfx_kunit_try_run_case+0x10/0x10 [ 130.413869] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 130.413873] ? __pfx_kunit_try_run_case+0x10/0x10 [ 130.413875] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 130.413879] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 130.413883] kthread+0x3b4/0x780 [ 130.413887] ? __pfx_kthread+0x10/0x10 [ 130.413890] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 130.413893] ? __pfx_kthread+0x10/0x10 [ 130.413896] ret_from_fork+0x30/0x70 [ 130.413900] ? __pfx_kthread+0x10/0x10 [ 130.413903] ret_from_fork_asm+0x1a/0x30 [ 130.413908] [ 130.606149] Allocated by task 3726: [ 130.610316] kasan_save_stack+0x1c/0x40 [ 130.614833] kasan_save_track+0x10/0x30 [ 130.619348] __kasan_krealloc+0x17f/0x1e0 [ 130.624041] krealloc_noprof+0x127/0x380 [ 130.628651] krealloc_less_oob_helper+0x19b/0xeb0 [kasan_test] [ 130.635159] kunit_try_run_case+0x175/0x440 [ 130.640032] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 130.646102] kthread+0x3b4/0x780 [ 130.650013] ret_from_fork+0x30/0x70 [ 130.654279] ret_from_fork_asm+0x1a/0x30 [ 130.661065] The buggy address belongs to the object at ffff888131e61e00 which belongs to the cache kmalloc-256 of size 256 [ 130.674918] The buggy address is located 33 bytes to the right of allocated 201-byte region [ffff888131e61e00, ffff888131e61ec9) [ 130.691466] The buggy address belongs to the physical page: [ 130.697708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x131e60 [ 130.706370] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 130.714685] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 130.722312] page_type: f5(slab) [ 130.726136] raw: 0017ffffc0000040 ffff888100042b40 dead000000000122 0000000000000000 [ 130.734538] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 130.742940] head: 0017ffffc0000040 ffff888100042b40 dead000000000122 0000000000000000 [ 130.751428] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 130.759915] head: 0017ffffc0000002 ffffea0004c79801 00000000ffffffff 00000000ffffffff [ 130.768402] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 130.776891] page dumped because: kasan: bad access detected [ 130.785320] Memory state around the buggy address: [ 130.790784] ffff888131e61d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 130.798669] ffff888131e61e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 130.806552] >ffff888131e61e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 130.814436] ^ [ 130.821715] ffff888131e61f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 130.829597] ffff888131e61f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 130.837480] ================================================================== [ 130.845388] ================================================================== [ 130.853284] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xc36/0xeb0 [kasan_test] [ 130.862644] Write of size 1 at addr ffff888131e61eeb by task kunit_try_catch/3726 [ 130.872963] CPU: 1 UID: 0 PID: 3726 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 130.872970] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 130.872971] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 130.872974] Call Trace: [ 130.872976] [ 130.872977] dump_stack_lvl+0x4f/0x70 [ 130.872984] print_address_description.constprop.0+0x2c/0x3b0 [ 130.872991] ? krealloc_less_oob_helper+0xc36/0xeb0 [kasan_test] [ 130.873002] print_report+0xb9/0x280 [ 130.873007] ? krealloc_less_oob_helper+0xc36/0xeb0 [kasan_test] [ 130.873018] ? kasan_addr_to_slab+0x9/0x90 [ 130.873034] ? krealloc_less_oob_helper+0xc36/0xeb0 [kasan_test] [ 130.873049] kasan_report+0xda/0x110 [ 130.873062] ? krealloc_less_oob_helper+0xc36/0xeb0 [kasan_test] [ 130.873081] krealloc_less_oob_helper+0xc36/0xeb0 [kasan_test] [ 130.873090] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [kasan_test] [ 130.873098] ? finish_task_switch.isra.0+0x155/0x750 [ 130.873102] ? __switch_to+0x5ba/0x1020 [ 130.873106] ? __schedule+0x757/0x1420 [ 130.873110] ? __pfx_read_tsc+0x10/0x10 [ 130.873113] ? ktime_get_ts64+0x7f/0x220 [ 130.873117] kunit_try_run_case+0x175/0x440 [ 130.873121] ? __pfx_kunit_try_run_case+0x10/0x10 [ 130.873123] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 130.873128] ? __pfx_kunit_try_run_case+0x10/0x10 [ 130.873130] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 130.873133] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 130.873137] kthread+0x3b4/0x780 [ 130.873141] ? __pfx_kthread+0x10/0x10 [ 130.873144] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 130.873147] ? __pfx_kthread+0x10/0x10 [ 130.873150] ret_from_fork+0x30/0x70 [ 130.873154] ? __pfx_kthread+0x10/0x10 [ 130.873157] ret_from_fork_asm+0x1a/0x30 [ 130.873163] [ 131.065402] Allocated by task 3726: [ 131.069567] kasan_save_stack+0x1c/0x40 [ 131.074090] kasan_save_track+0x10/0x30 [ 131.078605] __kasan_krealloc+0x17f/0x1e0 [ 131.083293] krealloc_noprof+0x127/0x380 [ 131.087892] krealloc_less_oob_helper+0x19b/0xeb0 [kasan_test] [ 131.094400] kunit_try_run_case+0x175/0x440 [ 131.099257] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 131.105329] kthread+0x3b4/0x780 [ 131.109239] ret_from_fork+0x30/0x70 [ 131.113494] ret_from_fork_asm+0x1a/0x30 [ 131.120270] The buggy address belongs to the object at ffff888131e61e00 which belongs to the cache kmalloc-256 of size 256 [ 131.134118] The buggy address is located 34 bytes to the right of allocated 201-byte region [ffff888131e61e00, ffff888131e61ec9) [ 131.150662] The buggy address belongs to the physical page: [ 131.156901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x131e60 [ 131.165565] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 131.173879] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 131.181504] page_type: f5(slab) [ 131.185325] raw: 0017ffffc0000040 ffff888100042b40 dead000000000122 0000000000000000 [ 131.193725] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 131.202126] head: 0017ffffc0000040 ffff888100042b40 dead000000000122 0000000000000000 [ 131.210615] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 131.219104] head: 0017ffffc0000002 ffffea0004c79801 00000000ffffffff 00000000ffffffff [ 131.227591] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 131.236079] page dumped because: kasan: bad access detected [ 131.244499] Memory state around the buggy address: [ 131.249961] ffff888131e61d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 131.257845] ffff888131e61e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 131.265727] >ffff888131e61e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 131.273610] ^ [ 131.280887] ffff888131e61f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 131.288771] ffff888131e61f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 131.296653] ================================================================== [ 131.304618] # krealloc_less_oob: Test should be marked slow (runtime: 2.297989877s) [ 131.304873] ok 12 krealloc_less_oob [ 131.313716] ================================================================== [ 131.326113] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x770/0x820 [kasan_test] [ 131.335474] Write of size 1 at addr ffff88810203e0eb by task kunit_try_catch/3734 [ 131.345799] CPU: 3 UID: 0 PID: 3734 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 131.345806] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 131.345808] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 131.345810] Call Trace: [ 131.345813] [ 131.345816] dump_stack_lvl+0x4f/0x70 [ 131.345823] print_address_description.constprop.0+0x2c/0x3b0 [ 131.345831] ? krealloc_more_oob_helper+0x770/0x820 [kasan_test] [ 131.345841] print_report+0xb9/0x280 [ 131.345846] ? krealloc_more_oob_helper+0x770/0x820 [kasan_test] [ 131.345854] ? kasan_addr_to_slab+0x9/0x90 [ 131.345858] ? krealloc_more_oob_helper+0x770/0x820 [kasan_test] [ 131.345867] kasan_report+0xda/0x110 [ 131.345871] ? krealloc_more_oob_helper+0x770/0x820 [kasan_test] [ 131.345880] krealloc_more_oob_helper+0x770/0x820 [kasan_test] [ 131.345890] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [kasan_test] [ 131.345898] ? finish_task_switch.isra.0+0x155/0x750 [ 131.345902] ? __switch_to+0x5ba/0x1020 [ 131.345906] ? __schedule+0x757/0x1420 [ 131.345910] ? __pfx_read_tsc+0x10/0x10 [ 131.345913] ? ktime_get_ts64+0x7f/0x220 [ 131.345917] kunit_try_run_case+0x175/0x440 [ 131.345921] ? __pfx_kunit_try_run_case+0x10/0x10 [ 131.345924] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 131.345928] ? __pfx_kunit_try_run_case+0x10/0x10 [ 131.345930] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 131.345934] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 131.345937] kthread+0x3b4/0x780 [ 131.345942] ? __pfx_kthread+0x10/0x10 [ 131.345945] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 131.345949] ? __pfx_kthread+0x10/0x10 [ 131.345952] ret_from_fork+0x30/0x70 [ 131.345956] ? __pfx_kthread+0x10/0x10 [ 131.345959] ret_from_fork_asm+0x1a/0x30 [ 131.345964] [ 131.538200] The buggy address belongs to the physical page: [ 131.544441] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10203c [ 131.553106] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 131.561422] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 131.569055] page_type: f8(unknown) [ 131.573146] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 131.581548] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 131.589951] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 131.598441] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 131.606929] head: 0017ffffc0000002 ffffea0004080f01 00000000ffffffff 00000000ffffffff [ 131.615420] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 131.623905] page dumped because: kasan: bad access detected [ 131.632325] Memory state around the buggy address: [ 131.637786] ffff88810203df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 131.645671] ffff88810203e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 131.653556] >ffff88810203e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 131.661439] ^ [ 131.668717] ffff88810203e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 131.676600] ffff88810203e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 131.684486] ================================================================== [ 131.692480] ================================================================== [ 131.700371] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x742/0x820 [kasan_test] [ 131.709733] Write of size 1 at addr ffff88810203e0f0 by task kunit_try_catch/3734 [ 131.720075] CPU: 3 UID: 0 PID: 3734 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 131.720082] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 131.720084] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 131.720086] Call Trace: [ 131.720098] [ 131.720100] dump_stack_lvl+0x4f/0x70 [ 131.720107] print_address_description.constprop.0+0x2c/0x3b0 [ 131.720114] ? krealloc_more_oob_helper+0x742/0x820 [kasan_test] [ 131.720124] print_report+0xb9/0x280 [ 131.720129] ? krealloc_more_oob_helper+0x742/0x820 [kasan_test] [ 131.720137] ? kasan_addr_to_slab+0x9/0x90 [ 131.720142] ? krealloc_more_oob_helper+0x742/0x820 [kasan_test] [ 131.720150] kasan_report+0xda/0x110 [ 131.720155] ? krealloc_more_oob_helper+0x742/0x820 [kasan_test] [ 131.720164] krealloc_more_oob_helper+0x742/0x820 [kasan_test] [ 131.720174] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [kasan_test] [ 131.720182] ? finish_task_switch.isra.0+0x155/0x750 [ 131.720186] ? __switch_to+0x5ba/0x1020 [ 131.720189] ? __schedule+0x757/0x1420 [ 131.720193] ? __pfx_read_tsc+0x10/0x10 [ 131.720196] ? ktime_get_ts64+0x7f/0x220 [ 131.720200] kunit_try_run_case+0x175/0x440 [ 131.720203] ? __pfx_kunit_try_run_case+0x10/0x10 [ 131.720206] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 131.720210] ? __pfx_kunit_try_run_case+0x10/0x10 [ 131.720212] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 131.720216] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 131.720219] kthread+0x3b4/0x780 [ 131.720224] ? __pfx_kthread+0x10/0x10 [ 131.720227] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 131.720230] ? __pfx_kthread+0x10/0x10 [ 131.720234] ret_from_fork+0x30/0x70 [ 131.720237] ? __pfx_kthread+0x10/0x10 [ 131.720240] ret_from_fork_asm+0x1a/0x30 [ 131.720246] [ 131.912497] The buggy address belongs to the physical page: [ 131.918738] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10203c [ 131.927402] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 131.935720] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 131.943349] page_type: f8(unknown) [ 131.947430] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 131.955836] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 131.964240] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 131.972731] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 131.981219] head: 0017ffffc0000002 ffffea0004080f01 00000000ffffffff 00000000ffffffff [ 131.989709] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 131.998198] page dumped because: kasan: bad access detected [ 132.006618] Memory state around the buggy address: [ 132.012082] ffff88810203df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 132.019968] ffff88810203e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 132.027852] >ffff88810203e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 132.035736] ^ [ 132.043278] ffff88810203e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 132.051162] ffff88810203e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 132.059046] ================================================================== [ 132.067286] ok 13 krealloc_large_more_oob [ 132.067445] ================================================================== [ 132.080362] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xc4d/0xeb0 [kasan_test] [ 132.089730] Write of size 1 at addr ffff88810203e0c9 by task kunit_try_catch/3737 [ 132.100063] CPU: 3 UID: 0 PID: 3737 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 132.100080] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 132.100081] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 132.100083] Call Trace: [ 132.100086] [ 132.100089] dump_stack_lvl+0x4f/0x70 [ 132.100096] print_address_description.constprop.0+0x2c/0x3b0 [ 132.100104] ? krealloc_less_oob_helper+0xc4d/0xeb0 [kasan_test] [ 132.100114] print_report+0xb9/0x280 [ 132.100119] ? krealloc_less_oob_helper+0xc4d/0xeb0 [kasan_test] [ 132.100127] ? kasan_addr_to_slab+0x9/0x90 [ 132.100131] ? krealloc_less_oob_helper+0xc4d/0xeb0 [kasan_test] [ 132.100140] kasan_report+0xda/0x110 [ 132.100144] ? krealloc_less_oob_helper+0xc4d/0xeb0 [kasan_test] [ 132.100154] krealloc_less_oob_helper+0xc4d/0xeb0 [kasan_test] [ 132.100164] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [kasan_test] [ 132.100172] ? finish_task_switch.isra.0+0x155/0x750 [ 132.100176] ? __switch_to+0x5ba/0x1020 [ 132.100180] ? __schedule+0x757/0x1420 [ 132.100183] ? __pfx_read_tsc+0x10/0x10 [ 132.100187] ? ktime_get_ts64+0x7f/0x220 [ 132.100191] kunit_try_run_case+0x175/0x440 [ 132.100195] ? __pfx_kunit_try_run_case+0x10/0x10 [ 132.100197] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 132.100202] ? __pfx_kunit_try_run_case+0x10/0x10 [ 132.100204] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 132.100208] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 132.100211] kthread+0x3b4/0x780 [ 132.100216] ? __pfx_kthread+0x10/0x10 [ 132.100219] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 132.100222] ? __pfx_kthread+0x10/0x10 [ 132.100225] ret_from_fork+0x30/0x70 [ 132.100229] ? __pfx_kthread+0x10/0x10 [ 132.100232] ret_from_fork_asm+0x1a/0x30 [ 132.100237] [ 132.292518] The buggy address belongs to the physical page: [ 132.298760] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10203c [ 132.307422] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 132.315738] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 132.323364] page_type: f8(unknown) [ 132.327449] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 132.335854] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 132.344256] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 132.352747] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 132.361237] head: 0017ffffc0000002 ffffea0004080f01 00000000ffffffff 00000000ffffffff [ 132.369726] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 132.378216] page dumped because: kasan: bad access detected [ 132.386633] Memory state around the buggy address: [ 132.392097] ffff88810203df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 132.399981] ffff88810203e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 132.407866] >ffff88810203e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 132.415750] ^ [ 132.421993] ffff88810203e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 132.429879] ffff88810203e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 132.437762] ================================================================== [ 132.445681] ================================================================== [ 132.453570] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xcba/0xeb0 [kasan_test] [ 132.462932] Write of size 1 at addr ffff88810203e0d0 by task kunit_try_catch/3737 [ 132.473264] CPU: 3 UID: 0 PID: 3737 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 132.473271] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 132.473273] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 132.473275] Call Trace: [ 132.473277] [ 132.473279] dump_stack_lvl+0x4f/0x70 [ 132.473286] print_address_description.constprop.0+0x2c/0x3b0 [ 132.473293] ? krealloc_less_oob_helper+0xcba/0xeb0 [kasan_test] [ 132.473304] print_report+0xb9/0x280 [ 132.473308] ? krealloc_less_oob_helper+0xcba/0xeb0 [kasan_test] [ 132.473317] ? kasan_addr_to_slab+0x9/0x90 [ 132.473320] ? krealloc_less_oob_helper+0xcba/0xeb0 [kasan_test] [ 132.473329] kasan_report+0xda/0x110 [ 132.473333] ? krealloc_less_oob_helper+0xcba/0xeb0 [kasan_test] [ 132.473342] krealloc_less_oob_helper+0xcba/0xeb0 [kasan_test] [ 132.473351] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [kasan_test] [ 132.473359] ? finish_task_switch.isra.0+0x155/0x750 [ 132.473363] ? __switch_to+0x5ba/0x1020 [ 132.473367] ? __schedule+0x757/0x1420 [ 132.473371] ? __pfx_read_tsc+0x10/0x10 [ 132.473374] ? ktime_get_ts64+0x7f/0x220 [ 132.473378] kunit_try_run_case+0x175/0x440 [ 132.473382] ? __pfx_kunit_try_run_case+0x10/0x10 [ 132.473384] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 132.473388] ? __pfx_kunit_try_run_case+0x10/0x10 [ 132.473391] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 132.473394] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 132.473397] kthread+0x3b4/0x780 [ 132.473402] ? __pfx_kthread+0x10/0x10 [ 132.473405] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 132.473409] ? __pfx_kthread+0x10/0x10 [ 132.473412] ret_from_fork+0x30/0x70 [ 132.473415] ? __pfx_kthread+0x10/0x10 [ 132.473418] ret_from_fork_asm+0x1a/0x30 [ 132.473424] [ 132.665686] The buggy address belongs to the physical page: [ 132.671929] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10203c [ 132.680594] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 132.688908] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 132.696534] page_type: f8(unknown) [ 132.700618] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 132.709033] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 132.717437] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 132.725925] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 132.734415] head: 0017ffffc0000002 ffffea0004080f01 00000000ffffffff 00000000ffffffff [ 132.742903] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 132.751391] page dumped because: kasan: bad access detected [ 132.759811] Memory state around the buggy address: [ 132.765273] ffff88810203df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 132.773157] ffff88810203e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 132.781048] >ffff88810203e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 132.788939] ^ [ 132.795438] ffff88810203e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 132.803322] ffff88810203e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 132.811203] ================================================================== [ 132.819105] ================================================================== [ 132.827001] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd0f/0xeb0 [kasan_test] [ 132.836367] Write of size 1 at addr ffff88810203e0da by task kunit_try_catch/3737 [ 132.846691] CPU: 3 UID: 0 PID: 3737 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 132.846698] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 132.846700] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 132.846702] Call Trace: [ 132.846706] [ 132.846708] dump_stack_lvl+0x4f/0x70 [ 132.846716] print_address_description.constprop.0+0x2c/0x3b0 [ 132.846725] ? krealloc_less_oob_helper+0xd0f/0xeb0 [kasan_test] [ 132.846736] print_report+0xb9/0x280 [ 132.846741] ? krealloc_less_oob_helper+0xd0f/0xeb0 [kasan_test] [ 132.846750] ? kasan_addr_to_slab+0x9/0x90 [ 132.846755] ? krealloc_less_oob_helper+0xd0f/0xeb0 [kasan_test] [ 132.846763] kasan_report+0xda/0x110 [ 132.846768] ? krealloc_less_oob_helper+0xd0f/0xeb0 [kasan_test] [ 132.846777] krealloc_less_oob_helper+0xd0f/0xeb0 [kasan_test] [ 132.846788] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [kasan_test] [ 132.846796] ? finish_task_switch.isra.0+0x155/0x750 [ 132.846800] ? __switch_to+0x5ba/0x1020 [ 132.846804] ? __schedule+0x757/0x1420 [ 132.846808] ? __pfx_read_tsc+0x10/0x10 [ 132.846811] ? ktime_get_ts64+0x7f/0x220 [ 132.846814] kunit_try_run_case+0x175/0x440 [ 132.846818] ? __pfx_kunit_try_run_case+0x10/0x10 [ 132.846821] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 132.846826] ? __pfx_kunit_try_run_case+0x10/0x10 [ 132.846828] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 132.846832] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 132.846835] kthread+0x3b4/0x780 [ 132.846840] ? __pfx_kthread+0x10/0x10 [ 132.846843] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 132.846847] ? __pfx_kthread+0x10/0x10 [ 132.846850] ret_from_fork+0x30/0x70 [ 132.846854] ? __pfx_kthread+0x10/0x10 [ 132.846857] ret_from_fork_asm+0x1a/0x30 [ 132.846862] [ 133.039093] The buggy address belongs to the physical page: [ 133.045331] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10203c [ 133.053993] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 133.062308] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 133.069932] page_type: f8(unknown) [ 133.074014] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 133.082428] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 133.090829] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 133.099316] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 133.107805] head: 0017ffffc0000002 ffffea0004080f01 00000000ffffffff 00000000ffffffff [ 133.116293] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 133.124782] page dumped because: kasan: bad access detected [ 133.133213] Memory state around the buggy address: [ 133.138676] ffff88810203df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 133.146559] ffff88810203e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 133.154443] >ffff88810203e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 133.162324] ^ [ 133.169094] ffff88810203e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 133.176976] ffff88810203e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 133.184858] ================================================================== [ 133.192799] ================================================================== [ 133.200683] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xcf5/0xeb0 [kasan_test] [ 133.210046] Write of size 1 at addr ffff88810203e0ea by task kunit_try_catch/3737 [ 133.220377] CPU: 3 UID: 0 PID: 3737 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 133.220383] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 133.220385] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 133.220387] Call Trace: [ 133.220389] [ 133.220392] dump_stack_lvl+0x4f/0x70 [ 133.220399] print_address_description.constprop.0+0x2c/0x3b0 [ 133.220407] ? krealloc_less_oob_helper+0xcf5/0xeb0 [kasan_test] [ 133.220417] print_report+0xb9/0x280 [ 133.220422] ? krealloc_less_oob_helper+0xcf5/0xeb0 [kasan_test] [ 133.220431] ? kasan_addr_to_slab+0x9/0x90 [ 133.220436] ? krealloc_less_oob_helper+0xcf5/0xeb0 [kasan_test] [ 133.220444] kasan_report+0xda/0x110 [ 133.220448] ? krealloc_less_oob_helper+0xcf5/0xeb0 [kasan_test] [ 133.220456] krealloc_less_oob_helper+0xcf5/0xeb0 [kasan_test] [ 133.220466] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [kasan_test] [ 133.220474] ? finish_task_switch.isra.0+0x155/0x750 [ 133.220478] ? __switch_to+0x5ba/0x1020 [ 133.220482] ? __schedule+0x757/0x1420 [ 133.220486] ? __pfx_read_tsc+0x10/0x10 [ 133.220489] ? ktime_get_ts64+0x7f/0x220 [ 133.220493] kunit_try_run_case+0x175/0x440 [ 133.220497] ? __pfx_kunit_try_run_case+0x10/0x10 [ 133.220500] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 133.220504] ? __pfx_kunit_try_run_case+0x10/0x10 [ 133.220506] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 133.220510] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 133.220513] kthread+0x3b4/0x780 [ 133.220517] ? __pfx_kthread+0x10/0x10 [ 133.220521] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 133.220524] ? __pfx_kthread+0x10/0x10 [ 133.220528] ret_from_fork+0x30/0x70 [ 133.220532] ? __pfx_kthread+0x10/0x10 [ 133.220535] ret_from_fork_asm+0x1a/0x30 [ 133.220540] [ 133.283431] LKP: stdout: 3340: HOSTNAME lkp-hsw-d03, MAC f8:b1:56:e3:03:ca, kernel 6.15.0-rc7-00008-gfe301d6b4b4a 1 [ 133.287413] The buggy address belongs to the physical page: [ 133.287417] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10203c [ 133.298327] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 133.298330] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 133.298334] page_type: f8(unknown) [ 133.298348] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 133.469322] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 133.477726] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 133.486214] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 133.494703] head: 0017ffffc0000002 ffffea0004080f01 00000000ffffffff 00000000ffffffff [ 133.503190] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 133.511678] page dumped because: kasan: bad access detected [ 133.520102] Memory state around the buggy address: [ 133.525567] ffff88810203df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 133.533450] ffff88810203e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 133.541335] >ffff88810203e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 133.549217] ^ [ 133.556499] ffff88810203e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 133.564381] ffff88810203e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 133.572264] ================================================================== [ 133.580173] ================================================================== [ 133.588086] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xc36/0xeb0 [kasan_test] [ 133.597446] Write of size 1 at addr ffff88810203e0eb by task kunit_try_catch/3737 [ 133.607765] CPU: 3 UID: 0 PID: 3737 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 133.607772] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 133.607774] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 133.607776] Call Trace: [ 133.607778] [ 133.607781] dump_stack_lvl+0x4f/0x70 [ 133.607788] print_address_description.constprop.0+0x2c/0x3b0 [ 133.607796] ? krealloc_less_oob_helper+0xc36/0xeb0 [kasan_test] [ 133.607807] print_report+0xb9/0x280 [ 133.607811] ? krealloc_less_oob_helper+0xc36/0xeb0 [kasan_test] [ 133.607820] ? kasan_addr_to_slab+0x9/0x90 [ 133.607824] ? krealloc_less_oob_helper+0xc36/0xeb0 [kasan_test] [ 133.607833] kasan_report+0xda/0x110 [ 133.607837] ? krealloc_less_oob_helper+0xc36/0xeb0 [kasan_test] [ 133.607846] krealloc_less_oob_helper+0xc36/0xeb0 [kasan_test] [ 133.607856] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [kasan_test] [ 133.607864] ? finish_task_switch.isra.0+0x155/0x750 [ 133.607868] ? __switch_to+0x5ba/0x1020 [ 133.607871] ? __schedule+0x757/0x1420 [ 133.607875] ? __pfx_read_tsc+0x10/0x10 [ 133.607878] ? ktime_get_ts64+0x7f/0x220 [ 133.607882] kunit_try_run_case+0x175/0x440 [ 133.607886] ? __pfx_kunit_try_run_case+0x10/0x10 [ 133.607889] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 133.607893] ? __pfx_kunit_try_run_case+0x10/0x10 [ 133.607895] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 133.607899] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 133.607902] kthread+0x3b4/0x780 [ 133.607906] ? __pfx_kthread+0x10/0x10 [ 133.607909] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 133.607913] ? __pfx_kthread+0x10/0x10 [ 133.607916] ret_from_fork+0x30/0x70 [ 133.607919] ? __pfx_kthread+0x10/0x10 [ 133.607922] ret_from_fork_asm+0x1a/0x30 [ 133.607928] [ 133.800146] The buggy address belongs to the physical page: [ 133.806386] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10203c [ 133.815048] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 133.823375] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 133.831001] page_type: f8(unknown) [ 133.835085] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 133.843487] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 133.851890] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 133.860379] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 133.868869] head: 0017ffffc0000002 ffffea0004080f01 00000000ffffffff 00000000ffffffff [ 133.877359] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 133.885847] page dumped because: kasan: bad access detected [ 133.894275] Memory state around the buggy address: [ 133.899739] ffff88810203df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 133.907623] ffff88810203e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 133.915508] >ffff88810203e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 133.923390] ^ [ 133.930669] ffff88810203e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 133.938552] ffff88810203e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 133.946435] ================================================================== [ 133.954656] ok 14 krealloc_large_less_oob [ 133.954843] ================================================================== [ 133.967748] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1ab/0x580 [kasan_test] [ 133.976158] Read of size 1 at addr ffff888198ee0a00 by task kunit_try_catch/3747 [ 133.986393] CPU: 7 UID: 0 PID: 3747 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 133.986399] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 133.986401] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 133.986403] Call Trace: [ 133.986405] [ 133.986407] dump_stack_lvl+0x4f/0x70 [ 133.986414] print_address_description.constprop.0+0x2c/0x3b0 [ 133.986421] ? krealloc_uaf+0x1ab/0x580 [kasan_test] [ 133.986430] print_report+0xb9/0x280 [ 133.986434] ? krealloc_uaf+0x1ab/0x580 [kasan_test] [ 133.986442] ? kasan_addr_to_slab+0x9/0x90 [ 133.986446] ? krealloc_uaf+0x1ab/0x580 [kasan_test] [ 133.986454] kasan_report+0xda/0x110 [ 133.986457] ? krealloc_uaf+0x1ab/0x580 [kasan_test] [ 133.986466] ? krealloc_uaf+0x1ab/0x580 [kasan_test] [ 133.986474] __kasan_check_byte+0x32/0x40 [ 133.986477] krealloc_noprof+0x38/0x380 [ 133.986481] ? kasan_save_track+0x10/0x30 [ 133.986484] krealloc_uaf+0x1ab/0x580 [kasan_test] [ 133.986494] ? __pfx_krealloc_uaf+0x10/0x10 [kasan_test] [ 133.986502] ? finish_task_switch.isra.0+0x155/0x750 [ 133.986506] ? __switch_to+0x5ba/0x1020 [ 133.986510] ? __schedule+0x757/0x1420 [ 133.986513] ? __pfx_read_tsc+0x10/0x10 [ 133.986517] ? ktime_get_ts64+0x7f/0x220 [ 133.986521] kunit_try_run_case+0x175/0x440 [ 133.986525] ? __pfx_kunit_try_run_case+0x10/0x10 [ 133.986527] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 133.986532] ? __pfx_kunit_try_run_case+0x10/0x10 [ 133.986534] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 133.986537] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 133.986540] kthread+0x3b4/0x780 [ 133.986545] ? __pfx_kthread+0x10/0x10 [ 133.986548] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 133.986551] ? __pfx_kthread+0x10/0x10 [ 133.986554] ret_from_fork+0x30/0x70 [ 133.986558] ? __pfx_kthread+0x10/0x10 [ 133.986561] ret_from_fork_asm+0x1a/0x30 [ 133.986566] [ 134.192045] Allocated by task 3747: [ 134.196221] kasan_save_stack+0x1c/0x40 [ 134.200737] kasan_save_track+0x10/0x30 [ 134.205248] __kasan_kmalloc+0xa6/0xb0 [ 134.209672] krealloc_uaf+0xae/0x580 [kasan_test] [ 134.215067] kunit_try_run_case+0x175/0x440 [ 134.219935] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 134.226002] kthread+0x3b4/0x780 [ 134.229910] ret_from_fork+0x30/0x70 [ 134.234164] ret_from_fork_asm+0x1a/0x30 [ 134.240937] Freed by task 3747: [ 134.244754] kasan_save_stack+0x1c/0x40 [ 134.249268] kasan_save_track+0x10/0x30 [ 134.253782] kasan_save_free_info+0x37/0x60 [ 134.258641] __kasan_slab_free+0x4d/0x70 [ 134.263241] kfree+0x23f/0x440 [ 134.266975] krealloc_uaf+0x130/0x580 [kasan_test] [ 134.272444] kunit_try_run_case+0x175/0x440 [ 134.277303] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 134.283369] kthread+0x3b4/0x780 [ 134.287279] ret_from_fork+0x30/0x70 [ 134.291532] ret_from_fork_asm+0x1a/0x30 [ 134.298307] The buggy address belongs to the object at ffff888198ee0a00 which belongs to the cache kmalloc-256 of size 256 [ 134.312152] The buggy address is located 0 bytes inside of freed 256-byte region [ffff888198ee0a00, ffff888198ee0b00) [ 134.327743] The buggy address belongs to the physical page: [ 134.333981] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x198ee0 [ 134.342644] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 134.350959] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 134.358586] page_type: f5(slab) [ 134.362407] raw: 0017ffffc0000040 ffff888100042b40 dead000000000122 0000000000000000 [ 134.370810] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 134.379213] head: 0017ffffc0000040 ffff888100042b40 dead000000000122 0000000000000000 [ 134.387703] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 134.396191] head: 0017ffffc0000002 ffffea000663b801 00000000ffffffff 00000000ffffffff [ 134.404680] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 134.413168] page dumped because: kasan: bad access detected [ 134.421585] Memory state around the buggy address: [ 134.427046] ffff888198ee0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 134.434937] ffff888198ee0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 134.442817] >ffff888198ee0a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 134.450696] ^ [ 134.454603] ffff888198ee0a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 134.462485] ffff888198ee0b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 134.470365] ================================================================== [ 134.478363] ================================================================== [ 134.486244] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4fc/0x580 [kasan_test] [ 134.494652] Read of size 1 at addr ffff888198ee0a00 by task kunit_try_catch/3747 [ 134.504886] CPU: 7 UID: 0 PID: 3747 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 134.504893] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 134.504894] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 134.504896] Call Trace: [ 134.504899] [ 134.504901] dump_stack_lvl+0x4f/0x70 [ 134.504907] print_address_description.constprop.0+0x2c/0x3b0 [ 134.504913] ? krealloc_uaf+0x4fc/0x580 [kasan_test] [ 134.504923] print_report+0xb9/0x280 [ 134.504927] ? krealloc_uaf+0x4fc/0x580 [kasan_test] [ 134.504934] ? kasan_addr_to_slab+0x9/0x90 [ 134.504938] ? krealloc_uaf+0x4fc/0x580 [kasan_test] [ 134.504946] kasan_report+0xda/0x110 [ 134.504950] ? krealloc_uaf+0x4fc/0x580 [kasan_test] [ 134.504958] krealloc_uaf+0x4fc/0x580 [kasan_test] [ 134.504968] ? __pfx_krealloc_uaf+0x10/0x10 [kasan_test] [ 134.504976] ? finish_task_switch.isra.0+0x155/0x750 [ 134.504979] ? __switch_to+0x5ba/0x1020 [ 134.504983] ? __schedule+0x757/0x1420 [ 134.504986] ? __pfx_read_tsc+0x10/0x10 [ 134.504989] ? ktime_get_ts64+0x7f/0x220 [ 134.504993] kunit_try_run_case+0x175/0x440 [ 134.504997] ? __pfx_kunit_try_run_case+0x10/0x10 [ 134.505000] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 134.505004] ? __pfx_kunit_try_run_case+0x10/0x10 [ 134.505006] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 134.505009] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 134.505013] kthread+0x3b4/0x780 [ 134.505018] ? __pfx_kthread+0x10/0x10 [ 134.505033] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 134.505037] ? __pfx_kthread+0x10/0x10 [ 134.505040] ret_from_fork+0x30/0x70 [ 134.505044] ? __pfx_kthread+0x10/0x10 [ 134.505047] ret_from_fork_asm+0x1a/0x30 [ 134.505052] [ 134.691043] Allocated by task 3747: [ 134.695216] kasan_save_stack+0x1c/0x40 [ 134.699731] kasan_save_track+0x10/0x30 [ 134.704239] __kasan_kmalloc+0xa6/0xb0 [ 134.708664] krealloc_uaf+0xae/0x580 [kasan_test] [ 134.714047] kunit_try_run_case+0x175/0x440 [ 134.718915] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 134.724985] kthread+0x3b4/0x780 [ 134.728892] ret_from_fork+0x30/0x70 [ 134.733145] ret_from_fork_asm+0x1a/0x30 [ 134.739921] Freed by task 3747: [ 134.743738] kasan_save_stack+0x1c/0x40 [ 134.748249] kasan_save_track+0x10/0x30 [ 134.752761] kasan_save_free_info+0x37/0x60 [ 134.757618] __kasan_slab_free+0x4d/0x70 [ 134.762216] kfree+0x23f/0x440 [ 134.765952] krealloc_uaf+0x130/0x580 [kasan_test] [ 134.771423] kunit_try_run_case+0x175/0x440 [ 134.776280] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 134.782347] kthread+0x3b4/0x780 [ 134.786257] ret_from_fork+0x30/0x70 [ 134.790511] ret_from_fork_asm+0x1a/0x30 [ 134.797282] The buggy address belongs to the object at ffff888198ee0a00 which belongs to the cache kmalloc-256 of size 256 [ 134.811125] The buggy address is located 0 bytes inside of freed 256-byte region [ffff888198ee0a00, ffff888198ee0b00) [ 134.826718] The buggy address belongs to the physical page: [ 134.832956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x198ee0 [ 134.841617] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 134.849928] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 134.857550] page_type: f5(slab) [ 134.861371] raw: 0017ffffc0000040 ffff888100042b40 dead000000000122 0000000000000000 [ 134.869772] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 134.878173] head: 0017ffffc0000040 ffff888100042b40 dead000000000122 0000000000000000 [ 134.886657] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 134.895143] head: 0017ffffc0000002 ffffea000663b801 00000000ffffffff 00000000ffffffff [ 134.903628] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 134.912112] page dumped because: kasan: bad access detected [ 134.920529] Memory state around the buggy address: [ 134.925989] ffff888198ee0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 134.933869] ffff888198ee0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 134.941749] >ffff888198ee0a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 134.949628] ^ [ 134.953533] ffff888198ee0a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 134.961410] ffff888198ee0b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 134.969290] ================================================================== [ 134.977527] ok 15 krealloc_uaf [ 134.977802] ok 16 kmalloc_oob_16 # SKIP Test requires checked mem*() [ 134.983463] ok 17 kmalloc_uaf_16 # SKIP Test requires checked mem*() [ 134.991132] ok 18 kmalloc_oob_in_memset # SKIP Test requires checked mem*() [ 134.998813] ok 19 kmalloc_oob_memset_2 # SKIP Test requires checked mem*() [ 135.007106] ok 20 kmalloc_oob_memset_4 # SKIP Test requires checked mem*() [ 135.015366] ok 21 kmalloc_oob_memset_8 # SKIP Test requires checked mem*() [ 135.023517] ok 22 kmalloc_oob_memset_16 # SKIP Test requires checked mem*() [ 135.031660] ok 23 kmalloc_memmove_negative_size # SKIP Test requires checked mem*() [ 135.039909] ok 24 kmalloc_memmove_invalid_size # SKIP Test requires checked mem*() [ 135.048733] ================================================================== [ 135.065184] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x310/0x370 [kasan_test] [ 135.073509] Read of size 1 at addr ffff8881010628c8 by task kunit_try_catch/3770 [ 135.083745] CPU: 3 UID: 0 PID: 3770 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 135.083752] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 135.083754] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 135.083756] Call Trace: [ 135.083758] [ 135.083760] dump_stack_lvl+0x4f/0x70 [ 135.083767] print_address_description.constprop.0+0x2c/0x3b0 [ 135.083775] ? kmalloc_uaf+0x310/0x370 [kasan_test] [ 135.083784] print_report+0xb9/0x280 [ 135.083789] ? kmalloc_uaf+0x310/0x370 [kasan_test] [ 135.083797] ? kasan_addr_to_slab+0x9/0x90 [ 135.083801] ? kmalloc_uaf+0x310/0x370 [kasan_test] [ 135.083809] kasan_report+0xda/0x110 [ 135.083813] ? kmalloc_uaf+0x310/0x370 [kasan_test] [ 135.083822] kmalloc_uaf+0x310/0x370 [kasan_test] [ 135.083832] ? __pfx_kmalloc_uaf+0x10/0x10 [kasan_test] [ 135.083840] ? __schedule+0x757/0x1420 [ 135.083844] ? __pfx_read_tsc+0x10/0x10 [ 135.083847] ? ktime_get_ts64+0x7f/0x220 [ 135.083851] kunit_try_run_case+0x175/0x440 [ 135.083855] ? __pfx_kunit_try_run_case+0x10/0x10 [ 135.083858] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 135.083862] ? __pfx_kunit_try_run_case+0x10/0x10 [ 135.083864] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 135.083868] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 135.083872] kthread+0x3b4/0x780 [ 135.083876] ? __pfx_kthread+0x10/0x10 [ 135.083879] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 135.083883] ? __pfx_kthread+0x10/0x10 [ 135.083886] ret_from_fork+0x30/0x70 [ 135.083890] ? __pfx_kthread+0x10/0x10 [ 135.083893] ret_from_fork_asm+0x1a/0x30 [ 135.083898] [ 135.259261] Allocated by task 3770: [ 135.263432] kasan_save_stack+0x1c/0x40 [ 135.267949] kasan_save_track+0x10/0x30 [ 135.272463] __kasan_kmalloc+0xa6/0xb0 [ 135.276891] kmalloc_uaf+0x96/0x370 [kasan_test] [ 135.282189] kunit_try_run_case+0x175/0x440 [ 135.287050] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 135.293143] kthread+0x3b4/0x780 [ 135.297062] ret_from_fork+0x30/0x70 [ 135.301316] ret_from_fork_asm+0x1a/0x30 [ 135.308097] Freed by task 3770: [ 135.311918] kasan_save_stack+0x1c/0x40 [ 135.316433] kasan_save_track+0x10/0x30 [ 135.320948] kasan_save_free_info+0x37/0x60 [ 135.325808] __kasan_slab_free+0x4d/0x70 [ 135.330409] kfree+0x23f/0x440 [ 135.334147] kmalloc_uaf+0x118/0x370 [kasan_test] [ 135.339531] kunit_try_run_case+0x175/0x440 [ 135.344392] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 135.350465] kthread+0x3b4/0x780 [ 135.354374] ret_from_fork+0x30/0x70 [ 135.358631] ret_from_fork_asm+0x1a/0x30 [ 135.365411] The buggy address belongs to the object at ffff8881010628c0 which belongs to the cache kmalloc-16 of size 16 [ 135.379093] The buggy address is located 8 bytes inside of freed 16-byte region [ffff8881010628c0, ffff8881010628d0) [ 135.394603] The buggy address belongs to the physical page: [ 135.400842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101062 [ 135.409505] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 135.416700] page_type: f5(slab) [ 135.420525] raw: 0017ffffc0000000 ffff888100042640 dead000000000100 dead000000000122 [ 135.428926] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 135.436381] install debs round one: dpkg -i --force-confdef --force-depends /opt/deb/ntpdate_1%3a4.2.8p15+dfsg-2~1.2.2+dfsg1-1+deb12u1_all.deb [ 135.437319] page dumped because: kasan: bad access detected [ 135.437323] Memory state around the buggy address: [ 135.437326] ffff888101062780: 00 05 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 135.437328] ffff888101062800: 00 06 fc fc 00 00 fc fc 00 05 fc fc fa fb fc fc [ 135.456969] >ffff888101062880: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc [ 135.456971] ^ [ 135.456973] ffff888101062900: fa fb fc fc 00 05 fc fc 00 00 fc fc fa fb fc fc [ 135.456976] ffff888101062980: 00 07 fc fc 00 05 fc fc 00 00 fc fc fa fb fc fc [ 135.456989] ================================================================== [ 135.460217] /opt/deb/ntpsec-ntpdate_1.2.2+dfsg1-1+deb12u1_amd64.deb [ 135.465034] ok 25 kmalloc_uaf [ 135.480737] ok 26 kmalloc_uaf_memset # SKIP Test requires checked mem*() [ 135.483898] /opt/deb/python3-ntp_1.2.2+dfsg1-1+deb12u1_amd64.deb [ 135.490667] ================================================================== [ 135.504614] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x477/0x4f0 [kasan_test] [ 135.513337] Selecting previously unselected package ntpdate. [ 135.520382] Read of size 1 at addr ffff888128c69ca8 by task kunit_try_catch/3777 [ 135.520389] CPU: 1 UID: 0 PID: 3777 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 135.520406] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 135.520408] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 135.520410] Call Trace: [ 135.520412] [ 135.520414] dump_stack_lvl+0x4f/0x70 [ 135.520419] print_address_description.constprop.0+0x2c/0x3b0 [ 135.520436] ? kmalloc_uaf2+0x477/0x4f0 [kasan_test] [ 135.520444] print_report+0xb9/0x280 [ 135.520448] ? kmalloc_uaf2+0x477/0x4f0 [kasan_test] [ 135.520457] ? kasan_addr_to_slab+0x9/0x90 [ 135.520460] ? kmalloc_uaf2+0x477/0x4f0 [kasan_test] [ 135.520468] kasan_report+0xda/0x110 [ 135.520472] ? kmalloc_uaf2+0x477/0x4f0 [kasan_test] [ 135.520481] kmalloc_uaf2+0x477/0x4f0 [kasan_test] [ 135.520490] ? __pfx_kmalloc_uaf2+0x10/0x10 [kasan_test] [ 135.520498] ? finish_task_switch.isra.0+0x155/0x750 [ 135.520502] ? __switch_to+0x5ba/0x1020 [ 135.520505] ? __schedule+0x757/0x1420 [ 135.520509] ? __pfx_read_tsc+0x10/0x10 [ 135.520512] ? ktime_get_ts64+0x7f/0x220 [ 135.520516] kunit_try_run_case+0x175/0x440 [ 135.520520] ? __pfx_kunit_try_run_case+0x10/0x10 [ 135.520523] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 135.520527] ? __pfx_kunit_try_run_case+0x10/0x10 [ 135.520529] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 135.520532] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 135.520536] kthread+0x3b4/0x780 [ 135.520540] ? __pfx_kthread+0x10/0x10 [ 135.520543] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 135.520546] ? __pfx_kthread+0x10/0x10 [ 135.520550] ret_from_fork+0x30/0x70 [ 135.520554] ? __pfx_kthread+0x10/0x10 [ 135.520556] ret_from_fork_asm+0x1a/0x30 [ 135.520562] [ 135.531314] Allocated by task 3777: [ 135.531316] kasan_save_stack+0x1c/0x40 [ 135.531320] kasan_save_track+0x10/0x30 [ 135.534693] (Reading database ... 16595 files and directories currently installed.) [ 135.541201] __kasan_kmalloc+0xa6/0xb0 [ 135.541204] kmalloc_uaf2+0xb3/0x4f0 [kasan_test] [ 135.555764] kunit_try_run_case+0x175/0x440 [ 135.555768] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 135.559475] Preparing to unpack .../ntpdate_1%3a4.2.8p15+dfsg-2~1.2.2+dfsg1-1+deb12u1_all.deb ... [ 135.566350] kthread+0x3b4/0x780 [ 135.566353] ret_from_fork+0x30/0x70 [ 135.580739] ret_from_fork_asm+0x1a/0x30 [ 135.580744] Freed by task 3777: [ 135.580745] kasan_save_stack+0x1c/0x40 [ 135.584104] Unpacking ntpdate (1:4.2.8p15+dfsg-2~1.2.2+dfsg1-1+deb12u1) ... [ 135.596250] kasan_save_track+0x10/0x30 [ 135.596253] kasan_save_free_info+0x37/0x60 [ 135.596256] __kasan_slab_free+0x4d/0x70 [ 135.610811] kfree+0x23f/0x440 [ 135.610814] kmalloc_uaf2+0x139/0x4f0 [kasan_test] [ 135.614894] Selecting previously unselected package ntpsec-ntpdate. [ 135.616726] kunit_try_run_case+0x175/0x440 [ 135.616730] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 135.627477] kthread+0x3b4/0x780 [ 135.627480] ret_from_fork+0x30/0x70 [ 135.634403] Preparing to unpack .../ntpsec-ntpdate_1.2.2+dfsg1-1+deb12u1_amd64.deb ... [ 135.637372] ret_from_fork_asm+0x1a/0x30 [ 135.637377] The buggy address belongs to the object at ffff888128c69c80 which belongs to the cache kmalloc-64 of size 64 [ 135.647785] The buggy address is located 40 bytes inside of freed 64-byte region [ffff888128c69c80, ffff888128c69cc0) [ 135.647789] The buggy address belongs to the physical page: [ 135.647791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x128c69 [ 135.654328] Unpacking ntpsec-ntpdate (1.2.2+dfsg1-1+deb12u1) ... [ 135.657679] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 135.657683] page_type: f5(slab) [ 135.668783] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0004007100 dead000000000003 [ 135.668785] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 135.675642] Selecting previously unselected package python3-ntp. [ 135.680403] page dumped because: kasan: bad access detected [ 135.680405] Memory state around the buggy address: [ 135.680407] ffff888128c69b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 135.689335] ffff888128c69c00: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 135.689337] >ffff888128c69c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 135.689338] ^ [ 135.689340] ffff888128c69d00: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 135.695120] Preparing to unpack .../python3-ntp_1.2.2+dfsg1-1+deb12u1_amd64.deb ... [ 135.698452] ffff888128c69d80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 135.698454] ================================================================== [ 135.698659] ok 27 kmalloc_uaf2 [ 135.704495] Unpacking python3-ntp (1.2.2+dfsg1-1+deb12u1) ... [ 135.709091] ok 28 kmalloc_uaf3 # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 135.720014] ================================================================== [ 135.727523] Setting up python3-ntp (1.2.2+dfsg1-1+deb12u1) ... [ 135.732721] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x18a/0x350 [kasan_test] [ 135.741042] Read of size 1 at addr ffff888415e7a1c0 by task kunit_try_catch/3782 [ 135.741049] CPU: 1 UID: 0 PID: 3782 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 135.741066] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 135.741067] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 135.741069] Call Trace: [ 135.741071] [ 135.741072] dump_stack_lvl+0x4f/0x70 [ 135.741078] print_address_description.constprop.0+0x2c/0x3b0 [ 135.741082] ? kmalloc_double_kzfree+0x18a/0x350 [kasan_test] [ 135.741103] print_report+0xb9/0x280 [ 135.741106] ? kmalloc_double_kzfree+0x18a/0x350 [kasan_test] [ 135.741115] ? kasan_addr_to_slab+0x9/0x90 [ 135.741118] ? kmalloc_double_kzfree+0x18a/0x350 [kasan_test] [ 135.741127] kasan_report+0xda/0x110 [ 135.741130] ? kmalloc_double_kzfree+0x18a/0x350 [kasan_test] [ 135.741140] ? kmalloc_double_kzfree+0x18a/0x350 [kasan_test] [ 135.741148] __kasan_check_byte+0x32/0x40 [ 135.741152] kfree_sensitive+0x1a/0x70 [ 135.741165] kmalloc_double_kzfree+0x18a/0x350 [kasan_test] [ 135.741184] ? __pfx_kmalloc_double_kzfree+0x10/0x10 [kasan_test] [ 135.741193] ? __schedule+0x757/0x1420 [ 135.741197] ? __pfx_read_tsc+0x10/0x10 [ 135.741200] ? ktime_get_ts64+0x7f/0x220 [ 135.741204] kunit_try_run_case+0x175/0x440 [ 135.741207] ? __pfx_kunit_try_run_case+0x10/0x10 [ 135.741210] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 135.741214] ? __pfx_kunit_try_run_case+0x10/0x10 [ 135.741217] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 135.741220] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 135.741223] kthread+0x3b4/0x780 [ 135.741227] ? __pfx_kthread+0x10/0x10 [ 135.741230] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 135.741234] ? __pfx_kthread+0x10/0x10 [ 135.741238] ret_from_fork+0x30/0x70 [ 135.741241] ? __pfx_kthread+0x10/0x10 [ 135.741244] ret_from_fork_asm+0x1a/0x30 [ 135.741249] [ 135.747485] Setting up ntpdate (1:4.2.8p15+dfsg-2~1.2.2+dfsg1-1+deb12u1) ... [ 135.750841] Allocated by task 3782: [ 135.750843] kasan_save_stack+0x1c/0x40 [ 135.750846] kasan_save_track+0x10/0x30 [ 135.759504] __kasan_kmalloc+0xa6/0xb0 [ 135.759507] kmalloc_double_kzfree+0x97/0x350 [kasan_test] [ 135.764976] Setting up ntpsec-ntpdate (1.2.2+dfsg1-1+deb12u1) ... [ 135.766974] kunit_try_run_case+0x175/0x440 [ 135.766976] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 135.766979] kthread+0x3b4/0x780 [ 135.766992] ret_from_fork+0x30/0x70 [ 135.771333] ret_from_fork_asm+0x1a/0x30 [ 135.771337] Freed by task 3782: [ 135.771338] kasan_save_stack+0x1c/0x40 [ 135.775696] NO_NETWORK= [ 135.780009] kasan_save_track+0x10/0x30 [ 135.780012] kasan_save_free_info+0x37/0x60 [ 135.780015] __kasan_slab_free+0x4d/0x70 [ 135.780030] kfree+0x23f/0x440 [ 135.792847] kmalloc_double_kzfree+0x119/0x350 [kasan_test] [ 135.792866] kunit_try_run_case+0x175/0x440 [ 135.797892] CLOCK: time stepped by -56155.067308 [ 135.802654] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 135.802657] kthread+0x3b4/0x780 [ 135.802659] ret_from_fork+0x30/0x70 [ 135.802672] ret_from_fork_asm+0x1a/0x30 [ 135.809692] The buggy address belongs to the object at ffff888415e7a1c0 which belongs to the cache kmalloc-16 of size 16 [ 135.809695] The buggy address is located 0 bytes inside of freed 16-byte region [ffff888415e7a1c0, ffff888415e7a1d0) [ 135.817618] 2025-05-28 16:49:35.38187 (+0000) -56155.067308 +/- 0.000379 internal-lkp-server 192.168.1.200 s5 no-leap [ 135.825276] The buggy address belongs to the physical page: [ 135.825277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888415e7ab60 pfn:0x415e7a [ 135.825280] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 135.833424] page_type: f5(slab) [ 135.833427] raw: 0017ffffc0000000 ffff888100042640 dead000000000100 dead000000000122 [ 135.833430] raw: ffff888415e7ab60 000000008080007b 00000000f5000000 0000000000000000 [ 136.574768] page dumped because: kasan: bad access detected [ 136.583186] Memory state around the buggy address: [ 136.588647] ffff888415e7a080: fa fb fc fc fa fb fc fc 00 00 fc fc 00 04 fc fc [ 136.596530] ffff888415e7a100: fa fb fc fc 00 06 fc fc fa fb fc fc 00 06 fc fc [ 136.604414] >ffff888415e7a180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 136.612296] ^ [ 136.618276] ffff888415e7a200: 00 00 fc fc 00 03 fc fc fa fb fc fc 00 01 fc fc [ 136.626157] ffff888415e7a280: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 136.634042] ================================================================== [ 136.642030] ================================================================== [ 136.649913] BUG: KASAN: double-free in kmalloc_double_kzfree+0x18a/0x350 [kasan_test] [ 136.658407] Free of addr ffff888415e7a1c0 by task kunit_try_catch/3782 [ 136.667780] CPU: 1 UID: 0 PID: 3782 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 136.667787] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 136.667789] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 136.667791] Call Trace: [ 136.667793] [ 136.667796] dump_stack_lvl+0x4f/0x70 [ 136.667803] print_address_description.constprop.0+0x2c/0x3b0 [ 136.667810] print_report+0xb9/0x280 [ 136.667814] ? kasan_addr_to_slab+0x9/0x90 [ 136.667819] ? kmalloc_double_kzfree+0x18a/0x350 [kasan_test] [ 136.667829] kasan_report_invalid_free+0xba/0xe0 [ 136.667834] ? kmalloc_double_kzfree+0x18a/0x350 [kasan_test] [ 136.667843] ? kmalloc_double_kzfree+0x18a/0x350 [kasan_test] [ 136.667851] check_slab_allocation+0xfa/0x120 [ 136.667855] kfree+0xf2/0x440 [ 136.667858] ? kmalloc_double_kzfree+0x18a/0x350 [kasan_test] [ 136.667867] kmalloc_double_kzfree+0x18a/0x350 [kasan_test] [ 136.667876] ? __pfx_kmalloc_double_kzfree+0x10/0x10 [kasan_test] [ 136.667885] ? __schedule+0x757/0x1420 [ 136.667888] ? __pfx_read_tsc+0x10/0x10 [ 136.667892] ? ktime_get_ts64+0x7f/0x220 [ 136.667895] kunit_try_run_case+0x175/0x440 [ 136.667899] ? __pfx_kunit_try_run_case+0x10/0x10 [ 136.667902] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 136.667906] ? __pfx_kunit_try_run_case+0x10/0x10 [ 136.667908] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 136.667912] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 136.667915] kthread+0x3b4/0x780 [ 136.667920] ? __pfx_kthread+0x10/0x10 [ 136.667923] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 136.667927] ? __pfx_kthread+0x10/0x10 [ 136.667930] ret_from_fork+0x30/0x70 [ 136.667933] ? __pfx_kthread+0x10/0x10 [ 136.667937] ret_from_fork_asm+0x1a/0x30 [ 136.667942] [ 136.858211] Allocated by task 3782: [ 136.862379] kasan_save_stack+0x1c/0x40 [ 136.866896] kasan_save_track+0x10/0x30 [ 136.871409] __kasan_kmalloc+0xa6/0xb0 [ 136.875836] kmalloc_double_kzfree+0x97/0x350 [kasan_test] [ 136.882000] kunit_try_run_case+0x175/0x440 [ 136.886860] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 136.892928] kthread+0x3b4/0x780 [ 136.896836] ret_from_fork+0x30/0x70 [ 136.901097] ret_from_fork_asm+0x1a/0x30 [ 136.907878] Freed by task 3782: [ 136.911698] kasan_save_stack+0x1c/0x40 [ 136.916216] kasan_save_track+0x10/0x30 [ 136.920731] kasan_save_free_info+0x37/0x60 [ 136.925592] __kasan_slab_free+0x4d/0x70 [ 136.930193] kfree+0x23f/0x440 [ 136.933929] kmalloc_double_kzfree+0x119/0x350 [kasan_test] [ 136.940176] kunit_try_run_case+0x175/0x440 [ 136.945043] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 136.951123] kthread+0x3b4/0x780 [ 136.955042] ret_from_fork+0x30/0x70 [ 136.959305] ret_from_fork_asm+0x1a/0x30 [ 136.966092] The buggy address belongs to the object at ffff888415e7a1c0 which belongs to the cache kmalloc-16 of size 16 [ 136.979762] The buggy address is located 0 bytes inside of 16-byte region [ffff888415e7a1c0, ffff888415e7a1d0) [ 136.994747] The buggy address belongs to the physical page: [ 137.000984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888415e7ab60 pfn:0x415e7a [ 137.010941] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 137.018136] page_type: f5(slab) [ 137.021958] raw: 0017ffffc0000000 ffff888100042640 dead000000000100 dead000000000122 [ 137.030359] raw: ffff888415e7ab60 000000008080007b 00000000f5000000 0000000000000000 [ 137.038761] page dumped because: kasan: bad access detected [ 137.047176] Memory state around the buggy address: [ 137.052640] ffff888415e7a080: fa fb fc fc fa fb fc fc 00 00 fc fc 00 04 fc fc [ 137.060520] ffff888415e7a100: fa fb fc fc 00 06 fc fc fa fb fc fc 00 06 fc fc [ 137.068402] >ffff888415e7a180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 137.076284] ^ [ 137.082265] ffff888415e7a200: 00 00 fc fc 00 03 fc fc fa fb fc fc 00 01 fc fc [ 137.090146] ffff888415e7a280: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 137.098041] ================================================================== [ 137.106132] ok 29 kmalloc_double_kzfree [ 137.106316] ================================================================== [ 137.119064] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x760/0x840 [kasan_test] [ 137.128261] Read of size 1 at addr ffff888140bd8373 by task kunit_try_catch/3788 [ 137.138498] CPU: 5 UID: 0 PID: 3788 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 137.138505] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 137.138506] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 137.138509] Call Trace: [ 137.138511] [ 137.138514] dump_stack_lvl+0x4f/0x70 [ 137.138520] print_address_description.constprop.0+0x2c/0x3b0 [ 137.138527] ? ksize_unpoisons_memory+0x760/0x840 [kasan_test] [ 137.138536] print_report+0xb9/0x280 [ 137.138540] ? ksize_unpoisons_memory+0x760/0x840 [kasan_test] [ 137.138548] ? kasan_addr_to_slab+0x9/0x90 [ 137.138551] ? ksize_unpoisons_memory+0x760/0x840 [kasan_test] [ 137.138559] kasan_report+0xda/0x110 [ 137.138563] ? ksize_unpoisons_memory+0x760/0x840 [kasan_test] [ 137.138572] ksize_unpoisons_memory+0x760/0x840 [kasan_test] [ 137.138582] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [kasan_test] [ 137.138590] ? finish_task_switch.isra.0+0x155/0x750 [ 137.138594] ? __switch_to+0x5ba/0x1020 [ 137.138597] ? __schedule+0x757/0x1420 [ 137.138600] ? __pfx_read_tsc+0x10/0x10 [ 137.138603] ? ktime_get_ts64+0x7f/0x220 [ 137.138607] kunit_try_run_case+0x175/0x440 [ 137.138612] ? __pfx_kunit_try_run_case+0x10/0x10 [ 137.138614] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 137.138618] ? __pfx_kunit_try_run_case+0x10/0x10 [ 137.138620] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 137.138624] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 137.138628] kthread+0x3b4/0x780 [ 137.138632] ? __pfx_kthread+0x10/0x10 [ 137.138635] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 137.138639] ? __pfx_kthread+0x10/0x10 [ 137.138642] ret_from_fork+0x30/0x70 [ 137.138645] ? __pfx_kthread+0x10/0x10 [ 137.138648] ret_from_fork_asm+0x1a/0x30 [ 137.138653] [ 137.329787] Allocated by task 3788: [ 137.333951] kasan_save_stack+0x1c/0x40 [ 137.338468] kasan_save_track+0x10/0x30 [ 137.342980] __kasan_kmalloc+0xa6/0xb0 [ 137.347405] ksize_unpoisons_memory+0xae/0x840 [kasan_test] [ 137.353654] kunit_try_run_case+0x175/0x440 [ 137.358513] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 137.364581] kthread+0x3b4/0x780 [ 137.368489] ret_from_fork+0x30/0x70 [ 137.372744] ret_from_fork_asm+0x1a/0x30 [ 137.379519] The buggy address belongs to the object at ffff888140bd8300 which belongs to the cache kmalloc-128 of size 128 [ 137.393361] The buggy address is located 0 bytes to the right of allocated 115-byte region [ffff888140bd8300, ffff888140bd8373) [ 137.409814] The buggy address belongs to the physical page: [ 137.416051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x140bd8 [ 137.424732] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 137.433045] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 137.440680] page_type: f5(slab) [ 137.444499] raw: 0017ffffc0000040 ffff888100042a00 dead000000000122 0000000000000000 [ 137.452899] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 137.461301] head: 0017ffffc0000040 ffff888100042a00 dead000000000122 0000000000000000 [ 137.469789] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 137.478274] head: 0017ffffc0000001 ffffea000502f601 00000000ffffffff 00000000ffffffff [ 137.486760] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 137.495247] page dumped because: kasan: bad access detected [ 137.503664] Memory state around the buggy address: [ 137.509126] ffff888140bd8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 137.517007] ffff888140bd8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 137.524890] >ffff888140bd8300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 137.532772] ^ [ 137.540309] ffff888140bd8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 137.548191] ffff888140bd8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 137.556075] ================================================================== [ 137.563987] ================================================================== [ 137.571879] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x749/0x840 [kasan_test] [ 137.581082] Read of size 1 at addr ffff888140bd8378 by task kunit_try_catch/3788 [ 137.591314] CPU: 5 UID: 0 PID: 3788 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 137.591321] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 137.591322] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 137.591324] Call Trace: [ 137.591326] [ 137.591328] dump_stack_lvl+0x4f/0x70 [ 137.591334] print_address_description.constprop.0+0x2c/0x3b0 [ 137.591341] ? ksize_unpoisons_memory+0x749/0x840 [kasan_test] [ 137.591351] print_report+0xb9/0x280 [ 137.591355] ? ksize_unpoisons_memory+0x749/0x840 [kasan_test] [ 137.591363] ? kasan_addr_to_slab+0x9/0x90 [ 137.591366] ? ksize_unpoisons_memory+0x749/0x840 [kasan_test] [ 137.591374] kasan_report+0xda/0x110 [ 137.591378] ? ksize_unpoisons_memory+0x749/0x840 [kasan_test] [ 137.591387] ksize_unpoisons_memory+0x749/0x840 [kasan_test] [ 137.591396] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [kasan_test] [ 137.591404] ? finish_task_switch.isra.0+0x155/0x750 [ 137.591408] ? __switch_to+0x5ba/0x1020 [ 137.591412] ? __schedule+0x757/0x1420 [ 137.591415] ? __pfx_read_tsc+0x10/0x10 [ 137.591418] ? ktime_get_ts64+0x7f/0x220 [ 137.591422] kunit_try_run_case+0x175/0x440 [ 137.591426] ? __pfx_kunit_try_run_case+0x10/0x10 [ 137.591428] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 137.591432] ? __pfx_kunit_try_run_case+0x10/0x10 [ 137.591434] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 137.591438] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 137.591441] kthread+0x3b4/0x780 [ 137.591446] ? __pfx_kthread+0x10/0x10 [ 137.591449] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 137.591453] ? __pfx_kthread+0x10/0x10 [ 137.591456] ret_from_fork+0x30/0x70 [ 137.591459] ? __pfx_kthread+0x10/0x10 [ 137.591462] ret_from_fork_asm+0x1a/0x30 [ 137.591467] [ 137.782595] Allocated by task 3788: [ 137.786763] kasan_save_stack+0x1c/0x40 [ 137.791277] kasan_save_track+0x10/0x30 [ 137.795789] __kasan_kmalloc+0xa6/0xb0 [ 137.800215] ksize_unpoisons_memory+0xae/0x840 [kasan_test] [ 137.806463] kunit_try_run_case+0x175/0x440 [ 137.811321] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 137.817387] kthread+0x3b4/0x780 [ 137.821296] ret_from_fork+0x30/0x70 [ 137.825550] ret_from_fork_asm+0x1a/0x30 [ 137.832325] The buggy address belongs to the object at ffff888140bd8300 which belongs to the cache kmalloc-128 of size 128 [ 137.846169] The buggy address is located 5 bytes to the right of allocated 115-byte region [ffff888140bd8300, ffff888140bd8373) [ 137.862627] The buggy address belongs to the physical page: [ 137.868864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x140bd8 [ 137.877525] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 137.885840] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 137.893463] page_type: f5(slab) [ 137.897283] raw: 0017ffffc0000040 ffff888100042a00 dead000000000122 0000000000000000 [ 137.905684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 137.914093] head: 0017ffffc0000040 ffff888100042a00 dead000000000122 0000000000000000 [ 137.922581] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 137.931072] head: 0017ffffc0000001 ffffea000502f601 00000000ffffffff 00000000ffffffff [ 137.939567] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 137.948061] page dumped because: kasan: bad access detected [ 137.956485] Memory state around the buggy address: [ 137.961945] ffff888140bd8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 137.969825] ffff888140bd8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 137.977704] >ffff888140bd8300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 137.985585] ^ [ 137.993380] ffff888140bd8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 138.001263] ffff888140bd8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 138.009144] ================================================================== [ 138.017120] ================================================================== [ 138.025002] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x732/0x840 [kasan_test] [ 138.034198] Read of size 1 at addr ffff888140bd837f by task kunit_try_catch/3788 [ 138.044433] CPU: 5 UID: 0 PID: 3788 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 138.044440] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 138.044441] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 138.044443] Call Trace: [ 138.044446] [ 138.044448] dump_stack_lvl+0x4f/0x70 [ 138.044455] print_address_description.constprop.0+0x2c/0x3b0 [ 138.044462] ? ksize_unpoisons_memory+0x732/0x840 [kasan_test] [ 138.044472] print_report+0xb9/0x280 [ 138.044476] ? ksize_unpoisons_memory+0x732/0x840 [kasan_test] [ 138.044484] ? kasan_addr_to_slab+0x9/0x90 [ 138.044487] ? ksize_unpoisons_memory+0x732/0x840 [kasan_test] [ 138.044495] kasan_report+0xda/0x110 [ 138.044499] ? ksize_unpoisons_memory+0x732/0x840 [kasan_test] [ 138.044508] ksize_unpoisons_memory+0x732/0x840 [kasan_test] [ 138.044517] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [kasan_test] [ 138.044525] ? finish_task_switch.isra.0+0x155/0x750 [ 138.044528] ? __switch_to+0x5ba/0x1020 [ 138.044532] ? __schedule+0x757/0x1420 [ 138.044535] ? __pfx_read_tsc+0x10/0x10 [ 138.044538] ? ktime_get_ts64+0x7f/0x220 [ 138.044542] kunit_try_run_case+0x175/0x440 [ 138.044546] ? __pfx_kunit_try_run_case+0x10/0x10 [ 138.044548] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 138.044552] ? __pfx_kunit_try_run_case+0x10/0x10 [ 138.044555] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 138.044558] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 138.044561] kthread+0x3b4/0x780 [ 138.044566] ? __pfx_kthread+0x10/0x10 [ 138.044568] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 138.044572] ? __pfx_kthread+0x10/0x10 [ 138.044575] ret_from_fork+0x30/0x70 [ 138.044579] ? __pfx_kthread+0x10/0x10 [ 138.044582] ret_from_fork_asm+0x1a/0x30 [ 138.044587] [ 138.235735] Allocated by task 3788: [ 138.239902] kasan_save_stack+0x1c/0x40 [ 138.244416] kasan_save_track+0x10/0x30 [ 138.248927] __kasan_kmalloc+0xa6/0xb0 [ 138.253352] ksize_unpoisons_memory+0xae/0x840 [kasan_test] [ 138.259601] kunit_try_run_case+0x175/0x440 [ 138.264460] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 138.270529] kthread+0x3b4/0x780 [ 138.274437] ret_from_fork+0x30/0x70 [ 138.278692] ret_from_fork_asm+0x1a/0x30 [ 138.285466] The buggy address belongs to the object at ffff888140bd8300 which belongs to the cache kmalloc-128 of size 128 [ 138.299313] The buggy address is located 12 bytes to the right of allocated 115-byte region [ffff888140bd8300, ffff888140bd8373) [ 138.315852] The buggy address belongs to the physical page: [ 138.322092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x140bd8 [ 138.330754] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 138.339074] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 138.346706] page_type: f5(slab) [ 138.350529] raw: 0017ffffc0000040 ffff888100042a00 dead000000000122 0000000000000000 [ 138.358931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 138.367329] head: 0017ffffc0000040 ffff888100042a00 dead000000000122 0000000000000000 [ 138.375817] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 138.384304] head: 0017ffffc0000001 ffffea000502f601 00000000ffffffff 00000000ffffffff [ 138.385485] LKP: stdout: 3340: /lkp/lkp/src/bin/run-lkp /lkp/jobs/scheduled/lkp-hsw-d03/kunit-group-03-debian-12-x86_64-20240206.cgz-fe301d6b4b4a-20250529-138988-1olf57i-0.yaml [ 138.392783] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 138.392785] page dumped because: kasan: bad access detected [ 138.392788] Memory state around the buggy address: [ 138.392802] ffff888140bd8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 138.417702] ffff888140bd8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 138.417704] >ffff888140bd8300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 138.417706] ^ [ 138.417707] ffff888140bd8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 138.417721] ffff888140bd8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 138.426761] RESULT_ROOT=/result/kunit/group-03/lkp-hsw-d03/debian-12-x86_64-20240206.cgz/x86_64-rhel-9.4-kunit/gcc-12/fe301d6b4b4aec003ff84aa4d2860e772b147225/1 [ 138.431579] ================================================================== [ 138.431923] ok 30 ksize_unpoisons_memory [ 138.441880] ================================================================== [ 138.451890] job=/lkp/jobs/scheduled/lkp-hsw-d03/kunit-group-03-debian-12-x86_64-20240206.cgz-fe301d6b4b4a-20250529-138988-1olf57i-0.yaml [ 138.457437] BUG: KASAN: slab-use-after-free in ksize_uaf+0x18a/0x6b0 [kasan_test] [ 138.473113] Read of size 1 at addr ffff88812a519700 by task kunit_try_catch/3795 [ 138.473120] CPU: 1 UID: 0 PID: 3795 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 138.473137] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 138.473138] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 138.473140] Call Trace: [ 138.473142] [ 138.473144] dump_stack_lvl+0x4f/0x70 [ 138.473151] print_address_description.constprop.0+0x2c/0x3b0 [ 138.473157] ? ksize_uaf+0x18a/0x6b0 [kasan_test] [ 138.473167] print_report+0xb9/0x280 [ 138.473171] ? ksize_uaf+0x18a/0x6b0 [kasan_test] [ 138.473180] ? kasan_addr_to_slab+0x9/0x90 [ 138.473184] ? ksize_uaf+0x18a/0x6b0 [kasan_test] [ 138.473192] kasan_report+0xda/0x110 [ 138.473196] ? ksize_uaf+0x18a/0x6b0 [kasan_test] [ 138.473205] ? ksize_uaf+0x18a/0x6b0 [kasan_test] [ 138.473213] __kasan_check_byte+0x32/0x40 [ 138.473217] ksize+0x19/0x50 [ 138.473221] ksize_uaf+0x18a/0x6b0 [kasan_test] [ 138.473230] ? __pfx_ksize_uaf+0x10/0x10 [kasan_test] [ 138.473239] ? __schedule+0x757/0x1420 [ 138.473242] ? __pfx_read_tsc+0x10/0x10 [ 138.473246] ? ktime_get_ts64+0x7f/0x220 [ 138.473250] kunit_try_run_case+0x175/0x440 [ 138.473254] ? __pfx_kunit_try_run_case+0x10/0x10 [ 138.473257] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 138.473261] ? __pfx_kunit_try_run_case+0x10/0x10 [ 138.473264] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 138.473267] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 138.473271] kthread+0x3b4/0x780 [ 138.473275] ? __pfx_kthread+0x10/0x10 [ 138.473279] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 138.473282] ? __pfx_kthread+0x10/0x10 [ 138.473286] ret_from_fork+0x30/0x70 [ 138.473290] ? __pfx_kthread+0x10/0x10 [ 138.473293] ret_from_fork_asm+0x1a/0x30 [ 138.473298] [ 138.740241] Allocated by task 3795: [ 138.744408] kasan_save_stack+0x1c/0x40 [ 138.748923] kasan_save_track+0x10/0x30 [ 138.753436] __kasan_kmalloc+0xa6/0xb0 [ 138.757865] ksize_uaf+0x97/0x6b0 [kasan_test] [ 138.762989] kunit_try_run_case+0x175/0x440 [ 138.767849] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 138.773920] kthread+0x3b4/0x780 [ 138.777830] ret_from_fork+0x30/0x70 [ 138.782084] ret_from_fork_asm+0x1a/0x30 [ 138.788861] Freed by task 3795: [ 138.792682] kasan_save_stack+0x1c/0x40 [ 138.797196] kasan_save_track+0x10/0x30 [ 138.801711] kasan_save_free_info+0x37/0x60 [ 138.806570] __kasan_slab_free+0x4d/0x70 [ 138.811168] kfree+0x23f/0x440 [ 138.814903] ksize_uaf+0x119/0x6b0 [kasan_test] [ 138.820115] kunit_try_run_case+0x175/0x440 [ 138.824972] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 138.831041] kthread+0x3b4/0x780 [ 138.834952] ret_from_fork+0x30/0x70 [ 138.839209] ret_from_fork_asm+0x1a/0x30 [ 138.845988] The buggy address belongs to the object at ffff88812a519700 which belongs to the cache kmalloc-128 of size 128 [ 138.859832] The buggy address is located 0 bytes inside of freed 128-byte region [ffff88812a519700, ffff88812a519780) [ 138.875429] The buggy address belongs to the physical page: [ 138.881667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x12a518 [ 138.890330] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 138.898646] ksm flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 138.906615] page_type: f5(slab) [ 138.910437] raw: 0017ffffc0000040 ffff888100042a00 ffffea0004494e00 0000000000000003 [ 138.918841] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 138.927241] head: 0017ffffc0000040 ffff888100042a00 ffffea0004494e00 0000000000000003 [ 138.935728] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 138.944217] head: 0017ffffc0000001 ffffea0004a94601 00000000ffffffff 00000000ffffffff [ 138.952704] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 138.961190] page dumped because: kasan: bad access detected [ 138.969610] Memory state around the buggy address: [ 138.975082] ffff88812a519600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 138.982965] ffff88812a519680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 138.990848] >ffff88812a519700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 138.998731] ^ [ 139.002638] ffff88812a519780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 139.010522] ffff88812a519800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 139.018405] ================================================================== [ 139.026314] ================================================================== [ 139.034195] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5f5/0x6b0 [kasan_test] [ 139.042345] Read of size 1 at addr ffff88812a519700 by task kunit_try_catch/3795 [ 139.052580] CPU: 1 UID: 0 PID: 3795 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 139.052587] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 139.052589] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 139.052591] Call Trace: [ 139.052594] [ 139.052597] dump_stack_lvl+0x4f/0x70 [ 139.052604] print_address_description.constprop.0+0x2c/0x3b0 [ 139.052611] ? ksize_uaf+0x5f5/0x6b0 [kasan_test] [ 139.052622] print_report+0xb9/0x280 [ 139.052626] ? ksize_uaf+0x5f5/0x6b0 [kasan_test] [ 139.052635] ? kasan_addr_to_slab+0x9/0x90 [ 139.052639] ? ksize_uaf+0x5f5/0x6b0 [kasan_test] [ 139.052647] kasan_report+0xda/0x110 [ 139.052651] ? ksize_uaf+0x5f5/0x6b0 [kasan_test] [ 139.052659] ksize_uaf+0x5f5/0x6b0 [kasan_test] [ 139.052669] ? __pfx_ksize_uaf+0x10/0x10 [kasan_test] [ 139.052677] ? __schedule+0x757/0x1420 [ 139.052681] ? __pfx_read_tsc+0x10/0x10 [ 139.052684] ? ktime_get_ts64+0x7f/0x220 [ 139.052688] kunit_try_run_case+0x175/0x440 [ 139.052692] ? __pfx_kunit_try_run_case+0x10/0x10 [ 139.052695] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 139.052699] ? __pfx_kunit_try_run_case+0x10/0x10 [ 139.052701] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 139.052705] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 139.052708] kthread+0x3b4/0x780 [ 139.052713] ? __pfx_kthread+0x10/0x10 [ 139.052716] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 139.052720] ? __pfx_kthread+0x10/0x10 [ 139.052723] ret_from_fork+0x30/0x70 [ 139.052727] ? __pfx_kthread+0x10/0x10 [ 139.052730] ret_from_fork_asm+0x1a/0x30 [ 139.052736] [ 139.227063] Allocated by task 3795: [ 139.231233] kasan_save_stack+0x1c/0x40 [ 139.235749] kasan_save_track+0x10/0x30 [ 139.240264] __kasan_kmalloc+0xa6/0xb0 [ 139.244693] ksize_uaf+0x97/0x6b0 [kasan_test] [ 139.249820] kunit_try_run_case+0x175/0x440 [ 139.254682] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 139.260751] kthread+0x3b4/0x780 [ 139.264663] ret_from_fork+0x30/0x70 [ 139.268919] ret_from_fork_asm+0x1a/0x30 [ 139.275697] Freed by task 3795: [ 139.279517] kasan_save_stack+0x1c/0x40 [ 139.284039] kasan_save_track+0x10/0x30 [ 139.288553] kasan_save_free_info+0x37/0x60 [ 139.293412] __kasan_slab_free+0x4d/0x70 [ 139.298015] kfree+0x23f/0x440 [ 139.301761] ksize_uaf+0x119/0x6b0 [kasan_test] [ 139.306972] kunit_try_run_case+0x175/0x440 [ 139.311832] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 139.317900] kthread+0x3b4/0x780 [ 139.321811] ret_from_fork+0x30/0x70 [ 139.326072] ret_from_fork_asm+0x1a/0x30 [ 139.332851] The buggy address belongs to the object at ffff88812a519700 which belongs to the cache kmalloc-128 of size 128 [ 139.346696] The buggy address is located 0 bytes inside of freed 128-byte region [ffff88812a519700, ffff88812a519780) [ 139.362292] The buggy address belongs to the physical page: [ 139.368531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x12a518 [ 139.377193] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 139.385509] ksm flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 139.393478] page_type: f5(slab) [ 139.397303] raw: 0017ffffc0000040 ffff888100042a00 ffffea0004494e00 0000000000000003 [ 139.405707] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 139.414110] head: 0017ffffc0000040 ffff888100042a00 ffffea0004494e00 0000000000000003 [ 139.422601] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 139.431090] head: 0017ffffc0000001 ffffea0004a94601 00000000ffffffff 00000000ffffffff [ 139.439578] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 139.448067] page dumped because: kasan: bad access detected [ 139.456484] Memory state around the buggy address: [ 139.461944] ffff88812a519600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 139.469827] ffff88812a519680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 139.477711] >ffff88812a519700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 139.485594] ^ [ 139.489500] ffff88812a519780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 139.497382] ffff88812a519800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 139.505262] ================================================================== [ 139.513184] ================================================================== [ 139.521082] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5db/0x6b0 [kasan_test] [ 139.529233] Read of size 1 at addr ffff88812a519778 by task kunit_try_catch/3795 [ 139.539469] CPU: 1 UID: 0 PID: 3795 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 139.539475] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 139.539477] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 139.539479] Call Trace: [ 139.539481] [ 139.539484] dump_stack_lvl+0x4f/0x70 [ 139.539490] print_address_description.constprop.0+0x2c/0x3b0 [ 139.539498] ? ksize_uaf+0x5db/0x6b0 [kasan_test] [ 139.539508] print_report+0xb9/0x280 [ 139.539513] ? ksize_uaf+0x5db/0x6b0 [kasan_test] [ 139.539522] ? kasan_addr_to_slab+0x9/0x90 [ 139.539526] ? ksize_uaf+0x5db/0x6b0 [kasan_test] [ 139.539534] kasan_report+0xda/0x110 [ 139.539538] ? ksize_uaf+0x5db/0x6b0 [kasan_test] [ 139.539548] ksize_uaf+0x5db/0x6b0 [kasan_test] [ 139.539558] ? __pfx_ksize_uaf+0x10/0x10 [kasan_test] [ 139.539566] ? __schedule+0x757/0x1420 [ 139.539570] ? __pfx_read_tsc+0x10/0x10 [ 139.539574] ? ktime_get_ts64+0x7f/0x220 [ 139.539578] kunit_try_run_case+0x175/0x440 [ 139.539582] ? __pfx_kunit_try_run_case+0x10/0x10 [ 139.539584] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 139.539589] ? __pfx_kunit_try_run_case+0x10/0x10 [ 139.539591] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 139.539595] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 139.539598] kthread+0x3b4/0x780 [ 139.539603] ? __pfx_kthread+0x10/0x10 [ 139.539606] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 139.539610] ? __pfx_kthread+0x10/0x10 [ 139.539613] ret_from_fork+0x30/0x70 [ 139.539617] ? __pfx_kthread+0x10/0x10 [ 139.539620] ret_from_fork_asm+0x1a/0x30 [ 139.539625] [ 139.713883] Allocated by task 3795: [ 139.718050] kasan_save_stack+0x1c/0x40 [ 139.722576] kasan_save_track+0x10/0x30 [ 139.727089] __kasan_kmalloc+0xa6/0xb0 [ 139.731515] ksize_uaf+0x97/0x6b0 [kasan_test] [ 139.736640] kunit_try_run_case+0x175/0x440 [ 139.741498] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 139.747567] kthread+0x3b4/0x780 [ 139.751479] ret_from_fork+0x30/0x70 [ 139.755733] ret_from_fork_asm+0x1a/0x30 [ 139.762510] Freed by task 3795: [ 139.766331] kasan_save_stack+0x1c/0x40 [ 139.770847] kasan_save_track+0x10/0x30 [ 139.775364] kasan_save_free_info+0x37/0x60 [ 139.780223] __kasan_slab_free+0x4d/0x70 [ 139.784825] kfree+0x23f/0x440 [ 139.788559] ksize_uaf+0x119/0x6b0 [kasan_test] [ 139.793770] kunit_try_run_case+0x175/0x440 [ 139.798627] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 139.804695] kthread+0x3b4/0x780 [ 139.808605] ret_from_fork+0x30/0x70 [ 139.812857] ret_from_fork_asm+0x1a/0x30 [ 139.819634] The buggy address belongs to the object at ffff88812a519700 which belongs to the cache kmalloc-128 of size 128 [ 139.833479] The buggy address is located 120 bytes inside of freed 128-byte region [ffff88812a519700, ffff88812a519780) [ 139.849255] The buggy address belongs to the physical page: [ 139.855496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x12a518 [ 139.864160] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 139.872476] ksm flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 139.880448] page_type: f5(slab) [ 139.884269] raw: 0017ffffc0000040 ffff888100042a00 ffffea0004494e00 0000000000000003 [ 139.892669] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 139.901069] head: 0017ffffc0000040 ffff888100042a00 ffffea0004494e00 0000000000000003 [ 139.909556] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 139.918044] head: 0017ffffc0000001 ffffea0004a94601 00000000ffffffff 00000000ffffffff [ 139.926531] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 139.935019] page dumped because: kasan: bad access detected [ 139.943446] Memory state around the buggy address: [ 139.948906] ffff88812a519600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 139.956790] ffff88812a519680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 139.964674] >ffff88812a519700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 139.972554] ^ [ 139.980350] ffff88812a519780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 139.988233] ffff88812a519800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 139.996117] ================================================================== [ 140.004323] ok 31 ksize_uaf [ 140.019079] ================================================================== [ 140.030788] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x45/0x50 [kasan_test] [ 140.039287] Read of size 4 at addr ffff8884145344c0 by task swapper/1/0 [ 140.048745] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 140.048752] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 140.048754] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 140.048755] Call Trace: [ 140.048758] [ 140.048761] dump_stack_lvl+0x4f/0x70 [ 140.048768] print_address_description.constprop.0+0x2c/0x3b0 [ 140.048775] ? rcu_uaf_reclaim+0x45/0x50 [kasan_test] [ 140.048786] print_report+0xb9/0x280 [ 140.048791] ? rcu_uaf_reclaim+0x45/0x50 [kasan_test] [ 140.048799] ? kasan_addr_to_slab+0x9/0x90 [ 140.048804] ? rcu_uaf_reclaim+0x45/0x50 [kasan_test] [ 140.048812] kasan_report+0xda/0x110 [ 140.048816] ? rcu_uaf_reclaim+0x45/0x50 [kasan_test] [ 140.048825] rcu_uaf_reclaim+0x45/0x50 [kasan_test] [ 140.048834] rcu_do_batch+0x38a/0xde0 [ 140.048840] ? __pfx_rcu_do_batch+0x10/0x10 [ 140.048843] ? __note_gp_changes+0x650/0x900 [ 140.048847] rcu_core+0x390/0xa50 [ 140.048851] ? irqtime_account_irq+0x4d/0x200 [ 140.048856] handle_softirqs+0x198/0x5e0 [ 140.048861] __irq_exit_rcu+0x158/0x1a0 [ 140.048864] sysvec_apic_timer_interrupt+0x6e/0x90 [ 140.048868] [ 140.048869] [ 140.048870] asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 140.048875] RIP: 0010:cpuidle_enter_state+0xdb/0x4a0 [ 140.048879] Code: bf ff ff ff ff 49 89 c6 e8 92 4c 3c ff 31 ff e8 eb 98 25 fd 45 84 ff 0f 85 81 01 00 00 e8 bd 53 3c ff 84 c0 75 01 fb 45 85 ed <0f> 88 4d 01 00 00 4d 63 fd 49 83 ff 09 0f 87 e3 02 00 00 4b 8d 04 [ 140.048882] RSP: 0018:ffffc90000177d80 EFLAGS: 00000206 [ 140.048886] RAX: 0000000000000000 RBX: ffff8883a70cb5e0 RCX: 0000000000000000 [ 140.048888] RDX: 1ffff11074e183c3 RSI: 0000000000000001 RDI: ffff8883a70c1e18 [ 140.048890] RBP: ffffffff85f81f40 R08: 0000000000000000 R09: ffffed1074e17735 [ 140.048892] R10: ffff8883a70bb9ab R11: 0000000000000057 R12: 0000000000000005 [ 140.048894] R13: 0000000000000005 R14: 0000002099c8e3a4 R15: 0000000000000000 [ 140.048899] cpuidle_enter+0x4a/0xa0 [ 140.048903] cpuidle_idle_call+0x21c/0x370 [ 140.048907] ? __pfx_cpuidle_idle_call+0x10/0x10 [ 140.048910] ? hw_breakpoint_exceptions_notify+0x360/0x370 [ 140.048914] ? tsc_verify_tsc_adjust+0x57/0x2a0 [ 140.048919] do_idle+0xe0/0x190 [ 140.048922] cpu_startup_entry+0x50/0x60 [ 140.048925] start_secondary+0x217/0x2a0 [ 140.048928] ? __pfx_start_secondary+0x10/0x10 [ 140.048931] ? startup_64_load_idt+0x49/0x60 [ 140.048935] common_startup_64+0x13e/0x141 [ 140.048941] [ 140.311793] Allocated by task 3800: [ 140.315963] kasan_save_stack+0x1c/0x40 [ 140.320480] kasan_save_track+0x10/0x30 [ 140.324993] __kasan_kmalloc+0xa6/0xb0 [ 140.329422] rcu_uaf+0x9e/0x310 [kasan_test] [ 140.334377] kunit_try_run_case+0x175/0x440 [ 140.339236] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 140.345307] kthread+0x3b4/0x780 [ 140.349215] ret_from_fork+0x30/0x70 [ 140.353470] ret_from_fork_asm+0x1a/0x30 [ 140.360258] Freed by task 0: [ 140.363820] kasan_save_stack+0x1c/0x40 [ 140.368335] kasan_save_track+0x10/0x30 [ 140.372853] kasan_save_free_info+0x37/0x60 [ 140.377714] __kasan_slab_free+0x4d/0x70 [ 140.382318] kfree+0x23f/0x440 [ 140.386066] rcu_uaf_reclaim+0x16/0x50 [kasan_test] [ 140.391636] rcu_do_batch+0x38a/0xde0 [ 140.395979] rcu_core+0x390/0xa50 [ 140.399976] handle_softirqs+0x198/0x5e0 [ 140.404577] __irq_exit_rcu+0x158/0x1a0 [ 140.409096] sysvec_apic_timer_interrupt+0x6e/0x90 [ 140.414564] asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 140.422555] Last potentially related work creation: [ 140.428102] kasan_save_stack+0x1c/0x40 [ 140.432620] kasan_record_aux_stack+0xa3/0xb0 [ 140.437655] __call_rcu_common.constprop.0+0xbf/0x970 [ 140.443379] rcu_uaf+0x156/0x310 [kasan_test] [ 140.448419] kunit_try_run_case+0x175/0x440 [ 140.453280] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 140.459352] kthread+0x3b4/0x780 [ 140.463261] ret_from_fork+0x30/0x70 [ 140.467517] ret_from_fork_asm+0x1a/0x30 [ 140.474295] The buggy address belongs to the object at ffff8884145344c0 which belongs to the cache kmalloc-32 of size 32 [ 140.487969] The buggy address is located 0 bytes inside of freed 32-byte region [ffff8884145344c0, ffff8884145344e0) [ 140.503483] The buggy address belongs to the physical page: [ 140.509724] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x414534 [ 140.518387] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 140.526015] page_type: f5(slab) [ 140.529851] raw: 0017ffffc0000000 ffff888100042780 0000000000000000 dead000000000001 [ 140.538257] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 140.546660] page dumped because: kasan: bad access detected [ 140.555089] Memory state around the buggy address: [ 140.560555] ffff888414534380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 140.568440] ffff888414534400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 140.576324] >ffff888414534480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 140.584208] ^ [ 140.590191] ffff888414534500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 140.598082] ffff888414534580: fa fb fb fb fc fc fc fc 00 00 00 00 fc fc fc fc [ 140.605968] ================================================================== [ 140.614100] ok 32 rcu_uaf [ 140.614399] ================================================================== [ 140.625955] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x4bd/0x530 [kasan_test] [ 140.634467] Read of size 8 at addr ffff88840da63e00 by task kunit_try_catch/3805 [ 140.644718] CPU: 2 UID: 0 PID: 3805 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 140.644729] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 140.644732] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 140.644736] Call Trace: [ 140.644740] [ 140.644744] dump_stack_lvl+0x4f/0x70 [ 140.644753] print_address_description.constprop.0+0x2c/0x3b0 [ 140.644764] ? workqueue_uaf+0x4bd/0x530 [kasan_test] [ 140.644782] print_report+0xb9/0x280 [ 140.644789] ? workqueue_uaf+0x4bd/0x530 [kasan_test] [ 140.644804] ? kasan_addr_to_slab+0x9/0x90 [ 140.644810] ? workqueue_uaf+0x4bd/0x530 [kasan_test] [ 140.644824] kasan_report+0xda/0x110 [ 140.644831] ? workqueue_uaf+0x4bd/0x530 [kasan_test] [ 140.644847] workqueue_uaf+0x4bd/0x530 [kasan_test] [ 140.644862] ? finish_task_switch.isra.0+0x155/0x750 [ 140.644870] ? __pfx_workqueue_uaf+0x10/0x10 [kasan_test] [ 140.644885] ? __schedule+0x757/0x1420 [ 140.644891] ? __pfx_read_tsc+0x10/0x10 [ 140.644896] ? ktime_get_ts64+0x7f/0x220 [ 140.644903] kunit_try_run_case+0x175/0x440 [ 140.644909] ? __pfx_kunit_try_run_case+0x10/0x10 [ 140.644914] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 140.644921] ? __pfx_kunit_try_run_case+0x10/0x10 [ 140.644925] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 140.644931] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 140.644937] kthread+0x3b4/0x780 [ 140.644943] ? __pfx_kthread+0x10/0x10 [ 140.644949] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 140.644955] ? __pfx_kthread+0x10/0x10 [ 140.644960] ret_from_fork+0x30/0x70 [ 140.644966] ? __pfx_kthread+0x10/0x10 [ 140.644971] ret_from_fork_asm+0x1a/0x30 [ 140.644980] [ 140.827079] Allocated by task 3805: [ 140.831254] kasan_save_stack+0x1c/0x40 [ 140.835775] kasan_save_track+0x10/0x30 [ 140.840295] __kasan_kmalloc+0xa6/0xb0 [ 140.844727] workqueue_uaf+0x13a/0x530 [kasan_test] [ 140.850298] kunit_try_run_case+0x175/0x440 [ 140.855164] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 140.861239] kthread+0x3b4/0x780 [ 140.865153] ret_from_fork+0x30/0x70 [ 140.869412] ret_from_fork_asm+0x1a/0x30 [ 140.876211] Freed by task 3472: [ 140.880044] kasan_save_stack+0x1c/0x40 [ 140.884574] kasan_save_track+0x10/0x30 [ 140.889093] kasan_save_free_info+0x37/0x60 [ 140.893957] __kasan_slab_free+0x4d/0x70 [ 140.898561] kfree+0x23f/0x440 [ 140.902303] process_one_work+0x679/0x1000 [ 140.907092] worker_thread+0x718/0xf50 [ 140.911526] kthread+0x3b4/0x780 [ 140.915440] ret_from_fork+0x30/0x70 [ 140.919699] ret_from_fork_asm+0x1a/0x30 [ 140.926482] Last potentially related work creation: [ 140.932044] kasan_save_stack+0x1c/0x40 [ 140.936574] kasan_record_aux_stack+0xa3/0xb0 [ 140.941611] insert_work+0x2d/0x230 [ 140.945784] __queue_work+0x540/0xad0 [ 140.950131] queue_work_on+0x5e/0x70 [ 140.954389] workqueue_uaf+0x252/0x530 [kasan_test] [ 140.959959] kunit_try_run_case+0x175/0x440 [ 140.964825] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 140.970903] kthread+0x3b4/0x780 [ 140.974815] ret_from_fork+0x30/0x70 [ 140.979077] ret_from_fork_asm+0x1a/0x30 [ 140.985863] The buggy address belongs to the object at ffff88840da63e00 which belongs to the cache kmalloc-32 of size 32 [ 140.999544] The buggy address is located 0 bytes inside of freed 32-byte region [ffff88840da63e00, ffff88840da63e20) [ 141.015071] The buggy address belongs to the physical page: [ 141.021324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x40da63 [ 141.029992] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 141.037191] page_type: f5(slab) [ 141.041018] raw: 0017ffffc0000000 ffff888100042780 ffffea0010531580 dead000000000002 [ 141.049439] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 141.057845] page dumped because: kasan: bad access detected [ 141.066276] Memory state around the buggy address: [ 141.071743] ffff88840da63d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 141.079630] ffff88840da63d80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 141.087518] >ffff88840da63e00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 141.095406] ^ [ 141.099317] ffff88840da63e80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 141.107205] ffff88840da63f00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 141.115096] ================================================================== [ 141.123233] ok 33 workqueue_uaf [ 141.123903] ok 34 kfree_via_page [ 141.128414] ok 35 kfree_via_phys [ 141.132993] ================================================================== [ 141.145136] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x3a5/0x4a0 [kasan_test] [ 141.153631] Read of size 1 at addr ffff88810fde9778 by task kunit_try_catch/3812 [ 141.163863] CPU: 5 UID: 0 PID: 3812 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 141.163871] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 141.163872] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 141.163874] Call Trace: [ 141.163877] [ 141.163880] dump_stack_lvl+0x4f/0x70 [ 141.163887] print_address_description.constprop.0+0x2c/0x3b0 [ 141.163894] ? kmem_cache_oob+0x3a5/0x4a0 [kasan_test] [ 141.163904] print_report+0xb9/0x280 [ 141.163907] ? kmem_cache_oob+0x3a5/0x4a0 [kasan_test] [ 141.163916] ? kasan_addr_to_slab+0x9/0x90 [ 141.163920] ? kmem_cache_oob+0x3a5/0x4a0 [kasan_test] [ 141.163928] kasan_report+0xda/0x110 [ 141.163932] ? kmem_cache_oob+0x3a5/0x4a0 [kasan_test] [ 141.163941] kmem_cache_oob+0x3a5/0x4a0 [kasan_test] [ 141.163951] ? __pfx_kmem_cache_oob+0x10/0x10 [kasan_test] [ 141.163960] ? finish_task_switch.isra.0+0x155/0x750 [ 141.163963] ? __switch_to+0x5ba/0x1020 [ 141.163967] ? __schedule+0x757/0x1420 [ 141.163971] ? __pfx_read_tsc+0x10/0x10 [ 141.163974] ? ktime_get_ts64+0x7f/0x220 [ 141.163978] kunit_try_run_case+0x175/0x440 [ 141.163983] ? __pfx_kunit_try_run_case+0x10/0x10 [ 141.163985] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 141.163990] ? __pfx_kunit_try_run_case+0x10/0x10 [ 141.163992] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 141.163996] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 141.163999] kthread+0x3b4/0x780 [ 141.164003] ? __pfx_kthread+0x10/0x10 [ 141.164007] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 141.164010] ? __pfx_kthread+0x10/0x10 [ 141.164013] ret_from_fork+0x30/0x70 [ 141.164018] ? __pfx_kthread+0x10/0x10 [ 141.164034] ret_from_fork_asm+0x1a/0x30 [ 141.164039] [ 141.351065] Allocated by task 3812: [ 141.355234] kasan_save_stack+0x1c/0x40 [ 141.359749] kasan_save_track+0x10/0x30 [ 141.364259] __kasan_slab_alloc+0x85/0x90 [ 141.368946] kmem_cache_alloc_noprof+0x130/0x420 [ 141.374238] kmem_cache_oob+0x144/0x4a0 [kasan_test] [ 141.379883] kunit_try_run_case+0x175/0x440 [ 141.384742] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 141.390811] kthread+0x3b4/0x780 [ 141.394719] ret_from_fork+0x30/0x70 [ 141.398976] ret_from_fork_asm+0x1a/0x30 [ 141.405749] The buggy address belongs to the object at ffff88810fde96b0 which belongs to the cache test_cache of size 200 [ 141.419511] The buggy address is located 0 bytes to the right of allocated 200-byte region [ffff88810fde96b0, ffff88810fde9778) [ 141.435970] The buggy address belongs to the physical page: [ 141.442210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10fde8 [ 141.450873] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 141.459189] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 141.466813] page_type: f5(slab) [ 141.470636] raw: 0017ffffc0000040 ffff888101375180 dead000000000122 0000000000000000 [ 141.479043] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 141.487445] head: 0017ffffc0000040 ffff888101375180 dead000000000122 0000000000000000 [ 141.495933] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 141.504422] head: 0017ffffc0000001 ffffea00043f7a01 00000000ffffffff 00000000ffffffff [ 141.512910] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 141.521399] page dumped because: kasan: bad access detected [ 141.529816] Memory state around the buggy address: [ 141.535277] ffff88810fde9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 141.543162] ffff88810fde9680: fc fc fc fc fc fc 00 00 00 00 00 00 00 00 00 00 [ 141.551047] >ffff88810fde9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 141.558940] ^ [ 141.566739] ffff88810fde9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 141.574621] ffff88810fde9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 141.582506] ================================================================== [ 141.627688] ok 36 kmem_cache_oob [ 141.628012] ================================================================== [ 141.640157] BUG: KASAN: double-free in kmem_cache_double_free+0x1ca/0x440 [kasan_test] [ 141.648739] Free of addr ffff88816a4ef6b0 by task kunit_try_catch/3817 [ 141.658109] CPU: 4 UID: 0 PID: 3817 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 141.658116] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 141.658117] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 141.658119] Call Trace: [ 141.658122] [ 141.658125] dump_stack_lvl+0x4f/0x70 [ 141.658132] print_address_description.constprop.0+0x2c/0x3b0 [ 141.658138] print_report+0xb9/0x280 [ 141.658142] ? kasan_addr_to_slab+0x9/0x90 [ 141.658145] ? kmem_cache_double_free+0x1ca/0x440 [kasan_test] [ 141.658156] kasan_report_invalid_free+0xba/0xe0 [ 141.658160] ? kmem_cache_double_free+0x1ca/0x440 [kasan_test] [ 141.658168] ? kmem_cache_double_free+0x1ca/0x440 [kasan_test] [ 141.658177] check_slab_allocation+0xfa/0x120 [ 141.658181] kmem_cache_free+0x155/0x530 [ 141.658185] ? kmem_cache_double_free+0x1ca/0x440 [kasan_test] [ 141.658194] kmem_cache_double_free+0x1ca/0x440 [kasan_test] [ 141.658204] ? __pfx_kmem_cache_double_free+0x10/0x10 [kasan_test] [ 141.658212] ? finish_task_switch.isra.0+0x155/0x750 [ 141.658216] ? __switch_to+0x5ba/0x1020 [ 141.658220] ? __schedule+0x757/0x1420 [ 141.658224] ? __pfx_read_tsc+0x10/0x10 [ 141.658227] ? ktime_get_ts64+0x7f/0x220 [ 141.658231] kunit_try_run_case+0x175/0x440 [ 141.658235] ? __pfx_kunit_try_run_case+0x10/0x10 [ 141.658237] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 141.658242] ? __pfx_kunit_try_run_case+0x10/0x10 [ 141.658244] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 141.658247] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 141.658251] kthread+0x3b4/0x780 [ 141.658255] ? __pfx_kthread+0x10/0x10 [ 141.658258] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 141.658262] ? __pfx_kthread+0x10/0x10 [ 141.658265] ret_from_fork+0x30/0x70 [ 141.658268] ? __pfx_kthread+0x10/0x10 [ 141.658271] ret_from_fork_asm+0x1a/0x30 [ 141.658276] [ 141.860110] Allocated by task 3817: [ 141.864276] kasan_save_stack+0x1c/0x40 [ 141.868795] kasan_save_track+0x10/0x30 [ 141.873306] __kasan_slab_alloc+0x85/0x90 [ 141.877992] kmem_cache_alloc_noprof+0x130/0x420 [ 141.883282] kmem_cache_double_free+0x13f/0x440 [kasan_test] [ 141.889615] kunit_try_run_case+0x175/0x440 [ 141.894471] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 141.900537] kthread+0x3b4/0x780 [ 141.904443] ret_from_fork+0x30/0x70 [ 141.908697] ret_from_fork_asm+0x1a/0x30 [ 141.915470] Freed by task 3817: [ 141.919288] kasan_save_stack+0x1c/0x40 [ 141.923800] kasan_save_track+0x10/0x30 [ 141.928311] kasan_save_free_info+0x37/0x60 [ 141.933169] __kasan_slab_free+0x4d/0x70 [ 141.937768] kmem_cache_free+0x2ee/0x530 [ 141.942369] kmem_cache_double_free+0x156/0x440 [kasan_test] [ 141.948705] kunit_try_run_case+0x175/0x440 [ 141.953561] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 141.959627] kthread+0x3b4/0x780 [ 141.963537] ret_from_fork+0x30/0x70 [ 141.967789] ret_from_fork_asm+0x1a/0x30 [ 141.974564] The buggy address belongs to the object at ffff88816a4ef6b0 which belongs to the cache test_cache of size 200 [ 141.988323] The buggy address is located 0 bytes inside of 200-byte region [ffff88816a4ef6b0, ffff88816a4ef778) [ 142.003395] The buggy address belongs to the physical page: [ 142.009634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x16a4ee [ 142.018298] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 142.026613] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 142.034238] page_type: f5(slab) [ 142.038069] raw: 0017ffffc0000040 ffff88840db95900 dead000000000122 0000000000000000 [ 142.046468] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 142.054872] head: 0017ffffc0000040 ffff88840db95900 dead000000000122 0000000000000000 [ 142.063359] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 142.071847] head: 0017ffffc0000001 ffffea0005a93b81 00000000ffffffff 00000000ffffffff [ 142.080334] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 142.088822] page dumped because: kasan: bad access detected [ 142.097248] Memory state around the buggy address: [ 142.102710] ffff88816a4ef580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 142.110594] ffff88816a4ef600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 142.118478] >ffff88816a4ef680: fc fc fc fc fc fc fa fb fb fb fb fb fb fb fb fb [ 142.126360] ^ [ 142.131824] ffff88816a4ef700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc [ 142.139708] ffff88816a4ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 142.147592] ================================================================== [ 142.183731] ok 37 kmem_cache_double_free [ 142.184038] ================================================================== [ 142.196864] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x1c3/0x470 [kasan_test] [ 142.205617] Free of addr ffff88816a4ef6b1 by task kunit_try_catch/3819 [ 142.214985] CPU: 4 UID: 0 PID: 3819 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 142.214992] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 142.214994] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 142.214996] Call Trace: [ 142.214998] [ 142.215000] dump_stack_lvl+0x4f/0x70 [ 142.215008] print_address_description.constprop.0+0x2c/0x3b0 [ 142.215014] print_report+0xb9/0x280 [ 142.215017] ? kasan_addr_to_slab+0x9/0x90 [ 142.215032] ? kmem_cache_invalid_free+0x1c3/0x470 [kasan_test] [ 142.215042] kasan_report_invalid_free+0xba/0xe0 [ 142.215046] ? kmem_cache_invalid_free+0x1c3/0x470 [kasan_test] [ 142.215064] ? kmem_cache_invalid_free+0x1c3/0x470 [kasan_test] [ 142.215072] check_slab_allocation+0x116/0x120 [ 142.215076] kmem_cache_free+0x155/0x530 [ 142.215080] ? kmem_cache_invalid_free+0x1c3/0x470 [kasan_test] [ 142.215088] kmem_cache_invalid_free+0x1c3/0x470 [kasan_test] [ 142.215098] ? __pfx_kmem_cache_invalid_free+0x10/0x10 [kasan_test] [ 142.215107] ? finish_task_switch.isra.0+0x155/0x750 [ 142.215111] ? __switch_to+0x5ba/0x1020 [ 142.215115] ? __schedule+0x757/0x1420 [ 142.215118] ? __pfx_read_tsc+0x10/0x10 [ 142.215121] ? ktime_get_ts64+0x7f/0x220 [ 142.215125] kunit_try_run_case+0x175/0x440 [ 142.215129] ? __pfx_kunit_try_run_case+0x10/0x10 [ 142.215132] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 142.215136] ? __pfx_kunit_try_run_case+0x10/0x10 [ 142.215138] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 142.215142] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 142.215145] kthread+0x3b4/0x780 [ 142.215149] ? __pfx_kthread+0x10/0x10 [ 142.215152] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 142.215156] ? __pfx_kthread+0x10/0x10 [ 142.215159] ret_from_fork+0x30/0x70 [ 142.215162] ? __pfx_kthread+0x10/0x10 [ 142.215165] ret_from_fork_asm+0x1a/0x30 [ 142.215171] [ 142.417583] Allocated by task 3819: [ 142.421748] kasan_save_stack+0x1c/0x40 [ 142.426261] kasan_save_track+0x10/0x30 [ 142.430772] __kasan_slab_alloc+0x85/0x90 [ 142.435456] kmem_cache_alloc_noprof+0x130/0x420 [ 142.440747] kmem_cache_invalid_free+0x142/0x470 [kasan_test] [ 142.447169] kunit_try_run_case+0x175/0x440 [ 142.452036] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 142.458102] kthread+0x3b4/0x780 [ 142.462008] ret_from_fork+0x30/0x70 [ 142.466272] ret_from_fork_asm+0x1a/0x30 [ 142.473050] The buggy address belongs to the object at ffff88816a4ef6b0 which belongs to the cache test_cache of size 200 [ 142.486820] The buggy address is located 1 bytes inside of 200-byte region [ffff88816a4ef6b0, ffff88816a4ef778) [ 142.501896] The buggy address belongs to the physical page: [ 142.508135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x16a4ee [ 142.516794] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 142.525111] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 142.532737] page_type: f5(slab) [ 142.536558] raw: 0017ffffc0000040 ffff88840db943c0 dead000000000122 0000000000000000 [ 142.544959] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 142.553362] head: 0017ffffc0000040 ffff88840db943c0 dead000000000122 0000000000000000 [ 142.561850] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 142.570339] head: 0017ffffc0000001 ffffea0005a93b81 00000000ffffffff 00000000ffffffff [ 142.578828] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 142.587315] page dumped because: kasan: bad access detected [ 142.595731] Memory state around the buggy address: [ 142.601193] ffff88816a4ef580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 142.609094] ffff88816a4ef600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 142.616978] >ffff88816a4ef680: fc fc fc fc fc fc 00 00 00 00 00 00 00 00 00 00 [ 142.624860] ^ [ 142.630324] ffff88816a4ef700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 142.638208] ffff88816a4ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 142.646091] ================================================================== [ 142.702405] ok 38 kmem_cache_invalid_free [ 142.720066] ================================================================== [ 142.732988] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x3b5/0x4d0 [kasan_test] [ 142.741921] Read of size 1 at addr ffff888414f92420 by task kunit_try_catch/3824 [ 142.752158] CPU: 1 UID: 0 PID: 3824 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 142.752165] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 142.752167] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 142.752169] Call Trace: [ 142.752172] [ 142.752175] dump_stack_lvl+0x4f/0x70 [ 142.752181] print_address_description.constprop.0+0x2c/0x3b0 [ 142.752189] ? kmem_cache_rcu_uaf+0x3b5/0x4d0 [kasan_test] [ 142.752199] print_report+0xb9/0x280 [ 142.752204] ? kmem_cache_rcu_uaf+0x3b5/0x4d0 [kasan_test] [ 142.752212] ? kasan_addr_to_slab+0x9/0x90 [ 142.752216] ? kmem_cache_rcu_uaf+0x3b5/0x4d0 [kasan_test] [ 142.752225] kasan_report+0xda/0x110 [ 142.752229] ? kmem_cache_rcu_uaf+0x3b5/0x4d0 [kasan_test] [ 142.752238] kmem_cache_rcu_uaf+0x3b5/0x4d0 [kasan_test] [ 142.752247] ? __pfx_kmem_cache_rcu_uaf+0x10/0x10 [kasan_test] [ 142.752256] ? finish_task_switch.isra.0+0x155/0x750 [ 142.752260] ? __switch_to+0x5ba/0x1020 [ 142.752263] ? __schedule+0x757/0x1420 [ 142.752267] ? __pfx_read_tsc+0x10/0x10 [ 142.752270] ? ktime_get_ts64+0x7f/0x220 [ 142.752274] kunit_try_run_case+0x175/0x440 [ 142.752278] ? __pfx_kunit_try_run_case+0x10/0x10 [ 142.752281] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 142.752285] ? __pfx_kunit_try_run_case+0x10/0x10 [ 142.752287] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 142.752291] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 142.752294] kthread+0x3b4/0x780 [ 142.752299] ? __pfx_kthread+0x10/0x10 [ 142.752302] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 142.752305] ? __pfx_kthread+0x10/0x10 [ 142.752308] ret_from_fork+0x30/0x70 [ 142.752312] ? __pfx_kthread+0x10/0x10 [ 142.752315] ret_from_fork_asm+0x1a/0x30 [ 142.752320] [ 142.941443] Allocated by task 3824: [ 142.945614] kasan_save_stack+0x1c/0x40 [ 142.950131] kasan_save_track+0x10/0x30 [ 142.954647] __kasan_slab_alloc+0x85/0x90 [ 142.959334] kmem_cache_alloc_noprof+0x130/0x420 [ 142.964629] kmem_cache_rcu_uaf+0x141/0x4d0 [kasan_test] [ 142.970619] kunit_try_run_case+0x175/0x440 [ 142.975482] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 142.981550] kthread+0x3b4/0x780 [ 142.985461] ret_from_fork+0x30/0x70 [ 142.989715] ret_from_fork_asm+0x1a/0x30 [ 142.996497] Freed by task 0: [ 143.000066] kasan_save_stack+0x1c/0x40 [ 143.004593] kasan_save_track+0x10/0x30 [ 143.009107] kasan_save_free_info+0x37/0x60 [ 143.013967] __kasan_slab_free+0x4d/0x70 [ 143.018567] slab_free_after_rcu_debug+0xe7/0x310 [ 143.023947] rcu_do_batch+0x38a/0xde0 [ 143.028291] rcu_core+0x390/0xa50 [ 143.032290] handle_softirqs+0x198/0x5e0 [ 143.036889] __irq_exit_rcu+0x158/0x1a0 [ 143.041403] sysvec_apic_timer_interrupt+0x6e/0x90 [ 143.046870] asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 143.054860] Last potentially related work creation: [ 143.060408] kasan_save_stack+0x1c/0x40 [ 143.064925] kasan_record_aux_stack+0xa3/0xb0 [ 143.069955] kmem_cache_free+0x199/0x530 [ 143.074557] kmem_cache_rcu_uaf+0x17f/0x4d0 [kasan_test] [ 143.080548] kunit_try_run_case+0x175/0x440 [ 143.085406] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 143.091476] kthread+0x3b4/0x780 [ 143.095386] ret_from_fork+0x30/0x70 [ 143.099641] ret_from_fork_asm+0x1a/0x30 [ 143.106419] The buggy address belongs to the object at ffff888414f92420 which belongs to the cache test_cache of size 200 [ 143.120182] The buggy address is located 0 bytes inside of freed 200-byte region [ffff888414f92420, ffff888414f924e8) [ 143.135779] The buggy address belongs to the physical page: [ 143.142030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x414f92 [ 143.150691] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 143.159006] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 143.166632] page_type: f5(slab) [ 143.170455] raw: 0017ffffc0000040 ffff88810310af00 dead000000000122 0000000000000000 [ 143.178856] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 143.187258] head: 0017ffffc0000040 ffff88810310af00 dead000000000122 0000000000000000 [ 143.195749] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 143.204239] head: 0017ffffc0000001 ffffea001053e481 00000000ffffffff 00000000ffffffff [ 143.212727] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 143.221213] page dumped because: kasan: bad access detected [ 143.229633] Memory state around the buggy address: [ 143.235095] ffff888414f92300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 143.242978] ffff888414f92380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 143.250862] >ffff888414f92400: fc fc fc fc fa fb fb fb fb fb fb fb fb fb fb fb [ 143.258744] ^ [ 143.263691] ffff888414f92480: fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc [ 143.271576] ffff888414f92500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 143.279459] ================================================================== [ 143.334472] ok 39 kmem_cache_rcu_uaf [ 143.340328] ================================================================== [ 143.352824] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1ac/0x360 [kasan_test] [ 143.362372] Read of size 1 at addr ffff888101374280 by task kunit_try_catch/3827 [ 143.372622] CPU: 2 UID: 0 PID: 3827 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 143.372633] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 143.372636] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 143.372640] Call Trace: [ 143.372644] [ 143.372648] dump_stack_lvl+0x4f/0x70 [ 143.372657] print_address_description.constprop.0+0x2c/0x3b0 [ 143.372668] ? kmem_cache_double_destroy+0x1ac/0x360 [kasan_test] [ 143.372687] print_report+0xb9/0x280 [ 143.372693] ? kmem_cache_double_destroy+0x1ac/0x360 [kasan_test] [ 143.372709] ? kasan_addr_to_slab+0x9/0x90 [ 143.372714] ? kmem_cache_double_destroy+0x1ac/0x360 [kasan_test] [ 143.372730] kasan_report+0xda/0x110 [ 143.372736] ? kmem_cache_double_destroy+0x1ac/0x360 [kasan_test] [ 143.372752] ? kmem_cache_double_destroy+0x1ac/0x360 [kasan_test] [ 143.372767] __kasan_check_byte+0x32/0x40 [ 143.372774] kmem_cache_destroy+0x1d/0x170 [ 143.372780] kmem_cache_double_destroy+0x1ac/0x360 [kasan_test] [ 143.372797] ? __pfx_kmem_cache_double_destroy+0x10/0x10 [kasan_test] [ 143.372812] ? finish_task_switch.isra.0+0x155/0x750 [ 143.372818] ? __switch_to+0x5ba/0x1020 [ 143.372824] ? __schedule+0x757/0x1420 [ 143.372830] ? __pfx_read_tsc+0x10/0x10 [ 143.372835] ? ktime_get_ts64+0x7f/0x220 [ 143.372842] kunit_try_run_case+0x175/0x440 [ 143.372848] ? __pfx_kunit_try_run_case+0x10/0x10 [ 143.372853] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 143.372860] ? __pfx_kunit_try_run_case+0x10/0x10 [ 143.372864] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 143.372870] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 143.372875] kthread+0x3b4/0x780 [ 143.372882] ? __pfx_kthread+0x10/0x10 [ 143.372886] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 143.372893] ? __pfx_kthread+0x10/0x10 [ 143.372898] ret_from_fork+0x30/0x70 [ 143.372903] ? __pfx_kthread+0x10/0x10 [ 143.372908] ret_from_fork_asm+0x1a/0x30 [ 143.372917] [ 143.581971] Allocated by task 3827: [ 143.586145] kasan_save_stack+0x1c/0x40 [ 143.590668] kasan_save_track+0x10/0x30 [ 143.595188] __kasan_slab_alloc+0x85/0x90 [ 143.599881] kmem_cache_alloc_noprof+0x130/0x420 [ 143.605177] __kmem_cache_create_args+0x130/0x2c0 [ 143.610563] kmem_cache_double_destroy+0xc2/0x360 [kasan_test] [ 143.617085] kunit_try_run_case+0x175/0x440 [ 143.621950] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 143.628038] kthread+0x3b4/0x780 [ 143.631964] ret_from_fork+0x30/0x70 [ 143.636221] ret_from_fork_asm+0x1a/0x30 [ 143.643004] Freed by task 3827: [ 143.646827] kasan_save_stack+0x1c/0x40 [ 143.651348] kasan_save_track+0x10/0x30 [ 143.655866] kasan_save_free_info+0x37/0x60 [ 143.660731] __kasan_slab_free+0x4d/0x70 [ 143.665336] kmem_cache_free+0x2ee/0x530 [ 143.669941] kobject_cleanup+0x105/0x360 [ 143.674549] kmem_cache_double_destroy+0x13b/0x360 [kasan_test] [ 143.681158] kunit_try_run_case+0x175/0x440 [ 143.686032] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 143.692107] kthread+0x3b4/0x780 [ 143.696030] ret_from_fork+0x30/0x70 [ 143.700288] ret_from_fork_asm+0x1a/0x30 [ 143.707074] The buggy address belongs to the object at ffff888101374280 which belongs to the cache kmem_cache of size 232 [ 143.720840] The buggy address is located 0 bytes inside of freed 232-byte region [ffff888101374280, ffff888101374368) [ 143.736443] The buggy address belongs to the physical page: [ 143.742688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101374 [ 143.751358] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 143.759679] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 143.767309] page_type: f5(slab) [ 143.771136] raw: 0017ffffc0000040 ffff888100042000 dead000000000122 0000000000000000 [ 143.779545] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 143.787954] head: 0017ffffc0000040 ffff888100042000 dead000000000122 0000000000000000 [ 143.796448] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 143.804943] head: 0017ffffc0000001 ffffea000404dd01 00000000ffffffff 00000000ffffffff [ 143.813438] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 143.821931] page dumped because: kasan: bad access detected [ 143.830355] Memory state around the buggy address: [ 143.835824] ffff888101374180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 143.843713] ffff888101374200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 143.851600] >ffff888101374280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 143.859489] ^ [ 143.863402] ffff888101374300: fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc [ 143.871291] ffff888101374380: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 143.879178] ================================================================== [ 143.887309] ok 40 kmem_cache_double_destroy [ 144.432452] ok 41 kmem_cache_accounted [ 144.466708] ok 42 kmem_cache_bulk [ 144.471737] ================================================================== [ 144.483958] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 144.493317] Read of size 1 at addr ffff888117593573 by task kunit_try_catch/3839 [ 144.503553] CPU: 0 UID: 0 PID: 3839 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 144.503561] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 144.503562] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 144.503564] Call Trace: [ 144.503566] [ 144.503568] dump_stack_lvl+0x4f/0x70 [ 144.503575] print_address_description.constprop.0+0x2c/0x3b0 [ 144.503583] ? mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 144.503593] print_report+0xb9/0x280 [ 144.503598] ? mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 144.503606] ? kasan_addr_to_slab+0x9/0x90 [ 144.503610] ? mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 144.503618] kasan_report+0xda/0x110 [ 144.503622] ? mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 144.503631] mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 144.503641] ? __pfx_mempool_oob_right_helper+0x10/0x10 [kasan_test] [ 144.503651] mempool_kmalloc_oob_right+0x92/0xe0 [kasan_test] [ 144.503659] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [kasan_test] [ 144.503667] ? finish_task_switch.isra.0+0x155/0x750 [ 144.503672] ? __pfx_mempool_kmalloc+0x10/0x10 [ 144.503676] ? __pfx_mempool_kfree+0x10/0x10 [ 144.503679] ? __schedule+0x757/0x1420 [ 144.503682] ? __pfx_read_tsc+0x10/0x10 [ 144.503685] ? ktime_get_ts64+0x7f/0x220 [ 144.503689] kunit_try_run_case+0x175/0x440 [ 144.503693] ? __pfx_kunit_try_run_case+0x10/0x10 [ 144.503696] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 144.503700] ? __pfx_kunit_try_run_case+0x10/0x10 [ 144.503702] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 144.503706] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 144.503709] kthread+0x3b4/0x780 [ 144.503714] ? __pfx_kthread+0x10/0x10 [ 144.503717] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 144.503721] ? __pfx_kthread+0x10/0x10 [ 144.503724] ret_from_fork+0x30/0x70 [ 144.503727] ? __pfx_kthread+0x10/0x10 [ 144.503731] ret_from_fork_asm+0x1a/0x30 [ 144.503736] [ 144.715040] Allocated by task 3839: [ 144.719209] kasan_save_stack+0x1c/0x40 [ 144.723727] kasan_save_track+0x10/0x30 [ 144.728241] remove_element+0x114/0x180 [ 144.732755] mempool_alloc_preallocated+0x44/0x80 [ 144.738135] mempool_oob_right_helper+0x80/0x320 [kasan_test] [ 144.744558] mempool_kmalloc_oob_right+0x92/0xe0 [kasan_test] [ 144.750981] kunit_try_run_case+0x175/0x440 [ 144.755841] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 144.761913] kthread+0x3b4/0x780 [ 144.765825] ret_from_fork+0x30/0x70 [ 144.770082] ret_from_fork_asm+0x1a/0x30 [ 144.776864] The buggy address belongs to the object at ffff888117593500 which belongs to the cache kmalloc-128 of size 128 [ 144.790711] The buggy address is located 0 bytes to the right of allocated 115-byte region [ffff888117593500, ffff888117593573) [ 144.807175] The buggy address belongs to the physical page: [ 144.813415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x117592 [ 144.822081] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 144.830398] anon flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 144.838456] page_type: f5(slab) [ 144.842282] raw: 0017ffffc0000040 ffff888100042a00 0000000000000000 dead000000000001 [ 144.850685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 144.859087] head: 0017ffffc0000040 ffff888100042a00 0000000000000000 dead000000000001 [ 144.867578] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 144.876078] head: 0017ffffc0000001 ffffea00045d6481 00000000ffffffff 00000000ffffffff [ 144.884568] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 144.893056] page dumped because: kasan: bad access detected [ 144.901488] Memory state around the buggy address: [ 144.906953] ffff888117593400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 144.914839] ffff888117593480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 144.922726] >ffff888117593500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 144.930612] ^ [ 144.938149] ffff888117593580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 144.946042] ffff888117593600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 144.953927] ================================================================== [ 144.962301] ok 43 mempool_kmalloc_oob_right [ 144.962435] ================================================================== [ 144.975523] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 144.976374] result_service: raw_upload, RESULT_MNT: /internal-lkp-server/result, RESULT_ROOT: /internal-lkp-server/result/kunit/group-03/lkp-hsw-d03/debian-12-x86_64-20240206.cgz/x86_64-rhel-9.4-kunit/gcc-12/fe301d6b4b4aec003ff84aa4d2860e772b147225/1, TMP_RESULT_ROOT: /tmp/lkp/result [ 144.984879] Read of size 1 at addr ffff8884147ca001 by task kunit_try_catch/3841 [ 144.984886] CPU: 0 UID: 0 PID: 3841 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 144.984892] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 144.984894] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 144.984896] Call Trace: [ 144.984898] [ 144.984899] dump_stack_lvl+0x4f/0x70 [ 144.984905] print_address_description.constprop.0+0x2c/0x3b0 [ 144.984912] ? mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 144.984922] print_report+0xb9/0x280 [ 144.984926] ? mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 144.984934] ? kasan_addr_to_slab+0x9/0x90 [ 144.984938] ? mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 144.984946] kasan_report+0xda/0x110 [ 144.984950] ? mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 144.984959] mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 144.984968] ? __pfx_mempool_oob_right_helper+0x10/0x10 [kasan_test] [ 144.984977] mempool_kmalloc_large_oob_right+0x92/0xe0 [kasan_test] [ 144.984986] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [kasan_test] [ 144.984994] ? finish_task_switch.isra.0+0x155/0x750 [ 144.984999] ? __pfx_mempool_kmalloc+0x10/0x10 [ 144.985002] ? __pfx_mempool_kfree+0x10/0x10 [ 144.985006] ? __schedule+0x757/0x1420 [ 144.985009] ? __pfx_read_tsc+0x10/0x10 [ 144.985013] ? ktime_get_ts64+0x7f/0x220 [ 144.985017] kunit_try_run_case+0x175/0x440 [ 144.985031] ? __pfx_kunit_try_run_case+0x10/0x10 [ 144.985034] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 144.985038] ? __pfx_kunit_try_run_case+0x10/0x10 [ 144.985040] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 144.985044] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 144.985047] kthread+0x3b4/0x780 [ 144.985061] ? __pfx_kthread+0x10/0x10 [ 144.985065] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 144.985068] ? __pfx_kthread+0x10/0x10 [ 144.985072] ret_from_fork+0x30/0x70 [ 144.985076] ? __pfx_kthread+0x10/0x10 [ 144.985079] ret_from_fork_asm+0x1a/0x30 [ 144.985084] [ 145.018604] The buggy address belongs to the physical page: [ 145.018606] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff8884147c8c00 pfn:0x4147c8 [ 145.018622] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 145.023082] run-job /lkp/jobs/scheduled/lkp-hsw-d03/kunit-group-03-debian-12-x86_64-20240206.cgz-fe301d6b4b4a-20250529-138988-1olf57i-0.yaml [ 145.034109] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 145.034114] page_type: f8(unknown) [ 145.048656] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 145.048660] raw: ffff8884147c8c00 0000000000000000 00000001f8000000 0000000000000000 [ 145.303781] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 145.312270] head: ffff8884147c8c00 0000000000000000 00000001f8000000 0000000000000000 [ 145.320762] head: 0017ffffc0000002 ffffea001051f201 00000000ffffffff 00000000ffffffff [ 145.329251] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 145.337739] page dumped because: kasan: bad access detected [ 145.346163] Memory state around the buggy address: [ 145.351624] ffff8884147c9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 145.359506] ffff8884147c9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 145.367392] >ffff8884147ca000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 145.375276] ^ [ 145.379184] ffff8884147ca080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 145.387075] ffff8884147ca100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 145.394961] ================================================================== [ 145.403118] ok 44 mempool_kmalloc_large_oob_right [ 145.403387] ================================================================== [ 145.417003] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 145.426382] Read of size 1 at addr ffff8881452131fb by task kunit_try_catch/3844 [ 145.436625] CPU: 3 UID: 0 PID: 3844 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 145.436632] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 145.436634] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 145.436636] Call Trace: [ 145.436638] [ 145.436641] dump_stack_lvl+0x4f/0x70 [ 145.436649] print_address_description.constprop.0+0x2c/0x3b0 [ 145.436657] ? mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 145.436667] print_report+0xb9/0x280 [ 145.436673] ? mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 145.436681] ? kasan_addr_to_slab+0x9/0x90 [ 145.436686] ? mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 145.436694] kasan_report+0xda/0x110 [ 145.436698] ? mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 145.436708] mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 145.436718] ? __pfx_mempool_oob_right_helper+0x10/0x10 [kasan_test] [ 145.436727] mempool_slab_oob_right+0x8d/0xe0 [kasan_test] [ 145.436736] ? __pfx_mempool_slab_oob_right+0x10/0x10 [kasan_test] [ 145.436745] ? finish_task_switch.isra.0+0x155/0x750 [ 145.436749] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 145.436753] ? __pfx_mempool_free_slab+0x10/0x10 [ 145.436756] ? __schedule+0x757/0x1420 [ 145.436760] ? __pfx_read_tsc+0x10/0x10 [ 145.436763] ? ktime_get_ts64+0x7f/0x220 [ 145.436767] kunit_try_run_case+0x175/0x440 [ 145.436771] ? __pfx_kunit_try_run_case+0x10/0x10 [ 145.436773] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 145.436778] ? __pfx_kunit_try_run_case+0x10/0x10 [ 145.436780] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 145.436783] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 145.436787] kthread+0x3b4/0x780 [ 145.436791] ? __pfx_kthread+0x10/0x10 [ 145.436794] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 145.436798] ? __pfx_kthread+0x10/0x10 [ 145.436801] ret_from_fork+0x30/0x70 [ 145.436804] ? __pfx_kthread+0x10/0x10 [ 145.436807] ret_from_fork_asm+0x1a/0x30 [ 145.436813] [ 145.648217] Allocated by task 3844: [ 145.652384] kasan_save_stack+0x1c/0x40 [ 145.656902] kasan_save_track+0x10/0x30 [ 145.661417] __kasan_mempool_unpoison_object+0x1ad/0x1f0 [ 145.667402] remove_element+0x114/0x180 [ 145.671917] mempool_alloc_preallocated+0x44/0x80 [ 145.677298] mempool_oob_right_helper+0x80/0x320 [kasan_test] [ 145.683721] mempool_slab_oob_right+0x8d/0xe0 [kasan_test] [ 145.689883] kunit_try_run_case+0x175/0x440 [ 145.694746] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 145.700818] kthread+0x3b4/0x780 [ 145.704730] ret_from_fork+0x30/0x70 [ 145.708988] ret_from_fork_asm+0x1a/0x30 [ 145.715767] The buggy address belongs to the object at ffff888145213180 which belongs to the cache test_cache of size 123 [ 145.729527] The buggy address is located 0 bytes to the right of allocated 123-byte region [ffff888145213180, ffff8881452131fb) [ 145.745992] The buggy address belongs to the physical page: [ 145.752232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x145213 [ 145.760898] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 145.768092] page_type: f5(slab) [ 145.771916] raw: 0017ffffc0000000 ffff888101d62a00 dead000000000122 0000000000000000 [ 145.780319] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 145.788722] page dumped because: kasan: bad access detected [ 145.797141] Memory state around the buggy address: [ 145.802606] ffff888145213080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 145.810490] ffff888145213100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 145.818376] >ffff888145213180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 [ 145.826260] ^ [ 145.834067] ffff888145213200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 145.841963] ffff888145213280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 145.849850] ================================================================== [ 145.887363] ok 45 mempool_slab_oob_right [ 145.887613] ================================================================== [ 145.900442] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 145.909372] Read of size 1 at addr ffff888140bd8d00 by task kunit_try_catch/3848 [ 145.919607] CPU: 5 UID: 0 PID: 3848 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 145.919614] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 145.919615] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 145.919617] Call Trace: [ 145.919619] [ 145.919621] dump_stack_lvl+0x4f/0x70 [ 145.919628] print_address_description.constprop.0+0x2c/0x3b0 [ 145.919635] ? mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 145.919644] print_report+0xb9/0x280 [ 145.919648] ? mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 145.919656] ? kasan_addr_to_slab+0x9/0x90 [ 145.919659] ? mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 145.919667] kasan_report+0xda/0x110 [ 145.919671] ? mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 145.919680] mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 145.919689] ? __pfx_mempool_uaf_helper+0x10/0x10 [kasan_test] [ 145.919699] mempool_kmalloc_uaf+0x8f/0xe0 [kasan_test] [ 145.919707] ? __pfx_mempool_kmalloc_uaf+0x10/0x10 [kasan_test] [ 145.919715] ? finish_task_switch.isra.0+0x155/0x750 [ 145.919719] ? __pfx_mempool_kmalloc+0x10/0x10 [ 145.919723] ? __pfx_mempool_kfree+0x10/0x10 [ 145.919726] ? __schedule+0x757/0x1420 [ 145.919730] ? __pfx_read_tsc+0x10/0x10 [ 145.919733] ? ktime_get_ts64+0x7f/0x220 [ 145.919737] kunit_try_run_case+0x175/0x440 [ 145.919741] ? __pfx_kunit_try_run_case+0x10/0x10 [ 145.919744] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 145.919748] ? __pfx_kunit_try_run_case+0x10/0x10 [ 145.919750] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 145.919754] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 145.919757] kthread+0x3b4/0x780 [ 145.919761] ? __pfx_kthread+0x10/0x10 [ 145.919764] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 145.919768] ? __pfx_kthread+0x10/0x10 [ 145.919771] ret_from_fork+0x30/0x70 [ 145.919774] ? __pfx_kthread+0x10/0x10 [ 145.919777] ret_from_fork_asm+0x1a/0x30 [ 145.919783] [ 145.988709] /usr/bin/wget -q --timeout=3600 --tries=1 --local-encoding=UTF-8 http://internal-lkp-server:80/~lkp/cgi-bin/lkp-jobfile-append-var?job_file=/lkp/jobs/scheduled/lkp-hsw-d03/kunit-group-03-debian-12-x86_64-20240206.cgz-fe301d6b4b4a-20250529-138988-1olf57i-0.yaml&job_state=running -O /dev/null [ 145.991766] Allocated by task 3848: [ 145.991770] kasan_save_stack+0x1c/0x40 [ 146.002192] kasan_save_track+0x10/0x30 [ 146.002195] remove_element+0x114/0x180 [ 146.002199] mempool_alloc_preallocated+0x44/0x80 [ 146.008509] target ucode: 0x28 [ 146.014675] mempool_uaf_helper+0x87/0x3e0 [kasan_test] [ 146.014696] mempool_kmalloc_uaf+0x8f/0xe0 [kasan_test] [ 146.027166] kunit_try_run_case+0x175/0x440 [ 146.027170] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 146.033831] LKP: stdout: 3533: current_version: 28, target_version: 28 [ 146.037917] kthread+0x3b4/0x780 [ 146.037922] ret_from_fork+0x30/0x70 [ 146.047298] ret_from_fork_asm+0x1a/0x30 [ 146.047303] Freed by task 3848: [ 146.052061] check_nr_cpu [ 146.056421] kasan_save_stack+0x1c/0x40 [ 146.056424] kasan_save_track+0x10/0x30 [ 146.066666] kasan_save_free_info+0x37/0x60 [ 146.066669] __kasan_mempool_poison_object+0xe1/0x1b0 [ 146.073205] CPU(s): 8 [ 146.077773] mempool_free+0x246/0x340 [ 146.077776] mempool_uaf_helper+0x103/0x3e0 [kasan_test] [ 146.090609] mempool_kmalloc_uaf+0x8f/0xe0 [kasan_test] [ 146.095286] On-line CPU(s) list: 0-7 [ 146.098949] kunit_try_run_case+0x175/0x440 [ 146.098952] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 146.108758] kthread+0x3b4/0x780 [ 146.108761] ret_from_fork+0x30/0x70 [ 146.108774] ret_from_fork_asm+0x1a/0x30 [ 146.114427] Model name: Intel(R) Core(TM) i7-4770 CPU @ 3.40GHz [ 146.117446] The buggy address belongs to the object at ffff888140bd8d00 which belongs to the cache kmalloc-128 of size 128 [ 146.117449] The buggy address is located 0 bytes inside of freed 128-byte region [ffff888140bd8d00, ffff888140bd8d80) [ 146.124925] The buggy address belongs to the physical page: [ 146.124927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x140bd8 [ 146.128901] BIOS Model name: Intel(R) Core(TM) i7-4770 CPU @ 3.40GHz Fill By OEM CPU @ 3.4GHz [ 146.154434] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 146.154438] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 146.163122] page_type: f5(slab) [ 146.163125] raw: 0017ffffc0000040 ffff888100042a00 dead000000000122 0000000000000000 [ 146.165987] Thread(s) per core: 2 [ 146.169815] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 146.169818] head: 0017ffffc0000040 ffff888100042a00 dead000000000122 0000000000000000 [ 146.169831] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 146.169833] head: 0017ffffc0000001 ffffea000502f601 00000000ffffffff 00000000ffffffff [ 146.179717] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 146.179718] page dumped because: kasan: bad access detected [ 146.184199] Core(s) per socket: 4 [ 146.189354] Memory state around the buggy address: [ 146.189356] ffff888140bd8c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 146.189358] ffff888140bd8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 146.197440] >ffff888140bd8d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 146.197441] ^ [ 146.197443] ffff888140bd8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 146.203030] Socket(s): 1 [ 146.208374] ffff888140bd8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 146.208376] ================================================================== [ 146.208688] ok 46 mempool_kmalloc_uaf [ 146.219756] ================================================================== [ 146.224527] CPU(s) scaling MHz: 97% [ 146.225927] BUG: KASAN: use-after-free in mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 146.232706] Read of size 1 at addr ffff88810fedc000 by task kunit_try_catch/3850 [ 146.232722] CPU: 1 UID: 0 PID: 3850 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 146.232729] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 146.232730] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 146.232743] Call Trace: [ 146.232745] [ 146.232747] dump_stack_lvl+0x4f/0x70 [ 146.232753] print_address_description.constprop.0+0x2c/0x3b0 [ 146.232757] ? mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 146.232766] print_report+0xb9/0x280 [ 146.232770] ? mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 146.232779] ? kasan_addr_to_slab+0x9/0x90 [ 146.232782] ? mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 146.232790] kasan_report+0xda/0x110 [ 146.232794] ? mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 146.232803] mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 146.232813] ? __pfx_mempool_uaf_helper+0x10/0x10 [kasan_test] [ 146.232822] mempool_kmalloc_large_uaf+0x8f/0xe0 [kasan_test] [ 146.232831] ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10 [kasan_test] [ 146.232839] ? finish_task_switch.isra.0+0x155/0x750 [ 146.232843] ? __pfx_mempool_kmalloc+0x10/0x10 [ 146.232846] ? __pfx_mempool_kfree+0x10/0x10 [ 146.232849] ? __schedule+0x757/0x1420 [ 146.232853] ? __pfx_read_tsc+0x10/0x10 [ 146.232856] ? ktime_get_ts64+0x7f/0x220 [ 146.232860] kunit_try_run_case+0x175/0x440 [ 146.232863] ? __pfx_kunit_try_run_case+0x10/0x10 [ 146.232866] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 146.232870] ? __pfx_kunit_try_run_case+0x10/0x10 [ 146.232873] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 146.232876] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 146.232879] kthread+0x3b4/0x780 [ 146.232883] ? __pfx_kthread+0x10/0x10 [ 146.232886] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 146.232890] ? __pfx_kthread+0x10/0x10 [ 146.232893] ret_from_fork+0x30/0x70 [ 146.232896] ? __pfx_kthread+0x10/0x10 [ 146.232899] ret_from_fork_asm+0x1a/0x30 [ 146.232904] [ 146.237275] NUMA node(s): 1 [ 146.239754] The buggy address belongs to the physical page: [ 146.239756] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x806 pfn:0x10fedc [ 146.248776] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 146.248779] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 146.251728] NUMA node0 CPU(s): 0-7 [ 146.255824] page_type: f8(unknown) [ 146.255827] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 146.255830] raw: 0000000000000806 0000000000000000 00000001f8000000 0000000000000000 [ 146.267364] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 146.267367] head: 0000000000000806 0000000000000000 00000001f8000000 0000000000000000 [ 146.267379] head: 0017ffffc0000002 ffffea00043fb701 00000000ffffffff 00000000ffffffff [ 146.272358] run_kunit_tests: test drm_buddy_test [ 146.277696] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 146.277699] page dumped because: kasan: bad access detected [ 146.277701] Memory state around the buggy address: [ 146.285784] ffff88810fedbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 146.285786] ffff88810fedbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 146.285788] >ffff88810fedc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 146.292565] 2025-05-28 16:49:42 modprobe -v drm_buddy_test [ 146.296633] ^ [ 146.296635] ffff88810fedc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 146.296637] ffff88810fedc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 146.296638] ================================================================== [ 146.296844] ok 47 mempool_kmalloc_large_uaf [ 146.304454] insmod /lib/modules/6.15.0-rc7-00008-gfe301d6b4b4a/kernel/drivers/gpu/drm/tests/drm_buddy_test.ko [ 146.305428] ================================================================== [ 146.313196] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 146.318506] 2025-05-28 16:49:42 rmmod drm_buddy_test [ 146.326891] Read of size 1 at addr ffff88840f7ff780 by task kunit_try_catch/3852 [ 146.326897] CPU: 5 UID: 0 PID: 3852 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 146.326915] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 146.326916] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 146.326918] Call Trace: [ 146.326920] [ 146.326922] dump_stack_lvl+0x4f/0x70 [ 146.326926] print_address_description.constprop.0+0x2c/0x3b0 [ 146.326931] ? mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 146.326949] print_report+0xb9/0x280 [ 146.326953] ? mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 146.326961] ? kasan_addr_to_slab+0x9/0x90 [ 146.326964] ? mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 146.326972] kasan_report+0xda/0x110 [ 146.326976] ? mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 146.326984] mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 146.326993] ? __pfx_mempool_uaf_helper+0x10/0x10 [kasan_test] [ 146.327002] mempool_slab_uaf+0x8a/0xe0 [kasan_test] [ 146.327011] ? __pfx_mempool_slab_uaf+0x10/0x10 [kasan_test] [ 146.327033] ? finish_task_switch.isra.0+0x155/0x750 [ 146.327036] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 146.327040] ? __pfx_mempool_free_slab+0x10/0x10 [ 146.327043] ? __schedule+0x757/0x1420 [ 146.327046] ? __pfx_read_tsc+0x10/0x10 [ 146.327049] ? ktime_get_ts64+0x7f/0x220 [ 146.327053] kunit_try_run_case+0x175/0x440 [ 146.327066] ? __pfx_kunit_try_run_case+0x10/0x10 [ 146.327068] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 146.327072] ? __pfx_kunit_try_run_case+0x10/0x10 [ 146.327074] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 146.327077] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 146.327081] kthread+0x3b4/0x780 [ 146.327084] ? __pfx_kthread+0x10/0x10 [ 146.327087] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 146.327091] ? __pfx_kthread+0x10/0x10 [ 146.327094] ret_from_fork+0x30/0x70 [ 146.327097] ? __pfx_kthread+0x10/0x10 [ 146.327100] ret_from_fork_asm+0x1a/0x30 [ 146.327104] [ 146.342921] Allocated by task 3852: [ 146.342924] kasan_save_stack+0x1c/0x40 [ 146.356858] run_kunit_tests: test kasan_test [ 146.358516] kasan_save_track+0x10/0x30 [ 146.358519] __kasan_mempool_unpoison_object+0x1ad/0x1f0 [ 146.366943] remove_element+0x114/0x180 [ 146.366946] mempool_alloc_preallocated+0x44/0x80 [ 146.376330] 2025-05-28 16:49:42 modprobe -v kasan_test [ 146.386854] mempool_uaf_helper+0x87/0x3e0 [kasan_test] [ 146.402797] mempool_slab_uaf+0x8a/0xe0 [kasan_test] [ 146.406173] IPMI BMC is not supported on this machine, skip bmc-watchdog setup! [ 146.408803] kunit_try_run_case+0x175/0x440 [ 146.408806] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 146.423012] kthread+0x3b4/0x780 [ 146.423028] ret_from_fork+0x30/0x70 [ 147.323597] ret_from_fork_asm+0x1a/0x30 [ 147.330370] Freed by task 3852: [ 147.334186] kasan_save_stack+0x1c/0x40 [ 147.338694] kasan_save_track+0x10/0x30 [ 147.343205] kasan_save_free_info+0x37/0x60 [ 147.348073] __kasan_mempool_poison_object+0xe1/0x1b0 [ 147.353792] mempool_free+0x246/0x340 [ 147.358129] mempool_uaf_helper+0x103/0x3e0 [kasan_test] [ 147.364114] mempool_slab_uaf+0x8a/0xe0 [kasan_test] [ 147.369753] kunit_try_run_case+0x175/0x440 [ 147.374606] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 147.380672] kthread+0x3b4/0x780 [ 147.384576] ret_from_fork+0x30/0x70 [ 147.388827] ret_from_fork_asm+0x1a/0x30 [ 147.395599] The buggy address belongs to the object at ffff88840f7ff780 which belongs to the cache test_cache of size 123 [ 147.409356] The buggy address is located 0 bytes inside of freed 123-byte region [ffff88840f7ff780, ffff88840f7ff7fb) [ 147.424948] The buggy address belongs to the physical page: [ 147.431186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x40f7ff [ 147.439847] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 147.447038] page_type: f5(slab) [ 147.450858] raw: 0017ffffc0000000 ffff8881013752c0 dead000000000122 0000000000000000 [ 147.459257] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 147.467656] page dumped because: kasan: bad access detected [ 147.476069] Memory state around the buggy address: [ 147.481537] ffff88840f7ff680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.489418] ffff88840f7ff700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.497298] >ffff88840f7ff780: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 147.505177] ^ [ 147.509086] ffff88840f7ff800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.516966] ffff88840f7ff880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.524845] ================================================================== [ 147.560996] ok 48 mempool_slab_uaf [ 147.561209] ================================================================== [ 147.573519] BUG: KASAN: use-after-free in mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 147.582017] Read of size 1 at addr ffff8881073a0000 by task kunit_try_catch/3860 [ 147.592257] CPU: 7 UID: 0 PID: 3860 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 147.592264] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 147.592265] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 147.592267] Call Trace: [ 147.592269] [ 147.592271] dump_stack_lvl+0x4f/0x70 [ 147.592277] print_address_description.constprop.0+0x2c/0x3b0 [ 147.592283] ? mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 147.592291] print_report+0xb9/0x280 [ 147.592295] ? mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 147.592303] ? kasan_addr_to_slab+0x9/0x90 [ 147.592307] ? mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 147.592315] kasan_report+0xda/0x110 [ 147.592318] ? mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 147.592327] mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 147.592336] ? __pfx_mempool_uaf_helper+0x10/0x10 [kasan_test] [ 147.592345] mempool_page_alloc_uaf+0x8d/0xe0 [kasan_test] [ 147.592354] ? __pfx_mempool_page_alloc_uaf+0x10/0x10 [kasan_test] [ 147.592362] ? finish_task_switch.isra.0+0x155/0x750 [ 147.592366] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 147.592371] ? __pfx_mempool_free_pages+0x10/0x10 [ 147.592374] ? __schedule+0x757/0x1420 [ 147.592377] ? __pfx_read_tsc+0x10/0x10 [ 147.592381] ? ktime_get_ts64+0x7f/0x220 [ 147.592385] kunit_try_run_case+0x175/0x440 [ 147.592389] ? __pfx_kunit_try_run_case+0x10/0x10 [ 147.592391] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 147.592395] ? __pfx_kunit_try_run_case+0x10/0x10 [ 147.592398] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 147.592401] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 147.592404] kthread+0x3b4/0x780 [ 147.592409] ? __pfx_kthread+0x10/0x10 [ 147.592411] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 147.592415] ? __pfx_kthread+0x10/0x10 [ 147.592418] ret_from_fork+0x30/0x70 [ 147.592422] ? __pfx_kthread+0x10/0x10 [ 147.592425] ret_from_fork_asm+0x1a/0x30 [ 147.592430] [ 147.800791] The buggy address belongs to the physical page: [ 147.807027] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff8881073a4400 pfn:0x1073a0 [ 147.816983] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 147.824174] raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 147.832575] raw: ffff8881073a4400 0000000000000000 00000001ffffffff 0000000000000000 [ 147.840973] page dumped because: kasan: bad access detected [ 147.849387] Memory state around the buggy address: [ 147.854846] ffff88810739ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.862727] ffff88810739ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.870606] >ffff8881073a0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 147.878487] ^ [ 147.882392] ffff8881073a0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 147.890272] ffff8881073a0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 147.898150] ================================================================== [ 147.906263] ok 49 mempool_page_alloc_uaf [ 147.906454] ================================================================== [ 147.919280] BUG: KASAN: double-free in mempool_double_free_helper+0x16b/0x320 [kasan_test] [ 147.928205] Free of addr ffff88840f991900 by task kunit_try_catch/3862 [ 147.937566] CPU: 7 UID: 0 PID: 3862 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 147.937571] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 147.937573] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 147.937575] Call Trace: [ 147.937576] [ 147.937578] dump_stack_lvl+0x4f/0x70 [ 147.937581] print_address_description.constprop.0+0x2c/0x3b0 [ 147.937586] print_report+0xb9/0x280 [ 147.937589] ? kasan_addr_to_slab+0x9/0x90 [ 147.937592] ? mempool_double_free_helper+0x16b/0x320 [kasan_test] [ 147.937601] kasan_report_invalid_free+0xba/0xe0 [ 147.937605] ? mempool_double_free_helper+0x16b/0x320 [kasan_test] [ 147.937613] ? mempool_double_free_helper+0x16b/0x320 [kasan_test] [ 147.937621] ? mempool_double_free_helper+0x16b/0x320 [kasan_test] [ 147.937629] check_slab_allocation+0xfa/0x120 [ 147.937632] __kasan_mempool_poison_object+0x85/0x1b0 [ 147.937636] mempool_free+0x246/0x340 [ 147.937639] mempool_double_free_helper+0x16b/0x320 [kasan_test] [ 147.937648] ? __pfx_mempool_double_free_helper+0x10/0x10 [kasan_test] [ 147.937657] mempool_kmalloc_double_free+0x8d/0xe0 [kasan_test] [ 147.937665] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [kasan_test] [ 147.937673] ? finish_task_switch.isra.0+0x155/0x750 [ 147.937677] ? __pfx_mempool_kmalloc+0x10/0x10 [ 147.937679] ? __pfx_mempool_kfree+0x10/0x10 [ 147.937682] ? __schedule+0x757/0x1420 [ 147.937685] ? __pfx_read_tsc+0x10/0x10 [ 147.937688] ? ktime_get_ts64+0x7f/0x220 [ 147.937691] kunit_try_run_case+0x175/0x440 [ 147.937693] ? __pfx_kunit_try_run_case+0x10/0x10 [ 147.937696] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 147.937700] ? __pfx_kunit_try_run_case+0x10/0x10 [ 147.937702] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 147.937705] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 147.937708] kthread+0x3b4/0x780 [ 147.937711] ? __pfx_kthread+0x10/0x10 [ 147.937714] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 147.937718] ? __pfx_kthread+0x10/0x10 [ 147.937721] ret_from_fork+0x30/0x70 [ 147.937724] ? __pfx_kthread+0x10/0x10 [ 147.937727] ret_from_fork_asm+0x1a/0x30 [ 147.937731] [ 148.166384] Allocated by task 3862: [ 148.170544] kasan_save_stack+0x1c/0x40 [ 148.175052] kasan_save_track+0x10/0x30 [ 148.179562] remove_element+0x114/0x180 [ 148.184070] mempool_alloc_preallocated+0x44/0x80 [ 148.189442] mempool_double_free_helper+0x7b/0x320 [kasan_test] [ 148.196030] mempool_kmalloc_double_free+0x8d/0xe0 [kasan_test] [ 148.202617] kunit_try_run_case+0x175/0x440 [ 148.207469] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 148.213532] kthread+0x3b4/0x780 [ 148.217435] ret_from_fork+0x30/0x70 [ 148.221685] ret_from_fork_asm+0x1a/0x30 [ 148.228453] Freed by task 3862: [ 148.232268] kasan_save_stack+0x1c/0x40 [ 148.236777] kasan_save_track+0x10/0x30 [ 148.241284] kasan_save_free_info+0x37/0x60 [ 148.246139] __kasan_mempool_poison_object+0xe1/0x1b0 [ 148.251856] mempool_free+0x246/0x340 [ 148.256194] mempool_double_free_helper+0xf7/0x320 [kasan_test] [ 148.262782] mempool_kmalloc_double_free+0x8d/0xe0 [kasan_test] [ 148.269372] kunit_try_run_case+0x175/0x440 [ 148.274225] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 148.280288] kthread+0x3b4/0x780 [ 148.284190] ret_from_fork+0x30/0x70 [ 148.288439] ret_from_fork_asm+0x1a/0x30 [ 148.295207] The buggy address belongs to the object at ffff88840f991900 which belongs to the cache kmalloc-128 of size 128 [ 148.309047] The buggy address is located 0 bytes inside of 128-byte region [ffff88840f991900, ffff88840f991980) [ 148.324106] The buggy address belongs to the physical page: [ 148.330340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x40f990 [ 148.338995] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 148.347304] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 148.354926] page_type: f5(slab) [ 148.358744] raw: 0017ffffc0000040 ffff888100042a00 ffffea00103d5f80 0000000000000002 [ 148.367140] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 148.375536] head: 0017ffffc0000040 ffff888100042a00 ffffea00103d5f80 0000000000000002 [ 148.384021] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 148.392505] head: 0017ffffc0000001 ffffea00103e6401 00000000ffffffff 00000000ffffffff [ 148.400990] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 148.409472] page dumped because: kasan: bad access detected [ 148.417881] Memory state around the buggy address: [ 148.423339] ffff88840f991800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 148.431217] ffff88840f991880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 148.439093] >ffff88840f991900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 148.446969] ^ [ 148.450871] ffff88840f991980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 148.458749] ffff88840f991a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 148.466628] ================================================================== [ 148.474714] ok 50 mempool_kmalloc_double_free [ 148.474834] ================================================================== [ 148.488089] BUG: KASAN: double-free in mempool_double_free_helper+0x16b/0x320 [kasan_test] [ 148.497012] Free of addr ffff8881073a0000 by task kunit_try_catch/3865 [ 148.506387] CPU: 7 UID: 0 PID: 3865 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 148.506393] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 148.506394] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 148.506396] Call Trace: [ 148.506397] [ 148.506399] dump_stack_lvl+0x4f/0x70 [ 148.506403] print_address_description.constprop.0+0x2c/0x3b0 [ 148.506407] print_report+0xb9/0x280 [ 148.506410] ? kasan_addr_to_slab+0x9/0x90 [ 148.506414] ? mempool_double_free_helper+0x16b/0x320 [kasan_test] [ 148.506422] kasan_report_invalid_free+0xba/0xe0 [ 148.506426] ? mempool_double_free_helper+0x16b/0x320 [kasan_test] [ 148.506435] ? mempool_double_free_helper+0x16b/0x320 [kasan_test] [ 148.506443] __kasan_mempool_poison_object+0x19f/0x1b0 [ 148.506446] mempool_free+0x246/0x340 [ 148.506450] mempool_double_free_helper+0x16b/0x320 [kasan_test] [ 148.506459] ? __pfx_mempool_double_free_helper+0x10/0x10 [kasan_test] [ 148.506468] mempool_kmalloc_large_double_free+0x8d/0xe0 [kasan_test] [ 148.506477] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [kasan_test] [ 148.506485] ? finish_task_switch.isra.0+0x155/0x750 [ 148.506488] ? __pfx_mempool_kmalloc+0x10/0x10 [ 148.506491] ? __pfx_mempool_kfree+0x10/0x10 [ 148.506493] ? __schedule+0x757/0x1420 [ 148.506496] ? __pfx_read_tsc+0x10/0x10 [ 148.506499] ? ktime_get_ts64+0x7f/0x220 [ 148.506502] kunit_try_run_case+0x175/0x440 [ 148.506505] ? __pfx_kunit_try_run_case+0x10/0x10 [ 148.506507] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 148.506511] ? __pfx_kunit_try_run_case+0x10/0x10 [ 148.506513] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 148.506516] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 148.506520] kthread+0x3b4/0x780 [ 148.506523] ? __pfx_kthread+0x10/0x10 [ 148.506526] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 148.506529] ? __pfx_kthread+0x10/0x10 [ 148.506532] ret_from_fork+0x30/0x70 [ 148.506535] ? __pfx_kthread+0x10/0x10 [ 148.506538] ret_from_fork_asm+0x1a/0x30 [ 148.506542] [ 148.724488] The buggy address belongs to the physical page: [ 148.730724] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff8881073a4400 pfn:0x1073a0 [ 148.740676] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 148.748987] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 148.756609] page_type: f8(unknown) [ 148.760686] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 148.769092] raw: ffff8881073a4400 0000000000000000 00000001f8000000 0000000000000000 [ 148.777491] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 148.785976] head: ffff8881073a4400 0000000000000000 00000001f8000000 0000000000000000 [ 148.794461] head: 0017ffffc0000002 ffffea00041ce801 00000000ffffffff 00000000ffffffff [ 148.802945] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 148.811429] page dumped because: kasan: bad access detected [ 148.819841] Memory state around the buggy address: [ 148.825299] ffff88810739ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 148.833178] ffff88810739ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 148.841066] >ffff8881073a0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 148.848946] ^ [ 148.852850] ffff8881073a0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 148.860731] ffff8881073a0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 148.868608] ================================================================== [ 148.876690] ok 51 mempool_kmalloc_large_double_free [ 148.876809] ================================================================== [ 148.890582] BUG: KASAN: double-free in mempool_double_free_helper+0x16b/0x320 [kasan_test] [ 148.899506] Free of addr ffff888158c98000 by task kunit_try_catch/3869 [ 148.908867] CPU: 2 UID: 0 PID: 3869 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 148.908873] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 148.908874] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 148.908876] Call Trace: [ 148.908877] [ 148.908879] dump_stack_lvl+0x4f/0x70 [ 148.908882] print_address_description.constprop.0+0x2c/0x3b0 [ 148.908887] print_report+0xb9/0x280 [ 148.908890] ? kasan_addr_to_slab+0x9/0x90 [ 148.908893] ? mempool_double_free_helper+0x16b/0x320 [kasan_test] [ 148.908902] kasan_report_invalid_free+0xba/0xe0 [ 148.908906] ? mempool_double_free_helper+0x16b/0x320 [kasan_test] [ 148.908914] ? mempool_double_free_helper+0x16b/0x320 [kasan_test] [ 148.908922] __kasan_mempool_poison_pages+0x108/0x120 [ 148.908926] mempool_free+0x2c9/0x340 [ 148.908929] mempool_double_free_helper+0x16b/0x320 [kasan_test] [ 148.908938] ? __pfx_mempool_double_free_helper+0x10/0x10 [kasan_test] [ 148.908947] mempool_page_alloc_double_free+0x88/0xe0 [kasan_test] [ 148.908956] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [kasan_test] [ 148.908964] ? finish_task_switch.isra.0+0x155/0x750 [ 148.908967] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 148.908970] ? __pfx_mempool_free_pages+0x10/0x10 [ 148.908973] ? __schedule+0x757/0x1420 [ 148.908976] ? __pfx_read_tsc+0x10/0x10 [ 148.908979] ? ktime_get_ts64+0x7f/0x220 [ 148.908981] kunit_try_run_case+0x175/0x440 [ 148.908984] ? __pfx_kunit_try_run_case+0x10/0x10 [ 148.908987] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 148.908990] ? __pfx_kunit_try_run_case+0x10/0x10 [ 148.908992] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 148.908996] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 148.908999] kthread+0x3b4/0x780 [ 148.909002] ? __pfx_kthread+0x10/0x10 [ 148.909005] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 148.909008] ? __pfx_kthread+0x10/0x10 [ 148.909011] ret_from_fork+0x30/0x70 [ 148.909014] ? __pfx_kthread+0x10/0x10 [ 148.909017] ret_from_fork_asm+0x1a/0x30 [ 148.909033] [ 149.127157] The buggy address belongs to the physical page: [ 149.133394] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x77e pfn:0x158c98 [ 149.142222] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 149.149410] raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 149.157805] raw: 000000000000077e 0000000000000000 00000001ffffffff 0000000000000000 [ 149.166201] page dumped because: kasan: bad access detected [ 149.174610] Memory state around the buggy address: [ 149.180071] ffff888158c97f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 149.187948] ffff888158c97f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 149.195824] >ffff888158c98000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 149.203703] ^ [ 149.207605] ffff888158c98080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 149.215483] ffff888158c98100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 149.223360] ================================================================== [ 149.231447] ok 52 mempool_page_alloc_double_free [ 149.231618] ================================================================== [ 149.245137] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x11d/0x2c0 [kasan_test] [ 149.254927] Free of addr ffff888140bd8801 by task kunit_try_catch/3871 [ 149.264287] CPU: 5 UID: 0 PID: 3871 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 149.264292] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 149.264294] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 149.264295] Call Trace: [ 149.264297] [ 149.264298] dump_stack_lvl+0x4f/0x70 [ 149.264302] print_address_description.constprop.0+0x2c/0x3b0 [ 149.264306] print_report+0xb9/0x280 [ 149.264310] ? kasan_addr_to_slab+0x9/0x90 [ 149.264313] ? mempool_kmalloc_invalid_free_helper+0x11d/0x2c0 [kasan_test] [ 149.264321] kasan_report_invalid_free+0xba/0xe0 [ 149.264325] ? mempool_kmalloc_invalid_free_helper+0x11d/0x2c0 [kasan_test] [ 149.264333] ? mempool_kmalloc_invalid_free_helper+0x11d/0x2c0 [kasan_test] [ 149.264342] ? mempool_kmalloc_invalid_free_helper+0x11d/0x2c0 [kasan_test] [ 149.264349] check_slab_allocation+0x116/0x120 [ 149.264353] __kasan_mempool_poison_object+0x85/0x1b0 [ 149.264356] mempool_free+0x246/0x340 [ 149.264359] mempool_kmalloc_invalid_free_helper+0x11d/0x2c0 [kasan_test] [ 149.264369] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [kasan_test] [ 149.264378] mempool_kmalloc_invalid_free+0x8d/0xe0 [kasan_test] [ 149.264386] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [kasan_test] [ 149.264394] ? finish_task_switch.isra.0+0x155/0x750 [ 149.264397] ? __pfx_mempool_kmalloc+0x10/0x10 [ 149.264400] ? __pfx_mempool_kfree+0x10/0x10 [ 149.264403] ? __schedule+0x757/0x1420 [ 149.264406] ? __pfx_read_tsc+0x10/0x10 [ 149.264408] ? ktime_get_ts64+0x7f/0x220 [ 149.264411] kunit_try_run_case+0x175/0x440 [ 149.264414] ? __pfx_kunit_try_run_case+0x10/0x10 [ 149.264417] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 149.264420] ? __pfx_kunit_try_run_case+0x10/0x10 [ 149.264422] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 149.264426] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 149.264429] kthread+0x3b4/0x780 [ 149.264432] ? __pfx_kthread+0x10/0x10 [ 149.264435] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 149.264438] ? __pfx_kthread+0x10/0x10 [ 149.264441] ret_from_fork+0x30/0x70 [ 149.264444] ? __pfx_kthread+0x10/0x10 [ 149.264447] ret_from_fork_asm+0x1a/0x30 [ 149.264451] [ 149.498020] Allocated by task 3871: [ 149.502195] kasan_save_stack+0x1c/0x40 [ 149.506706] kasan_save_track+0x10/0x30 [ 149.511213] remove_element+0x114/0x180 [ 149.515723] mempool_alloc_preallocated+0x44/0x80 [ 149.521098] mempool_kmalloc_invalid_free_helper+0x7b/0x2c0 [kasan_test] [ 149.528464] mempool_kmalloc_invalid_free+0x8d/0xe0 [kasan_test] [ 149.535141] kunit_try_run_case+0x175/0x440 [ 149.539993] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 149.546067] kthread+0x3b4/0x780 [ 149.549982] ret_from_fork+0x30/0x70 [ 149.554233] ret_from_fork_asm+0x1a/0x30 [ 149.561003] The buggy address belongs to the object at ffff888140bd8800 which belongs to the cache kmalloc-128 of size 128 [ 149.574845] The buggy address is located 1 bytes inside of 128-byte region [ffff888140bd8800, ffff888140bd8880) [ 149.589913] The buggy address belongs to the physical page: [ 149.596149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x140bd8 [ 149.604805] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 149.613116] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 149.620735] page_type: f5(slab) [ 149.624553] raw: 0017ffffc0000040 ffff888100042a00 dead000000000122 0000000000000000 [ 149.632949] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 149.641348] head: 0017ffffc0000040 ffff888100042a00 dead000000000122 0000000000000000 [ 149.649830] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 149.658312] head: 0017ffffc0000001 ffffea000502f601 00000000ffffffff 00000000ffffffff [ 149.666796] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 149.675280] page dumped because: kasan: bad access detected [ 149.683689] Memory state around the buggy address: [ 149.689147] ffff888140bd8700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 149.697037] ffff888140bd8780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 149.704917] >ffff888140bd8800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 149.712797] ^ [ 149.716699] ffff888140bd8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 149.724579] ffff888140bd8900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 149.732458] ================================================================== [ 149.740635] ok 53 mempool_kmalloc_invalid_free [ 149.740777] ================================================================== [ 149.754132] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x11d/0x2c0 [kasan_test] [ 149.763920] Free of addr ffff888107104001 by task kunit_try_catch/3874 [ 149.773284] CPU: 0 UID: 0 PID: 3874 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 149.773290] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 149.773292] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 149.773293] Call Trace: [ 149.773295] [ 149.773296] dump_stack_lvl+0x4f/0x70 [ 149.773300] print_address_description.constprop.0+0x2c/0x3b0 [ 149.773305] print_report+0xb9/0x280 [ 149.773308] ? kasan_addr_to_slab+0x9/0x90 [ 149.773311] ? mempool_kmalloc_invalid_free_helper+0x11d/0x2c0 [kasan_test] [ 149.773320] kasan_report_invalid_free+0xba/0xe0 [ 149.773324] ? mempool_kmalloc_invalid_free_helper+0x11d/0x2c0 [kasan_test] [ 149.773332] ? mempool_kmalloc_invalid_free_helper+0x11d/0x2c0 [kasan_test] [ 149.773340] __kasan_mempool_poison_object+0x11f/0x1b0 [ 149.773344] mempool_free+0x246/0x340 [ 149.773347] mempool_kmalloc_invalid_free_helper+0x11d/0x2c0 [kasan_test] [ 149.773356] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [kasan_test] [ 149.773366] mempool_kmalloc_large_invalid_free+0x8d/0xe0 [kasan_test] [ 149.773374] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 [kasan_test] [ 149.773382] ? finish_task_switch.isra.0+0x155/0x750 [ 149.773385] ? __pfx_mempool_kmalloc+0x10/0x10 [ 149.773388] ? __pfx_mempool_kfree+0x10/0x10 [ 149.773391] ? __schedule+0x757/0x1420 [ 149.773394] ? __pfx_read_tsc+0x10/0x10 [ 149.773396] ? ktime_get_ts64+0x7f/0x220 [ 149.773399] kunit_try_run_case+0x175/0x440 [ 149.773402] ? __pfx_kunit_try_run_case+0x10/0x10 [ 149.773405] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 149.773408] ? __pfx_kunit_try_run_case+0x10/0x10 [ 149.773410] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 149.773414] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 149.773417] kthread+0x3b4/0x780 [ 149.773420] ? __pfx_kthread+0x10/0x10 [ 149.773423] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 149.773426] ? __pfx_kthread+0x10/0x10 [ 149.773429] ret_from_fork+0x30/0x70 [ 149.773432] ? __pfx_kthread+0x10/0x10 [ 149.773435] ret_from_fork_asm+0x1a/0x30 [ 149.773440] [ 149.995438] The buggy address belongs to the physical page: [ 150.001675] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107104 [ 150.010331] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 150.018643] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 150.026265] page_type: f8(unknown) [ 150.030344] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 150.038743] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 150.047144] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 150.055630] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 150.064117] head: 0017ffffc0000002 ffffea00041c4101 00000000ffffffff 00000000ffffffff [ 150.072602] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 150.081089] page dumped because: kasan: bad access detected [ 150.089500] Memory state around the buggy address: [ 150.094960] ffff888107103f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 150.102842] ffff888107103f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 150.110723] >ffff888107104000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 150.118601] ^ [ 150.122505] ffff888107104080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 150.130383] ffff888107104100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 150.138259] ================================================================== [ 150.146381] ok 54 mempool_kmalloc_large_invalid_free [ 150.146534] ================================================================== [ 150.160396] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x251/0x290 [kasan_test] [ 150.169752] Read of size 1 at addr ffffffffc126be0d by task kunit_try_catch/3878 [ 150.179982] CPU: 1 UID: 0 PID: 3878 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 150.179988] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 150.179989] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 150.179991] Call Trace: [ 150.179992] [ 150.179994] dump_stack_lvl+0x4f/0x70 [ 150.179998] print_address_description.constprop.0+0x2c/0x3b0 [ 150.180003] ? kasan_global_oob_right+0x251/0x290 [kasan_test] [ 150.180011] print_report+0xb9/0x280 [ 150.180016] ? kasan_global_oob_right+0x251/0x290 [kasan_test] [ 150.180039] ? kasan_addr_to_slab+0x9/0x90 [ 150.180042] ? kasan_global_oob_right+0x251/0x290 [kasan_test] [ 150.180060] kasan_report+0xda/0x110 [ 150.180064] ? kasan_global_oob_right+0x251/0x290 [kasan_test] [ 150.180082] kasan_global_oob_right+0x251/0x290 [kasan_test] [ 150.180090] ? __pfx_kasan_global_oob_right+0x10/0x10 [kasan_test] [ 150.180098] ? __switch_to+0x5ba/0x1020 [ 150.180102] ? __schedule+0x757/0x1420 [ 150.180105] ? __pfx_read_tsc+0x10/0x10 [ 150.180107] ? ktime_get_ts64+0x7f/0x220 [ 150.180110] kunit_try_run_case+0x175/0x440 [ 150.180113] ? __pfx_kunit_try_run_case+0x10/0x10 [ 150.180115] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 150.180119] ? __pfx_kunit_try_run_case+0x10/0x10 [ 150.180121] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 150.180124] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 150.180127] kthread+0x3b4/0x780 [ 150.180131] ? __pfx_kthread+0x10/0x10 [ 150.180133] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 150.180137] ? __pfx_kthread+0x10/0x10 [ 150.180140] ret_from_fork+0x30/0x70 [ 150.180143] ? __pfx_kthread+0x10/0x10 [ 150.180146] ret_from_fork_asm+0x1a/0x30 [ 150.180150] [ 150.365670] The buggy address belongs to the variable: [ 150.371475] global_array+0xd/0xfffffffffff03200 [kasan_test] [ 150.380069] Memory state around the buggy address: [ 150.385538] ffffffffc126bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 150.393419] ffffffffc126bd80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 150.401296] >ffffffffc126be00: 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 150.409175] ^ [ 150.413338] ffffffffc126be80: 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 [ 150.421218] ffffffffc126bf00: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 150.429099] ================================================================== [ 150.437179] ok 55 kasan_global_oob_right [ 150.437438] ok 56 kasan_global_oob_left # SKIP Test requires CONFIG_CC_IS_CLANG=y [ 150.442575] ================================================================== [ 150.458962] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x263/0x2a0 [kasan_test] [ 150.467630] Read of size 1 at addr ffffc90001fa7d32 by task kunit_try_catch/3883 [ 150.477861] CPU: 5 UID: 0 PID: 3883 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 150.477867] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 150.477869] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 150.477871] Call Trace: [ 150.477873] [ 150.477875] dump_stack_lvl+0x4f/0x70 [ 150.477880] print_address_description.constprop.0+0x2c/0x3b0 [ 150.477885] ? kasan_stack_oob+0x263/0x2a0 [kasan_test] [ 150.477894] print_report+0xb9/0x280 [ 150.477897] ? kasan_stack_oob+0x263/0x2a0 [kasan_test] [ 150.477905] ? kasan_addr_to_slab+0x9/0x90 [ 150.477908] ? kasan_stack_oob+0x263/0x2a0 [kasan_test] [ 150.477916] kasan_report+0xda/0x110 [ 150.477920] ? kasan_stack_oob+0x263/0x2a0 [kasan_test] [ 150.477928] kasan_stack_oob+0x263/0x2a0 [kasan_test] [ 150.477937] ? __pfx_kasan_stack_oob+0x10/0x10 [kasan_test] [ 150.477945] ? finish_task_switch.isra.0+0x155/0x750 [ 150.477949] ? __schedule+0x757/0x1420 [ 150.477953] ? __pfx_read_tsc+0x10/0x10 [ 150.477956] ? ktime_get_ts64+0x7f/0x220 [ 150.477960] kunit_try_run_case+0x175/0x440 [ 150.477963] ? __pfx_kunit_try_run_case+0x10/0x10 [ 150.477966] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 150.477970] ? __pfx_kunit_try_run_case+0x10/0x10 [ 150.477972] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 150.477976] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 150.477979] kthread+0x3b4/0x780 [ 150.477982] ? __pfx_kthread+0x10/0x10 [ 150.477985] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 150.477989] ? __pfx_kthread+0x10/0x10 [ 150.477992] ret_from_fork+0x30/0x70 [ 150.477995] ? __pfx_kthread+0x10/0x10 [ 150.477998] ret_from_fork_asm+0x1a/0x30 [ 150.478003] [ 150.660981] The buggy address belongs to stack of task kunit_try_catch/3883 [ 150.668602] and is located at offset 138 in frame: [ 150.674148] kasan_stack_oob+0x0/0x2a0 [kasan_test] [ 150.681875] This frame has 4 objects: [ 150.686209] [48, 49) '__assertion' [ 150.686212] [64, 72) 'array' [ 150.690375] [96, 112) '__assertion' [ 150.694031] [128, 138) 'stack_array' [ 150.704788] The buggy address belongs to the virtual mapping at [ffffc90001fa0000, ffffc90001fa9000) created by: dup_task_struct+0x59/0x600 [ 150.724438] The buggy address belongs to the physical page: [ 150.730673] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffffffffffffffff pfn:0x131b41 [ 150.740627] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 150.747818] raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 150.756216] raw: ffffffffffffffff 0000000000000000 00000001ffffffff 0000000000000000 [ 150.764614] page dumped because: kasan: bad access detected [ 150.773037] Memory state around the buggy address: [ 150.778497] ffffc90001fa7c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 150.786376] ffffc90001fa7c80: 00 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 [ 150.794258] >ffffc90001fa7d00: f2 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 [ 150.802137] ^ [ 150.807598] ffffc90001fa7d80: 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 00 00 f2 f2 [ 150.815479] ffffc90001fa7e00: 00 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 [ 150.823357] ================================================================== [ 150.831453] ok 57 kasan_stack_oob [ 150.831604] ================================================================== [ 150.843819] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x320/0x390 [kasan_test] [ 150.853089] Read of size 1 at addr ffffc90001f87c5f by task kunit_try_catch/3888 [ 150.863316] CPU: 5 UID: 0 PID: 3888 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 150.863322] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 150.863324] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 150.863326] Call Trace: [ 150.863327] [ 150.863329] dump_stack_lvl+0x4f/0x70 [ 150.863334] print_address_description.constprop.0+0x2c/0x3b0 [ 150.863339] ? kasan_alloca_oob_left+0x320/0x390 [kasan_test] [ 150.863347] print_report+0xb9/0x280 [ 150.863351] ? kasan_alloca_oob_left+0x320/0x390 [kasan_test] [ 150.863359] ? kasan_addr_to_slab+0x9/0x90 [ 150.863362] ? kasan_alloca_oob_left+0x320/0x390 [kasan_test] [ 150.863370] kasan_report+0xda/0x110 [ 150.863373] ? kasan_alloca_oob_left+0x320/0x390 [kasan_test] [ 150.863382] kasan_alloca_oob_left+0x320/0x390 [kasan_test] [ 150.863391] ? __update_idle_core+0x51/0x350 [ 150.863395] ? pick_next_task_fair+0x51/0xba0 [ 150.863399] ? __pfx_kasan_alloca_oob_left+0x10/0x10 [kasan_test] [ 150.863407] ? finish_task_switch.isra.0+0x155/0x750 [ 150.863410] ? __switch_to+0x5ba/0x1020 [ 150.863414] ? __schedule+0x757/0x1420 [ 150.863417] ? __pfx_read_tsc+0x10/0x10 [ 150.863420] ? ktime_get_ts64+0x7f/0x220 [ 150.863423] kunit_try_run_case+0x175/0x440 [ 150.863426] ? __pfx_kunit_try_run_case+0x10/0x10 [ 150.863429] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 150.863433] ? __pfx_kunit_try_run_case+0x10/0x10 [ 150.863435] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 150.863438] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 150.863441] kthread+0x3b4/0x780 [ 150.863445] ? __pfx_kthread+0x10/0x10 [ 150.863448] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 150.863451] ? __pfx_kthread+0x10/0x10 [ 150.863454] ret_from_fork+0x30/0x70 [ 150.863457] ? __pfx_kthread+0x10/0x10 [ 150.863460] ret_from_fork_asm+0x1a/0x30 [ 150.863465] [ 151.064039] The buggy address belongs to stack of task kunit_try_catch/3888 [ 151.073839] The buggy address belongs to the virtual mapping at [ffffc90001f80000, ffffc90001f89000) created by: dup_task_struct+0x59/0x600 [ 151.093487] The buggy address belongs to the physical page: [ 151.099722] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x13f76b [ 151.108380] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 151.115570] raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 151.123968] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 151.132367] page dumped because: kasan: bad access detected [ 151.140780] Memory state around the buggy address: [ 151.146240] ffffc90001f87b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 151.154119] ffffc90001f87b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 151.162001] >ffffc90001f87c00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 151.169880] ^ [ 151.176638] ffffc90001f87c80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 151.184518] ffffc90001f87d00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 151.192398] ================================================================== [ 151.200500] ok 58 kasan_alloca_oob_left [ 151.200646] ================================================================== [ 151.213382] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x327/0x3a0 [kasan_test] [ 151.222743] Read of size 1 at addr ffffc900014dfc6a by task kunit_try_catch/3890 [ 151.232974] CPU: 6 UID: 0 PID: 3890 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 151.232980] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 151.232981] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 151.232983] Call Trace: [ 151.232985] [ 151.232986] dump_stack_lvl+0x4f/0x70 [ 151.232991] print_address_description.constprop.0+0x2c/0x3b0 [ 151.232995] ? kasan_alloca_oob_right+0x327/0x3a0 [kasan_test] [ 151.233004] print_report+0xb9/0x280 [ 151.233007] ? kasan_alloca_oob_right+0x327/0x3a0 [kasan_test] [ 151.233016] ? kasan_addr_to_slab+0x9/0x90 [ 151.233020] ? kasan_alloca_oob_right+0x327/0x3a0 [kasan_test] [ 151.233040] kasan_report+0xda/0x110 [ 151.233044] ? kasan_alloca_oob_right+0x327/0x3a0 [kasan_test] [ 151.233053] kasan_alloca_oob_right+0x327/0x3a0 [kasan_test] [ 151.233072] ? __update_idle_core+0x51/0x350 [ 151.233084] ? pick_next_task_fair+0x51/0xba0 [ 151.233088] ? __pfx_kasan_alloca_oob_right+0x10/0x10 [kasan_test] [ 151.233096] ? finish_task_switch.isra.0+0x155/0x750 [ 151.233099] ? __switch_to+0x5ba/0x1020 [ 151.233102] ? __schedule+0x757/0x1420 [ 151.233105] ? __pfx_read_tsc+0x10/0x10 [ 151.233108] ? ktime_get_ts64+0x7f/0x220 [ 151.233111] kunit_try_run_case+0x175/0x440 [ 151.233113] ? __pfx_kunit_try_run_case+0x10/0x10 [ 151.233116] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 151.233120] ? __pfx_kunit_try_run_case+0x10/0x10 [ 151.233122] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 151.233125] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 151.233128] kthread+0x3b4/0x780 [ 151.233132] ? __pfx_kthread+0x10/0x10 [ 151.233135] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 151.233138] ? __pfx_kthread+0x10/0x10 [ 151.233141] ret_from_fork+0x30/0x70 [ 151.233144] ? __pfx_kthread+0x10/0x10 [ 151.233147] ret_from_fork_asm+0x1a/0x30 [ 151.233151] [ 151.434271] The buggy address belongs to stack of task kunit_try_catch/3890 [ 151.444076] The buggy address belongs to the virtual mapping at [ffffc900014d8000, ffffc900014e1000) created by: dup_task_struct+0x59/0x600 [ 151.463737] The buggy address belongs to the physical page: [ 151.469976] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x5ff pfn:0x13f01b [ 151.478809] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 151.486004] raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 151.494404] raw: 00000000000005ff 0000000000000000 00000001ffffffff 0000000000000000 [ 151.502803] page dumped because: kasan: bad access detected [ 151.511218] Memory state around the buggy address: [ 151.516679] ffffc900014dfb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 151.524559] ffffc900014dfb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 151.532439] >ffffc900014dfc00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 151.540319] ^ [ 151.547595] ffffc900014dfc80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 151.555475] ffffc900014dfd00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 151.563354] ================================================================== [ 151.571397] ok 59 kasan_alloca_oob_right [ 151.571856] ok 60 kasan_memchr # SKIP Test requires CONFIG_AMD_MEM_ENCRYPT=n [ 151.577171] ok 61 kasan_memcmp # SKIP Test requires CONFIG_AMD_MEM_ENCRYPT=n [ 151.585514] ok 62 kasan_strings # SKIP Test requires CONFIG_AMD_MEM_ENCRYPT=n [ 151.593787] ================================================================== [ 151.609805] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xea/0xd40 [kasan_test] [ 151.619686] Write of size 8 at addr ffff888101062648 by task kunit_try_catch/3898 [ 151.630004] CPU: 3 UID: 0 PID: 3898 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 151.630010] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 151.630012] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 151.630014] Call Trace: [ 151.630016] [ 151.630019] dump_stack_lvl+0x4f/0x70 [ 151.630036] print_address_description.constprop.0+0x2c/0x3b0 [ 151.630042] ? kasan_bitops_modify.constprop.0+0xea/0xd40 [kasan_test] [ 151.630051] print_report+0xb9/0x280 [ 151.630064] ? kasan_bitops_modify.constprop.0+0xea/0xd40 [kasan_test] [ 151.630072] ? kasan_addr_to_slab+0x9/0x90 [ 151.630075] ? kasan_bitops_modify.constprop.0+0xea/0xd40 [kasan_test] [ 151.630084] kasan_report+0xda/0x110 [ 151.630087] ? kasan_bitops_modify.constprop.0+0xea/0xd40 [kasan_test] [ 151.630096] kasan_check_range+0xfc/0x1b0 [ 151.630100] kasan_bitops_modify.constprop.0+0xea/0xd40 [kasan_test] [ 151.630109] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [kasan_test] [ 151.630118] ? __kmalloc_cache_noprof+0x158/0x430 [ 151.630122] kasan_bitops_generic+0x108/0x1b0 [kasan_test] [ 151.630131] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 151.630139] ? __schedule+0x757/0x1420 [ 151.630142] ? __pfx_read_tsc+0x10/0x10 [ 151.630145] ? ktime_get_ts64+0x7f/0x220 [ 151.630149] kunit_try_run_case+0x175/0x440 [ 151.630153] ? __pfx_kunit_try_run_case+0x10/0x10 [ 151.630155] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 151.630159] ? __pfx_kunit_try_run_case+0x10/0x10 [ 151.630161] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 151.630165] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 151.630168] kthread+0x3b4/0x780 [ 151.630172] ? __pfx_kthread+0x10/0x10 [ 151.630175] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 151.630179] ? __pfx_kthread+0x10/0x10 [ 151.630182] ret_from_fork+0x30/0x70 [ 151.630185] ? __pfx_kthread+0x10/0x10 [ 151.630188] ret_from_fork_asm+0x1a/0x30 [ 151.630193] [ 151.838297] Allocated by task 3898: [ 151.842462] kasan_save_stack+0x1c/0x40 [ 151.846974] kasan_save_track+0x10/0x30 [ 151.851485] __kasan_kmalloc+0xa6/0xb0 [ 151.855910] kasan_bitops_generic+0x84/0x1b0 [kasan_test] [ 151.861982] kunit_try_run_case+0x175/0x440 [ 151.866837] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 151.872905] kthread+0x3b4/0x780 [ 151.876811] ret_from_fork+0x30/0x70 [ 151.881069] ret_from_fork_asm+0x1a/0x30 [ 151.887841] The buggy address belongs to the object at ffff888101062640 which belongs to the cache kmalloc-16 of size 16 [ 151.901513] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff888101062640, ffff888101062649) [ 151.917276] The buggy address belongs to the physical page: [ 151.923514] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101062 [ 151.932174] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 151.939367] page_type: f5(slab) [ 151.943188] raw: 0017ffffc0000000 ffff888100042640 dead000000000100 dead000000000122 [ 151.951588] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 151.959987] page dumped because: kasan: bad access detected [ 151.968395] Memory state around the buggy address: [ 151.973856] ffff888101062500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 151.981736] ffff888101062580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 151.989617] >ffff888101062600: fa fb fc fc 00 00 fc fc 00 01 fc fc 00 06 fc fc [ 151.997495] ^ [ 152.003731] ffff888101062680: 00 04 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 152.011611] ffff888101062700: 00 00 fc fc fa fb fc fc 00 06 fc fc fa fb fc fc [ 152.019491] ================================================================== [ 152.027384] ================================================================== [ 152.035264] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x184/0xd40 [kasan_test] [ 152.045221] Write of size 8 at addr ffff888101062648 by task kunit_try_catch/3898 [ 152.055535] CPU: 3 UID: 0 PID: 3898 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 152.055541] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 152.055543] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 152.055545] Call Trace: [ 152.055547] [ 152.055548] dump_stack_lvl+0x4f/0x70 [ 152.055553] print_address_description.constprop.0+0x2c/0x3b0 [ 152.055557] ? kasan_bitops_modify.constprop.0+0x184/0xd40 [kasan_test] [ 152.055566] print_report+0xb9/0x280 [ 152.055569] ? kasan_bitops_modify.constprop.0+0x184/0xd40 [kasan_test] [ 152.055577] ? kasan_addr_to_slab+0x9/0x90 [ 152.055581] ? kasan_bitops_modify.constprop.0+0x184/0xd40 [kasan_test] [ 152.055589] kasan_report+0xda/0x110 [ 152.055592] ? kasan_bitops_modify.constprop.0+0x184/0xd40 [kasan_test] [ 152.055601] kasan_check_range+0xfc/0x1b0 [ 152.055604] kasan_bitops_modify.constprop.0+0x184/0xd40 [kasan_test] [ 152.055613] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [kasan_test] [ 152.055622] ? __kmalloc_cache_noprof+0x158/0x430 [ 152.055626] kasan_bitops_generic+0x108/0x1b0 [kasan_test] [ 152.055635] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 152.055643] ? __schedule+0x757/0x1420 [ 152.055646] ? __pfx_read_tsc+0x10/0x10 [ 152.055649] ? ktime_get_ts64+0x7f/0x220 [ 152.055653] kunit_try_run_case+0x175/0x440 [ 152.055656] ? __pfx_kunit_try_run_case+0x10/0x10 [ 152.055658] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 152.055662] ? __pfx_kunit_try_run_case+0x10/0x10 [ 152.055664] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 152.055668] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 152.055671] kthread+0x3b4/0x780 [ 152.055674] ? __pfx_kthread+0x10/0x10 [ 152.055677] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 152.055681] ? __pfx_kthread+0x10/0x10 [ 152.055684] ret_from_fork+0x30/0x70 [ 152.055687] ? __pfx_kthread+0x10/0x10 [ 152.055690] ret_from_fork_asm+0x1a/0x30 [ 152.055694] [ 152.264203] Allocated by task 3898: [ 152.268366] kasan_save_stack+0x1c/0x40 [ 152.272878] kasan_save_track+0x10/0x30 [ 152.277387] __kasan_kmalloc+0xa6/0xb0 [ 152.281811] kasan_bitops_generic+0x84/0x1b0 [kasan_test] [ 152.287883] kunit_try_run_case+0x175/0x440 [ 152.292736] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 152.298801] kthread+0x3b4/0x780 [ 152.302708] ret_from_fork+0x30/0x70 [ 152.306956] ret_from_fork_asm+0x1a/0x30 [ 152.313726] The buggy address belongs to the object at ffff888101062640 which belongs to the cache kmalloc-16 of size 16 [ 152.327398] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff888101062640, ffff888101062649) [ 152.343156] The buggy address belongs to the physical page: [ 152.349391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101062 [ 152.358051] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 152.365251] page_type: f5(slab) [ 152.369069] raw: 0017ffffc0000000 ffff888100042640 dead000000000100 dead000000000122 [ 152.377467] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 152.385865] page dumped because: kasan: bad access detected [ 152.394278] Memory state around the buggy address: [ 152.399738] ffff888101062500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 152.407618] ffff888101062580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 152.415499] >ffff888101062600: fa fb fc fc 00 00 fc fc 00 01 fc fc 00 06 fc fc [ 152.423380] ^ [ 152.429619] ffff888101062680: 00 04 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 152.437500] ffff888101062700: 00 00 fc fc fa fb fc fc 00 06 fc fc fa fb fc fc [ 152.445380] ================================================================== [ 152.453269] ================================================================== [ 152.461164] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x221/0xd40 [kasan_test] [ 152.471124] Write of size 8 at addr ffff888101062648 by task kunit_try_catch/3898 [ 152.481439] CPU: 3 UID: 0 PID: 3898 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 152.481444] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 152.481446] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 152.481448] Call Trace: [ 152.481449] [ 152.481451] dump_stack_lvl+0x4f/0x70 [ 152.481455] print_address_description.constprop.0+0x2c/0x3b0 [ 152.481459] ? kasan_bitops_modify.constprop.0+0x221/0xd40 [kasan_test] [ 152.481468] print_report+0xb9/0x280 [ 152.481471] ? kasan_bitops_modify.constprop.0+0x221/0xd40 [kasan_test] [ 152.481479] ? kasan_addr_to_slab+0x9/0x90 [ 152.481483] ? kasan_bitops_modify.constprop.0+0x221/0xd40 [kasan_test] [ 152.481491] kasan_report+0xda/0x110 [ 152.481494] ? kasan_bitops_modify.constprop.0+0x221/0xd40 [kasan_test] [ 152.481503] kasan_check_range+0xfc/0x1b0 [ 152.481506] kasan_bitops_modify.constprop.0+0x221/0xd40 [kasan_test] [ 152.481515] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [kasan_test] [ 152.481524] ? __kmalloc_cache_noprof+0x158/0x430 [ 152.481528] kasan_bitops_generic+0x108/0x1b0 [kasan_test] [ 152.481537] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 152.481544] ? __schedule+0x757/0x1420 [ 152.481547] ? __pfx_read_tsc+0x10/0x10 [ 152.481550] ? ktime_get_ts64+0x7f/0x220 [ 152.481553] kunit_try_run_case+0x175/0x440 [ 152.481556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 152.481559] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 152.481562] ? __pfx_kunit_try_run_case+0x10/0x10 [ 152.481565] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 152.481568] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 152.481571] kthread+0x3b4/0x780 [ 152.481574] ? __pfx_kthread+0x10/0x10 [ 152.481577] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 152.481580] ? __pfx_kthread+0x10/0x10 [ 152.481583] ret_from_fork+0x30/0x70 [ 152.481586] ? __pfx_kthread+0x10/0x10 [ 152.481589] ret_from_fork_asm+0x1a/0x30 [ 152.481594] [ 152.690096] Allocated by task 3898: [ 152.694262] kasan_save_stack+0x1c/0x40 [ 152.698769] kasan_save_track+0x10/0x30 [ 152.703281] __kasan_kmalloc+0xa6/0xb0 [ 152.707705] kasan_bitops_generic+0x84/0x1b0 [kasan_test] [ 152.713777] kunit_try_run_case+0x175/0x440 [ 152.718630] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 152.724696] kthread+0x3b4/0x780 [ 152.728601] ret_from_fork+0x30/0x70 [ 152.732851] ret_from_fork_asm+0x1a/0x30 [ 152.739623] The buggy address belongs to the object at ffff888101062640 which belongs to the cache kmalloc-16 of size 16 [ 152.753293] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff888101062640, ffff888101062649) [ 152.769078] The buggy address belongs to the physical page: [ 152.775316] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101062 [ 152.783976] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 152.791167] page_type: f5(slab) [ 152.794984] raw: 0017ffffc0000000 ffff888100042640 dead000000000100 dead000000000122 [ 152.803381] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 152.811778] page dumped because: kasan: bad access detected [ 152.820203] Memory state around the buggy address: [ 152.825664] ffff888101062500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 152.833545] ffff888101062580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 152.841425] >ffff888101062600: fa fb fc fc 00 00 fc fc 00 01 fc fc 00 06 fc fc [ 152.849304] ^ [ 152.855541] ffff888101062680: 00 04 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 152.863420] ffff888101062700: 00 00 fc fc fa fb fc fc 00 06 fc fc fa fb fc fc [ 152.871299] ================================================================== [ 152.879185] ================================================================== [ 152.887089] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2bb/0xd40 [kasan_test] [ 152.897050] Write of size 8 at addr ffff888101062648 by task kunit_try_catch/3898 [ 152.907376] CPU: 3 UID: 0 PID: 3898 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 152.907382] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 152.907383] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 152.907385] Call Trace: [ 152.907387] [ 152.907388] dump_stack_lvl+0x4f/0x70 [ 152.907393] print_address_description.constprop.0+0x2c/0x3b0 [ 152.907397] ? kasan_bitops_modify.constprop.0+0x2bb/0xd40 [kasan_test] [ 152.907406] print_report+0xb9/0x280 [ 152.907410] ? kasan_bitops_modify.constprop.0+0x2bb/0xd40 [kasan_test] [ 152.907418] ? kasan_addr_to_slab+0x9/0x90 [ 152.907421] ? kasan_bitops_modify.constprop.0+0x2bb/0xd40 [kasan_test] [ 152.907429] kasan_report+0xda/0x110 [ 152.907433] ? kasan_bitops_modify.constprop.0+0x2bb/0xd40 [kasan_test] [ 152.907442] kasan_check_range+0xfc/0x1b0 [ 152.907445] kasan_bitops_modify.constprop.0+0x2bb/0xd40 [kasan_test] [ 152.907453] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [kasan_test] [ 152.907462] ? __kmalloc_cache_noprof+0x158/0x430 [ 152.907466] kasan_bitops_generic+0x108/0x1b0 [kasan_test] [ 152.907474] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 152.907482] ? __schedule+0x757/0x1420 [ 152.907486] ? __pfx_read_tsc+0x10/0x10 [ 152.907488] ? ktime_get_ts64+0x7f/0x220 [ 152.907492] kunit_try_run_case+0x175/0x440 [ 152.907495] ? __pfx_kunit_try_run_case+0x10/0x10 [ 152.907497] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 152.907501] ? __pfx_kunit_try_run_case+0x10/0x10 [ 152.907503] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 152.907507] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 152.907510] kthread+0x3b4/0x780 [ 152.907513] ? __pfx_kthread+0x10/0x10 [ 152.907516] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 152.907519] ? __pfx_kthread+0x10/0x10 [ 152.907523] ret_from_fork+0x30/0x70 [ 152.907526] ? __pfx_kthread+0x10/0x10 [ 152.907528] ret_from_fork_asm+0x1a/0x30 [ 152.907533] [ 153.116034] Allocated by task 3898: [ 153.120199] kasan_save_stack+0x1c/0x40 [ 153.124709] kasan_save_track+0x10/0x30 [ 153.129218] __kasan_kmalloc+0xa6/0xb0 [ 153.133641] kasan_bitops_generic+0x84/0x1b0 [kasan_test] [ 153.139712] kunit_try_run_case+0x175/0x440 [ 153.144569] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 153.150634] kthread+0x3b4/0x780 [ 153.154537] ret_from_fork+0x30/0x70 [ 153.158787] ret_from_fork_asm+0x1a/0x30 [ 153.165560] The buggy address belongs to the object at ffff888101062640 which belongs to the cache kmalloc-16 of size 16 [ 153.179232] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff888101062640, ffff888101062649) [ 153.194991] The buggy address belongs to the physical page: [ 153.201227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101062 [ 153.209886] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 153.217073] page_type: f5(slab) [ 153.220891] raw: 0017ffffc0000000 ffff888100042640 dead000000000100 dead000000000122 [ 153.229288] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 153.237686] page dumped because: kasan: bad access detected [ 153.246099] Memory state around the buggy address: [ 153.251559] ffff888101062500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 153.259437] ffff888101062580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 153.267313] >ffff888101062600: fa fb fc fc 00 00 fc fc 00 01 fc fc 00 06 fc fc [ 153.275188] ^ [ 153.281426] ffff888101062680: 00 04 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 153.289304] ffff888101062700: 00 00 fc fc fa fb fc fc 00 06 fc fc fa fb fc fc [ 153.297182] ================================================================== [ 153.305092] ================================================================== [ 153.312986] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x358/0xd40 [kasan_test] [ 153.322946] Write of size 8 at addr ffff888101062648 by task kunit_try_catch/3898 [ 153.333266] CPU: 3 UID: 0 PID: 3898 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 153.333271] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 153.333273] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 153.333274] Call Trace: [ 153.333276] [ 153.333277] dump_stack_lvl+0x4f/0x70 [ 153.333282] print_address_description.constprop.0+0x2c/0x3b0 [ 153.333286] ? kasan_bitops_modify.constprop.0+0x358/0xd40 [kasan_test] [ 153.333294] print_report+0xb9/0x280 [ 153.333298] ? kasan_bitops_modify.constprop.0+0x358/0xd40 [kasan_test] [ 153.333306] ? kasan_addr_to_slab+0x9/0x90 [ 153.333309] ? kasan_bitops_modify.constprop.0+0x358/0xd40 [kasan_test] [ 153.333317] kasan_report+0xda/0x110 [ 153.333320] ? kasan_bitops_modify.constprop.0+0x358/0xd40 [kasan_test] [ 153.333329] kasan_check_range+0xfc/0x1b0 [ 153.333332] kasan_bitops_modify.constprop.0+0x358/0xd40 [kasan_test] [ 153.333341] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [kasan_test] [ 153.333349] ? __kmalloc_cache_noprof+0x158/0x430 [ 153.333353] kasan_bitops_generic+0x108/0x1b0 [kasan_test] [ 153.333362] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 153.333370] ? __schedule+0x757/0x1420 [ 153.333372] ? __pfx_read_tsc+0x10/0x10 [ 153.333375] ? ktime_get_ts64+0x7f/0x220 [ 153.333378] kunit_try_run_case+0x175/0x440 [ 153.333381] ? __pfx_kunit_try_run_case+0x10/0x10 [ 153.333384] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 153.333388] ? __pfx_kunit_try_run_case+0x10/0x10 [ 153.333390] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 153.333393] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 153.333396] kthread+0x3b4/0x780 [ 153.333399] ? __pfx_kthread+0x10/0x10 [ 153.333402] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 153.333406] ? __pfx_kthread+0x10/0x10 [ 153.333409] ret_from_fork+0x30/0x70 [ 153.333412] ? __pfx_kthread+0x10/0x10 [ 153.333414] ret_from_fork_asm+0x1a/0x30 [ 153.333419] [ 153.541917] Allocated by task 3898: [ 153.546089] kasan_save_stack+0x1c/0x40 [ 153.550600] kasan_save_track+0x10/0x30 [ 153.555110] __kasan_kmalloc+0xa6/0xb0 [ 153.559532] kasan_bitops_generic+0x84/0x1b0 [kasan_test] [ 153.565602] kunit_try_run_case+0x175/0x440 [ 153.570458] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 153.576523] kthread+0x3b4/0x780 [ 153.580428] ret_from_fork+0x30/0x70 [ 153.584679] ret_from_fork_asm+0x1a/0x30 [ 153.591452] The buggy address belongs to the object at ffff888101062640 which belongs to the cache kmalloc-16 of size 16 [ 153.605118] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff888101062640, ffff888101062649) [ 153.620877] The buggy address belongs to the physical page: [ 153.627111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101062 [ 153.635768] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 153.642957] page_type: f5(slab) [ 153.646774] raw: 0017ffffc0000000 ffff888100042640 dead000000000100 dead000000000122 [ 153.655171] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 153.663565] page dumped because: kasan: bad access detected [ 153.671975] Memory state around the buggy address: [ 153.677431] ffff888101062500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 153.685309] ffff888101062580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 153.693186] >ffff888101062600: fa fb fc fc 00 00 fc fc 00 01 fc fc 00 06 fc fc [ 153.701069] ^ [ 153.707304] ffff888101062680: 00 04 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 153.715182] ffff888101062700: 00 00 fc fc fa fb fc fc 00 06 fc fc fa fb fc fc [ 153.723068] ================================================================== [ 153.730961] ================================================================== [ 153.738856] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3f2/0xd40 [kasan_test] [ 153.748813] Write of size 8 at addr ffff888101062648 by task kunit_try_catch/3898 [ 153.759129] CPU: 3 UID: 0 PID: 3898 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 153.759134] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 153.759135] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 153.759137] Call Trace: [ 153.759138] [ 153.759140] dump_stack_lvl+0x4f/0x70 [ 153.759143] print_address_description.constprop.0+0x2c/0x3b0 [ 153.759148] ? kasan_bitops_modify.constprop.0+0x3f2/0xd40 [kasan_test] [ 153.759156] print_report+0xb9/0x280 [ 153.759160] ? kasan_bitops_modify.constprop.0+0x3f2/0xd40 [kasan_test] [ 153.759168] ? kasan_addr_to_slab+0x9/0x90 [ 153.759171] ? kasan_bitops_modify.constprop.0+0x3f2/0xd40 [kasan_test] [ 153.759179] kasan_report+0xda/0x110 [ 153.759182] ? kasan_bitops_modify.constprop.0+0x3f2/0xd40 [kasan_test] [ 153.759191] kasan_check_range+0xfc/0x1b0 [ 153.759194] kasan_bitops_modify.constprop.0+0x3f2/0xd40 [kasan_test] [ 153.759203] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [kasan_test] [ 153.759211] ? __kmalloc_cache_noprof+0x158/0x430 [ 153.759215] kasan_bitops_generic+0x108/0x1b0 [kasan_test] [ 153.759223] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 153.759231] ? __schedule+0x757/0x1420 [ 153.759234] ? __pfx_read_tsc+0x10/0x10 [ 153.759236] ? ktime_get_ts64+0x7f/0x220 [ 153.759239] kunit_try_run_case+0x175/0x440 [ 153.759242] ? __pfx_kunit_try_run_case+0x10/0x10 [ 153.759245] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 153.759248] ? __pfx_kunit_try_run_case+0x10/0x10 [ 153.759250] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 153.759253] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 153.759257] kthread+0x3b4/0x780 [ 153.759260] ? __pfx_kthread+0x10/0x10 [ 153.759263] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 153.759266] ? __pfx_kthread+0x10/0x10 [ 153.759269] ret_from_fork+0x30/0x70 [ 153.759272] ? __pfx_kthread+0x10/0x10 [ 153.759275] ret_from_fork_asm+0x1a/0x30 [ 153.759279] [ 153.967784] Allocated by task 3898: [ 153.971949] kasan_save_stack+0x1c/0x40 [ 153.976460] kasan_save_track+0x10/0x30 [ 153.980971] __kasan_kmalloc+0xa6/0xb0 [ 153.985392] kasan_bitops_generic+0x84/0x1b0 [kasan_test] [ 153.991464] kunit_try_run_case+0x175/0x440 [ 153.996317] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 154.002383] kthread+0x3b4/0x780 [ 154.006288] ret_from_fork+0x30/0x70 [ 154.010540] ret_from_fork_asm+0x1a/0x30 [ 154.017314] The buggy address belongs to the object at ffff888101062640 which belongs to the cache kmalloc-16 of size 16 [ 154.030985] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff888101062640, ffff888101062649) [ 154.046740] The buggy address belongs to the physical page: [ 154.052976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101062 [ 154.061635] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 154.068825] page_type: f5(slab) [ 154.072644] raw: 0017ffffc0000000 ffff888100042640 dead000000000100 dead000000000122 [ 154.081042] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 154.089442] page dumped because: kasan: bad access detected [ 154.097850] Memory state around the buggy address: [ 154.103308] ffff888101062500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 154.111189] ffff888101062580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 154.119071] >ffff888101062600: fa fb fc fc 00 00 fc fc 00 01 fc fc 00 06 fc fc [ 154.126951] ^ [ 154.133186] ffff888101062680: 00 04 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 154.141071] ffff888101062700: 00 00 fc fc fa fb fc fc 00 06 fc fc fa fb fc fc [ 154.148949] ================================================================== [ 154.156838] ================================================================== [ 154.164732] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x48f/0xd40 [kasan_test] [ 154.174693] Write of size 8 at addr ffff888101062648 by task kunit_try_catch/3898 [ 154.185008] CPU: 3 UID: 0 PID: 3898 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 154.185014] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 154.185017] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 154.185019] Call Trace: [ 154.185032] [ 154.185034] dump_stack_lvl+0x4f/0x70 [ 154.185038] print_address_description.constprop.0+0x2c/0x3b0 [ 154.185043] ? kasan_bitops_modify.constprop.0+0x48f/0xd40 [kasan_test] [ 154.185052] print_report+0xb9/0x280 [ 154.185065] ? kasan_bitops_modify.constprop.0+0x48f/0xd40 [kasan_test] [ 154.185073] ? kasan_addr_to_slab+0x9/0x90 [ 154.185076] ? kasan_bitops_modify.constprop.0+0x48f/0xd40 [kasan_test] [ 154.185085] kasan_report+0xda/0x110 [ 154.185088] ? kasan_bitops_modify.constprop.0+0x48f/0xd40 [kasan_test] [ 154.185097] kasan_check_range+0xfc/0x1b0 [ 154.185100] kasan_bitops_modify.constprop.0+0x48f/0xd40 [kasan_test] [ 154.185109] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [kasan_test] [ 154.185117] ? __kmalloc_cache_noprof+0x158/0x430 [ 154.185121] kasan_bitops_generic+0x108/0x1b0 [kasan_test] [ 154.185129] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 154.185138] ? __schedule+0x757/0x1420 [ 154.185140] ? __pfx_read_tsc+0x10/0x10 [ 154.185143] ? ktime_get_ts64+0x7f/0x220 [ 154.185147] kunit_try_run_case+0x175/0x440 [ 154.185149] ? __pfx_kunit_try_run_case+0x10/0x10 [ 154.185152] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 154.185156] ? __pfx_kunit_try_run_case+0x10/0x10 [ 154.185158] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 154.185161] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 154.185164] kthread+0x3b4/0x780 [ 154.185168] ? __pfx_kthread+0x10/0x10 [ 154.185171] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 154.185174] ? __pfx_kthread+0x10/0x10 [ 154.185177] ret_from_fork+0x30/0x70 [ 154.185180] ? __pfx_kthread+0x10/0x10 [ 154.185183] ret_from_fork_asm+0x1a/0x30 [ 154.185188] [ 154.393670] Allocated by task 3898: [ 154.397833] kasan_save_stack+0x1c/0x40 [ 154.402342] kasan_save_track+0x10/0x30 [ 154.406853] __kasan_kmalloc+0xa6/0xb0 [ 154.411275] kasan_bitops_generic+0x84/0x1b0 [kasan_test] [ 154.417346] kunit_try_run_case+0x175/0x440 [ 154.422200] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 154.428265] kthread+0x3b4/0x780 [ 154.432169] ret_from_fork+0x30/0x70 [ 154.436418] ret_from_fork_asm+0x1a/0x30 [ 154.443201] The buggy address belongs to the object at ffff888101062640 which belongs to the cache kmalloc-16 of size 16 [ 154.456869] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff888101062640, ffff888101062649) [ 154.472627] The buggy address belongs to the physical page: [ 154.478863] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101062 [ 154.487520] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 154.494710] page_type: f5(slab) [ 154.498529] raw: 0017ffffc0000000 ffff888100042640 dead000000000100 dead000000000122 [ 154.506926] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 154.515323] page dumped because: kasan: bad access detected [ 154.523733] Memory state around the buggy address: [ 154.529190] ffff888101062500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 154.537072] ffff888101062580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 154.544950] >ffff888101062600: fa fb fc fc 00 00 fc fc 00 01 fc fc 00 06 fc fc [ 154.552828] ^ [ 154.559069] ffff888101062680: 00 04 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 154.566949] ffff888101062700: 00 00 fc fc fa fb fc fc 00 06 fc fc fa fb fc fc [ 154.574828] ================================================================== [ 154.582713] ================================================================== [ 154.590607] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x529/0xd40 [kasan_test] [ 154.600570] Write of size 8 at addr ffff888101062648 by task kunit_try_catch/3898 [ 154.610884] CPU: 3 UID: 0 PID: 3898 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 154.610889] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 154.610890] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 154.610892] Call Trace: [ 154.610893] [ 154.610895] dump_stack_lvl+0x4f/0x70 [ 154.610898] print_address_description.constprop.0+0x2c/0x3b0 [ 154.610902] ? kasan_bitops_modify.constprop.0+0x529/0xd40 [kasan_test] [ 154.610911] print_report+0xb9/0x280 [ 154.610914] ? kasan_bitops_modify.constprop.0+0x529/0xd40 [kasan_test] [ 154.610923] ? kasan_addr_to_slab+0x9/0x90 [ 154.610926] ? kasan_bitops_modify.constprop.0+0x529/0xd40 [kasan_test] [ 154.610934] kasan_report+0xda/0x110 [ 154.610937] ? kasan_bitops_modify.constprop.0+0x529/0xd40 [kasan_test] [ 154.610946] kasan_check_range+0xfc/0x1b0 [ 154.610949] kasan_bitops_modify.constprop.0+0x529/0xd40 [kasan_test] [ 154.610957] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [kasan_test] [ 154.610966] ? __kmalloc_cache_noprof+0x158/0x430 [ 154.610970] kasan_bitops_generic+0x108/0x1b0 [kasan_test] [ 154.610978] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 154.610986] ? __schedule+0x757/0x1420 [ 154.610989] ? __pfx_read_tsc+0x10/0x10 [ 154.610992] ? ktime_get_ts64+0x7f/0x220 [ 154.610995] kunit_try_run_case+0x175/0x440 [ 154.610997] ? __pfx_kunit_try_run_case+0x10/0x10 [ 154.611000] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 154.611004] ? __pfx_kunit_try_run_case+0x10/0x10 [ 154.611006] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 154.611009] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 154.611012] kthread+0x3b4/0x780 [ 154.611016] ? __pfx_kthread+0x10/0x10 [ 154.611031] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 154.611035] ? __pfx_kthread+0x10/0x10 [ 154.611038] ret_from_fork+0x30/0x70 [ 154.611041] ? __pfx_kthread+0x10/0x10 [ 154.611044] ret_from_fork_asm+0x1a/0x30 [ 154.611049] [ 154.819579] Allocated by task 3898: [ 154.823743] kasan_save_stack+0x1c/0x40 [ 154.828255] kasan_save_track+0x10/0x30 [ 154.832764] __kasan_kmalloc+0xa6/0xb0 [ 154.837186] kasan_bitops_generic+0x84/0x1b0 [kasan_test] [ 154.843257] kunit_try_run_case+0x175/0x440 [ 154.848113] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 154.854176] kthread+0x3b4/0x780 [ 154.858088] ret_from_fork+0x30/0x70 [ 154.862338] ret_from_fork_asm+0x1a/0x30 [ 154.869107] The buggy address belongs to the object at ffff888101062640 which belongs to the cache kmalloc-16 of size 16 [ 154.882774] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff888101062640, ffff888101062649) [ 154.898530] The buggy address belongs to the physical page: [ 154.904767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101062 [ 154.913424] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 154.920615] page_type: f5(slab) [ 154.924436] raw: 0017ffffc0000000 ffff888100042640 dead000000000100 dead000000000122 [ 154.932835] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 154.941234] page dumped because: kasan: bad access detected [ 154.949645] Memory state around the buggy address: [ 154.955103] ffff888101062500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 154.962985] ffff888101062580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 154.970863] >ffff888101062600: fa fb fc fc 00 00 fc fc 00 01 fc fc 00 06 fc fc [ 154.978741] ^ [ 154.984978] ffff888101062680: 00 04 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 154.992856] ffff888101062700: 00 00 fc fc fa fb fc fc 00 06 fc fc fa fb fc fc [ 155.000736] ================================================================== [ 155.008629] ================================================================== [ 155.016525] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xea/0xd80 [kasan_test] [ 155.027177] Write of size 8 at addr ffff888101062648 by task kunit_try_catch/3898 [ 155.037489] CPU: 3 UID: 0 PID: 3898 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 155.037495] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 155.037497] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 155.037499] Call Trace: [ 155.037501] [ 155.037502] dump_stack_lvl+0x4f/0x70 [ 155.037507] print_address_description.constprop.0+0x2c/0x3b0 [ 155.037511] ? kasan_bitops_test_and_modify.constprop.0+0xea/0xd80 [kasan_test] [ 155.037520] print_report+0xb9/0x280 [ 155.037524] ? kasan_bitops_test_and_modify.constprop.0+0xea/0xd80 [kasan_test] [ 155.037532] ? kasan_addr_to_slab+0x9/0x90 [ 155.037535] ? kasan_bitops_test_and_modify.constprop.0+0xea/0xd80 [kasan_test] [ 155.037544] kasan_report+0xda/0x110 [ 155.037548] ? kasan_bitops_test_and_modify.constprop.0+0xea/0xd80 [kasan_test] [ 155.037557] kasan_check_range+0xfc/0x1b0 [ 155.037560] kasan_bitops_test_and_modify.constprop.0+0xea/0xd80 [kasan_test] [ 155.037569] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [kasan_test] [ 155.037578] ? __kmalloc_cache_noprof+0x158/0x430 [ 155.037582] kasan_bitops_generic+0x113/0x1b0 [kasan_test] [ 155.037591] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 155.037599] ? __schedule+0x757/0x1420 [ 155.037603] ? __pfx_read_tsc+0x10/0x10 [ 155.037606] ? ktime_get_ts64+0x7f/0x220 [ 155.037609] kunit_try_run_case+0x175/0x440 [ 155.037613] ? __pfx_kunit_try_run_case+0x10/0x10 [ 155.037615] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 155.037619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 155.037622] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 155.037625] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 155.037628] kthread+0x3b4/0x780 [ 155.037632] ? __pfx_kthread+0x10/0x10 [ 155.037635] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 155.037638] ? __pfx_kthread+0x10/0x10 [ 155.037641] ret_from_fork+0x30/0x70 [ 155.037645] ? __pfx_kthread+0x10/0x10 [ 155.037648] ret_from_fork_asm+0x1a/0x30 [ 155.037652] [ 155.250389] Allocated by task 3898: [ 155.254554] kasan_save_stack+0x1c/0x40 [ 155.259070] kasan_save_track+0x10/0x30 [ 155.263590] __kasan_kmalloc+0xa6/0xb0 [ 155.268011] kasan_bitops_generic+0x84/0x1b0 [kasan_test] [ 155.274096] kunit_try_run_case+0x175/0x440 [ 155.278949] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 155.285015] kthread+0x3b4/0x780 [ 155.288932] ret_from_fork+0x30/0x70 [ 155.293183] ret_from_fork_asm+0x1a/0x30 [ 155.299955] The buggy address belongs to the object at ffff888101062640 which belongs to the cache kmalloc-16 of size 16 [ 155.313624] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff888101062640, ffff888101062649) [ 155.329380] The buggy address belongs to the physical page: [ 155.335617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101062 [ 155.344276] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 155.351464] page_type: f5(slab) [ 155.355284] raw: 0017ffffc0000000 ffff888100042640 dead000000000100 dead000000000122 [ 155.363681] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 155.372079] page dumped because: kasan: bad access detected [ 155.380490] Memory state around the buggy address: [ 155.385951] ffff888101062500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 155.393829] ffff888101062580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 155.401708] >ffff888101062600: fa fb fc fc 00 00 fc fc 00 01 fc fc 00 06 fc fc [ 155.409588] ^ [ 155.415827] ffff888101062680: 00 04 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 155.423707] ffff888101062700: 00 00 fc fc fa fb fc fc 00 06 fc fc fa fb fc fc [ 155.431586] ================================================================== [ 155.439472] ================================================================== [ 155.447366] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x188/0xd80 [kasan_test] [ 155.458105] Write of size 8 at addr ffff888101062648 by task kunit_try_catch/3898 [ 155.468419] CPU: 3 UID: 0 PID: 3898 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 155.468424] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 155.468426] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 155.468427] Call Trace: [ 155.468429] [ 155.468430] dump_stack_lvl+0x4f/0x70 [ 155.468434] print_address_description.constprop.0+0x2c/0x3b0 [ 155.468438] ? kasan_bitops_test_and_modify.constprop.0+0x188/0xd80 [kasan_test] [ 155.468447] print_report+0xb9/0x280 [ 155.468451] ? kasan_bitops_test_and_modify.constprop.0+0x188/0xd80 [kasan_test] [ 155.468459] ? kasan_addr_to_slab+0x9/0x90 [ 155.468462] ? kasan_bitops_test_and_modify.constprop.0+0x188/0xd80 [kasan_test] [ 155.468470] kasan_report+0xda/0x110 [ 155.468474] ? kasan_bitops_test_and_modify.constprop.0+0x188/0xd80 [kasan_test] [ 155.468483] kasan_check_range+0xfc/0x1b0 [ 155.468485] kasan_bitops_test_and_modify.constprop.0+0x188/0xd80 [kasan_test] [ 155.468494] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [kasan_test] [ 155.468503] ? __kmalloc_cache_noprof+0x158/0x430 [ 155.468507] kasan_bitops_generic+0x113/0x1b0 [kasan_test] [ 155.468515] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 155.468523] ? __schedule+0x757/0x1420 [ 155.468526] ? __pfx_read_tsc+0x10/0x10 [ 155.468529] ? ktime_get_ts64+0x7f/0x220 [ 155.468532] kunit_try_run_case+0x175/0x440 [ 155.468535] ? __pfx_kunit_try_run_case+0x10/0x10 [ 155.468538] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 155.468541] ? __pfx_kunit_try_run_case+0x10/0x10 [ 155.468544] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 155.468547] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 155.468550] kthread+0x3b4/0x780 [ 155.468553] ? __pfx_kthread+0x10/0x10 [ 155.468556] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 155.468560] ? __pfx_kthread+0x10/0x10 [ 155.468563] ret_from_fork+0x30/0x70 [ 155.468566] ? __pfx_kthread+0x10/0x10 [ 155.468569] ret_from_fork_asm+0x1a/0x30 [ 155.468573] [ 155.681735] Allocated by task 3898: [ 155.685895] kasan_save_stack+0x1c/0x40 [ 155.690404] kasan_save_track+0x10/0x30 [ 155.694913] __kasan_kmalloc+0xa6/0xb0 [ 155.699335] kasan_bitops_generic+0x84/0x1b0 [kasan_test] [ 155.705405] kunit_try_run_case+0x175/0x440 [ 155.710260] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 155.716324] kthread+0x3b4/0x780 [ 155.720229] ret_from_fork+0x30/0x70 [ 155.724480] ret_from_fork_asm+0x1a/0x30 [ 155.731253] The buggy address belongs to the object at ffff888101062640 which belongs to the cache kmalloc-16 of size 16 [ 155.744926] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff888101062640, ffff888101062649) [ 155.760682] The buggy address belongs to the physical page: [ 155.766920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101062 [ 155.775576] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 155.782762] page_type: f5(slab) [ 155.786587] raw: 0017ffffc0000000 ffff888100042640 dead000000000100 dead000000000122 [ 155.794990] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 155.803389] page dumped because: kasan: bad access detected [ 155.811797] Memory state around the buggy address: [ 155.817255] ffff888101062500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 155.825137] ffff888101062580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 155.833017] >ffff888101062600: fa fb fc fc 00 00 fc fc 00 01 fc fc 00 06 fc fc [ 155.840904] ^ [ 155.847141] ffff888101062680: 00 04 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 155.855033] ffff888101062700: 00 00 fc fc fa fb fc fc 00 06 fc fc fa fb fc fc [ 155.862913] ================================================================== [ 155.870805] ================================================================== [ 155.878699] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x225/0xd80 [kasan_test] [ 155.889439] Write of size 8 at addr ffff888101062648 by task kunit_try_catch/3898 [ 155.899755] CPU: 3 UID: 0 PID: 3898 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 155.899761] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 155.899762] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 155.899764] Call Trace: [ 155.899766] [ 155.899767] dump_stack_lvl+0x4f/0x70 [ 155.899772] print_address_description.constprop.0+0x2c/0x3b0 [ 155.899776] ? kasan_bitops_test_and_modify.constprop.0+0x225/0xd80 [kasan_test] [ 155.899785] print_report+0xb9/0x280 [ 155.899788] ? kasan_bitops_test_and_modify.constprop.0+0x225/0xd80 [kasan_test] [ 155.899796] ? kasan_addr_to_slab+0x9/0x90 [ 155.899800] ? kasan_bitops_test_and_modify.constprop.0+0x225/0xd80 [kasan_test] [ 155.899808] kasan_report+0xda/0x110 [ 155.899812] ? kasan_bitops_test_and_modify.constprop.0+0x225/0xd80 [kasan_test] [ 155.899821] kasan_check_range+0xfc/0x1b0 [ 155.899824] kasan_bitops_test_and_modify.constprop.0+0x225/0xd80 [kasan_test] [ 155.899833] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [kasan_test] [ 155.899841] ? __kmalloc_cache_noprof+0x158/0x430 [ 155.899845] kasan_bitops_generic+0x113/0x1b0 [kasan_test] [ 155.899854] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 155.899862] ? __schedule+0x757/0x1420 [ 155.899865] ? __pfx_read_tsc+0x10/0x10 [ 155.899868] ? ktime_get_ts64+0x7f/0x220 [ 155.899871] kunit_try_run_case+0x175/0x440 [ 155.899874] ? __pfx_kunit_try_run_case+0x10/0x10 [ 155.899877] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 155.899881] ? __pfx_kunit_try_run_case+0x10/0x10 [ 155.899883] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 155.899886] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 155.899889] kthread+0x3b4/0x780 [ 155.899893] ? __pfx_kthread+0x10/0x10 [ 155.899896] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 155.899900] ? __pfx_kthread+0x10/0x10 [ 155.899903] ret_from_fork+0x30/0x70 [ 155.899906] ? __pfx_kthread+0x10/0x10 [ 155.899909] ret_from_fork_asm+0x1a/0x30 [ 155.899913] [ 156.113050] Allocated by task 3898: [ 156.117223] kasan_save_stack+0x1c/0x40 [ 156.121734] kasan_save_track+0x10/0x30 [ 156.126241] __kasan_kmalloc+0xa6/0xb0 [ 156.130663] kasan_bitops_generic+0x84/0x1b0 [kasan_test] [ 156.136732] kunit_try_run_case+0x175/0x440 [ 156.141585] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 156.147648] kthread+0x3b4/0x780 [ 156.151553] ret_from_fork+0x30/0x70 [ 156.155801] ret_from_fork_asm+0x1a/0x30 [ 156.162570] The buggy address belongs to the object at ffff888101062640 which belongs to the cache kmalloc-16 of size 16 [ 156.176239] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff888101062640, ffff888101062649) [ 156.191999] The buggy address belongs to the physical page: [ 156.198234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101062 [ 156.206890] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 156.214087] page_type: f5(slab) [ 156.217904] raw: 0017ffffc0000000 ffff888100042640 dead000000000100 dead000000000122 [ 156.226301] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 156.234699] page dumped because: kasan: bad access detected [ 156.243109] Memory state around the buggy address: [ 156.248566] ffff888101062500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 156.256444] ffff888101062580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 156.264323] >ffff888101062600: fa fb fc fc 00 00 fc fc 00 01 fc fc 00 06 fc fc [ 156.272200] ^ [ 156.278435] ffff888101062680: 00 04 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 156.286313] ffff888101062700: 00 00 fc fc fa fb fc fc 00 06 fc fc fa fb fc fc [ 156.294192] ================================================================== [ 156.302089] ================================================================== [ 156.309978] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2c3/0xd80 [kasan_test] [ 156.320715] Write of size 8 at addr ffff888101062648 by task kunit_try_catch/3898 [ 156.331038] CPU: 3 UID: 0 PID: 3898 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 156.331044] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 156.331046] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 156.331047] Call Trace: [ 156.331049] [ 156.331050] dump_stack_lvl+0x4f/0x70 [ 156.331063] print_address_description.constprop.0+0x2c/0x3b0 [ 156.331068] ? kasan_bitops_test_and_modify.constprop.0+0x2c3/0xd80 [kasan_test] [ 156.331086] print_report+0xb9/0x280 [ 156.331089] ? kasan_bitops_test_and_modify.constprop.0+0x2c3/0xd80 [kasan_test] [ 156.331097] ? kasan_addr_to_slab+0x9/0x90 [ 156.331100] ? kasan_bitops_test_and_modify.constprop.0+0x2c3/0xd80 [kasan_test] [ 156.331108] kasan_report+0xda/0x110 [ 156.331112] ? kasan_bitops_test_and_modify.constprop.0+0x2c3/0xd80 [kasan_test] [ 156.331121] kasan_check_range+0xfc/0x1b0 [ 156.331124] kasan_bitops_test_and_modify.constprop.0+0x2c3/0xd80 [kasan_test] [ 156.331133] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [kasan_test] [ 156.331142] ? __kmalloc_cache_noprof+0x158/0x430 [ 156.331145] kasan_bitops_generic+0x113/0x1b0 [kasan_test] [ 156.331154] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 156.331162] ? __schedule+0x757/0x1420 [ 156.331164] ? __pfx_read_tsc+0x10/0x10 [ 156.331167] ? ktime_get_ts64+0x7f/0x220 [ 156.331170] kunit_try_run_case+0x175/0x440 [ 156.331173] ? __pfx_kunit_try_run_case+0x10/0x10 [ 156.331175] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 156.331179] ? __pfx_kunit_try_run_case+0x10/0x10 [ 156.331181] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 156.331184] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 156.331188] kthread+0x3b4/0x780 [ 156.331191] ? __pfx_kthread+0x10/0x10 [ 156.331194] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 156.331197] ? __pfx_kthread+0x10/0x10 [ 156.331200] ret_from_fork+0x30/0x70 [ 156.331203] ? __pfx_kthread+0x10/0x10 [ 156.331206] ret_from_fork_asm+0x1a/0x30 [ 156.331210] [ 156.544362] Allocated by task 3898: [ 156.548523] kasan_save_stack+0x1c/0x40 [ 156.553038] kasan_save_track+0x10/0x30 [ 156.557549] __kasan_kmalloc+0xa6/0xb0 [ 156.561971] kasan_bitops_generic+0x84/0x1b0 [kasan_test] [ 156.568041] kunit_try_run_case+0x175/0x440 [ 156.572896] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 156.578961] kthread+0x3b4/0x780 [ 156.582863] ret_from_fork+0x30/0x70 [ 156.587111] ret_from_fork_asm+0x1a/0x30 [ 156.593880] The buggy address belongs to the object at ffff888101062640 which belongs to the cache kmalloc-16 of size 16 [ 156.607548] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff888101062640, ffff888101062649) [ 156.623303] The buggy address belongs to the physical page: [ 156.629537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101062 [ 156.638191] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 156.645378] page_type: f5(slab) [ 156.649197] raw: 0017ffffc0000000 ffff888100042640 dead000000000100 dead000000000122 [ 156.657594] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 156.665990] page dumped because: kasan: bad access detected [ 156.674402] Memory state around the buggy address: [ 156.679858] ffff888101062500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 156.687735] ffff888101062580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 156.695613] >ffff888101062600: fa fb fc fc 00 00 fc fc 00 01 fc fc 00 06 fc fc [ 156.703491] ^ [ 156.709727] ffff888101062680: 00 04 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 156.717604] ffff888101062700: 00 00 fc fc fa fb fc fc 00 06 fc fc fa fb fc fc [ 156.725482] ================================================================== [ 156.733366] ================================================================== [ 156.741259] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x361/0xd80 [kasan_test] [ 156.751996] Write of size 8 at addr ffff888101062648 by task kunit_try_catch/3898 [ 156.762307] CPU: 3 UID: 0 PID: 3898 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 156.762312] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 156.762314] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 156.762315] Call Trace: [ 156.762317] [ 156.762318] dump_stack_lvl+0x4f/0x70 [ 156.762322] print_address_description.constprop.0+0x2c/0x3b0 [ 156.762326] ? kasan_bitops_test_and_modify.constprop.0+0x361/0xd80 [kasan_test] [ 156.762335] print_report+0xb9/0x280 [ 156.762338] ? kasan_bitops_test_and_modify.constprop.0+0x361/0xd80 [kasan_test] [ 156.762346] ? kasan_addr_to_slab+0x9/0x90 [ 156.762349] ? kasan_bitops_test_and_modify.constprop.0+0x361/0xd80 [kasan_test] [ 156.762358] kasan_report+0xda/0x110 [ 156.762361] ? kasan_bitops_test_and_modify.constprop.0+0x361/0xd80 [kasan_test] [ 156.762370] kasan_check_range+0xfc/0x1b0 [ 156.762373] kasan_bitops_test_and_modify.constprop.0+0x361/0xd80 [kasan_test] [ 156.762382] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [kasan_test] [ 156.762391] ? __kmalloc_cache_noprof+0x158/0x430 [ 156.762394] kasan_bitops_generic+0x113/0x1b0 [kasan_test] [ 156.762403] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 156.762411] ? __schedule+0x757/0x1420 [ 156.762414] ? __pfx_read_tsc+0x10/0x10 [ 156.762416] ? ktime_get_ts64+0x7f/0x220 [ 156.762419] kunit_try_run_case+0x175/0x440 [ 156.762422] ? __pfx_kunit_try_run_case+0x10/0x10 [ 156.762425] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 156.762428] ? __pfx_kunit_try_run_case+0x10/0x10 [ 156.762430] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 156.762433] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 156.762437] kthread+0x3b4/0x780 [ 156.762440] ? __pfx_kthread+0x10/0x10 [ 156.762443] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 156.762446] ? __pfx_kthread+0x10/0x10 [ 156.762449] ret_from_fork+0x30/0x70 [ 156.762452] ? __pfx_kthread+0x10/0x10 [ 156.762455] ret_from_fork_asm+0x1a/0x30 [ 156.762459] [ 156.975623] Allocated by task 3898: [ 156.979786] kasan_save_stack+0x1c/0x40 [ 156.984295] kasan_save_track+0x10/0x30 [ 156.988804] __kasan_kmalloc+0xa6/0xb0 [ 156.993226] kasan_bitops_generic+0x84/0x1b0 [kasan_test] [ 156.999299] kunit_try_run_case+0x175/0x440 [ 157.004155] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 157.010222] kthread+0x3b4/0x780 [ 157.014125] ret_from_fork+0x30/0x70 [ 157.018375] ret_from_fork_asm+0x1a/0x30 [ 157.025146] The buggy address belongs to the object at ffff888101062640 which belongs to the cache kmalloc-16 of size 16 [ 157.038816] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff888101062640, ffff888101062649) [ 157.054572] The buggy address belongs to the physical page: [ 157.060807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101062 [ 157.069464] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 157.076653] page_type: f5(slab) [ 157.080473] raw: 0017ffffc0000000 ffff888100042640 dead000000000100 dead000000000122 [ 157.088870] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 157.097266] page dumped because: kasan: bad access detected [ 157.105674] Memory state around the buggy address: [ 157.111132] ffff888101062500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 157.119011] ffff888101062580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 157.126901] >ffff888101062600: fa fb fc fc 00 00 fc fc 00 01 fc fc 00 06 fc fc [ 157.134778] ^ [ 157.141012] ffff888101062680: 00 04 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 157.148903] ffff888101062700: 00 00 fc fc fa fb fc fc 00 06 fc fc fa fb fc fc [ 157.156782] ================================================================== [ 157.164690] ================================================================== [ 157.172567] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x3fe/0xd80 [kasan_test] [ 157.183305] Write of size 8 at addr ffff888101062648 by task kunit_try_catch/3898 [ 157.193621] CPU: 3 UID: 0 PID: 3898 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 157.193626] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 157.193628] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 157.193629] Call Trace: [ 157.193631] [ 157.193632] dump_stack_lvl+0x4f/0x70 [ 157.193637] print_address_description.constprop.0+0x2c/0x3b0 [ 157.193641] ? kasan_bitops_test_and_modify.constprop.0+0x3fe/0xd80 [kasan_test] [ 157.193650] print_report+0xb9/0x280 [ 157.193653] ? kasan_bitops_test_and_modify.constprop.0+0x3fe/0xd80 [kasan_test] [ 157.193661] ? kasan_addr_to_slab+0x9/0x90 [ 157.193665] ? kasan_bitops_test_and_modify.constprop.0+0x3fe/0xd80 [kasan_test] [ 157.193673] kasan_report+0xda/0x110 [ 157.193677] ? kasan_bitops_test_and_modify.constprop.0+0x3fe/0xd80 [kasan_test] [ 157.193685] kasan_check_range+0xfc/0x1b0 [ 157.193688] kasan_bitops_test_and_modify.constprop.0+0x3fe/0xd80 [kasan_test] [ 157.193697] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [kasan_test] [ 157.193706] ? __kmalloc_cache_noprof+0x158/0x430 [ 157.193710] kasan_bitops_generic+0x113/0x1b0 [kasan_test] [ 157.193718] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 157.193726] ? __schedule+0x757/0x1420 [ 157.193729] ? __pfx_read_tsc+0x10/0x10 [ 157.193732] ? ktime_get_ts64+0x7f/0x220 [ 157.193735] kunit_try_run_case+0x175/0x440 [ 157.193738] ? __pfx_kunit_try_run_case+0x10/0x10 [ 157.193740] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 157.193744] ? __pfx_kunit_try_run_case+0x10/0x10 [ 157.193746] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 157.193749] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 157.193752] kthread+0x3b4/0x780 [ 157.193756] ? __pfx_kthread+0x10/0x10 [ 157.193759] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 157.193762] ? __pfx_kthread+0x10/0x10 [ 157.193765] ret_from_fork+0x30/0x70 [ 157.193768] ? __pfx_kthread+0x10/0x10 [ 157.193771] ret_from_fork_asm+0x1a/0x30 [ 157.193775] [ 157.406922] Allocated by task 3898: [ 157.411084] kasan_save_stack+0x1c/0x40 [ 157.415594] kasan_save_track+0x10/0x30 [ 157.420103] __kasan_kmalloc+0xa6/0xb0 [ 157.424527] kasan_bitops_generic+0x84/0x1b0 [kasan_test] [ 157.430599] kunit_try_run_case+0x175/0x440 [ 157.435454] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 157.441517] kthread+0x3b4/0x780 [ 157.445420] ret_from_fork+0x30/0x70 [ 157.449670] ret_from_fork_asm+0x1a/0x30 [ 157.456440] The buggy address belongs to the object at ffff888101062640 which belongs to the cache kmalloc-16 of size 16 [ 157.470109] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff888101062640, ffff888101062649) [ 157.485866] The buggy address belongs to the physical page: [ 157.492102] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101062 [ 157.500760] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 157.507947] page_type: f5(slab) [ 157.511765] raw: 0017ffffc0000000 ffff888100042640 dead000000000100 dead000000000122 [ 157.520162] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 157.528559] page dumped because: kasan: bad access detected [ 157.536969] Memory state around the buggy address: [ 157.542427] ffff888101062500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 157.550306] ffff888101062580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 157.558184] >ffff888101062600: fa fb fc fc 00 00 fc fc 00 01 fc fc 00 06 fc fc [ 157.566071] ^ [ 157.572308] ffff888101062680: 00 04 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 157.580188] ffff888101062700: 00 00 fc fc fa fb fc fc 00 06 fc fc fa fb fc fc [ 157.588071] ================================================================== [ 157.595971] ================================================================== [ 157.603867] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x49c/0xd80 [kasan_test] [ 157.614607] Write of size 8 at addr ffff888101062648 by task kunit_try_catch/3898 [ 157.624925] CPU: 3 UID: 0 PID: 3898 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 157.624930] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 157.624932] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 157.624933] Call Trace: [ 157.624935] [ 157.624936] dump_stack_lvl+0x4f/0x70 [ 157.624940] print_address_description.constprop.0+0x2c/0x3b0 [ 157.624944] ? kasan_bitops_test_and_modify.constprop.0+0x49c/0xd80 [kasan_test] [ 157.624953] print_report+0xb9/0x280 [ 157.624956] ? kasan_bitops_test_and_modify.constprop.0+0x49c/0xd80 [kasan_test] [ 157.624965] ? kasan_addr_to_slab+0x9/0x90 [ 157.624968] ? kasan_bitops_test_and_modify.constprop.0+0x49c/0xd80 [kasan_test] [ 157.624976] kasan_report+0xda/0x110 [ 157.624980] ? kasan_bitops_test_and_modify.constprop.0+0x49c/0xd80 [kasan_test] [ 157.624989] kasan_check_range+0xfc/0x1b0 [ 157.624992] kasan_bitops_test_and_modify.constprop.0+0x49c/0xd80 [kasan_test] [ 157.625001] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [kasan_test] [ 157.625009] ? __kmalloc_cache_noprof+0x158/0x430 [ 157.625013] kasan_bitops_generic+0x113/0x1b0 [kasan_test] [ 157.625036] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 157.625053] ? __schedule+0x757/0x1420 [ 157.625056] ? __pfx_read_tsc+0x10/0x10 [ 157.625059] ? ktime_get_ts64+0x7f/0x220 [ 157.625062] kunit_try_run_case+0x175/0x440 [ 157.625065] ? __pfx_kunit_try_run_case+0x10/0x10 [ 157.625067] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 157.625071] ? __pfx_kunit_try_run_case+0x10/0x10 [ 157.625073] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 157.625076] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 157.625079] kthread+0x3b4/0x780 [ 157.625083] ? __pfx_kthread+0x10/0x10 [ 157.625086] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 157.625089] ? __pfx_kthread+0x10/0x10 [ 157.625092] ret_from_fork+0x30/0x70 [ 157.625095] ? __pfx_kthread+0x10/0x10 [ 157.625098] ret_from_fork_asm+0x1a/0x30 [ 157.625102] [ 157.838288] Allocated by task 3898: [ 157.842452] kasan_save_stack+0x1c/0x40 [ 157.846963] kasan_save_track+0x10/0x30 [ 157.851471] __kasan_kmalloc+0xa6/0xb0 [ 157.855893] kasan_bitops_generic+0x84/0x1b0 [kasan_test] [ 157.861965] kunit_try_run_case+0x175/0x440 [ 157.866821] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 157.872885] kthread+0x3b4/0x780 [ 157.876791] ret_from_fork+0x30/0x70 [ 157.881042] ret_from_fork_asm+0x1a/0x30 [ 157.887825] The buggy address belongs to the object at ffff888101062640 which belongs to the cache kmalloc-16 of size 16 [ 157.901494] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff888101062640, ffff888101062649) [ 157.917263] The buggy address belongs to the physical page: [ 157.923501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101062 [ 157.932161] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 157.939352] page_type: f5(slab) [ 157.943173] raw: 0017ffffc0000000 ffff888100042640 dead000000000100 dead000000000122 [ 157.951572] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 157.959969] page dumped because: kasan: bad access detected [ 157.968382] Memory state around the buggy address: [ 157.973840] ffff888101062500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 157.981717] ffff888101062580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 157.989597] >ffff888101062600: fa fb fc fc 00 00 fc fc 00 01 fc fc 00 06 fc fc [ 157.997475] ^ [ 158.003712] ffff888101062680: 00 04 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 158.011589] ffff888101062700: 00 00 fc fc fa fb fc fc 00 06 fc fc fa fb fc fc [ 158.019467] ================================================================== [ 158.027356] ================================================================== [ 158.035255] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x539/0xd80 [kasan_test] [ 158.045992] Read of size 8 at addr ffff888101062648 by task kunit_try_catch/3898 [ 158.056229] CPU: 3 UID: 0 PID: 3898 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 158.056235] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 158.056236] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 158.056238] Call Trace: [ 158.056240] [ 158.056241] dump_stack_lvl+0x4f/0x70 [ 158.056245] print_address_description.constprop.0+0x2c/0x3b0 [ 158.056249] ? kasan_bitops_test_and_modify.constprop.0+0x539/0xd80 [kasan_test] [ 158.056258] print_report+0xb9/0x280 [ 158.056262] ? kasan_bitops_test_and_modify.constprop.0+0x539/0xd80 [kasan_test] [ 158.056270] ? kasan_addr_to_slab+0x9/0x90 [ 158.056273] ? kasan_bitops_test_and_modify.constprop.0+0x539/0xd80 [kasan_test] [ 158.056282] kasan_report+0xda/0x110 [ 158.056285] ? kasan_bitops_test_and_modify.constprop.0+0x539/0xd80 [kasan_test] [ 158.056294] kasan_check_range+0xfc/0x1b0 [ 158.056297] kasan_bitops_test_and_modify.constprop.0+0x539/0xd80 [kasan_test] [ 158.056306] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [kasan_test] [ 158.056314] ? __kmalloc_cache_noprof+0x158/0x430 [ 158.056318] kasan_bitops_generic+0x113/0x1b0 [kasan_test] [ 158.056327] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 158.056334] ? __schedule+0x757/0x1420 [ 158.056337] ? __pfx_read_tsc+0x10/0x10 [ 158.056340] ? ktime_get_ts64+0x7f/0x220 [ 158.056343] kunit_try_run_case+0x175/0x440 [ 158.056346] ? __pfx_kunit_try_run_case+0x10/0x10 [ 158.056349] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 158.056352] ? __pfx_kunit_try_run_case+0x10/0x10 [ 158.056354] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 158.056358] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 158.056361] kthread+0x3b4/0x780 [ 158.056364] ? __pfx_kthread+0x10/0x10 [ 158.056367] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 158.056371] ? __pfx_kthread+0x10/0x10 [ 158.056374] ret_from_fork+0x30/0x70 [ 158.056377] ? __pfx_kthread+0x10/0x10 [ 158.056380] ret_from_fork_asm+0x1a/0x30 [ 158.056384] [ 158.269548] Allocated by task 3898: [ 158.273710] kasan_save_stack+0x1c/0x40 [ 158.278220] kasan_save_track+0x10/0x30 [ 158.282729] __kasan_kmalloc+0xa6/0xb0 [ 158.287154] kasan_bitops_generic+0x84/0x1b0 [kasan_test] [ 158.293224] kunit_try_run_case+0x175/0x440 [ 158.298085] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 158.304150] kthread+0x3b4/0x780 [ 158.308065] ret_from_fork+0x30/0x70 [ 158.312322] ret_from_fork_asm+0x1a/0x30 [ 158.319092] The buggy address belongs to the object at ffff888101062640 which belongs to the cache kmalloc-16 of size 16 [ 158.332761] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff888101062640, ffff888101062649) [ 158.348518] The buggy address belongs to the physical page: [ 158.354752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101062 [ 158.363409] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 158.370598] page_type: f5(slab) [ 158.374416] raw: 0017ffffc0000000 ffff888100042640 dead000000000100 dead000000000122 [ 158.382816] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 158.391213] page dumped because: kasan: bad access detected [ 158.399623] Memory state around the buggy address: [ 158.405084] ffff888101062500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 158.412962] ffff888101062580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 158.420838] >ffff888101062600: fa fb fc fc 00 00 fc fc 00 01 fc fc 00 06 fc fc [ 158.428715] ^ [ 158.434953] ffff888101062680: 00 04 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 158.442831] ffff888101062700: 00 00 fc fc fa fb fc fc 00 06 fc fc fa fb fc fc [ 158.450707] ================================================================== [ 158.458595] ================================================================== [ 158.466491] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xcf8/0xd80 [kasan_test] [ 158.477228] Read of size 8 at addr ffff888101062648 by task kunit_try_catch/3898 [ 158.487455] CPU: 3 UID: 0 PID: 3898 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 158.487461] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 158.487462] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 158.487464] Call Trace: [ 158.487465] [ 158.487467] dump_stack_lvl+0x4f/0x70 [ 158.487470] print_address_description.constprop.0+0x2c/0x3b0 [ 158.487475] ? kasan_bitops_test_and_modify.constprop.0+0xcf8/0xd80 [kasan_test] [ 158.487483] print_report+0xb9/0x280 [ 158.487487] ? kasan_bitops_test_and_modify.constprop.0+0xcf8/0xd80 [kasan_test] [ 158.487495] ? kasan_addr_to_slab+0x9/0x90 [ 158.487498] ? kasan_bitops_test_and_modify.constprop.0+0xcf8/0xd80 [kasan_test] [ 158.487506] kasan_report+0xda/0x110 [ 158.487510] ? kasan_bitops_test_and_modify.constprop.0+0xcf8/0xd80 [kasan_test] [ 158.487519] kasan_bitops_test_and_modify.constprop.0+0xcf8/0xd80 [kasan_test] [ 158.487528] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [kasan_test] [ 158.487537] ? __kmalloc_cache_noprof+0x158/0x430 [ 158.487540] kasan_bitops_generic+0x113/0x1b0 [kasan_test] [ 158.487549] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 158.487557] ? __schedule+0x757/0x1420 [ 158.487560] ? __pfx_read_tsc+0x10/0x10 [ 158.487562] ? ktime_get_ts64+0x7f/0x220 [ 158.487566] kunit_try_run_case+0x175/0x440 [ 158.487568] ? __pfx_kunit_try_run_case+0x10/0x10 [ 158.487571] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 158.487574] ? __pfx_kunit_try_run_case+0x10/0x10 [ 158.487577] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 158.487580] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 158.487583] kthread+0x3b4/0x780 [ 158.487586] ? __pfx_kthread+0x10/0x10 [ 158.487589] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 158.487593] ? __pfx_kthread+0x10/0x10 [ 158.487596] ret_from_fork+0x30/0x70 [ 158.487599] ? __pfx_kthread+0x10/0x10 [ 158.487602] ret_from_fork_asm+0x1a/0x30 [ 158.487606] [ 158.696089] Allocated by task 3898: [ 158.700250] kasan_save_stack+0x1c/0x40 [ 158.704759] kasan_save_track+0x10/0x30 [ 158.709270] __kasan_kmalloc+0xa6/0xb0 [ 158.713692] kasan_bitops_generic+0x84/0x1b0 [kasan_test] [ 158.719764] kunit_try_run_case+0x175/0x440 [ 158.724619] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 158.730682] kthread+0x3b4/0x780 [ 158.734588] ret_from_fork+0x30/0x70 [ 158.738838] ret_from_fork_asm+0x1a/0x30 [ 158.745608] The buggy address belongs to the object at ffff888101062640 which belongs to the cache kmalloc-16 of size 16 [ 158.759275] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff888101062640, ffff888101062649) [ 158.775037] The buggy address belongs to the physical page: [ 158.781271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101062 [ 158.789928] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 158.797118] page_type: f5(slab) [ 158.800936] raw: 0017ffffc0000000 ffff888100042640 dead000000000100 dead000000000122 [ 158.809337] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 158.817740] page dumped because: kasan: bad access detected [ 158.826152] Memory state around the buggy address: [ 158.831610] ffff888101062500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 158.839491] ffff888101062580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 158.847370] >ffff888101062600: fa fb fc fc 00 00 fc fc 00 01 fc fc 00 06 fc fc [ 158.855250] ^ [ 158.861485] ffff888101062680: 00 04 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 158.869363] ffff888101062700: 00 00 fc fc fa fb fc fc 00 06 fc fc fa fb fc fc [ 158.877239] ================================================================== [ 158.885151] # kasan_bitops_generic: Test should be marked slow (runtime: 7.291369018s) [ 158.885365] ok 63 kasan_bitops_generic [ 158.894744] ok 64 kasan_bitops_tags # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 158.899711] ================================================================== [ 158.915915] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8d/0x5400 [kasan_test] [ 158.925100] Read of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 158.935328] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 158.935334] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 158.935335] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 158.935337] Call Trace: [ 158.935338] [ 158.935340] dump_stack_lvl+0x4f/0x70 [ 158.935344] print_address_description.constprop.0+0x2c/0x3b0 [ 158.935348] ? kasan_atomics_helper+0x4b8d/0x5400 [kasan_test] [ 158.935357] print_report+0xb9/0x280 [ 158.935360] ? kasan_atomics_helper+0x4b8d/0x5400 [kasan_test] [ 158.935368] ? kasan_addr_to_slab+0x9/0x90 [ 158.935371] ? kasan_atomics_helper+0x4b8d/0x5400 [kasan_test] [ 158.935379] kasan_report+0xda/0x110 [ 158.935383] ? kasan_atomics_helper+0x4b8d/0x5400 [kasan_test] [ 158.935391] kasan_atomics_helper+0x4b8d/0x5400 [kasan_test] [ 158.935400] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 158.935408] ? __kasan_slab_alloc+0x4a/0x90 [ 158.935412] ? __kmalloc_cache_noprof+0x158/0x430 [ 158.935414] ? pick_next_task_fair+0x51/0xba0 [ 158.935419] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 158.935428] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 158.935436] ? __schedule+0x757/0x1420 [ 158.935439] ? __pfx_read_tsc+0x10/0x10 [ 158.935442] ? ktime_get_ts64+0x7f/0x220 [ 158.935445] kunit_try_run_case+0x175/0x440 [ 158.935448] ? __pfx_kunit_try_run_case+0x10/0x10 [ 158.935451] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 158.935454] ? __pfx_kunit_try_run_case+0x10/0x10 [ 158.935456] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 158.935460] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 158.935463] kthread+0x3b4/0x780 [ 158.935466] ? __pfx_kthread+0x10/0x10 [ 158.935469] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 158.935473] ? __pfx_kthread+0x10/0x10 [ 158.935476] ret_from_fork+0x30/0x70 [ 158.935479] ? __pfx_kthread+0x10/0x10 [ 158.935482] ret_from_fork_asm+0x1a/0x30 [ 158.935486] [ 159.143126] Allocated by task 3930: [ 159.147287] kasan_save_stack+0x1c/0x40 [ 159.151798] kasan_save_track+0x10/0x30 [ 159.156306] __kasan_kmalloc+0xa6/0xb0 [ 159.160728] kasan_atomics+0x91/0x2d0 [kasan_test] [ 159.166195] kunit_try_run_case+0x175/0x440 [ 159.171060] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 159.177126] kthread+0x3b4/0x780 [ 159.181038] ret_from_fork+0x30/0x70 [ 159.185287] ret_from_fork_asm+0x1a/0x30 [ 159.192066] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 159.205737] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 159.222098] The buggy address belongs to the physical page: [ 159.228335] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 159.236991] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 159.244613] page_type: f5(slab) [ 159.248432] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 159.256832] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 159.265229] page dumped because: kasan: bad access detected [ 159.273642] Memory state around the buggy address: [ 159.279102] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 159.286980] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 159.294857] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 159.302736] ^ [ 159.308195] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 159.316075] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 159.323952] ================================================================== [ 159.331841] ================================================================== [ 159.339739] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b73/0x5400 [kasan_test] [ 159.348921] Write of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 159.359234] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 159.359239] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 159.359241] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 159.359243] Call Trace: [ 159.359244] [ 159.359246] dump_stack_lvl+0x4f/0x70 [ 159.359249] print_address_description.constprop.0+0x2c/0x3b0 [ 159.359254] ? kasan_atomics_helper+0x4b73/0x5400 [kasan_test] [ 159.359262] print_report+0xb9/0x280 [ 159.359265] ? kasan_atomics_helper+0x4b73/0x5400 [kasan_test] [ 159.359273] ? kasan_addr_to_slab+0x9/0x90 [ 159.359276] ? kasan_atomics_helper+0x4b73/0x5400 [kasan_test] [ 159.359284] kasan_report+0xda/0x110 [ 159.359288] ? kasan_atomics_helper+0x4b73/0x5400 [kasan_test] [ 159.359296] kasan_atomics_helper+0x4b73/0x5400 [kasan_test] [ 159.359305] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 159.359313] ? __kasan_slab_alloc+0x4a/0x90 [ 159.359316] ? __kmalloc_cache_noprof+0x158/0x430 [ 159.359319] ? pick_next_task_fair+0x51/0xba0 [ 159.359323] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 159.359332] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 159.359340] ? __schedule+0x757/0x1420 [ 159.359343] ? __pfx_read_tsc+0x10/0x10 [ 159.359346] ? ktime_get_ts64+0x7f/0x220 [ 159.359349] kunit_try_run_case+0x175/0x440 [ 159.359351] ? __pfx_kunit_try_run_case+0x10/0x10 [ 159.359354] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 159.359358] ? __pfx_kunit_try_run_case+0x10/0x10 [ 159.359360] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 159.359363] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 159.359366] kthread+0x3b4/0x780 [ 159.359369] ? __pfx_kthread+0x10/0x10 [ 159.359372] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 159.359376] ? __pfx_kthread+0x10/0x10 [ 159.359379] ret_from_fork+0x30/0x70 [ 159.359382] ? __pfx_kthread+0x10/0x10 [ 159.359385] ret_from_fork_asm+0x1a/0x30 [ 159.359389] [ 159.566990] Allocated by task 3930: [ 159.571154] kasan_save_stack+0x1c/0x40 [ 159.575664] kasan_save_track+0x10/0x30 [ 159.580176] __kasan_kmalloc+0xa6/0xb0 [ 159.584596] kasan_atomics+0x91/0x2d0 [kasan_test] [ 159.590060] kunit_try_run_case+0x175/0x440 [ 159.594912] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 159.600975] kthread+0x3b4/0x780 [ 159.604881] ret_from_fork+0x30/0x70 [ 159.609131] ret_from_fork_asm+0x1a/0x30 [ 159.615902] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 159.629570] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 159.645935] The buggy address belongs to the physical page: [ 159.652172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 159.660829] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 159.668451] page_type: f5(slab) [ 159.672266] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 159.680663] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 159.689060] page dumped because: kasan: bad access detected [ 159.697470] Memory state around the buggy address: [ 159.702931] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 159.710808] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 159.718685] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 159.726565] ^ [ 159.732023] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 159.739901] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 159.747777] ================================================================== [ 159.755751] ================================================================== [ 159.763636] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b59/0x5400 [kasan_test] [ 159.772822] Read of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 159.783047] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 159.783053] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 159.783054] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 159.783056] Call Trace: [ 159.783058] [ 159.783059] dump_stack_lvl+0x4f/0x70 [ 159.783063] print_address_description.constprop.0+0x2c/0x3b0 [ 159.783067] ? kasan_atomics_helper+0x4b59/0x5400 [kasan_test] [ 159.783075] print_report+0xb9/0x280 [ 159.783079] ? kasan_atomics_helper+0x4b59/0x5400 [kasan_test] [ 159.783087] ? kasan_addr_to_slab+0x9/0x90 [ 159.783090] ? kasan_atomics_helper+0x4b59/0x5400 [kasan_test] [ 159.783098] kasan_report+0xda/0x110 [ 159.783101] ? kasan_atomics_helper+0x4b59/0x5400 [kasan_test] [ 159.783110] kasan_atomics_helper+0x4b59/0x5400 [kasan_test] [ 159.783118] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 159.783127] ? __kasan_slab_alloc+0x4a/0x90 [ 159.783130] ? __kmalloc_cache_noprof+0x158/0x430 [ 159.783132] ? pick_next_task_fair+0x51/0xba0 [ 159.783136] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 159.783145] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 159.783154] ? __schedule+0x757/0x1420 [ 159.783156] ? __pfx_read_tsc+0x10/0x10 [ 159.783159] ? ktime_get_ts64+0x7f/0x220 [ 159.783162] kunit_try_run_case+0x175/0x440 [ 159.783165] ? __pfx_kunit_try_run_case+0x10/0x10 [ 159.783167] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 159.783171] ? __pfx_kunit_try_run_case+0x10/0x10 [ 159.783173] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 159.783176] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 159.783179] kthread+0x3b4/0x780 [ 159.783182] ? __pfx_kthread+0x10/0x10 [ 159.783185] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 159.783189] ? __pfx_kthread+0x10/0x10 [ 159.783192] ret_from_fork+0x30/0x70 [ 159.783195] ? __pfx_kthread+0x10/0x10 [ 159.783198] ret_from_fork_asm+0x1a/0x30 [ 159.783202] [ 159.990842] Allocated by task 3930: [ 159.995003] kasan_save_stack+0x1c/0x40 [ 159.999514] kasan_save_track+0x10/0x30 [ 160.004034] __kasan_kmalloc+0xa6/0xb0 [ 160.008455] kasan_atomics+0x91/0x2d0 [kasan_test] [ 160.013919] kunit_try_run_case+0x175/0x440 [ 160.018772] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 160.024837] kthread+0x3b4/0x780 [ 160.028740] ret_from_fork+0x30/0x70 [ 160.032990] ret_from_fork_asm+0x1a/0x30 [ 160.039763] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 160.053431] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 160.069792] The buggy address belongs to the physical page: [ 160.076036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 160.084692] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 160.092314] page_type: f5(slab) [ 160.096129] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 160.104527] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 160.112923] page dumped because: kasan: bad access detected [ 160.121333] Memory state around the buggy address: [ 160.126790] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 160.134668] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 160.142547] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 160.150424] ^ [ 160.155881] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 160.163757] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 160.171636] ================================================================== [ 160.179554] ================================================================== [ 160.187438] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3f/0x5400 [kasan_test] [ 160.196619] Write of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 160.206933] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 160.206939] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 160.206940] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 160.206942] Call Trace: [ 160.206944] [ 160.206945] dump_stack_lvl+0x4f/0x70 [ 160.206949] print_address_description.constprop.0+0x2c/0x3b0 [ 160.206953] ? kasan_atomics_helper+0x4b3f/0x5400 [kasan_test] [ 160.206961] print_report+0xb9/0x280 [ 160.206965] ? kasan_atomics_helper+0x4b3f/0x5400 [kasan_test] [ 160.206972] ? kasan_addr_to_slab+0x9/0x90 [ 160.206976] ? kasan_atomics_helper+0x4b3f/0x5400 [kasan_test] [ 160.206983] kasan_report+0xda/0x110 [ 160.206987] ? kasan_atomics_helper+0x4b3f/0x5400 [kasan_test] [ 160.206996] kasan_atomics_helper+0x4b3f/0x5400 [kasan_test] [ 160.207004] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 160.207012] ? __kasan_slab_alloc+0x4a/0x90 [ 160.207016] ? __kmalloc_cache_noprof+0x158/0x430 [ 160.207018] ? pick_next_task_fair+0x51/0xba0 [ 160.207034] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 160.207043] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 160.207061] ? __schedule+0x757/0x1420 [ 160.207064] ? __pfx_read_tsc+0x10/0x10 [ 160.207067] ? ktime_get_ts64+0x7f/0x220 [ 160.207079] kunit_try_run_case+0x175/0x440 [ 160.207082] ? __pfx_kunit_try_run_case+0x10/0x10 [ 160.207085] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 160.207088] ? __pfx_kunit_try_run_case+0x10/0x10 [ 160.207090] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 160.207093] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 160.207096] kthread+0x3b4/0x780 [ 160.207100] ? __pfx_kthread+0x10/0x10 [ 160.207103] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 160.207106] ? __pfx_kthread+0x10/0x10 [ 160.207109] ret_from_fork+0x30/0x70 [ 160.207112] ? __pfx_kthread+0x10/0x10 [ 160.207115] ret_from_fork_asm+0x1a/0x30 [ 160.207120] [ 160.414762] Allocated by task 3930: [ 160.418927] kasan_save_stack+0x1c/0x40 [ 160.423435] kasan_save_track+0x10/0x30 [ 160.427945] __kasan_kmalloc+0xa6/0xb0 [ 160.432368] kasan_atomics+0x91/0x2d0 [kasan_test] [ 160.437834] kunit_try_run_case+0x175/0x440 [ 160.442687] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 160.448753] kthread+0x3b4/0x780 [ 160.452656] ret_from_fork+0x30/0x70 [ 160.456905] ret_from_fork_asm+0x1a/0x30 [ 160.463675] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 160.477347] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 160.493707] The buggy address belongs to the physical page: [ 160.499944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 160.508602] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 160.516225] page_type: f5(slab) [ 160.520043] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 160.528454] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 160.536852] page dumped because: kasan: bad access detected [ 160.545264] Memory state around the buggy address: [ 160.550722] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 160.558601] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 160.566482] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 160.574361] ^ [ 160.579820] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 160.587701] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 160.595582] ================================================================== [ 160.603475] ================================================================== [ 160.611375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3c1/0x5400 [kasan_test] [ 160.620471] Read of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 160.630697] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 160.630703] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 160.630704] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 160.630706] Call Trace: [ 160.630707] [ 160.630708] dump_stack_lvl+0x4f/0x70 [ 160.630712] print_address_description.constprop.0+0x2c/0x3b0 [ 160.630716] ? kasan_atomics_helper+0x3c1/0x5400 [kasan_test] [ 160.630724] print_report+0xb9/0x280 [ 160.630727] ? kasan_atomics_helper+0x3c1/0x5400 [kasan_test] [ 160.630735] ? kasan_addr_to_slab+0x9/0x90 [ 160.630739] ? kasan_atomics_helper+0x3c1/0x5400 [kasan_test] [ 160.630746] kasan_report+0xda/0x110 [ 160.630750] ? kasan_atomics_helper+0x3c1/0x5400 [kasan_test] [ 160.630758] kasan_check_range+0xfc/0x1b0 [ 160.630761] kasan_atomics_helper+0x3c1/0x5400 [kasan_test] [ 160.630770] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 160.630778] ? __kasan_slab_alloc+0x4a/0x90 [ 160.630781] ? __kmalloc_cache_noprof+0x158/0x430 [ 160.630784] ? pick_next_task_fair+0x51/0xba0 [ 160.630788] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 160.630797] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 160.630805] ? __schedule+0x757/0x1420 [ 160.630808] ? __pfx_read_tsc+0x10/0x10 [ 160.630810] ? ktime_get_ts64+0x7f/0x220 [ 160.630814] kunit_try_run_case+0x175/0x440 [ 160.630816] ? __pfx_kunit_try_run_case+0x10/0x10 [ 160.630819] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 160.630822] ? __pfx_kunit_try_run_case+0x10/0x10 [ 160.630825] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 160.630828] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 160.630831] kthread+0x3b4/0x780 [ 160.630834] ? __pfx_kthread+0x10/0x10 [ 160.630837] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 160.630840] ? __pfx_kthread+0x10/0x10 [ 160.630843] ret_from_fork+0x30/0x70 [ 160.630846] ? __pfx_kthread+0x10/0x10 [ 160.630849] ret_from_fork_asm+0x1a/0x30 [ 160.630853] [ 160.842753] Allocated by task 3930: [ 160.846916] kasan_save_stack+0x1c/0x40 [ 160.851425] kasan_save_track+0x10/0x30 [ 160.855933] __kasan_kmalloc+0xa6/0xb0 [ 160.860357] kasan_atomics+0x91/0x2d0 [kasan_test] [ 160.865822] kunit_try_run_case+0x175/0x440 [ 160.870678] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 160.876743] kthread+0x3b4/0x780 [ 160.880647] ret_from_fork+0x30/0x70 [ 160.884898] ret_from_fork_asm+0x1a/0x30 [ 160.891668] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 160.905336] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 160.921698] The buggy address belongs to the physical page: [ 160.927936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 160.936594] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 160.944212] page_type: f5(slab) [ 160.948037] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 160.956434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 160.964831] page dumped because: kasan: bad access detected [ 160.973251] Memory state around the buggy address: [ 160.978707] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 160.986586] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 160.994464] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 161.002340] ^ [ 161.007797] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 161.015674] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 161.023552] ================================================================== [ 161.031463] ================================================================== [ 161.039346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b25/0x5400 [kasan_test] [ 161.048527] Read of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 161.058754] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 161.058760] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 161.058761] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 161.058763] Call Trace: [ 161.058764] [ 161.058765] dump_stack_lvl+0x4f/0x70 [ 161.058769] print_address_description.constprop.0+0x2c/0x3b0 [ 161.058773] ? kasan_atomics_helper+0x4b25/0x5400 [kasan_test] [ 161.058782] print_report+0xb9/0x280 [ 161.058785] ? kasan_atomics_helper+0x4b25/0x5400 [kasan_test] [ 161.058793] ? kasan_addr_to_slab+0x9/0x90 [ 161.058796] ? kasan_atomics_helper+0x4b25/0x5400 [kasan_test] [ 161.058804] kasan_report+0xda/0x110 [ 161.058807] ? kasan_atomics_helper+0x4b25/0x5400 [kasan_test] [ 161.058816] kasan_atomics_helper+0x4b25/0x5400 [kasan_test] [ 161.058824] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 161.058832] ? __kasan_slab_alloc+0x4a/0x90 [ 161.058836] ? __kmalloc_cache_noprof+0x158/0x430 [ 161.058838] ? pick_next_task_fair+0x51/0xba0 [ 161.058843] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 161.058851] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 161.058860] ? __schedule+0x757/0x1420 [ 161.058862] ? __pfx_read_tsc+0x10/0x10 [ 161.058865] ? ktime_get_ts64+0x7f/0x220 [ 161.058868] kunit_try_run_case+0x175/0x440 [ 161.058871] ? __pfx_kunit_try_run_case+0x10/0x10 [ 161.058874] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 161.058877] ? __pfx_kunit_try_run_case+0x10/0x10 [ 161.058879] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 161.058883] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 161.058886] kthread+0x3b4/0x780 [ 161.058889] ? __pfx_kthread+0x10/0x10 [ 161.058892] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 161.058895] ? __pfx_kthread+0x10/0x10 [ 161.058898] ret_from_fork+0x30/0x70 [ 161.058901] ? __pfx_kthread+0x10/0x10 [ 161.058904] ret_from_fork_asm+0x1a/0x30 [ 161.058908] [ 161.266572] Allocated by task 3930: [ 161.270732] kasan_save_stack+0x1c/0x40 [ 161.275241] kasan_save_track+0x10/0x30 [ 161.279748] __kasan_kmalloc+0xa6/0xb0 [ 161.284171] kasan_atomics+0x91/0x2d0 [kasan_test] [ 161.289637] kunit_try_run_case+0x175/0x440 [ 161.294492] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 161.300556] kthread+0x3b4/0x780 [ 161.304460] ret_from_fork+0x30/0x70 [ 161.308708] ret_from_fork_asm+0x1a/0x30 [ 161.315475] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 161.329144] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 161.345511] The buggy address belongs to the physical page: [ 161.351748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 161.360404] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 161.368037] page_type: f5(slab) [ 161.371855] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 161.380252] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 161.388647] page dumped because: kasan: bad access detected [ 161.397065] Memory state around the buggy address: [ 161.402532] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 161.410410] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 161.418288] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 161.426166] ^ [ 161.431621] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 161.439503] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 161.447379] ================================================================== [ 161.455288] ================================================================== [ 161.463171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x480/0x5400 [kasan_test] [ 161.472264] Write of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 161.482577] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 161.482582] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 161.482583] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 161.482585] Call Trace: [ 161.482586] [ 161.482588] dump_stack_lvl+0x4f/0x70 [ 161.482591] print_address_description.constprop.0+0x2c/0x3b0 [ 161.482595] ? kasan_atomics_helper+0x480/0x5400 [kasan_test] [ 161.482603] print_report+0xb9/0x280 [ 161.482607] ? kasan_atomics_helper+0x480/0x5400 [kasan_test] [ 161.482615] ? kasan_addr_to_slab+0x9/0x90 [ 161.482618] ? kasan_atomics_helper+0x480/0x5400 [kasan_test] [ 161.482626] kasan_report+0xda/0x110 [ 161.482629] ? kasan_atomics_helper+0x480/0x5400 [kasan_test] [ 161.482638] kasan_check_range+0xfc/0x1b0 [ 161.482641] kasan_atomics_helper+0x480/0x5400 [kasan_test] [ 161.482650] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 161.482657] ? __kasan_slab_alloc+0x4a/0x90 [ 161.482661] ? __kmalloc_cache_noprof+0x158/0x430 [ 161.482663] ? pick_next_task_fair+0x51/0xba0 [ 161.482667] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 161.482676] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 161.482684] ? __schedule+0x757/0x1420 [ 161.482687] ? __pfx_read_tsc+0x10/0x10 [ 161.482689] ? ktime_get_ts64+0x7f/0x220 [ 161.482692] kunit_try_run_case+0x175/0x440 [ 161.482695] ? __pfx_kunit_try_run_case+0x10/0x10 [ 161.482698] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 161.482701] ? __pfx_kunit_try_run_case+0x10/0x10 [ 161.482703] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 161.482707] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 161.482710] kthread+0x3b4/0x780 [ 161.482713] ? __pfx_kthread+0x10/0x10 [ 161.482716] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 161.482719] ? __pfx_kthread+0x10/0x10 [ 161.482722] ret_from_fork+0x30/0x70 [ 161.482725] ? __pfx_kthread+0x10/0x10 [ 161.482728] ret_from_fork_asm+0x1a/0x30 [ 161.482732] [ 161.694628] Allocated by task 3930: [ 161.698789] kasan_save_stack+0x1c/0x40 [ 161.703298] kasan_save_track+0x10/0x30 [ 161.707807] __kasan_kmalloc+0xa6/0xb0 [ 161.712228] kasan_atomics+0x91/0x2d0 [kasan_test] [ 161.717694] kunit_try_run_case+0x175/0x440 [ 161.722549] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 161.728612] kthread+0x3b4/0x780 [ 161.732514] ret_from_fork+0x30/0x70 [ 161.736765] ret_from_fork_asm+0x1a/0x30 [ 161.743532] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 161.757199] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 161.773560] The buggy address belongs to the physical page: [ 161.779794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 161.788450] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 161.796070] page_type: f5(slab) [ 161.799898] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 161.808295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 161.816691] page dumped because: kasan: bad access detected [ 161.825101] Memory state around the buggy address: [ 161.830559] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 161.838437] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 161.846312] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 161.854190] ^ [ 161.859645] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 161.867523] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 161.875400] ================================================================== [ 161.883321] ================================================================== [ 161.891205] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b0b/0x5400 [kasan_test] [ 161.900387] Write of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 161.910702] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 161.910707] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 161.910709] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 161.910710] Call Trace: [ 161.910712] [ 161.910713] dump_stack_lvl+0x4f/0x70 [ 161.910717] print_address_description.constprop.0+0x2c/0x3b0 [ 161.910721] ? kasan_atomics_helper+0x4b0b/0x5400 [kasan_test] [ 161.910730] print_report+0xb9/0x280 [ 161.910733] ? kasan_atomics_helper+0x4b0b/0x5400 [kasan_test] [ 161.910741] ? kasan_addr_to_slab+0x9/0x90 [ 161.910744] ? kasan_atomics_helper+0x4b0b/0x5400 [kasan_test] [ 161.910752] kasan_report+0xda/0x110 [ 161.910755] ? kasan_atomics_helper+0x4b0b/0x5400 [kasan_test] [ 161.910764] kasan_atomics_helper+0x4b0b/0x5400 [kasan_test] [ 161.910773] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 161.910781] ? __kasan_slab_alloc+0x4a/0x90 [ 161.910784] ? __kmalloc_cache_noprof+0x158/0x430 [ 161.910787] ? pick_next_task_fair+0x51/0xba0 [ 161.910791] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 161.910800] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 161.910808] ? __schedule+0x757/0x1420 [ 161.910811] ? __pfx_read_tsc+0x10/0x10 [ 161.910813] ? ktime_get_ts64+0x7f/0x220 [ 161.910816] kunit_try_run_case+0x175/0x440 [ 161.910819] ? __pfx_kunit_try_run_case+0x10/0x10 [ 161.910822] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 161.910826] ? __pfx_kunit_try_run_case+0x10/0x10 [ 161.910828] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 161.910831] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 161.910834] kthread+0x3b4/0x780 [ 161.910837] ? __pfx_kthread+0x10/0x10 [ 161.910840] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 161.910844] ? __pfx_kthread+0x10/0x10 [ 161.910847] ret_from_fork+0x30/0x70 [ 161.910850] ? __pfx_kthread+0x10/0x10 [ 161.910853] ret_from_fork_asm+0x1a/0x30 [ 161.910857] [ 162.118485] Allocated by task 3930: [ 162.122650] kasan_save_stack+0x1c/0x40 [ 162.127159] kasan_save_track+0x10/0x30 [ 162.131669] __kasan_kmalloc+0xa6/0xb0 [ 162.136095] kasan_atomics+0x91/0x2d0 [kasan_test] [ 162.141564] kunit_try_run_case+0x175/0x440 [ 162.146419] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 162.152484] kthread+0x3b4/0x780 [ 162.156391] ret_from_fork+0x30/0x70 [ 162.160643] ret_from_fork_asm+0x1a/0x30 [ 162.167414] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 162.181090] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 162.197454] The buggy address belongs to the physical page: [ 162.203692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 162.212352] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 162.219974] page_type: f5(slab) [ 162.223795] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 162.232195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 162.240593] page dumped because: kasan: bad access detected [ 162.249002] Memory state around the buggy address: [ 162.254463] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 162.262345] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 162.270226] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 162.278105] ^ [ 162.283567] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 162.291449] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 162.299329] ================================================================== [ 162.307221] ================================================================== [ 162.315123] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x543/0x5400 [kasan_test] [ 162.324220] Write of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 162.334538] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 162.334543] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 162.334545] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 162.334546] Call Trace: [ 162.334548] [ 162.334549] dump_stack_lvl+0x4f/0x70 [ 162.334553] print_address_description.constprop.0+0x2c/0x3b0 [ 162.334557] ? kasan_atomics_helper+0x543/0x5400 [kasan_test] [ 162.334565] print_report+0xb9/0x280 [ 162.334569] ? kasan_atomics_helper+0x543/0x5400 [kasan_test] [ 162.334576] ? kasan_addr_to_slab+0x9/0x90 [ 162.334580] ? kasan_atomics_helper+0x543/0x5400 [kasan_test] [ 162.334587] kasan_report+0xda/0x110 [ 162.334591] ? kasan_atomics_helper+0x543/0x5400 [kasan_test] [ 162.334599] kasan_check_range+0xfc/0x1b0 [ 162.334602] kasan_atomics_helper+0x543/0x5400 [kasan_test] [ 162.334611] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 162.334619] ? __kasan_slab_alloc+0x4a/0x90 [ 162.334622] ? __kmalloc_cache_noprof+0x158/0x430 [ 162.334625] ? pick_next_task_fair+0x51/0xba0 [ 162.334629] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 162.334638] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 162.334646] ? __schedule+0x757/0x1420 [ 162.334649] ? __pfx_read_tsc+0x10/0x10 [ 162.334651] ? ktime_get_ts64+0x7f/0x220 [ 162.334654] kunit_try_run_case+0x175/0x440 [ 162.334657] ? __pfx_kunit_try_run_case+0x10/0x10 [ 162.334660] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 162.334663] ? __pfx_kunit_try_run_case+0x10/0x10 [ 162.334665] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 162.334669] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 162.334672] kthread+0x3b4/0x780 [ 162.334675] ? __pfx_kthread+0x10/0x10 [ 162.334678] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 162.334681] ? __pfx_kthread+0x10/0x10 [ 162.334684] ret_from_fork+0x30/0x70 [ 162.334687] ? __pfx_kthread+0x10/0x10 [ 162.334690] ret_from_fork_asm+0x1a/0x30 [ 162.334695] [ 162.546672] Allocated by task 3930: [ 162.550838] kasan_save_stack+0x1c/0x40 [ 162.555348] kasan_save_track+0x10/0x30 [ 162.559861] __kasan_kmalloc+0xa6/0xb0 [ 162.564284] kasan_atomics+0x91/0x2d0 [kasan_test] [ 162.569750] kunit_try_run_case+0x175/0x440 [ 162.574606] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 162.580674] kthread+0x3b4/0x780 [ 162.584579] ret_from_fork+0x30/0x70 [ 162.588829] ret_from_fork_asm+0x1a/0x30 [ 162.595598] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 162.609265] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 162.625630] The buggy address belongs to the physical page: [ 162.631866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 162.640521] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 162.648142] page_type: f5(slab) [ 162.651961] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 162.660362] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 162.668758] page dumped because: kasan: bad access detected [ 162.677168] Memory state around the buggy address: [ 162.682630] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 162.690512] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 162.698390] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 162.706269] ^ [ 162.711732] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 162.719611] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 162.727491] ================================================================== [ 162.735383] ================================================================== [ 162.743278] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5da/0x5400 [kasan_test] [ 162.752376] Write of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 162.762691] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 162.762696] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 162.762698] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 162.762700] Call Trace: [ 162.762701] [ 162.762702] dump_stack_lvl+0x4f/0x70 [ 162.762706] print_address_description.constprop.0+0x2c/0x3b0 [ 162.762710] ? kasan_atomics_helper+0x5da/0x5400 [kasan_test] [ 162.762719] print_report+0xb9/0x280 [ 162.762722] ? kasan_atomics_helper+0x5da/0x5400 [kasan_test] [ 162.762730] ? kasan_addr_to_slab+0x9/0x90 [ 162.762733] ? kasan_atomics_helper+0x5da/0x5400 [kasan_test] [ 162.762741] kasan_report+0xda/0x110 [ 162.762745] ? kasan_atomics_helper+0x5da/0x5400 [kasan_test] [ 162.762753] kasan_check_range+0xfc/0x1b0 [ 162.762756] kasan_atomics_helper+0x5da/0x5400 [kasan_test] [ 162.762765] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 162.762773] ? __kasan_slab_alloc+0x4a/0x90 [ 162.762776] ? __kmalloc_cache_noprof+0x158/0x430 [ 162.762779] ? pick_next_task_fair+0x51/0xba0 [ 162.762783] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 162.762791] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 162.762800] ? __schedule+0x757/0x1420 [ 162.762802] ? __pfx_read_tsc+0x10/0x10 [ 162.762805] ? ktime_get_ts64+0x7f/0x220 [ 162.762808] kunit_try_run_case+0x175/0x440 [ 162.762811] ? __pfx_kunit_try_run_case+0x10/0x10 [ 162.762813] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 162.762817] ? __pfx_kunit_try_run_case+0x10/0x10 [ 162.762819] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 162.762822] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 162.762825] kthread+0x3b4/0x780 [ 162.762829] ? __pfx_kthread+0x10/0x10 [ 162.762832] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 162.762835] ? __pfx_kthread+0x10/0x10 [ 162.762838] ret_from_fork+0x30/0x70 [ 162.762841] ? __pfx_kthread+0x10/0x10 [ 162.762844] ret_from_fork_asm+0x1a/0x30 [ 162.762848] [ 162.974789] Allocated by task 3930: [ 162.978953] kasan_save_stack+0x1c/0x40 [ 162.983465] kasan_save_track+0x10/0x30 [ 162.987977] __kasan_kmalloc+0xa6/0xb0 [ 162.992398] kasan_atomics+0x91/0x2d0 [kasan_test] [ 162.997867] kunit_try_run_case+0x175/0x440 [ 163.002724] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 163.008788] kthread+0x3b4/0x780 [ 163.012692] ret_from_fork+0x30/0x70 [ 163.016941] ret_from_fork_asm+0x1a/0x30 [ 163.023712] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 163.037387] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 163.053752] The buggy address belongs to the physical page: [ 163.059989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 163.068649] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 163.076268] page_type: f5(slab) [ 163.080087] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 163.088487] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 163.096885] page dumped because: kasan: bad access detected [ 163.105297] Memory state around the buggy address: [ 163.110758] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 163.118638] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 163.126518] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 163.134397] ^ [ 163.139857] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 163.147739] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 163.155618] ================================================================== [ 163.163538] ================================================================== [ 163.171423] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x671/0x5400 [kasan_test] [ 163.180520] Write of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 163.190835] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 163.190840] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 163.190842] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 163.190844] Call Trace: [ 163.190845] [ 163.190846] dump_stack_lvl+0x4f/0x70 [ 163.190850] print_address_description.constprop.0+0x2c/0x3b0 [ 163.190854] ? kasan_atomics_helper+0x671/0x5400 [kasan_test] [ 163.190862] print_report+0xb9/0x280 [ 163.190866] ? kasan_atomics_helper+0x671/0x5400 [kasan_test] [ 163.190874] ? kasan_addr_to_slab+0x9/0x90 [ 163.190877] ? kasan_atomics_helper+0x671/0x5400 [kasan_test] [ 163.190885] kasan_report+0xda/0x110 [ 163.190889] ? kasan_atomics_helper+0x671/0x5400 [kasan_test] [ 163.190897] kasan_check_range+0xfc/0x1b0 [ 163.190900] kasan_atomics_helper+0x671/0x5400 [kasan_test] [ 163.190909] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 163.190917] ? __kasan_slab_alloc+0x4a/0x90 [ 163.190920] ? __kmalloc_cache_noprof+0x158/0x430 [ 163.190923] ? pick_next_task_fair+0x51/0xba0 [ 163.190927] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 163.190936] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 163.190944] ? __schedule+0x757/0x1420 [ 163.190946] ? __pfx_read_tsc+0x10/0x10 [ 163.190949] ? ktime_get_ts64+0x7f/0x220 [ 163.190952] kunit_try_run_case+0x175/0x440 [ 163.190955] ? __pfx_kunit_try_run_case+0x10/0x10 [ 163.190957] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 163.190961] ? __pfx_kunit_try_run_case+0x10/0x10 [ 163.190963] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 163.190966] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 163.190970] kthread+0x3b4/0x780 [ 163.190973] ? __pfx_kthread+0x10/0x10 [ 163.190976] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 163.190979] ? __pfx_kthread+0x10/0x10 [ 163.190982] ret_from_fork+0x30/0x70 [ 163.190985] ? __pfx_kthread+0x10/0x10 [ 163.190988] ret_from_fork_asm+0x1a/0x30 [ 163.190992] [ 163.402871] Allocated by task 3930: [ 163.407036] kasan_save_stack+0x1c/0x40 [ 163.411546] kasan_save_track+0x10/0x30 [ 163.416063] __kasan_kmalloc+0xa6/0xb0 [ 163.420495] kasan_atomics+0x91/0x2d0 [kasan_test] [ 163.425958] kunit_try_run_case+0x175/0x440 [ 163.430814] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 163.436880] kthread+0x3b4/0x780 [ 163.440786] ret_from_fork+0x30/0x70 [ 163.445038] ret_from_fork_asm+0x1a/0x30 [ 163.451807] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 163.465477] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 163.481836] The buggy address belongs to the physical page: [ 163.488081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 163.496737] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 163.504356] page_type: f5(slab) [ 163.508172] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 163.516568] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 163.524964] page dumped because: kasan: bad access detected [ 163.533375] Memory state around the buggy address: [ 163.538833] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 163.546710] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 163.554587] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 163.562463] ^ [ 163.567920] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 163.575797] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 163.583673] ================================================================== [ 163.591567] ================================================================== [ 163.599464] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x707/0x5400 [kasan_test] [ 163.608559] Write of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 163.618871] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 163.618876] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 163.618877] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 163.618879] Call Trace: [ 163.618880] [ 163.618882] dump_stack_lvl+0x4f/0x70 [ 163.618885] print_address_description.constprop.0+0x2c/0x3b0 [ 163.618889] ? kasan_atomics_helper+0x707/0x5400 [kasan_test] [ 163.618897] print_report+0xb9/0x280 [ 163.618901] ? kasan_atomics_helper+0x707/0x5400 [kasan_test] [ 163.618909] ? kasan_addr_to_slab+0x9/0x90 [ 163.618912] ? kasan_atomics_helper+0x707/0x5400 [kasan_test] [ 163.618920] kasan_report+0xda/0x110 [ 163.618924] ? kasan_atomics_helper+0x707/0x5400 [kasan_test] [ 163.618932] kasan_check_range+0xfc/0x1b0 [ 163.618935] kasan_atomics_helper+0x707/0x5400 [kasan_test] [ 163.618944] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 163.618951] ? __kasan_slab_alloc+0x4a/0x90 [ 163.618955] ? __kmalloc_cache_noprof+0x158/0x430 [ 163.618957] ? pick_next_task_fair+0x51/0xba0 [ 163.618961] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 163.618970] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 163.618978] ? __schedule+0x757/0x1420 [ 163.618981] ? __pfx_read_tsc+0x10/0x10 [ 163.618983] ? ktime_get_ts64+0x7f/0x220 [ 163.618987] kunit_try_run_case+0x175/0x440 [ 163.618989] ? __pfx_kunit_try_run_case+0x10/0x10 [ 163.618992] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 163.618995] ? __pfx_kunit_try_run_case+0x10/0x10 [ 163.618997] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 163.619000] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 163.619003] kthread+0x3b4/0x780 [ 163.619007] ? __pfx_kthread+0x10/0x10 [ 163.619010] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 163.619013] ? __pfx_kthread+0x10/0x10 [ 163.619016] ret_from_fork+0x30/0x70 [ 163.619030] ? __pfx_kthread+0x10/0x10 [ 163.619033] ret_from_fork_asm+0x1a/0x30 [ 163.619038] [ 163.830947] Allocated by task 3930: [ 163.835108] kasan_save_stack+0x1c/0x40 [ 163.839617] kasan_save_track+0x10/0x30 [ 163.844127] __kasan_kmalloc+0xa6/0xb0 [ 163.848551] kasan_atomics+0x91/0x2d0 [kasan_test] [ 163.854018] kunit_try_run_case+0x175/0x440 [ 163.858884] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 163.864950] kthread+0x3b4/0x780 [ 163.868855] ret_from_fork+0x30/0x70 [ 163.873105] ret_from_fork_asm+0x1a/0x30 [ 163.879876] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 163.893546] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 163.909910] The buggy address belongs to the physical page: [ 163.916144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 163.924801] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 163.932422] page_type: f5(slab) [ 163.936241] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 163.944638] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 163.953037] page dumped because: kasan: bad access detected [ 163.961448] Memory state around the buggy address: [ 163.966905] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 163.974786] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 163.982664] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 163.990542] ^ [ 163.996002] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 164.003879] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 164.011756] ================================================================== [ 164.019667] ================================================================== [ 164.027550] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x79d/0x5400 [kasan_test] [ 164.036647] Write of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 164.046963] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 164.046969] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 164.046970] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 164.046972] Call Trace: [ 164.046973] [ 164.046975] dump_stack_lvl+0x4f/0x70 [ 164.046978] print_address_description.constprop.0+0x2c/0x3b0 [ 164.046982] ? kasan_atomics_helper+0x79d/0x5400 [kasan_test] [ 164.046991] print_report+0xb9/0x280 [ 164.046994] ? kasan_atomics_helper+0x79d/0x5400 [kasan_test] [ 164.047003] ? kasan_addr_to_slab+0x9/0x90 [ 164.047006] ? kasan_atomics_helper+0x79d/0x5400 [kasan_test] [ 164.047014] kasan_report+0xda/0x110 [ 164.047017] ? kasan_atomics_helper+0x79d/0x5400 [kasan_test] [ 164.047038] kasan_check_range+0xfc/0x1b0 [ 164.047041] kasan_atomics_helper+0x79d/0x5400 [kasan_test] [ 164.047060] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 164.047068] ? __kasan_slab_alloc+0x4a/0x90 [ 164.047080] ? __kmalloc_cache_noprof+0x158/0x430 [ 164.047083] ? pick_next_task_fair+0x51/0xba0 [ 164.047087] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 164.047096] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 164.047104] ? __schedule+0x757/0x1420 [ 164.047107] ? __pfx_read_tsc+0x10/0x10 [ 164.047110] ? ktime_get_ts64+0x7f/0x220 [ 164.047113] kunit_try_run_case+0x175/0x440 [ 164.047116] ? __pfx_kunit_try_run_case+0x10/0x10 [ 164.047119] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 164.047122] ? __pfx_kunit_try_run_case+0x10/0x10 [ 164.047124] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 164.047128] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 164.047131] kthread+0x3b4/0x780 [ 164.047134] ? __pfx_kthread+0x10/0x10 [ 164.047137] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 164.047140] ? __pfx_kthread+0x10/0x10 [ 164.047144] ret_from_fork+0x30/0x70 [ 164.047146] ? __pfx_kthread+0x10/0x10 [ 164.047149] ret_from_fork_asm+0x1a/0x30 [ 164.047154] [ 164.259050] Allocated by task 3930: [ 164.263222] kasan_save_stack+0x1c/0x40 [ 164.267733] kasan_save_track+0x10/0x30 [ 164.272241] __kasan_kmalloc+0xa6/0xb0 [ 164.276666] kasan_atomics+0x91/0x2d0 [kasan_test] [ 164.282131] kunit_try_run_case+0x175/0x440 [ 164.286988] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 164.293064] kthread+0x3b4/0x780 [ 164.296978] ret_from_fork+0x30/0x70 [ 164.301228] ret_from_fork_asm+0x1a/0x30 [ 164.307999] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 164.321668] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 164.338036] The buggy address belongs to the physical page: [ 164.344273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 164.352927] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 164.360545] page_type: f5(slab) [ 164.364363] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 164.372760] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 164.381156] page dumped because: kasan: bad access detected [ 164.389566] Memory state around the buggy address: [ 164.395033] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 164.402912] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 164.410791] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 164.418669] ^ [ 164.424129] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 164.432008] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 164.439886] ================================================================== [ 164.447851] ================================================================== [ 164.455735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x834/0x5400 [kasan_test] [ 164.464830] Write of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 164.475143] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 164.475149] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 164.475150] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 164.475152] Call Trace: [ 164.475153] [ 164.475155] dump_stack_lvl+0x4f/0x70 [ 164.475158] print_address_description.constprop.0+0x2c/0x3b0 [ 164.475163] ? kasan_atomics_helper+0x834/0x5400 [kasan_test] [ 164.475171] print_report+0xb9/0x280 [ 164.475174] ? kasan_atomics_helper+0x834/0x5400 [kasan_test] [ 164.475182] ? kasan_addr_to_slab+0x9/0x90 [ 164.475185] ? kasan_atomics_helper+0x834/0x5400 [kasan_test] [ 164.475193] kasan_report+0xda/0x110 [ 164.475197] ? kasan_atomics_helper+0x834/0x5400 [kasan_test] [ 164.475205] kasan_check_range+0xfc/0x1b0 [ 164.475208] kasan_atomics_helper+0x834/0x5400 [kasan_test] [ 164.475217] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 164.475224] ? __kasan_slab_alloc+0x4a/0x90 [ 164.475228] ? __kmalloc_cache_noprof+0x158/0x430 [ 164.475230] ? pick_next_task_fair+0x51/0xba0 [ 164.475234] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 164.475243] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 164.475252] ? __schedule+0x757/0x1420 [ 164.475255] ? __pfx_read_tsc+0x10/0x10 [ 164.475257] ? ktime_get_ts64+0x7f/0x220 [ 164.475260] kunit_try_run_case+0x175/0x440 [ 164.475263] ? __pfx_kunit_try_run_case+0x10/0x10 [ 164.475265] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 164.475269] ? __pfx_kunit_try_run_case+0x10/0x10 [ 164.475271] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 164.475274] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 164.475277] kthread+0x3b4/0x780 [ 164.475280] ? __pfx_kthread+0x10/0x10 [ 164.475283] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 164.475287] ? __pfx_kthread+0x10/0x10 [ 164.475290] ret_from_fork+0x30/0x70 [ 164.475293] ? __pfx_kthread+0x10/0x10 [ 164.475296] ret_from_fork_asm+0x1a/0x30 [ 164.475300] [ 164.687217] Allocated by task 3930: [ 164.691378] kasan_save_stack+0x1c/0x40 [ 164.695890] kasan_save_track+0x10/0x30 [ 164.700399] __kasan_kmalloc+0xa6/0xb0 [ 164.704822] kasan_atomics+0x91/0x2d0 [kasan_test] [ 164.710288] kunit_try_run_case+0x175/0x440 [ 164.715144] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 164.721210] kthread+0x3b4/0x780 [ 164.725115] ret_from_fork+0x30/0x70 [ 164.729366] ret_from_fork_asm+0x1a/0x30 [ 164.736139] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 164.749810] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 164.766176] The buggy address belongs to the physical page: [ 164.772414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 164.781081] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 164.788701] page_type: f5(slab) [ 164.792518] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 164.800918] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 164.809319] page dumped because: kasan: bad access detected [ 164.817731] Memory state around the buggy address: [ 164.823189] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 164.831069] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 164.838961] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 164.846840] ^ [ 164.852301] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 164.860181] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 164.868071] ================================================================== [ 164.875974] ================================================================== [ 164.883876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8cb/0x5400 [kasan_test] [ 164.892973] Write of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 164.903288] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 164.903294] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 164.903295] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 164.903297] Call Trace: [ 164.903298] [ 164.903300] dump_stack_lvl+0x4f/0x70 [ 164.903303] print_address_description.constprop.0+0x2c/0x3b0 [ 164.903307] ? kasan_atomics_helper+0x8cb/0x5400 [kasan_test] [ 164.903316] print_report+0xb9/0x280 [ 164.903319] ? kasan_atomics_helper+0x8cb/0x5400 [kasan_test] [ 164.903327] ? kasan_addr_to_slab+0x9/0x90 [ 164.903330] ? kasan_atomics_helper+0x8cb/0x5400 [kasan_test] [ 164.903338] kasan_report+0xda/0x110 [ 164.903342] ? kasan_atomics_helper+0x8cb/0x5400 [kasan_test] [ 164.903350] kasan_check_range+0xfc/0x1b0 [ 164.903353] kasan_atomics_helper+0x8cb/0x5400 [kasan_test] [ 164.903362] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 164.903370] ? __kasan_slab_alloc+0x4a/0x90 [ 164.903373] ? __kmalloc_cache_noprof+0x158/0x430 [ 164.903376] ? pick_next_task_fair+0x51/0xba0 [ 164.903380] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 164.903389] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 164.903397] ? __schedule+0x757/0x1420 [ 164.903400] ? __pfx_read_tsc+0x10/0x10 [ 164.903403] ? ktime_get_ts64+0x7f/0x220 [ 164.903406] kunit_try_run_case+0x175/0x440 [ 164.903409] ? __pfx_kunit_try_run_case+0x10/0x10 [ 164.903412] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 164.903415] ? __pfx_kunit_try_run_case+0x10/0x10 [ 164.903417] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 164.903421] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 164.903424] kthread+0x3b4/0x780 [ 164.903427] ? __pfx_kthread+0x10/0x10 [ 164.903430] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 164.903434] ? __pfx_kthread+0x10/0x10 [ 164.903437] ret_from_fork+0x30/0x70 [ 164.903440] ? __pfx_kthread+0x10/0x10 [ 164.903443] ret_from_fork_asm+0x1a/0x30 [ 164.903447] [ 165.115381] Allocated by task 3930: [ 165.119544] kasan_save_stack+0x1c/0x40 [ 165.124063] kasan_save_track+0x10/0x30 [ 165.128582] __kasan_kmalloc+0xa6/0xb0 [ 165.133007] kasan_atomics+0x91/0x2d0 [kasan_test] [ 165.138483] kunit_try_run_case+0x175/0x440 [ 165.143339] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 165.149405] kthread+0x3b4/0x780 [ 165.153310] ret_from_fork+0x30/0x70 [ 165.157560] ret_from_fork_asm+0x1a/0x30 [ 165.164332] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 165.178000] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 165.194365] The buggy address belongs to the physical page: [ 165.200602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 165.209259] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 165.216881] page_type: f5(slab) [ 165.220699] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 165.229099] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 165.237496] page dumped because: kasan: bad access detected [ 165.245910] Memory state around the buggy address: [ 165.251370] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 165.259250] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 165.267131] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 165.275012] ^ [ 165.280483] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 165.288365] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 165.296243] ================================================================== [ 165.304136] ================================================================== [ 165.312037] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x962/0x5400 [kasan_test] [ 165.321144] Write of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 165.331458] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 165.331464] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 165.331465] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 165.331467] Call Trace: [ 165.331468] [ 165.331469] dump_stack_lvl+0x4f/0x70 [ 165.331473] print_address_description.constprop.0+0x2c/0x3b0 [ 165.331477] ? kasan_atomics_helper+0x962/0x5400 [kasan_test] [ 165.331485] print_report+0xb9/0x280 [ 165.331489] ? kasan_atomics_helper+0x962/0x5400 [kasan_test] [ 165.331497] ? kasan_addr_to_slab+0x9/0x90 [ 165.331500] ? kasan_atomics_helper+0x962/0x5400 [kasan_test] [ 165.331508] kasan_report+0xda/0x110 [ 165.331511] ? kasan_atomics_helper+0x962/0x5400 [kasan_test] [ 165.331520] kasan_check_range+0xfc/0x1b0 [ 165.331523] kasan_atomics_helper+0x962/0x5400 [kasan_test] [ 165.331531] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 165.331539] ? __kasan_slab_alloc+0x4a/0x90 [ 165.331542] ? __kmalloc_cache_noprof+0x158/0x430 [ 165.331545] ? pick_next_task_fair+0x51/0xba0 [ 165.331549] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 165.331558] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 165.331566] ? __schedule+0x757/0x1420 [ 165.331568] ? __pfx_read_tsc+0x10/0x10 [ 165.331571] ? ktime_get_ts64+0x7f/0x220 [ 165.331574] kunit_try_run_case+0x175/0x440 [ 165.331577] ? __pfx_kunit_try_run_case+0x10/0x10 [ 165.331579] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 165.331583] ? __pfx_kunit_try_run_case+0x10/0x10 [ 165.331585] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 165.331588] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 165.331591] kthread+0x3b4/0x780 [ 165.331594] ? __pfx_kthread+0x10/0x10 [ 165.331597] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 165.331601] ? __pfx_kthread+0x10/0x10 [ 165.331604] ret_from_fork+0x30/0x70 [ 165.331607] ? __pfx_kthread+0x10/0x10 [ 165.331610] ret_from_fork_asm+0x1a/0x30 [ 165.331614] [ 165.543555] Allocated by task 3930: [ 165.547717] kasan_save_stack+0x1c/0x40 [ 165.552228] kasan_save_track+0x10/0x30 [ 165.556737] __kasan_kmalloc+0xa6/0xb0 [ 165.561161] kasan_atomics+0x91/0x2d0 [kasan_test] [ 165.566626] kunit_try_run_case+0x175/0x440 [ 165.571480] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 165.577546] kthread+0x3b4/0x780 [ 165.581451] ret_from_fork+0x30/0x70 [ 165.585699] ret_from_fork_asm+0x1a/0x30 [ 165.592469] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 165.606141] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 165.622509] The buggy address belongs to the physical page: [ 165.628746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 165.637403] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 165.645036] page_type: f5(slab) [ 165.648854] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 165.657253] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 165.665650] page dumped because: kasan: bad access detected [ 165.674068] Memory state around the buggy address: [ 165.679538] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 165.687417] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 165.695296] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 165.703178] ^ [ 165.708635] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 165.716515] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 165.724395] ================================================================== [ 165.732287] ================================================================== [ 165.740187] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x9f9/0x5400 [kasan_test] [ 165.749283] Write of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 165.759597] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 165.759602] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 165.759603] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 165.759605] Call Trace: [ 165.759606] [ 165.759607] dump_stack_lvl+0x4f/0x70 [ 165.759611] print_address_description.constprop.0+0x2c/0x3b0 [ 165.759615] ? kasan_atomics_helper+0x9f9/0x5400 [kasan_test] [ 165.759623] print_report+0xb9/0x280 [ 165.759626] ? kasan_atomics_helper+0x9f9/0x5400 [kasan_test] [ 165.759634] ? kasan_addr_to_slab+0x9/0x90 [ 165.759637] ? kasan_atomics_helper+0x9f9/0x5400 [kasan_test] [ 165.759645] kasan_report+0xda/0x110 [ 165.759648] ? kasan_atomics_helper+0x9f9/0x5400 [kasan_test] [ 165.759657] kasan_check_range+0xfc/0x1b0 [ 165.759660] kasan_atomics_helper+0x9f9/0x5400 [kasan_test] [ 165.759668] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 165.759676] ? __kasan_slab_alloc+0x4a/0x90 [ 165.759680] ? __kmalloc_cache_noprof+0x158/0x430 [ 165.759682] ? pick_next_task_fair+0x51/0xba0 [ 165.759686] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 165.759695] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 165.759703] ? __schedule+0x757/0x1420 [ 165.759706] ? __pfx_read_tsc+0x10/0x10 [ 165.759709] ? ktime_get_ts64+0x7f/0x220 [ 165.759711] kunit_try_run_case+0x175/0x440 [ 165.759714] ? __pfx_kunit_try_run_case+0x10/0x10 [ 165.759717] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 165.759720] ? __pfx_kunit_try_run_case+0x10/0x10 [ 165.759722] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 165.759726] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 165.759729] kthread+0x3b4/0x780 [ 165.759732] ? __pfx_kthread+0x10/0x10 [ 165.759735] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 165.759738] ? __pfx_kthread+0x10/0x10 [ 165.759741] ret_from_fork+0x30/0x70 [ 165.759744] ? __pfx_kthread+0x10/0x10 [ 165.759747] ret_from_fork_asm+0x1a/0x30 [ 165.759751] [ 165.971734] Allocated by task 3930: [ 165.975898] kasan_save_stack+0x1c/0x40 [ 165.980410] kasan_save_track+0x10/0x30 [ 165.984919] __kasan_kmalloc+0xa6/0xb0 [ 165.989343] kasan_atomics+0x91/0x2d0 [kasan_test] [ 165.994808] kunit_try_run_case+0x175/0x440 [ 165.999665] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 166.005731] kthread+0x3b4/0x780 [ 166.009636] ret_from_fork+0x30/0x70 [ 166.013887] ret_from_fork_asm+0x1a/0x30 [ 166.020660] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 166.034332] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 166.050699] The buggy address belongs to the physical page: [ 166.056937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 166.065597] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 166.073220] page_type: f5(slab) [ 166.077037] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 166.085437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 166.093838] page dumped because: kasan: bad access detected [ 166.102272] Memory state around the buggy address: [ 166.107733] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 166.115611] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 166.123491] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 166.131370] ^ [ 166.136829] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 166.144706] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 166.152586] ================================================================== [ 166.160510] ================================================================== [ 166.168391] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa93/0x5400 [kasan_test] [ 166.177487] Write of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 166.187800] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 166.187806] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 166.187808] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 166.187810] Call Trace: [ 166.187811] [ 166.187813] dump_stack_lvl+0x4f/0x70 [ 166.187817] print_address_description.constprop.0+0x2c/0x3b0 [ 166.187821] ? kasan_atomics_helper+0xa93/0x5400 [kasan_test] [ 166.187830] print_report+0xb9/0x280 [ 166.187833] ? kasan_atomics_helper+0xa93/0x5400 [kasan_test] [ 166.187841] ? kasan_addr_to_slab+0x9/0x90 [ 166.187844] ? kasan_atomics_helper+0xa93/0x5400 [kasan_test] [ 166.187852] kasan_report+0xda/0x110 [ 166.187856] ? kasan_atomics_helper+0xa93/0x5400 [kasan_test] [ 166.187864] kasan_check_range+0xfc/0x1b0 [ 166.187867] kasan_atomics_helper+0xa93/0x5400 [kasan_test] [ 166.187876] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 166.187884] ? __kasan_slab_alloc+0x4a/0x90 [ 166.187887] ? __kmalloc_cache_noprof+0x158/0x430 [ 166.187890] ? pick_next_task_fair+0x51/0xba0 [ 166.187895] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 166.187904] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 166.187912] ? __schedule+0x757/0x1420 [ 166.187915] ? __pfx_read_tsc+0x10/0x10 [ 166.187919] ? ktime_get_ts64+0x7f/0x220 [ 166.187922] kunit_try_run_case+0x175/0x440 [ 166.187925] ? __pfx_kunit_try_run_case+0x10/0x10 [ 166.187928] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 166.187931] ? __pfx_kunit_try_run_case+0x10/0x10 [ 166.187933] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 166.187937] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 166.187940] kthread+0x3b4/0x780 [ 166.187943] ? __pfx_kthread+0x10/0x10 [ 166.187946] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 166.187949] ? __pfx_kthread+0x10/0x10 [ 166.187952] ret_from_fork+0x30/0x70 [ 166.187956] ? __pfx_kthread+0x10/0x10 [ 166.187959] ret_from_fork_asm+0x1a/0x30 [ 166.187963] [ 166.399841] Allocated by task 3930: [ 166.404001] kasan_save_stack+0x1c/0x40 [ 166.408510] kasan_save_track+0x10/0x30 [ 166.413030] __kasan_kmalloc+0xa6/0xb0 [ 166.417454] kasan_atomics+0x91/0x2d0 [kasan_test] [ 166.422919] kunit_try_run_case+0x175/0x440 [ 166.427772] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 166.433835] kthread+0x3b4/0x780 [ 166.437739] ret_from_fork+0x30/0x70 [ 166.441990] ret_from_fork_asm+0x1a/0x30 [ 166.448760] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 166.462432] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 166.478795] The buggy address belongs to the physical page: [ 166.485039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 166.493698] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 166.501319] page_type: f5(slab) [ 166.505136] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 166.513535] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 166.521932] page dumped because: kasan: bad access detected [ 166.530342] Memory state around the buggy address: [ 166.535800] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 166.543678] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 166.551557] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 166.559436] ^ [ 166.564893] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 166.572769] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 166.580647] ================================================================== [ 166.588560] ================================================================== [ 166.596442] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb34/0x5400 [kasan_test] [ 166.605539] Write of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 166.615854] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 166.615859] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 166.615860] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 166.615862] Call Trace: [ 166.615864] [ 166.615865] dump_stack_lvl+0x4f/0x70 [ 166.615869] print_address_description.constprop.0+0x2c/0x3b0 [ 166.615873] ? kasan_atomics_helper+0xb34/0x5400 [kasan_test] [ 166.615881] print_report+0xb9/0x280 [ 166.615885] ? kasan_atomics_helper+0xb34/0x5400 [kasan_test] [ 166.615893] ? kasan_addr_to_slab+0x9/0x90 [ 166.615896] ? kasan_atomics_helper+0xb34/0x5400 [kasan_test] [ 166.615904] kasan_report+0xda/0x110 [ 166.615908] ? kasan_atomics_helper+0xb34/0x5400 [kasan_test] [ 166.615916] kasan_check_range+0xfc/0x1b0 [ 166.615919] kasan_atomics_helper+0xb34/0x5400 [kasan_test] [ 166.615928] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 166.615935] ? __kasan_slab_alloc+0x4a/0x90 [ 166.615938] ? __kmalloc_cache_noprof+0x158/0x430 [ 166.615941] ? pick_next_task_fair+0x51/0xba0 [ 166.615945] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 166.615955] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 166.615963] ? __schedule+0x757/0x1420 [ 166.615966] ? __pfx_read_tsc+0x10/0x10 [ 166.615969] ? ktime_get_ts64+0x7f/0x220 [ 166.615973] kunit_try_run_case+0x175/0x440 [ 166.615975] ? __pfx_kunit_try_run_case+0x10/0x10 [ 166.615978] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 166.615982] ? __pfx_kunit_try_run_case+0x10/0x10 [ 166.615984] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 166.615987] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 166.615990] kthread+0x3b4/0x780 [ 166.615993] ? __pfx_kthread+0x10/0x10 [ 166.615996] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 166.616000] ? __pfx_kthread+0x10/0x10 [ 166.616003] ret_from_fork+0x30/0x70 [ 166.616006] ? __pfx_kthread+0x10/0x10 [ 166.616009] ret_from_fork_asm+0x1a/0x30 [ 166.616013] [ 166.827951] Allocated by task 3930: [ 166.832112] kasan_save_stack+0x1c/0x40 [ 166.836622] kasan_save_track+0x10/0x30 [ 166.841130] __kasan_kmalloc+0xa6/0xb0 [ 166.845563] kasan_atomics+0x91/0x2d0 [kasan_test] [ 166.851038] kunit_try_run_case+0x175/0x440 [ 166.855891] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 166.861955] kthread+0x3b4/0x780 [ 166.865861] ret_from_fork+0x30/0x70 [ 166.870113] ret_from_fork_asm+0x1a/0x30 [ 166.876883] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 166.890551] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 166.906910] The buggy address belongs to the physical page: [ 166.913145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 166.921802] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 166.929420] page_type: f5(slab) [ 166.933237] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 166.941633] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 166.950038] page dumped because: kasan: bad access detected [ 166.958446] Memory state around the buggy address: [ 166.963904] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 166.971782] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 166.979658] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 166.987534] ^ [ 166.992991] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 167.000868] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 167.008744] ================================================================== [ 167.016639] ================================================================== [ 167.024539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc1d/0x5400 [kasan_test] [ 167.033636] Write of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 167.043952] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 167.043957] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 167.043959] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 167.043960] Call Trace: [ 167.043962] [ 167.043963] dump_stack_lvl+0x4f/0x70 [ 167.043967] print_address_description.constprop.0+0x2c/0x3b0 [ 167.043972] ? kasan_atomics_helper+0xc1d/0x5400 [kasan_test] [ 167.043980] print_report+0xb9/0x280 [ 167.043983] ? kasan_atomics_helper+0xc1d/0x5400 [kasan_test] [ 167.043991] ? kasan_addr_to_slab+0x9/0x90 [ 167.043994] ? kasan_atomics_helper+0xc1d/0x5400 [kasan_test] [ 167.044002] kasan_report+0xda/0x110 [ 167.044005] ? kasan_atomics_helper+0xc1d/0x5400 [kasan_test] [ 167.044014] kasan_check_range+0xfc/0x1b0 [ 167.044017] kasan_atomics_helper+0xc1d/0x5400 [kasan_test] [ 167.044037] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 167.044045] ? __kasan_slab_alloc+0x4a/0x90 [ 167.044049] ? __kmalloc_cache_noprof+0x158/0x430 [ 167.044061] ? pick_next_task_fair+0x51/0xba0 [ 167.044065] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 167.044083] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 167.044091] ? __schedule+0x757/0x1420 [ 167.044095] ? __pfx_read_tsc+0x10/0x10 [ 167.044097] ? ktime_get_ts64+0x7f/0x220 [ 167.044101] kunit_try_run_case+0x175/0x440 [ 167.044104] ? __pfx_kunit_try_run_case+0x10/0x10 [ 167.044106] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 167.044110] ? __pfx_kunit_try_run_case+0x10/0x10 [ 167.044112] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 167.044115] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 167.044118] kthread+0x3b4/0x780 [ 167.044121] ? __pfx_kthread+0x10/0x10 [ 167.044124] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 167.044128] ? __pfx_kthread+0x10/0x10 [ 167.044131] ret_from_fork+0x30/0x70 [ 167.044134] ? __pfx_kthread+0x10/0x10 [ 167.044137] ret_from_fork_asm+0x1a/0x30 [ 167.044141] [ 167.256019] Allocated by task 3930: [ 167.260191] kasan_save_stack+0x1c/0x40 [ 167.264701] kasan_save_track+0x10/0x30 [ 167.269209] __kasan_kmalloc+0xa6/0xb0 [ 167.273633] kasan_atomics+0x91/0x2d0 [kasan_test] [ 167.279098] kunit_try_run_case+0x175/0x440 [ 167.283952] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 167.290018] kthread+0x3b4/0x780 [ 167.293932] ret_from_fork+0x30/0x70 [ 167.298183] ret_from_fork_asm+0x1a/0x30 [ 167.304953] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 167.318621] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 167.334981] The buggy address belongs to the physical page: [ 167.341215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 167.349874] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 167.357496] page_type: f5(slab) [ 167.361313] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 167.369712] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 167.378109] page dumped because: kasan: bad access detected [ 167.386519] Memory state around the buggy address: [ 167.391980] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 167.399860] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 167.407739] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 167.415617] ^ [ 167.421082] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 167.428959] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 167.436839] ================================================================== [ 167.444729] ================================================================== [ 167.452627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a55/0x5400 [kasan_test] [ 167.461807] Read of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 167.472038] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 167.472043] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 167.472045] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 167.472047] Call Trace: [ 167.472048] [ 167.472049] dump_stack_lvl+0x4f/0x70 [ 167.472062] print_address_description.constprop.0+0x2c/0x3b0 [ 167.472067] ? kasan_atomics_helper+0x4a55/0x5400 [kasan_test] [ 167.472084] print_report+0xb9/0x280 [ 167.472087] ? kasan_atomics_helper+0x4a55/0x5400 [kasan_test] [ 167.472095] ? kasan_addr_to_slab+0x9/0x90 [ 167.472098] ? kasan_atomics_helper+0x4a55/0x5400 [kasan_test] [ 167.472106] kasan_report+0xda/0x110 [ 167.472110] ? kasan_atomics_helper+0x4a55/0x5400 [kasan_test] [ 167.472118] kasan_atomics_helper+0x4a55/0x5400 [kasan_test] [ 167.472127] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 167.472135] ? __kasan_slab_alloc+0x4a/0x90 [ 167.472138] ? __kmalloc_cache_noprof+0x158/0x430 [ 167.472141] ? pick_next_task_fair+0x51/0xba0 [ 167.472145] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 167.472154] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 167.472162] ? __schedule+0x757/0x1420 [ 167.472165] ? __pfx_read_tsc+0x10/0x10 [ 167.472167] ? ktime_get_ts64+0x7f/0x220 [ 167.472170] kunit_try_run_case+0x175/0x440 [ 167.472173] ? __pfx_kunit_try_run_case+0x10/0x10 [ 167.472176] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 167.472179] ? __pfx_kunit_try_run_case+0x10/0x10 [ 167.472182] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 167.472185] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 167.472188] kthread+0x3b4/0x780 [ 167.472191] ? __pfx_kthread+0x10/0x10 [ 167.472194] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 167.472197] ? __pfx_kthread+0x10/0x10 [ 167.472200] ret_from_fork+0x30/0x70 [ 167.472203] ? __pfx_kthread+0x10/0x10 [ 167.472206] ret_from_fork_asm+0x1a/0x30 [ 167.472211] [ 167.679831] Allocated by task 3930: [ 167.683992] kasan_save_stack+0x1c/0x40 [ 167.688500] kasan_save_track+0x10/0x30 [ 167.693009] __kasan_kmalloc+0xa6/0xb0 [ 167.697431] kasan_atomics+0x91/0x2d0 [kasan_test] [ 167.702896] kunit_try_run_case+0x175/0x440 [ 167.707749] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 167.713812] kthread+0x3b4/0x780 [ 167.717716] ret_from_fork+0x30/0x70 [ 167.721967] ret_from_fork_asm+0x1a/0x30 [ 167.728738] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 167.742409] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 167.758772] The buggy address belongs to the physical page: [ 167.765009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 167.773666] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 167.781285] page_type: f5(slab) [ 167.785104] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 167.793504] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 167.801902] page dumped because: kasan: bad access detected [ 167.810311] Memory state around the buggy address: [ 167.815771] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 167.823648] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 167.831525] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 167.839404] ^ [ 167.844861] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 167.852741] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 167.860621] ================================================================== [ 167.868530] ================================================================== [ 167.876425] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xcec/0x5400 [kasan_test] [ 167.885522] Write of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 167.895837] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 167.895843] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 167.895845] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 167.895846] Call Trace: [ 167.895848] [ 167.895849] dump_stack_lvl+0x4f/0x70 [ 167.895853] print_address_description.constprop.0+0x2c/0x3b0 [ 167.895857] ? kasan_atomics_helper+0xcec/0x5400 [kasan_test] [ 167.895866] print_report+0xb9/0x280 [ 167.895869] ? kasan_atomics_helper+0xcec/0x5400 [kasan_test] [ 167.895877] ? kasan_addr_to_slab+0x9/0x90 [ 167.895881] ? kasan_atomics_helper+0xcec/0x5400 [kasan_test] [ 167.895888] kasan_report+0xda/0x110 [ 167.895892] ? kasan_atomics_helper+0xcec/0x5400 [kasan_test] [ 167.895900] kasan_check_range+0xfc/0x1b0 [ 167.895903] kasan_atomics_helper+0xcec/0x5400 [kasan_test] [ 167.895912] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 167.895920] ? __kasan_slab_alloc+0x4a/0x90 [ 167.895923] ? __kmalloc_cache_noprof+0x158/0x430 [ 167.895926] ? pick_next_task_fair+0x51/0xba0 [ 167.895930] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 167.895939] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 167.895947] ? __schedule+0x757/0x1420 [ 167.895950] ? __pfx_read_tsc+0x10/0x10 [ 167.895953] ? ktime_get_ts64+0x7f/0x220 [ 167.895956] kunit_try_run_case+0x175/0x440 [ 167.895959] ? __pfx_kunit_try_run_case+0x10/0x10 [ 167.895961] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 167.895965] ? __pfx_kunit_try_run_case+0x10/0x10 [ 167.895967] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 167.895970] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 167.895974] kthread+0x3b4/0x780 [ 167.895977] ? __pfx_kthread+0x10/0x10 [ 167.895980] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 167.895983] ? __pfx_kthread+0x10/0x10 [ 167.895986] ret_from_fork+0x30/0x70 [ 167.895989] ? __pfx_kthread+0x10/0x10 [ 167.895992] ret_from_fork_asm+0x1a/0x30 [ 167.895997] [ 168.107888] Allocated by task 3930: [ 168.112053] kasan_save_stack+0x1c/0x40 [ 168.116574] kasan_save_track+0x10/0x30 [ 168.121087] __kasan_kmalloc+0xa6/0xb0 [ 168.125512] kasan_atomics+0x91/0x2d0 [kasan_test] [ 168.130977] kunit_try_run_case+0x175/0x440 [ 168.135831] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 168.141894] kthread+0x3b4/0x780 [ 168.145800] ret_from_fork+0x30/0x70 [ 168.150052] ret_from_fork_asm+0x1a/0x30 [ 168.156834] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 168.170505] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 168.186870] The buggy address belongs to the physical page: [ 168.193109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 168.201767] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 168.209388] page_type: f5(slab) [ 168.213207] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 168.221608] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 168.230003] page dumped because: kasan: bad access detected [ 168.238414] Memory state around the buggy address: [ 168.243871] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 168.251752] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 168.259632] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 168.267509] ^ [ 168.272968] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 168.280845] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 168.288724] ================================================================== [ 168.296613] ================================================================== [ 168.304507] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd83/0x5400 [kasan_test] [ 168.313602] Write of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 168.323916] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 168.323921] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 168.323923] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 168.323924] Call Trace: [ 168.323926] [ 168.323927] dump_stack_lvl+0x4f/0x70 [ 168.323931] print_address_description.constprop.0+0x2c/0x3b0 [ 168.323935] ? kasan_atomics_helper+0xd83/0x5400 [kasan_test] [ 168.323943] print_report+0xb9/0x280 [ 168.323947] ? kasan_atomics_helper+0xd83/0x5400 [kasan_test] [ 168.323954] ? kasan_addr_to_slab+0x9/0x90 [ 168.323958] ? kasan_atomics_helper+0xd83/0x5400 [kasan_test] [ 168.323965] kasan_report+0xda/0x110 [ 168.323969] ? kasan_atomics_helper+0xd83/0x5400 [kasan_test] [ 168.323977] kasan_check_range+0xfc/0x1b0 [ 168.323980] kasan_atomics_helper+0xd83/0x5400 [kasan_test] [ 168.323989] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 168.323997] ? __kasan_slab_alloc+0x4a/0x90 [ 168.324000] ? __kmalloc_cache_noprof+0x158/0x430 [ 168.324003] ? pick_next_task_fair+0x51/0xba0 [ 168.324007] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 168.324018] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 168.324039] ? __schedule+0x757/0x1420 [ 168.324042] ? __pfx_read_tsc+0x10/0x10 [ 168.324045] ? ktime_get_ts64+0x7f/0x220 [ 168.324048] kunit_try_run_case+0x175/0x440 [ 168.324060] ? __pfx_kunit_try_run_case+0x10/0x10 [ 168.324063] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 168.324067] ? __pfx_kunit_try_run_case+0x10/0x10 [ 168.324069] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 168.324081] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 168.324084] kthread+0x3b4/0x780 [ 168.324088] ? __pfx_kthread+0x10/0x10 [ 168.324091] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 168.324094] ? __pfx_kthread+0x10/0x10 [ 168.324097] ret_from_fork+0x30/0x70 [ 168.324100] ? __pfx_kthread+0x10/0x10 [ 168.324103] ret_from_fork_asm+0x1a/0x30 [ 168.324107] [ 168.536009] Allocated by task 3930: [ 168.540170] kasan_save_stack+0x1c/0x40 [ 168.544680] kasan_save_track+0x10/0x30 [ 168.549192] __kasan_kmalloc+0xa6/0xb0 [ 168.553616] kasan_atomics+0x91/0x2d0 [kasan_test] [ 168.559084] kunit_try_run_case+0x175/0x440 [ 168.563941] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 168.570004] kthread+0x3b4/0x780 [ 168.573910] ret_from_fork+0x30/0x70 [ 168.578159] ret_from_fork_asm+0x1a/0x30 [ 168.584930] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 168.598601] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 168.614964] The buggy address belongs to the physical page: [ 168.621199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 168.629856] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 168.637479] page_type: f5(slab) [ 168.641296] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 168.649693] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 168.658089] page dumped because: kasan: bad access detected [ 168.666500] Memory state around the buggy address: [ 168.671961] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 168.679840] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 168.687719] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 168.695598] ^ [ 168.701066] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 168.708955] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 168.716834] ================================================================== [ 168.724722] ================================================================== [ 168.732621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe19/0x5400 [kasan_test] [ 168.741714] Write of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 168.752039] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 168.752044] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 168.752046] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 168.752047] Call Trace: [ 168.752049] [ 168.752050] dump_stack_lvl+0x4f/0x70 [ 168.752063] print_address_description.constprop.0+0x2c/0x3b0 [ 168.752068] ? kasan_atomics_helper+0xe19/0x5400 [kasan_test] [ 168.752085] print_report+0xb9/0x280 [ 168.752089] ? kasan_atomics_helper+0xe19/0x5400 [kasan_test] [ 168.752096] ? kasan_addr_to_slab+0x9/0x90 [ 168.752100] ? kasan_atomics_helper+0xe19/0x5400 [kasan_test] [ 168.752107] kasan_report+0xda/0x110 [ 168.752111] ? kasan_atomics_helper+0xe19/0x5400 [kasan_test] [ 168.752120] kasan_check_range+0xfc/0x1b0 [ 168.752123] kasan_atomics_helper+0xe19/0x5400 [kasan_test] [ 168.752131] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 168.752139] ? __kasan_slab_alloc+0x4a/0x90 [ 168.752142] ? __kmalloc_cache_noprof+0x158/0x430 [ 168.752145] ? pick_next_task_fair+0x51/0xba0 [ 168.752149] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 168.752158] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 168.752166] ? __schedule+0x757/0x1420 [ 168.752170] ? __pfx_read_tsc+0x10/0x10 [ 168.752172] ? ktime_get_ts64+0x7f/0x220 [ 168.752176] kunit_try_run_case+0x175/0x440 [ 168.752178] ? __pfx_kunit_try_run_case+0x10/0x10 [ 168.752181] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 168.752184] ? __pfx_kunit_try_run_case+0x10/0x10 [ 168.752187] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 168.752190] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 168.752193] kthread+0x3b4/0x780 [ 168.752196] ? __pfx_kthread+0x10/0x10 [ 168.752199] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 168.752202] ? __pfx_kthread+0x10/0x10 [ 168.752206] ret_from_fork+0x30/0x70 [ 168.752209] ? __pfx_kthread+0x10/0x10 [ 168.752211] ret_from_fork_asm+0x1a/0x30 [ 168.752216] [ 168.964128] Allocated by task 3930: [ 168.968294] kasan_save_stack+0x1c/0x40 [ 168.972806] kasan_save_track+0x10/0x30 [ 168.977314] __kasan_kmalloc+0xa6/0xb0 [ 168.981739] kasan_atomics+0x91/0x2d0 [kasan_test] [ 168.987207] kunit_try_run_case+0x175/0x440 [ 168.992066] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 168.998131] kthread+0x3b4/0x780 [ 169.002038] ret_from_fork+0x30/0x70 [ 169.006289] ret_from_fork_asm+0x1a/0x30 [ 169.013066] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 169.026739] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 169.043105] The buggy address belongs to the physical page: [ 169.049340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 169.057997] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 169.065618] page_type: f5(slab) [ 169.069437] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 169.077837] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 169.086235] page dumped because: kasan: bad access detected [ 169.094644] Memory state around the buggy address: [ 169.100102] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 169.107979] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 169.115860] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 169.123738] ^ [ 169.129198] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 169.137086] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 169.144967] ================================================================== [ 169.152859] ================================================================== [ 169.160755] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeaf/0x5400 [kasan_test] [ 169.169852] Write of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 169.180169] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 169.180174] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 169.180176] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 169.180177] Call Trace: [ 169.180179] [ 169.180181] dump_stack_lvl+0x4f/0x70 [ 169.180184] print_address_description.constprop.0+0x2c/0x3b0 [ 169.180188] ? kasan_atomics_helper+0xeaf/0x5400 [kasan_test] [ 169.180197] print_report+0xb9/0x280 [ 169.180200] ? kasan_atomics_helper+0xeaf/0x5400 [kasan_test] [ 169.180208] ? kasan_addr_to_slab+0x9/0x90 [ 169.180211] ? kasan_atomics_helper+0xeaf/0x5400 [kasan_test] [ 169.180220] kasan_report+0xda/0x110 [ 169.180223] ? kasan_atomics_helper+0xeaf/0x5400 [kasan_test] [ 169.180232] kasan_check_range+0xfc/0x1b0 [ 169.180235] kasan_atomics_helper+0xeaf/0x5400 [kasan_test] [ 169.180244] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 169.180252] ? __kasan_slab_alloc+0x4a/0x90 [ 169.180255] ? __kmalloc_cache_noprof+0x158/0x430 [ 169.180258] ? pick_next_task_fair+0x51/0xba0 [ 169.180262] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 169.180270] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 169.180279] ? __schedule+0x757/0x1420 [ 169.180282] ? __pfx_read_tsc+0x10/0x10 [ 169.180285] ? ktime_get_ts64+0x7f/0x220 [ 169.180288] kunit_try_run_case+0x175/0x440 [ 169.180291] ? __pfx_kunit_try_run_case+0x10/0x10 [ 169.180293] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 169.180297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 169.180300] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 169.180303] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 169.180306] kthread+0x3b4/0x780 [ 169.180309] ? __pfx_kthread+0x10/0x10 [ 169.180312] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 169.180315] ? __pfx_kthread+0x10/0x10 [ 169.180319] ret_from_fork+0x30/0x70 [ 169.180322] ? __pfx_kthread+0x10/0x10 [ 169.180325] ret_from_fork_asm+0x1a/0x30 [ 169.180329] [ 169.392212] Allocated by task 3930: [ 169.396373] kasan_save_stack+0x1c/0x40 [ 169.400883] kasan_save_track+0x10/0x30 [ 169.405393] __kasan_kmalloc+0xa6/0xb0 [ 169.409818] kasan_atomics+0x91/0x2d0 [kasan_test] [ 169.415283] kunit_try_run_case+0x175/0x440 [ 169.420137] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 169.426202] kthread+0x3b4/0x780 [ 169.430108] ret_from_fork+0x30/0x70 [ 169.434358] ret_from_fork_asm+0x1a/0x30 [ 169.441127] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 169.454796] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 169.471160] The buggy address belongs to the physical page: [ 169.477396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 169.486065] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 169.493695] page_type: f5(slab) [ 169.497516] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 169.505913] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 169.514310] page dumped because: kasan: bad access detected [ 169.522721] Memory state around the buggy address: [ 169.528178] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 169.536066] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 169.543954] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 169.551833] ^ [ 169.557292] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 169.565171] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 169.573049] ================================================================== [ 169.580948] ================================================================== [ 169.588843] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf46/0x5400 [kasan_test] [ 169.597940] Write of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 169.608262] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 169.608268] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 169.608269] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 169.608271] Call Trace: [ 169.608272] [ 169.608273] dump_stack_lvl+0x4f/0x70 [ 169.608277] print_address_description.constprop.0+0x2c/0x3b0 [ 169.608281] ? kasan_atomics_helper+0xf46/0x5400 [kasan_test] [ 169.608289] print_report+0xb9/0x280 [ 169.608293] ? kasan_atomics_helper+0xf46/0x5400 [kasan_test] [ 169.608301] ? kasan_addr_to_slab+0x9/0x90 [ 169.608304] ? kasan_atomics_helper+0xf46/0x5400 [kasan_test] [ 169.608311] kasan_report+0xda/0x110 [ 169.608315] ? kasan_atomics_helper+0xf46/0x5400 [kasan_test] [ 169.608323] kasan_check_range+0xfc/0x1b0 [ 169.608326] kasan_atomics_helper+0xf46/0x5400 [kasan_test] [ 169.608335] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 169.608342] ? __kasan_slab_alloc+0x4a/0x90 [ 169.608346] ? __kmalloc_cache_noprof+0x158/0x430 [ 169.608348] ? pick_next_task_fair+0x51/0xba0 [ 169.608352] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 169.608361] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 169.608369] ? __schedule+0x757/0x1420 [ 169.608372] ? __pfx_read_tsc+0x10/0x10 [ 169.608374] ? ktime_get_ts64+0x7f/0x220 [ 169.608377] kunit_try_run_case+0x175/0x440 [ 169.608380] ? __pfx_kunit_try_run_case+0x10/0x10 [ 169.608383] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 169.608386] ? __pfx_kunit_try_run_case+0x10/0x10 [ 169.608388] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 169.608391] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 169.608395] kthread+0x3b4/0x780 [ 169.608398] ? __pfx_kthread+0x10/0x10 [ 169.608401] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 169.608404] ? __pfx_kthread+0x10/0x10 [ 169.608407] ret_from_fork+0x30/0x70 [ 169.608410] ? __pfx_kthread+0x10/0x10 [ 169.608413] ret_from_fork_asm+0x1a/0x30 [ 169.608417] [ 169.820305] Allocated by task 3930: [ 169.824465] kasan_save_stack+0x1c/0x40 [ 169.828976] kasan_save_track+0x10/0x30 [ 169.833485] __kasan_kmalloc+0xa6/0xb0 [ 169.837910] kasan_atomics+0x91/0x2d0 [kasan_test] [ 169.843376] kunit_try_run_case+0x175/0x440 [ 169.848231] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 169.854298] kthread+0x3b4/0x780 [ 169.858202] ret_from_fork+0x30/0x70 [ 169.862451] ret_from_fork_asm+0x1a/0x30 [ 169.869233] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 169.882905] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 169.899276] The buggy address belongs to the physical page: [ 169.905513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 169.914171] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 169.921792] page_type: f5(slab) [ 169.925611] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 169.934010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 169.942419] page dumped because: kasan: bad access detected [ 169.950830] Memory state around the buggy address: [ 169.956287] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 169.964169] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 169.972059] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 169.979950] ^ [ 169.985409] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 169.993289] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 170.001166] ================================================================== [ 170.009082] ================================================================== [ 170.016976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a07/0x5400 [kasan_test] [ 170.026162] Read of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 170.036392] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 170.036398] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 170.036399] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 170.036401] Call Trace: [ 170.036402] [ 170.036404] dump_stack_lvl+0x4f/0x70 [ 170.036407] print_address_description.constprop.0+0x2c/0x3b0 [ 170.036412] ? kasan_atomics_helper+0x4a07/0x5400 [kasan_test] [ 170.036420] print_report+0xb9/0x280 [ 170.036424] ? kasan_atomics_helper+0x4a07/0x5400 [kasan_test] [ 170.036432] ? kasan_addr_to_slab+0x9/0x90 [ 170.036435] ? kasan_atomics_helper+0x4a07/0x5400 [kasan_test] [ 170.036443] kasan_report+0xda/0x110 [ 170.036447] ? kasan_atomics_helper+0x4a07/0x5400 [kasan_test] [ 170.036455] kasan_atomics_helper+0x4a07/0x5400 [kasan_test] [ 170.036464] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 170.036472] ? __kasan_slab_alloc+0x4a/0x90 [ 170.036475] ? __kmalloc_cache_noprof+0x158/0x430 [ 170.036478] ? pick_next_task_fair+0x51/0xba0 [ 170.036482] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 170.036491] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 170.036499] ? __schedule+0x757/0x1420 [ 170.036502] ? __pfx_read_tsc+0x10/0x10 [ 170.036505] ? ktime_get_ts64+0x7f/0x220 [ 170.036508] kunit_try_run_case+0x175/0x440 [ 170.036511] ? __pfx_kunit_try_run_case+0x10/0x10 [ 170.036513] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 170.036517] ? __pfx_kunit_try_run_case+0x10/0x10 [ 170.036519] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 170.036522] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 170.036525] kthread+0x3b4/0x780 [ 170.036529] ? __pfx_kthread+0x10/0x10 [ 170.036532] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 170.036535] ? __pfx_kthread+0x10/0x10 [ 170.036538] ret_from_fork+0x30/0x70 [ 170.036541] ? __pfx_kthread+0x10/0x10 [ 170.036544] ret_from_fork_asm+0x1a/0x30 [ 170.036548] [ 170.244212] Allocated by task 3930: [ 170.248375] kasan_save_stack+0x1c/0x40 [ 170.252886] kasan_save_track+0x10/0x30 [ 170.257398] __kasan_kmalloc+0xa6/0xb0 [ 170.261822] kasan_atomics+0x91/0x2d0 [kasan_test] [ 170.267289] kunit_try_run_case+0x175/0x440 [ 170.272145] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 170.278211] kthread+0x3b4/0x780 [ 170.282116] ret_from_fork+0x30/0x70 [ 170.286365] ret_from_fork_asm+0x1a/0x30 [ 170.293137] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 170.306808] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 170.323171] The buggy address belongs to the physical page: [ 170.329409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 170.338068] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 170.345699] page_type: f5(slab) [ 170.349517] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 170.357914] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 170.366311] page dumped because: kasan: bad access detected [ 170.374722] Memory state around the buggy address: [ 170.380179] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 170.388067] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 170.395955] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 170.403834] ^ [ 170.409292] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 170.417171] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 170.425049] ================================================================== [ 170.432946] ================================================================== [ 170.440841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1013/0x5400 [kasan_test] [ 170.450039] Write of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 170.460356] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 170.460361] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 170.460363] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 170.460364] Call Trace: [ 170.460366] [ 170.460367] dump_stack_lvl+0x4f/0x70 [ 170.460371] print_address_description.constprop.0+0x2c/0x3b0 [ 170.460375] ? kasan_atomics_helper+0x1013/0x5400 [kasan_test] [ 170.460384] print_report+0xb9/0x280 [ 170.460387] ? kasan_atomics_helper+0x1013/0x5400 [kasan_test] [ 170.460395] ? kasan_addr_to_slab+0x9/0x90 [ 170.460398] ? kasan_atomics_helper+0x1013/0x5400 [kasan_test] [ 170.460406] kasan_report+0xda/0x110 [ 170.460410] ? kasan_atomics_helper+0x1013/0x5400 [kasan_test] [ 170.460418] kasan_check_range+0xfc/0x1b0 [ 170.460421] kasan_atomics_helper+0x1013/0x5400 [kasan_test] [ 170.460430] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 170.460438] ? __kasan_slab_alloc+0x4a/0x90 [ 170.460441] ? __kmalloc_cache_noprof+0x158/0x430 [ 170.460444] ? pick_next_task_fair+0x51/0xba0 [ 170.460448] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 170.460456] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 170.460465] ? __schedule+0x757/0x1420 [ 170.460468] ? __pfx_read_tsc+0x10/0x10 [ 170.460470] ? ktime_get_ts64+0x7f/0x220 [ 170.460473] kunit_try_run_case+0x175/0x440 [ 170.460476] ? __pfx_kunit_try_run_case+0x10/0x10 [ 170.460478] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 170.460482] ? __pfx_kunit_try_run_case+0x10/0x10 [ 170.460484] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 170.460487] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 170.460490] kthread+0x3b4/0x780 [ 170.460494] ? __pfx_kthread+0x10/0x10 [ 170.460497] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 170.460500] ? __pfx_kthread+0x10/0x10 [ 170.460503] ret_from_fork+0x30/0x70 [ 170.460506] ? __pfx_kthread+0x10/0x10 [ 170.460509] ret_from_fork_asm+0x1a/0x30 [ 170.460513] [ 170.672849] Allocated by task 3930: [ 170.677013] kasan_save_stack+0x1c/0x40 [ 170.681537] kasan_save_track+0x10/0x30 [ 170.686048] __kasan_kmalloc+0xa6/0xb0 [ 170.690483] kasan_atomics+0x91/0x2d0 [kasan_test] [ 170.695952] kunit_try_run_case+0x175/0x440 [ 170.700808] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 170.706876] kthread+0x3b4/0x780 [ 170.710781] ret_from_fork+0x30/0x70 [ 170.715037] ret_from_fork_asm+0x1a/0x30 [ 170.721809] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 170.735480] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 170.751843] The buggy address belongs to the physical page: [ 170.758086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 170.766743] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 170.774364] page_type: f5(slab) [ 170.778183] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 170.786581] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 170.794978] page dumped because: kasan: bad access detected [ 170.803390] Memory state around the buggy address: [ 170.808848] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 170.816728] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 170.824609] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 170.832489] ^ [ 170.837950] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 170.845831] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 170.853710] ================================================================== [ 170.861600] ================================================================== [ 170.869495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ed/0x5400 [kasan_test] [ 170.878678] Read of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 170.888914] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 170.888920] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 170.888921] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 170.888923] Call Trace: [ 170.888925] [ 170.888926] dump_stack_lvl+0x4f/0x70 [ 170.888930] print_address_description.constprop.0+0x2c/0x3b0 [ 170.888934] ? kasan_atomics_helper+0x49ed/0x5400 [kasan_test] [ 170.888943] print_report+0xb9/0x280 [ 170.888947] ? kasan_atomics_helper+0x49ed/0x5400 [kasan_test] [ 170.888955] ? kasan_addr_to_slab+0x9/0x90 [ 170.888958] ? kasan_atomics_helper+0x49ed/0x5400 [kasan_test] [ 170.888966] kasan_report+0xda/0x110 [ 170.888969] ? kasan_atomics_helper+0x49ed/0x5400 [kasan_test] [ 170.888978] kasan_atomics_helper+0x49ed/0x5400 [kasan_test] [ 170.888987] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 170.889001] ? __kasan_slab_alloc+0x4a/0x90 [ 170.889006] ? __kmalloc_cache_noprof+0x158/0x430 [ 170.889011] ? pick_next_task_fair+0x51/0xba0 [ 170.889028] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 170.889045] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 170.889070] ? __schedule+0x757/0x1420 [ 170.889074] ? __pfx_read_tsc+0x10/0x10 [ 170.889077] ? ktime_get_ts64+0x7f/0x220 [ 170.889080] kunit_try_run_case+0x175/0x440 [ 170.889083] ? __pfx_kunit_try_run_case+0x10/0x10 [ 170.889085] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 170.889089] ? __pfx_kunit_try_run_case+0x10/0x10 [ 170.889091] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 170.889094] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 170.889097] kthread+0x3b4/0x780 [ 170.889101] ? __pfx_kthread+0x10/0x10 [ 170.889104] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 170.889107] ? __pfx_kthread+0x10/0x10 [ 170.889110] ret_from_fork+0x30/0x70 [ 170.889113] ? __pfx_kthread+0x10/0x10 [ 170.889116] ret_from_fork_asm+0x1a/0x30 [ 170.889121] [ 171.096764] Allocated by task 3930: [ 171.100928] kasan_save_stack+0x1c/0x40 [ 171.105440] kasan_save_track+0x10/0x30 [ 171.109948] __kasan_kmalloc+0xa6/0xb0 [ 171.114374] kasan_atomics+0x91/0x2d0 [kasan_test] [ 171.119843] kunit_try_run_case+0x175/0x440 [ 171.124698] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 171.130763] kthread+0x3b4/0x780 [ 171.134668] ret_from_fork+0x30/0x70 [ 171.138916] ret_from_fork_asm+0x1a/0x30 [ 171.145686] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 171.159356] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 171.175715] The buggy address belongs to the physical page: [ 171.181951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 171.190608] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 171.198228] page_type: f5(slab) [ 171.202045] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 171.210453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 171.218851] page dumped because: kasan: bad access detected [ 171.227262] Memory state around the buggy address: [ 171.232723] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 171.240601] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 171.248480] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 171.256357] ^ [ 171.261815] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 171.269693] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 171.277569] ================================================================== [ 171.285458] ================================================================== [ 171.293354] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10df/0x5400 [kasan_test] [ 171.302536] Write of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 171.312851] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 171.312856] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 171.312858] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 171.312859] Call Trace: [ 171.312861] [ 171.312862] dump_stack_lvl+0x4f/0x70 [ 171.312866] print_address_description.constprop.0+0x2c/0x3b0 [ 171.312870] ? kasan_atomics_helper+0x10df/0x5400 [kasan_test] [ 171.312879] print_report+0xb9/0x280 [ 171.312882] ? kasan_atomics_helper+0x10df/0x5400 [kasan_test] [ 171.312890] ? kasan_addr_to_slab+0x9/0x90 [ 171.312893] ? kasan_atomics_helper+0x10df/0x5400 [kasan_test] [ 171.312901] kasan_report+0xda/0x110 [ 171.312905] ? kasan_atomics_helper+0x10df/0x5400 [kasan_test] [ 171.312913] kasan_check_range+0xfc/0x1b0 [ 171.312916] kasan_atomics_helper+0x10df/0x5400 [kasan_test] [ 171.312925] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 171.312933] ? __kasan_slab_alloc+0x4a/0x90 [ 171.312937] ? __kmalloc_cache_noprof+0x158/0x430 [ 171.312939] ? pick_next_task_fair+0x51/0xba0 [ 171.312943] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 171.312952] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 171.312960] ? __schedule+0x757/0x1420 [ 171.312963] ? __pfx_read_tsc+0x10/0x10 [ 171.312966] ? ktime_get_ts64+0x7f/0x220 [ 171.312969] kunit_try_run_case+0x175/0x440 [ 171.312972] ? __pfx_kunit_try_run_case+0x10/0x10 [ 171.312974] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 171.312978] ? __pfx_kunit_try_run_case+0x10/0x10 [ 171.312980] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 171.312983] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 171.312986] kthread+0x3b4/0x780 [ 171.312989] ? __pfx_kthread+0x10/0x10 [ 171.312992] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 171.312996] ? __pfx_kthread+0x10/0x10 [ 171.312999] ret_from_fork+0x30/0x70 [ 171.313002] ? __pfx_kthread+0x10/0x10 [ 171.313005] ret_from_fork_asm+0x1a/0x30 [ 171.313009] [ 171.525332] Allocated by task 3930: [ 171.529492] kasan_save_stack+0x1c/0x40 [ 171.534001] kasan_save_track+0x10/0x30 [ 171.538510] __kasan_kmalloc+0xa6/0xb0 [ 171.542933] kasan_atomics+0x91/0x2d0 [kasan_test] [ 171.548396] kunit_try_run_case+0x175/0x440 [ 171.553250] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 171.559312] kthread+0x3b4/0x780 [ 171.563217] ret_from_fork+0x30/0x70 [ 171.567465] ret_from_fork_asm+0x1a/0x30 [ 171.574242] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 171.587908] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 171.604271] The buggy address belongs to the physical page: [ 171.610506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 171.619161] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 171.626780] page_type: f5(slab) [ 171.630596] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 171.638994] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 171.647393] page dumped because: kasan: bad access detected [ 171.655805] Memory state around the buggy address: [ 171.661263] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 171.669140] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 171.677030] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 171.684908] ^ [ 171.690367] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 171.698247] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 171.706124] ================================================================== [ 171.714011] ================================================================== [ 171.721904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d3/0x5400 [kasan_test] [ 171.731087] Read of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 171.741315] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 171.741321] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 171.741322] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 171.741324] Call Trace: [ 171.741325] [ 171.741326] dump_stack_lvl+0x4f/0x70 [ 171.741330] print_address_description.constprop.0+0x2c/0x3b0 [ 171.741334] ? kasan_atomics_helper+0x49d3/0x5400 [kasan_test] [ 171.741342] print_report+0xb9/0x280 [ 171.741346] ? kasan_atomics_helper+0x49d3/0x5400 [kasan_test] [ 171.741354] ? kasan_addr_to_slab+0x9/0x90 [ 171.741357] ? kasan_atomics_helper+0x49d3/0x5400 [kasan_test] [ 171.741364] kasan_report+0xda/0x110 [ 171.741368] ? kasan_atomics_helper+0x49d3/0x5400 [kasan_test] [ 171.741377] kasan_atomics_helper+0x49d3/0x5400 [kasan_test] [ 171.741385] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 171.741393] ? __kasan_slab_alloc+0x4a/0x90 [ 171.741396] ? __kmalloc_cache_noprof+0x158/0x430 [ 171.741399] ? pick_next_task_fair+0x51/0xba0 [ 171.741403] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 171.741412] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 171.741420] ? __schedule+0x757/0x1420 [ 171.741423] ? __pfx_read_tsc+0x10/0x10 [ 171.741425] ? ktime_get_ts64+0x7f/0x220 [ 171.741428] kunit_try_run_case+0x175/0x440 [ 171.741431] ? __pfx_kunit_try_run_case+0x10/0x10 [ 171.741433] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 171.741437] ? __pfx_kunit_try_run_case+0x10/0x10 [ 171.741439] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 171.741442] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 171.741445] kthread+0x3b4/0x780 [ 171.741449] ? __pfx_kthread+0x10/0x10 [ 171.741451] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 171.741455] ? __pfx_kthread+0x10/0x10 [ 171.741458] ret_from_fork+0x30/0x70 [ 171.741461] ? __pfx_kthread+0x10/0x10 [ 171.741464] ret_from_fork_asm+0x1a/0x30 [ 171.741468] [ 171.949138] Allocated by task 3930: [ 171.953302] kasan_save_stack+0x1c/0x40 [ 171.957814] kasan_save_track+0x10/0x30 [ 171.962324] __kasan_kmalloc+0xa6/0xb0 [ 171.966746] kasan_atomics+0x91/0x2d0 [kasan_test] [ 171.972215] kunit_try_run_case+0x175/0x440 [ 171.977070] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 171.983137] kthread+0x3b4/0x780 [ 171.987042] ret_from_fork+0x30/0x70 [ 171.991300] ret_from_fork_asm+0x1a/0x30 [ 171.998077] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 172.011748] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 172.028113] The buggy address belongs to the physical page: [ 172.034350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 172.043007] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 172.050628] page_type: f5(slab) [ 172.054447] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 172.062847] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 172.071245] page dumped because: kasan: bad access detected [ 172.079654] Memory state around the buggy address: [ 172.085113] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 172.092994] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 172.100872] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 172.108748] ^ [ 172.114208] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 172.122088] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 172.129968] ================================================================== [ 172.137857] ================================================================== [ 172.145757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11ab/0x5400 [kasan_test] [ 172.154940] Write of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 172.165262] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 172.165268] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 172.165269] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 172.165271] Call Trace: [ 172.165273] [ 172.165274] dump_stack_lvl+0x4f/0x70 [ 172.165278] print_address_description.constprop.0+0x2c/0x3b0 [ 172.165282] ? kasan_atomics_helper+0x11ab/0x5400 [kasan_test] [ 172.165290] print_report+0xb9/0x280 [ 172.165294] ? kasan_atomics_helper+0x11ab/0x5400 [kasan_test] [ 172.165302] ? kasan_addr_to_slab+0x9/0x90 [ 172.165305] ? kasan_atomics_helper+0x11ab/0x5400 [kasan_test] [ 172.165313] kasan_report+0xda/0x110 [ 172.165317] ? kasan_atomics_helper+0x11ab/0x5400 [kasan_test] [ 172.165325] kasan_check_range+0xfc/0x1b0 [ 172.165328] kasan_atomics_helper+0x11ab/0x5400 [kasan_test] [ 172.165337] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 172.165345] ? __kasan_slab_alloc+0x4a/0x90 [ 172.165348] ? __kmalloc_cache_noprof+0x158/0x430 [ 172.165351] ? pick_next_task_fair+0x51/0xba0 [ 172.165355] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 172.165364] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 172.165372] ? __schedule+0x757/0x1420 [ 172.165375] ? __pfx_read_tsc+0x10/0x10 [ 172.165377] ? ktime_get_ts64+0x7f/0x220 [ 172.165381] kunit_try_run_case+0x175/0x440 [ 172.165383] ? __pfx_kunit_try_run_case+0x10/0x10 [ 172.165386] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 172.165389] ? __pfx_kunit_try_run_case+0x10/0x10 [ 172.165392] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 172.165395] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 172.165398] kthread+0x3b4/0x780 [ 172.165401] ? __pfx_kthread+0x10/0x10 [ 172.165404] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 172.165407] ? __pfx_kthread+0x10/0x10 [ 172.165411] ret_from_fork+0x30/0x70 [ 172.165414] ? __pfx_kthread+0x10/0x10 [ 172.165416] ret_from_fork_asm+0x1a/0x30 [ 172.165421] [ 172.377779] Allocated by task 3930: [ 172.381944] kasan_save_stack+0x1c/0x40 [ 172.386454] kasan_save_track+0x10/0x30 [ 172.390966] __kasan_kmalloc+0xa6/0xb0 [ 172.395389] kasan_atomics+0x91/0x2d0 [kasan_test] [ 172.400854] kunit_try_run_case+0x175/0x440 [ 172.405710] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 172.411775] kthread+0x3b4/0x780 [ 172.415678] ret_from_fork+0x30/0x70 [ 172.419928] ret_from_fork_asm+0x1a/0x30 [ 172.426698] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 172.440369] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 172.456730] The buggy address belongs to the physical page: [ 172.462968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 172.471623] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 172.479246] page_type: f5(slab) [ 172.483068] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 172.491476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 172.499874] page dumped because: kasan: bad access detected [ 172.508288] Memory state around the buggy address: [ 172.513745] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 172.521625] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 172.529504] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 172.537383] ^ [ 172.542842] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 172.550721] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 172.558600] ================================================================== [ 172.566487] ================================================================== [ 172.574382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49b9/0x5400 [kasan_test] [ 172.583563] Read of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 172.593791] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 172.593797] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 172.593798] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 172.593800] Call Trace: [ 172.593801] [ 172.593802] dump_stack_lvl+0x4f/0x70 [ 172.593806] print_address_description.constprop.0+0x2c/0x3b0 [ 172.593810] ? kasan_atomics_helper+0x49b9/0x5400 [kasan_test] [ 172.593819] print_report+0xb9/0x280 [ 172.593822] ? kasan_atomics_helper+0x49b9/0x5400 [kasan_test] [ 172.593830] ? kasan_addr_to_slab+0x9/0x90 [ 172.593833] ? kasan_atomics_helper+0x49b9/0x5400 [kasan_test] [ 172.593841] kasan_report+0xda/0x110 [ 172.593844] ? kasan_atomics_helper+0x49b9/0x5400 [kasan_test] [ 172.593853] kasan_atomics_helper+0x49b9/0x5400 [kasan_test] [ 172.593862] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 172.593870] ? __kasan_slab_alloc+0x4a/0x90 [ 172.593873] ? __kmalloc_cache_noprof+0x158/0x430 [ 172.593876] ? pick_next_task_fair+0x51/0xba0 [ 172.593880] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 172.593888] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 172.593897] ? __schedule+0x757/0x1420 [ 172.593899] ? __pfx_read_tsc+0x10/0x10 [ 172.593902] ? ktime_get_ts64+0x7f/0x220 [ 172.593905] kunit_try_run_case+0x175/0x440 [ 172.593908] ? __pfx_kunit_try_run_case+0x10/0x10 [ 172.593910] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 172.593914] ? __pfx_kunit_try_run_case+0x10/0x10 [ 172.593916] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 172.593919] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 172.593922] kthread+0x3b4/0x780 [ 172.593925] ? __pfx_kthread+0x10/0x10 [ 172.593928] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 172.593931] ? __pfx_kthread+0x10/0x10 [ 172.593935] ret_from_fork+0x30/0x70 [ 172.593937] ? __pfx_kthread+0x10/0x10 [ 172.593940] ret_from_fork_asm+0x1a/0x30 [ 172.593945] [ 172.801637] Allocated by task 3930: [ 172.805799] kasan_save_stack+0x1c/0x40 [ 172.810311] kasan_save_track+0x10/0x30 [ 172.814820] __kasan_kmalloc+0xa6/0xb0 [ 172.819243] kasan_atomics+0x91/0x2d0 [kasan_test] [ 172.824710] kunit_try_run_case+0x175/0x440 [ 172.829566] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 172.835629] kthread+0x3b4/0x780 [ 172.839535] ret_from_fork+0x30/0x70 [ 172.843785] ret_from_fork_asm+0x1a/0x30 [ 172.850558] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 172.864229] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 172.880592] The buggy address belongs to the physical page: [ 172.886827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 172.895486] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 172.903110] page_type: f5(slab) [ 172.906934] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 172.915334] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 172.923732] page dumped because: kasan: bad access detected [ 172.932144] Memory state around the buggy address: [ 172.937603] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 172.945481] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 172.953361] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 172.961240] ^ [ 172.966699] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 172.974579] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 172.982459] ================================================================== [ 172.990352] ================================================================== [ 172.998251] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1277/0x5400 [kasan_test] [ 173.007435] Write of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 173.017750] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 173.017756] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 173.017757] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 173.017759] Call Trace: [ 173.017760] [ 173.017762] dump_stack_lvl+0x4f/0x70 [ 173.017766] print_address_description.constprop.0+0x2c/0x3b0 [ 173.017770] ? kasan_atomics_helper+0x1277/0x5400 [kasan_test] [ 173.017778] print_report+0xb9/0x280 [ 173.017781] ? kasan_atomics_helper+0x1277/0x5400 [kasan_test] [ 173.017789] ? kasan_addr_to_slab+0x9/0x90 [ 173.017793] ? kasan_atomics_helper+0x1277/0x5400 [kasan_test] [ 173.017800] kasan_report+0xda/0x110 [ 173.017804] ? kasan_atomics_helper+0x1277/0x5400 [kasan_test] [ 173.017813] kasan_check_range+0xfc/0x1b0 [ 173.017816] kasan_atomics_helper+0x1277/0x5400 [kasan_test] [ 173.017825] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 173.017832] ? __kasan_slab_alloc+0x4a/0x90 [ 173.017836] ? __kmalloc_cache_noprof+0x158/0x430 [ 173.017838] ? pick_next_task_fair+0x51/0xba0 [ 173.017842] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 173.017851] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 173.017859] ? __schedule+0x757/0x1420 [ 173.017862] ? __pfx_read_tsc+0x10/0x10 [ 173.017865] ? ktime_get_ts64+0x7f/0x220 [ 173.017868] kunit_try_run_case+0x175/0x440 [ 173.017870] ? __pfx_kunit_try_run_case+0x10/0x10 [ 173.017873] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 173.017877] ? __pfx_kunit_try_run_case+0x10/0x10 [ 173.017879] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 173.017882] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 173.017885] kthread+0x3b4/0x780 [ 173.017888] ? __pfx_kthread+0x10/0x10 [ 173.017891] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 173.017895] ? __pfx_kthread+0x10/0x10 [ 173.017898] ret_from_fork+0x30/0x70 [ 173.017901] ? __pfx_kthread+0x10/0x10 [ 173.017903] ret_from_fork_asm+0x1a/0x30 [ 173.017908] [ 173.230216] Allocated by task 3930: [ 173.234379] kasan_save_stack+0x1c/0x40 [ 173.238891] kasan_save_track+0x10/0x30 [ 173.243400] __kasan_kmalloc+0xa6/0xb0 [ 173.247823] kasan_atomics+0x91/0x2d0 [kasan_test] [ 173.253290] kunit_try_run_case+0x175/0x440 [ 173.258143] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 173.264208] kthread+0x3b4/0x780 [ 173.268114] ret_from_fork+0x30/0x70 [ 173.272366] ret_from_fork_asm+0x1a/0x30 [ 173.279137] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 173.292806] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 173.309166] The buggy address belongs to the physical page: [ 173.315402] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 173.324068] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 173.331688] page_type: f5(slab) [ 173.335507] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 173.343906] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 173.352303] page dumped because: kasan: bad access detected [ 173.360713] Memory state around the buggy address: [ 173.366172] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 173.374062] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 173.381952] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 173.389832] ^ [ 173.395294] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 173.403175] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 173.411065] ================================================================== [ 173.418954] ================================================================== [ 173.426849] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x499f/0x5400 [kasan_test] [ 173.436037] Read of size 4 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 173.446267] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 173.446273] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 173.446274] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 173.446276] Call Trace: [ 173.446277] [ 173.446279] dump_stack_lvl+0x4f/0x70 [ 173.446282] print_address_description.constprop.0+0x2c/0x3b0 [ 173.446286] ? kasan_atomics_helper+0x499f/0x5400 [kasan_test] [ 173.446295] print_report+0xb9/0x280 [ 173.446298] ? kasan_atomics_helper+0x499f/0x5400 [kasan_test] [ 173.446306] ? kasan_addr_to_slab+0x9/0x90 [ 173.446309] ? kasan_atomics_helper+0x499f/0x5400 [kasan_test] [ 173.446317] kasan_report+0xda/0x110 [ 173.446321] ? kasan_atomics_helper+0x499f/0x5400 [kasan_test] [ 173.446329] kasan_atomics_helper+0x499f/0x5400 [kasan_test] [ 173.446338] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 173.446346] ? __kasan_slab_alloc+0x4a/0x90 [ 173.446349] ? __kmalloc_cache_noprof+0x158/0x430 [ 173.446352] ? pick_next_task_fair+0x51/0xba0 [ 173.446356] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 173.446364] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 173.446373] ? __schedule+0x757/0x1420 [ 173.446375] ? __pfx_read_tsc+0x10/0x10 [ 173.446378] ? ktime_get_ts64+0x7f/0x220 [ 173.446381] kunit_try_run_case+0x175/0x440 [ 173.446384] ? __pfx_kunit_try_run_case+0x10/0x10 [ 173.446386] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 173.446390] ? __pfx_kunit_try_run_case+0x10/0x10 [ 173.446392] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 173.446395] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 173.446398] kthread+0x3b4/0x780 [ 173.446402] ? __pfx_kthread+0x10/0x10 [ 173.446404] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 173.446408] ? __pfx_kthread+0x10/0x10 [ 173.446411] ret_from_fork+0x30/0x70 [ 173.446414] ? __pfx_kthread+0x10/0x10 [ 173.446417] ret_from_fork_asm+0x1a/0x30 [ 173.446421] [ 173.654095] Allocated by task 3930: [ 173.658257] kasan_save_stack+0x1c/0x40 [ 173.662766] kasan_save_track+0x10/0x30 [ 173.667277] __kasan_kmalloc+0xa6/0xb0 [ 173.671699] kasan_atomics+0x91/0x2d0 [kasan_test] [ 173.677162] kunit_try_run_case+0x175/0x440 [ 173.682016] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 173.688093] kthread+0x3b4/0x780 [ 173.691996] ret_from_fork+0x30/0x70 [ 173.696245] ret_from_fork_asm+0x1a/0x30 [ 173.703014] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 173.716694] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 173.733061] The buggy address belongs to the physical page: [ 173.739296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 173.747953] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 173.755573] page_type: f5(slab) [ 173.759391] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 173.767787] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 173.776184] page dumped because: kasan: bad access detected [ 173.784595] Memory state around the buggy address: [ 173.790061] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 173.797949] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 173.805828] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 173.813705] ^ [ 173.819163] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 173.827042] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 173.834929] ================================================================== [ 173.842817] ================================================================== [ 173.850711] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1343/0x5400 [kasan_test] [ 173.859891] Read of size 8 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 173.870121] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 173.870126] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 173.870127] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 173.870129] Call Trace: [ 173.870130] [ 173.870132] dump_stack_lvl+0x4f/0x70 [ 173.870135] print_address_description.constprop.0+0x2c/0x3b0 [ 173.870139] ? kasan_atomics_helper+0x1343/0x5400 [kasan_test] [ 173.870147] print_report+0xb9/0x280 [ 173.870151] ? kasan_atomics_helper+0x1343/0x5400 [kasan_test] [ 173.870158] ? kasan_addr_to_slab+0x9/0x90 [ 173.870161] ? kasan_atomics_helper+0x1343/0x5400 [kasan_test] [ 173.870170] kasan_report+0xda/0x110 [ 173.870173] ? kasan_atomics_helper+0x1343/0x5400 [kasan_test] [ 173.870182] kasan_check_range+0xfc/0x1b0 [ 173.870185] kasan_atomics_helper+0x1343/0x5400 [kasan_test] [ 173.870193] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 173.870201] ? __kasan_slab_alloc+0x4a/0x90 [ 173.870204] ? __kmalloc_cache_noprof+0x158/0x430 [ 173.870207] ? pick_next_task_fair+0x51/0xba0 [ 173.870211] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 173.870220] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 173.870228] ? __schedule+0x757/0x1420 [ 173.870231] ? __pfx_read_tsc+0x10/0x10 [ 173.870233] ? ktime_get_ts64+0x7f/0x220 [ 173.870236] kunit_try_run_case+0x175/0x440 [ 173.870239] ? __pfx_kunit_try_run_case+0x10/0x10 [ 173.870241] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 173.870245] ? __pfx_kunit_try_run_case+0x10/0x10 [ 173.870247] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 173.870250] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 173.870253] kthread+0x3b4/0x780 [ 173.870256] ? __pfx_kthread+0x10/0x10 [ 173.870259] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 173.870262] ? __pfx_kthread+0x10/0x10 [ 173.870265] ret_from_fork+0x30/0x70 [ 173.870268] ? __pfx_kthread+0x10/0x10 [ 173.870271] ret_from_fork_asm+0x1a/0x30 [ 173.870276] [ 174.082611] Allocated by task 3930: [ 174.086775] kasan_save_stack+0x1c/0x40 [ 174.091286] kasan_save_track+0x10/0x30 [ 174.095795] __kasan_kmalloc+0xa6/0xb0 [ 174.100218] kasan_atomics+0x91/0x2d0 [kasan_test] [ 174.105685] kunit_try_run_case+0x175/0x440 [ 174.110537] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 174.116601] kthread+0x3b4/0x780 [ 174.120506] ret_from_fork+0x30/0x70 [ 174.124756] ret_from_fork_asm+0x1a/0x30 [ 174.131526] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 174.145195] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 174.161558] The buggy address belongs to the physical page: [ 174.167795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 174.176454] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 174.184076] page_type: f5(slab) [ 174.187892] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 174.196290] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 174.204687] page dumped because: kasan: bad access detected [ 174.213097] Memory state around the buggy address: [ 174.218556] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 174.226437] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 174.234317] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 174.242196] ^ [ 174.247655] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 174.255535] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 174.263412] ================================================================== [ 174.271301] ================================================================== [ 174.279195] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e7f/0x5400 [kasan_test] [ 174.288379] Read of size 8 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 174.298608] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 174.298613] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 174.298615] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 174.298616] Call Trace: [ 174.298618] [ 174.298619] dump_stack_lvl+0x4f/0x70 [ 174.298623] print_address_description.constprop.0+0x2c/0x3b0 [ 174.298627] ? kasan_atomics_helper+0x4e7f/0x5400 [kasan_test] [ 174.298636] print_report+0xb9/0x280 [ 174.298639] ? kasan_atomics_helper+0x4e7f/0x5400 [kasan_test] [ 174.298647] ? kasan_addr_to_slab+0x9/0x90 [ 174.298650] ? kasan_atomics_helper+0x4e7f/0x5400 [kasan_test] [ 174.298658] kasan_report+0xda/0x110 [ 174.298662] ? kasan_atomics_helper+0x4e7f/0x5400 [kasan_test] [ 174.298670] kasan_atomics_helper+0x4e7f/0x5400 [kasan_test] [ 174.298679] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 174.298687] ? __kasan_slab_alloc+0x4a/0x90 [ 174.298690] ? __kmalloc_cache_noprof+0x158/0x430 [ 174.298693] ? pick_next_task_fair+0x51/0xba0 [ 174.298697] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 174.298706] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 174.298715] ? __schedule+0x757/0x1420 [ 174.298718] ? __pfx_read_tsc+0x10/0x10 [ 174.298720] ? ktime_get_ts64+0x7f/0x220 [ 174.298723] kunit_try_run_case+0x175/0x440 [ 174.298726] ? __pfx_kunit_try_run_case+0x10/0x10 [ 174.298729] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 174.298732] ? __pfx_kunit_try_run_case+0x10/0x10 [ 174.298735] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 174.298738] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 174.298741] kthread+0x3b4/0x780 [ 174.298744] ? __pfx_kthread+0x10/0x10 [ 174.298747] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 174.298751] ? __pfx_kthread+0x10/0x10 [ 174.298754] ret_from_fork+0x30/0x70 [ 174.298757] ? __pfx_kthread+0x10/0x10 [ 174.298760] ret_from_fork_asm+0x1a/0x30 [ 174.298764] [ 174.506377] Allocated by task 3930: [ 174.510541] kasan_save_stack+0x1c/0x40 [ 174.515060] kasan_save_track+0x10/0x30 [ 174.519570] __kasan_kmalloc+0xa6/0xb0 [ 174.523992] kasan_atomics+0x91/0x2d0 [kasan_test] [ 174.529457] kunit_try_run_case+0x175/0x440 [ 174.534312] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 174.540376] kthread+0x3b4/0x780 [ 174.544282] ret_from_fork+0x30/0x70 [ 174.548532] ret_from_fork_asm+0x1a/0x30 [ 174.555302] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 174.568968] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 174.585330] The buggy address belongs to the physical page: [ 174.591567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 174.600225] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 174.607846] page_type: f5(slab) [ 174.611664] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 174.620065] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 174.628460] page dumped because: kasan: bad access detected [ 174.636872] Memory state around the buggy address: [ 174.642329] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 174.650209] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 174.658087] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 174.665963] ^ [ 174.671419] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 174.679296] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 174.687172] ================================================================== [ 174.695071] ================================================================== [ 174.702964] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13f4/0x5400 [kasan_test] [ 174.712143] Write of size 8 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 174.722457] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 174.722462] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 174.722463] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 174.722465] Call Trace: [ 174.722466] [ 174.722468] dump_stack_lvl+0x4f/0x70 [ 174.722471] print_address_description.constprop.0+0x2c/0x3b0 [ 174.722476] ? kasan_atomics_helper+0x13f4/0x5400 [kasan_test] [ 174.722484] print_report+0xb9/0x280 [ 174.722487] ? kasan_atomics_helper+0x13f4/0x5400 [kasan_test] [ 174.722495] ? kasan_addr_to_slab+0x9/0x90 [ 174.722498] ? kasan_atomics_helper+0x13f4/0x5400 [kasan_test] [ 174.722506] kasan_report+0xda/0x110 [ 174.722510] ? kasan_atomics_helper+0x13f4/0x5400 [kasan_test] [ 174.722518] kasan_check_range+0xfc/0x1b0 [ 174.722521] kasan_atomics_helper+0x13f4/0x5400 [kasan_test] [ 174.722530] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 174.722538] ? __kasan_slab_alloc+0x4a/0x90 [ 174.722541] ? __kmalloc_cache_noprof+0x158/0x430 [ 174.722544] ? pick_next_task_fair+0x51/0xba0 [ 174.722548] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 174.722557] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 174.722565] ? __schedule+0x757/0x1420 [ 174.722568] ? __pfx_read_tsc+0x10/0x10 [ 174.722571] ? ktime_get_ts64+0x7f/0x220 [ 174.722574] kunit_try_run_case+0x175/0x440 [ 174.722576] ? __pfx_kunit_try_run_case+0x10/0x10 [ 174.722579] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 174.722582] ? __pfx_kunit_try_run_case+0x10/0x10 [ 174.722585] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 174.722588] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 174.722591] kthread+0x3b4/0x780 [ 174.722594] ? __pfx_kthread+0x10/0x10 [ 174.722597] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 174.722600] ? __pfx_kthread+0x10/0x10 [ 174.722603] ret_from_fork+0x30/0x70 [ 174.722606] ? __pfx_kthread+0x10/0x10 [ 174.722609] ret_from_fork_asm+0x1a/0x30 [ 174.722613] [ 174.934883] Allocated by task 3930: [ 174.939044] kasan_save_stack+0x1c/0x40 [ 174.943564] kasan_save_track+0x10/0x30 [ 174.948081] __kasan_kmalloc+0xa6/0xb0 [ 174.952506] kasan_atomics+0x91/0x2d0 [kasan_test] [ 174.957972] kunit_try_run_case+0x175/0x440 [ 174.962828] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 174.968893] kthread+0x3b4/0x780 [ 174.972799] ret_from_fork+0x30/0x70 [ 174.977048] ret_from_fork_asm+0x1a/0x30 [ 174.983829] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 174.997498] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 175.013860] The buggy address belongs to the physical page: [ 175.020097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 175.028754] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 175.036376] page_type: f5(slab) [ 175.040195] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 175.048591] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 175.056985] page dumped because: kasan: bad access detected [ 175.065395] Memory state around the buggy address: [ 175.070851] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 175.078730] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 175.086608] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 175.094487] ^ [ 175.099946] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 175.107822] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 175.115702] ================================================================== [ 175.123591] ================================================================== [ 175.131486] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50a1/0x5400 [kasan_test] [ 175.140669] Write of size 8 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 175.150984] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 175.150990] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 175.150991] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 175.150993] Call Trace: [ 175.150995] [ 175.150997] dump_stack_lvl+0x4f/0x70 [ 175.151001] print_address_description.constprop.0+0x2c/0x3b0 [ 175.151005] ? kasan_atomics_helper+0x50a1/0x5400 [kasan_test] [ 175.151015] print_report+0xb9/0x280 [ 175.151031] ? kasan_atomics_helper+0x50a1/0x5400 [kasan_test] [ 175.151039] ? kasan_addr_to_slab+0x9/0x90 [ 175.151043] ? kasan_atomics_helper+0x50a1/0x5400 [kasan_test] [ 175.151061] kasan_report+0xda/0x110 [ 175.151064] ? kasan_atomics_helper+0x50a1/0x5400 [kasan_test] [ 175.151082] kasan_atomics_helper+0x50a1/0x5400 [kasan_test] [ 175.151091] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 175.151099] ? __kasan_slab_alloc+0x4a/0x90 [ 175.151102] ? __kmalloc_cache_noprof+0x158/0x430 [ 175.151105] ? pick_next_task_fair+0x51/0xba0 [ 175.151109] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 175.151118] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 175.151127] ? __schedule+0x757/0x1420 [ 175.151130] ? __pfx_read_tsc+0x10/0x10 [ 175.151133] ? ktime_get_ts64+0x7f/0x220 [ 175.151136] kunit_try_run_case+0x175/0x440 [ 175.151139] ? __pfx_kunit_try_run_case+0x10/0x10 [ 175.151141] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 175.151145] ? __pfx_kunit_try_run_case+0x10/0x10 [ 175.151147] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 175.151151] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 175.151154] kthread+0x3b4/0x780 [ 175.151157] ? __pfx_kthread+0x10/0x10 [ 175.151160] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 175.151163] ? __pfx_kthread+0x10/0x10 [ 175.151167] ret_from_fork+0x30/0x70 [ 175.151170] ? __pfx_kthread+0x10/0x10 [ 175.151173] ret_from_fork_asm+0x1a/0x30 [ 175.151177] [ 175.358783] Allocated by task 3930: [ 175.362945] kasan_save_stack+0x1c/0x40 [ 175.367454] kasan_save_track+0x10/0x30 [ 175.371962] __kasan_kmalloc+0xa6/0xb0 [ 175.376384] kasan_atomics+0x91/0x2d0 [kasan_test] [ 175.381850] kunit_try_run_case+0x175/0x440 [ 175.386706] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 175.392772] kthread+0x3b4/0x780 [ 175.396674] ret_from_fork+0x30/0x70 [ 175.400922] ret_from_fork_asm+0x1a/0x30 [ 175.407692] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 175.421358] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 175.437720] The buggy address belongs to the physical page: [ 175.443956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 175.452614] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 175.460235] page_type: f5(slab) [ 175.464051] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 175.472457] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 175.480851] page dumped because: kasan: bad access detected [ 175.489261] Memory state around the buggy address: [ 175.494719] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 175.502599] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 175.510479] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 175.518358] ^ [ 175.523817] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 175.531695] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 175.539574] ================================================================== [ 175.547463] ================================================================== [ 175.555357] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14a9/0x5400 [kasan_test] [ 175.564541] Write of size 8 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 175.574853] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 175.574858] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 175.574859] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 175.574861] Call Trace: [ 175.574862] [ 175.574864] dump_stack_lvl+0x4f/0x70 [ 175.574867] print_address_description.constprop.0+0x2c/0x3b0 [ 175.574872] ? kasan_atomics_helper+0x14a9/0x5400 [kasan_test] [ 175.574880] print_report+0xb9/0x280 [ 175.574883] ? kasan_atomics_helper+0x14a9/0x5400 [kasan_test] [ 175.574892] ? kasan_addr_to_slab+0x9/0x90 [ 175.574895] ? kasan_atomics_helper+0x14a9/0x5400 [kasan_test] [ 175.574903] kasan_report+0xda/0x110 [ 175.574906] ? kasan_atomics_helper+0x14a9/0x5400 [kasan_test] [ 175.574915] kasan_check_range+0xfc/0x1b0 [ 175.574918] kasan_atomics_helper+0x14a9/0x5400 [kasan_test] [ 175.574926] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 175.574934] ? __kasan_slab_alloc+0x4a/0x90 [ 175.574938] ? __kmalloc_cache_noprof+0x158/0x430 [ 175.574940] ? pick_next_task_fair+0x51/0xba0 [ 175.574944] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 175.574953] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 175.574962] ? __schedule+0x757/0x1420 [ 175.574965] ? __pfx_read_tsc+0x10/0x10 [ 175.574967] ? ktime_get_ts64+0x7f/0x220 [ 175.574970] kunit_try_run_case+0x175/0x440 [ 175.574973] ? __pfx_kunit_try_run_case+0x10/0x10 [ 175.574976] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 175.574979] ? __pfx_kunit_try_run_case+0x10/0x10 [ 175.574981] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 175.574984] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 175.574987] kthread+0x3b4/0x780 [ 175.574991] ? __pfx_kthread+0x10/0x10 [ 175.574994] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 175.574997] ? __pfx_kthread+0x10/0x10 [ 175.575000] ret_from_fork+0x30/0x70 [ 175.575003] ? __pfx_kthread+0x10/0x10 [ 175.575006] ret_from_fork_asm+0x1a/0x30 [ 175.575010] [ 175.787357] Allocated by task 3930: [ 175.791521] kasan_save_stack+0x1c/0x40 [ 175.796039] kasan_save_track+0x10/0x30 [ 175.800549] __kasan_kmalloc+0xa6/0xb0 [ 175.804972] kasan_atomics+0x91/0x2d0 [kasan_test] [ 175.810438] kunit_try_run_case+0x175/0x440 [ 175.815292] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 175.821357] kthread+0x3b4/0x780 [ 175.825259] ret_from_fork+0x30/0x70 [ 175.829507] ret_from_fork_asm+0x1a/0x30 [ 175.836277] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 175.849945] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 175.866308] The buggy address belongs to the physical page: [ 175.872546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 175.881203] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 175.888824] page_type: f5(slab) [ 175.892643] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 175.901042] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 175.909440] page dumped because: kasan: bad access detected [ 175.917850] Memory state around the buggy address: [ 175.923312] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 175.931195] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 175.939084] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 175.946962] ^ [ 175.952421] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 175.960301] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 175.968179] ================================================================== [ 175.976088] ================================================================== [ 175.983986] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1541/0x5400 [kasan_test] [ 175.993174] Write of size 8 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 176.003491] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 176.003497] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 176.003498] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 176.003500] Call Trace: [ 176.003501] [ 176.003503] dump_stack_lvl+0x4f/0x70 [ 176.003507] print_address_description.constprop.0+0x2c/0x3b0 [ 176.003511] ? kasan_atomics_helper+0x1541/0x5400 [kasan_test] [ 176.003520] print_report+0xb9/0x280 [ 176.003523] ? kasan_atomics_helper+0x1541/0x5400 [kasan_test] [ 176.003531] ? kasan_addr_to_slab+0x9/0x90 [ 176.003534] ? kasan_atomics_helper+0x1541/0x5400 [kasan_test] [ 176.003542] kasan_report+0xda/0x110 [ 176.003546] ? kasan_atomics_helper+0x1541/0x5400 [kasan_test] [ 176.003555] kasan_check_range+0xfc/0x1b0 [ 176.003557] kasan_atomics_helper+0x1541/0x5400 [kasan_test] [ 176.003566] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 176.003574] ? __kasan_slab_alloc+0x4a/0x90 [ 176.003578] ? __kmalloc_cache_noprof+0x158/0x430 [ 176.003580] ? pick_next_task_fair+0x51/0xba0 [ 176.003585] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 176.003594] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 176.003602] ? __schedule+0x757/0x1420 [ 176.003605] ? __pfx_read_tsc+0x10/0x10 [ 176.003608] ? ktime_get_ts64+0x7f/0x220 [ 176.003611] kunit_try_run_case+0x175/0x440 [ 176.003614] ? __pfx_kunit_try_run_case+0x10/0x10 [ 176.003616] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 176.003620] ? __pfx_kunit_try_run_case+0x10/0x10 [ 176.003622] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 176.003625] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 176.003628] kthread+0x3b4/0x780 [ 176.003632] ? __pfx_kthread+0x10/0x10 [ 176.003635] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 176.003638] ? __pfx_kthread+0x10/0x10 [ 176.003641] ret_from_fork+0x30/0x70 [ 176.003644] ? __pfx_kthread+0x10/0x10 [ 176.003647] ret_from_fork_asm+0x1a/0x30 [ 176.003651] [ 176.215983] Allocated by task 3930: [ 176.220145] kasan_save_stack+0x1c/0x40 [ 176.224656] kasan_save_track+0x10/0x30 [ 176.229167] __kasan_kmalloc+0xa6/0xb0 [ 176.233590] kasan_atomics+0x91/0x2d0 [kasan_test] [ 176.239065] kunit_try_run_case+0x175/0x440 [ 176.243920] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 176.249986] kthread+0x3b4/0x780 [ 176.253892] ret_from_fork+0x30/0x70 [ 176.258143] ret_from_fork_asm+0x1a/0x30 [ 176.264912] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 176.278582] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 176.294946] The buggy address belongs to the physical page: [ 176.301183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 176.309840] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 176.317463] page_type: f5(slab) [ 176.321282] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 176.329678] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 176.338076] page dumped because: kasan: bad access detected [ 176.346485] Memory state around the buggy address: [ 176.351942] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 176.359820] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 176.367700] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 176.375579] ^ [ 176.381038] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 176.388916] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 176.396796] ================================================================== [ 176.404709] ================================================================== [ 176.412592] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15d9/0x5400 [kasan_test] [ 176.421777] Write of size 8 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 176.432095] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 176.432101] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 176.432102] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 176.432104] Call Trace: [ 176.432105] [ 176.432107] dump_stack_lvl+0x4f/0x70 [ 176.432110] print_address_description.constprop.0+0x2c/0x3b0 [ 176.432115] ? kasan_atomics_helper+0x15d9/0x5400 [kasan_test] [ 176.432123] print_report+0xb9/0x280 [ 176.432127] ? kasan_atomics_helper+0x15d9/0x5400 [kasan_test] [ 176.432134] ? kasan_addr_to_slab+0x9/0x90 [ 176.432137] ? kasan_atomics_helper+0x15d9/0x5400 [kasan_test] [ 176.432145] kasan_report+0xda/0x110 [ 176.432149] ? kasan_atomics_helper+0x15d9/0x5400 [kasan_test] [ 176.432157] kasan_check_range+0xfc/0x1b0 [ 176.432160] kasan_atomics_helper+0x15d9/0x5400 [kasan_test] [ 176.432169] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 176.432177] ? __kasan_slab_alloc+0x4a/0x90 [ 176.432180] ? __kmalloc_cache_noprof+0x158/0x430 [ 176.432183] ? pick_next_task_fair+0x51/0xba0 [ 176.432187] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 176.432195] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 176.432204] ? __schedule+0x757/0x1420 [ 176.432207] ? __pfx_read_tsc+0x10/0x10 [ 176.432209] ? ktime_get_ts64+0x7f/0x220 [ 176.432212] kunit_try_run_case+0x175/0x440 [ 176.432215] ? __pfx_kunit_try_run_case+0x10/0x10 [ 176.432218] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 176.432221] ? __pfx_kunit_try_run_case+0x10/0x10 [ 176.432223] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 176.432226] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 176.432229] kthread+0x3b4/0x780 [ 176.432233] ? __pfx_kthread+0x10/0x10 [ 176.432235] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 176.432239] ? __pfx_kthread+0x10/0x10 [ 176.432242] ret_from_fork+0x30/0x70 [ 176.432245] ? __pfx_kthread+0x10/0x10 [ 176.432248] ret_from_fork_asm+0x1a/0x30 [ 176.432252] [ 176.644640] Allocated by task 3930: [ 176.648802] kasan_save_stack+0x1c/0x40 [ 176.653310] kasan_save_track+0x10/0x30 [ 176.657823] __kasan_kmalloc+0xa6/0xb0 [ 176.662246] kasan_atomics+0x91/0x2d0 [kasan_test] [ 176.667712] kunit_try_run_case+0x175/0x440 [ 176.672565] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 176.678631] kthread+0x3b4/0x780 [ 176.682534] ret_from_fork+0x30/0x70 [ 176.686784] ret_from_fork_asm+0x1a/0x30 [ 176.693554] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 176.707223] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 176.723587] The buggy address belongs to the physical page: [ 176.729823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 176.738479] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 176.746098] page_type: f5(slab) [ 176.749917] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 176.758314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 176.766711] page dumped because: kasan: bad access detected [ 176.775119] Memory state around the buggy address: [ 176.780578] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 176.788458] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 176.796338] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 176.804215] ^ [ 176.809673] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 176.817554] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 176.825434] ================================================================== [ 176.833323] ================================================================== [ 176.841219] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1670/0x5400 [kasan_test] [ 176.850402] Write of size 8 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 176.860717] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 176.860723] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 176.860724] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 176.860726] Call Trace: [ 176.860727] [ 176.860729] dump_stack_lvl+0x4f/0x70 [ 176.860732] print_address_description.constprop.0+0x2c/0x3b0 [ 176.860737] ? kasan_atomics_helper+0x1670/0x5400 [kasan_test] [ 176.860745] print_report+0xb9/0x280 [ 176.860748] ? kasan_atomics_helper+0x1670/0x5400 [kasan_test] [ 176.860756] ? kasan_addr_to_slab+0x9/0x90 [ 176.860759] ? kasan_atomics_helper+0x1670/0x5400 [kasan_test] [ 176.860767] kasan_report+0xda/0x110 [ 176.860771] ? kasan_atomics_helper+0x1670/0x5400 [kasan_test] [ 176.860779] kasan_check_range+0xfc/0x1b0 [ 176.860782] kasan_atomics_helper+0x1670/0x5400 [kasan_test] [ 176.860791] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 176.860799] ? __kasan_slab_alloc+0x4a/0x90 [ 176.860802] ? __kmalloc_cache_noprof+0x158/0x430 [ 176.860805] ? pick_next_task_fair+0x51/0xba0 [ 176.860809] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 176.860818] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 176.860826] ? __schedule+0x757/0x1420 [ 176.860829] ? __pfx_read_tsc+0x10/0x10 [ 176.860832] ? ktime_get_ts64+0x7f/0x220 [ 176.860835] kunit_try_run_case+0x175/0x440 [ 176.860838] ? __pfx_kunit_try_run_case+0x10/0x10 [ 176.860840] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 176.860843] ? __pfx_kunit_try_run_case+0x10/0x10 [ 176.860846] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 176.860849] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 176.860852] kthread+0x3b4/0x780 [ 176.860855] ? __pfx_kthread+0x10/0x10 [ 176.860858] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 176.860861] ? __pfx_kthread+0x10/0x10 [ 176.860864] ret_from_fork+0x30/0x70 [ 176.860867] ? __pfx_kthread+0x10/0x10 [ 176.860870] ret_from_fork_asm+0x1a/0x30 [ 176.860874] [ 177.073215] Allocated by task 3930: [ 177.077378] kasan_save_stack+0x1c/0x40 [ 177.081890] kasan_save_track+0x10/0x30 [ 177.086402] __kasan_kmalloc+0xa6/0xb0 [ 177.090824] kasan_atomics+0x91/0x2d0 [kasan_test] [ 177.096292] kunit_try_run_case+0x175/0x440 [ 177.101145] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 177.107212] kthread+0x3b4/0x780 [ 177.111118] ret_from_fork+0x30/0x70 [ 177.115370] ret_from_fork_asm+0x1a/0x30 [ 177.122137] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 177.135808] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 177.152169] The buggy address belongs to the physical page: [ 177.158404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 177.167068] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 177.174696] page_type: f5(slab) [ 177.178514] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 177.186913] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 177.195310] page dumped because: kasan: bad access detected [ 177.203722] Memory state around the buggy address: [ 177.209180] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 177.217070] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 177.224952] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 177.232830] ^ [ 177.238292] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 177.246172] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 177.254062] ================================================================== [ 177.261954] ================================================================== [ 177.269853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1707/0x5400 [kasan_test] [ 177.279038] Write of size 8 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 177.289357] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 177.289363] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 177.289364] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 177.289366] Call Trace: [ 177.289368] [ 177.289370] dump_stack_lvl+0x4f/0x70 [ 177.289374] print_address_description.constprop.0+0x2c/0x3b0 [ 177.289378] ? kasan_atomics_helper+0x1707/0x5400 [kasan_test] [ 177.289387] print_report+0xb9/0x280 [ 177.289391] ? kasan_atomics_helper+0x1707/0x5400 [kasan_test] [ 177.289398] ? kasan_addr_to_slab+0x9/0x90 [ 177.289402] ? kasan_atomics_helper+0x1707/0x5400 [kasan_test] [ 177.289409] kasan_report+0xda/0x110 [ 177.289413] ? kasan_atomics_helper+0x1707/0x5400 [kasan_test] [ 177.289421] kasan_check_range+0xfc/0x1b0 [ 177.289425] kasan_atomics_helper+0x1707/0x5400 [kasan_test] [ 177.289433] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 177.289442] ? __kasan_slab_alloc+0x4a/0x90 [ 177.289445] ? __kmalloc_cache_noprof+0x158/0x430 [ 177.289448] ? pick_next_task_fair+0x51/0xba0 [ 177.289452] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 177.289461] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 177.289469] ? __schedule+0x757/0x1420 [ 177.289473] ? __pfx_read_tsc+0x10/0x10 [ 177.289475] ? ktime_get_ts64+0x7f/0x220 [ 177.289479] kunit_try_run_case+0x175/0x440 [ 177.289482] ? __pfx_kunit_try_run_case+0x10/0x10 [ 177.289484] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 177.289488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 177.289490] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 177.289494] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 177.289497] kthread+0x3b4/0x780 [ 177.289500] ? __pfx_kthread+0x10/0x10 [ 177.289503] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 177.289507] ? __pfx_kthread+0x10/0x10 [ 177.289510] ret_from_fork+0x30/0x70 [ 177.289513] ? __pfx_kthread+0x10/0x10 [ 177.289516] ret_from_fork_asm+0x1a/0x30 [ 177.289520] [ 177.501812] Allocated by task 3930: [ 177.505974] kasan_save_stack+0x1c/0x40 [ 177.510481] kasan_save_track+0x10/0x30 [ 177.514990] __kasan_kmalloc+0xa6/0xb0 [ 177.519412] kasan_atomics+0x91/0x2d0 [kasan_test] [ 177.524877] kunit_try_run_case+0x175/0x440 [ 177.529731] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 177.535794] kthread+0x3b4/0x780 [ 177.539698] ret_from_fork+0x30/0x70 [ 177.543948] ret_from_fork_asm+0x1a/0x30 [ 177.550720] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 177.564388] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 177.580749] The buggy address belongs to the physical page: [ 177.586988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 177.595647] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 177.603266] page_type: f5(slab) [ 177.607086] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 177.615484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 177.623881] page dumped because: kasan: bad access detected [ 177.632292] Memory state around the buggy address: [ 177.637750] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 177.645629] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 177.653507] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 177.661386] ^ [ 177.666844] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 177.674723] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 177.682600] ================================================================== [ 177.690510] ================================================================== [ 177.698393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x179f/0x5400 [kasan_test] [ 177.707577] Write of size 8 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 177.717890] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 177.717895] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 177.717897] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 177.717899] Call Trace: [ 177.717900] [ 177.717902] dump_stack_lvl+0x4f/0x70 [ 177.717905] print_address_description.constprop.0+0x2c/0x3b0 [ 177.717909] ? kasan_atomics_helper+0x179f/0x5400 [kasan_test] [ 177.717918] print_report+0xb9/0x280 [ 177.717921] ? kasan_atomics_helper+0x179f/0x5400 [kasan_test] [ 177.717929] ? kasan_addr_to_slab+0x9/0x90 [ 177.717932] ? kasan_atomics_helper+0x179f/0x5400 [kasan_test] [ 177.717940] kasan_report+0xda/0x110 [ 177.717944] ? kasan_atomics_helper+0x179f/0x5400 [kasan_test] [ 177.717952] kasan_check_range+0xfc/0x1b0 [ 177.717955] kasan_atomics_helper+0x179f/0x5400 [kasan_test] [ 177.717964] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 177.717972] ? __kasan_slab_alloc+0x4a/0x90 [ 177.717975] ? __kmalloc_cache_noprof+0x158/0x430 [ 177.717978] ? pick_next_task_fair+0x51/0xba0 [ 177.717982] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 177.717991] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 177.717999] ? __schedule+0x757/0x1420 [ 177.718002] ? __pfx_read_tsc+0x10/0x10 [ 177.718005] ? ktime_get_ts64+0x7f/0x220 [ 177.718008] kunit_try_run_case+0x175/0x440 [ 177.718011] ? __pfx_kunit_try_run_case+0x10/0x10 [ 177.718015] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 177.718031] ? __pfx_kunit_try_run_case+0x10/0x10 [ 177.718034] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 177.718037] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 177.718040] kthread+0x3b4/0x780 [ 177.718044] ? __pfx_kthread+0x10/0x10 [ 177.718047] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 177.718061] ? __pfx_kthread+0x10/0x10 [ 177.718064] ret_from_fork+0x30/0x70 [ 177.718067] ? __pfx_kthread+0x10/0x10 [ 177.718079] ret_from_fork_asm+0x1a/0x30 [ 177.718084] [ 177.930397] Allocated by task 3930: [ 177.934561] kasan_save_stack+0x1c/0x40 [ 177.939082] kasan_save_track+0x10/0x30 [ 177.943597] __kasan_kmalloc+0xa6/0xb0 [ 177.948036] kasan_atomics+0x91/0x2d0 [kasan_test] [ 177.953512] kunit_try_run_case+0x175/0x440 [ 177.958366] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 177.964432] kthread+0x3b4/0x780 [ 177.968336] ret_from_fork+0x30/0x70 [ 177.972587] ret_from_fork_asm+0x1a/0x30 [ 177.979357] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 177.993040] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 178.009414] The buggy address belongs to the physical page: [ 178.015650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 178.024310] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 178.031932] page_type: f5(slab) [ 178.035751] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 178.044152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 178.052549] page dumped because: kasan: bad access detected [ 178.060960] Memory state around the buggy address: [ 178.066418] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 178.074296] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 178.082177] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 178.090067] ^ [ 178.095536] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 178.103413] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 178.111294] ================================================================== [ 178.119182] ================================================================== [ 178.127081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1837/0x5400 [kasan_test] [ 178.136266] Write of size 8 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 178.146584] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 178.146590] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 178.146591] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 178.146593] Call Trace: [ 178.146594] [ 178.146596] dump_stack_lvl+0x4f/0x70 [ 178.146600] print_address_description.constprop.0+0x2c/0x3b0 [ 178.146605] ? kasan_atomics_helper+0x1837/0x5400 [kasan_test] [ 178.146613] print_report+0xb9/0x280 [ 178.146616] ? kasan_atomics_helper+0x1837/0x5400 [kasan_test] [ 178.146624] ? kasan_addr_to_slab+0x9/0x90 [ 178.146627] ? kasan_atomics_helper+0x1837/0x5400 [kasan_test] [ 178.146635] kasan_report+0xda/0x110 [ 178.146639] ? kasan_atomics_helper+0x1837/0x5400 [kasan_test] [ 178.146647] kasan_check_range+0xfc/0x1b0 [ 178.146650] kasan_atomics_helper+0x1837/0x5400 [kasan_test] [ 178.146659] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 178.146667] ? __kasan_slab_alloc+0x4a/0x90 [ 178.146670] ? __kmalloc_cache_noprof+0x158/0x430 [ 178.146673] ? pick_next_task_fair+0x51/0xba0 [ 178.146677] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 178.146686] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 178.146695] ? __schedule+0x757/0x1420 [ 178.146698] ? __pfx_read_tsc+0x10/0x10 [ 178.146701] ? ktime_get_ts64+0x7f/0x220 [ 178.146704] kunit_try_run_case+0x175/0x440 [ 178.146707] ? __pfx_kunit_try_run_case+0x10/0x10 [ 178.146709] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 178.146713] ? __pfx_kunit_try_run_case+0x10/0x10 [ 178.146716] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 178.146719] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 178.146722] kthread+0x3b4/0x780 [ 178.146725] ? __pfx_kthread+0x10/0x10 [ 178.146728] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 178.146731] ? __pfx_kthread+0x10/0x10 [ 178.146735] ret_from_fork+0x30/0x70 [ 178.146738] ? __pfx_kthread+0x10/0x10 [ 178.146740] ret_from_fork_asm+0x1a/0x30 [ 178.146745] [ 178.359098] Allocated by task 3930: [ 178.363258] kasan_save_stack+0x1c/0x40 [ 178.367768] kasan_save_track+0x10/0x30 [ 178.372276] __kasan_kmalloc+0xa6/0xb0 [ 178.376697] kasan_atomics+0x91/0x2d0 [kasan_test] [ 178.382163] kunit_try_run_case+0x175/0x440 [ 178.387030] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 178.393096] kthread+0x3b4/0x780 [ 178.396999] ret_from_fork+0x30/0x70 [ 178.401252] ret_from_fork_asm+0x1a/0x30 [ 178.408033] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 178.421704] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 178.438068] The buggy address belongs to the physical page: [ 178.444313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 178.452971] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 178.460592] page_type: f5(slab) [ 178.464411] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 178.472811] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 178.481208] page dumped because: kasan: bad access detected [ 178.489618] Memory state around the buggy address: [ 178.495076] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 178.502956] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 178.510836] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 178.518715] ^ [ 178.524174] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 178.532066] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 178.539956] ================================================================== [ 178.547864] ================================================================== [ 178.555749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18cf/0x5400 [kasan_test] [ 178.564932] Write of size 8 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 178.575259] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 178.575264] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 178.575266] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 178.575267] Call Trace: [ 178.575269] [ 178.575270] dump_stack_lvl+0x4f/0x70 [ 178.575274] print_address_description.constprop.0+0x2c/0x3b0 [ 178.575278] ? kasan_atomics_helper+0x18cf/0x5400 [kasan_test] [ 178.575287] print_report+0xb9/0x280 [ 178.575290] ? kasan_atomics_helper+0x18cf/0x5400 [kasan_test] [ 178.575298] ? kasan_addr_to_slab+0x9/0x90 [ 178.575301] ? kasan_atomics_helper+0x18cf/0x5400 [kasan_test] [ 178.575309] kasan_report+0xda/0x110 [ 178.575312] ? kasan_atomics_helper+0x18cf/0x5400 [kasan_test] [ 178.575321] kasan_check_range+0xfc/0x1b0 [ 178.575324] kasan_atomics_helper+0x18cf/0x5400 [kasan_test] [ 178.575332] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 178.575340] ? __kasan_slab_alloc+0x4a/0x90 [ 178.575344] ? __kmalloc_cache_noprof+0x158/0x430 [ 178.575346] ? pick_next_task_fair+0x51/0xba0 [ 178.575350] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 178.575359] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 178.575368] ? __schedule+0x757/0x1420 [ 178.575371] ? __pfx_read_tsc+0x10/0x10 [ 178.575373] ? ktime_get_ts64+0x7f/0x220 [ 178.575376] kunit_try_run_case+0x175/0x440 [ 178.575379] ? __pfx_kunit_try_run_case+0x10/0x10 [ 178.575382] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 178.575385] ? __pfx_kunit_try_run_case+0x10/0x10 [ 178.575387] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 178.575391] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 178.575394] kthread+0x3b4/0x780 [ 178.575397] ? __pfx_kthread+0x10/0x10 [ 178.575400] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 178.575403] ? __pfx_kthread+0x10/0x10 [ 178.575406] ret_from_fork+0x30/0x70 [ 178.575409] ? __pfx_kthread+0x10/0x10 [ 178.575412] ret_from_fork_asm+0x1a/0x30 [ 178.575416] [ 178.787749] Allocated by task 3930: [ 178.791913] kasan_save_stack+0x1c/0x40 [ 178.796425] kasan_save_track+0x10/0x30 [ 178.800933] __kasan_kmalloc+0xa6/0xb0 [ 178.805357] kasan_atomics+0x91/0x2d0 [kasan_test] [ 178.810823] kunit_try_run_case+0x175/0x440 [ 178.815679] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 178.821745] kthread+0x3b4/0x780 [ 178.825650] ret_from_fork+0x30/0x70 [ 178.829901] ret_from_fork_asm+0x1a/0x30 [ 178.836671] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 178.850343] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 178.866705] The buggy address belongs to the physical page: [ 178.872940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 178.881600] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 178.889222] page_type: f5(slab) [ 178.893042] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 178.901452] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 178.909850] page dumped because: kasan: bad access detected [ 178.918263] Memory state around the buggy address: [ 178.923720] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 178.931601] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 178.939480] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 178.947363] ^ [ 178.952826] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 178.960708] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 178.968589] ================================================================== [ 178.976478] ================================================================== [ 178.984376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1967/0x5400 [kasan_test] [ 178.993560] Write of size 8 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 179.003879] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 179.003885] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 179.003886] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 179.003888] Call Trace: [ 179.003890] [ 179.003891] dump_stack_lvl+0x4f/0x70 [ 179.003895] print_address_description.constprop.0+0x2c/0x3b0 [ 179.003900] ? kasan_atomics_helper+0x1967/0x5400 [kasan_test] [ 179.003908] print_report+0xb9/0x280 [ 179.003912] ? kasan_atomics_helper+0x1967/0x5400 [kasan_test] [ 179.003919] ? kasan_addr_to_slab+0x9/0x90 [ 179.003923] ? kasan_atomics_helper+0x1967/0x5400 [kasan_test] [ 179.003930] kasan_report+0xda/0x110 [ 179.003934] ? kasan_atomics_helper+0x1967/0x5400 [kasan_test] [ 179.003943] kasan_check_range+0xfc/0x1b0 [ 179.003946] kasan_atomics_helper+0x1967/0x5400 [kasan_test] [ 179.003955] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 179.003963] ? __kasan_slab_alloc+0x4a/0x90 [ 179.003966] ? __kmalloc_cache_noprof+0x158/0x430 [ 179.003969] ? pick_next_task_fair+0x51/0xba0 [ 179.003973] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 179.003981] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 179.003990] ? __schedule+0x757/0x1420 [ 179.003993] ? __pfx_read_tsc+0x10/0x10 [ 179.003996] ? ktime_get_ts64+0x7f/0x220 [ 179.003999] kunit_try_run_case+0x175/0x440 [ 179.004001] ? __pfx_kunit_try_run_case+0x10/0x10 [ 179.004004] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 179.004008] ? __pfx_kunit_try_run_case+0x10/0x10 [ 179.004010] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 179.004014] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 179.004030] kthread+0x3b4/0x780 [ 179.004034] ? __pfx_kthread+0x10/0x10 [ 179.004037] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 179.004041] ? __pfx_kthread+0x10/0x10 [ 179.004044] ret_from_fork+0x30/0x70 [ 179.004047] ? __pfx_kthread+0x10/0x10 [ 179.004050] ret_from_fork_asm+0x1a/0x30 [ 179.004064] [ 179.216454] Allocated by task 3930: [ 179.220617] kasan_save_stack+0x1c/0x40 [ 179.225128] kasan_save_track+0x10/0x30 [ 179.229639] __kasan_kmalloc+0xa6/0xb0 [ 179.234069] kasan_atomics+0x91/0x2d0 [kasan_test] [ 179.239545] kunit_try_run_case+0x175/0x440 [ 179.244401] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 179.250467] kthread+0x3b4/0x780 [ 179.254372] ret_from_fork+0x30/0x70 [ 179.258620] ret_from_fork_asm+0x1a/0x30 [ 179.265391] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 179.279069] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 179.295440] The buggy address belongs to the physical page: [ 179.301677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 179.310338] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 179.317959] page_type: f5(slab) [ 179.321778] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 179.330178] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 179.338580] page dumped because: kasan: bad access detected [ 179.346994] Memory state around the buggy address: [ 179.352454] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 179.360336] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 179.368214] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 179.376094] ^ [ 179.381554] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 179.389434] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 179.397313] ================================================================== [ 179.405200] ================================================================== [ 179.413097] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a02/0x5400 [kasan_test] [ 179.422280] Write of size 8 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 179.432592] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 179.432597] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 179.432599] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 179.432601] Call Trace: [ 179.432602] [ 179.432603] dump_stack_lvl+0x4f/0x70 [ 179.432607] print_address_description.constprop.0+0x2c/0x3b0 [ 179.432611] ? kasan_atomics_helper+0x1a02/0x5400 [kasan_test] [ 179.432620] print_report+0xb9/0x280 [ 179.432623] ? kasan_atomics_helper+0x1a02/0x5400 [kasan_test] [ 179.432631] ? kasan_addr_to_slab+0x9/0x90 [ 179.432635] ? kasan_atomics_helper+0x1a02/0x5400 [kasan_test] [ 179.432643] kasan_report+0xda/0x110 [ 179.432646] ? kasan_atomics_helper+0x1a02/0x5400 [kasan_test] [ 179.432655] kasan_check_range+0xfc/0x1b0 [ 179.432657] kasan_atomics_helper+0x1a02/0x5400 [kasan_test] [ 179.432666] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 179.432674] ? __kasan_slab_alloc+0x4a/0x90 [ 179.432677] ? __kmalloc_cache_noprof+0x158/0x430 [ 179.432680] ? pick_next_task_fair+0x51/0xba0 [ 179.432684] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 179.432693] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 179.432701] ? __schedule+0x757/0x1420 [ 179.432704] ? __pfx_read_tsc+0x10/0x10 [ 179.432706] ? ktime_get_ts64+0x7f/0x220 [ 179.432709] kunit_try_run_case+0x175/0x440 [ 179.432712] ? __pfx_kunit_try_run_case+0x10/0x10 [ 179.432715] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 179.432718] ? __pfx_kunit_try_run_case+0x10/0x10 [ 179.432720] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 179.432723] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 179.432727] kthread+0x3b4/0x780 [ 179.432730] ? __pfx_kthread+0x10/0x10 [ 179.432733] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 179.432736] ? __pfx_kthread+0x10/0x10 [ 179.432739] ret_from_fork+0x30/0x70 [ 179.432742] ? __pfx_kthread+0x10/0x10 [ 179.432745] ret_from_fork_asm+0x1a/0x30 [ 179.432749] [ 179.645148] Allocated by task 3930: [ 179.649312] kasan_save_stack+0x1c/0x40 [ 179.653820] kasan_save_track+0x10/0x30 [ 179.658331] __kasan_kmalloc+0xa6/0xb0 [ 179.662755] kasan_atomics+0x91/0x2d0 [kasan_test] [ 179.668222] kunit_try_run_case+0x175/0x440 [ 179.673088] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 179.679155] kthread+0x3b4/0x780 [ 179.683068] ret_from_fork+0x30/0x70 [ 179.687328] ret_from_fork_asm+0x1a/0x30 [ 179.694101] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 179.707773] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 179.724138] The buggy address belongs to the physical page: [ 179.730375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 179.739040] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 179.746662] page_type: f5(slab) [ 179.750481] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 179.758879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 179.767279] page dumped because: kasan: bad access detected [ 179.775691] Memory state around the buggy address: [ 179.781151] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 179.789038] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 179.796918] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 179.804798] ^ [ 179.810256] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 179.818135] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 179.826014] ================================================================== [ 179.833915] ================================================================== [ 179.841811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1aa4/0x5400 [kasan_test] [ 179.850993] Write of size 8 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 179.861308] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 179.861313] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 179.861315] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 179.861316] Call Trace: [ 179.861318] [ 179.861319] dump_stack_lvl+0x4f/0x70 [ 179.861323] print_address_description.constprop.0+0x2c/0x3b0 [ 179.861327] ? kasan_atomics_helper+0x1aa4/0x5400 [kasan_test] [ 179.861335] print_report+0xb9/0x280 [ 179.861339] ? kasan_atomics_helper+0x1aa4/0x5400 [kasan_test] [ 179.861347] ? kasan_addr_to_slab+0x9/0x90 [ 179.861350] ? kasan_atomics_helper+0x1aa4/0x5400 [kasan_test] [ 179.861358] kasan_report+0xda/0x110 [ 179.861362] ? kasan_atomics_helper+0x1aa4/0x5400 [kasan_test] [ 179.861371] kasan_check_range+0xfc/0x1b0 [ 179.861373] kasan_atomics_helper+0x1aa4/0x5400 [kasan_test] [ 179.861382] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 179.861390] ? __kasan_slab_alloc+0x4a/0x90 [ 179.861393] ? __kmalloc_cache_noprof+0x158/0x430 [ 179.861396] ? pick_next_task_fair+0x51/0xba0 [ 179.861400] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 179.861408] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 179.861417] ? __schedule+0x757/0x1420 [ 179.861419] ? __pfx_read_tsc+0x10/0x10 [ 179.861422] ? ktime_get_ts64+0x7f/0x220 [ 179.861425] kunit_try_run_case+0x175/0x440 [ 179.861428] ? __pfx_kunit_try_run_case+0x10/0x10 [ 179.861431] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 179.861434] ? __pfx_kunit_try_run_case+0x10/0x10 [ 179.861436] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 179.861439] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 179.861442] kthread+0x3b4/0x780 [ 179.861446] ? __pfx_kthread+0x10/0x10 [ 179.861448] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 179.861452] ? __pfx_kthread+0x10/0x10 [ 179.861455] ret_from_fork+0x30/0x70 [ 179.861458] ? __pfx_kthread+0x10/0x10 [ 179.861461] ret_from_fork_asm+0x1a/0x30 [ 179.861465] [ 180.073807] Allocated by task 3930: [ 180.077971] kasan_save_stack+0x1c/0x40 [ 180.082482] kasan_save_track+0x10/0x30 [ 180.086992] __kasan_kmalloc+0xa6/0xb0 [ 180.091415] kasan_atomics+0x91/0x2d0 [kasan_test] [ 180.096884] kunit_try_run_case+0x175/0x440 [ 180.101737] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 180.107804] kthread+0x3b4/0x780 [ 180.111712] ret_from_fork+0x30/0x70 [ 180.115962] ret_from_fork_asm+0x1a/0x30 [ 180.122735] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 180.136407] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 180.152772] The buggy address belongs to the physical page: [ 180.159006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 180.167664] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 180.175286] page_type: f5(slab) [ 180.179104] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 180.187505] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 180.195906] page dumped because: kasan: bad access detected [ 180.204317] Memory state around the buggy address: [ 180.209778] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 180.217659] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 180.225541] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 180.233422] ^ [ 180.238881] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 180.246760] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 180.254640] ================================================================== [ 180.262529] ================================================================== [ 180.270426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b7f/0x5400 [kasan_test] [ 180.279609] Write of size 8 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 180.289924] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 180.289930] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 180.289931] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 180.289933] Call Trace: [ 180.289934] [ 180.289936] dump_stack_lvl+0x4f/0x70 [ 180.289940] print_address_description.constprop.0+0x2c/0x3b0 [ 180.289944] ? kasan_atomics_helper+0x1b7f/0x5400 [kasan_test] [ 180.289952] print_report+0xb9/0x280 [ 180.289956] ? kasan_atomics_helper+0x1b7f/0x5400 [kasan_test] [ 180.289964] ? kasan_addr_to_slab+0x9/0x90 [ 180.289967] ? kasan_atomics_helper+0x1b7f/0x5400 [kasan_test] [ 180.289975] kasan_report+0xda/0x110 [ 180.289978] ? kasan_atomics_helper+0x1b7f/0x5400 [kasan_test] [ 180.289987] kasan_check_range+0xfc/0x1b0 [ 180.289990] kasan_atomics_helper+0x1b7f/0x5400 [kasan_test] [ 180.289999] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 180.290006] ? __kasan_slab_alloc+0x4a/0x90 [ 180.290010] ? __kmalloc_cache_noprof+0x158/0x430 [ 180.290013] ? pick_next_task_fair+0x51/0xba0 [ 180.290029] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 180.290039] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 180.290047] ? __schedule+0x757/0x1420 [ 180.290059] ? __pfx_read_tsc+0x10/0x10 [ 180.290062] ? ktime_get_ts64+0x7f/0x220 [ 180.290065] kunit_try_run_case+0x175/0x440 [ 180.290068] ? __pfx_kunit_try_run_case+0x10/0x10 [ 180.290071] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 180.290074] ? __pfx_kunit_try_run_case+0x10/0x10 [ 180.290076] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 180.290080] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 180.290083] kthread+0x3b4/0x780 [ 180.290086] ? __pfx_kthread+0x10/0x10 [ 180.290089] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 180.290092] ? __pfx_kthread+0x10/0x10 [ 180.290095] ret_from_fork+0x30/0x70 [ 180.290099] ? __pfx_kthread+0x10/0x10 [ 180.290102] ret_from_fork_asm+0x1a/0x30 [ 180.290106] [ 180.502439] Allocated by task 3930: [ 180.506601] kasan_save_stack+0x1c/0x40 [ 180.511113] kasan_save_track+0x10/0x30 [ 180.515623] __kasan_kmalloc+0xa6/0xb0 [ 180.520045] kasan_atomics+0x91/0x2d0 [kasan_test] [ 180.525520] kunit_try_run_case+0x175/0x440 [ 180.530376] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 180.536441] kthread+0x3b4/0x780 [ 180.540345] ret_from_fork+0x30/0x70 [ 180.544597] ret_from_fork_asm+0x1a/0x30 [ 180.551366] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 180.565038] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 180.581405] The buggy address belongs to the physical page: [ 180.587642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 180.596299] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 180.603921] page_type: f5(slab) [ 180.607740] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 180.616137] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 180.624534] page dumped because: kasan: bad access detected [ 180.632947] Memory state around the buggy address: [ 180.638405] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 180.646285] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 180.654165] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 180.662044] ^ [ 180.667511] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 180.675393] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 180.683272] ================================================================== [ 180.691163] ================================================================== [ 180.699067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f01/0x5400 [kasan_test] [ 180.708251] Read of size 8 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 180.718482] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 180.718488] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 180.718489] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 180.718491] Call Trace: [ 180.718492] [ 180.718494] dump_stack_lvl+0x4f/0x70 [ 180.718497] print_address_description.constprop.0+0x2c/0x3b0 [ 180.718501] ? kasan_atomics_helper+0x4f01/0x5400 [kasan_test] [ 180.718509] print_report+0xb9/0x280 [ 180.718513] ? kasan_atomics_helper+0x4f01/0x5400 [kasan_test] [ 180.718521] ? kasan_addr_to_slab+0x9/0x90 [ 180.718524] ? kasan_atomics_helper+0x4f01/0x5400 [kasan_test] [ 180.718532] kasan_report+0xda/0x110 [ 180.718535] ? kasan_atomics_helper+0x4f01/0x5400 [kasan_test] [ 180.718544] kasan_atomics_helper+0x4f01/0x5400 [kasan_test] [ 180.718553] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 180.718561] ? __kasan_slab_alloc+0x4a/0x90 [ 180.718564] ? __kmalloc_cache_noprof+0x158/0x430 [ 180.718567] ? pick_next_task_fair+0x51/0xba0 [ 180.718570] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 180.718579] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 180.718588] ? __schedule+0x757/0x1420 [ 180.718590] ? __pfx_read_tsc+0x10/0x10 [ 180.718593] ? ktime_get_ts64+0x7f/0x220 [ 180.718596] kunit_try_run_case+0x175/0x440 [ 180.718599] ? __pfx_kunit_try_run_case+0x10/0x10 [ 180.718601] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 180.718605] ? __pfx_kunit_try_run_case+0x10/0x10 [ 180.718607] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 180.718610] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 180.718614] kthread+0x3b4/0x780 [ 180.718617] ? __pfx_kthread+0x10/0x10 [ 180.718620] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 180.718623] ? __pfx_kthread+0x10/0x10 [ 180.718626] ret_from_fork+0x30/0x70 [ 180.718629] ? __pfx_kthread+0x10/0x10 [ 180.718632] ret_from_fork_asm+0x1a/0x30 [ 180.718636] [ 180.926292] Allocated by task 3930: [ 180.930456] kasan_save_stack+0x1c/0x40 [ 180.934968] kasan_save_track+0x10/0x30 [ 180.939480] __kasan_kmalloc+0xa6/0xb0 [ 180.943905] kasan_atomics+0x91/0x2d0 [kasan_test] [ 180.949373] kunit_try_run_case+0x175/0x440 [ 180.954230] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 180.960299] kthread+0x3b4/0x780 [ 180.964208] ret_from_fork+0x30/0x70 [ 180.968463] ret_from_fork_asm+0x1a/0x30 [ 180.975240] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 180.988914] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 181.005279] The buggy address belongs to the physical page: [ 181.011516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 181.020175] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 181.027797] page_type: f5(slab) [ 181.031618] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 181.040031] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 181.048428] page dumped because: kasan: bad access detected [ 181.056840] Memory state around the buggy address: [ 181.062301] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 181.070181] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 181.078070] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 181.085950] ^ [ 181.091412] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 181.099293] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 181.107175] ================================================================== [ 181.115078] ================================================================== [ 181.122976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c40/0x5400 [kasan_test] [ 181.132163] Write of size 8 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 181.142479] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 181.142485] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 181.142486] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 181.142488] Call Trace: [ 181.142490] [ 181.142491] dump_stack_lvl+0x4f/0x70 [ 181.142495] print_address_description.constprop.0+0x2c/0x3b0 [ 181.142499] ? kasan_atomics_helper+0x1c40/0x5400 [kasan_test] [ 181.142508] print_report+0xb9/0x280 [ 181.142511] ? kasan_atomics_helper+0x1c40/0x5400 [kasan_test] [ 181.142519] ? kasan_addr_to_slab+0x9/0x90 [ 181.142522] ? kasan_atomics_helper+0x1c40/0x5400 [kasan_test] [ 181.142530] kasan_report+0xda/0x110 [ 181.142534] ? kasan_atomics_helper+0x1c40/0x5400 [kasan_test] [ 181.142542] kasan_check_range+0xfc/0x1b0 [ 181.142545] kasan_atomics_helper+0x1c40/0x5400 [kasan_test] [ 181.142554] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 181.142562] ? __kasan_slab_alloc+0x4a/0x90 [ 181.142565] ? __kmalloc_cache_noprof+0x158/0x430 [ 181.142568] ? pick_next_task_fair+0x51/0xba0 [ 181.142572] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 181.142580] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 181.142589] ? __schedule+0x757/0x1420 [ 181.142591] ? __pfx_read_tsc+0x10/0x10 [ 181.142594] ? ktime_get_ts64+0x7f/0x220 [ 181.142597] kunit_try_run_case+0x175/0x440 [ 181.142600] ? __pfx_kunit_try_run_case+0x10/0x10 [ 181.142603] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 181.142606] ? __pfx_kunit_try_run_case+0x10/0x10 [ 181.142609] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 181.142612] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 181.142615] kthread+0x3b4/0x780 [ 181.142618] ? __pfx_kthread+0x10/0x10 [ 181.142621] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 181.142625] ? __pfx_kthread+0x10/0x10 [ 181.142628] ret_from_fork+0x30/0x70 [ 181.142631] ? __pfx_kthread+0x10/0x10 [ 181.142634] ret_from_fork_asm+0x1a/0x30 [ 181.142638] [ 181.354984] Allocated by task 3930: [ 181.359149] kasan_save_stack+0x1c/0x40 [ 181.363659] kasan_save_track+0x10/0x30 [ 181.368171] __kasan_kmalloc+0xa6/0xb0 [ 181.372595] kasan_atomics+0x91/0x2d0 [kasan_test] [ 181.378068] kunit_try_run_case+0x175/0x440 [ 181.382923] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 181.388990] kthread+0x3b4/0x780 [ 181.392896] ret_from_fork+0x30/0x70 [ 181.397145] ret_from_fork_asm+0x1a/0x30 [ 181.403916] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 181.417590] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 181.433959] The buggy address belongs to the physical page: [ 181.440199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 181.448856] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 181.456481] page_type: f5(slab) [ 181.460301] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 181.468702] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 181.477102] page dumped because: kasan: bad access detected [ 181.485513] Memory state around the buggy address: [ 181.490974] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 181.498854] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 181.506737] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 181.514619] ^ [ 181.520081] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 181.527963] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 181.535845] ================================================================== [ 181.543738] ================================================================== [ 181.551636] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1cd8/0x5400 [kasan_test] [ 181.560820] Write of size 8 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 181.571142] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 181.571148] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 181.571149] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 181.571151] Call Trace: [ 181.571152] [ 181.571154] dump_stack_lvl+0x4f/0x70 [ 181.571157] print_address_description.constprop.0+0x2c/0x3b0 [ 181.571162] ? kasan_atomics_helper+0x1cd8/0x5400 [kasan_test] [ 181.571170] print_report+0xb9/0x280 [ 181.571174] ? kasan_atomics_helper+0x1cd8/0x5400 [kasan_test] [ 181.571182] ? kasan_addr_to_slab+0x9/0x90 [ 181.571185] ? kasan_atomics_helper+0x1cd8/0x5400 [kasan_test] [ 181.571193] kasan_report+0xda/0x110 [ 181.571196] ? kasan_atomics_helper+0x1cd8/0x5400 [kasan_test] [ 181.571205] kasan_check_range+0xfc/0x1b0 [ 181.571208] kasan_atomics_helper+0x1cd8/0x5400 [kasan_test] [ 181.571216] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 181.571225] ? __kasan_slab_alloc+0x4a/0x90 [ 181.571228] ? __kmalloc_cache_noprof+0x158/0x430 [ 181.571231] ? pick_next_task_fair+0x51/0xba0 [ 181.571234] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 181.571243] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 181.571252] ? __schedule+0x757/0x1420 [ 181.571254] ? __pfx_read_tsc+0x10/0x10 [ 181.571257] ? ktime_get_ts64+0x7f/0x220 [ 181.571260] kunit_try_run_case+0x175/0x440 [ 181.571263] ? __pfx_kunit_try_run_case+0x10/0x10 [ 181.571265] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 181.571269] ? __pfx_kunit_try_run_case+0x10/0x10 [ 181.571271] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 181.571274] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 181.571277] kthread+0x3b4/0x780 [ 181.571280] ? __pfx_kthread+0x10/0x10 [ 181.571283] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 181.571286] ? __pfx_kthread+0x10/0x10 [ 181.571290] ret_from_fork+0x30/0x70 [ 181.571293] ? __pfx_kthread+0x10/0x10 [ 181.571295] ret_from_fork_asm+0x1a/0x30 [ 181.571300] [ 181.783687] Allocated by task 3930: [ 181.787851] kasan_save_stack+0x1c/0x40 [ 181.792363] kasan_save_track+0x10/0x30 [ 181.796874] __kasan_kmalloc+0xa6/0xb0 [ 181.801299] kasan_atomics+0x91/0x2d0 [kasan_test] [ 181.806764] kunit_try_run_case+0x175/0x440 [ 181.811621] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 181.817687] kthread+0x3b4/0x780 [ 181.821594] ret_from_fork+0x30/0x70 [ 181.825846] ret_from_fork_asm+0x1a/0x30 [ 181.832618] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 181.846290] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 181.862655] The buggy address belongs to the physical page: [ 181.868893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 181.877554] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 181.885178] page_type: f5(slab) [ 181.888998] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 181.897400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 181.905801] page dumped because: kasan: bad access detected [ 181.914214] Memory state around the buggy address: [ 181.919674] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 181.927554] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 181.935437] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 181.943317] ^ [ 181.948780] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 181.956659] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 181.964542] ================================================================== [ 181.972440] ================================================================== [ 181.980339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d6f/0x5400 [kasan_test] [ 181.989524] Write of size 8 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 181.999840] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 181.999846] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 181.999847] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 181.999849] Call Trace: [ 181.999851] [ 181.999852] dump_stack_lvl+0x4f/0x70 [ 181.999856] print_address_description.constprop.0+0x2c/0x3b0 [ 181.999860] ? kasan_atomics_helper+0x1d6f/0x5400 [kasan_test] [ 181.999869] print_report+0xb9/0x280 [ 181.999872] ? kasan_atomics_helper+0x1d6f/0x5400 [kasan_test] [ 181.999880] ? kasan_addr_to_slab+0x9/0x90 [ 181.999884] ? kasan_atomics_helper+0x1d6f/0x5400 [kasan_test] [ 181.999892] kasan_report+0xda/0x110 [ 181.999895] ? kasan_atomics_helper+0x1d6f/0x5400 [kasan_test] [ 181.999904] kasan_check_range+0xfc/0x1b0 [ 181.999907] kasan_atomics_helper+0x1d6f/0x5400 [kasan_test] [ 181.999916] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 181.999924] ? __kasan_slab_alloc+0x4a/0x90 [ 181.999927] ? __kmalloc_cache_noprof+0x158/0x430 [ 181.999930] ? pick_next_task_fair+0x51/0xba0 [ 181.999934] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 181.999942] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 181.999951] ? __schedule+0x757/0x1420 [ 181.999954] ? __pfx_read_tsc+0x10/0x10 [ 181.999956] ? ktime_get_ts64+0x7f/0x220 [ 181.999960] kunit_try_run_case+0x175/0x440 [ 181.999963] ? __pfx_kunit_try_run_case+0x10/0x10 [ 181.999965] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 181.999969] ? __pfx_kunit_try_run_case+0x10/0x10 [ 181.999971] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 181.999974] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 181.999977] kthread+0x3b4/0x780 [ 181.999981] ? __pfx_kthread+0x10/0x10 [ 181.999984] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 181.999987] ? __pfx_kthread+0x10/0x10 [ 181.999990] ret_from_fork+0x30/0x70 [ 181.999993] ? __pfx_kthread+0x10/0x10 [ 181.999996] ret_from_fork_asm+0x1a/0x30 [ 182.000000] [ 182.212400] Allocated by task 3930: [ 182.216564] kasan_save_stack+0x1c/0x40 [ 182.221085] kasan_save_track+0x10/0x30 [ 182.225597] __kasan_kmalloc+0xa6/0xb0 [ 182.230034] kasan_atomics+0x91/0x2d0 [kasan_test] [ 182.235511] kunit_try_run_case+0x175/0x440 [ 182.240368] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 182.246434] kthread+0x3b4/0x780 [ 182.250341] ret_from_fork+0x30/0x70 [ 182.254592] ret_from_fork_asm+0x1a/0x30 [ 182.261366] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 182.275042] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 182.291419] The buggy address belongs to the physical page: [ 182.297656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 182.306316] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 182.313939] page_type: f5(slab) [ 182.317759] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 182.326160] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 182.334560] page dumped because: kasan: bad access detected [ 182.342974] Memory state around the buggy address: [ 182.348436] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 182.356317] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 182.364198] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 182.372080] ^ [ 182.377541] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 182.385422] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 182.393305] ================================================================== [ 182.401196] ================================================================== [ 182.409092] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e06/0x5400 [kasan_test] [ 182.418277] Write of size 8 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 182.428596] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 182.428601] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 182.428603] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 182.428604] Call Trace: [ 182.428606] [ 182.428607] dump_stack_lvl+0x4f/0x70 [ 182.428611] print_address_description.constprop.0+0x2c/0x3b0 [ 182.428615] ? kasan_atomics_helper+0x1e06/0x5400 [kasan_test] [ 182.428623] print_report+0xb9/0x280 [ 182.428627] ? kasan_atomics_helper+0x1e06/0x5400 [kasan_test] [ 182.428635] ? kasan_addr_to_slab+0x9/0x90 [ 182.428638] ? kasan_atomics_helper+0x1e06/0x5400 [kasan_test] [ 182.428646] kasan_report+0xda/0x110 [ 182.428650] ? kasan_atomics_helper+0x1e06/0x5400 [kasan_test] [ 182.428658] kasan_check_range+0xfc/0x1b0 [ 182.428661] kasan_atomics_helper+0x1e06/0x5400 [kasan_test] [ 182.428669] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 182.428677] ? __kasan_slab_alloc+0x4a/0x90 [ 182.428681] ? __kmalloc_cache_noprof+0x158/0x430 [ 182.428683] ? pick_next_task_fair+0x51/0xba0 [ 182.428687] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 182.428696] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 182.428704] ? __schedule+0x757/0x1420 [ 182.428707] ? __pfx_read_tsc+0x10/0x10 [ 182.428709] ? ktime_get_ts64+0x7f/0x220 [ 182.428713] kunit_try_run_case+0x175/0x440 [ 182.428716] ? __pfx_kunit_try_run_case+0x10/0x10 [ 182.428718] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 182.428722] ? __pfx_kunit_try_run_case+0x10/0x10 [ 182.428724] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 182.428727] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 182.428730] kthread+0x3b4/0x780 [ 182.428733] ? __pfx_kthread+0x10/0x10 [ 182.428736] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 182.428739] ? __pfx_kthread+0x10/0x10 [ 182.428742] ret_from_fork+0x30/0x70 [ 182.428745] ? __pfx_kthread+0x10/0x10 [ 182.428748] ret_from_fork_asm+0x1a/0x30 [ 182.428753] [ 182.641176] Allocated by task 3930: [ 182.645339] kasan_save_stack+0x1c/0x40 [ 182.649851] kasan_save_track+0x10/0x30 [ 182.654362] __kasan_kmalloc+0xa6/0xb0 [ 182.658786] kasan_atomics+0x91/0x2d0 [kasan_test] [ 182.664254] kunit_try_run_case+0x175/0x440 [ 182.669111] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 182.675178] kthread+0x3b4/0x780 [ 182.679085] ret_from_fork+0x30/0x70 [ 182.683337] ret_from_fork_asm+0x1a/0x30 [ 182.690110] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 182.703783] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 182.720152] The buggy address belongs to the physical page: [ 182.726388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 182.735047] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 182.742678] page_type: f5(slab) [ 182.746497] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 182.754898] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 182.763298] page dumped because: kasan: bad access detected [ 182.771711] Memory state around the buggy address: [ 182.777173] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 182.785062] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 182.792953] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 182.800833] ^ [ 182.806292] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 182.814170] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 182.822053] ================================================================== [ 182.829951] ================================================================== [ 182.837849] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e9e/0x5400 [kasan_test] [ 182.847042] Write of size 8 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 182.857361] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 182.857366] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 182.857367] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 182.857369] Call Trace: [ 182.857370] [ 182.857372] dump_stack_lvl+0x4f/0x70 [ 182.857375] print_address_description.constprop.0+0x2c/0x3b0 [ 182.857380] ? kasan_atomics_helper+0x1e9e/0x5400 [kasan_test] [ 182.857388] print_report+0xb9/0x280 [ 182.857392] ? kasan_atomics_helper+0x1e9e/0x5400 [kasan_test] [ 182.857399] ? kasan_addr_to_slab+0x9/0x90 [ 182.857402] ? kasan_atomics_helper+0x1e9e/0x5400 [kasan_test] [ 182.857410] kasan_report+0xda/0x110 [ 182.857414] ? kasan_atomics_helper+0x1e9e/0x5400 [kasan_test] [ 182.857422] kasan_check_range+0xfc/0x1b0 [ 182.857425] kasan_atomics_helper+0x1e9e/0x5400 [kasan_test] [ 182.857434] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 182.857441] ? __kasan_slab_alloc+0x4a/0x90 [ 182.857445] ? __kmalloc_cache_noprof+0x158/0x430 [ 182.857447] ? pick_next_task_fair+0x51/0xba0 [ 182.857451] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 182.857460] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 182.857468] ? __schedule+0x757/0x1420 [ 182.857471] ? __pfx_read_tsc+0x10/0x10 [ 182.857473] ? ktime_get_ts64+0x7f/0x220 [ 182.857476] kunit_try_run_case+0x175/0x440 [ 182.857479] ? __pfx_kunit_try_run_case+0x10/0x10 [ 182.857482] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 182.857485] ? __pfx_kunit_try_run_case+0x10/0x10 [ 182.857487] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 182.857490] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 182.857494] kthread+0x3b4/0x780 [ 182.857497] ? __pfx_kthread+0x10/0x10 [ 182.857500] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 182.857503] ? __pfx_kthread+0x10/0x10 [ 182.857506] ret_from_fork+0x30/0x70 [ 182.857509] ? __pfx_kthread+0x10/0x10 [ 182.857512] ret_from_fork_asm+0x1a/0x30 [ 182.857516] [ 183.069885] Allocated by task 3930: [ 183.074059] kasan_save_stack+0x1c/0x40 [ 183.078573] kasan_save_track+0x10/0x30 [ 183.083085] __kasan_kmalloc+0xa6/0xb0 [ 183.087509] kasan_atomics+0x91/0x2d0 [kasan_test] [ 183.092978] kunit_try_run_case+0x175/0x440 [ 183.097833] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 183.103901] kthread+0x3b4/0x780 [ 183.107808] ret_from_fork+0x30/0x70 [ 183.112066] ret_from_fork_asm+0x1a/0x30 [ 183.118848] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 183.132520] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 183.148889] The buggy address belongs to the physical page: [ 183.155127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 183.163788] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 183.171412] page_type: f5(slab) [ 183.175230] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 183.183628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 183.192038] page dumped because: kasan: bad access detected [ 183.200450] Memory state around the buggy address: [ 183.205912] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 183.213793] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 183.221672] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 183.229552] ^ [ 183.235010] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 183.242901] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 183.250781] ================================================================== [ 183.258671] ================================================================== [ 183.266569] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f42/0x5400 [kasan_test] [ 183.275752] Read of size 8 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 183.285985] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 183.285990] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 183.285992] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 183.285994] Call Trace: [ 183.285995] [ 183.285997] dump_stack_lvl+0x4f/0x70 [ 183.286001] print_address_description.constprop.0+0x2c/0x3b0 [ 183.286005] ? kasan_atomics_helper+0x4f42/0x5400 [kasan_test] [ 183.286015] print_report+0xb9/0x280 [ 183.286031] ? kasan_atomics_helper+0x4f42/0x5400 [kasan_test] [ 183.286040] ? kasan_addr_to_slab+0x9/0x90 [ 183.286043] ? kasan_atomics_helper+0x4f42/0x5400 [kasan_test] [ 183.286061] kasan_report+0xda/0x110 [ 183.286065] ? kasan_atomics_helper+0x4f42/0x5400 [kasan_test] [ 183.286082] kasan_atomics_helper+0x4f42/0x5400 [kasan_test] [ 183.286091] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 183.286099] ? __kasan_slab_alloc+0x4a/0x90 [ 183.286103] ? __kmalloc_cache_noprof+0x158/0x430 [ 183.286105] ? pick_next_task_fair+0x51/0xba0 [ 183.286109] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 183.286118] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 183.286126] ? __schedule+0x757/0x1420 [ 183.286129] ? __pfx_read_tsc+0x10/0x10 [ 183.286132] ? ktime_get_ts64+0x7f/0x220 [ 183.286135] kunit_try_run_case+0x175/0x440 [ 183.286138] ? __pfx_kunit_try_run_case+0x10/0x10 [ 183.286141] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 183.286144] ? __pfx_kunit_try_run_case+0x10/0x10 [ 183.286147] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 183.286150] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 183.286153] kthread+0x3b4/0x780 [ 183.286156] ? __pfx_kthread+0x10/0x10 [ 183.286159] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 183.286163] ? __pfx_kthread+0x10/0x10 [ 183.286166] ret_from_fork+0x30/0x70 [ 183.286169] ? __pfx_kthread+0x10/0x10 [ 183.286171] ret_from_fork_asm+0x1a/0x30 [ 183.286176] [ 183.493860] Allocated by task 3930: [ 183.498036] kasan_save_stack+0x1c/0x40 [ 183.502548] kasan_save_track+0x10/0x30 [ 183.507067] __kasan_kmalloc+0xa6/0xb0 [ 183.511500] kasan_atomics+0x91/0x2d0 [kasan_test] [ 183.516965] kunit_try_run_case+0x175/0x440 [ 183.521821] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 183.527887] kthread+0x3b4/0x780 [ 183.531793] ret_from_fork+0x30/0x70 [ 183.536045] ret_from_fork_asm+0x1a/0x30 [ 183.542826] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 183.556498] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 183.572862] The buggy address belongs to the physical page: [ 183.579099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 183.587757] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 183.595379] page_type: f5(slab) [ 183.599197] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 183.607597] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 183.615998] page dumped because: kasan: bad access detected [ 183.624414] Memory state around the buggy address: [ 183.629874] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 183.637755] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 183.645638] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 183.653521] ^ [ 183.658982] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 183.666862] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 183.674746] ================================================================== [ 183.682639] ================================================================== [ 183.690540] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f60/0x5400 [kasan_test] [ 183.699727] Write of size 8 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 183.710046] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 183.710061] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 183.710062] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 183.710064] Call Trace: [ 183.710066] [ 183.710067] dump_stack_lvl+0x4f/0x70 [ 183.710080] print_address_description.constprop.0+0x2c/0x3b0 [ 183.710084] ? kasan_atomics_helper+0x1f60/0x5400 [kasan_test] [ 183.710092] print_report+0xb9/0x280 [ 183.710096] ? kasan_atomics_helper+0x1f60/0x5400 [kasan_test] [ 183.710104] ? kasan_addr_to_slab+0x9/0x90 [ 183.710107] ? kasan_atomics_helper+0x1f60/0x5400 [kasan_test] [ 183.710115] kasan_report+0xda/0x110 [ 183.710119] ? kasan_atomics_helper+0x1f60/0x5400 [kasan_test] [ 183.710127] kasan_check_range+0xfc/0x1b0 [ 183.710130] kasan_atomics_helper+0x1f60/0x5400 [kasan_test] [ 183.710139] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 183.710147] ? __kasan_slab_alloc+0x4a/0x90 [ 183.710150] ? __kmalloc_cache_noprof+0x158/0x430 [ 183.710153] ? pick_next_task_fair+0x51/0xba0 [ 183.710157] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 183.710165] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 183.710174] ? __schedule+0x757/0x1420 [ 183.710176] ? __pfx_read_tsc+0x10/0x10 [ 183.710179] ? ktime_get_ts64+0x7f/0x220 [ 183.710182] kunit_try_run_case+0x175/0x440 [ 183.710185] ? __pfx_kunit_try_run_case+0x10/0x10 [ 183.710188] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 183.710191] ? __pfx_kunit_try_run_case+0x10/0x10 [ 183.710193] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 183.710196] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 183.710200] kthread+0x3b4/0x780 [ 183.710203] ? __pfx_kthread+0x10/0x10 [ 183.710206] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 183.710209] ? __pfx_kthread+0x10/0x10 [ 183.710212] ret_from_fork+0x30/0x70 [ 183.710215] ? __pfx_kthread+0x10/0x10 [ 183.710218] ret_from_fork_asm+0x1a/0x30 [ 183.710222] [ 183.922588] Allocated by task 3930: [ 183.926752] kasan_save_stack+0x1c/0x40 [ 183.931262] kasan_save_track+0x10/0x30 [ 183.935775] __kasan_kmalloc+0xa6/0xb0 [ 183.940200] kasan_atomics+0x91/0x2d0 [kasan_test] [ 183.945669] kunit_try_run_case+0x175/0x440 [ 183.950525] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 183.956594] kthread+0x3b4/0x780 [ 183.960499] ret_from_fork+0x30/0x70 [ 183.964752] ret_from_fork_asm+0x1a/0x30 [ 183.971523] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 183.985198] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 184.001566] The buggy address belongs to the physical page: [ 184.007804] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 184.016464] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 184.024086] page_type: f5(slab) [ 184.027904] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 184.036304] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 184.044702] page dumped because: kasan: bad access detected [ 184.053114] Memory state around the buggy address: [ 184.058572] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 184.066456] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 184.074338] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 184.082221] ^ [ 184.087684] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 184.095567] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 184.103449] ================================================================== [ 184.111340] ================================================================== [ 184.119238] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f69/0x5400 [kasan_test] [ 184.128424] Read of size 8 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 184.138655] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 184.138661] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 184.138662] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 184.138664] Call Trace: [ 184.138665] [ 184.138667] dump_stack_lvl+0x4f/0x70 [ 184.138671] print_address_description.constprop.0+0x2c/0x3b0 [ 184.138675] ? kasan_atomics_helper+0x4f69/0x5400 [kasan_test] [ 184.138683] print_report+0xb9/0x280 [ 184.138687] ? kasan_atomics_helper+0x4f69/0x5400 [kasan_test] [ 184.138695] ? kasan_addr_to_slab+0x9/0x90 [ 184.138698] ? kasan_atomics_helper+0x4f69/0x5400 [kasan_test] [ 184.138706] kasan_report+0xda/0x110 [ 184.138710] ? kasan_atomics_helper+0x4f69/0x5400 [kasan_test] [ 184.138718] kasan_atomics_helper+0x4f69/0x5400 [kasan_test] [ 184.138727] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 184.138735] ? __kasan_slab_alloc+0x4a/0x90 [ 184.138738] ? __kmalloc_cache_noprof+0x158/0x430 [ 184.138741] ? pick_next_task_fair+0x51/0xba0 [ 184.138745] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 184.138754] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 184.138762] ? __schedule+0x757/0x1420 [ 184.138765] ? __pfx_read_tsc+0x10/0x10 [ 184.138768] ? ktime_get_ts64+0x7f/0x220 [ 184.138771] kunit_try_run_case+0x175/0x440 [ 184.138774] ? __pfx_kunit_try_run_case+0x10/0x10 [ 184.138776] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 184.138780] ? __pfx_kunit_try_run_case+0x10/0x10 [ 184.138782] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 184.138785] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 184.138788] kthread+0x3b4/0x780 [ 184.138791] ? __pfx_kthread+0x10/0x10 [ 184.138794] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 184.138798] ? __pfx_kthread+0x10/0x10 [ 184.138801] ret_from_fork+0x30/0x70 [ 184.138804] ? __pfx_kthread+0x10/0x10 [ 184.138807] ret_from_fork_asm+0x1a/0x30 [ 184.138811] [ 184.346516] Allocated by task 3930: [ 184.350679] kasan_save_stack+0x1c/0x40 [ 184.355190] kasan_save_track+0x10/0x30 [ 184.359698] __kasan_kmalloc+0xa6/0xb0 [ 184.364124] kasan_atomics+0x91/0x2d0 [kasan_test] [ 184.369591] kunit_try_run_case+0x175/0x440 [ 184.374448] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 184.380515] kthread+0x3b4/0x780 [ 184.384420] ret_from_fork+0x30/0x70 [ 184.388671] ret_from_fork_asm+0x1a/0x30 [ 184.395445] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 184.409119] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 184.425488] The buggy address belongs to the physical page: [ 184.431726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 184.440385] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 184.448011] page_type: f5(slab) [ 184.451845] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 184.460244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 184.468642] page dumped because: kasan: bad access detected [ 184.477063] Memory state around the buggy address: [ 184.482534] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 184.490417] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 184.498297] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 184.506177] ^ [ 184.511638] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 184.519519] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 184.527399] ================================================================== [ 184.535292] ================================================================== [ 184.543191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2021/0x5400 [kasan_test] [ 184.552378] Write of size 8 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 184.562696] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 184.562701] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 184.562703] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 184.562704] Call Trace: [ 184.562706] [ 184.562707] dump_stack_lvl+0x4f/0x70 [ 184.562711] print_address_description.constprop.0+0x2c/0x3b0 [ 184.562715] ? kasan_atomics_helper+0x2021/0x5400 [kasan_test] [ 184.562723] print_report+0xb9/0x280 [ 184.562727] ? kasan_atomics_helper+0x2021/0x5400 [kasan_test] [ 184.562734] ? kasan_addr_to_slab+0x9/0x90 [ 184.562738] ? kasan_atomics_helper+0x2021/0x5400 [kasan_test] [ 184.562745] kasan_report+0xda/0x110 [ 184.562749] ? kasan_atomics_helper+0x2021/0x5400 [kasan_test] [ 184.562758] kasan_check_range+0xfc/0x1b0 [ 184.562761] kasan_atomics_helper+0x2021/0x5400 [kasan_test] [ 184.562769] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 184.562777] ? __kasan_slab_alloc+0x4a/0x90 [ 184.562781] ? __kmalloc_cache_noprof+0x158/0x430 [ 184.562783] ? pick_next_task_fair+0x51/0xba0 [ 184.562787] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 184.562796] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 184.562804] ? __schedule+0x757/0x1420 [ 184.562807] ? __pfx_read_tsc+0x10/0x10 [ 184.562810] ? ktime_get_ts64+0x7f/0x220 [ 184.562813] kunit_try_run_case+0x175/0x440 [ 184.562816] ? __pfx_kunit_try_run_case+0x10/0x10 [ 184.562818] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 184.562822] ? __pfx_kunit_try_run_case+0x10/0x10 [ 184.562824] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 184.562827] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 184.562830] kthread+0x3b4/0x780 [ 184.562833] ? __pfx_kthread+0x10/0x10 [ 184.562836] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 184.562839] ? __pfx_kthread+0x10/0x10 [ 184.562843] ret_from_fork+0x30/0x70 [ 184.562845] ? __pfx_kthread+0x10/0x10 [ 184.562848] ret_from_fork_asm+0x1a/0x30 [ 184.562853] [ 184.775241] Allocated by task 3930: [ 184.779405] kasan_save_stack+0x1c/0x40 [ 184.783917] kasan_save_track+0x10/0x30 [ 184.788430] __kasan_kmalloc+0xa6/0xb0 [ 184.792853] kasan_atomics+0x91/0x2d0 [kasan_test] [ 184.798320] kunit_try_run_case+0x175/0x440 [ 184.803177] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 184.809242] kthread+0x3b4/0x780 [ 184.813147] ret_from_fork+0x30/0x70 [ 184.817399] ret_from_fork_asm+0x1a/0x30 [ 184.824173] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 184.837848] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 184.854216] The buggy address belongs to the physical page: [ 184.860453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 184.869110] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 184.876729] page_type: f5(slab) [ 184.880548] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 184.888948] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 184.897347] page dumped because: kasan: bad access detected [ 184.905764] Memory state around the buggy address: [ 184.911226] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 184.919109] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 184.926988] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 184.934868] ^ [ 184.940330] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 184.948210] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 184.956091] ================================================================== [ 184.963982] ================================================================== [ 184.971878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f83/0x5400 [kasan_test] [ 184.981077] Read of size 8 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 184.991318] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 184.991324] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 184.991326] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 184.991327] Call Trace: [ 184.991329] [ 184.991330] dump_stack_lvl+0x4f/0x70 [ 184.991334] print_address_description.constprop.0+0x2c/0x3b0 [ 184.991339] ? kasan_atomics_helper+0x4f83/0x5400 [kasan_test] [ 184.991348] print_report+0xb9/0x280 [ 184.991351] ? kasan_atomics_helper+0x4f83/0x5400 [kasan_test] [ 184.991359] ? kasan_addr_to_slab+0x9/0x90 [ 184.991362] ? kasan_atomics_helper+0x4f83/0x5400 [kasan_test] [ 184.991371] kasan_report+0xda/0x110 [ 184.991374] ? kasan_atomics_helper+0x4f83/0x5400 [kasan_test] [ 184.991383] kasan_atomics_helper+0x4f83/0x5400 [kasan_test] [ 184.991391] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 184.991399] ? __kasan_slab_alloc+0x4a/0x90 [ 184.991403] ? __kmalloc_cache_noprof+0x158/0x430 [ 184.991405] ? pick_next_task_fair+0x51/0xba0 [ 184.991409] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 184.991418] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 184.991426] ? __schedule+0x757/0x1420 [ 184.991429] ? __pfx_read_tsc+0x10/0x10 [ 184.991432] ? ktime_get_ts64+0x7f/0x220 [ 184.991435] kunit_try_run_case+0x175/0x440 [ 184.991438] ? __pfx_kunit_try_run_case+0x10/0x10 [ 184.991440] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 184.991444] ? __pfx_kunit_try_run_case+0x10/0x10 [ 184.991446] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 184.991449] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 184.991452] kthread+0x3b4/0x780 [ 184.991456] ? __pfx_kthread+0x10/0x10 [ 184.991459] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 184.991462] ? __pfx_kthread+0x10/0x10 [ 184.991465] ret_from_fork+0x30/0x70 [ 184.991468] ? __pfx_kthread+0x10/0x10 [ 184.991471] ret_from_fork_asm+0x1a/0x30 [ 184.991475] [ 185.199175] Allocated by task 3930: [ 185.203340] kasan_save_stack+0x1c/0x40 [ 185.207852] kasan_save_track+0x10/0x30 [ 185.212363] __kasan_kmalloc+0xa6/0xb0 [ 185.216787] kasan_atomics+0x91/0x2d0 [kasan_test] [ 185.222253] kunit_try_run_case+0x175/0x440 [ 185.227109] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 185.233174] kthread+0x3b4/0x780 [ 185.237078] ret_from_fork+0x30/0x70 [ 185.241328] ret_from_fork_asm+0x1a/0x30 [ 185.248100] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 185.261770] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 185.278133] The buggy address belongs to the physical page: [ 185.284370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 185.293039] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 185.300670] page_type: f5(slab) [ 185.304489] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 185.312889] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 185.321287] page dumped because: kasan: bad access detected [ 185.329700] Memory state around the buggy address: [ 185.335159] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 185.343039] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 185.350919] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 185.358800] ^ [ 185.364258] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 185.372139] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 185.380030] ================================================================== [ 185.387933] ================================================================== [ 185.395812] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20e2/0x5400 [kasan_test] [ 185.404997] Write of size 8 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 185.415314] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 185.415320] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 185.415321] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 185.415323] Call Trace: [ 185.415324] [ 185.415326] dump_stack_lvl+0x4f/0x70 [ 185.415329] print_address_description.constprop.0+0x2c/0x3b0 [ 185.415334] ? kasan_atomics_helper+0x20e2/0x5400 [kasan_test] [ 185.415342] print_report+0xb9/0x280 [ 185.415345] ? kasan_atomics_helper+0x20e2/0x5400 [kasan_test] [ 185.415353] ? kasan_addr_to_slab+0x9/0x90 [ 185.415356] ? kasan_atomics_helper+0x20e2/0x5400 [kasan_test] [ 185.415364] kasan_report+0xda/0x110 [ 185.415368] ? kasan_atomics_helper+0x20e2/0x5400 [kasan_test] [ 185.415376] kasan_check_range+0xfc/0x1b0 [ 185.415379] kasan_atomics_helper+0x20e2/0x5400 [kasan_test] [ 185.415388] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 185.415396] ? __kasan_slab_alloc+0x4a/0x90 [ 185.415399] ? __kmalloc_cache_noprof+0x158/0x430 [ 185.415401] ? pick_next_task_fair+0x51/0xba0 [ 185.415406] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 185.415414] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 185.415422] ? __schedule+0x757/0x1420 [ 185.415425] ? __pfx_read_tsc+0x10/0x10 [ 185.415428] ? ktime_get_ts64+0x7f/0x220 [ 185.415431] kunit_try_run_case+0x175/0x440 [ 185.415433] ? __pfx_kunit_try_run_case+0x10/0x10 [ 185.415436] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 185.415439] ? __pfx_kunit_try_run_case+0x10/0x10 [ 185.415442] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 185.415445] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 185.415448] kthread+0x3b4/0x780 [ 185.415451] ? __pfx_kthread+0x10/0x10 [ 185.415454] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 185.415457] ? __pfx_kthread+0x10/0x10 [ 185.415460] ret_from_fork+0x30/0x70 [ 185.415463] ? __pfx_kthread+0x10/0x10 [ 185.415466] ret_from_fork_asm+0x1a/0x30 [ 185.415470] [ 185.627816] Allocated by task 3930: [ 185.631978] kasan_save_stack+0x1c/0x40 [ 185.636489] kasan_save_track+0x10/0x30 [ 185.640998] __kasan_kmalloc+0xa6/0xb0 [ 185.645420] kasan_atomics+0x91/0x2d0 [kasan_test] [ 185.650887] kunit_try_run_case+0x175/0x440 [ 185.655742] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 185.661808] kthread+0x3b4/0x780 [ 185.665714] ret_from_fork+0x30/0x70 [ 185.669963] ret_from_fork_asm+0x1a/0x30 [ 185.676733] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 185.690402] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 185.706769] The buggy address belongs to the physical page: [ 185.713004] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 185.721664] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 185.729284] page_type: f5(slab) [ 185.733105] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 185.741505] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 185.749902] page dumped because: kasan: bad access detected [ 185.758313] Memory state around the buggy address: [ 185.763772] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 185.771653] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 185.779534] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 185.787413] ^ [ 185.792871] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 185.800752] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 185.808634] ================================================================== [ 185.816526] ================================================================== [ 185.824419] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f76/0x5400 [kasan_test] [ 185.833605] Read of size 8 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 185.843831] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 185.843837] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 185.843838] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 185.843840] Call Trace: [ 185.843841] [ 185.843843] dump_stack_lvl+0x4f/0x70 [ 185.843846] print_address_description.constprop.0+0x2c/0x3b0 [ 185.843850] ? kasan_atomics_helper+0x4f76/0x5400 [kasan_test] [ 185.843859] print_report+0xb9/0x280 [ 185.843862] ? kasan_atomics_helper+0x4f76/0x5400 [kasan_test] [ 185.843870] ? kasan_addr_to_slab+0x9/0x90 [ 185.843873] ? kasan_atomics_helper+0x4f76/0x5400 [kasan_test] [ 185.843881] kasan_report+0xda/0x110 [ 185.843885] ? kasan_atomics_helper+0x4f76/0x5400 [kasan_test] [ 185.843894] kasan_atomics_helper+0x4f76/0x5400 [kasan_test] [ 185.843902] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 185.843910] ? __kasan_slab_alloc+0x4a/0x90 [ 185.843913] ? __kmalloc_cache_noprof+0x158/0x430 [ 185.843916] ? pick_next_task_fair+0x51/0xba0 [ 185.843920] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 185.843928] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 185.843937] ? __schedule+0x757/0x1420 [ 185.843939] ? __pfx_read_tsc+0x10/0x10 [ 185.843942] ? ktime_get_ts64+0x7f/0x220 [ 185.843945] kunit_try_run_case+0x175/0x440 [ 185.843948] ? __pfx_kunit_try_run_case+0x10/0x10 [ 185.843950] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 185.843954] ? __pfx_kunit_try_run_case+0x10/0x10 [ 185.843956] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 185.843959] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 185.843962] kthread+0x3b4/0x780 [ 185.843965] ? __pfx_kthread+0x10/0x10 [ 185.843968] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 185.843971] ? __pfx_kthread+0x10/0x10 [ 185.843974] ret_from_fork+0x30/0x70 [ 185.843977] ? __pfx_kthread+0x10/0x10 [ 185.843980] ret_from_fork_asm+0x1a/0x30 [ 185.843984] [ 186.051714] Allocated by task 3930: [ 186.055878] kasan_save_stack+0x1c/0x40 [ 186.060389] kasan_save_track+0x10/0x30 [ 186.064902] __kasan_kmalloc+0xa6/0xb0 [ 186.069326] kasan_atomics+0x91/0x2d0 [kasan_test] [ 186.074792] kunit_try_run_case+0x175/0x440 [ 186.079647] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 186.085713] kthread+0x3b4/0x780 [ 186.089618] ret_from_fork+0x30/0x70 [ 186.093867] ret_from_fork_asm+0x1a/0x30 [ 186.100639] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 186.114312] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 186.130679] The buggy address belongs to the physical page: [ 186.136916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 186.145578] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 186.153203] page_type: f5(slab) [ 186.157037] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 186.165438] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 186.173837] page dumped because: kasan: bad access detected [ 186.182250] Memory state around the buggy address: [ 186.187713] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 186.195596] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 186.203476] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 186.211359] ^ [ 186.216820] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 186.224701] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 186.232582] ================================================================== [ 186.240476] ================================================================== [ 186.248377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x21a3/0x5400 [kasan_test] [ 186.257563] Write of size 8 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 186.267879] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 186.267885] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 186.267886] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 186.267888] Call Trace: [ 186.267889] [ 186.267891] dump_stack_lvl+0x4f/0x70 [ 186.267895] print_address_description.constprop.0+0x2c/0x3b0 [ 186.267899] ? kasan_atomics_helper+0x21a3/0x5400 [kasan_test] [ 186.267907] print_report+0xb9/0x280 [ 186.267911] ? kasan_atomics_helper+0x21a3/0x5400 [kasan_test] [ 186.267919] ? kasan_addr_to_slab+0x9/0x90 [ 186.267922] ? kasan_atomics_helper+0x21a3/0x5400 [kasan_test] [ 186.267930] kasan_report+0xda/0x110 [ 186.267934] ? kasan_atomics_helper+0x21a3/0x5400 [kasan_test] [ 186.267942] kasan_check_range+0xfc/0x1b0 [ 186.267945] kasan_atomics_helper+0x21a3/0x5400 [kasan_test] [ 186.267954] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 186.267962] ? __kasan_slab_alloc+0x4a/0x90 [ 186.267965] ? __kmalloc_cache_noprof+0x158/0x430 [ 186.267968] ? pick_next_task_fair+0x51/0xba0 [ 186.267972] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 186.267980] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 186.267989] ? __schedule+0x757/0x1420 [ 186.267992] ? __pfx_read_tsc+0x10/0x10 [ 186.267995] ? ktime_get_ts64+0x7f/0x220 [ 186.267998] kunit_try_run_case+0x175/0x440 [ 186.268000] ? __pfx_kunit_try_run_case+0x10/0x10 [ 186.268003] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 186.268007] ? __pfx_kunit_try_run_case+0x10/0x10 [ 186.268009] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 186.268012] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 186.268017] kthread+0x3b4/0x780 [ 186.268032] ? __pfx_kthread+0x10/0x10 [ 186.268035] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 186.268039] ? __pfx_kthread+0x10/0x10 [ 186.268042] ret_from_fork+0x30/0x70 [ 186.268045] ? __pfx_kthread+0x10/0x10 [ 186.268048] ret_from_fork_asm+0x1a/0x30 [ 186.268062] [ 186.480448] Allocated by task 3930: [ 186.484612] kasan_save_stack+0x1c/0x40 [ 186.489123] kasan_save_track+0x10/0x30 [ 186.493632] __kasan_kmalloc+0xa6/0xb0 [ 186.498066] kasan_atomics+0x91/0x2d0 [kasan_test] [ 186.503542] kunit_try_run_case+0x175/0x440 [ 186.508396] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 186.514463] kthread+0x3b4/0x780 [ 186.518369] ret_from_fork+0x30/0x70 [ 186.522620] ret_from_fork_asm+0x1a/0x30 [ 186.529392] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 186.543079] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 186.559450] The buggy address belongs to the physical page: [ 186.565688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 186.574350] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 186.581974] page_type: f5(slab) [ 186.585793] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 186.594195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 186.602596] page dumped because: kasan: bad access detected [ 186.611009] Memory state around the buggy address: [ 186.616469] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 186.624350] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 186.632230] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 186.640109] ^ [ 186.645568] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 186.653449] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 186.661328] ================================================================== [ 186.669220] ================================================================== [ 186.677117] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50e2/0x5400 [kasan_test] [ 186.686301] Read of size 8 at addr ffff888181fbb030 by task kunit_try_catch/3930 [ 186.696529] CPU: 1 UID: 0 PID: 3930 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 186.696534] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 186.696536] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 186.696537] Call Trace: [ 186.696539] [ 186.696540] dump_stack_lvl+0x4f/0x70 [ 186.696544] print_address_description.constprop.0+0x2c/0x3b0 [ 186.696548] ? kasan_atomics_helper+0x50e2/0x5400 [kasan_test] [ 186.696556] print_report+0xb9/0x280 [ 186.696560] ? kasan_atomics_helper+0x50e2/0x5400 [kasan_test] [ 186.696568] ? kasan_addr_to_slab+0x9/0x90 [ 186.696571] ? kasan_atomics_helper+0x50e2/0x5400 [kasan_test] [ 186.696579] kasan_report+0xda/0x110 [ 186.696582] ? kasan_atomics_helper+0x50e2/0x5400 [kasan_test] [ 186.696591] kasan_atomics_helper+0x50e2/0x5400 [kasan_test] [ 186.696600] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 186.696608] ? __kasan_slab_alloc+0x4a/0x90 [ 186.696611] ? __kmalloc_cache_noprof+0x158/0x430 [ 186.696614] ? pick_next_task_fair+0x51/0xba0 [ 186.696618] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 186.696626] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 186.696635] ? __schedule+0x757/0x1420 [ 186.696638] ? __pfx_read_tsc+0x10/0x10 [ 186.696641] ? ktime_get_ts64+0x7f/0x220 [ 186.696644] kunit_try_run_case+0x175/0x440 [ 186.696646] ? __pfx_kunit_try_run_case+0x10/0x10 [ 186.696649] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 186.696652] ? __pfx_kunit_try_run_case+0x10/0x10 [ 186.696654] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 186.696657] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 186.696661] kthread+0x3b4/0x780 [ 186.696664] ? __pfx_kthread+0x10/0x10 [ 186.696667] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 186.696670] ? __pfx_kthread+0x10/0x10 [ 186.696673] ret_from_fork+0x30/0x70 [ 186.696676] ? __pfx_kthread+0x10/0x10 [ 186.696679] ret_from_fork_asm+0x1a/0x30 [ 186.696683] [ 186.904376] Allocated by task 3930: [ 186.908540] kasan_save_stack+0x1c/0x40 [ 186.913063] kasan_save_track+0x10/0x30 [ 186.917573] __kasan_kmalloc+0xa6/0xb0 [ 186.921997] kasan_atomics+0x91/0x2d0 [kasan_test] [ 186.927467] kunit_try_run_case+0x175/0x440 [ 186.932325] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 186.938391] kthread+0x3b4/0x780 [ 186.942297] ret_from_fork+0x30/0x70 [ 186.946550] ret_from_fork_asm+0x1a/0x30 [ 186.953323] The buggy address belongs to the object at ffff888181fbb000 which belongs to the cache kmalloc-64 of size 64 [ 186.967001] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888181fbb000, ffff888181fbb030) [ 186.983371] The buggy address belongs to the physical page: [ 186.989606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x181fbb [ 186.998270] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 187.005896] page_type: f5(slab) [ 187.009714] raw: 0017ffffc0000000 ffff8881000428c0 ffffea000607ef00 dead000000000005 [ 187.018115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 187.026514] page dumped because: kasan: bad access detected [ 187.034927] Memory state around the buggy address: [ 187.040385] ffff888181fbaf00: fa fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 187.048268] ffff888181fbaf80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 187.056151] >ffff888181fbb000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 187.064039] ^ [ 187.069499] ffff888181fbb080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 187.077381] ffff888181fbb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 187.085264] ================================================================== [ 187.093361] # kasan_atomics.speed: slow [ 187.093378] ok 65 kasan_atomics [ 187.098754] ok 66 vmalloc_helpers_tags # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 187.103158] ================================================================== [ 187.119623] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x635/0x6e0 [kasan_test] [ 187.128120] Read of size 1 at addr ffffc900002397f3 by task kunit_try_catch/4027 [ 187.138352] CPU: 7 UID: 0 PID: 4027 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 187.138358] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 187.138360] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 187.138362] Call Trace: [ 187.138363] [ 187.138365] dump_stack_lvl+0x4f/0x70 [ 187.138370] print_address_description.constprop.0+0x2c/0x3b0 [ 187.138376] ? vmalloc_oob+0x635/0x6e0 [kasan_test] [ 187.138385] print_report+0xb9/0x280 [ 187.138389] ? vmalloc_oob+0x635/0x6e0 [kasan_test] [ 187.138397] ? kasan_addr_to_slab+0x9/0x90 [ 187.138400] ? vmalloc_oob+0x635/0x6e0 [kasan_test] [ 187.138408] kasan_report+0xda/0x110 [ 187.138412] ? vmalloc_oob+0x635/0x6e0 [kasan_test] [ 187.138421] vmalloc_oob+0x635/0x6e0 [kasan_test] [ 187.138430] ? __pfx_vmalloc_oob+0x10/0x10 [kasan_test] [ 187.138438] ? __schedule+0x757/0x1420 [ 187.138441] ? __pfx_read_tsc+0x10/0x10 [ 187.138445] ? ktime_get_ts64+0x7f/0x220 [ 187.138448] kunit_try_run_case+0x175/0x440 [ 187.138451] ? __pfx_kunit_try_run_case+0x10/0x10 [ 187.138454] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 187.138458] ? __pfx_kunit_try_run_case+0x10/0x10 [ 187.138461] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 187.138464] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 187.138467] kthread+0x3b4/0x780 [ 187.138471] ? __pfx_kthread+0x10/0x10 [ 187.138474] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 187.138477] ? __pfx_kthread+0x10/0x10 [ 187.138480] ret_from_fork+0x30/0x70 [ 187.138484] ? __pfx_kthread+0x10/0x10 [ 187.138487] ret_from_fork_asm+0x1a/0x30 [ 187.138492] [ 187.313797] The buggy address belongs to the virtual mapping at [ffffc90000239000, ffffc9000023b000) created by: vmalloc_oob+0x7a/0x6e0 [kasan_test] [ 187.334252] The buggy address belongs to the physical page: [ 187.340488] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x2f pfn:0x40bfa5 [ 187.349233] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 187.356424] raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 187.364822] raw: 000000000000002f 0000000000000000 00000001ffffffff 0000000000000000 [ 187.373220] page dumped because: kasan: bad access detected [ 187.381629] Memory state around the buggy address: [ 187.387090] ffffc90000239680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 187.394971] ffffc90000239700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 187.402850] >ffffc90000239780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 187.410730] ^ [ 187.418264] ffffc90000239800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 187.426145] ffffc90000239880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 187.434038] ================================================================== [ 187.441942] ================================================================== [ 187.449826] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x61e/0x6e0 [kasan_test] [ 187.458326] Read of size 1 at addr ffffc900002397f8 by task kunit_try_catch/4027 [ 187.468568] CPU: 7 UID: 0 PID: 4027 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 187.468574] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 187.468575] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 187.468577] Call Trace: [ 187.468578] [ 187.468580] dump_stack_lvl+0x4f/0x70 [ 187.468584] print_address_description.constprop.0+0x2c/0x3b0 [ 187.468588] ? vmalloc_oob+0x61e/0x6e0 [kasan_test] [ 187.468597] print_report+0xb9/0x280 [ 187.468600] ? vmalloc_oob+0x61e/0x6e0 [kasan_test] [ 187.468608] ? kasan_addr_to_slab+0x9/0x90 [ 187.468611] ? vmalloc_oob+0x61e/0x6e0 [kasan_test] [ 187.468619] kasan_report+0xda/0x110 [ 187.468623] ? vmalloc_oob+0x61e/0x6e0 [kasan_test] [ 187.468631] vmalloc_oob+0x61e/0x6e0 [kasan_test] [ 187.468640] ? __pfx_vmalloc_oob+0x10/0x10 [kasan_test] [ 187.468648] ? __schedule+0x757/0x1420 [ 187.468651] ? __pfx_read_tsc+0x10/0x10 [ 187.468654] ? ktime_get_ts64+0x7f/0x220 [ 187.468658] kunit_try_run_case+0x175/0x440 [ 187.468661] ? __pfx_kunit_try_run_case+0x10/0x10 [ 187.468663] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 187.468668] ? __pfx_kunit_try_run_case+0x10/0x10 [ 187.468670] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 187.468673] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 187.468676] kthread+0x3b4/0x780 [ 187.468680] ? __pfx_kthread+0x10/0x10 [ 187.468683] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 187.468686] ? __pfx_kthread+0x10/0x10 [ 187.468689] ret_from_fork+0x30/0x70 [ 187.468692] ? __pfx_kthread+0x10/0x10 [ 187.468695] ret_from_fork_asm+0x1a/0x30 [ 187.468700] [ 187.644069] The buggy address belongs to the virtual mapping at [ffffc90000239000, ffffc9000023b000) created by: vmalloc_oob+0x7a/0x6e0 [kasan_test] [ 187.664516] The buggy address belongs to the physical page: [ 187.670751] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x2f pfn:0x40bfa5 [ 187.679497] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 187.686688] raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 187.695091] raw: 000000000000002f 0000000000000000 00000001ffffffff 0000000000000000 [ 187.703491] page dumped because: kasan: bad access detected [ 187.711901] Memory state around the buggy address: [ 187.717358] ffffc90000239680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 187.725239] ffffc90000239700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 187.733118] >ffffc90000239780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 187.741000] ^ [ 187.748794] ffffc90000239800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 187.756676] ffffc90000239880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 187.764556] ================================================================== [ 187.772628] ok 67 vmalloc_oob [ 187.772893] ok 68 vmap_tags # SKIP Test requires CONFIG_KASAN_SW_TAGS=y [ 187.777208] ok 69 vm_map_ram_tags # SKIP Test requires CONFIG_KASAN_SW_TAGS=y [ 187.785172] ok 70 match_all_not_assigned # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 187.793674] ok 71 match_all_ptr_tag # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 187.802844] ok 72 match_all_mem_tag # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 187.811421] ================================================================== [ 187.827614] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x221/0x250 [ 187.835671] Read of size 8 at addr ffff888140bd9578 by task kunit_try_catch/4039 [ 187.845908] CPU: 5 UID: 0 PID: 4039 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 187.845914] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 187.845916] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 187.845918] Call Trace: [ 187.845919] [ 187.845921] dump_stack_lvl+0x4f/0x70 [ 187.845927] print_address_description.constprop.0+0x2c/0x3b0 [ 187.845932] ? copy_to_kernel_nofault+0x221/0x250 [ 187.845936] print_report+0xb9/0x280 [ 187.845939] ? copy_to_kernel_nofault+0x221/0x250 [ 187.845942] ? kasan_addr_to_slab+0x9/0x90 [ 187.845945] ? copy_to_kernel_nofault+0x221/0x250 [ 187.845948] kasan_report+0xda/0x110 [ 187.845951] ? copy_to_kernel_nofault+0x221/0x250 [ 187.845955] copy_to_kernel_nofault+0x221/0x250 [ 187.845958] copy_to_kernel_nofault_oob+0x15a/0x4a0 [kasan_test] [ 187.845969] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [kasan_test] [ 187.845978] ? __update_idle_core+0x51/0x350 [ 187.845982] ? pick_next_task_fair+0x51/0xba0 [ 187.845986] ? __schedule+0x757/0x1420 [ 187.845990] ? __pfx_read_tsc+0x10/0x10 [ 187.845993] ? ktime_get_ts64+0x7f/0x220 [ 187.845997] kunit_try_run_case+0x175/0x440 [ 187.846001] ? __pfx_kunit_try_run_case+0x10/0x10 [ 187.846004] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 187.846008] ? __pfx_kunit_try_run_case+0x10/0x10 [ 187.846011] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 187.846016] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 187.846030] kthread+0x3b4/0x780 [ 187.846035] ? __pfx_kthread+0x10/0x10 [ 187.846038] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 187.846042] ? __pfx_kthread+0x10/0x10 [ 187.846045] ret_from_fork+0x30/0x70 [ 187.846058] ? __pfx_kthread+0x10/0x10 [ 187.846061] ret_from_fork_asm+0x1a/0x30 [ 187.846066] [ 188.038425] Allocated by task 4039: [ 188.042589] kasan_save_stack+0x1c/0x40 [ 188.047100] kasan_save_track+0x10/0x30 [ 188.051612] __kasan_kmalloc+0xa6/0xb0 [ 188.056037] copy_to_kernel_nofault_oob+0xa7/0x4a0 [kasan_test] [ 188.062636] kunit_try_run_case+0x175/0x440 [ 188.067493] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 188.073559] kthread+0x3b4/0x780 [ 188.077466] ret_from_fork+0x30/0x70 [ 188.081721] ret_from_fork_asm+0x1a/0x30 [ 188.088494] The buggy address belongs to the object at ffff888140bd9500 which belongs to the cache kmalloc-128 of size 128 [ 188.102342] The buggy address is located 0 bytes to the right of allocated 120-byte region [ffff888140bd9500, ffff888140bd9578) [ 188.118799] The buggy address belongs to the physical page: [ 188.125040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x140bd8 [ 188.133703] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 188.142022] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 188.149648] page_type: f5(slab) [ 188.153469] raw: 0017ffffc0000040 ffff888100042a00 dead000000000122 0000000000000000 [ 188.161871] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 188.170273] head: 0017ffffc0000040 ffff888100042a00 dead000000000122 0000000000000000 [ 188.178758] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 188.187247] head: 0017ffffc0000001 ffffea000502f601 00000000ffffffff 00000000ffffffff [ 188.195733] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 188.204220] page dumped because: kasan: bad access detected [ 188.212635] Memory state around the buggy address: [ 188.218095] ffff888140bd9400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 188.225977] ffff888140bd9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 188.233856] >ffff888140bd9500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 188.241738] ^ [ 188.249535] ffff888140bd9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 188.257416] ffff888140bd9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 188.265297] ================================================================== [ 188.273289] ================================================================== [ 188.281174] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8e/0x250 [ 188.289148] Write of size 8 at addr ffff888140bd9578 by task kunit_try_catch/4039 [ 188.299467] CPU: 5 UID: 0 PID: 4039 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 188.299473] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 188.299475] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 188.299477] Call Trace: [ 188.299478] [ 188.299480] dump_stack_lvl+0x4f/0x70 [ 188.299485] print_address_description.constprop.0+0x2c/0x3b0 [ 188.299489] ? copy_to_kernel_nofault+0x8e/0x250 [ 188.299492] print_report+0xb9/0x280 [ 188.299496] ? copy_to_kernel_nofault+0x8e/0x250 [ 188.299498] ? kasan_addr_to_slab+0x9/0x90 [ 188.299502] ? copy_to_kernel_nofault+0x8e/0x250 [ 188.299504] kasan_report+0xda/0x110 [ 188.299508] ? copy_to_kernel_nofault+0x8e/0x250 [ 188.299511] kasan_check_range+0xfc/0x1b0 [ 188.299514] copy_to_kernel_nofault+0x8e/0x250 [ 188.299518] copy_to_kernel_nofault_oob+0x1f0/0x4a0 [kasan_test] [ 188.299528] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [kasan_test] [ 188.299537] ? __update_idle_core+0x51/0x350 [ 188.299541] ? pick_next_task_fair+0x51/0xba0 [ 188.299544] ? __schedule+0x757/0x1420 [ 188.299548] ? __pfx_read_tsc+0x10/0x10 [ 188.299551] ? ktime_get_ts64+0x7f/0x220 [ 188.299555] kunit_try_run_case+0x175/0x440 [ 188.299559] ? __pfx_kunit_try_run_case+0x10/0x10 [ 188.299561] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 188.299565] ? __pfx_kunit_try_run_case+0x10/0x10 [ 188.299568] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 188.299571] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 188.299574] kthread+0x3b4/0x780 [ 188.299578] ? __pfx_kthread+0x10/0x10 [ 188.299581] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 188.299585] ? __pfx_kthread+0x10/0x10 [ 188.299588] ret_from_fork+0x30/0x70 [ 188.299591] ? __pfx_kthread+0x10/0x10 [ 188.299594] ret_from_fork_asm+0x1a/0x30 [ 188.299599] [ 188.496219] Allocated by task 4039: [ 188.500382] kasan_save_stack+0x1c/0x40 [ 188.504894] kasan_save_track+0x10/0x30 [ 188.509406] __kasan_kmalloc+0xa6/0xb0 [ 188.513831] copy_to_kernel_nofault_oob+0xa7/0x4a0 [kasan_test] [ 188.520422] kunit_try_run_case+0x175/0x440 [ 188.525280] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 188.531350] kthread+0x3b4/0x780 [ 188.535257] ret_from_fork+0x30/0x70 [ 188.539508] ret_from_fork_asm+0x1a/0x30 [ 188.546282] The buggy address belongs to the object at ffff888140bd9500 which belongs to the cache kmalloc-128 of size 128 [ 188.560129] The buggy address is located 0 bytes to the right of allocated 120-byte region [ffff888140bd9500, ffff888140bd9578) [ 188.576584] The buggy address belongs to the physical page: [ 188.582823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x140bd8 [ 188.591483] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 188.599798] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 188.607420] page_type: f5(slab) [ 188.611239] raw: 0017ffffc0000040 ffff888100042a00 dead000000000122 0000000000000000 [ 188.619643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 188.628044] head: 0017ffffc0000040 ffff888100042a00 dead000000000122 0000000000000000 [ 188.636541] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 188.645038] head: 0017ffffc0000001 ffffea000502f601 00000000ffffffff 00000000ffffffff [ 188.653525] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 188.662014] page dumped because: kasan: bad access detected [ 188.670438] Memory state around the buggy address: [ 188.675896] ffff888140bd9400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 188.683779] ffff888140bd9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 188.691660] >ffff888140bd9500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 188.699540] ^ [ 188.707334] ffff888140bd9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 188.715217] ffff888140bd9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 188.723099] ================================================================== [ 188.731371] ok 73 copy_to_kernel_nofault_oob [ 188.731646] ok 74 rust_uaf # SKIP Test requires CONFIG_RUST=y [ 188.737208] ================================================================== [ 188.751851] BUG: KASAN: slab-out-of-bounds in _inline_copy_from_user+0x3e/0xa0 [ 188.759736] Write of size 121 at addr ffff88812a519500 by task kunit_try_catch/4049 [ 188.770238] CPU: 1 UID: 0 PID: 4049 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 188.770243] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 188.770245] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 188.770247] Call Trace: [ 188.770248] [ 188.770250] dump_stack_lvl+0x4f/0x70 [ 188.770253] print_address_description.constprop.0+0x2c/0x3b0 [ 188.770257] ? _inline_copy_from_user+0x3e/0xa0 [ 188.770260] print_report+0xb9/0x280 [ 188.770264] ? _inline_copy_from_user+0x3e/0xa0 [ 188.770266] ? kasan_addr_to_slab+0x9/0x90 [ 188.770269] ? _inline_copy_from_user+0x3e/0xa0 [ 188.770272] kasan_report+0xda/0x110 [ 188.770275] ? _inline_copy_from_user+0x3e/0xa0 [ 188.770278] kasan_check_range+0xfc/0x1b0 [ 188.770281] _inline_copy_from_user+0x3e/0xa0 [ 188.770284] copy_user_test_oob+0x2a3/0x1110 [kasan_test] [ 188.770295] ? __pfx_copy_user_test_oob+0x10/0x10 [kasan_test] [ 188.770303] ? finish_task_switch.isra.0+0x155/0x750 [ 188.770306] ? __switch_to+0x5ba/0x1020 [ 188.770310] ? __schedule+0x757/0x1420 [ 188.770312] ? __pfx_read_tsc+0x10/0x10 [ 188.770315] ? ktime_get_ts64+0x7f/0x220 [ 188.770318] kunit_try_run_case+0x175/0x440 [ 188.770320] ? __pfx_kunit_try_run_case+0x10/0x10 [ 188.770323] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 188.770326] ? __pfx_kunit_try_run_case+0x10/0x10 [ 188.770329] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 188.770332] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 188.770335] kthread+0x3b4/0x780 [ 188.770338] ? __pfx_kthread+0x10/0x10 [ 188.770341] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 188.770344] ? __pfx_kthread+0x10/0x10 [ 188.770347] ret_from_fork+0x30/0x70 [ 188.770350] ? __pfx_kthread+0x10/0x10 [ 188.770354] ret_from_fork_asm+0x1a/0x30 [ 188.770358] [ 188.965390] Allocated by task 4049: [ 188.969552] kasan_save_stack+0x1c/0x40 [ 188.974069] kasan_save_track+0x10/0x30 [ 188.978589] __kasan_kmalloc+0xa6/0xb0 [ 188.983016] __kmalloc_noprof+0x1e3/0x510 [ 188.987712] kunit_kmalloc_array+0x1c/0x50 [ 188.992481] copy_user_test_oob+0x9e/0x1110 [kasan_test] [ 188.998469] kunit_try_run_case+0x175/0x440 [ 189.003323] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 189.009391] kthread+0x3b4/0x780 [ 189.013296] ret_from_fork+0x30/0x70 [ 189.017548] ret_from_fork_asm+0x1a/0x30 [ 189.024320] The buggy address belongs to the object at ffff88812a519500 which belongs to the cache kmalloc-128 of size 128 [ 189.038166] The buggy address is located 0 bytes inside of allocated 120-byte region [ffff88812a519500, ffff88812a519578) [ 189.054098] The buggy address belongs to the physical page: [ 189.060337] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x12a518 [ 189.068997] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 189.077309] ksm flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 189.085278] page_type: f5(slab) [ 189.089097] raw: 0017ffffc0000040 ffff888100042a00 ffffea0004494e00 0000000000000003 [ 189.097497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 189.105898] head: 0017ffffc0000040 ffff888100042a00 ffffea0004494e00 0000000000000003 [ 189.114384] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 189.122871] head: 0017ffffc0000001 ffffea0004a94601 00000000ffffffff 00000000ffffffff [ 189.131355] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 189.139840] page dumped because: kasan: bad access detected [ 189.148263] Memory state around the buggy address: [ 189.153724] ffff88812a519400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 189.161607] ffff88812a519480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 189.169486] >ffff88812a519500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 189.177365] ^ [ 189.185158] ffff88812a519580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 189.193041] ffff88812a519600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 189.200922] ================================================================== [ 189.208876] ================================================================== [ 189.216760] BUG: KASAN: slab-out-of-bounds in _copy_to_user+0x53/0x80 [ 189.223861] Read of size 121 at addr ffff88812a519500 by task kunit_try_catch/4049 [ 189.234266] CPU: 1 UID: 0 PID: 4049 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 189.234271] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 189.234273] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 189.234274] Call Trace: [ 189.234276] [ 189.234277] dump_stack_lvl+0x4f/0x70 [ 189.234281] print_address_description.constprop.0+0x2c/0x3b0 [ 189.234285] ? _copy_to_user+0x53/0x80 [ 189.234288] print_report+0xb9/0x280 [ 189.234291] ? _copy_to_user+0x53/0x80 [ 189.234293] ? kasan_addr_to_slab+0x9/0x90 [ 189.234296] ? _copy_to_user+0x53/0x80 [ 189.234299] kasan_report+0xda/0x110 [ 189.234302] ? _copy_to_user+0x53/0x80 [ 189.234305] kasan_check_range+0xfc/0x1b0 [ 189.234308] _copy_to_user+0x53/0x80 [ 189.234311] copy_user_test_oob+0x356/0x1110 [kasan_test] [ 189.234321] ? __pfx_copy_user_test_oob+0x10/0x10 [kasan_test] [ 189.234329] ? finish_task_switch.isra.0+0x155/0x750 [ 189.234332] ? __switch_to+0x5ba/0x1020 [ 189.234335] ? __schedule+0x757/0x1420 [ 189.234338] ? __pfx_read_tsc+0x10/0x10 [ 189.234340] ? ktime_get_ts64+0x7f/0x220 [ 189.234343] kunit_try_run_case+0x175/0x440 [ 189.234346] ? __pfx_kunit_try_run_case+0x10/0x10 [ 189.234349] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 189.234352] ? __pfx_kunit_try_run_case+0x10/0x10 [ 189.234354] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 189.234358] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 189.234361] kthread+0x3b4/0x780 [ 189.234364] ? __pfx_kthread+0x10/0x10 [ 189.234367] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 189.234370] ? __pfx_kthread+0x10/0x10 [ 189.234373] ret_from_fork+0x30/0x70 [ 189.234376] ? __pfx_kthread+0x10/0x10 [ 189.234379] ret_from_fork_asm+0x1a/0x30 [ 189.234383] [ 189.425562] Allocated by task 4049: [ 189.429727] kasan_save_stack+0x1c/0x40 [ 189.434238] kasan_save_track+0x10/0x30 [ 189.438747] __kasan_kmalloc+0xa6/0xb0 [ 189.443173] __kmalloc_noprof+0x1e3/0x510 [ 189.447857] kunit_kmalloc_array+0x1c/0x50 [ 189.452628] copy_user_test_oob+0x9e/0x1110 [kasan_test] [ 189.458614] kunit_try_run_case+0x175/0x440 [ 189.463470] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 189.469536] kthread+0x3b4/0x780 [ 189.473441] ret_from_fork+0x30/0x70 [ 189.477693] ret_from_fork_asm+0x1a/0x30 [ 189.484465] The buggy address belongs to the object at ffff88812a519500 which belongs to the cache kmalloc-128 of size 128 [ 189.498310] The buggy address is located 0 bytes inside of allocated 120-byte region [ffff88812a519500, ffff88812a519578) [ 189.514244] The buggy address belongs to the physical page: [ 189.520482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x12a518 [ 189.529140] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 189.537454] ksm flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 189.545420] page_type: f5(slab) [ 189.549239] raw: 0017ffffc0000040 ffff888100042a00 ffffea0004494e00 0000000000000003 [ 189.557640] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 189.566040] head: 0017ffffc0000040 ffff888100042a00 ffffea0004494e00 0000000000000003 [ 189.574526] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 189.583012] head: 0017ffffc0000001 ffffea0004a94601 00000000ffffffff 00000000ffffffff [ 189.591511] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 189.599995] page dumped because: kasan: bad access detected [ 189.608408] Memory state around the buggy address: [ 189.613868] ffff88812a519400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 189.621749] ffff88812a519480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 189.629629] >ffff88812a519500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 189.637508] ^ [ 189.645302] ffff88812a519580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 189.653181] ffff88812a519600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 189.661067] ================================================================== [ 189.669000] ================================================================== [ 189.676886] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x1110 [kasan_test] [ 189.685812] Write of size 121 at addr ffff88812a519500 by task kunit_try_catch/4049 [ 189.696302] CPU: 5 UID: 0 PID: 4049 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 189.696307] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 189.696309] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 189.696310] Call Trace: [ 189.696312] [ 189.696313] dump_stack_lvl+0x4f/0x70 [ 189.696317] print_address_description.constprop.0+0x2c/0x3b0 [ 189.696321] ? copy_user_test_oob+0x3fd/0x1110 [kasan_test] [ 189.696330] print_report+0xb9/0x280 [ 189.696333] ? copy_user_test_oob+0x3fd/0x1110 [kasan_test] [ 189.696341] ? kasan_addr_to_slab+0x9/0x90 [ 189.696344] ? copy_user_test_oob+0x3fd/0x1110 [kasan_test] [ 189.696353] kasan_report+0xda/0x110 [ 189.696356] ? copy_user_test_oob+0x3fd/0x1110 [kasan_test] [ 189.696365] kasan_check_range+0xfc/0x1b0 [ 189.696368] copy_user_test_oob+0x3fd/0x1110 [kasan_test] [ 189.696377] ? __pfx_copy_user_test_oob+0x10/0x10 [kasan_test] [ 189.696386] ? finish_task_switch.isra.0+0x155/0x750 [ 189.696389] ? __switch_to+0x5ba/0x1020 [ 189.696392] ? __schedule+0x757/0x1420 [ 189.696395] ? __pfx_read_tsc+0x10/0x10 [ 189.696397] ? ktime_get_ts64+0x7f/0x220 [ 189.696400] kunit_try_run_case+0x175/0x440 [ 189.696403] ? __pfx_kunit_try_run_case+0x10/0x10 [ 189.696405] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 189.696409] ? __pfx_kunit_try_run_case+0x10/0x10 [ 189.696411] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 189.696415] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 189.696418] kthread+0x3b4/0x780 [ 189.696421] ? __pfx_kthread+0x10/0x10 [ 189.696424] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 189.696427] ? __pfx_kthread+0x10/0x10 [ 189.696430] ret_from_fork+0x30/0x70 [ 189.696433] ? __pfx_kthread+0x10/0x10 [ 189.696436] ret_from_fork_asm+0x1a/0x30 [ 189.696440] [ 189.890633] Allocated by task 4049: [ 189.894797] kasan_save_stack+0x1c/0x40 [ 189.899308] kasan_save_track+0x10/0x30 [ 189.903817] __kasan_kmalloc+0xa6/0xb0 [ 189.908242] __kmalloc_noprof+0x1e3/0x510 [ 189.912925] kunit_kmalloc_array+0x1c/0x50 [ 189.917695] copy_user_test_oob+0x9e/0x1110 [kasan_test] [ 189.923678] kunit_try_run_case+0x175/0x440 [ 189.928535] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 189.934603] kthread+0x3b4/0x780 [ 189.938508] ret_from_fork+0x30/0x70 [ 189.942759] ret_from_fork_asm+0x1a/0x30 [ 189.949532] The buggy address belongs to the object at ffff88812a519500 which belongs to the cache kmalloc-128 of size 128 [ 189.963378] The buggy address is located 0 bytes inside of allocated 120-byte region [ffff88812a519500, ffff88812a519578) [ 189.979315] The buggy address belongs to the physical page: [ 189.985553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x12a518 [ 189.994214] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 190.002527] ksm flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 190.010496] page_type: f5(slab) [ 190.014317] raw: 0017ffffc0000040 ffff888100042a00 ffffea0004494e00 0000000000000003 [ 190.022714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 190.031113] head: 0017ffffc0000040 ffff888100042a00 ffffea0004494e00 0000000000000003 [ 190.039599] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 190.048094] head: 0017ffffc0000001 ffffea0004a94601 00000000ffffffff 00000000ffffffff [ 190.056580] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 190.065076] page dumped because: kasan: bad access detected [ 190.073486] Memory state around the buggy address: [ 190.078947] ffff88812a519400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 190.086829] ffff88812a519480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 190.094711] >ffff88812a519500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 190.102592] ^ [ 190.110387] ffff88812a519580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 190.118269] ffff88812a519600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 190.126149] ================================================================== [ 190.134128] ================================================================== [ 190.142012] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4c3/0x1110 [kasan_test] [ 190.150951] Read of size 121 at addr ffff88812a519500 by task kunit_try_catch/4049 [ 190.161357] CPU: 5 UID: 0 PID: 4049 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 190.161362] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 190.161363] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 190.161365] Call Trace: [ 190.161366] [ 190.161368] dump_stack_lvl+0x4f/0x70 [ 190.161371] print_address_description.constprop.0+0x2c/0x3b0 [ 190.161375] ? copy_user_test_oob+0x4c3/0x1110 [kasan_test] [ 190.161384] print_report+0xb9/0x280 [ 190.161388] ? copy_user_test_oob+0x4c3/0x1110 [kasan_test] [ 190.161396] ? kasan_addr_to_slab+0x9/0x90 [ 190.161399] ? copy_user_test_oob+0x4c3/0x1110 [kasan_test] [ 190.161407] kasan_report+0xda/0x110 [ 190.161411] ? copy_user_test_oob+0x4c3/0x1110 [kasan_test] [ 190.161420] kasan_check_range+0xfc/0x1b0 [ 190.161423] copy_user_test_oob+0x4c3/0x1110 [kasan_test] [ 190.161431] ? __pfx_copy_user_test_oob+0x10/0x10 [kasan_test] [ 190.161440] ? finish_task_switch.isra.0+0x155/0x750 [ 190.161443] ? __switch_to+0x5ba/0x1020 [ 190.161446] ? __schedule+0x757/0x1420 [ 190.161449] ? __pfx_read_tsc+0x10/0x10 [ 190.161451] ? ktime_get_ts64+0x7f/0x220 [ 190.161454] kunit_try_run_case+0x175/0x440 [ 190.161457] ? __pfx_kunit_try_run_case+0x10/0x10 [ 190.161459] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 190.161463] ? __pfx_kunit_try_run_case+0x10/0x10 [ 190.161465] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 190.161468] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 190.161471] kthread+0x3b4/0x780 [ 190.161474] ? __pfx_kthread+0x10/0x10 [ 190.161477] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 190.161481] ? __pfx_kthread+0x10/0x10 [ 190.161484] ret_from_fork+0x30/0x70 [ 190.161487] ? __pfx_kthread+0x10/0x10 [ 190.161490] ret_from_fork_asm+0x1a/0x30 [ 190.161494] [ 190.355703] Allocated by task 4049: [ 190.359867] kasan_save_stack+0x1c/0x40 [ 190.364378] kasan_save_track+0x10/0x30 [ 190.368890] __kasan_kmalloc+0xa6/0xb0 [ 190.373315] __kmalloc_noprof+0x1e3/0x510 [ 190.378000] kunit_kmalloc_array+0x1c/0x50 [ 190.382769] copy_user_test_oob+0x9e/0x1110 [kasan_test] [ 190.388755] kunit_try_run_case+0x175/0x440 [ 190.393610] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 190.399677] kthread+0x3b4/0x780 [ 190.403585] ret_from_fork+0x30/0x70 [ 190.407835] ret_from_fork_asm+0x1a/0x30 [ 190.414609] The buggy address belongs to the object at ffff88812a519500 which belongs to the cache kmalloc-128 of size 128 [ 190.428454] The buggy address is located 0 bytes inside of allocated 120-byte region [ffff88812a519500, ffff88812a519578) [ 190.444390] The buggy address belongs to the physical page: [ 190.450627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x12a518 [ 190.459289] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 190.467603] ksm flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 190.475570] page_type: f5(slab) [ 190.479388] raw: 0017ffffc0000040 ffff888100042a00 ffffea0004494e00 0000000000000003 [ 190.487789] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 190.496189] head: 0017ffffc0000040 ffff888100042a00 ffffea0004494e00 0000000000000003 [ 190.504676] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 190.513161] head: 0017ffffc0000001 ffffea0004a94601 00000000ffffffff 00000000ffffffff [ 190.521647] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 190.530133] page dumped because: kasan: bad access detected [ 190.538548] Memory state around the buggy address: [ 190.544008] ffff88812a519400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 190.551889] ffff88812a519480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 190.559768] >ffff88812a519500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 190.567648] ^ [ 190.575441] ffff88812a519580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 190.583321] ffff88812a519600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 190.591200] ================================================================== [ 190.599132] ================================================================== [ 190.607035] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x57b/0x1110 [kasan_test] [ 190.615972] Write of size 121 at addr ffff88812a519500 by task kunit_try_catch/4049 [ 190.626460] CPU: 5 UID: 0 PID: 4049 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 190.626465] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 190.626467] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 190.626468] Call Trace: [ 190.626470] [ 190.626471] dump_stack_lvl+0x4f/0x70 [ 190.626475] print_address_description.constprop.0+0x2c/0x3b0 [ 190.626479] ? copy_user_test_oob+0x57b/0x1110 [kasan_test] [ 190.626488] print_report+0xb9/0x280 [ 190.626491] ? copy_user_test_oob+0x57b/0x1110 [kasan_test] [ 190.626499] ? kasan_addr_to_slab+0x9/0x90 [ 190.626502] ? copy_user_test_oob+0x57b/0x1110 [kasan_test] [ 190.626510] kasan_report+0xda/0x110 [ 190.626514] ? copy_user_test_oob+0x57b/0x1110 [kasan_test] [ 190.626523] kasan_check_range+0xfc/0x1b0 [ 190.626525] copy_user_test_oob+0x57b/0x1110 [kasan_test] [ 190.626534] ? __pfx_copy_user_test_oob+0x10/0x10 [kasan_test] [ 190.626542] ? finish_task_switch.isra.0+0x155/0x750 [ 190.626545] ? __switch_to+0x5ba/0x1020 [ 190.626548] ? __schedule+0x757/0x1420 [ 190.626551] ? __pfx_read_tsc+0x10/0x10 [ 190.626554] ? ktime_get_ts64+0x7f/0x220 [ 190.626557] kunit_try_run_case+0x175/0x440 [ 190.626559] ? __pfx_kunit_try_run_case+0x10/0x10 [ 190.626562] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 190.626565] ? __pfx_kunit_try_run_case+0x10/0x10 [ 190.626567] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 190.626571] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 190.626574] kthread+0x3b4/0x780 [ 190.626577] ? __pfx_kthread+0x10/0x10 [ 190.626580] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 190.626583] ? __pfx_kthread+0x10/0x10 [ 190.626586] ret_from_fork+0x30/0x70 [ 190.626589] ? __pfx_kthread+0x10/0x10 [ 190.626592] ret_from_fork_asm+0x1a/0x30 [ 190.626596] [ 190.820773] Allocated by task 4049: [ 190.824938] kasan_save_stack+0x1c/0x40 [ 190.829448] kasan_save_track+0x10/0x30 [ 190.833957] __kasan_kmalloc+0xa6/0xb0 [ 190.838380] __kmalloc_noprof+0x1e3/0x510 [ 190.843064] kunit_kmalloc_array+0x1c/0x50 [ 190.847842] copy_user_test_oob+0x9e/0x1110 [kasan_test] [ 190.853828] kunit_try_run_case+0x175/0x440 [ 190.858683] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 190.864749] kthread+0x3b4/0x780 [ 190.868654] ret_from_fork+0x30/0x70 [ 190.872905] ret_from_fork_asm+0x1a/0x30 [ 190.879676] The buggy address belongs to the object at ffff88812a519500 which belongs to the cache kmalloc-128 of size 128 [ 190.893524] The buggy address is located 0 bytes inside of allocated 120-byte region [ffff88812a519500, ffff88812a519578) [ 190.909455] The buggy address belongs to the physical page: [ 190.915692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x12a518 [ 190.924351] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 190.932663] ksm flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 190.940633] page_type: f5(slab) [ 190.944455] raw: 0017ffffc0000040 ffff888100042a00 ffffea0004494e00 0000000000000003 [ 190.952858] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 190.961259] head: 0017ffffc0000040 ffff888100042a00 ffffea0004494e00 0000000000000003 [ 190.969745] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 190.978232] head: 0017ffffc0000001 ffffea0004a94601 00000000ffffffff 00000000ffffffff [ 190.986719] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 190.995204] page dumped because: kasan: bad access detected [ 191.003617] Memory state around the buggy address: [ 191.009084] ffff88812a519400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 191.016967] ffff88812a519480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 191.024847] >ffff88812a519500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 191.032727] ^ [ 191.040520] ffff88812a519580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 191.048400] ffff88812a519600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 191.056279] ================================================================== [ 191.064168] ================================================================== [ 191.072068] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x630/0x1110 [kasan_test] [ 191.080994] Read of size 121 at addr ffff88812a519500 by task kunit_try_catch/4049 [ 191.091397] CPU: 5 UID: 0 PID: 4049 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 191.091403] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 191.091404] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 191.091406] Call Trace: [ 191.091407] [ 191.091408] dump_stack_lvl+0x4f/0x70 [ 191.091412] print_address_description.constprop.0+0x2c/0x3b0 [ 191.091416] ? copy_user_test_oob+0x630/0x1110 [kasan_test] [ 191.091425] print_report+0xb9/0x280 [ 191.091428] ? copy_user_test_oob+0x630/0x1110 [kasan_test] [ 191.091436] ? kasan_addr_to_slab+0x9/0x90 [ 191.091440] ? copy_user_test_oob+0x630/0x1110 [kasan_test] [ 191.091448] kasan_report+0xda/0x110 [ 191.091451] ? copy_user_test_oob+0x630/0x1110 [kasan_test] [ 191.091460] kasan_check_range+0xfc/0x1b0 [ 191.091463] copy_user_test_oob+0x630/0x1110 [kasan_test] [ 191.091472] ? __pfx_copy_user_test_oob+0x10/0x10 [kasan_test] [ 191.091481] ? finish_task_switch.isra.0+0x155/0x750 [ 191.091484] ? __switch_to+0x5ba/0x1020 [ 191.091487] ? __schedule+0x757/0x1420 [ 191.091490] ? __pfx_read_tsc+0x10/0x10 [ 191.091492] ? ktime_get_ts64+0x7f/0x220 [ 191.091495] kunit_try_run_case+0x175/0x440 [ 191.091498] ? __pfx_kunit_try_run_case+0x10/0x10 [ 191.091500] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 191.091504] ? __pfx_kunit_try_run_case+0x10/0x10 [ 191.091506] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 191.091509] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 191.091512] kthread+0x3b4/0x780 [ 191.091516] ? __pfx_kthread+0x10/0x10 [ 191.091518] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 191.091522] ? __pfx_kthread+0x10/0x10 [ 191.091525] ret_from_fork+0x30/0x70 [ 191.091528] ? __pfx_kthread+0x10/0x10 [ 191.091531] ret_from_fork_asm+0x1a/0x30 [ 191.091535] [ 191.285724] Allocated by task 4049: [ 191.289885] kasan_save_stack+0x1c/0x40 [ 191.294397] kasan_save_track+0x10/0x30 [ 191.298909] __kasan_kmalloc+0xa6/0xb0 [ 191.303335] __kmalloc_noprof+0x1e3/0x510 [ 191.308016] kunit_kmalloc_array+0x1c/0x50 [ 191.312795] copy_user_test_oob+0x9e/0x1110 [kasan_test] [ 191.318779] kunit_try_run_case+0x175/0x440 [ 191.323633] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 191.329698] kthread+0x3b4/0x780 [ 191.333601] ret_from_fork+0x30/0x70 [ 191.337851] ret_from_fork_asm+0x1a/0x30 [ 191.344621] The buggy address belongs to the object at ffff88812a519500 which belongs to the cache kmalloc-128 of size 128 [ 191.358463] The buggy address is located 0 bytes inside of allocated 120-byte region [ffff88812a519500, ffff88812a519578) [ 191.374391] The buggy address belongs to the physical page: [ 191.380627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x12a518 [ 191.389285] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 191.397596] ksm flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 191.405564] page_type: f5(slab) [ 191.409380] raw: 0017ffffc0000040 ffff888100042a00 ffffea0004494e00 0000000000000003 [ 191.417779] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 191.426177] head: 0017ffffc0000040 ffff888100042a00 ffffea0004494e00 0000000000000003 [ 191.434663] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 191.443147] head: 0017ffffc0000001 ffffea0004a94601 00000000ffffffff 00000000ffffffff [ 191.451631] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 191.460113] page dumped because: kasan: bad access detected [ 191.468523] Memory state around the buggy address: [ 191.473980] ffff88812a519400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 191.481858] ffff88812a519480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 191.489735] >ffff88812a519500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 191.497613] ^ [ 191.505404] ffff88812a519580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 191.513283] ffff88812a519600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 191.521163] ================================================================== [ 191.529068] ================================================================== [ 191.536949] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x210 [ 191.544485] Write of size 121 at addr ffff88812a519500 by task kunit_try_catch/4049 [ 191.554971] CPU: 5 UID: 0 PID: 4049 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 191.554976] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 191.554978] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 191.554980] Call Trace: [ 191.554981] [ 191.554982] dump_stack_lvl+0x4f/0x70 [ 191.554985] print_address_description.constprop.0+0x2c/0x3b0 [ 191.554989] ? strncpy_from_user+0x3c/0x210 [ 191.554993] print_report+0xb9/0x280 [ 191.554996] ? strncpy_from_user+0x3c/0x210 [ 191.554999] ? kasan_addr_to_slab+0x9/0x90 [ 191.555002] ? strncpy_from_user+0x3c/0x210 [ 191.555004] kasan_report+0xda/0x110 [ 191.555008] ? strncpy_from_user+0x3c/0x210 [ 191.555011] kasan_check_range+0xfc/0x1b0 [ 191.555014] strncpy_from_user+0x3c/0x210 [ 191.555029] copy_user_test_oob+0x796/0x1110 [kasan_test] [ 191.555039] ? __pfx_copy_user_test_oob+0x10/0x10 [kasan_test] [ 191.555048] ? finish_task_switch.isra.0+0x155/0x750 [ 191.555051] ? __switch_to+0x5ba/0x1020 [ 191.555063] ? __schedule+0x757/0x1420 [ 191.555066] ? __pfx_read_tsc+0x10/0x10 [ 191.555069] ? ktime_get_ts64+0x7f/0x220 [ 191.555081] kunit_try_run_case+0x175/0x440 [ 191.555084] ? __pfx_kunit_try_run_case+0x10/0x10 [ 191.555086] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 191.555090] ? __pfx_kunit_try_run_case+0x10/0x10 [ 191.555092] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 191.555095] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 191.555098] kthread+0x3b4/0x780 [ 191.555102] ? __pfx_kthread+0x10/0x10 [ 191.555104] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 191.555108] ? __pfx_kthread+0x10/0x10 [ 191.555111] ret_from_fork+0x30/0x70 [ 191.555114] ? __pfx_kthread+0x10/0x10 [ 191.555117] ret_from_fork_asm+0x1a/0x30 [ 191.555121] [ 191.748427] Allocated by task 4049: [ 191.752591] kasan_save_stack+0x1c/0x40 [ 191.757101] kasan_save_track+0x10/0x30 [ 191.761612] __kasan_kmalloc+0xa6/0xb0 [ 191.766037] __kmalloc_noprof+0x1e3/0x510 [ 191.770721] kunit_kmalloc_array+0x1c/0x50 [ 191.775489] copy_user_test_oob+0x9e/0x1110 [kasan_test] [ 191.781473] kunit_try_run_case+0x175/0x440 [ 191.786329] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 191.792398] kthread+0x3b4/0x780 [ 191.796303] ret_from_fork+0x30/0x70 [ 191.800553] ret_from_fork_asm+0x1a/0x30 [ 191.807324] The buggy address belongs to the object at ffff88812a519500 which belongs to the cache kmalloc-128 of size 128 [ 191.821169] The buggy address is located 0 bytes inside of allocated 120-byte region [ffff88812a519500, ffff88812a519578) [ 191.837096] The buggy address belongs to the physical page: [ 191.843333] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x12a518 [ 191.851991] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 191.860302] ksm flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 191.868269] page_type: f5(slab) [ 191.872085] raw: 0017ffffc0000040 ffff888100042a00 ffffea0004494e00 0000000000000003 [ 191.880482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 191.888884] head: 0017ffffc0000040 ffff888100042a00 ffffea0004494e00 0000000000000003 [ 191.897370] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 191.905857] head: 0017ffffc0000001 ffffea0004a94601 00000000ffffffff 00000000ffffffff [ 191.914344] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 191.922829] page dumped because: kasan: bad access detected [ 191.931253] Memory state around the buggy address: [ 191.936715] ffff88812a519400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 191.944597] ffff88812a519480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 191.952478] >ffff88812a519500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 191.960357] ^ [ 191.968150] ffff88812a519580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 191.976038] ffff88812a519600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 191.983918] ================================================================== [ 191.991846] ================================================================== [ 191.999737] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1e2/0x210 [ 192.007359] Write of size 1 at addr ffff88812a519578 by task kunit_try_catch/4049 [ 192.017677] CPU: 5 UID: 0 PID: 4049 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 192.017682] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 192.017684] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 192.017685] Call Trace: [ 192.017686] [ 192.017688] dump_stack_lvl+0x4f/0x70 [ 192.017691] print_address_description.constprop.0+0x2c/0x3b0 [ 192.017695] ? strncpy_from_user+0x1e2/0x210 [ 192.017698] print_report+0xb9/0x280 [ 192.017701] ? strncpy_from_user+0x1e2/0x210 [ 192.017704] ? kasan_addr_to_slab+0x9/0x90 [ 192.017707] ? strncpy_from_user+0x1e2/0x210 [ 192.017710] kasan_report+0xda/0x110 [ 192.017713] ? strncpy_from_user+0x1e2/0x210 [ 192.017717] strncpy_from_user+0x1e2/0x210 [ 192.017720] copy_user_test_oob+0x796/0x1110 [kasan_test] [ 192.017730] ? __pfx_copy_user_test_oob+0x10/0x10 [kasan_test] [ 192.017739] ? finish_task_switch.isra.0+0x155/0x750 [ 192.017741] ? __switch_to+0x5ba/0x1020 [ 192.017744] ? __schedule+0x757/0x1420 [ 192.017747] ? __pfx_read_tsc+0x10/0x10 [ 192.017749] ? ktime_get_ts64+0x7f/0x220 [ 192.017752] kunit_try_run_case+0x175/0x440 [ 192.017755] ? __pfx_kunit_try_run_case+0x10/0x10 [ 192.017757] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 192.017761] ? __pfx_kunit_try_run_case+0x10/0x10 [ 192.017763] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 192.017766] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 192.017769] kthread+0x3b4/0x780 [ 192.017772] ? __pfx_kthread+0x10/0x10 [ 192.017775] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 192.017779] ? __pfx_kthread+0x10/0x10 [ 192.017782] ret_from_fork+0x30/0x70 [ 192.017785] ? __pfx_kthread+0x10/0x10 [ 192.017787] ret_from_fork_asm+0x1a/0x30 [ 192.017792] [ 192.206860] Allocated by task 4049: [ 192.211035] kasan_save_stack+0x1c/0x40 [ 192.215545] kasan_save_track+0x10/0x30 [ 192.220065] __kasan_kmalloc+0xa6/0xb0 [ 192.224499] __kmalloc_noprof+0x1e3/0x510 [ 192.229182] kunit_kmalloc_array+0x1c/0x50 [ 192.233951] copy_user_test_oob+0x9e/0x1110 [kasan_test] [ 192.239937] kunit_try_run_case+0x175/0x440 [ 192.244792] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 192.250859] kthread+0x3b4/0x780 [ 192.254764] ret_from_fork+0x30/0x70 [ 192.259016] ret_from_fork_asm+0x1a/0x30 [ 192.265801] The buggy address belongs to the object at ffff88812a519500 which belongs to the cache kmalloc-128 of size 128 [ 192.279646] The buggy address is located 0 bytes to the right of allocated 120-byte region [ffff88812a519500, ffff88812a519578) [ 192.296099] The buggy address belongs to the physical page: [ 192.302336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x12a518 [ 192.310994] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 192.319308] ksm flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 192.327275] page_type: f5(slab) [ 192.331095] raw: 0017ffffc0000040 ffff888100042a00 ffffea0004494e00 0000000000000003 [ 192.339497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 192.347898] head: 0017ffffc0000040 ffff888100042a00 ffffea0004494e00 0000000000000003 [ 192.356383] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 192.364869] head: 0017ffffc0000001 ffffea0004a94601 00000000ffffffff 00000000ffffffff [ 192.373355] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 192.381840] page dumped because: kasan: bad access detected [ 192.390261] Memory state around the buggy address: [ 192.395720] ffff88812a519400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 192.403603] ffff88812a519480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 192.411486] >ffff88812a519500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 192.419366] ^ [ 192.427158] ffff88812a519580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 192.435040] ffff88812a519600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 192.442921] ================================================================== [ 192.450812] # copy_user_test_oob: Test should be marked slow (runtime: 3.713637159s) [ 192.451004] ok 75 copy_user_test_oob [ 192.494108] # kasan: pass:51 fail:0 skip:24 total:75 [ 192.498748] # Totals: pass:51 fail:0 skip:24 total:75 [ 192.504432] ok 1 kasan [ 192.516036] insmod /lib/modules/6.15.0-rc7-00008-gfe301d6b4b4a/kernel/mm/kasan/kasan_test.ko [ 192.528130] 2025-05-28 16:50:52 rmmod kasan_test [ 192.560721] run_kunit_tests: test kfence_test [ 192.570913] 2025-05-28 16:50:52 modprobe -v kfence_test [ 192.580290] KTAP version 1 [ 192.583694] 1..1 [ 192.586463] KTAP version 1 [ 192.590202] # Subtest: kfence [ 192.594214] 1..27 [ 192.597350] # test_out_of_bounds_read: test_alloc: size=32, gfp=cc0, policy=left, cache=0 [ 192.820044] ================================================================== [ 192.827929] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x122/0x4e0 [kfence_test] [ 192.839531] Out-of-bounds read at 0x00000000a7b63d75 (1B left of kfence-#223): [ 192.847413] test_out_of_bounds_read+0x122/0x4e0 [kfence_test] [ 192.853912] kunit_try_run_case+0x175/0x440 [ 192.858768] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 192.864833] kthread+0x3b4/0x780 [ 192.868739] ret_from_fork+0x30/0x70 [ 192.872989] ret_from_fork_asm+0x1a/0x30 [ 192.879762] kfence-#223: 0x000000002c53ae37-0x0000000069e3ee9e, size=32, cache=kmalloc-32 [ 192.890755] allocated by task 4070 on cpu 7 at 192.820038s (0.070716s ago): [ 192.898381] test_alloc+0x322/0x1110 [kfence_test] [ 192.903841] test_out_of_bounds_read+0xe9/0x4e0 [kfence_test] [ 192.910251] kunit_try_run_case+0x175/0x440 [ 192.915104] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 192.921167] kthread+0x3b4/0x780 [ 192.925073] ret_from_fork+0x30/0x70 [ 192.929323] ret_from_fork_asm+0x1a/0x30 [ 192.936093] CPU: 7 UID: 0 PID: 4070 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 192.949421] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 192.956089] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 192.963966] ================================================================== [ 192.971888] # test_out_of_bounds_read: test_alloc: size=32, gfp=cc0, policy=right, cache=0 [ 193.180042] ================================================================== [ 193.187927] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x212/0x4e0 [kfence_test] [ 193.199525] Out-of-bounds read at 0x0000000017b48d7f (32B right of kfence-#227): [ 193.207579] test_out_of_bounds_read+0x212/0x4e0 [kfence_test] [ 193.214081] kunit_try_run_case+0x175/0x440 [ 193.218937] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 193.225002] kthread+0x3b4/0x780 [ 193.228907] ret_from_fork+0x30/0x70 [ 193.233160] ret_from_fork_asm+0x1a/0x30 [ 193.239931] kfence-#227: 0x00000000f3ce6dee-0x000000006dd1d557, size=32, cache=kmalloc-32 [ 193.250924] allocated by task 4070 on cpu 7 at 193.180039s (0.070885s ago): [ 193.258551] test_alloc+0x322/0x1110 [kfence_test] [ 193.264013] test_out_of_bounds_read+0x1de/0x4e0 [kfence_test] [ 193.270513] kunit_try_run_case+0x175/0x440 [ 193.275370] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 193.281435] kthread+0x3b4/0x780 [ 193.285340] ret_from_fork+0x30/0x70 [ 193.289592] ret_from_fork_asm+0x1a/0x30 [ 193.296362] CPU: 7 UID: 0 PID: 4070 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 193.309690] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 193.316360] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 193.324238] ================================================================== [ 193.332314] ok 1 test_out_of_bounds_read [ 193.332476] # test_out_of_bounds_read-memcache: setup_test_cache: size=32, ctor=0x0 [ 193.346301] # test_out_of_bounds_read-memcache: test_alloc: size=32, gfp=cc0, policy=left, cache=1 [ 193.436043] ================================================================== [ 193.443925] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x122/0x4e0 [kfence_test] [ 193.455529] Out-of-bounds read at 0x000000007fdb9d14 (1B left of kfence-#228): [ 193.463411] test_out_of_bounds_read+0x122/0x4e0 [kfence_test] [ 193.469909] kunit_try_run_case+0x175/0x440 [ 193.474764] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 193.480829] kthread+0x3b4/0x780 [ 193.484737] ret_from_fork+0x30/0x70 [ 193.488989] ret_from_fork_asm+0x1a/0x30 [ 193.495760] kfence-#228: 0x0000000080af7f04-0x000000009d63d873, size=32, cache=test [ 193.506234] allocated by task 4073 on cpu 0 at 193.436038s (0.070195s ago): [ 193.513858] test_alloc+0x283/0x1110 [kfence_test] [ 193.519321] test_out_of_bounds_read+0xe9/0x4e0 [kfence_test] [ 193.525737] kunit_try_run_case+0x175/0x440 [ 193.530593] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 193.536663] kthread+0x3b4/0x780 [ 193.540570] ret_from_fork+0x30/0x70 [ 193.544822] ret_from_fork_asm+0x1a/0x30 [ 193.551594] CPU: 0 UID: 0 PID: 4073 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 193.564925] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 193.571596] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 193.579477] ================================================================== [ 193.587378] # test_out_of_bounds_read-memcache: test_alloc: size=32, gfp=cc0, policy=right, cache=1 [ 193.692040] ================================================================== [ 193.699921] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x212/0x4e0 [kfence_test] [ 193.711521] Out-of-bounds read at 0x0000000094c9b1bc (32B right of kfence-#230): [ 193.719574] test_out_of_bounds_read+0x212/0x4e0 [kfence_test] [ 193.726073] kunit_try_run_case+0x175/0x440 [ 193.730928] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 193.736995] kthread+0x3b4/0x780 [ 193.740899] ret_from_fork+0x30/0x70 [ 193.745152] ret_from_fork_asm+0x1a/0x30 [ 193.751924] kfence-#230: 0x000000005b8c825c-0x000000006842b6b5, size=32, cache=test [ 193.762400] allocated by task 4073 on cpu 0 at 193.692037s (0.070363s ago): [ 193.770025] test_alloc+0x283/0x1110 [kfence_test] [ 193.775487] test_out_of_bounds_read+0x1de/0x4e0 [kfence_test] [ 193.781986] kunit_try_run_case+0x175/0x440 [ 193.786843] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 193.792912] kthread+0x3b4/0x780 [ 193.796817] ret_from_fork+0x30/0x70 [ 193.801068] ret_from_fork_asm+0x1a/0x30 [ 193.807842] CPU: 0 UID: 0 PID: 4073 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 193.821172] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 193.827839] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 193.835719] ================================================================== [ 193.890332] ok 2 test_out_of_bounds_read-memcache [ 193.890568] # test_out_of_bounds_write: test_alloc: size=32, gfp=cc0, policy=left, cache=0 [ 194.156045] ================================================================== [ 194.163933] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x109/0x260 [kfence_test] [ 194.175711] Out-of-bounds write at 0x0000000089da2c4d (1B left of kfence-#235): [ 194.183679] test_out_of_bounds_write+0x109/0x260 [kfence_test] [ 194.190267] kunit_try_run_case+0x175/0x440 [ 194.195122] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 194.201189] kthread+0x3b4/0x780 [ 194.205096] ret_from_fork+0x30/0x70 [ 194.209347] ret_from_fork_asm+0x1a/0x30 [ 194.216120] kfence-#235: 0x000000008db81575-0x00000000ddd7d920, size=32, cache=kmalloc-32 [ 194.227111] allocated by task 4077 on cpu 0 at 194.156039s (0.071072s ago): [ 194.234737] test_alloc+0x322/0x1110 [kfence_test] [ 194.240199] test_out_of_bounds_write+0xd0/0x260 [kfence_test] [ 194.246697] kunit_try_run_case+0x175/0x440 [ 194.251553] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 194.257617] kthread+0x3b4/0x780 [ 194.261522] ret_from_fork+0x30/0x70 [ 194.265773] ret_from_fork_asm+0x1a/0x30 [ 194.272554] CPU: 0 UID: 0 PID: 4077 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 194.285881] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 194.292550] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 194.300430] ================================================================== [ 194.308474] ok 3 test_out_of_bounds_write [ 194.308611] # test_out_of_bounds_write-memcache: setup_test_cache: size=32, ctor=0x0 [ 194.322550] # test_out_of_bounds_write-memcache: test_alloc: size=32, gfp=cc0, policy=left, cache=1 [ 194.596045] ================================================================== [ 194.603936] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x109/0x260 [kfence_test] [ 194.615713] Out-of-bounds write at 0x000000008ea78d7a (1B left of kfence-#237): [ 194.623684] test_out_of_bounds_write+0x109/0x260 [kfence_test] [ 194.630271] kunit_try_run_case+0x175/0x440 [ 194.635128] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 194.641192] kthread+0x3b4/0x780 [ 194.645101] ret_from_fork+0x30/0x70 [ 194.649351] ret_from_fork_asm+0x1a/0x30 [ 194.656126] kfence-#237: 0x00000000517ce22e-0x0000000097c9ab4e, size=32, cache=test [ 194.666603] allocated by task 4079 on cpu 0 at 194.596039s (0.070564s ago): [ 194.674231] test_alloc+0x283/0x1110 [kfence_test] [ 194.679694] test_out_of_bounds_write+0xd0/0x260 [kfence_test] [ 194.686194] kunit_try_run_case+0x175/0x440 [ 194.691051] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 194.697117] kthread+0x3b4/0x780 [ 194.701023] ret_from_fork+0x30/0x70 [ 194.705275] ret_from_fork_asm+0x1a/0x30 [ 194.712050] CPU: 0 UID: 0 PID: 4079 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 194.725379] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 194.732049] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 194.739930] ================================================================== [ 194.787130] ok 4 test_out_of_bounds_write-memcache [ 194.787512] # test_use_after_free_read: test_alloc: size=32, gfp=cc0, policy=any, cache=0 [ 194.852078] ================================================================== [ 194.859961] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x125/0x270 [kfence_test] [ 194.871738] Use-after-free read at 0x0000000048e0d2b4 (in kfence-#240): [ 194.879014] test_use_after_free_read+0x125/0x270 [kfence_test] [ 194.885600] kunit_try_run_case+0x175/0x440 [ 194.890459] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 194.896525] kthread+0x3b4/0x780 [ 194.900431] ret_from_fork+0x30/0x70 [ 194.904684] ret_from_fork_asm+0x1a/0x30 [ 194.911458] kfence-#240: 0x0000000048e0d2b4-0x0000000028fe8deb, size=32, cache=kmalloc-32 [ 194.922453] allocated by task 4084 on cpu 0 at 194.852060s (0.070392s ago): [ 194.930083] test_alloc+0x322/0x1110 [kfence_test] [ 194.935545] test_use_after_free_read+0xd8/0x270 [kfence_test] [ 194.942045] kunit_try_run_case+0x175/0x440 [ 194.946902] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 194.952970] kthread+0x3b4/0x780 [ 194.956876] ret_from_fork+0x30/0x70 [ 194.961126] ret_from_fork_asm+0x1a/0x30 [ 194.967897] freed by task 4084 on cpu 0 at 194.852063s (0.115833s ago): [ 194.975176] test_use_after_free_read+0x1e3/0x270 [kfence_test] [ 194.981765] kunit_try_run_case+0x175/0x440 [ 194.986620] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 194.992686] kthread+0x3b4/0x780 [ 194.996592] ret_from_fork+0x30/0x70 [ 195.000842] ret_from_fork_asm+0x1a/0x30 [ 195.007618] CPU: 0 UID: 0 PID: 4084 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 195.020949] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 195.027618] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 195.035498] ================================================================== [ 195.043585] ok 5 test_use_after_free_read [ 195.043703] # test_use_after_free_read-memcache: setup_test_cache: size=32, ctor=0x0 [ 195.057650] # test_use_after_free_read-memcache: test_alloc: size=32, gfp=cc0, policy=any, cache=1 [ 195.148044] ================================================================== [ 195.155926] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x125/0x270 [kfence_test] [ 195.167703] Use-after-free read at 0x00000000d3fbb1ac (in kfence-#238): [ 195.174980] test_use_after_free_read+0x125/0x270 [kfence_test] [ 195.181566] kunit_try_run_case+0x175/0x440 [ 195.186421] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 195.192490] kthread+0x3b4/0x780 [ 195.196398] ret_from_fork+0x30/0x70 [ 195.200651] ret_from_fork_asm+0x1a/0x30 [ 195.207423] kfence-#238: 0x00000000d3fbb1ac-0x000000000eef7fb2, size=32, cache=test [ 195.217899] allocated by task 4086 on cpu 0 at 195.148038s (0.069861s ago): [ 195.225526] test_alloc+0x283/0x1110 [kfence_test] [ 195.230988] test_use_after_free_read+0xd8/0x270 [kfence_test] [ 195.237489] kunit_try_run_case+0x175/0x440 [ 195.242345] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 195.248409] kthread+0x3b4/0x780 [ 195.252315] ret_from_fork+0x30/0x70 [ 195.256566] ret_from_fork_asm+0x1a/0x30 [ 195.263338] freed by task 4086 on cpu 0 at 195.148040s (0.115297s ago): [ 195.270616] test_use_after_free_read+0xf7/0x270 [kfence_test] [ 195.277118] kunit_try_run_case+0x175/0x440 [ 195.281973] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 195.288041] kthread+0x3b4/0x780 [ 195.291947] ret_from_fork+0x30/0x70 [ 195.296198] ret_from_fork_asm+0x1a/0x30 [ 195.302972] CPU: 0 UID: 0 PID: 4086 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 195.316302] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 195.322973] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 195.330853] ================================================================== [ 195.376216] ok 6 test_use_after_free_read-memcache [ 195.376482] # test_use_after_free_read_nofault: test_alloc: size=32, gfp=cc0, policy=any, cache=0 [ 195.444286] ok 7 test_use_after_free_read_nofault [ 195.444514] # test_use_after_free_read_nofault-memcache: setup_test_cache: size=32, ctor=0x0 [ 195.459858] # test_use_after_free_read_nofault-memcache: test_alloc: size=32, gfp=cc0, policy=any, cache=1 [ 195.584975] ok 8 test_use_after_free_read_nofault-memcache [ 195.585260] # test_double_free: test_alloc: size=32, gfp=cc0, policy=any, cache=0 [ 195.652057] ================================================================== [ 195.659939] BUG: KFENCE: invalid free in test_double_free+0x1cf/0x260 [kfence_test] [ 195.670419] Invalid free of 0x000000008f22632c (in kfence-#247): [ 195.677090] test_double_free+0x1cf/0x260 [kfence_test] [ 195.682986] kunit_try_run_case+0x175/0x440 [ 195.687842] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 195.693908] kthread+0x3b4/0x780 [ 195.697813] ret_from_fork+0x30/0x70 [ 195.702068] ret_from_fork_asm+0x1a/0x30 [ 195.708841] kfence-#247: 0x000000008f22632c-0x00000000cad22c1d, size=32, cache=kmalloc-32 [ 195.719836] allocated by task 4095 on cpu 0 at 195.652044s (0.067792s ago): [ 195.727463] test_alloc+0x322/0x1110 [kfence_test] [ 195.732925] test_double_free+0xd7/0x260 [kfence_test] [ 195.738731] kunit_try_run_case+0x175/0x440 [ 195.743588] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 195.749654] kthread+0x3b4/0x780 [ 195.753558] ret_from_fork+0x30/0x70 [ 195.757809] ret_from_fork_asm+0x1a/0x30 [ 195.764580] freed by task 4095 on cpu 0 at 195.652047s (0.112532s ago): [ 195.771860] test_double_free+0x1dc/0x260 [kfence_test] [ 195.777754] kunit_try_run_case+0x175/0x440 [ 195.782607] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 195.788675] kthread+0x3b4/0x780 [ 195.792582] ret_from_fork+0x30/0x70 [ 195.796835] ret_from_fork_asm+0x1a/0x30 [ 195.803608] CPU: 0 UID: 0 PID: 4095 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 195.816940] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 195.823611] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 195.831495] ================================================================== [ 195.839609] ok 9 test_double_free [ 195.839757] # test_double_free-memcache: setup_test_cache: size=32, ctor=0x0 [ 195.852322] # test_double_free-memcache: test_alloc: size=32, gfp=cc0, policy=any, cache=1 [ 195.940048] ================================================================== [ 195.947931] BUG: KFENCE: invalid free in test_double_free+0x10e/0x260 [kfence_test] [ 195.958407] Invalid free of 0x000000002c932ca3 (in kfence-#249): [ 195.965078] test_double_free+0x10e/0x260 [kfence_test] [ 195.970971] kunit_try_run_case+0x175/0x440 [ 195.975826] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 195.981893] kthread+0x3b4/0x780 [ 195.985798] ret_from_fork+0x30/0x70 [ 195.990049] ret_from_fork_asm+0x1a/0x30 [ 195.996820] kfence-#249: 0x000000002c932ca3-0x00000000f66ee308, size=32, cache=test [ 196.007292] allocated by task 4097 on cpu 5 at 195.940041s (0.067251s ago): [ 196.014915] test_alloc+0x283/0x1110 [kfence_test] [ 196.020379] test_double_free+0xd7/0x260 [kfence_test] [ 196.026189] kunit_try_run_case+0x175/0x440 [ 196.031044] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 196.037111] kthread+0x3b4/0x780 [ 196.041017] ret_from_fork+0x30/0x70 [ 196.045267] ret_from_fork_asm+0x1a/0x30 [ 196.052040] freed by task 4097 on cpu 5 at 195.940043s (0.111996s ago): [ 196.059319] test_double_free+0xf6/0x260 [kfence_test] [ 196.065128] kunit_try_run_case+0x175/0x440 [ 196.069984] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 196.076050] kthread+0x3b4/0x780 [ 196.079956] ret_from_fork+0x30/0x70 [ 196.084209] ret_from_fork_asm+0x1a/0x30 [ 196.090983] CPU: 5 UID: 0 PID: 4097 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 196.104312] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 196.110982] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 196.118861] ================================================================== [ 196.173343] ok 10 test_double_free-memcache [ 196.173606] # test_invalid_addr_free: test_alloc: size=32, gfp=cc0, policy=any, cache=0 [ 196.228051] ================================================================== [ 196.235934] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1dd/0x260 [kfence_test] [ 196.246934] Invalid free of 0x00000000a678481b (in kfence-#251): [ 196.253608] test_invalid_addr_free+0x1dd/0x260 [kfence_test] [ 196.260023] kunit_try_run_case+0x175/0x440 [ 196.264879] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 196.270945] kthread+0x3b4/0x780 [ 196.274850] ret_from_fork+0x30/0x70 [ 196.279100] ret_from_fork_asm+0x1a/0x30 [ 196.285874] kfence-#251: 0x000000004bfcf169-0x00000000560c385f, size=32, cache=kmalloc-32 [ 196.296867] allocated by task 4099 on cpu 5 at 196.228041s (0.068825s ago): [ 196.304492] test_alloc+0x322/0x1110 [kfence_test] [ 196.309954] test_invalid_addr_free+0xd7/0x260 [kfence_test] [ 196.316282] kunit_try_run_case+0x175/0x440 [ 196.321137] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 196.327201] kthread+0x3b4/0x780 [ 196.331106] ret_from_fork+0x30/0x70 [ 196.335356] ret_from_fork_asm+0x1a/0x30 [ 196.342129] CPU: 5 UID: 0 PID: 4099 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 196.355459] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 196.362129] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 196.370008] ================================================================== [ 196.378034] ok 11 test_invalid_addr_free [ 196.378265] # test_invalid_addr_free-memcache: setup_test_cache: size=32, ctor=0x0 [ 196.391948] # test_invalid_addr_free-memcache: test_alloc: size=32, gfp=cc0, policy=any, cache=1 [ 196.460047] ================================================================== [ 196.467930] BUG: KFENCE: invalid free in test_invalid_addr_free+0xf7/0x260 [kfence_test] [ 196.478841] Invalid free of 0x00000000f9666068 (in kfence-#2): [ 196.485341] test_invalid_addr_free+0xf7/0x260 [kfence_test] [ 196.491669] kunit_try_run_case+0x175/0x440 [ 196.496522] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 196.502588] kthread+0x3b4/0x780 [ 196.506495] ret_from_fork+0x30/0x70 [ 196.510743] ret_from_fork_asm+0x1a/0x30 [ 196.517515] kfence-#2: 0x000000006eb83a35-0x000000000068322b, size=32, cache=test [ 196.527817] allocated by task 4104 on cpu 5 at 196.460040s (0.067776s ago): [ 196.535443] test_alloc+0x283/0x1110 [kfence_test] [ 196.540904] test_invalid_addr_free+0xd7/0x260 [kfence_test] [ 196.547232] kunit_try_run_case+0x175/0x440 [ 196.552086] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 196.558150] kthread+0x3b4/0x780 [ 196.562056] ret_from_fork+0x30/0x70 [ 196.566307] ret_from_fork_asm+0x1a/0x30 [ 196.573083] CPU: 5 UID: 0 PID: 4104 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 196.586411] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 196.593081] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 196.600961] ================================================================== [ 196.645267] ok 12 test_invalid_addr_free-memcache [ 196.645526] # test_corruption: test_alloc: size=32, gfp=cc0, policy=left, cache=0 [ 196.716058] ================================================================== [ 196.723941] BUG: KFENCE: memory corruption in test_corruption+0x2ce/0x3e0 [kfence_test] [ 196.734769] Corrupted memory at 0x000000000636ed5b [ ! . . . . . . . . . . . . . . . ] (in kfence-#3): [ 196.744744] test_corruption+0x2ce/0x3e0 [kfence_test] [ 196.750550] kunit_try_run_case+0x175/0x440 [ 196.755406] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 196.761472] kthread+0x3b4/0x780 [ 196.765381] ret_from_fork+0x30/0x70 [ 196.769633] ret_from_fork_asm+0x1a/0x30 [ 196.776407] kfence-#3: 0x000000002da6bcac-0x000000001ba50510, size=32, cache=kmalloc-32 [ 196.787226] allocated by task 4106 on cpu 6 at 196.716043s (0.071183s ago): [ 196.794852] test_alloc+0x322/0x1110 [kfence_test] [ 196.800317] test_corruption+0xe2/0x3e0 [kfence_test] [ 196.806037] kunit_try_run_case+0x175/0x440 [ 196.810894] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 196.816960] kthread+0x3b4/0x780 [ 196.820863] ret_from_fork+0x30/0x70 [ 196.825116] ret_from_fork_asm+0x1a/0x30 [ 196.831887] freed by task 4106 on cpu 6 at 196.716046s (0.115840s ago): [ 196.839166] test_corruption+0x2ce/0x3e0 [kfence_test] [ 196.844973] kunit_try_run_case+0x175/0x440 [ 196.849830] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 196.855896] kthread+0x3b4/0x780 [ 196.859800] ret_from_fork+0x30/0x70 [ 196.864052] ret_from_fork_asm+0x1a/0x30 [ 196.870824] CPU: 6 UID: 0 PID: 4106 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 196.884157] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 196.890827] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 196.898708] ================================================================== [ 196.906627] # test_corruption: test_alloc: size=32, gfp=cc0, policy=right, cache=0 [ 197.012048] ================================================================== [ 197.019932] BUG: KFENCE: memory corruption in test_corruption+0x2db/0x3e0 [kfence_test] [ 197.030758] Corrupted memory at 0x00000000e41536a9 [ ! ] (in kfence-#5): [ 197.038126] test_corruption+0x2db/0x3e0 [kfence_test] [ 197.043936] kunit_try_run_case+0x175/0x440 [ 197.048792] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 197.054857] kthread+0x3b4/0x780 [ 197.058763] ret_from_fork+0x30/0x70 [ 197.063014] ret_from_fork_asm+0x1a/0x30 [ 197.069786] kfence-#5: 0x00000000774875d5-0x00000000822e050d, size=32, cache=kmalloc-32 [ 197.080608] allocated by task 4106 on cpu 6 at 197.012039s (0.068569s ago): [ 197.088235] test_alloc+0x322/0x1110 [kfence_test] [ 197.093699] test_corruption+0x1c7/0x3e0 [kfence_test] [ 197.099508] kunit_try_run_case+0x175/0x440 [ 197.104363] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 197.110430] kthread+0x3b4/0x780 [ 197.114336] ret_from_fork+0x30/0x70 [ 197.118588] ret_from_fork_asm+0x1a/0x30 [ 197.125359] freed by task 4106 on cpu 6 at 197.012042s (0.113316s ago): [ 197.132637] test_corruption+0x2db/0x3e0 [kfence_test] [ 197.138444] kunit_try_run_case+0x175/0x440 [ 197.143298] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 197.149362] kthread+0x3b4/0x780 [ 197.153268] ret_from_fork+0x30/0x70 [ 197.157516] ret_from_fork_asm+0x1a/0x30 [ 197.164287] CPU: 6 UID: 0 PID: 4106 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 197.177616] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 197.184288] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 197.192167] ================================================================== [ 197.200328] ok 13 test_corruption [ 197.200457] # test_corruption-memcache: setup_test_cache: size=32, ctor=0x0 [ 197.212933] # test_corruption-memcache: test_alloc: size=32, gfp=cc0, policy=left, cache=1 [ 197.412069] ================================================================== [ 197.419955] BUG: KFENCE: memory corruption in test_corruption+0x12d/0x3e0 [kfence_test] [ 197.430776] Corrupted memory at 0x000000006acf3535 [ ! . . . . . . . . . . . . . . . ] (in kfence-#11): [ 197.440836] test_corruption+0x12d/0x3e0 [kfence_test] [ 197.446645] kunit_try_run_case+0x175/0x440 [ 197.451501] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 197.457567] kthread+0x3b4/0x780 [ 197.461473] ret_from_fork+0x30/0x70 [ 197.465723] ret_from_fork_asm+0x1a/0x30 [ 197.472494] kfence-#11: 0x00000000d85acfea-0x00000000821023c0, size=32, cache=test [ 197.482882] allocated by task 4108 on cpu 5 at 197.412058s (0.070823s ago): [ 197.490505] test_alloc+0x283/0x1110 [kfence_test] [ 197.495968] test_corruption+0xe2/0x3e0 [kfence_test] [ 197.501689] kunit_try_run_case+0x175/0x440 [ 197.506544] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 197.512610] kthread+0x3b4/0x780 [ 197.516512] ret_from_fork+0x30/0x70 [ 197.520763] ret_from_fork_asm+0x1a/0x30 [ 197.527533] freed by task 4108 on cpu 5 at 197.412061s (0.115472s ago): [ 197.534810] test_corruption+0x12d/0x3e0 [kfence_test] [ 197.540615] kunit_try_run_case+0x175/0x440 [ 197.545468] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 197.551534] kthread+0x3b4/0x780 [ 197.555438] ret_from_fork+0x30/0x70 [ 197.559689] ret_from_fork_asm+0x1a/0x30 [ 197.566461] CPU: 5 UID: 0 PID: 4108 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 197.579790] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 197.586459] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 197.594336] ================================================================== [ 197.602251] # test_corruption-memcache: test_alloc: size=32, gfp=cc0, policy=right, cache=1 [ 197.708048] ================================================================== [ 197.715933] BUG: KFENCE: memory corruption in test_corruption+0x212/0x3e0 [kfence_test] [ 197.726756] Corrupted memory at 0x00000000aa85e43f [ ! ] (in kfence-#13): [ 197.734212] test_corruption+0x212/0x3e0 [kfence_test] [ 197.740021] kunit_try_run_case+0x175/0x440 [ 197.744876] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 197.750944] kthread+0x3b4/0x780 [ 197.754849] ret_from_fork+0x30/0x70 [ 197.759099] ret_from_fork_asm+0x1a/0x30 [ 197.765873] kfence-#13: 0x00000000d1ffb101-0x0000000019f4e664, size=32, cache=test [ 197.776265] allocated by task 4108 on cpu 5 at 197.708040s (0.068224s ago): [ 197.783891] test_alloc+0x283/0x1110 [kfence_test] [ 197.789354] test_corruption+0x1c7/0x3e0 [kfence_test] [ 197.795161] kunit_try_run_case+0x175/0x440 [ 197.800017] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 197.806083] kthread+0x3b4/0x780 [ 197.809990] ret_from_fork+0x30/0x70 [ 197.814243] ret_from_fork_asm+0x1a/0x30 [ 197.821013] freed by task 4108 on cpu 5 at 197.708042s (0.112970s ago): [ 197.828290] test_corruption+0x212/0x3e0 [kfence_test] [ 197.834097] kunit_try_run_case+0x175/0x440 [ 197.838951] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 197.845016] kthread+0x3b4/0x780 [ 197.848922] ret_from_fork+0x30/0x70 [ 197.853172] ret_from_fork_asm+0x1a/0x30 [ 197.859944] CPU: 5 UID: 0 PID: 4108 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 197.873274] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 197.879945] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 197.887825] ================================================================== [ 197.941148] ok 14 test_corruption-memcache [ 197.941539] # test_free_bulk: test_alloc: size=200, gfp=cc0, policy=right, cache=0 [ 197.996047] # test_free_bulk: test_alloc: size=200, gfp=cc0, policy=none, cache=0 [ 198.004557] # test_free_bulk: test_alloc: size=200, gfp=cc0, policy=left, cache=0 [ 198.308056] # test_free_bulk: test_alloc: size=200, gfp=cc0, policy=none, cache=0 [ 198.316583] # test_free_bulk: test_alloc: size=200, gfp=cc0, policy=none, cache=0 [ 198.325139] # test_free_bulk: test_alloc: size=128, gfp=cc0, policy=right, cache=0 [ 198.620044] # test_free_bulk: test_alloc: size=128, gfp=cc0, policy=none, cache=0 [ 198.628558] # test_free_bulk: test_alloc: size=128, gfp=cc0, policy=left, cache=0 [ 198.932044] # test_free_bulk: test_alloc: size=128, gfp=cc0, policy=none, cache=0 [ 198.940557] # test_free_bulk: test_alloc: size=128, gfp=cc0, policy=none, cache=0 [ 198.949085] # test_free_bulk: test_alloc: size=105, gfp=cc0, policy=right, cache=0 [ 199.036044] # test_free_bulk: test_alloc: size=105, gfp=cc0, policy=none, cache=0 [ 199.044547] # test_free_bulk: test_alloc: size=105, gfp=cc0, policy=left, cache=0 [ 199.348044] # test_free_bulk: test_alloc: size=105, gfp=cc0, policy=none, cache=0 [ 199.356554] # test_free_bulk: test_alloc: size=105, gfp=cc0, policy=none, cache=0 [ 199.365081] # test_free_bulk: test_alloc: size=105, gfp=cc0, policy=right, cache=0 [ 199.660043] # test_free_bulk: test_alloc: size=105, gfp=cc0, policy=none, cache=0 [ 199.668558] # test_free_bulk: test_alloc: size=105, gfp=cc0, policy=left, cache=0 [ 199.764044] # test_free_bulk: test_alloc: size=105, gfp=cc0, policy=none, cache=0 [ 199.772548] # test_free_bulk: test_alloc: size=105, gfp=cc0, policy=none, cache=0 [ 199.781075] # test_free_bulk: test_alloc: size=264, gfp=cc0, policy=right, cache=0 [ 199.868056] # test_free_bulk: test_alloc: size=264, gfp=cc0, policy=none, cache=0 [ 199.876576] # test_free_bulk: test_alloc: size=264, gfp=cc0, policy=left, cache=0 [ 200.076046] # test_free_bulk: test_alloc: size=264, gfp=cc0, policy=none, cache=0 [ 200.084598] # test_free_bulk: test_alloc: size=264, gfp=cc0, policy=none, cache=0 [ 200.093126] # test_free_bulk: Test should be marked slow (runtime: 2.151588301s) [ 200.093369] ok 15 test_free_bulk [ 200.101964] # test_free_bulk-memcache: setup_test_cache: size=224, ctor=0x0 [ 200.114422] # test_free_bulk-memcache: test_alloc: size=224, gfp=cc0, policy=right, cache=1 [ 200.388065] # test_free_bulk-memcache: test_alloc: size=224, gfp=cc0, policy=none, cache=1 [ 200.397471] # test_free_bulk-memcache: test_alloc: size=224, gfp=cc0, policy=left, cache=1 [ 200.492043] # test_free_bulk-memcache: test_alloc: size=224, gfp=cc0, policy=none, cache=1 [ 200.501328] # test_free_bulk-memcache: test_alloc: size=224, gfp=cc0, policy=none, cache=1 [ 200.599823] # test_free_bulk-memcache: setup_test_cache: size=19, ctor=ctor_set_x [kfence_test] [ 200.609726] # test_free_bulk-memcache: test_alloc: size=19, gfp=cc0, policy=right, cache=1 [ 200.804039] # test_free_bulk-memcache: test_alloc: size=19, gfp=cc0, policy=none, cache=1 [ 200.813234] # test_free_bulk-memcache: test_alloc: size=19, gfp=cc0, policy=left, cache=1 [ 201.012050] # test_free_bulk-memcache: test_alloc: size=19, gfp=cc0, policy=none, cache=1 [ 201.021264] # test_free_bulk-memcache: test_alloc: size=19, gfp=cc0, policy=none, cache=1 [ 201.098513] # test_free_bulk-memcache: setup_test_cache: size=26, ctor=0x0 [ 201.106562] # test_free_bulk-memcache: test_alloc: size=26, gfp=cc0, policy=right, cache=1 [ 201.220042] # test_free_bulk-memcache: test_alloc: size=26, gfp=cc0, policy=none, cache=1 [ 201.229235] # test_free_bulk-memcache: test_alloc: size=26, gfp=cc0, policy=left, cache=1 [ 201.428055] # test_free_bulk-memcache: test_alloc: size=26, gfp=cc0, policy=none, cache=1 [ 201.437280] # test_free_bulk-memcache: test_alloc: size=26, gfp=cc0, policy=none, cache=1 [ 201.510642] # test_free_bulk-memcache: setup_test_cache: size=43, ctor=ctor_set_x [kfence_test] [ 201.520593] # test_free_bulk-memcache: test_alloc: size=43, gfp=cc0, policy=right, cache=1 [ 201.636041] # test_free_bulk-memcache: test_alloc: size=43, gfp=cc0, policy=none, cache=1 [ 201.645234] # test_free_bulk-memcache: test_alloc: size=43, gfp=cc0, policy=left, cache=1 [ 201.740042] # test_free_bulk-memcache: test_alloc: size=43, gfp=cc0, policy=none, cache=1 [ 201.749237] # test_free_bulk-memcache: test_alloc: size=43, gfp=cc0, policy=none, cache=1 [ 201.822277] # test_free_bulk-memcache: setup_test_cache: size=33, ctor=0x0 [ 201.830354] # test_free_bulk-memcache: test_alloc: size=33, gfp=cc0, policy=right, cache=1 [ 201.844047] # test_free_bulk-memcache: test_alloc: size=33, gfp=cc0, policy=none, cache=1 [ 201.853245] # test_free_bulk-memcache: test_alloc: size=33, gfp=cc0, policy=left, cache=1 [ 201.948059] # test_free_bulk-memcache: test_alloc: size=33, gfp=cc0, policy=none, cache=1 [ 201.957249] # test_free_bulk-memcache: test_alloc: size=33, gfp=cc0, policy=none, cache=1 [ 202.024922] ok 16 test_free_bulk-memcache [ 202.025218] ok 17 test_init_on_free # SKIP Test requires: IS_ENABLED(CONFIG_INIT_ON_FREE_DEFAULT_ON) [ 202.030546] ok 18 test_init_on_free-memcache # SKIP Test requires: IS_ENABLED(CONFIG_INIT_ON_FREE_DEFAULT_ON) [ 202.040874] # test_kmalloc_aligned_oob_read: test_alloc: size=73, gfp=cc0, policy=right, cache=0 [ 202.364045] ================================================================== [ 202.371932] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x27a/0x560 [kfence_test] [ 202.384056] Out-of-bounds read at 0x00000000024579bc (105B right of kfence-#102): [ 202.392195] test_kmalloc_aligned_oob_read+0x27a/0x560 [kfence_test] [ 202.399217] kunit_try_run_case+0x175/0x440 [ 202.404075] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 202.410145] kthread+0x3b4/0x780 [ 202.414063] ret_from_fork+0x30/0x70 [ 202.418313] ret_from_fork_asm+0x1a/0x30 [ 202.425087] kfence-#102: 0x0000000098a9bc30-0x000000005ecc2b49, size=73, cache=kmalloc-96 [ 202.436079] allocated by task 4136 on cpu 6 at 202.364039s (0.072039s ago): [ 202.443705] test_alloc+0x322/0x1110 [kfence_test] [ 202.449171] test_kmalloc_aligned_oob_read+0x101/0x560 [kfence_test] [ 202.456190] kunit_try_run_case+0x175/0x440 [ 202.461044] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 202.467118] kthread+0x3b4/0x780 [ 202.471034] ret_from_fork+0x30/0x70 [ 202.475287] ret_from_fork_asm+0x1a/0x30 [ 202.482066] CPU: 6 UID: 0 PID: 4136 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 202.495394] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 202.502066] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 202.509946] ================================================================== [ 202.517975] ok 19 test_kmalloc_aligned_oob_read [ 202.518075] # test_kmalloc_aligned_oob_write: test_alloc: size=73, gfp=cc0, policy=right, cache=0 [ 202.676053] ================================================================== [ 202.683941] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x24b/0x340 [kfence_test] [ 202.696063] Corrupted memory at 0x00000000bec4e0f7 [ ! . . . . . . . . . . . . . . . ] (in kfence-#136): [ 202.706211] test_kmalloc_aligned_oob_write+0x24b/0x340 [kfence_test] [ 202.713313] kunit_try_run_case+0x175/0x440 [ 202.718169] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 202.724234] kthread+0x3b4/0x780 [ 202.728139] ret_from_fork+0x30/0x70 [ 202.732391] ret_from_fork_asm+0x1a/0x30 [ 202.739163] kfence-#136: 0x000000000dcc1f06-0x000000002c71b113, size=73, cache=kmalloc-96 [ 202.750156] allocated by task 4139 on cpu 2 at 202.676039s (0.074116s ago): [ 202.757782] test_alloc+0x322/0x1110 [kfence_test] [ 202.763245] test_kmalloc_aligned_oob_write+0xc4/0x340 [kfence_test] [ 202.770264] kunit_try_run_case+0x175/0x440 [ 202.775120] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 202.781185] kthread+0x3b4/0x780 [ 202.785089] ret_from_fork+0x30/0x70 [ 202.789341] ret_from_fork_asm+0x1a/0x30 [ 202.796113] freed by task 4139 on cpu 2 at 202.676042s (0.120070s ago): [ 202.803392] test_kmalloc_aligned_oob_write+0x24b/0x340 [kfence_test] [ 202.810496] kunit_try_run_case+0x175/0x440 [ 202.815352] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 202.821418] kthread+0x3b4/0x780 [ 202.825321] ret_from_fork+0x30/0x70 [ 202.829573] ret_from_fork_asm+0x1a/0x30 [ 202.836345] CPU: 2 UID: 0 PID: 4139 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 202.849675] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 202.856344] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 202.864223] ================================================================== [ 202.872347] ok 20 test_kmalloc_aligned_oob_write [ 202.872544] # test_shrink_memcache: setup_test_cache: size=32, ctor=0x0 [ 202.885962] # test_shrink_memcache: test_alloc: size=32, gfp=cc0, policy=any, cache=1 [ 203.044503] ok 21 test_shrink_memcache [ 203.044686] # test_memcache_ctor: setup_test_cache: size=32, ctor=ctor_set_x [kfence_test] [ 203.058929] # test_memcache_ctor: test_alloc: size=32, gfp=cc0, policy=any, cache=1 [ 203.147513] ok 22 test_memcache_ctor [ 203.147743] ================================================================== [ 203.160226] BUG: KFENCE: invalid read in test_invalid_access+0xe1/0x200 [kfence_test] [ 203.170881] Invalid read at 0x00000000a10b7904: [ 203.176084] test_invalid_access+0xe1/0x200 [kfence_test] [ 203.182153] kunit_try_run_case+0x175/0x440 [ 203.187012] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 203.193080] kthread+0x3b4/0x780 [ 203.196989] ret_from_fork+0x30/0x70 [ 203.201240] ret_from_fork_asm+0x1a/0x30 [ 203.208014] CPU: 0 UID: 0 PID: 4147 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 203.221344] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 203.228014] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 203.235895] ================================================================== [ 203.244001] ok 23 test_invalid_access [ 203.244205] # test_gfpzero: test_alloc: size=4096, gfp=cc0, policy=any, cache=0 [ 203.348061] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 203.452064] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 203.556053] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 203.660064] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 203.764065] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 203.868063] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 203.972065] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 204.076067] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 204.180066] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 204.284064] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 204.388064] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 204.492056] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 204.596074] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 204.700060] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 204.804063] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 204.908063] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 205.012060] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 205.116061] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 205.220066] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 205.324065] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 205.428065] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 205.532062] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 205.636065] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 205.740065] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 205.844058] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 205.948067] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 206.052064] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 206.156067] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 206.260069] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 206.364068] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 206.468066] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 206.572079] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 206.676062] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 206.780053] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 206.884059] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 206.988059] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 207.092047] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 207.196058] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 207.300062] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 207.404060] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 207.508063] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 207.612045] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 207.716078] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 207.820055] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 207.924057] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 208.028055] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 208.132058] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 208.236060] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 208.340061] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 208.444062] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 208.548056] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 208.652058] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 208.756058] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 208.860057] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 208.964057] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 209.068060] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 209.172058] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 209.276071] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 209.380054] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 209.484062] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 209.588065] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 209.692054] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 209.796044] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 209.900060] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 210.004062] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 210.108056] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 210.212058] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 210.316055] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 210.420060] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 210.524068] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 210.628057] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 210.732066] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 210.836066] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 210.940065] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 211.044062] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 211.148065] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 211.252062] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 211.356068] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 211.460066] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 211.564061] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 211.668062] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 211.772064] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 211.876066] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 211.980067] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 212.084060] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 212.188068] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 212.292065] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 212.396065] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 212.500065] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 212.604144] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 212.708079] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 212.812062] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 212.916064] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 213.020066] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 213.124062] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 213.228063] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 213.332068] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 213.436065] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 213.540067] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 213.644071] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 213.748066] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 213.852067] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 213.956064] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 214.060074] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 214.164063] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 214.268067] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 214.372065] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 214.476066] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 214.580061] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 214.684061] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 214.788066] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 214.892079] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 214.996062] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 215.100062] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 215.204067] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 215.308064] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 215.412066] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 215.516063] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 215.620060] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 215.724064] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 215.828063] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 215.932064] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 216.036065] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 216.140063] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 216.244065] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 216.348063] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 216.452065] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 216.556066] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 216.660052] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 216.764064] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 216.868060] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 216.972066] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 217.076063] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 217.180057] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 217.284062] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 217.388061] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 217.492064] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 217.596056] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 217.700075] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 217.804061] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 217.908064] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 218.012065] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 218.116059] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 218.220067] # test_gfpzero: Test should be marked slow (runtime: 14.975860748s) [ 218.220348] ok 24 test_gfpzero [ 218.228875] # test_memcache_typesafe_by_rcu: setup_test_cache: size=32, ctor=0x0 [ 218.241582] # test_memcache_typesafe_by_rcu: test_alloc: size=32, gfp=cc0, policy=any, cache=1 [ 218.348116] ================================================================== [ 218.356011] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x2e8/0x670 [kfence_test] [ 218.368223] Use-after-free read at 0x00000000f319c3af (in kfence-#165): [ 218.375503] test_memcache_typesafe_by_rcu+0x2e8/0x670 [kfence_test] [ 218.382525] kunit_try_run_case+0x175/0x440 [ 218.387383] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 218.393453] kthread+0x3b4/0x780 [ 218.397362] ret_from_fork+0x30/0x70 [ 218.401616] ret_from_fork_asm+0x1a/0x30 [ 218.408388] kfence-#165: 0x00000000f319c3af-0x0000000012564f91, size=32, cache=test [ 218.418866] allocated by task 4199 on cpu 4 at 218.325450s (0.093416s ago): [ 218.426496] test_alloc+0x283/0x1110 [kfence_test] [ 218.431961] test_memcache_typesafe_by_rcu+0x16b/0x670 [kfence_test] [ 218.438980] kunit_try_run_case+0x175/0x440 [ 218.443836] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 218.449901] kthread+0x3b4/0x780 [ 218.453809] ret_from_fork+0x30/0x70 [ 218.458060] ret_from_fork_asm+0x1a/0x30 [ 218.464830] freed by task 4199 on cpu 4 at 218.325454s (0.139376s ago): [ 218.472110] test_memcache_typesafe_by_rcu+0x1bb/0x670 [kfence_test] [ 218.479128] kunit_try_run_case+0x175/0x440 [ 218.483983] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 218.490051] kthread+0x3b4/0x780 [ 218.493954] ret_from_fork+0x30/0x70 [ 218.498205] ret_from_fork_asm+0x1a/0x30 [ 218.504978] CPU: 4 UID: 0 PID: 4199 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 218.518309] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 218.524979] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 218.532863] ================================================================== [ 218.568476] ok 25 test_memcache_typesafe_by_rcu [ 218.568750] # test_krealloc: test_alloc: size=32, gfp=cc0, policy=any, cache=0 [ 218.644052] ================================================================== [ 218.651935] BUG: KFENCE: use-after-free read in test_krealloc+0x6f3/0xbd0 [kfence_test] [ 218.662760] Use-after-free read at 0x000000000cce409b (in kfence-#167): [ 218.670035] test_krealloc+0x6f3/0xbd0 [kfence_test] [ 218.675671] kunit_try_run_case+0x175/0x440 [ 218.680529] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 218.686596] kthread+0x3b4/0x780 [ 218.690501] ret_from_fork+0x30/0x70 [ 218.694752] ret_from_fork_asm+0x1a/0x30 [ 218.701523] kfence-#167: 0x000000000cce409b-0x0000000065f4a474, size=32, cache=kmalloc-32 [ 218.712516] allocated by task 4201 on cpu 4 at 218.644028s (0.068487s ago): [ 218.720142] test_alloc+0x322/0x1110 [kfence_test] [ 218.725603] test_krealloc+0xb3/0xbd0 [kfence_test] [ 218.731151] kunit_try_run_case+0x175/0x440 [ 218.736006] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 218.742071] kthread+0x3b4/0x780 [ 218.745975] ret_from_fork+0x30/0x70 [ 218.750225] ret_from_fork_asm+0x1a/0x30 [ 218.756995] freed by task 4201 on cpu 4 at 218.644034s (0.112961s ago): [ 218.764272] krealloc_noprof+0x13c/0x380 [ 218.768869] test_krealloc+0x21d/0xbd0 [kfence_test] [ 218.774505] kunit_try_run_case+0x175/0x440 [ 218.779362] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 218.785426] kthread+0x3b4/0x780 [ 218.789332] ret_from_fork+0x30/0x70 [ 218.793582] ret_from_fork_asm+0x1a/0x30 [ 218.800359] CPU: 4 UID: 0 PID: 4201 Comm: kunit_try_catch Tainted: G S B N 6.15.0-rc7-00008-gfe301d6b4b4a #1 PREEMPT(voluntary) [ 218.813687] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 218.820358] Hardware name: Dell Inc. OptiPlex 9020/0DNKMN, BIOS A05 12/05/2013 [ 218.828239] ================================================================== [ 218.836332] ok 26 test_krealloc [ 218.836450] # test_memcache_alloc_bulk: setup_test_cache: size=32, ctor=0x0 [ 218.859570] ok 27 test_memcache_alloc_bulk [ 218.897106] # kfence: pass:25 fail:0 skip:2 total:27 [ 218.902266] # Totals: pass:25 fail:0 skip:2 total:27 [ 218.907931] ok 1 kfence [ 218.918896] insmod /lib/modules/6.15.0-rc7-00008-gfe301d6b4b4a/kernel/mm/kfence/kfence_test.ko [ 218.931178] 2025-05-28 16:51:18 rmmod kfence_test [ 218.950407] run_kunit_tests: test platform-device-test [ 218.959614] 2025-05-28 16:51:18 modprobe -v platform-device-test [ 218.969329] KTAP version 1 [ 218.972725] 1..2 [ 218.975388] KTAP version 1 [ 218.979134] # Subtest: platform-device-devm [ 218.984352] # module: platform_device_test [ 218.984379] 1..4 [ 218.992982] ok 1 platform_device_devm_register_unregister_test [ 218.993416] ok 2 platform_device_devm_register_get_unregister_with_devm_test [ 219.001914] ok 3 probed_platform_device_devm_register_unregister_test [ 219.010990] ok 4 probed_platform_device_devm_register_get_unregister_with_devm_test [ 219.018465] # platform-device-devm: pass:4 fail:0 skip:0 total:4 [ 219.027156] # Totals: pass:4 fail:0 skip:0 total:4 [ 219.033851] ok 1 platform-device-devm [ 219.043706] KTAP version 1 [ 219.047441] # Subtest: platform-device-match [ 219.052749] # module: platform_device_test [ 219.052776] 1..1 [ 219.061238] ok 1 platform_device_find_by_null_test [ 219.061252] ok 2 platform-device-match [ 219.074486] insmod /lib/modules/6.15.0-rc7-00008-gfe301d6b4b4a/kernel/drivers/base/test/platform-device-test.ko [ 219.088339] 2025-05-28 16:51:18 rmmod platform-device-test [ 219.115481] run_kunit_tests: test property-entry-test [ 219.125080] 2025-05-28 16:51:18 modprobe -v property-entry-test [ 219.134612] KTAP version 1 [ 219.138310] 1..1 [ 219.140991] KTAP version 1 [ 219.144728] # Subtest: property-entry [ 219.149415] # module: property_entry_test [ 219.149442] 1..7 [ 219.157845] ok 1 pe_test_uints [ 219.158185] ok 2 pe_test_uint_arrays [ 219.163431] ok 3 pe_test_strings [ 219.168420] ok 4 pe_test_bool [ 219.172980] ok 5 pe_test_move_inline_u8 [ 219.177330] ok 6 pe_test_move_inline_str [ 219.182655] ok 7 pe_test_reference [ 219.187652] # property-entry: pass:7 fail:0 skip:0 total:7 [ 219.192122] # Totals: pass:7 fail:0 skip:0 total:7 [ 219.198312] ok 1 property-entry [ 219.210446] insmod /lib/modules/6.15.0-rc7-00008-gfe301d6b4b4a/kernel/drivers/base/test/property-entry-test.ko [ 219.224417] 2025-05-28 16:51:18 rmmod property-entry-test [ 219.253281] run_kunit_tests: test of_test [ 219.262739] 2025-05-28 16:51:18 modprobe -v of_test [ 219.270930] KTAP version 1 [ 219.274801] 1..2 [ 219.277832] KTAP version 1 [ 219.281574] # Subtest: of_dtb [ 219.286095] # module: of_test [ 219.287066] 1..2 [ 219.294340] ok 1 of_dtb_root_node_found_by_path [ 219.294690] ok 2 of_dtb_root_node_populates_of_root [ 219.300282] # of_dtb: pass:2 fail:0 skip:0 total:2 [ 219.306222] # Totals: pass:2 fail:0 skip:0 total:2 [ 219.311702] ok 1 of_dtb [ 219.320339] KTAP version 1 [ 219.324094] # Subtest: of_address [ 219.328453] # module: of_test [ 219.328464] 1..1 [ 219.335331] KTAP version 1 [ 219.339425] # Subtest: of_address_resource_bounds [ 219.339706] ok 1 start=0x0000000000000000,size=0x0000000000000000 [ 219.346056] ok 2 start=0x0000000000000000,size=0x0000000000001000 [ 219.353785] ok 3 start=0x0000000000001000,size=0x0000000000000000 [ 219.361544] ok 4 start=0x0000000000001000,size=0x0000000000001000 [ 219.369322] ok 5 start=0x0000000000000001,size=0xffffffffffffffff [ 219.377087] ok 6 start=0xffffffffffffffff,size=0x0000000000000001 [ 219.384803] ok 7 start=0x0000000000000002,size=0xffffffffffffffff [ 219.392548] ok 8 start=0xffffffffffffffff,size=0x0000000000000002 [ 219.400318] ok 9 start=0x0000000100000000,size=0x0000000000000001 [ 219.408060] ok 10 start=0x0000000000001000,size=0x00000000ffffffff [ 219.415532] # of_address_resource_bounds: pass:10 fail:0 skip:0 total:10 [ 219.423104] ok 1 of_address_resource_bounds [ 219.430848] # Totals: pass:10 fail:0 skip:0 total:10 [ 219.436099] ok 2 of_address [ 219.447156] insmod /lib/modules/6.15.0-rc7-00008-gfe301d6b4b4a/kernel/drivers/of/of_test.ko [ 219.459030] 2025-05-28 16:51:19 rmmod of_test [ 219.491139] run_kunit_tests: test overlay-test [ 219.500390] 2025-05-28 16:51:19 modprobe -v overlay-test [ 219.509158] KTAP version 1 [ 219.513037] 1..1 [ 219.516380] KTAP version 1 [ 219.520132] # Subtest: of_overlay_apply_kunit [ 219.525533] # module: overlay_test [ 219.525549] 1..3 [ 219.533089] ok 1 of_overlay_apply_kunit_apply # SKIP requires CONFIG_OF and CONFIG_OF_OVERLAY and CONFIG_OF_EARLY_FLATTREE for root node [ 219.533433] ok 2 of_overlay_apply_kunit_platform_device # SKIP requires CONFIG_OF and CONFIG_OF_OVERLAY and CONFIG_OF_EARLY_FLATTREE for root node [ 219.547057] ok 3 of_overlay_apply_kunit_cleanup # SKIP requires CONFIG_OF_OVERLAY to apply overlay [ 219.561202] # of_overlay_apply_kunit: pass:0 fail:0 skip:3 total:3 [ 219.571198] # Totals: pass:0 fail:0 skip:3 total:3 [ 219.578084] ok 1 of_overlay_apply_kunit # SKIP [ 219.590774] insmod /lib/modules/6.15.0-rc7-00008-gfe301d6b4b4a/kernel/drivers/of/overlay-test.ko [ 219.603212] 2025-05-28 16:51:19 rmmod overlay-test [ 219.627158] run_kunit_tests: test packing_test [ 219.636371] 2025-05-28 16:51:19 modprobe -v packing_test [ 219.645133] KTAP version 1 [ 219.649007] 1..1 [ 219.651734] KTAP version 1 [ 219.655488] # Subtest: packing [ 219.659593] # module: packing_test [ 219.659606] 1..4 [ 219.666926] KTAP version 1 [ 219.671050] # Subtest: packing_test_pack [ 219.671501] ok 1 no quirks, 16 bytes [ 219.677993] ok 2 lsw32 first, 16 bytes [ 219.683318] ok 3 little endian words, 16 bytes [ 219.688832] ok 4 lsw32 first + little endian words, 16 bytes [ 219.695923] ok 5 msb right, 16 bytes [ 219.703269] ok 6 msb right + lsw32 first, 16 bytes [ 219.708500] ok 7 msb right + little endian words, 16 bytes [ 219.714950] ok 8 msb right + lsw32 first + little endian words, 16 bytes [ 219.722078] ok 9 no quirks, 18 bytes [ 219.730422] ok 10 no quirks, 19 bytes [ 219.735676] ok 11 no quirks, 20 bytes [ 219.741007] ok 12 no quirks, 22 bytes [ 219.746365] ok 13 no quirks, 24 bytes [ 219.751706] ok 14 lsw32 first + little endian words, 18 bytes [ 219.757035] ok 15 lsw32 first + little endian words, 19 bytes [ 219.764424] ok 16 lsw32 first + little endian words, 20 bytes [ 219.771865] ok 17 lsw32 first + little endian words, 22 bytes [ 219.779331] ok 18 lsw32 first + little endian words, 24 bytes [ 219.786714] ok 19 no quirks, 16 bytes, non-aligned [ 219.794147] ok 20 lsw32 first, 16 bytes, non-aligned [ 219.800579] ok 21 little endian words, 16 bytes, non-aligned [ 219.807219] ok 22 lsw32 first + little endian words, 16 bytes, non-aligned [ 219.814426] ok 23 msb right, 16 bytes, non-aligned [ 219.822909] ok 24 msb right + lsw32 first, 16 bytes, non-aligned [ 219.829374] ok 25 msb right + little endian words, 16 bytes, non-aligned [ 219.836997] ok 26 msb right + lsw32 first + little endian words, 16 bytes, non-aligned [ 219.845363] ok 27 no quirks, 16 bytes, non-aligned, 0xff [ 219.854955] ok 28 lsw32 first, 16 bytes, non-aligned, 0xff [ 219.861921] ok 29 little endian words, 16 bytes, non-aligned, 0xff [ 219.869136] ok 30 lsw32 first + little endian words, 16 bytes, non-aligned, 0xff [ 219.877047] ok 31 msb right, 16 bytes, non-aligned, 0xff [ 219.885998] ok 32 msb right + lsw32 first, 16 bytes, non-aligned, 0xff [ 219.892947] ok 33 msb right + little endian words, 16 bytes, non-aligned, 0xff [ 219.901124] ok 34 msb right + lsw32 first + little endian words, 16 bytes, non-aligned, 0xff [ 219.909733] # packing_test_pack: pass:34 fail:0 skip:0 total:34 [ 219.919545] ok 1 packing_test_pack [ 219.926503] KTAP version 1 [ 219.935056] # Subtest: packing_test_unpack [ 219.935254] ok 1 no quirks, 16 bytes [ 219.940949] ok 2 lsw32 first, 16 bytes [ 219.946141] ok 3 little endian words, 16 bytes [ 219.951465] ok 4 lsw32 first + little endian words, 16 bytes [ 219.957529] ok 5 msb right, 16 bytes [ 219.964787] ok 6 msb right + lsw32 first, 16 bytes [ 219.969946] ok 7 msb right + little endian words, 16 bytes [ 219.976348] ok 8 msb right + lsw32 first + little endian words, 16 bytes [ 219.983462] ok 9 no quirks, 18 bytes [ 219.991779] ok 10 no quirks, 19 bytes [ 219.997081] ok 11 no quirks, 20 bytes [ 220.002300] ok 12 no quirks, 22 bytes [ 220.007586] ok 13 no quirks, 24 bytes [ 220.012840] ok 14 lsw32 first + little endian words, 18 bytes [ 220.018132] ok 15 lsw32 first + little endian words, 19 bytes [ 220.025419] ok 16 lsw32 first + little endian words, 20 bytes [ 220.032815] ok 17 lsw32 first + little endian words, 22 bytes [ 220.040168] ok 18 lsw32 first + little endian words, 24 bytes [ 220.047460] ok 19 no quirks, 16 bytes, non-aligned [ 220.054811] ok 20 lsw32 first, 16 bytes, non-aligned [ 220.061268] ok 21 little endian words, 16 bytes, non-aligned [ 220.067863] ok 22 lsw32 first + little endian words, 16 bytes, non-aligned [ 220.075141] ok 23 msb right, 16 bytes, non-aligned [ 220.083550] ok 24 msb right + lsw32 first, 16 bytes, non-aligned [ 220.089946] ok 25 msb right + little endian words, 16 bytes, non-aligned [ 220.097558] ok 26 msb right + lsw32 first + little endian words, 16 bytes, non-aligned [ 220.105859] ok 27 no quirks, 16 bytes, non-aligned, 0xff [ 220.115391] ok 28 lsw32 first, 16 bytes, non-aligned, 0xff [ 220.122313] ok 29 little endian words, 16 bytes, non-aligned, 0xff [ 220.129423] ok 30 lsw32 first + little endian words, 16 bytes, non-aligned, 0xff [ 220.137243] ok 31 msb right, 16 bytes, non-aligned, 0xff [ 220.146229] ok 32 msb right + lsw32 first, 16 bytes, non-aligned, 0xff [ 220.153129] ok 33 msb right + little endian words, 16 bytes, non-aligned, 0xff [ 220.161247] ok 34 msb right + lsw32 first + little endian words, 16 bytes, non-aligned, 0xff [ 220.169850] # packing_test_unpack: pass:34 fail:0 skip:0 total:34 [ 220.179661] ok 2 packing_test_unpack [ 220.186968] ok 3 packing_test_pack_fields [ 220.191796] ok 4 packing_test_unpack_fields [ 220.196855] # packing: pass:4 fail:0 skip:0 total:4 [ 220.202095] # Totals: pass:70 fail:0 skip:0 total:70 [ 220.207673] ok 1 packing [ 220.218576] insmod /lib/modules/6.15.0-rc7-00008-gfe301d6b4b4a/kernel/lib/packing_test.ko [ 220.230387] 2025-05-28 16:51:19 rmmod packing_test