[ 0.000000] Linux version 6.16.0-rc5-00045-gadcc3bfa8806 (kbuild@2f0559ad8481) (gcc-12 (Debian 12.2.0-14+deb12u1) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40) #1 SMP PREEMPT_DYNAMIC Fri Aug 1 02:52:12 CST 2025 [ 0.000000] Command line: ip=::::lkp-ivb-d01::dhcp root=/dev/ram0 RESULT_ROOT=/result/kunit/group-03/lkp-ivb-d01/debian-12-x86_64-20240206.cgz/x86_64-rhel-9.4-kunit/gcc-12/adcc3bfa8806761ac21aa271f78454113ec6936e/0 BOOT_IMAGE=/pkg/linux/x86_64-rhel-9.4-kunit/gcc-12/adcc3bfa8806761ac21aa271f78454113ec6936e/vmlinuz-6.16.0-rc5-00045-gadcc3bfa8806 branch=linux-next/master job=/lkp/jobs/scheduled/lkp-ivb-d01/kunit-group-03-debian-12-x86_64-20240206.cgz-adcc3bfa8806-20250801-40427-b4iy2g-1.yaml user=lkp ARCH=x86_64 kconfig=x86_64-rhel-9.4-kunit commit=adcc3bfa8806761ac21aa271f78454113ec6936e kunit.enable=1 intremap=posted_msi max_uptime=6000 LKP_SERVER=internal-lkp-server nokaslr selinux=0 debug apic=debug sysrq_always_enabled rcupdate.rcu_cpu_stall_timeout=100 net.ifnames=0 printk.devkmsg=on panic=-1 softlockup_panic=1 nmi_watchdog=panic oops=panic load_ramdisk=2 prompt_ramdisk=0 drbd.minor_count=8 systemd.log_level=err ignore_loglevel console=tty0 earlyprintk=ttyS0,115200 console=ttyS0,115200 vga=normal rw acpi_rsdp=0x000 [ 0.000000] BIOS-provided physical RAM map: [ 0.000000] BIOS-e820: [mem 0x0000000000000400-0x000000000009b3ff] usable [ 0.000000] BIOS-e820: [mem 0x000000000009b400-0x000000000009ffff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved [ 0.000000] BIOS-e820: [mem 0x0000000000100000-0x000000001fffffff] usable [ 0.000000] BIOS-e820: [mem 0x0000000020000000-0x00000000201fffff] reserved [ 0.000000] BIOS-e820: [mem 0x0000000020200000-0x0000000040003fff] usable [ 0.000000] BIOS-e820: [mem 0x0000000040004000-0x0000000040004fff] reserved [ 0.000000] BIOS-e820: [mem 0x0000000040005000-0x00000000d9af0fff] usable [ 0.000000] BIOS-e820: [mem 0x00000000d9af1000-0x00000000da23ffff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000da240000-0x00000000da24ffff] ACPI data [ 0.000000] BIOS-e820: [mem 0x00000000da250000-0x00000000da360fff] ACPI NVS [ 0.000000] BIOS-e820: [mem 0x00000000da361000-0x00000000da68afff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000da68b000-0x00000000da68bfff] usable [ 0.000000] BIOS-e820: [mem 0x00000000da68c000-0x00000000da6cefff] ACPI NVS [ 0.000000] BIOS-e820: [mem 0x00000000da6cf000-0x00000000daffffff] usable [ 0.000000] BIOS-e820: [mem 0x00000000db800000-0x00000000df9fffff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000f8000000-0x00000000fbffffff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000fed00000-0x00000000fed03fff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved [ 0.000000] BIOS-e820: [mem 0x0000000100000000-0x000000041f5fffff] usable [ 0.000000] random: crng init done [ 0.000000] printk: debug: ignoring loglevel setting. [ 0.000000] printk: legacy bootconsole [earlyser0] enabled [ 0.000000] NX (Execute Disable) protection: active [ 0.000000] APIC: Static calls initialized [ 0.000000] SMBIOS 2.7 present. [ 0.000000] DMI: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 0.000000] DMI: Memory slots populated: 4/4 [ 0.000000] tsc: Fast TSC calibration using PIT [ 0.000000] tsc: Detected 3491.906 MHz processor [ 0.001669] e820: update [mem 0x00000000-0x00000fff] usable ==> reserved [ 0.001787] e820: remove [mem 0x000a0000-0x000fffff] usable [ 0.001894] last_pfn = 0x41f600 max_arch_pfn = 0x400000000 [ 0.001997] total RAM covered: 16302M [ 0.002343] gran_size: 64K chunk_size: 64K num_reg: 10 lose cover RAM: 246M [ 0.002466] gran_size: 64K chunk_size: 128K num_reg: 10 lose cover RAM: 246M [ 0.002591] gran_size: 64K chunk_size: 256K num_reg: 10 lose cover RAM: 246M [ 0.002714] gran_size: 64K chunk_size: 512K num_reg: 10 lose cover RAM: 246M [ 0.002837] gran_size: 64K chunk_size: 1M num_reg: 10 lose cover RAM: 246M [ 0.002958] gran_size: 64K chunk_size: 2M num_reg: 10 lose cover RAM: 246M [ 0.003079] gran_size: 64K chunk_size: 4M num_reg: 10 lose cover RAM: 246M [ 0.003200] gran_size: 64K chunk_size: 8M num_reg: 10 lose cover RAM: 246M [ 0.003321] *BAD*gran_size: 64K chunk_size: 16M num_reg: 10 lose cover RAM: -8M [ 0.003447] *BAD*gran_size: 64K chunk_size: 32M num_reg: 10 lose cover RAM: -8M [ 0.003573] *BAD*gran_size: 64K chunk_size: 64M num_reg: 10 lose cover RAM: -8M [ 0.003699] gran_size: 64K chunk_size: 128M num_reg: 10 lose cover RAM: 0G [ 0.003821] gran_size: 64K chunk_size: 256M num_reg: 10 lose cover RAM: 0G [ 0.003941] gran_size: 64K chunk_size: 512M num_reg: 10 lose cover RAM: 0G [ 0.004062] gran_size: 64K chunk_size: 1G num_reg: 10 lose cover RAM: 0G [ 0.004181] *BAD*gran_size: 64K chunk_size: 2G num_reg: 10 lose cover RAM: -1G [ 0.004305] gran_size: 128K chunk_size: 128K num_reg: 10 lose cover RAM: 246M [ 0.004430] gran_size: 128K chunk_size: 256K num_reg: 10 lose cover RAM: 246M [ 0.004555] gran_size: 128K chunk_size: 512K num_reg: 10 lose cover RAM: 246M [ 0.004679] gran_size: 128K chunk_size: 1M num_reg: 10 lose cover RAM: 246M [ 0.004801] gran_size: 128K chunk_size: 2M num_reg: 10 lose cover RAM: 246M [ 0.004923] gran_size: 128K chunk_size: 4M num_reg: 10 lose cover RAM: 246M [ 0.005045] gran_size: 128K chunk_size: 8M num_reg: 10 lose cover RAM: 246M [ 0.005167] *BAD*gran_size: 128K chunk_size: 16M num_reg: 10 lose cover RAM: -8M [ 0.005294] *BAD*gran_size: 128K chunk_size: 32M num_reg: 10 lose cover RAM: -8M [ 0.005421] *BAD*gran_size: 128K chunk_size: 64M num_reg: 10 lose cover RAM: -8M [ 0.005549] gran_size: 128K chunk_size: 128M num_reg: 10 lose cover RAM: 0G [ 0.005671] gran_size: 128K chunk_size: 256M num_reg: 10 lose cover RAM: 0G [ 0.005793] gran_size: 128K chunk_size: 512M num_reg: 10 lose cover RAM: 0G [ 0.005915] gran_size: 128K chunk_size: 1G num_reg: 10 lose cover RAM: 0G [ 0.006034] *BAD*gran_size: 128K chunk_size: 2G num_reg: 10 lose cover RAM: -1G [ 0.006160] gran_size: 256K chunk_size: 256K num_reg: 10 lose cover RAM: 246M [ 0.006285] gran_size: 256K chunk_size: 512K num_reg: 10 lose cover RAM: 246M [ 0.006410] gran_size: 256K chunk_size: 1M num_reg: 10 lose cover RAM: 246M [ 0.006532] gran_size: 256K chunk_size: 2M num_reg: 10 lose cover RAM: 246M [ 0.006654] gran_size: 256K chunk_size: 4M num_reg: 10 lose cover RAM: 246M [ 0.006776] gran_size: 256K chunk_size: 8M num_reg: 10 lose cover RAM: 246M [ 0.006898] *BAD*gran_size: 256K chunk_size: 16M num_reg: 10 lose cover RAM: -8M [ 0.007025] *BAD*gran_size: 256K chunk_size: 32M num_reg: 10 lose cover RAM: -8M [ 0.007151] *BAD*gran_size: 256K chunk_size: 64M num_reg: 10 lose cover RAM: -8M [ 0.007278] gran_size: 256K chunk_size: 128M num_reg: 10 lose cover RAM: 0G [ 0.007400] gran_size: 256K chunk_size: 256M num_reg: 10 lose cover RAM: 0G [ 0.007522] gran_size: 256K chunk_size: 512M num_reg: 10 lose cover RAM: 0G [ 0.007644] gran_size: 256K chunk_size: 1G num_reg: 10 lose cover RAM: 0G [ 0.007763] *BAD*gran_size: 256K chunk_size: 2G num_reg: 10 lose cover RAM: -1G [ 0.007889] gran_size: 512K chunk_size: 512K num_reg: 10 lose cover RAM: 246M [ 0.008014] gran_size: 512K chunk_size: 1M num_reg: 10 lose cover RAM: 246M [ 0.008136] gran_size: 512K chunk_size: 2M num_reg: 10 lose cover RAM: 246M [ 0.008258] gran_size: 512K chunk_size: 4M num_reg: 10 lose cover RAM: 246M [ 0.008380] gran_size: 512K chunk_size: 8M num_reg: 10 lose cover RAM: 246M [ 0.008502] *BAD*gran_size: 512K chunk_size: 16M num_reg: 10 lose cover RAM: -8M [ 0.008629] *BAD*gran_size: 512K chunk_size: 32M num_reg: 10 lose cover RAM: -8M [ 0.008756] *BAD*gran_size: 512K chunk_size: 64M num_reg: 10 lose cover RAM: -8M [ 0.008883] gran_size: 512K chunk_size: 128M num_reg: 10 lose cover RAM: 0G [ 0.009005] gran_size: 512K chunk_size: 256M num_reg: 10 lose cover RAM: 0G [ 0.009127] gran_size: 512K chunk_size: 512M num_reg: 10 lose cover RAM: 0G [ 0.009249] gran_size: 512K chunk_size: 1G num_reg: 10 lose cover RAM: 0G [ 0.009369] *BAD*gran_size: 512K chunk_size: 2G num_reg: 10 lose cover RAM: -1G [ 0.009495] gran_size: 1M chunk_size: 1M num_reg: 10 lose cover RAM: 246M [ 0.009614] gran_size: 1M chunk_size: 2M num_reg: 10 lose cover RAM: 246M [ 0.009734] gran_size: 1M chunk_size: 4M num_reg: 10 lose cover RAM: 246M [ 0.009853] gran_size: 1M chunk_size: 8M num_reg: 10 lose cover RAM: 246M [ 0.009973] *BAD*gran_size: 1M chunk_size: 16M num_reg: 10 lose cover RAM: -8M [ 0.010097] *BAD*gran_size: 1M chunk_size: 32M num_reg: 10 lose cover RAM: -8M [ 0.010222] *BAD*gran_size: 1M chunk_size: 64M num_reg: 10 lose cover RAM: -8M [ 0.010346] gran_size: 1M chunk_size: 128M num_reg: 10 lose cover RAM: 0G [ 0.010466] gran_size: 1M chunk_size: 256M num_reg: 10 lose cover RAM: 0G [ 0.010585] gran_size: 1M chunk_size: 512M num_reg: 10 lose cover RAM: 0G [ 0.010705] gran_size: 1M chunk_size: 1G num_reg: 10 lose cover RAM: 0G [ 0.010822] *BAD*gran_size: 1M chunk_size: 2G num_reg: 10 lose cover RAM: -1G [ 0.010945] gran_size: 2M chunk_size: 2M num_reg: 10 lose cover RAM: 246M [ 0.011065] gran_size: 2M chunk_size: 4M num_reg: 10 lose cover RAM: 246M [ 0.011185] gran_size: 2M chunk_size: 8M num_reg: 10 lose cover RAM: 246M [ 0.011304] *BAD*gran_size: 2M chunk_size: 16M num_reg: 10 lose cover RAM: -8M [ 0.011429] *BAD*gran_size: 2M chunk_size: 32M num_reg: 10 lose cover RAM: -8M [ 0.011553] *BAD*gran_size: 2M chunk_size: 64M num_reg: 10 lose cover RAM: -8M [ 0.011678] gran_size: 2M chunk_size: 128M num_reg: 10 lose cover RAM: 0G [ 0.011798] gran_size: 2M chunk_size: 256M num_reg: 10 lose cover RAM: 0G [ 0.011917] gran_size: 2M chunk_size: 512M num_reg: 10 lose cover RAM: 0G [ 0.012037] gran_size: 2M chunk_size: 1G num_reg: 10 lose cover RAM: 0G [ 0.012154] *BAD*gran_size: 2M chunk_size: 2G num_reg: 10 lose cover RAM: -1G [ 0.012277] gran_size: 4M chunk_size: 4M num_reg: 10 lose cover RAM: 246M [ 0.012396] gran_size: 4M chunk_size: 8M num_reg: 10 lose cover RAM: 246M [ 0.012516] *BAD*gran_size: 4M chunk_size: 16M num_reg: 10 lose cover RAM: -6M [ 0.012641] *BAD*gran_size: 4M chunk_size: 32M num_reg: 10 lose cover RAM: -6M [ 0.012766] *BAD*gran_size: 4M chunk_size: 64M num_reg: 10 lose cover RAM: -6M [ 0.012890] gran_size: 4M chunk_size: 128M num_reg: 10 lose cover RAM: 2M [ 0.013010] gran_size: 4M chunk_size: 256M num_reg: 10 lose cover RAM: 2M [ 0.013130] gran_size: 4M chunk_size: 512M num_reg: 10 lose cover RAM: 2M [ 0.013250] gran_size: 4M chunk_size: 1G num_reg: 10 lose cover RAM: 2M [ 0.013367] *BAD*gran_size: 4M chunk_size: 2G num_reg: 10 lose cover RAM: -1022M [ 0.013495] gran_size: 8M chunk_size: 8M num_reg: 10 lose cover RAM: 246M [ 0.013614] gran_size: 8M chunk_size: 16M num_reg: 10 lose cover RAM: 118M [ 0.013735] gran_size: 8M chunk_size: 32M num_reg: 10 lose cover RAM: 6M [ 0.013854] gran_size: 8M chunk_size: 64M num_reg: 10 lose cover RAM: 6M [ 0.013972] gran_size: 8M chunk_size: 128M num_reg: 9 lose cover RAM: 6M [ 0.014091] gran_size: 8M chunk_size: 256M num_reg: 9 lose cover RAM: 6M [ 0.014209] gran_size: 8M chunk_size: 512M num_reg: 9 lose cover RAM: 6M [ 0.014327] gran_size: 8M chunk_size: 1G num_reg: 9 lose cover RAM: 6M [ 0.014444] gran_size: 8M chunk_size: 2G num_reg: 10 lose cover RAM: 6M [ 0.014561] gran_size: 16M chunk_size: 16M num_reg: 10 lose cover RAM: 126M [ 0.014683] gran_size: 16M chunk_size: 32M num_reg: 10 lose cover RAM: 14M [ 0.014804] gran_size: 16M chunk_size: 64M num_reg: 10 lose cover RAM: 14M [ 0.014925] gran_size: 16M chunk_size: 128M num_reg: 9 lose cover RAM: 14M [ 0.015046] gran_size: 16M chunk_size: 256M num_reg: 9 lose cover RAM: 14M [ 0.015168] gran_size: 16M chunk_size: 512M num_reg: 9 lose cover RAM: 14M [ 0.015288] gran_size: 16M chunk_size: 1G num_reg: 9 lose cover RAM: 14M [ 0.015407] gran_size: 16M chunk_size: 2G num_reg: 10 lose cover RAM: 14M [ 0.015526] gran_size: 32M chunk_size: 32M num_reg: 10 lose cover RAM: 78M [ 0.015647] gran_size: 32M chunk_size: 64M num_reg: 10 lose cover RAM: 46M [ 0.015768] gran_size: 32M chunk_size: 128M num_reg: 9 lose cover RAM: 46M [ 0.015889] gran_size: 32M chunk_size: 256M num_reg: 9 lose cover RAM: 46M [ 0.016010] gran_size: 32M chunk_size: 512M num_reg: 9 lose cover RAM: 46M [ 0.016131] gran_size: 32M chunk_size: 1G num_reg: 9 lose cover RAM: 46M [ 0.016249] gran_size: 32M chunk_size: 2G num_reg: 10 lose cover RAM: 46M [ 0.016369] gran_size: 64M chunk_size: 64M num_reg: 9 lose cover RAM: 110M [ 0.016490] gran_size: 64M chunk_size: 128M num_reg: 8 lose cover RAM: 110M [ 0.016612] gran_size: 64M chunk_size: 256M num_reg: 8 lose cover RAM: 110M [ 0.016734] gran_size: 64M chunk_size: 512M num_reg: 8 lose cover RAM: 110M [ 0.016857] gran_size: 64M chunk_size: 1G num_reg: 8 lose cover RAM: 110M [ 0.016976] gran_size: 64M chunk_size: 2G num_reg: 9 lose cover RAM: 110M [ 0.017096] gran_size: 128M chunk_size: 128M num_reg: 8 lose cover RAM: 174M [ 0.017219] gran_size: 128M chunk_size: 256M num_reg: 8 lose cover RAM: 174M [ 0.017342] gran_size: 128M chunk_size: 512M num_reg: 8 lose cover RAM: 174M [ 0.017466] gran_size: 128M chunk_size: 1G num_reg: 8 lose cover RAM: 174M [ 0.017587] gran_size: 128M chunk_size: 2G num_reg: 9 lose cover RAM: 174M [ 0.017707] gran_size: 256M chunk_size: 256M num_reg: 6 lose cover RAM: 430M [ 0.017831] gran_size: 256M chunk_size: 512M num_reg: 8 lose cover RAM: 430M [ 0.017955] gran_size: 256M chunk_size: 1G num_reg: 8 lose cover RAM: 430M [ 0.018075] gran_size: 256M chunk_size: 2G num_reg: 9 lose cover RAM: 430M [ 0.018196] gran_size: 512M chunk_size: 512M num_reg: 4 lose cover RAM: 942M [ 0.018320] gran_size: 512M chunk_size: 1G num_reg: 4 lose cover RAM: 942M [ 0.018440] gran_size: 512M chunk_size: 2G num_reg: 4 lose cover RAM: 942M [ 0.018561] gran_size: 1G chunk_size: 1G num_reg: 4 lose cover RAM: 942M [ 0.018680] gran_size: 1G chunk_size: 2G num_reg: 4 lose cover RAM: 942M [ 0.018797] gran_size: 2G chunk_size: 2G num_reg: 3 lose cover RAM: 1966M [ 0.018917] mtrr_cleanup: can not find optimal value [ 0.019002] please specify mtrr_gran_size/mtrr_chunk_size [ 0.019095] MTRR map: 9 entries (5 fixed + 4 variable; max 25), built from 10 variable MTRRs [ 0.019232] x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT [ 0.019654] e820: update [mem 0xdb800000-0xffffffff] usable ==> reserved [ 0.019771] last_pfn = 0xdb000 max_arch_pfn = 0x400000000 [ 0.019864] Scan for SMP in [mem 0x00000000-0x000003ff] [ 0.019973] Scan for SMP in [mem 0x0009fc00-0x0009ffff] [ 0.020080] Scan for SMP in [mem 0x000f0000-0x000fffff] [ 0.028651] found SMP MP-table at [mem 0x000fd860-0x000fd86f] [ 0.028748] mpc: fd490-fd7bc [ 0.030625] RAMDISK: [mem 0x3f6dba000-0x4179fffff] [ 0.030711] ACPI: Early table checksum verification disabled [ 0.030809] ACPI: RSDP 0x00000000000F0490 000024 (v02 INTEL ) [ 0.030912] ACPI: XSDT 0x00000000DA244070 000064 (v01 INTEL DZ77BH 01072009 AMI 00010013) [ 0.031057] ACPI: FACP 0x00000000DA24DE30 00010C (v05 INTEL DZ77BH 01072009 AMI 00010013) [ 0.031202] ACPI: DSDT 0x00000000DA244168 009CC7 (v02 INTEL DZ77BH 00000097 INTL 20051117) [ 0.031345] ACPI: FACS 0x00000000DA35F080 000040 [ 0.031430] ACPI: APIC 0x00000000DA24DF40 000092 (v03 INTEL DZ77BH 01072009 AMI 00010013) [ 0.031572] ACPI: FPDT 0x00000000DA24DFD8 000044 (v01 INTEL DZ77BH 01072009 AMI 00010013) [ 0.031713] ACPI: MCFG 0x00000000DA24E020 00003C (v01 INTEL DZ77BH 01072009 MSFT 00000097) [ 0.031855] ACPI: HPET 0x00000000DA24E060 000038 (v01 INTEL DZ77BH 01072009 AMI. 00000005) [ 0.031997] ACPI: SSDT 0x00000000DA24E098 00036D (v01 SataRe SataTabl 00001000 INTL 20091112) [ 0.032139] ACPI: SSDT 0x00000000DA24E408 0009AA (v01 PmRef Cpu0Ist 00003000 INTL 20051117) [ 0.032281] ACPI: SSDT 0x00000000DA24EDB8 000A92 (v01 PmRef CpuPm 00003000 INTL 20051117) [ 0.032422] ACPI: Reserving FACP table memory at [mem 0xda24de30-0xda24df3b] [ 0.032539] ACPI: Reserving DSDT table memory at [mem 0xda244168-0xda24de2e] [ 0.032654] ACPI: Reserving FACS table memory at [mem 0xda35f080-0xda35f0bf] [ 0.032769] ACPI: Reserving APIC table memory at [mem 0xda24df40-0xda24dfd1] [ 0.032885] ACPI: Reserving FPDT table memory at [mem 0xda24dfd8-0xda24e01b] [ 0.033000] ACPI: Reserving MCFG table memory at [mem 0xda24e020-0xda24e05b] [ 0.033116] ACPI: Reserving HPET table memory at [mem 0xda24e060-0xda24e097] [ 0.033231] ACPI: Reserving SSDT table memory at [mem 0xda24e098-0xda24e404] [ 0.033347] ACPI: Reserving SSDT table memory at [mem 0xda24e408-0xda24edb1] [ 0.033462] ACPI: Reserving SSDT table memory at [mem 0xda24edb8-0xda24f849] [ 0.033591] Mapped APIC to ffffffffff5fc000 ( fee00000) [ 0.033850] No NUMA configuration found [ 0.033920] Faking a node at [mem 0x0000000000000000-0x000000041f5fffff] [ 0.034047] NODE_DATA(0) allocated [mem 0x41f5cef40-0x41f5f9cbf] [ 0.034414] Zone ranges: [ 0.034465] DMA [mem 0x0000000000001000-0x0000000000ffffff] [ 0.034570] DMA32 [mem 0x0000000001000000-0x00000000ffffffff] [ 0.034675] Normal [mem 0x0000000100000000-0x000000041f5fffff] [ 0.034779] Device empty [ 0.034835] Movable zone start for each node [ 0.034912] Early memory node ranges [ 0.034977] node 0: [mem 0x0000000000001000-0x000000000009afff] [ 0.035082] node 0: [mem 0x0000000000100000-0x000000001fffffff] [ 0.035186] node 0: [mem 0x0000000020200000-0x0000000040003fff] [ 0.035291] node 0: [mem 0x0000000040005000-0x00000000d9af0fff] [ 0.035395] node 0: [mem 0x00000000da68b000-0x00000000da68bfff] [ 0.035499] node 0: [mem 0x00000000da6cf000-0x00000000daffffff] [ 0.035603] node 0: [mem 0x0000000100000000-0x000000041f5fffff] [ 0.035709] Initmem setup node 0 [mem 0x0000000000001000-0x000000041f5fffff] [ 0.035835] On node 0, zone DMA: 1 pages in unavailable ranges [ 0.036034] On node 0, zone DMA: 101 pages in unavailable ranges [ 0.042479] On node 0, zone DMA32: 512 pages in unavailable ranges [ 0.058018] On node 0, zone DMA32: 1 pages in unavailable ranges [ 0.058219] On node 0, zone DMA32: 2970 pages in unavailable ranges [ 0.058389] On node 0, zone DMA32: 67 pages in unavailable ranges [ 0.059952] On node 0, zone Normal: 20480 pages in unavailable ranges [ 0.060139] On node 0, zone Normal: 2560 pages in unavailable ranges [ 0.263074] kasan: KernelAddressSanitizer initialized [ 0.263192] Reserving Intel graphics memory at [mem 0xdba00000-0xdf9fffff] [ 0.263390] ACPI: PM-Timer IO Port: 0x408 [ 0.263473] ACPI: LAPIC_NMI (acpi_id[0xff] high edge lint[0x1]) [ 0.263585] IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-23 [ 0.263701] ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) [ 0.263809] Int: type 0, pol 0, trig 0, bus 00, IRQ 00, APIC ID 2, APIC INT 02 [ 0.263929] ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) [ 0.264038] Int: type 0, pol 1, trig 3, bus 00, IRQ 09, APIC ID 2, APIC INT 09 [ 0.264158] Int: type 0, pol 0, trig 0, bus 00, IRQ 01, APIC ID 2, APIC INT 01 [ 0.264277] Int: type 0, pol 0, trig 0, bus 00, IRQ 03, APIC ID 2, APIC INT 03 [ 0.264396] Int: type 0, pol 0, trig 0, bus 00, IRQ 04, APIC ID 2, APIC INT 04 [ 0.264514] Int: type 0, pol 0, trig 0, bus 00, IRQ 05, APIC ID 2, APIC INT 05 [ 0.264632] Int: type 0, pol 0, trig 0, bus 00, IRQ 06, APIC ID 2, APIC INT 06 [ 0.264750] Int: type 0, pol 0, trig 0, bus 00, IRQ 07, APIC ID 2, APIC INT 07 [ 0.264869] Int: type 0, pol 0, trig 0, bus 00, IRQ 08, APIC ID 2, APIC INT 08 [ 0.264987] Int: type 0, pol 0, trig 0, bus 00, IRQ 0a, APIC ID 2, APIC INT 0a [ 0.265105] Int: type 0, pol 0, trig 0, bus 00, IRQ 0b, APIC ID 2, APIC INT 0b [ 0.265224] Int: type 0, pol 0, trig 0, bus 00, IRQ 0c, APIC ID 2, APIC INT 0c [ 0.265342] Int: type 0, pol 0, trig 0, bus 00, IRQ 0d, APIC ID 2, APIC INT 0d [ 0.265460] Int: type 0, pol 0, trig 0, bus 00, IRQ 0e, APIC ID 2, APIC INT 0e [ 0.265579] Int: type 0, pol 0, trig 0, bus 00, IRQ 0f, APIC ID 2, APIC INT 0f [ 0.265699] ACPI: Using ACPI (MADT) for SMP configuration information [ 0.265806] ACPI: HPET id: 0x8086a701 base: 0xfed00000 [ 0.265898] TSC deadline timer available [ 0.265972] CPU topo: Max. logical packages: 1 [ 0.266053] CPU topo: Max. logical dies: 1 [ 0.266133] CPU topo: Max. dies per package: 1 [ 0.266216] CPU topo: Max. threads per core: 2 [ 0.266297] CPU topo: Num. cores per package: 4 [ 0.266381] CPU topo: Num. threads per package: 8 [ 0.266465] CPU topo: Allowing 8 present CPUs plus 0 hotplug CPUs [ 0.266569] mapped IOAPIC to ffffffffff5fb000 (fec00000) [ 0.266689] PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] [ 0.266813] PM: hibernation: Registered nosave memory: [mem 0x0009b000-0x000fffff] [ 0.266937] PM: hibernation: Registered nosave memory: [mem 0x20000000-0x201fffff] [ 0.267061] PM: hibernation: Registered nosave memory: [mem 0x40004000-0x40004fff] [ 0.267186] PM: hibernation: Registered nosave memory: [mem 0xd9af1000-0xda68afff] [ 0.267310] PM: hibernation: Registered nosave memory: [mem 0xda68c000-0xda6cefff] [ 0.267434] PM: hibernation: Registered nosave memory: [mem 0xdb000000-0xffffffff] [ 0.267558] [mem 0xdfa00000-0xf7ffffff] available for PCI devices [ 0.267661] Booting paravirtualized kernel on bare hardware [ 0.267757] clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns [ 0.285977] setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 [ 0.286734] percpu: Embedded 78 pages/cpu s282624 r8192 d28672 u524288 [ 0.286853] pcpu-alloc: s282624 r8192 d28672 u524288 alloc=1*2097152 [ 0.286962] pcpu-alloc: [0] 0 1 2 3 [0] 4 5 6 7 [ 0.287083] Kernel command line: ip=::::lkp-ivb-d01::dhcp root=/dev/ram0 RESULT_ROOT=/result/kunit/group-03/lkp-ivb-d01/debian-12-x86_64-20240206.cgz/x86_64-rhel-9.4-kunit/gcc-12/adcc3bfa8806761ac21aa271f78454113ec6936e/0 BOOT_IMAGE=/pkg/linux/x86_64-rhel-9.4-kunit/gcc-12/adcc3bfa8806761ac21aa271f78454113ec6936e/vmlinuz-6.16.0-rc5-00045-gadcc3bfa8806 branch=linux-next/master job=/lkp/jobs/scheduled/lkp-ivb-d01/kunit-group-03-debian-12-x86_64-20240206.cgz-adcc3bfa8806-20250801-40427-b4iy2g-1.yaml user=lkp ARCH=x86_64 kconfig=x86_64-rhel-9.4-kunit commit=adcc3bfa8806761ac21aa271f78454113ec6936e kunit.enable=1 intremap=posted_msi max_uptime=6000 LKP_SERVER=internal-lkp-server nokaslr selinux=0 debug apic=debug sysrq_always_enabled rcupdate.rcu_cpu_stall_timeout=100 net.ifnames=0 printk.devkmsg=on panic=-1 softlockup_panic=1 nmi_watchdog=panic oops=panic load_ramdisk=2 prompt_ramdisk=0 drbd.minor_count=8 systemd.log_level=err ignore_loglevel console=tty0 earlyprintk=ttyS0,115200 console=ttyS0,115200 vga=normal rw acpi_rsd [ 0.287358] sysrq: sysrq always enabled. [ 0.288809] ignoring the deprecated load_ramdisk= option [ 0.289058] Unknown kernel command line parameters "nokaslr RESULT_ROOT=/result/kunit/group-03/lkp-ivb-d01/debian-12-x86_64-20240206.cgz/x86_64-rhel-9.4-kunit/gcc-12/adcc3bfa8806761ac21aa271f78454113ec6936e/0 BOOT_IMAGE=/pkg/linux/x86_64-rhel-9.4-kunit/gcc-12/adcc3bfa8806761ac21aa271f78454113ec6936e/vmlinuz-6.16.0-rc5-00045-gadcc3bfa8806 branch=linux-next/master job=/lkp/jobs/scheduled/lkp-ivb-d01/kunit-group-03-debian-12-x86_64-20240206.cgz-adcc3bfa8806-20250801-40427-b4iy2g-1.yaml user=lkp ARCH=x86_64 kconfig=x86_64-rhel-9.4-kunit commit=adcc3bfa8806761ac21aa271f78454113ec6936e max_uptime=6000 LKP_SERVER=internal-lkp-server prompt_ramdisk=0 vga=normal kexec_jump_back_entry=0x45a6a88f1d511335", will be passed to user space. [ 0.290008] printk: log buffer data + meta data: 1048576 + 3670016 = 4718592 bytes [ 0.291784] Dentry cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) [ 0.292793] Inode-cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) [ 0.293223] software IO TLB: area num 8. [ 0.307222] Fallback order for Node 0: 0 [ 0.307233] Built 1 zonelists, mobility grouping on. Total pages: 4167612 [ 0.307420] Policy zone: Normal [ 0.307742] mem auto-init: stack:off, heap alloc:off, heap free:off [ 0.307848] stackdepot: allocating hash table via alloc_large_system_hash [ 0.307962] stackdepot hash table entries: 1048576 (order: 12, 16777216 bytes, linear) [ 0.365953] SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 [ 0.366108] Kernel/User page tables isolation: enabled [ 0.366428] ftrace section at ffffffff871e4c48 sorted properly [ 0.379427] ftrace: allocating 57798 entries in 228 pages [ 0.379524] ftrace: allocated 228 pages with 4 groups [ 0.381057] Dynamic Preempt: voluntary [ 0.381638] rcu: Preemptible hierarchical RCU implementation. [ 0.381736] rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. [ 0.381848] RCU CPU stall warnings timeout set to 100 (rcu_cpu_stall_timeout). [ 0.381967] Trampoline variant of Tasks RCU enabled. [ 0.382052] Rude variant of Tasks RCU enabled. [ 0.382131] Tracing variant of Tasks RCU enabled. [ 0.382213] rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. [ 0.382337] rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 [ 0.382498] RCU Tasks: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. [ 0.382642] RCU Tasks Rude: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. [ 0.382791] RCU Tasks Trace: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. [ 0.402041] NR_IRQS: 524544, nr_irqs: 488, preallocated irqs: 16 [ 0.402592] rcu: srcu_init: Setting srcu_struct sizes based on contention. [ 0.402870] kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) [ 0.404125] Console: colour VGA+ 80x25 [ 0.404197] printk: legacy console [tty0] enabled [ 0.426693] printk: legacy console [ttyS0] enabled [ 0.426924] printk: legacy bootconsole [earlyser0] disabled [ 0.427225] ACPI: Core revision 20250404 [ 0.427660] clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns [ 0.427934] APIC: Switch to symmetric I/O mode setup [ 0.428088] Masked ExtINT on CPU#0 [ 0.428433] ENABLING IO-APIC IRQs [ 0.428569] Init IO_APIC IRQs [ 0.428683] apic 2 pin 0 not connected [ 0.428828] IOAPIC[0]: Preconfigured routing entry (2-1 -> IRQ 1 Level:0 ActiveLow:0) [ 0.429047] IOAPIC[0]: Preconfigured routing entry (2-2 -> IRQ 0 Level:0 ActiveLow:0) [ 0.429267] IOAPIC[0]: Preconfigured routing entry (2-3 -> IRQ 3 Level:0 ActiveLow:0) [ 0.429486] IOAPIC[0]: Preconfigured routing entry (2-4 -> IRQ 4 Level:0 ActiveLow:0) [ 0.429706] IOAPIC[0]: Preconfigured routing entry (2-5 -> IRQ 5 Level:0 ActiveLow:0) [ 0.429927] IOAPIC[0]: Preconfigured routing entry (2-6 -> IRQ 6 Level:0 ActiveLow:0) [ 0.430145] IOAPIC[0]: Preconfigured routing entry (2-7 -> IRQ 7 Level:0 ActiveLow:0) [ 0.430364] IOAPIC[0]: Preconfigured routing entry (2-8 -> IRQ 8 Level:0 ActiveLow:0) [ 0.430581] IOAPIC[0]: Preconfigured routing entry (2-9 -> IRQ 9 Level:1 ActiveLow:0) [ 0.430801] IOAPIC[0]: Preconfigured routing entry (2-10 -> IRQ 10 Level:0 ActiveLow:0) [ 0.431024] IOAPIC[0]: Preconfigured routing entry (2-11 -> IRQ 11 Level:0 ActiveLow:0) [ 0.431241] IOAPIC[0]: Preconfigured routing entry (2-12 -> IRQ 12 Level:0 ActiveLow:0) [ 0.431461] IOAPIC[0]: Preconfigured routing entry (2-13 -> IRQ 13 Level:0 ActiveLow:0) [ 0.431684] IOAPIC[0]: Preconfigured routing entry (2-14 -> IRQ 14 Level:0 ActiveLow:0) [ 0.431906] IOAPIC[0]: Preconfigured routing entry (2-15 -> IRQ 15 Level:0 ActiveLow:0) [ 0.432116] apic 2 pin 16 not connected [ 0.432247] apic 2 pin 17 not connected [ 0.432376] apic 2 pin 18 not connected [ 0.432503] apic 2 pin 19 not connected [ 0.432634] apic 2 pin 20 not connected [ 0.432764] apic 2 pin 21 not connected [ 0.432893] apic 2 pin 22 not connected [ 0.433023] apic 2 pin 23 not connected [ 0.433289] ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 [ 0.437908] clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x325572deef8, max_idle_ns: 440795222557 ns [ 0.438163] Calibrating delay loop (skipped), value calculated using timer frequency.. 6983.81 BogoMIPS (lpj=3491906) [ 0.438437] CPU0: Thermal monitoring enabled (TM1) [ 0.438620] Last level iTLB entries: 4KB 512, 2MB 8, 4MB 8 [ 0.438781] Last level dTLB entries: 4KB 512, 2MB 32, 4MB 32, 1GB 0 [ 0.439165] process: using mwait in idle threads [ 0.439322] Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl [ 0.439540] SRBDS: Vulnerable: No microcode [ 0.439676] Spectre V2 : Mitigation: Retpolines [ 0.439816] Spectre V2 : User space: Mitigation: STIBP via prctl [ 0.439981] MDS: Mitigation: Clear CPU buffers [ 0.440163] Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization [ 0.440375] Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT [ 0.440583] Spectre V2 : Enabling Restricted Speculation for firmware calls [ 0.440776] Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier [ 0.440994] x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' [ 0.441162] x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' [ 0.441334] x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' [ 0.441507] x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 [ 0.441675] x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. [ 0.468563] Freeing SMP alternatives memory: 48K [ 0.468727] pid_max: default: 32768 minimum: 301 [ 0.469034] LSM: initializing lsm=lockdown,capability,yama,ima,evm [ 0.469206] Yama: becoming mindful. [ 0.469554] Mount-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) [ 0.469767] Mountpoint-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) [ 0.471150] smpboot: CPU0: Intel(R) Core(TM) i7-3770K CPU @ 3.50GHz (family: 0x6, model: 0x3a, stepping: 0x9) [ 0.471233] Performance Events: PEBS fmt1+, IvyBridge events, 16-deep LBR, full-width counters, Intel PMU driver. [ 0.471503] ... version: 3 [ 0.471633] ... bit width: 48 [ 0.471768] ... generic registers: 4 [ 0.471899] ... value mask: 0000ffffffffffff [ 0.472052] ... max period: 00007fffffffffff [ 0.472163] ... fixed-purpose events: 3 [ 0.472292] ... event mask: 000000070000000f [ 0.472732] signal: max sigframe size: 1776 [ 0.472891] Estimated ratio of average max frequency by base frequency (times 1024): 1082 [ 0.473191] rcu: Hierarchical SRCU implementation. [ 0.473335] rcu: Max phase no-delay instances is 400. [ 0.473681] Timer migration: 1 hierarchy levels; 8 children per group; 1 crossnode level [ 0.476090] NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. [ 0.476622] smp: Bringing up secondary CPUs ... [ 0.477261] smpboot: x86: Booting SMP configuration: [ 0.477410] .... node #0, CPUs: #1 #2 #3 [ 0.030421] Masked ExtINT on CPU#1 [ 0.030421] Masked ExtINT on CPU#2 [ 0.030421] Masked ExtINT on CPU#3 [ 0.481694] #4 #5 #6 #7 [ 0.030421] Masked ExtINT on CPU#4 [ 0.485402] MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. [ 0.030421] Masked ExtINT on CPU#5 [ 0.030421] Masked ExtINT on CPU#6 [ 0.030421] Masked ExtINT on CPU#7 [ 0.488241] smp: Brought up 1 node, 8 CPUs [ 0.488475] smpboot: Total of 8 processors activated (55870.49 BogoMIPS) [ 0.511763] node 0 deferred pages initialised in 21ms [ 0.511763] Memory: 13535764K/16670448K available (52169K kernel code, 18408K rwdata, 15836K rodata, 8232K init, 7156K bss, 3123012K reserved, 0K cma-reserved) [ 0.513163] devtmpfs: initialized [ 0.513624] x86/mm: Memory block size: 128MB [ 0.530368] ACPI: PM: Registering ACPI NVS region [mem 0xda250000-0xda360fff] (1118208 bytes) [ 0.531177] ACPI: PM: Registering ACPI NVS region [mem 0xda68c000-0xda6cefff] (274432 bytes) [ 0.532207] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns [ 0.532426] posixtimers hash table entries: 4096 (order: 4, 65536 bytes, linear) [ 0.532647] futex hash table entries: 2048 (131072 bytes on 1 NUMA nodes, total 128 KiB, linear). [ 0.532915] Running postponed tracer tests: [ 0.533230] Testing tracer function: PASSED [ 0.988995] Testing dynamic ftrace: PASSED [ 1.232311] Testing dynamic ftrace ops #1: [ 1.366220] (1 0 1 0 0) [ 1.366361] (1 1 2 0 0) [ 1.529756] (2 1 3 0 2964163) [ 1.529879] (2 2 4 0 2964700) [ 1.565084] (3 2 4 0 3393318) [ 1.565167] (3 3 5 0 3394096) PASSED [ 1.730024] Testing dynamic ftrace ops #2: [ 2.027600] (1 0 1 2963367 0) [ 2.027753] (1 1 2 2964251 0) [ 2.456784] (2 1 3 6 3145003) [ 2.456967] (2 2 4 618 3145612) [ 2.527021] (3 2 4 448975 3594132) [ 2.527178] (3 3 5 449717 3594873) PASSED [ 2.955599] Testing ftrace recursion: PASSED [ 2.991445] Testing ftrace recursion safe: PASSED [ 3.027162] Testing ftrace regs: PASSED [ 3.062698] Testing tracer nop: PASSED [ 3.063306] Testing tracer wakeup: PASSED [ 3.389503] Testing tracer wakeup_rt: PASSED [ 3.714312] Testing tracer wakeup_dl: PASSED [ 4.039414] Testing tracer function_graph: PASSED [ 9.293442] Testing fgraph storage of 1 byte: PASSED [ 9.328671] Testing fgraph storage of 2 bytes: PASSED [ 9.364788] Testing fgraph storage of 4 bytes: PASSED [ 9.400849] Testing fgraph storage of 8 bytes: PASSED [ 9.436866] Testing multiple fgraph storage on a function: PASSED [ 9.570587] pinctrl core: initialized pinctrl subsystem [ 9.571555] NET: Registered PF_NETLINK/PF_ROUTE protocol family [ 9.572643] DMA: preallocated 2048 KiB GFP_KERNEL pool for atomic allocations [ 9.572876] DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations [ 9.573115] DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations [ 9.573283] audit: initializing netlink subsys (disabled) [ 9.574226] audit: type=2000 audit(1754040942.142:1): state=initialized audit_enabled=0 res=1 [ 9.574774] thermal_sys: Registered thermal governor 'fair_share' [ 9.574774] thermal_sys: Registered thermal governor 'step_wise' [ 9.574774] thermal_sys: Registered thermal governor 'user_space' [ 9.575165] cpuidle: using governor menu [ 9.575770] ACPI FADT declares the system doesn't support PCIe ASPM, so disable it [ 9.575770] acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 [ 9.576066] PCI: ECAM [mem 0xf8000000-0xfbffffff] (base 0xf8000000) for domain 0000 [bus 00-3f] [ 9.576235] PCI: ECAM [mem 0xf8000000-0xfbffffff] reserved as E820 entry [ 9.577948] PCI: Using configuration type 1 for base access [ 9.578366] core: PMU erratum BJ122, BV98, HSD29 worked around, HT is on [ 9.579243] kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. [ 9.580358] HugeTLB: allocation took 0ms with hugepage_allocation_threads=2 [ 9.580397] HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages [ 9.580516] HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page [ 9.583787] ACPI: Added _OSI(Module Device) [ 9.583869] ACPI: Added _OSI(Processor Device) [ 9.583869] ACPI: Added _OSI(Processor Aggregator Device) [ 9.704593] ACPI: 4 ACPI AML tables successfully acquired and loaded [ 9.718429] ACPI: Dynamic OEM Table Load: [ 9.718578] ACPI: SSDT 0xFFFF888100DC8000 00083B (v01 PmRef Cpu0Cst 00003001 INTL 20051117) [ 9.726171] ACPI: Dynamic OEM Table Load: [ 9.726312] ACPI: SSDT 0xFFFF888100DD2800 000303 (v01 PmRef ApIst 00003000 INTL 20051117) [ 9.732007] ACPI: Dynamic OEM Table Load: [ 9.732149] ACPI: SSDT 0xFFFF888102B64400 000119 (v01 PmRef ApCst 00003000 INTL 20051117) [ 9.761597] ACPI: Interpreter enabled [ 9.761833] ACPI: PM: (supports S0 S3 S4 S5) [ 9.761973] ACPI: Using IOAPIC for interrupt routing [ 9.763000] PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug [ 9.763162] PCI: Using E820 reservations for host bridge windows [ 9.765861] ACPI: Enabled 15 GPEs in block 00 to 3F [ 9.930850] ACPI: \_TZ_.FN00: New power resource [ 9.932032] ACPI: \_TZ_.FN01: New power resource [ 9.933165] ACPI: \_TZ_.FN02: New power resource [ 9.934313] ACPI: \_TZ_.FN03: New power resource [ 9.935461] ACPI: \_TZ_.FN04: New power resource [ 9.944787] ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-3e]) [ 9.944979] acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] [ 9.948693] acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug SHPCHotplug PME] [ 9.953131] acpi PNP0A08:00: _OSC: OS now controls [AER PCIeCapability LTR DPC] [ 9.953232] acpi PNP0A08:00: FADT indicates ASPM is unsupported, using BIOS configuration [ 9.965501] PCI host bridge to bus 0000:00 [ 9.965716] pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] [ 9.965912] pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] [ 9.966104] pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] [ 9.966245] pci_bus 0000:00: root bus resource [mem 0x000d8000-0x000e7fff window] [ 9.966447] pci_bus 0000:00: root bus resource [mem 0xdfa00000-0xfeafffff window] [ 9.966655] pci_bus 0000:00: root bus resource [bus 00-3e] [ 9.966842] pci 0000:00:00.0: [8086:0150] type 00 class 0x060000 conventional PCI endpoint [ 9.967395] pci 0000:00:01.0: [8086:0151] type 01 class 0x060400 PCIe Root Port [ 9.967606] pci 0000:00:01.0: PCI bridge to [bus 01] [ 9.967758] pci 0000:00:01.0: bridge window [mem 0xf7400000-0xf78fffff] [ 9.967945] pci 0000:00:01.0: bridge window [mem 0xdfb00000-0xdfbfffff 64bit pref] [ 9.968214] pci 0000:00:01.0: PME# supported from D0 D3hot D3cold [ 9.969458] pci 0000:00:02.0: [8086:0162] type 00 class 0x030000 conventional PCI endpoint [ 9.969688] pci 0000:00:02.0: BAR 0 [mem 0xf7000000-0xf73fffff 64bit] [ 9.969865] pci 0000:00:02.0: BAR 2 [mem 0xe0000000-0xefffffff 64bit pref] [ 9.970055] pci 0000:00:02.0: BAR 4 [io 0xf000-0xf03f] [ 9.970204] pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] [ 9.974164] pci 0000:00:14.0: [8086:1e31] type 00 class 0x0c0330 conventional PCI endpoint [ 9.974419] pci 0000:00:14.0: BAR 0 [mem 0xf7c20000-0xf7c2ffff 64bit] [ 9.974663] pci 0000:00:14.0: PME# supported from D3hot D3cold [ 9.975869] pci 0000:00:19.0: [8086:1503] type 00 class 0x020000 conventional PCI endpoint [ 9.976121] pci 0000:00:19.0: BAR 0 [mem 0xf7c00000-0xf7c1ffff] [ 9.976222] pci 0000:00:19.0: BAR 1 [mem 0xf7c39000-0xf7c39fff] [ 9.976386] pci 0000:00:19.0: BAR 2 [io 0xf080-0xf09f] [ 9.976612] pci 0000:00:19.0: PME# supported from D0 D3hot D3cold [ 9.977809] pci 0000:00:1a.0: [8086:1e2d] type 00 class 0x0c0320 conventional PCI endpoint [ 9.978060] pci 0000:00:1a.0: BAR 0 [mem 0xf7c38000-0xf7c383ff] [ 9.978298] pci 0000:00:1a.0: PME# supported from D0 D3hot D3cold [ 9.979499] pci 0000:00:1b.0: [8086:1e20] type 00 class 0x040300 PCIe Root Complex Integrated Endpoint [ 9.979766] pci 0000:00:1b.0: BAR 0 [mem 0xf7c30000-0xf7c33fff 64bit] [ 9.980033] pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold [ 9.981231] pci 0000:00:1c.0: [8086:1e10] type 01 class 0x060400 PCIe Root Port [ 9.981455] pci 0000:00:1c.0: PCI bridge to [bus 02] [ 9.981716] pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold [ 9.982959] pci 0000:00:1c.2: [8086:1e14] type 01 class 0x060400 PCIe Root Port [ 9.983183] pci 0000:00:1c.2: PCI bridge to [bus 03-04] [ 9.983345] pci 0000:00:1c.2: bridge window [mem 0xf7b00000-0xf7bfffff] [ 9.983644] pci 0000:00:1c.2: PME# supported from D0 D3hot D3cold [ 9.984886] pci 0000:00:1c.4: [8086:1e18] type 01 class 0x060400 PCIe Root Port [ 9.985110] pci 0000:00:1c.4: PCI bridge to [bus 05] [ 9.985223] pci 0000:00:1c.4: bridge window [mem 0xf7a00000-0xf7afffff] [ 9.985519] pci 0000:00:1c.4: PME# supported from D0 D3hot D3cold [ 9.986760] pci 0000:00:1c.7: [8086:1e1e] type 01 class 0x060400 PCIe Root Port [ 9.986985] pci 0000:00:1c.7: PCI bridge to [bus 06] [ 9.987139] pci 0000:00:1c.7: bridge window [io 0xe000-0xefff] [ 9.987223] pci 0000:00:1c.7: bridge window [mem 0xf7900000-0xf79fffff] [ 9.987518] pci 0000:00:1c.7: PME# supported from D0 D3hot D3cold [ 9.988749] pci 0000:00:1d.0: [8086:1e26] type 00 class 0x0c0320 conventional PCI endpoint [ 9.989005] pci 0000:00:1d.0: BAR 0 [mem 0xf7c37000-0xf7c373ff] [ 9.989240] pci 0000:00:1d.0: PME# supported from D0 D3hot D3cold [ 9.990440] pci 0000:00:1f.0: [8086:1e44] type 00 class 0x060100 conventional PCI endpoint [ 9.992159] pci 0000:00:1f.2: [8086:1e02] type 00 class 0x010601 conventional PCI endpoint [ 9.992404] pci 0000:00:1f.2: BAR 0 [io 0xf0d0-0xf0d7] [ 9.992559] pci 0000:00:1f.2: BAR 1 [io 0xf0c0-0xf0c3] [ 9.992716] pci 0000:00:1f.2: BAR 2 [io 0xf0b0-0xf0b7] [ 9.992868] pci 0000:00:1f.2: BAR 3 [io 0xf0a0-0xf0a3] [ 9.993025] pci 0000:00:1f.2: BAR 4 [io 0xf060-0xf07f] [ 9.993164] pci 0000:00:1f.2: BAR 5 [mem 0xf7c36000-0xf7c367ff] [ 9.993401] pci 0000:00:1f.2: PME# supported from D3hot [ 9.994573] pci 0000:00:1f.3: [8086:1e22] type 00 class 0x0c0500 conventional PCI endpoint [ 9.994823] pci 0000:00:1f.3: BAR 0 [mem 0xf7c35000-0xf7c350ff 64bit] [ 9.995000] pci 0000:00:1f.3: BAR 4 [io 0xf040-0xf05f] [ 9.996446] pci 0000:01:00.0: [8086:1521] type 00 class 0x020000 PCIe Endpoint [ 9.996672] pci 0000:01:00.0: BAR 0 [mem 0xf7700000-0xf77fffff] [ 9.996836] pci 0000:01:00.0: BAR 3 [mem 0xf780c000-0xf780ffff] [ 9.997137] pci 0000:01:00.0: PME# supported from D0 D3hot D3cold [ 9.997253] pci 0000:01:00.0: VF BAR 0 [mem 0xdfb00000-0xdfb03fff 64bit pref] [ 9.997448] pci 0000:01:00.0: VF BAR 0 [mem 0xdfb00000-0xdfb1ffff 64bit pref]: contains BAR 0 for 8 VFs [ 9.997683] pci 0000:01:00.0: VF BAR 3 [mem 0xdfb20000-0xdfb23fff 64bit pref] [ 9.997878] pci 0000:01:00.0: VF BAR 3 [mem 0xdfb20000-0xdfb3ffff 64bit pref]: contains BAR 3 for 8 VFs [ 9.998593] pci 0000:01:00.1: [8086:1521] type 00 class 0x020000 PCIe Endpoint [ 9.998818] pci 0000:01:00.1: BAR 0 [mem 0xf7600000-0xf76fffff] [ 9.998987] pci 0000:01:00.1: BAR 3 [mem 0xf7808000-0xf780bfff] [ 9.999275] pci 0000:01:00.1: PME# supported from D0 D3hot D3cold [ 9.999473] pci 0000:01:00.1: VF BAR 0 [mem 0xdfb40000-0xdfb43fff 64bit pref] [ 9.999669] pci 0000:01:00.1: VF BAR 0 [mem 0xdfb40000-0xdfb5ffff 64bit pref]: contains BAR 0 for 8 VFs [ 9.999904] pci 0000:01:00.1: VF BAR 3 [mem 0xdfb60000-0xdfb63fff 64bit pref] [ 10.000098] pci 0000:01:00.1: VF BAR 3 [mem 0xdfb60000-0xdfb7ffff 64bit pref]: contains BAR 3 for 8 VFs [ 10.001701] pci 0000:01:00.2: [8086:1521] type 00 class 0x020000 PCIe Endpoint [ 10.001926] pci 0000:01:00.2: BAR 0 [mem 0xf7500000-0xf75fffff] [ 10.002098] pci 0000:01:00.2: BAR 3 [mem 0xf7804000-0xf7807fff] [ 10.002341] pci 0000:01:00.2: PME# supported from D0 D3hot D3cold [ 10.002541] pci 0000:01:00.2: VF BAR 0 [mem 0xdfb80000-0xdfb83fff 64bit pref] [ 10.002737] pci 0000:01:00.2: VF BAR 0 [mem 0xdfb80000-0xdfb9ffff 64bit pref]: contains BAR 0 for 8 VFs [ 10.002968] pci 0000:01:00.2: VF BAR 3 [mem 0xdfba0000-0xdfba3fff 64bit pref] [ 10.003162] pci 0000:01:00.2: VF BAR 3 [mem 0xdfba0000-0xdfbbffff 64bit pref]: contains BAR 3 for 8 VFs [ 10.003855] pci 0000:01:00.3: [8086:1521] type 00 class 0x020000 PCIe Endpoint [ 10.004081] pci 0000:01:00.3: BAR 0 [mem 0xf7400000-0xf74fffff] [ 10.004221] pci 0000:01:00.3: BAR 3 [mem 0xf7800000-0xf7803fff] [ 10.004509] pci 0000:01:00.3: PME# supported from D0 D3hot D3cold [ 10.004710] pci 0000:01:00.3: VF BAR 0 [mem 0xdfbc0000-0xdfbc3fff 64bit pref] [ 10.004904] pci 0000:01:00.3: VF BAR 0 [mem 0xdfbc0000-0xdfbdffff 64bit pref]: contains BAR 0 for 8 VFs [ 10.005139] pci 0000:01:00.3: VF BAR 3 [mem 0xdfbe0000-0xdfbe3fff 64bit pref] [ 10.005227] pci 0000:01:00.3: VF BAR 3 [mem 0xdfbe0000-0xdfbfffff 64bit pref]: contains BAR 3 for 8 VFs [ 10.005932] pci 0000:00:01.0: PCI bridge to [bus 01] [ 10.006086] pci 0000:00:01.0: bridge has subordinate 01 but max busn 02 [ 10.006528] pci 0000:00:1c.0: PCI bridge to [bus 02] [ 10.007186] pci 0000:03:00.0: [1283:8892] type 01 class 0x060401 conventional PCI bridge [ 10.007472] pci 0000:03:00.0: PCI bridge to [bus 04] (subtractive decode) [ 10.007681] pci 0000:03:00.0: bridge window [mem 0xf7b00000-0xf7bfffff] [ 10.008093] pci 0000:03:00.0: supports D1 D2 [ 10.008218] pci 0000:03:00.0: PME# supported from D0 D1 D2 D3hot D3cold [ 10.009515] pci 0000:00:1c.2: PCI bridge to [bus 03-04] [ 10.009749] pci_bus 0000:04: extended config space not accessible [ 10.010389] pci 0000:04:02.0: [104c:8023] type 00 class 0x0c0010 conventional PCI endpoint [ 10.010730] pci 0000:04:02.0: BAR 0 [mem 0xf7b04000-0xf7b047ff] [ 10.010900] pci 0000:04:02.0: BAR 1 [mem 0xf7b00000-0xf7b03fff] [ 10.011283] pci 0000:04:02.0: supports D1 D2 [ 10.011420] pci 0000:04:02.0: PME# supported from D0 D1 D2 D3hot [ 10.012034] pci 0000:03:00.0: PCI bridge to [bus 04] (subtractive decode) [ 10.012199] pci 0000:03:00.0: bridge window [mem 0xf7b00000-0xf7bfffff] (subtractive decode) [ 10.012792] pci 0000:05:00.0: [1033:0194] type 00 class 0x0c0330 PCIe Endpoint [ 10.013087] pci 0000:05:00.0: BAR 0 [mem 0xf7a00000-0xf7a01fff 64bit] [ 10.013507] pci 0000:05:00.0: PME# supported from D0 D3hot D3cold [ 10.014968] pci 0000:00:1c.4: PCI bridge to [bus 05] [ 10.015475] pci 0000:06:00.0: [1b4b:9172] type 00 class 0x010601 PCIe Legacy Endpoint [ 10.015751] pci 0000:06:00.0: BAR 0 [io 0xe040-0xe047] [ 10.015908] pci 0000:06:00.0: BAR 1 [io 0xe030-0xe033] [ 10.016067] pci 0000:06:00.0: BAR 2 [io 0xe020-0xe027] [ 10.016223] pci 0000:06:00.0: BAR 3 [io 0xe010-0xe013] [ 10.016381] pci 0000:06:00.0: BAR 4 [io 0xe000-0xe00f] [ 10.016536] pci 0000:06:00.0: BAR 5 [mem 0xf7920000-0xf79201ff] [ 10.016706] pci 0000:06:00.0: ROM [mem 0xf7900000-0xf791ffff pref] [ 10.016983] pci 0000:06:00.0: Enabling fixed DMA alias to 00.1 [ 10.017217] pci 0000:06:00.0: PME# supported from D3hot [ 10.018564] pci 0000:00:1c.7: PCI bridge to [bus 06] [ 10.029161] ACPI: PCI: Interrupt link LNKA configured for IRQ 11 [ 10.029332] ACPI: PCI: Interrupt link LNKA disabled [ 10.030611] ACPI: PCI: Interrupt link LNKB configured for IRQ 10 [ 10.030782] ACPI: PCI: Interrupt link LNKB disabled [ 10.032046] ACPI: PCI: Interrupt link LNKC configured for IRQ 5 [ 10.032162] ACPI: PCI: Interrupt link LNKC disabled [ 10.033422] ACPI: PCI: Interrupt link LNKD configured for IRQ 11 [ 10.033590] ACPI: PCI: Interrupt link LNKD disabled [ 10.034856] ACPI: PCI: Interrupt link LNKE configured for IRQ 10 [ 10.035025] ACPI: PCI: Interrupt link LNKE disabled [ 10.036277] ACPI: PCI: Interrupt link LNKF configured for IRQ 0 [ 10.036442] ACPI: PCI: Interrupt link LNKF disabled [ 10.037706] ACPI: PCI: Interrupt link LNKG configured for IRQ 5 [ 10.037870] ACPI: PCI: Interrupt link LNKG disabled [ 10.039134] ACPI: PCI: Interrupt link LNKH configured for IRQ 11 [ 10.039220] ACPI: PCI: Interrupt link LNKH disabled [ 10.043233] iommu: Default domain type: Translated [ 10.043319] iommu: DMA domain TLB invalidation policy: lazy mode [ 10.043850] SCSI subsystem initialized [ 10.044298] ACPI: bus type USB registered [ 10.044571] usbcore: registered new interface driver usbfs [ 10.044792] usbcore: registered new interface driver hub [ 10.045002] usbcore: registered new device driver usb [ 10.045390] pps_core: LinuxPPS API ver. 1 registered [ 10.045541] pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti [ 10.045788] PTP clock support registered [ 10.046260] EDAC MC: Ver: 3.0.0 [ 10.047904] NetLabel: Initializing [ 10.048029] NetLabel: domain hash size = 128 [ 10.048162] NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO [ 10.048426] NetLabel: unlabeled traffic allowed by default [ 10.048583] mctp: management component transport protocol core [ 10.048748] NET: Registered PF_MCTP protocol family [ 10.048949] PCI: Using ACPI for IRQ routing [ 10.050452] PCI: pci_cache_line_size set to 64 bytes [ 10.050676] e820: reserve RAM buffer [mem 0x0009b400-0x0009ffff] [ 10.050853] e820: reserve RAM buffer [mem 0x40004000-0x43ffffff] [ 10.051025] e820: reserve RAM buffer [mem 0xd9af1000-0xdbffffff] [ 10.051165] e820: reserve RAM buffer [mem 0xda68c000-0xdbffffff] [ 10.051337] e820: reserve RAM buffer [mem 0xdb000000-0xdbffffff] [ 10.051505] e820: reserve RAM buffer [mem 0x41f600000-0x41fffffff] [ 10.052231] pci 0000:00:02.0: vgaarb: setting as boot VGA device [ 10.052358] pci 0000:00:02.0: vgaarb: bridge control possible [ 10.052521] pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none [ 10.052738] vgaarb: loaded [ 10.055491] hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 [ 10.055491] hpet0: 8 comparators, 64-bit 14.318180 MHz counter [ 10.058275] clocksource: Switched to clocksource tsc-early [ 10.063805] VFS: Disk quotas dquot_6.6.0 [ 10.063959] VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) [ 10.065183] netfs: FS-Cache loaded [ 10.065489] pnp: PnP ACPI init [ 10.066170] system 00:00: [mem 0xfed40000-0xfed44fff] has been reserved [ 10.067001] system 00:01: [io 0x0680-0x069f] has been reserved [ 10.067177] system 00:01: [io 0x1000-0x100f] has been reserved [ 10.067348] system 00:01: [io 0xffff] has been reserved [ 10.067514] system 00:01: [io 0xffff] has been reserved [ 10.067673] system 00:01: [io 0x0400-0x0453] has been reserved [ 10.067843] system 00:01: [io 0x0458-0x047f] has been reserved [ 10.068012] system 00:01: [io 0x0500-0x057f] has been reserved [ 10.068178] system 00:01: [io 0x164e-0x164f] has been reserved [ 10.069833] system 00:03: [io 0x0a00-0x0a0f] has been reserved [ 10.073315] pnp 00:04: [dma 0 disabled] [ 10.074898] system 00:05: [io 0x04d0-0x04d1] has been reserved [ 10.077776] system 00:06: [mem 0xfed1c000-0xfed1ffff] has been reserved [ 10.077972] system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved [ 10.078162] system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved [ 10.078759] system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved [ 10.078949] system 00:06: [mem 0xf8000000-0xfbffffff] has been reserved [ 10.079136] system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved [ 10.079327] system 00:06: [mem 0xfed90000-0xfed93fff] has been reserved [ 10.079522] system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved [ 10.079714] system 00:06: [mem 0xff000000-0xffffffff] has been reserved [ 10.079911] system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved [ 10.080107] system 00:06: [mem 0xdfa00000-0xdfa00fff] has been reserved [ 10.082616] system 00:07: [mem 0x20000000-0x201fffff] has been reserved [ 10.082811] system 00:07: [mem 0x40004000-0x40004fff] has been reserved [ 10.083165] pnp: PnP ACPI: found 8 devices [ 10.097078] clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns [ 10.097583] NET: Registered PF_INET protocol family [ 10.097913] IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) [ 10.102241] tcp_listen_portaddr_hash hash table entries: 8192 (order: 5, 131072 bytes, linear) [ 10.102486] Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) [ 10.102727] TCP established hash table entries: 131072 (order: 8, 1048576 bytes, linear) [ 10.103104] TCP bind hash table entries: 65536 (order: 9, 2097152 bytes, linear) [ 10.103530] TCP: Hash tables configured (established 131072 bind 65536) [ 10.104059] MPTCP token hash table entries: 16384 (order: 6, 393216 bytes, linear) [ 10.104342] UDP hash table entries: 8192 (order: 7, 524288 bytes, linear) [ 10.104620] UDP-Lite hash table entries: 8192 (order: 7, 524288 bytes, linear) [ 10.105095] NET: Registered PF_UNIX/PF_LOCAL protocol family [ 10.106039] RPC: Registered named UNIX socket transport module. [ 10.106204] RPC: Registered udp transport module. [ 10.106347] RPC: Registered tcp transport module. [ 10.106511] RPC: Registered tcp-with-tls transport module. [ 10.106666] RPC: Registered tcp NFSv4.1 backchannel transport module. [ 10.106834] NET: Registered PF_XDP protocol family [ 10.106996] pci 0000:00:01.0: PCI bridge to [bus 01] [ 10.107144] pci 0000:00:01.0: bridge window [mem 0xf7400000-0xf78fffff] [ 10.107334] pci 0000:00:01.0: bridge window [mem 0xdfb00000-0xdfbfffff 64bit pref] [ 10.107543] pci 0000:00:1c.0: PCI bridge to [bus 02] [ 10.107698] pci 0000:03:00.0: PCI bridge to [bus 04] [ 10.107855] pci 0000:03:00.0: bridge window [mem 0xf7b00000-0xf7bfffff] [ 10.108059] pci 0000:00:1c.2: PCI bridge to [bus 03-04] [ 10.108213] pci 0000:00:1c.2: bridge window [mem 0xf7b00000-0xf7bfffff] [ 10.108402] pci 0000:00:1c.4: PCI bridge to [bus 05] [ 10.108557] pci 0000:00:1c.4: bridge window [mem 0xf7a00000-0xf7afffff] [ 10.108749] pci 0000:00:1c.7: PCI bridge to [bus 06] [ 10.108898] pci 0000:00:1c.7: bridge window [io 0xe000-0xefff] [ 10.109064] pci 0000:00:1c.7: bridge window [mem 0xf7900000-0xf79fffff] [ 10.109257] pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] [ 10.109429] pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] [ 10.109596] pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] [ 10.109783] pci_bus 0000:00: resource 7 [mem 0x000d8000-0x000e7fff window] [ 10.109969] pci_bus 0000:00: resource 8 [mem 0xdfa00000-0xfeafffff window] [ 10.110155] pci_bus 0000:01: resource 1 [mem 0xf7400000-0xf78fffff] [ 10.110321] pci_bus 0000:01: resource 2 [mem 0xdfb00000-0xdfbfffff 64bit pref] [ 10.110517] pci_bus 0000:03: resource 1 [mem 0xf7b00000-0xf7bfffff] [ 10.110688] pci_bus 0000:04: resource 1 [mem 0xf7b00000-0xf7bfffff] [ 10.110855] pci_bus 0000:04: resource 4 [mem 0xf7b00000-0xf7bfffff] [ 10.111021] pci_bus 0000:05: resource 1 [mem 0xf7a00000-0xf7afffff] [ 10.111190] pci_bus 0000:06: resource 0 [io 0xe000-0xefff] [ 10.111343] pci_bus 0000:06: resource 1 [mem 0xf7900000-0xf79fffff] [ 10.113468] IOAPIC[0]: Preconfigured routing entry (2-16 -> IRQ 16 Level:1 ActiveLow:1) [ 10.116222] IOAPIC[0]: Preconfigured routing entry (2-16 -> IRQ 16 Level:1 ActiveLow:1) [ 10.118936] IOAPIC[0]: Preconfigured routing entry (2-23 -> IRQ 23 Level:1 ActiveLow:1) [ 10.120396] pci 0000:03:00.0: CLS mismatch (64 != 32), using 64 bytes [ 10.121926] IOAPIC[0]: Preconfigured routing entry (2-16 -> IRQ 16 Level:1 ActiveLow:1) [ 10.122936] PCI-DMA: Using software bounce buffering for IO (SWIOTLB) [ 10.123109] software IO TLB: mapped [mem 0x00000000d5af1000-0x00000000d9af1000] (64MB) [ 10.123180] Trying to unpack rootfs image as initramfs... [ 10.123259] ACPI: bus type thunderbolt registered [ 10.130296] Initialise system trusted keyrings [ 10.130477] Key type blacklist registered [ 10.130820] workingset: timestamp_bits=36 max_order=22 bucket_order=0 [ 10.132057] 9p: Installing v9fs 9p2000 file system support [ 10.132396] integrity: Platform Keyring initialized [ 10.132659] integrity: Machine keyring initialized [ 10.133089] cryptd: max_cpu_qlen set to 1000 [ 10.149836] NET: Registered PF_ALG protocol family [ 10.150006] Key type asymmetric registered [ 10.150138] Asymmetric key parser 'x509' registered [ 11.151553] tsc: Refined TSC clocksource calibration: 3492.067 MHz [ 11.151750] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x32560b09237, max_idle_ns: 440795350722 ns [ 11.155592] clocksource: Switched to clocksource tsc [ 21.935252] Freeing initrd memory: 536856K [ 21.945610] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246) [ 21.946045] io scheduler mq-deadline registered [ 21.946195] io scheduler kyber registered [ 21.946359] io scheduler bfq registered [ 21.954215] IOAPIC[0]: Preconfigured routing entry (2-18 -> IRQ 18 Level:1 ActiveLow:1) [ 21.956179] IOAPIC[0]: Preconfigured routing entry (2-19 -> IRQ 19 Level:1 ActiveLow:1) [ 21.957279] input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 [ 21.957841] ACPI: button: Power Button [PWRB] [ 21.958206] input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input1 [ 21.958729] ACPI: button: Power Button [PWRF] [ 21.967549] thermal LNXTHERM:00: registered as thermal_zone0 [ 21.967712] ACPI: thermal: Thermal Zone [TZ00] (28 C) [ 21.973076] thermal LNXTHERM:01: registered as thermal_zone1 [ 21.973241] ACPI: thermal: Thermal Zone [TZ01] (30 C) [ 21.974037] Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled [ 21.977592] Non-volatile memory driver v1.3 [ 21.980959] rdac: device handler registered [ 21.981301] hp_sw: device handler registered [ 21.981444] emc: device handler registered [ 21.981804] alua: device handler registered [ 21.983315] e1000: Intel(R) PRO/1000 Network Driver [ 21.983471] e1000: Copyright (c) 1999-2006 Intel Corporation. [ 21.983704] e1000e: Intel(R) PRO/1000 Network Driver [ 21.983851] e1000e: Copyright(c) 1999 - 2015 Intel Corporation. [ 21.985626] IOAPIC[0]: Preconfigured routing entry (2-20 -> IRQ 20 Level:1 ActiveLow:1) [ 21.985999] e1000e 0000:00:19.0: Interrupt Throttling Rate (ints/sec) set to dynamic conservative mode [ 22.092552] e1000e 0000:00:19.0 0000:00:19.0 (uninitialized): registered PHC clock [ 22.190017] e1000e 0000:00:19.0 eth0: (PCI Express:2.5GT/s:Width x1) 00:22:4d:81:6e:ce [ 22.190232] e1000e 0000:00:19.0 eth0: Intel(R) PRO/1000 Network Connection [ 22.190474] e1000e 0000:00:19.0 eth0: MAC: 10, PHY: 11, PBA No: FFFFFF-0FF [ 22.190751] igb: Intel(R) Gigabit Ethernet Network Driver [ 22.190904] igb: Copyright (c) 2007-2014 Intel Corporation. [ 22.249716] igb 0000:01:00.0: added PHC on eth1 [ 22.249870] igb 0000:01:00.0: Intel(R) Gigabit Ethernet Network Connection [ 22.250055] igb 0000:01:00.0: eth1: (PCIe:5.0Gb/s:Width x4) b4:96:91:2e:ca:0c [ 22.250528] igb 0000:01:00.0: eth1: PBA No: H47822-002 [ 22.250678] igb 0000:01:00.0: Using MSI-X interrupts. 8 rx queue(s), 8 tx queue(s) [ 22.251461] IOAPIC[0]: Preconfigured routing entry (2-17 -> IRQ 17 Level:1 ActiveLow:1) [ 22.309161] igb 0000:01:00.1: added PHC on eth2 [ 22.309318] igb 0000:01:00.1: Intel(R) Gigabit Ethernet Network Connection [ 22.309513] igb 0000:01:00.1: eth2: (PCIe:5.0Gb/s:Width x4) b4:96:91:2e:ca:0d [ 22.309985] igb 0000:01:00.1: eth2: PBA No: H47822-002 [ 22.310135] igb 0000:01:00.1: Using MSI-X interrupts. 8 rx queue(s), 8 tx queue(s) [ 22.369104] igb 0000:01:00.2: added PHC on eth3 [ 22.369258] igb 0000:01:00.2: Intel(R) Gigabit Ethernet Network Connection [ 22.369454] igb 0000:01:00.2: eth3: (PCIe:5.0Gb/s:Width x4) b4:96:91:2e:ca:0e [ 22.370325] igb 0000:01:00.2: eth3: PBA No: H47822-002 [ 22.370479] igb 0000:01:00.2: Using MSI-X interrupts. 8 rx queue(s), 8 tx queue(s) [ 22.429059] igb 0000:01:00.3: added PHC on eth4 [ 22.429216] igb 0000:01:00.3: Intel(R) Gigabit Ethernet Network Connection [ 22.429403] igb 0000:01:00.3: eth4: (PCIe:5.0Gb/s:Width x4) b4:96:91:2e:ca:0f [ 22.429883] igb 0000:01:00.3: eth4: PBA No: H47822-002 [ 22.430033] igb 0000:01:00.3: Using MSI-X interrupts. 8 rx queue(s), 8 tx queue(s) [ 22.430306] Intel(R) 2.5G Ethernet Linux Driver [ 22.430453] Copyright(c) 2018 Intel Corporation. [ 22.430661] i40e: Intel(R) Ethernet Connection XL710 Network Driver [ 22.430832] i40e: Copyright (c) 2013 - 2019 Intel Corporation. [ 22.431266] usbcore: registered new interface driver asix [ 22.434367] IOAPIC[0]: Preconfigured routing entry (2-23 -> IRQ 23 Level:1 ActiveLow:1) [ 22.434692] ehci-pci 0000:00:1d.0: EHCI Host Controller [ 22.435129] ehci-pci 0000:00:1d.0: new USB bus registered, assigned bus number 1 [ 22.435351] ehci-pci 0000:00:1d.0: debug port 2 [ 22.439533] ehci-pci 0000:00:1d.0: irq 23, io mem 0xf7c37000 [ 22.445484] ehci-pci 0000:00:1d.0: USB 2.0 started, EHCI 1.00 [ 22.446036] usb usb1: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.16 [ 22.446248] usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 22.446448] usb usb1: Product: EHCI Host Controller [ 22.446596] usb usb1: Manufacturer: Linux 6.16.0-rc5-00045-gadcc3bfa8806 ehci_hcd [ 22.446792] usb usb1: SerialNumber: 0000:00:1d.0 [ 22.447783] hub 1-0:1.0: USB hub found [ 22.447979] hub 1-0:1.0: 2 ports detected [ 22.450375] xhci_hcd 0000:00:14.0: xHCI Host Controller [ 22.450823] xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 [ 22.452182] xhci_hcd 0000:00:14.0: hcc params 0x20007181 hci version 0x100 quirks 0x000000000000b930 [ 22.453273] ehci-pci 0000:00:1a.0: EHCI Host Controller [ 22.453394] xhci_hcd 0000:00:14.0: xHCI Host Controller [ 22.453786] ehci-pci 0000:00:1a.0: new USB bus registered, assigned bus number 3 [ 22.453871] xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 4 [ 22.453937] ehci-pci 0000:00:1a.0: debug port 2 [ 22.454057] xhci_hcd 0000:00:14.0: Host supports USB 3.0 SuperSpeed [ 22.455029] usb usb2: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.16 [ 22.455353] usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 22.455694] usb usb2: Product: xHCI Host Controller [ 22.455907] usb usb2: Manufacturer: Linux 6.16.0-rc5-00045-gadcc3bfa8806 xhci-hcd [ 22.456206] usb usb2: SerialNumber: 0000:00:14.0 [ 22.457217] hub 2-0:1.0: USB hub found [ 22.457511] hub 2-0:1.0: 4 ports detected [ 22.458106] ehci-pci 0000:00:1a.0: irq 16, io mem 0xf7c38000 [ 22.463481] ehci-pci 0000:00:1a.0: USB 2.0 started, EHCI 1.00 [ 22.471489] usb usb4: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.16 [ 22.471703] usb usb4: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 22.471894] usb usb4: Product: xHCI Host Controller [ 22.472042] usb usb4: Manufacturer: Linux 6.16.0-rc5-00045-gadcc3bfa8806 xhci-hcd [ 22.472235] usb usb4: SerialNumber: 0000:00:14.0 [ 22.473157] hub 4-0:1.0: USB hub found [ 22.473360] hub 4-0:1.0: 4 ports detected [ 22.487418] usb usb3: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.16 [ 22.487677] usb usb3: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 22.487877] usb usb3: Product: EHCI Host Controller [ 22.488022] usb usb3: Manufacturer: Linux 6.16.0-rc5-00045-gadcc3bfa8806 ehci_hcd [ 22.488218] usb usb3: SerialNumber: 0000:00:1a.0 [ 22.489159] hub 3-0:1.0: USB hub found [ 22.489359] hub 3-0:1.0: 2 ports detected [ 22.491747] xhci_hcd 0000:05:00.0: xHCI Host Controller [ 22.492152] xhci_hcd 0000:05:00.0: new USB bus registered, assigned bus number 5 [ 22.492597] xhci_hcd 0000:05:00.0: hcc params 0x014042cb hci version 0x96 quirks 0x0000000000000004 [ 22.494622] xhci_hcd 0000:05:00.0: xHCI Host Controller [ 22.494988] xhci_hcd 0000:05:00.0: new USB bus registered, assigned bus number 6 [ 22.495194] xhci_hcd 0000:05:00.0: Host supports USB 3.0 SuperSpeed [ 22.496262] usb usb5: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.16 [ 22.496495] usb usb5: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 22.496688] usb usb5: Product: xHCI Host Controller [ 22.496832] usb usb5: Manufacturer: Linux 6.16.0-rc5-00045-gadcc3bfa8806 xhci-hcd [ 22.497028] usb usb5: SerialNumber: 0000:05:00.0 [ 22.497965] hub 5-0:1.0: USB hub found [ 22.498171] hub 5-0:1.0: 2 ports detected [ 22.499279] usb usb6: We don't know the algorithms for LPM for this host, disabling LPM. [ 22.499793] usb usb6: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.16 [ 22.500005] usb usb6: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 22.500200] usb usb6: Product: xHCI Host Controller [ 22.500348] usb usb6: Manufacturer: Linux 6.16.0-rc5-00045-gadcc3bfa8806 xhci-hcd [ 22.500572] usb usb6: SerialNumber: 0000:05:00.0 [ 22.501535] hub 6-0:1.0: USB hub found [ 22.501745] hub 6-0:1.0: 2 ports detected [ 22.503010] usbcore: registered new interface driver usbserial_generic [ 22.503219] usbserial: USB Serial support registered for generic [ 22.503566] i8042: PNP: No PS/2 controller found. [ 22.503963] mousedev: PS/2 mouse device common for all mice [ 22.504772] rtc_cmos 00:02: RTC can wake from S4 [ 22.505882] rtc_cmos 00:02: registered as rtc0 [ 22.506064] rtc_cmos 00:02: setting system clock to 2025-08-01T09:35:56 UTC (1754040956) [ 22.506398] rtc_cmos 00:02: alarms up to one month, y3k, 242 bytes nvram, hpet irqs [ 22.507317] iTCO_vendor_support: vendor-support=0 [ 22.507493] intel_pstate: Intel P-state driver initializing [ 22.511176] hid: raw HID events driver (C) Jiri Kosina [ 22.511686] usbcore: registered new interface driver usbhid [ 22.511844] usbhid: USB HID core driver [ 22.512057] drop_monitor: Initializing network drop monitor service [ 22.512391] Initializing XFRM netlink socket [ 22.512679] NET: Registered PF_INET6 protocol family [ 22.523682] Segment Routing with IPv6 [ 22.523876] In-situ OAM (IOAM) with IPv6 [ 22.524071] NET: Registered PF_PACKET protocol family [ 22.524505] 9pnet: Installing 9P2000 support [ 22.524693] mpls_gso: MPLS GSO support [ 22.527272] microcode: Current revision: 0x00000021 [ 22.528098] IPI shorthand broadcast: enabled [ 22.528274] ... APIC ID: 00000000 (0) [ 22.528426] ... APIC VERSION: 01060015 [ 22.528566] 0000000000000000000000000000000000000000000000000000000000000000 [ 22.528767] 0000000000000000000000000000000000000000000000000000000000000000 [ 22.528965] 0000000000000000000000000000000000000000000000000000000008001000 [ 22.529255] number of MP IRQ sources: 15. [ 22.529386] number of IO-APIC #2 registers: 24. [ 22.529900] testing the IO APIC....................... [ 22.530056] IO APIC #2...... [ 22.530168] .... register #00: 02000000 [ 22.530294] ....... : physical APIC id: 02 [ 22.530489] ....... : Delivery Type: 0 [ 22.530621] ....... : LTS : 0 [ 22.530748] .... register #01: 00170020 [ 22.530876] ....... : max redirection entries: 17 [ 22.531019] ....... : PRQ implemented: 0 [ 22.531154] ....... : IO APIC version: 20 [ 22.531290] .... IRQ redirection table: [ 22.531495] IOAPIC 0: [ 22.531619] pin00, disabled, edge , high, V(44), IRR(0), S(0), remapped, I(2622), Z(2) [ 22.531827] pin01, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 22.532036] pin02, enabled , edge , high, V(30), IRR(0), S(0), physical, D(0000), M(0) [ 22.532244] pin03, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 22.532528] pin04, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 22.532734] pin05, disabled, edge , high, V(80), IRR(0), S(0), logical , D(03C8), M(2) [ 22.532943] pin06, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 22.533151] pin07, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 22.533359] pin08, enabled , edge , high, V(20), IRR(0), S(0), physical, D(0000), M(0) [ 22.533654] pin09, enabled , level, high, V(20), IRR(0), S(0), physical, D(0002), M(0) [ 22.534259] pin0a, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 22.534536] pin0b, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 22.534744] pin0c, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 22.534951] pin0d, disabled, edge , high, V(41), IRR(0), S(0), remapped, I(2243), Z(2) [ 22.535160] pin0e, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 22.535368] pin0f, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 22.535654] pin10, enabled , level, low , V(20), IRR(0), S(0), physical, D(0005), M(0) [ 22.535862] pin11, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 22.536069] pin12, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 22.536281] pin13, disabled, edge , high, V(28), IRR(0), S(0), logical , D(6259), M(2) [ 22.536574] pin14, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 22.536784] pin15, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 22.536992] pin16, disabled, edge , high, V(00), IRR(0), S(0), physical, D(0000), M(0) [ 22.537199] pin17, enabled , level, low , V(20), IRR(0), S(0), physical, D(0001), M(0) [ 22.537401] IRQ to pin mappings: [ 22.537556] IRQ0 -> 0:2 [ 22.537662] IRQ1 -> 0:1 [ 22.537770] IRQ3 -> 0:3 [ 22.537876] IRQ4 -> 0:4 [ 22.537984] IRQ5 -> 0:5 [ 22.538093] IRQ6 -> 0:6 [ 22.538201] IRQ7 -> 0:7 [ 22.538308] IRQ8 -> 0:8 [ 22.538427] IRQ9 -> 0:9 [ 22.538577] IRQ10 -> 0:10 [ 22.538700] IRQ11 -> 0:11 [ 22.538806] IRQ12 -> 0:12 [ 22.538916] IRQ13 -> 0:13 [ 22.539027] IRQ14 -> 0:14 [ 22.539135] IRQ15 -> 0:15 [ 22.539246] IRQ16 -> 0:16 [ 22.539359] IRQ17 -> 0:17 [ 22.539499] IRQ18 -> 0:18 [ 22.539610] IRQ19 -> 0:19 [ 22.539721] IRQ20 -> 0:20 [ 22.539832] IRQ23 -> 0:23 [ 22.539954] .................................... done. [ 22.563698] sched_clock: Marking stable (22534001874, 29421791)->(23005596073, -442172408) [ 22.564758] registered taskstats version 1 [ 22.566015] Running tests on trace events: [ 22.566156] Testing event initcall_finish: OK [ 22.586210] Testing event initcall_start: OK [ 22.607291] Testing event initcall_level: OK [ 22.626294] Testing event emulate_vsyscall: OK [ 22.643136] Testing event xen_cpu_set_ldt: OK [ 22.660100] Testing event xen_cpu_write_gdt_entry: OK [ 22.677133] Testing event xen_cpu_load_idt: [ 22.687511] usb 1-1: new high-speed USB device number 2 using ehci-pci [ 22.694008] OK [ 22.694113] Testing event xen_cpu_write_idt_entry: OK [ 22.713139] Testing event xen_cpu_write_ldt_entry: [ 22.727548] usb 3-1: new high-speed USB device number 2 using ehci-pci [ 22.729930] OK [ 22.730034] Testing event xen_mmu_write_cr3: OK [ 22.748082] Testing event xen_mmu_flush_tlb_multi: OK [ 22.765160] Testing event xen_mmu_flush_tlb_one_user: OK [ 22.784118] Testing event xen_mmu_pgd_unpin: OK [ 22.802081] Testing event xen_mmu_pgd_pin: [ 22.813268] usb 1-1: New USB device found, idVendor=8087, idProduct=0024, bcdDevice= 0.00 [ 22.813638] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 22.815536] hub 1-1:1.0: USB hub found [ 22.816005] hub 1-1:1.0: 8 ports detected [ 22.819838] OK [ 22.819943] Testing event xen_mmu_release_ptpage: OK [ 22.836987] Testing event xen_mmu_alloc_ptpage: [ 22.854023] usb 3-1: New USB device found, idVendor=8087, idProduct=0024, bcdDevice= 0.00 [ 22.854149] OK [ 22.854199] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 22.854339] Testing event xen_mmu_ptep_modify_prot_commit: [ 22.855847] hub 3-1:1.0: USB hub found [ 22.856245] hub 3-1:1.0: 6 ports detected [ 22.872982] OK [ 22.873087] Testing event xen_mmu_ptep_modify_prot_start: OK [ 22.889128] Testing event xen_mmu_set_p4d: OK [ 22.906080] Testing event xen_mmu_set_pud: OK [ 22.925214] Testing event xen_mmu_set_pmd: OK [ 22.943198] Testing event xen_mmu_set_pte: OK [ 22.962096] Testing event xen_mc_extend_args: OK [ 22.980200] Testing event xen_mc_flush: OK [ 22.998130] Testing event xen_mc_flush_reason: OK [ 23.017210] Testing event xen_mc_callback: OK [ 23.035157] Testing event xen_mc_entry_alloc: OK [ 23.053134] Testing event xen_mc_entry: OK [ 23.072219] Testing event xen_mc_issue: OK [ 23.090179] Testing event xen_mc_batch: OK [ 23.108159] Testing event hyperv_send_ipi_one: OK [ 23.128122] Testing event hyperv_send_ipi_mask: OK [ 23.146142] Testing event hyperv_nested_flush_guest_mapping_range: OK [ 23.165162] Testing event hyperv_nested_flush_guest_mapping: OK [ 23.183127] Testing event hyperv_mmu_flush_tlb_multi: OK [ 23.202150] Testing event vector_free_moved: OK [ 23.220209] Testing event vector_setup: OK [ 23.241260] Testing event vector_teardown: OK [ 23.259121] Testing event vector_deactivate: OK [ 23.276187] Testing event vector_activate: OK [ 23.296273] Testing event vector_alloc_managed: OK [ 23.313180] Testing event vector_alloc: OK [ 23.330207] Testing event vector_reserve: OK [ 23.349038] Testing event vector_reserve_managed: OK [ 23.366146] Testing event vector_clear: OK [ 23.383159] Testing event vector_update: OK [ 23.402105] Testing event vector_config: OK [ 23.420095] Testing event thermal_apic_exit: OK [ 23.439142] Testing event thermal_apic_entry: OK [ 23.457167] Testing event deferred_error_apic_exit: OK [ 23.474308] Testing event deferred_error_apic_entry: OK [ 23.492289] Testing event threshold_apic_exit: OK [ 23.509177] Testing event threshold_apic_entry: OK [ 23.526161] Testing event call_function_single_exit: OK [ 23.543257] Testing event call_function_single_entry: OK [ 23.560234] Testing event call_function_exit: OK [ 23.577057] Testing event call_function_entry: OK [ 23.594142] Testing event reschedule_exit: OK [ 23.613157] Testing event reschedule_entry: OK [ 23.630166] Testing event irq_work_exit: OK [ 23.647174] Testing event irq_work_entry: OK [ 23.664151] Testing event x86_platform_ipi_exit: OK [ 23.682092] Testing event x86_platform_ipi_entry: OK [ 23.699164] Testing event error_apic_exit: OK [ 23.717073] Testing event error_apic_entry: OK [ 23.734177] Testing event spurious_apic_exit: OK [ 23.752098] Testing event spurious_apic_entry: OK [ 23.769102] Testing event local_timer_exit: OK [ 23.786166] Testing event local_timer_entry: OK [ 23.804164] Testing event nmi_handler: OK [ 23.821089] Testing event x86_fpu_xstate_check_failed: OK [ 23.838101] Testing event x86_fpu_copy_dst: OK [ 23.855277] Testing event x86_fpu_dropped: OK [ 23.873081] Testing event x86_fpu_regs_deactivated: OK [ 23.890146] Testing event x86_fpu_regs_activated: OK [ 23.908217] Testing event x86_fpu_after_save: OK [ 23.926150] Testing event x86_fpu_before_save: OK [ 23.944237] Testing event mce_record: OK [ 23.961117] Testing event pseudo_lock_l3: OK [ 23.979129] Testing event pseudo_lock_l2: OK [ 23.996120] Testing event pseudo_lock_mem_latency: OK [ 24.013148] Testing event page_fault_kernel: OK [ 24.030153] Testing event page_fault_user: OK [ 24.049225] Testing event task_prctl_unknown: OK [ 24.067111] Testing event task_rename: OK [ 24.085192] Testing event task_newtask: OK [ 24.103089] Testing event cpuhp_exit: OK [ 24.121257] Testing event cpuhp_multi_enter: OK [ 24.138157] Testing event cpuhp_enter: OK [ 24.155210] Testing event tasklet_exit: OK [ 24.174162] Testing event tasklet_entry: OK [ 24.192301] Testing event softirq_raise: OK [ 24.209254] Testing event softirq_exit: OK [ 24.226317] Testing event softirq_entry: OK [ 24.243198] Testing event irq_handler_exit: OK [ 24.260167] Testing event irq_handler_entry: OK [ 24.278187] Testing event signal_deliver: OK [ 24.297178] Testing event signal_generate: OK [ 24.314158] Testing event workqueue_execute_end: OK [ 24.331095] Testing event workqueue_execute_start: OK [ 24.348308] Testing event workqueue_activate_work: OK [ 24.365153] Testing event workqueue_queue_work: OK [ 24.382136] Testing event notifier_run: OK [ 24.400258] Testing event notifier_unregister: OK [ 24.418547] Testing event notifier_register: OK [ 24.435137] Testing event ipi_exit: OK [ 24.452060] Testing event ipi_entry: OK [ 24.469162] Testing event ipi_send_cpumask: OK [ 24.486197] Testing event ipi_send_cpu: OK [ 24.503227] Testing event ipi_raise: OK [ 24.524223] Testing event sched_wake_idle_without_ipi: OK [ 24.542261] Testing event sched_skip_cpuset_numa: OK [ 24.561260] Testing event sched_skip_vma_numa: OK [ 24.579240] Testing event sched_swap_numa: OK [ 24.599126] Testing event sched_stick_numa: OK [ 24.616155] Testing event sched_move_numa: OK [ 24.634160] Testing event sched_process_hang: OK [ 24.652264] Testing event sched_pi_setprio: OK [ 24.669182] Testing event sched_stat_runtime: [ 24.669544] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 24.686168] OK [ 24.686267] Testing event sched_stat_blocked: OK [ 24.703157] Testing event sched_stat_iowait: OK [ 24.720132] Testing event sched_stat_sleep: OK [ 24.738147] Testing event sched_stat_wait: OK [ 24.755112] Testing event sched_prepare_exec: OK [ 24.773123] Testing event sched_process_exec: OK [ 24.790136] Testing event sched_process_fork: OK [ 24.807094] Testing event sched_process_wait: OK [ 24.824168] Testing event sched_wait_task: OK [ 24.841241] Testing event sched_process_exit: OK [ 24.859187] Testing event sched_process_free: OK [ 24.876236] Testing event sched_migrate_task: OK [ 24.895103] Testing event sched_switch: OK [ 24.912086] Testing event sched_wakeup_new: OK [ 24.931136] Testing event sched_wakeup: OK [ 24.948154] Testing event sched_waking: OK [ 24.966204] Testing event sched_kthread_work_execute_end: OK [ 24.983106] Testing event sched_kthread_work_execute_start: OK [ 25.001143] Testing event sched_kthread_work_queue_work: OK [ 25.019211] Testing event sched_kthread_stop_ret: OK [ 25.038146] Testing event sched_kthread_stop: OK [ 25.057209] Testing event contention_end: OK [ 25.075455] Testing event contention_begin: OK [ 25.092474] Testing event console: OK [ 25.109191] Testing event irq_matrix_free: OK [ 25.127125] Testing event irq_matrix_alloc: OK [ 25.145218] Testing event irq_matrix_assign: OK [ 25.162088] Testing event irq_matrix_alloc_managed: OK [ 25.179200] Testing event irq_matrix_remove_managed: OK [ 25.196155] Testing event irq_matrix_reserve_managed: OK [ 25.213140] Testing event irq_matrix_assign_system: OK [ 25.230086] Testing event irq_matrix_remove_reserved: OK [ 25.247117] Testing event irq_matrix_reserve: OK [ 25.264150] Testing event irq_matrix_offline: OK [ 25.281215] Testing event irq_matrix_online: OK [ 25.298080] Testing event rcu_stall_warning: OK [ 25.315192] Testing event rcu_utilization: OK [ 25.332446] Testing event dma_sync_sg_for_device: OK [ 25.349065] Testing event dma_sync_sg_for_cpu: OK [ 25.367098] Testing event dma_sync_single_for_device: OK [ 25.385172] Testing event dma_sync_single_for_cpu: OK [ 25.404185] Testing event dma_unmap_sg: OK [ 25.421159] Testing event dma_map_sg_err: OK [ 25.439206] Testing event dma_map_sg: OK [ 25.457088] Testing event dma_free_sgt: OK [ 25.475088] Testing event dma_free_pages: OK [ 25.492087] Testing event dma_free: OK [ 25.511135] Testing event dma_alloc_sgt: OK [ 25.528208] Testing event dma_alloc_sgt_err: OK [ 25.545111] Testing event dma_alloc_pages: OK [ 25.563111] Testing event dma_alloc: OK [ 25.580222] Testing event dma_unmap_resource: OK [ 25.598114] Testing event dma_unmap_page: OK [ 25.616193] Testing event dma_map_resource: OK [ 25.634119] Testing event dma_map_page: OK [ 25.652194] Testing event swiotlb_bounced: OK [ 25.670135] Testing event sys_exit: OK [ 25.687142] Testing event sys_enter: OK [ 25.704077] Testing event module_request: OK [ 25.721110] Testing event module_put: OK [ 25.738179] Testing event module_get: OK [ 25.757147] Testing event module_free: OK [ 25.774166] Testing event module_load: OK [ 25.792092] Testing event tick_stop: OK [ 25.809190] Testing event itimer_expire: OK [ 25.827176] Testing event itimer_state: OK [ 25.845142] Testing event hrtimer_cancel: OK [ 25.862220] Testing event hrtimer_expire_exit: OK [ 25.880123] Testing event hrtimer_expire_entry: OK [ 25.898145] Testing event hrtimer_start: OK [ 25.916143] Testing event hrtimer_setup: OK [ 25.935163] Testing event timer_base_idle: OK [ 25.952130] Testing event timer_cancel: OK [ 25.969160] Testing event timer_expire_exit: OK [ 25.986128] Testing event timer_expire_entry: OK [ 26.004218] Testing event timer_start: OK [ 26.023215] Testing event timer_init: OK [ 26.040089] Testing event alarmtimer_cancel: OK [ 26.058066] Testing event alarmtimer_start: OK [ 26.076134] Testing event alarmtimer_fired: OK [ 26.094151] Testing event alarmtimer_suspend: OK [ 26.111156] Testing event tmigr_handle_remote: OK [ 26.128309] Testing event tmigr_update_events: OK [ 26.145344] Testing event tmigr_cpu_new_timer_idle: OK [ 26.162158] Testing event tmigr_cpu_idle: OK [ 26.180071] Testing event tmigr_handle_remote_cpu: OK [ 26.197158] Testing event tmigr_cpu_offline: OK [ 26.215282] Testing event tmigr_cpu_online: OK [ 26.233230] Testing event tmigr_cpu_active: OK [ 26.252125] Testing event tmigr_cpu_new_timer: OK [ 26.269115] Testing event tmigr_group_set_cpu_active: OK [ 26.289199] Testing event tmigr_group_set_cpu_inactive: OK [ 26.309132] Testing event tmigr_connect_cpu_parent: OK [ 26.326127] Testing event tmigr_connect_child_parent: OK [ 26.343285] Testing event tmigr_group_set: OK [ 26.360249] Testing event csd_function_exit: OK [ 26.377247] Testing event csd_function_entry: OK [ 26.394337] Testing event csd_queue_cpu: OK [ 26.412238] Testing event cgroup_rstat_cpu_unlock_fastpath: OK [ 26.429201] Testing event cgroup_rstat_cpu_unlock: OK [ 26.446110] Testing event cgroup_rstat_cpu_locked_fastpath: OK [ 26.464208] Testing event cgroup_rstat_cpu_locked: OK [ 26.481178] Testing event cgroup_rstat_cpu_lock_contended_fastpath: OK [ 26.498297] Testing event cgroup_rstat_cpu_lock_contended: OK [ 26.515146] Testing event cgroup_rstat_unlock: OK [ 26.532181] Testing event cgroup_rstat_locked: OK [ 26.550190] Testing event cgroup_rstat_lock_contended: OK [ 26.567186] Testing event cgroup_notify_frozen: OK [ 26.585159] Testing event cgroup_notify_populated: OK [ 26.602169] Testing event cgroup_transfer_tasks: OK [ 26.619134] Testing event cgroup_attach_task: OK [ 26.637145] Testing event cgroup_unfreeze: OK [ 26.654145] Testing event cgroup_freeze: OK [ 26.671132] Testing event cgroup_rename: OK [ 26.688122] Testing event cgroup_release: OK [ 26.705091] Testing event cgroup_rmdir: OK [ 26.722118] Testing event cgroup_mkdir: OK [ 26.740106] Testing event cgroup_remount: OK [ 26.757090] Testing event cgroup_destroy_root: OK [ 26.778109] Testing event cgroup_setup_root: OK [ 26.795150] Testing event sample_threshold: OK [ 26.812265] Testing event nmi_noise: OK [ 26.829200] Testing event irq_noise: OK [ 26.846063] Testing event softirq_noise: OK [ 26.863132] Testing event thread_noise: OK [ 26.880092] Testing event timerlat_sample: OK [ 26.900332] Testing event osnoise_sample: OK [ 26.919145] Testing event ftrace_test_filter: OK [ 26.937204] Testing event bpf_trace_printk: OK [ 26.954105] Testing event error_report_end: OK [ 26.971133] Testing event guest_halt_poll_ns: OK [ 26.988136] Testing event dev_pm_qos_remove_request: OK [ 27.005091] Testing event dev_pm_qos_update_request: OK [ 27.022177] Testing event dev_pm_qos_add_request: OK [ 27.039086] Testing event pm_qos_update_flags: OK [ 27.056204] Testing event pm_qos_update_target: OK [ 27.073139] Testing event pm_qos_remove_request: OK [ 27.090164] Testing event pm_qos_update_request: OK [ 27.108154] Testing event pm_qos_add_request: OK [ 27.125110] Testing event power_domain_target: OK [ 27.146181] Testing event wakeup_source_deactivate: OK [ 27.164161] Testing event wakeup_source_activate: OK [ 27.181256] Testing event suspend_resume: OK [ 27.198916] Testing event device_pm_callback_end: OK [ 27.218214] Testing event device_pm_callback_start: OK [ 27.236210] Testing event cpu_frequency_limits: OK [ 27.253095] Testing event cpu_frequency: OK [ 27.271335] Testing event pstate_sample: OK [ 27.289117] Testing event powernv_throttle: OK [ 27.306161] Testing event psci_domain_idle_exit: OK [ 27.323212] Testing event psci_domain_idle_enter: OK [ 27.340053] Testing event cpu_idle_miss: OK [ 27.358168] Testing event cpu_idle: OK [ 27.376283] Testing event rpm_status: OK [ 27.394236] Testing event rpm_return_int: OK [ 27.411337] Testing event rpm_usage: OK [ 27.430319] Testing event rpm_idle: OK [ 27.447085] Testing event rpm_resume: OK [ 27.464144] Testing event rpm_suspend: OK [ 27.481147] Testing event rv_retries_error: OK [ 27.498614] Testing event error_wwnr: OK [ 27.515412] Testing event event_wwnr: OK [ 27.532130] Testing event bpf_xdp_link_attach_failed: OK [ 27.549237] Testing event mem_connect: OK [ 27.567123] Testing event mem_disconnect: OK [ 27.584120] Testing event xdp_devmap_xmit: OK [ 27.602137] Testing event xdp_cpumap_enqueue: OK [ 27.620129] Testing event xdp_cpumap_kthread: OK [ 27.637124] Testing event xdp_redirect_map_err: OK [ 27.655099] Testing event xdp_redirect_map: OK [ 27.674073] Testing event xdp_redirect_err: OK [ 27.691218] Testing event xdp_redirect: OK [ 27.709200] Testing event xdp_bulk_tx: OK [ 27.726065] Testing event xdp_exception: OK [ 27.745279] Testing event user_exit: OK [ 27.762054] Testing event user_enter: OK [ 27.780221] Testing event rseq_ip_fixup: OK [ 27.797106] Testing event rseq_update: OK [ 27.816090] Testing event file_check_and_advance_wb_err: OK [ 27.834123] Testing event filemap_set_wb_err: OK [ 27.852162] Testing event mm_filemap_fault: OK [ 27.869169] Testing event mm_filemap_map_pages: OK [ 27.887234] Testing event mm_filemap_get_pages: OK [ 27.905130] Testing event mm_filemap_add_to_page_cache: OK [ 27.922156] Testing event mm_filemap_delete_from_page_cache: OK [ 27.939140] Testing event compact_retry: OK [ 27.956184] Testing event skip_task_reaping: OK [ 27.975150] Testing event finish_task_reaping: OK [ 27.993108] Testing event start_task_reaping: OK [ 28.011196] Testing event wake_reaper: OK [ 28.028242] Testing event mark_victim: OK [ 28.045073] Testing event reclaim_retry_zone: OK [ 28.062214] Testing event oom_score_adj_update: OK [ 28.082126] Testing event mm_lru_activate: OK [ 28.100140] Testing event mm_lru_insertion: OK [ 28.118161] Testing event mm_vmscan_throttled: OK [ 28.136168] Testing event mm_vmscan_node_reclaim_end: OK [ 28.154134] Testing event mm_vmscan_node_reclaim_begin: OK [ 28.172065] Testing event mm_vmscan_lru_shrink_active: OK [ 28.189301] Testing event mm_vmscan_lru_shrink_inactive: OK [ 28.207153] Testing event mm_vmscan_reclaim_pages: OK [ 28.224097] Testing event mm_vmscan_write_folio: OK [ 28.241139] Testing event mm_vmscan_lru_isolate: OK [ 28.258140] Testing event mm_shrink_slab_end: OK [ 28.275155] Testing event mm_shrink_slab_start: OK [ 28.293217] Testing event mm_vmscan_memcg_softlimit_reclaim_end: OK [ 28.311136] Testing event mm_vmscan_memcg_reclaim_end: OK [ 28.328123] Testing event mm_vmscan_direct_reclaim_end: OK [ 28.345128] Testing event mm_vmscan_memcg_softlimit_reclaim_begin: OK [ 28.363142] Testing event mm_vmscan_memcg_reclaim_begin: OK [ 28.380198] Testing event mm_vmscan_direct_reclaim_begin: OK [ 28.397121] Testing event mm_vmscan_wakeup_kswapd: OK [ 28.414104] Testing event mm_vmscan_kswapd_wake: OK [ 28.432188] Testing event mm_vmscan_kswapd_sleep: OK [ 28.449112] Testing event percpu_destroy_chunk: OK [ 28.466199] Testing event percpu_create_chunk: OK [ 28.483302] Testing event percpu_alloc_percpu_fail: OK [ 28.502158] Testing event percpu_free_percpu: OK [ 28.519231] Testing event percpu_alloc_percpu: OK [ 28.536080] Testing event rss_stat: OK [ 28.553358] Testing event mm_calculate_totalreserve_pages: OK [ 28.571137] Testing event mm_setup_per_zone_lowmem_reserve: OK [ 28.588124] Testing event mm_setup_per_zone_wmarks: OK [ 28.605077] Testing event mm_alloc_contig_migrate_range_info: OK [ 28.623181] Testing event mm_page_alloc_extfrag: OK [ 28.640177] Testing event mm_page_pcpu_drain: OK [ 28.657121] Testing event mm_page_alloc_zone_locked: OK [ 28.675263] Testing event mm_page_alloc: OK [ 28.693150] Testing event mm_page_free_batched: OK [ 28.710167] Testing event mm_page_free: OK [ 28.727250] Testing event kmem_cache_free: OK [ 28.744131] Testing event kfree: OK [ 28.762114] Testing event kmalloc: OK [ 28.781393] Testing event kmem_cache_alloc: OK [ 28.798208] Testing event mm_compaction_kcompactd_wake: OK [ 28.815167] Testing event mm_compaction_wakeup_kcompactd: OK [ 28.832213] Testing event mm_compaction_kcompactd_sleep: OK [ 28.849153] Testing event mm_compaction_defer_reset: OK [ 28.868198] Testing event mm_compaction_defer_compaction: OK [ 28.885157] Testing event mm_compaction_deferred: OK [ 28.902129] Testing event mm_compaction_suitable: OK [ 28.922144] Testing event mm_compaction_finished: OK [ 28.939123] Testing event mm_compaction_try_to_compact_pages: OK [ 28.956236] Testing event mm_compaction_end: OK [ 28.973181] Testing event mm_compaction_begin: OK [ 28.991138] Testing event mm_compaction_migratepages: OK [ 29.008033] Testing event mm_compaction_fast_isolate_freepages: OK [ 29.026125] Testing event mm_compaction_isolate_freepages: OK [ 29.044115] Testing event mm_compaction_isolate_migratepages: OK [ 29.061140] Testing event mmap_lock_acquire_returned: OK [ 29.079681] Testing event mmap_lock_released: OK [ 29.097741] Testing event mmap_lock_start_locking: OK [ 29.115728] Testing event exit_mmap: OK [ 29.133132] Testing event vma_store: OK [ 29.151204] Testing event vma_mas_szero: OK [ 29.168067] Testing event vm_unmapped_area: OK [ 29.187088] Testing event remove_migration_pte: OK [ 29.205236] Testing event set_migration_pte: OK [ 29.222208] Testing event mm_migrate_pages_start: OK [ 29.240091] Testing event mm_migrate_pages: OK [ 29.257142] Testing event tlb_flush: OK [ 29.274307] Testing event free_vmap_area_noflush: OK [ 29.292215] Testing event purge_vmap_area_lazy: OK [ 29.310134] Testing event alloc_vmap_area: OK [ 29.327154] Testing event ksm_advisor: OK [ 29.345257] Testing event ksm_remove_rmap_item: OK [ 29.364195] Testing event ksm_remove_ksm_page: OK [ 29.381220] Testing event ksm_merge_with_ksm_page: OK [ 29.398149] Testing event ksm_merge_one_page: OK [ 29.416178] Testing event ksm_exit: OK [ 29.433219] Testing event ksm_enter: OK [ 29.450141] Testing event ksm_stop_scan: OK [ 29.467130] Testing event ksm_start_scan: OK [ 29.485308] Testing event remove_migration_pmd: OK [ 29.502113] Testing event set_migration_pmd: OK [ 29.520110] Testing event hugepage_update_pud: OK [ 29.538243] Testing event hugepage_update_pmd: OK [ 29.556043] Testing event hugepage_set_pud: OK [ 29.574119] Testing event hugepage_set_pmd: OK [ 29.592085] Testing event mm_khugepaged_collapse_file: OK [ 29.609141] Testing event mm_khugepaged_scan_file: OK [ 29.627079] Testing event mm_collapse_huge_page_swapin: OK [ 29.644212] Testing event mm_collapse_huge_page_isolate: OK [ 29.661048] Testing event mm_collapse_huge_page: OK [ 29.677105] Testing event mm_khugepaged_scan_pmd: OK [ 29.695151] Testing event memcg_flush_stats: OK [ 29.712123] Testing event count_memcg_events: OK [ 29.731126] Testing event mod_memcg_lruvec_state: OK [ 29.749166] Testing event mod_memcg_state: OK [ 29.766119] Testing event test_pages_isolated: OK [ 29.783300] Testing event cma_alloc_busy_retry: OK [ 29.801151] Testing event cma_alloc_finish: OK [ 29.818122] Testing event cma_alloc_start: OK [ 29.835135] Testing event cma_release: OK [ 29.852179] Testing event damon_aggregated: OK [ 29.869116] Testing event damos_before_apply: OK [ 29.886143] Testing event fill_mg_cmtime: OK [ 29.905204] Testing event ctime_ns_xchg: OK [ 29.923138] Testing event ctime_xchg_skip: OK [ 29.940201] Testing event inode_set_ctime_to_ts: OK [ 29.958076] Testing event sb_clear_inode_writeback: OK [ 29.976146] Testing event sb_mark_inode_writeback: OK [ 29.994161] Testing event writeback_dirty_inode_enqueue: OK [ 30.012136] Testing event writeback_lazytime_iput: OK [ 30.029172] Testing event writeback_lazytime: OK [ 30.046092] Testing event writeback_single_inode: OK [ 30.064050] Testing event writeback_single_inode_start: OK [ 30.081236] Testing event writeback_sb_inodes_requeue: OK [ 30.099191] Testing event balance_dirty_pages: OK [ 30.116167] Testing event bdi_dirty_ratelimit: OK [ 30.134131] Testing event global_dirty_state: OK [ 30.154104] Testing event writeback_queue_io: OK [ 30.172129] Testing event wbc_writepage: OK [ 30.193164] Testing event writeback_bdi_register: OK [ 30.210251] Testing event writeback_wake_background: OK [ 30.227113] Testing event writeback_pages_written: OK [ 30.244155] Testing event writeback_wait: OK [ 30.262168] Testing event writeback_written: OK [ 30.279063] Testing event writeback_start: OK [ 30.297185] Testing event writeback_exec: OK [ 30.315118] Testing event writeback_queue: OK [ 30.332093] Testing event writeback_write_inode: OK [ 30.349193] Testing event writeback_write_inode_start: OK [ 30.367238] Testing event flush_foreign: OK [ 30.384293] Testing event track_foreign_dirty: OK [ 30.402138] Testing event inode_switch_wbs: OK [ 30.419133] Testing event inode_foreign_history: OK [ 30.436140] Testing event writeback_dirty_inode: OK [ 30.456042] Testing event writeback_dirty_inode_start: OK [ 30.477235] Testing event writeback_mark_inode_dirty: OK [ 30.495192] Testing event folio_wait_writeback: OK [ 30.512163] Testing event writeback_dirty_folio: OK [ 30.529089] Testing event dax_writeback_one: OK [ 30.548137] Testing event dax_writeback_range_done: OK [ 30.565194] Testing event dax_writeback_range: OK [ 30.584279] Testing event dax_insert_pfn_mkwrite: OK [ 30.601367] Testing event dax_insert_pfn_mkwrite_no_entry: OK [ 30.618307] Testing event dax_load_hole: OK [ 30.637097] Testing event dax_pte_fault_done: OK [ 30.655157] Testing event dax_pte_fault: OK [ 30.672521] Testing event dax_pmd_load_hole_fallback: OK [ 30.689146] Testing event dax_pmd_load_hole: OK [ 30.706052] Testing event dax_pmd_fault_done: OK [ 30.724133] Testing event dax_pmd_fault: OK [ 30.741183] Testing event leases_conflict: OK [ 30.758185] Testing event generic_add_lease: OK [ 30.776154] Testing event time_out_leases: OK [ 30.793135] Testing event generic_delete_lease: OK [ 30.810144] Testing event break_lease_unblock: OK [ 30.828131] Testing event break_lease_block: OK [ 30.845262] Testing event break_lease_noblock: OK [ 30.863168] Testing event flock_lock_inode: OK [ 30.881169] Testing event locks_remove_posix: OK [ 30.898178] Testing event fcntl_setlk: OK [ 30.916201] Testing event posix_lock_inode: OK [ 30.934155] Testing event locks_get_lock_context: OK [ 30.951169] Testing event iomap_dio_complete: OK [ 30.970111] Testing event iomap_dio_rw_begin: OK [ 30.988162] Testing event iomap_iter: OK [ 31.006103] Testing event iomap_writepage_map: OK [ 31.024078] Testing event iomap_iter_srcmap: OK [ 31.042092] Testing event iomap_iter_dstmap: OK [ 31.059222] Testing event iomap_dio_rw_queued: OK [ 31.077169] Testing event iomap_dio_invalidate_fail: OK [ 31.094117] Testing event iomap_invalidate_folio: OK [ 31.112077] Testing event iomap_release_folio: OK [ 31.129146] Testing event iomap_writepage: OK [ 31.147122] Testing event iomap_readahead: OK [ 31.165129] Testing event iomap_readpage: OK [ 31.184151] Testing event netfs_folioq: OK [ 31.201136] Testing event netfs_collect_stream: OK [ 31.218241] Testing event netfs_collect_gap: OK [ 31.237101] Testing event netfs_collect_state: OK [ 31.254136] Testing event netfs_collect_folio: OK [ 31.272135] Testing event netfs_collect_sreq: OK [ 31.289150] Testing event netfs_collect: OK [ 31.308165] Testing event netfs_write: OK [ 31.325175] Testing event netfs_write_iter: OK [ 31.343174] Testing event netfs_folio: OK [ 31.361806] Testing event netfs_sreq_ref: OK [ 31.378227] Testing event netfs_rreq_ref: OK [ 31.395239] Testing event netfs_failure: OK [ 31.413189] Testing event netfs_sreq: OK [ 31.430771] Testing event netfs_rreq: OK [ 31.452578] Testing event netfs_read: OK [ 31.470340] Testing event fscache_resize: OK [ 31.487077] Testing event fscache_invalidate: OK [ 31.504220] Testing event fscache_relinquish: OK [ 31.522146] Testing event fscache_acquire: OK [ 31.540209] Testing event fscache_access: OK [ 31.558184] Testing event fscache_access_volume: OK [ 31.575210] Testing event fscache_access_cache: OK [ 31.593140] Testing event fscache_active: OK [ 31.613288] Testing event fscache_cookie: OK [ 31.631348] Testing event fscache_volume: OK [ 31.649203] Testing event fscache_cache: OK [ 31.667219] Testing event hugetlbfs_fallocate: OK [ 31.684224] Testing event hugetlbfs_setattr: OK [ 31.701139] Testing event hugetlbfs_free_inode: OK [ 31.718106] Testing event hugetlbfs_evict_inode: OK [ 31.735098] Testing event hugetlbfs_alloc_inode: OK [ 31.753109] Testing event nfs_xdr_bad_filehandle: OK [ 31.770171] Testing event nfs_xdr_status: OK [ 31.787146] Testing event nfs_local_open_fh: OK [ 31.804172] Testing event nfs_mount_path: OK [ 31.823202] Testing event nfs_mount_option: OK [ 31.842139] Testing event nfs_mount_assign: OK [ 31.860476] Testing event nfs_fh_to_dentry: OK [ 31.878174] Testing event nfs_direct_write_reschedule_io: OK [ 31.895142] Testing event nfs_direct_write_schedule_iovec: OK [ 31.913241] Testing event nfs_direct_write_completion: OK [ 31.930151] Testing event nfs_direct_write_complete: OK [ 31.947181] Testing event nfs_direct_resched_write: OK [ 31.965103] Testing event nfs_direct_commit_complete: OK [ 31.982114] Testing event nfs_commit_done: OK [ 32.001146] Testing event nfs_initiate_commit: OK [ 32.018204] Testing event nfs_commit_error: OK [ 32.036184] Testing event nfs_comp_error: OK [ 32.053095] Testing event nfs_write_error: OK [ 32.072245] Testing event nfs_writeback_done: OK [ 32.089156] Testing event nfs_initiate_write: OK [ 32.106180] Testing event nfs_pgio_error: OK [ 32.123131] Testing event nfs_readpage_short: OK [ 32.140241] Testing event nfs_readpage_done: OK [ 32.159122] Testing event nfs_initiate_read: OK [ 32.177119] Testing event nfs_aop_readahead_done: OK [ 32.196117] Testing event nfs_aop_readahead: OK [ 32.213154] Testing event nfs_launder_folio_done: OK [ 32.230232] Testing event nfs_invalidate_folio: OK [ 32.248145] Testing event nfs_writeback_folio_done: OK [ 32.265048] Testing event nfs_writeback_folio: OK [ 32.282173] Testing event nfs_aop_readpage_done: OK [ 32.300075] Testing event nfs_aop_readpage: OK [ 32.317082] Testing event nfs_sillyrename_unlink: OK [ 32.334108] Testing event nfs_async_rename_done: OK [ 32.353157] Testing event nfs_rename_exit: OK [ 32.370119] Testing event nfs_rename_enter: OK [ 32.387135] Testing event nfs_link_exit: OK [ 32.404138] Testing event nfs_link_enter: OK [ 32.422130] Testing event nfs_symlink_exit: OK [ 32.440112] Testing event nfs_symlink_enter: OK [ 32.457279] Testing event nfs_unlink_exit: OK [ 32.476170] Testing event nfs_unlink_enter: OK [ 32.497217] Testing event nfs_remove_exit: OK [ 32.516130] Testing event nfs_remove_enter: OK [ 32.533119] Testing event nfs_rmdir_exit: OK [ 32.550127] Testing event nfs_rmdir_enter: OK [ 32.567256] Testing event nfs_mkdir_exit: OK [ 32.584112] Testing event nfs_mkdir_enter: OK [ 32.603102] Testing event nfs_mknod_exit: OK [ 32.620095] Testing event nfs_mknod_enter: OK [ 32.637144] Testing event nfs_create_exit: OK [ 32.654137] Testing event nfs_create_enter: OK [ 32.672096] Testing event nfs_atomic_open_exit: OK [ 32.690061] Testing event nfs_atomic_open_enter: OK [ 32.708151] Testing event nfs_readdir_lookup_revalidate: OK [ 32.726119] Testing event nfs_readdir_lookup_revalidate_failed: OK [ 32.743156] Testing event nfs_readdir_lookup: OK [ 32.760093] Testing event nfs_lookup_revalidate_exit: OK [ 32.777163] Testing event nfs_lookup_revalidate_enter: OK [ 32.794135] Testing event nfs_lookup_exit: OK [ 32.811153] Testing event nfs_lookup_enter: OK [ 32.829136] Testing event nfs_readdir_uncached: OK [ 32.846212] Testing event nfs_readdir_cache_fill: OK [ 32.865111] Testing event nfs_readdir_invalidate_cache_range: OK [ 32.882150] Testing event nfs_size_grow: OK [ 32.899231] Testing event nfs_size_update: OK [ 32.918161] Testing event nfs_size_wcc: OK [ 32.936332] Testing event nfs_size_truncate: OK [ 32.954095] Testing event nfs_access_exit: OK [ 32.971103] Testing event nfs_readdir_uncached_done: OK [ 32.988149] Testing event nfs_readdir_cache_fill_done: OK [ 33.005104] Testing event nfs_readdir_force_readdirplus: OK [ 33.022159] Testing event nfs_set_cache_invalid: OK [ 33.039210] Testing event nfs_access_enter: OK [ 33.057166] Testing event nfs_fsync_exit: OK [ 33.074086] Testing event nfs_fsync_enter: OK [ 33.091099] Testing event nfs_writeback_inode_exit: OK [ 33.108251] Testing event nfs_writeback_inode_enter: OK [ 33.125133] Testing event nfs_setattr_exit: OK [ 33.143133] Testing event nfs_setattr_enter: OK [ 33.160146] Testing event nfs_getattr_exit: OK [ 33.177150] Testing event nfs_getattr_enter: OK [ 33.195123] Testing event nfs_invalidate_mapping_exit: OK [ 33.213223] Testing event nfs_invalidate_mapping_enter: OK [ 33.231178] Testing event nfs_revalidate_inode_exit: OK [ 33.248116] Testing event nfs_revalidate_inode_enter: OK [ 33.265168] Testing event nfs_refresh_inode_exit: OK [ 33.282074] Testing event nfs_refresh_inode_enter: OK [ 33.299157] Testing event nfs_set_inode_stale: OK [ 33.318088] Testing event nlmclnt_grant: OK [ 33.336126] Testing event nlmclnt_unlock: OK [ 33.353107] Testing event nlmclnt_lock: OK [ 33.370299] Testing event nlmclnt_test: OK [ 33.387163] Testing event mon_llc_occupancy_limbo: OK [ 33.404162] Testing event cap_capable: OK [ 33.421281] Testing event selinux_audited: OK [ 33.439111] Testing event block_rq_remap: OK [ 33.456128] Testing event block_bio_remap: OK [ 33.473120] Testing event block_split: OK [ 33.491203] Testing event block_unplug: OK [ 33.509088] Testing event block_plug: OK [ 33.526094] Testing event block_getrq: OK [ 33.543114] Testing event block_bio_queue: OK [ 33.561141] Testing event block_bio_frontmerge: OK [ 33.581114] Testing event block_bio_backmerge: OK [ 33.599184] Testing event block_bio_complete: OK [ 33.617106] Testing event block_io_done: OK [ 33.635098] Testing event block_io_start: OK [ 33.653267] Testing event block_rq_merge: OK [ 33.670138] Testing event block_rq_issue: OK [ 33.687201] Testing event block_rq_insert: OK [ 33.706310] Testing event block_rq_error: OK [ 33.723066] Testing event block_rq_complete: OK [ 33.742098] Testing event block_rq_requeue: OK [ 33.760109] Testing event block_dirty_buffer: OK [ 33.778241] Testing event block_touch_buffer: OK [ 33.797143] Testing event kyber_throttled: OK [ 33.815151] Testing event kyber_adjust: OK [ 33.833155] Testing event kyber_latency: OK [ 33.850547] Testing event wbt_timer: OK [ 33.867123] Testing event wbt_step: OK [ 33.884070] Testing event wbt_lat: OK [ 33.901197] Testing event wbt_stat: OK [ 33.919157] Testing event io_uring_local_work_run: OK [ 33.937079] Testing event io_uring_short_write: OK [ 33.954173] Testing event io_uring_task_work_run: OK [ 33.972052] Testing event io_uring_cqe_overflow: OK [ 33.990077] Testing event io_uring_req_failed: OK [ 34.007139] Testing event io_uring_task_add: OK [ 34.025125] Testing event io_uring_poll_arm: OK [ 34.042160] Testing event io_uring_submit_req: OK [ 34.061164] Testing event io_uring_complete: OK [ 34.079170] Testing event io_uring_fail_link: OK [ 34.096116] Testing event io_uring_cqring_wait: OK [ 34.113117] Testing event io_uring_link: OK [ 34.131127] Testing event io_uring_defer: OK [ 34.149152] Testing event io_uring_queue_async_work: OK [ 34.167149] Testing event io_uring_file_get: OK [ 34.185158] Testing event io_uring_register: OK [ 34.204044] Testing event io_uring_create: OK [ 34.223223] Testing event rdpmc: OK [ 34.240175] Testing event write_msr: OK [ 34.260482] Testing event read_msr: OK [ 34.280255] Testing event gpio_value: OK [ 34.298103] Testing event gpio_direction: OK [ 34.315200] Testing event pwm_get: OK [ 34.333115] Testing event pwm_apply: OK [ 34.350086] Testing event pwm_write_waveform: OK [ 34.369082] Testing event pwm_read_waveform: OK [ 34.386152] Testing event pwm_round_waveform_fromhw: OK [ 34.403117] Testing event pwm_round_waveform_tohw: OK [ 34.420140] Testing event clk_rate_request_done: OK [ 34.437213] Testing event clk_rate_request_start: OK [ 34.455259] Testing event clk_set_duty_cycle_complete: OK [ 34.473132] Testing event clk_set_duty_cycle: OK [ 34.491062] Testing event clk_set_phase_complete: OK [ 34.509227] Testing event clk_set_phase: OK [ 34.526133] Testing event clk_set_parent_complete: OK [ 34.543129] Testing event clk_set_parent: OK [ 34.560103] Testing event clk_set_rate_range: OK [ 34.577131] Testing event clk_set_max_rate: OK [ 34.594055] Testing event clk_set_min_rate: OK [ 34.612142] Testing event clk_set_rate_complete: OK [ 34.630095] Testing event clk_set_rate: OK [ 34.647143] Testing event clk_unprepare_complete: OK [ 34.665190] Testing event clk_unprepare: OK [ 34.683232] Testing event clk_prepare_complete: OK [ 34.701191] Testing event clk_prepare: OK [ 34.720201] Testing event clk_disable_complete: OK [ 34.739200] Testing event clk_disable: OK [ 34.756212] Testing event clk_enable_complete: OK [ 34.773141] Testing event clk_enable: OK [ 34.790226] Testing event cache_tag_flush_range_np: OK [ 34.810160] Testing event cache_tag_flush_range: OK [ 34.827168] Testing event cache_tag_flush_all: OK [ 34.844134] Testing event cache_tag_unassign: OK [ 34.862138] Testing event cache_tag_assign: OK [ 34.879149] Testing event prq_report: OK [ 34.896136] Testing event qi_submit: OK [ 34.914109] Testing event io_page_fault: OK [ 34.931241] Testing event unmap: OK [ 34.949115] Testing event map: OK [ 34.966194] Testing event attach_device_to_domain: OK [ 34.983134] Testing event remove_device_from_group: OK [ 35.000148] Testing event add_device_to_group: OK [ 35.017109] Testing event regcache_drop_region: OK [ 35.035142] Testing event regmap_async_complete_done: OK [ 35.052219] Testing event regmap_async_complete_start: OK [ 35.069111] Testing event regmap_async_io_complete: OK [ 35.086233] Testing event regmap_async_write_start: OK [ 35.104077] Testing event regmap_cache_bypass: OK [ 35.122114] Testing event regmap_cache_only: OK [ 35.140159] Testing event regcache_sync: OK [ 35.159154] Testing event regmap_hw_write_done: OK [ 35.176201] Testing event regmap_hw_write_start: OK [ 35.194190] Testing event regmap_hw_read_done: OK [ 35.211104] Testing event regmap_hw_read_start: OK [ 35.229137] Testing event regmap_bulk_read: OK [ 35.246115] Testing event regmap_bulk_write: OK [ 35.263151] Testing event regmap_reg_read_cache: OK [ 35.281148] Testing event regmap_reg_read: OK [ 35.298215] Testing event regmap_reg_write: OK [ 35.316134] Testing event devres_log: OK [ 35.334172] Testing event dma_fence_wait_end: OK [ 35.351206] Testing event dma_fence_wait_start: OK [ 35.368166] Testing event dma_fence_signaled: OK [ 35.385110] Testing event dma_fence_enable_signal: OK [ 35.404128] Testing event dma_fence_destroy: OK [ 35.422154] Testing event dma_fence_init: OK [ 35.440126] Testing event dma_fence_emit: OK [ 35.457140] Testing event scsi_eh_wakeup: OK [ 35.475221] Testing event scsi_dispatch_cmd_timeout: OK [ 35.492158] Testing event scsi_dispatch_cmd_done: OK [ 35.509098] Testing event scsi_dispatch_cmd_error: OK [ 35.526060] Testing event scsi_dispatch_cmd_start: OK [ 35.543125] Testing event spi_transfer_stop: OK [ 35.560142] Testing event spi_transfer_start: OK [ 35.577171] Testing event spi_message_done: OK [ 35.595236] Testing event spi_message_start: OK [ 35.615124] Testing event spi_message_submit: OK [ 35.633149] Testing event spi_set_cs: OK [ 35.650311] Testing event spi_setup: OK [ 35.668163] Testing event spi_controller_busy: OK [ 35.686250] Testing event spi_controller_idle: OK [ 35.703202] Testing event mdio_access: OK [ 35.720319] Testing event e1000e_trace_mac_register: OK [ 35.738158] Testing event i40e_xmit_frame_ring_drop: OK [ 35.756142] Testing event i40e_xmit_frame_ring: OK [ 35.773147] Testing event i40e_clean_rx_irq_rx: OK [ 35.790242] Testing event i40e_clean_rx_irq: OK [ 35.809079] Testing event i40e_clean_tx_irq_unmap: OK [ 35.826154] Testing event i40e_clean_tx_irq: OK [ 35.844232] Testing event i40e_napi_poll: OK [ 35.863123] Testing event xhci_dbc_giveback_request: OK [ 35.882067] Testing event xhci_dbc_queue_request: OK [ 35.900083] Testing event xhci_dbc_free_request: OK [ 35.919110] Testing event xhci_dbc_alloc_request: OK [ 35.936189] Testing event xhci_ring_host_doorbell: OK [ 35.953200] Testing event xhci_ring_ep_doorbell: OK [ 35.970209] Testing event xhci_hub_status_data: OK [ 35.989198] Testing event xhci_get_port_status: OK [ 36.008240] Testing event xhci_handle_port_status: OK [ 36.025224] Testing event xhci_inc_deq: OK [ 36.042167] Testing event xhci_inc_enq: OK [ 36.060071] Testing event xhci_ring_expansion: OK [ 36.077163] Testing event xhci_ring_free: OK [ 36.094130] Testing event xhci_ring_alloc: OK [ 36.111093] Testing event xhci_configure_endpoint_ctrl_ctx: OK [ 36.128284] Testing event xhci_address_ctrl_ctx: OK [ 36.146142] Testing event xhci_configure_endpoint: OK [ 36.164065] Testing event xhci_handle_cmd_set_deq: OK [ 36.182171] Testing event xhci_handle_cmd_reset_dev: OK [ 36.201313] Testing event xhci_handle_cmd_addr_dev: OK [ 36.219110] Testing event xhci_setup_device_slot: OK [ 36.237108] Testing event xhci_discover_or_reset_device: OK [ 36.254233] Testing event xhci_handle_cmd_disable_slot: OK [ 36.271164] Testing event xhci_free_dev: OK [ 36.288128] Testing event xhci_alloc_dev: OK [ 36.305145] Testing event xhci_add_endpoint: OK [ 36.323189] Testing event xhci_handle_cmd_config_ep: OK [ 36.341108] Testing event xhci_handle_cmd_reset_ep: OK [ 36.358172] Testing event xhci_handle_cmd_set_deq_ep: OK [ 36.375169] Testing event xhci_handle_cmd_stop_ep: OK [ 36.392143] Testing event xhci_handle_cmd_set_deq_stream: OK [ 36.409138] Testing event xhci_alloc_stream_info_ctx: OK [ 36.428128] Testing event xhci_urb_dequeue: OK [ 36.446075] Testing event xhci_urb_giveback: OK [ 36.463095] Testing event xhci_urb_enqueue: OK [ 36.480167] Testing event xhci_stop_device: OK [ 36.498118] Testing event xhci_setup_addressable_virt_device: OK [ 36.515164] Testing event xhci_setup_device: OK [ 36.532142] Testing event xhci_alloc_virt_device: OK [ 36.550138] Testing event xhci_free_virt_device: OK [ 36.567146] Testing event xhci_dbc_gadget_ep_queue: OK [ 36.584212] Testing event xhci_dbc_handle_transfer: OK [ 36.602126] Testing event xhci_dbc_handle_event: OK [ 36.619133] Testing event xhci_queue_trb: OK [ 36.637146] Testing event xhci_handle_transfer: OK [ 36.654136] Testing event xhci_handle_command: OK [ 36.672130] Testing event xhci_handle_event: OK [ 36.689150] Testing event xhci_address_ctx: OK [ 36.707184] Testing event xhci_dbg_ring_expansion: OK [ 36.724110] Testing event xhci_dbg_init: OK [ 36.742128] Testing event xhci_dbg_cancel_urb: OK [ 36.760163] Testing event xhci_dbg_reset_ep: OK [ 36.778110] Testing event xhci_dbg_quirks: OK [ 36.796156] Testing event xhci_dbg_context_change: OK [ 36.813137] Testing event xhci_dbg_address: OK [ 36.831127] Testing event ucsi_register_altmode: OK [ 36.848184] Testing event ucsi_register_port: OK [ 36.865112] Testing event ucsi_connector_change: OK [ 36.883203] Testing event ucsi_reset_ppm: OK [ 36.900056] Testing event ucsi_run_command: OK [ 36.917096] Testing event rtc_timer_fired: OK [ 36.935152] Testing event rtc_timer_dequeue: OK [ 36.952291] Testing event rtc_timer_enqueue: OK [ 36.970156] Testing event rtc_read_offset: OK [ 36.987178] Testing event rtc_set_offset: OK [ 37.004141] Testing event rtc_alarm_irq_enable: OK [ 37.021603] Testing event rtc_irq_set_state: OK [ 37.038181] Testing event rtc_irq_set_freq: OK [ 37.056267] Testing event rtc_read_alarm: OK [ 37.073104] Testing event rtc_set_alarm: OK [ 37.090263] Testing event rtc_read_time: OK [ 37.108196] Testing event rtc_set_time: OK [ 37.125103] Testing event i2c_result: OK [ 37.142108] Testing event i2c_reply: OK [ 37.161140] Testing event i2c_read: OK [ 37.178191] Testing event i2c_write: OK [ 37.196304] Testing event smbus_result: OK [ 37.214093] Testing event smbus_reply: OK [ 37.232118] Testing event smbus_read: OK [ 37.250092] Testing event smbus_write: OK [ 37.267127] Testing event hwmon_attr_show_string: OK [ 37.284043] Testing event hwmon_attr_store: OK [ 37.302191] Testing event hwmon_attr_show: OK [ 37.319150] Testing event thermal_zone_trip: OK [ 37.337137] Testing event cdev_update: OK [ 37.354106] Testing event thermal_temperature: OK [ 37.371092] Testing event watchdog_set_timeout: OK [ 37.388170] Testing event watchdog_stop: OK [ 37.406141] Testing event watchdog_ping: OK [ 37.423141] Testing event watchdog_start: OK [ 37.442110] Testing event amd_pstate_epp_perf: OK [ 37.459218] Testing event amd_pstate_perf: OK [ 37.476182] Testing event tsm_mr_write: OK [ 37.494237] Testing event tsm_mr_refresh: OK [ 37.511145] Testing event tsm_mr_read: OK [ 37.528167] Testing event memory_failure_event: OK [ 37.546137] Testing event aer_event: OK [ 37.563121] Testing event non_standard_event: OK [ 37.583225] Testing event arm_event: OK [ 37.602178] Testing event mc_event: OK [ 37.619262] Testing event extlog_mem_event: OK [ 37.636124] Testing event tb_rx: OK [ 37.654138] Testing event tb_event: OK [ 37.671149] Testing event tb_tx: OK [ 37.688163] Testing event neigh_cleanup_and_release: OK [ 37.706194] Testing event neigh_event_send_dead: OK [ 37.723188] Testing event neigh_event_send_done: OK [ 37.740278] Testing event neigh_timer_handler: OK [ 37.758106] Testing event neigh_update_done: OK [ 37.775061] Testing event neigh_update: OK [ 37.792073] Testing event neigh_create: OK [ 37.811168] Testing event page_pool_update_nid: OK [ 37.828122] Testing event page_pool_state_hold: OK [ 37.845284] Testing event page_pool_state_release: OK [ 37.864118] Testing event page_pool_release: OK [ 37.881130] Testing event br_mdb_full: OK [ 37.898119] Testing event br_fdb_update: OK [ 37.917133] Testing event fdb_delete: OK [ 37.934121] Testing event br_fdb_external_learn_add: OK [ 37.952094] Testing event br_fdb_add: OK [ 37.969038] Testing event qdisc_create: OK [ 37.987133] Testing event qdisc_destroy: OK [ 38.004147] Testing event qdisc_reset: OK [ 38.021081] Testing event qdisc_enqueue: OK [ 38.038193] Testing event qdisc_dequeue: OK [ 38.055244] Testing event fib_table_lookup: OK [ 38.073222] Testing event tcp_ao_rcv_sne_update: OK [ 38.091086] Testing event tcp_ao_snd_sne_update: OK [ 38.108060] Testing event tcp_ao_synack_no_key: OK [ 38.126158] Testing event tcp_ao_rnext_request: OK [ 38.143079] Testing event tcp_ao_key_not_found: OK [ 38.160063] Testing event tcp_ao_mismatch: OK [ 38.179097] Testing event tcp_ao_wrong_maclen: OK [ 38.196094] Testing event tcp_ao_handshake_failure: OK [ 38.214146] Testing event tcp_hash_ao_required: OK [ 38.233141] Testing event tcp_hash_md5_mismatch: OK [ 38.251158] Testing event tcp_hash_md5_unexpected: OK [ 38.268116] Testing event tcp_hash_md5_required: OK [ 38.286306] Testing event tcp_hash_bad_header: OK [ 38.306214] Testing event tcp_cong_state_set: OK [ 38.324312] Testing event tcp_bad_csum: OK [ 38.341198] Testing event tcp_probe: OK [ 38.358113] Testing event tcp_sendmsg_locked: OK [ 38.377135] Testing event tcp_retransmit_synack: OK [ 38.396118] Testing event tcp_rcvbuf_grow: OK [ 38.414151] Testing event tcp_rcv_space_adjust: OK [ 38.432166] Testing event tcp_destroy_sock: OK [ 38.450124] Testing event tcp_receive_reset: OK [ 38.468146] Testing event tcp_send_reset: OK [ 38.486175] Testing event tcp_retransmit_skb: OK [ 38.505159] Testing event udp_fail_queue_rcv_skb: OK [ 38.524154] Testing event sock_recv_length: OK [ 38.542183] Testing event sock_send_length: OK [ 38.559282] Testing event sk_data_ready: OK [ 38.577283] Testing event inet_sk_error_report: OK [ 38.594311] Testing event inet_sock_set_state: OK [ 38.612183] Testing event sock_exceed_buf_limit: OK [ 38.630220] Testing event sock_rcvqueue_full: OK [ 38.648110] Testing event dql_stall_detected: OK [ 38.666139] Testing event napi_poll: OK [ 38.684224] Testing event netif_receive_skb_list_exit: OK [ 38.702178] Testing event netif_rx_exit: OK [ 38.719116] Testing event netif_receive_skb_exit: OK [ 38.737278] Testing event napi_gro_receive_exit: OK [ 38.755174] Testing event napi_gro_frags_exit: OK [ 38.772089] Testing event netif_rx_entry: OK [ 38.789168] Testing event netif_receive_skb_list_entry: OK [ 38.807257] Testing event netif_receive_skb_entry: OK [ 38.827109] Testing event napi_gro_receive_entry: OK [ 38.845122] Testing event napi_gro_frags_entry: OK [ 38.863179] Testing event netif_rx: OK [ 38.882095] Testing event netif_receive_skb: OK [ 38.900136] Testing event net_dev_queue: OK [ 38.917162] Testing event net_dev_xmit_timeout: OK [ 38.934114] Testing event net_dev_xmit: OK [ 38.952153] Testing event net_dev_start_xmit: OK [ 38.969186] Testing event skb_copy_datagram_iovec: OK [ 38.987148] Testing event consume_skb: OK [ 39.004253] Testing event kfree_skb: OK [ 39.022102] Testing event netlink_extack: OK [ 39.039097] Testing event bpf_test_finish: OK [ 39.057149] Testing event bpf_trigger_tp: OK [ 39.076140] Testing event icmp_send: OK [ 39.094164] Testing event fib6_table_lookup: OK [ 39.113170] Testing event devlink_trap_report: OK [ 39.130162] Testing event devlink_health_reporter_state_update: OK [ 39.149221] Testing event devlink_health_recover_aborted: OK [ 39.168228] Testing event devlink_health_report: OK [ 39.186168] Testing event devlink_hwerr: OK [ 39.204081] Testing event devlink_hwmsg: OK [ 39.222186] Testing event svc_unregister: OK [ 39.240083] Testing event svc_noregister: OK [ 39.257116] Testing event svc_register: OK [ 39.275146] Testing event cache_entry_no_listener: OK [ 39.292127] Testing event cache_entry_make_negative: OK [ 39.309179] Testing event cache_entry_update: OK [ 39.328361] Testing event cache_entry_upcall: OK [ 39.346216] Testing event cache_entry_expired: OK [ 39.365103] Testing event svcsock_getpeername_err: OK [ 39.382270] Testing event svcsock_accept_err: OK [ 39.399133] Testing event svcsock_tcp_state: OK [ 39.416154] Testing event svcsock_tcp_recv_short: OK [ 39.433149] Testing event svcsock_write_space: OK [ 39.450225] Testing event svcsock_data_ready: OK [ 39.468154] Testing event svcsock_tcp_recv_err: OK [ 39.485150] Testing event svcsock_tcp_recv_eagain: OK [ 39.502167] Testing event svcsock_tcp_recv: OK [ 39.520175] Testing event svcsock_tcp_send: OK [ 39.537186] Testing event svcsock_udp_recv_err: OK [ 39.554197] Testing event svcsock_udp_recv: OK [ 39.571170] Testing event svcsock_udp_send: OK [ 39.589136] Testing event svcsock_marker: OK [ 39.607154] Testing event svcsock_free: OK [ 39.625095] Testing event svcsock_new: OK [ 39.642171] Testing event svc_defer_recv: OK [ 39.659293] Testing event svc_defer_queue: OK [ 39.677117] Testing event svc_defer_drop: OK [ 39.696282] Testing event svc_alloc_arg_err: OK [ 39.713156] Testing event svc_wake_up: OK [ 39.731093] Testing event svc_xprt_accept: OK [ 39.749126] Testing event svc_tls_timed_out: OK [ 39.769134] Testing event svc_tls_not_started: OK [ 39.788180] Testing event svc_tls_unavailable: OK [ 39.805178] Testing event svc_tls_upcall: OK [ 39.822234] Testing event svc_tls_start: OK [ 39.842137] Testing event svc_xprt_free: OK [ 39.860197] Testing event svc_xprt_detach: OK [ 39.878208] Testing event svc_xprt_close: OK [ 39.896118] Testing event svc_xprt_no_write_space: OK [ 39.914170] Testing event svc_xprt_dequeue: OK [ 39.931153] Testing event svc_xprt_enqueue: OK [ 39.949181] Testing event svc_xprt_create_err: OK [ 39.966095] Testing event svc_stats_latency: OK [ 39.984133] Testing event svc_replace_page_err: OK [ 40.002128] Testing event svc_send: OK [ 40.021225] Testing event svc_drop: OK [ 40.039141] Testing event svc_defer: OK [ 40.057084] Testing event svc_process: OK [ 40.077157] Testing event svc_authenticate: OK [ 40.095174] Testing event svc_xdr_sendto: OK [ 40.113186] Testing event svc_xdr_recvfrom: OK [ 40.133295] Testing event rpc_tls_not_started: OK [ 40.153258] Testing event rpc_tls_unavailable: OK [ 40.170160] Testing event rpcb_unregister: OK [ 40.189238] Testing event rpcb_register: OK [ 40.206368] Testing event pmap_register: OK [ 40.224632] Testing event rpcb_setport: OK [ 40.241107] Testing event rpcb_getport: OK [ 40.258184] Testing event xs_stream_read_request: OK [ 40.275153] Testing event xs_stream_read_data: OK [ 40.293164] Testing event xs_data_ready: OK [ 40.310102] Testing event xprt_reserve: OK [ 40.327140] Testing event xprt_put_cong: OK [ 40.344113] Testing event xprt_get_cong: OK [ 40.362155] Testing event xprt_release_cong: OK [ 40.379147] Testing event xprt_reserve_cong: OK [ 40.397158] Testing event xprt_release_xprt: OK [ 40.415193] Testing event xprt_reserve_xprt: OK [ 40.432209] Testing event xprt_ping: OK [ 40.450161] Testing event xprt_retransmit: OK [ 40.467205] Testing event xprt_transmit: OK [ 40.486066] Testing event xprt_lookup_rqst: OK [ 40.504260] Testing event xprt_timer: OK [ 40.522207] Testing event xprt_destroy: OK [ 40.539130] Testing event xprt_disconnect_force: OK [ 40.557138] Testing event xprt_disconnect_done: OK [ 40.574136] Testing event xprt_disconnect_auto: OK [ 40.592167] Testing event xprt_connect: OK [ 40.610113] Testing event xprt_create: OK [ 40.628099] Testing event rpc_socket_nospace: OK [ 40.646170] Testing event rpc_socket_shutdown: OK [ 40.663162] Testing event rpc_socket_close: OK [ 40.681228] Testing event rpc_socket_reset_connection: OK [ 40.699184] Testing event rpc_socket_error: OK [ 40.718117] Testing event rpc_socket_connect: OK [ 40.738289] Testing event rpc_socket_state_change: OK [ 40.758208] Testing event rpc_xdr_alignment: OK [ 40.775175] Testing event rpc_xdr_overflow: OK [ 40.793253] Testing event rpc_stats_latency: OK [ 40.811119] Testing event rpc_call_rpcerror: OK [ 40.829337] Testing event rpc_buf_alloc: OK [ 40.849194] Testing event rpcb_unrecognized_err: OK [ 40.869160] Testing event rpcb_unreachable_err: OK [ 40.886123] Testing event rpcb_bind_version_err: OK [ 40.903237] Testing event rpcb_timeout_err: OK [ 40.920105] Testing event rpcb_prog_unavail_err: OK [ 40.937163] Testing event rpc__auth_tooweak: OK [ 40.955157] Testing event rpc__bad_creds: OK [ 40.973168] Testing event rpc__stale_creds: OK [ 40.990263] Testing event rpc__mismatch: OK [ 41.008285] Testing event rpc__unparsable: OK [ 41.026325] Testing event rpc__garbage_args: OK [ 41.045202] Testing event rpc__proc_unavail: OK [ 41.064189] Testing event rpc__prog_mismatch: OK [ 41.081196] Testing event rpc__prog_unavail: OK [ 41.098221] Testing event rpc_bad_verifier: OK [ 41.116150] Testing event rpc_bad_callhdr: OK [ 41.133152] Testing event rpc_task_wakeup: OK [ 41.150125] Testing event rpc_task_sleep: OK [ 41.168168] Testing event rpc_task_call_done: OK [ 41.185217] Testing event rpc_task_end: OK [ 41.202136] Testing event rpc_task_signalled: OK [ 41.220142] Testing event rpc_task_timeout: OK [ 41.237109] Testing event rpc_task_complete: OK [ 41.254110] Testing event rpc_task_sync_wake: OK [ 41.272062] Testing event rpc_task_sync_sleep: OK [ 41.289245] Testing event rpc_task_run_action: OK [ 41.307201] Testing event rpc_task_begin: OK [ 41.326148] Testing event rpc_request: OK [ 41.343168] Testing event rpc_refresh_status: OK [ 41.360177] Testing event rpc_retry_refresh_status: OK [ 41.378101] Testing event rpc_timeout_status: OK [ 41.395176] Testing event rpc_connect_status: OK [ 41.412080] Testing event rpc_call_status: OK [ 41.430131] Testing event rpc_clnt_clone_err: OK [ 41.447183] Testing event rpc_clnt_new_err: OK [ 41.464341] Testing event rpc_clnt_new: OK [ 41.481058] Testing event rpc_clnt_replace_xprt_err: OK [ 41.499155] Testing event rpc_clnt_replace_xprt: OK [ 41.516138] Testing event rpc_clnt_release: OK [ 41.534171] Testing event rpc_clnt_shutdown: OK [ 41.551211] Testing event rpc_clnt_killall: OK [ 41.568118] Testing event rpc_clnt_free: OK [ 41.588094] Testing event rpc_xdr_reply_pages: OK [ 41.605173] Testing event rpc_xdr_recvfrom: OK [ 41.623164] Testing event rpc_xdr_sendto: OK [ 41.641153] Testing event 9p_fid_ref: OK [ 41.659554] Testing event 9p_protocol_dump: OK [ 41.676553] Testing event 9p_client_res: OK [ 41.694097] Testing event 9p_client_req: OK [ 41.712153] Testing event subflow_check_data_avail: OK [ 41.730219] Testing event ack_update_msk: OK [ 41.748127] Testing event get_mapping_status: OK [ 41.765155] Testing event mptcp_sendmsg_frag: OK [ 41.782181] Testing event mptcp_subflow_get_send: OK [ 41.800147] Testing event mctp_key_release: OK [ 41.818174] Testing event mctp_key_acquire: OK [ 41.835162] Testing event tls_alert_recv: OK [ 41.852132] Testing event tls_alert_send: OK [ 41.870123] Testing event tls_contenttype: OK [ 41.887138] Testing event handshake_cmd_done_err: OK [ 41.906174] Testing event handshake_cmd_done: OK [ 41.924111] Testing event handshake_cmd_accept_err: OK [ 41.941198] Testing event handshake_cmd_accept: OK [ 41.959198] Testing event handshake_notify_err: OK [ 41.976146] Testing event handshake_complete: OK [ 41.994142] Testing event handshake_destruct: OK [ 42.012214] Testing event handshake_cancel_busy: OK [ 42.030271] Testing event handshake_cancel_none: OK [ 42.048158] Testing event handshake_cancel: OK [ 42.065087] Testing event handshake_submit_err: OK [ 42.082225] Testing event handshake_submit: OK [ 42.100155] Testing event ma_write: OK [ 42.119297] Testing event ma_read: OK [ 42.136184] Testing event ma_op: OK [ 42.154176] Running tests on trace event systems: [ 42.154319] Testing event system maple_tree: OK [ 42.173614] Testing event system handshake: OK [ 42.192820] Testing event system mctp: OK [ 42.212282] Testing event system mptcp: OK [ 42.230412] Testing event system 9p: OK [ 42.249017] Testing event system sunrpc: OK [ 42.277139] Testing event system devlink: OK [ 42.297607] Testing event system fib6: OK [ 42.314113] Testing event system icmp: OK [ 42.331101] Testing event system bpf_test_run: OK [ 42.349247] Testing event system netlink: OK [ 42.366156] Testing event system skb: OK [ 42.383417] Testing event system net: OK [ 42.401909] Testing event system napi: OK [ 42.419233] Testing event system sock: OK [ 42.436736] Testing event system udp: OK [ 42.454105] Testing event system tcp: OK [ 42.474120] Testing event system fib: OK [ 42.492124] Testing event system qdisc: OK [ 42.509392] Testing event system bridge: OK [ 42.526232] Testing event system page_pool: OK [ 42.544377] Testing event system neigh: OK [ 42.562497] Testing event system thunderbolt: OK [ 42.580351] Testing event system ras: OK [ 42.597491] Testing event system tsm_mr: OK [ 42.615277] Testing event system amd_cpu: OK [ 42.633356] Testing event system watchdog: OK [ 42.651393] Testing event system thermal: OK [ 42.671276] Testing event system hwmon: OK [ 42.688259] Testing event system smbus: OK [ 42.706457] Testing event system i2c: OK [ 42.723355] Testing event system rtc: OK [ 42.740782] Testing event system ucsi: OK [ 42.757482] Testing event system xhci-hcd: OK [ 42.779713] Testing event system i40e: OK [ 42.796529] Testing event system e1000e_trace: OK [ 42.814180] Testing event system mdio: OK [ 42.832193] Testing event system spi: OK [ 42.851762] Testing event system scsi: OK [ 42.868492] Testing event system dma_fence: OK [ 42.886548] Testing event system dev: OK [ 42.904202] Testing event system regmap: OK [ 42.924186] Testing event system iommu: OK [ 42.942410] Testing event system intel_iommu: OK [ 42.960517] Testing event system clk: OK [ 42.983409] Testing event system pwm: OK [ 43.001516] Testing event system gpio: OK [ 43.019382] Testing event system msr: OK [ 43.041742] Testing event system io_uring: OK [ 43.063043] Testing event system wbt: OK [ 43.081432] Testing event system kyber: OK [ 43.098242] Testing event system block: OK [ 43.117291] Testing event system avc: OK [ 43.138163] Testing event system capability: OK [ 43.159195] Testing event system lockd: OK [ 43.176500] Testing event system nfs: OK [ 43.202357] Testing event system hugetlbfs: OK [ 43.220629] Testing event system fscache: OK [ 43.240228] Testing event system netfs: OK [ 43.263061] Testing event system iomap: OK [ 43.281866] Testing event system filelock: OK [ 43.300768] Testing event system fs_dax: OK [ 43.319772] Testing event system writeback: OK [ 43.342541] Testing event system timestamp: OK [ 43.360347] Testing event system damon: OK [ 43.378259] Testing event system cma: OK [ 43.396447] Testing event system page_isolation: OK [ 43.413261] Testing event system memcg: OK [ 43.431451] Testing event system huge_memory: OK [ 43.449531] Testing event system thp: OK [ 43.467737] Testing event system ksm: OK [ 43.486540] Testing event system vmalloc: OK [ 43.504262] Testing event system tlb: OK [ 43.524285] Testing event system migrate: OK [ 43.541357] Testing event system mmap: OK [ 43.559292] Testing event system mmap_lock: OK [ 43.579889] Testing event system compaction: OK [ 43.601871] Testing event system kmem: OK [ 43.621511] Testing event system percpu: OK [ 43.641444] Testing event system vmscan: OK [ 43.661131] Testing event system pagemap: OK [ 43.679252] Testing event system oom: OK [ 43.696621] Testing event system filemap: OK [ 43.714582] Testing event system rseq: OK [ 43.732293] Testing event system context_tracking: OK [ 43.751205] Testing event system xdp: OK [ 43.769870] Testing event system rv: OK [ 43.786179] Testing event system rpm: OK [ 43.807608] Testing event system power: OK [ 43.830550] Testing event system error_report: OK [ 43.849153] Testing event system bpf_trace: OK [ 43.867195] Testing event system test: OK [ 43.885085] Testing event system osnoise: OK [ 43.903514] Testing event system cgroup: OK [ 43.923307] Testing event system csd: OK [ 43.943832] Testing event system timer_migration: OK [ 43.961853] Testing event system alarmtimer: OK [ 43.978353] Testing event system timer: OK [ 43.998135] Testing event system module: OK [ 44.017492] Testing event system raw_syscalls: OK [ 44.035251] Testing event system swiotlb: OK [ 44.052230] Testing event system dma: OK [ 44.072079] Testing event system rcu: OK [ 44.090440] Testing event system irq_matrix: OK [ 44.109826] Testing event system printk: OK [ 44.131149] Testing event system lock: OK [ 44.149875] Testing event system sched: OK [ 44.169759] Testing event system ipi: OK [ 44.186389] Testing event system notifier: OK [ 44.203271] Testing event system workqueue: OK [ 44.222536] Testing event system signal: OK [ 44.240388] Testing event system irq: OK [ 44.257628] Testing event system cpuhp: OK [ 44.275408] Testing event system task: OK [ 44.292351] Testing event system exceptions: OK [ 44.310202] Testing event system resctrl: OK [ 44.328457] Testing event system mce: OK [ 44.346158] Testing event system x86_fpu: OK [ 44.364550] Testing event system nmi: OK [ 44.382207] Testing event system irq_vectors: OK [ 44.402947] Testing event system syscalls: OK [ 44.420287] Testing event system hyperv: OK [ 44.439589] Testing event system xen: OK [ 44.456609] Testing event system vsyscall: OK [ 44.474158] Testing event system initcall: OK [ 44.492509] Running tests on all trace events: [ 44.492649] Testing all events: OK [ 45.659140] Running tests again, along with the function tracer [ 45.659661] Running tests on trace events: [ 45.660031] Testing event initcall_finish: OK [ 45.682556] Testing event initcall_start: OK [ 45.704567] Testing event initcall_level: OK [ 45.727658] Testing event emulate_vsyscall: OK [ 45.749463] Testing event xen_cpu_set_ldt: OK [ 45.771023] Testing event xen_cpu_write_gdt_entry: OK [ 45.794131] Testing event xen_cpu_load_idt: OK [ 45.816204] Testing event xen_cpu_write_idt_entry: OK [ 45.837119] Testing event xen_cpu_write_ldt_entry: OK [ 45.858266] Testing event xen_mmu_write_cr3: OK [ 45.880098] Testing event xen_mmu_flush_tlb_multi: OK [ 45.902226] Testing event xen_mmu_flush_tlb_one_user: OK [ 45.924247] Testing event xen_mmu_pgd_unpin: OK [ 45.946299] Testing event xen_mmu_pgd_pin: OK [ 45.967231] Testing event xen_mmu_release_ptpage: OK [ 45.988209] Testing event xen_mmu_alloc_ptpage: OK [ 46.010199] Testing event xen_mmu_ptep_modify_prot_commit: OK [ 46.031203] Testing event xen_mmu_ptep_modify_prot_start: OK [ 46.052239] Testing event xen_mmu_set_p4d: OK [ 46.074173] Testing event xen_mmu_set_pud: OK [ 46.097069] Testing event xen_mmu_set_pmd: OK [ 46.118069] Testing event xen_mmu_set_pte: OK [ 46.139229] Testing event xen_mc_extend_args: OK [ 46.160243] Testing event xen_mc_flush: OK [ 46.182084] Testing event xen_mc_flush_reason: OK [ 46.203080] Testing event xen_mc_callback: OK [ 46.225174] Testing event xen_mc_entry_alloc: OK [ 46.246189] Testing event xen_mc_entry: OK [ 46.268258] Testing event xen_mc_issue: OK [ 46.289298] Testing event xen_mc_batch: OK [ 46.311194] Testing event hyperv_send_ipi_one: OK [ 46.333475] Testing event hyperv_send_ipi_mask: OK [ 46.355583] Testing event hyperv_nested_flush_guest_mapping_range: OK [ 46.377676] Testing event hyperv_nested_flush_guest_mapping: OK [ 46.399514] Testing event hyperv_mmu_flush_tlb_multi: OK [ 46.421567] Testing event vector_free_moved: OK [ 46.444531] Testing event vector_setup: OK [ 46.466565] Testing event vector_teardown: OK [ 46.488523] Testing event vector_deactivate: OK [ 46.511587] Testing event vector_activate: OK [ 46.533441] Testing event vector_alloc_managed: OK [ 46.555499] Testing event vector_alloc: OK [ 46.578417] Testing event vector_reserve: OK [ 46.600418] Testing event vector_reserve_managed: OK [ 46.623565] Testing event vector_clear: OK [ 46.646559] Testing event vector_update: OK [ 46.668411] Testing event vector_config: OK [ 46.692609] Testing event thermal_apic_exit: OK [ 46.716576] Testing event thermal_apic_entry: OK [ 46.739557] Testing event deferred_error_apic_exit: OK [ 46.761391] Testing event deferred_error_apic_entry: OK [ 46.783592] Testing event threshold_apic_exit: OK [ 46.807568] Testing event threshold_apic_entry: OK [ 46.830203] Testing event call_function_single_exit: OK [ 46.852490] Testing event call_function_single_entry: OK [ 46.874521] Testing event call_function_exit: OK [ 46.896670] Testing event call_function_entry: OK [ 46.919551] Testing event reschedule_exit: OK [ 46.942779] Testing event reschedule_entry: OK [ 46.965718] Testing event irq_work_exit: OK [ 46.988368] Testing event irq_work_entry: OK [ 47.011524] Testing event x86_platform_ipi_exit: OK [ 47.033552] Testing event x86_platform_ipi_entry: OK [ 47.055582] Testing event error_apic_exit: OK [ 47.078415] Testing event error_apic_entry: OK [ 47.100418] Testing event spurious_apic_exit: OK [ 47.122662] Testing event spurious_apic_entry: OK [ 47.144587] Testing event local_timer_exit: OK [ 47.166547] Testing event local_timer_entry: OK [ 47.188589] Testing event nmi_handler: OK [ 47.212470] Testing event x86_fpu_xstate_check_failed: OK [ 47.236538] Testing event x86_fpu_copy_dst: OK [ 47.258441] Testing event x86_fpu_dropped: OK [ 47.280474] Testing event x86_fpu_regs_deactivated: OK [ 47.302602] Testing event x86_fpu_regs_activated: OK [ 47.324869] Testing event x86_fpu_after_save: OK [ 47.347505] Testing event x86_fpu_before_save: OK [ 47.369491] Testing event mce_record: OK [ 47.391278] Testing event pseudo_lock_l3: OK [ 47.413398] Testing event pseudo_lock_l2: OK [ 47.435357] Testing event pseudo_lock_mem_latency: OK [ 47.458503] Testing event page_fault_kernel: OK [ 47.482334] Testing event page_fault_user: OK [ 47.505477] Testing event task_prctl_unknown: OK [ 47.528493] Testing event task_rename: OK [ 47.551402] Testing event task_newtask: OK [ 47.575526] Testing event cpuhp_exit: OK [ 47.598853] Testing event cpuhp_multi_enter: OK [ 47.620725] Testing event cpuhp_enter: OK [ 47.642580] Testing event tasklet_exit: OK [ 47.666512] Testing event tasklet_entry: OK [ 47.688632] Testing event softirq_raise: OK [ 47.711536] Testing event softirq_exit: OK [ 47.734496] Testing event softirq_entry: OK [ 47.757459] Testing event irq_handler_exit: OK [ 47.780877] Testing event irq_handler_entry: OK [ 47.803762] Testing event signal_deliver: OK [ 47.827831] Testing event signal_generate: OK [ 47.849609] Testing event workqueue_execute_end: OK [ 47.873497] Testing event workqueue_execute_start: OK [ 47.895408] Testing event workqueue_activate_work: OK [ 47.919556] Testing event workqueue_queue_work: OK [ 47.941453] Testing event notifier_run: OK [ 47.964404] Testing event notifier_unregister: OK [ 47.986418] Testing event notifier_register: OK [ 48.008326] Testing event ipi_exit: OK [ 48.030164] Testing event ipi_entry: OK [ 48.051184] Testing event ipi_send_cpumask: OK [ 48.072471] Testing event ipi_send_cpu: OK [ 48.095165] Testing event ipi_raise: OK [ 48.116120] Testing event sched_wake_idle_without_ipi: OK [ 48.138740] Testing event sched_skip_cpuset_numa: OK [ 48.161419] Testing event sched_skip_vma_numa: OK [ 48.185232] Testing event sched_swap_numa: OK [ 48.207559] Testing event sched_stick_numa: OK [ 48.230619] Testing event sched_move_numa: OK [ 48.253471] Testing event sched_process_hang: OK [ 48.275546] Testing event sched_pi_setprio: OK [ 48.298411] Testing event sched_stat_runtime: OK [ 48.320623] Testing event sched_stat_blocked: OK [ 48.342420] Testing event sched_stat_iowait: OK [ 48.364970] Testing event sched_stat_sleep: OK [ 48.386525] Testing event sched_stat_wait: OK [ 48.408509] Testing event sched_prepare_exec: OK [ 48.431330] Testing event sched_process_exec: OK [ 48.453487] Testing event sched_process_fork: OK [ 48.476290] Testing event sched_process_wait: OK [ 48.498337] Testing event sched_wait_task: OK [ 48.521383] Testing event sched_process_exit: OK [ 48.545543] Testing event sched_process_free: OK [ 48.569499] Testing event sched_migrate_task: OK [ 48.592365] Testing event sched_switch: OK [ 48.614625] Testing event sched_wakeup_new: OK [ 48.636769] Testing event sched_wakeup: OK [ 48.658732] Testing event sched_waking: OK [ 48.680652] Testing event sched_kthread_work_execute_end: OK [ 48.702589] Testing event sched_kthread_work_execute_start: OK [ 48.725571] Testing event sched_kthread_work_queue_work: OK [ 48.748570] Testing event sched_kthread_stop_ret: OK [ 48.771577] Testing event sched_kthread_stop: OK [ 48.793527] Testing event contention_end: OK [ 48.821296] Testing event contention_begin: OK [ 48.849020] Testing event console: OK [ 48.871363] Testing event irq_matrix_free: OK [ 48.893392] Testing event irq_matrix_alloc: OK [ 48.915488] Testing event irq_matrix_assign: OK [ 48.937346] Testing event irq_matrix_alloc_managed: OK [ 48.960389] Testing event irq_matrix_remove_managed: OK [ 48.983496] Testing event irq_matrix_reserve_managed: OK [ 49.005473] Testing event irq_matrix_assign_system: OK [ 49.028364] Testing event irq_matrix_remove_reserved: OK [ 49.050551] Testing event irq_matrix_reserve: OK [ 49.072486] Testing event irq_matrix_offline: OK [ 49.094419] Testing event irq_matrix_online: OK [ 49.119490] Testing event rcu_stall_warning: OK [ 49.142720] Testing event rcu_utilization: OK [ 49.167724] Testing event dma_sync_sg_for_device: OK [ 49.192390] Testing event dma_sync_sg_for_cpu: OK [ 49.215671] Testing event dma_sync_single_for_device: OK [ 49.237793] Testing event dma_sync_single_for_cpu: OK [ 49.262391] Testing event dma_unmap_sg: OK [ 49.285322] Testing event dma_map_sg_err: OK [ 49.308307] Testing event dma_map_sg: OK [ 49.330539] Testing event dma_free_sgt: OK [ 49.352406] Testing event dma_free_pages: OK [ 49.374408] Testing event dma_free: OK [ 49.397546] Testing event dma_alloc_sgt: OK [ 49.420399] Testing event dma_alloc_sgt_err: OK [ 49.442495] Testing event dma_alloc_pages: OK [ 49.464608] Testing event dma_alloc: OK [ 49.486693] Testing event dma_unmap_resource: OK [ 49.509460] Testing event dma_unmap_page: OK [ 49.532557] Testing event dma_map_resource: OK [ 49.555468] Testing event dma_map_page: OK [ 49.578294] Testing event swiotlb_bounced: OK [ 49.602669] Testing event sys_exit: OK [ 49.624336] Testing event sys_enter: OK [ 49.646375] Testing event module_request: OK [ 49.668335] Testing event module_put: OK [ 49.690350] Testing event module_get: OK [ 49.713508] Testing event module_free: OK [ 49.735462] Testing event module_load: OK [ 49.757488] Testing event tick_stop: OK [ 49.781280] Testing event itimer_expire: OK [ 49.804565] Testing event itimer_state: OK [ 49.827372] Testing event hrtimer_cancel: OK [ 49.849822] Testing event hrtimer_expire_exit: OK [ 49.871494] Testing event hrtimer_expire_entry: OK [ 49.893418] Testing event hrtimer_start: OK [ 49.916577] Testing event hrtimer_setup: OK [ 49.938631] Testing event timer_base_idle: OK [ 49.961614] Testing event timer_cancel: OK [ 49.983650] Testing event timer_expire_exit: OK [ 50.006524] Testing event timer_expire_entry: OK [ 50.029563] Testing event timer_start: OK [ 50.052587] Testing event timer_init: OK [ 50.076399] Testing event alarmtimer_cancel: OK [ 50.100597] Testing event alarmtimer_start: OK [ 50.123536] Testing event alarmtimer_fired: OK [ 50.145600] Testing event alarmtimer_suspend: OK [ 50.167518] Testing event tmigr_handle_remote: OK [ 50.191537] Testing event tmigr_update_events: OK [ 50.214595] Testing event tmigr_cpu_new_timer_idle: OK [ 50.236434] Testing event tmigr_cpu_idle: OK [ 50.259543] Testing event tmigr_handle_remote_cpu: OK [ 50.282617] Testing event tmigr_cpu_offline: OK [ 50.304383] Testing event tmigr_cpu_online: OK [ 50.326219] Testing event tmigr_cpu_active: OK [ 50.347489] Testing event tmigr_cpu_new_timer: OK [ 50.370356] Testing event tmigr_group_set_cpu_active: OK [ 50.394530] Testing event tmigr_group_set_cpu_inactive: OK [ 50.417390] Testing event tmigr_connect_cpu_parent: OK [ 50.439278] Testing event tmigr_connect_child_parent: OK [ 50.461741] Testing event tmigr_group_set: OK [ 50.483512] Testing event csd_function_exit: OK [ 50.507947] Testing event csd_function_entry: OK [ 50.532030] Testing event csd_queue_cpu: OK [ 50.553639] Testing event cgroup_rstat_cpu_unlock_fastpath: OK [ 50.576514] Testing event cgroup_rstat_cpu_unlock: OK [ 50.598452] Testing event cgroup_rstat_cpu_locked_fastpath: OK [ 50.620402] Testing event cgroup_rstat_cpu_locked: OK [ 50.642401] Testing event cgroup_rstat_cpu_lock_contended_fastpath: OK [ 50.665514] Testing event cgroup_rstat_cpu_lock_contended: OK [ 50.687451] Testing event cgroup_rstat_unlock: OK [ 50.709418] Testing event cgroup_rstat_locked: OK [ 50.730389] Testing event cgroup_rstat_lock_contended: OK [ 50.752417] Testing event cgroup_notify_frozen: OK [ 50.774478] Testing event cgroup_notify_populated: OK [ 50.795496] Testing event cgroup_transfer_tasks: OK [ 50.817298] Testing event cgroup_attach_task: OK [ 50.839301] Testing event cgroup_unfreeze: OK [ 50.860530] Testing event cgroup_freeze: OK [ 50.882372] Testing event cgroup_rename: OK [ 50.904286] Testing event cgroup_release: OK [ 50.925401] Testing event cgroup_rmdir: OK [ 50.950354] Testing event cgroup_mkdir: OK [ 50.972474] Testing event cgroup_remount: OK [ 50.994420] Testing event cgroup_destroy_root: OK [ 51.016301] Testing event cgroup_setup_root: OK [ 51.037320] Testing event sample_threshold: OK [ 51.059370] Testing event nmi_noise: OK [ 51.081371] Testing event irq_noise: OK [ 51.103346] Testing event softirq_noise: OK [ 51.126356] Testing event thread_noise: OK [ 51.149310] Testing event timerlat_sample: OK [ 51.171367] Testing event osnoise_sample: OK [ 51.193382] Testing event ftrace_test_filter: OK [ 51.216206] Testing event bpf_trace_printk: OK [ 51.238612] Testing event error_report_end: OK [ 51.260628] Testing event guest_halt_poll_ns: OK [ 51.282559] Testing event dev_pm_qos_remove_request: OK [ 51.306477] Testing event dev_pm_qos_update_request: OK [ 51.328495] Testing event dev_pm_qos_add_request: OK [ 51.351375] Testing event pm_qos_update_flags: OK [ 51.373525] Testing event pm_qos_update_target: OK [ 51.395502] Testing event pm_qos_remove_request: OK [ 51.418478] Testing event pm_qos_update_request: OK [ 51.440403] Testing event pm_qos_add_request: OK [ 51.462493] Testing event power_domain_target: OK [ 51.485089] Testing event wakeup_source_deactivate: OK [ 51.507383] Testing event wakeup_source_activate: OK [ 51.530359] Testing event suspend_resume: OK [ 51.563547] Testing event device_pm_callback_end: OK [ 51.586753] Testing event device_pm_callback_start: OK [ 51.608851] Testing event cpu_frequency_limits: OK [ 51.630347] Testing event cpu_frequency: OK [ 51.653710] Testing event pstate_sample: OK [ 51.677485] Testing event powernv_throttle: OK [ 51.698077] Testing event psci_domain_idle_exit: OK [ 51.719087] Testing event psci_domain_idle_enter: OK [ 51.740249] Testing event cpu_idle_miss: OK [ 51.764316] Testing event cpu_idle: OK [ 51.785410] Testing event rpm_status: OK [ 51.806382] Testing event rpm_return_int: OK [ 51.829810] Testing event rpm_usage: OK [ 51.852903] Testing event rpm_idle: OK [ 51.874324] Testing event rpm_resume: OK [ 51.896394] Testing event rpm_suspend: OK [ 51.919380] Testing event rv_retries_error: OK [ 51.941413] Testing event error_wwnr: OK [ 51.963339] Testing event event_wwnr: OK [ 51.985299] Testing event bpf_xdp_link_attach_failed: OK [ 52.007369] Testing event mem_connect: OK [ 52.029340] Testing event mem_disconnect: OK [ 52.051333] Testing event xdp_devmap_xmit: OK [ 52.073320] Testing event xdp_cpumap_enqueue: OK [ 52.095523] Testing event xdp_cpumap_kthread: OK [ 52.121429] Testing event xdp_redirect_map_err: OK [ 52.143223] Testing event xdp_redirect_map: OK [ 52.165026] Testing event xdp_redirect_err: OK [ 52.186928] Testing event xdp_redirect: OK [ 52.212080] Testing event xdp_bulk_tx: OK [ 52.233140] Testing event xdp_exception: OK [ 52.257752] Testing event user_exit: OK [ 52.281388] Testing event user_enter: OK [ 52.303466] Testing event rseq_ip_fixup: OK [ 52.325506] Testing event rseq_update: OK [ 52.347346] Testing event file_check_and_advance_wb_err: OK [ 52.369516] Testing event filemap_set_wb_err: OK [ 52.391324] Testing event mm_filemap_fault: OK [ 52.413795] Testing event mm_filemap_map_pages: OK [ 52.435389] Testing event mm_filemap_get_pages: OK [ 52.457369] Testing event mm_filemap_add_to_page_cache: OK [ 52.479496] Testing event mm_filemap_delete_from_page_cache: OK [ 52.501600] Testing event compact_retry: OK [ 52.523312] Testing event skip_task_reaping: OK [ 52.545569] Testing event finish_task_reaping: OK [ 52.567443] Testing event start_task_reaping: OK [ 52.589368] Testing event wake_reaper: OK [ 52.612396] Testing event mark_victim: OK [ 52.634401] Testing event reclaim_retry_zone: OK [ 52.656456] Testing event oom_score_adj_update: OK [ 52.678397] Testing event mm_lru_activate: OK [ 52.700358] Testing event mm_lru_insertion: OK [ 52.722260] Testing event mm_vmscan_throttled: OK [ 52.743481] Testing event mm_vmscan_node_reclaim_end: OK [ 52.766413] Testing event mm_vmscan_node_reclaim_begin: OK [ 52.789390] Testing event mm_vmscan_lru_shrink_active: OK [ 52.811510] Testing event mm_vmscan_lru_shrink_inactive: OK [ 52.834394] Testing event mm_vmscan_reclaim_pages: OK [ 52.855545] Testing event mm_vmscan_write_folio: OK [ 52.877514] Testing event mm_vmscan_lru_isolate: OK [ 52.899320] Testing event mm_shrink_slab_end: OK [ 52.920527] Testing event mm_shrink_slab_start: OK [ 52.942505] Testing event mm_vmscan_memcg_softlimit_reclaim_end: OK [ 52.965248] Testing event mm_vmscan_memcg_reclaim_end: OK [ 52.986495] Testing event mm_vmscan_direct_reclaim_end: OK [ 53.009515] Testing event mm_vmscan_memcg_softlimit_reclaim_begin: OK [ 53.031508] Testing event mm_vmscan_memcg_reclaim_begin: OK [ 53.054582] Testing event mm_vmscan_direct_reclaim_begin: OK [ 53.077337] Testing event mm_vmscan_wakeup_kswapd: OK [ 53.100558] Testing event mm_vmscan_kswapd_wake: OK [ 53.122521] Testing event mm_vmscan_kswapd_sleep: OK [ 53.145539] Testing event percpu_destroy_chunk: OK [ 53.168520] Testing event percpu_create_chunk: OK [ 53.190325] Testing event percpu_alloc_percpu_fail: OK [ 53.212606] Testing event percpu_free_percpu: OK [ 53.234499] Testing event percpu_alloc_percpu: OK [ 53.256497] Testing event rss_stat: OK [ 53.280938] Testing event mm_calculate_totalreserve_pages: OK [ 53.302516] Testing event mm_setup_per_zone_lowmem_reserve: OK [ 53.325372] Testing event mm_setup_per_zone_wmarks: OK [ 53.347514] Testing event mm_alloc_contig_migrate_range_info: OK [ 53.371520] Testing event mm_page_alloc_extfrag: OK [ 53.394012] Testing event mm_page_pcpu_drain: OK [ 53.415259] Testing event mm_page_alloc_zone_locked: OK [ 53.439479] Testing event mm_page_alloc: OK [ 53.461583] Testing event mm_page_free_batched: OK [ 53.486479] Testing event mm_page_free: OK [ 53.508800] Testing event kmem_cache_free: OK [ 53.530253] Testing event kfree: OK [ 53.551323] Testing event kmalloc: OK [ 53.576966] Testing event kmem_cache_alloc: OK [ 53.602698] Testing event mm_compaction_kcompactd_wake: OK [ 53.624486] Testing event mm_compaction_wakeup_kcompactd: OK [ 53.646441] Testing event mm_compaction_kcompactd_sleep: OK [ 53.668526] Testing event mm_compaction_defer_reset: OK [ 53.691408] Testing event mm_compaction_defer_compaction: OK [ 53.713490] Testing event mm_compaction_deferred: OK [ 53.735400] Testing event mm_compaction_suitable: OK [ 53.757401] Testing event mm_compaction_finished: OK [ 53.780453] Testing event mm_compaction_try_to_compact_pages: OK [ 53.803523] Testing event mm_compaction_end: OK [ 53.826318] Testing event mm_compaction_begin: OK [ 53.848379] Testing event mm_compaction_migratepages: OK [ 53.870504] Testing event mm_compaction_fast_isolate_freepages: OK [ 53.892408] Testing event mm_compaction_isolate_freepages: OK [ 53.914538] Testing event mm_compaction_isolate_migratepages: OK [ 53.937604] Testing event mmap_lock_acquire_returned: OK [ 53.969817] Testing event mmap_lock_released: OK [ 54.004244] Testing event mmap_lock_start_locking: OK [ 54.036442] Testing event exit_mmap: OK [ 54.059401] Testing event vma_store: OK [ 54.080140] Testing event vma_mas_szero: OK [ 54.101163] Testing event vm_unmapped_area: OK [ 54.122372] Testing event remove_migration_pte: OK [ 54.144385] Testing event set_migration_pte: OK [ 54.166406] Testing event mm_migrate_pages_start: OK [ 54.188436] Testing event mm_migrate_pages: OK [ 54.210367] Testing event tlb_flush: OK [ 54.235180] Testing event free_vmap_area_noflush: OK [ 54.256326] Testing event purge_vmap_area_lazy: OK [ 54.278415] Testing event alloc_vmap_area: OK [ 54.301405] Testing event ksm_advisor: OK [ 54.325499] Testing event ksm_remove_rmap_item: OK [ 54.347379] Testing event ksm_remove_ksm_page: OK [ 54.369385] Testing event ksm_merge_with_ksm_page: OK [ 54.391395] Testing event ksm_merge_one_page: OK [ 54.413332] Testing event ksm_exit: OK [ 54.436587] Testing event ksm_enter: OK [ 54.460315] Testing event ksm_stop_scan: OK [ 54.482386] Testing event ksm_start_scan: OK [ 54.505468] Testing event remove_migration_pmd: OK [ 54.527464] Testing event set_migration_pmd: OK [ 54.549384] Testing event hugepage_update_pud: OK [ 54.570191] Testing event hugepage_update_pmd: OK [ 54.592262] Testing event hugepage_set_pud: OK [ 54.614240] Testing event hugepage_set_pmd: OK [ 54.635169] Testing event mm_khugepaged_collapse_file: OK [ 54.657495] Testing event mm_khugepaged_scan_file: OK [ 54.679264] Testing event mm_collapse_huge_page_swapin: OK [ 54.700485] Testing event mm_collapse_huge_page_isolate: OK [ 54.722583] Testing event mm_collapse_huge_page: OK [ 54.745272] Testing event mm_khugepaged_scan_pmd: OK [ 54.766428] Testing event memcg_flush_stats: OK [ 54.788368] Testing event count_memcg_events: OK [ 54.810385] Testing event mod_memcg_lruvec_state: OK [ 54.833561] Testing event mod_memcg_state: OK [ 54.855259] Testing event test_pages_isolated: OK [ 54.876397] Testing event cma_alloc_busy_retry: OK [ 54.898350] Testing event cma_alloc_finish: OK [ 54.921277] Testing event cma_alloc_start: OK [ 54.943522] Testing event cma_release: OK [ 54.966351] Testing event damon_aggregated: OK [ 54.989269] Testing event damos_before_apply: OK [ 55.012529] Testing event fill_mg_cmtime: OK [ 55.035363] Testing event ctime_ns_xchg: OK [ 55.057358] Testing event ctime_xchg_skip: OK [ 55.079326] Testing event inode_set_ctime_to_ts: OK [ 55.101503] Testing event sb_clear_inode_writeback: OK [ 55.124560] Testing event sb_mark_inode_writeback: OK [ 55.146499] Testing event writeback_dirty_inode_enqueue: OK [ 55.168577] Testing event writeback_lazytime_iput: OK [ 55.190477] Testing event writeback_lazytime: OK [ 55.213331] Testing event writeback_single_inode: OK [ 55.236627] Testing event writeback_single_inode_start: OK [ 55.258545] Testing event writeback_sb_inodes_requeue: OK [ 55.281489] Testing event balance_dirty_pages: OK [ 55.303525] Testing event bdi_dirty_ratelimit: OK [ 55.325343] Testing event global_dirty_state: OK [ 55.347485] Testing event writeback_queue_io: OK [ 55.369377] Testing event wbc_writepage: OK [ 55.391380] Testing event writeback_bdi_register: OK [ 55.413465] Testing event writeback_wake_background: OK [ 55.436413] Testing event writeback_pages_written: OK [ 55.458589] Testing event writeback_wait: OK [ 55.481322] Testing event writeback_written: OK [ 55.503456] Testing event writeback_start: OK [ 55.525507] Testing event writeback_exec: OK [ 55.547388] Testing event writeback_queue: OK [ 55.569458] Testing event writeback_write_inode: OK [ 55.591253] Testing event writeback_write_inode_start: OK [ 55.612367] Testing event flush_foreign: OK [ 55.634473] Testing event track_foreign_dirty: OK [ 55.657267] Testing event inode_switch_wbs: OK [ 55.679361] Testing event inode_foreign_history: OK [ 55.701341] Testing event writeback_dirty_inode: OK [ 55.723396] Testing event writeback_dirty_inode_start: OK [ 55.746401] Testing event writeback_mark_inode_dirty: OK [ 55.769328] Testing event folio_wait_writeback: OK [ 55.791586] Testing event writeback_dirty_folio: OK [ 55.815498] Testing event dax_writeback_one: OK [ 55.838361] Testing event dax_writeback_range_done: OK [ 55.860441] Testing event dax_writeback_range: OK [ 55.883571] Testing event dax_insert_pfn_mkwrite: OK [ 55.906520] Testing event dax_insert_pfn_mkwrite_no_entry: OK [ 55.928459] Testing event dax_load_hole: OK [ 55.950507] Testing event dax_pte_fault_done: OK [ 55.972504] Testing event dax_pte_fault: OK [ 55.994166] Testing event dax_pmd_load_hole_fallback: OK [ 56.016419] Testing event dax_pmd_load_hole: OK [ 56.038461] Testing event dax_pmd_fault_done: OK [ 56.061399] Testing event dax_pmd_fault: OK [ 56.084415] Testing event leases_conflict: OK [ 56.106452] Testing event generic_add_lease: OK [ 56.129238] Testing event time_out_leases: OK [ 56.150547] Testing event generic_delete_lease: OK [ 56.172550] Testing event break_lease_unblock: OK [ 56.195401] Testing event break_lease_block: OK [ 56.217488] Testing event break_lease_noblock: OK [ 56.239376] Testing event flock_lock_inode: OK [ 56.262494] Testing event locks_remove_posix: OK [ 56.284440] Testing event fcntl_setlk: OK [ 56.306482] Testing event posix_lock_inode: OK [ 56.329402] Testing event locks_get_lock_context: OK [ 56.351449] Testing event iomap_dio_complete: OK [ 56.373523] Testing event iomap_dio_rw_begin: OK [ 56.395506] Testing event iomap_iter: OK [ 56.417412] Testing event iomap_writepage_map: OK [ 56.439379] Testing event iomap_iter_srcmap: OK [ 56.462799] Testing event iomap_iter_dstmap: OK [ 56.484387] Testing event iomap_dio_rw_queued: OK [ 56.508497] Testing event iomap_dio_invalidate_fail: OK [ 56.531499] Testing event iomap_invalidate_folio: OK [ 56.554515] Testing event iomap_release_folio: OK [ 56.576523] Testing event iomap_writepage: OK [ 56.598460] Testing event iomap_readahead: OK [ 56.621455] Testing event iomap_readpage: OK [ 56.643381] Testing event netfs_folioq: OK [ 56.665690] Testing event netfs_collect_stream: OK [ 56.688722] Testing event netfs_collect_gap: OK [ 56.710744] Testing event netfs_collect_state: OK [ 56.732638] Testing event netfs_collect_folio: OK [ 56.755827] Testing event netfs_collect_sreq: OK [ 56.778634] Testing event netfs_collect: OK [ 56.800600] Testing event netfs_write: OK [ 56.825055] Testing event netfs_write_iter: OK [ 56.846537] Testing event netfs_folio: OK [ 56.881066] Testing event netfs_sreq_ref: OK [ 56.904789] Testing event netfs_rreq_ref: OK [ 56.929267] Testing event netfs_failure: OK [ 56.952846] Testing event netfs_sreq: OK [ 56.984598] Testing event netfs_rreq: OK [ 57.014521] Testing event netfs_read: OK [ 57.037415] Testing event fscache_resize: OK [ 57.060342] Testing event fscache_invalidate: OK [ 57.084412] Testing event fscache_relinquish: OK [ 57.108489] Testing event fscache_acquire: OK [ 57.131494] Testing event fscache_access: OK [ 57.154857] Testing event fscache_access_volume: OK [ 57.178980] Testing event fscache_access_cache: OK [ 57.202910] Testing event fscache_active: OK [ 57.226641] Testing event fscache_cookie: OK [ 57.253158] Testing event fscache_volume: OK [ 57.277137] Testing event fscache_cache: OK [ 57.299596] Testing event hugetlbfs_fallocate: OK [ 57.322410] Testing event hugetlbfs_setattr: OK [ 57.345416] Testing event hugetlbfs_free_inode: OK [ 57.367400] Testing event hugetlbfs_evict_inode: OK [ 57.389400] Testing event hugetlbfs_alloc_inode: OK [ 57.411478] Testing event nfs_xdr_bad_filehandle: OK [ 57.433465] Testing event nfs_xdr_status: OK [ 57.456400] Testing event nfs_local_open_fh: OK [ 57.477151] Testing event nfs_mount_path: OK [ 57.499563] Testing event nfs_mount_option: OK [ 57.521404] Testing event nfs_mount_assign: OK [ 57.547529] Testing event nfs_fh_to_dentry: OK [ 57.569408] Testing event nfs_direct_write_reschedule_io: OK [ 57.591376] Testing event nfs_direct_write_schedule_iovec: OK [ 57.613512] Testing event nfs_direct_write_completion: OK [ 57.635589] Testing event nfs_direct_write_complete: OK [ 57.659521] Testing event nfs_direct_resched_write: OK [ 57.682526] Testing event nfs_direct_commit_complete: OK [ 57.704547] Testing event nfs_commit_done: OK [ 57.726375] Testing event nfs_initiate_commit: OK [ 57.748500] Testing event nfs_commit_error: OK [ 57.770336] Testing event nfs_comp_error: OK [ 57.792418] Testing event nfs_write_error: OK [ 57.817410] Testing event nfs_writeback_done: OK [ 57.839435] Testing event nfs_initiate_write: OK [ 57.861496] Testing event nfs_pgio_error: OK [ 57.883383] Testing event nfs_readpage_short: OK [ 57.905206] Testing event nfs_readpage_done: OK [ 57.926509] Testing event nfs_initiate_read: OK [ 57.949517] Testing event nfs_aop_readahead_done: OK [ 57.971504] Testing event nfs_aop_readahead: OK [ 57.993400] Testing event nfs_launder_folio_done: OK [ 58.016514] Testing event nfs_invalidate_folio: OK [ 58.039298] Testing event nfs_writeback_folio_done: OK [ 58.061503] Testing event nfs_writeback_folio: OK [ 58.083479] Testing event nfs_aop_readpage_done: OK [ 58.105392] Testing event nfs_aop_readpage: OK [ 58.127388] Testing event nfs_sillyrename_unlink: OK [ 58.149293] Testing event nfs_async_rename_done: OK [ 58.170348] Testing event nfs_rename_exit: OK [ 58.193385] Testing event nfs_rename_enter: OK [ 58.214319] Testing event nfs_link_exit: OK [ 58.237356] Testing event nfs_link_enter: OK [ 58.260308] Testing event nfs_symlink_exit: OK [ 58.282399] Testing event nfs_symlink_enter: OK [ 58.305329] Testing event nfs_unlink_exit: OK [ 58.327473] Testing event nfs_unlink_enter: OK [ 58.350355] Testing event nfs_remove_exit: OK [ 58.372403] Testing event nfs_remove_enter: OK [ 58.396534] Testing event nfs_rmdir_exit: OK [ 58.419403] Testing event nfs_rmdir_enter: OK [ 58.442482] Testing event nfs_mkdir_exit: OK [ 58.465402] Testing event nfs_mkdir_enter: OK [ 58.489401] Testing event nfs_mknod_exit: OK [ 58.511346] Testing event nfs_mknod_enter: OK [ 58.533451] Testing event nfs_create_exit: OK [ 58.555404] Testing event nfs_create_enter: OK [ 58.578443] Testing event nfs_atomic_open_exit: OK [ 58.601552] Testing event nfs_atomic_open_enter: OK [ 58.623395] Testing event nfs_readdir_lookup_revalidate: OK [ 58.645514] Testing event nfs_readdir_lookup_revalidate_failed: OK [ 58.667518] Testing event nfs_readdir_lookup: OK [ 58.690406] Testing event nfs_lookup_revalidate_exit: OK [ 58.712779] Testing event nfs_lookup_revalidate_enter: OK [ 58.734515] Testing event nfs_lookup_exit: OK [ 58.756322] Testing event nfs_lookup_enter: OK [ 58.777403] Testing event nfs_readdir_uncached: OK [ 58.799416] Testing event nfs_readdir_cache_fill: OK [ 58.822298] Testing event nfs_readdir_invalidate_cache_range: OK [ 58.845676] Testing event nfs_size_grow: OK [ 58.869497] Testing event nfs_size_update: OK [ 58.891402] Testing event nfs_size_wcc: OK [ 58.913364] Testing event nfs_size_truncate: OK [ 58.935472] Testing event nfs_access_exit: OK [ 58.957432] Testing event nfs_readdir_uncached_done: OK [ 58.979480] Testing event nfs_readdir_cache_fill_done: OK [ 59.001486] Testing event nfs_readdir_force_readdirplus: OK [ 59.023540] Testing event nfs_set_cache_invalid: OK [ 59.045400] Testing event nfs_access_enter: OK [ 59.067358] Testing event nfs_fsync_exit: OK [ 59.089452] Testing event nfs_fsync_enter: OK [ 59.111417] Testing event nfs_writeback_inode_exit: OK [ 59.134391] Testing event nfs_writeback_inode_enter: OK [ 59.157662] Testing event nfs_setattr_exit: OK [ 59.179397] Testing event nfs_setattr_enter: OK [ 59.201478] Testing event nfs_getattr_exit: OK [ 59.223283] Testing event nfs_getattr_enter: OK [ 59.244294] Testing event nfs_invalidate_mapping_exit: OK [ 59.266363] Testing event nfs_invalidate_mapping_enter: OK [ 59.288494] Testing event nfs_revalidate_inode_exit: OK [ 59.311487] Testing event nfs_revalidate_inode_enter: OK [ 59.333377] Testing event nfs_refresh_inode_exit: OK [ 59.354476] Testing event nfs_refresh_inode_enter: OK [ 59.375356] Testing event nfs_set_inode_stale: OK [ 59.398368] Testing event nlmclnt_grant: OK [ 59.420259] Testing event nlmclnt_unlock: OK [ 59.442336] Testing event nlmclnt_lock: OK [ 59.464535] Testing event nlmclnt_test: OK [ 59.487528] Testing event mon_llc_occupancy_limbo: OK [ 59.508474] Testing event cap_capable: OK [ 59.531373] Testing event selinux_audited: OK [ 59.553231] Testing event block_rq_remap: OK [ 59.575103] Testing event block_bio_remap: OK [ 59.597658] Testing event block_split: OK [ 59.620361] Testing event block_unplug: OK [ 59.642732] Testing event block_plug: OK [ 59.664391] Testing event block_getrq: OK [ 59.686390] Testing event block_bio_queue: OK [ 59.708316] Testing event block_bio_frontmerge: OK [ 59.729319] Testing event block_bio_backmerge: OK [ 59.751273] Testing event block_bio_complete: OK [ 59.773320] Testing event block_io_done: OK [ 59.795564] Testing event block_io_start: OK [ 59.817275] Testing event block_rq_merge: OK [ 59.839415] Testing event block_rq_issue: OK [ 59.860357] Testing event block_rq_insert: OK [ 59.884052] Testing event block_rq_error: OK [ 59.905410] Testing event block_rq_complete: OK [ 59.927655] Testing event block_rq_requeue: OK [ 59.949405] Testing event block_dirty_buffer: OK [ 59.971253] Testing event block_touch_buffer: OK [ 59.992734] Testing event kyber_throttled: OK [ 60.014262] Testing event kyber_adjust: OK [ 60.036294] Testing event kyber_latency: OK [ 60.057322] Testing event wbt_timer: OK [ 60.078305] Testing event wbt_step: OK [ 60.099263] Testing event wbt_lat: OK [ 60.121538] Testing event wbt_stat: OK [ 60.143337] Testing event io_uring_local_work_run: OK [ 60.164363] Testing event io_uring_short_write: OK [ 60.185476] Testing event io_uring_task_work_run: OK [ 60.207503] Testing event io_uring_cqe_overflow: OK [ 60.229495] Testing event io_uring_req_failed: OK [ 60.253493] Testing event io_uring_task_add: OK [ 60.276380] Testing event io_uring_poll_arm: OK [ 60.298387] Testing event io_uring_submit_req: OK [ 60.320475] Testing event io_uring_complete: OK [ 60.342796] Testing event io_uring_fail_link: OK [ 60.364413] Testing event io_uring_cqring_wait: OK [ 60.386342] Testing event io_uring_link: OK [ 60.409440] Testing event io_uring_defer: OK [ 60.431345] Testing event io_uring_queue_async_work: OK [ 60.452531] Testing event io_uring_file_get: OK [ 60.474253] Testing event io_uring_register: OK [ 60.497458] Testing event io_uring_create: OK [ 60.521789] Testing event rdpmc: OK [ 60.543668] Testing event write_msr: OK [ 60.592015] Testing event read_msr: OK [ 60.638137] Testing event gpio_value: OK [ 60.662045] Testing event gpio_direction: OK [ 60.684871] Testing event pwm_get: OK [ 60.706245] Testing event pwm_apply: OK [ 60.727362] Testing event pwm_write_waveform: OK [ 60.750324] Testing event pwm_read_waveform: OK [ 60.774458] Testing event pwm_round_waveform_fromhw: OK [ 60.797302] Testing event pwm_round_waveform_tohw: OK [ 60.818340] Testing event clk_rate_request_done: OK [ 60.841313] Testing event clk_rate_request_start: OK [ 60.864428] Testing event clk_set_duty_cycle_complete: OK [ 60.887539] Testing event clk_set_duty_cycle: OK [ 60.910418] Testing event clk_set_phase_complete: OK [ 60.932290] Testing event clk_set_phase: OK [ 60.955241] Testing event clk_set_parent_complete: OK [ 60.978640] Testing event clk_set_parent: OK [ 61.000539] Testing event clk_set_rate_range: OK [ 61.023329] Testing event clk_set_max_rate: OK [ 61.045288] Testing event clk_set_min_rate: OK [ 61.067532] Testing event clk_set_rate_complete: OK [ 61.089497] Testing event clk_set_rate: OK [ 61.111386] Testing event clk_unprepare_complete: OK [ 61.134640] Testing event clk_unprepare: OK [ 61.157567] Testing event clk_prepare_complete: OK [ 61.180504] Testing event clk_prepare: OK [ 61.202473] Testing event clk_disable_complete: OK [ 61.224625] Testing event clk_disable: OK [ 61.246537] Testing event clk_enable_complete: OK [ 61.268414] Testing event clk_enable: OK [ 61.291522] Testing event cache_tag_flush_range_np: OK [ 61.313369] Testing event cache_tag_flush_range: OK [ 61.335346] Testing event cache_tag_flush_all: OK [ 61.357472] Testing event cache_tag_unassign: OK [ 61.380408] Testing event cache_tag_assign: OK [ 61.403624] Testing event prq_report: OK [ 61.426299] Testing event qi_submit: OK [ 61.447506] Testing event io_page_fault: OK [ 61.471483] Testing event unmap: OK [ 61.493334] Testing event map: OK [ 61.516477] Testing event attach_device_to_domain: OK [ 61.539433] Testing event remove_device_from_group: OK [ 61.561438] Testing event add_device_to_group: OK [ 61.583474] Testing event regcache_drop_region: OK [ 61.605304] Testing event regmap_async_complete_done: OK [ 61.627509] Testing event regmap_async_complete_start: OK [ 61.649516] Testing event regmap_async_io_complete: OK [ 61.671411] Testing event regmap_async_write_start: OK [ 61.693406] Testing event regmap_cache_bypass: OK [ 61.715493] Testing event regmap_cache_only: OK [ 61.737293] Testing event regcache_sync: OK [ 61.759811] Testing event regmap_hw_write_done: OK [ 61.781744] Testing event regmap_hw_write_start: OK [ 61.805804] Testing event regmap_hw_read_done: OK [ 61.827396] Testing event regmap_hw_read_start: OK [ 61.849311] Testing event regmap_bulk_read: OK [ 61.871404] Testing event regmap_bulk_write: OK [ 61.893371] Testing event regmap_reg_read_cache: OK [ 61.915396] Testing event regmap_reg_read: OK [ 61.937291] Testing event regmap_reg_write: OK [ 61.959398] Testing event devres_log: OK [ 61.981900] Testing event dma_fence_wait_end: OK [ 62.003493] Testing event dma_fence_wait_start: OK [ 62.026410] Testing event dma_fence_signaled: OK [ 62.048388] Testing event dma_fence_enable_signal: OK [ 62.070584] Testing event dma_fence_destroy: OK [ 62.092559] Testing event dma_fence_init: OK [ 62.114408] Testing event dma_fence_emit: OK [ 62.136074] Testing event scsi_eh_wakeup: OK [ 62.157351] Testing event scsi_dispatch_cmd_timeout: OK [ 62.179469] Testing event scsi_dispatch_cmd_done: OK [ 62.201389] Testing event scsi_dispatch_cmd_error: OK [ 62.223495] Testing event scsi_dispatch_cmd_start: OK [ 62.245412] Testing event spi_transfer_stop: OK [ 62.267368] Testing event spi_transfer_start: OK [ 62.289477] Testing event spi_message_done: OK [ 62.311262] Testing event spi_message_start: OK [ 62.332332] Testing event spi_message_submit: OK [ 62.355516] Testing event spi_set_cs: OK [ 62.378324] Testing event spi_setup: OK [ 62.400509] Testing event spi_controller_busy: OK [ 62.422480] Testing event spi_controller_idle: OK [ 62.444632] Testing event mdio_access: OK [ 62.467736] Testing event e1000e_trace_mac_register: OK [ 62.489564] Testing event i40e_xmit_frame_ring_drop: OK [ 62.511498] Testing event i40e_xmit_frame_ring: OK [ 62.533314] Testing event i40e_clean_rx_irq_rx: OK [ 62.555417] Testing event i40e_clean_rx_irq: OK [ 62.577376] Testing event i40e_clean_tx_irq_unmap: OK [ 62.599401] Testing event i40e_clean_tx_irq: OK [ 62.621348] Testing event i40e_napi_poll: OK [ 62.644464] Testing event xhci_dbc_giveback_request: OK [ 62.667384] Testing event xhci_dbc_queue_request: OK [ 62.689502] Testing event xhci_dbc_free_request: OK [ 62.712348] Testing event xhci_dbc_alloc_request: OK [ 62.736519] Testing event xhci_ring_host_doorbell: OK [ 62.758491] Testing event xhci_ring_ep_doorbell: OK [ 62.780413] Testing event xhci_hub_status_data: OK [ 62.802320] Testing event xhci_get_port_status: OK [ 62.824343] Testing event xhci_handle_port_status: OK [ 62.846399] Testing event xhci_inc_deq: OK [ 62.868645] Testing event xhci_inc_enq: OK [ 62.890417] Testing event xhci_ring_expansion: OK [ 62.912490] Testing event xhci_ring_free: OK [ 62.934361] Testing event xhci_ring_alloc: OK [ 62.956464] Testing event xhci_configure_endpoint_ctrl_ctx: OK [ 62.978567] Testing event xhci_address_ctrl_ctx: OK [ 63.001433] Testing event xhci_configure_endpoint: OK [ 63.023393] Testing event xhci_handle_cmd_set_deq: OK [ 63.045501] Testing event xhci_handle_cmd_reset_dev: OK [ 63.067539] Testing event xhci_handle_cmd_addr_dev: OK [ 63.091360] Testing event xhci_setup_device_slot: OK [ 63.113438] Testing event xhci_discover_or_reset_device: OK [ 63.135489] Testing event xhci_handle_cmd_disable_slot: OK [ 63.157493] Testing event xhci_free_dev: OK [ 63.179376] Testing event xhci_alloc_dev: OK [ 63.200391] Testing event xhci_add_endpoint: OK [ 63.222236] Testing event xhci_handle_cmd_config_ep: OK [ 63.244549] Testing event xhci_handle_cmd_reset_ep: OK [ 63.266448] Testing event xhci_handle_cmd_set_deq_ep: OK [ 63.289484] Testing event xhci_handle_cmd_stop_ep: OK [ 63.312347] Testing event xhci_handle_cmd_set_deq_stream: OK [ 63.333532] Testing event xhci_alloc_stream_info_ctx: OK [ 63.355534] Testing event xhci_urb_dequeue: OK [ 63.377469] Testing event xhci_urb_giveback: OK [ 63.399440] Testing event xhci_urb_enqueue: OK [ 63.421565] Testing event xhci_stop_device: OK [ 63.444545] Testing event xhci_setup_addressable_virt_device: OK [ 63.466522] Testing event xhci_setup_device: OK [ 63.488502] Testing event xhci_alloc_virt_device: OK [ 63.510398] Testing event xhci_free_virt_device: OK [ 63.532474] Testing event xhci_dbc_gadget_ep_queue: OK [ 63.555515] Testing event xhci_dbc_handle_transfer: OK [ 63.577430] Testing event xhci_dbc_handle_event: OK [ 63.599504] Testing event xhci_queue_trb: OK [ 63.621395] Testing event xhci_handle_transfer: OK [ 63.643508] Testing event xhci_handle_command: OK [ 63.665389] Testing event xhci_handle_event: OK [ 63.687417] Testing event xhci_address_ctx: OK [ 63.709741] Testing event xhci_dbg_ring_expansion: OK [ 63.732583] Testing event xhci_dbg_init: OK [ 63.754699] Testing event xhci_dbg_cancel_urb: OK [ 63.778626] Testing event xhci_dbg_reset_ep: OK [ 63.800375] Testing event xhci_dbg_quirks: OK [ 63.822766] Testing event xhci_dbg_context_change: OK [ 63.844591] Testing event xhci_dbg_address: OK [ 63.867372] Testing event ucsi_register_altmode: OK [ 63.889437] Testing event ucsi_register_port: OK [ 63.911407] Testing event ucsi_connector_change: OK [ 63.933348] Testing event ucsi_reset_ppm: OK [ 63.955187] Testing event ucsi_run_command: OK [ 63.976152] Testing event rtc_timer_fired: OK [ 63.998286] Testing event rtc_timer_dequeue: OK [ 64.021853] Testing event rtc_timer_enqueue: OK [ 64.044603] Testing event rtc_read_offset: OK [ 64.066379] Testing event rtc_set_offset: OK [ 64.090350] Testing event rtc_alarm_irq_enable: OK [ 64.112555] Testing event rtc_irq_set_state: OK [ 64.134312] Testing event rtc_irq_set_freq: OK [ 64.156556] Testing event rtc_read_alarm: OK [ 64.180642] Testing event rtc_set_alarm: OK [ 64.203379] Testing event rtc_read_time: OK [ 64.225399] Testing event rtc_set_time: OK [ 64.249334] Testing event i2c_result: OK [ 64.271603] Testing event i2c_reply: OK [ 64.294638] Testing event i2c_read: OK [ 64.317545] Testing event i2c_write: OK [ 64.339570] Testing event smbus_result: OK [ 64.361492] Testing event smbus_reply: OK [ 64.384435] Testing event smbus_read: OK [ 64.406410] Testing event smbus_write: OK [ 64.428495] Testing event hwmon_attr_show_string: OK [ 64.450501] Testing event hwmon_attr_store: OK [ 64.472494] Testing event hwmon_attr_show: OK [ 64.495466] Testing event thermal_zone_trip: OK [ 64.517730] Testing event cdev_update: OK [ 64.539308] Testing event thermal_temperature: OK [ 64.562482] Testing event watchdog_set_timeout: OK [ 64.585818] Testing event watchdog_stop: OK [ 64.607615] Testing event watchdog_ping: OK [ 64.629341] Testing event watchdog_start: OK [ 64.651566] Testing event amd_pstate_epp_perf: OK [ 64.675850] Testing event amd_pstate_perf: OK [ 64.699374] Testing event tsm_mr_write: OK [ 64.721370] Testing event tsm_mr_refresh: OK [ 64.743386] Testing event tsm_mr_read: OK [ 64.766338] Testing event memory_failure_event: OK [ 64.788417] Testing event aer_event: OK [ 64.810600] Testing event non_standard_event: OK [ 64.834402] Testing event arm_event: OK [ 64.857330] Testing event mc_event: OK [ 64.879370] Testing event extlog_mem_event: OK [ 64.901184] Testing event tb_rx: OK [ 64.924399] Testing event tb_event: OK [ 64.948289] Testing event tb_tx: OK [ 64.972369] Testing event neigh_cleanup_and_release: OK [ 64.995506] Testing event neigh_event_send_dead: OK [ 65.017478] Testing event neigh_event_send_done: OK [ 65.039441] Testing event neigh_timer_handler: OK [ 65.061430] Testing event neigh_update_done: OK [ 65.084329] Testing event neigh_update: OK [ 65.106325] Testing event neigh_create: OK [ 65.128303] Testing event page_pool_update_nid: OK [ 65.152479] Testing event page_pool_state_hold: OK [ 65.174793] Testing event page_pool_state_release: OK [ 65.196549] Testing event page_pool_release: OK [ 65.218535] Testing event br_mdb_full: OK [ 65.240308] Testing event br_fdb_update: OK [ 65.262130] Testing event fdb_delete: OK [ 65.284098] Testing event br_fdb_external_learn_add: OK [ 65.305297] Testing event br_fdb_add: OK [ 65.328285] Testing event qdisc_create: OK [ 65.351722] Testing event qdisc_destroy: OK [ 65.373401] Testing event qdisc_reset: OK [ 65.395339] Testing event qdisc_enqueue: OK [ 65.417743] Testing event qdisc_dequeue: OK [ 65.440396] Testing event fib_table_lookup: OK [ 65.462726] Testing event tcp_ao_rcv_sne_update: OK [ 65.485170] Testing event tcp_ao_snd_sne_update: OK [ 65.506164] Testing event tcp_ao_synack_no_key: OK [ 65.527197] Testing event tcp_ao_rnext_request: OK [ 65.549220] Testing event tcp_ao_key_not_found: OK [ 65.571163] Testing event tcp_ao_mismatch: OK [ 65.592186] Testing event tcp_ao_wrong_maclen: OK [ 65.613291] Testing event tcp_ao_handshake_failure: OK [ 65.635477] Testing event tcp_hash_ao_required: OK [ 65.658162] Testing event tcp_hash_md5_mismatch: OK [ 65.681302] Testing event tcp_hash_md5_unexpected: OK [ 65.702419] Testing event tcp_hash_md5_required: OK [ 65.724418] Testing event tcp_hash_bad_header: OK [ 65.747430] Testing event tcp_cong_state_set: OK [ 65.769522] Testing event tcp_bad_csum: OK [ 65.793078] Testing event tcp_probe: OK [ 65.816390] Testing event tcp_sendmsg_locked: OK [ 65.838461] Testing event tcp_retransmit_synack: OK [ 65.861457] Testing event tcp_rcvbuf_grow: OK [ 65.883403] Testing event tcp_rcv_space_adjust: OK [ 65.906383] Testing event tcp_destroy_sock: OK [ 65.928538] Testing event tcp_receive_reset: OK [ 65.951396] Testing event tcp_send_reset: OK [ 65.974712] Testing event tcp_retransmit_skb: OK [ 65.996367] Testing event udp_fail_queue_rcv_skb: OK [ 66.019557] Testing event sock_recv_length: OK [ 66.041507] Testing event sock_send_length: OK [ 66.063546] Testing event sk_data_ready: OK [ 66.087482] Testing event inet_sk_error_report: OK [ 66.109386] Testing event inet_sock_set_state: OK [ 66.131612] Testing event sock_exceed_buf_limit: OK [ 66.153470] Testing event sock_rcvqueue_full: OK [ 66.176311] Testing event dql_stall_detected: OK [ 66.198541] Testing event napi_poll: OK [ 66.222670] Testing event netif_receive_skb_list_exit: OK [ 66.244412] Testing event netif_rx_exit: OK [ 66.266582] Testing event netif_receive_skb_exit: OK [ 66.290493] Testing event napi_gro_receive_exit: OK [ 66.312320] Testing event napi_gro_frags_exit: OK [ 66.335489] Testing event netif_rx_entry: OK [ 66.359594] Testing event netif_receive_skb_list_entry: OK [ 66.381553] Testing event netif_receive_skb_entry: OK [ 66.404400] Testing event napi_gro_receive_entry: OK [ 66.426393] Testing event napi_gro_frags_entry: OK [ 66.449351] Testing event netif_rx: OK [ 66.471362] Testing event netif_receive_skb: OK [ 66.494329] Testing event net_dev_queue: OK [ 66.517230] Testing event net_dev_xmit_timeout: OK [ 66.538525] Testing event net_dev_xmit: OK [ 66.561468] Testing event net_dev_start_xmit: OK [ 66.585363] Testing event skb_copy_datagram_iovec: OK [ 66.607406] Testing event consume_skb: OK [ 66.629887] Testing event kfree_skb: OK [ 66.651575] Testing event netlink_extack: OK [ 66.673248] Testing event bpf_test_finish: OK [ 66.694564] Testing event bpf_trigger_tp: OK [ 66.717304] Testing event icmp_send: OK [ 66.740395] Testing event fib6_table_lookup: OK [ 66.763663] Testing event devlink_trap_report: OK [ 66.785436] Testing event devlink_health_reporter_state_update: OK [ 66.807570] Testing event devlink_health_recover_aborted: OK [ 66.830326] Testing event devlink_health_report: OK [ 66.853464] Testing event devlink_hwerr: OK [ 66.874060] Testing event devlink_hwmsg: OK [ 66.895239] Testing event svc_unregister: OK [ 66.917411] Testing event svc_noregister: OK [ 66.940324] Testing event svc_register: OK [ 66.962247] Testing event cache_entry_no_listener: OK [ 66.983506] Testing event cache_entry_make_negative: OK [ 67.006460] Testing event cache_entry_update: OK [ 67.028384] Testing event cache_entry_upcall: OK [ 67.050394] Testing event cache_entry_expired: OK [ 67.072594] Testing event svcsock_getpeername_err: OK [ 67.096464] Testing event svcsock_accept_err: OK [ 67.118430] Testing event svcsock_tcp_state: OK [ 67.141390] Testing event svcsock_tcp_recv_short: OK [ 67.163537] Testing event svcsock_write_space: OK [ 67.185476] Testing event svcsock_data_ready: OK [ 67.208436] Testing event svcsock_tcp_recv_err: OK [ 67.231511] Testing event svcsock_tcp_recv_eagain: OK [ 67.254385] Testing event svcsock_tcp_recv: OK [ 67.278411] Testing event svcsock_tcp_send: OK [ 67.300319] Testing event svcsock_udp_recv_err: OK [ 67.323414] Testing event svcsock_udp_recv: OK [ 67.346476] Testing event svcsock_udp_send: OK [ 67.368363] Testing event svcsock_marker: OK [ 67.392415] Testing event svcsock_free: OK [ 67.414395] Testing event svcsock_new: OK [ 67.437380] Testing event svc_defer_recv: OK [ 67.460432] Testing event svc_defer_queue: OK [ 67.482392] Testing event svc_defer_drop: OK [ 67.504408] Testing event svc_alloc_arg_err: OK [ 67.525267] Testing event svc_wake_up: OK [ 67.546480] Testing event svc_xprt_accept: OK [ 67.568536] Testing event svc_tls_timed_out: OK [ 67.590458] Testing event svc_tls_not_started: OK [ 67.612502] Testing event svc_tls_unavailable: OK [ 67.635607] Testing event svc_tls_upcall: OK [ 67.659418] Testing event svc_tls_start: OK [ 67.681526] Testing event svc_xprt_free: OK [ 67.704440] Testing event svc_xprt_detach: OK [ 67.727399] Testing event svc_xprt_close: OK [ 67.749517] Testing event svc_xprt_no_write_space: OK [ 67.771382] Testing event svc_xprt_dequeue: OK [ 67.793493] Testing event svc_xprt_enqueue: OK [ 67.815504] Testing event svc_xprt_create_err: OK [ 67.838408] Testing event svc_stats_latency: OK [ 67.861374] Testing event svc_replace_page_err: OK [ 67.882280] Testing event svc_send: OK [ 67.903328] Testing event svc_drop: OK [ 67.925349] Testing event svc_defer: OK [ 67.947291] Testing event svc_process: OK [ 67.971377] Testing event svc_authenticate: OK [ 67.993487] Testing event svc_xdr_sendto: OK [ 68.016371] Testing event svc_xdr_recvfrom: OK [ 68.038417] Testing event rpc_tls_not_started: OK [ 68.061536] Testing event rpc_tls_unavailable: OK [ 68.083415] Testing event rpcb_unregister: OK [ 68.105398] Testing event rpcb_register: OK [ 68.127435] Testing event pmap_register: OK [ 68.150418] Testing event rpcb_setport: OK [ 68.172499] Testing event rpcb_getport: OK [ 68.195382] Testing event xs_stream_read_request: OK [ 68.218339] Testing event xs_stream_read_data: OK [ 68.241376] Testing event xs_data_ready: OK [ 68.263409] Testing event xprt_reserve: OK [ 68.286254] Testing event xprt_put_cong: OK [ 68.309307] Testing event xprt_get_cong: OK [ 68.332303] Testing event xprt_release_cong: OK [ 68.354336] Testing event xprt_reserve_cong: OK [ 68.376327] Testing event xprt_release_xprt: OK [ 68.398267] Testing event xprt_reserve_xprt: OK [ 68.420322] Testing event xprt_ping: OK [ 68.442408] Testing event xprt_retransmit: OK [ 68.464417] Testing event xprt_transmit: OK [ 68.487478] Testing event xprt_lookup_rqst: OK [ 68.509359] Testing event xprt_timer: OK [ 68.531340] Testing event xprt_destroy: OK [ 68.553309] Testing event xprt_disconnect_force: OK [ 68.575491] Testing event xprt_disconnect_done: OK [ 68.597472] Testing event xprt_disconnect_auto: OK [ 68.619864] Testing event xprt_connect: OK [ 68.642369] Testing event xprt_create: OK [ 68.664377] Testing event rpc_socket_nospace: OK [ 68.687579] Testing event rpc_socket_shutdown: OK [ 68.711390] Testing event rpc_socket_close: OK [ 68.735362] Testing event rpc_socket_reset_connection: OK [ 68.757290] Testing event rpc_socket_error: OK [ 68.779417] Testing event rpc_socket_connect: OK [ 68.801715] Testing event rpc_socket_state_change: OK [ 68.824508] Testing event rpc_xdr_alignment: OK [ 68.847631] Testing event rpc_xdr_overflow: OK [ 68.871669] Testing event rpc_stats_latency: OK [ 68.893499] Testing event rpc_call_rpcerror: OK [ 68.915370] Testing event rpc_buf_alloc: OK [ 68.939503] Testing event rpcb_unrecognized_err: OK [ 68.961517] Testing event rpcb_unreachable_err: OK [ 68.983505] Testing event rpcb_bind_version_err: OK [ 69.005639] Testing event rpcb_timeout_err: OK [ 69.028598] Testing event rpcb_prog_unavail_err: OK [ 69.050521] Testing event rpc__auth_tooweak: OK [ 69.072513] Testing event rpc__bad_creds: OK [ 69.096491] Testing event rpc__stale_creds: OK [ 69.118418] Testing event rpc__mismatch: OK [ 69.141530] Testing event rpc__unparsable: OK [ 69.164385] Testing event rpc__garbage_args: OK [ 69.186490] Testing event rpc__proc_unavail: OK [ 69.208339] Testing event rpc__prog_mismatch: OK [ 69.229390] Testing event rpc__prog_unavail: OK [ 69.251329] Testing event rpc_bad_verifier: OK [ 69.273494] Testing event rpc_bad_callhdr: OK [ 69.295654] Testing event rpc_task_wakeup: OK [ 69.319501] Testing event rpc_task_sleep: OK [ 69.342409] Testing event rpc_task_call_done: OK [ 69.364493] Testing event rpc_task_end: OK [ 69.387525] Testing event rpc_task_signalled: OK [ 69.409211] Testing event rpc_task_timeout: OK [ 69.433364] Testing event rpc_task_complete: OK [ 69.456388] Testing event rpc_task_sync_wake: OK [ 69.478377] Testing event rpc_task_sync_sleep: OK [ 69.500509] Testing event rpc_task_run_action: OK [ 69.523404] Testing event rpc_task_begin: OK [ 69.546355] Testing event rpc_request: OK [ 69.569495] Testing event rpc_refresh_status: OK [ 69.592376] Testing event rpc_retry_refresh_status: OK [ 69.614661] Testing event rpc_timeout_status: OK [ 69.637487] Testing event rpc_connect_status: OK [ 69.659556] Testing event rpc_call_status: OK [ 69.681496] Testing event rpc_clnt_clone_err: OK [ 69.703486] Testing event rpc_clnt_new_err: OK [ 69.725506] Testing event rpc_clnt_new: OK [ 69.749189] Testing event rpc_clnt_replace_xprt_err: OK [ 69.770545] Testing event rpc_clnt_replace_xprt: OK [ 69.793515] Testing event rpc_clnt_release: OK [ 69.815235] Testing event rpc_clnt_shutdown: OK [ 69.837490] Testing event rpc_clnt_killall: OK [ 69.860336] Testing event rpc_clnt_free: OK [ 69.883352] Testing event rpc_xdr_reply_pages: OK [ 69.906484] Testing event rpc_xdr_recvfrom: OK [ 69.928404] Testing event rpc_xdr_sendto: OK [ 69.950256] Testing event 9p_fid_ref: OK [ 69.978191] Testing event 9p_protocol_dump: OK [ 70.006668] Testing event 9p_client_res: OK [ 70.029539] Testing event 9p_client_req: OK [ 70.051352] Testing event subflow_check_data_avail: OK [ 70.073525] Testing event ack_update_msk: OK [ 70.096389] Testing event get_mapping_status: OK [ 70.118402] Testing event mptcp_sendmsg_frag: OK [ 70.141484] Testing event mptcp_subflow_get_send: OK [ 70.164776] Testing event mctp_key_release: OK [ 70.187477] Testing event mctp_key_acquire: OK [ 70.209519] Testing event tls_alert_recv: OK [ 70.231390] Testing event tls_alert_send: OK [ 70.254409] Testing event tls_contenttype: OK [ 70.276280] Testing event handshake_cmd_done_err: OK [ 70.298481] Testing event handshake_cmd_done: OK [ 70.321462] Testing event handshake_cmd_accept_err: OK [ 70.343507] Testing event handshake_cmd_accept: OK [ 70.367388] Testing event handshake_notify_err: OK [ 70.389418] Testing event handshake_complete: OK [ 70.413348] Testing event handshake_destruct: OK [ 70.436537] Testing event handshake_cancel_busy: OK [ 70.458495] Testing event handshake_cancel_none: OK [ 70.481392] Testing event handshake_cancel: OK [ 70.503408] Testing event handshake_submit_err: OK [ 70.525368] Testing event handshake_submit: OK [ 70.547314] Testing event ma_write: OK [ 70.571356] Testing event ma_read: OK [ 70.595524] Testing event ma_op: OK [ 70.617741] Running tests on trace event systems: [ 70.618150] Testing event system maple_tree: OK [ 70.645791] Testing event system handshake: OK [ 70.679280] Testing event system mctp: OK [ 70.702853] Testing event system mptcp: OK [ 70.727887] Testing event system 9p: OK [ 70.764862] Testing event system sunrpc: OK [ 70.900599] Testing event system devlink: OK [ 70.929165] Testing event system fib6: OK [ 70.953680] Testing event system icmp: OK [ 70.976412] Testing event system bpf_test_run: OK [ 70.998900] Testing event system netlink: OK [ 71.020407] Testing event system skb: OK [ 71.047267] Testing event system net: OK [ 71.082619] Testing event system napi: OK [ 71.105981] Testing event system sock: OK [ 71.133945] Testing event system udp: OK [ 71.156615] Testing event system tcp: OK [ 71.198190] Testing event system fib: OK [ 71.220667] Testing event system qdisc: OK [ 71.246201] Testing event system bridge: OK [ 71.270004] Testing event system page_pool: OK [ 71.296979] Testing event system neigh: OK [ 71.324874] Testing event system thunderbolt: OK [ 71.348214] Testing event system ras: OK [ 71.375516] Testing event system tsm_mr: OK [ 71.399274] Testing event system amd_cpu: OK [ 71.424278] Testing event system watchdog: OK [ 71.449794] Testing event system thermal: OK [ 71.473531] Testing event system hwmon: OK [ 71.498363] Testing event system smbus: OK [ 71.523684] Testing event system i2c: OK [ 71.547899] Testing event system rtc: OK [ 71.583311] Testing event system ucsi: OK [ 71.608776] Testing event system xhci-hcd: OK [ 71.679877] Testing event system i40e: OK [ 71.710013] Testing event system e1000e_trace: OK [ 71.732528] Testing event system mdio: OK [ 71.754837] Testing event system spi: OK [ 71.785063] Testing event system scsi: OK [ 71.811909] Testing event system dma_fence: OK [ 71.838748] Testing event system dev: OK [ 71.862103] Testing event system regmap: OK [ 71.899183] Testing event system iommu: OK [ 71.926592] Testing event system intel_iommu: OK [ 71.954080] Testing event system clk: OK [ 71.998277] Testing event system pwm: OK [ 72.026652] Testing event system gpio: OK [ 72.050804] Testing event system msr: OK [ 72.123749] Testing event system io_uring: OK [ 72.161179] Testing event system wbt: OK [ 72.186787] Testing event system kyber: OK [ 72.211311] Testing event system block: OK [ 72.251863] Testing event system avc: OK [ 72.275449] Testing event system capability: OK [ 72.297578] Testing event system lockd: OK [ 72.321853] Testing event system nfs: OK [ 72.425927] Testing event system hugetlbfs: OK [ 72.451139] Testing event system fscache: OK [ 72.489873] Testing event system netfs: OK [ 72.560045] Testing event system iomap: OK [ 72.591540] Testing event system filelock: OK [ 72.624258] Testing event system fs_dax: OK [ 72.654716] Testing event system writeback: OK [ 72.702934] Testing event system timestamp: OK [ 72.727792] Testing event system damon: OK [ 72.751942] Testing event system cma: OK [ 72.775765] Testing event system page_isolation: OK [ 72.798547] Testing event system memcg: OK [ 72.822741] Testing event system huge_memory: OK [ 72.848787] Testing event system thp: OK [ 72.872627] Testing event system ksm: OK [ 72.901765] Testing event system vmalloc: OK [ 72.927382] Testing event system tlb: OK [ 72.953162] Testing event system migrate: OK [ 72.977730] Testing event system mmap: OK [ 73.001209] Testing event system mmap_lock: OK [ 73.059069] Testing event system compaction: OK [ 73.093542] Testing event system kmem: OK [ 73.139869] Testing event system percpu: OK [ 73.166043] Testing event system vmscan: OK [ 73.205296] Testing event system pagemap: OK [ 73.227881] Testing event system oom: OK [ 73.255564] Testing event system filemap: OK [ 73.285116] Testing event system rseq: OK [ 73.309852] Testing event system context_tracking: OK [ 73.333907] Testing event system xdp: OK [ 73.368963] Testing event system rv: OK [ 73.394247] Testing event system rpm: OK [ 73.422553] Testing event system power: OK [ 73.477333] Testing event system error_report: OK [ 73.499648] Testing event system bpf_trace: OK [ 73.522965] Testing event system test: OK [ 73.544190] Testing event system osnoise: OK [ 73.570991] Testing event system cgroup: OK [ 73.611937] Testing event system csd: OK [ 73.640605] Testing event system timer_migration: OK [ 73.674023] Testing event system alarmtimer: OK [ 73.698701] Testing event system timer: OK [ 73.735958] Testing event system module: OK [ 73.762312] Testing event system raw_syscalls: OK [ 73.785795] Testing event system swiotlb: OK [ 73.807487] Testing event system dma: OK [ 73.844329] Testing event system rcu: OK [ 73.872398] Testing event system irq_matrix: OK [ 73.902740] Testing event system printk: OK [ 73.926474] Testing event system lock: OK [ 73.960165] Testing event system sched: OK [ 74.011106] Testing event system ipi: OK [ 74.039226] Testing event system notifier: OK [ 74.063311] Testing event system workqueue: OK [ 74.087888] Testing event system signal: OK [ 74.112073] Testing event system irq: OK [ 74.142155] Testing event system cpuhp: OK [ 74.167073] Testing event system task: OK [ 74.191297] Testing event system exceptions: OK [ 74.214951] Testing event system resctrl: OK [ 74.240778] Testing event system mce: OK [ 74.263662] Testing event system x86_fpu: OK [ 74.292512] Testing event system nmi: OK [ 74.314474] Testing event system irq_vectors: OK [ 74.364935] Testing event system syscalls: OK [ 74.392701] Testing event system hyperv: OK [ 74.419202] Testing event system xen: OK [ 74.450271] Testing event system vsyscall: OK [ 74.473561] Testing event system initcall: OK [ 74.498870] Running tests on all trace events: [ 74.499257] Testing all events: OK [ 76.365484] Testing ftrace filter: OK [ 76.367707] trace_kprobe: Testing kprobe tracing: OK [ 76.376089] Loading compiled-in X.509 certificates [ 76.387777] Loaded X.509 cert 'Build time autogenerated kernel key: 00cf0e7b8ccb6cf88b312bc26bde147d981c9cd3' [ 76.412599] Demotion targets for Node 0: null [ 76.412763] page_owner is disabled [ 76.413110] Key type big_key registered [ 76.413753] Key type encrypted registered [ 76.413904] ima: No TPM chip found, activating TPM-bypass! [ 76.414070] Loading compiled-in module X.509 certificates [ 76.415077] Loaded X.509 cert 'Build time autogenerated kernel key: 00cf0e7b8ccb6cf88b312bc26bde147d981c9cd3' [ 76.415323] ima: Allocated hash algorithm: sha256 [ 76.415512] ima: No architecture policies found [ 76.415759] evm: Initialising EVM extended attributes: [ 76.415910] evm: security.selinux [ 76.416032] evm: security.SMACK64 (disabled) [ 76.416167] evm: security.SMACK64EXEC (disabled) [ 76.416304] evm: security.SMACK64TRANSMUTE (disabled) [ 76.416453] evm: security.SMACK64MMAP (disabled) [ 76.416595] evm: security.apparmor [ 76.416715] evm: security.ima [ 76.416829] evm: security.capability [ 76.416953] evm: HMAC attrs: 0x1 [ 76.432678] Running certificate verification RSA selftest [ 76.451757] Loaded X.509 cert 'Certificate verification self-testing key: f58703bb33ce1b73ee02eccdee5b8817518fe3db' [ 76.452809] Running certificate verification ECDSA selftest [ 76.473784] Loaded X.509 cert 'Certificate verification ECDSA self-testing key: 2900bcea1deb7bc8479a84a23d758efdfdd2b2d3' [ 80.351826] igb 0000:01:00.2 eth3: igb: eth3 NIC Link is Up 1000 Mbps Full Duplex, Flow Control: RX [ 80.363544] Sending DHCP requests ., OK [ 80.373705] IP-Config: Got DHCP answer from 192.168.3.1, my address is 192.168.3.193 [ 80.373915] IP-Config: Complete: [ 80.374034] device=eth3, hwaddr=b4:96:91:2e:ca:0e, ipaddr=192.168.3.193, mask=255.255.255.0, gw=192.168.3.200 [ 80.374278] host=lkp-ivb-d01, domain=lkp.intel.com, nis-domain=(none) [ 80.374482] bootserver=192.168.3.200, rootserver=192.168.3.200, rootpath= [ 80.374486] nameserver0=192.168.3.200 [ 80.483349] e1000e 0000:00:19.0 eth0: NIC Link is Down [ 80.616387] clk: Disabling unused clocks [ 80.616584] PM: genpd: Disabling unused power domains [ 80.616754] KTAP version 1 [ 80.616863] 1..21 [ 80.617073] KTAP version 1 [ 80.617191] # Subtest: initramfs [ 80.617315] # module: initramfs_test [ 80.617325] # is_init: true [ 80.617463] 1..6 [ 80.618391] ok 1 initramfs_test_extract [ 80.618596] initramfs name without nulterm: initramfs_test_fname_overrunP [ 80.619157] ok 2 initramfs_test_fname_overrun [ 80.619581] ok 3 initramfs_test_data [ 80.620096] ok 4 initramfs_test_csum [ 80.620633] ok 5 initramfs_test_hardlink [ 80.675548] ok 6 initramfs_test_many [ 80.675704] # initramfs: pass:6 fail:0 skip:0 total:6 [ 80.675841] # Totals: pass:6 fail:0 skip:0 total:6 [ 80.675994] ok 1 initramfs [ 80.676295] KTAP version 1 [ 80.676428] # Subtest: hw_breakpoint [ 80.676565] # module: hw_breakpoint_test [ 80.676574] 1..9 [ 80.677349] ok 1 test_one_cpu [ 80.678200] ok 2 test_many_cpus [ 80.678648] ok 3 test_one_task_on_all_cpus [ 80.679155] ok 4 test_two_tasks_on_all_cpus [ 80.679569] ok 5 test_one_task_on_one_cpu [ 80.679985] ok 6 test_one_task_mixed [ 80.680550] ok 7 test_two_tasks_on_one_cpu [ 80.681058] ok 8 test_two_tasks_on_one_all_cpus [ 80.681537] ok 9 test_task_on_all_and_one_cpu [ 80.681708] # hw_breakpoint: pass:9 fail:0 skip:0 total:9 [ 80.681858] # Totals: pass:9 fail:0 skip:0 total:9 [ 80.682016] ok 2 hw_breakpoint [ 80.682329] KTAP version 1 [ 80.682471] # Subtest: damon [ 80.682590] # module: core [ 80.682599] 1..17 [ 80.683007] ok 1 damon_test_target [ 80.683154] ok 2 damon_test_regions [ 80.683480] ok 3 damon_test_aggregate [ 80.683749] ok 4 damon_test_split_at [ 80.684014] ok 5 damon_test_merge_two [ 80.684301] ok 6 damon_test_merge_regions_of [ 80.684605] ok 7 damon_test_split_regions_of [ 80.684873] ok 8 damon_test_ops_registration [ 80.685158] ok 9 damon_test_set_regions [ 80.685439] ok 10 damon_test_nr_accesses_to_accesses_bp [ 80.685764] ok 11 damon_test_update_monitoring_result [ 80.686053] ok 12 damon_test_set_attrs [ 80.686335] ok 13 damon_test_moving_sum [ 80.686689] ok 14 damos_test_new_filter [ 80.686970] ok 15 damos_test_filter_out [ 80.687237] ok 16 damon_test_feed_loop_next_input [ 80.687547] ok 17 damon_test_set_filters_default_reject [ 80.687700] # damon: pass:17 fail:0 skip:0 total:17 [ 80.687863] # Totals: pass:17 fail:0 skip:0 total:17 [ 80.688014] ok 3 damon [ 80.688301] KTAP version 1 [ 80.688429] # Subtest: damon-operations [ 80.688575] # module: vaddr [ 80.688584] 1..6 [ 80.689075] ok 1 damon_test_three_regions_in_vmas [ 80.690407] ok 2 damon_test_apply_three_regions1 [ 80.690871] ok 3 damon_test_apply_three_regions2 [ 80.691227] ok 4 damon_test_apply_three_regions3 [ 80.691660] ok 5 damon_test_apply_three_regions4 [ 80.692074] ok 6 damon_test_split_evenly [ 80.692227] # damon-operations: pass:6 fail:0 skip:0 total:6 [ 80.692368] # Totals: pass:6 fail:0 skip:0 total:6 [ 80.692555] ok 4 damon-operations [ 80.692844] KTAP version 1 [ 80.692960] # Subtest: damon-sysfs [ 80.693087] # module: sysfs [ 80.693094] 1..1 [ 80.693585] ok 1 damon_sysfs_test_add_targets [ 80.693594] ok 5 damon-sysfs [ 80.693871] KTAP version 1 [ 80.693985] # Subtest: exec [ 80.694103] # module: exec [ 80.694110] 1..1 [ 80.694657] ok 1 exec_test_bprm_stack_limits [ 80.694666] ok 6 exec [ 80.694942] KTAP version 1 [ 80.695057] # Subtest: binfmt_elf [ 80.695181] # module: binfmt_elf [ 80.695188] 1..1 [ 80.695794] ok 1 total_mapping_size_test [ 80.695809] ok 7 binfmt_elf [ 80.696097] KTAP version 1 [ 80.696215] # Subtest: compat_binfmt_elf [ 80.696353] # module: compat_binfmt_elf [ 80.696365] 1..1 [ 80.696852] ok 1 total_mapping_size_test [ 80.696862] ok 8 compat_binfmt_elf [ 80.697157] KTAP version 1 [ 80.697273] # Subtest: fprobe_test [ 80.697893] # module: test_fprobe [ 80.698440] 1..5 [ 80.747934] ok 1 test_fprobe_entry [ 80.796620] ok 2 test_fprobe [ 80.812611] ok 3 test_fprobe_syms [ 80.861379] ok 4 test_fprobe_data [ 80.910072] ok 5 test_fprobe_skip [ 80.910219] # fprobe_test: pass:5 fail:0 skip:0 total:5 [ 80.910354] # Totals: pass:5 fail:0 skip:0 total:5 [ 80.910526] ok 9 fprobe_test [ 80.910829] KTAP version 1 [ 80.910943] # Subtest: qos-kunit-test [ 80.911075] # module: qos_test [ 80.911083] 1..3 [ 80.911458] ok 1 freq_qos_test_min [ 80.911601] ok 2 freq_qos_test_maxdef [ 80.911862] ok 3 freq_qos_test_readd [ 80.912001] # qos-kunit-test: pass:3 fail:0 skip:0 total:3 [ 80.912136] # Totals: pass:3 fail:0 skip:0 total:3 [ 80.912298] ok 10 qos-kunit-test [ 80.912598] KTAP version 1 [ 80.912714] # Subtest: VCAP_API_DebugFS_Testsuite [ 80.912862] # module: vcap [ 80.912873] 1..4 [ 80.913170] ================================================================== [ 80.913373] BUG: KASAN: stack-out-of-bounds in test_cache_read+0x3ac/0x3f0 [ 80.913568] Read of size 4 at addr ffffc900090ffcc0 by task kunit_try_catch/2793 [ 80.913868] CPU: 6 UID: 0 PID: 2793 Comm: kunit_try_catch Tainted: G N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 80.913874] Tainted: [N]=TEST [ 80.913875] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 80.913877] Call Trace: [ 80.913879] [ 80.913881] dump_stack_lvl+0x4f/0x70 [ 80.913886] print_address_description.constprop.0+0x2c/0x3b0 [ 80.913890] ? test_cache_read+0x3ac/0x3f0 [ 80.913893] print_report+0xb9/0x280 [ 80.913896] ? test_cache_read+0x3ac/0x3f0 [ 80.913899] ? kasan_addr_to_slab+0x9/0x90 [ 80.913902] ? test_cache_read+0x3ac/0x3f0 [ 80.913904] kasan_report+0xda/0x110 [ 80.913907] ? test_cache_read+0x3ac/0x3f0 [ 80.913911] test_cache_read+0x3ac/0x3f0 [ 80.913913] ? get_nohz_timer_target+0x2e/0x350 [ 80.913917] vcap_addr_keysets+0x168/0x390 [ 80.913920] ? __asan_memset+0x1f/0x40 [ 80.913923] vcap_api_addr_keyset_test+0x2b3/0x790 [ 80.913926] ? timerqueue_del+0x64/0x120 [ 80.913930] ? __pfx_vcap_api_addr_keyset_test+0x10/0x10 [ 80.913932] ? hrtimer_try_to_cancel.part.0+0xfe/0x340 [ 80.913936] ? switch_hrtimer_base+0x3c7/0x710 [ 80.913941] ? __perf_event_task_sched_in+0x264/0x420 [ 80.913944] ? __pfx___perf_event_task_sched_in+0x10/0x10 [ 80.913947] ? __perf_event_task_sched_out+0x96/0x1a0 [ 80.913950] ? __pfx___perf_event_task_sched_out+0x10/0x10 [ 80.913954] ? __switch_to+0x526/0x1000 [ 80.913958] ? __pfx_read_tsc+0x10/0x10 [ 80.913961] ? ktime_get_ts64+0x7f/0x220 [ 80.913963] ? __pfx___schedule+0x10/0x10 [ 80.913967] kunit_try_run_case+0x175/0x440 [ 80.913970] ? __pfx_kunit_try_run_case+0x10/0x10 [ 80.913973] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 80.913977] ? __pfx_kunit_try_run_case+0x10/0x10 [ 80.913979] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 80.913982] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 80.913986] kthread+0x3b4/0x780 [ 80.913989] ? __pfx_kthread+0x10/0x10 [ 80.913992] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 80.913996] ? __pfx_kthread+0x10/0x10 [ 80.913999] ? __pfx_kthread+0x10/0x10 [ 80.914002] ret_from_fork+0x22c/0x300 [ 80.914006] ? __pfx_kthread+0x10/0x10 [ 80.914009] ret_from_fork_asm+0x1a/0x30 [ 80.914013] [ 80.920464] The buggy address belongs to stack of task kunit_try_catch/2793 [ 80.920649] and is located at offset 560 in frame: [ 80.920794] vcap_api_addr_keyset_test+0x0/0x790 [ 80.921027] This frame has 7 objects: [ 80.921152] [32, 48) 'matches' [ 80.921154] [64, 88) '__assertion' [ 80.921273] [128, 288) 'admin' [ 80.921395] [352, 392) 'keysets' [ 80.921511] [432, 480) 'keydata' [ 80.921631] [512, 560) 'mskdata' [ 80.921749] [592, 640) 'actdata' [ 80.922068] The buggy address belongs to the virtual mapping at [ffffc900090f8000, ffffc90009101000) created by: dup_task_struct+0x59/0x630 [ 80.922515] The buggy address belongs to the physical page: [ 80.922671] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415caa [ 80.922877] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 80.923060] raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 80.923260] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 80.923476] page dumped because: kasan: bad access detected [ 80.923719] Memory state around the buggy address: [ 80.923862] ffffc900090ffb80: 00 00 00 00 00 00 f2 f2 f2 f2 f2 f2 f2 f2 00 00 [ 80.924054] ffffc900090ffc00: 00 00 00 f2 f2 f2 f2 f2 00 00 00 00 00 00 f2 f2 [ 80.924245] >ffffc900090ffc80: f2 f2 00 00 00 00 00 00 f2 f2 f2 f2 00 00 00 00 [ 80.924435] ^ [ 80.924587] ffffc900090ffd00: 00 00 f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 [ 80.924776] ffffc900090ffd80: 00 00 00 f1 f1 f1 f1 00 00 f2 f2 00 00 f2 f2 00 [ 80.924970] ================================================================== [ 80.925201] Disabling lock debugging due to kernel taint [ 80.925656] not ok 1 vcap_api_addr_keyset_test [ 80.925851] # vcap_api_show_admin_raw_test: EXPECTATION FAILED at drivers/net/ethernet/microchip/vcap/vcap_api_debugfs_kunit.c:377 Expected test_expected == test_pr_buffer[0], but test_expected == " addr: 786, X6 rule, keysets: VCAP_KFS_MAC_ETYPE " test_pr_buffer[0] == "" [ 80.926182] not ok 2 vcap_api_show_admin_raw_test [ 80.927261] ok 3 vcap_api_show_admin_test [ 80.927830] ok 4 vcap_api_show_admin_rule_test [ 80.927973] # VCAP_API_DebugFS_Testsuite: pass:2 fail:2 skip:0 total:4 [ 80.928124] # Totals: pass:2 fail:2 skip:0 total:4 [ 80.928309] not ok 11 VCAP_API_DebugFS_Testsuite [ 80.928670] KTAP version 1 [ 80.928784] # Subtest: VCAP_API_Encoding_Testsuite [ 80.928933] # module: vcap [ 80.928941] 1..17 [ 80.929369] ok 1 vcap_api_set_bit_1_test [ 80.929595] ok 2 vcap_api_set_bit_0_test [ 80.929955] ok 3 vcap_api_iterator_init_test [ 80.930247] ok 4 vcap_api_iterator_next_test [ 80.930631] ok 5 vcap_api_encode_typegroups_test [ 80.930983] ok 6 vcap_api_encode_bit_test [ 80.931267] ok 7 vcap_api_encode_field_test [ 80.931594] ok 8 vcap_api_encode_short_field_test [ 80.931891] ok 9 vcap_api_encode_keyfield_test [ 80.932180] ok 10 vcap_api_encode_max_keyfield_test [ 80.932507] ok 11 vcap_api_encode_actionfield_test [ 80.932832] ok 12 vcap_api_keyfield_typegroup_test [ 80.933116] ok 13 vcap_api_actionfield_typegroup_test [ 80.933404] ok 14 vcap_api_vcap_keyfields_test [ 80.933837] ok 15 vcap_api_vcap_actionfields_test [ 80.934048] vcap_encode_rule_keyset:670: no keyfields in the rule [ 80.934543] ok 16 vcap_api_encode_rule_keyset_test [ 80.934655] vcap_encode_rule_actionset:829: no actionfields in the rule [ 80.935099] ok 17 vcap_api_encode_rule_actionset_test [ 80.935108] # VCAP_API_Encoding_Testsuite: pass:17 fail:0 skip:0 total:17 [ 80.935270] # Totals: pass:17 fail:0 skip:0 total:17 [ 80.935464] ok 12 VCAP_API_Encoding_Testsuite [ 80.935782] KTAP version 1 [ 80.935897] # Subtest: VCAP_API_Rule_Value_Testsuite [ 80.936050] # module: vcap [ 80.936058] 1..2 [ 80.936600] ok 1 vcap_api_rule_add_keyvalue_test [ 80.936930] ok 2 vcap_api_rule_add_actionvalue_test [ 80.937085] # VCAP_API_Rule_Value_Testsuite: pass:2 fail:0 skip:0 total:2 [ 80.937242] # Totals: pass:2 fail:0 skip:0 total:2 [ 80.937435] ok 13 VCAP_API_Rule_Value_Testsuite [ 80.937751] KTAP version 1 [ 80.937865] # Subtest: VCAP_API_Full_Rule_Testsuite [ 80.938024] # module: vcap [ 80.938034] 1..4 [ 80.939073] ok 1 vcap_api_rule_find_keyset_basic_test [ 80.939226] ok 2 vcap_api_rule_find_keyset_failed_test [ 80.939628] ok 3 vcap_api_rule_find_keyset_many_test [ 80.939927] vcap_rule_add_key:2679: keyfield ETYPE_LEN_IS is already in the rule [ 80.940505] ok 4 vcap_api_encode_rule_test [ 80.940515] # VCAP_API_Full_Rule_Testsuite: pass:4 fail:0 skip:0 total:4 [ 80.940662] # Totals: pass:4 fail:0 skip:0 total:4 [ 80.940851] ok 14 VCAP_API_Full_Rule_Testsuite [ 80.941164] KTAP version 1 [ 80.941279] # Subtest: VCAP_API_Support_Testsuite [ 80.941441] # module: vcap [ 80.941458] 1..4 [ 80.941866] ok 1 vcap_api_next_lookup_basic_test [ 80.942043] ok 2 vcap_api_next_lookup_advanced_test [ 80.942355] ok 3 vcap_api_filter_unsupported_keys_test [ 80.943010] ok 4 vcap_api_filter_keylist_test [ 80.943173] # VCAP_API_Support_Testsuite: pass:4 fail:0 skip:0 total:4 [ 80.943321] # Totals: pass:4 fail:0 skip:0 total:4 [ 80.943531] ok 15 VCAP_API_Support_Testsuite [ 80.943838] KTAP version 1 [ 80.943955] # Subtest: VCAP_API_Rule_Counter_Testsuite [ 80.944109] # module: vcap [ 80.944117] 1..2 [ 80.944461] vcap_api_set_rule_counter_test:1488 [ 80.944612] vcap_api_set_rule_counter_test:1490 [ 80.944890] ok 1 vcap_api_set_rule_counter_test [ 80.945073] ok 2 vcap_api_get_rule_counter_test [ 80.945225] # VCAP_API_Rule_Counter_Testsuite: pass:2 fail:0 skip:0 total:2 [ 80.945376] # Totals: pass:2 fail:0 skip:0 total:2 [ 80.945581] ok 16 VCAP_API_Rule_Counter_Testsuite [ 80.945904] KTAP version 1 [ 80.946020] # Subtest: VCAP_API_Rule_Insert_Testsuite [ 80.946174] # module: vcap [ 80.946182] 1..2 [ 80.946713] ok 1 vcap_api_rule_insert_in_order_test [ 80.946995] ok 2 vcap_api_rule_insert_reverse_order_test [ 80.947151] # VCAP_API_Rule_Insert_Testsuite: pass:2 fail:0 skip:0 total:2 [ 80.947312] # Totals: pass:2 fail:0 skip:0 total:2 [ 80.947526] ok 17 VCAP_API_Rule_Insert_Testsuite [ 80.947841] KTAP version 1 [ 80.947956] # Subtest: VCAP_API_Rule_Remove_Testsuite [ 80.948108] # module: vcap [ 80.948115] 1..3 [ 80.948708] ok 1 vcap_api_rule_remove_at_end_test [ 80.948981] ok 2 vcap_api_rule_remove_in_middle_test [ 80.949348] ok 3 vcap_api_rule_remove_in_front_test [ 80.949531] # VCAP_API_Rule_Remove_Testsuite: pass:3 fail:0 skip:0 total:3 [ 80.949687] # Totals: pass:3 fail:0 skip:0 total:3 [ 80.949875] ok 18 VCAP_API_Rule_Remove_Testsuite [ 80.950185] KTAP version 1 [ 80.950300] # Subtest: VCAP_API_Rule_Enable_Testsuite [ 80.950477] # module: vcap [ 80.950493] 1..1 [ 80.950867] ok 1 vcap_api_rule_chain_path_test [ 80.950876] ok 19 VCAP_API_Rule_Enable_Testsuite [ 80.951243] KTAP version 1 [ 80.951359] # Subtest: thunderbolt [ 80.951509] # module: thunderbolt [ 80.951517] 1..39 [ 80.952073] ok 1 tb_test_path_basic [ 80.952487] ok 2 tb_test_path_not_connected_walk [ 80.953011] ok 3 tb_test_path_single_hop_walk [ 80.953697] ok 4 tb_test_path_daisy_chain_walk [ 80.954623] ok 5 tb_test_path_simple_tree_walk [ 80.956287] ok 6 tb_test_path_complex_tree_walk [ 80.958304] ok 7 tb_test_path_max_length_walk [ 80.959138] ok 8 tb_test_path_not_connected [ 80.959792] ok 9 tb_test_path_not_bonded_lane0 [ 80.960331] ok 10 tb_test_path_not_bonded_lane1 [ 80.961211] ok 11 tb_test_path_not_bonded_lane1_chain [ 80.962157] ok 12 tb_test_path_not_bonded_lane1_chain_reverse [ 80.963479] ok 13 tb_test_path_mixed_chain [ 80.964570] ok 14 tb_test_path_mixed_chain_reverse [ 80.965278] ok 15 tb_test_tunnel_pcie [ 80.965914] ok 16 tb_test_tunnel_dp [ 80.967189] ok 17 tb_test_tunnel_dp_chain [ 80.968338] ok 18 tb_test_tunnel_dp_tree [ 80.970527] ok 19 tb_test_tunnel_dp_max_length [ 80.971766] ok 20 tb_test_tunnel_3dp [ 80.973055] ok 21 tb_test_tunnel_port_on_path [ 80.973791] ok 22 tb_test_tunnel_usb3 [ 80.974248] ok 23 tb_test_tunnel_dma [ 80.974706] ok 24 tb_test_tunnel_dma_rx [ 80.975134] ok 25 tb_test_tunnel_dma_tx [ 80.975867] ok 26 tb_test_tunnel_dma_chain [ 80.976337] ok 27 tb_test_tunnel_dma_match [ 80.977005] ok 28 tb_test_credit_alloc_legacy_not_bonded [ 80.977608] ok 29 tb_test_credit_alloc_legacy_bonded [ 80.978202] ok 30 tb_test_credit_alloc_pcie [ 80.978813] ok 31 tb_test_credit_alloc_without_dp [ 80.979383] ok 32 tb_test_credit_alloc_dp [ 80.980063] ok 33 tb_test_credit_alloc_usb3 [ 80.980665] ok 34 tb_test_credit_alloc_dma [ 80.981315] ok 35 tb_test_credit_alloc_dma_multiple [ 80.982050] ok 36 tb_test_credit_alloc_all [ 80.982444] ok 37 tb_test_property_parse [ 80.982864] ok 38 tb_test_property_format [ 80.983299] ok 39 tb_test_property_copy [ 80.983466] # thunderbolt: pass:39 fail:0 skip:0 total:39 [ 80.983605] # Totals: pass:39 fail:0 skip:0 total:39 [ 80.983765] ok 20 thunderbolt [ 80.984080] KTAP version 1 [ 80.984195] # Subtest: mctp [ 80.984311] # module: mctp [ 80.984319] 1..13 [ 80.984555] KTAP version 1 [ 80.984680] # Subtest: mctp_test_fragment [ 80.984963] ok 1 mtu 63 len 68 -> 1 frags [ 80.985326] ok 2 mtu 64 len 68 -> 1 frags [ 80.985709] ok 3 mtu 65 len 68 -> 2 frags [ 80.986042] ok 4 mtu 66 len 68 -> 2 frags [ 80.986356] ok 5 mtu 127 len 68 -> 2 frags [ 80.986977] ok 6 mtu 128 len 68 -> 2 frags [ 80.987342] ok 7 mtu 129 len 68 -> 3 frags [ 80.987784] ok 8 mtu 130 len 68 -> 3 frags [ 80.987935] # mctp_test_fragment: pass:8 fail:0 skip:0 total:8 [ 80.988085] ok 1 mctp_test_fragment [ 80.988259] KTAP version 1 [ 80.988544] # Subtest: mctp_test_rx_input [ 81.001975] ok 1 {1,a,8,0} [ 81.022117] ok 2 {1,a,9,0} [ 81.046999] ok 3 {2,a,8,0} [ 81.047138] # mctp_test_rx_input: pass:3 fail:0 skip:0 total:3 [ 81.047267] ok 2 mctp_test_rx_input [ 81.047453] KTAP version 1 [ 81.047701] # Subtest: mctp_test_route_input_sk [ 81.071057] ok 1 {1,a,8,c8} type 0 [ 81.095115] ok 2 {1,a,8,c8} type 1 [ 81.119954] ok 3 {1,a,8,c0} type 0 [ 81.141064] ok 4 {1,a,8,48} type 0 [ 81.164053] ok 5 {1,a,8,8} type 0 [ 81.188048] ok 6 {1,a,8,0} type 0 [ 81.188197] # mctp_test_route_input_sk: pass:6 fail:0 skip:0 total:6 [ 81.188333] ok 3 mctp_test_route_input_sk [ 81.188533] KTAP version 1 [ 81.188794] # Subtest: mctp_test_route_input_sk_reasm [ 81.212078] ok 1 single packet [ 81.235077] ok 2 single packet, offset seq [ 81.258944] ok 3 start & end packets [ 81.278127] ok 4 start & end packets, offset seq [ 81.301100] ok 5 start & end packets, out of order [ 81.321947] ok 6 start, middle & end packets [ 81.345061] ok 7 missing seq [ 81.369044] ok 8 seq wrap [ 81.369186] # mctp_test_route_input_sk_reasm: pass:8 fail:0 skip:0 total:8 [ 81.369311] ok 4 mctp_test_route_input_sk_reasm [ 81.369532] KTAP version 1 [ 81.369795] # Subtest: mctp_test_route_input_sk_keys [ 81.394024] ok 1 direct match [ 81.416921] ok 2 flipped src/dest [ 81.433895] ok 3 peer addr mismatch [ 81.448928] ok 4 tag value mismatch [ 81.467101] ok 5 TO mismatch [ 81.491911] ok 6 broadcast response [ 81.508928] ok 7 any local match [ 81.509077] # mctp_test_route_input_sk_keys: pass:7 fail:0 skip:0 total:7 [ 81.509215] ok 5 mctp_test_route_input_sk_keys [ 81.528068] ok 6 mctp_test_route_input_sk_fail_single [ 81.552065] ok 7 mctp_test_route_input_sk_fail_frag [ 81.579021] ok 8 mctp_test_route_input_multiple_nets_bind [ 81.618015] ok 9 mctp_test_route_input_multiple_nets_key [ 81.636109] ok 10 mctp_test_packet_flow [ 81.656067] ok 11 mctp_test_fragment_flow [ 81.680089] ok 12 mctp_test_route_output_key_create [ 81.680984] pkt1 skb len=7 headroom=0 headlen=7 tailroom=377 mac=(-1,-1) mac_len=0 net=(0,-1) trans=-1 shinfo(txflags=0 nr_frags=0 gso(size=0 type=0 segs=0)) csum(0x0 start=0 offset=0 ip_summed=0 complete_sw=0 valid=0 level=0) hash(0x0 sw=0 l4=0) proto=0x0000 pkttype=0 iif=0 priority=0x0 mark=0x0 alloc_cpu=6 vlan_all=0x0 encapsulation=0 inner(proto=0x0000, mac=0, net=0, trans=0) [ 81.682457] pkt1 dev name=mctptest0 feat=0x0000000000004000 [ 81.682628] pkt1 skb linear: 00000000: 01 08 0a 88 00 00 00 [ 81.682790] pkt2 skb len=7 headroom=7 headlen=7 tailroom=370 mac=(-1,-1) mac_len=0 net=(7,-1) trans=-1 shinfo(txflags=0 nr_frags=0 gso(size=0 type=0 segs=0)) csum(0x0 start=0 offset=0 ip_summed=0 complete_sw=0 valid=0 level=0) hash(0x0 sw=0 l4=0) proto=0x0000 pkttype=0 iif=0 priority=0x0 mark=0x0 alloc_cpu=6 vlan_all=0x0 encapsulation=0 inner(proto=0x0000, mac=0, net=0, trans=0) [ 81.683682] pkt2 dev name=mctptest0 feat=0x0000000000004000 [ 81.683839] pkt2 skb linear: 00000000: 01 08 0a 18 11 11 11 [ 81.683998] pkt3 skb len=7 headroom=14 headlen=7 tailroom=363 mac=(-1,-1) mac_len=0 net=(14,-1) trans=-1 shinfo(txflags=0 nr_frags=0 gso(size=0 type=0 segs=0)) csum(0x0 start=0 offset=0 ip_summed=0 complete_sw=0 valid=0 level=0) hash(0x0 sw=0 l4=0) proto=0x0000 pkttype=0 iif=0 priority=0x0 mark=0x0 alloc_cpu=6 vlan_all=0x0 encapsulation=0 inner(proto=0x0000, mac=0, net=0, trans=0) [ 81.684887] pkt3 dev name=mctptest0 feat=0x0000000000004000 [ 81.685044] pkt3 skb linear: 00000000: 01 08 0a 68 22 22 22 [ 81.685201] pkt4 skb len=7 headroom=21 headlen=7 tailroom=356 mac=(-1,-1) mac_len=0 net=(21,-1) trans=-1 shinfo(txflags=0 nr_frags=0 gso(size=0 type=0 segs=0)) csum(0x0 start=0 offset=0 ip_summed=0 complete_sw=0 valid=0 level=0) hash(0x0 sw=0 l4=0) proto=0x0000 pkttype=0 iif=0 priority=0x0 mark=0x0 alloc_cpu=6 vlan_all=0x0 encapsulation=0 inner(proto=0x0000, mac=0, net=0, trans=0) [ 81.686099] pkt4 dev name=mctptest0 feat=0x0000000000004000 [ 81.686253] pkt4 skb linear: 00000000: 01 08 0a 88 00 33 33 [ 81.686417] pkt5 skb len=7 headroom=28 headlen=7 tailroom=349 mac=(-1,-1) mac_len=0 net=(28,-1) trans=-1 shinfo(txflags=0 nr_frags=0 gso(size=0 type=0 segs=0)) csum(0x0 start=0 offset=0 ip_summed=0 complete_sw=0 valid=0 level=0) hash(0x0 sw=0 l4=0) proto=0x0000 pkttype=0 iif=0 priority=0x0 mark=0x0 alloc_cpu=6 vlan_all=0x0 encapsulation=0 inner(proto=0x0000, mac=0, net=0, trans=0) [ 81.687323] pkt5 dev name=mctptest0 feat=0x0000000000004000 [ 81.687501] pkt5 skb linear: 00000000: 01 08 0a 58 44 44 44 [ 81.704059] ok 13 mctp_test_route_input_cloned_frag [ 81.704076] # mctp: pass:13 fail:0 skip:0 total:13 [ 81.704238] # Totals: pass:40 fail:0 skip:0 total:40 [ 81.704388] ok 21 mctp [ 81.715490] Freeing unused decrypted memory: 2028K [ 81.719191] Freeing unused kernel image (initmem) memory: 8232K [ 81.719855] Write protecting the kernel read-only data: 69632k [ 81.721684] Freeing unused kernel image (text/rodata gap) memory: 1076K [ 81.722402] Freeing unused kernel image (rodata/data gap) memory: 548K [ 81.775938] x86/mm: Checked W+X mappings: passed, no W+X pages found. [ 81.776112] x86/mm: Checking user space page tables [ 81.825079] x86/mm: Checked W+X mappings: passed, no W+X pages found. [ 81.825271] Run /init as init process [ 81.825398] with arguments: [ 81.825517] /init [ 81.825617] nokaslr [ 81.825722] with environment: [ 81.825841] HOME=/ [ 81.825944] TERM=linux [ 81.826053] RESULT_ROOT=/result/kunit/group-03/lkp-ivb-d01/debian-12-x86_64-20240206.cgz/x86_64-rhel-9.4-kunit/gcc-12/adcc3bfa8806761ac21aa271f78454113ec6936e/0 [ 81.826374] BOOT_IMAGE=/pkg/linux/x86_64-rhel-9.4-kunit/gcc-12/adcc3bfa8806761ac21aa271f78454113ec6936e/vmlinuz-6.16.0-rc5-00045-gadcc3bfa8806 [ 81.826666] branch=linux-next/master [ 81.826795] job=/lkp/jobs/scheduled/lkp-ivb-d01/kunit-group-03-debian-12-x86_64-20240206.cgz-adcc3bfa8806-20250801-40427-b4iy2g-1.yaml [ 81.827070] user=lkp [ 81.827177] ARCH=x86_64 [ 81.827288] kconfig=x86_64-rhel-9.4-kunit [ 81.827427] commit=adcc3bfa8806761ac21aa271f78454113ec6936e [ 81.827588] max_uptime=6000 [ 81.827705] LKP_SERVER=internal-lkp-server [ 81.827842] prompt_ramdisk=0 [ 81.827960] vga=normal [ 81.828070] kexec_jump_back_entry=0x45a6a88f1d511335 [ 81.838345] systemd[1]: RTC configured in localtime, applying delta of 0 minutes to system time. [ 82.119481] device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. [ 82.119935] device-mapper: uevent: version 1.0.3 [ 82.121224] device-mapper: ioctl: 4.50.0-ioctl (2025-04-28) initialised: dm-devel@lists.linux.dev [ 82.122750] loop: module loaded [ 82.198971] ACPI: bus type drm_connector registered [ 82.206881] fuse: init (API version 7.44) [ 82.733835] EDAC ie31200: No ECC support [ 82.736443] EDAC ie31200: No ECC support [ 82.762643] input: PC Speaker as /devices/platform/pcspkr/input/input2 [ 82.780868] iTCO_wdt iTCO_wdt.1.auto: Found a Panther Point TCO device (Version=2, TCOBASE=0x0460) [ 82.785349] iTCO_wdt iTCO_wdt.1.auto: initialized. heartbeat=30 sec (nowayout=0) [ 82.786605] ACPI Warning: SystemIO range 0x0000000000000428-0x000000000000042F conflicts with OpRegion 0x0000000000000400-0x000000000000047F (\PMIO) (20250404/utaddress-204) [ 82.786994] ACPI: OSL: Resource conflict; ACPI support missing from driver? [ 82.787259] ACPI Warning: SystemIO range 0x0000000000000540-0x000000000000054F conflicts with OpRegion 0x0000000000000500-0x0000000000000563 (\GPIO) (20250404/utaddress-204) [ 82.787657] ACPI: OSL: Resource conflict; ACPI support missing from driver? [ 82.787883] ACPI Warning: SystemIO range 0x0000000000000530-0x000000000000053F conflicts with OpRegion 0x0000000000000500-0x0000000000000563 (\GPIO) (20250404/utaddress-204) [ 82.788265] ACPI: OSL: Resource conflict; ACPI support missing from driver? [ 82.788505] ACPI Warning: SystemIO range 0x0000000000000500-0x000000000000052F conflicts with OpRegion 0x0000000000000500-0x0000000000000563 (\GPIO) (20250404/utaddress-204) [ 82.788887] ACPI: OSL: Resource conflict; ACPI support missing from driver? [ 82.789091] lpc_ich: Resource conflict(s) found affecting gpio_ich [ 82.816044] i801_smbus 0000:00:1f.3: SMBus using PCI interrupt [ 82.816188] libata version 3.00 loaded. [ 82.832926] i2c i2c-4: Successfully instantiated SPD at 0x50 [ 82.834094] i2c i2c-4: Successfully instantiated SPD at 0x51 [ 82.834765] i2c i2c-4: Successfully instantiated SPD at 0x52 [ 82.835784] i2c i2c-4: Successfully instantiated SPD at 0x53 [ 82.859167] RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 163840 ms ovfl timer [ 82.859402] RAPL PMU: hw unit of domain pp0-core 2^-16 Joules [ 82.859605] RAPL PMU: hw unit of domain package 2^-16 Joules [ 82.859781] RAPL PMU: hw unit of domain pp1-gpu 2^-16 Joules [ 82.863611] Error: Driver 'pcspkr' is already registered, aborting... [ 82.866131] ahci 0000:00:1f.2: AHCI vers 0001.0300, 32 command slots, 6 Gbps, SATA mode [ 82.866371] ahci 0000:00:1f.2: 2/6 ports implemented (port mask 0x28) [ 82.866586] ahci 0000:00:1f.2: flags: 64bit ncq pm led clo pio slum part ems apst [ 82.874803] scsi host0: ahci [ 82.876935] scsi host1: ahci [ 82.878812] scsi host2: ahci [ 82.881204] scsi host3: ahci [ 82.883493] scsi host4: ahci [ 82.885798] scsi host5: ahci [ 82.887225] ata1: DUMMY [ 82.887342] ata2: DUMMY [ 82.887480] ata3: DUMMY [ 82.887594] ata4: SATA max UDMA/133 abar m2048@0xf7c36000 port 0xf7c36280 irq 71 lpm-pol 0 [ 82.887814] ata5: DUMMY [ 82.887928] ata6: SATA max UDMA/133 abar m2048@0xf7c36000 port 0xf7c36380 irq 71 lpm-pol 0 ext [ 82.890299] ahci 0000:06:00.0: AHCI vers 0001.0000, 32 command slots, 6 Gbps, SATA mode [ 82.890549] ahci 0000:06:00.0: 2/2 ports implemented (port mask 0x3) [ 82.890733] ahci 0000:06:00.0: flags: 64bit ncq sntf led only pmp fbs pio slum part sxs [ 82.895332] scsi host6: ahci [ 82.897631] scsi host7: ahci [ 82.899013] ata7: SATA max UDMA/133 abar m512@0xf7920000 port 0xf7920100 irq 72 lpm-pol 0 ext [ 82.899246] ata8: SATA max UDMA/133 abar m512@0xf7920000 port 0xf7920180 irq 72 lpm-pol 0 ext [ 83.196960] ata6: SATA link down (SStatus 0 SControl 300) [ 83.205184] ata7: SATA link down (SStatus 0 SControl 300) [ 83.247831] IPMI message handler: version 39.2 [ 83.349479] ata4: SATA link up 3.0 Gbps (SStatus 123 SControl 300) [ 83.359481] ata8: SATA link up 6.0 Gbps (SStatus 133 SControl 300) [ 83.359916] ata8.00: Model 'INTEL SSDSC2BB800G4', rev 'D2010370', applying quirks: zeroaftertrim [ 83.360288] ata8.00: ATA-9: INTEL SSDSC2BB800G4, D2010370, max UDMA/133 [ 83.360533] ata8.00: 1562824368 sectors, multi 1: LBA48 NCQ (depth 32) [ 83.361130] ata8.00: configured for UDMA/133 [ 83.365372] ata4.00: ACPI cmd f5/00:00:00:00:00:00(SECURITY FREEZE LOCK) filtered out [ 83.365666] ata4.00: ACPI cmd b1/c1:00:00:00:00:00(DEVICE CONFIGURATION OVERLAY) filtered out [ 83.366651] ata4.00: ATA-8: WDC WD10EACS-22D6B0, 01.01A01, max UDMA/133 [ 83.366953] ata4.00: 1953525168 sectors, multi 16: LBA48 NCQ (depth 32), AA [ 83.374407] ata4.00: ACPI cmd f5/00:00:00:00:00:00(SECURITY FREEZE LOCK) filtered out [ 83.374708] ata4.00: ACPI cmd b1/c1:00:00:00:00:00(DEVICE CONFIGURATION OVERLAY) filtered out [ 83.375784] ata4.00: configured for UDMA/133 [ 83.376693] scsi 3:0:0:0: Direct-Access ATA WDC WD10EACS-22D 1A01 PQ: 0 ANSI: 5 [ 83.379389] scsi 7:0:0:0: Direct-Access ATA INTEL SSDSC2BB80 0370 PQ: 0 ANSI: 5 [ 83.402956] ipmi device interface [ 83.433569] scsi 3:0:0:0: Attached scsi generic sg0 type 0 [ 83.434343] scsi 7:0:0:0: Attached scsi generic sg1 type 0 [ 83.445540] IOAPIC[0]: Preconfigured routing entry (2-22 -> IRQ 22 Level:1 ActiveLow:1) [ 83.445765] ipmi_si: IPMI System Interface driver [ 83.447687] ipmi_si: Unable to find any System Interface(s) [ 83.451372] ata8.00: Enabling discard_zeroes_data [ 83.451904] sd 7:0:0:0: [sdb] 1562824368 512-byte logical blocks: (800 GB/745 GiB) [ 83.451987] sd 3:0:0:0: [sda] 1953525168 512-byte logical blocks: (1.00 TB/932 GiB) [ 83.452059] sd 7:0:0:0: [sdb] 4096-byte physical blocks [ 83.452227] sd 3:0:0:0: [sda] Write Protect is off [ 83.452322] sd 7:0:0:0: [sdb] Write Protect is off [ 83.452384] sd 3:0:0:0: [sda] Mode Sense: 00 3a 00 00 [ 83.452490] sd 7:0:0:0: [sdb] Mode Sense: 00 3a 00 00 [ 83.452661] sd 3:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA [ 83.452743] sd 7:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA [ 83.452948] sd 3:0:0:0: [sda] Preferred minimum I/O size 512 bytes [ 83.453101] sd 7:0:0:0: [sdb] Preferred minimum I/O size 4096 bytes [ 83.600216] ata8.00: Enabling discard_zeroes_data [ 83.607138] sdb: sdb1 sdb2 [ 83.608433] sd 7:0:0:0: [sdb] Attached SCSI disk [ 83.613084] IOAPIC[0]: Preconfigured routing entry (2-22 -> IRQ 22 Level:1 ActiveLow:1) [ 83.669866] sda: sda1 sda2 sda3 sda4 [ 83.672231] sd 3:0:0:0: [sda] Attached SCSI disk [ 83.683660] IOAPIC[0]: Preconfigured routing entry (2-22 -> IRQ 22 Level:1 ActiveLow:1) [ 84.619380] raid6: skipped pq benchmark and selected sse2x4 [ 84.619583] raid6: using ssse3x2 recovery algorithm [ 84.619593] netpoll: netconsole: local port 6665 [ 84.619901] netpoll: netconsole: local IPv4 address 0.0.0.0 [ 84.620078] netpoll: netconsole: interface name 'eth3' [ 84.620248] netpoll: netconsole: local ethernet address 'ff:ff:ff:ff:ff:ff' [ 84.620465] netpoll: netconsole: remote port 6672 [ 84.620619] netpoll: netconsole: remote IPv4 address 192.168.3.200 [ 84.620802] netpoll: netconsole: remote ethernet address 3c:fd:fe:d2:10:00 [ 84.621008] netpoll: netconsole: local IP 192.168.3.193 [ 84.621608] printk: legacy console [netcon0] enabled [ 84.623730] xor: automatically using best checksumming function avx [ 84.623752] netconsole: network logging started [ 84.640240] i915 0000:00:02.0: [drm] Found ivybridge (device ID 0162) integrated display version 7.00 stepping N/A [ 84.702115] i915 0000:00:02.0: vgaarb: deactivate vga console [ 84.703315] Console: switching to colour dummy device 80x25 [ 84.722925] resource: resource sanity check: requesting [mem 0x00000000000c0000-0x00000000000dffff], which spans more than PCI Bus 0000:00 [mem 0x000d8000-0x000e7fff window] [ 84.723299] caller pci_map_rom+0x154/0x490 mapping multiple BARs [ 84.757226] [drm] Initialized i915 1.6.0 for 0000:00:02.0 on minor 0 [ 84.765474] intel_rapl_common: Found RAPL domain package [ 84.765654] intel_rapl_common: Found RAPL domain core [ 84.765786] intel_rapl_common: Found RAPL domain uncore [ 84.773142] ACPI: video: Video Device [GFX0] (multi-head: yes rom: no post: no) [ 84.776811] input: Video Bus as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A08:00/LNXVIDEO:00/input/input3 [ 84.780551] IOAPIC[0]: Preconfigured routing entry (2-22 -> IRQ 22 Level:1 ActiveLow:1) [ 84.792611] i915 0000:00:02.0: [drm] Cannot find any crtc or sizes [ 84.805577] i915 0000:00:02.0: [drm] Cannot find any crtc or sizes [ 84.817576] snd_hda_intel 0000:00:1b.0: bound 0000:00:02.0 (ops intel_audio_component_bind_ops [i915]) [ 84.829530] i915 0000:00:02.0: [drm] Cannot find any crtc or sizes [ 84.968673] snd_hda_codec_realtek hdaudioC0D2: autoconfig for ALC898: line_outs=3 (0x14/0x15/0x16/0x0/0x0) type:line [ 84.968948] snd_hda_codec_realtek hdaudioC0D2: speaker_outs=0 (0x0/0x0/0x0/0x0/0x0) [ 84.969119] snd_hda_codec_realtek hdaudioC0D2: hp_outs=1 (0x1b/0x0/0x0/0x0/0x0) [ 84.969277] snd_hda_codec_realtek hdaudioC0D2: mono: mono_out=0x0 [ 84.969416] snd_hda_codec_realtek hdaudioC0D2: dig-out=0x11/0x1e [ 84.969457] Btrfs loaded, zoned=yes, fsverity=yes [ 84.969548] snd_hda_codec_realtek hdaudioC0D2: inputs: [ 84.969749] BTRFS: selftest: sectorsize: 4096 nodesize: 4096 [ 84.969776] snd_hda_codec_realtek hdaudioC0D2: Rear Mic=0x18 [ 84.969877] BTRFS: selftest: running btrfs free space cache tests [ 84.969919] BTRFS: selftest: running extent only tests [ 84.969994] snd_hda_codec_realtek hdaudioC0D2: Front Mic=0x19 [ 84.970135] BTRFS: selftest: running bitmap only tests [ 84.970201] snd_hda_codec_realtek hdaudioC0D2: Line=0x1a [ 84.970363] BTRFS: selftest: running bitmap and extent tests [ 84.970945] BTRFS: selftest: running space stealing from bitmap to extent tests [ 84.971467] BTRFS: selftest: running bytes index tests [ 84.971816] BTRFS: selftest: running extent buffer operation tests [ 84.971947] BTRFS: selftest: running btrfs_split_item tests [ 84.972157] BTRFS: selftest: running extent I/O tests [ 84.972275] BTRFS: selftest: running find delalloc tests [ 85.014957] input: HDA Intel PCH Rear Mic as /devices/pci0000:00/0000:00:1b.0/sound/card0/input4 [ 85.016447] input: HDA Intel PCH Front Mic as /devices/pci0000:00/0000:00:1b.0/sound/card0/input5 [ 85.017416] input: HDA Intel PCH Line as /devices/pci0000:00/0000:00:1b.0/sound/card0/input6 [ 85.019014] input: HDA Intel PCH Line Out Front as /devices/pci0000:00/0000:00:1b.0/sound/card0/input7 [ 85.020356] input: HDA Intel PCH Line Out Surround as /devices/pci0000:00/0000:00:1b.0/sound/card0/input8 [ 85.022916] input: HDA Intel PCH Line Out CLFE as /devices/pci0000:00/0000:00:1b.0/sound/card0/input9 [ 85.024462] input: HDA Intel PCH Front Headphone as /devices/pci0000:00/0000:00:1b.0/sound/card0/input10 [ 85.026988] input: HDA Intel PCH HDMI/DP,pcm=3 as /devices/pci0000:00/0000:00:1b.0/sound/card0/input11 [ 85.029008] input: HDA Intel PCH HDMI/DP,pcm=7 as /devices/pci0000:00/0000:00:1b.0/sound/card0/input12 [ 85.031169] snd_hda_intel 0000:00:1b.0: device 8086:2040 is on the power_save denylist, forcing power_save to 0 [ 85.128994] BTRFS: selftest: running find_first_clear_extent_bit test [ 85.129242] BTRFS: selftest: running extent buffer bitmap tests [ 85.170938] BTRFS: selftest: running extent buffer memory operation tests [ 85.171316] BTRFS: selftest: running inode tests [ 85.171449] BTRFS: selftest: running btrfs_get_extent tests [ 85.172001] BTRFS: selftest: running hole first btrfs_get_extent test [ 85.172251] BTRFS: selftest: running outstanding_extents tests [ 85.172630] BTRFS: selftest: running qgroup tests [ 85.172748] BTRFS: selftest: running qgroup add/remove tests [ 85.173115] BTRFS: selftest: running qgroup multiple refs test [ 85.173688] BTRFS: selftest: running free space tree tests [ 85.208749] BTRFS: selftest: running raid-stripe-tree tests [ 85.210301] BTRFS: selftest: running delayed refs tests [ 85.210749] BTRFS: selftest: running delayed refs merg tests on metadata refs [ 85.212908] BTRFS: selftest: running delayed refs merg tests on data refs [ 85.215260] BTRFS: selftest: sectorsize: 4096 nodesize: 8192 [ 85.215439] BTRFS: selftest: running btrfs free space cache tests [ 85.215619] BTRFS: selftest: running extent only tests [ 85.215782] BTRFS: selftest: running bitmap only tests [ 85.215980] BTRFS: selftest: running bitmap and extent tests [ 85.216233] BTRFS: selftest: running space stealing from bitmap to extent tests [ 85.216711] BTRFS: selftest: running bytes index tests [ 85.217067] BTRFS: selftest: running extent buffer operation tests [ 85.217200] BTRFS: selftest: running btrfs_split_item tests [ 85.217449] BTRFS: selftest: running extent I/O tests [ 85.217570] BTRFS: selftest: running find delalloc tests [ 85.358898] BTRFS: selftest: running find_first_clear_extent_bit test [ 85.359151] BTRFS: selftest: running extent buffer bitmap tests [ 85.462384] BTRFS: selftest: running extent buffer memory operation tests [ 85.462791] BTRFS: selftest: running inode tests [ 85.462907] BTRFS: selftest: running btrfs_get_extent tests [ 85.463505] BTRFS: selftest: running hole first btrfs_get_extent test [ 85.463745] BTRFS: selftest: running outstanding_extents tests [ 85.464091] BTRFS: selftest: running qgroup tests [ 85.464198] BTRFS: selftest: running qgroup add/remove tests [ 85.464576] BTRFS: selftest: running qgroup multiple refs test [ 85.465095] BTRFS: selftest: running free space tree tests [ 85.500092] BTRFS: selftest: running raid-stripe-tree tests [ 85.501666] BTRFS: selftest: running delayed refs tests [ 85.502043] BTRFS: selftest: running delayed refs merg tests on metadata refs [ 85.504211] BTRFS: selftest: running delayed refs merg tests on data refs [ 85.506606] BTRFS: selftest: sectorsize: 4096 nodesize: 16384 [ 85.506782] BTRFS: selftest: running btrfs free space cache tests [ 85.506957] BTRFS: selftest: running extent only tests [ 85.507116] BTRFS: selftest: running bitmap only tests [ 85.507328] BTRFS: selftest: running bitmap and extent tests [ 85.507623] BTRFS: selftest: running space stealing from bitmap to extent tests [ 85.508068] BTRFS: selftest: running bytes index tests [ 85.508430] BTRFS: selftest: running extent buffer operation tests [ 85.508570] BTRFS: selftest: running btrfs_split_item tests [ 85.508792] BTRFS: selftest: running extent I/O tests [ 85.508904] BTRFS: selftest: running find delalloc tests [ 85.652973] BTRFS: selftest: running find_first_clear_extent_bit test [ 85.656276] BTRFS: selftest: running extent buffer bitmap tests [ 85.857571] BTRFS: selftest: running extent buffer memory operation tests [ 85.857922] BTRFS: selftest: running inode tests [ 85.858032] BTRFS: selftest: running btrfs_get_extent tests [ 85.858591] BTRFS: selftest: running hole first btrfs_get_extent test [ 85.858830] BTRFS: selftest: running outstanding_extents tests [ 85.859153] BTRFS: selftest: running qgroup tests [ 85.859260] BTRFS: selftest: running qgroup add/remove tests [ 85.859634] BTRFS: selftest: running qgroup multiple refs test [ 85.860150] BTRFS: selftest: running free space tree tests [ 85.895255] BTRFS: selftest: running raid-stripe-tree tests [ 85.896784] BTRFS: selftest: running delayed refs tests [ 85.897170] BTRFS: selftest: running delayed refs merg tests on metadata refs [ 85.899327] BTRFS: selftest: running delayed refs merg tests on data refs [ 85.901732] BTRFS: selftest: sectorsize: 4096 nodesize: 32768 [ 85.901912] BTRFS: selftest: running btrfs free space cache tests [ 85.902084] BTRFS: selftest: running extent only tests [ 85.902237] BTRFS: selftest: running bitmap only tests [ 85.902440] BTRFS: selftest: running bitmap and extent tests [ 85.902693] BTRFS: selftest: running space stealing from bitmap to extent tests [ 85.903138] BTRFS: selftest: running bytes index tests [ 85.903555] BTRFS: selftest: running extent buffer operation tests [ 85.903702] BTRFS: selftest: running btrfs_split_item tests [ 85.903984] BTRFS: selftest: running extent I/O tests [ 85.904111] BTRFS: selftest: running find delalloc tests [ 86.047690] BTRFS: selftest: running find_first_clear_extent_bit test [ 86.051440] BTRFS: selftest: running extent buffer bitmap tests [ 86.452581] BTRFS: selftest: running extent buffer memory operation tests [ 86.453134] BTRFS: selftest: running inode tests [ 86.453261] BTRFS: selftest: running btrfs_get_extent tests [ 86.453808] BTRFS: selftest: running hole first btrfs_get_extent test [ 86.454063] BTRFS: selftest: running outstanding_extents tests [ 86.454414] BTRFS: selftest: running qgroup tests [ 86.454561] BTRFS: selftest: running qgroup add/remove tests [ 86.454913] BTRFS: selftest: running qgroup multiple refs test [ 86.455445] BTRFS: selftest: running free space tree tests [ 86.490193] BTRFS: selftest: running raid-stripe-tree tests [ 86.491673] BTRFS: selftest: running delayed refs tests [ 86.492066] BTRFS: selftest: running delayed refs merg tests on metadata refs [ 86.494225] BTRFS: selftest: running delayed refs merg tests on data refs [ 86.496623] BTRFS: selftest: sectorsize: 4096 nodesize: 65536 [ 86.496798] BTRFS: selftest: running btrfs free space cache tests [ 86.496983] BTRFS: selftest: running extent only tests [ 86.497147] BTRFS: selftest: running bitmap only tests [ 86.497342] BTRFS: selftest: running bitmap and extent tests [ 86.497615] BTRFS: selftest: running space stealing from bitmap to extent tests [ 86.498074] BTRFS: selftest: running bytes index tests [ 86.498443] BTRFS: selftest: running extent buffer operation tests [ 86.498583] BTRFS: selftest: running btrfs_split_item tests [ 86.498834] BTRFS: selftest: running extent I/O tests [ 86.498945] BTRFS: selftest: running find delalloc tests [ 86.640120] BTRFS: selftest: running find_first_clear_extent_bit test [ 86.643822] BTRFS: selftest: running extent buffer bitmap tests [ 87.443513] BTRFS: selftest: running extent buffer memory operation tests [ 87.444097] BTRFS: selftest: running inode tests [ 87.444203] BTRFS: selftest: running btrfs_get_extent tests [ 87.444790] BTRFS: selftest: running hole first btrfs_get_extent test [ 87.445046] BTRFS: selftest: running outstanding_extents tests [ 87.445372] BTRFS: selftest: running qgroup tests [ 87.445508] BTRFS: selftest: running qgroup add/remove tests [ 87.445865] BTRFS: selftest: running qgroup multiple refs test [ 87.446406] BTRFS: selftest: running free space tree tests [ 87.481317] BTRFS: selftest: running raid-stripe-tree tests [ 87.482821] BTRFS: selftest: running delayed refs tests [ 87.483304] BTRFS: selftest: running delayed refs merg tests on metadata refs [ 87.485482] BTRFS: selftest: running delayed refs merg tests on data refs [ 87.487846] BTRFS: selftest: running extent_map tests [ 87.488205] BTRFS: selftest: Running btrfs_drop_extent_map_range tests [ 87.488491] BTRFS: selftest: Running btrfs_drop_extent_cache with pinned [ 87.488680] BTRFS: selftest: running rmap tests [ 89.828930] BTRFS: device fsid 305100a8-6a4a-4cb5-b1b5-0e664a6b42fa devid 1 transid 3472 /dev/sdb1 (8:17) scanned by mount (3395) [ 89.832179] BTRFS info (device sdb1): first mount of filesystem 305100a8-6a4a-4cb5-b1b5-0e664a6b42fa [ 89.832469] BTRFS info (device sdb1): using crc32c (crc32c-x86_64) checksum algorithm [ 89.832649] BTRFS info (device sdb1): disk space caching is enabled [ 89.832787] BTRFS warning (device sdb1): space cache v1 is being deprecated and will be removed in a future release, please use -o space_cache=v2 [ 90.830840] x86/PAT: bmc-watchdog:3487 map pfn expected mapping type uncached-minus for [mem 0xda244000-0xda244fff], got write-back [ 90.831208] x86/PAT: bmc-watchdog:3487 map pfn expected mapping type uncached-minus for [mem 0xda244000-0xda244fff], got write-back [ 90.854431] x86/PAT: bmc-watchdog:3487 map pfn expected mapping type uncached-minus for [mem 0xda244000-0xda244fff], got write-back [ 90.854722] x86/PAT: bmc-watchdog:3487 map pfn expected mapping type uncached-minus for [mem 0xda244000-0xda244fff], got write-back [ 90.877143] x86/PAT: bmc-watchdog:3487 map pfn expected mapping type uncached-minus for [mem 0xda244000-0xda244fff], got write-back [ 90.877451] x86/PAT: bmc-watchdog:3487 map pfn expected mapping type uncached-minus for [mem 0xda244000-0xda244fff], got write-back [ 90.900164] x86/PAT: bmc-watchdog:3487 map pfn expected mapping type uncached-minus for [mem 0xda244000-0xda244fff], got write-back [ 90.900477] x86/PAT: bmc-watchdog:3487 map pfn expected mapping type uncached-minus for [mem 0xda244000-0xda244fff], got write-back [ 90.923252] x86/PAT: bmc-watchdog:3487 map pfn expected mapping type uncached-minus for [mem 0xda244000-0xda244fff], got write-back [ 90.923563] x86/PAT: bmc-watchdog:3487 map pfn expected mapping type uncached-minus for [mem 0xda244000-0xda244fff], got write-back [ 90.946532] x86/PAT: bmc-watchdog:3487 map pfn expected mapping type uncached-minus for [mem 0xda244000-0xda244fff], got write-back [ 90.946816] x86/PAT: bmc-watchdog:3487 map pfn expected mapping type uncached-minus for [mem 0xda244000-0xda244fff], got write-back [ 90.969438] x86/PAT: bmc-watchdog:3487 map pfn expected mapping type uncached-minus for [mem 0xda244000-0xda244fff], got write-back [ 90.969732] x86/PAT: bmc-watchdog:3487 map pfn expected mapping type uncached-minus for [mem 0xda244000-0xda244fff], got write-back [ 90.992252] x86/PAT: bmc-watchdog:3487 map pfn expected mapping type uncached-minus for [mem 0xda244000-0xda244fff], got write-back [ 90.992570] x86/PAT: bmc-watchdog:3487 map pfn expected mapping type uncached-minus for [mem 0xda244000-0xda244fff], got write-back [ 91.015190] x86/PAT: bmc-watchdog:3487 map pfn expected mapping type uncached-minus for [mem 0xda244000-0xda244fff], got write-back [ 91.015491] x86/PAT: bmc-watchdog:3487 map pfn expected mapping type uncached-minus for [mem 0xda244000-0xda244fff], got write-back [ 91.038113] x86/PAT: bmc-watchdog:3487 map pfn expected mapping type uncached-minus for [mem 0xda244000-0xda244fff], got write-back [ 91.038394] x86/PAT: bmc-watchdog:3487 map pfn expected mapping type uncached-minus for [mem 0xda244000-0xda244fff], got write-back [ 91.061293] x86/PAT: bmc-watchdog:3487 map pfn expected mapping type uncached-minus for [mem 0xda244000-0xda244fff], got write-back [ 91.061626] x86/PAT: bmc-watchdog:3487 map pfn expected mapping type uncached-minus for [mem 0xda244000-0xda244fff], got write-back [ 91.084213] x86/PAT: bmc-watchdog:3487 map pfn expected mapping type uncached-minus for [mem 0xda244000-0xda244fff], got write-back [ 91.084512] x86/PAT: bmc-watchdog:3487 map pfn expected mapping type uncached-minus for [mem 0xda244000-0xda244fff], got write-back [ 91.107104] x86/PAT: bmc-watchdog:3487 map pfn expected mapping type uncached-minus for [mem 0xda244000-0xda244fff], got write-back [ 91.107393] x86/PAT: bmc-watchdog:3487 map pfn expected mapping type uncached-minus for [mem 0xda244000-0xda244fff], got write-back [ 91.130009] x86/PAT: bmc-watchdog:3487 map pfn expected mapping type uncached-minus for [mem 0xda244000-0xda244fff], got write-back [ 91.130291] x86/PAT: bmc-watchdog:3487 map pfn expected mapping type uncached-minus for [mem 0xda244000-0xda244fff], got write-back [ 91.152919] x86/PAT: bmc-watchdog:3487 map pfn expected mapping type uncached-minus for [mem 0xda244000-0xda244fff], got write-back [ 91.153205] x86/PAT: bmc-watchdog:3487 map pfn expected mapping type uncached-minus for [mem 0xda244000-0xda244fff], got write-back [ 91.878314] KTAP version 1 [ 91.878417] 1..1 [ 91.878640] # drm_buddy: Testing DRM buddy manager, with random_seed=0xc3b7ac95 [ 91.878808] KTAP version 1 [ 91.878889] # Subtest: drm_buddy [ 91.878980] # module: drm_buddy_test [ 91.878997] 1..7 [ 91.879585] ok 1 drm_test_buddy_alloc_limit [ 91.879844] ok 2 drm_test_buddy_alloc_optimistic [ 91.880278] ok 3 drm_test_buddy_alloc_pessimistic [ 91.880779] ok 4 drm_test_buddy_alloc_pathological [ 91.881941] ok 5 drm_test_buddy_alloc_contiguous [ 91.934530] ok 6 drm_test_buddy_alloc_clear [ 91.934901] # drm_test_buddy_alloc_range_bias: mm_size=7864320, ps=524288 [ 91.936109] ok 7 drm_test_buddy_alloc_range_bias [ 91.936130] # drm_buddy: pass:7 fail:0 skip:0 total:7 [ 91.936268] # Totals: pass:7 fail:0 skip:0 total:7 [ 91.936409] ok 1 drm_buddy [ 92.007867] KTAP version 1 [ 92.007991] 1..1 [ 92.008408] KTAP version 1 [ 92.009405] # Subtest: kasan [ 92.009606] # module: kasan_test [ 92.009640] 1..75 [ 92.009944] ================================================================== [ 92.010097] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x631/0x6d0 [kasan_test] [ 92.010263] Write of size 1 at addr ffff8881ce74fb73 by task kunit_try_catch/3568 [ 92.010477] CPU: 0 UID: 0 PID: 3568 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.010489] Tainted: [B]=BAD_PAGE, [N]=TEST [ 92.010492] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.010496] Call Trace: [ 92.010499] [ 92.010503] dump_stack_lvl+0x4f/0x70 [ 92.010513] print_address_description.constprop.0+0x2c/0x3b0 [ 92.010522] ? kmalloc_oob_right+0x631/0x6d0 [kasan_test] [ 92.010542] print_report+0xb9/0x280 [ 92.010549] ? kmalloc_oob_right+0x631/0x6d0 [kasan_test] [ 92.010566] ? kasan_addr_to_slab+0x9/0x90 [ 92.010573] ? kmalloc_oob_right+0x631/0x6d0 [kasan_test] [ 92.010592] kasan_report+0xda/0x110 [ 92.010598] ? kmalloc_oob_right+0x631/0x6d0 [kasan_test] [ 92.010619] kmalloc_oob_right+0x631/0x6d0 [kasan_test] [ 92.010638] ? __pfx_kmalloc_oob_right+0x10/0x10 [kasan_test] [ 92.010657] ? __schedule+0x763/0x1490 [ 92.010665] ? __pfx_read_tsc+0x10/0x10 [ 92.010671] ? ktime_get_ts64+0x7f/0x220 [ 92.010678] kunit_try_run_case+0x175/0x440 [ 92.010686] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.010692] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.010700] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.010705] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.010713] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.010719] kthread+0x3b4/0x780 [ 92.010726] ? __pfx_kthread+0x10/0x10 [ 92.010732] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.010739] ? __pfx_kthread+0x10/0x10 [ 92.010745] ? __pfx_kthread+0x10/0x10 [ 92.010752] ret_from_fork+0x22c/0x300 [ 92.010759] ? __pfx_kthread+0x10/0x10 [ 92.010765] ret_from_fork_asm+0x1a/0x30 [ 92.010775] [ 92.014144] Allocated by task 3568: [ 92.014227] kasan_save_stack+0x1c/0x40 [ 92.014316] kasan_save_track+0x10/0x30 [ 92.014414] __kasan_kmalloc+0xa6/0xb0 [ 92.014512] kmalloc_oob_right+0x99/0x6d0 [kasan_test] [ 92.014626] kunit_try_run_case+0x175/0x440 [ 92.014719] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.014831] kthread+0x3b4/0x780 [ 92.014910] ret_from_fork+0x22c/0x300 [ 92.014997] ret_from_fork_asm+0x1a/0x30 [ 92.015137] The buggy address belongs to the object at ffff8881ce74fb00 which belongs to the cache kmalloc-128 of size 128 [ 92.015367] The buggy address is located 0 bytes to the right of allocated 115-byte region [ffff8881ce74fb00, ffff8881ce74fb73) [ 92.015676] The buggy address belongs to the physical page: [ 92.015789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1ce74e [ 92.015946] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.016095] ksm flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.016241] page_type: f5(slab) [ 92.016319] raw: 0017ffffc0000040 ffff888100042a00 ffffea00104d3d00 dead000000000003 [ 92.016488] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.016635] head: 0017ffffc0000040 ffff888100042a00 ffffea00104d3d00 dead000000000003 [ 92.016783] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.016932] head: 0017ffffc0000001 ffffea000739d381 00000000ffffffff 00000000ffffffff [ 92.017080] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 92.017228] page dumped because: kasan: bad access detected [ 92.017392] Memory state around the buggy address: [ 92.017514] ffff8881ce74fa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 92.017653] ffff8881ce74fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.017791] >ffff8881ce74fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 92.017928] ^ [ 92.018061] ffff8881ce74fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.018200] ffff8881ce74fc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.018337] ================================================================== [ 92.018510] ================================================================== [ 92.018676] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x61a/0x6d0 [kasan_test] [ 92.018873] Write of size 1 at addr ffff8881ce74fb78 by task kunit_try_catch/3568 [ 92.019100] CPU: 0 UID: 0 PID: 3568 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.019106] Tainted: [B]=BAD_PAGE, [N]=TEST [ 92.019108] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.019111] Call Trace: [ 92.019112] [ 92.019114] dump_stack_lvl+0x4f/0x70 [ 92.019120] print_address_description.constprop.0+0x2c/0x3b0 [ 92.019124] ? kmalloc_oob_right+0x61a/0x6d0 [kasan_test] [ 92.019133] print_report+0xb9/0x280 [ 92.019137] ? kmalloc_oob_right+0x61a/0x6d0 [kasan_test] [ 92.019145] ? kasan_addr_to_slab+0x9/0x90 [ 92.019149] ? kmalloc_oob_right+0x61a/0x6d0 [kasan_test] [ 92.019157] kasan_report+0xda/0x110 [ 92.019161] ? kmalloc_oob_right+0x61a/0x6d0 [kasan_test] [ 92.019170] kmalloc_oob_right+0x61a/0x6d0 [kasan_test] [ 92.019179] ? __pfx_kmalloc_oob_right+0x10/0x10 [kasan_test] [ 92.019188] ? __schedule+0x763/0x1490 [ 92.019192] ? __pfx_read_tsc+0x10/0x10 [ 92.019195] ? ktime_get_ts64+0x7f/0x220 [ 92.019199] kunit_try_run_case+0x175/0x440 [ 92.019203] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.019206] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.019211] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.019213] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.019217] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.019221] kthread+0x3b4/0x780 [ 92.019225] ? __pfx_kthread+0x10/0x10 [ 92.019229] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.019232] ? __pfx_kthread+0x10/0x10 [ 92.019236] ? __pfx_kthread+0x10/0x10 [ 92.019239] ret_from_fork+0x22c/0x300 [ 92.019243] ? __pfx_kthread+0x10/0x10 [ 92.019247] ret_from_fork_asm+0x1a/0x30 [ 92.019252] [ 92.022733] Allocated by task 3568: [ 92.022816] kasan_save_stack+0x1c/0x40 [ 92.022906] kasan_save_track+0x10/0x30 [ 92.022993] __kasan_kmalloc+0xa6/0xb0 [ 92.023079] kmalloc_oob_right+0x99/0x6d0 [kasan_test] [ 92.023192] kunit_try_run_case+0x175/0x440 [ 92.023284] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.023405] kthread+0x3b4/0x780 [ 92.023495] ret_from_fork+0x22c/0x300 [ 92.023584] ret_from_fork_asm+0x1a/0x30 [ 92.023722] The buggy address belongs to the object at ffff8881ce74fb00 which belongs to the cache kmalloc-128 of size 128 [ 92.023952] The buggy address is located 5 bytes to the right of allocated 115-byte region [ffff8881ce74fb00, ffff8881ce74fb73) [ 92.024239] The buggy address belongs to the physical page: [ 92.024354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1ce74e [ 92.024528] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.024674] ksm flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.024815] page_type: f5(slab) [ 92.024893] raw: 0017ffffc0000040 ffff888100042a00 ffffea00104d3d00 dead000000000003 [ 92.025040] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.025187] head: 0017ffffc0000040 ffff888100042a00 ffffea00104d3d00 dead000000000003 [ 92.025339] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.025507] head: 0017ffffc0000001 ffffea000739d381 00000000ffffffff 00000000ffffffff [ 92.025656] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 92.025804] page dumped because: kasan: bad access detected [ 92.025968] Memory state around the buggy address: [ 92.026068] ffff8881ce74fa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 92.026207] ffff8881ce74fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.026348] >ffff8881ce74fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 92.026508] ^ [ 92.026645] ffff8881ce74fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.026783] ffff8881ce74fc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.026920] ================================================================== [ 92.027066] ================================================================== [ 92.027231] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x603/0x6d0 [kasan_test] [ 92.027440] Read of size 1 at addr ffff8881ce74fb80 by task kunit_try_catch/3568 [ 92.027680] CPU: 0 UID: 0 PID: 3568 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.027687] Tainted: [B]=BAD_PAGE, [N]=TEST [ 92.027688] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.027691] Call Trace: [ 92.027692] [ 92.027694] dump_stack_lvl+0x4f/0x70 [ 92.027699] print_address_description.constprop.0+0x2c/0x3b0 [ 92.027704] ? kmalloc_oob_right+0x603/0x6d0 [kasan_test] [ 92.027713] print_report+0xb9/0x280 [ 92.027716] ? kmalloc_oob_right+0x603/0x6d0 [kasan_test] [ 92.027725] ? kasan_addr_to_slab+0x9/0x90 [ 92.027728] ? kmalloc_oob_right+0x603/0x6d0 [kasan_test] [ 92.027736] kasan_report+0xda/0x110 [ 92.027740] ? kmalloc_oob_right+0x603/0x6d0 [kasan_test] [ 92.027749] kmalloc_oob_right+0x603/0x6d0 [kasan_test] [ 92.027759] ? __pfx_kmalloc_oob_right+0x10/0x10 [kasan_test] [ 92.027767] ? __schedule+0x763/0x1490 [ 92.027771] ? __pfx_read_tsc+0x10/0x10 [ 92.027774] ? ktime_get_ts64+0x7f/0x220 [ 92.027778] kunit_try_run_case+0x175/0x440 [ 92.027781] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.027785] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.027789] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.027792] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.027796] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.027800] kthread+0x3b4/0x780 [ 92.027804] ? __pfx_kthread+0x10/0x10 [ 92.027807] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.027811] ? __pfx_kthread+0x10/0x10 [ 92.027814] ? __pfx_kthread+0x10/0x10 [ 92.027818] ret_from_fork+0x22c/0x300 [ 92.027822] ? __pfx_kthread+0x10/0x10 [ 92.027825] ret_from_fork_asm+0x1a/0x30 [ 92.027830] [ 92.031166] Allocated by task 3568: [ 92.031247] kasan_save_stack+0x1c/0x40 [ 92.031339] kasan_save_track+0x10/0x30 [ 92.031436] __kasan_kmalloc+0xa6/0xb0 [ 92.031532] kmalloc_oob_right+0x99/0x6d0 [kasan_test] [ 92.031646] kunit_try_run_case+0x175/0x440 [ 92.031737] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.031848] kthread+0x3b4/0x780 [ 92.031927] ret_from_fork+0x22c/0x300 [ 92.032013] ret_from_fork_asm+0x1a/0x30 [ 92.032153] The buggy address belongs to the object at ffff8881ce74fb00 which belongs to the cache kmalloc-128 of size 128 [ 92.032389] The buggy address is located 13 bytes to the right of allocated 115-byte region [ffff8881ce74fb00, ffff8881ce74fb73) [ 92.032698] The buggy address belongs to the physical page: [ 92.032812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1ce74e [ 92.032972] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.033135] ksm flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.033296] page_type: f5(slab) [ 92.033383] raw: 0017ffffc0000040 ffff888100042a00 ffffea00104d3d00 dead000000000003 [ 92.033550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.033697] head: 0017ffffc0000040 ffff888100042a00 ffffea00104d3d00 dead000000000003 [ 92.033845] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.033993] head: 0017ffffc0000001 ffffea000739d381 00000000ffffffff 00000000ffffffff [ 92.034141] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 92.034288] page dumped because: kasan: bad access detected [ 92.034478] Memory state around the buggy address: [ 92.034579] ffff8881ce74fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.034717] ffff8881ce74fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 92.034856] >ffff8881ce74fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.034993] ^ [ 92.035070] ffff8881ce74fc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.035206] ffff8881ce74fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.035343] ================================================================== [ 92.035729] ok 1 kmalloc_oob_right [ 92.035914] ================================================================== [ 92.036162] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x30f/0x360 [kasan_test] [ 92.036321] Read of size 1 at addr ffff8881cb6a6c5f by task kunit_try_catch/3570 [ 92.036540] CPU: 1 UID: 0 PID: 3570 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.036547] Tainted: [B]=BAD_PAGE, [N]=TEST [ 92.036549] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.036551] Call Trace: [ 92.036553] [ 92.036555] dump_stack_lvl+0x4f/0x70 [ 92.036560] print_address_description.constprop.0+0x2c/0x3b0 [ 92.036565] ? kmalloc_oob_left+0x30f/0x360 [kasan_test] [ 92.036574] print_report+0xb9/0x280 [ 92.036578] ? kmalloc_oob_left+0x30f/0x360 [kasan_test] [ 92.036586] ? kasan_addr_to_slab+0x9/0x90 [ 92.036590] ? kmalloc_oob_left+0x30f/0x360 [kasan_test] [ 92.036598] kasan_report+0xda/0x110 [ 92.036602] ? kmalloc_oob_left+0x30f/0x360 [kasan_test] [ 92.036611] kmalloc_oob_left+0x30f/0x360 [kasan_test] [ 92.036621] ? __pfx_kmalloc_oob_left+0x10/0x10 [kasan_test] [ 92.036630] ? __schedule+0x763/0x1490 [ 92.036633] ? __pfx_read_tsc+0x10/0x10 [ 92.036636] ? ktime_get_ts64+0x7f/0x220 [ 92.036640] kunit_try_run_case+0x175/0x440 [ 92.036644] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.036647] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.036651] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.036654] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.036658] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.036662] kthread+0x3b4/0x780 [ 92.036666] ? __pfx_kthread+0x10/0x10 [ 92.036669] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.036673] ? __pfx_kthread+0x10/0x10 [ 92.036676] ? __pfx_kthread+0x10/0x10 [ 92.036680] ret_from_fork+0x22c/0x300 [ 92.036684] ? __pfx_kthread+0x10/0x10 [ 92.036687] ret_from_fork_asm+0x1a/0x30 [ 92.036692] [ 92.040042] Allocated by task 1: [ 92.040121] kasan_save_stack+0x1c/0x40 [ 92.040212] kasan_save_track+0x10/0x30 [ 92.040301] __kasan_kmalloc+0xa6/0xb0 [ 92.040388] __kmalloc_node_track_caller_noprof+0x1c1/0x520 [ 92.040506] kvasprintf+0xb2/0x130 [ 92.040589] __kthread_create_on_node+0x175/0x3a0 [ 92.040692] kthread_create_on_node+0x9a/0xd0 [ 92.040790] event_trace_self_tests+0x124/0x6f0 [ 92.040890] event_trace_self_tests_init+0xfd/0x180 [ 92.041004] do_one_initcall+0x8d/0x390 [ 92.041092] do_initcalls+0x198/0x360 [ 92.041178] kernel_init_freeable+0x80e/0xc80 [ 92.041274] kernel_init+0x1b/0x1f0 [ 92.041355] ret_from_fork+0x22c/0x300 [ 92.041461] ret_from_fork_asm+0x1a/0x30 [ 92.041600] Freed by task 4206589096: [ 92.041684] ------------[ cut here ]------------ [ 92.041784] pool index 8168 out of bounds (466) for stack id 4a461fe9 [ 92.041922] WARNING: CPU: 1 PID: 3570 at lib/stackdepot.c:451 depot_fetch_stack+0x5a/0x80 [ 92.042082] Modules linked in: kasan_test snd_hda_codec_hdmi snd_hda_codec_realtek snd_hda_codec_generic snd_hda_scodec_component intel_rapl_msr intel_rapl_common btrfs blake2b_generic x86_pkg_temp_thermal xor intel_powerclamp netconsole raid6_pq coretemp i915 sd_mod snd_hda_intel snd_intel_dspcfg sg kvm_intel snd_intel_sdw_acpi snd_hda_codec ipmi_devintf ipmi_msghandler kvm intel_gtt snd_hda_core irqbypass ghash_clmulni_intel cec snd_hwdep ttm rapl intel_cstate snd_pcm drm_client_lib ahci drm_buddy libahci mxm_wmi snd_timer snd i2c_i801 libata drm_display_helper intel_uncore pcspkr i2c_smbus lpc_ich soundcore drm_kms_helper video wmi binfmt_misc fuse drm loop dm_mod ip_tables [last unloaded: drm_buddy_test] [ 92.043190] CPU: 1 UID: 0 PID: 3570 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.043427] Tainted: [B]=BAD_PAGE, [N]=TEST [ 92.043540] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.043713] RIP: 0010:depot_fetch_stack+0x5a/0x80 [ 92.043836] Code: 04 ed e0 d9 aa 87 48 85 c0 74 25 48 01 d8 8b 50 1c 85 d2 74 21 5b 5d c3 cc cc cc cc 89 f9 48 c7 c7 b0 a3 1e 85 e8 d6 60 a6 fe <0f> 0b 31 c0 eb e5 0f 0b 31 c0 eb df 0f 0b 31 c0 eb d9 48 89 ee 48 [ 92.044184] RSP: 0018:ffffc9000269fb98 EFLAGS: 00010082 [ 92.044305] RAX: 0000000000000000 RBX: 0000000000001230 RCX: 0000000000000001 [ 92.044463] RDX: 0000000000000027 RSI: 0000000000000004 RDI: ffff8883676ac1c8 [ 92.044611] RBP: ffffc9000269fc48 R08: 0000000000000001 R09: ffffed106ced5839 [ 92.044750] R10: ffff8883676ac1cb R11: 0000000000000001 R12: ffffea00072da980 [ 92.044888] R13: ffffc900026af428 R14: 0000000000000001 R15: ffff888117123600 [ 92.045026] FS: 0000000000000000(0000) GS:ffff8883dffd0000(0000) knlGS:0000000000000000 [ 92.045179] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 92.045297] CR2: 00007fecf30e9a1c CR3: 000000041be74003 CR4: 00000000001726f0 [ 92.045447] DR0: ffffffff8788f484 DR1: ffffffff8788f489 DR2: ffffffff8788f48a [ 92.045598] DR3: ffffffff8788f48b DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 92.045736] Call Trace: [ 92.045803] [ 92.045864] stack_depot_print+0x17/0x50 [ 92.045955] print_address_description.constprop.0+0x316/0x3b0 [ 92.046075] ? kmalloc_oob_left+0x30f/0x360 [kasan_test] [ 92.046194] print_report+0xb9/0x280 [ 92.046280] ? kmalloc_oob_left+0x30f/0x360 [kasan_test] [ 92.046406] ? kasan_addr_to_slab+0x9/0x90 [ 92.046509] ? kmalloc_oob_left+0x30f/0x360 [kasan_test] [ 92.046628] kasan_report+0xda/0x110 [ 92.046714] ? kmalloc_oob_left+0x30f/0x360 [kasan_test] [ 92.046832] kmalloc_oob_left+0x30f/0x360 [kasan_test] [ 92.046950] ? __pfx_kmalloc_oob_left+0x10/0x10 [kasan_test] [ 92.047072] ? __schedule+0x763/0x1490 [ 92.047160] ? __pfx_read_tsc+0x10/0x10 [ 92.047249] ? ktime_get_ts64+0x7f/0x220 [ 92.047340] kunit_try_run_case+0x175/0x440 [ 92.047445] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.047556] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.047665] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.047766] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.047891] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.048004] kthread+0x3b4/0x780 [ 92.048086] ? __pfx_kthread+0x10/0x10 [ 92.048175] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.048277] ? __pfx_kthread+0x10/0x10 [ 92.048367] ? __pfx_kthread+0x10/0x10 [ 92.048466] ret_from_fork+0x22c/0x300 [ 92.048567] ? __pfx_kthread+0x10/0x10 [ 92.048657] ret_from_fork_asm+0x1a/0x30 [ 92.048749] [ 92.048811] ---[ end trace 0000000000000000 ]--- [ 92.048911] ------------[ cut here ]------------ [ 92.049011] corrupt handle or use after stack_depot_put() [ 92.049023] WARNING: CPU: 1 PID: 3570 at lib/stackdepot.c:723 stack_depot_print+0x3a/0x50 [ 92.049290] Modules linked in: kasan_test snd_hda_codec_hdmi snd_hda_codec_realtek snd_hda_codec_generic snd_hda_scodec_component intel_rapl_msr intel_rapl_common btrfs blake2b_generic x86_pkg_temp_thermal xor intel_powerclamp netconsole raid6_pq coretemp i915 sd_mod snd_hda_intel snd_intel_dspcfg sg kvm_intel snd_intel_sdw_acpi snd_hda_codec ipmi_devintf ipmi_msghandler kvm intel_gtt snd_hda_core irqbypass ghash_clmulni_intel cec snd_hwdep ttm rapl intel_cstate snd_pcm drm_client_lib ahci drm_buddy libahci mxm_wmi snd_timer snd i2c_i801 libata drm_display_helper intel_uncore pcspkr i2c_smbus lpc_ich soundcore drm_kms_helper video wmi binfmt_misc fuse drm loop dm_mod ip_tables [last unloaded: drm_buddy_test] [ 92.050386] CPU: 1 UID: 0 PID: 3570 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.050639] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.050754] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.050926] RIP: 0010:stack_depot_print+0x3a/0x50 [ 92.051047] Code: cc cc e8 a9 f9 ff ff 48 85 c0 74 12 8b 70 14 48 8d 78 20 85 f6 74 1a 31 d2 e9 a2 fb ce fe 48 c7 c7 e8 a3 1e 85 e8 b6 5a a6 fe <0f> 0b c3 cc cc cc cc c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 [ 92.051389] RSP: 0018:ffffc9000269fbb0 EFLAGS: 00010086 [ 92.051537] RAX: 0000000000000000 RBX: ffff8881cb6a6c5f RCX: 0000000000000001 [ 92.051675] RDX: 0000000000000027 RSI: 0000000000000004 RDI: ffff8883676ac1c8 [ 92.051812] RBP: ffffc9000269fc48 R08: 0000000000000001 R09: ffffed106ced5839 [ 92.051950] R10: ffff8883676ac1cb R11: 0000000000000001 R12: ffffea00072da980 [ 92.052087] R13: ffffc900026af428 R14: 0000000000000001 R15: ffff888117123600 [ 92.052225] FS: 0000000000000000(0000) GS:ffff8883dffd0000(0000) knlGS:0000000000000000 [ 92.052377] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 92.052513] CR2: 00007fecf30e9a1c CR3: 000000041be74003 CR4: 00000000001726f0 [ 92.052651] DR0: ffffffff8788f484 DR1: ffffffff8788f489 DR2: ffffffff8788f48a [ 92.052788] DR3: ffffffff8788f48b DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 92.052925] Call Trace: [ 92.052991] [ 92.053052] print_address_description.constprop.0+0x316/0x3b0 [ 92.053171] ? kmalloc_oob_left+0x30f/0x360 [kasan_test] [ 92.053288] print_report+0xb9/0x280 [ 92.053373] ? kmalloc_oob_left+0x30f/0x360 [kasan_test] [ 92.053510] ? kasan_addr_to_slab+0x9/0x90 [ 92.053605] ? kmalloc_oob_left+0x30f/0x360 [kasan_test] [ 92.053721] kasan_report+0xda/0x110 [ 92.053807] ? kmalloc_oob_left+0x30f/0x360 [kasan_test] [ 92.053924] kmalloc_oob_left+0x30f/0x360 [kasan_test] [ 92.054038] ? __pfx_kmalloc_oob_left+0x10/0x10 [kasan_test] [ 92.054160] ? __schedule+0x763/0x1490 [ 92.054249] ? __pfx_read_tsc+0x10/0x10 [ 92.054338] ? ktime_get_ts64+0x7f/0x220 [ 92.054439] kunit_try_run_case+0x175/0x440 [ 92.054545] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.054648] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.054759] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.054860] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.054983] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.055098] kthread+0x3b4/0x780 [ 92.055179] ? __pfx_kthread+0x10/0x10 [ 92.055266] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.055369] ? __pfx_kthread+0x10/0x10 [ 92.055477] ? __pfx_kthread+0x10/0x10 [ 92.055566] ret_from_fork+0x22c/0x300 [ 92.055654] ? __pfx_kthread+0x10/0x10 [ 92.055742] ret_from_fork_asm+0x1a/0x30 [ 92.055833] [ 92.055895] ---[ end trace 0000000000000000 ]--- [ 92.056046] The buggy address belongs to the object at ffff8881cb6a6c40 which belongs to the cache kmalloc-16 of size 16 [ 92.056274] The buggy address is located 15 bytes to the right of allocated 16-byte region [ffff8881cb6a6c40, ffff8881cb6a6c50) [ 92.056584] The buggy address belongs to the physical page: [ 92.056700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1cb6a6 [ 92.056856] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 92.056992] page_type: f5(slab) [ 92.057071] raw: 0017ffffc0000000 ffff888100042640 0000000000000000 0000000000000001 [ 92.057219] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 92.057365] page dumped because: kasan: bad access detected [ 92.057547] Memory state around the buggy address: [ 92.057651] ffff8881cb6a6b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 03 fc fc [ 92.057790] ffff8881cb6a6b80: fa fb fc fc fa fb fc fc 00 05 fc fc 00 04 fc fc [ 92.057927] >ffff8881cb6a6c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 07 fc fc [ 92.058065] ^ [ 92.058185] ffff8881cb6a6c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 92.058323] ffff8881cb6a6d00: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 92.058479] ================================================================== [ 92.058844] ok 2 kmalloc_oob_left [ 92.058991] ================================================================== [ 92.059227] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x317/0x360 [kasan_test] [ 92.059396] Read of size 1 at addr ffff88810c313000 by task kunit_try_catch/3572 [ 92.059603] CPU: 1 UID: 0 PID: 3572 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.059611] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.059613] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.059615] Call Trace: [ 92.059617] [ 92.059619] dump_stack_lvl+0x4f/0x70 [ 92.059625] print_address_description.constprop.0+0x2c/0x3b0 [ 92.059630] ? kmalloc_node_oob_right+0x317/0x360 [kasan_test] [ 92.059640] print_report+0xb9/0x280 [ 92.059643] ? kmalloc_node_oob_right+0x317/0x360 [kasan_test] [ 92.059653] ? kasan_addr_to_slab+0x9/0x90 [ 92.059656] ? kmalloc_node_oob_right+0x317/0x360 [kasan_test] [ 92.059665] kasan_report+0xda/0x110 [ 92.059669] ? kmalloc_node_oob_right+0x317/0x360 [kasan_test] [ 92.059679] kmalloc_node_oob_right+0x317/0x360 [kasan_test] [ 92.059689] ? __pfx_kmalloc_node_oob_right+0x10/0x10 [kasan_test] [ 92.059698] ? __schedule+0x763/0x1490 [ 92.059702] ? __pfx_read_tsc+0x10/0x10 [ 92.059705] ? ktime_get_ts64+0x7f/0x220 [ 92.059709] kunit_try_run_case+0x175/0x440 [ 92.059713] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.059716] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.059720] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.059723] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.059727] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.059731] kthread+0x3b4/0x780 [ 92.059735] ? __pfx_kthread+0x10/0x10 [ 92.059738] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.059742] ? __pfx_kthread+0x10/0x10 [ 92.059746] ? __pfx_kthread+0x10/0x10 [ 92.059749] ret_from_fork+0x22c/0x300 [ 92.059753] ? __pfx_kthread+0x10/0x10 [ 92.059757] ret_from_fork_asm+0x1a/0x30 [ 92.059762] [ 92.063155] Allocated by task 3572: [ 92.063237] kasan_save_stack+0x1c/0x40 [ 92.063326] kasan_save_track+0x10/0x30 [ 92.063426] __kasan_kmalloc+0xa6/0xb0 [ 92.063522] kmalloc_node_oob_right+0x9a/0x360 [kasan_test] [ 92.063642] kunit_try_run_case+0x175/0x440 [ 92.063736] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.063847] kthread+0x3b4/0x780 [ 92.063925] ret_from_fork+0x22c/0x300 [ 92.064012] ret_from_fork_asm+0x1a/0x30 [ 92.064150] The buggy address belongs to the object at ffff88810c312000 which belongs to the cache kmalloc-4k of size 4096 [ 92.064380] The buggy address is located 0 bytes to the right of allocated 4096-byte region [ffff88810c312000, ffff88810c313000) [ 92.064689] The buggy address belongs to the physical page: [ 92.064804] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10c310 [ 92.064957] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.065103] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.065240] page_type: f5(slab) [ 92.065318] raw: 0017ffffc0000040 ffff888100043040 ffffea000430ca00 0000000000000002 [ 92.065485] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 92.065632] head: 0017ffffc0000040 ffff888100043040 ffffea000430ca00 0000000000000002 [ 92.065781] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 92.065932] head: 0017ffffc0000003 ffffea000430c401 00000000ffffffff 00000000ffffffff [ 92.066083] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 92.066230] page dumped because: kasan: bad access detected [ 92.066392] Memory state around the buggy address: [ 92.066512] ffff88810c312f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.066651] ffff88810c312f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.066789] >ffff88810c313000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.066926] ^ [ 92.067004] ffff88810c313080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.067142] ffff88810c313100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.067282] ================================================================== [ 92.067587] ok 3 kmalloc_node_oob_right [ 92.067707] ================================================================== [ 92.067948] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520 [kasan_test] [ 92.068126] Write of size 1 at addr ffff888103589e78 by task kunit_try_catch/3574 [ 92.068321] CPU: 1 UID: 0 PID: 3574 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.068328] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.068329] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.068332] Call Trace: [ 92.068333] [ 92.068335] dump_stack_lvl+0x4f/0x70 [ 92.068340] print_address_description.constprop.0+0x2c/0x3b0 [ 92.068345] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [kasan_test] [ 92.068354] print_report+0xb9/0x280 [ 92.068358] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [kasan_test] [ 92.068367] ? kasan_addr_to_slab+0x9/0x90 [ 92.068370] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [kasan_test] [ 92.068379] kasan_report+0xda/0x110 [ 92.068383] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [kasan_test] [ 92.068401] kmalloc_track_caller_oob_right+0x4c8/0x520 [kasan_test] [ 92.068411] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [kasan_test] [ 92.068420] ? __schedule+0x763/0x1490 [ 92.068424] ? __pfx_read_tsc+0x10/0x10 [ 92.068427] ? ktime_get_ts64+0x7f/0x220 [ 92.068431] ? __pfx___schedule+0x10/0x10 [ 92.068435] kunit_try_run_case+0x175/0x440 [ 92.068438] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.068441] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.068446] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.068449] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.068453] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.068457] kthread+0x3b4/0x780 [ 92.068460] ? __pfx_kthread+0x10/0x10 [ 92.068464] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.068468] ? __pfx_kthread+0x10/0x10 [ 92.068471] ? __pfx_kthread+0x10/0x10 [ 92.068475] ret_from_fork+0x22c/0x300 [ 92.068479] ? __pfx_kthread+0x10/0x10 [ 92.068482] ret_from_fork_asm+0x1a/0x30 [ 92.068487] [ 92.072081] Allocated by task 3574: [ 92.072163] kasan_save_stack+0x1c/0x40 [ 92.072251] kasan_save_track+0x10/0x30 [ 92.072338] __kasan_kmalloc+0xa6/0xb0 [ 92.072435] __kmalloc_node_track_caller_noprof+0x1c1/0x520 [ 92.072562] kmalloc_track_caller_oob_right+0x8b/0x520 [kasan_test] [ 92.072692] kunit_try_run_case+0x175/0x440 [ 92.072784] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.072895] kthread+0x3b4/0x780 [ 92.072973] ret_from_fork+0x22c/0x300 [ 92.073059] ret_from_fork_asm+0x1a/0x30 [ 92.073198] The buggy address belongs to the object at ffff888103589e00 which belongs to the cache kmalloc-128 of size 128 [ 92.073438] The buggy address is located 0 bytes to the right of allocated 120-byte region [ffff888103589e00, ffff888103589e78) [ 92.073737] The buggy address belongs to the physical page: [ 92.073852] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103588 [ 92.074003] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.074150] ksm flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.074293] page_type: f5(slab) [ 92.074370] raw: 0017ffffc0000040 ffff888100042a00 ffffea00040b4180 0000000000000003 [ 92.074538] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.074689] head: 0017ffffc0000040 ffff888100042a00 ffffea00040b4180 0000000000000003 [ 92.074838] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.074986] head: 0017ffffc0000001 ffffea00040d6201 00000000ffffffff 00000000ffffffff [ 92.075134] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 92.075281] page dumped because: kasan: bad access detected [ 92.075464] Memory state around the buggy address: [ 92.075564] ffff888103589d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 92.075703] ffff888103589d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.075840] >ffff888103589e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 92.075977] ^ [ 92.076115] ffff888103589e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.076252] ffff888103589f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 92.076389] ================================================================== [ 92.076607] ================================================================== [ 92.076748] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520 [kasan_test] [ 92.076937] Write of size 1 at addr ffff888103589578 by task kunit_try_catch/3574 [ 92.077133] CPU: 1 UID: 0 PID: 3574 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.077140] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.077142] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.077144] Call Trace: [ 92.077145] [ 92.077147] dump_stack_lvl+0x4f/0x70 [ 92.077152] print_address_description.constprop.0+0x2c/0x3b0 [ 92.077157] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [kasan_test] [ 92.077175] print_report+0xb9/0x280 [ 92.077179] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [kasan_test] [ 92.077187] ? kasan_addr_to_slab+0x9/0x90 [ 92.077190] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [kasan_test] [ 92.077199] kasan_report+0xda/0x110 [ 92.077203] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [kasan_test] [ 92.077212] kmalloc_track_caller_oob_right+0x4b1/0x520 [kasan_test] [ 92.077222] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [kasan_test] [ 92.077231] ? __schedule+0x763/0x1490 [ 92.077234] ? __pfx_read_tsc+0x10/0x10 [ 92.077237] ? ktime_get_ts64+0x7f/0x220 [ 92.077240] ? __pfx___schedule+0x10/0x10 [ 92.077244] kunit_try_run_case+0x175/0x440 [ 92.077247] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.077250] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.077254] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.077257] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.077261] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.077264] kthread+0x3b4/0x780 [ 92.077268] ? __pfx_kthread+0x10/0x10 [ 92.077271] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.077275] ? __pfx_kthread+0x10/0x10 [ 92.077278] ? __pfx_kthread+0x10/0x10 [ 92.077282] ret_from_fork+0x22c/0x300 [ 92.077285] ? __pfx_kthread+0x10/0x10 [ 92.077289] ret_from_fork_asm+0x1a/0x30 [ 92.077293] [ 92.080883] Allocated by task 3574: [ 92.080965] kasan_save_stack+0x1c/0x40 [ 92.081053] kasan_save_track+0x10/0x30 [ 92.081139] __kasan_kmalloc+0xa6/0xb0 [ 92.081225] __kmalloc_node_track_caller_noprof+0x1c1/0x520 [ 92.081339] kmalloc_track_caller_oob_right+0x18f/0x520 [kasan_test] [ 92.081490] kunit_try_run_case+0x175/0x440 [ 92.081584] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.081696] kthread+0x3b4/0x780 [ 92.081774] ret_from_fork+0x22c/0x300 [ 92.081861] ret_from_fork_asm+0x1a/0x30 [ 92.081999] The buggy address belongs to the object at ffff888103589500 which belongs to the cache kmalloc-128 of size 128 [ 92.082228] The buggy address is located 0 bytes to the right of allocated 120-byte region [ffff888103589500, ffff888103589578) [ 92.082537] The buggy address belongs to the physical page: [ 92.082650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103588 [ 92.082802] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.082948] ksm flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.083089] page_type: f5(slab) [ 92.083168] raw: 0017ffffc0000040 ffff888100042a00 ffffea00040b4180 0000000000000003 [ 92.083315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.083482] head: 0017ffffc0000040 ffff888100042a00 ffffea00040b4180 0000000000000003 [ 92.083631] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.083778] head: 0017ffffc0000001 ffffea00040d6201 00000000ffffffff 00000000ffffffff [ 92.083926] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 92.084073] page dumped because: kasan: bad access detected [ 92.084236] Memory state around the buggy address: [ 92.084339] ffff888103589400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.084498] ffff888103589480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.084635] >ffff888103589500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 92.084772] ^ [ 92.084908] ffff888103589580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.085045] ffff888103589600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.085182] ================================================================== [ 92.085749] ok 4 kmalloc_track_caller_oob_right [ 92.085874] ================================================================== [ 92.086120] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2d9/0x320 [kasan_test] [ 92.086292] Write of size 1 at addr ffff888113435f00 by task kunit_try_catch/3576 [ 92.086497] CPU: 1 UID: 0 PID: 3576 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.086505] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.086506] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.086509] Call Trace: [ 92.086510] [ 92.086512] dump_stack_lvl+0x4f/0x70 [ 92.086518] print_address_description.constprop.0+0x2c/0x3b0 [ 92.086522] ? kmalloc_big_oob_right+0x2d9/0x320 [kasan_test] [ 92.086532] print_report+0xb9/0x280 [ 92.086536] ? kmalloc_big_oob_right+0x2d9/0x320 [kasan_test] [ 92.086545] ? kasan_addr_to_slab+0x9/0x90 [ 92.086548] ? kmalloc_big_oob_right+0x2d9/0x320 [kasan_test] [ 92.086557] kasan_report+0xda/0x110 [ 92.086561] ? kmalloc_big_oob_right+0x2d9/0x320 [kasan_test] [ 92.086571] kmalloc_big_oob_right+0x2d9/0x320 [kasan_test] [ 92.086581] ? __pfx_kmalloc_big_oob_right+0x10/0x10 [kasan_test] [ 92.086590] ? __schedule+0x763/0x1490 [ 92.086594] ? __pfx_read_tsc+0x10/0x10 [ 92.086597] ? ktime_get_ts64+0x7f/0x220 [ 92.086601] ? __pfx___schedule+0x10/0x10 [ 92.086605] kunit_try_run_case+0x175/0x440 [ 92.086608] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.086611] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.086616] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.086619] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.086623] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.086627] kthread+0x3b4/0x780 [ 92.086630] ? __pfx_kthread+0x10/0x10 [ 92.086634] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.086638] ? __pfx_kthread+0x10/0x10 [ 92.086641] ? __pfx_kthread+0x10/0x10 [ 92.086645] ret_from_fork+0x22c/0x300 [ 92.086649] ? __pfx_kthread+0x10/0x10 [ 92.086652] ret_from_fork_asm+0x1a/0x30 [ 92.086657] [ 92.088503] is_virt=false [ 92.088544] Allocated by task 3576: [ 92.088546] kasan_save_stack+0x1c/0x40 [ 92.088695] kasan_save_track+0x10/0x30 [ 92.090496] __kasan_kmalloc+0xa6/0xb0 [ 92.090583] kmalloc_big_oob_right+0x96/0x320 [kasan_test] [ 92.090701] kunit_try_run_case+0x175/0x440 [ 92.090799] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.090912] kthread+0x3b4/0x780 [ 92.090992] ret_from_fork+0x22c/0x300 [ 92.091080] ret_from_fork_asm+0x1a/0x30 [ 92.091224] The buggy address belongs to the object at ffff888113434000 which belongs to the cache kmalloc-8k of size 8192 [ 92.091460] The buggy address is located 0 bytes to the right of allocated 7936-byte region [ffff888113434000, ffff888113435f00) [ 92.091763] The buggy address belongs to the physical page: [ 92.091875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x113430 [ 92.092027] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.092172] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.092308] page_type: f5(slab) [ 92.092386] raw: 0017ffffc0000040 ffff888100043180 dead000000000122 0000000000000000 [ 92.092556] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 92.092703] head: 0017ffffc0000040 ffff888100043180 dead000000000122 0000000000000000 [ 92.092852] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 92.093000] head: 0017ffffc0000003 ffffea00044d0c01 00000000ffffffff 00000000ffffffff [ 92.093151] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 92.093299] page dumped because: kasan: bad access detected [ 92.093478] Memory state around the buggy address: [ 92.093589] ffff888113435e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.093727] ffff888113435e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.093865] >ffff888113435f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.094002] ^ [ 92.094081] ffff888113435f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.094222] ffff888113436000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.094359] ================================================================== [ 92.094665] ok 5 kmalloc_big_oob_right [ 92.094783] ================================================================== [ 92.095026] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2ac/0x2e0 [kasan_test] [ 92.095193] Write of size 1 at addr ffff88840bb1e00a by task kunit_try_catch/3578 [ 92.095392] CPU: 1 UID: 0 PID: 3578 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.095407] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.095409] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.095412] Call Trace: [ 92.095413] [ 92.095415] dump_stack_lvl+0x4f/0x70 [ 92.095421] print_address_description.constprop.0+0x2c/0x3b0 [ 92.095430] ? kmalloc_large_oob_right+0x2ac/0x2e0 [kasan_test] [ 92.095439] print_report+0xb9/0x280 [ 92.095443] ? kmalloc_large_oob_right+0x2ac/0x2e0 [kasan_test] [ 92.095452] ? kasan_addr_to_slab+0x9/0x90 [ 92.095455] ? kmalloc_large_oob_right+0x2ac/0x2e0 [kasan_test] [ 92.095464] kasan_report+0xda/0x110 [ 92.095468] ? kmalloc_large_oob_right+0x2ac/0x2e0 [kasan_test] [ 92.095477] kmalloc_large_oob_right+0x2ac/0x2e0 [kasan_test] [ 92.095486] ? __pfx_kmalloc_large_oob_right+0x10/0x10 [kasan_test] [ 92.095495] ? __schedule+0x763/0x1490 [ 92.095499] ? __pfx_read_tsc+0x10/0x10 [ 92.095502] ? ktime_get_ts64+0x7f/0x220 [ 92.095506] ? __pfx___schedule+0x10/0x10 [ 92.095509] kunit_try_run_case+0x175/0x440 [ 92.095513] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.095516] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.095521] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.095523] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.095527] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.095531] kthread+0x3b4/0x780 [ 92.095535] ? __pfx_kthread+0x10/0x10 [ 92.095539] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.095542] ? __pfx_kthread+0x10/0x10 [ 92.095546] ? __pfx_kthread+0x10/0x10 [ 92.095550] ret_from_fork+0x22c/0x300 [ 92.095553] ? __pfx_kthread+0x10/0x10 [ 92.095557] ret_from_fork_asm+0x1a/0x30 [ 92.095562] [ 92.099053] The buggy address belongs to the physical page: [ 92.099168] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88840bb1d000 pfn:0x40bb1c [ 92.099339] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.099506] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.099643] page_type: f8(unknown) [ 92.099725] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 92.099872] raw: ffff88840bb1d000 0000000000000000 00000001f8000000 0000000000000000 [ 92.100019] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 92.100172] head: ffff88840bb1d000 0000000000000000 00000001f8000000 0000000000000000 [ 92.100322] head: 0017ffffc0000002 ffffea00102ec701 00000000ffffffff 00000000ffffffff [ 92.100491] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 92.100642] page dumped because: kasan: bad access detected [ 92.100804] Memory state around the buggy address: [ 92.100907] ffff88840bb1df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.101045] ffff88840bb1df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.101187] >ffff88840bb1e000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 92.101327] ^ [ 92.101408] ffff88840bb1e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 92.101568] ffff88840bb1e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 92.101705] ================================================================== [ 92.102049] ok 6 kmalloc_large_oob_right [ 92.102156] ================================================================== [ 92.102404] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2e3/0x330 [kasan_test] [ 92.102568] Read of size 1 at addr ffff8881a0dcc000 by task kunit_try_catch/3580 [ 92.102765] CPU: 4 UID: 0 PID: 3580 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.102772] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.102774] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.102777] Call Trace: [ 92.102778] [ 92.102780] dump_stack_lvl+0x4f/0x70 [ 92.102786] print_address_description.constprop.0+0x2c/0x3b0 [ 92.102791] ? kmalloc_large_uaf+0x2e3/0x330 [kasan_test] [ 92.102800] print_report+0xb9/0x280 [ 92.102804] ? kmalloc_large_uaf+0x2e3/0x330 [kasan_test] [ 92.102813] ? kasan_addr_to_slab+0x9/0x90 [ 92.102816] ? kmalloc_large_uaf+0x2e3/0x330 [kasan_test] [ 92.102825] kasan_report+0xda/0x110 [ 92.102828] ? kmalloc_large_uaf+0x2e3/0x330 [kasan_test] [ 92.102838] kmalloc_large_uaf+0x2e3/0x330 [kasan_test] [ 92.102848] ? __pfx_kmalloc_large_uaf+0x10/0x10 [kasan_test] [ 92.102856] ? __schedule+0x763/0x1490 [ 92.102860] ? __pfx_read_tsc+0x10/0x10 [ 92.102863] ? ktime_get_ts64+0x7f/0x220 [ 92.102867] ? __pfx___schedule+0x10/0x10 [ 92.102871] kunit_try_run_case+0x175/0x440 [ 92.102874] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.102878] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.102882] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.102885] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.102889] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.102893] kthread+0x3b4/0x780 [ 92.102897] ? __pfx_kthread+0x10/0x10 [ 92.102900] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.102904] ? __pfx_kthread+0x10/0x10 [ 92.102907] ? __pfx_kthread+0x10/0x10 [ 92.102911] ret_from_fork+0x22c/0x300 [ 92.102915] ? __pfx_kthread+0x10/0x10 [ 92.102919] ret_from_fork_asm+0x1a/0x30 [ 92.102924] [ 92.106352] The buggy address belongs to the physical page: [ 92.106485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x7a89 pfn:0x1a0dcc [ 92.106643] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 92.106774] raw: 0017ffffc0000000 ffffea0010205608 ffff888367847f40 0000000000000000 [ 92.106922] raw: 0000000000007a89 0000000000000000 00000000ffffffff 0000000000000000 [ 92.107068] page dumped because: kasan: bad access detected [ 92.107229] Memory state around the buggy address: [ 92.107330] ffff8881a0dcbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.107488] ffff8881a0dcbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.107629] >ffff8881a0dcc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 92.107766] ^ [ 92.107843] ffff8881a0dcc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 92.107980] ffff8881a0dcc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 92.108122] ================================================================== [ 92.108411] ok 7 kmalloc_large_uaf [ 92.108537] ================================================================== [ 92.108763] BUG: KASAN: invalid-free in kmalloc_large_invalid_free+0x10f/0x2a0 [kasan_test] [ 92.108937] Free of addr ffff8881a0dcc001 by task kunit_try_catch/3582 [ 92.109118] CPU: 4 UID: 0 PID: 3582 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.109124] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.109126] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.109128] Call Trace: [ 92.109130] [ 92.109131] dump_stack_lvl+0x4f/0x70 [ 92.109136] print_address_description.constprop.0+0x2c/0x3b0 [ 92.109141] print_report+0xb9/0x280 [ 92.109145] ? kasan_addr_to_slab+0x9/0x90 [ 92.109148] ? kmalloc_large_invalid_free+0x10f/0x2a0 [kasan_test] [ 92.109157] kasan_report_invalid_free+0xba/0xe0 [ 92.109161] ? kmalloc_large_invalid_free+0x10f/0x2a0 [kasan_test] [ 92.109170] free_large_kmalloc+0x47/0x110 [ 92.109175] kmalloc_large_invalid_free+0x10f/0x2a0 [kasan_test] [ 92.109184] ? __pfx_kmalloc_large_invalid_free+0x10/0x10 [kasan_test] [ 92.109193] ? __schedule+0x763/0x1490 [ 92.109197] ? __pfx_read_tsc+0x10/0x10 [ 92.109200] ? ktime_get_ts64+0x7f/0x220 [ 92.109203] ? __pfx___schedule+0x10/0x10 [ 92.109207] kunit_try_run_case+0x175/0x440 [ 92.109210] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.109213] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.109218] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.109220] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.109224] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.109228] kthread+0x3b4/0x780 [ 92.109232] ? __pfx_kthread+0x10/0x10 [ 92.109235] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.109239] ? __pfx_kthread+0x10/0x10 [ 92.109243] ? __pfx_kthread+0x10/0x10 [ 92.109246] ret_from_fork+0x22c/0x300 [ 92.109250] ? __pfx_kthread+0x10/0x10 [ 92.109253] ret_from_fork_asm+0x1a/0x30 [ 92.109258] [ 92.112670] The buggy address belongs to the physical page: [ 92.112783] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x7a89 pfn:0x1a0dcc [ 92.112940] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.113086] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.113222] page_type: f8(unknown) [ 92.113304] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 92.113475] raw: 0000000000007a89 0000000000000000 00000001f8000000 0000000000000000 [ 92.113622] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 92.113771] head: 0000000000007a89 0000000000000000 00000001f8000000 0000000000000000 [ 92.113919] head: 0017ffffc0000002 ffffea0006837301 00000000ffffffff 00000000ffffffff [ 92.114066] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 92.114214] page dumped because: kasan: bad access detected [ 92.114375] Memory state around the buggy address: [ 92.114496] ffff8881a0dcbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.114635] ffff8881a0dcbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.114772] >ffff8881a0dcc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.114910] ^ [ 92.114988] ffff8881a0dcc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.115126] ffff8881a0dcc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.115263] ================================================================== [ 92.115547] ok 8 kmalloc_large_invalid_free [ 92.115788] ok 9 page_alloc_oob_right # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 92.116007] ================================================================== [ 92.116302] BUG: KASAN: use-after-free in page_alloc_uaf+0x350/0x3c0 [kasan_test] [ 92.116459] Read of size 1 at addr ffff888111c50000 by task kunit_try_catch/3586 [ 92.116659] CPU: 6 UID: 0 PID: 3586 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.116667] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.116669] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.116671] Call Trace: [ 92.116673] [ 92.116674] dump_stack_lvl+0x4f/0x70 [ 92.116680] print_address_description.constprop.0+0x2c/0x3b0 [ 92.116686] ? page_alloc_uaf+0x350/0x3c0 [kasan_test] [ 92.116696] print_report+0xb9/0x280 [ 92.116700] ? page_alloc_uaf+0x350/0x3c0 [kasan_test] [ 92.116709] ? kasan_addr_to_slab+0x9/0x90 [ 92.116712] ? page_alloc_uaf+0x350/0x3c0 [kasan_test] [ 92.116722] kasan_report+0xda/0x110 [ 92.116725] ? page_alloc_uaf+0x350/0x3c0 [kasan_test] [ 92.116735] page_alloc_uaf+0x350/0x3c0 [kasan_test] [ 92.116745] ? __pfx_page_alloc_uaf+0x10/0x10 [kasan_test] [ 92.116755] ? __schedule+0x763/0x1490 [ 92.116759] ? __pfx_read_tsc+0x10/0x10 [ 92.116762] ? ktime_get_ts64+0x7f/0x220 [ 92.116766] ? __pfx___schedule+0x10/0x10 [ 92.116770] kunit_try_run_case+0x175/0x440 [ 92.116773] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.116777] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.116781] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.116784] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.116788] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.116792] kthread+0x3b4/0x780 [ 92.116796] ? __pfx_kthread+0x10/0x10 [ 92.116800] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.116803] ? __pfx_kthread+0x10/0x10 [ 92.116807] ? __pfx_kthread+0x10/0x10 [ 92.116811] ret_from_fork+0x22c/0x300 [ 92.116815] ? __pfx_kthread+0x10/0x10 [ 92.116818] ret_from_fork_asm+0x1a/0x30 [ 92.116823] [ 92.120234] The buggy address belongs to the physical page: [ 92.120345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888111c50000 pfn:0x111c50 [ 92.120547] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 92.120676] page_type: f0(buddy) [ 92.120756] raw: 0017ffffc0000000 ffffea0004aed408 ffff88841f5cff60 0000000000000000 [ 92.120922] raw: ffff888111c50000 0000000000000004 00000000f0000000 0000000000000000 [ 92.121068] page dumped because: kasan: bad access detected [ 92.121229] Memory state around the buggy address: [ 92.121329] ffff888111c4ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.121490] ffff888111c4ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.121631] >ffff888111c50000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 92.121768] ^ [ 92.121844] ffff888111c50080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 92.121983] ffff888111c50100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 92.122123] ================================================================== [ 92.122620] ok 10 page_alloc_uaf [ 92.122827] ================================================================== [ 92.123069] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x770/0x820 [kasan_test] [ 92.123245] Write of size 1 at addr ffff88840c45eceb by task kunit_try_catch/3588 [ 92.123453] CPU: 1 UID: 0 PID: 3588 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.123461] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.123463] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.123465] Call Trace: [ 92.123467] [ 92.123469] dump_stack_lvl+0x4f/0x70 [ 92.123475] print_address_description.constprop.0+0x2c/0x3b0 [ 92.123480] ? krealloc_more_oob_helper+0x770/0x820 [kasan_test] [ 92.123490] print_report+0xb9/0x280 [ 92.123494] ? krealloc_more_oob_helper+0x770/0x820 [kasan_test] [ 92.123503] ? kasan_addr_to_slab+0x9/0x90 [ 92.123507] ? krealloc_more_oob_helper+0x770/0x820 [kasan_test] [ 92.123516] kasan_report+0xda/0x110 [ 92.123520] ? krealloc_more_oob_helper+0x770/0x820 [kasan_test] [ 92.123530] krealloc_more_oob_helper+0x770/0x820 [kasan_test] [ 92.123540] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [kasan_test] [ 92.123549] ? finish_task_switch.isra.0+0x155/0x750 [ 92.123553] ? __switch_to+0x526/0x1000 [ 92.123557] ? __schedule+0x763/0x1490 [ 92.123561] ? __pfx_read_tsc+0x10/0x10 [ 92.123564] ? ktime_get_ts64+0x7f/0x220 [ 92.123569] kunit_try_run_case+0x175/0x440 [ 92.123572] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.123576] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.123581] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.123583] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.123588] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.123592] kthread+0x3b4/0x780 [ 92.123596] ? __pfx_kthread+0x10/0x10 [ 92.123599] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.123603] ? __pfx_kthread+0x10/0x10 [ 92.123606] ? __pfx_kthread+0x10/0x10 [ 92.123610] ret_from_fork+0x22c/0x300 [ 92.123614] ? __pfx_kthread+0x10/0x10 [ 92.123618] ret_from_fork_asm+0x1a/0x30 [ 92.123623] [ 92.127234] Allocated by task 3588: [ 92.127318] kasan_save_stack+0x1c/0x40 [ 92.127409] kasan_save_track+0x10/0x30 [ 92.127500] __kasan_krealloc+0x17f/0x1e0 [ 92.127591] krealloc_noprof+0x127/0x380 [ 92.127681] krealloc_more_oob_helper+0x19b/0x820 [kasan_test] [ 92.127808] kunit_try_run_case+0x175/0x440 [ 92.127900] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.128012] kthread+0x3b4/0x780 [ 92.128092] ret_from_fork+0x22c/0x300 [ 92.128181] ret_from_fork_asm+0x1a/0x30 [ 92.128323] The buggy address belongs to the object at ffff88840c45ec00 which belongs to the cache kmalloc-256 of size 256 [ 92.128559] The buggy address is located 0 bytes to the right of allocated 235-byte region [ffff88840c45ec00, ffff88840c45eceb) [ 92.128853] The buggy address belongs to the physical page: [ 92.128968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x40c45c [ 92.129124] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.129270] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.129410] page_type: f5(slab) [ 92.129499] raw: 0017ffffc0000040 ffff888100042b40 dead000000000122 0000000000000000 [ 92.129649] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.129796] head: 0017ffffc0000040 ffff888100042b40 dead000000000122 0000000000000000 [ 92.129948] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.130096] head: 0017ffffc0000002 ffffea0010311701 00000000ffffffff 00000000ffffffff [ 92.130244] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 92.130403] page dumped because: kasan: bad access detected [ 92.130580] Memory state around the buggy address: [ 92.130681] ffff88840c45eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.130820] ffff88840c45ec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.130958] >ffff88840c45ec80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 92.131096] ^ [ 92.131224] ffff88840c45ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.131362] ffff88840c45ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.131520] ================================================================== [ 92.131679] ================================================================== [ 92.131832] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x742/0x820 [kasan_test] [ 92.132004] Write of size 1 at addr ffff88840c45ecf0 by task kunit_try_catch/3588 [ 92.132212] CPU: 1 UID: 0 PID: 3588 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.132219] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.132220] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.132223] Call Trace: [ 92.132225] [ 92.132226] dump_stack_lvl+0x4f/0x70 [ 92.132232] print_address_description.constprop.0+0x2c/0x3b0 [ 92.132237] ? krealloc_more_oob_helper+0x742/0x820 [kasan_test] [ 92.132246] print_report+0xb9/0x280 [ 92.132250] ? krealloc_more_oob_helper+0x742/0x820 [kasan_test] [ 92.132259] ? kasan_addr_to_slab+0x9/0x90 [ 92.132262] ? krealloc_more_oob_helper+0x742/0x820 [kasan_test] [ 92.132271] kasan_report+0xda/0x110 [ 92.132275] ? krealloc_more_oob_helper+0x742/0x820 [kasan_test] [ 92.132284] krealloc_more_oob_helper+0x742/0x820 [kasan_test] [ 92.132294] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [kasan_test] [ 92.132303] ? finish_task_switch.isra.0+0x155/0x750 [ 92.132307] ? __switch_to+0x526/0x1000 [ 92.132311] ? __schedule+0x763/0x1490 [ 92.132314] ? __pfx_read_tsc+0x10/0x10 [ 92.132318] ? ktime_get_ts64+0x7f/0x220 [ 92.132322] kunit_try_run_case+0x175/0x440 [ 92.132325] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.132328] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.132333] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.132336] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.132340] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.132344] kthread+0x3b4/0x780 [ 92.132347] ? __pfx_kthread+0x10/0x10 [ 92.132351] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.132354] ? __pfx_kthread+0x10/0x10 [ 92.132358] ? __pfx_kthread+0x10/0x10 [ 92.132361] ret_from_fork+0x22c/0x300 [ 92.132365] ? __pfx_kthread+0x10/0x10 [ 92.132369] ret_from_fork_asm+0x1a/0x30 [ 92.132373] [ 92.136034] Allocated by task 3588: [ 92.136116] kasan_save_stack+0x1c/0x40 [ 92.136204] kasan_save_track+0x10/0x30 [ 92.136291] __kasan_krealloc+0x17f/0x1e0 [ 92.136381] krealloc_noprof+0x127/0x380 [ 92.136490] krealloc_more_oob_helper+0x19b/0x820 [kasan_test] [ 92.136614] kunit_try_run_case+0x175/0x440 [ 92.136706] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.136817] kthread+0x3b4/0x780 [ 92.136896] ret_from_fork+0x22c/0x300 [ 92.136985] ret_from_fork_asm+0x1a/0x30 [ 92.137124] The buggy address belongs to the object at ffff88840c45ec00 which belongs to the cache kmalloc-256 of size 256 [ 92.137353] The buggy address is located 5 bytes to the right of allocated 235-byte region [ffff88840c45ec00, ffff88840c45eceb) [ 92.137661] The buggy address belongs to the physical page: [ 92.137773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x40c45c [ 92.137924] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.138074] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.138215] page_type: f5(slab) [ 92.138302] raw: 0017ffffc0000040 ffff888100042b40 dead000000000122 0000000000000000 [ 92.138491] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.138639] head: 0017ffffc0000040 ffff888100042b40 dead000000000122 0000000000000000 [ 92.138787] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.138938] head: 0017ffffc0000002 ffffea0010311701 00000000ffffffff 00000000ffffffff [ 92.139086] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 92.139233] page dumped because: kasan: bad access detected [ 92.139407] Memory state around the buggy address: [ 92.139516] ffff88840c45eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.139655] ffff88840c45ec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.139792] >ffff88840c45ec80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 92.139930] ^ [ 92.140065] ffff88840c45ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.140203] ffff88840c45ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.140340] ================================================================== [ 92.140711] ok 11 krealloc_more_oob [ 92.140862] ================================================================== [ 92.141092] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xc4d/0xeb0 [kasan_test] [ 92.141275] Write of size 1 at addr ffff88840c45fec9 by task kunit_try_catch/3591 [ 92.141480] CPU: 1 UID: 0 PID: 3591 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.141487] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.141489] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.141491] Call Trace: [ 92.141493] [ 92.141495] dump_stack_lvl+0x4f/0x70 [ 92.141500] print_address_description.constprop.0+0x2c/0x3b0 [ 92.141505] ? krealloc_less_oob_helper+0xc4d/0xeb0 [kasan_test] [ 92.141524] print_report+0xb9/0x280 [ 92.141527] ? krealloc_less_oob_helper+0xc4d/0xeb0 [kasan_test] [ 92.141536] ? kasan_addr_to_slab+0x9/0x90 [ 92.141540] ? krealloc_less_oob_helper+0xc4d/0xeb0 [kasan_test] [ 92.141549] kasan_report+0xda/0x110 [ 92.141553] ? krealloc_less_oob_helper+0xc4d/0xeb0 [kasan_test] [ 92.141562] krealloc_less_oob_helper+0xc4d/0xeb0 [kasan_test] [ 92.141572] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [kasan_test] [ 92.141581] ? finish_task_switch.isra.0+0x155/0x750 [ 92.141585] ? __switch_to+0x526/0x1000 [ 92.141589] ? __schedule+0x763/0x1490 [ 92.141592] ? __pfx_read_tsc+0x10/0x10 [ 92.141595] ? ktime_get_ts64+0x7f/0x220 [ 92.141599] kunit_try_run_case+0x175/0x440 [ 92.141603] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.141606] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.141611] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.141614] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.141618] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.141621] kthread+0x3b4/0x780 [ 92.141625] ? __pfx_kthread+0x10/0x10 [ 92.141629] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.141632] ? __pfx_kthread+0x10/0x10 [ 92.141636] ? __pfx_kthread+0x10/0x10 [ 92.141639] ret_from_fork+0x22c/0x300 [ 92.141643] ? __pfx_kthread+0x10/0x10 [ 92.141647] ret_from_fork_asm+0x1a/0x30 [ 92.141651] [ 92.145244] Allocated by task 3591: [ 92.145326] kasan_save_stack+0x1c/0x40 [ 92.145426] kasan_save_track+0x10/0x30 [ 92.145524] __kasan_krealloc+0x17f/0x1e0 [ 92.145613] krealloc_noprof+0x127/0x380 [ 92.145702] krealloc_less_oob_helper+0x19b/0xeb0 [kasan_test] [ 92.145825] kunit_try_run_case+0x175/0x440 [ 92.145918] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.146029] kthread+0x3b4/0x780 [ 92.146107] ret_from_fork+0x22c/0x300 [ 92.146194] ret_from_fork_asm+0x1a/0x30 [ 92.146333] The buggy address belongs to the object at ffff88840c45fe00 which belongs to the cache kmalloc-256 of size 256 [ 92.146582] The buggy address is located 0 bytes to the right of allocated 201-byte region [ffff88840c45fe00, ffff88840c45fec9) [ 92.146870] The buggy address belongs to the physical page: [ 92.146985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x40c45c [ 92.147136] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.147282] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.147432] page_type: f5(slab) [ 92.147521] raw: 0017ffffc0000040 ffff888100042b40 dead000000000122 0000000000000000 [ 92.147669] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.147815] head: 0017ffffc0000040 ffff888100042b40 dead000000000122 0000000000000000 [ 92.147964] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.148114] head: 0017ffffc0000002 ffffea0010311701 00000000ffffffff 00000000ffffffff [ 92.148262] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 92.148420] page dumped because: kasan: bad access detected [ 92.148596] Memory state around the buggy address: [ 92.148696] ffff88840c45fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.148835] ffff88840c45fe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.148973] >ffff88840c45fe80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 92.149112] ^ [ 92.149224] ffff88840c45ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.149365] ffff88840c45ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.149523] ================================================================== [ 92.149722] ================================================================== [ 92.149865] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xcba/0xeb0 [kasan_test] [ 92.150034] Write of size 1 at addr ffff88840c45fed0 by task kunit_try_catch/3591 [ 92.150233] CPU: 1 UID: 0 PID: 3591 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.150240] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.150241] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.150244] Call Trace: [ 92.150246] [ 92.150247] dump_stack_lvl+0x4f/0x70 [ 92.150252] print_address_description.constprop.0+0x2c/0x3b0 [ 92.150257] ? krealloc_less_oob_helper+0xcba/0xeb0 [kasan_test] [ 92.150275] print_report+0xb9/0x280 [ 92.150279] ? krealloc_less_oob_helper+0xcba/0xeb0 [kasan_test] [ 92.150288] ? kasan_addr_to_slab+0x9/0x90 [ 92.150291] ? krealloc_less_oob_helper+0xcba/0xeb0 [kasan_test] [ 92.150300] kasan_report+0xda/0x110 [ 92.150304] ? krealloc_less_oob_helper+0xcba/0xeb0 [kasan_test] [ 92.150313] krealloc_less_oob_helper+0xcba/0xeb0 [kasan_test] [ 92.150323] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [kasan_test] [ 92.150332] ? finish_task_switch.isra.0+0x155/0x750 [ 92.150335] ? __switch_to+0x526/0x1000 [ 92.150339] ? __schedule+0x763/0x1490 [ 92.150342] ? __pfx_read_tsc+0x10/0x10 [ 92.150346] ? ktime_get_ts64+0x7f/0x220 [ 92.150350] kunit_try_run_case+0x175/0x440 [ 92.150353] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.150356] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.150361] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.150364] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.150368] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.150371] kthread+0x3b4/0x780 [ 92.150375] ? __pfx_kthread+0x10/0x10 [ 92.150379] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.150382] ? __pfx_kthread+0x10/0x10 [ 92.150386] ? __pfx_kthread+0x10/0x10 [ 92.150389] ret_from_fork+0x22c/0x300 [ 92.150402] ? __pfx_kthread+0x10/0x10 [ 92.150406] ret_from_fork_asm+0x1a/0x30 [ 92.150411] [ 92.154090] Allocated by task 3591: [ 92.154171] kasan_save_stack+0x1c/0x40 [ 92.154259] kasan_save_track+0x10/0x30 [ 92.154347] __kasan_krealloc+0x17f/0x1e0 [ 92.154456] krealloc_noprof+0x127/0x380 [ 92.154544] krealloc_less_oob_helper+0x19b/0xeb0 [kasan_test] [ 92.154676] kunit_try_run_case+0x175/0x440 [ 92.154780] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.154893] kthread+0x3b4/0x780 [ 92.154971] ret_from_fork+0x22c/0x300 [ 92.155058] ret_from_fork_asm+0x1a/0x30 [ 92.155197] The buggy address belongs to the object at ffff88840c45fe00 which belongs to the cache kmalloc-256 of size 256 [ 92.155441] The buggy address is located 7 bytes to the right of allocated 201-byte region [ffff88840c45fe00, ffff88840c45fec9) [ 92.155740] The buggy address belongs to the physical page: [ 92.155853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x40c45c [ 92.156005] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.156150] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.156286] page_type: f5(slab) [ 92.156364] raw: 0017ffffc0000040 ffff888100042b40 dead000000000122 0000000000000000 [ 92.156537] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.156686] head: 0017ffffc0000040 ffff888100042b40 dead000000000122 0000000000000000 [ 92.156838] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.156990] head: 0017ffffc0000002 ffffea0010311701 00000000ffffffff 00000000ffffffff [ 92.157140] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 92.157287] page dumped because: kasan: bad access detected [ 92.157468] Memory state around the buggy address: [ 92.157568] ffff88840c45fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.157707] ffff88840c45fe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.157844] >ffff88840c45fe80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 92.157982] ^ [ 92.158101] ffff88840c45ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.158241] ffff88840c45ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.158378] ================================================================== [ 92.158544] ================================================================== [ 92.158702] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd0f/0xeb0 [kasan_test] [ 92.158874] Write of size 1 at addr ffff88840c45feda by task kunit_try_catch/3591 [ 92.159075] CPU: 1 UID: 0 PID: 3591 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.159082] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.159084] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.159086] Call Trace: [ 92.159088] [ 92.159089] dump_stack_lvl+0x4f/0x70 [ 92.159095] print_address_description.constprop.0+0x2c/0x3b0 [ 92.159099] ? krealloc_less_oob_helper+0xd0f/0xeb0 [kasan_test] [ 92.159109] print_report+0xb9/0x280 [ 92.159113] ? krealloc_less_oob_helper+0xd0f/0xeb0 [kasan_test] [ 92.159122] ? kasan_addr_to_slab+0x9/0x90 [ 92.159125] ? krealloc_less_oob_helper+0xd0f/0xeb0 [kasan_test] [ 92.159134] kasan_report+0xda/0x110 [ 92.159138] ? krealloc_less_oob_helper+0xd0f/0xeb0 [kasan_test] [ 92.159148] krealloc_less_oob_helper+0xd0f/0xeb0 [kasan_test] [ 92.159158] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [kasan_test] [ 92.159167] ? finish_task_switch.isra.0+0x155/0x750 [ 92.159171] ? __switch_to+0x526/0x1000 [ 92.159175] ? __schedule+0x763/0x1490 [ 92.159178] ? __pfx_read_tsc+0x10/0x10 [ 92.159181] ? ktime_get_ts64+0x7f/0x220 [ 92.159185] kunit_try_run_case+0x175/0x440 [ 92.159189] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.159192] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.159196] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.159199] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.159203] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.159207] kthread+0x3b4/0x780 [ 92.159211] ? __pfx_kthread+0x10/0x10 [ 92.159214] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.159218] ? __pfx_kthread+0x10/0x10 [ 92.159222] ? __pfx_kthread+0x10/0x10 [ 92.159225] ret_from_fork+0x22c/0x300 [ 92.159229] ? __pfx_kthread+0x10/0x10 [ 92.159233] ret_from_fork_asm+0x1a/0x30 [ 92.159237] [ 92.162858] Allocated by task 3591: [ 92.162940] kasan_save_stack+0x1c/0x40 [ 92.163028] kasan_save_track+0x10/0x30 [ 92.163115] __kasan_krealloc+0x17f/0x1e0 [ 92.163205] krealloc_noprof+0x127/0x380 [ 92.163292] krealloc_less_oob_helper+0x19b/0xeb0 [kasan_test] [ 92.163426] kunit_try_run_case+0x175/0x440 [ 92.163528] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.163639] kthread+0x3b4/0x780 [ 92.163718] ret_from_fork+0x22c/0x300 [ 92.163805] ret_from_fork_asm+0x1a/0x30 [ 92.163945] The buggy address belongs to the object at ffff88840c45fe00 which belongs to the cache kmalloc-256 of size 256 [ 92.164175] The buggy address is located 17 bytes to the right of allocated 201-byte region [ffff88840c45fe00, ffff88840c45fec9) [ 92.164483] The buggy address belongs to the physical page: [ 92.164596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x40c45c [ 92.164747] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.164893] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.165029] page_type: f5(slab) [ 92.165108] raw: 0017ffffc0000040 ffff888100042b40 dead000000000122 0000000000000000 [ 92.165256] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.165412] head: 0017ffffc0000040 ffff888100042b40 dead000000000122 0000000000000000 [ 92.165570] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.165722] head: 0017ffffc0000002 ffffea0010311701 00000000ffffffff 00000000ffffffff [ 92.165870] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 92.166019] page dumped because: kasan: bad access detected [ 92.166184] Memory state around the buggy address: [ 92.166285] ffff88840c45fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.166442] ffff88840c45fe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.166596] >ffff88840c45fe80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 92.166737] ^ [ 92.166857] ffff88840c45ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.166996] ffff88840c45ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.167133] ================================================================== [ 92.167339] ================================================================== [ 92.167485] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xcf5/0xeb0 [kasan_test] [ 92.167666] Write of size 1 at addr ffff88840c45feea by task kunit_try_catch/3591 [ 92.167871] CPU: 1 UID: 0 PID: 3591 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.167886] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.167888] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.167890] Call Trace: [ 92.167891] [ 92.167893] dump_stack_lvl+0x4f/0x70 [ 92.167898] print_address_description.constprop.0+0x2c/0x3b0 [ 92.167903] ? krealloc_less_oob_helper+0xcf5/0xeb0 [kasan_test] [ 92.167921] print_report+0xb9/0x280 [ 92.167925] ? krealloc_less_oob_helper+0xcf5/0xeb0 [kasan_test] [ 92.167933] ? kasan_addr_to_slab+0x9/0x90 [ 92.167936] ? krealloc_less_oob_helper+0xcf5/0xeb0 [kasan_test] [ 92.167945] kasan_report+0xda/0x110 [ 92.167948] ? krealloc_less_oob_helper+0xcf5/0xeb0 [kasan_test] [ 92.167958] krealloc_less_oob_helper+0xcf5/0xeb0 [kasan_test] [ 92.167967] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [kasan_test] [ 92.167976] ? finish_task_switch.isra.0+0x155/0x750 [ 92.167980] ? __switch_to+0x526/0x1000 [ 92.167983] ? __schedule+0x763/0x1490 [ 92.167987] ? __pfx_read_tsc+0x10/0x10 [ 92.167990] ? ktime_get_ts64+0x7f/0x220 [ 92.167994] kunit_try_run_case+0x175/0x440 [ 92.167997] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.168000] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.168004] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.168007] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.168011] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.168015] kthread+0x3b4/0x780 [ 92.168018] ? __pfx_kthread+0x10/0x10 [ 92.168022] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.168025] ? __pfx_kthread+0x10/0x10 [ 92.168028] ? __pfx_kthread+0x10/0x10 [ 92.168032] ret_from_fork+0x22c/0x300 [ 92.168036] ? __pfx_kthread+0x10/0x10 [ 92.168039] ret_from_fork_asm+0x1a/0x30 [ 92.168044] [ 92.171731] Allocated by task 3591: [ 92.171812] kasan_save_stack+0x1c/0x40 [ 92.171901] kasan_save_track+0x10/0x30 [ 92.171988] __kasan_krealloc+0x17f/0x1e0 [ 92.172077] krealloc_noprof+0x127/0x380 [ 92.172166] krealloc_less_oob_helper+0x19b/0xeb0 [kasan_test] [ 92.172290] kunit_try_run_case+0x175/0x440 [ 92.172384] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.172515] kthread+0x3b4/0x780 [ 92.172594] ret_from_fork+0x22c/0x300 [ 92.172685] ret_from_fork_asm+0x1a/0x30 [ 92.172826] The buggy address belongs to the object at ffff88840c45fe00 which belongs to the cache kmalloc-256 of size 256 [ 92.173055] The buggy address is located 33 bytes to the right of allocated 201-byte region [ffff88840c45fe00, ffff88840c45fec9) [ 92.173343] The buggy address belongs to the physical page: [ 92.173476] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x40c45c [ 92.173628] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.173773] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.173910] page_type: f5(slab) [ 92.173988] raw: 0017ffffc0000040 ffff888100042b40 dead000000000122 0000000000000000 [ 92.174135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.174282] head: 0017ffffc0000040 ffff888100042b40 dead000000000122 0000000000000000 [ 92.174463] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.174617] head: 0017ffffc0000002 ffffea0010311701 00000000ffffffff 00000000ffffffff [ 92.174764] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 92.174911] page dumped because: kasan: bad access detected [ 92.175076] Memory state around the buggy address: [ 92.175179] ffff88840c45fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.175321] ffff88840c45fe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.175470] >ffff88840c45fe80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 92.175619] ^ [ 92.175748] ffff88840c45ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.175886] ffff88840c45ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.176024] ================================================================== [ 92.176212] ================================================================== [ 92.176355] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xc36/0xeb0 [kasan_test] [ 92.176529] Write of size 1 at addr ffff88840c45feeb by task kunit_try_catch/3591 [ 92.176729] CPU: 1 UID: 0 PID: 3591 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.176736] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.176738] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.176740] Call Trace: [ 92.176742] [ 92.176743] dump_stack_lvl+0x4f/0x70 [ 92.176748] print_address_description.constprop.0+0x2c/0x3b0 [ 92.176753] ? krealloc_less_oob_helper+0xc36/0xeb0 [kasan_test] [ 92.176763] print_report+0xb9/0x280 [ 92.176766] ? krealloc_less_oob_helper+0xc36/0xeb0 [kasan_test] [ 92.176776] ? kasan_addr_to_slab+0x9/0x90 [ 92.176779] ? krealloc_less_oob_helper+0xc36/0xeb0 [kasan_test] [ 92.176788] kasan_report+0xda/0x110 [ 92.176792] ? krealloc_less_oob_helper+0xc36/0xeb0 [kasan_test] [ 92.176802] krealloc_less_oob_helper+0xc36/0xeb0 [kasan_test] [ 92.176812] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [kasan_test] [ 92.176821] ? finish_task_switch.isra.0+0x155/0x750 [ 92.176825] ? __switch_to+0x526/0x1000 [ 92.176828] ? __schedule+0x763/0x1490 [ 92.176832] ? __pfx_read_tsc+0x10/0x10 [ 92.176835] ? ktime_get_ts64+0x7f/0x220 [ 92.176839] kunit_try_run_case+0x175/0x440 [ 92.176843] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.176846] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.176851] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.176853] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.176857] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.176861] kthread+0x3b4/0x780 [ 92.176865] ? __pfx_kthread+0x10/0x10 [ 92.176869] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.176872] ? __pfx_kthread+0x10/0x10 [ 92.176876] ? __pfx_kthread+0x10/0x10 [ 92.176880] ret_from_fork+0x22c/0x300 [ 92.176883] ? __pfx_kthread+0x10/0x10 [ 92.176887] ret_from_fork_asm+0x1a/0x30 [ 92.176892] [ 92.180519] Allocated by task 3591: [ 92.180602] kasan_save_stack+0x1c/0x40 [ 92.180690] kasan_save_track+0x10/0x30 [ 92.180777] __kasan_krealloc+0x17f/0x1e0 [ 92.180867] krealloc_noprof+0x127/0x380 [ 92.180958] krealloc_less_oob_helper+0x19b/0xeb0 [kasan_test] [ 92.181081] kunit_try_run_case+0x175/0x440 [ 92.181174] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.181286] kthread+0x3b4/0x780 [ 92.181365] ret_from_fork+0x22c/0x300 [ 92.181461] ret_from_fork_asm+0x1a/0x30 [ 92.181610] The buggy address belongs to the object at ffff88840c45fe00 which belongs to the cache kmalloc-256 of size 256 [ 92.181840] The buggy address is located 34 bytes to the right of allocated 201-byte region [ffff88840c45fe00, ffff88840c45fec9) [ 92.182128] The buggy address belongs to the physical page: [ 92.182240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x40c45c [ 92.182401] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.182558] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.182694] page_type: f5(slab) [ 92.182772] raw: 0017ffffc0000040 ffff888100042b40 dead000000000122 0000000000000000 [ 92.182923] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.183070] head: 0017ffffc0000040 ffff888100042b40 dead000000000122 0000000000000000 [ 92.183218] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.183366] head: 0017ffffc0000002 ffffea0010311701 00000000ffffffff 00000000ffffffff [ 92.183539] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 92.183689] page dumped because: kasan: bad access detected [ 92.183854] Memory state around the buggy address: [ 92.183955] ffff88840c45fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.184093] ffff88840c45fe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.184231] >ffff88840c45fe80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 92.184369] ^ [ 92.184520] ffff88840c45ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.184657] ffff88840c45ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.184796] ================================================================== [ 92.185353] ok 12 krealloc_less_oob [ 92.185525] ================================================================== [ 92.185772] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x770/0x820 [kasan_test] [ 92.185946] Write of size 1 at addr ffff88840a1120eb by task kunit_try_catch/3593 [ 92.186142] CPU: 6 UID: 0 PID: 3593 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.186149] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.186151] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.186154] Call Trace: [ 92.186155] [ 92.186157] dump_stack_lvl+0x4f/0x70 [ 92.186163] print_address_description.constprop.0+0x2c/0x3b0 [ 92.186168] ? krealloc_more_oob_helper+0x770/0x820 [kasan_test] [ 92.186177] print_report+0xb9/0x280 [ 92.186181] ? krealloc_more_oob_helper+0x770/0x820 [kasan_test] [ 92.186190] ? kasan_addr_to_slab+0x9/0x90 [ 92.186193] ? krealloc_more_oob_helper+0x770/0x820 [kasan_test] [ 92.186202] kasan_report+0xda/0x110 [ 92.186206] ? krealloc_more_oob_helper+0x770/0x820 [kasan_test] [ 92.186215] krealloc_more_oob_helper+0x770/0x820 [kasan_test] [ 92.186225] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [kasan_test] [ 92.186234] ? finish_task_switch.isra.0+0x155/0x750 [ 92.186239] ? __switch_to+0x526/0x1000 [ 92.186242] ? __schedule+0x763/0x1490 [ 92.186246] ? __pfx_read_tsc+0x10/0x10 [ 92.186249] ? ktime_get_ts64+0x7f/0x220 [ 92.186253] kunit_try_run_case+0x175/0x440 [ 92.186256] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.186260] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.186264] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.186267] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.186270] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.186274] kthread+0x3b4/0x780 [ 92.186278] ? __pfx_kthread+0x10/0x10 [ 92.186281] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.186285] ? __pfx_kthread+0x10/0x10 [ 92.186288] ? __pfx_kthread+0x10/0x10 [ 92.186292] ret_from_fork+0x22c/0x300 [ 92.186296] ? __pfx_kthread+0x10/0x10 [ 92.186299] ret_from_fork_asm+0x1a/0x30 [ 92.186304] [ 92.189929] The buggy address belongs to the physical page: [ 92.190041] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88840a110200 pfn:0x40a110 [ 92.190214] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.190359] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.190524] page_type: f8(unknown) [ 92.190605] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 92.190754] raw: ffff88840a110200 0000000000000000 00000001f8000000 0000000000000000 [ 92.190901] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 92.191048] head: ffff88840a110200 0000000000000000 00000001f8000000 0000000000000000 [ 92.191200] head: 0017ffffc0000002 ffffea0010284401 00000000ffffffff 00000000ffffffff [ 92.191350] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 92.191518] page dumped because: kasan: bad access detected [ 92.191682] Memory state around the buggy address: [ 92.191782] ffff88840a111f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.191920] ffff88840a112000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.192057] >ffff88840a112080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 92.192194] ^ [ 92.192322] ffff88840a112100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 92.192487] ffff88840a112180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 92.192624] ================================================================== [ 92.192787] ================================================================== [ 92.192961] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x742/0x820 [kasan_test] [ 92.193169] Write of size 1 at addr ffff88840a1120f0 by task kunit_try_catch/3593 [ 92.193409] CPU: 6 UID: 0 PID: 3593 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.193420] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.193423] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.193427] Call Trace: [ 92.193431] [ 92.193434] dump_stack_lvl+0x4f/0x70 [ 92.193442] print_address_description.constprop.0+0x2c/0x3b0 [ 92.193451] ? krealloc_more_oob_helper+0x742/0x820 [kasan_test] [ 92.193472] print_report+0xb9/0x280 [ 92.193478] ? krealloc_more_oob_helper+0x742/0x820 [kasan_test] [ 92.193498] ? kasan_addr_to_slab+0x9/0x90 [ 92.193504] ? krealloc_more_oob_helper+0x742/0x820 [kasan_test] [ 92.193524] kasan_report+0xda/0x110 [ 92.193531] ? krealloc_more_oob_helper+0x742/0x820 [kasan_test] [ 92.193553] krealloc_more_oob_helper+0x742/0x820 [kasan_test] [ 92.193573] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [kasan_test] [ 92.193593] ? finish_task_switch.isra.0+0x155/0x750 [ 92.193600] ? __switch_to+0x526/0x1000 [ 92.193607] ? __schedule+0x763/0x1490 [ 92.193614] ? __pfx_read_tsc+0x10/0x10 [ 92.193619] ? ktime_get_ts64+0x7f/0x220 [ 92.193627] kunit_try_run_case+0x175/0x440 [ 92.193634] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.193640] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.193649] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.193654] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.193662] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.193669] kthread+0x3b4/0x780 [ 92.193676] ? __pfx_kthread+0x10/0x10 [ 92.193682] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.193689] ? __pfx_kthread+0x10/0x10 [ 92.193695] ? __pfx_kthread+0x10/0x10 [ 92.193702] ret_from_fork+0x22c/0x300 [ 92.193709] ? __pfx_kthread+0x10/0x10 [ 92.193716] ret_from_fork_asm+0x1a/0x30 [ 92.193725] [ 92.197370] The buggy address belongs to the physical page: [ 92.197512] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88840a110200 pfn:0x40a110 [ 92.197683] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.197828] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.197964] page_type: f8(unknown) [ 92.198045] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 92.198191] raw: ffff88840a110200 0000000000000000 00000001f8000000 0000000000000000 [ 92.198337] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 92.198516] head: ffff88840a110200 0000000000000000 00000001f8000000 0000000000000000 [ 92.198667] head: 0017ffffc0000002 ffffea0010284401 00000000ffffffff 00000000ffffffff [ 92.198815] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 92.198961] page dumped because: kasan: bad access detected [ 92.199121] Memory state around the buggy address: [ 92.199223] ffff88840a111f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.199364] ffff88840a112000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.199522] >ffff88840a112080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 92.199658] ^ [ 92.199789] ffff88840a112100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 92.199929] ffff88840a112180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 92.200069] ================================================================== [ 92.202042] ok 13 krealloc_large_more_oob [ 92.202242] ================================================================== [ 92.202528] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xc4d/0xeb0 [kasan_test] [ 92.202712] Write of size 1 at addr ffff88840fa2e0c9 by task kunit_try_catch/3595 [ 92.202908] CPU: 1 UID: 0 PID: 3595 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.202916] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.202918] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.202920] Call Trace: [ 92.202922] [ 92.202923] dump_stack_lvl+0x4f/0x70 [ 92.202929] print_address_description.constprop.0+0x2c/0x3b0 [ 92.202934] ? krealloc_less_oob_helper+0xc4d/0xeb0 [kasan_test] [ 92.202944] print_report+0xb9/0x280 [ 92.202948] ? krealloc_less_oob_helper+0xc4d/0xeb0 [kasan_test] [ 92.202957] ? kasan_addr_to_slab+0x9/0x90 [ 92.202960] ? krealloc_less_oob_helper+0xc4d/0xeb0 [kasan_test] [ 92.202969] kasan_report+0xda/0x110 [ 92.202973] ? krealloc_less_oob_helper+0xc4d/0xeb0 [kasan_test] [ 92.202983] krealloc_less_oob_helper+0xc4d/0xeb0 [kasan_test] [ 92.202993] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [kasan_test] [ 92.203001] ? finish_task_switch.isra.0+0x155/0x750 [ 92.203005] ? __switch_to+0x526/0x1000 [ 92.203009] ? __schedule+0x763/0x1490 [ 92.203013] ? __pfx_read_tsc+0x10/0x10 [ 92.203016] ? ktime_get_ts64+0x7f/0x220 [ 92.203020] kunit_try_run_case+0x175/0x440 [ 92.203024] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.203027] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.203032] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.203035] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.203039] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.203042] kthread+0x3b4/0x780 [ 92.203046] ? __pfx_kthread+0x10/0x10 [ 92.203050] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.203053] ? __pfx_kthread+0x10/0x10 [ 92.203057] ? __pfx_kthread+0x10/0x10 [ 92.203060] ret_from_fork+0x22c/0x300 [ 92.203064] ? __pfx_kthread+0x10/0x10 [ 92.203067] ret_from_fork_asm+0x1a/0x30 [ 92.203072] [ 92.206697] The buggy address belongs to the physical page: [ 92.206809] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88840fa2e000 pfn:0x40fa2c [ 92.206982] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.207128] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.207266] page_type: f8(unknown) [ 92.207349] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 92.207518] raw: ffff88840fa2e000 0000000000000000 00000001f8000000 0000000000000000 [ 92.207665] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 92.207813] head: ffff88840fa2e000 0000000000000000 00000001f8000000 0000000000000000 [ 92.207961] head: 0017ffffc0000002 ffffea00103e8b01 00000000ffffffff 00000000ffffffff [ 92.208109] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 92.208256] page dumped because: kasan: bad access detected [ 92.208431] Memory state around the buggy address: [ 92.208542] ffff88840fa2df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.208683] ffff88840fa2e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.208821] >ffff88840fa2e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 92.208959] ^ [ 92.209071] ffff88840fa2e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 92.209209] ffff88840fa2e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 92.209346] ================================================================== [ 92.209583] ================================================================== [ 92.209748] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xcba/0xeb0 [kasan_test] [ 92.209953] Write of size 1 at addr ffff88840fa2e0d0 by task kunit_try_catch/3595 [ 92.210200] CPU: 1 UID: 0 PID: 3595 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.210211] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.210214] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.210218] Call Trace: [ 92.210220] [ 92.210223] dump_stack_lvl+0x4f/0x70 [ 92.210231] print_address_description.constprop.0+0x2c/0x3b0 [ 92.210239] ? krealloc_less_oob_helper+0xcba/0xeb0 [kasan_test] [ 92.210258] print_report+0xb9/0x280 [ 92.210265] ? krealloc_less_oob_helper+0xcba/0xeb0 [kasan_test] [ 92.210283] ? kasan_addr_to_slab+0x9/0x90 [ 92.210290] ? krealloc_less_oob_helper+0xcba/0xeb0 [kasan_test] [ 92.210307] kasan_report+0xda/0x110 [ 92.210314] ? krealloc_less_oob_helper+0xcba/0xeb0 [kasan_test] [ 92.210335] krealloc_less_oob_helper+0xcba/0xeb0 [kasan_test] [ 92.210355] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [kasan_test] [ 92.210373] ? finish_task_switch.isra.0+0x155/0x750 [ 92.210380] ? __switch_to+0x526/0x1000 [ 92.210387] ? __schedule+0x763/0x1490 [ 92.210393] ? __pfx_read_tsc+0x10/0x10 [ 92.210399] ? ktime_get_ts64+0x7f/0x220 [ 92.210406] kunit_try_run_case+0x175/0x440 [ 92.210412] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.210418] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.210426] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.210440] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.210448] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.210455] kthread+0x3b4/0x780 [ 92.210470] ? __pfx_kthread+0x10/0x10 [ 92.210476] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.210483] ? __pfx_kthread+0x10/0x10 [ 92.210489] ? __pfx_kthread+0x10/0x10 [ 92.210504] ret_from_fork+0x22c/0x300 [ 92.210510] ? __pfx_kthread+0x10/0x10 [ 92.210516] ret_from_fork_asm+0x1a/0x30 [ 92.210525] [ 92.214438] The buggy address belongs to the physical page: [ 92.214562] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88840fa2e000 pfn:0x40fa2c [ 92.214734] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.214881] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.215020] page_type: f8(unknown) [ 92.215104] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 92.215253] raw: ffff88840fa2e000 0000000000000000 00000001f8000000 0000000000000000 [ 92.215409] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 92.215574] head: ffff88840fa2e000 0000000000000000 00000001f8000000 0000000000000000 [ 92.215722] head: 0017ffffc0000002 ffffea00103e8b01 00000000ffffffff 00000000ffffffff [ 92.215870] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 92.216017] page dumped because: kasan: bad access detected [ 92.216179] Memory state around the buggy address: [ 92.216279] ffff88840fa2df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.216417] ffff88840fa2e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.216578] >ffff88840fa2e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 92.216715] ^ [ 92.216833] ffff88840fa2e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 92.216975] ffff88840fa2e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 92.217112] ================================================================== [ 92.217258] ================================================================== [ 92.217431] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd0f/0xeb0 [kasan_test] [ 92.217635] Write of size 1 at addr ffff88840fa2e0da by task kunit_try_catch/3595 [ 92.217880] CPU: 1 UID: 0 PID: 3595 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.217891] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.217894] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.217898] Call Trace: [ 92.217901] [ 92.217903] dump_stack_lvl+0x4f/0x70 [ 92.217911] print_address_description.constprop.0+0x2c/0x3b0 [ 92.217919] ? krealloc_less_oob_helper+0xd0f/0xeb0 [kasan_test] [ 92.217939] print_report+0xb9/0x280 [ 92.217946] ? krealloc_less_oob_helper+0xd0f/0xeb0 [kasan_test] [ 92.217963] ? kasan_addr_to_slab+0x9/0x90 [ 92.217970] ? krealloc_less_oob_helper+0xd0f/0xeb0 [kasan_test] [ 92.217988] kasan_report+0xda/0x110 [ 92.217995] ? krealloc_less_oob_helper+0xd0f/0xeb0 [kasan_test] [ 92.218015] krealloc_less_oob_helper+0xd0f/0xeb0 [kasan_test] [ 92.218035] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [kasan_test] [ 92.218054] ? finish_task_switch.isra.0+0x155/0x750 [ 92.218060] ? __switch_to+0x526/0x1000 [ 92.218066] ? __schedule+0x763/0x1490 [ 92.218073] ? __pfx_read_tsc+0x10/0x10 [ 92.218078] ? ktime_get_ts64+0x7f/0x220 [ 92.218086] kunit_try_run_case+0x175/0x440 [ 92.218092] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.218098] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.218106] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.218111] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.218118] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.218125] kthread+0x3b4/0x780 [ 92.218132] ? __pfx_kthread+0x10/0x10 [ 92.218138] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.218144] ? __pfx_kthread+0x10/0x10 [ 92.218151] ? __pfx_kthread+0x10/0x10 [ 92.218157] ret_from_fork+0x22c/0x300 [ 92.218164] ? __pfx_kthread+0x10/0x10 [ 92.218170] ret_from_fork_asm+0x1a/0x30 [ 92.218179] [ 92.221945] The buggy address belongs to the physical page: [ 92.222057] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88840fa2e000 pfn:0x40fa2c [ 92.222230] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.222375] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.222534] page_type: f8(unknown) [ 92.222617] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 92.222765] raw: ffff88840fa2e000 0000000000000000 00000001f8000000 0000000000000000 [ 92.222913] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 92.223062] head: ffff88840fa2e000 0000000000000000 00000001f8000000 0000000000000000 [ 92.223210] head: 0017ffffc0000002 ffffea00103e8b01 00000000ffffffff 00000000ffffffff [ 92.223358] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 92.223528] page dumped because: kasan: bad access detected [ 92.223689] Memory state around the buggy address: [ 92.223791] ffff88840fa2df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.223928] ffff88840fa2e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.224066] >ffff88840fa2e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 92.224204] ^ [ 92.224326] ffff88840fa2e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 92.224475] ffff88840fa2e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 92.224626] ================================================================== [ 92.224777] ================================================================== [ 92.224946] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xcf5/0xeb0 [kasan_test] [ 92.225150] Write of size 1 at addr ffff88840fa2e0ea by task kunit_try_catch/3595 [ 92.225394] CPU: 1 UID: 0 PID: 3595 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.225405] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.225408] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.225412] Call Trace: [ 92.225415] [ 92.225417] dump_stack_lvl+0x4f/0x70 [ 92.225425] print_address_description.constprop.0+0x2c/0x3b0 [ 92.225433] ? krealloc_less_oob_helper+0xcf5/0xeb0 [kasan_test] [ 92.225452] print_report+0xb9/0x280 [ 92.225458] ? krealloc_less_oob_helper+0xcf5/0xeb0 [kasan_test] [ 92.225475] ? kasan_addr_to_slab+0x9/0x90 [ 92.225482] ? krealloc_less_oob_helper+0xcf5/0xeb0 [kasan_test] [ 92.225500] kasan_report+0xda/0x110 [ 92.225515] ? krealloc_less_oob_helper+0xcf5/0xeb0 [kasan_test] [ 92.225535] krealloc_less_oob_helper+0xcf5/0xeb0 [kasan_test] [ 92.225554] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [kasan_test] [ 92.225572] ? finish_task_switch.isra.0+0x155/0x750 [ 92.225579] ? __switch_to+0x526/0x1000 [ 92.225586] ? __schedule+0x763/0x1490 [ 92.225592] ? __pfx_read_tsc+0x10/0x10 [ 92.225597] ? ktime_get_ts64+0x7f/0x220 [ 92.225604] kunit_try_run_case+0x175/0x440 [ 92.225611] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.225617] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.225624] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.225630] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.225636] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.225643] kthread+0x3b4/0x780 [ 92.225649] ? __pfx_kthread+0x10/0x10 [ 92.225655] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.225662] ? __pfx_kthread+0x10/0x10 [ 92.225668] ? __pfx_kthread+0x10/0x10 [ 92.225674] ret_from_fork+0x22c/0x300 [ 92.225680] ? __pfx_kthread+0x10/0x10 [ 92.225686] ret_from_fork_asm+0x1a/0x30 [ 92.225695] [ 92.229441] The buggy address belongs to the physical page: [ 92.229566] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88840fa2e000 pfn:0x40fa2c [ 92.229738] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.229883] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.230019] page_type: f8(unknown) [ 92.230102] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 92.230252] raw: ffff88840fa2e000 0000000000000000 00000001f8000000 0000000000000000 [ 92.230407] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 92.230568] head: ffff88840fa2e000 0000000000000000 00000001f8000000 0000000000000000 [ 92.230737] head: 0017ffffc0000002 ffffea00103e8b01 00000000ffffffff 00000000ffffffff [ 92.230885] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 92.231032] page dumped because: kasan: bad access detected [ 92.231194] Memory state around the buggy address: [ 92.231294] ffff88840fa2df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.231445] ffff88840fa2e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.231593] >ffff88840fa2e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 92.231730] ^ [ 92.231858] ffff88840fa2e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 92.231996] ffff88840fa2e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 92.232134] ================================================================== [ 92.232345] ================================================================== [ 92.232509] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xc36/0xeb0 [kasan_test] [ 92.232710] Write of size 1 at addr ffff88840fa2e0eb by task kunit_try_catch/3595 [ 92.232956] CPU: 1 UID: 0 PID: 3595 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.232967] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.232970] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.232974] Call Trace: [ 92.232977] [ 92.232979] dump_stack_lvl+0x4f/0x70 [ 92.232987] print_address_description.constprop.0+0x2c/0x3b0 [ 92.232995] ? krealloc_less_oob_helper+0xc36/0xeb0 [kasan_test] [ 92.233014] print_report+0xb9/0x280 [ 92.233021] ? krealloc_less_oob_helper+0xc36/0xeb0 [kasan_test] [ 92.233039] ? kasan_addr_to_slab+0x9/0x90 [ 92.233045] ? krealloc_less_oob_helper+0xc36/0xeb0 [kasan_test] [ 92.233063] kasan_report+0xda/0x110 [ 92.233070] ? krealloc_less_oob_helper+0xc36/0xeb0 [kasan_test] [ 92.233090] krealloc_less_oob_helper+0xc36/0xeb0 [kasan_test] [ 92.233111] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [kasan_test] [ 92.233129] ? finish_task_switch.isra.0+0x155/0x750 [ 92.233136] ? __switch_to+0x526/0x1000 [ 92.233142] ? __schedule+0x763/0x1490 [ 92.233149] ? __pfx_read_tsc+0x10/0x10 [ 92.233154] ? ktime_get_ts64+0x7f/0x220 [ 92.233161] kunit_try_run_case+0x175/0x440 [ 92.233168] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.233174] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.233182] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.233187] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.233194] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.233201] kthread+0x3b4/0x780 [ 92.233207] ? __pfx_kthread+0x10/0x10 [ 92.233213] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.233220] ? __pfx_kthread+0x10/0x10 [ 92.233226] ? __pfx_kthread+0x10/0x10 [ 92.233232] ret_from_fork+0x22c/0x300 [ 92.233239] ? __pfx_kthread+0x10/0x10 [ 92.233245] ret_from_fork_asm+0x1a/0x30 [ 92.233254] [ 92.236986] The buggy address belongs to the physical page: [ 92.237099] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88840fa2e000 pfn:0x40fa2c [ 92.237274] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.237419] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.237555] page_type: f8(unknown) [ 92.237636] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 92.237783] raw: ffff88840fa2e000 0000000000000000 00000001f8000000 0000000000000000 [ 92.237930] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 92.238081] head: ffff88840fa2e000 0000000000000000 00000001f8000000 0000000000000000 [ 92.238229] head: 0017ffffc0000002 ffffea00103e8b01 00000000ffffffff 00000000ffffffff [ 92.238380] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 92.238548] page dumped because: kasan: bad access detected [ 92.238710] Memory state around the buggy address: [ 92.238815] ffff88840fa2df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.238953] ffff88840fa2e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.239090] >ffff88840fa2e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 92.239229] ^ [ 92.239357] ffff88840fa2e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 92.239515] ffff88840fa2e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 92.239655] ================================================================== [ 92.240052] ok 14 krealloc_large_less_oob [ 92.240184] ================================================================== [ 92.240456] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1ab/0x580 [kasan_test] [ 92.240622] Read of size 1 at addr ffff88840a21f800 by task kunit_try_catch/3597 [ 92.240820] CPU: 6 UID: 0 PID: 3597 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.240827] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.240828] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.240831] Call Trace: [ 92.240832] [ 92.240834] dump_stack_lvl+0x4f/0x70 [ 92.240840] print_address_description.constprop.0+0x2c/0x3b0 [ 92.240845] ? krealloc_uaf+0x1ab/0x580 [kasan_test] [ 92.240854] print_report+0xb9/0x280 [ 92.240858] ? krealloc_uaf+0x1ab/0x580 [kasan_test] [ 92.240866] ? kasan_addr_to_slab+0x9/0x90 [ 92.240870] ? krealloc_uaf+0x1ab/0x580 [kasan_test] [ 92.240879] kasan_report+0xda/0x110 [ 92.240882] ? krealloc_uaf+0x1ab/0x580 [kasan_test] [ 92.240892] ? krealloc_uaf+0x1ab/0x580 [kasan_test] [ 92.240900] __kasan_check_byte+0x32/0x40 [ 92.240904] krealloc_noprof+0x38/0x380 [ 92.240908] krealloc_uaf+0x1ab/0x580 [kasan_test] [ 92.240918] ? __pfx_krealloc_uaf+0x10/0x10 [kasan_test] [ 92.240926] ? finish_task_switch.isra.0+0x155/0x750 [ 92.240930] ? __switch_to+0x526/0x1000 [ 92.240934] ? __schedule+0x763/0x1490 [ 92.240938] ? __pfx_read_tsc+0x10/0x10 [ 92.240941] ? ktime_get_ts64+0x7f/0x220 [ 92.240945] kunit_try_run_case+0x175/0x440 [ 92.240949] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.240952] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.240956] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.240959] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.240963] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.240967] kthread+0x3b4/0x780 [ 92.240971] ? __pfx_kthread+0x10/0x10 [ 92.240974] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.240978] ? __pfx_kthread+0x10/0x10 [ 92.240981] ? __pfx_kthread+0x10/0x10 [ 92.240985] ret_from_fork+0x22c/0x300 [ 92.240989] ? __pfx_kthread+0x10/0x10 [ 92.240992] ret_from_fork_asm+0x1a/0x30 [ 92.240997] [ 92.244830] Allocated by task 3597: [ 92.244915] kasan_save_stack+0x1c/0x40 [ 92.245003] kasan_save_track+0x10/0x30 [ 92.245093] __kasan_kmalloc+0xa6/0xb0 [ 92.245180] krealloc_uaf+0xae/0x580 [kasan_test] [ 92.245286] kunit_try_run_case+0x175/0x440 [ 92.245379] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.245511] kthread+0x3b4/0x780 [ 92.245590] ret_from_fork+0x22c/0x300 [ 92.245678] ret_from_fork_asm+0x1a/0x30 [ 92.245817] Freed by task 3597: [ 92.245894] kasan_save_stack+0x1c/0x40 [ 92.245983] kasan_save_track+0x10/0x30 [ 92.246072] kasan_save_free_info+0x37/0x60 [ 92.246165] __kasan_slab_free+0x4d/0x70 [ 92.246253] kfree+0x23f/0x440 [ 92.246329] krealloc_uaf+0x130/0x580 [kasan_test] [ 92.246458] kunit_try_run_case+0x175/0x440 [ 92.246563] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.246674] kthread+0x3b4/0x780 [ 92.246752] ret_from_fork+0x22c/0x300 [ 92.246840] ret_from_fork_asm+0x1a/0x30 [ 92.246978] The buggy address belongs to the object at ffff88840a21f800 which belongs to the cache kmalloc-256 of size 256 [ 92.247214] The buggy address is located 0 bytes inside of freed 256-byte region [ffff88840a21f800, ffff88840a21f900) [ 92.247519] The buggy address belongs to the physical page: [ 92.247634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x40a21c [ 92.247786] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.247932] anon flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.248075] page_type: f5(slab) [ 92.248153] raw: 0017ffffc0000040 ffff888100042b40 0000000000000000 0000000000000001 [ 92.248304] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.248472] head: 0017ffffc0000040 ffff888100042b40 0000000000000000 0000000000000001 [ 92.248621] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.248769] head: 0017ffffc0000002 ffffea0010288701 00000000ffffffff 00000000ffffffff [ 92.248916] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 92.249063] page dumped because: kasan: bad access detected [ 92.249231] Memory state around the buggy address: [ 92.249332] ffff88840a21f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.249492] ffff88840a21f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.249630] >ffff88840a21f800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 92.249767] ^ [ 92.249846] ffff88840a21f880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 92.249983] ffff88840a21f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.250120] ================================================================== [ 92.250296] ================================================================== [ 92.250471] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4fc/0x580 [kasan_test] [ 92.250661] Read of size 1 at addr ffff88840a21f800 by task kunit_try_catch/3597 [ 92.250903] CPU: 6 UID: 0 PID: 3597 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.250915] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.250918] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.250922] Call Trace: [ 92.250925] [ 92.250928] dump_stack_lvl+0x4f/0x70 [ 92.250936] print_address_description.constprop.0+0x2c/0x3b0 [ 92.250944] ? krealloc_uaf+0x4fc/0x580 [kasan_test] [ 92.250964] print_report+0xb9/0x280 [ 92.250971] ? krealloc_uaf+0x4fc/0x580 [kasan_test] [ 92.250989] ? kasan_addr_to_slab+0x9/0x90 [ 92.250995] ? krealloc_uaf+0x4fc/0x580 [kasan_test] [ 92.251014] kasan_report+0xda/0x110 [ 92.251022] ? krealloc_uaf+0x4fc/0x580 [kasan_test] [ 92.251042] krealloc_uaf+0x4fc/0x580 [kasan_test] [ 92.251063] ? __pfx_krealloc_uaf+0x10/0x10 [kasan_test] [ 92.251082] ? finish_task_switch.isra.0+0x155/0x750 [ 92.251089] ? __switch_to+0x526/0x1000 [ 92.251095] ? __schedule+0x763/0x1490 [ 92.251102] ? __pfx_read_tsc+0x10/0x10 [ 92.251108] ? ktime_get_ts64+0x7f/0x220 [ 92.251115] kunit_try_run_case+0x175/0x440 [ 92.251122] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.251128] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.251137] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.251142] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.251149] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.251157] kthread+0x3b4/0x780 [ 92.251164] ? __pfx_kthread+0x10/0x10 [ 92.251170] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.251176] ? __pfx_kthread+0x10/0x10 [ 92.251183] ? __pfx_kthread+0x10/0x10 [ 92.251190] ret_from_fork+0x22c/0x300 [ 92.251197] ? __pfx_kthread+0x10/0x10 [ 92.251203] ret_from_fork_asm+0x1a/0x30 [ 92.251212] [ 92.254816] Allocated by task 3597: [ 92.254898] kasan_save_stack+0x1c/0x40 [ 92.254986] kasan_save_track+0x10/0x30 [ 92.255073] __kasan_kmalloc+0xa6/0xb0 [ 92.255158] krealloc_uaf+0xae/0x580 [kasan_test] [ 92.255264] kunit_try_run_case+0x175/0x440 [ 92.255355] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.255497] kthread+0x3b4/0x780 [ 92.255575] ret_from_fork+0x22c/0x300 [ 92.255661] ret_from_fork_asm+0x1a/0x30 [ 92.255802] Freed by task 3597: [ 92.255878] kasan_save_stack+0x1c/0x40 [ 92.255968] kasan_save_track+0x10/0x30 [ 92.256056] kasan_save_free_info+0x37/0x60 [ 92.256148] __kasan_slab_free+0x4d/0x70 [ 92.256236] kfree+0x23f/0x440 [ 92.256311] krealloc_uaf+0x130/0x580 [kasan_test] [ 92.256437] kunit_try_run_case+0x175/0x440 [ 92.256540] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.256650] kthread+0x3b4/0x780 [ 92.256727] ret_from_fork+0x22c/0x300 [ 92.256812] ret_from_fork_asm+0x1a/0x30 [ 92.256950] The buggy address belongs to the object at ffff88840a21f800 which belongs to the cache kmalloc-256 of size 256 [ 92.257182] The buggy address is located 0 bytes inside of freed 256-byte region [ffff88840a21f800, ffff88840a21f900) [ 92.257476] The buggy address belongs to the physical page: [ 92.257588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x40a21c [ 92.257742] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.257887] anon flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.258029] page_type: f5(slab) [ 92.258106] raw: 0017ffffc0000040 ffff888100042b40 0000000000000000 0000000000000001 [ 92.258253] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.258412] head: 0017ffffc0000040 ffff888100042b40 0000000000000000 0000000000000001 [ 92.258583] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.258735] head: 0017ffffc0000002 ffffea0010288701 00000000ffffffff 00000000ffffffff [ 92.258882] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 92.259029] page dumped because: kasan: bad access detected [ 92.259194] Memory state around the buggy address: [ 92.259294] ffff88840a21f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.259456] ffff88840a21f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.259603] >ffff88840a21f800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 92.259740] ^ [ 92.259816] ffff88840a21f880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 92.259953] ffff88840a21f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.260090] ================================================================== [ 92.262154] ok 15 krealloc_uaf [ 92.262382] ok 16 kmalloc_oob_16 # SKIP Test requires checked mem*() [ 92.262810] ok 17 kmalloc_uaf_16 # SKIP Test requires checked mem*() [ 92.263230] ok 18 kmalloc_oob_in_memset # SKIP Test requires checked mem*() [ 92.263620] ok 19 kmalloc_oob_memset_2 # SKIP Test requires checked mem*() [ 92.264008] ok 20 kmalloc_oob_memset_4 # SKIP Test requires checked mem*() [ 92.264394] ok 21 kmalloc_oob_memset_8 # SKIP Test requires checked mem*() [ 92.264777] ok 22 kmalloc_oob_memset_16 # SKIP Test requires checked mem*() [ 92.265115] ok 23 kmalloc_memmove_negative_size # SKIP Test requires checked mem*() [ 92.265427] ok 24 kmalloc_memmove_invalid_size # SKIP Test requires checked mem*() [ 92.265679] ================================================================== [ 92.265978] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x310/0x370 [kasan_test] [ 92.266137] Read of size 1 at addr ffff8881011208e8 by task kunit_try_catch/3617 [ 92.266337] CPU: 6 UID: 0 PID: 3617 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.266345] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.266347] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.266350] Call Trace: [ 92.266351] [ 92.266353] dump_stack_lvl+0x4f/0x70 [ 92.266360] print_address_description.constprop.0+0x2c/0x3b0 [ 92.266365] ? kmalloc_uaf+0x310/0x370 [kasan_test] [ 92.266375] print_report+0xb9/0x280 [ 92.266379] ? kmalloc_uaf+0x310/0x370 [kasan_test] [ 92.266388] ? kasan_addr_to_slab+0x9/0x90 [ 92.266391] ? kmalloc_uaf+0x310/0x370 [kasan_test] [ 92.266400] kasan_report+0xda/0x110 [ 92.266404] ? kmalloc_uaf+0x310/0x370 [kasan_test] [ 92.266414] kmalloc_uaf+0x310/0x370 [kasan_test] [ 92.266430] ? __pfx_kmalloc_uaf+0x10/0x10 [kasan_test] [ 92.266448] ? __schedule+0x763/0x1490 [ 92.266456] ? __pfx_read_tsc+0x10/0x10 [ 92.266462] ? ktime_get_ts64+0x7f/0x220 [ 92.266468] ? __pfx___schedule+0x10/0x10 [ 92.266475] kunit_try_run_case+0x175/0x440 [ 92.266482] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.266488] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.266497] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.266502] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.266510] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.266517] kthread+0x3b4/0x780 [ 92.266525] ? __pfx_kthread+0x10/0x10 [ 92.266531] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.266537] ? __pfx_kthread+0x10/0x10 [ 92.266544] ? __pfx_kthread+0x10/0x10 [ 92.266550] ret_from_fork+0x22c/0x300 [ 92.266557] ? __pfx_kthread+0x10/0x10 [ 92.266563] ret_from_fork_asm+0x1a/0x30 [ 92.266573] [ 92.270027] Allocated by task 3617: [ 92.270109] kasan_save_stack+0x1c/0x40 [ 92.270197] kasan_save_track+0x10/0x30 [ 92.270284] __kasan_kmalloc+0xa6/0xb0 [ 92.270369] kmalloc_uaf+0x96/0x370 [kasan_test] [ 92.270486] kunit_try_run_case+0x175/0x440 [ 92.270589] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.270700] kthread+0x3b4/0x780 [ 92.270778] ret_from_fork+0x22c/0x300 [ 92.270864] ret_from_fork_asm+0x1a/0x30 [ 92.271001] Freed by task 3617: [ 92.271076] kasan_save_stack+0x1c/0x40 [ 92.271163] kasan_save_track+0x10/0x30 [ 92.271252] kasan_save_free_info+0x37/0x60 [ 92.271344] __kasan_slab_free+0x4d/0x70 [ 92.271444] kfree+0x23f/0x440 [ 92.271531] kmalloc_uaf+0x118/0x370 [kasan_test] [ 92.271640] kunit_try_run_case+0x175/0x440 [ 92.271732] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.271842] kthread+0x3b4/0x780 [ 92.271922] ret_from_fork+0x22c/0x300 [ 92.272010] ret_from_fork_asm+0x1a/0x30 [ 92.272148] The buggy address belongs to the object at ffff8881011208e0 which belongs to the cache kmalloc-16 of size 16 [ 92.272380] The buggy address is located 8 bytes inside of freed 16-byte region [ffff8881011208e0, ffff8881011208f0) [ 92.272672] The buggy address belongs to the physical page: [ 92.272784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101120 [ 92.272936] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 92.273066] page_type: f5(slab) [ 92.273143] raw: 0017ffffc0000000 ffff888100042640 dead000000000100 dead000000000122 [ 92.273291] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 92.273450] page dumped because: kasan: bad access detected [ 92.273622] Memory state around the buggy address: [ 92.273722] ffff888101120780: fa fb fc fc 00 07 fc fc 00 02 fc fc 00 04 fc fc [ 92.273860] ffff888101120800: 00 06 fc fc 00 07 fc fc 00 07 fc fc 00 06 fc fc [ 92.273997] >ffff888101120880: 00 07 fc fc 00 03 fc fc 00 05 fc fc fa fb fc fc [ 92.274134] ^ [ 92.274263] ffff888101120900: 00 07 fc fc 00 03 fc fc 00 07 fc fc 00 05 fc fc [ 92.274410] ffff888101120980: 00 05 fc fc 00 06 fc fc 00 05 fc fc 00 05 fc fc [ 92.274557] ================================================================== [ 92.276031] ok 25 kmalloc_uaf [ 92.276218] ok 26 kmalloc_uaf_memset # SKIP Test requires checked mem*() [ 92.276689] ================================================================== [ 92.276963] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x477/0x4f0 [kasan_test] [ 92.277118] Read of size 1 at addr ffff88841155eb28 by task kunit_try_catch/3621 [ 92.277312] CPU: 6 UID: 0 PID: 3621 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.277319] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.277321] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.277323] Call Trace: [ 92.277325] [ 92.277327] dump_stack_lvl+0x4f/0x70 [ 92.277332] print_address_description.constprop.0+0x2c/0x3b0 [ 92.277337] ? kmalloc_uaf2+0x477/0x4f0 [kasan_test] [ 92.277346] print_report+0xb9/0x280 [ 92.277350] ? kmalloc_uaf2+0x477/0x4f0 [kasan_test] [ 92.277358] ? kasan_addr_to_slab+0x9/0x90 [ 92.277362] ? kmalloc_uaf2+0x477/0x4f0 [kasan_test] [ 92.277370] kasan_report+0xda/0x110 [ 92.277374] ? kmalloc_uaf2+0x477/0x4f0 [kasan_test] [ 92.277383] kmalloc_uaf2+0x477/0x4f0 [kasan_test] [ 92.277392] ? __pfx_kmalloc_uaf2+0x10/0x10 [kasan_test] [ 92.277401] ? finish_task_switch.isra.0+0x155/0x750 [ 92.277414] ? __switch_to+0x526/0x1000 [ 92.277418] ? __schedule+0x763/0x1490 [ 92.277425] ? __pfx_read_tsc+0x10/0x10 [ 92.277430] ? ktime_get_ts64+0x7f/0x220 [ 92.277438] kunit_try_run_case+0x175/0x440 [ 92.277444] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.277459] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.277466] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.277472] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.277479] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.277485] kthread+0x3b4/0x780 [ 92.277492] ? __pfx_kthread+0x10/0x10 [ 92.277497] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.277504] ? __pfx_kthread+0x10/0x10 [ 92.277510] ? __pfx_kthread+0x10/0x10 [ 92.277517] ret_from_fork+0x22c/0x300 [ 92.277521] ? __pfx_kthread+0x10/0x10 [ 92.277525] ret_from_fork_asm+0x1a/0x30 [ 92.277530] [ 92.281029] Allocated by task 3621: [ 92.281111] kasan_save_stack+0x1c/0x40 [ 92.281200] kasan_save_track+0x10/0x30 [ 92.281288] __kasan_kmalloc+0xa6/0xb0 [ 92.281373] kmalloc_uaf2+0xb3/0x4f0 [kasan_test] [ 92.281501] kunit_try_run_case+0x175/0x440 [ 92.281594] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.281706] kthread+0x3b4/0x780 [ 92.281784] ret_from_fork+0x22c/0x300 [ 92.281870] ret_from_fork_asm+0x1a/0x30 [ 92.282012] Freed by task 3621: [ 92.282087] kasan_save_stack+0x1c/0x40 [ 92.282174] kasan_save_track+0x10/0x30 [ 92.282266] kasan_save_free_info+0x37/0x60 [ 92.282358] __kasan_slab_free+0x4d/0x70 [ 92.282467] kfree+0x23f/0x440 [ 92.282544] kmalloc_uaf2+0x139/0x4f0 [kasan_test] [ 92.282652] kunit_try_run_case+0x175/0x440 [ 92.282744] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.282856] kthread+0x3b4/0x780 [ 92.282934] ret_from_fork+0x22c/0x300 [ 92.283021] ret_from_fork_asm+0x1a/0x30 [ 92.283160] The buggy address belongs to the object at ffff88841155eb00 which belongs to the cache kmalloc-64 of size 64 [ 92.283390] The buggy address is located 40 bytes inside of freed 64-byte region [ffff88841155eb00, ffff88841155eb40) [ 92.283695] The buggy address belongs to the physical page: [ 92.283807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x41155e [ 92.283963] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 92.284100] page_type: f5(slab) [ 92.284177] raw: 0017ffffc0000000 ffff8881000428c0 ffffea001058a4c0 dead000000000005 [ 92.284324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.284501] page dumped because: kasan: bad access detected [ 92.284663] Memory state around the buggy address: [ 92.284764] ffff88841155ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 92.284901] ffff88841155ea80: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 92.285038] >ffff88841155eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 92.285177] ^ [ 92.285273] ffff88841155eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 92.285423] ffff88841155ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 92.285573] ================================================================== [ 92.287187] ok 27 kmalloc_uaf2 [ 92.287458] ok 28 kmalloc_uaf3 # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 92.287687] ================================================================== [ 92.287974] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x18a/0x350 [kasan_test] [ 92.288147] Read of size 1 at addr ffff888101120120 by task kunit_try_catch/3626 [ 92.288346] CPU: 6 UID: 0 PID: 3626 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.288354] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.288356] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.288358] Call Trace: [ 92.288360] [ 92.288362] dump_stack_lvl+0x4f/0x70 [ 92.288368] print_address_description.constprop.0+0x2c/0x3b0 [ 92.288374] ? kmalloc_double_kzfree+0x18a/0x350 [kasan_test] [ 92.288383] print_report+0xb9/0x280 [ 92.288387] ? kmalloc_double_kzfree+0x18a/0x350 [kasan_test] [ 92.288396] ? kasan_addr_to_slab+0x9/0x90 [ 92.288400] ? kmalloc_double_kzfree+0x18a/0x350 [kasan_test] [ 92.288409] kasan_report+0xda/0x110 [ 92.288413] ? kmalloc_double_kzfree+0x18a/0x350 [kasan_test] [ 92.288427] ? kmalloc_double_kzfree+0x18a/0x350 [kasan_test] [ 92.288445] __kasan_check_byte+0x32/0x40 [ 92.288453] kfree_sensitive+0x1a/0x70 [ 92.288461] kmalloc_double_kzfree+0x18a/0x350 [kasan_test] [ 92.288481] ? __pfx_kmalloc_double_kzfree+0x10/0x10 [kasan_test] [ 92.288501] ? __schedule+0x763/0x1490 [ 92.288508] ? __pfx_read_tsc+0x10/0x10 [ 92.288514] ? ktime_get_ts64+0x7f/0x220 [ 92.288521] ? __pfx___schedule+0x10/0x10 [ 92.288527] kunit_try_run_case+0x175/0x440 [ 92.288534] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.288540] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.288548] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.288554] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.288561] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.288568] kthread+0x3b4/0x780 [ 92.288575] ? __pfx_kthread+0x10/0x10 [ 92.288581] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.288588] ? __pfx_kthread+0x10/0x10 [ 92.288595] ? __pfx_kthread+0x10/0x10 [ 92.288602] ret_from_fork+0x22c/0x300 [ 92.288608] ? __pfx_kthread+0x10/0x10 [ 92.288614] ret_from_fork_asm+0x1a/0x30 [ 92.288624] [ 92.292469] Allocated by task 3626: [ 92.292554] kasan_save_stack+0x1c/0x40 [ 92.292645] kasan_save_track+0x10/0x30 [ 92.292732] __kasan_kmalloc+0xa6/0xb0 [ 92.292819] kmalloc_double_kzfree+0x97/0x350 [kasan_test] [ 92.292937] kunit_try_run_case+0x175/0x440 [ 92.293030] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.293144] kthread+0x3b4/0x780 [ 92.293222] ret_from_fork+0x22c/0x300 [ 92.293308] ret_from_fork_asm+0x1a/0x30 [ 92.293469] Freed by task 3626: [ 92.293545] kasan_save_stack+0x1c/0x40 [ 92.293632] kasan_save_track+0x10/0x30 [ 92.293718] kasan_save_free_info+0x37/0x60 [ 92.293810] __kasan_slab_free+0x4d/0x70 [ 92.293899] kfree+0x23f/0x440 [ 92.293976] kmalloc_double_kzfree+0x119/0x350 [kasan_test] [ 92.294095] kunit_try_run_case+0x175/0x440 [ 92.294187] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.294299] kthread+0x3b4/0x780 [ 92.294377] ret_from_fork+0x22c/0x300 [ 92.294486] ret_from_fork_asm+0x1a/0x30 [ 92.294625] The buggy address belongs to the object at ffff888101120120 which belongs to the cache kmalloc-16 of size 16 [ 92.294858] The buggy address is located 0 bytes inside of freed 16-byte region [ffff888101120120, ffff888101120130) [ 92.295131] The buggy address belongs to the physical page: [ 92.295243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101120 [ 92.295409] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 92.295554] page_type: f5(slab) [ 92.295632] raw: 0017ffffc0000000 ffff888100042640 dead000000000100 dead000000000122 [ 92.295780] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 92.295926] page dumped because: kasan: bad access detected [ 92.296089] Memory state around the buggy address: [ 92.296190] ffff888101120000: 00 07 fc fc 00 04 fc fc 00 06 fc fc 00 07 fc fc [ 92.296332] ffff888101120080: 00 06 fc fc 00 04 fc fc 00 00 fc fc 00 00 fc fc [ 92.296492] >ffff888101120100: 00 03 fc fc fa fb fc fc 00 03 fc fc 00 05 fc fc [ 92.296629] ^ [ 92.296725] ffff888101120180: 00 03 fc fc 00 07 fc fc 00 07 fc fc 00 07 fc fc [ 92.296866] ffff888101120200: 00 06 fc fc 00 04 fc fc 00 05 fc fc 00 04 fc fc [ 92.297003] ================================================================== [ 92.297301] ================================================================== [ 92.297469] BUG: KASAN: double-free in kmalloc_double_kzfree+0x18a/0x350 [kasan_test] [ 92.297660] Free of addr ffff888101120120 by task kunit_try_catch/3626 [ 92.297860] CPU: 6 UID: 0 PID: 3626 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.297867] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.297869] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.297872] Call Trace: [ 92.297873] [ 92.297875] dump_stack_lvl+0x4f/0x70 [ 92.297881] print_address_description.constprop.0+0x2c/0x3b0 [ 92.297886] print_report+0xb9/0x280 [ 92.297889] ? kasan_addr_to_slab+0x9/0x90 [ 92.297893] ? kmalloc_double_kzfree+0x18a/0x350 [kasan_test] [ 92.297902] kasan_report_invalid_free+0xba/0xe0 [ 92.297906] ? kmalloc_double_kzfree+0x18a/0x350 [kasan_test] [ 92.297916] ? kmalloc_double_kzfree+0x18a/0x350 [kasan_test] [ 92.297924] check_slab_allocation+0xfa/0x120 [ 92.297928] kfree+0xf2/0x440 [ 92.297932] ? kmalloc_double_kzfree+0x18a/0x350 [kasan_test] [ 92.297940] ? __kasan_check_byte+0x32/0x40 [ 92.297944] kmalloc_double_kzfree+0x18a/0x350 [kasan_test] [ 92.297954] ? __pfx_kmalloc_double_kzfree+0x10/0x10 [kasan_test] [ 92.297963] ? __schedule+0x763/0x1490 [ 92.297967] ? __pfx_read_tsc+0x10/0x10 [ 92.297970] ? ktime_get_ts64+0x7f/0x220 [ 92.297974] ? __pfx___schedule+0x10/0x10 [ 92.297978] kunit_try_run_case+0x175/0x440 [ 92.297981] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.297985] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.297989] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.297992] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.297996] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.297999] kthread+0x3b4/0x780 [ 92.298003] ? __pfx_kthread+0x10/0x10 [ 92.298007] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.298010] ? __pfx_kthread+0x10/0x10 [ 92.298014] ? __pfx_kthread+0x10/0x10 [ 92.298017] ret_from_fork+0x22c/0x300 [ 92.298021] ? __pfx_kthread+0x10/0x10 [ 92.298024] ret_from_fork_asm+0x1a/0x30 [ 92.298029] [ 92.301835] Allocated by task 3626: [ 92.301917] kasan_save_stack+0x1c/0x40 [ 92.302005] kasan_save_track+0x10/0x30 [ 92.302092] __kasan_kmalloc+0xa6/0xb0 [ 92.302178] kmalloc_double_kzfree+0x97/0x350 [kasan_test] [ 92.302295] kunit_try_run_case+0x175/0x440 [ 92.302387] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.302521] kthread+0x3b4/0x780 [ 92.302600] ret_from_fork+0x22c/0x300 [ 92.302686] ret_from_fork_asm+0x1a/0x30 [ 92.302825] Freed by task 3626: [ 92.302900] kasan_save_stack+0x1c/0x40 [ 92.302990] kasan_save_track+0x10/0x30 [ 92.303077] kasan_save_free_info+0x37/0x60 [ 92.303169] __kasan_slab_free+0x4d/0x70 [ 92.303259] kfree+0x23f/0x440 [ 92.303337] kmalloc_double_kzfree+0x119/0x350 [kasan_test] [ 92.303478] kunit_try_run_case+0x175/0x440 [ 92.303571] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.303682] kthread+0x3b4/0x780 [ 92.303761] ret_from_fork+0x22c/0x300 [ 92.303847] ret_from_fork_asm+0x1a/0x30 [ 92.303986] The buggy address belongs to the object at ffff888101120120 which belongs to the cache kmalloc-16 of size 16 [ 92.304213] The buggy address is located 0 bytes inside of 16-byte region [ffff888101120120, ffff888101120130) [ 92.304504] The buggy address belongs to the physical page: [ 92.304616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101120 [ 92.304769] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 92.304900] page_type: f5(slab) [ 92.304977] raw: 0017ffffc0000000 ffff888100042640 dead000000000100 dead000000000122 [ 92.305127] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 92.305273] page dumped because: kasan: bad access detected [ 92.305451] Memory state around the buggy address: [ 92.305571] ffff888101120000: 00 07 fc fc 00 04 fc fc 00 06 fc fc 00 07 fc fc [ 92.305709] ffff888101120080: 00 06 fc fc 00 04 fc fc 00 00 fc fc 00 00 fc fc [ 92.305850] >ffff888101120100: 00 03 fc fc fa fb fc fc 00 03 fc fc 00 05 fc fc [ 92.305987] ^ [ 92.306079] ffff888101120180: 00 03 fc fc 00 07 fc fc 00 07 fc fc 00 07 fc fc [ 92.306222] ffff888101120200: 00 06 fc fc 00 04 fc fc 00 05 fc fc 00 04 fc fc [ 92.306359] ================================================================== [ 92.308903] ok 29 kmalloc_double_kzfree [ 92.309080] ================================================================== [ 92.309327] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x760/0x840 [kasan_test] [ 92.309513] Read of size 1 at addr ffff888103588f73 by task kunit_try_catch/3628 [ 92.309748] CPU: 1 UID: 0 PID: 3628 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.309756] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.309757] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.309760] Call Trace: [ 92.309761] [ 92.309763] dump_stack_lvl+0x4f/0x70 [ 92.309770] print_address_description.constprop.0+0x2c/0x3b0 [ 92.309775] ? ksize_unpoisons_memory+0x760/0x840 [kasan_test] [ 92.309785] print_report+0xb9/0x280 [ 92.309788] ? ksize_unpoisons_memory+0x760/0x840 [kasan_test] [ 92.309797] ? kasan_addr_to_slab+0x9/0x90 [ 92.309800] ? ksize_unpoisons_memory+0x760/0x840 [kasan_test] [ 92.309809] kasan_report+0xda/0x110 [ 92.309813] ? ksize_unpoisons_memory+0x760/0x840 [kasan_test] [ 92.309823] ksize_unpoisons_memory+0x760/0x840 [kasan_test] [ 92.309833] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [kasan_test] [ 92.309841] ? finish_task_switch.isra.0+0x155/0x750 [ 92.309845] ? __switch_to+0x526/0x1000 [ 92.309849] ? __schedule+0x763/0x1490 [ 92.309853] ? __pfx_read_tsc+0x10/0x10 [ 92.309856] ? ktime_get_ts64+0x7f/0x220 [ 92.309861] kunit_try_run_case+0x175/0x440 [ 92.309864] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.309868] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.309872] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.309875] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.309879] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.309883] kthread+0x3b4/0x780 [ 92.309887] ? __pfx_kthread+0x10/0x10 [ 92.309890] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.309894] ? __pfx_kthread+0x10/0x10 [ 92.309897] ? __pfx_kthread+0x10/0x10 [ 92.309901] ret_from_fork+0x22c/0x300 [ 92.309905] ? __pfx_kthread+0x10/0x10 [ 92.309908] ret_from_fork_asm+0x1a/0x30 [ 92.309913] [ 92.313500] Allocated by task 3628: [ 92.313583] kasan_save_stack+0x1c/0x40 [ 92.313683] kasan_save_track+0x10/0x30 [ 92.313770] __kasan_kmalloc+0xa6/0xb0 [ 92.313855] ksize_unpoisons_memory+0xae/0x840 [kasan_test] [ 92.313978] kunit_try_run_case+0x175/0x440 [ 92.314070] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.314181] kthread+0x3b4/0x780 [ 92.314261] ret_from_fork+0x22c/0x300 [ 92.314349] ret_from_fork_asm+0x1a/0x30 [ 92.314509] The buggy address belongs to the object at ffff888103588f00 which belongs to the cache kmalloc-128 of size 128 [ 92.314739] The buggy address is located 0 bytes to the right of allocated 115-byte region [ffff888103588f00, ffff888103588f73) [ 92.315026] The buggy address belongs to the physical page: [ 92.315139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103588 [ 92.315294] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.315454] ksm flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.315605] page_type: f5(slab) [ 92.315685] raw: 0017ffffc0000040 ffff888100042a00 ffffea00040b4180 0000000000000003 [ 92.315833] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.315983] head: 0017ffffc0000040 ffff888100042a00 ffffea00040b4180 0000000000000003 [ 92.316132] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.316280] head: 0017ffffc0000001 ffffea00040d6201 00000000ffffffff 00000000ffffffff [ 92.316443] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 92.316604] page dumped because: kasan: bad access detected [ 92.316766] Memory state around the buggy address: [ 92.316867] ffff888103588e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.317005] ffff888103588e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.317143] >ffff888103588f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 92.317280] ^ [ 92.317426] ffff888103588f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.317575] ffff888103589000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 92.317715] ================================================================== [ 92.317890] ================================================================== [ 92.318054] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x749/0x840 [kasan_test] [ 92.318255] Read of size 1 at addr ffff888103588f78 by task kunit_try_catch/3628 [ 92.318492] CPU: 1 UID: 0 PID: 3628 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.318504] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.318507] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.318511] Call Trace: [ 92.318514] [ 92.318525] dump_stack_lvl+0x4f/0x70 [ 92.318534] print_address_description.constprop.0+0x2c/0x3b0 [ 92.318542] ? ksize_unpoisons_memory+0x749/0x840 [kasan_test] [ 92.318561] print_report+0xb9/0x280 [ 92.318568] ? ksize_unpoisons_memory+0x749/0x840 [kasan_test] [ 92.318586] ? kasan_addr_to_slab+0x9/0x90 [ 92.318592] ? ksize_unpoisons_memory+0x749/0x840 [kasan_test] [ 92.318610] kasan_report+0xda/0x110 [ 92.318617] ? ksize_unpoisons_memory+0x749/0x840 [kasan_test] [ 92.318637] ksize_unpoisons_memory+0x749/0x840 [kasan_test] [ 92.318657] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [kasan_test] [ 92.318675] ? finish_task_switch.isra.0+0x155/0x750 [ 92.318682] ? __switch_to+0x526/0x1000 [ 92.318689] ? __schedule+0x763/0x1490 [ 92.318696] ? __pfx_read_tsc+0x10/0x10 [ 92.318701] ? ktime_get_ts64+0x7f/0x220 [ 92.318709] kunit_try_run_case+0x175/0x440 [ 92.318715] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.318721] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.318729] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.318735] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.318742] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.318749] kthread+0x3b4/0x780 [ 92.318755] ? __pfx_kthread+0x10/0x10 [ 92.318761] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.318767] ? __pfx_kthread+0x10/0x10 [ 92.318774] ? __pfx_kthread+0x10/0x10 [ 92.318780] ret_from_fork+0x22c/0x300 [ 92.318787] ? __pfx_kthread+0x10/0x10 [ 92.318793] ret_from_fork_asm+0x1a/0x30 [ 92.318802] [ 92.322804] Allocated by task 3628: [ 92.322886] kasan_save_stack+0x1c/0x40 [ 92.322978] kasan_save_track+0x10/0x30 [ 92.323065] __kasan_kmalloc+0xa6/0xb0 [ 92.323151] ksize_unpoisons_memory+0xae/0x840 [kasan_test] [ 92.323271] kunit_try_run_case+0x175/0x440 [ 92.323363] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.323496] kthread+0x3b4/0x780 [ 92.323576] ret_from_fork+0x22c/0x300 [ 92.323664] ret_from_fork_asm+0x1a/0x30 [ 92.323804] The buggy address belongs to the object at ffff888103588f00 which belongs to the cache kmalloc-128 of size 128 [ 92.324034] The buggy address is located 5 bytes to the right of allocated 115-byte region [ffff888103588f00, ffff888103588f73) [ 92.324322] The buggy address belongs to the physical page: [ 92.324450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103588 [ 92.324612] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.324762] ksm flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.324903] page_type: f5(slab) [ 92.324981] raw: 0017ffffc0000040 ffff888100042a00 ffffea00040b4180 0000000000000003 [ 92.325128] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.325275] head: 0017ffffc0000040 ffff888100042a00 ffffea00040b4180 0000000000000003 [ 92.325438] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.325596] head: 0017ffffc0000001 ffffea00040d6201 00000000ffffffff 00000000ffffffff [ 92.325744] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 92.325891] page dumped because: kasan: bad access detected [ 92.326055] Memory state around the buggy address: [ 92.326156] ffff888103588e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.326295] ffff888103588e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.326446] >ffff888103588f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 92.326594] ^ [ 92.326730] ffff888103588f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.326868] ffff888103589000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 92.327005] ================================================================== [ 92.327154] ================================================================== [ 92.327327] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x732/0x840 [kasan_test] [ 92.327527] Read of size 1 at addr ffff888103588f7f by task kunit_try_catch/3628 [ 92.327766] CPU: 1 UID: 0 PID: 3628 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.327778] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.327781] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.327785] Call Trace: [ 92.327788] [ 92.327790] dump_stack_lvl+0x4f/0x70 [ 92.327799] print_address_description.constprop.0+0x2c/0x3b0 [ 92.327806] ? ksize_unpoisons_memory+0x732/0x840 [kasan_test] [ 92.327826] print_report+0xb9/0x280 [ 92.327833] ? ksize_unpoisons_memory+0x732/0x840 [kasan_test] [ 92.327851] ? kasan_addr_to_slab+0x9/0x90 [ 92.327857] ? ksize_unpoisons_memory+0x732/0x840 [kasan_test] [ 92.327885] kasan_report+0xda/0x110 [ 92.327892] ? ksize_unpoisons_memory+0x732/0x840 [kasan_test] [ 92.327912] ksize_unpoisons_memory+0x732/0x840 [kasan_test] [ 92.327931] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [kasan_test] [ 92.327949] ? finish_task_switch.isra.0+0x155/0x750 [ 92.327956] ? __switch_to+0x526/0x1000 [ 92.327963] ? __schedule+0x763/0x1490 [ 92.327970] ? __pfx_read_tsc+0x10/0x10 [ 92.327975] ? ktime_get_ts64+0x7f/0x220 [ 92.327983] kunit_try_run_case+0x175/0x440 [ 92.327989] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.327995] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.328003] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.328008] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.328015] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.328022] kthread+0x3b4/0x780 [ 92.328029] ? __pfx_kthread+0x10/0x10 [ 92.328035] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.328041] ? __pfx_kthread+0x10/0x10 [ 92.328047] ? __pfx_kthread+0x10/0x10 [ 92.328054] ret_from_fork+0x22c/0x300 [ 92.328060] ? __pfx_kthread+0x10/0x10 [ 92.328066] ret_from_fork_asm+0x1a/0x30 [ 92.328075] [ 92.331889] Allocated by task 3628: [ 92.331971] kasan_save_stack+0x1c/0x40 [ 92.332059] kasan_save_track+0x10/0x30 [ 92.332146] __kasan_kmalloc+0xa6/0xb0 [ 92.332232] ksize_unpoisons_memory+0xae/0x840 [kasan_test] [ 92.332352] kunit_try_run_case+0x175/0x440 [ 92.332465] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.332576] kthread+0x3b4/0x780 [ 92.332655] ret_from_fork+0x22c/0x300 [ 92.332741] ret_from_fork_asm+0x1a/0x30 [ 92.332879] The buggy address belongs to the object at ffff888103588f00 which belongs to the cache kmalloc-128 of size 128 [ 92.333109] The buggy address is located 12 bytes to the right of allocated 115-byte region [ffff888103588f00, ffff888103588f73) [ 92.333408] The buggy address belongs to the physical page: [ 92.333533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103588 [ 92.333684] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.333831] ksm flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.333972] page_type: f5(slab) [ 92.334050] raw: 0017ffffc0000040 ffff888100042a00 ffffea00040b4180 0000000000000003 [ 92.334197] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.334343] head: 0017ffffc0000040 ffff888100042a00 ffffea00040b4180 0000000000000003 [ 92.334515] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.334663] head: 0017ffffc0000001 ffffea00040d6201 00000000ffffffff 00000000ffffffff [ 92.334811] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 92.334958] page dumped because: kasan: bad access detected [ 92.335123] Memory state around the buggy address: [ 92.335224] ffff888103588e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.335365] ffff888103588e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.335525] >ffff888103588f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 92.335663] ^ [ 92.335800] ffff888103588f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.335938] ffff888103589000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 92.336075] ================================================================== [ 92.336466] ok 30 ksize_unpoisons_memory [ 92.336609] ================================================================== [ 92.336884] BUG: KASAN: slab-use-after-free in ksize_uaf+0x18a/0x6b0 [kasan_test] [ 92.337079] Read of size 1 at addr ffff888103589000 by task kunit_try_catch/3630 [ 92.337317] CPU: 1 UID: 0 PID: 3630 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.337329] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.337332] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.337336] Call Trace: [ 92.337339] [ 92.337342] dump_stack_lvl+0x4f/0x70 [ 92.337350] print_address_description.constprop.0+0x2c/0x3b0 [ 92.337358] ? ksize_uaf+0x18a/0x6b0 [kasan_test] [ 92.337376] print_report+0xb9/0x280 [ 92.337383] ? ksize_uaf+0x18a/0x6b0 [kasan_test] [ 92.337410] ? kasan_addr_to_slab+0x9/0x90 [ 92.337416] ? ksize_uaf+0x18a/0x6b0 [kasan_test] [ 92.337434] kasan_report+0xda/0x110 [ 92.337441] ? ksize_uaf+0x18a/0x6b0 [kasan_test] [ 92.337470] ? ksize_uaf+0x18a/0x6b0 [kasan_test] [ 92.337489] __kasan_check_byte+0x32/0x40 [ 92.337496] ksize+0x19/0x50 [ 92.337503] ksize_uaf+0x18a/0x6b0 [kasan_test] [ 92.337522] ? __pfx_ksize_uaf+0x10/0x10 [kasan_test] [ 92.337541] ? __schedule+0x763/0x1490 [ 92.337548] ? __pfx_read_tsc+0x10/0x10 [ 92.337553] ? ktime_get_ts64+0x7f/0x220 [ 92.337560] ? __pfx___schedule+0x10/0x10 [ 92.337566] kunit_try_run_case+0x175/0x440 [ 92.337573] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.337579] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.337587] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.337592] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.337599] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.337606] kthread+0x3b4/0x780 [ 92.337613] ? __pfx_kthread+0x10/0x10 [ 92.337618] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.337625] ? __pfx_kthread+0x10/0x10 [ 92.337631] ? __pfx_kthread+0x10/0x10 [ 92.337637] ret_from_fork+0x22c/0x300 [ 92.337644] ? __pfx_kthread+0x10/0x10 [ 92.337650] ret_from_fork_asm+0x1a/0x30 [ 92.337658] [ 92.341466] Allocated by task 3630: [ 92.341549] kasan_save_stack+0x1c/0x40 [ 92.341637] kasan_save_track+0x10/0x30 [ 92.341725] __kasan_kmalloc+0xa6/0xb0 [ 92.341811] ksize_uaf+0x97/0x6b0 [kasan_test] [ 92.341914] kunit_try_run_case+0x175/0x440 [ 92.342026] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.342138] kthread+0x3b4/0x780 [ 92.342217] ret_from_fork+0x22c/0x300 [ 92.342303] ret_from_fork_asm+0x1a/0x30 [ 92.342457] Freed by task 3630: [ 92.342543] kasan_save_stack+0x1c/0x40 [ 92.342631] kasan_save_track+0x10/0x30 [ 92.342718] kasan_save_free_info+0x37/0x60 [ 92.342810] __kasan_slab_free+0x4d/0x70 [ 92.342901] kfree+0x23f/0x440 [ 92.342978] ksize_uaf+0x119/0x6b0 [kasan_test] [ 92.343083] kunit_try_run_case+0x175/0x440 [ 92.343175] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.343287] kthread+0x3b4/0x780 [ 92.343365] ret_from_fork+0x22c/0x300 [ 92.343474] ret_from_fork_asm+0x1a/0x30 [ 92.343614] The buggy address belongs to the object at ffff888103589000 which belongs to the cache kmalloc-128 of size 128 [ 92.343844] The buggy address is located 0 bytes inside of freed 128-byte region [ffff888103589000, ffff888103589080) [ 92.344118] The buggy address belongs to the physical page: [ 92.344235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103588 [ 92.344387] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.344555] ksm flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.344698] page_type: f5(slab) [ 92.344776] raw: 0017ffffc0000040 ffff888100042a00 ffffea00040b4180 0000000000000003 [ 92.344924] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.345075] head: 0017ffffc0000040 ffff888100042a00 ffffea00040b4180 0000000000000003 [ 92.345225] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.345377] head: 0017ffffc0000001 ffffea00040d6201 00000000ffffffff 00000000ffffffff [ 92.345547] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 92.345694] page dumped because: kasan: bad access detected [ 92.345857] Memory state around the buggy address: [ 92.345961] ffff888103588f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 92.346103] ffff888103588f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.346241] >ffff888103589000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 92.346379] ^ [ 92.346477] ffff888103589080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.346616] ffff888103589100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 92.346753] ================================================================== [ 92.346971] ================================================================== [ 92.347136] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5f5/0x6b0 [kasan_test] [ 92.347320] Read of size 1 at addr ffff888103589000 by task kunit_try_catch/3630 [ 92.347559] CPU: 1 UID: 0 PID: 3630 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.347571] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.347574] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.347578] Call Trace: [ 92.347581] [ 92.347584] dump_stack_lvl+0x4f/0x70 [ 92.347592] print_address_description.constprop.0+0x2c/0x3b0 [ 92.347600] ? ksize_uaf+0x5f5/0x6b0 [kasan_test] [ 92.347620] print_report+0xb9/0x280 [ 92.347627] ? ksize_uaf+0x5f5/0x6b0 [kasan_test] [ 92.347645] ? kasan_addr_to_slab+0x9/0x90 [ 92.347651] ? ksize_uaf+0x5f5/0x6b0 [kasan_test] [ 92.347678] kasan_report+0xda/0x110 [ 92.347685] ? ksize_uaf+0x5f5/0x6b0 [kasan_test] [ 92.347705] ksize_uaf+0x5f5/0x6b0 [kasan_test] [ 92.347724] ? __pfx_ksize_uaf+0x10/0x10 [kasan_test] [ 92.347743] ? __schedule+0x763/0x1490 [ 92.347749] ? __pfx_read_tsc+0x10/0x10 [ 92.347754] ? ktime_get_ts64+0x7f/0x220 [ 92.347761] ? __pfx___schedule+0x10/0x10 [ 92.347767] kunit_try_run_case+0x175/0x440 [ 92.347773] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.347779] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.347787] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.347792] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.347799] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.347807] kthread+0x3b4/0x780 [ 92.347813] ? __pfx_kthread+0x10/0x10 [ 92.347819] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.347826] ? __pfx_kthread+0x10/0x10 [ 92.347832] ? __pfx_kthread+0x10/0x10 [ 92.347838] ret_from_fork+0x22c/0x300 [ 92.347844] ? __pfx_kthread+0x10/0x10 [ 92.347851] ret_from_fork_asm+0x1a/0x30 [ 92.347859] [ 92.351520] Allocated by task 3630: [ 92.351604] kasan_save_stack+0x1c/0x40 [ 92.351695] kasan_save_track+0x10/0x30 [ 92.351783] __kasan_kmalloc+0xa6/0xb0 [ 92.351872] ksize_uaf+0x97/0x6b0 [kasan_test] [ 92.351977] kunit_try_run_case+0x175/0x440 [ 92.352071] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.352183] kthread+0x3b4/0x780 [ 92.352263] ret_from_fork+0x22c/0x300 [ 92.352350] ret_from_fork_asm+0x1a/0x30 [ 92.352504] Freed by task 3630: [ 92.352580] kasan_save_stack+0x1c/0x40 [ 92.352668] kasan_save_track+0x10/0x30 [ 92.352755] kasan_save_free_info+0x37/0x60 [ 92.352846] __kasan_slab_free+0x4d/0x70 [ 92.352937] kfree+0x23f/0x440 [ 92.353013] ksize_uaf+0x119/0x6b0 [kasan_test] [ 92.353119] kunit_try_run_case+0x175/0x440 [ 92.353212] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.353325] kthread+0x3b4/0x780 [ 92.353413] ret_from_fork+0x22c/0x300 [ 92.353513] ret_from_fork_asm+0x1a/0x30 [ 92.353654] The buggy address belongs to the object at ffff888103589000 which belongs to the cache kmalloc-128 of size 128 [ 92.353883] The buggy address is located 0 bytes inside of freed 128-byte region [ffff888103589000, ffff888103589080) [ 92.354156] The buggy address belongs to the physical page: [ 92.354268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103588 [ 92.354438] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.354595] ksm flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.354736] page_type: f5(slab) [ 92.354814] raw: 0017ffffc0000040 ffff888100042a00 ffffea00040b4180 0000000000000003 [ 92.354961] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.355108] head: 0017ffffc0000040 ffff888100042a00 ffffea00040b4180 0000000000000003 [ 92.355256] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.355413] head: 0017ffffc0000001 ffffea00040d6201 00000000ffffffff 00000000ffffffff [ 92.355574] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 92.355724] page dumped because: kasan: bad access detected [ 92.355890] Memory state around the buggy address: [ 92.355991] ffff888103588f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 92.356130] ffff888103588f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.356268] >ffff888103589000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 92.356420] ^ [ 92.356511] ffff888103589080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.356653] ffff888103589100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 92.356792] ================================================================== [ 92.356942] ================================================================== [ 92.357114] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5db/0x6b0 [kasan_test] [ 92.357297] Read of size 1 at addr ffff888103589078 by task kunit_try_catch/3630 [ 92.357532] CPU: 1 UID: 0 PID: 3630 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.357544] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.357547] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.357551] Call Trace: [ 92.357554] [ 92.357557] dump_stack_lvl+0x4f/0x70 [ 92.357565] print_address_description.constprop.0+0x2c/0x3b0 [ 92.357581] ? ksize_uaf+0x5db/0x6b0 [kasan_test] [ 92.357600] print_report+0xb9/0x280 [ 92.357606] ? ksize_uaf+0x5db/0x6b0 [kasan_test] [ 92.357624] ? kasan_addr_to_slab+0x9/0x90 [ 92.357631] ? ksize_uaf+0x5db/0x6b0 [kasan_test] [ 92.357649] kasan_report+0xda/0x110 [ 92.357656] ? ksize_uaf+0x5db/0x6b0 [kasan_test] [ 92.357675] ksize_uaf+0x5db/0x6b0 [kasan_test] [ 92.357695] ? __pfx_ksize_uaf+0x10/0x10 [kasan_test] [ 92.357712] ? __schedule+0x763/0x1490 [ 92.357720] ? __pfx_read_tsc+0x10/0x10 [ 92.357725] ? ktime_get_ts64+0x7f/0x220 [ 92.357732] ? __pfx___schedule+0x10/0x10 [ 92.357738] kunit_try_run_case+0x175/0x440 [ 92.357744] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.357751] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.357759] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.357764] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.357770] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.357778] kthread+0x3b4/0x780 [ 92.357784] ? __pfx_kthread+0x10/0x10 [ 92.357790] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.357796] ? __pfx_kthread+0x10/0x10 [ 92.357802] ? __pfx_kthread+0x10/0x10 [ 92.357808] ret_from_fork+0x22c/0x300 [ 92.357815] ? __pfx_kthread+0x10/0x10 [ 92.357820] ret_from_fork_asm+0x1a/0x30 [ 92.357829] [ 92.361602] Allocated by task 3630: [ 92.361684] kasan_save_stack+0x1c/0x40 [ 92.361773] kasan_save_track+0x10/0x30 [ 92.361860] __kasan_kmalloc+0xa6/0xb0 [ 92.361946] ksize_uaf+0x97/0x6b0 [kasan_test] [ 92.362049] kunit_try_run_case+0x175/0x440 [ 92.362140] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.362254] kthread+0x3b4/0x780 [ 92.362335] ret_from_fork+0x22c/0x300 [ 92.362440] ret_from_fork_asm+0x1a/0x30 [ 92.362591] Freed by task 3630: [ 92.362666] kasan_save_stack+0x1c/0x40 [ 92.362754] kasan_save_track+0x10/0x30 [ 92.362841] kasan_save_free_info+0x37/0x60 [ 92.362932] __kasan_slab_free+0x4d/0x70 [ 92.363021] kfree+0x23f/0x440 [ 92.363098] ksize_uaf+0x119/0x6b0 [kasan_test] [ 92.363202] kunit_try_run_case+0x175/0x440 [ 92.363294] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.363415] kthread+0x3b4/0x780 [ 92.363506] ret_from_fork+0x22c/0x300 [ 92.363592] ret_from_fork_asm+0x1a/0x30 [ 92.363731] The buggy address belongs to the object at ffff888103589000 which belongs to the cache kmalloc-128 of size 128 [ 92.363961] The buggy address is located 120 bytes inside of freed 128-byte region [ffff888103589000, ffff888103589080) [ 92.364237] The buggy address belongs to the physical page: [ 92.364349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103588 [ 92.364524] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.364670] ksm flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.364816] page_type: f5(slab) [ 92.364893] raw: 0017ffffc0000040 ffff888100042a00 ffffea00040b4180 0000000000000003 [ 92.365040] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.365194] head: 0017ffffc0000040 ffff888100042a00 ffffea00040b4180 0000000000000003 [ 92.365342] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 92.365511] head: 0017ffffc0000001 ffffea00040d6201 00000000ffffffff 00000000ffffffff [ 92.365660] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 92.365807] page dumped because: kasan: bad access detected [ 92.365969] Memory state around the buggy address: [ 92.366070] ffff888103588f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 92.366208] ffff888103588f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.366345] >ffff888103589000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 92.366505] ^ [ 92.366642] ffff888103589080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.366784] ffff888103589100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 92.366923] ================================================================== [ 92.367410] ok 31 ksize_uaf [ 92.384438] ================================================================== [ 92.384723] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x45/0x50 [kasan_test] [ 92.384894] Read of size 4 at addr ffff88812626d3c0 by task swapper/1/0 [ 92.385126] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.385134] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.385135] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.385138] Call Trace: [ 92.385140] [ 92.385142] dump_stack_lvl+0x4f/0x70 [ 92.385149] print_address_description.constprop.0+0x2c/0x3b0 [ 92.385155] ? rcu_uaf_reclaim+0x45/0x50 [kasan_test] [ 92.385164] print_report+0xb9/0x280 [ 92.385168] ? rcu_uaf_reclaim+0x45/0x50 [kasan_test] [ 92.385185] ? kasan_addr_to_slab+0x9/0x90 [ 92.385189] ? rcu_uaf_reclaim+0x45/0x50 [kasan_test] [ 92.385197] kasan_report+0xda/0x110 [ 92.385200] ? rcu_uaf_reclaim+0x45/0x50 [kasan_test] [ 92.385209] rcu_uaf_reclaim+0x45/0x50 [kasan_test] [ 92.385218] rcu_do_batch+0x38d/0xdf0 [ 92.385223] ? __pfx_rcu_do_batch+0x10/0x10 [ 92.385227] ? __note_gp_changes+0x68d/0x950 [ 92.385231] rcu_core+0x393/0xab0 [ 92.385234] ? irqtime_account_irq+0x4d/0x200 [ 92.385238] handle_softirqs+0x198/0x5e0 [ 92.385243] __irq_exit_rcu+0x158/0x1a0 [ 92.385246] sysvec_apic_timer_interrupt+0x6e/0x90 [ 92.385250] [ 92.385251] [ 92.385252] asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 92.385256] RIP: 0010:cpuidle_enter_state+0xdb/0x4a0 [ 92.385261] Code: bf ff ff ff ff 49 89 c6 e8 c2 64 3b ff 31 ff e8 2b 78 2c fd 45 84 ff 0f 85 81 01 00 00 e8 ed 6b 3b ff 84 c0 75 01 fb 45 85 ed <0f> 88 4d 01 00 00 4d 63 fd 49 83 ff 09 0f 87 e3 02 00 00 4b 8d 04 [ 92.385266] RSP: 0018:ffffc9000016fd80 EFLAGS: 00000202 [ 92.385270] RAX: 0000000000000000 RBX: ffff8883676ca040 RCX: 0000000000000000 [ 92.385272] RDX: 1ffff1106ced843b RSI: 0000000000000001 RDI: ffff8883676c21d8 [ 92.385275] RBP: ffffffff85f8dd00 R08: 0000000000000000 R09: ffffed106ced77bd [ 92.385277] R10: ffff8883676bbdeb R11: ffffffffffffffff R12: 0000000000000004 [ 92.385279] R13: 0000000000000004 R14: 00000015828a5d7c R15: 0000000000000000 [ 92.385284] cpuidle_enter+0x4a/0xa0 [ 92.385288] cpuidle_idle_call+0x21c/0x370 [ 92.385293] ? __pfx_cpuidle_idle_call+0x10/0x10 [ 92.385296] ? check_tsc_unstable+0x10/0x10 [ 92.385301] do_idle+0xe0/0x190 [ 92.385304] cpu_startup_entry+0x50/0x60 [ 92.385308] start_secondary+0x217/0x2a0 [ 92.385312] ? __pfx_start_secondary+0x10/0x10 [ 92.385316] ? startup_64_load_idt+0xa1/0xb0 [ 92.385320] common_startup_64+0x13e/0x141 [ 92.385326] [ 92.390188] Allocated by task 3632: [ 92.390271] kasan_save_stack+0x1c/0x40 [ 92.390364] kasan_save_track+0x10/0x30 [ 92.390463] __kasan_kmalloc+0xa6/0xb0 [ 92.390561] rcu_uaf+0x9e/0x310 [kasan_test] [ 92.390662] kunit_try_run_case+0x175/0x440 [ 92.390757] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.390870] kthread+0x3b4/0x780 [ 92.390951] ret_from_fork+0x22c/0x300 [ 92.391039] ret_from_fork_asm+0x1a/0x30 [ 92.391184] Freed by task 0: [ 92.391257] kasan_save_stack+0x1c/0x40 [ 92.391347] kasan_save_track+0x10/0x30 [ 92.391447] kasan_save_free_info+0x37/0x60 [ 92.391551] __kasan_slab_free+0x4d/0x70 [ 92.391641] kfree+0x23f/0x440 [ 92.391720] rcu_uaf_reclaim+0x16/0x50 [kasan_test] [ 92.391830] rcu_do_batch+0x38d/0xdf0 [ 92.391917] rcu_core+0x393/0xab0 [ 92.391997] handle_softirqs+0x198/0x5e0 [ 92.392090] __irq_exit_rcu+0x158/0x1a0 [ 92.392178] sysvec_apic_timer_interrupt+0x6e/0x90 [ 92.392282] asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 92.392453] Last potentially related work creation: [ 92.392568] kasan_save_stack+0x1c/0x40 [ 92.392658] kasan_record_aux_stack+0xa3/0xb0 [ 92.392757] __call_rcu_common.constprop.0+0xc8/0x980 [ 92.392864] rcu_uaf+0x156/0x310 [kasan_test] [ 92.392968] kunit_try_run_case+0x175/0x440 [ 92.393062] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.393175] kthread+0x3b4/0x780 [ 92.393255] ret_from_fork+0x22c/0x300 [ 92.393344] ret_from_fork_asm+0x1a/0x30 [ 92.393507] The buggy address belongs to the object at ffff88812626d3c0 which belongs to the cache kmalloc-32 of size 32 [ 92.393737] The buggy address is located 0 bytes inside of freed 32-byte region [ffff88812626d3c0, ffff88812626d3e0) [ 92.394013] The buggy address belongs to the physical page: [ 92.394127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x12626d [ 92.394281] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 92.394426] page_type: f5(slab) [ 92.394517] raw: 0017ffffc0000000 ffff888100042780 dead000000000100 dead000000000122 [ 92.394670] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 92.394817] page dumped because: kasan: bad access detected [ 92.394983] Memory state around the buggy address: [ 92.395087] ffff88812626d280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 92.395227] ffff88812626d300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 92.395366] >ffff88812626d380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 92.395525] ^ [ 92.395637] ffff88812626d400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 92.395776] ffff88812626d480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 92.395914] ================================================================== [ 92.396330] ok 32 rcu_uaf [ 92.396743] ================================================================== [ 92.397020] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x4bd/0x530 [kasan_test] [ 92.397181] Read of size 8 at addr ffff88840bb58800 by task kunit_try_catch/3634 [ 92.397378] CPU: 4 UID: 0 PID: 3634 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.397386] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.397387] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.397390] Call Trace: [ 92.397392] [ 92.397394] dump_stack_lvl+0x4f/0x70 [ 92.397400] print_address_description.constprop.0+0x2c/0x3b0 [ 92.397406] ? workqueue_uaf+0x4bd/0x530 [kasan_test] [ 92.397416] print_report+0xb9/0x280 [ 92.397421] ? workqueue_uaf+0x4bd/0x530 [kasan_test] [ 92.397435] ? kasan_addr_to_slab+0x9/0x90 [ 92.397439] ? workqueue_uaf+0x4bd/0x530 [kasan_test] [ 92.397447] kasan_report+0xda/0x110 [ 92.397452] ? workqueue_uaf+0x4bd/0x530 [kasan_test] [ 92.397461] workqueue_uaf+0x4bd/0x530 [kasan_test] [ 92.397471] ? __pfx_workqueue_uaf+0x10/0x10 [kasan_test] [ 92.397481] ? __schedule+0x763/0x1490 [ 92.397485] ? __pfx_read_tsc+0x10/0x10 [ 92.397488] ? ktime_get_ts64+0x7f/0x220 [ 92.397493] kunit_try_run_case+0x175/0x440 [ 92.397497] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.397500] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.397505] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.397508] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.397512] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.397516] kthread+0x3b4/0x780 [ 92.397520] ? __pfx_kthread+0x10/0x10 [ 92.397524] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.397527] ? __pfx_kthread+0x10/0x10 [ 92.397531] ? __pfx_kthread+0x10/0x10 [ 92.397535] ret_from_fork+0x22c/0x300 [ 92.397539] ? __pfx_kthread+0x10/0x10 [ 92.397543] ret_from_fork_asm+0x1a/0x30 [ 92.397548] [ 92.400880] Allocated by task 3634: [ 92.400963] kasan_save_stack+0x1c/0x40 [ 92.401054] kasan_save_track+0x10/0x30 [ 92.401141] __kasan_kmalloc+0xa6/0xb0 [ 92.401226] workqueue_uaf+0x13a/0x530 [kasan_test] [ 92.401335] kunit_try_run_case+0x175/0x440 [ 92.401439] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.401560] kthread+0x3b4/0x780 [ 92.401638] ret_from_fork+0x22c/0x300 [ 92.401724] ret_from_fork_asm+0x1a/0x30 [ 92.401865] Freed by task 91: [ 92.401940] kasan_save_stack+0x1c/0x40 [ 92.402027] kasan_save_track+0x10/0x30 [ 92.402116] kasan_save_free_info+0x37/0x60 [ 92.402211] __kasan_slab_free+0x4d/0x70 [ 92.402299] kfree+0x23f/0x440 [ 92.402377] process_one_work+0x679/0x1000 [ 92.402491] worker_thread+0x718/0xf50 [ 92.402577] kthread+0x3b4/0x780 [ 92.402657] ret_from_fork+0x22c/0x300 [ 92.402743] ret_from_fork_asm+0x1a/0x30 [ 92.402881] Last potentially related work creation: [ 92.402983] kasan_save_stack+0x1c/0x40 [ 92.403070] kasan_record_aux_stack+0xa3/0xb0 [ 92.403165] insert_work+0x2d/0x230 [ 92.403248] __queue_work+0x540/0xad0 [ 92.403332] queue_work_on+0x5e/0x70 [ 92.403427] workqueue_uaf+0x252/0x530 [kasan_test] [ 92.403556] kunit_try_run_case+0x175/0x440 [ 92.403649] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.403760] kthread+0x3b4/0x780 [ 92.403839] ret_from_fork+0x22c/0x300 [ 92.403925] ret_from_fork_asm+0x1a/0x30 [ 92.404066] The buggy address belongs to the object at ffff88840bb58800 which belongs to the cache kmalloc-32 of size 32 [ 92.404304] The buggy address is located 0 bytes inside of freed 32-byte region [ffff88840bb58800, ffff88840bb58820) [ 92.404600] The buggy address belongs to the physical page: [ 92.404713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x40bb58 [ 92.404865] anon flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 92.405002] page_type: f5(slab) [ 92.405080] raw: 0017ffffc0000000 ffff888100042780 0000000000000000 dead000000000001 [ 92.405227] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 92.405373] page dumped because: kasan: bad access detected [ 92.405554] Memory state around the buggy address: [ 92.405656] ffff88840bb58700: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 92.405794] ffff88840bb58780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 92.405932] >ffff88840bb58800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 92.406073] ^ [ 92.406150] ffff88840bb58880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 92.406291] ffff88840bb58900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 92.406459] ================================================================== [ 92.406854] ok 33 workqueue_uaf [ 92.407168] ok 34 kfree_via_page [ 92.407519] ok 35 kfree_via_phys [ 92.407854] ================================================================== [ 92.408077] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x3a5/0x4a0 [kasan_test] [ 92.408238] Read of size 1 at addr ffff888409400800 by task kunit_try_catch/3641 [ 92.408445] CPU: 0 UID: 0 PID: 3641 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.408457] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.408459] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.408464] Call Trace: [ 92.408467] [ 92.408471] dump_stack_lvl+0x4f/0x70 [ 92.408480] print_address_description.constprop.0+0x2c/0x3b0 [ 92.408489] ? kmem_cache_oob+0x3a5/0x4a0 [kasan_test] [ 92.408510] print_report+0xb9/0x280 [ 92.408518] ? kmem_cache_oob+0x3a5/0x4a0 [kasan_test] [ 92.408537] ? kasan_addr_to_slab+0x9/0x90 [ 92.408544] ? kmem_cache_oob+0x3a5/0x4a0 [kasan_test] [ 92.408564] kasan_report+0xda/0x110 [ 92.408572] ? kmem_cache_oob+0x3a5/0x4a0 [kasan_test] [ 92.408584] kmem_cache_oob+0x3a5/0x4a0 [kasan_test] [ 92.408594] ? __pfx_kmem_cache_oob+0x10/0x10 [kasan_test] [ 92.408604] ? finish_task_switch.isra.0+0x155/0x750 [ 92.408608] ? __switch_to+0x526/0x1000 [ 92.408613] ? __pfx_read_tsc+0x10/0x10 [ 92.408616] ? ktime_get_ts64+0x7f/0x220 [ 92.408621] kunit_try_run_case+0x175/0x440 [ 92.408624] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.408627] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.408632] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.408635] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.408639] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.408643] kthread+0x3b4/0x780 [ 92.408647] ? __pfx_kthread+0x10/0x10 [ 92.408651] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.408654] ? __pfx_kthread+0x10/0x10 [ 92.408658] ? __pfx_kthread+0x10/0x10 [ 92.408662] ret_from_fork+0x22c/0x300 [ 92.408666] ? __pfx_kthread+0x10/0x10 [ 92.408669] ret_from_fork_asm+0x1a/0x30 [ 92.408674] [ 92.412087] Allocated by task 3641: [ 92.412171] kasan_save_stack+0x1c/0x40 [ 92.412259] kasan_save_track+0x10/0x30 [ 92.412346] __kasan_slab_alloc+0x85/0x90 [ 92.412449] kmem_cache_alloc_noprof+0x130/0x420 [ 92.412559] kmem_cache_oob+0x144/0x4a0 [kasan_test] [ 92.412670] kunit_try_run_case+0x175/0x440 [ 92.412762] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.412873] kthread+0x3b4/0x780 [ 92.412952] ret_from_fork+0x22c/0x300 [ 92.413038] ret_from_fork_asm+0x1a/0x30 [ 92.413176] The buggy address belongs to the object at ffff888409400738 which belongs to the cache test_cache of size 200 [ 92.413414] The buggy address is located 0 bytes to the right of allocated 200-byte region [ffff888409400738, ffff888409400800) [ 92.413715] The buggy address belongs to the physical page: [ 92.413830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x409400 [ 92.413982] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.414128] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.414264] page_type: f5(slab) [ 92.414343] raw: 0017ffffc0000040 ffff8883f9b04000 dead000000000122 0000000000000000 [ 92.414512] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 92.414659] head: 0017ffffc0000040 ffff8883f9b04000 dead000000000122 0000000000000000 [ 92.414807] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 92.414954] head: 0017ffffc0000001 ffffea0010250001 00000000ffffffff 00000000ffffffff [ 92.415103] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 92.415252] page dumped because: kasan: bad access detected [ 92.415432] Memory state around the buggy address: [ 92.415549] ffff888409400700: fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 00 [ 92.415687] ffff888409400780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.415825] >ffff888409400800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.415962] ^ [ 92.416039] ffff888409400880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.416176] ffff888409400900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.416313] ================================================================== [ 92.458175] ok 36 kmem_cache_oob [ 92.458633] ================================================================== [ 92.458883] BUG: KASAN: double-free in kmem_cache_double_free+0x1ca/0x440 [kasan_test] [ 92.459045] Free of addr ffff88840a3f17b8 by task kunit_try_catch/3643 [ 92.459228] CPU: 0 UID: 0 PID: 3643 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.459236] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.459237] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.459240] Call Trace: [ 92.459242] [ 92.459244] dump_stack_lvl+0x4f/0x70 [ 92.459251] print_address_description.constprop.0+0x2c/0x3b0 [ 92.459257] print_report+0xb9/0x280 [ 92.459260] ? kasan_addr_to_slab+0x9/0x90 [ 92.459264] ? kmem_cache_double_free+0x1ca/0x440 [kasan_test] [ 92.459274] kasan_report_invalid_free+0xba/0xe0 [ 92.459278] ? kmem_cache_double_free+0x1ca/0x440 [kasan_test] [ 92.459288] ? kmem_cache_double_free+0x1ca/0x440 [kasan_test] [ 92.459297] check_slab_allocation+0xfa/0x120 [ 92.459300] kmem_cache_free+0x155/0x530 [ 92.459304] ? kmem_cache_double_free+0x1ca/0x440 [kasan_test] [ 92.459314] kmem_cache_double_free+0x1ca/0x440 [kasan_test] [ 92.459324] ? __pfx_kmem_cache_double_free+0x10/0x10 [kasan_test] [ 92.459334] ? finish_task_switch.isra.0+0x155/0x750 [ 92.459338] ? __switch_to+0x526/0x1000 [ 92.459343] ? __pfx_read_tsc+0x10/0x10 [ 92.459346] ? ktime_get_ts64+0x7f/0x220 [ 92.459350] kunit_try_run_case+0x175/0x440 [ 92.459355] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.459358] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.459363] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.459366] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.459370] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.459374] kthread+0x3b4/0x780 [ 92.459378] ? __pfx_kthread+0x10/0x10 [ 92.459382] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.459385] ? __pfx_kthread+0x10/0x10 [ 92.459389] ? __pfx_kthread+0x10/0x10 [ 92.459392] ret_from_fork+0x22c/0x300 [ 92.459397] ? __pfx_kthread+0x10/0x10 [ 92.459400] ret_from_fork_asm+0x1a/0x30 [ 92.459406] [ 92.463086] Allocated by task 3643: [ 92.463168] kasan_save_stack+0x1c/0x40 [ 92.463259] kasan_save_track+0x10/0x30 [ 92.463347] __kasan_slab_alloc+0x85/0x90 [ 92.463439] kmem_cache_alloc_noprof+0x130/0x420 [ 92.463539] kmem_cache_double_free+0x13f/0x440 [kasan_test] [ 92.463662] kunit_try_run_case+0x175/0x440 [ 92.463757] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.463869] kthread+0x3b4/0x780 [ 92.463948] ret_from_fork+0x22c/0x300 [ 92.464035] ret_from_fork_asm+0x1a/0x30 [ 92.464175] Freed by task 3643: [ 92.464252] kasan_save_stack+0x1c/0x40 [ 92.464342] kasan_save_track+0x10/0x30 [ 92.464446] kasan_save_free_info+0x37/0x60 [ 92.464549] __kasan_slab_free+0x4d/0x70 [ 92.464638] kmem_cache_free+0x2ee/0x530 [ 92.464727] kmem_cache_double_free+0x156/0x440 [kasan_test] [ 92.464848] kunit_try_run_case+0x175/0x440 [ 92.464941] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.465055] kthread+0x3b4/0x780 [ 92.465137] ret_from_fork+0x22c/0x300 [ 92.465225] ret_from_fork_asm+0x1a/0x30 [ 92.465366] The buggy address belongs to the object at ffff88840a3f17b8 which belongs to the cache test_cache of size 200 [ 92.465597] The buggy address is located 0 bytes inside of 200-byte region [ffff88840a3f17b8, ffff88840a3f1880) [ 92.465866] The buggy address belongs to the physical page: [ 92.465982] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x40a3f0 [ 92.466139] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.466285] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.466426] page_type: f5(slab) [ 92.466508] raw: 0017ffffc0000040 ffff88811136c000 dead000000000122 0000000000000000 [ 92.466656] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 92.466803] head: 0017ffffc0000040 ffff88811136c000 dead000000000122 0000000000000000 [ 92.466952] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 92.467100] head: 0017ffffc0000001 ffffea001028fc01 00000000ffffffff 00000000ffffffff [ 92.467248] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 92.467395] page dumped because: kasan: bad access detected [ 92.467560] Memory state around the buggy address: [ 92.467661] ffff88840a3f1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.467801] ffff88840a3f1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.467940] >ffff88840a3f1780: fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb fb [ 92.468078] ^ [ 92.468187] ffff88840a3f1800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 92.468328] ffff88840a3f1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.468471] ================================================================== [ 92.492486] ok 37 kmem_cache_double_free [ 92.492933] ================================================================== [ 92.493192] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x1c3/0x470 [kasan_test] [ 92.493357] Free of addr ffff8881e5396841 by task kunit_try_catch/3645 [ 92.493564] CPU: 4 UID: 0 PID: 3645 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.493571] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.493573] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.493576] Call Trace: [ 92.493578] [ 92.493580] dump_stack_lvl+0x4f/0x70 [ 92.493587] print_address_description.constprop.0+0x2c/0x3b0 [ 92.493593] print_report+0xb9/0x280 [ 92.493597] ? kasan_addr_to_slab+0x9/0x90 [ 92.493601] ? kmem_cache_invalid_free+0x1c3/0x470 [kasan_test] [ 92.493611] kasan_report_invalid_free+0xba/0xe0 [ 92.493615] ? kmem_cache_invalid_free+0x1c3/0x470 [kasan_test] [ 92.493625] ? kmem_cache_invalid_free+0x1c3/0x470 [kasan_test] [ 92.493634] check_slab_allocation+0x116/0x120 [ 92.493638] kmem_cache_free+0x155/0x530 [ 92.493641] ? kmem_cache_invalid_free+0x1c3/0x470 [kasan_test] [ 92.493651] kmem_cache_invalid_free+0x1c3/0x470 [kasan_test] [ 92.493662] ? __pfx_kmem_cache_invalid_free+0x10/0x10 [kasan_test] [ 92.493671] ? finish_task_switch.isra.0+0x155/0x750 [ 92.493676] ? __switch_to+0x526/0x1000 [ 92.493680] ? __pfx_read_tsc+0x10/0x10 [ 92.493684] ? ktime_get_ts64+0x7f/0x220 [ 92.493688] kunit_try_run_case+0x175/0x440 [ 92.493692] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.493696] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.493701] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.493703] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.493708] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.493711] kthread+0x3b4/0x780 [ 92.493716] ? __pfx_kthread+0x10/0x10 [ 92.493719] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.493723] ? __pfx_kthread+0x10/0x10 [ 92.493726] ? __pfx_kthread+0x10/0x10 [ 92.493730] ret_from_fork+0x22c/0x300 [ 92.493734] ? __pfx_kthread+0x10/0x10 [ 92.493737] ret_from_fork_asm+0x1a/0x30 [ 92.493743] [ 92.497480] Allocated by task 3645: [ 92.497562] kasan_save_stack+0x1c/0x40 [ 92.497651] kasan_save_track+0x10/0x30 [ 92.497739] __kasan_slab_alloc+0x85/0x90 [ 92.497829] kmem_cache_alloc_noprof+0x130/0x420 [ 92.497928] kmem_cache_invalid_free+0x142/0x470 [kasan_test] [ 92.498055] kunit_try_run_case+0x175/0x440 [ 92.498148] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.498260] kthread+0x3b4/0x780 [ 92.498339] ret_from_fork+0x22c/0x300 [ 92.498440] ret_from_fork_asm+0x1a/0x30 [ 92.498593] The buggy address belongs to the object at ffff8881e5396840 which belongs to the cache test_cache of size 200 [ 92.498822] The buggy address is located 1 bytes inside of 200-byte region [ffff8881e5396840, ffff8881e5396908) [ 92.499089] The buggy address belongs to the physical page: [ 92.499203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1e5396 [ 92.499360] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.499529] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.499669] page_type: f5(slab) [ 92.499750] raw: 0017ffffc0000040 ffff88840bea1680 dead000000000122 0000000000000000 [ 92.499898] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 92.500045] head: 0017ffffc0000040 ffff88840bea1680 dead000000000122 0000000000000000 [ 92.500194] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 92.500342] head: 0017ffffc0000001 ffffea000794e581 00000000ffffffff 00000000ffffffff [ 92.500513] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 92.500665] page dumped because: kasan: bad access detected [ 92.500829] Memory state around the buggy address: [ 92.500930] ffff8881e5396700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.501069] ffff8881e5396780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.501207] >ffff8881e5396800: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 92.501349] ^ [ 92.501482] ffff8881e5396880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 92.501620] ffff8881e5396900: 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.501758] ================================================================== [ 92.544847] ok 38 kmem_cache_invalid_free [ 92.556450] ================================================================== [ 92.556749] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x3b5/0x4d0 [kasan_test] [ 92.556929] Read of size 1 at addr ffff88811136e000 by task kunit_try_catch/3647 [ 92.557173] CPU: 1 UID: 0 PID: 3647 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.557181] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.557183] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.557186] Call Trace: [ 92.557188] [ 92.557190] dump_stack_lvl+0x4f/0x70 [ 92.557196] print_address_description.constprop.0+0x2c/0x3b0 [ 92.557202] ? kmem_cache_rcu_uaf+0x3b5/0x4d0 [kasan_test] [ 92.557212] print_report+0xb9/0x280 [ 92.557216] ? kmem_cache_rcu_uaf+0x3b5/0x4d0 [kasan_test] [ 92.557225] ? kasan_addr_to_slab+0x9/0x90 [ 92.557228] ? kmem_cache_rcu_uaf+0x3b5/0x4d0 [kasan_test] [ 92.557237] kasan_report+0xda/0x110 [ 92.557241] ? kmem_cache_rcu_uaf+0x3b5/0x4d0 [kasan_test] [ 92.557251] kmem_cache_rcu_uaf+0x3b5/0x4d0 [kasan_test] [ 92.557261] ? __pfx_kmem_cache_rcu_uaf+0x10/0x10 [kasan_test] [ 92.557270] ? finish_task_switch.isra.0+0x155/0x750 [ 92.557274] ? __switch_to+0x526/0x1000 [ 92.557279] ? __pfx_read_tsc+0x10/0x10 [ 92.557282] ? ktime_get_ts64+0x7f/0x220 [ 92.557286] kunit_try_run_case+0x175/0x440 [ 92.557291] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.557294] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.557299] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.557302] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.557306] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.557310] kthread+0x3b4/0x780 [ 92.557314] ? __pfx_kthread+0x10/0x10 [ 92.557318] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.557321] ? __pfx_kthread+0x10/0x10 [ 92.557325] ? __pfx_kthread+0x10/0x10 [ 92.557328] ret_from_fork+0x22c/0x300 [ 92.557332] ? __pfx_kthread+0x10/0x10 [ 92.557336] ret_from_fork_asm+0x1a/0x30 [ 92.557341] [ 92.560833] Allocated by task 3647: [ 92.560915] kasan_save_stack+0x1c/0x40 [ 92.561003] kasan_save_track+0x10/0x30 [ 92.561090] __kasan_slab_alloc+0x85/0x90 [ 92.561179] kmem_cache_alloc_noprof+0x130/0x420 [ 92.561278] kmem_cache_rcu_uaf+0x141/0x4d0 [kasan_test] [ 92.561403] kunit_try_run_case+0x175/0x440 [ 92.561508] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.561619] kthread+0x3b4/0x780 [ 92.561698] ret_from_fork+0x22c/0x300 [ 92.561784] ret_from_fork_asm+0x1a/0x30 [ 92.561923] Freed by task 0: [ 92.561996] kasan_save_stack+0x1c/0x40 [ 92.562084] kasan_save_track+0x10/0x30 [ 92.562173] kasan_save_free_info+0x37/0x60 [ 92.562264] __kasan_slab_free+0x4d/0x70 [ 92.562353] slab_free_after_rcu_debug+0xe7/0x310 [ 92.562474] rcu_do_batch+0x38d/0xdf0 [ 92.562560] rcu_core+0x393/0xab0 [ 92.562640] handle_softirqs+0x198/0x5e0 [ 92.562730] __irq_exit_rcu+0x158/0x1a0 [ 92.562816] sysvec_apic_timer_interrupt+0x6e/0x90 [ 92.562919] asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 92.563077] Last potentially related work creation: [ 92.563178] kasan_save_stack+0x1c/0x40 [ 92.563265] kasan_record_aux_stack+0xa3/0xb0 [ 92.563360] kmem_cache_free+0x199/0x530 [ 92.563468] kmem_cache_rcu_uaf+0x17f/0x4d0 [kasan_test] [ 92.563584] kunit_try_run_case+0x175/0x440 [ 92.563676] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.563789] kthread+0x3b4/0x780 [ 92.563867] ret_from_fork+0x22c/0x300 [ 92.563954] ret_from_fork_asm+0x1a/0x30 [ 92.564094] The buggy address belongs to the object at ffff88811136e000 which belongs to the cache test_cache of size 200 [ 92.564323] The buggy address is located 0 bytes inside of freed 200-byte region [ffff88811136e000, ffff88811136e0c8) [ 92.564618] The buggy address belongs to the physical page: [ 92.564731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11136e [ 92.564884] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.565029] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.565166] page_type: f5(slab) [ 92.565245] raw: 0017ffffc0000040 ffff88811136c640 dead000000000122 0000000000000000 [ 92.565402] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 92.565563] head: 0017ffffc0000040 ffff88811136c640 dead000000000122 0000000000000000 [ 92.565711] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 92.565859] head: 0017ffffc0000001 ffffea000444db81 00000000ffffffff 00000000ffffffff [ 92.566010] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 92.566157] page dumped because: kasan: bad access detected [ 92.566320] Memory state around the buggy address: [ 92.566431] ffff88811136df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.566579] ffff88811136df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.566716] >ffff88811136e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 92.566854] ^ [ 92.566931] ffff88811136e080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 92.567072] ffff88811136e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.567209] ================================================================== [ 92.602925] ok 39 kmem_cache_rcu_uaf [ 92.612642] ================================================================== [ 92.612896] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1ac/0x360 [kasan_test] [ 92.613072] Read of size 1 at addr ffff88811136d540 by task kunit_try_catch/3650 [ 92.613266] CPU: 6 UID: 0 PID: 3650 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 92.613274] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.613276] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 92.613278] Call Trace: [ 92.613280] [ 92.613282] dump_stack_lvl+0x4f/0x70 [ 92.613289] print_address_description.constprop.0+0x2c/0x3b0 [ 92.613295] ? kmem_cache_double_destroy+0x1ac/0x360 [kasan_test] [ 92.613304] print_report+0xb9/0x280 [ 92.613308] ? kmem_cache_double_destroy+0x1ac/0x360 [kasan_test] [ 92.613317] ? kasan_addr_to_slab+0x9/0x90 [ 92.613320] ? kmem_cache_double_destroy+0x1ac/0x360 [kasan_test] [ 92.613329] kasan_report+0xda/0x110 [ 92.613333] ? kmem_cache_double_destroy+0x1ac/0x360 [kasan_test] [ 92.613342] ? kmem_cache_double_destroy+0x1ac/0x360 [kasan_test] [ 92.613351] __kasan_check_byte+0x32/0x40 [ 92.613355] kmem_cache_destroy+0x1d/0x170 [ 92.613359] kmem_cache_double_destroy+0x1ac/0x360 [kasan_test] [ 92.613369] ? __pfx_kmem_cache_double_destroy+0x10/0x10 [kasan_test] [ 92.613378] ? __switch_to+0x526/0x1000 [ 92.613383] ? __pfx_read_tsc+0x10/0x10 [ 92.613386] ? ktime_get_ts64+0x7f/0x220 [ 92.613390] ? __pfx___schedule+0x10/0x10 [ 92.613403] kunit_try_run_case+0x175/0x440 [ 92.613408] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.613411] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 92.613416] ? __pfx_kunit_try_run_case+0x10/0x10 [ 92.613419] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 92.613423] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.613427] kthread+0x3b4/0x780 [ 92.613432] ? __pfx_kthread+0x10/0x10 [ 92.613435] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 92.613439] ? __pfx_kthread+0x10/0x10 [ 92.613443] ? __pfx_kthread+0x10/0x10 [ 92.613446] ret_from_fork+0x22c/0x300 [ 92.613450] ? __pfx_kthread+0x10/0x10 [ 92.613454] ret_from_fork_asm+0x1a/0x30 [ 92.613459] [ 92.617274] Allocated by task 3650: [ 92.617355] kasan_save_stack+0x1c/0x40 [ 92.617455] kasan_save_track+0x10/0x30 [ 92.617552] __kasan_slab_alloc+0x85/0x90 [ 92.617645] kmem_cache_alloc_noprof+0x130/0x420 [ 92.617744] __kmem_cache_create_args+0x130/0x2c0 [ 92.617845] kmem_cache_double_destroy+0xc2/0x360 [kasan_test] [ 92.617969] kunit_try_run_case+0x175/0x440 [ 92.618061] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.618172] kthread+0x3b4/0x780 [ 92.618250] ret_from_fork+0x22c/0x300 [ 92.618336] ret_from_fork_asm+0x1a/0x30 [ 92.618505] Freed by task 3650: [ 92.618580] kasan_save_stack+0x1c/0x40 [ 92.618667] kasan_save_track+0x10/0x30 [ 92.618754] kasan_save_free_info+0x37/0x60 [ 92.618846] __kasan_slab_free+0x4d/0x70 [ 92.618934] kmem_cache_free+0x2ee/0x530 [ 92.619022] kobject_cleanup+0x105/0x360 [ 92.619112] kmem_cache_double_destroy+0x13b/0x360 [kasan_test] [ 92.619237] kunit_try_run_case+0x175/0x440 [ 92.619329] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 92.619465] kthread+0x3b4/0x780 [ 92.619543] ret_from_fork+0x22c/0x300 [ 92.619629] ret_from_fork_asm+0x1a/0x30 [ 92.619769] The buggy address belongs to the object at ffff88811136d540 which belongs to the cache kmem_cache of size 232 [ 92.619997] The buggy address is located 0 bytes inside of freed 232-byte region [ffff88811136d540, ffff88811136d628) [ 92.620274] The buggy address belongs to the physical page: [ 92.620387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11136c [ 92.620569] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 92.620718] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 92.620856] page_type: f5(slab) [ 92.620934] raw: 0017ffffc0000040 ffff888100042000 dead000000000122 0000000000000000 [ 92.621081] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 92.621228] head: 0017ffffc0000040 ffff888100042000 dead000000000122 0000000000000000 [ 92.621376] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 92.621545] head: 0017ffffc0000001 ffffea000444db01 00000000ffffffff 00000000ffffffff [ 92.621693] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 92.621839] page dumped because: kasan: bad access detected [ 92.622001] Memory state around the buggy address: [ 92.622102] ffff88811136d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.622240] ffff88811136d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.622377] >ffff88811136d500: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 92.622545] ^ [ 92.622653] ffff88811136d580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 92.622790] ffff88811136d600: fb fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc [ 92.622927] ================================================================== [ 92.624945] ok 40 kmem_cache_double_destroy [ 93.167090] ok 41 kmem_cache_accounted [ 93.191490] ok 42 kmem_cache_bulk [ 93.191805] ================================================================== [ 93.192037] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 93.192215] Read of size 1 at addr ffff8881ca495673 by task kunit_try_catch/3659 [ 93.192435] CPU: 6 UID: 0 PID: 3659 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.192447] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.192449] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.192453] Call Trace: [ 93.192455] [ 93.192458] dump_stack_lvl+0x4f/0x70 [ 93.192467] print_address_description.constprop.0+0x2c/0x3b0 [ 93.192475] ? mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 93.192510] print_report+0xb9/0x280 [ 93.192517] ? mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 93.192537] ? kasan_addr_to_slab+0x9/0x90 [ 93.192543] ? mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 93.192562] kasan_report+0xda/0x110 [ 93.192569] ? mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 93.192590] mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 93.192612] ? __pfx_mempool_oob_right_helper+0x10/0x10 [kasan_test] [ 93.192633] ? __update_idle_core+0x51/0x350 [ 93.192641] ? pick_next_task_fair+0x51/0xba0 [ 93.192648] mempool_kmalloc_oob_right+0x92/0xe0 [kasan_test] [ 93.192669] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [kasan_test] [ 93.192689] ? __pfx_mempool_kmalloc+0x10/0x10 [ 93.192696] ? __pfx_mempool_kfree+0x10/0x10 [ 93.192702] ? __pfx_read_tsc+0x10/0x10 [ 93.192708] ? ktime_get_ts64+0x7f/0x220 [ 93.192715] ? __pfx___schedule+0x10/0x10 [ 93.192723] kunit_try_run_case+0x175/0x440 [ 93.192730] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.192736] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.192745] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.192750] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.192758] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.192765] kthread+0x3b4/0x780 [ 93.192773] ? __pfx_kthread+0x10/0x10 [ 93.192779] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.192785] ? __pfx_kthread+0x10/0x10 [ 93.192792] ? __pfx_kthread+0x10/0x10 [ 93.192799] ret_from_fork+0x22c/0x300 [ 93.192806] ? __pfx_kthread+0x10/0x10 [ 93.192812] ret_from_fork_asm+0x1a/0x30 [ 93.192822] [ 93.196882] Allocated by task 3659: [ 93.196965] kasan_save_stack+0x1c/0x40 [ 93.197054] kasan_save_track+0x10/0x30 [ 93.197142] remove_element+0x114/0x180 [ 93.197235] mempool_alloc_preallocated+0x44/0x80 [ 93.197337] mempool_oob_right_helper+0x80/0x320 [kasan_test] [ 93.197468] mempool_kmalloc_oob_right+0x92/0xe0 [kasan_test] [ 93.197592] kunit_try_run_case+0x175/0x440 [ 93.197684] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.197799] kthread+0x3b4/0x780 [ 93.197877] ret_from_fork+0x22c/0x300 [ 93.197963] ret_from_fork_asm+0x1a/0x30 [ 93.198104] The buggy address belongs to the object at ffff8881ca495600 which belongs to the cache kmalloc-128 of size 128 [ 93.198333] The buggy address is located 0 bytes to the right of allocated 115-byte region [ffff8881ca495600, ffff8881ca495673) [ 93.198639] The buggy address belongs to the physical page: [ 93.198752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1ca494 [ 93.198905] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 93.199051] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 93.199188] page_type: f5(slab) [ 93.199267] raw: 0017ffffc0000040 ffff888100042a00 dead000000000122 0000000000000000 [ 93.199436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.199595] head: 0017ffffc0000040 ffff888100042a00 dead000000000122 0000000000000000 [ 93.199743] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.199891] head: 0017ffffc0000001 ffffea0007292501 00000000ffffffff 00000000ffffffff [ 93.200038] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 93.200187] page dumped because: kasan: bad access detected [ 93.200350] Memory state around the buggy address: [ 93.200463] ffff8881ca495500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 93.200615] ffff8881ca495580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.200755] >ffff8881ca495600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 93.200895] ^ [ 93.201030] ffff8881ca495680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.201168] ffff8881ca495700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 93.201305] ================================================================== [ 93.202976] ok 43 mempool_kmalloc_oob_right [ 93.203089] ================================================================== [ 93.203331] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 93.203529] Read of size 1 at addr ffff888111c5e001 by task kunit_try_catch/3661 [ 93.203736] CPU: 6 UID: 0 PID: 3661 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.203743] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.203744] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.203747] Call Trace: [ 93.203749] [ 93.203751] dump_stack_lvl+0x4f/0x70 [ 93.203757] print_address_description.constprop.0+0x2c/0x3b0 [ 93.203762] ? mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 93.203771] print_report+0xb9/0x280 [ 93.203775] ? mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 93.203783] ? kasan_addr_to_slab+0x9/0x90 [ 93.203786] ? mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 93.203795] kasan_report+0xda/0x110 [ 93.203798] ? mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 93.203808] mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 93.203817] ? __pfx_mempool_oob_right_helper+0x10/0x10 [kasan_test] [ 93.203826] ? __update_idle_core+0x51/0x350 [ 93.203830] ? pick_next_task_fair+0x51/0xba0 [ 93.203834] mempool_kmalloc_large_oob_right+0x92/0xe0 [kasan_test] [ 93.203843] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [kasan_test] [ 93.203852] ? __pfx_mempool_kmalloc+0x10/0x10 [ 93.203855] ? __pfx_mempool_kfree+0x10/0x10 [ 93.203858] ? __pfx_read_tsc+0x10/0x10 [ 93.203861] ? ktime_get_ts64+0x7f/0x220 [ 93.203865] ? __pfx___schedule+0x10/0x10 [ 93.203869] kunit_try_run_case+0x175/0x440 [ 93.203873] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.203876] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.203880] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.203883] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.203887] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.203890] kthread+0x3b4/0x780 [ 93.203894] ? __pfx_kthread+0x10/0x10 [ 93.203897] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.203901] ? __pfx_kthread+0x10/0x10 [ 93.203904] ? __pfx_kthread+0x10/0x10 [ 93.203908] ret_from_fork+0x22c/0x300 [ 93.203911] ? __pfx_kthread+0x10/0x10 [ 93.203915] ret_from_fork_asm+0x1a/0x30 [ 93.203920] [ 93.208006] The buggy address belongs to the physical page: [ 93.208119] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x111c5c [ 93.208273] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 93.208429] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 93.208586] page_type: f8(unknown) [ 93.208667] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 93.208817] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 93.208968] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 93.209116] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 93.209264] head: 0017ffffc0000002 ffffea0004471701 00000000ffffffff 00000000ffffffff [ 93.209423] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 93.209580] page dumped because: kasan: bad access detected [ 93.209743] Memory state around the buggy address: [ 93.209844] ffff888111c5df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 93.209982] ffff888111c5df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 93.210120] >ffff888111c5e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 93.210259] ^ [ 93.210338] ffff888111c5e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 93.210497] ffff888111c5e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 93.210637] ================================================================== [ 93.212279] ok 44 mempool_kmalloc_large_oob_right [ 93.212576] ================================================================== [ 93.212826] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 93.212997] Read of size 1 at addr ffff8884080c2c7b by task kunit_try_catch/3663 [ 93.213191] CPU: 6 UID: 0 PID: 3663 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.213198] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.213200] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.213202] Call Trace: [ 93.213204] [ 93.213205] dump_stack_lvl+0x4f/0x70 [ 93.213211] print_address_description.constprop.0+0x2c/0x3b0 [ 93.213217] ? mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 93.213226] print_report+0xb9/0x280 [ 93.213230] ? mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 93.213239] ? kasan_addr_to_slab+0x9/0x90 [ 93.213242] ? mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 93.213251] kasan_report+0xda/0x110 [ 93.213255] ? mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 93.213264] mempool_oob_right_helper+0x2de/0x320 [kasan_test] [ 93.213274] ? __pfx_mempool_oob_right_helper+0x10/0x10 [kasan_test] [ 93.213283] ? __update_idle_core+0x51/0x350 [ 93.213287] ? pick_next_task_fair+0x51/0xba0 [ 93.213291] mempool_slab_oob_right+0x8d/0xe0 [kasan_test] [ 93.213301] ? __pfx_mempool_slab_oob_right+0x10/0x10 [kasan_test] [ 93.213310] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 93.213314] ? __pfx_mempool_free_slab+0x10/0x10 [ 93.213317] ? __pfx_read_tsc+0x10/0x10 [ 93.213320] ? ktime_get_ts64+0x7f/0x220 [ 93.213324] ? __pfx___schedule+0x10/0x10 [ 93.213327] kunit_try_run_case+0x175/0x440 [ 93.213331] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.213334] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.213339] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.213341] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.213346] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.213349] kthread+0x3b4/0x780 [ 93.213354] ? __pfx_kthread+0x10/0x10 [ 93.213357] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.213361] ? __pfx_kthread+0x10/0x10 [ 93.213364] ? __pfx_kthread+0x10/0x10 [ 93.213368] ret_from_fork+0x22c/0x300 [ 93.213371] ? __pfx_kthread+0x10/0x10 [ 93.213375] ret_from_fork_asm+0x1a/0x30 [ 93.213380] [ 93.217433] Allocated by task 3663: [ 93.217524] kasan_save_stack+0x1c/0x40 [ 93.217612] kasan_save_track+0x10/0x30 [ 93.217699] __kasan_mempool_unpoison_object+0x1ad/0x1f0 [ 93.217809] remove_element+0x114/0x180 [ 93.217898] mempool_alloc_preallocated+0x44/0x80 [ 93.217998] mempool_oob_right_helper+0x80/0x320 [kasan_test] [ 93.218121] mempool_slab_oob_right+0x8d/0xe0 [kasan_test] [ 93.218239] kunit_try_run_case+0x175/0x440 [ 93.218332] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.218468] kthread+0x3b4/0x780 [ 93.218548] ret_from_fork+0x22c/0x300 [ 93.218635] ret_from_fork_asm+0x1a/0x30 [ 93.218773] The buggy address belongs to the object at ffff8884080c2c00 which belongs to the cache test_cache of size 123 [ 93.219003] The buggy address is located 0 bytes to the right of allocated 123-byte region [ffff8884080c2c00, ffff8884080c2c7b) [ 93.219290] The buggy address belongs to the physical page: [ 93.219413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x4080c2 [ 93.219577] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.219709] page_type: f5(slab) [ 93.219786] raw: 0017ffffc0000000 ffff888102d22dc0 dead000000000122 0000000000000000 [ 93.219933] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 93.220079] page dumped because: kasan: bad access detected [ 93.220243] Memory state around the buggy address: [ 93.220344] ffff8884080c2b00: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 93.220513] ffff8884080c2b80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.220654] >ffff8884080c2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 [ 93.220795] ^ [ 93.220932] ffff8884080c2c80: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 93.221073] ffff8884080c2d00: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.221210] ================================================================== [ 93.246827] ok 45 mempool_slab_oob_right [ 93.247072] ================================================================== [ 93.247333] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 93.247547] Read of size 1 at addr ffff88840fb53300 by task kunit_try_catch/3665 [ 93.247768] CPU: 1 UID: 0 PID: 3665 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.247776] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.247778] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.247781] Call Trace: [ 93.247783] [ 93.247785] dump_stack_lvl+0x4f/0x70 [ 93.247792] print_address_description.constprop.0+0x2c/0x3b0 [ 93.247798] ? mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 93.247807] print_report+0xb9/0x280 [ 93.247811] ? mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 93.247819] ? kasan_addr_to_slab+0x9/0x90 [ 93.247823] ? mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 93.247832] kasan_report+0xda/0x110 [ 93.247835] ? mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 93.247845] mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 93.247854] ? __pfx_mempool_uaf_helper+0x10/0x10 [kasan_test] [ 93.247863] ? __update_idle_core+0x51/0x350 [ 93.247868] ? pick_next_task_fair+0x51/0xba0 [ 93.247872] mempool_kmalloc_uaf+0x8f/0xe0 [kasan_test] [ 93.247881] ? __pfx_mempool_kmalloc_uaf+0x10/0x10 [kasan_test] [ 93.247890] ? __pfx_mempool_kmalloc+0x10/0x10 [ 93.247893] ? __pfx_mempool_kfree+0x10/0x10 [ 93.247896] ? __pfx_read_tsc+0x10/0x10 [ 93.247900] ? ktime_get_ts64+0x7f/0x220 [ 93.247904] ? __pfx___schedule+0x10/0x10 [ 93.247908] kunit_try_run_case+0x175/0x440 [ 93.247912] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.247916] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.247920] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.247923] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.247927] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.247931] kthread+0x3b4/0x780 [ 93.247935] ? __pfx_kthread+0x10/0x10 [ 93.247939] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.247942] ? __pfx_kthread+0x10/0x10 [ 93.247946] ? __pfx_kthread+0x10/0x10 [ 93.247949] ret_from_fork+0x22c/0x300 [ 93.247953] ? __pfx_kthread+0x10/0x10 [ 93.247957] ret_from_fork_asm+0x1a/0x30 [ 93.247962] [ 93.251950] Allocated by task 3665: [ 93.252034] kasan_save_stack+0x1c/0x40 [ 93.252123] kasan_save_track+0x10/0x30 [ 93.252211] remove_element+0x114/0x180 [ 93.252299] mempool_alloc_preallocated+0x44/0x80 [ 93.252402] mempool_uaf_helper+0x87/0x3e0 [kasan_test] [ 93.252541] mempool_kmalloc_uaf+0x8f/0xe0 [kasan_test] [ 93.252657] kunit_try_run_case+0x175/0x440 [ 93.252750] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.252862] kthread+0x3b4/0x780 [ 93.252940] ret_from_fork+0x22c/0x300 [ 93.253029] ret_from_fork_asm+0x1a/0x30 [ 93.253169] Freed by task 3665: [ 93.253245] kasan_save_stack+0x1c/0x40 [ 93.253335] kasan_save_track+0x10/0x30 [ 93.253429] kasan_save_free_info+0x37/0x60 [ 93.253524] __kasan_mempool_poison_object+0xe1/0x1b0 [ 93.253633] mempool_free+0x246/0x340 [ 93.253719] mempool_uaf_helper+0x103/0x3e0 [kasan_test] [ 93.253834] mempool_kmalloc_uaf+0x8f/0xe0 [kasan_test] [ 93.253949] kunit_try_run_case+0x175/0x440 [ 93.254041] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.254153] kthread+0x3b4/0x780 [ 93.254234] ret_from_fork+0x22c/0x300 [ 93.254320] ret_from_fork_asm+0x1a/0x30 [ 93.254463] The buggy address belongs to the object at ffff88840fb53300 which belongs to the cache kmalloc-128 of size 128 [ 93.254694] The buggy address is located 0 bytes inside of freed 128-byte region [ffff88840fb53300, ffff88840fb53380) [ 93.254969] The buggy address belongs to the physical page: [ 93.255082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x40fb52 [ 93.255237] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 93.255384] ksm flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 93.255536] page_type: f5(slab) [ 93.255634] raw: 0017ffffc0000040 ffff888100042a00 ffffea00040b4180 0000000000000003 [ 93.255782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.255930] head: 0017ffffc0000040 ffff888100042a00 ffffea00040b4180 0000000000000003 [ 93.256079] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.256227] head: 0017ffffc0000001 ffffea00103ed481 00000000ffffffff 00000000ffffffff [ 93.256375] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 93.256546] page dumped because: kasan: bad access detected [ 93.256710] Memory state around the buggy address: [ 93.256812] ffff88840fb53200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 93.256951] ffff88840fb53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.257091] >ffff88840fb53300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 93.257229] ^ [ 93.257306] ffff88840fb53380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.257468] ffff88840fb53400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 93.257607] ================================================================== [ 93.258010] ok 46 mempool_kmalloc_uaf [ 93.258176] ================================================================== [ 93.258450] BUG: KASAN: use-after-free in mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 93.258642] Read of size 1 at addr ffff88840f064000 by task kunit_try_catch/3667 [ 93.258882] CPU: 1 UID: 0 PID: 3667 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.258894] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.258897] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.258901] Call Trace: [ 93.258904] [ 93.258908] dump_stack_lvl+0x4f/0x70 [ 93.258916] print_address_description.constprop.0+0x2c/0x3b0 [ 93.258924] ? mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 93.258945] print_report+0xb9/0x280 [ 93.258952] ? mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 93.258971] ? kasan_addr_to_slab+0x9/0x90 [ 93.258977] ? mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 93.258995] kasan_report+0xda/0x110 [ 93.259002] ? mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 93.259023] mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 93.259043] ? __pfx_mempool_uaf_helper+0x10/0x10 [kasan_test] [ 93.259063] ? __update_idle_core+0x51/0x350 [ 93.259070] ? pick_next_task_fair+0x51/0xba0 [ 93.259078] mempool_kmalloc_large_uaf+0x8f/0xe0 [kasan_test] [ 93.259097] ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10 [kasan_test] [ 93.259117] ? __pfx_mempool_kmalloc+0x10/0x10 [ 93.259123] ? __pfx_mempool_kfree+0x10/0x10 [ 93.259129] ? __pfx_read_tsc+0x10/0x10 [ 93.259134] ? ktime_get_ts64+0x7f/0x220 [ 93.259141] ? __pfx___schedule+0x10/0x10 [ 93.259148] kunit_try_run_case+0x175/0x440 [ 93.259155] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.259161] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.259170] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.259176] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.259182] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.259190] kthread+0x3b4/0x780 [ 93.259196] ? __pfx_kthread+0x10/0x10 [ 93.259202] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.259209] ? __pfx_kthread+0x10/0x10 [ 93.259215] ? __pfx_kthread+0x10/0x10 [ 93.259222] ret_from_fork+0x22c/0x300 [ 93.259229] ? __pfx_kthread+0x10/0x10 [ 93.259235] ret_from_fork_asm+0x1a/0x30 [ 93.259244] [ 93.263721] The buggy address belongs to the physical page: [ 93.263835] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x40f064 [ 93.263988] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 93.264135] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 93.264273] page_type: f8(unknown) [ 93.264356] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 93.264528] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 93.264675] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 93.264824] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 93.264973] head: 0017ffffc0000002 ffffea00103c1901 00000000ffffffff 00000000ffffffff [ 93.265121] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 93.265270] page dumped because: kasan: bad access detected [ 93.265447] Memory state around the buggy address: [ 93.265560] ffff88840f063f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 93.265699] ffff88840f063f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 93.265837] >ffff88840f064000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 93.265979] ^ [ 93.266058] ffff88840f064080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 93.266197] ffff88840f064100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 93.266336] ================================================================== [ 93.266729] ok 47 mempool_kmalloc_large_uaf [ 93.267168] ================================================================== [ 93.267409] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 93.267602] Read of size 1 at addr ffff888406766900 by task kunit_try_catch/3669 [ 93.267797] CPU: 6 UID: 0 PID: 3669 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.267804] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.267806] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.267809] Call Trace: [ 93.267810] [ 93.267812] dump_stack_lvl+0x4f/0x70 [ 93.267818] print_address_description.constprop.0+0x2c/0x3b0 [ 93.267823] ? mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 93.267832] print_report+0xb9/0x280 [ 93.267836] ? mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 93.267844] ? kasan_addr_to_slab+0x9/0x90 [ 93.267848] ? mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 93.267856] kasan_report+0xda/0x110 [ 93.267860] ? mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 93.267870] mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 93.267879] ? __pfx_mempool_uaf_helper+0x10/0x10 [kasan_test] [ 93.267888] ? __update_idle_core+0x51/0x350 [ 93.267892] ? pick_next_task_fair+0x51/0xba0 [ 93.267897] mempool_slab_uaf+0x8a/0xe0 [kasan_test] [ 93.267906] ? __pfx_mempool_slab_uaf+0x10/0x10 [kasan_test] [ 93.267916] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 93.267919] ? __pfx_mempool_free_slab+0x10/0x10 [ 93.267922] ? __pfx_read_tsc+0x10/0x10 [ 93.267925] ? ktime_get_ts64+0x7f/0x220 [ 93.267929] ? __pfx___schedule+0x10/0x10 [ 93.267933] kunit_try_run_case+0x175/0x440 [ 93.267937] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.267940] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.267944] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.267947] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.267951] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.267955] kthread+0x3b4/0x780 [ 93.267959] ? __pfx_kthread+0x10/0x10 [ 93.267962] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.267966] ? __pfx_kthread+0x10/0x10 [ 93.267969] ? __pfx_kthread+0x10/0x10 [ 93.267973] ret_from_fork+0x22c/0x300 [ 93.267977] ? __pfx_kthread+0x10/0x10 [ 93.267980] ret_from_fork_asm+0x1a/0x30 [ 93.267985] [ 93.271930] Allocated by task 3669: [ 93.272012] kasan_save_stack+0x1c/0x40 [ 93.272101] kasan_save_track+0x10/0x30 [ 93.272188] __kasan_mempool_unpoison_object+0x1ad/0x1f0 [ 93.272300] remove_element+0x114/0x180 [ 93.272388] mempool_alloc_preallocated+0x44/0x80 [ 93.272527] mempool_uaf_helper+0x87/0x3e0 [kasan_test] [ 93.272640] mempool_slab_uaf+0x8a/0xe0 [kasan_test] [ 93.272751] kunit_try_run_case+0x175/0x440 [ 93.272846] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.272957] kthread+0x3b4/0x780 [ 93.273035] ret_from_fork+0x22c/0x300 [ 93.273122] ret_from_fork_asm+0x1a/0x30 [ 93.273261] Freed by task 3669: [ 93.273336] kasan_save_stack+0x1c/0x40 [ 93.273434] kasan_save_track+0x10/0x30 [ 93.273531] kasan_save_free_info+0x37/0x60 [ 93.273624] __kasan_mempool_poison_object+0xe1/0x1b0 [ 93.273730] mempool_free+0x246/0x340 [ 93.273814] mempool_uaf_helper+0x103/0x3e0 [kasan_test] [ 93.273933] mempool_slab_uaf+0x8a/0xe0 [kasan_test] [ 93.274043] kunit_try_run_case+0x175/0x440 [ 93.274135] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.274249] kthread+0x3b4/0x780 [ 93.274328] ret_from_fork+0x22c/0x300 [ 93.274424] ret_from_fork_asm+0x1a/0x30 [ 93.274574] The buggy address belongs to the object at ffff888406766900 which belongs to the cache test_cache of size 123 [ 93.274804] The buggy address is located 0 bytes inside of freed 123-byte region [ffff888406766900, ffff88840676697b) [ 93.275085] The buggy address belongs to the physical page: [ 93.275197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x406766 [ 93.275349] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.275517] page_type: f5(slab) [ 93.275595] raw: 0017ffffc0000000 ffff888102d22f00 dead000000000122 0000000000000000 [ 93.275742] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 93.275888] page dumped because: kasan: bad access detected [ 93.276051] Memory state around the buggy address: [ 93.276151] ffff888406766800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.276290] ffff888406766880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.276447] >ffff888406766900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 93.276604] ^ [ 93.276682] ffff888406766980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.276819] ffff888406766a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.276959] ================================================================== [ 93.302533] ok 48 mempool_slab_uaf [ 93.302720] ================================================================== [ 93.302971] BUG: KASAN: use-after-free in mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 93.303131] Read of size 1 at addr ffff88812bb54000 by task kunit_try_catch/3671 [ 93.303328] CPU: 6 UID: 0 PID: 3671 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.303336] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.303337] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.303340] Call Trace: [ 93.303342] [ 93.303344] dump_stack_lvl+0x4f/0x70 [ 93.303350] print_address_description.constprop.0+0x2c/0x3b0 [ 93.303356] ? mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 93.303365] print_report+0xb9/0x280 [ 93.303369] ? mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 93.303377] ? kasan_addr_to_slab+0x9/0x90 [ 93.303381] ? mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 93.303389] kasan_report+0xda/0x110 [ 93.303393] ? mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 93.303411] mempool_uaf_helper+0x371/0x3e0 [kasan_test] [ 93.303421] ? __pfx_mempool_uaf_helper+0x10/0x10 [kasan_test] [ 93.303444] ? __update_idle_core+0x51/0x350 [ 93.303451] ? pick_next_task_fair+0x51/0xba0 [ 93.303458] mempool_page_alloc_uaf+0x8d/0xe0 [kasan_test] [ 93.303473] ? __pfx_mempool_page_alloc_uaf+0x10/0x10 [kasan_test] [ 93.303505] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 93.303511] ? __pfx_mempool_free_pages+0x10/0x10 [ 93.303518] ? __pfx_read_tsc+0x10/0x10 [ 93.303524] ? ktime_get_ts64+0x7f/0x220 [ 93.303531] ? __pfx___schedule+0x10/0x10 [ 93.303538] kunit_try_run_case+0x175/0x440 [ 93.303546] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.303552] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.303560] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.303566] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.303573] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.303580] kthread+0x3b4/0x780 [ 93.303588] ? __pfx_kthread+0x10/0x10 [ 93.303594] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.303601] ? __pfx_kthread+0x10/0x10 [ 93.303608] ? __pfx_kthread+0x10/0x10 [ 93.303615] ret_from_fork+0x22c/0x300 [ 93.303622] ? __pfx_kthread+0x10/0x10 [ 93.303629] ret_from_fork_asm+0x1a/0x30 [ 93.303639] [ 93.307695] The buggy address belongs to the physical page: [ 93.307809] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x12bb54 [ 93.307972] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.308106] raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 93.308253] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 93.308408] page dumped because: kasan: bad access detected [ 93.308602] Memory state around the buggy address: [ 93.308703] ffff88812bb53f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 93.308841] ffff88812bb53f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 93.308978] >ffff88812bb54000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 93.309116] ^ [ 93.309194] ffff88812bb54080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 93.309332] ffff88812bb54100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 93.309489] ================================================================== [ 93.310768] ok 49 mempool_page_alloc_uaf [ 93.311024] ================================================================== [ 93.311269] BUG: KASAN: double-free in mempool_double_free_helper+0x16b/0x320 [kasan_test] [ 93.311441] Free of addr ffff88840b1c9d00 by task kunit_try_catch/3673 [ 93.311648] CPU: 5 UID: 0 PID: 3673 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.311655] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.311657] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.311660] Call Trace: [ 93.311661] [ 93.311663] dump_stack_lvl+0x4f/0x70 [ 93.311669] print_address_description.constprop.0+0x2c/0x3b0 [ 93.311674] print_report+0xb9/0x280 [ 93.311678] ? kasan_addr_to_slab+0x9/0x90 [ 93.311682] ? mempool_double_free_helper+0x16b/0x320 [kasan_test] [ 93.311691] kasan_report_invalid_free+0xba/0xe0 [ 93.311695] ? mempool_double_free_helper+0x16b/0x320 [kasan_test] [ 93.311705] ? mempool_double_free_helper+0x16b/0x320 [kasan_test] [ 93.311714] ? mempool_double_free_helper+0x16b/0x320 [kasan_test] [ 93.311723] check_slab_allocation+0xfa/0x120 [ 93.311726] __kasan_mempool_poison_object+0x85/0x1b0 [ 93.311730] mempool_free+0x246/0x340 [ 93.311734] mempool_double_free_helper+0x16b/0x320 [kasan_test] [ 93.311744] ? __pfx_mempool_double_free_helper+0x10/0x10 [kasan_test] [ 93.311753] ? __update_idle_core+0x51/0x350 [ 93.311757] ? pick_next_task_fair+0x51/0xba0 [ 93.311761] mempool_kmalloc_double_free+0x8d/0xe0 [kasan_test] [ 93.311770] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [kasan_test] [ 93.311780] ? __pfx_mempool_kmalloc+0x10/0x10 [ 93.311782] ? __pfx_mempool_kfree+0x10/0x10 [ 93.311785] ? __pfx_read_tsc+0x10/0x10 [ 93.311788] ? ktime_get_ts64+0x7f/0x220 [ 93.311792] ? __pfx___schedule+0x10/0x10 [ 93.311796] kunit_try_run_case+0x175/0x440 [ 93.311800] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.311803] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.311807] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.311810] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.311814] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.311818] kthread+0x3b4/0x780 [ 93.311822] ? __pfx_kthread+0x10/0x10 [ 93.311825] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.311829] ? __pfx_kthread+0x10/0x10 [ 93.311833] ? __pfx_kthread+0x10/0x10 [ 93.311836] ret_from_fork+0x22c/0x300 [ 93.311840] ? __pfx_kthread+0x10/0x10 [ 93.311843] ret_from_fork_asm+0x1a/0x30 [ 93.311848] [ 93.316222] Allocated by task 3673: [ 93.316304] kasan_save_stack+0x1c/0x40 [ 93.316396] kasan_save_track+0x10/0x30 [ 93.316505] remove_element+0x114/0x180 [ 93.316594] mempool_alloc_preallocated+0x44/0x80 [ 93.316695] mempool_double_free_helper+0x7b/0x320 [kasan_test] [ 93.316822] mempool_kmalloc_double_free+0x8d/0xe0 [kasan_test] [ 93.316947] kunit_try_run_case+0x175/0x440 [ 93.317041] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.317153] kthread+0x3b4/0x780 [ 93.317234] ret_from_fork+0x22c/0x300 [ 93.317322] ret_from_fork_asm+0x1a/0x30 [ 93.317470] Freed by task 3673: [ 93.317547] kasan_save_stack+0x1c/0x40 [ 93.317636] kasan_save_track+0x10/0x30 [ 93.317723] kasan_save_free_info+0x37/0x60 [ 93.317817] __kasan_mempool_poison_object+0xe1/0x1b0 [ 93.317924] mempool_free+0x246/0x340 [ 93.318010] mempool_double_free_helper+0xf7/0x320 [kasan_test] [ 93.318138] mempool_kmalloc_double_free+0x8d/0xe0 [kasan_test] [ 93.318266] kunit_try_run_case+0x175/0x440 [ 93.318359] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.318473] kthread+0x3b4/0x780 [ 93.318553] ret_from_fork+0x22c/0x300 [ 93.318641] ret_from_fork_asm+0x1a/0x30 [ 93.318784] The buggy address belongs to the object at ffff88840b1c9d00 which belongs to the cache kmalloc-128 of size 128 [ 93.319018] The buggy address is located 0 bytes inside of 128-byte region [ffff88840b1c9d00, ffff88840b1c9d80) [ 93.319286] The buggy address belongs to the physical page: [ 93.319399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x40b1c8 [ 93.319555] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 93.319701] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 93.319842] page_type: f5(slab) [ 93.319922] raw: 0017ffffc0000040 ffff888100042a00 dead000000000122 0000000000000000 [ 93.320069] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.320223] head: 0017ffffc0000040 ffff888100042a00 dead000000000122 0000000000000000 [ 93.320372] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.320544] head: 0017ffffc0000001 ffffea00102c7201 00000000ffffffff 00000000ffffffff [ 93.320697] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 93.320845] page dumped because: kasan: bad access detected [ 93.321010] Memory state around the buggy address: [ 93.321112] ffff88840b1c9c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 93.321252] ffff88840b1c9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.321390] >ffff88840b1c9d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 93.321533] ^ [ 93.321613] ffff88840b1c9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.321752] ffff88840b1c9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.321894] ================================================================== [ 93.322276] ok 50 mempool_kmalloc_double_free [ 93.322448] ================================================================== [ 93.322694] BUG: KASAN: double-free in mempool_double_free_helper+0x16b/0x320 [kasan_test] [ 93.322861] Free of addr ffff888139904000 by task kunit_try_catch/3675 [ 93.323046] CPU: 5 UID: 0 PID: 3675 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.323053] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.323055] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.323057] Call Trace: [ 93.323059] [ 93.323061] dump_stack_lvl+0x4f/0x70 [ 93.323066] print_address_description.constprop.0+0x2c/0x3b0 [ 93.323071] print_report+0xb9/0x280 [ 93.323075] ? kasan_addr_to_slab+0x9/0x90 [ 93.323078] ? mempool_double_free_helper+0x16b/0x320 [kasan_test] [ 93.323088] kasan_report_invalid_free+0xba/0xe0 [ 93.323092] ? mempool_double_free_helper+0x16b/0x320 [kasan_test] [ 93.323102] ? mempool_double_free_helper+0x16b/0x320 [kasan_test] [ 93.323111] __kasan_mempool_poison_object+0x19f/0x1b0 [ 93.323115] mempool_free+0x246/0x340 [ 93.323119] mempool_double_free_helper+0x16b/0x320 [kasan_test] [ 93.323129] ? __pfx_mempool_double_free_helper+0x10/0x10 [kasan_test] [ 93.323139] ? __update_idle_core+0x51/0x350 [ 93.323143] ? pick_next_task_fair+0x51/0xba0 [ 93.323147] mempool_kmalloc_large_double_free+0x8d/0xe0 [kasan_test] [ 93.323156] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [kasan_test] [ 93.323166] ? __pfx_mempool_kmalloc+0x10/0x10 [ 93.323169] ? __pfx_mempool_kfree+0x10/0x10 [ 93.323172] ? __pfx_read_tsc+0x10/0x10 [ 93.323175] ? ktime_get_ts64+0x7f/0x220 [ 93.323179] ? __pfx___schedule+0x10/0x10 [ 93.323183] kunit_try_run_case+0x175/0x440 [ 93.323187] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.323190] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.323194] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.323197] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.323201] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.323205] kthread+0x3b4/0x780 [ 93.323209] ? __pfx_kthread+0x10/0x10 [ 93.323212] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.323216] ? __pfx_kthread+0x10/0x10 [ 93.323220] ? __pfx_kthread+0x10/0x10 [ 93.323223] ret_from_fork+0x22c/0x300 [ 93.323227] ? __pfx_kthread+0x10/0x10 [ 93.323231] ret_from_fork_asm+0x1a/0x30 [ 93.323236] [ 93.327467] The buggy address belongs to the physical page: [ 93.327583] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x139904 [ 93.327737] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 93.327884] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 93.328021] page_type: f8(unknown) [ 93.328104] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 93.328256] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 93.328403] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 93.328577] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 93.328726] head: 0017ffffc0000002 ffffea0004e64101 00000000ffffffff 00000000ffffffff [ 93.328874] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 93.329022] page dumped because: kasan: bad access detected [ 93.329185] Memory state around the buggy address: [ 93.329291] ffff888139903f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 93.329438] ffff888139903f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 93.329577] >ffff888139904000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 93.329715] ^ [ 93.329792] ffff888139904080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 93.329931] ffff888139904100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 93.330068] ================================================================== [ 93.330410] ok 51 mempool_kmalloc_large_double_free [ 93.330563] ================================================================== [ 93.330824] BUG: KASAN: double-free in mempool_double_free_helper+0x16b/0x320 [kasan_test] [ 93.330988] Free of addr ffff888139904000 by task kunit_try_catch/3677 [ 93.331168] CPU: 5 UID: 0 PID: 3677 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.331175] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.331177] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.331179] Call Trace: [ 93.331180] [ 93.331182] dump_stack_lvl+0x4f/0x70 [ 93.331187] print_address_description.constprop.0+0x2c/0x3b0 [ 93.331192] print_report+0xb9/0x280 [ 93.331196] ? kasan_addr_to_slab+0x9/0x90 [ 93.331199] ? mempool_double_free_helper+0x16b/0x320 [kasan_test] [ 93.331208] kasan_report_invalid_free+0xba/0xe0 [ 93.331212] ? mempool_double_free_helper+0x16b/0x320 [kasan_test] [ 93.331222] ? mempool_double_free_helper+0x16b/0x320 [kasan_test] [ 93.331231] __kasan_mempool_poison_pages+0x108/0x120 [ 93.331235] mempool_free+0x2c9/0x340 [ 93.331238] mempool_double_free_helper+0x16b/0x320 [kasan_test] [ 93.331248] ? __pfx_mempool_double_free_helper+0x10/0x10 [kasan_test] [ 93.331257] ? __update_idle_core+0x51/0x350 [ 93.331261] ? pick_next_task_fair+0x51/0xba0 [ 93.331266] mempool_page_alloc_double_free+0x88/0xe0 [kasan_test] [ 93.331275] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [kasan_test] [ 93.331285] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 93.331288] ? __pfx_mempool_free_pages+0x10/0x10 [ 93.331291] ? __pfx_read_tsc+0x10/0x10 [ 93.331294] ? ktime_get_ts64+0x7f/0x220 [ 93.331297] ? __pfx___schedule+0x10/0x10 [ 93.331301] kunit_try_run_case+0x175/0x440 [ 93.331304] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.331307] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.331311] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.331314] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.331318] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.331322] kthread+0x3b4/0x780 [ 93.331326] ? __pfx_kthread+0x10/0x10 [ 93.331330] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.331333] ? __pfx_kthread+0x10/0x10 [ 93.331337] ? __pfx_kthread+0x10/0x10 [ 93.331340] ret_from_fork+0x22c/0x300 [ 93.331344] ? __pfx_kthread+0x10/0x10 [ 93.331347] ret_from_fork_asm+0x1a/0x30 [ 93.331352] [ 93.335520] The buggy address belongs to the physical page: [ 93.335634] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x139904 [ 93.335787] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.335919] raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 93.336067] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 93.336214] page dumped because: kasan: bad access detected [ 93.336378] Memory state around the buggy address: [ 93.336501] ffff888139903f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 93.336641] ffff888139903f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 93.336779] >ffff888139904000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 93.336918] ^ [ 93.336996] ffff888139904080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 93.337134] ffff888139904100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 93.337272] ================================================================== [ 93.337665] ok 52 mempool_page_alloc_double_free [ 93.337850] ================================================================== [ 93.338109] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x11d/0x2c0 [kasan_test] [ 93.338288] Free of addr ffff8881ce74e101 by task kunit_try_catch/3679 [ 93.338472] CPU: 0 UID: 0 PID: 3679 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.338480] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.338482] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.338484] Call Trace: [ 93.338486] [ 93.338487] dump_stack_lvl+0x4f/0x70 [ 93.338493] print_address_description.constprop.0+0x2c/0x3b0 [ 93.338499] print_report+0xb9/0x280 [ 93.338503] ? kasan_addr_to_slab+0x9/0x90 [ 93.338506] ? mempool_kmalloc_invalid_free_helper+0x11d/0x2c0 [kasan_test] [ 93.338516] kasan_report_invalid_free+0xba/0xe0 [ 93.338520] ? mempool_kmalloc_invalid_free_helper+0x11d/0x2c0 [kasan_test] [ 93.338530] ? mempool_kmalloc_invalid_free_helper+0x11d/0x2c0 [kasan_test] [ 93.338539] ? mempool_kmalloc_invalid_free_helper+0x11d/0x2c0 [kasan_test] [ 93.338548] check_slab_allocation+0x116/0x120 [ 93.338551] __kasan_mempool_poison_object+0x85/0x1b0 [ 93.338555] mempool_free+0x246/0x340 [ 93.338559] mempool_kmalloc_invalid_free_helper+0x11d/0x2c0 [kasan_test] [ 93.338570] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [kasan_test] [ 93.338579] ? __update_idle_core+0x51/0x350 [ 93.338583] ? pick_next_task_fair+0x51/0xba0 [ 93.338588] mempool_kmalloc_invalid_free+0x8d/0xe0 [kasan_test] [ 93.338597] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [kasan_test] [ 93.338606] ? __pfx_mempool_kmalloc+0x10/0x10 [ 93.338609] ? __pfx_mempool_kfree+0x10/0x10 [ 93.338612] ? __pfx_read_tsc+0x10/0x10 [ 93.338615] ? ktime_get_ts64+0x7f/0x220 [ 93.338619] ? __pfx___schedule+0x10/0x10 [ 93.338623] kunit_try_run_case+0x175/0x440 [ 93.338626] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.338630] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.338634] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.338637] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.338641] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.338645] kthread+0x3b4/0x780 [ 93.338649] ? __pfx_kthread+0x10/0x10 [ 93.338652] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.338656] ? __pfx_kthread+0x10/0x10 [ 93.338660] ? __pfx_kthread+0x10/0x10 [ 93.338663] ret_from_fork+0x22c/0x300 [ 93.338667] ? __pfx_kthread+0x10/0x10 [ 93.338671] ret_from_fork_asm+0x1a/0x30 [ 93.338676] [ 93.343116] Allocated by task 3679: [ 93.343198] kasan_save_stack+0x1c/0x40 [ 93.343288] kasan_save_track+0x10/0x30 [ 93.343376] remove_element+0x114/0x180 [ 93.343485] mempool_alloc_preallocated+0x44/0x80 [ 93.343586] mempool_kmalloc_invalid_free_helper+0x7b/0x2c0 [kasan_test] [ 93.343724] mempool_kmalloc_invalid_free+0x8d/0xe0 [kasan_test] [ 93.343852] kunit_try_run_case+0x175/0x440 [ 93.343945] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.344058] kthread+0x3b4/0x780 [ 93.344137] ret_from_fork+0x22c/0x300 [ 93.344225] ret_from_fork_asm+0x1a/0x30 [ 93.344366] The buggy address belongs to the object at ffff8881ce74e100 which belongs to the cache kmalloc-128 of size 128 [ 93.344617] The buggy address is located 1 bytes inside of 128-byte region [ffff8881ce74e100, ffff8881ce74e180) [ 93.344884] The buggy address belongs to the physical page: [ 93.345000] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1ce74e [ 93.345153] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 93.345299] ksm flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 93.345464] page_type: f5(slab) [ 93.345544] raw: 0017ffffc0000040 ffff888100042a00 ffffea00104d3d00 dead000000000003 [ 93.345693] raw: 0000000000000000 0000000000200020 00000000f5000000 0000000000000000 [ 93.345841] head: 0017ffffc0000040 ffff888100042a00 ffffea00104d3d00 dead000000000003 [ 93.345990] head: 0000000000000000 0000000000200020 00000000f5000000 0000000000000000 [ 93.346139] head: 0017ffffc0000001 ffffea000739d381 00000000ffffffff 00000000ffffffff [ 93.346288] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 93.346447] page dumped because: kasan: bad access detected [ 93.346621] Memory state around the buggy address: [ 93.346723] ffff8881ce74e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 93.346862] ffff8881ce74e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.347000] >ffff8881ce74e100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 93.347139] ^ [ 93.347217] ffff8881ce74e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.347357] ffff8881ce74e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 93.347515] ================================================================== [ 93.347869] ok 53 mempool_kmalloc_invalid_free [ 93.348027] ================================================================== [ 93.348320] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x11d/0x2c0 [kasan_test] [ 93.348538] Free of addr ffff8881113d0001 by task kunit_try_catch/3681 [ 93.348722] CPU: 0 UID: 0 PID: 3681 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.348730] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.348731] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.348734] Call Trace: [ 93.348735] [ 93.348737] dump_stack_lvl+0x4f/0x70 [ 93.348742] print_address_description.constprop.0+0x2c/0x3b0 [ 93.348747] print_report+0xb9/0x280 [ 93.348751] ? kasan_addr_to_slab+0x9/0x90 [ 93.348754] ? mempool_kmalloc_invalid_free_helper+0x11d/0x2c0 [kasan_test] [ 93.348764] kasan_report_invalid_free+0xba/0xe0 [ 93.348768] ? mempool_kmalloc_invalid_free_helper+0x11d/0x2c0 [kasan_test] [ 93.348778] ? mempool_kmalloc_invalid_free_helper+0x11d/0x2c0 [kasan_test] [ 93.348787] __kasan_mempool_poison_object+0x11f/0x1b0 [ 93.348790] mempool_free+0x246/0x340 [ 93.348794] mempool_kmalloc_invalid_free_helper+0x11d/0x2c0 [kasan_test] [ 93.348804] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [kasan_test] [ 93.348814] ? __update_idle_core+0x51/0x350 [ 93.348818] ? pick_next_task_fair+0x51/0xba0 [ 93.348822] mempool_kmalloc_large_invalid_free+0x8d/0xe0 [kasan_test] [ 93.348831] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 [kasan_test] [ 93.348840] ? __pfx_mempool_kmalloc+0x10/0x10 [ 93.348843] ? __pfx_mempool_kfree+0x10/0x10 [ 93.348846] ? __pfx_read_tsc+0x10/0x10 [ 93.348849] ? ktime_get_ts64+0x7f/0x220 [ 93.348853] ? __pfx___schedule+0x10/0x10 [ 93.348857] kunit_try_run_case+0x175/0x440 [ 93.348860] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.348863] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.348868] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.348870] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.348874] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.348878] kthread+0x3b4/0x780 [ 93.348882] ? __pfx_kthread+0x10/0x10 [ 93.348885] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.348889] ? __pfx_kthread+0x10/0x10 [ 93.348892] ? __pfx_kthread+0x10/0x10 [ 93.348896] ret_from_fork+0x22c/0x300 [ 93.348899] ? __pfx_kthread+0x10/0x10 [ 93.348903] ret_from_fork_asm+0x1a/0x30 [ 93.348908] [ 93.353169] The buggy address belongs to the physical page: [ 93.353284] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff8881113d4400 pfn:0x1113d0 [ 93.353477] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 93.353624] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 93.353761] page_type: f8(unknown) [ 93.353843] raw: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 93.353992] raw: ffff8881113d4400 0000000000000000 00000001f8000000 0000000000000000 [ 93.354139] head: 0017ffffc0000040 0000000000000000 dead000000000122 0000000000000000 [ 93.354288] head: ffff8881113d4400 0000000000000000 00000001f8000000 0000000000000000 [ 93.354448] head: 0017ffffc0000002 ffffea000444f401 00000000ffffffff 00000000ffffffff [ 93.354607] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 93.354755] page dumped because: kasan: bad access detected [ 93.354919] Memory state around the buggy address: [ 93.355021] ffff8881113cff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.355160] ffff8881113cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.355298] >ffff8881113d0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 93.355457] ^ [ 93.355535] ffff8881113d0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 93.355674] ffff8881113d0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 93.355816] ================================================================== [ 93.356405] ok 54 mempool_kmalloc_large_invalid_free [ 93.356585] ================================================================== [ 93.356847] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x251/0x290 [kasan_test] [ 93.357022] Read of size 1 at addr ffffffffc1289e0d by task kunit_try_catch/3683 [ 93.357219] CPU: 5 UID: 0 PID: 3683 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.357227] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.357228] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.357231] Call Trace: [ 93.357233] [ 93.357235] dump_stack_lvl+0x4f/0x70 [ 93.357241] print_address_description.constprop.0+0x2c/0x3b0 [ 93.357246] ? kasan_global_oob_right+0x251/0x290 [kasan_test] [ 93.357255] print_report+0xb9/0x280 [ 93.357259] ? kasan_global_oob_right+0x251/0x290 [kasan_test] [ 93.357267] ? kasan_addr_to_slab+0x9/0x90 [ 93.357271] ? kasan_global_oob_right+0x251/0x290 [kasan_test] [ 93.357279] kasan_report+0xda/0x110 [ 93.357283] ? kasan_global_oob_right+0x251/0x290 [kasan_test] [ 93.357293] kasan_global_oob_right+0x251/0x290 [kasan_test] [ 93.357302] ? __pfx_kasan_global_oob_right+0x10/0x10 [kasan_test] [ 93.357310] ? __schedule+0x763/0x1490 [ 93.357314] ? __pfx_read_tsc+0x10/0x10 [ 93.357317] ? ktime_get_ts64+0x7f/0x220 [ 93.357321] ? __pfx___schedule+0x10/0x10 [ 93.357325] kunit_try_run_case+0x175/0x440 [ 93.357328] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.357332] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.357336] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.357339] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.357343] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.357347] kthread+0x3b4/0x780 [ 93.357351] ? __pfx_kthread+0x10/0x10 [ 93.357355] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.357358] ? __pfx_kthread+0x10/0x10 [ 93.357362] ? __pfx_kthread+0x10/0x10 [ 93.357366] ret_from_fork+0x22c/0x300 [ 93.357369] ? __pfx_kthread+0x10/0x10 [ 93.357373] ret_from_fork_asm+0x1a/0x30 [ 93.357378] [ 93.360862] The buggy address belongs to the variable: [ 93.360971] global_array+0xd/0xffffffffffeab200 [kasan_test] [ 93.361145] Memory state around the buggy address: [ 93.361246] ffffffffc1289d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 93.361384] ffffffffc1289d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 93.361544] >ffffffffc1289e00: 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 93.361685] ^ [ 93.361768] ffffffffc1289e80: 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 [ 93.361906] ffffffffc1289f00: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 93.362043] ================================================================== [ 93.362344] ok 55 kasan_global_oob_right [ 93.362577] ok 56 kasan_global_oob_left # SKIP Test requires CONFIG_CC_IS_CLANG=y [ 93.362803] ================================================================== [ 93.363107] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x263/0x2a0 [kasan_test] [ 93.363269] Read of size 1 at addr ffffc900030cfd2a by task kunit_try_catch/3687 [ 93.363483] CPU: 4 UID: 0 PID: 3687 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.363492] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.363493] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.363496] Call Trace: [ 93.363497] [ 93.363499] dump_stack_lvl+0x4f/0x70 [ 93.363505] print_address_description.constprop.0+0x2c/0x3b0 [ 93.363520] ? kasan_stack_oob+0x263/0x2a0 [kasan_test] [ 93.363529] print_report+0xb9/0x280 [ 93.363532] ? kasan_stack_oob+0x263/0x2a0 [kasan_test] [ 93.363540] ? kasan_addr_to_slab+0x9/0x90 [ 93.363544] ? kasan_stack_oob+0x263/0x2a0 [kasan_test] [ 93.363552] kasan_report+0xda/0x110 [ 93.363556] ? kasan_stack_oob+0x263/0x2a0 [kasan_test] [ 93.363565] kasan_stack_oob+0x263/0x2a0 [kasan_test] [ 93.363574] ? __pfx_kasan_stack_oob+0x10/0x10 [kasan_test] [ 93.363582] ? __switch_to+0x526/0x1000 [ 93.363586] ? __schedule+0x763/0x1490 [ 93.363589] ? __pfx_read_tsc+0x10/0x10 [ 93.363592] ? ktime_get_ts64+0x7f/0x220 [ 93.363596] ? __pfx___schedule+0x10/0x10 [ 93.363600] kunit_try_run_case+0x175/0x440 [ 93.363603] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.363607] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.363611] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.363614] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.363618] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.363621] kthread+0x3b4/0x780 [ 93.363625] ? __pfx_kthread+0x10/0x10 [ 93.363629] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.363632] ? __pfx_kthread+0x10/0x10 [ 93.363636] ? __pfx_kthread+0x10/0x10 [ 93.363639] ret_from_fork+0x22c/0x300 [ 93.363643] ? __pfx_kthread+0x10/0x10 [ 93.363646] ret_from_fork_asm+0x1a/0x30 [ 93.363651] [ 93.367157] The buggy address belongs to stack of task kunit_try_catch/3687 [ 93.367292] and is located at offset 138 in frame: [ 93.367402] kasan_stack_oob+0x0/0x2a0 [kasan_test] [ 93.367581] This frame has 4 objects: [ 93.367665] [48, 49) '__assertion' [ 93.367668] [64, 72) 'array' [ 93.367750] [96, 112) '__assertion' [ 93.367825] [128, 138) 'stack_array' [ 93.368040] The buggy address belongs to the virtual mapping at [ffffc900030c8000, ffffc900030d1000) created by: dup_task_struct+0x59/0x630 [ 93.368379] The buggy address belongs to the physical page: [ 93.368504] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x771f pfn:0x4129fb [ 93.368671] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.368806] raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 93.368954] raw: 000000000000771f 0000000000000000 00000001ffffffff 0000000000000000 [ 93.369101] page dumped because: kasan: bad access detected [ 93.369265] Memory state around the buggy address: [ 93.369365] ffffc900030cfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 93.369525] ffffc900030cfc80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 93.369663] >ffffc900030cfd00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 93.369800] ^ [ 93.369897] ffffc900030cfd80: 00 00 00 f1 f1 f1 f1 00 00 f2 f2 00 00 f2 f2 00 [ 93.370035] ffffc900030cfe00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 93.370171] ================================================================== [ 93.370526] ok 57 kasan_stack_oob [ 93.370703] ================================================================== [ 93.370945] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x320/0x390 [kasan_test] [ 93.371118] Read of size 1 at addr ffffc900030ffc3f by task kunit_try_catch/3690 [ 93.371320] CPU: 5 UID: 0 PID: 3690 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.371328] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.371330] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.371332] Call Trace: [ 93.371334] [ 93.371336] dump_stack_lvl+0x4f/0x70 [ 93.371342] print_address_description.constprop.0+0x2c/0x3b0 [ 93.371348] ? kasan_alloca_oob_left+0x320/0x390 [kasan_test] [ 93.371358] print_report+0xb9/0x280 [ 93.371361] ? kasan_alloca_oob_left+0x320/0x390 [kasan_test] [ 93.371370] ? kasan_addr_to_slab+0x9/0x90 [ 93.371374] ? kasan_alloca_oob_left+0x320/0x390 [kasan_test] [ 93.371383] kasan_report+0xda/0x110 [ 93.371387] ? kasan_alloca_oob_left+0x320/0x390 [kasan_test] [ 93.371397] kasan_alloca_oob_left+0x320/0x390 [kasan_test] [ 93.371407] ? __update_idle_core+0x51/0x350 [ 93.371411] ? pick_next_task_fair+0x51/0xba0 [ 93.371417] ? __pfx_kasan_alloca_oob_left+0x10/0x10 [kasan_test] [ 93.371427] ? __schedule+0x763/0x1490 [ 93.371434] ? __pfx_read_tsc+0x10/0x10 [ 93.371440] ? ktime_get_ts64+0x7f/0x220 [ 93.371448] kunit_try_run_case+0x175/0x440 [ 93.371452] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.371456] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.371461] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.371464] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.371468] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.371472] kthread+0x3b4/0x780 [ 93.371476] ? __pfx_kthread+0x10/0x10 [ 93.371480] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.371484] ? __pfx_kthread+0x10/0x10 [ 93.371487] ? __pfx_kthread+0x10/0x10 [ 93.371491] ret_from_fork+0x22c/0x300 [ 93.371495] ? __pfx_kthread+0x10/0x10 [ 93.371499] ret_from_fork_asm+0x1a/0x30 [ 93.371504] [ 93.375068] The buggy address belongs to stack of task kunit_try_catch/3690 [ 93.375255] The buggy address belongs to the virtual mapping at [ffffc900030f8000, ffffc90003101000) created by: dup_task_struct+0x59/0x630 [ 93.375613] The buggy address belongs to the physical page: [ 93.375725] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x40677e [ 93.375877] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.376012] raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 93.376159] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 93.376305] page dumped because: kasan: bad access detected [ 93.376495] Memory state around the buggy address: [ 93.376596] ffffc900030ffb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 93.376735] ffffc900030ffb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 93.376873] >ffffc900030ffc00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 93.377010] ^ [ 93.377118] ffffc900030ffc80: 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 [ 93.377255] ffffc900030ffd00: f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 00 [ 93.377392] ================================================================== [ 93.377845] ok 58 kasan_alloca_oob_left [ 93.378003] ================================================================== [ 93.378248] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x327/0x3a0 [kasan_test] [ 93.378429] Read of size 1 at addr ffffc9000311fc4a by task kunit_try_catch/3692 [ 93.378644] CPU: 6 UID: 0 PID: 3692 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.378651] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.378653] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.378656] Call Trace: [ 93.378657] [ 93.378659] dump_stack_lvl+0x4f/0x70 [ 93.378665] print_address_description.constprop.0+0x2c/0x3b0 [ 93.378670] ? kasan_alloca_oob_right+0x327/0x3a0 [kasan_test] [ 93.378680] print_report+0xb9/0x280 [ 93.378683] ? kasan_alloca_oob_right+0x327/0x3a0 [kasan_test] [ 93.378692] ? kasan_addr_to_slab+0x9/0x90 [ 93.378696] ? kasan_alloca_oob_right+0x327/0x3a0 [kasan_test] [ 93.378704] kasan_report+0xda/0x110 [ 93.378708] ? kasan_alloca_oob_right+0x327/0x3a0 [kasan_test] [ 93.378718] kasan_alloca_oob_right+0x327/0x3a0 [kasan_test] [ 93.378727] ? __update_idle_core+0x51/0x350 [ 93.378731] ? pick_next_task_fair+0x51/0xba0 [ 93.378737] ? __pfx_kasan_alloca_oob_right+0x10/0x10 [kasan_test] [ 93.378746] ? __schedule+0x763/0x1490 [ 93.378750] ? __pfx_read_tsc+0x10/0x10 [ 93.378754] ? ktime_get_ts64+0x7f/0x220 [ 93.378758] kunit_try_run_case+0x175/0x440 [ 93.378761] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.378765] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.378769] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.378772] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.378776] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.378780] kthread+0x3b4/0x780 [ 93.378784] ? __pfx_kthread+0x10/0x10 [ 93.378788] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.378792] ? __pfx_kthread+0x10/0x10 [ 93.378795] ? __pfx_kthread+0x10/0x10 [ 93.378799] ret_from_fork+0x22c/0x300 [ 93.378803] ? __pfx_kthread+0x10/0x10 [ 93.378806] ret_from_fork_asm+0x1a/0x30 [ 93.378812] [ 93.382388] The buggy address belongs to stack of task kunit_try_catch/3692 [ 93.382593] The buggy address belongs to the virtual mapping at [ffffc90003118000, ffffc90003121000) created by: dup_task_struct+0x59/0x630 [ 93.382931] The buggy address belongs to the physical page: [ 93.383042] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x177dfe [ 93.383194] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.383324] raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 93.383491] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 93.383636] page dumped because: kasan: bad access detected [ 93.383797] Memory state around the buggy address: [ 93.383897] ffffc9000311fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 93.384035] ffffc9000311fb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 93.384172] >ffffc9000311fc00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 93.384312] ^ [ 93.384435] ffffc9000311fc80: 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 [ 93.384583] ffffc9000311fd00: f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 00 [ 93.384721] ================================================================== [ 93.386077] ok 59 kasan_alloca_oob_right [ 93.386387] ok 60 kasan_memchr # SKIP Test requires CONFIG_AMD_MEM_ENCRYPT=n [ 93.386797] ok 61 kasan_memcmp # SKIP Test requires CONFIG_AMD_MEM_ENCRYPT=n [ 93.387121] ok 62 kasan_strings # SKIP Test requires CONFIG_AMD_MEM_ENCRYPT=n [ 93.387349] ================================================================== [ 93.387643] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xea/0xd40 [kasan_test] [ 93.387822] Write of size 8 at addr ffff88810bd17b88 by task kunit_try_catch/3700 [ 93.388019] CPU: 0 UID: 0 PID: 3700 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.388026] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.388028] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.388031] Call Trace: [ 93.388032] [ 93.388034] dump_stack_lvl+0x4f/0x70 [ 93.388040] print_address_description.constprop.0+0x2c/0x3b0 [ 93.388045] ? kasan_bitops_modify.constprop.0+0xea/0xd40 [kasan_test] [ 93.388055] print_report+0xb9/0x280 [ 93.388059] ? kasan_bitops_modify.constprop.0+0xea/0xd40 [kasan_test] [ 93.388069] ? kasan_addr_to_slab+0x9/0x90 [ 93.388072] ? kasan_bitops_modify.constprop.0+0xea/0xd40 [kasan_test] [ 93.388081] kasan_report+0xda/0x110 [ 93.388085] ? kasan_bitops_modify.constprop.0+0xea/0xd40 [kasan_test] [ 93.388095] kasan_check_range+0xfc/0x1b0 [ 93.388100] kasan_bitops_modify.constprop.0+0xea/0xd40 [kasan_test] [ 93.388110] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [kasan_test] [ 93.388119] ? __kasan_slab_alloc+0x4a/0x90 [ 93.388123] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.388128] kasan_bitops_generic+0x108/0x1b0 [kasan_test] [ 93.388138] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 93.388147] ? __pfx_read_tsc+0x10/0x10 [ 93.388151] ? ktime_get_ts64+0x7f/0x220 [ 93.388155] ? __pfx___schedule+0x10/0x10 [ 93.388158] kunit_try_run_case+0x175/0x440 [ 93.388162] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.388166] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.388170] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.388173] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.388177] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.388181] kthread+0x3b4/0x780 [ 93.388185] ? __pfx_kthread+0x10/0x10 [ 93.388188] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.388192] ? __pfx_kthread+0x10/0x10 [ 93.388195] ? __pfx_kthread+0x10/0x10 [ 93.388199] ret_from_fork+0x22c/0x300 [ 93.388203] ? __pfx_kthread+0x10/0x10 [ 93.388206] ret_from_fork_asm+0x1a/0x30 [ 93.388211] [ 93.392228] Allocated by task 3700: [ 93.392310] kasan_save_stack+0x1c/0x40 [ 93.392409] kasan_save_track+0x10/0x30 [ 93.392511] __kasan_kmalloc+0xa6/0xb0 [ 93.392598] kasan_bitops_generic+0x84/0x1b0 [kasan_test] [ 93.392716] kunit_try_run_case+0x175/0x440 [ 93.392809] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.392920] kthread+0x3b4/0x780 [ 93.392999] ret_from_fork+0x22c/0x300 [ 93.393086] ret_from_fork_asm+0x1a/0x30 [ 93.393227] The buggy address belongs to the object at ffff88810bd17b80 which belongs to the cache kmalloc-16 of size 16 [ 93.393477] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff88810bd17b80, ffff88810bd17b89) [ 93.393754] The buggy address belongs to the physical page: [ 93.393870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10bd17 [ 93.394023] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.394154] page_type: f5(slab) [ 93.394232] raw: 0017ffffc0000000 ffff888100042640 dead000000000122 0000000000000000 [ 93.394381] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 93.394551] page dumped because: kasan: bad access detected [ 93.394719] Memory state around the buggy address: [ 93.394821] ffff88810bd17a80: fc fc fc fc fc fc fc fc 00 04 fc fc fc fc fc fc [ 93.394960] ffff88810bd17b00: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 93.395100] >ffff88810bd17b80: 00 01 fc fc 00 06 fc fc 00 00 fc fc 00 04 fc fc [ 93.395238] ^ [ 93.395319] ffff88810bd17c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.395479] ffff88810bd17c80: fc fc fc fc 00 04 fc fc fc fc fc fc fc fc fc fc [ 93.395617] ================================================================== [ 93.395768] ================================================================== [ 93.395932] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x184/0xd40 [kasan_test] [ 93.396158] Write of size 8 at addr ffff88810bd17b88 by task kunit_try_catch/3700 [ 93.396401] CPU: 0 UID: 0 PID: 3700 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.396408] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.396410] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.396413] Call Trace: [ 93.396414] [ 93.396416] dump_stack_lvl+0x4f/0x70 [ 93.396423] print_address_description.constprop.0+0x2c/0x3b0 [ 93.396431] ? kasan_bitops_modify.constprop.0+0x184/0xd40 [kasan_test] [ 93.396450] print_report+0xb9/0x280 [ 93.396457] ? kasan_bitops_modify.constprop.0+0x184/0xd40 [kasan_test] [ 93.396476] ? kasan_addr_to_slab+0x9/0x90 [ 93.396482] ? kasan_bitops_modify.constprop.0+0x184/0xd40 [kasan_test] [ 93.396500] kasan_report+0xda/0x110 [ 93.396507] ? kasan_bitops_modify.constprop.0+0x184/0xd40 [kasan_test] [ 93.396517] kasan_check_range+0xfc/0x1b0 [ 93.396522] kasan_bitops_modify.constprop.0+0x184/0xd40 [kasan_test] [ 93.396532] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [kasan_test] [ 93.396542] ? __kasan_slab_alloc+0x4a/0x90 [ 93.396545] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.396560] kasan_bitops_generic+0x108/0x1b0 [kasan_test] [ 93.396569] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 93.396579] ? __pfx_read_tsc+0x10/0x10 [ 93.396582] ? ktime_get_ts64+0x7f/0x220 [ 93.396585] ? __pfx___schedule+0x10/0x10 [ 93.396589] kunit_try_run_case+0x175/0x440 [ 93.396592] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.396595] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.396600] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.396603] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.396607] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.396610] kthread+0x3b4/0x780 [ 93.396614] ? __pfx_kthread+0x10/0x10 [ 93.396618] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.396621] ? __pfx_kthread+0x10/0x10 [ 93.396625] ? __pfx_kthread+0x10/0x10 [ 93.396628] ret_from_fork+0x22c/0x300 [ 93.396632] ? __pfx_kthread+0x10/0x10 [ 93.396635] ret_from_fork_asm+0x1a/0x30 [ 93.396640] [ 93.400655] Allocated by task 3700: [ 93.400738] kasan_save_stack+0x1c/0x40 [ 93.400827] kasan_save_track+0x10/0x30 [ 93.400915] __kasan_kmalloc+0xa6/0xb0 [ 93.401004] kasan_bitops_generic+0x84/0x1b0 [kasan_test] [ 93.401124] kunit_try_run_case+0x175/0x440 [ 93.401217] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.401329] kthread+0x3b4/0x780 [ 93.401419] ret_from_fork+0x22c/0x300 [ 93.401521] ret_from_fork_asm+0x1a/0x30 [ 93.401661] The buggy address belongs to the object at ffff88810bd17b80 which belongs to the cache kmalloc-16 of size 16 [ 93.401889] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff88810bd17b80, ffff88810bd17b89) [ 93.402167] The buggy address belongs to the physical page: [ 93.402279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10bd17 [ 93.402447] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.402589] page_type: f5(slab) [ 93.402669] raw: 0017ffffc0000000 ffff888100042640 dead000000000122 0000000000000000 [ 93.402818] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 93.402964] page dumped because: kasan: bad access detected [ 93.403130] Memory state around the buggy address: [ 93.403231] ffff88810bd17a80: fc fc fc fc fc fc fc fc 00 04 fc fc fc fc fc fc [ 93.403370] ffff88810bd17b00: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 93.403530] >ffff88810bd17b80: 00 01 fc fc 00 06 fc fc 00 00 fc fc 00 04 fc fc [ 93.403668] ^ [ 93.403749] ffff88810bd17c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.403888] ffff88810bd17c80: fc fc fc fc 00 04 fc fc fc fc fc fc fc fc fc fc [ 93.404025] ================================================================== [ 93.404184] ================================================================== [ 93.404349] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x221/0xd40 [kasan_test] [ 93.404589] Write of size 8 at addr ffff88810bd17b88 by task kunit_try_catch/3700 [ 93.404803] CPU: 0 UID: 0 PID: 3700 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.404810] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.404812] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.404814] Call Trace: [ 93.404816] [ 93.404818] dump_stack_lvl+0x4f/0x70 [ 93.404822] print_address_description.constprop.0+0x2c/0x3b0 [ 93.404827] ? kasan_bitops_modify.constprop.0+0x221/0xd40 [kasan_test] [ 93.404837] print_report+0xb9/0x280 [ 93.404841] ? kasan_bitops_modify.constprop.0+0x221/0xd40 [kasan_test] [ 93.404850] ? kasan_addr_to_slab+0x9/0x90 [ 93.404853] ? kasan_bitops_modify.constprop.0+0x221/0xd40 [kasan_test] [ 93.404862] kasan_report+0xda/0x110 [ 93.404866] ? kasan_bitops_modify.constprop.0+0x221/0xd40 [kasan_test] [ 93.404876] kasan_check_range+0xfc/0x1b0 [ 93.404880] kasan_bitops_modify.constprop.0+0x221/0xd40 [kasan_test] [ 93.404890] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [kasan_test] [ 93.404900] ? __kasan_slab_alloc+0x4a/0x90 [ 93.404903] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.404908] kasan_bitops_generic+0x108/0x1b0 [kasan_test] [ 93.404918] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 93.404927] ? __pfx_read_tsc+0x10/0x10 [ 93.404930] ? ktime_get_ts64+0x7f/0x220 [ 93.404934] ? __pfx___schedule+0x10/0x10 [ 93.404938] kunit_try_run_case+0x175/0x440 [ 93.404941] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.404944] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.404949] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.404951] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.404955] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.404959] kthread+0x3b4/0x780 [ 93.404963] ? __pfx_kthread+0x10/0x10 [ 93.404966] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.404970] ? __pfx_kthread+0x10/0x10 [ 93.404973] ? __pfx_kthread+0x10/0x10 [ 93.404977] ret_from_fork+0x22c/0x300 [ 93.404981] ? __pfx_kthread+0x10/0x10 [ 93.404984] ret_from_fork_asm+0x1a/0x30 [ 93.404989] [ 93.409025] Allocated by task 3700: [ 93.409107] kasan_save_stack+0x1c/0x40 [ 93.409196] kasan_save_track+0x10/0x30 [ 93.409286] __kasan_kmalloc+0xa6/0xb0 [ 93.409372] kasan_bitops_generic+0x84/0x1b0 [kasan_test] [ 93.409513] kunit_try_run_case+0x175/0x440 [ 93.409607] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.409720] kthread+0x3b4/0x780 [ 93.409799] ret_from_fork+0x22c/0x300 [ 93.409886] ret_from_fork_asm+0x1a/0x30 [ 93.410026] The buggy address belongs to the object at ffff88810bd17b80 which belongs to the cache kmalloc-16 of size 16 [ 93.410255] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff88810bd17b80, ffff88810bd17b89) [ 93.410556] The buggy address belongs to the physical page: [ 93.410669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10bd17 [ 93.410821] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.410951] page_type: f5(slab) [ 93.411030] raw: 0017ffffc0000000 ffff888100042640 dead000000000122 0000000000000000 [ 93.411181] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 93.411332] page dumped because: kasan: bad access detected [ 93.411518] Memory state around the buggy address: [ 93.411619] ffff88810bd17a80: fc fc fc fc fc fc fc fc 00 04 fc fc fc fc fc fc [ 93.411780] ffff88810bd17b00: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 93.411918] >ffff88810bd17b80: 00 01 fc fc 00 06 fc fc 00 00 fc fc 00 04 fc fc [ 93.412057] ^ [ 93.412138] ffff88810bd17c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.412279] ffff88810bd17c80: fc fc fc fc 00 04 fc fc fc fc fc fc fc fc fc fc [ 93.412432] ================================================================== [ 93.412592] ================================================================== [ 93.412759] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2bb/0xd40 [kasan_test] [ 93.412980] Write of size 8 at addr ffff88810bd17b88 by task kunit_try_catch/3700 [ 93.413194] CPU: 0 UID: 0 PID: 3700 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.413200] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.413202] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.413204] Call Trace: [ 93.413206] [ 93.413208] dump_stack_lvl+0x4f/0x70 [ 93.413213] print_address_description.constprop.0+0x2c/0x3b0 [ 93.413217] ? kasan_bitops_modify.constprop.0+0x2bb/0xd40 [kasan_test] [ 93.413227] print_report+0xb9/0x280 [ 93.413231] ? kasan_bitops_modify.constprop.0+0x2bb/0xd40 [kasan_test] [ 93.413240] ? kasan_addr_to_slab+0x9/0x90 [ 93.413244] ? kasan_bitops_modify.constprop.0+0x2bb/0xd40 [kasan_test] [ 93.413253] kasan_report+0xda/0x110 [ 93.413257] ? kasan_bitops_modify.constprop.0+0x2bb/0xd40 [kasan_test] [ 93.413267] kasan_check_range+0xfc/0x1b0 [ 93.413271] kasan_bitops_modify.constprop.0+0x2bb/0xd40 [kasan_test] [ 93.413281] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [kasan_test] [ 93.413290] ? __kasan_slab_alloc+0x4a/0x90 [ 93.413293] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.413299] kasan_bitops_generic+0x108/0x1b0 [kasan_test] [ 93.413308] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 93.413318] ? __pfx_read_tsc+0x10/0x10 [ 93.413320] ? ktime_get_ts64+0x7f/0x220 [ 93.413324] ? __pfx___schedule+0x10/0x10 [ 93.413328] kunit_try_run_case+0x175/0x440 [ 93.413331] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.413334] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.413339] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.413341] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.413345] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.413349] kthread+0x3b4/0x780 [ 93.413353] ? __pfx_kthread+0x10/0x10 [ 93.413356] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.413360] ? __pfx_kthread+0x10/0x10 [ 93.413363] ? __pfx_kthread+0x10/0x10 [ 93.413367] ret_from_fork+0x22c/0x300 [ 93.413371] ? __pfx_kthread+0x10/0x10 [ 93.413374] ret_from_fork_asm+0x1a/0x30 [ 93.413379] [ 93.417389] Allocated by task 3700: [ 93.417494] kasan_save_stack+0x1c/0x40 [ 93.417584] kasan_save_track+0x10/0x30 [ 93.417672] __kasan_kmalloc+0xa6/0xb0 [ 93.417760] kasan_bitops_generic+0x84/0x1b0 [kasan_test] [ 93.417878] kunit_try_run_case+0x175/0x440 [ 93.417973] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.418087] kthread+0x3b4/0x780 [ 93.418166] ret_from_fork+0x22c/0x300 [ 93.418254] ret_from_fork_asm+0x1a/0x30 [ 93.418404] The buggy address belongs to the object at ffff88810bd17b80 which belongs to the cache kmalloc-16 of size 16 [ 93.418644] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff88810bd17b80, ffff88810bd17b89) [ 93.418922] The buggy address belongs to the physical page: [ 93.419038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10bd17 [ 93.419190] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.419319] page_type: f5(slab) [ 93.419406] raw: 0017ffffc0000000 ffff888100042640 dead000000000122 0000000000000000 [ 93.419566] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 93.419716] page dumped because: kasan: bad access detected [ 93.419881] Memory state around the buggy address: [ 93.419982] ffff88810bd17a80: fc fc fc fc fc fc fc fc 00 04 fc fc fc fc fc fc [ 93.420121] ffff88810bd17b00: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 93.420259] >ffff88810bd17b80: 00 01 fc fc 00 06 fc fc 00 00 fc fc 00 04 fc fc [ 93.420406] ^ [ 93.420500] ffff88810bd17c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.420638] ffff88810bd17c80: fc fc fc fc 00 04 fc fc fc fc fc fc fc fc fc fc [ 93.420775] ================================================================== [ 93.420972] ================================================================== [ 93.421140] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x358/0xd40 [kasan_test] [ 93.421359] Write of size 8 at addr ffff88810bd17b88 by task kunit_try_catch/3700 [ 93.421612] CPU: 0 UID: 0 PID: 3700 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.421620] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.421621] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.421624] Call Trace: [ 93.421625] [ 93.421627] dump_stack_lvl+0x4f/0x70 [ 93.421632] print_address_description.constprop.0+0x2c/0x3b0 [ 93.421636] ? kasan_bitops_modify.constprop.0+0x358/0xd40 [kasan_test] [ 93.421646] print_report+0xb9/0x280 [ 93.421650] ? kasan_bitops_modify.constprop.0+0x358/0xd40 [kasan_test] [ 93.421659] ? kasan_addr_to_slab+0x9/0x90 [ 93.421662] ? kasan_bitops_modify.constprop.0+0x358/0xd40 [kasan_test] [ 93.421671] kasan_report+0xda/0x110 [ 93.421675] ? kasan_bitops_modify.constprop.0+0x358/0xd40 [kasan_test] [ 93.421685] kasan_check_range+0xfc/0x1b0 [ 93.421689] kasan_bitops_modify.constprop.0+0x358/0xd40 [kasan_test] [ 93.421699] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [kasan_test] [ 93.421708] ? __kasan_slab_alloc+0x4a/0x90 [ 93.421712] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.421717] kasan_bitops_generic+0x108/0x1b0 [kasan_test] [ 93.421726] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 93.421735] ? __pfx_read_tsc+0x10/0x10 [ 93.421738] ? ktime_get_ts64+0x7f/0x220 [ 93.421742] ? __pfx___schedule+0x10/0x10 [ 93.421745] kunit_try_run_case+0x175/0x440 [ 93.421749] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.421752] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.421756] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.421759] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.421763] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.421767] kthread+0x3b4/0x780 [ 93.421770] ? __pfx_kthread+0x10/0x10 [ 93.421774] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.421777] ? __pfx_kthread+0x10/0x10 [ 93.421781] ? __pfx_kthread+0x10/0x10 [ 93.421784] ret_from_fork+0x22c/0x300 [ 93.421788] ? __pfx_kthread+0x10/0x10 [ 93.421792] ret_from_fork_asm+0x1a/0x30 [ 93.421796] [ 93.425811] Allocated by task 3700: [ 93.425893] kasan_save_stack+0x1c/0x40 [ 93.425982] kasan_save_track+0x10/0x30 [ 93.426069] __kasan_kmalloc+0xa6/0xb0 [ 93.426156] kasan_bitops_generic+0x84/0x1b0 [kasan_test] [ 93.426276] kunit_try_run_case+0x175/0x440 [ 93.426370] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.426504] kthread+0x3b4/0x780 [ 93.426584] ret_from_fork+0x22c/0x300 [ 93.426671] ret_from_fork_asm+0x1a/0x30 [ 93.426813] The buggy address belongs to the object at ffff88810bd17b80 which belongs to the cache kmalloc-16 of size 16 [ 93.427041] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff88810bd17b80, ffff88810bd17b89) [ 93.427322] The buggy address belongs to the physical page: [ 93.427447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10bd17 [ 93.427608] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.427739] page_type: f5(slab) [ 93.427817] raw: 0017ffffc0000000 ffff888100042640 dead000000000122 0000000000000000 [ 93.427969] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 93.428119] page dumped because: kasan: bad access detected [ 93.428283] Memory state around the buggy address: [ 93.428389] ffff88810bd17a80: fc fc fc fc fc fc fc fc 00 04 fc fc fc fc fc fc [ 93.428549] ffff88810bd17b00: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 93.428687] >ffff88810bd17b80: 00 01 fc fc 00 06 fc fc 00 00 fc fc 00 04 fc fc [ 93.428826] ^ [ 93.428908] ffff88810bd17c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.429046] ffff88810bd17c80: fc fc fc fc 00 04 fc fc fc fc fc fc fc fc fc fc [ 93.429184] ================================================================== [ 93.429332] ================================================================== [ 93.429512] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3f2/0xd40 [kasan_test] [ 93.429722] Write of size 8 at addr ffff88810bd17b88 by task kunit_try_catch/3700 [ 93.429928] CPU: 0 UID: 0 PID: 3700 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.429935] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.429937] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.429939] Call Trace: [ 93.429941] [ 93.429942] dump_stack_lvl+0x4f/0x70 [ 93.429947] print_address_description.constprop.0+0x2c/0x3b0 [ 93.429952] ? kasan_bitops_modify.constprop.0+0x3f2/0xd40 [kasan_test] [ 93.429962] print_report+0xb9/0x280 [ 93.429965] ? kasan_bitops_modify.constprop.0+0x3f2/0xd40 [kasan_test] [ 93.429975] ? kasan_addr_to_slab+0x9/0x90 [ 93.429978] ? kasan_bitops_modify.constprop.0+0x3f2/0xd40 [kasan_test] [ 93.429987] kasan_report+0xda/0x110 [ 93.429991] ? kasan_bitops_modify.constprop.0+0x3f2/0xd40 [kasan_test] [ 93.430001] kasan_check_range+0xfc/0x1b0 [ 93.430005] kasan_bitops_modify.constprop.0+0x3f2/0xd40 [kasan_test] [ 93.430015] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [kasan_test] [ 93.430024] ? __kasan_slab_alloc+0x4a/0x90 [ 93.430028] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.430033] kasan_bitops_generic+0x108/0x1b0 [kasan_test] [ 93.430042] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 93.430051] ? __pfx_read_tsc+0x10/0x10 [ 93.430054] ? ktime_get_ts64+0x7f/0x220 [ 93.430058] ? __pfx___schedule+0x10/0x10 [ 93.430062] kunit_try_run_case+0x175/0x440 [ 93.430065] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.430069] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.430073] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.430076] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.430079] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.430083] kthread+0x3b4/0x780 [ 93.430087] ? __pfx_kthread+0x10/0x10 [ 93.430090] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.430094] ? __pfx_kthread+0x10/0x10 [ 93.430098] ? __pfx_kthread+0x10/0x10 [ 93.430101] ret_from_fork+0x22c/0x300 [ 93.430105] ? __pfx_kthread+0x10/0x10 [ 93.430108] ret_from_fork_asm+0x1a/0x30 [ 93.430113] [ 93.434118] Allocated by task 3700: [ 93.434202] kasan_save_stack+0x1c/0x40 [ 93.434290] kasan_save_track+0x10/0x30 [ 93.434378] __kasan_kmalloc+0xa6/0xb0 [ 93.434488] kasan_bitops_generic+0x84/0x1b0 [kasan_test] [ 93.434606] kunit_try_run_case+0x175/0x440 [ 93.434699] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.434811] kthread+0x3b4/0x780 [ 93.434889] ret_from_fork+0x22c/0x300 [ 93.434976] ret_from_fork_asm+0x1a/0x30 [ 93.435116] The buggy address belongs to the object at ffff88810bd17b80 which belongs to the cache kmalloc-16 of size 16 [ 93.435344] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff88810bd17b80, ffff88810bd17b89) [ 93.435646] The buggy address belongs to the physical page: [ 93.435759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10bd17 [ 93.435912] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.436046] page_type: f5(slab) [ 93.436125] raw: 0017ffffc0000000 ffff888100042640 dead000000000122 0000000000000000 [ 93.436273] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 93.436437] page dumped because: kasan: bad access detected [ 93.436612] Memory state around the buggy address: [ 93.436713] ffff88810bd17a80: fc fc fc fc fc fc fc fc 00 04 fc fc fc fc fc fc [ 93.436851] ffff88810bd17b00: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 93.436990] >ffff88810bd17b80: 00 01 fc fc 00 06 fc fc 00 00 fc fc 00 04 fc fc [ 93.437128] ^ [ 93.437209] ffff88810bd17c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.437347] ffff88810bd17c80: fc fc fc fc 00 04 fc fc fc fc fc fc fc fc fc fc [ 93.437506] ================================================================== [ 93.437714] ================================================================== [ 93.437854] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x48f/0xd40 [kasan_test] [ 93.438033] Write of size 8 at addr ffff88810bd17b88 by task kunit_try_catch/3700 [ 93.438239] CPU: 0 UID: 0 PID: 3700 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.438246] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.438248] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.438250] Call Trace: [ 93.438252] [ 93.438253] dump_stack_lvl+0x4f/0x70 [ 93.438258] print_address_description.constprop.0+0x2c/0x3b0 [ 93.438262] ? kasan_bitops_modify.constprop.0+0x48f/0xd40 [kasan_test] [ 93.438272] print_report+0xb9/0x280 [ 93.438276] ? kasan_bitops_modify.constprop.0+0x48f/0xd40 [kasan_test] [ 93.438285] ? kasan_addr_to_slab+0x9/0x90 [ 93.438288] ? kasan_bitops_modify.constprop.0+0x48f/0xd40 [kasan_test] [ 93.438297] kasan_report+0xda/0x110 [ 93.438301] ? kasan_bitops_modify.constprop.0+0x48f/0xd40 [kasan_test] [ 93.438311] kasan_check_range+0xfc/0x1b0 [ 93.438315] kasan_bitops_modify.constprop.0+0x48f/0xd40 [kasan_test] [ 93.438325] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [kasan_test] [ 93.438334] ? __kasan_slab_alloc+0x4a/0x90 [ 93.438338] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.438343] kasan_bitops_generic+0x108/0x1b0 [kasan_test] [ 93.438353] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 93.438362] ? __pfx_read_tsc+0x10/0x10 [ 93.438365] ? ktime_get_ts64+0x7f/0x220 [ 93.438368] ? __pfx___schedule+0x10/0x10 [ 93.438372] kunit_try_run_case+0x175/0x440 [ 93.438375] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.438378] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.438382] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.438385] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.438389] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.438393] kthread+0x3b4/0x780 [ 93.438396] ? __pfx_kthread+0x10/0x10 [ 93.438400] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.438412] ? __pfx_kthread+0x10/0x10 [ 93.438416] ? __pfx_kthread+0x10/0x10 [ 93.438421] ret_from_fork+0x22c/0x300 [ 93.438427] ? __pfx_kthread+0x10/0x10 [ 93.438434] ret_from_fork_asm+0x1a/0x30 [ 93.438439] [ 93.442449] Allocated by task 3700: [ 93.442540] kasan_save_stack+0x1c/0x40 [ 93.442629] kasan_save_track+0x10/0x30 [ 93.442718] __kasan_kmalloc+0xa6/0xb0 [ 93.442804] kasan_bitops_generic+0x84/0x1b0 [kasan_test] [ 93.442922] kunit_try_run_case+0x175/0x440 [ 93.443016] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.443128] kthread+0x3b4/0x780 [ 93.443206] ret_from_fork+0x22c/0x300 [ 93.443293] ret_from_fork_asm+0x1a/0x30 [ 93.443445] The buggy address belongs to the object at ffff88810bd17b80 which belongs to the cache kmalloc-16 of size 16 [ 93.443683] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff88810bd17b80, ffff88810bd17b89) [ 93.443961] The buggy address belongs to the physical page: [ 93.444073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10bd17 [ 93.444225] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.444357] page_type: f5(slab) [ 93.444449] raw: 0017ffffc0000000 ffff888100042640 dead000000000122 0000000000000000 [ 93.444607] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 93.444756] page dumped because: kasan: bad access detected [ 93.444920] Memory state around the buggy address: [ 93.445021] ffff88810bd17a80: fc fc fc fc fc fc fc fc 00 04 fc fc fc fc fc fc [ 93.445160] ffff88810bd17b00: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 93.445298] >ffff88810bd17b80: 00 01 fc fc 00 06 fc fc 00 00 fc fc 00 04 fc fc [ 93.445449] ^ [ 93.445542] ffff88810bd17c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.445680] ffff88810bd17c80: fc fc fc fc 00 04 fc fc fc fc fc fc fc fc fc fc [ 93.445817] ================================================================== [ 93.445963] ================================================================== [ 93.446113] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x529/0xd40 [kasan_test] [ 93.446292] Write of size 8 at addr ffff88810bd17b88 by task kunit_try_catch/3700 [ 93.446496] CPU: 0 UID: 0 PID: 3700 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.446503] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.446504] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.446507] Call Trace: [ 93.446508] [ 93.446510] dump_stack_lvl+0x4f/0x70 [ 93.446514] print_address_description.constprop.0+0x2c/0x3b0 [ 93.446519] ? kasan_bitops_modify.constprop.0+0x529/0xd40 [kasan_test] [ 93.446529] print_report+0xb9/0x280 [ 93.446533] ? kasan_bitops_modify.constprop.0+0x529/0xd40 [kasan_test] [ 93.446542] ? kasan_addr_to_slab+0x9/0x90 [ 93.446545] ? kasan_bitops_modify.constprop.0+0x529/0xd40 [kasan_test] [ 93.446554] kasan_report+0xda/0x110 [ 93.446558] ? kasan_bitops_modify.constprop.0+0x529/0xd40 [kasan_test] [ 93.446568] kasan_check_range+0xfc/0x1b0 [ 93.446573] kasan_bitops_modify.constprop.0+0x529/0xd40 [kasan_test] [ 93.446583] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [kasan_test] [ 93.446592] ? __kasan_slab_alloc+0x4a/0x90 [ 93.446596] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.446601] kasan_bitops_generic+0x108/0x1b0 [kasan_test] [ 93.446611] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 93.446620] ? __pfx_read_tsc+0x10/0x10 [ 93.446623] ? ktime_get_ts64+0x7f/0x220 [ 93.446627] ? __pfx___schedule+0x10/0x10 [ 93.446630] kunit_try_run_case+0x175/0x440 [ 93.446634] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.446637] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.446641] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.446644] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.446648] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.446652] kthread+0x3b4/0x780 [ 93.446656] ? __pfx_kthread+0x10/0x10 [ 93.446659] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.446663] ? __pfx_kthread+0x10/0x10 [ 93.446666] ? __pfx_kthread+0x10/0x10 [ 93.446670] ret_from_fork+0x22c/0x300 [ 93.446674] ? __pfx_kthread+0x10/0x10 [ 93.446677] ret_from_fork_asm+0x1a/0x30 [ 93.446682] [ 93.450699] Allocated by task 3700: [ 93.450782] kasan_save_stack+0x1c/0x40 [ 93.450871] kasan_save_track+0x10/0x30 [ 93.450959] __kasan_kmalloc+0xa6/0xb0 [ 93.451046] kasan_bitops_generic+0x84/0x1b0 [kasan_test] [ 93.451163] kunit_try_run_case+0x175/0x440 [ 93.451256] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.451368] kthread+0x3b4/0x780 [ 93.451460] ret_from_fork+0x22c/0x300 [ 93.451558] ret_from_fork_asm+0x1a/0x30 [ 93.451700] The buggy address belongs to the object at ffff88810bd17b80 which belongs to the cache kmalloc-16 of size 16 [ 93.451933] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff88810bd17b80, ffff88810bd17b89) [ 93.452220] The buggy address belongs to the physical page: [ 93.452350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10bd17 [ 93.452543] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.452692] page_type: f5(slab) [ 93.452780] raw: 0017ffffc0000000 ffff888100042640 dead000000000122 0000000000000000 [ 93.452928] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 93.453079] page dumped because: kasan: bad access detected [ 93.453246] Memory state around the buggy address: [ 93.453347] ffff88810bd17a80: fc fc fc fc fc fc fc fc 00 04 fc fc fc fc fc fc [ 93.453508] ffff88810bd17b00: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 93.453646] >ffff88810bd17b80: 00 01 fc fc 00 06 fc fc 00 00 fc fc 00 04 fc fc [ 93.453784] ^ [ 93.453866] ffff88810bd17c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.454004] ffff88810bd17c80: fc fc fc fc 00 04 fc fc fc fc fc fc fc fc fc fc [ 93.454141] ================================================================== [ 93.454297] ================================================================== [ 93.454452] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xea/0xd80 [kasan_test] [ 93.454651] Write of size 8 at addr ffff88810bd17b88 by task kunit_try_catch/3700 [ 93.454847] CPU: 0 UID: 0 PID: 3700 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.454854] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.454855] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.454858] Call Trace: [ 93.454859] [ 93.454861] dump_stack_lvl+0x4f/0x70 [ 93.454865] print_address_description.constprop.0+0x2c/0x3b0 [ 93.454870] ? kasan_bitops_test_and_modify.constprop.0+0xea/0xd80 [kasan_test] [ 93.454879] print_report+0xb9/0x280 [ 93.454883] ? kasan_bitops_test_and_modify.constprop.0+0xea/0xd80 [kasan_test] [ 93.454892] ? kasan_addr_to_slab+0x9/0x90 [ 93.454896] ? kasan_bitops_test_and_modify.constprop.0+0xea/0xd80 [kasan_test] [ 93.454905] kasan_report+0xda/0x110 [ 93.454909] ? kasan_bitops_test_and_modify.constprop.0+0xea/0xd80 [kasan_test] [ 93.454919] kasan_check_range+0xfc/0x1b0 [ 93.454923] kasan_bitops_test_and_modify.constprop.0+0xea/0xd80 [kasan_test] [ 93.454933] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [kasan_test] [ 93.454942] ? __kasan_slab_alloc+0x4a/0x90 [ 93.454945] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.454950] kasan_bitops_generic+0x113/0x1b0 [kasan_test] [ 93.454960] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 93.454969] ? __pfx_read_tsc+0x10/0x10 [ 93.454972] ? ktime_get_ts64+0x7f/0x220 [ 93.454975] ? __pfx___schedule+0x10/0x10 [ 93.454979] kunit_try_run_case+0x175/0x440 [ 93.454982] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.454985] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.454990] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.454992] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.454996] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.455000] kthread+0x3b4/0x780 [ 93.455004] ? __pfx_kthread+0x10/0x10 [ 93.455007] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.455011] ? __pfx_kthread+0x10/0x10 [ 93.455014] ? __pfx_kthread+0x10/0x10 [ 93.455018] ret_from_fork+0x22c/0x300 [ 93.455021] ? __pfx_kthread+0x10/0x10 [ 93.455025] ret_from_fork_asm+0x1a/0x30 [ 93.455030] [ 93.459104] Allocated by task 3700: [ 93.459186] kasan_save_stack+0x1c/0x40 [ 93.459275] kasan_save_track+0x10/0x30 [ 93.459362] __kasan_kmalloc+0xa6/0xb0 [ 93.459460] kasan_bitops_generic+0x84/0x1b0 [kasan_test] [ 93.459588] kunit_try_run_case+0x175/0x440 [ 93.459680] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.459791] kthread+0x3b4/0x780 [ 93.459871] ret_from_fork+0x22c/0x300 [ 93.459958] ret_from_fork_asm+0x1a/0x30 [ 93.460097] The buggy address belongs to the object at ffff88810bd17b80 which belongs to the cache kmalloc-16 of size 16 [ 93.460330] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff88810bd17b80, ffff88810bd17b89) [ 93.460631] The buggy address belongs to the physical page: [ 93.460744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10bd17 [ 93.460897] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.461027] page_type: f5(slab) [ 93.461105] raw: 0017ffffc0000000 ffff888100042640 dead000000000122 0000000000000000 [ 93.461253] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 93.461408] page dumped because: kasan: bad access detected [ 93.461585] Memory state around the buggy address: [ 93.461686] ffff88810bd17a80: fc fc fc fc fc fc fc fc 00 04 fc fc fc fc fc fc [ 93.461826] ffff88810bd17b00: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 93.461967] >ffff88810bd17b80: 00 01 fc fc 00 06 fc fc 00 00 fc fc 00 04 fc fc [ 93.462105] ^ [ 93.462186] ffff88810bd17c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.462326] ffff88810bd17c80: fc fc fc fc 00 04 fc fc fc fc fc fc fc fc fc fc [ 93.462487] ================================================================== [ 93.462646] ================================================================== [ 93.462812] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x188/0xd80 [kasan_test] [ 93.463048] Write of size 8 at addr ffff88810bd17b88 by task kunit_try_catch/3700 [ 93.463277] CPU: 0 UID: 0 PID: 3700 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.463293] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.463295] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.463298] Call Trace: [ 93.463299] [ 93.463301] dump_stack_lvl+0x4f/0x70 [ 93.463306] print_address_description.constprop.0+0x2c/0x3b0 [ 93.463311] ? kasan_bitops_test_and_modify.constprop.0+0x188/0xd80 [kasan_test] [ 93.463321] print_report+0xb9/0x280 [ 93.463325] ? kasan_bitops_test_and_modify.constprop.0+0x188/0xd80 [kasan_test] [ 93.463335] ? kasan_addr_to_slab+0x9/0x90 [ 93.463338] ? kasan_bitops_test_and_modify.constprop.0+0x188/0xd80 [kasan_test] [ 93.463348] kasan_report+0xda/0x110 [ 93.463351] ? kasan_bitops_test_and_modify.constprop.0+0x188/0xd80 [kasan_test] [ 93.463362] kasan_check_range+0xfc/0x1b0 [ 93.463366] kasan_bitops_test_and_modify.constprop.0+0x188/0xd80 [kasan_test] [ 93.463377] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [kasan_test] [ 93.463386] ? __kasan_slab_alloc+0x4a/0x90 [ 93.463390] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.463395] kasan_bitops_generic+0x113/0x1b0 [kasan_test] [ 93.463405] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 93.463414] ? __pfx_read_tsc+0x10/0x10 [ 93.463417] ? ktime_get_ts64+0x7f/0x220 [ 93.463423] ? __pfx___schedule+0x10/0x10 [ 93.463430] kunit_try_run_case+0x175/0x440 [ 93.463436] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.463442] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.463449] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.463452] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.463456] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.463460] kthread+0x3b4/0x780 [ 93.463464] ? __pfx_kthread+0x10/0x10 [ 93.463468] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.463471] ? __pfx_kthread+0x10/0x10 [ 93.463475] ? __pfx_kthread+0x10/0x10 [ 93.463479] ret_from_fork+0x22c/0x300 [ 93.463482] ? __pfx_kthread+0x10/0x10 [ 93.463486] ret_from_fork_asm+0x1a/0x30 [ 93.463491] [ 93.467646] Allocated by task 3700: [ 93.467728] kasan_save_stack+0x1c/0x40 [ 93.467817] kasan_save_track+0x10/0x30 [ 93.467905] __kasan_kmalloc+0xa6/0xb0 [ 93.467991] kasan_bitops_generic+0x84/0x1b0 [kasan_test] [ 93.468110] kunit_try_run_case+0x175/0x440 [ 93.468204] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.468315] kthread+0x3b4/0x780 [ 93.468394] ret_from_fork+0x22c/0x300 [ 93.468501] ret_from_fork_asm+0x1a/0x30 [ 93.468642] The buggy address belongs to the object at ffff88810bd17b80 which belongs to the cache kmalloc-16 of size 16 [ 93.468869] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff88810bd17b80, ffff88810bd17b89) [ 93.469155] The buggy address belongs to the physical page: [ 93.469287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10bd17 [ 93.469457] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.469605] page_type: f5(slab) [ 93.469702] raw: 0017ffffc0000000 ffff888100042640 dead000000000122 0000000000000000 [ 93.469869] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 93.470025] page dumped because: kasan: bad access detected [ 93.470190] Memory state around the buggy address: [ 93.470297] ffff88810bd17a80: fc fc fc fc fc fc fc fc 00 04 fc fc fc fc fc fc [ 93.470446] ffff88810bd17b00: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 93.470594] >ffff88810bd17b80: 00 01 fc fc 00 06 fc fc 00 00 fc fc 00 04 fc fc [ 93.470732] ^ [ 93.470815] ffff88810bd17c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.470953] ffff88810bd17c80: fc fc fc fc 00 04 fc fc fc fc fc fc fc fc fc fc [ 93.471093] ================================================================== [ 93.471270] ================================================================== [ 93.471438] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x225/0xd80 [kasan_test] [ 93.471675] Write of size 8 at addr ffff88810bd17b88 by task kunit_try_catch/3700 [ 93.471916] CPU: 0 UID: 0 PID: 3700 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.471932] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.471934] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.471936] Call Trace: [ 93.471938] [ 93.471939] dump_stack_lvl+0x4f/0x70 [ 93.471945] print_address_description.constprop.0+0x2c/0x3b0 [ 93.471949] ? kasan_bitops_test_and_modify.constprop.0+0x225/0xd80 [kasan_test] [ 93.471960] print_report+0xb9/0x280 [ 93.471963] ? kasan_bitops_test_and_modify.constprop.0+0x225/0xd80 [kasan_test] [ 93.471973] ? kasan_addr_to_slab+0x9/0x90 [ 93.471977] ? kasan_bitops_test_and_modify.constprop.0+0x225/0xd80 [kasan_test] [ 93.471986] kasan_report+0xda/0x110 [ 93.471990] ? kasan_bitops_test_and_modify.constprop.0+0x225/0xd80 [kasan_test] [ 93.472000] kasan_check_range+0xfc/0x1b0 [ 93.472005] kasan_bitops_test_and_modify.constprop.0+0x225/0xd80 [kasan_test] [ 93.472015] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [kasan_test] [ 93.472025] ? __kasan_slab_alloc+0x4a/0x90 [ 93.472028] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.472034] kasan_bitops_generic+0x113/0x1b0 [kasan_test] [ 93.472043] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 93.472053] ? __pfx_read_tsc+0x10/0x10 [ 93.472056] ? ktime_get_ts64+0x7f/0x220 [ 93.472059] ? __pfx___schedule+0x10/0x10 [ 93.472063] kunit_try_run_case+0x175/0x440 [ 93.472067] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.472070] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.472074] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.472077] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.472081] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.472085] kthread+0x3b4/0x780 [ 93.472089] ? __pfx_kthread+0x10/0x10 [ 93.472092] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.472096] ? __pfx_kthread+0x10/0x10 [ 93.472100] ? __pfx_kthread+0x10/0x10 [ 93.472103] ret_from_fork+0x22c/0x300 [ 93.472107] ? __pfx_kthread+0x10/0x10 [ 93.472111] ret_from_fork_asm+0x1a/0x30 [ 93.472115] [ 93.476211] Allocated by task 3700: [ 93.476303] kasan_save_stack+0x1c/0x40 [ 93.476391] kasan_save_track+0x10/0x30 [ 93.476498] __kasan_kmalloc+0xa6/0xb0 [ 93.476585] kasan_bitops_generic+0x84/0x1b0 [kasan_test] [ 93.476703] kunit_try_run_case+0x175/0x440 [ 93.476796] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.476907] kthread+0x3b4/0x780 [ 93.476988] ret_from_fork+0x22c/0x300 [ 93.477076] ret_from_fork_asm+0x1a/0x30 [ 93.477218] The buggy address belongs to the object at ffff88810bd17b80 which belongs to the cache kmalloc-16 of size 16 [ 93.477465] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff88810bd17b80, ffff88810bd17b89) [ 93.477743] The buggy address belongs to the physical page: [ 93.477856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10bd17 [ 93.478009] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.478139] page_type: f5(slab) [ 93.478217] raw: 0017ffffc0000000 ffff888100042640 dead000000000122 0000000000000000 [ 93.478365] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 93.478531] page dumped because: kasan: bad access detected [ 93.478694] Memory state around the buggy address: [ 93.478795] ffff88810bd17a80: fc fc fc fc fc fc fc fc 00 04 fc fc fc fc fc fc [ 93.478936] ffff88810bd17b00: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 93.479074] >ffff88810bd17b80: 00 01 fc fc 00 06 fc fc 00 00 fc fc 00 04 fc fc [ 93.479216] ^ [ 93.479297] ffff88810bd17c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.479446] ffff88810bd17c80: fc fc fc fc 00 04 fc fc fc fc fc fc fc fc fc fc [ 93.479593] ================================================================== [ 93.479739] ================================================================== [ 93.479914] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2c3/0xd80 [kasan_test] [ 93.480149] Write of size 8 at addr ffff88810bd17b88 by task kunit_try_catch/3700 [ 93.480383] CPU: 0 UID: 0 PID: 3700 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.480390] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.480391] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.480394] Call Trace: [ 93.480395] [ 93.480397] dump_stack_lvl+0x4f/0x70 [ 93.480402] print_address_description.constprop.0+0x2c/0x3b0 [ 93.480407] ? kasan_bitops_test_and_modify.constprop.0+0x2c3/0xd80 [kasan_test] [ 93.480417] print_report+0xb9/0x280 [ 93.480421] ? kasan_bitops_test_and_modify.constprop.0+0x2c3/0xd80 [kasan_test] [ 93.480430] ? kasan_addr_to_slab+0x9/0x90 [ 93.480434] ? kasan_bitops_test_and_modify.constprop.0+0x2c3/0xd80 [kasan_test] [ 93.480443] kasan_report+0xda/0x110 [ 93.480447] ? kasan_bitops_test_and_modify.constprop.0+0x2c3/0xd80 [kasan_test] [ 93.480457] kasan_check_range+0xfc/0x1b0 [ 93.480462] kasan_bitops_test_and_modify.constprop.0+0x2c3/0xd80 [kasan_test] [ 93.480472] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [kasan_test] [ 93.480491] ? __kasan_slab_alloc+0x4a/0x90 [ 93.480494] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.480500] kasan_bitops_generic+0x113/0x1b0 [kasan_test] [ 93.480509] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 93.480518] ? __pfx_read_tsc+0x10/0x10 [ 93.480521] ? ktime_get_ts64+0x7f/0x220 [ 93.480525] ? __pfx___schedule+0x10/0x10 [ 93.480529] kunit_try_run_case+0x175/0x440 [ 93.480532] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.480535] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.480540] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.480542] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.480546] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.480550] kthread+0x3b4/0x780 [ 93.480554] ? __pfx_kthread+0x10/0x10 [ 93.480557] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.480561] ? __pfx_kthread+0x10/0x10 [ 93.480564] ? __pfx_kthread+0x10/0x10 [ 93.480568] ret_from_fork+0x22c/0x300 [ 93.480571] ? __pfx_kthread+0x10/0x10 [ 93.480575] ret_from_fork_asm+0x1a/0x30 [ 93.480580] [ 93.484704] Allocated by task 3700: [ 93.484786] kasan_save_stack+0x1c/0x40 [ 93.484875] kasan_save_track+0x10/0x30 [ 93.484963] __kasan_kmalloc+0xa6/0xb0 [ 93.485049] kasan_bitops_generic+0x84/0x1b0 [kasan_test] [ 93.485167] kunit_try_run_case+0x175/0x440 [ 93.485260] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.485374] kthread+0x3b4/0x780 [ 93.485473] ret_from_fork+0x22c/0x300 [ 93.485562] ret_from_fork_asm+0x1a/0x30 [ 93.485701] The buggy address belongs to the object at ffff88810bd17b80 which belongs to the cache kmalloc-16 of size 16 [ 93.485928] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff88810bd17b80, ffff88810bd17b89) [ 93.486206] The buggy address belongs to the physical page: [ 93.486320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10bd17 [ 93.486500] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.486648] page_type: f5(slab) [ 93.486746] raw: 0017ffffc0000000 ffff888100042640 dead000000000122 0000000000000000 [ 93.486923] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 93.487069] page dumped because: kasan: bad access detected [ 93.487236] Memory state around the buggy address: [ 93.487337] ffff88810bd17a80: fc fc fc fc fc fc fc fc 00 04 fc fc fc fc fc fc [ 93.487496] ffff88810bd17b00: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 93.487635] >ffff88810bd17b80: 00 01 fc fc 00 06 fc fc 00 00 fc fc 00 04 fc fc [ 93.487773] ^ [ 93.487854] ffff88810bd17c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.487992] ffff88810bd17c80: fc fc fc fc 00 04 fc fc fc fc fc fc fc fc fc fc [ 93.488130] ================================================================== [ 93.488289] ================================================================== [ 93.488454] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x361/0xd80 [kasan_test] [ 93.488692] Write of size 8 at addr ffff88810bd17b88 by task kunit_try_catch/3700 [ 93.488912] CPU: 0 UID: 0 PID: 3700 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.488919] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.488921] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.488923] Call Trace: [ 93.488925] [ 93.488926] dump_stack_lvl+0x4f/0x70 [ 93.488931] print_address_description.constprop.0+0x2c/0x3b0 [ 93.488936] ? kasan_bitops_test_and_modify.constprop.0+0x361/0xd80 [kasan_test] [ 93.488946] print_report+0xb9/0x280 [ 93.488950] ? kasan_bitops_test_and_modify.constprop.0+0x361/0xd80 [kasan_test] [ 93.488960] ? kasan_addr_to_slab+0x9/0x90 [ 93.488963] ? kasan_bitops_test_and_modify.constprop.0+0x361/0xd80 [kasan_test] [ 93.488973] kasan_report+0xda/0x110 [ 93.488977] ? kasan_bitops_test_and_modify.constprop.0+0x361/0xd80 [kasan_test] [ 93.488987] kasan_check_range+0xfc/0x1b0 [ 93.488991] kasan_bitops_test_and_modify.constprop.0+0x361/0xd80 [kasan_test] [ 93.489002] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [kasan_test] [ 93.489011] ? __kasan_slab_alloc+0x4a/0x90 [ 93.489015] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.489020] kasan_bitops_generic+0x113/0x1b0 [kasan_test] [ 93.489030] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 93.489039] ? __pfx_read_tsc+0x10/0x10 [ 93.489042] ? ktime_get_ts64+0x7f/0x220 [ 93.489046] ? __pfx___schedule+0x10/0x10 [ 93.489050] kunit_try_run_case+0x175/0x440 [ 93.489053] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.489056] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.489061] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.489063] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.489067] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.489071] kthread+0x3b4/0x780 [ 93.489075] ? __pfx_kthread+0x10/0x10 [ 93.489079] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.489082] ? __pfx_kthread+0x10/0x10 [ 93.489086] ? __pfx_kthread+0x10/0x10 [ 93.489090] ret_from_fork+0x22c/0x300 [ 93.489093] ? __pfx_kthread+0x10/0x10 [ 93.489097] ret_from_fork_asm+0x1a/0x30 [ 93.489102] [ 93.493201] Allocated by task 3700: [ 93.493282] kasan_save_stack+0x1c/0x40 [ 93.493371] kasan_save_track+0x10/0x30 [ 93.493479] __kasan_kmalloc+0xa6/0xb0 [ 93.493566] kasan_bitops_generic+0x84/0x1b0 [kasan_test] [ 93.493683] kunit_try_run_case+0x175/0x440 [ 93.493776] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.493890] kthread+0x3b4/0x780 [ 93.493969] ret_from_fork+0x22c/0x300 [ 93.494056] ret_from_fork_asm+0x1a/0x30 [ 93.494196] The buggy address belongs to the object at ffff88810bd17b80 which belongs to the cache kmalloc-16 of size 16 [ 93.494434] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff88810bd17b80, ffff88810bd17b89) [ 93.494722] The buggy address belongs to the physical page: [ 93.494835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10bd17 [ 93.494988] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.495118] page_type: f5(slab) [ 93.495197] raw: 0017ffffc0000000 ffff888100042640 dead000000000122 0000000000000000 [ 93.495345] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 93.495511] page dumped because: kasan: bad access detected [ 93.495676] Memory state around the buggy address: [ 93.495777] ffff88810bd17a80: fc fc fc fc fc fc fc fc 00 04 fc fc fc fc fc fc [ 93.495916] ffff88810bd17b00: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 93.496054] >ffff88810bd17b80: 00 01 fc fc 00 06 fc fc 00 00 fc fc 00 04 fc fc [ 93.496195] ^ [ 93.496279] ffff88810bd17c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.496427] ffff88810bd17c80: fc fc fc fc 00 04 fc fc fc fc fc fc fc fc fc fc [ 93.496576] ================================================================== [ 93.496733] ================================================================== [ 93.496899] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x3fe/0xd80 [kasan_test] [ 93.497136] Write of size 8 at addr ffff88810bd17b88 by task kunit_try_catch/3700 [ 93.497352] CPU: 0 UID: 0 PID: 3700 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.497359] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.497361] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.497363] Call Trace: [ 93.497365] [ 93.497366] dump_stack_lvl+0x4f/0x70 [ 93.497371] print_address_description.constprop.0+0x2c/0x3b0 [ 93.497376] ? kasan_bitops_test_and_modify.constprop.0+0x3fe/0xd80 [kasan_test] [ 93.497386] print_report+0xb9/0x280 [ 93.497390] ? kasan_bitops_test_and_modify.constprop.0+0x3fe/0xd80 [kasan_test] [ 93.497400] ? kasan_addr_to_slab+0x9/0x90 [ 93.497403] ? kasan_bitops_test_and_modify.constprop.0+0x3fe/0xd80 [kasan_test] [ 93.497412] kasan_report+0xda/0x110 [ 93.497416] ? kasan_bitops_test_and_modify.constprop.0+0x3fe/0xd80 [kasan_test] [ 93.497427] kasan_check_range+0xfc/0x1b0 [ 93.497431] kasan_bitops_test_and_modify.constprop.0+0x3fe/0xd80 [kasan_test] [ 93.497441] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [kasan_test] [ 93.497459] ? __kasan_slab_alloc+0x4a/0x90 [ 93.497463] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.497468] kasan_bitops_generic+0x113/0x1b0 [kasan_test] [ 93.497477] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 93.497486] ? __pfx_read_tsc+0x10/0x10 [ 93.497489] ? ktime_get_ts64+0x7f/0x220 [ 93.497493] ? __pfx___schedule+0x10/0x10 [ 93.497497] kunit_try_run_case+0x175/0x440 [ 93.497500] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.497503] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.497508] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.497511] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.497514] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.497518] kthread+0x3b4/0x780 [ 93.497522] ? __pfx_kthread+0x10/0x10 [ 93.497525] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.497529] ? __pfx_kthread+0x10/0x10 [ 93.497532] ? __pfx_kthread+0x10/0x10 [ 93.497536] ret_from_fork+0x22c/0x300 [ 93.497540] ? __pfx_kthread+0x10/0x10 [ 93.497543] ret_from_fork_asm+0x1a/0x30 [ 93.497548] [ 93.501684] Allocated by task 3700: [ 93.501766] kasan_save_stack+0x1c/0x40 [ 93.501855] kasan_save_track+0x10/0x30 [ 93.501943] __kasan_kmalloc+0xa6/0xb0 [ 93.502030] kasan_bitops_generic+0x84/0x1b0 [kasan_test] [ 93.502151] kunit_try_run_case+0x175/0x440 [ 93.502244] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.502355] kthread+0x3b4/0x780 [ 93.502445] ret_from_fork+0x22c/0x300 [ 93.502543] ret_from_fork_asm+0x1a/0x30 [ 93.502683] The buggy address belongs to the object at ffff88810bd17b80 which belongs to the cache kmalloc-16 of size 16 [ 93.502911] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff88810bd17b80, ffff88810bd17b89) [ 93.503198] The buggy address belongs to the physical page: [ 93.503328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10bd17 [ 93.503509] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.503656] page_type: f5(slab) [ 93.503754] raw: 0017ffffc0000000 ffff888100042640 dead000000000122 0000000000000000 [ 93.503929] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 93.504076] page dumped because: kasan: bad access detected [ 93.504240] Memory state around the buggy address: [ 93.504343] ffff88810bd17a80: fc fc fc fc fc fc fc fc 00 04 fc fc fc fc fc fc [ 93.504501] ffff88810bd17b00: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 93.504640] >ffff88810bd17b80: 00 01 fc fc 00 06 fc fc 00 00 fc fc 00 04 fc fc [ 93.504780] ^ [ 93.504863] ffff88810bd17c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.505001] ffff88810bd17c80: fc fc fc fc 00 04 fc fc fc fc fc fc fc fc fc fc [ 93.505140] ================================================================== [ 93.505298] ================================================================== [ 93.505464] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x49c/0xd80 [kasan_test] [ 93.505700] Write of size 8 at addr ffff88810bd17b88 by task kunit_try_catch/3700 [ 93.505921] CPU: 0 UID: 0 PID: 3700 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.505928] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.505929] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.505932] Call Trace: [ 93.505934] [ 93.505935] dump_stack_lvl+0x4f/0x70 [ 93.505940] print_address_description.constprop.0+0x2c/0x3b0 [ 93.505945] ? kasan_bitops_test_and_modify.constprop.0+0x49c/0xd80 [kasan_test] [ 93.505955] print_report+0xb9/0x280 [ 93.505959] ? kasan_bitops_test_and_modify.constprop.0+0x49c/0xd80 [kasan_test] [ 93.505968] ? kasan_addr_to_slab+0x9/0x90 [ 93.505972] ? kasan_bitops_test_and_modify.constprop.0+0x49c/0xd80 [kasan_test] [ 93.505981] kasan_report+0xda/0x110 [ 93.505985] ? kasan_bitops_test_and_modify.constprop.0+0x49c/0xd80 [kasan_test] [ 93.505995] kasan_check_range+0xfc/0x1b0 [ 93.506000] kasan_bitops_test_and_modify.constprop.0+0x49c/0xd80 [kasan_test] [ 93.506010] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [kasan_test] [ 93.506020] ? __kasan_slab_alloc+0x4a/0x90 [ 93.506023] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.506029] kasan_bitops_generic+0x113/0x1b0 [kasan_test] [ 93.506038] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 93.506048] ? __pfx_read_tsc+0x10/0x10 [ 93.506051] ? ktime_get_ts64+0x7f/0x220 [ 93.506054] ? __pfx___schedule+0x10/0x10 [ 93.506058] kunit_try_run_case+0x175/0x440 [ 93.506062] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.506065] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.506069] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.506072] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.506076] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.506080] kthread+0x3b4/0x780 [ 93.506084] ? __pfx_kthread+0x10/0x10 [ 93.506087] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.506091] ? __pfx_kthread+0x10/0x10 [ 93.506095] ? __pfx_kthread+0x10/0x10 [ 93.506098] ret_from_fork+0x22c/0x300 [ 93.506102] ? __pfx_kthread+0x10/0x10 [ 93.506106] ret_from_fork_asm+0x1a/0x30 [ 93.506110] [ 93.510228] Allocated by task 3700: [ 93.510310] kasan_save_stack+0x1c/0x40 [ 93.510408] kasan_save_track+0x10/0x30 [ 93.510507] __kasan_kmalloc+0xa6/0xb0 [ 93.510593] kasan_bitops_generic+0x84/0x1b0 [kasan_test] [ 93.510711] kunit_try_run_case+0x175/0x440 [ 93.510804] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.510916] kthread+0x3b4/0x780 [ 93.510994] ret_from_fork+0x22c/0x300 [ 93.511081] ret_from_fork_asm+0x1a/0x30 [ 93.511222] The buggy address belongs to the object at ffff88810bd17b80 which belongs to the cache kmalloc-16 of size 16 [ 93.511469] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff88810bd17b80, ffff88810bd17b89) [ 93.511746] The buggy address belongs to the physical page: [ 93.511859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10bd17 [ 93.512012] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.512142] page_type: f5(slab) [ 93.512222] raw: 0017ffffc0000000 ffff888100042640 dead000000000122 0000000000000000 [ 93.512371] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 93.512539] page dumped because: kasan: bad access detected [ 93.512705] Memory state around the buggy address: [ 93.512806] ffff88810bd17a80: fc fc fc fc fc fc fc fc 00 04 fc fc fc fc fc fc [ 93.512945] ffff88810bd17b00: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 93.513083] >ffff88810bd17b80: 00 01 fc fc 00 06 fc fc 00 00 fc fc 00 04 fc fc [ 93.513222] ^ [ 93.513303] ffff88810bd17c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.513460] ffff88810bd17c80: fc fc fc fc 00 04 fc fc fc fc fc fc fc fc fc fc [ 93.513602] ================================================================== [ 93.513762] ================================================================== [ 93.513928] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x539/0xd80 [kasan_test] [ 93.514165] Read of size 8 at addr ffff88810bd17b88 by task kunit_try_catch/3700 [ 93.514381] CPU: 0 UID: 0 PID: 3700 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.514388] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.514389] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.514392] Call Trace: [ 93.514393] [ 93.514395] dump_stack_lvl+0x4f/0x70 [ 93.514400] print_address_description.constprop.0+0x2c/0x3b0 [ 93.514405] ? kasan_bitops_test_and_modify.constprop.0+0x539/0xd80 [kasan_test] [ 93.514415] print_report+0xb9/0x280 [ 93.514419] ? kasan_bitops_test_and_modify.constprop.0+0x539/0xd80 [kasan_test] [ 93.514428] ? kasan_addr_to_slab+0x9/0x90 [ 93.514432] ? kasan_bitops_test_and_modify.constprop.0+0x539/0xd80 [kasan_test] [ 93.514441] kasan_report+0xda/0x110 [ 93.514445] ? kasan_bitops_test_and_modify.constprop.0+0x539/0xd80 [kasan_test] [ 93.514455] kasan_check_range+0xfc/0x1b0 [ 93.514460] kasan_bitops_test_and_modify.constprop.0+0x539/0xd80 [kasan_test] [ 93.514470] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [kasan_test] [ 93.514480] ? __kasan_slab_alloc+0x4a/0x90 [ 93.514483] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.514489] kasan_bitops_generic+0x113/0x1b0 [kasan_test] [ 93.514499] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 93.514508] ? __pfx_read_tsc+0x10/0x10 [ 93.514511] ? ktime_get_ts64+0x7f/0x220 [ 93.514515] ? __pfx___schedule+0x10/0x10 [ 93.514519] kunit_try_run_case+0x175/0x440 [ 93.514522] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.514525] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.514530] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.514532] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.514536] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.514540] kthread+0x3b4/0x780 [ 93.514544] ? __pfx_kthread+0x10/0x10 [ 93.514548] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.514551] ? __pfx_kthread+0x10/0x10 [ 93.514555] ? __pfx_kthread+0x10/0x10 [ 93.514559] ret_from_fork+0x22c/0x300 [ 93.514562] ? __pfx_kthread+0x10/0x10 [ 93.514566] ret_from_fork_asm+0x1a/0x30 [ 93.514571] [ 93.518692] Allocated by task 3700: [ 93.518776] kasan_save_stack+0x1c/0x40 [ 93.518867] kasan_save_track+0x10/0x30 [ 93.518955] __kasan_kmalloc+0xa6/0xb0 [ 93.519041] kasan_bitops_generic+0x84/0x1b0 [kasan_test] [ 93.519159] kunit_try_run_case+0x175/0x440 [ 93.519252] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.519367] kthread+0x3b4/0x780 [ 93.519465] ret_from_fork+0x22c/0x300 [ 93.519552] ret_from_fork_asm+0x1a/0x30 [ 93.519695] The buggy address belongs to the object at ffff88810bd17b80 which belongs to the cache kmalloc-16 of size 16 [ 93.519923] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff88810bd17b80, ffff88810bd17b89) [ 93.520199] The buggy address belongs to the physical page: [ 93.520312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10bd17 [ 93.520503] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.520642] page_type: f5(slab) [ 93.520740] raw: 0017ffffc0000000 ffff888100042640 dead000000000122 0000000000000000 [ 93.520918] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 93.521065] page dumped because: kasan: bad access detected [ 93.521228] Memory state around the buggy address: [ 93.521333] ffff88810bd17a80: fc fc fc fc fc fc fc fc 00 04 fc fc fc fc fc fc [ 93.521492] ffff88810bd17b00: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 93.521631] >ffff88810bd17b80: 00 01 fc fc 00 06 fc fc 00 00 fc fc 00 04 fc fc [ 93.521769] ^ [ 93.521852] ffff88810bd17c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.521990] ffff88810bd17c80: fc fc fc fc 00 04 fc fc fc fc fc fc fc fc fc fc [ 93.522128] ================================================================== [ 93.522288] ================================================================== [ 93.522454] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xcf8/0xd80 [kasan_test] [ 93.522691] Read of size 8 at addr ffff88810bd17b88 by task kunit_try_catch/3700 [ 93.522909] CPU: 0 UID: 0 PID: 3700 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.522916] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.522918] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.522920] Call Trace: [ 93.522922] [ 93.522923] dump_stack_lvl+0x4f/0x70 [ 93.522929] print_address_description.constprop.0+0x2c/0x3b0 [ 93.522933] ? kasan_bitops_test_and_modify.constprop.0+0xcf8/0xd80 [kasan_test] [ 93.522944] print_report+0xb9/0x280 [ 93.522948] ? kasan_bitops_test_and_modify.constprop.0+0xcf8/0xd80 [kasan_test] [ 93.522957] ? kasan_addr_to_slab+0x9/0x90 [ 93.522961] ? kasan_bitops_test_and_modify.constprop.0+0xcf8/0xd80 [kasan_test] [ 93.522970] kasan_report+0xda/0x110 [ 93.522974] ? kasan_bitops_test_and_modify.constprop.0+0xcf8/0xd80 [kasan_test] [ 93.522984] kasan_bitops_test_and_modify.constprop.0+0xcf8/0xd80 [kasan_test] [ 93.522994] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [kasan_test] [ 93.523004] ? __kasan_slab_alloc+0x4a/0x90 [ 93.523008] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.523013] kasan_bitops_generic+0x113/0x1b0 [kasan_test] [ 93.523023] ? __pfx_kasan_bitops_generic+0x10/0x10 [kasan_test] [ 93.523032] ? __pfx_read_tsc+0x10/0x10 [ 93.523035] ? ktime_get_ts64+0x7f/0x220 [ 93.523039] ? __pfx___schedule+0x10/0x10 [ 93.523042] kunit_try_run_case+0x175/0x440 [ 93.523046] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.523049] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.523054] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.523057] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.523061] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.523065] kthread+0x3b4/0x780 [ 93.523068] ? __pfx_kthread+0x10/0x10 [ 93.523072] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.523076] ? __pfx_kthread+0x10/0x10 [ 93.523079] ? __pfx_kthread+0x10/0x10 [ 93.523083] ret_from_fork+0x22c/0x300 [ 93.523087] ? __pfx_kthread+0x10/0x10 [ 93.523090] ret_from_fork_asm+0x1a/0x30 [ 93.523095] [ 93.527076] Allocated by task 3700: [ 93.527158] kasan_save_stack+0x1c/0x40 [ 93.527247] kasan_save_track+0x10/0x30 [ 93.527336] __kasan_kmalloc+0xa6/0xb0 [ 93.527435] kasan_bitops_generic+0x84/0x1b0 [kasan_test] [ 93.527563] kunit_try_run_case+0x175/0x440 [ 93.527656] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.527768] kthread+0x3b4/0x780 [ 93.527848] ret_from_fork+0x22c/0x300 [ 93.527935] ret_from_fork_asm+0x1a/0x30 [ 93.528074] The buggy address belongs to the object at ffff88810bd17b80 which belongs to the cache kmalloc-16 of size 16 [ 93.528305] The buggy address is located 8 bytes inside of allocated 9-byte region [ffff88810bd17b80, ffff88810bd17b89) [ 93.528601] The buggy address belongs to the physical page: [ 93.528714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10bd17 [ 93.528866] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.528996] page_type: f5(slab) [ 93.529075] raw: 0017ffffc0000000 ffff888100042640 dead000000000122 0000000000000000 [ 93.529223] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 93.529369] page dumped because: kasan: bad access detected [ 93.529552] Memory state around the buggy address: [ 93.529653] ffff88810bd17a80: fc fc fc fc fc fc fc fc 00 04 fc fc fc fc fc fc [ 93.529791] ffff88810bd17b00: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 93.529929] >ffff88810bd17b80: 00 01 fc fc 00 06 fc fc 00 00 fc fc 00 04 fc fc [ 93.530068] ^ [ 93.530149] ffff88810bd17c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.530289] ffff88810bd17c80: fc fc fc fc 00 04 fc fc fc fc fc fc fc fc fc fc [ 93.530438] ================================================================== [ 93.530811] ok 63 kasan_bitops_generic [ 93.531091] ok 64 kasan_bitops_tags # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 93.531370] ================================================================== [ 93.531670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8d/0x5400 [kasan_test] [ 93.531837] Read of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.532033] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.532040] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.532042] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.532044] Call Trace: [ 93.532046] [ 93.532048] dump_stack_lvl+0x4f/0x70 [ 93.532054] print_address_description.constprop.0+0x2c/0x3b0 [ 93.532059] ? kasan_atomics_helper+0x4b8d/0x5400 [kasan_test] [ 93.532068] print_report+0xb9/0x280 [ 93.532072] ? kasan_atomics_helper+0x4b8d/0x5400 [kasan_test] [ 93.532080] ? kasan_addr_to_slab+0x9/0x90 [ 93.532084] ? kasan_atomics_helper+0x4b8d/0x5400 [kasan_test] [ 93.532092] kasan_report+0xda/0x110 [ 93.532096] ? kasan_atomics_helper+0x4b8d/0x5400 [kasan_test] [ 93.532105] kasan_atomics_helper+0x4b8d/0x5400 [kasan_test] [ 93.532113] ? kasan_unpoison+0x23/0x50 [ 93.532117] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.532125] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.532131] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.532141] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.532150] ? __pfx_read_tsc+0x10/0x10 [ 93.532154] ? ktime_get_ts64+0x7f/0x220 [ 93.532158] kunit_try_run_case+0x175/0x440 [ 93.532161] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.532165] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.532170] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.532172] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.532176] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.532180] kthread+0x3b4/0x780 [ 93.532184] ? __pfx_kthread+0x10/0x10 [ 93.532187] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.532191] ? __pfx_kthread+0x10/0x10 [ 93.532194] ? __pfx_kthread+0x10/0x10 [ 93.532198] ret_from_fork+0x22c/0x300 [ 93.532202] ? __pfx_kthread+0x10/0x10 [ 93.532205] ret_from_fork_asm+0x1a/0x30 [ 93.532210] [ 93.535997] Allocated by task 3705: [ 93.536080] kasan_save_stack+0x1c/0x40 [ 93.536169] kasan_save_track+0x10/0x30 [ 93.536257] __kasan_kmalloc+0xa6/0xb0 [ 93.536344] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.536475] kunit_try_run_case+0x175/0x440 [ 93.536569] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.536682] kthread+0x3b4/0x780 [ 93.536762] ret_from_fork+0x22c/0x300 [ 93.536849] ret_from_fork_asm+0x1a/0x30 [ 93.536991] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.537218] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.537530] The buggy address belongs to the physical page: [ 93.537646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.537798] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.537937] page_type: f5(slab) [ 93.538015] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.538163] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.538313] page dumped because: kasan: bad access detected [ 93.538508] Memory state around the buggy address: [ 93.538608] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.538746] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.538884] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.539022] ^ [ 93.539122] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.539263] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.539409] ================================================================== [ 93.539596] ================================================================== [ 93.539761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b73/0x5400 [kasan_test] [ 93.539962] Write of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.540204] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.540215] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.540218] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.540222] Call Trace: [ 93.540226] [ 93.540229] dump_stack_lvl+0x4f/0x70 [ 93.540236] print_address_description.constprop.0+0x2c/0x3b0 [ 93.540244] ? kasan_atomics_helper+0x4b73/0x5400 [kasan_test] [ 93.540264] print_report+0xb9/0x280 [ 93.540270] ? kasan_atomics_helper+0x4b73/0x5400 [kasan_test] [ 93.540289] ? kasan_addr_to_slab+0x9/0x90 [ 93.540295] ? kasan_atomics_helper+0x4b73/0x5400 [kasan_test] [ 93.540314] kasan_report+0xda/0x110 [ 93.540321] ? kasan_atomics_helper+0x4b73/0x5400 [kasan_test] [ 93.540341] kasan_atomics_helper+0x4b73/0x5400 [kasan_test] [ 93.540361] ? kasan_unpoison+0x23/0x50 [ 93.540368] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.540387] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.540404] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.540425] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.540443] ? __pfx_read_tsc+0x10/0x10 [ 93.540449] ? ktime_get_ts64+0x7f/0x220 [ 93.540464] kunit_try_run_case+0x175/0x440 [ 93.540471] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.540477] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.540485] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.540491] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.540498] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.540505] kthread+0x3b4/0x780 [ 93.540512] ? __pfx_kthread+0x10/0x10 [ 93.540518] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.540524] ? __pfx_kthread+0x10/0x10 [ 93.540530] ? __pfx_kthread+0x10/0x10 [ 93.540537] ret_from_fork+0x22c/0x300 [ 93.540544] ? __pfx_kthread+0x10/0x10 [ 93.540550] ret_from_fork_asm+0x1a/0x30 [ 93.540559] [ 93.544345] Allocated by task 3705: [ 93.544440] kasan_save_stack+0x1c/0x40 [ 93.544548] kasan_save_track+0x10/0x30 [ 93.544635] __kasan_kmalloc+0xa6/0xb0 [ 93.544720] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.544831] kunit_try_run_case+0x175/0x440 [ 93.544924] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.545035] kthread+0x3b4/0x780 [ 93.545115] ret_from_fork+0x22c/0x300 [ 93.545201] ret_from_fork_asm+0x1a/0x30 [ 93.545340] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.545588] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.545873] The buggy address belongs to the physical page: [ 93.545988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.546142] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.546277] page_type: f5(slab) [ 93.546355] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.546526] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.546672] page dumped because: kasan: bad access detected [ 93.546836] Memory state around the buggy address: [ 93.546936] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.547074] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.547212] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.547350] ^ [ 93.547465] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.547613] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.547750] ================================================================== [ 93.549560] ================================================================== [ 93.549721] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b59/0x5400 [kasan_test] [ 93.549887] Read of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.550082] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.550089] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.550090] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.550093] Call Trace: [ 93.550094] [ 93.550096] dump_stack_lvl+0x4f/0x70 [ 93.550101] print_address_description.constprop.0+0x2c/0x3b0 [ 93.550106] ? kasan_atomics_helper+0x4b59/0x5400 [kasan_test] [ 93.550114] print_report+0xb9/0x280 [ 93.550118] ? kasan_atomics_helper+0x4b59/0x5400 [kasan_test] [ 93.550126] ? kasan_addr_to_slab+0x9/0x90 [ 93.550129] ? kasan_atomics_helper+0x4b59/0x5400 [kasan_test] [ 93.550137] kasan_report+0xda/0x110 [ 93.550141] ? kasan_atomics_helper+0x4b59/0x5400 [kasan_test] [ 93.550149] kasan_atomics_helper+0x4b59/0x5400 [kasan_test] [ 93.550158] ? kasan_unpoison+0x23/0x50 [ 93.550161] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.550169] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.550174] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.550184] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.550193] ? __pfx_read_tsc+0x10/0x10 [ 93.550196] ? ktime_get_ts64+0x7f/0x220 [ 93.550200] kunit_try_run_case+0x175/0x440 [ 93.550203] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.550206] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.550211] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.550213] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.550217] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.550221] kthread+0x3b4/0x780 [ 93.550224] ? __pfx_kthread+0x10/0x10 [ 93.550228] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.550231] ? __pfx_kthread+0x10/0x10 [ 93.550235] ? __pfx_kthread+0x10/0x10 [ 93.550238] ret_from_fork+0x22c/0x300 [ 93.550242] ? __pfx_kthread+0x10/0x10 [ 93.550245] ret_from_fork_asm+0x1a/0x30 [ 93.550250] [ 93.554019] Allocated by task 3705: [ 93.554101] kasan_save_stack+0x1c/0x40 [ 93.554189] kasan_save_track+0x10/0x30 [ 93.554278] __kasan_kmalloc+0xa6/0xb0 [ 93.554364] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.554504] kunit_try_run_case+0x175/0x440 [ 93.554596] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.554708] kthread+0x3b4/0x780 [ 93.554786] ret_from_fork+0x22c/0x300 [ 93.554872] ret_from_fork_asm+0x1a/0x30 [ 93.555012] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.555240] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.555553] The buggy address belongs to the physical page: [ 93.555667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.555819] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.555954] page_type: f5(slab) [ 93.556032] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.556179] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.556326] page dumped because: kasan: bad access detected [ 93.556519] Memory state around the buggy address: [ 93.556619] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.556760] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.556898] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.557035] ^ [ 93.557136] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.557273] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.557420] ================================================================== [ 93.558901] ================================================================== [ 93.559044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3f/0x5400 [kasan_test] [ 93.559220] Write of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.559437] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.559444] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.559446] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.559448] Call Trace: [ 93.559450] [ 93.559452] dump_stack_lvl+0x4f/0x70 [ 93.559457] print_address_description.constprop.0+0x2c/0x3b0 [ 93.559461] ? kasan_atomics_helper+0x4b3f/0x5400 [kasan_test] [ 93.559479] print_report+0xb9/0x280 [ 93.559482] ? kasan_atomics_helper+0x4b3f/0x5400 [kasan_test] [ 93.559490] ? kasan_addr_to_slab+0x9/0x90 [ 93.559494] ? kasan_atomics_helper+0x4b3f/0x5400 [kasan_test] [ 93.559502] kasan_report+0xda/0x110 [ 93.559505] ? kasan_atomics_helper+0x4b3f/0x5400 [kasan_test] [ 93.559514] kasan_atomics_helper+0x4b3f/0x5400 [kasan_test] [ 93.559522] ? kasan_unpoison+0x23/0x50 [ 93.559526] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.559534] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.559539] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.559549] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.559558] ? __pfx_read_tsc+0x10/0x10 [ 93.559561] ? ktime_get_ts64+0x7f/0x220 [ 93.559565] kunit_try_run_case+0x175/0x440 [ 93.559568] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.559571] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.559575] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.559578] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.559582] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.559586] kthread+0x3b4/0x780 [ 93.559589] ? __pfx_kthread+0x10/0x10 [ 93.559593] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.559596] ? __pfx_kthread+0x10/0x10 [ 93.559599] ? __pfx_kthread+0x10/0x10 [ 93.559603] ret_from_fork+0x22c/0x300 [ 93.559606] ? __pfx_kthread+0x10/0x10 [ 93.559610] ret_from_fork_asm+0x1a/0x30 [ 93.559614] [ 93.563344] Allocated by task 3705: [ 93.563438] kasan_save_stack+0x1c/0x40 [ 93.563547] kasan_save_track+0x10/0x30 [ 93.563635] __kasan_kmalloc+0xa6/0xb0 [ 93.563720] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.563828] kunit_try_run_case+0x175/0x440 [ 93.563920] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.564031] kthread+0x3b4/0x780 [ 93.564109] ret_from_fork+0x22c/0x300 [ 93.564195] ret_from_fork_asm+0x1a/0x30 [ 93.564334] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.564591] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.564876] The buggy address belongs to the physical page: [ 93.564988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.565139] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.565274] page_type: f5(slab) [ 93.565358] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.565536] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.565682] page dumped because: kasan: bad access detected [ 93.565844] Memory state around the buggy address: [ 93.565944] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.566082] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.566220] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.566357] ^ [ 93.566479] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.566626] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.566767] ================================================================== [ 93.566930] ================================================================== [ 93.567114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3c1/0x5400 [kasan_test] [ 93.567315] Read of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.567574] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.567585] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.567588] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.567592] Call Trace: [ 93.567595] [ 93.567597] dump_stack_lvl+0x4f/0x70 [ 93.567605] print_address_description.constprop.0+0x2c/0x3b0 [ 93.567613] ? kasan_atomics_helper+0x3c1/0x5400 [kasan_test] [ 93.567633] print_report+0xb9/0x280 [ 93.567640] ? kasan_atomics_helper+0x3c1/0x5400 [kasan_test] [ 93.567658] ? kasan_addr_to_slab+0x9/0x90 [ 93.567664] ? kasan_atomics_helper+0x3c1/0x5400 [kasan_test] [ 93.567683] kasan_report+0xda/0x110 [ 93.567690] ? kasan_atomics_helper+0x3c1/0x5400 [kasan_test] [ 93.567710] kasan_check_range+0xfc/0x1b0 [ 93.567717] kasan_atomics_helper+0x3c1/0x5400 [kasan_test] [ 93.567736] ? kasan_unpoison+0x23/0x50 [ 93.567743] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.567762] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.567771] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.567791] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.567811] ? __pfx_read_tsc+0x10/0x10 [ 93.567816] ? ktime_get_ts64+0x7f/0x220 [ 93.567824] kunit_try_run_case+0x175/0x440 [ 93.567830] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.567837] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.567845] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.567850] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.567857] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.567864] kthread+0x3b4/0x780 [ 93.567871] ? __pfx_kthread+0x10/0x10 [ 93.567877] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.567884] ? __pfx_kthread+0x10/0x10 [ 93.567890] ? __pfx_kthread+0x10/0x10 [ 93.567897] ret_from_fork+0x22c/0x300 [ 93.567904] ? __pfx_kthread+0x10/0x10 [ 93.567910] ret_from_fork_asm+0x1a/0x30 [ 93.567919] [ 93.571783] Allocated by task 3705: [ 93.571865] kasan_save_stack+0x1c/0x40 [ 93.571954] kasan_save_track+0x10/0x30 [ 93.572043] __kasan_kmalloc+0xa6/0xb0 [ 93.572132] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.572242] kunit_try_run_case+0x175/0x440 [ 93.572336] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.572469] kthread+0x3b4/0x780 [ 93.572558] ret_from_fork+0x22c/0x300 [ 93.572645] ret_from_fork_asm+0x1a/0x30 [ 93.572786] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.573016] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.573303] The buggy address belongs to the physical page: [ 93.573425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.573600] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.573735] page_type: f5(slab) [ 93.573812] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.573960] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.574106] page dumped because: kasan: bad access detected [ 93.574269] Memory state around the buggy address: [ 93.574369] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.574539] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.574677] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.574815] ^ [ 93.574916] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.575053] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.575192] ================================================================== [ 93.577051] ================================================================== [ 93.577197] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b25/0x5400 [kasan_test] [ 93.577362] Read of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.577587] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.577594] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.577596] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.577598] Call Trace: [ 93.577600] [ 93.577601] dump_stack_lvl+0x4f/0x70 [ 93.577606] print_address_description.constprop.0+0x2c/0x3b0 [ 93.577611] ? kasan_atomics_helper+0x4b25/0x5400 [kasan_test] [ 93.577619] print_report+0xb9/0x280 [ 93.577623] ? kasan_atomics_helper+0x4b25/0x5400 [kasan_test] [ 93.577631] ? kasan_addr_to_slab+0x9/0x90 [ 93.577634] ? kasan_atomics_helper+0x4b25/0x5400 [kasan_test] [ 93.577642] kasan_report+0xda/0x110 [ 93.577646] ? kasan_atomics_helper+0x4b25/0x5400 [kasan_test] [ 93.577655] kasan_atomics_helper+0x4b25/0x5400 [kasan_test] [ 93.577663] ? kasan_unpoison+0x23/0x50 [ 93.577666] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.577675] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.577680] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.577689] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.577698] ? __pfx_read_tsc+0x10/0x10 [ 93.577701] ? ktime_get_ts64+0x7f/0x220 [ 93.577705] kunit_try_run_case+0x175/0x440 [ 93.577708] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.577711] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.577716] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.577719] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.577722] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.577726] kthread+0x3b4/0x780 [ 93.577730] ? __pfx_kthread+0x10/0x10 [ 93.577733] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.577736] ? __pfx_kthread+0x10/0x10 [ 93.577740] ? __pfx_kthread+0x10/0x10 [ 93.577743] ret_from_fork+0x22c/0x300 [ 93.577747] ? __pfx_kthread+0x10/0x10 [ 93.577750] ret_from_fork_asm+0x1a/0x30 [ 93.577755] [ 93.581481] Allocated by task 3705: [ 93.581563] kasan_save_stack+0x1c/0x40 [ 93.581651] kasan_save_track+0x10/0x30 [ 93.581739] __kasan_kmalloc+0xa6/0xb0 [ 93.581825] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.581933] kunit_try_run_case+0x175/0x440 [ 93.582025] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.582141] kthread+0x3b4/0x780 [ 93.582220] ret_from_fork+0x22c/0x300 [ 93.582305] ret_from_fork_asm+0x1a/0x30 [ 93.582455] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.582694] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.582979] The buggy address belongs to the physical page: [ 93.583091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.583245] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.583379] page_type: f5(slab) [ 93.583477] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.583625] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.583770] page dumped because: kasan: bad access detected [ 93.583933] Memory state around the buggy address: [ 93.584033] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.584171] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.584309] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.584466] ^ [ 93.584576] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.584714] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.584852] ================================================================== [ 93.586510] ================================================================== [ 93.586684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x480/0x5400 [kasan_test] [ 93.586851] Write of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.587060] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.587067] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.587069] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.587071] Call Trace: [ 93.587073] [ 93.587075] dump_stack_lvl+0x4f/0x70 [ 93.587080] print_address_description.constprop.0+0x2c/0x3b0 [ 93.587084] ? kasan_atomics_helper+0x480/0x5400 [kasan_test] [ 93.587093] print_report+0xb9/0x280 [ 93.587097] ? kasan_atomics_helper+0x480/0x5400 [kasan_test] [ 93.587105] ? kasan_addr_to_slab+0x9/0x90 [ 93.587108] ? kasan_atomics_helper+0x480/0x5400 [kasan_test] [ 93.587117] kasan_report+0xda/0x110 [ 93.587120] ? kasan_atomics_helper+0x480/0x5400 [kasan_test] [ 93.587129] kasan_check_range+0xfc/0x1b0 [ 93.587134] kasan_atomics_helper+0x480/0x5400 [kasan_test] [ 93.587142] ? kasan_unpoison+0x23/0x50 [ 93.587146] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.587154] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.587160] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.587169] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.587179] ? __pfx_read_tsc+0x10/0x10 [ 93.587182] ? ktime_get_ts64+0x7f/0x220 [ 93.587186] kunit_try_run_case+0x175/0x440 [ 93.587189] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.587192] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.587197] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.587200] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.587204] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.587207] kthread+0x3b4/0x780 [ 93.587211] ? __pfx_kthread+0x10/0x10 [ 93.587215] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.587218] ? __pfx_kthread+0x10/0x10 [ 93.587222] ? __pfx_kthread+0x10/0x10 [ 93.587225] ret_from_fork+0x22c/0x300 [ 93.587229] ? __pfx_kthread+0x10/0x10 [ 93.587232] ret_from_fork_asm+0x1a/0x30 [ 93.587237] [ 93.591059] Allocated by task 3705: [ 93.591143] kasan_save_stack+0x1c/0x40 [ 93.591231] kasan_save_track+0x10/0x30 [ 93.591320] __kasan_kmalloc+0xa6/0xb0 [ 93.591416] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.591537] kunit_try_run_case+0x175/0x440 [ 93.591631] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.591743] kthread+0x3b4/0x780 [ 93.591821] ret_from_fork+0x22c/0x300 [ 93.591911] ret_from_fork_asm+0x1a/0x30 [ 93.592050] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.592277] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.592592] The buggy address belongs to the physical page: [ 93.592704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.592857] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.592992] page_type: f5(slab) [ 93.593070] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.593218] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.593364] page dumped because: kasan: bad access detected [ 93.593565] Memory state around the buggy address: [ 93.593665] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.593803] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.593941] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.594079] ^ [ 93.594179] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.594317] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.594484] ================================================================== [ 93.595892] ================================================================== [ 93.596038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b0b/0x5400 [kasan_test] [ 93.596204] Write of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.596404] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.596411] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.596412] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.596415] Call Trace: [ 93.596416] [ 93.596418] dump_stack_lvl+0x4f/0x70 [ 93.596426] print_address_description.constprop.0+0x2c/0x3b0 [ 93.596442] ? kasan_atomics_helper+0x4b0b/0x5400 [kasan_test] [ 93.596453] print_report+0xb9/0x280 [ 93.596466] ? kasan_atomics_helper+0x4b0b/0x5400 [kasan_test] [ 93.596474] ? kasan_addr_to_slab+0x9/0x90 [ 93.596477] ? kasan_atomics_helper+0x4b0b/0x5400 [kasan_test] [ 93.596485] kasan_report+0xda/0x110 [ 93.596489] ? kasan_atomics_helper+0x4b0b/0x5400 [kasan_test] [ 93.596498] kasan_atomics_helper+0x4b0b/0x5400 [kasan_test] [ 93.596507] ? kasan_unpoison+0x23/0x50 [ 93.596510] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.596518] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.596524] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.596533] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.596543] ? __pfx_read_tsc+0x10/0x10 [ 93.596546] ? ktime_get_ts64+0x7f/0x220 [ 93.596550] kunit_try_run_case+0x175/0x440 [ 93.596553] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.596556] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.596562] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.596564] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.596568] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.596572] kthread+0x3b4/0x780 [ 93.596576] ? __pfx_kthread+0x10/0x10 [ 93.596579] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.596583] ? __pfx_kthread+0x10/0x10 [ 93.596586] ? __pfx_kthread+0x10/0x10 [ 93.596590] ret_from_fork+0x22c/0x300 [ 93.596594] ? __pfx_kthread+0x10/0x10 [ 93.596597] ret_from_fork_asm+0x1a/0x30 [ 93.596602] [ 93.600328] Allocated by task 3705: [ 93.600423] kasan_save_stack+0x1c/0x40 [ 93.600523] kasan_save_track+0x10/0x30 [ 93.600611] __kasan_kmalloc+0xa6/0xb0 [ 93.600697] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.600807] kunit_try_run_case+0x175/0x440 [ 93.600901] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.601014] kthread+0x3b4/0x780 [ 93.601095] ret_from_fork+0x22c/0x300 [ 93.601183] ret_from_fork_asm+0x1a/0x30 [ 93.601324] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.601573] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.601861] The buggy address belongs to the physical page: [ 93.601973] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.602125] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.602260] page_type: f5(slab) [ 93.602338] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.602507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.602666] page dumped because: kasan: bad access detected [ 93.602827] Memory state around the buggy address: [ 93.602928] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.603066] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.603203] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.603340] ^ [ 93.603472] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.603619] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.603756] ================================================================== [ 93.605293] ================================================================== [ 93.605466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x543/0x5400 [kasan_test] [ 93.605641] Write of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.605837] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.605844] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.605846] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.605848] Call Trace: [ 93.605850] [ 93.605851] dump_stack_lvl+0x4f/0x70 [ 93.605856] print_address_description.constprop.0+0x2c/0x3b0 [ 93.605861] ? kasan_atomics_helper+0x543/0x5400 [kasan_test] [ 93.605870] print_report+0xb9/0x280 [ 93.605874] ? kasan_atomics_helper+0x543/0x5400 [kasan_test] [ 93.605882] ? kasan_addr_to_slab+0x9/0x90 [ 93.605885] ? kasan_atomics_helper+0x543/0x5400 [kasan_test] [ 93.605893] kasan_report+0xda/0x110 [ 93.605897] ? kasan_atomics_helper+0x543/0x5400 [kasan_test] [ 93.605906] kasan_check_range+0xfc/0x1b0 [ 93.605910] kasan_atomics_helper+0x543/0x5400 [kasan_test] [ 93.605918] ? kasan_unpoison+0x23/0x50 [ 93.605922] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.605931] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.605936] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.605946] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.605955] ? __pfx_read_tsc+0x10/0x10 [ 93.605958] ? ktime_get_ts64+0x7f/0x220 [ 93.605962] kunit_try_run_case+0x175/0x440 [ 93.605965] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.605969] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.605973] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.605976] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.605980] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.605984] kthread+0x3b4/0x780 [ 93.605987] ? __pfx_kthread+0x10/0x10 [ 93.605991] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.605994] ? __pfx_kthread+0x10/0x10 [ 93.605998] ? __pfx_kthread+0x10/0x10 [ 93.606001] ret_from_fork+0x22c/0x300 [ 93.606005] ? __pfx_kthread+0x10/0x10 [ 93.606008] ret_from_fork_asm+0x1a/0x30 [ 93.606013] [ 93.609834] Allocated by task 3705: [ 93.609918] kasan_save_stack+0x1c/0x40 [ 93.610007] kasan_save_track+0x10/0x30 [ 93.610096] __kasan_kmalloc+0xa6/0xb0 [ 93.610182] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.610292] kunit_try_run_case+0x175/0x440 [ 93.610387] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.610520] kthread+0x3b4/0x780 [ 93.610599] ret_from_fork+0x22c/0x300 [ 93.610688] ret_from_fork_asm+0x1a/0x30 [ 93.610828] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.611055] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.611346] The buggy address belongs to the physical page: [ 93.611479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.611631] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.611767] page_type: f5(slab) [ 93.611846] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.611994] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.612141] page dumped because: kasan: bad access detected [ 93.612304] Memory state around the buggy address: [ 93.612407] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.612566] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.612715] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.612858] ^ [ 93.612959] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.613107] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.613245] ================================================================== [ 93.614657] ================================================================== [ 93.614800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5da/0x5400 [kasan_test] [ 93.614966] Write of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.615162] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.615168] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.615170] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.615172] Call Trace: [ 93.615174] [ 93.615176] dump_stack_lvl+0x4f/0x70 [ 93.615180] print_address_description.constprop.0+0x2c/0x3b0 [ 93.615185] ? kasan_atomics_helper+0x5da/0x5400 [kasan_test] [ 93.615194] print_report+0xb9/0x280 [ 93.615198] ? kasan_atomics_helper+0x5da/0x5400 [kasan_test] [ 93.615206] ? kasan_addr_to_slab+0x9/0x90 [ 93.615209] ? kasan_atomics_helper+0x5da/0x5400 [kasan_test] [ 93.615217] kasan_report+0xda/0x110 [ 93.615221] ? kasan_atomics_helper+0x5da/0x5400 [kasan_test] [ 93.615230] kasan_check_range+0xfc/0x1b0 [ 93.615234] kasan_atomics_helper+0x5da/0x5400 [kasan_test] [ 93.615243] ? kasan_unpoison+0x23/0x50 [ 93.615247] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.615255] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.615260] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.615270] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.615280] ? __pfx_read_tsc+0x10/0x10 [ 93.615282] ? ktime_get_ts64+0x7f/0x220 [ 93.615286] kunit_try_run_case+0x175/0x440 [ 93.615290] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.615293] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.615297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.615300] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.615304] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.615308] kthread+0x3b4/0x780 [ 93.615311] ? __pfx_kthread+0x10/0x10 [ 93.615315] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.615318] ? __pfx_kthread+0x10/0x10 [ 93.615322] ? __pfx_kthread+0x10/0x10 [ 93.615325] ret_from_fork+0x22c/0x300 [ 93.615329] ? __pfx_kthread+0x10/0x10 [ 93.615333] ret_from_fork_asm+0x1a/0x30 [ 93.615337] [ 93.619148] Allocated by task 3705: [ 93.619231] kasan_save_stack+0x1c/0x40 [ 93.619320] kasan_save_track+0x10/0x30 [ 93.619409] __kasan_kmalloc+0xa6/0xb0 [ 93.619516] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.619625] kunit_try_run_case+0x175/0x440 [ 93.619717] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.619830] kthread+0x3b4/0x780 [ 93.619909] ret_from_fork+0x22c/0x300 [ 93.619996] ret_from_fork_asm+0x1a/0x30 [ 93.620138] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.620367] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.620678] The buggy address belongs to the physical page: [ 93.620793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.620946] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.621082] page_type: f5(slab) [ 93.621160] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.621308] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.621474] page dumped because: kasan: bad access detected [ 93.621638] Memory state around the buggy address: [ 93.621740] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.621879] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.622018] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.622156] ^ [ 93.622260] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.622400] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.622560] ================================================================== [ 93.623953] ================================================================== [ 93.624118] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x671/0x5400 [kasan_test] [ 93.624284] Write of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.624500] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.624507] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.624509] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.624511] Call Trace: [ 93.624513] [ 93.624514] dump_stack_lvl+0x4f/0x70 [ 93.624519] print_address_description.constprop.0+0x2c/0x3b0 [ 93.624524] ? kasan_atomics_helper+0x671/0x5400 [kasan_test] [ 93.624533] print_report+0xb9/0x280 [ 93.624536] ? kasan_atomics_helper+0x671/0x5400 [kasan_test] [ 93.624544] ? kasan_addr_to_slab+0x9/0x90 [ 93.624548] ? kasan_atomics_helper+0x671/0x5400 [kasan_test] [ 93.624556] kasan_report+0xda/0x110 [ 93.624560] ? kasan_atomics_helper+0x671/0x5400 [kasan_test] [ 93.624569] kasan_check_range+0xfc/0x1b0 [ 93.624573] kasan_atomics_helper+0x671/0x5400 [kasan_test] [ 93.624581] ? kasan_unpoison+0x23/0x50 [ 93.624585] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.624593] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.624598] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.624608] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.624617] ? __pfx_read_tsc+0x10/0x10 [ 93.624620] ? ktime_get_ts64+0x7f/0x220 [ 93.624624] kunit_try_run_case+0x175/0x440 [ 93.624628] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.624631] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.624636] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.624639] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.624643] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.624646] kthread+0x3b4/0x780 [ 93.624650] ? __pfx_kthread+0x10/0x10 [ 93.624654] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.624657] ? __pfx_kthread+0x10/0x10 [ 93.624661] ? __pfx_kthread+0x10/0x10 [ 93.624664] ret_from_fork+0x22c/0x300 [ 93.624668] ? __pfx_kthread+0x10/0x10 [ 93.624671] ret_from_fork_asm+0x1a/0x30 [ 93.624676] [ 93.628488] Allocated by task 3705: [ 93.628572] kasan_save_stack+0x1c/0x40 [ 93.628670] kasan_save_track+0x10/0x30 [ 93.628757] __kasan_kmalloc+0xa6/0xb0 [ 93.628843] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.628953] kunit_try_run_case+0x175/0x440 [ 93.629046] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.629167] kthread+0x3b4/0x780 [ 93.629246] ret_from_fork+0x22c/0x300 [ 93.629333] ret_from_fork_asm+0x1a/0x30 [ 93.629473] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.629701] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.629991] The buggy address belongs to the physical page: [ 93.630105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.630263] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.630399] page_type: f5(slab) [ 93.630477] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.630625] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.630773] page dumped because: kasan: bad access detected [ 93.630937] Memory state around the buggy address: [ 93.631038] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.631177] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.631316] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.631454] ^ [ 93.631556] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.631693] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.631834] ================================================================== [ 93.633416] ================================================================== [ 93.633571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x707/0x5400 [kasan_test] [ 93.633745] Write of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.633940] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.633946] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.633948] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.633950] Call Trace: [ 93.633952] [ 93.633953] dump_stack_lvl+0x4f/0x70 [ 93.633958] print_address_description.constprop.0+0x2c/0x3b0 [ 93.633963] ? kasan_atomics_helper+0x707/0x5400 [kasan_test] [ 93.633971] print_report+0xb9/0x280 [ 93.633975] ? kasan_atomics_helper+0x707/0x5400 [kasan_test] [ 93.633983] ? kasan_addr_to_slab+0x9/0x90 [ 93.633986] ? kasan_atomics_helper+0x707/0x5400 [kasan_test] [ 93.633994] kasan_report+0xda/0x110 [ 93.633998] ? kasan_atomics_helper+0x707/0x5400 [kasan_test] [ 93.634006] kasan_check_range+0xfc/0x1b0 [ 93.634011] kasan_atomics_helper+0x707/0x5400 [kasan_test] [ 93.634020] ? kasan_unpoison+0x23/0x50 [ 93.634023] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.634032] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.634037] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.634046] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.634055] ? __pfx_read_tsc+0x10/0x10 [ 93.634058] ? ktime_get_ts64+0x7f/0x220 [ 93.634062] kunit_try_run_case+0x175/0x440 [ 93.634065] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.634068] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.634073] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.634075] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.634079] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.634083] kthread+0x3b4/0x780 [ 93.634086] ? __pfx_kthread+0x10/0x10 [ 93.634090] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.634093] ? __pfx_kthread+0x10/0x10 [ 93.634096] ? __pfx_kthread+0x10/0x10 [ 93.634100] ret_from_fork+0x22c/0x300 [ 93.634103] ? __pfx_kthread+0x10/0x10 [ 93.634107] ret_from_fork_asm+0x1a/0x30 [ 93.634111] [ 93.637980] Allocated by task 3705: [ 93.638062] kasan_save_stack+0x1c/0x40 [ 93.638153] kasan_save_track+0x10/0x30 [ 93.638241] __kasan_kmalloc+0xa6/0xb0 [ 93.638327] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.638446] kunit_try_run_case+0x175/0x440 [ 93.638550] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.638666] kthread+0x3b4/0x780 [ 93.638746] ret_from_fork+0x22c/0x300 [ 93.638833] ret_from_fork_asm+0x1a/0x30 [ 93.638973] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.639201] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.639512] The buggy address belongs to the physical page: [ 93.639625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.639778] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.639917] page_type: f5(slab) [ 93.639996] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.640144] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.640291] page dumped because: kasan: bad access detected [ 93.640474] Memory state around the buggy address: [ 93.640575] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.640715] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.640853] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.640991] ^ [ 93.641092] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.641231] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.641368] ================================================================== [ 93.641540] ================================================================== [ 93.641706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x79d/0x5400 [kasan_test] [ 93.641911] Write of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.642153] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.642164] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.642167] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.642171] Call Trace: [ 93.642174] [ 93.642176] dump_stack_lvl+0x4f/0x70 [ 93.642184] print_address_description.constprop.0+0x2c/0x3b0 [ 93.642192] ? kasan_atomics_helper+0x79d/0x5400 [kasan_test] [ 93.642211] print_report+0xb9/0x280 [ 93.642218] ? kasan_atomics_helper+0x79d/0x5400 [kasan_test] [ 93.642237] ? kasan_addr_to_slab+0x9/0x90 [ 93.642244] ? kasan_atomics_helper+0x79d/0x5400 [kasan_test] [ 93.642262] kasan_report+0xda/0x110 [ 93.642270] ? kasan_atomics_helper+0x79d/0x5400 [kasan_test] [ 93.642290] kasan_check_range+0xfc/0x1b0 [ 93.642297] kasan_atomics_helper+0x79d/0x5400 [kasan_test] [ 93.642317] ? kasan_unpoison+0x23/0x50 [ 93.642323] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.642342] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.642351] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.642371] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.642391] ? __pfx_read_tsc+0x10/0x10 [ 93.642397] ? ktime_get_ts64+0x7f/0x220 [ 93.642404] kunit_try_run_case+0x175/0x440 [ 93.642410] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.642417] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.642425] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.642438] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.642445] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.642452] kthread+0x3b4/0x780 [ 93.642459] ? __pfx_kthread+0x10/0x10 [ 93.642465] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.642472] ? __pfx_kthread+0x10/0x10 [ 93.642487] ? __pfx_kthread+0x10/0x10 [ 93.642494] ret_from_fork+0x22c/0x300 [ 93.642500] ? __pfx_kthread+0x10/0x10 [ 93.642506] ret_from_fork_asm+0x1a/0x30 [ 93.642515] [ 93.646350] Allocated by task 3705: [ 93.646432] kasan_save_stack+0x1c/0x40 [ 93.646522] kasan_save_track+0x10/0x30 [ 93.646612] __kasan_kmalloc+0xa6/0xb0 [ 93.646708] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.646818] kunit_try_run_case+0x175/0x440 [ 93.646910] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.647021] kthread+0x3b4/0x780 [ 93.647100] ret_from_fork+0x22c/0x300 [ 93.647188] ret_from_fork_asm+0x1a/0x30 [ 93.647328] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.647594] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.647880] The buggy address belongs to the physical page: [ 93.647992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.648144] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.648278] page_type: f5(slab) [ 93.648356] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.648542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.648688] page dumped because: kasan: bad access detected [ 93.648851] Memory state around the buggy address: [ 93.648951] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.649090] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.649238] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.649376] ^ [ 93.649498] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.649636] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.649773] ================================================================== [ 93.651610] ================================================================== [ 93.651756] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x834/0x5400 [kasan_test] [ 93.651925] Write of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.652124] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.652131] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.652133] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.652135] Call Trace: [ 93.652137] [ 93.652139] dump_stack_lvl+0x4f/0x70 [ 93.652143] print_address_description.constprop.0+0x2c/0x3b0 [ 93.652148] ? kasan_atomics_helper+0x834/0x5400 [kasan_test] [ 93.652157] print_report+0xb9/0x280 [ 93.652161] ? kasan_atomics_helper+0x834/0x5400 [kasan_test] [ 93.652169] ? kasan_addr_to_slab+0x9/0x90 [ 93.652172] ? kasan_atomics_helper+0x834/0x5400 [kasan_test] [ 93.652180] kasan_report+0xda/0x110 [ 93.652184] ? kasan_atomics_helper+0x834/0x5400 [kasan_test] [ 93.652193] kasan_check_range+0xfc/0x1b0 [ 93.652197] kasan_atomics_helper+0x834/0x5400 [kasan_test] [ 93.652206] ? kasan_unpoison+0x23/0x50 [ 93.652209] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.652218] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.652223] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.652233] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.652242] ? __pfx_read_tsc+0x10/0x10 [ 93.652245] ? ktime_get_ts64+0x7f/0x220 [ 93.652248] kunit_try_run_case+0x175/0x440 [ 93.652252] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.652255] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.652260] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.652262] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.652266] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.652270] kthread+0x3b4/0x780 [ 93.652274] ? __pfx_kthread+0x10/0x10 [ 93.652277] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.652281] ? __pfx_kthread+0x10/0x10 [ 93.652284] ? __pfx_kthread+0x10/0x10 [ 93.652288] ret_from_fork+0x22c/0x300 [ 93.652291] ? __pfx_kthread+0x10/0x10 [ 93.652295] ret_from_fork_asm+0x1a/0x30 [ 93.652299] [ 93.656117] Allocated by task 3705: [ 93.656201] kasan_save_stack+0x1c/0x40 [ 93.656292] kasan_save_track+0x10/0x30 [ 93.656380] __kasan_kmalloc+0xa6/0xb0 [ 93.656485] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.656594] kunit_try_run_case+0x175/0x440 [ 93.656696] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.656807] kthread+0x3b4/0x780 [ 93.656888] ret_from_fork+0x22c/0x300 [ 93.656974] ret_from_fork_asm+0x1a/0x30 [ 93.657115] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.657352] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.657640] The buggy address belongs to the physical page: [ 93.657754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.657906] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.658041] page_type: f5(slab) [ 93.658119] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.658268] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.658414] page dumped because: kasan: bad access detected [ 93.658581] Memory state around the buggy address: [ 93.658682] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.658821] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.658963] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.659101] ^ [ 93.659203] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.659341] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.659479] ================================================================== [ 93.660983] ================================================================== [ 93.661126] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8cb/0x5400 [kasan_test] [ 93.661290] Write of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.661517] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.661524] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.661526] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.661528] Call Trace: [ 93.661530] [ 93.661531] dump_stack_lvl+0x4f/0x70 [ 93.661536] print_address_description.constprop.0+0x2c/0x3b0 [ 93.661540] ? kasan_atomics_helper+0x8cb/0x5400 [kasan_test] [ 93.661549] print_report+0xb9/0x280 [ 93.661553] ? kasan_atomics_helper+0x8cb/0x5400 [kasan_test] [ 93.661561] ? kasan_addr_to_slab+0x9/0x90 [ 93.661564] ? kasan_atomics_helper+0x8cb/0x5400 [kasan_test] [ 93.661572] kasan_report+0xda/0x110 [ 93.661576] ? kasan_atomics_helper+0x8cb/0x5400 [kasan_test] [ 93.661584] kasan_check_range+0xfc/0x1b0 [ 93.661588] kasan_atomics_helper+0x8cb/0x5400 [kasan_test] [ 93.661596] ? kasan_unpoison+0x23/0x50 [ 93.661600] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.661608] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.661613] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.661623] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.661632] ? __pfx_read_tsc+0x10/0x10 [ 93.661635] ? ktime_get_ts64+0x7f/0x220 [ 93.661639] kunit_try_run_case+0x175/0x440 [ 93.661642] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.661645] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.661650] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.661653] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.661656] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.661660] kthread+0x3b4/0x780 [ 93.661664] ? __pfx_kthread+0x10/0x10 [ 93.661667] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.661670] ? __pfx_kthread+0x10/0x10 [ 93.661674] ? __pfx_kthread+0x10/0x10 [ 93.661677] ret_from_fork+0x22c/0x300 [ 93.661681] ? __pfx_kthread+0x10/0x10 [ 93.661684] ret_from_fork_asm+0x1a/0x30 [ 93.661689] [ 93.665527] Allocated by task 3705: [ 93.665609] kasan_save_stack+0x1c/0x40 [ 93.665698] kasan_save_track+0x10/0x30 [ 93.665786] __kasan_kmalloc+0xa6/0xb0 [ 93.665872] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.665980] kunit_try_run_case+0x175/0x440 [ 93.666077] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.666188] kthread+0x3b4/0x780 [ 93.666269] ret_from_fork+0x22c/0x300 [ 93.666355] ret_from_fork_asm+0x1a/0x30 [ 93.666534] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.666761] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.667047] The buggy address belongs to the physical page: [ 93.667158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.667311] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.667466] page_type: f5(slab) [ 93.667554] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.667703] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.667849] page dumped because: kasan: bad access detected [ 93.668011] Memory state around the buggy address: [ 93.668112] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.668251] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.668391] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.668566] ^ [ 93.668666] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.668808] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.668945] ================================================================== [ 93.670558] ================================================================== [ 93.670702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x962/0x5400 [kasan_test] [ 93.670866] Write of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.671062] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.671069] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.671071] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.671073] Call Trace: [ 93.671075] [ 93.671076] dump_stack_lvl+0x4f/0x70 [ 93.671082] print_address_description.constprop.0+0x2c/0x3b0 [ 93.671086] ? kasan_atomics_helper+0x962/0x5400 [kasan_test] [ 93.671095] print_report+0xb9/0x280 [ 93.671099] ? kasan_atomics_helper+0x962/0x5400 [kasan_test] [ 93.671107] ? kasan_addr_to_slab+0x9/0x90 [ 93.671110] ? kasan_atomics_helper+0x962/0x5400 [kasan_test] [ 93.671119] kasan_report+0xda/0x110 [ 93.671122] ? kasan_atomics_helper+0x962/0x5400 [kasan_test] [ 93.671131] kasan_check_range+0xfc/0x1b0 [ 93.671136] kasan_atomics_helper+0x962/0x5400 [kasan_test] [ 93.671144] ? kasan_unpoison+0x23/0x50 [ 93.671148] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.671157] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.671162] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.671171] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.671181] ? __pfx_read_tsc+0x10/0x10 [ 93.671184] ? ktime_get_ts64+0x7f/0x220 [ 93.671188] kunit_try_run_case+0x175/0x440 [ 93.671191] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.671194] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.671199] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.671202] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.671205] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.671209] kthread+0x3b4/0x780 [ 93.671213] ? __pfx_kthread+0x10/0x10 [ 93.671216] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.671220] ? __pfx_kthread+0x10/0x10 [ 93.671223] ? __pfx_kthread+0x10/0x10 [ 93.671227] ret_from_fork+0x22c/0x300 [ 93.671230] ? __pfx_kthread+0x10/0x10 [ 93.671234] ret_from_fork_asm+0x1a/0x30 [ 93.671239] [ 93.675070] Allocated by task 3705: [ 93.675154] kasan_save_stack+0x1c/0x40 [ 93.675248] kasan_save_track+0x10/0x30 [ 93.675337] __kasan_kmalloc+0xa6/0xb0 [ 93.675423] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.675553] kunit_try_run_case+0x175/0x440 [ 93.675646] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.675761] kthread+0x3b4/0x780 [ 93.675840] ret_from_fork+0x22c/0x300 [ 93.675929] ret_from_fork_asm+0x1a/0x30 [ 93.676071] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.676300] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.676607] The buggy address belongs to the physical page: [ 93.676721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.676873] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.677009] page_type: f5(slab) [ 93.677088] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.677237] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.677383] page dumped because: kasan: bad access detected [ 93.677567] Memory state around the buggy address: [ 93.677669] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.677807] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.677946] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.678084] ^ [ 93.678188] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.678327] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.678485] ================================================================== [ 93.679883] ================================================================== [ 93.680047] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x9f9/0x5400 [kasan_test] [ 93.680211] Write of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.680407] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.680413] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.680415] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.680417] Call Trace: [ 93.680419] [ 93.680420] dump_stack_lvl+0x4f/0x70 [ 93.680425] print_address_description.constprop.0+0x2c/0x3b0 [ 93.680439] ? kasan_atomics_helper+0x9f9/0x5400 [kasan_test] [ 93.680448] print_report+0xb9/0x280 [ 93.680451] ? kasan_atomics_helper+0x9f9/0x5400 [kasan_test] [ 93.680460] ? kasan_addr_to_slab+0x9/0x90 [ 93.680463] ? kasan_atomics_helper+0x9f9/0x5400 [kasan_test] [ 93.680480] kasan_report+0xda/0x110 [ 93.680484] ? kasan_atomics_helper+0x9f9/0x5400 [kasan_test] [ 93.680493] kasan_check_range+0xfc/0x1b0 [ 93.680497] kasan_atomics_helper+0x9f9/0x5400 [kasan_test] [ 93.680506] ? kasan_unpoison+0x23/0x50 [ 93.680509] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.680518] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.680523] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.680533] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.680542] ? __pfx_read_tsc+0x10/0x10 [ 93.680545] ? ktime_get_ts64+0x7f/0x220 [ 93.680549] kunit_try_run_case+0x175/0x440 [ 93.680552] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.680555] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.680560] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.680563] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.680567] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.680570] kthread+0x3b4/0x780 [ 93.680574] ? __pfx_kthread+0x10/0x10 [ 93.680578] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.680581] ? __pfx_kthread+0x10/0x10 [ 93.680585] ? __pfx_kthread+0x10/0x10 [ 93.680588] ret_from_fork+0x22c/0x300 [ 93.680592] ? __pfx_kthread+0x10/0x10 [ 93.680595] ret_from_fork_asm+0x1a/0x30 [ 93.680600] [ 93.684377] Allocated by task 3705: [ 93.684478] kasan_save_stack+0x1c/0x40 [ 93.684570] kasan_save_track+0x10/0x30 [ 93.684659] __kasan_kmalloc+0xa6/0xb0 [ 93.684756] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.684864] kunit_try_run_case+0x175/0x440 [ 93.684957] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.685068] kthread+0x3b4/0x780 [ 93.685146] ret_from_fork+0x22c/0x300 [ 93.685232] ret_from_fork_asm+0x1a/0x30 [ 93.685381] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.685609] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.685899] The buggy address belongs to the physical page: [ 93.686012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.686167] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.686303] page_type: f5(slab) [ 93.686380] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.686529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.686676] page dumped because: kasan: bad access detected [ 93.686842] Memory state around the buggy address: [ 93.686943] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.687082] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.687220] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.687360] ^ [ 93.687463] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.687601] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.687743] ================================================================== [ 93.689134] ================================================================== [ 93.689278] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa93/0x5400 [kasan_test] [ 93.689453] Write of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.689671] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.689678] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.689679] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.689682] Call Trace: [ 93.689683] [ 93.689685] dump_stack_lvl+0x4f/0x70 [ 93.689690] print_address_description.constprop.0+0x2c/0x3b0 [ 93.689694] ? kasan_atomics_helper+0xa93/0x5400 [kasan_test] [ 93.689703] print_report+0xb9/0x280 [ 93.689707] ? kasan_atomics_helper+0xa93/0x5400 [kasan_test] [ 93.689715] ? kasan_addr_to_slab+0x9/0x90 [ 93.689718] ? kasan_atomics_helper+0xa93/0x5400 [kasan_test] [ 93.689726] kasan_report+0xda/0x110 [ 93.689729] ? kasan_atomics_helper+0xa93/0x5400 [kasan_test] [ 93.689738] kasan_check_range+0xfc/0x1b0 [ 93.689742] kasan_atomics_helper+0xa93/0x5400 [kasan_test] [ 93.689750] ? kasan_unpoison+0x23/0x50 [ 93.689754] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.689762] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.689767] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.689777] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.689786] ? __pfx_read_tsc+0x10/0x10 [ 93.689789] ? ktime_get_ts64+0x7f/0x220 [ 93.689793] kunit_try_run_case+0x175/0x440 [ 93.689796] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.689799] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.689804] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.689807] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.689810] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.689814] kthread+0x3b4/0x780 [ 93.689818] ? __pfx_kthread+0x10/0x10 [ 93.689821] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.689825] ? __pfx_kthread+0x10/0x10 [ 93.689828] ? __pfx_kthread+0x10/0x10 [ 93.689831] ret_from_fork+0x22c/0x300 [ 93.689835] ? __pfx_kthread+0x10/0x10 [ 93.689838] ret_from_fork_asm+0x1a/0x30 [ 93.689843] [ 93.693675] Allocated by task 3705: [ 93.693757] kasan_save_stack+0x1c/0x40 [ 93.693845] kasan_save_track+0x10/0x30 [ 93.693932] __kasan_kmalloc+0xa6/0xb0 [ 93.694018] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.694126] kunit_try_run_case+0x175/0x440 [ 93.694218] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.694330] kthread+0x3b4/0x780 [ 93.694420] ret_from_fork+0x22c/0x300 [ 93.694536] ret_from_fork_asm+0x1a/0x30 [ 93.694676] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.694903] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.695188] The buggy address belongs to the physical page: [ 93.695311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.695485] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.695621] page_type: f5(slab) [ 93.695701] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.695849] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.695995] page dumped because: kasan: bad access detected [ 93.696162] Memory state around the buggy address: [ 93.696264] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.696406] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.696544] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.696684] ^ [ 93.696787] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.696926] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.697067] ================================================================== [ 93.697216] ================================================================== [ 93.697381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb34/0x5400 [kasan_test] [ 93.697601] Write of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.697841] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.697853] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.697856] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.697859] Call Trace: [ 93.697862] [ 93.697865] dump_stack_lvl+0x4f/0x70 [ 93.697872] print_address_description.constprop.0+0x2c/0x3b0 [ 93.697880] ? kasan_atomics_helper+0xb34/0x5400 [kasan_test] [ 93.697900] print_report+0xb9/0x280 [ 93.697907] ? kasan_atomics_helper+0xb34/0x5400 [kasan_test] [ 93.697926] ? kasan_addr_to_slab+0x9/0x90 [ 93.697932] ? kasan_atomics_helper+0xb34/0x5400 [kasan_test] [ 93.697951] kasan_report+0xda/0x110 [ 93.697958] ? kasan_atomics_helper+0xb34/0x5400 [kasan_test] [ 93.697978] kasan_check_range+0xfc/0x1b0 [ 93.697985] kasan_atomics_helper+0xb34/0x5400 [kasan_test] [ 93.698004] ? kasan_unpoison+0x23/0x50 [ 93.698011] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.698030] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.698040] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.698060] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.698079] ? __pfx_read_tsc+0x10/0x10 [ 93.698084] ? ktime_get_ts64+0x7f/0x220 [ 93.698092] kunit_try_run_case+0x175/0x440 [ 93.698098] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.698104] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.698112] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.698118] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.698125] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.698132] kthread+0x3b4/0x780 [ 93.698139] ? __pfx_kthread+0x10/0x10 [ 93.698145] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.698151] ? __pfx_kthread+0x10/0x10 [ 93.698157] ? __pfx_kthread+0x10/0x10 [ 93.698164] ret_from_fork+0x22c/0x300 [ 93.698171] ? __pfx_kthread+0x10/0x10 [ 93.698177] ret_from_fork_asm+0x1a/0x30 [ 93.698186] [ 93.702071] Allocated by task 3705: [ 93.702154] kasan_save_stack+0x1c/0x40 [ 93.702246] kasan_save_track+0x10/0x30 [ 93.702334] __kasan_kmalloc+0xa6/0xb0 [ 93.702434] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.702562] kunit_try_run_case+0x175/0x440 [ 93.702655] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.702767] kthread+0x3b4/0x780 [ 93.702846] ret_from_fork+0x22c/0x300 [ 93.702933] ret_from_fork_asm+0x1a/0x30 [ 93.703072] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.703302] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.703609] The buggy address belongs to the physical page: [ 93.703721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.703873] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.704008] page_type: f5(slab) [ 93.704087] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.704236] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.704382] page dumped because: kasan: bad access detected [ 93.704574] Memory state around the buggy address: [ 93.704674] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.704813] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.704954] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.705094] ^ [ 93.705195] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.705332] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.705494] ================================================================== [ 93.707344] ================================================================== [ 93.707526] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc1d/0x5400 [kasan_test] [ 93.707695] Write of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.707890] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.707897] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.707899] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.707901] Call Trace: [ 93.707903] [ 93.707905] dump_stack_lvl+0x4f/0x70 [ 93.707910] print_address_description.constprop.0+0x2c/0x3b0 [ 93.707915] ? kasan_atomics_helper+0xc1d/0x5400 [kasan_test] [ 93.707924] print_report+0xb9/0x280 [ 93.707927] ? kasan_atomics_helper+0xc1d/0x5400 [kasan_test] [ 93.707935] ? kasan_addr_to_slab+0x9/0x90 [ 93.707939] ? kasan_atomics_helper+0xc1d/0x5400 [kasan_test] [ 93.707947] kasan_report+0xda/0x110 [ 93.707950] ? kasan_atomics_helper+0xc1d/0x5400 [kasan_test] [ 93.707959] kasan_check_range+0xfc/0x1b0 [ 93.707963] kasan_atomics_helper+0xc1d/0x5400 [kasan_test] [ 93.707971] ? kasan_unpoison+0x23/0x50 [ 93.707976] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.707984] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.707989] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.707998] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.708008] ? __pfx_read_tsc+0x10/0x10 [ 93.708011] ? ktime_get_ts64+0x7f/0x220 [ 93.708015] kunit_try_run_case+0x175/0x440 [ 93.708018] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.708021] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.708026] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.708029] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.708033] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.708036] kthread+0x3b4/0x780 [ 93.708040] ? __pfx_kthread+0x10/0x10 [ 93.708043] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.708047] ? __pfx_kthread+0x10/0x10 [ 93.708050] ? __pfx_kthread+0x10/0x10 [ 93.708054] ret_from_fork+0x22c/0x300 [ 93.708057] ? __pfx_kthread+0x10/0x10 [ 93.708060] ret_from_fork_asm+0x1a/0x30 [ 93.708065] [ 93.711889] Allocated by task 3705: [ 93.711970] kasan_save_stack+0x1c/0x40 [ 93.712059] kasan_save_track+0x10/0x30 [ 93.712145] __kasan_kmalloc+0xa6/0xb0 [ 93.712233] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.712341] kunit_try_run_case+0x175/0x440 [ 93.712446] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.712576] kthread+0x3b4/0x780 [ 93.712655] ret_from_fork+0x22c/0x300 [ 93.712741] ret_from_fork_asm+0x1a/0x30 [ 93.712880] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.713107] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.713391] The buggy address belongs to the physical page: [ 93.713523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.713677] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.713812] page_type: f5(slab) [ 93.713891] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.714039] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.714185] page dumped because: kasan: bad access detected [ 93.714346] Memory state around the buggy address: [ 93.714467] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.714624] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.714763] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.714901] ^ [ 93.715002] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.715140] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.715277] ================================================================== [ 93.717000] ================================================================== [ 93.717146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a55/0x5400 [kasan_test] [ 93.717313] Read of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.717529] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.717536] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.717538] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.717540] Call Trace: [ 93.717542] [ 93.717544] dump_stack_lvl+0x4f/0x70 [ 93.717549] print_address_description.constprop.0+0x2c/0x3b0 [ 93.717555] ? kasan_atomics_helper+0x4a55/0x5400 [kasan_test] [ 93.717564] print_report+0xb9/0x280 [ 93.717567] ? kasan_atomics_helper+0x4a55/0x5400 [kasan_test] [ 93.717576] ? kasan_addr_to_slab+0x9/0x90 [ 93.717579] ? kasan_atomics_helper+0x4a55/0x5400 [kasan_test] [ 93.717587] kasan_report+0xda/0x110 [ 93.717591] ? kasan_atomics_helper+0x4a55/0x5400 [kasan_test] [ 93.717600] kasan_atomics_helper+0x4a55/0x5400 [kasan_test] [ 93.717608] ? kasan_unpoison+0x23/0x50 [ 93.717612] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.717620] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.717625] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.717635] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.717644] ? __pfx_read_tsc+0x10/0x10 [ 93.717648] ? ktime_get_ts64+0x7f/0x220 [ 93.717652] kunit_try_run_case+0x175/0x440 [ 93.717655] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.717659] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.717663] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.717666] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.717670] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.717674] kthread+0x3b4/0x780 [ 93.717678] ? __pfx_kthread+0x10/0x10 [ 93.717681] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.717685] ? __pfx_kthread+0x10/0x10 [ 93.717688] ? __pfx_kthread+0x10/0x10 [ 93.717692] ret_from_fork+0x22c/0x300 [ 93.717695] ? __pfx_kthread+0x10/0x10 [ 93.717699] ret_from_fork_asm+0x1a/0x30 [ 93.717704] [ 93.721432] Allocated by task 3705: [ 93.721525] kasan_save_stack+0x1c/0x40 [ 93.721613] kasan_save_track+0x10/0x30 [ 93.721702] __kasan_kmalloc+0xa6/0xb0 [ 93.721790] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.721900] kunit_try_run_case+0x175/0x440 [ 93.721992] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.722104] kthread+0x3b4/0x780 [ 93.722183] ret_from_fork+0x22c/0x300 [ 93.722270] ret_from_fork_asm+0x1a/0x30 [ 93.722420] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.722668] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.722959] The buggy address belongs to the physical page: [ 93.723072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.723224] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.723361] page_type: f5(slab) [ 93.723450] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.723617] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.723763] page dumped because: kasan: bad access detected [ 93.723924] Memory state around the buggy address: [ 93.724026] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.724164] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.724304] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.724453] ^ [ 93.724566] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.724704] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.724841] ================================================================== [ 93.726225] ================================================================== [ 93.726381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xcec/0x5400 [kasan_test] [ 93.726560] Write of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.726765] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.726772] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.726774] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.726776] Call Trace: [ 93.726777] [ 93.726779] dump_stack_lvl+0x4f/0x70 [ 93.726784] print_address_description.constprop.0+0x2c/0x3b0 [ 93.726789] ? kasan_atomics_helper+0xcec/0x5400 [kasan_test] [ 93.726798] print_report+0xb9/0x280 [ 93.726801] ? kasan_atomics_helper+0xcec/0x5400 [kasan_test] [ 93.726809] ? kasan_addr_to_slab+0x9/0x90 [ 93.726812] ? kasan_atomics_helper+0xcec/0x5400 [kasan_test] [ 93.726820] kasan_report+0xda/0x110 [ 93.726824] ? kasan_atomics_helper+0xcec/0x5400 [kasan_test] [ 93.726833] kasan_check_range+0xfc/0x1b0 [ 93.726837] kasan_atomics_helper+0xcec/0x5400 [kasan_test] [ 93.726845] ? kasan_unpoison+0x23/0x50 [ 93.726849] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.726857] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.726862] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.726872] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.726881] ? __pfx_read_tsc+0x10/0x10 [ 93.726884] ? ktime_get_ts64+0x7f/0x220 [ 93.726888] kunit_try_run_case+0x175/0x440 [ 93.726891] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.726894] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.726899] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.726902] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.726905] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.726909] kthread+0x3b4/0x780 [ 93.726913] ? __pfx_kthread+0x10/0x10 [ 93.726916] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.726920] ? __pfx_kthread+0x10/0x10 [ 93.726923] ? __pfx_kthread+0x10/0x10 [ 93.726926] ret_from_fork+0x22c/0x300 [ 93.726930] ? __pfx_kthread+0x10/0x10 [ 93.726933] ret_from_fork_asm+0x1a/0x30 [ 93.726938] [ 93.730752] Allocated by task 3705: [ 93.730835] kasan_save_stack+0x1c/0x40 [ 93.730933] kasan_save_track+0x10/0x30 [ 93.731020] __kasan_kmalloc+0xa6/0xb0 [ 93.731108] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.731217] kunit_try_run_case+0x175/0x440 [ 93.731309] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.731430] kthread+0x3b4/0x780 [ 93.731529] ret_from_fork+0x22c/0x300 [ 93.731615] ret_from_fork_asm+0x1a/0x30 [ 93.731754] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.731981] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.732269] The buggy address belongs to the physical page: [ 93.732381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.732563] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.732698] page_type: f5(slab) [ 93.732775] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.732922] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.733069] page dumped because: kasan: bad access detected [ 93.733231] Memory state around the buggy address: [ 93.733332] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.733500] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.733639] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.733777] ^ [ 93.733880] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.734018] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.734156] ================================================================== [ 93.735756] ================================================================== [ 93.735900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd83/0x5400 [kasan_test] [ 93.736065] Write of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.736260] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.736267] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.736269] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.736271] Call Trace: [ 93.736273] [ 93.736275] dump_stack_lvl+0x4f/0x70 [ 93.736280] print_address_description.constprop.0+0x2c/0x3b0 [ 93.736284] ? kasan_atomics_helper+0xd83/0x5400 [kasan_test] [ 93.736293] print_report+0xb9/0x280 [ 93.736297] ? kasan_atomics_helper+0xd83/0x5400 [kasan_test] [ 93.736305] ? kasan_addr_to_slab+0x9/0x90 [ 93.736308] ? kasan_atomics_helper+0xd83/0x5400 [kasan_test] [ 93.736316] kasan_report+0xda/0x110 [ 93.736320] ? kasan_atomics_helper+0xd83/0x5400 [kasan_test] [ 93.736329] kasan_check_range+0xfc/0x1b0 [ 93.736333] kasan_atomics_helper+0xd83/0x5400 [kasan_test] [ 93.736342] ? kasan_unpoison+0x23/0x50 [ 93.736345] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.736354] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.736359] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.736369] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.736378] ? __pfx_read_tsc+0x10/0x10 [ 93.736381] ? ktime_get_ts64+0x7f/0x220 [ 93.736385] kunit_try_run_case+0x175/0x440 [ 93.736388] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.736392] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.736396] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.736399] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.736403] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.736407] kthread+0x3b4/0x780 [ 93.736410] ? __pfx_kthread+0x10/0x10 [ 93.736414] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.736417] ? __pfx_kthread+0x10/0x10 [ 93.736421] ? __pfx_kthread+0x10/0x10 [ 93.736424] ret_from_fork+0x22c/0x300 [ 93.736437] ? __pfx_kthread+0x10/0x10 [ 93.736440] ret_from_fork_asm+0x1a/0x30 [ 93.736445] [ 93.740276] Allocated by task 3705: [ 93.740357] kasan_save_stack+0x1c/0x40 [ 93.740456] kasan_save_track+0x10/0x30 [ 93.740553] __kasan_kmalloc+0xa6/0xb0 [ 93.740639] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.740747] kunit_try_run_case+0x175/0x440 [ 93.740842] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.740955] kthread+0x3b4/0x780 [ 93.741034] ret_from_fork+0x22c/0x300 [ 93.741120] ret_from_fork_asm+0x1a/0x30 [ 93.741259] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.741517] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.741805] The buggy address belongs to the physical page: [ 93.741919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.742071] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.742206] page_type: f5(slab) [ 93.742284] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.742443] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.742599] page dumped because: kasan: bad access detected [ 93.742761] Memory state around the buggy address: [ 93.742863] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.743001] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.743139] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.743276] ^ [ 93.743377] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.743555] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.743695] ================================================================== [ 93.745120] ================================================================== [ 93.745275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe19/0x5400 [kasan_test] [ 93.745454] Write of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.745660] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.745667] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.745669] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.745671] Call Trace: [ 93.745673] [ 93.745675] dump_stack_lvl+0x4f/0x70 [ 93.745680] print_address_description.constprop.0+0x2c/0x3b0 [ 93.745684] ? kasan_atomics_helper+0xe19/0x5400 [kasan_test] [ 93.745693] print_report+0xb9/0x280 [ 93.745697] ? kasan_atomics_helper+0xe19/0x5400 [kasan_test] [ 93.745705] ? kasan_addr_to_slab+0x9/0x90 [ 93.745708] ? kasan_atomics_helper+0xe19/0x5400 [kasan_test] [ 93.745716] kasan_report+0xda/0x110 [ 93.745720] ? kasan_atomics_helper+0xe19/0x5400 [kasan_test] [ 93.745729] kasan_check_range+0xfc/0x1b0 [ 93.745733] kasan_atomics_helper+0xe19/0x5400 [kasan_test] [ 93.745741] ? kasan_unpoison+0x23/0x50 [ 93.745745] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.745754] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.745759] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.745769] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.745778] ? __pfx_read_tsc+0x10/0x10 [ 93.745781] ? ktime_get_ts64+0x7f/0x220 [ 93.745785] kunit_try_run_case+0x175/0x440 [ 93.745788] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.745792] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.745796] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.745799] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.745803] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.745806] kthread+0x3b4/0x780 [ 93.745810] ? __pfx_kthread+0x10/0x10 [ 93.745814] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.745817] ? __pfx_kthread+0x10/0x10 [ 93.745821] ? __pfx_kthread+0x10/0x10 [ 93.745824] ret_from_fork+0x22c/0x300 [ 93.745828] ? __pfx_kthread+0x10/0x10 [ 93.745831] ret_from_fork_asm+0x1a/0x30 [ 93.745836] [ 93.749636] Allocated by task 3705: [ 93.749720] kasan_save_stack+0x1c/0x40 [ 93.749812] kasan_save_track+0x10/0x30 [ 93.749900] __kasan_kmalloc+0xa6/0xb0 [ 93.749986] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.750095] kunit_try_run_case+0x175/0x440 [ 93.750189] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.750300] kthread+0x3b4/0x780 [ 93.750379] ret_from_fork+0x22c/0x300 [ 93.750466] ret_from_fork_asm+0x1a/0x30 [ 93.750606] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.750834] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.751125] The buggy address belongs to the physical page: [ 93.751238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.751394] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.751554] page_type: f5(slab) [ 93.751633] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.751781] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.751928] page dumped because: kasan: bad access detected [ 93.752091] Memory state around the buggy address: [ 93.752192] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.752332] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.752469] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.752608] ^ [ 93.752709] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.752848] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.752994] ================================================================== [ 93.754404] ================================================================== [ 93.754560] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeaf/0x5400 [kasan_test] [ 93.754725] Write of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.754923] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.754930] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.754932] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.754934] Call Trace: [ 93.754935] [ 93.754937] dump_stack_lvl+0x4f/0x70 [ 93.754942] print_address_description.constprop.0+0x2c/0x3b0 [ 93.754947] ? kasan_atomics_helper+0xeaf/0x5400 [kasan_test] [ 93.754956] print_report+0xb9/0x280 [ 93.754960] ? kasan_atomics_helper+0xeaf/0x5400 [kasan_test] [ 93.754968] ? kasan_addr_to_slab+0x9/0x90 [ 93.754971] ? kasan_atomics_helper+0xeaf/0x5400 [kasan_test] [ 93.754979] kasan_report+0xda/0x110 [ 93.754983] ? kasan_atomics_helper+0xeaf/0x5400 [kasan_test] [ 93.754992] kasan_check_range+0xfc/0x1b0 [ 93.754997] kasan_atomics_helper+0xeaf/0x5400 [kasan_test] [ 93.755005] ? kasan_unpoison+0x23/0x50 [ 93.755009] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.755017] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.755022] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.755032] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.755041] ? __pfx_read_tsc+0x10/0x10 [ 93.755044] ? ktime_get_ts64+0x7f/0x220 [ 93.755048] kunit_try_run_case+0x175/0x440 [ 93.755051] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.755055] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.755059] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.755062] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.755066] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.755069] kthread+0x3b4/0x780 [ 93.755073] ? __pfx_kthread+0x10/0x10 [ 93.755076] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.755080] ? __pfx_kthread+0x10/0x10 [ 93.755083] ? __pfx_kthread+0x10/0x10 [ 93.755087] ret_from_fork+0x22c/0x300 [ 93.755091] ? __pfx_kthread+0x10/0x10 [ 93.755094] ret_from_fork_asm+0x1a/0x30 [ 93.755099] [ 93.758924] Allocated by task 3705: [ 93.759005] kasan_save_stack+0x1c/0x40 [ 93.759093] kasan_save_track+0x10/0x30 [ 93.759180] __kasan_kmalloc+0xa6/0xb0 [ 93.759266] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.759373] kunit_try_run_case+0x175/0x440 [ 93.759496] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.759610] kthread+0x3b4/0x780 [ 93.759689] ret_from_fork+0x22c/0x300 [ 93.759775] ret_from_fork_asm+0x1a/0x30 [ 93.759913] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.760145] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.760443] The buggy address belongs to the physical page: [ 93.760576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.760728] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.760863] page_type: f5(slab) [ 93.760941] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.761088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.761236] page dumped because: kasan: bad access detected [ 93.761413] Memory state around the buggy address: [ 93.761534] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.761672] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.761810] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.761948] ^ [ 93.762049] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.762187] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.762324] ================================================================== [ 93.762501] ================================================================== [ 93.762683] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf46/0x5400 [kasan_test] [ 93.762884] Write of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.763126] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.763137] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.763140] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.763143] Call Trace: [ 93.763146] [ 93.763149] dump_stack_lvl+0x4f/0x70 [ 93.763157] print_address_description.constprop.0+0x2c/0x3b0 [ 93.763165] ? kasan_atomics_helper+0xf46/0x5400 [kasan_test] [ 93.763184] print_report+0xb9/0x280 [ 93.763191] ? kasan_atomics_helper+0xf46/0x5400 [kasan_test] [ 93.763209] ? kasan_addr_to_slab+0x9/0x90 [ 93.763215] ? kasan_atomics_helper+0xf46/0x5400 [kasan_test] [ 93.763234] kasan_report+0xda/0x110 [ 93.763241] ? kasan_atomics_helper+0xf46/0x5400 [kasan_test] [ 93.763261] kasan_check_range+0xfc/0x1b0 [ 93.763269] kasan_atomics_helper+0xf46/0x5400 [kasan_test] [ 93.763287] ? kasan_unpoison+0x23/0x50 [ 93.763294] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.763313] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.763322] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.763343] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.763363] ? __pfx_read_tsc+0x10/0x10 [ 93.763368] ? ktime_get_ts64+0x7f/0x220 [ 93.763376] kunit_try_run_case+0x175/0x440 [ 93.763382] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.763388] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.763405] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.763410] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.763417] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.763424] kthread+0x3b4/0x780 [ 93.763431] ? __pfx_kthread+0x10/0x10 [ 93.763437] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.763444] ? __pfx_kthread+0x10/0x10 [ 93.763450] ? __pfx_kthread+0x10/0x10 [ 93.763457] ret_from_fork+0x22c/0x300 [ 93.763464] ? __pfx_kthread+0x10/0x10 [ 93.763470] ret_from_fork_asm+0x1a/0x30 [ 93.763480] [ 93.767341] Allocated by task 3705: [ 93.767433] kasan_save_stack+0x1c/0x40 [ 93.767533] kasan_save_track+0x10/0x30 [ 93.767621] __kasan_kmalloc+0xa6/0xb0 [ 93.767707] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.767816] kunit_try_run_case+0x175/0x440 [ 93.767912] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.768023] kthread+0x3b4/0x780 [ 93.768102] ret_from_fork+0x22c/0x300 [ 93.768189] ret_from_fork_asm+0x1a/0x30 [ 93.768330] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.768578] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.768865] The buggy address belongs to the physical page: [ 93.768987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.769139] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.769273] page_type: f5(slab) [ 93.769351] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.769529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.769675] page dumped because: kasan: bad access detected [ 93.769841] Memory state around the buggy address: [ 93.769941] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.770080] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.770217] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.770357] ^ [ 93.770480] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.770628] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.770766] ================================================================== [ 93.772616] ================================================================== [ 93.772758] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a07/0x5400 [kasan_test] [ 93.772925] Read of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.773117] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.773124] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.773126] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.773128] Call Trace: [ 93.773130] [ 93.773132] dump_stack_lvl+0x4f/0x70 [ 93.773136] print_address_description.constprop.0+0x2c/0x3b0 [ 93.773141] ? kasan_atomics_helper+0x4a07/0x5400 [kasan_test] [ 93.773150] print_report+0xb9/0x280 [ 93.773153] ? kasan_atomics_helper+0x4a07/0x5400 [kasan_test] [ 93.773161] ? kasan_addr_to_slab+0x9/0x90 [ 93.773165] ? kasan_atomics_helper+0x4a07/0x5400 [kasan_test] [ 93.773172] kasan_report+0xda/0x110 [ 93.773176] ? kasan_atomics_helper+0x4a07/0x5400 [kasan_test] [ 93.773185] kasan_atomics_helper+0x4a07/0x5400 [kasan_test] [ 93.773193] ? kasan_unpoison+0x23/0x50 [ 93.773196] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.773205] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.773210] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.773219] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.773228] ? __pfx_read_tsc+0x10/0x10 [ 93.773231] ? ktime_get_ts64+0x7f/0x220 [ 93.773235] kunit_try_run_case+0x175/0x440 [ 93.773238] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.773242] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.773246] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.773248] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.773252] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.773256] kthread+0x3b4/0x780 [ 93.773260] ? __pfx_kthread+0x10/0x10 [ 93.773263] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.773266] ? __pfx_kthread+0x10/0x10 [ 93.773270] ? __pfx_kthread+0x10/0x10 [ 93.773273] ret_from_fork+0x22c/0x300 [ 93.773277] ? __pfx_kthread+0x10/0x10 [ 93.773280] ret_from_fork_asm+0x1a/0x30 [ 93.773285] [ 93.777020] Allocated by task 3705: [ 93.777102] kasan_save_stack+0x1c/0x40 [ 93.777190] kasan_save_track+0x10/0x30 [ 93.777276] __kasan_kmalloc+0xa6/0xb0 [ 93.777362] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.777500] kunit_try_run_case+0x175/0x440 [ 93.777591] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.777702] kthread+0x3b4/0x780 [ 93.777782] ret_from_fork+0x22c/0x300 [ 93.777869] ret_from_fork_asm+0x1a/0x30 [ 93.778007] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.778234] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.778550] The buggy address belongs to the physical page: [ 93.778662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.778813] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.778948] page_type: f5(slab) [ 93.779025] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.779176] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.779322] page dumped because: kasan: bad access detected [ 93.779514] Memory state around the buggy address: [ 93.779614] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.779753] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.779892] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.780030] ^ [ 93.780131] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.780268] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.780419] ================================================================== [ 93.782083] ================================================================== [ 93.782247] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1013/0x5400 [kasan_test] [ 93.782437] Write of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.782651] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.782658] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.782659] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.782662] Call Trace: [ 93.782663] [ 93.782665] dump_stack_lvl+0x4f/0x70 [ 93.782670] print_address_description.constprop.0+0x2c/0x3b0 [ 93.782674] ? kasan_atomics_helper+0x1013/0x5400 [kasan_test] [ 93.782683] print_report+0xb9/0x280 [ 93.782686] ? kasan_atomics_helper+0x1013/0x5400 [kasan_test] [ 93.782694] ? kasan_addr_to_slab+0x9/0x90 [ 93.782697] ? kasan_atomics_helper+0x1013/0x5400 [kasan_test] [ 93.782705] kasan_report+0xda/0x110 [ 93.782709] ? kasan_atomics_helper+0x1013/0x5400 [kasan_test] [ 93.782718] kasan_check_range+0xfc/0x1b0 [ 93.782722] kasan_atomics_helper+0x1013/0x5400 [kasan_test] [ 93.782730] ? kasan_unpoison+0x23/0x50 [ 93.782734] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.782742] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.782747] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.782756] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.782765] ? __pfx_read_tsc+0x10/0x10 [ 93.782768] ? ktime_get_ts64+0x7f/0x220 [ 93.782772] kunit_try_run_case+0x175/0x440 [ 93.782776] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.782779] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.782783] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.782786] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.782790] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.782793] kthread+0x3b4/0x780 [ 93.782797] ? __pfx_kthread+0x10/0x10 [ 93.782800] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.782804] ? __pfx_kthread+0x10/0x10 [ 93.782807] ? __pfx_kthread+0x10/0x10 [ 93.782811] ret_from_fork+0x22c/0x300 [ 93.782814] ? __pfx_kthread+0x10/0x10 [ 93.782817] ret_from_fork_asm+0x1a/0x30 [ 93.782822] [ 93.786653] Allocated by task 3705: [ 93.786735] kasan_save_stack+0x1c/0x40 [ 93.786824] kasan_save_track+0x10/0x30 [ 93.786914] __kasan_kmalloc+0xa6/0xb0 [ 93.787000] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.787109] kunit_try_run_case+0x175/0x440 [ 93.787202] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.787314] kthread+0x3b4/0x780 [ 93.787393] ret_from_fork+0x22c/0x300 [ 93.787499] ret_from_fork_asm+0x1a/0x30 [ 93.787639] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.787867] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.788157] The buggy address belongs to the physical page: [ 93.788272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.788435] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.788584] page_type: f5(slab) [ 93.788662] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.788810] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.788965] page dumped because: kasan: bad access detected [ 93.789129] Memory state around the buggy address: [ 93.789229] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.789368] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.789534] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.789672] ^ [ 93.789772] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.789916] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.790053] ================================================================== [ 93.791481] ================================================================== [ 93.791624] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ed/0x5400 [kasan_test] [ 93.791799] Read of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.791993] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.791999] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.792001] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.792003] Call Trace: [ 93.792004] [ 93.792006] dump_stack_lvl+0x4f/0x70 [ 93.792011] print_address_description.constprop.0+0x2c/0x3b0 [ 93.792016] ? kasan_atomics_helper+0x49ed/0x5400 [kasan_test] [ 93.792024] print_report+0xb9/0x280 [ 93.792028] ? kasan_atomics_helper+0x49ed/0x5400 [kasan_test] [ 93.792036] ? kasan_addr_to_slab+0x9/0x90 [ 93.792039] ? kasan_atomics_helper+0x49ed/0x5400 [kasan_test] [ 93.792047] kasan_report+0xda/0x110 [ 93.792051] ? kasan_atomics_helper+0x49ed/0x5400 [kasan_test] [ 93.792059] kasan_atomics_helper+0x49ed/0x5400 [kasan_test] [ 93.792068] ? kasan_unpoison+0x23/0x50 [ 93.792071] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.792080] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.792085] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.792094] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.792103] ? __pfx_read_tsc+0x10/0x10 [ 93.792106] ? ktime_get_ts64+0x7f/0x220 [ 93.792110] kunit_try_run_case+0x175/0x440 [ 93.792113] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.792117] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.792121] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.792124] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.792128] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.792131] kthread+0x3b4/0x780 [ 93.792135] ? __pfx_kthread+0x10/0x10 [ 93.792138] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.792142] ? __pfx_kthread+0x10/0x10 [ 93.792145] ? __pfx_kthread+0x10/0x10 [ 93.792149] ret_from_fork+0x22c/0x300 [ 93.792152] ? __pfx_kthread+0x10/0x10 [ 93.792155] ret_from_fork_asm+0x1a/0x30 [ 93.792160] [ 93.795880] Allocated by task 3705: [ 93.795961] kasan_save_stack+0x1c/0x40 [ 93.796052] kasan_save_track+0x10/0x30 [ 93.796139] __kasan_kmalloc+0xa6/0xb0 [ 93.796229] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.796337] kunit_try_run_case+0x175/0x440 [ 93.796441] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.796563] kthread+0x3b4/0x780 [ 93.796641] ret_from_fork+0x22c/0x300 [ 93.796727] ret_from_fork_asm+0x1a/0x30 [ 93.796866] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.797092] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.797378] The buggy address belongs to the physical page: [ 93.797520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.797672] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.797806] page_type: f5(slab) [ 93.797883] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.798030] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.798176] page dumped because: kasan: bad access detected [ 93.798338] Memory state around the buggy address: [ 93.798450] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.798597] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.798735] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.798872] ^ [ 93.798972] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.799109] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.799247] ================================================================== [ 93.800643] ================================================================== [ 93.800809] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10df/0x5400 [kasan_test] [ 93.800989] Write of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.801183] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.801189] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.801191] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.801193] Call Trace: [ 93.801195] [ 93.801197] dump_stack_lvl+0x4f/0x70 [ 93.801201] print_address_description.constprop.0+0x2c/0x3b0 [ 93.801206] ? kasan_atomics_helper+0x10df/0x5400 [kasan_test] [ 93.801215] print_report+0xb9/0x280 [ 93.801218] ? kasan_atomics_helper+0x10df/0x5400 [kasan_test] [ 93.801226] ? kasan_addr_to_slab+0x9/0x90 [ 93.801229] ? kasan_atomics_helper+0x10df/0x5400 [kasan_test] [ 93.801237] kasan_report+0xda/0x110 [ 93.801241] ? kasan_atomics_helper+0x10df/0x5400 [kasan_test] [ 93.801250] kasan_check_range+0xfc/0x1b0 [ 93.801254] kasan_atomics_helper+0x10df/0x5400 [kasan_test] [ 93.801262] ? kasan_unpoison+0x23/0x50 [ 93.801266] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.801274] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.801279] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.801289] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.801298] ? __pfx_read_tsc+0x10/0x10 [ 93.801301] ? ktime_get_ts64+0x7f/0x220 [ 93.801305] kunit_try_run_case+0x175/0x440 [ 93.801308] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.801311] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.801316] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.801318] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.801322] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.801326] kthread+0x3b4/0x780 [ 93.801329] ? __pfx_kthread+0x10/0x10 [ 93.801333] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.801336] ? __pfx_kthread+0x10/0x10 [ 93.801339] ? __pfx_kthread+0x10/0x10 [ 93.801343] ret_from_fork+0x22c/0x300 [ 93.801346] ? __pfx_kthread+0x10/0x10 [ 93.801350] ret_from_fork_asm+0x1a/0x30 [ 93.801354] [ 93.805206] Allocated by task 3705: [ 93.805287] kasan_save_stack+0x1c/0x40 [ 93.805378] kasan_save_track+0x10/0x30 [ 93.805495] __kasan_kmalloc+0xa6/0xb0 [ 93.805580] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.805691] kunit_try_run_case+0x175/0x440 [ 93.805783] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.805894] kthread+0x3b4/0x780 [ 93.805974] ret_from_fork+0x22c/0x300 [ 93.806063] ret_from_fork_asm+0x1a/0x30 [ 93.806205] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.806444] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.806750] The buggy address belongs to the physical page: [ 93.806865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.807016] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.807151] page_type: f5(slab) [ 93.807230] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.807378] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.807554] page dumped because: kasan: bad access detected [ 93.807717] Memory state around the buggy address: [ 93.807817] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.807955] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.808097] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.808238] ^ [ 93.808339] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.808506] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.808643] ================================================================== [ 93.810225] ================================================================== [ 93.810368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d3/0x5400 [kasan_test] [ 93.810554] Read of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.810750] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.810757] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.810758] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.810760] Call Trace: [ 93.810762] [ 93.810763] dump_stack_lvl+0x4f/0x70 [ 93.810768] print_address_description.constprop.0+0x2c/0x3b0 [ 93.810773] ? kasan_atomics_helper+0x49d3/0x5400 [kasan_test] [ 93.810781] print_report+0xb9/0x280 [ 93.810785] ? kasan_atomics_helper+0x49d3/0x5400 [kasan_test] [ 93.810793] ? kasan_addr_to_slab+0x9/0x90 [ 93.810796] ? kasan_atomics_helper+0x49d3/0x5400 [kasan_test] [ 93.810804] kasan_report+0xda/0x110 [ 93.810808] ? kasan_atomics_helper+0x49d3/0x5400 [kasan_test] [ 93.810817] kasan_atomics_helper+0x49d3/0x5400 [kasan_test] [ 93.810825] ? kasan_unpoison+0x23/0x50 [ 93.810828] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.810837] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.810842] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.810851] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.810861] ? __pfx_read_tsc+0x10/0x10 [ 93.810863] ? ktime_get_ts64+0x7f/0x220 [ 93.810867] kunit_try_run_case+0x175/0x440 [ 93.810870] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.810874] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.810878] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.810881] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.810885] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.810888] kthread+0x3b4/0x780 [ 93.810892] ? __pfx_kthread+0x10/0x10 [ 93.810895] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.810899] ? __pfx_kthread+0x10/0x10 [ 93.810902] ? __pfx_kthread+0x10/0x10 [ 93.810906] ret_from_fork+0x22c/0x300 [ 93.810909] ? __pfx_kthread+0x10/0x10 [ 93.810913] ret_from_fork_asm+0x1a/0x30 [ 93.810917] [ 93.814658] Allocated by task 3705: [ 93.814739] kasan_save_stack+0x1c/0x40 [ 93.814827] kasan_save_track+0x10/0x30 [ 93.814915] __kasan_kmalloc+0xa6/0xb0 [ 93.815000] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.815111] kunit_try_run_case+0x175/0x440 [ 93.815205] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.815316] kthread+0x3b4/0x780 [ 93.815405] ret_from_fork+0x22c/0x300 [ 93.815511] ret_from_fork_asm+0x1a/0x30 [ 93.815653] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.815879] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.816164] The buggy address belongs to the physical page: [ 93.816276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.816439] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.816594] page_type: f5(slab) [ 93.816671] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.816823] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.816968] page dumped because: kasan: bad access detected [ 93.817133] Memory state around the buggy address: [ 93.817233] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.817371] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.817538] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.817676] ^ [ 93.817776] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.817916] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.818053] ================================================================== [ 93.818210] ================================================================== [ 93.818403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11ab/0x5400 [kasan_test] [ 93.818615] Write of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.818856] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.818867] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.818870] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.818874] Call Trace: [ 93.818877] [ 93.818880] dump_stack_lvl+0x4f/0x70 [ 93.818887] print_address_description.constprop.0+0x2c/0x3b0 [ 93.818895] ? kasan_atomics_helper+0x11ab/0x5400 [kasan_test] [ 93.818915] print_report+0xb9/0x280 [ 93.818922] ? kasan_atomics_helper+0x11ab/0x5400 [kasan_test] [ 93.818940] ? kasan_addr_to_slab+0x9/0x90 [ 93.818947] ? kasan_atomics_helper+0x11ab/0x5400 [kasan_test] [ 93.818965] kasan_report+0xda/0x110 [ 93.818973] ? kasan_atomics_helper+0x11ab/0x5400 [kasan_test] [ 93.818992] kasan_check_range+0xfc/0x1b0 [ 93.818999] kasan_atomics_helper+0x11ab/0x5400 [kasan_test] [ 93.819018] ? kasan_unpoison+0x23/0x50 [ 93.819024] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.819043] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.819052] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.819072] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.819092] ? __pfx_read_tsc+0x10/0x10 [ 93.819097] ? ktime_get_ts64+0x7f/0x220 [ 93.819105] kunit_try_run_case+0x175/0x440 [ 93.819111] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.819117] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.819125] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.819131] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.819137] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.819144] kthread+0x3b4/0x780 [ 93.819151] ? __pfx_kthread+0x10/0x10 [ 93.819157] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.819164] ? __pfx_kthread+0x10/0x10 [ 93.819171] ? __pfx_kthread+0x10/0x10 [ 93.819177] ret_from_fork+0x22c/0x300 [ 93.819183] ? __pfx_kthread+0x10/0x10 [ 93.819189] ret_from_fork_asm+0x1a/0x30 [ 93.819198] [ 93.823075] Allocated by task 3705: [ 93.823156] kasan_save_stack+0x1c/0x40 [ 93.823247] kasan_save_track+0x10/0x30 [ 93.823334] __kasan_kmalloc+0xa6/0xb0 [ 93.823439] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.823570] kunit_try_run_case+0x175/0x440 [ 93.823664] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.823778] kthread+0x3b4/0x780 [ 93.823856] ret_from_fork+0x22c/0x300 [ 93.823942] ret_from_fork_asm+0x1a/0x30 [ 93.824081] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.824308] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.824638] The buggy address belongs to the physical page: [ 93.824750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.824902] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.825036] page_type: f5(slab) [ 93.825115] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.825266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.825435] page dumped because: kasan: bad access detected [ 93.825628] Memory state around the buggy address: [ 93.825729] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.825870] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.826008] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.826146] ^ [ 93.826248] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.826386] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.826544] ================================================================== [ 93.828374] ================================================================== [ 93.828536] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49b9/0x5400 [kasan_test] [ 93.828702] Read of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.828899] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.828906] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.828908] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.828910] Call Trace: [ 93.828912] [ 93.828913] dump_stack_lvl+0x4f/0x70 [ 93.828918] print_address_description.constprop.0+0x2c/0x3b0 [ 93.828923] ? kasan_atomics_helper+0x49b9/0x5400 [kasan_test] [ 93.828932] print_report+0xb9/0x280 [ 93.828935] ? kasan_atomics_helper+0x49b9/0x5400 [kasan_test] [ 93.828943] ? kasan_addr_to_slab+0x9/0x90 [ 93.828947] ? kasan_atomics_helper+0x49b9/0x5400 [kasan_test] [ 93.828955] kasan_report+0xda/0x110 [ 93.828959] ? kasan_atomics_helper+0x49b9/0x5400 [kasan_test] [ 93.828968] kasan_atomics_helper+0x49b9/0x5400 [kasan_test] [ 93.828976] ? kasan_unpoison+0x23/0x50 [ 93.828979] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.828988] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.828993] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.829003] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.829012] ? __pfx_read_tsc+0x10/0x10 [ 93.829015] ? ktime_get_ts64+0x7f/0x220 [ 93.829019] kunit_try_run_case+0x175/0x440 [ 93.829022] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.829026] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.829030] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.829033] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.829036] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.829040] kthread+0x3b4/0x780 [ 93.829044] ? __pfx_kthread+0x10/0x10 [ 93.829047] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.829051] ? __pfx_kthread+0x10/0x10 [ 93.829054] ? __pfx_kthread+0x10/0x10 [ 93.829058] ret_from_fork+0x22c/0x300 [ 93.829061] ? __pfx_kthread+0x10/0x10 [ 93.829065] ret_from_fork_asm+0x1a/0x30 [ 93.829069] [ 93.832800] Allocated by task 3705: [ 93.832882] kasan_save_stack+0x1c/0x40 [ 93.832972] kasan_save_track+0x10/0x30 [ 93.833061] __kasan_kmalloc+0xa6/0xb0 [ 93.833147] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.833258] kunit_try_run_case+0x175/0x440 [ 93.833350] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.833482] kthread+0x3b4/0x780 [ 93.833561] ret_from_fork+0x22c/0x300 [ 93.833649] ret_from_fork_asm+0x1a/0x30 [ 93.833790] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.834018] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.834306] The buggy address belongs to the physical page: [ 93.834419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.834592] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.834728] page_type: f5(slab) [ 93.834806] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.834955] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.835111] page dumped because: kasan: bad access detected [ 93.835273] Memory state around the buggy address: [ 93.835373] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.835552] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.835702] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.835841] ^ [ 93.835942] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.836081] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.836218] ================================================================== [ 93.837874] ================================================================== [ 93.838029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1277/0x5400 [kasan_test] [ 93.838196] Write of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.838392] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.838399] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.838401] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.838403] Call Trace: [ 93.838405] [ 93.838406] dump_stack_lvl+0x4f/0x70 [ 93.838411] print_address_description.constprop.0+0x2c/0x3b0 [ 93.838416] ? kasan_atomics_helper+0x1277/0x5400 [kasan_test] [ 93.838425] print_report+0xb9/0x280 [ 93.838428] ? kasan_atomics_helper+0x1277/0x5400 [kasan_test] [ 93.838436] ? kasan_addr_to_slab+0x9/0x90 [ 93.838449] ? kasan_atomics_helper+0x1277/0x5400 [kasan_test] [ 93.838457] kasan_report+0xda/0x110 [ 93.838461] ? kasan_atomics_helper+0x1277/0x5400 [kasan_test] [ 93.838470] kasan_check_range+0xfc/0x1b0 [ 93.838475] kasan_atomics_helper+0x1277/0x5400 [kasan_test] [ 93.838492] ? kasan_unpoison+0x23/0x50 [ 93.838496] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.838505] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.838510] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.838520] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.838529] ? __pfx_read_tsc+0x10/0x10 [ 93.838532] ? ktime_get_ts64+0x7f/0x220 [ 93.838536] kunit_try_run_case+0x175/0x440 [ 93.838539] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.838542] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.838546] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.838549] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.838553] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.838557] kthread+0x3b4/0x780 [ 93.838560] ? __pfx_kthread+0x10/0x10 [ 93.838564] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.838567] ? __pfx_kthread+0x10/0x10 [ 93.838571] ? __pfx_kthread+0x10/0x10 [ 93.838574] ret_from_fork+0x22c/0x300 [ 93.838578] ? __pfx_kthread+0x10/0x10 [ 93.838581] ret_from_fork_asm+0x1a/0x30 [ 93.838586] [ 93.842426] Allocated by task 3705: [ 93.842527] kasan_save_stack+0x1c/0x40 [ 93.842616] kasan_save_track+0x10/0x30 [ 93.842704] __kasan_kmalloc+0xa6/0xb0 [ 93.842790] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.842899] kunit_try_run_case+0x175/0x440 [ 93.842992] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.843104] kthread+0x3b4/0x780 [ 93.843184] ret_from_fork+0x22c/0x300 [ 93.843271] ret_from_fork_asm+0x1a/0x30 [ 93.843412] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.843665] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.843955] The buggy address belongs to the physical page: [ 93.844073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.844226] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.844361] page_type: f5(slab) [ 93.844451] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.844609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.844756] page dumped because: kasan: bad access detected [ 93.844919] Memory state around the buggy address: [ 93.845020] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.845160] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.845302] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.845449] ^ [ 93.845560] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.845699] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.845837] ================================================================== [ 93.847244] ================================================================== [ 93.847391] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x499f/0x5400 [kasan_test] [ 93.847577] Read of size 4 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.847772] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.847779] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.847780] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.847782] Call Trace: [ 93.847784] [ 93.847786] dump_stack_lvl+0x4f/0x70 [ 93.847791] print_address_description.constprop.0+0x2c/0x3b0 [ 93.847795] ? kasan_atomics_helper+0x499f/0x5400 [kasan_test] [ 93.847804] print_report+0xb9/0x280 [ 93.847808] ? kasan_atomics_helper+0x499f/0x5400 [kasan_test] [ 93.847816] ? kasan_addr_to_slab+0x9/0x90 [ 93.847819] ? kasan_atomics_helper+0x499f/0x5400 [kasan_test] [ 93.847827] kasan_report+0xda/0x110 [ 93.847831] ? kasan_atomics_helper+0x499f/0x5400 [kasan_test] [ 93.847840] kasan_atomics_helper+0x499f/0x5400 [kasan_test] [ 93.847848] ? kasan_unpoison+0x23/0x50 [ 93.847852] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.847861] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.847866] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.847875] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.847885] ? __pfx_read_tsc+0x10/0x10 [ 93.847888] ? ktime_get_ts64+0x7f/0x220 [ 93.847892] kunit_try_run_case+0x175/0x440 [ 93.847895] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.847898] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.847903] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.847905] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.847909] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.847913] kthread+0x3b4/0x780 [ 93.847917] ? __pfx_kthread+0x10/0x10 [ 93.847920] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.847924] ? __pfx_kthread+0x10/0x10 [ 93.847927] ? __pfx_kthread+0x10/0x10 [ 93.847931] ret_from_fork+0x22c/0x300 [ 93.847934] ? __pfx_kthread+0x10/0x10 [ 93.847938] ret_from_fork_asm+0x1a/0x30 [ 93.847943] [ 93.851733] Allocated by task 3705: [ 93.851815] kasan_save_stack+0x1c/0x40 [ 93.851905] kasan_save_track+0x10/0x30 [ 93.851994] __kasan_kmalloc+0xa6/0xb0 [ 93.852080] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.852191] kunit_try_run_case+0x175/0x440 [ 93.852283] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.852396] kthread+0x3b4/0x780 [ 93.852495] ret_from_fork+0x22c/0x300 [ 93.852583] ret_from_fork_asm+0x1a/0x30 [ 93.852726] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.852954] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.853240] The buggy address belongs to the physical page: [ 93.853353] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.853525] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.853661] page_type: f5(slab) [ 93.853739] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.853887] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.854034] page dumped because: kasan: bad access detected [ 93.854203] Memory state around the buggy address: [ 93.854305] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.854466] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.854605] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.854742] ^ [ 93.854843] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.854981] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.855119] ================================================================== [ 93.855277] ================================================================== [ 93.855472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1343/0x5400 [kasan_test] [ 93.855685] Read of size 8 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.855923] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.855934] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.855937] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.855941] Call Trace: [ 93.855944] [ 93.855947] dump_stack_lvl+0x4f/0x70 [ 93.855954] print_address_description.constprop.0+0x2c/0x3b0 [ 93.855962] ? kasan_atomics_helper+0x1343/0x5400 [kasan_test] [ 93.855982] print_report+0xb9/0x280 [ 93.855989] ? kasan_atomics_helper+0x1343/0x5400 [kasan_test] [ 93.856007] ? kasan_addr_to_slab+0x9/0x90 [ 93.856014] ? kasan_atomics_helper+0x1343/0x5400 [kasan_test] [ 93.856033] kasan_report+0xda/0x110 [ 93.856040] ? kasan_atomics_helper+0x1343/0x5400 [kasan_test] [ 93.856060] kasan_check_range+0xfc/0x1b0 [ 93.856067] kasan_atomics_helper+0x1343/0x5400 [kasan_test] [ 93.856087] ? kasan_unpoison+0x23/0x50 [ 93.856093] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.856112] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.856121] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.856142] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.856161] ? __pfx_read_tsc+0x10/0x10 [ 93.856167] ? ktime_get_ts64+0x7f/0x220 [ 93.856174] kunit_try_run_case+0x175/0x440 [ 93.856181] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.856187] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.856195] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.856200] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.856207] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.856214] kthread+0x3b4/0x780 [ 93.856221] ? __pfx_kthread+0x10/0x10 [ 93.856227] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.856233] ? __pfx_kthread+0x10/0x10 [ 93.856239] ? __pfx_kthread+0x10/0x10 [ 93.856246] ret_from_fork+0x22c/0x300 [ 93.856252] ? __pfx_kthread+0x10/0x10 [ 93.856259] ret_from_fork_asm+0x1a/0x30 [ 93.856267] [ 93.860137] Allocated by task 3705: [ 93.860218] kasan_save_stack+0x1c/0x40 [ 93.860307] kasan_save_track+0x10/0x30 [ 93.860406] __kasan_kmalloc+0xa6/0xb0 [ 93.860520] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.860629] kunit_try_run_case+0x175/0x440 [ 93.860723] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.860834] kthread+0x3b4/0x780 [ 93.860913] ret_from_fork+0x22c/0x300 [ 93.860999] ret_from_fork_asm+0x1a/0x30 [ 93.861139] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.861376] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.861689] The buggy address belongs to the physical page: [ 93.861801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.861954] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.862090] page_type: f5(slab) [ 93.862168] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.862346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.862506] page dumped because: kasan: bad access detected [ 93.862670] Memory state around the buggy address: [ 93.862771] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.862913] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.863052] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.863192] ^ [ 93.863294] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.863461] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.863600] ================================================================== [ 93.865491] ================================================================== [ 93.865657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e7f/0x5400 [kasan_test] [ 93.865825] Read of size 8 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.866020] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.866027] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.866029] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.866031] Call Trace: [ 93.866033] [ 93.866035] dump_stack_lvl+0x4f/0x70 [ 93.866041] print_address_description.constprop.0+0x2c/0x3b0 [ 93.866047] ? kasan_atomics_helper+0x4e7f/0x5400 [kasan_test] [ 93.866055] print_report+0xb9/0x280 [ 93.866059] ? kasan_atomics_helper+0x4e7f/0x5400 [kasan_test] [ 93.866076] ? kasan_addr_to_slab+0x9/0x90 [ 93.866080] ? kasan_atomics_helper+0x4e7f/0x5400 [kasan_test] [ 93.866088] kasan_report+0xda/0x110 [ 93.866092] ? kasan_atomics_helper+0x4e7f/0x5400 [kasan_test] [ 93.866101] kasan_atomics_helper+0x4e7f/0x5400 [kasan_test] [ 93.866118] ? kasan_unpoison+0x23/0x50 [ 93.866122] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.866131] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.866136] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.866146] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.866155] ? __pfx_read_tsc+0x10/0x10 [ 93.866167] ? ktime_get_ts64+0x7f/0x220 [ 93.866172] kunit_try_run_case+0x175/0x440 [ 93.866176] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.866179] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.866184] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.866187] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.866191] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.866195] kthread+0x3b4/0x780 [ 93.866199] ? __pfx_kthread+0x10/0x10 [ 93.866203] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.866206] ? __pfx_kthread+0x10/0x10 [ 93.866210] ? __pfx_kthread+0x10/0x10 [ 93.866214] ret_from_fork+0x22c/0x300 [ 93.866217] ? __pfx_kthread+0x10/0x10 [ 93.866221] ret_from_fork_asm+0x1a/0x30 [ 93.866226] [ 93.870041] Allocated by task 3705: [ 93.870123] kasan_save_stack+0x1c/0x40 [ 93.870215] kasan_save_track+0x10/0x30 [ 93.870303] __kasan_kmalloc+0xa6/0xb0 [ 93.870390] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.870521] kunit_try_run_case+0x175/0x440 [ 93.870614] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.870726] kthread+0x3b4/0x780 [ 93.870805] ret_from_fork+0x22c/0x300 [ 93.870893] ret_from_fork_asm+0x1a/0x30 [ 93.871035] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.871263] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.871572] The buggy address belongs to the physical page: [ 93.871686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.871840] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.871977] page_type: f5(slab) [ 93.872055] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.872203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.872350] page dumped because: kasan: bad access detected [ 93.872534] Memory state around the buggy address: [ 93.872638] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.872776] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.872914] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.873053] ^ [ 93.873154] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.873293] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.873460] ================================================================== [ 93.875105] ================================================================== [ 93.875268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13f4/0x5400 [kasan_test] [ 93.875465] Write of size 8 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.875663] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.875670] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.875672] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.875674] Call Trace: [ 93.875676] [ 93.875678] dump_stack_lvl+0x4f/0x70 [ 93.875684] print_address_description.constprop.0+0x2c/0x3b0 [ 93.875689] ? kasan_atomics_helper+0x13f4/0x5400 [kasan_test] [ 93.875697] print_report+0xb9/0x280 [ 93.875701] ? kasan_atomics_helper+0x13f4/0x5400 [kasan_test] [ 93.875709] ? kasan_addr_to_slab+0x9/0x90 [ 93.875713] ? kasan_atomics_helper+0x13f4/0x5400 [kasan_test] [ 93.875721] kasan_report+0xda/0x110 [ 93.875724] ? kasan_atomics_helper+0x13f4/0x5400 [kasan_test] [ 93.875733] kasan_check_range+0xfc/0x1b0 [ 93.875738] kasan_atomics_helper+0x13f4/0x5400 [kasan_test] [ 93.875746] ? kasan_unpoison+0x23/0x50 [ 93.875750] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.875758] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.875764] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.875774] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.875783] ? __pfx_read_tsc+0x10/0x10 [ 93.875786] ? ktime_get_ts64+0x7f/0x220 [ 93.875790] kunit_try_run_case+0x175/0x440 [ 93.875794] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.875797] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.875802] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.875805] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.875809] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.875812] kthread+0x3b4/0x780 [ 93.875816] ? __pfx_kthread+0x10/0x10 [ 93.875820] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.875823] ? __pfx_kthread+0x10/0x10 [ 93.875827] ? __pfx_kthread+0x10/0x10 [ 93.875830] ret_from_fork+0x22c/0x300 [ 93.875834] ? __pfx_kthread+0x10/0x10 [ 93.875837] ret_from_fork_asm+0x1a/0x30 [ 93.875842] [ 93.879685] Allocated by task 3705: [ 93.879766] kasan_save_stack+0x1c/0x40 [ 93.879854] kasan_save_track+0x10/0x30 [ 93.879942] __kasan_kmalloc+0xa6/0xb0 [ 93.880030] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.880138] kunit_try_run_case+0x175/0x440 [ 93.880231] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.880342] kthread+0x3b4/0x780 [ 93.880431] ret_from_fork+0x22c/0x300 [ 93.880528] ret_from_fork_asm+0x1a/0x30 [ 93.880667] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.880894] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.881182] The buggy address belongs to the physical page: [ 93.881294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.881469] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.881604] page_type: f5(slab) [ 93.881686] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.881837] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.881983] page dumped because: kasan: bad access detected [ 93.882148] Memory state around the buggy address: [ 93.882248] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.882386] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.882555] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.882693] ^ [ 93.882796] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.882934] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.883073] ================================================================== [ 93.884514] ================================================================== [ 93.884661] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50a1/0x5400 [kasan_test] [ 93.884829] Write of size 8 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.885038] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.885046] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.885047] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.885050] Call Trace: [ 93.885051] [ 93.885053] dump_stack_lvl+0x4f/0x70 [ 93.885059] print_address_description.constprop.0+0x2c/0x3b0 [ 93.885064] ? kasan_atomics_helper+0x50a1/0x5400 [kasan_test] [ 93.885073] print_report+0xb9/0x280 [ 93.885077] ? kasan_atomics_helper+0x50a1/0x5400 [kasan_test] [ 93.885085] ? kasan_addr_to_slab+0x9/0x90 [ 93.885089] ? kasan_atomics_helper+0x50a1/0x5400 [kasan_test] [ 93.885097] kasan_report+0xda/0x110 [ 93.885101] ? kasan_atomics_helper+0x50a1/0x5400 [kasan_test] [ 93.885110] kasan_atomics_helper+0x50a1/0x5400 [kasan_test] [ 93.885119] ? kasan_unpoison+0x23/0x50 [ 93.885123] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.885131] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.885137] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.885147] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.885156] ? __pfx_read_tsc+0x10/0x10 [ 93.885160] ? ktime_get_ts64+0x7f/0x220 [ 93.885164] kunit_try_run_case+0x175/0x440 [ 93.885168] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.885171] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.885176] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.885179] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.885183] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.885187] kthread+0x3b4/0x780 [ 93.885191] ? __pfx_kthread+0x10/0x10 [ 93.885195] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.885198] ? __pfx_kthread+0x10/0x10 [ 93.885202] ? __pfx_kthread+0x10/0x10 [ 93.885205] ret_from_fork+0x22c/0x300 [ 93.885209] ? __pfx_kthread+0x10/0x10 [ 93.885213] ret_from_fork_asm+0x1a/0x30 [ 93.885218] [ 93.888972] Allocated by task 3705: [ 93.889054] kasan_save_stack+0x1c/0x40 [ 93.889143] kasan_save_track+0x10/0x30 [ 93.889230] __kasan_kmalloc+0xa6/0xb0 [ 93.889318] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.889446] kunit_try_run_case+0x175/0x440 [ 93.889549] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.889660] kthread+0x3b4/0x780 [ 93.889740] ret_from_fork+0x22c/0x300 [ 93.889827] ret_from_fork_asm+0x1a/0x30 [ 93.889968] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.890194] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.890521] The buggy address belongs to the physical page: [ 93.890634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.890786] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.890924] page_type: f5(slab) [ 93.891004] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.891152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.891298] page dumped because: kasan: bad access detected [ 93.891480] Memory state around the buggy address: [ 93.891580] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.891722] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.891860] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.891998] ^ [ 93.892100] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.892238] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.892375] ================================================================== [ 93.892559] ================================================================== [ 93.892742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14a9/0x5400 [kasan_test] [ 93.892943] Write of size 8 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.893185] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.893196] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.893199] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.893203] Call Trace: [ 93.893206] [ 93.893209] dump_stack_lvl+0x4f/0x70 [ 93.893217] print_address_description.constprop.0+0x2c/0x3b0 [ 93.893226] ? kasan_atomics_helper+0x14a9/0x5400 [kasan_test] [ 93.893245] print_report+0xb9/0x280 [ 93.893252] ? kasan_atomics_helper+0x14a9/0x5400 [kasan_test] [ 93.893270] ? kasan_addr_to_slab+0x9/0x90 [ 93.893276] ? kasan_atomics_helper+0x14a9/0x5400 [kasan_test] [ 93.893295] kasan_report+0xda/0x110 [ 93.893302] ? kasan_atomics_helper+0x14a9/0x5400 [kasan_test] [ 93.893322] kasan_check_range+0xfc/0x1b0 [ 93.893330] kasan_atomics_helper+0x14a9/0x5400 [kasan_test] [ 93.893349] ? kasan_unpoison+0x23/0x50 [ 93.893355] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.893374] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.893384] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.893413] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.893432] ? __pfx_read_tsc+0x10/0x10 [ 93.893438] ? ktime_get_ts64+0x7f/0x220 [ 93.893446] kunit_try_run_case+0x175/0x440 [ 93.893453] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.893459] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.893468] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.893474] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.893481] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.893488] kthread+0x3b4/0x780 [ 93.893495] ? __pfx_kthread+0x10/0x10 [ 93.893501] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.893508] ? __pfx_kthread+0x10/0x10 [ 93.893515] ? __pfx_kthread+0x10/0x10 [ 93.893521] ret_from_fork+0x22c/0x300 [ 93.893528] ? __pfx_kthread+0x10/0x10 [ 93.893535] ret_from_fork_asm+0x1a/0x30 [ 93.893544] [ 93.897424] Allocated by task 3705: [ 93.897516] kasan_save_stack+0x1c/0x40 [ 93.897606] kasan_save_track+0x10/0x30 [ 93.897694] __kasan_kmalloc+0xa6/0xb0 [ 93.897780] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.897889] kunit_try_run_case+0x175/0x440 [ 93.897981] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.898093] kthread+0x3b4/0x780 [ 93.898171] ret_from_fork+0x22c/0x300 [ 93.898258] ret_from_fork_asm+0x1a/0x30 [ 93.898406] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.898650] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.898936] The buggy address belongs to the physical page: [ 93.899048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.899200] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.899336] page_type: f5(slab) [ 93.899424] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.899582] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.899732] page dumped because: kasan: bad access detected [ 93.899897] Memory state around the buggy address: [ 93.899999] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.900138] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.900276] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.900425] ^ [ 93.900552] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.900693] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.900830] ================================================================== [ 93.902690] ================================================================== [ 93.902832] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1541/0x5400 [kasan_test] [ 93.902998] Write of size 8 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.903194] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.903201] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.903202] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.903205] Call Trace: [ 93.903206] [ 93.903208] dump_stack_lvl+0x4f/0x70 [ 93.903213] print_address_description.constprop.0+0x2c/0x3b0 [ 93.903218] ? kasan_atomics_helper+0x1541/0x5400 [kasan_test] [ 93.903226] print_report+0xb9/0x280 [ 93.903230] ? kasan_atomics_helper+0x1541/0x5400 [kasan_test] [ 93.903238] ? kasan_addr_to_slab+0x9/0x90 [ 93.903241] ? kasan_atomics_helper+0x1541/0x5400 [kasan_test] [ 93.903249] kasan_report+0xda/0x110 [ 93.903253] ? kasan_atomics_helper+0x1541/0x5400 [kasan_test] [ 93.903262] kasan_check_range+0xfc/0x1b0 [ 93.903266] kasan_atomics_helper+0x1541/0x5400 [kasan_test] [ 93.903274] ? kasan_unpoison+0x23/0x50 [ 93.903278] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.903286] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.903291] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.903301] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.903310] ? __pfx_read_tsc+0x10/0x10 [ 93.903313] ? ktime_get_ts64+0x7f/0x220 [ 93.903317] kunit_try_run_case+0x175/0x440 [ 93.903320] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.903324] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.903328] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.903331] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.903334] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.903338] kthread+0x3b4/0x780 [ 93.903342] ? __pfx_kthread+0x10/0x10 [ 93.903345] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.903349] ? __pfx_kthread+0x10/0x10 [ 93.903352] ? __pfx_kthread+0x10/0x10 [ 93.903355] ret_from_fork+0x22c/0x300 [ 93.903359] ? __pfx_kthread+0x10/0x10 [ 93.903362] ret_from_fork_asm+0x1a/0x30 [ 93.903367] [ 93.907202] Allocated by task 3705: [ 93.907285] kasan_save_stack+0x1c/0x40 [ 93.907374] kasan_save_track+0x10/0x30 [ 93.907482] __kasan_kmalloc+0xa6/0xb0 [ 93.907569] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.907677] kunit_try_run_case+0x175/0x440 [ 93.907770] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.907881] kthread+0x3b4/0x780 [ 93.907959] ret_from_fork+0x22c/0x300 [ 93.908046] ret_from_fork_asm+0x1a/0x30 [ 93.908185] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.908422] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.908733] The buggy address belongs to the physical page: [ 93.908847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.908999] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.909134] page_type: f5(slab) [ 93.909212] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.909360] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.909526] page dumped because: kasan: bad access detected [ 93.909689] Memory state around the buggy address: [ 93.909789] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.909928] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.910067] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.910206] ^ [ 93.910309] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.910470] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.910607] ================================================================== [ 93.912293] ================================================================== [ 93.912454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15d9/0x5400 [kasan_test] [ 93.912630] Write of size 8 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.912826] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.912833] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.912834] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.912837] Call Trace: [ 93.912838] [ 93.912840] dump_stack_lvl+0x4f/0x70 [ 93.912845] print_address_description.constprop.0+0x2c/0x3b0 [ 93.912850] ? kasan_atomics_helper+0x15d9/0x5400 [kasan_test] [ 93.912858] print_report+0xb9/0x280 [ 93.912862] ? kasan_atomics_helper+0x15d9/0x5400 [kasan_test] [ 93.912870] ? kasan_addr_to_slab+0x9/0x90 [ 93.912874] ? kasan_atomics_helper+0x15d9/0x5400 [kasan_test] [ 93.912882] kasan_report+0xda/0x110 [ 93.912886] ? kasan_atomics_helper+0x15d9/0x5400 [kasan_test] [ 93.912895] kasan_check_range+0xfc/0x1b0 [ 93.912899] kasan_atomics_helper+0x15d9/0x5400 [kasan_test] [ 93.912907] ? kasan_unpoison+0x23/0x50 [ 93.912911] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.912920] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.912925] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.912935] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.912944] ? __pfx_read_tsc+0x10/0x10 [ 93.912947] ? ktime_get_ts64+0x7f/0x220 [ 93.912951] kunit_try_run_case+0x175/0x440 [ 93.912955] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.912958] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.912963] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.912965] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.912969] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.912973] kthread+0x3b4/0x780 [ 93.912977] ? __pfx_kthread+0x10/0x10 [ 93.912980] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.912984] ? __pfx_kthread+0x10/0x10 [ 93.912987] ? __pfx_kthread+0x10/0x10 [ 93.912991] ret_from_fork+0x22c/0x300 [ 93.912994] ? __pfx_kthread+0x10/0x10 [ 93.912998] ret_from_fork_asm+0x1a/0x30 [ 93.913003] [ 93.916844] Allocated by task 3705: [ 93.916925] kasan_save_stack+0x1c/0x40 [ 93.917016] kasan_save_track+0x10/0x30 [ 93.917104] __kasan_kmalloc+0xa6/0xb0 [ 93.917189] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.917298] kunit_try_run_case+0x175/0x440 [ 93.917391] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.917522] kthread+0x3b4/0x780 [ 93.917601] ret_from_fork+0x22c/0x300 [ 93.917687] ret_from_fork_asm+0x1a/0x30 [ 93.917827] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.918054] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.918341] The buggy address belongs to the physical page: [ 93.918476] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.918633] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.918767] page_type: f5(slab) [ 93.918845] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.918993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.919139] page dumped because: kasan: bad access detected [ 93.919301] Memory state around the buggy address: [ 93.919411] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.919569] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.919707] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.919845] ^ [ 93.919947] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.920085] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.920222] ================================================================== [ 93.921660] ================================================================== [ 93.921803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1670/0x5400 [kasan_test] [ 93.921973] Write of size 8 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.922171] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.922178] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.922180] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.922182] Call Trace: [ 93.922184] [ 93.922186] dump_stack_lvl+0x4f/0x70 [ 93.922190] print_address_description.constprop.0+0x2c/0x3b0 [ 93.922195] ? kasan_atomics_helper+0x1670/0x5400 [kasan_test] [ 93.922204] print_report+0xb9/0x280 [ 93.922208] ? kasan_atomics_helper+0x1670/0x5400 [kasan_test] [ 93.922216] ? kasan_addr_to_slab+0x9/0x90 [ 93.922219] ? kasan_atomics_helper+0x1670/0x5400 [kasan_test] [ 93.922227] kasan_report+0xda/0x110 [ 93.922231] ? kasan_atomics_helper+0x1670/0x5400 [kasan_test] [ 93.922240] kasan_check_range+0xfc/0x1b0 [ 93.922244] kasan_atomics_helper+0x1670/0x5400 [kasan_test] [ 93.922253] ? kasan_unpoison+0x23/0x50 [ 93.922256] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.922265] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.922270] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.922280] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.922289] ? __pfx_read_tsc+0x10/0x10 [ 93.922292] ? ktime_get_ts64+0x7f/0x220 [ 93.922296] kunit_try_run_case+0x175/0x440 [ 93.922299] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.922302] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.922307] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.922310] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.922314] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.922317] kthread+0x3b4/0x780 [ 93.922321] ? __pfx_kthread+0x10/0x10 [ 93.922325] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.922328] ? __pfx_kthread+0x10/0x10 [ 93.922332] ? __pfx_kthread+0x10/0x10 [ 93.922335] ret_from_fork+0x22c/0x300 [ 93.922339] ? __pfx_kthread+0x10/0x10 [ 93.922342] ret_from_fork_asm+0x1a/0x30 [ 93.922347] [ 93.926177] Allocated by task 3705: [ 93.926259] kasan_save_stack+0x1c/0x40 [ 93.926349] kasan_save_track+0x10/0x30 [ 93.926448] __kasan_kmalloc+0xa6/0xb0 [ 93.926547] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.926656] kunit_try_run_case+0x175/0x440 [ 93.926750] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.926861] kthread+0x3b4/0x780 [ 93.926940] ret_from_fork+0x22c/0x300 [ 93.927026] ret_from_fork_asm+0x1a/0x30 [ 93.927165] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.927392] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.927710] The buggy address belongs to the physical page: [ 93.927823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.927976] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.928111] page_type: f5(slab) [ 93.928189] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.928336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.928511] page dumped because: kasan: bad access detected [ 93.928674] Memory state around the buggy address: [ 93.928774] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.928912] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.929050] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.929188] ^ [ 93.929288] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.929436] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.929589] ================================================================== [ 93.930996] ================================================================== [ 93.931159] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1707/0x5400 [kasan_test] [ 93.931326] Write of size 8 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.931542] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.931549] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.931550] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.931553] Call Trace: [ 93.931554] [ 93.931556] dump_stack_lvl+0x4f/0x70 [ 93.931561] print_address_description.constprop.0+0x2c/0x3b0 [ 93.931566] ? kasan_atomics_helper+0x1707/0x5400 [kasan_test] [ 93.931574] print_report+0xb9/0x280 [ 93.931578] ? kasan_atomics_helper+0x1707/0x5400 [kasan_test] [ 93.931586] ? kasan_addr_to_slab+0x9/0x90 [ 93.931589] ? kasan_atomics_helper+0x1707/0x5400 [kasan_test] [ 93.931597] kasan_report+0xda/0x110 [ 93.931601] ? kasan_atomics_helper+0x1707/0x5400 [kasan_test] [ 93.931619] kasan_check_range+0xfc/0x1b0 [ 93.931623] kasan_atomics_helper+0x1707/0x5400 [kasan_test] [ 93.931631] ? kasan_unpoison+0x23/0x50 [ 93.931635] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.931643] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.931649] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.931658] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.931667] ? __pfx_read_tsc+0x10/0x10 [ 93.931670] ? ktime_get_ts64+0x7f/0x220 [ 93.931674] kunit_try_run_case+0x175/0x440 [ 93.931677] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.931680] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.931684] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.931687] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.931691] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.931694] kthread+0x3b4/0x780 [ 93.931698] ? __pfx_kthread+0x10/0x10 [ 93.931702] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.931705] ? __pfx_kthread+0x10/0x10 [ 93.931708] ? __pfx_kthread+0x10/0x10 [ 93.931712] ret_from_fork+0x22c/0x300 [ 93.931715] ? __pfx_kthread+0x10/0x10 [ 93.931719] ret_from_fork_asm+0x1a/0x30 [ 93.931723] [ 93.935564] Allocated by task 3705: [ 93.935646] kasan_save_stack+0x1c/0x40 [ 93.935733] kasan_save_track+0x10/0x30 [ 93.935823] __kasan_kmalloc+0xa6/0xb0 [ 93.935911] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.936019] kunit_try_run_case+0x175/0x440 [ 93.936112] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.936222] kthread+0x3b4/0x780 [ 93.936301] ret_from_fork+0x22c/0x300 [ 93.936387] ret_from_fork_asm+0x1a/0x30 [ 93.936545] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.936772] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.937058] The buggy address belongs to the physical page: [ 93.937170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.937322] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.937486] page_type: f5(slab) [ 93.937564] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.937711] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.937857] page dumped because: kasan: bad access detected [ 93.938019] Memory state around the buggy address: [ 93.938120] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.938258] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.938405] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.938554] ^ [ 93.938654] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.938793] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.938932] ================================================================== [ 93.940544] ================================================================== [ 93.940696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x179f/0x5400 [kasan_test] [ 93.940861] Write of size 8 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.941058] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.941064] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.941066] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.941068] Call Trace: [ 93.941070] [ 93.941071] dump_stack_lvl+0x4f/0x70 [ 93.941076] print_address_description.constprop.0+0x2c/0x3b0 [ 93.941081] ? kasan_atomics_helper+0x179f/0x5400 [kasan_test] [ 93.941090] print_report+0xb9/0x280 [ 93.941093] ? kasan_atomics_helper+0x179f/0x5400 [kasan_test] [ 93.941101] ? kasan_addr_to_slab+0x9/0x90 [ 93.941105] ? kasan_atomics_helper+0x179f/0x5400 [kasan_test] [ 93.941113] kasan_report+0xda/0x110 [ 93.941116] ? kasan_atomics_helper+0x179f/0x5400 [kasan_test] [ 93.941125] kasan_check_range+0xfc/0x1b0 [ 93.941129] kasan_atomics_helper+0x179f/0x5400 [kasan_test] [ 93.941137] ? kasan_unpoison+0x23/0x50 [ 93.941141] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.941149] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.941155] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.941164] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.941173] ? __pfx_read_tsc+0x10/0x10 [ 93.941176] ? ktime_get_ts64+0x7f/0x220 [ 93.941180] kunit_try_run_case+0x175/0x440 [ 93.941183] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.941187] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.941191] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.941193] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.941197] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.941201] kthread+0x3b4/0x780 [ 93.941205] ? __pfx_kthread+0x10/0x10 [ 93.941208] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.941211] ? __pfx_kthread+0x10/0x10 [ 93.941215] ? __pfx_kthread+0x10/0x10 [ 93.941218] ret_from_fork+0x22c/0x300 [ 93.941222] ? __pfx_kthread+0x10/0x10 [ 93.941225] ret_from_fork_asm+0x1a/0x30 [ 93.941230] [ 93.945103] Allocated by task 3705: [ 93.945187] kasan_save_stack+0x1c/0x40 [ 93.945275] kasan_save_track+0x10/0x30 [ 93.945362] __kasan_kmalloc+0xa6/0xb0 [ 93.945468] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.945576] kunit_try_run_case+0x175/0x440 [ 93.945668] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.945779] kthread+0x3b4/0x780 [ 93.945861] ret_from_fork+0x22c/0x300 [ 93.945948] ret_from_fork_asm+0x1a/0x30 [ 93.946088] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.946314] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.946623] The buggy address belongs to the physical page: [ 93.946735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.946887] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.947022] page_type: f5(slab) [ 93.947100] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.947247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.947402] page dumped because: kasan: bad access detected [ 93.947586] Memory state around the buggy address: [ 93.947686] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.947825] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.947963] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.948100] ^ [ 93.948201] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.948342] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.948509] ================================================================== [ 93.948668] ================================================================== [ 93.948851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1837/0x5400 [kasan_test] [ 93.949056] Write of size 8 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.949297] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.949308] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.949311] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.949315] Call Trace: [ 93.949318] [ 93.949321] dump_stack_lvl+0x4f/0x70 [ 93.949329] print_address_description.constprop.0+0x2c/0x3b0 [ 93.949337] ? kasan_atomics_helper+0x1837/0x5400 [kasan_test] [ 93.949356] print_report+0xb9/0x280 [ 93.949363] ? kasan_atomics_helper+0x1837/0x5400 [kasan_test] [ 93.949381] ? kasan_addr_to_slab+0x9/0x90 [ 93.949387] ? kasan_atomics_helper+0x1837/0x5400 [kasan_test] [ 93.949415] kasan_report+0xda/0x110 [ 93.949422] ? kasan_atomics_helper+0x1837/0x5400 [kasan_test] [ 93.949441] kasan_check_range+0xfc/0x1b0 [ 93.949449] kasan_atomics_helper+0x1837/0x5400 [kasan_test] [ 93.949477] ? kasan_unpoison+0x23/0x50 [ 93.949483] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.949502] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.949512] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.949531] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.949551] ? __pfx_read_tsc+0x10/0x10 [ 93.949556] ? ktime_get_ts64+0x7f/0x220 [ 93.949563] kunit_try_run_case+0x175/0x440 [ 93.949570] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.949576] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.949584] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.949590] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.949597] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.949604] kthread+0x3b4/0x780 [ 93.949610] ? __pfx_kthread+0x10/0x10 [ 93.949616] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.949623] ? __pfx_kthread+0x10/0x10 [ 93.949629] ? __pfx_kthread+0x10/0x10 [ 93.949636] ret_from_fork+0x22c/0x300 [ 93.949642] ? __pfx_kthread+0x10/0x10 [ 93.949648] ret_from_fork_asm+0x1a/0x30 [ 93.949657] [ 93.953501] Allocated by task 3705: [ 93.953582] kasan_save_stack+0x1c/0x40 [ 93.953671] kasan_save_track+0x10/0x30 [ 93.953758] __kasan_kmalloc+0xa6/0xb0 [ 93.953844] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.953953] kunit_try_run_case+0x175/0x440 [ 93.954045] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.954156] kthread+0x3b4/0x780 [ 93.954235] ret_from_fork+0x22c/0x300 [ 93.954323] ret_from_fork_asm+0x1a/0x30 [ 93.954494] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.954731] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.955019] The buggy address belongs to the physical page: [ 93.955131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.955283] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.955418] page_type: f5(slab) [ 93.955515] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.955663] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.955809] page dumped because: kasan: bad access detected [ 93.955972] Memory state around the buggy address: [ 93.956073] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.956211] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.956348] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.956504] ^ [ 93.956608] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.956745] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.956883] ================================================================== [ 93.958754] ================================================================== [ 93.958896] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18cf/0x5400 [kasan_test] [ 93.959062] Write of size 8 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.959258] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.959265] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.959266] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.959269] Call Trace: [ 93.959270] [ 93.959272] dump_stack_lvl+0x4f/0x70 [ 93.959277] print_address_description.constprop.0+0x2c/0x3b0 [ 93.959281] ? kasan_atomics_helper+0x18cf/0x5400 [kasan_test] [ 93.959290] print_report+0xb9/0x280 [ 93.959293] ? kasan_atomics_helper+0x18cf/0x5400 [kasan_test] [ 93.959301] ? kasan_addr_to_slab+0x9/0x90 [ 93.959304] ? kasan_atomics_helper+0x18cf/0x5400 [kasan_test] [ 93.959312] kasan_report+0xda/0x110 [ 93.959316] ? kasan_atomics_helper+0x18cf/0x5400 [kasan_test] [ 93.959325] kasan_check_range+0xfc/0x1b0 [ 93.959329] kasan_atomics_helper+0x18cf/0x5400 [kasan_test] [ 93.959337] ? kasan_unpoison+0x23/0x50 [ 93.959341] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.959349] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.959354] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.959363] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.959372] ? __pfx_read_tsc+0x10/0x10 [ 93.959375] ? ktime_get_ts64+0x7f/0x220 [ 93.959379] kunit_try_run_case+0x175/0x440 [ 93.959382] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.959386] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.959390] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.959392] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.959405] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.959409] kthread+0x3b4/0x780 [ 93.959413] ? __pfx_kthread+0x10/0x10 [ 93.959416] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.959419] ? __pfx_kthread+0x10/0x10 [ 93.959423] ? __pfx_kthread+0x10/0x10 [ 93.959426] ret_from_fork+0x22c/0x300 [ 93.959430] ? __pfx_kthread+0x10/0x10 [ 93.959433] ret_from_fork_asm+0x1a/0x30 [ 93.959438] [ 93.963277] Allocated by task 3705: [ 93.963358] kasan_save_stack+0x1c/0x40 [ 93.963458] kasan_save_track+0x10/0x30 [ 93.963556] __kasan_kmalloc+0xa6/0xb0 [ 93.963642] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.963756] kunit_try_run_case+0x175/0x440 [ 93.963848] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.963960] kthread+0x3b4/0x780 [ 93.964038] ret_from_fork+0x22c/0x300 [ 93.964124] ret_from_fork_asm+0x1a/0x30 [ 93.964264] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.964523] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.964809] The buggy address belongs to the physical page: [ 93.964921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.965073] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.965209] page_type: f5(slab) [ 93.965287] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.965446] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.965612] page dumped because: kasan: bad access detected [ 93.965774] Memory state around the buggy address: [ 93.965877] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.966018] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.966156] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.966294] ^ [ 93.966403] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.966570] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.966708] ================================================================== [ 93.968209] ================================================================== [ 93.968362] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1967/0x5400 [kasan_test] [ 93.968548] Write of size 8 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.968745] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.968752] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.968753] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.968756] Call Trace: [ 93.968757] [ 93.968759] dump_stack_lvl+0x4f/0x70 [ 93.968764] print_address_description.constprop.0+0x2c/0x3b0 [ 93.968768] ? kasan_atomics_helper+0x1967/0x5400 [kasan_test] [ 93.968777] print_report+0xb9/0x280 [ 93.968780] ? kasan_atomics_helper+0x1967/0x5400 [kasan_test] [ 93.968788] ? kasan_addr_to_slab+0x9/0x90 [ 93.968792] ? kasan_atomics_helper+0x1967/0x5400 [kasan_test] [ 93.968799] kasan_report+0xda/0x110 [ 93.968803] ? kasan_atomics_helper+0x1967/0x5400 [kasan_test] [ 93.968812] kasan_check_range+0xfc/0x1b0 [ 93.968816] kasan_atomics_helper+0x1967/0x5400 [kasan_test] [ 93.968824] ? kasan_unpoison+0x23/0x50 [ 93.968828] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.968836] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.968841] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.968851] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.968860] ? __pfx_read_tsc+0x10/0x10 [ 93.968863] ? ktime_get_ts64+0x7f/0x220 [ 93.968867] kunit_try_run_case+0x175/0x440 [ 93.968870] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.968873] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.968877] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.968880] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.968884] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.968888] kthread+0x3b4/0x780 [ 93.968891] ? __pfx_kthread+0x10/0x10 [ 93.968895] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.968898] ? __pfx_kthread+0x10/0x10 [ 93.968901] ? __pfx_kthread+0x10/0x10 [ 93.968905] ret_from_fork+0x22c/0x300 [ 93.968908] ? __pfx_kthread+0x10/0x10 [ 93.968912] ret_from_fork_asm+0x1a/0x30 [ 93.968916] [ 93.972773] Allocated by task 3705: [ 93.972855] kasan_save_stack+0x1c/0x40 [ 93.972943] kasan_save_track+0x10/0x30 [ 93.973031] __kasan_kmalloc+0xa6/0xb0 [ 93.973117] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.973226] kunit_try_run_case+0x175/0x440 [ 93.973319] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.973432] kthread+0x3b4/0x780 [ 93.973512] ret_from_fork+0x22c/0x300 [ 93.973599] ret_from_fork_asm+0x1a/0x30 [ 93.973743] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.973975] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.974264] The buggy address belongs to the physical page: [ 93.974376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.974528] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.974664] page_type: f5(slab) [ 93.974742] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.974890] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.975036] page dumped because: kasan: bad access detected [ 93.975200] Memory state around the buggy address: [ 93.975301] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.975450] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.975589] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.975730] ^ [ 93.975830] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.975968] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.976105] ================================================================== [ 93.977709] ================================================================== [ 93.977862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a02/0x5400 [kasan_test] [ 93.978027] Write of size 8 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.978222] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.978228] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.978230] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.978232] Call Trace: [ 93.978234] [ 93.978235] dump_stack_lvl+0x4f/0x70 [ 93.978240] print_address_description.constprop.0+0x2c/0x3b0 [ 93.978244] ? kasan_atomics_helper+0x1a02/0x5400 [kasan_test] [ 93.978253] print_report+0xb9/0x280 [ 93.978256] ? kasan_atomics_helper+0x1a02/0x5400 [kasan_test] [ 93.978264] ? kasan_addr_to_slab+0x9/0x90 [ 93.978267] ? kasan_atomics_helper+0x1a02/0x5400 [kasan_test] [ 93.978275] kasan_report+0xda/0x110 [ 93.978279] ? kasan_atomics_helper+0x1a02/0x5400 [kasan_test] [ 93.978288] kasan_check_range+0xfc/0x1b0 [ 93.978292] kasan_atomics_helper+0x1a02/0x5400 [kasan_test] [ 93.978300] ? kasan_unpoison+0x23/0x50 [ 93.978304] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.978312] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.978317] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.978327] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.978336] ? __pfx_read_tsc+0x10/0x10 [ 93.978339] ? ktime_get_ts64+0x7f/0x220 [ 93.978343] kunit_try_run_case+0x175/0x440 [ 93.978346] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.978350] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.978354] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.978357] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.978361] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.978364] kthread+0x3b4/0x780 [ 93.978368] ? __pfx_kthread+0x10/0x10 [ 93.978371] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.978375] ? __pfx_kthread+0x10/0x10 [ 93.978378] ? __pfx_kthread+0x10/0x10 [ 93.978382] ret_from_fork+0x22c/0x300 [ 93.978385] ? __pfx_kthread+0x10/0x10 [ 93.978388] ret_from_fork_asm+0x1a/0x30 [ 93.978393] [ 93.982175] Allocated by task 3705: [ 93.982257] kasan_save_stack+0x1c/0x40 [ 93.982345] kasan_save_track+0x10/0x30 [ 93.982441] __kasan_kmalloc+0xa6/0xb0 [ 93.982537] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.982645] kunit_try_run_case+0x175/0x440 [ 93.982737] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.982848] kthread+0x3b4/0x780 [ 93.982927] ret_from_fork+0x22c/0x300 [ 93.983015] ret_from_fork_asm+0x1a/0x30 [ 93.983155] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.983385] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.983672] The buggy address belongs to the physical page: [ 93.983787] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.983939] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.984077] page_type: f5(slab) [ 93.984155] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.984302] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.984458] page dumped because: kasan: bad access detected [ 93.984630] Memory state around the buggy address: [ 93.984733] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.984871] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.985010] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.985147] ^ [ 93.985248] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.985385] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.985522] ================================================================== [ 93.985687] ================================================================== [ 93.985853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1aa4/0x5400 [kasan_test] [ 93.986056] Write of size 8 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.986295] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.986306] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.986309] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.986314] Call Trace: [ 93.986316] [ 93.986319] dump_stack_lvl+0x4f/0x70 [ 93.986327] print_address_description.constprop.0+0x2c/0x3b0 [ 93.986335] ? kasan_atomics_helper+0x1aa4/0x5400 [kasan_test] [ 93.986355] print_report+0xb9/0x280 [ 93.986361] ? kasan_atomics_helper+0x1aa4/0x5400 [kasan_test] [ 93.986380] ? kasan_addr_to_slab+0x9/0x90 [ 93.986387] ? kasan_atomics_helper+0x1aa4/0x5400 [kasan_test] [ 93.986405] kasan_report+0xda/0x110 [ 93.986412] ? kasan_atomics_helper+0x1aa4/0x5400 [kasan_test] [ 93.986441] kasan_check_range+0xfc/0x1b0 [ 93.986449] kasan_atomics_helper+0x1aa4/0x5400 [kasan_test] [ 93.986468] ? kasan_unpoison+0x23/0x50 [ 93.986475] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.986502] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.986512] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.986532] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.986552] ? __pfx_read_tsc+0x10/0x10 [ 93.986557] ? ktime_get_ts64+0x7f/0x220 [ 93.986565] kunit_try_run_case+0x175/0x440 [ 93.986571] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.986577] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.986586] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.986591] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.986598] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.986606] kthread+0x3b4/0x780 [ 93.986612] ? __pfx_kthread+0x10/0x10 [ 93.986618] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.986625] ? __pfx_kthread+0x10/0x10 [ 93.986631] ? __pfx_kthread+0x10/0x10 [ 93.986638] ret_from_fork+0x22c/0x300 [ 93.986644] ? __pfx_kthread+0x10/0x10 [ 93.986650] ret_from_fork_asm+0x1a/0x30 [ 93.986659] [ 93.990556] Allocated by task 3705: [ 93.990638] kasan_save_stack+0x1c/0x40 [ 93.990727] kasan_save_track+0x10/0x30 [ 93.990814] __kasan_kmalloc+0xa6/0xb0 [ 93.990900] kasan_atomics+0x91/0x2d0 [kasan_test] [ 93.991008] kunit_try_run_case+0x175/0x440 [ 93.991101] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.991211] kthread+0x3b4/0x780 [ 93.991292] ret_from_fork+0x22c/0x300 [ 93.991378] ret_from_fork_asm+0x1a/0x30 [ 93.991552] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 93.991779] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 93.992076] The buggy address belongs to the physical page: [ 93.992190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 93.992342] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 93.992500] page_type: f5(slab) [ 93.992580] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 93.992732] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 93.992882] page dumped because: kasan: bad access detected [ 93.993047] Memory state around the buggy address: [ 93.993151] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.993290] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.993429] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 93.993567] ^ [ 93.993671] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.993812] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 93.993952] ================================================================== [ 93.995811] ================================================================== [ 93.995953] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b7f/0x5400 [kasan_test] [ 93.996118] Write of size 8 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 93.996316] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 93.996323] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.996325] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 93.996327] Call Trace: [ 93.996329] [ 93.996330] dump_stack_lvl+0x4f/0x70 [ 93.996335] print_address_description.constprop.0+0x2c/0x3b0 [ 93.996340] ? kasan_atomics_helper+0x1b7f/0x5400 [kasan_test] [ 93.996348] print_report+0xb9/0x280 [ 93.996352] ? kasan_atomics_helper+0x1b7f/0x5400 [kasan_test] [ 93.996360] ? kasan_addr_to_slab+0x9/0x90 [ 93.996363] ? kasan_atomics_helper+0x1b7f/0x5400 [kasan_test] [ 93.996371] kasan_report+0xda/0x110 [ 93.996375] ? kasan_atomics_helper+0x1b7f/0x5400 [kasan_test] [ 93.996384] kasan_check_range+0xfc/0x1b0 [ 93.996388] kasan_atomics_helper+0x1b7f/0x5400 [kasan_test] [ 93.996405] ? kasan_unpoison+0x23/0x50 [ 93.996409] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 93.996417] ? __kmalloc_cache_noprof+0x158/0x430 [ 93.996422] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 93.996441] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 93.996451] ? __pfx_read_tsc+0x10/0x10 [ 93.996454] ? ktime_get_ts64+0x7f/0x220 [ 93.996458] kunit_try_run_case+0x175/0x440 [ 93.996462] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.996474] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 93.996478] ? __pfx_kunit_try_run_case+0x10/0x10 [ 93.996481] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 93.996485] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 93.996489] kthread+0x3b4/0x780 [ 93.996492] ? __pfx_kthread+0x10/0x10 [ 93.996496] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 93.996508] ? __pfx_kthread+0x10/0x10 [ 93.996512] ? __pfx_kthread+0x10/0x10 [ 93.996515] ret_from_fork+0x22c/0x300 [ 93.996519] ? __pfx_kthread+0x10/0x10 [ 93.996522] ret_from_fork_asm+0x1a/0x30 [ 93.996526] [ 94.000344] Allocated by task 3705: [ 94.000435] kasan_save_stack+0x1c/0x40 [ 94.000544] kasan_save_track+0x10/0x30 [ 94.000630] __kasan_kmalloc+0xa6/0xb0 [ 94.000716] kasan_atomics+0x91/0x2d0 [kasan_test] [ 94.000826] kunit_try_run_case+0x175/0x440 [ 94.000918] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.001030] kthread+0x3b4/0x780 [ 94.001108] ret_from_fork+0x22c/0x300 [ 94.001194] ret_from_fork_asm+0x1a/0x30 [ 94.001334] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 94.001582] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 94.001867] The buggy address belongs to the physical page: [ 94.001979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 94.002131] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 94.002265] page_type: f5(slab) [ 94.002343] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 94.002531] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.002678] page dumped because: kasan: bad access detected [ 94.002841] Memory state around the buggy address: [ 94.002941] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.003080] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.003217] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 94.003355] ^ [ 94.003476] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.003624] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.003761] ================================================================== [ 94.005475] ================================================================== [ 94.005618] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f01/0x5400 [kasan_test] [ 94.005784] Read of size 8 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 94.005985] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 94.005991] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 94.005993] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 94.005995] Call Trace: [ 94.005997] [ 94.005998] dump_stack_lvl+0x4f/0x70 [ 94.006003] print_address_description.constprop.0+0x2c/0x3b0 [ 94.006008] ? kasan_atomics_helper+0x4f01/0x5400 [kasan_test] [ 94.006017] print_report+0xb9/0x280 [ 94.006020] ? kasan_atomics_helper+0x4f01/0x5400 [kasan_test] [ 94.006029] ? kasan_addr_to_slab+0x9/0x90 [ 94.006032] ? kasan_atomics_helper+0x4f01/0x5400 [kasan_test] [ 94.006040] kasan_report+0xda/0x110 [ 94.006044] ? kasan_atomics_helper+0x4f01/0x5400 [kasan_test] [ 94.006053] kasan_atomics_helper+0x4f01/0x5400 [kasan_test] [ 94.006061] ? kasan_unpoison+0x23/0x50 [ 94.006065] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 94.006073] ? __kmalloc_cache_noprof+0x158/0x430 [ 94.006079] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 94.006088] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 94.006098] ? __pfx_read_tsc+0x10/0x10 [ 94.006101] ? ktime_get_ts64+0x7f/0x220 [ 94.006105] kunit_try_run_case+0x175/0x440 [ 94.006108] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.006112] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 94.006116] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.006119] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 94.006123] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.006127] kthread+0x3b4/0x780 [ 94.006131] ? __pfx_kthread+0x10/0x10 [ 94.006134] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 94.006138] ? __pfx_kthread+0x10/0x10 [ 94.006141] ? __pfx_kthread+0x10/0x10 [ 94.006145] ret_from_fork+0x22c/0x300 [ 94.006148] ? __pfx_kthread+0x10/0x10 [ 94.006152] ret_from_fork_asm+0x1a/0x30 [ 94.006156] [ 94.009875] Allocated by task 3705: [ 94.009959] kasan_save_stack+0x1c/0x40 [ 94.010047] kasan_save_track+0x10/0x30 [ 94.010135] __kasan_kmalloc+0xa6/0xb0 [ 94.010222] kasan_atomics+0x91/0x2d0 [kasan_test] [ 94.010330] kunit_try_run_case+0x175/0x440 [ 94.010441] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.010573] kthread+0x3b4/0x780 [ 94.010655] ret_from_fork+0x22c/0x300 [ 94.010741] ret_from_fork_asm+0x1a/0x30 [ 94.010880] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 94.011107] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 94.011393] The buggy address belongs to the physical page: [ 94.011524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 94.011676] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 94.011814] page_type: f5(slab) [ 94.011892] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 94.012039] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.012185] page dumped because: kasan: bad access detected [ 94.012350] Memory state around the buggy address: [ 94.012461] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.012609] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.012747] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 94.012884] ^ [ 94.012985] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.013122] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.013263] ================================================================== [ 94.014650] ================================================================== [ 94.014793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c40/0x5400 [kasan_test] [ 94.014960] Write of size 8 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 94.015166] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 94.015173] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 94.015175] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 94.015177] Call Trace: [ 94.015178] [ 94.015180] dump_stack_lvl+0x4f/0x70 [ 94.015185] print_address_description.constprop.0+0x2c/0x3b0 [ 94.015189] ? kasan_atomics_helper+0x1c40/0x5400 [kasan_test] [ 94.015198] print_report+0xb9/0x280 [ 94.015201] ? kasan_atomics_helper+0x1c40/0x5400 [kasan_test] [ 94.015209] ? kasan_addr_to_slab+0x9/0x90 [ 94.015212] ? kasan_atomics_helper+0x1c40/0x5400 [kasan_test] [ 94.015220] kasan_report+0xda/0x110 [ 94.015224] ? kasan_atomics_helper+0x1c40/0x5400 [kasan_test] [ 94.015233] kasan_check_range+0xfc/0x1b0 [ 94.015237] kasan_atomics_helper+0x1c40/0x5400 [kasan_test] [ 94.015245] ? kasan_unpoison+0x23/0x50 [ 94.015249] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 94.015257] ? __kmalloc_cache_noprof+0x158/0x430 [ 94.015262] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 94.015272] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 94.015281] ? __pfx_read_tsc+0x10/0x10 [ 94.015284] ? ktime_get_ts64+0x7f/0x220 [ 94.015287] kunit_try_run_case+0x175/0x440 [ 94.015291] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.015294] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 94.015298] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.015301] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 94.015304] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.015308] kthread+0x3b4/0x780 [ 94.015312] ? __pfx_kthread+0x10/0x10 [ 94.015315] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 94.015318] ? __pfx_kthread+0x10/0x10 [ 94.015322] ? __pfx_kthread+0x10/0x10 [ 94.015325] ret_from_fork+0x22c/0x300 [ 94.015329] ? __pfx_kthread+0x10/0x10 [ 94.015332] ret_from_fork_asm+0x1a/0x30 [ 94.015337] [ 94.019134] Allocated by task 3705: [ 94.019215] kasan_save_stack+0x1c/0x40 [ 94.019303] kasan_save_track+0x10/0x30 [ 94.019402] __kasan_kmalloc+0xa6/0xb0 [ 94.019497] kasan_atomics+0x91/0x2d0 [kasan_test] [ 94.019608] kunit_try_run_case+0x175/0x440 [ 94.019703] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.019815] kthread+0x3b4/0x780 [ 94.019893] ret_from_fork+0x22c/0x300 [ 94.019979] ret_from_fork_asm+0x1a/0x30 [ 94.020122] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 94.020349] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 94.020654] The buggy address belongs to the physical page: [ 94.020766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 94.020918] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 94.021052] page_type: f5(slab) [ 94.021130] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 94.021279] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.021425] page dumped because: kasan: bad access detected [ 94.021587] Memory state around the buggy address: [ 94.021687] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.021825] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.021963] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 94.022101] ^ [ 94.022201] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.022339] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.022487] ================================================================== [ 94.023898] ================================================================== [ 94.024041] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1cd8/0x5400 [kasan_test] [ 94.024208] Write of size 8 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 94.024422] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 94.024438] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 94.024440] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 94.024442] Call Trace: [ 94.024444] [ 94.024445] dump_stack_lvl+0x4f/0x70 [ 94.024450] print_address_description.constprop.0+0x2c/0x3b0 [ 94.024455] ? kasan_atomics_helper+0x1cd8/0x5400 [kasan_test] [ 94.024473] print_report+0xb9/0x280 [ 94.024477] ? kasan_atomics_helper+0x1cd8/0x5400 [kasan_test] [ 94.024485] ? kasan_addr_to_slab+0x9/0x90 [ 94.024488] ? kasan_atomics_helper+0x1cd8/0x5400 [kasan_test] [ 94.024505] kasan_report+0xda/0x110 [ 94.024509] ? kasan_atomics_helper+0x1cd8/0x5400 [kasan_test] [ 94.024518] kasan_check_range+0xfc/0x1b0 [ 94.024522] kasan_atomics_helper+0x1cd8/0x5400 [kasan_test] [ 94.024530] ? kasan_unpoison+0x23/0x50 [ 94.024534] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 94.024542] ? __kmalloc_cache_noprof+0x158/0x430 [ 94.024547] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 94.024557] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 94.024566] ? __pfx_read_tsc+0x10/0x10 [ 94.024568] ? ktime_get_ts64+0x7f/0x220 [ 94.024573] kunit_try_run_case+0x175/0x440 [ 94.024576] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.024579] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 94.024583] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.024586] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 94.024590] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.024593] kthread+0x3b4/0x780 [ 94.024597] ? __pfx_kthread+0x10/0x10 [ 94.024600] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 94.024603] ? __pfx_kthread+0x10/0x10 [ 94.024607] ? __pfx_kthread+0x10/0x10 [ 94.024610] ret_from_fork+0x22c/0x300 [ 94.024614] ? __pfx_kthread+0x10/0x10 [ 94.024617] ret_from_fork_asm+0x1a/0x30 [ 94.024622] [ 94.028443] Allocated by task 3705: [ 94.028545] kasan_save_stack+0x1c/0x40 [ 94.028633] kasan_save_track+0x10/0x30 [ 94.028722] __kasan_kmalloc+0xa6/0xb0 [ 94.028808] kasan_atomics+0x91/0x2d0 [kasan_test] [ 94.028917] kunit_try_run_case+0x175/0x440 [ 94.029009] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.029123] kthread+0x3b4/0x780 [ 94.029202] ret_from_fork+0x22c/0x300 [ 94.029290] ret_from_fork_asm+0x1a/0x30 [ 94.029440] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 94.029679] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 94.029971] The buggy address belongs to the physical page: [ 94.030083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 94.030235] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 94.030370] page_type: f5(slab) [ 94.030477] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 94.030636] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.030782] page dumped because: kasan: bad access detected [ 94.030944] Memory state around the buggy address: [ 94.031046] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.031185] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.031325] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 94.031484] ^ [ 94.031595] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.031732] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.031870] ================================================================== [ 94.032030] ================================================================== [ 94.032194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d6f/0x5400 [kasan_test] [ 94.032397] Write of size 8 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 94.032657] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 94.032667] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 94.032670] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 94.032674] Call Trace: [ 94.032677] [ 94.032680] dump_stack_lvl+0x4f/0x70 [ 94.032687] print_address_description.constprop.0+0x2c/0x3b0 [ 94.032695] ? kasan_atomics_helper+0x1d6f/0x5400 [kasan_test] [ 94.032715] print_report+0xb9/0x280 [ 94.032721] ? kasan_atomics_helper+0x1d6f/0x5400 [kasan_test] [ 94.032740] ? kasan_addr_to_slab+0x9/0x90 [ 94.032746] ? kasan_atomics_helper+0x1d6f/0x5400 [kasan_test] [ 94.032765] kasan_report+0xda/0x110 [ 94.032772] ? kasan_atomics_helper+0x1d6f/0x5400 [kasan_test] [ 94.032792] kasan_check_range+0xfc/0x1b0 [ 94.032800] kasan_atomics_helper+0x1d6f/0x5400 [kasan_test] [ 94.032818] ? kasan_unpoison+0x23/0x50 [ 94.032825] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 94.032844] ? __kmalloc_cache_noprof+0x158/0x430 [ 94.032854] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 94.032874] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 94.032893] ? __pfx_read_tsc+0x10/0x10 [ 94.032899] ? ktime_get_ts64+0x7f/0x220 [ 94.032906] kunit_try_run_case+0x175/0x440 [ 94.032912] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.032919] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 94.032926] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.032932] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 94.032939] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.032946] kthread+0x3b4/0x780 [ 94.032953] ? __pfx_kthread+0x10/0x10 [ 94.032959] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 94.032965] ? __pfx_kthread+0x10/0x10 [ 94.032972] ? __pfx_kthread+0x10/0x10 [ 94.032978] ret_from_fork+0x22c/0x300 [ 94.032985] ? __pfx_kthread+0x10/0x10 [ 94.032991] ret_from_fork_asm+0x1a/0x30 [ 94.033000] [ 94.036896] Allocated by task 3705: [ 94.036979] kasan_save_stack+0x1c/0x40 [ 94.037067] kasan_save_track+0x10/0x30 [ 94.037157] __kasan_kmalloc+0xa6/0xb0 [ 94.037243] kasan_atomics+0x91/0x2d0 [kasan_test] [ 94.037350] kunit_try_run_case+0x175/0x440 [ 94.037461] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.037575] kthread+0x3b4/0x780 [ 94.037654] ret_from_fork+0x22c/0x300 [ 94.037741] ret_from_fork_asm+0x1a/0x30 [ 94.037879] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 94.038107] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 94.038404] The buggy address belongs to the physical page: [ 94.038545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 94.038697] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 94.038832] page_type: f5(slab) [ 94.038910] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 94.039061] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.039207] page dumped because: kasan: bad access detected [ 94.039371] Memory state around the buggy address: [ 94.039510] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.039648] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.039786] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 94.039924] ^ [ 94.040027] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.040177] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.040315] ================================================================== [ 94.042160] ================================================================== [ 94.042304] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e06/0x5400 [kasan_test] [ 94.042480] Write of size 8 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 94.042685] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 94.042692] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 94.042694] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 94.042696] Call Trace: [ 94.042698] [ 94.042700] dump_stack_lvl+0x4f/0x70 [ 94.042704] print_address_description.constprop.0+0x2c/0x3b0 [ 94.042709] ? kasan_atomics_helper+0x1e06/0x5400 [kasan_test] [ 94.042717] print_report+0xb9/0x280 [ 94.042721] ? kasan_atomics_helper+0x1e06/0x5400 [kasan_test] [ 94.042729] ? kasan_addr_to_slab+0x9/0x90 [ 94.042733] ? kasan_atomics_helper+0x1e06/0x5400 [kasan_test] [ 94.042741] kasan_report+0xda/0x110 [ 94.042745] ? kasan_atomics_helper+0x1e06/0x5400 [kasan_test] [ 94.042753] kasan_check_range+0xfc/0x1b0 [ 94.042758] kasan_atomics_helper+0x1e06/0x5400 [kasan_test] [ 94.042766] ? kasan_unpoison+0x23/0x50 [ 94.042770] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 94.042778] ? __kmalloc_cache_noprof+0x158/0x430 [ 94.042783] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 94.042793] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 94.042802] ? __pfx_read_tsc+0x10/0x10 [ 94.042805] ? ktime_get_ts64+0x7f/0x220 [ 94.042809] kunit_try_run_case+0x175/0x440 [ 94.042813] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.042816] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 94.042821] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.042823] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 94.042827] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.042831] kthread+0x3b4/0x780 [ 94.042835] ? __pfx_kthread+0x10/0x10 [ 94.042838] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 94.042842] ? __pfx_kthread+0x10/0x10 [ 94.042845] ? __pfx_kthread+0x10/0x10 [ 94.042849] ret_from_fork+0x22c/0x300 [ 94.042852] ? __pfx_kthread+0x10/0x10 [ 94.042856] ret_from_fork_asm+0x1a/0x30 [ 94.042861] [ 94.046700] Allocated by task 3705: [ 94.046781] kasan_save_stack+0x1c/0x40 [ 94.046869] kasan_save_track+0x10/0x30 [ 94.046957] __kasan_kmalloc+0xa6/0xb0 [ 94.047044] kasan_atomics+0x91/0x2d0 [kasan_test] [ 94.047152] kunit_try_run_case+0x175/0x440 [ 94.047246] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.047356] kthread+0x3b4/0x780 [ 94.047444] ret_from_fork+0x22c/0x300 [ 94.047541] ret_from_fork_asm+0x1a/0x30 [ 94.047680] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 94.047907] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 94.048195] The buggy address belongs to the physical page: [ 94.048307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 94.048469] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 94.048614] page_type: f5(slab) [ 94.048692] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 94.048842] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.048989] page dumped because: kasan: bad access detected [ 94.049152] Memory state around the buggy address: [ 94.049254] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.049392] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.049530] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 94.049667] ^ [ 94.049768] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.049907] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.050044] ================================================================== [ 94.051769] ================================================================== [ 94.051913] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e9e/0x5400 [kasan_test] [ 94.052088] Write of size 8 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 94.052284] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 94.052291] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 94.052292] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 94.052295] Call Trace: [ 94.052296] [ 94.052298] dump_stack_lvl+0x4f/0x70 [ 94.052303] print_address_description.constprop.0+0x2c/0x3b0 [ 94.052307] ? kasan_atomics_helper+0x1e9e/0x5400 [kasan_test] [ 94.052316] print_report+0xb9/0x280 [ 94.052320] ? kasan_atomics_helper+0x1e9e/0x5400 [kasan_test] [ 94.052328] ? kasan_addr_to_slab+0x9/0x90 [ 94.052331] ? kasan_atomics_helper+0x1e9e/0x5400 [kasan_test] [ 94.052339] kasan_report+0xda/0x110 [ 94.052343] ? kasan_atomics_helper+0x1e9e/0x5400 [kasan_test] [ 94.052351] kasan_check_range+0xfc/0x1b0 [ 94.052356] kasan_atomics_helper+0x1e9e/0x5400 [kasan_test] [ 94.052364] ? kasan_unpoison+0x23/0x50 [ 94.052368] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 94.052376] ? __kmalloc_cache_noprof+0x158/0x430 [ 94.052381] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 94.052391] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 94.052409] ? __pfx_read_tsc+0x10/0x10 [ 94.052412] ? ktime_get_ts64+0x7f/0x220 [ 94.052416] kunit_try_run_case+0x175/0x440 [ 94.052419] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.052422] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 94.052436] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.052439] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 94.052443] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.052447] kthread+0x3b4/0x780 [ 94.052450] ? __pfx_kthread+0x10/0x10 [ 94.052454] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 94.052458] ? __pfx_kthread+0x10/0x10 [ 94.052461] ? __pfx_kthread+0x10/0x10 [ 94.052474] ret_from_fork+0x22c/0x300 [ 94.052477] ? __pfx_kthread+0x10/0x10 [ 94.052481] ret_from_fork_asm+0x1a/0x30 [ 94.052485] [ 94.056298] Allocated by task 3705: [ 94.056380] kasan_save_stack+0x1c/0x40 [ 94.056497] kasan_save_track+0x10/0x30 [ 94.056585] __kasan_kmalloc+0xa6/0xb0 [ 94.056671] kasan_atomics+0x91/0x2d0 [kasan_test] [ 94.056785] kunit_try_run_case+0x175/0x440 [ 94.056877] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.056988] kthread+0x3b4/0x780 [ 94.057067] ret_from_fork+0x22c/0x300 [ 94.057153] ret_from_fork_asm+0x1a/0x30 [ 94.057293] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 94.057541] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 94.057827] The buggy address belongs to the physical page: [ 94.057939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 94.058092] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 94.058228] page_type: f5(slab) [ 94.058305] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 94.058485] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.058640] page dumped because: kasan: bad access detected [ 94.058803] Memory state around the buggy address: [ 94.058904] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.059042] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.059179] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 94.059318] ^ [ 94.059429] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.059586] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.059723] ================================================================== [ 94.061137] ================================================================== [ 94.061299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f42/0x5400 [kasan_test] [ 94.061485] Read of size 8 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 94.061680] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 94.061687] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 94.061689] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 94.061692] Call Trace: [ 94.061693] [ 94.061695] dump_stack_lvl+0x4f/0x70 [ 94.061700] print_address_description.constprop.0+0x2c/0x3b0 [ 94.061706] ? kasan_atomics_helper+0x4f42/0x5400 [kasan_test] [ 94.061714] print_report+0xb9/0x280 [ 94.061718] ? kasan_atomics_helper+0x4f42/0x5400 [kasan_test] [ 94.061726] ? kasan_addr_to_slab+0x9/0x90 [ 94.061730] ? kasan_atomics_helper+0x4f42/0x5400 [kasan_test] [ 94.061738] kasan_report+0xda/0x110 [ 94.061741] ? kasan_atomics_helper+0x4f42/0x5400 [kasan_test] [ 94.061750] kasan_atomics_helper+0x4f42/0x5400 [kasan_test] [ 94.061759] ? kasan_unpoison+0x23/0x50 [ 94.061763] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 94.061771] ? __kmalloc_cache_noprof+0x158/0x430 [ 94.061777] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 94.061787] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 94.061796] ? __pfx_read_tsc+0x10/0x10 [ 94.061799] ? ktime_get_ts64+0x7f/0x220 [ 94.061803] kunit_try_run_case+0x175/0x440 [ 94.061807] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.061810] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 94.061815] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.061817] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 94.061821] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.061825] kthread+0x3b4/0x780 [ 94.061829] ? __pfx_kthread+0x10/0x10 [ 94.061832] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 94.061836] ? __pfx_kthread+0x10/0x10 [ 94.061839] ? __pfx_kthread+0x10/0x10 [ 94.061843] ret_from_fork+0x22c/0x300 [ 94.061846] ? __pfx_kthread+0x10/0x10 [ 94.061850] ret_from_fork_asm+0x1a/0x30 [ 94.061855] [ 94.062120] lkp: kernel tainted state: 262176 [ 94.062176] Allocated by task 3705: [ 94.062178] kasan_save_stack+0x1c/0x40 [ 94.062369] kasan_save_track+0x10/0x30 [ 94.066075] __kasan_kmalloc+0xa6/0xb0 [ 94.066162] kasan_atomics+0x91/0x2d0 [kasan_test] [ 94.066271] kunit_try_run_case+0x175/0x440 [ 94.066365] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.066507] kthread+0x3b4/0x780 [ 94.066586] ret_from_fork+0x22c/0x300 [ 94.066677] ret_from_fork_asm+0x1a/0x30 [ 94.066816] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 94.067045] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 94.067330] The buggy address belongs to the physical page: [ 94.067463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 94.067619] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 94.067754] page_type: f5(slab) [ 94.067831] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 94.067979] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.068128] page dumped because: kasan: bad access detected [ 94.068289] Memory state around the buggy address: [ 94.068389] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.068558] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.068696] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 94.068833] ^ [ 94.068934] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.069075] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.069212] ================================================================== [ 94.070343] ================================================================== [ 94.070515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f60/0x5400 [kasan_test] [ 94.070680] Write of size 8 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 94.070875] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 94.070882] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 94.070884] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 94.070886] Call Trace: [ 94.070888] [ 94.070889] dump_stack_lvl+0x4f/0x70 [ 94.070895] print_address_description.constprop.0+0x2c/0x3b0 [ 94.070900] ? kasan_atomics_helper+0x1f60/0x5400 [kasan_test] [ 94.070908] print_report+0xb9/0x280 [ 94.070912] ? kasan_atomics_helper+0x1f60/0x5400 [kasan_test] [ 94.070920] ? kasan_addr_to_slab+0x9/0x90 [ 94.070923] ? kasan_atomics_helper+0x1f60/0x5400 [kasan_test] [ 94.070931] kasan_report+0xda/0x110 [ 94.070934] ? kasan_atomics_helper+0x1f60/0x5400 [kasan_test] [ 94.070943] kasan_check_range+0xfc/0x1b0 [ 94.070948] kasan_atomics_helper+0x1f60/0x5400 [kasan_test] [ 94.070956] ? kasan_unpoison+0x23/0x50 [ 94.070960] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 94.070968] ? __kmalloc_cache_noprof+0x158/0x430 [ 94.070973] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 94.070982] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 94.070991] ? __pfx_read_tsc+0x10/0x10 [ 94.070994] ? ktime_get_ts64+0x7f/0x220 [ 94.070998] kunit_try_run_case+0x175/0x440 [ 94.071002] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.071005] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 94.071010] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.071012] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 94.071016] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.071020] kthread+0x3b4/0x780 [ 94.071023] ? __pfx_kthread+0x10/0x10 [ 94.071026] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 94.071030] ? __pfx_kthread+0x10/0x10 [ 94.071033] ? __pfx_kthread+0x10/0x10 [ 94.071037] ret_from_fork+0x22c/0x300 [ 94.071040] ? __pfx_kthread+0x10/0x10 [ 94.071044] ret_from_fork_asm+0x1a/0x30 [ 94.071048] [ 94.074869] Allocated by task 3705: [ 94.074950] kasan_save_stack+0x1c/0x40 [ 94.075040] kasan_save_track+0x10/0x30 [ 94.075128] __kasan_kmalloc+0xa6/0xb0 [ 94.075214] kasan_atomics+0x91/0x2d0 [kasan_test] [ 94.075322] kunit_try_run_case+0x175/0x440 [ 94.075426] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.075549] kthread+0x3b4/0x780 [ 94.075628] ret_from_fork+0x22c/0x300 [ 94.075714] ret_from_fork_asm+0x1a/0x30 [ 94.075853] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 94.076080] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 94.076370] The buggy address belongs to the physical page: [ 94.076504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 94.076656] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 94.076791] page_type: f5(slab) [ 94.076868] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 94.077020] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.077165] page dumped because: kasan: bad access detected [ 94.077328] Memory state around the buggy address: [ 94.077440] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.077589] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.077727] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 94.077865] ^ [ 94.077965] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.078103] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.078240] ================================================================== [ 94.078406] ================================================================== [ 94.078581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f69/0x5400 [kasan_test] [ 94.078782] Read of size 8 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 94.079019] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 94.079031] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 94.079034] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 94.079037] Call Trace: [ 94.079040] [ 94.079043] dump_stack_lvl+0x4f/0x70 [ 94.079050] print_address_description.constprop.0+0x2c/0x3b0 [ 94.079058] ? kasan_atomics_helper+0x4f69/0x5400 [kasan_test] [ 94.079078] print_report+0xb9/0x280 [ 94.079085] ? kasan_atomics_helper+0x4f69/0x5400 [kasan_test] [ 94.079104] ? kasan_addr_to_slab+0x9/0x90 [ 94.079110] ? kasan_atomics_helper+0x4f69/0x5400 [kasan_test] [ 94.079129] kasan_report+0xda/0x110 [ 94.079135] ? kasan_atomics_helper+0x4f69/0x5400 [kasan_test] [ 94.079156] kasan_atomics_helper+0x4f69/0x5400 [kasan_test] [ 94.079175] ? kasan_unpoison+0x23/0x50 [ 94.079181] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 94.079200] ? __kmalloc_cache_noprof+0x158/0x430 [ 94.079209] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 94.079230] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 94.079249] ? __pfx_read_tsc+0x10/0x10 [ 94.079255] ? ktime_get_ts64+0x7f/0x220 [ 94.079263] kunit_try_run_case+0x175/0x440 [ 94.079268] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.079275] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 94.079284] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.079289] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 94.079296] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.079304] kthread+0x3b4/0x780 [ 94.079310] ? __pfx_kthread+0x10/0x10 [ 94.079316] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 94.079323] ? __pfx_kthread+0x10/0x10 [ 94.079329] ? __pfx_kthread+0x10/0x10 [ 94.079335] ret_from_fork+0x22c/0x300 [ 94.079341] ? __pfx_kthread+0x10/0x10 [ 94.079348] ret_from_fork_asm+0x1a/0x30 [ 94.079357] [ 94.083142] Allocated by task 3705: [ 94.083224] kasan_save_stack+0x1c/0x40 [ 94.083313] kasan_save_track+0x10/0x30 [ 94.083409] __kasan_kmalloc+0xa6/0xb0 [ 94.083506] kasan_atomics+0x91/0x2d0 [kasan_test] [ 94.083615] kunit_try_run_case+0x175/0x440 [ 94.083708] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.083819] kthread+0x3b4/0x780 [ 94.083897] ret_from_fork+0x22c/0x300 [ 94.083983] ret_from_fork_asm+0x1a/0x30 [ 94.084122] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 94.084351] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 94.084668] The buggy address belongs to the physical page: [ 94.084780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 94.084932] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 94.085067] page_type: f5(slab) [ 94.085144] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 94.085291] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.085451] page dumped because: kasan: bad access detected [ 94.085626] Memory state around the buggy address: [ 94.085726] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.085864] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.086003] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 94.086141] ^ [ 94.086241] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.086379] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.086537] ================================================================== [ 94.088304] ================================================================== [ 94.088466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2021/0x5400 [kasan_test] [ 94.088644] Write of size 8 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 94.088839] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 94.088845] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 94.088847] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 94.088849] Call Trace: [ 94.088851] [ 94.088852] dump_stack_lvl+0x4f/0x70 [ 94.088857] print_address_description.constprop.0+0x2c/0x3b0 [ 94.088862] ? kasan_atomics_helper+0x2021/0x5400 [kasan_test] [ 94.088870] print_report+0xb9/0x280 [ 94.088874] ? kasan_atomics_helper+0x2021/0x5400 [kasan_test] [ 94.088882] ? kasan_addr_to_slab+0x9/0x90 [ 94.088885] ? kasan_atomics_helper+0x2021/0x5400 [kasan_test] [ 94.088893] kasan_report+0xda/0x110 [ 94.088897] ? kasan_atomics_helper+0x2021/0x5400 [kasan_test] [ 94.088905] kasan_check_range+0xfc/0x1b0 [ 94.088910] kasan_atomics_helper+0x2021/0x5400 [kasan_test] [ 94.088918] ? kasan_unpoison+0x23/0x50 [ 94.088921] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 94.088930] ? __kmalloc_cache_noprof+0x158/0x430 [ 94.088935] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 94.088944] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 94.088953] ? __pfx_read_tsc+0x10/0x10 [ 94.088956] ? ktime_get_ts64+0x7f/0x220 [ 94.088960] kunit_try_run_case+0x175/0x440 [ 94.088964] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.088967] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 94.088971] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.088974] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 94.088978] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.088982] kthread+0x3b4/0x780 [ 94.088985] ? __pfx_kthread+0x10/0x10 [ 94.088988] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 94.088992] ? __pfx_kthread+0x10/0x10 [ 94.088995] ? __pfx_kthread+0x10/0x10 [ 94.088999] ret_from_fork+0x22c/0x300 [ 94.089002] ? __pfx_kthread+0x10/0x10 [ 94.089006] ret_from_fork_asm+0x1a/0x30 [ 94.089010] [ 94.092829] Allocated by task 3705: [ 94.092910] kasan_save_stack+0x1c/0x40 [ 94.092998] kasan_save_track+0x10/0x30 [ 94.093085] __kasan_kmalloc+0xa6/0xb0 [ 94.093172] kasan_atomics+0x91/0x2d0 [kasan_test] [ 94.093281] kunit_try_run_case+0x175/0x440 [ 94.093375] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.093507] kthread+0x3b4/0x780 [ 94.093586] ret_from_fork+0x22c/0x300 [ 94.093672] ret_from_fork_asm+0x1a/0x30 [ 94.093812] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 94.094039] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 94.094326] The buggy address belongs to the physical page: [ 94.094450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 94.094626] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 94.094760] page_type: f5(slab) [ 94.094839] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 94.094987] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.095133] page dumped because: kasan: bad access detected [ 94.095296] Memory state around the buggy address: [ 94.095408] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.095572] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.095710] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 94.095847] ^ [ 94.095947] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.096086] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.096223] ================================================================== [ 94.097935] ================================================================== [ 94.098097] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f83/0x5400 [kasan_test] [ 94.098276] Read of size 8 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 94.098489] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 94.098496] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 94.098498] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 94.098500] Call Trace: [ 94.098502] [ 94.098504] dump_stack_lvl+0x4f/0x70 [ 94.098508] print_address_description.constprop.0+0x2c/0x3b0 [ 94.098513] ? kasan_atomics_helper+0x4f83/0x5400 [kasan_test] [ 94.098522] print_report+0xb9/0x280 [ 94.098526] ? kasan_atomics_helper+0x4f83/0x5400 [kasan_test] [ 94.098534] ? kasan_addr_to_slab+0x9/0x90 [ 94.098537] ? kasan_atomics_helper+0x4f83/0x5400 [kasan_test] [ 94.098546] kasan_report+0xda/0x110 [ 94.098549] ? kasan_atomics_helper+0x4f83/0x5400 [kasan_test] [ 94.098558] kasan_atomics_helper+0x4f83/0x5400 [kasan_test] [ 94.098566] ? kasan_unpoison+0x23/0x50 [ 94.098570] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 94.098579] ? __kmalloc_cache_noprof+0x158/0x430 [ 94.098584] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 94.098594] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 94.098603] ? __pfx_read_tsc+0x10/0x10 [ 94.098606] ? ktime_get_ts64+0x7f/0x220 [ 94.098610] kunit_try_run_case+0x175/0x440 [ 94.098614] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.098617] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 94.098621] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.098624] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 94.098628] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.098632] kthread+0x3b4/0x780 [ 94.098635] ? __pfx_kthread+0x10/0x10 [ 94.098639] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 94.098642] ? __pfx_kthread+0x10/0x10 [ 94.098646] ? __pfx_kthread+0x10/0x10 [ 94.098649] ret_from_fork+0x22c/0x300 [ 94.098653] ? __pfx_kthread+0x10/0x10 [ 94.098656] ret_from_fork_asm+0x1a/0x30 [ 94.098661] [ 94.102378] Allocated by task 3705: [ 94.102481] kasan_save_stack+0x1c/0x40 [ 94.102578] kasan_save_track+0x10/0x30 [ 94.102665] __kasan_kmalloc+0xa6/0xb0 [ 94.102753] kasan_atomics+0x91/0x2d0 [kasan_test] [ 94.102861] kunit_try_run_case+0x175/0x440 [ 94.102953] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.103067] kthread+0x3b4/0x780 [ 94.103146] ret_from_fork+0x22c/0x300 [ 94.103232] ret_from_fork_asm+0x1a/0x30 [ 94.103372] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 94.103620] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 94.103905] The buggy address belongs to the physical page: [ 94.104017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 94.104168] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 94.104303] page_type: f5(slab) [ 94.104383] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 94.104561] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.104707] page dumped because: kasan: bad access detected [ 94.104868] Memory state around the buggy address: [ 94.104969] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.105107] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.105244] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 94.105386] ^ [ 94.105517] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.105654] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.105791] ================================================================== [ 94.107331] ================================================================== [ 94.107494] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20e2/0x5400 [kasan_test] [ 94.107670] Write of size 8 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 94.107865] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 94.107872] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 94.107873] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 94.107876] Call Trace: [ 94.107877] [ 94.107879] dump_stack_lvl+0x4f/0x70 [ 94.107883] print_address_description.constprop.0+0x2c/0x3b0 [ 94.107888] ? kasan_atomics_helper+0x20e2/0x5400 [kasan_test] [ 94.107896] print_report+0xb9/0x280 [ 94.107900] ? kasan_atomics_helper+0x20e2/0x5400 [kasan_test] [ 94.107908] ? kasan_addr_to_slab+0x9/0x90 [ 94.107911] ? kasan_atomics_helper+0x20e2/0x5400 [kasan_test] [ 94.107919] kasan_report+0xda/0x110 [ 94.107923] ? kasan_atomics_helper+0x20e2/0x5400 [kasan_test] [ 94.107932] kasan_check_range+0xfc/0x1b0 [ 94.107936] kasan_atomics_helper+0x20e2/0x5400 [kasan_test] [ 94.107944] ? kasan_unpoison+0x23/0x50 [ 94.107948] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 94.107956] ? __kmalloc_cache_noprof+0x158/0x430 [ 94.107961] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 94.107971] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 94.107980] ? __pfx_read_tsc+0x10/0x10 [ 94.107983] ? ktime_get_ts64+0x7f/0x220 [ 94.107987] kunit_try_run_case+0x175/0x440 [ 94.107990] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.107993] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 94.107997] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.108000] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 94.108004] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.108007] kthread+0x3b4/0x780 [ 94.108011] ? __pfx_kthread+0x10/0x10 [ 94.108014] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 94.108018] ? __pfx_kthread+0x10/0x10 [ 94.108021] ? __pfx_kthread+0x10/0x10 [ 94.108025] ret_from_fork+0x22c/0x300 [ 94.108028] ? __pfx_kthread+0x10/0x10 [ 94.108032] ret_from_fork_asm+0x1a/0x30 [ 94.108036] [ 94.111890] Allocated by task 3705: [ 94.111971] kasan_save_stack+0x1c/0x40 [ 94.112060] kasan_save_track+0x10/0x30 [ 94.112147] __kasan_kmalloc+0xa6/0xb0 [ 94.112233] kasan_atomics+0x91/0x2d0 [kasan_test] [ 94.112341] kunit_try_run_case+0x175/0x440 [ 94.112445] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.112575] kthread+0x3b4/0x780 [ 94.112653] ret_from_fork+0x22c/0x300 [ 94.112742] ret_from_fork_asm+0x1a/0x30 [ 94.112881] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 94.113108] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 94.113402] The buggy address belongs to the physical page: [ 94.113535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 94.113687] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 94.113822] page_type: f5(slab) [ 94.113900] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 94.114047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.114193] page dumped because: kasan: bad access detected [ 94.114355] Memory state around the buggy address: [ 94.114485] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.114625] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.114763] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 94.114900] ^ [ 94.115001] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.115138] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.115275] ================================================================== [ 94.115441] ================================================================== [ 94.115614] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f76/0x5400 [kasan_test] [ 94.115815] Read of size 8 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 94.116054] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 94.116065] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 94.116068] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 94.116071] Call Trace: [ 94.116074] [ 94.116077] dump_stack_lvl+0x4f/0x70 [ 94.116084] print_address_description.constprop.0+0x2c/0x3b0 [ 94.116092] ? kasan_atomics_helper+0x4f76/0x5400 [kasan_test] [ 94.116111] print_report+0xb9/0x280 [ 94.116118] ? kasan_atomics_helper+0x4f76/0x5400 [kasan_test] [ 94.116136] ? kasan_addr_to_slab+0x9/0x90 [ 94.116143] ? kasan_atomics_helper+0x4f76/0x5400 [kasan_test] [ 94.116161] kasan_report+0xda/0x110 [ 94.116168] ? kasan_atomics_helper+0x4f76/0x5400 [kasan_test] [ 94.116189] kasan_atomics_helper+0x4f76/0x5400 [kasan_test] [ 94.116208] ? kasan_unpoison+0x23/0x50 [ 94.116215] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 94.116234] ? __kmalloc_cache_noprof+0x158/0x430 [ 94.116243] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 94.116263] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 94.116283] ? __pfx_read_tsc+0x10/0x10 [ 94.116289] ? ktime_get_ts64+0x7f/0x220 [ 94.116296] kunit_try_run_case+0x175/0x440 [ 94.116303] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.116309] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 94.116317] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.116323] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 94.116329] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.116336] kthread+0x3b4/0x780 [ 94.116343] ? __pfx_kthread+0x10/0x10 [ 94.116348] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 94.116355] ? __pfx_kthread+0x10/0x10 [ 94.116362] ? __pfx_kthread+0x10/0x10 [ 94.116368] ret_from_fork+0x22c/0x300 [ 94.116375] ? __pfx_kthread+0x10/0x10 [ 94.116381] ret_from_fork_asm+0x1a/0x30 [ 94.116390] [ 94.120166] Allocated by task 3705: [ 94.120247] kasan_save_stack+0x1c/0x40 [ 94.120337] kasan_save_track+0x10/0x30 [ 94.120437] __kasan_kmalloc+0xa6/0xb0 [ 94.120544] kasan_atomics+0x91/0x2d0 [kasan_test] [ 94.120652] kunit_try_run_case+0x175/0x440 [ 94.120745] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.120856] kthread+0x3b4/0x780 [ 94.120934] ret_from_fork+0x22c/0x300 [ 94.121020] ret_from_fork_asm+0x1a/0x30 [ 94.121159] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 94.121386] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 94.121691] The buggy address belongs to the physical page: [ 94.121805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 94.121957] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 94.122095] page_type: f5(slab) [ 94.122172] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 94.122319] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.122497] page dumped because: kasan: bad access detected [ 94.122668] Memory state around the buggy address: [ 94.122769] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.122907] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.123045] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 94.123182] ^ [ 94.123284] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.123441] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.123597] ================================================================== [ 94.125392] ================================================================== [ 94.125554] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x21a3/0x5400 [kasan_test] [ 94.125720] Write of size 8 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 94.125919] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 94.125925] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 94.125927] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 94.125929] Call Trace: [ 94.125931] [ 94.125933] dump_stack_lvl+0x4f/0x70 [ 94.125937] print_address_description.constprop.0+0x2c/0x3b0 [ 94.125942] ? kasan_atomics_helper+0x21a3/0x5400 [kasan_test] [ 94.125951] print_report+0xb9/0x280 [ 94.125954] ? kasan_atomics_helper+0x21a3/0x5400 [kasan_test] [ 94.125963] ? kasan_addr_to_slab+0x9/0x90 [ 94.125966] ? kasan_atomics_helper+0x21a3/0x5400 [kasan_test] [ 94.125974] kasan_report+0xda/0x110 [ 94.125978] ? kasan_atomics_helper+0x21a3/0x5400 [kasan_test] [ 94.125987] kasan_check_range+0xfc/0x1b0 [ 94.125991] kasan_atomics_helper+0x21a3/0x5400 [kasan_test] [ 94.125999] ? kasan_unpoison+0x23/0x50 [ 94.126003] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 94.126012] ? __kmalloc_cache_noprof+0x158/0x430 [ 94.126017] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 94.126026] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 94.126036] ? __pfx_read_tsc+0x10/0x10 [ 94.126039] ? ktime_get_ts64+0x7f/0x220 [ 94.126043] kunit_try_run_case+0x175/0x440 [ 94.126046] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.126049] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 94.126054] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.126056] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 94.126060] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.126064] kthread+0x3b4/0x780 [ 94.126068] ? __pfx_kthread+0x10/0x10 [ 94.126071] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 94.126075] ? __pfx_kthread+0x10/0x10 [ 94.126078] ? __pfx_kthread+0x10/0x10 [ 94.126082] ret_from_fork+0x22c/0x300 [ 94.126085] ? __pfx_kthread+0x10/0x10 [ 94.126089] ret_from_fork_asm+0x1a/0x30 [ 94.126094] [ 94.129925] Allocated by task 3705: [ 94.130008] kasan_save_stack+0x1c/0x40 [ 94.130096] kasan_save_track+0x10/0x30 [ 94.130183] __kasan_kmalloc+0xa6/0xb0 [ 94.130271] kasan_atomics+0x91/0x2d0 [kasan_test] [ 94.130379] kunit_try_run_case+0x175/0x440 [ 94.130500] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.130614] kthread+0x3b4/0x780 [ 94.130693] ret_from_fork+0x22c/0x300 [ 94.130779] ret_from_fork_asm+0x1a/0x30 [ 94.130919] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 94.131145] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 94.131451] The buggy address belongs to the physical page: [ 94.131585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 94.131737] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 94.131872] page_type: f5(slab) [ 94.131952] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 94.132099] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.132247] page dumped because: kasan: bad access detected [ 94.132420] Memory state around the buggy address: [ 94.132551] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.132689] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.132827] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 94.132964] ^ [ 94.133066] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.133204] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.133343] ================================================================== [ 94.134886] ================================================================== [ 94.135042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50e2/0x5400 [kasan_test] [ 94.135208] Read of size 8 at addr ffff888415c59430 by task kunit_try_catch/3705 [ 94.135402] CPU: 6 UID: 0 PID: 3705 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 94.135409] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 94.135411] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 94.135413] Call Trace: [ 94.135415] [ 94.135417] dump_stack_lvl+0x4f/0x70 [ 94.135421] print_address_description.constprop.0+0x2c/0x3b0 [ 94.135426] ? kasan_atomics_helper+0x50e2/0x5400 [kasan_test] [ 94.135444] print_report+0xb9/0x280 [ 94.135448] ? kasan_atomics_helper+0x50e2/0x5400 [kasan_test] [ 94.135456] ? kasan_addr_to_slab+0x9/0x90 [ 94.135460] ? kasan_atomics_helper+0x50e2/0x5400 [kasan_test] [ 94.135468] kasan_report+0xda/0x110 [ 94.135472] ? kasan_atomics_helper+0x50e2/0x5400 [kasan_test] [ 94.135490] kasan_atomics_helper+0x50e2/0x5400 [kasan_test] [ 94.135499] ? kasan_unpoison+0x23/0x50 [ 94.135502] ? __pfx_kasan_atomics_helper+0x10/0x10 [kasan_test] [ 94.135511] ? __kmalloc_cache_noprof+0x158/0x430 [ 94.135516] kasan_atomics+0x1c2/0x2d0 [kasan_test] [ 94.135526] ? __pfx_kasan_atomics+0x10/0x10 [kasan_test] [ 94.135535] ? __pfx_read_tsc+0x10/0x10 [ 94.135538] ? ktime_get_ts64+0x7f/0x220 [ 94.135542] kunit_try_run_case+0x175/0x440 [ 94.135545] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.135548] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 94.135553] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.135556] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 94.135559] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.135563] kthread+0x3b4/0x780 [ 94.135567] ? __pfx_kthread+0x10/0x10 [ 94.135570] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 94.135574] ? __pfx_kthread+0x10/0x10 [ 94.135577] ? __pfx_kthread+0x10/0x10 [ 94.135581] ret_from_fork+0x22c/0x300 [ 94.135585] ? __pfx_kthread+0x10/0x10 [ 94.135588] ret_from_fork_asm+0x1a/0x30 [ 94.135593] [ 94.139300] Allocated by task 3705: [ 94.139382] kasan_save_stack+0x1c/0x40 [ 94.139491] kasan_save_track+0x10/0x30 [ 94.139580] __kasan_kmalloc+0xa6/0xb0 [ 94.139666] kasan_atomics+0x91/0x2d0 [kasan_test] [ 94.139783] kunit_try_run_case+0x175/0x440 [ 94.139876] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.139989] kthread+0x3b4/0x780 [ 94.140068] ret_from_fork+0x22c/0x300 [ 94.140154] ret_from_fork_asm+0x1a/0x30 [ 94.140294] The buggy address belongs to the object at ffff888415c59400 which belongs to the cache kmalloc-64 of size 64 [ 94.140560] The buggy address is located 0 bytes to the right of allocated 48-byte region [ffff888415c59400, ffff888415c59430) [ 94.140844] The buggy address belongs to the physical page: [ 94.140957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x415c59 [ 94.141109] ksm flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 94.141243] page_type: f5(slab) [ 94.141320] raw: 0017ffffc0000000 ffff8881000428c0 ffffea0010457c40 dead000000000003 [ 94.141506] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.141655] page dumped because: kasan: bad access detected [ 94.141817] Memory state around the buggy address: [ 94.141918] ffff888415c59300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.142057] ffff888415c59380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.142198] >ffff888415c59400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 94.142350] ^ [ 94.142471] ffff888415c59480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.142609] ffff888415c59500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 94.142746] ================================================================== [ 94.144546] # kasan_atomics.speed: slow [ 94.144573] ok 65 kasan_atomics [ 94.145074] ok 66 vmalloc_helpers_tags # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 94.145350] ================================================================== [ 94.145668] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x635/0x6e0 [kasan_test] [ 94.145825] Read of size 1 at addr ffffc900001017f3 by task kunit_try_catch/3716 [ 94.146020] CPU: 6 UID: 0 PID: 3716 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 94.146027] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 94.146029] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 94.146031] Call Trace: [ 94.146032] [ 94.146034] dump_stack_lvl+0x4f/0x70 [ 94.146039] print_address_description.constprop.0+0x2c/0x3b0 [ 94.146044] ? vmalloc_oob+0x635/0x6e0 [kasan_test] [ 94.146054] print_report+0xb9/0x280 [ 94.146058] ? vmalloc_oob+0x635/0x6e0 [kasan_test] [ 94.146067] ? kasan_addr_to_slab+0x9/0x90 [ 94.146070] ? vmalloc_oob+0x635/0x6e0 [kasan_test] [ 94.146079] kasan_report+0xda/0x110 [ 94.146083] ? vmalloc_oob+0x635/0x6e0 [kasan_test] [ 94.146092] vmalloc_oob+0x635/0x6e0 [kasan_test] [ 94.146102] ? __pfx_vmalloc_oob+0x10/0x10 [kasan_test] [ 94.146111] ? __schedule+0x763/0x1490 [ 94.146115] ? __pfx_read_tsc+0x10/0x10 [ 94.146118] ? ktime_get_ts64+0x7f/0x220 [ 94.146122] kunit_try_run_case+0x175/0x440 [ 94.146125] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.146129] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 94.146133] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.146136] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 94.146140] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.146144] kthread+0x3b4/0x780 [ 94.146147] ? __pfx_kthread+0x10/0x10 [ 94.146151] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 94.146154] ? __pfx_kthread+0x10/0x10 [ 94.146158] ? __pfx_kthread+0x10/0x10 [ 94.146161] ret_from_fork+0x22c/0x300 [ 94.146165] ? __pfx_kthread+0x10/0x10 [ 94.146168] ret_from_fork_asm+0x1a/0x30 [ 94.146173] [ 94.149493] The buggy address belongs to the virtual mapping at [ffffc90000101000, ffffc90000103000) created by: vmalloc_oob+0x7a/0x6e0 [kasan_test] [ 94.149866] The buggy address belongs to the physical page: [ 94.149978] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x7f pfn:0x111092 [ 94.150131] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 94.150261] raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 94.150417] raw: 000000000000007f 0000000000000000 00000001ffffffff 0000000000000000 [ 94.150576] page dumped because: kasan: bad access detected [ 94.150737] Memory state around the buggy address: [ 94.150837] ffffc90000101680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 94.150981] ffffc90000101700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 94.151118] >ffffc90000101780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 94.151255] ^ [ 94.151387] ffffc90000101800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 94.151547] ffffc90000101880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 94.151687] ================================================================== [ 94.151854] ================================================================== [ 94.151998] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x61e/0x6e0 [kasan_test] [ 94.152157] Read of size 1 at addr ffffc900001017f8 by task kunit_try_catch/3716 [ 94.152354] CPU: 6 UID: 0 PID: 3716 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 94.152361] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 94.152362] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 94.152365] Call Trace: [ 94.152366] [ 94.152368] dump_stack_lvl+0x4f/0x70 [ 94.152373] print_address_description.constprop.0+0x2c/0x3b0 [ 94.152377] ? vmalloc_oob+0x61e/0x6e0 [kasan_test] [ 94.152386] print_report+0xb9/0x280 [ 94.152390] ? vmalloc_oob+0x61e/0x6e0 [kasan_test] [ 94.152399] ? kasan_addr_to_slab+0x9/0x90 [ 94.152403] ? vmalloc_oob+0x61e/0x6e0 [kasan_test] [ 94.152412] kasan_report+0xda/0x110 [ 94.152416] ? vmalloc_oob+0x61e/0x6e0 [kasan_test] [ 94.152432] vmalloc_oob+0x61e/0x6e0 [kasan_test] [ 94.152443] ? __pfx_vmalloc_oob+0x10/0x10 [kasan_test] [ 94.152452] ? __schedule+0x763/0x1490 [ 94.152464] ? __pfx_read_tsc+0x10/0x10 [ 94.152467] ? ktime_get_ts64+0x7f/0x220 [ 94.152471] kunit_try_run_case+0x175/0x440 [ 94.152475] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.152478] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 94.152482] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.152485] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 94.152489] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.152492] kthread+0x3b4/0x780 [ 94.152496] ? __pfx_kthread+0x10/0x10 [ 94.152500] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 94.152503] ? __pfx_kthread+0x10/0x10 [ 94.152507] ? __pfx_kthread+0x10/0x10 [ 94.152511] ret_from_fork+0x22c/0x300 [ 94.152514] ? __pfx_kthread+0x10/0x10 [ 94.152518] ret_from_fork_asm+0x1a/0x30 [ 94.152522] [ 94.155833] The buggy address belongs to the virtual mapping at [ffffc90000101000, ffffc90000103000) created by: vmalloc_oob+0x7a/0x6e0 [kasan_test] [ 94.156189] The buggy address belongs to the physical page: [ 94.156300] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x7f pfn:0x111092 [ 94.156473] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 94.156609] raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 94.156760] raw: 000000000000007f 0000000000000000 00000001ffffffff 0000000000000000 [ 94.156915] page dumped because: kasan: bad access detected [ 94.157086] Memory state around the buggy address: [ 94.157186] ffffc90000101680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 94.157323] ffffc90000101700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 94.157474] >ffffc90000101780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 94.157624] ^ [ 94.157760] ffffc90000101800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 94.157897] ffffc90000101880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 94.158036] ================================================================== [ 94.159536] ok 67 vmalloc_oob [ 94.159876] ok 68 vmap_tags # SKIP Test requires CONFIG_KASAN_SW_TAGS=y [ 94.160264] ok 69 vm_map_ram_tags # SKIP Test requires CONFIG_KASAN_SW_TAGS=y [ 94.160693] ok 70 match_all_not_assigned # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 94.161057] ok 71 match_all_ptr_tag # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 94.161374] ok 72 match_all_mem_tag # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 94.161664] ================================================================== [ 94.161949] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x221/0x250 [ 94.162095] Read of size 8 at addr ffff88810c139978 by task kunit_try_catch/3728 [ 94.162292] CPU: 0 UID: 0 PID: 3728 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 94.162299] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 94.162301] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 94.162304] Call Trace: [ 94.162306] [ 94.162307] dump_stack_lvl+0x4f/0x70 [ 94.162313] print_address_description.constprop.0+0x2c/0x3b0 [ 94.162319] ? copy_to_kernel_nofault+0x221/0x250 [ 94.162322] print_report+0xb9/0x280 [ 94.162326] ? copy_to_kernel_nofault+0x221/0x250 [ 94.162328] ? kasan_addr_to_slab+0x9/0x90 [ 94.162332] ? copy_to_kernel_nofault+0x221/0x250 [ 94.162334] kasan_report+0xda/0x110 [ 94.162338] ? copy_to_kernel_nofault+0x221/0x250 [ 94.162342] copy_to_kernel_nofault+0x221/0x250 [ 94.162345] copy_to_kernel_nofault_oob+0x15a/0x4a0 [kasan_test] [ 94.162356] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [kasan_test] [ 94.162365] ? __update_idle_core+0x51/0x350 [ 94.162370] ? pick_next_task_fair+0x51/0xba0 [ 94.162375] ? __pfx_read_tsc+0x10/0x10 [ 94.162379] ? ktime_get_ts64+0x7f/0x220 [ 94.162383] kunit_try_run_case+0x175/0x440 [ 94.162387] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.162391] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 94.162396] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.162398] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 94.162403] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.162406] kthread+0x3b4/0x780 [ 94.162411] ? __pfx_kthread+0x10/0x10 [ 94.162414] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 94.162418] ? __pfx_kthread+0x10/0x10 [ 94.162424] ? __pfx_kthread+0x10/0x10 [ 94.162431] ret_from_fork+0x22c/0x300 [ 94.162438] ? __pfx_kthread+0x10/0x10 [ 94.162444] ret_from_fork_asm+0x1a/0x30 [ 94.162454] [ 94.166011] Allocated by task 3728: [ 94.166092] kasan_save_stack+0x1c/0x40 [ 94.166184] kasan_save_track+0x10/0x30 [ 94.166271] __kasan_kmalloc+0xa6/0xb0 [ 94.166357] copy_to_kernel_nofault_oob+0xa7/0x4a0 [kasan_test] [ 94.166504] kunit_try_run_case+0x175/0x440 [ 94.166597] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.166708] kthread+0x3b4/0x780 [ 94.166791] ret_from_fork+0x22c/0x300 [ 94.166878] ret_from_fork_asm+0x1a/0x30 [ 94.167018] The buggy address belongs to the object at ffff88810c139900 which belongs to the cache kmalloc-128 of size 128 [ 94.167248] The buggy address is located 0 bytes to the right of allocated 120-byte region [ffff88810c139900, ffff88810c139978) [ 94.167537] The buggy address belongs to the physical page: [ 94.167650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10c138 [ 94.167802] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 94.167949] anon flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 94.168093] page_type: f5(slab) [ 94.168175] raw: 0017ffffc0000040 ffff888100042a00 0000000000000000 0000000000000001 [ 94.168323] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.168472] head: 0017ffffc0000040 ffff888100042a00 0000000000000000 0000000000000001 [ 94.168621] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.168769] head: 0017ffffc0000001 ffffea0004304e01 00000000ffffffff 00000000ffffffff [ 94.168917] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 94.169064] page dumped because: kasan: bad access detected [ 94.169226] Memory state around the buggy address: [ 94.169327] ffff88810c139800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 94.169477] ffff88810c139880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 94.169625] >ffff88810c139900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 94.169763] ^ [ 94.169899] ffff88810c139980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 94.170040] ffff88810c139a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 94.170177] ================================================================== [ 94.170370] ================================================================== [ 94.170516] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8e/0x250 [ 94.170660] Write of size 8 at addr ffff88810c139978 by task kunit_try_catch/3728 [ 94.170858] CPU: 0 UID: 0 PID: 3728 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 94.170865] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 94.170867] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 94.170869] Call Trace: [ 94.170871] [ 94.170872] dump_stack_lvl+0x4f/0x70 [ 94.170878] print_address_description.constprop.0+0x2c/0x3b0 [ 94.170882] ? copy_to_kernel_nofault+0x8e/0x250 [ 94.170886] print_report+0xb9/0x280 [ 94.170889] ? copy_to_kernel_nofault+0x8e/0x250 [ 94.170892] ? kasan_addr_to_slab+0x9/0x90 [ 94.170895] ? copy_to_kernel_nofault+0x8e/0x250 [ 94.170898] kasan_report+0xda/0x110 [ 94.170902] ? copy_to_kernel_nofault+0x8e/0x250 [ 94.170905] kasan_check_range+0xfc/0x1b0 [ 94.170909] copy_to_kernel_nofault+0x8e/0x250 [ 94.170912] copy_to_kernel_nofault_oob+0x1f0/0x4a0 [kasan_test] [ 94.170923] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [kasan_test] [ 94.170932] ? __update_idle_core+0x51/0x350 [ 94.170936] ? pick_next_task_fair+0x51/0xba0 [ 94.170941] ? __pfx_read_tsc+0x10/0x10 [ 94.170944] ? ktime_get_ts64+0x7f/0x220 [ 94.170948] kunit_try_run_case+0x175/0x440 [ 94.170952] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.170955] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 94.170960] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.170962] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 94.170966] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.170970] kthread+0x3b4/0x780 [ 94.170974] ? __pfx_kthread+0x10/0x10 [ 94.170978] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 94.170981] ? __pfx_kthread+0x10/0x10 [ 94.170985] ? __pfx_kthread+0x10/0x10 [ 94.170989] ret_from_fork+0x22c/0x300 [ 94.170992] ? __pfx_kthread+0x10/0x10 [ 94.170996] ret_from_fork_asm+0x1a/0x30 [ 94.171001] [ 94.174623] Allocated by task 3728: [ 94.174705] kasan_save_stack+0x1c/0x40 [ 94.174794] kasan_save_track+0x10/0x30 [ 94.174882] __kasan_kmalloc+0xa6/0xb0 [ 94.174968] copy_to_kernel_nofault_oob+0xa7/0x4a0 [kasan_test] [ 94.175096] kunit_try_run_case+0x175/0x440 [ 94.175189] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.175301] kthread+0x3b4/0x780 [ 94.175380] ret_from_fork+0x22c/0x300 [ 94.175488] ret_from_fork_asm+0x1a/0x30 [ 94.175627] The buggy address belongs to the object at ffff88810c139900 which belongs to the cache kmalloc-128 of size 128 [ 94.175858] The buggy address is located 0 bytes to the right of allocated 120-byte region [ffff88810c139900, ffff88810c139978) [ 94.176149] The buggy address belongs to the physical page: [ 94.176262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10c138 [ 94.176429] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 94.176585] anon flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 94.176729] page_type: f5(slab) [ 94.176808] raw: 0017ffffc0000040 ffff888100042a00 0000000000000000 0000000000000001 [ 94.176956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.177103] head: 0017ffffc0000040 ffff888100042a00 0000000000000000 0000000000000001 [ 94.177252] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.177409] head: 0017ffffc0000001 ffffea0004304e01 00000000ffffffff 00000000ffffffff [ 94.177571] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 94.177718] page dumped because: kasan: bad access detected [ 94.177883] Memory state around the buggy address: [ 94.177983] ffff88810c139800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 94.178122] ffff88810c139880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 94.178260] >ffff88810c139900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 94.178406] ^ [ 94.178558] ffff88810c139980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 94.178696] ffff88810c139a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 94.178837] ================================================================== [ 94.179184] ok 73 copy_to_kernel_nofault_oob [ 94.179397] ok 74 rust_uaf # SKIP Test requires CONFIG_RUST=y [ 94.179711] ================================================================== [ 94.179977] BUG: KASAN: slab-out-of-bounds in _inline_copy_from_user+0x3e/0xa0 [ 94.180132] Write of size 121 at addr ffff88810c139500 by task kunit_try_catch/3732 [ 94.180335] CPU: 0 UID: 0 PID: 3732 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 94.180342] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 94.180343] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 94.180346] Call Trace: [ 94.180347] [ 94.180349] dump_stack_lvl+0x4f/0x70 [ 94.180354] print_address_description.constprop.0+0x2c/0x3b0 [ 94.180360] ? _inline_copy_from_user+0x3e/0xa0 [ 94.180363] print_report+0xb9/0x280 [ 94.180367] ? _inline_copy_from_user+0x3e/0xa0 [ 94.180370] ? kasan_addr_to_slab+0x9/0x90 [ 94.180373] ? _inline_copy_from_user+0x3e/0xa0 [ 94.180376] kasan_report+0xda/0x110 [ 94.180380] ? _inline_copy_from_user+0x3e/0xa0 [ 94.180384] kasan_check_range+0xfc/0x1b0 [ 94.180388] _inline_copy_from_user+0x3e/0xa0 [ 94.180391] copy_user_test_oob+0x2a3/0x1110 [kasan_test] [ 94.180412] ? __pfx_copy_user_test_oob+0x10/0x10 [kasan_test] [ 94.180425] ? finish_task_switch.isra.0+0x155/0x750 [ 94.180433] ? __switch_to+0x526/0x1000 [ 94.180440] ? __schedule+0x763/0x1490 [ 94.180447] ? __pfx_read_tsc+0x10/0x10 [ 94.180453] ? ktime_get_ts64+0x7f/0x220 [ 94.180460] kunit_try_run_case+0x175/0x440 [ 94.180467] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.180473] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 94.180481] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.180487] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 94.180493] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.180500] kthread+0x3b4/0x780 [ 94.180506] ? __pfx_kthread+0x10/0x10 [ 94.180512] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 94.180519] ? __pfx_kthread+0x10/0x10 [ 94.180525] ? __pfx_kthread+0x10/0x10 [ 94.180531] ret_from_fork+0x22c/0x300 [ 94.180538] ? __pfx_kthread+0x10/0x10 [ 94.180544] ret_from_fork_asm+0x1a/0x30 [ 94.180553] [ 94.184295] Allocated by task 3732: [ 94.184377] kasan_save_stack+0x1c/0x40 [ 94.184479] kasan_save_track+0x10/0x30 [ 94.184568] __kasan_kmalloc+0xa6/0xb0 [ 94.184657] __kmalloc_noprof+0x1e3/0x510 [ 94.184748] kunit_kmalloc_array+0x1c/0x50 [ 94.184842] copy_user_test_oob+0x9e/0x1110 [kasan_test] [ 94.184960] kunit_try_run_case+0x175/0x440 [ 94.185058] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.185172] kthread+0x3b4/0x780 [ 94.185251] ret_from_fork+0x22c/0x300 [ 94.185338] ret_from_fork_asm+0x1a/0x30 [ 94.185500] The buggy address belongs to the object at ffff88810c139500 which belongs to the cache kmalloc-128 of size 128 [ 94.185731] The buggy address is located 0 bytes inside of allocated 120-byte region [ffff88810c139500, ffff88810c139578) [ 94.186011] The buggy address belongs to the physical page: [ 94.186123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10c138 [ 94.186279] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 94.186450] anon flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 94.186604] page_type: f5(slab) [ 94.186692] raw: 0017ffffc0000040 ffff888100042a00 0000000000000000 0000000000000001 [ 94.186848] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.187000] head: 0017ffffc0000040 ffff888100042a00 0000000000000000 0000000000000001 [ 94.187149] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.187298] head: 0017ffffc0000001 ffffea0004304e01 00000000ffffffff 00000000ffffffff [ 94.187470] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 94.187618] page dumped because: kasan: bad access detected [ 94.187781] Memory state around the buggy address: [ 94.187882] ffff88810c139400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 94.188020] ffff88810c139480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 94.188158] >ffff88810c139500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 94.188298] ^ [ 94.188447] ffff88810c139580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 94.188594] ffff88810c139600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 94.188732] ================================================================== [ 94.188914] ================================================================== [ 94.189081] BUG: KASAN: slab-out-of-bounds in _copy_to_user+0x47/0x70 [ 94.189235] Read of size 121 at addr ffff88810c139500 by task kunit_try_catch/3732 [ 94.189459] CPU: 0 UID: 0 PID: 3732 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 94.189475] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 94.189477] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 94.189479] Call Trace: [ 94.189481] [ 94.189483] dump_stack_lvl+0x4f/0x70 [ 94.189488] print_address_description.constprop.0+0x2c/0x3b0 [ 94.189493] ? _copy_to_user+0x47/0x70 [ 94.189496] print_report+0xb9/0x280 [ 94.189509] ? _copy_to_user+0x47/0x70 [ 94.189512] ? kasan_addr_to_slab+0x9/0x90 [ 94.189515] ? _copy_to_user+0x47/0x70 [ 94.189518] kasan_report+0xda/0x110 [ 94.189521] ? _copy_to_user+0x47/0x70 [ 94.189525] kasan_check_range+0xfc/0x1b0 [ 94.189529] _copy_to_user+0x47/0x70 [ 94.189532] copy_user_test_oob+0x356/0x1110 [kasan_test] [ 94.189543] ? __pfx_copy_user_test_oob+0x10/0x10 [kasan_test] [ 94.189553] ? finish_task_switch.isra.0+0x155/0x750 [ 94.189557] ? __switch_to+0x526/0x1000 [ 94.189561] ? __schedule+0x763/0x1490 [ 94.189564] ? __pfx_read_tsc+0x10/0x10 [ 94.189567] ? ktime_get_ts64+0x7f/0x220 [ 94.189571] kunit_try_run_case+0x175/0x440 [ 94.189574] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.189578] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 94.189582] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.189585] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 94.189589] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.189592] kthread+0x3b4/0x780 [ 94.189596] ? __pfx_kthread+0x10/0x10 [ 94.189599] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 94.189603] ? __pfx_kthread+0x10/0x10 [ 94.189606] ? __pfx_kthread+0x10/0x10 [ 94.189610] ret_from_fork+0x22c/0x300 [ 94.189614] ? __pfx_kthread+0x10/0x10 [ 94.189617] ret_from_fork_asm+0x1a/0x30 [ 94.189622] [ 94.193288] Allocated by task 3732: [ 94.193370] kasan_save_stack+0x1c/0x40 [ 94.193481] kasan_save_track+0x10/0x30 [ 94.193571] __kasan_kmalloc+0xa6/0xb0 [ 94.193659] __kmalloc_noprof+0x1e3/0x510 [ 94.193749] kunit_kmalloc_array+0x1c/0x50 [ 94.193841] copy_user_test_oob+0x9e/0x1110 [kasan_test] [ 94.193957] kunit_try_run_case+0x175/0x440 [ 94.194050] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.194161] kthread+0x3b4/0x780 [ 94.194241] ret_from_fork+0x22c/0x300 [ 94.194329] ret_from_fork_asm+0x1a/0x30 [ 94.194501] The buggy address belongs to the object at ffff88810c139500 which belongs to the cache kmalloc-128 of size 128 [ 94.194732] The buggy address is located 0 bytes inside of allocated 120-byte region [ffff88810c139500, ffff88810c139578) [ 94.195012] The buggy address belongs to the physical page: [ 94.195126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10c138 [ 94.195278] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 94.195438] anon flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 94.195591] page_type: f5(slab) [ 94.195671] raw: 0017ffffc0000040 ffff888100042a00 0000000000000000 0000000000000001 [ 94.195818] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.195965] head: 0017ffffc0000040 ffff888100042a00 0000000000000000 0000000000000001 [ 94.196114] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.196263] head: 0017ffffc0000001 ffffea0004304e01 00000000ffffffff 00000000ffffffff [ 94.196429] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 94.196588] page dumped because: kasan: bad access detected [ 94.196752] Memory state around the buggy address: [ 94.196852] ffff88810c139400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 94.196991] ffff88810c139480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 94.197130] >ffff88810c139500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 94.197267] ^ [ 94.197413] ffff88810c139580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 94.197564] ffff88810c139600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 94.197702] ================================================================== [ 94.197895] ================================================================== [ 94.198063] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x1110 [kasan_test] [ 94.198264] Write of size 121 at addr ffff88810c139500 by task kunit_try_catch/3732 [ 94.198525] CPU: 0 UID: 0 PID: 3732 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 94.198537] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 94.198540] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 94.198544] Call Trace: [ 94.198547] [ 94.198558] dump_stack_lvl+0x4f/0x70 [ 94.198566] print_address_description.constprop.0+0x2c/0x3b0 [ 94.198575] ? copy_user_test_oob+0x3fd/0x1110 [kasan_test] [ 94.198594] print_report+0xb9/0x280 [ 94.198601] ? copy_user_test_oob+0x3fd/0x1110 [kasan_test] [ 94.198619] ? kasan_addr_to_slab+0x9/0x90 [ 94.198626] ? copy_user_test_oob+0x3fd/0x1110 [kasan_test] [ 94.198645] kasan_report+0xda/0x110 [ 94.198652] ? copy_user_test_oob+0x3fd/0x1110 [kasan_test] [ 94.198672] kasan_check_range+0xfc/0x1b0 [ 94.198679] copy_user_test_oob+0x3fd/0x1110 [kasan_test] [ 94.198699] ? __pfx_copy_user_test_oob+0x10/0x10 [kasan_test] [ 94.198718] ? finish_task_switch.isra.0+0x155/0x750 [ 94.198725] ? __switch_to+0x526/0x1000 [ 94.198731] ? __schedule+0x763/0x1490 [ 94.198738] ? __pfx_read_tsc+0x10/0x10 [ 94.198743] ? ktime_get_ts64+0x7f/0x220 [ 94.198750] kunit_try_run_case+0x175/0x440 [ 94.198757] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.198763] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 94.198771] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.198777] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 94.198783] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.198791] kthread+0x3b4/0x780 [ 94.198797] ? __pfx_kthread+0x10/0x10 [ 94.198803] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 94.198810] ? __pfx_kthread+0x10/0x10 [ 94.198816] ? __pfx_kthread+0x10/0x10 [ 94.198823] ret_from_fork+0x22c/0x300 [ 94.198829] ? __pfx_kthread+0x10/0x10 [ 94.198835] ret_from_fork_asm+0x1a/0x30 [ 94.198844] [ 94.202568] Allocated by task 3732: [ 94.202649] kasan_save_stack+0x1c/0x40 [ 94.202738] kasan_save_track+0x10/0x30 [ 94.202825] __kasan_kmalloc+0xa6/0xb0 [ 94.202913] __kmalloc_noprof+0x1e3/0x510 [ 94.203003] kunit_kmalloc_array+0x1c/0x50 [ 94.203094] copy_user_test_oob+0x9e/0x1110 [kasan_test] [ 94.203213] kunit_try_run_case+0x175/0x440 [ 94.203308] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.203434] kthread+0x3b4/0x780 [ 94.203523] ret_from_fork+0x22c/0x300 [ 94.203610] ret_from_fork_asm+0x1a/0x30 [ 94.203749] The buggy address belongs to the object at ffff88810c139500 which belongs to the cache kmalloc-128 of size 128 [ 94.203978] The buggy address is located 0 bytes inside of allocated 120-byte region [ffff88810c139500, ffff88810c139578) [ 94.204257] The buggy address belongs to the physical page: [ 94.204370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10c138 [ 94.204544] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 94.204691] anon flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 94.204834] page_type: f5(slab) [ 94.204911] raw: 0017ffffc0000040 ffff888100042a00 0000000000000000 0000000000000001 [ 94.205059] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.205206] head: 0017ffffc0000040 ffff888100042a00 0000000000000000 0000000000000001 [ 94.205355] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.205525] head: 0017ffffc0000001 ffffea0004304e01 00000000ffffffff 00000000ffffffff [ 94.205673] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 94.205820] page dumped because: kasan: bad access detected [ 94.205982] Memory state around the buggy address: [ 94.206082] ffff88810c139400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 94.206221] ffff88810c139480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 94.206358] >ffff88810c139500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 94.206518] ^ [ 94.206655] ffff88810c139580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 94.206794] ffff88810c139600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 94.206930] ================================================================== [ 94.207258] ================================================================== [ 94.207422] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4c3/0x1110 [kasan_test] [ 94.207608] Read of size 121 at addr ffff88810c139500 by task kunit_try_catch/3732 [ 94.207826] CPU: 0 UID: 0 PID: 3732 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 94.207833] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 94.207834] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 94.207837] Call Trace: [ 94.207838] [ 94.207840] dump_stack_lvl+0x4f/0x70 [ 94.207845] print_address_description.constprop.0+0x2c/0x3b0 [ 94.207850] ? copy_user_test_oob+0x4c3/0x1110 [kasan_test] [ 94.207860] print_report+0xb9/0x280 [ 94.207864] ? copy_user_test_oob+0x4c3/0x1110 [kasan_test] [ 94.207873] ? kasan_addr_to_slab+0x9/0x90 [ 94.207876] ? copy_user_test_oob+0x4c3/0x1110 [kasan_test] [ 94.207886] kasan_report+0xda/0x110 [ 94.207890] ? copy_user_test_oob+0x4c3/0x1110 [kasan_test] [ 94.207900] kasan_check_range+0xfc/0x1b0 [ 94.207904] copy_user_test_oob+0x4c3/0x1110 [kasan_test] [ 94.207915] ? __pfx_copy_user_test_oob+0x10/0x10 [kasan_test] [ 94.207924] ? finish_task_switch.isra.0+0x155/0x750 [ 94.207928] ? __switch_to+0x526/0x1000 [ 94.207931] ? __schedule+0x763/0x1490 [ 94.207935] ? __pfx_read_tsc+0x10/0x10 [ 94.207938] ? ktime_get_ts64+0x7f/0x220 [ 94.207942] kunit_try_run_case+0x175/0x440 [ 94.207946] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.207949] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 94.207953] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.207956] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 94.207960] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.207964] kthread+0x3b4/0x780 [ 94.207968] ? __pfx_kthread+0x10/0x10 [ 94.207971] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 94.207975] ? __pfx_kthread+0x10/0x10 [ 94.207979] ? __pfx_kthread+0x10/0x10 [ 94.207982] ret_from_fork+0x22c/0x300 [ 94.207986] ? __pfx_kthread+0x10/0x10 [ 94.207989] ret_from_fork_asm+0x1a/0x30 [ 94.207994] [ 94.211699] Allocated by task 3732: [ 94.211783] kasan_save_stack+0x1c/0x40 [ 94.211871] kasan_save_track+0x10/0x30 [ 94.211959] __kasan_kmalloc+0xa6/0xb0 [ 94.212045] __kmalloc_noprof+0x1e3/0x510 [ 94.212135] kunit_kmalloc_array+0x1c/0x50 [ 94.212228] copy_user_test_oob+0x9e/0x1110 [kasan_test] [ 94.212345] kunit_try_run_case+0x175/0x440 [ 94.212458] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.212572] kthread+0x3b4/0x780 [ 94.212651] ret_from_fork+0x22c/0x300 [ 94.212737] ret_from_fork_asm+0x1a/0x30 [ 94.212875] The buggy address belongs to the object at ffff88810c139500 which belongs to the cache kmalloc-128 of size 128 [ 94.213105] The buggy address is located 0 bytes inside of allocated 120-byte region [ffff88810c139500, ffff88810c139578) [ 94.213383] The buggy address belongs to the physical page: [ 94.213520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10c138 [ 94.213672] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 94.213819] anon flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 94.213961] page_type: f5(slab) [ 94.214039] raw: 0017ffffc0000040 ffff888100042a00 0000000000000000 0000000000000001 [ 94.214189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.214335] head: 0017ffffc0000040 ffff888100042a00 0000000000000000 0000000000000001 [ 94.214505] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.214654] head: 0017ffffc0000001 ffffea0004304e01 00000000ffffffff 00000000ffffffff [ 94.214802] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 94.214952] page dumped because: kasan: bad access detected [ 94.215114] Memory state around the buggy address: [ 94.215214] ffff88810c139400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 94.215353] ffff88810c139480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 94.215512] >ffff88810c139500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 94.215650] ^ [ 94.215786] ffff88810c139580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 94.215924] ffff88810c139600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 94.216061] ================================================================== [ 94.216220] ================================================================== [ 94.216385] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x57b/0x1110 [kasan_test] [ 94.216585] Write of size 121 at addr ffff88810c139500 by task kunit_try_catch/3732 [ 94.216829] CPU: 0 UID: 0 PID: 3732 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 94.216840] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 94.216843] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 94.216847] Call Trace: [ 94.216850] [ 94.216862] dump_stack_lvl+0x4f/0x70 [ 94.216869] print_address_description.constprop.0+0x2c/0x3b0 [ 94.216877] ? copy_user_test_oob+0x57b/0x1110 [kasan_test] [ 94.216897] print_report+0xb9/0x280 [ 94.216904] ? copy_user_test_oob+0x57b/0x1110 [kasan_test] [ 94.216922] ? kasan_addr_to_slab+0x9/0x90 [ 94.216929] ? copy_user_test_oob+0x57b/0x1110 [kasan_test] [ 94.216947] kasan_report+0xda/0x110 [ 94.216955] ? copy_user_test_oob+0x57b/0x1110 [kasan_test] [ 94.216975] kasan_check_range+0xfc/0x1b0 [ 94.216982] copy_user_test_oob+0x57b/0x1110 [kasan_test] [ 94.217003] ? __pfx_copy_user_test_oob+0x10/0x10 [kasan_test] [ 94.217021] ? finish_task_switch.isra.0+0x155/0x750 [ 94.217028] ? __switch_to+0x526/0x1000 [ 94.217034] ? __schedule+0x763/0x1490 [ 94.217041] ? __pfx_read_tsc+0x10/0x10 [ 94.217046] ? ktime_get_ts64+0x7f/0x220 [ 94.217053] kunit_try_run_case+0x175/0x440 [ 94.217060] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.217066] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 94.217074] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.217079] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 94.217086] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.217093] kthread+0x3b4/0x780 [ 94.217099] ? __pfx_kthread+0x10/0x10 [ 94.217105] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 94.217111] ? __pfx_kthread+0x10/0x10 [ 94.217118] ? __pfx_kthread+0x10/0x10 [ 94.217124] ret_from_fork+0x22c/0x300 [ 94.217131] ? __pfx_kthread+0x10/0x10 [ 94.217137] ret_from_fork_asm+0x1a/0x30 [ 94.217145] [ 94.220917] Allocated by task 3732: [ 94.220999] kasan_save_stack+0x1c/0x40 [ 94.221090] kasan_save_track+0x10/0x30 [ 94.221178] __kasan_kmalloc+0xa6/0xb0 [ 94.221266] __kmalloc_noprof+0x1e3/0x510 [ 94.221359] kunit_kmalloc_array+0x1c/0x50 [ 94.221455] copy_user_test_oob+0x9e/0x1110 [kasan_test] [ 94.221575] kunit_try_run_case+0x175/0x440 [ 94.221667] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.221781] kthread+0x3b4/0x780 [ 94.221860] ret_from_fork+0x22c/0x300 [ 94.221958] ret_from_fork_asm+0x1a/0x30 [ 94.222098] The buggy address belongs to the object at ffff88810c139500 which belongs to the cache kmalloc-128 of size 128 [ 94.222331] The buggy address is located 0 bytes inside of allocated 120-byte region [ffff88810c139500, ffff88810c139578) [ 94.222635] The buggy address belongs to the physical page: [ 94.222751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10c138 [ 94.222905] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 94.223052] anon flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 94.223199] page_type: f5(slab) [ 94.223277] raw: 0017ffffc0000040 ffff888100042a00 0000000000000000 0000000000000001 [ 94.223439] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.223599] head: 0017ffffc0000040 ffff888100042a00 0000000000000000 0000000000000001 [ 94.223747] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.223895] head: 0017ffffc0000001 ffffea0004304e01 00000000ffffffff 00000000ffffffff [ 94.224043] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 94.224190] page dumped because: kasan: bad access detected [ 94.224355] Memory state around the buggy address: [ 94.224478] ffff88810c139400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 94.224617] ffff88810c139480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 94.224755] >ffff88810c139500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 94.224892] ^ [ 94.225029] ffff88810c139580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 94.225167] ffff88810c139600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 94.225304] ================================================================== [ 94.225472] ================================================================== [ 94.225636] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x630/0x1110 [kasan_test] [ 94.225851] Read of size 121 at addr ffff88810c139500 by task kunit_try_catch/3732 [ 94.226087] CPU: 0 UID: 0 PID: 3732 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 94.226103] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 94.226105] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 94.226107] Call Trace: [ 94.226109] [ 94.226111] dump_stack_lvl+0x4f/0x70 [ 94.226116] print_address_description.constprop.0+0x2c/0x3b0 [ 94.226120] ? copy_user_test_oob+0x630/0x1110 [kasan_test] [ 94.226139] print_report+0xb9/0x280 [ 94.226143] ? copy_user_test_oob+0x630/0x1110 [kasan_test] [ 94.226152] ? kasan_addr_to_slab+0x9/0x90 [ 94.226155] ? copy_user_test_oob+0x630/0x1110 [kasan_test] [ 94.226164] kasan_report+0xda/0x110 [ 94.226168] ? copy_user_test_oob+0x630/0x1110 [kasan_test] [ 94.226178] kasan_check_range+0xfc/0x1b0 [ 94.226182] copy_user_test_oob+0x630/0x1110 [kasan_test] [ 94.226192] ? __pfx_copy_user_test_oob+0x10/0x10 [kasan_test] [ 94.226201] ? finish_task_switch.isra.0+0x155/0x750 [ 94.226205] ? __switch_to+0x526/0x1000 [ 94.226209] ? __schedule+0x763/0x1490 [ 94.226212] ? __pfx_read_tsc+0x10/0x10 [ 94.226215] ? ktime_get_ts64+0x7f/0x220 [ 94.226219] kunit_try_run_case+0x175/0x440 [ 94.226222] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.226225] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 94.226229] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.226232] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 94.226236] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.226240] kthread+0x3b4/0x780 [ 94.226244] ? __pfx_kthread+0x10/0x10 [ 94.226247] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 94.226251] ? __pfx_kthread+0x10/0x10 [ 94.226254] ? __pfx_kthread+0x10/0x10 [ 94.226258] ret_from_fork+0x22c/0x300 [ 94.226261] ? __pfx_kthread+0x10/0x10 [ 94.226265] ret_from_fork_asm+0x1a/0x30 [ 94.226269] [ 94.229926] Allocated by task 3732: [ 94.230018] kasan_save_stack+0x1c/0x40 [ 94.230108] kasan_save_track+0x10/0x30 [ 94.230196] __kasan_kmalloc+0xa6/0xb0 [ 94.230285] __kmalloc_noprof+0x1e3/0x510 [ 94.230376] kunit_kmalloc_array+0x1c/0x50 [ 94.230489] copy_user_test_oob+0x9e/0x1110 [kasan_test] [ 94.230606] kunit_try_run_case+0x175/0x440 [ 94.230698] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.230810] kthread+0x3b4/0x780 [ 94.230889] ret_from_fork+0x22c/0x300 [ 94.230976] ret_from_fork_asm+0x1a/0x30 [ 94.231116] The buggy address belongs to the object at ffff88810c139500 which belongs to the cache kmalloc-128 of size 128 [ 94.231352] The buggy address is located 0 bytes inside of allocated 120-byte region [ffff88810c139500, ffff88810c139578) [ 94.231654] The buggy address belongs to the physical page: [ 94.231766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10c138 [ 94.231921] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 94.232067] anon flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 94.232210] page_type: f5(slab) [ 94.232288] raw: 0017ffffc0000040 ffff888100042a00 0000000000000000 0000000000000001 [ 94.232467] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.232614] head: 0017ffffc0000040 ffff888100042a00 0000000000000000 0000000000000001 [ 94.232763] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.232911] head: 0017ffffc0000001 ffffea0004304e01 00000000ffffffff 00000000ffffffff [ 94.233060] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 94.233207] page dumped because: kasan: bad access detected [ 94.233368] Memory state around the buggy address: [ 94.233491] ffff88810c139400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 94.233630] ffff88810c139480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 94.233771] >ffff88810c139500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 94.233913] ^ [ 94.234049] ffff88810c139580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 94.234190] ffff88810c139600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 94.234327] ================================================================== [ 94.234512] ================================================================== [ 94.234677] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x210 [ 94.234841] Write of size 121 at addr ffff88810c139500 by task kunit_try_catch/3732 [ 94.235109] CPU: 0 UID: 0 PID: 3732 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 94.235121] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 94.235124] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 94.235128] Call Trace: [ 94.235131] [ 94.235142] dump_stack_lvl+0x4f/0x70 [ 94.235151] print_address_description.constprop.0+0x2c/0x3b0 [ 94.235159] ? strncpy_from_user+0x3c/0x210 [ 94.235166] print_report+0xb9/0x280 [ 94.235172] ? strncpy_from_user+0x3c/0x210 [ 94.235178] ? kasan_addr_to_slab+0x9/0x90 [ 94.235184] ? strncpy_from_user+0x3c/0x210 [ 94.235190] kasan_report+0xda/0x110 [ 94.235197] ? strncpy_from_user+0x3c/0x210 [ 94.235204] kasan_check_range+0xfc/0x1b0 [ 94.235212] strncpy_from_user+0x3c/0x210 [ 94.235219] copy_user_test_oob+0x796/0x1110 [kasan_test] [ 94.235241] ? __pfx_copy_user_test_oob+0x10/0x10 [kasan_test] [ 94.235260] ? finish_task_switch.isra.0+0x155/0x750 [ 94.235267] ? __switch_to+0x526/0x1000 [ 94.235273] ? __schedule+0x763/0x1490 [ 94.235281] ? __pfx_read_tsc+0x10/0x10 [ 94.235287] ? ktime_get_ts64+0x7f/0x220 [ 94.235294] kunit_try_run_case+0x175/0x440 [ 94.235301] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.235307] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 94.235315] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.235320] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 94.235328] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.235335] kthread+0x3b4/0x780 [ 94.235341] ? __pfx_kthread+0x10/0x10 [ 94.235347] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 94.235354] ? __pfx_kthread+0x10/0x10 [ 94.235360] ? __pfx_kthread+0x10/0x10 [ 94.235367] ret_from_fork+0x22c/0x300 [ 94.235373] ? __pfx_kthread+0x10/0x10 [ 94.235379] ret_from_fork_asm+0x1a/0x30 [ 94.235388] [ 94.239207] Allocated by task 3732: [ 94.239289] kasan_save_stack+0x1c/0x40 [ 94.239383] kasan_save_track+0x10/0x30 [ 94.239475] __kasan_kmalloc+0xa6/0xb0 [ 94.239562] __kmalloc_noprof+0x1e3/0x510 [ 94.239654] kunit_kmalloc_array+0x1c/0x50 [ 94.239746] copy_user_test_oob+0x9e/0x1110 [kasan_test] [ 94.239866] kunit_try_run_case+0x175/0x440 [ 94.239968] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.240080] kthread+0x3b4/0x780 [ 94.240161] ret_from_fork+0x22c/0x300 [ 94.240247] ret_from_fork_asm+0x1a/0x30 [ 94.240387] The buggy address belongs to the object at ffff88810c139500 which belongs to the cache kmalloc-128 of size 128 [ 94.240639] The buggy address is located 0 bytes inside of allocated 120-byte region [ffff88810c139500, ffff88810c139578) [ 94.240931] The buggy address belongs to the physical page: [ 94.241061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10c138 [ 94.241233] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 94.241417] anon flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 94.241581] page_type: f5(slab) [ 94.241678] raw: 0017ffffc0000040 ffff888100042a00 0000000000000000 0000000000000001 [ 94.241843] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.241999] head: 0017ffffc0000040 ffff888100042a00 0000000000000000 0000000000000001 [ 94.242148] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.242297] head: 0017ffffc0000001 ffffea0004304e01 00000000ffffffff 00000000ffffffff [ 94.242459] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 94.242616] page dumped because: kasan: bad access detected [ 94.242779] Memory state around the buggy address: [ 94.242880] ffff88810c139400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 94.243019] ffff88810c139480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 94.243157] >ffff88810c139500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 94.243294] ^ [ 94.243441] ffff88810c139580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 94.243591] ffff88810c139600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 94.243728] ================================================================== [ 94.243910] ================================================================== [ 94.244076] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1e2/0x210 [ 94.244257] Write of size 1 at addr ffff88810c139578 by task kunit_try_catch/3732 [ 94.244471] CPU: 0 UID: 0 PID: 3732 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 94.244479] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 94.244481] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 94.244483] Call Trace: [ 94.244485] [ 94.244487] dump_stack_lvl+0x4f/0x70 [ 94.244492] print_address_description.constprop.0+0x2c/0x3b0 [ 94.244497] ? strncpy_from_user+0x1e2/0x210 [ 94.244501] print_report+0xb9/0x280 [ 94.244504] ? strncpy_from_user+0x1e2/0x210 [ 94.244508] ? kasan_addr_to_slab+0x9/0x90 [ 94.244511] ? strncpy_from_user+0x1e2/0x210 [ 94.244515] kasan_report+0xda/0x110 [ 94.244518] ? strncpy_from_user+0x1e2/0x210 [ 94.244523] strncpy_from_user+0x1e2/0x210 [ 94.244527] copy_user_test_oob+0x796/0x1110 [kasan_test] [ 94.244538] ? __pfx_copy_user_test_oob+0x10/0x10 [kasan_test] [ 94.244548] ? finish_task_switch.isra.0+0x155/0x750 [ 94.244552] ? __switch_to+0x526/0x1000 [ 94.244555] ? __schedule+0x763/0x1490 [ 94.244559] ? __pfx_read_tsc+0x10/0x10 [ 94.244562] ? ktime_get_ts64+0x7f/0x220 [ 94.244566] kunit_try_run_case+0x175/0x440 [ 94.244570] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.244573] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 94.244578] ? __pfx_kunit_try_run_case+0x10/0x10 [ 94.244580] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 94.244584] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.244588] kthread+0x3b4/0x780 [ 94.244592] ? __pfx_kthread+0x10/0x10 [ 94.244596] ? __pfx__raw_spin_lock_irq+0x10/0x10 [ 94.244599] ? __pfx_kthread+0x10/0x10 [ 94.244603] ? __pfx_kthread+0x10/0x10 [ 94.244607] ret_from_fork+0x22c/0x300 [ 94.244610] ? __pfx_kthread+0x10/0x10 [ 94.244614] ret_from_fork_asm+0x1a/0x30 [ 94.244619] [ 94.248246] Allocated by task 3732: [ 94.248328] kasan_save_stack+0x1c/0x40 [ 94.248426] kasan_save_track+0x10/0x30 [ 94.248524] __kasan_kmalloc+0xa6/0xb0 [ 94.248610] __kmalloc_noprof+0x1e3/0x510 [ 94.248702] kunit_kmalloc_array+0x1c/0x50 [ 94.248793] copy_user_test_oob+0x9e/0x1110 [kasan_test] [ 94.248909] kunit_try_run_case+0x175/0x440 [ 94.249001] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.249112] kthread+0x3b4/0x780 [ 94.249191] ret_from_fork+0x22c/0x300 [ 94.249278] ret_from_fork_asm+0x1a/0x30 [ 94.249428] The buggy address belongs to the object at ffff88810c139500 which belongs to the cache kmalloc-128 of size 128 [ 94.249674] The buggy address is located 0 bytes to the right of allocated 120-byte region [ffff88810c139500, ffff88810c139578) [ 94.249971] The buggy address belongs to the physical page: [ 94.250101] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10c138 [ 94.250272] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 94.250438] anon flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) [ 94.250591] page_type: f5(slab) [ 94.250668] raw: 0017ffffc0000040 ffff888100042a00 0000000000000000 0000000000000001 [ 94.250816] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.250963] head: 0017ffffc0000040 ffff888100042a00 0000000000000000 0000000000000001 [ 94.251111] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 94.251259] head: 0017ffffc0000001 ffffea0004304e01 00000000ffffffff 00000000ffffffff [ 94.251418] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 94.251575] page dumped because: kasan: bad access detected [ 94.251738] Memory state around the buggy address: [ 94.251838] ffff88810c139400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 94.251976] ffff88810c139480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 94.252114] >ffff88810c139500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 94.252256] ^ [ 94.252401] ffff88810c139580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 94.252549] ffff88810c139600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 94.252686] ================================================================== [ 94.253105] ok 75 copy_user_test_oob [ 94.283434] # kasan: pass:51 fail:0 skip:24 total:75 [ 94.283593] # Totals: pass:51 fail:0 skip:24 total:75 [ 94.283732] ok 1 kasan [ 94.354897] KTAP version 1 [ 94.355022] 1..1 [ 94.355286] KTAP version 1 [ 94.355379] # Subtest: kfence [ 94.356483] 1..27 [ 94.357183] # test_out_of_bounds_read: test_alloc: size=32, gfp=cc0, policy=left, cache=0 [ 94.407488] ================================================================== [ 94.407681] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x122/0x4e0 [kfence_test] [ 94.407904] Out-of-bounds read at 0x00000000f0df628a (1B left of kfence-#197): [ 94.408057] test_out_of_bounds_read+0x122/0x4e0 [kfence_test] [ 94.408197] kunit_try_run_case+0x175/0x440 [ 94.408301] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.408425] kthread+0x3b4/0x780 [ 94.408529] ret_from_fork+0x22c/0x300 [ 94.408637] ret_from_fork_asm+0x1a/0x30 [ 94.408814] kfence-#197: 0x000000000ae2a19a-0x0000000074b94350, size=32, cache=kmalloc-32 [ 94.409015] allocated by task 3740 on cpu 4 at 94.407479s (0.001536s ago): [ 94.409158] test_alloc+0x322/0x1110 [kfence_test] [ 94.409263] test_out_of_bounds_read+0xe9/0x4e0 [kfence_test] [ 94.409382] kunit_try_run_case+0x175/0x440 [ 94.409478] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.409593] kthread+0x3b4/0x780 [ 94.409672] ret_from_fork+0x22c/0x300 [ 94.409759] ret_from_fork_asm+0x1a/0x30 [ 94.409905] CPU: 4 UID: 0 PID: 3740 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 94.410130] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 94.410237] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 94.410390] ================================================================== [ 94.410560] # test_out_of_bounds_read: test_alloc: size=32, gfp=cc0, policy=right, cache=0 [ 94.511494] ================================================================== [ 94.511681] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x212/0x4e0 [kfence_test] [ 94.511903] Out-of-bounds read at 0x00000000ec145ae2 (32B right of kfence-#198): [ 94.512056] test_out_of_bounds_read+0x212/0x4e0 [kfence_test] [ 94.512195] kunit_try_run_case+0x175/0x440 [ 94.512308] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.512448] kthread+0x3b4/0x780 [ 94.512547] ret_from_fork+0x22c/0x300 [ 94.512654] ret_from_fork_asm+0x1a/0x30 [ 94.512831] kfence-#198: 0x0000000041407083-0x000000009e6c2e6b, size=32, cache=kmalloc-32 [ 94.513045] allocated by task 3740 on cpu 4 at 94.511486s (0.001559s ago): [ 94.513184] test_alloc+0x322/0x1110 [kfence_test] [ 94.513289] test_out_of_bounds_read+0x1de/0x4e0 [kfence_test] [ 94.513409] kunit_try_run_case+0x175/0x440 [ 94.513505] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.513618] kthread+0x3b4/0x780 [ 94.513696] ret_from_fork+0x22c/0x300 [ 94.513784] ret_from_fork_asm+0x1a/0x30 [ 94.513927] CPU: 4 UID: 0 PID: 3740 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 94.514153] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 94.514258] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 94.514411] ================================================================== [ 94.514792] ok 1 test_out_of_bounds_read [ 94.514938] # test_out_of_bounds_read-memcache: setup_test_cache: size=32, ctor=0x0 [ 94.515366] # test_out_of_bounds_read-memcache: test_alloc: size=32, gfp=cc0, policy=left, cache=1 [ 94.719475] ================================================================== [ 94.719666] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x122/0x4e0 [kfence_test] [ 94.719889] Out-of-bounds read at 0x0000000005c5e9d6 (1B left of kfence-#200): [ 94.720042] test_out_of_bounds_read+0x122/0x4e0 [kfence_test] [ 94.720181] kunit_try_run_case+0x175/0x440 [ 94.720295] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.720427] kthread+0x3b4/0x780 [ 94.720527] ret_from_fork+0x22c/0x300 [ 94.720633] ret_from_fork_asm+0x1a/0x30 [ 94.720810] kfence-#200: 0x000000004a80c7c9-0x000000000d20d839, size=32, cache=test [ 94.721008] allocated by task 3742 on cpu 0 at 94.719466s (0.001541s ago): [ 94.721173] test_alloc+0x283/0x1110 [kfence_test] [ 94.721287] test_out_of_bounds_read+0xe9/0x4e0 [kfence_test] [ 94.721425] kunit_try_run_case+0x175/0x440 [ 94.721547] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.721688] kthread+0x3b4/0x780 [ 94.721768] ret_from_fork+0x22c/0x300 [ 94.721855] ret_from_fork_asm+0x1a/0x30 [ 94.721998] CPU: 0 UID: 0 PID: 3742 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 94.722225] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 94.722330] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 94.722504] ================================================================== [ 94.722670] # test_out_of_bounds_read-memcache: test_alloc: size=32, gfp=cc0, policy=right, cache=1 [ 94.812549] LKP: stdout: 3214: Kernel tests: Boot OK! [ 94.823458] ================================================================== [ 94.823627] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x212/0x4e0 [kfence_test] [ 94.823849] Out-of-bounds read at 0x000000006429d05b (32B right of kfence-#201): [ 94.824003] test_out_of_bounds_read+0x212/0x4e0 [kfence_test] [ 94.824142] kunit_try_run_case+0x175/0x440 [ 94.824256] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.824388] kthread+0x3b4/0x780 [ 94.824496] ret_from_fork+0x22c/0x300 [ 94.824603] ret_from_fork_asm+0x1a/0x30 [ 94.824779] kfence-#201: 0x000000004c6358ad-0x00000000e75aed70, size=32, cache=test [ 94.824985] allocated by task 3742 on cpu 0 at 94.823452s (0.001532s ago): [ 94.825143] test_alloc+0x283/0x1110 [kfence_test] [ 94.825258] test_out_of_bounds_read+0x1de/0x4e0 [kfence_test] [ 94.825396] kunit_try_run_case+0x175/0x440 [ 94.825507] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 94.825637] kthread+0x3b4/0x780 [ 94.825735] ret_from_fork+0x22c/0x300 [ 94.825832] ret_from_fork_asm+0x1a/0x30 [ 94.825975] CPU: 0 UID: 0 PID: 3742 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 94.826201] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 94.826305] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 94.826468] ================================================================== [ 94.866072] ok 2 test_out_of_bounds_read-memcache [ 94.866366] # test_out_of_bounds_write: test_alloc: size=32, gfp=cc0, policy=left, cache=0 [ 95.135466] ================================================================== [ 95.135656] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x109/0x260 [kfence_test] [ 95.135882] Out-of-bounds write at 0x000000008e781867 (1B left of kfence-#204): [ 95.136037] test_out_of_bounds_write+0x109/0x260 [kfence_test] [ 95.136178] kunit_try_run_case+0x175/0x440 [ 95.136292] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 95.136424] kthread+0x3b4/0x780 [ 95.136541] ret_from_fork+0x22c/0x300 [ 95.136630] ret_from_fork_asm+0x1a/0x30 [ 95.136771] kfence-#204: 0x000000001c61a453-0x00000000d0beb886, size=32, cache=kmalloc-32 [ 95.136959] allocated by task 3744 on cpu 0 at 95.135456s (0.001502s ago): [ 95.137098] test_alloc+0x322/0x1110 [kfence_test] [ 95.137203] test_out_of_bounds_write+0xd0/0x260 [kfence_test] [ 95.137322] kunit_try_run_case+0x175/0x440 [ 95.137415] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 95.137527] kthread+0x3b4/0x780 [ 95.137607] ret_from_fork+0x22c/0x300 [ 95.137694] ret_from_fork_asm+0x1a/0x30 [ 95.137837] CPU: 0 UID: 0 PID: 3744 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 95.138062] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 95.138170] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 95.138324] ================================================================== [ 95.138699] ok 3 test_out_of_bounds_write [ 95.138871] # test_out_of_bounds_write-memcache: setup_test_cache: size=32, ctor=0x0 [ 95.139299] # test_out_of_bounds_write-memcache: test_alloc: size=32, gfp=cc0, policy=left, cache=1 [ 95.447475] ================================================================== [ 95.447660] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x109/0x260 [kfence_test] [ 95.447886] Out-of-bounds write at 0x000000005b58b519 (1B left of kfence-#207): [ 95.448037] test_out_of_bounds_write+0x109/0x260 [kfence_test] [ 95.448178] kunit_try_run_case+0x175/0x440 [ 95.448292] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 95.448413] kthread+0x3b4/0x780 [ 95.448512] ret_from_fork+0x22c/0x300 [ 95.448618] ret_from_fork_asm+0x1a/0x30 [ 95.448794] kfence-#207: 0x00000000e9fbb53a-0x00000000c0dc4916, size=32, cache=test [ 95.449001] allocated by task 3749 on cpu 0 at 95.447466s (0.001534s ago): [ 95.449158] test_alloc+0x283/0x1110 [kfence_test] [ 95.449283] test_out_of_bounds_write+0xd0/0x260 [kfence_test] [ 95.449403] kunit_try_run_case+0x175/0x440 [ 95.449498] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 95.449611] kthread+0x3b4/0x780 [ 95.449690] ret_from_fork+0x22c/0x300 [ 95.449777] ret_from_fork_asm+0x1a/0x30 [ 95.449919] CPU: 0 UID: 0 PID: 3749 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 95.450145] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 95.450249] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 95.450402] ================================================================== [ 95.481700] ok 4 test_out_of_bounds_write-memcache [ 95.482057] # test_use_after_free_read: test_alloc: size=32, gfp=cc0, policy=any, cache=0 [ 95.551473] ================================================================== [ 95.551659] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x125/0x270 [kfence_test] [ 95.551884] Use-after-free read at 0x000000002943ffdd (in kfence-#208): [ 95.552027] test_use_after_free_read+0x125/0x270 [kfence_test] [ 95.552167] kunit_try_run_case+0x175/0x440 [ 95.552281] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 95.552414] kthread+0x3b4/0x780 [ 95.552523] ret_from_fork+0x22c/0x300 [ 95.552611] ret_from_fork_asm+0x1a/0x30 [ 95.552780] kfence-#208: 0x000000002943ffdd-0x0000000052a0ca05, size=32, cache=kmalloc-32 [ 95.552995] allocated by task 3751 on cpu 5 at 95.551457s (0.001537s ago): [ 95.553151] test_alloc+0x322/0x1110 [kfence_test] [ 95.553267] test_use_after_free_read+0xd8/0x270 [kfence_test] [ 95.553405] kunit_try_run_case+0x175/0x440 [ 95.553526] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 95.553637] kthread+0x3b4/0x780 [ 95.553716] ret_from_fork+0x22c/0x300 [ 95.553803] ret_from_fork_asm+0x1a/0x30 [ 95.553946] freed by task 3751 on cpu 5 at 95.551463s (0.002482s ago): [ 95.554077] test_use_after_free_read+0x1e3/0x270 [kfence_test] [ 95.554201] kunit_try_run_case+0x175/0x440 [ 95.554294] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 95.554406] kthread+0x3b4/0x780 [ 95.554504] ret_from_fork+0x22c/0x300 [ 95.554591] ret_from_fork_asm+0x1a/0x30 [ 95.554733] CPU: 5 UID: 0 PID: 3751 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 95.554958] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 95.555063] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 95.555217] ================================================================== [ 95.555675] ok 5 test_use_after_free_read [ 95.555877] # test_use_after_free_read-memcache: setup_test_cache: size=32, ctor=0x0 [ 95.556305] # test_use_after_free_read-memcache: test_alloc: size=32, gfp=cc0, policy=any, cache=1 [ 95.656484] ================================================================== [ 95.656671] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x125/0x270 [kfence_test] [ 95.656895] Use-after-free read at 0x0000000079d697e0 (in kfence-#209): [ 95.657036] test_use_after_free_read+0x125/0x270 [kfence_test] [ 95.657170] kunit_try_run_case+0x175/0x440 [ 95.657274] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 95.657404] kthread+0x3b4/0x780 [ 95.657502] ret_from_fork+0x22c/0x300 [ 95.657610] ret_from_fork_asm+0x1a/0x30 [ 95.657779] kfence-#209: 0x0000000079d697e0-0x000000006ed6d085, size=32, cache=test [ 95.657959] allocated by task 3753 on cpu 1 at 95.656472s (0.001486s ago): [ 95.658100] test_alloc+0x283/0x1110 [kfence_test] [ 95.658204] test_use_after_free_read+0xd8/0x270 [kfence_test] [ 95.658325] kunit_try_run_case+0x175/0x440 [ 95.658420] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 95.658551] kthread+0x3b4/0x780 [ 95.658630] ret_from_fork+0x22c/0x300 [ 95.658717] ret_from_fork_asm+0x1a/0x30 [ 95.658857] freed by task 3753 on cpu 1 at 95.656476s (0.002380s ago): [ 95.658991] test_use_after_free_read+0xf7/0x270 [kfence_test] [ 95.659111] kunit_try_run_case+0x175/0x440 [ 95.659206] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 95.659317] kthread+0x3b4/0x780 [ 95.659396] ret_from_fork+0x22c/0x300 [ 95.659482] ret_from_fork_asm+0x1a/0x30 [ 95.659625] CPU: 1 UID: 0 PID: 3753 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 95.659851] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 95.659956] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 95.660109] ================================================================== [ 95.687878] ok 6 test_use_after_free_read-memcache [ 95.688169] # test_use_after_free_read_nofault: test_alloc: size=32, gfp=cc0, policy=any, cache=0 [ 95.759829] ok 7 test_use_after_free_read_nofault [ 95.760071] # test_use_after_free_read_nofault-memcache: setup_test_cache: size=32, ctor=0x0 [ 95.760598] # test_use_after_free_read_nofault-memcache: test_alloc: size=32, gfp=cc0, policy=any, cache=1 [ 95.891707] ok 8 test_use_after_free_read_nofault-memcache [ 95.891983] # test_double_free: test_alloc: size=32, gfp=cc0, policy=any, cache=0 [ 95.967465] ================================================================== [ 95.967653] BUG: KFENCE: invalid free in test_double_free+0x1cf/0x260 [kfence_test] [ 95.967857] Invalid free of 0x0000000094e894fd (in kfence-#212): [ 95.967991] test_double_free+0x1cf/0x260 [kfence_test] [ 95.968122] kunit_try_run_case+0x175/0x440 [ 95.968233] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 95.968365] kthread+0x3b4/0x780 [ 95.968454] ret_from_fork+0x22c/0x300 [ 95.968560] ret_from_fork_asm+0x1a/0x30 [ 95.968701] kfence-#212: 0x0000000094e894fd-0x000000005e47aad7, size=32, cache=kmalloc-32 [ 95.968888] allocated by task 3762 on cpu 0 at 95.967448s (0.001439s ago): [ 95.969029] test_alloc+0x322/0x1110 [kfence_test] [ 95.969133] test_double_free+0xd7/0x260 [kfence_test] [ 95.969242] kunit_try_run_case+0x175/0x440 [ 95.969334] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 95.969457] kthread+0x3b4/0x780 [ 95.969546] ret_from_fork+0x22c/0x300 [ 95.969633] ret_from_fork_asm+0x1a/0x30 [ 95.969773] freed by task 3762 on cpu 0 at 95.967452s (0.002320s ago): [ 95.969903] test_double_free+0x1dc/0x260 [kfence_test] [ 95.970014] kunit_try_run_case+0x175/0x440 [ 95.970108] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 95.970219] kthread+0x3b4/0x780 [ 95.970298] ret_from_fork+0x22c/0x300 [ 95.970384] ret_from_fork_asm+0x1a/0x30 [ 95.970545] CPU: 0 UID: 0 PID: 3762 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 95.970770] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 95.970875] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 95.971028] ================================================================== [ 95.971401] ok 9 test_double_free [ 95.971549] # test_double_free-memcache: setup_test_cache: size=32, ctor=0x0 [ 95.971956] # test_double_free-memcache: test_alloc: size=32, gfp=cc0, policy=any, cache=1 [ 96.071495] ================================================================== [ 96.071683] BUG: KFENCE: invalid free in test_double_free+0x10e/0x260 [kfence_test] [ 96.071886] Invalid free of 0x000000006da5a264 (in kfence-#213): [ 96.072018] test_double_free+0x10e/0x260 [kfence_test] [ 96.072149] kunit_try_run_case+0x175/0x440 [ 96.072263] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 96.072393] kthread+0x3b4/0x780 [ 96.072493] ret_from_fork+0x22c/0x300 [ 96.072601] ret_from_fork_asm+0x1a/0x30 [ 96.072752] kfence-#213: 0x000000006da5a264-0x0000000079d9a510, size=32, cache=test [ 96.072931] allocated by task 3764 on cpu 4 at 96.071480s (0.001451s ago): [ 96.073071] test_alloc+0x283/0x1110 [kfence_test] [ 96.073175] test_double_free+0xd7/0x260 [kfence_test] [ 96.073287] kunit_try_run_case+0x175/0x440 [ 96.073380] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 96.073495] kthread+0x3b4/0x780 [ 96.073574] ret_from_fork+0x22c/0x300 [ 96.073661] ret_from_fork_asm+0x1a/0x30 [ 96.073801] freed by task 3764 on cpu 4 at 96.071483s (0.002317s ago): [ 96.073931] test_double_free+0xf6/0x260 [kfence_test] [ 96.074043] kunit_try_run_case+0x175/0x440 [ 96.074134] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 96.074246] kthread+0x3b4/0x780 [ 96.074326] ret_from_fork+0x22c/0x300 [ 96.074414] ret_from_fork_asm+0x1a/0x30 [ 96.074559] CPU: 4 UID: 0 PID: 3764 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 96.074785] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 96.074889] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 96.075042] ================================================================== [ 96.103261] ok 10 test_double_free-memcache [ 96.103469] # test_invalid_addr_free: test_alloc: size=32, gfp=cc0, policy=any, cache=0 [ 96.175472] ================================================================== [ 96.175648] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1dd/0x260 [kfence_test] [ 96.175845] Invalid free of 0x00000000beff9a7f (in kfence-#214): [ 96.175970] test_invalid_addr_free+0x1dd/0x260 [kfence_test] [ 96.176089] kunit_try_run_case+0x175/0x440 [ 96.176185] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 96.176298] kthread+0x3b4/0x780 [ 96.176378] ret_from_fork+0x22c/0x300 [ 96.176478] ret_from_fork_asm+0x1a/0x30 [ 96.176631] kfence-#214: 0x0000000086ebe288-0x00000000a319836f, size=32, cache=kmalloc-32 [ 96.176832] allocated by task 3766 on cpu 6 at 96.175459s (0.001373s ago): [ 96.176972] test_alloc+0x322/0x1110 [kfence_test] [ 96.177076] test_invalid_addr_free+0xd7/0x260 [kfence_test] [ 96.177192] kunit_try_run_case+0x175/0x440 [ 96.177286] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 96.177406] kthread+0x3b4/0x780 [ 96.177498] ret_from_fork+0x22c/0x300 [ 96.177584] ret_from_fork_asm+0x1a/0x30 [ 96.177726] CPU: 6 UID: 0 PID: 3766 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 96.177951] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 96.178057] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 96.178209] ================================================================== [ 96.179242] ok 11 test_invalid_addr_free [ 96.179370] # test_invalid_addr_free-memcache: setup_test_cache: size=32, ctor=0x0 [ 96.179819] # test_invalid_addr_free-memcache: test_alloc: size=32, gfp=cc0, policy=any, cache=1 [ 96.279482] ================================================================== [ 96.279677] BUG: KFENCE: invalid free in test_invalid_addr_free+0xf7/0x260 [kfence_test] [ 96.279897] Invalid free of 0x00000000c4571edb (in kfence-#215): [ 96.280029] test_invalid_addr_free+0xf7/0x260 [kfence_test] [ 96.280170] kunit_try_run_case+0x175/0x440 [ 96.280282] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 96.280412] kthread+0x3b4/0x780 [ 96.280511] ret_from_fork+0x22c/0x300 [ 96.280617] ret_from_fork_asm+0x1a/0x30 [ 96.280793] kfence-#215: 0x000000003f77e8fa-0x00000000be3b2f4b, size=32, cache=test [ 96.281001] allocated by task 3771 on cpu 0 at 96.279469s (0.001532s ago): [ 96.281159] test_alloc+0x283/0x1110 [kfence_test] [ 96.281265] test_invalid_addr_free+0xd7/0x260 [kfence_test] [ 96.281382] kunit_try_run_case+0x175/0x440 [ 96.281474] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 96.281585] kthread+0x3b4/0x780 [ 96.281664] ret_from_fork+0x22c/0x300 [ 96.281751] ret_from_fork_asm+0x1a/0x30 [ 96.281892] CPU: 0 UID: 0 PID: 3771 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 96.282119] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 96.282224] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 96.282379] ================================================================== [ 96.320648] ok 12 test_invalid_addr_free-memcache [ 96.320956] # test_corruption: test_alloc: size=32, gfp=cc0, policy=left, cache=0 [ 96.695495] ================================================================== [ 96.695673] BUG: KFENCE: memory corruption in test_corruption+0x2ce/0x3e0 [kfence_test] [ 96.695864] Corrupted memory at 0x0000000032e5000e [ ! . . . . . . . . . . . . . . . ] (in kfence-#219): [ 96.696062] test_corruption+0x2ce/0x3e0 [kfence_test] [ 96.696173] kunit_try_run_case+0x175/0x440 [ 96.696266] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 96.696378] kthread+0x3b4/0x780 [ 96.696457] ret_from_fork+0x22c/0x300 [ 96.696546] ret_from_fork_asm+0x1a/0x30 [ 96.696685] kfence-#219: 0x00000000d42f49ea-0x00000000ab7275cb, size=32, cache=kmalloc-32 [ 96.696872] allocated by task 3773 on cpu 6 at 96.695478s (0.001394s ago): [ 96.697009] test_alloc+0x322/0x1110 [kfence_test] [ 96.697114] test_corruption+0xe2/0x3e0 [kfence_test] [ 96.697221] kunit_try_run_case+0x175/0x440 [ 96.697313] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 96.697424] kthread+0x3b4/0x780 [ 96.697504] ret_from_fork+0x22c/0x300 [ 96.697591] ret_from_fork_asm+0x1a/0x30 [ 96.697729] freed by task 3773 on cpu 6 at 96.695482s (0.002247s ago): [ 96.697860] test_corruption+0x2ce/0x3e0 [kfence_test] [ 96.697968] kunit_try_run_case+0x175/0x440 [ 96.698062] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 96.698175] kthread+0x3b4/0x780 [ 96.698253] ret_from_fork+0x22c/0x300 [ 96.698339] ret_from_fork_asm+0x1a/0x30 [ 96.698500] CPU: 6 UID: 0 PID: 3773 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 96.698726] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 96.698831] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 96.698984] ================================================================== [ 96.699788] # test_corruption: test_alloc: size=32, gfp=cc0, policy=right, cache=0 [ 96.799488] ================================================================== [ 96.799664] BUG: KFENCE: memory corruption in test_corruption+0x2db/0x3e0 [kfence_test] [ 96.799853] Corrupted memory at 0x0000000069f86fa6 [ ! ] (in kfence-#220): [ 96.799994] test_corruption+0x2db/0x3e0 [kfence_test] [ 96.800104] kunit_try_run_case+0x175/0x440 [ 96.800197] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 96.800309] kthread+0x3b4/0x780 [ 96.800387] ret_from_fork+0x22c/0x300 [ 96.800474] ret_from_fork_asm+0x1a/0x30 [ 96.800614] kfence-#220: 0x00000000ea7bed2f-0x00000000522757c1, size=32, cache=kmalloc-32 [ 96.800801] allocated by task 3773 on cpu 6 at 96.799471s (0.001329s ago): [ 96.800938] test_alloc+0x322/0x1110 [kfence_test] [ 96.801046] test_corruption+0x1c7/0x3e0 [kfence_test] [ 96.801155] kunit_try_run_case+0x175/0x440 [ 96.801247] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 96.801358] kthread+0x3b4/0x780 [ 96.801437] ret_from_fork+0x22c/0x300 [ 96.801523] ret_from_fork_asm+0x1a/0x30 [ 96.801663] freed by task 3773 on cpu 6 at 96.799475s (0.002187s ago): [ 96.801793] test_corruption+0x2db/0x3e0 [kfence_test] [ 96.801901] kunit_try_run_case+0x175/0x440 [ 96.801995] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 96.802106] kthread+0x3b4/0x780 [ 96.802184] ret_from_fork+0x22c/0x300 [ 96.802270] ret_from_fork_asm+0x1a/0x30 [ 96.802411] CPU: 6 UID: 0 PID: 3773 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 96.802656] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 96.802760] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 96.802913] ================================================================== [ 96.804093] ok 13 test_corruption [ 96.804253] # test_corruption-memcache: setup_test_cache: size=32, ctor=0x0 [ 96.804698] # test_corruption-memcache: test_alloc: size=32, gfp=cc0, policy=left, cache=1 [ 96.903479] ================================================================== [ 96.903664] BUG: KFENCE: memory corruption in test_corruption+0x12d/0x3e0 [kfence_test] [ 96.903873] Corrupted memory at 0x000000007b8640ce [ ! . . . . . . . . . . . . . . . ] (in kfence-#221): [ 96.904081] test_corruption+0x12d/0x3e0 [kfence_test] [ 96.904211] kunit_try_run_case+0x175/0x440 [ 96.904315] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 96.904448] kthread+0x3b4/0x780 [ 96.904540] ret_from_fork+0x22c/0x300 [ 96.904628] ret_from_fork_asm+0x1a/0x30 [ 96.904773] kfence-#221: 0x000000002a04feae-0x00000000205f788c, size=32, cache=test [ 96.904953] allocated by task 3775 on cpu 4 at 96.903464s (0.001488s ago): [ 96.905091] test_alloc+0x283/0x1110 [kfence_test] [ 96.905196] test_corruption+0xe2/0x3e0 [kfence_test] [ 96.905303] kunit_try_run_case+0x175/0x440 [ 96.905405] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 96.905528] kthread+0x3b4/0x780 [ 96.905607] ret_from_fork+0x22c/0x300 [ 96.905693] ret_from_fork_asm+0x1a/0x30 [ 96.905833] freed by task 3775 on cpu 4 at 96.903468s (0.002364s ago): [ 96.905964] test_corruption+0x12d/0x3e0 [kfence_test] [ 96.906074] kunit_try_run_case+0x175/0x440 [ 96.906166] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 96.906277] kthread+0x3b4/0x780 [ 96.906357] ret_from_fork+0x22c/0x300 [ 96.906465] ret_from_fork_asm+0x1a/0x30 [ 96.906610] CPU: 4 UID: 0 PID: 3775 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 96.906842] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 96.906946] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 96.907100] ================================================================== [ 96.907263] # test_corruption-memcache: test_alloc: size=32, gfp=cc0, policy=right, cache=1 [ 97.215495] ================================================================== [ 97.215682] BUG: KFENCE: memory corruption in test_corruption+0x212/0x3e0 [kfence_test] [ 97.215891] Corrupted memory at 0x00000000a158887b [ ! ] (in kfence-#224): [ 97.216044] test_corruption+0x212/0x3e0 [kfence_test] [ 97.216174] kunit_try_run_case+0x175/0x440 [ 97.216287] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 97.216418] kthread+0x3b4/0x780 [ 97.216522] ret_from_fork+0x22c/0x300 [ 97.216629] ret_from_fork_asm+0x1a/0x30 [ 97.216806] kfence-#224: 0x000000009aee3760-0x00000000a63ce7fc, size=32, cache=test [ 97.217014] allocated by task 3775 on cpu 4 at 97.215480s (0.001525s ago): [ 97.217170] test_alloc+0x283/0x1110 [kfence_test] [ 97.217294] test_corruption+0x1c7/0x3e0 [kfence_test] [ 97.217403] kunit_try_run_case+0x175/0x440 [ 97.217501] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 97.217613] kthread+0x3b4/0x780 [ 97.217692] ret_from_fork+0x22c/0x300 [ 97.217779] ret_from_fork_asm+0x1a/0x30 [ 97.217922] freed by task 3775 on cpu 4 at 97.215483s (0.002438s ago): [ 97.218053] test_corruption+0x212/0x3e0 [kfence_test] [ 97.218165] kunit_try_run_case+0x175/0x440 [ 97.218257] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 97.218371] kthread+0x3b4/0x780 [ 97.218452] ret_from_fork+0x22c/0x300 [ 97.218539] ret_from_fork_asm+0x1a/0x30 [ 97.218681] CPU: 4 UID: 0 PID: 3775 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 97.218907] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 97.219012] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 97.219169] ================================================================== [ 97.257577] ok 14 test_corruption-memcache [ 97.258016] # test_free_bulk: test_alloc: size=304, gfp=cc0, policy=right, cache=0 [ 97.319484] # test_free_bulk: test_alloc: size=304, gfp=cc0, policy=none, cache=0 [ 97.319714] # test_free_bulk: test_alloc: size=304, gfp=cc0, policy=left, cache=0 [ 97.423487] # test_free_bulk: test_alloc: size=304, gfp=cc0, policy=none, cache=0 [ 97.423704] # test_free_bulk: test_alloc: size=304, gfp=cc0, policy=none, cache=0 [ 97.423884] # test_free_bulk: test_alloc: size=32, gfp=cc0, policy=right, cache=0 [ 97.527474] # test_free_bulk: test_alloc: size=32, gfp=cc0, policy=none, cache=0 [ 97.527699] # test_free_bulk: test_alloc: size=32, gfp=cc0, policy=left, cache=0 [ 97.631502] # test_free_bulk: test_alloc: size=32, gfp=cc0, policy=none, cache=0 [ 97.631723] # test_free_bulk: test_alloc: size=32, gfp=cc0, policy=none, cache=0 [ 97.631898] # test_free_bulk: test_alloc: size=77, gfp=cc0, policy=right, cache=0 [ 97.839501] # test_free_bulk: test_alloc: size=77, gfp=cc0, policy=none, cache=0 [ 97.839722] # test_free_bulk: test_alloc: size=77, gfp=cc0, policy=left, cache=0 [ 97.943483] # test_free_bulk: test_alloc: size=77, gfp=cc0, policy=none, cache=0 [ 97.943710] # test_free_bulk: test_alloc: size=77, gfp=cc0, policy=none, cache=0 [ 97.943885] # test_free_bulk: test_alloc: size=207, gfp=cc0, policy=right, cache=0 [ 98.047483] # test_free_bulk: test_alloc: size=207, gfp=cc0, policy=none, cache=0 [ 98.047708] # test_free_bulk: test_alloc: size=207, gfp=cc0, policy=left, cache=0 [ 98.151484] # test_free_bulk: test_alloc: size=207, gfp=cc0, policy=none, cache=0 [ 98.151713] # test_free_bulk: test_alloc: size=207, gfp=cc0, policy=none, cache=0 [ 98.151890] # test_free_bulk: test_alloc: size=206, gfp=cc0, policy=right, cache=0 [ 98.255484] # test_free_bulk: test_alloc: size=206, gfp=cc0, policy=none, cache=0 [ 98.255702] # test_free_bulk: test_alloc: size=206, gfp=cc0, policy=left, cache=0 [ 98.879486] # test_free_bulk: test_alloc: size=206, gfp=cc0, policy=none, cache=0 [ 98.879708] # test_free_bulk: test_alloc: size=206, gfp=cc0, policy=none, cache=0 [ 98.880187] ok 15 test_free_bulk [ 98.880317] # test_free_bulk-memcache: setup_test_cache: size=290, ctor=0x0 [ 98.880759] # test_free_bulk-memcache: test_alloc: size=290, gfp=cc0, policy=right, cache=1 [ 98.983458] # test_free_bulk-memcache: test_alloc: size=290, gfp=cc0, policy=none, cache=1 [ 98.983679] # test_free_bulk-memcache: test_alloc: size=290, gfp=cc0, policy=left, cache=1 [ 99.191465] # test_free_bulk-memcache: test_alloc: size=290, gfp=cc0, policy=none, cache=1 [ 99.191683] # test_free_bulk-memcache: test_alloc: size=290, gfp=cc0, policy=none, cache=1 [ 99.257595] # test_free_bulk-memcache: setup_test_cache: size=161, ctor=ctor_set_x [kfence_test] [ 99.257977] # test_free_bulk-memcache: test_alloc: size=161, gfp=cc0, policy=right, cache=1 [ 99.607457] # test_free_bulk-memcache: test_alloc: size=161, gfp=cc0, policy=none, cache=1 [ 99.607678] # test_free_bulk-memcache: test_alloc: size=161, gfp=cc0, policy=left, cache=1 [ 99.711466] # test_free_bulk-memcache: test_alloc: size=161, gfp=cc0, policy=none, cache=1 [ 99.711681] # test_free_bulk-memcache: test_alloc: size=161, gfp=cc0, policy=none, cache=1 [ 99.774259] # test_free_bulk-memcache: setup_test_cache: size=149, ctor=0x0 [ 99.774835] # test_free_bulk-memcache: test_alloc: size=149, gfp=cc0, policy=right, cache=1 [ 99.815458] # test_free_bulk-memcache: test_alloc: size=149, gfp=cc0, policy=none, cache=1 [ 99.815674] # test_free_bulk-memcache: test_alloc: size=149, gfp=cc0, policy=left, cache=1 [ 100.023456] # test_free_bulk-memcache: test_alloc: size=149, gfp=cc0, policy=none, cache=1 [ 100.023677] # test_free_bulk-memcache: test_alloc: size=149, gfp=cc0, policy=none, cache=1 [ 100.062576] LKP: stdout: 3214: HOSTNAME lkp-ivb-d01, MAC 00:22:4d:81:6e:ce, kernel 6.16.0-rc5-00045-gadcc3bfa8806 1 [ 100.074649] # test_free_bulk-memcache: setup_test_cache: size=307, ctor=ctor_set_x [kfence_test] [ 100.075025] # test_free_bulk-memcache: test_alloc: size=307, gfp=cc0, policy=right, cache=1 [ 100.127454] # test_free_bulk-memcache: test_alloc: size=307, gfp=cc0, policy=none, cache=1 [ 100.127672] # test_free_bulk-memcache: test_alloc: size=307, gfp=cc0, policy=left, cache=1 [ 100.335462] # test_free_bulk-memcache: test_alloc: size=307, gfp=cc0, policy=none, cache=1 [ 100.335679] # test_free_bulk-memcache: test_alloc: size=307, gfp=cc0, policy=none, cache=1 [ 100.389323] # test_free_bulk-memcache: setup_test_cache: size=290, ctor=0x0 [ 100.389708] # test_free_bulk-memcache: test_alloc: size=290, gfp=cc0, policy=right, cache=1 [ 100.647472] # test_free_bulk-memcache: test_alloc: size=290, gfp=cc0, policy=none, cache=1 [ 100.647690] # test_free_bulk-memcache: test_alloc: size=290, gfp=cc0, policy=left, cache=1 [ 100.751468] # test_free_bulk-memcache: test_alloc: size=290, gfp=cc0, policy=none, cache=1 [ 100.751681] # test_free_bulk-memcache: test_alloc: size=290, gfp=cc0, policy=none, cache=1 [ 100.810347] ok 16 test_free_bulk-memcache [ 100.810836] ok 17 test_init_on_free # SKIP Test requires: IS_ENABLED(CONFIG_INIT_ON_FREE_DEFAULT_ON) [ 100.811213] ok 18 test_init_on_free-memcache # SKIP Test requires: IS_ENABLED(CONFIG_INIT_ON_FREE_DEFAULT_ON) [ 100.811535] # test_kmalloc_aligned_oob_read: test_alloc: size=73, gfp=cc0, policy=right, cache=0 [ 100.855476] ================================================================== [ 100.855665] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x27a/0x560 [kfence_test] [ 100.855897] Out-of-bounds read at 0x00000000e5075da0 (105B right of kfence-#6): [ 100.856049] test_kmalloc_aligned_oob_read+0x27a/0x560 [kfence_test] [ 100.856198] kunit_try_run_case+0x175/0x440 [ 100.856311] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 100.856452] kthread+0x3b4/0x780 [ 100.856562] ret_from_fork+0x22c/0x300 [ 100.856669] ret_from_fork_asm+0x1a/0x30 [ 100.856847] kfence-#6: 0x00000000f2ac9a34-0x00000000550e8a1f, size=73, cache=kmalloc-96 [ 100.857060] allocated by task 3797 on cpu 0 at 100.855467s (0.001592s ago): [ 100.857218] test_alloc+0x322/0x1110 [kfence_test] [ 100.857332] test_kmalloc_aligned_oob_read+0x101/0x560 [kfence_test] [ 100.857488] kunit_try_run_case+0x175/0x440 [ 100.857581] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 100.857692] kthread+0x3b4/0x780 [ 100.857773] ret_from_fork+0x22c/0x300 [ 100.857860] ret_from_fork_asm+0x1a/0x30 [ 100.858004] CPU: 0 UID: 0 PID: 3797 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 100.858229] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 100.858334] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 100.858487] ================================================================== [ 100.858872] ok 19 test_kmalloc_aligned_oob_read [ 100.859003] # test_kmalloc_aligned_oob_write: test_alloc: size=73, gfp=cc0, policy=right, cache=0 [ 100.959464] ================================================================== [ 100.959651] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x24b/0x340 [kfence_test] [ 100.959879] Corrupted memory at 0x000000007627ffa0 [ ! . . . . . . . . . . . . . . . ] (in kfence-#2): [ 100.960085] test_kmalloc_aligned_oob_write+0x24b/0x340 [kfence_test] [ 100.960234] kunit_try_run_case+0x175/0x440 [ 100.960337] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 100.960478] kthread+0x3b4/0x780 [ 100.960576] ret_from_fork+0x22c/0x300 [ 100.960682] ret_from_fork_asm+0x1a/0x30 [ 100.960859] kfence-#2: 0x0000000046c06002-0x0000000001ae64b7, size=73, cache=kmalloc-96 [ 100.961065] allocated by task 3799 on cpu 0 at 100.959449s (0.001615s ago): [ 100.961230] test_alloc+0x322/0x1110 [kfence_test] [ 100.961344] test_kmalloc_aligned_oob_write+0xc4/0x340 [kfence_test] [ 100.961512] kunit_try_run_case+0x175/0x440 [ 100.961625] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 100.961763] kthread+0x3b4/0x780 [ 100.961842] ret_from_fork+0x22c/0x300 [ 100.961929] ret_from_fork_asm+0x1a/0x30 [ 100.962069] freed by task 3799 on cpu 0 at 100.959452s (0.002616s ago): [ 100.962200] test_kmalloc_aligned_oob_write+0x24b/0x340 [kfence_test] [ 100.962331] kunit_try_run_case+0x175/0x440 [ 100.962445] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 100.962566] kthread+0x3b4/0x780 [ 100.962646] ret_from_fork+0x22c/0x300 [ 100.962734] ret_from_fork_asm+0x1a/0x30 [ 100.962877] CPU: 0 UID: 0 PID: 3799 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 100.963104] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 100.963209] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 100.963362] ================================================================== [ 100.963751] ok 20 test_kmalloc_aligned_oob_write [ 100.963896] # test_shrink_memcache: setup_test_cache: size=32, ctor=0x0 [ 100.964303] # test_shrink_memcache: test_alloc: size=32, gfp=cc0, policy=any, cache=1 [ 101.103707] ok 21 test_shrink_memcache [ 101.103837] # test_memcache_ctor: setup_test_cache: size=32, ctor=ctor_set_x [kfence_test] [ 101.104292] # test_memcache_ctor: test_alloc: size=32, gfp=cc0, policy=any, cache=1 [ 101.207805] ok 22 test_memcache_ctor [ 101.208056] ================================================================== [ 101.208341] BUG: KFENCE: invalid read in test_invalid_access+0xe1/0x200 [kfence_test] [ 101.208572] Invalid read at 0x0000000053dc5e00: [ 101.208674] test_invalid_access+0xe1/0x200 [kfence_test] [ 101.208788] kunit_try_run_case+0x175/0x440 [ 101.208883] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 101.208995] kthread+0x3b4/0x780 [ 101.209076] ret_from_fork+0x22c/0x300 [ 101.209164] ret_from_fork_asm+0x1a/0x30 [ 101.209307] CPU: 0 UID: 0 PID: 3808 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 101.209534] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 101.209638] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 101.209792] ================================================================== [ 101.210200] ok 23 test_invalid_access [ 101.210326] # test_gfpzero: test_alloc: size=4096, gfp=cc0, policy=any, cache=0 [ 101.271484] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 101.375468] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 101.479478] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 101.583471] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 101.687487] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 101.791465] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 101.896457] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 101.999474] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 102.103477] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 102.114611] install debs round one: dpkg -i --force-confdef --force-depends /opt/deb/ntpdate_1%3a4.2.8p15+dfsg-2~1.2.2+dfsg1-1+deb12u1_all.deb [ 102.116150] /opt/deb/ntpsec-ntpdate_1.2.2+dfsg1-1+deb12u1_amd64.deb [ 102.117510] /opt/deb/python3-ntp_1.2.2+dfsg1-1+deb12u1_amd64.deb [ 102.118755] Selecting previously unselected package ntpdate. [ 102.120476] (Reading database ... 16595 files and directories currently installed.) [ 102.122543] Preparing to unpack .../ntpdate_1%3a4.2.8p15+dfsg-2~1.2.2+dfsg1-1+deb12u1_all.deb ... [ 102.124117] Unpacking ntpdate (1:4.2.8p15+dfsg-2~1.2.2+dfsg1-1+deb12u1) ... [ 102.125527] Selecting previously unselected package ntpsec-ntpdate. [ 102.127306] Preparing to unpack .../ntpsec-ntpdate_1.2.2+dfsg1-1+deb12u1_amd64.deb ... [ 102.128674] Unpacking ntpsec-ntpdate (1.2.2+dfsg1-1+deb12u1) ... [ 102.129980] Selecting previously unselected package python3-ntp. [ 102.131703] Preparing to unpack .../python3-ntp_1.2.2+dfsg1-1+deb12u1_amd64.deb ... [ 102.132987] Unpacking python3-ntp (1.2.2+dfsg1-1+deb12u1) ... [ 102.134259] Setting up python3-ntp (1.2.2+dfsg1-1+deb12u1) ... [ 102.135855] Setting up ntpdate (1:4.2.8p15+dfsg-2~1.2.2+dfsg1-1+deb12u1) ... [ 102.137208] Setting up ntpsec-ntpdate (1.2.2+dfsg1-1+deb12u1) ... [ 102.137713] NO_NETWORK= [ 102.138649] CLOCK: time stepped by -50873.553510 [ 102.141124] 2025-07-31 19:29:04.300391 (+0000) -50873.553510 +/- 0.000380 internal-lkp-server 192.168.1.200 s5 no-leap [ 102.207479] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 102.311481] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 102.415478] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 102.519478] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 102.623485] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 102.727480] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 102.831476] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 102.935477] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 103.039479] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 103.143469] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 103.247468] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 103.351478] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 103.455479] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 103.559471] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 103.663480] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 103.767481] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 103.871470] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 103.975471] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 104.079478] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 104.183478] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 104.287472] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 104.391479] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 104.452834] LKP: stdout: 3214: /lkp/lkp/src/bin/run-lkp /lkp/jobs/scheduled/lkp-ivb-d01/kunit-group-03-debian-12-x86_64-20240206.cgz-adcc3bfa8806-20250801-40427-b4iy2g-1.yaml [ 104.456430] RESULT_ROOT=/result/kunit/group-03/lkp-ivb-d01/debian-12-x86_64-20240206.cgz/x86_64-rhel-9.4-kunit/gcc-12/adcc3bfa8806761ac21aa271f78454113ec6936e/0 [ 104.459381] job=/lkp/jobs/scheduled/lkp-ivb-d01/kunit-group-03-debian-12-x86_64-20240206.cgz-adcc3bfa8806-20250801-40427-b4iy2g-1.yaml [ 104.495479] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 104.599472] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 104.703480] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 104.807480] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 104.911478] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 105.015477] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 105.119477] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 105.223480] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 105.327502] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 105.431480] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 105.535487] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 105.639481] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 105.743477] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 105.847503] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 105.951473] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 106.055479] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 106.159477] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 106.263480] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 106.367476] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 106.471480] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 106.575477] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 106.679480] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 106.783479] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 106.887479] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 106.991471] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 107.095486] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 107.199487] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 107.303483] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 107.407485] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 107.511485] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 107.615484] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 107.719484] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 107.823485] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 107.927483] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 108.031475] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 108.135485] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 108.239486] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 108.343462] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 108.447482] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 108.551465] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 108.655488] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 108.759461] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 108.863487] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 108.967468] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 109.071486] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 109.175501] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 109.279484] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 109.383480] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 109.487487] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 109.591499] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 109.695485] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 109.799482] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 109.903484] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 110.007484] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 110.111467] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 110.215466] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 110.319468] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 110.423466] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 110.527471] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 110.631467] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 110.692656] result_service: raw_upload, RESULT_MNT: /internal-lkp-server/result, RESULT_ROOT: /internal-lkp-server/result/kunit/group-03/lkp-ivb-d01/debian-12-x86_64-20240206.cgz/x86_64-rhel-9.4-kunit/gcc-12/adcc3bfa8806761ac21aa271f78454113ec6936e/0, TMP_RESULT_ROOT: /tmp/lkp/result [ 110.695948] run-job /lkp/jobs/scheduled/lkp-ivb-d01/kunit-group-03-debian-12-x86_64-20240206.cgz-adcc3bfa8806-20250801-40427-b4iy2g-1.yaml [ 110.735468] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 110.839469] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 110.943468] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 111.047459] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 111.151471] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 111.255467] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 111.359471] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 111.463468] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 111.497114] /usr/bin/wget -q --timeout=3600 --tries=1 --local-encoding=UTF-8 http://internal-lkp-server:80/~lkp/cgi-bin/lkp-jobfile-append-var?job_file=/lkp/jobs/scheduled/lkp-ivb-d01/kunit-group-03-debian-12-x86_64-20240206.cgz-adcc3bfa8806-20250801-40427-b4iy2g-1.yaml&job_state=running -O /dev/null [ 111.498100] target ucode: 0x21 [ 111.499494] LKP: stdout: 3414: current_version: 21, target_version: 21 [ 111.499970] check_nr_cpu [ 111.501022] CPU(s): 8 [ 111.502169] On-line CPU(s) list: 0-7 [ 111.504040] Model name: Intel(R) Core(TM) i7-3770K CPU @ 3.50GHz [ 111.506502] BIOS Model name: Intel(R) Core(TM) i7-3770K CPU @ 3.50GHz Fill By OEM CPU @ 3.5GHz [ 111.507646] Thread(s) per core: 2 [ 111.508693] Core(s) per socket: 4 [ 111.509738] Socket(s): 1 [ 111.510823] CPU(s) scaling MHz: 96% [ 111.511870] NUMA node(s): 1 [ 111.512969] NUMA node0 CPU(s): 0-7 [ 111.513901] run_kunit_tests: test drm_buddy_test [ 111.515027] 2025-07-31 19:29:12 modprobe -v drm_buddy_test [ 111.517293] insmod /lib/modules/6.16.0-rc5-00045-gadcc3bfa8806/kernel/drivers/gpu/drm/tests/drm_buddy_test.ko [ 111.518431] 2025-07-31 19:29:12 rmmod drm_buddy_test [ 111.519284] run_kunit_tests: test kasan_test [ 111.520316] 2025-07-31 19:29:12 modprobe -v kasan_test [ 111.522203] insmod /lib/modules/6.16.0-rc5-00045-gadcc3bfa8806/kernel/mm/kasan/kasan_test.ko [ 111.523182] 2025-07-31 19:29:14 rmmod kasan_test [ 111.524037] run_kunit_tests: test kfence_test [ 111.525090] 2025-07-31 19:29:14 modprobe -v kfence_test [ 111.526675] IPMI BMC is not supported on this machine, skip bmc-watchdog setup! [ 111.567492] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 111.671492] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 111.775493] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 111.879493] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 111.983493] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 112.087489] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 112.191492] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 112.295490] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 112.399501] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 112.503491] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 112.607487] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 112.711488] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 112.815489] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 112.919489] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 113.023481] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 113.127489] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 113.231488] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 113.335490] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 113.439506] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 113.543497] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 113.647496] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 113.751493] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 113.855490] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 113.959489] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 114.063456] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 114.167491] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 114.271496] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 114.375493] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 114.479488] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 114.583495] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 114.687494] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 114.791488] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 114.895496] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 114.999492] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 115.103490] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 115.207488] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 115.311489] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 115.415493] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 115.519491] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 115.623490] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 115.727494] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 115.831492] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 115.935487] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 116.039493] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 116.143490] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 116.247490] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 116.351491] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 116.455487] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 116.559493] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 116.663492] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 116.767493] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 116.871495] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 116.975488] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 117.079466] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 117.183490] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 117.287480] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 117.391499] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 117.495490] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 117.599493] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 117.703496] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 117.807491] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 117.911493] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 118.015489] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 118.119483] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 118.223479] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 118.327488] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 118.431494] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 118.535492] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 118.639495] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 118.743495] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 118.847489] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 118.951500] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 119.055495] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 119.159489] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 119.263493] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 119.367510] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 [ 119.471497] # test_gfpzero: Test should be marked slow (runtime: 18.261171323s) [ 119.471854] ok 24 test_gfpzero [ 119.472267] # test_memcache_typesafe_by_rcu: setup_test_cache: size=32, ctor=0x0 [ 119.472730] # test_memcache_typesafe_by_rcu: test_alloc: size=32, gfp=cc0, policy=any, cache=1 [ 119.695218] ================================================================== [ 119.695377] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x2e8/0x670 [kfence_test] [ 119.695592] Use-after-free read at 0x00000000ab143a6d (in kfence-#12): [ 119.695722] test_memcache_typesafe_by_rcu+0x2e8/0x670 [kfence_test] [ 119.695850] kunit_try_run_case+0x175/0x440 [ 119.695945] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 119.696056] kthread+0x3b4/0x780 [ 119.696135] ret_from_fork+0x22c/0x300 [ 119.696222] ret_from_fork_asm+0x1a/0x30 [ 119.696361] kfence-#12: 0x00000000ab143a6d-0x0000000081ed5de6, size=32, cache=test [ 119.696541] allocated by task 3872 on cpu 0 at 119.679471s (0.017069s ago): [ 119.696681] test_alloc+0x283/0x1110 [kfence_test] [ 119.696785] test_memcache_typesafe_by_rcu+0x16b/0x670 [kfence_test] [ 119.696912] kunit_try_run_case+0x175/0x440 [ 119.697004] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 119.697114] kthread+0x3b4/0x780 [ 119.697192] ret_from_fork+0x22c/0x300 [ 119.697280] ret_from_fork_asm+0x1a/0x30 [ 119.697419] freed by task 3872 on cpu 0 at 119.679476s (0.017943s ago): [ 119.697556] test_memcache_typesafe_by_rcu+0x1bb/0x670 [kfence_test] [ 119.697683] kunit_try_run_case+0x175/0x440 [ 119.697775] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 119.697886] kthread+0x3b4/0x780 [ 119.697964] ret_from_fork+0x22c/0x300 [ 119.698050] ret_from_fork_asm+0x1a/0x30 [ 119.698192] CPU: 0 UID: 0 PID: 3872 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 119.698417] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 119.698525] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 119.698677] ================================================================== [ 119.717602] ok 25 test_memcache_typesafe_by_rcu [ 119.717967] # test_krealloc: test_alloc: size=32, gfp=cc0, policy=any, cache=0 [ 119.783482] ================================================================== [ 119.783628] BUG: KFENCE: use-after-free read in test_krealloc+0x6f3/0xbd0 [kfence_test] [ 119.783823] Use-after-free read at 0x000000005116e78c (in kfence-#13): [ 119.783953] test_krealloc+0x6f3/0xbd0 [kfence_test] [ 119.784060] kunit_try_run_case+0x175/0x440 [ 119.784154] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 119.784266] kthread+0x3b4/0x780 [ 119.784345] ret_from_fork+0x22c/0x300 [ 119.784434] ret_from_fork_asm+0x1a/0x30 [ 119.784574] kfence-#13: 0x000000005116e78c-0x00000000a6607565, size=32, cache=kmalloc-32 [ 119.784760] allocated by task 3875 on cpu 6 at 119.783466s (0.001293s ago): [ 119.784903] test_alloc+0x322/0x1110 [kfence_test] [ 119.785007] test_krealloc+0xb3/0xbd0 [kfence_test] [ 119.785111] kunit_try_run_case+0x175/0x440 [ 119.785204] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 119.785315] kthread+0x3b4/0x780 [ 119.785393] ret_from_fork+0x22c/0x300 [ 119.785479] ret_from_fork_asm+0x1a/0x30 [ 119.785620] freed by task 3875 on cpu 6 at 119.783472s (0.002147s ago): [ 119.785751] krealloc_noprof+0x13c/0x380 [ 119.785840] test_krealloc+0x21d/0xbd0 [kfence_test] [ 119.785945] kunit_try_run_case+0x175/0x440 [ 119.786038] kunit_generic_run_threadfn_adapter+0x7c/0xe0 [ 119.786149] kthread+0x3b4/0x780 [ 119.786227] ret_from_fork+0x22c/0x300 [ 119.786313] ret_from_fork_asm+0x1a/0x30 [ 119.786454] CPU: 6 UID: 0 PID: 3875 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-00045-gadcc3bfa8806 #1 PREEMPT(voluntary) [ 119.786678] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 119.786782] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 119.786935] ================================================================== [ 119.787870] ok 26 test_krealloc [ 119.787994] # test_memcache_alloc_bulk: setup_test_cache: size=32, ctor=0x0 [ 119.903938] ok 27 test_memcache_alloc_bulk [ 119.932490] # kfence: pass:25 fail:0 skip:2 total:27 [ 119.932636] # Totals: pass:25 fail:0 skip:2 total:27 [ 119.932749] ok 1 kfence [ 119.935586] insmod /lib/modules/6.16.0-rc5-00045-gadcc3bfa8806/kernel/mm/kfence/kfence_test.ko [ 119.939966] 2025-07-31 19:29:40 rmmod kfence_test [ 119.986077] run_kunit_tests: test platform-device-test [ 119.996525] 2025-07-31 19:29:40 modprobe -v platform-device-test [ 120.003181] KTAP version 1 [ 120.003268] 1..2 [ 120.003432] KTAP version 1 [ 120.003513] # Subtest: platform-device-devm [ 120.003613] # module: platform_device_test [ 120.003626] 1..4 [ 120.004296] ok 1 platform_device_devm_register_unregister_test [ 120.004757] ok 2 platform_device_devm_register_get_unregister_with_devm_test [ 120.005829] ok 3 probed_platform_device_devm_register_unregister_test [ 120.007063] ok 4 probed_platform_device_devm_register_get_unregister_with_devm_test [ 120.007250] # platform-device-devm: pass:4 fail:0 skip:0 total:4 [ 120.007447] # Totals: pass:4 fail:0 skip:0 total:4 [ 120.007601] ok 1 platform-device-devm [ 120.007856] KTAP version 1 [ 120.007944] # Subtest: platform-device-match [ 120.008056] # module: platform_device_test [ 120.008066] 1..1 [ 120.008715] ok 1 platform_device_find_by_null_test [ 120.008730] ok 2 platform-device-match [ 120.011593] insmod /lib/modules/6.16.0-rc5-00045-gadcc3bfa8806/kernel/drivers/base/test/platform-device-test.ko [ 120.017599] 2025-07-31 19:29:40 rmmod platform-device-test [ 120.039635] run_kunit_tests: test property-entry-test [ 120.050198] 2025-07-31 19:29:40 modprobe -v property-entry-test [ 120.057228] KTAP version 1 [ 120.057331] 1..1 [ 120.057577] KTAP version 1 [ 120.057669] # Subtest: property-entry [ 120.057771] # module: property_entry_test [ 120.057783] 1..7 [ 120.058331] ok 1 pe_test_uints [ 120.058751] ok 2 pe_test_uint_arrays [ 120.059168] ok 3 pe_test_strings [ 120.059659] ok 4 pe_test_bool [ 120.060035] ok 5 pe_test_move_inline_u8 [ 120.060400] ok 6 pe_test_move_inline_str [ 120.060983] ok 7 pe_test_reference [ 120.061330] # property-entry: pass:7 fail:0 skip:0 total:7 [ 120.061469] # Totals: pass:7 fail:0 skip:0 total:7 [ 120.061609] ok 1 property-entry [ 120.064394] insmod /lib/modules/6.16.0-rc5-00045-gadcc3bfa8806/kernel/drivers/base/test/property-entry-test.ko [ 120.068385] 2025-07-31 19:29:40 rmmod property-entry-test [ 120.098287] run_kunit_tests: test of_test [ 120.109138] 2025-07-31 19:29:40 modprobe -v of_test [ 120.114974] KTAP version 1 [ 120.115059] 1..2 [ 120.115211] KTAP version 1 [ 120.115289] # Subtest: of_dtb [ 120.115370] # module: of_test [ 120.115382] 1..2 [ 120.116663] ok 1 of_dtb_root_node_found_by_path [ 120.116937] ok 2 of_dtb_root_node_populates_of_root [ 120.117061] # of_dtb: pass:2 fail:0 skip:0 total:2 [ 120.117179] # Totals: pass:2 fail:0 skip:0 total:2 [ 120.117288] ok 1 of_dtb [ 120.117546] KTAP version 1 [ 120.117634] # Subtest: of_address [ 120.117719] # module: of_test [ 120.117732] 1..1 [ 120.117872] KTAP version 1 [ 120.117960] # Subtest: of_address_resource_bounds [ 120.118253] ok 1 start=0x0000000000000000,size=0x0000000000000000 [ 120.118621] ok 2 start=0x0000000000000000,size=0x0000000000001000 [ 120.119074] ok 3 start=0x0000000000001000,size=0x0000000000000000 [ 120.119429] ok 4 start=0x0000000000001000,size=0x0000000000001000 [ 120.119756] ok 5 start=0x0000000000000001,size=0xffffffffffffffff [ 120.120069] ok 6 start=0xffffffffffffffff,size=0x0000000000000001 [ 120.120351] ok 7 start=0x0000000000000002,size=0xffffffffffffffff [ 120.120680] ok 8 start=0xffffffffffffffff,size=0x0000000000000002 [ 120.120970] ok 9 start=0x0000000100000000,size=0x0000000000000001 [ 120.121249] ok 10 start=0x0000000000001000,size=0x00000000ffffffff [ 120.121393] # of_address_resource_bounds: pass:10 fail:0 skip:0 total:10 [ 120.121573] ok 1 of_address_resource_bounds [ 120.121733] # Totals: pass:10 fail:0 skip:0 total:10 [ 120.121841] ok 2 of_address [ 120.124286] insmod /lib/modules/6.16.0-rc5-00045-gadcc3bfa8806/kernel/drivers/of/of_test.ko [ 120.128517] 2025-07-31 19:29:40 rmmod of_test [ 120.155480] run_kunit_tests: test overlay-test [ 120.166063] 2025-07-31 19:29:40 modprobe -v overlay-test [ 120.172007] KTAP version 1 [ 120.172087] 1..1 [ 120.172316] KTAP version 1 [ 120.172394] # Subtest: of_overlay_apply_kunit [ 120.172532] # module: overlay_test [ 120.172553] 1..3 [ 120.172920] ok 1 of_overlay_apply_kunit_apply # SKIP requires CONFIG_OF and CONFIG_OF_OVERLAY and CONFIG_OF_EARLY_FLATTREE for root node [ 120.173125] ok 2 of_overlay_apply_kunit_platform_device # SKIP requires CONFIG_OF and CONFIG_OF_OVERLAY and CONFIG_OF_EARLY_FLATTREE for root node [ 120.173588] ok 3 of_overlay_apply_kunit_cleanup # SKIP requires CONFIG_OF_OVERLAY to apply overlay [ 120.173835] # of_overlay_apply_kunit: pass:0 fail:0 skip:3 total:3 [ 120.174017] # Totals: pass:0 fail:0 skip:3 total:3 [ 120.174148] ok 1 of_overlay_apply_kunit # SKIP [ 120.177135] insmod /lib/modules/6.16.0-rc5-00045-gadcc3bfa8806/kernel/drivers/of/overlay-test.ko [ 120.182381] 2025-07-31 19:29:40 rmmod overlay-test [ 120.217578] run_kunit_tests: test packing_test [ 120.227991] 2025-07-31 19:29:40 modprobe -v packing_test [ 120.234195] KTAP version 1 [ 120.234276] 1..1 [ 120.234490] KTAP version 1 [ 120.234571] # Subtest: packing [ 120.234654] # module: packing_test [ 120.234666] 1..4 [ 120.234814] KTAP version 1 [ 120.234901] # Subtest: packing_test_pack [ 120.235107] ok 1 no quirks, 16 bytes [ 120.235370] ok 2 lsw32 first, 16 bytes [ 120.235719] ok 3 little endian words, 16 bytes [ 120.235995] ok 4 lsw32 first + little endian words, 16 bytes [ 120.236273] ok 5 msb right, 16 bytes [ 120.236597] ok 6 msb right + lsw32 first, 16 bytes [ 120.236912] ok 7 msb right + little endian words, 16 bytes [ 120.237183] ok 8 msb right + lsw32 first + little endian words, 16 bytes [ 120.237491] ok 9 no quirks, 18 bytes [ 120.237848] ok 10 no quirks, 19 bytes [ 120.238111] ok 11 no quirks, 20 bytes [ 120.238366] ok 12 no quirks, 22 bytes [ 120.238750] ok 13 no quirks, 24 bytes [ 120.239034] ok 14 lsw32 first + little endian words, 18 bytes [ 120.239293] ok 15 lsw32 first + little endian words, 19 bytes [ 120.239630] ok 16 lsw32 first + little endian words, 20 bytes [ 120.239941] ok 17 lsw32 first + little endian words, 22 bytes [ 120.240236] ok 18 lsw32 first + little endian words, 24 bytes [ 120.240566] ok 19 no quirks, 16 bytes, non-aligned [ 120.240907] ok 20 lsw32 first, 16 bytes, non-aligned [ 120.241209] ok 21 little endian words, 16 bytes, non-aligned [ 120.241577] ok 22 lsw32 first + little endian words, 16 bytes, non-aligned [ 120.241882] ok 23 msb right, 16 bytes, non-aligned [ 120.242202] ok 24 msb right + lsw32 first, 16 bytes, non-aligned [ 120.242552] ok 25 msb right + little endian words, 16 bytes, non-aligned [ 120.242859] ok 26 msb right + lsw32 first + little endian words, 16 bytes, non-aligned [ 120.243199] ok 27 no quirks, 16 bytes, non-aligned, 0xff [ 120.243607] ok 28 lsw32 first, 16 bytes, non-aligned, 0xff [ 120.243963] ok 29 little endian words, 16 bytes, non-aligned, 0xff [ 120.244262] ok 30 lsw32 first + little endian words, 16 bytes, non-aligned, 0xff [ 120.244651] ok 31 msb right, 16 bytes, non-aligned, 0xff [ 120.245057] ok 32 msb right + lsw32 first, 16 bytes, non-aligned, 0xff [ 120.245382] ok 33 msb right + little endian words, 16 bytes, non-aligned, 0xff [ 120.245882] ok 34 msb right + lsw32 first + little endian words, 16 bytes, non-aligned, 0xff [ 120.246046] # packing_test_pack: pass:34 fail:0 skip:0 total:34 [ 120.246223] ok 1 packing_test_pack [ 120.246359] KTAP version 1 [ 120.246579] # Subtest: packing_test_unpack [ 120.246760] ok 1 no quirks, 16 bytes [ 120.247015] ok 2 lsw32 first, 16 bytes [ 120.247266] ok 3 little endian words, 16 bytes [ 120.247548] ok 4 lsw32 first + little endian words, 16 bytes [ 120.247817] ok 5 msb right, 16 bytes [ 120.248099] ok 6 msb right + lsw32 first, 16 bytes [ 120.248348] ok 7 msb right + little endian words, 16 bytes [ 120.248682] ok 8 msb right + lsw32 first + little endian words, 16 bytes [ 120.248961] ok 9 no quirks, 18 bytes [ 120.249258] ok 10 no quirks, 19 bytes [ 120.249570] ok 11 no quirks, 20 bytes [ 120.249848] ok 12 no quirks, 22 bytes [ 120.250101] ok 13 no quirks, 24 bytes [ 120.250369] ok 14 lsw32 first + little endian words, 18 bytes [ 120.250868] ok 15 lsw32 first + little endian words, 19 bytes [ 120.251158] ok 16 lsw32 first + little endian words, 20 bytes [ 120.251474] ok 17 lsw32 first + little endian words, 22 bytes [ 120.251838] ok 18 lsw32 first + little endian words, 24 bytes [ 120.252172] ok 19 no quirks, 16 bytes, non-aligned [ 120.252480] ok 20 lsw32 first, 16 bytes, non-aligned [ 120.252759] ok 21 little endian words, 16 bytes, non-aligned [ 120.253030] ok 22 lsw32 first + little endian words, 16 bytes, non-aligned [ 120.253309] ok 23 msb right, 16 bytes, non-aligned [ 120.253704] ok 24 msb right + lsw32 first, 16 bytes, non-aligned [ 120.253968] ok 25 msb right + little endian words, 16 bytes, non-aligned [ 120.254256] ok 26 msb right + lsw32 first + little endian words, 16 bytes, non-aligned [ 120.254609] ok 27 no quirks, 16 bytes, non-aligned, 0xff [ 120.255085] ok 28 lsw32 first, 16 bytes, non-aligned, 0xff [ 120.255382] ok 29 little endian words, 16 bytes, non-aligned, 0xff [ 120.255731] ok 30 lsw32 first + little endian words, 16 bytes, non-aligned, 0xff [ 120.256042] ok 31 msb right, 16 bytes, non-aligned, 0xff [ 120.256363] ok 32 msb right + lsw32 first, 16 bytes, non-aligned, 0xff [ 120.256687] ok 33 msb right + little endian words, 16 bytes, non-aligned, 0xff [ 120.256997] ok 34 msb right + lsw32 first + little endian words, 16 bytes, non-aligned, 0xff [ 120.257160] # packing_test_unpack: pass:34 fail:0 skip:0 total:34 [ 120.257340] ok 2 packing_test_unpack [ 120.257786] ok 3 packing_test_pack_fields [ 120.258093] ok 4 packing_test_unpack_fields [ 120.258201] # packing: pass:4 fail:0 skip:0 total:4 [ 120.258309] # Totals: pass:70 fail:0 skip:0 total:70 [ 120.258434] ok 1 packing [ 120.260782] insmod /lib/modules/6.16.0-rc5-00045-gadcc3bfa8806/kernel/lib/packing_test.ko [ 120.265181] 2025-07-31 19:29:40 rmmod packing_test [ 120.280797] run_kunit_tests: test printf_kunit [ 120.291288] 2025-07-31 19:29:40 modprobe -v printf_kunit [ 120.298352] KTAP version 1 [ 120.298443] 1..1 [ 120.298714] KTAP version 1 [ 120.298792] # Subtest: printf [ 120.298891] # module: printf_kunit [ 120.298912] 1..28 [ 120.299359] ok 1 test_basic [ 120.299786] ok 2 test_number [ 120.300076] ok 3 test_string [ 120.300309] ok 4 hash_pointer [ 120.300595] ok 5 null_pointer [ 120.300850] ok 6 error_pointer [ 120.301100] ok 7 invalid_pointer [ 120.301331] ok 8 symbol_ptr [ 120.301622] ok 9 kernel_ptr [ 120.301890] ok 10 struct_resource [ 120.302136] ok 11 struct_range [ 120.302372] ok 12 addr [ 120.303169] ok 13 escaped_str [ 120.303523] ok 14 hex_string [ 120.303888] ok 15 mac [ 120.304168] ok 16 ip4 [ 120.304407] ok 17 ip6 [ 120.304737] ok 18 uuid [ 120.305045] ok 19 dentry [ 120.305279] ok 20 struct_va_format [ 120.305648] ok 21 time_and_date [ 120.306120] ok 22 struct_clk [ 120.306432] ok 23 bitmap [ 120.306718] ok 24 netdev_features [ 120.307026] ok 25 flags [ 120.307330] ok 26 errptr [ 120.307941] ok 27 fwnode_pointer [ 120.308290] ok 28 fourcc_pointer [ 120.308401] # printf: ran 464 tests [ 120.308648] # printf: pass:28 fail:0 skip:0 total:28 [ 120.308659] # Totals: pass:28 fail:0 skip:0 total:28 [ 120.308803] ok 1 printf [ 120.311679] insmod /lib/modules/6.16.0-rc5-00045-gadcc3bfa8806/kernel/lib/tests/printf_kunit.ko [ 120.315913] 2025-07-31 19:29:40 rmmod printf_kunit [ 120.342624] run_kunit_tests: test scanf_kunit [ 120.353229] 2025-07-31 19:29:40 modprobe -v scanf_kunit [ 120.362724] KTAP version 1 [ 120.362809] 1..1 [ 120.363053] KTAP version 1 [ 120.363132] # Subtest: scanf [ 120.363231] # module: scanf_kunit [ 120.363252] 1..10 [ 120.365220] ok 1 numbers_simple [ 120.365239] KTAP version 1 [ 120.365440] # Subtest: numbers_list [ 120.365744] ok 1 " " [ 120.366097] ok 2 ":" [ 120.366448] ok 3 "," [ 120.366841] ok 4 "-" [ 120.367176] ok 5 "/" [ 120.367260] # numbers_list: pass:5 fail:0 skip:0 total:5 [ 120.367342] ok 2 numbers_list [ 120.368675] KTAP version 1 [ 120.368841] # Subtest: numbers_list_field_width_typemax [ 120.369242] ok 1 " " [ 120.369755] ok 2 ":" [ 120.370244] ok 3 "," [ 120.370636] ok 4 "-" [ 120.371004] ok 5 "/" [ 120.371088] # numbers_list_field_width_typemax: pass:5 fail:0 skip:0 total:5 [ 120.371170] ok 3 numbers_list_field_width_typemax [ 120.371320] KTAP version 1 [ 120.371527] # Subtest: numbers_list_field_width_val_width [ 120.371836] ok 1 " " [ 120.372239] ok 2 ":" [ 120.372599] ok 3 "," [ 120.372952] ok 4 "-" [ 120.373292] ok 5 "/" [ 120.373376] # numbers_list_field_width_val_width: pass:5 fail:0 skip:0 total:5 [ 120.373625] ok 4 numbers_list_field_width_val_width [ 120.374040] ok 5 numbers_slice [ 120.374311] ok 6 numbers_prefix_overflow [ 120.374656] ok 7 test_simple_strtoull [ 120.374967] ok 8 test_simple_strtoll [ 120.375253] ok 9 test_simple_strtoul [ 120.375601] ok 10 test_simple_strtol [ 120.375718] # scanf: pass:10 fail:0 skip:0 total:10 [ 120.375836] # Totals: pass:22 fail:0 skip:0 total:22 [ 120.375968] ok 1 scanf [ 120.378364] insmod /lib/modules/6.16.0-rc5-00045-gadcc3bfa8806/kernel/lib/tests/scanf_kunit.ko [ 120.382649] 2025-07-31 19:29:40 rmmod scanf_kunit