[Enter `^Ec?' for help] coreboot-56f9d1cd49 Thu Sep 5 21:57:06 UTC 2019 bootblock starting... Family_Model: 00670f00 PMxC0 STATUS: 0x80800 DoReset BIT11 DW I2C bus 1 at 0xfedc3000 (400 KHz) VBOOT: Loading verstage. CBFS: 'Master Header Locator' located CBFS at [df0000:ffffc0) CBFS: Locating 'fallback/verstage' CBFS: Found @ offset aa8c0 size d5a4 coreboot-56f9d1cd49 Thu Sep 5 21:57:06 UTC 2019 verstage starting... Probing TPM I2C: done! DID_VID 0x00281ae0 TPM ready after 0 ms cr50 TPM 2.0 (i2c 1:0x50 id 0x28) TPM: setup succeeded src/security/tpm/tss/tcg-2.0/tss.c:177 index 0x1007 return code 0 Chrome EC: UHEPI supported Phase 1 FMAP: Found "FLASH" version 1.1 at d7f000. FMAP: base = ff000000 size = 1000000 #areas = 30 FMAP: area GBB found @ d80000 (458752 bytes) VB2:vb2_check_recovery() Recovery reason from previous boot: 0x0 / 0x0 Phase 2 Phase 3 FMAP: area GBB found @ d80000 (458752 bytes) VB2:vb2_report_dev_firmware() This is developer signed firmware FMAP: area VBLOCK_B found @ 23f000 (65536 bytes) FMAP: area VBLOCK_B found @ 23f000 (65536 bytes) VB2:vb2_verify_keyblock() Checking key block signature... FMAP: area VBLOCK_B found @ 23f000 (65536 bytes) FMAP: area VBLOCK_B found @ 23f000 (65536 bytes) VB2:vb2_verify_fw_preamble() Verifying preamble. Phase 4 FMAP: area FW_MAIN_B found @ 24f000 (2154432 bytes) VB2:vb2api_init_hash() HW crypto for hash_alg 2 not supported, using SW VB2:vb2_rsa_verify_digest() Digest check failed! VB2:vb2_fail() Need recovery, reason: 0x1b / 0x7 Saving nvdata Reboot requested (10020007) board_reset() called! coreboot-56f9d1cd49 Thu Sep 5 21:57:06 UTC 2019 bootblock starting... Family_Model: 00670f00 PMxC0 STATUS: 0x80800 DoReset BIT11 DW I2C bus 1 at 0xfedc3000 (400 KHz) VBOOT: Loading verstage. CBFS: 'Master Header Locator' located CBFS at [df0000:ffffc0) CBFS: Locating 'fallback/verstage' CBFS: Found @ offset aa8c0 size d5a4 coreboot-56f9d1cd49 Thu Sep 5 21:57:06 UTC 2019 verstage starting... Probing TPM I2C: .done! DID_VID 0x00281ae0 TPM ready after 0 ms cr50 TPM 2.0 (i2c 1:0x50 id 0x28) TPM: setup succeeded src/security/tpm/tss/tcg-2.0/tss.c:177 index 0x1007 return code 0 Chrome EC: UHEPI supported Phase 1 FMAP: Found "FLASH" version 1.1 at d7f000. FMAP: base = ff000000 size = 1000000 #areas = 30 FMAP: area GBB found @ d80000 (458752 bytes) VB2:vb2_check_recovery() Recovery reason from previous boot: 0x1b / 0x7 VB2:vb2_check_recovery() We have a recovery request: 0x1b / 0x0 Recovery requested (1009000e) Saving nvdata tlcl_extend: response is 0 tlcl_extend: response is 0 CBFS: 'Master Header Locator' located CBFS at [df0000:ffffc0) CBFS: Locating 'fallback/romstage' CBFS: Found @ offset 80 size d2e4 coreboot-56f9d1cd49 Thu Sep 5 21:57:06 UTC 2019 romstage starting... CBFS: 'Master Header Locator' located CBFS at [df0000:ffffc0) CBFS: Locating 'smu_fw' CBFS: Found @ offset 7bc00 size 12262 PSP: Load blob type 19 from @ffe6bc38... OK Google Chrome set keyboard backlight: 4 status (0) POST: 0x37 agesawrapper_amdinitreset() entry CBFS: 'Master Header Locator' located CBFS at [df0000:ffffc0) CBFS: Locating 'AGESA_PRE_MEM' CBFS: Found @ offset df80 size 53bcc agesawrapper_amdinitreset() returned AGESA_SUCCESS POST: 0x38 agesawrapper_amdinitearly() entry Warning - AGESA callout: platform_PcieSlotResetControl not supported Warning - AGESA callout: platform_PcieSlotResetControl not supported agesawrapper_amdinitearly() returned AGESA_SUCCESS POST: 0x40 agesawrapper_amdinitpost() entry DRAM clear on reset: Keep variant_mainboard_read_spd SPD index 9 CBFS: 'Master Header Locator' located CBFS at [df0000:ffffc0) CBFS: Locating 'spd.bin' CBFS: Found @ offset 79bc0 size 2000 AGESA set: umamode UMA_SPECIFIED : syslimit 0x12effffff, bottomio 0x00d00000 : uma size 16MB, uma start 0xcf000000 agesawrapper_amdinitpost() returned AGESA_SUCCESS POST: 0x41 Boot Count incremented to 49165 POST: 0x42 PSP: Notify that DRAM is available... OK POST: 0x43 CBMEM: IMD: root @ cdfff000 254 entries. IMD: root @ cdffec00 62 entries. External stage cache: IMD: root @ cefff000 254 entries. IMD: root @ ceffec00 62 entries. creating vboot_handoff structure Chrome EC: UHEPI supported Chrome EC: clear events_b mask to 0x0000000021004000 POST: 0x44 MTRR Range: Start=cd000000 End=ce000000 (Size 1000000) MTRR Range: Start=ff000000 End=0 (Size 1000000) MTRR Range: Start=ce800000 End=cf000000 (Size 800000) POST: 0x45 CBFS: 'Master Header Locator' located CBFS at [df0000:ffffc0) CBFS: Locating 'fallback/postcar' CBFS: Found @ offset a2a80 size 41f4 Decompressing stage fallback/postcar @ 0xcdfa1fc0 (33488 bytes) Loading module at cdfa2000 with entry cdfa2000. filesize: 0x3fd0 memsize: 0x8290 Processing 114 relocs. Offset value of 0xcbfa2000 coreboot-56f9d1cd49 Thu Sep 5 21:57:06 UTC 2019 postcar starting... CBFS: 'Master Header Locator' located CBFS at [df0000:ffffc0) CBFS: Locating 'fallback/ramstage' CBFS: Found @ offset 61bc0 size 17f95 Decompressing stage fallback/ramstage @ 0xcde9efc0 (1055256 bytes) Loading module at cde9f000 with entry cde9f000. filesize: 0x37198 memsize: 0x1019d8 Processing 3480 relocs. Offset value of 0xcdd9f000 coreboot-56f9d1cd49 Thu Sep 5 21:57:06 UTC 2019 ramstage starting... POST: 0x39 FMAP: Found "FLASH" version 1.1 at d7f000. FMAP: base = ff000000 size = 1000000 #areas = 30 FMAP: area RO_VPD found @ c00000 (16384 bytes) WARNING: RO_VPD is uninitialized or empty. FMAP: area RW_VPD found @ 465000 (8192 bytes) FMAP: area RW_VPD found @ 465000 (8192 bytes) POST: 0x80 Normal boot. POST: 0x46 CBFS: 'Master Header Locator' located CBFS at [df0000:ffffc0) CBFS: Locating 'smu_fw2' CBFS: Found @ offset 8dec0 size 4cf2 PSP: Load blob type 1a from @ffe7def8... OK POST: 0x47 agesawrapper_amdinitenv() entry CBFS: 'Master Header Locator' located CBFS at [df0000:ffffc0) CBFS: Locating 'AGESA_POST_MEM' CBFS: Found @ offset b7f00 size 135b2 Decompressing stage AGESA_POST_MEM @ 0xcde6cfc0 (198492 bytes) Loading module at cde6d000 with entry cde6d000. filesize: 0x2f340 memsize: 0x2f480 Processing 1271 relocs. Offset value of 0xce06d000 AGESA: Saving stage to cache Fch OEM config in INIT ENV Done agesawrapper_amdinitenv() returned AGESA_SUCCESS POST: 0x70 BS: BS_PRE_DEVICE times (us): entry 124061 run 1059 exit 0 POST: 0x71 Board ID: 6 mainboard: EC init Chrome EC: Set SMI mask to 0x0000000000000000 Chrome EC: UHEPI supported Chrome EC: Set S5 LAZY WAKE mask to 0x0000000000000006 Chrome EC: Set S3 LAZY WAKE mask to 0x0000000010001006 Chrome EC: Set WAKE mask to 0x0000000000000000 DW I2C bus 0 at 0xfedc2000 (400 KHz) DW I2C bus 2 at 0xfedc4000 (400 KHz) DW I2C bus 3 at 0xfedc5000 (400 KHz) FMAP: area RW_ELOG found @ 45d000 (16384 bytes) Manufacturer: ef SF: Detected W25Q128FW with sector size 0x1000, total 0x1000000 ELOG: NV offset 0x45d000 size 0x4000 ELOG: area is 4096 bytes, full threshold 3842, shrink size 1024 ELOG: Event(17) added with size 13 at 2023-03-12 08:10:46 UTC POST: Unexpected post code in previous boot: 0x90 ELOG: Event(A3) added with size 11 at 2023-03-12 08:10:46 UTC ELOG: Event(9F) added with size 14 at 2023-03-12 08:10:46 UTC PM1_STS: PWRBTN BMSTATUS setup_bsp_ramtop, TOP MEM: msr.lo = 0xd0000000, msr.hi = 0x00000000 setup_bsp_ramtop, TOP MEM2: msr.lo = 0x2f000000, msr.hi = 0x00000001 BS: BS_DEV_INIT_CHIPS times (us): entry 0 run 96164 exit 0 POST: 0x72 Enumerating buses... Show all devs... Before device enumeration. Root Device: enabled 1 CPU_CLUSTER: 0: enabled 1 DOMAIN: 0000: enabled 1 MMIO: fedc2000: enabled 1 MMIO: fedc3000: enabled 1 MMIO: fedc4000: enabled 1 MMIO: fedc5000: enabled 1 APIC: 10: enabled 1 PCI: 00:00.0: enabled 1 PCI: 00:00.2: enabled 0 PCI: 00:01.0: enabled 1 PCI: 00:01.1: enabled 1 PCI: 00:02.0: enabled 1 PCI: 00:02.1: enabled 1 PCI: 00:02.2: enabled 1 PCI: 00:02.3: enabled 1 PCI: 00:02.4: enabled 1 PCI: 00:02.5: enabled 1 PCI: 00:08.0: enabled 1 PCI: 00:09.0: enabled 1 PCI: 00:09.2: enabled 1 PCI: 00:10.0: enabled 1 PCI: 00:11.0: enabled 0 PCI: 00:12.0: enabled 1 PCI: 00:14.0: enabled 1 PCI: 00:14.3: enabled 1 PCI: 00:14.7: enabled 1 PCI: 00:18.0: enabled 1 PCI: 00:18.1: enabled 1 PCI: 00:18.2: enabled 1 PCI: 00:18.3: enabled 1 PCI: 00:18.4: enabled 1 PCI: 00:18.5: enabled 1 GENERIC: 0.0: enabled 1 I2C: 00:1a: enabled 1 GENERIC: 0.1: enabled 1 I2C: 00:50: enabled 1 I2C: 00:15: enabled 1 I2C: 00:39: enabled 1 I2C: 00:10: enabled 1 PCI: 00:00.0: enabled 1 PNP: 0c09.0: enabled 1 Compare with tree... Root Device: enabled 1 CPU_CLUSTER: 0: enabled 1 APIC: 10: enabled 1 DOMAIN: 0000: enabled 1 PCI: 00:00.0: enabled 1 PCI: 00:00.2: enabled 0 PCI: 00:01.0: enabled 1 PCI: 00:01.1: enabled 1 PCI: 00:02.0: enabled 1 PCI: 00:02.1: enabled 1 PCI: 00:02.2: enabled 1 PCI: 00:02.3: enabled 1 PCI: 00:02.4: enabled 1 PCI: 00:00.0: enabled 1 PCI: 00:02.5: enabled 1 PCI: 00:08.0: enabled 1 PCI: 00:09.0: enabled 1 PCI: 00:09.2: enabled 1 PCI: 00:10.0: enabled 1 PCI: 00:11.0: enabled 0 PCI: 00:12.0: enabled 1 PCI: 00:14.0: enabled 1 PCI: 00:14.3: enabled 1 PNP: 0c09.0: enabled 1 PCI: 00:14.7: enabled 1 PCI: 00:18.0: enabled 1 PCI: 00:18.1: enabled 1 PCI: 00:18.2: enabled 1 PCI: 00:18.3: enabled 1 PCI: 00:18.4: enabled 1 PCI: 00:18.5: enabled 1 MMIO: fedc2000: enabled 1 GENERIC: 0.0: enabled 1 I2C: 00:1a: enabled 1 GENERIC: 0.1: enabled 1 MMIO: fedc3000: enabled 1 I2C: 00:50: enabled 1 MMIO: fedc4000: enabled 1 I2C: 00:15: enabled 1 MMIO: fedc5000: enabled 1 I2C: 00:39: enabled 1 I2C: 00:10: enabled 1 Mainboard Grunt Enable. Root Device scanning... root_dev_scan_bus for Root Device CPU_CLUSTER: 0 enabled DOMAIN: 0000 enabled MMIO: fedc2000 enabled MMIO: fedc3000 enabled MMIO: fedc4000 enabled MMIO: fedc5000 enabled DOMAIN: 0000 scanning... PCI: pci_scan_bus for bus 00 POST: 0x24 sb_enable PCI: 00:00.0 [1022/1576] enabled sb_enable sb_enable PCI: 00:01.0 [1002/98e4] enabled sb_enable PCI: 00:01.1 [1002/15b3] enabled sb_enable PCI: 00:02.0 [1022/157b] enabled sb_enable PCI: Static device PCI: 00:02.1 not found, disabling it. sb_enable Capability: type 0x01 @ 0x50 Capability: type 0x10 @ 0x58 Capability: type 0x05 @ 0xa0 Capability: type 0x0d @ 0xc0 Capability: type 0x08 @ 0xc8 Capability: type 0x01 @ 0x50 Capability: type 0x10 @ 0x58 PCI: 00:02.2 subordinate bus PCI Express PCI: 00:02.2 [1022/157c] enabled sb_enable PCI: Static device PCI: 00:02.3 not found, disabling it. sb_enable Capability: type 0x01 @ 0x50 Capability: type 0x10 @ 0x58 Capability: type 0x05 @ 0xa0 Capability: type 0x0d @ 0xc0 Capability: type 0x08 @ 0xc8 Capability: type 0x01 @ 0x50 Capability: type 0x10 @ 0x58 PCI: 00:02.4 subordinate bus PCI Express PCI: 00:02.4 [1022/157c] enabled sb_enable PCI: Static device PCI: 00:02.5 not found, disabling it. PCI: 00:03.0 [1022/157b] enabled sb_enable PCI: 00:08.0 [1022/1578] enabled sb_enable PCI: 00:09.0 [1022/157d] enabled sb_enable PCI: Static device PCI: 00:09.2 not found, disabling it. sb_enable PCI: 00:10.0 [1022/0000] bus ops PCI: 00:10.0 [1022/7914] enabled sb_enable sb_enable PCI: 00:12.0 [1022/0000] bus ops PCI: 00:12.0 [1022/7908] enabled sb_enable PCI: 00:14.0 [1022/790b] bus ops PCI: 00:14.0 [1022/790b] enabled sb_enable PCI: 00:14.3 [1022/0000] bus ops PCI: 00:14.3 [1022/790e] enabled sb_enable PCI: 00:14.7 [1022/7906] enabled sb_enable PCI: 00:18.0 [1022/15b0] ops PCI: 00:18.0 [1022/15b0] enabled sb_enable PCI: 00:18.1 [1022/15b1] enabled sb_enable PCI: 00:18.2 [1022/15b2] enabled sb_enable PCI: 00:18.3 [1022/15b3] enabled sb_enable PCI: 00:18.4 [1022/15b4] enabled sb_enable PCI: 00:18.5 [1022/15b5] enabled POST: 0x25 PCI: 00:02.2 scanning... do_pci_scan_bridge for PCI: 00:02.2 PCI: pci_scan_bus for bus 01 POST: 0x24 PCI: 01:00.0 [168c/003e] enabled POST: 0x25 POST: 0x55 Capability: type 0x01 @ 0x40 Capability: type 0x05 @ 0x50 Capability: type 0x10 @ 0x70 Capability: type 0x01 @ 0x50 Capability: type 0x10 @ 0x58 Enabling Common Clock Configuration ASPM: Enabled L0s and L1 Capability: type 0x01 @ 0x40 Capability: type 0x05 @ 0x50 Capability: type 0x10 @ 0x70 scan_bus: scanning of bus PCI: 00:02.2 took 40761 usecs PCI: 00:02.4 scanning... do_pci_scan_bridge for PCI: 00:02.4 PCI: pci_scan_bus for bus 02 POST: 0x24 PCI: 02:00.0 [1217/0000] ops PCI: 02:00.0 [1217/8620] enabled POST: 0x25 POST: 0x55 Capability: type 0x01 @ 0x6c Capability: type 0x05 @ 0x48 Capability: type 0x10 @ 0x80 Capability: type 0x01 @ 0x50 Capability: type 0x10 @ 0x58 ASPM: Enabled L0s and L1 Capability: type 0x01 @ 0x6c Capability: type 0x05 @ 0x48 Capability: type 0x10 @ 0x80 scan_bus: scanning of bus PCI: 00:02.4 took 40319 usecs PCI: 00:10.0 scanning... scan_usb_bus for PCI: 00:10.0 scan_usb_bus for PCI: 00:10.0 done scan_bus: scanning of bus PCI: 00:10.0 took 8114 usecs PCI: 00:12.0 scanning... scan_usb_bus for PCI: 00:12.0 scan_usb_bus for PCI: 00:12.0 done scan_bus: scanning of bus PCI: 00:12.0 took 8110 usecs PCI: 00:14.0 scanning... scan_generic_bus for PCI: 00:14.0 scan_generic_bus for PCI: 00:14.0 done scan_bus: scanning of bus PCI: 00:14.0 took 8802 usecs PCI: 00:14.3 scanning... scan_lpc_bus for PCI: 00:14.3 PNP: 0c09.0 enabled scan_lpc_bus for PCI: 00:14.3 done scan_bus: scanning of bus PCI: 00:14.3 took 9972 usecs POST: 0x55 scan_bus: scanning of bus DOMAIN: 0000 took 315120 usecs MMIO: fedc2000 scanning... scan_generic_bus for MMIO: fedc2000 bus: MMIO: fedc2000[0]->GENERIC: 0.0 enabled bus: MMIO: fedc2000[0]->I2C: 01:1a enabled bus: MMIO: fedc2000[0]->GENERIC: 0.1 enabled scan_generic_bus for MMIO: fedc2000 done scan_bus: scanning of bus MMIO: fedc2000 took 21206 usecs MMIO: fedc3000 scanning... scan_generic_bus for MMIO: fedc3000 bus: MMIO: fedc3000[0]->I2C: 02:50 enabled scan_generic_bus for MMIO: fedc3000 done scan_bus: scanning of bus MMIO: fedc3000 took 13183 usecs MMIO: fedc4000 scanning... scan_generic_bus for MMIO: fedc4000 bus: MMIO: fedc4000[0]->I2C: 03:15 enabled scan_generic_bus for MMIO: fedc4000 done scan_bus: scanning of bus MMIO: fedc4000 took 13154 usecs MMIO: fedc5000 scanning... scan_generic_bus for MMIO: fedc5000 bus: MMIO: fedc5000[0]->I2C: 04:39 enabled bus: MMIO: fedc5000[0]->I2C: 04:10 enabled scan_generic_bus for MMIO: fedc5000 done scan_bus: scanning of bus MMIO: fedc5000 took 16983 usecs root_dev_scan_bus for Root Device done scan_bus: scanning of bus Root Device took 426249 usecs done BS: BS_DEV_ENUMERATE times (us): entry 0 run 631257 exit 0 POST: 0x73 found VGA at PCI: 00:01.0 Setting up VGA for PCI: 00:01.0 Setting PCI_BRIDGE_CTL_VGA for bridge DOMAIN: 0000 Setting PCI_BRIDGE_CTL_VGA for bridge Root Device Allocating resources... Reading resources... Root Device read_resources bus 0 link: 0 CPU_CLUSTER: 0 read_resources bus 0 link: 0 CPU_CLUSTER: 0 read_resources bus 0 link: 0 done DOMAIN: 0000 read_resources bus 0 link: 0 PCI: 00:02.2 read_resources bus 1 link: 0 PCI: 00:02.2 read_resources bus 1 link: 0 done PCI: 00:02.4 read_resources bus 2 link: 0 PCI: 00:02.4 read_resources bus 2 link: 0 done PCI: 00:14.3 read_resources bus 0 link: 0 PCI: 00:14.3 read_resources bus 0 link: 0 done Adding PCIe enhanced config space BAR 0xf8000000-0xfc000000. DOMAIN: 0000 read_resources bus 0 link: 0 done MMIO: fedc2000 read_resources bus 1 link: 0 MMIO: fedc2000 read_resources bus 1 link: 0 done MMIO: fedc3000 read_resources bus 2 link: 0 MMIO: fedc3000 read_resources bus 2 link: 0 done MMIO: fedc4000 read_resources bus 3 link: 0 MMIO: fedc4000 read_resources bus 3 link: 0 done MMIO: fedc5000 read_resources bus 4 link: 0 MMIO: fedc5000 read_resources bus 4 link: 0 done Root Device read_resources bus 0 link: 0 done Done reading resources. Show resources in subtree (Root Device)...After reading. Root Device child on link 0 CPU_CLUSTER: 0 CPU_CLUSTER: 0 child on link 0 APIC: 10 APIC: 10 DOMAIN: 0000 child on link 0 PCI: 00:00.0 DOMAIN: 0000 resource base 0 size 0 align 0 gran 0 limit ffff flags 40040100 index 10000000 DOMAIN: 0000 resource base 0 size 0 align 0 gran 0 limit ffffffff flags 40040200 index 10000100 PCI: 00:00.0 PCI: 00:00.2 PCI: 00:01.0 PCI: 00:01.0 resource base 0 size 4000000 align 26 gran 26 limit ffffffffffffffff flags 1201 index 10 PCI: 00:01.0 resource base 0 size 800000 align 23 gran 23 limit ffffffffffffffff flags 1201 index 18 PCI: 00:01.0 resource base 0 size 100 align 8 gran 8 limit ffff flags 100 index 20 PCI: 00:01.0 resource base 0 size 40000 align 18 gran 18 limit ffffffff flags 200 index 24 PCI: 00:01.0 resource base 0 size 20000 align 17 gran 17 limit ffffffff flags 2200 index 30 PCI: 00:01.1 PCI: 00:01.1 resource base 0 size 4000 align 14 gran 14 limit ffffffffffffffff flags 201 index 10 PCI: 00:02.0 PCI: 00:02.1 PCI: 00:02.2 child on link 0 PCI: 01:00.0 PCI: 00:02.2 resource base 0 size 0 align 12 gran 12 limit ffffffff flags 80102 index 1c PCI: 00:02.2 resource base 0 size 0 align 20 gran 20 limit ffffffffffffffff flags 81202 index 24 PCI: 00:02.2 resource base 0 size 0 align 20 gran 20 limit ffffffff flags 80202 index 20 PCI: 01:00.0 PCI: 01:00.0 resource base 0 size 200000 align 21 gran 21 limit ffffffffffffffff flags 201 index 10 PCI: 00:02.3 PCI: 00:02.4 child on link 0 PCI: 02:00.0 PCI: 00:02.4 resource base 0 size 0 align 12 gran 12 limit ffffffff flags 80102 index 1c PCI: 00:02.4 resource base 0 size 0 align 20 gran 20 limit ffffffffffffffff flags 81202 index 24 PCI: 00:02.4 resource base 0 size 0 align 20 gran 20 limit ffffffff flags 80202 index 20 PCI: 02:00.0 PCI: 02:00.0 resource base 0 size 1000 align 12 gran 12 limit ffffffff flags 200 index 10 PCI: 02:00.0 resource base 0 size 800 align 12 gran 11 limit ffffffff flags 200 index 14 PCI: 00:02.5 PCI: 00:03.0 PCI: 00:08.0 PCI: 00:08.0 resource base 0 size 20000 align 17 gran 17 limit ffffffffffffffff flags 1201 index 10 PCI: 00:08.0 resource base 0 size 100000 align 20 gran 20 limit ffffffff flags 200 index 18 PCI: 00:08.0 resource base 0 size 1000 align 12 gran 12 limit ffffffff flags 200 index 1c PCI: 00:08.0 resource base 0 size 100000 align 20 gran 20 limit ffffffff flags 200 index 20 PCI: 00:08.0 resource base 0 size 2000 align 13 gran 13 limit ffffffff flags 200 index 24 PCI: 00:09.0 PCI: 00:09.2 PCI: 00:10.0 PCI: 00:10.0 resource base 0 size 2000 align 13 gran 13 limit ffffffffffffffff flags 201 index 10 PCI: 00:11.0 PCI: 00:12.0 PCI: 00:12.0 resource base 0 size 100 align 12 gran 8 limit ffffffff flags 200 index 10 PCI: 00:14.0 PCI: 00:14.3 child on link 0 PNP: 0c09.0 PCI: 00:14.3 resource base 0 size 1000 align 0 gran 0 limit 0 flags c0040100 index 10000000 PCI: 00:14.3 resource base ff000000 size 1000000 align 0 gran 0 limit 0 flags c0040200 index 10000100 PCI: 00:14.3 resource base fec10000 size 400 align 0 gran 0 limit 0 flags e0040200 index 2 PCI: 00:14.3 resource base fec00000 size 1000 align 0 gran 0 limit 0 flags c0000200 index 3 PCI: 00:14.3 resource base fedc2000 size 4000 align 0 gran 0 limit 0 flags c0000200 index 4 PNP: 0c09.0 PNP: 0c09.0 resource base 800 size 1ff align 0 gran 0 limit 0 flags c0000100 index 0 PCI: 00:14.7 PCI: 00:14.7 resource base 0 size 100 align 12 gran 8 limit ffffffffffffffff flags 201 index 10 PCI: 00:18.0 PCI: 00:18.0 resource base f8000000 size 4000000 align 0 gran 0 limit 0 flags f0000200 index c0010058 PCI: 00:18.0 resource base fec20000 size 1000 align 0 gran 0 limit 0 flags c0000200 index fec20000 PCI: 00:18.1 PCI: 00:18.2 PCI: 00:18.3 PCI: 00:18.4 PCI: 00:18.5 MMIO: fedc2000 child on link 0 GENERIC: 0.0 GENERIC: 0.0 I2C: 01:1a GENERIC: 0.1 MMIO: fedc3000 child on link 0 I2C: 02:50 I2C: 02:50 MMIO: fedc4000 child on link 0 I2C: 03:15 I2C: 03:15 MMIO: fedc5000 child on link 0 I2C: 04:39 I2C: 04:39 I2C: 04:10 DOMAIN: 0000 io: base: 0 size: 0 align: 0 gran: 0 limit: ffff PCI: 00:02.2 io: base: 0 size: 0 align: 12 gran: 12 limit: ffffffff PCI: 00:02.2 io: base: 0 size: 0 align: 12 gran: 12 limit: ffffffff done PCI: 00:02.4 io: base: 0 size: 0 align: 12 gran: 12 limit: ffffffff PCI: 00:02.4 io: base: 0 size: 0 align: 12 gran: 12 limit: ffffffff done PCI: 00:01.0 20 * [0x0 - 0xff] io DOMAIN: 0000 io: base: 100 size: 100 align: 8 gran: 0 limit: ffff done DOMAIN: 0000 mem: base: 0 size: 0 align: 0 gran: 0 limit: ffffffff PCI: 00:02.2 prefmem: base: 0 size: 0 align: 20 gran: 20 limit: ffffffffffffffff PCI: 00:02.2 prefmem: base: 0 size: 0 align: 20 gran: 20 limit: ffffffffffffffff done PCI: 00:02.2 mem: base: 0 size: 0 align: 20 gran: 20 limit: ffffffff PCI: 01:00.0 10 * [0x0 - 0x1fffff] mem PCI: 00:02.2 mem: base: 200000 size: 200000 align: 21 gran: 20 limit: ffffffff done PCI: 00:02.4 prefmem: base: 0 size: 0 align: 20 gran: 20 limit: ffffffffffffffff PCI: 00:02.4 prefmem: base: 0 size: 0 align: 20 gran: 20 limit: ffffffffffffffff done PCI: 00:02.4 mem: base: 0 size: 0 align: 20 gran: 20 limit: ffffffff PCI: 02:00.0 10 * [0x0 - 0xfff] mem PCI: 02:00.0 14 * [0x1000 - 0x17ff] mem PCI: 00:02.4 mem: base: 1800 size: 100000 align: 20 gran: 20 limit: ffffffff done PCI: 00:01.0 10 * [0x0 - 0x3ffffff] prefmem PCI: 00:01.0 18 * [0x4000000 - 0x47fffff] prefmem PCI: 00:02.2 20 * [0x4800000 - 0x49fffff] mem PCI: 00:02.4 20 * [0x4a00000 - 0x4afffff] mem PCI: 00:08.0 18 * [0x4b00000 - 0x4bfffff] mem PCI: 00:08.0 20 * [0x4c00000 - 0x4cfffff] mem PCI: 00:01.0 24 * [0x4d00000 - 0x4d3ffff] mem PCI: 00:01.0 30 * [0x4d40000 - 0x4d5ffff] mem PCI: 00:08.0 10 * [0x4d60000 - 0x4d7ffff] prefmem PCI: 00:01.1 10 * [0x4d80000 - 0x4d83fff] mem PCI: 00:08.0 24 * [0x4d84000 - 0x4d85fff] mem PCI: 00:10.0 10 * [0x4d86000 - 0x4d87fff] mem PCI: 00:08.0 1c * [0x4d88000 - 0x4d88fff] mem PCI: 00:12.0 10 * [0x4d89000 - 0x4d890ff] mem PCI: 00:14.7 10 * [0x4d8a000 - 0x4d8a0ff] mem DOMAIN: 0000 mem: base: 4d8a100 size: 4d8a100 align: 26 gran: 0 limit: ffffffff done avoid_fixed_resources: DOMAIN: 0000 avoid_fixed_resources:@DOMAIN: 0000 10000000 limit 0000ffff avoid_fixed_resources:@DOMAIN: 0000 10000100 limit ffffffff constrain_resources: PCI: 00:14.3 10000000 base 00000000 limit 00000fff io (fixed) constrain_resources: PCI: 00:14.3 10000100 base ff000000 limit ffffffff mem (fixed) constrain_resources: PCI: 00:14.3 02 base fec10000 limit fec103ff mem (fixed) constrain_resources: PCI: 00:14.3 03 base fec00000 limit fec00fff mem (fixed) constrain_resources: PCI: 00:18.0 c0010058 base f8000000 limit fbffffff mem (fixed) avoid_fixed_resources:@DOMAIN: 0000 10000000 base 00001000 limit 0000ffff avoid_fixed_resources:@DOMAIN: 0000 10000100 base f0000000 limit f7ffffff Setting resources... DOMAIN: 0000 io: base:1000 size:100 align:8 gran:0 limit:ffff PCI: 00:01.0 20 * [0x1000 - 0x10ff] io DOMAIN: 0000 io: next_base: 1100 size: 100 align: 8 gran: 0 done PCI: 00:02.2 io: base:ffff size:0 align:12 gran:12 limit:ffff PCI: 00:02.2 io: next_base: ffff size: 0 align: 12 gran: 12 done PCI: 00:02.4 io: base:ffff size:0 align:12 gran:12 limit:ffff PCI: 00:02.4 io: next_base: ffff size: 0 align: 12 gran: 12 done DOMAIN: 0000 mem: base:f0000000 size:4d8a100 align:26 gran:0 limit:f7ffffff PCI: 00:01.0 10 * [0xf0000000 - 0xf3ffffff] prefmem PCI: 00:01.0 18 * [0xf4000000 - 0xf47fffff] prefmem PCI: 00:02.2 20 * [0xf4800000 - 0xf49fffff] mem PCI: 00:02.4 20 * [0xf4a00000 - 0xf4afffff] mem PCI: 00:08.0 18 * [0xf4b00000 - 0xf4bfffff] mem PCI: 00:08.0 20 * [0xf4c00000 - 0xf4cfffff] mem PCI: 00:01.0 24 * [0xf4d00000 - 0xf4d3ffff] mem PCI: 00:01.0 30 * [0xf4d40000 - 0xf4d5ffff] mem PCI: 00:08.0 10 * [0xf4d60000 - 0xf4d7ffff] prefmem PCI: 00:01.1 10 * [0xf4d80000 - 0xf4d83fff] mem PCI: 00:08.0 24 * [0xf4d84000 - 0xf4d85fff] mem PCI: 00:10.0 10 * [0xf4d86000 - 0xf4d87fff] mem PCI: 00:08.0 1c * [0xf4d88000 - 0xf4d88fff] mem PCI: 00:12.0 10 * [0xf4d89000 - 0xf4d890ff] mem PCI: 00:14.7 10 * [0xf4d8a000 - 0xf4d8a0ff] mem DOMAIN: 0000 mem: next_base: f4d8a100 size: 4d8a100 align: 26 gran: 0 done PCI: 00:02.2 prefmem: base:f7ffffff size:0 align:20 gran:20 limit:f7ffffff PCI: 00:02.2 prefmem: next_base: f7ffffff size: 0 align: 20 gran: 20 done PCI: 00:02.2 mem: base:f4800000 size:200000 align:21 gran:20 limit:f49fffff PCI: 01:00.0 10 * [0xf4800000 - 0xf49fffff] mem PCI: 00:02.2 mem: next_base: f4a00000 size: 200000 align: 21 gran: 20 done PCI: 00:02.4 prefmem: base:f7ffffff size:0 align:20 gran:20 limit:f7ffffff PCI: 00:02.4 prefmem: next_base: f7ffffff size: 0 align: 20 gran: 20 done PCI: 00:02.4 mem: base:f4a00000 size:100000 align:20 gran:20 limit:f4afffff PCI: 02:00.0 10 * [0xf4a00000 - 0xf4a00fff] mem PCI: 02:00.0 14 * [0xf4a01000 - 0xf4a017ff] mem PCI: 00:02.4 mem: next_base: f4a01800 size: 100000 align: 20 gran: 20 done Root Device assign_resources, bus 0 link: 0 DOMAIN: 0000 assign_resources, bus 0 link: 0 PCI: 00:01.0 10 <- [0x00f0000000 - 0x00f3ffffff] size 0x04000000 gran 0x1a prefmem64 PCI: 00:01.0 18 <- [0x00f4000000 - 0x00f47fffff] size 0x00800000 gran 0x17 prefmem64 PCI: 00:01.0 20 <- [0x0000001000 - 0x00000010ff] size 0x00000100 gran 0x08 io PCI: 00:01.0 24 <- [0x00f4d00000 - 0x00f4d3ffff] size 0x00040000 gran 0x12 mem PCI: 00:01.0 30 <- [0x00f4d40000 - 0x00f4d5ffff] size 0x00020000 gran 0x11 romem PCI: 00:01.1 10 <- [0x00f4d80000 - 0x00f4d83fff] size 0x00004000 gran 0x0e mem64 PCI: 00:02.2 1c <- [0x000000ffff - 0x000000fffe] size 0x00000000 gran 0x0c bus 01 io PCI: 00:02.2 24 <- [0x00f7ffffff - 0x00f7fffffe] size 0x00000000 gran 0x14 bus 01 prefmem PCI: 00:02.2 20 <- [0x00f4800000 - 0x00f49fffff] size 0x00200000 gran 0x14 bus 01 mem PCI: 00:02.2 assign_resources, bus 1 link: 0 PCI: 01:00.0 10 <- [0x00f4800000 - 0x00f49fffff] size 0x00200000 gran 0x15 mem64 PCI: 00:02.2 assign_resources, bus 1 link: 0 PCI: 00:02.4 1c <- [0x000000ffff - 0x000000fffe] size 0x00000000 gran 0x0c bus 02 io PCI: 00:02.4 24 <- [0x00f7ffffff - 0x00f7fffffe] size 0x00000000 gran 0x14 bus 02 prefmem PCI: 00:02.4 20 <- [0x00f4a00000 - 0x00f4afffff] size 0x00100000 gran 0x14 bus 02 mem PCI: 00:02.4 assign_resources, bus 2 link: 0 PCI: 02:00.0 10 <- [0x00f4a00000 - 0x00f4a00fff] size 0x00001000 gran 0x0c mem PCI: 02:00.0 14 <- [0x00f4a01000 - 0x00f4a017ff] size 0x00000800 gran 0x0b mem PCI: 00:02.4 assign_resources, bus 2 link: 0 PCI: 00:08.0 10 <- [0x00f4d60000 - 0x00f4d7ffff] size 0x00020000 gran 0x11 prefmem64 PCI: 00:08.0 18 <- [0x00f4b00000 - 0x00f4bfffff] size 0x00100000 gran 0x14 mem PCI: 00:08.0 1c <- [0x00f4d88000 - 0x00f4d88fff] size 0x00001000 gran 0x0c mem PCI: 00:08.0 20 <- [0x00f4c00000 - 0x00f4cfffff] size 0x00100000 gran 0x14 mem PCI: 00:08.0 24 <- [0x00f4d84000 - 0x00f4d85fff] size 0x00002000 gran 0x0d mem PCI: 00:10.0 10 <- [0x00f4d86000 - 0x00f4d87fff] size 0x00002000 gran 0x0d mem64 PCI: 00:12.0 10 <- [0x00f4d89000 - 0x00f4d890ff] size 0x00000100 gran 0x08 mem PCI: 00:14.3 assign_resources, bus 0 link: 0 PCI: 00:14.3 assign_resources, bus 0 link: 0 PCI: 00:14.7 10 <- [0x00f4d8a000 - 0x00f4d8a0ff] size 0x00000100 gran 0x08 mem64 DOMAIN: 0000 assign_resources, bus 0 link: 0 Root Device assign_resources, bus 0 link: 0 Done setting resources. Show resources in subtree (Root Device)...After assigning values. Root Device child on link 0 CPU_CLUSTER: 0 CPU_CLUSTER: 0 child on link 0 APIC: 10 APIC: 10 DOMAIN: 0000 child on link 0 PCI: 00:00.0 DOMAIN: 0000 resource base 1000 size 100 align 8 gran 0 limit ffff flags 40040100 index 10000000 DOMAIN: 0000 resource base f0000000 size 4d8a100 align 26 gran 0 limit f7ffffff flags 40040200 index 10000100 DOMAIN: 0000 resource base 0 size a0000 align 0 gran 0 limit 0 flags e0004200 index 10 DOMAIN: 0000 resource base a0000 size 20000 align 0 gran 0 limit 0 flags f0000200 index 11 DOMAIN: 0000 resource base c0000 size 40000 align 0 gran 0 limit 0 flags f0004200 index 12 DOMAIN: 0000 resource base 100000 size cdf00000 align 0 gran 0 limit 0 flags e0004200 index 13 DOMAIN: 0000 resource base ce000000 size 2000000 align 0 gran 0 limit 0 flags f0004200 index 14 DOMAIN: 0000 resource base 100000000 size 2f000000 align 0 gran 0 limit 0 flags e0004200 index 15 PCI: 00:00.0 PCI: 00:00.2 PCI: 00:01.0 PCI: 00:01.0 resource base f0000000 size 4000000 align 26 gran 26 limit f3ffffff flags 60001201 index 10 PCI: 00:01.0 resource base f4000000 size 800000 align 23 gran 23 limit f47fffff flags 60001201 index 18 PCI: 00:01.0 resource base 1000 size 100 align 8 gran 8 limit 10ff flags 60000100 index 20 PCI: 00:01.0 resource base f4d00000 size 40000 align 18 gran 18 limit f4d3ffff flags 60000200 index 24 PCI: 00:01.0 resource base f4d40000 size 20000 align 17 gran 17 limit f4d5ffff flags 60002200 index 30 PCI: 00:01.1 PCI: 00:01.1 resource base f4d80000 size 4000 al02.0 PCI: 00:02.1 PCI: 00:02.2 child on link 0 PCI: 01:00.0 PCI: 00:02.2 resource base ffff size 0 align 12 gran 12 limit ffff flags 60080102 index 1c PCI: 00:02.2 resource base f7ffffff size 0 align 20 gran 20 limit f7ffffff flags 60081202 index 24 PCI: 00:02.2 resource base f4800000 size 200000 align 21 gran 20 limit f49fffff flags 60080202 index 20 PCI: 01:00.0 PCI: 01:00.0 resource base f4800000 size 200000 align 21 gran 21 limit f49fffff flags 60000201 index 10 PCI: 00:02.3 PCI: 00:02.4 child on link 0 PCI: 02:00.0 PCI: 00:02.4 resource base ffff size 0 align 12 gran 12 limit ffff flags 60080102 index 1c PCI: 00:02.4 resource base f7ffffff size 0 align 20 gran 20 limit f7ffffff flags 60081202 index 24 PCI: 00:02.4 resource base f4a00000 size 100000 align 20 gran 20 limit f4afffff flags 60080202 index 20 PCI: 02:00.0 PCI: 02:00.0 resource base f4a00000 size 1000 align 12 gran 12 limit f4a00fff flags 60000200 index 10 PCI: 02:00.0 resource base f4a01000 size 800 align 12 gran 11 limit f4a017ff flags 60000dex 14 PCI: 00:02.5 PCI: 00:03.0 PCI: 00:08.0 PCI: 00:08.0 resource base f4d60000 size 20000 align 17 gran 17 limit f4d7ffff flags 60001201 index 10 PCI: 00:08.0 resource base f4b00000 size 100000 align 20 gran 20 limit f4bfffff flags 60000200 index 18 PCI: 00:08.0 resource base f4d88000 size 1000 align 12 gran 12 limit f4d88fff flags 60000200 index 1c PCI: 00:08.0 resource base f4c00000 size 100000 align 20 gran 20 limit f4cfffff flags 60000200 index 20 PCI: 00:08.0 resource base f4d84000 size 2000 align 13 gran 13 limit f4d85fff flags 60000200 index 24 PCI: 00:09.0 PCI: 00:09.2 PCI: 00:10.0 PCI: 00:10.0 resource base f4d86000 size 2000 align 13 gran 13 limit f4d87fff flags 60000201 index 10 PCI: 00:11.0 PCI: 00:12.0 PCI: 00:12.0 resource base f4d89000 size 100 align 12 gran 8 limit f4d890ff flags 60000200 index 10 PCI: 00:14.0 PCI: 00:14.3 child on link 0 PNP: 0c09.0 PCI: 00:14.3 resource base 0 size 1000 align 0 gran 0 limit 0 flags c0040100 index 10000000 PCI: 00:14.3 resource base ff000000 size 1000000 align 0 gran 0 limit 0 flags c0040200 index 10000100 PCI: 00:14.3 resource base fec10000 size 400 align 0 gran 0 limit 0 flags e0040200 index 2 PCI: 00:14.3 resource base fec00000 size 1000 align 0 gran 0 limit 0 flags c0000200 index 3 PCI: 00:14.3 resource base fedc2000 size 4000 align 0 gran 0 limit 0 flags c0000200 index 4 PNP: 0c09.0 PNP: 0c09.0 resource base 800 size 1ff align 0 gran 0 limit 0 flags c0000100 index 0 PCI: 00:14.7 PCI: 00:14.7 resource base f4d8a000 size 100 align 12 gran 8 limit f4d8a0ff flags 60000201 index 10 PCI: 00:18.0 PCI: 00:18.0 resource base f8000000 size 4000000 align 0 gran 0 limit 0 flags f0000200 index c0010058 PCI: 00:18.0 resource base fec20000 size 1000 align 0 gran 0 limit 0 flags c0000200 index fec20000 PCI: 00:18.1 PCI: 00:18.2 PCI: 00:18.3 PCI: 00:18.4 PCI: 00:18.5 MMIO: fedc2000 child on link 0 GENERIC: 0.0 GENERIC: 0.0 I2C: 01:1a GENERIC: 0.1 MMIO: fedc3000 child on link 0 I2C: 02:50 I2C: 02:50 MMIO: fedc4000 child on link 0 I2C: 03:15 I2C: 03:15 MMIO: fedc5000 child on link 0 I2C: 04:39 I2C: 04:39 I2C: 04:10 Done allocating resources. BS: BS_DEV_RESOURCES times (us): entry 0 run 1563781 exit 0 PCI_INTR tables: Writing registers C00/C01 for PCI IRQ routing: PCI_INTR_INDEX name PIC mode APIC mode 0x00 INTA# 0x03 0x10 0x01 INTB# 0x04 0x11 0x02 INTC# 0x05 0x12 0x03 INTD# 0x07 0x13 0x04 INTE# 0x0B 0x14 0x05 INTF# 0x1F 0x1F 0x06 INTG# 0x1F 0x16 0x07 INTH# 0x1F 0x17 0x08 Misc 0xFA 0x00 0x09 Misc0 0xF1 0x00 0x0A Misc1 0x00 0x00 0x0B Misc2 0x00 0x00 0x0C Ser IRQ INTA 0x1F 0x1F 0x0D Ser IRQ INTB 0x1F 0x1F 0x0E Ser IRQ INTC 0x1F 0x1F 0x0F Ser IRQ INTD 0x1F 0x1F 0x10 SCI 0x09 0x09 0x11 SMBUS 0x1F 0x1F 0x12 ASF 0x1F 0x1F 0x13 HDA 0x03 0x10 0x14 FC 0x1F 0x1F 0x16 PerMon 0x1F 0x1F 0x17 SD 0x03 0x10 0x1A SDIOt 0x00 0x1F 0x30 EHCI 0x05 0x12 0x34 XHCI 0x04 0x12 0x41 SATA 0x07 0x13 0x62 GPIO 0x07 0x07 0x70 I2C0 0x03 0x03 0x71 I2C1 0x0F 0x0F 0x72 I2C2 0x06 0x06 0x73 I2C3 0x0E 0x0E 0x74 UART0 0x0A 0x0A 0x75 UART1 0x0B 0x0B PCI_CFG IRQ: Write PCI config space IRQ assignments PCI IRQ: Found device 0:01.00 using PIN A PCI Devfn (0x8) not found in pirq_data table PCI IRQ: Found device 0:01.01 using PIN B Found this device in pirq_data table entry 5 Orig INT_PIN : 2 (PIN B) PCI_INTR idx : 0x13 (HDA) INT_LINE : 0x3 (IRQ 3) PCI IRQ: Found device 0:02.02 using PIN A Found this device in pirq_data table entry 1 Orig INT_PIN : 1 (PIN A) PCI_INTR idx : 0x01 (INTB#) INT_LINE : 0x4 (IRQ 4) PCI IRQ: Found device 0:02.04 using PIN A Found this device in pirq_data table entry 3 Orig INT_PIN : 1 (PIN A) PCI_INTR idx : 0x03 (INTD#) INT_LINE : 0x7 (IRQ 7) PCI IRQ: Found device 0:08.00 using PIN A PCI Devfn (0x40) not found in pirq_data table PCI IRQ: Found device 0:10.00 using PIN A Found this device in pirq_data table entry 10 Orig INT_PIN : 1 (PIN A) PCI_INTR idx : 0x34 (XHCI) INT_LINE : 0x4 (IRQ 4) PCI IRQ: Found device 0:12.00 using PIN A Found this device in pirq_data table entry 9 Orig INT_PIN : 1 (PIN A) PCI_INTR idx : 0x30 (EHCI) INT_LINE : 0x5 (IRQ 5) PCI IRQ: Found device 0:14.07 using PIN A Found this device in pirq_data table entry 6 Orig INT_PIN : 1 (PIN A) PCI_INTR idx : 0x17 (SD) INT_LINE : 0x3 (IRQ 3) PCI IRQ: Found device 2:00.00 using PIN A With INT_PIN swizzled to PIN A Attached to bridge device 0:02h.04h Found this device in pirq_data table entry 3 Orig INT_PIN : 1 (PIN A) PCI_INTR idx : 0x03 (INTD#) INT_LINE : 0x7 (IRQ 7) PCI IRQ: Found device 1:00.00 using PIN A With INT_PIN swizzled to PIN A Attached to bridge device 0:02h.02h Found this device in pirq_data table entry 1 Orig INT_PIN : 1 (PIN A) PCI_INTR idx : 0x01 (INTB#) INT_LINE : 0x4 (IRQ 4) PCI_CFG IRQ: Finished writing PCI config space IRQ assignments POST: 0x74 Enabling resources... agesawrapper_amdinitmid() entry agesawrapper_amdinitmid() returned AGESA_SUCCESS PCI: 00:00.0 subsystem <- 1022/1576 PCI: 00:00.0 cmd <- 04 PCI: 00:01.0 subsystem <- 1002/98e4 PCI: 00:01.0 cmd <- 07 PCI: 00:01.1 subsystem <- 1002/15b3 PCI: 00:01.1 cmd <- 02 PCI: 00:02.0 subsystem <- 1022/157b PCI: 00:02.0 cmd <- 00 PCI: 00:02.2 bridge ctrl <- 0003 PCI: 00:02.2 cmd <- 06 PCI: 00:02.4 bridge ctrl <- 0003 PCI: 00:02.4 cmd <- 06 PCI: 00:03.0 cmd <- 00 PCI: 00:08.0 subsystem <- 1022/1578 PCI: 00:08.0 cmd <- 06 PCI: 00:09.0 subsystem <- 1022/157d PCI: 00:09.0 cmd <- 00 PCI: 00:10.0 subsystem <- 1022/7914 PCI: 00:10.0 cmd <- 02 PCI: 00:12.0 subsystem <- 1022/7908 PCI: 00:12.0 cmd <- 02 PCI: 00:14.0 subsystem <- 1022/790b PCI: 00:14.0 cmd <- 403 PCI: 00:14.3 subsystem <- 1022/790e PCI: 00:14.3 cmd <- 0f Southbridge LPC decode:PNP: 0c09.0, base=0x00000800, end=0x000009fe Covered by wideIO 0 PCI: 00:14.7 subsystem <- 1022/7906 PCI: 00:14.7 cmd <- 06 PCI: 00:18.0 cmd <- 00 PCI: 00:18.1 subsystem <- 1022/15b1 PCI: 00:18.1 cmd <- 00 PCI: 00:18.2 subsystem <- 1022/15b2 PCI: 00:18.2 cmd <- 00 PCI: 00:18.3 subsystem <- 1022/15b3 PCI: 00:18.3 cmd <- 00 PCI: 00:18.4 subsystem <- 1022/15b4 PCI: 00:18.4 cmd <- 00 PCI: 00:18.5 subsystem <- 1022/15b5 PCI: 00:18.5 cmd <- 00 PCI: 01:00.0 cmd <- 02 PCI: 02:00.0 subsystem <- 1217/8620 PCI: 02:00.0 cmd <- 06 done. BS: BS_DEV_ENABLE times (us): entry 279595 run 130648 exit 0 POST: 0x75 Initializing devices... Root Device init ... Root Device init finished in 1950 usecs POST: 0x75 CPU_CLUSTER: 0 init ... MTRR: Physical address space: 0x0000000000000000 - 0x00000000000a0000 size 0x000a0000 type 6 0x00000000000a0000 - 0x00000000000c0000 size 0x00020000 type 0 0x00000000000c0000 - 0x00000000d0000000 size 0xcff40000 type 6 0x00000000d0000000 - 0x00000000f0000000 size 0x20000000 type 0 0x00000000f0000000 - 0x00000000f4800000 size 0x04800000 type 1 0x00000000f4800000 - 0x0000000100000000 size 0x0b800000 type 0 0x0000000100000000 - 0x000000012f000000 size 0x2f000000 type 6 MTRR: Fixed MSR 0x250 0x1e1e1e1e1e1e1e1e MTRR: Fixed MSR 0x258 0x1e1e1e1e1e1e1e1e MTRR: Fixed MSR 0x259 0x0000000000000000 MTRR: Fixed MSR 0x268 0x1e1e1e1e1e1e1e1e MTRR: Fixed MSR 0x269 0x1e1e1e1e1e1e1e1e MTRR: Fixed MSR 0x26a 0x1e1e1e1e1e1e1e1e MTRR: Fixed MSR 0x26b 0x1e1e1e1e1e1e1e1e MTRR: Fixed MSR 0x26c 0x1e1e1e1e1e1e1e1e MTRR: Fixed MSR 0x26d 0x1e1e1e1e1e1e1e1e MTRR: Fixed MSR 0x26e 0x1e1e1e1e1e1e1e1e MTRR: Fixed MSR 0x26f 0x1e1e1e1e1e1e1e1e call enable_fixed_mtrr() CPU physical address size: 48 bits MTRR: default type WB/UC MTRR counts: 8/6. MTRR: UC selected as default type. MTRR: 0 base 0x0000000000000000 mask 0x0000ffff80000000 type 6 MTRR: 1 base 0x0000000080000000 mask 0x0000ffffc0000000 type 6 MTRR: 2 base 0x00000000c0000000 mask 0x0000fffff0000000 type 6 MTRR: 3 base 0x00000000f0000000 mask 0x0000fffffc000000 type 1 MTRR: 4 base 0x00000000f4000000 mask 0x0000ffffff800000 type 1 MTRR: 5 base 0x0000000100000000 mask 0x0000ffffc0000000 type 6 MTRR check Fixed MTRRs : Enabled Variable MTRRs: Enabled POST: 0x93 Will perform SMM setup. CPU: AMD A4-9120C RADEON R4, 5 COMPUTE CORES 2C+3G . Loading module at 00030000 with entry 00030000. filesize: 0x170 memsize: 0x170 Processing 16 relocs. Offset value of 0x00030000 Attempting to start 1 APs Waiting for 10ms after sending INIT. Waiting for 1st SIPI to complete...AP: slot 1 apic_id 11. done. Waiting for 2nd SIPI to complete...done. Loading module at 00038000 with entry 00038000. filesize: 0x1a8 memsize: 0x1a8 Processing 13 relocs. Offset value of 0x00038000 SMM Module: stub loaded at 00038000. Will call cdeb995b(00000000) Installing SMM handler to 0xce800000 Loading module at ce810000 with entry ce81142b. filesize: 0x6c98 memsize: 0xad18 Processing 481 relocs. Offset value of 0xce810000 Loading module at ce808000 with entry ce808000. filesize: 0x1a8 memsize: 0x1a8 Processing 13 relocs. Offset value of 0xce808000 SMM Module: placing jmp sequence at ce807e00 rel16 0x01fd SMM Module: stub loaded at ce808000. Will call ce81142b(00000000) New SMBASE 0xce800000 Relocation complete. New SMBASE 0xce7ffe00 Relocation complete. Initializing CPU #0 CPU: vendor AMD device 670f00 CPU: family 15, model 70, stepping 00 Setting up local APIC... apic_id: 0x10 done. CPU #0 initialized Initializing CPU #1 CPU: vendor AMD device 670f00 CPU: family 15, model 70, stepping 00 Setting up local APIC... apic_id: 0x11 done. CPU #1 initialized bsp_do_flight_plan done after 91 msecs. MTRR: TEMPORARY Physical address space: 0x0000000000000000 - 0x00000000000a0000 size 0x000a0000 type 6 0x00000000000a0000 - 0x00000000000c0000 size 0x00020000 type 0 0x00000000000c0000 - 0x00000000d0000000 size 0xcff40000 type 6 0x00000000d0000000 - 0x00000000ff000000 size 0x2f000000 type 0 0x00000000ff000000 - 0x0000000100000000 size 0x01000000 type 5 0x0000000100000000 - 0x000000012f000000 size 0x2f000000 type 6 MTRR: default type WB/UC MTRR counts: 7/5. MTRR: UC selected as default type. MTRR: 0 base 0x0000000000000000 mask 0x0000ffff80000000 type 6 MTRR: 1 base 0x0000000080000000 mask 0x0000ffffc0000000 type 6 MTRR: 2 base 0x00000000c0000000 mask 0x0000fffff0000000 type 6 MTRR: 3 base 0x00000000ff000000 mask 0x0000ffffff000000 type 5 MTRR: 4 base 0x0000000100000000 mask 0x0000ffffc0000000 type 6 CPU_CLUSTER: 0 init finished in 346135 usecs POST: 0x75 POST: 0x75 POST: 0x75 POST: 0x75 POST: 0x75 POST: 0x75 POST: 0x75 POST: 0x75 PCI: 00:00.0 init ... PCI: 00:00.0 init finished in 2003 usecs POST: 0x75 POST: 0x75 PCI: 00:01.0 init ... CBFS: 'Master Header Locator' located CBFS at [df0000:ffffc0) CBFS: Locating 'pci1002,98e4.rom' CBFS: Found @ offset 92c00 size fe00 Mapping PCI device 100298e4 to 100298e0 In CBFS, ROM address for PCI: 00:01.0 = ffe82c48 PCI expansion ROM, signature 0xaa55, INIT size 0xfe00, data ptr 0x01c0 PCI ROM image, vendor ID 1002, device ID 98e0, PCI ROM image, Class Code 030000, Code Type 00 Copying VGA ROM Image from ffe82c48 to 0xc0000, 0xfe00 bytes Real mode stub @00000600: 867 bytes Calling Option ROM... ... Option ROM returned. VBE: Getting information about VESA mode 41d2 VBE: resolution: 1366x768@16 VBE: framebuffer: f0000000 VBE: Setting VESA mode 41d2 VGA Option ROM was run PCI: 00:01.0 init finished in 112224 usecs POST: 0x75 PCI: 00:01.1 init ... PCI: 00:01.1 init finished in 2002 usecs POST: 0x75 PCI: 00:02.0 init ... PCI: 00:02.0 init finished in 2002 usecs POST: 0x75 POST: 0x75 POST: 0x75 POST: 0x75 POST: 0x75 POST: 0x75 PCI: 00:03.0 init ... PCI: 00:03.0 init finished in 2002 usecs POST: 0x75 PCI: 00:08.0 init ... PCI: 00:08.0 init finished in 2002 usecs POST: 0x75 PCI: 00:09.0 init ... PCI: 00:09.0 init finished in 2002 usecs POST: 0x75 POST: 0x75 PCI: 00:10.0 init ... PCI: 00:10.0 init finished in 2002 usecs POST: 0x75 POST: 0x75 PCI: 00:12.0 init ... PCI: 00:12.0 init finished in 2002 usecs POST: 0x75 PCI: 00:14.0 init ... IOAPIC: Initializing IOAPIC at 0xfec00000 IOAPIC: Bootstrap Processor Local APIC = 0x10 IOAPIC: ID = 0x04 IOAPIC: Dumping registers reg 0x0000: 0x04000000 reg 0x0001: 0x00178021 reg 0x0002: 0x04000000 IOAPIC: 24 interrupts IOAPIC: Enabling interrupts on FSB IOAPIC: reg 0x00000000 value 0x10000000 0x00000700 IOAPIC: reg 0x00000001 value 0x00000000 0x00010000 IOAPIC: reg 0x00000002 value 0x00000000 0x00010000 IOAPIC: reg 0x00000003 value 0x00000000 0x00010000 IOAPIC: reg 0x00000004 value 0x00000000 0x00010000 IOAPIC: reg 0x00000005 value 0x00000000 0x00010000 IOAPIC: reg 0x00000006 value 0x00000000 0x00010000 IOAPIC: reg 0x00000007 value 0x00000000 0x00010000 IOAPIC: reg 0x00000008 value 0x00000000 0x00010000 IOAPIC: reg 0x00000009 value 0x00000000 0x00010000 IOAPIC: reg 0x0000000a value 0x00000000 0x00010000 IOAPIC: reg 0x0000000b value 0x00000000 0x00010000 IOAPIC: reg 0x0000000c value 0x00000000 0x00010000 IOAPIC: reg 0x0000000d value 0x00000000 0x00010000 IOAPIC: reg 0x0000000e value 0x00000000 0x00010000 IOAPIC: reg 0x0000000f value 0x00000000 0x00010000 IOAPIC: reg 0x00000010 value 0x00000000 0x00010000 IOAPIC: reg 0x00000011 value 0x00000000 0x00010000 IOAPIC: reg 0x00000012 value 0x00000000 0x00010000 IOAPIC: reg 0x00000013 value 0x00000000 0x00010000 IOAPIC: reg 0x00000014 value 0x00000000 0x00010000 IOAPIC: reg 0x00000015 value 0x00000000 0x00010000 IOAPIC: reg 0x00000016 value 0x00000000 0x00010000 IOAPIC: reg 0x00000017 value 0x00000000 0x00010000 PCI: 00:14.0 init finished in 133953 usecs POST: 0x75 PCI: 00:14.3 init ... RTC Init PCI: 00:14.3 init finished in 2962 usecs POST: 0x75 PCI: 00:14.7 init ... PCI: 00:14.7 init finished in 2002 usecs POST: 0x75 PCI: 00:18.0 init ... IOAPIC: Initializing IOAPIC at 0xfec20000 IOAPIC: Bootstrap Processor Local APIC = 0x10 IOAPIC: ID = 0x05 IOAPIC: Dumping registers reg 0x0000: 0x05000000 reg 0x0001: 0x001f8021 reg 0x0002: 0x00000000 IOAPIC: 32 interrupts IOAPIC: Enabling interrupts on FSB IOAPIC: reg 0x00000000 value 0x10000000 0x00000700 IOAPIC: reg 0x00000001 value 0x00000000 0x00010000 IOAPIC: reg 0x00000002 value 0x00000000 0x00010000 IOAPIC: reg 0x00000003 value 0x00000000 0x00010000 IOAPIC: reg 0x00000004 value 0x00000000 0x00010000 IOAPIC: reg 0x00000005 value 0x00000000 0x00010000 IOAPIC: reg 0x00000006 value 0x00000000 0x00010000 IOAPIC: reg 0x00000007 value 0x00000000 0x00010000 IOAPIC: reg 0x00000008 value 0x00000000 0x00010000 IOAPIC: reg 0x00000009 value 0x00000000 0x00010000 IOAPIC: reg 0x0000000a value 0x00000000 0x00010000 IOAPIC: reg 0x0000000b value 0x00000000 0x00010000 IOAPIC: reg 0x0000000c value 0x00000000 0x00010000 IOAPIC: reg 0x0000000d value 0x00000000 0x00010000 IOAPIC: reg 0x0000000e value 0x00000000 0x00010000 IOAPIC: reg 0x0000000f value 0x00000000 0x00010000 IOAPIC: reg 0x00000010 value 0x00000000 0x00010000 IOAPIC: reg 0x00000011 value 0x00000000 0x00010000 IOAPIC: reg 0x00000012 value 0x00000000 0x00010000 IOAPIC: reg 0x00000013 value 0x00000000 0x00010000 IOAPIC: reg 0x00000014 value 0x00000000 0x00010000 IOAPIC: reg 0x00000015 value 0x00000000 0x00010000 IOAPIC: reg 0x00000016 value 0x00000000 0x00010000 IOAPIC: reg 0x00000017 value 0x00000000 0x00010000 IOAPIC: reg 0x00000018 value 0x00000000 0x00010000 IOAPIC: reg 0x00000019 value 0x00000000 0x00010000 IOAPIC: reg 0x0000001a value 0x00000000 0x00010000 IOAPIC: reg 0x0000001b value 0x00000000 0x00010000 IOAPIC: reg 0x0000001c value 0x00000000 0x00010000 IOAPIC: reg 0x0000001d value 0x00000000 0x00010000 IOAPIC: reg 0x0000001e value 0x00000000 0x00010000 IOAPIC: reg 0x0000001f value 0x00000000 0x00010000 PCI: 00:18.0 init finished in 170067 usecs POST: 0x75 PCI: 00:18.1 init ... PCI: 00:18.1 init finished in 2002 usecs POST: 0x75 PCI: 00:18.2 init ... PCI: 00:18.2 init finished in 2002 usecs POST: 0x75 PCI: 00:18.3 init ... PCI: 00:18.3 init finished in 2002 usecs POST: 0x75 PCI: 00:18.4 init ... PCI: 00:18.4 init finished in 2002 usecs POST: 0x75 PCI: 00:18.5 init ... PCI: 00:18.5 init finished in 2002 usecs POST: 0x75 PCI: 01:00.0 init ... PCI: 01:00.0 init finished in 2002 usecs POST: 0x75 PCI: 02:00.0 init ... BayHub BH720: Power-saving enabled (link_ctrl=0x110103) PCI: 02:00.0 init finished in 7127 usecs POST: 0x75 PNP: 0c09.0 init ... Google Chrome EC: Hello got back 11223344 status (0) Google Chrome EC: version: ro: careena_v2.0.11488-7215d6e0e4 rw: careena_v2.0.11488-7215d6e0e4 running image: 1 Google Chrome EC uptime: 5.688 seconds Google Chrome AP resets since EC boot: 0 Google Chrome most recent AP reset causes: Google Chrome EC reset flags at last EC boot: reset-pin PNP: 0c09.0 init finished in 34464 usecs POST: 0x75 POST: 0x75 POST: 0x75 POST: 0x75 POST: 0x75 POST: 0x75 POST: 0x75 Devices initialized Show all devs... After init. Root Device: enabled 1 CPU_CLUSTER: 0: enabled 1 DOMAIN: 0000: enabled 1 MMIO: fedc2000: enabled 1 MMIO: fedc3000: enabled 1 MMIO: fedc4000: enabled 1 MMIO: fedc5000: enabled 1 APIC: 10: enabled 1 PCI: 00:00.0: enabled 1 PCI: 00:00.2: enabled 0 PCI: 00:01.0: enabled 1 PCI: 00:01.1: enabled 1 PCI: 00:02.0: enabled 1 PCI: 00:02.1: enabled 0 PCI: 00:02.2: enabled 1 PCI: 00:02.3: enabled 0 PCI: 00:02.4: enabled 1 PCI: 00:02.5: enabled 0 PCI: 00:08.0: enabled 1 PCI: 00:09.0: enabled 1 PCI: 00:09.2: enabled 0 PCI: 00:10.0: enabled 1 PCI: 00:11.0: enabled 0 PCI: 00:12.0: enabled 1 PCI: 00:14.0: enabled 1 PCI: 00:14.3: enabled 1 PCI: 00:14.7: enabled 1 PCI: 00:18.0: enabled 1 PCI: 00:18.1: enabled 1 PCI: 00:18.2: enabled 1 PCI: 00:18.3: enabled 1 PCI: 00:18.4: enabled 1 PCI: 00:18.5: enabled 1 GENERIC: 0.0: enabled 1 I2C: 01:1a: enabled 1 GENERIC: 0.1: enabled 1 I2C: 02:50: enabled 1 I2C: 03:15: enabled 1 I2C: 04:39: enabled 1 I2C: 04:10: enabled 1 PCI: 02:00.0: enabled 1 PNP: 0c09.0: enabled 1 PCI: 00:03.0: enabled 1 PCI: 01:00.0: enabled 1 APIC: 11: enabled 1 BS: BS_DEV_INIT times (us): entry 0 run 1076442 exit 150 ELOG: Event(A1) added with size 10 at 2023-03-12 08:10:50 UTC elog_add_boot_reason: Logged recovery mode boot (Dev-switch on), reason: 0x1b ELOG: Event(A0) added with size 9 at 2023-03-12 08:10:50 UTC elog_add_boot_reason: Logged dev mode boot POST: 0x76 Finalize devices... Devices finalized FMAP: area RW_NVRAM found @ 467000 (20480 bytes) agesawrapper_amdinitlate() entry DmiTable:cdfbd4a3, AcpiPstatein: cdfbc2b9, AcpiSrat:00000000,AcpiSlit:00000000, Mce:cdfbd327, Cmc:cdfbd3e9,Alib:cdfbe586, AcpiIvrs:00000000 in agesawrapper_amdinitlate agesawrapper_amdinitlate() returned AGESA_SUCCESS agesawrapper_amdinitrtb() entry agesawrapper_amdinitrtb() returned AGESA_SUCCESS BS: BS_POST_DEVICE times (us): entry 22167 run 4547 exit 37849 FMAP: area RW_MRC_CACHE found @ 0 (65536 bytes) MRC: Checking cached data update for 'RW_MRC_CACHE'. MRC: cache data 'RW_MRC_CACHE' needs update. ELOG: Event(AA) added with size 11 at 2023-03-12 08:10:50 UTC POST: 0x77 BS: BS_OS_RESUME_CHECK times (us): entry 29626 run 1072 exit 0 POST: 0x79 POST: 0x9c CBFS: 'Master Header Locator' located CBFS at [df0000:ffffc0) CBFS: Locating 'fallback/dsdt.aml' CBFS: Found @ offset a6cc0 size 3b94 CBFS: 'Master Header Locator' located CBFS at [df0000:ffffc0) CBFS: Locating 'fallback/slic' CBFS: 'fallback/slic' not found. ACPI: Writing ACPI tables at cde2e000. ACPI: * FACS ACPI: * DSDT Ramoops buffer: 0x100000@0xcdd2e000. ACPI: * FADT pm_base: 0x0400 ACPI: added table 1/32, length now 40 ACPI: * SSDT ACPI \_PR report 2 core(s) dw_i2c: bad counts. hcnt = -1 lcnt = 9 dw_i2c: bad counts. hcnt = -1 lcnt = 13 dw_i2c: bad counts. hcnt = -13 lcnt = 11 dw_i2c: bad counts. hcnt = -7 lcnt = 16 CBFS: 'Master Header Locator' located CBFS at [df0000:ffffc0) CBFS: Locating 'pci1002,98e4.rom' CBFS: Found @ offset 92c00 size fe00 Mapping PCI device 100298e4 to 100298e0 In CBFS, ROM address for PCI: 00:01.0 = ffe82c48 PCI expansion ROM, signature 0xaa55, INIT size 0xfe00, data ptr 0x01c0 PCI ROM image, vendor ID 1002, device ID 98e0, PCI ROM image, Class Code 030000, Code Type 00 \_SB.I2CA.ADAU: Analog Digital DMIC \_SB.I2CA.DLG7: Dialog Semiconductor DA7219 Audio Codec address 01ah irq 0 \_SB.I2CA.MAXM: Maxim Integrated 98357A Amplifier \_SB.I2CB.TPMI: I2C TPM at I2C: 02:50 \_SB.I2CC.D015: ELAN Touchpad at I2C: 03:15 \_SB.I2CD.D039: Raydium Touchscreen at I2C: 04:39 \_SB.I2CD.D010: ELAN Touchscreen at I2C: 04:10 ACPI: added table 2/32, length now 44 ACPI: * MCFG ACPI: added table 3/32, length now 48 ACPI: * TCPA TCPA log created at cdd0e000 ACPI: added table 4/32, length now 52 ACPI: * MADT ACPI: added table 5/32, length now 56 current = cde32e10 CBFS: 'Master Header Locator' located CBFS at [df0000:ffffc0) CBFS: Locating 'pci1002,98e4.rom' CBFS: Found @ offset 92c00 size fe00 Mapping PCI device 100298e4 to 100298e0 In CBFS, ROM address for PCI: 00:01.0 = ffe82c48 PCI expansion ROM, signature 0xaa55, INIT size 0xfe00, data ptr 0x01c0 PCI ROM image, vendor ID 1002, device ID 98e0, PCI ROM image, Class Code 030000, Code Type 00 ACPI: * VFCT at cde32e10 Copying initialized VBIOS image from 000c0000 ACPI: added table 6/32, length now 60 ACPI: * HPET ACPI: added table 7/32, length now 64 ACPI: added table 8/32, length now 68 ACPI: * IVRS at cde42e90 AGESA IVRS table NULL. Skipping. ACPI: * SRAT at cde42e90 AGESA SRAT table NULL. Skipping. ACPI: * SLIT at cde42e90 AGESA SLIT table NULL. Skipping. ACPI: * AGESA ALIB SSDT at cde42e90 ACPI: added table 9/32, length now 72 ACPI: * SSDT at cde479f0 ACPI: added table 10/32, length now 76 ACPI: * SSDT for PState at cde47e2c ACPI: done. ACPI tables: 106032 bytes. smbios_write_tables: cdd0d000 Create SMBIOS type 17 SMBIOS tables: 539 bytes. Writing table forward entry at 0x00000500 Wrote coreboot table at: 00000500, 0x10 bytes, checksum 11f9 Writing coreboot table at 0xcde52000 0. 0000000000000000-0000000000000fff: CONFIGURATION TABLES 1. 0000000000001000-000000000009ffff: RAM 2. 00000000000a0000-00000000000fffff: RESERVED 3. 0000000000100000-00000000cdd0cfff: RAM 4. 00000000cdd0d000-00000000cde9efff: CONFIGURATION TABLES 5. 00000000cde9f000-00000000cdfa0fff: RAMSTAGE 6. 00000000cdfa1000-00000000cdffffff: CONFIGURATION TABLES 7. 00000000ce000000-00000000cfffffff: RESERVED 8. 00000000f8000000-00000000fbffffff: RESERVED 9. 0000000100000000-000000012effffff: RAM Passing 5 GPIOs to payload: NAME | PORT | POLARITY | VALUE write protect | undefined | high | low recovery | undefined | high | low lid | undefined | high | high power | undefined | high | low EC in RW | 0x0000000f | high | low Board ID: 6 SKU ID: 33 CBFS: 'Master Header Locator' located CBFS at [df0000:ffffc0) Wrote coreboot table at: cde52000, 0x538 bytes, checksum 6ac4 coreboot table: 1360 bytes. IMD ROOT 0. cdfff000 00001000 IMD SMALL 1. cdffe000 00001000 CONSOLE 2. cdfde000 00020000 TIME STAMP 3. cdfdd000 00000910 VBOOT 4. cdfdc000 00000c0c ACPISCRATCH 5. cdfac000 00030000 ROMSTG STCK 6. cdfab000 00000400 AFTER CAR 7. cdfa1000 0000a000 RAMSTAGE 8. cde9e000 00103000 REFCODE 9. cde6c000 00032000 ACPI GNVS 10. cde6b000 00001000 SMM BACKUP 11. cde5b000 00010000 MRC DATA 12. cde5a000 00000e75 COREBOOT 13. cde52000 00008000 ACPI 14. cde2e000 00024000 RAMOOPS 15. cdd2e000 00100000 VGA ROM #0 16. cdd1e000 0000fe00 TCPA TCGLOG17. cdd0e000 00010000 SMBIOS 18. cdd0d000 00000800 IMD small region: IMD ROOT 0. cdffec00 00000400 VBOOT SEL 1. cdffebe0 00000008 EC HOSTEVENT 2. cdffebc0 00000008 ROMSTAGE 3. cdffeba0 00000004 VPD 4. cdffeb20 0000006c POWER STATE 5. cdffeb00 00000010 MEM INFO 6. cdffe9a0 00000149 COREBOOTFWD 7. cdffe960 00000028 BS: BS_WRITE_TABLES times (us): entry 2 run 438372 exit 0 POST: 0x7a CBFS: 'Master Header Locator' located CBFS at [df0000:ffffc0) CBFS: Locating 'fallback/payload' CBFS: Found @ offset 1ae180 size 39f90 Loading segment from ROM address 0xfff9e1b8 code (compression=0) New segment dstaddr 0x30104020 memsize 0x254890 srcaddr 0xfff9e1f0 filesize 0x39f58 Loading segment from ROM address 0xfff9e1d4 Entry Point 0x30104020 Loading Segment: addr: 0x0000000030104020 memsz: 0x0000000000254890 filesz: 0x0000000000039f58 lb: [0x00000000cde9f000, 0x00000000cdfa09d8) Post relocation: addr: 0x0000000030104020 memsz: 0x0000000000254890 filesz: 0x0000000000039f58 it's not compressed! [ 0x30104020, 3013df78, 0x303588b0) <- fff9e1f0 Clearing Segment: addr: 0x000000003013df78 memsz: 0x000000000021a938 dest 30104020, end 303588b0, bouncebuffer ffffffff Loaded segments Lock SMM configuration POST: 0xfe BS: BS_PAYLOAD_LOAD times (us): entry 227 run 92762 exit 3336 PSP: Notify that POST is finishing... OK POST: 0x7b mp_park_aps done after 0 msecs. Jumping to boot code at 30104020(cde52000) POST: 0xf8 CPU0: stack: cdeda000 - cdedb000, lowest used address cdeda558, stack used: 2728 bytes Starting depthcharge on grunt... WARNING: can't convert coreboot GPIOs, 'lid' won't be resampled at runtime! WARNING: can't convert coreboot GPIOs, 'power' won't be resampled at runtime! The GBB signature is at 0x30004020 and is: 24 47 42 42 [firmware-grunt-11031.B-collabora] Dec 11 2020 09:59:28 grunt: tftpboot 192.168.201.1 9568431/tftp-deploy-fsl2k_3u/kernel/bzImage 9568431/tftp-deploy-fsl2k_3u/kernel/cmdline 9568431/tftp-deploy-fsl2k_3u/ramdisk/ramdisk.cpio.gz tftpboot 192.168.201.1 9568431/tftp-deploy-fsl2k_3u/kernel/bzImage 95u/kernel/cmdline 9568431/tftp-deploy-fsl2k_3u/ramdisk/ramdisk.cpio.gz Waiting for link R8152: Initializing Version 9 (ocp_data = 6010) R8152: Done initializing Adding net device done. MAC: 00:e0:4c:78:85:55 Sending DHCP discover... done. Waiting for reply... done. Sending DHCP request... done. Waiting for reply... done. My ip is 192.168.201.11 The DHCP server ip is 192.168.201.1 TFTP server IP predefined by user: 192.168.201.1 Bootfile predefined by user: 9568431/tftp-deploy-fsl2k_3u/kernel/bzImage Sending tftp read request... done. Waiting for the transfer... 00000000 ################################################################ 00080000 ################################################################ 00100000 ################################################################ 00180000 ################################################################ 00200000 ################################################################ 00280000 ################################################################ 00300000 ################################################################ 00380000 ################################################################ 00400000 ################################################################ 00480000 ################################################################ 00500000 ################################################################ 00580000 ################################################################ 00600000 ################################################################ 00680000 ################################################################ 00700000 ################################################################ 00780000 ################################################################ 00800000 ################################################################ 00880000 ################################################################ 00900000 ################################################################ 00980000 ################################################################ 00a00000 ################################################################ 00a80000 ################################################################ 00b00000 ################################################################ 00b80000 ################################################################ 00c00000 ################################################################ 00c80000 ################################################################ 00d00000 ################################################################ 00d80000 ############################################# done. The bootfile was 14517184 bytes long. Sending tftp read request... done. Waiting for the transfer... 00000000 ################################################################ 00080000 ################################################################ 00100000 ################################################################ 00180000 ################################################################ 00200000 ################################################################ 00280000 ################################################################ 00300000 ################################################################ 00380000 ################################################################ 00400000 ################################################################ 00480000 ################################################################ 00500000 ################################################################ 00580000 ################################################################ 00600000 ################################################################ 00680000 ################################################################ 00700000 ################################################################ 00780000 ################################################################ 00800000 ################################################################ 00880000 ################################################################ 00900000 ################################################################ 00980000 ################################################################ 00a00000 ################### done. Sending tftp read request... done. Waiting for the transfer... 00000000 # done. Command line loaded dynamically from TFTP file: 9568431/tftp-deploy-fsl2k_3u/kernel/cmdline The command line is: earlyprintk=uart8250,mmio32,0xfedc6000,115200n8 console=ttyS0,115200n8 root=/dev/nfs rw nfsroot=192.168.201.1:/var/lib/lava/dispatcher/tmp/9568431/extract-nfsrootfs-_svdva50,tcp,hard ip=dhcp tftpserverip=192.168.201.1 Shutting down all USB controllers. Removing current net device Finalizing coreboot coreboot-56f9d1cd49 Thu Sep 5 21:57:06 UTC 2019 smm starting... SMI# #0 Exiting depthcharge with code 4 at timestamp: 19886124 Starting kernel ... coreboot-56f9d1cd49 Thu Sep 5 21:57:06 UTC 2019 smm starting... SMI# #0 Chrome EC: Set SMI mask to 0x0000000000000000 Chrome EC: UHEPI supported Clearing pending EC events. Error code 1 is expected. EC returned error result code 9 Chrome EC: Set SCI mask to 0x00000000142609fb [ 0.000000] Linux version 5.10.173-cip27 (KernelCI@build-j1167320-x86-64-gcc-10-x86-64-defconfig-x86-chromebowtxtf) (gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2) #1 SMP Sun Mar 12 07:45:06 UTC 2023 [ 0.000000] Command line: earlyprintk=uart8250,mmio32,0xfedc6000,115200n8 console=ttyS0,115200n8 root=/dev/nfs rw nfsroot=192.168.201.1:/var/lib/lava/dispatcher/tmp/9568431/extract-nfsrootfs-_svdva50,tcp,hard ip=dhcp tftpserverip=192.168.201.1 [ 0.000000] x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' [ 0.000000] x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 [ 0.000000] x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. [ 0.000000] BIOS-provided physical RAM map: [ 0.000000] BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] type 16 [ 0.000000] BIOS-e820: [mem 0x0000000000001000-0x000000000009ffff] usable [ 0.000000] BIOS-e820: [mem 0x00000000000a0000-0x00000000000fffff] reserved [ 0.000000] BIOS-e820: [mem 0x0000000000100000-0x00000000cdd0cfff] usable [ 0.000000] BIOS-e820: [mem 0x00000000cdd0d000-0x00000000cdffffff] type 16 [ 0.000000] BIOS-e820: [mem 0x00000000ce000000-0x00000000cfffffff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000f8000000-0x00000000fbffffff] reserved [ 0.000000] BIOS-e820: [mem 0x0000000100000000-0x000000012effffff] usable [ 0.000000] NX (Execute Disable) protection: active [ 0.000000] SMBIOS 2.7 present. [ 0.000000] DMI: Google Grunt/Grunt, BIOS 09/05/2019 [ 0.000000] tsc: Fast TSC calibration using PIT [ 0.000000] tsc: Detected 1596.926 MHz processor [ 0.001285] last_pfn = 0x12f000 max_arch_pfn = 0x400000000 [ 0.001774] x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT [ 0.003316] last_pfn = 0xcdd0d max_arch_pfn = 0x400000000 [ 0.009865] check: Scanning 1 areas for low memory corruption [ 0.009875] Using GB pages for direct mapping [ 0.010385] RAMDISK: [mem 0x375da000-0x37ffffff] [ 0.010392] ACPI: Early table checksum verification disabled [ 0.010398] ACPI: RSDP 0x00000000000F0000 000024 (v02 COREv4) [ 0.010408] ACPI: XSDT 0x00000000CDE2E0E0 000074 (v01 COREv4 COREBOOT 00000000 CORE 00000000) [ 0.010420] ACPI: FACP 0x00000000CDE31E60 0000F4 (v04 COREv4 COREBOOT 00000000 CORE 00000000) [ 0.010431] ACPI: DSDT 0x00000000CDE2E280 003BE0 (v02 COREv4 COREBOOT 00010001 INTL 20180531) [ 0.010439] ACPI: FACS 0x00000000CDE2E240 000040 [ 0.010447] ACPI: SSDT 0x00000000CDE31F60 000DB5 (v02 COREv4 COREBOOT 0000002A CORE 0000002A) [ 0.010455] ACPI: MCFG 0x00000000CDE32D20 00003C (v01 COREv4 COREBOOT 00000000 CORE 00000000) [ 0.010463] ACPI: TCPA 0x00000000CDE32D60 000032 (v02 COREv4 COREBOOT 00000000 CORE 00000000) [ 0.010470] ACPI: APIC 0x00000000CDE32DA0 00006E (v02 COREv4 COREBOOT 00000000 CORE 00000000) [ 0.010478] ACPI: VFCT 0x00000000CDE32E10 00FE69 (v01 COREv4 COREBOOT 00000000 CORE 00000000) [ 0.010486] ACPI: HPET 0x00000000CDE42C80 000038 (v01 COREv4 COREBOOT 00000000 CORE 00000000) [ 0.010493] ACPI: HEST 0x00000000CDE42CC0 0001D0 (v01 COREv4 COREBOOT 00000000 CORE 00000000) [ 0.010501] ACPI: SSDT 0x00000000CDE42E90 004B5B (v02 AMD AGESA 00000002 MSFT 04000000) [ 0.010509] ACPI: SSDT 0x00000000CDE479F0 00043C (v01 AMD AGESA 00000001 AMD 00000001) [ 0.010516] ACPI: Reserving FACP table memory at [mem 0xcde31e60-0xcde31f53] [ 0.010520] ACPI: Reserving DSDT table memory at [mem 0xcde2e280-0xcde31e5f] [ 0.010523] ACPI: Reserving FACS table memory at [mem 0xcde2e240-0xcde2e27f] [ 0.010527] ACPI: Reserving SSDT table memory at [mem 0xcde31f60-0xcde32d14] [ 0.010530] ACPI: Reserving MCFG table memory at [mem 0xcde32d20-0xcde32d5b] [ 0.010533] ACPI: Reserving TCPA table memory at [mem 0xcde32d60-0xcde32d91] [ 0.010536] ACPI: Reserving APIC table memory at [mem 0xcde32da0-0xcde32e0d] [ 0.010539] ACPI: Reserving VFCT table memory at [mem 0xcde32e10-0xcde42c78] [ 0.010542] ACPI: Reserving HPET table memory at [mem 0xcde42c80-0xcde42cb7] [ 0.010546] ACPI: Reserving HEST table memory at [mem 0xcde42cc0-0xcde42e8f] [ 0.010549] ACPI: Reserving SSDT table memory at [mem 0xcde42e90-0xcde479ea] [ 0.010552] ACPI: Reserving SSDT table memory at [mem 0xcde479f0-0xcde47e2b] [ 0.010617] No NUMA configuration found [ 0.010620] Faking a node at [mem 0x0000000000000000-0x000000012effffff] [ 0.010627] NODE_DATA(0) allocated [mem 0x12effa000-0x12effdfff] [ 0.010663] Zone ranges: [ 0.010666] DMA [mem 0x0000000000001000-0x0000000000ffffff] [ 0.010671] DMA32 [mem 0x0000000001000000-0x00000000ffffffff] [ 0.010676] Normal [mem 0x0000000100000000-0x000000012effffff] [ 0.010681] Movable zone start for each node [ 0.010684] Early memory node ranges [ 0.010687] node 0: [mem 0x0000000000001000-0x000000000009ffff] [ 0.010690] node 0: [mem 0x0000000000100000-0x00000000cdd0cfff] [ 0.010694] node 0: [mem 0x0000000100000000-0x000000012effffff] [ 0.010698] Initmem setup node 0 [mem 0x0000000000001000-0x000000012effffff] [ 0.010723] On node 0, zone DMA: 1 pages in unavailable ranges [ 0.010759] On node 0, zone DMA: 96 pages in unavailable ranges [ 0.026608] On node 0, zone Normal: 8947 pages in unavailable ranges [ 0.026682] On node 0, zone Normal: 4096 pages in unavailable ranges [ 0.026747] ACPI: PM-Timer IO Port: 0x418 [ 0.026761] ACPI: LAPIC_NMI (acpi_id[0xff] high edge lint[0x1]) [ 0.026780] IOAPIC[0]: apic_id 4, version 33, address 0xfec00000, GSI 0-23 [ 0.026792] IOAPIC[1]: apic_id 5, version 33, address 0xfec20000, GSI 24-55 [ 0.026797] ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) [ 0.026801] ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 low level) [ 0.026811] Using ACPI (MADT) for SMP configuration information [ 0.026816] ACPI: HPET id: 0x10228201 base: 0xfed00000 [ 0.026823] smpboot: Allowing 2 CPUs, 0 hotplug CPUs [ 0.026846] PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] [ 0.026850] PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000fffff] [ 0.026855] PM: hibernation: Registered nosave memory: [mem 0xcdd0d000-0xcdffffff] [ 0.026858] PM: hibernation: Registered nosave memory: [mem 0xce000000-0xcfffffff] [ 0.026861] PM: hibernation: Registered nosave memory: [mem 0xd0000000-0xf7ffffff] [ 0.026864] PM: hibernation: Registered nosave memory: [mem 0xf8000000-0xfbffffff] [ 0.026867] PM: hibernation: Registered nosave memory: [mem 0xfc000000-0xffffffff] [ 0.026872] [mem 0xd0000000-0xf7ffffff] available for PCI devices [ 0.026879] clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns [ 0.034522] setup_percpu: NR_CPUS:64 nr_cpumask_bits:64 nr_cpu_ids:2 nr_node_ids:1 [ 0.035068] percpu: Embedded 59 pages/cpu s200848 r8192 d32624 u1048576 [ 0.035134] Built 1 zonelists, mobility grouping on. Total pages: 1019233 [ 0.035138] Policy zone: Normal [ 0.035151] Kernel command line: earlyprintk=uart8250,mmio32,0xfedc6000,115200n8 console=ttyS0,115200n8 root=/dev/nfs rw nfsroot=192.168.201.1:/var/lib/lava/dispatcher/tmp/9568431/extract-nfsrootfs-_svdva50,tcp,hard ip=dhcp tftpserverip=192.168.201.1 [ 0.036225] Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) [ 0.036710] Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) [ 0.036740] mem auto-init: stack:off, heap alloc:off, heap free:off [ 0.071352] Memory: 3939560K/4141744K available (18450K kernel code, 3478K rwdata, 8136K rodata, 2040K init, 13160K bss, 201924K reserved, 0K cma-reserved) [ 0.071465] SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 [ 0.071515] ftrace: allocating 53538 entries in 210 pages [ 0.120604] ftrace: allocated 210 pages with 4 groups [ 0.120857] Running RCU self tests [ 0.120868] rcu: Hierarchical RCU implementation. [ 0.120871] rcu: RCU event tracing is enabled. [ 0.120874] rcu: RCU lockdep checking is enabled. [ 0.120877] rcu: RCU restricting CPUs from NR_CPUS=64 to nr_cpu_ids=2. [ 0.120881] Rude variant of Tasks RCU enabled. [ 0.120884] Tracing variant of Tasks RCU enabled. [ 0.120888] rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. [ 0.120891] rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 [ 0.128358] NR_IRQS: 4352, nr_irqs: 512, preallocated irqs: 16 [ 0.128684] random: crng init done [ 0.128783] Console: colour dummy device 80x25 [ 0.154760] printk: console [ttyS0] enabled [ 0.154905] Lock dependency validator: Copyright (c) 2006 Red Hat, Inc., Ingo Molnar [ 0.155167] ... MAX_LOCKDEP_SUBCLASSES: 8 [ 0.155309] ... MAX_LOCK_DEPTH: 48 [ 0.155455] ... MAX_LOCKDEP_KEYS: 8192 [ 0.155606] ... CLASSHASH_SIZE: 4096 [ 0.155758] ... MAX_LOCKDEP_ENTRIES: 32768 [ 0.155912] ... MAX_LOCKDEP_CHAINS: 65536 [ 0.156066] ... CHAINHASH_SIZE: 32768 [ 0.156220] memory used by lock dependency info: 6365 kB [ 0.156405] memory used for stack traces: 4224 kB [ 0.156571] per task-struct memory footprint: 1920 bytes [ 0.156808] ACPI: Core revision 20200925 [ 0.157227] clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484873504 ns [ 0.157587] APIC: Switch to symmetric I/O mode setup [ 0.158199] ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=0 pin2=0 [ 0.162577] clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x1704cd1078b, max_idle_ns: 440795282820 ns [ 0.162955] Calibrating delay loop (skipped), value calculated using timer frequency.. 3193.85 BogoMIPS (lpj=1596926) [ 0.163316] pid_max: default: 32768 minimum: 301 [ 0.163531] LSM: Security Framework initializing [ 0.163962] SELinux: Initializing. [ 0.164121] LSM support for eBPF active [ 0.164291] Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) [ 0.164558] Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) [ 0.165892] BIOS may not properly restore RDRAND after suspend, hiding RDRAND via CPUID. Use rdrand=force to reenable. [ 0.166036] LVT offset 1 assigned for vector 0xf9 [ 0.166208] Last level iTLB entries: 4KB 512, 2MB 1024, 4MB 512 [ 0.166410] Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 512, 1GB 0 [ 0.166949] Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization [ 0.167238] Spectre V2 : Mitigation: Retpolines [ 0.167394] Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch [ 0.167672] Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT [ 0.167899] Spectre V2 : Enabling Speculation Barrier for firmware calls [ 0.167943] RETBleed: Mitigation: untrained return thunk [ 0.168127] Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier [ 0.168412] Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp [ 0.175878] ------------[ cut here ]------------ [ 0.175952] missing return thunk: lkdtm_rodata_do_nothing+0x0/0x10-lkdtm_rodata_do_nothing+0x5/0x10: e9 00 00 00 00 [ 0.175963] WARNING: CPU: 0 PID: 0 at arch/x86/kernel/alternative.c:712 apply_returns+0x1f5/0x220 [ 0.176607] Modules linked in: [ 0.176721] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.10.173-cip27 #1 [ 0.176943] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 [ 0.177147] RIP: 0010:apply_returns+0x1f5/0x220 [ 0.177305] Code: e4 01 00 0f 85 e1 fe ff ff 49 89 e8 b9 05 00 00 00 4c 89 f2 48 89 ee 48 c7 c7 68 b4 20 8b c6 05 21 92 e4 01 01 e8 e8 28 e9 00 <0f> 0b e9 b9 fe ff ff 44 89 f9 c7 00 cc cc cc cc c7 44 08 fc cc cc [ 0.177943] RSP: 0000:ffffffff8b403de0 EFLAGS: 00010282 [ 0.178124] RAX: 0000000000000000 RBX: ffffffff8bef45f4 RCX: 0000000000000000 [ 0.178366] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff8997a011 [ 0.178607] RBP: ffffffff8aed5f00 R08: 0000000000000001 R09: 0000000000000001 [ 0.178943] R10: ffffffff8b48fe40 R11: 3fffffffffffffff R12: ffffffff8bf0cac0 [ 0.179184] R13: cccccccccccccccc R14: ffffffff8aed5f05 R15: 0000000000000000 [ 0.179426] FS: 0000000000000000(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 0.179699] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 0.179895] CR2: ffff9608eefff000 CR3: 0000000090c26000 CR4: 00000000001506f0 [ 0.179942] Call Trace: [ 0.180036] ? lock_acquire+0xbf/0x2c0 [ 0.180183] alternative_instructions+0x7d/0x143 [ 0.180346] check_bugs+0xe9f/0xefb [ 0.180475] start_kernel+0x517/0x54d [ 0.180609] secondary_startup_64_no_verify+0xc2/0xcb [ 0.180953] irq event stamp: 1699 [ 0.181073] hardirqs last enabled at (1707): [] console_unlock+0x4d1/0x5f0 [ 0.181361] hardirqs last disabled at (1714): [] console_unlock+0x444/0x5f0 [ 0.181649] softirqs last enabled at (1696): [] irq_enter_rcu+0x71/0x80 [ 0.181944] softirqs last disabled at (1731): [] irq_enter_rcu+0x56/0x80 [ 0.182224] ---[ end trace 3c547c3eb0d57e33 ]--- [ 0.186092] Freeing SMP alternatives memory: 48K [ 0.187195] smpboot: CPU 0 Converting physical 2 to logical die 0 [ 0.290160] smpboot: CPU0: AMD A4-9120C RADEON R4, 5 COMPUTE CORES 2C+3G (family: 0x15, model: 0x70, stepping: 0x0) [ 0.290945] Performance Events: Fam15h core perfctr, AMD PMU driver. [ 0.291180] ... version: 0 [ 0.291321] ... bit width: 48 [ 0.291464] ... generic registers: 6 [ 0.291604] ... value mask: 0000ffffffffffff [ 0.291786] ... max period: 00007fffffffffff [ 0.291945] ... fixed-purpose events: 0 [ 0.292085] ... event mask: 000000000000003f [ 0.292594] rcu: Hierarchical SRCU implementation. [ 0.294218] smp: Bringing up secondary CPUs ... [ 0.294991] x86: Booting SMP configuration: [ 0.295154] .... node #0, CPUs: #1 [ 0.296112] smp: Brought up 1 node, 2 CPUs [ 0.296946] smpboot: Max logical packages: 1 [ 0.297096] smpboot: Total of 2 processors activated (6387.70 BogoMIPS) [ 0.298494] devtmpfs: initialized [ 0.298494] x86/mm: Memory block size: 128MB [ 0.302232] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns [ 0.302289] futex hash table entries: 512 (order: 4, 65536 bytes, linear) [ 0.303308] pinctrl core: initialized pinctrl subsystem [ 0.303735] PM: RTC time: 08:11:06, date: 2023-03-12 [ 0.304407] NET: Registered protocol family 16 [ 0.305177] audit: initializing netlink subsys (disabled) [ 0.305396] audit: type=2000 audit(1678608666.147:1): state=initialized audit_enabled=0 res=1 [ 0.305596] thermal_sys: Registered thermal governor 'step_wise' [ 0.305600] thermal_sys: Registered thermal governor 'user_space' [ 0.305894] cpuidle: using governor menu [ 0.306409] ACPI: bus type PCI registered [ 0.306963] PCI: MMCONFIG for domain 0000 [bus 00-40] at [mem 0xf8000000-0xfc0fffff] (base 0xf8000000) [ 0.307281] PCI: MMCONFIG at [mem 0xf8000000-0xfc0fffff] reserved in E820 [ 0.307514] PCI: MMCONFIG for 0000 [bus00-1f] at [mem 0xf8000000-0xf9ffffff] (base 0xf8000000) (size reduced!) [ 0.307878] PCI: Using configuration type 1 for base access [ 0.325405] Kprobes globally optimized [ 0.326066] HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages [ 0.326202] HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages [ 0.327070] cryptomgr_test (28) used greatest stack depth: 14880 bytes left [ 0.329262] ACPI: Added _OSI(Module Device) [ 0.329416] ACPI: Added _OSI(Processor Device) [ 0.329573] ACPI: Added _OSI(3.0 _SCP Extensions) [ 0.329737] ACPI: Added _OSI(Processor Aggregator Device) [ 0.329976] ACPI: Added _OSI(Linux-Dell-Video) [ 0.330133] ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) [ 0.330319] ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) [ 0.347559] ACPI: 4 ACPI AML tables successfully acquired and loaded [ 0.358905] ACPI: EC: EC started [ 0.358944] ACPI: EC: interrupt blocked [ 0.359558] ACPI: EC: EC_CMD/EC_SC=0x66, EC_DATA=0x62 [ 0.359737] ACPI: \_SB_.PCI0.LPCB.EC0_: Boot DSDT EC used to handle transactions [ 0.359945] ACPI: Interpreter enabled [ 0.360134] ACPI: (supports S0 S1 S3 S4 S5) [ 0.360283] ACPI: Using IOAPIC for interrupt routing [ 0.360495] PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug [ 0.361710] ACPI: Enabled 3 GPEs in block 00 to 1F [ 0.364532] ACPI: Power Resource [P0U2] (off) [ 0.364859] ACPI: Power Resource [P3U2] (off) [ 0.366711] ACPI: Power Resource [P0U3] (off) [ 0.367007] ACPI: Power Resource [P3U3] (off) [ 0.377373] ACPI: Power Resource [PRIC] (on) [ 0.405511] ACPI: Power Resource [PRIC] (on) [ 0.438808] ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) [ 0.438955] acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] [ 0.439482] acpi PNP0A08:00: _OSC: OS now controls [PME PCIeCapability LTR] [ 0.439775] acpi PNP0A08:00: [Firmware Info]: MMCONFIG for domain 0000 [bus 00-1f] only partially covers this bridge [ 0.440056] acpi PNP0A08:00: host bridge window expanded to [io 0x0000-0x0cf7 window]; [io 0x03b0-0x03df window] ignored [ 0.440614] PCI host bridge to bus 0000:00 [ 0.440947] pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] [ 0.441180] pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] [ 0.441413] pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff] [ 0.441649] pci_bus 0000:00: root bus resource [mem 0x000c0000-0x000dffff] [ 0.441946] pci_bus 0000:00: root bus resource [mem 0xd0000000-0xffffffff] [ 0.442182] pci_bus 0000:00: root bus resource [bus 00-ff] [ 0.442429] pci 0000:00:00.0: [1022:1576] type 00 class 0x060000 [ 0.443324] pci 0000:00:01.0: [1002:98e4] type 00 class 0x030000 [ 0.443550] pci 0000:00:01.0: reg 0x10: [mem 0xf0000000-0xf3ffffff 64bit pref] [ 0.443807] pci 0000:00:01.0: reg 0x18: [mem 0xf4000000-0xf47fffff 64bit pref] [ 0.443952] pci 0000:00:01.0: reg 0x20: [io 0x1000-0x10ff] [ 0.444151] pci 0000:00:01.0: reg 0x24: [mem 0xf4d00000-0xf4d3ffff] [ 0.444373] pci 0000:00:01.0: reg 0x30: [mem 0xf4d40000-0xf4d5ffff pref] [ 0.444609] pci 0000:00:01.0: enabling Extended Tags [ 0.444973] pci 0000:00:01.0: supports D1 D2 [ 0.445124] pci 0000:00:01.0: PME# supported from D1 D2 D3hot [ 0.445719] pci 0000:00:01.1: [1002:15b3] type 00 class 0x040300 [ 0.445950] pci 0000:00:01.1: reg 0x10: [mem 0xf4d80000-0xf4d83fff 64bit] [ 0.446219] pci 0000:00:01.1: enabling Extended Tags [ 0.446445] pci 0000:00:01.1: supports D1 D2 [ 0.446849] pci 0000:00:02.0: [1022:157b] type 00 class 0x060000 [ 0.447210] pci 0000:00:02.2: [1022:157c] type 01 class 0x060400 [ 0.447465] pci 0000:00:02.2: enabling Extended Tags [ 0.447707] pci 0000:00:02.2: PME# supported from D0 D3hot D3cold [ 0.448321] pci 0000:00:02.4: [1022:157c] type 01 class 0x060400 [ 0.448577] pci 0000:00:02.4: enabling Extended Tags [ 0.448817] pci 0000:00:02.4: PME# supported from D0 D3hot D3cold [ 0.449324] pci 0000:00:03.0: [1022:157b] type 00 class 0x060000 [ 0.449994] pci 0000:00:08.0: [1022:1578] type 00 class 0x108000 [ 0.450216] pci 0000:00:08.0: reg 0x10: [mem 0xf4d60000-0xf4d7ffff 64bit pref] [ 0.450468] pci 0000:00:08.0: reg 0x18: [mem 0xf4b00000-0xf4bfffff] [ 0.450689] pci 0000:00:08.0: reg 0x1c: [mem 0xf4d88000-0xf4d88fff] [ 0.450909] pci 0000:00:08.0: reg 0x20: [mem 0xf4c00000-0xf4cfffff] [ 0.450951] pci 0000:00:08.0: reg 0x24: [mem 0xf4d84000-0xf4d85fff] [ 0.451439] pci 0000:00:09.0: [1022:157d] type 00 class 0x060000 [ 0.452131] pci 0000:00:10.0: [1022:7914] type 00 class 0x0c0330 [ 0.452365] pci 0000:00:10.0: reg 0x10: [mem 0xf4d86000-0xf4d87fff 64bit] [ 0.452741] pci 0000:00:10.0: PME# supported from D0 D3hot D3cold [ 0.453350] pci 0000:00:12.0: [1022:7908] type 00 class 0x0c0320 [ 0.453575] pci 0000:00:12.0: reg 0x10: [mem 0xf4d89000-0xf4d890ff] [ 0.453892] pci 0000:00:12.0: supports D1 D2 [ 0.453945] pci 0000:00:12.0: PME# supported from D0 D1 D2 D3hot D3cold [ 0.454514] pci 0000:00:14.0: [1022:790b] type 00 class 0x0c0500 [ 0.455237] pci 0000:00:14.3: [1022:790e] type 00 class 0x060100 [ 0.455851] pci 0000:00:14.7: [1022:7906] type 00 class 0x080501 [ 0.455969] pci 0000:00:14.7: reg 0x10: [mem 0xf4d8a000-0xf4d8a0ff 64bit] [ 0.456296] pci 0000:00:14.7: PME# supported from D3cold [ 0.456945] pci 0000:00:18.0: [1022:15b0] type 00 class 0x060000 [ 0.457406] pci 0000:00:18.1: [1022:15b1] type 00 class 0x060000 [ 0.457861] pci 0000:00:18.2: [1022:15b2] type 00 class 0x060000 [ 0.458204] pci 0000:00:18.3: [1022:15b3] type 00 class 0x060000 [ 0.458667] pci 0000:00:18.4: [1022:15b4] type 00 class 0x060000 [ 0.459190] pci 0000:00:18.5: [1022:15b5] type 00 class 0x060000 [ 0.459837] pci 0000:01:00.0: [168c:003e] type 00 class 0x028000 [ 0.460032] pci 0000:01:00.0: reg 0x10: [mem 0xf4800000-0xf49fffff 64bit] [ 0.460550] pci 0000:01:00.0: PME# supported from D0 D3hot D3cold [ 0.461367] pci 0000:00:02.2: PCI bridge to [bus 01] [ 0.461548] pci 0000:00:02.2: bridge window [mem 0xf4800000-0xf49fffff] [ 0.461973] pci 0000:02:00.0: [1217:8620] type 00 class 0x080501 [ 0.462285] pci 0000:02:00.0: reg 0x10: [mem 0xf4a00000-0xf4a00fff] [ 0.462595] pci 0000:02:00.0: reg 0x14: [mem 0xf4a01000-0xf4a017ff] [ 0.463105] pci 0000:02:00.0: PME# supported from D3hot D3cold [ 0.467200] pci 0000:00:02.4: PCI bridge to [bus 02] [ 0.467390] pci 0000:00:02.4: bridge window [mem 0xf4a00000-0xf4afffff] [ 0.469790] ACPI: PCI Interrupt Link [INTA] (IRQs *3 4 5 7 10 11 12 15) [ 0.470084] ACPI: PCI Interrupt Link [INTB] (IRQs 3 *4 5 7 10 11 12 15) [ 0.470469] ACPI: PCI Interrupt Link [INTC] (IRQs 3 4 *5 7 10 11 12 15) [ 0.470984] ACPI: PCI Interrupt Link [INTD] (IRQs 3 4 5 *7 10 11 12 15) [ 0.471366] ACPI: PCI Interrupt Link [INTE] (IRQs 3 4 5 7 10 *11 12 15) [ 0.471748] ACPI: PCI Interrupt Link [INTF] (IRQs 9) *0 [ 0.472079] ACPI: PCI Interrupt Link [INTG] (IRQs 3 4 5 7 10 11 12 15) *0 [ 0.472468] ACPI: PCI Interrupt Link [INTH] (IRQs 3 4 5 7 10 11 12 15) *0 [ 0.477019] ACPI: EC: interrupt unblocked [ 0.477173] ACPI: EC: event unblocked [ 0.477308] ACPI: EC: EC_CMD/EC_SC=0x66, EC_DATA=0x62 [ 0.477489] ACPI: EC: GPE=0x3 [ 0.477600] ACPI: \_SB_.PCI0.LPCB.EC0_: Boot DSDT EC initialization complete [ 0.477842] ACPI: \_SB_.PCI0.LPCB.EC0_: EC: Used to handle transactions and events [ 0.478999] iommu: Default domain type: Translated [ 0.479297] pci 0000:00:01.0: vgaarb: setting as boot VGA device [ 0.479297] pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none [ 0.479965] pci 0000:00:01.0: vgaarb: bridge control possible [ 0.480163] vgaarb: loaded [ 0.480687] SCSI subsystem initialized [ 0.481148] ACPI: bus type USB registered [ 0.481148] usbcore: registered new interface driver usbfs [ 0.481276] usbcore: registered new interface driver hub [ 0.481487] usbcore: registered new device driver usb [ 0.500100] mc: Linux media interface: v0.10 [ 0.500100] videodev: Linux video capture interface: v2.00 [ 0.500197] pps_core: LinuxPPS API ver. 1 registered [ 0.500369] pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti [ 0.500687] PTP clock support registered [ 0.501148] Advanced Linux Sound Architecture Driver Initialized. [ 0.502726] NetLabel: Initializing [ 0.502945] NetLabel: domain hash size = 128 [ 0.503097] NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO [ 0.503345] NetLabel: unlabeled traffic allowed by default [ 0.503604] PCI: Using ACPI for IRQ routing [ 0.505501] hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 [ 0.505681] hpet0: 3 comparators, 32-bit 14.318180 MHz counter [ 0.509008] clocksource: Switched to clocksource tsc-early [ 0.873613] VFS: Disk quotas dquot_6.6.0 [ 0.873791] VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) [ 0.874346] pnp: PnP ACPI init [ 0.874966] system 00:00: [mem 0xfec1000a-0xfec11009] has been reserved [ 0.875664] system 00:03: [io 0x0900-0x09fe] has been reserved [ 0.876062] system 00:04: [io 0x0200] has been reserved [ 0.876249] system 00:04: [io 0x0204] has been reserved [ 0.876435] system 00:04: [io 0x0800-0x087f] has been reserved [ 0.876640] system 00:04: [io 0x0880-0x08ff] has been reserved [ 0.878535] pnp: PnP ACPI: found 6 devices [ 0.890075] clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns [ 0.890488] NET: Registered protocol family 2 [ 0.890839] IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) [ 0.892174] tcp_listen_portaddr_hash hash table entries: 2048 (order: 5, 163840 bytes, linear) [ 0.892544] TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) [ 0.893072] TCP bind hash table entries: 32768 (order: 9, 2359296 bytes, linear) [ 0.894389] TCP: Hash tables configured (established 32768 bind 32768) [ 0.895150] MPTCP token hash table entries: 4096 (order: 6, 360448 bytes, linear) [ 0.895574] UDP hash table entries: 2048 (order: 6, 327680 bytes, linear) [ 0.895965] UDP-Lite hash table entries: 2048 (order: 6, 327680 bytes, linear) [ 0.896473] NET: Registered protocol family 1 [ 0.897267] RPC: Registered named UNIX socket transport module. [ 0.897494] RPC: Registered udp transport module. [ 0.897658] RPC: Registered tcp transport module. [ 0.897821] RPC: Registered tcp NFSv4.1 backchannel transport module. [ 0.898445] NET: Registered protocol family 44 [ 0.898625] pci 0000:00:02.2: PCI bridge to [bus 01] [ 0.898804] pci 0000:00:02.2: bridge window [mem 0xf4800000-0xf49fffff] [ 0.899043] pci 0000:00:02.4: PCI bridge to [bus 02] [ 0.899219] pci 0000:00:02.4: bridge window [mem 0xf4a00000-0xf4afffff] [ 0.899470] pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] [ 0.899682] pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] [ 0.899894] pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff] [ 0.900109] pci_bus 0000:00: resource 7 [mem 0x000c0000-0x000dffff] [ 0.900324] pci_bus 0000:00: resource 8 [mem 0xd0000000-0xffffffff] [ 0.900545] pci_bus 0000:01: resource 1 [mem 0xf4800000-0xf49fffff] [ 0.900760] pci_bus 0000:02: resource 1 [mem 0xf4a00000-0xf4afffff] [ 0.901124] pci 0000:00:01.0: disabling ATS [ 0.901277] pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] [ 0.901744] pci 0000:00:01.1: D0 power state depends on 0000:00:01.0 [ 0.902799] pci 0000:00:10.0: PME# does not work under D0, disabling it [ 0.903665] PCI: CLS 64 bytes, default 64 [ 0.904123] Unpacking initramfs... [ 1.177403] Freeing initrd memory: 10392K [ 1.177556] PCI-DMA: Using software bounce buffering for IO (SWIOTLB) [ 1.177778] software IO TLB: mapped [mem 0x00000000c9d0d000-0x00000000cdd0d000] (64MB) [ 1.178128] LVT offset 0 assigned for vector 0x400 [ 1.178377] perf: AMD IBS detected (0x000007ff) [ 1.178595] kvm: no hardware support [ 1.178841] kvm: Nested Virtualization enabled [ 1.179048] SVM: kvm: Nested Paging enabled [ 1.179195] SVM: Virtual VMLOAD VMSAVE supported [ 1.179355] SVM: Virtual GIF supported [ 1.181109] check: Scanning for low memory corruption every 60 seconds [ 1.182844] Initialise system trusted keyrings [ 1.183239] workingset: timestamp_bits=56 max_order=20 bucket_order=0 [ 1.196562] NFS: Registering the id_resolver key type [ 1.196771] Key type id_resolver registered [ 1.196962] Key type id_legacy registered [ 1.213059] Key type asymmetric registered [ 1.213233] Asymmetric key parser 'x509' registered [ 1.213452] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 248) [ 1.213716] io scheduler mq-deadline registered [ 1.213876] io scheduler kyber registered [ 1.214223] test_firmware: interface ready [ 1.216328] pcieport 0000:00:02.2: PME: Signaling with IRQ 25 [ 1.217105] pcieport 0000:00:02.4: PME: Signaling with IRQ 26 [ 1.218139] ACPI: AC Adapter [AC] (on-line) [ 1.218548] input: Lid Switch as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A08:00/device:17/PNP0C09:00/PNP0C0D:00/input/input0 [ 1.219465] ACPI: Lid Switch [LID0] [ 1.219756] input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input1 [ 1.220195] ACPI: Power Button [PWRF] [ 1.220595] ACPI: Video Device [IGFX] (multi-head: no rom: yes post: no) [ 1.221410] input: Video Bus as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A08:00/LNXVIDEO:00/input/input2 [ 1.221868] ACPI: \_PR_.P000: Found 2 idle states [ 1.222476] ACPI: \_PR_.P001: Found 2 idle states [ 1.224966] thermal LNXTHERM:00: registered as thermal_zone0 [ 1.225165] ACPI: Thermal Zone [THRM] (35 C) [ 1.225774] Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled [ 1.228635] battery: ACPI: Battery Slot [BAT0] (battery present) [ 1.228938] printk: console [ttyS0] disabled [ 1.229327] AMD0020:00: ttyS0 at MMIO 0xfedc6000 (irq = 10, base_baud = 3000000) is a 16550A [ 2.238340] tsc: Refined TSC clocksource calibration: 1597.002 MHz [ 2.238359] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x170514dcf86, max_idle_ns: 440795282824 ns [ 2.238438] clocksource: Switched to clocksource tsc [ 3.873970] printk: console [ttyS0] enabled [ 3.879084] AMD0020:01: ttyS1 at MMIO 0xfedc8000 (irq = 11, base_baud = 3000000) is a 16550A [ 3.888243] Non-volatile memory driver v1.3 [ 3.892545] Linux agpgart interface v0.103 [ 3.898067] [drm] Initialized vgem 1.0.0 20120112 for vgem on minor 0 [ 3.914282] loop: module loaded [ 3.917975] lkdtm: No crash points registered, enable through debugfs [ 3.926014] e100: Intel(R) PRO/100 Network Driver [ 3.930728] e100: Copyright(c) 1999-2006 Intel Corporation [ 3.936255] e1000: Intel(R) PRO/1000 Network Driver [ 3.941136] e1000: Copyright (c) 1999-2006 Intel Corporation. [ 3.946952] e1000e: Intel(R) PRO/1000 Network Driver [ 3.951918] e1000e: Copyright(c) 1999 - 2015 Intel Corporation. [ 3.957895] sky2: driver version 1.30 [ 3.961774] usbcore: registered new interface driver r8152 [ 3.967576] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver [ 3.974121] ehci-pci: EHCI PCI platform driver [ 3.979033] ehci-pci 0000:00:12.0: EHCI Host Controller [ 3.984791] ehci-pci 0000:00:12.0: new USB bus registered, assigned bus number 1 [ 3.992247] ehci-pci 0000:00:12.0: debug port 2 [ 3.996969] ehci-pci 0000:00:12.0: irq 18, io mem 0xf4d89000 [ 4.009242] ehci-pci 0000:00:12.0: USB 2.0 started, EHCI 1.00 [ 4.015486] usb usb1: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 5.10 [ 4.023781] usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 4.031005] usb usb1: Product: EHCI Host Controller [ 4.035889] usb usb1: Manufacturer: Linux 5.10.173-cip27 ehci_hcd [ 4.041986] usb usb1: SerialNumber: 0000:00:12.0 [ 4.047570] hub 1-0:1.0: USB hub found [ 4.051403] hub 1-0:1.0: 2 ports detected [ 4.056366] ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver [ 4.062573] ohci-pci: OHCI PCI platform driver [ 4.067067] uhci_hcd: USB Universal Host Controller Interface driver [ 4.073829] xhci_hcd 0000:00:10.0: xHCI Host Controller [ 4.079727] xhci_hcd 0000:00:10.0: new USB bus registered, assigned bus number 2 [ 4.087371] xhci_hcd 0000:00:10.0: hcc params 0x014040c3 hci version 0x100 quirks 0x0000000000000410 [ 4.097538] xhci_hcd 0000:00:10.0: xHCI Host Controller [ 4.103020] xhci_hcd 0000:00:10.0: new USB bus registered, assigned bus number 3 [ 4.110428] xhci_hcd 0000:00:10.0: Host supports USB 3.0 SuperSpeed [ 4.116929] usb usb2: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 5.10 [ 4.125217] usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 4.132440] usb usb2: Product: xHCI Host Controller [ 4.137327] usb usb2: Manufacturer: Linux 5.10.173-cip27 xhci-hcd [ 4.143423] usb usb2: SerialNumber: 0000:00:10.0 [ 4.148667] hub 2-0:1.0: USB hub found [ 4.152504] hub 2-0:1.0: 4 ports detected [ 4.157302] usb usb3: We don't know the algorithms for LPM for this host, disabling LPM. [ 4.165490] usb usb3: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 5.10 [ 4.173754] usb usb3: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 4.180991] usb usb3: Product: xHCI Host Controller [ 4.185930] usb usb3: Manufacturer: Linux 5.10.173-cip27 xhci-hcd [ 4.192027] usb usb3: SerialNumber: 0000:00:10.0 [ 4.197419] hub 3-0:1.0: USB hub found [ 4.201243] hub 3-0:1.0: 4 ports detected [ 4.206070] usbcore: registered new interface driver usblp [ 4.211616] usbcore: registered new interface driver usb-storage [ 4.217916] udc-core: couldn't find an available UDC - added [g_ether] to list of pending drivers [ 4.226895] i8042: PNP: PS/2 Controller [PNP0303:PS2K] at 0x60,0x64 irq 1 [ 4.233690] i8042: PNP: PS/2 appears to have AUX port disabled, if this is incorrect please boot with i8042.nopnp [ 4.245105] i8042: Warning: Keylock active [ 4.249378] serio: i8042 KBD port at 0x60,0x64 irq 1 [ 4.255741] rtc_cmos 00:01: RTC can wake from S4 [ 4.261376] rtc_cmos 00:01: registered as rtc0 [ 4.262045] input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input3 [ 4.265985] rtc_cmos 00:01: alarms up to one day, 114 bytes nvram, hpet irqs [ 4.282036] device-mapper: ioctl: 4.43.0-ioctl (2020-10-01) initialised: dm-devel@redhat.com [ 4.290555] sdhci: Secure Digital Host Controller Interface driver [ 4.296737] sdhci: Copyright(c) Pierre Ossman [ 4.301149] sdhci-pci 0000:00:14.7: SDHCI controller found [1022:7906] (rev 1) [ 4.311238] usb 1-1: new high-speed USB device number 2 using ehci-pci [ 4.411927] mmc0: SDHCI controller on PCI [0000:00:14.7] using ADMA 64-bit [ 4.419050] sdhci-pci 0000:02:00.0: SDHCI controller found [1217:8620] (rev 1) [ 4.422979] usb 2-4: new high-speed USB device number 2 using xhci_hcd [ 4.427286] mmc1: emmc 1.8v flag is set, force 1.8v signaling voltage [ 4.440802] mmc1: SDHCI controller on PCI [0000:02:00.0] using ADMA [ 4.447396] hid: raw HID events driver (C) Jiri Kosina [ 4.453218] usbcore: registered new interface driver usbhid [ 4.458794] usbhid: USB HID core driver [ 4.463234] usb 1-1: New USB device found, idVendor=0438, idProduct=7900, bcdDevice= 0.18 [ 4.467427] cros_ec_lpcs GOOG0004:00: Chrome EC device registered [ 4.471452] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 4.477831] hub 1-1:1.0: USB hub found [ 4.488989] hub 1-1:1.0: 4 ports detected [ 4.493640] snd_hda_intel 0000:00:01.1: Force to non-snoop mode [ 4.500560] ipip: IPv4 and MPLS over IPv4 tunneling driver [ 4.506774] IPv4 over IPsec tunneling driver [ 4.509875] snd_hda_intel 0000:00:01.1: Cannot probe codecs, giving up [ 4.511472] Initializing XFRM netlink socket [ 4.523152] NET: Registered protocol family 10 [ 4.528689] Segment Routing with IPv6 [ 4.533347] NET: Registered protocol family 17 [ 4.538019] Key type dns_resolver registered [ 4.542309] x86/pm: family 0x15 cpu detected, MSR saving is needed during suspending. [ 4.551219] microcode: CPU0: patch_level=0x06006705 [ 4.556152] microcode: CPU1: patch_level=0x06006705 [ 4.561116] microcode: Microcode Update Driver: v2.2. [ 4.561129] IPI shorthand broadcast: enabled [ 4.568980] usb 2-4: New USB device found, idVendor=0bda, idProduct=8153, bcdDevice=31.00 [ 4.570527] sched_clock: Marking stable (4541155288, 29303044)->(4596330502, -25872170) [ 4.578654] usb 2-4: New USB device strings: Mfr=1, Product=2, SerialNumber=6 [ 4.593784] usb 2-4: Product: USB 10/100/1000 LAN [ 4.598495] usb 2-4: Manufacturer: Realtek [ 4.598740] registered taskstats version 1 [ 4.602600] usb 2-4: SerialNumber: 001000001 [ 4.606707] Loading compiled-in X.509 certificates [ 4.617746] PM: Magic number: 15:345:169 [ 4.622443] printk: console [netcon0] enabled [ 4.626825] netconsole: network logging started [ 4.631980] acpi_cpufreq: overriding BIOS provided _PSD data [ 4.732385] usb 2-4: reset high-speed USB device number 2 using xhci_hcd [ 4.825961] usb 1-1.1: new high-speed USB device number 3 using ehci-pci [ 4.934544] usb 1-1.1: New USB device found, idVendor=0408, idProduct=5186, bcdDevice= 0.03 [ 4.942914] usb 1-1.1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 4.950234] usb 1-1.1: Product: HP TrueVision HD Camera [ 4.955465] usb 1-1.1: Manufacturer: SunplusIT Inc [ 4.960261] usb 1-1.1: SerialNumber: SunplusIT Inc [ 4.994012] r8152 2-4:1.0: load rtl8153b-2 v1 10/23/19 successfully [ 5.057759] r8152 2-4:1.0 eth0: v1.11.11 [ 5.063978] usb 1-1.2: new full-speed USB device number 4 using ehci-pci [ 5.163153] usb 1-1.2: New USB device found, idVendor=0cf3, idProduct=e300, bcdDevice= 0.01 [ 5.171514] usb 1-1.2: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 5.731389] mmc1: new HS200 MMC card at address 0001 [ 5.737445] mmcblk1: mmc1:0001 DF4016 14.7 GiB [ 5.742214] mmcblk1boot0: mmc1:0001 DF4016 partition 1 4.00 MiB [ 5.748321] mmcblk1boot1: mmc1:0001 DF4016 partition 2 4.00 MiB [ 5.754602] mmcblk1rpmb: mmc1:0001 DF4016 partition 3 4.00 MiB, chardev (245:0) [ 5.772836] mmcblk1: p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 6.775259] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 6.775817] r8152 2-4:1.0 eth0: carrier on [ 6.787188] Sending DHCP requests .., OK [ 8.891166] IP-Config: Got DHCP answer from 192.168.201.1, my address is 192.168.201.11 [ 8.899185] IP-Config: Complete: [ 8.902435] device=eth0, hwaddr=00:e0:4c:78:85:55, ipaddr=192.168.201.11, mask=255.255.255.0, gw=192.168.201.1 [ 8.912864] host=hp-11A-G6-EE-grunt-cbg-8, domain=lava-rack, nis-domain=(none) [ 8.920517] bootserver=192.168.201.1, rootserver=192.168.201.1, rootpath= [ 8.920521] nameserver0=192.168.201.1 [ 8.932107] cfg80211: Loading compiled-in X.509 certificates for regulatory database [ 8.944510] modprobe (81) used greatest stack depth: 14200 bytes left [ 8.950977] modprobe (82) used greatest stack depth: 14024 bytes left [ 8.951840] cfg80211: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7' [ 8.964347] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 8.965029] ALSA device list: [ 8.973065] cfg80211: failed to load regulatory.db [ 8.975993] No soundcards found. [ 8.984706] dw-apb-uart AMD0020:00: forbid DMA for kernel console [ 8.996075] Freeing unused kernel image (initmem) memory: 2040K [ 9.006326] Write protecting the kernel read-only data: 28672k [ 9.013784] Freeing unused kernel image (text/rodata gap) memory: 2028K [ 9.020493] Freeing unused kernel image (rodata/data gap) memory: 56K [ 9.026956] Run /init as init process Loading, please wait... Starting version 247.3-7+deb11u1[ 9.056227] systemd-udevd (103) used greatest stack depth: 13792 bytes left [ 9.141264] udevadm (105) used greatest stack depth: 13608 bytes left [ 9.364785] chromeos ramoops using acpi device. [ 9.394575] cros-usbpd-notify-acpi GOOG0003:00: Couldn't get Chrome EC device pointer. [ 9.457697] uvcvideo: Found UVC 1.00 device HP TrueVision HD Camera (0408:5186) [ 9.497302] input: HP TrueVision HD Camera: HP Tru as /devices/pci0000:00/0000:00:12.0/usb1/1-1/1-1.1/1-1.1:1.0/input/input4 [ 9.509284] usbcore: registered new interface driver uvcvideo [ 9.515074] USB Video Class driver (1.1.1) coreboot-56f9d1cd49 Thu Sep 5 21:57:06 UTC 2019 smm starting... SMI# #0 GSMI Unknown: 0xff coreboot-56f9d1cd49 Thu Sep 5 21:57:06 UTC 2019 smm starting... SMI# #0 GSMI Handshake [ 9.587423] Registered efivars operations [ 9.605008] gsmi version 1.0 loaded Begin: Loading essential drivers ... done. Begin: Running /scripts/init-premount ... done. Begin: Mounting root file system ... Begin: Running /scripts/nfs-top ... done. Begin: Running /scripts/nfs-premount ... Waiting up to 60 secs for any ethernet to become available Device /sys/class/net/eth0 found done. IP-Config: eth0 hardware address 00:e0:4c:78:85:55 mtu 1500 DHCP IP-Config: eth0 complete (dhcp from 192.168.201.1): address: 192.168.201.11 broadcast: 192.168.201.255 netmask: 255.255.255.0 gateway: 192.168.201.1 dns0 : 192.168.201.1 dns1 : 0.0.0.0 host : hp-11A-G6-EE-grunt-cbg-8 domain : lava-rack rootserver: 192.168.201.1 rootpath: filename : [ 9.881206] nfsmount (146) used greatest stack depth: 12680 bytes left done. Begin: Running /scripts/nfs-bottom ... done. Begin: Running /scripts/init-bottom ... done. SELinux: Could not open policy file <= /etc/selinux/targeted/policy/policy.33: No such file or directory [ 11.134229] systemd[1]: systemd 247.3-7+deb11u1 running in system mode. (+PAM +AUDIT +SELINUX +IMA +APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS +ACL +XZ +LZ4 +ZSTD +SECCOMP +BLKID +ELFUTILS +KMOD +IDN2 -IDN +PCRE2 default-hierarchy=unified) [ 11.169390] systemd[1]: Detected architecture x86-64. Welcome to Debian GNU/Linux 11 (bullseye)! [ 11.205338] systemd[1]: Set hostname to . [ 11.794444] systemd[1]: Queued start job for default target Graphical Interface. [ 11.805665] systemd[1]: Created slice system-getty.slice. [ OK ] Created slice system-getty.slice. [ 11.821010] systemd[1]: Created slice system-modprobe.slice. [ OK ] Created slice system-modprobe.slice. [ 11.835911] systemd[1]: Created slice system-serial\x2dgetty.slice. [ OK ] Created slice system-serial\x2dgetty.slice. [ 11.851857] systemd[1]: Created slice User and Session Slice. [ OK ] Created slice User and Session Slice. [ 11.866763] systemd[1]: Started Dispatch Password Requests to Console Directory Watch. [ OK ] Started Dispatch Password …ts to Console Directory Watch. [ 11.883618] systemd[1]: Started Forward Password Requests to Wall Directory Watch. [ OK ] Started Forward Password R…uests to Wall Directory Watch. [ 11.901429] systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. [ OK ] Set up automount Arbitrary…s File System Automount Point. [ 11.920421] systemd[1]: Reached target Local Encrypted Volumes. [ OK ] Reached target Local Encrypted Volumes. [ 11.935406] systemd[1]: Reached target Paths. [ OK ] Reached target Paths. [ 11.946360] systemd[1]: Reached target Remote File Systems. [ OK ] Reached target Remote File Systems. [ 11.961361] systemd[1]: Reached target Slices. [ OK ] Reached target Slices. [ 11.972375] systemd[1]: Reached target Swap. [ OK ] Reached target Swap. [ 11.982779] systemd[1]: Listening on initctl Compatibility Named Pipe. [ OK ] Listening on initctl Compatibility Named Pipe. [ 11.999272] systemd[1]: Listening on Journal Audit Socket. [ OK ] Listening on Journal Audit Socket. [ 12.014265] systemd[1]: Listening on Journal Socket (/dev/log). [ OK ] Listening on Journal Socket (/dev/log). [ 12.029975] systemd[1]: Listening on Journal Socket. [ OK ] Listening on Journal Socket. [ 12.044223] systemd[1]: Listening on Network Service Netlink Socket. [ OK ] Listening on Network Service Netlink Socket. [ 12.060924] systemd[1]: Listening on udev Control Socket. [ OK ] Listening on udev Control Socket. [ 12.075803] systemd[1]: Listening on udev Kernel Socket. [ OK ] Listening on udev Kernel Socket. [ 12.089722] systemd[1]: Mounting Huge Pages File System... Mounting Huge Pages File System... [ 12.104555] systemd[1]: Mounting POSIX Message Queue File System... Mounting POSIX Message Queue File System... [ 12.123718] systemd[1]: Mounting Kernel Debug File System... Mounting Kernel Debug File System... [ 12.141200] systemd[1]: Mounting Kernel Trace File System... Mounting Kernel Trace File System... [ 12.166327] systemd[1]: Starting Create list of static device nodes for the current kernel... Starting Create list of st…odes for the current kernel... [ 12.186655] systemd[1]: Starting Load Kernel Module configfs... Starting Load Kernel Module configfs... [ 12.204803] systemd[1]: Starting Load Kernel Module drm... Starting Load Kernel Module drm... [ 12.224933] systemd[1]: Starting Load Kernel Module fuse... Starting Load Kernel Module fuse... [ 12.239722] systemd[1]: Condition check resulted in Set Up Additional Binary Formats being skipped. [ 12.256775] systemd[1]: Starting Journal Service... Starting Journal Service... [ 12.293169] fuse: init (API version 7.32) [ 12.293602] systemd[1]: Starting Load Kernel Modules... Starting Load Kernel Modules... [ 12.313422] systemd[1]: Starting Remount Root and Kernel File Systems... Starting Remount Root and Kernel File Systems... [ 12.344704] systemd[1]: Starting Coldplug All udev Devices... Starting Coldplug All udev Devices... [ 12.365316] systemd[1]: Mounted Huge Pages File System. [ OK ] Mounted Huge Pages File System. [ 12.381379] systemd[1]: Mounted POSIX Message Queue File System. [ OK ] Mounted POSIX Message Queue File System. [ 12.396512] systemd[1]: Mounted Kernel Debug File System. [ OK ] Mounted Kernel Debug File System. [ 12.413247] systemd[1]: Mounted Kernel Trace File System. [ OK ] Mounted Kernel Trace File System. [ 12.427791] systemd[1]: Finished Create list of static device nodes for the current kernel. [ OK ] Finished Create list of st… nodes for the current kernel. [ 12.452605] systemd[1]: modprobe@configfs.service: Succeeded. [ 12.460376] systemd[1]: Finished Load Kernel Module configfs. [ OK ] Finished Load Kernel Module configfs. [ 12.476735] systemd[1]: modprobe@drm.service: Succeeded. [ 12.484050] systemd[1]: Finished Load Kernel Module drm. [ OK ] Finished Load Kernel Module drm. [ 12.500650] systemd[1]: modprobe@fuse.service: Succeeded. [ 12.514503] systemd[1]: Finished Load Kernel Module fuse. [ OK ] Finished Load Kernel Module fuse. [ 12.537553] systemd[1]: Finished Load Kernel Modules. [ OK ] Finished Load Kernel Modules. [ 12.551329] systemd[1]: Finished Remount Root and Kernel File Systems. [ OK ] Finished Remount Root and Kernel File Systems. [ 12.575611] systemd[1]: Started Journal Service. [ OK ] Started Journal Service. Mounting FUSE Control File System... Mounting Kernel Configuration File System... Starting Flush Journal to Persistent Storage... Starting Load/Save Random Seed... Starting Apply Kernel Variables... Starting Create System Users... [ OK ] Mounted FUSE Control File System. [ OK ] Mounted Kernel Configuration File System.[ 12.678373] systemd-journald[181]: Received client request to flush runtime journal. [ OK ] Finished Load/Save Random Seed. [ OK ] Finished Apply Kernel Variables. [ OK ] Finished Create System Users. Starting Create Static Device Nodes in /dev... [ OK ] Finished Coldplug All udev Devices. [ OK ] Finished Flush Journal to Persistent Storage. [ 14.227670] systemd-tmpfile (192) used greatest stack depth: 12528 bytes left [ OK ] Finished Create Static Device Nodes in /dev. [ OK ] Reached target Local File Systems (Pre). [ OK ] Reached target Local File Systems. Starting Create Volatile Files and Directories... Starting Rule-based Manage…for Device Events and Files... [ OK ] Started Rule-based Manager for Device Events and Files. Starting Network Service... [ OK ] Finished Create Volatile Files and Directories. Starting Network Time Synchronization... Starting Update UTMP about System Boot/Shutdown... [ OK ] Finished Update UTMP about System Boot/Shutdown. [ OK ] Found device /dev/ttyS0. [ OK ] Started Network Time Synchronization. [ OK ] Reached target System Initialization. [ OK ] Started Daily Cleanup of Temporary Directories. [ OK ] Reached target System Time Set. [ OK ] Reached target System Time Synchronized. [ OK ] Started Daily apt download activities. [ OK ] Started Daily apt upgrade and clean activities. [ OK ] Started Periodic ext4 Onli…ata Check for All Filesystems. [ OK ] Started Discard unused blocks once a week. [ OK ] Reached target Timers. [ OK ] Listening on D-Bus System Message Bus Socket. [ OK ] Reached target Sockets. [ OK ] Reached target Basic System. [ OK ] Started D-Bus System Message Bus. Starting Remove Stale Onli…t4 Metadata Check Snapshots... Starting User Login Management... [ OK ] Started Network Service. [ OK ] Listening on Load/Save RF …itch Status /dev/rfkill Watch. Starting Network Name Resolution... [ OK ] Started User Login Management. [ OK ] Finished Remove Stale Onli…ext4 Metadata Check Snapshots. [ OK ] Started Network Name Resolution. [ OK ] Reached target Network. [ OK ] Reached target Host and Network Name Lookups. Starting Permit User Sessions... [ OK ] Finished Permit User Sessions. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Finished Update UTMP about System Runlevel Changes. Debian GNU/Linux 11 debian-bullseye-amd64 ttyS0 debian-bullseye-amd64 login: root (automatic login) Linux debian-bullseye-amd64 5.10.173-cip27 #1 SMP Sun Mar 12 07:45:06 UTC 2023 x86_64 The programs included with the Debian GNU/Linux system are free software; the exact distribution terms for each program are described in the individual files in /usr/share/doc/*/copyright. Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent permitted by applicable law. / # / # export NFS_ROOTFS='/var/lib/lava/dispatcher/tmp/9568431/extract-nfsrootfs-_svdva50' export NFS_ROOTFS='/var/lib/lava/dispatcher/tmp/9568431/extract-nfsrootfs-_svdva50' / # export NFS_SERVER_IP='192.168.201.1' export NFS_SERVER_IP='192.168.201.1' / # # # / # export SHELL=/bin/bash export SHELL=/bin/bash / # . /lava-9568431/environment . /lava-9568431/environment / # /lava-9568431/bin/lava-test-runner /lava-9568431/0 /lava-9568431/bin/lava-test-runner /lava-9568431/0 + export TESTRUN_ID=0_timesync-off + TESTRUN_ID=0_timesync-off + cd /lava-9568431/0/tests/0_timesync-off ++ cat uuid + UUID=9568431_1.5.2.3.1 + set +x + systemctl stop systemd-timesyncd + set +x + export TESTRUN_ID=1_kselftest-lkdtm + TESTRUN_ID=1_kselftest-lkdtm + cd /lava-9568431/0/tests/1_kselftest-lkdtm ++ cat uuid + UUID=9568431_1.5.2.3.5 + set +x + cd ./automated/linux/kselftest/ + ./kselftest.sh -c lkdtm -T '' -t kselftest_armhf.tar.gz -s True -u http://storage.kernelci.org/cip-gitlab/ci-iwamatsu-linux-5.10.y-cip-rc/v5.10.168-cip27-638-g0d599cd2b6695/x86_64/x86_64_defconfig+x86-chromebook+kselftest/gcc-10/kselftest.tar.xz -L '' -S skipfile-lkft.yaml -b hp-11A-G6-EE-grunt -g cip-gitlab -e '' -p /opt/kselftests/mainline/ -n 1 -i 1 INFO: Generating a skipfile based on /lava-9568431/0/tests/1_kselftest-lkdtm/automated/linux/kselftest/skipfile-lkft.yaml INFO: Using the following generated skipfile contents (until EOF): breakpoints:breakpoint_test breakpoints:step_after_suspend_test net:rtnetlink.sh net:tls netfilter:bridge_brouter.sh netfilter:nft_flowtable.sh netfilter:nft_trans_stress.sh pidfd:pidfd_wait INFO: EOF INFO: install_deps skipped --2023-03-12 08:11:26-- http://storage.kernelci.org/cip-gitlab/ci-iwamatsu-linux-5.10.y-cip-rc/v5.10.168-cip27-638-g0d599cd2b6695/x86_64/x86_64_defconfig+x86-chromebook+kselftest/gcc-10/kselftest.tar.xz Resolving storage.kernelci.org (storage.kernelci.org)... 52.250.1.28 Connecting to storage.kernelci.org (storage.kernelci.org)|52.250.1.28|:80... connected. HTTP request sent, awaiting response... 200 OK Length: 3379400 (3.2M) [application/octet-stream] Saving to: 'kselftest.tar.xz' kselftest.tar.xz 0%[ ] 0 --.-KB/s kselftest.tar.xz 1%[ ] 47.81K 165KB/s kselftest.tar.xz 6%[> ] 217.50K 374KB/s kselftest.tar.xz 27%[====> ] 894.83K 1.00MB/s kselftest.tar.xz 41%[=======> ] 1.35M 1.23MB/s kselftest.tar.xz 77%[==============> ] 2.51M 1.70MB/s kselftest.tar.xz 93%[=================> ] 3.00M 1.78MB/s kselftest.tar.xz 100%[===================>] 3.22M 1.76MB/s in 1.8s 2023-03-12 08:11:28 (1.76 MB/s) - 'kselftest.tar.xz' saved [3379400/3379400] skiplist: ======================================== breakpoints:breakpoint_test breakpoints:step_after_suspend_test net:rtnetlink.sh net:tls netfilter:bridge_brouter.sh netfilter:nft_flowtable.sh netfilter:nft_trans_stress.sh pidfd:pidfd_wait ======================================== lkdtm:PANIC.sh lkdtm:BUG.sh lkdtm:WARNING.sh lkdtm:WARNING_MESSAGE.sh lkdtm:EXCEPTION.sh lkdtm:LOOP.sh lkdtm:EXHAUST_STACK.sh lkdtm:CORRUPT_STACK.sh lkdtm:CORRUPT_STACK_STRONG.sh lkdtm:CORRUPT_LIST_ADD.sh lkdtm:CORRUPT_LIST_DEL.sh lkdtm:STACK_GUARD_PAGE_LEADING.sh lkdtm:STACK_GUARD_PAGE_TRAILING.sh lkdtm:UNSET_SMEP.sh lkdtm:DOUBLE_FAULT.sh lkdtm:CORRUPT_PAC.sh lkdtm:UNALIGNED_LOAD_STORE_WRITE.sh lkdtm:OVERWRITE_ALLOCATION.sh lkdtm:WRITE_AFTER_FREE.sh lkdtm:READ_AFTER_FREE.sh lkdtm:WRITE_BUDDY_AFTER_FREE.sh lkdtm:READ_BUDDY_AFTER_FREE.sh lkdtm:SLAB_FREE_DOUBLE.sh lkdtm:SLAB_FREE_CROSS.sh lkdtm:SLAB_FREE_PAGE.sh lkdtm:SOFTLOCKUP.sh lkdtm:HARDLOCKUP.sh lkdtm:SPINLOCKUP.sh lkdtm:HUNG_TASK.sh lkdtm:EXEC_DATA.sh lkdtm:EXEC_STACK.sh lkdtm:EXEC_KMALLOC.sh lkdtm:EXEC_VMALLOC.sh lkdtm:EXEC_RODATA.sh lkdtm:EXEC_USERSPACE.sh lkdtm:EXEC_NULL.sh lkdtm:ACCESS_USERSPACE.sh lkdtm:ACCESS_NULL.sh lkdtm:WRITE_RO.sh lkdtm:WRITE_RO_AFTER_INIT.sh lkdtm:WRITE_KERN.sh lkdtm:REFCOUNT_INC_OVERFLOW.sh lkdtm:REFCOUNT_ADD_OVERFLOW.sh lkdtm:REFCOUNT_INC_NOT_ZERO_OVERFLOW.sh lkdtm:REFCOUNT_ADD_NOT_ZERO_OVERFLOW.sh lkdtm:REFCOUNT_DEC_ZERO.sh lkdtm:REFCOUNT_DEC_NEGATIVE.sh lkdtm:REFCOUNT_DEC_AND_TEST_NEGATIVE.sh lkdtm:REFCOUNT_SUB_AND_TEST_NEGATIVE.sh lkdtm:REFCOUNT_INC_ZERO.sh lkdtm:REFCOUNT_ADD_ZERO.sh lkdtm:REFCOUNT_INC_SATURATED.sh lkdtm:REFCOUNT_DEC_SATURATED.sh lkdtm:REFCOUNT_ADD_SATURATED.sh lkdtm:REFCOUNT_INC_NOT_ZERO_SATURATED.sh lkdtm:REFCOUNT_ADD_NOT_ZERO_SATURATED.sh lkdtm:REFCOUNT_DEC_AND_TEST_SATURATED.sh lkdtm:REFCOUNT_SUB_AND_TEST_SATURATED.sh lkdtm:REFCOUNT_TIMING.sh lkdtm:ATOMIC_TIMING.sh lkdtm:USERCOPY_HEAP_SIZE_TO.sh lkdtm:USERCOPY_HEAP_SIZE_FROM.sh lkdtm:USERCOPY_HEAP_WHITELIST_TO.sh lkdtm:USERCOPY_HEAP_WHITELIST_FROM.sh lkdtm:USERCOPY_STACK_FRAME_TO.sh lkdtm:USERCOPY_STACK_FRAME_FROM.sh lkdtm:USERCOPY_STACK_BEYOND.sh lkdtm:USERCOPY_KERNEL.sh lkdtm:STACKLEAK_ERASING.sh lkdtm:CFI_FORWARD_PROTO.sh ============== Tests to run =============== lkdtm:PANIC.sh lkdtm:BUG.sh lkdtm:WARNING.sh lkdtm:WARNING_MESSAGE.sh lkdtm:EXCEPTION.sh lkdtm:LOOP.sh lkdtm:EXHAUST_STACK.sh lkdtm:CORRUPT_STACK.sh lkdtm:CORRUPT_STACK_STRONG.sh lkdtm:CORRUPT_LIST_ADD.sh lkdtm:CORRUPT_LIST_DEL.sh lkdtm:STACK_GUARD_PAGE_LEADING.sh lkdtm:STACK_GUARD_PAGE_TRAILING.sh lkdtm:UNSET_SMEP.sh lkdtm:DOUBLE_FAULT.sh lkdtm:CORRUPT_PAC.sh lkdtm:UNALIGNED_LOAD_STORE_WRITE.sh lkdtm:OVERWRITE_ALLOCATION.sh lkdtm:WRITE_AFTER_FREE.sh lkdtm:READ_AFTER_FREE.sh lkdtm:WRITE_BUDDY_AFTER_FREE.sh lkdtm:READ_BUDDY_AFTER_FREE.sh lkdtm:SLAB_FREE_DOUBLE.sh lkdtm:SLAB_FREE_CROSS.sh lkdtm:SLAB_FREE_PAGE.sh lkdtm:SOFTLOCKUP.sh lkdtm:HARDLOCKUP.sh lkdtm:SPINLOCKUP.sh lkdtm:HUNG_TASK.sh lkdtm:EXEC_DATA.sh lkdtm:EXEC_STACK.sh lkdtm:EXEC_KMALLOC.sh lkdtm:EXEC_VMALLOC.sh lkdtm:EXEC_RODATA.sh lkdtm:EXEC_USERSPACE.sh lkdtm:EXEC_NULL.sh lkdtm:ACCESS_USERSPACE.sh lkdtm:ACCESS_NULL.sh lkdtm:WRITE_RO.sh lkdtm:WRITE_RO_AFTER_INIT.sh lkdtm:WRITE_KERN.sh lkdtm:REFCOUNT_INC_OVERFLOW.sh lkdtm:REFCOUNT_ADD_OVERFLOW.sh lkdtm:REFCOUNT_INC_NOT_ZERO_OVERFLOW.sh lkdtm:REFCOUNT_ADD_NOT_ZERO_OVERFLOW.sh lkdtm:REFCOUNT_DEC_ZERO.sh lkdtm:REFCOUNT_DEC_NEGATIVE.sh lkdtm:REFCOUNT_DEC_AND_TEST_NEGATIVE.sh lkdtm:REFCOUNT_SUB_AND_TEST_NEGATIVE.sh lkdtm:REFCOUNT_INC_ZERO.sh lkdtm:REFCOUNT_ADD_ZERO.sh lkdtm:REFCOUNT_INC_SATURATED.sh lkdtm:REFCOUNT_DEC_SATURATED.sh lkdtm:REFCOUNT_ADD_SATURATED.sh lkdtm:REFCOUNT_INC_NOT_ZERO_SATURATED.sh lkdtm:REFCOUNT_ADD_NOT_ZERO_SATURATED.sh lkdtm:REFCOUNT_DEC_AND_TEST_SATURATED.sh lkdtm:REFCOUNT_SUB_AND_TEST_SATURATED.sh lkdtm:REFCOUNT_TIMING.sh lkdtm:ATOMIC_TIMING.sh lkdtm:USERCOPY_HEAP_SIZE_TO.sh lkdtm:USERCOPY_HEAP_SIZE_FROM.sh lkdtm:USERCOPY_HEAP_WHITELIST_TO.sh lkdtm:USERCOPY_HEAP_WHITELIST_FROM.sh lkdtm:USERCOPY_STACK_FRAME_TO.sh lkdtm:USERCOPY_STACK_FRAME_FROM.sh lkdtm:USERCOPY_STACK_BEYOND.sh lkdtm:USERCOPY_KERNEL.sh lkdtm:STACKLEAK_ERASING.sh lkdtm:CFI_FORWARD_PROTO.sh ===========End Tests to run =============== [ 31.919773] kselftest: Running tests in lkdtm TAP version 13 1..70 # selftests: lkdtm: PANIC.sh # Skipping PANIC: crashes entire system ok 1 selftests: lkdtm: PANIC.sh # SKIP # selftests: lkdtm: BUG.sh [ 32.238282] lkdtm: Performing direct entry BUG [ 32.242884] ------------[ cut here ]------------ [ 32.247813] kernel BUG at drivers/misc/lkdtm/bugs.c:76! [ 32.253064] invalid opcode: 0000 [#1] SMP NOPTI [ 32.257592] CPU: 1 PID: 615 Comm: cat Tainted: G W 5.10.173-cip27 #1 [ 32.265235] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 [ 32.271150] RIP: 0010:lkdtm_BUG+0x5/0x10 [ 32.275066] Code: 89 ff e8 ae 5b a2 ff 48 c7 c0 ea ff ff ff eb de 48 c7 c0 ea ff ff ff e9 29 f0 90 00 48 c7 c0 f4 ff ff ff eb c9 0f 1f 44 00 00 <0f> 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 05 90 8d 9f 02 [ 32.293803] RSP: 0018:ffffa2144080be60 EFLAGS: 00010286 [ 32.299019] RAX: ffffffff8a0f5960 RBX: 0000000000000001 RCX: 0000000000000000 [ 32.306141] RDX: 0000000000000000 RSI: ffff9608ead1bf70 RDI: ffffffff8aed5a70 [ 32.313263] RBP: ffffffff8b333438 R08: 0000000000000001 R09: 0000000000000001 [ 32.320386] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000004 [ 32.327508] R13: ffffa2144080bf10 R14: ffffa2144080bf10 R15: ffff9608c6225000 [ 32.334630] FS: 00007f0fb369c580(0000) GS:ffff9608ead00000(0000) knlGS:0000000000000000 [ 32.342706] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 32.348442] CR2: 00007f0fb349c000 CR3: 0000000106214000 CR4: 00000000001506e0 [ 32.355563] Call Trace: [ 32.358008] direct_entry.cold+0x2c/0x38 [ 32.361928] full_proxy_write+0x56/0x80 [ 32.365759] vfs_write+0xea/0x3b0 [ 32.369068] ksys_write+0x68/0xf0 [ 32.372381] do_syscall_64+0x33/0x40 [ 32.375952] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 32.380996] RIP: 0033:0x7f0fb35a9833 [ 32.384565] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 32.403300] RSP: 002b:00007ffefc9294d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 32.410857] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007f0fb35a9833 [ 32.417979] RDX: 0000000000000004 RSI: 00007f0fb349c000 RDI: 0000000000000001 [ 32.425101] RBP: 00007f0fb349c000 R08: 00007f0fb349b010 R09: 0000000000000000 [ 32.432221] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 32.439343] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 [ 32.446468] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table coreboot-56f9d1cd49 Thu Sep 5 21:57:06 UTC 2019 smm starting... SMI# #1 GSMI Set Event Log (type=0xdead instance=0x3) FMAP: Found "FLASH" version 1.1 at d7f000. FMAP: base = ff000000 size = 1000000 #areas = 30 FMAP: area RW_ELOG found @ 45d000 (16384 bytes) Manufacturer: ef SF: Detected W25Q128FW with sector size 0x1000, total 0x1000000 ELOG: NV offset 0x45d000 size 0x4000 ELOG: area is 4096 bytes, full threshold 3842, shrink size 1024 ELOG: Event(81) added with size 13 at 2023-03-12 08:11:38 UTC [ 32.521001] gsmi: Log Shutdown Reason 0x03 [ 32.525112] ---[ end trace 3c547c3eb0d57e35 ]--- [ 32.529742] RIP: 0010:lkdtm_BUG+0x5/0x10 [ 32.533670] Code: 89 ff e8 ae 5b a2 ff 48 c7 c0 ea ff ff ff eb de 48 c7 c0 ea ff ff ff e9 29 f0 90 00 48 c7 c0 f4 ff ff ff eb c9 0f 1f 44 00 00 <0f> 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 05 90 8d 9f 02 [ 32.552419] RSP: 0018:ffffa2144080be60 EFLAGS: 00010286 [ 32.557647] RAX: ffffffff8a0f5960 RBX: 0000000000000001 RCX: 0000000000000000 [ 32.564777] RDX: 0000000000000000 RSI: ffff9608ead1bf70 RDI: ffffffff8aed5a70 [ 32.571905] RBP: ffffffff8b333438 R08: 0000000000000001 R09: 0000000000000001 [ 32.579035] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000004 [ 32.586162] R13: ffffa2144080bf10 R14: ffffa2144080bf10 R15: ffff9608c6225000 [ 32.593292] FS: 00007f0fb369c580(0000) GS:ffff9608ead00000(0000) knlGS:0000000000000000 [ 32.601388] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 32.607136] CR2: 00007f0fb349c000 CR3: 0000000106214000 CR4: 00000000001506e0 # Segmentation fault # [ 32.238282] lkdtm: Performing direct entry BUG # [ 32.242884] ------------[ cut here ]------------ # [ 32.247813] kernel BUG at drivers/misc/lkdtm/bugs.c:76! # [ 32.253064] invalid opcode: 0000 [#1] SMP NOPTI # [ 32.257592] CPU: 1 PID: 615 Comm: cat Tainted: G W 5.10.173-cip27 #1 # [ 32.265235] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 32.271150] RIP: 0010:lkdtm_BUG+0x5/0x10 # [ 32.275066] Code: 89 ff e8 ae 5b a2 ff 48 c7 c0 ea ff ff ff eb de 48 c7 c0 ea ff ff ff e9 29 f0 90 00 48 c7 c0 f4 ff ff ff eb c9 0f 1f 44 00 00 <0f> 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 05 90 8d 9f 02 # [ 32.293803] RSP: 0018:ffffa2144080be60 EFLAGS: 00010286 # [ 32.299019] RAX: ffffffff8a0f5960 RBX: 0000000000000001 RCX: 0000000000000000 # [ 32.306141] RDX: 0000000000000000 RSI: ffff9608ead1bf70 RDI: ffffffff8aed5a70 # [ 32.313263] RBP: ffffffff8b333438 R08: 0000000000000001 R09: 0000000000000001 # [ 32.320386] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000004 # [ 32.327508] R13: ffffa2144080bf10 R14: ffffa2144080bf10 R15: ffff9608c6225000 # [ 32.334630] FS: 00007f0fb369c580(0000) GS:ffff9608ead00000(0000) knlGS:0000000000000000 # [ 32.342706] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 32.348442] CR2: 00007f0fb349c00[ 32.752013] lkdtm: Performing direct entry WARNING 0 CR3: 0000000106214000 CR4: 00000000001506e0 # [ 32.355563] Call Trace: # [ 32.358008] direct_entry.cold+0x2c/0x38 # [ 32.361928] full_proxy_write+0x56/0x80 # [ 32.365759] vfs_write+0xea/0x3b0 # [ 32.369068] ksys_write+0x68/0xf0 # [ [ 32.757558] ------------[ cut here ]------------ 32.372381] do_syscall_64+0x33/0x40 # [ 32.375952] entry_SYSCALL_64_after_hwframe+0x61/0xc6 # [ 32.380996] RIP: 0033:0x7f0fb35a9833 # [ 32.384565] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 [ 32.784329] WARNING: CPU: 0 PID: 652 at drivers/misc/lkdtm/bugs.c:83 lkdtm_WARNING+0x13/0x20 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 # [ 32.403300] RSP: 002b:00007ffefc9294d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 # [ 32.410857] RAX: ffffffffffffffda RBX: 0000000000000004 RCX:[ 32.814949] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table 00007f0fb35a9833 # [ 32.417979] RDX: 0000000000000004 RSI: 00007f0fb349c000 RDI: 0000000000000001 # [ 32.425101] RBP: 00007f0fb349c000 R08: 00007f0fb349b010 R09: 0000000000000000 # [ 32.432221] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 000[ 32.862447] CPU: 0 PID: 652 Comm: cat Tainted: G D W 5.10.173-cip27 #1 0000000000001 # [ 32.439343] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # [ 32.446468] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi u[ 32.892287] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 vcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table # [ 32.521001] gsmi: Log Shutdown Reason 0x03 # [ 32.525112] ---[ end trace 3c547c3eb0d57e35 ]--- # [ 32.529742[ 32.920368] RIP: 0010:lkdtm_WARNING+0x13/0x20 ] RIP: 0010:lkdtm_BUG+0x5/0x10 # [ 32.533670] Code: 89 ff e8 ae 5b a2 ff 48 c7 c0 ea ff ff ff eb de 48 c7 c0 ea ff ff ff e9 29 f0 90 00 48 c7 c0 f4 ff ff ff eb c9 0f 1f 44 00 00 <0f> 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 05 90 8d 9f 02 # [ [ 32.946974] Code: c0 f4 ff ff ff eb c9 0f 1f 44 00 00 0f 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 05 90 8d 9f 02 01 75 05 e9 fd ef 90 00 <0f> 0b e9 f6 ef 90 00 66 0f 1f 44 00 00 0f 1f 44 00 00 8b 05 71 8d 32.552419] RSP: 0018:ffffa2144080be60 EFLAGS: 00010286 # [ 32.557647] RAX: ffffffff8a0f5960 RBX: 0000000000000001 RCX: 0000000000000000 # [ 32.564777] RDX: 0000000000000000 RSI: ffff9608ead1bf70 RDI: ffffffff8aed5a70 # [ 32.571905] RBP: ffffffff8b[ 32.987833] RSP: 0018:ffffa2144086be60 EFLAGS: 00010202 333438 R08: 0000000000000001 R09: 0000000000000001 # [ 32.579035] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000004 # [ 32.586162] R13: ffffa2144080bf10 R14: ffffa2144080bf10 R15: ffff9608c6225000 # [ 32.593292] FS: 00007f0fb369c5[ 33.015302] RAX: ffffffff8a0f5970 RBX: 0000000000000002 RCX: 0000000000000000 80(0000) GS:ffff9608ead00000(0000) knlGS:0000000000000000 # [ 32.601388] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 32.607136] CR2: 00007f0fb349c000 CR3: 0000000106214000 CR4: 00000000001506e0 # BUG: saw 'kernel BUG at': ok ok 2 selftest[ 33.044565] RDX: 0000000000000000 RSI: ffff9608eac1bf70 RDI: ffffffff8aed5a80 s: lkdtm: BUG.sh # selftests: lkdtm: WARNING.sh [ 33.073920] RBP: ffffffff8b2cecf7 R08: 0000000000000000 R09: 0000000000000000 [ 33.085332] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000008 [ 33.092489] R13: ffffa2144086bf10 R14: ffffa2144086bf10 R15: ffff9608c61a2000 [ 33.099635] FS: 00007ff9009fd580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 33.107731] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 33.113488] CR2: 00007ff9007cc000 CR3: 0000000103904000 CR4: 00000000001506f0 [ 33.120641] Call Trace: [ 33.123115] direct_entry.cold+0x2c/0x38 [ 33.127057] full_proxy_write+0x56/0x80 [ 33.130911] vfs_write+0xea/0x3b0 [ 33.134247] ksys_write+0x68/0xf0 [ 33.137582] do_syscall_64+0x33/0x40 [ 33.141186] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 33.146256] RIP: 0033:0x7ff9008d9833 [ 33.149851] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 33.168614] RSP: 002b:00007ffcd8952b48 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 33.176204] RAX: ffffffffffffffda RBX: 0000000000000008 RCX: 00007ff9008d9833 [ 33.183362] RDX: 0000000000000008 RSI: 00007ff9007cc000 RDI: 0000000000000001 [ 33.190507] RBP: 00007ff9007cc000 R08: 00007ff9007cb010 R09: 0000000000000000 [ 33.197647] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 33.204802] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 [ 33.211943] irq event stamp: 0 [ 33.215000] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 33.221260] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 [ 33.229428] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 [ 33.237616] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 33.243882] ---[ end trace 3c547c3eb0d57e36 ]--- # [ 32.752013] lkdtm: Performing direct entry WARNING # [ 32.757558] ------------[ cut here ]------------ # [ 32.784329] WARNING: CPU: 0 PID: 652 at drivers/misc/lkdtm/bugs.c:83 lkdtm_WARNING+0x13/0x20 # [ 32.814949] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table # [ 32.862447] CPU: 0 PID: 652 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 32.892287] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 32.920368] RIP: 0010:lkdtm_WARNING+0x13/0x20 # [ 32.946974] Code: c0 f4 ff ff ff eb c9 0f 1f 44 00 00 0f 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 05 90 8d 9f 02 01 75 05 e9 fd ef 90 00 <0f> 0b e9 f6 ef 90 00 66 0f 1f 44 00 00 0f 1f 44 00 00 8b 05 71 8d # [ 32.987833] RSP: 0018:ffffa2144086be60 EFLAGS: 00010202 # [ 33.015302] RAX: ffffffff8a0f5970 RBX: 0000000000000002 RCX: 0000000000000000 # [ 33.044565] RDX: 0000000000000000 RSI: ffff9608eac1bf70 RDI: ffffffff8aed5a80 # [ 33.073920] RBP: ffffffff8b2cecf7 R08: 0000000000000000 R09: 0000000000000000 # [ 33.085332] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000008 # [ 33.092489] R13: ffffa2144086bf10 R14: ffffa2144086bf10 R15: ffff9608c61a2000 # [ 33.099635] FS: 00007ff9009fd580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 33.107731] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 33.1[ 33.384821] lkdtm: Performing direct entry WARNING_MESSAGE 13488] CR2: 00007ff9007cc000 CR3: 0000000103904000 CR4: 00000000001506f0 # [ 33.120641] Call Trace: # [ 33.123115] direct_entry.cold+0x2c/0x38 # [ 33.127057] full_proxy_write+0x56/0x80 # [ 33.130911] vfs_write+0xea/0x3b0 # [ 33.134247] k[ 33.407906] ------------[ cut here ]------------ sys_write+0x68/0xf0 # [ 33.137582] do_syscall_64+0x33/0x40 # [ 33.141186] entry_SYSCALL_64_after_hwframe+0x61/0xc6 # [ 33.146256] RIP: 0033:0x7ff9008d9833 # [ 33.149851] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f [ 33.434717] Warning message trigger count: 2 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 # [ 33.168614] RSP: 002b:00007ffcd8952b48 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 # [ 33.176204] RAX: ffffffffffffffda[ 33.461220] WARNING: CPU: 0 PID: 687 at drivers/misc/lkdtm/bugs.c:88 lkdtm_WARNING_MESSAGE+0x20/0x30 RBX: 0000000000000008 RCX: 00007ff9008d9833 # [ 33.183362] RDX: 0000000000000008 RSI: 00007ff9007cc000 RDI: 0000000000000001 # [ 33.190507] RBP: 00007ff9007cc000 R08: 00007ff9007cb010 R09: 0000000000000000 # [ 33.197647] R10: fffffffffffffbc5 R11[ 33.492437] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table : 0000000000000246 R12: 0000000000000001 # [ 33.204802] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # [ 33.211943] irq event stamp: 0 # [ 33.215000] hardirqs last enabled at (0): [<0000000000000000>] 0x0 # [ 33.221260] ha[ 33.539962] CPU: 0 PID: 687 Comm: cat Tainted: G D W 5.10.173-cip27 #1 rdirqs last disabled at (0): [] copy_process+0x664/0x1cb0 # [ 33.229428] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 # [ 33.237616] softirqs last disabled at (0): [<0000000000000000>] 0x0 # [ 33.[ 33.569828] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 243882] ---[ end trace 3c547c3eb0d57e36 ]--- # WARNING: saw 'WARNING:': ok ok 3 selftests: lkdtm: WARNING.sh # selftests: lkdtm: WARNING_MESSAGE.sh [ 33.598015] RIP: 0010:lkdtm_WARNING_MESSAGE+0x20/0x30 [ 33.616131] Code: f6 ef 90 00 66 0f 1f 44 00 00 0f 1f 44 00 00 8b 05 71 8d 9f 02 48 c7 c7 58 f2 2c 8b 8d 70 01 89 35 61 8d 9f 02 e8 4d 4d 65 00 <0f> 0b e9 c9 ef 90 00 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 c7 [ 33.634950] RSP: 0018:ffffa214408f3e60 EFLAGS: 00010286 [ 33.640211] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 [ 33.647410] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 [ 33.654569] RBP: ffffffff8b2cecff R08: 0000000000000000 R09: 0000000000000000 [ 33.661736] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000010 [ 33.668880] R13: ffffa214408f3f10 R14: ffffa214408f3f10 R15: ffff9608c3608000 [ 33.676042] FS: 00007fb1027f33c0(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 33.684139] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 33.689921] CR2: 00007fb1025c4000 CR3: 000000010442c000 CR4: 00000000001506f0 [ 33.697076] Call Trace: [ 33.699571] direct_entry.cold+0x2c/0x38 [ 33.703515] full_proxy_write+0x56/0x80 [ 33.707421] vfs_write+0xea/0x3b0 [ 33.710785] ksys_write+0x68/0xf0 [ 33.714169] do_syscall_64+0x33/0x40 [ 33.717798] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 33.722929] RIP: 0033:0x7fb1026d1833 [ 33.726614] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 33.745397] RSP: 002b:00007ffe6fecd2b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 33.753019] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00007fb1026d1833 [ 33.760200] RDX: 0000000000000010 RSI: 00007fb1025c4000 RDI: 0000000000000001 [ 33.767375] RBP: 00007fb1025c4000 R08: 00007fb1025c3010 R09: 0000000000000000 [ 33.774544] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 33.781712] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 [ 33.788878] irq event stamp: 0 [ 33.791968] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 33.798268] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 [ 33.806471] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 [ 33.814658] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 33.820933] ---[ end trace 3c547c3eb0d57e37 ]--- # [ 33.384821] lkdtm: Performing direct entry WARNING_MESSAGE # [ 33.407906] ------------[ cut here ]------------ # [ 33.434717] Warning message trigger count: 2 # [ 33.461220] WARNING: CPU: 0 PID: 687 at drivers/misc/lkdtm/bugs.c:88 lkdtm_WARNING_MESSAGE+0x20/0x30 # [ 33.492437] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table # [ 33.539962] CPU: 0 PID: 687 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 33.569828] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 33.598015] RIP: 0010:lkdtm_WARNING_MESSAGE+0x20/0x30 # [ 33.616131] Code: f6 ef 90 00 66 0f 1f 44 00 00 0f 1f 44 00 00 8b 05 71 8d 9f 02 48 c7 c7 58 f2 2c 8b 8d 70 01 89 35 61 8d 9f 02 e8 4d 4d 65 00 <0f> 0b e9 c9 ef 90 00 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 c7 # [ 33.634950] RSP: 0018:ffffa214408f3e60 EFLAGS: 00010286 # [ 33.640211] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 # [ 33.647410] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 # [ 33.654569] RBP: ffffffff8b2cecff R08: 0000000000000000 R09: 0000000000000000 # [ 33.6[ 33.956360] lkdtm: Performing direct entry EXCEPTION 61736] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000010 # [ 33.668880] R13: ffffa214408f3f10 R14: ffffa214408f3f10 R15: ffff9608c3608000 # [ 33.676042] FS: 00007fb1027f33c0(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [[ 33.962040] BUG: kernel NULL pointer dereference, address: 0000000000000000 33.684139] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 33.689921] CR2: 00007fb1025c4000 CR3: 000000010442c000 CR4: 00000000001506f0 # [ 33.697076] Call Trace: # [ 33.699571] direct_entry.cold+0x2c/0x38 # [ 33.703515] full_proxy_w[ 33.991141] #PF: supervisor write access in kernel mode [ 34.018539] #PF: error_code(0x0002) - not-present page rite+0x56/0x80 # [ 33.707421] vfs_write+0xea/0x3b0 # [ 33.710785] ksys_write+0x68/0xf0 # [ 33.714169] do_syscall_64+0x33/0x40 # [ 33.717798] entry_SYSCALL_64_after_hwframe+0x61/0xc6 # [ 33.722929] RIP: 0033:0x7fb1026d1833 # [ 33.72661[ 34.023669] PGD 0 P4D 0 4] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 # [ 33.745397] RSP: 002b:00007ffe6fecd2b8 EFLAGS: [ 34.048383] Oops: 0002 [#2] SMP NOPTI 00000246 ORIG_RAX: 0000000000000001 # [ 33.753019] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00007fb1026d1833 # [ 33.760200] RDX: 0000000000000010 RSI: 00007fb1025c4000 RDI: 0000000000000001 # [ 33.767375] RBP: 00007fb1025c4000 R08: 00007fb[ 34.074226] CPU: 0 PID: 719 Comm: cat Tainted: G D W 5.10.173-cip27 #1 [ 34.104054] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 1025c3010 R09: 0000000000000000 # [ 33.774544] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 # [ 33.781712] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # [ 33.788878] irq event stamp: 0 # [ 33.791968] h[ 34.109968] RIP: 0010:lkdtm_EXCEPTION+0x5/0x20 ar[dirqs last enabled at (0): [<0000000000000000>] 0x0 # [ 33.798268] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 # [ 33.806471] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 # [ 33 34.136583] Code: 48 c7 c7 58 f2 2c 8b 8d 70 01 89 35 61 8d 9f 02 e8 4d 4d 65 00 0f 0b e9 c9 ef 90 00 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 04 25 00 00 00 00 00 00 00 00 e9 ab ef 90 00 66 66 2e 0f 1f 84 .8[14658] softirqs last disabled at (0): [<0000000000000000>] 0x0 # [ 33.820933] ---[ end trace 3c547c3eb0d57e37 ]--- # WARNING_MESSAGE: saw 'message trigger': ok ok 4 selftests: lkdtm: WARNING_MESSAGE.sh # selftests: lkdtm: EXCEPTION.sh 34.177505] RSP: 0018:ffffa2144095be60 EFLAGS: 00010286 [ 34.203869] RAX: ffffffff8a0f59c0 RBX: 0000000000000004 RCX: 0000000000000000 [ 34.210990] RDX: 0000000000000000 RSI: ffff9608eac1bf70 RDI: ffffffff8aed5aa0 [ 34.218111] RBP: ffffffff8b2025ff R08: 0000000000000000 R09: 0000000000000000 [ 34.225232] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 000000000000000a [ 34.232353] R13: ffffa2144095bf10 R14: ffffa2144095bf10 R15: ffff9608c3921000 [ 34.239475] FS: 00007fbf82f2c580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 34.247553] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 34.253288] CR2: 0000000000000000 CR3: 000000010609c000 CR4: 00000000001506f0 [ 34.260409] Call Trace: [ 34.262857] direct_entry.cold+0x2c/0x38 [ 34.266779] full_proxy_write+0x56/0x80 [ 34.270612] vfs_write+0xea/0x3b0 [ 34.273922] ksys_write+0x68/0xf0 [ 34.277234] do_syscall_64+0x33/0x40 [ 34.280805] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 34.285850] RIP: 0033:0x7fbf82e39833 [ 34.289421] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 34.308155] RSP: 002b:00007ffd4a6648e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 34.315712] RAX: ffffffffffffffda RBX: 000000000000000a RCX: 00007fbf82e39833 [ 34.322833] RDX: 000000000000000a RSI: 00007fbf82d2c000 RDI: 0000000000000001 [ 34.329954] RBP: 00007fbf82d2c000 R08: 00007fbf82d2b010 R09: 0000000000000000 [ 34.337075] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 34.344196] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 [ 34.351321] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table [ 34.376665] CR2: 0000000000000000 [ 34.380035] ---[ end trace 3c547c3eb0d57e38 ]--- [ 34.384670] RIP: 0010:lkdtm_BUG+0x5/0x10 [ 34.388712] Code: 89 ff e8 ae 5b a2 ff 48 c7 c0 ea ff ff ff eb de 48 c7 c0 ea ff ff ff e9 29 f0 90 00 48 c7 c0 f4 ff ff ff eb c9 0f 1f 44 00 00 <0f> 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 05 90 8d 9f 02 [ 34.407491] RSP: 0018:ffffa2144080be60 EFLAGS: 00010286 [ 34.412787] RAX: ffffffff8a0f5960 RBX: 0000000000000001 RCX: 0000000000000000 [ 34.419966] RDX: 0000000000000000 RSI: ffff9608ead1bf70 RDI: ffffffff8aed5a70 [ 34.427147] RBP: ffffffff8b333438 R08: 0000000000000001 R09: 0000000000000001 [ 34.434321] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000004 [ 34.441497] R13: ffffa2144080bf10 R14: ffffa2144080bf10 R15: ffff9608c6225000 [ 34.448669] FS: 00007fbf82f2c580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 34.456799] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 34.462588] CR2: 0000000000000000 CR3: 000000010609c000 CR4: 00000000001506f0 # Killed # [ 33.956360] lkdtm: Performing direct entry EXCEPTION # [ 33.962040] BUG: kernel NULL pointer dereference, address: 0000000000000000 # [ 33.991141] #PF: supervisor write access in kernel mode # [ 34.018539] #PF: error_code(0x0002) - not-present page # [ 34.023669] PGD 0 P4D 0 # [ 34.048383] Oops: 0002 [#2] SMP NOPTI # [ 34.074226] CPU: 0 PID: 719 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 34.104054] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 34.109968] RIP: 0010:lkdtm_EXCEPTION+0x5/0x20 # [ 34.136583] Code: 48 c7 c7 58 f2 2c 8b 8d 70 01 89 35 61 8d 9f 02 e8 4d 4d 65 00 0f 0b e9 c9 ef 90 00 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 04 25 00 00 00 00 00 00 00 00 e9 ab ef 90 00 66 66 2e 0f 1f 84 # [ 34.177505] RSP: 0018:ffffa2144095be60 EFLAGS: 00010286 # [ 34.203869] RAX: ffffffff8a0f59c0 RBX: 0000000000000004 RCX: 0000000000000000 # [ 34.210990] RDX: 0000000000000000 RSI: ffff9608eac1bf70 RDI: ffffffff8aed5aa0 # [ 34.218111] RBP: ffffffff8b2025ff R08: 0000000000000000 R09: 0000000000000000 # [ 34.225232] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 000000000000000a # [ 34.232353] R13: ffffa2144095bf10 R14: ffffa2144095bf10 R15: ffff9608c3921000 # [ 34.239475] FS: 00007fbf82f2c580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 34.247553] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 34.253288] CR2: 0000000000000000 CR3: 000000010609c000 CR4: 00000000001506f0 # [ 34.260409] Call Trace: # [ 34.262857] direct_entry.cold+0x2c/0x38 # [ 34.266779] full_proxy_write+0x56/0x80 # [ 34.270612] vfs_write+0xea/0x3b0 # [ 34.273922] ksys_write+0x68/0xf0 # [ 34.277234] do_syscall_64+0x33/0x40 # [ 34.280805] entry_SYSCALL_64_after_hwframe+0x61/0xc6 # [ 34.285850] RIP: 0033:0x7fbf82e39833 # [ 34.289421] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 # [ 34.308155] RSP: 002b:00007ffd4a6648e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 # [ 34.315712] RAX: ffffffffffffffda RBX: 000000000000000a RCX: 00007fbf82e39833 # [ 34.322833] RDX: 000000000000000a RSI: 00007fbf82d2c000 RDI: 0000000000000001 # [ 34.329954] RBP: 00007fbf82d2c000 R08: 00007fbf82d2b010 R09: 0000000000000000 # [ 34.337075] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 # [ 34.344196] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # [ 34.351321] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table # [ 34.376665] CR2: 0000000000000000 # [ 34.380035] ---[ end trace 3c547c3eb0d57e38 ]--- # [ 34.384670] RIP: 0010:lkdtm_BUG+0x5/0x10 # [ 34.388712] Code: 89 ff e8 ae 5b a2 ff 48 c7 c0 ea ff ff ff eb de 48 c7 c0 ea ff ff ff e9 29 f0 90 00 48 c7 c0 f4 ff ff ff eb c9 0f 1f 44 00 00 <0f> 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 05 90 8d 9f 02 # [ 34.407491] RSP: 0018:ffffa2144080be60 EFLAGS: 00010286 # [ 34.412787] RAX: ffffffff8a0f5960 RBX: 0000000000000001 RCX: 0000000000000000 # [ 34.419966] RDX: 0000000000000000 RSI: ffff9608ead1bf70 RDI: ffffffff8aed5a70 # [ 34.427147] RBP: ffffffff8b333438 R08: 0000000000000001 R09: 0000000000000001 # [ 34.434321] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000004 # [ 34.441497] R13: ffffa2144080bf10 R14: ffffa2144080bf10 R15: ffff9608c6225000 # [ 34.448669] FS: 00007fbf82f2c580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 34.456799] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 34.462588] CR2: 0000000000000000 CR3: 000000010609c000 CR4: 00000000001506f0 # EXCEPTION: saw 'call trace:': ok ok 5 selftests: lkdtm: EXCEPTION.sh # selftests: lkdtm: LOOP.sh # Skipping LOOP: Hangs the system ok 6 selftests: lkdtm: LOOP.sh # SKIP # selftests: lkdtm:[ 34.896578] lkdtm: Performing direct entry CORRUPT_LIST_ADD EXHAUST_STACK.sh # Skipping EXHAUST_STACK: Corrupts memory on failure ok 7 selftests: lkdtm: EXHAUST_STACK.sh # SKIP # selftests: lkdtm: CORRUPT_STACK.sh # Skipping CORRUPT_STACK: Crashes entire system on success ok 8 selftests: lkdtm: CORRUPT_STACK.[ 34.904222] lkdtm: attempting good list addition sh # SKIP # selftests: lkdtm: CORRUPT_STACK_STRONG.sh # Skipping CORRUPT_STACK_STRONG: Crashes entire system on success ok 9 selftests: lkdtm: CORRUPT_STACK_STRONG.sh # SKIP # selftests: lkdtm: CORRUPT_LIST_ADD.sh [ 34.931024] lkdtm: attempting corrupted list addition [ 34.955062] lkdtm: list_add() corruption not detected! # [ 34.896578] lkdtm: Performing direct entry CORRUPT_LIST_ADD # [ 34.904222] lkdtm: attempting good list addition # [ 34.931024] lkdtm: attempting corrupted list addition # [ 34.955062] lkdtm: list_add() corruption not detected! # CORRUPT_LIST_ADD: missing 'list_add corruption': [FAIL] not ok 10 selftests: lkdtm: CORRUPT_LIST_ADD.sh # exit=1 # selftests: lkdtm: CORRUPT_LIST_DEL.sh [ 35.099365] lkdtm: Performing direct entry CORRUPT_LIST_DEL [ 35.104948] lkdtm: attempting good list removal [ 35.109523] lkdtm: attempting corrupted list removal [ 35.114487] lkdtm: list_del() corruption not detected! # [ 35.099365] lkdtm: Performing direct entry CORRUPT_LIST_DEL # [ 35.104948] lkdtm: attempting good list removal # [ 35.109523] lkdtm: attempting corrupted list removal # [ 35.114487] lkdtm: list_del() corruption not detected! # CORRUPT_LIST_DEL: missing 'list_del corruption': [FAIL] not ok 11 selftests: lkdtm: CORRUPT_LIST_DEL.sh # exit=1 # selftests: lkdtm: STACK_GUARD_PAGE_LEADING.sh [ 35.251496] lkdtm: Performing direct entry STACK_GUARD_PAGE_LEADING [ 35.257773] lkdtm: attempting bad read from page below current stack [ 35.264160] BUG: stack guard page was hit at 00000000aa34cc58 (stack is 00000000d0da829c..00000000ca682553) [ 35.273890] kernel stack overflow (page fault): 0000 [#3] SMP NOPTI [ 35.280150] CPU: 0 PID: 944 Comm: cat Tainted: G D W 5.10.173-cip27 #1 [ 35.287793] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 [ 35.293706] RIP: 0010:lkdtm_STACK_GUARD_PAGE_LEADING+0x27/0x3a [ 35.299530] Code: e0 28 00 0f 1f 44 00 00 53 48 c7 c7 f8 f5 2c 8b 50 65 48 8b 04 25 40 b0 01 00 48 8b 58 18 e8 33 98 fd ff 48 c7 c7 38 f6 2c 8b <8a> 43 ff 88 44 24 07 0f b6 74 24 07 5a 5b e9 19 98 fd ff 0f 1f 44 [ 35.318266] RSP: 0018:ffffa21440c63e50 EFLAGS: 00010246 [ 35.323482] RAX: 0000000000000038 RBX: ffffa21440c60000 RCX: 0000000000000000 [ 35.330603] RDX: 0000000000000000 RSI: ffff9608eac1bf70 RDI: ffffffff8b2cf638 [ 35.337724] RBP: ffffffff8b2ced62 R08: 0000000000000000 R09: 0000000000000000 [ 35.344845] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000019 [ 35.351966] R13: ffffa21440c63f10 R14: ffffa21440c63f10 R15: ffff9608c46e3000 [ 35.359088] FS: 00007f3393d84580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 35.367164] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 35.372900] CR2: ffffa21440c5ffff CR3: 0000000106156000 CR4: 00000000001506f0 [ 35.380021] Call Trace: [ 35.382465] ? lkdtm_CORRUPT_LIST_DEL+0xe0/0xe0 [ 35.386990] direct_entry.cold+0x2c/0x38 [ 35.390908] full_proxy_write+0x56/0x80 [ 35.394740] vfs_write+0xea/0x3b0 [ 35.398049] ksys_write+0x68/0xf0 [ 35.401361] do_syscall_64+0x33/0x40 [ 35.404931] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 35.409975] RIP: 0033:0x7f3393c91833 [ 35.413543] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 35.432279] RSP: 002b:00007ffd8f3ff718 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 35.439834] RAX: ffffffffffffffda RBX: 0000000000000019 RCX: 00007f3393c91833 [ 35.446956] RDX: 0000000000000019 RSI: 00007f3393b84000 RDI: 0000000000000001 [ 35.454077] RBP: 00007f3393b84000 R08: 00007f3393b83010 R09: 0000000000000000 [ 35.461199] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 35.468320] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 [ 35.475446] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table [ 35.500791] ---[ end trace 3c547c3eb0d57e39 ]--- [ 35.505402] RIP: 0010:lkdtm_BUG+0x5/0x10 [ 35.509317] Code: 89 ff e8 ae 5b a2 ff 48 c7 c0 ea ff ff ff eb de 48 c7 c0 ea ff ff ff e9 29 f0 90 00 48 c7 c0 f4 ff ff ff eb c9 0f 1f 44 00 00 <0f> 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 05 90 8d 9f 02 [ 35.528053] RSP: 0018:ffffa2144080be60 EFLAGS: 00010286 [ 35.533270] RAX: ffffffff8a0f5960 RBX: 0000000000000001 RCX: 0000000000000000 [ 35.540391] RDX: 0000000000000000 RSI: ffff9608ead1bf70 RDI: ffffffff8aed5a70 [ 35.547512] RBP: ffffffff8b333438 R08: 0000000000000001 R09: 0000000000000001 [ 35.554634] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000004 [ 35.561755] R13: ffffa2144080bf10 R14: ffffa2144080bf10 R15: ffff9608c6225000 [ 35.568877] FS: 00007f3393d84580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 35.576951] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 35.582687] CR2: ffffa21440c5ffff CR3: 0000000106156000 CR4: 00000000001506f0 [ 35.589810] BUG: sleeping function called from invalid context at include/linux/percpu-rwsem.h:49 [ 35.598664] in_atomic(): 0, irqs_disabled(): 1, non_block: 0, pid: 944, name: cat [ 35.606133] INFO: lockdep is turned off. [ 35.610048] irq event stamp: 0 [ 35.613097] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 35.619354] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 [ 35.627517] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 [ 35.635680] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 35.641936] CPU: 0 PID: 944 Comm: cat Tainted: G D W 5.10.173-cip27 #1 [ 35.649578] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 [ 35.655486] Call Trace: [ 35.657929] dump_stack+0x77/0x9b [ 35.661239] ___might_sleep.cold+0xa6/0xb6 [ 35.665329] exit_signals+0x1c/0x300 [ 35.668898] do_exit+0xc2/0xb00 [ 35.672034] ? ksys_write+0x68/0xf0 [ 35.675517] make_task_dead+0x2f/0x30 [ 35.679173] rewind_stack_and_make_dead+0x17/0x20 [ 35.683869] RIP: 0033:0x7f3393c91833 [ 35.687437] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 35.706170] RSP: 002b:00007ffd8f3ff718 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 35.713726] RAX: ffffffffffffffda RBX: 0000000000000019 RCX: 00007f3393c91833 [ 35.720847] RDX: 0000000000000019 RSI: 00007f3393b84000 RDI: 0000000000000001 [ 35.727968] RBP: 00007f3393b84000 R08: 00007f3393b83010 R09: 0000000000000000 [ 35.735090] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 35.742211] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # Segmentation fault # [ 35.251496] lkdtm: Performing direct entry STACK_GUARD_PAGE_LEADING # [ 35.257773] lkdtm: attempting bad read from page below current stack # [ 35.264160] BUG: stack guard page was hit at 00000000aa34cc58 (stack is 00000000d0da829c..00000000ca682553) # [ 35.273890] kernel stack overflow (page fault): 0000 [#3] SMP NOPTI # [ 35.280150] CPU: 0 PID: 944 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 35.287793] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 35.293706] RIP: 0010:lkdtm_STACK_GUARD_PAGE_LEADING+0x27/0x3a # [ 35.299530] Code: e0 28 00 0f 1f 44 00 00 53 48 c7 c7 f8 f5 2c 8b 50 65 48 8b 04 25 40 b0 01 00 48 8b 58 18 e8 33 98 fd ff 48 c7 c7 38 f6 2c 8b <8a> 43 ff 88 44 24 07 0f b6 74 24 07 5a 5b e9 19 98 fd ff 0f 1f 44 # [ 35.318266] RSP: 0018:ffffa21440c63e50 EFLAGS: 00010246 # [ 35.323482] RAX: 0000000000000038 RBX: ffffa21440c60000 RCX: 0000000000000000 # [ 35.330603] RDX: 0000000000000000 RSI: ffff9608eac1bf70 RDI: ffffffff8b2cf638 # [ 35.337724] RBP: ffffffff8b2ced62 R08: 0000000000000000 R09: 0000000000000000 # [ 35.344845] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000019 # [ 35.351966] R13: ffffa21440c63f10 R14: ffffa21440c63f10 R15: ffff9608c46e3000 # [ 35.359088] FS: 00007f3393d84580(0000) GS:ffff9608eac00000(0000) knlGS:000000000[ 35.888922] lkdtm: Performing direct entry STACK_GUARD_PAGE_TRAILING 0000000 # [ 35.367164] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 35.372900] CR2: ffffa21440c5ffff CR3: 0000000106156000 CR4: 00000000001506f0 # [ 35.380021] Call Trace: # [ 35.382465] ? lkdtm_CORRUPT_LIST_DEL+0xe0/0xe0 # [ 35.38[ 35.905474] lkdtm: attempting bad read from page above current stack 6990] direct_entry.cold+0x2c/0x38 # [ 35.390908] full_proxy_write+0x56/0x80 # [ 35.394740] vfs_write+0xea/0x3b0 # [ 35.398049] ksys_write+0x68/0xf0 # [ 35.401361] do_syscall_64+0x33/0x40 # [ 35.404931] entry_SYSCALL_64_after_hwframe+0x[ 35.934029] BUG: stack guard page was hit at 00000000bb430bc0 (stack is 000000002e310aa1..000000000f6c7764) 61/0xc6 # [ 35.409975] RIP: 0033:0x7f3393c91833 # [ 35.413543] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48[ 35.965904] kernel stack overflow (page fault): 0000 [#4] SMP NOPTI 89 54 24 18 # [ 35.432279] RSP: 002b:00007ffd8f3ff718 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 # [ 35.439834] RAX: ffffffffffffffda RBX: 0000000000000019 RCX: 00007f3393c91833 # [ 35.446956] RDX: 0000000000000019 RSI: 00007f3393b84000 RDI: 000[ 35.994343] CPU: 0 PID: 977 Comm: cat Tainted: G D W 5.10.173-cip27 #1 [ 36.024168] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 0000000000001 # [ 35.454077] RBP: 00007f3393b84000 R08: 00007f3393b83010 R09: 0000000000000000 # [ 35.461199] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 # [ 35.468320] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000[ 36.030082] RIP: 0010:lkdtm_STACK_GUARD_PAGE_TRAILING+0x27/0x3d 000020000 # [ 35.475446] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common c[ 36.058169] Code: 98 fd ff 0f 1f 44 00 00 53 48 c7 c7 70 f6 2c 8b 50 65 48 8b 04 25 40 b0 01 00 48 8b 58 18 e8 f9 97 fd ff 48 c7 c7 b0 f6 2c 8b <8a> 83 00 40 00 00 88 44 24 07 0f b6 74 24 07 5a 5b e9 dc 97 fd ff ros_usbpd_notify chromeos_pstore coreboot_table # [ 35.500791] ---[ end trace 3c547c3eb0d57e39 ]--- # [ 35.505402] RIP: 0010:lkdtm_BUG+0x5/0x10 # [ 35.509317] Code: 89 ff e8 ae 5b a2 ff 48 c7 c0 ea ff ff ff eb de 48 c7 c0 ea ff ff ff e9 29 f0 90 0[ 36.099090] RSP: 0018:ffffa21440cdbe50 EFLAGS: 00010246 [ 36.126493] RAX: 0000000000000038 RBX: ffffa21440cd8000 RCX: 0000000000000000 0 48 c7 c0 f4 ff ff ff eb c9 0f 1f 44 00 00 <0f> 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 05 90 8d 9f 02 # [ 35.528053] RSP: 0018:ffffa2144080be60 EFLAGS: 00010286 # [ 35.533270] RAX: ffffffff8a0f5960 RBX: 0000000000000001 RCX: 000000000000000[ 36.133615] RDX: 0000000000000000 RSI: ffff9608eac1bf70 RDI: ffffffff8b2cf6b0 [ 36.162919] RBP: ffffffff8b2ced7b R08: 0000000000000000 R09: 0000000000000000 0 # [ 35.540391] RDX: 0000000000000000 RSI: ffff9608ead1bf70 RDI: ffffffff8aed5a70 # [ 35.547512] RBP: ffffffff8b333438 R08: 0000000000000001 R09: 0000000000000001 # [ 35.554634] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000004 #[ 36.170041] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 000000000000001a [ 36.199346] R13: ffffa21440cdbf10 R14: ffffa21440cdbf10 R15: ffff9608c3b1a000 [ 35.561755] R13: ffffa2144080bf10 R14: ffffa2144080bf10 R15: ffff9608c6225000 # [ 35.568877] FS: 00007f3393d84580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 35.576951] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 35.5[ 36.206468] FS: 00007fe4830cc580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 36.236725] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 82687] CR2: ffffa21440c5ffff CR3: 0000000106156000 CR4: 00000000001506f0 # [ 35.589810] BUG: sleeping function called from invalid context at include/linux/percpu-rwsem.h:49 # [ 35.598664] in_atomic(): 0, irqs_disabled(): 1, non_block: 0, pid: 944, n[ 36.242460] CR2: ffffa21440cdc000 CR3: 00000001048f8000 CR4: 00000000001506f0 [ 36.271764] Call Trace: ame: cat # [ 35.606133] INFO: lockdep is turned off. # [ 35.610048] irq event stamp: 0 # [ 35.613097] hardirqs last enabled at (0): [<0000000000000000>] 0x0 # [ 35.619354] hardirqs last disabled at (0): [] copy_process+0x664/[ 36.274212] ? lkdtm_STACK_GUARD_PAGE_LEADING+0x3a/0x3a 0x1cb0 # [ 35.627517] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 # [ 35.635680] softirqs last disabled at (0): [<0000000000000000>] 0x0 # [ 35.641936] CPU: 0 PID: 944 Comm: cat Tainted: G D W 5.10.17[ 36.301608] direct_entry.cold+0x2c/0x38 3-cip27 #1 # [ 35.649578] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 35.655486] Call Trace: # [ 35.657929] dump_stack+0x77/0x9b # [ 35.661239] ___might_sleep.cold+0xa6/0xb6 # [ 35.665329] exit_signals+0x1c/0x300 # [ 35.668[ 36.327712] full_proxy_write+0x56/0x80 898] do_exit+0xc2/0xb00 # [ 35.672034] ? ksys_write+0x68/0xf0 # [ 35.675517] make_task_dead+0x2f/0x30 # [ 35.679173] rewind_stack_and_make_dead+0x17/0x20 # [ 35.683869] RIP: 0033:0x7f3393c91833 # [ 35.687437] Code: 8b 15 61 26 0e 00 f7 d[ 36.353728] vfs_write+0xea/0x3b0 8 [64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 # [ 35.706170] RSP: 002b:00007ffd8f3ff718 EFLAGS: 00000246 ORIG_RAX: 000000000000 36.379222] ksys_write+0x68/0xf0 0001 # [ 35.713726] RAX: ffffffffffffffda RBX: 0000000000000019 RCX: 00007f3393c91833 # [ 35.720847] RDX: 0000000000000019 RSI: 00007f3393b84000 RDI: 0000000000000001 # [ 35.727968] RBP: 00007f3393b84000 R08: 00007f3393b83010 R09: 0000000000000000[ 36.404718] do_syscall_64+0x33/0x40 # [ 35.735090] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 # [ 35.742211] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # STACK_GUARD_PAGE_LEADING: saw 'call trace:': ok ok 12 selftests: lkdtm: STACK_GUARD[ 36.430474] entry_SYSCALL_64_after_hwframe+0x61/0xc6 _PAGE_LEADING.sh # selftests: lkdtm: STACK_GUARD_PAGE_TRAILING.sh [ 36.457701] RIP: 0033:0x7fe482fa9833 [ 36.467162] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 36.485898] RSP: 002b:00007fffdf56ca48 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 36.493457] RAX: ffffffffffffffda RBX: 000000000000001a RCX: 00007fe482fa9833 [ 36.500578] RDX: 000000000000001a RSI: 00007fe482e9c000 RDI: 0000000000000001 [ 36.507700] RBP: 00007fe482e9c000 R08: 00007fe482e9b010 R09: 0000000000000000 [ 36.514821] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 36.521942] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 [ 36.529066] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table [ 36.554411] ---[ end trace 3c547c3eb0d57e3a ]--- [ 36.559024] RIP: 0010:lkdtm_BUG+0x5/0x10 [ 36.562939] Code: 89 ff e8 ae 5b a2 ff 48 c7 c0 ea ff ff ff eb de 48 c7 c0 ea ff ff ff e9 29 f0 90 00 48 c7 c0 f4 ff ff ff eb c9 0f 1f 44 00 00 <0f> 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 05 90 8d 9f 02 [ 36.581674] RSP: 0018:ffffa2144080be60 EFLAGS: 00010286 [ 36.586890] RAX: ffffffff8a0f5960 RBX: 0000000000000001 RCX: 0000000000000000 [ 36.594012] RDX: 0000000000000000 RSI: ffff9608ead1bf70 RDI: ffffffff8aed5a70 [ 36.601132] RBP: ffffffff8b333438 R08: 0000000000000001 R09: 0000000000000001 [ 36.608252] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000004 [ 36.615374] R13: ffffa2144080bf10 R14: ffffa2144080bf10 R15: ffff9608c6225000 [ 36.622496] FS: 00007fe4830cc580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 36.630573] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 36.636308] CR2: ffffa21440cdc000 CR3: 00000001048f8000 CR4: 00000000001506f0 # Segmentation fault # [ 35.888922] lkdtm: Performing direct entry STACK_GUARD_PAGE_TRAILING # [ 35.905474] lkdtm: attempting bad read from page above current stack # [ 35.934029] BUG: stack guard page was hit at 00000000bb430bc0 (stack is 000000002e310aa1..000000000f6c7764) # [ 35.965904] kernel stack overflow (page fault): 0000 [#4] SMP NOPTI # [ 35.994343] CPU: 0 PID: 977 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 36.024168] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 36.030082] RIP: 0010:lkdtm_STACK_GUARD_PAGE_TRAILING+0x27/0x3d # [ 36.058169] Code: 98 fd ff 0f 1f 44 00 00 53 48 c7 c7 70 f6 2c 8b 50 65 48 8b 04 25 40 b0 01 00 48 8b 58 18 e8 f9 97 fd ff 48 c7 c7 b0 f6 2c 8b <8a> 83 00 40 00 00 88 44 24 07 0f b6 74 24 07 5a 5b e9 dc 97 fd ff # [ 36.099090] RSP: 0018:ffffa21440cdbe50 EFLAGS: 00010246 # [ 36.126493] RAX: 0000000000000038 RBX: ffffa21440cd8000 RCX: 0000000000000000 # [ 36.133615] RDX: 0000000000000000 RSI: ffff9608eac1bf70 RDI: ffffffff8b2cf6b0 # [ 36.162919] RBP: ffffffff8b2ced7b R08: 0000000000000000 R09: 0000000000000000 # [ 36.170041] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 000000000000001a # [ 36.199346] R13: ffffa21440cdbf10 R14: ffffa21440cdbf10 R15: ffff9608c3b1a000 # [ 36.206468] FS: 00007fe4830cc580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 36.236725] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 36.242460] CR2: ffffa21440cdc000 CR3: 00000001048f8000 CR4: 00000000001506f0 # [ 36.271764] Call Trace: # [ 36.274212] ? lkdtm_STACK_GUARD_PAGE_LEADING+0x3a/0x3a # [ 36.830338] lkdtm: Performing direct entry UNSET_SMEP [ 36.301608] direct_entry.cold+0x2c/0x38 # [ 36.327712] full_proxy_write+0x56/0x80 # [ 36.353728] vfs_write+0xea/0x3b0 # [ 36.379222] ksys_write+0x68/0xf0 # [ 36.404718] do_syscall_64+0x33/0x40 # [ 36.430474] entry_SYSCALL_64_after_h[ 36.857045] lkdtm: trying to clear SMEP normally wframe+0x61/0xc6 # [ 36.457701] RIP: 0033:0x7fe482fa9833 # [ 36.467162] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83[ 36.883863] ------------[ cut here ]------------ ec 28 48 89 54 24 18 # [ 36.485898] RSP: 002b:00007fffdf56ca48 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 # [ 36.493457] RAX: ffffffffffffffda RBX: 000000000000001a RCX: 00007fe482fa9833 # [ 36.500578] RDX: 000000000000001a RSI: 00007fe482e9c000[ 36.910660] pinned CR4 bits changed: 0x100000!? RDI: 0000000000000001 # [ 36.507700] RBP: 00007fe482e9c000 R08: 00007fe482e9b010 R09: 0000000000000000 # [ 36.514821] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 # [ 36.521942] R13: 0000000000000001 R14: 0000000000020000 R15[ 36.937384] WARNING: CPU: 1 PID: 1013 at arch/x86/kernel/cpu/common.c:392 native_write_cr4+0x45/0x60 : 0000000000020000 # [ 36.529066] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2[ 36.968682] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table _common cros_usbpd_notify chromeos_pstore coreboot_table # [ 36.554411] ---[ end trace 3c547c3eb0d57e3a ]--- # [ 36.559024] RIP: 0010:lkdtm_BUG+0x5/0x10 # [ 36.562939] Code: 89 ff e8 ae 5b a2 ff 48 c7 c0 ea ff ff ff eb de 48 c7 c0 ea ff ff ff e9 2[ 37.016208] CPU: 1 PID: 1013 Comm: cat Tainted: G D W 5.10.173-cip27 #1 9 f0 90 00 48 c7 c0 f4 ff ff ff eb c9 0f 1f 44 00 00 <0f> 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 05 90 8d 9f 02 # [ 36.581674] RSP: 0018:ffffa2144080be60 EFLAGS: 00010286 # [ 36.586890] RAX: ffffffff8a0f5960 RBX: 0000000000000001 RCX: 000000[ 37.046132] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 0000000000 # [ 36.594012] RDX: 0000000000000000 RSI: ffff9608ead1bf70 RDI: ffffffff8aed5a70 # [ 36.601132] RBP: ffffffff8b333438 R08: 0000000000000001 R09: 0000000000000001 # [ 36.608252] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000[ 37.074230] RIP: 0010:native_write_cr4+0x45/0x60 000004 # [ 36.615374] R13: ffffa2144080bf10 R14: ffffa2144080bf10 R15: ffff9608c6225000 # [ 36.622496] FS: 00007fe4830cc580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 36.630573] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 #[ 37.101017] Code: 39 c2 75 2d 48 85 f6 75 05 e9 67 12 14 01 80 3d 29 d9 e3 01 00 75 f2 48 c7 c7 18 c6 20 8b c6 05 19 d9 e3 01 01 e8 c8 6f e8 00 <0f> 0b e9 44 12 14 01 48 89 d6 48 81 e7 ff f7 ce ff 48 31 c6 48 09 [ 36.636308] CR2: ffffa21440cdc000 CR3: 00000001048f8000 CR4: 00000000001506f0 # STACK_GUARD_PAGE_TRAILING: saw 'call trace:': ok ok 13 selftests: lkdtm: STACK_GUARD_PAGE_TRAILING.sh # selftests: lkdtm: UNSET_SMEP.sh [ 37.141936] RSP: 0018:ffffa21440d53e48 EFLAGS: 00010286 [ 37.166520] RAX: 0000000000000000 RBX: 00000000000506e0 RCX: 0000000000000000 [ 37.173647] RDX: ffff9608ead2c660 RSI: ffff9608ead1bf70 RDI: ffff9608ead1bf70 [ 37.180775] RBP: ffffffff8b2ced95 R08: 0000000000000000 R09: 0000000000000000 [ 37.187902] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 000000000000000b [ 37.195030] R13: ffffa21440d53f10 R14: ffffa21440d53f10 R15: ffff9608c3b19000 [ 37.202158] FS: 00007f5451f25580(0000) GS:ffff9608ead00000(0000) knlGS:0000000000000000 [ 37.210240] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 37.215982] CR2: 00007f5451cf4000 CR3: 0000000105390000 CR4: 00000000001506e0 [ 37.223108] Call Trace: [ 37.225560] lkdtm_UNSET_SMEP.cold+0x1d/0x103 [ 37.229909] direct_entry.cold+0x2c/0x38 [ 37.233835] full_proxy_write+0x56/0x80 [ 37.237671] vfs_write+0xea/0x3b0 [ 37.240989] ksys_write+0x68/0xf0 [ 37.244306] do_syscall_64+0x33/0x40 [ 37.247884] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 37.252934] RIP: 0033:0x7f5451e01833 [ 37.256509] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 37.275250] RSP: 002b:00007fff5b8090e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 37.282812] RAX: ffffffffffffffda RBX: 000000000000000b RCX: 00007f5451e01833 [ 37.289940] RDX: 000000000000000b RSI: 00007f5451cf4000 RDI: 0000000000000001 [ 37.297067] RBP: 00007f5451cf4000 R08: 00007f5451cf3010 R09: 0000000000000000 [ 37.304201] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 37.311331] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 [ 37.318465] irq event stamp: 0 [ 37.321520] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 37.327788] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 [ 37.335957] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 [ 37.344126] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 37.350386] ---[ end trace 3c547c3eb0d57e3b ]--- [ 37.355002] lkdtm: ok: SMEP did not get cleared [ 37.359527] lkdtm: trying to clear SMEP with call gadget [ 37.364835] lkdtm: ok: SMEP removal was reverted # [ 36.830338] lkdtm: Performing direct entry UNSET_SMEP # [ 36.857045] lkdtm: trying to clear SMEP normally # [ 36.883863] ------------[ cut here ]------------ # [ 36.910660] pinned CR4 bits changed: 0x100000!? # [ 36.937384] WARNING: CPU: 1 PID: 1013 at arch/x86/kernel/cpu/common.c:392 native_write_cr4+0x45/0x60 # [ 36.968682] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table # [ 37.016208] CPU: 1 PID: 1013 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 37.046132] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 37.074230] RIP: 0010:native_write_cr4+0x45/0x60 # [ 37.101017] Code: 39 c2 75 2d 48 85 f6 75 05 e9 67 12 14 01 80 3d 29 d9 e3 01 00 75 f2 48 c7 c7 18 c6 20 8b c6 05 19 d9 e3 01 01 e8 c8 6f e8 00 <0f> 0b e9 44 12 14 01 48 89 d6 48 81 e7 ff f7 ce ff 48 31 c6 48 09 # [ 37.141936] RSP: 0018:ffffa21440d53e48 EFLAGS: 00010286 # [ 37.166520] RAX: 0000000000000000 RBX: 00000000000506e0 RCX: 0000000000000000 # [ 37.173647] RDX: ffff9608ead2c660 RSI: ffff9608ead1bf70 RDI: ffff9608ead1bf70 # [ 37.180775] RBP: ffffffff8b2ced95 R08: 0000000000000000[ 37.491329] lkdtm: Performing direct entry DOUBLE_FAULT R09: 0000000000000000 # [ 37.187902] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 000000000000000b # [ 37.195030] R13: ffffa21440d53f10 R14: ffffa21440d53f10 R15: ffff9608c3b19000 # [ 37.202158] FS: 00007f5451f25580(0000) GS:ffff9608ead00000[ 37.509477] lkdtm: XFAIL: this test is ia32-only (0000) knlGS:0000000000000000 # [ 37.210240] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 37.215982] CR2: 00007f5451cf4000 CR3: 0000000105390000 CR4: 00000000001506e0 # [ 37.223108] Call Trace: # [ 37.225560] lkdtm_UNSET_SMEP.cold+0x1d/0x103 # [ 37.229909] direct_entry.cold+0x2c/0x38 # [ 37.233835] full_proxy_write+0x56/0x80 # [ 37.237671] vfs_write+0xea/0x3b0 # [ 37.240989] ksys_write+0x68/0xf0 # [ 37.244306] do_syscall_64+0x33/0x40 # [ 37.247884] entry_SYSCALL_64_after_hwframe+0x61/0xc6 # [ 37.252934] RIP: 0033:0x7f5451e01833 # [ 37.256509] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 # [ 37.275250] RSP: 002b:00007fff5b8090e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 # [ 37.282812] RAX: ffffffffffffffda RBX: 000000000000000b RCX: 00007f5451e01833 # [ 37.289940] RDX: 000000000000000b RSI: 00007f5451cf4000 RDI: 0000000000000001 # [ 37.297067] RBP: 00007f5451cf4000 R08: 00007f5451cf3010 R09: 0000000000000000 # [ 37.304201] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 # [ 37.311331] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # [ 37.318465] irq event stamp: 0 # [ 37.321520] hardirqs last enabled at (0): [<0000000000000000>] 0x0 # [ 37.327788] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 # [ 37.335957] s[ 37.656221] lkdtm: Performing direct entry CORRUPT_PAC oftirqs last enabled at (0): [] copy_process+0x664/0x1cb0 # [ 37.344126] softirqs last disabled at (0): [<0000000000000000>] 0x0 # [ 37.350386] ---[ end trace 3c547c3eb0d57e3b ]--- # [ 37.355002] lkdtm: ok: SMEP did not get clea[ 37.674521] lkdtm: XFAIL: this test is arm64-only red # [ 37.359527] lkdtm: trying to clear SMEP with call gadget # [ 37.364835] lkdtm: ok: SMEP removal was reverted # UNSET_SMEP: saw 'pinned CR4 bits changed:': ok ok 14 selftests: lkdtm: UNSET_SMEP.sh # selftests: lkdtm: DOUBLE_FAULT.sh # [ 37.491329] lkdtm: Performing direct entry DOUBLE_FAULT # [ 37.509477] lkdtm: XFAIL: this test is ia32-only # DOUBLE_FAULT: saw 'XFAIL': [SKIP] ok 15 selftests: lkdtm: DOUBLE_FAULT.sh # SKIP # selftests: lkdtm: CORRUPT_PAC.sh # [ 37.656221] lkdtm: Performing direct entry CORRUPT_PAC # [ 37.674521] lkdtm: XFAIL: this test is arm64-only # CORRUPT_PAC: saw 'XFAIL': [SKIP] ok 16 selftests: lkdtm: CORRUPT_PAC.sh # SKIP # selftests: lkdtm: UNALIGNED_LOAD_STORE_WRITE.sh [ 37.852190] lkdtm: Performing direct entry UNALIGNED_LOAD_STORE_WRITE [ 37.858641] lkdtm: XFAIL: arch has CONFIG_HAVE_EFFICIENT_UNALIGNED_ACCESS # [ 37.852190] lkdtm: Performing direct entry UNALIGNED_LOAD_STORE_WRITE # [ 37.858641] lkdtm: XFAIL: arch has CONFIG_HAVE_EFFICIENT_UNALIGNED_ACCESS # UNALIGNED_LOAD_STORE_WRITE: saw 'XFAIL': [SKIP] ok 17 selftests: lkdtm: UNALIGNED_LOAD_STORE_WRITE.sh # SKIP # selftests: lkdtm: OVERWRITE_ALLOCATION.sh # Skipping OVERWRITE_ALLOCATION: Corrupts memory on failure ok 18 selftests: lkdtm: OVERWRITE_ALLOCATION.sh # SKIP # selftests: lkdtm: WRITE_AFTER_FREE.sh # Skipping WRITE_AFTER_FREE: Corrupts memory on failure ok 19 selftests: lkdtm: WRITE_AFTER_FREE.sh # SKIP # selftests: lkdtm: READ_AFTER_FREE.sh [ 38.127304] lkdtm: Performing direct entry READ_AFTER_FREE [ 38.132803] lkdtm: Value in memory before free: 12345678 [ 38.138152] lkdtm: Attempting bad read from freed memory [ 38.143494] lkdtm: Memory was not poisoned # [ 38.127304] lkdtm: Performing direct entry READ_AFTER_FREE # [ 38.132803] lkdtm: Value in memory before free: 12345678 # [ 38.138152] lkdtm: Attempting bad read from freed memory # [ 38.143494] lkdtm: Memory was not poisoned # READ_AFTER_FREE: missing 'call trace:': [FAIL] not ok 20 selftests: lkdtm: READ_AFTER_FREE.sh # exit=1 # selftests: lkdtm: WRITE_BUDDY_AFTER_FREE.sh # Skipping WRITE_BUDDY_AFTER_FREE: Corrupts memory on failure ok 21 selftests: lkdtm: WRITE_BUDDY_AFTER_FREE.sh # SKIP # selftests: lkdtm: READ_BUDDY_AFTER_FREE.sh [ 38.357140] lkdtm: Performing direct entry READ_BUDDY_AFTER_FREE [ 38.363151] lkdtm: Value in memory before free: 12345678 [ 38.368491] lkdtm: Attempting to read from freed memory [ 38.373732] lkdtm: Buddy page was not poisoned # [ 38.357140] lkdtm: Performing direct entry READ_BUDDY_AFTER_FREE # [ 38.363151] lkdtm: Value in memory before free: 12345678 # [ 38.368491] lkdtm: Attempting to read from freed memory # [ 38.373732] lkdtm: Buddy page was not poisoned # READ_BUDDY_AFTER_FREE: missing 'call trace:': [FAIL] not ok 22 selftests: lkdtm: READ_BUDDY_AFTER_FREE.sh # exit=1 # selftests: lkdtm: SLAB_FREE_DOUBLE.sh [ 38.514170] lkdtm: Performing direct entry SLAB_FREE_DOUBLE [ 38.519769] lkdtm: Attempting double slab free ... # [ 38.514170] lkdtm: Performing direct entry SLAB_FREE_DOUBLE # [ 38.519769] lkdtm: Attempting double slab free ... # SLAB_FREE_DOUBLE: missing 'call trace:': [FAIL] not ok 23 selftests: lkdtm: SLAB_FREE_DOUBLE.sh # exit=1 # selftests: lkdtm: SLAB_FREE_CROSS.sh [ 38.674627] lkdtm: Performing direct entry SLAB_FREE_CROSS [ 38.680133] lkdtm: Attempting cross-cache slab free ... # [ 38.674627] lkdtm: Performing direct entry SLAB_FREE_CROSS # [ 38.680133] lkdtm: Attempting cross-cache slab free ... # SLAB_FREE_CROSS: missing 'call trace:': [FAIL] not ok 24 selftests: lkdtm: SLAB_FREE_CROSS.sh # exit=1 # selftests: lkdtm: SLAB_FREE_PAGE.sh [ 38.830038] lkdtm: Performing direct entry SLAB_FREE_PAGE [ 38.835448] lkdtm: Attempting non-Slab slab free ... # [ 38.830038] lkdtm: Performing direct entry SLAB_FREE_PAGE # [ 38.835448] lkdtm: Attempting non-Slab slab free ... # SLAB_FREE_PAGE: missing 'call trace:': [FAIL] not ok 25 selftests: lkdtm: SLAB_FREE_PAGE.sh # exit=1 # selftests: lkdtm: SOFTLOCKUP.sh # Skipping SOFTLOCKUP: Hangs the system ok 26 selftests: lkdtm: SOFTLOCKUP.sh # SKIP # selftests: lkdtm: HARDLOCKUP.sh # Skipping HARDLOCKUP: Hangs the system ok 27 selftests: lkdtm: HARDLOCKUP.sh # SKIP # selftests: lkdtm: SPINLOCKUP.sh # Skipping SPINLOCKUP: Hangs the system ok 28 selftests: lkdtm: SPINLOCKUP.sh # SKIP # selftests: lkdtm: HUNG_TASK.sh # Skipping HUNG_TASK: Hangs the system ok 29 selftests: lkdtm: HUNG_TASK.sh # SKIP # selftests: lkdtm: EXEC_DATA.sh [ 39.260923] lkdtm: Performing direct entry EXEC_DATA [ 39.265898] lkdtm: attempting ok execution at ffffffff8a0f5d30 [ 39.271774] lkdtm: attempting bad execution at ffffffff8caee740 [ 39.277699] kernel tried to execute NX-protected page - exploit attempt? (uid: 0) [ 39.285169] BUG: unable to handle page fault for address: ffffffff8caee740 [ 39.292032] #PF: supervisor instruction fetch in kernel mode [ 39.297680] #PF: error_code(0x0011) - permissions violation [ 39.303243] PGD 90c29067 P4D 90c29067 PUD 90c2a063 PMD 80000000922001e3 [ 39.309936] Oops: 0011 [#5] SMP NOPTI [ 39.313593] CPU: 0 PID: 1520 Comm: cat Tainted: G D W 5.10.173-cip27 #1 [ 39.321321] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 [ 39.327233] RIP: 0010:data_area+0x0/0x40 [ 39.331150] Code: ff ff 00 e2 bf c4 08 96 ff ff 00 e1 bf c4 08 96 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <0f> 1f 44 00 00 e9 46 ec 90 00 66 0f 1f 44 00 00 0f 1f 44 00 00 55 [ 39.349885] RSP: 0018:ffffa2144147be48 EFLAGS: 00010246 [ 39.355100] RAX: 0000000000000033 RBX: 0000000000000001 RCX: 0000000000000000 [ 39.362223] RDX: 0000000000000000 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 [ 39.369344] RBP: ffffffff8caee740 R08: 0000000000000000 R09: 0000000000000000 [ 39.376464] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 000000000000000a [ 39.383585] R13: ffffa2144147bf10 R14: ffffa2144147bf10 R15: ffff9608c612f000 [ 39.390707] FS: 00007f26967de580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 39.398782] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 39.404517] CR2: ffffffff8caee740 CR3: 00000001027b0000 CR4: 00000000001506f0 [ 39.411638] Call Trace: [ 39.414086] ? execute_location+0x48/0x56 [ 39.418089] ? direct_entry.cold+0x2c/0x38 [ 39.422180] ? full_proxy_write+0x56/0x80 [ 39.426185] ? vfs_write+0xea/0x3b0 [ 39.429668] ? ksys_write+0x68/0xf0 [ 39.433152] ? do_syscall_64+0x33/0x40 [ 39.436894] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 39.442111] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table [ 39.467453] CR2: ffffffff8caee740 [ 39.470764] ---[ end trace 3c547c3eb0d57e3c ]--- [ 39.475376] RIP: 0010:lkdtm_BUG+0x5/0x10 [ 39.479290] Code: 89 ff e8 ae 5b a2 ff 48 c7 c0 ea ff ff ff eb de 48 c7 c0 ea ff ff ff e9 29 f0 90 00 48 c7 c0 f4 ff ff ff eb c9 0f 1f 44 00 00 <0f> 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 05 90 8d 9f 02 [ 39.498025] RSP: 0018:ffffa2144080be60 EFLAGS: 00010286 [ 39.503240] RAX: ffffffff8a0f5960 RBX: 0000000000000001 RCX: 0000000000000000 [ 39.510360] RDX: 0000000000000000 RSI: ffff9608ead1bf70 RDI: ffffffff8aed5a70 [ 39.517481] RBP: ffffffff8b333438 R08: 0000000000000001 R09: 0000000000000001 [ 39.524604] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000004 [ 39.531726] R13: ffffa2144080bf10 R14: ffffa2144080bf10 R15: ffff9608c6225000 [ 39.538849] FS: 00007f26967de580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 39.546925] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 39.552661] CR2: ffffffff8caee740 CR3: 00000001027b0000 CR4: 00000000001506f0 [ 39.559783] BUG: sleeping function called from invalid context at include/linux/percpu-rwsem.h:49 [ 39.568637] in_atomic(): 0, irqs_disabled(): 1, non_block: 0, pid: 1520, name: cat [ 39.576193] INFO: lockdep is turned off. [ 39.580108] irq event stamp: 0 [ 39.583158] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 39.589415] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 [ 39.597578] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 [ 39.605739] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 39.611995] CPU: 0 PID: 1520 Comm: cat Tainted: G D W 5.10.173-cip27 #1 [ 39.619722] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 [ 39.625630] Call Trace: [ 39.628075] dump_stack+0x77/0x9b [ 39.631387] ___might_sleep.cold+0xa6/0xb6 [ 39.635477] exit_signals+0x1c/0x300 [ 39.639046] do_exit+0xc2/0xb00 [ 39.642182] ? ksys_write+0x68/0xf0 [ 39.645667] make_task_dead+0x2f/0x30 [ 39.649323] rewind_stack_and_make_dead+0x17/0x20 [ 39.654020] RIP: 0033:0x7f26966b9833 [ 39.657588] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 39.676323] RSP: 002b:00007ffd7e5bbe48 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 39.683880] RAX: ffffffffffffffda RBX: 000000000000000a RCX: 00007f26966b9833 [ 39.691001] RDX: 000000000000000a RSI: 00007f26965ac000 RDI: 0000000000000001 [ 39.698122] RBP: 00007f26965ac000 R08: 00007f26965ab010 R09: 0000000000000000 [ 39.705242] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 39.712364] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # Killed # [ 39.260923] lkdtm: Performing direct entry EXEC_DATA # [ 39.265898] lkdtm: attempting ok execution at ffffffff8a0f5d30 # [ 39.271774] lkdtm: attempting bad execution at ffffffff8caee740 # [ 39.277699] kernel tried to execute NX-protected page - exploit attempt? (uid: 0) # [ 39.285169] BUG: unable to handle page fault for address: ffffffff8caee740 # [ 39.292032] #PF: supervisor instruction fetch in kernel mode # [ 39.297680] #PF: error_code(0x0011) - permissions violation # [ 39.303243] PGD 90c29067 P4D 90c29067 PUD 90c2a063 PMD 80000000922001e3 # [ 39.309936] Oops: 0011 [#5] SMP NOPTI # [ 39.313593] CPU: 0 PID: 1520 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 39.321321] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 39.327233] RIP: 0010:data_area+0x0/0x40 # [ 39.331150] Code: ff ff 00 e2 bf c4 08 96 ff ff 00 e1 bf c4 08 96 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <0f> 1f 44 00 00 e9 46 ec 90 00 66 0f 1f 44 00 00 0f 1f 44 00 00 55 # [ 39.349885] RSP: 0018:ffffa2144147be48 EFLAGS: 00010246 # [ 39.355100] RAX: 0000000000000033 RBX: 0000000000000001 RCX: 0000000000000000 # [ 39.362223] RDX: 0000000000000000 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 # [ 39.369344] RBP: ffffffff8caee740 R08: 0000000000000000[ 39.918061] lkdtm: Performing direct entry EXEC_STACK R09: 0000000000000000 # [ 39.376464] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 000000000000000a # [ 39.383585] R13: ffffa2144147bf10 R14: ffffa2144147bf10 R15: ffff9608c612f000 # [ 39.390707] FS: 00007f26967de580(0000) GS:ffff9608eac00000[ 39.928220] lkdtm: attempting ok execution at ffffffff8a0f5d30 (0000) knlGS:0000000000000000 # [ 39.398782] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 39.404517] CR2: ffffffff8caee740 CR3: 00000001027b0000 CR4: 00000000001506f0 # [ 39.411638] Call Trace: # [ 39.414086] ? execute_location+0x48/0[ 39.956249] lkdtm: attempting bad execution at ffffa214414fbe18 x56 # [ 39.418089] ? direct_entry.cold+0x2c/0x38 # [ 39.422180] ? full_proxy_write+0x56/0x80 # [ 39.426185] ? vfs_write+0xea/0x3b0 # [ 39.429668] ? ksys_write+0x68/0xf0 # [ 39.433152] ? do_syscall_64+0x33/0x40 # [ 39.436894] ? entry[ 39.984357] kernel tried to execute NX-protected page - exploit attempt? (uid: 0) _SYSCALL_64_after_hwframe+0x61/0xc6 # [ 39.442111] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros[ 40.013970] BUG: unable to handle page fault for address: ffffa214414fbe18 [ 40.043017] #PF: supervisor instruction fetch in kernel mode _ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table # [ 39.467453] CR2: ffffffff8caee740 # [ 39.470764] ---[ end trace 3c547c3eb0d57e3c ]--- # [ 39.475376] RIP: 0010:lkdtm_BUG+0x5/0x10 # [ 39.479290] Code: 89 ff e8 ae 5b a[ 40.048666] #PF: error_code(0x0011) - permissions violation 2 ff 48 c7 c0 ea ff ff ff eb de 48 c7 c0 ea ff ff ff e9 29 f0 90 00 48 c7 c0 f4 ff ff ff eb c9 0f 1f 44 00 00 <0f> 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 05 90 8d 9f 02 # [ 39.498025] RSP: 0018:ffffa2144080be60 EFLAGS: 00010286 # [ 39.503240[ 40.076411] PGD 100000067 P4D 100000067 PUD 10020e067 PMD 1062b4067 PTE 80000001061a8163 ] RAX: ffffffff8a0f5960 RBX: 0000000000000001 RCX: 0000000000000000 # [ 39.510360] RDX: 0000000000000000 RSI: ffff9608ead1bf70 RDI: ffffffff8aed5a70 # [ 39.517481] RBP: ffffffff8b333438 R08: 0000000000000001 R09: 0000000000000001 # [ 39.524604] R1[ 40.106674] Oops: 0011 [#6] SMP NOPTI 0: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000004 # [ 39.531726] R13: ffffa2144080bf10 R14: ffffa2144080bf10 R15: ffff9608c6225000 # [ 39.538849] FS: 00007f26967de580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 39.546[ 40.132517] CPU: 0 PID: 1556 Comm: cat Tainted: G D W 5.10.173-cip27 #1 [ 40.162430] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 925] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 39.552661] CR2: ffffffff8caee740 CR3: 00000001027b0000 CR4: 00000000001506f0 # [ 39.559783] BUG: sleeping function called from invalid context at include/linux/percpu-rwsem.h:49 # [ 39.568[ 40.168341] RIP: 0010:0xffffa214414fbe18 637] in_atomic(): 0, irqs_disabled(): 1, non_block: 0, pid: 1520, name: cat # [ 39.576193] INFO: lockdep is turned off. # [ 39.580108] irq event stamp: 0 # [ 39.583158] hardirqs last enabled at (0): [<0000000000000000>] 0x0 # [ 39.589415] hard[ 40.194437] Code: 00 00 18 be 4f 41 14 a2 ff ff 74 6d 77 8a ff ff ff ff 20 00 00 00 00 00 00 00 be ee 2c 8b ff ff ff ff a0 6e 77 8a ff ff ff ff <0f> 1f 44 00 00 e9 46 ec 90 00 66 0f 1f 44 00 00 0f 1f 44 00 00 55 ir[qs last disabled at (0): [] copy_process+0x664/0x1cb0 # [ 39.597578] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 # [ 39.605739] softirqs last disabled at (0): [<0000000000000000>] 0x0 # [ 39.61 40.235357] RSP: 0018:ffffa214414fbdf8 EFLAGS: 00010246 1995] CPU: 0 PID: 1520 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 39.619722] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 39.625630] Call Trace: # [ 39.628075] dump_stack+0x77/0x9b # [ 39.631387] ___might_sleep.col[ 40.262761] RAX: 0000000000000033 RBX: 0000000000000001 RCX: 0000000000000000 d+[0xa6/0xb6 # [ 39.635477] exit_signals+0x1c/0x300 # [ 39.639046] do_exit+0xc2/0xb00 # [ 39.642182] ? ksys_write+0x68/0xf0 # [ 39.645667] make_task_dead+0x2f/0x30 # [ 39.649323] rewind_stack_and_make_dead+0x17/0x20 # [ 39.654020] RIP 40.292070] RDX: 0000000000000000 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 [ 40.321380] RBP: ffffa214414fbe18 R08: 0000000000000000 R09: 0000000000000000 : 0033:0x7f26966b9833 # [ 39.657588] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 # [ 39.676323[ 40.328502] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 000000000000000b [ 40.357807] R13: ffffa214414fbf10 R14: ffffa214414fbf10 R15: ffff9608c5545000 ] RSP: 002b:00007ffd7e5bbe48 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 # [ 39.683880] RAX: ffffffffffffffda RBX: 000000000000000a RCX: 00007f26966b9833 # [ 39.691001] RDX: 000000000000000a RSI: 00007f26965ac000 RDI: 0000000000000001 # [ 39.69812[ 40.364930] FS: 00007fd2ba7fe580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 40.395189] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 2] RBP: 00007f26965ac000 R08: 00007f26965ab010 R09: 0000000000000000 # [ 39.705242] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 # [ 39.712364] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # EXEC_DATA: saw '[ 40.400924] CR2: ffffa214414fbe18 CR3: 0000000103900000 CR4: 00000000001506f0 [ 40.430229] Call Trace: call trace:': ok ok 30 selftests: lkdtm: EXEC_DATA.sh # selftests: lkdtm: EXEC_STACK.sh [ 40.432680] ? execute_location+0x48/0x56 [ 40.444560] ? lkdtm_EXEC_STACK+0x26/0x44 [ 40.448564] ? direct_entry.cold+0x2c/0x38 [ 40.452658] ? full_proxy_write+0x56/0x80 [ 40.456663] ? vfs_write+0xea/0x3b0 [ 40.460147] ? ksys_write+0x68/0xf0 [ 40.463634] ? do_syscall_64+0x33/0x40 [ 40.467380] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 40.472600] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table [ 40.497945] CR2: ffffa214414fbe18 [ 40.501257] ---[ end trace 3c547c3eb0d57e3d ]--- [ 40.505868] RIP: 0010:lkdtm_BUG+0x5/0x10 [ 40.509784] Code: 89 ff e8 ae 5b a2 ff 48 c7 c0 ea ff ff ff eb de 48 c7 c0 ea ff ff ff e9 29 f0 90 00 48 c7 c0 f4 ff ff ff eb c9 0f 1f 44 00 00 <0f> 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 05 90 8d 9f 02 [ 40.528523] RSP: 0018:ffffa2144080be60 EFLAGS: 00010286 [ 40.533741] RAX: ffffffff8a0f5960 RBX: 0000000000000001 RCX: 0000000000000000 [ 40.540862] RDX: 0000000000000000 RSI: ffff9608ead1bf70 RDI: ffffffff8aed5a70 [ 40.547983] RBP: ffffffff8b333438 R08: 0000000000000001 R09: 0000000000000001 [ 40.555104] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000004 [ 40.562226] R13: ffffa2144080bf10 R14: ffffa2144080bf10 R15: ffff9608c6225000 [ 40.569348] FS: 00007fd2ba7fe580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 40.577423] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 40.583160] CR2: ffffa214414fbe18 CR3: 0000000103900000 CR4: 00000000001506f0 # Killed # [ 39.918061] lkdtm: Performing direct entry EXEC_STACK # [ 39.928220] lkdtm: attempting ok execution at ffffffff8a0f5d30 # [ 39.956249] lkdtm: attempting bad execution at ffffa214414fbe18 # [ 39.984357] kernel tried to execute NX-protected page - exploit attempt? (uid: 0) # [ 40.013970] BUG: unable to handle page fault for address: ffffa214414fbe18 # [ 40.043017] #PF: supervisor instruction fetch in kernel mode # [ 40.048666] #PF: error_code(0x0011) - permissions violation # [ 40.076411] PGD 100000067 P4D 100000067 PUD 10020e067 PMD 1062b4067 PTE 80000001061a8163 # [ 40.106674] Oops: 0011 [#6] SMP NOPTI # [ 40.132517] CPU: 0 PID: 1556 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 40.162430] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 40.168341] RIP: 0010:0xffffa214414fbe18 # [ 40.194437] Code: 00 00 18 be 4f 41 14 a2 ff ff 74 6d 77 8a ff ff ff ff 20 00 00 00 00 00 00 00 be ee 2c 8b ff ff ff ff a0 6e 77 8a ff ff ff ff <0f> 1f 44 00 00 e9 46 ec 90 00 66 0f 1f 44 00 00 0f 1f 44 00 00 55 # [ 40.235357] RSP: 0018:ffffa214414fbdf8 EFLAGS: 00010246 # [ 40.262761] RAX: 0000000000000033 RBX: 0000000000000001 RCX: 0000000000000000 # [ 40.292070] RDX: 0000000000000000 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 # [ 40.321380] RBP: ffffa214414fbe18 R08: 000000000[ 40.739006] lkdtm: Performing direct entry EXEC_KMALLOC 0000000 R09: 0000000000000000 # [ 40.328502] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 000000000000000b # [ 40.357807] R13: ffffa214414fbf10 R14: ffffa214414fbf10 R15: ffff9608c5545000 # [ 40.364930] FS: 00007fd2ba7fe580(0000) GS:ffff9608e[ 40.745294] lkdtm: attempting ok execution at ffffffff8a0f5d30 ac00000(0000) knlGS:0000000000000000 # [ 40.395189] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 40.400924] CR2: ffffa214414fbe18 CR3: 0000000103900000 CR4: 00000000001506f0 # [ 40.430229] Call Trace: # [ 40.432680] ? execute_location[ 40.773283] lkdtm: attempting bad execution at ffff9608c46be700 +0x48/0x56 # [ 40.444560] ? lkdtm_EXEC_STACK+0x26/0x44 # [ 40.448564] ? direct_entry.cold+0x2c/0x38 # [ 40.452658] ? full_proxy_write+0x56/0x80 # [ 40.456663] ? vfs_write+0xea/0x3b0 # [ 40.460147] ? ksys_write+0x68/0xf0 # [ 40.463634[ 40.801419] kernel tried to execute NX-protected page - exploit attempt? (uid: 0) ] ? do_syscall_64+0x33/0x40 # [ 40.467380] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 # [ 40.472600] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo[ 40.831030] BUG: unable to handle page fault for address: ffff9608c46be700 [ 40.860077] #PF: supervisor instruction fetch in kernel mode videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table # [ 40.497945] CR2: ffffa214414fbe18 # [ 40.501257] ---[ end trace 3c547c3eb0d57e3d ]--- # [ 40.505868] RIP: 0010:lkdt[ 40.865726] #PF: error_code(0x0011) - permissions violation m_BUG+0x5/0x10 # [ 40.509784] Code: 89 ff e8 ae 5b a2 ff 48 c7 c0 ea ff ff ff eb de 48 c7 c0 ea ff ff ff e9 29 f0 90 00 48 c7 c0 f4 ff ff ff eb c9 0f 1f 44 00 00 <0f> 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 05 90 8d 9f 02 # [ 40.528523] RSP: [ 40.893472] PGD 92401067 P4D 92401067 PUD 92405067 PMD 10469a063 PTE 80000001046be163 00[18:ffffa2144080be60 EFLAGS: 00010286 # [ 40.533741] RAX: ffffffff8a0f5960 RBX: 0000000000000001 RCX: 0000000000000000 # [ 40.540862] RDX: 0000000000000000 RSI: ffff9608ead1bf70 RDI: ffffffff8aed5a70 # [ 40.547983] RBP: ffffffff8b333438 R08: 0000 40.923476] Oops: 0011 [#7] SMP NOPTI 000000000001 R09: 0000000000000001 # [ 40.555104] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000004 # [ 40.562226] R13: ffffa2144080bf10 R14: ffffa2144080bf10 R15: ffff9608c6225000 # [ 40.569348] FS: 00007fd2ba7fe580(0000) GS:ffff[ 40.949321] CPU: 0 PID: 1592 Comm: cat Tainted: G D W 5.10.173-cip27 #1 [ 40.979232] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 9608eac00000(0000) knlGS:0000000000000000 # [ 40.577423] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 40.583160] CR2: ffffa214414fbe18 CR3: 0000000103900000 CR4: 00000000001506f0 # EXEC_STACK: saw 'call trace:': ok ok 31 selftests: lkdtm: [ 40.985143] RIP: 0010:0xffff9608c46be700 EXEC_STACK.sh # selftests: lkdtm: EXEC_KMALLOC.sh [ 41.011241] Code: 00 00 02 00 00 00 00 00 00 00 c0 ec 6b c4 08 96 ff ff 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 eb 0d 90 89 ff ff ff ff <0f> 1f 44 00 00 e9 46 ec 90 00 66 0f 1f 44 00 00 0f 1f 44 00 00 55 [ 41.034482] RSP: 0018:ffffa21441573e38 EFLAGS: 00010246 [ 41.039700] RAX: 0000000000000033 RBX: 0000000000000001 RCX: 0000000000000000 [ 41.046822] RDX: 0000000000000000 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 [ 41.053946] RBP: ffff9608c46be700 R08: 0000000000000000 R09: 0000000000000000 [ 41.061068] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 000000000000000d [ 41.068191] R13: ffffa21441573f10 R14: ffffa21441573f10 R15: ffff9608c3b02000 [ 41.075313] FS: 00007fe327bfd580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 41.083389] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 41.089124] CR2: ffff9608c46be700 CR3: 00000001052ce000 CR4: 00000000001506f0 [ 41.096246] Call Trace: [ 41.098696] ? execute_location+0x48/0x56 [ 41.102703] ? lkdtm_EXEC_KMALLOC+0x2c/0x40 [ 41.106878] ? direct_entry.cold+0x2c/0x38 [ 41.110969] ? full_proxy_write+0x56/0x80 [ 41.114972] ? vfs_write+0xea/0x3b0 [ 41.118455] ? ksys_write+0x68/0xf0 [ 41.121942] ? do_syscall_64+0x33/0x40 [ 41.125688] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 41.130908] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table [ 41.156251] CR2: ffff9608c46be700 [ 41.159563] ---[ end trace 3c547c3eb0d57e3e ]--- [ 41.164174] RIP: 0010:lkdtm_BUG+0x5/0x10 [ 41.168091] Code: 89 ff e8 ae 5b a2 ff 48 c7 c0 ea ff ff ff eb de 48 c7 c0 ea ff ff ff e9 29 f0 90 00 48 c7 c0 f4 ff ff ff eb c9 0f 1f 44 00 00 <0f> 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 05 90 8d 9f 02 [ 41.186826] RSP: 0018:ffffa2144080be60 EFLAGS: 00010286 [ 41.192045] RAX: ffffffff8a0f5960 RBX: 0000000000000001 RCX: 0000000000000000 [ 41.199166] RDX: 0000000000000000 RSI: ffff9608ead1bf70 RDI: ffffffff8aed5a70 [ 41.206286] RBP: ffffffff8b333438 R08: 0000000000000001 R09: 0000000000000001 [ 41.213407] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000004 [ 41.220527] R13: ffffa2144080bf10 R14: ffffa2144080bf10 R15: ffff9608c6225000 [ 41.227650] FS: 00007fe327bfd580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 41.235726] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 41.241460] CR2: ffff9608c46be700 CR3: 00000001052ce000 CR4: 00000000001506f0 [ 41.248583] BUG: sleeping function called from invalid context at include/linux/percpu-rwsem.h:49 [ 41.257440] in_atomic(): 0, irqs_disabled(): 1, non_block: 0, pid: 1592, name: cat [ 41.264995] INFO: lockdep is turned off. [ 41.268908] irq event stamp: 0 [ 41.271958] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 41.278216] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 [ 41.286380] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 [ 41.294542] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 41.300797] CPU: 0 PID: 1592 Comm: cat Tainted: G D W 5.10.173-cip27 #1 [ 41.308526] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 [ 41.314434] Call Trace: [ 41.316879] dump_stack+0x77/0x9b [ 41.320191] ___might_sleep.cold+0xa6/0xb6 [ 41.324280] exit_signals+0x1c/0x300 [ 41.327851] do_exit+0xc2/0xb00 [ 41.330989] ? ksys_write+0x68/0xf0 [ 41.334475] make_task_dead+0x2f/0x30 [ 41.338134] rewind_stack_and_make_dead+0x17/0x20 [ 41.342830] RIP: 0033:0x7fe327ad9833 [ 41.346400] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 41.365137] RSP: 002b:00007ffd76c0b828 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 41.372693] RAX: ffffffffffffffda RBX: 000000000000000d RCX: 00007fe327ad9833 [ 41.379814] RDX: 000000000000000d RSI: 00007fe3279cc000 RDI: 0000000000000001 [ 41.386934] RBP: 00007fe3279cc000 R08: 00007fe3279cb010 R09: 0000000000000000 [ 41.394055] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 41.401175] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # Killed # [ 40.739006] lkdtm: Performing direct entry EXEC_KMALLOC # [ 40.745294] lkdtm: attempting ok execution at ffffffff8a0f5d30 # [ 40.773283] lkdtm: attempting bad execution at ffff9608c46be700 # [ 40.801419] kernel tried to execute NX-protected page - exploit attempt? (uid: 0) # [ 40.831030] BUG: unable to handle page fault for address: ffff9608c46be700 # [ 40.860077] #PF: supervisor instruction fetch in kernel mode # [ 40.865726] #PF: error_code(0x0011) - permissions violation # [ 40.893472] PGD 92401067 P4D 92401067 PUD 92405067 PMD 10469a063 PTE 80000001046be163 # [ 40.923476] Oops: 0011 [#7] SMP NOPTI # [ 40.949321] CPU: 0 PID: 1592 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 40.979232] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 40.985143] RIP: 0010:0xffff9608c46be700 # [ 41.011241] Code: 00 00 02 00 00 00 00 00 00 00 c0 ec 6b c4 08 96 ff ff 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 eb 0d 90 89 ff ff ff ff <0f> 1f 44 00 00 e9 46 ec 90 00 66 0f 1f 44 00 00 0f 1f 44 00 00 55 # [ 41.034482] RSP: 0018:ffffa21441573e38 EFLAGS: 00010246 # [ 41.039700] RAX: 0000000000000033 RBX: 0000000000000001 RCX: 0000000000000000 # [ 41.046822] RDX: 0000000000000000 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 # [ 41.053946] RBP: ffff9608c46be700 R08:[ 41.571737] lkdtm: Performing direct entry EXEC_VMALLOC 0000000000000000 R09: 0000000000000000 # [ 41.061068] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 000000000000000d # [ 41.068191] R13: ffffa21441573f10 R14: ffffa21441573f10 R15: ffff9608c3b02000 # [ 41.075313] FS: 00007fe327bfd580(0000) GS[ 41.582842] lkdtm: attempting ok execution at ffffffff8a0f5d30 :ffff9608eac00000(0000) knlGS:0000000000000000 # [ 41.083389] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 41.089124] CR2: ffff9608c46be700 CR3: 00000001052ce000 CR4: 00000000001506f0 # [ 41.096246] Call Trace: # [ 41.098696] ? execut[ 41.610852] lkdtm: attempting bad execution at ffffa21440309000 e_location+0x48/0x56 # [ 41.102703] ? lkdtm_EXEC_KMALLOC+0x2c/0x40 # [ 41.106878] ? direct_entry.cold+0x2c/0x38 # [ 41.110969] ? full_proxy_write+0x56/0x80 # [ 41.114972] ? vfs_write+0xea/0x3b0 # [ 41.118455] ? ksys_write+0x68/0xf0 # [[ 41.638982] kernel tried to execute NX-protected page - exploit attempt? (uid: 0) 41.121942] ? do_syscall_64+0x33/0x40 # [ 41.125688] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 # [ 41.130908] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger g[ 41.668590] BUG: unable to handle page fault for address: ffffa21440309000 [ 41.697635] #PF: supervisor instruction fetch in kernel mode smi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table # [ 41.156251] CR2: ffff9608c46be700 # [ 41.159563] ---[ end trace 3c547c3eb0d57e3e ]--- # [ 41.164174] RI[ 41.703283] #PF: error_code(0x0011) - permissions violation P: 0010:lkdtm_BUG+0x5/0x10 # [ 41.168091] Code: 89 ff e8 ae 5b a2 ff 48 c7 c0 ea ff ff ff eb de 48 c7 c0 ea ff ff ff e9 29 f0 90 00 48 c7 c0 f4 ff ff ff eb c9 0f 1f 44 00 00 <0f> 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 05 90 8d 9f 02 # [ 41.1[ 41.731029] PGD 100000067 P4D 100000067 PUD 10020e067 PMD 104d39067 PTE 80000001030b6163 86826] RSP: 0018:ffffa2144080be60 EFLAGS: 00010286 # [ 41.192045] RAX: ffffffff8a0f5960 RBX: 0000000000000001 RCX: 0000000000000000 # [ 41.199166] RDX: 0000000000000000 RSI: ffff9608ead1bf70 RDI: ffffffff8aed5a70 # [ 41.206286] RBP: ffffffff8b3334[ 41.761293] Oops: 0011 [#8] SMP NOPTI 38 R08: 0000000000000001 R09: 0000000000000001 # [ 41.213407] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000004 # [ 41.220527] R13: ffffa2144080bf10 R14: ffffa2144080bf10 R15: ffff9608c6225000 # [ 41.227650] FS: 00007fe327bfd580(0[ 41.787136] CPU: 0 PID: 1628 Comm: cat Tainted: G D W 5.10.173-cip27 #1 [ 41.817049] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 41.235726] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 41.241460] CR2: ffff9608c46be700 CR3: 00000001052ce000 CR4: 00000000001506f0 # [ 41.248583] BUG: sleeping function called fr[ 41.822961] RIP: 0010:0xffffa21440309000 om invalid context at include/linux/percpu-rwsem.h:49 # [ 41.257440] in_atomic(): 0, irqs_disabled(): 1, non_block: 0, pid: 1592, name: cat # [ 41.264995] INFO: lockdep is turned off. # [ 41.268908] irq event stamp: 0 # [ 41.271958] hardirqs la[ 41.849063] Code: Unable to access opcode bytes at RIP 0xffffa21440308fd6. st[ enabled at (0): [<0000000000000000>] 0x0 # [ 41.278216] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 # [ 41.286380] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 # [ 41.294542] s 41.878108] RSP: 0018:ffffa214415f3e38 EFLAGS: 00010246 oftirqs last disabled at (0): [<0000000000000000>] 0x0 # [ 41.300797] CPU: 0 PID: 1592 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 41.308526] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 41.314434] Call Trace: # [ 41.[ 41.905511] RAX: 0000000000000033 RBX: 0000000000000001 RCX: 0000000000000000 [ 41.934820] RDX: 0000000000000000 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 316879] dump_stack+0x77/0x9b # [ 41.320191] ___might_sleep.cold+0xa6/0xb6 # [ 41.324280] exit_signals+0x1c/0x300 # [ 41.327851] do_exit+0xc2/0xb00 # [ 41.330989] ? ksys_write+0x68/0xf0 # [ 41.334475] make_task_dead+0x2f/0x30 # [ 41.[ 41.941942] RBP: ffffa21440309000 R08: 0000000000000000 R09: 0000000000000000 338134] rewind_stack_and_make_dead+0x17/0x20 # [ 41.342830] RIP: 0033:0x7fe327ad9833 # [ 41.346400] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff [ 41.971248] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 000000000000000d [ 42.000559] R13: ffffa214415f3f10 R14: ffffa214415f3f10 R15: ffff9608c30b6000 ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 # [ 41.365137] RSP: 002b:00007ffd76c0b828 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 # [ 41.372693] RAX: ffffffffffffffda RBX: 000000000000000d RCX: 00007fe327ad9833 # [ 41.379814] RDX: 000000000[ 42.007681] FS: 00007f8ee21dc580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 42.037939] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 000000d RSI: 00007fe3279cc000 RDI: 0000000000000001 # [ 41.386934] RBP: 00007fe3279cc000 R08: 00007fe3279cb010 R09: 0000000000000000 # [ 41.394055] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 # [ 41.401175] R13: 0000000000000[ 42.043673] CR2: ffffa21440308fd6 CR3: 00000001043d2000 CR4: 00000000001506f0 [ 42.072977] Call Trace: 001 R14: 0000000000020000 R15: 0000000000020000 # EXEC_KMALLOC: saw 'call trace:': ok ok 32 selftests: lkdtm: EXEC_KMALLOC.sh # selftests: lkdtm: EXEC_VMALLOC.sh [ 42.075427] ? execute_location+0x48/0x56 [ 42.093809] ? lkdtm_EXEC_VMALLOC+0x20/0x30 [ 42.097985] ? direct_entry.cold+0x2c/0x38 [ 42.102077] ? full_proxy_write+0x56/0x80 [ 42.106081] ? vfs_write+0xea/0x3b0 [ 42.109564] ? ksys_write+0x68/0xf0 [ 42.113051] ? do_syscall_64+0x33/0x40 [ 42.116795] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 42.122017] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table [ 42.147361] CR2: ffffa21440309000 [ 42.150673] ---[ end trace 3c547c3eb0d57e3f ]--- [ 42.155284] RIP: 0010:lkdtm_BUG+0x5/0x10 [ 42.159201] Code: 89 ff e8 ae 5b a2 ff 48 c7 c0 ea ff ff ff eb de 48 c7 c0 ea ff ff ff e9 29 f0 90 00 48 c7 c0 f4 ff ff ff eb c9 0f 1f 44 00 00 <0f> 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 05 90 8d 9f 02 [ 42.177937] RSP: 0018:ffffa2144080be60 EFLAGS: 00010286 [ 42.183152] RAX: ffffffff8a0f5960 RBX: 0000000000000001 RCX: 0000000000000000 [ 42.190274] RDX: 0000000000000000 RSI: ffff9608ead1bf70 RDI: ffffffff8aed5a70 [ 42.197394] RBP: ffffffff8b333438 R08: 0000000000000001 R09: 0000000000000001 [ 42.204515] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000004 [ 42.211635] R13: ffffa2144080bf10 R14: ffffa2144080bf10 R15: ffff9608c6225000 [ 42.218758] FS: 00007f8ee21dc580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 42.226834] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 42.232569] CR2: ffffa21440308fd6 CR3: 00000001043d2000 CR4: 00000000001506f0 # Killed # [ 41.571737] lkdtm: Performing direct entry EXEC_VMALLOC # [ 41.582842] lkdtm: attempting ok execution at ffffffff8a0f5d30 # [ 41.610852] lkdtm: attempting bad execution at ffffa21440309000 # [ 41.638982] kernel tried to execute NX-protected page - exploit attempt? (uid: 0) # [ 41.668590] BUG: unable to handle page fault for address: ffffa21440309000 # [ 41.697635] #PF: supervisor instruction fetch in kernel mode # [ 41.703283] #PF: error_code(0x0011) - permissions violation # [ 41.731029] PGD 100000067 P4D 100000067 PUD 10020e067 PMD 104d39067 PTE 80000001030b6163 # [ 41.761293] Oops: 0011 [#8] SMP NOPTI # [ 41.787136] CPU: 0 PID: 1628 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 41.817049] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 41.822961] RIP: 0010:0xffffa21440309000 # [ 41.849063] Code: Unable to access opcode bytes at RIP 0xffffa21440308fd6. # [ 41.878108] RSP: 0018:ffffa214415f3e38 EFLAGS: 00010246 # [ 41.905511] RAX: 0000000000000033 RBX: 0000000000000001 RCX: 0000000000000000 # [ 41.934820] RDX: 0000000000000000 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 # [ 41.941942] RBP: ffffa21440309000 R08: 0000000000000000 R09: 0000000000000000 # [ 41.971248] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 000000000000000d # [ 42.00[ 42.426768] lkdtm: Performing direct entry EXEC_RODATA 0559] R13: ffffa214415f3f10 R14: ffffa214415f3f10 R15: ffff9608c30b6000 # [ 42.007681] FS: 00007f8ee21dc580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 42.037939] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 42.043673] CR2[ 42.432003] lkdtm: attempting ok execution at ffffffff8a0f5d30 : ffffa21440308fd6 CR3: 00000001043d2000 CR4: 00000000001506f0 # [ 42.072977] Call Trace: # [ 42.075427] ? execute_location+0x48/0x56 # [ 42.093809] ? lkdtm_EXEC_VMALLOC+0x20/0x30 # [ 42.097985] ? direct_entry.cold+0x2c/0x38 # [ 42.102077[ 42.460017] lkdtm: attempting bad execution at ffffffff8aed5f00 ] ? full_proxy_write+0x56/0x80 # [ 42.106081] ? vfs_write+0xea/0x3b0 # [ 42.109564] ? ksys_write+0x68/0xf0 # [ 42.113051] ? do_syscall_64+0x33/0x40 # [ 42.116795] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 # [ 42.122017] Modules linked [ 42.488137] kernel tried to execute NX-protected page - exploit attempt? (uid: 0) in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_t[ 42.517754] BUG: unable to handle page fault for address: ffffffff8aed5f00 ab[le # [ 42.147361] CR2: ffffa21440309000 # [ 42.150673] ---[ end trace 3c547c3eb0d57e3f ]--- # [ 42.155284] RIP: 0010:lkdtm_BUG+0x5/0x10 # [ 42.159201] Code: 89 ff e8 ae 5b a2 ff 48 c7 c0 ea ff ff ff eb de 48 c7 c0 ea ff ff ff e9 29 f0 90 00 4 42.546801] #PF: supervisor instruction fetch in kernel mode [ 42.574635] #PF: error_code(0x0011) - permissions violation 8 c7 c0 f4 ff ff ff eb c9 0f 1f 44 00 00 <0f> 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 05 90 8d 9f 02 # [ 42.177937] RSP: 0018:ffffa2144080be60 EFLAGS: 00010286 # [ 42.183152] RAX: ffffffff8a0f5960 RBX: 0000000000000001 RCX: 0000000000000000 [ 42.580198] PGD 90c29067 P4D 90c29067 PUD 90c2a063 PMD 80000000906001e1 # [[ 42.190274] RDX: 0000000000000000 RSI: ffff9608ead1bf70 RDI: ffffffff8aed5a70 # [ 42.197394] RBP: ffffffff8b333438 R08: 0000000000000001 R09: 0000000000000001 # [ 42.204515] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000004 # [ 42.609071] Oops: 0011 [#9] SMP NOPTI 42.211635] R13: ffffa2144080bf10 R14: ffffa2144080bf10 R15: ffff9608c6225000 # [ 42.218758] FS: 00007f8ee21dc580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 42.226834] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 42.2325[ 42.634915] CPU: 0 PID: 1664 Comm: cat Tainted: G D W 5.10.173-cip27 #1 [ 42.664829] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 69] CR2: ffffa21440308fd6 CR3: 00000001043d2000 CR4: 00000000001506f0 # EXEC_VMALLOC: saw 'call trace:': ok ok 33 selftests: lkdtm: EXEC_VMALLOC.sh # selftests: lkdtm: EXEC_RODATA.sh [ 42.670746] RIP: 0010:lkdtm_rodata_do_nothing+0x0/0x10 [ 42.692074] Code: ff ff 10 83 77 8a ff ff ff ff 0a f1 2c 8b ff ff ff ff 56 6a 77 8a ff ff ff ff 55 aa 55 aa 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 54 68 69 73 20 69 [ 42.710810] RSP: 0018:ffffa2144166be48 EFLAGS: 00010246 [ 42.716027] RAX: 0000000000000033 RBX: 0000000000000000 RCX: 0000000000000000 [ 42.723150] RDX: 0000000000000000 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 [ 42.730272] RBP: ffffffff8aed5f00 R08: 0000000000000000 R09: 0000000000000000 [ 42.737396] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 000000000000000c [ 42.744517] R13: ffffa2144166bf10 R14: ffffa2144166bf10 R15: ffff9608c3320000 [ 42.751639] FS: 00007f87102e8580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 42.759717] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 42.765453] CR2: ffffffff8aed5f00 CR3: 0000000103b06000 CR4: 00000000001506f0 [ 42.772575] Call Trace: [ 42.775023] ? execute_location+0x48/0x56 [ 42.779027] ? direct_entry.cold+0x2c/0x38 [ 42.783121] ? full_proxy_write+0x56/0x80 [ 42.787127] ? vfs_write+0xea/0x3b0 [ 42.790611] ? ksys_write+0x68/0xf0 [ 42.794095] ? do_syscall_64+0x33/0x40 [ 42.797840] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 42.803060] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table [ 42.828404] CR2: ffffffff8aed5f00 [ 42.831715] ---[ end trace 3c547c3eb0d57e40 ]--- [ 42.836328] RIP: 0010:lkdtm_BUG+0x5/0x10 [ 42.840244] Code: 89 ff e8 ae 5b a2 ff 48 c7 c0 ea ff ff ff eb de 48 c7 c0 ea ff ff ff e9 29 f0 90 00 48 c7 c0 f4 ff ff ff eb c9 0f 1f 44 00 00 <0f> 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 05 90 8d 9f 02 [ 42.858982] RSP: 0018:ffffa2144080be60 EFLAGS: 00010286 [ 42.864199] RAX: ffffffff8a0f5960 RBX: 0000000000000001 RCX: 0000000000000000 [ 42.871321] RDX: 0000000000000000 RSI: ffff9608ead1bf70 RDI: ffffffff8aed5a70 [ 42.878442] RBP: ffffffff8b333438 R08: 0000000000000001 R09: 0000000000000001 [ 42.885563] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000004 [ 42.892684] R13: ffffa2144080bf10 R14: ffffa2144080bf10 R15: ffff9608c6225000 [ 42.899808] FS: 00007f87102e8580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 42.907884] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 42.913619] CR2: ffffffff8aed5f00 CR3: 0000000103b06000 CR4: 00000000001506f0 [ 42.920743] BUG: sleeping function called from invalid context at include/linux/percpu-rwsem.h:49 [ 42.929599] in_atomic(): 0, irqs_disabled(): 1, non_block: 0, pid: 1664, name: cat [ 42.937153] INFO: lockdep is turned off. [ 42.941067] irq event stamp: 0 [ 42.944117] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 42.950377] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 [ 42.958539] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 [ 42.966703] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 42.972961] CPU: 0 PID: 1664 Comm: cat Tainted: G D W 5.10.173-cip27 #1 [ 42.980689] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 [ 42.986596] Call Trace: [ 42.989041] dump_stack+0x77/0x9b [ 42.992352] ___might_sleep.cold+0xa6/0xb6 [ 42.996444] exit_signals+0x1c/0x300 [ 43.000015] do_exit+0xc2/0xb00 [ 43.003153] ? ksys_write+0x68/0xf0 [ 43.006636] make_task_dead+0x2f/0x30 [ 43.010294] rewind_stack_and_make_dead+0x17/0x20 [ 43.014991] RIP: 0033:0x7f87101c1833 [ 43.018562] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 43.037297] RSP: 002b:00007ffe9baf90f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 43.044855] RAX: ffffffffffffffda RBX: 000000000000000c RCX: 00007f87101c1833 [ 43.051976] RDX: 000000000000000c RSI: 00007f87100b4000 RDI: 0000000000000001 [ 43.059098] RBP: 00007f87100b4000 R08: 00007f87100b3010 R09: 0000000000000000 [ 43.066219] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 43.073341] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # Killed # [ 42.426768] lkdtm: Performing direct entry EXEC_RODATA # [ 42.432003] lkdtm: attempting ok execution at ffffffff8a0f5d30 # [ 42.460017] lkdtm: attempting bad execution at ffffffff8aed5f00 # [ 42.488137] kernel tried to execute NX-protected page - exploit attempt? (uid: 0) # [ 42.517754] BUG: unable to handle page fault for address: ffffffff8aed5f00 # [ 42.546801] #PF: supervisor instruction fetch in kernel mode # [ 42.574635] #PF: error_code(0x0011) - permissions violation # [ 42.580198] PGD 90c29067 P4D 90c29067 PUD 90c2a063 PMD 80000000906001e1 # [ 42.609071] Oops: 0011 [#9] SMP NOPTI # [ 42.634915] CPU: 0 PID: 1664 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 42.664829] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 42.670746] RIP: 0010:lkdtm_rodata_do_nothing+0x0/0x10 # [ 42.692074] Code: ff ff 10 83 77 8a ff ff ff ff 0a f1 2c 8b ff ff ff ff 56 6a 77 8a ff ff ff ff 55 aa 55 aa 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 54 68 69 73 20 69 # [ 42.710810] RSP: 0018:ffffa2144166be48 EFLAGS: 00010246 # [ 42.716027] RAX: 0000000000000033 RBX: 0000000000000000 RCX: 0000000000000000 # [ 42.723150] RDX: 0000000000000000 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 # [ 42.730272] RBP: ffffffff8aed5f00 R08: 0000000000000000 R09: 0000000000000000 # [ 42.737396] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 000000000000000c # [ 42.744517] R13: ffffa2144166bf10 R14: ffffa2144166bf10 R15: ffff9608c3320000 # [ 42.751639] FS: 00007f87102e8580(0000) GS:[ 43.260772] lkdtm: Performing direct entry EXEC_USERSPACE ffff9608eac00000(0000) knlGS:0000000000000000 # [ 42.759717] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 42.765453] CR2: ffffffff8aed5f00 CR3: 0000000103b06000 CR4: 00000000001506f0 # [ 42.772575] Call Trace: # [ 42.775023] ? execute[ 43.288087] lkdtm: attempting ok execution at ffffffff8a0f5d30 _location+0x48/0x56 # [ 42.779027] ? direct_entry.cold+0x2c/0x38 # [ 42.783121] ? full_proxy_write+0x56/0x80 # [ 42.787127] ? vfs_write+0xea/0x3b0 # [ 42.790611] ? ksys_write+0x68/0xf0 # [ 42.794095] ? do_syscall_64+0x33/0x40 # [ 42.[ 43.316129] lkdtm: attempting bad execution at 00007f0aedf3c000 797840] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 # [ 42.803060] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops vid[ 43.344221] unable to execute userspace code (SMEP?) (uid: 0) [ 43.372080] BUG: unable to handle page fault for address: 00007f0aedf3c000 [ 43.378942] #PF: supervisor instruction fetch in kernel mode [ 43.384592] #PF: error_code(0x0011) - permissions violation [ 43.390153] PGD 1056fc067 P4D 1056fc067 PUD 10442b067 PMD 106226067 PTE 10aef6067 [ 43.397628] Oops: 0011 [#10] SMP NOPTI [ 43.401372] CPU: 1 PID: 1700 Comm: cat Tainted: G D W 5.10.173-cip27 #1 [ 43.409101] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 [ 43.415012] RIP: 0010:0x7f0aedf3c000 [ 43.418580] Code: Unable to access opcode bytes at RIP 0x7f0aedf3bfd6. [ 43.425097] RSP: 0018:ffffa214416ebe50 EFLAGS: 00010246 [ 43.430313] RAX: 0000000000000033 RBX: 0000000000000024 RCX: 0000000000000000 [ 43.437434] RDX: 0000000000000000 RSI: ffff9608ead1bf70 RDI: ffff9608ead1bf70 [ 43.444554] RBP: 00007f0aedf3c000 R08: 0000000000000000 R09: 0000000000000000 [ 43.451676] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 000000000000000f [ 43.458796] R13: ffffa214416ebf10 R14: ffffa214416ebf10 R15: ffff9608c5391000 [ 43.465918] FS: 00007f0aedf3e580(0000) GS:ffff9608ead00000(0000) knlGS:0000000000000000 [ 43.473992] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 43.479727] CR2: 00007f0aedf3c000 CR3: 0000000103924000 CR4: 00000000001506e0 [ 43.486849] Call Trace: [ 43.489297] ? lkdtm_EXEC_USERSPACE.cold+0x69/0xae [ 43.494080] ? direct_entry.cold+0x2c/0x38 [ 43.498172] ? full_proxy_write+0x56/0x80 [ 43.502177] ? vfs_write+0xea/0x3b0 [ 43.505661] ? ksys_write+0x68/0xf0 [ 43.509145] ? do_syscall_64+0x33/0x40 [ 43.512889] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 43.518107] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table [ 43.543451] CR2: 00007f0aedf3c000 eobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table # [ 42.828404] CR2: ffffffff8aed5f00 # [ 42.831715] ---[ end trace 3c547c3eb0d57e40 ]--- # [ 42.836328] RIP: 0010:lkdtm_BUG+0x5/0x10 # [ 42.840244] Code: [ 43.546826] ---[ end trace 3c547c3eb0d57e41 ]--- 89 ff e8 ae 5b a2 ff 48 c7 c0 ea ff ff ff eb de 48 c7 c0 ea ff ff ff e9 29 f0 90 00 48 c7 c0 f4 ff ff ff eb c9 0f 1f 44 00 00 <0f> 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 05 90 8d 9f 02 # [ 42.858982] RSP: 0018:ffffa2144080be60 EFLAGS: 00010286 [ 43.573636] RIP: 0010:lkdtm_BUG+0x5/0x10 # [ 42.864199] RAX: ffffffff8a0f5960 RBX: 0000000000000001 RCX: 0000000000000000 # [ 42.871321] RDX: 0000000000000000 RSI: ffff9608ead1bf70 RDI: ffffffff8aed5a70 # [ 42.878442] RBP: ffffffff8b333438 R08: 0000000000000001 R09: 0000000000000001 # [[ 43.599735] Code: 89 ff e8 ae 5b a2 ff 48 c7 c0 ea ff ff ff eb de 48 c7 c0 ea ff ff ff e9 29 f0 90 00 48 c7 c0 f4 ff ff ff eb c9 0f 1f 44 00 00 <0f> 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 05 90 8d 9f 02 42.885563] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000004 # [ 42.892684] R13: ffffa2144080bf10 R14: ffffa2144080bf10 R15: ffff9608c6225000 # [ 42.899808] FS: 00007f87102e8580(0000) GS:ffff9608eac00000(0000) knlGS:00000000000000[ 43.640667] RSP: 0018:ffffa2144080be60 EFLAGS: 00010286 00 # [ 42.907884] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 42.913619] CR2: ffffffff8aed5f00 CR3: 0000000103b06000 CR4: 00000000001506f0 # [ 42.920743] BUG: sleeping function called from invalid context at include/linux/percpu-rwsem.h:[ 43.668078] RAX: ffffffff8a0f5960 RBX: 0000000000000001 RCX: 0000000000000000 49 # [ 42.929599] in_atomic(): 0, irqs_disabled(): 1, non_block: 0, pid: 1664, name: cat # [ 42.937153] INFO: lockdep is turned off. # [ 42.941067] irq event stamp: 0 # [ 42.944117] hardirqs last enabled at (0): [<0000000000000000>] 0x0 # [ [ 43.697387] RDX: 0000000000000000 RSI: ffff9608ead1bf70 RDI: ffffffff8aed5a70 42.950377] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 # [ 42.958539] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 # [ 42.966703] softirqs last disabled at (0): [<0000000000000000>] [ 43.726723] RBP: ffffffff8b333438 R08: 0000000000000001 R09: 0000000000000001 0x0 # [ 42.972961] CPU: 0 PID: 1664 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 42.980689] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 42.986596] Call Trace: # [ 42.989041] dump_stack+0x77/0x9b # [ 42.992352] __[ 43.756007] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000004 _might_sleep.cold+0xa6/0xb6[ 43.785315] R13: ffffa2144080bf10 R14: ffffa2144080bf10 R15: ffff9608c6225000 # [ 42.996444] exit_signals+0x1c/0x300[ 43.794817] FS: 00007f0aedf3e580(0000) GS:ffff9608ead00000(0000) knlGS:0000000000000000 # [ 43.000015] do_exit+0xc2/0xb00 # [ 43.003153] ? ksys_write+0x68/0xf0 # [ 43.006636] make_task_dead+0x2f/0x30 # [ 43.010294] rewind_stack_and_make_dead+0x17/0x20 # [ 43.014991] RIP: 0033:0x7f87101c1833 # [ 43.018562] Code: 8b 15 61[ 43.806660] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18[ 43.834608] CR2: 00007f0aedf3c000 CR3: 0000000103924000 CR4: 00000000001506e0 # [ 43.037297] RSP: 002b:00007ffe9baf90f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 # [ 43.044855] RAX: ffffffffffffffda RBX: 000000000000000c RCX: 00007f87101c1833 # [ 43.051976] RDX: 000000000000000c RSI: 00007f87100b4000 RDI: 0000000000000001 # [ 43.059098] RBP: 00007f87100b4000 R08: 00007f87100b3010 R09: 0000000000000000 # [ 43.066219] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 # [ 43.073341] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # EXEC_RODATA: saw 'call trace:': ok ok 34 selftests: lkdtm: EXEC_RODATA.sh # selftests: lkdtm: EXEC_USERSPACE.sh # Killed # [ 43.260772] lkdtm: Performing direct entry EXEC_USERSPACE # [ 43.288087] lkdtm: attempting ok execution at ffffffff8a0f5d30 # [ 43.316129] lkdtm: attempting bad execution at 00007f0aedf3c000 # [ 43.344221] unable to execute userspace code (SMEP?) (uid: 0) # [ 43.372080] BUG: unable to handle page fault for address: 00007f0aedf3c000 # [ 43.378942] #PF: supervisor instruction fetch in kernel mode # [ 43.384592] #PF: error_code(0x0011) - permissions violation # [ 43.390153] PGD 1056fc067 P4D 1056fc067 PUD 10442b067 PMD 106226067 PTE 10aef6067 # [ 43.397628] Oops: 0011 [#10] SMP NOPTI # [ 43.401372] CPU: 1 PID: 1700 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 43.409101] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 43.415012] RIP: 0010:0x7f0aedf3c000 # [ 43.418580] Code: Unable to access opcode bytes at RIP 0x7f0aedf3bfd6. # [ 43.425097] RSP: 0018:ffffa214416ebe50 EFLAGS: 00010246 # [ 43.430313] RAX: 0000000000000033 RBX: 0000000000000024 RCX: 0000000000000000 # [ 43.437434] RDX: 0000000000000000 RSI: ffff9608ead1bf70 RDI: ffff9608ead1bf70 # [ 43.444554] RBP: 00007[ 43.997693] lkdtm: Performing direct entry EXEC_NULL f0aedf3c000 R08: 0000000000000000 R09: 0000000000000000 # [ 43.451676] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 000000000000000f # [ 43.458796] R13: ffffa214416ebf10 R14: ffffa214416ebf10 R15: ffff9608c5391000 # [ 43.465918] FS: 00007f0ae[ 44.018151] lkdtm: attempting ok execution at ffffffff8a0f5d30 df3e580(0000) GS:ffff9608ead00000(0000) knlGS:0000000000000000 # [ 43.473992] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 43.479727] CR2: 00007f0aedf3c000 CR3: 0000000103924000 CR4: 00000000001506e0 # [ 43.486849] Call Trace: # [ 43.4[ 44.046197] lkdtm: attempting bad execution at 0000000000000000 89297] ? lkdtm_EXEC_USERSPACE.cold+0x69/0xae # [ 43.494080] ? direct_entry.cold+0x2c/0x38 # [ 43.498172] ? full_proxy_write+0x56/0x80 # [ 43.502177] ? vfs_write+0xea/0x3b0 # [ 43.505661] ? ksys_write+0x68/0xf0 # [ 43.509145] ? do_sysca[ 44.074331] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ 44.103376] #PF: supervisor instruction fetch in kernel mode ll_64+0x33/0x40 # [ 43.512889] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 # [ 43.518107] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vm[ 44.109025] #PF: error_code(0x0010) - not-present page alloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table # [ 43.543451] CR2: 00007f0aedf3c000 # [ 43.546826] ---[ end trace 3c547c3eb0d57e41 ]--- # [ 43.573636] RIP: 0010:lkdtm_BUG+0x5/0x1[ 44.136337] PGD 0 P4D 0 0 [ # [ 43.599735] Code: 89 ff e8 ae 5b a2 ff 48 c7 c0 ea ff ff ff eb de 48 c7 c0 ea ff ff ff e9 29 f0 90 00 48 c7 c0 f4 ff ff ff eb c9 0f 1f 44 00 00 <0f> 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 05 90 8d 9f 02 # [ 43.640667] RSP: 0018:ffffa214 44.161054] Oops: 0010 [#11] SMP NOPTI 4080be60 EFLAGS: 00010286 # [ 43.668078] RAX: ffffffff8a0f5960 RBX: 0000000000000001 RCX: 0000000000000000 # [ 43.697387] RDX: 0000000000000000 RSI: ffff9608ead1bf70 RDI: ffffffff8aed5a70 # [ 43.726723] RBP: ffffffff8b333438 R08: 0000000000000001 [ 44.186986] CPU: 0 PID: 1736 Comm: cat Tainted: G D W 5.10.173-cip27 #1 [ 44.216900] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 R09: 0000000000000001 # [ 43.756007] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000004 # [ 43.785315] R13: ffffa2144080bf10 R14: ffffa2144080bf10 R15: ffff9608c6225000 # [ 43.794817] FS: 00007f0aedf3e580(0000) GS:ffff9608ead00000([ 44.222813] RIP: 0010:0x0 0000) knlGS:0000000000000000 # [ 43.806660] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 43.834608] CR2: 00007f0aedf3c000 CR3: 0000000103924000 CR4: 00000000001506e0 # EXEC_USERSPACE: saw 'call trace:': ok ok 35 selftests: lkdtm: EXEC_USER[ 44.247613] Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6. SP[ACE.sh # selftests: lkdtm: EXEC_NULL.sh 44.276661] RSP: 0018:ffffa2144175be48 EFLAGS: 00010246 [ 44.285692] RAX: 0000000000000033 RBX: 0000000000000000 RCX: 0000000000000000 [ 44.292814] RDX: 0000000000000000 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 [ 44.299934] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 44.307056] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 000000000000000a [ 44.314177] R13: ffffa2144175bf10 R14: ffffa2144175bf10 R15: ffff9608c3b03000 [ 44.321298] FS: 00007f29c186c580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 44.329375] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 44.335110] CR2: ffffffffffffffd6 CR3: 00000001043d4000 CR4: 00000000001506f0 [ 44.342230] Call Trace: [ 44.344679] execute_location+0x48/0x56 [ 44.348511] direct_entry.cold+0x2c/0x38 [ 44.352430] full_proxy_write+0x56/0x80 [ 44.356261] vfs_write+0xea/0x3b0 [ 44.359571] ksys_write+0x68/0xf0 [ 44.362883] do_syscall_64+0x33/0x40 [ 44.366455] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 44.371498] RIP: 0033:0x7f29c1779833 [ 44.375067] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 44.393804] RSP: 002b:00007fff4952fe48 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 44.401359] RAX: ffffffffffffffda RBX: 000000000000000a RCX: 00007f29c1779833 [ 44.408480] RDX: 000000000000000a RSI: 00007f29c166c000 RDI: 0000000000000001 [ 44.415601] RBP: 00007f29c166c000 R08: 00007f29c166b010 R09: 0000000000000000 [ 44.422722] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 44.429843] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 [ 44.436968] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table [ 44.462310] CR2: 0000000000000000 [ 44.465785] ---[ end trace 3c547c3eb0d57e42 ]--- [ 44.470611] RIP: 0010:lkdtm_BUG+0x5/0x10 [ 44.474604] Code: 89 ff e8 ae 5b a2 ff 48 c7 c0 ea ff ff ff eb de 48 c7 c0 ea ff ff ff e9 29 f0 90 00 48 c7 c0 f4 ff ff ff eb c9 0f 1f 44 00 00 <0f> 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 05 90 8d 9f 02 [ 44.493395] RSP: 0018:ffffa2144080be60 EFLAGS: 00010286 [ 44.498673] RAX: ffffffff8a0f5960 RBX: 0000000000000001 RCX: 0000000000000000 [ 44.505843] RDX: 0000000000000000 RSI: ffff9608ead1bf70 RDI: ffffffff8aed5a70 [ 44.512989] RBP: ffffffff8b333438 R08: 0000000000000001 R09: 0000000000000001 [ 44.520141] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000004 [ 44.527270] R13: ffffa2144080bf10 R14: ffffa2144080bf10 R15: ffff9608c6225000 [ 44.534400] FS: 00007f29c186c580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 44.542483] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 44.548225] CR2: ffffffffffffffd6 CR3: 00000001043d4000 CR4: 00000000001506f0 # Killed # [ 43.997693] lkdtm: Performing direct entry EXEC_NULL # [ 44.018151] lkdtm: attempting ok execution at ffffffff8a0f5d30 # [ 44.046197] lkdtm: attempting bad execution at 0000000000000000 # [ 44.074331] BUG: kernel NULL pointer dereference, address: 0000000000000000 # [ 44.103376] #PF: supervisor instruction fetch in kernel mode # [ 44.109025] #PF: error_code(0x0010) - not-present page # [ 44.136337] PGD 0 P4D 0 # [ 44.161054] Oops: 0010 [#11] SMP NOPTI # [ 44.186986] CPU: 0 PID: 1736 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 44.216900] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 44.222813] RIP: 0010:0x0 # [ 44.247613] Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6. # [ 44.276661] RSP: 0018:ffffa2144175be48 EFLAGS: 00010246 # [ 44.285692] RAX: 0000000000000033 RBX: 0000000000000000 RCX: 0000000000000000 # [ 44.292814] RDX: 0000000000000000 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 # [ 44.299934] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 # [ 44.307056] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 000000000000000a # [ 44.314177] R13: ffffa2144175bf10 R14: ffffa2144175bf10 R15: ffff9608c3b03000 # [ 44.321298] FS: 00007f29c186c580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 44.329375] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 44.335110] CR2: ffffffffffffffd6 CR3: 00000001043d4000 CR4: 00000000001506f0 # [ 44.342230] Call Trace: # [ 44.344679] execute_location+0x48/0x56 # [ 44.348511] direct_entry.cold+0x2c/[ 44.693494] lkdtm: Performing direct entry ACCESS_USERSPACE 0x38 # [ 44.352430] full_proxy_write+0x56/0x80 # [ 44.356261] vfs_write+0xea/0x3b0 # [ 44.359571] ksys_write+0x68/0xf0 # [ 44.362883] do_syscall_64+0x33/0x40 # [ 44.366455] entry_SYSCALL_64_after_hwframe+0x61/0xc6 # [ 44.371498] RIP:[ 44.720160] lkdtm: attempting bad read at 00007fac17d45000 0033:0x7f29c1779833 # [ 44.375067] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 # [ 44.393804][ 44.747813] lkdtm: FAIL: survived bad read RSP: 002b:00007fff4952fe48 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 # [ 44.401359] RAX: ffffffffffffffda RBX: 000000000000000a RCX: 00007f29c1779833 # [ 44.408480] RDX: 000000000000000a RSI: 00007f29c166c000 RDI: 0000000000000001 # [ 44.415601[ 44.774080] lkdtm: attempting bad write at 00007fac17d45000 ] RBP: 00007f29c166c000 R08: 00007f29c166b010 R09: 0000000000000000 # [ 44.422722] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 # [ 44.429843] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # [ 44.436968] Mo[ 44.801853] lkdtm: FAIL: survived bad write dules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table # [ 44.462310] CR2: 0000000000000000 # [ 44.465785] ---[ end trace 3c547c3eb0d57e42 ]--- # [ 44.470611] RIP: 0010:lkdtm_BUG+0x5/0x10 # [ 44.474604] Code: 89 ff e8 ae 5b a2 ff 48 c7 c0 ea ff ff ff eb de 48 c7 c0 ea ff ff ff e9 29 f0 90 00 48 c7 c0 f4 ff ff ff eb c9 0f 1f 44 00 00 <0f> 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 05 90 8d 9f 02 # [ 44.493395] RSP: 0018:ffffa2144080be60 EFLAGS: 00010286 # [ 44.498673] RAX: ffffffff8a0f5960 RBX: 0000000000000001 RCX: 0000000000000000 # [ 44.505843] RDX: 0000000000000000 RSI: ffff9608ead1bf70 RDI: ffffffff8aed5a70 # [ 44.512989] RBP: ffffffff8b333438 R08: 0000000000000001 R09: 0000000000000001 # [ 44.520141] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000004 # [ 44.527270] R13: ffffa2144080bf10 R14: ffffa2144080bf10 R15: ffff9608c6225000 # [ 44.534400] FS: 00007f29c186c580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 44.542483] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 44.548225] CR2: ffffffffffffffd6 CR3: 00000001043d4000 CR4: 00000000001506f0 # EXEC_NULL: saw 'call trace:': ok ok 36 selftests: lkdtm: EXEC_NULL.sh # selftests: lkdtm: ACCESS_USERSPACE.sh # [ 44.693494] lkdtm: Performing direct entry ACCESS_USERSPACE # [ 44.720160] lkdtm: attempting bad read at 00007fac17d45000 # [ 44.747813] lkdtm: FAIL: survived bad read # [ 44.774080] lkdtm: attempting bad write at 00007fac17d45000 # [ 44.801853] lkdtm: FAIL: survived bad write # ACCESS_USERSPACE: missing 'call trace:': [FAIL] not ok 37 selftests: lkdtm: ACCESS_USERSPACE.sh # exit=1 # selftests: lkdtm: ACCESS_NULL.sh [ 44.999751] lkdtm: Performing direct entry ACCESS_NULL [ 45.004903] lkdtm: attempting bad read at 0000000000000000 [ 45.010429] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ 45.017382] #PF: supervisor read access in kernel mode [ 45.022511] #PF: error_code(0x0000) - not-present page [ 45.027638] PGD 0 P4D 0 [ 45.030172] Oops: 0000 [#12] SMP NOPTI [ 45.033916] CPU: 0 PID: 1805 Comm: cat Tainted: G D W 5.10.173-cip27 #1 [ 45.041644] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 [ 45.047559] RIP: 0010:lkdtm_ACCESS_NULL+0x14/0x53 [ 45.052256] Code: 11 91 fd ff be 00 10 00 00 48 89 ef e8 15 15 39 ff e9 69 ff ff ff 0f 1f 44 00 00 53 31 f6 48 c7 c7 28 fe 2c 8b e8 eb 90 fd ff <48> 8b 1c 25 00 00 00 00 b8 de c0 de c0 48 c7 c7 50 fe 2c 8b 48 01 [ 45.070990] RSP: 0018:ffffa2144183be58 EFLAGS: 00010246 [ 45.076206] RAX: 000000000000002e RBX: 0000000000000027 RCX: 0000000000000000 [ 45.083327] RDX: 0000000000000000 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 [ 45.090448] RBP: ffffffff8b2cef19 R08: 0000000000000000 R09: 0000000000000000 [ 45.097568] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 000000000000000c [ 45.104688] R13: ffffa2144183bf10 R14: ffffa2144183bf10 R15: ffff9608c390f000 [ 45.111809] FS: 00007f96b2abc580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 45.119884] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 45.125619] CR2: 0000000000000000 CR3: 0000000103320000 CR4: 00000000001506f0 [ 45.132739] Call Trace: [ 45.135185] direct_entry.cold+0x2c/0x38 [ 45.139105] full_proxy_write+0x56/0x80 [ 45.142937] vfs_write+0xea/0x3b0 [ 45.146246] ksys_write+0x68/0xf0 [ 45.149556] do_syscall_64+0x33/0x40 [ 45.153127] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 45.158169] RIP: 0033:0x7f96b29c9833 [ 45.161738] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 45.180474] RSP: 002b:00007ffdc5cf1948 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 45.188031] RAX: ffffffffffffffda RBX: 000000000000000c RCX: 00007f96b29c9833 [ 45.195151] RDX: 000000000000000c RSI: 00007f96b28bc000 RDI: 0000000000000001 [ 45.202271] RBP: 00007f96b28bc000 R08: 00007f96b28bb010 R09: 0000000000000000 [ 45.209392] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 45.216512] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 [ 45.223638] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table [ 45.248982] CR2: 0000000000000000 [ 45.252337] ---[ end trace 3c547c3eb0d57e43 ]--- [ 45.256967] RIP: 0010:lkdtm_BUG+0x5/0x10 [ 45.261010] Code: 89 ff e8 ae 5b a2 ff 48 c7 c0 ea ff ff ff eb de 48 c7 c0 ea ff ff ff e9 29 f0 90 00 48 c7 c0 f4 ff ff ff eb c9 0f 1f 44 00 00 <0f> 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 05 90 8d 9f 02 [ 45.279785] RSP: 0018:ffffa2144080be60 EFLAGS: 00010286 [ 45.285072] RAX: ffffffff8a0f5960 RBX: 0000000000000001 RCX: 0000000000000000 [ 45.292242] RDX: 0000000000000000 RSI: ffff9608ead1bf70 RDI: ffffffff8aed5a70 [ 45.299414] RBP: ffffffff8b333438 R08: 0000000000000001 R09: 0000000000000001 [ 45.306595] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000004 [ 45.313763] R13: ffffa2144080bf10 R14: ffffa2144080bf10 R15: ffff9608c6225000 [ 45.320938] FS: 00007f96b2abc580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 45.329060] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 45.334837] CR2: 0000000000000000 CR3: 0000000103320000 CR4: 00000000001506f0 # Killed # [ 44.999751] lkdtm: Performing direct entry ACCESS_NULL # [ 45.004903] lkdtm: attempting bad read at 0000000000000000 # [ 45.010429] BUG: kernel NULL pointer dereference, address: 0000000000000000 # [ 45.017382] #PF: supervisor read access in kernel mode # [ 45.022511] #PF: error_code(0x0000) - not-present page # [ 45.027638] PGD 0 P4D 0 # [ 45.030172] Oops: 0000 [#12] SMP NOPTI # [ 45.033916] CPU: 0 PID: 1805 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 45.041644] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 45.047559] RIP: 0010:lkdtm_ACCESS_NULL+0x14/0x53 # [ 45.052256] Code: 11 91 fd ff be 00 10 00 00 48 89 ef e8 15 15 39 ff e9 69 ff ff ff 0f 1f 44 00 00 53 31 f6 48 c7 c7 28 fe 2c 8b e8 eb 90 fd ff <48> 8b 1c 25 00 00 00 00 b8 de c0 de c0 48 c7 c7 50 fe 2c 8b 48 01 # [ 45.070990] RSP: 0018:ffffa2144183be58 EFLAGS: 00010246 # [ 45.076206] RAX: 000000000000002e RBX: 0000000000000027 RCX: 0000000000000000 # [ 45.083327] RDX: 0000000000000000 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 # [ 45.090448] RBP: ffffffff8b2cef19 R08: 0000000000000000 R09: 0000000000000000 # [ 45.097568] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 000000000000000c # [ 45.104688] R13: ffffa2144183bf10 R14: ffffa2144183bf10 R15: ffff9608c390f000 # [ 45.111809] FS: 00007f96b2abc580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 45.119884] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 45.125619] CR2: 0000000000000000 CR3: 0000000103320000 CR4: 00000000001506f0 # [ 45.132739] Call Trace: # [[ 45.527620] lkdtm: Performing direct entry WRITE_RO 45.135185] direct_entry.cold+0x2c/0x38 # [ 45.139105] full_proxy_write+0x56/0x80 # [ 45.142937] vfs_write+0xea/0x3b0 # [ 45.146246] ksys_write+0x68/0xf0 # [ 45.149556] do_syscall_64+0x33/0x40 # [ 45.153127] entry_SYSCALL_64_after_hw[ 45.541576] lkdtm: attempting bad rodata write at ffffffff8aed5ef0 frame+0x61/0xc6 # [ 45.158169] RIP: 0033:0x7f96b29c9833 # [ 45.161738] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 [ 45.569951] BUG: unable to handle page fault for address: ffffffff8aed5ef0 ec 28 48 89 54 24 18 # [ 45.180474] RSP: 002b:00007ffdc5cf1948 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 # [ 45.188031] RAX: ffffffffffffffda RBX: 000000000000000c RCX: 00007f96b29c9833 # [ 45.195151] RDX: 000000000000000c RSI: 00007f96b28bc000 [ 45.598952] #PF: supervisor write access in kernel mode [ 45.626351] #PF: error_code(0x0003) - permissions violation RDI: 0000000000000001 # [ 45.202271] RBP: 00007f96b28bc000 R08: 00007f96b28bb010 R09: 0000000000000000 # [ 45.209392] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 # [ 45.216512] R13: 0000000000000001 R14: 0000000000020000 R15:[ 45.631914] PGD 90c29067 P4D 90c29067 PUD 90c2a063 PMD 80000000906001e1 0[000000000020000 # [ 45.223638] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_ 45.660787] Oops: 0003 [#13] SMP NOPTI common cros_usbpd_notify chromeos_pstore coreboot_table # [ 45.248982] CR2: 0000000000000000 # [ 45.252337] ---[ end trace 3c547c3eb0d57e43 ]--- # [ 45.256967] RIP: 0010:lkdtm_BUG+0x5/0x10 # [ 45.261010] Code: 89 ff e8 ae 5b a2 ff 48 c7 c0 ea f[ 45.686718] CPU: 0 PID: 1840 Comm: cat Tainted: G D W 5.10.173-cip27 #1 [ 45.716632] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 f ff ff eb de 48 c7 c0 ea ff ff ff e9 29 f0 90 00 48 c7 c0 f4 ff ff ff eb c9 0f 1f 44 00 00 <0f> 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 05 90 8d 9f 02 # [ 45.279785] RSP: 0018:ffffa2144080be60 EFLAGS: 00010286 # [ 45.285072] RAX: ffffffff8a0[ 45.722547] RIP: 0010:lkdtm_WRITE_RO+0x2e/0x3a f5[960 RBX: 0000000000000001 RCX: 0000000000000000 # [ 45.292242] RDX: 0000000000000000 RSI: ffff9608ead1bf70 RDI: ffffffff8aed5a70 # [ 45.299414] RBP: ffffffff8b333438 R08: 0000000000000001 R09: 0000000000000001 # [ 45.306595] R10: 00000000ffffe00 45.749162] Code: 00 48 c7 c7 08 fd 2c 8b 48 c7 c6 f0 5e ed 8a e8 95 93 fd ff 48 8b 05 4f f1 75 00 ba 34 12 cd ab 48 c7 c7 38 fd 2c 8b 48 31 d0 <48> 89 05 39 f1 75 00 e9 73 93 fd ff 0f 1f 44 00 00 48 8b 05 68 d5 0 [R11: 3fffffffffffffff R12: 0000000000000004 # [ 45.313763] R13: ffffa2144080bf10 R14: ffffa2144080bf10 R15: ffff9608c6225000 # [ 45.320938] FS: 00007f96b2abc580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 45.329060] CS: 0010 DS: 45.790084] RSP: 0018:ffffa214418abe60 EFLAGS: 00010202 [ 45.817487] RAX: 000000000198b861 RBX: 0000000000000028 RCX: 0000000000000000 0000 ES: 0000 CR0: 0000000080050033 # [ 45.334837] CR2: 0000000000000000 CR3: 0000000103320000 CR4: 00000000001506f0 # ACCESS_NULL: saw 'call trace:': ok ok 38 selftests: lkdtm: ACCESS_NULL.sh # selftests: lkdtm: WRITE_RO.sh [ 45.824608] RDX: 00000000abcd1234 RSI: ffff9608eac1bf70 RDI: ffffffff8b2cfd38 [ 45.851919] RBP: ffffffff8b2cef25 R08: 0000000000000000 R09: 0000000000000000 [ 45.859040] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000009 [ 45.866161] R13: ffffa214418abf10 R14: ffffa214418abf10 R15: ffff9608c3719000 [ 45.873283] FS: 00007f4c50618580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 45.881360] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 45.887094] CR2: ffffffff8aed5ef0 CR3: 000000010488e000 CR4: 00000000001506f0 [ 45.894216] Call Trace: [ 45.896662] direct_entry.cold+0x2c/0x38 [ 45.900581] full_proxy_write+0x56/0x80 [ 45.904412] vfs_write+0xea/0x3b0 [ 45.907722] ksys_write+0x68/0xf0 [ 45.911035] do_syscall_64+0x33/0x40 [ 45.914607] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 45.919651] RIP: 0033:0x7f4c504f1833 [ 45.923222] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 45.941956] RSP: 002b:00007ffc7b19a2f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 45.949514] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 00007f4c504f1833 [ 45.956637] RDX: 0000000000000009 RSI: 00007f4c503e4000 RDI: 0000000000000001 [ 45.963757] RBP: 00007f4c503e4000 R08: 00007f4c503e3010 R09: 0000000000000000 [ 45.970879] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 45.978002] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 [ 45.985128] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table [ 46.010472] CR2: ffffffff8aed5ef0 [ 46.013783] ---[ end trace 3c547c3eb0d57e44 ]--- [ 46.018395] RIP: 0010:lkdtm_BUG+0x5/0x10 [ 46.022310] Code: 89 ff e8 ae 5b a2 ff 48 c7 c0 ea ff ff ff eb de 48 c7 c0 ea ff ff ff e9 29 f0 90 00 48 c7 c0 f4 ff ff ff eb c9 0f 1f 44 00 00 <0f> 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 05 90 8d 9f 02 [ 46.041043] RSP: 0018:ffffa2144080be60 EFLAGS: 00010286 [ 46.046259] RAX: ffffffff8a0f5960 RBX: 0000000000000001 RCX: 0000000000000000 [ 46.053380] RDX: 0000000000000000 RSI: ffff9608ead1bf70 RDI: ffffffff8aed5a70 [ 46.060501] RBP: ffffffff8b333438 R08: 0000000000000001 R09: 0000000000000001 [ 46.067621] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000004 [ 46.074743] R13: ffffa2144080bf10 R14: ffffa2144080bf10 R15: ffff9608c6225000 [ 46.081865] FS: 00007f4c50618580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 46.089940] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 46.095676] CR2: ffffffff8aed5ef0 CR3: 000000010488e000 CR4: 00000000001506f0 [ 46.102799] BUG: sleeping function called from invalid context at include/linux/percpu-rwsem.h:49 [ 46.111654] in_atomic(): 0, irqs_disabled(): 1, non_block: 0, pid: 1840, name: cat [ 46.119209] INFO: lockdep is turned off. [ 46.123122] irq event stamp: 0 [ 46.126171] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 46.132430] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 [ 46.140593] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 [ 46.148755] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 46.155004] CPU: 0 PID: 1840 Comm: cat Tainted: G D W 5.10.173-cip27 #1 [ 46.162733] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 [ 46.168641] Call Trace: [ 46.171085] dump_stack+0x77/0x9b [ 46.174395] ___might_sleep.cold+0xa6/0xb6 [ 46.178485] exit_signals+0x1c/0x300 [ 46.182055] do_exit+0xc2/0xb00 [ 46.185193] ? ksys_write+0x68/0xf0 [ 46.188676] make_task_dead+0x2f/0x30 [ 46.192334] rewind_stack_and_make_dead+0x17/0x20 [ 46.197031] RIP: 0033:0x7f4c504f1833 [ 46.200599] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 46.219336] RSP: 002b:00007ffc7b19a2f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 46.226893] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 00007f4c504f1833 [ 46.234015] RDX: 0000000000000009 RSI: 00007f4c503e4000 RDI: 0000000000000001 [ 46.241136] RBP: 00007f4c503e4000 R08: 00007f4c503e3010 R09: 0000000000000000 [ 46.248256] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 46.255378] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # Killed # [ 45.527620] lkdtm: Performing direct entry WRITE_RO # [ 45.541576] lkdtm: attempting bad rodata write at ffffffff8aed5ef0 # [ 45.569951] BUG: unable to handle page fault for address: ffffffff8aed5ef0 # [ 45.598952] #PF: supervisor write access in kernel mode # [ 45.626351] #PF: error_code(0x0003) - permissions violation # [ 45.631914] PGD 90c29067 P4D 90c29067 PUD 90c2a063 PMD 80000000906001e1 # [ 45.660787] Oops: 0003 [#13] SMP NOPTI # [ 45.686718] CPU: 0 PID: 1840 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 45.716632] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 45.722547] RIP: 0010:lkdtm_WRITE_RO+0x2e/0x3a # [ 45.749162] Code: 00 48 c7 c7 08 fd 2c 8b 48 c7 c6 f0 5e ed 8a e8 95 93 fd ff 48 8b 05 4f f1 75 00 ba 34 12 cd ab 48 c7 c7 38 fd 2c 8b 48 31 d0 <48> 89 05 39 f1 75 00 e9 73 93 fd ff 0f 1f 44 00 00 48 8b 05 68 d5 # [ 45.790084] RSP: 0018:ffffa214418abe60 EFLAGS: 00010202 # [ 45.817487] RAX: 000000000198b861 RBX: 0000000000000028 RCX: 0000000000000000 # [ 45.824608] RDX: 00000000abcd1234 RSI: ffff9608eac1bf70 RDI: ffffffff8b2cfd38 # [ 45.851919] RBP: ffffffff8b2cef25 R08: 0000000000000000 R09: 0000000000000000 # [ 45.859040] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000009 # [ 45.866161] R13: ffffa214418abf10 R14: ffffa214418abf10 R15: ffff9608c3719000 # [ 45.873283] FS: 00007f4c50618580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 45.881360] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 45.887094] CR2: ffffffff8aed5ef0 CR3: 0000000[ 46.420406] lkdtm: Performing direct entry WRITE_RO_AFTER_INIT 10488e000 CR4: 00000000001506f0 # [ 45.894216] Call Trace: # [ 45.896662] direct_entry.cold+0x2c/0x38 # [ 45.900581] full_proxy_write+0x56/0x80 # [ 45.904412] vfs_write+0xea/0x3b0 # [ 45.907722] ksys_write+0x68/0xf0 # [ 45.911035] do[ 46.437963] lkdtm: attempting bad ro_after_init write at ffffffff8b354330 _syscall_64+0x33/0x40 # [ 45.914607] entry_SYSCALL_64_after_hwframe+0x61/0xc6 # [ 45.919651] RIP: 0033:0x7f4c504f1833 # [ 45.923222] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8[ 46.466939] BUG: unable to handle page fault for address: ffffffff8b354330 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 # [ 45.941956] RSP: 002b:00007ffc7b19a2f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 # [ 45.949514] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 00007f4c504f1[ 46.495951] #PF: supervisor write access in kernel mode [ 46.523348] #PF: error_code(0x0003) - permissions violation 833 # [ 45.956637] RDX: 0000000000000009 RSI: 00007f4c503e4000 RDI: 0000000000000001 # [ 45.963757] RBP: 00007f4c503e4000 R08: 00007f4c503e3010 R09: 0000000000000000 # [ 45.970879] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 46.528912] PGD 90c29067 P4D 90c29067 PUD 90c2a063 PMD 104e27063 PTE 8000000090b54161 #[ [ 45.978002] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # [ 45.985128] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videob 46.558912] Oops: 0003 [#14] SMP NOPTI uf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table # [ 46.010472] CR2: ffffffff8aed5ef0 # [ 46.013783] ---[ end trace 3c547c3eb0d57e44 ]--- # [ 46.018395] RIP: 0010:lkdtm_BUG+0[ 46.584843] CPU: 0 PID: 1875 Comm: cat Tainted: G D W 5.10.173-cip27 #1 [ 46.614757] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 x5/0x10 # [ 46.022310] Code: 89 ff e8 ae 5b a2 ff 48 c7 c0 ea ff ff ff eb de 48 c7 c0 ea ff ff ff e9 29 f0 90 00 48 c7 c0 f4 ff ff ff eb c9 0f 1f 44 00 00 <0f> 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 05 90 8d 9f 02 # [ 46.041043] RSP: 0018:ff[ 46.620671] RIP: 0010:lkdtm_WRITE_RO_AFTER_INIT+0x4e/0x5a ffa2144080be60 EFLAGS: 00010286 # [ 46.046259] RAX: ffffffff8a0f5960 RBX: 0000000000000001 RCX: 0000000000000000 # [ 46.053380] RDX: 0000000000000000 RSI: ffff9608ead1bf70 RDI: ffffffff8aed5a70 # [ 46.060501] RBP: ffffffff8b333438 R08: 00000000000[ 46.648238] Code: fd 2c 8b e9 47 93 fd ff 48 c7 c7 90 fd 2c 8b e8 3b 93 fd ff 48 8b 05 35 d5 bd 00 ba 34 12 cd ab 48 c7 c7 38 fd 2c 8b 48 31 d0 <48> 89 05 1f d5 bd 00 e9 19 93 fd ff 0f 1f 44 00 00 41 54 48 c7 c7 [ 46.689159] RSP: 0018:ffffa21441923e60 EFLAGS: 00010202 00001 R09: 0000000000000001 # [ 46.067621] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000004 # [ 46.074743] R13: ffffa2144080bf10 R14: ffffa2144080bf10 R15: ffff9608c6225000 # [ 46.081865] FS: 00007f4c50618580(0000) GS:ffff9608eac[ 46.694375] RAX: 00000000fe67479e RBX: 0000000000000029 RCX: 0000000000000000 [ 46.723681] RDX: 00000000abcd1234 RSI: ffff9608eac1bf70 RDI: ffffffff8b2cfd38 00000(0000) knlGS:0000000000000000 # [ 46.089940] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 46.095676] CR2: ffffffff8aed5ef0 CR3: 000000010488e000 CR4: 00000000001506f0 # [ 46.102799] BUG: sleeping function called from invalid context [ 46.730802] RBP: ffffffff8b2cef2e R08: 0000000000000000 R09: 0000000000000000 at include/linux/percpu-rwsem.h:49 # [ 46.111654] in_atomic(): 0, irqs_disabled(): 1, non_block: 0, pid: 1840, name: cat # [ 46.119209] INFO: lockdep is turned off. # [ 46.123122] irq event stamp: 0 # [ 46.126171] hardirqs last enabled at (0):[ 46.760110] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000014 [[<0000000000000000>] 0x0 # [ 46.132430] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 # [ 46.140593] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 # [ 46.148755] softirqs last disabl 46.789419] R13: ffffa21441923f10 R14: ffffa21441923f10 R15: ffff9608c3c4f000 ed[ at (0): [<0000000000000000>] 0x0 # [ 46.155004] CPU: 0 PID: 1840 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 46.162733] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 46.168641] Call Trace: # [ 46.171085] dump_stack 46.818731] FS: 00007f0ac4b0b3c0(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 46.848994] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 +0x77/0x9b # [ 46.174395] ___might_sleep.cold+0xa6/0xb6 # [ 46.178485] exit_signals+0x1c/0x300 # [ 46.182055] do_exit+0xc2/0xb00 # [ 46.185193] ? ksys_write+0x68/0xf0 # [ 46.188676] make_task_dead+0x2f/0x30 # [ 46.192334] rewind_sta[ 46.854730] CR2: ffffffff8b354330 CR3: 00000001052cc000 CR4: 00000000001506f0 [ 46.884035] Call Trace: ck_and_make_dead+0x17/0x20 # [ 46.197031] RIP: 0033:0x7f4c504f1833 # [ 46.200599] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 4[ 46.886482] direct_entry.cold+0x2c/0x38 0 00 48 83 ec 28 48 89 54 24 18 # [ 46.219336] RSP: 002b:00007ffc7b19a2f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 # [ 46.226893] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 00007f4c504f1833 # [ 46.234015] RDX: 0000000000000009 RSI: 00007f[ 46.912583] full_proxy_write+0x56/0x80 4c503e4000 RDI: 0000000000000001 # [ 46.241136] RBP: 00007f4c503e4000 R08: 00007f4c503e3010 R09: 0000000000000000 # [ 46.248256] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 # [ 46.255378] R13: 0000000000000001 R14: 0000000000[ 46.938595] vfs_write+0xea/0x3b0 020000 R15: 0000000000020000 # WRITE_RO: saw 'call trace:': ok ok 39 selftests: lkdtm: WRITE_RO.sh # selftests: lkdtm: WRITE_RO_AFTER_INIT.sh [ 46.964088] ksys_write+0x68/0xf0 [ 46.980052] do_syscall_64+0x33/0x40 [ 46.983623] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 46.988666] RIP: 0033:0x7f0ac49e9833 [ 46.992235] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 47.010972] RSP: 002b:00007fff30cf0268 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 47.018529] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 00007f0ac49e9833 [ 47.025652] RDX: 0000000000000014 RSI: 00007f0ac48dc000 RDI: 0000000000000001 [ 47.032773] RBP: 00007f0ac48dc000 R08: 00007f0ac48db010 R09: 0000000000000000 [ 47.039894] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 47.047016] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 [ 47.054142] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table [ 47.079488] CR2: ffffffff8b354330 [ 47.082801] ---[ end trace 3c547c3eb0d57e45 ]--- [ 47.087414] RIP: 0010:lkdtm_BUG+0x5/0x10 [ 47.091330] Code: 89 ff e8 ae 5b a2 ff 48 c7 c0 ea ff ff ff eb de 48 c7 c0 ea ff ff ff e9 29 f0 90 00 48 c7 c0 f4 ff ff ff eb c9 0f 1f 44 00 00 <0f> 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 05 90 8d 9f 02 [ 47.110064] RSP: 0018:ffffa2144080be60 EFLAGS: 00010286 [ 47.115280] RAX: ffffffff8a0f5960 RBX: 0000000000000001 RCX: 0000000000000000 [ 47.122401] RDX: 0000000000000000 RSI: ffff9608ead1bf70 RDI: ffffffff8aed5a70 [ 47.129523] RBP: ffffffff8b333438 R08: 0000000000000001 R09: 0000000000000001 [ 47.136646] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000004 [ 47.143768] R13: ffffa2144080bf10 R14: ffffa2144080bf10 R15: ffff9608c6225000 [ 47.150891] FS: 00007f0ac4b0b3c0(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 47.158966] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 47.164699] CR2: ffffffff8b354330 CR3: 00000001052cc000 CR4: 00000000001506f0 # Killed # [ 46.420406] lkdtm: Performing direct entry WRITE_RO_AFTER_INIT # [ 46.437963] lkdtm: attempting bad ro_after_init write at ffffffff8b354330 # [ 46.466939] BUG: unable to handle page fault for address: ffffffff8b354330 # [ 46.495951] #PF: supervisor write access in kernel mode # [ 46.523348] #PF: error_code(0x0003) - permissions violation # [ 46.528912] PGD 90c29067 P4D 90c29067 PUD 90c2a063 PMD 104e27063 PTE 8000000090b54161 # [ 46.558912] Oops: 0003 [#14] SMP NOPTI # [ 46.584843] CPU: 0 PID: 1875 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 46.614757] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 46.620671] RIP: 0010:lkdtm_WRITE_RO_AFTER_INIT+0x4e/0x5a # [ 46.648238] Code: fd 2c 8b e9 47 93 fd ff 48 c7 c7 90 fd 2c 8b e8 3b 93 fd ff 48 8b 05 35 d5 bd 00 ba 34 12 cd ab 48 c7 c7 38 fd 2c 8b 48 31 d0 <48> 89 05 1f d5 bd 00 e9 19 93 fd ff 0f 1f 44 00 00 41 54 48 c7 c7 # [ 46.689159] RSP: 0018:ffffa21441923e60 EFLAGS: 00010202 # [ 46.694375] RAX: 00000000fe67479e RBX: 0000000000000029 RCX: 0000000000000000 # [ 46.723681] RDX: 00000000abcd1234 RSI: ffff9608eac1bf70 RDI: ffffffff8b2cfd38 # [ 46.730802] RBP: ffffffff8b2cef2e R08: 0000000000000000 R09: 0000000000000000 # [ 46.760110] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000014 # [ 46.78[ 47.361803] lkdtm: Performing direct entry WRITE_KERN 9419] R13: ffffa21441923f10 R14: ffffa21441923f10 R15: ffff9608c3c4f000 # [ 46.818731] FS: 00007f0ac4b0b3c0(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 46.848994] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 46.854730] CR2[ 47.371730] lkdtm: attempting bad 6819819 byte write at ffffffff8a776d1b : ffffffff8b354330 CR3: 00000001052cc000 CR4: 00000000001506f0 # [ 46.884035] Call Trace: # [ 46.886482] direct_entry.cold+0x2c/0x38 # [ 46.912583] full_proxy_write+0x56/0x80 # [ 46.938595] vfs_write+0xea/0x3b0 # [ 46.964088] ksys_write+[ 47.400620] BUG: unable to handle page fault for address: ffffffff8a776d1b 0x68/0xf0 # [ 46.980052] do_syscall_64+0x33/0x40 # [ 46.983623] entry_SYSCALL_64_after_hwframe+0x61/0xc6 # [ 46.988666] RIP: 0033:0x7f0ac49e9833 # [ 46.992235] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 0[ 47.429647] #PF: supervisor write access in kernel mode [ 47.457045] #PF: error_code(0x0003) - permissions violation 4 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 # [ 47.010972] RSP: 002b:00007fff30cf0268 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 # [ 47.018529] RAX: ffffffffffffffda RBX: 0000[ 47.462606] PGD 90c29067 P4D 90c29067 PUD 90c2a063 PMD 8fe001e1 00[0000000014 RCX: 00007f0ac49e9833 # [ 47.025652] RDX: 0000000000000014 RSI: 00007f0ac48dc000 RDI: 0000000000000001 # [ 47.032773] RBP: 00007f0ac48dc000 R08: 00007f0ac48db010 R09: 0000000000000000 # [ 47.039894] R10: fffffffffffffbc5 R11: 00000000 47.490786] Oops: 0003 [#15] SMP NOPTI 00000246 R12: 0000000000000001 # [ 47.047016] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # [ 47.054142] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usb[ 47.516718] CPU: 0 PID: 1910 Comm: cat Tainted: G D W 5.10.173-cip27 #1 [ 47.546631] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 pd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table # [ 47.079488] CR2: ffffffff8b354330 # [ 47.082801] ---[ end trace 3c547c3eb0d57e45 ]--- # [ 4[ 47.552544] RIP: 0010:lkdtm_WRITE_KERN+0x38/0x4e 7.[087414] RIP: 0010:lkdtm_BUG+0x5/0x10 # [ 47.091330] Code: 89 ff e8 ae 5b a2 ff 48 c7 c0 ea ff ff ff eb de 48 c7 c0 ea ff ff ff e9 29 f0 90 00 48 c7 c0 f4 ff ff ff eb c9 0f 1f 44 00 00 <0f> 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 05 90 8d 9f 02 47.579332] Code: 53 48 c7 c3 1b 6d 77 8a 49 89 dc 48 89 da 49 81 ec 30 5d 0f 8a 4c 89 e6 e8 ee 92 fd ff 48 89 df 4c 89 e1 48 c7 c6 30 5d 0f 8a a4 48 c7 c7 38 fd 2c 8b e8 d3 92 fd ff 5b 41 5c e9 b7 fe ff ff [# [ 47.110064] RSP: 0018:ffffa2144080be60 EFLAGS: 00010286 # [ 47.115280] RAX: ffffffff8a0f5960 RBX: 0000000000000001 RCX: 0000000000000000 # [ 47.122401] RDX: 0000000000000000 RSI: ffff9608ead1bf70 RDI: ffffffff8aed5a70 # [ 47.129523] RBP: ff 47.620257] RSP: 0018:ffffa214419abe50 EFLAGS: 00010246 [ 47.647661] RAX: 000000000000003c RBX: ffffffff8a776d1b RCX: 0000000000680feb ffffff8b333438 R08: 0000000000000001 R09: 0000000000000001 # [ 47.136646] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000004 # [ 47.143768] R13: ffffa2144080bf10 R14: ffffa2144080bf10 R15: ffff9608c6225000 # [ 47.150891] FS: 00007f[ 47.654783] RDX: 0000000000000000 RSI: ffffffff8a0f5d30 RDI: ffffffff8a776d1b [ 47.684089] RBP: ffffffff8b2cef42 R08: 0000000000000000 R09: 0000000000000000 0ac4b0b3c0(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 47.158966] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 47.164699] CR2: ffffffff8b354330 CR3: 00000001052cc000 CR4: 00000000001506f0 # WRITE_RO_AFTER_INIT: saw 'call trac[ 47.691211] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000680feb [ 47.720516] R13: ffffa214419abf10 R14: ffffa214419abf10 R15: ffff9608c4442000 e:': ok ok 40 selftests: lkdtm: WRITE_RO_AFTER_INIT.sh # selftests: lkdtm: WRITE_KERN.sh [ 47.727639] FS: 00007ff59dc54580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 47.743683] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 47.749419] CR2: ffffffff8a776d1b CR3: 0000000103850000 CR4: 00000000001506f0 [ 47.756540] Call Trace: [ 47.758989] direct_entry.cold+0x2c/0x38 [ 47.762909] full_proxy_write+0x56/0x80 [ 47.766740] vfs_write+0xea/0x3b0 [ 47.770052] ksys_write+0x68/0xf0 [ 47.773365] do_syscall_64+0x33/0x40 [ 47.776936] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 47.781981] RIP: 0033:0x7ff59db61833 [ 47.785551] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 47.804285] RSP: 002b:00007fff61975e38 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 47.811842] RAX: ffffffffffffffda RBX: 000000000000000b RCX: 00007ff59db61833 [ 47.818964] RDX: 000000000000000b RSI: 00007ff59da54000 RDI: 0000000000000001 [ 47.826085] RBP: 00007ff59da54000 R08: 00007ff59da53010 R09: 0000000000000000 [ 47.833206] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 47.840327] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 [ 47.847452] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table [ 47.872795] CR2: ffffffff8a776d1b [ 47.876108] ---[ end trace 3c547c3eb0d57e46 ]--- [ 47.880721] RIP: 0010:lkdtm_BUG+0x5/0x10 [ 47.884637] Code: 89 ff e8 ae 5b a2 ff 48 c7 c0 ea ff ff ff eb de 48 c7 c0 ea ff ff ff e9 29 f0 90 00 48 c7 c0 f4 ff ff ff eb c9 0f 1f 44 00 00 <0f> 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 05 90 8d 9f 02 [ 47.903373] RSP: 0018:ffffa2144080be60 EFLAGS: 00010286 [ 47.908588] RAX: ffffffff8a0f5960 RBX: 0000000000000001 RCX: 0000000000000000 [ 47.915711] RDX: 0000000000000000 RSI: ffff9608ead1bf70 RDI: ffffffff8aed5a70 [ 47.922833] RBP: ffffffff8b333438 R08: 0000000000000001 R09: 0000000000000001 [ 47.929954] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000004 [ 47.937075] R13: ffffa2144080bf10 R14: ffffa2144080bf10 R15: ffff9608c6225000 [ 47.944196] FS: 00007ff59dc54580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 47.952272] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 47.958007] CR2: ffffffff8a776d1b CR3: 0000000103850000 CR4: 00000000001506f0 [ 47.965130] BUG: sleeping function called from invalid context at include/linux/percpu-rwsem.h:49 [ 47.973979] in_atomic(): 0, irqs_disabled(): 1, non_block: 0, pid: 1910, name: cat [ 47.981533] INFO: lockdep is turned off. [ 47.985448] irq event stamp: 0 [ 47.988497] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 47.994757] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 [ 48.002922] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 [ 48.011085] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 48.017340] CPU: 0 PID: 1910 Comm: cat Tainted: G D W 5.10.173-cip27 #1 [ 48.025069] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 [ 48.030978] Call Trace: [ 48.033424] dump_stack+0x77/0x9b [ 48.036736] ___might_sleep.cold+0xa6/0xb6 [ 48.040829] exit_signals+0x1c/0x300 [ 48.044400] do_exit+0xc2/0xb00 [ 48.047538] ? ksys_write+0x68/0xf0 [ 48.051023] ? lkdtm_SLAB_FREE_CROSS.cold+0x32/0x32 [ 48.055895] make_task_dead+0x2f/0x30 [ 48.059553] rewind_stack_and_make_dead+0x17/0x20 [ 48.064250] RIP: 0033:0x7ff59db61833 [ 48.067818] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 48.086556] RSP: 002b:00007fff61975e38 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 48.094114] RAX: ffffffffffffffda RBX: 000000000000000b RCX: 00007ff59db61833 [ 48.101235] RDX: 000000000000000b RSI: 00007ff59da54000 RDI: 0000000000000001 [ 48.108356] RBP: 00007ff59da54000 R08: 00007ff59da53010 R09: 0000000000000000 [ 48.115477] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 48.122598] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # Killed # [ 47.361803] lkdtm: Performing direct entry WRITE_KERN # [ 47.371730] lkdtm: attempting bad 6819819 byte write at ffffffff8a776d1b # [ 47.400620] BUG: unable to handle page fault for address: ffffffff8a776d1b # [ 47.429647] #PF: supervisor write access in kernel mode # [ 47.457045] #PF: error_code(0x0003) - permissions violation # [ 47.462606] PGD 90c29067 P4D 90c29067 PUD 90c2a063 PMD 8fe001e1 # [ 47.490786] Oops: 0003 [#15] SMP NOPTI # [ 47.516718] CPU: 0 PID: 1910 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 47.546631] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 47.552544] RIP: 0010:lkdtm_WRITE_KERN+0x38/0x4e # [ 47.579332] Code: 53 48 c7 c3 1b 6d 77 8a 49 89 dc 48 89 da 49 81 ec 30 5d 0f 8a 4c 89 e6 e8 ee 92 fd ff 48 89 df 4c 89 e1 48 c7 c6 30 5d 0f 8a a4 48 c7 c7 38 fd 2c 8b e8 d3 92 fd ff 5b 41 5c e9 b7 fe ff ff # [ 47.620257] RSP: 0018:ffffa214419abe50 EFLAGS: 00010246 # [ 47.647661] RAX: 000000000000003c RBX: ffffffff8a776d1b RCX: 0000000000680feb # [ 47.654783] RDX: 0000000000000000[ 48.331694] lkdtm: Performing direct entry REFCOUNT_INC_OVERFLOW RSI: ffffffff8a0f5d30 RDI: ffffffff8a776d1b # [ 47.684089] RBP: ffffffff8b2cef42 R08: 0000000000000000 R09: 0000000000000000 # [ 47.691211] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000680feb # [ 47.720516] R13: ffffa214419abf10 R14[ 48.338412] lkdtm: attempting good refcount_inc() without overflow : ffffa214419abf10 R15: ffff9608c4442000 # [ 47.727639] FS: 00007ff59dc54580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 47.743683] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 47.749419] CR2: ffffffff8a776d1b CR3: 0000000[ 48.366784] lkdtm: attempting bad refcount_inc() overflow 103850000 CR4: 00000000001506f0 # [ 47.756540] Call Trace: # [ 47.758989] direct_entry.cold+0x2c/0x38 # [ 47.762909] full_proxy_write+0x56/0x80 # [ 47.766740] vfs_write+0xea/0x3b0 # [ 47.770052] ksys_write+0x68/0xf0 # [ 47.773365] do[ 48.394375] ------------[ cut here ]------------ _syscall_64+0x33/0x40 # [ 47.776936] entry_SYSCALL_64_after_hwframe+0x61/0xc6 # [ 47.781981] RIP: 0033:0x7ff59db61833 # [ 47.785551] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8[ 48.421154] refcount_t: saturated; leaking memory. 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 # [ 47.804285] RSP: 002b:00007fff61975e38 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 # [ 47.811842] RAX: ffffffffffffffda RBX: 000000000000000b RCX: 00007ff59db61[ 48.448152] WARNING: CPU: 0 PID: 1945 at lib/refcount.c:22 refcount_warn_saturate+0x51/0x110 833 # [ 47.818964] RDX: 000000000000000b RSI: 00007ff59da54000 RDI: 0000000000000001 # [ 47.826085] RBP: 00007ff59da54000 R08: 00007ff59da53010 R09: 0000000000000000 # [ 47.833206] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 48.478726] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table # [ 47.840327] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # [ 47.847452] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videob[ 48.526227] CPU: 0 PID: 1945 Comm: cat Tainted: G D W 5.10.173-cip27 #1 uf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table # [ 47.872795] CR2: ffffffff8a776d1b # [ 47.876108] ---[ end trace 3c547c3eb0d57e46 ]--- # [ 47.880721] RIP: 0010:lkdtm_BUG+0[ 48.556155] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 x5/0x10 # [ 47.884637] Code: 89 ff e8 ae 5b a2 ff 48 c7 c0 ea ff ff ff eb de 48 c7 c0 ea ff ff ff e9 29 f0 90 00 48 c7 c0 f4 ff ff ff eb c9 0f 1f 44 00 00 <0f> 0b 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 05 90 8d 9f 02 # [ 47.903373] RSP: 0018:ff[ 48.584256] RIP: 0010:refcount_warn_saturate+0x51/0x110 ffa2144080be60 EFLAGS: 00010286 # [ 47.908588] RAX: ffffffff8a0f5960 RBX: 0000000000000001 RCX: 0000000000000000 # [ 47.915711] RDX: 0000000000000000 RSI: ffff9608ead1bf70 RDI: ffffffff8aed5a70 # [ 47.922833] RBP: ffffffff8b333438 R08: 00000000000[ 48.611632] Code: 84 bc 00 00 00 e9 9f 43 c4 00 85 f6 74 46 80 3d 47 0b 94 01 00 75 ee 48 c7 c7 e8 8f 26 8b c6 05 37 0b 94 01 01 e8 fc a0 98 00 <0f> 0b e9 78 43 c4 00 80 3d 23 0b 94 01 00 75 cb 48 c7 c7 10 90 26 00001 R09: 0000000000000001 # [ 47.929954] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000004 # [ 47.937075] R13: ffffa2144080bf10 R14: ffffa2144080bf10 R15: ffff9608c6225000 # [ 47.944196] FS: 00007ff59dc54580(0000) GS:ffff9608eac[ 48.652573] RSP: 0018:ffffa21441a2be48 EFLAGS: 00010286 00000(0000) knlGS:0000000000000000 # [ 47.952272] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 47.958007] CR2: ffffffff8a776d1b CR3: 0000000103850000 CR4: 00000000001506f0 # [ 47.965130] BUG: sleeping function called from invalid context [ 48.679994] RAX: 0000000000000000 RBX: 000000000000002b RCX: 0000000000000000 at include/linux/percpu-rwsem.h:49 # [ 47.973979] in_atomic(): 0, irqs_disabled(): 1, non_block: 0, pid: 1910, name: cat # [ 47.981533] INFO: lockdep is turned off. # [ 47.985448] irq event stamp: 0 # [ 47.988497] hardirqs last enabled at (0)[ 48.709391] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 : [ 48.738548] RBP: ffffffff8b2cef4d R08: 0000000000000000 R09: 0000000000000000 [<0000000000000000>] 0x0 # [ 47.994757] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 # [ 48.002922] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 # [ 48.011085] softirqs last disable[ 48.745869] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000016 d at (0): [<0000000000000000>] 0x0 # [ 48.017340] CPU: 0 PID: 1910 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 48.025069] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 48.030978] Call Trace: # [ 48.033424] dump_stack+[ 48.775184] R13: ffffa21441a2bf10 R14: ffffa21441a2bf10 R15: ffff9608c6142000 0x77/0x9b # [ 48.036736] ___might_sleep.cold+0xa6/0xb6 # [ 48.040829] exit_signals+0x1c/0x300 # [ 48.044400] do_exit+0xc2/0xb00 # [ 48.047538] ? ksys_write+0x68/0xf0 # [ 48.051023] ? lkdtm_SLAB_FREE_CROSS.cold+0x32/0x32 # [ 48.055895[ 48.804477] FS: 00007f7a8c254580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 ] make_task_dead+0x2f/0x30 # [ 48.059553] rewind_stack_and_make_dead+0x17/0x20 # [ 48.064250] RIP: 0033:0x7ff59db61833 # [ 48.067818] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 [ 48.834725] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 # [ 48.086556] RSP: 002b:00007fff61975e38 EFLAGS: 00000246 ORIG_RAX: 0000000000000001[ 48.862672] CR2: 00007f7a8c054000 CR3: 000000010535c000 CR4: 00000000001506f0 [ 48.885142] Call Trace: # [ 48.094114] RAX: ffffffffffffffda RBX: 000000000000000b RCX: 00007ff59db61833 # [ 48.101235] RDX: 000000000000000b RSI: 00007ff59da54000 RDI: 0000000000000001 # [ 48.108356] RBP: 00007ff59da54000 R08: 00007ff59da53010 R09: 0000000000000000 # [ [ 48.887762] lkdtm_REFCOUNT_INC_OVERFLOW+0x70/0x98 48.115477] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 # [ 48.122598] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # WRITE_KERN: saw 'call trace:': ok ok 41 selftests: lkdtm: WRITE_KERN.sh # selftests: lkd[ 48.914721] direct_entry.cold+0x2c/0x38 tm: REFCOUNT_INC_OVERFLOW.sh [ 48.940821] full_proxy_write+0x56/0x80 [ 48.947249] vfs_write+0xea/0x3b0 [ 48.950603] ksys_write+0x68/0xf0 [ 48.953952] do_syscall_64+0x33/0x40 [ 48.957574] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 48.962667] RIP: 0033:0x7f7a8c161833 [ 48.966296] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 48.985106] RSP: 002b:00007ffeaf1df428 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 48.992721] RAX: ffffffffffffffda RBX: 0000000000000016 RCX: 00007f7a8c161833 [ 48.999891] RDX: 0000000000000016 RSI: 00007f7a8c054000 RDI: 0000000000000001 [ 49.007049] RBP: 00007f7a8c054000 R08: 00007f7a8c053010 R09: 0000000000000000 [ 49.014187] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 49.021326] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 [ 49.028465] irq event stamp: 0 [ 49.031522] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 49.037786] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 [ 49.045969] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 [ 49.054137] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 49.060398] ---[ end trace 3c547c3eb0d57e47 ]--- [ 49.065014] lkdtm: Overflow detected: saturated # [ 48.331694] lkdtm: Performing direct entry REFCOUNT_INC_OVERFLOW # [ 48.338412] lkdtm: attempting good refcount_inc() without overflow # [ 48.366784] lkdtm: attempting bad refcount_inc() overflow # [ 48.394375] ------------[ cut here ]------------ # [ 48.421154] refcount_t: saturated; leaking memory. # [ 48.448152] WARNING: CPU: 0 PID: 1945 at lib/refcount.c:22 refcount_warn_saturate+0x51/0x110 # [ 48.478726] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table # [ 48.526227] CPU: 0 PID: 1945 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 48.556155] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 48.584256] RIP: 0010:refcount_warn_saturate+0x51/0x110 # [ 48.611632] Code: 84 bc 00 00 00 e9 9f 43 c4 00 85 f6 74 46 80 3d 47 0b 94 01 00 75 ee 48 c7 c7 e8 8f 26 8b c6 05 37 0b 94 01 01 e8 fc a0 98 00 <0f> 0b e9 78 43 c4 00 80 3d 23 0b 94 01 00 75 cb 48 c7 c7 10 90 26 # [ 48.652573] RSP: 0018:ffffa21441a2be48 EFLAGS: 00010286 # [ 48.679994] RAX: 0000000000000000 RBX: 000000000000002b RCX: 0000000000000000 # [ 48.709391] RDX: ffff9608eac2c660 RSI: ffff9[ 49.208609] lkdtm: Performing direct entry REFCOUNT_ADD_OVERFLOW 608eac1bf70 RDI: ffff9608eac1bf70 # [ 48.738548] RBP: ffffffff8b2cef4d R08: 0000000000000000 R09: 0000000000000000 # [ 48.745869] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000016 # [ 48.775184] R13: ffffa21441a2bf10 R14: ffffa2144[ 49.217480] lkdtm: attempting good refcount_add() without overflow 1a2bf10 R15: ffff9608c6142000 # [ 48.804477] FS: 00007f7a8c254580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 48.834725] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 48.862672] CR2: 00007f7a8c054000 CR3: 000000010535c000 C[ 49.245848] lkdtm: attempting bad refcount_add() overflow R4: 00000000001506f0 # [ 48.885142] Call Trace: # [ 48.887762] lkdtm_REFCOUNT_INC_OVERFLOW+0x70/0x98 # [ 48.914721] direct_entry.cold+0x2c/0x38 # [ 48.940821] full_proxy_write+0x56/0x80 # [ 48.947249] vfs_write+0xea/0x3b0 # [ 48.95060[ 49.273441] ------------[ cut here ]------------ 3] ksys_write+0x68/0xf0 # [ 48.953952] do_syscall_64+0x33/0x40 # [ 48.957574] entry_SYSCALL_64_after_hwframe+0x61/0xc6 # [ 48.962667] RIP: 0033:0x7f7a8c161833 # [ 48.966296] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0[ 49.300247] refcount_t: saturated; leaking memory. f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 # [ 48.985106] RSP: 002b:00007ffeaf1df428 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 # [ 48.992721] RAX: fffffffffff[ 49.327251] WARNING: CPU: 0 PID: 1977 at lib/refcount.c:22 refcount_warn_saturate+0x51/0x110 fffda RBX: 0000000000000016 RCX: 00007f7a8c161833 # [ 48.999891] RDX: 0000000000000016 RSI: 00007f7a8c054000 RDI: 0000000000000001 # [ 49.007049] RBP: 00007f7a8c054000 R08: 00007f7a8c053010 R09: 0000000000000000 # [ 49.014187] R10: fffffffffffffbc[ 49.357910] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table 5 R11: 0000000000000246 R12: 0000000000000001 # [ 49.021326] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # [ 49.028465] irq event stamp: 0 # [ 49.031522] hardirqs last enabled at (0): [<0000000000000000>] 0x0 # [ 49.03778[ 49.405396] CPU: 0 PID: 1977 Comm: cat Tainted: G D W 5.10.173-cip27 #1 6] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 # [ 49.045969] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 # [ 49.054137] softirqs last disabled at (0): [<0000000000000000>] 0x0 # [ [ 49.435283] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 49.060398] ---[ end trace 3c547c3eb0d57e47 ]--- # [ 49.065014] lkdtm: Overflow detected: saturated # REFCOUNT_INC_OVERFLOW: saw 'call trace:': ok ok 42 selftests: lkdtm: REFCOUNT_INC_OVERFLOW.sh # selftests: lkdtm: REFCOUNT_ADD_OVERFLOW.sh [ 49.463356] RIP: 0010:refcount_warn_saturate+0x51/0x110 [ 49.490155] Code: 84 bc 00 00 00 e9 9f 43 c4 00 85 f6 74 46 80 3d 47 0b 94 01 00 75 ee 48 c7 c7 e8 8f 26 8b c6 05 37 0b 94 01 01 e8 fc a0 98 00 <0f> 0b e9 78 43 c4 00 80 3d 23 0b 94 01 00 75 cb 48 c7 c7 10 90 26 [ 49.508956] RSP: 0018:ffffa21441a8be48 EFLAGS: 00010286 [ 49.514239] RAX: 0000000000000000 RBX: 000000000000002c RCX: 0000000000000000 [ 49.521410] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 [ 49.528577] RBP: ffffffff8b2cef63 R08: 0000000000000000 R09: 0000000000000000 [ 49.535726] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000016 [ 49.542882] R13: ffffa21441a8bf10 R14: ffffa21441a8bf10 R15: ffff9608c28b5000 [ 49.550032] FS: 00007f7d9fa95580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 49.558147] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 49.563904] CR2: 00007f7d9f864000 CR3: 0000000106144000 CR4: 00000000001506f0 [ 49.571086] Call Trace: [ 49.573566] lkdtm_REFCOUNT_ADD_OVERFLOW+0x7f/0xa7 [ 49.578398] direct_entry.cold+0x2c/0x38 [ 49.582340] full_proxy_write+0x56/0x80 [ 49.586227] vfs_write+0xea/0x3b0 [ 49.589593] ksys_write+0x68/0xf0 [ 49.593007] do_syscall_64+0x33/0x40 [ 49.596626] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 49.601746] RIP: 0033:0x7f7d9f971833 [ 49.605374] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 49.624180] RSP: 002b:00007ffd10a5e0d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 49.631840] RAX: ffffffffffffffda RBX: 0000000000000016 RCX: 00007f7d9f971833 [ 49.639001] RDX: 0000000000000016 RSI: 00007f7d9f864000 RDI: 0000000000000001 [ 49.646137] RBP: 00007f7d9f864000 R08: 00007f7d9f863010 R09: 0000000000000000 [ 49.653282] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 49.660417] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 [ 49.667548] irq event stamp: 0 [ 49.670602] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 49.676864] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 [ 49.685048] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 [ 49.693223] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 49.699486] ---[ end trace 3c547c3eb0d57e48 ]--- [ 49.704102] lkdtm: Overflow detected: saturated # [ 49.208609] lkdtm: Performing direct entry REFCOUNT_ADD_OVERFLOW # [ 49.217480] lkdtm: attempting good refcount_add() without overflow # [ 49.245848] lkdtm: attempting bad refcount_add() overflow # [ 49.273441] ------------[ cut here ]------------ # [ 49.300247] refcount_t: saturated; leaking memory. # [ 49.327251] WARNING: CPU: 0 PID: 1977 at lib/refcount.c:22 refcount_warn_saturate+0x51/0x110 # [ 49.357910] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table # [ 49.405396] CPU: 0 PID: 1977 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 49.435283] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 49.463356] RIP: 0010:refcount_warn_saturate+0x51/0x110 # [ 49.490155] Code: 84 bc 00 00 00 e9 9f 43 c4 00 85 f6 74 46 80 3d 47 0b 94 01 00 75 ee 48 c7 c7 e8 8f 26 8b c6 05 37 0b 94 01 01 e8 fc a0 98 00 <0f> 0b e9 78 43 c4 00 80 3d 23 0b 94 01 00 75 cb 48 c7 c7 10 90 26 # [ 49.508956] RSP: 0018:ffffa21441a8be48 EFLAGS: 00010286 # [ 49.514239] RAX: 0000000000000000 RBX: 000000000000002c RCX: 0000000000000000 # [ 49.521410] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 # [ 49.528577] RBP: ffffffff8b2cef63 R08: 0000000000000000 R09: 0000000000000000 # [ 49.535726] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000016 # [ 49.542882] R13: ffffa21441a8bf10 R14: ffff[ 49.862783] lkdtm: Performing direct entry REFCOUNT_INC_NOT_ZERO_OVERFLOW a21441a8bf10 R15: ffff9608c28b5000 # [ 49.550032] FS: 00007f7d9fa95580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 49.558147] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 49.563904] CR2: 00007f7d9f864000 CR3: 0000000106144[ 49.876937] lkdtm: attempting bad refcount_inc_not_zero() overflow 000 CR4: 00000000001506f0 # [ 49.571086] Call Trace: # [ 49.573566] lkdtm_REFCOUNT_ADD_OVERFLOW+0x7f/0xa7 # [ 49.578398] direct_entry.cold+0x2c/0x38 # [ 49.582340] full_proxy_write+0x56/0x80 # [ 49.586227] vfs_write+0xea/0x3b0 # [ 49.[ 49.905292] ------------[ cut here ]------------ 589593] ksys_write+0x68/0xf0 # [ 49.593007] do_syscall_64+0x33/0x40 # [ 49.596626] entry_SYSCALL_64_after_hwframe+0x61/0xc6 # [ 49.601746] RIP: 0033:0x7f7d9f971833 # [ 49.605374] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb[ 49.932092] refcount_t: saturated; leaking memory. b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 # [ 49.624180] RSP: 002b:00007ffd10a5e0d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 # [ 49.631840] RAX: ffffff[ 49.959079] WARNING: CPU: 0 PID: 2009 at lib/refcount.c:19 refcount_warn_saturate+0x97/0x110 ffffffffda RBX: 0000000000000016 RCX: 00007f7d9f971833 # [ 49.639001] RDX: 0000000000000016 RSI: 00007f7d9f864000 RDI: 0000000000000001 # [ 49.646137] RBP: 00007f7d9f864000 R08: 00007f7d9f863010 R09: 0000000000000000 # [ 49.653282] R10: ffffffffff[ 49.989685] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table fffbc5 R11: 0000000000000246 R12: 0000000000000001 # [ 49.660417] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # [ 49.667548] irq event stamp: 0 # [ 49.670602] hardirqs last enabled at (0): [<0000000000000000>] 0x0 # [ 49.[ 50.037268] CPU: 0 PID: 2009 Comm: cat Tainted: G D W 5.10.173-cip27 #1 676864] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 # [ 49.685048] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 # [ 49.693223] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 50.067105] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 49.699486] ---[ end trace 3c547c3eb0d57e48 ]--- # [ 49.704102] lkdtm: Overflow detected: saturated # REFCOUNT_ADD_OVERFLOW: saw 'call trace:': ok ok 43 selftests: lkdtm: REFCOUNT_ADD_OVERFLOW.sh # selftests: lkdtm: REFCOUNT_INC_NOT_ZERO_OVERFL[ 50.095243] RIP: 0010:refcount_warn_saturate+0x97/0x110 OW.sh [ 50.122604] Code: 01 01 e8 d9 a0 98 00 0f 0b e9 55 43 c4 00 80 3d 02 0b 94 01 00 75 a8 48 c7 c7 e8 8f 26 8b c6 05 f2 0a 94 01 01 e8 b6 a0 98 00 <0f> 0b e9 32 43 c4 00 80 3d dc 0a 94 01 00 75 85 48 c7 c7 40 90 26 [ 50.141959] RSP: 0018:ffffa21441b13e38 EFLAGS: 00010282 [ 50.147199] RAX: 0000000000000000 RBX: 000000007fffffff RCX: 0000000000000000 [ 50.154355] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 [ 50.161501] RBP: ffffffff8b2ceba0 R08: 0000000000000000 R09: 0000000000000000 [ 50.168656] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 000000000000001f [ 50.175801] R13: ffffa21441b13f10 R14: ffffa21441b13f10 R15: ffff9608c4e62000 [ 50.182948] FS: 00007f44f1af4580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 50.191049] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 50.196807] CR2: 00007f44f18f4000 CR3: 000000010615e000 CR4: 00000000001506f0 [ 50.203952] Call Trace: [ 50.206439] __refcount_add_not_zero.constprop.0+0x2a/0x35 [ 50.211943] lkdtm_REFCOUNT_INC_NOT_ZERO_OVERFLOW+0x3e/0x76 [ 50.217535] direct_entry.cold+0x2c/0x38 [ 50.221477] full_proxy_write+0x56/0x80 [ 50.225338] vfs_write+0xea/0x3b0 [ 50.228672] ksys_write+0x68/0xf0 [ 50.232013] do_syscall_64+0x33/0x40 [ 50.235609] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 50.240690] RIP: 0033:0x7f44f1a01833 [ 50.244281] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 50.263089] RSP: 002b:00007fff86649048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 50.270695] RAX: ffffffffffffffda RBX: 000000000000001f RCX: 00007f44f1a01833 [ 50.277897] RDX: 000000000000001f RSI: 00007f44f18f4000 RDI: 0000000000000001 [ 50.285069] RBP: 00007f44f18f4000 R08: 00007f44f18f3010 R09: 0000000000000000 [ 50.292270] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 50.299453] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 [ 50.306670] irq event stamp: 0 [ 50.309765] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 50.316105] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 [ 50.324323] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 [ 50.332545] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 50.338855] ---[ end trace 3c547c3eb0d57e49 ]--- [ 50.343519] lkdtm: Overflow detected: saturated # [ 49.862783] lkdtm: Performing direct entry REFCOUNT_INC_NOT_ZERO_OVERFLOW # [ 49.876937] lkdtm: attempting bad refcount_inc_not_zero() overflow # [ 49.905292] ------------[ cut here ]------------ # [ 49.932092] refcount_t: saturated; leaking memory. # [ 49.959079] WARNING: CPU: 0 PID: 2009 at lib/refcount.c:19 refcount_warn_saturate+0x97/0x110 # [ 49.989685] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table # [ 50.037268] CPU: 0 PID: 2009 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 50.067105] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 50.095243] RIP: 0010:refcount_warn_saturate+0x97/0x110 # [ 50.122604] Code: 01 01 e8 d9 a0 98 00 0f 0b e9 55 43 c4 00 80 3d 02 0b 94 01 00 75 a8 48 c7 c7 e8 8f 26 8b c6 05 f2 0a 94 01 01 e8 b6 a0 98 00 <0f> 0b e9 32 43 c4 00 80 3d dc 0a 94 01 00 75 85 48 c7 c7 40 90 26 # [ 50.141959] RSP: 0018:ffffa21441b13e38 EFLAGS: 00010282 # [ 50.147199] RAX: 0000000000000000 RBX: 000000007fffffff RCX: 0000000000000000 # [ 50.154355] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 # [ 50.161501] RBP: ffffffff8b2ceba0 R08: 0000000000000000 R09: 0000000000000000 # [ 50.168656] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 000000000000001f # [ 50.175801] R13: ffffa21441b13f10 R14: ffffa21441b13f10 R15: ffff9608c4e62000 # [ 50.182948] FS: 00007f44f1a[ 50.499527] lkdtm: Performing direct entry REFCOUNT_ADD_NOT_ZERO_OVERFLOW f4580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 50.191049] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 50.196807] CR2: 00007f44f18f4000 CR3: 000000010615e000 CR4: 00000000001506f0 # [ 50.203952] Call Trace: # [ 50.206[ 50.523288] lkdtm: attempting bad refcount_add_not_zero() overflow 439] __refcount_add_not_zero.constprop.0+0x2a/0x35 # [ 50.211943] lkdtm_REFCOUNT_INC_NOT_ZERO_OVERFLOW+0x3e/0x76 # [ 50.217535] direct_entry.cold+0x2c/0x38 # [ 50.221477] full_proxy_write+0x56/0x80 # [ 50.225338] vfs_write+0xea/0x3b0 # [ [ 50.551646] ------------[ cut here ]------------ 50.228672] ksys_write+0x68/0xf0 # [ 50.232013] do_syscall_64+0x33/0x40 # [ 50.235609] entry_SYSCALL_64_after_hwframe+0x61/0xc6 # [ 50.240690] RIP: 0033:0x7f44f1a01833 # [ 50.244281] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff [ 50.578431] refcount_t: saturated; leaking memory. ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 # [ 50.263089] RSP: 002b:00007fff86649048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 # [ 50.270695] RAX: f[ 50.605445] WARNING: CPU: 0 PID: 2041 at lib/refcount.c:19 refcount_warn_saturate+0x97/0x110 fffffffffffffda RBX: 000000000000001f RCX: 00007f44f1a01833 # [ 50.277897] RDX: 000000000000001f RSI: 00007f44f18f4000 RDI: 0000000000000001 # [ 50.285069] RBP: 00007f44f18f4000 R08: 00007f44f18f3010 R09: 0000000000000000 # [ 50.292270] R10: fffff[ 50.636062] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table ffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 # [ 50.299453] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # [ 50.306670] irq event stamp: 0 # [ 50.309765] hardirqs last enabled at (0): [<0000000000000000>] 0x0 # [ [ 50.683618] CPU: 0 PID: 2041 Comm: cat Tainted: G D W 5.10.173-cip27 #1 50.316105] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 # [ 50.324323] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 # [ 50.332545] softirqs last disabled at (0): [<0000000000000000>][ 50.713461] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 0x0 # [ 50.338855] ---[ end trace 3c547c3eb0d57e49 ]--- # [ 50.343519] lkdtm: Overflow detected: saturated # REFCOUNT_INC_NOT_ZERO_OVERFLOW: saw 'call trace:': ok ok 44 selftests: lkdtm: REFCOUNT_INC_NOT_ZERO_OVERFLOW.sh # selftests: lkdtm: REFCO[ 50.741601] RIP: 0010:refcount_warn_saturate+0x97/0x110 UNT_ADD_NOT_ZERO_OVERFLOW.sh [ 50.768969] Code: 01 01 e8 d9 a0 98 00 0f 0b e9 55 43 c4 00 80 3d 02 0b 94 01 00 75 a8 48 c7 c7 e8 8f 26 8b c6 05 f2 0a 94 01 01 e8 b6 a0 98 00 <0f> 0b e9 32 43 c4 00 80 3d dc 0a 94 01 00 75 85 48 c7 c7 40 90 26 [ 50.790291] RSP: 0018:ffffa21441b73e38 EFLAGS: 00010282 [ 50.795542] RAX: 0000000000000000 RBX: 000000007fffffff RCX: 0000000000000000 [ 50.802704] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 [ 50.809872] RBP: ffffffff8b2cebc0 R08: 0000000000000000 R09: 0000000000000000 [ 50.817039] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 000000000000001f [ 50.824223] R13: ffffa21441b73f10 R14: ffffa21441b73f10 R15: ffff9608c3905000 [ 50.831399] FS: 00007f0d76fa8580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 50.839525] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 50.845294] CR2: 00007f0d76d74000 CR3: 00000001043a4000 CR4: 00000000001506f0 [ 50.852468] Call Trace: [ 50.854955] __refcount_add_not_zero.constprop.0+0x2a/0x35 [ 50.860516] lkdtm_REFCOUNT_ADD_NOT_ZERO_OVERFLOW+0x3e/0x76 [ 50.866127] direct_entry.cold+0x2c/0x38 [ 50.870107] full_proxy_write+0x56/0x80 [ 50.874016] vfs_write+0xea/0x3b0 [ 50.877397] ksys_write+0x68/0xf0 [ 50.880766] do_syscall_64+0x33/0x40 [ 50.884429] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 50.889553] RIP: 0033:0x7f0d76e81833 [ 50.893183] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 50.911984] RSP: 002b:00007ffc5979d8a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 50.919605] RAX: ffffffffffffffda RBX: 000000000000001f RCX: 00007f0d76e81833 [ 50.926792] RDX: 000000000000001f RSI: 00007f0d76d74000 RDI: 0000000000000001 [ 50.933955] RBP: 00007f0d76d74000 R08: 00007f0d76d73010 R09: 0000000000000000 [ 50.941117] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 50.948258] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 [ 50.955445] irq event stamp: 0 [ 50.958523] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 50.964820] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 [ 50.973001] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 [ 50.981202] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 50.987469] ---[ end trace 3c547c3eb0d57e4a ]--- [ 50.992082] lkdtm: Overflow detected: saturated # [ 50.499527] lkdtm: Performing direct entry REFCOUNT_ADD_NOT_ZERO_OVERFLOW # [ 50.523288] lkdtm: attempting bad refcount_add_not_zero() overflow # [ 50.551646] ------------[ cut here ]------------ # [ 50.578431] refcount_t: saturated; leaking memory. # [ 50.605445] WARNING: CPU: 0 PID: 2041 at lib/refcount.c:19 refcount_warn_saturate+0x97/0x110 # [ 50.636062] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table # [ 50.683618] CPU: 0 PID: 2041 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 50.713461] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 50.741601] RIP: 0010:refcount_warn_saturate+0x97/0x110 # [ 50.768969] Code: 01 01 e8 d9 a0 98 00 0f 0b e9 55 43 c4 00 80 3d 02 0b 94 01 00 75 a8 48 c7 c7 e8 8f 26 8b c6 05 f2 0a 94 01 01 e8 b6 a0 98 00 <0f> 0b e9 32 43 c4 00 80 3d dc 0a 94 01 00 75 85 48 c7 c7 40 90 26 # [ 50.790291] RSP: 0018:ffffa21441b73e38 EFLAGS: 00010282 # [ 50.795542] RAX: 0000000000000000 RBX: 000000007fffffff RCX: 0000000000000000 # [ 50.802704] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 # [ 50.809872] RBP: ffffffff8b2cebc0 R08: 0000000000000000 R09: 0000000000000000 # [ 50.817039] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 000000000000001f # [ 50.824223] R13: ffffa21441b73f10 R14: ffffa21441b73f10 R15: ffff9608c3905000 # [ 50.831399] FS: [ 51.145975] lkdtm: Performing direct entry REFCOUNT_DEC_ZERO 00007f0d76fa8580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 50.839525] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 50.845294] CR2: 00007f0d76d74000 CR3: 00000001043a4000 CR4: 00000000001506f0 # [ 50.852468] Call Trace: [ 51.164322] lkdtm: attempting good refcount_dec() # [ 50.854955] __refcount_add_not_zero.constprop.0+0x2a/0x35 # [ 50.860516] lkdtm_REFCOUNT_ADD_NOT_ZERO_OVERFLOW+0x3e/0x76 # [ 50.866127] direct_entry.cold+0x2c/0x38 # [ 50.870107] full_proxy_write+0x56/0x80 # [ 50.874016] vfs_write+0xea[ 51.191237] lkdtm: attempting bad refcount_dec() to zero /0x3b0 # [ 50.877397] ksys_write+0x68/0xf0 # [ 50.880766] do_syscall_64+0x33/0x40 # [ 50.884429] entry_SYSCALL_64_after_hwframe+0x61/0xc6 # [ 50.889553] RIP: 0033:0x7f0d76e81833 # [ 50.893183] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 [ 51.218706] ------------[ cut here ]------------ c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 # [ 50.911984] RSP: 002b:00007ffc5979d8a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 # [ 50.91[ 51.245498] refcount_t: decrement hit 0; leaking memory. 9605] RAX: ffffffffffffffda RBX: 000000000000001f RCX: 00007f0d76e81833 # [ 50.926792] RDX: 000000000000001f RSI: 00007f0d76d74000 RDI: 0000000000000001 # [ 50.933955] RBP: 00007f0d76d74000 R08: 00007f0d76d73010 R09: 0000000000000000 # [ 50.941117[ 51.273015] WARNING: CPU: 0 PID: 2073 at lib/refcount.c:31 refcount_warn_saturate+0xfb/0x110 ] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 # [ 50.948258] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # [ 50.955445] irq event stamp: 0 # [ 50.958523] hardirqs last enabled at (0): [<0000000000000000[ 51.303631] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table >] 0x0 # [ 50.964820] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 # [ 50.973001] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 # [ 50.981202] softirqs last disabled at (0): [<000000[ 51.351207] CPU: 0 PID: 2073 Comm: cat Tainted: G D W 5.10.173-cip27 #1 0000000000>] 0x0 # [ 50.987469] ---[ end trace 3c547c3eb0d57e4a ]--- # [ 50.992082] lkdtm: Overflow detected: saturated # REFCOUNT_ADD_NOT_ZERO_OVERFLOW: saw 'call trace:': ok ok 45 selftests: lkdtm: REFCOUNT_ADD_NOT_ZERO_OVERFLOW.sh # selftests: [ 51.381055] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 lkdtm: REFCOUNT_DEC_ZERO.sh [ 51.409162] RIP: 0010:refcount_warn_saturate+0xfb/0x110 [ 51.416871] Code: 98 90 26 8b c6 05 a3 0a 94 01 01 e8 6c a0 98 00 0f 0b e9 e8 42 c4 00 48 c7 c7 68 90 26 8b c6 05 8a 0a 94 01 01 e8 52 a0 98 00 <0f> 0b e9 ce 42 c4 00 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 8b [ 51.435631] RSP: 0018:ffffa21441bdbe48 EFLAGS: 00010286 [ 51.440869] RAX: 0000000000000000 RBX: 000000000000002f RCX: 0000000000000000 [ 51.448029] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 [ 51.455176] RBP: ffffffff8b2cef79 R08: 0000000000000000 R09: 0000000000000000 [ 51.462324] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000012 [ 51.469463] R13: ffffa21441bdbf10 R14: ffffa21441bdbf10 R15: ffff9608c353a000 [ 51.476624] FS: 00007fc127bde580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 51.484718] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 51.490502] CR2: 00007fc1279ac000 CR3: 000000010602a000 CR4: 00000000001506f0 [ 51.497645] Call Trace: [ 51.500123] lkdtm_REFCOUNT_DEC_ZERO+0x4d/0xbd [ 51.504584] direct_entry.cold+0x2c/0x38 [ 51.508569] full_proxy_write+0x56/0x80 [ 51.512442] vfs_write+0xea/0x3b0 [ 51.515804] ksys_write+0x68/0xf0 [ 51.519146] do_syscall_64+0x33/0x40 [ 51.522785] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 51.527872] RIP: 0033:0x7fc127ab9833 [ 51.531507] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 51.550305] RSP: 002b:00007ffe99e73678 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 51.557942] RAX: ffffffffffffffda RBX: 0000000000000012 RCX: 00007fc127ab9833 [ 51.565125] RDX: 0000000000000012 RSI: 00007fc1279ac000 RDI: 0000000000000001 [ 51.572321] RBP: 00007fc1279ac000 R08: 00007fc1279ab010 R09: 0000000000000000 [ 51.579520] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 51.586712] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 [ 51.593969] irq event stamp: 0 [ 51.597079] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 51.603412] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 [ 51.611730] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 [ 51.619957] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 51.626256] ---[ end trace 3c547c3eb0d57e4b ]--- [ 51.630946] lkdtm: Zero detected: saturated # [ 51.145975] lkdtm: Performing direct entry REFCOUNT_DEC_ZERO # [ 51.164322] lkdtm: attempting good refcount_dec() # [ 51.191237] lkdtm: attempting bad refcount_dec() to zero # [ 51.218706] ------------[ cut here ]------------ # [ 51.245498] refcount_t: decrement hit 0; leaking memory. # [ 51.273015] WARNING: CPU: 0 PID: 2073 at lib/refcount.c:31 refcount_warn_saturate+0xfb/0x110 # [ 51.303631] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table # [ 51.351207] CPU: 0 PID: 2073 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 51.381055] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 51.409162] RIP: 0010:refcount_warn_saturate+0xfb/0x110 # [ 51.416871] Code: 98 90 26 8b c6 05 a3 0a 94 01 01 e8 6c a0 98 00 0f 0b e9 e8 42 c4 00 48 c7 c7 68 90 26 8b c6 05 8a 0a 94 01 01 e8 52 a0 98 00 <0f> 0b e9 ce 42 c4 00 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 8b # [ 51.435631] RSP: 0018:ffffa21441bdbe48 EFLAGS: 00010286 # [ 51.440869] RAX: 0000000000000000 RBX: 000000000000002f RCX: 0000000000000000 # [ 51.448029] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 # [ 51.455176] RBP: ffffffff8b2cef79 R08: 0000000000000000 R09: 0000000000000000 # [ 51.462324] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000012 # [ 51.469463] R13: ffffa21441bdbf10 R14: ffffa21441bdbf10 R15[ 51.789547] lkdtm: Performing direct entry REFCOUNT_DEC_NEGATIVE : ffff9608c353a000 # [ 51.476624] FS: 00007fc127bde580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 51.484718] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 51.490502] CR2: 00007fc1279ac000 CR3: 000000010602a000 CR4: 0000000[ 51.802773] lkdtm: attempting bad refcount_dec() below zero 0001506f0 # [ 51.497645] Call Trace: # [ 51.500123] lkdtm_REFCOUNT_DEC_ZERO+0x4d/0xbd # [ 51.504584] direct_entry.cold+0x2c/0x38 # [ 51.508569] full_proxy_write+0x56/0x80 # [ 51.512442] vfs_write+0xea/0x3b0 # [ 51.515804] ksys_write+[ 51.830550] ------------[ cut here ]------------ 0x68/0xf0 # [ 51.519146] do_syscall_64+0x33/0x40 # [ 51.522785] entry_SYSCALL_64_after_hwframe+0x61/0xc6 # [ 51.527872] RIP: 0033:0x7fc127ab9833 # [ 51.531507] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 0[ 51.857336] refcount_t: decrement hit 0; leaking memory. 4 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 # [ 51.550305] RSP: 002b:00007ffe99e73678 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 # [ 51.557942] RAX: ffffffffffffffda RBX: 0000[ 51.884853] WARNING: CPU: 0 PID: 2108 at lib/refcount.c:31 refcount_warn_saturate+0xfb/0x110 000000000012 RCX: 00007fc127ab9833 # [ 51.565125] RDX: 0000000000000012 RSI: 00007fc1279ac000 RDI: 0000000000000001 # [ 51.572321] RBP: 00007fc1279ac000 R08: 00007fc1279ab010 R09: 0000000000000000 # [ 51.579520] R10: fffffffffffffbc5 R11: 00000000[ 51.915422] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table 00000246 R12: 0000000000000001 # [ 51.586712] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # [ 51.593969] irq event stamp: 0 # [ 51.597079] hardirqs last enabled at (0): [<0000000000000000>] 0x0 # [ 51.603412] hardirqs las[ 51.962975] CPU: 0 PID: 2108 Comm: cat Tainted: G D W 5.10.173-cip27 #1 t disabled at (0): [] copy_process+0x664/0x1cb0 # [ 51.611730] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 # [ 51.619957] softirqs last disabled at (0): [<0000000000000000>] 0x0 # [ 51.626256] --[ 51.992974] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 -[ end trace 3c547c3eb0d57e4b ]--- # [ 51.630946] lkdtm: Zero detected: saturated # REFCOUNT_DEC_ZERO: saw 'call trace:': ok ok 46 selftests: lkdtm: REFCOUNT_DEC_ZERO.sh # selftests: lkdtm: REFCOUNT_DEC_NEGATIVE.sh [ 52.020988] RIP: 0010:refcount_warn_saturate+0xfb/0x110 [ 52.045451] Code: 98 90 26 8b c6 05 a3 0a 94 01 01 e8 6c a0 98 00 0f 0b e9 e8 42 c4 00 48 c7 c7 68 90 26 8b c6 05 8a 0a 94 01 01 e8 52 a0 98 00 <0f> 0b e9 ce 42 c4 00 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 8b [ 52.064246] RSP: 0018:ffffa21441c4be48 EFLAGS: 00010286 [ 52.069495] RAX: 0000000000000000 RBX: 0000000000000030 RCX: 0000000000000000 [ 52.076642] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 [ 52.083791] RBP: ffffffff8b2cef8b R08: 0000000000000000 R09: 0000000000000000 [ 52.090937] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000016 [ 52.098091] R13: ffffa21441c4bf10 R14: ffffa21441c4bf10 R15: ffff9608c3865000 [ 52.105237] FS: 00007f8f215e4580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 52.113337] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 52.119098] CR2: 00007f8f213e4000 CR3: 0000000103350000 CR4: 00000000001506f0 [ 52.126249] Call Trace: [ 52.128718] lkdtm_REFCOUNT_DEC_NEGATIVE+0x37/0x61 [ 52.133531] direct_entry.cold+0x2c/0x38 [ 52.137471] full_proxy_write+0x56/0x80 [ 52.141354] vfs_write+0xea/0x3b0 [ 52.144692] ksys_write+0x68/0xf0 [ 52.148040] do_syscall_64+0x33/0x40 [ 52.151641] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 52.156735] RIP: 0033:0x7f8f214f1833 [ 52.160335] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 52.179125] RSP: 002b:00007ffedf15b4f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 52.186714] RAX: ffffffffffffffda RBX: 0000000000000016 RCX: 00007f8f214f1833 [ 52.193911] RDX: 0000000000000016 RSI: 00007f8f213e4000 RDI: 0000000000000001 [ 52.201098] RBP: 00007f8f213e4000 R08: 00007f8f213e3010 R09: 0000000000000000 [ 52.208294] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 52.215471] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 [ 52.222672] irq event stamp: 0 [ 52.225764] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 52.232071] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 [ 52.240278] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 [ 52.248518] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 52.254835] ---[ end trace 3c547c3eb0d57e4c ]--- [ 52.259509] lkdtm: Negative detected: saturated # [ 51.789547] lkdtm: Performing direct entry REFCOUNT_DEC_NEGATIVE # [ 51.802773] lkdtm: attempting bad refcount_dec() below zero # [ 51.830550] ------------[ cut here ]------------ # [ 51.857336] refcount_t: decrement hit 0; leaking memory. # [ 51.884853] WARNING: CPU: 0 PID: 2108 at lib/refcount.c:31 refcount_warn_saturate+0xfb/0x110 # [ 51.915422] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table # [ 51.962975] CPU: 0 PID: 2108 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 51.992974] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 52.020988] RIP: 0010:refcount_warn_saturate+0xfb/0x110 # [ 52.045451] Code: 98 90 26 8b c6 05 a3 0a 94 01 01 e8 6c a0 98 00 0f 0b e9 e8 42 c4 00 48 c7 c7 68 90 26 8b c6 05 8a 0a 94 01 01 e8 52 a0 98 00 <0f> 0b e9 ce 42 c4 00 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 8b # [ 52.064246] RSP: 0018:ffffa21441c4be48 EFLAGS: 00010286 # [ 52.069495] RAX: 0000000000000000 RBX: 0000000000000030 RCX: 0000000000000000 # [ 52.076642] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 # [ 52.083791] RBP: ffffffff8b2cef8b R08: 0000000000000000 R09: 0000000000000000 # [ 52.090937] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000016 # [ 52.098091] R13: ffffa21441c4bf10 R14: ffffa21441c4bf10 R15: ffff9608c3865000 # [ 52.105237] FS: 00007f8f[ 52.428409] lkdtm: Performing direct entry REFCOUNT_DEC_AND_TEST_NEGATIVE 215e4580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 52.113337] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 52.119098] CR2: 00007f8f213e4000 CR3: 0000000103350000 CR4: 00000000001506f0 # [ 52.126249] Call Trace: # [ 52.[ 52.438372] lkdtm: attempting bad refcount_dec_and_test() below zero 128718] lkdtm_REFCOUNT_DEC_NEGATIVE+0x37/0x61 # [ 52.133531] direct_entry.cold+0x2c/0x38 # [ 52.137471] full_proxy_write+0x56/0x80 # [ 52.141354] vfs_write+0xea/0x3b0 # [ 52.144692] ksys_write+0x68/0xf0 # [ 52.148040] do_syscall_64+0x3[ 52.466894] ------------[ cut here ]------------ 3/0x40 # [ 52.151641] entry_SYSCALL_64_after_hwframe+0x61/0xc6 # [ 52.156735] RIP: 0033:0x7f8f214f1833 # [ 52.160335] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f[ 52.493723] refcount_t: underflow; use-after-free. 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 # [ 52.179125] RSP: 002b:00007ffedf15b4f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 # [ 52.186714] RAX: ffffffffffffffda RBX: 0000000000000016 RCX: 00007f8f214f1833 # [ 52.1[ 52.520714] WARNING: CPU: 0 PID: 2143 at lib/refcount.c:28 refcount_warn_saturate+0xba/0x110 93911] RDX: 0000000000000016 RSI: 00007f8f213e4000 RDI: 0000000000000001 # [ 52.201098] RBP: 00007f8f213e4000 R08: 00007f8f213e3010 R09: 0000000000000000 # [ 52.208294] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 # [ 52.21547[ 52.551275] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table 1] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # [ 52.222672] irq event stamp: 0 # [ 52.225764] hardirqs last enabled at (0): [<0000000000000000>] 0x0 # [ 52.232071] hardirqs last disabled at (0): [] copy_p[ 52.598819] CPU: 0 PID: 2143 Comm: cat Tainted: G D W 5.10.173-cip27 #1 rocess+0x664/0x1cb0 # [ 52.240278] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 # [ 52.248518] softirqs last disabled at (0): [<0000000000000000>] 0x0 # [ 52.254835] ---[ end trace 3c547c3eb0d57e4c ]--- # [ 52.2[ 52.628811] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 59509] lkdtm: Negative detected: saturated # REFCOUNT_DEC_NEGATIVE: saw 'Negative detected: saturated': ok ok 47 selftests: lkdtm: REFCOUNT_DEC_NEGATIVE.sh # selftests: lkdtm: REFCOUNT_DEC_AND_TEST_NEGATIVE.sh [ 52.656816] RIP: 0010:refcount_warn_saturate+0xba/0x110 [ 52.680609] Code: 01 01 e8 b6 a0 98 00 0f 0b e9 32 43 c4 00 80 3d dc 0a 94 01 00 75 85 48 c7 c7 40 90 26 8b c6 05 cc 0a 94 01 01 e8 93 a0 98 00 <0f> 0b e9 0f 43 c4 00 80 3d b7 0a 94 01 00 0f 85 5e ff ff ff 48 c7 [ 52.699378] RSP: 0018:ffffa21441cd3e40 EFLAGS: 00010286 [ 52.704694] RAX: 0000000000000000 RBX: 0000000000000031 RCX: 0000000000000000 [ 52.711849] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 [ 52.719009] RBP: ffffffff8b2cebe0 R08: 0000000000000000 R09: 0000000000000000 [ 52.726159] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 000000000000001f [ 52.733315] R13: ffffa21441cd3f10 R14: ffffa21441cd3f10 R15: ffff9608c4916000 [ 52.740462] FS: 00007ff4640e5580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 52.748567] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 52.754324] CR2: 00007ff463eb4000 CR3: 0000000103850000 CR4: 00000000001506f0 [ 52.761478] Call Trace: [ 52.763953] __refcount_sub_and_test.constprop.0+0x3c/0x50 [ 52.769465] lkdtm_REFCOUNT_DEC_AND_TEST_NEGATIVE+0x3e/0x78 [ 52.775056] direct_entry.cold+0x2c/0x38 [ 52.779013] full_proxy_write+0x56/0x80 [ 52.782868] vfs_write+0xea/0x3b0 [ 52.786233] ksys_write+0x68/0xf0 [ 52.789582] do_syscall_64+0x33/0x40 [ 52.793225] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 52.798337] RIP: 0033:0x7ff463fc1833 [ 52.801985] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 52.820793] RSP: 002b:00007ffe3ac39468 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 52.828418] RAX: ffffffffffffffda RBX: 000000000000001f RCX: 00007ff463fc1833 [ 52.835660] RDX: 000000000000001f RSI: 00007ff463eb4000 RDI: 0000000000000001 [ 52.842838] RBP: 00007ff463eb4000 R08: 00007ff463eb3010 R09: 0000000000000000 [ 52.850049] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 52.857253] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 [ 52.864478] irq event stamp: 0 [ 52.867605] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 52.873924] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 [ 52.882174] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 [ 52.890391] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 52.896677] ---[ end trace 3c547c3eb0d57e4d ]--- [ 52.901298] lkdtm: Negative detected: saturated # [ 52.428409] lkdtm: Performing direct entry REFCOUNT_DEC_AND_TEST_NEGATIVE # [ 52.438372] lkdtm: attempting bad refcount_dec_and_test() below zero # [ 52.466894] ------------[ cut here ]------------ # [ 52.493723] refcount_t: underflow; use-after-free. # [ 52.520714] WARNING: CPU: 0 PID: 2143 at lib/refcount.c:28 refcount_warn_saturate+0xba/0x110 # [ 52.551275] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table # [ 52.598819] CPU: 0 PID: 2143 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 52.628811] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 52.656816] RIP: 0010:refcount_warn_saturate+0xba/0x110 # [ 52.680609] Code: 01 01 e8 b6 a0 98 00 0f 0b e9 32 43 c4 00 80 3d dc 0a 94 01 00 75 85 48 c7 c7 40 90 26 8b c6 05 cc 0a 94 01 01 e8 93 a0 98 00 <0f> 0b e9 0f 43 c4 00 80 3d b7 0a 94 01 00 0f 85 5e ff ff ff 48 c7 # [ 52.699378] RSP: 0018:ffffa21441cd3e40 EFLAGS: 00010286 # [ 52.704694] RAX: 0000000000000000 RBX: 0000000000000031 RCX: 0000000000000000 # [ 52.711849] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 # [ 52.719009] RBP: ffffffff8b2cebe0 R08: 0000000000000000 R09: 0000000000000000 # [ 52.726159] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 000000000000001f # [ 52.733315] R13: ffffa21441cd3f10 R14: ffffa21441cd3f10 R15: ffff9608c4916000 # [ 52.740462] FS: 00007ff46[ 53.066625] lkdtm: Performing direct entry REFCOUNT_SUB_AND_TEST_NEGATIVE 40e5580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 52.748567] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 52.754324] CR2: 00007ff463eb4000 CR3: 0000000103850000 CR4: 00000000001506f0 # [ 52.761478] Call Trace: # [ 52.7[ 53.079961] lkdtm: attempting bad refcount_sub_and_test() below zero 63953] __refcount_sub_and_test.constprop.0+0x3c/0x50 # [ 52.769465] lkdtm_REFCOUNT_DEC_AND_TEST_NEGATIVE+0x3e/0x78 # [ 52.775056] direct_entry.cold+0x2c/0x38 # [ 52.779013] full_proxy_write+0x56/0x80 # [ 52.782868] vfs_write+0xea/0x3b0 # [ 53.108489] ------------[ cut here ]------------ [ 52.786233] ksys_write+0x68/0xf0 # [ 52.789582] do_syscall_64+0x33/0x40 # [ 52.793225] entry_SYSCALL_64_after_hwframe+0x61/0xc6 # [ 52.798337] RIP: 0033:0x7ff463fc1833 # [ 52.801985] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff f[ 53.135286] refcount_t: underflow; use-after-free. f ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 # [ 52.820793] RSP: 002b:00007ffe3ac39468 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 # [ 52.828418] RAX:[ 53.162287] WARNING: CPU: 0 PID: 2178 at lib/refcount.c:28 refcount_warn_saturate+0xba/0x110 ffffffffffffffda RBX: 000000000000001f RCX: 00007ff463fc1833 # [ 52.835660] RDX: 000000000000001f RSI: 00007ff463eb4000 RDI: 0000000000000001 # [ 52.842838] RBP: 00007ff463eb4000 R08: 00007ff463eb3010 R09: 0000000000000000 # [ 52.850049] R10: fff[ 53.192882] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table ffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 # [ 52.857253] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # [ 52.864478] irq event stamp: 0 # [ 52.867605] hardirqs last enabled at (0): [<0000000000000000>] 0x0 # [ 53.240468] CPU: 0 PID: 2178 Comm: cat Tainted: G D W 5.10.173-cip27 #1 [ 52.873924] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 # [ 52.882174] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 # [ 52.890391] softirqs last disabled at (0): [<0000000000000000[ 53.270309] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 >] 0x0 # [ 52.896677] ---[ end trace 3c547c3eb0d57e4d ]--- # [ 52.901298] lkdtm: Negative detected: saturated # REFCOUNT_DEC_AND_TEST_NEGATIVE: saw 'Negative detected: saturated': ok ok 48 selftests: lkdtm: REFCOUNT_DEC_AND_TEST_NEGATIVE.sh # self[ 53.298442] RIP: 0010:refcount_warn_saturate+0xba/0x110 tests: lkdtm: REFCOUNT_SUB_AND_TEST_NEGATIVE.sh [ 53.325825] Code: 01 01 e8 b6 a0 98 00 0f 0b e9 32 43 c4 00 80 3d dc 0a 94 01 00 75 85 48 c7 c7 40 90 26 8b c6 05 cc 0a 94 01 01 e8 93 a0 98 00 <0f> 0b e9 0f 43 c4 00 80 3d b7 0a 94 01 00 0f 85 5e ff ff ff 48 c7 [ 53.348798] RSP: 0018:ffffa21441d5be40 EFLAGS: 00010286 [ 53.354084] RAX: 0000000000000000 RBX: 0000000000000032 RCX: 0000000000000000 [ 53.361257] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 [ 53.368441] RBP: ffffffff8b2cec00 R08: 0000000000000000 R09: 0000000000000000 [ 53.375631] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 000000000000001f [ 53.382872] R13: ffffa21441d5bf10 R14: ffffa21441d5bf10 R15: ffff9608c549a000 [ 53.390061] FS: 00007fa92822f580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 53.398213] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 53.404026] CR2: 00007fa927ffc000 CR3: 0000000105520000 CR4: 00000000001506f0 [ 53.411208] Call Trace: [ 53.413732] __refcount_sub_and_test.constprop.0+0x3c/0x50 [ 53.419274] lkdtm_REFCOUNT_SUB_AND_TEST_NEGATIVE+0x3e/0x7b [ 53.424922] direct_entry.cold+0x2c/0x38 [ 53.428896] full_proxy_write+0x56/0x80 [ 53.432799] vfs_write+0xea/0x3b0 [ 53.436187] ksys_write+0x68/0xf0 [ 53.439559] do_syscall_64+0x33/0x40 [ 53.443281] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 53.448397] RIP: 0033:0x7fa928109833 [ 53.452003] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 53.470797] RSP: 002b:00007ffc9a27d308 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 53.478369] RAX: ffffffffffffffda RBX: 000000000000001f RCX: 00007fa928109833 [ 53.485509] RDX: 000000000000001f RSI: 00007fa927ffc000 RDI: 0000000000000001 [ 53.492642] RBP: 00007fa927ffc000 R08: 00007fa927ffb010 R09: 0000000000000000 [ 53.499769] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 53.506897] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 [ 53.514045] irq event stamp: 0 [ 53.517102] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 53.523366] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 [ 53.531537] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 [ 53.539706] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 53.545989] ---[ end trace 3c547c3eb0d57e4e ]--- [ 53.550612] lkdtm: Negative detected: saturated # [ 53.066625] lkdtm: Performing direct entry REFCOUNT_SUB_AND_TEST_NEGATIVE # [ 53.079961] lkdtm: attempting bad refcount_sub_and_test() below zero # [ 53.108489] ------------[ cut here ]------------ # [ 53.135286] refcount_t: underflow; use-after-free. # [ 53.162287] WARNING: CPU: 0 PID: 2178 at lib/refcount.c:28 refcount_warn_saturate+0xba/0x110 # [ 53.192882] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table # [ 53.240468] CPU: 0 PID: 2178 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 53.270309] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 53.298442] RIP: 0010:refcount_warn_saturate+0xba/0x110 # [ 53.325825] Code: 01 01 e8 b6 a0 98 00 0f 0b e9 32 43 c4 00 80 3d dc 0a 94 01 00 75 85 48 c7 c7 40 90 26 8b c6 05 cc 0a 94 01 01 e8 93 a0 98 00 <0f> 0b e9 0f 43 c4 00 80 3d b7 0a 94 01 00 0f 85 5e ff ff ff 48 c7 # [ 53.348798] RSP: 0018:ffffa21441d5be40 EFLAGS: 00010286 # [ 53.354084] RAX: 0000000000000000 RBX: 0000000000000032 RCX: 0000000000000000 # [ 53.361257] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 # [ 53.368441] RBP: ffffffff8b2cec00 R08: 0000000000000000 R09: 0000000000000000 # [ 53.375631] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 000000000000001f # [ 53.382872] R13: ffffa21441d5bf10 R14: ffffa21441d5bf10 R15: ffff9608c549a000 # [ 53.390061] FS: 00007fa92[ 53.711941] lkdtm: Performing direct entry REFCOUNT_INC_ZERO 822f580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 53.398213] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 53.404026] CR2: 00007fa927ffc000 CR3: 0000000105520000 CR4: 00000000001506f0 # [ 53.411208] Call Trace: # [ 53.4[ 53.726789] lkdtm: attempting safe refcount_inc_not_zero() from zero 13732] __refcount_sub_and_test.constprop.0+0x3c/0x50 # [ 53.419274] lkdtm_REFCOUNT_SUB_AND_TEST_NEGATIVE+0x3e/0x7b # [ 53.424922] direct_entry.cold+0x2c/0x38 # [ 53.428896] full_proxy_write+0x56/0x80 # [ 53.432799] vfs_write+0xea/0x3b0 # [ 53.755354] lkdtm: Good: zero detected [ 53.436187] ksys_write+0x68/0xf0 # [ 53.439559] do_syscall_64+0x33/0x40 # [ 53.443281] entry_SYSCALL_64_after_hwframe+0x61/0xc6 # [ 53.448397] RIP: 0033:0x7fa928109833 # [ 53.452003] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff f[ 53.781296] lkdtm: Correctly stayed at zero f ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 # [ 53.470797] RSP: 002b:00007ffc9a27d308 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 # [ 53.478369] RAX:[ 53.807653] lkdtm: attempting bad refcount_inc() from zero ffffffffffffffda RBX: 000000000000001f RCX: 00007fa928109833 # [ 53.485509] RDX: 000000000000001f RSI: 00007fa927ffc000 RDI: 0000000000000001 # [ 53.492642] RBP: 00007fa927ffc000 R08: 00007fa927ffb010 R09: 0000000000000000 # [ 53.499769] R10: fff[ 53.835394] ------------[ cut here ]------------ ffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 # [ 53.506897] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # [ 53.514045] irq event stamp: 0 # [ 53.517102] hardirqs last enabled at (0): [<0000000000000000>] 0x0 # [ 53.862154] refcount_t: addition on 0; use-after-free. [ 53.523366] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 # [ 53.531537] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 # [ 53.539706] softirqs last disabled at (0): [<0000000000000000[ 53.889497] WARNING: CPU: 0 PID: 2210 at lib/refcount.c:25 refcount_warn_saturate+0x74/0x110 >] 0x0 # [ 53.545989] ---[ end trace 3c547c3eb0d57e4e ]--- # [ 53.550612] lkdtm: Negative detected: saturated # REFCOUNT_SUB_AND_TEST_NEGATIVE: saw 'Negative detected: saturated': ok ok 49 selftests: lkdtm: REFCOUNT_SUB_AND_TEST_NEGATIVE.sh # self[ 53.920051] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table tests: lkdtm: REFCOUNT_INC_ZERO.sh [ 53.967546] CPU: 0 PID: 2210 Comm: cat Tainted: G D W 5.10.173-cip27 #1 [ 53.978394] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 [ 53.984351] RIP: 0010:refcount_warn_saturate+0x74/0x110 [ 53.989616] Code: 01 01 e8 fc a0 98 00 0f 0b e9 78 43 c4 00 80 3d 23 0b 94 01 00 75 cb 48 c7 c7 10 90 26 8b c6 05 13 0b 94 01 01 e8 d9 a0 98 00 <0f> 0b e9 55 43 c4 00 80 3d 02 0b 94 01 00 75 a8 48 c7 c7 e8 8f 26 [ 54.008410] RSP: 0018:ffffa21441de3e48 EFLAGS: 00010286 [ 54.013702] RAX: 0000000000000000 RBX: 0000000000000033 RCX: 0000000000000000 [ 54.020860] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 [ 54.028120] RBP: ffffffff8b2cefa1 R08: 0000000000000000 R09: 0000000000000000 [ 54.035331] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000012 [ 54.042522] R13: ffffa21441de3f10 R14: ffffa21441de3f10 R15: ffff9608c3714000 [ 54.049696] FS: 00007f599f73f580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 54.057816] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 54.063590] CR2: 00007f599f50c000 CR3: 0000000103b12000 CR4: 00000000001506f0 [ 54.070799] Call Trace: [ 54.073306] lkdtm_REFCOUNT_INC_ZERO+0x99/0xc1 [ 54.077864] direct_entry.cold+0x2c/0x38 [ 54.081863] full_proxy_write+0x56/0x80 [ 54.085738] vfs_write+0xea/0x3b0 [ 54.089132] ksys_write+0x68/0xf0 [ 54.092474] do_syscall_64+0x33/0x40 [ 54.096084] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 54.101145] RIP: 0033:0x7f599f619833 [ 54.104718] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 54.123457] RSP: 002b:00007ffeaaf6a498 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 54.131017] RAX: ffffffffffffffda RBX: 0000000000000012 RCX: 00007f599f619833 [ 54.138161] RDX: 0000000000000012 RSI: 00007f599f50c000 RDI: 0000000000000001 [ 54.145291] RBP: 00007f599f50c000 R08: 00007f599f50b010 R09: 0000000000000000 [ 54.152419] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 54.159546] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 [ 54.166692] irq event stamp: 0 [ 54.169748] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 54.176011] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 [ 54.184179] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 [ 54.192347] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 54.198627] ---[ end trace 3c547c3eb0d57e4f ]--- [ 54.203249] lkdtm: Zero detected: saturated # [ 53.711941] lkdtm: Performing direct entry REFCOUNT_INC_ZERO # [ 53.726789] lkdtm: attempting safe refcount_inc_not_zero() from zero # [ 53.755354] lkdtm: Good: zero detected # [ 53.781296] lkdtm: Correctly stayed at zero # [ 53.807653] lkdtm: attempting bad refcount_inc() from zero # [ 53.835394] ------------[ cut here ]------------ # [ 53.862154] refcount_t: addition on 0; use-after-free. # [ 53.889497] WARNING: CPU: 0 PID: 2210 at lib/refcount.c:25 refcount_warn_saturate+0x74/0x110 # [ 53.920051] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table # [ 53.967546] CPU: 0 PID: 2210 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 53.978394] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 53.984351] RIP: 0010:refcount_warn_saturate+0x74/0x110 # [ 53.989616] Code: 01 01 e8 fc a0 98 00 0f 0b e9 78 43 c4 00 80 3d 23 0b 94 01 00 75 cb 48 c7 c7 10 90 26 8b c6 05 13 0b 94 01 01 e8 d9 a0 98 00 <0f> 0b e9 55 43 c4 00 80 3d 02 0b 94 01 00 75 a8 48 c7 c7 e8 8f 26 # [ 54.008410] RSP: 0018:ffffa21441de3e48 EFLAGS: 00010286 # [ 54.013702] RAX: 0000000000000000 RBX: 0000000000000033 RCX: 0000000000000000 # [ 54.020860] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 # [ 54.028120] RBP: ffffffff8b2cefa1 R08: 0000000000000000 R09: 0000000000000000 # [ 54.035331] R10: 00000000ffffe000 [ 54.365622] lkdtm: Performing direct entry REFCOUNT_ADD_ZERO R11: 3fffffffffffffff R12: 0000000000000012 # [ 54.042522] R13: ffffa21441de3f10 R14: ffffa21441de3f10 R15: ffff9608c3714000 # [ 54.049696] FS: 00007f599f73f580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 54.057816] CS: 0010 DS: 0[ 54.375656] lkdtm: attempting safe refcount_add_not_zero() from zero 000 ES: 0000 CR0: 0000000080050033 # [ 54.063590] CR2: 00007f599f50c000 CR3: 0000000103b12000 CR4: 00000000001506f0 # [ 54.070799] Call Trace: # [ 54.073306] lkdtm_REFCOUNT_INC_ZERO+0x99/0xc1 # [ 54.077864] direct_entry.cold+0x2c/0x38 # [ [ 54.404198] lkdtm: Good: zero detected 54.081863] full_proxy_write+0x56/0x80 # [ 54.085738] vfs_write+0xea/0x3b0 # [ 54.089132] ksys_write+0x68/0xf0 # [ 54.092474] do_syscall_64+0x33/0x40 # [ 54.096084] entry_SYSCALL_64_after_hwframe+0x61/0xc6 # [ 54.101145] RIP: 0033:0x7f59[ 54.430159] lkdtm: Correctly stayed at zero 9f619833 # [ 54.104718] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 # [ 54.123457] RSP: 002b:0[ 54.456497] lkdtm: attempting bad refcount_add() from zero 0007ffeaaf6a498 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 # [ 54.131017] RAX: ffffffffffffffda RBX: 0000000000000012 RCX: 00007f599f619833 # [ 54.138161] RDX: 0000000000000012 RSI: 00007f599f50c000 RDI: 0000000000000001 # [ 54.145291] RBP: 00007[ 54.484266] ------------[ cut here ]------------ f599f50c000 R08: 00007f599f50b010 R09: 0000000000000000 # [ 54.152419] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 # [ 54.159546] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # [ 54.166692] irq event stam[ 54.510978] refcount_t: addition on 0; use-after-free. p: 0 # [ 54.169748] hardirqs last enabled at (0): [<0000000000000000>] 0x0 # [ 54.176011] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 # [ 54.184179] softirqs last enabled at (0): [] copy_proces[ 54.538365] WARNING: CPU: 0 PID: 2242 at lib/refcount.c:25 refcount_warn_saturate+0x74/0x110 s+0x664/0x1cb0 # [ 54.192347] softirqs last disabled at (0): [<0000000000000000>] 0x0 # [ 54.198627] ---[ end trace 3c547c3eb0d57e4f ]--- # [ 54.203249] lkdtm: Zero detected: saturated # REFCOUNT_INC_ZERO: saw 'call trace:': ok ok 50 selftests: [ 54.568911] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table lkdtm: REFCOUNT_INC_ZERO.sh # selftests: lkdtm: REFCOUNT_ADD_ZERO.sh [ 54.616423] CPU: 0 PID: 2242 Comm: cat Tainted: G D W 5.10.173-cip27 #1 [ 54.630281] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 [ 54.636235] RIP: 0010:refcount_warn_saturate+0x74/0x110 [ 54.641470] Code: 01 01 e8 fc a0 98 00 0f 0b e9 78 43 c4 00 80 3d 23 0b 94 01 00 75 cb 48 c7 c7 10 90 26 8b c6 05 13 0b 94 01 01 e8 d9 a0 98 00 <0f> 0b e9 55 43 c4 00 80 3d 02 0b 94 01 00 75 a8 48 c7 c7 e8 8f 26 [ 54.660250] RSP: 0018:ffffa21441e73e48 EFLAGS: 00010286 [ 54.665491] RAX: 0000000000000000 RBX: 0000000000000034 RCX: 0000000000000000 [ 54.672646] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 [ 54.679787] RBP: ffffffff8b2cefb3 R08: 0000000000000000 R09: 0000000000000000 [ 54.686949] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000012 [ 54.694105] R13: ffffa21441e73f10 R14: ffffa21441e73f10 R15: ffff9608c46d0000 [ 54.701276] FS: 00007fad26707580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 54.709381] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 54.715169] CR2: 00007fad264d4000 CR3: 0000000102658000 CR4: 00000000001506f0 [ 54.722310] Call Trace: [ 54.724832] lkdtm_REFCOUNT_ADD_ZERO+0x99/0xc1 [ 54.729321] direct_entry.cold+0x2c/0x38 [ 54.733352] full_proxy_write+0x56/0x80 [ 54.737233] vfs_write+0xea/0x3b0 [ 54.740624] ksys_write+0x68/0xf0 [ 54.743981] do_syscall_64+0x33/0x40 [ 54.747623] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 54.752745] RIP: 0033:0x7fad265e1833 [ 54.756363] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 54.775176] RSP: 002b:00007ffd4f5b0888 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 54.782823] RAX: ffffffffffffffda RBX: 0000000000000012 RCX: 00007fad265e1833 [ 54.790026] RDX: 0000000000000012 RSI: 00007fad264d4000 RDI: 0000000000000001 [ 54.797235] RBP: 00007fad264d4000 R08: 00007fad264d3010 R09: 0000000000000000 [ 54.804401] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 54.811555] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 [ 54.818700] irq event stamp: 0 [ 54.821764] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 54.828026] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 [ 54.836193] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 [ 54.844378] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 54.850652] ---[ end trace 3c547c3eb0d57e50 ]--- [ 54.855267] lkdtm: Zero detected: saturated # [ 54.365622] lkdtm: Performing direct entry REFCOUNT_ADD_ZERO # [ 54.375656] lkdtm: attempting safe refcount_add_not_zero() from zero # [ 54.404198] lkdtm: Good: zero detected # [ 54.430159] lkdtm: Correctly stayed at zero # [ 54.456497] lkdtm: attempting bad refcount_add() from zero # [ 54.484266] ------------[ cut here ]------------ # [ 54.510978] refcount_t: addition on 0; use-after-free. # [ 54.538365] WARNING: CPU: 0 PID: 2242 at lib/refcount.c:25 refcount_warn_saturate+0x74/0x110 # [ 54.568911] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table # [ 54.616423] CPU: 0 PID: 2242 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 54.630281] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 54.636235] RIP: 0010:refcount_warn_saturate+0x74/0x110 # [ 54.641470] Code: 01 01 e8 fc a0 98 00 0f 0b e9 78 43 c4 00 80 3d 23 0b 94 01 00 75 cb 48 c7 c7 10 90 26 8b c6 05 13 0b 94 01 01 e8 d9 a0 98 00 <0f> 0b e9 55 43 c4 00 80 3d 02 0b 94 01 00 75 a8 48 c7 c7 e8 8f 26 # [ 54.660250] RSP: 0018:ffffa21441e73e48 EFLAGS: 00010286 # [ 54.665491] RAX: 0000000000000000 RBX: 0000000000000034 RCX: 0000000000000000 # [ 54.672646] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 # [ 54.679787] RBP: ffffffff8b2cefb3 R08: 0000000000000000 R09: 0000000000000000 # [ 54.686949] R10: 00000000ffffe[ 55.017890] lkdtm: Performing direct entry REFCOUNT_INC_SATURATED 000 R11: 3fffffffffffffff R12: 0000000000000012 # [ 54.694105] R13: ffffa21441e73f10 R14: ffffa21441e73f10 R15: ffff9608c46d0000 # [ 54.701276] FS: 00007fad26707580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 54.709381] CS: 0010 D[ 55.029256] lkdtm: attempting bad refcount_inc() from saturated S: 0000 ES: 0000 CR0: 0000000080050033 # [ 54.715169] CR2: 00007fad264d4000 CR3: 0000000102658000 CR4: 00000000001506f0 # [ 54.722310] Call Trace: # [ 54.724832] lkdtm_REFCOUNT_ADD_ZERO+0x99/0xc1 # [ 54.729321] direct_entry.cold+0x2c/0x38 # [ 55.057353] ------------[ cut here ]------------ [ 54.733352] full_proxy_write+0x56/0x80 # [ 54.737233] vfs_write+0xea/0x3b0 # [ 54.740624] ksys_write+0x68/0xf0 # [ 54.743981] do_syscall_64+0x33/0x40 # [ 54.747623] entry_SYSCALL_64_after_hwframe+0x61/0xc6 # [ 54.752745] RIP: 0033:0x[ 55.084165] refcount_t: saturated; leaking memory. 7fad265e1833 # [ 54.756363] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 # [ 54.775176] RSP: 00[ 55.111173] WARNING: CPU: 0 PID: 2277 at lib/refcount.c:22 refcount_warn_saturate+0x51/0x110 2b:00007ffd4f5b0888 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 # [ 54.782823] RAX: ffffffffffffffda RBX: 0000000000000012 RCX: 00007fad265e1833 # [ 54.790026] RDX: 0000000000000012 RSI: 00007fad264d4000 RDI: 0000000000000001 # [ 54.797235] RBP: 0[ 55.141758] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table 0007fad264d4000 R08: 00007fad264d3010 R09: 0000000000000000 # [ 54.804401] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 # [ 54.811555] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # [ 54.818700] irq event [ 55.189338] CPU: 0 PID: 2277 Comm: cat Tainted: G D W 5.10.173-cip27 #1 stamp: 0 # [ 54.821764] hardirqs last enabled at (0): [<0000000000000000>] 0x0 # [ 54.828026] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 # [ 54.836193] softirqs last enabled at (0): [] copy_pr[ 55.219183] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 ocess+0x664/0x1cb0 # [ 54.844378] softirqs last disabled at (0): [<0000000000000000>] 0x0 # [ 54.850652] ---[ end trace 3c547c3eb0d57e50 ]--- # [ 54.855267] lkdtm: Zero detected: saturated # REFCOUNT_ADD_ZERO: saw 'call trace:': ok ok 51 selftes[ 55.247319] RIP: 0010:refcount_warn_saturate+0x51/0x110 ts: lkdtm: REFCOUNT_ADD_ZERO.sh # selftests: lkdtm: REFCOUNT_INC_SATURATED.sh [ 55.274698] Code: 84 bc 00 00 00 e9 9f 43 c4 00 85 f6 74 46 80 3d 47 0b 94 01 00 75 ee 48 c7 c7 e8 8f 26 8b c6 05 37 0b 94 01 01 e8 fc a0 98 00 <0f> 0b e9 78 43 c4 00 80 3d 23 0b 94 01 00 75 cb 48 c7 c7 10 90 26 [ 55.300338] RSP: 0018:ffffa21441eebe48 EFLAGS: 00010286 [ 55.305615] RAX: 0000000000000000 RBX: 0000000000000035 RCX: 0000000000000000 [ 55.312762] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 [ 55.319911] RBP: ffffffff8b2cefc5 R08: 0000000000000000 R09: 0000000000000000 [ 55.327056] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000017 [ 55.334209] R13: ffffa21441eebf10 R14: ffffa21441eebf10 R15: ffff9608c3323000 [ 55.341359] FS: 00007f18dc72e580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 55.349467] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 55.355220] CR2: 00007f18dc4fc000 CR3: 0000000106090000 CR4: 00000000001506f0 [ 55.362385] Call Trace: [ 55.364854] lkdtm_REFCOUNT_INC_SATURATED+0x3c/0x64 [ 55.369789] direct_entry.cold+0x2c/0x38 [ 55.373761] full_proxy_write+0x56/0x80 [ 55.377678] vfs_write+0xea/0x3b0 [ 55.381046] ksys_write+0x68/0xf0 [ 55.384447] do_syscall_64+0x33/0x40 [ 55.388103] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 55.393238] RIP: 0033:0x7f18dc609833 [ 55.396982] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 55.415807] RSP: 002b:00007fff47038948 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 55.423444] RAX: ffffffffffffffda RBX: 0000000000000017 RCX: 00007f18dc609833 [ 55.430667] RDX: 0000000000000017 RSI: 00007f18dc4fc000 RDI: 0000000000000001 [ 55.437844] RBP: 00007f18dc4fc000 R08: 00007f18dc4fb010 R09: 0000000000000000 [ 55.445090] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 55.452270] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 [ 55.459482] irq event stamp: 0 [ 55.462573] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 55.468845] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 [ 55.477031] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 [ 55.485204] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 55.491466] ---[ end trace 3c547c3eb0d57e51 ]--- [ 55.496081] lkdtm: Saturation detected: still saturated # [ 55.017890] lkdtm: Performing direct entry REFCOUNT_INC_SATURATED # [ 55.029256] lkdtm: attempting bad refcount_inc() from saturated # [ 55.057353] ------------[ cut here ]------------ # [ 55.084165] refcount_t: saturated; leaking memory. # [ 55.111173] WARNING: CPU: 0 PID: 2277 at lib/refcount.c:22 refcount_warn_saturate+0x51/0x110 # [ 55.141758] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table # [ 55.189338] CPU: 0 PID: 2277 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 55.219183] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 55.247319] RIP: 0010:refcount_warn_saturate+0x51/0x110 # [ 55.274698] Code: 84 bc 00 00 00 e9 9f 43 c4 00 85 f6 74 46 80 3d 47 0b 94 01 00 75 ee 48 c7 c7 e8 8f 26 8b c6 05 37 0b 94 01 01 e8 fc a0 98 00 <0f> 0b e9 78 43 c4 00 80 3d 23 0b 94 01 00 75 cb 48 c7 c7 10 90 26 # [ 55.300338] RSP: 0018:ffffa21441eebe48 EFLAGS: 00010286 # [ 55.305615] RAX: 0000000000000000 RBX: 0000000000000035 RCX: 0000000000000000 # [ 55.312762] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 # [ 55.319911] RBP: ffffffff8b2cefc5 R08: 0000000000000000 R09: 0000000000000000 # [ 55.327056] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000017 # [ 55.334209] R13: ffffa21441eebf10 R14: ffffa21441eebf10 R15: ffff9608c3323000 # [ 55.341359] FS: 00007[ 55.664681] lkdtm: Performing direct entry REFCOUNT_DEC_SATURATED f18dc72e580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 55.349467] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 55.355220] CR2: 00007f18dc4fc000 CR3: 0000000106090000 CR4: 00000000001506f0 # [ 55.362385] Call Trace: # [ [ 55.673609] lkdtm: attempting bad refcount_dec() from saturated 55.364854] lkdtm_REFCOUNT_INC_SATURATED+0x3c/0x64 # [ 55.369789] direct_entry.cold+0x2c/0x38 # [ 55.373761] full_proxy_write+0x56/0x80 # [ 55.377678] vfs_write+0xea/0x3b0 # [ 55.381046] ksys_write+0x68/0xf0 # [ 55.384447] do_syscall_64[ 55.701689] ------------[ cut here ]------------ +0x33/0x40 # [ 55.388103] entry_SYSCALL_64_after_hwframe+0x61/0xc6 # [ 55.393238] RIP: 0033:0x7f18dc609833 # [ 55.396982] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 0[ 55.728511] refcount_t: decrement hit 0; leaking memory. 0 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 # [ 55.415807] RSP: 002b:00007fff47038948 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 # [ 55.423444] RAX: ffffffffffffffda RBX: 0000000000000017 RCX: 00007f18dc609833 # [ [ 55.756060] WARNING: CPU: 0 PID: 2312 at lib/refcount.c:31 refcount_warn_saturate+0xfb/0x110 55.430667] RDX: 0000000000000017 RSI: 00007f18dc4fc000 RDI: 0000000000000001 # [ 55.437844] RBP: 00007f18dc4fc000 R08: 00007f18dc4fb010 R09: 0000000000000000 # [ 55.445090] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 # [ 55.4[ 55.786649] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table 52270] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # [ 55.459482] irq event stamp: 0 # [ 55.462573] hardirqs last enabled at (0): [<0000000000000000>] 0x0 # [ 55.468845] hardirqs last disabled at (0): [] co[ 55.834202] CPU: 0 PID: 2312 Comm: cat Tainted: G D W 5.10.173-cip27 #1 py_process+0x664/0x1cb0 # [ 55.477031] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 # [ 55.485204] softirqs last disabled at (0): [<0000000000000000>] 0x0 # [ 55.491466] ---[ end trace 3c547c3eb0d57e51 ]--- # [ [ 55.864087] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 55.496081] lkdtm: Saturation detected: still saturated # REFCOUNT_INC_SATURATED: saw 'Saturation detected: still saturated': ok ok 52 selftests: lkdtm: REFCOUNT_INC_SATURATED.sh # selftests: lkdtm: REFCOUNT_DEC_SATURATED.sh [ 55.892184] RIP: 0010:refcount_warn_saturate+0xfb/0x110 [ 55.917127] Code: 98 90 26 8b c6 05 a3 0a 94 01 01 e8 6c a0 98 00 0f 0b e9 e8 42 c4 00 48 c7 c7 68 90 26 8b c6 05 8a 0a 94 01 01 e8 52 a0 98 00 <0f> 0b e9 ce 42 c4 00 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 8b [ 55.935883] RSP: 0018:ffffa21441f63e48 EFLAGS: 00010286 [ 55.941149] RAX: 0000000000000000 RBX: 0000000000000036 RCX: 0000000000000000 [ 55.948294] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 [ 55.955442] RBP: ffffffff8b2cefdc R08: 0000000000000000 R09: 0000000000000000 [ 55.962590] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000017 [ 55.969740] R13: ffffa21441f63f10 R14: ffffa21441f63f10 R15: ffff9608c53bb000 [ 55.976888] FS: 00007f9cfd2733c0(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 55.984996] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 55.990760] CR2: 00007f9cfd044000 CR3: 000000010602a000 CR4: 00000000001506f0 [ 55.997924] Call Trace: [ 56.000395] lkdtm_REFCOUNT_DEC_SATURATED+0x37/0x5f [ 56.005326] direct_entry.cold+0x2c/0x38 [ 56.009283] full_proxy_write+0x56/0x80 [ 56.013189] vfs_write+0xea/0x3b0 [ 56.016564] ksys_write+0x68/0xf0 [ 56.019988] do_syscall_64+0x33/0x40 [ 56.023620] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 56.028735] RIP: 0033:0x7f9cfd151833 [ 56.032389] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 56.051196] RSP: 002b:00007ffe34c28b88 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 56.058830] RAX: ffffffffffffffda RBX: 0000000000000017 RCX: 00007f9cfd151833 [ 56.066058] RDX: 0000000000000017 RSI: 00007f9cfd044000 RDI: 0000000000000001 [ 56.073250] RBP: 00007f9cfd044000 R08: 00007f9cfd043010 R09: 0000000000000000 [ 56.080446] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 56.087645] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 [ 56.094828] irq event stamp: 0 [ 56.097950] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 56.104246] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 [ 56.112421] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 [ 56.120604] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 56.126868] ---[ end trace 3c547c3eb0d57e52 ]--- [ 56.131484] lkdtm: Saturation detected: still saturated # [ 55.664681] lkdtm: Performing direct entry REFCOUNT_DEC_SATURATED # [ 55.673609] lkdtm: attempting bad refcount_dec() from saturated # [ 55.701689] ------------[ cut here ]------------ # [ 55.728511] refcount_t: decrement hit 0; leaking memory. # [ 55.756060] WARNING: CPU: 0 PID: 2312 at lib/refcount.c:31 refcount_warn_saturate+0xfb/0x110 # [ 55.786649] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table # [ 55.834202] CPU: 0 PID: 2312 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 55.864087] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 55.892184] RIP: 0010:refcount_warn_saturate+0xfb/0x110 # [ 55.917127] Code: 98 90 26 8b c6 05 a3 0a 94 01 01 e8 6c a0 98 00 0f 0b e9 e8 42 c4 00 48 c7 c7 68 90 26 8b c6 05 8a 0a 94 01 01 e8 52 a0 98 00 <0f> 0b e9 ce 42 c4 00 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 8b # [ 55.935883] RSP: 0018:ffffa21441f63e48 EFLAGS: 00010286 # [ 55.941149] RAX: 0000000000000000 RBX: 0000000000000036 RCX: 0000000000000000 # [ 55.948294] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 # [ 55.955442] RBP: ffffffff8b2cefdc R08: 0000000000000000 R09: 0000000000000000 # [ 55.962590] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000017 # [ 55.969740] R13: ffffa21441f63f10 R14: ffffa21441f63f10 R15: ffff9608c53bb000 # [ 55.976888] FS: 00007f[ 56.296703] lkdtm: Performing direct entry REFCOUNT_ADD_SATURATED 9cfd2733c0(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 55.984996] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 55.990760] CR2: 00007f9cfd044000 CR3: 000000010602a000 CR4: 00000000001506f0 # [ 55.997924] Call Trace: # [ 5[ 56.307158] lkdtm: attempting bad refcount_dec() from saturated 6.000395] lkdtm_REFCOUNT_DEC_SATURATED+0x37/0x5f # [ 56.005326] direct_entry.cold+0x2c/0x38 # [ 56.009283] full_proxy_write+0x56/0x80 # [ 56.013189] vfs_write+0xea/0x3b0 # [ 56.016564] ksys_write+0x68/0xf0 # [ 56.019988] do_syscall_64+[ 56.335256] ------------[ cut here ]------------ 0x33/0x40 # [ 56.023620] entry_SYSCALL_64_after_hwframe+0x61/0xc6 # [ 56.028735] RIP: 0033:0x7f9cfd151833 # [ 56.032389] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00[ 56.362065] refcount_t: saturated; leaking memory. 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 # [ 56.051196] RSP: 002b:00007ffe34c28b88 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 # [ 56.058830] RAX: ffffffffffffffda RBX: 0000000000000017 RCX: 00007f9cfd151833 # [ 5[ 56.389072] WARNING: CPU: 0 PID: 2347 at lib/refcount.c:22 refcount_warn_saturate+0x51/0x110 6.066058] RDX: 0000000000000017 RSI: 00007f9cfd044000 RDI: 0000000000000001 # [ 56.073250] RBP: 00007f9cfd044000 R08: 00007f9cfd043010 R09: 0000000000000000 # [ 56.080446] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 # [ 56.08[ 56.419655] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table 7645] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # [ 56.094828] irq event stamp: 0 # [ 56.097950] hardirqs last enabled at (0): [<0000000000000000>] 0x0 # [ 56.104246] hardirqs last disabled at (0): [] cop[ 56.467252] CPU: 0 PID: 2347 Comm: cat Tainted: G D W 5.10.173-cip27 #1 y_process+0x664/0x1cb0 # [ 56.112421] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 # [ 56.120604] softirqs last disabled at (0): [<0000000000000000>] 0x0 # [ 56.126868] ---[ end trace 3c547c3eb0d57e52 ]--- # [ 5[ 56.497087] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 6.131484] lkdtm: Saturation detected: still saturated # REFCOUNT_DEC_SATURATED: saw 'Saturation detected: still saturated': ok ok 53 selftests: lkdtm: REFCOUNT_DEC_SATURATED.sh # selftests: lkdtm: REFCOUNT_ADD_SATURATED.sh [ 56.525224] RIP: 0010:refcount_warn_saturate+0x51/0x110 [ 56.550074] Code: 84 bc 00 00 00 e9 9f 43 c4 00 85 f6 74 46 80 3d 47 0b 94 01 00 75 ee 48 c7 c7 e8 8f 26 8b c6 05 37 0b 94 01 01 e8 fc a0 98 00 <0f> 0b e9 78 43 c4 00 80 3d 23 0b 94 01 00 75 cb 48 c7 c7 10 90 26 [ 56.568849] RSP: 0018:ffffa21441fe3e48 EFLAGS: 00010286 [ 56.574090] RAX: 0000000000000000 RBX: 0000000000000037 RCX: 0000000000000000 [ 56.581246] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 [ 56.588393] RBP: ffffffff8b2ceff3 R08: 0000000000000000 R09: 0000000000000000 [ 56.595543] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000017 [ 56.602690] R13: ffffa21441fe3f10 R14: ffffa21441fe3f10 R15: ffff9608c3350000 [ 56.609842] FS: 00007f1463de0580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 56.617948] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 56.623713] CR2: 00007f1463bac000 CR3: 00000001043a4000 CR4: 00000000001506f0 [ 56.630858] Call Trace: [ 56.633337] lkdtm_REFCOUNT_ADD_SATURATED+0x3c/0x64 [ 56.638232] direct_entry.cold+0x2c/0x38 [ 56.642187] full_proxy_write+0x56/0x80 [ 56.646041] vfs_write+0xea/0x3b0 [ 56.649422] ksys_write+0x68/0xf0 [ 56.652784] do_syscall_64+0x33/0x40 [ 56.656476] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 56.661566] RIP: 0033:0x7f1463cb9833 [ 56.665214] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 56.684043] RSP: 002b:00007ffceba6c948 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 56.691665] RAX: ffffffffffffffda RBX: 0000000000000017 RCX: 00007f1463cb9833 [ 56.698854] RDX: 0000000000000017 RSI: 00007f1463bac000 RDI: 0000000000000001 [ 56.706060] RBP: 00007f1463bac000 R08: 00007f1463bab010 R09: 0000000000000000 [ 56.713231] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 56.720430] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 [ 56.727633] irq event stamp: 0 [ 56.730749] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 56.737080] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 [ 56.745334] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 [ 56.753571] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 56.759863] ---[ end trace 3c547c3eb0d57e53 ]--- [ 56.764475] lkdtm: Saturation detected: still saturated # [ 56.296703] lkdtm: Performing direct entry REFCOUNT_ADD_SATURATED # [ 56.307158] lkdtm: attempting bad refcount_dec() from saturated # [ 56.335256] ------------[ cut here ]------------ # [ 56.362065] refcount_t: saturated; leaking memory. # [ 56.389072] WARNING: CPU: 0 PID: 2347 at lib/refcount.c:22 refcount_warn_saturate+0x51/0x110 # [ 56.419655] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table # [ 56.467252] CPU: 0 PID: 2347 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 56.497087] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 56.525224] RIP: 0010:refcount_warn_saturate+0x51/0x110 # [ 56.550074] Code: 84 bc 00 00 00 e9 9f 43 c4 00 85 f6 74 46 80 3d 47 0b 94 01 00 75 ee 48 c7 c7 e8 8f 26 8b c6 05 37 0b 94 01 01 e8 fc a0 98 00 <0f> 0b e9 78 43 c4 00 80 3d 23 0b 94 01 00 75 cb 48 c7 c7 10 90 26 # [ 56.568849] RSP: 0018:ffffa21441fe3e48 EFLAGS: 00010286 # [ 56.574090] RAX: 0000000000000000 RBX: 0000000000000037 RCX: 0000000000000000 # [ 56.581246] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 # [ 56.588393] RBP: ffffffff8b2ceff3 R08: 0000000000000000 R09: 0000000000000000 # [ 56.595543] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000017 # [ 56.602690] R13: ffffa21441fe3f10 R14: ffffa21441fe3f10 R15: ffff9608c3350000 # [ 56.609842] FS: 00007f1463de05[ 56.927151] lkdtm: Performing direct entry REFCOUNT_INC_NOT_ZERO_SATURATED 80(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 56.617948] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 56.623713] CR2: 00007f1463bac000 CR3: 00000001043a4000 CR4: 00000000001506f0 # [ 56.630858] Call Trace: # [ 56.633337[ 56.944209] lkdtm: attempting bad refcount_inc_not_zero() from saturated ] lkdtm_REFCOUNT_ADD_SATURATED+0x3c/0x64 # [ 56.638232] direct_entry.cold+0x2c/0x38 # [ 56.642187] full_proxy_write+0x56/0x80 # [ 56.646041] vfs_write+0xea/0x3b0 # [ 56.649422] ksys_write+0x68/0xf0 # [ 56.652784] do_syscall_64+0x33/0x4[ 56.973093] ------------[ cut here ]------------ 0 # [ 56.656476] entry_SYSCALL_64_after_hwframe+0x61/0xc6 # [ 56.661566] RIP: 0033:0x7f1463cb9833 # [ 56.665214] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <[ 56.999884] refcount_t: saturated; leaking memory. 48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 # [ 56.684043] RSP: 002b:00007ffceba6c948 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 # [ 56.691665] RAX: ffffffffffffffda RBX: 0000000000000017 RCX: 00007f1463cb9833 # [ 56.698854[ 57.026880] WARNING: CPU: 0 PID: 2379 at lib/refcount.c:19 refcount_warn_saturate+0x97/0x110 ] RDX: 0000000000000017 RSI: 00007f1463bac000 RDI: 0000000000000001 # [ 56.706060] RBP: 00007f1463bac000 R08: 00007f1463bab010 R09: 0000000000000000 # [ 56.713231] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 # [ 56.720430] R1[ 57.057481] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table 3: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # [ 56.727633] irq event stamp: 0 # [ 56.730749] hardirqs last enabled at (0): [<0000000000000000>] 0x0 # [ 56.737080] hardirqs last disabled at (0): [] copy_proces[ 57.105069] CPU: 0 PID: 2379 Comm: cat Tainted: G D W 5.10.173-cip27 #1 s+0x664/0x1cb0 # [ 56.745334] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 # [ 56.753571] softirqs last disabled at (0): [<0000000000000000>] 0x0 # [ 56.759863] ---[ end trace 3c547c3eb0d57e53 ]--- # [ 56.764475[ 57.134912] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 ] lkdtm: Saturation detected: still saturated # REFCOUNT_ADD_SATURATED: saw 'Saturation detected: still saturated': ok ok 54 selftests: lkdtm: REFCOUNT_ADD_SATURATED.sh # selftests: lkdtm: REFCOUNT_INC_NOT_ZERO_SATURATED.sh [ 57.163045] RIP: 0010:refcount_warn_saturate+0x97/0x110 [ 57.187984] Code: 01 01 e8 d9 a0 98 00 0f 0b e9 55 43 c4 00 80 3d 02 0b 94 01 00 75 a8 48 c7 c7 e8 8f 26 8b c6 05 f2 0a 94 01 01 e8 b6 a0 98 00 <0f> 0b e9 32 43 c4 00 80 3d dc 0a 94 01 00 75 85 48 c7 c7 40 90 26 [ 57.206751] RSP: 0018:ffffa2144405fe38 EFLAGS: 00010282 [ 57.212001] RAX: 0000000000000000 RBX: 00000000c0000000 RCX: 0000000000000000 [ 57.219147] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 [ 57.226304] RBP: ffffffff8b2cec20 R08: 0000000000000000 R09: 0000000000000000 [ 57.233447] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000020 [ 57.240599] R13: ffffa2144405ff10 R14: ffffa2144405ff10 R15: ffff9608c30d6000 [ 57.247750] FS: 00007fc44f680580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 57.255859] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 57.261617] CR2: 00007fc44f44c000 CR3: 0000000103714000 CR4: 00000000001506f0 [ 57.268768] Call Trace: [ 57.271244] __refcount_add_not_zero.constprop.0+0x2a/0x35 [ 57.276755] lkdtm_REFCOUNT_INC_NOT_ZERO_SATURATED+0x3e/0x76 [ 57.282429] direct_entry.cold+0x2c/0x38 [ 57.286381] full_proxy_write+0x56/0x80 [ 57.290236] vfs_write+0xea/0x3b0 [ 57.293614] ksys_write+0x68/0xf0 [ 57.296983] do_syscall_64+0x33/0x40 [ 57.300627] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 57.305731] RIP: 0033:0x7fc44f559833 [ 57.309385] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 57.328167] RSP: 002b:00007ffce7b1f4b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 57.335795] RAX: ffffffffffffffda RBX: 0000000000000020 RCX: 00007fc44f559833 [ 57.342969] RDX: 0000000000000020 RSI: 00007fc44f44c000 RDI: 0000000000000001 [ 57.350204] RBP: 00007fc44f44c000 R08: 00007fc44f44b010 R09: 0000000000000000 [ 57.357371] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 57.364560] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 [ 57.371738] irq event stamp: 0 [ 57.374882] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 57.381197] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 [ 57.389448] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 [ 57.397687] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 57.404046] ---[ end trace 3c547c3eb0d57e54 ]--- [ 57.408695] lkdtm: Saturation detected: still saturated # [ 56.927151] lkdtm: Performing direct entry REFCOUNT_INC_NOT_ZERO_SATURATED # [ 56.944209] lkdtm: attempting bad refcount_inc_not_zero() from saturated # [ 56.973093] ------------[ cut here ]------------ # [ 56.999884] refcount_t: saturated; leaking memory. # [ 57.026880] WARNING: CPU: 0 PID: 2379 at lib/refcount.c:19 refcount_warn_saturate+0x97/0x110 # [ 57.057481] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table # [ 57.105069] CPU: 0 PID: 2379 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 57.134912] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 57.163045] RIP: 0010:refcount_warn_saturate+0x97/0x110 # [ 57.187984] Code: 01 01 e8 d9 a0 98 00 0f 0b e9 55 43 c4 00 80 3d 02 0b 94 01 00 75 a8 48 c7 c7 e8 8f 26 8b c6 05 f2 0a 94 01 01 e8 b6 a0 98 00 <0f> 0b e9 32 43 c4 00 80 3d dc 0a 94 01 00 75 85 48 c7 c7 40 90 26 # [ 57.206751] RSP: 0018:ffffa2144405fe38 EFLAGS: 00010282 # [ 57.212001] RAX: 0000000000000000 RBX: 00000000c0000000 RCX: 0000000000000000 # [ 57.219147] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 # [ 57.226304] RBP: ffffffff8b2cec20 R08: 0000000000000000 R09: 0000000000000000 # [ 57.233447] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000020 # [ 57.240599] R13: ffffa2144405ff10 R14: ffffa2144405ff10 R15: ffff9608c30d6000 # [ 57.247750] FS: 00007[ 57.564700] lkdtm: Performing direct entry REFCOUNT_ADD_NOT_ZERO_SATURATED fc44f680580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 57.255859] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 57.261617] CR2: 00007fc44f44c000 CR3: 0000000103714000 CR4: 00000000001506f0 # [ 57.268768] Call Trace: # [ [ 57.590956] lkdtm: attempting bad refcount_add_not_zero() from saturated 57.271244] __refcount_add_not_zero.constprop.0+0x2a/0x35 # [ 57.276755] lkdtm_REFCOUNT_INC_NOT_ZERO_SATURATED+0x3e/0x76 # [ 57.282429] direct_entry.cold+0x2c/0x38 # [ 57.286381] full_proxy_write+0x56/0x80 # [ 57.290236] vfs_write+0xea/0x3b[ 57.619839] ------------[ cut here ]------------ 0 # [ 57.293614] ksys_write+0x68/0xf0 # [ 57.296983] do_syscall_64+0x33/0x40 # [ 57.300627] entry_SYSCALL_64_after_hwframe+0x61/0xc6 # [ 57.305731] RIP: 0033:0x7fc44f559833 # [ 57.309385] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff[ 57.646629] refcount_t: saturated; leaking memory. ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 # [ 57.328167] RSP: 002b:00007ffce7b1f4b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 # [ 57.335795][ 57.673621] WARNING: CPU: 0 PID: 2411 at lib/refcount.c:19 refcount_warn_saturate+0x97/0x110 RAX: ffffffffffffffda RBX: 0000000000000020 RCX: 00007fc44f559833 # [ 57.342969] RDX: 0000000000000020 RSI: 00007fc44f44c000 RDI: 0000000000000001 # [ 57.350204] RBP: 00007fc44f44c000 R08: 00007fc44f44b010 R09: 0000000000000000 # [ 57.357371] R10[ 57.704224] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table : fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 # [ 57.364560] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # [ 57.371738] irq event stamp: 0 # [ 57.374882] hardirqs last enabled at (0): [<0000000000000000>] 0x[ 57.751808] CPU: 0 PID: 2411 Comm: cat Tainted: G D W 5.10.173-cip27 #1 0 # [ 57.381197] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 # [ 57.389448] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 # [ 57.397687] softirqs last disabled at (0): [<00000000000[ 57.781653] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 00000>] 0x0 # [ 57.404046] ---[ end trace 3c547c3eb0d57e54 ]--- # [ 57.408695] lkdtm: Saturation detected: still saturated # REFCOUNT_INC_NOT_ZERO_SATURATED: saw 'call trace:': ok ok 55 selftests: lkdtm: REFCOUNT_INC_NOT_ZERO_SATURATED.sh # selfte[ 57.809782] RIP: 0010:refcount_warn_saturate+0x97/0x110 sts: lkdtm: REFCOUNT_ADD_NOT_ZERO_SATURATED.sh [ 57.837146] Code: 01 01 e8 d9 a0 98 00 0f 0b e9 55 43 c4 00 80 3d 02 0b 94 01 00 75 a8 48 c7 c7 e8 8f 26 8b c6 05 f2 0a 94 01 01 e8 b6 a0 98 00 <0f> 0b e9 32 43 c4 00 80 3d dc 0a 94 01 00 75 85 48 c7 c7 40 90 26 [ 57.860064] RSP: 0018:ffffa214440d7e38 EFLAGS: 00010282 [ 57.865309] RAX: 0000000000000000 RBX: 00000000c0000000 RCX: 0000000000000000 [ 57.872466] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 [ 57.879607] RBP: ffffffff8b2cec40 R08: 0000000000000000 R09: 0000000000000000 [ 57.886766] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000020 [ 57.893908] R13: ffffa214440d7f10 R14: ffffa214440d7f10 R15: ffff9608c3b16000 [ 57.901076] FS: 00007fe9037f0580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 57.909172] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 57.914952] CR2: 00007fe9035bc000 CR3: 0000000106090000 CR4: 00000000001506f0 [ 57.922100] Call Trace: [ 57.924588] __refcount_add_not_zero.constprop.0+0x2a/0x35 [ 57.930089] lkdtm_REFCOUNT_ADD_NOT_ZERO_SATURATED+0x3e/0x76 [ 57.935811] direct_entry.cold+0x2c/0x38 [ 57.939850] full_proxy_write+0x56/0x80 [ 57.943727] vfs_write+0xea/0x3b0 [ 57.947103] ksys_write+0x68/0xf0 [ 57.950476] do_syscall_64+0x33/0x40 [ 57.954135] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 57.959237] RIP: 0033:0x7fe9036c9833 [ 57.962934] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 57.981756] RSP: 002b:00007ffce05ae948 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 57.989447] RAX: ffffffffffffffda RBX: 0000000000000020 RCX: 00007fe9036c9833 [ 57.996621] RDX: 0000000000000020 RSI: 00007fe9035bc000 RDI: 0000000000000001 [ 58.003834] RBP: 00007fe9035bc000 R08: 00007fe9035bb010 R09: 0000000000000000 [ 58.011008] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 58.018178] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 [ 58.025339] irq event stamp: 0 [ 58.028415] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 58.034686] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 [ 58.042851] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 [ 58.051018] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 58.057295] ---[ end trace 3c547c3eb0d57e55 ]--- [ 58.061914] lkdtm: Saturation detected: still saturated # [ 57.564700] lkdtm: Performing direct entry REFCOUNT_ADD_NOT_ZERO_SATURATED # [ 57.590956] lkdtm: attempting bad refcount_add_not_zero() from saturated # [ 57.619839] ------------[ cut here ]------------ # [ 57.646629] refcount_t: saturated; leaking memory. # [ 57.673621] WARNING: CPU: 0 PID: 2411 at lib/refcount.c:19 refcount_warn_saturate+0x97/0x110 # [ 57.704224] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table # [ 57.751808] CPU: 0 PID: 2411 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 57.781653] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 57.809782] RIP: 0010:refcount_warn_saturate+0x97/0x110 # [ 57.837146] Code: 01 01 e8 d9 a0 98 00 0f 0b e9 55 43 c4 00 80 3d 02 0b 94 01 00 75 a8 48 c7 c7 e8 8f 26 8b c6 05 f2 0a 94 01 01 e8 b6 a0 98 00 <0f> 0b e9 32 43 c4 00 80 3d dc 0a 94 01 00 75 85 48 c7 c7 40 90 26 # [ 57.860064] RSP: 0018:ffffa214440d7e38 EFLAGS: 00010282 # [ 57.865309] RAX: 0000000000000000 RBX: 00000000c0000000 RCX: 0000000000000000 # [ 57.872466] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 # [ 57.879607] RBP: ffffffff8b2cec40 R08: 0000000000000000 R09: 0000000000000000 # [ 57.886766] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000020 # [ 57.893908] R13: ffffa214440d7f10 R14: ffffa214440d7f10 R15: ffff9608c3b16000 # [ 57.901076] FS: 00007fe9037f0580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 57.909172] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 57.914952] CR2: 00007fe9035bc000 CR3: 0000000106090000 CR4: 00000000001506f0 # [ 57.922100] Call T[ 58.234579] lkdtm: Performing direct entry REFCOUNT_DEC_AND_TEST_SATURATED race: # [ 57.924588] __refcount_add_not_zero.constprop.0+0x2a/0x35 # [ 57.930089] lkdtm_REFCOUNT_ADD_NOT_ZERO_SATURATED+0x3e/0x76 # [ 57.935811] direct_entry.cold+0x2c/0x38 # [ 57.939850] full_proxy_write+0x56/0x80 # [ 57.943727] vfs_wr[ 58.260770] lkdtm: attempting bad refcount_dec_and_test() from saturated ite+0xea/0x3b0 # [ 57.947103] ksys_write+0x68/0xf0 # [ 57.950476] do_syscall_64+0x33/0x40 # [ 57.954135] entry_SYSCALL_64_after_hwframe+0x61/0xc6 # [ 57.959237] RIP: 0033:0x7fe9036c9833 # [ 57.962934] Code: 8b 15 61 26 0e 00 f7 d8 64 89 0[ 58.289646] ------------[ cut here ]------------ 2 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 # [ 57.981756] RSP: 002b:00007ffce05ae948 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 # [[ 58.316436] refcount_t: underflow; use-after-free. 57.989447] RAX: ffffffffffffffda RBX: 0000000000000020 RCX: 00007fe9036c9833 # [ 57.996621] RDX: 0000000000000020 RSI: 00007fe9035bc000 RDI: 0000000000000001 # [ 58.003834] RBP: 00007fe9035bc000 R08: 00007fe9035bb010 R09: 0000000000000000 # [ 5[ 58.343480] WARNING: CPU: 0 PID: 2446 at lib/refcount.c:28 refcount_warn_saturate+0xba/0x110 8.011008] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 # [ 58.018178] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # [ 58.025339] irq event stamp: 0 # [ 58.028415] hardirqs last enabled at (0): [<00000000[ 58.374005] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table 00000000>] 0x0 # [ 58.034686] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 # [ 58.042851] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 # [ 58.051018] softirqs last disabled at (0): [ 58.421601] CPU: 0 PID: 2446 Comm: cat Tainted: G D W 5.10.173-cip27 #1 [<0000000000000000>] 0x0 # [ 58.057295] ---[ end trace 3c547c3eb0d57e55 ]--- # [ 58.061914] lkdtm: Saturation detected: still saturated # REFCOUNT_ADD_NOT_ZERO_SATURATED: saw 'call trace:': ok ok 56 selftests: lkdtm: REFCOUNT_ADD_NOT_ZERO_SATURATED[ 58.451440] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 .sh # selftests: lkdtm: REFCOUNT_DEC_AND_TEST_SATURATED.sh [ 58.479573] RIP: 0010:refcount_warn_saturate+0xba/0x110 [ 58.490067] Code: 01 01 e8 b6 a0 98 00 0f 0b e9 32 43 c4 00 80 3d dc 0a 94 01 00 75 85 48 c7 c7 40 90 26 8b c6 05 cc 0a 94 01 01 e8 93 a0 98 00 <0f> 0b e9 0f 43 c4 00 80 3d b7 0a 94 01 00 0f 85 5e ff ff ff 48 c7 [ 58.508877] RSP: 0018:ffffa2144414fe40 EFLAGS: 00010286 [ 58.514146] RAX: 0000000000000000 RBX: 000000000000003a RCX: 0000000000000000 [ 58.521321] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 [ 58.528466] RBP: ffffffff8b2cec60 R08: 0000000000000000 R09: 0000000000000000 [ 58.535620] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000020 [ 58.542764] R13: ffffa2144414ff10 R14: ffffa2144414ff10 R15: ffff9608c3338000 [ 58.549950] FS: 00007f6e2725c580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 58.558076] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 58.563876] CR2: 00007f6e2705c000 CR3: 00000001046ea000 CR4: 00000000001506f0 [ 58.571103] Call Trace: [ 58.573613] __refcount_sub_and_test.constprop.0+0x3c/0x50 [ 58.579137] lkdtm_REFCOUNT_DEC_AND_TEST_SATURATED+0x3e/0x76 [ 58.584897] direct_entry.cold+0x2c/0x38 [ 58.588874] full_proxy_write+0x56/0x80 [ 58.592776] vfs_write+0xea/0x3b0 [ 58.596136] ksys_write+0x68/0xf0 [ 58.599523] do_syscall_64+0x33/0x40 [ 58.603141] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 58.608280] RIP: 0033:0x7f6e27169833 [ 58.611898] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 58.630715] RSP: 002b:00007ffc3751d048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 58.638379] RAX: ffffffffffffffda RBX: 0000000000000020 RCX: 00007f6e27169833 [ 58.645552] RDX: 0000000000000020 RSI: 00007f6e2705c000 RDI: 0000000000000001 [ 58.652702] RBP: 00007f6e2705c000 R08: 00007f6e2705b010 R09: 0000000000000000 [ 58.659855] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 58.666992] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 [ 58.674123] irq event stamp: 0 [ 58.677178] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 58.683439] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 [ 58.691604] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 [ 58.699789] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 58.706055] ---[ end trace 3c547c3eb0d57e56 ]--- [ 58.710670] lkdtm: Saturation detected: still saturated # [ 58.234579] lkdtm: Performing direct entry REFCOUNT_DEC_AND_TEST_SATURATED # [ 58.260770] lkdtm: attempting bad refcount_dec_and_test() from saturated # [ 58.289646] ------------[ cut here ]------------ # [ 58.316436] refcount_t: underflow; use-after-free. # [ 58.343480] WARNING: CPU: 0 PID: 2446 at lib/refcount.c:28 refcount_warn_saturate+0xba/0x110 # [ 58.374005] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table # [ 58.421601] CPU: 0 PID: 2446 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 58.451440] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 58.479573] RIP: 0010:refcount_warn_saturate+0xba/0x110 # [ 58.490067] Code: 01 01 e8 b6 a0 98 00 0f 0b e9 32 43 c4 00 80 3d dc 0a 94 01 00 75 85 48 c7 c7 40 90 26 8b c6 05 cc 0a 94 01 01 e8 93 a0 98 00 <0f> 0b e9 0f 43 c4 00 80 3d b7 0a 94 01 00 0f 85 5e ff ff ff 48 c7 # [ 58.508877] RSP: 0018:ffffa2144414fe40 EFLAGS: 00010286 # [ 58.514146] RAX: 0000000000000000 RBX: 000000000000003a RCX: 0000000000000000 # [ 58.521321] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 # [ 58.528466] RBP: ffffffff8b2cec60 R08: 0000000000000000 R09: 0000000000000000 # [ 58.535620] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000020 # [ 58.542764] R13: ffffa2144414ff10 R14: ffffa2144414ff10 R15: ffff9608c3338000 # [ 58.5499[ 58.870984] lkdtm: Performing direct entry REFCOUNT_SUB_AND_TEST_SATURATED 50] FS: 00007f6e2725c580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 58.558076] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 58.563876] CR2: 00007f6e2705c000 CR3: 00000001046ea000 CR4: 00000000001506f0 # [ 58.571103] Call [ 58.887390] lkdtm: attempting bad refcount_sub_and_test() from saturated Trace: # [ 58.573613] __refcount_sub_and_test.constprop.0+0x3c/0x50 # [ 58.579137] lkdtm_REFCOUNT_DEC_AND_TEST_SATURATED+0x3e/0x76 # [ 58.584897] direct_entry.cold+0x2c/0x38 # [ 58.588874] full_proxy_write+0x56/0x80 # [ 58.592776] vfs_w[ 58.916270] ------------[ cut here ]------------ rite+0xea/0x3b0 # [ 58.596136] ksys_write+0x68/0xf0 # [ 58.599523] do_syscall_64+0x33/0x40 # [ 58.603141] entry_SYSCALL_64_after_hwframe+0x61/0xc6 # [ 58.608280] RIP: 0033:0x7f6e27169833 # [ 58.611898] Code: 8b 15 61 26 0e 00 f7 d8 64 89 [ 58.943068] refcount_t: underflow; use-after-free. 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 # [ 58.630715] RSP: 002b:00007ffc3751d048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 # [ 58.970073] WARNING: CPU: 0 PID: 2481 at lib/refcount.c:28 refcount_warn_saturate+0xba/0x110 [ 58.638379] RAX: ffffffffffffffda RBX: 0000000000000020 RCX: 00007f6e27169833 # [ 58.645552] RDX: 0000000000000020 RSI: 00007f6e2705c000 RDI: 0000000000000001 # [ 58.652702] RBP: 00007f6e2705c000 R08: 00007f6e2705b010 R09: 0000000000000000 # [ [ 59.000665] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table 58.659855] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 # [ 58.666992] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # [ 58.674123] irq event stamp: 0 # [ 58.677178] hardirqs last enabled at (0): [<0000000[ 59.048256] CPU: 0 PID: 2481 Comm: cat Tainted: G D W 5.10.173-cip27 #1 000000000>] 0x0 # [ 58.683439] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 # [ 58.691604] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 # [ 58.699789] softirqs last disabled at (0):[ 59.078096] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 [<0000000000000000>] 0x0 # [ 58.706055] ---[ end trace 3c547c3eb0d57e56 ]--- # [ 58.710670] lkdtm: Saturation detected: still saturated # REFCOUNT_DEC_AND_TEST_SATURATED: saw 'Saturation detected: still saturated': ok ok 57 selftests: lkdtm: REFCO[ 59.106232] RIP: 0010:refcount_warn_saturate+0xba/0x110 UNT_DEC_AND_TEST_SATURATED.sh # selftests: lkdtm: REFCOUNT_SUB_AND_TEST_SATURATED.sh [ 59.133611] Code: 01 01 e8 b6 a0 98 00 0f 0b e9 32 43 c4 00 80 3d dc 0a 94 01 00 75 85 48 c7 c7 40 90 26 8b c6 05 cc 0a 94 01 01 e8 93 a0 98 00 <0f> 0b e9 0f 43 c4 00 80 3d b7 0a 94 01 00 0f 85 5e ff ff ff 48 c7 [ 59.159859] RSP: 0018:ffffa214441cfe40 EFLAGS: 00010286 [ 59.165112] RAX: 0000000000000000 RBX: 000000000000003b RCX: 0000000000000000 [ 59.172253] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 [ 59.179428] RBP: ffffffff8b2cec80 R08: 0000000000000000 R09: 0000000000000000 [ 59.186573] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000020 [ 59.193727] R13: ffffa214441cff10 R14: ffffa214441cff10 R15: ffff9608c331a000 [ 59.200875] FS: 00007f8220097580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 [ 59.209001] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 59.214757] CR2: 00007f821fe64000 CR3: 0000000105520000 CR4: 00000000001506f0 [ 59.221961] Call Trace: [ 59.224486] __refcount_sub_and_test.constprop.0+0x3c/0x50 [ 59.230086] lkdtm_REFCOUNT_SUB_AND_TEST_SATURATED+0x3e/0x76 [ 59.235785] direct_entry.cold+0x2c/0x38 [ 59.239773] full_proxy_write+0x56/0x80 [ 59.243663] vfs_write+0xea/0x3b0 [ 59.247042] ksys_write+0x68/0xf0 [ 59.250436] do_syscall_64+0x33/0x40 [ 59.254127] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 59.259234] RIP: 0033:0x7f821ff71833 [ 59.262941] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 59.281751] RSP: 002b:00007ffc9de8bdb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 59.289388] RAX: ffffffffffffffda RBX: 0000000000000020 RCX: 00007f821ff71833 [ 59.296614] RDX: 0000000000000020 RSI: 00007f821fe64000 RDI: 0000000000000001 [ 59.303810] RBP: 00007f821fe64000 R08: 00007f821fe63010 R09: 0000000000000000 [ 59.310970] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 59.318107] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 [ 59.325238] irq event stamp: 0 [ 59.328292] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 59.334554] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 [ 59.342721] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 [ 59.350906] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 59.357170] ---[ end trace 3c547c3eb0d57e57 ]--- [ 59.361785] lkdtm: Saturation detected: still saturated # [ 58.870984] lkdtm: Performing direct entry REFCOUNT_SUB_AND_TEST_SATURATED # [ 58.887390] lkdtm: attempting bad refcount_sub_and_test() from saturated # [ 58.916270] ------------[ cut here ]------------ # [ 58.943068] refcount_t: underflow; use-after-free. # [ 58.970073] WARNING: CPU: 0 PID: 2481 at lib/refcount.c:28 refcount_warn_saturate+0xba/0x110 # [ 59.000665] Modules linked in: fuse ip_tables cros_ec_sysfs cros_ec_chardev cros_ec_debugfs cros_ec_lightbar cros_usbpd_logger cros_usbpd_charger gsmi uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 cros_ec_dev videobuf2_common cros_usbpd_notify chromeos_pstore coreboot_table # [ 59.048256] CPU: 0 PID: 2481 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 59.078096] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 59.106232] RIP: 0010:refcount_warn_saturate+0xba/0x110 # [ 59.133611] Code: 01 01 e8 b6 a0 98 00 0f 0b e9 32 43 c4 00 80 3d dc 0a 94 01 00 75 85 48 c7 c7 40 90 26 8b c6 05 cc 0a 94 01 01 e8 93 a0 98 00 <0f> 0b e9 0f 43 c4 00 80 3d b7 0a 94 01 00 0f 85 5e ff ff ff 48 c7 # [ 59.159859] RSP: 0018:ffffa214441cfe40 EFLAGS: 00010286 # [ 59.165112] RAX: 0000000000000000 RBX: 000000000000003b RCX: 0000000000000000 # [ 59.172253] RDX: ffff9608eac2c660 RSI: ffff9608eac1bf70 RDI: ffff9608eac1bf70 # [ 59.179428] RBP: ffffffff8b2cec80 R08: 0000000000000000 R09: 0000000000000000 # [ 59.186573] R10: 00000000ffffe000 R11: 3fffffffffffffff R12: 0000000000000020 # [ 59.193727] R13: ffffa214441cff10 R14: ffffa214441cff10 R15: ffff9608c331a000 # [ 59.200875] FS: 00007f8220097580(0000) GS:ffff9608eac00000(0000) knlGS:0000000000000000 # [ 59.209001] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 # [ 59.214757] CR2: 00007f821fe64000 CR3: 0000000105520000 CR4: 00000000001506f0 # [ 59.221961] Call Trace: # [ 59.224486] __refcount_sub_and_test.constprop.0+0x3c/0x50 # [ 59.230086] lkdtm_REFCOUNT_SUB_AND_TEST_SATURATED+0x3e/0x76 # [ 59.235785] direct_entry.cold+0x2c/0x38 # [ 59.239773] full_proxy_write+0x56/0x80 # [ 59.243663] vfs_write+0xea/0x3b0 # [ 59.247042] ksys_write+0x68/0xf0 # [ 59.250436] do_syscall_64+0x33/0x40 # [ 59.254127] entry_SYSCALL_64_after_hwframe+0x61/0xc6 # [ 59.259234] RIP: 0033:0x7f821ff71833 # [ 59.262941] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 # [ 59.281751] RSP: 002b:00007ffc9de8bdb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 # [ 59.289388] RAX: ffffffffffffffda RBX: 0000000000000020 RCX: 00007f821ff71833 # [ 59.296614] RDX: 0000000000000020 RSI: 00007f821fe64000 RDI: 0000000000000001 # [ 59.303810] RBP: 00007f821fe64000 R08: 00007f821fe63010 R09: 0000000000000000 # [ 59.310970] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 # [ 59.318107] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # [ 59.325238] irq event stamp: 0 # [ 59.328292] hardirqs last enabled at (0): [<0000000000000000>] 0x0 # [ 59.334554] hardirqs last disabled at (0): [] copy_process+0x664/0x1cb0 # [ 59.342721] softirqs last enabled at (0): [] copy_process+0x664/0x1cb0 # [ 59.350906] softirqs last disabled at (0[ 59.667580] lkdtm: Performing direct entry USERCOPY_HEAP_SIZE_TO ): [<0000000000000000>] 0x0 # [ 59.357170] ---[ end trace 3c547c3eb0d57e57 ]--- # [ 59.361785] lkdtm: Saturation detected: still saturated # REFCOUNT_SUB_AND_TEST_SATURATED: saw 'Saturation detected: still saturated': ok ok 58 selftests: lkdtm: REF[ 59.694621] lkdtm: attempting good copy_to_user of correct size COUNT_SUB_AND_TEST_SATURATED.sh # selftests: lkdtm: REFCOUNT_TIMING.sh # Skipping REFCOUNT_TIMING: timing only ok 59 selftests: lkdtm: REFCOUNT_TIMING.sh # SKIP # selftests: lkdtm: ATOMIC_TIMING.sh # Skipping ATOMIC_TIMING: timing only ok 60 selftest[ 59.722719] lkdtm: attempting bad copy_to_user of too large size s: lkdtm: ATOMIC_TIMING.sh # SKIP # selftests: lkdtm: USERCOPY_HEAP_SIZE_TO.sh # [ 59.667580] lkdtm: Performing direct entry USERCOPY_HEAP_SIZE_TO # [ 59.694621] lkdtm: attempting good copy_to_user of correct size # [ 59.722719] lkdtm: attempting bad copy_to_user of too large size # USERCOPY_HEAP_SIZE_TO: missing 'call trace:': [FAIL] not ok 61 selftests: lkdtm: USERCOPY_HEAP_SIZE_TO.sh # exit=1 # selftests: lkdtm: USERCOPY_HEAP_SIZE_FROM.sh [ 59.954899] lkdtm: Performing direct entry USERCOPY_HEAP_SIZE_FROM [ 59.961097] lkdtm: attempting good copy_from_user of correct size [ 59.967228] lkdtm: attempting bad copy_from_user of too large size # [ 59.954899] lkdtm: Performing direct entry USERCOPY_HEAP_SIZE_FROM # [ 59.961097] lkdtm: attempting good copy_from_user of correct size # [ 59.967228] lkdtm: attempting bad copy_from_user of too large size # USERCOPY_HEAP_SIZE_FROM: missing 'call trace:': [FAIL] not ok 62 selftests: lkdtm: USERCOPY_HEAP_SIZE_FROM.sh # exit=1 # selftests: lkdtm: USERCOPY_HEAP_WHITELIST_TO.sh [ 60.137349] lkdtm: Performing direct entry USERCOPY_HEAP_WHITELIST_TO [ 60.143800] lkdtm: attempting good copy_to_user inside whitelist [ 60.149840] lkdtm: attempting bad copy_to_user outside whitelist # [ 60.137349] lkdtm: Performing direct entry USERCOPY_HEAP_WHITELIST_TO # [ 60.143800] lkdtm: attempting good copy_to_user inside whitelist # [ 60.149840] lkdtm: attempting bad copy_to_user outside whitelist # USERCOPY_HEAP_WHITELIST_TO: missing 'call trace:': [FAIL] not ok 63 selftests: lkdtm: USERCOPY_HEAP_WHITELIST_TO.sh # exit=1 # selftests: lkdtm: USERCOPY_HEAP_WHITELIST_FROM.sh [ 60.321724] lkdtm: Performing direct entry USERCOPY_HEAP_WHITELIST_FROM [ 60.328381] lkdtm: attempting good copy_from_user inside whitelist [ 60.334595] lkdtm: attempting bad copy_from_user outside whitelist # [ 60.321724] lkdtm: Performing direct entry USERCOPY_HEAP_WHITELIST_FROM # [ 60.328381] lkdtm: attempting good copy_from_user inside whitelist # [ 60.334595] lkdtm: attempting bad copy_from_user outside whitelist # USERCOPY_HEAP_WHITELIST_FROM: missing 'call trace:': [FAIL] not ok 64 selftests: lkdtm: USERCOPY_HEAP_WHITELIST_FROM.sh # exit=1 # selftests: lkdtm: USERCOPY_STACK_FRAME_TO.sh [ 60.506520] lkdtm: Performing direct entry USERCOPY_STACK_FRAME_TO [ 60.512707] lkdtm: good_stack: ffffa21444537e20-ffffa21444537e40 [ 60.518773] lkdtm: bad_stack : ffffa21444537da8-ffffa21444537dc8 [ 60.524790] lkdtm: attempting good copy_to_user of local stack [ 60.530626] lkdtm: attempting bad copy_to_user of distant stack # [ 60.506520] lkdtm: Performing direct entry USERCOPY_STACK_FRAME_TO # [ 60.512707] lkdtm: good_stack: ffffa21444537e20-ffffa21444537e40 # [ 60.518773] lkdtm: bad_stack : ffffa21444537da8-ffffa21444537dc8 # [ 60.524790] lkdtm: attempting good copy_to_user of local stack # [ 60.530626] lkdtm: attempting bad copy_to_user of distant stack # USERCOPY_STACK_FRAME_TO: missing 'call trace:': [FAIL] not ok 65 selftests: lkdtm: USERCOPY_STACK_FRAME_TO.sh # exit=1 # selftests: lkdtm: USERCOPY_STACK_FRAME_FROM.sh [ 60.701009] lkdtm: Performing direct entry USERCOPY_STACK_FRAME_FROM [ 60.707375] lkdtm: good_stack: ffffa214445c7e20-ffffa214445c7e40 [ 60.713426] lkdtm: bad_stack : ffffa214445c7da8-ffffa214445c7dc8 [ 60.719576] lkdtm: attempting good copy_from_user of local stack [ 60.725743] lkdtm: attempting bad copy_from_user of distant stack # [ 60.701009] lkdtm: Performing direct entry USERCOPY_STACK_FRAME_FROM # [ 60.707375] lkdtm: good_stack: ffffa214445c7e20-ffffa214445c7e40 # [ 60.713426] lkdtm: bad_stack : ffffa214445c7da8-ffffa214445c7dc8 # [ 60.719576] lkdtm: attempting good copy_from_user of local stack # [ 60.725743] lkdtm: attempting bad copy_from_user of distant stack # USERCOPY_STACK_FRAME_FROM: missing 'call trace:': [FAIL] not ok 66 selftests: lkdtm: USERCOPY_STACK_FRAME_FROM.sh # exit=1 # selftests: lkdtm: USERCOPY_STACK_BEYOND.sh [ 60.900316] lkdtm: Performing direct entry USERCOPY_STACK_BEYOND [ 60.906346] lkdtm: good_stack: ffffa2144463fe20-ffffa2144463fe40 [ 60.912379] lkdtm: bad_stack : ffffa2144463fff8-ffffa21444640018 [ 60.918396] lkdtm: attempting good copy_to_user of local stack [ 60.924239] lkdtm: attempting bad copy_to_user of distant stack [ 60.930162] lkdtm: copy_to_user failed, but lacked Oops # [ 60.900316] lkdtm: Performing direct entry USERCOPY_STACK_BEYOND # [ 60.906346] lkdtm: good_stack: ffffa2144463fe20-ffffa2144463fe40 # [ 60.912379] lkdtm: bad_stack : ffffa2144463fff8-ffffa21444640018 # [ 60.918396] lkdtm: attempting good copy_to_user of local stack # [ 60.924239] lkdtm: attempting bad copy_to_user of distant stack # [ 60.930162] lkdtm: copy_to_user failed, but lacked Oops # USERCOPY_STACK_BEYOND: missing 'call trace:': [FAIL] not ok 67 selftests: lkdtm: USERCOPY_STACK_BEYOND.sh # exit=1 # selftests: lkdtm: USERCOPY_KERNEL.sh [ 61.106379] lkdtm: Performing direct entry USERCOPY_KERNEL [ 61.111873] lkdtm: attempting good copy_to_user from kernel rodata: ffffffff8aed5f10 [ 61.119647] lkdtm: attempting bad copy_to_user from kernel text: ffffffff89ae4290 [ 61.127143] lkdtm: FAIL: survived bad copy_to_user() # [ 61.106379] lkdtm: Performing direct entry USERCOPY_KERNEL # [ 61.111873] lkdtm: attempting good copy_to_user from kernel rodata: ffffffff8aed5f10 # [ 61.119647] lkdtm: attempting bad copy_to_user from kernel text: ffffffff89ae4290 # [ 61.127143] lkdtm: FAIL: survived bad copy_to_user() # USERCOPY_KERNEL: missing 'call trace:': [FAIL] not ok 68 selftests: lkdtm: USERCOPY_KERNEL.sh # exit=1 # selftests: lkdtm: STACKLEAK_ERASING.sh [ 61.289529] lkdtm: Performing direct entry STACKLEAK_ERASING [ 61.295198] lkdtm: checking unused part of the thread stack (15928 bytes)... [ 61.302283] lkdtm: FAIL: the erased part is not found (checked 15928 bytes) [ 61.309246] lkdtm: FAIL: the thread stack is NOT properly erased [ 61.315249] CPU: 0 PID: 2846 Comm: cat Tainted: G D W 5.10.173-cip27 #1 [ 61.322978] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 [ 61.328888] Call Trace: [ 61.331338] dump_stack+0x77/0x9b [ 61.334648] lkdtm_STACKLEAK_ERASING+0x116/0x144 [ 61.339259] direct_entry.cold+0x2c/0x38 [ 61.343178] full_proxy_write+0x56/0x80 [ 61.347009] vfs_write+0xea/0x3b0 [ 61.350319] ksys_write+0x68/0xf0 [ 61.353630] do_syscall_64+0x33/0x40 [ 61.357200] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 61.362244] RIP: 0033:0x7f756b081833 [ 61.365813] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 61.384549] RSP: 002b:00007fff4f636cf8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 61.392105] RAX: ffffffffffffffda RBX: 0000000000000012 RCX: 00007f756b081833 [ 61.399226] RDX: 0000000000000012 RSI: 00007f756af74000 RDI: 0000000000000001 [ 61.406348] RBP: 00007f756af74000 R08: 00007f756af73010 R09: 0000000000000000 [ 61.413468] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 [ 61.420590] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # [ 61.289529] lkdtm: Performing direct entry STACKLEAK_ERASING # [ 61.295198] lkdtm: checking unused part of the thread stack (15928 bytes)... # [ 61.302283] lkdtm: FAIL: the erased part is not found (checked 15928 bytes) # [ 61.309246] lkdtm: FAIL: the thread stack is NOT properly erased # [ 61.315249] CPU: 0 PID: 2846 Comm: cat Tainted: G D W 5.10.173-cip27 #1 # [ 61.322978] Hardware name: Google Grunt/Grunt, BIOS 09/05/2019 # [ 61.328888] Call Trace: # [ 61.331338] dump_stack+0x77/0x9b # [ 61.334648] lkdtm_STACKLEAK_ERASING+0x116/0x144 # [ 61.339259] direct_entry.cold+0x2c/0x38 # [ 61.343178] full_proxy_write+0x56/0x80 # [ 61.347009] vfs_write+0xea/0x3b0 # [ 61.350319] ksys_write+0x68/0xf0 # [ 61.353630] do_syscall_64+0x33/0x40 # [ 61.357200] entry_SYSCALL_64_after_hwframe+0x61/0xc6 # [ 61.362244] RIP: 0033:0x7f756b081833 # [ 61.365813] Code: 8b 15 61 26 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 # [ 61.384549] RSP: 002b:00007fff4f636cf8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 # [ 61.392105] RAX: ffffffffffffffda RBX: 0000000000000012 RCX: 00007f756b081833 # [ 61.399226] RDX: 0000000000000012 RSI: 00007f756af74000 RDI: 0000000000000001 # [ 61.406348] RBP: 00007f756af74000 R08: 00007f756af73010 R09: 0000000000000000 # [ 61.413468] R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000001 # [ 61.420590] R13: 0000000000000001 R14: 0000000000020000 R15: 0000000000020000 # STACKLEAK_ERASING: missing 'OK: the rest of the thread stack is properly erased': [FAIL] not ok 69 selftests: lkdtm: STACKLEAK_ERASING.sh # exit=1 # selftests: lkdtm: CFI_FORWARD_PROTO.sh [ 61.620868] lkdtm: Performing direct entry CFI_FORWARD_PROTO [ 61.645864] lkdtm: Calling matched prototype ... [ 61.650518] lkdtm: Calling mismatched prototype ... [ 61.655396] lkdtm: Fail: survived mismatched prototype function call! # [ 61.620868] lkdtm: Performing direct entry CFI_FORWARD_PROTO # [ 61.645864] lkdtm: Calling matched prototype ... # [ 61.650518] lkdtm: Calling mismatched prototype ... # [ 61.655396] lkdtm: Fail: survived mismatched prototype function call! # CFI_FORWARD_PROTO: missing 'call trace:': [FAIL] not ok 70 selftests: lkdtm: CFI_FORWARD_PROTO.sh # exit=1 lkdtm_PANIC_sh skip lkdtm_BUG_sh pass lkdtm_WARNING_sh pass lkdtm_WARNING_MESSAGE_sh pass lkdtm_EXCEPTION_sh pass lkdtm_LOOP_sh skip lkdtm_EXHAUST_STACK_sh skip lkdtm_CORRUPT_STACK_sh skip lkdtm_CORRUPT_STACK_STRONG_sh skip lkdtm_CORRUPT_LIST_ADD_sh fail lkdtm_CORRUPT_LIST_DEL_sh fail lkdtm_STACK_GUARD_PAGE_LEADING_sh pass lkdtm_STACK_GUARD_PAGE_TRAILING_sh pass lkdtm_UNSET_SMEP_sh pass lkdtm_DOUBLE_FAULT_sh skip lkdtm_CORRUPT_PAC_sh skip lkdtm_UNALIGNED_LOAD_STORE_WRITE_sh skip lkdtm_OVERWRITE_ALLOCATION_sh skip lkdtm_WRITE_AFTER_FREE_sh skip lkdtm_READ_AFTER_FREE_sh fail lkdtm_WRITE_BUDDY_AFTER_FREE_sh skip lkdtm_READ_BUDDY_AFTER_FREE_sh fail lkdtm_SLAB_FREE_DOUBLE_sh fail lkdtm_SLAB_FREE_CROSS_sh fail lkdtm_SLAB_FREE_PAGE_sh fail lkdtm_SOFTLOCKUP_sh skip lkdtm_HARDLOCKUP_sh skip lkdtm_SPINLOCKUP_sh skip lkdtm_HUNG_TASK_sh skip lkdtm_EXEC_DATA_sh pass lkdtm_EXEC_STACK_sh pass lkdtm_EXEC_KMALLOC_sh pass lkdtm_EXEC_VMALLOC_sh pass lkdtm_EXEC_RODATA_sh pass lkdtm_EXEC_USERSPACE_sh pass lkdtm_EXEC_NULL_sh pass lkdtm_ACCESS_USERSPACE_sh fail lkdtm_ACCESS_NULL_sh pass lkdtm_WRITE_RO_sh pass lkdtm_WRITE_RO_AFTER_INIT_sh pass lkdtm_WRITE_KERN_sh pass lkdtm_REFCOUNT_INC_OVERFLOW_sh pass lkdtm_REFCOUNT_ADD_OVERFLOW_sh pass lkdtm_REFCOUNT_INC_NOT_ZERO_OVERFLOW_sh pass lkdtm_REFCOUNT_ADD_NOT_ZERO_OVERFLOW_sh pass lkdtm_REFCOUNT_DEC_ZERO_sh pass lkdtm_REFCOUNT_DEC_NEGATIVE_sh pass lkdtm_REFCOUNT_DEC_AND_TEST_NEGATIVE_sh pass lkdtm_REFCOUNT_SUB_AND_TEST_NEGATIVE_sh pass lkdtm_REFCOUNT_INC_ZERO_sh pass lkdtm_REFCOUNT_ADD_ZERO_sh pass lkdtm_REFCOUNT_INC_SATURATED_sh pass lkdtm_REFCOUNT_DEC_SATURATED_sh pass lkdtm_REFCOUNT_ADD_SATURATED_sh pass lkdtm_REFCOUNT_INC_NOT_ZERO_SATURATED_sh pass lkdtm_REFCOUNT_ADD_NOT_ZERO_SATURATED_sh pass lkdtm_REFCOUNT_DEC_AND_TEST_SATURATED_sh pass lkdtm_REFCOUNT_SUB_AND_TEST_SATURATED_sh pass lkdtm_REFCOUNT_TIMING_sh skip lkdtm_ATOMIC_TIMING_sh skip lkdtm_USERCOPY_HEAP_SIZE_TO_sh fail lkdtm_USERCOPY_HEAP_SIZE_FROM_sh fail lkdtm_USERCOPY_HEAP_WHITELIST_TO_sh fail lkdtm_USERCOPY_HEAP_WHITELIST_FROM_sh fail lkdtm_USERCOPY_STACK_FRAME_TO_sh fail lkdtm_USERCOPY_STACK_FRAME_FROM_sh fail lkdtm_USERCOPY_STACK_BEYOND_sh fail lkdtm_USERCOPY_KERNEL_sh fail lkdtm_STACKLEAK_ERASING_sh fail lkdtm_CFI_FORWARD_PROTO_sh fail + ../../utils/send-to-lava.sh ./output/result.txt + set +x / #