Date
April 20, 2025, 11:09 p.m.
Failure - log-parser-test/oops-oops-general-protection-fault-probably-for-non-canonical-address-smp-kasan-pti
[ 116.552034] Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN PTI
Failure - log-parser-test/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 112.467706] ================================================================== [ 112.474949] BUG: KFENCE: use-after-free read in test_krealloc+0x6fc/0xbe0 [ 112.474949] [ 112.483225] Use-after-free read at 0x000000005a09af96 (in kfence-#30): [ 112.489757] test_krealloc+0x6fc/0xbe0 [ 112.493510] kunit_try_run_case+0x1a2/0x480 [ 112.497706] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 112.503104] kthread+0x334/0x6f0 [ 112.506337] ret_from_fork+0x3e/0x80 [ 112.509924] ret_from_fork_asm+0x1a/0x30 [ 112.513850] [ 112.515349] kfence-#30: 0x000000005a09af96-0x0000000030ba6615, size=32, cache=kmalloc-32 [ 112.515349] [ 112.524908] allocated by task 380 on cpu 2 at 112.467694s (0.057214s ago): [ 112.531792] test_alloc+0x364/0x10f0 [ 112.535377] test_krealloc+0xad/0xbe0 [ 112.539043] kunit_try_run_case+0x1a2/0x480 [ 112.543228] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 112.548629] kthread+0x334/0x6f0 [ 112.551861] ret_from_fork+0x3e/0x80 [ 112.555450] ret_from_fork_asm+0x1a/0x30 [ 112.559374] [ 112.560875] freed by task 380 on cpu 2 at 112.467698s (0.093176s ago): [ 112.567410] krealloc_noprof+0x108/0x340 [ 112.571342] test_krealloc+0x226/0xbe0 [ 112.575093] kunit_try_run_case+0x1a2/0x480 [ 112.579282] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 112.584679] kthread+0x334/0x6f0 [ 112.587912] ret_from_fork+0x3e/0x80 [ 112.591491] ret_from_fork_asm+0x1a/0x30 [ 112.595416] [ 112.596919] CPU: 2 UID: 0 PID: 380 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 112.607795] Tainted: [B]=BAD_PAGE, [N]=TEST [ 112.611988] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 112.619388] ==================================================================
Failure - log-parser-test/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 112.203434] ================================================================== [ 112.210671] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x2ec/0x670 [ 112.210671] [ 112.220334] Use-after-free read at 0x000000008ffa412a (in kfence-#25): [ 112.226868] test_memcache_typesafe_by_rcu+0x2ec/0x670 [ 112.232015] kunit_try_run_case+0x1a2/0x480 [ 112.236210] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 112.241607] kthread+0x334/0x6f0 [ 112.244839] ret_from_fork+0x3e/0x80 [ 112.248419] ret_from_fork_asm+0x1a/0x30 [ 112.252345] [ 112.253846] kfence-#25: 0x000000008ffa412a-0x0000000048d21650, size=32, cache=test [ 112.253846] [ 112.262893] allocated by task 378 on cpu 2 at 112.179696s (0.083196s ago): [ 112.269774] test_alloc+0x2a6/0x10f0 [ 112.273353] test_memcache_typesafe_by_rcu+0x16f/0x670 [ 112.278501] kunit_try_run_case+0x1a2/0x480 [ 112.282685] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 112.288085] kthread+0x334/0x6f0 [ 112.291317] ret_from_fork+0x3e/0x80 [ 112.294896] ret_from_fork_asm+0x1a/0x30 [ 112.298824] [ 112.300321] freed by task 378 on cpu 2 at 112.179699s (0.120622s ago): [ 112.306848] test_memcache_typesafe_by_rcu+0x1bf/0x670 [ 112.311988] kunit_try_run_case+0x1a2/0x480 [ 112.316182] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 112.321579] kthread+0x334/0x6f0 [ 112.324814] ret_from_fork+0x3e/0x80 [ 112.328402] ret_from_fork_asm+0x1a/0x30 [ 112.332337] [ 112.333837] CPU: 2 UID: 0 PID: 378 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 112.344713] Tainted: [B]=BAD_PAGE, [N]=TEST [ 112.348897] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 112.356288] ==================================================================
Failure - log-parser-test/kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 88.687590] ================================================================== [ 88.698734] BUG: KFENCE: invalid read in test_invalid_access+0xf0/0x210 [ 88.698734] [ 88.706831] Invalid read at 0x00000000ca4ac57b: [ 88.711371] test_invalid_access+0xf0/0x210 [ 88.715558] kunit_try_run_case+0x1a2/0x480 [ 88.719753] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 88.725158] kthread+0x334/0x6f0 [ 88.728390] ret_from_fork+0x3e/0x80 [ 88.731972] ret_from_fork_asm+0x1a/0x30 [ 88.735904] [ 88.737407] CPU: 3 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 88.748274] Tainted: [B]=BAD_PAGE, [N]=TEST [ 88.752466] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 88.759859] ==================================================================
Failure - log-parser-test/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 88.307698] ================================================================== [ 88.314952] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x24f/0x340 [ 88.314952] [ 88.324527] Corrupted memory at 0x00000000ababc968 [ ! . . . . . . . . . . . . . . . ] (in kfence-#16): [ 88.333954] test_kmalloc_aligned_oob_write+0x24f/0x340 [ 88.339181] kunit_try_run_case+0x1a2/0x480 [ 88.343377] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 88.348784] kthread+0x334/0x6f0 [ 88.352023] ret_from_fork+0x3e/0x80 [ 88.355603] ret_from_fork_asm+0x1a/0x30 [ 88.359528] [ 88.361028] kfence-#16: 0x00000000c8d6d9e3-0x0000000083d00e9b, size=73, cache=kmalloc-96 [ 88.361028] [ 88.370597] allocated by task 368 on cpu 3 at 88.307690s (0.062907s ago): [ 88.377393] test_alloc+0x364/0x10f0 [ 88.380978] test_kmalloc_aligned_oob_write+0xc8/0x340 [ 88.386117] kunit_try_run_case+0x1a2/0x480 [ 88.390302] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 88.395703] kthread+0x334/0x6f0 [ 88.398935] ret_from_fork+0x3e/0x80 [ 88.402524] ret_from_fork_asm+0x1a/0x30 [ 88.406456] [ 88.407957] freed by task 368 on cpu 3 at 88.307692s (0.100265s ago): [ 88.414406] test_kmalloc_aligned_oob_write+0x24f/0x340 [ 88.419637] kunit_try_run_case+0x1a2/0x480 [ 88.423823] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 88.429223] kthread+0x334/0x6f0 [ 88.432457] ret_from_fork+0x3e/0x80 [ 88.436043] ret_from_fork_asm+0x1a/0x30 [ 88.439968] [ 88.441471] CPU: 3 UID: 0 PID: 368 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 88.452347] Tainted: [B]=BAD_PAGE, [N]=TEST [ 88.456538] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 88.463931] ==================================================================
Failure - log-parser-test/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 87.971745] ================================================================== [ 87.978975] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x27e/0x560 [ 87.978975] [ 87.988551] Out-of-bounds read at 0x000000002a674aec (105B right of kfence-#13): [ 87.995955] test_kmalloc_aligned_oob_read+0x27e/0x560 [ 88.001099] kunit_try_run_case+0x1a2/0x480 [ 88.005286] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 88.010686] kthread+0x334/0x6f0 [ 88.013926] ret_from_fork+0x3e/0x80 [ 88.017506] ret_from_fork_asm+0x1a/0x30 [ 88.021432] [ 88.022932] kfence-#13: 0x00000000fecc7103-0x00000000b8d362f2, size=73, cache=kmalloc-96 [ 88.022932] [ 88.032501] allocated by task 366 on cpu 2 at 87.971726s (0.060774s ago): [ 88.039297] test_alloc+0x364/0x10f0 [ 88.042889] test_kmalloc_aligned_oob_read+0x105/0x560 [ 88.048027] kunit_try_run_case+0x1a2/0x480 [ 88.052215] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 88.057623] kthread+0x334/0x6f0 [ 88.060855] ret_from_fork+0x3e/0x80 [ 88.064434] ret_from_fork_asm+0x1a/0x30 [ 88.068360] [ 88.069863] CPU: 2 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 88.080738] Tainted: [B]=BAD_PAGE, [N]=TEST [ 88.084922] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 88.092314] ==================================================================
Failure - log-parser-test/kfence-bug-kfence-memory-corruption-in-test_corruption
[ 83.035695] ================================================================== [ 83.042949] BUG: KFENCE: memory corruption in test_corruption+0x2df/0x3e0 [ 83.042949] [ 83.051215] Corrupted memory at 0x00000000eeb29d35 [ ! ] (in kfence-#220): [ 83.058106] test_corruption+0x2df/0x3e0 [ 83.062031] kunit_try_run_case+0x1a2/0x480 [ 83.066217] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 83.071618] kthread+0x334/0x6f0 [ 83.074857] ret_from_fork+0x3e/0x80 [ 83.078436] ret_from_fork_asm+0x1a/0x30 [ 83.082362] [ 83.083862] kfence-#220: 0x000000009708ca1e-0x000000003615cdb2, size=32, cache=kmalloc-32 [ 83.083862] [ 83.093517] allocated by task 354 on cpu 2 at 83.035688s (0.057828s ago): [ 83.100313] test_alloc+0x364/0x10f0 [ 83.103898] test_corruption+0x1cb/0x3e0 [ 83.107823] kunit_try_run_case+0x1a2/0x480 [ 83.112009] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 83.117410] kthread+0x334/0x6f0 [ 83.120649] ret_from_fork+0x3e/0x80 [ 83.124231] ret_from_fork_asm+0x1a/0x30 [ 83.128163] [ 83.129664] freed by task 354 on cpu 2 at 83.035690s (0.093973s ago): [ 83.136112] test_corruption+0x2df/0x3e0 [ 83.140047] kunit_try_run_case+0x1a2/0x480 [ 83.144239] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 83.149640] kthread+0x334/0x6f0 [ 83.152880] ret_from_fork+0x3e/0x80 [ 83.156459] ret_from_fork_asm+0x1a/0x30 [ 83.160386] [ 83.161885] CPU: 2 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 83.172761] Tainted: [B]=BAD_PAGE, [N]=TEST [ 83.176945] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 83.184340] ================================================================== [ 83.659697] ================================================================== [ 83.666945] BUG: KFENCE: memory corruption in test_corruption+0x216/0x3e0 [ 83.666945] [ 83.675214] Corrupted memory at 0x0000000069ff76d1 [ ! ] (in kfence-#225): [ 83.682104] test_corruption+0x216/0x3e0 [ 83.686036] kunit_try_run_case+0x1a2/0x480 [ 83.690225] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 83.695631] kthread+0x334/0x6f0 [ 83.698864] ret_from_fork+0x3e/0x80 [ 83.702443] ret_from_fork_asm+0x1a/0x30 [ 83.706376] [ 83.707878] kfence-#225: 0x00000000432f78f2-0x00000000fb2ed9ca, size=32, cache=test [ 83.707878] [ 83.717011] allocated by task 356 on cpu 3 at 83.659690s (0.057320s ago): [ 83.723796] test_alloc+0x2a6/0x10f0 [ 83.727376] test_corruption+0x1cb/0x3e0 [ 83.731301] kunit_try_run_case+0x1a2/0x480 [ 83.735486] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 83.740887] kthread+0x334/0x6f0 [ 83.744129] ret_from_fork+0x3e/0x80 [ 83.747716] ret_from_fork_asm+0x1a/0x30 [ 83.751642] [ 83.753140] freed by task 356 on cpu 3 at 83.659692s (0.093447s ago): [ 83.759582] test_corruption+0x216/0x3e0 [ 83.763514] kunit_try_run_case+0x1a2/0x480 [ 83.767700] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 83.773097] kthread+0x334/0x6f0 [ 83.776330] ret_from_fork+0x3e/0x80 [ 83.779909] ret_from_fork_asm+0x1a/0x30 [ 83.783836] [ 83.785338] CPU: 3 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 83.796213] Tainted: [B]=BAD_PAGE, [N]=TEST [ 83.800397] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 83.807789] ================================================================== [ 83.395696] ================================================================== [ 83.402947] BUG: KFENCE: memory corruption in test_corruption+0x131/0x3e0 [ 83.402947] [ 83.411213] Corrupted memory at 0x0000000053246d94 [ ! . . . . . . . . . . . . . . . ] (in kfence-#223): [ 83.420728] test_corruption+0x131/0x3e0 [ 83.424654] kunit_try_run_case+0x1a2/0x480 [ 83.428840] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 83.434240] kthread+0x334/0x6f0 [ 83.437479] ret_from_fork+0x3e/0x80 [ 83.441061] ret_from_fork_asm+0x1a/0x30 [ 83.444993] [ 83.446495] kfence-#223: 0x0000000086d5d21f-0x00000000654567f4, size=32, cache=test [ 83.446495] [ 83.455627] allocated by task 356 on cpu 3 at 83.395689s (0.059937s ago): [ 83.462413] test_alloc+0x2a6/0x10f0 [ 83.465992] test_corruption+0xe6/0x3e0 [ 83.469831] kunit_try_run_case+0x1a2/0x480 [ 83.474017] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 83.479416] kthread+0x334/0x6f0 [ 83.482648] ret_from_fork+0x3e/0x80 [ 83.486228] ret_from_fork_asm+0x1a/0x30 [ 83.490153] [ 83.491652] freed by task 356 on cpu 3 at 83.395691s (0.095961s ago): [ 83.498095] test_corruption+0x131/0x3e0 [ 83.502027] kunit_try_run_case+0x1a2/0x480 [ 83.506213] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 83.511612] kthread+0x334/0x6f0 [ 83.514845] ret_from_fork+0x3e/0x80 [ 83.518422] ret_from_fork_asm+0x1a/0x30 [ 83.522348] [ 83.523848] CPU: 3 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 83.534724] Tainted: [B]=BAD_PAGE, [N]=TEST [ 83.538909] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 83.546303] ================================================================== [ 82.771696] ================================================================== [ 82.778949] BUG: KFENCE: memory corruption in test_corruption+0x2d2/0x3e0 [ 82.778949] [ 82.787216] Corrupted memory at 0x00000000ad0417e4 [ ! . . . . . . . . . . . . . . . ] (in kfence-#218): [ 82.796731] test_corruption+0x2d2/0x3e0 [ 82.800657] kunit_try_run_case+0x1a2/0x480 [ 82.804842] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 82.810243] kthread+0x334/0x6f0 [ 82.813482] ret_from_fork+0x3e/0x80 [ 82.817061] ret_from_fork_asm+0x1a/0x30 [ 82.820987] [ 82.822489] kfence-#218: 0x00000000c36692e5-0x0000000091b46842, size=32, cache=kmalloc-32 [ 82.822489] [ 82.832141] allocated by task 354 on cpu 2 at 82.771689s (0.060452s ago): [ 82.838930] test_alloc+0x364/0x10f0 [ 82.842515] test_corruption+0xe6/0x3e0 [ 82.846354] kunit_try_run_case+0x1a2/0x480 [ 82.850540] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 82.855938] kthread+0x334/0x6f0 [ 82.859171] ret_from_fork+0x3e/0x80 [ 82.862751] ret_from_fork_asm+0x1a/0x30 [ 82.866676] [ 82.868177] freed by task 354 on cpu 2 at 82.771691s (0.096485s ago): [ 82.874627] test_corruption+0x2d2/0x3e0 [ 82.878559] kunit_try_run_case+0x1a2/0x480 [ 82.882751] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 82.888153] kthread+0x334/0x6f0 [ 82.891393] ret_from_fork+0x3e/0x80 [ 82.894972] ret_from_fork_asm+0x1a/0x30 [ 82.898897] [ 82.900400] CPU: 2 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 82.911274] Tainted: [B]=BAD_PAGE, [N]=TEST [ 82.915459] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 82.922853] ==================================================================
Failure - log-parser-test/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 82.315694] ================================================================== [ 82.322948] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1e1/0x260 [ 82.322948] [ 82.331389] Invalid free of 0x0000000067543a7f (in kfence-#214): [ 82.337403] test_invalid_addr_free+0x1e1/0x260 [ 82.341943] kunit_try_run_case+0x1a2/0x480 [ 82.346129] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 82.351527] kthread+0x334/0x6f0 [ 82.354760] ret_from_fork+0x3e/0x80 [ 82.358340] ret_from_fork_asm+0x1a/0x30 [ 82.362265] [ 82.363763] kfence-#214: 0x00000000f19a890d-0x000000004ba9b37d, size=32, cache=kmalloc-32 [ 82.363763] [ 82.373411] allocated by task 350 on cpu 2 at 82.315689s (0.057722s ago): [ 82.380206] test_alloc+0x364/0x10f0 [ 82.383791] test_invalid_addr_free+0xdb/0x260 [ 82.388239] kunit_try_run_case+0x1a2/0x480 [ 82.392434] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 82.397832] kthread+0x334/0x6f0 [ 82.401065] ret_from_fork+0x3e/0x80 [ 82.404644] ret_from_fork_asm+0x1a/0x30 [ 82.408570] [ 82.410070] CPU: 2 UID: 0 PID: 350 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 82.420945] Tainted: [B]=BAD_PAGE, [N]=TEST [ 82.425130] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 82.432523] ================================================================== [ 82.547698] ================================================================== [ 82.554952] BUG: KFENCE: invalid free in test_invalid_addr_free+0xfb/0x260 [ 82.554952] [ 82.563306] Invalid free of 0x000000008e99abb9 (in kfence-#216): [ 82.569320] test_invalid_addr_free+0xfb/0x260 [ 82.573765] kunit_try_run_case+0x1a2/0x480 [ 82.577951] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 82.583349] kthread+0x334/0x6f0 [ 82.586582] ret_from_fork+0x3e/0x80 [ 82.590161] ret_from_fork_asm+0x1a/0x30 [ 82.594087] [ 82.595588] kfence-#216: 0x00000000fdf017dc-0x000000003d2862a1, size=32, cache=test [ 82.595588] [ 82.604720] allocated by task 352 on cpu 3 at 82.547692s (0.057027s ago): [ 82.611507] test_alloc+0x2a6/0x10f0 [ 82.615087] test_invalid_addr_free+0xdb/0x260 [ 82.619542] kunit_try_run_case+0x1a2/0x480 [ 82.623734] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 82.629135] kthread+0x334/0x6f0 [ 82.632365] ret_from_fork+0x3e/0x80 [ 82.635945] ret_from_fork_asm+0x1a/0x30 [ 82.639872] [ 82.641371] CPU: 3 UID: 0 PID: 352 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 82.652239] Tainted: [B]=BAD_PAGE, [N]=TEST [ 82.656424] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 82.663816] ==================================================================
Failure - log-parser-test/kfence-bug-kfence-invalid-free-in-test_double_free
[ 82.059698] ================================================================== [ 82.066954] BUG: KFENCE: invalid free in test_double_free+0x112/0x260 [ 82.066954] [ 82.074874] Invalid free of 0x0000000032446f97 (in kfence-#212): [ 82.080881] test_double_free+0x112/0x260 [ 82.084902] kunit_try_run_case+0x1a2/0x480 [ 82.089097] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 82.094494] kthread+0x334/0x6f0 [ 82.097726] ret_from_fork+0x3e/0x80 [ 82.101305] ret_from_fork_asm+0x1a/0x30 [ 82.105234] [ 82.106731] kfence-#212: 0x0000000032446f97-0x000000005a398c24, size=32, cache=test [ 82.106731] [ 82.115858] allocated by task 348 on cpu 2 at 82.059690s (0.056167s ago): [ 82.122655] test_alloc+0x2a6/0x10f0 [ 82.126240] test_double_free+0xdb/0x260 [ 82.130166] kunit_try_run_case+0x1a2/0x480 [ 82.134352] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 82.139749] kthread+0x334/0x6f0 [ 82.142981] ret_from_fork+0x3e/0x80 [ 82.146563] ret_from_fork_asm+0x1a/0x30 [ 82.150497] [ 82.151994] freed by task 348 on cpu 2 at 82.059692s (0.092301s ago): [ 82.158438] test_double_free+0xfa/0x260 [ 82.162370] kunit_try_run_case+0x1a2/0x480 [ 82.166562] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 82.171964] kthread+0x334/0x6f0 [ 82.175204] ret_from_fork+0x3e/0x80 [ 82.178784] ret_from_fork_asm+0x1a/0x30 [ 82.182709] [ 82.184209] CPU: 2 UID: 0 PID: 348 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 82.195085] Tainted: [B]=BAD_PAGE, [N]=TEST [ 82.199272] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 82.206671] ================================================================== [ 81.803703] ================================================================== [ 81.810951] BUG: KFENCE: invalid free in test_double_free+0x1d3/0x260 [ 81.810951] [ 81.818865] Invalid free of 0x000000003f9651d0 (in kfence-#210): [ 81.824880] test_double_free+0x1d3/0x260 [ 81.828902] kunit_try_run_case+0x1a2/0x480 [ 81.833094] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 81.838494] kthread+0x334/0x6f0 [ 81.841734] ret_from_fork+0x3e/0x80 [ 81.845314] ret_from_fork_asm+0x1a/0x30 [ 81.849240] [ 81.850739] kfence-#210: 0x000000003f9651d0-0x000000006e530434, size=32, cache=kmalloc-32 [ 81.850739] [ 81.860394] allocated by task 346 on cpu 2 at 81.803695s (0.056699s ago): [ 81.867190] test_alloc+0x364/0x10f0 [ 81.870775] test_double_free+0xdb/0x260 [ 81.874701] kunit_try_run_case+0x1a2/0x480 [ 81.878887] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 81.884285] kthread+0x334/0x6f0 [ 81.887518] ret_from_fork+0x3e/0x80 [ 81.891098] ret_from_fork_asm+0x1a/0x30 [ 81.895025] [ 81.896522] freed by task 346 on cpu 2 at 81.803697s (0.092825s ago): [ 81.902962] test_double_free+0x1e0/0x260 [ 81.906975] kunit_try_run_case+0x1a2/0x480 [ 81.911168] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 81.916569] kthread+0x334/0x6f0 [ 81.919801] ret_from_fork+0x3e/0x80 [ 81.923387] ret_from_fork_asm+0x1a/0x30 [ 81.927314] [ 81.928816] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 81.939691] Tainted: [B]=BAD_PAGE, [N]=TEST [ 81.943876] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 81.951269] ==================================================================
Failure - log-parser-test/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 81.067696] ================================================================== [ 81.074943] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x129/0x270 [ 81.074943] [ 81.084165] Use-after-free read at 0x0000000066065150 (in kfence-#204): [ 81.090778] test_use_after_free_read+0x129/0x270 [ 81.095493] kunit_try_run_case+0x1a2/0x480 [ 81.099685] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 81.105086] kthread+0x334/0x6f0 [ 81.108325] ret_from_fork+0x3e/0x80 [ 81.111905] ret_from_fork_asm+0x1a/0x30 [ 81.115831] [ 81.117332] kfence-#204: 0x0000000066065150-0x00000000846f7376, size=32, cache=kmalloc-32 [ 81.117332] [ 81.126984] allocated by task 338 on cpu 2 at 81.067691s (0.059293s ago): [ 81.133771] test_alloc+0x364/0x10f0 [ 81.137350] test_use_after_free_read+0xdc/0x270 [ 81.141977] kunit_try_run_case+0x1a2/0x480 [ 81.146163] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 81.151561] kthread+0x334/0x6f0 [ 81.154794] ret_from_fork+0x3e/0x80 [ 81.158374] ret_from_fork_asm+0x1a/0x30 [ 81.162300] [ 81.163799] freed by task 338 on cpu 2 at 81.067693s (0.096105s ago): [ 81.170239] test_use_after_free_read+0x1e7/0x270 [ 81.174954] kunit_try_run_case+0x1a2/0x480 [ 81.179146] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 81.184547] kthread+0x334/0x6f0 [ 81.187787] ret_from_fork+0x3e/0x80 [ 81.191367] ret_from_fork_asm+0x1a/0x30 [ 81.195292] [ 81.196792] CPU: 2 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 81.207668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 81.211853] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 81.219247] ================================================================== [ 81.331694] ================================================================== [ 81.338934] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x129/0x270 [ 81.338934] [ 81.348156] Use-after-free read at 0x0000000089d510cd (in kfence-#206): [ 81.354767] test_use_after_free_read+0x129/0x270 [ 81.359473] kunit_try_run_case+0x1a2/0x480 [ 81.363662] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 81.369059] kthread+0x334/0x6f0 [ 81.372291] ret_from_fork+0x3e/0x80 [ 81.375870] ret_from_fork_asm+0x1a/0x30 [ 81.379796] [ 81.381297] kfence-#206: 0x0000000089d510cd-0x00000000633daf41, size=32, cache=test [ 81.381297] [ 81.390432] allocated by task 340 on cpu 2 at 81.331689s (0.058743s ago): [ 81.397228] test_alloc+0x2a6/0x10f0 [ 81.400813] test_use_after_free_read+0xdc/0x270 [ 81.405432] kunit_try_run_case+0x1a2/0x480 [ 81.409618] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 81.415015] kthread+0x334/0x6f0 [ 81.418248] ret_from_fork+0x3e/0x80 [ 81.421827] ret_from_fork_asm+0x1a/0x30 [ 81.425753] [ 81.427254] freed by task 340 on cpu 2 at 81.331691s (0.095563s ago): [ 81.433704] test_use_after_free_read+0xfb/0x270 [ 81.438329] kunit_try_run_case+0x1a2/0x480 [ 81.442515] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 81.447914] kthread+0x334/0x6f0 [ 81.451147] ret_from_fork+0x3e/0x80 [ 81.454733] ret_from_fork_asm+0x1a/0x30 [ 81.458659] [ 81.460159] CPU: 2 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 81.471029] Tainted: [B]=BAD_PAGE, [N]=TEST [ 81.475220] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 81.482612] ==================================================================
Failure - log-parser-test/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 80.835693] ================================================================== [ 80.842923] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x10d/0x260 [ 80.842923] [ 80.852152] Out-of-bounds write at 0x00000000039c6529 (1B left of kfence-#202): [ 80.859464] test_out_of_bounds_write+0x10d/0x260 [ 80.864170] kunit_try_run_case+0x1a2/0x480 [ 80.868356] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 80.873755] kthread+0x334/0x6f0 [ 80.876989] ret_from_fork+0x3e/0x80 [ 80.880575] ret_from_fork_asm+0x1a/0x30 [ 80.884502] [ 80.886001] kfence-#202: 0x00000000f61aaf20-0x00000000fbc7c81c, size=32, cache=test [ 80.886001] [ 80.895128] allocated by task 336 on cpu 3 at 80.835690s (0.059438s ago): [ 80.901924] test_alloc+0x2a6/0x10f0 [ 80.905510] test_out_of_bounds_write+0xd4/0x260 [ 80.910138] kunit_try_run_case+0x1a2/0x480 [ 80.914323] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 80.919721] kthread+0x334/0x6f0 [ 80.922954] ret_from_fork+0x3e/0x80 [ 80.926534] ret_from_fork_asm+0x1a/0x30 [ 80.930459] [ 80.931962] CPU: 3 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 80.942836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 80.947020] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 80.954413] ================================================================== [ 80.603692] ================================================================== [ 80.610917] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x10d/0x260 [ 80.610917] [ 80.620139] Out-of-bounds write at 0x00000000fbf3aa82 (1B left of kfence-#200): [ 80.627452] test_out_of_bounds_write+0x10d/0x260 [ 80.632159] kunit_try_run_case+0x1a2/0x480 [ 80.636352] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 80.641752] kthread+0x334/0x6f0 [ 80.644992] ret_from_fork+0x3e/0x80 [ 80.648571] ret_from_fork_asm+0x1a/0x30 [ 80.652497] [ 80.653998] kfence-#200: 0x00000000aec67ff4-0x000000000aecd525, size=32, cache=kmalloc-32 [ 80.653998] [ 80.663650] allocated by task 334 on cpu 1 at 80.603689s (0.059961s ago): [ 80.670438] test_alloc+0x364/0x10f0 [ 80.674026] test_out_of_bounds_write+0xd4/0x260 [ 80.678653] kunit_try_run_case+0x1a2/0x480 [ 80.682837] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 80.688236] kthread+0x334/0x6f0 [ 80.691471] ret_from_fork+0x3e/0x80 [ 80.695056] ret_from_fork_asm+0x1a/0x30 [ 80.698983] [ 80.700484] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 80.711362] Tainted: [B]=BAD_PAGE, [N]=TEST [ 80.715552] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 80.722947] ==================================================================
Failure - log-parser-test/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 79.907692] ================================================================== [ 79.914947] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x216/0x4e0 [ 79.914947] [ 79.923993] Out-of-bounds read at 0x00000000ccbf4d00 (32B right of kfence-#194): [ 79.931386] test_out_of_bounds_read+0x216/0x4e0 [ 79.936006] kunit_try_run_case+0x1a2/0x480 [ 79.940200] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 79.945600] kthread+0x334/0x6f0 [ 79.948832] ret_from_fork+0x3e/0x80 [ 79.952420] ret_from_fork_asm+0x1a/0x30 [ 79.956354] [ 79.957854] kfence-#194: 0x00000000bd9d9feb-0x0000000089105e3b, size=32, cache=kmalloc-32 [ 79.957854] [ 79.967507] allocated by task 330 on cpu 0 at 79.907689s (0.059817s ago): [ 79.974294] test_alloc+0x364/0x10f0 [ 79.977872] test_out_of_bounds_read+0x1e2/0x4e0 [ 79.982492] kunit_try_run_case+0x1a2/0x480 [ 79.986679] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 79.992084] kthread+0x334/0x6f0 [ 79.995319] ret_from_fork+0x3e/0x80 [ 79.998906] ret_from_fork_asm+0x1a/0x30 [ 80.002831] [ 80.004332] CPU: 0 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 80.015209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 80.019394] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 80.026794] ================================================================== [ 80.371692] ================================================================== [ 80.378947] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x216/0x4e0 [ 80.378947] [ 80.387996] Out-of-bounds read at 0x00000000c4da9dbb (32B right of kfence-#198): [ 80.395396] test_out_of_bounds_read+0x216/0x4e0 [ 80.400014] kunit_try_run_case+0x1a2/0x480 [ 80.404200] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 80.409601] kthread+0x334/0x6f0 [ 80.412840] ret_from_fork+0x3e/0x80 [ 80.416419] ret_from_fork_asm+0x1a/0x30 [ 80.420345] [ 80.421845] kfence-#198: 0x00000000c30b7b0f-0x00000000ff038385, size=32, cache=test [ 80.421845] [ 80.430971] allocated by task 332 on cpu 2 at 80.371689s (0.059281s ago): [ 80.437767] test_alloc+0x2a6/0x10f0 [ 80.441353] test_out_of_bounds_read+0x1e2/0x4e0 [ 80.445972] kunit_try_run_case+0x1a2/0x480 [ 80.450157] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 80.455556] kthread+0x334/0x6f0 [ 80.458789] ret_from_fork+0x3e/0x80 [ 80.462368] ret_from_fork_asm+0x1a/0x30 [ 80.466294] [ 80.467795] CPU: 2 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 80.478670] Tainted: [B]=BAD_PAGE, [N]=TEST [ 80.482857] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 80.490247] ================================================================== [ 80.139693] ================================================================== [ 80.146943] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x126/0x4e0 [ 80.146943] [ 80.156000] Out-of-bounds read at 0x000000002c8a4e91 (1B left of kfence-#196): [ 80.163226] test_out_of_bounds_read+0x126/0x4e0 [ 80.167844] kunit_try_run_case+0x1a2/0x480 [ 80.172030] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 80.177432] kthread+0x334/0x6f0 [ 80.180670] ret_from_fork+0x3e/0x80 [ 80.184252] ret_from_fork_asm+0x1a/0x30 [ 80.188187] [ 80.189685] kfence-#196: 0x0000000019a2b7d3-0x000000007fa0f8a8, size=32, cache=test [ 80.189685] [ 80.198818] allocated by task 332 on cpu 2 at 80.139690s (0.059127s ago): [ 80.205607] test_alloc+0x2a6/0x10f0 [ 80.209194] test_out_of_bounds_read+0xed/0x4e0 [ 80.213733] kunit_try_run_case+0x1a2/0x480 [ 80.217919] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 80.223317] kthread+0x334/0x6f0 [ 80.226550] ret_from_fork+0x3e/0x80 [ 80.230130] ret_from_fork_asm+0x1a/0x30 [ 80.234056] [ 80.235558] CPU: 2 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 80.246434] Tainted: [B]=BAD_PAGE, [N]=TEST [ 80.250618] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 80.258017] ================================================================== [ 79.467712] ================================================================== [ 79.474959] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x126/0x4e0 [ 79.474959] [ 79.484008] Out-of-bounds read at 0x00000000c858a81c (1B left of kfence-#190): [ 79.491227] test_out_of_bounds_read+0x126/0x4e0 [ 79.495856] kunit_try_run_case+0x1a2/0x480 [ 79.500049] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 79.505449] kthread+0x334/0x6f0 [ 79.508693] ret_from_fork+0x3e/0x80 [ 79.512293] ret_from_fork_asm+0x1a/0x30 [ 79.516221] [ 79.517730] kfence-#190: 0x0000000086a6f70f-0x000000005763439a, size=32, cache=kmalloc-32 [ 79.517730] [ 79.527383] allocated by task 330 on cpu 0 at 79.467707s (0.059675s ago): [ 79.534181] test_alloc+0x364/0x10f0 [ 79.537766] test_out_of_bounds_read+0xed/0x4e0 [ 79.542305] kunit_try_run_case+0x1a2/0x480 [ 79.546491] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 79.551890] kthread+0x334/0x6f0 [ 79.555123] ret_from_fork+0x3e/0x80 [ 79.558721] ret_from_fork_asm+0x1a/0x30 [ 79.562656] [ 79.564182] CPU: 0 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 79.575056] Tainted: [B]=BAD_PAGE, [N]=TEST [ 79.579241] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 79.586635] ==================================================================
Failure - log-parser-test/kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[ 15.554725] ================================================================== [ 15.578176] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x288/0x520 [ 15.578176] [ 15.587759] Corrupted memory at 0x00000000096a7a31 [ ! . . . . . . . . . . . . . . . ] (in kfence-#67): [ 15.597181] kmalloc_track_caller_oob_right+0x288/0x520 [ 15.602406] kunit_try_run_case+0x1a2/0x480 [ 15.606592] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 15.611990] kthread+0x334/0x6f0 [ 15.615224] ret_from_fork+0x3e/0x80 [ 15.618803] ret_from_fork_asm+0x1a/0x30 [ 15.622737] [ 15.624235] kfence-#67: 0x00000000e6f7e92c-0x00000000a764e060, size=120, cache=kmalloc-128 [ 15.624235] [ 15.633968] allocated by task 185 on cpu 3 at 15.554666s (0.079301s ago): [ 15.640755] kmalloc_track_caller_oob_right+0x19a/0x520 [ 15.645989] kunit_try_run_case+0x1a2/0x480 [ 15.650176] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 15.655574] kthread+0x334/0x6f0 [ 15.658807] ret_from_fork+0x3e/0x80 [ 15.662384] ret_from_fork_asm+0x1a/0x30 [ 15.666313] [ 15.667811] freed by task 185 on cpu 3 at 15.554720s (0.113090s ago): [ 15.674251] kmalloc_track_caller_oob_right+0x288/0x520 [ 15.679485] kunit_try_run_case+0x1a2/0x480 [ 15.683687] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 15.689096] kthread+0x334/0x6f0 [ 15.692329] ret_from_fork+0x3e/0x80 [ 15.695915] ret_from_fork_asm+0x1a/0x30 [ 15.699843] [ 15.701341] CPU: 3 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 15.712209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.716393] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 15.723785] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-global-out-of-bounds-in-cs_dsp_mock_bin_add_name_or_infoisra
[ 152.714756] ================================================================== [ 152.727639] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c1/0x3d0 [ 152.736731] Read of size 12 at addr ffffffffb96ccd00 by task kunit_try_catch/4207 [ 152.744215] [ 152.745738] CPU: 3 UID: 0 PID: 4207 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 152.745745] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 152.745747] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 152.745750] Call Trace: [ 152.745752] <TASK> [ 152.745754] dump_stack_lvl+0x73/0xb0 [ 152.745759] print_report+0xd1/0x650 [ 152.745765] ? __virt_addr_valid+0x1db/0x2d0 [ 152.745769] ? cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c1/0x3d0 [ 152.745773] ? kasan_addr_to_slab+0x11/0xa0 [ 152.745777] ? cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c1/0x3d0 [ 152.745781] kasan_report+0x141/0x180 [ 152.745785] ? cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c1/0x3d0 [ 152.745790] kasan_check_range+0x10c/0x1c0 [ 152.745795] __asan_memcpy+0x27/0x70 [ 152.745798] cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c1/0x3d0 [ 152.745802] ? __pfx_cs_dsp_mock_bin_add_name_or_info.isra.0+0x10/0x10 [ 152.745807] ? __pfx_cs_dsp_mock_reg_addr_inc_per_unpacked_word+0x10/0x10 [ 152.745811] ? __pfx__cs_dsp_remove_wrapper+0x10/0x10 [ 152.745816] cs_dsp_mock_bin_add_info+0x12/0x20 [ 152.745819] bin_patch_name_and_info+0x1a1/0x8d0 [ 152.745824] ? __pfx_bin_patch_name_and_info+0x10/0x10 [ 152.745829] ? __pfx_kfree_action_wrapper+0x10/0x10 [ 152.745834] ? kunit_add_action_or_reset+0x1d/0x40 [ 152.745838] ? ktime_get_ts64+0x83/0x230 [ 152.745843] kunit_try_run_case+0x1a2/0x480 [ 152.745847] ? __pfx_kunit_try_run_case+0x10/0x10 [ 152.745851] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 152.745856] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 152.745860] ? __kthread_parkme+0x82/0x180 [ 152.745864] ? preempt_count_sub+0x50/0x80 [ 152.745869] ? __pfx_kunit_try_run_case+0x10/0x10 [ 152.745873] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 152.745876] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 152.745880] kthread+0x334/0x6f0 [ 152.745884] ? trace_preempt_on+0x20/0xc0 [ 152.745889] ? __pfx_kthread+0x10/0x10 [ 152.745893] ? _raw_spin_unlock_irq+0x47/0x80 [ 152.745897] ? calculate_sigpending+0x7b/0xa0 [ 152.745901] ? __pfx_kthread+0x10/0x10 [ 152.745905] ret_from_fork+0x3e/0x80 [ 152.745909] ? __pfx_kthread+0x10/0x10 [ 152.745913] ret_from_fork_asm+0x1a/0x30 [ 152.745919] </TASK> [ 152.745921] [ 152.953654] The buggy address belongs to the variable: [ 152.958818] __loc.16+0x80/0x540 [ 152.962052] [ 152.963549] The buggy address belongs to the physical page: [ 152.969123] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x23eacc [ 152.977123] flags: 0x200000000002000(reserved|node=0|zone=2) [ 152.982784] raw: 0200000000002000 ffffea0008fab308 ffffea0008fab308 0000000000000000 [ 152.990522] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 152.998260] page dumped because: kasan: bad access detected [ 153.003831] [ 153.005330] Memory state around the buggy address: [ 153.010123] ffffffffb96ccc00: 00 00 f9 f9 f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9 [ 153.017343] ffffffffb96ccc80: 00 00 f9 f9 f9 f9 f9 f9 00 01 f9 f9 f9 f9 f9 f9 [ 153.024563] >ffffffffb96ccd00: 00 02 f9 f9 f9 f9 f9 f9 00 00 00 00 00 07 f9 f9 [ 153.031780] ^ [ 153.035274] ffffffffb96ccd80: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 00 06 f9 f9 [ 153.042493] ffffffffb96cce00: f9 f9 f9 f9 05 f9 f9 f9 f9 f9 f9 f9 00 01 f9 f9 [ 153.049735] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 79.026243] ================================================================== [ 79.033483] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0 [ 79.040444] Write of size 1 at addr ffff888104ee9778 by task kunit_try_catch/328 [ 79.047835] [ 79.049336] CPU: 1 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 79.049344] Tainted: [B]=BAD_PAGE, [N]=TEST [ 79.049346] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 79.049350] Call Trace: [ 79.049351] <TASK> [ 79.049353] dump_stack_lvl+0x73/0xb0 [ 79.049357] print_report+0xd1/0x650 [ 79.049361] ? __virt_addr_valid+0x1db/0x2d0 [ 79.049365] ? strncpy_from_user+0x1a5/0x1d0 [ 79.049369] ? kasan_complete_mode_report_info+0x2a/0x200 [ 79.049373] ? strncpy_from_user+0x1a5/0x1d0 [ 79.049378] kasan_report+0x141/0x180 [ 79.049382] ? strncpy_from_user+0x1a5/0x1d0 [ 79.049387] __asan_report_store1_noabort+0x1b/0x30 [ 79.049391] strncpy_from_user+0x1a5/0x1d0 [ 79.049396] copy_user_test_oob+0x760/0x10f0 [ 79.049400] ? __pfx_copy_user_test_oob+0x10/0x10 [ 79.049403] ? finish_task_switch.isra.0+0x153/0x700 [ 79.049408] ? __switch_to+0x5d9/0xf60 [ 79.049412] ? dequeue_task_fair+0x166/0x4e0 [ 79.049417] ? __schedule+0x10cc/0x2b30 [ 79.049421] ? ktime_get_ts64+0x83/0x230 [ 79.049426] kunit_try_run_case+0x1a2/0x480 [ 79.049431] ? __pfx_kunit_try_run_case+0x10/0x10 [ 79.049435] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 79.049440] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 79.049445] ? __kthread_parkme+0x82/0x180 [ 79.049449] ? preempt_count_sub+0x50/0x80 [ 79.049454] ? __pfx_kunit_try_run_case+0x10/0x10 [ 79.049458] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 79.049462] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 79.049466] kthread+0x334/0x6f0 [ 79.049471] ? trace_preempt_on+0x20/0xc0 [ 79.049475] ? __pfx_kthread+0x10/0x10 [ 79.049480] ? _raw_spin_unlock_irq+0x47/0x80 [ 79.049484] ? calculate_sigpending+0x7b/0xa0 [ 79.049488] ? __pfx_kthread+0x10/0x10 [ 79.049492] ret_from_fork+0x3e/0x80 [ 79.049497] ? __pfx_kthread+0x10/0x10 [ 79.049501] ret_from_fork_asm+0x1a/0x30 [ 79.049507] </TASK> [ 79.049509] [ 79.229764] Allocated by task 328: [ 79.233172] kasan_save_stack+0x45/0x70 [ 79.237011] kasan_save_track+0x18/0x40 [ 79.240851] kasan_save_alloc_info+0x3b/0x50 [ 79.245121] __kasan_kmalloc+0xb7/0xc0 [ 79.248874] __kmalloc_noprof+0x1c9/0x500 [ 79.252887] kunit_kmalloc_array+0x25/0x60 [ 79.256985] copy_user_test_oob+0xab/0x10f0 [ 79.261174] kunit_try_run_case+0x1a2/0x480 [ 79.265366] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 79.270766] kthread+0x334/0x6f0 [ 79.273998] ret_from_fork+0x3e/0x80 [ 79.277576] ret_from_fork_asm+0x1a/0x30 [ 79.281503] [ 79.283001] The buggy address belongs to the object at ffff888104ee9700 [ 79.283001] which belongs to the cache kmalloc-128 of size 128 [ 79.295509] The buggy address is located 0 bytes to the right of [ 79.295509] allocated 120-byte region [ffff888104ee9700, ffff888104ee9778) [ 79.308464] [ 79.309964] The buggy address belongs to the physical page: [ 79.315535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9 [ 79.323535] flags: 0x200000000000000(node=0|zone=2) [ 79.328414] page_type: f5(slab) [ 79.331562] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 79.339309] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 79.347056] page dumped because: kasan: bad access detected [ 79.352628] [ 79.354126] Memory state around the buggy address: [ 79.358918] ffff888104ee9600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 79.366139] ffff888104ee9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.373358] >ffff888104ee9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 79.380576] ^ [ 79.387708] ffff888104ee9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.394929] ffff888104ee9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.402156] ================================================================== [ 78.636281] ================================================================== [ 78.643529] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0 [ 78.650408] Write of size 121 at addr ffff888104ee9700 by task kunit_try_catch/328 [ 78.657975] [ 78.659476] CPU: 1 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 78.659484] Tainted: [B]=BAD_PAGE, [N]=TEST [ 78.659486] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 78.659489] Call Trace: [ 78.659491] <TASK> [ 78.659493] dump_stack_lvl+0x73/0xb0 [ 78.659497] print_report+0xd1/0x650 [ 78.659501] ? __virt_addr_valid+0x1db/0x2d0 [ 78.659505] ? strncpy_from_user+0x2e/0x1d0 [ 78.659509] ? kasan_complete_mode_report_info+0x2a/0x200 [ 78.659514] ? strncpy_from_user+0x2e/0x1d0 [ 78.659518] kasan_report+0x141/0x180 [ 78.659522] ? strncpy_from_user+0x2e/0x1d0 [ 78.659527] kasan_check_range+0x10c/0x1c0 [ 78.659532] __kasan_check_write+0x18/0x20 [ 78.659536] strncpy_from_user+0x2e/0x1d0 [ 78.659540] ? __kasan_check_read+0x15/0x20 [ 78.659544] copy_user_test_oob+0x760/0x10f0 [ 78.659548] ? __pfx_copy_user_test_oob+0x10/0x10 [ 78.659552] ? finish_task_switch.isra.0+0x153/0x700 [ 78.659556] ? __switch_to+0x5d9/0xf60 [ 78.659560] ? dequeue_task_fair+0x166/0x4e0 [ 78.659565] ? __schedule+0x10cc/0x2b30 [ 78.659569] ? ktime_get_ts64+0x83/0x230 [ 78.659574] kunit_try_run_case+0x1a2/0x480 [ 78.659579] ? __pfx_kunit_try_run_case+0x10/0x10 [ 78.659583] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 78.659588] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 78.659593] ? __kthread_parkme+0x82/0x180 [ 78.659597] ? preempt_count_sub+0x50/0x80 [ 78.659602] ? __pfx_kunit_try_run_case+0x10/0x10 [ 78.659606] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 78.659611] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 78.659615] kthread+0x334/0x6f0 [ 78.659619] ? trace_preempt_on+0x20/0xc0 [ 78.659623] ? __pfx_kthread+0x10/0x10 [ 78.659628] ? _raw_spin_unlock_irq+0x47/0x80 [ 78.659632] ? calculate_sigpending+0x7b/0xa0 [ 78.659636] ? __pfx_kthread+0x10/0x10 [ 78.659641] ret_from_fork+0x3e/0x80 [ 78.659645] ? __pfx_kthread+0x10/0x10 [ 78.659649] ret_from_fork_asm+0x1a/0x30 [ 78.659655] </TASK> [ 78.659657] [ 78.847088] Allocated by task 328: [ 78.850495] kasan_save_stack+0x45/0x70 [ 78.854335] kasan_save_track+0x18/0x40 [ 78.858174] kasan_save_alloc_info+0x3b/0x50 [ 78.862446] __kasan_kmalloc+0xb7/0xc0 [ 78.866198] __kmalloc_noprof+0x1c9/0x500 [ 78.870210] kunit_kmalloc_array+0x25/0x60 [ 78.874310] copy_user_test_oob+0xab/0x10f0 [ 78.878495] kunit_try_run_case+0x1a2/0x480 [ 78.882705] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 78.888123] kthread+0x334/0x6f0 [ 78.891358] ret_from_fork+0x3e/0x80 [ 78.894946] ret_from_fork_asm+0x1a/0x30 [ 78.898880] [ 78.900377] The buggy address belongs to the object at ffff888104ee9700 [ 78.900377] which belongs to the cache kmalloc-128 of size 128 [ 78.912885] The buggy address is located 0 bytes inside of [ 78.912885] allocated 120-byte region [ffff888104ee9700, ffff888104ee9778) [ 78.925320] [ 78.926819] The buggy address belongs to the physical page: [ 78.932392] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9 [ 78.940399] flags: 0x200000000000000(node=0|zone=2) [ 78.945277] page_type: f5(slab) [ 78.948424] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 78.956165] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 78.963912] page dumped because: kasan: bad access detected [ 78.969482] [ 78.970981] Memory state around the buggy address: [ 78.975775] ffff888104ee9600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 78.982994] ffff888104ee9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.990212] >ffff888104ee9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 78.997430] ^ [ 79.004566] ffff888104ee9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.011794] ffff888104ee9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.019019] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 78.253756] ================================================================== [ 78.260997] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 78.268132] Read of size 121 at addr ffff888104ee9700 by task kunit_try_catch/328 [ 78.275619] [ 78.277118] CPU: 1 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 78.277126] Tainted: [B]=BAD_PAGE, [N]=TEST [ 78.277128] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 78.277131] Call Trace: [ 78.277133] <TASK> [ 78.277135] dump_stack_lvl+0x73/0xb0 [ 78.277139] print_report+0xd1/0x650 [ 78.277143] ? __virt_addr_valid+0x1db/0x2d0 [ 78.277147] ? copy_user_test_oob+0x604/0x10f0 [ 78.277150] ? kasan_complete_mode_report_info+0x2a/0x200 [ 78.277155] ? copy_user_test_oob+0x604/0x10f0 [ 78.277158] kasan_report+0x141/0x180 [ 78.277163] ? copy_user_test_oob+0x604/0x10f0 [ 78.277167] kasan_check_range+0x10c/0x1c0 [ 78.277172] __kasan_check_read+0x15/0x20 [ 78.277176] copy_user_test_oob+0x604/0x10f0 [ 78.277180] ? __pfx_copy_user_test_oob+0x10/0x10 [ 78.277184] ? finish_task_switch.isra.0+0x153/0x700 [ 78.277188] ? __switch_to+0x5d9/0xf60 [ 78.277192] ? dequeue_task_fair+0x166/0x4e0 [ 78.277197] ? __schedule+0x10cc/0x2b30 [ 78.277201] ? ktime_get_ts64+0x83/0x230 [ 78.277206] kunit_try_run_case+0x1a2/0x480 [ 78.277211] ? __pfx_kunit_try_run_case+0x10/0x10 [ 78.277215] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 78.277220] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 78.277224] ? __kthread_parkme+0x82/0x180 [ 78.277229] ? preempt_count_sub+0x50/0x80 [ 78.277233] ? __pfx_kunit_try_run_case+0x10/0x10 [ 78.277238] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 78.277242] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 78.277246] kthread+0x334/0x6f0 [ 78.277250] ? trace_preempt_on+0x20/0xc0 [ 78.277255] ? __pfx_kthread+0x10/0x10 [ 78.277259] ? _raw_spin_unlock_irq+0x47/0x80 [ 78.277263] ? calculate_sigpending+0x7b/0xa0 [ 78.277267] ? __pfx_kthread+0x10/0x10 [ 78.277272] ret_from_fork+0x3e/0x80 [ 78.277276] ? __pfx_kthread+0x10/0x10 [ 78.277280] ret_from_fork_asm+0x1a/0x30 [ 78.277286] </TASK> [ 78.277288] [ 78.457141] Allocated by task 328: [ 78.460548] kasan_save_stack+0x45/0x70 [ 78.464386] kasan_save_track+0x18/0x40 [ 78.468227] kasan_save_alloc_info+0x3b/0x50 [ 78.472500] __kasan_kmalloc+0xb7/0xc0 [ 78.476259] __kmalloc_noprof+0x1c9/0x500 [ 78.480274] kunit_kmalloc_array+0x25/0x60 [ 78.484380] copy_user_test_oob+0xab/0x10f0 [ 78.488567] kunit_try_run_case+0x1a2/0x480 [ 78.492762] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 78.498159] kthread+0x334/0x6f0 [ 78.501393] ret_from_fork+0x3e/0x80 [ 78.504981] ret_from_fork_asm+0x1a/0x30 [ 78.508905] [ 78.510405] The buggy address belongs to the object at ffff888104ee9700 [ 78.510405] which belongs to the cache kmalloc-128 of size 128 [ 78.522920] The buggy address is located 0 bytes inside of [ 78.522920] allocated 120-byte region [ffff888104ee9700, ffff888104ee9778) [ 78.535355] [ 78.536854] The buggy address belongs to the physical page: [ 78.542426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9 [ 78.550426] flags: 0x200000000000000(node=0|zone=2) [ 78.555305] page_type: f5(slab) [ 78.558453] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 78.566201] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 78.573946] page dumped because: kasan: bad access detected [ 78.579517] [ 78.581019] Memory state around the buggy address: [ 78.585811] ffff888104ee9600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 78.593038] ffff888104ee9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.600258] >ffff888104ee9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 78.607474] ^ [ 78.614609] ffff888104ee9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.621837] ffff888104ee9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.629056] ================================================================== [ 77.488256] ================================================================== [ 77.495482] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 77.502615] Read of size 121 at addr ffff888104ee9700 by task kunit_try_catch/328 [ 77.510102] [ 77.511601] CPU: 1 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 77.511609] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.511611] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 77.511615] Call Trace: [ 77.511617] <TASK> [ 77.511619] dump_stack_lvl+0x73/0xb0 [ 77.511623] print_report+0xd1/0x650 [ 77.511627] ? __virt_addr_valid+0x1db/0x2d0 [ 77.511631] ? copy_user_test_oob+0x4aa/0x10f0 [ 77.511635] ? kasan_complete_mode_report_info+0x2a/0x200 [ 77.511639] ? copy_user_test_oob+0x4aa/0x10f0 [ 77.511643] kasan_report+0x141/0x180 [ 77.511647] ? copy_user_test_oob+0x4aa/0x10f0 [ 77.511652] kasan_check_range+0x10c/0x1c0 [ 77.511657] __kasan_check_read+0x15/0x20 [ 77.511661] copy_user_test_oob+0x4aa/0x10f0 [ 77.511665] ? __pfx_copy_user_test_oob+0x10/0x10 [ 77.511668] ? finish_task_switch.isra.0+0x153/0x700 [ 77.511690] ? __switch_to+0x5d9/0xf60 [ 77.511694] ? dequeue_task_fair+0x166/0x4e0 [ 77.511699] ? __schedule+0x10cc/0x2b30 [ 77.511704] ? ktime_get_ts64+0x83/0x230 [ 77.511709] kunit_try_run_case+0x1a2/0x480 [ 77.511714] ? __pfx_kunit_try_run_case+0x10/0x10 [ 77.511718] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 77.511735] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 77.511740] ? __kthread_parkme+0x82/0x180 [ 77.511744] ? preempt_count_sub+0x50/0x80 [ 77.511749] ? __pfx_kunit_try_run_case+0x10/0x10 [ 77.511753] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 77.511758] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 77.511762] kthread+0x334/0x6f0 [ 77.511766] ? trace_preempt_on+0x20/0xc0 [ 77.511771] ? __pfx_kthread+0x10/0x10 [ 77.511775] ? _raw_spin_unlock_irq+0x47/0x80 [ 77.511780] ? calculate_sigpending+0x7b/0xa0 [ 77.511784] ? __pfx_kthread+0x10/0x10 [ 77.511788] ret_from_fork+0x3e/0x80 [ 77.511792] ? __pfx_kthread+0x10/0x10 [ 77.511797] ret_from_fork_asm+0x1a/0x30 [ 77.511803] </TASK> [ 77.511805] [ 77.691762] Allocated by task 328: [ 77.695170] kasan_save_stack+0x45/0x70 [ 77.699010] kasan_save_track+0x18/0x40 [ 77.702857] kasan_save_alloc_info+0x3b/0x50 [ 77.707129] __kasan_kmalloc+0xb7/0xc0 [ 77.710880] __kmalloc_noprof+0x1c9/0x500 [ 77.714893] kunit_kmalloc_array+0x25/0x60 [ 77.718994] copy_user_test_oob+0xab/0x10f0 [ 77.723179] kunit_try_run_case+0x1a2/0x480 [ 77.727365] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 77.732764] kthread+0x334/0x6f0 [ 77.735995] ret_from_fork+0x3e/0x80 [ 77.739574] ret_from_fork_asm+0x1a/0x30 [ 77.743500] [ 77.744999] The buggy address belongs to the object at ffff888104ee9700 [ 77.744999] which belongs to the cache kmalloc-128 of size 128 [ 77.757505] The buggy address is located 0 bytes inside of [ 77.757505] allocated 120-byte region [ffff888104ee9700, ffff888104ee9778) [ 77.769934] [ 77.771433] The buggy address belongs to the physical page: [ 77.777006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9 [ 77.785012] flags: 0x200000000000000(node=0|zone=2) [ 77.789893] page_type: f5(slab) [ 77.793038] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 77.800778] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 77.808525] page dumped because: kasan: bad access detected [ 77.814096] [ 77.815595] Memory state around the buggy address: [ 77.820388] ffff888104ee9600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 77.827608] ffff888104ee9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.834837] >ffff888104ee9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 77.842063] ^ [ 77.849195] ffff888104ee9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.856413] ffff888104ee9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.863632] ================================================================== [ 77.870878] ================================================================== [ 77.878098] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 77.885238] Write of size 121 at addr ffff888104ee9700 by task kunit_try_catch/328 [ 77.892804] [ 77.894305] CPU: 1 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 77.894313] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.894316] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 77.894319] Call Trace: [ 77.894321] <TASK> [ 77.894323] dump_stack_lvl+0x73/0xb0 [ 77.894326] print_report+0xd1/0x650 [ 77.894331] ? __virt_addr_valid+0x1db/0x2d0 [ 77.894335] ? copy_user_test_oob+0x557/0x10f0 [ 77.894338] ? kasan_complete_mode_report_info+0x2a/0x200 [ 77.894343] ? copy_user_test_oob+0x557/0x10f0 [ 77.894347] kasan_report+0x141/0x180 [ 77.894351] ? copy_user_test_oob+0x557/0x10f0 [ 77.894356] kasan_check_range+0x10c/0x1c0 [ 77.894360] __kasan_check_write+0x18/0x20 [ 77.894364] copy_user_test_oob+0x557/0x10f0 [ 77.894368] ? __pfx_copy_user_test_oob+0x10/0x10 [ 77.894372] ? finish_task_switch.isra.0+0x153/0x700 [ 77.894376] ? __switch_to+0x5d9/0xf60 [ 77.894380] ? dequeue_task_fair+0x166/0x4e0 [ 77.894385] ? __schedule+0x10cc/0x2b30 [ 77.894389] ? ktime_get_ts64+0x83/0x230 [ 77.894394] kunit_try_run_case+0x1a2/0x480 [ 77.894399] ? __pfx_kunit_try_run_case+0x10/0x10 [ 77.894403] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 77.894408] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 77.894413] ? __kthread_parkme+0x82/0x180 [ 77.894417] ? preempt_count_sub+0x50/0x80 [ 77.894421] ? __pfx_kunit_try_run_case+0x10/0x10 [ 77.894426] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 77.894430] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 77.894434] kthread+0x334/0x6f0 [ 77.894438] ? trace_preempt_on+0x20/0xc0 [ 77.894443] ? __pfx_kthread+0x10/0x10 [ 77.894447] ? _raw_spin_unlock_irq+0x47/0x80 [ 77.894452] ? calculate_sigpending+0x7b/0xa0 [ 77.894456] ? __pfx_kthread+0x10/0x10 [ 77.894460] ret_from_fork+0x3e/0x80 [ 77.894464] ? __pfx_kthread+0x10/0x10 [ 77.894469] ret_from_fork_asm+0x1a/0x30 [ 77.894475] </TASK> [ 77.894476] [ 78.074439] Allocated by task 328: [ 78.077847] kasan_save_stack+0x45/0x70 [ 78.081708] kasan_save_track+0x18/0x40 [ 78.085550] kasan_save_alloc_info+0x3b/0x50 [ 78.089822] __kasan_kmalloc+0xb7/0xc0 [ 78.093574] __kmalloc_noprof+0x1c9/0x500 [ 78.097587] kunit_kmalloc_array+0x25/0x60 [ 78.101705] copy_user_test_oob+0xab/0x10f0 [ 78.105899] kunit_try_run_case+0x1a2/0x480 [ 78.110085] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 78.115485] kthread+0x334/0x6f0 [ 78.118742] ret_from_fork+0x3e/0x80 [ 78.122322] ret_from_fork_asm+0x1a/0x30 [ 78.126255] [ 78.127754] The buggy address belongs to the object at ffff888104ee9700 [ 78.127754] which belongs to the cache kmalloc-128 of size 128 [ 78.140268] The buggy address is located 0 bytes inside of [ 78.140268] allocated 120-byte region [ffff888104ee9700, ffff888104ee9778) [ 78.152704] [ 78.154231] The buggy address belongs to the physical page: [ 78.159803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9 [ 78.167809] flags: 0x200000000000000(node=0|zone=2) [ 78.172705] page_type: f5(slab) [ 78.175879] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 78.183626] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 78.191364] page dumped because: kasan: bad access detected [ 78.196938] [ 78.198437] Memory state around the buggy address: [ 78.203230] ffff888104ee9600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 78.210450] ffff888104ee9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.217703] >ffff888104ee9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 78.224930] ^ [ 78.232061] ffff888104ee9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.239282] ffff888104ee9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.246508] ================================================================== [ 77.105322] ================================================================== [ 77.112555] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 77.119705] Write of size 121 at addr ffff888104ee9700 by task kunit_try_catch/328 [ 77.127296] [ 77.128795] CPU: 1 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 77.128804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.128807] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 77.128810] Call Trace: [ 77.128812] <TASK> [ 77.128814] dump_stack_lvl+0x73/0xb0 [ 77.128819] print_report+0xd1/0x650 [ 77.128823] ? __virt_addr_valid+0x1db/0x2d0 [ 77.128827] ? copy_user_test_oob+0x3fd/0x10f0 [ 77.128831] ? kasan_complete_mode_report_info+0x2a/0x200 [ 77.128836] ? copy_user_test_oob+0x3fd/0x10f0 [ 77.128839] kasan_report+0x141/0x180 [ 77.128844] ? copy_user_test_oob+0x3fd/0x10f0 [ 77.128848] kasan_check_range+0x10c/0x1c0 [ 77.128853] __kasan_check_write+0x18/0x20 [ 77.128857] copy_user_test_oob+0x3fd/0x10f0 [ 77.128861] ? __pfx_copy_user_test_oob+0x10/0x10 [ 77.128865] ? finish_task_switch.isra.0+0x153/0x700 [ 77.128870] ? __switch_to+0x5d9/0xf60 [ 77.128874] ? dequeue_task_fair+0x166/0x4e0 [ 77.128878] ? __schedule+0x10cc/0x2b30 [ 77.128883] ? ktime_get_ts64+0x83/0x230 [ 77.128888] kunit_try_run_case+0x1a2/0x480 [ 77.128893] ? __pfx_kunit_try_run_case+0x10/0x10 [ 77.128897] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 77.128902] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 77.128907] ? __kthread_parkme+0x82/0x180 [ 77.128911] ? preempt_count_sub+0x50/0x80 [ 77.128916] ? __pfx_kunit_try_run_case+0x10/0x10 [ 77.128920] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 77.128925] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 77.128929] kthread+0x334/0x6f0 [ 77.128933] ? trace_preempt_on+0x20/0xc0 [ 77.128938] ? __pfx_kthread+0x10/0x10 [ 77.128942] ? _raw_spin_unlock_irq+0x47/0x80 [ 77.128947] ? calculate_sigpending+0x7b/0xa0 [ 77.128951] ? __pfx_kthread+0x10/0x10 [ 77.128955] ret_from_fork+0x3e/0x80 [ 77.128960] ? __pfx_kthread+0x10/0x10 [ 77.128964] ret_from_fork_asm+0x1a/0x30 [ 77.128970] </TASK> [ 77.128972] [ 77.308957] Allocated by task 328: [ 77.312363] kasan_save_stack+0x45/0x70 [ 77.316202] kasan_save_track+0x18/0x40 [ 77.320041] kasan_save_alloc_info+0x3b/0x50 [ 77.324315] __kasan_kmalloc+0xb7/0xc0 [ 77.328074] __kmalloc_noprof+0x1c9/0x500 [ 77.332086] kunit_kmalloc_array+0x25/0x60 [ 77.336187] copy_user_test_oob+0xab/0x10f0 [ 77.340372] kunit_try_run_case+0x1a2/0x480 [ 77.344557] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 77.349957] kthread+0x334/0x6f0 [ 77.353190] ret_from_fork+0x3e/0x80 [ 77.356769] ret_from_fork_asm+0x1a/0x30 [ 77.360707] [ 77.362229] The buggy address belongs to the object at ffff888104ee9700 [ 77.362229] which belongs to the cache kmalloc-128 of size 128 [ 77.374748] The buggy address is located 0 bytes inside of [ 77.374748] allocated 120-byte region [ffff888104ee9700, ffff888104ee9778) [ 77.387178] [ 77.388704] The buggy address belongs to the physical page: [ 77.394303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9 [ 77.402311] flags: 0x200000000000000(node=0|zone=2) [ 77.407189] page_type: f5(slab) [ 77.410336] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 77.418084] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 77.425831] page dumped because: kasan: bad access detected [ 77.431403] [ 77.432903] Memory state around the buggy address: [ 77.437707] ffff888104ee9600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 77.444933] ffff888104ee9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.452160] >ffff888104ee9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 77.459386] ^ [ 77.466519] ffff888104ee9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.473757] ffff888104ee9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.480982] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-_copy_to_user
[ 76.721839] ================================================================== [ 76.729064] BUG: KASAN: slab-out-of-bounds in _copy_to_user+0x4a/0x70 [ 76.735518] Read of size 121 at addr ffff888104ee9700 by task kunit_try_catch/328 [ 76.742997] [ 76.744499] CPU: 0 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 76.744508] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.744510] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 76.744514] Call Trace: [ 76.744516] <TASK> [ 76.744517] dump_stack_lvl+0x73/0xb0 [ 76.744521] print_report+0xd1/0x650 [ 76.744526] ? __virt_addr_valid+0x1db/0x2d0 [ 76.744530] ? _copy_to_user+0x4a/0x70 [ 76.744534] ? kasan_complete_mode_report_info+0x2a/0x200 [ 76.744539] ? _copy_to_user+0x4a/0x70 [ 76.744544] kasan_report+0x141/0x180 [ 76.744548] ? _copy_to_user+0x4a/0x70 [ 76.744554] kasan_check_range+0x10c/0x1c0 [ 76.744558] __kasan_check_read+0x15/0x20 [ 76.744562] _copy_to_user+0x4a/0x70 [ 76.744567] copy_user_test_oob+0x364/0x10f0 [ 76.744571] ? __pfx_copy_user_test_oob+0x10/0x10 [ 76.744575] ? finish_task_switch.isra.0+0x153/0x700 [ 76.744579] ? __switch_to+0x5d9/0xf60 [ 76.744583] ? dequeue_task_fair+0x166/0x4e0 [ 76.744588] ? __schedule+0x10cc/0x2b30 [ 76.744593] ? ktime_get_ts64+0x83/0x230 [ 76.744598] kunit_try_run_case+0x1a2/0x480 [ 76.744602] ? __pfx_kunit_try_run_case+0x10/0x10 [ 76.744607] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 76.744611] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 76.744616] ? __kthread_parkme+0x82/0x180 [ 76.744620] ? preempt_count_sub+0x50/0x80 [ 76.744625] ? __pfx_kunit_try_run_case+0x10/0x10 [ 76.744630] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 76.744634] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 76.744639] kthread+0x334/0x6f0 [ 76.744643] ? trace_preempt_on+0x20/0xc0 [ 76.744647] ? __pfx_kthread+0x10/0x10 [ 76.744652] ? _raw_spin_unlock_irq+0x47/0x80 [ 76.744656] ? calculate_sigpending+0x7b/0xa0 [ 76.744660] ? __pfx_kthread+0x10/0x10 [ 76.744665] ret_from_fork+0x3e/0x80 [ 76.744669] ? __pfx_kthread+0x10/0x10 [ 76.744691] ret_from_fork_asm+0x1a/0x30 [ 76.744697] </TASK> [ 76.744698] [ 76.926089] Allocated by task 328: [ 76.929495] kasan_save_stack+0x45/0x70 [ 76.933336] kasan_save_track+0x18/0x40 [ 76.937183] kasan_save_alloc_info+0x3b/0x50 [ 76.941455] __kasan_kmalloc+0xb7/0xc0 [ 76.945210] __kmalloc_noprof+0x1c9/0x500 [ 76.949228] kunit_kmalloc_array+0x25/0x60 [ 76.953328] copy_user_test_oob+0xab/0x10f0 [ 76.957516] kunit_try_run_case+0x1a2/0x480 [ 76.961710] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 76.967132] kthread+0x334/0x6f0 [ 76.970365] ret_from_fork+0x3e/0x80 [ 76.973945] ret_from_fork_asm+0x1a/0x30 [ 76.977870] [ 76.979370] The buggy address belongs to the object at ffff888104ee9700 [ 76.979370] which belongs to the cache kmalloc-128 of size 128 [ 76.991884] The buggy address is located 0 bytes inside of [ 76.991884] allocated 120-byte region [ffff888104ee9700, ffff888104ee9778) [ 77.004311] [ 77.005812] The buggy address belongs to the physical page: [ 77.011385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9 [ 77.019391] flags: 0x200000000000000(node=0|zone=2) [ 77.024269] page_type: f5(slab) [ 77.027418] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 77.035164] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 77.042902] page dumped because: kasan: bad access detected [ 77.048475] [ 77.049974] Memory state around the buggy address: [ 77.054768] ffff888104ee9600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 77.061987] ffff888104ee9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.069214] >ffff888104ee9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 77.076433] ^ [ 77.083566] ffff888104ee9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.090783] ffff888104ee9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.098002] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-_copy_from_user
[ 76.331041] ================================================================== [ 76.344368] BUG: KASAN: slab-out-of-bounds in _copy_from_user+0x32/0x90 [ 76.350989] Write of size 121 at addr ffff888104ee9700 by task kunit_try_catch/328 [ 76.358563] [ 76.360064] CPU: 0 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 76.360073] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.360076] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 76.360080] Call Trace: [ 76.360082] <TASK> [ 76.360084] dump_stack_lvl+0x73/0xb0 [ 76.360088] print_report+0xd1/0x650 [ 76.360092] ? __virt_addr_valid+0x1db/0x2d0 [ 76.360096] ? _copy_from_user+0x32/0x90 [ 76.360101] ? kasan_complete_mode_report_info+0x2a/0x200 [ 76.360105] ? _copy_from_user+0x32/0x90 [ 76.360110] kasan_report+0x141/0x180 [ 76.360114] ? _copy_from_user+0x32/0x90 [ 76.360120] kasan_check_range+0x10c/0x1c0 [ 76.360125] __kasan_check_write+0x18/0x20 [ 76.360129] _copy_from_user+0x32/0x90 [ 76.360133] copy_user_test_oob+0x2be/0x10f0 [ 76.360138] ? __pfx_copy_user_test_oob+0x10/0x10 [ 76.360141] ? finish_task_switch.isra.0+0x153/0x700 [ 76.360146] ? __switch_to+0x5d9/0xf60 [ 76.360150] ? dequeue_task_fair+0x166/0x4e0 [ 76.360154] ? __schedule+0x10cc/0x2b30 [ 76.360159] ? ktime_get_ts64+0x83/0x230 [ 76.360164] kunit_try_run_case+0x1a2/0x480 [ 76.360169] ? __pfx_kunit_try_run_case+0x10/0x10 [ 76.360173] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 76.360178] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 76.360183] ? __kthread_parkme+0x82/0x180 [ 76.360187] ? preempt_count_sub+0x50/0x80 [ 76.360191] ? __pfx_kunit_try_run_case+0x10/0x10 [ 76.360196] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 76.360200] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 76.360204] kthread+0x334/0x6f0 [ 76.360209] ? trace_preempt_on+0x20/0xc0 [ 76.360213] ? __pfx_kthread+0x10/0x10 [ 76.360218] ? _raw_spin_unlock_irq+0x47/0x80 [ 76.360222] ? calculate_sigpending+0x7b/0xa0 [ 76.360226] ? __pfx_kthread+0x10/0x10 [ 76.360230] ret_from_fork+0x3e/0x80 [ 76.360234] ? __pfx_kthread+0x10/0x10 [ 76.360239] ret_from_fork_asm+0x1a/0x30 [ 76.360245] </TASK> [ 76.360246] [ 76.542462] Allocated by task 328: [ 76.545867] kasan_save_stack+0x45/0x70 [ 76.549716] kasan_save_track+0x18/0x40 [ 76.553579] kasan_save_alloc_info+0x3b/0x50 [ 76.557851] __kasan_kmalloc+0xb7/0xc0 [ 76.561605] __kmalloc_noprof+0x1c9/0x500 [ 76.565615] kunit_kmalloc_array+0x25/0x60 [ 76.569737] copy_user_test_oob+0xab/0x10f0 [ 76.573929] kunit_try_run_case+0x1a2/0x480 [ 76.578123] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 76.583522] kthread+0x334/0x6f0 [ 76.586762] ret_from_fork+0x3e/0x80 [ 76.590343] ret_from_fork_asm+0x1a/0x30 [ 76.594275] [ 76.595777] The buggy address belongs to the object at ffff888104ee9700 [ 76.595777] which belongs to the cache kmalloc-128 of size 128 [ 76.608291] The buggy address is located 0 bytes inside of [ 76.608291] allocated 120-byte region [ffff888104ee9700, ffff888104ee9778) [ 76.620748] [ 76.622251] The buggy address belongs to the physical page: [ 76.627823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9 [ 76.635830] flags: 0x200000000000000(node=0|zone=2) [ 76.640709] page_type: f5(slab) [ 76.643882] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 76.651623] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 76.659368] page dumped because: kasan: bad access detected [ 76.664940] [ 76.666432] Memory state around the buggy address: [ 76.671224] ffff888104ee9600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.678444] ffff888104ee9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.685661] >ffff888104ee9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 76.692907] ^ [ 76.700039] ffff888104ee9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.707259] ffff888104ee9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.714487] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 75.943037] ================================================================== [ 75.950268] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260 [ 75.957583] Write of size 8 at addr ffff88810633a778 by task kunit_try_catch/324 [ 75.964974] [ 75.966475] CPU: 3 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 75.966484] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.966486] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 75.966489] Call Trace: [ 75.966491] <TASK> [ 75.966493] dump_stack_lvl+0x73/0xb0 [ 75.966497] print_report+0xd1/0x650 [ 75.966502] ? __virt_addr_valid+0x1db/0x2d0 [ 75.966506] ? copy_to_kernel_nofault+0x99/0x260 [ 75.966510] ? kasan_complete_mode_report_info+0x2a/0x200 [ 75.966515] ? copy_to_kernel_nofault+0x99/0x260 [ 75.966520] kasan_report+0x141/0x180 [ 75.966524] ? copy_to_kernel_nofault+0x99/0x260 [ 75.966530] kasan_check_range+0x10c/0x1c0 [ 75.966535] __kasan_check_write+0x18/0x20 [ 75.966539] copy_to_kernel_nofault+0x99/0x260 [ 75.966544] copy_to_kernel_nofault_oob+0x288/0x560 [ 75.966548] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 75.966553] ? finish_task_switch.isra.0+0x153/0x700 [ 75.966558] ? __schedule+0x10cc/0x2b30 [ 75.966562] ? trace_hardirqs_on+0x37/0xe0 [ 75.966568] ? ktime_get_ts64+0x83/0x230 [ 75.966573] kunit_try_run_case+0x1a2/0x480 [ 75.966578] ? __pfx_kunit_try_run_case+0x10/0x10 [ 75.966582] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 75.966587] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 75.966592] ? __kthread_parkme+0x82/0x180 [ 75.966596] ? preempt_count_sub+0x50/0x80 [ 75.966601] ? __pfx_kunit_try_run_case+0x10/0x10 [ 75.966605] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 75.966609] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 75.966614] kthread+0x334/0x6f0 [ 75.966618] ? trace_preempt_on+0x20/0xc0 [ 75.966622] ? __pfx_kthread+0x10/0x10 [ 75.966627] ? _raw_spin_unlock_irq+0x47/0x80 [ 75.966631] ? calculate_sigpending+0x7b/0xa0 [ 75.966635] ? __pfx_kthread+0x10/0x10 [ 75.966639] ret_from_fork+0x3e/0x80 [ 75.966643] ? __pfx_kthread+0x10/0x10 [ 75.966648] ret_from_fork_asm+0x1a/0x30 [ 75.966654] </TASK> [ 75.966656] [ 76.148962] Allocated by task 324: [ 76.152367] kasan_save_stack+0x45/0x70 [ 76.156214] kasan_save_track+0x18/0x40 [ 76.160054] kasan_save_alloc_info+0x3b/0x50 [ 76.164335] __kasan_kmalloc+0xb7/0xc0 [ 76.168086] __kmalloc_cache_noprof+0x189/0x420 [ 76.172620] copy_to_kernel_nofault_oob+0x12f/0x560 [ 76.177508] kunit_try_run_case+0x1a2/0x480 [ 76.181692] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 76.187119] kthread+0x334/0x6f0 [ 76.190359] ret_from_fork+0x3e/0x80 [ 76.193939] ret_from_fork_asm+0x1a/0x30 [ 76.197864] [ 76.199364] The buggy address belongs to the object at ffff88810633a700 [ 76.199364] which belongs to the cache kmalloc-128 of size 128 [ 76.211878] The buggy address is located 0 bytes to the right of [ 76.211878] allocated 120-byte region [ffff88810633a700, ffff88810633a778) [ 76.224835] [ 76.226333] The buggy address belongs to the physical page: [ 76.231906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10633a [ 76.239914] flags: 0x200000000000000(node=0|zone=2) [ 76.244801] page_type: f5(slab) [ 76.247949] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 76.255695] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 76.263443] page dumped because: kasan: bad access detected [ 76.269014] [ 76.270513] Memory state around the buggy address: [ 76.275305] ffff88810633a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.282525] ffff88810633a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.289745] >ffff88810633a700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 76.296973] ^ [ 76.304113] ffff88810633a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.311331] ffff88810633a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.318549] ================================================================== [ 75.555721] ================================================================== [ 75.570618] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260 [ 75.578017] Read of size 8 at addr ffff88810633a778 by task kunit_try_catch/324 [ 75.585324] [ 75.586824] CPU: 3 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 75.586833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.586835] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 75.586839] Call Trace: [ 75.586841] <TASK> [ 75.586843] dump_stack_lvl+0x73/0xb0 [ 75.586847] print_report+0xd1/0x650 [ 75.586852] ? __virt_addr_valid+0x1db/0x2d0 [ 75.586856] ? copy_to_kernel_nofault+0x225/0x260 [ 75.586860] ? kasan_complete_mode_report_info+0x2a/0x200 [ 75.586865] ? copy_to_kernel_nofault+0x225/0x260 [ 75.586870] kasan_report+0x141/0x180 [ 75.586874] ? copy_to_kernel_nofault+0x225/0x260 [ 75.586880] __asan_report_load8_noabort+0x18/0x20 [ 75.586884] copy_to_kernel_nofault+0x225/0x260 [ 75.586889] copy_to_kernel_nofault_oob+0x1ed/0x560 [ 75.586894] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 75.586899] ? finish_task_switch.isra.0+0x153/0x700 [ 75.586904] ? __schedule+0x10cc/0x2b30 [ 75.586908] ? trace_hardirqs_on+0x37/0xe0 [ 75.586915] ? ktime_get_ts64+0x83/0x230 [ 75.586920] kunit_try_run_case+0x1a2/0x480 [ 75.586924] ? __pfx_kunit_try_run_case+0x10/0x10 [ 75.586929] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 75.586934] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 75.586938] ? __kthread_parkme+0x82/0x180 [ 75.586943] ? preempt_count_sub+0x50/0x80 [ 75.586947] ? __pfx_kunit_try_run_case+0x10/0x10 [ 75.586952] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 75.586957] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 75.586961] kthread+0x334/0x6f0 [ 75.586965] ? trace_preempt_on+0x20/0xc0 [ 75.586970] ? __pfx_kthread+0x10/0x10 [ 75.586974] ? _raw_spin_unlock_irq+0x47/0x80 [ 75.586979] ? calculate_sigpending+0x7b/0xa0 [ 75.586983] ? __pfx_kthread+0x10/0x10 [ 75.586987] ret_from_fork+0x3e/0x80 [ 75.586992] ? __pfx_kthread+0x10/0x10 [ 75.586996] ret_from_fork_asm+0x1a/0x30 [ 75.587002] </TASK> [ 75.587004] [ 75.766224] Allocated by task 324: [ 75.769628] kasan_save_stack+0x45/0x70 [ 75.773467] kasan_save_track+0x18/0x40 [ 75.777306] kasan_save_alloc_info+0x3b/0x50 [ 75.781579] __kasan_kmalloc+0xb7/0xc0 [ 75.785331] __kmalloc_cache_noprof+0x189/0x420 [ 75.789865] copy_to_kernel_nofault_oob+0x12f/0x560 [ 75.794745] kunit_try_run_case+0x1a2/0x480 [ 75.798938] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 75.804336] kthread+0x334/0x6f0 [ 75.807569] ret_from_fork+0x3e/0x80 [ 75.811149] ret_from_fork_asm+0x1a/0x30 [ 75.815076] [ 75.816573] The buggy address belongs to the object at ffff88810633a700 [ 75.816573] which belongs to the cache kmalloc-128 of size 128 [ 75.829079] The buggy address is located 0 bytes to the right of [ 75.829079] allocated 120-byte region [ffff88810633a700, ffff88810633a778) [ 75.842026] [ 75.843525] The buggy address belongs to the physical page: [ 75.849098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10633a [ 75.857107] flags: 0x200000000000000(node=0|zone=2) [ 75.861987] page_type: f5(slab) [ 75.865134] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 75.872880] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 75.880628] page dumped because: kasan: bad access detected [ 75.886198] [ 75.887698] Memory state around the buggy address: [ 75.892509] ffff88810633a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.899739] ffff88810633a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.906964] >ffff88810633a700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 75.914181] ^ [ 75.921314] ffff88810633a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.928535] ffff88810633a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.935761] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 64.520218] ================================================================== [ 64.527446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 64.534840] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 64.542239] [ 64.543740] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 64.543747] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.543749] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 64.543753] Call Trace: [ 64.543754] <TASK> [ 64.543756] dump_stack_lvl+0x73/0xb0 [ 64.543760] print_report+0xd1/0x650 [ 64.543764] ? __virt_addr_valid+0x1db/0x2d0 [ 64.543768] ? kasan_atomics_helper+0x50d4/0x5450 [ 64.543772] ? kasan_complete_mode_report_info+0x2a/0x200 [ 64.543777] ? kasan_atomics_helper+0x50d4/0x5450 [ 64.543781] kasan_report+0x141/0x180 [ 64.543785] ? kasan_atomics_helper+0x50d4/0x5450 [ 64.543790] __asan_report_store8_noabort+0x1b/0x30 [ 64.543794] kasan_atomics_helper+0x50d4/0x5450 [ 64.543798] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 64.543803] ? __kmalloc_cache_noprof+0x189/0x420 [ 64.543807] ? kasan_atomics+0x152/0x310 [ 64.543811] kasan_atomics+0x1dc/0x310 [ 64.543814] ? __pfx_kasan_atomics+0x10/0x10 [ 64.543818] ? ktime_get_ts64+0x83/0x230 [ 64.543823] kunit_try_run_case+0x1a2/0x480 [ 64.543827] ? __pfx_kunit_try_run_case+0x10/0x10 [ 64.543832] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 64.543837] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 64.543841] ? __kthread_parkme+0x82/0x180 [ 64.543845] ? preempt_count_sub+0x50/0x80 [ 64.543850] ? __pfx_kunit_try_run_case+0x10/0x10 [ 64.543855] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 64.543859] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 64.543863] kthread+0x334/0x6f0 [ 64.543867] ? trace_preempt_on+0x20/0xc0 [ 64.543872] ? __pfx_kthread+0x10/0x10 [ 64.543876] ? _raw_spin_unlock_irq+0x47/0x80 [ 64.543881] ? calculate_sigpending+0x7b/0xa0 [ 64.543885] ? __pfx_kthread+0x10/0x10 [ 64.543889] ret_from_fork+0x3e/0x80 [ 64.543894] ? __pfx_kthread+0x10/0x10 [ 64.543898] ret_from_fork_asm+0x1a/0x30 [ 64.543904] </TASK> [ 64.543906] [ 64.721510] Allocated by task 308: [ 64.724916] kasan_save_stack+0x45/0x70 [ 64.728755] kasan_save_track+0x18/0x40 [ 64.732594] kasan_save_alloc_info+0x3b/0x50 [ 64.736866] __kasan_kmalloc+0xb7/0xc0 [ 64.740618] __kmalloc_cache_noprof+0x189/0x420 [ 64.745151] kasan_atomics+0x95/0x310 [ 64.748819] kunit_try_run_case+0x1a2/0x480 [ 64.753013] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 64.758412] kthread+0x334/0x6f0 [ 64.761652] ret_from_fork+0x3e/0x80 [ 64.765232] ret_from_fork_asm+0x1a/0x30 [ 64.769164] [ 64.770664] The buggy address belongs to the object at ffff8881061f7500 [ 64.770664] which belongs to the cache kmalloc-64 of size 64 [ 64.783023] The buggy address is located 0 bytes to the right of [ 64.783023] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 64.795884] [ 64.797384] The buggy address belongs to the physical page: [ 64.802954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 64.810954] flags: 0x200000000000000(node=0|zone=2) [ 64.815833] page_type: f5(slab) [ 64.818982] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 64.826737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.834484] page dumped because: kasan: bad access detected [ 64.840057] [ 64.841556] Memory state around the buggy address: [ 64.846347] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.853568] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.860795] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.868021] ^ [ 64.872815] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.880035] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.887262] ================================================================== [ 55.483797] ================================================================== [ 55.491027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 55.498333] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 55.505741] [ 55.507243] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 55.507251] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.507253] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 55.507257] Call Trace: [ 55.507258] <TASK> [ 55.507260] dump_stack_lvl+0x73/0xb0 [ 55.507264] print_report+0xd1/0x650 [ 55.507268] ? __virt_addr_valid+0x1db/0x2d0 [ 55.507272] ? kasan_atomics_helper+0x8f9/0x5450 [ 55.507276] ? kasan_complete_mode_report_info+0x2a/0x200 [ 55.507280] ? kasan_atomics_helper+0x8f9/0x5450 [ 55.507285] kasan_report+0x141/0x180 [ 55.507289] ? kasan_atomics_helper+0x8f9/0x5450 [ 55.507294] kasan_check_range+0x10c/0x1c0 [ 55.507299] __kasan_check_write+0x18/0x20 [ 55.507303] kasan_atomics_helper+0x8f9/0x5450 [ 55.507307] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 55.507312] ? __kmalloc_cache_noprof+0x189/0x420 [ 55.507316] ? kasan_atomics+0x152/0x310 [ 55.507320] kasan_atomics+0x1dc/0x310 [ 55.507323] ? __pfx_kasan_atomics+0x10/0x10 [ 55.507327] ? ktime_get_ts64+0x83/0x230 [ 55.507332] kunit_try_run_case+0x1a2/0x480 [ 55.507336] ? __pfx_kunit_try_run_case+0x10/0x10 [ 55.507341] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 55.507345] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 55.507350] ? __kthread_parkme+0x82/0x180 [ 55.507355] ? preempt_count_sub+0x50/0x80 [ 55.507359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 55.507364] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 55.507368] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 55.507373] kthread+0x334/0x6f0 [ 55.507377] ? trace_preempt_on+0x20/0xc0 [ 55.507381] ? __pfx_kthread+0x10/0x10 [ 55.507386] ? _raw_spin_unlock_irq+0x47/0x80 [ 55.507390] ? calculate_sigpending+0x7b/0xa0 [ 55.507394] ? __pfx_kthread+0x10/0x10 [ 55.507399] ret_from_fork+0x3e/0x80 [ 55.507403] ? __pfx_kthread+0x10/0x10 [ 55.507407] ret_from_fork_asm+0x1a/0x30 [ 55.507413] </TASK> [ 55.507415] [ 55.687994] Allocated by task 308: [ 55.691400] kasan_save_stack+0x45/0x70 [ 55.695249] kasan_save_track+0x18/0x40 [ 55.699088] kasan_save_alloc_info+0x3b/0x50 [ 55.703358] __kasan_kmalloc+0xb7/0xc0 [ 55.707113] __kmalloc_cache_noprof+0x189/0x420 [ 55.711645] kasan_atomics+0x95/0x310 [ 55.715311] kunit_try_run_case+0x1a2/0x480 [ 55.719505] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 55.724903] kthread+0x334/0x6f0 [ 55.728136] ret_from_fork+0x3e/0x80 [ 55.731735] ret_from_fork_asm+0x1a/0x30 [ 55.735666] [ 55.737191] The buggy address belongs to the object at ffff8881061f7500 [ 55.737191] which belongs to the cache kmalloc-64 of size 64 [ 55.749525] The buggy address is located 0 bytes to the right of [ 55.749525] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 55.762386] [ 55.763885] The buggy address belongs to the physical page: [ 55.769457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 55.777456] flags: 0x200000000000000(node=0|zone=2) [ 55.782333] page_type: f5(slab) [ 55.785481] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 55.793219] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.800958] page dumped because: kasan: bad access detected [ 55.806532] [ 55.808031] Memory state around the buggy address: [ 55.812822] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.820043] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.827269] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.834488] ^ [ 55.839283] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.846508] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.853735] ================================================================== [ 64.142438] ================================================================== [ 64.149668] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 64.157111] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 64.164511] [ 64.166013] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 64.166020] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.166022] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 64.166026] Call Trace: [ 64.166028] <TASK> [ 64.166029] dump_stack_lvl+0x73/0xb0 [ 64.166033] print_report+0xd1/0x650 [ 64.166037] ? __virt_addr_valid+0x1db/0x2d0 [ 64.166041] ? kasan_atomics_helper+0x1467/0x5450 [ 64.166045] ? kasan_complete_mode_report_info+0x2a/0x200 [ 64.166050] ? kasan_atomics_helper+0x1467/0x5450 [ 64.166054] kasan_report+0x141/0x180 [ 64.166058] ? kasan_atomics_helper+0x1467/0x5450 [ 64.166063] kasan_check_range+0x10c/0x1c0 [ 64.166068] __kasan_check_write+0x18/0x20 [ 64.166072] kasan_atomics_helper+0x1467/0x5450 [ 64.166076] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 64.166081] ? __kmalloc_cache_noprof+0x189/0x420 [ 64.166085] ? kasan_atomics+0x152/0x310 [ 64.166089] kasan_atomics+0x1dc/0x310 [ 64.166092] ? __pfx_kasan_atomics+0x10/0x10 [ 64.166096] ? ktime_get_ts64+0x83/0x230 [ 64.166101] kunit_try_run_case+0x1a2/0x480 [ 64.166106] ? __pfx_kunit_try_run_case+0x10/0x10 [ 64.166110] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 64.166115] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 64.166119] ? __kthread_parkme+0x82/0x180 [ 64.166124] ? preempt_count_sub+0x50/0x80 [ 64.166129] ? __pfx_kunit_try_run_case+0x10/0x10 [ 64.166133] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 64.166137] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 64.166142] kthread+0x334/0x6f0 [ 64.166146] ? trace_preempt_on+0x20/0xc0 [ 64.166150] ? __pfx_kthread+0x10/0x10 [ 64.166155] ? _raw_spin_unlock_irq+0x47/0x80 [ 64.166159] ? calculate_sigpending+0x7b/0xa0 [ 64.166163] ? __pfx_kthread+0x10/0x10 [ 64.166168] ret_from_fork+0x3e/0x80 [ 64.166172] ? __pfx_kthread+0x10/0x10 [ 64.166176] ret_from_fork_asm+0x1a/0x30 [ 64.166182] </TASK> [ 64.166184] [ 64.347154] Allocated by task 308: [ 64.350560] kasan_save_stack+0x45/0x70 [ 64.354407] kasan_save_track+0x18/0x40 [ 64.358247] kasan_save_alloc_info+0x3b/0x50 [ 64.362527] __kasan_kmalloc+0xb7/0xc0 [ 64.366280] __kmalloc_cache_noprof+0x189/0x420 [ 64.370813] kasan_atomics+0x95/0x310 [ 64.374477] kunit_try_run_case+0x1a2/0x480 [ 64.378664] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 64.384096] kthread+0x334/0x6f0 [ 64.387330] ret_from_fork+0x3e/0x80 [ 64.390909] ret_from_fork_asm+0x1a/0x30 [ 64.394836] [ 64.396334] The buggy address belongs to the object at ffff8881061f7500 [ 64.396334] which belongs to the cache kmalloc-64 of size 64 [ 64.408691] The buggy address is located 0 bytes to the right of [ 64.408691] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 64.421578] [ 64.423078] The buggy address belongs to the physical page: [ 64.428650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 64.436649] flags: 0x200000000000000(node=0|zone=2) [ 64.441527] page_type: f5(slab) [ 64.444691] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 64.452441] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.460188] page dumped because: kasan: bad access detected [ 64.465760] [ 64.467257] Memory state around the buggy address: [ 64.472051] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.479272] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.486500] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.493742] ^ [ 64.498535] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.505755] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.512974] ================================================================== [ 54.729077] ================================================================== [ 54.736310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 54.743623] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 54.751023] [ 54.752525] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 54.752533] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.752535] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 54.752538] Call Trace: [ 54.752540] <TASK> [ 54.752542] dump_stack_lvl+0x73/0xb0 [ 54.752546] print_report+0xd1/0x650 [ 54.752550] ? __virt_addr_valid+0x1db/0x2d0 [ 54.752554] ? kasan_atomics_helper+0x7c7/0x5450 [ 54.752558] ? kasan_complete_mode_report_info+0x2a/0x200 [ 54.752562] ? kasan_atomics_helper+0x7c7/0x5450 [ 54.752567] kasan_report+0x141/0x180 [ 54.752571] ? kasan_atomics_helper+0x7c7/0x5450 [ 54.752576] kasan_check_range+0x10c/0x1c0 [ 54.752581] __kasan_check_write+0x18/0x20 [ 54.752584] kasan_atomics_helper+0x7c7/0x5450 [ 54.752589] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 54.752593] ? __kmalloc_cache_noprof+0x189/0x420 [ 54.752597] ? kasan_atomics+0x152/0x310 [ 54.752601] kasan_atomics+0x1dc/0x310 [ 54.752605] ? __pfx_kasan_atomics+0x10/0x10 [ 54.752609] ? ktime_get_ts64+0x83/0x230 [ 54.752614] kunit_try_run_case+0x1a2/0x480 [ 54.752618] ? __pfx_kunit_try_run_case+0x10/0x10 [ 54.752623] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 54.752627] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 54.752632] ? __kthread_parkme+0x82/0x180 [ 54.752636] ? preempt_count_sub+0x50/0x80 [ 54.752641] ? __pfx_kunit_try_run_case+0x10/0x10 [ 54.752646] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 54.752650] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 54.752654] kthread+0x334/0x6f0 [ 54.752658] ? trace_preempt_on+0x20/0xc0 [ 54.752663] ? __pfx_kthread+0x10/0x10 [ 54.752667] ? _raw_spin_unlock_irq+0x47/0x80 [ 54.752689] ? calculate_sigpending+0x7b/0xa0 [ 54.752693] ? __pfx_kthread+0x10/0x10 [ 54.752698] ret_from_fork+0x3e/0x80 [ 54.752702] ? __pfx_kthread+0x10/0x10 [ 54.752707] ret_from_fork_asm+0x1a/0x30 [ 54.752725] </TASK> [ 54.752727] [ 54.933413] Allocated by task 308: [ 54.936819] kasan_save_stack+0x45/0x70 [ 54.940659] kasan_save_track+0x18/0x40 [ 54.944533] kasan_save_alloc_info+0x3b/0x50 [ 54.948804] __kasan_kmalloc+0xb7/0xc0 [ 54.952558] __kmalloc_cache_noprof+0x189/0x420 [ 54.957091] kasan_atomics+0x95/0x310 [ 54.960757] kunit_try_run_case+0x1a2/0x480 [ 54.964948] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 54.970348] kthread+0x334/0x6f0 [ 54.973582] ret_from_fork+0x3e/0x80 [ 54.977171] ret_from_fork_asm+0x1a/0x30 [ 54.981104] [ 54.982604] The buggy address belongs to the object at ffff8881061f7500 [ 54.982604] which belongs to the cache kmalloc-64 of size 64 [ 54.994945] The buggy address is located 0 bytes to the right of [ 54.994945] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 55.007812] [ 55.009312] The buggy address belongs to the physical page: [ 55.014884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 55.022885] flags: 0x200000000000000(node=0|zone=2) [ 55.027763] page_type: f5(slab) [ 55.030909] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 55.038648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.046386] page dumped because: kasan: bad access detected [ 55.051959] [ 55.053457] Memory state around the buggy address: [ 55.058251] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.065469] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.072718] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.079941] ^ [ 55.084739] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.091962] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.099183] ================================================================== [ 69.049053] ================================================================== [ 69.056272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 69.063663] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 69.071084] [ 69.072582] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 69.072589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.072592] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 69.072595] Call Trace: [ 69.072597] <TASK> [ 69.072598] dump_stack_lvl+0x73/0xb0 [ 69.072602] print_report+0xd1/0x650 [ 69.072606] ? __virt_addr_valid+0x1db/0x2d0 [ 69.072610] ? kasan_atomics_helper+0x1c18/0x5450 [ 69.072614] ? kasan_complete_mode_report_info+0x2a/0x200 [ 69.072618] ? kasan_atomics_helper+0x1c18/0x5450 [ 69.072622] kasan_report+0x141/0x180 [ 69.072627] ? kasan_atomics_helper+0x1c18/0x5450 [ 69.072632] kasan_check_range+0x10c/0x1c0 [ 69.072637] __kasan_check_write+0x18/0x20 [ 69.072640] kasan_atomics_helper+0x1c18/0x5450 [ 69.072645] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 69.072649] ? __kmalloc_cache_noprof+0x189/0x420 [ 69.072653] ? kasan_atomics+0x152/0x310 [ 69.072657] kasan_atomics+0x1dc/0x310 [ 69.072660] ? __pfx_kasan_atomics+0x10/0x10 [ 69.072664] ? ktime_get_ts64+0x83/0x230 [ 69.072669] kunit_try_run_case+0x1a2/0x480 [ 69.072691] ? __pfx_kunit_try_run_case+0x10/0x10 [ 69.072695] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 69.072700] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 69.072717] ? __kthread_parkme+0x82/0x180 [ 69.072722] ? preempt_count_sub+0x50/0x80 [ 69.072726] ? __pfx_kunit_try_run_case+0x10/0x10 [ 69.072731] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 69.072735] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 69.072739] kthread+0x334/0x6f0 [ 69.072743] ? trace_preempt_on+0x20/0xc0 [ 69.072748] ? __pfx_kthread+0x10/0x10 [ 69.072752] ? _raw_spin_unlock_irq+0x47/0x80 [ 69.072757] ? calculate_sigpending+0x7b/0xa0 [ 69.072761] ? __pfx_kthread+0x10/0x10 [ 69.072765] ret_from_fork+0x3e/0x80 [ 69.072769] ? __pfx_kthread+0x10/0x10 [ 69.072773] ret_from_fork_asm+0x1a/0x30 [ 69.072779] </TASK> [ 69.072781] [ 69.253863] Allocated by task 308: [ 69.257269] kasan_save_stack+0x45/0x70 [ 69.261109] kasan_save_track+0x18/0x40 [ 69.264946] kasan_save_alloc_info+0x3b/0x50 [ 69.269219] __kasan_kmalloc+0xb7/0xc0 [ 69.272971] __kmalloc_cache_noprof+0x189/0x420 [ 69.277503] kasan_atomics+0x95/0x310 [ 69.281170] kunit_try_run_case+0x1a2/0x480 [ 69.285357] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 69.290754] kthread+0x334/0x6f0 [ 69.293988] ret_from_fork+0x3e/0x80 [ 69.297568] ret_from_fork_asm+0x1a/0x30 [ 69.301502] [ 69.303001] The buggy address belongs to the object at ffff8881061f7500 [ 69.303001] which belongs to the cache kmalloc-64 of size 64 [ 69.315341] The buggy address is located 0 bytes to the right of [ 69.315341] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 69.328202] [ 69.329707] The buggy address belongs to the physical page: [ 69.335308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 69.343308] flags: 0x200000000000000(node=0|zone=2) [ 69.348186] page_type: f5(slab) [ 69.351334] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 69.359080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.366819] page dumped because: kasan: bad access detected [ 69.372393] [ 69.373890] Memory state around the buggy address: [ 69.378705] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.385946] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.393164] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.400383] ^ [ 69.405176] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.412396] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.419624] ================================================================== [ 64.894503] ================================================================== [ 64.901742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 64.909134] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 64.916528] [ 64.918026] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 64.918034] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.918036] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 64.918039] Call Trace: [ 64.918041] <TASK> [ 64.918043] dump_stack_lvl+0x73/0xb0 [ 64.918046] print_report+0xd1/0x650 [ 64.918051] ? __virt_addr_valid+0x1db/0x2d0 [ 64.918054] ? kasan_atomics_helper+0x151d/0x5450 [ 64.918059] ? kasan_complete_mode_report_info+0x2a/0x200 [ 64.918063] ? kasan_atomics_helper+0x151d/0x5450 [ 64.918067] kasan_report+0x141/0x180 [ 64.918072] ? kasan_atomics_helper+0x151d/0x5450 [ 64.918077] kasan_check_range+0x10c/0x1c0 [ 64.918082] __kasan_check_write+0x18/0x20 [ 64.918085] kasan_atomics_helper+0x151d/0x5450 [ 64.918090] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 64.918094] ? __kmalloc_cache_noprof+0x189/0x420 [ 64.918098] ? kasan_atomics+0x152/0x310 [ 64.918102] kasan_atomics+0x1dc/0x310 [ 64.918105] ? __pfx_kasan_atomics+0x10/0x10 [ 64.918109] ? ktime_get_ts64+0x83/0x230 [ 64.918114] kunit_try_run_case+0x1a2/0x480 [ 64.918119] ? __pfx_kunit_try_run_case+0x10/0x10 [ 64.918123] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 64.918128] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 64.918132] ? __kthread_parkme+0x82/0x180 [ 64.918137] ? preempt_count_sub+0x50/0x80 [ 64.918141] ? __pfx_kunit_try_run_case+0x10/0x10 [ 64.918146] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 64.918150] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 64.918154] kthread+0x334/0x6f0 [ 64.918158] ? trace_preempt_on+0x20/0xc0 [ 64.918163] ? __pfx_kthread+0x10/0x10 [ 64.918167] ? _raw_spin_unlock_irq+0x47/0x80 [ 64.918171] ? calculate_sigpending+0x7b/0xa0 [ 64.918175] ? __pfx_kthread+0x10/0x10 [ 64.918180] ret_from_fork+0x3e/0x80 [ 64.918184] ? __pfx_kthread+0x10/0x10 [ 64.918189] ret_from_fork_asm+0x1a/0x30 [ 64.918194] </TASK> [ 64.918196] [ 65.099135] Allocated by task 308: [ 65.102540] kasan_save_stack+0x45/0x70 [ 65.106387] kasan_save_track+0x18/0x40 [ 65.110227] kasan_save_alloc_info+0x3b/0x50 [ 65.114500] __kasan_kmalloc+0xb7/0xc0 [ 65.118253] __kmalloc_cache_noprof+0x189/0x420 [ 65.122784] kasan_atomics+0x95/0x310 [ 65.126449] kunit_try_run_case+0x1a2/0x480 [ 65.130635] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 65.136033] kthread+0x334/0x6f0 [ 65.139267] ret_from_fork+0x3e/0x80 [ 65.142846] ret_from_fork_asm+0x1a/0x30 [ 65.146771] [ 65.148271] The buggy address belongs to the object at ffff8881061f7500 [ 65.148271] which belongs to the cache kmalloc-64 of size 64 [ 65.160614] The buggy address is located 0 bytes to the right of [ 65.160614] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 65.173482] [ 65.174981] The buggy address belongs to the physical page: [ 65.180554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 65.188560] flags: 0x200000000000000(node=0|zone=2) [ 65.193440] page_type: f5(slab) [ 65.196588] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 65.204333] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.212072] page dumped because: kasan: bad access detected [ 65.217644] [ 65.219144] Memory state around the buggy address: [ 65.223936] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.231156] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.238374] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.245593] ^ [ 65.250385] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.257607] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.264834] ================================================================== [ 54.351904] ================================================================== [ 54.359125] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 54.366432] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 54.373825] [ 54.375326] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 54.375334] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.375336] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 54.375339] Call Trace: [ 54.375341] <TASK> [ 54.375343] dump_stack_lvl+0x73/0xb0 [ 54.375346] print_report+0xd1/0x650 [ 54.375351] ? __virt_addr_valid+0x1db/0x2d0 [ 54.375355] ? kasan_atomics_helper+0x72f/0x5450 [ 54.375359] ? kasan_complete_mode_report_info+0x2a/0x200 [ 54.375363] ? kasan_atomics_helper+0x72f/0x5450 [ 54.375368] kasan_report+0x141/0x180 [ 54.375372] ? kasan_atomics_helper+0x72f/0x5450 [ 54.375377] kasan_check_range+0x10c/0x1c0 [ 54.375382] __kasan_check_write+0x18/0x20 [ 54.375386] kasan_atomics_helper+0x72f/0x5450 [ 54.375390] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 54.375394] ? __kmalloc_cache_noprof+0x189/0x420 [ 54.375398] ? kasan_atomics+0x152/0x310 [ 54.375402] kasan_atomics+0x1dc/0x310 [ 54.375406] ? __pfx_kasan_atomics+0x10/0x10 [ 54.375410] ? ktime_get_ts64+0x83/0x230 [ 54.375415] kunit_try_run_case+0x1a2/0x480 [ 54.375419] ? __pfx_kunit_try_run_case+0x10/0x10 [ 54.375424] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 54.375428] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 54.375433] ? __kthread_parkme+0x82/0x180 [ 54.375437] ? preempt_count_sub+0x50/0x80 [ 54.375442] ? __pfx_kunit_try_run_case+0x10/0x10 [ 54.375446] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 54.375451] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 54.375455] kthread+0x334/0x6f0 [ 54.375459] ? trace_preempt_on+0x20/0xc0 [ 54.375463] ? __pfx_kthread+0x10/0x10 [ 54.375468] ? _raw_spin_unlock_irq+0x47/0x80 [ 54.375472] ? calculate_sigpending+0x7b/0xa0 [ 54.375476] ? __pfx_kthread+0x10/0x10 [ 54.375481] ret_from_fork+0x3e/0x80 [ 54.375485] ? __pfx_kthread+0x10/0x10 [ 54.375489] ret_from_fork_asm+0x1a/0x30 [ 54.375495] </TASK> [ 54.375496] [ 54.556126] Allocated by task 308: [ 54.559532] kasan_save_stack+0x45/0x70 [ 54.563373] kasan_save_track+0x18/0x40 [ 54.567211] kasan_save_alloc_info+0x3b/0x50 [ 54.571486] __kasan_kmalloc+0xb7/0xc0 [ 54.575246] __kmalloc_cache_noprof+0x189/0x420 [ 54.579777] kasan_atomics+0x95/0x310 [ 54.583443] kunit_try_run_case+0x1a2/0x480 [ 54.587628] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 54.593028] kthread+0x334/0x6f0 [ 54.596262] ret_from_fork+0x3e/0x80 [ 54.599849] ret_from_fork_asm+0x1a/0x30 [ 54.603775] [ 54.605275] The buggy address belongs to the object at ffff8881061f7500 [ 54.605275] which belongs to the cache kmalloc-64 of size 64 [ 54.617615] The buggy address is located 0 bytes to the right of [ 54.617615] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 54.630474] [ 54.631973] The buggy address belongs to the physical page: [ 54.637549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 54.645554] flags: 0x200000000000000(node=0|zone=2) [ 54.650433] page_type: f5(slab) [ 54.653581] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 54.661327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.669065] page dumped because: kasan: bad access detected [ 54.674640] [ 54.676138] Memory state around the buggy address: [ 54.680932] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.688158] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.695378] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.702596] ^ [ 54.707387] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.714609] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.721836] ================================================================== [ 52.468093] ================================================================== [ 52.475323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 52.482637] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 52.490030] [ 52.491528] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 52.491536] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.491538] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 52.491541] Call Trace: [ 52.491543] <TASK> [ 52.491545] dump_stack_lvl+0x73/0xb0 [ 52.491549] print_report+0xd1/0x650 [ 52.491553] ? __virt_addr_valid+0x1db/0x2d0 [ 52.491557] ? kasan_atomics_helper+0x4a0/0x5450 [ 52.491561] ? kasan_complete_mode_report_info+0x2a/0x200 [ 52.491565] ? kasan_atomics_helper+0x4a0/0x5450 [ 52.491570] kasan_report+0x141/0x180 [ 52.491574] ? kasan_atomics_helper+0x4a0/0x5450 [ 52.491579] kasan_check_range+0x10c/0x1c0 [ 52.491584] __kasan_check_write+0x18/0x20 [ 52.491588] kasan_atomics_helper+0x4a0/0x5450 [ 52.491592] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 52.491597] ? __kmalloc_cache_noprof+0x189/0x420 [ 52.491601] ? kasan_atomics+0x152/0x310 [ 52.491605] kasan_atomics+0x1dc/0x310 [ 52.491608] ? __pfx_kasan_atomics+0x10/0x10 [ 52.491612] ? ktime_get_ts64+0x83/0x230 [ 52.491617] kunit_try_run_case+0x1a2/0x480 [ 52.491621] ? __pfx_kunit_try_run_case+0x10/0x10 [ 52.491626] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 52.491630] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 52.491635] ? __kthread_parkme+0x82/0x180 [ 52.491639] ? preempt_count_sub+0x50/0x80 [ 52.491644] ? __pfx_kunit_try_run_case+0x10/0x10 [ 52.491649] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 52.491653] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 52.491657] kthread+0x334/0x6f0 [ 52.491661] ? trace_preempt_on+0x20/0xc0 [ 52.491666] ? __pfx_kthread+0x10/0x10 [ 52.491687] ? _raw_spin_unlock_irq+0x47/0x80 [ 52.491692] ? calculate_sigpending+0x7b/0xa0 [ 52.491696] ? __pfx_kthread+0x10/0x10 [ 52.491701] ret_from_fork+0x3e/0x80 [ 52.491705] ? __pfx_kthread+0x10/0x10 [ 52.491722] ret_from_fork_asm+0x1a/0x30 [ 52.491728] </TASK> [ 52.491729] [ 52.672418] Allocated by task 308: [ 52.675824] kasan_save_stack+0x45/0x70 [ 52.679666] kasan_save_track+0x18/0x40 [ 52.683528] kasan_save_alloc_info+0x3b/0x50 [ 52.687802] __kasan_kmalloc+0xb7/0xc0 [ 52.691555] __kmalloc_cache_noprof+0x189/0x420 [ 52.696088] kasan_atomics+0x95/0x310 [ 52.699753] kunit_try_run_case+0x1a2/0x480 [ 52.703939] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 52.709345] kthread+0x334/0x6f0 [ 52.712579] ret_from_fork+0x3e/0x80 [ 52.716166] ret_from_fork_asm+0x1a/0x30 [ 52.720091] [ 52.721591] The buggy address belongs to the object at ffff8881061f7500 [ 52.721591] which belongs to the cache kmalloc-64 of size 64 [ 52.733933] The buggy address is located 0 bytes to the right of [ 52.733933] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 52.746801] [ 52.748300] The buggy address belongs to the physical page: [ 52.753875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 52.761881] flags: 0x200000000000000(node=0|zone=2) [ 52.766760] page_type: f5(slab) [ 52.769906] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 52.777646] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.785383] page dumped because: kasan: bad access detected [ 52.790958] [ 52.792457] Memory state around the buggy address: [ 52.797250] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.804478] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.811703] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.818948] ^ [ 52.823752] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.830977] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.838198] ================================================================== [ 55.860990] ================================================================== [ 55.868208] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 55.875516] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 55.882915] [ 55.884416] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 55.884423] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.884426] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 55.884429] Call Trace: [ 55.884431] <TASK> [ 55.884432] dump_stack_lvl+0x73/0xb0 [ 55.884436] print_report+0xd1/0x650 [ 55.884440] ? __virt_addr_valid+0x1db/0x2d0 [ 55.884444] ? kasan_atomics_helper+0x992/0x5450 [ 55.884448] ? kasan_complete_mode_report_info+0x2a/0x200 [ 55.884453] ? kasan_atomics_helper+0x992/0x5450 [ 55.884457] kasan_report+0x141/0x180 [ 55.884461] ? kasan_atomics_helper+0x992/0x5450 [ 55.884466] kasan_check_range+0x10c/0x1c0 [ 55.884471] __kasan_check_write+0x18/0x20 [ 55.884475] kasan_atomics_helper+0x992/0x5450 [ 55.884480] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 55.884484] ? __kmalloc_cache_noprof+0x189/0x420 [ 55.884488] ? kasan_atomics+0x152/0x310 [ 55.884492] kasan_atomics+0x1dc/0x310 [ 55.884496] ? __pfx_kasan_atomics+0x10/0x10 [ 55.884500] ? ktime_get_ts64+0x83/0x230 [ 55.884504] kunit_try_run_case+0x1a2/0x480 [ 55.884509] ? __pfx_kunit_try_run_case+0x10/0x10 [ 55.884513] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 55.884518] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 55.884523] ? __kthread_parkme+0x82/0x180 [ 55.884527] ? preempt_count_sub+0x50/0x80 [ 55.884532] ? __pfx_kunit_try_run_case+0x10/0x10 [ 55.884537] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 55.884541] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 55.884545] kthread+0x334/0x6f0 [ 55.884550] ? trace_preempt_on+0x20/0xc0 [ 55.884554] ? __pfx_kthread+0x10/0x10 [ 55.884558] ? _raw_spin_unlock_irq+0x47/0x80 [ 55.884563] ? calculate_sigpending+0x7b/0xa0 [ 55.884567] ? __pfx_kthread+0x10/0x10 [ 55.884571] ret_from_fork+0x3e/0x80 [ 55.884575] ? __pfx_kthread+0x10/0x10 [ 55.884580] ret_from_fork_asm+0x1a/0x30 [ 55.884586] </TASK> [ 55.884587] [ 56.065246] Allocated by task 308: [ 56.068650] kasan_save_stack+0x45/0x70 [ 56.072489] kasan_save_track+0x18/0x40 [ 56.076329] kasan_save_alloc_info+0x3b/0x50 [ 56.080602] __kasan_kmalloc+0xb7/0xc0 [ 56.084355] __kmalloc_cache_noprof+0x189/0x420 [ 56.088887] kasan_atomics+0x95/0x310 [ 56.092553] kunit_try_run_case+0x1a2/0x480 [ 56.096748] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 56.102155] kthread+0x334/0x6f0 [ 56.105388] ret_from_fork+0x3e/0x80 [ 56.108967] ret_from_fork_asm+0x1a/0x30 [ 56.112899] [ 56.114399] The buggy address belongs to the object at ffff8881061f7500 [ 56.114399] which belongs to the cache kmalloc-64 of size 64 [ 56.126741] The buggy address is located 0 bytes to the right of [ 56.126741] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 56.139603] [ 56.141099] The buggy address belongs to the physical page: [ 56.146691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 56.154719] flags: 0x200000000000000(node=0|zone=2) [ 56.159605] page_type: f5(slab) [ 56.162752] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 56.170497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.178237] page dumped because: kasan: bad access detected [ 56.183810] [ 56.185307] Memory state around the buggy address: [ 56.190099] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.197320] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.204538] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.211757] ^ [ 56.216549] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.223769] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.230988] ================================================================== [ 57.747478] ================================================================== [ 57.754719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 57.762126] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 57.769433] [ 57.770932] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 57.770939] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.770942] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 57.770945] Call Trace: [ 57.770947] <TASK> [ 57.770948] dump_stack_lvl+0x73/0xb0 [ 57.770952] print_report+0xd1/0x650 [ 57.770956] ? __virt_addr_valid+0x1db/0x2d0 [ 57.770960] ? kasan_atomics_helper+0x4a84/0x5450 [ 57.770965] ? kasan_complete_mode_report_info+0x2a/0x200 [ 57.770969] ? kasan_atomics_helper+0x4a84/0x5450 [ 57.770973] kasan_report+0x141/0x180 [ 57.770978] ? kasan_atomics_helper+0x4a84/0x5450 [ 57.770983] __asan_report_load4_noabort+0x18/0x20 [ 57.770987] kasan_atomics_helper+0x4a84/0x5450 [ 57.770991] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 57.770995] ? __kmalloc_cache_noprof+0x189/0x420 [ 57.770999] ? kasan_atomics+0x152/0x310 [ 57.771004] kasan_atomics+0x1dc/0x310 [ 57.771007] ? __pfx_kasan_atomics+0x10/0x10 [ 57.771011] ? ktime_get_ts64+0x83/0x230 [ 57.771016] kunit_try_run_case+0x1a2/0x480 [ 57.771020] ? __pfx_kunit_try_run_case+0x10/0x10 [ 57.771025] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 57.771029] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 57.771034] ? __kthread_parkme+0x82/0x180 [ 57.771038] ? preempt_count_sub+0x50/0x80 [ 57.771043] ? __pfx_kunit_try_run_case+0x10/0x10 [ 57.771048] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 57.771052] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 57.771056] kthread+0x334/0x6f0 [ 57.771061] ? trace_preempt_on+0x20/0xc0 [ 57.771065] ? __pfx_kthread+0x10/0x10 [ 57.771070] ? _raw_spin_unlock_irq+0x47/0x80 [ 57.771074] ? calculate_sigpending+0x7b/0xa0 [ 57.771078] ? __pfx_kthread+0x10/0x10 [ 57.771083] ret_from_fork+0x3e/0x80 [ 57.771087] ? __pfx_kthread+0x10/0x10 [ 57.771091] ret_from_fork_asm+0x1a/0x30 [ 57.771097] </TASK> [ 57.771099] [ 57.948734] Allocated by task 308: [ 57.952142] kasan_save_stack+0x45/0x70 [ 57.955981] kasan_save_track+0x18/0x40 [ 57.959821] kasan_save_alloc_info+0x3b/0x50 [ 57.964095] __kasan_kmalloc+0xb7/0xc0 [ 57.967854] __kmalloc_cache_noprof+0x189/0x420 [ 57.972387] kasan_atomics+0x95/0x310 [ 57.976051] kunit_try_run_case+0x1a2/0x480 [ 57.980237] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 57.985637] kthread+0x334/0x6f0 [ 57.988870] ret_from_fork+0x3e/0x80 [ 57.992448] ret_from_fork_asm+0x1a/0x30 [ 57.996375] [ 57.997874] The buggy address belongs to the object at ffff8881061f7500 [ 57.997874] which belongs to the cache kmalloc-64 of size 64 [ 58.010215] The buggy address is located 0 bytes to the right of [ 58.010215] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 58.023077] [ 58.024574] The buggy address belongs to the physical page: [ 58.030149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 58.038155] flags: 0x200000000000000(node=0|zone=2) [ 58.043035] page_type: f5(slab) [ 58.046181] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 58.053930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.061703] page dumped because: kasan: bad access detected [ 58.067300] [ 58.068798] Memory state around the buggy address: [ 58.073591] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.080811] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.088029] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.095250] ^ [ 58.100041] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.107259] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.114478] ================================================================== [ 52.845466] ================================================================== [ 52.852719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 52.860122] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 52.867522] [ 52.869022] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 52.869030] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.869032] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 52.869036] Call Trace: [ 52.869038] <TASK> [ 52.869040] dump_stack_lvl+0x73/0xb0 [ 52.869043] print_report+0xd1/0x650 [ 52.869048] ? __virt_addr_valid+0x1db/0x2d0 [ 52.869052] ? kasan_atomics_helper+0x4b3a/0x5450 [ 52.869056] ? kasan_complete_mode_report_info+0x2a/0x200 [ 52.869061] ? kasan_atomics_helper+0x4b3a/0x5450 [ 52.869065] kasan_report+0x141/0x180 [ 52.869069] ? kasan_atomics_helper+0x4b3a/0x5450 [ 52.869075] __asan_report_store4_noabort+0x1b/0x30 [ 52.869079] kasan_atomics_helper+0x4b3a/0x5450 [ 52.869083] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 52.869088] ? __kmalloc_cache_noprof+0x189/0x420 [ 52.869092] ? kasan_atomics+0x152/0x310 [ 52.869096] kasan_atomics+0x1dc/0x310 [ 52.869100] ? __pfx_kasan_atomics+0x10/0x10 [ 52.869104] ? ktime_get_ts64+0x83/0x230 [ 52.869108] kunit_try_run_case+0x1a2/0x480 [ 52.869113] ? __pfx_kunit_try_run_case+0x10/0x10 [ 52.869118] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 52.869122] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 52.869127] ? __kthread_parkme+0x82/0x180 [ 52.869131] ? preempt_count_sub+0x50/0x80 [ 52.869136] ? __pfx_kunit_try_run_case+0x10/0x10 [ 52.869141] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 52.869145] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 52.869149] kthread+0x334/0x6f0 [ 52.869154] ? trace_preempt_on+0x20/0xc0 [ 52.869158] ? __pfx_kthread+0x10/0x10 [ 52.869163] ? _raw_spin_unlock_irq+0x47/0x80 [ 52.869167] ? calculate_sigpending+0x7b/0xa0 [ 52.869171] ? __pfx_kthread+0x10/0x10 [ 52.869176] ret_from_fork+0x3e/0x80 [ 52.869180] ? __pfx_kthread+0x10/0x10 [ 52.869184] ret_from_fork_asm+0x1a/0x30 [ 52.869190] </TASK> [ 52.869192] [ 53.046862] Allocated by task 308: [ 53.050267] kasan_save_stack+0x45/0x70 [ 53.054108] kasan_save_track+0x18/0x40 [ 53.057946] kasan_save_alloc_info+0x3b/0x50 [ 53.062219] __kasan_kmalloc+0xb7/0xc0 [ 53.065973] __kmalloc_cache_noprof+0x189/0x420 [ 53.070512] kasan_atomics+0x95/0x310 [ 53.074179] kunit_try_run_case+0x1a2/0x480 [ 53.078375] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 53.083781] kthread+0x334/0x6f0 [ 53.087015] ret_from_fork+0x3e/0x80 [ 53.090602] ret_from_fork_asm+0x1a/0x30 [ 53.094536] [ 53.096034] The buggy address belongs to the object at ffff8881061f7500 [ 53.096034] which belongs to the cache kmalloc-64 of size 64 [ 53.108366] The buggy address is located 0 bytes to the right of [ 53.108366] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 53.121227] [ 53.122740] The buggy address belongs to the physical page: [ 53.128318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 53.136324] flags: 0x200000000000000(node=0|zone=2) [ 53.141204] page_type: f5(slab) [ 53.144349] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 53.152088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.159828] page dumped because: kasan: bad access detected [ 53.165400] [ 53.166900] Memory state around the buggy address: [ 53.171719] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.178945] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.186164] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.193384] ^ [ 53.198175] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.205394] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.212615] ================================================================== [ 73.244500] ================================================================== [ 73.251744] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 73.259141] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 73.266534] [ 73.268036] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 73.268044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.268046] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 73.268049] Call Trace: [ 73.268051] <TASK> [ 73.268053] dump_stack_lvl+0x73/0xb0 [ 73.268057] print_report+0xd1/0x650 [ 73.268061] ? __virt_addr_valid+0x1db/0x2d0 [ 73.268065] ? kasan_atomics_helper+0x20c8/0x5450 [ 73.268069] ? kasan_complete_mode_report_info+0x2a/0x200 [ 73.268073] ? kasan_atomics_helper+0x20c8/0x5450 [ 73.268078] kasan_report+0x141/0x180 [ 73.268082] ? kasan_atomics_helper+0x20c8/0x5450 [ 73.268087] kasan_check_range+0x10c/0x1c0 [ 73.268092] __kasan_check_write+0x18/0x20 [ 73.268096] kasan_atomics_helper+0x20c8/0x5450 [ 73.268100] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 73.268105] ? __kmalloc_cache_noprof+0x189/0x420 [ 73.268109] ? kasan_atomics+0x152/0x310 [ 73.268113] kasan_atomics+0x1dc/0x310 [ 73.268116] ? __pfx_kasan_atomics+0x10/0x10 [ 73.268120] ? ktime_get_ts64+0x83/0x230 [ 73.268125] kunit_try_run_case+0x1a2/0x480 [ 73.268130] ? __pfx_kunit_try_run_case+0x10/0x10 [ 73.268134] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 73.268139] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 73.268144] ? __kthread_parkme+0x82/0x180 [ 73.268148] ? preempt_count_sub+0x50/0x80 [ 73.268153] ? __pfx_kunit_try_run_case+0x10/0x10 [ 73.268157] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 73.268162] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 73.268166] kthread+0x334/0x6f0 [ 73.268170] ? trace_preempt_on+0x20/0xc0 [ 73.268175] ? __pfx_kthread+0x10/0x10 [ 73.268179] ? _raw_spin_unlock_irq+0x47/0x80 [ 73.268183] ? calculate_sigpending+0x7b/0xa0 [ 73.268187] ? __pfx_kthread+0x10/0x10 [ 73.268192] ret_from_fork+0x3e/0x80 [ 73.268196] ? __pfx_kthread+0x10/0x10 [ 73.268201] ret_from_fork_asm+0x1a/0x30 [ 73.268207] </TASK> [ 73.268208] [ 73.449203] Allocated by task 308: [ 73.452608] kasan_save_stack+0x45/0x70 [ 73.456454] kasan_save_track+0x18/0x40 [ 73.460295] kasan_save_alloc_info+0x3b/0x50 [ 73.464568] __kasan_kmalloc+0xb7/0xc0 [ 73.468319] __kmalloc_cache_noprof+0x189/0x420 [ 73.472851] kasan_atomics+0x95/0x310 [ 73.476519] kunit_try_run_case+0x1a2/0x480 [ 73.480734] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 73.486138] kthread+0x334/0x6f0 [ 73.489378] ret_from_fork+0x3e/0x80 [ 73.492958] ret_from_fork_asm+0x1a/0x30 [ 73.496883] [ 73.498384] The buggy address belongs to the object at ffff8881061f7500 [ 73.498384] which belongs to the cache kmalloc-64 of size 64 [ 73.510746] The buggy address is located 0 bytes to the right of [ 73.510746] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 73.523612] [ 73.525109] The buggy address belongs to the physical page: [ 73.530718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 73.538739] flags: 0x200000000000000(node=0|zone=2) [ 73.543621] page_type: f5(slab) [ 73.546769] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 73.554516] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.562263] page dumped because: kasan: bad access detected [ 73.567834] [ 73.569332] Memory state around the buggy address: [ 73.574125] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.581344] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.588565] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.595785] ^ [ 73.600574] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.607795] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.615015] ================================================================== [ 51.342423] ================================================================== [ 51.349653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 51.357052] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 51.364445] [ 51.365946] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 51.365954] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.365956] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 51.365960] Call Trace: [ 51.365962] <TASK> [ 51.365963] dump_stack_lvl+0x73/0xb0 [ 51.365967] print_report+0xd1/0x650 [ 51.365971] ? __virt_addr_valid+0x1db/0x2d0 [ 51.365975] ? kasan_atomics_helper+0x4b6e/0x5450 [ 51.365980] ? kasan_complete_mode_report_info+0x2a/0x200 [ 51.365984] ? kasan_atomics_helper+0x4b6e/0x5450 [ 51.365988] kasan_report+0x141/0x180 [ 51.365993] ? kasan_atomics_helper+0x4b6e/0x5450 [ 51.365998] __asan_report_store4_noabort+0x1b/0x30 [ 51.366002] kasan_atomics_helper+0x4b6e/0x5450 [ 51.366006] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 51.366011] ? __kmalloc_cache_noprof+0x189/0x420 [ 51.366015] ? kasan_atomics+0x152/0x310 [ 51.366019] kasan_atomics+0x1dc/0x310 [ 51.366022] ? __pfx_kasan_atomics+0x10/0x10 [ 51.366026] ? ktime_get_ts64+0x83/0x230 [ 51.366031] kunit_try_run_case+0x1a2/0x480 [ 51.366036] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.366040] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 51.366045] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 51.366050] ? __kthread_parkme+0x82/0x180 [ 51.366054] ? preempt_count_sub+0x50/0x80 [ 51.366059] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.366063] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 51.366068] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 51.366072] kthread+0x334/0x6f0 [ 51.366076] ? trace_preempt_on+0x20/0xc0 [ 51.366081] ? __pfx_kthread+0x10/0x10 [ 51.366085] ? _raw_spin_unlock_irq+0x47/0x80 [ 51.366089] ? calculate_sigpending+0x7b/0xa0 [ 51.366094] ? __pfx_kthread+0x10/0x10 [ 51.366098] ret_from_fork+0x3e/0x80 [ 51.366102] ? __pfx_kthread+0x10/0x10 [ 51.366107] ret_from_fork_asm+0x1a/0x30 [ 51.366113] </TASK> [ 51.366115] [ 51.543882] Allocated by task 308: [ 51.547288] kasan_save_stack+0x45/0x70 [ 51.551134] kasan_save_track+0x18/0x40 [ 51.554975] kasan_save_alloc_info+0x3b/0x50 [ 51.559245] __kasan_kmalloc+0xb7/0xc0 [ 51.563000] __kmalloc_cache_noprof+0x189/0x420 [ 51.567531] kasan_atomics+0x95/0x310 [ 51.571196] kunit_try_run_case+0x1a2/0x480 [ 51.575384] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 51.580790] kthread+0x334/0x6f0 [ 51.584024] ret_from_fork+0x3e/0x80 [ 51.587611] ret_from_fork_asm+0x1a/0x30 [ 51.591536] [ 51.593035] The buggy address belongs to the object at ffff8881061f7500 [ 51.593035] which belongs to the cache kmalloc-64 of size 64 [ 51.605367] The buggy address is located 0 bytes to the right of [ 51.605367] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 51.618230] [ 51.619733] The buggy address belongs to the physical page: [ 51.625310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 51.633316] flags: 0x200000000000000(node=0|zone=2) [ 51.638195] page_type: f5(slab) [ 51.641342] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 51.649089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.656828] page dumped because: kasan: bad access detected [ 51.662400] [ 51.663901] Memory state around the buggy address: [ 51.668718] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.675948] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.683173] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.690394] ^ [ 51.695186] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.702412] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.709633] ================================================================== [ 73.622258] ================================================================== [ 73.629485] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 73.636879] Read of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 73.644183] [ 73.645718] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 73.645725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.645728] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 73.645731] Call Trace: [ 73.645733] <TASK> [ 73.645735] dump_stack_lvl+0x73/0xb0 [ 73.645738] print_report+0xd1/0x650 [ 73.645743] ? __virt_addr_valid+0x1db/0x2d0 [ 73.645746] ? kasan_atomics_helper+0x4fb2/0x5450 [ 73.645751] ? kasan_complete_mode_report_info+0x2a/0x200 [ 73.645755] ? kasan_atomics_helper+0x4fb2/0x5450 [ 73.645759] kasan_report+0x141/0x180 [ 73.645764] ? kasan_atomics_helper+0x4fb2/0x5450 [ 73.645769] __asan_report_load8_noabort+0x18/0x20 [ 73.645773] kasan_atomics_helper+0x4fb2/0x5450 [ 73.645777] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 73.645782] ? __kmalloc_cache_noprof+0x189/0x420 [ 73.645786] ? kasan_atomics+0x152/0x310 [ 73.645790] kasan_atomics+0x1dc/0x310 [ 73.645793] ? __pfx_kasan_atomics+0x10/0x10 [ 73.645797] ? ktime_get_ts64+0x83/0x230 [ 73.645802] kunit_try_run_case+0x1a2/0x480 [ 73.645807] ? __pfx_kunit_try_run_case+0x10/0x10 [ 73.645811] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 73.645816] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 73.645821] ? __kthread_parkme+0x82/0x180 [ 73.645825] ? preempt_count_sub+0x50/0x80 [ 73.645830] ? __pfx_kunit_try_run_case+0x10/0x10 [ 73.645834] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 73.645839] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 73.645843] kthread+0x334/0x6f0 [ 73.645847] ? trace_preempt_on+0x20/0xc0 [ 73.645852] ? __pfx_kthread+0x10/0x10 [ 73.645856] ? _raw_spin_unlock_irq+0x47/0x80 [ 73.645861] ? calculate_sigpending+0x7b/0xa0 [ 73.645865] ? __pfx_kthread+0x10/0x10 [ 73.645869] ret_from_fork+0x3e/0x80 [ 73.645873] ? __pfx_kthread+0x10/0x10 [ 73.645878] ret_from_fork_asm+0x1a/0x30 [ 73.645884] </TASK> [ 73.645886] [ 73.823462] Allocated by task 308: [ 73.826869] kasan_save_stack+0x45/0x70 [ 73.830709] kasan_save_track+0x18/0x40 [ 73.834573] kasan_save_alloc_info+0x3b/0x50 [ 73.838846] __kasan_kmalloc+0xb7/0xc0 [ 73.842597] __kmalloc_cache_noprof+0x189/0x420 [ 73.847132] kasan_atomics+0x95/0x310 [ 73.850797] kunit_try_run_case+0x1a2/0x480 [ 73.854984] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 73.860391] kthread+0x334/0x6f0 [ 73.863622] ret_from_fork+0x3e/0x80 [ 73.867203] ret_from_fork_asm+0x1a/0x30 [ 73.871136] [ 73.872636] The buggy address belongs to the object at ffff8881061f7500 [ 73.872636] which belongs to the cache kmalloc-64 of size 64 [ 73.884978] The buggy address is located 0 bytes to the right of [ 73.884978] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 73.897847] [ 73.899345] The buggy address belongs to the physical page: [ 73.904917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 73.912917] flags: 0x200000000000000(node=0|zone=2) [ 73.917794] page_type: f5(slab) [ 73.920944] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 73.928707] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.936472] page dumped because: kasan: bad access detected [ 73.942044] [ 73.943544] Memory state around the buggy address: [ 73.948336] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.955565] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.962792] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.970018] ^ [ 73.974810] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.982031] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.989257] ================================================================== [ 56.615566] ================================================================== [ 56.622799] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 56.630112] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 56.637504] [ 56.639005] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 56.639012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.639015] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 56.639018] Call Trace: [ 56.639020] <TASK> [ 56.639022] dump_stack_lvl+0x73/0xb0 [ 56.639025] print_report+0xd1/0x650 [ 56.639030] ? __virt_addr_valid+0x1db/0x2d0 [ 56.639033] ? kasan_atomics_helper+0xac7/0x5450 [ 56.639037] ? kasan_complete_mode_report_info+0x2a/0x200 [ 56.639042] ? kasan_atomics_helper+0xac7/0x5450 [ 56.639046] kasan_report+0x141/0x180 [ 56.639051] ? kasan_atomics_helper+0xac7/0x5450 [ 56.639056] kasan_check_range+0x10c/0x1c0 [ 56.639061] __kasan_check_write+0x18/0x20 [ 56.639064] kasan_atomics_helper+0xac7/0x5450 [ 56.639069] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 56.639073] ? __kmalloc_cache_noprof+0x189/0x420 [ 56.639077] ? kasan_atomics+0x152/0x310 [ 56.639081] kasan_atomics+0x1dc/0x310 [ 56.639084] ? __pfx_kasan_atomics+0x10/0x10 [ 56.639088] ? ktime_get_ts64+0x83/0x230 [ 56.639093] kunit_try_run_case+0x1a2/0x480 [ 56.639098] ? __pfx_kunit_try_run_case+0x10/0x10 [ 56.639102] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 56.639106] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 56.639111] ? __kthread_parkme+0x82/0x180 [ 56.639115] ? preempt_count_sub+0x50/0x80 [ 56.639120] ? __pfx_kunit_try_run_case+0x10/0x10 [ 56.639125] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 56.639129] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 56.639133] kthread+0x334/0x6f0 [ 56.639137] ? trace_preempt_on+0x20/0xc0 [ 56.639142] ? __pfx_kthread+0x10/0x10 [ 56.639146] ? _raw_spin_unlock_irq+0x47/0x80 [ 56.639150] ? calculate_sigpending+0x7b/0xa0 [ 56.639154] ? __pfx_kthread+0x10/0x10 [ 56.639159] ret_from_fork+0x3e/0x80 [ 56.639163] ? __pfx_kthread+0x10/0x10 [ 56.639167] ret_from_fork_asm+0x1a/0x30 [ 56.639173] </TASK> [ 56.639175] [ 56.819912] Allocated by task 308: [ 56.823317] kasan_save_stack+0x45/0x70 [ 56.827157] kasan_save_track+0x18/0x40 [ 56.830996] kasan_save_alloc_info+0x3b/0x50 [ 56.835268] __kasan_kmalloc+0xb7/0xc0 [ 56.839021] __kmalloc_cache_noprof+0x189/0x420 [ 56.843552] kasan_atomics+0x95/0x310 [ 56.847220] kunit_try_run_case+0x1a2/0x480 [ 56.851406] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 56.856804] kthread+0x334/0x6f0 [ 56.860036] ret_from_fork+0x3e/0x80 [ 56.863615] ret_from_fork_asm+0x1a/0x30 [ 56.867542] [ 56.869042] The buggy address belongs to the object at ffff8881061f7500 [ 56.869042] which belongs to the cache kmalloc-64 of size 64 [ 56.881381] The buggy address is located 0 bytes to the right of [ 56.881381] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 56.894244] [ 56.895741] The buggy address belongs to the physical page: [ 56.901315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 56.909322] flags: 0x200000000000000(node=0|zone=2) [ 56.914202] page_type: f5(slab) [ 56.917347] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 56.925086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.932824] page dumped because: kasan: bad access detected [ 56.938399] [ 56.939898] Memory state around the buggy address: [ 56.944706] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.951943] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.959162] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.966381] ^ [ 56.971174] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.978391] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.985611] ================================================================== [ 60.382472] ================================================================== [ 60.389716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 60.397122] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 60.404521] [ 60.406024] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 60.406031] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.406033] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 60.406037] Call Trace: [ 60.406039] <TASK> [ 60.406040] dump_stack_lvl+0x73/0xb0 [ 60.406044] print_report+0xd1/0x650 [ 60.406048] ? __virt_addr_valid+0x1db/0x2d0 [ 60.406052] ? kasan_atomics_helper+0x1079/0x5450 [ 60.406056] ? kasan_complete_mode_report_info+0x2a/0x200 [ 60.406061] ? kasan_atomics_helper+0x1079/0x5450 [ 60.406065] kasan_report+0x141/0x180 [ 60.406069] ? kasan_atomics_helper+0x1079/0x5450 [ 60.406075] kasan_check_range+0x10c/0x1c0 [ 60.406079] __kasan_check_write+0x18/0x20 [ 60.406083] kasan_atomics_helper+0x1079/0x5450 [ 60.406087] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 60.406092] ? __kmalloc_cache_noprof+0x189/0x420 [ 60.406096] ? kasan_atomics+0x152/0x310 [ 60.406100] kasan_atomics+0x1dc/0x310 [ 60.406104] ? __pfx_kasan_atomics+0x10/0x10 [ 60.406107] ? ktime_get_ts64+0x83/0x230 [ 60.406112] kunit_try_run_case+0x1a2/0x480 [ 60.406117] ? __pfx_kunit_try_run_case+0x10/0x10 [ 60.406121] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 60.406126] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 60.406131] ? __kthread_parkme+0x82/0x180 [ 60.406135] ? preempt_count_sub+0x50/0x80 [ 60.406139] ? __pfx_kunit_try_run_case+0x10/0x10 [ 60.406144] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 60.406148] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 60.406153] kthread+0x334/0x6f0 [ 60.406157] ? trace_preempt_on+0x20/0xc0 [ 60.406161] ? __pfx_kthread+0x10/0x10 [ 60.406166] ? _raw_spin_unlock_irq+0x47/0x80 [ 60.406170] ? calculate_sigpending+0x7b/0xa0 [ 60.406174] ? __pfx_kthread+0x10/0x10 [ 60.406179] ret_from_fork+0x3e/0x80 [ 60.406183] ? __pfx_kthread+0x10/0x10 [ 60.406187] ret_from_fork_asm+0x1a/0x30 [ 60.406193] </TASK> [ 60.406195] [ 60.587223] Allocated by task 308: [ 60.590632] kasan_save_stack+0x45/0x70 [ 60.594478] kasan_save_track+0x18/0x40 [ 60.598316] kasan_save_alloc_info+0x3b/0x50 [ 60.602589] __kasan_kmalloc+0xb7/0xc0 [ 60.606343] __kmalloc_cache_noprof+0x189/0x420 [ 60.610875] kasan_atomics+0x95/0x310 [ 60.614541] kunit_try_run_case+0x1a2/0x480 [ 60.618734] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 60.624133] kthread+0x334/0x6f0 [ 60.627368] ret_from_fork+0x3e/0x80 [ 60.630955] ret_from_fork_asm+0x1a/0x30 [ 60.634887] [ 60.636388] The buggy address belongs to the object at ffff8881061f7500 [ 60.636388] which belongs to the cache kmalloc-64 of size 64 [ 60.648740] The buggy address is located 0 bytes to the right of [ 60.648740] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 60.661608] [ 60.663105] The buggy address belongs to the physical page: [ 60.668707] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 60.676741] flags: 0x200000000000000(node=0|zone=2) [ 60.681618] page_type: f5(slab) [ 60.684763] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 60.692502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.700241] page dumped because: kasan: bad access detected [ 60.705813] [ 60.707314] Memory state around the buggy address: [ 60.712104] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.719324] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.726543] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.733762] ^ [ 60.738556] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.745782] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.753003] ================================================================== [ 50.968124] ================================================================== [ 50.975375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 50.982776] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 50.990088] [ 50.991590] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 50.991598] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.991600] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 50.991603] Call Trace: [ 50.991605] <TASK> [ 50.991607] dump_stack_lvl+0x73/0xb0 [ 50.991610] print_report+0xd1/0x650 [ 50.991615] ? __virt_addr_valid+0x1db/0x2d0 [ 50.991619] ? kasan_atomics_helper+0x4b88/0x5450 [ 50.991623] ? kasan_complete_mode_report_info+0x2a/0x200 [ 50.991627] ? kasan_atomics_helper+0x4b88/0x5450 [ 50.991631] kasan_report+0x141/0x180 [ 50.991636] ? kasan_atomics_helper+0x4b88/0x5450 [ 50.991641] __asan_report_load4_noabort+0x18/0x20 [ 50.991645] kasan_atomics_helper+0x4b88/0x5450 [ 50.991649] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 50.991654] ? __kmalloc_cache_noprof+0x189/0x420 [ 50.991657] ? kasan_atomics+0x152/0x310 [ 50.991662] kasan_atomics+0x1dc/0x310 [ 50.991665] ? __pfx_kasan_atomics+0x10/0x10 [ 50.991669] ? ktime_get_ts64+0x83/0x230 [ 50.991691] kunit_try_run_case+0x1a2/0x480 [ 50.991695] ? __pfx_kunit_try_run_case+0x10/0x10 [ 50.991700] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 50.991705] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 50.991722] ? __kthread_parkme+0x82/0x180 [ 50.991726] ? preempt_count_sub+0x50/0x80 [ 50.991731] ? __pfx_kunit_try_run_case+0x10/0x10 [ 50.991736] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 50.991740] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 50.991745] kthread+0x334/0x6f0 [ 50.991749] ? trace_preempt_on+0x20/0xc0 [ 50.991753] ? __pfx_kthread+0x10/0x10 [ 50.991758] ? _raw_spin_unlock_irq+0x47/0x80 [ 50.991762] ? calculate_sigpending+0x7b/0xa0 [ 50.991766] ? __pfx_kthread+0x10/0x10 [ 50.991771] ret_from_fork+0x3e/0x80 [ 50.991775] ? __pfx_kthread+0x10/0x10 [ 50.991779] ret_from_fork_asm+0x1a/0x30 [ 50.991785] </TASK> [ 50.991787] [ 51.169412] Allocated by task 308: [ 51.172819] kasan_save_stack+0x45/0x70 [ 51.176666] kasan_save_track+0x18/0x40 [ 51.180531] kasan_save_alloc_info+0x3b/0x50 [ 51.184803] __kasan_kmalloc+0xb7/0xc0 [ 51.188554] __kmalloc_cache_noprof+0x189/0x420 [ 51.193086] kasan_atomics+0x95/0x310 [ 51.196753] kunit_try_run_case+0x1a2/0x480 [ 51.200939] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 51.206339] kthread+0x334/0x6f0 [ 51.209570] ret_from_fork+0x3e/0x80 [ 51.213149] ret_from_fork_asm+0x1a/0x30 [ 51.217077] [ 51.218574] The buggy address belongs to the object at ffff8881061f7500 [ 51.218574] which belongs to the cache kmalloc-64 of size 64 [ 51.230916] The buggy address is located 0 bytes to the right of [ 51.230916] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 51.243779] [ 51.245277] The buggy address belongs to the physical page: [ 51.250847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 51.258848] flags: 0x200000000000000(node=0|zone=2) [ 51.263741] page_type: f5(slab) [ 51.266892] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 51.274638] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.282386] page dumped because: kasan: bad access detected [ 51.287956] [ 51.289456] Memory state around the buggy address: [ 51.294250] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.301470] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.308704] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.315949] ^ [ 51.320743] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.327961] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.335181] ================================================================== [ 50.593723] ================================================================== [ 50.600999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 50.608391] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 50.615786] [ 50.617285] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 50.617293] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.617295] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 50.617299] Call Trace: [ 50.617300] <TASK> [ 50.617302] dump_stack_lvl+0x73/0xb0 [ 50.617306] print_report+0xd1/0x650 [ 50.617311] ? __virt_addr_valid+0x1db/0x2d0 [ 50.617315] ? kasan_atomics_helper+0x4ba2/0x5450 [ 50.617319] ? kasan_complete_mode_report_info+0x2a/0x200 [ 50.617323] ? kasan_atomics_helper+0x4ba2/0x5450 [ 50.617327] kasan_report+0x141/0x180 [ 50.617332] ? kasan_atomics_helper+0x4ba2/0x5450 [ 50.617337] __asan_report_store4_noabort+0x1b/0x30 [ 50.617341] kasan_atomics_helper+0x4ba2/0x5450 [ 50.617345] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 50.617349] ? __kmalloc_cache_noprof+0x189/0x420 [ 50.617353] ? kasan_atomics+0x152/0x310 [ 50.617358] kasan_atomics+0x1dc/0x310 [ 50.617361] ? __pfx_kasan_atomics+0x10/0x10 [ 50.617365] ? ktime_get_ts64+0x83/0x230 [ 50.617370] kunit_try_run_case+0x1a2/0x480 [ 50.617374] ? __pfx_kunit_try_run_case+0x10/0x10 [ 50.617378] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 50.617383] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 50.617388] ? __kthread_parkme+0x82/0x180 [ 50.617392] ? preempt_count_sub+0x50/0x80 [ 50.617397] ? __pfx_kunit_try_run_case+0x10/0x10 [ 50.617401] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 50.617406] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 50.617410] kthread+0x334/0x6f0 [ 50.617414] ? trace_preempt_on+0x20/0xc0 [ 50.617419] ? __pfx_kthread+0x10/0x10 [ 50.617423] ? _raw_spin_unlock_irq+0x47/0x80 [ 50.617427] ? calculate_sigpending+0x7b/0xa0 [ 50.617432] ? __pfx_kthread+0x10/0x10 [ 50.617436] ret_from_fork+0x3e/0x80 [ 50.617440] ? __pfx_kthread+0x10/0x10 [ 50.617445] ret_from_fork_asm+0x1a/0x30 [ 50.617451] </TASK> [ 50.617452] [ 50.795117] Allocated by task 308: [ 50.798522] kasan_save_stack+0x45/0x70 [ 50.802361] kasan_save_track+0x18/0x40 [ 50.806199] kasan_save_alloc_info+0x3b/0x50 [ 50.810474] __kasan_kmalloc+0xb7/0xc0 [ 50.814232] __kmalloc_cache_noprof+0x189/0x420 [ 50.818766] kasan_atomics+0x95/0x310 [ 50.822432] kunit_try_run_case+0x1a2/0x480 [ 50.826625] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 50.832025] kthread+0x334/0x6f0 [ 50.835258] ret_from_fork+0x3e/0x80 [ 50.838835] ret_from_fork_asm+0x1a/0x30 [ 50.842761] [ 50.844261] The buggy address belongs to the object at ffff8881061f7500 [ 50.844261] which belongs to the cache kmalloc-64 of size 64 [ 50.856604] The buggy address is located 0 bytes to the right of [ 50.856604] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 50.869473] [ 50.870973] The buggy address belongs to the physical page: [ 50.876545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 50.884553] flags: 0x200000000000000(node=0|zone=2) [ 50.889440] page_type: f5(slab) [ 50.892587] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 50.900332] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.908072] page dumped because: kasan: bad access detected [ 50.913644] [ 50.915143] Memory state around the buggy address: [ 50.919937] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.927165] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.934392] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.941617] ^ [ 50.946410] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.953631] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.960848] ================================================================== [ 53.219864] ================================================================== [ 53.227095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 53.234399] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 53.241792] [ 53.243293] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 53.243300] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.243302] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 53.243306] Call Trace: [ 53.243308] <TASK> [ 53.243309] dump_stack_lvl+0x73/0xb0 [ 53.243313] print_report+0xd1/0x650 [ 53.243318] ? __virt_addr_valid+0x1db/0x2d0 [ 53.243321] ? kasan_atomics_helper+0x565/0x5450 [ 53.243325] ? kasan_complete_mode_report_info+0x2a/0x200 [ 53.243330] ? kasan_atomics_helper+0x565/0x5450 [ 53.243334] kasan_report+0x141/0x180 [ 53.243338] ? kasan_atomics_helper+0x565/0x5450 [ 53.243344] kasan_check_range+0x10c/0x1c0 [ 53.243348] __kasan_check_write+0x18/0x20 [ 53.243352] kasan_atomics_helper+0x565/0x5450 [ 53.243357] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 53.243361] ? __kmalloc_cache_noprof+0x189/0x420 [ 53.243365] ? kasan_atomics+0x152/0x310 [ 53.243369] kasan_atomics+0x1dc/0x310 [ 53.243372] ? __pfx_kasan_atomics+0x10/0x10 [ 53.243376] ? ktime_get_ts64+0x83/0x230 [ 53.243381] kunit_try_run_case+0x1a2/0x480 [ 53.243386] ? __pfx_kunit_try_run_case+0x10/0x10 [ 53.243390] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 53.243395] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 53.243400] ? __kthread_parkme+0x82/0x180 [ 53.243404] ? preempt_count_sub+0x50/0x80 [ 53.243409] ? __pfx_kunit_try_run_case+0x10/0x10 [ 53.243413] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 53.243417] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 53.243421] kthread+0x334/0x6f0 [ 53.243426] ? trace_preempt_on+0x20/0xc0 [ 53.243430] ? __pfx_kthread+0x10/0x10 [ 53.243435] ? _raw_spin_unlock_irq+0x47/0x80 [ 53.243439] ? calculate_sigpending+0x7b/0xa0 [ 53.243443] ? __pfx_kthread+0x10/0x10 [ 53.243447] ret_from_fork+0x3e/0x80 [ 53.243452] ? __pfx_kthread+0x10/0x10 [ 53.243456] ret_from_fork_asm+0x1a/0x30 [ 53.243462] </TASK> [ 53.243463] [ 53.424217] Allocated by task 308: [ 53.427623] kasan_save_stack+0x45/0x70 [ 53.431464] kasan_save_track+0x18/0x40 [ 53.435311] kasan_save_alloc_info+0x3b/0x50 [ 53.439583] __kasan_kmalloc+0xb7/0xc0 [ 53.443336] __kmalloc_cache_noprof+0x189/0x420 [ 53.447868] kasan_atomics+0x95/0x310 [ 53.451534] kunit_try_run_case+0x1a2/0x480 [ 53.455738] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 53.461146] kthread+0x334/0x6f0 [ 53.464378] ret_from_fork+0x3e/0x80 [ 53.467955] ret_from_fork_asm+0x1a/0x30 [ 53.471881] [ 53.473381] The buggy address belongs to the object at ffff8881061f7500 [ 53.473381] which belongs to the cache kmalloc-64 of size 64 [ 53.485742] The buggy address is located 0 bytes to the right of [ 53.485742] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 53.498610] [ 53.500108] The buggy address belongs to the physical page: [ 53.505705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 53.513745] flags: 0x200000000000000(node=0|zone=2) [ 53.518630] page_type: f5(slab) [ 53.521774] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 53.529513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.537252] page dumped because: kasan: bad access detected [ 53.542824] [ 53.544323] Memory state around the buggy address: [ 53.549115] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.556335] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.563553] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.570772] ^ [ 53.575568] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.582794] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.590012] ================================================================== [ 61.886452] ================================================================== [ 61.893707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 61.901126] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 61.908519] [ 61.910017] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 61.910024] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.910026] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 61.910030] Call Trace: [ 61.910032] <TASK> [ 61.910033] dump_stack_lvl+0x73/0xb0 [ 61.910037] print_report+0xd1/0x650 [ 61.910041] ? __virt_addr_valid+0x1db/0x2d0 [ 61.910045] ? kasan_atomics_helper+0x1217/0x5450 [ 61.910049] ? kasan_complete_mode_report_info+0x2a/0x200 [ 61.910053] ? kasan_atomics_helper+0x1217/0x5450 [ 61.910058] kasan_report+0x141/0x180 [ 61.910062] ? kasan_atomics_helper+0x1217/0x5450 [ 61.910067] kasan_check_range+0x10c/0x1c0 [ 61.910072] __kasan_check_write+0x18/0x20 [ 61.910076] kasan_atomics_helper+0x1217/0x5450 [ 61.910080] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 61.910085] ? __kmalloc_cache_noprof+0x189/0x420 [ 61.910089] ? kasan_atomics+0x152/0x310 [ 61.910093] kasan_atomics+0x1dc/0x310 [ 61.910096] ? __pfx_kasan_atomics+0x10/0x10 [ 61.910100] ? ktime_get_ts64+0x83/0x230 [ 61.910105] kunit_try_run_case+0x1a2/0x480 [ 61.910109] ? __pfx_kunit_try_run_case+0x10/0x10 [ 61.910114] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 61.910118] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 61.910123] ? __kthread_parkme+0x82/0x180 [ 61.910127] ? preempt_count_sub+0x50/0x80 [ 61.910132] ? __pfx_kunit_try_run_case+0x10/0x10 [ 61.910137] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 61.910141] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 61.910145] kthread+0x334/0x6f0 [ 61.910149] ? trace_preempt_on+0x20/0xc0 [ 61.910154] ? __pfx_kthread+0x10/0x10 [ 61.910158] ? _raw_spin_unlock_irq+0x47/0x80 [ 61.910163] ? calculate_sigpending+0x7b/0xa0 [ 61.910167] ? __pfx_kthread+0x10/0x10 [ 61.910171] ret_from_fork+0x3e/0x80 [ 61.910176] ? __pfx_kthread+0x10/0x10 [ 61.910180] ret_from_fork_asm+0x1a/0x30 [ 61.910186] </TASK> [ 61.910188] [ 62.091193] Allocated by task 308: [ 62.094600] kasan_save_stack+0x45/0x70 [ 62.098439] kasan_save_track+0x18/0x40 [ 62.102277] kasan_save_alloc_info+0x3b/0x50 [ 62.106550] __kasan_kmalloc+0xb7/0xc0 [ 62.110304] __kmalloc_cache_noprof+0x189/0x420 [ 62.114836] kasan_atomics+0x95/0x310 [ 62.118500] kunit_try_run_case+0x1a2/0x480 [ 62.122708] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 62.128131] kthread+0x334/0x6f0 [ 62.131371] ret_from_fork+0x3e/0x80 [ 62.134951] ret_from_fork_asm+0x1a/0x30 [ 62.138875] [ 62.140376] The buggy address belongs to the object at ffff8881061f7500 [ 62.140376] which belongs to the cache kmalloc-64 of size 64 [ 62.152735] The buggy address is located 0 bytes to the right of [ 62.152735] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 62.165595] [ 62.167093] The buggy address belongs to the physical page: [ 62.172666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 62.180708] flags: 0x200000000000000(node=0|zone=2) [ 62.185612] page_type: f5(slab) [ 62.188760] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 62.196507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.204246] page dumped because: kasan: bad access detected [ 62.209817] [ 62.211317] Memory state around the buggy address: [ 62.216110] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.223331] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.230555] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.237775] ^ [ 62.242568] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.249786] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.257007] ================================================================== [ 61.134462] ================================================================== [ 61.141706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 61.149120] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 61.156520] [ 61.158021] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 61.158029] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.158031] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 61.158034] Call Trace: [ 61.158036] <TASK> [ 61.158038] dump_stack_lvl+0x73/0xb0 [ 61.158042] print_report+0xd1/0x650 [ 61.158046] ? __virt_addr_valid+0x1db/0x2d0 [ 61.158050] ? kasan_atomics_helper+0x1148/0x5450 [ 61.158054] ? kasan_complete_mode_report_info+0x2a/0x200 [ 61.158058] ? kasan_atomics_helper+0x1148/0x5450 [ 61.158063] kasan_report+0x141/0x180 [ 61.158067] ? kasan_atomics_helper+0x1148/0x5450 [ 61.158072] kasan_check_range+0x10c/0x1c0 [ 61.158077] __kasan_check_write+0x18/0x20 [ 61.158081] kasan_atomics_helper+0x1148/0x5450 [ 61.158086] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 61.158090] ? __kmalloc_cache_noprof+0x189/0x420 [ 61.158094] ? kasan_atomics+0x152/0x310 [ 61.158098] kasan_atomics+0x1dc/0x310 [ 61.158102] ? __pfx_kasan_atomics+0x10/0x10 [ 61.158105] ? ktime_get_ts64+0x83/0x230 [ 61.158110] kunit_try_run_case+0x1a2/0x480 [ 61.158115] ? __pfx_kunit_try_run_case+0x10/0x10 [ 61.158119] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 61.158124] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 61.158129] ? __kthread_parkme+0x82/0x180 [ 61.158133] ? preempt_count_sub+0x50/0x80 [ 61.158138] ? __pfx_kunit_try_run_case+0x10/0x10 [ 61.158142] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 61.158147] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 61.158151] kthread+0x334/0x6f0 [ 61.158155] ? trace_preempt_on+0x20/0xc0 [ 61.158160] ? __pfx_kthread+0x10/0x10 [ 61.158164] ? _raw_spin_unlock_irq+0x47/0x80 [ 61.158168] ? calculate_sigpending+0x7b/0xa0 [ 61.158172] ? __pfx_kthread+0x10/0x10 [ 61.158177] ret_from_fork+0x3e/0x80 [ 61.158181] ? __pfx_kthread+0x10/0x10 [ 61.158186] ret_from_fork_asm+0x1a/0x30 [ 61.158191] </TASK> [ 61.158193] [ 61.339223] Allocated by task 308: [ 61.342628] kasan_save_stack+0x45/0x70 [ 61.346467] kasan_save_track+0x18/0x40 [ 61.350308] kasan_save_alloc_info+0x3b/0x50 [ 61.354586] __kasan_kmalloc+0xb7/0xc0 [ 61.358341] __kmalloc_cache_noprof+0x189/0x420 [ 61.362882] kasan_atomics+0x95/0x310 [ 61.366548] kunit_try_run_case+0x1a2/0x480 [ 61.370742] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 61.376139] kthread+0x334/0x6f0 [ 61.379373] ret_from_fork+0x3e/0x80 [ 61.382952] ret_from_fork_asm+0x1a/0x30 [ 61.386878] [ 61.388377] The buggy address belongs to the object at ffff8881061f7500 [ 61.388377] which belongs to the cache kmalloc-64 of size 64 [ 61.400742] The buggy address is located 0 bytes to the right of [ 61.400742] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 61.413607] [ 61.415103] The buggy address belongs to the physical page: [ 61.420703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 61.428735] flags: 0x200000000000000(node=0|zone=2) [ 61.433614] page_type: f5(slab) [ 61.436762] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 61.444511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.452256] page dumped because: kasan: bad access detected [ 61.457829] [ 61.459329] Memory state around the buggy address: [ 61.464122] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.471348] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.478569] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.485796] ^ [ 61.490587] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.497806] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.505024] ================================================================== [ 67.915853] ================================================================== [ 67.923096] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 67.930491] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 67.937890] [ 67.939392] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 67.939399] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.939401] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 67.939405] Call Trace: [ 67.939407] <TASK> [ 67.939408] dump_stack_lvl+0x73/0xb0 [ 67.939412] print_report+0xd1/0x650 [ 67.939416] ? __virt_addr_valid+0x1db/0x2d0 [ 67.939420] ? kasan_atomics_helper+0x19e3/0x5450 [ 67.939424] ? kasan_complete_mode_report_info+0x2a/0x200 [ 67.939428] ? kasan_atomics_helper+0x19e3/0x5450 [ 67.939433] kasan_report+0x141/0x180 [ 67.939437] ? kasan_atomics_helper+0x19e3/0x5450 [ 67.939442] kasan_check_range+0x10c/0x1c0 [ 67.939447] __kasan_check_write+0x18/0x20 [ 67.939451] kasan_atomics_helper+0x19e3/0x5450 [ 67.939455] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 67.939459] ? __kmalloc_cache_noprof+0x189/0x420 [ 67.939463] ? kasan_atomics+0x152/0x310 [ 67.939467] kasan_atomics+0x1dc/0x310 [ 67.939471] ? __pfx_kasan_atomics+0x10/0x10 [ 67.939475] ? ktime_get_ts64+0x83/0x230 [ 67.939479] kunit_try_run_case+0x1a2/0x480 [ 67.939484] ? __pfx_kunit_try_run_case+0x10/0x10 [ 67.939488] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 67.939493] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 67.939498] ? __kthread_parkme+0x82/0x180 [ 67.939502] ? preempt_count_sub+0x50/0x80 [ 67.939507] ? __pfx_kunit_try_run_case+0x10/0x10 [ 67.939511] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 67.939515] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 67.939520] kthread+0x334/0x6f0 [ 67.939524] ? trace_preempt_on+0x20/0xc0 [ 67.939529] ? __pfx_kthread+0x10/0x10 [ 67.939533] ? _raw_spin_unlock_irq+0x47/0x80 [ 67.939537] ? calculate_sigpending+0x7b/0xa0 [ 67.939541] ? __pfx_kthread+0x10/0x10 [ 67.939546] ret_from_fork+0x3e/0x80 [ 67.939550] ? __pfx_kthread+0x10/0x10 [ 67.939554] ret_from_fork_asm+0x1a/0x30 [ 67.939560] </TASK> [ 67.939562] [ 68.120557] Allocated by task 308: [ 68.123964] kasan_save_stack+0x45/0x70 [ 68.127810] kasan_save_track+0x18/0x40 [ 68.131650] kasan_save_alloc_info+0x3b/0x50 [ 68.135924] __kasan_kmalloc+0xb7/0xc0 [ 68.139703] __kmalloc_cache_noprof+0x189/0x420 [ 68.144259] kasan_atomics+0x95/0x310 [ 68.147927] kunit_try_run_case+0x1a2/0x480 [ 68.152122] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 68.157529] kthread+0x334/0x6f0 [ 68.160760] ret_from_fork+0x3e/0x80 [ 68.164339] ret_from_fork_asm+0x1a/0x30 [ 68.168265] [ 68.169764] The buggy address belongs to the object at ffff8881061f7500 [ 68.169764] which belongs to the cache kmalloc-64 of size 64 [ 68.182096] The buggy address is located 0 bytes to the right of [ 68.182096] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 68.194957] [ 68.196456] The buggy address belongs to the physical page: [ 68.202030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 68.210038] flags: 0x200000000000000(node=0|zone=2) [ 68.214916] page_type: f5(slab) [ 68.218064] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 68.225811] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.233558] page dumped because: kasan: bad access detected [ 68.239130] [ 68.240629] Memory state around the buggy address: [ 68.245422] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.252641] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.259859] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.267079] ^ [ 68.271873] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.279099] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.286317] ================================================================== [ 57.370133] ================================================================== [ 57.377354] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 57.384666] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 57.392086] [ 57.393584] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 57.393592] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.393594] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 57.393597] Call Trace: [ 57.393599] <TASK> [ 57.393601] dump_stack_lvl+0x73/0xb0 [ 57.393605] print_report+0xd1/0x650 [ 57.393609] ? __virt_addr_valid+0x1db/0x2d0 [ 57.393613] ? kasan_atomics_helper+0xc70/0x5450 [ 57.393617] ? kasan_complete_mode_report_info+0x2a/0x200 [ 57.393621] ? kasan_atomics_helper+0xc70/0x5450 [ 57.393626] kasan_report+0x141/0x180 [ 57.393630] ? kasan_atomics_helper+0xc70/0x5450 [ 57.393635] kasan_check_range+0x10c/0x1c0 [ 57.393640] __kasan_check_write+0x18/0x20 [ 57.393644] kasan_atomics_helper+0xc70/0x5450 [ 57.393648] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 57.393653] ? __kmalloc_cache_noprof+0x189/0x420 [ 57.393657] ? kasan_atomics+0x152/0x310 [ 57.393661] kasan_atomics+0x1dc/0x310 [ 57.393665] ? __pfx_kasan_atomics+0x10/0x10 [ 57.393669] ? ktime_get_ts64+0x83/0x230 [ 57.393691] kunit_try_run_case+0x1a2/0x480 [ 57.393695] ? __pfx_kunit_try_run_case+0x10/0x10 [ 57.393700] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 57.393717] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 57.393722] ? __kthread_parkme+0x82/0x180 [ 57.393726] ? preempt_count_sub+0x50/0x80 [ 57.393732] ? __pfx_kunit_try_run_case+0x10/0x10 [ 57.393736] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 57.393740] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 57.393745] kthread+0x334/0x6f0 [ 57.393749] ? trace_preempt_on+0x20/0xc0 [ 57.393754] ? __pfx_kthread+0x10/0x10 [ 57.393758] ? _raw_spin_unlock_irq+0x47/0x80 [ 57.393763] ? calculate_sigpending+0x7b/0xa0 [ 57.393767] ? __pfx_kthread+0x10/0x10 [ 57.393771] ret_from_fork+0x3e/0x80 [ 57.393775] ? __pfx_kthread+0x10/0x10 [ 57.393780] ret_from_fork_asm+0x1a/0x30 [ 57.393786] </TASK> [ 57.393788] [ 57.574440] Allocated by task 308: [ 57.577846] kasan_save_stack+0x45/0x70 [ 57.581706] kasan_save_track+0x18/0x40 [ 57.585568] kasan_save_alloc_info+0x3b/0x50 [ 57.589839] __kasan_kmalloc+0xb7/0xc0 [ 57.593592] __kmalloc_cache_noprof+0x189/0x420 [ 57.598124] kasan_atomics+0x95/0x310 [ 57.601792] kunit_try_run_case+0x1a2/0x480 [ 57.605986] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 57.611386] kthread+0x334/0x6f0 [ 57.614626] ret_from_fork+0x3e/0x80 [ 57.618206] ret_from_fork_asm+0x1a/0x30 [ 57.622130] [ 57.623631] The buggy address belongs to the object at ffff8881061f7500 [ 57.623631] which belongs to the cache kmalloc-64 of size 64 [ 57.635971] The buggy address is located 0 bytes to the right of [ 57.635971] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 57.648831] [ 57.650330] The buggy address belongs to the physical page: [ 57.655902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 57.663903] flags: 0x200000000000000(node=0|zone=2) [ 57.668792] page_type: f5(slab) [ 57.671938] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 57.679719] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.687466] page dumped because: kasan: bad access detected [ 57.693038] [ 57.694539] Memory state around the buggy address: [ 57.699331] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.706548] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.713768] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.720986] ^ [ 57.725781] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.733009] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.740234] ================================================================== [ 70.178881] ================================================================== [ 70.186109] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 70.193502] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 70.200896] [ 70.202397] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 70.202404] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.202407] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 70.202410] Call Trace: [ 70.202412] <TASK> [ 70.202414] dump_stack_lvl+0x73/0xb0 [ 70.202417] print_report+0xd1/0x650 [ 70.202422] ? __virt_addr_valid+0x1db/0x2d0 [ 70.202425] ? kasan_atomics_helper+0x1d7a/0x5450 [ 70.202429] ? kasan_complete_mode_report_info+0x2a/0x200 [ 70.202434] ? kasan_atomics_helper+0x1d7a/0x5450 [ 70.202438] kasan_report+0x141/0x180 [ 70.202443] ? kasan_atomics_helper+0x1d7a/0x5450 [ 70.202448] kasan_check_range+0x10c/0x1c0 [ 70.202452] __kasan_check_write+0x18/0x20 [ 70.202456] kasan_atomics_helper+0x1d7a/0x5450 [ 70.202461] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 70.202465] ? __kmalloc_cache_noprof+0x189/0x420 [ 70.202469] ? kasan_atomics+0x152/0x310 [ 70.202473] kasan_atomics+0x1dc/0x310 [ 70.202476] ? __pfx_kasan_atomics+0x10/0x10 [ 70.202480] ? ktime_get_ts64+0x83/0x230 [ 70.202485] kunit_try_run_case+0x1a2/0x480 [ 70.202489] ? __pfx_kunit_try_run_case+0x10/0x10 [ 70.202494] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 70.202498] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 70.202503] ? __kthread_parkme+0x82/0x180 [ 70.202507] ? preempt_count_sub+0x50/0x80 [ 70.202512] ? __pfx_kunit_try_run_case+0x10/0x10 [ 70.202516] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 70.202521] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 70.202525] kthread+0x334/0x6f0 [ 70.202529] ? trace_preempt_on+0x20/0xc0 [ 70.202533] ? __pfx_kthread+0x10/0x10 [ 70.202538] ? _raw_spin_unlock_irq+0x47/0x80 [ 70.202542] ? calculate_sigpending+0x7b/0xa0 [ 70.202546] ? __pfx_kthread+0x10/0x10 [ 70.202550] ret_from_fork+0x3e/0x80 [ 70.202555] ? __pfx_kthread+0x10/0x10 [ 70.202559] ret_from_fork_asm+0x1a/0x30 [ 70.202565] </TASK> [ 70.202566] [ 70.383535] Allocated by task 308: [ 70.386943] kasan_save_stack+0x45/0x70 [ 70.390781] kasan_save_track+0x18/0x40 [ 70.394619] kasan_save_alloc_info+0x3b/0x50 [ 70.398892] __kasan_kmalloc+0xb7/0xc0 [ 70.402645] __kmalloc_cache_noprof+0x189/0x420 [ 70.407179] kasan_atomics+0x95/0x310 [ 70.410844] kunit_try_run_case+0x1a2/0x480 [ 70.415028] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 70.420427] kthread+0x334/0x6f0 [ 70.423660] ret_from_fork+0x3e/0x80 [ 70.427266] ret_from_fork_asm+0x1a/0x30 [ 70.431192] [ 70.432707] The buggy address belongs to the object at ffff8881061f7500 [ 70.432707] which belongs to the cache kmalloc-64 of size 64 [ 70.445066] The buggy address is located 0 bytes to the right of [ 70.445066] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 70.457929] [ 70.459425] The buggy address belongs to the physical page: [ 70.465001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 70.473006] flags: 0x200000000000000(node=0|zone=2) [ 70.477885] page_type: f5(slab) [ 70.481034] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 70.488781] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.496527] page dumped because: kasan: bad access detected [ 70.502100] [ 70.503599] Memory state around the buggy address: [ 70.508392] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.515618] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.522837] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.530057] ^ [ 70.534849] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.542069] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.549287] ================================================================== [ 60.760266] ================================================================== [ 60.767501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 60.774901] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 60.782214] [ 60.783737] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 60.783745] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.783747] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 60.783750] Call Trace: [ 60.783752] <TASK> [ 60.783754] dump_stack_lvl+0x73/0xb0 [ 60.783757] print_report+0xd1/0x650 [ 60.783762] ? __virt_addr_valid+0x1db/0x2d0 [ 60.783766] ? kasan_atomics_helper+0x4a1c/0x5450 [ 60.783770] ? kasan_complete_mode_report_info+0x2a/0x200 [ 60.783774] ? kasan_atomics_helper+0x4a1c/0x5450 [ 60.783778] kasan_report+0x141/0x180 [ 60.783782] ? kasan_atomics_helper+0x4a1c/0x5450 [ 60.783788] __asan_report_load4_noabort+0x18/0x20 [ 60.783791] kasan_atomics_helper+0x4a1c/0x5450 [ 60.783796] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 60.783800] ? __kmalloc_cache_noprof+0x189/0x420 [ 60.783804] ? kasan_atomics+0x152/0x310 [ 60.783808] kasan_atomics+0x1dc/0x310 [ 60.783812] ? __pfx_kasan_atomics+0x10/0x10 [ 60.783816] ? ktime_get_ts64+0x83/0x230 [ 60.783821] kunit_try_run_case+0x1a2/0x480 [ 60.783825] ? __pfx_kunit_try_run_case+0x10/0x10 [ 60.783830] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 60.783834] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 60.783839] ? __kthread_parkme+0x82/0x180 [ 60.783843] ? preempt_count_sub+0x50/0x80 [ 60.783848] ? __pfx_kunit_try_run_case+0x10/0x10 [ 60.783853] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 60.783857] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 60.783861] kthread+0x334/0x6f0 [ 60.783865] ? trace_preempt_on+0x20/0xc0 [ 60.783870] ? __pfx_kthread+0x10/0x10 [ 60.783874] ? _raw_spin_unlock_irq+0x47/0x80 [ 60.783879] ? calculate_sigpending+0x7b/0xa0 [ 60.783883] ? __pfx_kthread+0x10/0x10 [ 60.783887] ret_from_fork+0x3e/0x80 [ 60.783891] ? __pfx_kthread+0x10/0x10 [ 60.783896] ret_from_fork_asm+0x1a/0x30 [ 60.783901] </TASK> [ 60.783903] [ 60.961460] Allocated by task 308: [ 60.964867] kasan_save_stack+0x45/0x70 [ 60.968737] kasan_save_track+0x18/0x40 [ 60.972579] kasan_save_alloc_info+0x3b/0x50 [ 60.976853] __kasan_kmalloc+0xb7/0xc0 [ 60.980613] __kmalloc_cache_noprof+0x189/0x420 [ 60.985145] kasan_atomics+0x95/0x310 [ 60.988810] kunit_try_run_case+0x1a2/0x480 [ 60.992995] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 60.998397] kthread+0x334/0x6f0 [ 61.001636] ret_from_fork+0x3e/0x80 [ 61.005214] ret_from_fork_asm+0x1a/0x30 [ 61.009141] [ 61.010641] The buggy address belongs to the object at ffff8881061f7500 [ 61.010641] which belongs to the cache kmalloc-64 of size 64 [ 61.022981] The buggy address is located 0 bytes to the right of [ 61.022981] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 61.035842] [ 61.037343] The buggy address belongs to the physical page: [ 61.042914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 61.050912] flags: 0x200000000000000(node=0|zone=2) [ 61.055792] page_type: f5(slab) [ 61.058938] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 61.066716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.074467] page dumped because: kasan: bad access detected [ 61.080042] [ 61.081539] Memory state around the buggy address: [ 61.086333] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.093551] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.100771] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.107989] ^ [ 61.112782] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.119999] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.127218] ================================================================== [ 55.106458] ================================================================== [ 55.113707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 55.121037] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 55.128431] [ 55.129931] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 55.129939] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.129941] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 55.129945] Call Trace: [ 55.129946] <TASK> [ 55.129948] dump_stack_lvl+0x73/0xb0 [ 55.129952] print_report+0xd1/0x650 [ 55.129956] ? __virt_addr_valid+0x1db/0x2d0 [ 55.129960] ? kasan_atomics_helper+0x860/0x5450 [ 55.129964] ? kasan_complete_mode_report_info+0x2a/0x200 [ 55.129969] ? kasan_atomics_helper+0x860/0x5450 [ 55.129973] kasan_report+0x141/0x180 [ 55.129978] ? kasan_atomics_helper+0x860/0x5450 [ 55.129983] kasan_check_range+0x10c/0x1c0 [ 55.129988] __kasan_check_write+0x18/0x20 [ 55.129992] kasan_atomics_helper+0x860/0x5450 [ 55.129996] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 55.130000] ? __kmalloc_cache_noprof+0x189/0x420 [ 55.130004] ? kasan_atomics+0x152/0x310 [ 55.130009] kasan_atomics+0x1dc/0x310 [ 55.130012] ? __pfx_kasan_atomics+0x10/0x10 [ 55.130016] ? ktime_get_ts64+0x83/0x230 [ 55.130021] kunit_try_run_case+0x1a2/0x480 [ 55.130026] ? __pfx_kunit_try_run_case+0x10/0x10 [ 55.130030] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 55.130035] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 55.130040] ? __kthread_parkme+0x82/0x180 [ 55.130044] ? preempt_count_sub+0x50/0x80 [ 55.130049] ? __pfx_kunit_try_run_case+0x10/0x10 [ 55.130054] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 55.130058] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 55.130062] kthread+0x334/0x6f0 [ 55.130067] ? trace_preempt_on+0x20/0xc0 [ 55.130071] ? __pfx_kthread+0x10/0x10 [ 55.130076] ? _raw_spin_unlock_irq+0x47/0x80 [ 55.130080] ? calculate_sigpending+0x7b/0xa0 [ 55.130084] ? __pfx_kthread+0x10/0x10 [ 55.130089] ret_from_fork+0x3e/0x80 [ 55.130093] ? __pfx_kthread+0x10/0x10 [ 55.130098] ret_from_fork_asm+0x1a/0x30 [ 55.130104] </TASK> [ 55.130105] [ 55.310856] Allocated by task 308: [ 55.314262] kasan_save_stack+0x45/0x70 [ 55.318109] kasan_save_track+0x18/0x40 [ 55.321949] kasan_save_alloc_info+0x3b/0x50 [ 55.326230] __kasan_kmalloc+0xb7/0xc0 [ 55.329990] __kmalloc_cache_noprof+0x189/0x420 [ 55.334523] kasan_atomics+0x95/0x310 [ 55.338189] kunit_try_run_case+0x1a2/0x480 [ 55.342375] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 55.347774] kthread+0x334/0x6f0 [ 55.351005] ret_from_fork+0x3e/0x80 [ 55.354585] ret_from_fork_asm+0x1a/0x30 [ 55.358511] [ 55.360009] The buggy address belongs to the object at ffff8881061f7500 [ 55.360009] which belongs to the cache kmalloc-64 of size 64 [ 55.372342] The buggy address is located 0 bytes to the right of [ 55.372342] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 55.385205] [ 55.386706] The buggy address belongs to the physical page: [ 55.392275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 55.400281] flags: 0x200000000000000(node=0|zone=2) [ 55.405162] page_type: f5(slab) [ 55.408308] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 55.416047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.423794] page dumped because: kasan: bad access detected [ 55.429368] [ 55.430866] Memory state around the buggy address: [ 55.435658] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.442877] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.450097] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.457316] ^ [ 55.462109] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.469335] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.476554] ================================================================== [ 50.211763] ================================================================== [ 50.226645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 50.234051] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 50.241360] [ 50.242861] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 50.242869] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.242872] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 50.242875] Call Trace: [ 50.242877] <TASK> [ 50.242879] dump_stack_lvl+0x73/0xb0 [ 50.242884] print_report+0xd1/0x650 [ 50.242888] ? __virt_addr_valid+0x1db/0x2d0 [ 50.242892] ? kasan_atomics_helper+0x4bbc/0x5450 [ 50.242896] ? kasan_complete_mode_report_info+0x2a/0x200 [ 50.242901] ? kasan_atomics_helper+0x4bbc/0x5450 [ 50.242905] kasan_report+0x141/0x180 [ 50.242910] ? kasan_atomics_helper+0x4bbc/0x5450 [ 50.242915] __asan_report_load4_noabort+0x18/0x20 [ 50.242919] kasan_atomics_helper+0x4bbc/0x5450 [ 50.242923] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 50.242927] ? __kmalloc_cache_noprof+0x189/0x420 [ 50.242931] ? kasan_atomics+0x152/0x310 [ 50.242935] kasan_atomics+0x1dc/0x310 [ 50.242939] ? __pfx_kasan_atomics+0x10/0x10 [ 50.242943] ? ktime_get_ts64+0x83/0x230 [ 50.242948] kunit_try_run_case+0x1a2/0x480 [ 50.242952] ? __pfx_kunit_try_run_case+0x10/0x10 [ 50.242957] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 50.242961] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 50.242966] ? __kthread_parkme+0x82/0x180 [ 50.242970] ? preempt_count_sub+0x50/0x80 [ 50.242975] ? __pfx_kunit_try_run_case+0x10/0x10 [ 50.242980] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 50.242984] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 50.242988] kthread+0x334/0x6f0 [ 50.242993] ? trace_preempt_on+0x20/0xc0 [ 50.242997] ? __pfx_kthread+0x10/0x10 [ 50.243002] ? _raw_spin_unlock_irq+0x47/0x80 [ 50.243006] ? calculate_sigpending+0x7b/0xa0 [ 50.243010] ? __pfx_kthread+0x10/0x10 [ 50.243015] ret_from_fork+0x3e/0x80 [ 50.243019] ? __pfx_kthread+0x10/0x10 [ 50.243023] ret_from_fork_asm+0x1a/0x30 [ 50.243029] </TASK> [ 50.243031] [ 50.420629] Allocated by task 308: [ 50.424036] kasan_save_stack+0x45/0x70 [ 50.427882] kasan_save_track+0x18/0x40 [ 50.431722] kasan_save_alloc_info+0x3b/0x50 [ 50.436020] __kasan_kmalloc+0xb7/0xc0 [ 50.439774] __kmalloc_cache_noprof+0x189/0x420 [ 50.444313] kasan_atomics+0x95/0x310 [ 50.447978] kunit_try_run_case+0x1a2/0x480 [ 50.452165] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 50.457564] kthread+0x334/0x6f0 [ 50.460796] ret_from_fork+0x3e/0x80 [ 50.464377] ret_from_fork_asm+0x1a/0x30 [ 50.468309] [ 50.469809] The buggy address belongs to the object at ffff8881061f7500 [ 50.469809] which belongs to the cache kmalloc-64 of size 64 [ 50.482151] The buggy address is located 0 bytes to the right of [ 50.482151] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 50.495011] [ 50.496512] The buggy address belongs to the physical page: [ 50.502085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 50.510089] flags: 0x200000000000000(node=0|zone=2) [ 50.514969] page_type: f5(slab) [ 50.518118] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 50.525864] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.533610] page dumped because: kasan: bad access detected [ 50.539183] [ 50.540703] Memory state around the buggy address: [ 50.545502] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.552740] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.559966] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.567185] ^ [ 50.571977] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.579197] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.586422] ================================================================== [ 62.638486] ================================================================== [ 62.645737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 62.653131] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 62.660525] [ 62.662025] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 62.662033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.662035] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 62.662038] Call Trace: [ 62.662040] <TASK> [ 62.662041] dump_stack_lvl+0x73/0xb0 [ 62.662045] print_report+0xd1/0x650 [ 62.662049] ? __virt_addr_valid+0x1db/0x2d0 [ 62.662053] ? kasan_atomics_helper+0x12e6/0x5450 [ 62.662057] ? kasan_complete_mode_report_info+0x2a/0x200 [ 62.662062] ? kasan_atomics_helper+0x12e6/0x5450 [ 62.662066] kasan_report+0x141/0x180 [ 62.662070] ? kasan_atomics_helper+0x12e6/0x5450 [ 62.662075] kasan_check_range+0x10c/0x1c0 [ 62.662080] __kasan_check_write+0x18/0x20 [ 62.662084] kasan_atomics_helper+0x12e6/0x5450 [ 62.662088] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 62.662093] ? __kmalloc_cache_noprof+0x189/0x420 [ 62.662097] ? kasan_atomics+0x152/0x310 [ 62.662101] kasan_atomics+0x1dc/0x310 [ 62.662104] ? __pfx_kasan_atomics+0x10/0x10 [ 62.662108] ? ktime_get_ts64+0x83/0x230 [ 62.662113] kunit_try_run_case+0x1a2/0x480 [ 62.662117] ? __pfx_kunit_try_run_case+0x10/0x10 [ 62.662122] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 62.662126] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 62.662131] ? __kthread_parkme+0x82/0x180 [ 62.662136] ? preempt_count_sub+0x50/0x80 [ 62.662140] ? __pfx_kunit_try_run_case+0x10/0x10 [ 62.662145] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 62.662149] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 62.662153] kthread+0x334/0x6f0 [ 62.662158] ? trace_preempt_on+0x20/0xc0 [ 62.662162] ? __pfx_kthread+0x10/0x10 [ 62.662167] ? _raw_spin_unlock_irq+0x47/0x80 [ 62.662171] ? calculate_sigpending+0x7b/0xa0 [ 62.662175] ? __pfx_kthread+0x10/0x10 [ 62.662180] ret_from_fork+0x3e/0x80 [ 62.662184] ? __pfx_kthread+0x10/0x10 [ 62.662188] ret_from_fork_asm+0x1a/0x30 [ 62.662194] </TASK> [ 62.662196] [ 62.843226] Allocated by task 308: [ 62.846634] kasan_save_stack+0x45/0x70 [ 62.850481] kasan_save_track+0x18/0x40 [ 62.854318] kasan_save_alloc_info+0x3b/0x50 [ 62.858592] __kasan_kmalloc+0xb7/0xc0 [ 62.862345] __kmalloc_cache_noprof+0x189/0x420 [ 62.866876] kasan_atomics+0x95/0x310 [ 62.870542] kunit_try_run_case+0x1a2/0x480 [ 62.874749] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 62.880155] kthread+0x334/0x6f0 [ 62.883396] ret_from_fork+0x3e/0x80 [ 62.886984] ret_from_fork_asm+0x1a/0x30 [ 62.890917] [ 62.892416] The buggy address belongs to the object at ffff8881061f7500 [ 62.892416] which belongs to the cache kmalloc-64 of size 64 [ 62.904756] The buggy address is located 0 bytes to the right of [ 62.904756] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 62.917618] [ 62.919118] The buggy address belongs to the physical page: [ 62.924717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 62.932735] flags: 0x200000000000000(node=0|zone=2) [ 62.937619] page_type: f5(slab) [ 62.940768] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 62.948514] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.956261] page dumped because: kasan: bad access detected [ 62.961833] [ 62.963333] Memory state around the buggy address: [ 62.968127] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.975353] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.982571] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.989790] ^ [ 62.994584] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.001812] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.009031] ================================================================== [ 70.934251] ================================================================== [ 70.941480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 70.948880] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 70.956273] [ 70.957774] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 70.957782] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.957784] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 70.957787] Call Trace: [ 70.957789] <TASK> [ 70.957791] dump_stack_lvl+0x73/0xb0 [ 70.957795] print_report+0xd1/0x650 [ 70.957799] ? __virt_addr_valid+0x1db/0x2d0 [ 70.957803] ? kasan_atomics_helper+0x1eaa/0x5450 [ 70.957807] ? kasan_complete_mode_report_info+0x2a/0x200 [ 70.957811] ? kasan_atomics_helper+0x1eaa/0x5450 [ 70.957816] kasan_report+0x141/0x180 [ 70.957820] ? kasan_atomics_helper+0x1eaa/0x5450 [ 70.957825] kasan_check_range+0x10c/0x1c0 [ 70.957830] __kasan_check_write+0x18/0x20 [ 70.957834] kasan_atomics_helper+0x1eaa/0x5450 [ 70.957838] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 70.957843] ? __kmalloc_cache_noprof+0x189/0x420 [ 70.957847] ? kasan_atomics+0x152/0x310 [ 70.957851] kasan_atomics+0x1dc/0x310 [ 70.957854] ? __pfx_kasan_atomics+0x10/0x10 [ 70.957858] ? ktime_get_ts64+0x83/0x230 [ 70.957863] kunit_try_run_case+0x1a2/0x480 [ 70.957867] ? __pfx_kunit_try_run_case+0x10/0x10 [ 70.957872] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 70.957876] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 70.957881] ? __kthread_parkme+0x82/0x180 [ 70.957885] ? preempt_count_sub+0x50/0x80 [ 70.957890] ? __pfx_kunit_try_run_case+0x10/0x10 [ 70.957895] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 70.957899] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 70.957903] kthread+0x334/0x6f0 [ 70.957907] ? trace_preempt_on+0x20/0xc0 [ 70.957912] ? __pfx_kthread+0x10/0x10 [ 70.957916] ? _raw_spin_unlock_irq+0x47/0x80 [ 70.957921] ? calculate_sigpending+0x7b/0xa0 [ 70.957925] ? __pfx_kthread+0x10/0x10 [ 70.957929] ret_from_fork+0x3e/0x80 [ 70.957933] ? __pfx_kthread+0x10/0x10 [ 70.957938] ret_from_fork_asm+0x1a/0x30 [ 70.957944] </TASK> [ 70.957945] [ 71.138912] Allocated by task 308: [ 71.142321] kasan_save_stack+0x45/0x70 [ 71.146167] kasan_save_track+0x18/0x40 [ 71.150006] kasan_save_alloc_info+0x3b/0x50 [ 71.154279] __kasan_kmalloc+0xb7/0xc0 [ 71.158032] __kmalloc_cache_noprof+0x189/0x420 [ 71.162563] kasan_atomics+0x95/0x310 [ 71.166231] kunit_try_run_case+0x1a2/0x480 [ 71.170424] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 71.175823] kthread+0x334/0x6f0 [ 71.179056] ret_from_fork+0x3e/0x80 [ 71.182635] ret_from_fork_asm+0x1a/0x30 [ 71.186561] [ 71.188060] The buggy address belongs to the object at ffff8881061f7500 [ 71.188060] which belongs to the cache kmalloc-64 of size 64 [ 71.200402] The buggy address is located 0 bytes to the right of [ 71.200402] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 71.213263] [ 71.214693] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 71.214760] The buggy address belongs to the physical page: [ 71.220854] rcu: 2-....: (54 ticks this GP) idle=3e8c/1/0x4000000000000000 softirq=317/318 fqs=230 [ 71.226423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 71.235455] rcu: (detected by 1, t=21023 jiffies, g=-359, q=45 ncpus=4) [ 71.243444] flags: 0x200000000000000(node=0|zone=2) [ 71.250136] Sending NMI from CPU 1 to CPUs 2: [ 71.250143] NMI backtrace for cpu 2 [ 71.250146] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 71.250154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.250156] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 71.250160] RIP: 0010:io_serial_out+0x6c/0xa0 [ 71.250166] Code: b6 8b c1 00 00 00 48 8d 7b 08 48 ba 00 00 00 00 00 fc ff df d3 e6 48 89 f9 48 c1 e9 03 80 3c 11 00 75 24 66 03 73 08 89 f2 ee <48> 8b 5d f8 c9 c3 cc cc cc cc 89 45 f0 89 75 f4 e8 af 5b 07 ff 8b [ 71.250174] RSP: 0000:ffff8881080272e0 EFLAGS: 00000006 [ 71.250179] RAX: 0000000000000000 RBX: ffffffffbb4d8b80 RCX: 1ffffffff769b171 [ 71.250183] RDX: 00000000000003f9 RSI: 00000000000003f9 RDI: ffffffffbb4d8b88 [ 71.250187] RBP: ffff8881080272f0 R08: 0000000000000001 R09: ffffffffbb434940 [ 71.250190] R10: 0000000000000003 R11: 0000000000000001 R12: 0000000000000000 [ 71.250194] R13: ffffffffbb4d8de0 R14: ffffffffba5ce9c0 R15: ffffffffbb4d8b80 [ 71.250198] FS: 0000000000000000(0000) GS:ffff88846433b000(0000) knlGS:0000000000000000 [ 71.250202] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 71.250206] CR2: 0000000000000000 CR3: 000000023f4ba001 CR4: 00000000003726f0 [ 71.250210] DR0: ffffffffbb488880 DR1: ffffffffbb488881 DR2: ffffffffbb488882 [ 71.250213] DR3: ffffffffbb488883 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 71.250217] Call Trace: [ 71.250218] <TASK> [ 71.250221] serial8250_clear_IER+0x8c/0xb0 [ 71.250226] serial8250_console_write+0x1bd/0x1810 [ 71.250231] ? __pfx_serial8250_console_write+0x10/0x10 [ 71.250236] ? __kasan_check_write+0x18/0x20 [ 71.250240] ? _raw_spin_lock+0x8b/0xe0 [ 71.250245] ? __pfx__raw_spin_lock+0x10/0x10 [ 71.250250] univ8250_console_write+0x57/0x80 [ 71.250254] ? _raw_spin_unlock+0x41/0x70 [ 71.250258] console_flush_all+0x57b/0xc00 [ 71.250263] ? __pfx_console_flush_all+0x10/0x10 [ 71.250268] ? __pfx_vprintk_store+0x10/0x10 [ 71.250273] ? __kasan_check_read+0x15/0x20 [ 71.250277] console_unlock+0xf2/0x1f0 [ 71.250281] ? __pfx_console_unlock+0x10/0x10 [ 71.250285] ? __kasan_check_write+0x18/0x20 [ 71.250289] ? _raw_spin_lock+0x8b/0xe0 [ 71.250294] vprintk_emit+0x1e9/0x480 [ 71.250299] ? __pfx_vprintk_emit+0x10/0x10 [ 71.250303] ? _raw_spin_unlock+0x41/0x70 [ 71.250308] vprintk_default+0x21/0x30 [ 71.250312] vprintk+0x12/0x20 [ 71.250316] _printk+0xc3/0xf0 [ 71.250319] ? __pfx__printk+0x10/0x10 [ 71.250323] ? __pfx_vprintk_store+0x10/0x10 [ 71.250328] __dump_page+0x33a/0x8d0 [ 71.250333] ? __pfx___dump_page+0x10/0x10 [ 71.250337] ? __kasan_check_write+0x18/0x20 [ 71.250344] ? _printk+0xc3/0xf0 [ 71.250347] ? __pfx__printk+0x10/0x10 [ 71.250351] ? ret_from_fork_asm+0x1a/0x30 [ 71.250356] dump_page+0x3a/0x80 [ 71.250360] ? dump_page+0x3a/0x80 [ 71.250364] print_report+0x26e/0x650 [ 71.250368] ? kasan_atomics_helper+0x1eaa/0x5450 [ 71.250373] ? kasan_complete_mode_report_info+0x2a/0x200 [ 71.250377] ? kasan_atomics_helper+0x1eaa/0x5450 [ 71.250381] kasan_report+0x141/0x180 [ 71.250386] ? kasan_atomics_helper+0x1eaa/0x5450 [ 71.250391] kasan_check_range+0x10c/0x1c0 [ 71.250396] __kasan_check_write+0x18/0x20 [ 71.250399] kasan_atomics_helper+0x1eaa/0x5450 [ 71.250404] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 71.250408] ? __kmalloc_cache_noprof+0x189/0x420 [ 71.250412] ? kasan_atomics+0x152/0x310 [ 71.250416] kasan_atomics+0x1dc/0x310 [ 71.250420] ? __pfx_kasan_atomics+0x10/0x10 [ 71.250424] ? ktime_get_ts64+0x83/0x230 [ 71.250429] kunit_try_run_case+0x1a2/0x480 [ 71.250433] ? __pfx_kunit_try_run_case+0x10/0x10 [ 71.250438] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 71.250442] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 71.250447] ? __kthread_parkme+0x82/0x180 [ 71.250452] ? preempt_count_sub+0x50/0x80 [ 71.250456] ? __pfx_kunit_try_run_case+0x10/0x10 [ 71.250461] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 71.250465] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 71.250470] kthread+0x334/0x6f0 [ 71.250474] ? trace_preempt_on+0x20/0xc0 [ 71.250478] ? __pfx_kthread+0x10/0x10 [ 71.250483] ? _raw_spin_unlock_irq+0x47/0x80 [ 71.250487] ? calculate_sigpending+0x7b/0xa0 [ 71.250492] ? __pfx_kthread+0x10/0x10 [ 71.250496] ret_from_fork+0x3e/0x80 [ 71.250501] ? __pfx_kthread+0x10/0x10 [ 71.250505] ret_from_fork_asm+0x1a/0x30 [ 71.250511] </TASK> [ 71.661921] page_type: f5(slab) [ 71.665079] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 71.672826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 71.680564] page dumped because: kasan: bad access detected [ 71.686138] [ 71.687636] Memory state around the buggy address: [ 71.692428] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.699648] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.706865] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 71.714084] ^ [ 71.718878] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.726096] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.733317] ================================================================== [ 72.118425] ================================================================== [ 72.125656] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 72.133056] Read of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 72.140363] [ 72.141861] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 72.141869] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.141871] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 72.141874] Call Trace: [ 72.141876] <TASK> [ 72.141878] dump_stack_lvl+0x73/0xb0 [ 72.141881] print_report+0xd1/0x650 [ 72.141886] ? __virt_addr_valid+0x1db/0x2d0 [ 72.141890] ? kasan_atomics_helper+0x4f71/0x5450 [ 72.141894] ? kasan_complete_mode_report_info+0x2a/0x200 [ 72.141898] ? kasan_atomics_helper+0x4f71/0x5450 [ 72.141903] kasan_report+0x141/0x180 [ 72.141907] ? kasan_atomics_helper+0x4f71/0x5450 [ 72.141912] __asan_report_load8_noabort+0x18/0x20 [ 72.141916] kasan_atomics_helper+0x4f71/0x5450 [ 72.141921] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 72.141925] ? __kmalloc_cache_noprof+0x189/0x420 [ 72.141929] ? kasan_atomics+0x152/0x310 [ 72.141933] kasan_atomics+0x1dc/0x310 [ 72.141937] ? __pfx_kasan_atomics+0x10/0x10 [ 72.141940] ? ktime_get_ts64+0x83/0x230 [ 72.141945] kunit_try_run_case+0x1a2/0x480 [ 72.141950] ? __pfx_kunit_try_run_case+0x10/0x10 [ 72.141954] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 72.141959] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 72.141963] ? __kthread_parkme+0x82/0x180 [ 72.141968] ? preempt_count_sub+0x50/0x80 [ 72.141972] ? __pfx_kunit_try_run_case+0x10/0x10 [ 72.141977] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 72.141981] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 72.141985] kthread+0x334/0x6f0 [ 72.141990] ? trace_preempt_on+0x20/0xc0 [ 72.141994] ? __pfx_kthread+0x10/0x10 [ 72.141999] ? _raw_spin_unlock_irq+0x47/0x80 [ 72.142003] ? calculate_sigpending+0x7b/0xa0 [ 72.142007] ? __pfx_kthread+0x10/0x10 [ 72.142011] ret_from_fork+0x3e/0x80 [ 72.142015] ? __pfx_kthread+0x10/0x10 [ 72.142020] ret_from_fork_asm+0x1a/0x30 [ 72.142026] </TASK> [ 72.142027] [ 72.319555] Allocated by task 308: [ 72.322959] kasan_save_stack+0x45/0x70 [ 72.326799] kasan_save_track+0x18/0x40 [ 72.330640] kasan_save_alloc_info+0x3b/0x50 [ 72.334920] __kasan_kmalloc+0xb7/0xc0 [ 72.338688] __kmalloc_cache_noprof+0x189/0x420 [ 72.343231] kasan_atomics+0x95/0x310 [ 72.346896] kunit_try_run_case+0x1a2/0x480 [ 72.351083] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 72.356489] kthread+0x334/0x6f0 [ 72.359738] ret_from_fork+0x3e/0x80 [ 72.363318] ret_from_fork_asm+0x1a/0x30 [ 72.367245] [ 72.368747] The buggy address belongs to the object at ffff8881061f7500 [ 72.368747] which belongs to the cache kmalloc-64 of size 64 [ 72.381086] The buggy address is located 0 bytes to the right of [ 72.381086] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 72.393946] [ 72.395446] The buggy address belongs to the physical page: [ 72.401016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 72.409016] flags: 0x200000000000000(node=0|zone=2) [ 72.413894] page_type: f5(slab) [ 72.417043] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 72.424789] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.432528] page dumped because: kasan: bad access detected [ 72.438099] [ 72.439599] Memory state around the buggy address: [ 72.444391] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.451613] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.458838] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.466059] ^ [ 72.470852] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.478069] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.485286] ================================================================== [ 56.238232] ================================================================== [ 56.245459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 56.252767] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 56.260168] [ 56.261667] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 56.261692] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.261694] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 56.261697] Call Trace: [ 56.261699] <TASK> [ 56.261701] dump_stack_lvl+0x73/0xb0 [ 56.261717] print_report+0xd1/0x650 [ 56.261721] ? __virt_addr_valid+0x1db/0x2d0 [ 56.261725] ? kasan_atomics_helper+0xa2b/0x5450 [ 56.261729] ? kasan_complete_mode_report_info+0x2a/0x200 [ 56.261734] ? kasan_atomics_helper+0xa2b/0x5450 [ 56.261738] kasan_report+0x141/0x180 [ 56.261742] ? kasan_atomics_helper+0xa2b/0x5450 [ 56.261747] kasan_check_range+0x10c/0x1c0 [ 56.261752] __kasan_check_write+0x18/0x20 [ 56.261756] kasan_atomics_helper+0xa2b/0x5450 [ 56.261760] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 56.261765] ? __kmalloc_cache_noprof+0x189/0x420 [ 56.261769] ? kasan_atomics+0x152/0x310 [ 56.261773] kasan_atomics+0x1dc/0x310 [ 56.261776] ? __pfx_kasan_atomics+0x10/0x10 [ 56.261780] ? ktime_get_ts64+0x83/0x230 [ 56.261785] kunit_try_run_case+0x1a2/0x480 [ 56.261789] ? __pfx_kunit_try_run_case+0x10/0x10 [ 56.261793] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 56.261798] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 56.261803] ? __kthread_parkme+0x82/0x180 [ 56.261807] ? preempt_count_sub+0x50/0x80 [ 56.261812] ? __pfx_kunit_try_run_case+0x10/0x10 [ 56.261816] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 56.261821] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 56.261825] kthread+0x334/0x6f0 [ 56.261829] ? trace_preempt_on+0x20/0xc0 [ 56.261833] ? __pfx_kthread+0x10/0x10 [ 56.261838] ? _raw_spin_unlock_irq+0x47/0x80 [ 56.261842] ? calculate_sigpending+0x7b/0xa0 [ 56.261846] ? __pfx_kthread+0x10/0x10 [ 56.261851] ret_from_fork+0x3e/0x80 [ 56.261855] ? __pfx_kthread+0x10/0x10 [ 56.261859] ret_from_fork_asm+0x1a/0x30 [ 56.261865] </TASK> [ 56.261867] [ 56.442616] Allocated by task 308: [ 56.446022] kasan_save_stack+0x45/0x70 [ 56.449863] kasan_save_track+0x18/0x40 [ 56.453711] kasan_save_alloc_info+0x3b/0x50 [ 56.457982] __kasan_kmalloc+0xb7/0xc0 [ 56.461743] __kmalloc_cache_noprof+0x189/0x420 [ 56.466278] kasan_atomics+0x95/0x310 [ 56.469941] kunit_try_run_case+0x1a2/0x480 [ 56.474128] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 56.479527] kthread+0x334/0x6f0 [ 56.482761] ret_from_fork+0x3e/0x80 [ 56.486347] ret_from_fork_asm+0x1a/0x30 [ 56.490272] [ 56.491773] The buggy address belongs to the object at ffff8881061f7500 [ 56.491773] which belongs to the cache kmalloc-64 of size 64 [ 56.504114] The buggy address is located 0 bytes to the right of [ 56.504114] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 56.516975] [ 56.518475] The buggy address belongs to the physical page: [ 56.524047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 56.532052] flags: 0x200000000000000(node=0|zone=2) [ 56.536932] page_type: f5(slab) [ 56.540081] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 56.547826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.555565] page dumped because: kasan: bad access detected [ 56.561136] [ 56.562637] Memory state around the buggy address: [ 56.567428] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.574647] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.581867] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.589085] ^ [ 56.593880] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.601106] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.608326] ================================================================== [ 66.782868] ================================================================== [ 66.790105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 66.797497] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 66.804898] [ 66.806397] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 66.806404] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.806406] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 66.806410] Call Trace: [ 66.806412] <TASK> [ 66.806413] dump_stack_lvl+0x73/0xb0 [ 66.806417] print_report+0xd1/0x650 [ 66.806421] ? __virt_addr_valid+0x1db/0x2d0 [ 66.806425] ? kasan_atomics_helper+0x1818/0x5450 [ 66.806429] ? kasan_complete_mode_report_info+0x2a/0x200 [ 66.806434] ? kasan_atomics_helper+0x1818/0x5450 [ 66.806438] kasan_report+0x141/0x180 [ 66.806443] ? kasan_atomics_helper+0x1818/0x5450 [ 66.806448] kasan_check_range+0x10c/0x1c0 [ 66.806453] __kasan_check_write+0x18/0x20 [ 66.806456] kasan_atomics_helper+0x1818/0x5450 [ 66.806461] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 66.806465] ? __kmalloc_cache_noprof+0x189/0x420 [ 66.806469] ? kasan_atomics+0x152/0x310 [ 66.806474] kasan_atomics+0x1dc/0x310 [ 66.806477] ? __pfx_kasan_atomics+0x10/0x10 [ 66.806481] ? ktime_get_ts64+0x83/0x230 [ 66.806486] kunit_try_run_case+0x1a2/0x480 [ 66.806491] ? __pfx_kunit_try_run_case+0x10/0x10 [ 66.806495] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 66.806500] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 66.806505] ? __kthread_parkme+0x82/0x180 [ 66.806509] ? preempt_count_sub+0x50/0x80 [ 66.806514] ? __pfx_kunit_try_run_case+0x10/0x10 [ 66.806518] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 66.806522] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 66.806527] kthread+0x334/0x6f0 [ 66.806531] ? trace_preempt_on+0x20/0xc0 [ 66.806535] ? __pfx_kthread+0x10/0x10 [ 66.806540] ? _raw_spin_unlock_irq+0x47/0x80 [ 66.806544] ? calculate_sigpending+0x7b/0xa0 [ 66.806548] ? __pfx_kthread+0x10/0x10 [ 66.806553] ret_from_fork+0x3e/0x80 [ 66.806557] ? __pfx_kthread+0x10/0x10 [ 66.806561] ret_from_fork_asm+0x1a/0x30 [ 66.806567] </TASK> [ 66.806569] [ 66.987479] Allocated by task 308: [ 66.990885] kasan_save_stack+0x45/0x70 [ 66.994736] kasan_save_track+0x18/0x40 [ 66.998579] kasan_save_alloc_info+0x3b/0x50 [ 67.002853] __kasan_kmalloc+0xb7/0xc0 [ 67.006604] __kmalloc_cache_noprof+0x189/0x420 [ 67.011136] kasan_atomics+0x95/0x310 [ 67.014802] kunit_try_run_case+0x1a2/0x480 [ 67.018987] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 67.024388] kthread+0x334/0x6f0 [ 67.027620] ret_from_fork+0x3e/0x80 [ 67.031199] ret_from_fork_asm+0x1a/0x30 [ 67.035124] [ 67.036624] The buggy address belongs to the object at ffff8881061f7500 [ 67.036624] which belongs to the cache kmalloc-64 of size 64 [ 67.048966] The buggy address is located 0 bytes to the right of [ 67.048966] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 67.061825] [ 67.063325] The buggy address belongs to the physical page: [ 67.068899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 67.076905] flags: 0x200000000000000(node=0|zone=2) [ 67.081784] page_type: f5(slab) [ 67.084932] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 67.092689] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.100461] page dumped because: kasan: bad access detected [ 67.106032] [ 67.107532] Memory state around the buggy address: [ 67.112325] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.119543] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.126764] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.133982] ^ [ 67.138774] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.145992] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.153213] ================================================================== [ 71.740559] ================================================================== [ 71.747790] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 71.755189] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 71.762581] [ 71.764084] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 71.764092] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.764094] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 71.764097] Call Trace: [ 71.764099] <TASK> [ 71.764101] dump_stack_lvl+0x73/0xb0 [ 71.764105] print_report+0xd1/0x650 [ 71.764109] ? __virt_addr_valid+0x1db/0x2d0 [ 71.764113] ? kasan_atomics_helper+0x1f43/0x5450 [ 71.764117] ? kasan_complete_mode_report_info+0x2a/0x200 [ 71.764121] ? kasan_atomics_helper+0x1f43/0x5450 [ 71.764126] kasan_report+0x141/0x180 [ 71.764130] ? kasan_atomics_helper+0x1f43/0x5450 [ 71.764135] kasan_check_range+0x10c/0x1c0 [ 71.764140] __kasan_check_write+0x18/0x20 [ 71.764144] kasan_atomics_helper+0x1f43/0x5450 [ 71.764148] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 71.764152] ? __kmalloc_cache_noprof+0x189/0x420 [ 71.764156] ? kasan_atomics+0x152/0x310 [ 71.764161] kasan_atomics+0x1dc/0x310 [ 71.764164] ? __pfx_kasan_atomics+0x10/0x10 [ 71.764168] ? ktime_get_ts64+0x83/0x230 [ 71.764173] kunit_try_run_case+0x1a2/0x480 [ 71.764177] ? __pfx_kunit_try_run_case+0x10/0x10 [ 71.764182] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 71.764186] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 71.764191] ? __kthread_parkme+0x82/0x180 [ 71.764195] ? preempt_count_sub+0x50/0x80 [ 71.764200] ? __pfx_kunit_try_run_case+0x10/0x10 [ 71.764205] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 71.764209] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 71.764213] kthread+0x334/0x6f0 [ 71.764218] ? trace_preempt_on+0x20/0xc0 [ 71.764222] ? __pfx_kthread+0x10/0x10 [ 71.764227] ? _raw_spin_unlock_irq+0x47/0x80 [ 71.764231] ? calculate_sigpending+0x7b/0xa0 [ 71.764235] ? __pfx_kthread+0x10/0x10 [ 71.764239] ret_from_fork+0x3e/0x80 [ 71.764243] ? __pfx_kthread+0x10/0x10 [ 71.764248] ret_from_fork_asm+0x1a/0x30 [ 71.764254] </TASK> [ 71.764255] [ 71.945414] Allocated by task 308: [ 71.948820] kasan_save_stack+0x45/0x70 [ 71.952660] kasan_save_track+0x18/0x40 [ 71.956533] kasan_save_alloc_info+0x3b/0x50 [ 71.960805] __kasan_kmalloc+0xb7/0xc0 [ 71.964557] __kmalloc_cache_noprof+0x189/0x420 [ 71.969089] kasan_atomics+0x95/0x310 [ 71.972757] kunit_try_run_case+0x1a2/0x480 [ 71.976951] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 71.982359] kthread+0x334/0x6f0 [ 71.985592] ret_from_fork+0x3e/0x80 [ 71.989171] ret_from_fork_asm+0x1a/0x30 [ 71.993105] [ 71.994605] The buggy address belongs to the object at ffff8881061f7500 [ 71.994605] which belongs to the cache kmalloc-64 of size 64 [ 72.006943] The buggy address is located 0 bytes to the right of [ 72.006943] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 72.019806] [ 72.021306] The buggy address belongs to the physical page: [ 72.026878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 72.034886] flags: 0x200000000000000(node=0|zone=2) [ 72.039763] page_type: f5(slab) [ 72.042910] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 72.050651] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.058397] page dumped because: kasan: bad access detected [ 72.063969] [ 72.065466] Memory state around the buggy address: [ 72.070262] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.077487] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.084722] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.091953] ^ [ 72.096746] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.103964] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.111183] ================================================================== [ 72.870251] ================================================================== [ 72.877478] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 72.884872] Read of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 72.892177] [ 72.893718] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 72.893725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.893728] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 72.893731] Call Trace: [ 72.893733] <TASK> [ 72.893734] dump_stack_lvl+0x73/0xb0 [ 72.893738] print_report+0xd1/0x650 [ 72.893742] ? __virt_addr_valid+0x1db/0x2d0 [ 72.893746] ? kasan_atomics_helper+0x4f98/0x5450 [ 72.893750] ? kasan_complete_mode_report_info+0x2a/0x200 [ 72.893755] ? kasan_atomics_helper+0x4f98/0x5450 [ 72.893759] kasan_report+0x141/0x180 [ 72.893763] ? kasan_atomics_helper+0x4f98/0x5450 [ 72.893768] __asan_report_load8_noabort+0x18/0x20 [ 72.893772] kasan_atomics_helper+0x4f98/0x5450 [ 72.893777] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 72.893781] ? __kmalloc_cache_noprof+0x189/0x420 [ 72.893785] ? kasan_atomics+0x152/0x310 [ 72.893789] kasan_atomics+0x1dc/0x310 [ 72.893793] ? __pfx_kasan_atomics+0x10/0x10 [ 72.893797] ? ktime_get_ts64+0x83/0x230 [ 72.893802] kunit_try_run_case+0x1a2/0x480 [ 72.893806] ? __pfx_kunit_try_run_case+0x10/0x10 [ 72.893810] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 72.893815] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 72.893820] ? __kthread_parkme+0x82/0x180 [ 72.893824] ? preempt_count_sub+0x50/0x80 [ 72.893829] ? __pfx_kunit_try_run_case+0x10/0x10 [ 72.893834] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 72.893838] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 72.893842] kthread+0x334/0x6f0 [ 72.893846] ? trace_preempt_on+0x20/0xc0 [ 72.893851] ? __pfx_kthread+0x10/0x10 [ 72.893855] ? _raw_spin_unlock_irq+0x47/0x80 [ 72.893859] ? calculate_sigpending+0x7b/0xa0 [ 72.893863] ? __pfx_kthread+0x10/0x10 [ 72.893868] ret_from_fork+0x3e/0x80 [ 72.893872] ? __pfx_kthread+0x10/0x10 [ 72.893877] ret_from_fork_asm+0x1a/0x30 [ 72.893883] </TASK> [ 72.893884] [ 73.071458] Allocated by task 308: [ 73.074862] kasan_save_stack+0x45/0x70 [ 73.078708] kasan_save_track+0x18/0x40 [ 73.082567] kasan_save_alloc_info+0x3b/0x50 [ 73.086840] __kasan_kmalloc+0xb7/0xc0 [ 73.090593] __kmalloc_cache_noprof+0x189/0x420 [ 73.095133] kasan_atomics+0x95/0x310 [ 73.098798] kunit_try_run_case+0x1a2/0x480 [ 73.102983] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 73.108383] kthread+0x334/0x6f0 [ 73.111615] ret_from_fork+0x3e/0x80 [ 73.115196] ret_from_fork_asm+0x1a/0x30 [ 73.119122] [ 73.120619] The buggy address belongs to the object at ffff8881061f7500 [ 73.120619] which belongs to the cache kmalloc-64 of size 64 [ 73.132952] The buggy address is located 0 bytes to the right of [ 73.132952] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 73.145814] [ 73.147312] The buggy address belongs to the physical page: [ 73.152885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 73.160882] flags: 0x200000000000000(node=0|zone=2) [ 73.165763] page_type: f5(slab) [ 73.168910] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 73.176650] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.184394] page dumped because: kasan: bad access detected [ 73.189968] [ 73.191468] Memory state around the buggy address: [ 73.196260] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.203479] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.210708] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.217953] ^ [ 73.222745] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.229972] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.237190] ================================================================== [ 70.556540] ================================================================== [ 70.563759] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 70.571154] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 70.578552] [ 70.580053] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 70.580061] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.580063] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 70.580066] Call Trace: [ 70.580068] <TASK> [ 70.580070] dump_stack_lvl+0x73/0xb0 [ 70.580074] print_report+0xd1/0x650 [ 70.580078] ? __virt_addr_valid+0x1db/0x2d0 [ 70.580082] ? kasan_atomics_helper+0x1e12/0x5450 [ 70.580086] ? kasan_complete_mode_report_info+0x2a/0x200 [ 70.580090] ? kasan_atomics_helper+0x1e12/0x5450 [ 70.580094] kasan_report+0x141/0x180 [ 70.580099] ? kasan_atomics_helper+0x1e12/0x5450 [ 70.580104] kasan_check_range+0x10c/0x1c0 [ 70.580109] __kasan_check_write+0x18/0x20 [ 70.580113] kasan_atomics_helper+0x1e12/0x5450 [ 70.580117] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 70.580121] ? __kmalloc_cache_noprof+0x189/0x420 [ 70.580125] ? kasan_atomics+0x152/0x310 [ 70.580129] kasan_atomics+0x1dc/0x310 [ 70.580133] ? __pfx_kasan_atomics+0x10/0x10 [ 70.580137] ? ktime_get_ts64+0x83/0x230 [ 70.580142] kunit_try_run_case+0x1a2/0x480 [ 70.580146] ? __pfx_kunit_try_run_case+0x10/0x10 [ 70.580150] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 70.580155] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 70.580160] ? __kthread_parkme+0x82/0x180 [ 70.580164] ? preempt_count_sub+0x50/0x80 [ 70.580169] ? __pfx_kunit_try_run_case+0x10/0x10 [ 70.580173] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 70.580178] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 70.580182] kthread+0x334/0x6f0 [ 70.580186] ? trace_preempt_on+0x20/0xc0 [ 70.580191] ? __pfx_kthread+0x10/0x10 [ 70.580195] ? _raw_spin_unlock_irq+0x47/0x80 [ 70.580199] ? calculate_sigpending+0x7b/0xa0 [ 70.580203] ? __pfx_kthread+0x10/0x10 [ 70.580208] ret_from_fork+0x3e/0x80 [ 70.580212] ? __pfx_kthread+0x10/0x10 [ 70.580216] ret_from_fork_asm+0x1a/0x30 [ 70.580222] </TASK> [ 70.580224] [ 70.761246] Allocated by task 308: [ 70.764652] kasan_save_stack+0x45/0x70 [ 70.768491] kasan_save_track+0x18/0x40 [ 70.772330] kasan_save_alloc_info+0x3b/0x50 [ 70.776603] __kasan_kmalloc+0xb7/0xc0 [ 70.780357] __kmalloc_cache_noprof+0x189/0x420 [ 70.784889] kasan_atomics+0x95/0x310 [ 70.788556] kunit_try_run_case+0x1a2/0x480 [ 70.792749] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 70.798147] kthread+0x334/0x6f0 [ 70.801380] ret_from_fork+0x3e/0x80 [ 70.804960] ret_from_fork_asm+0x1a/0x30 [ 70.808887] [ 70.810384] The buggy address belongs to the object at ffff8881061f7500 [ 70.810384] which belongs to the cache kmalloc-64 of size 64 [ 70.822735] The buggy address is located 0 bytes to the right of [ 70.822735] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 70.835604] [ 70.837104] The buggy address belongs to the physical page: [ 70.842702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 70.850734] flags: 0x200000000000000(node=0|zone=2) [ 70.855613] page_type: f5(slab) [ 70.858760] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 70.866501] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.874246] page dumped because: kasan: bad access detected [ 70.879819] [ 70.881318] Memory state around the buggy address: [ 70.886112] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.893339] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.900556] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.907775] ^ [ 70.912568] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.919788] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.927008] ================================================================== [ 63.768063] ================================================================== [ 63.775285] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 63.782718] Read of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 63.790034] [ 63.791533] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 63.791541] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.791543] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 63.791546] Call Trace: [ 63.791548] <TASK> [ 63.791550] dump_stack_lvl+0x73/0xb0 [ 63.791553] print_report+0xd1/0x650 [ 63.791558] ? __virt_addr_valid+0x1db/0x2d0 [ 63.791562] ? kasan_atomics_helper+0x4eae/0x5450 [ 63.791566] ? kasan_complete_mode_report_info+0x2a/0x200 [ 63.791570] ? kasan_atomics_helper+0x4eae/0x5450 [ 63.791574] kasan_report+0x141/0x180 [ 63.791579] ? kasan_atomics_helper+0x4eae/0x5450 [ 63.791584] __asan_report_load8_noabort+0x18/0x20 [ 63.791588] kasan_atomics_helper+0x4eae/0x5450 [ 63.791592] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 63.791597] ? __kmalloc_cache_noprof+0x189/0x420 [ 63.791601] ? kasan_atomics+0x152/0x310 [ 63.791605] kasan_atomics+0x1dc/0x310 [ 63.791609] ? __pfx_kasan_atomics+0x10/0x10 [ 63.791612] ? ktime_get_ts64+0x83/0x230 [ 63.791617] kunit_try_run_case+0x1a2/0x480 [ 63.791622] ? __pfx_kunit_try_run_case+0x10/0x10 [ 63.791626] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 63.791631] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 63.791636] ? __kthread_parkme+0x82/0x180 [ 63.791640] ? preempt_count_sub+0x50/0x80 [ 63.791645] ? __pfx_kunit_try_run_case+0x10/0x10 [ 63.791650] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 63.791654] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 63.791658] kthread+0x334/0x6f0 [ 63.791662] ? trace_preempt_on+0x20/0xc0 [ 63.791667] ? __pfx_kthread+0x10/0x10 [ 63.791689] ? _raw_spin_unlock_irq+0x47/0x80 [ 63.791693] ? calculate_sigpending+0x7b/0xa0 [ 63.791697] ? __pfx_kthread+0x10/0x10 [ 63.791702] ret_from_fork+0x3e/0x80 [ 63.791719] ? __pfx_kthread+0x10/0x10 [ 63.791723] ret_from_fork_asm+0x1a/0x30 [ 63.791729] </TASK> [ 63.791731] [ 63.969417] Allocated by task 308: [ 63.972822] kasan_save_stack+0x45/0x70 [ 63.976662] kasan_save_track+0x18/0x40 [ 63.980534] kasan_save_alloc_info+0x3b/0x50 [ 63.984809] __kasan_kmalloc+0xb7/0xc0 [ 63.988569] __kmalloc_cache_noprof+0x189/0x420 [ 63.993102] kasan_atomics+0x95/0x310 [ 63.996766] kunit_try_run_case+0x1a2/0x480 [ 64.000954] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 64.006362] kthread+0x334/0x6f0 [ 64.009601] ret_from_fork+0x3e/0x80 [ 64.013180] ret_from_fork_asm+0x1a/0x30 [ 64.017108] [ 64.018607] The buggy address belongs to the object at ffff8881061f7500 [ 64.018607] which belongs to the cache kmalloc-64 of size 64 [ 64.030948] The buggy address is located 0 bytes to the right of [ 64.030948] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 64.043817] [ 64.045317] The buggy address belongs to the physical page: [ 64.050888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 64.058888] flags: 0x200000000000000(node=0|zone=2) [ 64.063768] page_type: f5(slab) [ 64.066913] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 64.074653] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.082398] page dumped because: kasan: bad access detected [ 64.087971] [ 64.089469] Memory state around the buggy address: [ 64.094262] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.101484] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.108710] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.115954] ^ [ 64.120748] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.127974] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.135193] ================================================================== [ 52.093859] ================================================================== [ 52.101106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 52.108505] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 52.115813] [ 52.117311] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 52.117318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.117321] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 52.117324] Call Trace: [ 52.117326] <TASK> [ 52.117328] dump_stack_lvl+0x73/0xb0 [ 52.117331] print_report+0xd1/0x650 [ 52.117336] ? __virt_addr_valid+0x1db/0x2d0 [ 52.117339] ? kasan_atomics_helper+0x4b54/0x5450 [ 52.117343] ? kasan_complete_mode_report_info+0x2a/0x200 [ 52.117348] ? kasan_atomics_helper+0x4b54/0x5450 [ 52.117352] kasan_report+0x141/0x180 [ 52.117357] ? kasan_atomics_helper+0x4b54/0x5450 [ 52.117362] __asan_report_load4_noabort+0x18/0x20 [ 52.117366] kasan_atomics_helper+0x4b54/0x5450 [ 52.117370] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 52.117375] ? __kmalloc_cache_noprof+0x189/0x420 [ 52.117379] ? kasan_atomics+0x152/0x310 [ 52.117383] kasan_atomics+0x1dc/0x310 [ 52.117386] ? __pfx_kasan_atomics+0x10/0x10 [ 52.117390] ? ktime_get_ts64+0x83/0x230 [ 52.117395] kunit_try_run_case+0x1a2/0x480 [ 52.117399] ? __pfx_kunit_try_run_case+0x10/0x10 [ 52.117404] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 52.117409] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 52.117413] ? __kthread_parkme+0x82/0x180 [ 52.117418] ? preempt_count_sub+0x50/0x80 [ 52.117422] ? __pfx_kunit_try_run_case+0x10/0x10 [ 52.117427] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 52.117431] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 52.117436] kthread+0x334/0x6f0 [ 52.117440] ? trace_preempt_on+0x20/0xc0 [ 52.117444] ? __pfx_kthread+0x10/0x10 [ 52.117449] ? _raw_spin_unlock_irq+0x47/0x80 [ 52.117453] ? calculate_sigpending+0x7b/0xa0 [ 52.117457] ? __pfx_kthread+0x10/0x10 [ 52.117462] ret_from_fork+0x3e/0x80 [ 52.117466] ? __pfx_kthread+0x10/0x10 [ 52.117470] ret_from_fork_asm+0x1a/0x30 [ 52.117476] </TASK> [ 52.117478] [ 52.295134] Allocated by task 308: [ 52.298541] kasan_save_stack+0x45/0x70 [ 52.302387] kasan_save_track+0x18/0x40 [ 52.306226] kasan_save_alloc_info+0x3b/0x50 [ 52.310497] __kasan_kmalloc+0xb7/0xc0 [ 52.314251] __kmalloc_cache_noprof+0x189/0x420 [ 52.318784] kasan_atomics+0x95/0x310 [ 52.322448] kunit_try_run_case+0x1a2/0x480 [ 52.326637] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 52.332044] kthread+0x334/0x6f0 [ 52.335277] ret_from_fork+0x3e/0x80 [ 52.338864] ret_from_fork_asm+0x1a/0x30 [ 52.342799] [ 52.344298] The buggy address belongs to the object at ffff8881061f7500 [ 52.344298] which belongs to the cache kmalloc-64 of size 64 [ 52.356638] The buggy address is located 0 bytes to the right of [ 52.356638] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 52.369499] [ 52.370998] The buggy address belongs to the physical page: [ 52.376570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 52.384570] flags: 0x200000000000000(node=0|zone=2) [ 52.389447] page_type: f5(slab) [ 52.392596] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 52.400342] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.408081] page dumped because: kasan: bad access detected [ 52.413653] [ 52.415152] Memory state around the buggy address: [ 52.419947] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.427172] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.434394] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.441620] ^ [ 52.446413] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.453632] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.460851] ================================================================== [ 59.253469] ================================================================== [ 59.260735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 59.268044] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 59.275436] [ 59.276930] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 59.276938] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.276940] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 59.276943] Call Trace: [ 59.276945] <TASK> [ 59.276947] dump_stack_lvl+0x73/0xb0 [ 59.276950] print_report+0xd1/0x650 [ 59.276955] ? __virt_addr_valid+0x1db/0x2d0 [ 59.276958] ? kasan_atomics_helper+0xf10/0x5450 [ 59.276962] ? kasan_complete_mode_report_info+0x2a/0x200 [ 59.276967] ? kasan_atomics_helper+0xf10/0x5450 [ 59.276971] kasan_report+0x141/0x180 [ 59.276975] ? kasan_atomics_helper+0xf10/0x5450 [ 59.276980] kasan_check_range+0x10c/0x1c0 [ 59.276985] __kasan_check_write+0x18/0x20 [ 59.276989] kasan_atomics_helper+0xf10/0x5450 [ 59.276993] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 59.276998] ? __kmalloc_cache_noprof+0x189/0x420 [ 59.277002] ? kasan_atomics+0x152/0x310 [ 59.277006] kasan_atomics+0x1dc/0x310 [ 59.277009] ? __pfx_kasan_atomics+0x10/0x10 [ 59.277013] ? ktime_get_ts64+0x83/0x230 [ 59.277018] kunit_try_run_case+0x1a2/0x480 [ 59.277022] ? __pfx_kunit_try_run_case+0x10/0x10 [ 59.277027] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 59.277031] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 59.277036] ? __kthread_parkme+0x82/0x180 [ 59.277040] ? preempt_count_sub+0x50/0x80 [ 59.277045] ? __pfx_kunit_try_run_case+0x10/0x10 [ 59.277050] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 59.277054] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 59.277058] kthread+0x334/0x6f0 [ 59.277063] ? trace_preempt_on+0x20/0xc0 [ 59.277067] ? __pfx_kthread+0x10/0x10 [ 59.277072] ? _raw_spin_unlock_irq+0x47/0x80 [ 59.277076] ? calculate_sigpending+0x7b/0xa0 [ 59.277080] ? __pfx_kthread+0x10/0x10 [ 59.277084] ret_from_fork+0x3e/0x80 [ 59.277089] ? __pfx_kthread+0x10/0x10 [ 59.277093] ret_from_fork_asm+0x1a/0x30 [ 59.277099] </TASK> [ 59.277101] [ 59.457837] Allocated by task 308: [ 59.461242] kasan_save_stack+0x45/0x70 [ 59.465081] kasan_save_track+0x18/0x40 [ 59.468922] kasan_save_alloc_info+0x3b/0x50 [ 59.473194] __kasan_kmalloc+0xb7/0xc0 [ 59.476947] __kmalloc_cache_noprof+0x189/0x420 [ 59.481477] kasan_atomics+0x95/0x310 [ 59.485144] kunit_try_run_case+0x1a2/0x480 [ 59.489329] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 59.494735] kthread+0x334/0x6f0 [ 59.497969] ret_from_fork+0x3e/0x80 [ 59.501548] ret_from_fork_asm+0x1a/0x30 [ 59.505475] [ 59.506974] The buggy address belongs to the object at ffff8881061f7500 [ 59.506974] which belongs to the cache kmalloc-64 of size 64 [ 59.519317] The buggy address is located 0 bytes to the right of [ 59.519317] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 59.532186] [ 59.533703] The buggy address belongs to the physical page: [ 59.539299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 59.547297] flags: 0x200000000000000(node=0|zone=2) [ 59.552179] page_type: f5(slab) [ 59.555324] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 59.563064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.570810] page dumped because: kasan: bad access detected [ 59.576382] [ 59.577882] Memory state around the buggy address: [ 59.582692] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.589945] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.597165] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.604393] ^ [ 59.609186] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.616413] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.623630] ================================================================== [ 69.426875] ================================================================== [ 69.434105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 69.441503] Read of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 69.448811] [ 69.450309] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 69.450317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.450319] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 69.450322] Call Trace: [ 69.450324] <TASK> [ 69.450326] dump_stack_lvl+0x73/0xb0 [ 69.450330] print_report+0xd1/0x650 [ 69.450334] ? __virt_addr_valid+0x1db/0x2d0 [ 69.450338] ? kasan_atomics_helper+0x4f30/0x5450 [ 69.450342] ? kasan_complete_mode_report_info+0x2a/0x200 [ 69.450346] ? kasan_atomics_helper+0x4f30/0x5450 [ 69.450350] kasan_report+0x141/0x180 [ 69.450355] ? kasan_atomics_helper+0x4f30/0x5450 [ 69.450360] __asan_report_load8_noabort+0x18/0x20 [ 69.450364] kasan_atomics_helper+0x4f30/0x5450 [ 69.450368] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 69.450373] ? __kmalloc_cache_noprof+0x189/0x420 [ 69.450377] ? kasan_atomics+0x152/0x310 [ 69.450381] kasan_atomics+0x1dc/0x310 [ 69.450384] ? __pfx_kasan_atomics+0x10/0x10 [ 69.450388] ? ktime_get_ts64+0x83/0x230 [ 69.450393] kunit_try_run_case+0x1a2/0x480 [ 69.450397] ? __pfx_kunit_try_run_case+0x10/0x10 [ 69.450401] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 69.450406] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 69.450411] ? __kthread_parkme+0x82/0x180 [ 69.450415] ? preempt_count_sub+0x50/0x80 [ 69.450420] ? __pfx_kunit_try_run_case+0x10/0x10 [ 69.450424] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 69.450429] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 69.450433] kthread+0x334/0x6f0 [ 69.450437] ? trace_preempt_on+0x20/0xc0 [ 69.450441] ? __pfx_kthread+0x10/0x10 [ 69.450446] ? _raw_spin_unlock_irq+0x47/0x80 [ 69.450450] ? calculate_sigpending+0x7b/0xa0 [ 69.450454] ? __pfx_kthread+0x10/0x10 [ 69.450459] ret_from_fork+0x3e/0x80 [ 69.450463] ? __pfx_kthread+0x10/0x10 [ 69.450467] ret_from_fork_asm+0x1a/0x30 [ 69.450473] </TASK> [ 69.450475] [ 69.628106] Allocated by task 308: [ 69.631513] kasan_save_stack+0x45/0x70 [ 69.635360] kasan_save_track+0x18/0x40 [ 69.639199] kasan_save_alloc_info+0x3b/0x50 [ 69.643471] __kasan_kmalloc+0xb7/0xc0 [ 69.647224] __kmalloc_cache_noprof+0x189/0x420 [ 69.651757] kasan_atomics+0x95/0x310 [ 69.655423] kunit_try_run_case+0x1a2/0x480 [ 69.659608] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 69.665009] kthread+0x334/0x6f0 [ 69.668250] ret_from_fork+0x3e/0x80 [ 69.671835] ret_from_fork_asm+0x1a/0x30 [ 69.675761] [ 69.677261] The buggy address belongs to the object at ffff8881061f7500 [ 69.677261] which belongs to the cache kmalloc-64 of size 64 [ 69.689603] The buggy address is located 0 bytes to the right of [ 69.689603] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 69.702471] [ 69.703971] The buggy address belongs to the physical page: [ 69.709542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 69.717543] flags: 0x200000000000000(node=0|zone=2) [ 69.722420] page_type: f5(slab) [ 69.725569] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 69.733315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.741055] page dumped because: kasan: bad access detected [ 69.746626] [ 69.748125] Memory state around the buggy address: [ 69.752919] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.760145] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.767364] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.774583] ^ [ 69.779377] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.786596] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.793814] ================================================================== [ 73.996520] ================================================================== [ 74.003744] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 74.011139] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 74.018533] [ 74.020031] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 74.020039] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.020041] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 74.020045] Call Trace: [ 74.020046] <TASK> [ 74.020048] dump_stack_lvl+0x73/0xb0 [ 74.020052] print_report+0xd1/0x650 [ 74.020056] ? __virt_addr_valid+0x1db/0x2d0 [ 74.020060] ? kasan_atomics_helper+0x218a/0x5450 [ 74.020064] ? kasan_complete_mode_report_info+0x2a/0x200 [ 74.020069] ? kasan_atomics_helper+0x218a/0x5450 [ 74.020073] kasan_report+0x141/0x180 [ 74.020077] ? kasan_atomics_helper+0x218a/0x5450 [ 74.020082] kasan_check_range+0x10c/0x1c0 [ 74.020087] __kasan_check_write+0x18/0x20 [ 74.020091] kasan_atomics_helper+0x218a/0x5450 [ 74.020096] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 74.020100] ? __kmalloc_cache_noprof+0x189/0x420 [ 74.020104] ? kasan_atomics+0x152/0x310 [ 74.020108] kasan_atomics+0x1dc/0x310 [ 74.020112] ? __pfx_kasan_atomics+0x10/0x10 [ 74.020116] ? ktime_get_ts64+0x83/0x230 [ 74.020120] kunit_try_run_case+0x1a2/0x480 [ 74.020125] ? __pfx_kunit_try_run_case+0x10/0x10 [ 74.020129] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 74.020134] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 74.020139] ? __kthread_parkme+0x82/0x180 [ 74.020143] ? preempt_count_sub+0x50/0x80 [ 74.020148] ? __pfx_kunit_try_run_case+0x10/0x10 [ 74.020153] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 74.020157] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 74.020161] kthread+0x334/0x6f0 [ 74.020165] ? trace_preempt_on+0x20/0xc0 [ 74.020170] ? __pfx_kthread+0x10/0x10 [ 74.020174] ? _raw_spin_unlock_irq+0x47/0x80 [ 74.020179] ? calculate_sigpending+0x7b/0xa0 [ 74.020183] ? __pfx_kthread+0x10/0x10 [ 74.020187] ret_from_fork+0x3e/0x80 [ 74.020192] ? __pfx_kthread+0x10/0x10 [ 74.020196] ret_from_fork_asm+0x1a/0x30 [ 74.020202] </TASK> [ 74.020204] [ 74.201217] Allocated by task 308: [ 74.204622] kasan_save_stack+0x45/0x70 [ 74.208461] kasan_save_track+0x18/0x40 [ 74.212301] kasan_save_alloc_info+0x3b/0x50 [ 74.216572] __kasan_kmalloc+0xb7/0xc0 [ 74.220325] __kmalloc_cache_noprof+0x189/0x420 [ 74.224860] kasan_atomics+0x95/0x310 [ 74.228533] kunit_try_run_case+0x1a2/0x480 [ 74.232734] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 74.238136] kthread+0x334/0x6f0 [ 74.241367] ret_from_fork+0x3e/0x80 [ 74.244948] ret_from_fork_asm+0x1a/0x30 [ 74.248880] [ 74.250380] The buggy address belongs to the object at ffff8881061f7500 [ 74.250380] which belongs to the cache kmalloc-64 of size 64 [ 74.262741] The buggy address is located 0 bytes to the right of [ 74.262741] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 74.275607] [ 74.277107] The buggy address belongs to the physical page: [ 74.282706] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 74.290733] flags: 0x200000000000000(node=0|zone=2) [ 74.295618] page_type: f5(slab) [ 74.298765] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 74.306505] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.314244] page dumped because: kasan: bad access detected [ 74.319814] [ 74.321315] Memory state around the buggy address: [ 74.326107] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.333325] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.340545] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.347762] ^ [ 74.352555] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.359774] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.366996] ================================================================== [ 68.293583] ================================================================== [ 68.300800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 68.308198] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 68.315593] [ 68.317094] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 68.317101] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.317104] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 68.317107] Call Trace: [ 68.317109] <TASK> [ 68.317111] dump_stack_lvl+0x73/0xb0 [ 68.317114] print_report+0xd1/0x650 [ 68.317119] ? __virt_addr_valid+0x1db/0x2d0 [ 68.317123] ? kasan_atomics_helper+0x1a7f/0x5450 [ 68.317127] ? kasan_complete_mode_report_info+0x2a/0x200 [ 68.317131] ? kasan_atomics_helper+0x1a7f/0x5450 [ 68.317135] kasan_report+0x141/0x180 [ 68.317140] ? kasan_atomics_helper+0x1a7f/0x5450 [ 68.317145] kasan_check_range+0x10c/0x1c0 [ 68.317150] __kasan_check_write+0x18/0x20 [ 68.317154] kasan_atomics_helper+0x1a7f/0x5450 [ 68.317158] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 68.317163] ? __kmalloc_cache_noprof+0x189/0x420 [ 68.317167] ? kasan_atomics+0x152/0x310 [ 68.317171] kasan_atomics+0x1dc/0x310 [ 68.317174] ? __pfx_kasan_atomics+0x10/0x10 [ 68.317178] ? ktime_get_ts64+0x83/0x230 [ 68.317183] kunit_try_run_case+0x1a2/0x480 [ 68.317188] ? __pfx_kunit_try_run_case+0x10/0x10 [ 68.317192] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 68.317197] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 68.317202] ? __kthread_parkme+0x82/0x180 [ 68.317206] ? preempt_count_sub+0x50/0x80 [ 68.317211] ? __pfx_kunit_try_run_case+0x10/0x10 [ 68.317215] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 68.317219] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 68.317224] kthread+0x334/0x6f0 [ 68.317228] ? trace_preempt_on+0x20/0xc0 [ 68.317233] ? __pfx_kthread+0x10/0x10 [ 68.317237] ? _raw_spin_unlock_irq+0x47/0x80 [ 68.317241] ? calculate_sigpending+0x7b/0xa0 [ 68.317246] ? __pfx_kthread+0x10/0x10 [ 68.317250] ret_from_fork+0x3e/0x80 [ 68.317254] ? __pfx_kthread+0x10/0x10 [ 68.317259] ret_from_fork_asm+0x1a/0x30 [ 68.317265] </TASK> [ 68.317267] [ 68.498302] Allocated by task 308: [ 68.501721] kasan_save_stack+0x45/0x70 [ 68.505574] kasan_save_track+0x18/0x40 [ 68.509412] kasan_save_alloc_info+0x3b/0x50 [ 68.513707] __kasan_kmalloc+0xb7/0xc0 [ 68.517481] __kmalloc_cache_noprof+0x189/0x420 [ 68.522013] kasan_atomics+0x95/0x310 [ 68.525720] kunit_try_run_case+0x1a2/0x480 [ 68.529916] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 68.535315] kthread+0x334/0x6f0 [ 68.538549] ret_from_fork+0x3e/0x80 [ 68.542128] ret_from_fork_asm+0x1a/0x30 [ 68.546054] [ 68.547553] The buggy address belongs to the object at ffff8881061f7500 [ 68.547553] which belongs to the cache kmalloc-64 of size 64 [ 68.559895] The buggy address is located 0 bytes to the right of [ 68.559895] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 68.572755] [ 68.574253] The buggy address belongs to the physical page: [ 68.579827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 68.587835] flags: 0x200000000000000(node=0|zone=2) [ 68.592745] page_type: f5(slab) [ 68.595896] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 68.603643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.611389] page dumped because: kasan: bad access detected [ 68.616961] [ 68.618462] Memory state around the buggy address: [ 68.623254] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.630472] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.637719] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.644944] ^ [ 68.649746] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.656967] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.664193] ================================================================== [ 75.126181] ================================================================== [ 75.133411] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 75.140804] Read of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 75.148112] [ 75.149610] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 75.149617] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.149619] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 75.149623] Call Trace: [ 75.149624] <TASK> [ 75.149626] dump_stack_lvl+0x73/0xb0 [ 75.149630] print_report+0xd1/0x650 [ 75.149634] ? __virt_addr_valid+0x1db/0x2d0 [ 75.149638] ? kasan_atomics_helper+0x5115/0x5450 [ 75.149642] ? kasan_complete_mode_report_info+0x2a/0x200 [ 75.149646] ? kasan_atomics_helper+0x5115/0x5450 [ 75.149651] kasan_report+0x141/0x180 [ 75.149655] ? kasan_atomics_helper+0x5115/0x5450 [ 75.149660] __asan_report_load8_noabort+0x18/0x20 [ 75.149664] kasan_atomics_helper+0x5115/0x5450 [ 75.149668] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 75.149673] ? __kmalloc_cache_noprof+0x189/0x420 [ 75.149694] ? kasan_atomics+0x152/0x310 [ 75.149698] kasan_atomics+0x1dc/0x310 [ 75.149702] ? __pfx_kasan_atomics+0x10/0x10 [ 75.149706] ? ktime_get_ts64+0x83/0x230 [ 75.149723] kunit_try_run_case+0x1a2/0x480 [ 75.149728] ? __pfx_kunit_try_run_case+0x10/0x10 [ 75.149732] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 75.149737] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 75.149742] ? __kthread_parkme+0x82/0x180 [ 75.149746] ? preempt_count_sub+0x50/0x80 [ 75.149751] ? __pfx_kunit_try_run_case+0x10/0x10 [ 75.149755] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 75.149759] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 75.149764] kthread+0x334/0x6f0 [ 75.149768] ? trace_preempt_on+0x20/0xc0 [ 75.149772] ? __pfx_kthread+0x10/0x10 [ 75.149777] ? _raw_spin_unlock_irq+0x47/0x80 [ 75.149781] ? calculate_sigpending+0x7b/0xa0 [ 75.149785] ? __pfx_kthread+0x10/0x10 [ 75.149790] ret_from_fork+0x3e/0x80 [ 75.149794] ? __pfx_kthread+0x10/0x10 [ 75.149798] ret_from_fork_asm+0x1a/0x30 [ 75.149804] </TASK> [ 75.149806] [ 75.327475] Allocated by task 308: [ 75.330883] kasan_save_stack+0x45/0x70 [ 75.334750] kasan_save_track+0x18/0x40 [ 75.338596] kasan_save_alloc_info+0x3b/0x50 [ 75.342868] __kasan_kmalloc+0xb7/0xc0 [ 75.346618] __kmalloc_cache_noprof+0x189/0x420 [ 75.351154] kasan_atomics+0x95/0x310 [ 75.354817] kunit_try_run_case+0x1a2/0x480 [ 75.359003] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 75.364405] kthread+0x334/0x6f0 [ 75.367644] ret_from_fork+0x3e/0x80 [ 75.371223] ret_from_fork_asm+0x1a/0x30 [ 75.375151] [ 75.376650] The buggy address belongs to the object at ffff8881061f7500 [ 75.376650] which belongs to the cache kmalloc-64 of size 64 [ 75.388991] The buggy address is located 0 bytes to the right of [ 75.388991] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 75.401859] [ 75.403359] The buggy address belongs to the physical page: [ 75.408931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 75.416939] flags: 0x200000000000000(node=0|zone=2) [ 75.421818] page_type: f5(slab) [ 75.424965] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 75.432724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.440475] page dumped because: kasan: bad access detected [ 75.446049] [ 75.447547] Memory state around the buggy address: [ 75.452340] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.459560] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.466777] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.473996] ^ [ 75.478788] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.486010] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.493235] ================================================================== [ 63.016352] ================================================================== [ 63.023571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 63.030965] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 63.038279] [ 63.039779] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 63.039786] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.039789] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 63.039792] Call Trace: [ 63.039794] <TASK> [ 63.039796] dump_stack_lvl+0x73/0xb0 [ 63.039799] print_report+0xd1/0x650 [ 63.039803] ? __virt_addr_valid+0x1db/0x2d0 [ 63.039807] ? kasan_atomics_helper+0x49ce/0x5450 [ 63.039811] ? kasan_complete_mode_report_info+0x2a/0x200 [ 63.039816] ? kasan_atomics_helper+0x49ce/0x5450 [ 63.039820] kasan_report+0x141/0x180 [ 63.039824] ? kasan_atomics_helper+0x49ce/0x5450 [ 63.039829] __asan_report_load4_noabort+0x18/0x20 [ 63.039833] kasan_atomics_helper+0x49ce/0x5450 [ 63.039838] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 63.039842] ? __kmalloc_cache_noprof+0x189/0x420 [ 63.039846] ? kasan_atomics+0x152/0x310 [ 63.039850] kasan_atomics+0x1dc/0x310 [ 63.039854] ? __pfx_kasan_atomics+0x10/0x10 [ 63.039857] ? ktime_get_ts64+0x83/0x230 [ 63.039862] kunit_try_run_case+0x1a2/0x480 [ 63.039867] ? __pfx_kunit_try_run_case+0x10/0x10 [ 63.039871] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 63.039876] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 63.039881] ? __kthread_parkme+0x82/0x180 [ 63.039885] ? preempt_count_sub+0x50/0x80 [ 63.039890] ? __pfx_kunit_try_run_case+0x10/0x10 [ 63.039894] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 63.039899] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 63.039903] kthread+0x334/0x6f0 [ 63.039907] ? trace_preempt_on+0x20/0xc0 [ 63.039912] ? __pfx_kthread+0x10/0x10 [ 63.039916] ? _raw_spin_unlock_irq+0x47/0x80 [ 63.039920] ? calculate_sigpending+0x7b/0xa0 [ 63.039924] ? __pfx_kthread+0x10/0x10 [ 63.039929] ret_from_fork+0x3e/0x80 [ 63.039933] ? __pfx_kthread+0x10/0x10 [ 63.039937] ret_from_fork_asm+0x1a/0x30 [ 63.039943] </TASK> [ 63.039945] [ 63.217461] Allocated by task 308: [ 63.220868] kasan_save_stack+0x45/0x70 [ 63.224706] kasan_save_track+0x18/0x40 [ 63.228571] kasan_save_alloc_info+0x3b/0x50 [ 63.232844] __kasan_kmalloc+0xb7/0xc0 [ 63.236598] __kmalloc_cache_noprof+0x189/0x420 [ 63.241130] kasan_atomics+0x95/0x310 [ 63.244796] kunit_try_run_case+0x1a2/0x480 [ 63.248991] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 63.254398] kthread+0x334/0x6f0 [ 63.257631] ret_from_fork+0x3e/0x80 [ 63.261219] ret_from_fork_asm+0x1a/0x30 [ 63.265151] [ 63.266651] The buggy address belongs to the object at ffff8881061f7500 [ 63.266651] which belongs to the cache kmalloc-64 of size 64 [ 63.278993] The buggy address is located 0 bytes to the right of [ 63.278993] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 63.291861] [ 63.293362] The buggy address belongs to the physical page: [ 63.298935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 63.306940] flags: 0x200000000000000(node=0|zone=2) [ 63.311819] page_type: f5(slab) [ 63.314968] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 63.322726] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.330480] page dumped because: kasan: bad access detected [ 63.336050] [ 63.337551] Memory state around the buggy address: [ 63.342343] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.349562] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.356781] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.363998] ^ [ 63.368794] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.376020] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.383239] ================================================================== [ 58.876248] ================================================================== [ 58.883480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 58.890786] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 58.898176] [ 58.899718] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 58.899726] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.899728] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 58.899732] Call Trace: [ 58.899733] <TASK> [ 58.899735] dump_stack_lvl+0x73/0xb0 [ 58.899739] print_report+0xd1/0x650 [ 58.899743] ? __virt_addr_valid+0x1db/0x2d0 [ 58.899747] ? kasan_atomics_helper+0xe78/0x5450 [ 58.899751] ? kasan_complete_mode_report_info+0x2a/0x200 [ 58.899755] ? kasan_atomics_helper+0xe78/0x5450 [ 58.899760] kasan_report+0x141/0x180 [ 58.899764] ? kasan_atomics_helper+0xe78/0x5450 [ 58.899769] kasan_check_range+0x10c/0x1c0 [ 58.899774] __kasan_check_write+0x18/0x20 [ 58.899778] kasan_atomics_helper+0xe78/0x5450 [ 58.899782] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 58.899786] ? __kmalloc_cache_noprof+0x189/0x420 [ 58.899790] ? kasan_atomics+0x152/0x310 [ 58.899794] kasan_atomics+0x1dc/0x310 [ 58.899798] ? __pfx_kasan_atomics+0x10/0x10 [ 58.899802] ? ktime_get_ts64+0x83/0x230 [ 58.899806] kunit_try_run_case+0x1a2/0x480 [ 58.899811] ? __pfx_kunit_try_run_case+0x10/0x10 [ 58.899815] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 58.899820] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 58.899825] ? __kthread_parkme+0x82/0x180 [ 58.899829] ? preempt_count_sub+0x50/0x80 [ 58.899834] ? __pfx_kunit_try_run_case+0x10/0x10 [ 58.899838] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 58.899842] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 58.899846] kthread+0x334/0x6f0 [ 58.899850] ? trace_preempt_on+0x20/0xc0 [ 58.899855] ? __pfx_kthread+0x10/0x10 [ 58.899859] ? _raw_spin_unlock_irq+0x47/0x80 [ 58.899863] ? calculate_sigpending+0x7b/0xa0 [ 58.899867] ? __pfx_kthread+0x10/0x10 [ 58.899872] ret_from_fork+0x3e/0x80 [ 58.899876] ? __pfx_kthread+0x10/0x10 [ 58.899880] ret_from_fork_asm+0x1a/0x30 [ 58.899886] </TASK> [ 58.899888] [ 59.080508] Allocated by task 308: [ 59.083915] kasan_save_stack+0x45/0x70 [ 59.087763] kasan_save_track+0x18/0x40 [ 59.091609] kasan_save_alloc_info+0x3b/0x50 [ 59.095880] __kasan_kmalloc+0xb7/0xc0 [ 59.099635] __kmalloc_cache_noprof+0x189/0x420 [ 59.104175] kasan_atomics+0x95/0x310 [ 59.107840] kunit_try_run_case+0x1a2/0x480 [ 59.112027] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 59.117426] kthread+0x334/0x6f0 [ 59.120657] ret_from_fork+0x3e/0x80 [ 59.124236] ret_from_fork_asm+0x1a/0x30 [ 59.128164] [ 59.129664] The buggy address belongs to the object at ffff8881061f7500 [ 59.129664] which belongs to the cache kmalloc-64 of size 64 [ 59.142021] The buggy address is located 0 bytes to the right of [ 59.142021] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 59.154880] [ 59.156382] The buggy address belongs to the physical page: [ 59.161955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 59.169961] flags: 0x200000000000000(node=0|zone=2) [ 59.174841] page_type: f5(slab) [ 59.177988] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 59.185742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.193480] page dumped because: kasan: bad access detected [ 59.199052] [ 59.200552] Memory state around the buggy address: [ 59.205346] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.212564] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.219782] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.227002] ^ [ 59.231795] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.239015] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.246241] ================================================================== [ 62.264278] ================================================================== [ 62.271513] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 62.278907] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 62.286219] [ 62.287738] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 62.287745] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.287747] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 62.287751] Call Trace: [ 62.287752] <TASK> [ 62.287754] dump_stack_lvl+0x73/0xb0 [ 62.287758] print_report+0xd1/0x650 [ 62.287762] ? __virt_addr_valid+0x1db/0x2d0 [ 62.287766] ? kasan_atomics_helper+0x49e8/0x5450 [ 62.287770] ? kasan_complete_mode_report_info+0x2a/0x200 [ 62.287774] ? kasan_atomics_helper+0x49e8/0x5450 [ 62.287778] kasan_report+0x141/0x180 [ 62.287783] ? kasan_atomics_helper+0x49e8/0x5450 [ 62.287788] __asan_report_load4_noabort+0x18/0x20 [ 62.287792] kasan_atomics_helper+0x49e8/0x5450 [ 62.287796] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 62.287801] ? __kmalloc_cache_noprof+0x189/0x420 [ 62.287805] ? kasan_atomics+0x152/0x310 [ 62.287809] kasan_atomics+0x1dc/0x310 [ 62.287812] ? __pfx_kasan_atomics+0x10/0x10 [ 62.287816] ? ktime_get_ts64+0x83/0x230 [ 62.287821] kunit_try_run_case+0x1a2/0x480 [ 62.287825] ? __pfx_kunit_try_run_case+0x10/0x10 [ 62.287830] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 62.287834] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 62.287839] ? __kthread_parkme+0x82/0x180 [ 62.287843] ? preempt_count_sub+0x50/0x80 [ 62.287848] ? __pfx_kunit_try_run_case+0x10/0x10 [ 62.287852] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 62.287857] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 62.287861] kthread+0x334/0x6f0 [ 62.287865] ? trace_preempt_on+0x20/0xc0 [ 62.287869] ? __pfx_kthread+0x10/0x10 [ 62.287874] ? _raw_spin_unlock_irq+0x47/0x80 [ 62.287878] ? calculate_sigpending+0x7b/0xa0 [ 62.287882] ? __pfx_kthread+0x10/0x10 [ 62.287887] ret_from_fork+0x3e/0x80 [ 62.287891] ? __pfx_kthread+0x10/0x10 [ 62.287895] ret_from_fork_asm+0x1a/0x30 [ 62.287901] </TASK> [ 62.287903] [ 62.465473] Allocated by task 308: [ 62.468878] kasan_save_stack+0x45/0x70 [ 62.472734] kasan_save_track+0x18/0x40 [ 62.476573] kasan_save_alloc_info+0x3b/0x50 [ 62.480848] __kasan_kmalloc+0xb7/0xc0 [ 62.484608] __kmalloc_cache_noprof+0x189/0x420 [ 62.489140] kasan_atomics+0x95/0x310 [ 62.492805] kunit_try_run_case+0x1a2/0x480 [ 62.496991] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 62.502393] kthread+0x334/0x6f0 [ 62.505632] ret_from_fork+0x3e/0x80 [ 62.509212] ret_from_fork_asm+0x1a/0x30 [ 62.513137] [ 62.514638] The buggy address belongs to the object at ffff8881061f7500 [ 62.514638] which belongs to the cache kmalloc-64 of size 64 [ 62.526977] The buggy address is located 0 bytes to the right of [ 62.526977] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 62.539840] [ 62.541337] The buggy address belongs to the physical page: [ 62.546910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 62.554918] flags: 0x200000000000000(node=0|zone=2) [ 62.559798] page_type: f5(slab) [ 62.562942] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 62.570705] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.578465] page dumped because: kasan: bad access detected [ 62.584045] [ 62.585545] Memory state around the buggy address: [ 62.590338] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.597563] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.604782] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.612003] ^ [ 62.616793] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.624015] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.631240] ================================================================== [ 65.272073] ================================================================== [ 65.279305] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 65.286707] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 65.294124] [ 65.295626] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 65.295634] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.295636] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 65.295639] Call Trace: [ 65.295641] <TASK> [ 65.295643] dump_stack_lvl+0x73/0xb0 [ 65.295646] print_report+0xd1/0x650 [ 65.295651] ? __virt_addr_valid+0x1db/0x2d0 [ 65.295655] ? kasan_atomics_helper+0x15b6/0x5450 [ 65.295659] ? kasan_complete_mode_report_info+0x2a/0x200 [ 65.295663] ? kasan_atomics_helper+0x15b6/0x5450 [ 65.295668] kasan_report+0x141/0x180 [ 65.295689] ? kasan_atomics_helper+0x15b6/0x5450 [ 65.295694] kasan_check_range+0x10c/0x1c0 [ 65.295700] __kasan_check_write+0x18/0x20 [ 65.295703] kasan_atomics_helper+0x15b6/0x5450 [ 65.295720] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 65.295725] ? __kmalloc_cache_noprof+0x189/0x420 [ 65.295729] ? kasan_atomics+0x152/0x310 [ 65.295733] kasan_atomics+0x1dc/0x310 [ 65.295736] ? __pfx_kasan_atomics+0x10/0x10 [ 65.295740] ? ktime_get_ts64+0x83/0x230 [ 65.295745] kunit_try_run_case+0x1a2/0x480 [ 65.295750] ? __pfx_kunit_try_run_case+0x10/0x10 [ 65.295754] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 65.295759] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 65.295764] ? __kthread_parkme+0x82/0x180 [ 65.295768] ? preempt_count_sub+0x50/0x80 [ 65.295773] ? __pfx_kunit_try_run_case+0x10/0x10 [ 65.295777] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 65.295781] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 65.295786] kthread+0x334/0x6f0 [ 65.295790] ? trace_preempt_on+0x20/0xc0 [ 65.295794] ? __pfx_kthread+0x10/0x10 [ 65.295799] ? _raw_spin_unlock_irq+0x47/0x80 [ 65.295803] ? calculate_sigpending+0x7b/0xa0 [ 65.295807] ? __pfx_kthread+0x10/0x10 [ 65.295812] ret_from_fork+0x3e/0x80 [ 65.295816] ? __pfx_kthread+0x10/0x10 [ 65.295820] ret_from_fork_asm+0x1a/0x30 [ 65.295826] </TASK> [ 65.295828] [ 65.476862] Allocated by task 308: [ 65.480266] kasan_save_stack+0x45/0x70 [ 65.484107] kasan_save_track+0x18/0x40 [ 65.487946] kasan_save_alloc_info+0x3b/0x50 [ 65.492217] __kasan_kmalloc+0xb7/0xc0 [ 65.495972] __kmalloc_cache_noprof+0x189/0x420 [ 65.500504] kasan_atomics+0x95/0x310 [ 65.504170] kunit_try_run_case+0x1a2/0x480 [ 65.508365] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 65.513770] kthread+0x334/0x6f0 [ 65.517002] ret_from_fork+0x3e/0x80 [ 65.520583] ret_from_fork_asm+0x1a/0x30 [ 65.524509] [ 65.526008] The buggy address belongs to the object at ffff8881061f7500 [ 65.526008] which belongs to the cache kmalloc-64 of size 64 [ 65.538348] The buggy address is located 0 bytes to the right of [ 65.538348] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 65.551209] [ 65.552707] The buggy address belongs to the physical page: [ 65.558308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 65.566316] flags: 0x200000000000000(node=0|zone=2) [ 65.571194] page_type: f5(slab) [ 65.574342] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 65.582089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.589834] page dumped because: kasan: bad access detected [ 65.595406] [ 65.596907] Memory state around the buggy address: [ 65.601706] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.608926] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.616147] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.623374] ^ [ 65.628166] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.635385] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.642605] ================================================================== [ 66.027453] ================================================================== [ 66.034720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 66.042117] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 66.049512] [ 66.051011] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 66.051018] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.051020] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 66.051024] Call Trace: [ 66.051025] <TASK> [ 66.051027] dump_stack_lvl+0x73/0xb0 [ 66.051031] print_report+0xd1/0x650 [ 66.051035] ? __virt_addr_valid+0x1db/0x2d0 [ 66.051039] ? kasan_atomics_helper+0x16e7/0x5450 [ 66.051043] ? kasan_complete_mode_report_info+0x2a/0x200 [ 66.051047] ? kasan_atomics_helper+0x16e7/0x5450 [ 66.051052] kasan_report+0x141/0x180 [ 66.051056] ? kasan_atomics_helper+0x16e7/0x5450 [ 66.051061] kasan_check_range+0x10c/0x1c0 [ 66.051066] __kasan_check_write+0x18/0x20 [ 66.051070] kasan_atomics_helper+0x16e7/0x5450 [ 66.051074] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 66.051079] ? __kmalloc_cache_noprof+0x189/0x420 [ 66.051083] ? kasan_atomics+0x152/0x310 [ 66.051087] kasan_atomics+0x1dc/0x310 [ 66.051090] ? __pfx_kasan_atomics+0x10/0x10 [ 66.051094] ? ktime_get_ts64+0x83/0x230 [ 66.051099] kunit_try_run_case+0x1a2/0x480 [ 66.051104] ? __pfx_kunit_try_run_case+0x10/0x10 [ 66.051108] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 66.051113] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 66.051118] ? __kthread_parkme+0x82/0x180 [ 66.051122] ? preempt_count_sub+0x50/0x80 [ 66.051127] ? __pfx_kunit_try_run_case+0x10/0x10 [ 66.051131] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 66.051135] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 66.051140] kthread+0x334/0x6f0 [ 66.051144] ? trace_preempt_on+0x20/0xc0 [ 66.051148] ? __pfx_kthread+0x10/0x10 [ 66.051153] ? _raw_spin_unlock_irq+0x47/0x80 [ 66.051157] ? calculate_sigpending+0x7b/0xa0 [ 66.051161] ? __pfx_kthread+0x10/0x10 [ 66.051166] ret_from_fork+0x3e/0x80 [ 66.051170] ? __pfx_kthread+0x10/0x10 [ 66.051175] ret_from_fork_asm+0x1a/0x30 [ 66.051180] </TASK> [ 66.051182] [ 66.232154] Allocated by task 308: [ 66.235560] kasan_save_stack+0x45/0x70 [ 66.239405] kasan_save_track+0x18/0x40 [ 66.243247] kasan_save_alloc_info+0x3b/0x50 [ 66.247518] __kasan_kmalloc+0xb7/0xc0 [ 66.251270] __kmalloc_cache_noprof+0x189/0x420 [ 66.255803] kasan_atomics+0x95/0x310 [ 66.259468] kunit_try_run_case+0x1a2/0x480 [ 66.263655] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 66.269054] kthread+0x334/0x6f0 [ 66.272285] ret_from_fork+0x3e/0x80 [ 66.275866] ret_from_fork_asm+0x1a/0x30 [ 66.279800] [ 66.281299] The buggy address belongs to the object at ffff8881061f7500 [ 66.281299] which belongs to the cache kmalloc-64 of size 64 [ 66.293639] The buggy address is located 0 bytes to the right of [ 66.293639] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 66.306501] [ 66.307999] The buggy address belongs to the physical page: [ 66.313572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 66.321571] flags: 0x200000000000000(node=0|zone=2) [ 66.326451] page_type: f5(slab) [ 66.329598] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 66.337343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.345083] page dumped because: kasan: bad access detected [ 66.350655] [ 66.352155] Memory state around the buggy address: [ 66.356949] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.364176] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.371401] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.378622] ^ [ 66.383412] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.390633] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.397853] ================================================================== [ 65.649830] ================================================================== [ 65.657077] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 65.664470] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 65.671871] [ 65.673369] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 65.673376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.673378] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 65.673382] Call Trace: [ 65.673383] <TASK> [ 65.673385] dump_stack_lvl+0x73/0xb0 [ 65.673389] print_report+0xd1/0x650 [ 65.673393] ? __virt_addr_valid+0x1db/0x2d0 [ 65.673397] ? kasan_atomics_helper+0x164f/0x5450 [ 65.673401] ? kasan_complete_mode_report_info+0x2a/0x200 [ 65.673405] ? kasan_atomics_helper+0x164f/0x5450 [ 65.673409] kasan_report+0x141/0x180 [ 65.673414] ? kasan_atomics_helper+0x164f/0x5450 [ 65.673419] kasan_check_range+0x10c/0x1c0 [ 65.673424] __kasan_check_write+0x18/0x20 [ 65.673428] kasan_atomics_helper+0x164f/0x5450 [ 65.673432] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 65.673436] ? __kmalloc_cache_noprof+0x189/0x420 [ 65.673440] ? kasan_atomics+0x152/0x310 [ 65.673445] kasan_atomics+0x1dc/0x310 [ 65.673448] ? __pfx_kasan_atomics+0x10/0x10 [ 65.673452] ? ktime_get_ts64+0x83/0x230 [ 65.673457] kunit_try_run_case+0x1a2/0x480 [ 65.673461] ? __pfx_kunit_try_run_case+0x10/0x10 [ 65.673466] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 65.673470] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 65.673475] ? __kthread_parkme+0x82/0x180 [ 65.673479] ? preempt_count_sub+0x50/0x80 [ 65.673484] ? __pfx_kunit_try_run_case+0x10/0x10 [ 65.673489] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 65.673493] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 65.673497] kthread+0x334/0x6f0 [ 65.673501] ? trace_preempt_on+0x20/0xc0 [ 65.673506] ? __pfx_kthread+0x10/0x10 [ 65.673510] ? _raw_spin_unlock_irq+0x47/0x80 [ 65.673515] ? calculate_sigpending+0x7b/0xa0 [ 65.673519] ? __pfx_kthread+0x10/0x10 [ 65.673523] ret_from_fork+0x3e/0x80 [ 65.673528] ? __pfx_kthread+0x10/0x10 [ 65.673532] ret_from_fork_asm+0x1a/0x30 [ 65.673538] </TASK> [ 65.673540] [ 65.854485] Allocated by task 308: [ 65.857890] kasan_save_stack+0x45/0x70 [ 65.861734] kasan_save_track+0x18/0x40 [ 65.865579] kasan_save_alloc_info+0x3b/0x50 [ 65.869859] __kasan_kmalloc+0xb7/0xc0 [ 65.873611] __kmalloc_cache_noprof+0x189/0x420 [ 65.878144] kasan_atomics+0x95/0x310 [ 65.881809] kunit_try_run_case+0x1a2/0x480 [ 65.885995] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 65.891396] kthread+0x334/0x6f0 [ 65.894626] ret_from_fork+0x3e/0x80 [ 65.898206] ret_from_fork_asm+0x1a/0x30 [ 65.902132] [ 65.903632] The buggy address belongs to the object at ffff8881061f7500 [ 65.903632] which belongs to the cache kmalloc-64 of size 64 [ 65.915974] The buggy address is located 0 bytes to the right of [ 65.915974] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 65.928833] [ 65.930332] The buggy address belongs to the physical page: [ 65.935903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 65.943903] flags: 0x200000000000000(node=0|zone=2) [ 65.948784] page_type: f5(slab) [ 65.951930] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 65.959718] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.967466] page dumped because: kasan: bad access detected [ 65.973039] [ 65.974539] Memory state around the buggy address: [ 65.979332] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.986550] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.993772] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.000999] ^ [ 66.005789] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.013010] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.020228] ================================================================== [ 68.671437] ================================================================== [ 68.678667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 68.686082] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 68.693476] [ 68.694976] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 68.694983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.694985] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 68.694989] Call Trace: [ 68.694990] <TASK> [ 68.694992] dump_stack_lvl+0x73/0xb0 [ 68.694996] print_report+0xd1/0x650 [ 68.695000] ? __virt_addr_valid+0x1db/0x2d0 [ 68.695004] ? kasan_atomics_helper+0x1b22/0x5450 [ 68.695008] ? kasan_complete_mode_report_info+0x2a/0x200 [ 68.695012] ? kasan_atomics_helper+0x1b22/0x5450 [ 68.695017] kasan_report+0x141/0x180 [ 68.695021] ? kasan_atomics_helper+0x1b22/0x5450 [ 68.695026] kasan_check_range+0x10c/0x1c0 [ 68.695031] __kasan_check_write+0x18/0x20 [ 68.695035] kasan_atomics_helper+0x1b22/0x5450 [ 68.695040] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 68.695044] ? __kmalloc_cache_noprof+0x189/0x420 [ 68.695048] ? kasan_atomics+0x152/0x310 [ 68.695052] kasan_atomics+0x1dc/0x310 [ 68.695055] ? __pfx_kasan_atomics+0x10/0x10 [ 68.695059] ? ktime_get_ts64+0x83/0x230 [ 68.695064] kunit_try_run_case+0x1a2/0x480 [ 68.695069] ? __pfx_kunit_try_run_case+0x10/0x10 [ 68.695073] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 68.695078] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 68.695082] ? __kthread_parkme+0x82/0x180 [ 68.695087] ? preempt_count_sub+0x50/0x80 [ 68.695091] ? __pfx_kunit_try_run_case+0x10/0x10 [ 68.695096] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 68.695100] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 68.695105] kthread+0x334/0x6f0 [ 68.695109] ? trace_preempt_on+0x20/0xc0 [ 68.695113] ? __pfx_kthread+0x10/0x10 [ 68.695118] ? _raw_spin_unlock_irq+0x47/0x80 [ 68.695122] ? calculate_sigpending+0x7b/0xa0 [ 68.695126] ? __pfx_kthread+0x10/0x10 [ 68.695131] ret_from_fork+0x3e/0x80 [ 68.695135] ? __pfx_kthread+0x10/0x10 [ 68.695139] ret_from_fork_asm+0x1a/0x30 [ 68.695145] </TASK> [ 68.695147] [ 68.876109] Allocated by task 308: [ 68.879513] kasan_save_stack+0x45/0x70 [ 68.883355] kasan_save_track+0x18/0x40 [ 68.887202] kasan_save_alloc_info+0x3b/0x50 [ 68.891475] __kasan_kmalloc+0xb7/0xc0 [ 68.895228] __kmalloc_cache_noprof+0x189/0x420 [ 68.899759] kasan_atomics+0x95/0x310 [ 68.903426] kunit_try_run_case+0x1a2/0x480 [ 68.907611] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 68.913009] kthread+0x334/0x6f0 [ 68.916243] ret_from_fork+0x3e/0x80 [ 68.919821] ret_from_fork_asm+0x1a/0x30 [ 68.923748] [ 68.925245] The buggy address belongs to the object at ffff8881061f7500 [ 68.925245] which belongs to the cache kmalloc-64 of size 64 [ 68.937580] The buggy address is located 0 bytes to the right of [ 68.937580] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 68.950440] [ 68.951940] The buggy address belongs to the physical page: [ 68.957512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 68.965520] flags: 0x200000000000000(node=0|zone=2) [ 68.970398] page_type: f5(slab) [ 68.973545] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 68.981294] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.989040] page dumped because: kasan: bad access detected [ 68.994610] [ 68.996109] Memory state around the buggy address: [ 69.000904] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.008130] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.015350] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.022567] ^ [ 69.027362] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.034580] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.041800] ================================================================== [ 56.992852] ================================================================== [ 57.000085] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 57.007398] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 57.014791] [ 57.016290] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 57.016297] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.016299] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 57.016303] Call Trace: [ 57.016305] <TASK> [ 57.016306] dump_stack_lvl+0x73/0xb0 [ 57.016310] print_report+0xd1/0x650 [ 57.016314] ? __virt_addr_valid+0x1db/0x2d0 [ 57.016318] ? kasan_atomics_helper+0xb6a/0x5450 [ 57.016322] ? kasan_complete_mode_report_info+0x2a/0x200 [ 57.016327] ? kasan_atomics_helper+0xb6a/0x5450 [ 57.016331] kasan_report+0x141/0x180 [ 57.016336] ? kasan_atomics_helper+0xb6a/0x5450 [ 57.016341] kasan_check_range+0x10c/0x1c0 [ 57.016346] __kasan_check_write+0x18/0x20 [ 57.016349] kasan_atomics_helper+0xb6a/0x5450 [ 57.016354] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 57.016358] ? __kmalloc_cache_noprof+0x189/0x420 [ 57.016362] ? kasan_atomics+0x152/0x310 [ 57.016366] kasan_atomics+0x1dc/0x310 [ 57.016370] ? __pfx_kasan_atomics+0x10/0x10 [ 57.016374] ? ktime_get_ts64+0x83/0x230 [ 57.016378] kunit_try_run_case+0x1a2/0x480 [ 57.016383] ? __pfx_kunit_try_run_case+0x10/0x10 [ 57.016387] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 57.016392] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 57.016397] ? __kthread_parkme+0x82/0x180 [ 57.016401] ? preempt_count_sub+0x50/0x80 [ 57.016406] ? __pfx_kunit_try_run_case+0x10/0x10 [ 57.016410] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 57.016415] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 57.016419] kthread+0x334/0x6f0 [ 57.016423] ? trace_preempt_on+0x20/0xc0 [ 57.016427] ? __pfx_kthread+0x10/0x10 [ 57.016432] ? _raw_spin_unlock_irq+0x47/0x80 [ 57.016436] ? calculate_sigpending+0x7b/0xa0 [ 57.016440] ? __pfx_kthread+0x10/0x10 [ 57.016445] ret_from_fork+0x3e/0x80 [ 57.016449] ? __pfx_kthread+0x10/0x10 [ 57.016453] ret_from_fork_asm+0x1a/0x30 [ 57.016459] </TASK> [ 57.016461] [ 57.197145] Allocated by task 308: [ 57.200552] kasan_save_stack+0x45/0x70 [ 57.204390] kasan_save_track+0x18/0x40 [ 57.208231] kasan_save_alloc_info+0x3b/0x50 [ 57.212503] __kasan_kmalloc+0xb7/0xc0 [ 57.216254] __kmalloc_cache_noprof+0x189/0x420 [ 57.220786] kasan_atomics+0x95/0x310 [ 57.224454] kunit_try_run_case+0x1a2/0x480 [ 57.228641] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 57.234047] kthread+0x334/0x6f0 [ 57.237279] ret_from_fork+0x3e/0x80 [ 57.240858] ret_from_fork_asm+0x1a/0x30 [ 57.244784] [ 57.246283] The buggy address belongs to the object at ffff8881061f7500 [ 57.246283] which belongs to the cache kmalloc-64 of size 64 [ 57.258615] The buggy address is located 0 bytes to the right of [ 57.258615] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 57.271478] [ 57.272976] The buggy address belongs to the physical page: [ 57.278547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 57.286548] flags: 0x200000000000000(node=0|zone=2) [ 57.291436] page_type: f5(slab) [ 57.294583] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 57.302330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.310077] page dumped because: kasan: bad access detected [ 57.315647] [ 57.317149] Memory state around the buggy address: [ 57.321942] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.329169] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.336389] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.343614] ^ [ 57.348407] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.355627] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.362845] ================================================================== [ 74.374244] ================================================================== [ 74.381474] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 74.388868] Read of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 74.396174] [ 74.397691] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 74.397699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.397701] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 74.397705] Call Trace: [ 74.397706] <TASK> [ 74.397708] dump_stack_lvl+0x73/0xb0 [ 74.397712] print_report+0xd1/0x650 [ 74.397717] ? __virt_addr_valid+0x1db/0x2d0 [ 74.397733] ? kasan_atomics_helper+0x4fa5/0x5450 [ 74.397737] ? kasan_complete_mode_report_info+0x2a/0x200 [ 74.397742] ? kasan_atomics_helper+0x4fa5/0x5450 [ 74.397746] kasan_report+0x141/0x180 [ 74.397750] ? kasan_atomics_helper+0x4fa5/0x5450 [ 74.397755] __asan_report_load8_noabort+0x18/0x20 [ 74.397759] kasan_atomics_helper+0x4fa5/0x5450 [ 74.397764] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 74.397768] ? __kmalloc_cache_noprof+0x189/0x420 [ 74.397772] ? kasan_atomics+0x152/0x310 [ 74.397776] kasan_atomics+0x1dc/0x310 [ 74.397780] ? __pfx_kasan_atomics+0x10/0x10 [ 74.397784] ? ktime_get_ts64+0x83/0x230 [ 74.397789] kunit_try_run_case+0x1a2/0x480 [ 74.397793] ? __pfx_kunit_try_run_case+0x10/0x10 [ 74.397797] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 74.397802] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 74.397807] ? __kthread_parkme+0x82/0x180 [ 74.397811] ? preempt_count_sub+0x50/0x80 [ 74.397816] ? __pfx_kunit_try_run_case+0x10/0x10 [ 74.397821] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 74.397825] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 74.397829] kthread+0x334/0x6f0 [ 74.397833] ? trace_preempt_on+0x20/0xc0 [ 74.397838] ? __pfx_kthread+0x10/0x10 [ 74.397842] ? _raw_spin_unlock_irq+0x47/0x80 [ 74.397847] ? calculate_sigpending+0x7b/0xa0 [ 74.397851] ? __pfx_kthread+0x10/0x10 [ 74.397855] ret_from_fork+0x3e/0x80 [ 74.397859] ? __pfx_kthread+0x10/0x10 [ 74.397864] ret_from_fork_asm+0x1a/0x30 [ 74.397870] </TASK> [ 74.397871] [ 74.575470] Allocated by task 308: [ 74.578876] kasan_save_stack+0x45/0x70 [ 74.582739] kasan_save_track+0x18/0x40 [ 74.586581] kasan_save_alloc_info+0x3b/0x50 [ 74.590852] __kasan_kmalloc+0xb7/0xc0 [ 74.594606] __kmalloc_cache_noprof+0x189/0x420 [ 74.599147] kasan_atomics+0x95/0x310 [ 74.602812] kunit_try_run_case+0x1a2/0x480 [ 74.606996] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 74.612398] kthread+0x334/0x6f0 [ 74.615637] ret_from_fork+0x3e/0x80 [ 74.619216] ret_from_fork_asm+0x1a/0x30 [ 74.623142] [ 74.624642] The buggy address belongs to the object at ffff8881061f7500 [ 74.624642] which belongs to the cache kmalloc-64 of size 64 [ 74.636975] The buggy address is located 0 bytes to the right of [ 74.636975] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 74.649836] [ 74.651333] The buggy address belongs to the physical page: [ 74.656907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 74.664914] flags: 0x200000000000000(node=0|zone=2) [ 74.669793] page_type: f5(slab) [ 74.672939] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 74.680717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.688469] page dumped because: kasan: bad access detected [ 74.694043] [ 74.695541] Memory state around the buggy address: [ 74.700333] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.707552] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.714772] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.721991] ^ [ 74.726782] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.734001] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.741221] ================================================================== [ 58.121723] ================================================================== [ 58.128968] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 58.136274] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 58.143666] [ 58.145192] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 58.145200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.145202] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 58.145205] Call Trace: [ 58.145207] <TASK> [ 58.145209] dump_stack_lvl+0x73/0xb0 [ 58.145213] print_report+0xd1/0x650 [ 58.145217] ? __virt_addr_valid+0x1db/0x2d0 [ 58.145221] ? kasan_atomics_helper+0xd47/0x5450 [ 58.145225] ? kasan_complete_mode_report_info+0x2a/0x200 [ 58.145229] ? kasan_atomics_helper+0xd47/0x5450 [ 58.145233] kasan_report+0x141/0x180 [ 58.145238] ? kasan_atomics_helper+0xd47/0x5450 [ 58.145243] kasan_check_range+0x10c/0x1c0 [ 58.145248] __kasan_check_write+0x18/0x20 [ 58.145251] kasan_atomics_helper+0xd47/0x5450 [ 58.145255] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 58.145260] ? __kmalloc_cache_noprof+0x189/0x420 [ 58.145264] ? kasan_atomics+0x152/0x310 [ 58.145268] kasan_atomics+0x1dc/0x310 [ 58.145271] ? __pfx_kasan_atomics+0x10/0x10 [ 58.145275] ? ktime_get_ts64+0x83/0x230 [ 58.145280] kunit_try_run_case+0x1a2/0x480 [ 58.145285] ? __pfx_kunit_try_run_case+0x10/0x10 [ 58.145289] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 58.145294] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 58.145298] ? __kthread_parkme+0x82/0x180 [ 58.145302] ? preempt_count_sub+0x50/0x80 [ 58.145307] ? __pfx_kunit_try_run_case+0x10/0x10 [ 58.145312] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 58.145316] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 58.145320] kthread+0x334/0x6f0 [ 58.145324] ? trace_preempt_on+0x20/0xc0 [ 58.145329] ? __pfx_kthread+0x10/0x10 [ 58.145333] ? _raw_spin_unlock_irq+0x47/0x80 [ 58.145337] ? calculate_sigpending+0x7b/0xa0 [ 58.145341] ? __pfx_kthread+0x10/0x10 [ 58.145346] ret_from_fork+0x3e/0x80 [ 58.145350] ? __pfx_kthread+0x10/0x10 [ 58.145354] ret_from_fork_asm+0x1a/0x30 [ 58.145360] </TASK> [ 58.145362] [ 58.325995] Allocated by task 308: [ 58.329403] kasan_save_stack+0x45/0x70 [ 58.333242] kasan_save_track+0x18/0x40 [ 58.337082] kasan_save_alloc_info+0x3b/0x50 [ 58.341352] __kasan_kmalloc+0xb7/0xc0 [ 58.345105] __kmalloc_cache_noprof+0x189/0x420 [ 58.349639] kasan_atomics+0x95/0x310 [ 58.353304] kunit_try_run_case+0x1a2/0x480 [ 58.357489] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 58.362890] kthread+0x334/0x6f0 [ 58.366120] ret_from_fork+0x3e/0x80 [ 58.369705] ret_from_fork_asm+0x1a/0x30 [ 58.373660] [ 58.375187] The buggy address belongs to the object at ffff8881061f7500 [ 58.375187] which belongs to the cache kmalloc-64 of size 64 [ 58.387528] The buggy address is located 0 bytes to the right of [ 58.387528] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 58.400396] [ 58.401895] The buggy address belongs to the physical page: [ 58.407467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 58.415465] flags: 0x200000000000000(node=0|zone=2) [ 58.420346] page_type: f5(slab) [ 58.423494] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 58.431242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.438987] page dumped because: kasan: bad access detected [ 58.444561] [ 58.446059] Memory state around the buggy address: [ 58.450852] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.458072] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.465299] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.472516] ^ [ 58.477311] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.484538] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.491755] ================================================================== [ 53.597277] ================================================================== [ 53.604495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 53.611808] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 53.619200] [ 53.620719] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 53.620727] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.620729] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 53.620733] Call Trace: [ 53.620735] <TASK> [ 53.620737] dump_stack_lvl+0x73/0xb0 [ 53.620740] print_report+0xd1/0x650 [ 53.620744] ? __virt_addr_valid+0x1db/0x2d0 [ 53.620748] ? kasan_atomics_helper+0x5fe/0x5450 [ 53.620753] ? kasan_complete_mode_report_info+0x2a/0x200 [ 53.620757] ? kasan_atomics_helper+0x5fe/0x5450 [ 53.620761] kasan_report+0x141/0x180 [ 53.620766] ? kasan_atomics_helper+0x5fe/0x5450 [ 53.620771] kasan_check_range+0x10c/0x1c0 [ 53.620775] __kasan_check_write+0x18/0x20 [ 53.620779] kasan_atomics_helper+0x5fe/0x5450 [ 53.620783] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 53.620788] ? __kmalloc_cache_noprof+0x189/0x420 [ 53.620792] ? kasan_atomics+0x152/0x310 [ 53.620796] kasan_atomics+0x1dc/0x310 [ 53.620799] ? __pfx_kasan_atomics+0x10/0x10 [ 53.620803] ? ktime_get_ts64+0x83/0x230 [ 53.620808] kunit_try_run_case+0x1a2/0x480 [ 53.620812] ? __pfx_kunit_try_run_case+0x10/0x10 [ 53.620817] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 53.620822] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 53.620826] ? __kthread_parkme+0x82/0x180 [ 53.620830] ? preempt_count_sub+0x50/0x80 [ 53.620835] ? __pfx_kunit_try_run_case+0x10/0x10 [ 53.620840] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 53.620844] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 53.620848] kthread+0x334/0x6f0 [ 53.620852] ? trace_preempt_on+0x20/0xc0 [ 53.620857] ? __pfx_kthread+0x10/0x10 [ 53.620861] ? _raw_spin_unlock_irq+0x47/0x80 [ 53.620866] ? calculate_sigpending+0x7b/0xa0 [ 53.620870] ? __pfx_kthread+0x10/0x10 [ 53.620874] ret_from_fork+0x3e/0x80 [ 53.620878] ? __pfx_kthread+0x10/0x10 [ 53.620882] ret_from_fork_asm+0x1a/0x30 [ 53.620888] </TASK> [ 53.620890] [ 53.801512] Allocated by task 308: [ 53.804917] kasan_save_stack+0x45/0x70 [ 53.808758] kasan_save_track+0x18/0x40 [ 53.812595] kasan_save_alloc_info+0x3b/0x50 [ 53.816870] __kasan_kmalloc+0xb7/0xc0 [ 53.820629] __kmalloc_cache_noprof+0x189/0x420 [ 53.825162] kasan_atomics+0x95/0x310 [ 53.828828] kunit_try_run_case+0x1a2/0x480 [ 53.833014] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 53.838414] kthread+0x334/0x6f0 [ 53.841647] ret_from_fork+0x3e/0x80 [ 53.845234] ret_from_fork_asm+0x1a/0x30 [ 53.849159] [ 53.850659] The buggy address belongs to the object at ffff8881061f7500 [ 53.850659] which belongs to the cache kmalloc-64 of size 64 [ 53.863025] The buggy address is located 0 bytes to the right of [ 53.863025] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 53.875888] [ 53.877385] The buggy address belongs to the physical page: [ 53.882960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 53.890966] flags: 0x200000000000000(node=0|zone=2) [ 53.895845] page_type: f5(slab) [ 53.898991] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 53.906739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.914486] page dumped because: kasan: bad access detected [ 53.920058] [ 53.921558] Memory state around the buggy address: [ 53.926349] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.933569] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.940789] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.948007] ^ [ 53.952801] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.960027] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.967246] ================================================================== [ 51.716860] ================================================================== [ 51.724104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 51.731409] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 51.738735] [ 51.740235] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 51.740243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.740245] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 51.740248] Call Trace: [ 51.740250] <TASK> [ 51.740252] dump_stack_lvl+0x73/0xb0 [ 51.740255] print_report+0xd1/0x650 [ 51.740260] ? __virt_addr_valid+0x1db/0x2d0 [ 51.740263] ? kasan_atomics_helper+0x3df/0x5450 [ 51.740267] ? kasan_complete_mode_report_info+0x2a/0x200 [ 51.740272] ? kasan_atomics_helper+0x3df/0x5450 [ 51.740276] kasan_report+0x141/0x180 [ 51.740280] ? kasan_atomics_helper+0x3df/0x5450 [ 51.740286] kasan_check_range+0x10c/0x1c0 [ 51.740290] __kasan_check_read+0x15/0x20 [ 51.740294] kasan_atomics_helper+0x3df/0x5450 [ 51.740299] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 51.740303] ? __kmalloc_cache_noprof+0x189/0x420 [ 51.740307] ? kasan_atomics+0x152/0x310 [ 51.740311] kasan_atomics+0x1dc/0x310 [ 51.740315] ? __pfx_kasan_atomics+0x10/0x10 [ 51.740318] ? ktime_get_ts64+0x83/0x230 [ 51.740323] kunit_try_run_case+0x1a2/0x480 [ 51.740328] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.740332] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 51.740337] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 51.740342] ? __kthread_parkme+0x82/0x180 [ 51.740346] ? preempt_count_sub+0x50/0x80 [ 51.740351] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.740355] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 51.740359] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 51.740364] kthread+0x334/0x6f0 [ 51.740368] ? trace_preempt_on+0x20/0xc0 [ 51.740372] ? __pfx_kthread+0x10/0x10 [ 51.740377] ? _raw_spin_unlock_irq+0x47/0x80 [ 51.740381] ? calculate_sigpending+0x7b/0xa0 [ 51.740385] ? __pfx_kthread+0x10/0x10 [ 51.740390] ret_from_fork+0x3e/0x80 [ 51.740394] ? __pfx_kthread+0x10/0x10 [ 51.740399] ret_from_fork_asm+0x1a/0x30 [ 51.740405] </TASK> [ 51.740406] [ 51.920906] Allocated by task 308: [ 51.924313] kasan_save_stack+0x45/0x70 [ 51.928151] kasan_save_track+0x18/0x40 [ 51.931990] kasan_save_alloc_info+0x3b/0x50 [ 51.936264] __kasan_kmalloc+0xb7/0xc0 [ 51.940016] __kmalloc_cache_noprof+0x189/0x420 [ 51.944548] kasan_atomics+0x95/0x310 [ 51.948214] kunit_try_run_case+0x1a2/0x480 [ 51.952399] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 51.957800] kthread+0x334/0x6f0 [ 51.961041] ret_from_fork+0x3e/0x80 [ 51.964628] ret_from_fork_asm+0x1a/0x30 [ 51.968555] [ 51.970052] The buggy address belongs to the object at ffff8881061f7500 [ 51.970052] which belongs to the cache kmalloc-64 of size 64 [ 51.982386] The buggy address is located 0 bytes to the right of [ 51.982386] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 51.995248] [ 51.996746] The buggy address belongs to the physical page: [ 52.002318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 52.010324] flags: 0x200000000000000(node=0|zone=2) [ 52.015205] page_type: f5(slab) [ 52.018351] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 52.026090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.033829] page dumped because: kasan: bad access detected [ 52.039400] [ 52.040899] Memory state around the buggy address: [ 52.045707] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.052955] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.060175] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.067394] ^ [ 52.072184] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.079406] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.086633] ================================================================== [ 60.008096] ================================================================== [ 60.015311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 60.022706] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 60.030036] [ 60.031537] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 60.031544] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.031546] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 60.031550] Call Trace: [ 60.031552] <TASK> [ 60.031553] dump_stack_lvl+0x73/0xb0 [ 60.031557] print_report+0xd1/0x650 [ 60.031561] ? __virt_addr_valid+0x1db/0x2d0 [ 60.031565] ? kasan_atomics_helper+0x4a36/0x5450 [ 60.031569] ? kasan_complete_mode_report_info+0x2a/0x200 [ 60.031573] ? kasan_atomics_helper+0x4a36/0x5450 [ 60.031578] kasan_report+0x141/0x180 [ 60.031582] ? kasan_atomics_helper+0x4a36/0x5450 [ 60.031587] __asan_report_load4_noabort+0x18/0x20 [ 60.031591] kasan_atomics_helper+0x4a36/0x5450 [ 60.031595] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 60.031600] ? __kmalloc_cache_noprof+0x189/0x420 [ 60.031604] ? kasan_atomics+0x152/0x310 [ 60.031608] kasan_atomics+0x1dc/0x310 [ 60.031611] ? __pfx_kasan_atomics+0x10/0x10 [ 60.031615] ? ktime_get_ts64+0x83/0x230 [ 60.031620] kunit_try_run_case+0x1a2/0x480 [ 60.031625] ? __pfx_kunit_try_run_case+0x10/0x10 [ 60.031629] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 60.031634] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 60.031638] ? __kthread_parkme+0x82/0x180 [ 60.031643] ? preempt_count_sub+0x50/0x80 [ 60.031647] ? __pfx_kunit_try_run_case+0x10/0x10 [ 60.031652] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 60.031656] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 60.031661] kthread+0x334/0x6f0 [ 60.031665] ? trace_preempt_on+0x20/0xc0 [ 60.031669] ? __pfx_kthread+0x10/0x10 [ 60.031691] ? _raw_spin_unlock_irq+0x47/0x80 [ 60.031696] ? calculate_sigpending+0x7b/0xa0 [ 60.031700] ? __pfx_kthread+0x10/0x10 [ 60.031704] ret_from_fork+0x3e/0x80 [ 60.031721] ? __pfx_kthread+0x10/0x10 [ 60.031726] ret_from_fork_asm+0x1a/0x30 [ 60.031732] </TASK> [ 60.031733] [ 60.209445] Allocated by task 308: [ 60.212849] kasan_save_stack+0x45/0x70 [ 60.216707] kasan_save_track+0x18/0x40 [ 60.220571] kasan_save_alloc_info+0x3b/0x50 [ 60.224844] __kasan_kmalloc+0xb7/0xc0 [ 60.228596] __kmalloc_cache_noprof+0x189/0x420 [ 60.233130] kasan_atomics+0x95/0x310 [ 60.236797] kunit_try_run_case+0x1a2/0x480 [ 60.240989] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 60.246388] kthread+0x334/0x6f0 [ 60.249621] ret_from_fork+0x3e/0x80 [ 60.253201] ret_from_fork_asm+0x1a/0x30 [ 60.257136] [ 60.258635] The buggy address belongs to the object at ffff8881061f7500 [ 60.258635] which belongs to the cache kmalloc-64 of size 64 [ 60.270977] The buggy address is located 0 bytes to the right of [ 60.270977] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 60.283844] [ 60.285344] The buggy address belongs to the physical page: [ 60.290915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 60.298916] flags: 0x200000000000000(node=0|zone=2) [ 60.303794] page_type: f5(slab) [ 60.306940] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 60.314717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.322460] page dumped because: kasan: bad access detected [ 60.328034] [ 60.329534] Memory state around the buggy address: [ 60.334326] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.341546] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.348773] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.355993] ^ [ 60.360784] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.368004] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.375231] ================================================================== [ 61.512267] ================================================================== [ 61.519499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 61.526900] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 61.534212] [ 61.535735] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 61.535742] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.535744] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 61.535748] Call Trace: [ 61.535750] <TASK> [ 61.535751] dump_stack_lvl+0x73/0xb0 [ 61.535755] print_report+0xd1/0x650 [ 61.535759] ? __virt_addr_valid+0x1db/0x2d0 [ 61.535763] ? kasan_atomics_helper+0x4a02/0x5450 [ 61.535767] ? kasan_complete_mode_report_info+0x2a/0x200 [ 61.535772] ? kasan_atomics_helper+0x4a02/0x5450 [ 61.535776] kasan_report+0x141/0x180 [ 61.535780] ? kasan_atomics_helper+0x4a02/0x5450 [ 61.535785] __asan_report_load4_noabort+0x18/0x20 [ 61.535789] kasan_atomics_helper+0x4a02/0x5450 [ 61.535794] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 61.535798] ? __kmalloc_cache_noprof+0x189/0x420 [ 61.535802] ? kasan_atomics+0x152/0x310 [ 61.535806] kasan_atomics+0x1dc/0x310 [ 61.535809] ? __pfx_kasan_atomics+0x10/0x10 [ 61.535813] ? ktime_get_ts64+0x83/0x230 [ 61.535818] kunit_try_run_case+0x1a2/0x480 [ 61.535823] ? __pfx_kunit_try_run_case+0x10/0x10 [ 61.535827] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 61.535832] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 61.535837] ? __kthread_parkme+0x82/0x180 [ 61.535841] ? preempt_count_sub+0x50/0x80 [ 61.535846] ? __pfx_kunit_try_run_case+0x10/0x10 [ 61.535850] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 61.535855] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 61.535859] kthread+0x334/0x6f0 [ 61.535863] ? trace_preempt_on+0x20/0xc0 [ 61.535868] ? __pfx_kthread+0x10/0x10 [ 61.535872] ? _raw_spin_unlock_irq+0x47/0x80 [ 61.535876] ? calculate_sigpending+0x7b/0xa0 [ 61.535880] ? __pfx_kthread+0x10/0x10 [ 61.535885] ret_from_fork+0x3e/0x80 [ 61.535889] ? __pfx_kthread+0x10/0x10 [ 61.535894] ret_from_fork_asm+0x1a/0x30 [ 61.535899] </TASK> [ 61.535901] [ 61.713440] Allocated by task 308: [ 61.716846] kasan_save_stack+0x45/0x70 [ 61.720703] kasan_save_track+0x18/0x40 [ 61.724568] kasan_save_alloc_info+0x3b/0x50 [ 61.728841] __kasan_kmalloc+0xb7/0xc0 [ 61.732594] __kmalloc_cache_noprof+0x189/0x420 [ 61.737126] kasan_atomics+0x95/0x310 [ 61.740790] kunit_try_run_case+0x1a2/0x480 [ 61.744977] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 61.750375] kthread+0x334/0x6f0 [ 61.753608] ret_from_fork+0x3e/0x80 [ 61.757188] ret_from_fork_asm+0x1a/0x30 [ 61.761115] [ 61.762612] The buggy address belongs to the object at ffff8881061f7500 [ 61.762612] which belongs to the cache kmalloc-64 of size 64 [ 61.774955] The buggy address is located 0 bytes to the right of [ 61.774955] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 61.787824] [ 61.789322] The buggy address belongs to the physical page: [ 61.794894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 61.802894] flags: 0x200000000000000(node=0|zone=2) [ 61.807772] page_type: f5(slab) [ 61.810918] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 61.818658] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.826432] page dumped because: kasan: bad access detected [ 61.832002] [ 61.833503] Memory state around the buggy address: [ 61.838296] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.845524] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.852755] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.859977] ^ [ 61.864770] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.871989] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.879208] ================================================================== [ 53.974488] ================================================================== [ 53.981742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 53.989051] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 53.996450] [ 53.997950] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 53.997958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.997960] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 53.997964] Call Trace: [ 53.997965] <TASK> [ 53.997967] dump_stack_lvl+0x73/0xb0 [ 53.997971] print_report+0xd1/0x650 [ 53.997975] ? __virt_addr_valid+0x1db/0x2d0 [ 53.997979] ? kasan_atomics_helper+0x697/0x5450 [ 53.997983] ? kasan_complete_mode_report_info+0x2a/0x200 [ 53.997988] ? kasan_atomics_helper+0x697/0x5450 [ 53.997992] kasan_report+0x141/0x180 [ 53.997996] ? kasan_atomics_helper+0x697/0x5450 [ 53.998001] kasan_check_range+0x10c/0x1c0 [ 53.998006] __kasan_check_write+0x18/0x20 [ 53.998010] kasan_atomics_helper+0x697/0x5450 [ 53.998014] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 53.998019] ? __kmalloc_cache_noprof+0x189/0x420 [ 53.998023] ? kasan_atomics+0x152/0x310 [ 53.998027] kasan_atomics+0x1dc/0x310 [ 53.998030] ? __pfx_kasan_atomics+0x10/0x10 [ 53.998034] ? ktime_get_ts64+0x83/0x230 [ 53.998039] kunit_try_run_case+0x1a2/0x480 [ 53.998044] ? __pfx_kunit_try_run_case+0x10/0x10 [ 53.998048] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 53.998053] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 53.998057] ? __kthread_parkme+0x82/0x180 [ 53.998062] ? preempt_count_sub+0x50/0x80 [ 53.998067] ? __pfx_kunit_try_run_case+0x10/0x10 [ 53.998071] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 53.998075] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 53.998080] kthread+0x334/0x6f0 [ 53.998084] ? trace_preempt_on+0x20/0xc0 [ 53.998088] ? __pfx_kthread+0x10/0x10 [ 53.998093] ? _raw_spin_unlock_irq+0x47/0x80 [ 53.998097] ? calculate_sigpending+0x7b/0xa0 [ 53.998101] ? __pfx_kthread+0x10/0x10 [ 53.998106] ret_from_fork+0x3e/0x80 [ 53.998110] ? __pfx_kthread+0x10/0x10 [ 53.998114] ret_from_fork_asm+0x1a/0x30 [ 53.998120] </TASK> [ 53.998122] [ 54.178858] Allocated by task 308: [ 54.182264] kasan_save_stack+0x45/0x70 [ 54.186104] kasan_save_track+0x18/0x40 [ 54.189943] kasan_save_alloc_info+0x3b/0x50 [ 54.194217] __kasan_kmalloc+0xb7/0xc0 [ 54.197969] __kmalloc_cache_noprof+0x189/0x420 [ 54.202502] kasan_atomics+0x95/0x310 [ 54.206167] kunit_try_run_case+0x1a2/0x480 [ 54.210352] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 54.215752] kthread+0x334/0x6f0 [ 54.218984] ret_from_fork+0x3e/0x80 [ 54.222573] ret_from_fork_asm+0x1a/0x30 [ 54.226506] [ 54.228005] The buggy address belongs to the object at ffff8881061f7500 [ 54.228005] which belongs to the cache kmalloc-64 of size 64 [ 54.240337] The buggy address is located 0 bytes to the right of [ 54.240337] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 54.253197] [ 54.254705] The buggy address belongs to the physical page: [ 54.260278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 54.268278] flags: 0x200000000000000(node=0|zone=2) [ 54.273156] page_type: f5(slab) [ 54.276304] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 54.284052] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.291797] page dumped because: kasan: bad access detected [ 54.297369] [ 54.298869] Memory state around the buggy address: [ 54.303662] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.310915] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.318134] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.325352] ^ [ 54.330147] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.337367] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.344592] ================================================================== [ 69.801069] ================================================================== [ 69.808295] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 69.815707] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 69.823124] [ 69.824623] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 69.824631] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.824633] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 69.824637] Call Trace: [ 69.824638] <TASK> [ 69.824640] dump_stack_lvl+0x73/0xb0 [ 69.824644] print_report+0xd1/0x650 [ 69.824648] ? __virt_addr_valid+0x1db/0x2d0 [ 69.824652] ? kasan_atomics_helper+0x1ce1/0x5450 [ 69.824657] ? kasan_complete_mode_report_info+0x2a/0x200 [ 69.824661] ? kasan_atomics_helper+0x1ce1/0x5450 [ 69.824665] kasan_report+0x141/0x180 [ 69.824669] ? kasan_atomics_helper+0x1ce1/0x5450 [ 69.824691] kasan_check_range+0x10c/0x1c0 [ 69.824697] __kasan_check_write+0x18/0x20 [ 69.824700] kasan_atomics_helper+0x1ce1/0x5450 [ 69.824717] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 69.824722] ? __kmalloc_cache_noprof+0x189/0x420 [ 69.824726] ? kasan_atomics+0x152/0x310 [ 69.824730] kasan_atomics+0x1dc/0x310 [ 69.824733] ? __pfx_kasan_atomics+0x10/0x10 [ 69.824737] ? ktime_get_ts64+0x83/0x230 [ 69.824742] kunit_try_run_case+0x1a2/0x480 [ 69.824746] ? __pfx_kunit_try_run_case+0x10/0x10 [ 69.824750] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 69.824755] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 69.824760] ? __kthread_parkme+0x82/0x180 [ 69.824764] ? preempt_count_sub+0x50/0x80 [ 69.824769] ? __pfx_kunit_try_run_case+0x10/0x10 [ 69.824773] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 69.824777] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 69.824782] kthread+0x334/0x6f0 [ 69.824786] ? trace_preempt_on+0x20/0xc0 [ 69.824790] ? __pfx_kthread+0x10/0x10 [ 69.824795] ? _raw_spin_unlock_irq+0x47/0x80 [ 69.824799] ? calculate_sigpending+0x7b/0xa0 [ 69.824803] ? __pfx_kthread+0x10/0x10 [ 69.824807] ret_from_fork+0x3e/0x80 [ 69.824811] ? __pfx_kthread+0x10/0x10 [ 69.824816] ret_from_fork_asm+0x1a/0x30 [ 69.824822] </TASK> [ 69.824823] [ 70.005868] Allocated by task 308: [ 70.009275] kasan_save_stack+0x45/0x70 [ 70.013116] kasan_save_track+0x18/0x40 [ 70.016962] kasan_save_alloc_info+0x3b/0x50 [ 70.021236] __kasan_kmalloc+0xb7/0xc0 [ 70.024988] __kmalloc_cache_noprof+0x189/0x420 [ 70.029520] kasan_atomics+0x95/0x310 [ 70.033187] kunit_try_run_case+0x1a2/0x480 [ 70.037378] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 70.042777] kthread+0x334/0x6f0 [ 70.046012] ret_from_fork+0x3e/0x80 [ 70.049601] ret_from_fork_asm+0x1a/0x30 [ 70.053532] [ 70.055034] The buggy address belongs to the object at ffff8881061f7500 [ 70.055034] which belongs to the cache kmalloc-64 of size 64 [ 70.067375] The buggy address is located 0 bytes to the right of [ 70.067375] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 70.080234] [ 70.081743] The buggy address belongs to the physical page: [ 70.087315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 70.095314] flags: 0x200000000000000(node=0|zone=2) [ 70.100194] page_type: f5(slab) [ 70.103339] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 70.111078] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.118816] page dumped because: kasan: bad access detected [ 70.124388] [ 70.125888] Memory state around the buggy address: [ 70.130707] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.137954] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.145181] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.152407] ^ [ 70.157199] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.164418] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.171637] ================================================================== [ 58.498998] ================================================================== [ 58.506229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 58.513543] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 58.520935] [ 58.522436] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 58.522444] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.522446] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 58.522449] Call Trace: [ 58.522451] <TASK> [ 58.522453] dump_stack_lvl+0x73/0xb0 [ 58.522456] print_report+0xd1/0x650 [ 58.522461] ? __virt_addr_valid+0x1db/0x2d0 [ 58.522464] ? kasan_atomics_helper+0xde0/0x5450 [ 58.522468] ? kasan_complete_mode_report_info+0x2a/0x200 [ 58.522473] ? kasan_atomics_helper+0xde0/0x5450 [ 58.522477] kasan_report+0x141/0x180 [ 58.522481] ? kasan_atomics_helper+0xde0/0x5450 [ 58.522486] kasan_check_range+0x10c/0x1c0 [ 58.522491] __kasan_check_write+0x18/0x20 [ 58.522495] kasan_atomics_helper+0xde0/0x5450 [ 58.522499] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 58.522504] ? __kmalloc_cache_noprof+0x189/0x420 [ 58.522508] ? kasan_atomics+0x152/0x310 [ 58.522512] kasan_atomics+0x1dc/0x310 [ 58.522515] ? __pfx_kasan_atomics+0x10/0x10 [ 58.522519] ? ktime_get_ts64+0x83/0x230 [ 58.522524] kunit_try_run_case+0x1a2/0x480 [ 58.522529] ? __pfx_kunit_try_run_case+0x10/0x10 [ 58.522533] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 58.522538] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 58.522542] ? __kthread_parkme+0x82/0x180 [ 58.522547] ? preempt_count_sub+0x50/0x80 [ 58.522552] ? __pfx_kunit_try_run_case+0x10/0x10 [ 58.522556] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 58.522560] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 58.522565] kthread+0x334/0x6f0 [ 58.522569] ? trace_preempt_on+0x20/0xc0 [ 58.522573] ? __pfx_kthread+0x10/0x10 [ 58.522578] ? _raw_spin_unlock_irq+0x47/0x80 [ 58.522582] ? calculate_sigpending+0x7b/0xa0 [ 58.522586] ? __pfx_kthread+0x10/0x10 [ 58.522590] ret_from_fork+0x3e/0x80 [ 58.522595] ? __pfx_kthread+0x10/0x10 [ 58.522599] ret_from_fork_asm+0x1a/0x30 [ 58.522605] </TASK> [ 58.522607] [ 58.703230] Allocated by task 308: [ 58.706636] kasan_save_stack+0x45/0x70 [ 58.710474] kasan_save_track+0x18/0x40 [ 58.714313] kasan_save_alloc_info+0x3b/0x50 [ 58.718586] __kasan_kmalloc+0xb7/0xc0 [ 58.722338] __kmalloc_cache_noprof+0x189/0x420 [ 58.726872] kasan_atomics+0x95/0x310 [ 58.730538] kunit_try_run_case+0x1a2/0x480 [ 58.734750] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 58.740156] kthread+0x334/0x6f0 [ 58.743389] ret_from_fork+0x3e/0x80 [ 58.746969] ret_from_fork_asm+0x1a/0x30 [ 58.750895] [ 58.752394] The buggy address belongs to the object at ffff8881061f7500 [ 58.752394] which belongs to the cache kmalloc-64 of size 64 [ 58.764738] The buggy address is located 0 bytes to the right of [ 58.764738] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 58.777605] [ 58.779104] The buggy address belongs to the physical page: [ 58.784704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 58.792735] flags: 0x200000000000000(node=0|zone=2) [ 58.797614] page_type: f5(slab) [ 58.800763] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 58.808508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.816247] page dumped because: kasan: bad access detected [ 58.821821] [ 58.823320] Memory state around the buggy address: [ 58.828113] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.835332] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.842557] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.849776] ^ [ 58.854568] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.861788] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.869007] ================================================================== [ 74.748464] ================================================================== [ 74.755706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 74.763121] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 74.770521] [ 74.772021] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 74.772028] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.772030] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 74.772034] Call Trace: [ 74.772036] <TASK> [ 74.772037] dump_stack_lvl+0x73/0xb0 [ 74.772041] print_report+0xd1/0x650 [ 74.772045] ? __virt_addr_valid+0x1db/0x2d0 [ 74.772049] ? kasan_atomics_helper+0x224c/0x5450 [ 74.772053] ? kasan_complete_mode_report_info+0x2a/0x200 [ 74.772057] ? kasan_atomics_helper+0x224c/0x5450 [ 74.772062] kasan_report+0x141/0x180 [ 74.772066] ? kasan_atomics_helper+0x224c/0x5450 [ 74.772071] kasan_check_range+0x10c/0x1c0 [ 74.772076] __kasan_check_write+0x18/0x20 [ 74.772080] kasan_atomics_helper+0x224c/0x5450 [ 74.772084] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 74.772089] ? __kmalloc_cache_noprof+0x189/0x420 [ 74.772092] ? kasan_atomics+0x152/0x310 [ 74.772097] kasan_atomics+0x1dc/0x310 [ 74.772100] ? __pfx_kasan_atomics+0x10/0x10 [ 74.772104] ? ktime_get_ts64+0x83/0x230 [ 74.772109] kunit_try_run_case+0x1a2/0x480 [ 74.772113] ? __pfx_kunit_try_run_case+0x10/0x10 [ 74.772118] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 74.772122] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 74.772127] ? __kthread_parkme+0x82/0x180 [ 74.772131] ? preempt_count_sub+0x50/0x80 [ 74.772136] ? __pfx_kunit_try_run_case+0x10/0x10 [ 74.772140] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 74.772144] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 74.772149] kthread+0x334/0x6f0 [ 74.772153] ? trace_preempt_on+0x20/0xc0 [ 74.772157] ? __pfx_kthread+0x10/0x10 [ 74.772162] ? _raw_spin_unlock_irq+0x47/0x80 [ 74.772166] ? calculate_sigpending+0x7b/0xa0 [ 74.772170] ? __pfx_kthread+0x10/0x10 [ 74.772175] ret_from_fork+0x3e/0x80 [ 74.772179] ? __pfx_kthread+0x10/0x10 [ 74.772183] ret_from_fork_asm+0x1a/0x30 [ 74.772189] </TASK> [ 74.772191] [ 74.953154] Allocated by task 308: [ 74.956561] kasan_save_stack+0x45/0x70 [ 74.960408] kasan_save_track+0x18/0x40 [ 74.964247] kasan_save_alloc_info+0x3b/0x50 [ 74.968520] __kasan_kmalloc+0xb7/0xc0 [ 74.972272] __kmalloc_cache_noprof+0x189/0x420 [ 74.976804] kasan_atomics+0x95/0x310 [ 74.980469] kunit_try_run_case+0x1a2/0x480 [ 74.984655] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 74.990057] kthread+0x334/0x6f0 [ 74.993295] ret_from_fork+0x3e/0x80 [ 74.996876] ret_from_fork_asm+0x1a/0x30 [ 75.000801] [ 75.002301] The buggy address belongs to the object at ffff8881061f7500 [ 75.002301] which belongs to the cache kmalloc-64 of size 64 [ 75.014641] The buggy address is located 0 bytes to the right of [ 75.014641] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 75.027501] [ 75.029000] The buggy address belongs to the physical page: [ 75.034574] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 75.042581] flags: 0x200000000000000(node=0|zone=2) [ 75.047460] page_type: f5(slab) [ 75.050609] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 75.058354] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.066093] page dumped because: kasan: bad access detected [ 75.071665] [ 75.073189] Memory state around the buggy address: [ 75.077982] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.085202] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.092423] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.099648] ^ [ 75.104442] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.111688] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.118940] ================================================================== [ 66.405096] ================================================================== [ 66.412323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 66.419735] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 66.427134] [ 66.428634] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 66.428642] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.428644] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 66.428648] Call Trace: [ 66.428649] <TASK> [ 66.428651] dump_stack_lvl+0x73/0xb0 [ 66.428655] print_report+0xd1/0x650 [ 66.428659] ? __virt_addr_valid+0x1db/0x2d0 [ 66.428663] ? kasan_atomics_helper+0x177f/0x5450 [ 66.428667] ? kasan_complete_mode_report_info+0x2a/0x200 [ 66.428688] ? kasan_atomics_helper+0x177f/0x5450 [ 66.428693] kasan_report+0x141/0x180 [ 66.428697] ? kasan_atomics_helper+0x177f/0x5450 [ 66.428702] kasan_check_range+0x10c/0x1c0 [ 66.428720] __kasan_check_write+0x18/0x20 [ 66.428724] kasan_atomics_helper+0x177f/0x5450 [ 66.428728] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 66.428732] ? __kmalloc_cache_noprof+0x189/0x420 [ 66.428736] ? kasan_atomics+0x152/0x310 [ 66.428741] kasan_atomics+0x1dc/0x310 [ 66.428744] ? __pfx_kasan_atomics+0x10/0x10 [ 66.428748] ? ktime_get_ts64+0x83/0x230 [ 66.428753] kunit_try_run_case+0x1a2/0x480 [ 66.428757] ? __pfx_kunit_try_run_case+0x10/0x10 [ 66.428762] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 66.428767] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 66.428771] ? __kthread_parkme+0x82/0x180 [ 66.428775] ? preempt_count_sub+0x50/0x80 [ 66.428780] ? __pfx_kunit_try_run_case+0x10/0x10 [ 66.428785] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 66.428789] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 66.428793] kthread+0x334/0x6f0 [ 66.428797] ? trace_preempt_on+0x20/0xc0 [ 66.428802] ? __pfx_kthread+0x10/0x10 [ 66.428806] ? _raw_spin_unlock_irq+0x47/0x80 [ 66.428811] ? calculate_sigpending+0x7b/0xa0 [ 66.428815] ? __pfx_kthread+0x10/0x10 [ 66.428819] ret_from_fork+0x3e/0x80 [ 66.428823] ? __pfx_kthread+0x10/0x10 [ 66.428828] ret_from_fork_asm+0x1a/0x30 [ 66.428834] </TASK> [ 66.428835] [ 66.609882] Allocated by task 308: [ 66.613286] kasan_save_stack+0x45/0x70 [ 66.617126] kasan_save_track+0x18/0x40 [ 66.620965] kasan_save_alloc_info+0x3b/0x50 [ 66.625238] __kasan_kmalloc+0xb7/0xc0 [ 66.628990] __kmalloc_cache_noprof+0x189/0x420 [ 66.633522] kasan_atomics+0x95/0x310 [ 66.637187] kunit_try_run_case+0x1a2/0x480 [ 66.641373] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 66.646772] kthread+0x334/0x6f0 [ 66.650006] ret_from_fork+0x3e/0x80 [ 66.653584] ret_from_fork_asm+0x1a/0x30 [ 66.657509] [ 66.659009] The buggy address belongs to the object at ffff8881061f7500 [ 66.659009] which belongs to the cache kmalloc-64 of size 64 [ 66.671349] The buggy address is located 0 bytes to the right of [ 66.671349] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 66.684212] [ 66.685710] The buggy address belongs to the physical page: [ 66.691281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 66.699282] flags: 0x200000000000000(node=0|zone=2) [ 66.704162] page_type: f5(slab) [ 66.707307] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 66.715047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.722793] page dumped because: kasan: bad access detected [ 66.728366] [ 66.729865] Memory state around the buggy address: [ 66.734659] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.741911] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.749131] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.756351] ^ [ 66.761143] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.768369] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.775589] ================================================================== [ 59.630875] ================================================================== [ 59.638105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 59.645419] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 59.652820] [ 59.654321] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 59.654328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.654330] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 59.654334] Call Trace: [ 59.654335] <TASK> [ 59.654337] dump_stack_lvl+0x73/0xb0 [ 59.654341] print_report+0xd1/0x650 [ 59.654345] ? __virt_addr_valid+0x1db/0x2d0 [ 59.654349] ? kasan_atomics_helper+0xfa9/0x5450 [ 59.654353] ? kasan_complete_mode_report_info+0x2a/0x200 [ 59.654357] ? kasan_atomics_helper+0xfa9/0x5450 [ 59.654362] kasan_report+0x141/0x180 [ 59.654366] ? kasan_atomics_helper+0xfa9/0x5450 [ 59.654371] kasan_check_range+0x10c/0x1c0 [ 59.654376] __kasan_check_write+0x18/0x20 [ 59.654380] kasan_atomics_helper+0xfa9/0x5450 [ 59.654384] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 59.654388] ? __kmalloc_cache_noprof+0x189/0x420 [ 59.654392] ? kasan_atomics+0x152/0x310 [ 59.654396] kasan_atomics+0x1dc/0x310 [ 59.654400] ? __pfx_kasan_atomics+0x10/0x10 [ 59.654404] ? ktime_get_ts64+0x83/0x230 [ 59.654408] kunit_try_run_case+0x1a2/0x480 [ 59.654413] ? __pfx_kunit_try_run_case+0x10/0x10 [ 59.654417] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 59.654422] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 59.654427] ? __kthread_parkme+0x82/0x180 [ 59.654431] ? preempt_count_sub+0x50/0x80 [ 59.654436] ? __pfx_kunit_try_run_case+0x10/0x10 [ 59.654440] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 59.654445] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 59.654449] kthread+0x334/0x6f0 [ 59.654453] ? trace_preempt_on+0x20/0xc0 [ 59.654458] ? __pfx_kthread+0x10/0x10 [ 59.654462] ? _raw_spin_unlock_irq+0x47/0x80 [ 59.654467] ? calculate_sigpending+0x7b/0xa0 [ 59.654471] ? __pfx_kthread+0x10/0x10 [ 59.654475] ret_from_fork+0x3e/0x80 [ 59.654479] ? __pfx_kthread+0x10/0x10 [ 59.654484] ret_from_fork_asm+0x1a/0x30 [ 59.654490] </TASK> [ 59.654491] [ 59.835113] Allocated by task 308: [ 59.838521] kasan_save_stack+0x45/0x70 [ 59.842369] kasan_save_track+0x18/0x40 [ 59.846217] kasan_save_alloc_info+0x3b/0x50 [ 59.850497] __kasan_kmalloc+0xb7/0xc0 [ 59.854250] __kmalloc_cache_noprof+0x189/0x420 [ 59.858781] kasan_atomics+0x95/0x310 [ 59.862447] kunit_try_run_case+0x1a2/0x480 [ 59.866632] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 59.872032] kthread+0x334/0x6f0 [ 59.875266] ret_from_fork+0x3e/0x80 [ 59.878851] ret_from_fork_asm+0x1a/0x30 [ 59.882779] [ 59.884277] The buggy address belongs to the object at ffff8881061f7500 [ 59.884277] which belongs to the cache kmalloc-64 of size 64 [ 59.896610] The buggy address is located 0 bytes to the right of [ 59.896610] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 59.909471] [ 59.910970] The buggy address belongs to the physical page: [ 59.916543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 59.924549] flags: 0x200000000000000(node=0|zone=2) [ 59.929429] page_type: f5(slab) [ 59.932575] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 59.940324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.948071] page dumped because: kasan: bad access detected [ 59.953641] [ 59.955142] Memory state around the buggy address: [ 59.959936] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.967163] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.974381] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.981598] ^ [ 59.986392] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.993611] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.000830] ================================================================== [ 67.160462] ================================================================== [ 67.167705] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 67.175120] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 67.182513] [ 67.184014] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 67.184022] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.184024] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 67.184027] Call Trace: [ 67.184029] <TASK> [ 67.184031] dump_stack_lvl+0x73/0xb0 [ 67.184034] print_report+0xd1/0x650 [ 67.184038] ? __virt_addr_valid+0x1db/0x2d0 [ 67.184042] ? kasan_atomics_helper+0x18b1/0x5450 [ 67.184046] ? kasan_complete_mode_report_info+0x2a/0x200 [ 67.184051] ? kasan_atomics_helper+0x18b1/0x5450 [ 67.184055] kasan_report+0x141/0x180 [ 67.184059] ? kasan_atomics_helper+0x18b1/0x5450 [ 67.184064] kasan_check_range+0x10c/0x1c0 [ 67.184069] __kasan_check_write+0x18/0x20 [ 67.184073] kasan_atomics_helper+0x18b1/0x5450 [ 67.184077] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 67.184082] ? __kmalloc_cache_noprof+0x189/0x420 [ 67.184086] ? kasan_atomics+0x152/0x310 [ 67.184090] kasan_atomics+0x1dc/0x310 [ 67.184093] ? __pfx_kasan_atomics+0x10/0x10 [ 67.184097] ? ktime_get_ts64+0x83/0x230 [ 67.184102] kunit_try_run_case+0x1a2/0x480 [ 67.184106] ? __pfx_kunit_try_run_case+0x10/0x10 [ 67.184110] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 67.184115] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 67.184120] ? __kthread_parkme+0x82/0x180 [ 67.184124] ? preempt_count_sub+0x50/0x80 [ 67.184129] ? __pfx_kunit_try_run_case+0x10/0x10 [ 67.184134] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 67.184138] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 67.184142] kthread+0x334/0x6f0 [ 67.184146] ? trace_preempt_on+0x20/0xc0 [ 67.184151] ? __pfx_kthread+0x10/0x10 [ 67.184155] ? _raw_spin_unlock_irq+0x47/0x80 [ 67.184159] ? calculate_sigpending+0x7b/0xa0 [ 67.184163] ? __pfx_kthread+0x10/0x10 [ 67.184168] ret_from_fork+0x3e/0x80 [ 67.184172] ? __pfx_kthread+0x10/0x10 [ 67.184176] ret_from_fork_asm+0x1a/0x30 [ 67.184182] </TASK> [ 67.184184] [ 67.365129] Allocated by task 308: [ 67.368534] kasan_save_stack+0x45/0x70 [ 67.372372] kasan_save_track+0x18/0x40 [ 67.376212] kasan_save_alloc_info+0x3b/0x50 [ 67.380485] __kasan_kmalloc+0xb7/0xc0 [ 67.384236] __kmalloc_cache_noprof+0x189/0x420 [ 67.388771] kasan_atomics+0x95/0x310 [ 67.392435] kunit_try_run_case+0x1a2/0x480 [ 67.396621] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 67.402019] kthread+0x334/0x6f0 [ 67.405253] ret_from_fork+0x3e/0x80 [ 67.408831] ret_from_fork_asm+0x1a/0x30 [ 67.412759] [ 67.414258] The buggy address belongs to the object at ffff8881061f7500 [ 67.414258] which belongs to the cache kmalloc-64 of size 64 [ 67.426599] The buggy address is located 0 bytes to the right of [ 67.426599] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 67.439468] [ 67.440967] The buggy address belongs to the physical page: [ 67.446541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 67.454545] flags: 0x200000000000000(node=0|zone=2) [ 67.459426] page_type: f5(slab) [ 67.462573] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 67.470320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.478059] page dumped because: kasan: bad access detected [ 67.483630] [ 67.485129] Memory state around the buggy address: [ 67.489923] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.497141] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.504359] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.511578] ^ [ 67.516372] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.523592] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.530810] ================================================================== [ 72.492514] ================================================================== [ 72.499761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 72.507161] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 72.514554] [ 72.516055] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 72.516063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.516065] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 72.516069] Call Trace: [ 72.516070] <TASK> [ 72.516072] dump_stack_lvl+0x73/0xb0 [ 72.516076] print_report+0xd1/0x650 [ 72.516080] ? __virt_addr_valid+0x1db/0x2d0 [ 72.516084] ? kasan_atomics_helper+0x2006/0x5450 [ 72.516088] ? kasan_complete_mode_report_info+0x2a/0x200 [ 72.516093] ? kasan_atomics_helper+0x2006/0x5450 [ 72.516097] kasan_report+0x141/0x180 [ 72.516101] ? kasan_atomics_helper+0x2006/0x5450 [ 72.516106] kasan_check_range+0x10c/0x1c0 [ 72.516111] __kasan_check_write+0x18/0x20 [ 72.516115] kasan_atomics_helper+0x2006/0x5450 [ 72.516119] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 72.516124] ? __kmalloc_cache_noprof+0x189/0x420 [ 72.516128] ? kasan_atomics+0x152/0x310 [ 72.516132] kasan_atomics+0x1dc/0x310 [ 72.516135] ? __pfx_kasan_atomics+0x10/0x10 [ 72.516139] ? ktime_get_ts64+0x83/0x230 [ 72.516144] kunit_try_run_case+0x1a2/0x480 [ 72.516149] ? __pfx_kunit_try_run_case+0x10/0x10 [ 72.516153] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 72.516158] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 72.516162] ? __kthread_parkme+0x82/0x180 [ 72.516167] ? preempt_count_sub+0x50/0x80 [ 72.516171] ? __pfx_kunit_try_run_case+0x10/0x10 [ 72.516176] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 72.516180] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 72.516184] kthread+0x334/0x6f0 [ 72.516188] ? trace_preempt_on+0x20/0xc0 [ 72.516193] ? __pfx_kthread+0x10/0x10 [ 72.516197] ? _raw_spin_unlock_irq+0x47/0x80 [ 72.516201] ? calculate_sigpending+0x7b/0xa0 [ 72.516205] ? __pfx_kthread+0x10/0x10 [ 72.516210] ret_from_fork+0x3e/0x80 [ 72.516214] ? __pfx_kthread+0x10/0x10 [ 72.516219] ret_from_fork_asm+0x1a/0x30 [ 72.516224] </TASK> [ 72.516226] [ 72.697240] Allocated by task 308: [ 72.700645] kasan_save_stack+0x45/0x70 [ 72.704485] kasan_save_track+0x18/0x40 [ 72.708324] kasan_save_alloc_info+0x3b/0x50 [ 72.712597] __kasan_kmalloc+0xb7/0xc0 [ 72.716356] __kmalloc_cache_noprof+0x189/0x420 [ 72.720890] kasan_atomics+0x95/0x310 [ 72.724556] kunit_try_run_case+0x1a2/0x480 [ 72.728749] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 72.734147] kthread+0x334/0x6f0 [ 72.737380] ret_from_fork+0x3e/0x80 [ 72.740959] ret_from_fork_asm+0x1a/0x30 [ 72.744886] [ 72.746384] The buggy address belongs to the object at ffff8881061f7500 [ 72.746384] which belongs to the cache kmalloc-64 of size 64 [ 72.758736] The buggy address is located 0 bytes to the right of [ 72.758736] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 72.771603] [ 72.773103] The buggy address belongs to the physical page: [ 72.778694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 72.786718] flags: 0x200000000000000(node=0|zone=2) [ 72.791605] page_type: f5(slab) [ 72.794753] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 72.802501] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.810248] page dumped because: kasan: bad access detected [ 72.815820] [ 72.817319] Memory state around the buggy address: [ 72.822112] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.829330] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.836549] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.843769] ^ [ 72.848561] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.855788] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.863005] ================================================================== [ 63.390483] ================================================================== [ 63.397735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 63.405131] Read of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 63.412435] [ 63.413938] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 63.413945] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.413947] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 63.413951] Call Trace: [ 63.413952] <TASK> [ 63.413954] dump_stack_lvl+0x73/0xb0 [ 63.413958] print_report+0xd1/0x650 [ 63.413962] ? __virt_addr_valid+0x1db/0x2d0 [ 63.413966] ? kasan_atomics_helper+0x13b5/0x5450 [ 63.413970] ? kasan_complete_mode_report_info+0x2a/0x200 [ 63.413974] ? kasan_atomics_helper+0x13b5/0x5450 [ 63.413978] kasan_report+0x141/0x180 [ 63.413983] ? kasan_atomics_helper+0x13b5/0x5450 [ 63.413988] kasan_check_range+0x10c/0x1c0 [ 63.413993] __kasan_check_read+0x15/0x20 [ 63.413996] kasan_atomics_helper+0x13b5/0x5450 [ 63.414001] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 63.414005] ? __kmalloc_cache_noprof+0x189/0x420 [ 63.414009] ? kasan_atomics+0x152/0x310 [ 63.414013] kasan_atomics+0x1dc/0x310 [ 63.414016] ? __pfx_kasan_atomics+0x10/0x10 [ 63.414020] ? ktime_get_ts64+0x83/0x230 [ 63.414025] kunit_try_run_case+0x1a2/0x480 [ 63.414029] ? __pfx_kunit_try_run_case+0x10/0x10 [ 63.414034] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 63.414038] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 63.414043] ? __kthread_parkme+0x82/0x180 [ 63.414047] ? preempt_count_sub+0x50/0x80 [ 63.414052] ? __pfx_kunit_try_run_case+0x10/0x10 [ 63.414057] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 63.414061] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 63.414065] kthread+0x334/0x6f0 [ 63.414069] ? trace_preempt_on+0x20/0xc0 [ 63.414074] ? __pfx_kthread+0x10/0x10 [ 63.414078] ? _raw_spin_unlock_irq+0x47/0x80 [ 63.414082] ? calculate_sigpending+0x7b/0xa0 [ 63.414086] ? __pfx_kthread+0x10/0x10 [ 63.414091] ret_from_fork+0x3e/0x80 [ 63.414095] ? __pfx_kthread+0x10/0x10 [ 63.414100] ret_from_fork_asm+0x1a/0x30 [ 63.414105] </TASK> [ 63.414107] [ 63.595093] Allocated by task 308: [ 63.598502] kasan_save_stack+0x45/0x70 [ 63.602350] kasan_save_track+0x18/0x40 [ 63.606195] kasan_save_alloc_info+0x3b/0x50 [ 63.610470] __kasan_kmalloc+0xb7/0xc0 [ 63.614229] __kmalloc_cache_noprof+0x189/0x420 [ 63.618764] kasan_atomics+0x95/0x310 [ 63.622427] kunit_try_run_case+0x1a2/0x480 [ 63.626614] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 63.632014] kthread+0x334/0x6f0 [ 63.635253] ret_from_fork+0x3e/0x80 [ 63.638834] ret_from_fork_asm+0x1a/0x30 [ 63.642759] [ 63.644259] The buggy address belongs to the object at ffff8881061f7500 [ 63.644259] which belongs to the cache kmalloc-64 of size 64 [ 63.656599] The buggy address is located 0 bytes to the right of [ 63.656599] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 63.669459] [ 63.670959] The buggy address belongs to the physical page: [ 63.676532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 63.684530] flags: 0x200000000000000(node=0|zone=2) [ 63.689411] page_type: f5(slab) [ 63.692558] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 63.700303] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.708041] page dumped because: kasan: bad access detected [ 63.713613] [ 63.715115] Memory state around the buggy address: [ 63.719907] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.727134] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.734353] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.741573] ^ [ 63.746365] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.753584] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.760811] ================================================================== [ 67.538082] ================================================================== [ 67.545325] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 67.552740] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 67.560136] [ 67.561637] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 67.561644] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.561647] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 67.561650] Call Trace: [ 67.561652] <TASK> [ 67.561653] dump_stack_lvl+0x73/0xb0 [ 67.561657] print_report+0xd1/0x650 [ 67.561661] ? __virt_addr_valid+0x1db/0x2d0 [ 67.561665] ? kasan_atomics_helper+0x194a/0x5450 [ 67.561670] ? kasan_complete_mode_report_info+0x2a/0x200 [ 67.561691] ? kasan_atomics_helper+0x194a/0x5450 [ 67.561695] kasan_report+0x141/0x180 [ 67.561700] ? kasan_atomics_helper+0x194a/0x5450 [ 67.561705] kasan_check_range+0x10c/0x1c0 [ 67.561710] __kasan_check_write+0x18/0x20 [ 67.561714] kasan_atomics_helper+0x194a/0x5450 [ 67.561731] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 67.561736] ? __kmalloc_cache_noprof+0x189/0x420 [ 67.561740] ? kasan_atomics+0x152/0x310 [ 67.561744] kasan_atomics+0x1dc/0x310 [ 67.561747] ? __pfx_kasan_atomics+0x10/0x10 [ 67.561751] ? ktime_get_ts64+0x83/0x230 [ 67.561756] kunit_try_run_case+0x1a2/0x480 [ 67.561761] ? __pfx_kunit_try_run_case+0x10/0x10 [ 67.561765] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 67.561770] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 67.561774] ? __kthread_parkme+0x82/0x180 [ 67.561779] ? preempt_count_sub+0x50/0x80 [ 67.561784] ? __pfx_kunit_try_run_case+0x10/0x10 [ 67.561788] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 67.561793] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 67.561797] kthread+0x334/0x6f0 [ 67.561801] ? trace_preempt_on+0x20/0xc0 [ 67.561805] ? __pfx_kthread+0x10/0x10 [ 67.561810] ? _raw_spin_unlock_irq+0x47/0x80 [ 67.561814] ? calculate_sigpending+0x7b/0xa0 [ 67.561818] ? __pfx_kthread+0x10/0x10 [ 67.561823] ret_from_fork+0x3e/0x80 [ 67.561827] ? __pfx_kthread+0x10/0x10 [ 67.561831] ret_from_fork_asm+0x1a/0x30 [ 67.561837] </TASK> [ 67.561839] [ 67.742872] Allocated by task 308: [ 67.746281] kasan_save_stack+0x45/0x70 [ 67.750126] kasan_save_track+0x18/0x40 [ 67.753966] kasan_save_alloc_info+0x3b/0x50 [ 67.758237] __kasan_kmalloc+0xb7/0xc0 [ 67.761990] __kmalloc_cache_noprof+0x189/0x420 [ 67.766523] kasan_atomics+0x95/0x310 [ 67.770188] kunit_try_run_case+0x1a2/0x480 [ 67.774375] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 67.779774] kthread+0x334/0x6f0 [ 67.783007] ret_from_fork+0x3e/0x80 [ 67.786587] ret_from_fork_asm+0x1a/0x30 [ 67.790520] [ 67.792020] The buggy address belongs to the object at ffff8881061f7500 [ 67.792020] which belongs to the cache kmalloc-64 of size 64 [ 67.804362] The buggy address is located 0 bytes to the right of [ 67.804362] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 67.817230] [ 67.818745] The buggy address belongs to the physical page: [ 67.824319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 67.832326] flags: 0x200000000000000(node=0|zone=2) [ 67.837207] page_type: f5(slab) [ 67.840352] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 67.848090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.855830] page dumped because: kasan: bad access detected [ 67.861402] [ 67.862902] Memory state around the buggy address: [ 67.867706] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.874949] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.882166] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.889384] ^ [ 67.894178] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.901398] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.908625] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 47.042863] ================================================================== [ 47.050101] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 47.059055] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304 [ 47.066454] [ 47.067955] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 47.067963] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.067964] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 47.067968] Call Trace: [ 47.067969] <TASK> [ 47.067971] dump_stack_lvl+0x73/0xb0 [ 47.067974] print_report+0xd1/0x650 [ 47.067978] ? __virt_addr_valid+0x1db/0x2d0 [ 47.067982] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 47.067986] ? kasan_complete_mode_report_info+0x2a/0x200 [ 47.067990] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 47.067994] kasan_report+0x141/0x180 [ 47.067999] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 47.068004] kasan_check_range+0x10c/0x1c0 [ 47.068008] __kasan_check_write+0x18/0x20 [ 47.068012] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 47.068016] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 47.068021] ? __kmalloc_cache_noprof+0x189/0x420 [ 47.068024] ? trace_hardirqs_on+0x37/0xe0 [ 47.068028] ? kasan_bitops_generic+0x92/0x1c0 [ 47.068033] kasan_bitops_generic+0x121/0x1c0 [ 47.068036] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 47.068040] ? ktime_get_ts64+0x83/0x230 [ 47.068044] kunit_try_run_case+0x1a2/0x480 [ 47.068049] ? __pfx_kunit_try_run_case+0x10/0x10 [ 47.068053] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 47.068057] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 47.068062] ? __kthread_parkme+0x82/0x180 [ 47.068066] ? preempt_count_sub+0x50/0x80 [ 47.068071] ? __pfx_kunit_try_run_case+0x10/0x10 [ 47.068075] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 47.068079] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 47.068083] kthread+0x334/0x6f0 [ 47.068087] ? trace_preempt_on+0x20/0xc0 [ 47.068091] ? __pfx_kthread+0x10/0x10 [ 47.068095] ? _raw_spin_unlock_irq+0x47/0x80 [ 47.068100] ? calculate_sigpending+0x7b/0xa0 [ 47.068103] ? __pfx_kthread+0x10/0x10 [ 47.068108] ret_from_fork+0x3e/0x80 [ 47.068112] ? __pfx_kthread+0x10/0x10 [ 47.068116] ret_from_fork_asm+0x1a/0x30 [ 47.068122] </TASK> [ 47.068123] [ 47.262874] Allocated by task 304: [ 47.266281] kasan_save_stack+0x45/0x70 [ 47.270119] kasan_save_track+0x18/0x40 [ 47.273960] kasan_save_alloc_info+0x3b/0x50 [ 47.278232] __kasan_kmalloc+0xb7/0xc0 [ 47.281984] __kmalloc_cache_noprof+0x189/0x420 [ 47.286518] kasan_bitops_generic+0x92/0x1c0 [ 47.290789] kunit_try_run_case+0x1a2/0x480 [ 47.294976] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 47.300382] kthread+0x334/0x6f0 [ 47.303617] ret_from_fork+0x3e/0x80 [ 47.307195] ret_from_fork_asm+0x1a/0x30 [ 47.311121] [ 47.312621] The buggy address belongs to the object at ffff888104ed9160 [ 47.312621] which belongs to the cache kmalloc-16 of size 16 [ 47.324960] The buggy address is located 8 bytes inside of [ 47.324960] allocated 9-byte region [ffff888104ed9160, ffff888104ed9169) [ 47.337206] [ 47.338710] The buggy address belongs to the physical page: [ 47.344304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9 [ 47.352312] flags: 0x200000000000000(node=0|zone=2) [ 47.357189] page_type: f5(slab) [ 47.360337] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 47.368075] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 47.375814] page dumped because: kasan: bad access detected [ 47.381387] [ 47.382885] Memory state around the buggy address: [ 47.387709] ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc [ 47.394951] ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 47.402178] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 47.409395] ^ [ 47.416007] ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.423229] ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.430456] ================================================================== [ 49.017530] ================================================================== [ 49.024763] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 49.033744] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304 [ 49.041142] [ 49.042642] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 49.042650] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.042652] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 49.042655] Call Trace: [ 49.042656] <TASK> [ 49.042658] dump_stack_lvl+0x73/0xb0 [ 49.042662] print_report+0xd1/0x650 [ 49.042685] ? __virt_addr_valid+0x1db/0x2d0 [ 49.042689] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 49.042694] ? kasan_complete_mode_report_info+0x2a/0x200 [ 49.042698] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 49.042703] kasan_report+0x141/0x180 [ 49.042720] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 49.042725] kasan_check_range+0x10c/0x1c0 [ 49.042742] __kasan_check_write+0x18/0x20 [ 49.042745] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 49.042750] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 49.042754] ? __kmalloc_cache_noprof+0x189/0x420 [ 49.042758] ? trace_hardirqs_on+0x37/0xe0 [ 49.042762] ? kasan_bitops_generic+0x92/0x1c0 [ 49.042766] kasan_bitops_generic+0x121/0x1c0 [ 49.042769] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 49.042773] ? ktime_get_ts64+0x83/0x230 [ 49.042778] kunit_try_run_case+0x1a2/0x480 [ 49.042782] ? __pfx_kunit_try_run_case+0x10/0x10 [ 49.042786] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 49.042791] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 49.042795] ? __kthread_parkme+0x82/0x180 [ 49.042799] ? preempt_count_sub+0x50/0x80 [ 49.042804] ? __pfx_kunit_try_run_case+0x10/0x10 [ 49.042808] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 49.042812] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 49.042816] kthread+0x334/0x6f0 [ 49.042820] ? trace_preempt_on+0x20/0xc0 [ 49.042824] ? __pfx_kthread+0x10/0x10 [ 49.042829] ? _raw_spin_unlock_irq+0x47/0x80 [ 49.042833] ? calculate_sigpending+0x7b/0xa0 [ 49.042836] ? __pfx_kthread+0x10/0x10 [ 49.042841] ret_from_fork+0x3e/0x80 [ 49.042845] ? __pfx_kthread+0x10/0x10 [ 49.042849] ret_from_fork_asm+0x1a/0x30 [ 49.042855] </TASK> [ 49.042856] [ 49.237656] Allocated by task 304: [ 49.241089] kasan_save_stack+0x45/0x70 [ 49.244927] kasan_save_track+0x18/0x40 [ 49.248768] kasan_save_alloc_info+0x3b/0x50 [ 49.253040] __kasan_kmalloc+0xb7/0xc0 [ 49.256794] __kmalloc_cache_noprof+0x189/0x420 [ 49.261326] kasan_bitops_generic+0x92/0x1c0 [ 49.265597] kunit_try_run_case+0x1a2/0x480 [ 49.269782] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 49.275184] kthread+0x334/0x6f0 [ 49.278423] ret_from_fork+0x3e/0x80 [ 49.282002] ret_from_fork_asm+0x1a/0x30 [ 49.285930] [ 49.287429] The buggy address belongs to the object at ffff888104ed9160 [ 49.287429] which belongs to the cache kmalloc-16 of size 16 [ 49.299768] The buggy address is located 8 bytes inside of [ 49.299768] allocated 9-byte region [ffff888104ed9160, ffff888104ed9169) [ 49.312023] [ 49.313521] The buggy address belongs to the physical page: [ 49.319095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9 [ 49.327101] flags: 0x200000000000000(node=0|zone=2) [ 49.331981] page_type: f5(slab) [ 49.335127] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 49.342866] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 49.350606] page dumped because: kasan: bad access detected [ 49.356178] [ 49.357700] Memory state around the buggy address: [ 49.362538] ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc [ 49.369759] ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 49.376985] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 49.384203] ^ [ 49.390817] ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.398034] ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.405256] ================================================================== [ 47.832694] ================================================================== [ 47.839961] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 47.848915] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304 [ 47.856308] [ 47.857808] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 47.857815] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.857817] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 47.857821] Call Trace: [ 47.857822] <TASK> [ 47.857824] dump_stack_lvl+0x73/0xb0 [ 47.857827] print_report+0xd1/0x650 [ 47.857832] ? __virt_addr_valid+0x1db/0x2d0 [ 47.857835] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 47.857839] ? kasan_complete_mode_report_info+0x2a/0x200 [ 47.857844] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 47.857848] kasan_report+0x141/0x180 [ 47.857852] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 47.857857] kasan_check_range+0x10c/0x1c0 [ 47.857862] __kasan_check_write+0x18/0x20 [ 47.857866] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 47.857870] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 47.857874] ? __kmalloc_cache_noprof+0x189/0x420 [ 47.857878] ? trace_hardirqs_on+0x37/0xe0 [ 47.857882] ? kasan_bitops_generic+0x92/0x1c0 [ 47.857886] kasan_bitops_generic+0x121/0x1c0 [ 47.857890] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 47.857893] ? ktime_get_ts64+0x83/0x230 [ 47.857898] kunit_try_run_case+0x1a2/0x480 [ 47.857902] ? __pfx_kunit_try_run_case+0x10/0x10 [ 47.857906] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 47.857911] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 47.857915] ? __kthread_parkme+0x82/0x180 [ 47.857919] ? preempt_count_sub+0x50/0x80 [ 47.857924] ? __pfx_kunit_try_run_case+0x10/0x10 [ 47.857928] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 47.857932] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 47.857936] kthread+0x334/0x6f0 [ 47.857940] ? trace_preempt_on+0x20/0xc0 [ 47.857944] ? __pfx_kthread+0x10/0x10 [ 47.857948] ? _raw_spin_unlock_irq+0x47/0x80 [ 47.857952] ? calculate_sigpending+0x7b/0xa0 [ 47.857956] ? __pfx_kthread+0x10/0x10 [ 47.857961] ret_from_fork+0x3e/0x80 [ 47.857965] ? __pfx_kthread+0x10/0x10 [ 47.857969] ret_from_fork_asm+0x1a/0x30 [ 47.857974] </TASK> [ 47.857976] [ 48.052779] Allocated by task 304: [ 48.056187] kasan_save_stack+0x45/0x70 [ 48.060023] kasan_save_track+0x18/0x40 [ 48.063864] kasan_save_alloc_info+0x3b/0x50 [ 48.068137] __kasan_kmalloc+0xb7/0xc0 [ 48.071890] __kmalloc_cache_noprof+0x189/0x420 [ 48.076421] kasan_bitops_generic+0x92/0x1c0 [ 48.080702] kunit_try_run_case+0x1a2/0x480 [ 48.084941] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 48.090347] kthread+0x334/0x6f0 [ 48.093581] ret_from_fork+0x3e/0x80 [ 48.097158] ret_from_fork_asm+0x1a/0x30 [ 48.101085] [ 48.102583] The buggy address belongs to the object at ffff888104ed9160 [ 48.102583] which belongs to the cache kmalloc-16 of size 16 [ 48.114918] The buggy address is located 8 bytes inside of [ 48.114918] allocated 9-byte region [ffff888104ed9160, ffff888104ed9169) [ 48.127170] [ 48.128662] The buggy address belongs to the physical page: [ 48.134260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9 [ 48.142259] flags: 0x200000000000000(node=0|zone=2) [ 48.147138] page_type: f5(slab) [ 48.150285] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 48.158034] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 48.165778] page dumped because: kasan: bad access detected [ 48.171351] [ 48.172849] Memory state around the buggy address: [ 48.177645] ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc [ 48.184872] ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 48.192090] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 48.199310] ^ [ 48.205923] ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.213148] ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.220369] ================================================================== [ 48.622437] ================================================================== [ 48.629706] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 48.638706] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304 [ 48.646124] [ 48.647625] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 48.647632] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.647634] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 48.647637] Call Trace: [ 48.647639] <TASK> [ 48.647640] dump_stack_lvl+0x73/0xb0 [ 48.647644] print_report+0xd1/0x650 [ 48.647648] ? __virt_addr_valid+0x1db/0x2d0 [ 48.647652] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 48.647656] ? kasan_complete_mode_report_info+0x2a/0x200 [ 48.647660] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 48.647684] kasan_report+0x141/0x180 [ 48.647688] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 48.647694] kasan_check_range+0x10c/0x1c0 [ 48.647699] __kasan_check_write+0x18/0x20 [ 48.647703] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 48.647720] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 48.647725] ? __kmalloc_cache_noprof+0x189/0x420 [ 48.647728] ? trace_hardirqs_on+0x37/0xe0 [ 48.647745] ? kasan_bitops_generic+0x92/0x1c0 [ 48.647749] kasan_bitops_generic+0x121/0x1c0 [ 48.647752] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 48.647756] ? ktime_get_ts64+0x83/0x230 [ 48.647761] kunit_try_run_case+0x1a2/0x480 [ 48.647765] ? __pfx_kunit_try_run_case+0x10/0x10 [ 48.647769] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 48.647773] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 48.647778] ? __kthread_parkme+0x82/0x180 [ 48.647782] ? preempt_count_sub+0x50/0x80 [ 48.647786] ? __pfx_kunit_try_run_case+0x10/0x10 [ 48.647791] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 48.647794] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 48.647798] kthread+0x334/0x6f0 [ 48.647802] ? trace_preempt_on+0x20/0xc0 [ 48.647807] ? __pfx_kthread+0x10/0x10 [ 48.647811] ? _raw_spin_unlock_irq+0x47/0x80 [ 48.647815] ? calculate_sigpending+0x7b/0xa0 [ 48.647818] ? __pfx_kthread+0x10/0x10 [ 48.647823] ret_from_fork+0x3e/0x80 [ 48.647827] ? __pfx_kthread+0x10/0x10 [ 48.647831] ret_from_fork_asm+0x1a/0x30 [ 48.647836] </TASK> [ 48.647838] [ 48.842743] Allocated by task 304: [ 48.846149] kasan_save_stack+0x45/0x70 [ 48.849989] kasan_save_track+0x18/0x40 [ 48.853830] kasan_save_alloc_info+0x3b/0x50 [ 48.858102] __kasan_kmalloc+0xb7/0xc0 [ 48.861854] __kmalloc_cache_noprof+0x189/0x420 [ 48.866385] kasan_bitops_generic+0x92/0x1c0 [ 48.870657] kunit_try_run_case+0x1a2/0x480 [ 48.874880] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 48.880288] kthread+0x334/0x6f0 [ 48.883520] ret_from_fork+0x3e/0x80 [ 48.887100] ret_from_fork_asm+0x1a/0x30 [ 48.891025] [ 48.892525] The buggy address belongs to the object at ffff888104ed9160 [ 48.892525] which belongs to the cache kmalloc-16 of size 16 [ 48.904863] The buggy address is located 8 bytes inside of [ 48.904863] allocated 9-byte region [ffff888104ed9160, ffff888104ed9169) [ 48.917120] [ 48.918618] The buggy address belongs to the physical page: [ 48.924191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9 [ 48.932198] flags: 0x200000000000000(node=0|zone=2) [ 48.937076] page_type: f5(slab) [ 48.940222] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 48.947963] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 48.955701] page dumped because: kasan: bad access detected [ 48.961300] [ 48.962798] Memory state around the buggy address: [ 48.967592] ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc [ 48.974811] ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 48.982036] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 48.989257] ^ [ 48.995870] ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.003087] ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.010308] ================================================================== [ 46.648053] ================================================================== [ 46.655285] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 46.664243] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304 [ 46.671637] [ 46.673138] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 46.673145] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.673147] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 46.673151] Call Trace: [ 46.673152] <TASK> [ 46.673154] dump_stack_lvl+0x73/0xb0 [ 46.673157] print_report+0xd1/0x650 [ 46.673161] ? __virt_addr_valid+0x1db/0x2d0 [ 46.673165] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 46.673169] ? kasan_complete_mode_report_info+0x2a/0x200 [ 46.673173] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 46.673178] kasan_report+0x141/0x180 [ 46.673182] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 46.673187] kasan_check_range+0x10c/0x1c0 [ 46.673192] __kasan_check_write+0x18/0x20 [ 46.673195] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 46.673199] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 46.673204] ? __kmalloc_cache_noprof+0x189/0x420 [ 46.673207] ? trace_hardirqs_on+0x37/0xe0 [ 46.673212] ? kasan_bitops_generic+0x92/0x1c0 [ 46.673216] kasan_bitops_generic+0x121/0x1c0 [ 46.673219] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 46.673223] ? ktime_get_ts64+0x83/0x230 [ 46.673228] kunit_try_run_case+0x1a2/0x480 [ 46.673232] ? __pfx_kunit_try_run_case+0x10/0x10 [ 46.673236] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 46.673241] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 46.673245] ? __kthread_parkme+0x82/0x180 [ 46.673249] ? preempt_count_sub+0x50/0x80 [ 46.673254] ? __pfx_kunit_try_run_case+0x10/0x10 [ 46.673258] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 46.673262] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 46.673266] kthread+0x334/0x6f0 [ 46.673270] ? trace_preempt_on+0x20/0xc0 [ 46.673274] ? __pfx_kthread+0x10/0x10 [ 46.673278] ? _raw_spin_unlock_irq+0x47/0x80 [ 46.673283] ? calculate_sigpending+0x7b/0xa0 [ 46.673286] ? __pfx_kthread+0x10/0x10 [ 46.673291] ret_from_fork+0x3e/0x80 [ 46.673294] ? __pfx_kthread+0x10/0x10 [ 46.673299] ret_from_fork_asm+0x1a/0x30 [ 46.673304] </TASK> [ 46.673306] [ 46.868154] Allocated by task 304: [ 46.871560] kasan_save_stack+0x45/0x70 [ 46.875399] kasan_save_track+0x18/0x40 [ 46.879236] kasan_save_alloc_info+0x3b/0x50 [ 46.883510] __kasan_kmalloc+0xb7/0xc0 [ 46.887262] __kmalloc_cache_noprof+0x189/0x420 [ 46.891794] kasan_bitops_generic+0x92/0x1c0 [ 46.896067] kunit_try_run_case+0x1a2/0x480 [ 46.900253] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 46.905651] kthread+0x334/0x6f0 [ 46.908884] ret_from_fork+0x3e/0x80 [ 46.912464] ret_from_fork_asm+0x1a/0x30 [ 46.916389] [ 46.917887] The buggy address belongs to the object at ffff888104ed9160 [ 46.917887] which belongs to the cache kmalloc-16 of size 16 [ 46.930222] The buggy address is located 8 bytes inside of [ 46.930222] allocated 9-byte region [ffff888104ed9160, ffff888104ed9169) [ 46.942475] [ 46.943973] The buggy address belongs to the physical page: [ 46.949547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9 [ 46.957547] flags: 0x200000000000000(node=0|zone=2) [ 46.962426] page_type: f5(slab) [ 46.965573] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 46.973318] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 46.981059] page dumped because: kasan: bad access detected [ 46.986629] [ 46.988130] Memory state around the buggy address: [ 46.992921] ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc [ 47.000142] ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 47.007368] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 47.014588] ^ [ 47.021199] ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.028417] ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.035639] ================================================================== [ 48.227592] ================================================================== [ 48.234808] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 48.243768] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304 [ 48.251169] [ 48.252668] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 48.252695] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.252697] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 48.252701] Call Trace: [ 48.252702] <TASK> [ 48.252704] dump_stack_lvl+0x73/0xb0 [ 48.252708] print_report+0xd1/0x650 [ 48.252712] ? __virt_addr_valid+0x1db/0x2d0 [ 48.252728] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 48.252733] ? kasan_complete_mode_report_info+0x2a/0x200 [ 48.252737] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 48.252741] kasan_report+0x141/0x180 [ 48.252746] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 48.252751] kasan_check_range+0x10c/0x1c0 [ 48.252756] __kasan_check_write+0x18/0x20 [ 48.252760] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 48.252764] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 48.252768] ? __kmalloc_cache_noprof+0x189/0x420 [ 48.252772] ? trace_hardirqs_on+0x37/0xe0 [ 48.252776] ? kasan_bitops_generic+0x92/0x1c0 [ 48.252781] kasan_bitops_generic+0x121/0x1c0 [ 48.252784] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 48.252788] ? ktime_get_ts64+0x83/0x230 [ 48.252793] kunit_try_run_case+0x1a2/0x480 [ 48.252797] ? __pfx_kunit_try_run_case+0x10/0x10 [ 48.252801] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 48.252806] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 48.252811] ? __kthread_parkme+0x82/0x180 [ 48.252815] ? preempt_count_sub+0x50/0x80 [ 48.252820] ? __pfx_kunit_try_run_case+0x10/0x10 [ 48.252824] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 48.252828] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 48.252832] kthread+0x334/0x6f0 [ 48.252836] ? trace_preempt_on+0x20/0xc0 [ 48.252841] ? __pfx_kthread+0x10/0x10 [ 48.252845] ? _raw_spin_unlock_irq+0x47/0x80 [ 48.252849] ? calculate_sigpending+0x7b/0xa0 [ 48.252853] ? __pfx_kthread+0x10/0x10 [ 48.252858] ret_from_fork+0x3e/0x80 [ 48.252862] ? __pfx_kthread+0x10/0x10 [ 48.252866] ret_from_fork_asm+0x1a/0x30 [ 48.252872] </TASK> [ 48.252873] [ 48.447624] Allocated by task 304: [ 48.451028] kasan_save_stack+0x45/0x70 [ 48.454870] kasan_save_track+0x18/0x40 [ 48.458734] kasan_save_alloc_info+0x3b/0x50 [ 48.463007] __kasan_kmalloc+0xb7/0xc0 [ 48.466758] __kmalloc_cache_noprof+0x189/0x420 [ 48.471291] kasan_bitops_generic+0x92/0x1c0 [ 48.475565] kunit_try_run_case+0x1a2/0x480 [ 48.479749] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 48.485150] kthread+0x334/0x6f0 [ 48.488389] ret_from_fork+0x3e/0x80 [ 48.491968] ret_from_fork_asm+0x1a/0x30 [ 48.495893] [ 48.497386] The buggy address belongs to the object at ffff888104ed9160 [ 48.497386] which belongs to the cache kmalloc-16 of size 16 [ 48.509735] The buggy address is located 8 bytes inside of [ 48.509735] allocated 9-byte region [ffff888104ed9160, ffff888104ed9169) [ 48.521989] [ 48.523489] The buggy address belongs to the physical page: [ 48.529061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9 [ 48.537067] flags: 0x200000000000000(node=0|zone=2) [ 48.541948] page_type: f5(slab) [ 48.545094] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 48.552831] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 48.560571] page dumped because: kasan: bad access detected [ 48.566143] [ 48.567641] Memory state around the buggy address: [ 48.572436] ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc [ 48.579655] ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 48.586909] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 48.594128] ^ [ 48.600764] ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.607986] ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.615211] ================================================================== [ 49.412479] ================================================================== [ 49.419761] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 49.428737] Read of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304 [ 49.436044] [ 49.437547] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 49.437555] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.437557] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 49.437560] Call Trace: [ 49.437562] <TASK> [ 49.437563] dump_stack_lvl+0x73/0xb0 [ 49.437567] print_report+0xd1/0x650 [ 49.437571] ? __virt_addr_valid+0x1db/0x2d0 [ 49.437574] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 49.437579] ? kasan_complete_mode_report_info+0x2a/0x200 [ 49.437583] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 49.437587] kasan_report+0x141/0x180 [ 49.437592] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 49.437597] kasan_check_range+0x10c/0x1c0 [ 49.437602] __kasan_check_read+0x15/0x20 [ 49.437605] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 49.437610] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 49.437614] ? __kmalloc_cache_noprof+0x189/0x420 [ 49.437618] ? trace_hardirqs_on+0x37/0xe0 [ 49.437622] ? kasan_bitops_generic+0x92/0x1c0 [ 49.437626] kasan_bitops_generic+0x121/0x1c0 [ 49.437630] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 49.437634] ? ktime_get_ts64+0x83/0x230 [ 49.437639] kunit_try_run_case+0x1a2/0x480 [ 49.437643] ? __pfx_kunit_try_run_case+0x10/0x10 [ 49.437647] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 49.437652] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 49.437657] ? __kthread_parkme+0x82/0x180 [ 49.437661] ? preempt_count_sub+0x50/0x80 [ 49.437665] ? __pfx_kunit_try_run_case+0x10/0x10 [ 49.437689] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 49.437693] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 49.437698] kthread+0x334/0x6f0 [ 49.437702] ? trace_preempt_on+0x20/0xc0 [ 49.437706] ? __pfx_kthread+0x10/0x10 [ 49.437711] ? _raw_spin_unlock_irq+0x47/0x80 [ 49.437715] ? calculate_sigpending+0x7b/0xa0 [ 49.437733] ? __pfx_kthread+0x10/0x10 [ 49.437738] ret_from_fork+0x3e/0x80 [ 49.437742] ? __pfx_kthread+0x10/0x10 [ 49.437746] ret_from_fork_asm+0x1a/0x30 [ 49.437752] </TASK> [ 49.437753] [ 49.632465] Allocated by task 304: [ 49.635874] kasan_save_stack+0x45/0x70 [ 49.639760] kasan_save_track+0x18/0x40 [ 49.643604] kasan_save_alloc_info+0x3b/0x50 [ 49.647876] __kasan_kmalloc+0xb7/0xc0 [ 49.651629] __kmalloc_cache_noprof+0x189/0x420 [ 49.656168] kasan_bitops_generic+0x92/0x1c0 [ 49.660441] kunit_try_run_case+0x1a2/0x480 [ 49.664626] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 49.670027] kthread+0x334/0x6f0 [ 49.673258] ret_from_fork+0x3e/0x80 [ 49.676839] ret_from_fork_asm+0x1a/0x30 [ 49.680772] [ 49.682272] The buggy address belongs to the object at ffff888104ed9160 [ 49.682272] which belongs to the cache kmalloc-16 of size 16 [ 49.694614] The buggy address is located 8 bytes inside of [ 49.694614] allocated 9-byte region [ffff888104ed9160, ffff888104ed9169) [ 49.706868] [ 49.708367] The buggy address belongs to the physical page: [ 49.713937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9 [ 49.721938] flags: 0x200000000000000(node=0|zone=2) [ 49.726816] page_type: f5(slab) [ 49.729963] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 49.737711] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 49.745476] page dumped because: kasan: bad access detected [ 49.751047] [ 49.752548] Memory state around the buggy address: [ 49.757339] ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc [ 49.764559] ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 49.771787] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 49.779012] ^ [ 49.785628] ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.792853] ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.800073] ================================================================== [ 49.807298] ================================================================== [ 49.814529] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 49.823489] Read of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304 [ 49.830802] [ 49.832303] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 49.832310] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.832312] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 49.832315] Call Trace: [ 49.832317] <TASK> [ 49.832319] dump_stack_lvl+0x73/0xb0 [ 49.832322] print_report+0xd1/0x650 [ 49.832326] ? __virt_addr_valid+0x1db/0x2d0 [ 49.832330] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 49.832334] ? kasan_complete_mode_report_info+0x2a/0x200 [ 49.832338] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 49.832343] kasan_report+0x141/0x180 [ 49.832347] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 49.832352] __asan_report_load8_noabort+0x18/0x20 [ 49.832356] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 49.832360] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 49.832365] ? __kmalloc_cache_noprof+0x189/0x420 [ 49.832368] ? trace_hardirqs_on+0x37/0xe0 [ 49.832372] ? kasan_bitops_generic+0x92/0x1c0 [ 49.832377] kasan_bitops_generic+0x121/0x1c0 [ 49.832380] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 49.832384] ? ktime_get_ts64+0x83/0x230 [ 49.832389] kunit_try_run_case+0x1a2/0x480 [ 49.832393] ? __pfx_kunit_try_run_case+0x10/0x10 [ 49.832397] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 49.832402] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 49.832406] ? __kthread_parkme+0x82/0x180 [ 49.832410] ? preempt_count_sub+0x50/0x80 [ 49.832415] ? __pfx_kunit_try_run_case+0x10/0x10 [ 49.832419] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 49.832423] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 49.832427] kthread+0x334/0x6f0 [ 49.832431] ? trace_preempt_on+0x20/0xc0 [ 49.832436] ? __pfx_kthread+0x10/0x10 [ 49.832440] ? _raw_spin_unlock_irq+0x47/0x80 [ 49.832444] ? calculate_sigpending+0x7b/0xa0 [ 49.832448] ? __pfx_kthread+0x10/0x10 [ 49.832452] ret_from_fork+0x3e/0x80 [ 49.832456] ? __pfx_kthread+0x10/0x10 [ 49.832461] ret_from_fork_asm+0x1a/0x30 [ 49.832466] </TASK> [ 49.832468] [ 50.023853] Allocated by task 304: [ 50.027259] kasan_save_stack+0x45/0x70 [ 50.031098] kasan_save_track+0x18/0x40 [ 50.034937] kasan_save_alloc_info+0x3b/0x50 [ 50.039210] __kasan_kmalloc+0xb7/0xc0 [ 50.042971] __kmalloc_cache_noprof+0x189/0x420 [ 50.047512] kasan_bitops_generic+0x92/0x1c0 [ 50.051784] kunit_try_run_case+0x1a2/0x480 [ 50.055971] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 50.061377] kthread+0x334/0x6f0 [ 50.064609] ret_from_fork+0x3e/0x80 [ 50.068189] ret_from_fork_asm+0x1a/0x30 [ 50.072115] [ 50.073614] The buggy address belongs to the object at ffff888104ed9160 [ 50.073614] which belongs to the cache kmalloc-16 of size 16 [ 50.085956] The buggy address is located 8 bytes inside of [ 50.085956] allocated 9-byte region [ffff888104ed9160, ffff888104ed9169) [ 50.098209] [ 50.099710] The buggy address belongs to the physical page: [ 50.105323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9 [ 50.113323] flags: 0x200000000000000(node=0|zone=2) [ 50.118204] page_type: f5(slab) [ 50.121349] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 50.129098] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 50.136843] page dumped because: kasan: bad access detected [ 50.142416] [ 50.143916] Memory state around the buggy address: [ 50.148709] ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc [ 50.155954] ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 50.163182] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 50.170409] ^ [ 50.177021] ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.184238] ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.191459] ================================================================== [ 47.437740] ================================================================== [ 47.444963] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 47.453915] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304 [ 47.461307] [ 47.462808] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 47.462816] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.462818] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 47.462822] Call Trace: [ 47.462823] <TASK> [ 47.462825] dump_stack_lvl+0x73/0xb0 [ 47.462828] print_report+0xd1/0x650 [ 47.462833] ? __virt_addr_valid+0x1db/0x2d0 [ 47.462836] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 47.462841] ? kasan_complete_mode_report_info+0x2a/0x200 [ 47.462845] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 47.462849] kasan_report+0x141/0x180 [ 47.462854] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 47.462859] kasan_check_range+0x10c/0x1c0 [ 47.462864] __kasan_check_write+0x18/0x20 [ 47.462868] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 47.462872] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 47.462877] ? __kmalloc_cache_noprof+0x189/0x420 [ 47.462880] ? trace_hardirqs_on+0x37/0xe0 [ 47.462884] ? kasan_bitops_generic+0x92/0x1c0 [ 47.462889] kasan_bitops_generic+0x121/0x1c0 [ 47.462892] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 47.462896] ? ktime_get_ts64+0x83/0x230 [ 47.462901] kunit_try_run_case+0x1a2/0x480 [ 47.462905] ? __pfx_kunit_try_run_case+0x10/0x10 [ 47.462910] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 47.462914] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 47.462919] ? __kthread_parkme+0x82/0x180 [ 47.462923] ? preempt_count_sub+0x50/0x80 [ 47.462928] ? __pfx_kunit_try_run_case+0x10/0x10 [ 47.462933] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 47.462937] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 47.462941] kthread+0x334/0x6f0 [ 47.462945] ? trace_preempt_on+0x20/0xc0 [ 47.462949] ? __pfx_kthread+0x10/0x10 [ 47.462954] ? _raw_spin_unlock_irq+0x47/0x80 [ 47.462958] ? calculate_sigpending+0x7b/0xa0 [ 47.462962] ? __pfx_kthread+0x10/0x10 [ 47.462966] ret_from_fork+0x3e/0x80 [ 47.462970] ? __pfx_kthread+0x10/0x10 [ 47.462975] ret_from_fork_asm+0x1a/0x30 [ 47.462981] </TASK> [ 47.462982] [ 47.657789] Allocated by task 304: [ 47.661196] kasan_save_stack+0x45/0x70 [ 47.665044] kasan_save_track+0x18/0x40 [ 47.668890] kasan_save_alloc_info+0x3b/0x50 [ 47.673164] __kasan_kmalloc+0xb7/0xc0 [ 47.676915] __kmalloc_cache_noprof+0x189/0x420 [ 47.681446] kasan_bitops_generic+0x92/0x1c0 [ 47.685762] kunit_try_run_case+0x1a2/0x480 [ 47.689948] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 47.695348] kthread+0x334/0x6f0 [ 47.698581] ret_from_fork+0x3e/0x80 [ 47.702158] ret_from_fork_asm+0x1a/0x30 [ 47.706086] [ 47.707586] The buggy address belongs to the object at ffff888104ed9160 [ 47.707586] which belongs to the cache kmalloc-16 of size 16 [ 47.719925] The buggy address is located 8 bytes inside of [ 47.719925] allocated 9-byte region [ffff888104ed9160, ffff888104ed9169) [ 47.732173] [ 47.733702] The buggy address belongs to the physical page: [ 47.739320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9 [ 47.747319] flags: 0x200000000000000(node=0|zone=2) [ 47.752198] page_type: f5(slab) [ 47.755345] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 47.763086] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 47.770830] page dumped because: kasan: bad access detected [ 47.776404] [ 47.777904] Memory state around the buggy address: [ 47.782702] ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc [ 47.789949] ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 47.797167] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 47.804387] ^ [ 47.811001] ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.818221] ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.825447] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 45.867623] ================================================================== [ 45.874843] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 45.883025] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304 [ 45.890416] [ 45.891917] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 45.891925] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.891927] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 45.891930] Call Trace: [ 45.891931] <TASK> [ 45.891933] dump_stack_lvl+0x73/0xb0 [ 45.891937] print_report+0xd1/0x650 [ 45.891941] ? __virt_addr_valid+0x1db/0x2d0 [ 45.891944] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 45.891949] ? kasan_complete_mode_report_info+0x2a/0x200 [ 45.891953] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 45.891959] kasan_report+0x141/0x180 [ 45.891963] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 45.891969] kasan_check_range+0x10c/0x1c0 [ 45.891973] __kasan_check_write+0x18/0x20 [ 45.891977] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 45.891982] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 45.891987] ? __kmalloc_cache_noprof+0x189/0x420 [ 45.891991] ? trace_hardirqs_on+0x37/0xe0 [ 45.891995] ? kasan_bitops_generic+0x92/0x1c0 [ 45.891999] kasan_bitops_generic+0x116/0x1c0 [ 45.892003] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 45.892006] ? ktime_get_ts64+0x83/0x230 [ 45.892011] kunit_try_run_case+0x1a2/0x480 [ 45.892016] ? __pfx_kunit_try_run_case+0x10/0x10 [ 45.892020] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 45.892024] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 45.892029] ? __kthread_parkme+0x82/0x180 [ 45.892033] ? preempt_count_sub+0x50/0x80 [ 45.892037] ? __pfx_kunit_try_run_case+0x10/0x10 [ 45.892042] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 45.892046] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 45.892049] kthread+0x334/0x6f0 [ 45.892053] ? trace_preempt_on+0x20/0xc0 [ 45.892058] ? __pfx_kthread+0x10/0x10 [ 45.892062] ? _raw_spin_unlock_irq+0x47/0x80 [ 45.892066] ? calculate_sigpending+0x7b/0xa0 [ 45.892070] ? __pfx_kthread+0x10/0x10 [ 45.892074] ret_from_fork+0x3e/0x80 [ 45.892078] ? __pfx_kthread+0x10/0x10 [ 45.892082] ret_from_fork_asm+0x1a/0x30 [ 45.892087] </TASK> [ 45.892089] [ 46.083040] Allocated by task 304: [ 46.086447] kasan_save_stack+0x45/0x70 [ 46.090286] kasan_save_track+0x18/0x40 [ 46.094126] kasan_save_alloc_info+0x3b/0x50 [ 46.098398] __kasan_kmalloc+0xb7/0xc0 [ 46.102151] __kmalloc_cache_noprof+0x189/0x420 [ 46.106708] kasan_bitops_generic+0x92/0x1c0 [ 46.111007] kunit_try_run_case+0x1a2/0x480 [ 46.115193] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 46.120592] kthread+0x334/0x6f0 [ 46.123825] ret_from_fork+0x3e/0x80 [ 46.127405] ret_from_fork_asm+0x1a/0x30 [ 46.131339] [ 46.132838] The buggy address belongs to the object at ffff888104ed9160 [ 46.132838] which belongs to the cache kmalloc-16 of size 16 [ 46.145171] The buggy address is located 8 bytes inside of [ 46.145171] allocated 9-byte region [ffff888104ed9160, ffff888104ed9169) [ 46.157424] [ 46.158922] The buggy address belongs to the physical page: [ 46.164497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9 [ 46.172504] flags: 0x200000000000000(node=0|zone=2) [ 46.177382] page_type: f5(slab) [ 46.180529] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 46.188276] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 46.196016] page dumped because: kasan: bad access detected [ 46.201588] [ 46.203086] Memory state around the buggy address: [ 46.207881] ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc [ 46.215108] ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 46.222326] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 46.229544] ^ [ 46.236158] ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.243375] ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.250596] ================================================================== [ 46.257821] ================================================================== [ 46.265052] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 46.273232] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304 [ 46.280623] [ 46.282125] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 46.282132] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.282134] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 46.282138] Call Trace: [ 46.282139] <TASK> [ 46.282141] dump_stack_lvl+0x73/0xb0 [ 46.282144] print_report+0xd1/0x650 [ 46.282148] ? __virt_addr_valid+0x1db/0x2d0 [ 46.282152] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 46.282157] ? kasan_complete_mode_report_info+0x2a/0x200 [ 46.282161] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 46.282166] kasan_report+0x141/0x180 [ 46.282170] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 46.282176] kasan_check_range+0x10c/0x1c0 [ 46.282181] __kasan_check_write+0x18/0x20 [ 46.282185] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 46.282190] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 46.282195] ? __kmalloc_cache_noprof+0x189/0x420 [ 46.282198] ? trace_hardirqs_on+0x37/0xe0 [ 46.282202] ? kasan_bitops_generic+0x92/0x1c0 [ 46.282206] kasan_bitops_generic+0x116/0x1c0 [ 46.282210] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 46.282214] ? ktime_get_ts64+0x83/0x230 [ 46.282218] kunit_try_run_case+0x1a2/0x480 [ 46.282222] ? __pfx_kunit_try_run_case+0x10/0x10 [ 46.282226] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 46.282231] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 46.282235] ? __kthread_parkme+0x82/0x180 [ 46.282239] ? preempt_count_sub+0x50/0x80 [ 46.282244] ? __pfx_kunit_try_run_case+0x10/0x10 [ 46.282248] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 46.282252] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 46.282256] kthread+0x334/0x6f0 [ 46.282260] ? trace_preempt_on+0x20/0xc0 [ 46.282264] ? __pfx_kthread+0x10/0x10 [ 46.282268] ? _raw_spin_unlock_irq+0x47/0x80 [ 46.282272] ? calculate_sigpending+0x7b/0xa0 [ 46.282276] ? __pfx_kthread+0x10/0x10 [ 46.282280] ret_from_fork+0x3e/0x80 [ 46.282284] ? __pfx_kthread+0x10/0x10 [ 46.282288] ret_from_fork_asm+0x1a/0x30 [ 46.282294] </TASK> [ 46.282295] [ 46.473222] Allocated by task 304: [ 46.476627] kasan_save_stack+0x45/0x70 [ 46.480467] kasan_save_track+0x18/0x40 [ 46.484306] kasan_save_alloc_info+0x3b/0x50 [ 46.488581] __kasan_kmalloc+0xb7/0xc0 [ 46.492340] __kmalloc_cache_noprof+0x189/0x420 [ 46.496872] kasan_bitops_generic+0x92/0x1c0 [ 46.501146] kunit_try_run_case+0x1a2/0x480 [ 46.505332] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 46.510744] kthread+0x334/0x6f0 [ 46.513982] ret_from_fork+0x3e/0x80 [ 46.517567] ret_from_fork_asm+0x1a/0x30 [ 46.521494] [ 46.522995] The buggy address belongs to the object at ffff888104ed9160 [ 46.522995] which belongs to the cache kmalloc-16 of size 16 [ 46.535333] The buggy address is located 8 bytes inside of [ 46.535333] allocated 9-byte region [ffff888104ed9160, ffff888104ed9169) [ 46.547587] [ 46.549089] The buggy address belongs to the physical page: [ 46.554659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9 [ 46.562702] flags: 0x200000000000000(node=0|zone=2) [ 46.567635] page_type: f5(slab) [ 46.570781] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 46.578528] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 46.586266] page dumped because: kasan: bad access detected [ 46.591837] [ 46.593330] Memory state around the buggy address: [ 46.598121] ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc [ 46.605340] ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 46.612561] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 46.619777] ^ [ 46.626389] ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.633609] ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.640827] ================================================================== [ 44.696726] ================================================================== [ 44.703980] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 44.712160] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304 [ 44.719552] [ 44.721051] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 44.721059] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.721061] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 44.721064] Call Trace: [ 44.721065] <TASK> [ 44.721067] dump_stack_lvl+0x73/0xb0 [ 44.721070] print_report+0xd1/0x650 [ 44.721075] ? __virt_addr_valid+0x1db/0x2d0 [ 44.721078] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 44.721083] ? kasan_complete_mode_report_info+0x2a/0x200 [ 44.721088] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 44.721092] kasan_report+0x141/0x180 [ 44.721097] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 44.721103] kasan_check_range+0x10c/0x1c0 [ 44.721107] __kasan_check_write+0x18/0x20 [ 44.721111] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 44.721116] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 44.721121] ? __kmalloc_cache_noprof+0x189/0x420 [ 44.721125] ? trace_hardirqs_on+0x37/0xe0 [ 44.721129] ? kasan_bitops_generic+0x92/0x1c0 [ 44.721133] kasan_bitops_generic+0x116/0x1c0 [ 44.721136] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 44.721140] ? ktime_get_ts64+0x83/0x230 [ 44.721145] kunit_try_run_case+0x1a2/0x480 [ 44.721149] ? __pfx_kunit_try_run_case+0x10/0x10 [ 44.721153] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 44.721158] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 44.721162] ? __kthread_parkme+0x82/0x180 [ 44.721166] ? preempt_count_sub+0x50/0x80 [ 44.721171] ? __pfx_kunit_try_run_case+0x10/0x10 [ 44.721175] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 44.721179] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 44.721183] kthread+0x334/0x6f0 [ 44.721187] ? trace_preempt_on+0x20/0xc0 [ 44.721191] ? __pfx_kthread+0x10/0x10 [ 44.721195] ? _raw_spin_unlock_irq+0x47/0x80 [ 44.721200] ? calculate_sigpending+0x7b/0xa0 [ 44.721203] ? __pfx_kthread+0x10/0x10 [ 44.721208] ret_from_fork+0x3e/0x80 [ 44.721212] ? __pfx_kthread+0x10/0x10 [ 44.721216] ret_from_fork_asm+0x1a/0x30 [ 44.721222] </TASK> [ 44.721223] [ 44.912135] Allocated by task 304: [ 44.915539] kasan_save_stack+0x45/0x70 [ 44.919378] kasan_save_track+0x18/0x40 [ 44.923217] kasan_save_alloc_info+0x3b/0x50 [ 44.927490] __kasan_kmalloc+0xb7/0xc0 [ 44.931243] __kmalloc_cache_noprof+0x189/0x420 [ 44.935777] kasan_bitops_generic+0x92/0x1c0 [ 44.940048] kunit_try_run_case+0x1a2/0x480 [ 44.944232] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 44.949632] kthread+0x334/0x6f0 [ 44.952865] ret_from_fork+0x3e/0x80 [ 44.956443] ret_from_fork_asm+0x1a/0x30 [ 44.960370] [ 44.961870] The buggy address belongs to the object at ffff888104ed9160 [ 44.961870] which belongs to the cache kmalloc-16 of size 16 [ 44.974211] The buggy address is located 8 bytes inside of [ 44.974211] allocated 9-byte region [ffff888104ed9160, ffff888104ed9169) [ 44.986466] [ 44.987963] The buggy address belongs to the physical page: [ 44.993537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9 [ 45.001544] flags: 0x200000000000000(node=0|zone=2) [ 45.006421] page_type: f5(slab) [ 45.009570] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 45.017316] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.025054] page dumped because: kasan: bad access detected [ 45.030627] [ 45.032125] Memory state around the buggy address: [ 45.036919] ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc [ 45.044139] ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 45.051358] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 45.058577] ^ [ 45.065187] ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.072407] ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.079625] ================================================================== [ 43.916228] ================================================================== [ 43.923462] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 43.931640] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304 [ 43.939035] [ 43.940535] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 43.940542] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.940544] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 43.940548] Call Trace: [ 43.940549] <TASK> [ 43.940551] dump_stack_lvl+0x73/0xb0 [ 43.940555] print_report+0xd1/0x650 [ 43.940559] ? __virt_addr_valid+0x1db/0x2d0 [ 43.940562] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 43.940567] ? kasan_complete_mode_report_info+0x2a/0x200 [ 43.940571] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 43.940576] kasan_report+0x141/0x180 [ 43.940581] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 43.940587] kasan_check_range+0x10c/0x1c0 [ 43.940591] __kasan_check_write+0x18/0x20 [ 43.940595] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 43.940600] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 43.940605] ? __kmalloc_cache_noprof+0x189/0x420 [ 43.940609] ? trace_hardirqs_on+0x37/0xe0 [ 43.940613] ? kasan_bitops_generic+0x92/0x1c0 [ 43.940617] kasan_bitops_generic+0x116/0x1c0 [ 43.940621] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 43.940624] ? ktime_get_ts64+0x83/0x230 [ 43.940629] kunit_try_run_case+0x1a2/0x480 [ 43.940634] ? __pfx_kunit_try_run_case+0x10/0x10 [ 43.940638] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 43.940642] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 43.940647] ? __kthread_parkme+0x82/0x180 [ 43.940651] ? preempt_count_sub+0x50/0x80 [ 43.940655] ? __pfx_kunit_try_run_case+0x10/0x10 [ 43.940660] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 43.940664] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 43.940668] kthread+0x334/0x6f0 [ 43.940689] ? trace_preempt_on+0x20/0xc0 [ 43.940693] ? __pfx_kthread+0x10/0x10 [ 43.940698] ? _raw_spin_unlock_irq+0x47/0x80 [ 43.940702] ? calculate_sigpending+0x7b/0xa0 [ 43.940706] ? __pfx_kthread+0x10/0x10 [ 43.940723] ret_from_fork+0x3e/0x80 [ 43.940727] ? __pfx_kthread+0x10/0x10 [ 43.940731] ret_from_fork_asm+0x1a/0x30 [ 43.940737] </TASK> [ 43.940738] [ 44.131625] Allocated by task 304: [ 44.135030] kasan_save_stack+0x45/0x70 [ 44.138870] kasan_save_track+0x18/0x40 [ 44.142717] kasan_save_alloc_info+0x3b/0x50 [ 44.147015] __kasan_kmalloc+0xb7/0xc0 [ 44.150768] __kmalloc_cache_noprof+0x189/0x420 [ 44.155301] kasan_bitops_generic+0x92/0x1c0 [ 44.159571] kunit_try_run_case+0x1a2/0x480 [ 44.163760] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 44.169158] kthread+0x334/0x6f0 [ 44.172390] ret_from_fork+0x3e/0x80 [ 44.175970] ret_from_fork_asm+0x1a/0x30 [ 44.179896] [ 44.181396] The buggy address belongs to the object at ffff888104ed9160 [ 44.181396] which belongs to the cache kmalloc-16 of size 16 [ 44.193760] The buggy address is located 8 bytes inside of [ 44.193760] allocated 9-byte region [ffff888104ed9160, ffff888104ed9169) [ 44.206017] [ 44.207515] The buggy address belongs to the physical page: [ 44.213086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9 [ 44.221086] flags: 0x200000000000000(node=0|zone=2) [ 44.225966] page_type: f5(slab) [ 44.229111] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 44.236852] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.244598] page dumped because: kasan: bad access detected [ 44.250168] [ 44.251660] Memory state around the buggy address: [ 44.256489] ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc [ 44.263751] ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 44.270979] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 44.278204] ^ [ 44.284816] ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.292036] ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.299254] ================================================================== [ 45.086850] ================================================================== [ 45.094116] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 45.102288] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304 [ 45.109702] [ 45.111252] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 45.111259] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.111261] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 45.111264] Call Trace: [ 45.111266] <TASK> [ 45.111268] dump_stack_lvl+0x73/0xb0 [ 45.111271] print_report+0xd1/0x650 [ 45.111275] ? __virt_addr_valid+0x1db/0x2d0 [ 45.111278] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 45.111283] ? kasan_complete_mode_report_info+0x2a/0x200 [ 45.111288] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 45.111293] kasan_report+0x141/0x180 [ 45.111297] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 45.111303] kasan_check_range+0x10c/0x1c0 [ 45.111307] __kasan_check_write+0x18/0x20 [ 45.111311] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 45.111316] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 45.111321] ? __kmalloc_cache_noprof+0x189/0x420 [ 45.111325] ? trace_hardirqs_on+0x37/0xe0 [ 45.111329] ? kasan_bitops_generic+0x92/0x1c0 [ 45.111333] kasan_bitops_generic+0x116/0x1c0 [ 45.111337] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 45.111340] ? ktime_get_ts64+0x83/0x230 [ 45.111345] kunit_try_run_case+0x1a2/0x480 [ 45.111349] ? __pfx_kunit_try_run_case+0x10/0x10 [ 45.111354] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 45.111358] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 45.111363] ? __kthread_parkme+0x82/0x180 [ 45.111367] ? preempt_count_sub+0x50/0x80 [ 45.111371] ? __pfx_kunit_try_run_case+0x10/0x10 [ 45.111375] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 45.111379] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 45.111383] kthread+0x334/0x6f0 [ 45.111387] ? trace_preempt_on+0x20/0xc0 [ 45.111392] ? __pfx_kthread+0x10/0x10 [ 45.111396] ? _raw_spin_unlock_irq+0x47/0x80 [ 45.111400] ? calculate_sigpending+0x7b/0xa0 [ 45.111404] ? __pfx_kthread+0x10/0x10 [ 45.111408] ret_from_fork+0x3e/0x80 [ 45.111412] ? __pfx_kthread+0x10/0x10 [ 45.111416] ret_from_fork_asm+0x1a/0x30 [ 45.111422] </TASK> [ 45.111424] [ 45.302445] Allocated by task 304: [ 45.305851] kasan_save_stack+0x45/0x70 [ 45.309707] kasan_save_track+0x18/0x40 [ 45.313572] kasan_save_alloc_info+0x3b/0x50 [ 45.317846] __kasan_kmalloc+0xb7/0xc0 [ 45.321599] __kmalloc_cache_noprof+0x189/0x420 [ 45.326139] kasan_bitops_generic+0x92/0x1c0 [ 45.330410] kunit_try_run_case+0x1a2/0x480 [ 45.334598] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 45.339997] kthread+0x334/0x6f0 [ 45.343238] ret_from_fork+0x3e/0x80 [ 45.346815] ret_from_fork_asm+0x1a/0x30 [ 45.350765] [ 45.352258] The buggy address belongs to the object at ffff888104ed9160 [ 45.352258] which belongs to the cache kmalloc-16 of size 16 [ 45.364590] The buggy address is located 8 bytes inside of [ 45.364590] allocated 9-byte region [ffff888104ed9160, ffff888104ed9169) [ 45.376846] [ 45.378346] The buggy address belongs to the physical page: [ 45.383916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9 [ 45.391914] flags: 0x200000000000000(node=0|zone=2) [ 45.396795] page_type: f5(slab) [ 45.399943] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 45.407704] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.415487] page dumped because: kasan: bad access detected [ 45.421061] [ 45.422559] Memory state around the buggy address: [ 45.427354] ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc [ 45.434580] ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 45.441798] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 45.449016] ^ [ 45.455630] ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.462851] ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.470077] ================================================================== [ 43.522098] ================================================================== [ 43.533157] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 43.541337] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304 [ 43.548732] [ 43.550232] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 43.550240] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.550242] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 43.550245] Call Trace: [ 43.550247] <TASK> [ 43.550249] dump_stack_lvl+0x73/0xb0 [ 43.550252] print_report+0xd1/0x650 [ 43.550257] ? __virt_addr_valid+0x1db/0x2d0 [ 43.550260] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 43.550266] ? kasan_complete_mode_report_info+0x2a/0x200 [ 43.550270] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 43.550275] kasan_report+0x141/0x180 [ 43.550279] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 43.550285] kasan_check_range+0x10c/0x1c0 [ 43.550289] __kasan_check_write+0x18/0x20 [ 43.550293] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 43.550298] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 43.550303] ? __kmalloc_cache_noprof+0x189/0x420 [ 43.550307] ? trace_hardirqs_on+0x37/0xe0 [ 43.550311] ? kasan_bitops_generic+0x92/0x1c0 [ 43.550315] kasan_bitops_generic+0x116/0x1c0 [ 43.550319] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 43.550323] ? ktime_get_ts64+0x83/0x230 [ 43.550327] kunit_try_run_case+0x1a2/0x480 [ 43.550332] ? __pfx_kunit_try_run_case+0x10/0x10 [ 43.550336] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 43.550340] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 43.550345] ? __kthread_parkme+0x82/0x180 [ 43.550349] ? preempt_count_sub+0x50/0x80 [ 43.550354] ? __pfx_kunit_try_run_case+0x10/0x10 [ 43.550358] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 43.550362] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 43.550366] kthread+0x334/0x6f0 [ 43.550370] ? trace_preempt_on+0x20/0xc0 [ 43.550375] ? __pfx_kthread+0x10/0x10 [ 43.550379] ? _raw_spin_unlock_irq+0x47/0x80 [ 43.550383] ? calculate_sigpending+0x7b/0xa0 [ 43.550387] ? __pfx_kthread+0x10/0x10 [ 43.550391] ret_from_fork+0x3e/0x80 [ 43.550395] ? __pfx_kthread+0x10/0x10 [ 43.550400] ret_from_fork_asm+0x1a/0x30 [ 43.550405] </TASK> [ 43.550407] [ 43.741312] Allocated by task 304: [ 43.744738] kasan_save_stack+0x45/0x70 [ 43.748585] kasan_save_track+0x18/0x40 [ 43.752432] kasan_save_alloc_info+0x3b/0x50 [ 43.756728] __kasan_kmalloc+0xb7/0xc0 [ 43.760482] __kmalloc_cache_noprof+0x189/0x420 [ 43.765014] kasan_bitops_generic+0x92/0x1c0 [ 43.769289] kunit_try_run_case+0x1a2/0x480 [ 43.773483] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 43.778880] kthread+0x334/0x6f0 [ 43.782112] ret_from_fork+0x3e/0x80 [ 43.785692] ret_from_fork_asm+0x1a/0x30 [ 43.789645] [ 43.791144] The buggy address belongs to the object at ffff888104ed9160 [ 43.791144] which belongs to the cache kmalloc-16 of size 16 [ 43.803484] The buggy address is located 8 bytes inside of [ 43.803484] allocated 9-byte region [ffff888104ed9160, ffff888104ed9169) [ 43.815751] [ 43.817255] The buggy address belongs to the physical page: [ 43.822827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9 [ 43.830827] flags: 0x200000000000000(node=0|zone=2) [ 43.835704] page_type: f5(slab) [ 43.838854] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 43.846598] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.854337] page dumped because: kasan: bad access detected [ 43.859910] [ 43.861411] Memory state around the buggy address: [ 43.866203] ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc [ 43.873421] ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 43.880639] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 43.887858] ^ [ 43.894471] ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.901705] ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.908944] ================================================================== [ 45.477304] ================================================================== [ 45.484533] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 45.492726] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304 [ 45.500132] [ 45.501630] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 45.501638] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.501640] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 45.501643] Call Trace: [ 45.501645] <TASK> [ 45.501646] dump_stack_lvl+0x73/0xb0 [ 45.501650] print_report+0xd1/0x650 [ 45.501654] ? __virt_addr_valid+0x1db/0x2d0 [ 45.501658] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 45.501662] ? kasan_complete_mode_report_info+0x2a/0x200 [ 45.501686] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 45.501692] kasan_report+0x141/0x180 [ 45.501696] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 45.501702] kasan_check_range+0x10c/0x1c0 [ 45.501720] __kasan_check_write+0x18/0x20 [ 45.501723] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 45.501741] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 45.501746] ? __kmalloc_cache_noprof+0x189/0x420 [ 45.501750] ? trace_hardirqs_on+0x37/0xe0 [ 45.501754] ? kasan_bitops_generic+0x92/0x1c0 [ 45.501758] kasan_bitops_generic+0x116/0x1c0 [ 45.501761] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 45.501765] ? ktime_get_ts64+0x83/0x230 [ 45.501770] kunit_try_run_case+0x1a2/0x480 [ 45.501774] ? __pfx_kunit_try_run_case+0x10/0x10 [ 45.501778] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 45.501782] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 45.501787] ? __kthread_parkme+0x82/0x180 [ 45.501791] ? preempt_count_sub+0x50/0x80 [ 45.501795] ? __pfx_kunit_try_run_case+0x10/0x10 [ 45.501800] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 45.501803] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 45.501808] kthread+0x334/0x6f0 [ 45.501811] ? trace_preempt_on+0x20/0xc0 [ 45.501816] ? __pfx_kthread+0x10/0x10 [ 45.501820] ? _raw_spin_unlock_irq+0x47/0x80 [ 45.501824] ? calculate_sigpending+0x7b/0xa0 [ 45.501828] ? __pfx_kthread+0x10/0x10 [ 45.501832] ret_from_fork+0x3e/0x80 [ 45.501836] ? __pfx_kthread+0x10/0x10 [ 45.501840] ret_from_fork_asm+0x1a/0x30 [ 45.501845] </TASK> [ 45.501847] [ 45.692763] Allocated by task 304: [ 45.696171] kasan_save_stack+0x45/0x70 [ 45.700011] kasan_save_track+0x18/0x40 [ 45.703857] kasan_save_alloc_info+0x3b/0x50 [ 45.708130] __kasan_kmalloc+0xb7/0xc0 [ 45.711882] __kmalloc_cache_noprof+0x189/0x420 [ 45.716417] kasan_bitops_generic+0x92/0x1c0 [ 45.720703] kunit_try_run_case+0x1a2/0x480 [ 45.724935] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 45.730333] kthread+0x334/0x6f0 [ 45.733566] ret_from_fork+0x3e/0x80 [ 45.737145] ret_from_fork_asm+0x1a/0x30 [ 45.741072] [ 45.742570] The buggy address belongs to the object at ffff888104ed9160 [ 45.742570] which belongs to the cache kmalloc-16 of size 16 [ 45.754912] The buggy address is located 8 bytes inside of [ 45.754912] allocated 9-byte region [ffff888104ed9160, ffff888104ed9169) [ 45.767166] [ 45.768664] The buggy address belongs to the physical page: [ 45.774272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9 [ 45.782278] flags: 0x200000000000000(node=0|zone=2) [ 45.787157] page_type: f5(slab) [ 45.790306] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 45.798053] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.805789] page dumped because: kasan: bad access detected [ 45.811362] [ 45.812861] Memory state around the buggy address: [ 45.817654] ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc [ 45.824907] ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 45.832128] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 45.839345] ^ [ 45.845959] ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.853177] ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.860397] ================================================================== [ 44.306482] ================================================================== [ 44.313761] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 44.321934] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304 [ 44.329327] [ 44.330827] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 44.330835] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.330837] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 44.330840] Call Trace: [ 44.330841] <TASK> [ 44.330843] dump_stack_lvl+0x73/0xb0 [ 44.330847] print_report+0xd1/0x650 [ 44.330851] ? __virt_addr_valid+0x1db/0x2d0 [ 44.330854] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 44.330859] ? kasan_complete_mode_report_info+0x2a/0x200 [ 44.330863] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 44.330869] kasan_report+0x141/0x180 [ 44.330873] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 44.330879] kasan_check_range+0x10c/0x1c0 [ 44.330883] __kasan_check_write+0x18/0x20 [ 44.330887] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 44.330892] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 44.330897] ? __kmalloc_cache_noprof+0x189/0x420 [ 44.330901] ? trace_hardirqs_on+0x37/0xe0 [ 44.330905] ? kasan_bitops_generic+0x92/0x1c0 [ 44.330909] kasan_bitops_generic+0x116/0x1c0 [ 44.330912] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 44.330916] ? ktime_get_ts64+0x83/0x230 [ 44.330920] kunit_try_run_case+0x1a2/0x480 [ 44.330925] ? __pfx_kunit_try_run_case+0x10/0x10 [ 44.330929] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 44.330933] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 44.330938] ? __kthread_parkme+0x82/0x180 [ 44.330942] ? preempt_count_sub+0x50/0x80 [ 44.330946] ? __pfx_kunit_try_run_case+0x10/0x10 [ 44.330951] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 44.330955] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 44.330959] kthread+0x334/0x6f0 [ 44.330963] ? trace_preempt_on+0x20/0xc0 [ 44.330967] ? __pfx_kthread+0x10/0x10 [ 44.330971] ? _raw_spin_unlock_irq+0x47/0x80 [ 44.330975] ? calculate_sigpending+0x7b/0xa0 [ 44.330979] ? __pfx_kthread+0x10/0x10 [ 44.330983] ret_from_fork+0x3e/0x80 [ 44.330987] ? __pfx_kthread+0x10/0x10 [ 44.330991] ret_from_fork_asm+0x1a/0x30 [ 44.330997] </TASK> [ 44.330999] [ 44.521910] Allocated by task 304: [ 44.525315] kasan_save_stack+0x45/0x70 [ 44.529152] kasan_save_track+0x18/0x40 [ 44.532993] kasan_save_alloc_info+0x3b/0x50 [ 44.537267] __kasan_kmalloc+0xb7/0xc0 [ 44.541026] __kmalloc_cache_noprof+0x189/0x420 [ 44.545558] kasan_bitops_generic+0x92/0x1c0 [ 44.549832] kunit_try_run_case+0x1a2/0x480 [ 44.554019] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 44.559424] kthread+0x334/0x6f0 [ 44.562657] ret_from_fork+0x3e/0x80 [ 44.566273] ret_from_fork_asm+0x1a/0x30 [ 44.570205] [ 44.571703] The buggy address belongs to the object at ffff888104ed9160 [ 44.571703] which belongs to the cache kmalloc-16 of size 16 [ 44.584073] The buggy address is located 8 bytes inside of [ 44.584073] allocated 9-byte region [ffff888104ed9160, ffff888104ed9169) [ 44.596326] [ 44.597825] The buggy address belongs to the physical page: [ 44.603397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9 [ 44.611397] flags: 0x200000000000000(node=0|zone=2) [ 44.616274] page_type: f5(slab) [ 44.619423] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 44.627161] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.634898] page dumped because: kasan: bad access detected [ 44.640471] [ 44.641973] Memory state around the buggy address: [ 44.646765] ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc [ 44.653993] ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 44.661212] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 44.668429] ^ [ 44.675044] ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.682261] ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.689481] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 43.101816] ================================================================== [ 43.109056] BUG: KASAN: slab-use-after-free in strnlen+0x73/0x80 [ 43.115061] Read of size 1 at addr ffff888107fedd10 by task kunit_try_catch/302 [ 43.122368] [ 43.123867] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 43.123875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.123877] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 43.123880] Call Trace: [ 43.123882] <TASK> [ 43.123883] dump_stack_lvl+0x73/0xb0 [ 43.123887] print_report+0xd1/0x650 [ 43.123891] ? __virt_addr_valid+0x1db/0x2d0 [ 43.123894] ? strnlen+0x73/0x80 [ 43.123898] ? kasan_complete_mode_report_info+0x64/0x200 [ 43.123902] ? strnlen+0x73/0x80 [ 43.123905] kasan_report+0x141/0x180 [ 43.123909] ? strnlen+0x73/0x80 [ 43.123913] __asan_report_load1_noabort+0x18/0x20 [ 43.123917] strnlen+0x73/0x80 [ 43.123921] kasan_strings+0x615/0xe80 [ 43.123924] ? trace_hardirqs_on+0x37/0xe0 [ 43.123929] ? __pfx_kasan_strings+0x10/0x10 [ 43.123932] ? finish_task_switch.isra.0+0x153/0x700 [ 43.123937] ? __switch_to+0x5d9/0xf60 [ 43.123940] ? dequeue_task_fair+0x166/0x4e0 [ 43.123945] ? __schedule+0x10cc/0x2b30 [ 43.123949] ? ktime_get_ts64+0x83/0x230 [ 43.123954] kunit_try_run_case+0x1a2/0x480 [ 43.123958] ? __pfx_kunit_try_run_case+0x10/0x10 [ 43.123962] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 43.123966] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 43.123971] ? __kthread_parkme+0x82/0x180 [ 43.123975] ? preempt_count_sub+0x50/0x80 [ 43.123979] ? __pfx_kunit_try_run_case+0x10/0x10 [ 43.123984] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 43.123988] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 43.123992] kthread+0x334/0x6f0 [ 43.123996] ? trace_preempt_on+0x20/0xc0 [ 43.124000] ? __pfx_kthread+0x10/0x10 [ 43.124004] ? _raw_spin_unlock_irq+0x47/0x80 [ 43.124008] ? calculate_sigpending+0x7b/0xa0 [ 43.124012] ? __pfx_kthread+0x10/0x10 [ 43.124016] ret_from_fork+0x3e/0x80 [ 43.124020] ? __pfx_kthread+0x10/0x10 [ 43.124025] ret_from_fork_asm+0x1a/0x30 [ 43.124030] </TASK> [ 43.124032] [ 43.303197] Allocated by task 302: [ 43.306603] kasan_save_stack+0x45/0x70 [ 43.310443] kasan_save_track+0x18/0x40 [ 43.314281] kasan_save_alloc_info+0x3b/0x50 [ 43.318553] __kasan_kmalloc+0xb7/0xc0 [ 43.322309] __kmalloc_cache_noprof+0x189/0x420 [ 43.326839] kasan_strings+0xc0/0xe80 [ 43.330506] kunit_try_run_case+0x1a2/0x480 [ 43.334704] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 43.340125] kthread+0x334/0x6f0 [ 43.343359] ret_from_fork+0x3e/0x80 [ 43.346938] ret_from_fork_asm+0x1a/0x30 [ 43.350863] [ 43.352361] Freed by task 302: [ 43.355420] kasan_save_stack+0x45/0x70 [ 43.359260] kasan_save_track+0x18/0x40 [ 43.363098] kasan_save_free_info+0x3f/0x60 [ 43.367286] __kasan_slab_free+0x56/0x70 [ 43.371221] kfree+0x222/0x3f0 [ 43.374279] kasan_strings+0x2aa/0xe80 [ 43.378031] kunit_try_run_case+0x1a2/0x480 [ 43.382216] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 43.387615] kthread+0x334/0x6f0 [ 43.390848] ret_from_fork+0x3e/0x80 [ 43.394426] ret_from_fork_asm+0x1a/0x30 [ 43.398354] [ 43.399852] The buggy address belongs to the object at ffff888107fedd00 [ 43.399852] which belongs to the cache kmalloc-32 of size 32 [ 43.412193] The buggy address is located 16 bytes inside of [ 43.412193] freed 32-byte region [ffff888107fedd00, ffff888107fedd20) [ 43.424276] [ 43.425772] The buggy address belongs to the physical page: [ 43.431347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107fed [ 43.439355] flags: 0x200000000000000(node=0|zone=2) [ 43.444233] page_type: f5(slab) [ 43.447379] raw: 0200000000000000 ffff888100042780 dead000000000122 0000000000000000 [ 43.455120] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 43.462867] page dumped because: kasan: bad access detected [ 43.468439] [ 43.469935] Memory state around the buggy address: [ 43.474741] ffff888107fedc00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 43.481967] ffff888107fedc80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 43.489185] >ffff888107fedd00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 43.496402] ^ [ 43.500155] ffff888107fedd80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 43.507376] ffff888107fede00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 43.514595] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-strlen
[ 42.682353] ================================================================== [ 42.689591] BUG: KASAN: slab-use-after-free in strlen+0x8f/0xb0 [ 42.695509] Read of size 1 at addr ffff888107fedd10 by task kunit_try_catch/302 [ 42.702817] [ 42.704318] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 42.704325] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.704327] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 42.704330] Call Trace: [ 42.704332] <TASK> [ 42.704334] dump_stack_lvl+0x73/0xb0 [ 42.704337] print_report+0xd1/0x650 [ 42.704341] ? __virt_addr_valid+0x1db/0x2d0 [ 42.704345] ? strlen+0x8f/0xb0 [ 42.704348] ? kasan_complete_mode_report_info+0x64/0x200 [ 42.704352] ? strlen+0x8f/0xb0 [ 42.704355] kasan_report+0x141/0x180 [ 42.704360] ? strlen+0x8f/0xb0 [ 42.704364] __asan_report_load1_noabort+0x18/0x20 [ 42.704367] strlen+0x8f/0xb0 [ 42.704371] kasan_strings+0x57b/0xe80 [ 42.704374] ? trace_hardirqs_on+0x37/0xe0 [ 42.704379] ? __pfx_kasan_strings+0x10/0x10 [ 42.704383] ? finish_task_switch.isra.0+0x153/0x700 [ 42.704387] ? __switch_to+0x5d9/0xf60 [ 42.704391] ? dequeue_task_fair+0x166/0x4e0 [ 42.704395] ? __schedule+0x10cc/0x2b30 [ 42.704399] ? ktime_get_ts64+0x83/0x230 [ 42.704404] kunit_try_run_case+0x1a2/0x480 [ 42.704408] ? __pfx_kunit_try_run_case+0x10/0x10 [ 42.704412] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 42.704417] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 42.704422] ? __kthread_parkme+0x82/0x180 [ 42.704425] ? preempt_count_sub+0x50/0x80 [ 42.704430] ? __pfx_kunit_try_run_case+0x10/0x10 [ 42.704434] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 42.704438] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 42.704442] kthread+0x334/0x6f0 [ 42.704446] ? trace_preempt_on+0x20/0xc0 [ 42.704451] ? __pfx_kthread+0x10/0x10 [ 42.704455] ? _raw_spin_unlock_irq+0x47/0x80 [ 42.704459] ? calculate_sigpending+0x7b/0xa0 [ 42.704463] ? __pfx_kthread+0x10/0x10 [ 42.704467] ret_from_fork+0x3e/0x80 [ 42.704471] ? __pfx_kthread+0x10/0x10 [ 42.704476] ret_from_fork_asm+0x1a/0x30 [ 42.704481] </TASK> [ 42.704483] [ 42.883231] Allocated by task 302: [ 42.886636] kasan_save_stack+0x45/0x70 [ 42.890477] kasan_save_track+0x18/0x40 [ 42.894314] kasan_save_alloc_info+0x3b/0x50 [ 42.898588] __kasan_kmalloc+0xb7/0xc0 [ 42.902340] __kmalloc_cache_noprof+0x189/0x420 [ 42.906872] kasan_strings+0xc0/0xe80 [ 42.910539] kunit_try_run_case+0x1a2/0x480 [ 42.914737] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 42.920139] kthread+0x334/0x6f0 [ 42.923372] ret_from_fork+0x3e/0x80 [ 42.926952] ret_from_fork_asm+0x1a/0x30 [ 42.930879] [ 42.932379] Freed by task 302: [ 42.935436] kasan_save_stack+0x45/0x70 [ 42.939277] kasan_save_track+0x18/0x40 [ 42.943123] kasan_save_free_info+0x3f/0x60 [ 42.947309] __kasan_slab_free+0x56/0x70 [ 42.951235] kfree+0x222/0x3f0 [ 42.954294] kasan_strings+0x2aa/0xe80 [ 42.958047] kunit_try_run_case+0x1a2/0x480 [ 42.962231] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 42.967631] kthread+0x334/0x6f0 [ 42.970864] ret_from_fork+0x3e/0x80 [ 42.974443] ret_from_fork_asm+0x1a/0x30 [ 42.978370] [ 42.979869] The buggy address belongs to the object at ffff888107fedd00 [ 42.979869] which belongs to the cache kmalloc-32 of size 32 [ 42.992210] The buggy address is located 16 bytes inside of [ 42.992210] freed 32-byte region [ffff888107fedd00, ffff888107fedd20) [ 43.004289] [ 43.005788] The buggy address belongs to the physical page: [ 43.011360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107fed [ 43.019359] flags: 0x200000000000000(node=0|zone=2) [ 43.024240] page_type: f5(slab) [ 43.027388] raw: 0200000000000000 ffff888100042780 dead000000000122 0000000000000000 [ 43.035134] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 43.042873] page dumped because: kasan: bad access detected [ 43.048446] [ 43.049944] Memory state around the buggy address: [ 43.054741] ffff888107fedc00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 43.061965] ffff888107fedc80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 43.069184] >ffff888107fedd00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 43.076401] ^ [ 43.080155] ffff888107fedd80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 43.087374] ffff888107fede00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 43.094594] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 42.262351] ================================================================== [ 42.269589] BUG: KASAN: slab-use-after-free in kasan_strings+0xcbc/0xe80 [ 42.276289] Read of size 1 at addr ffff888107fedd10 by task kunit_try_catch/302 [ 42.283595] [ 42.285094] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 42.285102] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.285104] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 42.285107] Call Trace: [ 42.285108] <TASK> [ 42.285110] dump_stack_lvl+0x73/0xb0 [ 42.285114] print_report+0xd1/0x650 [ 42.285118] ? __virt_addr_valid+0x1db/0x2d0 [ 42.285122] ? kasan_strings+0xcbc/0xe80 [ 42.285126] ? kasan_complete_mode_report_info+0x64/0x200 [ 42.285130] ? kasan_strings+0xcbc/0xe80 [ 42.285134] kasan_report+0x141/0x180 [ 42.285138] ? kasan_strings+0xcbc/0xe80 [ 42.285143] __asan_report_load1_noabort+0x18/0x20 [ 42.285147] kasan_strings+0xcbc/0xe80 [ 42.285151] ? trace_hardirqs_on+0x37/0xe0 [ 42.285155] ? __pfx_kasan_strings+0x10/0x10 [ 42.285159] ? finish_task_switch.isra.0+0x153/0x700 [ 42.285163] ? __switch_to+0x5d9/0xf60 [ 42.285167] ? dequeue_task_fair+0x166/0x4e0 [ 42.285171] ? __schedule+0x10cc/0x2b30 [ 42.285176] ? ktime_get_ts64+0x83/0x230 [ 42.285180] kunit_try_run_case+0x1a2/0x480 [ 42.285185] ? __pfx_kunit_try_run_case+0x10/0x10 [ 42.285189] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 42.285194] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 42.285198] ? __kthread_parkme+0x82/0x180 [ 42.285202] ? preempt_count_sub+0x50/0x80 [ 42.285207] ? __pfx_kunit_try_run_case+0x10/0x10 [ 42.285211] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 42.285216] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 42.285220] kthread+0x334/0x6f0 [ 42.285224] ? trace_preempt_on+0x20/0xc0 [ 42.285228] ? __pfx_kthread+0x10/0x10 [ 42.285233] ? _raw_spin_unlock_irq+0x47/0x80 [ 42.285237] ? calculate_sigpending+0x7b/0xa0 [ 42.285241] ? __pfx_kthread+0x10/0x10 [ 42.285245] ret_from_fork+0x3e/0x80 [ 42.285249] ? __pfx_kthread+0x10/0x10 [ 42.285253] ret_from_fork_asm+0x1a/0x30 [ 42.285259] </TASK> [ 42.285261] [ 42.463489] Allocated by task 302: [ 42.466894] kasan_save_stack+0x45/0x70 [ 42.470746] kasan_save_track+0x18/0x40 [ 42.474581] kasan_save_alloc_info+0x3b/0x50 [ 42.478855] __kasan_kmalloc+0xb7/0xc0 [ 42.482607] __kmalloc_cache_noprof+0x189/0x420 [ 42.487141] kasan_strings+0xc0/0xe80 [ 42.490813] kunit_try_run_case+0x1a2/0x480 [ 42.494998] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 42.500399] kthread+0x334/0x6f0 [ 42.503631] ret_from_fork+0x3e/0x80 [ 42.507209] ret_from_fork_asm+0x1a/0x30 [ 42.511135] [ 42.512636] Freed by task 302: [ 42.515740] kasan_save_stack+0x45/0x70 [ 42.519613] kasan_save_track+0x18/0x40 [ 42.523452] kasan_save_free_info+0x3f/0x60 [ 42.527637] __kasan_slab_free+0x56/0x70 [ 42.531564] kfree+0x222/0x3f0 [ 42.534622] kasan_strings+0x2aa/0xe80 [ 42.538374] kunit_try_run_case+0x1a2/0x480 [ 42.542561] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 42.547958] kthread+0x334/0x6f0 [ 42.551193] ret_from_fork+0x3e/0x80 [ 42.554778] ret_from_fork_asm+0x1a/0x30 [ 42.558705] [ 42.560223] The buggy address belongs to the object at ffff888107fedd00 [ 42.560223] which belongs to the cache kmalloc-32 of size 32 [ 42.572562] The buggy address is located 16 bytes inside of [ 42.572562] freed 32-byte region [ffff888107fedd00, ffff888107fedd20) [ 42.584643] [ 42.586141] The buggy address belongs to the physical page: [ 42.591755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107fed [ 42.599791] flags: 0x200000000000000(node=0|zone=2) [ 42.604689] page_type: f5(slab) [ 42.607871] raw: 0200000000000000 ffff888100042780 dead000000000122 0000000000000000 [ 42.615617] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 42.623357] page dumped because: kasan: bad access detected [ 42.628929] [ 42.630428] Memory state around the buggy address: [ 42.635221] ffff888107fedc00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 42.642439] ffff888107fedc80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 42.649659] >ffff888107fedd00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 42.656910] ^ [ 42.660665] ffff888107fedd80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 42.667909] ffff888107fede00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 42.675129] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 41.825909] ================================================================== [ 41.849813] BUG: KASAN: slab-use-after-free in strcmp+0xb0/0xc0 [ 41.855736] Read of size 1 at addr ffff888107fedd10 by task kunit_try_catch/302 [ 41.863047] [ 41.864547] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 41.864556] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.864558] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 41.864561] Call Trace: [ 41.864563] <TASK> [ 41.864565] dump_stack_lvl+0x73/0xb0 [ 41.864569] print_report+0xd1/0x650 [ 41.864574] ? __virt_addr_valid+0x1db/0x2d0 [ 41.864578] ? strcmp+0xb0/0xc0 [ 41.864581] ? kasan_complete_mode_report_info+0x64/0x200 [ 41.864585] ? strcmp+0xb0/0xc0 [ 41.864588] kasan_report+0x141/0x180 [ 41.864592] ? strcmp+0xb0/0xc0 [ 41.864597] __asan_report_load1_noabort+0x18/0x20 [ 41.864600] strcmp+0xb0/0xc0 [ 41.864604] kasan_strings+0x431/0xe80 [ 41.864608] ? trace_hardirqs_on+0x37/0xe0 [ 41.864612] ? __pfx_kasan_strings+0x10/0x10 [ 41.864616] ? finish_task_switch.isra.0+0x153/0x700 [ 41.864620] ? __switch_to+0x5d9/0xf60 [ 41.864624] ? dequeue_task_fair+0x166/0x4e0 [ 41.864629] ? __schedule+0x10cc/0x2b30 [ 41.864633] ? ktime_get_ts64+0x83/0x230 [ 41.864638] kunit_try_run_case+0x1a2/0x480 [ 41.864642] ? __pfx_kunit_try_run_case+0x10/0x10 [ 41.864646] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 41.864651] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 41.864655] ? __kthread_parkme+0x82/0x180 [ 41.864659] ? preempt_count_sub+0x50/0x80 [ 41.864664] ? __pfx_kunit_try_run_case+0x10/0x10 [ 41.864685] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 41.864690] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 41.864694] kthread+0x334/0x6f0 [ 41.864698] ? trace_preempt_on+0x20/0xc0 [ 41.864702] ? __pfx_kthread+0x10/0x10 [ 41.864719] ? _raw_spin_unlock_irq+0x47/0x80 [ 41.864723] ? calculate_sigpending+0x7b/0xa0 [ 41.864727] ? __pfx_kthread+0x10/0x10 [ 41.864731] ret_from_fork+0x3e/0x80 [ 41.864735] ? __pfx_kthread+0x10/0x10 [ 41.864739] ret_from_fork_asm+0x1a/0x30 [ 41.864745] </TASK> [ 41.864747] [ 42.043460] Allocated by task 302: [ 42.046867] kasan_save_stack+0x45/0x70 [ 42.050745] kasan_save_track+0x18/0x40 [ 42.054596] kasan_save_alloc_info+0x3b/0x50 [ 42.058871] __kasan_kmalloc+0xb7/0xc0 [ 42.062622] __kmalloc_cache_noprof+0x189/0x420 [ 42.067153] kasan_strings+0xc0/0xe80 [ 42.070820] kunit_try_run_case+0x1a2/0x480 [ 42.075005] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 42.080404] kthread+0x334/0x6f0 [ 42.083637] ret_from_fork+0x3e/0x80 [ 42.087216] ret_from_fork_asm+0x1a/0x30 [ 42.091143] [ 42.092642] Freed by task 302: [ 42.095702] kasan_save_stack+0x45/0x70 [ 42.099567] kasan_save_track+0x18/0x40 [ 42.103406] kasan_save_free_info+0x3f/0x60 [ 42.107590] __kasan_slab_free+0x56/0x70 [ 42.111519] kfree+0x222/0x3f0 [ 42.114575] kasan_strings+0x2aa/0xe80 [ 42.118329] kunit_try_run_case+0x1a2/0x480 [ 42.122515] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 42.127913] kthread+0x334/0x6f0 [ 42.131147] ret_from_fork+0x3e/0x80 [ 42.134758] ret_from_fork_asm+0x1a/0x30 [ 42.138757] [ 42.140279] The buggy address belongs to the object at ffff888107fedd00 [ 42.140279] which belongs to the cache kmalloc-32 of size 32 [ 42.152612] The buggy address is located 16 bytes inside of [ 42.152612] freed 32-byte region [ffff888107fedd00, ffff888107fedd20) [ 42.164704] [ 42.166220] The buggy address belongs to the physical page: [ 42.171791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107fed [ 42.179797] flags: 0x200000000000000(node=0|zone=2) [ 42.184703] page_type: f5(slab) [ 42.187876] raw: 0200000000000000 ffff888100042780 dead000000000122 0000000000000000 [ 42.195616] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 42.203352] page dumped because: kasan: bad access detected [ 42.208926] [ 42.210425] Memory state around the buggy address: [ 42.215218] ffff888107fedc00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 42.222438] ffff888107fedc80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 42.229665] >ffff888107fedd00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 42.236910] ^ [ 42.240662] ffff888107fedd80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 42.247907] ffff888107fede00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 42.255126] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 41.413347] ================================================================== [ 41.424326] BUG: KASAN: slab-out-of-bounds in memcmp+0x1b4/0x1d0 [ 41.430341] Read of size 1 at addr ffff888107fedc18 by task kunit_try_catch/300 [ 41.437653] [ 41.439154] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 41.439163] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.439165] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 41.439168] Call Trace: [ 41.439170] <TASK> [ 41.439171] dump_stack_lvl+0x73/0xb0 [ 41.439175] print_report+0xd1/0x650 [ 41.439180] ? __virt_addr_valid+0x1db/0x2d0 [ 41.439184] ? memcmp+0x1b4/0x1d0 [ 41.439187] ? kasan_complete_mode_report_info+0x2a/0x200 [ 41.439191] ? memcmp+0x1b4/0x1d0 [ 41.439195] kasan_report+0x141/0x180 [ 41.439199] ? memcmp+0x1b4/0x1d0 [ 41.439203] __asan_report_load1_noabort+0x18/0x20 [ 41.439207] memcmp+0x1b4/0x1d0 [ 41.439211] kasan_memcmp+0x18f/0x390 [ 41.439214] ? trace_hardirqs_on+0x37/0xe0 [ 41.439219] ? __pfx_kasan_memcmp+0x10/0x10 [ 41.439223] ? finish_task_switch.isra.0+0x153/0x700 [ 41.439227] ? __switch_to+0x5d9/0xf60 [ 41.439231] ? dequeue_task_fair+0x166/0x4e0 [ 41.439236] ? ktime_get_ts64+0x83/0x230 [ 41.439241] kunit_try_run_case+0x1a2/0x480 [ 41.439245] ? __pfx_kunit_try_run_case+0x10/0x10 [ 41.439249] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 41.439254] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 41.439259] ? __kthread_parkme+0x82/0x180 [ 41.439263] ? preempt_count_sub+0x50/0x80 [ 41.439267] ? __pfx_kunit_try_run_case+0x10/0x10 [ 41.439272] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 41.439276] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 41.439280] kthread+0x334/0x6f0 [ 41.439284] ? trace_preempt_on+0x20/0xc0 [ 41.439288] ? __pfx_kthread+0x10/0x10 [ 41.439293] ? _raw_spin_unlock_irq+0x47/0x80 [ 41.439297] ? calculate_sigpending+0x7b/0xa0 [ 41.439301] ? __pfx_kthread+0x10/0x10 [ 41.439305] ret_from_fork+0x3e/0x80 [ 41.439309] ? __pfx_kthread+0x10/0x10 [ 41.439313] ret_from_fork_asm+0x1a/0x30 [ 41.439319] </TASK> [ 41.439321] [ 41.614739] Allocated by task 300: [ 41.618147] kasan_save_stack+0x45/0x70 [ 41.621985] kasan_save_track+0x18/0x40 [ 41.625826] kasan_save_alloc_info+0x3b/0x50 [ 41.630096] __kasan_kmalloc+0xb7/0xc0 [ 41.633850] __kmalloc_cache_noprof+0x189/0x420 [ 41.638382] kasan_memcmp+0xb7/0x390 [ 41.641961] kunit_try_run_case+0x1a2/0x480 [ 41.646147] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 41.651546] kthread+0x334/0x6f0 [ 41.654778] ret_from_fork+0x3e/0x80 [ 41.658359] ret_from_fork_asm+0x1a/0x30 [ 41.662285] [ 41.663783] The buggy address belongs to the object at ffff888107fedc00 [ 41.663783] which belongs to the cache kmalloc-32 of size 32 [ 41.676125] The buggy address is located 0 bytes to the right of [ 41.676125] allocated 24-byte region [ffff888107fedc00, ffff888107fedc18) [ 41.688994] [ 41.690494] The buggy address belongs to the physical page: [ 41.696066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107fed [ 41.704072] flags: 0x200000000000000(node=0|zone=2) [ 41.708952] page_type: f5(slab) [ 41.712098] raw: 0200000000000000 ffff888100042780 dead000000000122 0000000000000000 [ 41.719837] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 41.727577] page dumped because: kasan: bad access detected [ 41.733147] [ 41.734640] Memory state around the buggy address: [ 41.739431] ffff888107fedb00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 41.746649] ffff888107fedb80: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 41.753870] >ffff888107fedc00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.761088] ^ [ 41.765100] ffff888107fedc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.772321] ffff888107fedd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.779548] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 41.082091] ================================================================== [ 41.093499] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x329/0x390 [ 41.101075] Read of size 1 at addr ffff88810527fc4a by task kunit_try_catch/296 [ 41.108390] [ 41.109888] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 41.109896] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.109898] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 41.109902] Call Trace: [ 41.109904] <TASK> [ 41.109905] dump_stack_lvl+0x73/0xb0 [ 41.109909] print_report+0xd1/0x650 [ 41.109914] ? __virt_addr_valid+0x1db/0x2d0 [ 41.109918] ? kasan_alloca_oob_right+0x329/0x390 [ 41.109922] ? kasan_addr_to_slab+0x11/0xa0 [ 41.109926] ? kasan_alloca_oob_right+0x329/0x390 [ 41.109931] kasan_report+0x141/0x180 [ 41.109935] ? kasan_alloca_oob_right+0x329/0x390 [ 41.109940] __asan_report_load1_noabort+0x18/0x20 [ 41.109944] kasan_alloca_oob_right+0x329/0x390 [ 41.109949] ? finish_task_switch.isra.0+0x153/0x700 [ 41.109953] ? rwsem_down_read_slowpath+0x64e/0xb90 [ 41.109957] ? trace_hardirqs_on+0x37/0xe0 [ 41.109962] ? __pfx_kasan_alloca_oob_right+0x10/0x10 [ 41.109967] ? __schedule+0x10cc/0x2b30 [ 41.109972] ? ktime_get_ts64+0x83/0x230 [ 41.109976] kunit_try_run_case+0x1a2/0x480 [ 41.109981] ? __pfx_kunit_try_run_case+0x10/0x10 [ 41.109985] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 41.109990] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 41.109994] ? __kthread_parkme+0x82/0x180 [ 41.109999] ? preempt_count_sub+0x50/0x80 [ 41.110003] ? __pfx_kunit_try_run_case+0x10/0x10 [ 41.110008] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 41.110012] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 41.110016] kthread+0x334/0x6f0 [ 41.110020] ? trace_preempt_on+0x20/0xc0 [ 41.110025] ? __pfx_kthread+0x10/0x10 [ 41.110029] ? _raw_spin_unlock_irq+0x47/0x80 [ 41.110033] ? calculate_sigpending+0x7b/0xa0 [ 41.110037] ? __pfx_kthread+0x10/0x10 [ 41.110041] ret_from_fork+0x3e/0x80 [ 41.110046] ? __pfx_kthread+0x10/0x10 [ 41.110050] ret_from_fork_asm+0x1a/0x30 [ 41.110056] </TASK> [ 41.110057] [ 41.287781] The buggy address belongs to stack of task kunit_try_catch/296 [ 41.294654] [ 41.296150] The buggy address belongs to the physical page: [ 41.301736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10527f [ 41.309743] flags: 0x200000000000000(node=0|zone=2) [ 41.314630] raw: 0200000000000000 dead000000000100 dead000000000122 0000000000000000 [ 41.322376] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 41.330114] page dumped because: kasan: bad access detected [ 41.335704] [ 41.337222] Memory state around the buggy address: [ 41.342013] ffff88810527fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.349232] ffff88810527fb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.356452] >ffff88810527fc00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 41.363686] ^ [ 41.369288] ffff88810527fc80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00 [ 41.376515] ffff88810527fd00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 41.383741] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 40.774577] ================================================================== [ 40.785458] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x320/0x380 [ 40.792944] Read of size 1 at addr ffff888107f5fc3f by task kunit_try_catch/294 [ 40.800251] [ 40.801751] CPU: 2 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 40.801760] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.801762] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 40.801765] Call Trace: [ 40.801767] <TASK> [ 40.801769] dump_stack_lvl+0x73/0xb0 [ 40.801773] print_report+0xd1/0x650 [ 40.801777] ? __virt_addr_valid+0x1db/0x2d0 [ 40.801781] ? kasan_alloca_oob_left+0x320/0x380 [ 40.801785] ? kasan_addr_to_slab+0x11/0xa0 [ 40.801789] ? kasan_alloca_oob_left+0x320/0x380 [ 40.801794] kasan_report+0x141/0x180 [ 40.801798] ? kasan_alloca_oob_left+0x320/0x380 [ 40.801803] __asan_report_load1_noabort+0x18/0x20 [ 40.801807] kasan_alloca_oob_left+0x320/0x380 [ 40.801811] ? finish_task_switch.isra.0+0x153/0x700 [ 40.801816] ? rwsem_down_read_slowpath+0x64e/0xb90 [ 40.801820] ? trace_hardirqs_on+0x37/0xe0 [ 40.801824] ? __pfx_kasan_alloca_oob_left+0x10/0x10 [ 40.801829] ? __schedule+0x10cc/0x2b30 [ 40.801834] ? ktime_get_ts64+0x83/0x230 [ 40.801838] kunit_try_run_case+0x1a2/0x480 [ 40.801843] ? __pfx_kunit_try_run_case+0x10/0x10 [ 40.801847] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 40.801851] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 40.801856] ? __kthread_parkme+0x82/0x180 [ 40.801860] ? preempt_count_sub+0x50/0x80 [ 40.801864] ? __pfx_kunit_try_run_case+0x10/0x10 [ 40.801869] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 40.801873] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 40.801877] kthread+0x334/0x6f0 [ 40.801881] ? trace_preempt_on+0x20/0xc0 [ 40.801885] ? __pfx_kthread+0x10/0x10 [ 40.801889] ? _raw_spin_unlock_irq+0x47/0x80 [ 40.801894] ? calculate_sigpending+0x7b/0xa0 [ 40.801897] ? __pfx_kthread+0x10/0x10 [ 40.801902] ret_from_fork+0x3e/0x80 [ 40.801906] ? __pfx_kthread+0x10/0x10 [ 40.801910] ret_from_fork_asm+0x1a/0x30 [ 40.801916] </TASK> [ 40.801917] [ 40.979105] The buggy address belongs to stack of task kunit_try_catch/294 [ 40.985980] [ 40.987476] The buggy address belongs to the physical page: [ 40.993049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f5f [ 41.001055] flags: 0x200000000000000(node=0|zone=2) [ 41.005938] raw: 0200000000000000 ffffea00041fd7c8 ffffea00041fd7c8 0000000000000000 [ 41.013718] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 41.021465] page dumped because: kasan: bad access detected [ 41.027040] [ 41.028536] Memory state around the buggy address: [ 41.033330] ffff888107f5fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.040549] ffff888107f5fb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.047769] >ffff888107f5fc00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 41.054996] ^ [ 41.060048] ffff888107f5fc80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00 [ 41.067269] ffff888107f5fd00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 41.074496] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 40.441515] ================================================================== [ 40.456565] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x2b5/0x300 [ 40.463444] Read of size 1 at addr ffff888107fcfd02 by task kunit_try_catch/292 [ 40.470750] [ 40.472250] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 40.472259] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.472261] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 40.472265] Call Trace: [ 40.472266] <TASK> [ 40.472268] dump_stack_lvl+0x73/0xb0 [ 40.472272] print_report+0xd1/0x650 [ 40.472277] ? __virt_addr_valid+0x1db/0x2d0 [ 40.472281] ? kasan_stack_oob+0x2b5/0x300 [ 40.472284] ? kasan_addr_to_slab+0x11/0xa0 [ 40.472288] ? kasan_stack_oob+0x2b5/0x300 [ 40.472292] kasan_report+0x141/0x180 [ 40.472296] ? kasan_stack_oob+0x2b5/0x300 [ 40.472301] __asan_report_load1_noabort+0x18/0x20 [ 40.472304] kasan_stack_oob+0x2b5/0x300 [ 40.472308] ? __pfx_kasan_stack_oob+0x10/0x10 [ 40.472312] ? finish_task_switch.isra.0+0x153/0x700 [ 40.472316] ? __switch_to+0x5d9/0xf60 [ 40.472321] ? dequeue_task_fair+0x166/0x4e0 [ 40.472325] ? __schedule+0x10cc/0x2b30 [ 40.472329] ? ktime_get_ts64+0x83/0x230 [ 40.472334] kunit_try_run_case+0x1a2/0x480 [ 40.472339] ? __pfx_kunit_try_run_case+0x10/0x10 [ 40.472343] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 40.472347] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 40.472352] ? __kthread_parkme+0x82/0x180 [ 40.472356] ? preempt_count_sub+0x50/0x80 [ 40.472360] ? __pfx_kunit_try_run_case+0x10/0x10 [ 40.472365] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 40.472369] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 40.472373] kthread+0x334/0x6f0 [ 40.472377] ? trace_preempt_on+0x20/0xc0 [ 40.472382] ? __pfx_kthread+0x10/0x10 [ 40.472386] ? _raw_spin_unlock_irq+0x47/0x80 [ 40.472390] ? calculate_sigpending+0x7b/0xa0 [ 40.472394] ? __pfx_kthread+0x10/0x10 [ 40.472398] ret_from_fork+0x3e/0x80 [ 40.472402] ? __pfx_kthread+0x10/0x10 [ 40.472406] ret_from_fork_asm+0x1a/0x30 [ 40.472412] </TASK> [ 40.472413] [ 40.646085] The buggy address belongs to stack of task kunit_try_catch/292 [ 40.652958] and is located at offset 138 in frame: [ 40.657839] kasan_stack_oob+0x0/0x300 [ 40.661591] [ 40.663089] This frame has 4 objects: [ 40.666754] [48, 49) '__assertion' [ 40.666758] [64, 72) 'array' [ 40.670248] [96, 112) '__assertion' [ 40.673222] [128, 138) 'stack_array' [ 40.676799] [ 40.681957] The buggy address belongs to the physical page: [ 40.687530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107fcf [ 40.695536] flags: 0x200000000000000(node=0|zone=2) [ 40.700417] raw: 0200000000000000 dead000000000100 dead000000000122 0000000000000000 [ 40.708163] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 40.715901] page dumped because: kasan: bad access detected [ 40.721473] [ 40.722964] Memory state around the buggy address: [ 40.727758] ffff888107fcfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 40.734977] ffff888107fcfc80: f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00 [ 40.742197] >ffff888107fcfd00: 02 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 40.749415] ^ [ 40.752649] ffff888107fcfd80: f1 f1 f1 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00 [ 40.759866] ffff888107fcfe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.767085] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 40.140390] ================================================================== [ 40.152934] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0 [ 40.160507] Read of size 1 at addr ffffffffbb49a28d by task kunit_try_catch/288 [ 40.167812] [ 40.169315] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 40.169322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.169325] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 40.169328] Call Trace: [ 40.169329] <TASK> [ 40.169331] dump_stack_lvl+0x73/0xb0 [ 40.169335] print_report+0xd1/0x650 [ 40.169339] ? __virt_addr_valid+0x1db/0x2d0 [ 40.169343] ? kasan_global_oob_right+0x286/0x2d0 [ 40.169347] ? kasan_addr_to_slab+0x11/0xa0 [ 40.169351] ? kasan_global_oob_right+0x286/0x2d0 [ 40.169355] kasan_report+0x141/0x180 [ 40.169359] ? kasan_global_oob_right+0x286/0x2d0 [ 40.169364] __asan_report_load1_noabort+0x18/0x20 [ 40.169368] kasan_global_oob_right+0x286/0x2d0 [ 40.169372] ? __pfx_kasan_global_oob_right+0x10/0x10 [ 40.169376] ? __schedule+0x10cc/0x2b30 [ 40.169381] ? ktime_get_ts64+0x83/0x230 [ 40.169386] kunit_try_run_case+0x1a2/0x480 [ 40.169390] ? __pfx_kunit_try_run_case+0x10/0x10 [ 40.169394] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 40.169399] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 40.169403] ? __kthread_parkme+0x82/0x180 [ 40.169408] ? preempt_count_sub+0x50/0x80 [ 40.169412] ? __pfx_kunit_try_run_case+0x10/0x10 [ 40.169416] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 40.169421] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 40.169425] kthread+0x334/0x6f0 [ 40.169429] ? trace_preempt_on+0x20/0xc0 [ 40.169433] ? __pfx_kthread+0x10/0x10 [ 40.169437] ? _raw_spin_unlock_irq+0x47/0x80 [ 40.169441] ? calculate_sigpending+0x7b/0xa0 [ 40.169445] ? __pfx_kthread+0x10/0x10 [ 40.169449] ret_from_fork+0x3e/0x80 [ 40.169453] ? __pfx_kthread+0x10/0x10 [ 40.169458] ret_from_fork_asm+0x1a/0x30 [ 40.169463] </TASK> [ 40.169465] [ 40.333218] The buggy address belongs to the variable: [ 40.338357] global_array+0xd/0x40 [ 40.341772] [ 40.343269] The buggy address belongs to the physical page: [ 40.348842] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x24089a [ 40.356842] flags: 0x200000000002000(reserved|node=0|zone=2) [ 40.362510] raw: 0200000000002000 ffffea0009022688 ffffea0009022688 0000000000000000 [ 40.370256] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 40.377995] page dumped because: kasan: bad access detected [ 40.383567] [ 40.385066] Memory state around the buggy address: [ 40.389858] ffffffffbb49a180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.397080] ffffffffbb49a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.404305] >ffffffffbb49a280: 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 40.411526] ^ [ 40.415018] ffffffffbb49a300: 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 [ 40.422238] ffffffffbb49a380: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 40.429455] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 39.345978] ================================================================== [ 39.358176] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 39.366183] Free of addr ffff888107f05a01 by task kunit_try_catch/284 [ 39.372622] [ 39.374122] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 39.374130] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.374132] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 39.374136] Call Trace: [ 39.374137] <TASK> [ 39.374139] dump_stack_lvl+0x73/0xb0 [ 39.374143] print_report+0xd1/0x650 [ 39.374147] ? __virt_addr_valid+0x1db/0x2d0 [ 39.374151] ? kasan_complete_mode_report_info+0x2a/0x200 [ 39.374155] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 39.374160] kasan_report_invalid_free+0x10a/0x130 [ 39.374165] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 39.374171] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 39.374175] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 39.374180] check_slab_allocation+0x11f/0x130 [ 39.374184] __kasan_mempool_poison_object+0x91/0x1d0 [ 39.374189] mempool_free+0x2ec/0x380 [ 39.374193] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 39.374198] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 39.374203] ? dequeue_entities+0xa24/0x1790 [ 39.374207] ? finish_task_switch.isra.0+0x153/0x700 [ 39.374212] mempool_kmalloc_invalid_free+0xed/0x140 [ 39.374217] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [ 39.374222] ? dequeue_task_fair+0x166/0x4e0 [ 39.374226] ? __pfx_mempool_kmalloc+0x10/0x10 [ 39.374229] ? __pfx_mempool_kfree+0x10/0x10 [ 39.374233] ? ktime_get_ts64+0x83/0x230 [ 39.374238] kunit_try_run_case+0x1a2/0x480 [ 39.374242] ? __pfx_kunit_try_run_case+0x10/0x10 [ 39.374246] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 39.374251] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 39.374255] ? __kthread_parkme+0x82/0x180 [ 39.374259] ? preempt_count_sub+0x50/0x80 [ 39.374264] ? __pfx_kunit_try_run_case+0x10/0x10 [ 39.374268] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 39.374272] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 39.374276] kthread+0x334/0x6f0 [ 39.374280] ? trace_preempt_on+0x20/0xc0 [ 39.374284] ? __pfx_kthread+0x10/0x10 [ 39.374289] ? _raw_spin_unlock_irq+0x47/0x80 [ 39.374293] ? calculate_sigpending+0x7b/0xa0 [ 39.374296] ? __pfx_kthread+0x10/0x10 [ 39.374301] ret_from_fork+0x3e/0x80 [ 39.374305] ? __pfx_kthread+0x10/0x10 [ 39.374309] ret_from_fork_asm+0x1a/0x30 [ 39.374315] </TASK> [ 39.374316] [ 39.589139] Allocated by task 284: [ 39.592546] kasan_save_stack+0x45/0x70 [ 39.596384] kasan_save_track+0x18/0x40 [ 39.600224] kasan_save_alloc_info+0x3b/0x50 [ 39.604498] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 39.609818] remove_element+0x11e/0x190 [ 39.613656] mempool_alloc_preallocated+0x4d/0x90 [ 39.618388] mempool_kmalloc_invalid_free_helper+0x83/0x2e0 [ 39.623962] mempool_kmalloc_invalid_free+0xed/0x140 [ 39.628937] kunit_try_run_case+0x1a2/0x480 [ 39.633130] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 39.638528] kthread+0x334/0x6f0 [ 39.641760] ret_from_fork+0x3e/0x80 [ 39.645339] ret_from_fork_asm+0x1a/0x30 [ 39.649265] [ 39.650765] The buggy address belongs to the object at ffff888107f05a00 [ 39.650765] which belongs to the cache kmalloc-128 of size 128 [ 39.663272] The buggy address is located 1 bytes inside of [ 39.663272] 128-byte region [ffff888107f05a00, ffff888107f05a80) [ 39.674833] [ 39.676330] The buggy address belongs to the physical page: [ 39.681904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f05 [ 39.689903] flags: 0x200000000000000(node=0|zone=2) [ 39.694781] page_type: f5(slab) [ 39.697928] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 39.705691] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 39.713457] page dumped because: kasan: bad access detected [ 39.719032] [ 39.720531] Memory state around the buggy address: [ 39.725322] ffff888107f05900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 39.732542] ffff888107f05980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.739760] >ffff888107f05a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.746978] ^ [ 39.750212] ffff888107f05a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.757430] ffff888107f05b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.764651] ================================================================== [ 39.772216] ================================================================== [ 39.784226] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 39.792234] Free of addr ffff888105238001 by task kunit_try_catch/286 [ 39.798687] [ 39.800207] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 39.800215] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.800217] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 39.800220] Call Trace: [ 39.800222] <TASK> [ 39.800224] dump_stack_lvl+0x73/0xb0 [ 39.800227] print_report+0xd1/0x650 [ 39.800231] ? __virt_addr_valid+0x1db/0x2d0 [ 39.800235] ? kasan_addr_to_slab+0x11/0xa0 [ 39.800239] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 39.800244] kasan_report_invalid_free+0x10a/0x130 [ 39.800249] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 39.800254] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 39.800259] __kasan_mempool_poison_object+0x102/0x1d0 [ 39.800264] mempool_free+0x2ec/0x380 [ 39.800268] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 39.800273] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 39.800278] ? dequeue_entities+0xa24/0x1790 [ 39.800282] ? finish_task_switch.isra.0+0x153/0x700 [ 39.800287] mempool_kmalloc_large_invalid_free+0xed/0x140 [ 39.800292] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 [ 39.800297] ? dequeue_task_fair+0x166/0x4e0 [ 39.800301] ? __pfx_mempool_kmalloc+0x10/0x10 [ 39.800304] ? __pfx_mempool_kfree+0x10/0x10 [ 39.800308] ? ktime_get_ts64+0x83/0x230 [ 39.800313] kunit_try_run_case+0x1a2/0x480 [ 39.800318] ? __pfx_kunit_try_run_case+0x10/0x10 [ 39.800322] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 39.800326] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 39.800331] ? __kthread_parkme+0x82/0x180 [ 39.800335] ? preempt_count_sub+0x50/0x80 [ 39.800339] ? __pfx_kunit_try_run_case+0x10/0x10 [ 39.800344] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 39.800348] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 39.800352] kthread+0x334/0x6f0 [ 39.800356] ? trace_preempt_on+0x20/0xc0 [ 39.800360] ? __pfx_kthread+0x10/0x10 [ 39.800364] ? _raw_spin_unlock_irq+0x47/0x80 [ 39.800368] ? calculate_sigpending+0x7b/0xa0 [ 39.800372] ? __pfx_kthread+0x10/0x10 [ 39.800376] ret_from_fork+0x3e/0x80 [ 39.800380] ? __pfx_kthread+0x10/0x10 [ 39.800385] ret_from_fork_asm+0x1a/0x30 [ 39.800390] </TASK> [ 39.800392] [ 40.004885] The buggy address belongs to the physical page: [ 40.010460] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105238 [ 40.018467] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 40.026119] flags: 0x200000000000040(head|node=0|zone=2) [ 40.031433] page_type: f8(unknown) [ 40.034837] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 40.042579] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 40.050325] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 40.058151] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 40.065978] head: 0200000000000002 ffffea0004148e01 00000000ffffffff 00000000ffffffff [ 40.073810] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 40.081635] page dumped because: kasan: bad access detected [ 40.087207] [ 40.088707] Memory state around the buggy address: [ 40.093499] ffff888105237f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.100720] ffff888105237f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.107965] >ffff888105238000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.115192] ^ [ 40.118423] ffff888105238080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.125644] ffff888105238100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.132887] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 38.187291] ================================================================== [ 38.198794] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 38.205934] Free of addr ffff888107f05600 by task kunit_try_catch/278 [ 38.212374] [ 38.213874] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 38.213882] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.213884] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 38.213887] Call Trace: [ 38.213889] <TASK> [ 38.213891] dump_stack_lvl+0x73/0xb0 [ 38.213895] print_report+0xd1/0x650 [ 38.213899] ? __virt_addr_valid+0x1db/0x2d0 [ 38.213903] ? kasan_complete_mode_report_info+0x64/0x200 [ 38.213907] ? mempool_double_free_helper+0x184/0x370 [ 38.213912] kasan_report_invalid_free+0x10a/0x130 [ 38.213917] ? mempool_double_free_helper+0x184/0x370 [ 38.213922] ? mempool_double_free_helper+0x184/0x370 [ 38.213927] ? mempool_double_free_helper+0x184/0x370 [ 38.213931] check_slab_allocation+0x101/0x130 [ 38.213935] __kasan_mempool_poison_object+0x91/0x1d0 [ 38.213940] mempool_free+0x2ec/0x380 [ 38.213944] mempool_double_free_helper+0x184/0x370 [ 38.213948] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 38.213953] ? dequeue_entities+0xa24/0x1790 [ 38.213958] ? finish_task_switch.isra.0+0x153/0x700 [ 38.213963] mempool_kmalloc_double_free+0xed/0x140 [ 38.213967] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 38.213972] ? dequeue_task_fair+0x166/0x4e0 [ 38.213976] ? __pfx_mempool_kmalloc+0x10/0x10 [ 38.213979] ? __pfx_mempool_kfree+0x10/0x10 [ 38.213983] ? ktime_get_ts64+0x83/0x230 [ 38.213988] kunit_try_run_case+0x1a2/0x480 [ 38.213992] ? __pfx_kunit_try_run_case+0x10/0x10 [ 38.213997] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 38.214001] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 38.214006] ? __kthread_parkme+0x82/0x180 [ 38.214010] ? preempt_count_sub+0x50/0x80 [ 38.214014] ? __pfx_kunit_try_run_case+0x10/0x10 [ 38.214019] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 38.214023] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 38.214027] kthread+0x334/0x6f0 [ 38.214031] ? trace_preempt_on+0x20/0xc0 [ 38.214035] ? __pfx_kthread+0x10/0x10 [ 38.214039] ? _raw_spin_unlock_irq+0x47/0x80 [ 38.214044] ? calculate_sigpending+0x7b/0xa0 [ 38.214047] ? __pfx_kthread+0x10/0x10 [ 38.214052] ret_from_fork+0x3e/0x80 [ 38.214056] ? __pfx_kthread+0x10/0x10 [ 38.214060] ret_from_fork_asm+0x1a/0x30 [ 38.214066] </TASK> [ 38.214067] [ 38.424029] Allocated by task 278: [ 38.427435] kasan_save_stack+0x45/0x70 [ 38.431275] kasan_save_track+0x18/0x40 [ 38.435112] kasan_save_alloc_info+0x3b/0x50 [ 38.439388] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 38.444708] remove_element+0x11e/0x190 [ 38.448563] mempool_alloc_preallocated+0x4d/0x90 [ 38.453269] mempool_double_free_helper+0x8a/0x370 [ 38.458062] mempool_kmalloc_double_free+0xed/0x140 [ 38.462940] kunit_try_run_case+0x1a2/0x480 [ 38.467129] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 38.472525] kthread+0x334/0x6f0 [ 38.475767] ret_from_fork+0x3e/0x80 [ 38.479346] ret_from_fork_asm+0x1a/0x30 [ 38.483271] [ 38.484766] Freed by task 278: [ 38.487829] kasan_save_stack+0x45/0x70 [ 38.491700] kasan_save_track+0x18/0x40 [ 38.495596] kasan_save_free_info+0x3f/0x60 [ 38.499782] __kasan_mempool_poison_object+0x131/0x1d0 [ 38.504930] mempool_free+0x2ec/0x380 [ 38.508594] mempool_double_free_helper+0x109/0x370 [ 38.513474] mempool_kmalloc_double_free+0xed/0x140 [ 38.518352] kunit_try_run_case+0x1a2/0x480 [ 38.522538] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 38.527939] kthread+0x334/0x6f0 [ 38.531178] ret_from_fork+0x3e/0x80 [ 38.534760] ret_from_fork_asm+0x1a/0x30 [ 38.538702] [ 38.540245] The buggy address belongs to the object at ffff888107f05600 [ 38.540245] which belongs to the cache kmalloc-128 of size 128 [ 38.552765] The buggy address is located 0 bytes inside of [ 38.552765] 128-byte region [ffff888107f05600, ffff888107f05680) [ 38.564320] [ 38.565818] The buggy address belongs to the physical page: [ 38.571391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f05 [ 38.579390] flags: 0x200000000000000(node=0|zone=2) [ 38.584269] page_type: f5(slab) [ 38.587417] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 38.595164] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 38.602911] page dumped because: kasan: bad access detected [ 38.608483] [ 38.609981] Memory state around the buggy address: [ 38.614776] ffff888107f05500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.622002] ffff888107f05580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.629221] >ffff888107f05600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.636441] ^ [ 38.639703] ffff888107f05680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.646970] ffff888107f05700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.654189] ================================================================== [ 38.661625] ================================================================== [ 38.673548] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 38.680701] Free of addr ffff888105238000 by task kunit_try_catch/280 [ 38.687181] [ 38.688702] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 38.688723] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.688738] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 38.688741] Call Trace: [ 38.688743] <TASK> [ 38.688744] dump_stack_lvl+0x73/0xb0 [ 38.688748] print_report+0xd1/0x650 [ 38.688752] ? __virt_addr_valid+0x1db/0x2d0 [ 38.688756] ? kasan_addr_to_slab+0x11/0xa0 [ 38.688760] ? mempool_double_free_helper+0x184/0x370 [ 38.688765] kasan_report_invalid_free+0x10a/0x130 [ 38.688770] ? mempool_double_free_helper+0x184/0x370 [ 38.688775] ? mempool_double_free_helper+0x184/0x370 [ 38.688779] __kasan_mempool_poison_object+0x1b3/0x1d0 [ 38.688784] mempool_free+0x2ec/0x380 [ 38.688788] mempool_double_free_helper+0x184/0x370 [ 38.688793] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 38.688797] ? dequeue_entities+0xa24/0x1790 [ 38.688802] ? finish_task_switch.isra.0+0x153/0x700 [ 38.688807] mempool_kmalloc_large_double_free+0xed/0x140 [ 38.688812] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 38.688817] ? dequeue_task_fair+0x166/0x4e0 [ 38.688821] ? __pfx_mempool_kmalloc+0x10/0x10 [ 38.688824] ? __pfx_mempool_kfree+0x10/0x10 [ 38.688828] ? ktime_get_ts64+0x83/0x230 [ 38.688833] kunit_try_run_case+0x1a2/0x480 [ 38.688837] ? __pfx_kunit_try_run_case+0x10/0x10 [ 38.688841] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 38.688846] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 38.688851] ? __kthread_parkme+0x82/0x180 [ 38.688855] ? preempt_count_sub+0x50/0x80 [ 38.688859] ? __pfx_kunit_try_run_case+0x10/0x10 [ 38.688863] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 38.688867] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 38.688872] kthread+0x334/0x6f0 [ 38.688876] ? trace_preempt_on+0x20/0xc0 [ 38.688880] ? __pfx_kthread+0x10/0x10 [ 38.688884] ? _raw_spin_unlock_irq+0x47/0x80 [ 38.688888] ? calculate_sigpending+0x7b/0xa0 [ 38.688892] ? __pfx_kthread+0x10/0x10 [ 38.688897] ret_from_fork+0x3e/0x80 [ 38.688901] ? __pfx_kthread+0x10/0x10 [ 38.688905] ret_from_fork_asm+0x1a/0x30 [ 38.688910] </TASK> [ 38.688912] [ 38.889373] The buggy address belongs to the physical page: [ 38.894946] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105238 [ 38.902947] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.910605] flags: 0x200000000000040(head|node=0|zone=2) [ 38.915919] page_type: f8(unknown) [ 38.919325] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.927065] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 38.934812] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.942646] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 38.950470] head: 0200000000000002 ffffea0004148e01 00000000ffffffff 00000000ffffffff [ 38.958297] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 38.966123] page dumped because: kasan: bad access detected [ 38.971702] [ 38.973220] Memory state around the buggy address: [ 38.978012] ffff888105237f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.985231] ffff888105237f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.992450] >ffff888105238000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.999701] ^ [ 39.002981] ffff888105238080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.010200] ffff888105238100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.017417] ================================================================== [ 39.024955] ================================================================== [ 39.037401] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 39.044535] Free of addr ffff888105238000 by task kunit_try_catch/282 [ 39.050974] [ 39.052475] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 39.052483] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.052485] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 39.052488] Call Trace: [ 39.052490] <TASK> [ 39.052492] dump_stack_lvl+0x73/0xb0 [ 39.052495] print_report+0xd1/0x650 [ 39.052499] ? __virt_addr_valid+0x1db/0x2d0 [ 39.052503] ? kasan_addr_to_slab+0x11/0xa0 [ 39.052507] ? mempool_double_free_helper+0x184/0x370 [ 39.052512] kasan_report_invalid_free+0x10a/0x130 [ 39.052516] ? mempool_double_free_helper+0x184/0x370 [ 39.052521] ? mempool_double_free_helper+0x184/0x370 [ 39.052526] __kasan_mempool_poison_pages+0x115/0x130 [ 39.052530] mempool_free+0x290/0x380 [ 39.052535] mempool_double_free_helper+0x184/0x370 [ 39.052539] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 39.052544] ? dequeue_entities+0xa24/0x1790 [ 39.052548] ? finish_task_switch.isra.0+0x153/0x700 [ 39.052553] mempool_page_alloc_double_free+0xe8/0x140 [ 39.052557] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 39.052561] ? dequeue_task_fair+0x166/0x4e0 [ 39.052565] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 39.052569] ? __pfx_mempool_free_pages+0x10/0x10 [ 39.052573] ? ktime_get_ts64+0x83/0x230 [ 39.052578] kunit_try_run_case+0x1a2/0x480 [ 39.052582] ? __pfx_kunit_try_run_case+0x10/0x10 [ 39.052586] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 39.052591] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 39.052595] ? __kthread_parkme+0x82/0x180 [ 39.052599] ? preempt_count_sub+0x50/0x80 [ 39.052604] ? __pfx_kunit_try_run_case+0x10/0x10 [ 39.052608] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 39.052612] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 39.052616] kthread+0x334/0x6f0 [ 39.052620] ? trace_preempt_on+0x20/0xc0 [ 39.052624] ? __pfx_kthread+0x10/0x10 [ 39.052629] ? _raw_spin_unlock_irq+0x47/0x80 [ 39.052633] ? calculate_sigpending+0x7b/0xa0 [ 39.052636] ? __pfx_kthread+0x10/0x10 [ 39.052641] ret_from_fork+0x3e/0x80 [ 39.052645] ? __pfx_kthread+0x10/0x10 [ 39.052649] ret_from_fork_asm+0x1a/0x30 [ 39.052655] </TASK> [ 39.052656] [ 39.253191] The buggy address belongs to the physical page: [ 39.258764] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105238 [ 39.266764] flags: 0x200000000000000(node=0|zone=2) [ 39.271643] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 39.279383] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.287130] page dumped because: kasan: bad access detected [ 39.292702] [ 39.294218] Memory state around the buggy address: [ 39.299012] ffff888105237f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.306239] ffff888105237f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.313456] >ffff888105238000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.320703] ^ [ 39.323962] ffff888105238080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.331179] ffff888105238100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.338397] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 37.877096] ================================================================== [ 37.888082] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400 [ 37.894790] Read of size 1 at addr ffff888105238000 by task kunit_try_catch/276 [ 37.902103] [ 37.903604] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 37.903613] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.903615] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 37.903619] Call Trace: [ 37.903620] <TASK> [ 37.903622] dump_stack_lvl+0x73/0xb0 [ 37.903627] print_report+0xd1/0x650 [ 37.903631] ? __virt_addr_valid+0x1db/0x2d0 [ 37.903635] ? mempool_uaf_helper+0x392/0x400 [ 37.903639] ? kasan_addr_to_slab+0x11/0xa0 [ 37.903643] ? mempool_uaf_helper+0x392/0x400 [ 37.903648] kasan_report+0x141/0x180 [ 37.903652] ? mempool_uaf_helper+0x392/0x400 [ 37.903657] __asan_report_load1_noabort+0x18/0x20 [ 37.903661] mempool_uaf_helper+0x392/0x400 [ 37.903685] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 37.903690] ? dequeue_entities+0xa24/0x1790 [ 37.903695] ? finish_task_switch.isra.0+0x153/0x700 [ 37.903700] mempool_page_alloc_uaf+0xed/0x140 [ 37.903704] ? __pfx_mempool_page_alloc_uaf+0x10/0x10 [ 37.903708] ? dequeue_task_fair+0x166/0x4e0 [ 37.903724] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 37.903728] ? __pfx_mempool_free_pages+0x10/0x10 [ 37.903745] ? ktime_get_ts64+0x83/0x230 [ 37.903750] kunit_try_run_case+0x1a2/0x480 [ 37.903754] ? __pfx_kunit_try_run_case+0x10/0x10 [ 37.903759] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 37.903763] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 37.903768] ? __kthread_parkme+0x82/0x180 [ 37.903772] ? preempt_count_sub+0x50/0x80 [ 37.903776] ? __pfx_kunit_try_run_case+0x10/0x10 [ 37.903781] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 37.903785] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 37.903789] kthread+0x334/0x6f0 [ 37.903793] ? trace_preempt_on+0x20/0xc0 [ 37.903797] ? __pfx_kthread+0x10/0x10 [ 37.903801] ? _raw_spin_unlock_irq+0x47/0x80 [ 37.903806] ? calculate_sigpending+0x7b/0xa0 [ 37.903810] ? __pfx_kthread+0x10/0x10 [ 37.903814] ret_from_fork+0x3e/0x80 [ 37.903818] ? __pfx_kthread+0x10/0x10 [ 37.903822] ret_from_fork_asm+0x1a/0x30 [ 37.903828] </TASK> [ 37.903830] [ 38.094618] The buggy address belongs to the physical page: [ 38.100189] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105238 [ 38.108197] flags: 0x200000000000000(node=0|zone=2) [ 38.113077] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 38.120825] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 38.128572] page dumped because: kasan: bad access detected [ 38.134142] [ 38.135643] Memory state around the buggy address: [ 38.140435] ffff888105237f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.147653] ffff888105237f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.154908] >ffff888105238000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.162127] ^ [ 38.165360] ffff888105238080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.172580] ffff888105238100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.179807] ================================================================== [ 37.069712] ================================================================== [ 37.080950] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400 [ 37.087687] Read of size 1 at addr ffff888106b0c000 by task kunit_try_catch/272 [ 37.095050] [ 37.096551] CPU: 3 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 37.096560] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.096562] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 37.096566] Call Trace: [ 37.096567] <TASK> [ 37.096569] dump_stack_lvl+0x73/0xb0 [ 37.096574] print_report+0xd1/0x650 [ 37.096578] ? __virt_addr_valid+0x1db/0x2d0 [ 37.096582] ? mempool_uaf_helper+0x392/0x400 [ 37.096586] ? kasan_addr_to_slab+0x11/0xa0 [ 37.096590] ? mempool_uaf_helper+0x392/0x400 [ 37.096595] kasan_report+0x141/0x180 [ 37.096599] ? mempool_uaf_helper+0x392/0x400 [ 37.096604] __asan_report_load1_noabort+0x18/0x20 [ 37.096608] mempool_uaf_helper+0x392/0x400 [ 37.096612] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 37.096617] ? dequeue_entities+0xa24/0x1790 [ 37.096621] ? finish_task_switch.isra.0+0x153/0x700 [ 37.096626] mempool_kmalloc_large_uaf+0xef/0x140 [ 37.096631] ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10 [ 37.096635] ? dequeue_task_fair+0x166/0x4e0 [ 37.096640] ? __pfx_mempool_kmalloc+0x10/0x10 [ 37.096643] ? __pfx_mempool_kfree+0x10/0x10 [ 37.096647] ? ktime_get_ts64+0x83/0x230 [ 37.096652] kunit_try_run_case+0x1a2/0x480 [ 37.096656] ? __pfx_kunit_try_run_case+0x10/0x10 [ 37.096660] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 37.096685] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 37.096690] ? __kthread_parkme+0x82/0x180 [ 37.096695] ? preempt_count_sub+0x50/0x80 [ 37.096699] ? __pfx_kunit_try_run_case+0x10/0x10 [ 37.096704] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 37.096724] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 37.096728] kthread+0x334/0x6f0 [ 37.096745] ? trace_preempt_on+0x20/0xc0 [ 37.096749] ? __pfx_kthread+0x10/0x10 [ 37.096753] ? _raw_spin_unlock_irq+0x47/0x80 [ 37.096757] ? calculate_sigpending+0x7b/0xa0 [ 37.096761] ? __pfx_kthread+0x10/0x10 [ 37.096766] ret_from_fork+0x3e/0x80 [ 37.096770] ? __pfx_kthread+0x10/0x10 [ 37.096774] ret_from_fork_asm+0x1a/0x30 [ 37.096780] </TASK> [ 37.096782] [ 37.287224] The buggy address belongs to the physical page: [ 37.292796] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b0c [ 37.300806] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.308464] flags: 0x200000000000040(head|node=0|zone=2) [ 37.313776] page_type: f8(unknown) [ 37.317184] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.324925] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 37.332690] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.340575] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 37.348410] head: 0200000000000002 ffffea00041ac301 00000000ffffffff 00000000ffffffff [ 37.356242] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 37.364066] page dumped because: kasan: bad access detected [ 37.369641] [ 37.371138] Memory state around the buggy address: [ 37.375934] ffff888106b0bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.383161] ffff888106b0bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.390379] >ffff888106b0c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.397596] ^ [ 37.400830] ffff888106b0c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.408049] ffff888106b0c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.415268] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 37.422957] ================================================================== [ 37.434732] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400 [ 37.441872] Read of size 1 at addr ffff8881061f7240 by task kunit_try_catch/274 [ 37.449180] [ 37.450714] CPU: 2 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 37.450736] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.450738] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 37.450742] Call Trace: [ 37.450743] <TASK> [ 37.450745] dump_stack_lvl+0x73/0xb0 [ 37.450749] print_report+0xd1/0x650 [ 37.450754] ? __virt_addr_valid+0x1db/0x2d0 [ 37.450758] ? mempool_uaf_helper+0x392/0x400 [ 37.450762] ? kasan_complete_mode_report_info+0x64/0x200 [ 37.450766] ? mempool_uaf_helper+0x392/0x400 [ 37.450770] kasan_report+0x141/0x180 [ 37.450775] ? mempool_uaf_helper+0x392/0x400 [ 37.450780] __asan_report_load1_noabort+0x18/0x20 [ 37.450784] mempool_uaf_helper+0x392/0x400 [ 37.450788] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 37.450793] ? finish_task_switch.isra.0+0x153/0x700 [ 37.450798] mempool_slab_uaf+0xea/0x140 [ 37.450802] ? __pfx_mempool_slab_uaf+0x10/0x10 [ 37.450805] ? dequeue_task_fair+0x166/0x4e0 [ 37.450809] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 37.450813] ? __pfx_mempool_free_slab+0x10/0x10 [ 37.450817] ? ktime_get_ts64+0x83/0x230 [ 37.450822] kunit_try_run_case+0x1a2/0x480 [ 37.450826] ? __pfx_kunit_try_run_case+0x10/0x10 [ 37.450830] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 37.450835] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 37.450840] ? __kthread_parkme+0x82/0x180 [ 37.450844] ? preempt_count_sub+0x50/0x80 [ 37.450848] ? __pfx_kunit_try_run_case+0x10/0x10 [ 37.450853] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 37.450857] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 37.450861] kthread+0x334/0x6f0 [ 37.450865] ? trace_preempt_on+0x20/0xc0 [ 37.450869] ? __pfx_kthread+0x10/0x10 [ 37.450873] ? _raw_spin_unlock_irq+0x47/0x80 [ 37.450878] ? calculate_sigpending+0x7b/0xa0 [ 37.450881] ? __pfx_kthread+0x10/0x10 [ 37.450886] ret_from_fork+0x3e/0x80 [ 37.450890] ? __pfx_kthread+0x10/0x10 [ 37.450894] ret_from_fork_asm+0x1a/0x30 [ 37.450899] </TASK> [ 37.450901] [ 37.637428] Allocated by task 274: [ 37.640834] kasan_save_stack+0x45/0x70 [ 37.644714] kasan_save_track+0x18/0x40 [ 37.648590] kasan_save_alloc_info+0x3b/0x50 [ 37.652861] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 37.658173] remove_element+0x11e/0x190 [ 37.662015] mempool_alloc_preallocated+0x4d/0x90 [ 37.666732] mempool_uaf_helper+0x96/0x400 [ 37.670836] mempool_slab_uaf+0xea/0x140 [ 37.674762] kunit_try_run_case+0x1a2/0x480 [ 37.678948] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 37.684348] kthread+0x334/0x6f0 [ 37.687589] ret_from_fork+0x3e/0x80 [ 37.691175] ret_from_fork_asm+0x1a/0x30 [ 37.695101] [ 37.696601] Freed by task 274: [ 37.699659] kasan_save_stack+0x45/0x70 [ 37.703534] kasan_save_track+0x18/0x40 [ 37.707373] kasan_save_free_info+0x3f/0x60 [ 37.711558] __kasan_mempool_poison_object+0x131/0x1d0 [ 37.716700] mempool_free+0x2ec/0x380 [ 37.720407] mempool_uaf_helper+0x11a/0x400 [ 37.724593] mempool_slab_uaf+0xea/0x140 [ 37.728520] kunit_try_run_case+0x1a2/0x480 [ 37.732735] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 37.738163] kthread+0x334/0x6f0 [ 37.741397] ret_from_fork+0x3e/0x80 [ 37.744975] ret_from_fork_asm+0x1a/0x30 [ 37.748902] [ 37.750401] The buggy address belongs to the object at ffff8881061f7240 [ 37.750401] which belongs to the cache test_cache of size 123 [ 37.762830] The buggy address is located 0 bytes inside of [ 37.762830] freed 123-byte region [ffff8881061f7240, ffff8881061f72bb) [ 37.774917] [ 37.776417] The buggy address belongs to the physical page: [ 37.781991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 37.789997] flags: 0x200000000000000(node=0|zone=2) [ 37.794875] page_type: f5(slab) [ 37.798024] raw: 0200000000000000 ffff888100dbcf00 dead000000000122 0000000000000000 [ 37.805771] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 37.813510] page dumped because: kasan: bad access detected [ 37.819082] [ 37.820580] Memory state around the buggy address: [ 37.825373] ffff8881061f7100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.832593] ffff8881061f7180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.839812] >ffff8881061f7200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 37.847030] ^ [ 37.852341] ffff8881061f7280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.859563] ffff8881061f7300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.866790] ================================================================== [ 36.616059] ================================================================== [ 36.627565] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400 [ 36.634734] Read of size 1 at addr ffff8881061dfb00 by task kunit_try_catch/270 [ 36.642047] [ 36.643547] CPU: 2 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 36.643557] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.643559] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 36.643563] Call Trace: [ 36.643565] <TASK> [ 36.643567] dump_stack_lvl+0x73/0xb0 [ 36.643572] print_report+0xd1/0x650 [ 36.643577] ? __virt_addr_valid+0x1db/0x2d0 [ 36.643581] ? mempool_uaf_helper+0x392/0x400 [ 36.643585] ? kasan_complete_mode_report_info+0x64/0x200 [ 36.643590] ? mempool_uaf_helper+0x392/0x400 [ 36.643594] kasan_report+0x141/0x180 [ 36.643598] ? mempool_uaf_helper+0x392/0x400 [ 36.643603] __asan_report_load1_noabort+0x18/0x20 [ 36.643607] mempool_uaf_helper+0x392/0x400 [ 36.643612] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 36.643616] ? dequeue_entities+0xa24/0x1790 [ 36.643621] ? finish_task_switch.isra.0+0x153/0x700 [ 36.643626] mempool_kmalloc_uaf+0xef/0x140 [ 36.643631] ? __pfx_mempool_kmalloc_uaf+0x10/0x10 [ 36.643635] ? dequeue_task_fair+0x166/0x4e0 [ 36.643639] ? __pfx_mempool_kmalloc+0x10/0x10 [ 36.643643] ? __pfx_mempool_kfree+0x10/0x10 [ 36.643647] ? ktime_get_ts64+0x83/0x230 [ 36.643652] kunit_try_run_case+0x1a2/0x480 [ 36.643658] ? __pfx_kunit_try_run_case+0x10/0x10 [ 36.643662] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 36.643667] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 36.643688] ? __kthread_parkme+0x82/0x180 [ 36.643693] ? preempt_count_sub+0x50/0x80 [ 36.643698] ? __pfx_kunit_try_run_case+0x10/0x10 [ 36.643703] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 36.643719] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 36.643724] kthread+0x334/0x6f0 [ 36.643728] ? trace_preempt_on+0x20/0xc0 [ 36.643733] ? __pfx_kthread+0x10/0x10 [ 36.643737] ? _raw_spin_unlock_irq+0x47/0x80 [ 36.643742] ? calculate_sigpending+0x7b/0xa0 [ 36.643746] ? __pfx_kthread+0x10/0x10 [ 36.643750] ret_from_fork+0x3e/0x80 [ 36.643755] ? __pfx_kthread+0x10/0x10 [ 36.643759] ret_from_fork_asm+0x1a/0x30 [ 36.643765] </TASK> [ 36.643767] [ 36.834403] Allocated by task 270: [ 36.837808] kasan_save_stack+0x45/0x70 [ 36.841647] kasan_save_track+0x18/0x40 [ 36.845488] kasan_save_alloc_info+0x3b/0x50 [ 36.849761] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 36.855081] remove_element+0x11e/0x190 [ 36.858919] mempool_alloc_preallocated+0x4d/0x90 [ 36.863625] mempool_uaf_helper+0x96/0x400 [ 36.867762] mempool_kmalloc_uaf+0xef/0x140 [ 36.871953] kunit_try_run_case+0x1a2/0x480 [ 36.876139] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 36.881538] kthread+0x334/0x6f0 [ 36.884772] ret_from_fork+0x3e/0x80 [ 36.888350] ret_from_fork_asm+0x1a/0x30 [ 36.892276] [ 36.893776] Freed by task 270: [ 36.896835] kasan_save_stack+0x45/0x70 [ 36.900703] kasan_save_track+0x18/0x40 [ 36.904592] kasan_save_free_info+0x3f/0x60 [ 36.908778] __kasan_mempool_poison_object+0x131/0x1d0 [ 36.913925] mempool_free+0x2ec/0x380 [ 36.917590] mempool_uaf_helper+0x11a/0x400 [ 36.921775] mempool_kmalloc_uaf+0xef/0x140 [ 36.925962] kunit_try_run_case+0x1a2/0x480 [ 36.930147] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 36.935547] kthread+0x334/0x6f0 [ 36.938778] ret_from_fork+0x3e/0x80 [ 36.942359] ret_from_fork_asm+0x1a/0x30 [ 36.946284] [ 36.947783] The buggy address belongs to the object at ffff8881061dfb00 [ 36.947783] which belongs to the cache kmalloc-128 of size 128 [ 36.960298] The buggy address is located 0 bytes inside of [ 36.960298] freed 128-byte region [ffff8881061dfb00, ffff8881061dfb80) [ 36.972380] [ 36.973876] The buggy address belongs to the physical page: [ 36.979450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061df [ 36.987458] flags: 0x200000000000000(node=0|zone=2) [ 36.992338] page_type: f5(slab) [ 36.995484] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 37.003232] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.010970] page dumped because: kasan: bad access detected [ 37.016541] [ 37.018041] Memory state around the buggy address: [ 37.022835] ffff8881061dfa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.030063] ffff8881061dfa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.037291] >ffff8881061dfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.044515] ^ [ 37.047768] ffff8881061dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.054985] ffff8881061dfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.062206] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 36.196168] ================================================================== [ 36.208439] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 36.216013] Read of size 1 at addr ffff8881080522bb by task kunit_try_catch/268 [ 36.223327] [ 36.224829] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 36.224837] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.224840] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 36.224843] Call Trace: [ 36.224845] <TASK> [ 36.224847] dump_stack_lvl+0x73/0xb0 [ 36.224851] print_report+0xd1/0x650 [ 36.224855] ? __virt_addr_valid+0x1db/0x2d0 [ 36.224859] ? mempool_oob_right_helper+0x318/0x380 [ 36.224863] ? kasan_complete_mode_report_info+0x2a/0x200 [ 36.224868] ? mempool_oob_right_helper+0x318/0x380 [ 36.224872] kasan_report+0x141/0x180 [ 36.224876] ? mempool_oob_right_helper+0x318/0x380 [ 36.224882] __asan_report_load1_noabort+0x18/0x20 [ 36.224886] mempool_oob_right_helper+0x318/0x380 [ 36.224890] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 36.224896] ? finish_task_switch.isra.0+0x153/0x700 [ 36.224901] mempool_slab_oob_right+0xed/0x140 [ 36.224904] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 36.224908] ? dequeue_task_fair+0x166/0x4e0 [ 36.224912] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 36.224916] ? __pfx_mempool_free_slab+0x10/0x10 [ 36.224920] ? ktime_get_ts64+0x83/0x230 [ 36.224925] kunit_try_run_case+0x1a2/0x480 [ 36.224929] ? __pfx_kunit_try_run_case+0x10/0x10 [ 36.224933] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 36.224938] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 36.224942] ? __kthread_parkme+0x82/0x180 [ 36.224947] ? preempt_count_sub+0x50/0x80 [ 36.224951] ? __pfx_kunit_try_run_case+0x10/0x10 [ 36.224955] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 36.224959] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 36.224964] kthread+0x334/0x6f0 [ 36.224968] ? trace_preempt_on+0x20/0xc0 [ 36.224972] ? __pfx_kthread+0x10/0x10 [ 36.224976] ? _raw_spin_unlock_irq+0x47/0x80 [ 36.224980] ? calculate_sigpending+0x7b/0xa0 [ 36.224984] ? __pfx_kthread+0x10/0x10 [ 36.224988] ret_from_fork+0x3e/0x80 [ 36.224992] ? __pfx_kthread+0x10/0x10 [ 36.224997] ret_from_fork_asm+0x1a/0x30 [ 36.225002] </TASK> [ 36.225004] [ 36.414991] Allocated by task 268: [ 36.418396] kasan_save_stack+0x45/0x70 [ 36.422235] kasan_save_track+0x18/0x40 [ 36.426074] kasan_save_alloc_info+0x3b/0x50 [ 36.430346] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 36.435659] remove_element+0x11e/0x190 [ 36.439532] mempool_alloc_preallocated+0x4d/0x90 [ 36.444240] mempool_oob_right_helper+0x8a/0x380 [ 36.448867] mempool_slab_oob_right+0xed/0x140 [ 36.453312] kunit_try_run_case+0x1a2/0x480 [ 36.457497] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 36.462899] kthread+0x334/0x6f0 [ 36.466140] ret_from_fork+0x3e/0x80 [ 36.469762] ret_from_fork_asm+0x1a/0x30 [ 36.473702] [ 36.475247] The buggy address belongs to the object at ffff888108052240 [ 36.475247] which belongs to the cache test_cache of size 123 [ 36.487702] The buggy address is located 0 bytes to the right of [ 36.487702] allocated 123-byte region [ffff888108052240, ffff8881080522bb) [ 36.500703] [ 36.502251] The buggy address belongs to the physical page: [ 36.507824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108052 [ 36.515832] flags: 0x200000000000000(node=0|zone=2) [ 36.520721] page_type: f5(slab) [ 36.523902] raw: 0200000000000000 ffff888100ac7680 dead000000000122 0000000000000000 [ 36.531649] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 36.539420] page dumped because: kasan: bad access detected [ 36.544993] [ 36.546492] Memory state around the buggy address: [ 36.551286] ffff888108052180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.558513] ffff888108052200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 36.565764] >ffff888108052280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 36.572986] ^ [ 36.578039] ffff888108052300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.585256] ffff888108052380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.592475] ================================================================== [ 35.429176] ================================================================== [ 35.440080] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 35.447687] Read of size 1 at addr ffff888104ee9573 by task kunit_try_catch/264 [ 35.455020] [ 35.456521] CPU: 0 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 35.456530] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.456533] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 35.456537] Call Trace: [ 35.456538] <TASK> [ 35.456541] dump_stack_lvl+0x73/0xb0 [ 35.456545] print_report+0xd1/0x650 [ 35.456550] ? __virt_addr_valid+0x1db/0x2d0 [ 35.456554] ? mempool_oob_right_helper+0x318/0x380 [ 35.456559] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.456563] ? mempool_oob_right_helper+0x318/0x380 [ 35.456568] kasan_report+0x141/0x180 [ 35.456572] ? mempool_oob_right_helper+0x318/0x380 [ 35.456578] __asan_report_load1_noabort+0x18/0x20 [ 35.456581] mempool_oob_right_helper+0x318/0x380 [ 35.456586] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 35.456591] ? dequeue_entities+0xa24/0x1790 [ 35.456596] ? finish_task_switch.isra.0+0x153/0x700 [ 35.456601] mempool_kmalloc_oob_right+0xf2/0x150 [ 35.456606] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 35.456611] ? dequeue_task_fair+0x166/0x4e0 [ 35.456615] ? __pfx_mempool_kmalloc+0x10/0x10 [ 35.456619] ? __pfx_mempool_kfree+0x10/0x10 [ 35.456623] ? ktime_get_ts64+0x83/0x230 [ 35.456628] kunit_try_run_case+0x1a2/0x480 [ 35.456633] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.456637] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 35.456642] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 35.456647] ? __kthread_parkme+0x82/0x180 [ 35.456651] ? preempt_count_sub+0x50/0x80 [ 35.456656] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.456675] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 35.456679] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.456684] kthread+0x334/0x6f0 [ 35.456688] ? trace_preempt_on+0x20/0xc0 [ 35.456705] ? __pfx_kthread+0x10/0x10 [ 35.456710] ? _raw_spin_unlock_irq+0x47/0x80 [ 35.456714] ? calculate_sigpending+0x7b/0xa0 [ 35.456718] ? __pfx_kthread+0x10/0x10 [ 35.456722] ret_from_fork+0x3e/0x80 [ 35.456727] ? __pfx_kthread+0x10/0x10 [ 35.456731] ret_from_fork_asm+0x1a/0x30 [ 35.456738] </TASK> [ 35.456739] [ 35.650938] Allocated by task 264: [ 35.654342] kasan_save_stack+0x45/0x70 [ 35.658183] kasan_save_track+0x18/0x40 [ 35.662020] kasan_save_alloc_info+0x3b/0x50 [ 35.666294] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 35.671605] remove_element+0x11e/0x190 [ 35.675444] mempool_alloc_preallocated+0x4d/0x90 [ 35.680153] mempool_oob_right_helper+0x8a/0x380 [ 35.684779] mempool_kmalloc_oob_right+0xf2/0x150 [ 35.689486] kunit_try_run_case+0x1a2/0x480 [ 35.693687] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 35.699089] kthread+0x334/0x6f0 [ 35.702328] ret_from_fork+0x3e/0x80 [ 35.705908] ret_from_fork_asm+0x1a/0x30 [ 35.709833] [ 35.711334] The buggy address belongs to the object at ffff888104ee9500 [ 35.711334] which belongs to the cache kmalloc-128 of size 128 [ 35.723848] The buggy address is located 0 bytes to the right of [ 35.723848] allocated 115-byte region [ffff888104ee9500, ffff888104ee9573) [ 35.736795] [ 35.738293] The buggy address belongs to the physical page: [ 35.743865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9 [ 35.751873] flags: 0x200000000000000(node=0|zone=2) [ 35.756752] page_type: f5(slab) [ 35.759899] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 35.767639] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.775384] page dumped because: kasan: bad access detected [ 35.780958] [ 35.782457] Memory state around the buggy address: [ 35.787250] ffff888104ee9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.794467] ffff888104ee9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.801688] >ffff888104ee9500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 35.808932] ^ [ 35.815806] ffff888104ee9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.823031] ffff888104ee9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 35.830252] ================================================================== [ 35.838032] ================================================================== [ 35.849784] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 35.857358] Read of size 1 at addr ffff888105ec2001 by task kunit_try_catch/266 [ 35.864665] [ 35.866191] CPU: 2 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 35.866199] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.866201] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 35.866205] Call Trace: [ 35.866206] <TASK> [ 35.866208] dump_stack_lvl+0x73/0xb0 [ 35.866212] print_report+0xd1/0x650 [ 35.866217] ? __virt_addr_valid+0x1db/0x2d0 [ 35.866221] ? mempool_oob_right_helper+0x318/0x380 [ 35.866225] ? kasan_addr_to_slab+0x11/0xa0 [ 35.866229] ? mempool_oob_right_helper+0x318/0x380 [ 35.866234] kasan_report+0x141/0x180 [ 35.866238] ? mempool_oob_right_helper+0x318/0x380 [ 35.866243] __asan_report_load1_noabort+0x18/0x20 [ 35.866247] mempool_oob_right_helper+0x318/0x380 [ 35.866252] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 35.866256] ? dequeue_entities+0xa24/0x1790 [ 35.866261] ? finish_task_switch.isra.0+0x153/0x700 [ 35.866266] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 35.866271] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 35.866276] ? dequeue_task_fair+0x166/0x4e0 [ 35.866280] ? __pfx_mempool_kmalloc+0x10/0x10 [ 35.866283] ? __pfx_mempool_kfree+0x10/0x10 [ 35.866288] ? ktime_get_ts64+0x83/0x230 [ 35.866292] kunit_try_run_case+0x1a2/0x480 [ 35.866297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.866301] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 35.866306] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 35.866310] ? __kthread_parkme+0x82/0x180 [ 35.866314] ? preempt_count_sub+0x50/0x80 [ 35.866319] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.866323] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 35.866328] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.866332] kthread+0x334/0x6f0 [ 35.866336] ? trace_preempt_on+0x20/0xc0 [ 35.866340] ? __pfx_kthread+0x10/0x10 [ 35.866344] ? _raw_spin_unlock_irq+0x47/0x80 [ 35.866348] ? calculate_sigpending+0x7b/0xa0 [ 35.866352] ? __pfx_kthread+0x10/0x10 [ 35.866357] ret_from_fork+0x3e/0x80 [ 35.866361] ? __pfx_kthread+0x10/0x10 [ 35.866365] ret_from_fork_asm+0x1a/0x30 [ 35.866371] </TASK> [ 35.866372] [ 36.060435] The buggy address belongs to the physical page: [ 36.066007] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ec0 [ 36.074008] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.081686] flags: 0x200000000000040(head|node=0|zone=2) [ 36.087034] page_type: f8(unknown) [ 36.090439] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.098178] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 36.105919] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.113751] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 36.121577] head: 0200000000000002 ffffea000417b001 00000000ffffffff 00000000ffffffff [ 36.129402] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 36.137227] page dumped because: kasan: bad access detected [ 36.142799] [ 36.144300] Memory state around the buggy address: [ 36.149091] ffff888105ec1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.156311] ffff888105ec1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.163529] >ffff888105ec2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.170750] ^ [ 36.173982] ffff888105ec2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.181200] ffff888105ec2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.188418] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 34.392619] ================================================================== [ 34.403775] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1bf/0x380 [ 34.411524] Read of size 1 at addr ffff888100ac7540 by task kunit_try_catch/258 [ 34.418836] [ 34.420337] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 34.420347] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.420349] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 34.420353] Call Trace: [ 34.420355] <TASK> [ 34.420357] dump_stack_lvl+0x73/0xb0 [ 34.420362] print_report+0xd1/0x650 [ 34.420366] ? __virt_addr_valid+0x1db/0x2d0 [ 34.420371] ? kmem_cache_double_destroy+0x1bf/0x380 [ 34.420374] ? kasan_complete_mode_report_info+0x64/0x200 [ 34.420379] ? kmem_cache_double_destroy+0x1bf/0x380 [ 34.420382] kasan_report+0x141/0x180 [ 34.420386] ? kmem_cache_double_destroy+0x1bf/0x380 [ 34.420391] ? kmem_cache_double_destroy+0x1bf/0x380 [ 34.420394] __kasan_check_byte+0x3d/0x50 [ 34.420399] kmem_cache_destroy+0x25/0x1d0 [ 34.420404] kmem_cache_double_destroy+0x1bf/0x380 [ 34.420407] ? __pfx_kmem_cache_double_destroy+0x10/0x10 [ 34.420411] ? finish_task_switch.isra.0+0x153/0x700 [ 34.420416] ? __switch_to+0x5d9/0xf60 [ 34.420420] ? dequeue_task_fair+0x166/0x4e0 [ 34.420426] ? ktime_get_ts64+0x83/0x230 [ 34.420431] kunit_try_run_case+0x1a2/0x480 [ 34.420436] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.420440] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 34.420445] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.420450] ? __kthread_parkme+0x82/0x180 [ 34.420454] ? preempt_count_sub+0x50/0x80 [ 34.420459] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.420463] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 34.420467] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.420471] kthread+0x334/0x6f0 [ 34.420475] ? trace_preempt_on+0x20/0xc0 [ 34.420480] ? __pfx_kthread+0x10/0x10 [ 34.420484] ? _raw_spin_unlock_irq+0x47/0x80 [ 34.420489] ? calculate_sigpending+0x7b/0xa0 [ 34.420493] ? __pfx_kthread+0x10/0x10 [ 34.420497] ret_from_fork+0x3e/0x80 [ 34.420501] ? __pfx_kthread+0x10/0x10 [ 34.420506] ret_from_fork_asm+0x1a/0x30 [ 34.420512] </TASK> [ 34.420513] [ 34.604192] Allocated by task 258: [ 34.607596] kasan_save_stack+0x45/0x70 [ 34.611436] kasan_save_track+0x18/0x40 [ 34.615276] kasan_save_alloc_info+0x3b/0x50 [ 34.619547] __kasan_slab_alloc+0x91/0xa0 [ 34.623561] kmem_cache_alloc_noprof+0x123/0x3f0 [ 34.628187] __kmem_cache_create_args+0x169/0x240 [ 34.632893] kmem_cache_double_destroy+0xd5/0x380 [ 34.637600] kunit_try_run_case+0x1a2/0x480 [ 34.641786] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 34.647186] kthread+0x334/0x6f0 [ 34.650426] ret_from_fork+0x3e/0x80 [ 34.654006] ret_from_fork_asm+0x1a/0x30 [ 34.657940] [ 34.659439] Freed by task 258: [ 34.662499] kasan_save_stack+0x45/0x70 [ 34.666336] kasan_save_track+0x18/0x40 [ 34.670177] kasan_save_free_info+0x3f/0x60 [ 34.674361] __kasan_slab_free+0x56/0x70 [ 34.678289] kmem_cache_free+0x249/0x420 [ 34.682213] slab_kmem_cache_release+0x2e/0x40 [ 34.686660] kmem_cache_release+0x16/0x20 [ 34.690702] kobject_put+0x17e/0x450 [ 34.694330] sysfs_slab_release+0x16/0x20 [ 34.698351] kmem_cache_destroy+0xf0/0x1d0 [ 34.702457] kmem_cache_double_destroy+0x14e/0x380 [ 34.707250] kunit_try_run_case+0x1a2/0x480 [ 34.711435] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 34.716835] kthread+0x334/0x6f0 [ 34.720069] ret_from_fork+0x3e/0x80 [ 34.723655] ret_from_fork_asm+0x1a/0x30 [ 34.727617] [ 34.729114] The buggy address belongs to the object at ffff888100ac7540 [ 34.729114] which belongs to the cache kmem_cache of size 208 [ 34.741534] The buggy address is located 0 bytes inside of [ 34.741534] freed 208-byte region [ffff888100ac7540, ffff888100ac7610) [ 34.753617] [ 34.755114] The buggy address belongs to the physical page: [ 34.760703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ac6 [ 34.768765] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.776423] flags: 0x200000000000040(head|node=0|zone=2) [ 34.781760] page_type: f5(slab) [ 34.784901] raw: 0200000000000040 ffff888100042000 dead000000000122 0000000000000000 [ 34.792647] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 34.800389] head: 0200000000000040 ffff888100042000 dead000000000122 0000000000000000 [ 34.808221] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 34.816049] head: 0200000000000001 ffffea000402b181 00000000ffffffff 00000000ffffffff [ 34.823882] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 34.831758] page dumped because: kasan: bad access detected [ 34.837330] [ 34.838820] Memory state around the buggy address: [ 34.843616] ffff888100ac7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.850842] ffff888100ac7480: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 34.858060] >ffff888100ac7500: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 34.865281] ^ [ 34.870592] ffff888100ac7580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.877813] ffff888100ac7600: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.885038] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 33.856965] ================================================================== [ 33.868583] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x3e3/0x510 [ 33.875747] Read of size 1 at addr ffff888100e06000 by task kunit_try_catch/256 [ 33.883054] [ 33.884556] CPU: 2 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 33.884565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.884567] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 33.884571] Call Trace: [ 33.884572] <TASK> [ 33.884575] dump_stack_lvl+0x73/0xb0 [ 33.884580] print_report+0xd1/0x650 [ 33.884585] ? __virt_addr_valid+0x1db/0x2d0 [ 33.884589] ? kmem_cache_rcu_uaf+0x3e3/0x510 [ 33.884593] ? kasan_complete_mode_report_info+0x64/0x200 [ 33.884597] ? kmem_cache_rcu_uaf+0x3e3/0x510 [ 33.884600] kasan_report+0x141/0x180 [ 33.884605] ? kmem_cache_rcu_uaf+0x3e3/0x510 [ 33.884609] __asan_report_load1_noabort+0x18/0x20 [ 33.884613] kmem_cache_rcu_uaf+0x3e3/0x510 [ 33.884616] ? __pfx_kmem_cache_rcu_uaf+0x10/0x10 [ 33.884619] ? finish_task_switch.isra.0+0x153/0x700 [ 33.884624] ? __switch_to+0x5d9/0xf60 [ 33.884628] ? dequeue_task_fair+0x166/0x4e0 [ 33.884634] ? ktime_get_ts64+0x83/0x230 [ 33.884639] kunit_try_run_case+0x1a2/0x480 [ 33.884644] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.884648] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 33.884654] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.884658] ? __kthread_parkme+0x82/0x180 [ 33.884663] ? preempt_count_sub+0x50/0x80 [ 33.884667] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.884689] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 33.884693] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.884697] kthread+0x334/0x6f0 [ 33.884719] ? trace_preempt_on+0x20/0xc0 [ 33.884725] ? __pfx_kthread+0x10/0x10 [ 33.884741] ? _raw_spin_unlock_irq+0x47/0x80 [ 33.884746] ? calculate_sigpending+0x7b/0xa0 [ 33.884750] ? __pfx_kthread+0x10/0x10 [ 33.884755] ret_from_fork+0x3e/0x80 [ 33.884759] ? __pfx_kthread+0x10/0x10 [ 33.884764] ret_from_fork_asm+0x1a/0x30 [ 33.884782] </TASK> [ 33.884784] [ 34.057195] Allocated by task 256: [ 34.060601] kasan_save_stack+0x45/0x70 [ 34.064447] kasan_save_track+0x18/0x40 [ 34.068288] kasan_save_alloc_info+0x3b/0x50 [ 34.072560] __kasan_slab_alloc+0x91/0xa0 [ 34.076580] kmem_cache_alloc_noprof+0x123/0x3f0 [ 34.081199] kmem_cache_rcu_uaf+0x155/0x510 [ 34.085386] kunit_try_run_case+0x1a2/0x480 [ 34.089570] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 34.094971] kthread+0x334/0x6f0 [ 34.098202] ret_from_fork+0x3e/0x80 [ 34.101782] ret_from_fork_asm+0x1a/0x30 [ 34.105708] [ 34.107223] Freed by task 0: [ 34.110111] kasan_save_stack+0x45/0x70 [ 34.113949] kasan_save_track+0x18/0x40 [ 34.117788] kasan_save_free_info+0x3f/0x60 [ 34.121974] __kasan_slab_free+0x56/0x70 [ 34.125899] slab_free_after_rcu_debug+0xe4/0x310 [ 34.130606] rcu_core+0x669/0x1c30 [ 34.134013] rcu_core_si+0x12/0x20 [ 34.137427] handle_softirqs+0x206/0x730 [ 34.141360] __irq_exit_rcu+0xc9/0x110 [ 34.145112] irq_exit_rcu+0x12/0x20 [ 34.148607] sysvec_apic_timer_interrupt+0x81/0x90 [ 34.153406] asm_sysvec_apic_timer_interrupt+0x1f/0x30 [ 34.158546] [ 34.160045] Last potentially related work creation: [ 34.164925] kasan_save_stack+0x45/0x70 [ 34.168787] kasan_record_aux_stack+0xb2/0xc0 [ 34.173148] kmem_cache_free+0x131/0x420 [ 34.177073] kmem_cache_rcu_uaf+0x194/0x510 [ 34.181259] kunit_try_run_case+0x1a2/0x480 [ 34.185446] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 34.190845] kthread+0x334/0x6f0 [ 34.194077] ret_from_fork+0x3e/0x80 [ 34.197656] ret_from_fork_asm+0x1a/0x30 [ 34.201610] [ 34.203108] The buggy address belongs to the object at ffff888100e06000 [ 34.203108] which belongs to the cache test_cache of size 200 [ 34.215537] The buggy address is located 0 bytes inside of [ 34.215537] freed 200-byte region [ffff888100e06000, ffff888100e060c8) [ 34.227624] [ 34.229123] The buggy address belongs to the physical page: [ 34.234702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100e06 [ 34.242738] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.250390] flags: 0x200000000000040(head|node=0|zone=2) [ 34.255703] page_type: f5(slab) [ 34.258878] raw: 0200000000000040 ffff888100dbcc80 dead000000000122 0000000000000000 [ 34.266624] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 34.274373] head: 0200000000000040 ffff888100dbcc80 dead000000000122 0000000000000000 [ 34.282206] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 34.290031] head: 0200000000000001 ffffea0004038181 00000000ffffffff 00000000ffffffff [ 34.297857] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 34.305700] page dumped because: kasan: bad access detected [ 34.311325] [ 34.312823] Memory state around the buggy address: [ 34.317616] ffff888100e05f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.324835] ffff888100e05f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.332053] >ffff888100e06000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.339271] ^ [ 34.342505] ffff888100e06080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 34.349747] ffff888100e06100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.356970] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 33.393413] ================================================================== [ 33.404943] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x1d8/0x460 [ 33.411930] Free of addr ffff888106ce4001 by task kunit_try_catch/254 [ 33.418370] [ 33.419871] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 33.419879] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.419882] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 33.419885] Call Trace: [ 33.419887] <TASK> [ 33.419889] dump_stack_lvl+0x73/0xb0 [ 33.419893] print_report+0xd1/0x650 [ 33.419898] ? __virt_addr_valid+0x1db/0x2d0 [ 33.419902] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.419907] ? kmem_cache_invalid_free+0x1d8/0x460 [ 33.419910] kasan_report_invalid_free+0x10a/0x130 [ 33.419915] ? kmem_cache_invalid_free+0x1d8/0x460 [ 33.419919] ? kmem_cache_invalid_free+0x1d8/0x460 [ 33.419923] check_slab_allocation+0x11f/0x130 [ 33.419927] __kasan_slab_pre_free+0x28/0x40 [ 33.419931] kmem_cache_free+0xed/0x420 [ 33.419935] ? kmem_cache_alloc_noprof+0x123/0x3f0 [ 33.419939] ? kmem_cache_invalid_free+0x1d8/0x460 [ 33.419943] kmem_cache_invalid_free+0x1d8/0x460 [ 33.419947] ? __pfx_kmem_cache_invalid_free+0x10/0x10 [ 33.419950] ? finish_task_switch.isra.0+0x153/0x700 [ 33.419955] ? __switch_to+0x5d9/0xf60 [ 33.419960] ? dequeue_task_fair+0x166/0x4e0 [ 33.419965] ? ktime_get_ts64+0x83/0x230 [ 33.419970] kunit_try_run_case+0x1a2/0x480 [ 33.419974] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.419978] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 33.419984] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.419988] ? __kthread_parkme+0x82/0x180 [ 33.419993] ? preempt_count_sub+0x50/0x80 [ 33.419997] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.420002] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 33.420006] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.420010] kthread+0x334/0x6f0 [ 33.420014] ? trace_preempt_on+0x20/0xc0 [ 33.420019] ? __pfx_kthread+0x10/0x10 [ 33.420023] ? _raw_spin_unlock_irq+0x47/0x80 [ 33.420027] ? calculate_sigpending+0x7b/0xa0 [ 33.420031] ? __pfx_kthread+0x10/0x10 [ 33.420035] ret_from_fork+0x3e/0x80 [ 33.420040] ? __pfx_kthread+0x10/0x10 [ 33.420044] ret_from_fork_asm+0x1a/0x30 [ 33.420050] </TASK> [ 33.420052] [ 33.613109] Allocated by task 254: [ 33.616515] kasan_save_stack+0x45/0x70 [ 33.620362] kasan_save_track+0x18/0x40 [ 33.624201] kasan_save_alloc_info+0x3b/0x50 [ 33.628475] __kasan_slab_alloc+0x91/0xa0 [ 33.632494] kmem_cache_alloc_noprof+0x123/0x3f0 [ 33.637115] kmem_cache_invalid_free+0x157/0x460 [ 33.641761] kunit_try_run_case+0x1a2/0x480 [ 33.645954] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 33.651360] kthread+0x334/0x6f0 [ 33.654594] ret_from_fork+0x3e/0x80 [ 33.658174] ret_from_fork_asm+0x1a/0x30 [ 33.662099] [ 33.663598] The buggy address belongs to the object at ffff888106ce4000 [ 33.663598] which belongs to the cache test_cache of size 200 [ 33.676025] The buggy address is located 1 bytes inside of [ 33.676025] 200-byte region [ffff888106ce4000, ffff888106ce40c8) [ 33.687586] [ 33.689084] The buggy address belongs to the physical page: [ 33.694657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106ce4 [ 33.702707] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.710378] flags: 0x200000000000040(head|node=0|zone=2) [ 33.715704] page_type: f5(slab) [ 33.718898] raw: 0200000000000040 ffff888100ac7400 dead000000000122 0000000000000000 [ 33.726637] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 33.734377] head: 0200000000000040 ffff888100ac7400 dead000000000122 0000000000000000 [ 33.742210] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 33.750038] head: 0200000000000001 ffffea00041b3901 00000000ffffffff 00000000ffffffff [ 33.757871] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 33.765717] page dumped because: kasan: bad access detected [ 33.771319] [ 33.772819] Memory state around the buggy address: [ 33.777613] ffff888106ce3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.784832] ffff888106ce3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.792049] >ffff888106ce4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.799269] ^ [ 33.802503] ffff888106ce4080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 33.809760] ffff888106ce4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.816981] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 32.912279] ================================================================== [ 32.923094] BUG: KASAN: double-free in kmem_cache_double_free+0x1e5/0x480 [ 32.929893] Free of addr ffff888100e06000 by task kunit_try_catch/252 [ 32.936332] [ 32.937837] CPU: 2 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 32.937846] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.937848] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 32.937852] Call Trace: [ 32.937854] <TASK> [ 32.937856] dump_stack_lvl+0x73/0xb0 [ 32.937861] print_report+0xd1/0x650 [ 32.937866] ? __virt_addr_valid+0x1db/0x2d0 [ 32.937871] ? kasan_complete_mode_report_info+0x64/0x200 [ 32.937875] ? kmem_cache_double_free+0x1e5/0x480 [ 32.937878] kasan_report_invalid_free+0x10a/0x130 [ 32.937883] ? kmem_cache_double_free+0x1e5/0x480 [ 32.937887] ? kmem_cache_double_free+0x1e5/0x480 [ 32.937891] check_slab_allocation+0x101/0x130 [ 32.937895] __kasan_slab_pre_free+0x28/0x40 [ 32.937899] kmem_cache_free+0xed/0x420 [ 32.937903] ? kmem_cache_alloc_noprof+0x123/0x3f0 [ 32.937907] ? kmem_cache_double_free+0x1e5/0x480 [ 32.937911] kmem_cache_double_free+0x1e5/0x480 [ 32.937915] ? __pfx_kmem_cache_double_free+0x10/0x10 [ 32.937918] ? finish_task_switch.isra.0+0x153/0x700 [ 32.937923] ? __switch_to+0x5d9/0xf60 [ 32.937927] ? dequeue_task_fair+0x166/0x4e0 [ 32.937933] ? ktime_get_ts64+0x83/0x230 [ 32.937938] kunit_try_run_case+0x1a2/0x480 [ 32.937944] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.937948] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 32.937953] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.937957] ? __kthread_parkme+0x82/0x180 [ 32.937962] ? preempt_count_sub+0x50/0x80 [ 32.937966] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.937970] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 32.937975] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.937979] kthread+0x334/0x6f0 [ 32.937983] ? trace_preempt_on+0x20/0xc0 [ 32.937988] ? __pfx_kthread+0x10/0x10 [ 32.937992] ? _raw_spin_unlock_irq+0x47/0x80 [ 32.937996] ? calculate_sigpending+0x7b/0xa0 [ 32.938000] ? __pfx_kthread+0x10/0x10 [ 32.938004] ret_from_fork+0x3e/0x80 [ 32.938009] ? __pfx_kthread+0x10/0x10 [ 32.938013] ret_from_fork_asm+0x1a/0x30 [ 32.938019] </TASK> [ 32.938021] [ 33.130485] Allocated by task 252: [ 33.133889] kasan_save_stack+0x45/0x70 [ 33.137747] kasan_save_track+0x18/0x40 [ 33.141586] kasan_save_alloc_info+0x3b/0x50 [ 33.145857] __kasan_slab_alloc+0x91/0xa0 [ 33.149871] kmem_cache_alloc_noprof+0x123/0x3f0 [ 33.154490] kmem_cache_double_free+0x14f/0x480 [ 33.159021] kunit_try_run_case+0x1a2/0x480 [ 33.163206] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 33.168608] kthread+0x334/0x6f0 [ 33.171848] ret_from_fork+0x3e/0x80 [ 33.175427] ret_from_fork_asm+0x1a/0x30 [ 33.179352] [ 33.180854] Freed by task 252: [ 33.183911] kasan_save_stack+0x45/0x70 [ 33.187750] kasan_save_track+0x18/0x40 [ 33.191590] kasan_save_free_info+0x3f/0x60 [ 33.195776] __kasan_slab_free+0x56/0x70 [ 33.199717] kmem_cache_free+0x249/0x420 [ 33.203654] kmem_cache_double_free+0x16a/0x480 [ 33.208220] kunit_try_run_case+0x1a2/0x480 [ 33.212407] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 33.217805] kthread+0x334/0x6f0 [ 33.221037] ret_from_fork+0x3e/0x80 [ 33.224616] ret_from_fork_asm+0x1a/0x30 [ 33.228543] [ 33.230042] The buggy address belongs to the object at ffff888100e06000 [ 33.230042] which belongs to the cache test_cache of size 200 [ 33.242471] The buggy address is located 0 bytes inside of [ 33.242471] 200-byte region [ffff888100e06000, ffff888100e060c8) [ 33.254038] [ 33.255539] The buggy address belongs to the physical page: [ 33.261111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100e06 [ 33.269117] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.276770] flags: 0x200000000000040(head|node=0|zone=2) [ 33.282084] page_type: f5(slab) [ 33.285230] raw: 0200000000000040 ffff888100dbcb40 dead000000000122 0000000000000000 [ 33.292977] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 33.300733] head: 0200000000000040 ffff888100dbcb40 dead000000000122 0000000000000000 [ 33.308559] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 33.316386] head: 0200000000000001 ffffea0004038181 00000000ffffffff 00000000ffffffff [ 33.324221] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 33.332053] page dumped because: kasan: bad access detected [ 33.337626] [ 33.339125] Memory state around the buggy address: [ 33.343918] ffff888100e05f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.351136] ffff888100e05f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.358356] >ffff888100e06000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.365583] ^ [ 33.368815] ffff888100e06080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 33.376036] ffff888100e06100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.383261] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 32.483043] ================================================================== [ 32.493851] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x402/0x530 [ 32.500550] Read of size 1 at addr ffff888107fba0c8 by task kunit_try_catch/250 [ 32.507858] [ 32.509358] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 32.509366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.509369] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 32.509372] Call Trace: [ 32.509374] <TASK> [ 32.509375] dump_stack_lvl+0x73/0xb0 [ 32.509379] print_report+0xd1/0x650 [ 32.509384] ? __virt_addr_valid+0x1db/0x2d0 [ 32.509388] ? kmem_cache_oob+0x402/0x530 [ 32.509391] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.509395] ? kmem_cache_oob+0x402/0x530 [ 32.509398] kasan_report+0x141/0x180 [ 32.509403] ? kmem_cache_oob+0x402/0x530 [ 32.509407] __asan_report_load1_noabort+0x18/0x20 [ 32.509410] kmem_cache_oob+0x402/0x530 [ 32.509413] ? trace_hardirqs_on+0x37/0xe0 [ 32.509418] ? __pfx_kmem_cache_oob+0x10/0x10 [ 32.509421] ? finish_task_switch.isra.0+0x153/0x700 [ 32.509425] ? __switch_to+0x5d9/0xf60 [ 32.509429] ? dequeue_task_fair+0x166/0x4e0 [ 32.509435] ? ktime_get_ts64+0x83/0x230 [ 32.509440] kunit_try_run_case+0x1a2/0x480 [ 32.509444] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.509448] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 32.509453] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.509457] ? __kthread_parkme+0x82/0x180 [ 32.509461] ? preempt_count_sub+0x50/0x80 [ 32.509466] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.509470] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 32.509475] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.509479] kthread+0x334/0x6f0 [ 32.509483] ? trace_preempt_on+0x20/0xc0 [ 32.509487] ? __pfx_kthread+0x10/0x10 [ 32.509491] ? _raw_spin_unlock_irq+0x47/0x80 [ 32.509495] ? calculate_sigpending+0x7b/0xa0 [ 32.509499] ? __pfx_kthread+0x10/0x10 [ 32.509503] ret_from_fork+0x3e/0x80 [ 32.509507] ? __pfx_kthread+0x10/0x10 [ 32.509512] ret_from_fork_asm+0x1a/0x30 [ 32.509517] </TASK> [ 32.509519] [ 32.684396] Allocated by task 250: [ 32.687803] kasan_save_stack+0x45/0x70 [ 32.691641] kasan_save_track+0x18/0x40 [ 32.695481] kasan_save_alloc_info+0x3b/0x50 [ 32.699760] __kasan_slab_alloc+0x91/0xa0 [ 32.703774] kmem_cache_alloc_noprof+0x123/0x3f0 [ 32.708393] kmem_cache_oob+0x157/0x530 [ 32.712233] kunit_try_run_case+0x1a2/0x480 [ 32.716417] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 32.721817] kthread+0x334/0x6f0 [ 32.725050] ret_from_fork+0x3e/0x80 [ 32.728630] ret_from_fork_asm+0x1a/0x30 [ 32.732554] [ 32.734054] The buggy address belongs to the object at ffff888107fba000 [ 32.734054] which belongs to the cache test_cache of size 200 [ 32.746482] The buggy address is located 0 bytes to the right of [ 32.746482] allocated 200-byte region [ffff888107fba000, ffff888107fba0c8) [ 32.759428] [ 32.760927] The buggy address belongs to the physical page: [ 32.766503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107fba [ 32.774508] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.782160] flags: 0x200000000000040(head|node=0|zone=2) [ 32.787474] page_type: f5(slab) [ 32.790622] raw: 0200000000000040 ffff8881003423c0 dead000000000122 0000000000000000 [ 32.798367] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 32.806108] head: 0200000000000040 ffff8881003423c0 dead000000000122 0000000000000000 [ 32.813940] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 32.821766] head: 0200000000000001 ffffea00041fee81 00000000ffffffff 00000000ffffffff [ 32.829592] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.837418] page dumped because: kasan: bad access detected [ 32.842989] [ 32.844489] Memory state around the buggy address: [ 32.849281] ffff888107fb9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.856500] ffff888107fba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.863758] >ffff888107fba080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 32.870980] ^ [ 32.876554] ffff888107fba100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.883774] ffff888107fba180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.890992] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 32.025420] ================================================================== [ 32.035614] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x4d6/0x560 [ 32.042330] Read of size 8 at addr ffff888105bf9a00 by task kunit_try_catch/243 [ 32.049635] [ 32.051137] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 32.051146] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.051148] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 32.051152] Call Trace: [ 32.051154] <TASK> [ 32.051156] dump_stack_lvl+0x73/0xb0 [ 32.051161] print_report+0xd1/0x650 [ 32.051165] ? __virt_addr_valid+0x1db/0x2d0 [ 32.051170] ? workqueue_uaf+0x4d6/0x560 [ 32.051174] ? kasan_complete_mode_report_info+0x64/0x200 [ 32.051178] ? workqueue_uaf+0x4d6/0x560 [ 32.051182] kasan_report+0x141/0x180 [ 32.051186] ? workqueue_uaf+0x4d6/0x560 [ 32.051191] __asan_report_load8_noabort+0x18/0x20 [ 32.051195] workqueue_uaf+0x4d6/0x560 [ 32.051199] ? __pfx_workqueue_uaf+0x10/0x10 [ 32.051203] ? __schedule+0x10cc/0x2b30 [ 32.051208] ? ktime_get_ts64+0x83/0x230 [ 32.051214] kunit_try_run_case+0x1a2/0x480 [ 32.051219] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.051223] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 32.051227] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.051232] ? __kthread_parkme+0x82/0x180 [ 32.051236] ? preempt_count_sub+0x50/0x80 [ 32.051241] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.051245] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 32.051250] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.051253] kthread+0x334/0x6f0 [ 32.051258] ? trace_preempt_on+0x20/0xc0 [ 32.051262] ? __pfx_kthread+0x10/0x10 [ 32.051267] ? _raw_spin_unlock_irq+0x47/0x80 [ 32.051271] ? calculate_sigpending+0x7b/0xa0 [ 32.051275] ? __pfx_kthread+0x10/0x10 [ 32.051279] ret_from_fork+0x3e/0x80 [ 32.051284] ? __pfx_kthread+0x10/0x10 [ 32.051288] ret_from_fork_asm+0x1a/0x30 [ 32.051294] </TASK> [ 32.051296] [ 32.212474] Allocated by task 243: [ 32.215881] kasan_save_stack+0x45/0x70 [ 32.219755] kasan_save_track+0x18/0x40 [ 32.223593] kasan_save_alloc_info+0x3b/0x50 [ 32.227867] __kasan_kmalloc+0xb7/0xc0 [ 32.231619] __kmalloc_cache_noprof+0x189/0x420 [ 32.236151] workqueue_uaf+0x152/0x560 [ 32.239902] kunit_try_run_case+0x1a2/0x480 [ 32.244091] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 32.249490] kthread+0x334/0x6f0 [ 32.252749] ret_from_fork+0x3e/0x80 [ 32.256336] ret_from_fork_asm+0x1a/0x30 [ 32.260271] [ 32.261769] Freed by task 10: [ 32.264762] kasan_save_stack+0x45/0x70 [ 32.268607] kasan_save_track+0x18/0x40 [ 32.272447] kasan_save_free_info+0x3f/0x60 [ 32.276631] __kasan_slab_free+0x56/0x70 [ 32.280558] kfree+0x222/0x3f0 [ 32.283617] workqueue_uaf_work+0x12/0x20 [ 32.287630] process_one_work+0x5eb/0xf60 [ 32.291651] worker_thread+0x725/0x1320 [ 32.295524] kthread+0x334/0x6f0 [ 32.298763] ret_from_fork+0x3e/0x80 [ 32.302343] ret_from_fork_asm+0x1a/0x30 [ 32.306269] [ 32.307767] Last potentially related work creation: [ 32.312649] kasan_save_stack+0x45/0x70 [ 32.316487] kasan_record_aux_stack+0xb2/0xc0 [ 32.320846] __queue_work+0x626/0xeb0 [ 32.324513] queue_work_on+0xb6/0xc0 [ 32.328093] workqueue_uaf+0x26d/0x560 [ 32.331843] kunit_try_run_case+0x1a2/0x480 [ 32.336029] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 32.341430] kthread+0x334/0x6f0 [ 32.344660] ret_from_fork+0x3e/0x80 [ 32.348268] ret_from_fork_asm+0x1a/0x30 [ 32.352192] [ 32.353702] The buggy address belongs to the object at ffff888105bf9a00 [ 32.353702] which belongs to the cache kmalloc-32 of size 32 [ 32.366086] The buggy address is located 0 bytes inside of [ 32.366086] freed 32-byte region [ffff888105bf9a00, ffff888105bf9a20) [ 32.378080] [ 32.379578] The buggy address belongs to the physical page: [ 32.385150] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bf9 [ 32.393150] flags: 0x200000000000000(node=0|zone=2) [ 32.398029] page_type: f5(slab) [ 32.401175] raw: 0200000000000000 ffff888100042780 dead000000000122 0000000000000000 [ 32.408913] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 32.416653] page dumped because: kasan: bad access detected [ 32.422260] [ 32.423761] Memory state around the buggy address: [ 32.428552] ffff888105bf9900: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc [ 32.435769] ffff888105bf9980: 00 00 07 fc fc fc fc fc 00 00 00 07 fc fc fc fc [ 32.442988] >ffff888105bf9a00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 32.450209] ^ [ 32.453442] ffff888105bf9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.460698] ffff888105bf9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.467964] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 31.489776] ================================================================== [ 31.500171] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x50/0x60 [ 31.506884] Read of size 4 at addr ffff888107f04880 by task swapper/1/0 [ 31.513497] [ 31.514998] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 31.515006] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.515009] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 31.515012] Call Trace: [ 31.515014] <IRQ> [ 31.515016] dump_stack_lvl+0x73/0xb0 [ 31.515021] print_report+0xd1/0x650 [ 31.515026] ? __virt_addr_valid+0x1db/0x2d0 [ 31.515030] ? rcu_uaf_reclaim+0x50/0x60 [ 31.515034] ? kasan_complete_mode_report_info+0x64/0x200 [ 31.515038] ? rcu_uaf_reclaim+0x50/0x60 [ 31.515042] kasan_report+0x141/0x180 [ 31.515046] ? rcu_uaf_reclaim+0x50/0x60 [ 31.515051] __asan_report_load4_noabort+0x18/0x20 [ 31.515054] rcu_uaf_reclaim+0x50/0x60 [ 31.515058] rcu_core+0x669/0x1c30 [ 31.515063] ? enqueue_hrtimer+0xfe/0x210 [ 31.515068] ? __pfx_rcu_core+0x10/0x10 [ 31.515072] ? ktime_get+0x68/0x150 [ 31.515077] ? handle_softirqs+0x18e/0x730 [ 31.515082] rcu_core_si+0x12/0x20 [ 31.515086] handle_softirqs+0x206/0x730 [ 31.515090] ? hrtimer_interrupt+0x2fe/0x780 [ 31.515094] ? __pfx_handle_softirqs+0x10/0x10 [ 31.515099] __irq_exit_rcu+0xc9/0x110 [ 31.515103] irq_exit_rcu+0x12/0x20 [ 31.515108] sysvec_apic_timer_interrupt+0x81/0x90 [ 31.515113] </IRQ> [ 31.515114] <TASK> [ 31.515116] asm_sysvec_apic_timer_interrupt+0x1f/0x30 [ 31.515120] RIP: 0010:cpuidle_enter_state+0xe5/0x2f0 [ 31.515125] Code: ff ff ff 48 89 45 c0 e8 89 e3 f3 fe 31 ff e8 42 27 6b fc 80 7d d0 00 0f 85 27 01 00 00 e8 23 ef f3 fe 84 c0 0f 84 0f 01 00 00 <45> 85 ed 0f 88 ef 00 00 00 4d 63 fd 48 8b 7d c0 4b 8d 04 7f 49 8d [ 31.515133] RSP: 0000:ffff8881008efd70 EFLAGS: 00000246 [ 31.515137] RAX: 0000000000000000 RBX: ffff8881042a6000 RCX: 000000000000001f [ 31.515141] RDX: 1ffff11083ed6c0f RSI: 0000000000000001 RDI: ffff88841f6b6078 [ 31.515145] RBP: ffff8881008efdb8 R08: 0000000000000002 R09: ffffed1083ed6102 [ 31.515148] R10: ffff88841f6b0813 R11: 0000000000000006 R12: ffffffffba5a6e80 [ 31.515151] R13: 0000000000000002 R14: 0000000000000002 R15: ffffffffba5a6f68 [ 31.515156] ? check_tsc_sync_source+0x260/0x290 [ 31.515161] cpuidle_enter+0x53/0xb0 [ 31.515165] ? cpuidle_select+0x5f/0xb0 [ 31.515169] do_idle+0x360/0x4f0 [ 31.515173] ? __pfx_do_idle+0x10/0x10 [ 31.515176] ? _raw_spin_unlock_irqrestore+0x49/0x90 [ 31.515181] ? complete+0x15b/0x1d0 [ 31.515186] cpu_startup_entry+0x5c/0x70 [ 31.515189] start_secondary+0x211/0x290 [ 31.515193] ? __pfx_start_secondary+0x10/0x10 [ 31.515197] common_startup_64+0x13e/0x148 [ 31.515203] </TASK> [ 31.515205] [ 31.750633] Allocated by task 241: [ 31.754038] kasan_save_stack+0x45/0x70 [ 31.757879] kasan_save_track+0x18/0x40 [ 31.761737] kasan_save_alloc_info+0x3b/0x50 [ 31.766014] __kasan_kmalloc+0xb7/0xc0 [ 31.769769] __kmalloc_cache_noprof+0x189/0x420 [ 31.774309] rcu_uaf+0xb0/0x330 [ 31.777455] kunit_try_run_case+0x1a2/0x480 [ 31.781649] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 31.787048] kthread+0x334/0x6f0 [ 31.790280] ret_from_fork+0x3e/0x80 [ 31.793859] ret_from_fork_asm+0x1a/0x30 [ 31.797786] [ 31.799284] Freed by task 0: [ 31.802171] kasan_save_stack+0x45/0x70 [ 31.806011] kasan_save_track+0x18/0x40 [ 31.809850] kasan_save_free_info+0x3f/0x60 [ 31.814036] __kasan_slab_free+0x56/0x70 [ 31.817960] kfree+0x222/0x3f0 [ 31.821021] rcu_uaf_reclaim+0x1f/0x60 [ 31.824780] rcu_core+0x669/0x1c30 [ 31.828187] rcu_core_si+0x12/0x20 [ 31.831593] handle_softirqs+0x206/0x730 [ 31.835527] __irq_exit_rcu+0xc9/0x110 [ 31.839281] irq_exit_rcu+0x12/0x20 [ 31.842780] sysvec_apic_timer_interrupt+0x81/0x90 [ 31.847573] asm_sysvec_apic_timer_interrupt+0x1f/0x30 [ 31.852734] [ 31.854230] Last potentially related work creation: [ 31.859107] kasan_save_stack+0x45/0x70 [ 31.862947] kasan_record_aux_stack+0xb2/0xc0 [ 31.867305] __call_rcu_common.constprop.0+0x72/0x9c0 [ 31.872359] call_rcu+0x12/0x20 [ 31.875503] rcu_uaf+0x168/0x330 [ 31.878757] kunit_try_run_case+0x1a2/0x480 [ 31.882948] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 31.888349] kthread+0x334/0x6f0 [ 31.891580] ret_from_fork+0x3e/0x80 [ 31.895160] ret_from_fork_asm+0x1a/0x30 [ 31.899087] [ 31.900585] The buggy address belongs to the object at ffff888107f04880 [ 31.900585] which belongs to the cache kmalloc-32 of size 32 [ 31.912925] The buggy address is located 0 bytes inside of [ 31.912925] freed 32-byte region [ffff888107f04880, ffff888107f048a0) [ 31.924920] [ 31.926418] The buggy address belongs to the physical page: [ 31.931991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f04 [ 31.939989] flags: 0x200000000000000(node=0|zone=2) [ 31.944868] page_type: f5(slab) [ 31.948016] raw: 0200000000000000 ffff888100042780 dead000000000122 0000000000000000 [ 31.955765] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 31.963510] page dumped because: kasan: bad access detected [ 31.969082] [ 31.970581] Memory state around the buggy address: [ 31.975376] ffff888107f04780: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 31.982593] ffff888107f04800: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 31.989814] >ffff888107f04880: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 31.997031] ^ [ 32.000265] ffff888107f04900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.007484] ffff888107f04980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.014715] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 30.271466] ================================================================== [ 30.282984] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0 [ 30.289343] Read of size 1 at addr ffff88810633a600 by task kunit_try_catch/239 [ 30.296651] [ 30.298151] CPU: 3 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 30.298159] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.298162] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 30.298165] Call Trace: [ 30.298167] <TASK> [ 30.298169] dump_stack_lvl+0x73/0xb0 [ 30.298172] print_report+0xd1/0x650 [ 30.298177] ? __virt_addr_valid+0x1db/0x2d0 [ 30.298180] ? ksize_uaf+0x19d/0x6c0 [ 30.298184] ? kasan_complete_mode_report_info+0x64/0x200 [ 30.298189] ? ksize_uaf+0x19d/0x6c0 [ 30.298193] kasan_report+0x141/0x180 [ 30.298197] ? ksize_uaf+0x19d/0x6c0 [ 30.298201] ? ksize_uaf+0x19d/0x6c0 [ 30.298205] __kasan_check_byte+0x3d/0x50 [ 30.298210] ksize+0x20/0x60 [ 30.298213] ksize_uaf+0x19d/0x6c0 [ 30.298217] ? __pfx_ksize_uaf+0x10/0x10 [ 30.298221] ? __schedule+0x10cc/0x2b30 [ 30.298226] ? ktime_get_ts64+0x83/0x230 [ 30.298230] kunit_try_run_case+0x1a2/0x480 [ 30.298235] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.298239] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.298244] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.298248] ? __kthread_parkme+0x82/0x180 [ 30.298252] ? preempt_count_sub+0x50/0x80 [ 30.298257] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.298261] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 30.298265] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.298269] kthread+0x334/0x6f0 [ 30.298273] ? trace_preempt_on+0x20/0xc0 [ 30.298277] ? __pfx_kthread+0x10/0x10 [ 30.298282] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.298286] ? calculate_sigpending+0x7b/0xa0 [ 30.298290] ? __pfx_kthread+0x10/0x10 [ 30.298294] ret_from_fork+0x3e/0x80 [ 30.298298] ? __pfx_kthread+0x10/0x10 [ 30.298302] ret_from_fork_asm+0x1a/0x30 [ 30.298308] </TASK> [ 30.298309] [ 30.463303] Allocated by task 239: [ 30.466755] kasan_save_stack+0x45/0x70 [ 30.470599] kasan_save_track+0x18/0x40 [ 30.474438] kasan_save_alloc_info+0x3b/0x50 [ 30.478723] __kasan_kmalloc+0xb7/0xc0 [ 30.482505] __kmalloc_cache_noprof+0x189/0x420 [ 30.487040] ksize_uaf+0xaa/0x6c0 [ 30.490358] kunit_try_run_case+0x1a2/0x480 [ 30.494545] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 30.499943] kthread+0x334/0x6f0 [ 30.503174] ret_from_fork+0x3e/0x80 [ 30.506764] ret_from_fork_asm+0x1a/0x30 [ 30.510703] [ 30.512249] Freed by task 239: [ 30.515310] kasan_save_stack+0x45/0x70 [ 30.519147] kasan_save_track+0x18/0x40 [ 30.522987] kasan_save_free_info+0x3f/0x60 [ 30.527171] __kasan_slab_free+0x56/0x70 [ 30.531099] kfree+0x222/0x3f0 [ 30.534158] ksize_uaf+0x12c/0x6c0 [ 30.537562] kunit_try_run_case+0x1a2/0x480 [ 30.541757] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 30.547157] kthread+0x334/0x6f0 [ 30.550389] ret_from_fork+0x3e/0x80 [ 30.553969] ret_from_fork_asm+0x1a/0x30 [ 30.557894] [ 30.559394] The buggy address belongs to the object at ffff88810633a600 [ 30.559394] which belongs to the cache kmalloc-128 of size 128 [ 30.571908] The buggy address is located 0 bytes inside of [ 30.571908] freed 128-byte region [ffff88810633a600, ffff88810633a680) [ 30.583989] [ 30.585486] The buggy address belongs to the physical page: [ 30.591060] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10633a [ 30.599058] flags: 0x200000000000000(node=0|zone=2) [ 30.603939] page_type: f5(slab) [ 30.607084] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 30.614825] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.622571] page dumped because: kasan: bad access detected [ 30.628142] [ 30.629642] Memory state around the buggy address: [ 30.634436] ffff88810633a500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.641654] ffff88810633a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.648908] >ffff88810633a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.656125] ^ [ 30.659361] ffff88810633a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.666587] ffff88810633a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.673805] ================================================================== [ 31.080729] ================================================================== [ 31.087959] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0 [ 31.094318] Read of size 1 at addr ffff88810633a678 by task kunit_try_catch/239 [ 31.101625] [ 31.103125] CPU: 3 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 31.103133] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.103135] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 31.103138] Call Trace: [ 31.103139] <TASK> [ 31.103141] dump_stack_lvl+0x73/0xb0 [ 31.103144] print_report+0xd1/0x650 [ 31.103149] ? __virt_addr_valid+0x1db/0x2d0 [ 31.103152] ? ksize_uaf+0x5e4/0x6c0 [ 31.103156] ? kasan_complete_mode_report_info+0x64/0x200 [ 31.103160] ? ksize_uaf+0x5e4/0x6c0 [ 31.103164] kasan_report+0x141/0x180 [ 31.103168] ? ksize_uaf+0x5e4/0x6c0 [ 31.103173] __asan_report_load1_noabort+0x18/0x20 [ 31.103176] ksize_uaf+0x5e4/0x6c0 [ 31.103180] ? __pfx_ksize_uaf+0x10/0x10 [ 31.103184] ? __schedule+0x10cc/0x2b30 [ 31.103189] ? ktime_get_ts64+0x83/0x230 [ 31.103193] kunit_try_run_case+0x1a2/0x480 [ 31.103197] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.103201] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 31.103206] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.103210] ? __kthread_parkme+0x82/0x180 [ 31.103214] ? preempt_count_sub+0x50/0x80 [ 31.103219] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.103223] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 31.103226] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.103230] kthread+0x334/0x6f0 [ 31.103234] ? trace_preempt_on+0x20/0xc0 [ 31.103239] ? __pfx_kthread+0x10/0x10 [ 31.103243] ? _raw_spin_unlock_irq+0x47/0x80 [ 31.103247] ? calculate_sigpending+0x7b/0xa0 [ 31.103250] ? __pfx_kthread+0x10/0x10 [ 31.103254] ret_from_fork+0x3e/0x80 [ 31.103258] ? __pfx_kthread+0x10/0x10 [ 31.103262] ret_from_fork_asm+0x1a/0x30 [ 31.103268] </TASK> [ 31.103269] [ 31.262617] Allocated by task 239: [ 31.266022] kasan_save_stack+0x45/0x70 [ 31.269862] kasan_save_track+0x18/0x40 [ 31.273704] kasan_save_alloc_info+0x3b/0x50 [ 31.278019] __kasan_kmalloc+0xb7/0xc0 [ 31.281771] __kmalloc_cache_noprof+0x189/0x420 [ 31.286302] ksize_uaf+0xaa/0x6c0 [ 31.289621] kunit_try_run_case+0x1a2/0x480 [ 31.293807] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 31.299208] kthread+0x334/0x6f0 [ 31.302438] ret_from_fork+0x3e/0x80 [ 31.306018] ret_from_fork_asm+0x1a/0x30 [ 31.309944] [ 31.311445] Freed by task 239: [ 31.314502] kasan_save_stack+0x45/0x70 [ 31.318343] kasan_save_track+0x18/0x40 [ 31.322182] kasan_save_free_info+0x3f/0x60 [ 31.326367] __kasan_slab_free+0x56/0x70 [ 31.330294] kfree+0x222/0x3f0 [ 31.333353] ksize_uaf+0x12c/0x6c0 [ 31.336766] kunit_try_run_case+0x1a2/0x480 [ 31.340953] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 31.346352] kthread+0x334/0x6f0 [ 31.349593] ret_from_fork+0x3e/0x80 [ 31.353172] ret_from_fork_asm+0x1a/0x30 [ 31.357098] [ 31.358597] The buggy address belongs to the object at ffff88810633a600 [ 31.358597] which belongs to the cache kmalloc-128 of size 128 [ 31.371112] The buggy address is located 120 bytes inside of [ 31.371112] freed 128-byte region [ffff88810633a600, ffff88810633a680) [ 31.383365] [ 31.384864] The buggy address belongs to the physical page: [ 31.390437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10633a [ 31.398445] flags: 0x200000000000000(node=0|zone=2) [ 31.403322] page_type: f5(slab) [ 31.406471] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 31.414219] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.421965] page dumped because: kasan: bad access detected [ 31.427536] [ 31.429037] Memory state around the buggy address: [ 31.433830] ffff88810633a500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.441057] ffff88810633a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.448275] >ffff88810633a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.455494] ^ [ 31.462626] ffff88810633a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.469845] ffff88810633a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.477065] ================================================================== [ 30.681051] ================================================================== [ 30.688280] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0 [ 30.694639] Read of size 1 at addr ffff88810633a600 by task kunit_try_catch/239 [ 30.701946] [ 30.703445] CPU: 3 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 30.703453] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.703455] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 30.703458] Call Trace: [ 30.703460] <TASK> [ 30.703462] dump_stack_lvl+0x73/0xb0 [ 30.703465] print_report+0xd1/0x650 [ 30.703469] ? __virt_addr_valid+0x1db/0x2d0 [ 30.703473] ? ksize_uaf+0x5fe/0x6c0 [ 30.703477] ? kasan_complete_mode_report_info+0x64/0x200 [ 30.703481] ? ksize_uaf+0x5fe/0x6c0 [ 30.703485] kasan_report+0x141/0x180 [ 30.703489] ? ksize_uaf+0x5fe/0x6c0 [ 30.703494] __asan_report_load1_noabort+0x18/0x20 [ 30.703497] ksize_uaf+0x5fe/0x6c0 [ 30.703501] ? __pfx_ksize_uaf+0x10/0x10 [ 30.703505] ? __schedule+0x10cc/0x2b30 [ 30.703510] ? ktime_get_ts64+0x83/0x230 [ 30.703514] kunit_try_run_case+0x1a2/0x480 [ 30.703519] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.703523] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.703527] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.703532] ? __kthread_parkme+0x82/0x180 [ 30.703535] ? preempt_count_sub+0x50/0x80 [ 30.703540] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.703544] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 30.703548] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.703552] kthread+0x334/0x6f0 [ 30.703556] ? trace_preempt_on+0x20/0xc0 [ 30.703560] ? __pfx_kthread+0x10/0x10 [ 30.703564] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.703568] ? calculate_sigpending+0x7b/0xa0 [ 30.703572] ? __pfx_kthread+0x10/0x10 [ 30.703576] ret_from_fork+0x3e/0x80 [ 30.703580] ? __pfx_kthread+0x10/0x10 [ 30.703584] ret_from_fork_asm+0x1a/0x30 [ 30.703590] </TASK> [ 30.703591] [ 30.862913] Allocated by task 239: [ 30.866318] kasan_save_stack+0x45/0x70 [ 30.870158] kasan_save_track+0x18/0x40 [ 30.873996] kasan_save_alloc_info+0x3b/0x50 [ 30.878270] __kasan_kmalloc+0xb7/0xc0 [ 30.882022] __kmalloc_cache_noprof+0x189/0x420 [ 30.886555] ksize_uaf+0xaa/0x6c0 [ 30.889874] kunit_try_run_case+0x1a2/0x480 [ 30.894057] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 30.899458] kthread+0x334/0x6f0 [ 30.902702] ret_from_fork+0x3e/0x80 [ 30.906330] ret_from_fork_asm+0x1a/0x30 [ 30.910255] [ 30.911754] Freed by task 239: [ 30.914814] kasan_save_stack+0x45/0x70 [ 30.918653] kasan_save_track+0x18/0x40 [ 30.922517] kasan_save_free_info+0x3f/0x60 [ 30.926718] __kasan_slab_free+0x56/0x70 [ 30.930700] kfree+0x222/0x3f0 [ 30.933784] ksize_uaf+0x12c/0x6c0 [ 30.937192] kunit_try_run_case+0x1a2/0x480 [ 30.941386] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 30.946786] kthread+0x334/0x6f0 [ 30.950024] ret_from_fork+0x3e/0x80 [ 30.953603] ret_from_fork_asm+0x1a/0x30 [ 30.957532] [ 30.959030] The buggy address belongs to the object at ffff88810633a600 [ 30.959030] which belongs to the cache kmalloc-128 of size 128 [ 30.971543] The buggy address is located 0 bytes inside of [ 30.971543] freed 128-byte region [ffff88810633a600, ffff88810633a680) [ 30.983624] [ 30.985125] The buggy address belongs to the physical page: [ 30.990703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10633a [ 30.998752] flags: 0x200000000000000(node=0|zone=2) [ 31.003635] page_type: f5(slab) [ 31.006782] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 31.014529] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.022268] page dumped because: kasan: bad access detected [ 31.027839] [ 31.029340] Memory state around the buggy address: [ 31.034134] ffff88810633a500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.041361] ffff88810633a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.048587] >ffff88810633a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.055805] ^ [ 31.059039] ffff88810633a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.066259] ffff88810633a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.073487] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 29.515305] ================================================================== [ 29.522536] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 29.529935] Read of size 1 at addr ffff888107f05378 by task kunit_try_catch/237 [ 29.537244] [ 29.538765] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 29.538773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.538775] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 29.538778] Call Trace: [ 29.538779] <TASK> [ 29.538781] dump_stack_lvl+0x73/0xb0 [ 29.538785] print_report+0xd1/0x650 [ 29.538789] ? __virt_addr_valid+0x1db/0x2d0 [ 29.538792] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 29.538797] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.538801] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 29.538805] kasan_report+0x141/0x180 [ 29.538810] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 29.538815] __asan_report_load1_noabort+0x18/0x20 [ 29.538819] ksize_unpoisons_memory+0x7e9/0x9b0 [ 29.538823] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 29.538828] ? finish_task_switch.isra.0+0x153/0x700 [ 29.538832] ? __switch_to+0x5d9/0xf60 [ 29.538836] ? dequeue_task_fair+0x166/0x4e0 [ 29.538840] ? __schedule+0x10cc/0x2b30 [ 29.538844] ? ktime_get_ts64+0x83/0x230 [ 29.538849] kunit_try_run_case+0x1a2/0x480 [ 29.538853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.538857] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.538862] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.538866] ? __kthread_parkme+0x82/0x180 [ 29.538870] ? preempt_count_sub+0x50/0x80 [ 29.538875] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.538879] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 29.538883] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.538887] kthread+0x334/0x6f0 [ 29.538891] ? trace_preempt_on+0x20/0xc0 [ 29.538895] ? __pfx_kthread+0x10/0x10 [ 29.538899] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.538903] ? calculate_sigpending+0x7b/0xa0 [ 29.538907] ? __pfx_kthread+0x10/0x10 [ 29.538911] ret_from_fork+0x3e/0x80 [ 29.538915] ? __pfx_kthread+0x10/0x10 [ 29.538920] ret_from_fork_asm+0x1a/0x30 [ 29.538925] </TASK> [ 29.538927] [ 29.716876] Allocated by task 237: [ 29.720282] kasan_save_stack+0x45/0x70 [ 29.724122] kasan_save_track+0x18/0x40 [ 29.727961] kasan_save_alloc_info+0x3b/0x50 [ 29.732233] __kasan_kmalloc+0xb7/0xc0 [ 29.735986] __kmalloc_cache_noprof+0x189/0x420 [ 29.740518] ksize_unpoisons_memory+0xc7/0x9b0 [ 29.744971] kunit_try_run_case+0x1a2/0x480 [ 29.749158] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 29.754558] kthread+0x334/0x6f0 [ 29.757789] ret_from_fork+0x3e/0x80 [ 29.761370] ret_from_fork_asm+0x1a/0x30 [ 29.765296] [ 29.766794] The buggy address belongs to the object at ffff888107f05300 [ 29.766794] which belongs to the cache kmalloc-128 of size 128 [ 29.779309] The buggy address is located 5 bytes to the right of [ 29.779309] allocated 115-byte region [ffff888107f05300, ffff888107f05373) [ 29.792255] [ 29.793763] The buggy address belongs to the physical page: [ 29.799336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f05 [ 29.807336] flags: 0x200000000000000(node=0|zone=2) [ 29.812213] page_type: f5(slab) [ 29.815361] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 29.823110] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.830856] page dumped because: kasan: bad access detected [ 29.836428] [ 29.837927] Memory state around the buggy address: [ 29.842763] ffff888107f05200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.849982] ffff888107f05280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.857201] >ffff888107f05300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.864421] ^ [ 29.871551] ffff888107f05380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.878772] ffff888107f05400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.885990] ================================================================== [ 29.893231] ================================================================== [ 29.900462] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 29.907855] Read of size 1 at addr ffff888107f0537f by task kunit_try_catch/237 [ 29.915160] [ 29.916660] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 29.916688] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.916690] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 29.916693] Call Trace: [ 29.916695] <TASK> [ 29.916696] dump_stack_lvl+0x73/0xb0 [ 29.916700] print_report+0xd1/0x650 [ 29.916704] ? __virt_addr_valid+0x1db/0x2d0 [ 29.916720] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 29.916725] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.916741] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 29.916746] kasan_report+0x141/0x180 [ 29.916750] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 29.916755] __asan_report_load1_noabort+0x18/0x20 [ 29.916759] ksize_unpoisons_memory+0x7b6/0x9b0 [ 29.916763] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 29.916768] ? finish_task_switch.isra.0+0x153/0x700 [ 29.916772] ? __switch_to+0x5d9/0xf60 [ 29.916775] ? dequeue_task_fair+0x166/0x4e0 [ 29.916780] ? __schedule+0x10cc/0x2b30 [ 29.916784] ? ktime_get_ts64+0x83/0x230 [ 29.916789] kunit_try_run_case+0x1a2/0x480 [ 29.916793] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.916797] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.916801] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.916806] ? __kthread_parkme+0x82/0x180 [ 29.916810] ? preempt_count_sub+0x50/0x80 [ 29.916814] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.916818] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 29.916822] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.916826] kthread+0x334/0x6f0 [ 29.916830] ? trace_preempt_on+0x20/0xc0 [ 29.916834] ? __pfx_kthread+0x10/0x10 [ 29.916838] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.916842] ? calculate_sigpending+0x7b/0xa0 [ 29.916846] ? __pfx_kthread+0x10/0x10 [ 29.916850] ret_from_fork+0x3e/0x80 [ 29.916854] ? __pfx_kthread+0x10/0x10 [ 29.916858] ret_from_fork_asm+0x1a/0x30 [ 29.916864] </TASK> [ 29.916865] [ 30.094883] Allocated by task 237: [ 30.098287] kasan_save_stack+0x45/0x70 [ 30.102128] kasan_save_track+0x18/0x40 [ 30.105965] kasan_save_alloc_info+0x3b/0x50 [ 30.110239] __kasan_kmalloc+0xb7/0xc0 [ 30.113990] __kmalloc_cache_noprof+0x189/0x420 [ 30.118523] ksize_unpoisons_memory+0xc7/0x9b0 [ 30.122971] kunit_try_run_case+0x1a2/0x480 [ 30.127165] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 30.132570] kthread+0x334/0x6f0 [ 30.135803] ret_from_fork+0x3e/0x80 [ 30.139384] ret_from_fork_asm+0x1a/0x30 [ 30.143307] [ 30.144798] The buggy address belongs to the object at ffff888107f05300 [ 30.144798] which belongs to the cache kmalloc-128 of size 128 [ 30.157304] The buggy address is located 12 bytes to the right of [ 30.157304] allocated 115-byte region [ffff888107f05300, ffff888107f05373) [ 30.170339] [ 30.171838] The buggy address belongs to the physical page: [ 30.177412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f05 [ 30.185418] flags: 0x200000000000000(node=0|zone=2) [ 30.190298] page_type: f5(slab) [ 30.193443] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 30.201183] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.208921] page dumped because: kasan: bad access detected [ 30.214494] [ 30.215994] Memory state around the buggy address: [ 30.220787] ffff888107f05200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.228015] ffff888107f05280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.235240] >ffff888107f05300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.242459] ^ [ 30.249592] ffff888107f05380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.256812] ffff888107f05400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.264031] ================================================================== [ 29.133247] ================================================================== [ 29.144662] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 29.152131] Read of size 1 at addr ffff888107f05373 by task kunit_try_catch/237 [ 29.159437] [ 29.160937] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 29.160945] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.160947] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 29.160951] Call Trace: [ 29.160952] <TASK> [ 29.160954] dump_stack_lvl+0x73/0xb0 [ 29.160958] print_report+0xd1/0x650 [ 29.160962] ? __virt_addr_valid+0x1db/0x2d0 [ 29.160966] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 29.160970] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.160974] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 29.160979] kasan_report+0x141/0x180 [ 29.160983] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 29.160988] __asan_report_load1_noabort+0x18/0x20 [ 29.160992] ksize_unpoisons_memory+0x81c/0x9b0 [ 29.160996] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 29.161001] ? finish_task_switch.isra.0+0x153/0x700 [ 29.161005] ? __switch_to+0x5d9/0xf60 [ 29.161009] ? dequeue_task_fair+0x166/0x4e0 [ 29.161013] ? __schedule+0x10cc/0x2b30 [ 29.161018] ? ktime_get_ts64+0x83/0x230 [ 29.161022] kunit_try_run_case+0x1a2/0x480 [ 29.161026] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.161031] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.161035] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.161039] ? __kthread_parkme+0x82/0x180 [ 29.161043] ? preempt_count_sub+0x50/0x80 [ 29.161048] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.161052] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 29.161056] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.161060] kthread+0x334/0x6f0 [ 29.161064] ? trace_preempt_on+0x20/0xc0 [ 29.161068] ? __pfx_kthread+0x10/0x10 [ 29.161072] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.161076] ? calculate_sigpending+0x7b/0xa0 [ 29.161080] ? __pfx_kthread+0x10/0x10 [ 29.161084] ret_from_fork+0x3e/0x80 [ 29.161088] ? __pfx_kthread+0x10/0x10 [ 29.161093] ret_from_fork_asm+0x1a/0x30 [ 29.161098] </TASK> [ 29.161100] [ 29.339106] Allocated by task 237: [ 29.342511] kasan_save_stack+0x45/0x70 [ 29.346351] kasan_save_track+0x18/0x40 [ 29.350189] kasan_save_alloc_info+0x3b/0x50 [ 29.354461] __kasan_kmalloc+0xb7/0xc0 [ 29.358215] __kmalloc_cache_noprof+0x189/0x420 [ 29.362759] ksize_unpoisons_memory+0xc7/0x9b0 [ 29.367211] kunit_try_run_case+0x1a2/0x480 [ 29.371396] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 29.376794] kthread+0x334/0x6f0 [ 29.380028] ret_from_fork+0x3e/0x80 [ 29.383608] ret_from_fork_asm+0x1a/0x30 [ 29.387532] [ 29.389032] The buggy address belongs to the object at ffff888107f05300 [ 29.389032] which belongs to the cache kmalloc-128 of size 128 [ 29.401547] The buggy address is located 0 bytes to the right of [ 29.401547] allocated 115-byte region [ffff888107f05300, ffff888107f05373) [ 29.414501] [ 29.416000] The buggy address belongs to the physical page: [ 29.421574] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f05 [ 29.429583] flags: 0x200000000000000(node=0|zone=2) [ 29.434469] page_type: f5(slab) [ 29.437616] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 29.445356] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.453102] page dumped because: kasan: bad access detected [ 29.458699] [ 29.460243] Memory state around the buggy address: [ 29.465035] ffff888107f05200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.472253] ffff888107f05280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.479473] >ffff888107f05300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.486699] ^ [ 29.493618] ffff888107f05380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.500835] ffff888107f05400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.508056] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-double-free-in-kfree_sensitive
[ 28.707490] ================================================================== [ 28.714754] BUG: KASAN: double-free in kfree_sensitive+0x2e/0x90 [ 28.720757] Free of addr ffff888105b98560 by task kunit_try_catch/235 [ 28.727198] [ 28.728715] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 28.728723] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.728725] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 28.728729] Call Trace: [ 28.728742] <TASK> [ 28.728744] dump_stack_lvl+0x73/0xb0 [ 28.728748] print_report+0xd1/0x650 [ 28.728752] ? __virt_addr_valid+0x1db/0x2d0 [ 28.728756] ? kasan_complete_mode_report_info+0x64/0x200 [ 28.728760] ? kfree_sensitive+0x2e/0x90 [ 28.728764] kasan_report_invalid_free+0x10a/0x130 [ 28.728768] ? kfree_sensitive+0x2e/0x90 [ 28.728772] ? kfree_sensitive+0x2e/0x90 [ 28.728776] check_slab_allocation+0x101/0x130 [ 28.728780] __kasan_slab_pre_free+0x28/0x40 [ 28.728784] kfree+0xf0/0x3f0 [ 28.728787] ? kfree_sensitive+0x2e/0x90 [ 28.728791] kfree_sensitive+0x2e/0x90 [ 28.728794] kmalloc_double_kzfree+0x19c/0x350 [ 28.728799] ? __pfx_kmalloc_double_kzfree+0x10/0x10 [ 28.728804] ? __schedule+0x10cc/0x2b30 [ 28.728808] ? ktime_get_ts64+0x83/0x230 [ 28.728813] kunit_try_run_case+0x1a2/0x480 [ 28.728817] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.728821] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.728825] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.728830] ? __kthread_parkme+0x82/0x180 [ 28.728834] ? preempt_count_sub+0x50/0x80 [ 28.728838] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.728842] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 28.728846] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.728850] kthread+0x334/0x6f0 [ 28.728854] ? trace_preempt_on+0x20/0xc0 [ 28.728858] ? __pfx_kthread+0x10/0x10 [ 28.728862] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.728866] ? calculate_sigpending+0x7b/0xa0 [ 28.728870] ? __pfx_kthread+0x10/0x10 [ 28.728874] ret_from_fork+0x3e/0x80 [ 28.728878] ? __pfx_kthread+0x10/0x10 [ 28.728882] ret_from_fork_asm+0x1a/0x30 [ 28.728888] </TASK> [ 28.728890] [ 28.907109] Allocated by task 235: [ 28.910515] kasan_save_stack+0x45/0x70 [ 28.914355] kasan_save_track+0x18/0x40 [ 28.918193] kasan_save_alloc_info+0x3b/0x50 [ 28.922467] __kasan_kmalloc+0xb7/0xc0 [ 28.926219] __kmalloc_cache_noprof+0x189/0x420 [ 28.930760] kmalloc_double_kzfree+0xa9/0x350 [ 28.935117] kunit_try_run_case+0x1a2/0x480 [ 28.939305] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 28.944717] kthread+0x334/0x6f0 [ 28.947980] ret_from_fork+0x3e/0x80 [ 28.951558] ret_from_fork_asm+0x1a/0x30 [ 28.955485] [ 28.956984] Freed by task 235: [ 28.960043] kasan_save_stack+0x45/0x70 [ 28.963882] kasan_save_track+0x18/0x40 [ 28.967759] kasan_save_free_info+0x3f/0x60 [ 28.971951] __kasan_slab_free+0x56/0x70 [ 28.975878] kfree+0x222/0x3f0 [ 28.978934] kfree_sensitive+0x67/0x90 [ 28.982699] kmalloc_double_kzfree+0x12b/0x350 [ 28.987169] kunit_try_run_case+0x1a2/0x480 [ 28.991355] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 28.996762] kthread+0x334/0x6f0 [ 28.999993] ret_from_fork+0x3e/0x80 [ 29.003574] ret_from_fork_asm+0x1a/0x30 [ 29.007498] [ 29.009000] The buggy address belongs to the object at ffff888105b98560 [ 29.009000] which belongs to the cache kmalloc-16 of size 16 [ 29.021341] The buggy address is located 0 bytes inside of [ 29.021341] 16-byte region [ffff888105b98560, ffff888105b98570) [ 29.032814] [ 29.034313] The buggy address belongs to the physical page: [ 29.039886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b98 [ 29.047893] flags: 0x200000000000000(node=0|zone=2) [ 29.052771] page_type: f5(slab) [ 29.055919] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 29.063659] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.071429] page dumped because: kasan: bad access detected [ 29.077003] [ 29.078503] Memory state around the buggy address: [ 29.083296] ffff888105b98400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.090514] ffff888105b98480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 06 fc fc [ 29.097756] >ffff888105b98500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.104977] ^ [ 29.111329] ffff888105b98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.118549] ffff888105b98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.125767] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 28.278017] ================================================================== [ 28.292463] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x19c/0x350 [ 28.299865] Read of size 1 at addr ffff888105b98560 by task kunit_try_catch/235 [ 28.307178] [ 28.308716] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 28.308724] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.308739] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 28.308742] Call Trace: [ 28.308744] <TASK> [ 28.308746] dump_stack_lvl+0x73/0xb0 [ 28.308750] print_report+0xd1/0x650 [ 28.308754] ? __virt_addr_valid+0x1db/0x2d0 [ 28.308758] ? kmalloc_double_kzfree+0x19c/0x350 [ 28.308762] ? kasan_complete_mode_report_info+0x64/0x200 [ 28.308766] ? kmalloc_double_kzfree+0x19c/0x350 [ 28.308770] kasan_report+0x141/0x180 [ 28.308775] ? kmalloc_double_kzfree+0x19c/0x350 [ 28.308780] ? kmalloc_double_kzfree+0x19c/0x350 [ 28.308784] __kasan_check_byte+0x3d/0x50 [ 28.308788] kfree_sensitive+0x22/0x90 [ 28.308792] kmalloc_double_kzfree+0x19c/0x350 [ 28.308797] ? __pfx_kmalloc_double_kzfree+0x10/0x10 [ 28.308801] ? __schedule+0x10cc/0x2b30 [ 28.308806] ? ktime_get_ts64+0x83/0x230 [ 28.308810] kunit_try_run_case+0x1a2/0x480 [ 28.308815] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.308819] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.308823] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.308828] ? __kthread_parkme+0x82/0x180 [ 28.308832] ? preempt_count_sub+0x50/0x80 [ 28.308836] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.308840] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 28.308844] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.308848] kthread+0x334/0x6f0 [ 28.308852] ? trace_preempt_on+0x20/0xc0 [ 28.308857] ? __pfx_kthread+0x10/0x10 [ 28.308861] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.308865] ? calculate_sigpending+0x7b/0xa0 [ 28.308869] ? __pfx_kthread+0x10/0x10 [ 28.308873] ret_from_fork+0x3e/0x80 [ 28.308877] ? __pfx_kthread+0x10/0x10 [ 28.308881] ret_from_fork_asm+0x1a/0x30 [ 28.308887] </TASK> [ 28.308888] [ 28.480912] Allocated by task 235: [ 28.484317] kasan_save_stack+0x45/0x70 [ 28.488156] kasan_save_track+0x18/0x40 [ 28.491994] kasan_save_alloc_info+0x3b/0x50 [ 28.496267] __kasan_kmalloc+0xb7/0xc0 [ 28.500021] __kmalloc_cache_noprof+0x189/0x420 [ 28.504551] kmalloc_double_kzfree+0xa9/0x350 [ 28.508913] kunit_try_run_case+0x1a2/0x480 [ 28.513105] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 28.518504] kthread+0x334/0x6f0 [ 28.521762] ret_from_fork+0x3e/0x80 [ 28.525342] ret_from_fork_asm+0x1a/0x30 [ 28.529270] [ 28.530766] Freed by task 235: [ 28.533827] kasan_save_stack+0x45/0x70 [ 28.537686] kasan_save_track+0x18/0x40 [ 28.541532] kasan_save_free_info+0x3f/0x60 [ 28.545760] __kasan_slab_free+0x56/0x70 [ 28.549699] kfree+0x222/0x3f0 [ 28.552807] kfree_sensitive+0x67/0x90 [ 28.556560] kmalloc_double_kzfree+0x12b/0x350 [ 28.561013] kunit_try_run_case+0x1a2/0x480 [ 28.565199] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 28.570599] kthread+0x334/0x6f0 [ 28.573832] ret_from_fork+0x3e/0x80 [ 28.577420] ret_from_fork_asm+0x1a/0x30 [ 28.581344] [ 28.582843] The buggy address belongs to the object at ffff888105b98560 [ 28.582843] which belongs to the cache kmalloc-16 of size 16 [ 28.595185] The buggy address is located 0 bytes inside of [ 28.595185] freed 16-byte region [ffff888105b98560, ffff888105b98570) [ 28.607188] [ 28.608699] The buggy address belongs to the physical page: [ 28.614311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b98 [ 28.622319] flags: 0x200000000000000(node=0|zone=2) [ 28.627196] page_type: f5(slab) [ 28.630346] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 28.638093] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.645840] page dumped because: kasan: bad access detected [ 28.651412] [ 28.652911] Memory state around the buggy address: [ 28.657703] ffff888105b98400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.664949] ffff888105b98480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 06 fc fc [ 28.672167] >ffff888105b98500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.679385] ^ [ 28.685764] ffff888105b98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.692984] ffff888105b98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.700201] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 27.854456] ================================================================== [ 27.865608] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x4a8/0x520 [ 27.872228] Read of size 1 at addr ffff888106799b28 by task kunit_try_catch/231 [ 27.879540] [ 27.881041] CPU: 3 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 27.881050] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.881052] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 27.881055] Call Trace: [ 27.881057] <TASK> [ 27.881059] dump_stack_lvl+0x73/0xb0 [ 27.881063] print_report+0xd1/0x650 [ 27.881067] ? __virt_addr_valid+0x1db/0x2d0 [ 27.881071] ? kmalloc_uaf2+0x4a8/0x520 [ 27.881074] ? kasan_complete_mode_report_info+0x64/0x200 [ 27.881079] ? kmalloc_uaf2+0x4a8/0x520 [ 27.881082] kasan_report+0x141/0x180 [ 27.881087] ? kmalloc_uaf2+0x4a8/0x520 [ 27.881091] __asan_report_load1_noabort+0x18/0x20 [ 27.881095] kmalloc_uaf2+0x4a8/0x520 [ 27.881099] ? __pfx_kmalloc_uaf2+0x10/0x10 [ 27.881103] ? finish_task_switch.isra.0+0x153/0x700 [ 27.881107] ? __switch_to+0x5d9/0xf60 [ 27.881111] ? dequeue_task_fair+0x166/0x4e0 [ 27.881115] ? __schedule+0x10cc/0x2b30 [ 27.881120] ? ktime_get_ts64+0x83/0x230 [ 27.881124] kunit_try_run_case+0x1a2/0x480 [ 27.881129] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.881133] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.881137] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.881142] ? __kthread_parkme+0x82/0x180 [ 27.881146] ? preempt_count_sub+0x50/0x80 [ 27.881150] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.881155] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 27.881159] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.881163] kthread+0x334/0x6f0 [ 27.881167] ? trace_preempt_on+0x20/0xc0 [ 27.881171] ? __pfx_kthread+0x10/0x10 [ 27.881176] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.881180] ? calculate_sigpending+0x7b/0xa0 [ 27.881183] ? __pfx_kthread+0x10/0x10 [ 27.881188] ret_from_fork+0x3e/0x80 [ 27.881192] ? __pfx_kthread+0x10/0x10 [ 27.881196] ret_from_fork_asm+0x1a/0x30 [ 27.881202] </TASK> [ 27.881203] [ 28.054887] Allocated by task 231: [ 28.058292] kasan_save_stack+0x45/0x70 [ 28.062131] kasan_save_track+0x18/0x40 [ 28.065971] kasan_save_alloc_info+0x3b/0x50 [ 28.070243] __kasan_kmalloc+0xb7/0xc0 [ 28.073996] __kmalloc_cache_noprof+0x189/0x420 [ 28.078527] kmalloc_uaf2+0xc6/0x520 [ 28.082108] kunit_try_run_case+0x1a2/0x480 [ 28.086292] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 28.091699] kthread+0x334/0x6f0 [ 28.094975] ret_from_fork+0x3e/0x80 [ 28.098556] ret_from_fork_asm+0x1a/0x30 [ 28.102482] [ 28.103979] Freed by task 231: [ 28.107040] kasan_save_stack+0x45/0x70 [ 28.110879] kasan_save_track+0x18/0x40 [ 28.114733] kasan_save_free_info+0x3f/0x60 [ 28.118920] __kasan_slab_free+0x56/0x70 [ 28.122848] kfree+0x222/0x3f0 [ 28.125907] kmalloc_uaf2+0x14c/0x520 [ 28.129572] kunit_try_run_case+0x1a2/0x480 [ 28.133759] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 28.139156] kthread+0x334/0x6f0 [ 28.142389] ret_from_fork+0x3e/0x80 [ 28.145967] ret_from_fork_asm+0x1a/0x30 [ 28.149894] [ 28.151392] The buggy address belongs to the object at ffff888106799b00 [ 28.151392] which belongs to the cache kmalloc-64 of size 64 [ 28.163762] The buggy address is located 40 bytes inside of [ 28.163762] freed 64-byte region [ffff888106799b00, ffff888106799b40) [ 28.175841] [ 28.177341] The buggy address belongs to the physical page: [ 28.182915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106799 [ 28.190920] flags: 0x200000000000000(node=0|zone=2) [ 28.195799] page_type: f5(slab) [ 28.198947] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 28.206715] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.214483] page dumped because: kasan: bad access detected [ 28.220057] [ 28.221557] Memory state around the buggy address: [ 28.226350] ffff888106799a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.233575] ffff888106799a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.240794] >ffff888106799b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.248015] ^ [ 28.252546] ffff888106799b80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 28.259767] ffff888106799c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.266983] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 27.442029] ================================================================== [ 27.452582] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x1a3/0x360 [ 27.459761] Write of size 33 at addr ffff888107f06400 by task kunit_try_catch/229 [ 27.467244] [ 27.468765] CPU: 1 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 27.468773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.468775] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 27.468779] Call Trace: [ 27.468780] <TASK> [ 27.468782] dump_stack_lvl+0x73/0xb0 [ 27.468786] print_report+0xd1/0x650 [ 27.468790] ? __virt_addr_valid+0x1db/0x2d0 [ 27.468794] ? kmalloc_uaf_memset+0x1a3/0x360 [ 27.468798] ? kasan_complete_mode_report_info+0x64/0x200 [ 27.468802] ? kmalloc_uaf_memset+0x1a3/0x360 [ 27.468807] kasan_report+0x141/0x180 [ 27.468811] ? kmalloc_uaf_memset+0x1a3/0x360 [ 27.468816] kasan_check_range+0x10c/0x1c0 [ 27.468820] __asan_memset+0x27/0x50 [ 27.468824] kmalloc_uaf_memset+0x1a3/0x360 [ 27.468828] ? __pfx_kmalloc_uaf_memset+0x10/0x10 [ 27.468832] ? __schedule+0x10cc/0x2b30 [ 27.468837] ? ktime_get_ts64+0x83/0x230 [ 27.468841] kunit_try_run_case+0x1a2/0x480 [ 27.468846] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.468850] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.468855] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.468859] ? __kthread_parkme+0x82/0x180 [ 27.468863] ? preempt_count_sub+0x50/0x80 [ 27.468868] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.468872] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 27.468876] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.468880] kthread+0x334/0x6f0 [ 27.468884] ? trace_preempt_on+0x20/0xc0 [ 27.468888] ? __pfx_kthread+0x10/0x10 [ 27.468893] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.468897] ? calculate_sigpending+0x7b/0xa0 [ 27.468901] ? __pfx_kthread+0x10/0x10 [ 27.468905] ret_from_fork+0x3e/0x80 [ 27.468909] ? __pfx_kthread+0x10/0x10 [ 27.468913] ret_from_fork_asm+0x1a/0x30 [ 27.468919] </TASK> [ 27.468920] [ 27.635125] Allocated by task 229: [ 27.638533] kasan_save_stack+0x45/0x70 [ 27.642373] kasan_save_track+0x18/0x40 [ 27.646212] kasan_save_alloc_info+0x3b/0x50 [ 27.650482] __kasan_kmalloc+0xb7/0xc0 [ 27.654236] __kmalloc_cache_noprof+0x189/0x420 [ 27.658770] kmalloc_uaf_memset+0xa9/0x360 [ 27.662877] kunit_try_run_case+0x1a2/0x480 [ 27.667063] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 27.672471] kthread+0x334/0x6f0 [ 27.675701] ret_from_fork+0x3e/0x80 [ 27.679325] ret_from_fork_asm+0x1a/0x30 [ 27.683250] [ 27.684757] Freed by task 229: [ 27.687819] kasan_save_stack+0x45/0x70 [ 27.691656] kasan_save_track+0x18/0x40 [ 27.695530] kasan_save_free_info+0x3f/0x60 [ 27.699754] __kasan_slab_free+0x56/0x70 [ 27.703705] kfree+0x222/0x3f0 [ 27.706813] kmalloc_uaf_memset+0x12b/0x360 [ 27.710999] kunit_try_run_case+0x1a2/0x480 [ 27.715187] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 27.720585] kthread+0x334/0x6f0 [ 27.723818] ret_from_fork+0x3e/0x80 [ 27.727397] ret_from_fork_asm+0x1a/0x30 [ 27.731322] [ 27.732820] The buggy address belongs to the object at ffff888107f06400 [ 27.732820] which belongs to the cache kmalloc-64 of size 64 [ 27.745153] The buggy address is located 0 bytes inside of [ 27.745153] freed 64-byte region [ffff888107f06400, ffff888107f06440) [ 27.757147] [ 27.758648] The buggy address belongs to the physical page: [ 27.764220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f06 [ 27.772229] flags: 0x200000000000000(node=0|zone=2) [ 27.777105] page_type: f5(slab) [ 27.780253] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 27.788002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.795760] page dumped because: kasan: bad access detected [ 27.801338] [ 27.802836] Memory state around the buggy address: [ 27.807630] ffff888107f06300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.814850] ffff888107f06380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.822076] >ffff888107f06400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.829293] ^ [ 27.832527] ffff888107f06480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.839763] ffff888107f06500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.846981] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 27.033790] ================================================================== [ 27.045804] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x320/0x380 [ 27.052338] Read of size 1 at addr ffff888105b98548 by task kunit_try_catch/227 [ 27.059654] [ 27.061152] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 27.061161] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.061163] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 27.061166] Call Trace: [ 27.061168] <TASK> [ 27.061170] dump_stack_lvl+0x73/0xb0 [ 27.061174] print_report+0xd1/0x650 [ 27.061178] ? __virt_addr_valid+0x1db/0x2d0 [ 27.061181] ? kmalloc_uaf+0x320/0x380 [ 27.061185] ? kasan_complete_mode_report_info+0x64/0x200 [ 27.061189] ? kmalloc_uaf+0x320/0x380 [ 27.061193] kasan_report+0x141/0x180 [ 27.061197] ? kmalloc_uaf+0x320/0x380 [ 27.061202] __asan_report_load1_noabort+0x18/0x20 [ 27.061205] kmalloc_uaf+0x320/0x380 [ 27.061209] ? __pfx_kmalloc_uaf+0x10/0x10 [ 27.061213] ? __schedule+0x10cc/0x2b30 [ 27.061217] ? ktime_get_ts64+0x83/0x230 [ 27.061222] kunit_try_run_case+0x1a2/0x480 [ 27.061227] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.061231] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.061235] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.061239] ? __kthread_parkme+0x82/0x180 [ 27.061243] ? preempt_count_sub+0x50/0x80 [ 27.061248] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.061252] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 27.061256] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.061260] kthread+0x334/0x6f0 [ 27.061264] ? trace_preempt_on+0x20/0xc0 [ 27.061268] ? __pfx_kthread+0x10/0x10 [ 27.061273] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.061277] ? calculate_sigpending+0x7b/0xa0 [ 27.061280] ? __pfx_kthread+0x10/0x10 [ 27.061284] ret_from_fork+0x3e/0x80 [ 27.061288] ? __pfx_kthread+0x10/0x10 [ 27.061292] ret_from_fork_asm+0x1a/0x30 [ 27.061298] </TASK> [ 27.061300] [ 27.221608] Allocated by task 227: [ 27.225013] kasan_save_stack+0x45/0x70 [ 27.228854] kasan_save_track+0x18/0x40 [ 27.232699] kasan_save_alloc_info+0x3b/0x50 [ 27.237015] __kasan_kmalloc+0xb7/0xc0 [ 27.240769] __kmalloc_cache_noprof+0x189/0x420 [ 27.245300] kmalloc_uaf+0xaa/0x380 [ 27.248792] kunit_try_run_case+0x1a2/0x480 [ 27.252980] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 27.258385] kthread+0x334/0x6f0 [ 27.261620] ret_from_fork+0x3e/0x80 [ 27.265198] ret_from_fork_asm+0x1a/0x30 [ 27.269124] [ 27.270625] Freed by task 227: [ 27.273702] kasan_save_stack+0x45/0x70 [ 27.277558] kasan_save_track+0x18/0x40 [ 27.281394] kasan_save_free_info+0x3f/0x60 [ 27.285581] __kasan_slab_free+0x56/0x70 [ 27.289507] kfree+0x222/0x3f0 [ 27.292568] kmalloc_uaf+0x12c/0x380 [ 27.296146] kunit_try_run_case+0x1a2/0x480 [ 27.300332] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 27.305757] kthread+0x334/0x6f0 [ 27.308990] ret_from_fork+0x3e/0x80 [ 27.312576] ret_from_fork_asm+0x1a/0x30 [ 27.316502] [ 27.318002] The buggy address belongs to the object at ffff888105b98540 [ 27.318002] which belongs to the cache kmalloc-16 of size 16 [ 27.330342] The buggy address is located 8 bytes inside of [ 27.330342] freed 16-byte region [ffff888105b98540, ffff888105b98550) [ 27.342328] [ 27.343827] The buggy address belongs to the physical page: [ 27.349401] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b98 [ 27.357407] flags: 0x200000000000000(node=0|zone=2) [ 27.362288] page_type: f5(slab) [ 27.365433] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 27.373172] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.380910] page dumped because: kasan: bad access detected [ 27.386483] [ 27.387984] Memory state around the buggy address: [ 27.392775] ffff888105b98400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.399994] ffff888105b98480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 06 fc fc [ 27.407213] >ffff888105b98500: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 27.414432] ^ [ 27.420005] ffff888105b98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.427224] ffff888105b98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.434443] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 26.659488] ================================================================== [ 26.671596] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x16f/0x330 [ 26.679515] Read of size 64 at addr ffff888107f06204 by task kunit_try_catch/225 [ 26.686906] [ 26.688409] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 26.688417] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.688419] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 26.688422] Call Trace: [ 26.688423] <TASK> [ 26.688425] dump_stack_lvl+0x73/0xb0 [ 26.688429] print_report+0xd1/0x650 [ 26.688433] ? __virt_addr_valid+0x1db/0x2d0 [ 26.688436] ? kmalloc_memmove_invalid_size+0x16f/0x330 [ 26.688441] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.688445] ? kmalloc_memmove_invalid_size+0x16f/0x330 [ 26.688450] kasan_report+0x141/0x180 [ 26.688454] ? kmalloc_memmove_invalid_size+0x16f/0x330 [ 26.688459] kasan_check_range+0x10c/0x1c0 [ 26.688464] __asan_memmove+0x27/0x70 [ 26.688467] kmalloc_memmove_invalid_size+0x16f/0x330 [ 26.688472] ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10 [ 26.688477] ? __schedule+0x10cc/0x2b30 [ 26.688481] ? ktime_get_ts64+0x83/0x230 [ 26.688486] kunit_try_run_case+0x1a2/0x480 [ 26.688490] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.688494] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.688499] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.688503] ? __kthread_parkme+0x82/0x180 [ 26.688507] ? preempt_count_sub+0x50/0x80 [ 26.688512] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.688516] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 26.688520] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.688524] kthread+0x334/0x6f0 [ 26.688528] ? trace_preempt_on+0x20/0xc0 [ 26.688532] ? __pfx_kthread+0x10/0x10 [ 26.688536] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.688540] ? calculate_sigpending+0x7b/0xa0 [ 26.688544] ? __pfx_kthread+0x10/0x10 [ 26.688548] ret_from_fork+0x3e/0x80 [ 26.688552] ? __pfx_kthread+0x10/0x10 [ 26.688556] ret_from_fork_asm+0x1a/0x30 [ 26.688562] </TASK> [ 26.688563] [ 26.859210] Allocated by task 225: [ 26.862617] kasan_save_stack+0x45/0x70 [ 26.866454] kasan_save_track+0x18/0x40 [ 26.870296] kasan_save_alloc_info+0x3b/0x50 [ 26.874567] __kasan_kmalloc+0xb7/0xc0 [ 26.878319] __kmalloc_cache_noprof+0x189/0x420 [ 26.882852] kmalloc_memmove_invalid_size+0xac/0x330 [ 26.887827] kunit_try_run_case+0x1a2/0x480 [ 26.892012] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 26.897412] kthread+0x334/0x6f0 [ 26.900644] ret_from_fork+0x3e/0x80 [ 26.904248] ret_from_fork_asm+0x1a/0x30 [ 26.908175] [ 26.909687] The buggy address belongs to the object at ffff888107f06200 [ 26.909687] which belongs to the cache kmalloc-64 of size 64 [ 26.922040] The buggy address is located 4 bytes inside of [ 26.922040] allocated 64-byte region [ffff888107f06200, ffff888107f06240) [ 26.934383] [ 26.935881] The buggy address belongs to the physical page: [ 26.941452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f06 [ 26.949451] flags: 0x200000000000000(node=0|zone=2) [ 26.954331] page_type: f5(slab) [ 26.957478] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 26.965216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.972955] page dumped because: kasan: bad access detected [ 26.978527] [ 26.980025] Memory state around the buggy address: [ 26.984818] ffff888107f06100: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 26.992038] ffff888107f06180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.999256] >ffff888107f06200: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 27.006475] ^ [ 27.011788] ffff888107f06280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.019008] ffff888107f06300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.026227] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 26.287332] ================================================================== [ 26.298762] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x171/0x330 [ 26.306338] Read of size 18446744073709551614 at addr ffff888107f06084 by task kunit_try_catch/223 [ 26.315299] [ 26.316797] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 26.316805] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.316807] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 26.316810] Call Trace: [ 26.316812] <TASK> [ 26.316813] dump_stack_lvl+0x73/0xb0 [ 26.316817] print_report+0xd1/0x650 [ 26.316821] ? __virt_addr_valid+0x1db/0x2d0 [ 26.316824] ? kmalloc_memmove_negative_size+0x171/0x330 [ 26.316829] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.316833] ? kmalloc_memmove_negative_size+0x171/0x330 [ 26.316838] kasan_report+0x141/0x180 [ 26.316842] ? kmalloc_memmove_negative_size+0x171/0x330 [ 26.316848] kasan_check_range+0x10c/0x1c0 [ 26.316853] __asan_memmove+0x27/0x70 [ 26.316856] kmalloc_memmove_negative_size+0x171/0x330 [ 26.316861] ? __pfx_kmalloc_memmove_negative_size+0x10/0x10 [ 26.316866] ? __schedule+0x10cc/0x2b30 [ 26.316871] ? ktime_get_ts64+0x83/0x230 [ 26.316875] kunit_try_run_case+0x1a2/0x480 [ 26.316879] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.316883] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.316888] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.316892] ? __kthread_parkme+0x82/0x180 [ 26.316896] ? preempt_count_sub+0x50/0x80 [ 26.316901] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.316905] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 26.316909] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.316913] kthread+0x334/0x6f0 [ 26.316917] ? trace_preempt_on+0x20/0xc0 [ 26.316921] ? __pfx_kthread+0x10/0x10 [ 26.316926] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.316930] ? calculate_sigpending+0x7b/0xa0 [ 26.316933] ? __pfx_kthread+0x10/0x10 [ 26.316938] ret_from_fork+0x3e/0x80 [ 26.316941] ? __pfx_kthread+0x10/0x10 [ 26.316946] ret_from_fork_asm+0x1a/0x30 [ 26.316951] </TASK> [ 26.316953] [ 26.487896] Allocated by task 223: [ 26.491300] kasan_save_stack+0x45/0x70 [ 26.495141] kasan_save_track+0x18/0x40 [ 26.498979] kasan_save_alloc_info+0x3b/0x50 [ 26.503251] __kasan_kmalloc+0xb7/0xc0 [ 26.507005] __kmalloc_cache_noprof+0x189/0x420 [ 26.511536] kmalloc_memmove_negative_size+0xac/0x330 [ 26.516588] kunit_try_run_case+0x1a2/0x480 [ 26.520776] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 26.526184] kthread+0x334/0x6f0 [ 26.529416] ret_from_fork+0x3e/0x80 [ 26.532993] ret_from_fork_asm+0x1a/0x30 [ 26.536921] [ 26.538419] The buggy address belongs to the object at ffff888107f06080 [ 26.538419] which belongs to the cache kmalloc-64 of size 64 [ 26.550757] The buggy address is located 4 bytes inside of [ 26.550757] 64-byte region [ffff888107f06080, ffff888107f060c0) [ 26.562226] [ 26.563756] The buggy address belongs to the physical page: [ 26.569334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f06 [ 26.577341] flags: 0x200000000000000(node=0|zone=2) [ 26.582218] page_type: f5(slab) [ 26.585365] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 26.593104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.600842] page dumped because: kasan: bad access detected [ 26.606415] [ 26.607915] Memory state around the buggy address: [ 26.612721] ffff888107f05f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.619971] ffff888107f06000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.627198] >ffff888107f06080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.634415] ^ [ 26.637648] ffff888107f06100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.644866] ffff888107f06180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.652088] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 25.916056] ================================================================== [ 25.927389] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x166/0x330 [ 25.934703] Write of size 16 at addr ffff888107f05269 by task kunit_try_catch/221 [ 25.942207] [ 25.943720] CPU: 1 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 25.943728] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.943730] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 25.943734] Call Trace: [ 25.943735] <TASK> [ 25.943737] dump_stack_lvl+0x73/0xb0 [ 25.943740] print_report+0xd1/0x650 [ 25.943745] ? __virt_addr_valid+0x1db/0x2d0 [ 25.943748] ? kmalloc_oob_memset_16+0x166/0x330 [ 25.943752] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.943756] ? kmalloc_oob_memset_16+0x166/0x330 [ 25.943760] kasan_report+0x141/0x180 [ 25.943765] ? kmalloc_oob_memset_16+0x166/0x330 [ 25.943770] kasan_check_range+0x10c/0x1c0 [ 25.943774] __asan_memset+0x27/0x50 [ 25.943778] kmalloc_oob_memset_16+0x166/0x330 [ 25.943782] ? __pfx_kmalloc_oob_memset_16+0x10/0x10 [ 25.943786] ? __schedule+0x10cc/0x2b30 [ 25.943791] ? ktime_get_ts64+0x83/0x230 [ 25.943795] kunit_try_run_case+0x1a2/0x480 [ 25.943799] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.943803] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.943808] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.943812] ? __kthread_parkme+0x82/0x180 [ 25.943816] ? preempt_count_sub+0x50/0x80 [ 25.943821] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.943825] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 25.943829] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.943833] kthread+0x334/0x6f0 [ 25.943837] ? trace_preempt_on+0x20/0xc0 [ 25.943841] ? __pfx_kthread+0x10/0x10 [ 25.943845] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.943849] ? calculate_sigpending+0x7b/0xa0 [ 25.943853] ? __pfx_kthread+0x10/0x10 [ 25.943857] ret_from_fork+0x3e/0x80 [ 25.943861] ? __pfx_kthread+0x10/0x10 [ 25.943865] ret_from_fork_asm+0x1a/0x30 [ 25.943871] </TASK> [ 25.943872] [ 26.111241] Allocated by task 221: [ 26.114648] kasan_save_stack+0x45/0x70 [ 26.118486] kasan_save_track+0x18/0x40 [ 26.122325] kasan_save_alloc_info+0x3b/0x50 [ 26.126598] __kasan_kmalloc+0xb7/0xc0 [ 26.130352] __kmalloc_cache_noprof+0x189/0x420 [ 26.134884] kmalloc_oob_memset_16+0xac/0x330 [ 26.139242] kunit_try_run_case+0x1a2/0x480 [ 26.143428] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 26.148827] kthread+0x334/0x6f0 [ 26.152060] ret_from_fork+0x3e/0x80 [ 26.155639] ret_from_fork_asm+0x1a/0x30 [ 26.159565] [ 26.161063] The buggy address belongs to the object at ffff888107f05200 [ 26.161063] which belongs to the cache kmalloc-128 of size 128 [ 26.173571] The buggy address is located 105 bytes inside of [ 26.173571] allocated 120-byte region [ffff888107f05200, ffff888107f05278) [ 26.186171] [ 26.187687] The buggy address belongs to the physical page: [ 26.193268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f05 [ 26.201269] flags: 0x200000000000000(node=0|zone=2) [ 26.206147] page_type: f5(slab) [ 26.209293] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 26.217040] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.224780] page dumped because: kasan: bad access detected [ 26.230351] [ 26.231851] Memory state around the buggy address: [ 26.236642] ffff888107f05100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.243863] ffff888107f05180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.251083] >ffff888107f05200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 26.258301] ^ [ 26.265433] ffff888107f05280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.272652] ffff888107f05300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.279905] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 25.545320] ================================================================== [ 25.556644] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x166/0x330 [ 25.563871] Write of size 8 at addr ffff888107f05171 by task kunit_try_catch/219 [ 25.571263] [ 25.572764] CPU: 1 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 25.572772] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.572774] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 25.572778] Call Trace: [ 25.572779] <TASK> [ 25.572781] dump_stack_lvl+0x73/0xb0 [ 25.572785] print_report+0xd1/0x650 [ 25.572789] ? __virt_addr_valid+0x1db/0x2d0 [ 25.572793] ? kmalloc_oob_memset_8+0x166/0x330 [ 25.572797] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.572801] ? kmalloc_oob_memset_8+0x166/0x330 [ 25.572806] kasan_report+0x141/0x180 [ 25.572810] ? kmalloc_oob_memset_8+0x166/0x330 [ 25.572815] kasan_check_range+0x10c/0x1c0 [ 25.572819] __asan_memset+0x27/0x50 [ 25.572823] kmalloc_oob_memset_8+0x166/0x330 [ 25.572827] ? __pfx_kmalloc_oob_memset_8+0x10/0x10 [ 25.572832] ? __schedule+0x10cc/0x2b30 [ 25.572836] ? ktime_get_ts64+0x83/0x230 [ 25.572841] kunit_try_run_case+0x1a2/0x480 [ 25.572845] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.572849] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.572854] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.572858] ? __kthread_parkme+0x82/0x180 [ 25.572862] ? preempt_count_sub+0x50/0x80 [ 25.572867] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.572871] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 25.572875] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.572879] kthread+0x334/0x6f0 [ 25.572883] ? trace_preempt_on+0x20/0xc0 [ 25.572887] ? __pfx_kthread+0x10/0x10 [ 25.572891] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.572895] ? calculate_sigpending+0x7b/0xa0 [ 25.572899] ? __pfx_kthread+0x10/0x10 [ 25.572903] ret_from_fork+0x3e/0x80 [ 25.572907] ? __pfx_kthread+0x10/0x10 [ 25.572912] ret_from_fork_asm+0x1a/0x30 [ 25.572917] </TASK> [ 25.572919] [ 25.739900] Allocated by task 219: [ 25.743308] kasan_save_stack+0x45/0x70 [ 25.747153] kasan_save_track+0x18/0x40 [ 25.750995] kasan_save_alloc_info+0x3b/0x50 [ 25.755265] __kasan_kmalloc+0xb7/0xc0 [ 25.759018] __kmalloc_cache_noprof+0x189/0x420 [ 25.763550] kmalloc_oob_memset_8+0xac/0x330 [ 25.767822] kunit_try_run_case+0x1a2/0x480 [ 25.772009] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 25.777410] kthread+0x334/0x6f0 [ 25.780649] ret_from_fork+0x3e/0x80 [ 25.784228] ret_from_fork_asm+0x1a/0x30 [ 25.788156] [ 25.789654] The buggy address belongs to the object at ffff888107f05100 [ 25.789654] which belongs to the cache kmalloc-128 of size 128 [ 25.802194] The buggy address is located 113 bytes inside of [ 25.802194] allocated 120-byte region [ffff888107f05100, ffff888107f05178) [ 25.814795] [ 25.816293] The buggy address belongs to the physical page: [ 25.821868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f05 [ 25.829873] flags: 0x200000000000000(node=0|zone=2) [ 25.834754] page_type: f5(slab) [ 25.837902] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 25.845648] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.853395] page dumped because: kasan: bad access detected [ 25.858966] [ 25.860467] Memory state around the buggy address: [ 25.865260] ffff888107f05000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.872478] ffff888107f05080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.879701] >ffff888107f05100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.886923] ^ [ 25.894058] ffff888107f05180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.901277] ffff888107f05200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.908502] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 25.174505] ================================================================== [ 25.185832] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x166/0x330 [ 25.193060] Write of size 4 at addr ffff888104ee9275 by task kunit_try_catch/217 [ 25.200453] [ 25.201952] CPU: 0 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 25.201961] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.201963] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 25.201966] Call Trace: [ 25.201968] <TASK> [ 25.201970] dump_stack_lvl+0x73/0xb0 [ 25.201974] print_report+0xd1/0x650 [ 25.201978] ? __virt_addr_valid+0x1db/0x2d0 [ 25.201982] ? kmalloc_oob_memset_4+0x166/0x330 [ 25.201986] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.201990] ? kmalloc_oob_memset_4+0x166/0x330 [ 25.201994] kasan_report+0x141/0x180 [ 25.201998] ? kmalloc_oob_memset_4+0x166/0x330 [ 25.202003] kasan_check_range+0x10c/0x1c0 [ 25.202008] __asan_memset+0x27/0x50 [ 25.202011] kmalloc_oob_memset_4+0x166/0x330 [ 25.202015] ? __pfx_kmalloc_oob_memset_4+0x10/0x10 [ 25.202020] ? __schedule+0x10cc/0x2b30 [ 25.202024] ? ktime_get_ts64+0x83/0x230 [ 25.202029] kunit_try_run_case+0x1a2/0x480 [ 25.202033] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.202037] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.202042] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.202046] ? __kthread_parkme+0x82/0x180 [ 25.202050] ? preempt_count_sub+0x50/0x80 [ 25.202055] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.202059] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 25.202063] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.202067] kthread+0x334/0x6f0 [ 25.202071] ? trace_preempt_on+0x20/0xc0 [ 25.202075] ? __pfx_kthread+0x10/0x10 [ 25.202080] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.202084] ? calculate_sigpending+0x7b/0xa0 [ 25.202087] ? __pfx_kthread+0x10/0x10 [ 25.202092] ret_from_fork+0x3e/0x80 [ 25.202096] ? __pfx_kthread+0x10/0x10 [ 25.202100] ret_from_fork_asm+0x1a/0x30 [ 25.202105] </TASK> [ 25.202107] [ 25.369115] Allocated by task 217: [ 25.372522] kasan_save_stack+0x45/0x70 [ 25.376369] kasan_save_track+0x18/0x40 [ 25.380209] kasan_save_alloc_info+0x3b/0x50 [ 25.384481] __kasan_kmalloc+0xb7/0xc0 [ 25.388234] __kmalloc_cache_noprof+0x189/0x420 [ 25.392765] kmalloc_oob_memset_4+0xac/0x330 [ 25.397037] kunit_try_run_case+0x1a2/0x480 [ 25.401224] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 25.406624] kthread+0x334/0x6f0 [ 25.409863] ret_from_fork+0x3e/0x80 [ 25.413441] ret_from_fork_asm+0x1a/0x30 [ 25.417368] [ 25.418869] The buggy address belongs to the object at ffff888104ee9200 [ 25.418869] which belongs to the cache kmalloc-128 of size 128 [ 25.431381] The buggy address is located 117 bytes inside of [ 25.431381] allocated 120-byte region [ffff888104ee9200, ffff888104ee9278) [ 25.443982] [ 25.445482] The buggy address belongs to the physical page: [ 25.451053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9 [ 25.459055] flags: 0x200000000000000(node=0|zone=2) [ 25.463932] page_type: f5(slab) [ 25.467081] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 25.474828] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.482574] page dumped because: kasan: bad access detected [ 25.488146] [ 25.489644] Memory state around the buggy address: [ 25.494439] ffff888104ee9100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.501684] ffff888104ee9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.508911] >ffff888104ee9200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.516128] ^ [ 25.523262] ffff888104ee9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.530481] ffff888104ee9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.537707] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 24.803587] ================================================================== [ 24.815002] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x166/0x330 [ 24.822223] Write of size 2 at addr ffff888107f05077 by task kunit_try_catch/215 [ 24.829621] [ 24.831122] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 24.831131] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.831133] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 24.831136] Call Trace: [ 24.831138] <TASK> [ 24.831140] dump_stack_lvl+0x73/0xb0 [ 24.831144] print_report+0xd1/0x650 [ 24.831148] ? __virt_addr_valid+0x1db/0x2d0 [ 24.831152] ? kmalloc_oob_memset_2+0x166/0x330 [ 24.831156] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.831160] ? kmalloc_oob_memset_2+0x166/0x330 [ 24.831164] kasan_report+0x141/0x180 [ 24.831168] ? kmalloc_oob_memset_2+0x166/0x330 [ 24.831173] kasan_check_range+0x10c/0x1c0 [ 24.831177] __asan_memset+0x27/0x50 [ 24.831181] kmalloc_oob_memset_2+0x166/0x330 [ 24.831185] ? __pfx_kmalloc_oob_memset_2+0x10/0x10 [ 24.831189] ? __schedule+0x10cc/0x2b30 [ 24.831194] ? ktime_get_ts64+0x83/0x230 [ 24.831198] kunit_try_run_case+0x1a2/0x480 [ 24.831203] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.831207] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.831211] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.831216] ? __kthread_parkme+0x82/0x180 [ 24.831220] ? preempt_count_sub+0x50/0x80 [ 24.831224] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.831228] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 24.831233] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.831237] kthread+0x334/0x6f0 [ 24.831240] ? trace_preempt_on+0x20/0xc0 [ 24.831245] ? __pfx_kthread+0x10/0x10 [ 24.831249] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.831253] ? calculate_sigpending+0x7b/0xa0 [ 24.831257] ? __pfx_kthread+0x10/0x10 [ 24.831261] ret_from_fork+0x3e/0x80 [ 24.831265] ? __pfx_kthread+0x10/0x10 [ 24.831269] ret_from_fork_asm+0x1a/0x30 [ 24.831275] </TASK> [ 24.831276] [ 24.998293] Allocated by task 215: [ 25.001700] kasan_save_stack+0x45/0x70 [ 25.005582] kasan_save_track+0x18/0x40 [ 25.009420] kasan_save_alloc_info+0x3b/0x50 [ 25.013714] __kasan_kmalloc+0xb7/0xc0 [ 25.017499] __kmalloc_cache_noprof+0x189/0x420 [ 25.022030] kmalloc_oob_memset_2+0xac/0x330 [ 25.026304] kunit_try_run_case+0x1a2/0x480 [ 25.030490] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 25.035889] kthread+0x334/0x6f0 [ 25.039121] ret_from_fork+0x3e/0x80 [ 25.042701] ret_from_fork_asm+0x1a/0x30 [ 25.046699] [ 25.048213] The buggy address belongs to the object at ffff888107f05000 [ 25.048213] which belongs to the cache kmalloc-128 of size 128 [ 25.060761] The buggy address is located 119 bytes inside of [ 25.060761] allocated 120-byte region [ffff888107f05000, ffff888107f05078) [ 25.073362] [ 25.074860] The buggy address belongs to the physical page: [ 25.080432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f05 [ 25.088434] flags: 0x200000000000000(node=0|zone=2) [ 25.093320] page_type: f5(slab) [ 25.096468] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 25.104213] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.111953] page dumped because: kasan: bad access detected [ 25.117525] [ 25.119024] Memory state around the buggy address: [ 25.123817] ffff888107f04f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.131035] ffff888107f04f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.138254] >ffff888107f05000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.145473] ^ [ 25.152605] ffff888107f05080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.159827] ffff888107f05100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.167053] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 24.432623] ================================================================== [ 24.443429] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x15f/0x320 [ 24.450742] Write of size 128 at addr ffff888104ee9100 by task kunit_try_catch/213 [ 24.458316] [ 24.459817] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 24.459825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.459827] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 24.459831] Call Trace: [ 24.459832] <TASK> [ 24.459834] dump_stack_lvl+0x73/0xb0 [ 24.459838] print_report+0xd1/0x650 [ 24.459842] ? __virt_addr_valid+0x1db/0x2d0 [ 24.459846] ? kmalloc_oob_in_memset+0x15f/0x320 [ 24.459850] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.459854] ? kmalloc_oob_in_memset+0x15f/0x320 [ 24.459859] kasan_report+0x141/0x180 [ 24.459863] ? kmalloc_oob_in_memset+0x15f/0x320 [ 24.459868] kasan_check_range+0x10c/0x1c0 [ 24.459872] __asan_memset+0x27/0x50 [ 24.459876] kmalloc_oob_in_memset+0x15f/0x320 [ 24.459880] ? __pfx_kmalloc_oob_in_memset+0x10/0x10 [ 24.459884] ? __schedule+0x10cc/0x2b30 [ 24.459889] ? ktime_get_ts64+0x83/0x230 [ 24.459893] kunit_try_run_case+0x1a2/0x480 [ 24.459898] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.459902] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.459906] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.459911] ? __kthread_parkme+0x82/0x180 [ 24.459915] ? preempt_count_sub+0x50/0x80 [ 24.459919] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.459923] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 24.459927] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.459932] kthread+0x334/0x6f0 [ 24.459936] ? trace_preempt_on+0x20/0xc0 [ 24.459940] ? __pfx_kthread+0x10/0x10 [ 24.459944] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.459948] ? calculate_sigpending+0x7b/0xa0 [ 24.459952] ? __pfx_kthread+0x10/0x10 [ 24.459956] ret_from_fork+0x3e/0x80 [ 24.459960] ? __pfx_kthread+0x10/0x10 [ 24.459964] ret_from_fork_asm+0x1a/0x30 [ 24.459970] </TASK> [ 24.459971] [ 24.627455] Allocated by task 213: [ 24.630863] kasan_save_stack+0x45/0x70 [ 24.634702] kasan_save_track+0x18/0x40 [ 24.638592] kasan_save_alloc_info+0x3b/0x50 [ 24.642865] __kasan_kmalloc+0xb7/0xc0 [ 24.646617] __kmalloc_cache_noprof+0x189/0x420 [ 24.651148] kmalloc_oob_in_memset+0xac/0x320 [ 24.655507] kunit_try_run_case+0x1a2/0x480 [ 24.659702] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 24.665144] kthread+0x334/0x6f0 [ 24.668377] ret_from_fork+0x3e/0x80 [ 24.671957] ret_from_fork_asm+0x1a/0x30 [ 24.675883] [ 24.677381] The buggy address belongs to the object at ffff888104ee9100 [ 24.677381] which belongs to the cache kmalloc-128 of size 128 [ 24.689888] The buggy address is located 0 bytes inside of [ 24.689888] allocated 120-byte region [ffff888104ee9100, ffff888104ee9178) [ 24.702315] [ 24.703814] The buggy address belongs to the physical page: [ 24.709387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9 [ 24.717393] flags: 0x200000000000000(node=0|zone=2) [ 24.722274] page_type: f5(slab) [ 24.725420] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 24.733158] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.740898] page dumped because: kasan: bad access detected [ 24.746469] [ 24.747970] Memory state around the buggy address: [ 24.752762] ffff888104ee9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.759982] ffff888104ee9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.767210] >ffff888104ee9100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.774426] ^ [ 24.781560] ffff888104ee9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.788780] ffff888104ee9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.796007] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 24.023437] ================================================================== [ 24.034240] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x47b/0x4c0 [ 24.041026] Read of size 16 at addr ffff888104ed9140 by task kunit_try_catch/211 [ 24.048421] [ 24.049921] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 24.049929] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.049931] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 24.049934] Call Trace: [ 24.049936] <TASK> [ 24.049938] dump_stack_lvl+0x73/0xb0 [ 24.049942] print_report+0xd1/0x650 [ 24.049946] ? __virt_addr_valid+0x1db/0x2d0 [ 24.049950] ? kmalloc_uaf_16+0x47b/0x4c0 [ 24.049954] ? kasan_complete_mode_report_info+0x64/0x200 [ 24.049958] ? kmalloc_uaf_16+0x47b/0x4c0 [ 24.049962] kasan_report+0x141/0x180 [ 24.049966] ? kmalloc_uaf_16+0x47b/0x4c0 [ 24.049970] __asan_report_load16_noabort+0x18/0x20 [ 24.049974] kmalloc_uaf_16+0x47b/0x4c0 [ 24.049978] ? __pfx_kmalloc_uaf_16+0x10/0x10 [ 24.049982] ? __schedule+0x10cc/0x2b30 [ 24.049987] ? ktime_get_ts64+0x83/0x230 [ 24.049991] kunit_try_run_case+0x1a2/0x480 [ 24.049996] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.050000] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.050004] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.050009] ? __kthread_parkme+0x82/0x180 [ 24.050013] ? preempt_count_sub+0x50/0x80 [ 24.050017] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.050022] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 24.050025] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.050029] kthread+0x334/0x6f0 [ 24.050033] ? trace_preempt_on+0x20/0xc0 [ 24.050038] ? __pfx_kthread+0x10/0x10 [ 24.050042] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.050046] ? calculate_sigpending+0x7b/0xa0 [ 24.050050] ? __pfx_kthread+0x10/0x10 [ 24.050054] ret_from_fork+0x3e/0x80 [ 24.050058] ? __pfx_kthread+0x10/0x10 [ 24.050062] ret_from_fork_asm+0x1a/0x30 [ 24.050068] </TASK> [ 24.050069] [ 24.211760] Allocated by task 211: [ 24.215169] kasan_save_stack+0x45/0x70 [ 24.219016] kasan_save_track+0x18/0x40 [ 24.222861] kasan_save_alloc_info+0x3b/0x50 [ 24.227136] __kasan_kmalloc+0xb7/0xc0 [ 24.230896] __kmalloc_cache_noprof+0x189/0x420 [ 24.235430] kmalloc_uaf_16+0x15b/0x4c0 [ 24.239268] kunit_try_run_case+0x1a2/0x480 [ 24.243454] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 24.248854] kthread+0x334/0x6f0 [ 24.252095] ret_from_fork+0x3e/0x80 [ 24.255713] ret_from_fork_asm+0x1a/0x30 [ 24.259699] [ 24.261245] Freed by task 211: [ 24.264304] kasan_save_stack+0x45/0x70 [ 24.268143] kasan_save_track+0x18/0x40 [ 24.271983] kasan_save_free_info+0x3f/0x60 [ 24.276170] __kasan_slab_free+0x56/0x70 [ 24.280104] kfree+0x222/0x3f0 [ 24.283161] kmalloc_uaf_16+0x1d6/0x4c0 [ 24.287003] kunit_try_run_case+0x1a2/0x480 [ 24.291197] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 24.296595] kthread+0x334/0x6f0 [ 24.299828] ret_from_fork+0x3e/0x80 [ 24.303405] ret_from_fork_asm+0x1a/0x30 [ 24.307332] [ 24.308832] The buggy address belongs to the object at ffff888104ed9140 [ 24.308832] which belongs to the cache kmalloc-16 of size 16 [ 24.321172] The buggy address is located 0 bytes inside of [ 24.321172] freed 16-byte region [ffff888104ed9140, ffff888104ed9150) [ 24.333168] [ 24.334685] The buggy address belongs to the physical page: [ 24.340292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9 [ 24.348299] flags: 0x200000000000000(node=0|zone=2) [ 24.353177] page_type: f5(slab) [ 24.356324] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 24.364064] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.371809] page dumped because: kasan: bad access detected [ 24.377384] [ 24.378881] Memory state around the buggy address: [ 24.383713] ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc [ 24.390961] ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 24.398181] >ffff888104ed9100: 00 05 fc fc 00 00 fc fc fa fb fc fc fc fc fc fc [ 24.405401] ^ [ 24.410748] ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.417977] ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.425193] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 23.663724] ================================================================== [ 23.674359] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x452/0x4a0 [ 23.681064] Write of size 16 at addr ffff888105b98500 by task kunit_try_catch/209 [ 23.688546] [ 23.690045] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 23.690054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.690056] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 23.690059] Call Trace: [ 23.690061] <TASK> [ 23.690063] dump_stack_lvl+0x73/0xb0 [ 23.690067] print_report+0xd1/0x650 [ 23.690071] ? __virt_addr_valid+0x1db/0x2d0 [ 23.690075] ? kmalloc_oob_16+0x452/0x4a0 [ 23.690078] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.690083] ? kmalloc_oob_16+0x452/0x4a0 [ 23.690087] kasan_report+0x141/0x180 [ 23.690091] ? kmalloc_oob_16+0x452/0x4a0 [ 23.690095] __asan_report_store16_noabort+0x1b/0x30 [ 23.690099] kmalloc_oob_16+0x452/0x4a0 [ 23.690103] ? __pfx_kmalloc_oob_16+0x10/0x10 [ 23.690107] ? __schedule+0x10cc/0x2b30 [ 23.690112] ? ktime_get_ts64+0x83/0x230 [ 23.690116] kunit_try_run_case+0x1a2/0x480 [ 23.690121] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.690125] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.690129] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.690134] ? __kthread_parkme+0x82/0x180 [ 23.690138] ? preempt_count_sub+0x50/0x80 [ 23.690142] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.690147] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 23.690151] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.690155] kthread+0x334/0x6f0 [ 23.690159] ? trace_preempt_on+0x20/0xc0 [ 23.690163] ? __pfx_kthread+0x10/0x10 [ 23.690167] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.690171] ? calculate_sigpending+0x7b/0xa0 [ 23.690175] ? __pfx_kthread+0x10/0x10 [ 23.690179] ret_from_fork+0x3e/0x80 [ 23.690183] ? __pfx_kthread+0x10/0x10 [ 23.690187] ret_from_fork_asm+0x1a/0x30 [ 23.690193] </TASK> [ 23.690195] [ 23.851885] Allocated by task 209: [ 23.855291] kasan_save_stack+0x45/0x70 [ 23.859132] kasan_save_track+0x18/0x40 [ 23.862971] kasan_save_alloc_info+0x3b/0x50 [ 23.867243] __kasan_kmalloc+0xb7/0xc0 [ 23.870994] __kmalloc_cache_noprof+0x189/0x420 [ 23.875529] kmalloc_oob_16+0xa8/0x4a0 [ 23.879287] kunit_try_run_case+0x1a2/0x480 [ 23.883474] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 23.888875] kthread+0x334/0x6f0 [ 23.892115] ret_from_fork+0x3e/0x80 [ 23.895701] ret_from_fork_asm+0x1a/0x30 [ 23.899654] [ 23.901155] The buggy address belongs to the object at ffff888105b98500 [ 23.901155] which belongs to the cache kmalloc-16 of size 16 [ 23.913494] The buggy address is located 0 bytes inside of [ 23.913494] allocated 13-byte region [ffff888105b98500, ffff888105b9850d) [ 23.925836] [ 23.927336] The buggy address belongs to the physical page: [ 23.932908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b98 [ 23.940914] flags: 0x200000000000000(node=0|zone=2) [ 23.945795] page_type: f5(slab) [ 23.948940] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 23.956704] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.964469] page dumped because: kasan: bad access detected [ 23.970040] [ 23.971532] Memory state around the buggy address: [ 23.976325] ffff888105b98400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.983544] ffff888105b98480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 06 fc fc [ 23.990763] >ffff888105b98500: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.997983] ^ [ 24.001473] ffff888105b98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.008703] ffff888105b98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.015922] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 22.744141] ================================================================== [ 22.755745] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0 [ 22.762363] Read of size 1 at addr ffff8881038cac00 by task kunit_try_catch/207 [ 22.769687] [ 22.771221] CPU: 3 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 22.771229] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.771231] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 22.771234] Call Trace: [ 22.771236] <TASK> [ 22.771237] dump_stack_lvl+0x73/0xb0 [ 22.771241] print_report+0xd1/0x650 [ 22.771245] ? __virt_addr_valid+0x1db/0x2d0 [ 22.771249] ? krealloc_uaf+0x1b8/0x5e0 [ 22.771253] ? kasan_complete_mode_report_info+0x64/0x200 [ 22.771257] ? krealloc_uaf+0x1b8/0x5e0 [ 22.771261] kasan_report+0x141/0x180 [ 22.771265] ? krealloc_uaf+0x1b8/0x5e0 [ 22.771269] ? krealloc_uaf+0x1b8/0x5e0 [ 22.771274] __kasan_check_byte+0x3d/0x50 [ 22.771278] krealloc_noprof+0x3f/0x340 [ 22.771282] krealloc_uaf+0x1b8/0x5e0 [ 22.771286] ? __pfx_krealloc_uaf+0x10/0x10 [ 22.771290] ? finish_task_switch.isra.0+0x153/0x700 [ 22.771294] ? __switch_to+0x5d9/0xf60 [ 22.771298] ? dequeue_task_fair+0x166/0x4e0 [ 22.771302] ? __schedule+0x10cc/0x2b30 [ 22.771306] ? ktime_get_ts64+0x83/0x230 [ 22.771311] kunit_try_run_case+0x1a2/0x480 [ 22.771315] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.771319] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.771324] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.771328] ? __kthread_parkme+0x82/0x180 [ 22.771332] ? preempt_count_sub+0x50/0x80 [ 22.771337] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.771341] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 22.771345] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.771349] kthread+0x334/0x6f0 [ 22.771353] ? trace_preempt_on+0x20/0xc0 [ 22.771357] ? __pfx_kthread+0x10/0x10 [ 22.771361] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.771365] ? calculate_sigpending+0x7b/0xa0 [ 22.771369] ? __pfx_kthread+0x10/0x10 [ 22.771373] ret_from_fork+0x3e/0x80 [ 22.771377] ? __pfx_kthread+0x10/0x10 [ 22.771381] ret_from_fork_asm+0x1a/0x30 [ 22.771387] </TASK> [ 22.771388] [ 22.951937] Allocated by task 207: [ 22.955343] kasan_save_stack+0x45/0x70 [ 22.959183] kasan_save_track+0x18/0x40 [ 22.963021] kasan_save_alloc_info+0x3b/0x50 [ 22.967294] __kasan_kmalloc+0xb7/0xc0 [ 22.971045] __kmalloc_cache_noprof+0x189/0x420 [ 22.975579] krealloc_uaf+0xbb/0x5e0 [ 22.979159] kunit_try_run_case+0x1a2/0x480 [ 22.983353] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 22.988758] kthread+0x334/0x6f0 [ 22.992019] ret_from_fork+0x3e/0x80 [ 22.995599] ret_from_fork_asm+0x1a/0x30 [ 22.999531] [ 23.001031] Freed by task 207: [ 23.004093] kasan_save_stack+0x45/0x70 [ 23.007931] kasan_save_track+0x18/0x40 [ 23.011770] kasan_save_free_info+0x3f/0x60 [ 23.015956] __kasan_slab_free+0x56/0x70 [ 23.019879] kfree+0x222/0x3f0 [ 23.022940] krealloc_uaf+0x13d/0x5e0 [ 23.026605] kunit_try_run_case+0x1a2/0x480 [ 23.030792] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 23.036191] kthread+0x334/0x6f0 [ 23.039424] ret_from_fork+0x3e/0x80 [ 23.043004] ret_from_fork_asm+0x1a/0x30 [ 23.046938] [ 23.048435] The buggy address belongs to the object at ffff8881038cac00 [ 23.048435] which belongs to the cache kmalloc-256 of size 256 [ 23.060941] The buggy address is located 0 bytes inside of [ 23.060941] freed 256-byte region [ffff8881038cac00, ffff8881038cad00) [ 23.073023] [ 23.074521] The buggy address belongs to the physical page: [ 23.080094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ca [ 23.088103] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.095762] flags: 0x200000000000040(head|node=0|zone=2) [ 23.101074] page_type: f5(slab) [ 23.104221] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 23.111960] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.119702] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 23.127553] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.135385] head: 0200000000000001 ffffea00040e3281 00000000ffffffff 00000000ffffffff [ 23.143212] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 23.151046] page dumped because: kasan: bad access detected [ 23.156617] [ 23.158116] Memory state around the buggy address: [ 23.162909] ffff8881038cab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.170127] ffff8881038cab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.177347] >ffff8881038cac00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.184567] ^ [ 23.187799] ffff8881038cac80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.195017] ffff8881038cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.202238] ================================================================== [ 23.209478] ================================================================== [ 23.216708] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0 [ 23.223346] Read of size 1 at addr ffff8881038cac00 by task kunit_try_catch/207 [ 23.230652] [ 23.232154] CPU: 3 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 23.232162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.232164] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 23.232167] Call Trace: [ 23.232169] <TASK> [ 23.232170] dump_stack_lvl+0x73/0xb0 [ 23.232174] print_report+0xd1/0x650 [ 23.232178] ? __virt_addr_valid+0x1db/0x2d0 [ 23.232181] ? krealloc_uaf+0x53c/0x5e0 [ 23.232185] ? kasan_complete_mode_report_info+0x64/0x200 [ 23.232189] ? krealloc_uaf+0x53c/0x5e0 [ 23.232193] kasan_report+0x141/0x180 [ 23.232197] ? krealloc_uaf+0x53c/0x5e0 [ 23.232202] __asan_report_load1_noabort+0x18/0x20 [ 23.232206] krealloc_uaf+0x53c/0x5e0 [ 23.232210] ? __pfx_krealloc_uaf+0x10/0x10 [ 23.232214] ? finish_task_switch.isra.0+0x153/0x700 [ 23.232218] ? __switch_to+0x5d9/0xf60 [ 23.232222] ? dequeue_task_fair+0x166/0x4e0 [ 23.232226] ? __schedule+0x10cc/0x2b30 [ 23.232231] ? ktime_get_ts64+0x83/0x230 [ 23.232235] kunit_try_run_case+0x1a2/0x480 [ 23.232240] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.232244] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.232248] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.232252] ? __kthread_parkme+0x82/0x180 [ 23.232256] ? preempt_count_sub+0x50/0x80 [ 23.232261] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.232265] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 23.232269] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.232273] kthread+0x334/0x6f0 [ 23.232277] ? trace_preempt_on+0x20/0xc0 [ 23.232281] ? __pfx_kthread+0x10/0x10 [ 23.232285] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.232289] ? calculate_sigpending+0x7b/0xa0 [ 23.232293] ? __pfx_kthread+0x10/0x10 [ 23.232297] ret_from_fork+0x3e/0x80 [ 23.232301] ? __pfx_kthread+0x10/0x10 [ 23.232305] ret_from_fork_asm+0x1a/0x30 [ 23.232311] </TASK> [ 23.232312] [ 23.405930] Allocated by task 207: [ 23.409334] kasan_save_stack+0x45/0x70 [ 23.413174] kasan_save_track+0x18/0x40 [ 23.417013] kasan_save_alloc_info+0x3b/0x50 [ 23.421286] __kasan_kmalloc+0xb7/0xc0 [ 23.425037] __kmalloc_cache_noprof+0x189/0x420 [ 23.429571] krealloc_uaf+0xbb/0x5e0 [ 23.433148] kunit_try_run_case+0x1a2/0x480 [ 23.437334] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 23.442733] kthread+0x334/0x6f0 [ 23.445966] ret_from_fork+0x3e/0x80 [ 23.449547] ret_from_fork_asm+0x1a/0x30 [ 23.453481] [ 23.454979] Freed by task 207: [ 23.458038] kasan_save_stack+0x45/0x70 [ 23.461879] kasan_save_track+0x18/0x40 [ 23.465741] kasan_save_free_info+0x3f/0x60 [ 23.469928] __kasan_slab_free+0x56/0x70 [ 23.473856] kfree+0x222/0x3f0 [ 23.476913] krealloc_uaf+0x13d/0x5e0 [ 23.480578] kunit_try_run_case+0x1a2/0x480 [ 23.484767] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 23.490174] kthread+0x334/0x6f0 [ 23.493405] ret_from_fork+0x3e/0x80 [ 23.496984] ret_from_fork_asm+0x1a/0x30 [ 23.500910] [ 23.502410] The buggy address belongs to the object at ffff8881038cac00 [ 23.502410] which belongs to the cache kmalloc-256 of size 256 [ 23.514923] The buggy address is located 0 bytes inside of [ 23.514923] freed 256-byte region [ffff8881038cac00, ffff8881038cad00) [ 23.527004] [ 23.528505] The buggy address belongs to the physical page: [ 23.534077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ca [ 23.542083] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.549737] flags: 0x200000000000040(head|node=0|zone=2) [ 23.555048] page_type: f5(slab) [ 23.558197] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 23.565944] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.573743] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 23.581576] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.589404] head: 0200000000000001 ffffea00040e3281 00000000ffffffff 00000000ffffffff [ 23.597236] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 23.605063] page dumped because: kasan: bad access detected [ 23.610634] [ 23.612132] Memory state around the buggy address: [ 23.616927] ffff8881038cab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.624145] ffff8881038cab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.631364] >ffff8881038cac00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.638582] ^ [ 23.641816] ffff8881038cac80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.649034] ffff8881038cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.656254] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 18.220783] ================================================================== [ 18.231855] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 18.239516] Write of size 1 at addr ffff888100350ec9 by task kunit_try_catch/201 [ 18.246909] [ 18.248410] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 18.248418] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.248420] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 18.248423] Call Trace: [ 18.248425] <TASK> [ 18.248427] dump_stack_lvl+0x73/0xb0 [ 18.248431] print_report+0xd1/0x650 [ 18.248435] ? __virt_addr_valid+0x1db/0x2d0 [ 18.248439] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 18.248444] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.248448] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 18.248452] kasan_report+0x141/0x180 [ 18.248457] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 18.248462] __asan_report_store1_noabort+0x1b/0x30 [ 18.248466] krealloc_less_oob_helper+0xd70/0x11d0 [ 18.248471] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 18.248476] ? finish_task_switch.isra.0+0x153/0x700 [ 18.248480] ? __switch_to+0x5d9/0xf60 [ 18.248484] ? dequeue_task_fair+0x166/0x4e0 [ 18.248488] ? __schedule+0x10cc/0x2b30 [ 18.248493] krealloc_less_oob+0x1c/0x30 [ 18.248497] kunit_try_run_case+0x1a2/0x480 [ 18.248502] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.248506] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.248510] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.248515] ? __kthread_parkme+0x82/0x180 [ 18.248519] ? preempt_count_sub+0x50/0x80 [ 18.248523] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.248527] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 18.248532] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.248536] kthread+0x334/0x6f0 [ 18.248540] ? trace_preempt_on+0x20/0xc0 [ 18.248544] ? __pfx_kthread+0x10/0x10 [ 18.248548] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.248552] ? calculate_sigpending+0x7b/0xa0 [ 18.248556] ? __pfx_kthread+0x10/0x10 [ 18.248560] ret_from_fork+0x3e/0x80 [ 18.248564] ? __pfx_kthread+0x10/0x10 [ 18.248568] ret_from_fork_asm+0x1a/0x30 [ 18.248574] </TASK> [ 18.248576] [ 18.427853] Allocated by task 201: [ 18.431259] kasan_save_stack+0x45/0x70 [ 18.435106] kasan_save_track+0x18/0x40 [ 18.438944] kasan_save_alloc_info+0x3b/0x50 [ 18.443219] __kasan_krealloc+0x190/0x1f0 [ 18.447237] krealloc_noprof+0xf3/0x340 [ 18.451079] krealloc_less_oob_helper+0x1aa/0x11d0 [ 18.455878] krealloc_less_oob+0x1c/0x30 [ 18.459806] kunit_try_run_case+0x1a2/0x480 [ 18.463998] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 18.469397] kthread+0x334/0x6f0 [ 18.472631] ret_from_fork+0x3e/0x80 [ 18.476210] ret_from_fork_asm+0x1a/0x30 [ 18.480135] [ 18.481635] The buggy address belongs to the object at ffff888100350e00 [ 18.481635] which belongs to the cache kmalloc-256 of size 256 [ 18.494150] The buggy address is located 0 bytes to the right of [ 18.494150] allocated 201-byte region [ffff888100350e00, ffff888100350ec9) [ 18.507104] [ 18.508603] The buggy address belongs to the physical page: [ 18.514177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350 [ 18.522183] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.529836] flags: 0x200000000000040(head|node=0|zone=2) [ 18.535149] page_type: f5(slab) [ 18.538296] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 18.546043] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.553784] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 18.561617] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.569450] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff [ 18.577275] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 18.585102] page dumped because: kasan: bad access detected [ 18.590689] [ 18.592215] Memory state around the buggy address: [ 18.597008] ffff888100350d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.604227] ffff888100350e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.611449] >ffff888100350e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 18.618684] ^ [ 18.624292] ffff888100350f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.631519] ffff888100350f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.638738] ================================================================== [ 19.489501] ================================================================== [ 19.496735] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 19.504393] Write of size 1 at addr ffff888100350eea by task kunit_try_catch/201 [ 19.511784] [ 19.513278] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 19.513285] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.513287] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 19.513290] Call Trace: [ 19.513292] <TASK> [ 19.513293] dump_stack_lvl+0x73/0xb0 [ 19.513297] print_report+0xd1/0x650 [ 19.513301] ? __virt_addr_valid+0x1db/0x2d0 [ 19.513304] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 19.513309] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.513313] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 19.513317] kasan_report+0x141/0x180 [ 19.513321] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 19.513327] __asan_report_store1_noabort+0x1b/0x30 [ 19.513331] krealloc_less_oob_helper+0xe90/0x11d0 [ 19.513336] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 19.513340] ? finish_task_switch.isra.0+0x153/0x700 [ 19.513345] ? __switch_to+0x5d9/0xf60 [ 19.513348] ? dequeue_task_fair+0x166/0x4e0 [ 19.513352] ? __schedule+0x10cc/0x2b30 [ 19.513357] krealloc_less_oob+0x1c/0x30 [ 19.513362] kunit_try_run_case+0x1a2/0x480 [ 19.513366] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.513370] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.513374] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.513378] ? __kthread_parkme+0x82/0x180 [ 19.513382] ? preempt_count_sub+0x50/0x80 [ 19.513387] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.513391] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 19.513395] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.513399] kthread+0x334/0x6f0 [ 19.513403] ? trace_preempt_on+0x20/0xc0 [ 19.513407] ? __pfx_kthread+0x10/0x10 [ 19.513411] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.513415] ? calculate_sigpending+0x7b/0xa0 [ 19.513419] ? __pfx_kthread+0x10/0x10 [ 19.513423] ret_from_fork+0x3e/0x80 [ 19.513427] ? __pfx_kthread+0x10/0x10 [ 19.513431] ret_from_fork_asm+0x1a/0x30 [ 19.513437] </TASK> [ 19.513438] [ 19.692745] Allocated by task 201: [ 19.696150] kasan_save_stack+0x45/0x70 [ 19.699990] kasan_save_track+0x18/0x40 [ 19.703828] kasan_save_alloc_info+0x3b/0x50 [ 19.708104] __kasan_krealloc+0x190/0x1f0 [ 19.712116] krealloc_noprof+0xf3/0x340 [ 19.715962] krealloc_less_oob_helper+0x1aa/0x11d0 [ 19.720756] krealloc_less_oob+0x1c/0x30 [ 19.724704] kunit_try_run_case+0x1a2/0x480 [ 19.728908] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 19.734310] kthread+0x334/0x6f0 [ 19.737543] ret_from_fork+0x3e/0x80 [ 19.741130] ret_from_fork_asm+0x1a/0x30 [ 19.745064] [ 19.746563] The buggy address belongs to the object at ffff888100350e00 [ 19.746563] which belongs to the cache kmalloc-256 of size 256 [ 19.759077] The buggy address is located 33 bytes to the right of [ 19.759077] allocated 201-byte region [ffff888100350e00, ffff888100350ec9) [ 19.772111] [ 19.773611] The buggy address belongs to the physical page: [ 19.779182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350 [ 19.787181] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.794834] flags: 0x200000000000040(head|node=0|zone=2) [ 19.800145] page_type: f5(slab) [ 19.803292] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 19.811032] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.818773] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 19.826607] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.834439] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff [ 19.842266] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.850098] page dumped because: kasan: bad access detected [ 19.855689] [ 19.857214] Memory state around the buggy address: [ 19.862005] ffff888100350d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.869225] ffff888100350e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.876445] >ffff888100350e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 19.883664] ^ [ 19.890309] ffff888100350f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.897530] ffff888100350f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.904749] ================================================================== [ 19.911990] ================================================================== [ 19.919220] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 19.926875] Write of size 1 at addr ffff888100350eeb by task kunit_try_catch/201 [ 19.934275] [ 19.935776] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 19.935784] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.935785] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 19.935788] Call Trace: [ 19.935790] <TASK> [ 19.935791] dump_stack_lvl+0x73/0xb0 [ 19.935795] print_report+0xd1/0x650 [ 19.935799] ? __virt_addr_valid+0x1db/0x2d0 [ 19.935802] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 19.935807] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.935811] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 19.935815] kasan_report+0x141/0x180 [ 19.935820] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 19.935825] __asan_report_store1_noabort+0x1b/0x30 [ 19.935829] krealloc_less_oob_helper+0xd47/0x11d0 [ 19.935834] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 19.935838] ? finish_task_switch.isra.0+0x153/0x700 [ 19.935843] ? __switch_to+0x5d9/0xf60 [ 19.935846] ? dequeue_task_fair+0x166/0x4e0 [ 19.935850] ? __schedule+0x10cc/0x2b30 [ 19.935855] krealloc_less_oob+0x1c/0x30 [ 19.935859] kunit_try_run_case+0x1a2/0x480 [ 19.935864] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.935868] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.935872] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.935876] ? __kthread_parkme+0x82/0x180 [ 19.935880] ? preempt_count_sub+0x50/0x80 [ 19.935885] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.935889] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 19.935893] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.935897] kthread+0x334/0x6f0 [ 19.935901] ? trace_preempt_on+0x20/0xc0 [ 19.935905] ? __pfx_kthread+0x10/0x10 [ 19.935909] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.935913] ? calculate_sigpending+0x7b/0xa0 [ 19.935917] ? __pfx_kthread+0x10/0x10 [ 19.935921] ret_from_fork+0x3e/0x80 [ 19.935925] ? __pfx_kthread+0x10/0x10 [ 19.935929] ret_from_fork_asm+0x1a/0x30 [ 19.935935] </TASK> [ 19.935936] [ 20.115147] Allocated by task 201: [ 20.118555] kasan_save_stack+0x45/0x70 [ 20.122401] kasan_save_track+0x18/0x40 [ 20.126241] kasan_save_alloc_info+0x3b/0x50 [ 20.130513] __kasan_krealloc+0x190/0x1f0 [ 20.134526] krealloc_noprof+0xf3/0x340 [ 20.138365] krealloc_less_oob_helper+0x1aa/0x11d0 [ 20.143156] krealloc_less_oob+0x1c/0x30 [ 20.147083] kunit_try_run_case+0x1a2/0x480 [ 20.151269] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 20.156667] kthread+0x334/0x6f0 [ 20.159953] ret_from_fork+0x3e/0x80 [ 20.163533] ret_from_fork_asm+0x1a/0x30 [ 20.167456] [ 20.168957] The buggy address belongs to the object at ffff888100350e00 [ 20.168957] which belongs to the cache kmalloc-256 of size 256 [ 20.181470] The buggy address is located 34 bytes to the right of [ 20.181470] allocated 201-byte region [ffff888100350e00, ffff888100350ec9) [ 20.194504] [ 20.196005] The buggy address belongs to the physical page: [ 20.201577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350 [ 20.209577] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.217236] flags: 0x200000000000040(head|node=0|zone=2) [ 20.222549] page_type: f5(slab) [ 20.225715] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 20.233461] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.241201] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 20.249033] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.256860] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff [ 20.264717] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 20.272555] page dumped because: kasan: bad access detected [ 20.278126] [ 20.279626] Memory state around the buggy address: [ 20.284419] ffff888100350d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.291646] ffff888100350e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.298865] >ffff888100350e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 20.306084] ^ [ 20.312700] ffff888100350f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.319942] ffff888100350f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.327160] ================================================================== [ 18.645988] ================================================================== [ 18.653218] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 18.660881] Write of size 1 at addr ffff888100350ed0 by task kunit_try_catch/201 [ 18.668279] [ 18.669781] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 18.669789] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.669791] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 18.669794] Call Trace: [ 18.669796] <TASK> [ 18.669797] dump_stack_lvl+0x73/0xb0 [ 18.669801] print_report+0xd1/0x650 [ 18.669805] ? __virt_addr_valid+0x1db/0x2d0 [ 18.669809] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 18.669813] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.669817] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 18.669822] kasan_report+0x141/0x180 [ 18.669826] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 18.669832] __asan_report_store1_noabort+0x1b/0x30 [ 18.669835] krealloc_less_oob_helper+0xe23/0x11d0 [ 18.669840] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 18.669845] ? finish_task_switch.isra.0+0x153/0x700 [ 18.669850] ? __switch_to+0x5d9/0xf60 [ 18.669853] ? dequeue_task_fair+0x166/0x4e0 [ 18.669858] ? __schedule+0x10cc/0x2b30 [ 18.669863] krealloc_less_oob+0x1c/0x30 [ 18.669867] kunit_try_run_case+0x1a2/0x480 [ 18.669871] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.669875] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.669879] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.669884] ? __kthread_parkme+0x82/0x180 [ 18.669888] ? preempt_count_sub+0x50/0x80 [ 18.669892] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.669896] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 18.669900] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.669904] kthread+0x334/0x6f0 [ 18.669908] ? trace_preempt_on+0x20/0xc0 [ 18.669912] ? __pfx_kthread+0x10/0x10 [ 18.669916] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.669920] ? calculate_sigpending+0x7b/0xa0 [ 18.669924] ? __pfx_kthread+0x10/0x10 [ 18.669928] ret_from_fork+0x3e/0x80 [ 18.669932] ? __pfx_kthread+0x10/0x10 [ 18.669936] ret_from_fork_asm+0x1a/0x30 [ 18.669942] </TASK> [ 18.669944] [ 18.849190] Allocated by task 201: [ 18.852595] kasan_save_stack+0x45/0x70 [ 18.856434] kasan_save_track+0x18/0x40 [ 18.860274] kasan_save_alloc_info+0x3b/0x50 [ 18.864555] __kasan_krealloc+0x190/0x1f0 [ 18.868566] krealloc_noprof+0xf3/0x340 [ 18.872404] krealloc_less_oob_helper+0x1aa/0x11d0 [ 18.877198] krealloc_less_oob+0x1c/0x30 [ 18.881123] kunit_try_run_case+0x1a2/0x480 [ 18.885309] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 18.890722] kthread+0x334/0x6f0 [ 18.893967] ret_from_fork+0x3e/0x80 [ 18.897545] ret_from_fork_asm+0x1a/0x30 [ 18.901473] [ 18.902970] The buggy address belongs to the object at ffff888100350e00 [ 18.902970] which belongs to the cache kmalloc-256 of size 256 [ 18.915478] The buggy address is located 7 bytes to the right of [ 18.915478] allocated 201-byte region [ffff888100350e00, ffff888100350ec9) [ 18.928432] [ 18.929932] The buggy address belongs to the physical page: [ 18.935506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350 [ 18.943512] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.951165] flags: 0x200000000000040(head|node=0|zone=2) [ 18.956477] page_type: f5(slab) [ 18.959622] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 18.967363] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.975110] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 18.982935] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.990763] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff [ 18.998595] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.006422] page dumped because: kasan: bad access detected [ 19.011993] [ 19.013493] Memory state around the buggy address: [ 19.018284] ffff888100350d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.025503] ffff888100350e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.032731] >ffff888100350e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 19.039950] ^ [ 19.045784] ffff888100350f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.053011] ffff888100350f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.060230] ================================================================== [ 21.036104] ================================================================== [ 21.047720] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 21.055385] Write of size 1 at addr ffff888106ce20c9 by task kunit_try_catch/205 [ 21.062778] [ 21.064278] CPU: 3 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 21.064287] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.064289] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 21.064292] Call Trace: [ 21.064294] <TASK> [ 21.064296] dump_stack_lvl+0x73/0xb0 [ 21.064300] print_report+0xd1/0x650 [ 21.064304] ? __virt_addr_valid+0x1db/0x2d0 [ 21.064308] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 21.064312] ? kasan_addr_to_slab+0x11/0xa0 [ 21.064316] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 21.064320] kasan_report+0x141/0x180 [ 21.064325] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 21.064330] __asan_report_store1_noabort+0x1b/0x30 [ 21.064334] krealloc_less_oob_helper+0xd70/0x11d0 [ 21.064339] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 21.064343] ? finish_task_switch.isra.0+0x153/0x700 [ 21.064348] ? __switch_to+0x5d9/0xf60 [ 21.064351] ? dequeue_task_fair+0x166/0x4e0 [ 21.064356] ? __schedule+0x10cc/0x2b30 [ 21.064361] krealloc_large_less_oob+0x1c/0x30 [ 21.064365] kunit_try_run_case+0x1a2/0x480 [ 21.064369] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.064373] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.064378] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.064383] ? __kthread_parkme+0x82/0x180 [ 21.064386] ? preempt_count_sub+0x50/0x80 [ 21.064391] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.064395] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 21.064399] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.064403] kthread+0x334/0x6f0 [ 21.064407] ? trace_preempt_on+0x20/0xc0 [ 21.064411] ? __pfx_kthread+0x10/0x10 [ 21.064416] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.064420] ? calculate_sigpending+0x7b/0xa0 [ 21.064423] ? __pfx_kthread+0x10/0x10 [ 21.064428] ret_from_fork+0x3e/0x80 [ 21.064432] ? __pfx_kthread+0x10/0x10 [ 21.064436] ret_from_fork_asm+0x1a/0x30 [ 21.064442] </TASK> [ 21.064443] [ 21.243070] The buggy address belongs to the physical page: [ 21.248646] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106ce0 [ 21.256651] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.264305] flags: 0x200000000000040(head|node=0|zone=2) [ 21.269625] page_type: f8(unknown) [ 21.273031] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.280771] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.288517] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.296342] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.304169] head: 0200000000000002 ffffea00041b3801 00000000ffffffff 00000000ffffffff [ 21.311995] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.319827] page dumped because: kasan: bad access detected [ 21.325399] [ 21.326901] Memory state around the buggy address: [ 21.331701] ffff888106ce1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.338947] ffff888106ce2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.346167] >ffff888106ce2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.353392] ^ [ 21.358966] ffff888106ce2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.366185] ffff888106ce2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.373404] ================================================================== [ 22.061546] ================================================================== [ 22.068785] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 22.076446] Write of size 1 at addr ffff888106ce20ea by task kunit_try_catch/205 [ 22.083848] [ 22.085347] CPU: 3 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 22.085354] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.085356] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 22.085359] Call Trace: [ 22.085361] <TASK> [ 22.085362] dump_stack_lvl+0x73/0xb0 [ 22.085366] print_report+0xd1/0x650 [ 22.085370] ? __virt_addr_valid+0x1db/0x2d0 [ 22.085373] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 22.085378] ? kasan_addr_to_slab+0x11/0xa0 [ 22.085381] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 22.085386] kasan_report+0x141/0x180 [ 22.085390] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 22.085396] __asan_report_store1_noabort+0x1b/0x30 [ 22.085399] krealloc_less_oob_helper+0xe90/0x11d0 [ 22.085404] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 22.085409] ? finish_task_switch.isra.0+0x153/0x700 [ 22.085413] ? __switch_to+0x5d9/0xf60 [ 22.085417] ? dequeue_task_fair+0x166/0x4e0 [ 22.085421] ? __schedule+0x10cc/0x2b30 [ 22.085426] krealloc_large_less_oob+0x1c/0x30 [ 22.085430] kunit_try_run_case+0x1a2/0x480 [ 22.085434] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.085438] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.085443] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.085447] ? __kthread_parkme+0x82/0x180 [ 22.085451] ? preempt_count_sub+0x50/0x80 [ 22.085456] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.085460] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 22.085464] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.085468] kthread+0x334/0x6f0 [ 22.085472] ? trace_preempt_on+0x20/0xc0 [ 22.085476] ? __pfx_kthread+0x10/0x10 [ 22.085480] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.085484] ? calculate_sigpending+0x7b/0xa0 [ 22.085488] ? __pfx_kthread+0x10/0x10 [ 22.085492] ret_from_fork+0x3e/0x80 [ 22.085496] ? __pfx_kthread+0x10/0x10 [ 22.085500] ret_from_fork_asm+0x1a/0x30 [ 22.085506] </TASK> [ 22.085507] [ 22.264068] The buggy address belongs to the physical page: [ 22.269642] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106ce0 [ 22.277642] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.285295] flags: 0x200000000000040(head|node=0|zone=2) [ 22.290613] page_type: f8(unknown) [ 22.294021] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.301759] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.309498] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.317327] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.325151] head: 0200000000000002 ffffea00041b3801 00000000ffffffff 00000000ffffffff [ 22.332986] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.340817] page dumped because: kasan: bad access detected [ 22.346392] [ 22.347891] Memory state around the buggy address: [ 22.352714] ffff888106ce1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.359947] ffff888106ce2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.367165] >ffff888106ce2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 22.374383] ^ [ 22.380994] ffff888106ce2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.388213] ffff888106ce2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.395433] ================================================================== [ 22.402660] ================================================================== [ 22.409940] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 22.417592] Write of size 1 at addr ffff888106ce20eb by task kunit_try_catch/205 [ 22.424985] [ 22.426487] CPU: 3 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 22.426494] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.426496] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 22.426499] Call Trace: [ 22.426501] <TASK> [ 22.426502] dump_stack_lvl+0x73/0xb0 [ 22.426506] print_report+0xd1/0x650 [ 22.426510] ? __virt_addr_valid+0x1db/0x2d0 [ 22.426513] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 22.426518] ? kasan_addr_to_slab+0x11/0xa0 [ 22.426521] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 22.426526] kasan_report+0x141/0x180 [ 22.426530] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 22.426536] __asan_report_store1_noabort+0x1b/0x30 [ 22.426539] krealloc_less_oob_helper+0xd47/0x11d0 [ 22.426544] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 22.426549] ? finish_task_switch.isra.0+0x153/0x700 [ 22.426553] ? __switch_to+0x5d9/0xf60 [ 22.426557] ? dequeue_task_fair+0x166/0x4e0 [ 22.426561] ? __schedule+0x10cc/0x2b30 [ 22.426566] krealloc_large_less_oob+0x1c/0x30 [ 22.426570] kunit_try_run_case+0x1a2/0x480 [ 22.426575] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.426579] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.426583] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.426587] ? __kthread_parkme+0x82/0x180 [ 22.426591] ? preempt_count_sub+0x50/0x80 [ 22.426596] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.426600] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 22.426604] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.426608] kthread+0x334/0x6f0 [ 22.426612] ? trace_preempt_on+0x20/0xc0 [ 22.426616] ? __pfx_kthread+0x10/0x10 [ 22.426620] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.426624] ? calculate_sigpending+0x7b/0xa0 [ 22.426628] ? __pfx_kthread+0x10/0x10 [ 22.426632] ret_from_fork+0x3e/0x80 [ 22.426636] ? __pfx_kthread+0x10/0x10 [ 22.426640] ret_from_fork_asm+0x1a/0x30 [ 22.426645] </TASK> [ 22.426647] [ 22.605287] The buggy address belongs to the physical page: [ 22.610860] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106ce0 [ 22.618868] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.626521] flags: 0x200000000000040(head|node=0|zone=2) [ 22.631831] page_type: f8(unknown) [ 22.635238] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.642979] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.650732] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.658559] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.666384] head: 0200000000000002 ffffea00041b3801 00000000ffffffff 00000000ffffffff [ 22.674210] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.682036] page dumped because: kasan: bad access detected [ 22.687607] [ 22.689107] Memory state around the buggy address: [ 22.693898] ffff888106ce1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.701120] ffff888106ce2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.708346] >ffff888106ce2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 22.715565] ^ [ 22.722179] ffff888106ce2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.729404] ffff888106ce2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.736625] ================================================================== [ 21.380660] ================================================================== [ 21.387885] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 21.395546] Write of size 1 at addr ffff888106ce20d0 by task kunit_try_catch/205 [ 21.402946] [ 21.404446] CPU: 3 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 21.404454] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.404456] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 21.404459] Call Trace: [ 21.404460] <TASK> [ 21.404462] dump_stack_lvl+0x73/0xb0 [ 21.404466] print_report+0xd1/0x650 [ 21.404470] ? __virt_addr_valid+0x1db/0x2d0 [ 21.404474] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 21.404478] ? kasan_addr_to_slab+0x11/0xa0 [ 21.404482] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 21.404486] kasan_report+0x141/0x180 [ 21.404490] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 21.404496] __asan_report_store1_noabort+0x1b/0x30 [ 21.404500] krealloc_less_oob_helper+0xe23/0x11d0 [ 21.404504] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 21.404509] ? finish_task_switch.isra.0+0x153/0x700 [ 21.404513] ? __switch_to+0x5d9/0xf60 [ 21.404517] ? dequeue_task_fair+0x166/0x4e0 [ 21.404521] ? __schedule+0x10cc/0x2b30 [ 21.404526] krealloc_large_less_oob+0x1c/0x30 [ 21.404531] kunit_try_run_case+0x1a2/0x480 [ 21.404535] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.404539] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.404543] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.404548] ? __kthread_parkme+0x82/0x180 [ 21.404552] ? preempt_count_sub+0x50/0x80 [ 21.404556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.404560] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 21.404564] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.404568] kthread+0x334/0x6f0 [ 21.404572] ? trace_preempt_on+0x20/0xc0 [ 21.404576] ? __pfx_kthread+0x10/0x10 [ 21.404581] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.404585] ? calculate_sigpending+0x7b/0xa0 [ 21.404588] ? __pfx_kthread+0x10/0x10 [ 21.404593] ret_from_fork+0x3e/0x80 [ 21.404597] ? __pfx_kthread+0x10/0x10 [ 21.404601] ret_from_fork_asm+0x1a/0x30 [ 21.404606] </TASK> [ 21.404608] [ 21.583197] The buggy address belongs to the physical page: [ 21.588767] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106ce0 [ 21.596766] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.604419] flags: 0x200000000000040(head|node=0|zone=2) [ 21.609732] page_type: f8(unknown) [ 21.613138] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.620878] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.628617] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.636442] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.644268] head: 0200000000000002 ffffea00041b3801 00000000ffffffff 00000000ffffffff [ 21.652093] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.659918] page dumped because: kasan: bad access detected [ 21.665492] [ 21.666989] Memory state around the buggy address: [ 21.671784] ffff888106ce1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.679003] ffff888106ce2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.686222] >ffff888106ce2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.693439] ^ [ 21.699272] ffff888106ce2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.706491] ffff888106ce2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.713712] ================================================================== [ 21.720982] ================================================================== [ 21.728208] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 21.735860] Write of size 1 at addr ffff888106ce20da by task kunit_try_catch/205 [ 21.743253] [ 21.744753] CPU: 3 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 21.744761] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.744763] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 21.744766] Call Trace: [ 21.744768] <TASK> [ 21.744769] dump_stack_lvl+0x73/0xb0 [ 21.744773] print_report+0xd1/0x650 [ 21.744777] ? __virt_addr_valid+0x1db/0x2d0 [ 21.744780] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 21.744785] ? kasan_addr_to_slab+0x11/0xa0 [ 21.744789] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 21.744793] kasan_report+0x141/0x180 [ 21.744797] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 21.744803] __asan_report_store1_noabort+0x1b/0x30 [ 21.744807] krealloc_less_oob_helper+0xec6/0x11d0 [ 21.744811] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 21.744816] ? finish_task_switch.isra.0+0x153/0x700 [ 21.744820] ? __switch_to+0x5d9/0xf60 [ 21.744824] ? dequeue_task_fair+0x166/0x4e0 [ 21.744828] ? __schedule+0x10cc/0x2b30 [ 21.744833] krealloc_large_less_oob+0x1c/0x30 [ 21.744838] kunit_try_run_case+0x1a2/0x480 [ 21.744842] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.744846] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.744850] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.744855] ? __kthread_parkme+0x82/0x180 [ 21.744859] ? preempt_count_sub+0x50/0x80 [ 21.744863] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.744868] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 21.744871] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.744875] kthread+0x334/0x6f0 [ 21.744879] ? trace_preempt_on+0x20/0xc0 [ 21.744884] ? __pfx_kthread+0x10/0x10 [ 21.744888] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.744892] ? calculate_sigpending+0x7b/0xa0 [ 21.744896] ? __pfx_kthread+0x10/0x10 [ 21.744900] ret_from_fork+0x3e/0x80 [ 21.744904] ? __pfx_kthread+0x10/0x10 [ 21.744908] ret_from_fork_asm+0x1a/0x30 [ 21.744913] </TASK> [ 21.744915] [ 21.923469] The buggy address belongs to the physical page: [ 21.929041] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106ce0 [ 21.937047] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.944704] flags: 0x200000000000040(head|node=0|zone=2) [ 21.950040] page_type: f8(unknown) [ 21.953446] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.961184] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.968925] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.976759] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.984591] head: 0200000000000002 ffffea00041b3801 00000000ffffffff 00000000ffffffff [ 21.992419] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.000250] page dumped because: kasan: bad access detected [ 22.005823] [ 22.007323] Memory state around the buggy address: [ 22.012118] ffff888106ce1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.019345] ffff888106ce2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.026572] >ffff888106ce2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 22.033791] ^ [ 22.039882] ffff888106ce2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.047100] ffff888106ce2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.054322] ================================================================== [ 19.067495] ================================================================== [ 19.074745] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 19.082407] Write of size 1 at addr ffff888100350eda by task kunit_try_catch/201 [ 19.089808] [ 19.091309] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 19.091316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.091318] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 19.091321] Call Trace: [ 19.091323] <TASK> [ 19.091325] dump_stack_lvl+0x73/0xb0 [ 19.091328] print_report+0xd1/0x650 [ 19.091332] ? __virt_addr_valid+0x1db/0x2d0 [ 19.091336] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 19.091340] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.091344] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 19.091349] kasan_report+0x141/0x180 [ 19.091353] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 19.091358] __asan_report_store1_noabort+0x1b/0x30 [ 19.091362] krealloc_less_oob_helper+0xec6/0x11d0 [ 19.091367] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 19.091372] ? finish_task_switch.isra.0+0x153/0x700 [ 19.091376] ? __switch_to+0x5d9/0xf60 [ 19.091380] ? dequeue_task_fair+0x166/0x4e0 [ 19.091384] ? __schedule+0x10cc/0x2b30 [ 19.091389] krealloc_less_oob+0x1c/0x30 [ 19.091393] kunit_try_run_case+0x1a2/0x480 [ 19.091397] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.091401] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.091406] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.091410] ? __kthread_parkme+0x82/0x180 [ 19.091414] ? preempt_count_sub+0x50/0x80 [ 19.091418] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.091423] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 19.091426] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.091430] kthread+0x334/0x6f0 [ 19.091434] ? trace_preempt_on+0x20/0xc0 [ 19.091439] ? __pfx_kthread+0x10/0x10 [ 19.091443] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.091447] ? calculate_sigpending+0x7b/0xa0 [ 19.091450] ? __pfx_kthread+0x10/0x10 [ 19.091455] ret_from_fork+0x3e/0x80 [ 19.091459] ? __pfx_kthread+0x10/0x10 [ 19.091463] ret_from_fork_asm+0x1a/0x30 [ 19.091468] </TASK> [ 19.091470] [ 19.270750] Allocated by task 201: [ 19.274156] kasan_save_stack+0x45/0x70 [ 19.277995] kasan_save_track+0x18/0x40 [ 19.281835] kasan_save_alloc_info+0x3b/0x50 [ 19.286106] __kasan_krealloc+0x190/0x1f0 [ 19.290120] krealloc_noprof+0xf3/0x340 [ 19.293959] krealloc_less_oob_helper+0x1aa/0x11d0 [ 19.298761] krealloc_less_oob+0x1c/0x30 [ 19.302715] kunit_try_run_case+0x1a2/0x480 [ 19.306914] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 19.312314] kthread+0x334/0x6f0 [ 19.315546] ret_from_fork+0x3e/0x80 [ 19.319126] ret_from_fork_asm+0x1a/0x30 [ 19.323053] [ 19.324552] The buggy address belongs to the object at ffff888100350e00 [ 19.324552] which belongs to the cache kmalloc-256 of size 256 [ 19.337065] The buggy address is located 17 bytes to the right of [ 19.337065] allocated 201-byte region [ffff888100350e00, ffff888100350ec9) [ 19.350100] [ 19.351599] The buggy address belongs to the physical page: [ 19.357170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350 [ 19.365169] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.372821] flags: 0x200000000000040(head|node=0|zone=2) [ 19.378135] page_type: f5(slab) [ 19.381282] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 19.389029] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.396768] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 19.404603] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.412437] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff [ 19.420272] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.428105] page dumped because: kasan: bad access detected [ 19.433716] [ 19.435218] Memory state around the buggy address: [ 19.440011] ffff888100350d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.447232] ffff888100350e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.454459] >ffff888100350e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 19.461701] ^ [ 19.467822] ffff888100350f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.475041] ffff888100350f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.482261] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 20.342783] ================================================================== [ 20.353878] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 20.361452] Write of size 1 at addr ffff888105eba0eb by task kunit_try_catch/203 [ 20.368843] [ 20.370344] CPU: 2 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 20.370352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.370354] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 20.370358] Call Trace: [ 20.370359] <TASK> [ 20.370361] dump_stack_lvl+0x73/0xb0 [ 20.370365] print_report+0xd1/0x650 [ 20.370369] ? __virt_addr_valid+0x1db/0x2d0 [ 20.370373] ? krealloc_more_oob_helper+0x821/0x930 [ 20.370378] ? kasan_addr_to_slab+0x11/0xa0 [ 20.370382] ? krealloc_more_oob_helper+0x821/0x930 [ 20.370386] kasan_report+0x141/0x180 [ 20.370390] ? krealloc_more_oob_helper+0x821/0x930 [ 20.370396] __asan_report_store1_noabort+0x1b/0x30 [ 20.370399] krealloc_more_oob_helper+0x821/0x930 [ 20.370404] ? __schedule+0x10cc/0x2b30 [ 20.370408] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 20.370413] ? finish_task_switch.isra.0+0x153/0x700 [ 20.370417] ? __switch_to+0x5d9/0xf60 [ 20.370421] ? dequeue_task_fair+0x166/0x4e0 [ 20.370425] ? __schedule+0x10cc/0x2b30 [ 20.370430] krealloc_large_more_oob+0x1c/0x30 [ 20.370434] kunit_try_run_case+0x1a2/0x480 [ 20.370439] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.370443] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.370447] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.370452] ? __kthread_parkme+0x82/0x180 [ 20.370456] ? preempt_count_sub+0x50/0x80 [ 20.370460] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.370465] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 20.370469] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.370473] kthread+0x334/0x6f0 [ 20.370477] ? trace_preempt_on+0x20/0xc0 [ 20.370481] ? __pfx_kthread+0x10/0x10 [ 20.370485] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.370489] ? calculate_sigpending+0x7b/0xa0 [ 20.370493] ? __pfx_kthread+0x10/0x10 [ 20.370497] ret_from_fork+0x3e/0x80 [ 20.370501] ? __pfx_kthread+0x10/0x10 [ 20.370505] ret_from_fork_asm+0x1a/0x30 [ 20.370511] </TASK> [ 20.370512] [ 20.552456] The buggy address belongs to the physical page: [ 20.558029] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eb8 [ 20.566036] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.573688] flags: 0x200000000000040(head|node=0|zone=2) [ 20.579026] page_type: f8(unknown) [ 20.582433] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.590173] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.597912] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.605737] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.613562] head: 0200000000000002 ffffea000417ae01 00000000ffffffff 00000000ffffffff [ 20.621388] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.629213] page dumped because: kasan: bad access detected [ 20.634787] [ 20.636285] Memory state around the buggy address: [ 20.641077] ffff888105eb9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.648297] ffff888105eba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.655516] >ffff888105eba080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 20.662735] ^ [ 20.669348] ffff888105eba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.676567] ffff888105eba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.683785] ================================================================== [ 20.691069] ================================================================== [ 20.698300] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 20.705867] Write of size 1 at addr ffff888105eba0f0 by task kunit_try_catch/203 [ 20.713260] [ 20.714758] CPU: 2 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 20.714766] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.714768] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 20.714772] Call Trace: [ 20.714773] <TASK> [ 20.714775] dump_stack_lvl+0x73/0xb0 [ 20.714779] print_report+0xd1/0x650 [ 20.714783] ? __virt_addr_valid+0x1db/0x2d0 [ 20.714786] ? krealloc_more_oob_helper+0x7eb/0x930 [ 20.714791] ? kasan_addr_to_slab+0x11/0xa0 [ 20.714795] ? krealloc_more_oob_helper+0x7eb/0x930 [ 20.714799] kasan_report+0x141/0x180 [ 20.714803] ? krealloc_more_oob_helper+0x7eb/0x930 [ 20.714809] __asan_report_store1_noabort+0x1b/0x30 [ 20.714812] krealloc_more_oob_helper+0x7eb/0x930 [ 20.714817] ? __schedule+0x10cc/0x2b30 [ 20.714821] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 20.714826] ? finish_task_switch.isra.0+0x153/0x700 [ 20.714830] ? __switch_to+0x5d9/0xf60 [ 20.714834] ? dequeue_task_fair+0x166/0x4e0 [ 20.714838] ? __schedule+0x10cc/0x2b30 [ 20.714843] krealloc_large_more_oob+0x1c/0x30 [ 20.714847] kunit_try_run_case+0x1a2/0x480 [ 20.714852] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.714856] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.714860] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.714865] ? __kthread_parkme+0x82/0x180 [ 20.714869] ? preempt_count_sub+0x50/0x80 [ 20.714873] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.714877] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 20.714881] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.714885] kthread+0x334/0x6f0 [ 20.714889] ? trace_preempt_on+0x20/0xc0 [ 20.714893] ? __pfx_kthread+0x10/0x10 [ 20.714897] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.714901] ? calculate_sigpending+0x7b/0xa0 [ 20.714905] ? __pfx_kthread+0x10/0x10 [ 20.714909] ret_from_fork+0x3e/0x80 [ 20.714913] ? __pfx_kthread+0x10/0x10 [ 20.714917] ret_from_fork_asm+0x1a/0x30 [ 20.714923] </TASK> [ 20.714925] [ 20.896898] The buggy address belongs to the physical page: [ 20.902469] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eb8 [ 20.910470] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.918128] flags: 0x200000000000040(head|node=0|zone=2) [ 20.923442] page_type: f8(unknown) [ 20.926850] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.934588] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.942335] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.950161] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.957985] head: 0200000000000002 ffffea000417ae01 00000000ffffffff 00000000ffffffff [ 20.965811] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.973636] page dumped because: kasan: bad access detected [ 20.979210] [ 20.980731] Memory state around the buggy address: [ 20.985529] ffff888105eb9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.992756] ffff888105eba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.999974] >ffff888105eba080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 21.007194] ^ [ 21.014067] ffff888105eba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.021284] ffff888105eba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.028504] ================================================================== [ 17.794697] ================================================================== [ 17.801948] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 17.809513] Write of size 1 at addr ffff8881038caaf0 by task kunit_try_catch/199 [ 17.816907] [ 17.818408] CPU: 3 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 17.818416] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.818418] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 17.818421] Call Trace: [ 17.818423] <TASK> [ 17.818424] dump_stack_lvl+0x73/0xb0 [ 17.818428] print_report+0xd1/0x650 [ 17.818432] ? __virt_addr_valid+0x1db/0x2d0 [ 17.818436] ? krealloc_more_oob_helper+0x7eb/0x930 [ 17.818440] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.818444] ? krealloc_more_oob_helper+0x7eb/0x930 [ 17.818449] kasan_report+0x141/0x180 [ 17.818453] ? krealloc_more_oob_helper+0x7eb/0x930 [ 17.818459] __asan_report_store1_noabort+0x1b/0x30 [ 17.818462] krealloc_more_oob_helper+0x7eb/0x930 [ 17.818467] ? __schedule+0x10cc/0x2b30 [ 17.818471] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 17.818476] ? finish_task_switch.isra.0+0x153/0x700 [ 17.818480] ? __switch_to+0x5d9/0xf60 [ 17.818484] ? dequeue_task_fair+0x166/0x4e0 [ 17.818488] ? __schedule+0x10cc/0x2b30 [ 17.818493] krealloc_more_oob+0x1c/0x30 [ 17.818497] kunit_try_run_case+0x1a2/0x480 [ 17.818501] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.818505] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.818510] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.818514] ? __kthread_parkme+0x82/0x180 [ 17.818518] ? preempt_count_sub+0x50/0x80 [ 17.818523] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.818527] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 17.818531] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.818535] kthread+0x334/0x6f0 [ 17.818539] ? trace_preempt_on+0x20/0xc0 [ 17.818543] ? __pfx_kthread+0x10/0x10 [ 17.818547] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.818551] ? calculate_sigpending+0x7b/0xa0 [ 17.818555] ? __pfx_kthread+0x10/0x10 [ 17.818559] ret_from_fork+0x3e/0x80 [ 17.818563] ? __pfx_kthread+0x10/0x10 [ 17.818567] ret_from_fork_asm+0x1a/0x30 [ 17.818573] </TASK> [ 17.818575] [ 18.001227] Allocated by task 199: [ 18.004634] kasan_save_stack+0x45/0x70 [ 18.008473] kasan_save_track+0x18/0x40 [ 18.012314] kasan_save_alloc_info+0x3b/0x50 [ 18.016587] __kasan_krealloc+0x190/0x1f0 [ 18.020599] krealloc_noprof+0xf3/0x340 [ 18.024437] krealloc_more_oob_helper+0x1a9/0x930 [ 18.029143] krealloc_more_oob+0x1c/0x30 [ 18.033068] kunit_try_run_case+0x1a2/0x480 [ 18.037255] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 18.042654] kthread+0x334/0x6f0 [ 18.045885] ret_from_fork+0x3e/0x80 [ 18.049465] ret_from_fork_asm+0x1a/0x30 [ 18.053391] [ 18.054890] The buggy address belongs to the object at ffff8881038caa00 [ 18.054890] which belongs to the cache kmalloc-256 of size 256 [ 18.067398] The buggy address is located 5 bytes to the right of [ 18.067398] allocated 235-byte region [ffff8881038caa00, ffff8881038caaeb) [ 18.080351] [ 18.081852] The buggy address belongs to the physical page: [ 18.087424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ca [ 18.095431] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.103082] flags: 0x200000000000040(head|node=0|zone=2) [ 18.108396] page_type: f5(slab) [ 18.111543] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 18.119282] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.127030] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 18.134865] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.142706] head: 0200000000000001 ffffea00040e3281 00000000ffffffff 00000000ffffffff [ 18.150558] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 18.158382] page dumped because: kasan: bad access detected [ 18.163955] [ 18.165455] Memory state around the buggy address: [ 18.170248] ffff8881038ca980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.177467] ffff8881038caa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.184704] >ffff8881038caa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 18.191921] ^ [ 18.198794] ffff8881038cab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.206013] ffff8881038cab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.213232] ================================================================== [ 17.365445] ================================================================== [ 17.376246] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 17.383817] Write of size 1 at addr ffff8881038caaeb by task kunit_try_catch/199 [ 17.391211] [ 17.392713] CPU: 3 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 17.392734] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.392736] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 17.392739] Call Trace: [ 17.392741] <TASK> [ 17.392743] dump_stack_lvl+0x73/0xb0 [ 17.392747] print_report+0xd1/0x650 [ 17.392751] ? __virt_addr_valid+0x1db/0x2d0 [ 17.392755] ? krealloc_more_oob_helper+0x821/0x930 [ 17.392759] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.392763] ? krealloc_more_oob_helper+0x821/0x930 [ 17.392768] kasan_report+0x141/0x180 [ 17.392772] ? krealloc_more_oob_helper+0x821/0x930 [ 17.392778] __asan_report_store1_noabort+0x1b/0x30 [ 17.392781] krealloc_more_oob_helper+0x821/0x930 [ 17.392786] ? __schedule+0x10cc/0x2b30 [ 17.392790] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 17.392795] ? finish_task_switch.isra.0+0x153/0x700 [ 17.392799] ? __switch_to+0x5d9/0xf60 [ 17.392803] ? dequeue_task_fair+0x166/0x4e0 [ 17.392809] ? __schedule+0x10cc/0x2b30 [ 17.392813] krealloc_more_oob+0x1c/0x30 [ 17.392818] kunit_try_run_case+0x1a2/0x480 [ 17.392822] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.392826] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.392831] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.392835] ? __kthread_parkme+0x82/0x180 [ 17.392839] ? preempt_count_sub+0x50/0x80 [ 17.392843] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.392848] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 17.392852] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.392856] kthread+0x334/0x6f0 [ 17.392860] ? trace_preempt_on+0x20/0xc0 [ 17.392864] ? __pfx_kthread+0x10/0x10 [ 17.392868] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.392872] ? calculate_sigpending+0x7b/0xa0 [ 17.392876] ? __pfx_kthread+0x10/0x10 [ 17.392880] ret_from_fork+0x3e/0x80 [ 17.392884] ? __pfx_kthread+0x10/0x10 [ 17.392889] ret_from_fork_asm+0x1a/0x30 [ 17.392894] </TASK> [ 17.392896] [ 17.575567] Allocated by task 199: [ 17.578975] kasan_save_stack+0x45/0x70 [ 17.582821] kasan_save_track+0x18/0x40 [ 17.586660] kasan_save_alloc_info+0x3b/0x50 [ 17.590959] __kasan_krealloc+0x190/0x1f0 [ 17.594972] krealloc_noprof+0xf3/0x340 [ 17.598812] krealloc_more_oob_helper+0x1a9/0x930 [ 17.603525] krealloc_more_oob+0x1c/0x30 [ 17.607451] kunit_try_run_case+0x1a2/0x480 [ 17.611638] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 17.617035] kthread+0x334/0x6f0 [ 17.620268] ret_from_fork+0x3e/0x80 [ 17.623849] ret_from_fork_asm+0x1a/0x30 [ 17.627774] [ 17.629274] The buggy address belongs to the object at ffff8881038caa00 [ 17.629274] which belongs to the cache kmalloc-256 of size 256 [ 17.641788] The buggy address is located 0 bytes to the right of [ 17.641788] allocated 235-byte region [ffff8881038caa00, ffff8881038caaeb) [ 17.654745] [ 17.656242] The buggy address belongs to the physical page: [ 17.661815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ca [ 17.669815] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.677475] flags: 0x200000000000040(head|node=0|zone=2) [ 17.682786] page_type: f5(slab) [ 17.685935] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 17.693704] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.701464] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 17.709299] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.717131] head: 0200000000000001 ffffea00040e3281 00000000ffffffff 00000000ffffffff [ 17.724959] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.732793] page dumped because: kasan: bad access detected [ 17.738363] [ 17.739862] Memory state around the buggy address: [ 17.744656] ffff8881038ca980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.751901] ffff8881038caa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.759119] >ffff8881038caa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 17.766339] ^ [ 17.772953] ffff8881038cab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.780178] ffff8881038cab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.787397] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 17.078843] ================================================================== [ 17.093916] BUG: KASAN: use-after-free in page_alloc_uaf+0x356/0x3d0 [ 17.100284] Read of size 1 at addr ffff888107fb0000 by task kunit_try_catch/197 [ 17.107598] [ 17.109099] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 17.109107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.109109] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 17.109113] Call Trace: [ 17.109114] <TASK> [ 17.109116] dump_stack_lvl+0x73/0xb0 [ 17.109120] print_report+0xd1/0x650 [ 17.109125] ? __virt_addr_valid+0x1db/0x2d0 [ 17.109128] ? page_alloc_uaf+0x356/0x3d0 [ 17.109133] ? kasan_addr_to_slab+0x11/0xa0 [ 17.109136] ? page_alloc_uaf+0x356/0x3d0 [ 17.109141] kasan_report+0x141/0x180 [ 17.109145] ? page_alloc_uaf+0x356/0x3d0 [ 17.109150] __asan_report_load1_noabort+0x18/0x20 [ 17.109153] page_alloc_uaf+0x356/0x3d0 [ 17.109158] ? __pfx_page_alloc_uaf+0x10/0x10 [ 17.109162] ? __schedule+0x10cc/0x2b30 [ 17.109166] ? ktime_get_ts64+0x83/0x230 [ 17.109171] kunit_try_run_case+0x1a2/0x480 [ 17.109175] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.109180] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.109184] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.109189] ? __kthread_parkme+0x82/0x180 [ 17.109193] ? preempt_count_sub+0x50/0x80 [ 17.109197] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.109201] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 17.109205] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.109209] kthread+0x334/0x6f0 [ 17.109213] ? trace_preempt_on+0x20/0xc0 [ 17.109218] ? __pfx_kthread+0x10/0x10 [ 17.109222] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.109226] ? calculate_sigpending+0x7b/0xa0 [ 17.109230] ? __pfx_kthread+0x10/0x10 [ 17.109234] ret_from_fork+0x3e/0x80 [ 17.109238] ? __pfx_kthread+0x10/0x10 [ 17.109242] ret_from_fork_asm+0x1a/0x30 [ 17.109248] </TASK> [ 17.109249] [ 17.269543] The buggy address belongs to the physical page: [ 17.275118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107fb0 [ 17.283125] flags: 0x200000000000000(node=0|zone=2) [ 17.288003] page_type: f0(buddy) [ 17.291237] raw: 0200000000000000 ffff88846fffd3e0 ffff88846fffd3e0 0000000000000000 [ 17.298978] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000 [ 17.306732] page dumped because: kasan: bad access detected [ 17.312303] [ 17.313804] Memory state around the buggy address: [ 17.318596] ffff888107faff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.325816] ffff888107faff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.333034] >ffff888107fb0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.340252] ^ [ 17.343486] ffff888107fb0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.350704] ffff888107fb0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.357940] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-invalid-free-in-kfree
[ 16.746483] ================================================================== [ 16.757466] BUG: KASAN: invalid-free in kfree+0x274/0x3f0 [ 16.762871] Free of addr ffff888105eb8001 by task kunit_try_catch/193 [ 16.769312] [ 16.770812] CPU: 2 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 16.770821] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.770823] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 16.770826] Call Trace: [ 16.770827] <TASK> [ 16.770829] dump_stack_lvl+0x73/0xb0 [ 16.770833] print_report+0xd1/0x650 [ 16.770837] ? __virt_addr_valid+0x1db/0x2d0 [ 16.770841] ? kasan_addr_to_slab+0x11/0xa0 [ 16.770845] ? kfree+0x274/0x3f0 [ 16.770848] kasan_report_invalid_free+0x10a/0x130 [ 16.770853] ? kfree+0x274/0x3f0 [ 16.770856] ? kfree+0x274/0x3f0 [ 16.770859] __kasan_kfree_large+0x86/0xd0 [ 16.770863] free_large_kmalloc+0x4b/0x110 [ 16.770868] kfree+0x274/0x3f0 [ 16.770871] kmalloc_large_invalid_free+0x120/0x2b0 [ 16.770876] ? __pfx_kmalloc_large_invalid_free+0x10/0x10 [ 16.770880] ? __schedule+0x10cc/0x2b30 [ 16.770885] ? ktime_get_ts64+0x83/0x230 [ 16.770889] kunit_try_run_case+0x1a2/0x480 [ 16.770894] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.770898] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.770902] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.770907] ? __kthread_parkme+0x82/0x180 [ 16.770911] ? preempt_count_sub+0x50/0x80 [ 16.770915] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.770919] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 16.770923] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.770927] kthread+0x334/0x6f0 [ 16.770931] ? trace_preempt_on+0x20/0xc0 [ 16.770936] ? __pfx_kthread+0x10/0x10 [ 16.770940] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.770944] ? calculate_sigpending+0x7b/0xa0 [ 16.770948] ? __pfx_kthread+0x10/0x10 [ 16.770952] ret_from_fork+0x3e/0x80 [ 16.770956] ? __pfx_kthread+0x10/0x10 [ 16.770960] ret_from_fork_asm+0x1a/0x30 [ 16.770965] </TASK> [ 16.770967] [ 16.938615] The buggy address belongs to the physical page: [ 16.944188] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eb8 [ 16.952194] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.959846] flags: 0x200000000000040(head|node=0|zone=2) [ 16.965160] page_type: f8(unknown) [ 16.968568] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.976313] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.984054] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.991886] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.999736] head: 0200000000000002 ffffea000417ae01 00000000ffffffff 00000000ffffffff [ 17.007565] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.015398] page dumped because: kasan: bad access detected [ 17.020971] [ 17.022470] Memory state around the buggy address: [ 17.027262] ffff888105eb7f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.034483] ffff888105eb7f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.041707] >ffff888105eb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.048954] ^ [ 17.052186] ffff888105eb8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.059406] ffff888105eb8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.066625] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 16.465000] ================================================================== [ 16.476521] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2f1/0x340 [ 16.483144] Read of size 1 at addr ffff888105eb8000 by task kunit_try_catch/191 [ 16.490455] [ 16.491958] CPU: 2 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 16.491966] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.491969] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 16.491972] Call Trace: [ 16.491973] <TASK> [ 16.491975] dump_stack_lvl+0x73/0xb0 [ 16.491979] print_report+0xd1/0x650 [ 16.491984] ? __virt_addr_valid+0x1db/0x2d0 [ 16.491987] ? kmalloc_large_uaf+0x2f1/0x340 [ 16.491991] ? kasan_addr_to_slab+0x11/0xa0 [ 16.491995] ? kmalloc_large_uaf+0x2f1/0x340 [ 16.491999] kasan_report+0x141/0x180 [ 16.492003] ? kmalloc_large_uaf+0x2f1/0x340 [ 16.492008] __asan_report_load1_noabort+0x18/0x20 [ 16.492012] kmalloc_large_uaf+0x2f1/0x340 [ 16.492016] ? __pfx_kmalloc_large_uaf+0x10/0x10 [ 16.492020] ? __schedule+0x10cc/0x2b30 [ 16.492025] ? ktime_get_ts64+0x83/0x230 [ 16.492029] kunit_try_run_case+0x1a2/0x480 [ 16.492034] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.492038] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.492042] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.492047] ? __kthread_parkme+0x82/0x180 [ 16.492051] ? preempt_count_sub+0x50/0x80 [ 16.492056] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.492060] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 16.492064] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.492068] kthread+0x334/0x6f0 [ 16.492072] ? trace_preempt_on+0x20/0xc0 [ 16.492076] ? __pfx_kthread+0x10/0x10 [ 16.492081] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.492085] ? calculate_sigpending+0x7b/0xa0 [ 16.492089] ? __pfx_kthread+0x10/0x10 [ 16.492093] ret_from_fork+0x3e/0x80 [ 16.492097] ? __pfx_kthread+0x10/0x10 [ 16.492101] ret_from_fork_asm+0x1a/0x30 [ 16.492107] </TASK> [ 16.492109] [ 16.653736] The buggy address belongs to the physical page: [ 16.659311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eb8 [ 16.667317] flags: 0x200000000000000(node=0|zone=2) [ 16.672196] raw: 0200000000000000 ffffea000417af08 ffff88841f739a80 0000000000000000 [ 16.679937] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 16.687703] page dumped because: kasan: bad access detected [ 16.693298] [ 16.694796] Memory state around the buggy address: [ 16.699592] ffff888105eb7f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.706820] ffff888105eb7f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.714046] >ffff888105eb8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.721265] ^ [ 16.724497] ffff888105eb8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.731740] ffff888105eb8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.738961] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 16.136953] ================================================================== [ 16.148286] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2e9/0x330 [ 16.155775] Write of size 1 at addr ffff88810802a00a by task kunit_try_catch/189 [ 16.163174] [ 16.164692] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 16.164700] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.164702] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 16.164718] Call Trace: [ 16.164719] <TASK> [ 16.164721] dump_stack_lvl+0x73/0xb0 [ 16.164725] print_report+0xd1/0x650 [ 16.164730] ? __virt_addr_valid+0x1db/0x2d0 [ 16.164733] ? kmalloc_large_oob_right+0x2e9/0x330 [ 16.164737] ? kasan_addr_to_slab+0x11/0xa0 [ 16.164741] ? kmalloc_large_oob_right+0x2e9/0x330 [ 16.164745] kasan_report+0x141/0x180 [ 16.164750] ? kmalloc_large_oob_right+0x2e9/0x330 [ 16.164755] __asan_report_store1_noabort+0x1b/0x30 [ 16.164758] kmalloc_large_oob_right+0x2e9/0x330 [ 16.164762] ? __pfx_kmalloc_large_oob_right+0x10/0x10 [ 16.164767] ? __schedule+0x10cc/0x2b30 [ 16.164771] ? ktime_get_ts64+0x83/0x230 [ 16.164776] kunit_try_run_case+0x1a2/0x480 [ 16.164780] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.164784] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.164789] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.164793] ? __kthread_parkme+0x82/0x180 [ 16.164797] ? preempt_count_sub+0x50/0x80 [ 16.164802] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.164806] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 16.164810] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.164814] kthread+0x334/0x6f0 [ 16.164818] ? trace_preempt_on+0x20/0xc0 [ 16.164822] ? __pfx_kthread+0x10/0x10 [ 16.164826] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.164830] ? calculate_sigpending+0x7b/0xa0 [ 16.164834] ? __pfx_kthread+0x10/0x10 [ 16.164838] ret_from_fork+0x3e/0x80 [ 16.164842] ? __pfx_kthread+0x10/0x10 [ 16.164846] ret_from_fork_asm+0x1a/0x30 [ 16.164852] </TASK> [ 16.164853] [ 16.329118] The buggy address belongs to the physical page: [ 16.334701] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108028 [ 16.342746] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.350402] flags: 0x200000000000040(head|node=0|zone=2) [ 16.355734] page_type: f8(unknown) [ 16.359145] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.366885] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.374634] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.382466] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.390294] head: 0200000000000002 ffffea0004200a01 00000000ffffffff 00000000ffffffff [ 16.398128] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.405960] page dumped because: kasan: bad access detected [ 16.411532] [ 16.413031] Memory state around the buggy address: [ 16.417824] ffff888108029f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.425045] ffff888108029f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.432264] >ffff88810802a000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.439483] ^ [ 16.442973] ffff88810802a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.450192] ffff88810802a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.457413] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 15.731298] ================================================================== [ 15.743779] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x316/0x370 [ 15.751094] Write of size 1 at addr ffff888101a95f00 by task kunit_try_catch/187 [ 15.758496] [ 15.759996] CPU: 2 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 15.760004] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.760006] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 15.760009] Call Trace: [ 15.760011] <TASK> [ 15.760013] dump_stack_lvl+0x73/0xb0 [ 15.760017] print_report+0xd1/0x650 [ 15.760021] ? __virt_addr_valid+0x1db/0x2d0 [ 15.760025] ? kmalloc_big_oob_right+0x316/0x370 [ 15.760029] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.760033] ? kmalloc_big_oob_right+0x316/0x370 [ 15.760038] kasan_report+0x141/0x180 [ 15.760042] ? kmalloc_big_oob_right+0x316/0x370 [ 15.760047] __asan_report_store1_noabort+0x1b/0x30 [ 15.760051] kmalloc_big_oob_right+0x316/0x370 [ 15.760055] ? __pfx_kmalloc_big_oob_right+0x10/0x10 [ 15.760060] ? __schedule+0x10cc/0x2b30 [ 15.760064] ? ktime_get_ts64+0x83/0x230 [ 15.760069] kunit_try_run_case+0x1a2/0x480 [ 15.760073] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.760077] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.760082] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.760086] ? __kthread_parkme+0x82/0x180 [ 15.760090] ? preempt_count_sub+0x50/0x80 [ 15.760095] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.760099] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 15.760103] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.760107] kthread+0x334/0x6f0 [ 15.760111] ? trace_preempt_on+0x20/0xc0 [ 15.760116] ? __pfx_kthread+0x10/0x10 [ 15.760120] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.760124] ? calculate_sigpending+0x7b/0xa0 [ 15.760128] ? __pfx_kthread+0x10/0x10 [ 15.760132] ret_from_fork+0x3e/0x80 [ 15.760136] ? __pfx_kthread+0x10/0x10 [ 15.760141] ret_from_fork_asm+0x1a/0x30 [ 15.760146] </TASK> [ 15.760148] [ 15.924748] Allocated by task 187: [ 15.928154] kasan_save_stack+0x45/0x70 [ 15.931993] kasan_save_track+0x18/0x40 [ 15.935833] kasan_save_alloc_info+0x3b/0x50 [ 15.940105] __kasan_kmalloc+0xb7/0xc0 [ 15.943856] __kmalloc_cache_noprof+0x189/0x420 [ 15.948391] kmalloc_big_oob_right+0xa9/0x370 [ 15.952757] kunit_try_run_case+0x1a2/0x480 [ 15.956943] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 15.962342] kthread+0x334/0x6f0 [ 15.965575] ret_from_fork+0x3e/0x80 [ 15.969155] ret_from_fork_asm+0x1a/0x30 [ 15.973079] [ 15.974571] The buggy address belongs to the object at ffff888101a94000 [ 15.974571] which belongs to the cache kmalloc-8k of size 8192 [ 15.987087] The buggy address is located 0 bytes to the right of [ 15.987087] allocated 7936-byte region [ffff888101a94000, ffff888101a95f00) [ 16.000127] [ 16.001627] The buggy address belongs to the physical page: [ 16.007199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a90 [ 16.015206] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.022858] flags: 0x200000000000040(head|node=0|zone=2) [ 16.028172] page_type: f5(slab) [ 16.031319] raw: 0200000000000040 ffff888100043180 dead000000000122 0000000000000000 [ 16.039066] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 16.046813] head: 0200000000000040 ffff888100043180 dead000000000122 0000000000000000 [ 16.054640] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 16.062472] head: 0200000000000003 ffffea000406a401 00000000ffffffff 00000000ffffffff [ 16.070300] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 16.078124] page dumped because: kasan: bad access detected [ 16.083700] [ 16.085211] Memory state around the buggy address: [ 16.090006] ffff888101a95e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.097225] ffff888101a95e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.104443] >ffff888101a95f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.111661] ^ [ 16.114922] ffff888101a95f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.122140] ffff888101a96000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.129360] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 15.179200] ================================================================== [ 15.190630] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520 [ 15.198735] Write of size 1 at addr ffff88810633a478 by task kunit_try_catch/185 [ 15.206133] [ 15.207634] CPU: 3 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 15.207642] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.207644] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 15.207648] Call Trace: [ 15.207649] <TASK> [ 15.207651] dump_stack_lvl+0x73/0xb0 [ 15.207655] print_report+0xd1/0x650 [ 15.207659] ? __virt_addr_valid+0x1db/0x2d0 [ 15.207663] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 15.207685] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.207689] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 15.207694] kasan_report+0x141/0x180 [ 15.207699] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 15.207705] __asan_report_store1_noabort+0x1b/0x30 [ 15.207708] kmalloc_track_caller_oob_right+0x4c8/0x520 [ 15.207726] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [ 15.207732] ? __schedule+0x10cc/0x2b30 [ 15.207736] ? ktime_get_ts64+0x83/0x230 [ 15.207741] kunit_try_run_case+0x1a2/0x480 [ 15.207745] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.207749] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.207754] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.207758] ? __kthread_parkme+0x82/0x180 [ 15.207762] ? preempt_count_sub+0x50/0x80 [ 15.207767] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.207771] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 15.207775] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.207780] kthread+0x334/0x6f0 [ 15.207784] ? trace_preempt_on+0x20/0xc0 [ 15.207788] ? __pfx_kthread+0x10/0x10 [ 15.207792] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.207796] ? calculate_sigpending+0x7b/0xa0 [ 15.207800] ? __pfx_kthread+0x10/0x10 [ 15.207804] ret_from_fork+0x3e/0x80 [ 15.207808] ? __pfx_kthread+0x10/0x10 [ 15.207813] ret_from_fork_asm+0x1a/0x30 [ 15.207818] </TASK> [ 15.207820] [ 15.376434] Allocated by task 185: [ 15.379839] kasan_save_stack+0x45/0x70 [ 15.383704] kasan_save_track+0x18/0x40 [ 15.387570] kasan_save_alloc_info+0x3b/0x50 [ 15.391843] __kasan_kmalloc+0xb7/0xc0 [ 15.395596] __kmalloc_node_track_caller_noprof+0x1cb/0x500 [ 15.401166] kmalloc_track_caller_oob_right+0x99/0x520 [ 15.406305] kunit_try_run_case+0x1a2/0x480 [ 15.410493] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 15.415898] kthread+0x334/0x6f0 [ 15.419131] ret_from_fork+0x3e/0x80 [ 15.422735] ret_from_fork_asm+0x1a/0x30 [ 15.426664] [ 15.428189] The buggy address belongs to the object at ffff88810633a400 [ 15.428189] which belongs to the cache kmalloc-128 of size 128 [ 15.440704] The buggy address is located 0 bytes to the right of [ 15.440704] allocated 120-byte region [ffff88810633a400, ffff88810633a478) [ 15.453667] [ 15.455194] The buggy address belongs to the physical page: [ 15.460764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10633a [ 15.468763] flags: 0x200000000000000(node=0|zone=2) [ 15.473643] page_type: f5(slab) [ 15.476789] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 15.484529] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.492275] page dumped because: kasan: bad access detected [ 15.497849] [ 15.499346] Memory state around the buggy address: [ 15.504141] ffff88810633a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.511359] ffff88810633a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.518579] >ffff88810633a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.525796] ^ [ 15.532931] ffff88810633a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.540147] ffff88810633a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.547368] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 14.774318] ================================================================== [ 14.785238] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x369/0x3c0 [ 14.792638] Read of size 1 at addr ffff888105eed000 by task kunit_try_catch/183 [ 14.799944] [ 14.801436] CPU: 2 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.801444] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.801446] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 14.801449] Call Trace: [ 14.801451] <TASK> [ 14.801453] dump_stack_lvl+0x73/0xb0 [ 14.801456] print_report+0xd1/0x650 [ 14.801460] ? __virt_addr_valid+0x1db/0x2d0 [ 14.801464] ? kmalloc_node_oob_right+0x369/0x3c0 [ 14.801469] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.801473] ? kmalloc_node_oob_right+0x369/0x3c0 [ 14.801477] kasan_report+0x141/0x180 [ 14.801481] ? kmalloc_node_oob_right+0x369/0x3c0 [ 14.801487] __asan_report_load1_noabort+0x18/0x20 [ 14.801491] kmalloc_node_oob_right+0x369/0x3c0 [ 14.801495] ? __pfx_kmalloc_node_oob_right+0x10/0x10 [ 14.801500] ? __schedule+0x10cc/0x2b30 [ 14.801504] ? ktime_get_ts64+0x83/0x230 [ 14.801509] kunit_try_run_case+0x1a2/0x480 [ 14.801513] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.801517] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.801522] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.801526] ? __kthread_parkme+0x82/0x180 [ 14.801530] ? preempt_count_sub+0x50/0x80 [ 14.801535] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.801539] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 14.801543] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.801547] kthread+0x334/0x6f0 [ 14.801551] ? trace_preempt_on+0x20/0xc0 [ 14.801555] ? __pfx_kthread+0x10/0x10 [ 14.801559] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.801563] ? calculate_sigpending+0x7b/0xa0 [ 14.801567] ? __pfx_kthread+0x10/0x10 [ 14.801572] ret_from_fork+0x3e/0x80 [ 14.801576] ? __pfx_kthread+0x10/0x10 [ 14.801580] ret_from_fork_asm+0x1a/0x30 [ 14.801585] </TASK> [ 14.801587] [ 14.966528] Allocated by task 183: [ 14.969935] kasan_save_stack+0x45/0x70 [ 14.973782] kasan_save_track+0x18/0x40 [ 14.977620] kasan_save_alloc_info+0x3b/0x50 [ 14.981893] __kasan_kmalloc+0xb7/0xc0 [ 14.985645] __kmalloc_cache_node_noprof+0x188/0x420 [ 14.990611] kmalloc_node_oob_right+0xab/0x3c0 [ 14.995056] kunit_try_run_case+0x1a2/0x480 [ 14.999242] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 15.004642] kthread+0x334/0x6f0 [ 15.007874] ret_from_fork+0x3e/0x80 [ 15.011454] ret_from_fork_asm+0x1a/0x30 [ 15.015379] [ 15.016880] The buggy address belongs to the object at ffff888105eec000 [ 15.016880] which belongs to the cache kmalloc-4k of size 4096 [ 15.029394] The buggy address is located 0 bytes to the right of [ 15.029394] allocated 4096-byte region [ffff888105eec000, ffff888105eed000) [ 15.042435] [ 15.043935] The buggy address belongs to the physical page: [ 15.049507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ee8 [ 15.057506] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.065158] flags: 0x200000000000040(head|node=0|zone=2) [ 15.070471] page_type: f5(slab) [ 15.073619] raw: 0200000000000040 ffff888100043040 dead000000000122 0000000000000000 [ 15.081367] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 15.089114] head: 0200000000000040 ffff888100043040 dead000000000122 0000000000000000 [ 15.096947] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 15.104774] head: 0200000000000003 ffffea000417ba01 00000000ffffffff 00000000ffffffff [ 15.112607] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 15.120432] page dumped because: kasan: bad access detected [ 15.126005] [ 15.127504] Memory state around the buggy address: [ 15.132297] ffff888105eecf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.139516] ffff888105eecf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.146740] >ffff888105eed000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.153963] ^ [ 15.157195] ffff888105eed080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.164414] ffff888105eed100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.171631] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 14.369018] ================================================================== [ 14.379994] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x361/0x3c0 [ 14.386875] Read of size 1 at addr ffff888101425c1f by task kunit_try_catch/181 [ 14.394180] [ 14.395684] CPU: 2 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.395692] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.395694] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 14.395698] Call Trace: [ 14.395700] <TASK> [ 14.395701] dump_stack_lvl+0x73/0xb0 [ 14.395706] print_report+0xd1/0x650 [ 14.395710] ? __virt_addr_valid+0x1db/0x2d0 [ 14.395714] ? kmalloc_oob_left+0x361/0x3c0 [ 14.395718] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.395722] ? kmalloc_oob_left+0x361/0x3c0 [ 14.395726] kasan_report+0x141/0x180 [ 14.395731] ? kmalloc_oob_left+0x361/0x3c0 [ 14.395736] __asan_report_load1_noabort+0x18/0x20 [ 14.395739] kmalloc_oob_left+0x361/0x3c0 [ 14.395744] ? __pfx_kmalloc_oob_left+0x10/0x10 [ 14.395748] ? __schedule+0x10cc/0x2b30 [ 14.395753] ? ktime_get_ts64+0x83/0x230 [ 14.395758] kunit_try_run_case+0x1a2/0x480 [ 14.395762] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.395766] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.395771] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.395776] ? __kthread_parkme+0x82/0x180 [ 14.395780] ? preempt_count_sub+0x50/0x80 [ 14.395785] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.395789] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 14.395793] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.395797] kthread+0x334/0x6f0 [ 14.395801] ? trace_preempt_on+0x20/0xc0 [ 14.395806] ? __pfx_kthread+0x10/0x10 [ 14.395810] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.395814] ? calculate_sigpending+0x7b/0xa0 [ 14.395818] ? __pfx_kthread+0x10/0x10 [ 14.395822] ret_from_fork+0x3e/0x80 [ 14.395826] ? __pfx_kthread+0x10/0x10 [ 14.395831] ret_from_fork_asm+0x1a/0x30 [ 14.395837] </TASK> [ 14.395838] [ 14.558121] Allocated by task 1: [ 14.561354] kasan_save_stack+0x45/0x70 [ 14.565193] kasan_save_track+0x18/0x40 [ 14.569031] kasan_save_alloc_info+0x3b/0x50 [ 14.573304] __kasan_kmalloc+0xb7/0xc0 [ 14.577057] __kmalloc_node_noprof+0x1cd/0x510 [ 14.581502] __vmalloc_node_range_noprof+0x302/0x1120 [ 14.586557] __vmalloc_node_noprof+0x94/0x100 [ 14.590915] vmalloc_noprof+0x25/0x30 [ 14.594581] igb_setup_rx_resources+0x176/0x510 [ 14.599122] igb_setup_all_rx_resources+0xf1/0x1c0 [ 14.603915] __igb_open+0x5a1/0x12e0 [ 14.607492] igb_open+0x14/0x20 [ 14.610639] __dev_open+0x2d7/0x6e0 [ 14.614133] __dev_change_flags+0x3f5/0x590 [ 14.618325] netif_change_flags+0x87/0x160 [ 14.622426] dev_change_flags+0x9a/0x140 [ 14.626352] ip_auto_config+0x565/0x2f60 [ 14.630286] do_one_initcall+0xd5/0x370 [ 14.634123] kernel_init_freeable+0x420/0x6f0 [ 14.638483] kernel_init+0x23/0x1e0 [ 14.641976] ret_from_fork+0x3e/0x80 [ 14.645554] ret_from_fork_asm+0x1a/0x30 [ 14.649481] [ 14.650982] The buggy address belongs to the object at ffff888101425c00 [ 14.650982] which belongs to the cache kmalloc-16 of size 16 [ 14.663322] The buggy address is located 15 bytes to the right of [ 14.663322] allocated 16-byte region [ffff888101425c00, ffff888101425c10) [ 14.676278] [ 14.677778] The buggy address belongs to the physical page: [ 14.683348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101425 [ 14.691348] flags: 0x200000000000000(node=0|zone=2) [ 14.696226] page_type: f5(slab) [ 14.699374] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 14.707114] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.714859] page dumped because: kasan: bad access detected [ 14.720433] [ 14.721932] Memory state around the buggy address: [ 14.726725] ffff888101425b00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.733945] ffff888101425b80: fa fb fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 14.741172] >ffff888101425c00: 00 00 fc fc 00 07 fc fc fc fc fc fc fc fc fc fc [ 14.748390] ^ [ 14.752403] ffff888101425c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.759622] ffff888101425d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.766840] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 13.282470] ================================================================== [ 13.289702] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 13.296678] Write of size 1 at addr ffff888104ee9073 by task kunit_try_catch/179 [ 13.304080] [ 13.305580] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 13.305588] Tainted: [N]=TEST [ 13.305590] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 13.305594] Call Trace: [ 13.305596] <TASK> [ 13.305598] dump_stack_lvl+0x73/0xb0 [ 13.305602] print_report+0xd1/0x650 [ 13.305607] ? __virt_addr_valid+0x1db/0x2d0 [ 13.305612] ? kmalloc_oob_right+0x6f0/0x7f0 [ 13.305616] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.305620] ? kmalloc_oob_right+0x6f0/0x7f0 [ 13.305624] kasan_report+0x141/0x180 [ 13.305628] ? kmalloc_oob_right+0x6f0/0x7f0 [ 13.305633] __asan_report_store1_noabort+0x1b/0x30 [ 13.305637] kmalloc_oob_right+0x6f0/0x7f0 [ 13.305641] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 13.305645] ? __schedule+0x10cc/0x2b30 [ 13.305650] ? ktime_get_ts64+0x83/0x230 [ 13.305655] kunit_try_run_case+0x1a2/0x480 [ 13.305660] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.305664] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.305669] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.305674] ? __kthread_parkme+0x82/0x180 [ 13.305678] ? preempt_count_sub+0x50/0x80 [ 13.305683] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.305687] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 13.305692] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.305696] kthread+0x334/0x6f0 [ 13.305700] ? trace_preempt_on+0x20/0xc0 [ 13.305705] ? __pfx_kthread+0x10/0x10 [ 13.305709] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.305713] ? calculate_sigpending+0x7b/0xa0 [ 13.305717] ? __pfx_kthread+0x10/0x10 [ 13.305722] ret_from_fork+0x3e/0x80 [ 13.305726] ? __pfx_kthread+0x10/0x10 [ 13.305730] ret_from_fork_asm+0x1a/0x30 [ 13.305736] </TASK> [ 13.305738] [ 13.467369] Allocated by task 179: [ 13.470773] kasan_save_stack+0x45/0x70 [ 13.474612] kasan_save_track+0x18/0x40 [ 13.478452] kasan_save_alloc_info+0x3b/0x50 [ 13.482726] __kasan_kmalloc+0xb7/0xc0 [ 13.486477] __kmalloc_cache_noprof+0x189/0x420 [ 13.491008] kmalloc_oob_right+0xa9/0x7f0 [ 13.495021] kunit_try_run_case+0x1a2/0x480 [ 13.499209] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 13.504606] kthread+0x334/0x6f0 [ 13.507841] ret_from_fork+0x3e/0x80 [ 13.511426] ret_from_fork_asm+0x1a/0x30 [ 13.515354] [ 13.516852] The buggy address belongs to the object at ffff888104ee9000 [ 13.516852] which belongs to the cache kmalloc-128 of size 128 [ 13.529366] The buggy address is located 0 bytes to the right of [ 13.529366] allocated 115-byte region [ffff888104ee9000, ffff888104ee9073) [ 13.542315] [ 13.543813] The buggy address belongs to the physical page: [ 13.549385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9 [ 13.557394] flags: 0x200000000000000(node=0|zone=2) [ 13.562282] page_type: f5(slab) [ 13.565429] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 13.573175] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.580914] page dumped because: kasan: bad access detected [ 13.586486] [ 13.587985] Memory state around the buggy address: [ 13.592777] ffff888104ee8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.599999] ffff888104ee8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.607226] >ffff888104ee9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.614450] ^ [ 13.621325] ffff888104ee9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.628545] ffff888104ee9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.635762] ================================================================== [ 14.010421] ================================================================== [ 14.017651] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 14.024634] Read of size 1 at addr ffff888104ee9080 by task kunit_try_catch/179 [ 14.031942] [ 14.033441] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.033448] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.033450] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 14.033453] Call Trace: [ 14.033455] <TASK> [ 14.033457] dump_stack_lvl+0x73/0xb0 [ 14.033460] print_report+0xd1/0x650 [ 14.033464] ? __virt_addr_valid+0x1db/0x2d0 [ 14.033468] ? kmalloc_oob_right+0x68a/0x7f0 [ 14.033472] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.033476] ? kmalloc_oob_right+0x68a/0x7f0 [ 14.033480] kasan_report+0x141/0x180 [ 14.033484] ? kmalloc_oob_right+0x68a/0x7f0 [ 14.033489] __asan_report_load1_noabort+0x18/0x20 [ 14.033493] kmalloc_oob_right+0x68a/0x7f0 [ 14.033497] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 14.033502] ? __schedule+0x10cc/0x2b30 [ 14.033506] ? ktime_get_ts64+0x83/0x230 [ 14.033511] kunit_try_run_case+0x1a2/0x480 [ 14.033515] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.033519] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.033524] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.033528] ? __kthread_parkme+0x82/0x180 [ 14.033532] ? preempt_count_sub+0x50/0x80 [ 14.033537] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.033541] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 14.033545] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.033548] kthread+0x334/0x6f0 [ 14.033552] ? trace_preempt_on+0x20/0xc0 [ 14.033557] ? __pfx_kthread+0x10/0x10 [ 14.033561] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.033565] ? calculate_sigpending+0x7b/0xa0 [ 14.033569] ? __pfx_kthread+0x10/0x10 [ 14.033573] ret_from_fork+0x3e/0x80 [ 14.033577] ? __pfx_kthread+0x10/0x10 [ 14.033581] ret_from_fork_asm+0x1a/0x30 [ 14.033587] </TASK> [ 14.033588] [ 14.196425] Allocated by task 179: [ 14.199834] kasan_save_stack+0x45/0x70 [ 14.203699] kasan_save_track+0x18/0x40 [ 14.207545] kasan_save_alloc_info+0x3b/0x50 [ 14.211818] __kasan_kmalloc+0xb7/0xc0 [ 14.215569] __kmalloc_cache_noprof+0x189/0x420 [ 14.220104] kmalloc_oob_right+0xa9/0x7f0 [ 14.224124] kunit_try_run_case+0x1a2/0x480 [ 14.228310] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 14.233722] kthread+0x334/0x6f0 [ 14.236958] ret_from_fork+0x3e/0x80 [ 14.240538] ret_from_fork_asm+0x1a/0x30 [ 14.244463] [ 14.245962] The buggy address belongs to the object at ffff888104ee9000 [ 14.245962] which belongs to the cache kmalloc-128 of size 128 [ 14.258468] The buggy address is located 13 bytes to the right of [ 14.258468] allocated 115-byte region [ffff888104ee9000, ffff888104ee9073) [ 14.271502] [ 14.273002] The buggy address belongs to the physical page: [ 14.278575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9 [ 14.286581] flags: 0x200000000000000(node=0|zone=2) [ 14.291459] page_type: f5(slab) [ 14.294609] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 14.302354] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.310094] page dumped because: kasan: bad access detected [ 14.315689] [ 14.317209] Memory state around the buggy address: [ 14.322000] ffff888104ee8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.329221] ffff888104ee9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 14.336437] >ffff888104ee9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.343673] ^ [ 14.346933] ffff888104ee9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.354152] ffff888104ee9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.361372] ================================================================== [ 13.648445] ================================================================== [ 13.655679] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 13.662645] Write of size 1 at addr ffff888104ee9078 by task kunit_try_catch/179 [ 13.670047] [ 13.671545] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 13.671553] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.671555] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 13.671559] Call Trace: [ 13.671560] <TASK> [ 13.671562] dump_stack_lvl+0x73/0xb0 [ 13.671566] print_report+0xd1/0x650 [ 13.671570] ? __virt_addr_valid+0x1db/0x2d0 [ 13.671573] ? kmalloc_oob_right+0x6bd/0x7f0 [ 13.671577] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.671581] ? kmalloc_oob_right+0x6bd/0x7f0 [ 13.671585] kasan_report+0x141/0x180 [ 13.671590] ? kmalloc_oob_right+0x6bd/0x7f0 [ 13.671595] __asan_report_store1_noabort+0x1b/0x30 [ 13.671598] kmalloc_oob_right+0x6bd/0x7f0 [ 13.671602] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 13.671607] ? __schedule+0x10cc/0x2b30 [ 13.671611] ? ktime_get_ts64+0x83/0x230 [ 13.671616] kunit_try_run_case+0x1a2/0x480 [ 13.671620] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.671624] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.671629] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.671633] ? __kthread_parkme+0x82/0x180 [ 13.671637] ? preempt_count_sub+0x50/0x80 [ 13.671642] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.671646] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 13.671650] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.671654] kthread+0x334/0x6f0 [ 13.671658] ? trace_preempt_on+0x20/0xc0 [ 13.671662] ? __pfx_kthread+0x10/0x10 [ 13.671666] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.671670] ? calculate_sigpending+0x7b/0xa0 [ 13.671674] ? __pfx_kthread+0x10/0x10 [ 13.671678] ret_from_fork+0x3e/0x80 [ 13.671682] ? __pfx_kthread+0x10/0x10 [ 13.671686] ret_from_fork_asm+0x1a/0x30 [ 13.671692] </TASK> [ 13.671694] [ 13.834549] Allocated by task 179: [ 13.837955] kasan_save_stack+0x45/0x70 [ 13.841793] kasan_save_track+0x18/0x40 [ 13.845633] kasan_save_alloc_info+0x3b/0x50 [ 13.849907] __kasan_kmalloc+0xb7/0xc0 [ 13.853657] __kmalloc_cache_noprof+0x189/0x420 [ 13.858191] kmalloc_oob_right+0xa9/0x7f0 [ 13.862204] kunit_try_run_case+0x1a2/0x480 [ 13.866388] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 13.871787] kthread+0x334/0x6f0 [ 13.875022] ret_from_fork+0x3e/0x80 [ 13.878607] ret_from_fork_asm+0x1a/0x30 [ 13.882535] [ 13.884035] The buggy address belongs to the object at ffff888104ee9000 [ 13.884035] which belongs to the cache kmalloc-128 of size 128 [ 13.896549] The buggy address is located 5 bytes to the right of [ 13.896549] allocated 115-byte region [ffff888104ee9000, ffff888104ee9073) [ 13.909496] [ 13.910993] The buggy address belongs to the physical page: [ 13.916567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9 [ 13.924575] flags: 0x200000000000000(node=0|zone=2) [ 13.929452] page_type: f5(slab) [ 13.932599] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 13.940341] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.948086] page dumped because: kasan: bad access detected [ 13.953658] [ 13.955158] Memory state around the buggy address: [ 13.959950] ffff888104ee8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.967170] ffff888104ee8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.974389] >ffff888104ee9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.981608] ^ [ 13.988739] ffff888104ee9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.995959] ffff888104ee9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.003178] ==================================================================
Failure - log-parser-test/exception-warning-cpu-pid-at-driversgpudrmdrm_rect-drm_rect_calc_vscale
------------[ cut here ]------------ [ 136.044181] WARNING: CPU: 0 PID: 2763 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_vscale+0x130/0x190 [ 136.053669] Modules linked in: [ 136.056772] CPU: 0 UID: 0 PID: 2763 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 136.067736] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 136.073596] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 136.081018] RIP: 0010:drm_rect_calc_vscale+0x130/0x190 [ 136.086189] Code: 7f 43 41 39 ce 7c 3e 48 83 c4 08 89 c8 5b 41 5c 41 5d 41 5e 5d c3 cc cc cc cc 8d 44 08 ff 99 f7 f9 89 c1 85 c0 79 d6 eb de 90 <0f> 0b 90 b9 ea ff ff ff 48 83 c4 08 5b 89 c8 41 5c 41 5d 41 5e 5d [ 136.104963] RSP: 0000:ffff88811a2efc78 EFLAGS: 00010286 [ 136.110221] RAX: 00000000ffff0000 RBX: 00000000ffff0000 RCX: 0000000000010000 [ 136.117379] RDX: 0000000000000007 RSI: 0000000000000000 RDI: ffffffffb942327c [ 136.124539] RBP: ffff88811a2efca0 R08: 0000000000000000 R09: ffffed102338e3a0 [ 136.131721] R10: ffff888119c71d07 R11: 0000000000000000 R12: ffffffffb9423268 [ 136.138906] R13: 0000000000000000 R14: 000000007fffffff R15: ffff88811a2efd38 [ 136.146066] FS: 0000000000000000(0000) GS:ffff88846423b000(0000) knlGS:0000000000000000 [ 136.154176] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 136.159947] CR2: ffff88841dd87000 CR3: 000000023f4ba001 CR4: 00000000003726f0 [ 136.167109] DR0: ffffffffbb488880 DR1: ffffffffbb488881 DR2: ffffffffbb488882 [ 136.174264] DR3: ffffffffbb488883 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 136.181423] Call Trace: [ 136.183887] <TASK> [ 136.186020] drm_test_rect_calc_vscale+0x108/0x270 [ 136.190821] ? __pfx_drm_test_rect_calc_vscale+0x10/0x10 [ 136.196159] ? __schedule+0x10cc/0x2b30 [ 136.200039] ? ktime_get_ts64+0x83/0x230 [ 136.203991] kunit_try_run_case+0x1a2/0x480 [ 136.208202] ? __pfx_kunit_try_run_case+0x10/0x10 [ 136.212935] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 136.217580] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 136.222571] ? __kthread_parkme+0x82/0x180 [ 136.226722] ? preempt_count_sub+0x50/0x80 [ 136.230873] ? __pfx_kunit_try_run_case+0x10/0x10 [ 136.235605] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 136.241030] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 136.247150] kthread+0x334/0x6f0 [ 136.250393] ? trace_preempt_on+0x20/0xc0 [ 136.254431] ? __pfx_kthread+0x10/0x10 [ 136.258201] ? _raw_spin_unlock_irq+0x47/0x80 [ 136.262587] ? calculate_sigpending+0x7b/0xa0 [ 136.266985] ? __pfx_kthread+0x10/0x10 [ 136.270766] ret_from_fork+0x3e/0x80 [ 136.274362] ? __pfx_kthread+0x10/0x10 [ 136.278142] ret_from_fork_asm+0x1a/0x30 [ 136.282100] </TASK> [ 136.284301] ---[ end trace 0000000000000000 ]--- ------------[ cut here ]------------ [ 136.297596] WARNING: CPU: 2 PID: 2765 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_vscale+0x130/0x190 [ 136.307085] Modules linked in: [ 136.310173] CPU: 2 UID: 0 PID: 2765 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 136.321151] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 136.326992] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 136.334384] RIP: 0010:drm_rect_calc_vscale+0x130/0x190 [ 136.339550] Code: 7f 43 41 39 ce 7c 3e 48 83 c4 08 89 c8 5b 41 5c 41 5d 41 5e 5d c3 cc cc cc cc 8d 44 08 ff 99 f7 f9 89 c1 85 c0 79 d6 eb de 90 <0f> 0b 90 b9 ea ff ff ff 48 83 c4 08 5b 89 c8 41 5c 41 5d 41 5e 5d [ 136.358311] RSP: 0000:ffff88810b3f7c78 EFLAGS: 00010286 [ 136.363563] RAX: 0000000000010000 RBX: 00000000ffff0000 RCX: 00000000ffff0000 [ 136.370734] RDX: 0000000000000007 RSI: 0000000000000000 RDI: ffffffffb94232b4 [ 136.377907] RBP: ffff88810b3f7ca0 R08: 0000000000000000 R09: ffffed102338e3e0 [ 136.385046] R10: ffff888119c71f07 R11: 0000000000000000 R12: ffffffffb94232a0 [ 136.392204] R13: 0000000000000000 R14: 000000007fffffff R15: ffff88810b3f7d38 [ 136.399339] FS: 0000000000000000(0000) GS:ffff88846433b000(0000) knlGS:0000000000000000 [ 136.407451] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 136.413224] CR2: 00007ffff7ffe000 CR3: 000000023f4ba001 CR4: 00000000003726f0 [ 136.420369] DR0: ffffffffbb488880 DR1: ffffffffbb488881 DR2: ffffffffbb488882 [ 136.427527] DR3: ffffffffbb488883 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 136.434662] Call Trace: [ 136.437148] <TASK> [ 136.439254] drm_test_rect_calc_vscale+0x108/0x270 [ 136.444056] ? __pfx_drm_test_rect_calc_vscale+0x10/0x10 [ 136.449394] ? __schedule+0x10cc/0x2b30 [ 136.453243] ? ktime_get_ts64+0x83/0x230 [ 136.457196] kunit_try_run_case+0x1a2/0x480 [ 136.461387] ? __pfx_kunit_try_run_case+0x10/0x10 [ 136.466121] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 136.470766] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 136.475797] ? __kthread_parkme+0x82/0x180 [ 136.479910] ? preempt_count_sub+0x50/0x80 [ 136.484033] ? __pfx_kunit_try_run_case+0x10/0x10 [ 136.488765] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 136.494191] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 136.500308] kthread+0x334/0x6f0 [ 136.503568] ? trace_preempt_on+0x20/0xc0 [ 136.507588] ? __pfx_kthread+0x10/0x10 [ 136.511367] ? _raw_spin_unlock_irq+0x47/0x80 [ 136.515765] ? calculate_sigpending+0x7b/0xa0 [ 136.520155] ? __pfx_kthread+0x10/0x10 [ 136.523934] ret_from_fork+0x3e/0x80 [ 136.527539] ? __pfx_kthread+0x10/0x10 [ 136.531298] ret_from_fork_asm+0x1a/0x30 [ 136.535268] </TASK> [ 136.537470] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test/exception-warning-cpu-pid-at-driversgpudrmdrm_rect-drm_rect_calc_hscale
------------[ cut here ]------------ [ 135.755037] WARNING: CPU: 2 PID: 2753 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_hscale+0x125/0x190 [ 135.764583] Modules linked in: [ 135.767656] CPU: 2 UID: 0 PID: 2753 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 135.778662] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 135.784552] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 135.791945] RIP: 0010:drm_rect_calc_hscale+0x125/0x190 [ 135.797110] Code: 7f 43 41 39 ce 7c 3e 48 83 c4 08 89 c8 5b 41 5c 41 5d 41 5e 5d c3 cc cc cc cc 8d 44 08 ff 99 f7 f9 89 c1 85 c0 79 d6 eb de 90 <0f> 0b 90 b9 ea ff ff ff 48 83 c4 08 5b 89 c8 41 5c 41 5d 41 5e 5d [ 135.815866] RSP: 0000:ffff88811a607c78 EFLAGS: 00010286 [ 135.821115] RAX: 0000000000010000 RBX: 00000000ffff0000 RCX: 00000000ffff0000 [ 135.828247] RDX: 0000000000000003 RSI: 0000000000000000 RDI: ffffffffb94232b8 [ 135.835407] RBP: ffff88811a607ca0 R08: 0000000000000000 R09: ffffed10233be0e0 [ 135.842546] R10: ffff888119df0707 R11: 0000000000000000 R12: ffffffffb94232a0 [ 135.849712] R13: 0000000000000000 R14: 000000007fffffff R15: ffff88811a607d38 [ 135.856899] FS: 0000000000000000(0000) GS:ffff88846433b000(0000) knlGS:0000000000000000 [ 135.864994] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 135.870769] CR2: 00007ffff7ffe000 CR3: 000000023f4ba001 CR4: 00000000003726f0 [ 135.877915] DR0: ffffffffbb488880 DR1: ffffffffbb488881 DR2: ffffffffbb488882 [ 135.885072] DR3: ffffffffbb488883 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 135.892205] Call Trace: [ 135.894710] <TASK> [ 135.896817] drm_test_rect_calc_hscale+0x108/0x270 [ 135.901625] ? __pfx_drm_test_rect_calc_hscale+0x10/0x10 [ 135.906964] ? __schedule+0x10cc/0x2b30 [ 135.910814] ? ktime_get_ts64+0x83/0x230 [ 135.914768] kunit_try_run_case+0x1a2/0x480 [ 135.918967] ? __pfx_kunit_try_run_case+0x10/0x10 [ 135.923709] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 135.928360] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 135.933352] ? __kthread_parkme+0x82/0x180 [ 135.937462] ? preempt_count_sub+0x50/0x80 [ 135.941587] ? __pfx_kunit_try_run_case+0x10/0x10 [ 135.946300] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 135.951748] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 135.957844] kthread+0x334/0x6f0 [ 135.961101] ? trace_preempt_on+0x20/0xc0 [ 135.965123] ? __pfx_kthread+0x10/0x10 [ 135.968884] ? _raw_spin_unlock_irq+0x47/0x80 [ 135.973270] ? calculate_sigpending+0x7b/0xa0 [ 135.977638] ? __pfx_kthread+0x10/0x10 [ 135.981443] ret_from_fork+0x3e/0x80 [ 135.985040] ? __pfx_kthread+0x10/0x10 [ 135.988816] ret_from_fork_asm+0x1a/0x30 [ 135.992769] </TASK> [ 135.994969] ---[ end trace 0000000000000000 ]--- ------------[ cut here ]------------ [ 135.501963] WARNING: CPU: 0 PID: 2751 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_hscale+0x125/0x190 [ 135.511454] Modules linked in: [ 135.514540] CPU: 0 UID: 0 PID: 2751 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 135.525518] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 135.531360] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 135.538761] RIP: 0010:drm_rect_calc_hscale+0x125/0x190 [ 135.543927] Code: 7f 43 41 39 ce 7c 3e 48 83 c4 08 89 c8 5b 41 5c 41 5d 41 5e 5d c3 cc cc cc cc 8d 44 08 ff 99 f7 f9 89 c1 85 c0 79 d6 eb de 90 <0f> 0b 90 b9 ea ff ff ff 48 83 c4 08 5b 89 c8 41 5c 41 5d 41 5e 5d [ 135.562698] RSP: 0000:ffff888119c0fc78 EFLAGS: 00010286 [ 135.567973] RAX: 00000000ffff0000 RBX: 00000000ffff0000 RCX: 0000000000010000 [ 135.575132] RDX: 0000000000000003 RSI: 0000000000000000 RDI: ffffffffb9423280 [ 135.582281] RBP: ffff888119c0fca0 R08: 0000000000000000 R09: ffffed10233be0a0 [ 135.589423] R10: ffff888119df0507 R11: 0000000000000000 R12: ffffffffb9423268 [ 135.596581] R13: 0000000000000000 R14: 000000007fffffff R15: ffff888119c0fd38 [ 135.603741] FS: 0000000000000000(0000) GS:ffff88846423b000(0000) knlGS:0000000000000000 [ 135.611851] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 135.617622] CR2: ffff88841dd87000 CR3: 000000023f4ba001 CR4: 00000000003726f0 [ 135.624773] DR0: ffffffffbb488880 DR1: ffffffffbb488881 DR2: ffffffffbb488882 [ 135.631913] DR3: ffffffffbb488883 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 135.639046] Call Trace: [ 135.641524] <TASK> [ 135.643633] drm_test_rect_calc_hscale+0x108/0x270 [ 135.648442] ? __pfx_drm_test_rect_calc_hscale+0x10/0x10 [ 135.653779] ? __schedule+0x10cc/0x2b30 [ 135.657626] ? ktime_get_ts64+0x83/0x230 [ 135.661578] kunit_try_run_case+0x1a2/0x480 [ 135.665775] ? __pfx_kunit_try_run_case+0x10/0x10 [ 135.670504] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 135.675132] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 135.680123] ? __kthread_parkme+0x82/0x180 [ 135.684249] ? preempt_count_sub+0x50/0x80 [ 135.688357] ? __pfx_kunit_try_run_case+0x10/0x10 [ 135.693090] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 135.698498] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 135.704617] kthread+0x334/0x6f0 [ 135.707856] ? trace_preempt_on+0x20/0xc0 [ 135.711895] ? __pfx_kthread+0x10/0x10 [ 135.715659] ? _raw_spin_unlock_irq+0x47/0x80 [ 135.720040] ? calculate_sigpending+0x7b/0xa0 [ 135.724409] ? __pfx_kthread+0x10/0x10 [ 135.728187] ret_from_fork+0x3e/0x80 [ 135.731783] ? __pfx_kthread+0x10/0x10 [ 135.735562] ret_from_fork_asm+0x1a/0x30 [ 135.739500] </TASK> [ 135.741700] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test/exception-warning-cpu-pid-at-driversgpudrmdrm_framebuffer-drm_framebuffer_init
------------[ cut here ]------------ [ 134.216105] WARNING: CPU: 2 PID: 2549 at drivers/gpu/drm/drm_framebuffer.c:867 drm_framebuffer_init+0x44/0x300 [ 134.226114] Modules linked in: [ 134.229175] CPU: 2 UID: 0 PID: 2549 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 134.240138] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 134.245971] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 134.253371] RIP: 0010:drm_framebuffer_init+0x44/0x300 [ 134.258431] Code: 56 49 89 d6 48 89 f2 41 55 48 c1 ea 03 41 54 49 89 fc 53 48 89 f3 48 83 ec 18 80 3c 02 00 0f 85 00 02 00 00 4c 39 23 74 20 90 <0f> 0b 90 41 bd ea ff ff ff 48 83 c4 18 44 89 e8 5b 41 5c 41 5d 41 [ 134.277185] RSP: 0000:ffff888119b2fb30 EFLAGS: 00010246 [ 134.282420] RAX: dffffc0000000000 RBX: ffff888119b2fc28 RCX: 0000000000000000 [ 134.289562] RDX: 1ffff11023365f8e RSI: ffff888119b2fc28 RDI: ffff888119b2fc70 [ 134.296710] RBP: ffff888119b2fb70 R08: ffff88810213d000 R09: ffffffffb93c9f20 [ 134.303896] R10: 0000000000000003 R11: 00000000fcca6b63 R12: ffff88810213d000 [ 134.311037] R13: ffff888100327ae8 R14: ffff888119b2fba8 R15: 0000000000000000 [ 134.318176] FS: 0000000000000000(0000) GS:ffff88846433b000(0000) knlGS:0000000000000000 [ 134.326266] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 134.332024] CR2: 00007ffff7ffe000 CR3: 000000023f4ba001 CR4: 00000000003726f0 [ 134.339158] DR0: ffffffffbb488880 DR1: ffffffffbb488881 DR2: ffffffffbb488882 [ 134.346292] DR3: ffffffffbb488883 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 134.353431] Call Trace: [ 134.355884] <TASK> [ 134.357989] ? add_dr+0xc1/0x1d0 [ 134.361260] drm_test_framebuffer_init_bad_format+0xfc/0x240 [ 134.366928] ? add_dr+0x148/0x1d0 [ 134.370260] ? __pfx_drm_test_framebuffer_init_bad_format+0x10/0x10 [ 134.376536] ? __drmm_add_action+0x1a4/0x280 [ 134.380815] ? __pfx_drm_mode_config_init_release+0x10/0x10 [ 134.386390] ? __pfx_drm_mode_config_init_release+0x10/0x10 [ 134.391971] ? __drmm_add_action_or_reset+0x22/0x50 [ 134.396861] ? __schedule+0x10cc/0x2b30 [ 134.400727] ? ktime_get_ts64+0x83/0x230 [ 134.404709] kunit_try_run_case+0x1a2/0x480 [ 134.408924] ? __pfx_kunit_try_run_case+0x10/0x10 [ 134.413643] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 134.418264] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 134.423240] ? __kthread_parkme+0x82/0x180 [ 134.427354] ? preempt_count_sub+0x50/0x80 [ 134.431467] ? __pfx_kunit_try_run_case+0x10/0x10 [ 134.436186] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 134.441592] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 134.447710] kthread+0x334/0x6f0 [ 134.450988] ? trace_preempt_on+0x20/0xc0 [ 134.455012] ? __pfx_kthread+0x10/0x10 [ 134.458777] ? _raw_spin_unlock_irq+0x47/0x80 [ 134.463146] ? calculate_sigpending+0x7b/0xa0 [ 134.467513] ? __pfx_kthread+0x10/0x10 [ 134.471277] ret_from_fork+0x3e/0x80 [ 134.474873] ? __pfx_kthread+0x10/0x10 [ 134.478633] ret_from_fork_asm+0x1a/0x30 [ 134.482570] </TASK> [ 134.484773] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test/exception-drm-kunit-mock-device-drm_test_framebuffer_freedrm-kunit-mock-device-drm-drm_warn_onlist_empty-filp_head
------------[ cut here ]------------ [ 133.927823] drm-kunit-mock-device drm_test_framebuffer_free.drm-kunit-mock-device: [drm] drm_WARN_ON(!list_empty(&fb->filp_head)) [ 133.927856] WARNING: CPU: 3 PID: 2545 at drivers/gpu/drm/drm_framebuffer.c:832 drm_framebuffer_free+0x13f/0x1c0 [ 133.949628] Modules linked in: [ 133.952713] CPU: 3 UID: 0 PID: 2545 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 133.963714] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 133.969559] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 133.976951] RIP: 0010:drm_framebuffer_free+0x13f/0x1c0 [ 133.982116] Code: 8b 7d 50 4d 85 ff 74 2b 4c 89 ef e8 1b 87 84 00 48 c7 c1 20 4f 3c b9 4c 89 fa 48 c7 c7 80 4f 3c b9 48 89 c6 e8 62 0f 82 fe 90 <0f> 0b 90 90 e9 1c ff ff ff 48 b8 00 00 00 00 00 fc ff df 4c 89 ea [ 134.000871] RSP: 0000:ffff888119fa7b68 EFLAGS: 00010282 [ 134.006122] RAX: 0000000000000000 RBX: ffff888119fa7c40 RCX: 1ffffffff7424ab4 [ 134.013265] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000001 [ 134.020422] RBP: ffff888119fa7b90 R08: 0000000000000000 R09: fffffbfff7424ab4 [ 134.027580] R10: 0000000000000003 R11: 000000000003b658 R12: ffff888119fa7c18 [ 134.034760] R13: ffff888118876000 R14: ffff888101d3f000 R15: ffff88811879bd80 [ 134.041915] FS: 0000000000000000(0000) GS:ffff8884643bb000(0000) knlGS:0000000000000000 [ 134.050008] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 134.055780] CR2: ffffffffffffffff CR3: 000000023f4ba001 CR4: 00000000003726f0 [ 134.062911] DR0: ffffffffbb48888c DR1: ffffffffbb48888d DR2: ffffffffbb48888e [ 134.070073] DR3: ffffffffbb48888f DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 134.077212] Call Trace: [ 134.079712] <TASK> [ 134.081850] drm_test_framebuffer_free+0x1ab/0x610 [ 134.086660] ? __pfx_drm_test_framebuffer_free+0x10/0x10 [ 134.092030] ? __pfx_drm_mode_config_init_release+0x10/0x10 [ 134.097604] ? __pfx_drm_mode_config_init_release+0x10/0x10 [ 134.103201] ? __drmm_add_action_or_reset+0x22/0x50 [ 134.108108] ? __schedule+0x10cc/0x2b30 [ 134.111965] ? ktime_get_ts64+0x83/0x230 [ 134.115907] kunit_try_run_case+0x1a2/0x480 [ 134.120118] ? __pfx_kunit_try_run_case+0x10/0x10 [ 134.124832] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 134.129478] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 134.134454] ? __kthread_parkme+0x82/0x180 [ 134.138577] ? preempt_count_sub+0x50/0x80 [ 134.142712] ? __pfx_kunit_try_run_case+0x10/0x10 [ 134.147434] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 134.152842] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 134.158962] kthread+0x334/0x6f0 [ 134.162210] ? trace_preempt_on+0x20/0xc0 [ 134.166249] ? __pfx_kthread+0x10/0x10 [ 134.170025] ? _raw_spin_unlock_irq+0x47/0x80 [ 134.174397] ? calculate_sigpending+0x7b/0xa0 [ 134.178766] ? __pfx_kthread+0x10/0x10 [ 134.182543] ret_from_fork+0x3e/0x80 [ 134.186137] ? __pfx_kthread+0x10/0x10 [ 134.189892] ret_from_fork_asm+0x1a/0x30 [ 134.193843] </TASK> [ 134.196043] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test/exception-warning-cpu-pid-at-driversgpudrmdrm_connector-drm_connector_dynamic_register
------------[ cut here ]------------ [ 131.056351] WARNING: CPU: 2 PID: 1983 at drivers/gpu/drm/drm_connector.c:861 drm_connector_dynamic_register+0xbf/0x110 [ 131.067054] Modules linked in: [ 131.070141] CPU: 2 UID: 0 PID: 1983 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 131.081120] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 131.086960] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 131.094378] RIP: 0010:drm_connector_dynamic_register+0xbf/0x110 [ 131.100305] Code: 49 8d 7c 24 58 48 89 fa 48 c1 ea 03 0f b6 04 02 84 c0 74 02 7e 36 31 c0 41 80 7c 24 58 00 75 1b 5b 41 5c 5d c3 cc cc cc cc 90 <0f> 0b 90 b8 ea ff ff ff 5b 41 5c 5d c3 cc cc cc cc 48 89 df e8 d8 [ 131.119078] RSP: 0000:ffff888118d77c90 EFLAGS: 00010246 [ 131.124330] RAX: dffffc0000000000 RBX: ffff888118eda000 RCX: 0000000000000000 [ 131.131469] RDX: 1ffff110231db432 RSI: ffffffffb65eed08 RDI: ffff888118eda190 [ 131.138627] RBP: ffff888118d77ca0 R08: 1ffff11020064f69 R09: ffffed10231aef65 [ 131.145760] R10: 0000000000000003 R11: ffffffffb5b7ec38 R12: 0000000000000000 [ 131.152920] R13: ffff888118d77d38 R14: ffff888100327c50 R15: ffff888100327c58 [ 131.160078] FS: 0000000000000000(0000) GS:ffff88846433b000(0000) knlGS:0000000000000000 [ 131.168172] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 131.173945] CR2: 00007ffff7ffe000 CR3: 000000023f4ba001 CR4: 00000000003726f0 [ 131.181086] DR0: ffffffffbb488880 DR1: ffffffffbb488881 DR2: ffffffffbb488882 [ 131.188246] DR3: ffffffffbb488883 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 131.195402] Call Trace: [ 131.197879] <TASK> [ 131.199985] drm_test_drm_connector_dynamic_register_no_init+0x104/0x290 [ 131.206724] ? __pfx_drm_test_drm_connector_dynamic_register_no_init+0x10/0x10 [ 131.213974] ? __schedule+0x10cc/0x2b30 [ 131.217830] ? ktime_get_ts64+0x83/0x230 [ 131.221782] kunit_try_run_case+0x1a2/0x480 [ 131.225985] ? __pfx_kunit_try_run_case+0x10/0x10 [ 131.230738] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 131.235360] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 131.240354] ? __kthread_parkme+0x82/0x180 [ 131.244460] ? preempt_count_sub+0x50/0x80 [ 131.248588] ? __pfx_kunit_try_run_case+0x10/0x10 [ 131.253301] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 131.258727] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 131.264845] kthread+0x334/0x6f0 [ 131.268103] ? trace_preempt_on+0x20/0xc0 [ 131.272133] ? __pfx_kthread+0x10/0x10 [ 131.275894] ? _raw_spin_unlock_irq+0x47/0x80 [ 131.280278] ? calculate_sigpending+0x7b/0xa0 [ 131.284648] ? __pfx_kthread+0x10/0x10 [ 131.288460] ret_from_fork+0x3e/0x80 [ 131.292060] ? __pfx_kthread+0x10/0x10 [ 131.295845] ret_from_fork_asm+0x1a/0x30 [ 131.299796] </TASK> [ 131.301997] ---[ end trace 0000000000000000 ]--- ------------[ cut here ]------------ [ 130.699828] WARNING: CPU: 2 PID: 1975 at drivers/gpu/drm/drm_connector.c:861 drm_connector_dynamic_register+0xbf/0x110 [ 130.710558] Modules linked in: [ 130.713645] CPU: 2 UID: 0 PID: 1975 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 130.724650] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 130.730492] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 130.737893] RIP: 0010:drm_connector_dynamic_register+0xbf/0x110 [ 130.743838] Code: 49 8d 7c 24 58 48 89 fa 48 c1 ea 03 0f b6 04 02 84 c0 74 02 7e 36 31 c0 41 80 7c 24 58 00 75 1b 5b 41 5c 5d c3 cc cc cc cc 90 <0f> 0b 90 b8 ea ff ff ff 5b 41 5c 5d c3 cc cc cc cc 48 89 df e8 d8 [ 130.762619] RSP: 0000:ffff888118c17c90 EFLAGS: 00010246 [ 130.767860] RAX: dffffc0000000000 RBX: ffff888118abe000 RCX: 0000000000000000 [ 130.775001] RDX: 1ffff11023157c32 RSI: ffffffffb65eed08 RDI: ffff888118abe190 [ 130.782158] RBP: ffff888118c17ca0 R08: 1ffff11020064f69 R09: ffffed1023182f65 [ 130.789293] R10: 0000000000000003 R11: ffffffffb50049aa R12: 0000000000000000 [ 130.796450] R13: ffff888118c17d38 R14: ffff888100327c50 R15: ffff888100327c58 [ 130.803592] FS: 0000000000000000(0000) GS:ffff88846433b000(0000) knlGS:0000000000000000 [ 130.811716] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 130.817503] CR2: 00007ffff7ffe000 CR3: 000000023f4ba001 CR4: 00000000003726f0 [ 130.824650] DR0: ffffffffbb488880 DR1: ffffffffbb488881 DR2: ffffffffbb488882 [ 130.831807] DR3: ffffffffbb488883 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 130.838942] Call Trace: [ 130.841419] <TASK> [ 130.843525] drm_test_drm_connector_dynamic_register_early_no_init+0x104/0x290 [ 130.850761] ? __pfx_drm_test_drm_connector_dynamic_register_early_no_init+0x10/0x10 [ 130.858525] ? __schedule+0x10cc/0x2b30 [ 130.862374] ? ktime_get_ts64+0x83/0x230 [ 130.866326] kunit_try_run_case+0x1a2/0x480 [ 130.870546] ? __pfx_kunit_try_run_case+0x10/0x10 [ 130.875261] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 130.879897] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 130.884897] ? __kthread_parkme+0x82/0x180 [ 130.889007] ? preempt_count_sub+0x50/0x80 [ 130.893130] ? __pfx_kunit_try_run_case+0x10/0x10 [ 130.897845] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 130.903270] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 130.909370] kthread+0x334/0x6f0 [ 130.912629] ? trace_preempt_on+0x20/0xc0 [ 130.916650] ? __pfx_kthread+0x10/0x10 [ 130.920430] ? _raw_spin_unlock_irq+0x47/0x80 [ 130.924815] ? calculate_sigpending+0x7b/0xa0 [ 130.929191] ? __pfx_kthread+0x10/0x10 [ 130.932969] ret_from_fork+0x3e/0x80 [ 130.936556] ? __pfx_kthread+0x10/0x10 [ 130.940319] ret_from_fork_asm+0x1a/0x30 [ 130.944274] </TASK> [ 130.946479] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test/exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------ [ 118.180828] WARNING: CPU: 0 PID: 699 at lib/math/int_log.c:120 intlog10+0x2a/0x40 [ 118.188325] Modules linked in: [ 118.191412] CPU: 0 UID: 0 PID: 699 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 118.202301] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 118.208142] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 118.215536] RIP: 0010:intlog10+0x2a/0x40 [ 118.219489] Code: f3 0f 1e fa 0f 1f 44 00 00 85 ff 74 1c 55 48 89 e5 e8 ca fe ff ff 5d 89 c0 48 69 c0 a1 26 88 26 48 c1 e8 1f c3 cc cc cc cc 90 <0f> 0b 90 31 c0 c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 66 90 [ 118.238243] RSP: 0000:ffff888116e07cb0 EFLAGS: 00010246 [ 118.243494] RAX: 0000000000000000 RBX: ffff888100327ae8 RCX: 1ffff11022dc0fb4 [ 118.250634] RDX: 1ffffffff7252458 RSI: 1ffff11022dc0fb3 RDI: 0000000000000000 [ 118.257811] RBP: ffff888116e07d60 R08: 0000000000000000 R09: ffffed1022612e80 [ 118.264951] R10: ffff888113097407 R11: 0000000000000000 R12: 1ffff11022dc0f97 [ 118.272085] R13: ffffffffb92922c0 R14: 0000000000000000 R15: ffff888116e07d38 [ 118.279242] FS: 0000000000000000(0000) GS:ffff88846423b000(0000) knlGS:0000000000000000 [ 118.287336] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 118.293109] CR2: ffff88841dd87000 CR3: 000000023f4ba001 CR4: 00000000003726f0 [ 118.300265] DR0: ffffffffbb488880 DR1: ffffffffbb488881 DR2: ffffffffbb488882 [ 118.307405] DR3: ffffffffbb488883 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 118.314540] Call Trace: [ 118.317019] <TASK> [ 118.319133] ? intlog10_test+0xf2/0x220 [ 118.322981] ? __pfx_intlog10_test+0x10/0x10 [ 118.327280] ? __schedule+0x10cc/0x2b30 [ 118.331136] ? ktime_get_ts64+0x83/0x230 [ 118.335086] kunit_try_run_case+0x1a2/0x480 [ 118.339282] ? __pfx_kunit_try_run_case+0x10/0x10 [ 118.344013] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 118.348641] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 118.353713] ? __kthread_parkme+0x82/0x180 [ 118.357836] ? preempt_count_sub+0x50/0x80 [ 118.361962] ? __pfx_kunit_try_run_case+0x10/0x10 [ 118.366694] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 118.372145] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 118.378245] kthread+0x334/0x6f0 [ 118.381502] ? trace_preempt_on+0x20/0xc0 [ 118.385524] ? __pfx_kthread+0x10/0x10 [ 118.389287] ? _raw_spin_unlock_irq+0x47/0x80 [ 118.393672] ? calculate_sigpending+0x7b/0xa0 [ 118.398058] ? __pfx_kthread+0x10/0x10 [ 118.401834] ret_from_fork+0x3e/0x80 [ 118.405423] ? __pfx_kthread+0x10/0x10 [ 118.409183] ret_from_fork_asm+0x1a/0x30 [ 118.413139] </TASK> [ 118.415335] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test/exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------ [ 117.883313] WARNING: CPU: 1 PID: 681 at lib/math/int_log.c:63 intlog2+0xdf/0x110 [ 117.890732] Modules linked in: [ 117.893821] CPU: 1 UID: 0 PID: 681 Comm: kunit_try_catch Tainted: G B D N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 117.904696] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 117.909683] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 117.917088] RIP: 0010:intlog2+0xdf/0x110 [ 117.921038] Code: 29 b9 c1 e0 18 48 83 c4 08 89 d1 c1 e2 08 29 cb 01 d0 0f b7 db 41 0f af dc c1 eb 0f 01 d8 5b 41 5c 41 5d 5d c3 cc cc cc cc 90 <0f> 0b 90 31 c0 c3 cc cc cc cc 89 45 e4 e8 1f e5 56 ff 8b 45 e4 eb [ 117.939794] RSP: 0000:ffff888117107cb0 EFLAGS: 00010246 [ 117.945046] RAX: 0000000000000000 RBX: ffff888100327ae8 RCX: 1ffff11022e20fb4 [ 117.952187] RDX: 1ffffffff72524ac RSI: 1ffff11022e20fb3 RDI: 0000000000000000 [ 117.959345] RBP: ffff888117107d60 R08: 0000000000000000 R09: ffffed1020fe0440 [ 117.966486] R10: ffff888107f02207 R11: 0000000000000000 R12: 1ffff11022e20f97 [ 117.973653] R13: ffffffffb9292560 R14: 0000000000000000 R15: ffff888117107d38 [ 117.980811] FS: 0000000000000000(0000) GS:ffff8884642bb000(0000) knlGS:0000000000000000 [ 117.988923] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 117.994696] CR2: ffff88841dd91fff CR3: 000000023f4ba002 CR4: 00000000003726f0 [ 118.001852] DR0: ffffffffbb488880 DR1: ffffffffbb488881 DR2: ffffffffbb488883 [ 118.008994] DR3: ffffffffbb488885 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 118.016135] Call Trace: [ 118.018613] <TASK> [ 118.020730] ? intlog2_test+0xf2/0x220 [ 118.024497] ? __pfx_intlog2_test+0x10/0x10 [ 118.028731] ? __schedule+0x10cc/0x2b30 [ 118.032583] ? ktime_get_ts64+0x83/0x230 [ 118.036535] kunit_try_run_case+0x1a2/0x480 [ 118.040739] ? __pfx_kunit_try_run_case+0x10/0x10 [ 118.045470] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 118.050106] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 118.055097] ? __kthread_parkme+0x82/0x180 [ 118.059205] ? preempt_count_sub+0x50/0x80 [ 118.063331] ? __pfx_kunit_try_run_case+0x10/0x10 [ 118.068045] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 118.073471] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 118.079573] kthread+0x334/0x6f0 [ 118.082829] ? trace_preempt_on+0x20/0xc0 [ 118.086851] ? __pfx_kthread+0x10/0x10 [ 118.090629] ? _raw_spin_unlock_irq+0x47/0x80 [ 118.094997] ? calculate_sigpending+0x7b/0xa0 [ 118.099384] ? __pfx_kthread+0x10/0x10 [ 118.103151] ret_from_fork+0x3e/0x80 [ 118.106758] ? __pfx_kthread+0x10/0x10 [ 118.110520] ret_from_fork_asm+0x1a/0x30 [ 118.114477] </TASK> [ 118.116709] ---[ end trace 0000000000000000 ]---
Failure - lava/job
(no logs available)
Failure - lava/read-feedback
(no logs available)
Failure - lava/bootloader-action
(no logs available)
Failure - lava/bootloader-retry
(no logs available)
Failure - lava/auto-login-action
(no logs available)
Failure - lava/login-action
(no logs available)
Failure - boot/gcc-13-lkftconfig-kunit
(no logs available)