Date
July 6, 2025, 11:09 p.m.
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 19.509095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 19.533715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 19.412681] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 19.388593] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
Failure - log-parser-boot/internal-error-oops-oops-smp
[ 94.252399] Internal error: Oops: 0000000096000005 [#1] SMP [ 94.260969] Modules linked in: [ 94.262148] CPU: 0 UID: 0 PID: 533 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 94.263407] Tainted: [B]=BAD_PAGE, [N]=TEST [ 94.264335] Hardware name: linux,dummy-virt (DT) [ 94.265000] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 94.265812] pc : kunit_test_null_dereference+0x70/0x170 [ 94.266480] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 94.267280] sp : ffff800080f27d30 [ 94.267851] x29: ffff800080f27d90 x28: 0000000000000000 x27: 0000000000000000 [ 94.268739] x26: 1ffe000018ef74c1 x25: 0000000000000000 x24: 0000000000000004 [ 94.269642] x23: fff00000c77ba60c x22: ffff91de9ec235b8 x21: fff00000c3e1ca88 [ 94.270231] x20: 1ffff000101e4fa6 x19: ffff800080087990 x18: 00000000970be057 [ 94.270590] x17: 0000000000000001 x16: fff00000c097583c x15: fff00000ff616b08 [ 94.271789] x14: 0000000000018fff x13: 1ffe00001b48e9cd x12: fffd800018ad63a4 [ 94.272627] x11: 1ffe000018ad63a3 x10: fffd800018ad63a3 x9 : ffff91de9ec1aa20 [ 94.273516] x8 : ffff800080f27c18 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 94.274356] x5 : ffff7000101e4fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 94.275282] x2 : dfff800000000000 x1 : fff00000c56b1440 x0 : ffff800080087990 [ 94.275677] Call trace: [ 94.275841] kunit_test_null_dereference+0x70/0x170 (P) [ 94.276130] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 94.276809] kthread+0x328/0x630 [ 94.277052] ret_from_fork+0x10/0x20 [ 94.277503] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 94.278113] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 49.903667] ================================================================== [ 49.903737] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 49.903737] [ 49.903823] Use-after-free read at 0x000000005bb9d36f (in kfence-#140): [ 49.903874] test_krealloc+0x51c/0x830 [ 49.903917] kunit_try_run_case+0x170/0x3f0 [ 49.903962] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.904021] kthread+0x328/0x630 [ 49.904059] ret_from_fork+0x10/0x20 [ 49.904100] [ 49.904125] kfence-#140: 0x000000005bb9d36f-0x00000000ccec1f7e, size=32, cache=kmalloc-32 [ 49.904125] [ 49.904180] allocated by task 338 on cpu 0 at 49.902996s (0.001179s ago): [ 49.904249] test_alloc+0x29c/0x628 [ 49.904289] test_krealloc+0xc0/0x830 [ 49.904328] kunit_try_run_case+0x170/0x3f0 [ 49.904367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.904410] kthread+0x328/0x630 [ 49.904445] ret_from_fork+0x10/0x20 [ 49.904483] [ 49.904508] freed by task 338 on cpu 0 at 49.903275s (0.001228s ago): [ 49.904569] krealloc_noprof+0x148/0x360 [ 49.904609] test_krealloc+0x1dc/0x830 [ 49.904650] kunit_try_run_case+0x170/0x3f0 [ 49.904689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.904731] kthread+0x328/0x630 [ 49.904767] ret_from_fork+0x10/0x20 [ 49.904806] [ 49.904849] CPU: 0 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 49.904928] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.904957] Hardware name: linux,dummy-virt (DT) [ 49.905001] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 49.827481] ================================================================== [ 49.827584] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 49.827584] [ 49.827687] Use-after-free read at 0x00000000e4389591 (in kfence-#139): [ 49.827741] test_memcache_typesafe_by_rcu+0x280/0x560 [ 49.827791] kunit_try_run_case+0x170/0x3f0 [ 49.827838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.827882] kthread+0x328/0x630 [ 49.827920] ret_from_fork+0x10/0x20 [ 49.827960] [ 49.828000] kfence-#139: 0x00000000e4389591-0x0000000077048349, size=32, cache=test [ 49.828000] [ 49.828051] allocated by task 336 on cpu 1 at 49.795211s (0.032836s ago): [ 49.828124] test_alloc+0x230/0x628 [ 49.828167] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 49.828210] kunit_try_run_case+0x170/0x3f0 [ 49.828249] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.828290] kthread+0x328/0x630 [ 49.828326] ret_from_fork+0x10/0x20 [ 49.828364] [ 49.828387] freed by task 336 on cpu 1 at 49.795328s (0.033055s ago): [ 49.828443] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 49.828486] kunit_try_run_case+0x170/0x3f0 [ 49.828523] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.828567] kthread+0x328/0x630 [ 49.828605] ret_from_fork+0x10/0x20 [ 49.828642] [ 49.828689] CPU: 1 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 49.828769] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.828797] Hardware name: linux,dummy-virt (DT) [ 49.828833] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 26.622460] ================================================================== [ 26.622613] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 26.622613] [ 26.622719] Invalid read at 0x00000000f22f2ff6: [ 26.623147] test_invalid_access+0xdc/0x1f0 [ 26.623256] kunit_try_run_case+0x170/0x3f0 [ 26.623627] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.623934] kthread+0x328/0x630 [ 26.623996] ret_from_fork+0x10/0x20 [ 26.624875] [ 26.627208] CPU: 0 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 26.627544] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.627647] Hardware name: linux,dummy-virt (DT) [ 26.627705] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 26.395419] ================================================================== [ 26.395511] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 26.395511] [ 26.395575] Corrupted memory at 0x00000000f5282cf0 [ ! . . . . . . . . . . . . . . . ] (in kfence-#135): [ 26.395881] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 26.395929] kunit_try_run_case+0x170/0x3f0 [ 26.395971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.396034] kthread+0x328/0x630 [ 26.396070] ret_from_fork+0x10/0x20 [ 26.396109] [ 26.396133] kfence-#135: 0x000000002ee40edf-0x000000008b03ed33, size=73, cache=kmalloc-96 [ 26.396133] [ 26.396187] allocated by task 326 on cpu 1 at 26.395215s (0.000968s ago): [ 26.396250] test_alloc+0x29c/0x628 [ 26.396289] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 26.396332] kunit_try_run_case+0x170/0x3f0 [ 26.396372] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.396413] kthread+0x328/0x630 [ 26.396449] ret_from_fork+0x10/0x20 [ 26.396486] [ 26.396510] freed by task 326 on cpu 1 at 26.395333s (0.001174s ago): [ 26.396571] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 26.396612] kunit_try_run_case+0x170/0x3f0 [ 26.396651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.396694] kthread+0x328/0x630 [ 26.396728] ret_from_fork+0x10/0x20 [ 26.396767] [ 26.396809] CPU: 1 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 26.396886] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.396915] Hardware name: linux,dummy-virt (DT) [ 26.396948] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 26.291236] ================================================================== [ 26.291327] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 26.291327] [ 26.291423] Out-of-bounds read at 0x000000005264e4b5 (105B right of kfence-#134): [ 26.291484] test_kmalloc_aligned_oob_read+0x238/0x468 [ 26.291534] kunit_try_run_case+0x170/0x3f0 [ 26.291579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.291622] kthread+0x328/0x630 [ 26.291662] ret_from_fork+0x10/0x20 [ 26.291703] [ 26.291727] kfence-#134: 0x000000004ea2de3b-0x00000000c135e964, size=73, cache=kmalloc-96 [ 26.291727] [ 26.291780] allocated by task 324 on cpu 1 at 26.291002s (0.000774s ago): [ 26.291851] test_alloc+0x29c/0x628 [ 26.291890] test_kmalloc_aligned_oob_read+0x100/0x468 [ 26.291934] kunit_try_run_case+0x170/0x3f0 [ 26.291989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.292033] kthread+0x328/0x630 [ 26.292069] ret_from_fork+0x10/0x20 [ 26.292109] [ 26.292154] CPU: 1 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 26.292236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.292266] Hardware name: linux,dummy-virt (DT) [ 26.292301] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[ 22.755216] ================================================================== [ 22.755307] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 22.755307] [ 22.755369] Corrupted memory at 0x0000000083bfc31e [ ! ] (in kfence-#100): [ 22.755485] test_corruption+0x1d8/0x378 [ 22.755529] kunit_try_run_case+0x170/0x3f0 [ 22.755571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.755617] kthread+0x328/0x630 [ 22.755653] ret_from_fork+0x10/0x20 [ 22.755693] [ 22.755717] kfence-#100: 0x00000000ffa72f0f-0x00000000e3df1aa4, size=32, cache=test [ 22.755717] [ 22.755770] allocated by task 314 on cpu 1 at 22.755077s (0.000689s ago): [ 22.755829] test_alloc+0x230/0x628 [ 22.755870] test_corruption+0x198/0x378 [ 22.755908] kunit_try_run_case+0x170/0x3f0 [ 22.755947] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.756002] kthread+0x328/0x630 [ 22.756037] ret_from_fork+0x10/0x20 [ 22.756077] [ 22.756098] freed by task 314 on cpu 1 at 22.755136s (0.000959s ago): [ 22.756159] test_corruption+0x1d8/0x378 [ 22.756197] kunit_try_run_case+0x170/0x3f0 [ 22.756236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.756278] kthread+0x328/0x630 [ 22.756312] ret_from_fork+0x10/0x20 [ 22.756349] [ 22.756391] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.756468] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.756497] Hardware name: linux,dummy-virt (DT) [ 22.756530] ================================================================== [ 22.443313] ================================================================== [ 22.443404] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 22.443404] [ 22.443469] Corrupted memory at 0x00000000bf0fc562 [ ! . . . . . . . . . . . . . . . ] (in kfence-#97): [ 22.443774] test_corruption+0x278/0x378 [ 22.443821] kunit_try_run_case+0x170/0x3f0 [ 22.443864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.443909] kthread+0x328/0x630 [ 22.443947] ret_from_fork+0x10/0x20 [ 22.444000] [ 22.444024] kfence-#97: 0x000000006f845ed1-0x00000000b994ee49, size=32, cache=kmalloc-32 [ 22.444024] [ 22.444081] allocated by task 312 on cpu 1 at 22.443081s (0.000996s ago): [ 22.444143] test_alloc+0x29c/0x628 [ 22.444183] test_corruption+0xdc/0x378 [ 22.444223] kunit_try_run_case+0x170/0x3f0 [ 22.444262] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.444305] kthread+0x328/0x630 [ 22.444341] ret_from_fork+0x10/0x20 [ 22.444380] [ 22.444402] freed by task 312 on cpu 1 at 22.443189s (0.001209s ago): [ 22.444463] test_corruption+0x278/0x378 [ 22.444501] kunit_try_run_case+0x170/0x3f0 [ 22.444541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.444585] kthread+0x328/0x630 [ 22.444620] ret_from_fork+0x10/0x20 [ 22.444659] [ 22.444703] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.444781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.444811] Hardware name: linux,dummy-virt (DT) [ 22.444846] ================================================================== [ 22.651195] ================================================================== [ 22.651285] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 22.651285] [ 22.651348] Corrupted memory at 0x00000000eea02e86 [ ! . . . . . . . . . . . . . . . ] (in kfence-#99): [ 22.651655] test_corruption+0x120/0x378 [ 22.651702] kunit_try_run_case+0x170/0x3f0 [ 22.651745] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.651789] kthread+0x328/0x630 [ 22.651827] ret_from_fork+0x10/0x20 [ 22.651867] [ 22.651890] kfence-#99: 0x000000008b367333-0x00000000ccae760f, size=32, cache=test [ 22.651890] [ 22.651944] allocated by task 314 on cpu 1 at 22.651044s (0.000896s ago): [ 22.652021] test_alloc+0x230/0x628 [ 22.652062] test_corruption+0xdc/0x378 [ 22.652101] kunit_try_run_case+0x170/0x3f0 [ 22.652141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.652185] kthread+0x328/0x630 [ 22.652219] ret_from_fork+0x10/0x20 [ 22.652258] [ 22.652281] freed by task 314 on cpu 1 at 22.651104s (0.001174s ago): [ 22.652341] test_corruption+0x120/0x378 [ 22.652380] kunit_try_run_case+0x170/0x3f0 [ 22.652420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.652463] kthread+0x328/0x630 [ 22.652497] ret_from_fork+0x10/0x20 [ 22.652537] [ 22.652580] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.652655] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.652683] Hardware name: linux,dummy-virt (DT) [ 22.652715] ================================================================== [ 22.547341] ================================================================== [ 22.547431] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 22.547431] [ 22.547492] Corrupted memory at 0x000000008acec362 [ ! ] (in kfence-#98): [ 22.547619] test_corruption+0x284/0x378 [ 22.547665] kunit_try_run_case+0x170/0x3f0 [ 22.547708] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.547752] kthread+0x328/0x630 [ 22.547789] ret_from_fork+0x10/0x20 [ 22.547829] [ 22.547851] kfence-#98: 0x000000009fcb9fcc-0x0000000076853f19, size=32, cache=kmalloc-32 [ 22.547851] [ 22.547907] allocated by task 312 on cpu 1 at 22.547065s (0.000838s ago): [ 22.547968] test_alloc+0x29c/0x628 [ 22.548022] test_corruption+0x198/0x378 [ 22.548060] kunit_try_run_case+0x170/0x3f0 [ 22.548100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.548143] kthread+0x328/0x630 [ 22.548177] ret_from_fork+0x10/0x20 [ 22.548216] [ 22.548238] freed by task 312 on cpu 1 at 22.547175s (0.001060s ago): [ 22.548297] test_corruption+0x284/0x378 [ 22.548337] kunit_try_run_case+0x170/0x3f0 [ 22.548374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.548417] kthread+0x328/0x630 [ 22.548452] ret_from_fork+0x10/0x20 [ 22.548489] [ 22.548530] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.548607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.548635] Hardware name: linux,dummy-virt (DT) [ 22.548668] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 22.235237] ================================================================== [ 22.235324] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 22.235324] [ 22.235386] Invalid free of 0x000000009a4289e7 (in kfence-#95): [ 22.235441] test_invalid_addr_free+0x1ac/0x238 [ 22.235491] kunit_try_run_case+0x170/0x3f0 [ 22.235534] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.235576] kthread+0x328/0x630 [ 22.235615] ret_from_fork+0x10/0x20 [ 22.235655] [ 22.235680] kfence-#95: 0x000000004c6c5a8f-0x00000000d9a0fc35, size=32, cache=kmalloc-32 [ 22.235680] [ 22.235735] allocated by task 308 on cpu 1 at 22.235098s (0.000634s ago): [ 22.235798] test_alloc+0x29c/0x628 [ 22.235838] test_invalid_addr_free+0xd4/0x238 [ 22.235879] kunit_try_run_case+0x170/0x3f0 [ 22.235919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.235962] kthread+0x328/0x630 [ 22.236013] ret_from_fork+0x10/0x20 [ 22.236055] [ 22.236103] CPU: 1 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.236183] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.236213] Hardware name: linux,dummy-virt (DT) [ 22.236248] ================================================================== [ 22.339109] ================================================================== [ 22.339202] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 22.339202] [ 22.339263] Invalid free of 0x0000000078184a5d (in kfence-#96): [ 22.339317] test_invalid_addr_free+0xec/0x238 [ 22.339364] kunit_try_run_case+0x170/0x3f0 [ 22.339406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.339450] kthread+0x328/0x630 [ 22.339487] ret_from_fork+0x10/0x20 [ 22.339526] [ 22.339549] kfence-#96: 0x00000000e0b64c6c-0x000000002d235205, size=32, cache=test [ 22.339549] [ 22.339601] allocated by task 310 on cpu 1 at 22.338986s (0.000611s ago): [ 22.339663] test_alloc+0x230/0x628 [ 22.339703] test_invalid_addr_free+0xd4/0x238 [ 22.339743] kunit_try_run_case+0x170/0x3f0 [ 22.339782] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.339825] kthread+0x328/0x630 [ 22.339859] ret_from_fork+0x10/0x20 [ 22.339899] [ 22.339941] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.340030] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.340059] Hardware name: linux,dummy-virt (DT) [ 22.340093] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[ 22.027381] ================================================================== [ 22.027508] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 22.027508] [ 22.027579] Invalid free of 0x0000000018b1b923 (in kfence-#93): [ 22.027650] test_double_free+0x1bc/0x238 [ 22.027698] kunit_try_run_case+0x170/0x3f0 [ 22.027744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.027786] kthread+0x328/0x630 [ 22.027825] ret_from_fork+0x10/0x20 [ 22.027864] [ 22.027888] kfence-#93: 0x0000000018b1b923-0x00000000f6588c4b, size=32, cache=kmalloc-32 [ 22.027888] [ 22.027941] allocated by task 304 on cpu 0 at 22.027098s (0.000840s ago): [ 22.028022] test_alloc+0x29c/0x628 [ 22.028062] test_double_free+0xd4/0x238 [ 22.028101] kunit_try_run_case+0x170/0x3f0 [ 22.028143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.028184] kthread+0x328/0x630 [ 22.028218] ret_from_fork+0x10/0x20 [ 22.028257] [ 22.028281] freed by task 304 on cpu 0 at 22.027170s (0.001108s ago): [ 22.028343] test_double_free+0x1ac/0x238 [ 22.028383] kunit_try_run_case+0x170/0x3f0 [ 22.028423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.028465] kthread+0x328/0x630 [ 22.028501] ret_from_fork+0x10/0x20 [ 22.028540] [ 22.028586] CPU: 0 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.028666] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.028695] Hardware name: linux,dummy-virt (DT) [ 22.028730] ================================================================== [ 22.131214] ================================================================== [ 22.131306] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 22.131306] [ 22.131366] Invalid free of 0x0000000067dadba1 (in kfence-#94): [ 22.131422] test_double_free+0x100/0x238 [ 22.131468] kunit_try_run_case+0x170/0x3f0 [ 22.131508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.131550] kthread+0x328/0x630 [ 22.131588] ret_from_fork+0x10/0x20 [ 22.131626] [ 22.131649] kfence-#94: 0x0000000067dadba1-0x000000001af14dd3, size=32, cache=test [ 22.131649] [ 22.131701] allocated by task 306 on cpu 0 at 22.131007s (0.000691s ago): [ 22.131763] test_alloc+0x230/0x628 [ 22.131802] test_double_free+0xd4/0x238 [ 22.131842] kunit_try_run_case+0x170/0x3f0 [ 22.131880] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.131924] kthread+0x328/0x630 [ 22.131958] ret_from_fork+0x10/0x20 [ 22.132010] [ 22.132035] freed by task 306 on cpu 0 at 22.131066s (0.000966s ago): [ 22.132095] test_double_free+0xf0/0x238 [ 22.132136] kunit_try_run_case+0x170/0x3f0 [ 22.132176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.132219] kthread+0x328/0x630 [ 22.132253] ret_from_fork+0x10/0x20 [ 22.132290] [ 22.132332] CPU: 0 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.132409] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.132439] Hardware name: linux,dummy-virt (DT) [ 22.132472] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 21.712429] ================================================================== [ 21.712510] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 21.712510] [ 21.712676] Use-after-free read at 0x0000000034c703aa (in kfence-#90): [ 21.712751] test_use_after_free_read+0x114/0x248 [ 21.712808] kunit_try_run_case+0x170/0x3f0 [ 21.713195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.713255] kthread+0x328/0x630 [ 21.713354] ret_from_fork+0x10/0x20 [ 21.713399] [ 21.713460] kfence-#90: 0x0000000034c703aa-0x0000000022d7428b, size=32, cache=test [ 21.713460] [ 21.713581] allocated by task 298 on cpu 1 at 21.711879s (0.001648s ago): [ 21.713685] test_alloc+0x230/0x628 [ 21.713744] test_use_after_free_read+0xd0/0x248 [ 21.713786] kunit_try_run_case+0x170/0x3f0 [ 21.714091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.714177] kthread+0x328/0x630 [ 21.714617] ret_from_fork+0x10/0x20 [ 21.714945] [ 21.714992] freed by task 298 on cpu 1 at 21.711972s (0.003014s ago): [ 21.715174] test_use_after_free_read+0xf0/0x248 [ 21.715334] kunit_try_run_case+0x170/0x3f0 [ 21.715397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.715463] kthread+0x328/0x630 [ 21.715539] ret_from_fork+0x10/0x20 [ 21.715723] [ 21.715790] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 21.715878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.715908] Hardware name: linux,dummy-virt (DT) [ 21.715950] ================================================================== [ 21.605067] ================================================================== [ 21.605177] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 21.605177] [ 21.605270] Use-after-free read at 0x000000006d6fb5eb (in kfence-#89): [ 21.605322] test_use_after_free_read+0x114/0x248 [ 21.605369] kunit_try_run_case+0x170/0x3f0 [ 21.605469] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.605530] kthread+0x328/0x630 [ 21.605570] ret_from_fork+0x10/0x20 [ 21.605608] [ 21.605641] kfence-#89: 0x000000006d6fb5eb-0x00000000c4ebda01, size=32, cache=kmalloc-32 [ 21.605641] [ 21.606405] allocated by task 296 on cpu 1 at 21.604377s (0.001984s ago): [ 21.606485] test_alloc+0x29c/0x628 [ 21.606634] test_use_after_free_read+0xd0/0x248 [ 21.606741] kunit_try_run_case+0x170/0x3f0 [ 21.607219] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.607311] kthread+0x328/0x630 [ 21.607495] ret_from_fork+0x10/0x20 [ 21.607560] [ 21.607587] freed by task 296 on cpu 1 at 21.604448s (0.003135s ago): [ 21.607682] test_use_after_free_read+0x1c0/0x248 [ 21.608110] kunit_try_run_case+0x170/0x3f0 [ 21.608232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.608373] kthread+0x328/0x630 [ 21.608534] ret_from_fork+0x10/0x20 [ 21.608580] [ 21.608629] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 21.608749] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.609090] Hardware name: linux,dummy-virt (DT) [ 21.609198] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 21.501348] ================================================================== [ 21.501426] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 21.501426] [ 21.501508] Out-of-bounds write at 0x00000000e80c0767 (1B left of kfence-#88): [ 21.501741] test_out_of_bounds_write+0x100/0x240 [ 21.501817] kunit_try_run_case+0x170/0x3f0 [ 21.501864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.501909] kthread+0x328/0x630 [ 21.501947] ret_from_fork+0x10/0x20 [ 21.501998] [ 21.502023] kfence-#88: 0x00000000834f5000-0x00000000e791c5cd, size=32, cache=test [ 21.502023] [ 21.502540] allocated by task 294 on cpu 1 at 21.501266s (0.000806s ago): [ 21.503243] test_alloc+0x230/0x628 [ 21.503343] test_out_of_bounds_write+0xc8/0x240 [ 21.503439] kunit_try_run_case+0x170/0x3f0 [ 21.503630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.503744] kthread+0x328/0x630 [ 21.503925] ret_from_fork+0x10/0x20 [ 21.504056] [ 21.504108] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 21.504518] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.504649] Hardware name: linux,dummy-virt (DT) [ 21.504736] ================================================================== [ 21.395263] ================================================================== [ 21.395317] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 21.395317] [ 21.395483] Out-of-bounds write at 0x00000000969e6833 (1B left of kfence-#87): [ 21.395634] test_out_of_bounds_write+0x100/0x240 [ 21.395777] kunit_try_run_case+0x170/0x3f0 [ 21.395918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.396090] kthread+0x328/0x630 [ 21.396197] ret_from_fork+0x10/0x20 [ 21.396352] [ 21.396378] kfence-#87: 0x00000000a9ce361d-0x00000000081d47db, size=32, cache=kmalloc-32 [ 21.396378] [ 21.396771] allocated by task 292 on cpu 1 at 21.395140s (0.001618s ago): [ 21.397018] test_alloc+0x29c/0x628 [ 21.397098] test_out_of_bounds_write+0xc8/0x240 [ 21.397141] kunit_try_run_case+0x170/0x3f0 [ 21.397182] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.397228] kthread+0x328/0x630 [ 21.397264] ret_from_fork+0x10/0x20 [ 21.397303] [ 21.397346] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 21.397480] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.397581] Hardware name: linux,dummy-virt (DT) [ 21.397670] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 20.652922] ================================================================== [ 20.653015] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 20.653015] [ 20.653114] Out-of-bounds read at 0x00000000f0f6ae81 (32B right of kfence-#80): [ 20.653186] test_out_of_bounds_read+0x1c8/0x3e0 [ 20.653235] kunit_try_run_case+0x170/0x3f0 [ 20.653586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.653673] kthread+0x328/0x630 [ 20.653714] ret_from_fork+0x10/0x20 [ 20.654130] [ 20.654318] kfence-#80: 0x00000000337b69bc-0x00000000ca4ddb6b, size=32, cache=kmalloc-32 [ 20.654318] [ 20.654396] allocated by task 288 on cpu 1 at 20.652666s (0.001712s ago): [ 20.654492] test_alloc+0x29c/0x628 [ 20.654533] test_out_of_bounds_read+0x198/0x3e0 [ 20.654580] kunit_try_run_case+0x170/0x3f0 [ 20.654751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.655137] kthread+0x328/0x630 [ 20.655303] ret_from_fork+0x10/0x20 [ 20.655346] [ 20.655698] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 20.655942] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.655973] Hardware name: linux,dummy-virt (DT) [ 20.656075] ================================================================== [ 20.760141] ================================================================== [ 20.760343] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 20.760343] [ 20.760424] Out-of-bounds read at 0x00000000c59cc4ab (1B left of kfence-#81): [ 20.760481] test_out_of_bounds_read+0x114/0x3e0 [ 20.760526] kunit_try_run_case+0x170/0x3f0 [ 20.760570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.760613] kthread+0x328/0x630 [ 20.760660] ret_from_fork+0x10/0x20 [ 20.760856] [ 20.760892] kfence-#81: 0x00000000ebb73be9-0x000000006505a437, size=32, cache=test [ 20.760892] [ 20.761351] allocated by task 290 on cpu 1 at 20.759944s (0.001351s ago): [ 20.762165] test_alloc+0x230/0x628 [ 20.762486] test_out_of_bounds_read+0xdc/0x3e0 [ 20.762589] kunit_try_run_case+0x170/0x3f0 [ 20.762926] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.762985] kthread+0x328/0x630 [ 20.763021] ret_from_fork+0x10/0x20 [ 20.763060] [ 20.763337] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 20.763502] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.763531] Hardware name: linux,dummy-virt (DT) [ 20.763584] ================================================================== [ 21.288797] ================================================================== [ 21.288910] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 21.288910] [ 21.289062] Out-of-bounds read at 0x000000004dfdaab0 (32B right of kfence-#86): [ 21.289120] test_out_of_bounds_read+0x1c8/0x3e0 [ 21.289168] kunit_try_run_case+0x170/0x3f0 [ 21.289212] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.289258] kthread+0x328/0x630 [ 21.289295] ret_from_fork+0x10/0x20 [ 21.289684] [ 21.289758] kfence-#86: 0x000000002b2ded71-0x000000001feb644a, size=32, cache=test [ 21.289758] [ 21.290354] allocated by task 290 on cpu 1 at 21.288293s (0.001951s ago): [ 21.290444] test_alloc+0x230/0x628 [ 21.290486] test_out_of_bounds_read+0x198/0x3e0 [ 21.290580] kunit_try_run_case+0x170/0x3f0 [ 21.290673] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.290854] kthread+0x328/0x630 [ 21.290892] ret_from_fork+0x10/0x20 [ 21.290962] [ 21.291400] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 21.291600] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.291635] Hardware name: linux,dummy-virt (DT) [ 21.291945] ================================================================== [ 20.552191] ================================================================== [ 20.552572] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 20.552572] [ 20.552922] Out-of-bounds read at 0x00000000f125e9f0 (1B left of kfence-#79): [ 20.553060] test_out_of_bounds_read+0x114/0x3e0 [ 20.553114] kunit_try_run_case+0x170/0x3f0 [ 20.553355] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.553576] kthread+0x328/0x630 [ 20.553655] ret_from_fork+0x10/0x20 [ 20.553809] [ 20.553835] kfence-#79: 0x00000000f252a979-0x00000000db7c753c, size=32, cache=kmalloc-32 [ 20.553835] [ 20.553895] allocated by task 288 on cpu 1 at 20.551139s (0.002747s ago): [ 20.554279] test_alloc+0x29c/0x628 [ 20.554396] test_out_of_bounds_read+0xdc/0x3e0 [ 20.554584] kunit_try_run_case+0x170/0x3f0 [ 20.554733] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.554869] kthread+0x328/0x630 [ 20.554905] ret_from_fork+0x10/0x20 [ 20.554966] [ 20.555268] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 20.555364] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.555392] Hardware name: linux,dummy-virt (DT) [ 20.555427] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-kmalloc_oob_16
[ 16.859689] ================================================================== [ 16.859762] BUG: KFENCE: memory corruption in kmalloc_oob_16+0x1f0/0x3f8 [ 16.859762] [ 16.859819] Corrupted memory at 0x000000009dbacbd7 [ ! ! ! . . . . . . . . . . . . . ] (in kfence-#52): [ 16.863032] kmalloc_oob_16+0x1f0/0x3f8 [ 16.863223] kunit_try_run_case+0x170/0x3f0 [ 16.863266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.863308] kthread+0x328/0x630 [ 16.863340] ret_from_fork+0x10/0x20 [ 16.863383] [ 16.864161] kfence-#52: 0x0000000087ffd4b9-0x00000000f9e28ecd, size=13, cache=kmalloc-16 [ 16.864161] [ 16.865195] allocated by task 167 on cpu 0 at 16.856258s (0.008839s ago): [ 16.865429] kmalloc_oob_16+0xb4/0x3f8 [ 16.865531] kunit_try_run_case+0x170/0x3f0 [ 16.865570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.865861] kthread+0x328/0x630 [ 16.865971] ret_from_fork+0x10/0x20 [ 16.866075] [ 16.866506] freed by task 167 on cpu 0 at 16.858253s (0.007886s ago): [ 16.866748] kmalloc_oob_16+0x1f0/0x3f8 [ 16.866792] kunit_try_run_case+0x170/0x3f0 [ 16.866852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.866895] kthread+0x328/0x630 [ 16.867155] ret_from_fork+0x10/0x20 [ 16.867219] [ 16.867426] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.867759] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.868102] Hardware name: linux,dummy-virt (DT) [ 16.868154] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 20.264870] ================================================================== [ 20.266404] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 20.266512] Write of size 1 at addr fff00000c77ac378 by task kunit_try_catch/286 [ 20.266563] [ 20.266600] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 20.267224] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.267263] Hardware name: linux,dummy-virt (DT) [ 20.267324] Call trace: [ 20.267348] show_stack+0x20/0x38 (C) [ 20.267399] dump_stack_lvl+0x8c/0xd0 [ 20.267657] print_report+0x118/0x608 [ 20.267942] kasan_report+0xdc/0x128 [ 20.268262] __asan_report_store1_noabort+0x20/0x30 [ 20.268484] strncpy_from_user+0x270/0x2a0 [ 20.268544] copy_user_test_oob+0x5c0/0xec8 [ 20.268855] kunit_try_run_case+0x170/0x3f0 [ 20.268938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.269125] kthread+0x328/0x630 [ 20.269265] ret_from_fork+0x10/0x20 [ 20.269593] [ 20.269626] Allocated by task 286: [ 20.269658] kasan_save_stack+0x3c/0x68 [ 20.270177] kasan_save_track+0x20/0x40 [ 20.270442] kasan_save_alloc_info+0x40/0x58 [ 20.270508] __kasan_kmalloc+0xd4/0xd8 [ 20.270549] __kmalloc_noprof+0x198/0x4c8 [ 20.271043] kunit_kmalloc_array+0x34/0x88 [ 20.271100] copy_user_test_oob+0xac/0xec8 [ 20.271142] kunit_try_run_case+0x170/0x3f0 [ 20.271182] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.271227] kthread+0x328/0x630 [ 20.271261] ret_from_fork+0x10/0x20 [ 20.271998] [ 20.272185] The buggy address belongs to the object at fff00000c77ac300 [ 20.272185] which belongs to the cache kmalloc-128 of size 128 [ 20.272349] The buggy address is located 0 bytes to the right of [ 20.272349] allocated 120-byte region [fff00000c77ac300, fff00000c77ac378) [ 20.272539] [ 20.272658] The buggy address belongs to the physical page: [ 20.272869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac [ 20.273161] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.273736] page_type: f5(slab) [ 20.273937] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.274039] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.274420] page dumped because: kasan: bad access detected [ 20.274496] [ 20.274562] Memory state around the buggy address: [ 20.274937] fff00000c77ac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.275205] fff00000c77ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.275347] >fff00000c77ac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.275393] ^ [ 20.275578] fff00000c77ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.275866] fff00000c77ac400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.276125] ================================================================== [ 20.254544] ================================================================== [ 20.254995] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 20.255341] Write of size 121 at addr fff00000c77ac300 by task kunit_try_catch/286 [ 20.255397] [ 20.255429] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 20.256056] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.256685] Hardware name: linux,dummy-virt (DT) [ 20.256913] Call trace: [ 20.256939] show_stack+0x20/0x38 (C) [ 20.257151] dump_stack_lvl+0x8c/0xd0 [ 20.257388] print_report+0x118/0x608 [ 20.257437] kasan_report+0xdc/0x128 [ 20.257484] kasan_check_range+0x100/0x1a8 [ 20.257532] __kasan_check_write+0x20/0x30 [ 20.257578] strncpy_from_user+0x3c/0x2a0 [ 20.258084] copy_user_test_oob+0x5c0/0xec8 [ 20.258161] kunit_try_run_case+0x170/0x3f0 [ 20.258215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.258270] kthread+0x328/0x630 [ 20.258571] ret_from_fork+0x10/0x20 [ 20.258695] [ 20.258716] Allocated by task 286: [ 20.258906] kasan_save_stack+0x3c/0x68 [ 20.258956] kasan_save_track+0x20/0x40 [ 20.259121] kasan_save_alloc_info+0x40/0x58 [ 20.259199] __kasan_kmalloc+0xd4/0xd8 [ 20.259241] __kmalloc_noprof+0x198/0x4c8 [ 20.259280] kunit_kmalloc_array+0x34/0x88 [ 20.259319] copy_user_test_oob+0xac/0xec8 [ 20.259499] kunit_try_run_case+0x170/0x3f0 [ 20.259939] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.260189] kthread+0x328/0x630 [ 20.260224] ret_from_fork+0x10/0x20 [ 20.260262] [ 20.260489] The buggy address belongs to the object at fff00000c77ac300 [ 20.260489] which belongs to the cache kmalloc-128 of size 128 [ 20.260777] The buggy address is located 0 bytes inside of [ 20.260777] allocated 120-byte region [fff00000c77ac300, fff00000c77ac378) [ 20.260912] [ 20.261063] The buggy address belongs to the physical page: [ 20.261120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac [ 20.261405] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.261630] page_type: f5(slab) [ 20.261673] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.261726] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.262047] page dumped because: kasan: bad access detected [ 20.262240] [ 20.262296] Memory state around the buggy address: [ 20.262656] fff00000c77ac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.262724] fff00000c77ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.262854] >fff00000c77ac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.263064] ^ [ 20.263120] fff00000c77ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.263175] fff00000c77ac400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.263598] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 20.223415] ================================================================== [ 20.223473] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 20.223526] Read of size 121 at addr fff00000c77ac300 by task kunit_try_catch/286 [ 20.223578] [ 20.223614] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 20.225209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.225255] Hardware name: linux,dummy-virt (DT) [ 20.225288] Call trace: [ 20.225348] show_stack+0x20/0x38 (C) [ 20.225612] dump_stack_lvl+0x8c/0xd0 [ 20.225669] print_report+0x118/0x608 [ 20.225718] kasan_report+0xdc/0x128 [ 20.225762] kasan_check_range+0x100/0x1a8 [ 20.225811] __kasan_check_read+0x20/0x30 [ 20.226143] copy_user_test_oob+0x3c8/0xec8 [ 20.226206] kunit_try_run_case+0x170/0x3f0 [ 20.226701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.226913] kthread+0x328/0x630 [ 20.226960] ret_from_fork+0x10/0x20 [ 20.227023] [ 20.227044] Allocated by task 286: [ 20.227592] kasan_save_stack+0x3c/0x68 [ 20.227659] kasan_save_track+0x20/0x40 [ 20.227699] kasan_save_alloc_info+0x40/0x58 [ 20.227749] __kasan_kmalloc+0xd4/0xd8 [ 20.227929] __kmalloc_noprof+0x198/0x4c8 [ 20.228299] kunit_kmalloc_array+0x34/0x88 [ 20.228408] copy_user_test_oob+0xac/0xec8 [ 20.228742] kunit_try_run_case+0x170/0x3f0 [ 20.229194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.229440] kthread+0x328/0x630 [ 20.229482] ret_from_fork+0x10/0x20 [ 20.229521] [ 20.229543] The buggy address belongs to the object at fff00000c77ac300 [ 20.229543] which belongs to the cache kmalloc-128 of size 128 [ 20.229656] The buggy address is located 0 bytes inside of [ 20.229656] allocated 120-byte region [fff00000c77ac300, fff00000c77ac378) [ 20.230089] [ 20.230321] The buggy address belongs to the physical page: [ 20.230569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac [ 20.230695] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.230748] page_type: f5(slab) [ 20.230962] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.231038] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.231084] page dumped because: kasan: bad access detected [ 20.231194] [ 20.231359] Memory state around the buggy address: [ 20.231400] fff00000c77ac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.231470] fff00000c77ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.231858] >fff00000c77ac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.232060] ^ [ 20.232121] fff00000c77ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.232206] fff00000c77ac400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.232248] ================================================================== [ 20.243668] ================================================================== [ 20.243722] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 20.243773] Read of size 121 at addr fff00000c77ac300 by task kunit_try_catch/286 [ 20.243827] [ 20.243859] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 20.244674] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.244730] Hardware name: linux,dummy-virt (DT) [ 20.244952] Call trace: [ 20.244987] show_stack+0x20/0x38 (C) [ 20.245268] dump_stack_lvl+0x8c/0xd0 [ 20.245439] print_report+0x118/0x608 [ 20.245734] kasan_report+0xdc/0x128 [ 20.245791] kasan_check_range+0x100/0x1a8 [ 20.245922] __kasan_check_read+0x20/0x30 [ 20.246132] copy_user_test_oob+0x4a0/0xec8 [ 20.246184] kunit_try_run_case+0x170/0x3f0 [ 20.246513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.246568] kthread+0x328/0x630 [ 20.246851] ret_from_fork+0x10/0x20 [ 20.247340] [ 20.247448] Allocated by task 286: [ 20.247491] kasan_save_stack+0x3c/0x68 [ 20.247535] kasan_save_track+0x20/0x40 [ 20.247575] kasan_save_alloc_info+0x40/0x58 [ 20.247624] __kasan_kmalloc+0xd4/0xd8 [ 20.247663] __kmalloc_noprof+0x198/0x4c8 [ 20.247937] kunit_kmalloc_array+0x34/0x88 [ 20.247991] copy_user_test_oob+0xac/0xec8 [ 20.248608] kunit_try_run_case+0x170/0x3f0 [ 20.248895] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.249284] kthread+0x328/0x630 [ 20.249323] ret_from_fork+0x10/0x20 [ 20.249362] [ 20.249763] The buggy address belongs to the object at fff00000c77ac300 [ 20.249763] which belongs to the cache kmalloc-128 of size 128 [ 20.250036] The buggy address is located 0 bytes inside of [ 20.250036] allocated 120-byte region [fff00000c77ac300, fff00000c77ac378) [ 20.250106] [ 20.250129] The buggy address belongs to the physical page: [ 20.250160] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac [ 20.250220] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.250382] page_type: f5(slab) [ 20.250644] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.250994] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.251042] page dumped because: kasan: bad access detected [ 20.251076] [ 20.251096] Memory state around the buggy address: [ 20.251341] fff00000c77ac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.251601] fff00000c77ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.251854] >fff00000c77ac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.251900] ^ [ 20.252479] fff00000c77ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.252814] fff00000c77ac400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.252861] ================================================================== [ 20.234572] ================================================================== [ 20.234669] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 20.234723] Write of size 121 at addr fff00000c77ac300 by task kunit_try_catch/286 [ 20.234777] [ 20.234814] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 20.234895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.234924] Hardware name: linux,dummy-virt (DT) [ 20.234987] Call trace: [ 20.235013] show_stack+0x20/0x38 (C) [ 20.235295] dump_stack_lvl+0x8c/0xd0 [ 20.235359] print_report+0x118/0x608 [ 20.235408] kasan_report+0xdc/0x128 [ 20.235493] kasan_check_range+0x100/0x1a8 [ 20.235602] __kasan_check_write+0x20/0x30 [ 20.235670] copy_user_test_oob+0x434/0xec8 [ 20.236336] kunit_try_run_case+0x170/0x3f0 [ 20.236395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.236778] kthread+0x328/0x630 [ 20.237016] ret_from_fork+0x10/0x20 [ 20.237070] [ 20.237091] Allocated by task 286: [ 20.237484] kasan_save_stack+0x3c/0x68 [ 20.237541] kasan_save_track+0x20/0x40 [ 20.237582] kasan_save_alloc_info+0x40/0x58 [ 20.237649] __kasan_kmalloc+0xd4/0xd8 [ 20.237688] __kmalloc_noprof+0x198/0x4c8 [ 20.237726] kunit_kmalloc_array+0x34/0x88 [ 20.237765] copy_user_test_oob+0xac/0xec8 [ 20.238250] kunit_try_run_case+0x170/0x3f0 [ 20.238490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.238631] kthread+0x328/0x630 [ 20.238669] ret_from_fork+0x10/0x20 [ 20.238708] [ 20.238729] The buggy address belongs to the object at fff00000c77ac300 [ 20.238729] which belongs to the cache kmalloc-128 of size 128 [ 20.238933] The buggy address is located 0 bytes inside of [ 20.238933] allocated 120-byte region [fff00000c77ac300, fff00000c77ac378) [ 20.239010] [ 20.239033] The buggy address belongs to the physical page: [ 20.239174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac [ 20.239615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.239676] page_type: f5(slab) [ 20.239716] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.239768] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.240140] page dumped because: kasan: bad access detected [ 20.240183] [ 20.240203] Memory state around the buggy address: [ 20.240241] fff00000c77ac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.240507] fff00000c77ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.240860] >fff00000c77ac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.240967] ^ [ 20.241190] fff00000c77ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.241236] fff00000c77ac400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.241277] ================================================================== [ 20.168789] ================================================================== [ 20.168892] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 20.169714] Write of size 121 at addr fff00000c77ac300 by task kunit_try_catch/286 [ 20.170319] [ 20.170385] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 20.170824] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.171223] Hardware name: linux,dummy-virt (DT) [ 20.171264] Call trace: [ 20.171303] show_stack+0x20/0x38 (C) [ 20.171920] dump_stack_lvl+0x8c/0xd0 [ 20.172002] print_report+0x118/0x608 [ 20.172280] kasan_report+0xdc/0x128 [ 20.172469] kasan_check_range+0x100/0x1a8 [ 20.172639] __kasan_check_write+0x20/0x30 [ 20.172724] copy_user_test_oob+0x234/0xec8 [ 20.172970] kunit_try_run_case+0x170/0x3f0 [ 20.173060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.173358] kthread+0x328/0x630 [ 20.173410] ret_from_fork+0x10/0x20 [ 20.173683] [ 20.173745] Allocated by task 286: [ 20.173810] kasan_save_stack+0x3c/0x68 [ 20.174222] kasan_save_track+0x20/0x40 [ 20.174281] kasan_save_alloc_info+0x40/0x58 [ 20.174997] __kasan_kmalloc+0xd4/0xd8 [ 20.175054] __kmalloc_noprof+0x198/0x4c8 [ 20.175098] kunit_kmalloc_array+0x34/0x88 [ 20.177221] copy_user_test_oob+0xac/0xec8 [ 20.177320] kunit_try_run_case+0x170/0x3f0 [ 20.177373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.177555] kthread+0x328/0x630 [ 20.177941] ret_from_fork+0x10/0x20 [ 20.178002] [ 20.178133] The buggy address belongs to the object at fff00000c77ac300 [ 20.178133] which belongs to the cache kmalloc-128 of size 128 [ 20.178521] The buggy address is located 0 bytes inside of [ 20.178521] allocated 120-byte region [fff00000c77ac300, fff00000c77ac378) [ 20.178719] [ 20.178747] The buggy address belongs to the physical page: [ 20.178996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac [ 20.179082] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.179177] page_type: f5(slab) [ 20.179246] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.179528] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.179574] page dumped because: kasan: bad access detected [ 20.179611] [ 20.179633] Memory state around the buggy address: [ 20.179671] fff00000c77ac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.179717] fff00000c77ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.179762] >fff00000c77ac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.179803] ^ [ 20.179845] fff00000c77ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.179890] fff00000c77ac400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.179932] ================================================================== [ 20.212527] ================================================================== [ 20.213091] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 20.213151] Write of size 121 at addr fff00000c77ac300 by task kunit_try_catch/286 [ 20.213204] [ 20.213765] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 20.213865] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.213893] Hardware name: linux,dummy-virt (DT) [ 20.214202] Call trace: [ 20.214503] show_stack+0x20/0x38 (C) [ 20.214830] dump_stack_lvl+0x8c/0xd0 [ 20.214879] print_report+0x118/0x608 [ 20.215073] kasan_report+0xdc/0x128 [ 20.215122] kasan_check_range+0x100/0x1a8 [ 20.215173] __kasan_check_write+0x20/0x30 [ 20.215390] copy_user_test_oob+0x35c/0xec8 [ 20.215967] kunit_try_run_case+0x170/0x3f0 [ 20.216039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.216518] kthread+0x328/0x630 [ 20.216564] ret_from_fork+0x10/0x20 [ 20.217021] [ 20.217048] Allocated by task 286: [ 20.217079] kasan_save_stack+0x3c/0x68 [ 20.217126] kasan_save_track+0x20/0x40 [ 20.217166] kasan_save_alloc_info+0x40/0x58 [ 20.217208] __kasan_kmalloc+0xd4/0xd8 [ 20.217725] __kmalloc_noprof+0x198/0x4c8 [ 20.217766] kunit_kmalloc_array+0x34/0x88 [ 20.217902] copy_user_test_oob+0xac/0xec8 [ 20.217941] kunit_try_run_case+0x170/0x3f0 [ 20.218458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.218508] kthread+0x328/0x630 [ 20.218541] ret_from_fork+0x10/0x20 [ 20.219159] [ 20.219189] The buggy address belongs to the object at fff00000c77ac300 [ 20.219189] which belongs to the cache kmalloc-128 of size 128 [ 20.219361] The buggy address is located 0 bytes inside of [ 20.219361] allocated 120-byte region [fff00000c77ac300, fff00000c77ac378) [ 20.219431] [ 20.219452] The buggy address belongs to the physical page: [ 20.219494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac [ 20.219553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.219972] page_type: f5(slab) [ 20.220034] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.220416] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.220464] page dumped because: kasan: bad access detected [ 20.220499] [ 20.220552] Memory state around the buggy address: [ 20.220664] fff00000c77ac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.220744] fff00000c77ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.221157] >fff00000c77ac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.221204] ^ [ 20.221249] fff00000c77ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.221472] fff00000c77ac400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.221821] ================================================================== [ 20.189854] ================================================================== [ 20.189916] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 20.191897] Read of size 121 at addr fff00000c77ac300 by task kunit_try_catch/286 [ 20.192051] [ 20.192092] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 20.192200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.192227] Hardware name: linux,dummy-virt (DT) [ 20.192259] Call trace: [ 20.192283] show_stack+0x20/0x38 (C) [ 20.192798] dump_stack_lvl+0x8c/0xd0 [ 20.192863] print_report+0x118/0x608 [ 20.192947] kasan_report+0xdc/0x128 [ 20.193424] kasan_check_range+0x100/0x1a8 [ 20.193806] __kasan_check_read+0x20/0x30 [ 20.193870] copy_user_test_oob+0x728/0xec8 [ 20.194187] kunit_try_run_case+0x170/0x3f0 [ 20.194308] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.194365] kthread+0x328/0x630 [ 20.194407] ret_from_fork+0x10/0x20 [ 20.194878] [ 20.194903] Allocated by task 286: [ 20.194934] kasan_save_stack+0x3c/0x68 [ 20.195165] kasan_save_track+0x20/0x40 [ 20.195440] kasan_save_alloc_info+0x40/0x58 [ 20.195867] __kasan_kmalloc+0xd4/0xd8 [ 20.195919] __kmalloc_noprof+0x198/0x4c8 [ 20.196075] kunit_kmalloc_array+0x34/0x88 [ 20.196151] copy_user_test_oob+0xac/0xec8 [ 20.196288] kunit_try_run_case+0x170/0x3f0 [ 20.196779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.197315] kthread+0x328/0x630 [ 20.197372] ret_from_fork+0x10/0x20 [ 20.197413] [ 20.197758] The buggy address belongs to the object at fff00000c77ac300 [ 20.197758] which belongs to the cache kmalloc-128 of size 128 [ 20.197918] The buggy address is located 0 bytes inside of [ 20.197918] allocated 120-byte region [fff00000c77ac300, fff00000c77ac378) [ 20.198001] [ 20.198129] The buggy address belongs to the physical page: [ 20.198164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac [ 20.198239] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.198903] page_type: f5(slab) [ 20.199070] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.199124] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.199372] page dumped because: kasan: bad access detected [ 20.199413] [ 20.199433] Memory state around the buggy address: [ 20.199602] fff00000c77ac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.199713] fff00000c77ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.199759] >fff00000c77ac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.200126] ^ [ 20.200518] fff00000c77ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.201032] fff00000c77ac400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.201528] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 20.069525] ================================================================== [ 20.069593] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 20.069673] Read of size 8 at addr fff00000c77ac278 by task kunit_try_catch/282 [ 20.077995] [ 20.078616] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 20.078715] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.079384] Hardware name: linux,dummy-virt (DT) [ 20.079748] Call trace: [ 20.079781] show_stack+0x20/0x38 (C) [ 20.080495] dump_stack_lvl+0x8c/0xd0 [ 20.080936] print_report+0x118/0x608 [ 20.080999] kasan_report+0xdc/0x128 [ 20.082528] __asan_report_load8_noabort+0x20/0x30 [ 20.082748] copy_to_kernel_nofault+0x204/0x250 [ 20.083022] copy_to_kernel_nofault_oob+0x158/0x418 [ 20.083204] kunit_try_run_case+0x170/0x3f0 [ 20.083259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.083313] kthread+0x328/0x630 [ 20.083946] ret_from_fork+0x10/0x20 [ 20.084828] [ 20.085961] Allocated by task 282: [ 20.086162] kasan_save_stack+0x3c/0x68 [ 20.086754] kasan_save_track+0x20/0x40 [ 20.087484] kasan_save_alloc_info+0x40/0x58 [ 20.087796] __kasan_kmalloc+0xd4/0xd8 [ 20.088433] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.088765] copy_to_kernel_nofault_oob+0xc8/0x418 [ 20.089125] kunit_try_run_case+0x170/0x3f0 [ 20.089172] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.089218] kthread+0x328/0x630 [ 20.090137] ret_from_fork+0x10/0x20 [ 20.090452] [ 20.090524] The buggy address belongs to the object at fff00000c77ac200 [ 20.090524] which belongs to the cache kmalloc-128 of size 128 [ 20.091015] The buggy address is located 0 bytes to the right of [ 20.091015] allocated 120-byte region [fff00000c77ac200, fff00000c77ac278) [ 20.091156] [ 20.091182] The buggy address belongs to the physical page: [ 20.091220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac [ 20.092461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.093009] page_type: f5(slab) [ 20.093465] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.093648] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.094037] page dumped because: kasan: bad access detected [ 20.094075] [ 20.094656] Memory state around the buggy address: [ 20.094862] fff00000c77ac100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.094912] fff00000c77ac180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.095115] >fff00000c77ac200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.095163] ^ [ 20.095208] fff00000c77ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.095253] fff00000c77ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.095296] ================================================================== [ 20.097777] ================================================================== [ 20.097838] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 20.097894] Write of size 8 at addr fff00000c77ac278 by task kunit_try_catch/282 [ 20.097947] [ 20.097995] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 20.098080] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.098109] Hardware name: linux,dummy-virt (DT) [ 20.099269] Call trace: [ 20.099311] show_stack+0x20/0x38 (C) [ 20.099435] dump_stack_lvl+0x8c/0xd0 [ 20.099489] print_report+0x118/0x608 [ 20.099536] kasan_report+0xdc/0x128 [ 20.099582] kasan_check_range+0x100/0x1a8 [ 20.099631] __kasan_check_write+0x20/0x30 [ 20.099727] copy_to_kernel_nofault+0x8c/0x250 [ 20.099787] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 20.100354] kunit_try_run_case+0x170/0x3f0 [ 20.101407] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.101717] kthread+0x328/0x630 [ 20.101950] ret_from_fork+0x10/0x20 [ 20.102232] [ 20.102256] Allocated by task 282: [ 20.102524] kasan_save_stack+0x3c/0x68 [ 20.102633] kasan_save_track+0x20/0x40 [ 20.102997] kasan_save_alloc_info+0x40/0x58 [ 20.103046] __kasan_kmalloc+0xd4/0xd8 [ 20.103085] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.103125] copy_to_kernel_nofault_oob+0xc8/0x418 [ 20.103169] kunit_try_run_case+0x170/0x3f0 [ 20.103869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.104133] kthread+0x328/0x630 [ 20.104298] ret_from_fork+0x10/0x20 [ 20.104338] [ 20.104620] The buggy address belongs to the object at fff00000c77ac200 [ 20.104620] which belongs to the cache kmalloc-128 of size 128 [ 20.104832] The buggy address is located 0 bytes to the right of [ 20.104832] allocated 120-byte region [fff00000c77ac200, fff00000c77ac278) [ 20.104901] [ 20.105249] The buggy address belongs to the physical page: [ 20.105290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac [ 20.106016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.106298] page_type: f5(slab) [ 20.106512] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.106573] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.106938] page dumped because: kasan: bad access detected [ 20.106995] [ 20.107328] Memory state around the buggy address: [ 20.107366] fff00000c77ac100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.107546] fff00000c77ac180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.107721] >fff00000c77ac200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.107814] ^ [ 20.107859] fff00000c77ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.107905] fff00000c77ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.107945] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 19.974320] ================================================================== [ 19.974446] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 19.974508] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/270 [ 19.974561] [ 19.974597] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.974681] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.974709] Hardware name: linux,dummy-virt (DT) [ 19.974780] Call trace: [ 19.974916] show_stack+0x20/0x38 (C) [ 19.975098] dump_stack_lvl+0x8c/0xd0 [ 19.975206] print_report+0x310/0x608 [ 19.975340] kasan_report+0xdc/0x128 [ 19.975424] __asan_report_load1_noabort+0x20/0x30 [ 19.975586] vmalloc_oob+0x578/0x5d0 [ 19.975734] kunit_try_run_case+0x170/0x3f0 [ 19.975816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.975873] kthread+0x328/0x630 [ 19.975932] ret_from_fork+0x10/0x20 [ 19.975991] [ 19.976019] The buggy address belongs to the virtual mapping at [ 19.976019] [ffff8000800fe000, ffff800080100000) created by: [ 19.976019] vmalloc_oob+0x98/0x5d0 [ 19.976283] [ 19.976310] The buggy address belongs to the physical page: [ 19.976346] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10785e [ 19.976435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.976530] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.976619] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.976731] page dumped because: kasan: bad access detected [ 19.976811] [ 19.976926] Memory state around the buggy address: [ 19.977056] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.977226] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.977442] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 19.977537] ^ [ 19.977690] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.977773] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.977926] ================================================================== [ 19.979151] ================================================================== [ 19.979214] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 19.979276] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/270 [ 19.979354] [ 19.979388] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.979496] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.979533] Hardware name: linux,dummy-virt (DT) [ 19.979615] Call trace: [ 19.979641] show_stack+0x20/0x38 (C) [ 19.979689] dump_stack_lvl+0x8c/0xd0 [ 19.979735] print_report+0x310/0x608 [ 19.979784] kasan_report+0xdc/0x128 [ 19.979829] __asan_report_load1_noabort+0x20/0x30 [ 19.979881] vmalloc_oob+0x51c/0x5d0 [ 19.980236] kunit_try_run_case+0x170/0x3f0 [ 19.980321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.980437] kthread+0x328/0x630 [ 19.980509] ret_from_fork+0x10/0x20 [ 19.980611] [ 19.980645] The buggy address belongs to the virtual mapping at [ 19.980645] [ffff8000800fe000, ffff800080100000) created by: [ 19.980645] vmalloc_oob+0x98/0x5d0 [ 19.980721] [ 19.980851] The buggy address belongs to the physical page: [ 19.980925] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10785e [ 19.980999] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.981137] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.981225] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.981293] page dumped because: kasan: bad access detected [ 19.981327] [ 19.981358] Memory state around the buggy address: [ 19.981403] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.981462] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.981506] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 19.981546] ^ [ 19.981589] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.981635] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.981677] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 19.846855] ================================================================== [ 19.846900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 19.846949] Read of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.847015] [ 19.847045] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.847128] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.847155] Hardware name: linux,dummy-virt (DT) [ 19.847188] Call trace: [ 19.847220] show_stack+0x20/0x38 (C) [ 19.847268] dump_stack_lvl+0x8c/0xd0 [ 19.847352] print_report+0x118/0x608 [ 19.847401] kasan_report+0xdc/0x128 [ 19.848439] __asan_report_load8_noabort+0x20/0x30 [ 19.848508] kasan_atomics_helper+0x3f04/0x4858 [ 19.848566] kasan_atomics+0x198/0x2e0 [ 19.848847] kunit_try_run_case+0x170/0x3f0 [ 19.849014] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.849168] kthread+0x328/0x630 [ 19.849275] ret_from_fork+0x10/0x20 [ 19.849396] [ 19.849415] Allocated by task 266: [ 19.849443] kasan_save_stack+0x3c/0x68 [ 19.849486] kasan_save_track+0x20/0x40 [ 19.849523] kasan_save_alloc_info+0x40/0x58 [ 19.849565] __kasan_kmalloc+0xd4/0xd8 [ 19.849602] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.849648] kasan_atomics+0xb8/0x2e0 [ 19.849687] kunit_try_run_case+0x170/0x3f0 [ 19.849726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.849803] kthread+0x328/0x630 [ 19.849938] ret_from_fork+0x10/0x20 [ 19.849985] [ 19.850014] The buggy address belongs to the object at fff00000c77bfc80 [ 19.850014] which belongs to the cache kmalloc-64 of size 64 [ 19.850189] The buggy address is located 0 bytes to the right of [ 19.850189] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.850256] [ 19.850275] The buggy address belongs to the physical page: [ 19.850308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.850363] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.850419] page_type: f5(slab) [ 19.850613] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.850668] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.850711] page dumped because: kasan: bad access detected [ 19.850776] [ 19.850798] Memory state around the buggy address: [ 19.850833] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.850881] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.850930] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.850986] ^ [ 19.851019] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.851074] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.851226] ================================================================== [ 19.865358] ================================================================== [ 19.865409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 19.865458] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.865732] [ 19.865937] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.866393] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.866825] Hardware name: linux,dummy-virt (DT) [ 19.866866] Call trace: [ 19.866889] show_stack+0x20/0x38 (C) [ 19.867149] dump_stack_lvl+0x8c/0xd0 [ 19.867336] print_report+0x118/0x608 [ 19.867385] kasan_report+0xdc/0x128 [ 19.867463] kasan_check_range+0x100/0x1a8 [ 19.867594] __kasan_check_write+0x20/0x30 [ 19.867662] kasan_atomics_helper+0x15b4/0x4858 [ 19.867711] kasan_atomics+0x198/0x2e0 [ 19.867757] kunit_try_run_case+0x170/0x3f0 [ 19.867805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.868228] kthread+0x328/0x630 [ 19.868283] ret_from_fork+0x10/0x20 [ 19.868330] [ 19.868549] Allocated by task 266: [ 19.868586] kasan_save_stack+0x3c/0x68 [ 19.868654] kasan_save_track+0x20/0x40 [ 19.869006] kasan_save_alloc_info+0x40/0x58 [ 19.869320] __kasan_kmalloc+0xd4/0xd8 [ 19.869362] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.869403] kasan_atomics+0xb8/0x2e0 [ 19.869443] kunit_try_run_case+0x170/0x3f0 [ 19.869481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.869527] kthread+0x328/0x630 [ 19.870406] ret_from_fork+0x10/0x20 [ 19.870459] [ 19.870575] The buggy address belongs to the object at fff00000c77bfc80 [ 19.870575] which belongs to the cache kmalloc-64 of size 64 [ 19.870694] The buggy address is located 0 bytes to the right of [ 19.870694] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.871230] [ 19.871951] The buggy address belongs to the physical page: [ 19.872283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.872483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.873023] page_type: f5(slab) [ 19.873314] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.873381] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.873469] page dumped because: kasan: bad access detected [ 19.873591] [ 19.873789] Memory state around the buggy address: [ 19.873831] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.873878] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.874353] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.874628] ^ [ 19.874766] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.874816] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.875079] ================================================================== [ 19.819384] ================================================================== [ 19.819462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 19.819553] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.819744] [ 19.819781] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.819965] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.820083] Hardware name: linux,dummy-virt (DT) [ 19.820118] Call trace: [ 19.820169] show_stack+0x20/0x38 (C) [ 19.820222] dump_stack_lvl+0x8c/0xd0 [ 19.820298] print_report+0x118/0x608 [ 19.820371] kasan_report+0xdc/0x128 [ 19.820423] kasan_check_range+0x100/0x1a8 [ 19.820473] __kasan_check_write+0x20/0x30 [ 19.820529] kasan_atomics_helper+0x10c0/0x4858 [ 19.820880] kasan_atomics+0x198/0x2e0 [ 19.820944] kunit_try_run_case+0x170/0x3f0 [ 19.821005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.821059] kthread+0x328/0x630 [ 19.821101] ret_from_fork+0x10/0x20 [ 19.821148] [ 19.821169] Allocated by task 266: [ 19.821197] kasan_save_stack+0x3c/0x68 [ 19.821242] kasan_save_track+0x20/0x40 [ 19.821280] kasan_save_alloc_info+0x40/0x58 [ 19.822296] __kasan_kmalloc+0xd4/0xd8 [ 19.822371] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.822415] kasan_atomics+0xb8/0x2e0 [ 19.822459] kunit_try_run_case+0x170/0x3f0 [ 19.822521] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.822567] kthread+0x328/0x630 [ 19.822682] ret_from_fork+0x10/0x20 [ 19.822720] [ 19.822743] The buggy address belongs to the object at fff00000c77bfc80 [ 19.822743] which belongs to the cache kmalloc-64 of size 64 [ 19.822810] The buggy address is located 0 bytes to the right of [ 19.822810] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.823128] [ 19.823161] The buggy address belongs to the physical page: [ 19.823195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.823454] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.823567] page_type: f5(slab) [ 19.823605] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.823664] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.823755] page dumped because: kasan: bad access detected [ 19.823789] [ 19.823871] Memory state around the buggy address: [ 19.823997] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.824043] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.824088] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.824130] ^ [ 19.824162] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.824206] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.824247] ================================================================== [ 19.752598] ================================================================== [ 19.752653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 19.752703] Read of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.752755] [ 19.752787] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.752869] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.752898] Hardware name: linux,dummy-virt (DT) [ 19.752930] Call trace: [ 19.752953] show_stack+0x20/0x38 (C) [ 19.753016] dump_stack_lvl+0x8c/0xd0 [ 19.753079] print_report+0x118/0x608 [ 19.753128] kasan_report+0xdc/0x128 [ 19.753173] kasan_check_range+0x100/0x1a8 [ 19.753222] __kasan_check_read+0x20/0x30 [ 19.753267] kasan_atomics_helper+0xdd4/0x4858 [ 19.753314] kasan_atomics+0x198/0x2e0 [ 19.753360] kunit_try_run_case+0x170/0x3f0 [ 19.753406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.753459] kthread+0x328/0x630 [ 19.753510] ret_from_fork+0x10/0x20 [ 19.753559] [ 19.753588] Allocated by task 266: [ 19.753624] kasan_save_stack+0x3c/0x68 [ 19.753667] kasan_save_track+0x20/0x40 [ 19.753705] kasan_save_alloc_info+0x40/0x58 [ 19.753747] __kasan_kmalloc+0xd4/0xd8 [ 19.753785] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.753825] kasan_atomics+0xb8/0x2e0 [ 19.753870] kunit_try_run_case+0x170/0x3f0 [ 19.753910] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.753955] kthread+0x328/0x630 [ 19.754320] ret_from_fork+0x10/0x20 [ 19.754393] [ 19.754759] The buggy address belongs to the object at fff00000c77bfc80 [ 19.754759] which belongs to the cache kmalloc-64 of size 64 [ 19.754840] The buggy address is located 0 bytes to the right of [ 19.754840] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.754960] [ 19.755310] The buggy address belongs to the physical page: [ 19.755704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.756071] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.756388] page_type: f5(slab) [ 19.756596] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.756921] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.757114] page dumped because: kasan: bad access detected [ 19.757450] [ 19.757510] Memory state around the buggy address: [ 19.757659] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.757727] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.757935] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.758195] ^ [ 19.758436] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.759246] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.759393] ================================================================== [ 19.759804] ================================================================== [ 19.759854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 19.760229] Read of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.760497] [ 19.760685] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.760781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.760809] Hardware name: linux,dummy-virt (DT) [ 19.760843] Call trace: [ 19.760866] show_stack+0x20/0x38 (C) [ 19.761128] dump_stack_lvl+0x8c/0xd0 [ 19.761438] print_report+0x118/0x608 [ 19.761668] kasan_report+0xdc/0x128 [ 19.761913] __asan_report_load8_noabort+0x20/0x30 [ 19.762116] kasan_atomics_helper+0x3f58/0x4858 [ 19.762178] kasan_atomics+0x198/0x2e0 [ 19.762444] kunit_try_run_case+0x170/0x3f0 [ 19.762595] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.762838] kthread+0x328/0x630 [ 19.762893] ret_from_fork+0x10/0x20 [ 19.762946] [ 19.762966] Allocated by task 266: [ 19.763005] kasan_save_stack+0x3c/0x68 [ 19.763550] kasan_save_track+0x20/0x40 [ 19.763751] kasan_save_alloc_info+0x40/0x58 [ 19.764015] __kasan_kmalloc+0xd4/0xd8 [ 19.764323] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.764621] kasan_atomics+0xb8/0x2e0 [ 19.764812] kunit_try_run_case+0x170/0x3f0 [ 19.765041] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.765152] kthread+0x328/0x630 [ 19.765246] ret_from_fork+0x10/0x20 [ 19.765896] [ 19.765952] The buggy address belongs to the object at fff00000c77bfc80 [ 19.765952] which belongs to the cache kmalloc-64 of size 64 [ 19.766262] The buggy address is located 0 bytes to the right of [ 19.766262] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.766661] [ 19.766698] The buggy address belongs to the physical page: [ 19.766860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.767094] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.767187] page_type: f5(slab) [ 19.767553] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.767631] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.767862] page dumped because: kasan: bad access detected [ 19.768040] [ 19.768256] Memory state around the buggy address: [ 19.768302] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.768543] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.768668] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.769064] ^ [ 19.769573] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.769986] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.770077] ================================================================== [ 19.722331] ================================================================== [ 19.722400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 19.722454] Read of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.722515] [ 19.722549] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.723239] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.723315] Hardware name: linux,dummy-virt (DT) [ 19.723378] Call trace: [ 19.723531] show_stack+0x20/0x38 (C) [ 19.723673] dump_stack_lvl+0x8c/0xd0 [ 19.723737] print_report+0x118/0x608 [ 19.724143] kasan_report+0xdc/0x128 [ 19.724223] __asan_report_load4_noabort+0x20/0x30 [ 19.724466] kasan_atomics_helper+0x3dd8/0x4858 [ 19.724672] kasan_atomics+0x198/0x2e0 [ 19.724839] kunit_try_run_case+0x170/0x3f0 [ 19.725140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.725316] kthread+0x328/0x630 [ 19.725612] ret_from_fork+0x10/0x20 [ 19.726061] [ 19.726131] Allocated by task 266: [ 19.726208] kasan_save_stack+0x3c/0x68 [ 19.726278] kasan_save_track+0x20/0x40 [ 19.726318] kasan_save_alloc_info+0x40/0x58 [ 19.726910] __kasan_kmalloc+0xd4/0xd8 [ 19.727086] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.727240] kasan_atomics+0xb8/0x2e0 [ 19.727286] kunit_try_run_case+0x170/0x3f0 [ 19.727349] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.727715] kthread+0x328/0x630 [ 19.728105] ret_from_fork+0x10/0x20 [ 19.728176] [ 19.728382] The buggy address belongs to the object at fff00000c77bfc80 [ 19.728382] which belongs to the cache kmalloc-64 of size 64 [ 19.728486] The buggy address is located 0 bytes to the right of [ 19.728486] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.728743] [ 19.728836] The buggy address belongs to the physical page: [ 19.729213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.729280] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.729895] page_type: f5(slab) [ 19.730099] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.730334] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.730743] page dumped because: kasan: bad access detected [ 19.730811] [ 19.730949] Memory state around the buggy address: [ 19.731072] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.731327] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.731558] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.731625] ^ [ 19.731918] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.732045] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.732121] ================================================================== [ 19.923147] ================================================================== [ 19.923205] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 19.924462] Read of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.924534] [ 19.924571] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.924662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.924690] Hardware name: linux,dummy-virt (DT) [ 19.925133] Call trace: [ 19.925362] show_stack+0x20/0x38 (C) [ 19.925420] dump_stack_lvl+0x8c/0xd0 [ 19.925468] print_report+0x118/0x608 [ 19.926048] kasan_report+0xdc/0x128 [ 19.926118] __asan_report_load8_noabort+0x20/0x30 [ 19.926325] kasan_atomics_helper+0x3e10/0x4858 [ 19.926453] kasan_atomics+0x198/0x2e0 [ 19.926602] kunit_try_run_case+0x170/0x3f0 [ 19.926944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.927379] kthread+0x328/0x630 [ 19.927638] ret_from_fork+0x10/0x20 [ 19.927701] [ 19.927721] Allocated by task 266: [ 19.927758] kasan_save_stack+0x3c/0x68 [ 19.927894] kasan_save_track+0x20/0x40 [ 19.927986] kasan_save_alloc_info+0x40/0x58 [ 19.928046] __kasan_kmalloc+0xd4/0xd8 [ 19.928087] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.928528] kasan_atomics+0xb8/0x2e0 [ 19.928577] kunit_try_run_case+0x170/0x3f0 [ 19.928913] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.929259] kthread+0x328/0x630 [ 19.929458] ret_from_fork+0x10/0x20 [ 19.929498] [ 19.929765] The buggy address belongs to the object at fff00000c77bfc80 [ 19.929765] which belongs to the cache kmalloc-64 of size 64 [ 19.929834] The buggy address is located 0 bytes to the right of [ 19.929834] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.930120] [ 19.930147] The buggy address belongs to the physical page: [ 19.930183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.930387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.930439] page_type: f5(slab) [ 19.930479] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.930813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.930871] page dumped because: kasan: bad access detected [ 19.930992] [ 19.931016] Memory state around the buggy address: [ 19.931179] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.931430] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.931751] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.931800] ^ [ 19.931836] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.932098] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.932293] ================================================================== [ 19.950232] ================================================================== [ 19.950287] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 19.950337] Read of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.950388] [ 19.950421] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.953099] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.953131] Hardware name: linux,dummy-virt (DT) [ 19.953164] Call trace: [ 19.953189] show_stack+0x20/0x38 (C) [ 19.953240] dump_stack_lvl+0x8c/0xd0 [ 19.953291] print_report+0x118/0x608 [ 19.953337] kasan_report+0xdc/0x128 [ 19.953384] __asan_report_load8_noabort+0x20/0x30 [ 19.953436] kasan_atomics_helper+0x3e20/0x4858 [ 19.953484] kasan_atomics+0x198/0x2e0 [ 19.953531] kunit_try_run_case+0x170/0x3f0 [ 19.953578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.953637] kthread+0x328/0x630 [ 19.953680] ret_from_fork+0x10/0x20 [ 19.953727] [ 19.953747] Allocated by task 266: [ 19.953777] kasan_save_stack+0x3c/0x68 [ 19.953818] kasan_save_track+0x20/0x40 [ 19.953857] kasan_save_alloc_info+0x40/0x58 [ 19.953920] __kasan_kmalloc+0xd4/0xd8 [ 19.953996] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.954039] kasan_atomics+0xb8/0x2e0 [ 19.954075] kunit_try_run_case+0x170/0x3f0 [ 19.954114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.954157] kthread+0x328/0x630 [ 19.954193] ret_from_fork+0x10/0x20 [ 19.954239] [ 19.954268] The buggy address belongs to the object at fff00000c77bfc80 [ 19.954268] which belongs to the cache kmalloc-64 of size 64 [ 19.954336] The buggy address is located 0 bytes to the right of [ 19.954336] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.954414] [ 19.954451] The buggy address belongs to the physical page: [ 19.954491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.954545] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.954604] page_type: f5(slab) [ 19.954926] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.955214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.955375] page dumped because: kasan: bad access detected [ 19.955447] [ 19.955624] Memory state around the buggy address: [ 19.955824] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.955941] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.956074] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.956116] ^ [ 19.956150] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.956196] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.956236] ================================================================== [ 19.862241] ================================================================== [ 19.862287] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 19.862334] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.862384] [ 19.862413] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.862495] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.862521] Hardware name: linux,dummy-virt (DT) [ 19.862554] Call trace: [ 19.862575] show_stack+0x20/0x38 (C) [ 19.862634] dump_stack_lvl+0x8c/0xd0 [ 19.862681] print_report+0x118/0x608 [ 19.862727] kasan_report+0xdc/0x128 [ 19.862772] kasan_check_range+0x100/0x1a8 [ 19.862823] __kasan_check_write+0x20/0x30 [ 19.862868] kasan_atomics_helper+0x154c/0x4858 [ 19.862915] kasan_atomics+0x198/0x2e0 [ 19.862961] kunit_try_run_case+0x170/0x3f0 [ 19.863019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.863070] kthread+0x328/0x630 [ 19.863112] ret_from_fork+0x10/0x20 [ 19.863158] [ 19.863211] Allocated by task 266: [ 19.863245] kasan_save_stack+0x3c/0x68 [ 19.863286] kasan_save_track+0x20/0x40 [ 19.863325] kasan_save_alloc_info+0x40/0x58 [ 19.863367] __kasan_kmalloc+0xd4/0xd8 [ 19.863405] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.863493] kasan_atomics+0xb8/0x2e0 [ 19.863531] kunit_try_run_case+0x170/0x3f0 [ 19.863569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.863636] kthread+0x328/0x630 [ 19.863672] ret_from_fork+0x10/0x20 [ 19.863710] [ 19.863730] The buggy address belongs to the object at fff00000c77bfc80 [ 19.863730] which belongs to the cache kmalloc-64 of size 64 [ 19.863790] The buggy address is located 0 bytes to the right of [ 19.863790] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.863855] [ 19.863876] The buggy address belongs to the physical page: [ 19.863909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.863961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.864021] page_type: f5(slab) [ 19.864057] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.864110] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.864152] page dumped because: kasan: bad access detected [ 19.864186] [ 19.864205] Memory state around the buggy address: [ 19.864238] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.864283] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.864329] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.864370] ^ [ 19.864484] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.864582] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.864728] ================================================================== [ 19.883414] ================================================================== [ 19.883522] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 19.883571] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.883623] [ 19.883654] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.883737] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.883766] Hardware name: linux,dummy-virt (DT) [ 19.883797] Call trace: [ 19.883823] show_stack+0x20/0x38 (C) [ 19.883869] dump_stack_lvl+0x8c/0xd0 [ 19.884203] print_report+0x118/0x608 [ 19.884282] kasan_report+0xdc/0x128 [ 19.884937] kasan_check_range+0x100/0x1a8 [ 19.885209] __kasan_check_write+0x20/0x30 [ 19.885258] kasan_atomics_helper+0x1644/0x4858 [ 19.886714] kasan_atomics+0x198/0x2e0 [ 19.887216] kunit_try_run_case+0x170/0x3f0 [ 19.887410] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.887484] kthread+0x328/0x630 [ 19.887843] ret_from_fork+0x10/0x20 [ 19.888098] [ 19.888137] Allocated by task 266: [ 19.888283] kasan_save_stack+0x3c/0x68 [ 19.888601] kasan_save_track+0x20/0x40 [ 19.888644] kasan_save_alloc_info+0x40/0x58 [ 19.888846] __kasan_kmalloc+0xd4/0xd8 [ 19.888887] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.889440] kasan_atomics+0xb8/0x2e0 [ 19.889522] kunit_try_run_case+0x170/0x3f0 [ 19.889736] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.889852] kthread+0x328/0x630 [ 19.890061] ret_from_fork+0x10/0x20 [ 19.890501] [ 19.890599] The buggy address belongs to the object at fff00000c77bfc80 [ 19.890599] which belongs to the cache kmalloc-64 of size 64 [ 19.890671] The buggy address is located 0 bytes to the right of [ 19.890671] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.890739] [ 19.890760] The buggy address belongs to the physical page: [ 19.890795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.891373] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.891430] page_type: f5(slab) [ 19.891471] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.892257] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.892701] page dumped because: kasan: bad access detected [ 19.892941] [ 19.892963] Memory state around the buggy address: [ 19.893011] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.893060] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.893106] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.893829] ^ [ 19.894187] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.894237] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.894344] ================================================================== [ 19.827331] ================================================================== [ 19.827380] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 19.827492] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.827670] [ 19.827701] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.827791] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.828178] Hardware name: linux,dummy-virt (DT) [ 19.828251] Call trace: [ 19.828435] show_stack+0x20/0x38 (C) [ 19.828487] dump_stack_lvl+0x8c/0xd0 [ 19.828532] print_report+0x118/0x608 [ 19.828648] kasan_report+0xdc/0x128 [ 19.828718] kasan_check_range+0x100/0x1a8 [ 19.829106] __kasan_check_write+0x20/0x30 [ 19.829154] kasan_atomics_helper+0x1190/0x4858 [ 19.829201] kasan_atomics+0x198/0x2e0 [ 19.829328] kunit_try_run_case+0x170/0x3f0 [ 19.829538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.829804] kthread+0x328/0x630 [ 19.829854] ret_from_fork+0x10/0x20 [ 19.829958] [ 19.829987] Allocated by task 266: [ 19.830017] kasan_save_stack+0x3c/0x68 [ 19.830057] kasan_save_track+0x20/0x40 [ 19.830097] kasan_save_alloc_info+0x40/0x58 [ 19.830138] __kasan_kmalloc+0xd4/0xd8 [ 19.830175] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.830216] kasan_atomics+0xb8/0x2e0 [ 19.830251] kunit_try_run_case+0x170/0x3f0 [ 19.830292] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.830335] kthread+0x328/0x630 [ 19.830368] ret_from_fork+0x10/0x20 [ 19.830405] [ 19.830425] The buggy address belongs to the object at fff00000c77bfc80 [ 19.830425] which belongs to the cache kmalloc-64 of size 64 [ 19.830498] The buggy address is located 0 bytes to the right of [ 19.830498] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.830756] [ 19.830778] The buggy address belongs to the physical page: [ 19.830812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.830890] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.830939] page_type: f5(slab) [ 19.830986] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.831039] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.831081] page dumped because: kasan: bad access detected [ 19.831115] [ 19.831135] Memory state around the buggy address: [ 19.831174] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.831219] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.831265] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.831364] ^ [ 19.831588] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.831639] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.831753] ================================================================== [ 19.734107] ================================================================== [ 19.734466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 19.734849] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.735010] [ 19.735209] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.735346] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.735387] Hardware name: linux,dummy-virt (DT) [ 19.735426] Call trace: [ 19.735451] show_stack+0x20/0x38 (C) [ 19.735510] dump_stack_lvl+0x8c/0xd0 [ 19.735744] print_report+0x118/0x608 [ 19.735962] kasan_report+0xdc/0x128 [ 19.736234] kasan_check_range+0x100/0x1a8 [ 19.736484] __kasan_check_write+0x20/0x30 [ 19.736637] kasan_atomics_helper+0xd3c/0x4858 [ 19.736898] kasan_atomics+0x198/0x2e0 [ 19.736956] kunit_try_run_case+0x170/0x3f0 [ 19.737020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.737074] kthread+0x328/0x630 [ 19.737116] ret_from_fork+0x10/0x20 [ 19.737306] [ 19.737339] Allocated by task 266: [ 19.737395] kasan_save_stack+0x3c/0x68 [ 19.737443] kasan_save_track+0x20/0x40 [ 19.737484] kasan_save_alloc_info+0x40/0x58 [ 19.737528] __kasan_kmalloc+0xd4/0xd8 [ 19.737578] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.737646] kasan_atomics+0xb8/0x2e0 [ 19.737692] kunit_try_run_case+0x170/0x3f0 [ 19.737732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.737786] kthread+0x328/0x630 [ 19.737831] ret_from_fork+0x10/0x20 [ 19.737869] [ 19.737898] The buggy address belongs to the object at fff00000c77bfc80 [ 19.737898] which belongs to the cache kmalloc-64 of size 64 [ 19.737957] The buggy address is located 0 bytes to the right of [ 19.737957] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.738035] [ 19.738067] The buggy address belongs to the physical page: [ 19.738109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.738181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.738231] page_type: f5(slab) [ 19.738300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.738371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.738425] page dumped because: kasan: bad access detected [ 19.738471] [ 19.738501] Memory state around the buggy address: [ 19.738534] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.738579] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.738883] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.739184] ^ [ 19.739230] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.739278] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.739689] ================================================================== [ 19.648160] ================================================================== [ 19.648364] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 19.648418] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.648994] [ 19.649199] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.649421] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.649536] Hardware name: linux,dummy-virt (DT) [ 19.649717] Call trace: [ 19.649759] show_stack+0x20/0x38 (C) [ 19.649812] dump_stack_lvl+0x8c/0xd0 [ 19.650141] print_report+0x118/0x608 [ 19.650469] kasan_report+0xdc/0x128 [ 19.650539] kasan_check_range+0x100/0x1a8 [ 19.650591] __kasan_check_write+0x20/0x30 [ 19.650702] kasan_atomics_helper+0xa6c/0x4858 [ 19.650782] kasan_atomics+0x198/0x2e0 [ 19.650927] kunit_try_run_case+0x170/0x3f0 [ 19.650992] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.651341] kthread+0x328/0x630 [ 19.651509] ret_from_fork+0x10/0x20 [ 19.651598] [ 19.651812] Allocated by task 266: [ 19.651850] kasan_save_stack+0x3c/0x68 [ 19.651905] kasan_save_track+0x20/0x40 [ 19.651944] kasan_save_alloc_info+0x40/0x58 [ 19.651996] __kasan_kmalloc+0xd4/0xd8 [ 19.652034] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.652077] kasan_atomics+0xb8/0x2e0 [ 19.652114] kunit_try_run_case+0x170/0x3f0 [ 19.652155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.652200] kthread+0x328/0x630 [ 19.652235] ret_from_fork+0x10/0x20 [ 19.652274] [ 19.652294] The buggy address belongs to the object at fff00000c77bfc80 [ 19.652294] which belongs to the cache kmalloc-64 of size 64 [ 19.652354] The buggy address is located 0 bytes to the right of [ 19.652354] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.652421] [ 19.652441] The buggy address belongs to the physical page: [ 19.652474] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.652529] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.652578] page_type: f5(slab) [ 19.652617] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.652669] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.652711] page dumped because: kasan: bad access detected [ 19.652909] [ 19.652934] Memory state around the buggy address: [ 19.652971] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.653381] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.653541] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.653917] ^ [ 19.654096] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.654191] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.654233] ================================================================== [ 19.673254] ================================================================== [ 19.673578] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 19.673656] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.673709] [ 19.673745] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.674328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.674429] Hardware name: linux,dummy-virt (DT) [ 19.674490] Call trace: [ 19.674527] show_stack+0x20/0x38 (C) [ 19.674581] dump_stack_lvl+0x8c/0xd0 [ 19.674913] print_report+0x118/0x608 [ 19.674993] kasan_report+0xdc/0x128 [ 19.675448] kasan_check_range+0x100/0x1a8 [ 19.675610] __kasan_check_write+0x20/0x30 [ 19.675825] kasan_atomics_helper+0xb70/0x4858 [ 19.676061] kasan_atomics+0x198/0x2e0 [ 19.676183] kunit_try_run_case+0x170/0x3f0 [ 19.676270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.676340] kthread+0x328/0x630 [ 19.677335] ret_from_fork+0x10/0x20 [ 19.677434] [ 19.677488] Allocated by task 266: [ 19.677639] kasan_save_stack+0x3c/0x68 [ 19.677851] kasan_save_track+0x20/0x40 [ 19.677994] kasan_save_alloc_info+0x40/0x58 [ 19.678086] __kasan_kmalloc+0xd4/0xd8 [ 19.678186] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.678252] kasan_atomics+0xb8/0x2e0 [ 19.678358] kunit_try_run_case+0x170/0x3f0 [ 19.678434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.678628] kthread+0x328/0x630 [ 19.678824] ret_from_fork+0x10/0x20 [ 19.678894] [ 19.679161] The buggy address belongs to the object at fff00000c77bfc80 [ 19.679161] which belongs to the cache kmalloc-64 of size 64 [ 19.679246] The buggy address is located 0 bytes to the right of [ 19.679246] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.679446] [ 19.679474] The buggy address belongs to the physical page: [ 19.679508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.679720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.680035] page_type: f5(slab) [ 19.680462] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.680547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.680591] page dumped because: kasan: bad access detected [ 19.680778] [ 19.681304] Memory state around the buggy address: [ 19.681425] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.681543] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.681652] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.682106] ^ [ 19.682171] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.682236] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.682279] ================================================================== [ 19.639300] ================================================================== [ 19.639373] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 19.639444] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.639514] [ 19.639547] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.639631] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.640358] Hardware name: linux,dummy-virt (DT) [ 19.640412] Call trace: [ 19.640528] show_stack+0x20/0x38 (C) [ 19.640634] dump_stack_lvl+0x8c/0xd0 [ 19.640687] print_report+0x118/0x608 [ 19.640733] kasan_report+0xdc/0x128 [ 19.640926] kasan_check_range+0x100/0x1a8 [ 19.641154] __kasan_check_write+0x20/0x30 [ 19.641224] kasan_atomics_helper+0xa04/0x4858 [ 19.641542] kasan_atomics+0x198/0x2e0 [ 19.641645] kunit_try_run_case+0x170/0x3f0 [ 19.641697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.642175] kthread+0x328/0x630 [ 19.642287] ret_from_fork+0x10/0x20 [ 19.642352] [ 19.642372] Allocated by task 266: [ 19.642403] kasan_save_stack+0x3c/0x68 [ 19.642450] kasan_save_track+0x20/0x40 [ 19.642900] kasan_save_alloc_info+0x40/0x58 [ 19.643159] __kasan_kmalloc+0xd4/0xd8 [ 19.643296] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.643410] kasan_atomics+0xb8/0x2e0 [ 19.643452] kunit_try_run_case+0x170/0x3f0 [ 19.643611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.643829] kthread+0x328/0x630 [ 19.644048] ret_from_fork+0x10/0x20 [ 19.644107] [ 19.644397] The buggy address belongs to the object at fff00000c77bfc80 [ 19.644397] which belongs to the cache kmalloc-64 of size 64 [ 19.644523] The buggy address is located 0 bytes to the right of [ 19.644523] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.644593] [ 19.644636] The buggy address belongs to the physical page: [ 19.644679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.644754] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.644812] page_type: f5(slab) [ 19.644866] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.644919] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.644971] page dumped because: kasan: bad access detected [ 19.645040] [ 19.645094] Memory state around the buggy address: [ 19.645156] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.645636] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.645716] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.646001] ^ [ 19.646044] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.646479] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.646762] ================================================================== [ 19.839131] ================================================================== [ 19.839186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 19.839352] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.839474] [ 19.839504] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.839607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.839636] Hardware name: linux,dummy-virt (DT) [ 19.839666] Call trace: [ 19.839691] show_stack+0x20/0x38 (C) [ 19.839738] dump_stack_lvl+0x8c/0xd0 [ 19.839785] print_report+0x118/0x608 [ 19.839830] kasan_report+0xdc/0x128 [ 19.839876] kasan_check_range+0x100/0x1a8 [ 19.839945] __kasan_check_write+0x20/0x30 [ 19.840056] kasan_atomics_helper+0x12d8/0x4858 [ 19.840195] kasan_atomics+0x198/0x2e0 [ 19.840267] kunit_try_run_case+0x170/0x3f0 [ 19.840321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.840549] kthread+0x328/0x630 [ 19.840700] ret_from_fork+0x10/0x20 [ 19.840747] [ 19.840767] Allocated by task 266: [ 19.840795] kasan_save_stack+0x3c/0x68 [ 19.840837] kasan_save_track+0x20/0x40 [ 19.840874] kasan_save_alloc_info+0x40/0x58 [ 19.840916] __kasan_kmalloc+0xd4/0xd8 [ 19.840954] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.841001] kasan_atomics+0xb8/0x2e0 [ 19.841039] kunit_try_run_case+0x170/0x3f0 [ 19.841085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.841304] kthread+0x328/0x630 [ 19.841485] ret_from_fork+0x10/0x20 [ 19.841562] [ 19.841582] The buggy address belongs to the object at fff00000c77bfc80 [ 19.841582] which belongs to the cache kmalloc-64 of size 64 [ 19.841818] The buggy address is located 0 bytes to the right of [ 19.841818] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.842666] [ 19.842692] The buggy address belongs to the physical page: [ 19.842725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.842779] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.842828] page_type: f5(slab) [ 19.842866] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.842919] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.842961] page dumped because: kasan: bad access detected [ 19.843005] [ 19.843025] Memory state around the buggy address: [ 19.843059] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.843111] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.843156] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.843198] ^ [ 19.843230] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.843273] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.843312] ================================================================== [ 19.683299] ================================================================== [ 19.683587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 19.683894] Read of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.683963] [ 19.684010] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.684093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.684483] Hardware name: linux,dummy-virt (DT) [ 19.684537] Call trace: [ 19.684768] show_stack+0x20/0x38 (C) [ 19.684836] dump_stack_lvl+0x8c/0xd0 [ 19.685089] print_report+0x118/0x608 [ 19.685165] kasan_report+0xdc/0x128 [ 19.685417] __asan_report_load4_noabort+0x20/0x30 [ 19.685665] kasan_atomics_helper+0x3dbc/0x4858 [ 19.685819] kasan_atomics+0x198/0x2e0 [ 19.685872] kunit_try_run_case+0x170/0x3f0 [ 19.685956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.686027] kthread+0x328/0x630 [ 19.686071] ret_from_fork+0x10/0x20 [ 19.686326] [ 19.686631] Allocated by task 266: [ 19.686920] kasan_save_stack+0x3c/0x68 [ 19.687019] kasan_save_track+0x20/0x40 [ 19.687372] kasan_save_alloc_info+0x40/0x58 [ 19.687447] __kasan_kmalloc+0xd4/0xd8 [ 19.687606] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.687856] kasan_atomics+0xb8/0x2e0 [ 19.688038] kunit_try_run_case+0x170/0x3f0 [ 19.688259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.688440] kthread+0x328/0x630 [ 19.688517] ret_from_fork+0x10/0x20 [ 19.688865] [ 19.689173] The buggy address belongs to the object at fff00000c77bfc80 [ 19.689173] which belongs to the cache kmalloc-64 of size 64 [ 19.689726] The buggy address is located 0 bytes to the right of [ 19.689726] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.689906] [ 19.689987] The buggy address belongs to the physical page: [ 19.690064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.690225] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.690297] page_type: f5(slab) [ 19.690346] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.690418] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.690463] page dumped because: kasan: bad access detected [ 19.690495] [ 19.690523] Memory state around the buggy address: [ 19.690558] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.690612] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.690998] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.691182] ^ [ 19.691225] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.691271] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.691313] ================================================================== [ 19.600758] ================================================================== [ 19.600813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 19.600865] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.600918] [ 19.600950] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.601431] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.601715] Hardware name: linux,dummy-virt (DT) [ 19.601803] Call trace: [ 19.603030] kasan_check_range+0x100/0x1a8 [ 19.603500] kasan_atomics+0x198/0x2e0 [ 19.603664] kunit_try_run_case+0x170/0x3f0 [ 19.603721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.603777] kthread+0x328/0x630 [ 19.604323] [ 19.604752] kasan_save_stack+0x3c/0x68 [ 19.605219] kasan_save_alloc_info+0x40/0x58 [ 19.605859] kasan_atomics+0xb8/0x2e0 [ 19.606721] ret_from_fork+0x10/0x20 [ 19.607141] [ 19.607291] The buggy address belongs to the physical page: [ 19.607338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.607454] page_type: f5(slab) [ 19.607652] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.608021] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.608300] page dumped because: kasan: bad access detected [ 19.610579] [ 19.613585] __kasan_check_write+0x20/0x30 [ 19.616403] [ 19.617620] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.619337] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.620807] Call trace: [ 19.621912] kthread+0x328/0x630 [ 19.622759] ret_from_fork+0x10/0x20 [ 19.623311] [ 19.623380] The buggy address belongs to the physical page: [ 19.623473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.623571] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.623633] page_type: f5(slab) [ 19.623673] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.623876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.624149] page dumped because: kasan: bad access detected [ 19.624235] [ 19.624311] Memory state around the buggy address: [ 19.624435] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.624519] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.624592] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.625660] Read of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.626761] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.627238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.628126] [ 19.629317] dump_stack_lvl+0x8c/0xd0 [ 19.629518] print_report+0x118/0x608 [ 19.629639] kasan_report+0xdc/0x128 [ 19.629718] kasan_check_range+0x100/0x1a8 [ 19.630728] __kasan_check_write+0x20/0x30 [ 19.630796] kasan_atomics_helper+0x934/0x4858 [ 19.630847] kasan_atomics+0x198/0x2e0 [ 19.631076] kunit_try_run_case+0x170/0x3f0 [ 19.631161] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.631266] kthread+0x328/0x630 [ 19.631318] ret_from_fork+0x10/0x20 [ 19.631460] [ 19.631532] Allocated by task 266: [ 19.631612] kasan_save_stack+0x3c/0x68 [ 19.631722] kasan_save_track+0x20/0x40 [ 19.631763] kasan_save_alloc_info+0x40/0x58 [ 19.631814] __kasan_kmalloc+0xd4/0xd8 [ 19.631854] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.631893] kasan_atomics+0xb8/0x2e0 [ 19.632146] kunit_try_run_case+0x170/0x3f0 [ 19.632232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.632344] kthread+0x328/0x630 [ 19.632411] ret_from_fork+0x10/0x20 [ 19.632483] [ 19.632523] The buggy address belongs to the object at fff00000c77bfc80 [ 19.632523] which belongs to the cache kmalloc-64 of size 64 [ 19.632592] The buggy address is located 0 bytes to the right of [ 19.632592] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.632657] [ 19.632842] The buggy address belongs to the physical page: [ 19.632924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.633026] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.633074] page_type: f5(slab) [ 19.633131] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.633183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.633225] page dumped because: kasan: bad access detected [ 19.633450] [ 19.633521] Memory state around the buggy address: [ 19.633610] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.633674] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.633727] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.634141] ^ [ 19.634206] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.634269] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.634332] ================================================================== [ 19.855562] ================================================================== [ 19.855600] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 19.855645] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.855694] [ 19.855724] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.855805] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.855831] Hardware name: linux,dummy-virt (DT) [ 19.855864] Call trace: [ 19.855886] show_stack+0x20/0x38 (C) [ 19.855933] dump_stack_lvl+0x8c/0xd0 [ 19.855990] print_report+0x118/0x608 [ 19.856038] kasan_report+0xdc/0x128 [ 19.856083] kasan_check_range+0x100/0x1a8 [ 19.856131] __kasan_check_write+0x20/0x30 [ 19.856176] kasan_atomics_helper+0x147c/0x4858 [ 19.856223] kasan_atomics+0x198/0x2e0 [ 19.856269] kunit_try_run_case+0x170/0x3f0 [ 19.856318] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.856370] kthread+0x328/0x630 [ 19.856412] ret_from_fork+0x10/0x20 [ 19.856458] [ 19.856477] Allocated by task 266: [ 19.856506] kasan_save_stack+0x3c/0x68 [ 19.856545] kasan_save_track+0x20/0x40 [ 19.856585] kasan_save_alloc_info+0x40/0x58 [ 19.856626] __kasan_kmalloc+0xd4/0xd8 [ 19.856663] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.856704] kasan_atomics+0xb8/0x2e0 [ 19.856741] kunit_try_run_case+0x170/0x3f0 [ 19.856779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.856824] kthread+0x328/0x630 [ 19.856858] ret_from_fork+0x10/0x20 [ 19.856895] [ 19.856914] The buggy address belongs to the object at fff00000c77bfc80 [ 19.856914] which belongs to the cache kmalloc-64 of size 64 [ 19.857349] The buggy address is located 0 bytes to the right of [ 19.857349] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.857424] [ 19.857446] The buggy address belongs to the physical page: [ 19.857478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.857531] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.857579] page_type: f5(slab) [ 19.857622] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.857675] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.857717] page dumped because: kasan: bad access detected [ 19.857751] [ 19.857770] Memory state around the buggy address: [ 19.857803] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.857848] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.857894] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.857935] ^ [ 19.857967] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.858023] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.858064] ================================================================== [ 19.801908] ================================================================== [ 19.801998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 19.802082] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.802135] [ 19.802168] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.802261] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.802293] Hardware name: linux,dummy-virt (DT) [ 19.802325] Call trace: [ 19.802348] show_stack+0x20/0x38 (C) [ 19.802394] dump_stack_lvl+0x8c/0xd0 [ 19.802442] print_report+0x118/0x608 [ 19.802488] kasan_report+0xdc/0x128 [ 19.802546] kasan_check_range+0x100/0x1a8 [ 19.802594] __kasan_check_write+0x20/0x30 [ 19.802674] kasan_atomics_helper+0xf88/0x4858 [ 19.802721] kasan_atomics+0x198/0x2e0 [ 19.802769] kunit_try_run_case+0x170/0x3f0 [ 19.803084] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.803153] kthread+0x328/0x630 [ 19.803221] ret_from_fork+0x10/0x20 [ 19.803322] [ 19.803398] Allocated by task 266: [ 19.803476] kasan_save_stack+0x3c/0x68 [ 19.803528] kasan_save_track+0x20/0x40 [ 19.803566] kasan_save_alloc_info+0x40/0x58 [ 19.803643] __kasan_kmalloc+0xd4/0xd8 [ 19.803844] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.803891] kasan_atomics+0xb8/0x2e0 [ 19.803928] kunit_try_run_case+0x170/0x3f0 [ 19.803967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.804025] kthread+0x328/0x630 [ 19.804211] ret_from_fork+0x10/0x20 [ 19.804307] [ 19.804427] The buggy address belongs to the object at fff00000c77bfc80 [ 19.804427] which belongs to the cache kmalloc-64 of size 64 [ 19.804553] The buggy address is located 0 bytes to the right of [ 19.804553] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.805033] [ 19.805093] The buggy address belongs to the physical page: [ 19.805153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.805230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.805280] page_type: f5(slab) [ 19.805556] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.805736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.805854] page dumped because: kasan: bad access detected [ 19.805919] [ 19.806177] Memory state around the buggy address: [ 19.806314] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.806399] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.806446] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.806487] ^ [ 19.806552] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.806718] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.806884] ================================================================== [ 19.876026] ================================================================== [ 19.876076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 19.876242] Read of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.876293] [ 19.876324] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.876899] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.876931] Hardware name: linux,dummy-virt (DT) [ 19.876966] Call trace: [ 19.877000] show_stack+0x20/0x38 (C) [ 19.877052] dump_stack_lvl+0x8c/0xd0 [ 19.877098] print_report+0x118/0x608 [ 19.877146] kasan_report+0xdc/0x128 [ 19.877191] __asan_report_load8_noabort+0x20/0x30 [ 19.877244] kasan_atomics_helper+0x3db0/0x4858 [ 19.877999] kasan_atomics+0x198/0x2e0 [ 19.878075] kunit_try_run_case+0x170/0x3f0 [ 19.878188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.878244] kthread+0x328/0x630 [ 19.878286] ret_from_fork+0x10/0x20 [ 19.878771] [ 19.878803] Allocated by task 266: [ 19.878863] kasan_save_stack+0x3c/0x68 [ 19.879153] kasan_save_track+0x20/0x40 [ 19.879194] kasan_save_alloc_info+0x40/0x58 [ 19.879236] __kasan_kmalloc+0xd4/0xd8 [ 19.879387] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.879437] kasan_atomics+0xb8/0x2e0 [ 19.879747] kunit_try_run_case+0x170/0x3f0 [ 19.879917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.879961] kthread+0x328/0x630 [ 19.880510] ret_from_fork+0x10/0x20 [ 19.880791] [ 19.880822] The buggy address belongs to the object at fff00000c77bfc80 [ 19.880822] which belongs to the cache kmalloc-64 of size 64 [ 19.880902] The buggy address is located 0 bytes to the right of [ 19.880902] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.881001] [ 19.881262] The buggy address belongs to the physical page: [ 19.881322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.881379] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.881816] page_type: f5(slab) [ 19.881864] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.882024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.882068] page dumped because: kasan: bad access detected [ 19.882354] [ 19.882389] Memory state around the buggy address: [ 19.882426] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.882515] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.882561] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.882603] ^ [ 19.882636] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.882681] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.883069] ================================================================== [ 19.775819] ================================================================== [ 19.775859] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 19.777073] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.777243] [ 19.777300] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.777456] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.777486] Hardware name: linux,dummy-virt (DT) [ 19.777519] Call trace: [ 19.777569] show_stack+0x20/0x38 (C) [ 19.777910] dump_stack_lvl+0x8c/0xd0 [ 19.778279] print_report+0x118/0x608 [ 19.778391] kasan_report+0xdc/0x128 [ 19.778526] __asan_report_store8_noabort+0x20/0x30 [ 19.778612] kasan_atomics_helper+0x3e5c/0x4858 [ 19.778800] kasan_atomics+0x198/0x2e0 [ 19.778858] kunit_try_run_case+0x170/0x3f0 [ 19.778906] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.779273] kthread+0x328/0x630 [ 19.779379] ret_from_fork+0x10/0x20 [ 19.779739] [ 19.779787] Allocated by task 266: [ 19.779966] kasan_save_stack+0x3c/0x68 [ 19.780094] kasan_save_track+0x20/0x40 [ 19.780181] kasan_save_alloc_info+0x40/0x58 [ 19.780227] __kasan_kmalloc+0xd4/0xd8 [ 19.780516] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.780800] kasan_atomics+0xb8/0x2e0 [ 19.781035] kunit_try_run_case+0x170/0x3f0 [ 19.781085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.781353] kthread+0x328/0x630 [ 19.781652] ret_from_fork+0x10/0x20 [ 19.781723] [ 19.781744] The buggy address belongs to the object at fff00000c77bfc80 [ 19.781744] which belongs to the cache kmalloc-64 of size 64 [ 19.782274] The buggy address is located 0 bytes to the right of [ 19.782274] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.782501] [ 19.782538] The buggy address belongs to the physical page: [ 19.782892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.783181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.783361] page_type: f5(slab) [ 19.783536] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.783605] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.783669] page dumped because: kasan: bad access detected [ 19.783708] [ 19.783729] Memory state around the buggy address: [ 19.783765] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.784288] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.784529] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.784576] ^ [ 19.784638] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.784877] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.785006] ================================================================== [ 19.812387] ================================================================== [ 19.812472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 19.812551] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.812603] [ 19.812837] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.812933] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.812960] Hardware name: linux,dummy-virt (DT) [ 19.813122] Call trace: [ 19.813156] show_stack+0x20/0x38 (C) [ 19.813210] dump_stack_lvl+0x8c/0xd0 [ 19.813286] print_report+0x118/0x608 [ 19.813369] kasan_report+0xdc/0x128 [ 19.813441] kasan_check_range+0x100/0x1a8 [ 19.813491] __kasan_check_write+0x20/0x30 [ 19.813547] kasan_atomics_helper+0x1058/0x4858 [ 19.813854] kasan_atomics+0x198/0x2e0 [ 19.813919] kunit_try_run_case+0x170/0x3f0 [ 19.814027] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.814299] kthread+0x328/0x630 [ 19.814356] ret_from_fork+0x10/0x20 [ 19.814513] [ 19.814541] Allocated by task 266: [ 19.814578] kasan_save_stack+0x3c/0x68 [ 19.814656] kasan_save_track+0x20/0x40 [ 19.814694] kasan_save_alloc_info+0x40/0x58 [ 19.814749] __kasan_kmalloc+0xd4/0xd8 [ 19.814789] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.815072] kasan_atomics+0xb8/0x2e0 [ 19.815220] kunit_try_run_case+0x170/0x3f0 [ 19.815325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.815521] kthread+0x328/0x630 [ 19.815685] ret_from_fork+0x10/0x20 [ 19.815793] [ 19.815938] The buggy address belongs to the object at fff00000c77bfc80 [ 19.815938] which belongs to the cache kmalloc-64 of size 64 [ 19.816102] The buggy address is located 0 bytes to the right of [ 19.816102] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.816239] [ 19.816315] The buggy address belongs to the physical page: [ 19.816446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.816513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.816562] page_type: f5(slab) [ 19.816937] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.817119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.817194] page dumped because: kasan: bad access detected [ 19.817261] [ 19.817452] Memory state around the buggy address: [ 19.817490] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.817691] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.818031] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.818138] ^ [ 19.818292] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.818508] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.818706] ================================================================== [ 19.824389] ================================================================== [ 19.824431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 19.824477] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.824527] [ 19.824558] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.824639] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.824666] Hardware name: linux,dummy-virt (DT) [ 19.824699] Call trace: [ 19.824721] show_stack+0x20/0x38 (C) [ 19.824769] dump_stack_lvl+0x8c/0xd0 [ 19.824814] print_report+0x118/0x608 [ 19.824861] kasan_report+0xdc/0x128 [ 19.824906] kasan_check_range+0x100/0x1a8 [ 19.825079] __kasan_check_write+0x20/0x30 [ 19.825136] kasan_atomics_helper+0x1128/0x4858 [ 19.825186] kasan_atomics+0x198/0x2e0 [ 19.825230] kunit_try_run_case+0x170/0x3f0 [ 19.825283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.825336] kthread+0x328/0x630 [ 19.825377] ret_from_fork+0x10/0x20 [ 19.825424] [ 19.825445] Allocated by task 266: [ 19.825474] kasan_save_stack+0x3c/0x68 [ 19.825515] kasan_save_track+0x20/0x40 [ 19.825553] kasan_save_alloc_info+0x40/0x58 [ 19.825606] __kasan_kmalloc+0xd4/0xd8 [ 19.825652] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.825691] kasan_atomics+0xb8/0x2e0 [ 19.825728] kunit_try_run_case+0x170/0x3f0 [ 19.825766] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.825824] kthread+0x328/0x630 [ 19.825857] ret_from_fork+0x10/0x20 [ 19.825926] [ 19.825946] The buggy address belongs to the object at fff00000c77bfc80 [ 19.825946] which belongs to the cache kmalloc-64 of size 64 [ 19.826018] The buggy address is located 0 bytes to the right of [ 19.826018] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.826085] [ 19.826106] The buggy address belongs to the physical page: [ 19.826138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.826405] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.826467] page_type: f5(slab) [ 19.826568] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.826735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.826791] page dumped because: kasan: bad access detected [ 19.826825] [ 19.826845] Memory state around the buggy address: [ 19.826879] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.826923] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.826969] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.827020] ^ [ 19.827055] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.827097] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.827138] ================================================================== [ 19.843452] ================================================================== [ 19.843494] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 19.843539] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.843589] [ 19.843620] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.843699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.843727] Hardware name: linux,dummy-virt (DT) [ 19.843758] Call trace: [ 19.843783] show_stack+0x20/0x38 (C) [ 19.843829] dump_stack_lvl+0x8c/0xd0 [ 19.843876] print_report+0x118/0x608 [ 19.843921] kasan_report+0xdc/0x128 [ 19.843969] kasan_check_range+0x100/0x1a8 [ 19.844103] __kasan_check_write+0x20/0x30 [ 19.844152] kasan_atomics_helper+0x1384/0x4858 [ 19.844201] kasan_atomics+0x198/0x2e0 [ 19.844246] kunit_try_run_case+0x170/0x3f0 [ 19.844294] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.844347] kthread+0x328/0x630 [ 19.844388] ret_from_fork+0x10/0x20 [ 19.844436] [ 19.844455] Allocated by task 266: [ 19.844509] kasan_save_stack+0x3c/0x68 [ 19.844553] kasan_save_track+0x20/0x40 [ 19.844591] kasan_save_alloc_info+0x40/0x58 [ 19.844633] __kasan_kmalloc+0xd4/0xd8 [ 19.844672] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.844724] kasan_atomics+0xb8/0x2e0 [ 19.844764] kunit_try_run_case+0x170/0x3f0 [ 19.844851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.844934] kthread+0x328/0x630 [ 19.844969] ret_from_fork+0x10/0x20 [ 19.845017] [ 19.845306] The buggy address belongs to the object at fff00000c77bfc80 [ 19.845306] which belongs to the cache kmalloc-64 of size 64 [ 19.845368] The buggy address is located 0 bytes to the right of [ 19.845368] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.845440] [ 19.845507] The buggy address belongs to the physical page: [ 19.845675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.845747] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.845830] page_type: f5(slab) [ 19.845900] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.845953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.846005] page dumped because: kasan: bad access detected [ 19.846085] [ 19.846174] Memory state around the buggy address: [ 19.846274] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.846344] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.846389] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.846432] ^ [ 19.846464] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.846510] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.846597] ================================================================== [ 19.654569] ================================================================== [ 19.654620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 19.654669] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.654721] [ 19.654751] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.654833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.654860] Hardware name: linux,dummy-virt (DT) [ 19.654893] Call trace: [ 19.654915] show_stack+0x20/0x38 (C) [ 19.654961] dump_stack_lvl+0x8c/0xd0 [ 19.655025] print_report+0x118/0x608 [ 19.655071] kasan_report+0xdc/0x128 [ 19.655117] kasan_check_range+0x100/0x1a8 [ 19.655167] __kasan_check_write+0x20/0x30 [ 19.655212] kasan_atomics_helper+0xad4/0x4858 [ 19.655261] kasan_atomics+0x198/0x2e0 [ 19.655306] kunit_try_run_case+0x170/0x3f0 [ 19.655354] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.655408] kthread+0x328/0x630 [ 19.655448] ret_from_fork+0x10/0x20 [ 19.655496] [ 19.655536] Allocated by task 266: [ 19.655573] kasan_save_stack+0x3c/0x68 [ 19.655617] kasan_save_track+0x20/0x40 [ 19.655656] kasan_save_alloc_info+0x40/0x58 [ 19.655699] __kasan_kmalloc+0xd4/0xd8 [ 19.655737] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.655778] kasan_atomics+0xb8/0x2e0 [ 19.655816] kunit_try_run_case+0x170/0x3f0 [ 19.655864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.655909] kthread+0x328/0x630 [ 19.655944] ret_from_fork+0x10/0x20 [ 19.656221] [ 19.656516] The buggy address belongs to the object at fff00000c77bfc80 [ 19.656516] which belongs to the cache kmalloc-64 of size 64 [ 19.656819] The buggy address is located 0 bytes to the right of [ 19.656819] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.657712] [ 19.657758] The buggy address belongs to the physical page: [ 19.657818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.657896] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.657967] page_type: f5(slab) [ 19.658407] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.658498] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.658641] page dumped because: kasan: bad access detected [ 19.659072] [ 19.659098] Memory state around the buggy address: [ 19.659356] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.659729] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.660172] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.660237] ^ [ 19.660653] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.660720] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.660851] ================================================================== [ 19.957033] ================================================================== [ 19.957091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 19.957191] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.957428] [ 19.957473] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.957568] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.957655] Hardware name: linux,dummy-virt (DT) [ 19.957709] Call trace: [ 19.957759] show_stack+0x20/0x38 (C) [ 19.957830] dump_stack_lvl+0x8c/0xd0 [ 19.958129] print_report+0x118/0x608 [ 19.958234] kasan_report+0xdc/0x128 [ 19.958300] kasan_check_range+0x100/0x1a8 [ 19.958376] __kasan_check_write+0x20/0x30 [ 19.958459] kasan_atomics_helper+0x17ec/0x4858 [ 19.958513] kasan_atomics+0x198/0x2e0 [ 19.958579] kunit_try_run_case+0x170/0x3f0 [ 19.958643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.958697] kthread+0x328/0x630 [ 19.959048] ret_from_fork+0x10/0x20 [ 19.959166] [ 19.959209] Allocated by task 266: [ 19.959536] kasan_save_stack+0x3c/0x68 [ 19.959665] kasan_save_track+0x20/0x40 [ 19.959753] kasan_save_alloc_info+0x40/0x58 [ 19.959834] __kasan_kmalloc+0xd4/0xd8 [ 19.959923] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.960031] kasan_atomics+0xb8/0x2e0 [ 19.960147] kunit_try_run_case+0x170/0x3f0 [ 19.960234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.960307] kthread+0x328/0x630 [ 19.960343] ret_from_fork+0x10/0x20 [ 19.960380] [ 19.960411] The buggy address belongs to the object at fff00000c77bfc80 [ 19.960411] which belongs to the cache kmalloc-64 of size 64 [ 19.960472] The buggy address is located 0 bytes to the right of [ 19.960472] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.960783] [ 19.960844] The buggy address belongs to the physical page: [ 19.960899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.961035] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.961139] page_type: f5(slab) [ 19.961413] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.961471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.961757] page dumped because: kasan: bad access detected [ 19.961821] [ 19.961851] Memory state around the buggy address: [ 19.961899] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.961947] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.962001] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.962043] ^ [ 19.962077] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.962124] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.962163] ================================================================== [ 19.895295] ================================================================== [ 19.895349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 19.896083] Read of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.896255] [ 19.896526] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.896613] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.896642] Hardware name: linux,dummy-virt (DT) [ 19.896675] Call trace: [ 19.896942] show_stack+0x20/0x38 (C) [ 19.897369] dump_stack_lvl+0x8c/0xd0 [ 19.897690] print_report+0x118/0x608 [ 19.897861] kasan_report+0xdc/0x128 [ 19.897911] __asan_report_load8_noabort+0x20/0x30 [ 19.897965] kasan_atomics_helper+0x3df4/0x4858 [ 19.898024] kasan_atomics+0x198/0x2e0 [ 19.898071] kunit_try_run_case+0x170/0x3f0 [ 19.898119] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.899145] kthread+0x328/0x630 [ 19.899265] ret_from_fork+0x10/0x20 [ 19.899413] [ 19.899479] Allocated by task 266: [ 19.899572] kasan_save_stack+0x3c/0x68 [ 19.899699] kasan_save_track+0x20/0x40 [ 19.899903] kasan_save_alloc_info+0x40/0x58 [ 19.900116] __kasan_kmalloc+0xd4/0xd8 [ 19.900334] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.900393] kasan_atomics+0xb8/0x2e0 [ 19.900715] kunit_try_run_case+0x170/0x3f0 [ 19.900937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.901148] kthread+0x328/0x630 [ 19.901413] ret_from_fork+0x10/0x20 [ 19.901535] [ 19.901759] The buggy address belongs to the object at fff00000c77bfc80 [ 19.901759] which belongs to the cache kmalloc-64 of size 64 [ 19.902208] The buggy address is located 0 bytes to the right of [ 19.902208] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.902284] [ 19.902306] The buggy address belongs to the physical page: [ 19.902343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.902857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.903239] page_type: f5(slab) [ 19.903292] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.903405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.903849] page dumped because: kasan: bad access detected [ 19.904204] [ 19.904293] Memory state around the buggy address: [ 19.904333] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.904380] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.904427] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.904469] ^ [ 19.904505] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.905110] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.905755] ================================================================== [ 19.635488] ================================================================== [ 19.635548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 19.635646] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.635717] [ 19.635764] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.635849] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.635885] Hardware name: linux,dummy-virt (DT) [ 19.635917] Call trace: [ 19.636182] show_stack+0x20/0x38 (C) [ 19.636246] dump_stack_lvl+0x8c/0xd0 [ 19.636375] print_report+0x118/0x608 [ 19.636444] kasan_report+0xdc/0x128 [ 19.636492] kasan_check_range+0x100/0x1a8 [ 19.636541] __kasan_check_write+0x20/0x30 [ 19.636587] kasan_atomics_helper+0x99c/0x4858 [ 19.636637] kasan_atomics+0x198/0x2e0 [ 19.636691] kunit_try_run_case+0x170/0x3f0 [ 19.636739] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.636793] kthread+0x328/0x630 [ 19.636835] ret_from_fork+0x10/0x20 [ 19.636884] [ 19.636913] Allocated by task 266: [ 19.636945] kasan_save_stack+0x3c/0x68 [ 19.636996] kasan_save_track+0x20/0x40 [ 19.637034] kasan_save_alloc_info+0x40/0x58 [ 19.637114] __kasan_kmalloc+0xd4/0xd8 [ 19.637153] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.637512] kasan_atomics+0xb8/0x2e0 [ 19.637589] kunit_try_run_case+0x170/0x3f0 [ 19.637653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.637700] kthread+0x328/0x630 [ 19.637733] ret_from_fork+0x10/0x20 [ 19.637787] [ 19.637827] The buggy address belongs to the object at fff00000c77bfc80 [ 19.637827] which belongs to the cache kmalloc-64 of size 64 [ 19.637889] The buggy address is located 0 bytes to the right of [ 19.637889] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.638107] [ 19.638133] The buggy address belongs to the physical page: [ 19.638189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.638262] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.638342] page_type: f5(slab) [ 19.638385] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.638437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.638481] page dumped because: kasan: bad access detected [ 19.638519] [ 19.638557] Memory state around the buggy address: [ 19.638591] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.638655] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.638729] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.638770] ^ [ 19.638805] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.638848] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.638900] ================================================================== [ 19.712860] ================================================================== [ 19.712914] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 19.712968] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.713039] [ 19.713071] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.713154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.713181] Hardware name: linux,dummy-virt (DT) [ 19.713213] Call trace: [ 19.713237] show_stack+0x20/0x38 (C) [ 19.713284] dump_stack_lvl+0x8c/0xd0 [ 19.713332] print_report+0x118/0x608 [ 19.713378] kasan_report+0xdc/0x128 [ 19.713424] kasan_check_range+0x100/0x1a8 [ 19.713472] __kasan_check_write+0x20/0x30 [ 19.713519] kasan_atomics_helper+0xca0/0x4858 [ 19.713569] kasan_atomics+0x198/0x2e0 [ 19.713613] kunit_try_run_case+0x170/0x3f0 [ 19.713666] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.714418] kthread+0x328/0x630 [ 19.714489] ret_from_fork+0x10/0x20 [ 19.714542] [ 19.714562] Allocated by task 266: [ 19.715287] kasan_save_stack+0x3c/0x68 [ 19.715393] kasan_save_track+0x20/0x40 [ 19.715685] kasan_save_alloc_info+0x40/0x58 [ 19.715794] __kasan_kmalloc+0xd4/0xd8 [ 19.715893] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.716254] kasan_atomics+0xb8/0x2e0 [ 19.716318] kunit_try_run_case+0x170/0x3f0 [ 19.716620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.716919] kthread+0x328/0x630 [ 19.717045] ret_from_fork+0x10/0x20 [ 19.717091] [ 19.717121] The buggy address belongs to the object at fff00000c77bfc80 [ 19.717121] which belongs to the cache kmalloc-64 of size 64 [ 19.717519] The buggy address is located 0 bytes to the right of [ 19.717519] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.717876] [ 19.717920] The buggy address belongs to the physical page: [ 19.717964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.718149] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.718389] page_type: f5(slab) [ 19.718775] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.719022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.719420] page dumped because: kasan: bad access detected [ 19.719602] [ 19.719649] Memory state around the buggy address: [ 19.719790] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.719840] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.720323] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.720373] ^ [ 19.720408] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.721016] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.721206] ================================================================== [ 19.771468] ================================================================== [ 19.771524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 19.771577] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.772075] [ 19.772292] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.772419] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.772541] Hardware name: linux,dummy-virt (DT) [ 19.772579] Call trace: [ 19.772603] show_stack+0x20/0x38 (C) [ 19.772683] dump_stack_lvl+0x8c/0xd0 [ 19.772916] print_report+0x118/0x608 [ 19.773009] kasan_report+0xdc/0x128 [ 19.773284] kasan_check_range+0x100/0x1a8 [ 19.773367] __kasan_check_write+0x20/0x30 [ 19.773415] kasan_atomics_helper+0xe44/0x4858 [ 19.773465] kasan_atomics+0x198/0x2e0 [ 19.773509] kunit_try_run_case+0x170/0x3f0 [ 19.773696] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.773763] kthread+0x328/0x630 [ 19.773805] ret_from_fork+0x10/0x20 [ 19.773870] [ 19.773900] Allocated by task 266: [ 19.773932] kasan_save_stack+0x3c/0x68 [ 19.773993] kasan_save_track+0x20/0x40 [ 19.774035] kasan_save_alloc_info+0x40/0x58 [ 19.774083] __kasan_kmalloc+0xd4/0xd8 [ 19.774123] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.774167] kasan_atomics+0xb8/0x2e0 [ 19.774211] kunit_try_run_case+0x170/0x3f0 [ 19.774252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.774297] kthread+0x328/0x630 [ 19.774332] ret_from_fork+0x10/0x20 [ 19.774370] [ 19.774391] The buggy address belongs to the object at fff00000c77bfc80 [ 19.774391] which belongs to the cache kmalloc-64 of size 64 [ 19.774450] The buggy address is located 0 bytes to the right of [ 19.774450] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.774517] [ 19.774538] The buggy address belongs to the physical page: [ 19.774571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.775012] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.775251] page_type: f5(slab) [ 19.775297] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.775349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.775392] page dumped because: kasan: bad access detected [ 19.775426] [ 19.775445] Memory state around the buggy address: [ 19.775479] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.775525] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.775568] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.775608] ^ [ 19.775643] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.775690] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.775728] ================================================================== [ 19.705758] ================================================================== [ 19.705885] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 19.705993] Read of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.706295] [ 19.706644] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.706748] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.706932] Hardware name: linux,dummy-virt (DT) [ 19.707010] Call trace: [ 19.707149] show_stack+0x20/0x38 (C) [ 19.707243] dump_stack_lvl+0x8c/0xd0 [ 19.707299] print_report+0x118/0x608 [ 19.707347] kasan_report+0xdc/0x128 [ 19.707393] __asan_report_load4_noabort+0x20/0x30 [ 19.707918] kasan_atomics_helper+0x3de4/0x4858 [ 19.708071] kasan_atomics+0x198/0x2e0 [ 19.708207] kunit_try_run_case+0x170/0x3f0 [ 19.708262] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.708337] kthread+0x328/0x630 [ 19.708418] ret_from_fork+0x10/0x20 [ 19.708482] [ 19.708519] Allocated by task 266: [ 19.708548] kasan_save_stack+0x3c/0x68 [ 19.708607] kasan_save_track+0x20/0x40 [ 19.708655] kasan_save_alloc_info+0x40/0x58 [ 19.708708] __kasan_kmalloc+0xd4/0xd8 [ 19.708746] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.708787] kasan_atomics+0xb8/0x2e0 [ 19.708834] kunit_try_run_case+0x170/0x3f0 [ 19.708874] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.708927] kthread+0x328/0x630 [ 19.708969] ret_from_fork+0x10/0x20 [ 19.709035] [ 19.709090] The buggy address belongs to the object at fff00000c77bfc80 [ 19.709090] which belongs to the cache kmalloc-64 of size 64 [ 19.709642] The buggy address is located 0 bytes to the right of [ 19.709642] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.709904] [ 19.710271] The buggy address belongs to the physical page: [ 19.710504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.711137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.711316] page_type: f5(slab) [ 19.711434] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.711498] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.711698] page dumped because: kasan: bad access detected [ 19.711804] [ 19.711826] Memory state around the buggy address: [ 19.711972] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.712056] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.712126] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.712167] ^ [ 19.712211] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.712277] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.712319] ================================================================== [ 19.835586] ================================================================== [ 19.835634] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 19.835805] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.836016] [ 19.836127] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.836265] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.836400] Hardware name: linux,dummy-virt (DT) [ 19.836431] Call trace: [ 19.836455] show_stack+0x20/0x38 (C) [ 19.836527] dump_stack_lvl+0x8c/0xd0 [ 19.836576] print_report+0x118/0x608 [ 19.836621] kasan_report+0xdc/0x128 [ 19.836667] kasan_check_range+0x100/0x1a8 [ 19.836714] __kasan_check_write+0x20/0x30 [ 19.836760] kasan_atomics_helper+0x126c/0x4858 [ 19.836809] kasan_atomics+0x198/0x2e0 [ 19.836854] kunit_try_run_case+0x170/0x3f0 [ 19.836902] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.836970] kthread+0x328/0x630 [ 19.837134] ret_from_fork+0x10/0x20 [ 19.837211] [ 19.837231] Allocated by task 266: [ 19.837259] kasan_save_stack+0x3c/0x68 [ 19.837302] kasan_save_track+0x20/0x40 [ 19.837340] kasan_save_alloc_info+0x40/0x58 [ 19.837381] __kasan_kmalloc+0xd4/0xd8 [ 19.837429] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.837469] kasan_atomics+0xb8/0x2e0 [ 19.837506] kunit_try_run_case+0x170/0x3f0 [ 19.837546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.837589] kthread+0x328/0x630 [ 19.837632] ret_from_fork+0x10/0x20 [ 19.837670] [ 19.837690] The buggy address belongs to the object at fff00000c77bfc80 [ 19.837690] which belongs to the cache kmalloc-64 of size 64 [ 19.837904] The buggy address is located 0 bytes to the right of [ 19.837904] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.837972] [ 19.838008] The buggy address belongs to the physical page: [ 19.838058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.838111] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.838158] page_type: f5(slab) [ 19.838196] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.838249] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.838291] page dumped because: kasan: bad access detected [ 19.838324] [ 19.838343] Memory state around the buggy address: [ 19.838377] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.838422] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.838544] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.838772] ^ [ 19.838813] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.838859] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.838898] ================================================================== [ 19.795456] ================================================================== [ 19.795670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 19.795733] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.795786] [ 19.795820] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.796106] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.796170] Hardware name: linux,dummy-virt (DT) [ 19.796205] Call trace: [ 19.796231] show_stack+0x20/0x38 (C) [ 19.796283] dump_stack_lvl+0x8c/0xd0 [ 19.796350] print_report+0x118/0x608 [ 19.796415] kasan_report+0xdc/0x128 [ 19.796486] kasan_check_range+0x100/0x1a8 [ 19.796535] __kasan_check_write+0x20/0x30 [ 19.796581] kasan_atomics_helper+0xf20/0x4858 [ 19.796867] kasan_atomics+0x198/0x2e0 [ 19.796996] kunit_try_run_case+0x170/0x3f0 [ 19.797051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.797370] kthread+0x328/0x630 [ 19.797498] ret_from_fork+0x10/0x20 [ 19.797589] [ 19.797636] Allocated by task 266: [ 19.797694] kasan_save_stack+0x3c/0x68 [ 19.797757] kasan_save_track+0x20/0x40 [ 19.797827] kasan_save_alloc_info+0x40/0x58 [ 19.797885] __kasan_kmalloc+0xd4/0xd8 [ 19.797928] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.798004] kasan_atomics+0xb8/0x2e0 [ 19.798056] kunit_try_run_case+0x170/0x3f0 [ 19.798114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.798161] kthread+0x328/0x630 [ 19.798197] ret_from_fork+0x10/0x20 [ 19.798513] [ 19.798547] The buggy address belongs to the object at fff00000c77bfc80 [ 19.798547] which belongs to the cache kmalloc-64 of size 64 [ 19.798688] The buggy address is located 0 bytes to the right of [ 19.798688] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.798776] [ 19.798874] The buggy address belongs to the physical page: [ 19.799052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.799249] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.799558] page_type: f5(slab) [ 19.799607] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.799774] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.799867] page dumped because: kasan: bad access detected [ 19.799972] [ 19.800043] Memory state around the buggy address: [ 19.800107] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.800292] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.800526] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.800643] ^ [ 19.800707] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.800750] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.800792] ================================================================== [ 19.832134] ================================================================== [ 19.832184] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 19.832230] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.832282] [ 19.832311] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.832392] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.832420] Hardware name: linux,dummy-virt (DT) [ 19.832450] Call trace: [ 19.832488] show_stack+0x20/0x38 (C) [ 19.832536] dump_stack_lvl+0x8c/0xd0 [ 19.832583] print_report+0x118/0x608 [ 19.832629] kasan_report+0xdc/0x128 [ 19.832714] kasan_check_range+0x100/0x1a8 [ 19.832804] __kasan_check_write+0x20/0x30 [ 19.833010] kasan_atomics_helper+0x11f8/0x4858 [ 19.833063] kasan_atomics+0x198/0x2e0 [ 19.833113] kunit_try_run_case+0x170/0x3f0 [ 19.833168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.833227] kthread+0x328/0x630 [ 19.833277] ret_from_fork+0x10/0x20 [ 19.833481] [ 19.833580] Allocated by task 266: [ 19.833712] kasan_save_stack+0x3c/0x68 [ 19.833754] kasan_save_track+0x20/0x40 [ 19.833792] kasan_save_alloc_info+0x40/0x58 [ 19.833834] __kasan_kmalloc+0xd4/0xd8 [ 19.833872] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.833918] kasan_atomics+0xb8/0x2e0 [ 19.834103] kunit_try_run_case+0x170/0x3f0 [ 19.834305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.834355] kthread+0x328/0x630 [ 19.834528] ret_from_fork+0x10/0x20 [ 19.834582] [ 19.834602] The buggy address belongs to the object at fff00000c77bfc80 [ 19.834602] which belongs to the cache kmalloc-64 of size 64 [ 19.834692] The buggy address is located 0 bytes to the right of [ 19.834692] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.834758] [ 19.834778] The buggy address belongs to the physical page: [ 19.834811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.834862] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.834910] page_type: f5(slab) [ 19.834948] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.835010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.835052] page dumped because: kasan: bad access detected [ 19.835086] [ 19.835105] Memory state around the buggy address: [ 19.835139] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.835184] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.835229] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.835271] ^ [ 19.835303] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.835347] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.835386] ================================================================== [ 19.787452] ================================================================== [ 19.787509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 19.787559] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.787610] [ 19.787642] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.787726] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.787753] Hardware name: linux,dummy-virt (DT) [ 19.787784] Call trace: [ 19.787807] show_stack+0x20/0x38 (C) [ 19.787855] dump_stack_lvl+0x8c/0xd0 [ 19.787902] print_report+0x118/0x608 [ 19.787949] kasan_report+0xdc/0x128 [ 19.788010] kasan_check_range+0x100/0x1a8 [ 19.788060] __kasan_check_write+0x20/0x30 [ 19.788105] kasan_atomics_helper+0xeb8/0x4858 [ 19.788154] kasan_atomics+0x198/0x2e0 [ 19.788198] kunit_try_run_case+0x170/0x3f0 [ 19.788247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.788300] kthread+0x328/0x630 [ 19.788341] ret_from_fork+0x10/0x20 [ 19.788387] [ 19.788408] Allocated by task 266: [ 19.788436] kasan_save_stack+0x3c/0x68 [ 19.788477] kasan_save_track+0x20/0x40 [ 19.788516] kasan_save_alloc_info+0x40/0x58 [ 19.788556] __kasan_kmalloc+0xd4/0xd8 [ 19.788596] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.788636] kasan_atomics+0xb8/0x2e0 [ 19.788672] kunit_try_run_case+0x170/0x3f0 [ 19.788712] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.788758] kthread+0x328/0x630 [ 19.788792] ret_from_fork+0x10/0x20 [ 19.788830] [ 19.788850] The buggy address belongs to the object at fff00000c77bfc80 [ 19.788850] which belongs to the cache kmalloc-64 of size 64 [ 19.788910] The buggy address is located 0 bytes to the right of [ 19.788910] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.791232] [ 19.791271] The buggy address belongs to the physical page: [ 19.791307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.791366] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.791416] page_type: f5(slab) [ 19.791456] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.791509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.791555] page dumped because: kasan: bad access detected [ 19.791590] [ 19.791612] Memory state around the buggy address: [ 19.791647] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.791693] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.791738] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.791777] ^ [ 19.791811] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.791857] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.791898] ================================================================== [ 19.693006] ================================================================== [ 19.693582] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 19.693657] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.693710] [ 19.694085] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.694183] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.694254] Hardware name: linux,dummy-virt (DT) [ 19.694290] Call trace: [ 19.694314] show_stack+0x20/0x38 (C) [ 19.694393] dump_stack_lvl+0x8c/0xd0 [ 19.694990] print_report+0x118/0x608 [ 19.695069] kasan_report+0xdc/0x128 [ 19.695134] kasan_check_range+0x100/0x1a8 [ 19.695232] __kasan_check_write+0x20/0x30 [ 19.695427] kasan_atomics_helper+0xc08/0x4858 [ 19.695788] kasan_atomics+0x198/0x2e0 [ 19.695870] kunit_try_run_case+0x170/0x3f0 [ 19.696042] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.696126] kthread+0x328/0x630 [ 19.696483] ret_from_fork+0x10/0x20 [ 19.696668] [ 19.696728] Allocated by task 266: [ 19.696838] kasan_save_stack+0x3c/0x68 [ 19.696913] kasan_save_track+0x20/0x40 [ 19.696953] kasan_save_alloc_info+0x40/0x58 [ 19.697307] __kasan_kmalloc+0xd4/0xd8 [ 19.697664] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.697945] kasan_atomics+0xb8/0x2e0 [ 19.698020] kunit_try_run_case+0x170/0x3f0 [ 19.698270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.698477] kthread+0x328/0x630 [ 19.698604] ret_from_fork+0x10/0x20 [ 19.698894] [ 19.699036] The buggy address belongs to the object at fff00000c77bfc80 [ 19.699036] which belongs to the cache kmalloc-64 of size 64 [ 19.699246] The buggy address is located 0 bytes to the right of [ 19.699246] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.700169] [ 19.700242] The buggy address belongs to the physical page: [ 19.700759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.700993] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.701340] page_type: f5(slab) [ 19.701464] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.701725] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.701905] page dumped because: kasan: bad access detected [ 19.702158] [ 19.702391] Memory state around the buggy address: [ 19.702450] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.702498] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.703122] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.703180] ^ [ 19.703339] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.703399] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.703531] ================================================================== [ 19.741514] ================================================================== [ 19.741567] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 19.741780] Read of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.742241] [ 19.742298] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.742544] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.742581] Hardware name: linux,dummy-virt (DT) [ 19.742656] Call trace: [ 19.742922] show_stack+0x20/0x38 (C) [ 19.743175] dump_stack_lvl+0x8c/0xd0 [ 19.743299] print_report+0x118/0x608 [ 19.743396] kasan_report+0xdc/0x128 [ 19.743582] __asan_report_load4_noabort+0x20/0x30 [ 19.743861] kasan_atomics_helper+0x3e04/0x4858 [ 19.743987] kasan_atomics+0x198/0x2e0 [ 19.744093] kunit_try_run_case+0x170/0x3f0 [ 19.744434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.744792] kthread+0x328/0x630 [ 19.745012] ret_from_fork+0x10/0x20 [ 19.745116] [ 19.745211] Allocated by task 266: [ 19.745281] kasan_save_stack+0x3c/0x68 [ 19.745405] kasan_save_track+0x20/0x40 [ 19.745473] kasan_save_alloc_info+0x40/0x58 [ 19.745517] __kasan_kmalloc+0xd4/0xd8 [ 19.745678] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.745914] kasan_atomics+0xb8/0x2e0 [ 19.746205] kunit_try_run_case+0x170/0x3f0 [ 19.746405] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.746729] kthread+0x328/0x630 [ 19.747016] ret_from_fork+0x10/0x20 [ 19.747154] [ 19.747274] The buggy address belongs to the object at fff00000c77bfc80 [ 19.747274] which belongs to the cache kmalloc-64 of size 64 [ 19.747515] The buggy address is located 0 bytes to the right of [ 19.747515] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.747990] [ 19.748127] The buggy address belongs to the physical page: [ 19.748263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.748345] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.748733] page_type: f5(slab) [ 19.749112] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.749191] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.749239] page dumped because: kasan: bad access detected [ 19.749509] [ 19.749636] Memory state around the buggy address: [ 19.749698] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.749931] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.750144] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.750389] ^ [ 19.750555] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.750607] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.750860] ================================================================== [ 19.807677] ================================================================== [ 19.807731] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 19.807783] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.807860] [ 19.807893] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.807990] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.808022] Hardware name: linux,dummy-virt (DT) [ 19.808058] Call trace: [ 19.808081] show_stack+0x20/0x38 (C) [ 19.808129] dump_stack_lvl+0x8c/0xd0 [ 19.808176] print_report+0x118/0x608 [ 19.808222] kasan_report+0xdc/0x128 [ 19.808268] kasan_check_range+0x100/0x1a8 [ 19.808315] __kasan_check_write+0x20/0x30 [ 19.808362] kasan_atomics_helper+0xff0/0x4858 [ 19.808409] kasan_atomics+0x198/0x2e0 [ 19.808454] kunit_try_run_case+0x170/0x3f0 [ 19.808500] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.808576] kthread+0x328/0x630 [ 19.808620] ret_from_fork+0x10/0x20 [ 19.808668] [ 19.808687] Allocated by task 266: [ 19.808717] kasan_save_stack+0x3c/0x68 [ 19.808758] kasan_save_track+0x20/0x40 [ 19.808923] kasan_save_alloc_info+0x40/0x58 [ 19.808997] __kasan_kmalloc+0xd4/0xd8 [ 19.809476] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.809541] kasan_atomics+0xb8/0x2e0 [ 19.809579] kunit_try_run_case+0x170/0x3f0 [ 19.809626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.809829] kthread+0x328/0x630 [ 19.809903] ret_from_fork+0x10/0x20 [ 19.809968] [ 19.810034] The buggy address belongs to the object at fff00000c77bfc80 [ 19.810034] which belongs to the cache kmalloc-64 of size 64 [ 19.810107] The buggy address is located 0 bytes to the right of [ 19.810107] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.810175] [ 19.810197] The buggy address belongs to the physical page: [ 19.810231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.810422] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.810478] page_type: f5(slab) [ 19.810542] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.810597] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.810685] page dumped because: kasan: bad access detected [ 19.810722] [ 19.810773] Memory state around the buggy address: [ 19.810811] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.811021] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.811174] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.811253] ^ [ 19.811321] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.811365] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.811542] ================================================================== [ 19.933658] ================================================================== [ 19.933713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 19.934322] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.934392] [ 19.934427] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.935048] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.935145] Hardware name: linux,dummy-virt (DT) [ 19.935177] Call trace: [ 19.935203] show_stack+0x20/0x38 (C) [ 19.935522] dump_stack_lvl+0x8c/0xd0 [ 19.935833] print_report+0x118/0x608 [ 19.936192] kasan_report+0xdc/0x128 [ 19.936598] kasan_check_range+0x100/0x1a8 [ 19.936791] __kasan_check_write+0x20/0x30 [ 19.936839] kasan_atomics_helper+0x175c/0x4858 [ 19.936888] kasan_atomics+0x198/0x2e0 [ 19.937819] kunit_try_run_case+0x170/0x3f0 [ 19.938036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.938092] kthread+0x328/0x630 [ 19.938133] ret_from_fork+0x10/0x20 [ 19.938185] [ 19.938628] Allocated by task 266: [ 19.939325] kasan_save_stack+0x3c/0x68 [ 19.939779] kasan_save_track+0x20/0x40 [ 19.939930] kasan_save_alloc_info+0x40/0x58 [ 19.940369] __kasan_kmalloc+0xd4/0xd8 [ 19.940606] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.941291] kasan_atomics+0xb8/0x2e0 [ 19.941607] kunit_try_run_case+0x170/0x3f0 [ 19.942220] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.942797] kthread+0x328/0x630 [ 19.943228] ret_from_fork+0x10/0x20 [ 19.943270] [ 19.943292] The buggy address belongs to the object at fff00000c77bfc80 [ 19.943292] which belongs to the cache kmalloc-64 of size 64 [ 19.943357] The buggy address is located 0 bytes to the right of [ 19.943357] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.943424] [ 19.943445] The buggy address belongs to the physical page: [ 19.943482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.945058] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.945481] page_type: f5(slab) [ 19.945845] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.945952] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.946547] page dumped because: kasan: bad access detected [ 19.946931] [ 19.947144] Memory state around the buggy address: [ 19.947281] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.947776] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.948074] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.948399] ^ [ 19.948609] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.948657] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.948698] ================================================================== [ 19.662269] ================================================================== [ 19.662432] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 19.662528] Read of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.662601] [ 19.662811] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.663139] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.663352] Hardware name: linux,dummy-virt (DT) [ 19.663426] Call trace: [ 19.663593] show_stack+0x20/0x38 (C) [ 19.663652] dump_stack_lvl+0x8c/0xd0 [ 19.663953] print_report+0x118/0x608 [ 19.664281] kasan_report+0xdc/0x128 [ 19.664484] __asan_report_load4_noabort+0x20/0x30 [ 19.664580] kasan_atomics_helper+0x3dcc/0x4858 [ 19.664787] kasan_atomics+0x198/0x2e0 [ 19.665040] kunit_try_run_case+0x170/0x3f0 [ 19.665132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.665400] kthread+0x328/0x630 [ 19.665580] ret_from_fork+0x10/0x20 [ 19.665708] [ 19.665812] Allocated by task 266: [ 19.665846] kasan_save_stack+0x3c/0x68 [ 19.666237] kasan_save_track+0x20/0x40 [ 19.666654] kasan_save_alloc_info+0x40/0x58 [ 19.666887] __kasan_kmalloc+0xd4/0xd8 [ 19.666936] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.666991] kasan_atomics+0xb8/0x2e0 [ 19.667291] kunit_try_run_case+0x170/0x3f0 [ 19.667409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.667769] kthread+0x328/0x630 [ 19.667815] ret_from_fork+0x10/0x20 [ 19.668123] [ 19.668364] The buggy address belongs to the object at fff00000c77bfc80 [ 19.668364] which belongs to the cache kmalloc-64 of size 64 [ 19.668554] The buggy address is located 0 bytes to the right of [ 19.668554] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.668841] [ 19.669030] The buggy address belongs to the physical page: [ 19.669097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.669296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.669543] page_type: f5(slab) [ 19.669601] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.670018] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.670307] page dumped because: kasan: bad access detected [ 19.670387] [ 19.670407] Memory state around the buggy address: [ 19.670727] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.671086] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.671327] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.671553] ^ [ 19.671758] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.671828] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.671927] ================================================================== [ 19.909902] ================================================================== [ 19.910387] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 19.910457] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.910825] [ 19.910907] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.911179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.911332] Hardware name: linux,dummy-virt (DT) [ 19.911554] Call trace: [ 19.911584] show_stack+0x20/0x38 (C) [ 19.911836] dump_stack_lvl+0x8c/0xd0 [ 19.911895] print_report+0x118/0x608 [ 19.912156] kasan_report+0xdc/0x128 [ 19.912662] kasan_check_range+0x100/0x1a8 [ 19.912889] __kasan_check_write+0x20/0x30 [ 19.913237] kasan_atomics_helper+0x16d0/0x4858 [ 19.913562] kasan_atomics+0x198/0x2e0 [ 19.913612] kunit_try_run_case+0x170/0x3f0 [ 19.913666] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.913718] kthread+0x328/0x630 [ 19.913761] ret_from_fork+0x10/0x20 [ 19.914615] [ 19.914817] Allocated by task 266: [ 19.914852] kasan_save_stack+0x3c/0x68 [ 19.914994] kasan_save_track+0x20/0x40 [ 19.915093] kasan_save_alloc_info+0x40/0x58 [ 19.915135] __kasan_kmalloc+0xd4/0xd8 [ 19.915633] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.915828] kasan_atomics+0xb8/0x2e0 [ 19.917052] kunit_try_run_case+0x170/0x3f0 [ 19.917376] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.917470] kthread+0x328/0x630 [ 19.917794] ret_from_fork+0x10/0x20 [ 19.918030] [ 19.918324] The buggy address belongs to the object at fff00000c77bfc80 [ 19.918324] which belongs to the cache kmalloc-64 of size 64 [ 19.918548] The buggy address is located 0 bytes to the right of [ 19.918548] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.918900] [ 19.918927] The buggy address belongs to the physical page: [ 19.919118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.919228] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.919289] page_type: f5(slab) [ 19.919328] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.919659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.920168] page dumped because: kasan: bad access detected [ 19.920214] [ 19.920235] Memory state around the buggy address: [ 19.920618] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.920967] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.921376] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.921564] ^ [ 19.921839] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.921887] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.922270] ================================================================== [ 19.851569] ================================================================== [ 19.851618] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 19.851714] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.851767] [ 19.851798] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.851879] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.851908] Hardware name: linux,dummy-virt (DT) [ 19.851938] Call trace: [ 19.851963] show_stack+0x20/0x38 (C) [ 19.852048] dump_stack_lvl+0x8c/0xd0 [ 19.852096] print_report+0x118/0x608 [ 19.852142] kasan_report+0xdc/0x128 [ 19.852188] kasan_check_range+0x100/0x1a8 [ 19.852236] __kasan_check_write+0x20/0x30 [ 19.852283] kasan_atomics_helper+0x1414/0x4858 [ 19.852333] kasan_atomics+0x198/0x2e0 [ 19.852443] kunit_try_run_case+0x170/0x3f0 [ 19.852499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.852723] kthread+0x328/0x630 [ 19.852782] ret_from_fork+0x10/0x20 [ 19.852830] [ 19.852855] Allocated by task 266: [ 19.853025] kasan_save_stack+0x3c/0x68 [ 19.853193] kasan_save_track+0x20/0x40 [ 19.853231] kasan_save_alloc_info+0x40/0x58 [ 19.853350] __kasan_kmalloc+0xd4/0xd8 [ 19.853396] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.853561] kasan_atomics+0xb8/0x2e0 [ 19.853599] kunit_try_run_case+0x170/0x3f0 [ 19.853643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.853686] kthread+0x328/0x630 [ 19.853727] ret_from_fork+0x10/0x20 [ 19.853909] [ 19.854665] The buggy address belongs to the object at fff00000c77bfc80 [ 19.854665] which belongs to the cache kmalloc-64 of size 64 [ 19.854736] The buggy address is located 0 bytes to the right of [ 19.854736] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.854801] [ 19.854823] The buggy address belongs to the physical page: [ 19.854856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.854909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.854960] page_type: f5(slab) [ 19.855011] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.855069] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.855110] page dumped because: kasan: bad access detected [ 19.855144] [ 19.855163] Memory state around the buggy address: [ 19.855196] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.855247] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.855293] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.855334] ^ [ 19.855366] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.855411] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.855451] ================================================================== [ 19.858446] ================================================================== [ 19.858565] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 19.858612] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.858662] [ 19.858692] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.858773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.858800] Hardware name: linux,dummy-virt (DT) [ 19.858832] Call trace: [ 19.858855] show_stack+0x20/0x38 (C) [ 19.858902] dump_stack_lvl+0x8c/0xd0 [ 19.858956] print_report+0x118/0x608 [ 19.859195] kasan_report+0xdc/0x128 [ 19.859241] kasan_check_range+0x100/0x1a8 [ 19.859290] __kasan_check_write+0x20/0x30 [ 19.859336] kasan_atomics_helper+0x14e4/0x4858 [ 19.859392] kasan_atomics+0x198/0x2e0 [ 19.859438] kunit_try_run_case+0x170/0x3f0 [ 19.859486] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.859537] kthread+0x328/0x630 [ 19.859579] ret_from_fork+0x10/0x20 [ 19.859625] [ 19.859644] Allocated by task 266: [ 19.859716] kasan_save_stack+0x3c/0x68 [ 19.859928] kasan_save_track+0x20/0x40 [ 19.860601] kasan_save_alloc_info+0x40/0x58 [ 19.860768] __kasan_kmalloc+0xd4/0xd8 [ 19.860869] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.860910] kasan_atomics+0xb8/0x2e0 [ 19.861008] kunit_try_run_case+0x170/0x3f0 [ 19.861050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.861095] kthread+0x328/0x630 [ 19.861130] ret_from_fork+0x10/0x20 [ 19.861168] [ 19.861199] The buggy address belongs to the object at fff00000c77bfc80 [ 19.861199] which belongs to the cache kmalloc-64 of size 64 [ 19.861266] The buggy address is located 0 bytes to the right of [ 19.861266] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.861331] [ 19.861353] The buggy address belongs to the physical page: [ 19.861385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.861437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.861486] page_type: f5(slab) [ 19.861523] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.861575] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.861627] page dumped because: kasan: bad access detected [ 19.861661] [ 19.861680] Memory state around the buggy address: [ 19.861713] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.861759] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.861804] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.861846] ^ [ 19.861878] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.861921] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.861994] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[ 19.322856] ================================================================== [ 19.322912] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 19.322991] Read of size 1 at addr fff00000c77ad110 by task kunit_try_catch/260 [ 19.323143] [ 19.323281] CPU: 1 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.323365] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.323393] Hardware name: linux,dummy-virt (DT) [ 19.323426] Call trace: [ 19.323448] show_stack+0x20/0x38 (C) [ 19.323497] dump_stack_lvl+0x8c/0xd0 [ 19.323585] print_report+0x118/0x608 [ 19.323631] kasan_report+0xdc/0x128 [ 19.323678] __asan_report_load1_noabort+0x20/0x30 [ 19.323745] strlen+0xa8/0xb0 [ 19.323846] kasan_strings+0x418/0xb00 [ 19.323938] kunit_try_run_case+0x170/0x3f0 [ 19.323998] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.324053] kthread+0x328/0x630 [ 19.324095] ret_from_fork+0x10/0x20 [ 19.324152] [ 19.324201] Allocated by task 260: [ 19.324229] kasan_save_stack+0x3c/0x68 [ 19.324316] kasan_save_track+0x20/0x40 [ 19.324355] kasan_save_alloc_info+0x40/0x58 [ 19.324395] __kasan_kmalloc+0xd4/0xd8 [ 19.324433] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.324492] kasan_strings+0xc8/0xb00 [ 19.324529] kunit_try_run_case+0x170/0x3f0 [ 19.324568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.324718] kthread+0x328/0x630 [ 19.324802] ret_from_fork+0x10/0x20 [ 19.324846] [ 19.324865] Freed by task 260: [ 19.324894] kasan_save_stack+0x3c/0x68 [ 19.324931] kasan_save_track+0x20/0x40 [ 19.324969] kasan_save_free_info+0x4c/0x78 [ 19.325018] __kasan_slab_free+0x6c/0x98 [ 19.325085] kfree+0x214/0x3c8 [ 19.325120] kasan_strings+0x24c/0xb00 [ 19.325157] kunit_try_run_case+0x170/0x3f0 [ 19.325322] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.325367] kthread+0x328/0x630 [ 19.325401] ret_from_fork+0x10/0x20 [ 19.326232] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 19.326781] fff00000c77ad200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 19.328109] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.328518] kunit_try_run_case+0x170/0x3f0 [ 19.329364] kasan_strings+0xc8/0xb00 [ 19.329968] [ 19.330114] kasan_save_free_info+0x4c/0x78 [ 19.330440] ret_from_fork+0x10/0x20 [ 19.330797] [ 19.330931] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.331219] Memory state around the buggy address: [ 19.331306] fff00000c77ad000: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 19.331601] ^ [ 19.336050] not ok 62 kasan_strings [ 19.337328] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 19.337747] Hardware name: linux,dummy-virt (DT) [ 19.337949] kasan_report+0xdc/0x128 [ 19.338163] kasan_bitops_generic+0x110/0x1c8 [ 19.339254] kasan_save_track+0x20/0x40 [ 19.339459] kunit_try_run_case+0x170/0x3f0 [ 19.339735] The buggy address is located 8 bytes inside of [ 19.339735] allocated 9-byte region [fff00000c1ab8b80, fff00000c1ab8b89) [ 19.340588] page dumped because: kasan: bad access detected [ 19.340763] [ 19.340783] Memory state around the buggy address: [ 19.341333] ^ [ 19.343490] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 19.317499] ================================================================== [ 19.317595] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 19.317656] Read of size 1 at addr fff00000c77ad110 by task kunit_try_catch/260 [ 19.317727] [ 19.317759] CPU: 1 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.317857] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.317886] Hardware name: linux,dummy-virt (DT) [ 19.317917] Call trace: [ 19.317942] show_stack+0x20/0x38 (C) [ 19.318004] dump_stack_lvl+0x8c/0xd0 [ 19.318104] print_report+0x118/0x608 [ 19.318315] kasan_report+0xdc/0x128 [ 19.318380] __asan_report_load1_noabort+0x20/0x30 [ 19.318547] kasan_strings+0x95c/0xb00 [ 19.318680] kunit_try_run_case+0x170/0x3f0 [ 19.318731] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.318811] kthread+0x328/0x630 [ 19.318852] ret_from_fork+0x10/0x20 [ 19.318900] [ 19.318929] Allocated by task 260: [ 19.319143] kasan_save_stack+0x3c/0x68 [ 19.319187] kasan_save_track+0x20/0x40 [ 19.319225] kasan_save_alloc_info+0x40/0x58 [ 19.319290] __kasan_kmalloc+0xd4/0xd8 [ 19.319329] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.319389] kasan_strings+0xc8/0xb00 [ 19.319425] kunit_try_run_case+0x170/0x3f0 [ 19.319465] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.319508] kthread+0x328/0x630 [ 19.319543] ret_from_fork+0x10/0x20 [ 19.319688] [ 19.319747] Freed by task 260: [ 19.319855] kasan_save_stack+0x3c/0x68 [ 19.319896] kasan_save_track+0x20/0x40 [ 19.319934] kasan_save_free_info+0x4c/0x78 [ 19.319987] __kasan_slab_free+0x6c/0x98 [ 19.320026] kfree+0x214/0x3c8 [ 19.320061] kasan_strings+0x24c/0xb00 [ 19.320110] kunit_try_run_case+0x170/0x3f0 [ 19.320192] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.320257] kthread+0x328/0x630 [ 19.320290] ret_from_fork+0x10/0x20 [ 19.320328] [ 19.320348] The buggy address belongs to the object at fff00000c77ad100 [ 19.320348] which belongs to the cache kmalloc-32 of size 32 [ 19.320503] The buggy address is located 16 bytes inside of [ 19.320503] freed 32-byte region [fff00000c77ad100, fff00000c77ad120) [ 19.320575] [ 19.320672] The buggy address belongs to the physical page: [ 19.320766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ad [ 19.320837] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.320956] page_type: f5(slab) [ 19.321011] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 19.321141] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 19.321269] page dumped because: kasan: bad access detected [ 19.321302] [ 19.321323] Memory state around the buggy address: [ 19.321363] fff00000c77ad000: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 19.321556] fff00000c77ad080: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 19.321601] >fff00000c77ad100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 19.321670] ^ [ 19.321829] fff00000c77ad180: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 19.322233] fff00000c77ad200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 19.322274] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 19.312531] ================================================================== [ 19.312588] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 19.312643] Read of size 1 at addr fff00000c77ad110 by task kunit_try_catch/260 [ 19.312693] [ 19.312733] CPU: 1 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.312819] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.312861] Hardware name: linux,dummy-virt (DT) [ 19.313015] Call trace: [ 19.313150] show_stack+0x20/0x38 (C) [ 19.313259] dump_stack_lvl+0x8c/0xd0 [ 19.313409] print_report+0x118/0x608 [ 19.313476] kasan_report+0xdc/0x128 [ 19.313641] __asan_report_load1_noabort+0x20/0x30 [ 19.313701] strcmp+0xc0/0xc8 [ 19.313904] kasan_strings+0x340/0xb00 [ 19.314181] kunit_try_run_case+0x170/0x3f0 [ 19.314239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.314292] kthread+0x328/0x630 [ 19.314335] ret_from_fork+0x10/0x20 [ 19.314419] [ 19.314445] Allocated by task 260: [ 19.314476] kasan_save_stack+0x3c/0x68 [ 19.314520] kasan_save_track+0x20/0x40 [ 19.314559] kasan_save_alloc_info+0x40/0x58 [ 19.314633] __kasan_kmalloc+0xd4/0xd8 [ 19.314676] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.314718] kasan_strings+0xc8/0xb00 [ 19.314756] kunit_try_run_case+0x170/0x3f0 [ 19.314794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.314872] kthread+0x328/0x630 [ 19.314907] ret_from_fork+0x10/0x20 [ 19.314944] [ 19.314964] Freed by task 260: [ 19.315006] kasan_save_stack+0x3c/0x68 [ 19.315073] kasan_save_track+0x20/0x40 [ 19.315152] kasan_save_free_info+0x4c/0x78 [ 19.315246] __kasan_slab_free+0x6c/0x98 [ 19.315284] kfree+0x214/0x3c8 [ 19.315326] kasan_strings+0x24c/0xb00 [ 19.315427] kunit_try_run_case+0x170/0x3f0 [ 19.315468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.315572] kthread+0x328/0x630 [ 19.315607] ret_from_fork+0x10/0x20 [ 19.315643] [ 19.315682] The buggy address belongs to the object at fff00000c77ad100 [ 19.315682] which belongs to the cache kmalloc-32 of size 32 [ 19.315743] The buggy address is located 16 bytes inside of [ 19.315743] freed 32-byte region [fff00000c77ad100, fff00000c77ad120) [ 19.315826] [ 19.315880] The buggy address belongs to the physical page: [ 19.315998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ad [ 19.316054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.316106] page_type: f5(slab) [ 19.316146] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 19.316208] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 19.316249] page dumped because: kasan: bad access detected [ 19.316302] [ 19.316322] Memory state around the buggy address: [ 19.316357] fff00000c77ad000: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 19.316403] fff00000c77ad080: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 19.316513] >fff00000c77ad100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 19.316595] ^ [ 19.316692] fff00000c77ad180: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 19.316737] fff00000c77ad200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 19.316853] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 19.294603] ================================================================== [ 19.294836] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 19.294894] Read of size 1 at addr fff00000c65c2f58 by task kunit_try_catch/258 [ 19.294944] [ 19.294995] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.295078] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.295121] Hardware name: linux,dummy-virt (DT) [ 19.295155] Call trace: [ 19.295180] show_stack+0x20/0x38 (C) [ 19.295231] dump_stack_lvl+0x8c/0xd0 [ 19.295279] print_report+0x118/0x608 [ 19.295325] kasan_report+0xdc/0x128 [ 19.295372] __asan_report_load1_noabort+0x20/0x30 [ 19.295422] memcmp+0x198/0x1d8 [ 19.295465] kasan_memcmp+0x16c/0x300 [ 19.295509] kunit_try_run_case+0x170/0x3f0 [ 19.295560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.295614] kthread+0x328/0x630 [ 19.295657] ret_from_fork+0x10/0x20 [ 19.295705] [ 19.295726] Allocated by task 258: [ 19.295758] kasan_save_stack+0x3c/0x68 [ 19.295799] kasan_save_track+0x20/0x40 [ 19.295839] kasan_save_alloc_info+0x40/0x58 [ 19.295881] __kasan_kmalloc+0xd4/0xd8 [ 19.295917] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.296016] kasan_memcmp+0xbc/0x300 [ 19.296054] kunit_try_run_case+0x170/0x3f0 [ 19.296092] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.296137] kthread+0x328/0x630 [ 19.296370] ret_from_fork+0x10/0x20 [ 19.296428] [ 19.296450] The buggy address belongs to the object at fff00000c65c2f40 [ 19.296450] which belongs to the cache kmalloc-32 of size 32 [ 19.296512] The buggy address is located 0 bytes to the right of [ 19.296512] allocated 24-byte region [fff00000c65c2f40, fff00000c65c2f58) [ 19.296593] [ 19.296655] The buggy address belongs to the physical page: [ 19.296765] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c2 [ 19.296931] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.297044] page_type: f5(slab) [ 19.297084] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 19.297137] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 19.297182] page dumped because: kasan: bad access detected [ 19.297225] [ 19.297244] Memory state around the buggy address: [ 19.297278] fff00000c65c2e00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 19.297724] fff00000c65c2e80: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc [ 19.297880] >fff00000c65c2f00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 19.297958] ^ [ 19.298042] fff00000c65c2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.298089] fff00000c65c3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.298148] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 19.277429] ================================================================== [ 19.277493] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 19.277552] Read of size 1 at addr ffff800080997b4a by task kunit_try_catch/254 [ 19.277604] [ 19.277654] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.277739] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.277769] Hardware name: linux,dummy-virt (DT) [ 19.277802] Call trace: [ 19.277827] show_stack+0x20/0x38 (C) [ 19.277876] dump_stack_lvl+0x8c/0xd0 [ 19.277925] print_report+0x310/0x608 [ 19.277973] kasan_report+0xdc/0x128 [ 19.278032] __asan_report_load1_noabort+0x20/0x30 [ 19.278085] kasan_alloca_oob_right+0x2dc/0x340 [ 19.278133] kunit_try_run_case+0x170/0x3f0 [ 19.278182] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.278266] kthread+0x328/0x630 [ 19.278489] ret_from_fork+0x10/0x20 [ 19.278720] [ 19.278753] The buggy address belongs to stack of task kunit_try_catch/254 [ 19.278853] [ 19.278881] The buggy address belongs to the virtual mapping at [ 19.278881] [ffff800080990000, ffff800080999000) created by: [ 19.278881] kernel_clone+0x150/0x7a8 [ 19.279155] [ 19.279185] The buggy address belongs to the physical page: [ 19.279222] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077af [ 19.279280] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.279365] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.279418] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.279461] page dumped because: kasan: bad access detected [ 19.279586] [ 19.279682] Memory state around the buggy address: [ 19.279717] ffff800080997a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.279765] ffff800080997a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.279818] >ffff800080997b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 19.279859] ^ [ 19.279895] ffff800080997b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 19.280956] ffff800080997c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 19.281022] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 19.261928] ================================================================== [ 19.262025] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 19.262774] Read of size 1 at addr ffff800080997b5f by task kunit_try_catch/252 [ 19.262877] [ 19.263005] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.263104] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.263134] Hardware name: linux,dummy-virt (DT) [ 19.263168] Call trace: [ 19.263194] show_stack+0x20/0x38 (C) [ 19.263248] dump_stack_lvl+0x8c/0xd0 [ 19.263301] print_report+0x310/0x608 [ 19.263348] kasan_report+0xdc/0x128 [ 19.263639] __asan_report_load1_noabort+0x20/0x30 [ 19.263746] kasan_alloca_oob_left+0x2b8/0x310 [ 19.263816] kunit_try_run_case+0x170/0x3f0 [ 19.263899] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.264091] kthread+0x328/0x630 [ 19.264221] ret_from_fork+0x10/0x20 [ 19.264274] [ 19.264296] The buggy address belongs to stack of task kunit_try_catch/252 [ 19.265276] [ 19.265314] The buggy address belongs to the virtual mapping at [ 19.265314] [ffff800080990000, ffff800080999000) created by: [ 19.265314] kernel_clone+0x150/0x7a8 [ 19.265402] [ 19.265427] The buggy address belongs to the physical page: [ 19.265460] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077af [ 19.265517] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.265581] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.265640] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.265682] page dumped because: kasan: bad access detected [ 19.265716] [ 19.265735] Memory state around the buggy address: [ 19.265771] ffff800080997a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.265817] ffff800080997a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.265862] >ffff800080997b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 19.265902] ^ [ 19.265941] ffff800080997b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 19.267499] ffff800080997c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 19.267564] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 19.249734] ================================================================== [ 19.249814] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 19.249873] Read of size 1 at addr ffff800080997c2a by task kunit_try_catch/250 [ 19.249926] [ 19.249965] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.250074] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.250103] Hardware name: linux,dummy-virt (DT) [ 19.250158] Call trace: [ 19.250184] show_stack+0x20/0x38 (C) [ 19.250268] dump_stack_lvl+0x8c/0xd0 [ 19.250333] print_report+0x310/0x608 [ 19.250385] kasan_report+0xdc/0x128 [ 19.250433] __asan_report_load1_noabort+0x20/0x30 [ 19.250489] kasan_stack_oob+0x238/0x270 [ 19.250544] kunit_try_run_case+0x170/0x3f0 [ 19.250778] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.251435] kthread+0x328/0x630 [ 19.252101] ret_from_fork+0x10/0x20 [ 19.252160] [ 19.252232] The buggy address belongs to stack of task kunit_try_catch/250 [ 19.252351] and is located at offset 138 in frame: [ 19.252389] kasan_stack_oob+0x0/0x270 [ 19.252521] [ 19.252552] This frame has 4 objects: [ 19.252654] [48, 49) '__assertion' [ 19.252696] [64, 72) 'array' [ 19.252731] [96, 112) '__assertion' [ 19.252776] [128, 138) 'stack_array' [ 19.252820] [ 19.252859] The buggy address belongs to the virtual mapping at [ 19.252859] [ffff800080990000, ffff800080999000) created by: [ 19.252859] kernel_clone+0x150/0x7a8 [ 19.252951] [ 19.252986] The buggy address belongs to the physical page: [ 19.253709] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077af [ 19.253889] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.254302] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.254368] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.254461] page dumped because: kasan: bad access detected [ 19.254516] [ 19.254851] Memory state around the buggy address: [ 19.254894] ffff800080997b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.254973] ffff800080997b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 19.255036] >ffff800080997c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 19.255082] ^ [ 19.255119] ffff800080997c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 19.255172] ffff800080997d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 19.255484] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 19.218266] ================================================================== [ 19.218340] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 19.218396] Read of size 1 at addr ffff91dea554f58d by task kunit_try_catch/246 [ 19.219698] [ 19.219758] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.219845] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.219884] Hardware name: linux,dummy-virt (DT) [ 19.219917] Call trace: [ 19.220190] show_stack+0x20/0x38 (C) [ 19.220251] dump_stack_lvl+0x8c/0xd0 [ 19.220298] print_report+0x310/0x608 [ 19.220345] kasan_report+0xdc/0x128 [ 19.221948] __asan_report_load1_noabort+0x20/0x30 [ 19.222586] kasan_global_oob_right+0x230/0x270 [ 19.222646] kunit_try_run_case+0x170/0x3f0 [ 19.223538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.224433] kthread+0x328/0x630 [ 19.224919] ret_from_fork+0x10/0x20 [ 19.225230] [ 19.225581] The buggy address belongs to the variable: [ 19.225666] global_array+0xd/0x40 [ 19.225720] [ 19.226453] The buggy address belongs to the virtual mapping at [ 19.226453] [ffff91dea3700000, ffff91dea5601000) created by: [ 19.226453] paging_init+0x66c/0x7d0 [ 19.226953] [ 19.227228] The buggy address belongs to the physical page: [ 19.227267] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d4f [ 19.228127] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 19.228298] raw: 03fffe0000002000 ffffc1ffc01f53c8 ffffc1ffc01f53c8 0000000000000000 [ 19.228600] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.228781] page dumped because: kasan: bad access detected [ 19.228817] [ 19.229214] Memory state around the buggy address: [ 19.229260] ffff91dea554f480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.229520] ffff91dea554f500: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 19.229579] >ffff91dea554f580: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 19.230790] ^ [ 19.230827] ffff91dea554f600: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 19.230872] ffff91dea554f680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.231803] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 19.194174] ================================================================== [ 19.194239] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 19.194297] Free of addr fff00000c69b6e01 by task kunit_try_catch/242 [ 19.194338] [ 19.194373] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.194454] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.194481] Hardware name: linux,dummy-virt (DT) [ 19.194524] Call trace: [ 19.194548] show_stack+0x20/0x38 (C) [ 19.194644] dump_stack_lvl+0x8c/0xd0 [ 19.194695] print_report+0x118/0x608 [ 19.195041] kasan_report_invalid_free+0xc0/0xe8 [ 19.195240] check_slab_allocation+0xfc/0x108 [ 19.195362] __kasan_mempool_poison_object+0x78/0x150 [ 19.195431] mempool_free+0x28c/0x328 [ 19.195477] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 19.195553] mempool_kmalloc_invalid_free+0xc0/0x118 [ 19.195679] kunit_try_run_case+0x170/0x3f0 [ 19.195739] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.196199] kthread+0x328/0x630 [ 19.196251] ret_from_fork+0x10/0x20 [ 19.196300] [ 19.196317] Allocated by task 242: [ 19.196365] kasan_save_stack+0x3c/0x68 [ 19.196422] kasan_save_track+0x20/0x40 [ 19.196460] kasan_save_alloc_info+0x40/0x58 [ 19.196498] __kasan_mempool_unpoison_object+0x11c/0x180 [ 19.196540] remove_element+0x130/0x1f8 [ 19.196576] mempool_alloc_preallocated+0x58/0xc0 [ 19.196613] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 19.196655] mempool_kmalloc_invalid_free+0xc0/0x118 [ 19.196694] kunit_try_run_case+0x170/0x3f0 [ 19.196730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.196773] kthread+0x328/0x630 [ 19.196804] ret_from_fork+0x10/0x20 [ 19.196838] [ 19.196857] The buggy address belongs to the object at fff00000c69b6e00 [ 19.196857] which belongs to the cache kmalloc-128 of size 128 [ 19.196917] The buggy address is located 1 bytes inside of [ 19.196917] 128-byte region [fff00000c69b6e00, fff00000c69b6e80) [ 19.196985] [ 19.197005] The buggy address belongs to the physical page: [ 19.197036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069b6 [ 19.197091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.197140] page_type: f5(slab) [ 19.197178] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.197228] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.197269] page dumped because: kasan: bad access detected [ 19.197299] [ 19.197316] Memory state around the buggy address: [ 19.197349] fff00000c69b6d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.197392] fff00000c69b6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.197433] >fff00000c69b6e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.197472] ^ [ 19.197497] fff00000c69b6e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.197538] fff00000c69b6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.197577] ================================================================== [ 19.206116] ================================================================== [ 19.206441] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 19.206660] Free of addr fff00000c7904001 by task kunit_try_catch/244 [ 19.206706] [ 19.206740] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.206821] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.206849] Hardware name: linux,dummy-virt (DT) [ 19.207009] Call trace: [ 19.207036] show_stack+0x20/0x38 (C) [ 19.207238] dump_stack_lvl+0x8c/0xd0 [ 19.207370] print_report+0x118/0x608 [ 19.207456] kasan_report_invalid_free+0xc0/0xe8 [ 19.207554] __kasan_mempool_poison_object+0xfc/0x150 [ 19.207638] mempool_free+0x28c/0x328 [ 19.207685] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 19.207742] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 19.207865] kunit_try_run_case+0x170/0x3f0 [ 19.208076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.208153] kthread+0x328/0x630 [ 19.208192] ret_from_fork+0x10/0x20 [ 19.208281] [ 19.208336] The buggy address belongs to the physical page: [ 19.208431] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107904 [ 19.208585] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.208634] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.208690] page_type: f8(unknown) [ 19.209638] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.210177] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.210578] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.210883] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.211015] head: 0bfffe0000000002 ffffc1ffc31e4101 00000000ffffffff 00000000ffffffff [ 19.211088] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.211162] page dumped because: kasan: bad access detected [ 19.211228] [ 19.211252] Memory state around the buggy address: [ 19.211289] fff00000c7903f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.211357] fff00000c7903f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.211401] >fff00000c7904000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.211440] ^ [ 19.211466] fff00000c7904080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.211640] fff00000c7904100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.211692] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 19.153505] ================================================================== [ 19.154067] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 19.154481] Free of addr fff00000c7900000 by task kunit_try_catch/238 [ 19.154523] [ 19.154674] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.154912] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.155009] Hardware name: linux,dummy-virt (DT) [ 19.155067] Call trace: [ 19.155090] show_stack+0x20/0x38 (C) [ 19.155474] dump_stack_lvl+0x8c/0xd0 [ 19.155562] print_report+0x118/0x608 [ 19.155683] kasan_report_invalid_free+0xc0/0xe8 [ 19.155782] __kasan_mempool_poison_object+0x14c/0x150 [ 19.155860] mempool_free+0x28c/0x328 [ 19.156093] mempool_double_free_helper+0x150/0x2e8 [ 19.156309] mempool_kmalloc_large_double_free+0xc0/0x118 [ 19.156489] kunit_try_run_case+0x170/0x3f0 [ 19.156592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.157225] kthread+0x328/0x630 [ 19.157364] ret_from_fork+0x10/0x20 [ 19.157535] [ 19.157593] The buggy address belongs to the physical page: [ 19.157909] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107900 [ 19.158159] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.158392] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.158559] page_type: f8(unknown) [ 19.158738] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.158866] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.159079] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.159136] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.160022] head: 0bfffe0000000002 ffffc1ffc31e4001 00000000ffffffff 00000000ffffffff [ 19.160123] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.160167] page dumped because: kasan: bad access detected [ 19.160228] [ 19.160282] Memory state around the buggy address: [ 19.160534] fff00000c78fff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.161038] fff00000c78fff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.161509] >fff00000c7900000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.161667] ^ [ 19.161763] fff00000c7900080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.163049] fff00000c7900100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.163099] ================================================================== [ 19.174764] ================================================================== [ 19.174823] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 19.174876] Free of addr fff00000c7900000 by task kunit_try_catch/240 [ 19.174917] [ 19.174952] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.175044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.175070] Hardware name: linux,dummy-virt (DT) [ 19.176011] Call trace: [ 19.176052] show_stack+0x20/0x38 (C) [ 19.176106] dump_stack_lvl+0x8c/0xd0 [ 19.176162] print_report+0x118/0x608 [ 19.176210] kasan_report_invalid_free+0xc0/0xe8 [ 19.176518] __kasan_mempool_poison_pages+0xe0/0xe8 [ 19.176935] mempool_free+0x24c/0x328 [ 19.177097] mempool_double_free_helper+0x150/0x2e8 [ 19.177447] mempool_page_alloc_double_free+0xbc/0x118 [ 19.177541] kunit_try_run_case+0x170/0x3f0 [ 19.177592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.178673] kthread+0x328/0x630 [ 19.179182] ret_from_fork+0x10/0x20 [ 19.179821] [ 19.179854] The buggy address belongs to the physical page: [ 19.180113] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107900 [ 19.180682] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.180755] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.180806] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.180855] page dumped because: kasan: bad access detected [ 19.180885] [ 19.181393] Memory state around the buggy address: [ 19.182572] fff00000c78fff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.182945] fff00000c78fff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.183003] >fff00000c7900000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.183656] ^ [ 19.183983] fff00000c7900080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.184406] fff00000c7900100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.185158] ================================================================== [ 19.126456] ================================================================== [ 19.126520] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 19.126573] Free of addr fff00000c69b6a00 by task kunit_try_catch/236 [ 19.127212] [ 19.127259] CPU: 1 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.127698] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.127972] Hardware name: linux,dummy-virt (DT) [ 19.128209] Call trace: [ 19.128606] show_stack+0x20/0x38 (C) [ 19.128932] dump_stack_lvl+0x8c/0xd0 [ 19.129280] print_report+0x118/0x608 [ 19.129476] kasan_report_invalid_free+0xc0/0xe8 [ 19.129690] check_slab_allocation+0xd4/0x108 [ 19.130022] __kasan_mempool_poison_object+0x78/0x150 [ 19.130338] mempool_free+0x28c/0x328 [ 19.130561] mempool_double_free_helper+0x150/0x2e8 [ 19.130819] mempool_kmalloc_double_free+0xc0/0x118 [ 19.130971] kunit_try_run_case+0x170/0x3f0 [ 19.131044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.131590] kthread+0x328/0x630 [ 19.131654] ret_from_fork+0x10/0x20 [ 19.131886] [ 19.132092] Allocated by task 236: [ 19.132195] kasan_save_stack+0x3c/0x68 [ 19.132260] kasan_save_track+0x20/0x40 [ 19.132311] kasan_save_alloc_info+0x40/0x58 [ 19.132376] __kasan_mempool_unpoison_object+0x11c/0x180 [ 19.132930] remove_element+0x130/0x1f8 [ 19.133046] mempool_alloc_preallocated+0x58/0xc0 [ 19.133207] mempool_double_free_helper+0x94/0x2e8 [ 19.133381] mempool_kmalloc_double_free+0xc0/0x118 [ 19.133438] kunit_try_run_case+0x170/0x3f0 [ 19.133681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.133900] kthread+0x328/0x630 [ 19.133954] ret_from_fork+0x10/0x20 [ 19.134194] [ 19.134360] Freed by task 236: [ 19.134424] kasan_save_stack+0x3c/0x68 [ 19.134484] kasan_save_track+0x20/0x40 [ 19.134650] kasan_save_free_info+0x4c/0x78 [ 19.135039] __kasan_mempool_poison_object+0xc0/0x150 [ 19.135098] mempool_free+0x28c/0x328 [ 19.135158] mempool_double_free_helper+0x100/0x2e8 [ 19.135372] mempool_kmalloc_double_free+0xc0/0x118 [ 19.135532] kunit_try_run_case+0x170/0x3f0 [ 19.135668] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.135899] kthread+0x328/0x630 [ 19.136004] ret_from_fork+0x10/0x20 [ 19.136155] [ 19.136231] The buggy address belongs to the object at fff00000c69b6a00 [ 19.136231] which belongs to the cache kmalloc-128 of size 128 [ 19.136324] The buggy address is located 0 bytes inside of [ 19.136324] 128-byte region [fff00000c69b6a00, fff00000c69b6a80) [ 19.136533] [ 19.136705] The buggy address belongs to the physical page: [ 19.136744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069b6 [ 19.137345] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.137522] page_type: f5(slab) [ 19.137878] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.138136] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.138256] page dumped because: kasan: bad access detected [ 19.138389] [ 19.138591] Memory state around the buggy address: [ 19.138699] fff00000c69b6900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.138918] fff00000c69b6980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.138964] >fff00000c69b6a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.139012] ^ [ 19.139286] fff00000c69b6a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.139495] fff00000c69b6b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.139556] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 19.109624] ================================================================== [ 19.109735] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 19.110104] Read of size 1 at addr fff00000c7900000 by task kunit_try_catch/234 [ 19.110321] [ 19.110401] CPU: 1 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.110775] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.111077] Hardware name: linux,dummy-virt (DT) [ 19.111316] Call trace: [ 19.111375] show_stack+0x20/0x38 (C) [ 19.111489] dump_stack_lvl+0x8c/0xd0 [ 19.111581] print_report+0x118/0x608 [ 19.111763] kasan_report+0xdc/0x128 [ 19.111869] __asan_report_load1_noabort+0x20/0x30 [ 19.112045] mempool_uaf_helper+0x314/0x340 [ 19.112344] mempool_page_alloc_uaf+0xc0/0x118 [ 19.112561] kunit_try_run_case+0x170/0x3f0 [ 19.112658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.113097] kthread+0x328/0x630 [ 19.113172] ret_from_fork+0x10/0x20 [ 19.113649] [ 19.113678] The buggy address belongs to the physical page: [ 19.113746] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107900 [ 19.114224] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.114374] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.114504] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.114547] page dumped because: kasan: bad access detected [ 19.114579] [ 19.114788] Memory state around the buggy address: [ 19.115127] fff00000c78fff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.115225] fff00000c78fff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.115308] >fff00000c7900000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.115440] ^ [ 19.115535] fff00000c7900080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.115601] fff00000c7900100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.115839] ================================================================== [ 19.050033] ================================================================== [ 19.050229] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 19.050421] Read of size 1 at addr fff00000c7900000 by task kunit_try_catch/230 [ 19.050549] [ 19.050595] CPU: 1 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.051145] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.051299] Hardware name: linux,dummy-virt (DT) [ 19.051347] Call trace: [ 19.051373] show_stack+0x20/0x38 (C) [ 19.051642] dump_stack_lvl+0x8c/0xd0 [ 19.051821] print_report+0x118/0x608 [ 19.051965] kasan_report+0xdc/0x128 [ 19.052087] __asan_report_load1_noabort+0x20/0x30 [ 19.052165] mempool_uaf_helper+0x314/0x340 [ 19.052271] mempool_kmalloc_large_uaf+0xc4/0x120 [ 19.052324] kunit_try_run_case+0x170/0x3f0 [ 19.052384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.052438] kthread+0x328/0x630 [ 19.052487] ret_from_fork+0x10/0x20 [ 19.052537] [ 19.052568] The buggy address belongs to the physical page: [ 19.052612] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107900 [ 19.052686] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.052735] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.052792] page_type: f8(unknown) [ 19.052841] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.052896] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.052946] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.053016] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.053070] head: 0bfffe0000000002 ffffc1ffc31e4001 00000000ffffffff 00000000ffffffff [ 19.053122] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.053163] page dumped because: kasan: bad access detected [ 19.053195] [ 19.053213] Memory state around the buggy address: [ 19.053258] fff00000c78fff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.053302] fff00000c78fff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.053346] >fff00000c7900000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.053389] ^ [ 19.053437] fff00000c7900080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.053488] fff00000c7900100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.053537] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 19.028739] ================================================================== [ 19.029064] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 19.029557] Read of size 1 at addr fff00000c69b6600 by task kunit_try_catch/228 [ 19.029642] [ 19.029951] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.030058] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.030085] Hardware name: linux,dummy-virt (DT) [ 19.030153] Call trace: [ 19.030179] show_stack+0x20/0x38 (C) [ 19.030233] dump_stack_lvl+0x8c/0xd0 [ 19.030283] print_report+0x118/0x608 [ 19.030809] kasan_report+0xdc/0x128 [ 19.030887] __asan_report_load1_noabort+0x20/0x30 [ 19.030947] mempool_uaf_helper+0x314/0x340 [ 19.031004] mempool_kmalloc_uaf+0xc4/0x120 [ 19.031392] kunit_try_run_case+0x170/0x3f0 [ 19.031540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.031692] kthread+0x328/0x630 [ 19.031755] ret_from_fork+0x10/0x20 [ 19.032145] [ 19.032205] Allocated by task 228: [ 19.032242] kasan_save_stack+0x3c/0x68 [ 19.032556] kasan_save_track+0x20/0x40 [ 19.032668] kasan_save_alloc_info+0x40/0x58 [ 19.032711] __kasan_mempool_unpoison_object+0x11c/0x180 [ 19.032994] remove_element+0x130/0x1f8 [ 19.033132] mempool_alloc_preallocated+0x58/0xc0 [ 19.033465] mempool_uaf_helper+0xa4/0x340 [ 19.033645] mempool_kmalloc_uaf+0xc4/0x120 [ 19.033737] kunit_try_run_case+0x170/0x3f0 [ 19.033877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.034350] kthread+0x328/0x630 [ 19.034432] ret_from_fork+0x10/0x20 [ 19.034555] [ 19.034574] Freed by task 228: [ 19.034855] kasan_save_stack+0x3c/0x68 [ 19.035018] kasan_save_track+0x20/0x40 [ 19.035119] kasan_save_free_info+0x4c/0x78 [ 19.035250] __kasan_mempool_poison_object+0xc0/0x150 [ 19.035480] mempool_free+0x28c/0x328 [ 19.035542] mempool_uaf_helper+0x104/0x340 [ 19.035580] mempool_kmalloc_uaf+0xc4/0x120 [ 19.035617] kunit_try_run_case+0x170/0x3f0 [ 19.035664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.035709] kthread+0x328/0x630 [ 19.035760] ret_from_fork+0x10/0x20 [ 19.035797] [ 19.035819] The buggy address belongs to the object at fff00000c69b6600 [ 19.035819] which belongs to the cache kmalloc-128 of size 128 [ 19.036485] The buggy address is located 0 bytes inside of [ 19.036485] freed 128-byte region [fff00000c69b6600, fff00000c69b6680) [ 19.036569] [ 19.036678] The buggy address belongs to the physical page: [ 19.036756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069b6 [ 19.037157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.037239] page_type: f5(slab) [ 19.037301] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.037419] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.037538] page dumped because: kasan: bad access detected [ 19.037606] [ 19.037728] Memory state around the buggy address: [ 19.037793] fff00000c69b6500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.037859] fff00000c69b6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.038224] >fff00000c69b6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.038286] ^ [ 19.038395] fff00000c69b6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.038488] fff00000c69b6700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.038648] ================================================================== [ 19.068732] ================================================================== [ 19.068812] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 19.068872] Read of size 1 at addr fff00000c65c5240 by task kunit_try_catch/232 [ 19.068920] [ 19.068965] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.069063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.069088] Hardware name: linux,dummy-virt (DT) [ 19.069443] Call trace: [ 19.069654] show_stack+0x20/0x38 (C) [ 19.069718] dump_stack_lvl+0x8c/0xd0 [ 19.069766] print_report+0x118/0x608 [ 19.069812] kasan_report+0xdc/0x128 [ 19.069856] __asan_report_load1_noabort+0x20/0x30 [ 19.070502] mempool_uaf_helper+0x314/0x340 [ 19.070901] mempool_slab_uaf+0xc0/0x118 [ 19.070961] kunit_try_run_case+0x170/0x3f0 [ 19.071031] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.071419] kthread+0x328/0x630 [ 19.071537] ret_from_fork+0x10/0x20 [ 19.071591] [ 19.071612] Allocated by task 232: [ 19.071669] kasan_save_stack+0x3c/0x68 [ 19.072026] kasan_save_track+0x20/0x40 [ 19.072103] kasan_save_alloc_info+0x40/0x58 [ 19.072155] __kasan_mempool_unpoison_object+0xbc/0x180 [ 19.072441] remove_element+0x16c/0x1f8 [ 19.072620] mempool_alloc_preallocated+0x58/0xc0 [ 19.072716] mempool_uaf_helper+0xa4/0x340 [ 19.072760] mempool_slab_uaf+0xc0/0x118 [ 19.073017] kunit_try_run_case+0x170/0x3f0 [ 19.073151] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.073351] kthread+0x328/0x630 [ 19.073419] ret_from_fork+0x10/0x20 [ 19.073476] [ 19.073496] Freed by task 232: [ 19.073808] kasan_save_stack+0x3c/0x68 [ 19.073924] kasan_save_track+0x20/0x40 [ 19.073964] kasan_save_free_info+0x4c/0x78 [ 19.074229] __kasan_mempool_poison_object+0xc0/0x150 [ 19.074365] mempool_free+0x28c/0x328 [ 19.074422] mempool_uaf_helper+0x104/0x340 [ 19.074734] mempool_slab_uaf+0xc0/0x118 [ 19.074827] kunit_try_run_case+0x170/0x3f0 [ 19.074894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.075220] kthread+0x328/0x630 [ 19.075370] ret_from_fork+0x10/0x20 [ 19.075455] [ 19.075587] The buggy address belongs to the object at fff00000c65c5240 [ 19.075587] which belongs to the cache test_cache of size 123 [ 19.075711] The buggy address is located 0 bytes inside of [ 19.075711] freed 123-byte region [fff00000c65c5240, fff00000c65c52bb) [ 19.076203] [ 19.076255] The buggy address belongs to the physical page: [ 19.076320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.076481] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.076537] page_type: f5(slab) [ 19.076913] raw: 0bfffe0000000000 fff00000c1aa5c80 dead000000000122 0000000000000000 [ 19.077108] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 19.077340] page dumped because: kasan: bad access detected [ 19.077510] [ 19.077601] Memory state around the buggy address: [ 19.077696] fff00000c65c5100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.077784] fff00000c65c5180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.077966] >fff00000c65c5200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 19.078027] ^ [ 19.078327] fff00000c65c5280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.078394] fff00000c65c5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.078647] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 18.964722] ================================================================== [ 18.964787] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 18.964842] Read of size 1 at addr fff00000c78fe001 by task kunit_try_catch/224 [ 18.964891] [ 18.964928] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.965030] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.966734] Hardware name: linux,dummy-virt (DT) [ 18.966848] Call trace: [ 18.967376] show_stack+0x20/0x38 (C) [ 18.967729] dump_stack_lvl+0x8c/0xd0 [ 18.968039] print_report+0x118/0x608 [ 18.968245] kasan_report+0xdc/0x128 [ 18.968505] __asan_report_load1_noabort+0x20/0x30 [ 18.968772] mempool_oob_right_helper+0x2ac/0x2f0 [ 18.968827] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 18.968878] kunit_try_run_case+0x170/0x3f0 [ 18.969128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.969260] kthread+0x328/0x630 [ 18.969360] ret_from_fork+0x10/0x20 [ 18.969606] [ 18.969901] The buggy address belongs to the physical page: [ 18.970124] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078fc [ 18.970362] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.970591] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.970737] page_type: f8(unknown) [ 18.970988] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.971051] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.971234] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.971320] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.971556] head: 0bfffe0000000002 ffffc1ffc31e3f01 00000000ffffffff 00000000ffffffff [ 18.971605] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.971645] page dumped because: kasan: bad access detected [ 18.971679] [ 18.971765] Memory state around the buggy address: [ 18.971801] fff00000c78fdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.972341] fff00000c78fdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.972411] >fff00000c78fe000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.972816] ^ [ 18.972881] fff00000c78fe080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.972930] fff00000c78fe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.972972] ================================================================== [ 18.987641] ================================================================== [ 18.987712] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 18.988137] Read of size 1 at addr fff00000c77ab2bb by task kunit_try_catch/226 [ 18.988207] [ 18.988287] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.988399] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.988456] Hardware name: linux,dummy-virt (DT) [ 18.988503] Call trace: [ 18.988529] show_stack+0x20/0x38 (C) [ 18.988578] dump_stack_lvl+0x8c/0xd0 [ 18.988636] print_report+0x118/0x608 [ 18.988868] kasan_report+0xdc/0x128 [ 18.988927] __asan_report_load1_noabort+0x20/0x30 [ 18.989032] mempool_oob_right_helper+0x2ac/0x2f0 [ 18.989108] mempool_slab_oob_right+0xc0/0x118 [ 18.989156] kunit_try_run_case+0x170/0x3f0 [ 18.989205] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.989430] kthread+0x328/0x630 [ 18.989487] ret_from_fork+0x10/0x20 [ 18.989592] [ 18.989654] Allocated by task 226: [ 18.989703] kasan_save_stack+0x3c/0x68 [ 18.989746] kasan_save_track+0x20/0x40 [ 18.989791] kasan_save_alloc_info+0x40/0x58 [ 18.989830] __kasan_mempool_unpoison_object+0xbc/0x180 [ 18.990090] remove_element+0x16c/0x1f8 [ 18.990187] mempool_alloc_preallocated+0x58/0xc0 [ 18.990229] mempool_oob_right_helper+0x98/0x2f0 [ 18.990285] mempool_slab_oob_right+0xc0/0x118 [ 18.990325] kunit_try_run_case+0x170/0x3f0 [ 18.990371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.990424] kthread+0x328/0x630 [ 18.990464] ret_from_fork+0x10/0x20 [ 18.990501] [ 18.990520] The buggy address belongs to the object at fff00000c77ab240 [ 18.990520] which belongs to the cache test_cache of size 123 [ 18.990581] The buggy address is located 0 bytes to the right of [ 18.990581] allocated 123-byte region [fff00000c77ab240, fff00000c77ab2bb) [ 18.990659] [ 18.990679] The buggy address belongs to the physical page: [ 18.990712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ab [ 18.990880] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.990936] page_type: f5(slab) [ 18.991099] raw: 0bfffe0000000000 fff00000c1aa5b40 dead000000000122 0000000000000000 [ 18.991155] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 18.991196] page dumped because: kasan: bad access detected [ 18.991278] [ 18.991355] Memory state around the buggy address: [ 18.991498] fff00000c77ab180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.991571] fff00000c77ab200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 18.991611] >fff00000c77ab280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 18.991722] ^ [ 18.991807] fff00000c77ab300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.991885] fff00000c77ab380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.992010] ================================================================== [ 18.945431] ================================================================== [ 18.945509] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 18.945581] Read of size 1 at addr fff00000c69b6273 by task kunit_try_catch/222 [ 18.945638] [ 18.945682] CPU: 1 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.945770] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.945797] Hardware name: linux,dummy-virt (DT) [ 18.945831] Call trace: [ 18.945855] show_stack+0x20/0x38 (C) [ 18.945906] dump_stack_lvl+0x8c/0xd0 [ 18.945956] print_report+0x118/0x608 [ 18.946017] kasan_report+0xdc/0x128 [ 18.946060] __asan_report_load1_noabort+0x20/0x30 [ 18.946110] mempool_oob_right_helper+0x2ac/0x2f0 [ 18.946159] mempool_kmalloc_oob_right+0xc4/0x120 [ 18.946206] kunit_try_run_case+0x170/0x3f0 [ 18.946255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.946307] kthread+0x328/0x630 [ 18.946348] ret_from_fork+0x10/0x20 [ 18.946397] [ 18.946416] Allocated by task 222: [ 18.946447] kasan_save_stack+0x3c/0x68 [ 18.946488] kasan_save_track+0x20/0x40 [ 18.946524] kasan_save_alloc_info+0x40/0x58 [ 18.946564] __kasan_mempool_unpoison_object+0x11c/0x180 [ 18.946616] remove_element+0x130/0x1f8 [ 18.947083] mempool_alloc_preallocated+0x58/0xc0 [ 18.947124] mempool_oob_right_helper+0x98/0x2f0 [ 18.947162] mempool_kmalloc_oob_right+0xc4/0x120 [ 18.947202] kunit_try_run_case+0x170/0x3f0 [ 18.947238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.947280] kthread+0x328/0x630 [ 18.947314] ret_from_fork+0x10/0x20 [ 18.947348] [ 18.947369] The buggy address belongs to the object at fff00000c69b6200 [ 18.947369] which belongs to the cache kmalloc-128 of size 128 [ 18.947429] The buggy address is located 0 bytes to the right of [ 18.947429] allocated 115-byte region [fff00000c69b6200, fff00000c69b6273) [ 18.947492] [ 18.947515] The buggy address belongs to the physical page: [ 18.947547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069b6 [ 18.947603] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.947654] page_type: f5(slab) [ 18.947695] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.947744] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.947784] page dumped because: kasan: bad access detected [ 18.947816] [ 18.947834] Memory state around the buggy address: [ 18.947868] fff00000c69b6100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.947913] fff00000c69b6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.947954] >fff00000c69b6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.948003] ^ [ 18.948044] fff00000c69b6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.948085] fff00000c69b6300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.948124] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 18.393468] ================================================================== [ 18.393556] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 18.393641] Read of size 1 at addr fff00000c1aa58c0 by task kunit_try_catch/216 [ 18.393693] [ 18.393738] CPU: 1 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.393825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.393853] Hardware name: linux,dummy-virt (DT) [ 18.393887] Call trace: [ 18.393911] show_stack+0x20/0x38 (C) [ 18.393963] dump_stack_lvl+0x8c/0xd0 [ 18.394029] print_report+0x118/0x608 [ 18.394075] kasan_report+0xdc/0x128 [ 18.394119] __kasan_check_byte+0x54/0x70 [ 18.394166] kmem_cache_destroy+0x34/0x218 [ 18.394214] kmem_cache_double_destroy+0x174/0x300 [ 18.394262] kunit_try_run_case+0x170/0x3f0 [ 18.394311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.394363] kthread+0x328/0x630 [ 18.394406] ret_from_fork+0x10/0x20 [ 18.394455] [ 18.394473] Allocated by task 216: [ 18.394502] kasan_save_stack+0x3c/0x68 [ 18.394545] kasan_save_track+0x20/0x40 [ 18.394582] kasan_save_alloc_info+0x40/0x58 [ 18.394638] __kasan_slab_alloc+0xa8/0xb0 [ 18.394677] kmem_cache_alloc_noprof+0x10c/0x398 [ 18.394719] __kmem_cache_create_args+0x178/0x280 [ 18.394758] kmem_cache_double_destroy+0xc0/0x300 [ 18.394798] kunit_try_run_case+0x170/0x3f0 [ 18.394836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.394879] kthread+0x328/0x630 [ 18.394912] ret_from_fork+0x10/0x20 [ 18.394948] [ 18.394966] Freed by task 216: [ 18.395006] kasan_save_stack+0x3c/0x68 [ 18.395044] kasan_save_track+0x20/0x40 [ 18.395081] kasan_save_free_info+0x4c/0x78 [ 18.395120] __kasan_slab_free+0x6c/0x98 [ 18.395156] kmem_cache_free+0x260/0x468 [ 18.395191] slab_kmem_cache_release+0x38/0x50 [ 18.395230] kmem_cache_release+0x1c/0x30 [ 18.395264] kobject_put+0x17c/0x420 [ 18.395300] sysfs_slab_release+0x1c/0x30 [ 18.395339] kmem_cache_destroy+0x118/0x218 [ 18.395376] kmem_cache_double_destroy+0x128/0x300 [ 18.395415] kunit_try_run_case+0x170/0x3f0 [ 18.395453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.395494] kthread+0x328/0x630 [ 18.395527] ret_from_fork+0x10/0x20 [ 18.395562] [ 18.395580] The buggy address belongs to the object at fff00000c1aa58c0 [ 18.395580] which belongs to the cache kmem_cache of size 208 [ 18.395638] The buggy address is located 0 bytes inside of [ 18.395638] freed 208-byte region [fff00000c1aa58c0, fff00000c1aa5990) [ 18.395698] [ 18.395720] The buggy address belongs to the physical page: [ 18.395754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aa5 [ 18.395809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.395862] page_type: f5(slab) [ 18.395903] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 18.395952] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 18.396004] page dumped because: kasan: bad access detected [ 18.396035] [ 18.396053] Memory state around the buggy address: [ 18.396089] fff00000c1aa5780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.396132] fff00000c1aa5800: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc [ 18.396174] >fff00000c1aa5880: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 18.396212] ^ [ 18.396246] fff00000c1aa5900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.396287] fff00000c1aa5980: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.396325] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 18.188556] ================================================================== [ 18.188714] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 18.188792] Read of size 1 at addr fff00000c77a0000 by task kunit_try_catch/214 [ 18.188845] [ 18.188888] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.188971] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.189010] Hardware name: linux,dummy-virt (DT) [ 18.189967] Call trace: [ 18.190031] show_stack+0x20/0x38 (C) [ 18.190146] dump_stack_lvl+0x8c/0xd0 [ 18.190200] print_report+0x118/0x608 [ 18.190248] kasan_report+0xdc/0x128 [ 18.190362] __asan_report_load1_noabort+0x20/0x30 [ 18.190864] kmem_cache_rcu_uaf+0x388/0x468 [ 18.190918] kunit_try_run_case+0x170/0x3f0 [ 18.190971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.191395] kthread+0x328/0x630 [ 18.191562] ret_from_fork+0x10/0x20 [ 18.191736] [ 18.191853] Allocated by task 214: [ 18.191887] kasan_save_stack+0x3c/0x68 [ 18.192203] kasan_save_track+0x20/0x40 [ 18.192451] kasan_save_alloc_info+0x40/0x58 [ 18.192492] __kasan_slab_alloc+0xa8/0xb0 [ 18.192527] kmem_cache_alloc_noprof+0x10c/0x398 [ 18.192574] kmem_cache_rcu_uaf+0x12c/0x468 [ 18.192611] kunit_try_run_case+0x170/0x3f0 [ 18.192647] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.192907] kthread+0x328/0x630 [ 18.192951] ret_from_fork+0x10/0x20 [ 18.193290] [ 18.193316] Freed by task 0: [ 18.193345] kasan_save_stack+0x3c/0x68 [ 18.193797] kasan_save_track+0x20/0x40 [ 18.194097] kasan_save_free_info+0x4c/0x78 [ 18.194154] __kasan_slab_free+0x6c/0x98 [ 18.194273] slab_free_after_rcu_debug+0xd4/0x2f8 [ 18.194584] rcu_core+0x9f4/0x1e20 [ 18.194750] rcu_core_si+0x18/0x30 [ 18.194788] handle_softirqs+0x374/0xb28 [ 18.194856] __do_softirq+0x1c/0x28 [ 18.194898] [ 18.194969] Last potentially related work creation: [ 18.195156] kasan_save_stack+0x3c/0x68 [ 18.195311] kasan_record_aux_stack+0xb4/0xc8 [ 18.195390] kmem_cache_free+0x120/0x468 [ 18.195690] kmem_cache_rcu_uaf+0x16c/0x468 [ 18.195944] kunit_try_run_case+0x170/0x3f0 [ 18.196328] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.196445] kthread+0x328/0x630 [ 18.196480] ret_from_fork+0x10/0x20 [ 18.197132] [ 18.197293] The buggy address belongs to the object at fff00000c77a0000 [ 18.197293] which belongs to the cache test_cache of size 200 [ 18.197855] The buggy address is located 0 bytes inside of [ 18.197855] freed 200-byte region [fff00000c77a0000, fff00000c77a00c8) [ 18.198204] [ 18.198238] The buggy address belongs to the physical page: [ 18.198444] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077a0 [ 18.198758] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.198820] page_type: f5(slab) [ 18.198862] raw: 0bfffe0000000000 fff00000c5d09500 dead000000000122 0000000000000000 [ 18.199107] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 18.199205] page dumped because: kasan: bad access detected [ 18.199283] [ 18.199300] Memory state around the buggy address: [ 18.199337] fff00000c779ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.199381] fff00000c779ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.199423] >fff00000c77a0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.200028] ^ [ 18.200358] fff00000c77a0080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 18.200412] fff00000c77a0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.200453] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 17.616739] ================================================================== [ 17.616815] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 17.616879] Free of addr fff00000c77a1001 by task kunit_try_catch/212 [ 17.616923] [ 17.616963] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 17.617332] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.617666] Hardware name: linux,dummy-virt (DT) [ 17.617819] Call trace: [ 17.617965] show_stack+0x20/0x38 (C) [ 17.618086] dump_stack_lvl+0x8c/0xd0 [ 17.618338] print_report+0x118/0x608 [ 17.618558] kasan_report_invalid_free+0xc0/0xe8 [ 17.618656] check_slab_allocation+0xfc/0x108 [ 17.618706] __kasan_slab_pre_free+0x2c/0x48 [ 17.618754] kmem_cache_free+0xf0/0x468 [ 17.618799] kmem_cache_invalid_free+0x184/0x3c8 [ 17.618961] kunit_try_run_case+0x170/0x3f0 [ 17.619461] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.619692] kthread+0x328/0x630 [ 17.619740] ret_from_fork+0x10/0x20 [ 17.619788] [ 17.619808] Allocated by task 212: [ 17.619902] kasan_save_stack+0x3c/0x68 [ 17.620199] kasan_save_track+0x20/0x40 [ 17.620366] kasan_save_alloc_info+0x40/0x58 [ 17.620415] __kasan_slab_alloc+0xa8/0xb0 [ 17.620556] kmem_cache_alloc_noprof+0x10c/0x398 [ 17.620629] kmem_cache_invalid_free+0x12c/0x3c8 [ 17.620685] kunit_try_run_case+0x170/0x3f0 [ 17.620747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.620790] kthread+0x328/0x630 [ 17.620821] ret_from_fork+0x10/0x20 [ 17.621123] [ 17.621146] The buggy address belongs to the object at fff00000c77a1000 [ 17.621146] which belongs to the cache test_cache of size 200 [ 17.621553] The buggy address is located 1 bytes inside of [ 17.621553] 200-byte region [fff00000c77a1000, fff00000c77a10c8) [ 17.621829] [ 17.621851] The buggy address belongs to the physical page: [ 17.621897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077a1 [ 17.621961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.622039] page_type: f5(slab) [ 17.622080] raw: 0bfffe0000000000 fff00000c5d093c0 dead000000000122 0000000000000000 [ 17.622131] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 17.622638] page dumped because: kasan: bad access detected [ 17.622678] [ 17.622695] Memory state around the buggy address: [ 17.622733] fff00000c77a0f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.622778] fff00000c77a0f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.623081] >fff00000c77a1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.623334] ^ [ 17.623404] fff00000c77a1080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 17.623450] fff00000c77a1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.623489] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 17.581863] ================================================================== [ 17.582656] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 17.582733] Free of addr fff00000c77a5000 by task kunit_try_catch/210 [ 17.582776] [ 17.582818] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 17.582902] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.583572] Hardware name: linux,dummy-virt (DT) [ 17.583616] Call trace: [ 17.583897] show_stack+0x20/0x38 (C) [ 17.584151] dump_stack_lvl+0x8c/0xd0 [ 17.584204] print_report+0x118/0x608 [ 17.584251] kasan_report_invalid_free+0xc0/0xe8 [ 17.584663] check_slab_allocation+0xd4/0x108 [ 17.584726] __kasan_slab_pre_free+0x2c/0x48 [ 17.584805] kmem_cache_free+0xf0/0x468 [ 17.584855] kmem_cache_double_free+0x190/0x3c8 [ 17.584901] kunit_try_run_case+0x170/0x3f0 [ 17.584958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.585073] kthread+0x328/0x630 [ 17.585183] ret_from_fork+0x10/0x20 [ 17.585343] [ 17.585450] Allocated by task 210: [ 17.585607] kasan_save_stack+0x3c/0x68 [ 17.585683] kasan_save_track+0x20/0x40 [ 17.585826] kasan_save_alloc_info+0x40/0x58 [ 17.585865] __kasan_slab_alloc+0xa8/0xb0 [ 17.585903] kmem_cache_alloc_noprof+0x10c/0x398 [ 17.586225] kmem_cache_double_free+0x12c/0x3c8 [ 17.586475] kunit_try_run_case+0x170/0x3f0 [ 17.586551] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.586595] kthread+0x328/0x630 [ 17.586631] ret_from_fork+0x10/0x20 [ 17.586669] [ 17.586732] Freed by task 210: [ 17.586819] kasan_save_stack+0x3c/0x68 [ 17.586991] kasan_save_track+0x20/0x40 [ 17.587032] kasan_save_free_info+0x4c/0x78 [ 17.587073] __kasan_slab_free+0x6c/0x98 [ 17.587110] kmem_cache_free+0x260/0x468 [ 17.587716] kmem_cache_double_free+0x140/0x3c8 [ 17.587763] kunit_try_run_case+0x170/0x3f0 [ 17.587829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.587873] kthread+0x328/0x630 [ 17.587903] ret_from_fork+0x10/0x20 [ 17.587939] [ 17.587960] The buggy address belongs to the object at fff00000c77a5000 [ 17.587960] which belongs to the cache test_cache of size 200 [ 17.588032] The buggy address is located 0 bytes inside of [ 17.588032] 200-byte region [fff00000c77a5000, fff00000c77a50c8) [ 17.588489] [ 17.588617] The buggy address belongs to the physical page: [ 17.588845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077a5 [ 17.588953] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.589022] page_type: f5(slab) [ 17.589063] raw: 0bfffe0000000000 fff00000c5d09280 dead000000000122 0000000000000000 [ 17.589114] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 17.589435] page dumped because: kasan: bad access detected [ 17.589525] [ 17.589589] Memory state around the buggy address: [ 17.589672] fff00000c77a4f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.589747] fff00000c77a4f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.589867] >fff00000c77a5000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.589907] ^ [ 17.589972] fff00000c77a5080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 17.590034] fff00000c77a5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.590348] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 17.419825] ================================================================== [ 17.419887] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 17.419941] Read of size 1 at addr fff00000c77a60c8 by task kunit_try_catch/208 [ 17.420024] [ 17.420059] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 17.420140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.420166] Hardware name: linux,dummy-virt (DT) [ 17.420197] Call trace: [ 17.420219] show_stack+0x20/0x38 (C) [ 17.420419] dump_stack_lvl+0x8c/0xd0 [ 17.420570] print_report+0x118/0x608 [ 17.420638] kasan_report+0xdc/0x128 [ 17.420683] __asan_report_load1_noabort+0x20/0x30 [ 17.420734] kmem_cache_oob+0x344/0x430 [ 17.420778] kunit_try_run_case+0x170/0x3f0 [ 17.420842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.420915] kthread+0x328/0x630 [ 17.420962] ret_from_fork+0x10/0x20 [ 17.421048] [ 17.421087] Allocated by task 208: [ 17.421133] kasan_save_stack+0x3c/0x68 [ 17.421182] kasan_save_track+0x20/0x40 [ 17.421238] kasan_save_alloc_info+0x40/0x58 [ 17.421294] __kasan_slab_alloc+0xa8/0xb0 [ 17.421332] kmem_cache_alloc_noprof+0x10c/0x398 [ 17.421378] kmem_cache_oob+0x12c/0x430 [ 17.421413] kunit_try_run_case+0x170/0x3f0 [ 17.421451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.421498] kthread+0x328/0x630 [ 17.421530] ret_from_fork+0x10/0x20 [ 17.421566] [ 17.421584] The buggy address belongs to the object at fff00000c77a6000 [ 17.421584] which belongs to the cache test_cache of size 200 [ 17.421802] The buggy address is located 0 bytes to the right of [ 17.421802] allocated 200-byte region [fff00000c77a6000, fff00000c77a60c8) [ 17.421873] [ 17.421921] The buggy address belongs to the physical page: [ 17.421953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077a6 [ 17.422045] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.422096] page_type: f5(slab) [ 17.422170] raw: 0bfffe0000000000 fff00000c5d09140 dead000000000122 0000000000000000 [ 17.422222] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 17.422279] page dumped because: kasan: bad access detected [ 17.422320] [ 17.422358] Memory state around the buggy address: [ 17.422406] fff00000c77a5f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.422450] fff00000c77a6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.422493] >fff00000c77a6080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 17.422530] ^ [ 17.422754] fff00000c77a6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.422830] fff00000c77a6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.422968] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 17.393354] ================================================================== [ 17.393467] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 17.393521] Read of size 8 at addr fff00000c77d50c0 by task kunit_try_catch/201 [ 17.393607] [ 17.393668] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 17.393750] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.393777] Hardware name: linux,dummy-virt (DT) [ 17.393806] Call trace: [ 17.393859] show_stack+0x20/0x38 (C) [ 17.393925] dump_stack_lvl+0x8c/0xd0 [ 17.393998] print_report+0x118/0x608 [ 17.394063] kasan_report+0xdc/0x128 [ 17.394144] __asan_report_load8_noabort+0x20/0x30 [ 17.394222] workqueue_uaf+0x480/0x4a8 [ 17.394267] kunit_try_run_case+0x170/0x3f0 [ 17.394313] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.394562] kthread+0x328/0x630 [ 17.394660] ret_from_fork+0x10/0x20 [ 17.394853] [ 17.394929] Allocated by task 201: [ 17.395085] kasan_save_stack+0x3c/0x68 [ 17.395179] kasan_save_track+0x20/0x40 [ 17.395319] kasan_save_alloc_info+0x40/0x58 [ 17.395454] __kasan_kmalloc+0xd4/0xd8 [ 17.395527] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.395578] workqueue_uaf+0x13c/0x4a8 [ 17.395620] kunit_try_run_case+0x170/0x3f0 [ 17.395658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.395699] kthread+0x328/0x630 [ 17.395732] ret_from_fork+0x10/0x20 [ 17.395767] [ 17.395784] Freed by task 76: [ 17.395811] kasan_save_stack+0x3c/0x68 [ 17.395847] kasan_save_track+0x20/0x40 [ 17.395903] kasan_save_free_info+0x4c/0x78 [ 17.395943] __kasan_slab_free+0x6c/0x98 [ 17.395991] kfree+0x214/0x3c8 [ 17.396024] workqueue_uaf_work+0x18/0x30 [ 17.396124] process_one_work+0x530/0xf98 [ 17.396196] worker_thread+0x618/0xf38 [ 17.396355] kthread+0x328/0x630 [ 17.396489] ret_from_fork+0x10/0x20 [ 17.396638] [ 17.396716] Last potentially related work creation: [ 17.396824] kasan_save_stack+0x3c/0x68 [ 17.396874] kasan_record_aux_stack+0xb4/0xc8 [ 17.396914] __queue_work+0x65c/0x1008 [ 17.397126] queue_work_on+0xbc/0xf8 [ 17.397255] workqueue_uaf+0x210/0x4a8 [ 17.397386] kunit_try_run_case+0x170/0x3f0 [ 17.397424] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.397590] kthread+0x328/0x630 [ 17.397629] ret_from_fork+0x10/0x20 [ 17.397666] [ 17.397686] The buggy address belongs to the object at fff00000c77d50c0 [ 17.397686] which belongs to the cache kmalloc-32 of size 32 [ 17.397856] The buggy address is located 0 bytes inside of [ 17.397856] freed 32-byte region [fff00000c77d50c0, fff00000c77d50e0) [ 17.397973] [ 17.398078] The buggy address belongs to the physical page: [ 17.398137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077d5 [ 17.398223] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.398325] page_type: f5(slab) [ 17.398398] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 17.398462] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 17.398800] page dumped because: kasan: bad access detected [ 17.398920] [ 17.398989] Memory state around the buggy address: [ 17.399050] fff00000c77d4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.399104] fff00000c77d5000: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 17.399145] >fff00000c77d5080: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc [ 17.399182] ^ [ 17.399222] fff00000c77d5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.399273] fff00000c77d5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.399319] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 17.377219] ================================================================== [ 17.377576] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 17.377655] Read of size 4 at addr fff00000c69bfec0 by task swapper/0/0 [ 17.377703] [ 17.377742] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 17.377823] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.377851] Hardware name: linux,dummy-virt (DT) [ 17.378639] Call trace: [ 17.378677] show_stack+0x20/0x38 (C) [ 17.379297] dump_stack_lvl+0x8c/0xd0 [ 17.379359] print_report+0x118/0x608 [ 17.379439] kasan_report+0xdc/0x128 [ 17.379484] __asan_report_load4_noabort+0x20/0x30 [ 17.379565] rcu_uaf_reclaim+0x64/0x70 [ 17.379611] rcu_core+0x9f4/0x1e20 [ 17.379657] rcu_core_si+0x18/0x30 [ 17.379698] handle_softirqs+0x374/0xb28 [ 17.379744] __do_softirq+0x1c/0x28 [ 17.379784] ____do_softirq+0x18/0x30 [ 17.379826] call_on_irq_stack+0x24/0x30 [ 17.379870] do_softirq_own_stack+0x24/0x38 [ 17.379916] __irq_exit_rcu+0x1fc/0x318 [ 17.379959] irq_exit_rcu+0x1c/0x80 [ 17.380049] el1_interrupt+0x38/0x58 [ 17.380119] el1h_64_irq_handler+0x18/0x28 [ 17.380172] el1h_64_irq+0x6c/0x70 [ 17.380302] arch_local_irq_enable+0x4/0x8 (P) [ 17.380355] do_idle+0x384/0x4e8 [ 17.380401] cpu_startup_entry+0x64/0x80 [ 17.380446] rest_init+0x160/0x188 [ 17.380487] start_kernel+0x30c/0x3d0 [ 17.380538] __primary_switched+0x8c/0xa0 [ 17.380604] [ 17.380623] Allocated by task 199: [ 17.380674] kasan_save_stack+0x3c/0x68 [ 17.380716] kasan_save_track+0x20/0x40 [ 17.380795] kasan_save_alloc_info+0x40/0x58 [ 17.380929] __kasan_kmalloc+0xd4/0xd8 [ 17.381013] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.381180] rcu_uaf+0xb0/0x2d8 [ 17.381246] kunit_try_run_case+0x170/0x3f0 [ 17.381285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.381433] kthread+0x328/0x630 [ 17.381466] ret_from_fork+0x10/0x20 [ 17.381503] [ 17.381554] Freed by task 0: [ 17.381580] kasan_save_stack+0x3c/0x68 [ 17.381689] kasan_save_track+0x20/0x40 [ 17.381733] kasan_save_free_info+0x4c/0x78 [ 17.381771] __kasan_slab_free+0x6c/0x98 [ 17.381950] kfree+0x214/0x3c8 [ 17.382003] rcu_uaf_reclaim+0x28/0x70 [ 17.382038] rcu_core+0x9f4/0x1e20 [ 17.382073] rcu_core_si+0x18/0x30 [ 17.382177] handle_softirqs+0x374/0xb28 [ 17.382306] __do_softirq+0x1c/0x28 [ 17.382340] [ 17.382369] Last potentially related work creation: [ 17.382403] kasan_save_stack+0x3c/0x68 [ 17.382440] kasan_record_aux_stack+0xb4/0xc8 [ 17.382481] __call_rcu_common.constprop.0+0x74/0x8c8 [ 17.382523] call_rcu+0x18/0x30 [ 17.382556] rcu_uaf+0x14c/0x2d8 [ 17.382588] kunit_try_run_case+0x170/0x3f0 [ 17.382624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.382667] kthread+0x328/0x630 [ 17.382700] ret_from_fork+0x10/0x20 [ 17.382830] [ 17.382902] The buggy address belongs to the object at fff00000c69bfec0 [ 17.382902] which belongs to the cache kmalloc-32 of size 32 [ 17.382989] The buggy address is located 0 bytes inside of [ 17.382989] freed 32-byte region [fff00000c69bfec0, fff00000c69bfee0) [ 17.383052] [ 17.383072] The buggy address belongs to the physical page: [ 17.383105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069bf [ 17.383163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.383256] page_type: f5(slab) [ 17.383298] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 17.383349] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 17.383389] page dumped because: kasan: bad access detected [ 17.383422] [ 17.383439] Memory state around the buggy address: [ 17.383474] fff00000c69bfd80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 17.383542] fff00000c69bfe00: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 17.383625] >fff00000c69bfe80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 17.383677] ^ [ 17.383731] fff00000c69bff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.383827] fff00000c69bff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.383875] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 17.129489] ================================================================== [ 17.129666] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 17.129726] Read of size 1 at addr fff00000c77d7078 by task kunit_try_catch/197 [ 17.129777] [ 17.129811] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 17.130495] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.130536] Hardware name: linux,dummy-virt (DT) [ 17.130567] Call trace: [ 17.130591] show_stack+0x20/0x38 (C) [ 17.130730] dump_stack_lvl+0x8c/0xd0 [ 17.130802] print_report+0x118/0x608 [ 17.130965] kasan_report+0xdc/0x128 [ 17.131018] __asan_report_load1_noabort+0x20/0x30 [ 17.131517] ksize_uaf+0x544/0x5f8 [ 17.131687] kunit_try_run_case+0x170/0x3f0 [ 17.131735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.132676] kthread+0x328/0x630 [ 17.132904] ret_from_fork+0x10/0x20 [ 17.133245] [ 17.133678] Allocated by task 197: [ 17.133767] kasan_save_stack+0x3c/0x68 [ 17.133812] kasan_save_track+0x20/0x40 [ 17.133850] kasan_save_alloc_info+0x40/0x58 [ 17.133891] __kasan_kmalloc+0xd4/0xd8 [ 17.133929] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.133968] ksize_uaf+0xb8/0x5f8 [ 17.134964] kunit_try_run_case+0x170/0x3f0 [ 17.135408] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.135458] kthread+0x328/0x630 [ 17.135490] ret_from_fork+0x10/0x20 [ 17.136013] [ 17.136094] Freed by task 197: [ 17.136184] kasan_save_stack+0x3c/0x68 [ 17.136283] kasan_save_track+0x20/0x40 [ 17.136483] kasan_save_free_info+0x4c/0x78 [ 17.136809] __kasan_slab_free+0x6c/0x98 [ 17.136851] kfree+0x214/0x3c8 [ 17.137659] ksize_uaf+0x11c/0x5f8 [ 17.138498] kunit_try_run_case+0x170/0x3f0 [ 17.138778] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.138888] kthread+0x328/0x630 [ 17.138921] ret_from_fork+0x10/0x20 [ 17.139090] [ 17.139201] The buggy address belongs to the object at fff00000c77d7000 [ 17.139201] which belongs to the cache kmalloc-128 of size 128 [ 17.139346] The buggy address is located 120 bytes inside of [ 17.139346] freed 128-byte region [fff00000c77d7000, fff00000c77d7080) [ 17.140217] [ 17.140610] The buggy address belongs to the physical page: [ 17.140950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077d7 [ 17.141457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.141984] page_type: f5(slab) [ 17.142344] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.142400] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.142441] page dumped because: kasan: bad access detected [ 17.143002] [ 17.143043] Memory state around the buggy address: [ 17.143235] fff00000c77d6f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.143632] fff00000c77d6f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.143756] >fff00000c77d7000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.143913] ^ [ 17.144108] fff00000c77d7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.144237] fff00000c77d7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.144530] ================================================================== [ 17.108772] ================================================================== [ 17.108836] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 17.108887] Read of size 1 at addr fff00000c77d7000 by task kunit_try_catch/197 [ 17.108935] [ 17.108969] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 17.109066] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.109093] Hardware name: linux,dummy-virt (DT) [ 17.109121] Call trace: [ 17.109144] show_stack+0x20/0x38 (C) [ 17.109191] dump_stack_lvl+0x8c/0xd0 [ 17.109424] print_report+0x118/0x608 [ 17.109486] kasan_report+0xdc/0x128 [ 17.109546] __kasan_check_byte+0x54/0x70 [ 17.110085] ksize+0x30/0x88 [ 17.110353] ksize_uaf+0x168/0x5f8 [ 17.110581] kunit_try_run_case+0x170/0x3f0 [ 17.110804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.111335] kthread+0x328/0x630 [ 17.111486] ret_from_fork+0x10/0x20 [ 17.112015] [ 17.112039] Allocated by task 197: [ 17.112070] kasan_save_stack+0x3c/0x68 [ 17.112282] kasan_save_track+0x20/0x40 [ 17.112585] kasan_save_alloc_info+0x40/0x58 [ 17.112645] __kasan_kmalloc+0xd4/0xd8 [ 17.112684] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.112723] ksize_uaf+0xb8/0x5f8 [ 17.113195] kunit_try_run_case+0x170/0x3f0 [ 17.113244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.113303] kthread+0x328/0x630 [ 17.113500] ret_from_fork+0x10/0x20 [ 17.113734] [ 17.113754] Freed by task 197: [ 17.114079] kasan_save_stack+0x3c/0x68 [ 17.114260] kasan_save_track+0x20/0x40 [ 17.114522] kasan_save_free_info+0x4c/0x78 [ 17.114568] __kasan_slab_free+0x6c/0x98 [ 17.114935] kfree+0x214/0x3c8 [ 17.115063] ksize_uaf+0x11c/0x5f8 [ 17.115496] kunit_try_run_case+0x170/0x3f0 [ 17.115539] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.115809] kthread+0x328/0x630 [ 17.115998] ret_from_fork+0x10/0x20 [ 17.116091] [ 17.116220] The buggy address belongs to the object at fff00000c77d7000 [ 17.116220] which belongs to the cache kmalloc-128 of size 128 [ 17.116551] The buggy address is located 0 bytes inside of [ 17.116551] freed 128-byte region [fff00000c77d7000, fff00000c77d7080) [ 17.116854] [ 17.116995] The buggy address belongs to the physical page: [ 17.117051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077d7 [ 17.117119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.117299] page_type: f5(slab) [ 17.117389] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.117578] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.117684] page dumped because: kasan: bad access detected [ 17.117740] [ 17.117799] Memory state around the buggy address: [ 17.117912] fff00000c77d6f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.118089] fff00000c77d6f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.118145] >fff00000c77d7000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.118199] ^ [ 17.118539] fff00000c77d7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.118603] fff00000c77d7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.118698] ================================================================== [ 17.119767] ================================================================== [ 17.119822] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 17.119869] Read of size 1 at addr fff00000c77d7000 by task kunit_try_catch/197 [ 17.120255] [ 17.120351] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 17.120502] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.120559] Hardware name: linux,dummy-virt (DT) [ 17.120598] Call trace: [ 17.120690] show_stack+0x20/0x38 (C) [ 17.120760] dump_stack_lvl+0x8c/0xd0 [ 17.120880] print_report+0x118/0x608 [ 17.120953] kasan_report+0xdc/0x128 [ 17.121016] __asan_report_load1_noabort+0x20/0x30 [ 17.121288] ksize_uaf+0x598/0x5f8 [ 17.121356] kunit_try_run_case+0x170/0x3f0 [ 17.121403] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.121453] kthread+0x328/0x630 [ 17.121493] ret_from_fork+0x10/0x20 [ 17.121539] [ 17.121558] Allocated by task 197: [ 17.121586] kasan_save_stack+0x3c/0x68 [ 17.121638] kasan_save_track+0x20/0x40 [ 17.121676] kasan_save_alloc_info+0x40/0x58 [ 17.121715] __kasan_kmalloc+0xd4/0xd8 [ 17.121755] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.121834] ksize_uaf+0xb8/0x5f8 [ 17.121872] kunit_try_run_case+0x170/0x3f0 [ 17.122060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.122122] kthread+0x328/0x630 [ 17.122517] ret_from_fork+0x10/0x20 [ 17.122570] [ 17.122862] Freed by task 197: [ 17.122894] kasan_save_stack+0x3c/0x68 [ 17.123193] kasan_save_track+0x20/0x40 [ 17.123281] kasan_save_free_info+0x4c/0x78 [ 17.123337] __kasan_slab_free+0x6c/0x98 [ 17.123374] kfree+0x214/0x3c8 [ 17.123630] ksize_uaf+0x11c/0x5f8 [ 17.123671] kunit_try_run_case+0x170/0x3f0 [ 17.123938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.123993] kthread+0x328/0x630 [ 17.124026] ret_from_fork+0x10/0x20 [ 17.124062] [ 17.124081] The buggy address belongs to the object at fff00000c77d7000 [ 17.124081] which belongs to the cache kmalloc-128 of size 128 [ 17.124141] The buggy address is located 0 bytes inside of [ 17.124141] freed 128-byte region [fff00000c77d7000, fff00000c77d7080) [ 17.124200] [ 17.125036] The buggy address belongs to the physical page: [ 17.125074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077d7 [ 17.125140] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.125194] page_type: f5(slab) [ 17.125231] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.125719] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.126027] page dumped because: kasan: bad access detected [ 17.126143] [ 17.126162] Memory state around the buggy address: [ 17.126273] fff00000c77d6f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.126683] fff00000c77d6f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.126926] >fff00000c77d7000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.127337] ^ [ 17.127378] fff00000c77d7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.127423] fff00000c77d7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.127466] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 17.085262] ================================================================== [ 17.085311] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 17.085361] Read of size 1 at addr fff00000c635af7f by task kunit_try_catch/195 [ 17.085409] [ 17.085439] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 17.085521] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.085549] Hardware name: linux,dummy-virt (DT) [ 17.085578] Call trace: [ 17.085600] show_stack+0x20/0x38 (C) [ 17.085651] dump_stack_lvl+0x8c/0xd0 [ 17.085698] print_report+0x118/0x608 [ 17.085742] kasan_report+0xdc/0x128 [ 17.086239] __asan_report_load1_noabort+0x20/0x30 [ 17.086324] ksize_unpoisons_memory+0x690/0x740 [ 17.086371] kunit_try_run_case+0x170/0x3f0 [ 17.087243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.087902] kthread+0x328/0x630 [ 17.087970] ret_from_fork+0x10/0x20 [ 17.088046] [ 17.088079] Allocated by task 195: [ 17.088107] kasan_save_stack+0x3c/0x68 [ 17.088383] kasan_save_track+0x20/0x40 [ 17.088623] kasan_save_alloc_info+0x40/0x58 [ 17.088683] __kasan_kmalloc+0xd4/0xd8 [ 17.088719] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.088757] ksize_unpoisons_memory+0xc0/0x740 [ 17.088795] kunit_try_run_case+0x170/0x3f0 [ 17.088832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.089674] kthread+0x328/0x630 [ 17.089720] ret_from_fork+0x10/0x20 [ 17.089757] [ 17.089776] The buggy address belongs to the object at fff00000c635af00 [ 17.089776] which belongs to the cache kmalloc-128 of size 128 [ 17.089836] The buggy address is located 12 bytes to the right of [ 17.089836] allocated 115-byte region [fff00000c635af00, fff00000c635af73) [ 17.089901] [ 17.089919] The buggy address belongs to the physical page: [ 17.090076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a [ 17.090149] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.091608] page_type: f5(slab) [ 17.091723] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.091879] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.091938] page dumped because: kasan: bad access detected [ 17.091970] [ 17.091999] Memory state around the buggy address: [ 17.092227] fff00000c635ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.092276] fff00000c635ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.092320] >fff00000c635af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.092812] ^ [ 17.092954] fff00000c635af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.093007] fff00000c635b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.093045] ================================================================== [ 17.066220] ================================================================== [ 17.066290] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 17.066684] Read of size 1 at addr fff00000c635af73 by task kunit_try_catch/195 [ 17.067318] [ 17.067391] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 17.067473] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.067500] Hardware name: linux,dummy-virt (DT) [ 17.067537] Call trace: [ 17.067660] show_stack+0x20/0x38 (C) [ 17.067711] dump_stack_lvl+0x8c/0xd0 [ 17.067758] print_report+0x118/0x608 [ 17.067805] kasan_report+0xdc/0x128 [ 17.067849] __asan_report_load1_noabort+0x20/0x30 [ 17.068196] ksize_unpoisons_memory+0x628/0x740 [ 17.068390] kunit_try_run_case+0x170/0x3f0 [ 17.068549] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.069022] kthread+0x328/0x630 [ 17.069078] ret_from_fork+0x10/0x20 [ 17.069256] [ 17.069431] Allocated by task 195: [ 17.069464] kasan_save_stack+0x3c/0x68 [ 17.069509] kasan_save_track+0x20/0x40 [ 17.069627] kasan_save_alloc_info+0x40/0x58 [ 17.069785] __kasan_kmalloc+0xd4/0xd8 [ 17.069824] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.069862] ksize_unpoisons_memory+0xc0/0x740 [ 17.069900] kunit_try_run_case+0x170/0x3f0 [ 17.069936] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.070369] kthread+0x328/0x630 [ 17.070416] ret_from_fork+0x10/0x20 [ 17.070466] [ 17.070485] The buggy address belongs to the object at fff00000c635af00 [ 17.070485] which belongs to the cache kmalloc-128 of size 128 [ 17.070724] The buggy address is located 0 bytes to the right of [ 17.070724] allocated 115-byte region [fff00000c635af00, fff00000c635af73) [ 17.071118] [ 17.071261] The buggy address belongs to the physical page: [ 17.071308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a [ 17.071364] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.071413] page_type: f5(slab) [ 17.071740] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.071810] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.071990] page dumped because: kasan: bad access detected [ 17.072026] [ 17.072043] Memory state around the buggy address: [ 17.072214] fff00000c635ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.072264] fff00000c635ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.072714] >fff00000c635af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.072766] ^ [ 17.073049] fff00000c635af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.073285] fff00000c635b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.073587] ================================================================== [ 17.076607] ================================================================== [ 17.076662] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 17.076712] Read of size 1 at addr fff00000c635af78 by task kunit_try_catch/195 [ 17.076759] [ 17.076790] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 17.076869] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.076895] Hardware name: linux,dummy-virt (DT) [ 17.077303] Call trace: [ 17.077449] show_stack+0x20/0x38 (C) [ 17.077504] dump_stack_lvl+0x8c/0xd0 [ 17.077550] print_report+0x118/0x608 [ 17.077934] kasan_report+0xdc/0x128 [ 17.078025] __asan_report_load1_noabort+0x20/0x30 [ 17.078273] ksize_unpoisons_memory+0x618/0x740 [ 17.078325] kunit_try_run_case+0x170/0x3f0 [ 17.078370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.078420] kthread+0x328/0x630 [ 17.078838] ret_from_fork+0x10/0x20 [ 17.078919] [ 17.078937] Allocated by task 195: [ 17.079011] kasan_save_stack+0x3c/0x68 [ 17.079452] kasan_save_track+0x20/0x40 [ 17.079514] kasan_save_alloc_info+0x40/0x58 [ 17.079591] __kasan_kmalloc+0xd4/0xd8 [ 17.079640] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.079677] ksize_unpoisons_memory+0xc0/0x740 [ 17.079715] kunit_try_run_case+0x170/0x3f0 [ 17.079754] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.079796] kthread+0x328/0x630 [ 17.080194] ret_from_fork+0x10/0x20 [ 17.080255] [ 17.080274] The buggy address belongs to the object at fff00000c635af00 [ 17.080274] which belongs to the cache kmalloc-128 of size 128 [ 17.080543] The buggy address is located 5 bytes to the right of [ 17.080543] allocated 115-byte region [fff00000c635af00, fff00000c635af73) [ 17.080929] [ 17.081248] The buggy address belongs to the physical page: [ 17.081281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a [ 17.081578] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.081697] page_type: f5(slab) [ 17.082124] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.082354] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.082401] page dumped because: kasan: bad access detected [ 17.082433] [ 17.082799] Memory state around the buggy address: [ 17.083057] fff00000c635ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.083394] fff00000c635ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.083600] >fff00000c635af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.083640] ^ [ 17.083682] fff00000c635af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.083725] fff00000c635b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.083762] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[ 17.052293] ================================================================== [ 17.052368] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 17.052416] Free of addr fff00000c5fbe840 by task kunit_try_catch/193 [ 17.052457] [ 17.052486] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 17.052565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.052590] Hardware name: linux,dummy-virt (DT) [ 17.052620] Call trace: [ 17.052640] show_stack+0x20/0x38 (C) [ 17.052684] dump_stack_lvl+0x8c/0xd0 [ 17.052730] print_report+0x118/0x608 [ 17.052773] kasan_report_invalid_free+0xc0/0xe8 [ 17.052821] check_slab_allocation+0xd4/0x108 [ 17.052867] __kasan_slab_pre_free+0x2c/0x48 [ 17.052913] kfree+0xe8/0x3c8 [ 17.052953] kfree_sensitive+0x3c/0xb0 [ 17.053009] kmalloc_double_kzfree+0x168/0x308 [ 17.053053] kunit_try_run_case+0x170/0x3f0 [ 17.053099] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.053149] kthread+0x328/0x630 [ 17.053188] ret_from_fork+0x10/0x20 [ 17.053234] [ 17.053251] Allocated by task 193: [ 17.053278] kasan_save_stack+0x3c/0x68 [ 17.053316] kasan_save_track+0x20/0x40 [ 17.053353] kasan_save_alloc_info+0x40/0x58 [ 17.053391] __kasan_kmalloc+0xd4/0xd8 [ 17.053428] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.053466] kmalloc_double_kzfree+0xb8/0x308 [ 17.053502] kunit_try_run_case+0x170/0x3f0 [ 17.053539] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.053581] kthread+0x328/0x630 [ 17.053613] ret_from_fork+0x10/0x20 [ 17.053656] [ 17.053674] Freed by task 193: [ 17.053698] kasan_save_stack+0x3c/0x68 [ 17.053735] kasan_save_track+0x20/0x40 [ 17.053770] kasan_save_free_info+0x4c/0x78 [ 17.053808] __kasan_slab_free+0x6c/0x98 [ 17.053845] kfree+0x214/0x3c8 [ 17.053876] kfree_sensitive+0x80/0xb0 [ 17.053910] kmalloc_double_kzfree+0x11c/0x308 [ 17.053947] kunit_try_run_case+0x170/0x3f0 [ 17.054016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.054060] kthread+0x328/0x630 [ 17.054130] ret_from_fork+0x10/0x20 [ 17.054186] [ 17.054250] The buggy address belongs to the object at fff00000c5fbe840 [ 17.054250] which belongs to the cache kmalloc-16 of size 16 [ 17.054314] The buggy address is located 0 bytes inside of [ 17.054314] 16-byte region [fff00000c5fbe840, fff00000c5fbe850) [ 17.054403] [ 17.054442] The buggy address belongs to the physical page: [ 17.054490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fbe [ 17.054557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.054619] page_type: f5(slab) [ 17.054704] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.054757] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.054797] page dumped because: kasan: bad access detected [ 17.054829] [ 17.054847] Memory state around the buggy address: [ 17.054881] fff00000c5fbe700: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.054924] fff00000c5fbe780: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.054965] >fff00000c5fbe800: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 17.055013] ^ [ 17.055047] fff00000c5fbe880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.055089] fff00000c5fbe900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.055126] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 17.045854] ================================================================== [ 17.045935] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 17.046009] Read of size 1 at addr fff00000c5fbe840 by task kunit_try_catch/193 [ 17.046058] [ 17.046093] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 17.046174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.046202] Hardware name: linux,dummy-virt (DT) [ 17.046231] Call trace: [ 17.046255] show_stack+0x20/0x38 (C) [ 17.046301] dump_stack_lvl+0x8c/0xd0 [ 17.046347] print_report+0x118/0x608 [ 17.046391] kasan_report+0xdc/0x128 [ 17.046436] __kasan_check_byte+0x54/0x70 [ 17.046480] kfree_sensitive+0x30/0xb0 [ 17.046527] kmalloc_double_kzfree+0x168/0x308 [ 17.046571] kunit_try_run_case+0x170/0x3f0 [ 17.046652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.046705] kthread+0x328/0x630 [ 17.047033] ret_from_fork+0x10/0x20 [ 17.047126] [ 17.047145] Allocated by task 193: [ 17.047199] kasan_save_stack+0x3c/0x68 [ 17.047268] kasan_save_track+0x20/0x40 [ 17.047385] kasan_save_alloc_info+0x40/0x58 [ 17.047485] __kasan_kmalloc+0xd4/0xd8 [ 17.047593] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.047669] kmalloc_double_kzfree+0xb8/0x308 [ 17.047718] kunit_try_run_case+0x170/0x3f0 [ 17.047787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.047831] kthread+0x328/0x630 [ 17.047862] ret_from_fork+0x10/0x20 [ 17.047898] [ 17.047915] Freed by task 193: [ 17.047942] kasan_save_stack+0x3c/0x68 [ 17.048140] kasan_save_track+0x20/0x40 [ 17.048296] kasan_save_free_info+0x4c/0x78 [ 17.048429] __kasan_slab_free+0x6c/0x98 [ 17.048505] kfree+0x214/0x3c8 [ 17.048598] kfree_sensitive+0x80/0xb0 [ 17.048686] kmalloc_double_kzfree+0x11c/0x308 [ 17.048805] kunit_try_run_case+0x170/0x3f0 [ 17.048901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.049058] kthread+0x328/0x630 [ 17.049102] ret_from_fork+0x10/0x20 [ 17.049146] [ 17.049202] The buggy address belongs to the object at fff00000c5fbe840 [ 17.049202] which belongs to the cache kmalloc-16 of size 16 [ 17.049270] The buggy address is located 0 bytes inside of [ 17.049270] freed 16-byte region [fff00000c5fbe840, fff00000c5fbe850) [ 17.049610] [ 17.049685] The buggy address belongs to the physical page: [ 17.049754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fbe [ 17.049875] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.049959] page_type: f5(slab) [ 17.050297] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.050392] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.050493] page dumped because: kasan: bad access detected [ 17.050570] [ 17.050714] Memory state around the buggy address: [ 17.050777] fff00000c5fbe700: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.050874] fff00000c5fbe780: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.050999] >fff00000c5fbe800: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 17.051110] ^ [ 17.051143] fff00000c5fbe880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.051195] fff00000c5fbe900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.051234] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 17.021445] ================================================================== [ 17.021505] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 17.021587] Read of size 1 at addr fff00000c69bd428 by task kunit_try_catch/189 [ 17.021783] [ 17.021859] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 17.021945] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.021972] Hardware name: linux,dummy-virt (DT) [ 17.022014] Call trace: [ 17.022036] show_stack+0x20/0x38 (C) [ 17.022088] dump_stack_lvl+0x8c/0xd0 [ 17.022142] print_report+0x118/0x608 [ 17.022188] kasan_report+0xdc/0x128 [ 17.022232] __asan_report_load1_noabort+0x20/0x30 [ 17.022282] kmalloc_uaf2+0x3f4/0x468 [ 17.022323] kunit_try_run_case+0x170/0x3f0 [ 17.022370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.022426] kthread+0x328/0x630 [ 17.022466] ret_from_fork+0x10/0x20 [ 17.022513] [ 17.022540] Allocated by task 189: [ 17.022567] kasan_save_stack+0x3c/0x68 [ 17.022639] kasan_save_track+0x20/0x40 [ 17.022681] kasan_save_alloc_info+0x40/0x58 [ 17.022839] __kasan_kmalloc+0xd4/0xd8 [ 17.022890] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.022929] kmalloc_uaf2+0xc4/0x468 [ 17.022961] kunit_try_run_case+0x170/0x3f0 [ 17.023013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.023056] kthread+0x328/0x630 [ 17.023088] ret_from_fork+0x10/0x20 [ 17.023121] [ 17.023280] Freed by task 189: [ 17.023353] kasan_save_stack+0x3c/0x68 [ 17.023424] kasan_save_track+0x20/0x40 [ 17.023524] kasan_save_free_info+0x4c/0x78 [ 17.023634] __kasan_slab_free+0x6c/0x98 [ 17.023720] kfree+0x214/0x3c8 [ 17.023789] kmalloc_uaf2+0x134/0x468 [ 17.023841] kunit_try_run_case+0x170/0x3f0 [ 17.023879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.023922] kthread+0x328/0x630 [ 17.023952] ret_from_fork+0x10/0x20 [ 17.024124] [ 17.024174] The buggy address belongs to the object at fff00000c69bd400 [ 17.024174] which belongs to the cache kmalloc-64 of size 64 [ 17.024327] The buggy address is located 40 bytes inside of [ 17.024327] freed 64-byte region [fff00000c69bd400, fff00000c69bd440) [ 17.024401] [ 17.024421] The buggy address belongs to the physical page: [ 17.024451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069bd [ 17.024649] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.024739] page_type: f5(slab) [ 17.024814] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.024923] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.025051] page dumped because: kasan: bad access detected [ 17.025082] [ 17.025099] Memory state around the buggy address: [ 17.025164] fff00000c69bd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.025481] fff00000c69bd380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.025597] >fff00000c69bd400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.025681] ^ [ 17.025807] fff00000c69bd480: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 17.025851] fff00000c69bd500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.026030] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 17.008956] ================================================================== [ 17.009204] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 17.009288] Write of size 33 at addr fff00000c69bd280 by task kunit_try_catch/187 [ 17.009341] [ 17.009374] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 17.009606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.009669] Hardware name: linux,dummy-virt (DT) [ 17.009704] Call trace: [ 17.009727] show_stack+0x20/0x38 (C) [ 17.009777] dump_stack_lvl+0x8c/0xd0 [ 17.009841] print_report+0x118/0x608 [ 17.009927] kasan_report+0xdc/0x128 [ 17.009971] kasan_check_range+0x100/0x1a8 [ 17.010057] __asan_memset+0x34/0x78 [ 17.010109] kmalloc_uaf_memset+0x170/0x310 [ 17.010153] kunit_try_run_case+0x170/0x3f0 [ 17.010228] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.010290] kthread+0x328/0x630 [ 17.010346] ret_from_fork+0x10/0x20 [ 17.010410] [ 17.010428] Allocated by task 187: [ 17.010472] kasan_save_stack+0x3c/0x68 [ 17.010512] kasan_save_track+0x20/0x40 [ 17.010547] kasan_save_alloc_info+0x40/0x58 [ 17.010587] __kasan_kmalloc+0xd4/0xd8 [ 17.010648] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.010687] kmalloc_uaf_memset+0xb8/0x310 [ 17.010882] kunit_try_run_case+0x170/0x3f0 [ 17.010961] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.011142] kthread+0x328/0x630 [ 17.011218] ret_from_fork+0x10/0x20 [ 17.011310] [ 17.011389] Freed by task 187: [ 17.011475] kasan_save_stack+0x3c/0x68 [ 17.011583] kasan_save_track+0x20/0x40 [ 17.011678] kasan_save_free_info+0x4c/0x78 [ 17.011717] __kasan_slab_free+0x6c/0x98 [ 17.011778] kfree+0x214/0x3c8 [ 17.011812] kmalloc_uaf_memset+0x11c/0x310 [ 17.011846] kunit_try_run_case+0x170/0x3f0 [ 17.012021] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.012132] kthread+0x328/0x630 [ 17.012239] ret_from_fork+0x10/0x20 [ 17.012358] [ 17.012438] The buggy address belongs to the object at fff00000c69bd280 [ 17.012438] which belongs to the cache kmalloc-64 of size 64 [ 17.012580] The buggy address is located 0 bytes inside of [ 17.012580] freed 64-byte region [fff00000c69bd280, fff00000c69bd2c0) [ 17.012678] [ 17.012754] The buggy address belongs to the physical page: [ 17.012840] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069bd [ 17.012930] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.013015] page_type: f5(slab) [ 17.013080] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.013130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.013434] page dumped because: kasan: bad access detected [ 17.013509] [ 17.013603] Memory state around the buggy address: [ 17.013680] fff00000c69bd180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.013736] fff00000c69bd200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.013779] >fff00000c69bd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.014084] ^ [ 17.014158] fff00000c69bd300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.014225] fff00000c69bd380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.014295] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 16.996695] ================================================================== [ 16.996892] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 16.996953] Read of size 1 at addr fff00000c5fbe828 by task kunit_try_catch/185 [ 16.997045] [ 16.997103] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.997187] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.997213] Hardware name: linux,dummy-virt (DT) [ 16.997338] Call trace: [ 16.997409] show_stack+0x20/0x38 (C) [ 16.997461] dump_stack_lvl+0x8c/0xd0 [ 16.997505] print_report+0x118/0x608 [ 16.997549] kasan_report+0xdc/0x128 [ 16.997592] __asan_report_load1_noabort+0x20/0x30 [ 16.997758] kmalloc_uaf+0x300/0x338 [ 16.997811] kunit_try_run_case+0x170/0x3f0 [ 16.997882] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.997934] kthread+0x328/0x630 [ 16.997973] ret_from_fork+0x10/0x20 [ 16.998214] [ 16.998278] Allocated by task 185: [ 16.998338] kasan_save_stack+0x3c/0x68 [ 16.998420] kasan_save_track+0x20/0x40 [ 16.998476] kasan_save_alloc_info+0x40/0x58 [ 16.998538] __kasan_kmalloc+0xd4/0xd8 [ 16.998587] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.998674] kmalloc_uaf+0xb8/0x338 [ 16.998707] kunit_try_run_case+0x170/0x3f0 [ 16.998746] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.998814] kthread+0x328/0x630 [ 16.998846] ret_from_fork+0x10/0x20 [ 16.999056] [ 16.999133] Freed by task 185: [ 16.999221] kasan_save_stack+0x3c/0x68 [ 16.999315] kasan_save_track+0x20/0x40 [ 16.999441] kasan_save_free_info+0x4c/0x78 [ 16.999544] __kasan_slab_free+0x6c/0x98 [ 16.999583] kfree+0x214/0x3c8 [ 16.999614] kmalloc_uaf+0x11c/0x338 [ 16.999712] kunit_try_run_case+0x170/0x3f0 [ 17.000039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.000161] kthread+0x328/0x630 [ 17.000239] ret_from_fork+0x10/0x20 [ 17.000375] [ 17.000433] The buggy address belongs to the object at fff00000c5fbe820 [ 17.000433] which belongs to the cache kmalloc-16 of size 16 [ 17.000501] The buggy address is located 8 bytes inside of [ 17.000501] freed 16-byte region [fff00000c5fbe820, fff00000c5fbe830) [ 17.000685] [ 17.000717] The buggy address belongs to the physical page: [ 17.000873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fbe [ 17.000995] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.001076] page_type: f5(slab) [ 17.001134] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.001317] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.001515] page dumped because: kasan: bad access detected [ 17.001609] [ 17.001683] Memory state around the buggy address: [ 17.001756] fff00000c5fbe700: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.001799] fff00000c5fbe780: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.002088] >fff00000c5fbe800: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 17.002158] ^ [ 17.002192] fff00000c5fbe880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.002262] fff00000c5fbe900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.002538] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 16.986016] ================================================================== [ 16.986072] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 16.986160] Read of size 64 at addr fff00000c779bf84 by task kunit_try_catch/183 [ 16.986497] [ 16.986544] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.986663] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.986691] Hardware name: linux,dummy-virt (DT) [ 16.986721] Call trace: [ 16.986742] show_stack+0x20/0x38 (C) [ 16.986793] dump_stack_lvl+0x8c/0xd0 [ 16.987092] print_report+0x118/0x608 [ 16.987171] kasan_report+0xdc/0x128 [ 16.987217] kasan_check_range+0x100/0x1a8 [ 16.987262] __asan_memmove+0x3c/0x98 [ 16.987304] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 16.987499] kunit_try_run_case+0x170/0x3f0 [ 16.987658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.987811] kthread+0x328/0x630 [ 16.987931] ret_from_fork+0x10/0x20 [ 16.988038] [ 16.988095] Allocated by task 183: [ 16.988143] kasan_save_stack+0x3c/0x68 [ 16.988185] kasan_save_track+0x20/0x40 [ 16.988222] kasan_save_alloc_info+0x40/0x58 [ 16.988277] __kasan_kmalloc+0xd4/0xd8 [ 16.988312] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.988360] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 16.988401] kunit_try_run_case+0x170/0x3f0 [ 16.988451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.988503] kthread+0x328/0x630 [ 16.988542] ret_from_fork+0x10/0x20 [ 16.988586] [ 16.988605] The buggy address belongs to the object at fff00000c779bf80 [ 16.988605] which belongs to the cache kmalloc-64 of size 64 [ 16.988662] The buggy address is located 4 bytes inside of [ 16.988662] allocated 64-byte region [fff00000c779bf80, fff00000c779bfc0) [ 16.988722] [ 16.988741] The buggy address belongs to the physical page: [ 16.988771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10779b [ 16.988822] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.988882] page_type: f5(slab) [ 16.988938] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 16.989018] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.989072] page dumped because: kasan: bad access detected [ 16.989113] [ 16.989130] Memory state around the buggy address: [ 16.989183] fff00000c779be80: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 16.989232] fff00000c779bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.989282] >fff00000c779bf80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 16.989318] ^ [ 16.989360] fff00000c779c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.989403] fff00000c779c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.989441] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 16.976887] ================================================================== [ 16.976999] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 16.977051] Read of size 18446744073709551614 at addr fff00000c779bd84 by task kunit_try_catch/181 [ 16.977153] [ 16.977222] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.977301] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.977326] Hardware name: linux,dummy-virt (DT) [ 16.977354] Call trace: [ 16.977375] show_stack+0x20/0x38 (C) [ 16.977554] dump_stack_lvl+0x8c/0xd0 [ 16.977639] print_report+0x118/0x608 [ 16.977704] kasan_report+0xdc/0x128 [ 16.977748] kasan_check_range+0x100/0x1a8 [ 16.977802] __asan_memmove+0x3c/0x98 [ 16.977869] kmalloc_memmove_negative_size+0x154/0x2e0 [ 16.977952] kunit_try_run_case+0x170/0x3f0 [ 16.978026] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.978077] kthread+0x328/0x630 [ 16.978116] ret_from_fork+0x10/0x20 [ 16.978161] [ 16.978183] Allocated by task 181: [ 16.978210] kasan_save_stack+0x3c/0x68 [ 16.978287] kasan_save_track+0x20/0x40 [ 16.978323] kasan_save_alloc_info+0x40/0x58 [ 16.978390] __kasan_kmalloc+0xd4/0xd8 [ 16.978426] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.978464] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 16.978502] kunit_try_run_case+0x170/0x3f0 [ 16.978538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.978856] kthread+0x328/0x630 [ 16.978923] ret_from_fork+0x10/0x20 [ 16.978959] [ 16.979031] The buggy address belongs to the object at fff00000c779bd80 [ 16.979031] which belongs to the cache kmalloc-64 of size 64 [ 16.979207] The buggy address is located 4 bytes inside of [ 16.979207] 64-byte region [fff00000c779bd80, fff00000c779bdc0) [ 16.979313] [ 16.979367] The buggy address belongs to the physical page: [ 16.979442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10779b [ 16.979538] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.979655] page_type: f5(slab) [ 16.979719] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 16.979767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.979834] page dumped because: kasan: bad access detected [ 16.979864] [ 16.980093] Memory state around the buggy address: [ 16.980309] fff00000c779bc80: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 16.980408] fff00000c779bd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.981257] >fff00000c779bd80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 16.981331] ^ [ 16.981438] fff00000c779be00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.981511] fff00000c779be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.981637] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 16.966470] ================================================================== [ 16.966612] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 16.966667] Write of size 16 at addr fff00000c635ae69 by task kunit_try_catch/179 [ 16.966803] [ 16.966890] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.967031] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.967100] Hardware name: linux,dummy-virt (DT) [ 16.967221] Call trace: [ 16.967288] show_stack+0x20/0x38 (C) [ 16.967395] dump_stack_lvl+0x8c/0xd0 [ 16.967514] print_report+0x118/0x608 [ 16.967591] kasan_report+0xdc/0x128 [ 16.967646] kasan_check_range+0x100/0x1a8 [ 16.967692] __asan_memset+0x34/0x78 [ 16.967732] kmalloc_oob_memset_16+0x150/0x2f8 [ 16.967775] kunit_try_run_case+0x170/0x3f0 [ 16.967864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.967918] kthread+0x328/0x630 [ 16.967957] ret_from_fork+0x10/0x20 [ 16.968013] [ 16.968031] Allocated by task 179: [ 16.968057] kasan_save_stack+0x3c/0x68 [ 16.968097] kasan_save_track+0x20/0x40 [ 16.968271] kasan_save_alloc_info+0x40/0x58 [ 16.968315] __kasan_kmalloc+0xd4/0xd8 [ 16.968363] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.968461] kmalloc_oob_memset_16+0xb0/0x2f8 [ 16.968508] kunit_try_run_case+0x170/0x3f0 [ 16.968594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.968669] kthread+0x328/0x630 [ 16.968804] ret_from_fork+0x10/0x20 [ 16.968859] [ 16.968878] The buggy address belongs to the object at fff00000c635ae00 [ 16.968878] which belongs to the cache kmalloc-128 of size 128 [ 16.968988] The buggy address is located 105 bytes inside of [ 16.968988] allocated 120-byte region [fff00000c635ae00, fff00000c635ae78) [ 16.969060] [ 16.969097] The buggy address belongs to the physical page: [ 16.969149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a [ 16.969222] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.969285] page_type: f5(slab) [ 16.969322] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.969392] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.969664] page dumped because: kasan: bad access detected [ 16.969725] [ 16.969776] Memory state around the buggy address: [ 16.969828] fff00000c635ad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.969897] fff00000c635ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.969964] >fff00000c635ae00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.970010] ^ [ 16.970083] fff00000c635ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.970204] fff00000c635af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.970273] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 16.957917] ================================================================== [ 16.957991] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 16.958043] Write of size 8 at addr fff00000c635ad71 by task kunit_try_catch/177 [ 16.958091] [ 16.958122] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.958200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.958224] Hardware name: linux,dummy-virt (DT) [ 16.958253] Call trace: [ 16.958274] show_stack+0x20/0x38 (C) [ 16.958409] dump_stack_lvl+0x8c/0xd0 [ 16.958454] print_report+0x118/0x608 [ 16.958513] kasan_report+0xdc/0x128 [ 16.958557] kasan_check_range+0x100/0x1a8 [ 16.958602] __asan_memset+0x34/0x78 [ 16.958685] kmalloc_oob_memset_8+0x150/0x2f8 [ 16.958786] kunit_try_run_case+0x170/0x3f0 [ 16.958957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.959016] kthread+0x328/0x630 [ 16.959054] ret_from_fork+0x10/0x20 [ 16.959100] [ 16.959117] Allocated by task 177: [ 16.959167] kasan_save_stack+0x3c/0x68 [ 16.959209] kasan_save_track+0x20/0x40 [ 16.959244] kasan_save_alloc_info+0x40/0x58 [ 16.959283] __kasan_kmalloc+0xd4/0xd8 [ 16.959318] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.959479] kmalloc_oob_memset_8+0xb0/0x2f8 [ 16.959660] kunit_try_run_case+0x170/0x3f0 [ 16.959831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.959954] kthread+0x328/0x630 [ 16.960053] ret_from_fork+0x10/0x20 [ 16.960163] [ 16.960183] The buggy address belongs to the object at fff00000c635ad00 [ 16.960183] which belongs to the cache kmalloc-128 of size 128 [ 16.960250] The buggy address is located 113 bytes inside of [ 16.960250] allocated 120-byte region [fff00000c635ad00, fff00000c635ad78) [ 16.960310] [ 16.960329] The buggy address belongs to the physical page: [ 16.960358] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a [ 16.960408] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.960527] page_type: f5(slab) [ 16.960703] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.960818] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.960957] page dumped because: kasan: bad access detected [ 16.961015] [ 16.961033] Memory state around the buggy address: [ 16.961196] fff00000c635ac00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.961309] fff00000c635ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.961497] >fff00000c635ad00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.961665] ^ [ 16.961751] fff00000c635ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.961890] fff00000c635ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.961927] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 16.949415] ================================================================== [ 16.949478] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 16.949529] Write of size 4 at addr fff00000c635ac75 by task kunit_try_catch/175 [ 16.949577] [ 16.949610] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.949700] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.949725] Hardware name: linux,dummy-virt (DT) [ 16.949753] Call trace: [ 16.949774] show_stack+0x20/0x38 (C) [ 16.949818] dump_stack_lvl+0x8c/0xd0 [ 16.949862] print_report+0x118/0x608 [ 16.949905] kasan_report+0xdc/0x128 [ 16.949947] kasan_check_range+0x100/0x1a8 [ 16.950008] __asan_memset+0x34/0x78 [ 16.950123] kmalloc_oob_memset_4+0x150/0x300 [ 16.950178] kunit_try_run_case+0x170/0x3f0 [ 16.950253] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.950329] kthread+0x328/0x630 [ 16.950396] ret_from_fork+0x10/0x20 [ 16.950458] [ 16.950476] Allocated by task 175: [ 16.950503] kasan_save_stack+0x3c/0x68 [ 16.950568] kasan_save_track+0x20/0x40 [ 16.950605] kasan_save_alloc_info+0x40/0x58 [ 16.950680] __kasan_kmalloc+0xd4/0xd8 [ 16.950715] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.950776] kmalloc_oob_memset_4+0xb0/0x300 [ 16.950815] kunit_try_run_case+0x170/0x3f0 [ 16.950852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.950894] kthread+0x328/0x630 [ 16.951063] ret_from_fork+0x10/0x20 [ 16.951264] [ 16.951317] The buggy address belongs to the object at fff00000c635ac00 [ 16.951317] which belongs to the cache kmalloc-128 of size 128 [ 16.951448] The buggy address is located 117 bytes inside of [ 16.951448] allocated 120-byte region [fff00000c635ac00, fff00000c635ac78) [ 16.951519] [ 16.951539] The buggy address belongs to the physical page: [ 16.951568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a [ 16.951628] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.951683] page_type: f5(slab) [ 16.951720] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.951776] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.951814] page dumped because: kasan: bad access detected [ 16.951844] [ 16.951861] Memory state around the buggy address: [ 16.951902] fff00000c635ab00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.951942] fff00000c635ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.952288] >fff00000c635ac00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.952465] ^ [ 16.952561] fff00000c635ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.952602] fff00000c635ad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.952640] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 16.927917] ================================================================== [ 16.928187] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 16.928349] Write of size 2 at addr fff00000c635ab77 by task kunit_try_catch/173 [ 16.928604] [ 16.928902] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.930041] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.930083] Hardware name: linux,dummy-virt (DT) [ 16.930114] Call trace: [ 16.930136] show_stack+0x20/0x38 (C) [ 16.930196] dump_stack_lvl+0x8c/0xd0 [ 16.930243] print_report+0x118/0x608 [ 16.930287] kasan_report+0xdc/0x128 [ 16.930329] kasan_check_range+0x100/0x1a8 [ 16.930374] __asan_memset+0x34/0x78 [ 16.930414] kmalloc_oob_memset_2+0x150/0x2f8 [ 16.930457] kunit_try_run_case+0x170/0x3f0 [ 16.930502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.930551] kthread+0x328/0x630 [ 16.930589] ret_from_fork+0x10/0x20 [ 16.930641] [ 16.930658] Allocated by task 173: [ 16.930685] kasan_save_stack+0x3c/0x68 [ 16.930724] kasan_save_track+0x20/0x40 [ 16.930759] kasan_save_alloc_info+0x40/0x58 [ 16.930797] __kasan_kmalloc+0xd4/0xd8 [ 16.930831] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.930868] kmalloc_oob_memset_2+0xb0/0x2f8 [ 16.930904] kunit_try_run_case+0x170/0x3f0 [ 16.930940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.930990] kthread+0x328/0x630 [ 16.931021] ret_from_fork+0x10/0x20 [ 16.931055] [ 16.931073] The buggy address belongs to the object at fff00000c635ab00 [ 16.931073] which belongs to the cache kmalloc-128 of size 128 [ 16.931965] The buggy address is located 119 bytes inside of [ 16.931965] allocated 120-byte region [fff00000c635ab00, fff00000c635ab78) [ 16.932046] [ 16.932065] The buggy address belongs to the physical page: [ 16.932095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a [ 16.932147] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.932253] page_type: f5(slab) [ 16.932337] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.932389] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.932591] page dumped because: kasan: bad access detected [ 16.932634] [ 16.932652] Memory state around the buggy address: [ 16.932685] fff00000c635aa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.932727] fff00000c635aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.932767] >fff00000c635ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.932803] ^ [ 16.932841] fff00000c635ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.932882] fff00000c635ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.932918] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 16.900347] ================================================================== [ 16.900523] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 16.900577] Write of size 128 at addr fff00000c635aa00 by task kunit_try_catch/171 [ 16.900625] [ 16.900917] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.901178] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.901212] Hardware name: linux,dummy-virt (DT) [ 16.901313] Call trace: [ 16.901334] show_stack+0x20/0x38 (C) [ 16.901488] dump_stack_lvl+0x8c/0xd0 [ 16.901559] print_report+0x118/0x608 [ 16.901699] kasan_report+0xdc/0x128 [ 16.901792] kasan_check_range+0x100/0x1a8 [ 16.901842] __asan_memset+0x34/0x78 [ 16.902178] kmalloc_oob_in_memset+0x144/0x2d0 [ 16.902279] kunit_try_run_case+0x170/0x3f0 [ 16.902325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.902375] kthread+0x328/0x630 [ 16.902717] ret_from_fork+0x10/0x20 [ 16.903049] [ 16.903069] Allocated by task 171: [ 16.903096] kasan_save_stack+0x3c/0x68 [ 16.903136] kasan_save_track+0x20/0x40 [ 16.903172] kasan_save_alloc_info+0x40/0x58 [ 16.903519] __kasan_kmalloc+0xd4/0xd8 [ 16.903650] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.903725] kmalloc_oob_in_memset+0xb0/0x2d0 [ 16.903762] kunit_try_run_case+0x170/0x3f0 [ 16.903798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.904128] kthread+0x328/0x630 [ 16.904225] ret_from_fork+0x10/0x20 [ 16.904316] [ 16.904348] The buggy address belongs to the object at fff00000c635aa00 [ 16.904348] which belongs to the cache kmalloc-128 of size 128 [ 16.904440] The buggy address is located 0 bytes inside of [ 16.904440] allocated 120-byte region [fff00000c635aa00, fff00000c635aa78) [ 16.904519] [ 16.904626] The buggy address belongs to the physical page: [ 16.904705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a [ 16.904764] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.904857] page_type: f5(slab) [ 16.904894] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.904941] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.904990] page dumped because: kasan: bad access detected [ 16.905019] [ 16.905037] Memory state around the buggy address: [ 16.905068] fff00000c635a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.905109] fff00000c635a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.905150] >fff00000c635aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.905279] ^ [ 16.905575] fff00000c635aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.905772] fff00000c635ab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.905812] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 16.880254] ================================================================== [ 16.880848] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 16.881179] Read of size 16 at addr fff00000c5fbe800 by task kunit_try_catch/169 [ 16.881245] [ 16.881377] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.881486] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.881512] Hardware name: linux,dummy-virt (DT) [ 16.881541] Call trace: [ 16.881813] show_stack+0x20/0x38 (C) [ 16.881902] dump_stack_lvl+0x8c/0xd0 [ 16.881949] print_report+0x118/0x608 [ 16.882287] kasan_report+0xdc/0x128 [ 16.882449] __asan_report_load16_noabort+0x20/0x30 [ 16.882500] kmalloc_uaf_16+0x3bc/0x438 [ 16.882824] kunit_try_run_case+0x170/0x3f0 [ 16.882913] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.882964] kthread+0x328/0x630 [ 16.883016] ret_from_fork+0x10/0x20 [ 16.883087] [ 16.883108] Allocated by task 169: [ 16.883247] kasan_save_stack+0x3c/0x68 [ 16.883302] kasan_save_track+0x20/0x40 [ 16.883345] kasan_save_alloc_info+0x40/0x58 [ 16.883383] __kasan_kmalloc+0xd4/0xd8 [ 16.883433] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.883471] kmalloc_uaf_16+0x140/0x438 [ 16.883504] kunit_try_run_case+0x170/0x3f0 [ 16.883539] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.884013] kthread+0x328/0x630 [ 16.884051] ret_from_fork+0x10/0x20 [ 16.884250] [ 16.884270] Freed by task 169: [ 16.884311] kasan_save_stack+0x3c/0x68 [ 16.884389] kasan_save_track+0x20/0x40 [ 16.884530] kasan_save_free_info+0x4c/0x78 [ 16.884568] __kasan_slab_free+0x6c/0x98 [ 16.884609] kfree+0x214/0x3c8 [ 16.884757] kmalloc_uaf_16+0x190/0x438 [ 16.884831] kunit_try_run_case+0x170/0x3f0 [ 16.884924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.884965] kthread+0x328/0x630 [ 16.885256] ret_from_fork+0x10/0x20 [ 16.885299] [ 16.885318] The buggy address belongs to the object at fff00000c5fbe800 [ 16.885318] which belongs to the cache kmalloc-16 of size 16 [ 16.885374] The buggy address is located 0 bytes inside of [ 16.885374] freed 16-byte region [fff00000c5fbe800, fff00000c5fbe810) [ 16.885921] [ 16.885952] The buggy address belongs to the physical page: [ 16.886124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fbe [ 16.886188] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.886237] page_type: f5(slab) [ 16.886277] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 16.886326] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.886364] page dumped because: kasan: bad access detected [ 16.886410] [ 16.886428] Memory state around the buggy address: [ 16.886459] fff00000c5fbe700: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.886998] fff00000c5fbe780: 00 04 fc fc fa fb fc fc fa fb fc fc 00 00 fc fc [ 16.887174] >fff00000c5fbe800: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.887213] ^ [ 16.887240] fff00000c5fbe880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.887351] fff00000c5fbe900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.887735] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 16.838379] ================================================================== [ 16.838571] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 16.838781] Read of size 1 at addr fff00000c45a8c00 by task kunit_try_catch/165 [ 16.838830] [ 16.838861] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.839448] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.839639] Hardware name: linux,dummy-virt (DT) [ 16.839720] Call trace: [ 16.839950] show_stack+0x20/0x38 (C) [ 16.840039] dump_stack_lvl+0x8c/0xd0 [ 16.840173] print_report+0x118/0x608 [ 16.840218] kasan_report+0xdc/0x128 [ 16.840261] __asan_report_load1_noabort+0x20/0x30 [ 16.840609] krealloc_uaf+0x4c8/0x520 [ 16.840653] kunit_try_run_case+0x170/0x3f0 [ 16.840734] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.840906] kthread+0x328/0x630 [ 16.840964] ret_from_fork+0x10/0x20 [ 16.841021] [ 16.841038] Allocated by task 165: [ 16.841111] kasan_save_stack+0x3c/0x68 [ 16.841289] kasan_save_track+0x20/0x40 [ 16.841374] kasan_save_alloc_info+0x40/0x58 [ 16.841474] __kasan_kmalloc+0xd4/0xd8 [ 16.841585] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.841676] krealloc_uaf+0xc8/0x520 [ 16.841764] kunit_try_run_case+0x170/0x3f0 [ 16.841800] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.841842] kthread+0x328/0x630 [ 16.841872] ret_from_fork+0x10/0x20 [ 16.841952] [ 16.841995] Freed by task 165: [ 16.842019] kasan_save_stack+0x3c/0x68 [ 16.842055] kasan_save_track+0x20/0x40 [ 16.842090] kasan_save_free_info+0x4c/0x78 [ 16.842127] __kasan_slab_free+0x6c/0x98 [ 16.842162] kfree+0x214/0x3c8 [ 16.842194] krealloc_uaf+0x12c/0x520 [ 16.842371] kunit_try_run_case+0x170/0x3f0 [ 16.842638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.842963] kthread+0x328/0x630 [ 16.843276] ret_from_fork+0x10/0x20 [ 16.843357] [ 16.843660] The buggy address belongs to the object at fff00000c45a8c00 [ 16.843660] which belongs to the cache kmalloc-256 of size 256 [ 16.843722] The buggy address is located 0 bytes inside of [ 16.843722] freed 256-byte region [fff00000c45a8c00, fff00000c45a8d00) [ 16.843780] [ 16.843800] The buggy address belongs to the physical page: [ 16.843841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045a8 [ 16.843940] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.844395] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.844489] page_type: f5(slab) [ 16.844713] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.844838] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.844927] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.845113] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.845278] head: 0bfffe0000000001 ffffc1ffc3116a01 00000000ffffffff 00000000ffffffff [ 16.845325] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.845363] page dumped because: kasan: bad access detected [ 16.845824] [ 16.845861] Memory state around the buggy address: [ 16.845895] fff00000c45a8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.845937] fff00000c45a8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.845991] >fff00000c45a8c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.846027] ^ [ 16.846054] fff00000c45a8c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.846104] fff00000c45a8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.846140] ================================================================== [ 16.826549] ================================================================== [ 16.826653] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 16.826705] Read of size 1 at addr fff00000c45a8c00 by task kunit_try_catch/165 [ 16.826752] [ 16.826784] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.826862] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.826887] Hardware name: linux,dummy-virt (DT) [ 16.826916] Call trace: [ 16.826936] show_stack+0x20/0x38 (C) [ 16.826996] dump_stack_lvl+0x8c/0xd0 [ 16.827201] print_report+0x118/0x608 [ 16.827353] kasan_report+0xdc/0x128 [ 16.827738] __kasan_check_byte+0x54/0x70 [ 16.827789] krealloc_noprof+0x44/0x360 [ 16.827834] krealloc_uaf+0x180/0x520 [ 16.828105] kunit_try_run_case+0x170/0x3f0 [ 16.828264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.828899] kthread+0x328/0x630 [ 16.828947] ret_from_fork+0x10/0x20 [ 16.829640] [ 16.829660] Allocated by task 165: [ 16.830269] kasan_save_stack+0x3c/0x68 [ 16.830333] kasan_save_track+0x20/0x40 [ 16.830370] kasan_save_alloc_info+0x40/0x58 [ 16.830409] __kasan_kmalloc+0xd4/0xd8 [ 16.830935] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.831370] krealloc_uaf+0xc8/0x520 [ 16.831587] kunit_try_run_case+0x170/0x3f0 [ 16.831717] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.831760] kthread+0x328/0x630 [ 16.831792] ret_from_fork+0x10/0x20 [ 16.831837] [ 16.831991] Freed by task 165: [ 16.832120] kasan_save_stack+0x3c/0x68 [ 16.832160] kasan_save_track+0x20/0x40 [ 16.832254] kasan_save_free_info+0x4c/0x78 [ 16.832312] __kasan_slab_free+0x6c/0x98 [ 16.832426] kfree+0x214/0x3c8 [ 16.832459] krealloc_uaf+0x12c/0x520 [ 16.832494] kunit_try_run_case+0x170/0x3f0 [ 16.832530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.832611] kthread+0x328/0x630 [ 16.832767] ret_from_fork+0x10/0x20 [ 16.832950] [ 16.832973] The buggy address belongs to the object at fff00000c45a8c00 [ 16.832973] which belongs to the cache kmalloc-256 of size 256 [ 16.833198] The buggy address is located 0 bytes inside of [ 16.833198] freed 256-byte region [fff00000c45a8c00, fff00000c45a8d00) [ 16.833311] [ 16.833332] The buggy address belongs to the physical page: [ 16.833866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045a8 [ 16.834236] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.834407] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.834503] page_type: f5(slab) [ 16.834540] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.834766] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.834964] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.835025] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.835260] head: 0bfffe0000000001 ffffc1ffc3116a01 00000000ffffffff 00000000ffffffff [ 16.835411] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.835692] page dumped because: kasan: bad access detected [ 16.835815] [ 16.835909] Memory state around the buggy address: [ 16.835944] fff00000c45a8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.835997] fff00000c45a8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.836038] >fff00000c45a8c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.836074] ^ [ 16.836101] fff00000c45a8c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.836154] fff00000c45a8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.836189] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 16.744481] ================================================================== [ 16.744564] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 16.744625] Write of size 1 at addr fff00000c45a8ac9 by task kunit_try_catch/159 [ 16.744710] [ 16.744779] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.744858] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.744884] Hardware name: linux,dummy-virt (DT) [ 16.745042] Call trace: [ 16.745244] show_stack+0x20/0x38 (C) [ 16.745304] dump_stack_lvl+0x8c/0xd0 [ 16.745397] print_report+0x118/0x608 [ 16.745441] kasan_report+0xdc/0x128 [ 16.745484] __asan_report_store1_noabort+0x20/0x30 [ 16.745544] krealloc_less_oob_helper+0xa48/0xc50 [ 16.745591] krealloc_less_oob+0x20/0x38 [ 16.745665] kunit_try_run_case+0x170/0x3f0 [ 16.745730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.745781] kthread+0x328/0x630 [ 16.745868] ret_from_fork+0x10/0x20 [ 16.745915] [ 16.745932] Allocated by task 159: [ 16.745959] kasan_save_stack+0x3c/0x68 [ 16.746009] kasan_save_track+0x20/0x40 [ 16.746044] kasan_save_alloc_info+0x40/0x58 [ 16.746099] __kasan_krealloc+0x118/0x178 [ 16.746238] krealloc_noprof+0x128/0x360 [ 16.746287] krealloc_less_oob_helper+0x168/0xc50 [ 16.746418] krealloc_less_oob+0x20/0x38 [ 16.746462] kunit_try_run_case+0x170/0x3f0 [ 16.746499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.746590] kthread+0x328/0x630 [ 16.746716] ret_from_fork+0x10/0x20 [ 16.746762] [ 16.746788] The buggy address belongs to the object at fff00000c45a8a00 [ 16.746788] which belongs to the cache kmalloc-256 of size 256 [ 16.746854] The buggy address is located 0 bytes to the right of [ 16.746854] allocated 201-byte region [fff00000c45a8a00, fff00000c45a8ac9) [ 16.746915] [ 16.747222] The buggy address belongs to the physical page: [ 16.747260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045a8 [ 16.747367] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.747443] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.747566] page_type: f5(slab) [ 16.747666] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.747801] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.747904] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.748012] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.748103] head: 0bfffe0000000001 ffffc1ffc3116a01 00000000ffffffff 00000000ffffffff [ 16.748150] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.748202] page dumped because: kasan: bad access detected [ 16.748231] [ 16.748248] Memory state around the buggy address: [ 16.748278] fff00000c45a8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.748332] fff00000c45a8a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.748373] >fff00000c45a8a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.748424] ^ [ 16.748463] fff00000c45a8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.748504] fff00000c45a8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.748549] ================================================================== [ 16.810912] ================================================================== [ 16.811112] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 16.811176] Write of size 1 at addr fff00000c78420ea by task kunit_try_catch/163 [ 16.811284] [ 16.811385] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.811461] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.811486] Hardware name: linux,dummy-virt (DT) [ 16.811515] Call trace: [ 16.811759] show_stack+0x20/0x38 (C) [ 16.811817] dump_stack_lvl+0x8c/0xd0 [ 16.811864] print_report+0x118/0x608 [ 16.811926] kasan_report+0xdc/0x128 [ 16.811970] __asan_report_store1_noabort+0x20/0x30 [ 16.812032] krealloc_less_oob_helper+0xae4/0xc50 [ 16.812261] krealloc_large_less_oob+0x20/0x38 [ 16.812477] kunit_try_run_case+0x170/0x3f0 [ 16.812656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.812767] kthread+0x328/0x630 [ 16.812806] ret_from_fork+0x10/0x20 [ 16.813182] [ 16.813213] The buggy address belongs to the physical page: [ 16.813244] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107840 [ 16.813295] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.813514] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.813744] page_type: f8(unknown) [ 16.813783] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.813832] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.813879] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.813936] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.813996] head: 0bfffe0000000002 ffffc1ffc31e1001 00000000ffffffff 00000000ffffffff [ 16.814456] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.814579] page dumped because: kasan: bad access detected [ 16.814640] [ 16.814658] Memory state around the buggy address: [ 16.814743] fff00000c7841f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.814785] fff00000c7842000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.814826] >fff00000c7842080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.814916] ^ [ 16.815116] fff00000c7842100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.815291] fff00000c7842180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.815374] ================================================================== [ 16.797026] ================================================================== [ 16.797271] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 16.797324] Write of size 1 at addr fff00000c78420c9 by task kunit_try_catch/163 [ 16.797456] [ 16.797569] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.797661] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.797686] Hardware name: linux,dummy-virt (DT) [ 16.797715] Call trace: [ 16.797805] show_stack+0x20/0x38 (C) [ 16.797863] dump_stack_lvl+0x8c/0xd0 [ 16.797907] print_report+0x118/0x608 [ 16.797951] kasan_report+0xdc/0x128 [ 16.798042] __asan_report_store1_noabort+0x20/0x30 [ 16.798093] krealloc_less_oob_helper+0xa48/0xc50 [ 16.798139] krealloc_large_less_oob+0x20/0x38 [ 16.798209] kunit_try_run_case+0x170/0x3f0 [ 16.798284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.798335] kthread+0x328/0x630 [ 16.798395] ret_from_fork+0x10/0x20 [ 16.798460] [ 16.798497] The buggy address belongs to the physical page: [ 16.798551] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107840 [ 16.798602] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.798685] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.798736] page_type: f8(unknown) [ 16.798791] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.798840] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.798887] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.798934] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.798993] head: 0bfffe0000000002 ffffc1ffc31e1001 00000000ffffffff 00000000ffffffff [ 16.799236] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.799345] page dumped because: kasan: bad access detected [ 16.799414] [ 16.799476] Memory state around the buggy address: [ 16.799596] fff00000c7841f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.799638] fff00000c7842000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.799687] >fff00000c7842080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.799858] ^ [ 16.800077] fff00000c7842100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.800205] fff00000c7842180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.800308] ================================================================== [ 16.756112] ================================================================== [ 16.756200] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 16.756265] Write of size 1 at addr fff00000c45a8ada by task kunit_try_catch/159 [ 16.756329] [ 16.756369] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.756460] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.756486] Hardware name: linux,dummy-virt (DT) [ 16.756517] Call trace: [ 16.756638] show_stack+0x20/0x38 (C) [ 16.756844] dump_stack_lvl+0x8c/0xd0 [ 16.756890] print_report+0x118/0x608 [ 16.756933] kasan_report+0xdc/0x128 [ 16.756989] __asan_report_store1_noabort+0x20/0x30 [ 16.757057] krealloc_less_oob_helper+0xa80/0xc50 [ 16.757137] krealloc_less_oob+0x20/0x38 [ 16.757181] kunit_try_run_case+0x170/0x3f0 [ 16.757225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.757275] kthread+0x328/0x630 [ 16.757406] ret_from_fork+0x10/0x20 [ 16.757601] [ 16.757646] Allocated by task 159: [ 16.757675] kasan_save_stack+0x3c/0x68 [ 16.757717] kasan_save_track+0x20/0x40 [ 16.757761] kasan_save_alloc_info+0x40/0x58 [ 16.757800] __kasan_krealloc+0x118/0x178 [ 16.757835] krealloc_noprof+0x128/0x360 [ 16.757870] krealloc_less_oob_helper+0x168/0xc50 [ 16.757907] krealloc_less_oob+0x20/0x38 [ 16.757942] kunit_try_run_case+0x170/0x3f0 [ 16.757988] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.758029] kthread+0x328/0x630 [ 16.758059] ret_from_fork+0x10/0x20 [ 16.758095] [ 16.758113] The buggy address belongs to the object at fff00000c45a8a00 [ 16.758113] which belongs to the cache kmalloc-256 of size 256 [ 16.758167] The buggy address is located 17 bytes to the right of [ 16.758167] allocated 201-byte region [fff00000c45a8a00, fff00000c45a8ac9) [ 16.758441] [ 16.758485] The buggy address belongs to the physical page: [ 16.758533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045a8 [ 16.758585] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.758657] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.758715] page_type: f5(slab) [ 16.758761] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.758827] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.758875] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.759091] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.759188] head: 0bfffe0000000001 ffffc1ffc3116a01 00000000ffffffff 00000000ffffffff [ 16.759254] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.759338] page dumped because: kasan: bad access detected [ 16.759408] [ 16.759486] Memory state around the buggy address: [ 16.759552] fff00000c45a8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.759593] fff00000c45a8a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.759750] >fff00000c45a8a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.759871] ^ [ 16.760072] fff00000c45a8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.760135] fff00000c45a8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.760210] ================================================================== [ 16.816426] ================================================================== [ 16.816472] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 16.816584] Write of size 1 at addr fff00000c78420eb by task kunit_try_catch/163 [ 16.816781] [ 16.816867] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.817010] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.817035] Hardware name: linux,dummy-virt (DT) [ 16.817064] Call trace: [ 16.817254] show_stack+0x20/0x38 (C) [ 16.817303] dump_stack_lvl+0x8c/0xd0 [ 16.817348] print_report+0x118/0x608 [ 16.817513] kasan_report+0xdc/0x128 [ 16.817650] __asan_report_store1_noabort+0x20/0x30 [ 16.817837] krealloc_less_oob_helper+0xa58/0xc50 [ 16.817885] krealloc_large_less_oob+0x20/0x38 [ 16.817930] kunit_try_run_case+0x170/0x3f0 [ 16.817987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.818038] kthread+0x328/0x630 [ 16.818078] ret_from_fork+0x10/0x20 [ 16.818123] [ 16.818153] The buggy address belongs to the physical page: [ 16.818182] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107840 [ 16.818564] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.818620] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.819070] page_type: f8(unknown) [ 16.819115] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.819180] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.819321] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.819367] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.819414] head: 0bfffe0000000002 ffffc1ffc31e1001 00000000ffffffff 00000000ffffffff [ 16.819461] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.819499] page dumped because: kasan: bad access detected [ 16.819567] [ 16.819621] Memory state around the buggy address: [ 16.819651] fff00000c7841f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.819692] fff00000c7842000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.819732] >fff00000c7842080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.819768] ^ [ 16.819805] fff00000c7842100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.819847] fff00000c7842180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.819927] ================================================================== [ 16.806016] ================================================================== [ 16.806074] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 16.806120] Write of size 1 at addr fff00000c78420da by task kunit_try_catch/163 [ 16.806168] [ 16.806197] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.806273] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.806299] Hardware name: linux,dummy-virt (DT) [ 16.806328] Call trace: [ 16.806348] show_stack+0x20/0x38 (C) [ 16.806401] dump_stack_lvl+0x8c/0xd0 [ 16.806446] print_report+0x118/0x608 [ 16.806490] kasan_report+0xdc/0x128 [ 16.806532] __asan_report_store1_noabort+0x20/0x30 [ 16.806593] krealloc_less_oob_helper+0xa80/0xc50 [ 16.806680] krealloc_large_less_oob+0x20/0x38 [ 16.806725] kunit_try_run_case+0x170/0x3f0 [ 16.806927] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.806987] kthread+0x328/0x630 [ 16.807027] ret_from_fork+0x10/0x20 [ 16.807717] [ 16.807745] The buggy address belongs to the physical page: [ 16.807783] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107840 [ 16.807857] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.807902] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.807951] page_type: f8(unknown) [ 16.808244] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.808424] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.808476] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.808650] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.808723] head: 0bfffe0000000002 ffffc1ffc31e1001 00000000ffffffff 00000000ffffffff [ 16.808852] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.808890] page dumped because: kasan: bad access detected [ 16.808939] [ 16.809021] Memory state around the buggy address: [ 16.809051] fff00000c7841f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.809172] fff00000c7842000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.809216] >fff00000c7842080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.809252] ^ [ 16.809288] fff00000c7842100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.809328] fff00000c7842180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.809391] ================================================================== [ 16.766767] ================================================================== [ 16.766850] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 16.767167] Write of size 1 at addr fff00000c45a8aeb by task kunit_try_catch/159 [ 16.767603] [ 16.767650] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.767729] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.767754] Hardware name: linux,dummy-virt (DT) [ 16.768109] Call trace: [ 16.768218] show_stack+0x20/0x38 (C) [ 16.768297] dump_stack_lvl+0x8c/0xd0 [ 16.768484] print_report+0x118/0x608 [ 16.768894] kasan_report+0xdc/0x128 [ 16.769092] __asan_report_store1_noabort+0x20/0x30 [ 16.769157] krealloc_less_oob_helper+0xa58/0xc50 [ 16.769291] krealloc_less_oob+0x20/0x38 [ 16.769384] kunit_try_run_case+0x170/0x3f0 [ 16.769632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.769896] kthread+0x328/0x630 [ 16.770148] ret_from_fork+0x10/0x20 [ 16.770385] [ 16.770457] Allocated by task 159: [ 16.770525] kasan_save_stack+0x3c/0x68 [ 16.770689] kasan_save_track+0x20/0x40 [ 16.771076] kasan_save_alloc_info+0x40/0x58 [ 16.771309] __kasan_krealloc+0x118/0x178 [ 16.771467] krealloc_noprof+0x128/0x360 [ 16.771553] krealloc_less_oob_helper+0x168/0xc50 [ 16.771632] krealloc_less_oob+0x20/0x38 [ 16.771762] kunit_try_run_case+0x170/0x3f0 [ 16.772036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.772118] kthread+0x328/0x630 [ 16.772175] ret_from_fork+0x10/0x20 [ 16.772355] [ 16.772533] The buggy address belongs to the object at fff00000c45a8a00 [ 16.772533] which belongs to the cache kmalloc-256 of size 256 [ 16.772678] The buggy address is located 34 bytes to the right of [ 16.772678] allocated 201-byte region [fff00000c45a8a00, fff00000c45a8ac9) [ 16.772777] [ 16.772797] The buggy address belongs to the physical page: [ 16.772847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045a8 [ 16.773056] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.773252] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.773348] page_type: f5(slab) [ 16.773396] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.773554] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.773713] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.773775] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.773997] head: 0bfffe0000000001 ffffc1ffc3116a01 00000000ffffffff 00000000ffffffff [ 16.774241] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.774316] page dumped because: kasan: bad access detected [ 16.774451] [ 16.774519] Memory state around the buggy address: [ 16.774638] fff00000c45a8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.774749] fff00000c45a8a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.774791] >fff00000c45a8a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.774826] ^ [ 16.775283] fff00000c45a8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.775424] fff00000c45a8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.775505] ================================================================== [ 16.801388] ================================================================== [ 16.801452] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 16.801514] Write of size 1 at addr fff00000c78420d0 by task kunit_try_catch/163 [ 16.801563] [ 16.801713] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.801939] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.802028] Hardware name: linux,dummy-virt (DT) [ 16.802064] Call trace: [ 16.802085] show_stack+0x20/0x38 (C) [ 16.802151] dump_stack_lvl+0x8c/0xd0 [ 16.802197] print_report+0x118/0x608 [ 16.802241] kasan_report+0xdc/0x128 [ 16.802284] __asan_report_store1_noabort+0x20/0x30 [ 16.802332] krealloc_less_oob_helper+0xb9c/0xc50 [ 16.802378] krealloc_large_less_oob+0x20/0x38 [ 16.802424] kunit_try_run_case+0x170/0x3f0 [ 16.802468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.802528] kthread+0x328/0x630 [ 16.802569] ret_from_fork+0x10/0x20 [ 16.802642] [ 16.802661] The buggy address belongs to the physical page: [ 16.802690] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107840 [ 16.802972] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.803032] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.803145] page_type: f8(unknown) [ 16.803220] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.803370] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.803447] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.803551] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.803637] head: 0bfffe0000000002 ffffc1ffc31e1001 00000000ffffffff 00000000ffffffff [ 16.803757] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.803842] page dumped because: kasan: bad access detected [ 16.803943] [ 16.803961] Memory state around the buggy address: [ 16.804004] fff00000c7841f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.804082] fff00000c7842000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.804339] >fff00000c7842080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.804484] ^ [ 16.804550] fff00000c7842100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.804617] fff00000c7842180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.804731] ================================================================== [ 16.749496] ================================================================== [ 16.750047] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 16.750148] Write of size 1 at addr fff00000c45a8ad0 by task kunit_try_catch/159 [ 16.750214] [ 16.750263] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.750368] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.750394] Hardware name: linux,dummy-virt (DT) [ 16.750423] Call trace: [ 16.750443] show_stack+0x20/0x38 (C) [ 16.750488] dump_stack_lvl+0x8c/0xd0 [ 16.750532] print_report+0x118/0x608 [ 16.750577] kasan_report+0xdc/0x128 [ 16.750690] __asan_report_store1_noabort+0x20/0x30 [ 16.750881] krealloc_less_oob_helper+0xb9c/0xc50 [ 16.750970] krealloc_less_oob+0x20/0x38 [ 16.751078] kunit_try_run_case+0x170/0x3f0 [ 16.751226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.751331] kthread+0x328/0x630 [ 16.751432] ret_from_fork+0x10/0x20 [ 16.751519] [ 16.751548] Allocated by task 159: [ 16.751575] kasan_save_stack+0x3c/0x68 [ 16.751636] kasan_save_track+0x20/0x40 [ 16.751672] kasan_save_alloc_info+0x40/0x58 [ 16.751745] __kasan_krealloc+0x118/0x178 [ 16.751782] krealloc_noprof+0x128/0x360 [ 16.751909] krealloc_less_oob_helper+0x168/0xc50 [ 16.751950] krealloc_less_oob+0x20/0x38 [ 16.751997] kunit_try_run_case+0x170/0x3f0 [ 16.752100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.752186] kthread+0x328/0x630 [ 16.752282] ret_from_fork+0x10/0x20 [ 16.752380] [ 16.752445] The buggy address belongs to the object at fff00000c45a8a00 [ 16.752445] which belongs to the cache kmalloc-256 of size 256 [ 16.752798] The buggy address is located 7 bytes to the right of [ 16.752798] allocated 201-byte region [fff00000c45a8a00, fff00000c45a8ac9) [ 16.752986] [ 16.753120] The buggy address belongs to the physical page: [ 16.753223] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045a8 [ 16.753285] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.753331] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.753422] page_type: f5(slab) [ 16.753762] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.753869] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.754010] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.754090] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.754196] head: 0bfffe0000000001 ffffc1ffc3116a01 00000000ffffffff 00000000ffffffff [ 16.754289] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.754383] page dumped because: kasan: bad access detected [ 16.754420] [ 16.754437] Memory state around the buggy address: [ 16.754467] fff00000c45a8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.754644] fff00000c45a8a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.754847] >fff00000c45a8a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.754884] ^ [ 16.754920] fff00000c45a8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.754961] fff00000c45a8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.755008] ================================================================== [ 16.761332] ================================================================== [ 16.761378] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 16.761423] Write of size 1 at addr fff00000c45a8aea by task kunit_try_catch/159 [ 16.761470] [ 16.761499] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.761575] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.761630] Hardware name: linux,dummy-virt (DT) [ 16.761669] Call trace: [ 16.761702] show_stack+0x20/0x38 (C) [ 16.761831] dump_stack_lvl+0x8c/0xd0 [ 16.761890] print_report+0x118/0x608 [ 16.761934] kasan_report+0xdc/0x128 [ 16.761989] __asan_report_store1_noabort+0x20/0x30 [ 16.762039] krealloc_less_oob_helper+0xae4/0xc50 [ 16.762086] krealloc_less_oob+0x20/0x38 [ 16.763068] kunit_try_run_case+0x170/0x3f0 [ 16.763187] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.763242] kthread+0x328/0x630 [ 16.763290] ret_from_fork+0x10/0x20 [ 16.763338] [ 16.763356] Allocated by task 159: [ 16.763400] kasan_save_stack+0x3c/0x68 [ 16.763445] kasan_save_track+0x20/0x40 [ 16.763489] kasan_save_alloc_info+0x40/0x58 [ 16.763538] __kasan_krealloc+0x118/0x178 [ 16.763574] krealloc_noprof+0x128/0x360 [ 16.763611] krealloc_less_oob_helper+0x168/0xc50 [ 16.763648] krealloc_less_oob+0x20/0x38 [ 16.763682] kunit_try_run_case+0x170/0x3f0 [ 16.763718] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.763768] kthread+0x328/0x630 [ 16.763807] ret_from_fork+0x10/0x20 [ 16.763850] [ 16.763868] The buggy address belongs to the object at fff00000c45a8a00 [ 16.763868] which belongs to the cache kmalloc-256 of size 256 [ 16.763923] The buggy address is located 33 bytes to the right of [ 16.763923] allocated 201-byte region [fff00000c45a8a00, fff00000c45a8ac9) [ 16.764011] [ 16.764054] The buggy address belongs to the physical page: [ 16.764092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045a8 [ 16.764143] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.764196] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.764246] page_type: f5(slab) [ 16.764291] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.764355] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.764412] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.764468] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.764515] head: 0bfffe0000000001 ffffc1ffc3116a01 00000000ffffffff 00000000ffffffff [ 16.764570] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.764623] page dumped because: kasan: bad access detected [ 16.764658] [ 16.764675] Memory state around the buggy address: [ 16.764705] fff00000c45a8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.764746] fff00000c45a8a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.764786] >fff00000c45a8a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.764822] ^ [ 16.764857] fff00000c45a8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.764899] fff00000c45a8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.764944] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 16.782585] ================================================================== [ 16.782691] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 16.782845] Write of size 1 at addr fff00000c78420eb by task kunit_try_catch/161 [ 16.782943] [ 16.783024] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.783128] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.783162] Hardware name: linux,dummy-virt (DT) [ 16.783191] Call trace: [ 16.783238] show_stack+0x20/0x38 (C) [ 16.783287] dump_stack_lvl+0x8c/0xd0 [ 16.783333] print_report+0x118/0x608 [ 16.783523] kasan_report+0xdc/0x128 [ 16.783756] __asan_report_store1_noabort+0x20/0x30 [ 16.783857] krealloc_more_oob_helper+0x60c/0x678 [ 16.784047] krealloc_large_more_oob+0x20/0x38 [ 16.784159] kunit_try_run_case+0x170/0x3f0 [ 16.784260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.784342] kthread+0x328/0x630 [ 16.784382] ret_from_fork+0x10/0x20 [ 16.784712] [ 16.784744] The buggy address belongs to the physical page: [ 16.784775] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107840 [ 16.785125] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.785292] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.785387] page_type: f8(unknown) [ 16.785501] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.785563] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.785628] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.785705] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.785770] head: 0bfffe0000000002 ffffc1ffc31e1001 00000000ffffffff 00000000ffffffff [ 16.785837] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.785894] page dumped because: kasan: bad access detected [ 16.785939] [ 16.785966] Memory state around the buggy address: [ 16.786259] fff00000c7841f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.786308] fff00000c7842000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.786349] >fff00000c7842080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 16.786385] ^ [ 16.786577] fff00000c7842100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.787040] fff00000c7842180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.787129] ================================================================== [ 16.730892] ================================================================== [ 16.731057] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 16.731175] Write of size 1 at addr fff00000c45a88f0 by task kunit_try_catch/157 [ 16.731257] [ 16.731294] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.731370] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.731395] Hardware name: linux,dummy-virt (DT) [ 16.731545] Call trace: [ 16.731610] show_stack+0x20/0x38 (C) [ 16.731707] dump_stack_lvl+0x8c/0xd0 [ 16.731772] print_report+0x118/0x608 [ 16.731850] kasan_report+0xdc/0x128 [ 16.731933] __asan_report_store1_noabort+0x20/0x30 [ 16.732038] krealloc_more_oob_helper+0x5c0/0x678 [ 16.732141] krealloc_more_oob+0x20/0x38 [ 16.732238] kunit_try_run_case+0x170/0x3f0 [ 16.732332] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.732417] kthread+0x328/0x630 [ 16.732515] ret_from_fork+0x10/0x20 [ 16.732560] [ 16.732577] Allocated by task 157: [ 16.732603] kasan_save_stack+0x3c/0x68 [ 16.732789] kasan_save_track+0x20/0x40 [ 16.732851] kasan_save_alloc_info+0x40/0x58 [ 16.732950] __kasan_krealloc+0x118/0x178 [ 16.733071] krealloc_noprof+0x128/0x360 [ 16.733147] krealloc_more_oob_helper+0x168/0x678 [ 16.733193] krealloc_more_oob+0x20/0x38 [ 16.733280] kunit_try_run_case+0x170/0x3f0 [ 16.733404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.733489] kthread+0x328/0x630 [ 16.733595] ret_from_fork+0x10/0x20 [ 16.733639] [ 16.733659] The buggy address belongs to the object at fff00000c45a8800 [ 16.733659] which belongs to the cache kmalloc-256 of size 256 [ 16.734043] The buggy address is located 5 bytes to the right of [ 16.734043] allocated 235-byte region [fff00000c45a8800, fff00000c45a88eb) [ 16.734167] [ 16.734318] The buggy address belongs to the physical page: [ 16.734358] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045a8 [ 16.734534] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.734804] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.734884] page_type: f5(slab) [ 16.734948] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.735009] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.735068] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.735115] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.735288] head: 0bfffe0000000001 ffffc1ffc3116a01 00000000ffffffff 00000000ffffffff [ 16.735453] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.735550] page dumped because: kasan: bad access detected [ 16.735667] [ 16.735743] Memory state around the buggy address: [ 16.735864] fff00000c45a8780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.735927] fff00000c45a8800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.736006] >fff00000c45a8880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 16.736144] ^ [ 16.736215] fff00000c45a8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.736316] fff00000c45a8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.736381] ================================================================== [ 16.725782] ================================================================== [ 16.725854] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 16.725924] Write of size 1 at addr fff00000c45a88eb by task kunit_try_catch/157 [ 16.725987] [ 16.726018] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.726095] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.726119] Hardware name: linux,dummy-virt (DT) [ 16.726148] Call trace: [ 16.726315] show_stack+0x20/0x38 (C) [ 16.726445] dump_stack_lvl+0x8c/0xd0 [ 16.726518] print_report+0x118/0x608 [ 16.726674] kasan_report+0xdc/0x128 [ 16.726730] __asan_report_store1_noabort+0x20/0x30 [ 16.726779] krealloc_more_oob_helper+0x60c/0x678 [ 16.726825] krealloc_more_oob+0x20/0x38 [ 16.726868] kunit_try_run_case+0x170/0x3f0 [ 16.726942] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.727092] kthread+0x328/0x630 [ 16.727313] ret_from_fork+0x10/0x20 [ 16.727443] [ 16.727494] Allocated by task 157: [ 16.727566] kasan_save_stack+0x3c/0x68 [ 16.727622] kasan_save_track+0x20/0x40 [ 16.727659] kasan_save_alloc_info+0x40/0x58 [ 16.727697] __kasan_krealloc+0x118/0x178 [ 16.727753] krealloc_noprof+0x128/0x360 [ 16.727789] krealloc_more_oob_helper+0x168/0x678 [ 16.727826] krealloc_more_oob+0x20/0x38 [ 16.728088] kunit_try_run_case+0x170/0x3f0 [ 16.728231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.728287] kthread+0x328/0x630 [ 16.728326] ret_from_fork+0x10/0x20 [ 16.728372] [ 16.728392] The buggy address belongs to the object at fff00000c45a8800 [ 16.728392] which belongs to the cache kmalloc-256 of size 256 [ 16.728458] The buggy address is located 0 bytes to the right of [ 16.728458] allocated 235-byte region [fff00000c45a8800, fff00000c45a88eb) [ 16.728534] [ 16.728561] The buggy address belongs to the physical page: [ 16.728592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045a8 [ 16.728644] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.728690] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.728746] page_type: f5(slab) [ 16.728787] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.728846] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.728900] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.728949] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.729017] head: 0bfffe0000000001 ffffc1ffc3116a01 00000000ffffffff 00000000ffffffff [ 16.729063] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.729101] page dumped because: kasan: bad access detected [ 16.729136] [ 16.729158] Memory state around the buggy address: [ 16.729189] fff00000c45a8780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.729244] fff00000c45a8800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.729292] >fff00000c45a8880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 16.729328] ^ [ 16.729373] fff00000c45a8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.729422] fff00000c45a8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.729472] ================================================================== [ 16.788247] ================================================================== [ 16.788317] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 16.788415] Write of size 1 at addr fff00000c78420f0 by task kunit_try_catch/161 [ 16.788493] [ 16.788540] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.788617] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.788670] Hardware name: linux,dummy-virt (DT) [ 16.788719] Call trace: [ 16.788757] show_stack+0x20/0x38 (C) [ 16.788827] dump_stack_lvl+0x8c/0xd0 [ 16.788933] print_report+0x118/0x608 [ 16.788994] kasan_report+0xdc/0x128 [ 16.789056] __asan_report_store1_noabort+0x20/0x30 [ 16.789106] krealloc_more_oob_helper+0x5c0/0x678 [ 16.789424] krealloc_large_more_oob+0x20/0x38 [ 16.789524] kunit_try_run_case+0x170/0x3f0 [ 16.789570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.789839] kthread+0x328/0x630 [ 16.789933] ret_from_fork+0x10/0x20 [ 16.790025] [ 16.790075] The buggy address belongs to the physical page: [ 16.790112] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107840 [ 16.790165] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.790217] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.790307] page_type: f8(unknown) [ 16.790382] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.790441] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.790495] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.790542] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.790589] head: 0bfffe0000000002 ffffc1ffc31e1001 00000000ffffffff 00000000ffffffff [ 16.790642] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.790680] page dumped because: kasan: bad access detected [ 16.790730] [ 16.790749] Memory state around the buggy address: [ 16.790780] fff00000c7841f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.790821] fff00000c7842000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.791085] >fff00000c7842080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 16.791162] ^ [ 16.791212] fff00000c7842100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.791281] fff00000c7842180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.791330] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 16.717003] ================================================================== [ 16.717077] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 16.717132] Read of size 1 at addr fff00000c7840000 by task kunit_try_catch/155 [ 16.717186] [ 16.717220] CPU: 0 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.717326] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.717353] Hardware name: linux,dummy-virt (DT) [ 16.717382] Call trace: [ 16.717404] show_stack+0x20/0x38 (C) [ 16.717461] dump_stack_lvl+0x8c/0xd0 [ 16.717507] print_report+0x118/0x608 [ 16.717550] kasan_report+0xdc/0x128 [ 16.717776] __asan_report_load1_noabort+0x20/0x30 [ 16.717852] page_alloc_uaf+0x328/0x350 [ 16.717896] kunit_try_run_case+0x170/0x3f0 [ 16.717943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.718019] kthread+0x328/0x630 [ 16.718099] ret_from_fork+0x10/0x20 [ 16.718145] [ 16.718171] The buggy address belongs to the physical page: [ 16.718217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107840 [ 16.718270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.718317] page_type: f0(buddy) [ 16.718516] raw: 0bfffe0000000000 fff00000ff616170 fff00000ff616170 0000000000000000 [ 16.718568] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000 [ 16.718621] page dumped because: kasan: bad access detected [ 16.718697] [ 16.718774] Memory state around the buggy address: [ 16.718840] fff00000c783ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.718952] fff00000c783ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.719028] >fff00000c7840000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.719065] ^ [ 16.719091] fff00000c7840080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.719149] fff00000c7840100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.719186] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[ 16.701188] ================================================================== [ 16.701292] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 16.701356] Free of addr fff00000c6530001 by task kunit_try_catch/151 [ 16.701409] [ 16.701441] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.701733] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.701798] Hardware name: linux,dummy-virt (DT) [ 16.701828] Call trace: [ 16.701850] show_stack+0x20/0x38 (C) [ 16.701899] dump_stack_lvl+0x8c/0xd0 [ 16.701945] print_report+0x118/0x608 [ 16.702034] kasan_report_invalid_free+0xc0/0xe8 [ 16.702089] __kasan_kfree_large+0x5c/0xa8 [ 16.702135] free_large_kmalloc+0x64/0x190 [ 16.702178] kfree+0x270/0x3c8 [ 16.702492] kmalloc_large_invalid_free+0x108/0x270 [ 16.702558] kunit_try_run_case+0x170/0x3f0 [ 16.702679] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.702795] kthread+0x328/0x630 [ 16.702883] ret_from_fork+0x10/0x20 [ 16.703028] [ 16.703106] The buggy address belongs to the physical page: [ 16.703200] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106530 [ 16.703310] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.703374] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.703424] page_type: f8(unknown) [ 16.703482] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.703530] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.703576] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.703633] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.703680] head: 0bfffe0000000002 ffffc1ffc3194c01 00000000ffffffff 00000000ffffffff [ 16.703733] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.703771] page dumped because: kasan: bad access detected [ 16.703801] [ 16.703818] Memory state around the buggy address: [ 16.703991] fff00000c652ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.704057] fff00000c652ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.704156] >fff00000c6530000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.704261] ^ [ 16.704298] fff00000c6530080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.704355] fff00000c6530100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.704500] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 16.693889] ================================================================== [ 16.694213] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 16.694288] Read of size 1 at addr fff00000c6530000 by task kunit_try_catch/149 [ 16.694355] [ 16.694403] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.694541] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.694567] Hardware name: linux,dummy-virt (DT) [ 16.694596] Call trace: [ 16.694627] show_stack+0x20/0x38 (C) [ 16.694724] dump_stack_lvl+0x8c/0xd0 [ 16.695029] print_report+0x118/0x608 [ 16.695147] kasan_report+0xdc/0x128 [ 16.695284] __asan_report_load1_noabort+0x20/0x30 [ 16.695375] kmalloc_large_uaf+0x2cc/0x2f8 [ 16.695460] kunit_try_run_case+0x170/0x3f0 [ 16.695547] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.695671] kthread+0x328/0x630 [ 16.695749] ret_from_fork+0x10/0x20 [ 16.695817] [ 16.695836] The buggy address belongs to the physical page: [ 16.695891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106530 [ 16.695943] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.696012] raw: 0bfffe0000000000 fff00000da456c40 fff00000da456c40 0000000000000000 [ 16.696060] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 16.696098] page dumped because: kasan: bad access detected [ 16.696127] [ 16.696329] Memory state around the buggy address: [ 16.696421] fff00000c652ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.696516] fff00000c652ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.696599] >fff00000c6530000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.696673] ^ [ 16.696758] fff00000c6530080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.696814] fff00000c6530100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.696871] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 16.684351] ================================================================== [ 16.684417] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 16.684480] Write of size 1 at addr fff00000c653200a by task kunit_try_catch/147 [ 16.684537] [ 16.684605] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.684722] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.684747] Hardware name: linux,dummy-virt (DT) [ 16.684776] Call trace: [ 16.684814] show_stack+0x20/0x38 (C) [ 16.684943] dump_stack_lvl+0x8c/0xd0 [ 16.685030] print_report+0x118/0x608 [ 16.685090] kasan_report+0xdc/0x128 [ 16.685134] __asan_report_store1_noabort+0x20/0x30 [ 16.685193] kmalloc_large_oob_right+0x278/0x2b8 [ 16.685249] kunit_try_run_case+0x170/0x3f0 [ 16.685294] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.685353] kthread+0x328/0x630 [ 16.685392] ret_from_fork+0x10/0x20 [ 16.685445] [ 16.685488] The buggy address belongs to the physical page: [ 16.685520] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106530 [ 16.685570] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.685621] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.685677] page_type: f8(unknown) [ 16.685713] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.685809] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.685911] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.686067] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.686211] head: 0bfffe0000000002 ffffc1ffc3194c01 00000000ffffffff 00000000ffffffff [ 16.686304] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.686418] page dumped because: kasan: bad access detected [ 16.686477] [ 16.686528] Memory state around the buggy address: [ 16.686961] fff00000c6531f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.687021] fff00000c6531f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.687062] >fff00000c6532000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.687098] ^ [ 16.687126] fff00000c6532080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.687166] fff00000c6532100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.687202] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 16.669330] ================================================================== [ 16.669394] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 16.669445] Write of size 1 at addr fff00000c6595f00 by task kunit_try_catch/145 [ 16.669493] [ 16.669524] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.669603] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.669634] Hardware name: linux,dummy-virt (DT) [ 16.669663] Call trace: [ 16.669684] show_stack+0x20/0x38 (C) [ 16.669728] dump_stack_lvl+0x8c/0xd0 [ 16.669772] print_report+0x118/0x608 [ 16.669814] kasan_report+0xdc/0x128 [ 16.669856] __asan_report_store1_noabort+0x20/0x30 [ 16.669904] kmalloc_big_oob_right+0x2a4/0x2f0 [ 16.669947] kunit_try_run_case+0x170/0x3f0 [ 16.670218] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.670285] kthread+0x328/0x630 [ 16.670328] ret_from_fork+0x10/0x20 [ 16.670372] [ 16.670390] Allocated by task 145: [ 16.670416] kasan_save_stack+0x3c/0x68 [ 16.670455] kasan_save_track+0x20/0x40 [ 16.670491] kasan_save_alloc_info+0x40/0x58 [ 16.670528] __kasan_kmalloc+0xd4/0xd8 [ 16.670563] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.670680] kmalloc_big_oob_right+0xb8/0x2f0 [ 16.672834] kunit_try_run_case+0x170/0x3f0 [ 16.673997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.674054] kthread+0x328/0x630 [ 16.674099] ret_from_fork+0x10/0x20 [ 16.674136] [ 16.674157] The buggy address belongs to the object at fff00000c6594000 [ 16.674157] which belongs to the cache kmalloc-8k of size 8192 [ 16.674213] The buggy address is located 0 bytes to the right of [ 16.674213] allocated 7936-byte region [fff00000c6594000, fff00000c6595f00) [ 16.674274] [ 16.674292] The buggy address belongs to the physical page: [ 16.674332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106590 [ 16.674394] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.674501] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.674556] page_type: f5(slab) [ 16.674593] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 16.674640] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 16.674687] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 16.674733] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 16.674780] head: 0bfffe0000000003 ffffc1ffc3196401 00000000ffffffff 00000000ffffffff [ 16.676536] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 16.676658] page dumped because: kasan: bad access detected [ 16.676693] [ 16.676711] Memory state around the buggy address: [ 16.676743] fff00000c6595e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.676785] fff00000c6595e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.677683] >fff00000c6595f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.678081] ^ [ 16.678124] fff00000c6595f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.678595] fff00000c6596000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.679057] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 16.656266] ================================================================== [ 16.656324] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 16.656372] Write of size 1 at addr fff00000c635a878 by task kunit_try_catch/143 [ 16.656791] [ 16.656836] CPU: 0 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.656916] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.656942] Hardware name: linux,dummy-virt (DT) [ 16.657068] Call trace: [ 16.657095] show_stack+0x20/0x38 (C) [ 16.657160] dump_stack_lvl+0x8c/0xd0 [ 16.657350] print_report+0x118/0x608 [ 16.657396] kasan_report+0xdc/0x128 [ 16.657442] __asan_report_store1_noabort+0x20/0x30 [ 16.657651] kmalloc_track_caller_oob_right+0x418/0x488 [ 16.657716] kunit_try_run_case+0x170/0x3f0 [ 16.657761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.657811] kthread+0x328/0x630 [ 16.657850] ret_from_fork+0x10/0x20 [ 16.657895] [ 16.657913] Allocated by task 143: [ 16.657948] kasan_save_stack+0x3c/0x68 [ 16.658000] kasan_save_track+0x20/0x40 [ 16.658036] kasan_save_alloc_info+0x40/0x58 [ 16.658074] __kasan_kmalloc+0xd4/0xd8 [ 16.658113] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 16.658156] kmalloc_track_caller_oob_right+0x184/0x488 [ 16.658195] kunit_try_run_case+0x170/0x3f0 [ 16.658241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.658282] kthread+0x328/0x630 [ 16.658313] ret_from_fork+0x10/0x20 [ 16.658346] [ 16.658371] The buggy address belongs to the object at fff00000c635a800 [ 16.658371] which belongs to the cache kmalloc-128 of size 128 [ 16.658434] The buggy address is located 0 bytes to the right of [ 16.658434] allocated 120-byte region [fff00000c635a800, fff00000c635a878) [ 16.658495] [ 16.658526] The buggy address belongs to the physical page: [ 16.658555] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a [ 16.658605] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.658926] page_type: f5(slab) [ 16.659315] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.659504] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.659592] page dumped because: kasan: bad access detected [ 16.659747] [ 16.659818] Memory state around the buggy address: [ 16.659895] fff00000c635a700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.660056] fff00000c635a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.660099] >fff00000c635a800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.660323] ^ [ 16.660503] fff00000c635a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.660570] fff00000c635a900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.660699] ================================================================== [ 16.649195] ================================================================== [ 16.649378] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 16.649530] Write of size 1 at addr fff00000c635a778 by task kunit_try_catch/143 [ 16.649584] [ 16.649638] CPU: 0 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.649725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.649751] Hardware name: linux,dummy-virt (DT) [ 16.649779] Call trace: [ 16.649800] show_stack+0x20/0x38 (C) [ 16.650106] dump_stack_lvl+0x8c/0xd0 [ 16.650439] print_report+0x118/0x608 [ 16.650499] kasan_report+0xdc/0x128 [ 16.650543] __asan_report_store1_noabort+0x20/0x30 [ 16.650659] kmalloc_track_caller_oob_right+0x40c/0x488 [ 16.650759] kunit_try_run_case+0x170/0x3f0 [ 16.650955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.651033] kthread+0x328/0x630 [ 16.651183] ret_from_fork+0x10/0x20 [ 16.651346] [ 16.651395] Allocated by task 143: [ 16.651500] kasan_save_stack+0x3c/0x68 [ 16.651579] kasan_save_track+0x20/0x40 [ 16.651671] kasan_save_alloc_info+0x40/0x58 [ 16.651810] __kasan_kmalloc+0xd4/0xd8 [ 16.651886] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 16.652011] kmalloc_track_caller_oob_right+0xa8/0x488 [ 16.652052] kunit_try_run_case+0x170/0x3f0 [ 16.652104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.652450] kthread+0x328/0x630 [ 16.652504] ret_from_fork+0x10/0x20 [ 16.652615] [ 16.652654] The buggy address belongs to the object at fff00000c635a700 [ 16.652654] which belongs to the cache kmalloc-128 of size 128 [ 16.652744] The buggy address is located 0 bytes to the right of [ 16.652744] allocated 120-byte region [fff00000c635a700, fff00000c635a778) [ 16.652894] [ 16.652915] The buggy address belongs to the physical page: [ 16.652962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a [ 16.653286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.653380] page_type: f5(slab) [ 16.653419] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.653724] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.653843] page dumped because: kasan: bad access detected [ 16.653925] [ 16.653963] Memory state around the buggy address: [ 16.654079] fff00000c635a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.654145] fff00000c635a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.654223] >fff00000c635a700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.654367] ^ [ 16.654419] fff00000c635a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.654466] fff00000c635a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.654716] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 16.634926] ================================================================== [ 16.635321] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 16.635480] Read of size 1 at addr fff00000c650f000 by task kunit_try_catch/141 [ 16.635565] [ 16.635883] CPU: 0 UID: 0 PID: 141 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.635989] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.636016] Hardware name: linux,dummy-virt (DT) [ 16.636045] Call trace: [ 16.636067] show_stack+0x20/0x38 (C) [ 16.636165] dump_stack_lvl+0x8c/0xd0 [ 16.636214] print_report+0x118/0x608 [ 16.636268] kasan_report+0xdc/0x128 [ 16.636311] __asan_report_load1_noabort+0x20/0x30 [ 16.636359] kmalloc_node_oob_right+0x2f4/0x330 [ 16.636405] kunit_try_run_case+0x170/0x3f0 [ 16.636451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.636501] kthread+0x328/0x630 [ 16.636541] ret_from_fork+0x10/0x20 [ 16.636587] [ 16.636606] Allocated by task 141: [ 16.636641] kasan_save_stack+0x3c/0x68 [ 16.636680] kasan_save_track+0x20/0x40 [ 16.636724] kasan_save_alloc_info+0x40/0x58 [ 16.636762] __kasan_kmalloc+0xd4/0xd8 [ 16.636802] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 16.636841] kmalloc_node_oob_right+0xbc/0x330 [ 16.636878] kunit_try_run_case+0x170/0x3f0 [ 16.636922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.636963] kthread+0x328/0x630 [ 16.637004] ret_from_fork+0x10/0x20 [ 16.637037] [ 16.637055] The buggy address belongs to the object at fff00000c650e000 [ 16.637055] which belongs to the cache kmalloc-4k of size 4096 [ 16.637109] The buggy address is located 0 bytes to the right of [ 16.637109] allocated 4096-byte region [fff00000c650e000, fff00000c650f000) [ 16.637171] [ 16.637190] The buggy address belongs to the physical page: [ 16.637282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106508 [ 16.637457] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.637504] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.637580] page_type: f5(slab) [ 16.637622] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 16.637680] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 16.637753] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 16.637801] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 16.637849] head: 0bfffe0000000003 ffffc1ffc3194201 00000000ffffffff 00000000ffffffff [ 16.637897] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 16.637953] page dumped because: kasan: bad access detected [ 16.638809] [ 16.638835] Memory state around the buggy address: [ 16.638896] fff00000c650ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.638953] fff00000c650ef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.639015] >fff00000c650f000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.639099] ^ [ 16.639127] fff00000c650f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.639503] fff00000c650f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.639671] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 16.622390] ================================================================== [ 16.622461] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 16.622770] Read of size 1 at addr fff00000c5fbe79f by task kunit_try_catch/139 [ 16.623023] [ 16.623128] CPU: 0 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.623316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.623366] Hardware name: linux,dummy-virt (DT) [ 16.623398] Call trace: [ 16.623419] show_stack+0x20/0x38 (C) [ 16.623819] dump_stack_lvl+0x8c/0xd0 [ 16.623902] print_report+0x118/0x608 [ 16.624033] kasan_report+0xdc/0x128 [ 16.624085] __asan_report_load1_noabort+0x20/0x30 [ 16.624150] kmalloc_oob_left+0x2ec/0x320 [ 16.624194] kunit_try_run_case+0x170/0x3f0 [ 16.624242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.624298] kthread+0x328/0x630 [ 16.624344] ret_from_fork+0x10/0x20 [ 16.624400] [ 16.624424] Allocated by task 9: [ 16.624459] kasan_save_stack+0x3c/0x68 [ 16.624508] kasan_save_track+0x20/0x40 [ 16.624543] kasan_save_alloc_info+0x40/0x58 [ 16.624587] __kasan_kmalloc+0xd4/0xd8 [ 16.624631] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 16.624690] kvasprintf+0xe0/0x180 [ 16.624724] __kthread_create_on_node+0x16c/0x350 [ 16.624770] kthread_create_on_node+0xe4/0x130 [ 16.624807] create_worker+0x380/0x6b8 [ 16.624851] worker_thread+0x808/0xf38 [ 16.624884] kthread+0x328/0x630 [ 16.624916] ret_from_fork+0x10/0x20 [ 16.624950] [ 16.624968] The buggy address belongs to the object at fff00000c5fbe780 [ 16.624968] which belongs to the cache kmalloc-16 of size 16 [ 16.625473] The buggy address is located 19 bytes to the right of [ 16.625473] allocated 12-byte region [fff00000c5fbe780, fff00000c5fbe78c) [ 16.625559] [ 16.625731] The buggy address belongs to the physical page: [ 16.625825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fbe [ 16.626014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.626099] page_type: f5(slab) [ 16.626245] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 16.626343] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.626447] page dumped because: kasan: bad access detected [ 16.626539] [ 16.626582] Memory state around the buggy address: [ 16.626902] fff00000c5fbe680: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 16.626994] fff00000c5fbe700: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.627050] >fff00000c5fbe780: 00 04 fc fc 00 07 fc fc fc fc fc fc fc fc fc fc [ 16.627185] ^ [ 16.627274] fff00000c5fbe800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.627393] fff00000c5fbe880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.627429] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 16.586661] ================================================================== [ 16.587037] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 16.587840] Write of size 1 at addr fff00000c635a673 by task kunit_try_catch/137 [ 16.587943] [ 16.588698] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G N 6.16.0-rc5 #1 PREEMPT [ 16.588840] Tainted: [N]=TEST [ 16.588873] Hardware name: linux,dummy-virt (DT) [ 16.589106] Call trace: [ 16.589273] show_stack+0x20/0x38 (C) [ 16.589405] dump_stack_lvl+0x8c/0xd0 [ 16.589464] print_report+0x118/0x608 [ 16.589510] kasan_report+0xdc/0x128 [ 16.589554] __asan_report_store1_noabort+0x20/0x30 [ 16.589604] kmalloc_oob_right+0x5a4/0x660 [ 16.589654] kunit_try_run_case+0x170/0x3f0 [ 16.589703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.589754] kthread+0x328/0x630 [ 16.589797] ret_from_fork+0x10/0x20 [ 16.589949] [ 16.589997] Allocated by task 137: [ 16.590110] kasan_save_stack+0x3c/0x68 [ 16.590173] kasan_save_track+0x20/0x40 [ 16.590210] kasan_save_alloc_info+0x40/0x58 [ 16.590248] __kasan_kmalloc+0xd4/0xd8 [ 16.590283] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.590322] kmalloc_oob_right+0xb0/0x660 [ 16.590356] kunit_try_run_case+0x170/0x3f0 [ 16.590392] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.590434] kthread+0x328/0x630 [ 16.590464] ret_from_fork+0x10/0x20 [ 16.590516] [ 16.590574] The buggy address belongs to the object at fff00000c635a600 [ 16.590574] which belongs to the cache kmalloc-128 of size 128 [ 16.590722] The buggy address is located 0 bytes to the right of [ 16.590722] allocated 115-byte region [fff00000c635a600, fff00000c635a673) [ 16.590792] [ 16.590884] The buggy address belongs to the physical page: [ 16.591068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a [ 16.591329] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.591608] page_type: f5(slab) [ 16.591910] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.591973] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.592090] page dumped because: kasan: bad access detected [ 16.592128] [ 16.592153] Memory state around the buggy address: [ 16.592371] fff00000c635a500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.592434] fff00000c635a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.592486] >fff00000c635a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.592538] ^ [ 16.592617] fff00000c635a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.592658] fff00000c635a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.592716] ================================================================== [ 16.599524] ================================================================== [ 16.599570] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 16.599911] Read of size 1 at addr fff00000c635a680 by task kunit_try_catch/137 [ 16.600103] [ 16.600142] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.600376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.600443] Hardware name: linux,dummy-virt (DT) [ 16.600473] Call trace: [ 16.600493] show_stack+0x20/0x38 (C) [ 16.600764] dump_stack_lvl+0x8c/0xd0 [ 16.601103] print_report+0x118/0x608 [ 16.601177] kasan_report+0xdc/0x128 [ 16.601340] __asan_report_load1_noabort+0x20/0x30 [ 16.601522] kmalloc_oob_right+0x5d0/0x660 [ 16.601655] kunit_try_run_case+0x170/0x3f0 [ 16.601705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.601756] kthread+0x328/0x630 [ 16.602126] ret_from_fork+0x10/0x20 [ 16.602196] [ 16.602214] Allocated by task 137: [ 16.602240] kasan_save_stack+0x3c/0x68 [ 16.602525] kasan_save_track+0x20/0x40 [ 16.602716] kasan_save_alloc_info+0x40/0x58 [ 16.602833] __kasan_kmalloc+0xd4/0xd8 [ 16.602919] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.603048] kmalloc_oob_right+0xb0/0x660 [ 16.603088] kunit_try_run_case+0x170/0x3f0 [ 16.603136] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.603184] kthread+0x328/0x630 [ 16.603214] ret_from_fork+0x10/0x20 [ 16.603248] [ 16.603267] The buggy address belongs to the object at fff00000c635a600 [ 16.603267] which belongs to the cache kmalloc-128 of size 128 [ 16.603322] The buggy address is located 13 bytes to the right of [ 16.603322] allocated 115-byte region [fff00000c635a600, fff00000c635a673) [ 16.603384] [ 16.603404] The buggy address belongs to the physical page: [ 16.603434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a [ 16.603835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.603902] page_type: f5(slab) [ 16.603942] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.604255] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.604376] page dumped because: kasan: bad access detected [ 16.604448] [ 16.604466] Memory state around the buggy address: [ 16.604517] fff00000c635a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.604943] fff00000c635a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.605041] >fff00000c635a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.605186] ^ [ 16.605216] fff00000c635a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.605502] fff00000c635a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.605581] ================================================================== [ 16.593432] ================================================================== [ 16.593475] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 16.593519] Write of size 1 at addr fff00000c635a678 by task kunit_try_catch/137 [ 16.593694] [ 16.593728] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.593807] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.593832] Hardware name: linux,dummy-virt (DT) [ 16.593860] Call trace: [ 16.593880] show_stack+0x20/0x38 (C) [ 16.593927] dump_stack_lvl+0x8c/0xd0 [ 16.594253] print_report+0x118/0x608 [ 16.594726] kasan_report+0xdc/0x128 [ 16.594920] __asan_report_store1_noabort+0x20/0x30 [ 16.594991] kmalloc_oob_right+0x538/0x660 [ 16.595319] kunit_try_run_case+0x170/0x3f0 [ 16.595406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.596018] kthread+0x328/0x630 [ 16.596074] ret_from_fork+0x10/0x20 [ 16.596161] [ 16.596204] Allocated by task 137: [ 16.596390] kasan_save_stack+0x3c/0x68 [ 16.596437] kasan_save_track+0x20/0x40 [ 16.596551] kasan_save_alloc_info+0x40/0x58 [ 16.596657] __kasan_kmalloc+0xd4/0xd8 [ 16.597013] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.597088] kmalloc_oob_right+0xb0/0x660 [ 16.597124] kunit_try_run_case+0x170/0x3f0 [ 16.597199] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.597246] kthread+0x328/0x630 [ 16.597277] ret_from_fork+0x10/0x20 [ 16.597311] [ 16.597337] The buggy address belongs to the object at fff00000c635a600 [ 16.597337] which belongs to the cache kmalloc-128 of size 128 [ 16.597403] The buggy address is located 5 bytes to the right of [ 16.597403] allocated 115-byte region [fff00000c635a600, fff00000c635a673) [ 16.597465] [ 16.597483] The buggy address belongs to the physical page: [ 16.597511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a [ 16.597566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.597628] page_type: f5(slab) [ 16.597664] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.597722] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.597760] page dumped because: kasan: bad access detected [ 16.597799] [ 16.597823] Memory state around the buggy address: [ 16.597853] fff00000c635a500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.597894] fff00000c635a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.597935] >fff00000c635a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.597970] ^ [ 16.598035] fff00000c635a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.598076] fff00000c635a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.598111] ==================================================================
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------ [ 95.178653] WARNING: CPU: 1 PID: 657 at lib/math/int_log.c:120 intlog10+0x38/0x48 [ 95.180040] Modules linked in: [ 95.180252] CPU: 1 UID: 0 PID: 657 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc5 #1 PREEMPT [ 95.180779] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 95.181130] Hardware name: linux,dummy-virt (DT) [ 95.181399] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 95.181773] pc : intlog10+0x38/0x48 [ 95.182011] lr : intlog10_test+0xe4/0x200 [ 95.182260] sp : ffff8000821f7c10 [ 95.182467] x29: ffff8000821f7c90 x28: 0000000000000000 x27: 0000000000000000 [ 95.182913] x26: 1ffe000018ae94c1 x25: 0000000000000000 x24: ffff8000821f7ce0 [ 95.183305] x23: ffff8000821f7d00 x22: 0000000000000000 x21: 1ffff0001043ef82 [ 95.183647] x20: ffff91dea1689e80 x19: ffff800080087990 x18: 000000009a2e7f45 [ 95.184132] x17: 00000000fc3d57f6 x16: fff00000c0975c3c x15: fff00000ff616b08 [ 95.184606] x14: 00000000f1f1f1f1 x13: 1ffe00001b48a5cd x12: ffff723bd4aa3379 [ 95.185137] x11: 1ffff23bd4aa3378 x10: ffff723bd4aa3378 x9 : ffff91de9ec35fdc [ 95.185598] x8 : ffff91dea5519bc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 95.186025] x5 : ffff70001043ef82 x4 : 1ffff00010010f3a x3 : 1ffff23bd42d13d0 [ 95.186440] x2 : 1ffff23bd42d13d0 x1 : 0000000000000003 x0 : 0000000000000000 [ 95.187049] Call trace: [ 95.187190] intlog10+0x38/0x48 (P) [ 95.188410] kunit_try_run_case+0x170/0x3f0 [ 95.188645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 95.188887] kthread+0x328/0x630 [ 95.189082] ret_from_fork+0x10/0x20 [ 95.189276] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------ [ 95.131065] WARNING: CPU: 1 PID: 639 at lib/math/int_log.c:63 intlog2+0xd8/0xf8 [ 95.135168] Modules linked in: [ 95.135919] CPU: 1 UID: 0 PID: 639 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc5 #1 PREEMPT [ 95.137073] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 95.137301] Hardware name: linux,dummy-virt (DT) [ 95.137504] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 95.137788] pc : intlog2+0xd8/0xf8 [ 95.137998] lr : intlog2_test+0xe4/0x200 [ 95.138888] sp : ffff800082157c10 [ 95.139439] x29: ffff800082157c90 x28: 0000000000000000 x27: 0000000000000000 [ 95.140587] x26: 1ffe000018b856c1 x25: 0000000000000000 x24: ffff800082157ce0 [ 95.141462] x23: ffff800082157d00 x22: 0000000000000000 x21: 1ffff0001042af82 [ 95.142259] x20: ffff91dea1689d80 x19: ffff800080087990 x18: 000000006f585566 [ 95.143185] x17: 000000000cfdaa41 x16: fff00000c0975c3c x15: fff00000ff616b08 [ 95.144131] x14: 0000000000018fff x13: 1ffe00001b48a5cd x12: ffff723bd4aa3379 [ 95.144896] x11: 1ffff23bd4aa3378 x10: ffff723bd4aa3378 x9 : ffff91de9ec361dc [ 95.145649] x8 : ffff91dea5519bc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 95.146175] x5 : ffff70001042af82 x4 : 1ffff00010010f3a x3 : 1ffff23bd42d13b0 [ 95.146520] x2 : 1ffff23bd42d13b0 x1 : 0000000000000003 x0 : 0000000000000000 [ 95.146870] Call trace: [ 95.147032] intlog2+0xd8/0xf8 (P) [ 95.147259] kunit_try_run_case+0x170/0x3f0 [ 95.147490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 95.147816] kthread+0x328/0x630 [ 95.148056] ret_from_fork+0x10/0x20 [ 95.148484] ---[ end trace 0000000000000000 ]---